SlideShare a Scribd company logo
Download the full version and explore a variety of test banks
or solution manuals at https://testbankfan.com
Essentials of MIS 12th Edition Laudon Solutions
Manual
_____ Follow the link below to get your download now _____
https://testbankfan.com/product/essentials-of-mis-12th-
edition-laudon-solutions-manual/
Access testbankfan.com now to download high-quality
test banks or solution manuals
We have selected some products that you may be interested in
Click the link to download now or visit testbankfan.com
for more options!.
Essentials of MIS 12th Edition Laudon Test Bank
https://testbankfan.com/product/essentials-of-mis-12th-edition-laudon-
test-bank/
Essentials of MIS 10th Edition Laudon Solutions Manual
https://testbankfan.com/product/essentials-of-mis-10th-edition-laudon-
solutions-manual/
Essentials of MIS 13th Edition laudon Solutions Manual
https://testbankfan.com/product/essentials-of-mis-13th-edition-laudon-
solutions-manual/
Managerial Accounting for Managers 3rd Edition Noreen
Solutions Manual
https://testbankfan.com/product/managerial-accounting-for-
managers-3rd-edition-noreen-solutions-manual/
Employment Relations An Integrated Approach 1st Edition
mcphail Solutions Manual
https://testbankfan.com/product/employment-relations-an-integrated-
approach-1st-edition-mcphail-solutions-manual/
Statistics for Business Decision Making and Analysis 2nd
Edition Stine Test Bank
https://testbankfan.com/product/statistics-for-business-decision-
making-and-analysis-2nd-edition-stine-test-bank/
Radiographic Imaging and Exposure 5th Edition Fauber Test
Bank
https://testbankfan.com/product/radiographic-imaging-and-exposure-5th-
edition-fauber-test-bank/
International Business Competing in the Global Marketplace
10th Edition Hill Test Bank
https://testbankfan.com/product/international-business-competing-in-
the-global-marketplace-10th-edition-hill-test-bank/
Fundamentals of Financial Accounting 4th Edition Phillips
Test Bank
https://testbankfan.com/product/fundamentals-of-financial-
accounting-4th-edition-phillips-test-bank/
Information Technology Project Management Revised 6th
Edition Schwalbe Test Bank
https://testbankfan.com/product/information-technology-project-
management-revised-6th-edition-schwalbe-test-bank/
Copyright © 2017 Pearson Education, Inc.
1
Chapter 7
Telecommunications, the Internet, and Wireless Technology
Learning Objectives
7-1 What are the principal components of telecommunications networks and key networking
technologies?
7-2 What are the different types of networks?
7-3 How do the Internet and Internet technology work and how do they support communication
and e-business?
7-4 What are the principal technologies and standards for wireless networking, communication,
and Internet access?
Learning Catalytics is a “bring your own device” student engagement, assessment, and
classroom intelligence system. It allows instructors to engage students in class with real-time
diagnostics. Students can use any modern, web-enabled device (smartphone, tablet, or laptop) to
access it. For more information on using Learning Catalytics in your course, contact your
Pearson Representative.
Chapter Outline
7-1 What are the principal components of telecommunications networks and key networking
technologies?
Networking and Communication Trends
What is a Computer Network?
Key Digital Networking Technologies
7-2 What are the different types of networks?
Signals: Digital vs. Analog
Types of Networks
Transmission Media and Transmission Speed
7-3 How do the Internet and Internet technology work and how do they support
communication and e-business?
What is the Internet?
Internet Addressing and Architecture
Internet Services and Communication Tools
The Web
7-4 What are the principal technologies and standards for wireless networking,
communication, and Internet access?
Cellular Systems
Wireless Computer Networks and Internet Access
RFID and Wireless Sensor Networks
Copyright © 2017 Pearson Education, Inc.
2
Key Terms
The following alphabetical list identifies the key terms discussed in this chapter. The page
number for each key term is provided.
3G networks, 254 Personal-area networks (PANs), 254
4G networks, 254 Predictive search, 249
Bandwidth, 236 Protocol, 233
Blog, 251 Radio frequency identification (RFID), 256
Blogosphere, 252 Router, 231
Bluetooth, 254 RSS, 252
Broadband, 230 Search engines, 247
Cable Internet connections, 237 Search engine marketing, 250
Chat, 242 Semantic search, 248
Digital subscriber line (DSL), 237 Shopping bots, 250
Domain name, 238 Smart phones, 253
Domain name systems (DNS), 238 Social networking, 252
E-mail, 242 Social search, 249
File Transfer Protocol (FTP), 242 Software-defined networking, 231
Hertz, 236 Switch, 231
Hotspots, 256 T1 lines, 237
Hubs, 231 Telnet, 242
Hypertext Transfer Protocol (HTTP), 247 Search engine optimization (SEO), 251
Instant messaging, 242 Transmission Control Protocol/Internet Protocol
(TCP/IP), 233
Internet of Things, 253 Unified communications, 245
Internet Protocol (IP) address, 237 Uniform resource locator (URL), 247
Internet service provider (ISP), 236 Virtual private network (VPN), 246
Internet2, 241 Visual Web, 250
IPv6, 241 Voice over IP (VoIP), 243
Local-area network (LAN), 235 Web 2.0, 251
Metropolitan-area network (MAN), 236 Web 3.0, 253
Microblogging, 252 Web site, 2246
Modem, 234 Wide-area networks (WAN), 236
Network operating system (NOS), 230 Wi-Fi, 255
Packet switching, 232 Wiki, 252
Peer-to-peer, 235 WiMax, 256
Wireless sensor networks (WSNs), 258
Copyright © 2017 Pearson Education, Inc.
3
Teaching Suggestions
Chapter 7 presents crucial concepts and terminology since telecommunications, networks, and
the Internet are now introducing fundamental changes in businesses. The opening case,
“Wireless Technology makes Dundee Precious Metals Good as Gold,” illustrates some of the
new capabilities and opportunities provided by contemporary networking technology.
Dundee implemented an underground wireless Wi-Fi network that allows electronic devices to
exchange data wirelessly to monitor the location of equipment, people, and ore throughout the
mine’s tunnels and facilities. The company also uses Wi-Fi radio frequency identification
(RFID) technology to track workers, equipment, and vehicles in underground gold mines.
Dundee has decreased equipment downtime and utilizes its resources more efficiently. It uses
data from the underground wireless network in its mine management software and mobile
planning software. Now the company can more closely account for its mine workers, making
them more safe and the workers can communicate more closely with the mine’s control room.
Control room staff can actually see the location of machinery and direct traffic more effectively,
quickly identify problems and respond more rapidly to emergencies.
The opening vignette provides an example of how businesses are adapting to new technologies
based on the Internet. It shows how companies must continually evolve as technology improves.
Section 7-1, “What are the principal components of telecommunications networks and key
networking technologies?” Telecommunications and networks are vital to the majority of
businesses today, and this section explains why. Because telecommunications technology serves
as the foundation for electronic commerce and the digital economy, the concepts and
terminology in Chapter 7 are important for both MIS and business majors. This section explains
the basic configuration of networks, regardless of their size.
You may want to contrast the origin and history of telephone networks and computer networks.
Then diagram how the two are converging into one pipeline for all types of communication
transmissions. Convergence is leading to more efficient transmission traffic and ubiquitous
communications thanks to the Internet.
A contemporary corporate network infrastructure relies on both public and private infrastructures
to support the movement of information across diverse technological platforms. It includes the
traditional telephone system, mobile cellular communications, wireless local area networks,
videoconferencing systems, a corporate website, intranets, extranets, and an array of local and
wide area networks, including the Internet.
Contemporary networks have been shaped by the rise of client/server computing, the use of
packet switching, and the adoption of TCP/IP as a universal communications standard for linking
disparate networks and computers. Client/server networks have distributed much of the
organization’s computing power to the desktop and factory floor. Packet switching makes more
Copyright © 2017 Pearson Education, Inc.
4
efficient use of network communications capacity by breaking messages into small packets that
are sent independently along different paths in a network and then reassembled at their
destination. Protocols provide a common set of rules that enable communication among diverse
components in a telecommunications network. TCP/IP is a suite of protocols that has become
the dominant model of achieving connectivity among different networks and computers. It is the
connectivity model used in the Internet.
One exercise you may try to help show how much we rely on communications today is to ask
students to count the number of text messages, phone calls, e-mails, and IM messages they either
sent or received in the last 24 hours or the last week. You could even go so far as to ask them to
not send or receive any of these communications for a day to prove how reliant we’ve become on
telecommunications.
Section 7-2, “What are the different types of networks?” It may help for you to bring several
props to show the different transmission media explained in this section. For example, bring
twisted wire, coaxial cable, and fiber-optic cable to show to the class and discuss the advantages
and disadvantages of each type of media. Students should note the different ranges (frequencies)
of wireless media. Also, you should discuss bandwidth and its connection to frequencies, as this
is a critical concept today. Table 7.1 compares the range of four different area networks.
This section describes the different network topologies and how they pass data across a network.
If you have students working in business, ask them to identify the network topologies used in
their organizations.
Section 7-3, “How do the Internet and Internet technology work and how do they support
communication and e-business?” Most students are familiar with the Internet and motivated to
discuss it. You might begin this section by asking students how they spend their time on the
Internet and how their online activities have changed since they started using the Internet. Also,
ask them to identify which client platforms they currently use or have used. Ask your students to
identify several of the many benefits that the Internet offers to organizations. Ask them to
provide specific examples that they have read about in the text or have personally observed.
The principal Internet services and communication tools are e-mail, chatting, instant messaging,
newsgroups, telnet, file transfer protocol, and the web. Most students will probably be familiar
with these services, having used them in their personal life. What they may not understand or
relate to quite yet is how effective the tools are in a business setting. These tools reduce time and
cost when firms must manage organizational activities and communicate with many employees.
