Question

In: Computer Science

Textbook: Business Data Networks and Security In your browser you enter the URL of a website...

  • Textbook: Business Data Networks and Security
  1. In your browser you enter the URL of a website you use every day. But today after some delay you receive the infamous 404 Host Not Found error message.
  2. What are some of the many possibilities that can cause this problem. List at least 3 that are directly related to the components of TCP/IP communications and how you might troubleshoot each one. (It may be helpful to refer to Chapter 1A to identify some of the tools useful in troubleshooting network problems.)
  • How has the evolution of the internet transformed business?
  • Think about a business that you are familiar with and describe some of the applications that are part of its core business processes that use the internet. Could the business survive without these processes?
  • What emerging technologies (applications) will again change business and how it uses the internet?

Solutions

Expert Solution

  1. 404 Host Not Found error message is often generated when attempts are made to access host server with dead, broken link or remote host is not present or moved.

       Some of the reasons for this error are:

  • Incorrect URL typed.
  • Host is been removed.
  • Host is moved but link not changed accordingly.
  • Server hosting is not active, not running.
  • Connection broken.
  • Domain name does not exist.

Errors which are linked with components of TCP/IP communications are:

  • Host removed or moved– Contact the website to find if they have changed the host or removed it to find reasons and error corrections. If host is only moved, it can be fixed by getting new web link.
  • Connection broken: Try reloading the page using F5 or refresh. Check connection f internet.
  • Server hosting is not active, not running: Wait for timings of server activation, if any. Like some websites may have specific business hours. Contact website in case server doesn’t get active.

  1. Internet is growing from 16 % in 2005 to 48% in 2015 more and more users are getting added each day. It has transformed business as well. More and more companies, big or small are adding their presence on Internet. They know this media cannot be ignored as it has made easy for business to conduct their businesses.

Some of the advancement which has helped in business is:

  • Smartphone: Internet is now in pocket with ease of anywhere connectivity. Businesses are growing with use of smart phones are a media of selling or marketing
  • Digital advertizing has outgrown TV or Paper marketing. Companies are targeting users based on their interests, need, requirements and area specific to promote their products.
  • 24 x 7 ease: Shops have their own timings, but business on internet can be opened 24 x 7 which is good for customers and increases business.
  • Growth of all: big or small everyone can display their products easily without the problem of physical presence. This helps in breaking barrier between big and small companies and also helps in making products available to larger consumers sometimes beyond country boundaries.
  • Let’s take an example of retail business which uses internet to do business.

Some of the applications that are part of its core processes that uses internet are:

  • Product listing
  • Sales
  • Customer Information
  • Advertising and marketing

Business cannot survive if these core processes are removed as without products there can be no sales. Thus application for core processes is needed for growth of businesses.

  1. Emerging technologies such as Internet of things and artificial intelligence will change business. AI will work as personal assistants that will explore the things for customers by collecting data, compare products and may even buy products. This may help in contributing towards growing best businesses.

Related Solutions

The data file glakes.txt on the textbook website provides the cargo volume (in tons) and the...
The data file glakes.txt on the textbook website provides the cargo volume (in tons) and the time (in hours) it takes to load and unload the cargo for each of the 31 ships that docked at a Canadian port on the Great Lakes. Note that the variable measuring the cargo volume is called “Tonnage” in the data file. We are interested in learning how Tonnage affects the Time. (a). Fit a simple linear regression model ( Time ? Tonnage )...
Social Security is facing a challenge in the future. According to your textbook, by 2075 the...
Social Security is facing a challenge in the future. According to your textbook, by 2075 the old age dependency ratio will be approximately 0.4. Which means that each retired person is supported by 2.5 working people. That's much higher than it has been in the past 0.2. This concerns many people in the question arises will Social Security run out of money? Please explain your initial post how would you solve this problem.
Social Security is facing a challenge in the future. According to your textbook, by 2075 the...
Social Security is facing a challenge in the future. According to your textbook, by 2075 the old age dependency ratio will be approximately 0.4. Which means that each retired person is supported by 2.5 working people. That's much higher than it has been in the past 0.2. This concerns many people in the question arises will Social Security run out of money? Please explain your initial post how would you solve this problem.
Referencing your textbook, the article, and website from this week, discuss the pros (at least 2)...
Referencing your textbook, the article, and website from this week, discuss the pros (at least 2) and cons (at least 2) of genetically modified plants as a food source. Prioritize the pros and cons and provide a recommendation. What data would you use to support your conclusions?
Using your textbook and the Center for Medicare and Medicaid Services website, explain how the appeals...
Using your textbook and the Center for Medicare and Medicaid Services website, explain how the appeals process works when disputing a claim. Make sure these sources are cited at the end of the paper using APA style. Discuss two ways the Center of Medicare and Medicaid Website is beneficial for the public, and two ways it might be confusing to the public.
What are the different networks and areas where security policies must be adapted? Explain in your...
What are the different networks and areas where security policies must be adapted? Explain in your own word? Personnel safety Equipment safety Environmental impact Please dont just copy it from the internet Production loss Data loss
4. According to the textbook and/or BLS website, U.S. Department of Labor data show that minimum-wage...
4. According to the textbook and/or BLS website, U.S. Department of Labor data show that minimum-wage workers A. tend to work part time and in the communication industry. B. tend to work part time and in the leisure and hospitality industry. C. tend to work full time and in the communication industry. D. tend to work full time and in the leisure and hospitality industry. E. tend to work full time and in the agricultural and mining industries. 5. The...
In this discussion, you will pick any set of data from the textbook or your own...
In this discussion, you will pick any set of data from the textbook or your own data. Conduct a confidence interval analysis. Explain in the discussion question: Your source of data The lower limit and upper limit How this information might be relevant to a decision maker. Attach the Excel file containing the data source (but be sure everything we need to know about your executive summary is in the body of the discussion forum, not the attachment).
Your readings for this week have discussed databases, data breaches, and networking security in the business...
Your readings for this week have discussed databases, data breaches, and networking security in the business world. Find a major data breach within the last 2 years and do some research explain how and why the breach occurred, what information was accessed, and how this information could be misused. Has the incident been fully resolved or are there ongoing security issues with the company or customer information? Remember to include references to your readings and an article from the web...
Information security vulnerability analysis tool Your browser should return several hits. Choose a topic which can...
Information security vulnerability analysis tool Your browser should return several hits. Choose a topic which can be a tool, framework, practice, a methodology or technology related to vulnerability analysis and summarize it for the class. In your summary explain its purpose and address the following points: How widely is it used? How reliable is it in practice? What is its commercial availability? Does it scale well? Is it applicable to networked environments? Are there any other relevant aspects which you...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT