Hardware and Network issues in e-commerce

Hardware and Network issues in e-commerce Introduction This review will discuss the issues and outline some future developments related to the three most prominent forms of network technology, broadband, m-commerce and wireless broadband. What is broadband? A good definition of broadband is: "Broadband refers to any communication technology that permits clients to play streaming video and audio files at acceptable speeds - generally anything above 100 Kbps" (Laudon and Traver, 2002). Typically, broadband is characterised by very high upload and download speeds and most interestingly it is an 'always-on' technology as opposed to narrowband where the user has to 'dial-up' to the server every time they begin a new session on the internet, whereas with broadband the user simply has to click on the internet icon on their desktop and they are instantly linked to home page of their choice. Types of broadband There are many types of broadband access available to the internet user. The most commonly used type of broadband connections made by the general consumer is via cable modem and DSL connections. Cable Modem is usually used by consumers who cannot get DSL connections in their area or who live in a cabled area and is characterised as a shared network service. Internet connection is 'piggybacked' on the television signal received by consumers who have cable television. It

  • Ranking:
  • Word count: 4519
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Database Coursework on a Vehicle Rental System: Analysis

Introduction I am a student starting my second year of A levels at a College of Further and Higher Education and one of these A levels is ICT. The A2 part of the ICT A level consists of three modules, one of which is coursework and it is worth 40% of my overall A2 grade. The coursework requires me to identify and conduct research into an open-ended problem that exists for a real end-user. From results of this preliminary research, I must design an appropriate ICT-based solution for the problem using the skills and knowledge that I have acquired throughout the duration of my course. After designing such a solution, I will develop the actual software to be used to address the problem along with the technical documentation. This software will then undergo extensive testing so that I may identify and correct any bugs that may be present within the system. Plans on how the system will be implemented will then be made, including any training the staff will need and how existing data will be transferred into the new system. Finally, the User Documentation will be produced and I will evaluate the system on a number of various criteria to see if it meets the requirements outlined at the analysis stage. Throughout the whole process, I will be using the skills and experience that I've acquired in the first year of the course (and what I will be learning this year) to incorporate a wide

  • Ranking:
  • Word count: 15099
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Computer Crime

Table of Contents Cybercrime: An Overview of Computer Fraud and Abuse 3 What is Cybercrime? 3 New and emerging technologies and their impact on personal privacy protection 4 I-Phone 4 I-Pad 5 RFID Tagging 5 The Affect of Computer Crime on Society 7 What has been done by companies and governments to control the problem? 8 Penalties Imposed by Australian Law for Cybercrime 9 Weaknesses currently existing in Australian Cyber law 10 What proposed changes are being or should be suggested to overcome these loopholes 11 Chances of a computer criminal being caught and prosecuted 12 Reference List 13 Appendix 15 Cybercrime: An Overview of Computer Fraud and Abuse "New times bring new crimes. It's a story as old as humanity and as new as the Internet. First came cars, then car thieves followed. Telephones are followed by telephone fraud. Now we've got computers." (Anonymous1 Year Unknown) In the past decade technology has exponentially increased, and along with it computer crime. All new and emerging technologies are being affected by this transgression and this has been creating many problems for consumers, companies, agencies and the government. Companies and agencies have only now become conscious of the fact that their computers are prone to attack. In response to this, new security systems have been implemented and penalties for such an act increased. This

  • Ranking:
  • Word count: 4447
  • Level: AS and A Level
  • Subject: ICT
Access this essay