If you have students working in businesses, ask them to discuss the communications tools their
organization uses. This section introduces a fairly new concept of unified communications. It
also compares Web 2.0 with Web 3.0 that is now in the conceptual stage.
Make students aware that while the new information technology infrastructure provides many
benefits and capabilities, it does require careful management and planning. Challenges posed by
networking and the Internet include loss of management control over information systems; the
need for organizational change; and the difficulty of ensuring infrastructure scalability and
reliability.
Copyright © 2017 Pearson Education, Inc.
5
Interactive Session: Organizations: The Battle over Net Neutrality
Case Study Questions
1. What is network neutrality? Why has the Internet operated under net neutrality up to
this point in time?
Network neutrality is the idea that Internet service providers must allow customers equal access
to content and applications, regardless of the source or nature of the content. Presently the
Internet is indeed neutral: all Internet traffic is treated equally on a first-come, first-serve basis by
Internet backbone owners. The Internet is neutral because it was built on phone lines, which are
subject to ‘common carriage’ laws. These laws require phone companies to treat all calls and
customers equally. They cannot offer extra benefits to customers willing to pay higher premiums
for faster or clearer calls, a model known as tiered service.
2. Who’s in favor of network neutrality? Who’s opposed? Why?
Those in favor of network neutrality include organizations like MoveOn.org, the Christian
Coalition, the American Library Association, every major consumer group, many bloggers and
small businesses, and some large Internet companies like Google and Amazon. Verizon and
Google proposed a split proposition – enforce net neutrality on wired connections, but not on
wireless networks. Some members of the U.S. Congress also support network neutrality. This
group argues that the risk of censorship increases when network operators can selectively block
or slow access to certain content. Others are concerned about the effect of slower transmission
rates on their business models if users can’t download or access content in a speedy fashion.
Those who oppose network neutrality include telecommunications and cable companies who
want to be able to charge differentiated prices based on the amount of bandwidth consumed by
content being delivered over the Internet. Some companies report that five percent of their
customers use about half the capacity on local lines without paying any more than low-usage
customers. They state that metered pricing is “the fairest way” to finance necessary investments
in its network infrastructure. Internet service providers point to the upsurge in piracy of
copyrighted materials over the Internet as a reason to oppose network neutrality. Comcast
reported that illegal file sharing of copyrighted material was consuming 50 percent of its network
capacity. The company posits that if network transmission rates were slower for this type of
content, users would be less likely to download or access it. Those who oppose network
neutrality argue that it removes the incentive for network providers to innovate, provide new
capabilities, and upgrade to new technology.
3. What would be the impact on individual users, businesses, and government if Internet
providers switched to a tiered service model for transmission over landlines as well as
wireless?
Proponents of net neutrality argue that a neutral Internet encourages everyone to innovate
without permission from the phone and cable companies or other authorities. A more level
Copyright © 2017 Pearson Education, Inc.
6
playing field spawns countless new businesses. Allowing unrestricted information flow becomes
essential to free markets and democracy as commerce and society increasingly move online.
Heavy users of network bandwidth would pay higher prices without necessarily experiencing
better service. Even those who use less bandwidth could run into the same situation.
Network owners believe regulation like the bills proposed by net neutrality advocates will
impede U.S. competitiveness by stifling innovation and hurt customers who will benefit from
‘discriminatory’ network practices. U.S. Internet service already lags behind other nations in
overall speed, cost, and quality of service, adding credibility to the providers’ arguments.
Obviously, by increasing the cost of heavy users of network bandwidth, telecommunication and
cable companies and Internet service providers stand to increase their profit margins.
4. It has been said that net neutrality is the most important issue facing the Internet since
the advent of the Internet. Discuss the implications of this statement.
Under current conditions, the Internet is neutral; all Internet traffic is treated equally on a first-
come, first-served basis by Internet backbone owners. Proponents of net neutrality say that
changing anything would disrupt normal service for users and begin a trend of discrimination
based on the types of Internet usage.
Network owners believe regulation to enforce net neutrality will impede U.S. competitiveness by
discouraging capital expenditure for new networks and curbing their networks’ ability to cope
with the exploding demand for Internet and wireless traffic.
Internet service providers (ISPs) assert that network congestion is a serious problem and that
expanding their networks would require passing on burdensome costs to consumers. These
companies believe differential pricing methods, which include data caps and metered use—
charging based on the amount of bandwidth consumed—are the fairest way to finance necessary
investments in their network infrastructures.
5. Are you in favor of legislation enforcing network neutrality? Why or why not?
Student answers will vary. Some components and principles to consider in answering this
question include:
• Price differentials: how much more would heavy bandwidth users pay than those who
consume less bandwidth?
• Speed: how much faster would network transmissions be with a tiered service model?
• Stifle innovation: would a tiered service model stifle innovation by charging more for
heavy bandwidth use or would it free up bandwidth thus allowing more innovation?
• Censorship: would telecommunication and cable companies and Internet service
providers increase censorship of content transmitted over networks?
• Discrimination by carriers: would the end of network neutrality be the beginning of more
discrimination?
Interactive Session: People: Monitoring Employees on Networks: Unethical or Good
Business?
Copyright © 2017 Pearson Education, Inc.
7
Case Study Questions
1. Should managers monitor employee e-mail and Internet usage? Why or why not?
Student answers will vary on this question. The case study statistics show that corporate misuse
and abuse of e-mail for personal reasons is exploding. Simply stated, employees who use
company resources for work not related to the company are, in essence, engaged in “service
theft.” They are being paid to work for the company, and this does not include abusing corporate
resources for personal time. Companies are in business to generate profits for their shareholders.
Managers certainly should be concerned with the loss of time and employee productivity, the
additional traffic it creates on their networks that inhibits the efficiency for real business
purposes, lost revenue or missed opportunities, as well as overcharging clients because of lost
employee efficiencies. The company itself is responsible for the use of its resources and what
employees do while using them. Adverse publicity can seriously affect a company and could
even result in expensive lawsuits. Companies also fear e-mail leakage of trade secrets. Other
legal and regulatory problems involve the safe keeping of all e-mails that are generated on
corporate equipment. This information must be retained for specific time periods and may be
requested as evidence in a lawsuit.
2. Describe an effective e-mail and web use policy for a company.
Like all policies, an effective e-mail and web use policy must be carefully designed and clearly
communicated to all persons who use these corporate resources. There are a number of different
policies in existence. Some companies allow absolutely no personal use of corporate networks,
whereas others allow some degree of activity that is easily monitored. A good policy will detail
exactly what type of activity is acceptable and what is not allowed. The policy should clearly
articulate sanctions that will be followed for any and all offenses in relation to the policy. Most
of all, rules for Internet usage should be tailored to specific business needs and organizational
cultures.
As an instructor you might wish to show students an example of the University of South
Australia’s policy at http://www.unisa.edu.au/policies/policies/corporate/C22.asp
3. Should managers inform employees that their web behavior is being monitored? Or
should managers monitor secretly? Why or why not?
Opinions will vary according to personal values and workplace experiences. However, most
students will probably answer that managers should inform employees that their web behavior is
being monitored as a way to foster open communications and trust between both sides. Many
consultants believe companies should write corporate policies on employee e-mail and Internet
use. The policies should include explicit ground rules that state, by position or level, under what
circumstances employees can use company facilities for e-mail, blogging, or web surfing. The
policies should also inform employees whether these activities are monitored and explain why.
Section 7-4, “What are the principal technologies and standards for wireless networking,
communication, and Internet access?” Ask your students how many of them use cellular
Copyright © 2017 Pearson Education, Inc.
8
phones, smartphones, wireless laptops, tablet computers, or wireless e-book readers. Most
students are excited to demonstrate their “latest devices,” and you may wish to ask one of them
to discuss the capabilities of theirs. Ask them to discuss what they like or dislike about the
features found on their appliance.
If you have the class time, you can ask the campus IT director to discuss the telecommunications
technology used on your campus, take a tour of the campus facilities, or invite an IT director
from a local company to discuss his company’s telecommunications technology. Ask your
students to find out what their university does in order to support mobile wireless
communications. Have them investigate applications where Bluetooth, Wi-FI, or hotspot
technology is used and how it benefits them. Are they able to use their own personal appliances
to connect and utilize these technologies on their campus?
Review Questions
7-1 What are the principal components of telecommunications networks and key
networking technologies?
Describe the features of a simple network and the network infrastructure for a large
company.
A simple network consists of two or more connected computers. Basic network components
include computers, network interfaces, a connection medium, network operating system
software, and either a hub or a switch. The networking infrastructure for a large company
relies on both public and private infrastructures to support the movement of information
across diverse technological platforms. It includes the traditional telephone system, mobile
cellular communication, wireless local-area networks, videoconferencing systems, a
corporate website, intranets, extranets, and an array of local and wide-area networks,
including the Internet. This collection of networks evolved from two fundamentally different
types of networks: telephone networks and computer networks. (Learning Objective 1: What
are the principal components of telecommunications networks and key networking
technologies?, AACSB: Application of knowledge.)
Name and describe the principal technologies and trends that have shaped
contemporary telecommunications systems.
Client/server computing, the use of packet switching, and the development of widely used
communications standards such as TCP/IP are the three technologies that have shaped
contemporary telecommunications systems.
Client/server computing has extended to networking departments, workgroups, factory
floors, and other parts of the business that could not be served by a centralized architecture.
The Internet is based on client/server computing. Packet switching technology allows nearly
full use of almost all available lines and capacity. This was not possible with the traditional
dedicated circuit-switching techniques that were used in the past. TCP/IP is a suite of
protocols that has become the dominant standard of network communications. Having a set
Copyright © 2017 Pearson Education, Inc.
9
of protocols for connecting diverse hardware and software components has provided a
universally agreed upon method for data transmission. (Learning Objective 1: What are the
principal components of telecommunications networks and key networking technologies?,
AACSB: Application of knowledge.)
