Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

***I need full and good answer. ***(((Don\'t copy and paste))). ***((((Don\'t us

ID: 3752059 • Letter: #

Question

***I need full and good answer. ***(((Don't copy and paste))).

***((((Don't use your handwriting))))).

((((I need answer alll Questions please ))))

Q1: How can Internet technologies help a business form strategic alliances with its customers, suppliers, and others? Q2: Explain how information technology can be used to implement the five basic competitive strategies. Support your answer with examples covering each strategy. Q3: Using your own words, Explain how could companies apply "Raise Barriers to Entry" concept to discourage or delay other companies from entering the market. Q4: What is the basic difference between direct and sequential memory access? Elaborate two basic points for each type of memory access. Give one example for each type as well

Explanation / Answer

ANSWER:

Q1:

Internet technologies are widely used in business form strategic alliances. Any business is related with its customers, suppliers, and others. Technology is basically a discipline. Now we are using this technology to solve real-world problems. Every problem has its solution. By using technology, solutions are quite easy and simple.

Example:

e-Commerce:

Amazon and Flipkart the best examples for the business strategic alliance.

The store owners (Suppliers) are tied up with the e-Commerce websites.

This can be done through Admin module in the website. Technology is very helpful to know information about the product. By selling rare items on the websites, the suppliers having the good chance to grow under mutual contribution. Payments are also done using technology. Using payment gateway we can easily do the payments. Also, we can track the product until to reach the destination.

Q2:

Basic competitive strategies in the business industry are as follows:

1. Competitive rivalry

Using internet technologies like security tools, ease of access, friendly banking, user-friendly UI and customer satisfaction, we can easily overcome the competition in the market. Also, trend following is the good choice to get the profits with help of internet technologies.

2. Bargaining power of suppliers

The companies are taking any goods by bargaining them. This also can be done very systematically by taking the internet technologies. It is just like e-procurement process under technology.

3. Bargaining power of customers

Technology helps us, to bargain the customers with some applications in the web like olx.com and quicker.com etc. We can bargaining in the chat to get a product with the customer satisfaction. In a similar way, we can bargaining with the customers.

4. The threat of substitute products or services

Let us take an example of Modular smartphones. These are the perfect examples of the substitute products. Without changing entire smartphones of the users, the modular phones helps to assemble the upgradable devices to the smartphones. If the smartphones want to upgrade their camera, increase their RAM&ROM then, the users no need to change their mobiles. Simply they can replace the parts with the latest parts.

Q3:

Governments use single window policy to establishing companies in the countries. This Single window policy method is based upon the internet technology. We can easily get the investments, land allotments and bond agreements can be done with less time and greater satisfaction.

But Some companies are aginast to other competitive companies. It is the barrier to establishing new companies in the countries. To overcome this issue, Single window policy is much better to resolve the issues. Delay time will be decreasing through this policy method.

Q4:

Sequential memory access:

Traverse the memory locations with an order from the beginning to the target memory location can be done in Sequential memory access. It is also a serial access.

Example:

Magnetic tapes

Direct memory access:

Traverse the memory locations with a random order can be done in Direct memory access. It is also a random access. It is contrasted with the Sequential access.

Example:

RAM (Random access memory)