Professional Documents
Culture Documents
What are three of the factors that will contribute to greater Internet penetration
in Nepal households?
Ans:
The internet is very important because it is the limitless space where people have access
to pretty much infinite amounts of information. The internet is where a large amount of
knowledge comes from. Internet is gaining popularity worldwide and people in Nepal are
also getting addicted to it. The factors that will contribute to greater internet penetration
in Nepal households are as follows:
a. Price fall of entry level PC: When the price of entry level PC falls, its
affordability will increase and more number of households will possess PC. With PC
ownership numbers high, the logical next step will be internet access to all which will
increase the internet penetration.
b. Enhanced capabilities: Internet can be better penetrated in Nepal households by
providing more functions with the internet facilities. The integration of internet with Internet
Protocol Television (IPTV) has definitely increased the number of internet users. Similarly,
internet can be integrated with the film libraries on a pay per view basis which will draw in
more consumers.
c. Use of wireless web technology: The wireless web refers to use of the worldwide
web through a wireless device. Wireless Web connection provides anytime/anywhere
connection to e-mail, mobile banking, instant messaging, weather and travel information, and
other services. In general, sites aiming to accommodate wireless users must provide services
in a format displayable on typically small wireless devices. This factor will pull in consumers
to use internet for easier and quicker processes.
d. Competition on Internet Service Provider: As internet is growing its popularity,
more number of internet service providers (ISP) is increasing. With the increased number, the
competition on the ISPs grows and as a result, the bandwidth of the internet is growing in a
decreasing price rate which attracts more number of users to connect to the internet.
Moreover, they publish a lot of commercial advertisements attracting consumers.
2. What are the three main broad impacts the Internet has on marketing?
Ans:
Internet marketing is the most inexpensive way today to reach your target market, regardless
of the size of your business. Internet has affected greatly the marketing techniques today and
the three main broad impacts are given below:
a. Internet as communication: The internet works as a tool of communication. It
spreads information to the consumers about the product or service to be marketed. Consumers
can search for the review or the details about the product or service that they want to
purchase. Moreover, producer and consumer can have two way communications to have a
better deal between them.
b. Increased richness of marketing: Traditional marketing methods used to have a
fixed content and required near about equal amount of cost to add or modify the content.
Internet provides us opportunity to increase the richness of marketing. We can market any
service or product through different websites and more.
c. Internet has greatly expanded the information: This era is said to be information
age and this has been all possible due to internet. People can share their share of information
in the internet to the world and the information accumulated has created an ocean of
information. Now, we can get information about almost anything which has made a great
impact on the marketing field.
3. Explain FTP, Electronic mail, www, Http and HTML.
Ans:
FTP stands for File Transfer Protocol. The File Transfer Protocol (FTP) is a standard network
protocol used for the transfer of computer files between a client and server on a computer
network. FTP is built on a client-server model architecture using separate control and data
connections between the client and the server. FTP users may authenticate themselves with
a clear-text sign-in protocol, normally in the form of a username and password, but can
connect anonymously if the server is configured to allow it. For secure transmission that
protects the username and password, and encrypts the content, FTP is
often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).
HTML stands for Hyper Text Markup Language. HTML is the standard markup language for
creating Web pages. HTML describes the structure of Web pages using markup language.
HTML elements are the building blocks of HTML pages. HTML elements are represented by
tags. HTML tags label pieces of content such as "heading", "paragraph", "table", and so on.
Browsers do not display the HTML tags, but use them to render the content of the page.
TCP/IP is a family of protocols. A few provide "low- level" functions needed for many
applications. These include IP, TCP, and UDP. Others are protocols for doing specific tasks,
e.g. transferring files between computers, sending mail, or finding out who is logged in on
another computer. Initially TCP/IP was used mostly between minicomputers or
mainframes. These machines had their own disks, and generally were self-contained.
Application Layer
The application layer is provided by the program that uses TCP/IP for communication. An
application is a user process cooperating with another process usually on a different host
(there is also a benefit to application communication within a single host). Examples of
applications include Telnet and the File Transfer Protocol (FTP).
Transport Layer
The transport layer provides the end-to-end data transfer by delivering data from an
application to its remote peer. Multiple applications can be supported simultaneously. The
most-used transport layer protocol is the Transmission Control Protocol (TCP), which
provides connection-oriented reliable data delivery, duplicate data suppression, congestion
control, and flow control.
Another transport layer protocol is the User Datagram Protocol It provides connectionless,
unreliable, best-effort service. As a result, applications using UDP as the transport protocol
have to provide their own end-to-end integrity, flow control, and congestion control, if
desired. Usually, UDP is used by applications that need a fast transport mechanism and can
tolerate the loss of some data.
Internetwork Layer
The internetwork layer, also called the internet layer or the network layer, provides the
“virtual network” image of an internet this layer shields the higher levels from the physical
network architecture below it. Internet Protocol (IP) is the most important protocol in this
layer. It is a connectionless protocol that does not assume reliability from lower layers. IP
does not provide reliability, flow control, or error recovery.
These functions must be provided at a higher level. IP provides a routing function that
attempts to deliver transmitted messages to their destination. A message unit in an IP network
is called an IP datagram.
This is the basic unit of information transmitted across TCP/IP networks. Other internetwork-
layer protocols are IP, ICMP, IGMP, ARP, and RARP.
The different components of e-business architecture which need to be managed relate to each
other. The different components can be conceived of as different layers with defined
interfaces between each layer. The different layers can best be understood in relation to a
typical task performed by a user of an e-business system.
A five-layer model of e-business infrastructure
I CRM, supply chain management, data mining,
E-business services – applications content management systems
layer
II Web browser and server software and standards,
Systems software layer networking software and database management
systems
III Physical network and transport standards
Transport or network layer (transmission TCP/IP)
IV Permanent magnetic storage on web servers or
Storage/physical layer optical backup or temporary storage in memory
(RAM)
V Web content for intranet, extranet and Internet sites,
Content and data layer customers‘ data, transaction data, clickstream data
For example, an employee who needs to book a holiday will access a specific human
resources application or program that has been created to enable the holiday to be booked
(Level I). This application will enable a holiday request to be entered and will forward the
application to their manager and human resources department for approval.
To access the application, the employee will use a web browser such as Microsoft Internet
Explorer Mozilla Firefox or Google Chrome using an operating system such as Microsoft
Windows XP or Apple OS X (Level II).
This systems software will then request transfer of the information about the holiday request
across a network or transport layer (Level III).
The information will then be stored in computer memory (RAM) or in long-term magnetic
storage on a web server (Level IV).
The information itself which makes up the web pages or content viewed by the employee and
the data about their holiday request are shown as a separate layer (Level V), although it could
be argued that this is the first or second level in e-business architecture.
Kampas (2000) describes an alternative five-level infrastructure model of what he refers to as
the information system function chain‘:
1 Storage/physical.
Memory and disk hardware components (equivalent to Level IV).
2 Processing.
Computation and logic provided by the processor (processing occurs at Levels I and II).
3 Infrastructure.
This refers to the human and external interfaces and also the network, referred to as ‗extra
structure‘. (This is Level III, although the human or external interfaces are not shown there.)
4 Application/content.
This is the data processed by the application into information. (This is Level V)
5 Intelligence.
Additional computer-based logic that transforms information to knowledge.
(This is also part of the application layer I)