7-2 What are the different types of networks?
Define an analog and a digital signal.
Analog: a continuous waveform that passes through a communications medium and has been
used for voice communication. Traditionally used by telephone handsets, computer speakers,
or earphones.
Digital: a discrete, binary waveform, rather than a continuous waveform, represented by
strings of two states: one bit and zero bits, which are represented as on-off electrical pulses.
Computers use digital signals and require a modem to convert these digital signals into
analog signals that are transmitted across telephone lines, cable lines, or wireless media.
(Learning Objective 2: What are the different types of networks?, AACSB: Application of
knowledge.)
Distinguish between a LAN, MAN, and WAN.
LAN (Local Area Network): a telecommunications network that is designed to connect
personal computers and other digital devices within a half-mile or 500-meter radius. LANs
typically connect a few computers in a small office, all the computers in one building, or all
the computers in several buildings in close proximity. LANs require their own dedicated
channels.
MAN (Metropolitan Area Network): a network that spans a metropolitan area, usually a
city and its major suburbs. Its geographic scope falls between a WAN and a LAN.
WAN (Wide Area Network): spans broad geographical distances – entire regions, states,
continents, or the entire globe. The most universal and powerful WAN is the Internet.
Computers connect to a WAN through public networks, such as the telephone system or
private cable systems, or through leased lines or satellites. (Learning Objective 2: What are
the different types of networks?, AACSB: Application of knowledge.)
7-3 How do the Internet and Internet technology work and how do they support
communication and e-business?
Define the Internet, describe how it works, and explain how it provides business value.
The Internet is a vast network of computers that connects millions of people all over the
world. The Internet uses the client/server model of computing and the TCP/IP network
reference model. Every computer on the Internet is assigned a unique numeric IP address. No
one owns the Internet, and it has no formal management organization. However, worldwide
Internet policies are established by organizations and government bodies, such as the Internet
Copyright © 2017 Pearson Education, Inc.
10
Architecture Board and the World Wide Web Consortium. The Internet must also conform to
the laws of the sovereign nation-states in which it operates, as well as the technical
infrastructure that exists within the nation-state.
The Internet enables employees to gain remote access to the company’s internal systems
through its website. They are able to better service customers and suppliers, improve
operational efficiency, increase productivity, lower operational costs, have a broader market
base, and reach more individual customers on a global scale by establishing a web presence.
The cost of email and other Internet services tend to be far lower than equivalent voice,
postal, or over night delivery costs, making the Internet a very inexpensive communication
medium. It is also a very fast method of communication, with messages arriving anywhere in
the world in a matter of seconds or minutes. (Learning Objective 3: How do the Internet and
Internet technology work and how do they support communication and e-business?, AACSB:
Application of knowledge.)
Explain how the Domain Name System (DNS) and IP addressing system work.
The Internet is based on the TCP/IP networking protocol suite. Every computer on the
Internet is assigned a unique Internet Protocol (IP) address, which currently is a 32-bit
number represented by four strings of numbers ranging from 0 to 255 separated by periods.
A domain name is the English-like name that corresponds to the unique 32-bit numeric IP
address for each computer connected to the Internet. The Domain Name System (DNS)
converts IP addresses to domain names so that users only need to specify a domain name to
access a computer on the Internet, instead of typing the numeric IP address. DNS servers
maintain a database containing IP addresses mapped to their corresponding domain names.
When a user sends a message to another user on the Internet, the message is first decomposed
into packets using the TCP protocol. Each packet contains its destination address. The
packets are then sent from the client to the network server and from there on to as many other
servers as necessary to arrive at a specific computer with a known address. At the destination
address, the packets are reassembled into the original message. (Learning Objective 3: How
do the Internet and Internet technology work and how do they support communication and e-
business?, AACSB: Analytical thinking.)
List and describe the principal Internet services.
Table 7-2 lists and describes the major Internet services:
• Email—person-to-person messaging; document sharing.
• Newsgroups—discussion groups on electronic bulletin boards.
• Chatting and instant messaging—interactive conversations.
• Telnet—logging on to one computer system and doing work on another.
• File Transfer Protocol (FTP)—transferring files from computer to computer.
• World Wide Web—retrieving, formatting, and displaying information (including text,
audio, graphics, and video) using hypertext links.
Copyright © 2017 Pearson Education, Inc.
11
(Learning Objective 3: How do the Internet and Internet technology work and how do they
support communication and e-business?, AACSB: Application of knowledge.)
Define and describe VoIP and virtual private networks and explain how they provide
value to businesses.
• Voice over Internet Protocol (VoIP) enables Internet technology to be used for
telephone voice transmission over the Internet or private networks. VoIP offers the
advantage of avoiding tolls charged by local and long-distance telephone networks.
VoIP provides businesses an opportunity to reduce costs because they no longer have
to maintain separate networks or provide support services and personnel for each
different type of network. It gives organizations flexibility because phones can be
added or moved to different offices without rewiring or reconfiguring networks.
• Virtual private networks are secure, encrypted, private networks that have been
configured within a public network to take advantage of the economies of scale and
management facilities of large networks, such as the Internet. VPNs are low-cost
alternatives to private WANs. VPNs give businesses a more efficient network
infrastructure for combining voice and data networks.
(Learning Objective 3: How do the Internet and Internet technology work and how do they
support communication and e-business?, AACSB: Application of knowledge.)
List and describe alternative ways of locating information on the web.
• Search engines are a facility on the web that helps you find sites with the information
and/or services you want. Examples: Google, Yahoo!, and MSN.
• Intelligent agent shopping bots use intelligent agent software for searching the
Internet for shopping information. Examples: MySimon and Froogle.
• Blogs are informal yet structured websites where subscribing individuals can publish
stories, opinions, and links to other websites of interest.
• Rich Site Summary or Really Simple Syndication (RSS) is a simple way for people to
have content they want pulled from websites and fed automatically to their
computers, where it can be stored for later viewing. It’s commonly used with blogs.
• Wikis are collaborative websites where visitors can add, delete, or modify content on
the site, including the work of previous authors.
• Web 2.0 provides second-generation interactive Internet-based services that enable
people to collaborate, share information, and create new services online. Web 2.0
software applications run on the web itself instead of the desktop and bring the vision
of web-based computing closer to realization.
• Web 3.0 (Semantic Web) reduces the amount of human involvement in searching for
and processing web information. It’s still in its infancy but promises to establish
specific meanings for data on the web, categories for classifying the data, and
relationships between classification categories.
Copyright © 2017 Pearson Education, Inc.
12
(Learning Objective 3: How do the Internet and Internet technology work and how do they
support communication and e-business?, AACSB: Application of knowledge.)
Describe how online search technologies are used for marketing.
Search engine marketing monetizes the value of the search process. Searching is one of the
web’s most popular activities with billions of queries performed each month. Search engines
are the foundation for the most lucrative form of online marketing and advertising. When
users enter a search term in a search engine, they receive two types of listings: sponsored
links, for which advertisers have paid to be listed, and unsponsored organic search results.
Advertisers can also purchase small text boxes on the side of search results pages. Paid,
sponsored advertisements are the fastest growing form of Internet advertising and are
powerful new marketing tools that precisely match consumer interests with advertising
messages at the right moment. (Learning Objective 3: How do the Internet and Internet
technology work and how do they support communication and e-business?, AACSB:
Application of knowledge.)
7-4 What are the principal technologies and standards for wireless networking,
communications, and Internet access?
Define Bluetooth, Wi-Fi, WiMax, and 3G and 4G networks.
Standards for wireless computer networks include Bluetooth (802.15) for small personal-area
networks (PANs), Wi-Fi (802.11) for local-area networks (LANs), and WiMax (802.16) for
metropolitan-area networks (MANs). Bluetooth can link up to eight devices within a 10-
meter area using low-power, radio-based communication and can transmit up to 722 Kbps in
the 2.4 GHz band. Wireless phones, keyboards, computers, printers, and PDAs using
Bluetooth can communicate with each other and even operate each other without direct user
intervention.
Wi-Fi is useful for creating wireless LANs and for providing wireless Internet access. Its
access range is limited to anywhere between 300 feet and three miles. Hotspots are public
access points individuals use to obtain high speed Internet access.
WiMax has a wireless access range of up to 31 miles and a data transfer rate of up to 75
Mbps, making it suitable for providing broadband Internet access in areas lacking DSL and
cable lines. The 802.16 specification also has robust security and quality-of-service features
to support voice and video.
3G is a short term for third-generation wireless technology, especially mobile
communications. Cellular networks have evolved from slow-speed (1G) analog networks to
high-speed, high-bandwidth, digital packet-switched, third-generation (3G) networks with
speeds ranging from 144 Kbps to more than 2 Mbps for data transmission.
4G is a short term for fourth-generation wireless technology. It is entirely packet-switched
and capable of 100 Mbps transmission speed (which can reach 1 Gbps under optimal
Copyright © 2017 Pearson Education, Inc.
13
conditions), with premium quality and high security. Voice, data, and high-quality streaming
video are available to users anywhere, anytime. (Learning Objective 4: What are the
principal technologies and standards for wireless networking, communications, and Internet
access?, AACSB: Application of knowledge.)
Describe the capabilities of each and for which types of applications each is best suited.
• Bluetooth: Access very limited; useful for creating small personal-area networks.
• Wi-Fi: Access is limited to 30–50 meters; useful for creating small local area
networks.
• WiMax: Access is limited to a range up to 31 miles: useful for creating wide area
networks.
• 3G networks: Access is available on major cellular telephone carriers that have
configured their networks for 3G services.
• 4G networks: Provides premium quality for voice, data, and streaming video from
cellular telephone carriers.
(Learning Objective 4: What are the principal technologies and standards for wireless
networking, communications, and Internet access?, AACSB: Application of knowledge.)
