In addition to printed reports, what other output technologies could be used by NewCentury?
What will be an ideal response?
Answers will vary but they should contain a variety of creative answers from the following technologies:
• Internet-based information delivery?Millions of firms use the Inter-net to reach new customers and markets around the world. To support the explosive growth in e-commerce, Web designers must provide user-friendly screen interfaces that display output and accept input from customers.
• E-mail is an essential means of internal and external business communication. Employees send and receive e-mail on local or wide area networks, including the Internet. Companies send new product information to customers via e-mail, and financial services companies use e-mail messages to confirm online stock trades. Employees use e-mail to exchange documents, data, and schedules and to share business-related information they need to perform their jobs. In many firms, e-mail has virtually replaced traditional memos and printed correspondence.
• Blogs?Web-based logs, called blogs, are another form of Web-based output. Because blogs are journals written from a particular point of view, they not only deliver facts to Web readers, but also provide opinions. Blogs are useful for posting news, reviewing cur-rent events, and promoting products.
• Instant messaging?This popular form of communication is another way for individuals and companies to communicate effectively over the Internet. Although some users feel that it can be a distraction, others like the constant flow of communication, especially as a team member in a collaborative situation.
• Wireless devices?Messages and data can be transmitted to a wide array of mobile devices, including PDAs, handheld computers, smart cell phones, and similar wireless products that combine portable computing power, multimedia capability, and Internet access.
• Digital audio, images, and video?Sounds, images, and video clips can be captured, stored in digital format, and transmitted as output to users who can reproduce the content.
You might also like to view...
Consider the scenario you wrote in Exercise 4-1 Identify the actor of the scenario. Next, write the corresponding use case SetTime. Include all cases, and include setting the time forward, backward, setting hours, minutes, and seconds.
What will be an ideal response?
What is important to disable unused features on a mobile device?
What will be an ideal response?
Vista enables the sharing of files by using which one of the following?
A) Public folder B) Private folder C) File folder D) Collaborative folder
____ is a general term used to describe software that violates a user's personal security.
A. Virus B. Spyware C. Worm D. Logic bomb