Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

***I need full and good answer. ***(((Don\'t copy and paste))). ***((((Don\'t us

ID: 3753929 • Letter: #

Question

***I need full and good answer. ***(((Don't copy and paste))).
***((((Don't use your handwriting))))).

((((I need answer alll Questions please ))))

Q1: How can Internet technologies help a business form strategic alliances with its customers, suppliers, and others? Q2: Explain how information technology can be used to implement the five basic competitive strategies. Support your answer with examples covering each strategy. Q3: Using your own words, Explain how could companies apply "Raise Barriers to Entry" concept to discourage or delay other companies from entering the market. Q4: What is the basic difference between direct and sequential memory access? Elaborate two basic points for each type of memory access. Give one example for each type as well

Explanation / Answer

Q1:

Internet technology are extensively used in business shape strategic alliances.

Any commerce is related by means of its customers, suppliers, and others. skill is basically a regulation.

Now we are by this technology to solve real-world evils. Every trouble has its solution. By using skill, solutions are quite easy and easy.

Example by:

e-Commerce:

Amazon and Flipkart the most excellent examples intended for the business strategic alliance.

The amass owners (Suppliers) are joined up with the e-Commerce websites.

This can be done from side to side Admin unit in the website.

skill is very helpful to know in order about the product. By advertising rare items on the websites, the suppliers have the good possibility to grow under joint payment.

expenditure are also done using skill. Using payment entry we can easily do the expenditure. Also, we can track the manufactured goods until to arrive at the purpose.

Q2:

Basic spirited strategies in the business manufacturing are as follows:

1. Competitive rivalry by;

Using internet technology like security gear, ease of access, friendly bank, user-friendly UI and customer satisfaction, we tin can easily overcome the opposition in the market.

Also, tendency following is the good option to get the profits with assist of internet technology.

2. Bargaining power of suppliers by;

The company are taking any goods by bargain them. This also can be complete very systematically by taking the internet technology. It is just like e-procurement process beneath technology.

3. Bargaining power of customers by;

skill helps us, to bargain the clientele with some application in the web like olx.com and quicker.com etc. We can bargain in the chat to get a manufactured goods with the buyer satisfaction. In a similar way, we can bargaining by means of the customers.

4. The threat of substitute products or services by;

Let us take an instance of Modular smart phones.

These are the ideal examples of the alternate products. Without altering entire Smartphone’s of the users, the modular phones helps to bring together the upgradable devices to the smartphones.

If the smartphones desire to improve their camera, add to their RAM&ROM then, the user no need to change their mobiles.

just they can replace the part with the latest parts.

Q3:

government utilize single window law to establish company in the country.

This Single window rule method is based winning the internet skill.

We be able to easily get the savings, land allotments and tie agreements can be complete with less time and greater pleasure.

But Some company are aginast to other spirited companies.

It is the barrier to establish new companies in the countries. To conquer this issue, solitary window policy is much improved to resolve the issues.

Delay time will be lessening through this rule method.

Q4:

Sequential memory access:

Traverse the memory location by means of an order as of the start to the target reminiscence location can be done in chronological memory access. It is too a serial access.

Example by :

Magnetic tape

Direct memory access as:

cross the memory locations with a accidental order can be done in through memory access. It is also a random access.

It is contrast with the chronological access.

Example by :

RAM (Random access memory)