Define RFID, explain how it works, and describe how it provides value to businesses.
Mobile wireless technology facilitates supply chain management by capturing data on the
movement of goods as these events take place and by providing detailed, immediate
information as goods move among supply chain partners. Radio frequency identification
(RFID) systems provide a microchip that contains data about an item and its location. The
tags transmit radio signals over a short distance to special RFID readers. The RFID readers
then pass the data over a network to a computer for processing.
RFID gives businesses an opportunity to further automate their supply chain networks. The
technology allows more data on an RFID chip than typical barcodes. RFID systems track
each pallet, lot, or unit item in a shipment. The technology helps companies improve
receiving and storage operations by improving their ability to “see” exactly what stock is
stored in warehouses or on retail store shelves. (Learning Objective 4: What are the principal
technologies and standards for wireless networking, communications, and Internet access?,
AACSB: Application of knowledge.)
Define WSNs, explain how they work, and describe the kinds of applications that use
them.
Wireless sensor networks (WSNs) are networks of interconnected wireless devices with
some processing and radio-transmitting capability that are embedded into the physical
environment to provide measurements of many points over large spaces.
Wireless sensor networks are valuable for monitoring environmental changes, traffic
patterns, security incidents, or supply chain events. Wireless sensor networks can be placed
Copyright © 2017 Pearson Education, Inc.
14
in the field for years without any maintenance or human intervention. That reduces costs to
businesses using them. (Learning Objective 4: What are the principal technologies and
standards for wireless networking, communications, and Internet access?, AACSB:
Application of knowledge.)
Discussion Questions
7-5 It has been said that within the next few years, smartphones will become the single most
important digital device we own. Discuss the implications of this statement.
Student answers to this question will vary.
7-6 Should all major retailing and manufacturing companies switch to RFID? Why or why
not?
Student answers to this question will vary.
7-7 What are some of the issues to consider in determining whether the Internet would
provide your business with a competitive advantage?
Student answers to this question will vary.
Hands-On MIS Projects
Management Decision Problems
7-8 Floor tile company: Asked by major retailing customers to begin using RFID to improve
management of products. Use the web to identify the cost of hardware, software, and
networking components for an RFID system for your company. What factors should be
considered? What are the key decisions that have to be made in determining whether your
firm should adopt this technology?
(The following information was copied from www.zebra.com, Nov 2010)
What is the estimated incremental cost for adopting RFID?
If one is discussing incremental costs over and above what was invested in your bar code
infrastructure, then you can say that you will be making an investment in tags,
printer/encoders, readers, middleware, and professional services to integrate these
components into your bar code legacy environment. If you are not working with bar codes
already, obviously you will need to make an investment in back-office, manufacturing, or
WMS systems to use RFID data.
What is a ballpark figure for implementing RFID in a warehouse and distribution process?
According to Forrester Research, a typical supplier that attempts to comply with a mandate
Copyright © 2017 Pearson Education, Inc.
15
can expect to spend as much as $9 million on RFID—depending on the size of its
distribution network and Walmart volume. According to this research, the largest
expenditures are tag costs and additional warehouse labor. Again, it is stressed that this
figure is derived from studying one company seeking compliance with the Walmart mandate.
However, this study provides a good perspective on the areas from which costs will derive.
How do smart label costs compare to conventional thermal/thermal-transfer printed labels?
A smart label runs in the vicinity of about $0.50 per label vs. about $0.01 for a conventional
label. This is mainly due to the addition of the tag. This cost is also variable based on the
total volume printed and the economies of scale associated with large quantities.
What companies are currently developing RFID software? Is it all customized or are there
off-the-shelf solutions?
Numerous start-up and established software providers—including those who provide ERP
software—have developed applications to deal with RFID reader and printer/encoder
management, plus “tag data capture event” management. As with most business applications
software, packages are typically customized to meet customers’ requirements rather than
being ready to go “off the shelf.”
How will RFID integrate with EDI software?
EDI messages contain data about business transactions. While the format of an EDI message
may change to accommodate “new data” (such as an EPC by comparison with a GTIN),
fundamentally EDI message processors are unaware of the source of the data contained in
messages. So there should be no reason that RFID cannot integrate with EDI software,
provided the data structures are fundamentally the same. However, one area of difference is
that many EDI systems typically deliver data in periodic batch mode; in contrast, the strength
of RFID is its ability to deliver real-time data, so systems are up-to-the-minute.
Key decisions that a company needs to make when considering adopting RFID include:
• Hardware and software costs
• Implementation costs
• Return on investments
• How technology fits into overall business strategy
(Learning Objective 4: What are the principal technologies and standards for wireless
networking, communications, and Internet access?, AACSB: Analytical thinking,
Application of knowledge.)
7-9 BestMed Medical Supplies Corporation: Sells products and equipment from over 700
different manufacturers to hospitals, health clinics, and medical offices. The company
employs 500 people at seven different locations. Management is considering adopting a
unified communications system. What factors should be considered? What are the key
Copyright © 2017 Pearson Education, Inc.
16
decisions that have to be made in determining whether to adopt this technology? Use the
web, if necessary, to find out more about unified communications and its costs.
Because the costs of purchasing and implementing a unified communication system will vary
based on the chosen system, so too will student answers.
(The following information was copied from www.networkworld.com, Nov 2010)
From a broad perspective, Verizon Business suggests that organizations need to evaluate and
measure how UC&C will benefit their organizations, determine whether the enterprise has
adequate in-house technical resources, personnel and network capacity; and define how to
integrate UC&C into business processes to align the deployment with critical business
initiatives.
At a more detailed level, Verizon Business suggested that in preparation for UC&C,
enterprises should:
• Invest in advanced IP networks because “UC&C starts with a capabilities-rich IP
infrastructure. . . [and] flexible and expansive IP networks serve as the foundation of
a successful UC&C deployment.”
• Inventory technology and personnel resources to better understand the technological
scope of UC&C deployments and “help identify potential network, equipment, and
application gaps.” Verizon Business also recommends a skills-assessment of technical
staff “to identify possible new hires and individuals requiring additional training.”
• Align technology with business objectives to “make purchasing decisions with a
focus on meeting specific business goals.” Any deployment should be designed to
maximize the impact of UC&C on business processes. The enterprise should also
establish benchmarks for success to better understand its ultimate objectives.
• Create a comprehensive roadmap that is “far reaching and covers areas such as
technology and finances, as well as detailed deployment and implementation plans.”
• Tackle security at the onset, with a design that integrates “seamlessly with a business’
current network and leverage existing technology investments.”
• Determine capabilities for ongoing management and decide “whether in-house staff
has the skills and time required to effectively manage and troubleshoot performance
issues.” As needed, enterprise should “select a managed services provider with the
people, tools, and processes to help provide consistent performance of UC&C
applications.”
• Develop support systems and processes so that the corporate IT staff is prepared to
address end-user performance issues and questions.
• Train and educate end users “to help users adopt and embrace these new tools so they
can work more efficiently and productively.”
• Measure and modify, with built-in milestones planned that “go beyond reliability and
availability measurements to assess the impact of UC&C from a financial, customer
service, business process, and end-user satisfaction perspective.”
Copyright © 2017 Pearson Education, Inc.
17
(Learning Objective 3: How do the Internet and Internet technology work and how do
they support communication and e-business?, AACSB: Analytical thinking, Reflective
thinking, Application of knowledge.)
Improving Decision Making: Using Spreadsheet Software to Evaluate Wireless Services
Software skills: Spreadsheet formulas, formatting
Business skills: Analyzing telecommunications services and costs
7-10 You would like to equip your sales force of 35, based in St. Louis, Missouri with mobile
phones that have capabilities for voice transmission, text messaging, Internet access, and taking
and sending photos. Use the web to select two wireless providers that offer nationwide voice and
data service as well as good service in your home area. Examine the features of the mobile
handsets and wireless plans offered by each of these vendors. Assume that each of the 35
salespeople will need to spend three hours per weekday between 8 a.m. and 6 p.m. on mobile
voice communication, send 30 text messages per weekday, use 1 gigabyte of data per month, and
send five photos per week. Use your spreadsheet software to determine the wireless service and
handset that will offer the best pricing per user over a two-year period. For the purposes of this
exercise, you do not need to consider corporate discounts.
Answers will vary, since plan rates and costs of mobile phones are constantly changing. The
answer to this question can be found in the sample solution found in the Microsoft Excel file
named MIS14ch07solutionfile.xls. (Learning Objective 3: How do the Internet and Internet
technology work and how do they support communication and e-business?, AACSB: Analytical
thinking, Reflective thinking, Application of knowledge.)
Achieving Operational Excellence: Using Web Search Engines for Business Research
Software skills: Web search tools
Business skills: Researching new technologies
7-11 Use Google and Bing to obtain information about ethanol as an alternative fuel for motor
vehicles. If you wish, try some other search engines as well. Compare the volume and quality of
information you find with each search tool. Which tool is the easiest to use? Which produced the
best results for your research? Why?
Answers will vary according to the search phrases students enter in the search engines. The
object of this question should be for students to explore new search engines and web services and
not stick with “what they already know.” To that end, encourage students to use a different
search engine than what they normally use and explore how their search results are framed—
sponsored links or organic listings. Also encourage them to search for audio and video files,
blogs, wikis, and Web 2.0 services about the subject. Is the information more useful, less useful,
pertinent, or trustworthy? Do they prefer simple text documents or do they find the newer web
services more helpful? (Learning Objective 3: How do the Internet and Internet technology work
and how do they support communication and e-business?, AACSB: Analytical thinking,
Reflective thinking, Application of knowledge.)
Copyright © 2017 Pearson Education, Inc.
