The Pizza Experts
Wednesday, November 16, 2011
Blog 7.1
The Pizza Experts cant be threatened by anything. Now if we were able to be threatend
by the 5 most common threats thats something different . We could be hacked not
just on our website by outside intruders, but also other restaraunt could be
hacked by intrueders. Any natural disater such as, power outage,
fire, and hurricane could mes up our place of buisness. Employees could definatly take us down from the inside out
if they wanted some revenge. Travel business could mess up our home
front with the information we give them. Viruses could just crush our whole operation for a long
time and do anything they want with it. We can prevent all these things from
happening by using safeguards, we could use special eye scans or codes that
employees have to use so no inturders, special back up functions for if natural
disasters occur, firewalls and viruse protection for viruses, and
techniques for long distance business.
Blog 6.1
The Pizza Experts can utilize the Web 2.0 pillars, as a means of just getting
better feedback on our site. We can use the pillars to take into consideration
what works well with people and the sites they visit. It would make
our websites more customer friendly and real time. Also just help the customers
enjoy viewing our website.
- Utilizing the Web as a platform- means using a website as a foundation for a service or a market. Our company can use employee IM.
- Leveraging Data- means using data to increase your means; The Pizza Experts uses a special customer overview system where we keep service and food customer gets.
- Implementing Web Capabilities- means using the web to the fullest; Pizza Experts 24/7 ticket and online pizza service
Monday, October 24, 2011
5.2 B2E Elecronic Commerce
The method of using the B2E is with the use of the Intranet. Intranet is similar to Extranet, but it uses business-to-employee as a
supporter. In order to use it the employee or client must connect to the server. Once the client gains access they can be able to
use the internet. The
employee can then connect to the Outside Local Network, which can be use
as a means of communication to their main company.
4.4 Relationship diagram
This image shows an best example of an Entity
Relationship Diagram. An Entity Relationship Diagram is use to
identify an entity for a company. The main four
entity that have been used are Invoice, Customer, Product, and Companies.
Invoice is the main entity out of the main four that are being used. These
entity are placed into a database table that shows different attributes like
name, date, tax, street name, state code, and many more. Companies can use the
Entity Relationship Diagram to create records.
These records can also create different attribute
type into a relationship. This method can help with the data type of the ERD so it can function properly.
5.1 Critique Your Competitors E-Commerce Website
Review for http://www.littlecaesars.com/ .
Rule 1: Website should offer something unique. Ranking: 1/5
Rule 2: The web site must be aesthetically pleasing. 1/5
Rule 3: The web site must be easy to use and fast. 1/5
Rule 4: The web site must motivate people. 1/5
Rule 5: You must advertise your presence on the web. 1/5
Rule 6: You should learn from your website. 1/5
The site doesn't have anything unique to it as the pages are very bland. If you have dial up you probably want be able to view there web page. The information is not clear to read and the print is too small to read. Finally it didn't offer anything to learn other than improvements to the sites can be extremely helpful here.
Rule 1: Website should offer something unique. Ranking: 1/5
Rule 2: The web site must be aesthetically pleasing. 1/5
Rule 3: The web site must be easy to use and fast. 1/5
Rule 4: The web site must motivate people. 1/5
Rule 5: You must advertise your presence on the web. 1/5
Rule 6: You should learn from your website. 1/5
The site doesn't have anything unique to it as the pages are very bland. If you have dial up you probably want be able to view there web page. The information is not clear to read and the print is too small to read. Finally it didn't offer anything to learn other than improvements to the sites can be extremely helpful here.
4.2 Packet Switching Technology
This image shows how a router exchange information
from one client to another. The way the router does
this is by using the packet on the router. Each packet can sent to a different server like an
IP. The IP can
transmit the packets into other routers and to its IP
Address and then to IP Datagrams. IP Datagrams are data packets that convert into IP
specification. However the main use of IP datagrams is to request each packet
with the uses of concurrent data transmissions.The router will
also use the TCP to
break the data from those address, checks each packet so its data is correct and
put them together again. The TCP can also be used to find lost IP Datagrams if needed to. Once this is done the IP
will send either a small or huge chucks of data with the use of Packet switching technology.
Monday, September 26, 2011
4.1 Infrastructure
It is putting in technology inputs, and the computer turns it into binary codes in which that it can understads. The computer reads it, because it is electric charges then it put out out putsof information while it keeps sending the information back and forth to the computer. The electric pulses are messured in hertz.
Subscribe to:
Posts (Atom)