18
Collaboration and Teamwork Project
7-12. In MyMISLab, you will find a Collaboration and Teamwork Project dealing with the
concepts in this chapter. You will be able to use Google Drive, Google Docs, Google Sites,
Google +, or other open source collaboration tools to complete the assignment.
Case Study: Google, Apple, and Facebook Battle for Your Internet Experience
7-13 Compare the business models and core competencies of Google, Apple, and Facebook.
Google: Its business model has always focused on the Internet and the web. It began as one
of many search engines. It quickly ran away from the pack with its copyrighted PageRank
search algorithm which returns superior search results for web users. It also has developed
extensive online advertising services for businesses of all sizes. Google provides value to the
user by using an inexpensive, flexible infrastructure to speed up web searches and provide its
users with a vast array of web-based services and software tools.
Apple: Its business model focuses on centralized control of almost all aspects of its hardware
and software. It believes smartphones and tablets should have proprietary standards and be
tightly controlled. It only allows apps from its App store that have been vetted by the
company to be loaded to its products. Apple has a very loyal user base that has steadily
grown and most likely will stay with Apple products in the future.
Facebook: Facebook has built its business around social networking better than any other
company. It has more worldwide users than any other company. Facebook Platform enables
developers to build applications and websites that integrate with Facebook to reach its global
network of users and to build pesonalized and social products. (Learning Objective 3: How
do the Internet and Internet technology work and how do they support communication and e-
business?, AACSB: Analytical thinking, Reflective thinking, Application of knowledge.)
7-14 Why is mobile computing so important to these three firms? Evaluate the mobile
strategies of each firm.
This case demonstrates the fundamental paradigm shift from primarily desktop PC
computing to mobile computing devices accessing services through the Internet that is
currently taking place. This environment is projected to be a $400 billion e-commerce
marketplace where the major access device will be a mobile smartphone or tablet computer.
Each company is vying for the lead in a world of ubiquitous computing based on Internet
access. The leader stands to make untold profits from advertising but in order to do that, the
leader needs to claim the largest user base.
Apps greatly enrich the experience of using a mobile device. Whoever creates the most
appealing set of devices and applications will derive a significant competitive advantage over
rival companies.
Copyright © 2017 Pearson Education, Inc.
19
Google: Aggressively follows eyeballs. It has introduced the Android mobile operating
system for a host of non-Apple devices. The Droid system adds features that Apple devices
don’t have – the ability to run multiple apps at the same time. Uses an open non-proprietary
system that allows users to grab apps from any source. Command of the smartphone
operating system market provides built-in channels for serving ads to mobile devices. Google
has successfully tailored its search results to respond to mobile searchers needs and
accommodate smartphone functionality.
Apple: By far the current leader in the number of apps users can download – over one
million. Apple takes a 30% cut of every app purchased. Uses a closed proprietary system
and apps that only provide “one way in.” It unveiled Siri in 2011 that has the potential to
serve as a market disruption technology by combining search, navigation, and personal
assistant tools.
Facebook: Realized that much of its advertising revenue will come from mobile device
searches. Introduced Sponsored Stories as a way to triple its revenue. It overhauled its home
page to increase the size of both photos and links and allow users to create topical streams. It
de-cluttered smartphone screens. It gave advertisers more opportunties and more interesting
information with which to target markets. Facrbook has a mobile application suite that
replaces the typical smartphone home screen. It essentially turns an Android mobile device
into a Facebook phone. (Learning Objective 4: What are the principal technologies and
standards for wireless networking, communication, and Internet access?, AACSB: Analytical
thinking, Reflective thinking, Application of knowledge.)
7-15 What is the significance of search to the success or failure of mobile computing? How
have Apple and Facebook attempted to compete with Google? Will their strategies
succeed?
Mobile computing is eclipsing desktop computing as the main entry point to the Internet.
Today, people spend more than half their time online using mobile devices. Mobile devices
take advantage of a growing cloud of computing capacity available to anyone with a
smartphone and Internet connectivity.
Apple’s attempt to compete with Google came in the form of Siri, a combined search,
navigation, and personal assistant app. Siri uses Yelp for local business searches, tapping into
its user recommendations and ratings. It uses Wolfram Alpha for factual and mathematical
questions. It only uses Google search when all else fails.
Facebook is attempting to create a Graph Search feature to rival Google’s search. It mines
Facebook’s vast repository of user-generated data and delivers results based on social signals
such as Facebook ‘likes’ and friend recommendations. If the desire for friend-based
recommendations outweighs users’ reluctance to divulge more personal information, Graph
Search may be a winner. However, Facebook has an uphill battle in its efforts to convince
users to trust it with their Facebook activities. (Learning Objective 3: How do the Internet
and Internet technology work and how do they support communication and e-business?,
AACSB: Analytical thinking, Reflective thinking, Application of knowledge.)
Copyright © 2017 Pearson Education, Inc.
20
7-16 Which company and business model do you think is most likely to dominate the
Internet and why?
Students should consider these principles in their answers:
• The size, complexity, and bureaucracy of organizations affect the ability of any
company to continue to innovate, grow, and expand its reach. (see Chapter 3) As all
three companies try to expand into mobile computing, their ability to “turn on a
dime” in the face of other competitors may be in serious jeopardy.
• Google currently has the major share of the web-based advertising market, however
Facebook and other market entrants will be a major threat to them. Apple has had a
significant lead in mobile computing for several years. However, as more companies,
Google, Facebook, and others, continue to expand into the arena, its lead will be
threatened. Legal and regulatory compliance will be a major issue as this market
grows and more concerns are expressed from external environments.
• History is not on anyone’s side. Every major company that’s been a force in
technology in one era has lost its lead in the next era. For example, IBM was king of
mainframe computing in the 1940s and 1950s. DEC was king in the mini-computer
era during the 1970s. Microsoft was king in the 1980s and 1990s during the reign of
desktop computers. Google reigns in the 2000s with its web-based services. Apple
began as king of mobile computing devices. Will it remain on top as technology
continues to evolve? (Learning Objective 1: What are the principal components of
telecommunications networks and key networking technologies?, Learning Objective
3: How do the Internet and Internet technology work and how do they support
communication and e-business?, AACSB: Analytical thinking, Reflective thinking,
Application of knowledge.)
7-17 What difference would it make to a business or to an individual consumer if Apple,
Google, or Facebook dominated the Internet experience? Explain your answer.
Right now, Apple leads Google in the number of apps available to users. That gap is closing
quickly thanks to Google’s improvements of the Android operating system and its
encouragement to app developers. Open, non-proprietary systems historically have beat
closed, proprietary systems because developers and users have a wider range of choices.
Business managers must try to forecast which platform will provide the right choices for
employees. Consumers must choose which platform will best fulfill their personal needs for
the next two to three years. Switching costs play into both scenarios, not just in terms of
phone purchases but the price of apps. Once a user purchases and adjusts to using a certain
platform, it’s difficult and expensive to switch to a whole different system.
Apps greatly enrich the experience of using a mobile device, and without them, the
predictions for the future of mobile Internet would not be nearly as bright. Whoever creates
the most appealing set of devices and applications will derive a significant competitive
advantage over rival companies. (Learning Objective 3: How do the Internet and Internet
technology work and how do they support communication and e-business?, Learning
Objective 4: What are the principal technologies and standards for wireless networking,
Another Random Scribd Document
with Unrelated Content
XII. SLOTH.
I. The command to be diligent is plain. Rom. xii. 11. 2 Thess. iii.
10, 11.
II. See the miserable results of sloth.
1. It leads to tattling. 1 Tim. v. 13.
2. Decay. Eccles. x. 18.
3. Difficulties. Prov. xv. 19.
4. Waste. Prov. xviii. 9.
5. Want. Prov. xx. 4; xxiv. 30, 34.
III. Contrast excellent woman (Prov. xxxi. 27) with the slothful
person. Prov. xix. 24; xxiv. 30; x. 26.
IV. Learn a lesson from the ant for yourselves—for your children.
Prov. vi. 6, &c.
Give your children something to do.
Remember, they must be set to work, though it is often more
trouble to you to teach them to do it, than to do it yourself—yet
persevere.
V. If not slothful in your temporal affairs, above all be not slothful
concerning the salvation of your souls.
Heb. vi. 11, 12. 2 Pet. i. 10.
XIII. THE WATCHFUL MOTHER.
No eye should be so wakeful and watchful as a mother’s.
I. Watch over your children in infancy.
Exod. ii. 8. 1 Sam. i. 23.
It is described as next to impossible for a woman to forget her
sucking child. Isa. xlix. 15.
A well-watched infancy, under God’s blessing, avoids many
future ills.
II. Watch over your children’s education.
Judg. xiii. 8.
In every minute particular.
Learning—clothing, &c. 1 Sam. ii. 19. Prov. xxxi. 21, 23.
Contrast the dirty, unmended clothes of the poor, uncared-for
child, with the clean and neatly mended garments of him whose
childhood is guarded by the watchful eye of a mother.
III. Watch them in times of sickness and death.
No eye so quick to discover a hidden ill.
2 Kings, iv. 19, 20. John, xix. 25.
IV. Above all watch over the precious soul.
Never lose sight of the soul, in care for the body.
1. Watch, as those that must give account. Heb. xiii. 17.
2. Watch, to detect sin, and check its growth.
Mark first sign of the plague spot.
3. Watch, for opportunity to lead to Christ. Prov. xv. 23. Deut.
vi. 6, 9. Mark, x. 13.
XIV. THE HASTY MOTHER.
I. How common! Yet the Bible commands us not to be hasty.
Eccles. vii. 9.
A woman’s ornament should be a meek, and quiet spirit (1 Pet.
iii. 4), and a nurse is mentioned as being especially gentle to
the little ones. 1 Thess. ii. 7.
II. Observe the angry woman,
How foolish! Prov. xiv. 29; xxix. 20.
How provoking! Prov. xv. 1.
How wearing! Prov. xix. 13; xxvii. 15; xxi. 19.
Drives the husband from his fireside.
Sets an evil example to the children.
Often does in her haste, what she heartily repents at leisure.
III. Therefore,
1. Put away anger. Eph. iv. 31.
Do not be soon angry. Prov. xiv. 17. Jam. i. 19.
‘Meekness gives smooth answers to rough questions.’
2. Exercise self-control. Prov. xxv. 28; xvi. 32.
3. Teach it to your children.
III. Remember, a hasty temper is a fault, not a misfortune.
Accustom yourself, and your children, to view it in its right light.
IV. Ask help from God to subdue it, for temper is hard to conquer,
and meekness is a fruit of the Spirit. Gal. v. 22. Matt. v. 5.
You need help, for there is much to provoke a wife, and mother.
You need help, for you are very weak, but you can do all things
through Christ who strengtheneth you. Phil. iv. 13.
XV. THE WEARY MOTHER.
Many things below make a mother weary.
The blessing of rest is chiefly future.
Notice various things that often make mothers weary, and the
remedy for them.
Cause. Remedy.
I. Weary with cares and sorrows—
ready to exclaim, ‘My burden is greater
than I can bear.’
I. Do not carry your burden
alone. Ps. lv. 22.
1 Pet. v. 7. Jer. xxxi.
25.
Hereafter rest.
Psa. xciv. 13. Isa. xiv.
3.
II. Weary with work. II. Make more use of the
rest of the Sabbath.
Exod. xx. 8.
Called ‘Sabbath of rest.’
Lev. xxiii. 3.
Hereafter. Heb. iv. 9.
III. Weary with sickness.
Job, vii. 3, 4. Isa. xxxviii. 12, 14.
May be your own, your husband’s,
your children’s.
III. Comfort in time of
sickness. Ps. xli. 3.
Great alleviation in true
spirit of submission.
Wearisome nights of pain, or
watching.
Hereafter. Isa. xxxiii.
24. Rev. xxi. 4.
IV. Weary of your sins.
Ps. vi. 6; xxxviii. 4.
Oft repented.
Oft repeated.
IV. Come with your sins to
Christ.
Matt. xi. 28, 29.
Hereafter. Rev. xxi. 27.
V. Weary with your children’s sins. V. Correct, and they shall
give you rest. Prov. xxix.
17.
Consider Christ, lest ye
be weary. Heb. xii. 3.
Do you know where to go for rest? Jer. vi. 16. Or are you
wandering hither and thither in vain, having forgotten your resting-
place? Jer. l. 6. Remember, it is only to those who are in Christ that
these promises of rest apply.
It is only His own sheep who can say, ‘He maketh me to lie down in
green pastures.’
To others there is no rest here, or hereafter, for, ‘The wicked are like
the troubled sea, when it cannot rest. . . . There is no peace, saith
my God, to the wicked.’ Isa. lvii. 20, 21.
XVI. THE CARELESS MOTHER.
Isa. xxxii. 9–13.
Motherless children are often uncared for. No one ‘naturally cares
for their state.’ No child with a mother ought to be so. But too
often mothers are careless about—
I. Their minds.
No schooling—no teaching—no training—no Sunday School.
Cares not whether in time, or too late—regular or truant, &c.,
&c.
II. Their respectability, and associates.
Will take in bad lodgers, hire bad characters to help at the
wash-tub because they can be had cheaper than the
respectable, forgetting that ‘a good name is rather to be chosen
than great riches.’ Prov. xxii. 1. Eccles. vii. 1.
What guilty carelessness!
III. Their happiness.
What misery here awaits a neglected child!
What woe hereafter!
IV. Their souls.
To a parent guilty of this carelessness, it is said, ‘His blood will I
require at thine hand.’ Ezek. iii. 18, 19; xxxiii. 6.
Have you ever lost a child, for whose soul you never cared?
Pray Ps. li. 14.
This arises from want of real religion.
You do not know the immense value of a soul.
Would you be thus careless of an earthly treasure? Would you
not watch it—lock it up—guard it with a jealous eye? Your
child’s soul a treasure passing all price. Yet you allow Satan to
steal it—bad companions to corrupt it—ruin it yourself by
neglect. A thing neglected is ruined.
Keep in view the judgment day.
Will your child then say, ‘No man cared for my soul’—‘even my
mother cared not that I perished!’
XVII. THE CAREFUL MOTHER.
I. Careful in her house.
No waste. Prov. xviii. 9. John, vi. 12.
Yet not stingy. No needless expense—makes a little go a long
way.
II. Careful over her children.
Their bodies—health—clothes—future. 1 Tim. v. 8. 2 Cor. xii.
14.
Provident Club. Penny Bank, &c.
Their minds. Gives education suitable to their station. No
fortune so good.
What a disgrace in these days to a mother, if a child cannot read
and write!
Their souls. Above all, let not care for the body choke this.
Mark, iv. 19.
Lay up treasure in heaven. Matt. vi. 20.
III. Let not careful mother be too full of care.
Not overcharged. Luke, xxi. 34; x. 41, 42.
‘Live not in careful suspense.’ Luke, xii. 29 (margin).
Cast your care on One who can bear it. 1 Pet. v. 7. Phil. iv. 6.
He will not despise it, ‘for He careth for you.’
For the future, take this for your motto when over-pressed by
cares and trials, ‘The Lord will provide.’ Gen. xxii, 14. Philip, iv.
19. Ps. xxiii. 1.
XVIII. THE PATIENT MOTHER.
A mother has, in a peculiar degree, ‘need of patience.’ Heb. x. 36.
I. In trials of temper. 1 Cor. xiii. 4, 5, 7. Prov. xiv. 17.
II. With your children’s faults.
Matt. xviii. 22, 35.
Look back to the days of your childhood.
Were not you equally trying to your mother?
Remember your own faults, and God’s patience with you. He
bears long with you.
III. It may be you need patience in bearing with unjust tempers,
and unkind treatment. 1 Pet. ii. 19, 23. Ps. xxxvii. 7.
IV. For answers to prayer.
Syro-Phenician mother. Matt. xv. 22, 28. Jam. v. 7, 8. ‘Tarry
thou the Lord’s leisure.’
V. In tribulation, sickness, and poverty. Rom. xii. 12. Jam. v. 10,
11. Luke, xxi. 19.
XIX. THE FIRM MOTHER.
I. To obey is a child’s duty.
Exod. xx. 12. Eph. vi. 1. Col. iii. 20.
II. This obedience should be—
1. Implicit.
2. Unquestioning.
3. Immediate.
4. In manner, and spirit.
5. From love.
6. In absence, as well as presence.
7. To the mother as well as the father.
Prov. i. 8; vi. 20; xv. 20. Lev. xix. 3. e.g. Luke, ii. 51.
This is most important. In the Bible no difference is drawn
between the authority of the father and mother.
III. A promise attached to obedience.
Exod. xx. 12. Eph. vi. 2. Jer. xxxv. 18, 19.
IV. To disobey is sin.
Deut. xxi. 18, 21. Ezek. xxii. 7. Rom. i. 30. 2 Tim. iii. 2. 1
Sam. ii. 25.
V. A punishment attached to disobedience.
Deut. xxvii. 16. Prov. xxx. 17.
VI. It is a parent’s duty to enforce obedience. Allowed disobedience
brings misery into the home. 1 Tim. iii. 4; v. 4.
Eli. 1 Sam. ii. 23.
David. 1 Kings, i. 6.
How solemn then, Mothers, is your responsibility.
How earnest should be your prayers that your commands may agree
with God’s. Gen. xviii. 19. Deut. xxxii. 46. Eph. vi. 1.
Seek for wisdom in commanding.
Firmness in insisting.
XX. CONVERSION.
We meet time after time at our Mothers’ Meeting, but how few of us
are truly converted, and changed in heart.
Ask yourselves this night two questions.
I. Do you earnestly seek your own conversion? ‘What shall it profit
you, if you gain the whole world, and lose your own soul?’
Mark, viii. 36, 37.
Delay not. Isa. lix. 1.
II. Do you earnestly seek for the conversion of your children?##
1. Perhaps you do not care for it. You do not seek first for them the
kingdom of God. Matt. vi. 33. Be honest to yourselves in this
matter. Are you ready to give up for them anything that keeps them
from Christ?
Matt. v. 29, 30.
2. Perhaps you do not pray for it.
Observe how the mother prayed. Matt. xv. 22, 28. David. 1
Chron. xxix. 19. Job, i. 5.
3. Perhaps you place hindrances in the way.
You draw them to the world instead of to Christ. Matt. xviii. 6.
4. Perhaps you forget the necessity of the Holy Spirit’s power. Isa.
xliv. 3, 4, 5.
Pray this night for the outpouring of the Holy Spirit upon
yourselves—your husbands—your children. Matt. vii. 11.
Remember, ‘except ye be converted, and become as little
children, ye shall not enter into the kingdom of heaven.’ Matt.
xviii. 3.
XXI. THOU, GOD, SEEST ME.
God’s penetrating eye. Rev. i 14.
I. He sees all. Prov. v. 21.
Bad and good. Prov. xv. 3.
II. Where does He see you?
1. He sees the mother in secret. Matt. vi. 6.
Each secret prayer—each sigh—each tear.
No privacy from Him. Eccles. xii. 14. Ps. xix. 12. Jer. xxiii. 24.
Many would give worlds to hide from God.
2. In her daily path. Job, xxxiv. 21. Ps. cxxxix. 3.
3. In every circumstance. 2 Chron. xvi. 9.
III. What does He see?
1. The mother’s heart. Jer. xx. 12. 1 Sam. xvi. 7. Her motives—
desires—yearnings.
You may deceive others. You may even deceive yourselves, ‘but
all things are naked, and opened unto the eyes of Him with
whom we have to do.’ Heb. iv. 13. Luke, xvi. 15.
2. The mother’s sins. Ps. xix. 12; xc. 8. Isa. lvii. 18. Amos, v. 12.
Sins of omission and commission.
3. The mother’s sorrows. Exod. iii. 7.
Both inward and outward trials. 2 Kings, xx. 5. Ps. cxlii. 3.
Acts, vii. 34.
There are many sorrows it is not well for a wife and mother to
speak of to others, but take comfort! Your Saviour knows each
grief—each trouble—each tear for your own sins or the sins of
others.
4. The mother’s need. Matt. vi. 8, 32.
And He promises to supply it. Ps. xxiii. 1. Philip, iv. 19.
XXII. JESUS THE MOTHER’S
FRIEND.
I. Mothers need a friend!
In joy and in sorrow, in dark hours and in light, in life and in
death, they need a Friend who is always the same—even ‘the
same yesterday, to-day, and for ever.’
II. You may have such a Friend.
1. Even Jesus. Prov. xviii. 24. John, xv. 15. The Friend of
sinners. Matt. xi. 19.
2. He loveth always. Prov. xvii. 17.
3. He is faithful. Prov. xviii. 24. John, xiii. 1.
III. Is He your Friend?
Can you point to Jesus and say, ‘This is my Beloved, and this is
my Friend?’ Cant. v. 16.
If not, do not rest until you can say so.
IV. If Jesus is your Friend.
1. Go to Him in trouble. ‘Pour out your heart before Him.’ John, xi.
3, 11.
In sorrow lean on His bosom, as John did. John, xiii. 23.
‘He weeps with those who weep.’
2. Go to Him in joy, for He ‘rejoices with those who do rejoice.’
3. Do not have hard thoughts of Him because He afflicts.
‘Faithful are the wounds of a friend.’ Prov. xxvii. 6. Ps. cxli. 5.
He sympathises in every sorrow. Heb. iv. 15.
And has borne your griefs. Isa. liii. 4.
XXIII. HELPS FOR MOTHERS.
1.
A mother has many hindrances in seeking Christ. She needs much
help from the means of grace. To obtain this is often difficult, and
requires much effort. Outward means are, therefore, too often
neglected. If you would grow in grace this must not be.
Be diligent, therefore, in the use of—
I. Daily prayer. Matt. vi. 6, 11.
No business should prevent this. David had the business of a
kingdom upon him, nevertheless, he says, ‘Evening, and
morning, and at noon, will I pray.’ Ps. lv. 17.
II. Daily Scripture reading. Acts, xvii. 11. Ps. cxix. 103.
III. Family prayer.
Judgment pronounced on those who neglect family religion. Jer.
x. 25.
Promise to united prayer. Matt. xviii. 19, 20.
IV. Attendance on the public means of grace.
Observe the command. Deut. xii. 12, 18. Heb. x. 25.
What a blessing rested on it in the case of Lydia. Acts, xvi. 13,
15.
There are great difficulties to the mother of a young family in
going to Church on Sunday, but make an effort to overcome
them. This can generally be done if husband and wife make a
united effort.
If you are truly hungering and thirsting after righteousness, you
will earnestly use every means for obtaining the bread and the
water of life. If you are careless in this respect, it is because
there is no real hunger, no craving of soul for heavenly food.
XXIV. HELPS FOR MOTHERS.
2.
We will notice this evening three more things which are, or ought to
be, ‘helps’ to mothers on the heavenly race.
I. Husbands and wives should be mutual helps, (see Marriage
Service) ‘for the mutual help and comfort the one of the other.’
Gen. ii. 18. 1 Pet. iii. 7. Eph. v. 28, 29.
Fellow-pilgrims, fellow-sufferers, fellow-travellers they must be;
but what an unspeakable joy is it when they are also fellow-
helpers, fellow-labourers, fellow-heirs, fellow-citizens!
‘O happy house, where man and wife are one,
Thro’ love of Thee, in spirit, heart, and mind;
Together joined by holy bands, which none,
Not death itself, can sever or unbind;
Where both on thee unfailingly depend,
In weal and woe, in good and evil days,
And hope with Thee eternity to spend;
In sweet communion and eternal praise.’
II. Christian friends.
2 Cor. i. 24. Rom. xvi. 3.
What comfort and help may be derived from the visits, counsels,
and sympathy of a Christian neighbour, a kind and devoted
district visitor, or minister.
Especially may Christian friends help each other by prayer. 2
Cor. i. 11. Jam. v. 16, 18. Matt. xviii. 19.
How valuable is a Prayer Union, such as we have connected
with our Mothers’ Meeting.
III. But lastly remember that these ‘helps’ are worth nothing unless
you have the Lord for your Helper. Ps. liv. 4. Heb. xiii. 6. Exod.
xviii. 4.
He is different to any earthly helper, for He is a Helper at all
times, and in all circumstances.
In trouble. Ps. xlvi. 1.
To the widow. Ps. lxviii. 5.
To the fatherless. Ps. x. 14.
Take, therefore, this short prayer and use it in your daily life,
‘Lord, be Thou my helper.’ Lift up this prayer in the midst of
your work—of temptation—of trial, and you will be enabled to
add, ‘My heart trusted in Him, and I am helped!’ Ps. xxviii. 7.
XXV. TEACH YOUR CHILDREN.
A mother may not have much time for instruction, or be very
capable of teaching, but she should make it her daily duty to give
her children some instruction in the Scriptures. She may know but
little herself, but let not this discourage her; for in watering others
she shall herself be watered. Prov. xi. 25.
I. Teach, seeking the help of the Holy Spirit. Isa. liv. 13. John, xvi.
13. Luke, xii. 12. Job, xxxvi. 22. Ps. xciv. 12.
II. Teach in the spirit of prayer.
Eph. vi. 18, 19.
Remembering these words, ‘Without Me ye can do nothing.’
John, xv. 5.
III. Teach, leaning on the promise.
Isa. lv. 10, 11. Eccles. xi. 1, 6.
IV. Teach, expecting a result.
Ps. cxxvi. 6. Prov. xxii. 6. Gen. xviii. 19. 2 Tim. i. 5; iii. 15.
XXVI. THE PARTING PLACE, AND
THE MEETING PLACE.
The following circumstance took place not long after the last
meeting. Two mothers, who were both present at the Class, about a
fortnight after met in the Cemetery, sorrowing at their children’s
graves. Each had during that interval lost a child, but not having
heard of each other’s trouble, the meeting was unexpected.
On this occasion the following subject was taken.
I. The parting place—the child’s death-bed. This is,
1. A parting place.
All must die alone. The mother may have watched over her
child with untiring care during its years of infancy, the trials of
youth, and the snares and cares of riper years, but here they
must part. 2 Sam. xii. 15, 23.
2. A weeping place. Gen. xxi. 16.
2 Sam. xii. 21. Jer. xxxi. 15.
Mark, v. 38. Luke, vii. 13. Not wrong, for Jesus wept at the
grave of Lazarus. John, xi. 35.
3. A birth place
To a new and heavenly life. But not so to all. To some, namely,
to those who have indeed been born again. Luke, xvi. 22; and
to babes. Isa. xl. 11.
Contrast David’s sorrow for his infant, (2 Sam. xii. 23) with his
sorrow for Absalom, 2 Sam. xix. 4. To one death was the door
of life, to the other of death.
II. The meeting place—the judgment-seat. Rev. xx. 12. Rom. xiv.
10.
You cannot avoid it.
It will be.
1. To all a place of recognition.
The child you led to Christ—the child you led astray. The child
you trained for heaven—the child you trained for hell. All will be
there.
2. To many a place of weeping. Matt. xxv. 30. Luke, vi. 25.
3. To many a place of rejoicing. Matt. xxv. 34.
Believing mother! Your night of weeping will then be over, your
morning of joy will dawn, of which the sun will never set! Ps.
xxx. 5.
Which will it be to you—a meeting-place of joy or sorrow?
May you and your children be so united in Christ here, that you
may both part and meet in peace!
XXVII. THE MOTHER’S DEATH-BED.
On the occasion of the death of a young mother, which took place
not long after the first meeting in the new year.
I. How near it may be. 1 Sam. xx. 3. Job, xxi. 13.
In the midst of life we are in death.
We have had a solemn lesson. Almost the youngest in our class
cut down the first.
II. The hour of death is an hour
1. Of deep solemnity.
It is a dark valley. Ps. xxiii. 4. Job. x. 21.
2. Of much regret.
Conscience awake, looks back on duties undone—things done—
words spoken—words unsaid, &c.
3. Often of great suffering. Ps. cxvi. 3.
Not the time to begin to seek the Lord.
4. Of parting. Philip, i. 23, 24.
Must die alone. Must leave husband and children. They may go
with you to the edge of the river, but no further.
5. Of weeping. Gen. xxxv. 18; xxiii. 2. John, xi. 31. 2 Sam. xix. 4.
6. It is an hour when Christ, and Christ alone, can save you.
Thus we pray, ‘In the hour of death, and in the day of
judgment, Good Lord, deliver us.’
His rod and staff alone can help you. Ps. xxiii. 4.
He alone can take away the sting from death. 1 Cor. xv. 55, 57.
Rom. viii. 38, 39. Isa. xliii. 2.
It is only if washed in His blood, and clothed in His
righteousness, that you need not fear to appear before God.
XXVIII. NEW YEAR’S DAY.
‘I must work the work of Him that sent me while it is day: the
night cometh, when no man can work.’—John, ix. 4.
Time past—is gone, thou canst not it recall.
Time is—thou hast, improve the portion small.
Time future—is not, and may never be.
Time present—is the only time for thee!
Therefore,
I. Hear to-day. (Ps. xcv. 7.) ‘See that ye refuse not Him that
speaketh.’
Exhort to-day your children. (Heb. iii. 13.)
Work to-day (John, ix. 4) for your children’s souls.
Never postpone. Jam. iv. 13. 2 Cor. vi. 2.
Now it is high time to wake out of sleep. Rom. xiii. 11.
II. Because the night cometh when no man can work. John, ix. 4.
The night of your death—your husband’s death—your children’s
death.
Perhaps this sentence has gone forth against you, or yours,
‘This year thou shalt die.’ Jer. xxviii. 16.
Luke, xii. 20; xiii. 7.
Mothers, awake! to your own, and your children’s danger.
Awake to the importance of safety in Christ.
Mothers, work! for yourselves, for your families.
‘Labour not for the meat which perisheth, but for that meat
which endureth unto everlasting life.’ John, vi. 27.
Welcome to our website – the perfect destination for book lovers and
knowledge seekers. We believe that every book holds a new world,
offering opportunities for learning, discovery, and personal growth.
That’s why we are dedicated to bringing you a diverse collection of
books, ranging from classic literature and specialized publications to
self-development guides and children's books.
More than just a book-buying platform, we strive to be a bridge
connecting you with timeless cultural and intellectual values. With an
elegant, user-friendly interface and a smart search system, you can
quickly find the books that best suit your interests. Additionally,
our special promotions and home delivery services help you save time
and fully enjoy the joy of reading.
Join us on a journey of knowledge exploration, passion nurturing, and
personal growth every day!
testbankfan.com

More Related Content

PDF
Essentials of MIS 12th Edition Laudon Solutions Manual
PDF
Essentials of MIS 12th Edition Laudon Solutions Manual
PDF
Essentials of MIS 12th Edition Laudon Solutions Manual
PDF
Essentials of MIS 12th Edition Laudon Solutions Manual
PDF
Essentials of MIS 12th Edition Laudon Solutions Manual
PDF
Essentials of MIS 12th Edition Laudon Solutions Manual
PDF
Essentials of MIS 12th Edition Laudon Solutions Manual
PDF
Essentials of MIS 12th Edition Laudon Solutions Manual
Essentials of MIS 12th Edition Laudon Solutions Manual
Essentials of MIS 12th Edition Laudon Solutions Manual
Essentials of MIS 12th Edition Laudon Solutions Manual
Essentials of MIS 12th Edition Laudon Solutions Manual
Essentials of MIS 12th Edition Laudon Solutions Manual
Essentials of MIS 12th Edition Laudon Solutions Manual
Essentials of MIS 12th Edition Laudon Solutions Manual
Essentials of MIS 12th Edition Laudon Solutions Manual

Similar to Essentials of MIS 12th Edition Laudon Solutions Manual (20)

PDF
Management Information Systems 12th Edition Laudon Solutions Manual
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems 12th Edition Laudon Solutions Manual
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems 12th Edition Laudon Solutions Manual
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems 12th Edition Laudon Solutions Manual
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems 12th Edition Laudon Solutions Manual
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems 12th Edition Laudon Solutions Manual
PDF
Management Information Systems 12th Edition Laudon Solutions Manual
Management Information Systems 12th Edition Laudon Solutions Manual
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems 12th Edition Laudon Solutions Manual
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems 12th Edition Laudon Solutions Manual
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems 12th Edition Laudon Solutions Manual
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems 12th Edition Laudon Solutions Manual
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems 12th Edition Laudon Solutions Manual
Management Information Systems 12th Edition Laudon Solutions Manual
Ad

Recently uploaded (20)

PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
Hazard Identification & Risk Assessment .pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Cell Types and Its function , kingdom of life
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
RMMM.pdf make it easy to upload and study
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
Trump Administration's workforce development strategy
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Hazard Identification & Risk Assessment .pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Chinmaya Tiranga quiz Grand Finale.pdf
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
A systematic review of self-coping strategies used by university students to ...
Weekly quiz Compilation Jan -July 25.pdf
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Computing-Curriculum for Schools in Ghana
Cell Types and Its function , kingdom of life
LDMMIA Reiki Yoga Finals Review Spring Summer
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
RMMM.pdf make it easy to upload and study
What if we spent less time fighting change, and more time building what’s rig...
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Trump Administration's workforce development strategy
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Ad

Essentials of MIS 12th Edition Laudon Solutions Manual

  • 1. Download the full version and explore a variety of test banks or solution manuals at https://testbankfan.com Essentials of MIS 12th Edition Laudon Solutions Manual _____ Follow the link below to get your download now _____ https://testbankfan.com/product/essentials-of-mis-12th- edition-laudon-solutions-manual/ Access testbankfan.com now to download high-quality test banks or solution manuals
  • 2. We have selected some products that you may be interested in Click the link to download now or visit testbankfan.com for more options!. Essentials of MIS 12th Edition Laudon Test Bank https://testbankfan.com/product/essentials-of-mis-12th-edition-laudon- test-bank/ Essentials of MIS 10th Edition Laudon Solutions Manual https://testbankfan.com/product/essentials-of-mis-10th-edition-laudon- solutions-manual/ Essentials of MIS 13th Edition laudon Solutions Manual https://testbankfan.com/product/essentials-of-mis-13th-edition-laudon- solutions-manual/ Managerial Accounting for Managers 3rd Edition Noreen Solutions Manual https://testbankfan.com/product/managerial-accounting-for- managers-3rd-edition-noreen-solutions-manual/
  • 3. Employment Relations An Integrated Approach 1st Edition mcphail Solutions Manual https://testbankfan.com/product/employment-relations-an-integrated- approach-1st-edition-mcphail-solutions-manual/ Statistics for Business Decision Making and Analysis 2nd Edition Stine Test Bank https://testbankfan.com/product/statistics-for-business-decision- making-and-analysis-2nd-edition-stine-test-bank/ Radiographic Imaging and Exposure 5th Edition Fauber Test Bank https://testbankfan.com/product/radiographic-imaging-and-exposure-5th- edition-fauber-test-bank/ International Business Competing in the Global Marketplace 10th Edition Hill Test Bank https://testbankfan.com/product/international-business-competing-in- the-global-marketplace-10th-edition-hill-test-bank/ Fundamentals of Financial Accounting 4th Edition Phillips Test Bank https://testbankfan.com/product/fundamentals-of-financial- accounting-4th-edition-phillips-test-bank/
  • 4. Information Technology Project Management Revised 6th Edition Schwalbe Test Bank https://testbankfan.com/product/information-technology-project- management-revised-6th-edition-schwalbe-test-bank/
  • 5. Copyright © 2017 Pearson Education, Inc. 1 Chapter 7 Telecommunications, the Internet, and Wireless Technology Learning Objectives 7-1 What are the principal components of telecommunications networks and key networking technologies? 7-2 What are the different types of networks? 7-3 How do the Internet and Internet technology work and how do they support communication and e-business? 7-4 What are the principal technologies and standards for wireless networking, communication, and Internet access? Learning Catalytics is a “bring your own device” student engagement, assessment, and classroom intelligence system. It allows instructors to engage students in class with real-time diagnostics. Students can use any modern, web-enabled device (smartphone, tablet, or laptop) to access it. For more information on using Learning Catalytics in your course, contact your Pearson Representative. Chapter Outline 7-1 What are the principal components of telecommunications networks and key networking technologies? Networking and Communication Trends What is a Computer Network? Key Digital Networking Technologies 7-2 What are the different types of networks? Signals: Digital vs. Analog Types of Networks Transmission Media and Transmission Speed 7-3 How do the Internet and Internet technology work and how do they support communication and e-business? What is the Internet? Internet Addressing and Architecture Internet Services and Communication Tools The Web 7-4 What are the principal technologies and standards for wireless networking, communication, and Internet access? Cellular Systems Wireless Computer Networks and Internet Access RFID and Wireless Sensor Networks
  • 6. Copyright © 2017 Pearson Education, Inc. 2 Key Terms The following alphabetical list identifies the key terms discussed in this chapter. The page number for each key term is provided. 3G networks, 254 Personal-area networks (PANs), 254 4G networks, 254 Predictive search, 249 Bandwidth, 236 Protocol, 233 Blog, 251 Radio frequency identification (RFID), 256 Blogosphere, 252 Router, 231 Bluetooth, 254 RSS, 252 Broadband, 230 Search engines, 247 Cable Internet connections, 237 Search engine marketing, 250 Chat, 242 Semantic search, 248 Digital subscriber line (DSL), 237 Shopping bots, 250 Domain name, 238 Smart phones, 253 Domain name systems (DNS), 238 Social networking, 252 E-mail, 242 Social search, 249 File Transfer Protocol (FTP), 242 Software-defined networking, 231 Hertz, 236 Switch, 231 Hotspots, 256 T1 lines, 237 Hubs, 231 Telnet, 242 Hypertext Transfer Protocol (HTTP), 247 Search engine optimization (SEO), 251 Instant messaging, 242 Transmission Control Protocol/Internet Protocol (TCP/IP), 233 Internet of Things, 253 Unified communications, 245 Internet Protocol (IP) address, 237 Uniform resource locator (URL), 247 Internet service provider (ISP), 236 Virtual private network (VPN), 246 Internet2, 241 Visual Web, 250 IPv6, 241 Voice over IP (VoIP), 243 Local-area network (LAN), 235 Web 2.0, 251 Metropolitan-area network (MAN), 236 Web 3.0, 253 Microblogging, 252 Web site, 2246 Modem, 234 Wide-area networks (WAN), 236 Network operating system (NOS), 230 Wi-Fi, 255 Packet switching, 232 Wiki, 252 Peer-to-peer, 235 WiMax, 256 Wireless sensor networks (WSNs), 258
  • 7. Copyright © 2017 Pearson Education, Inc. 3 Teaching Suggestions Chapter 7 presents crucial concepts and terminology since telecommunications, networks, and the Internet are now introducing fundamental changes in businesses. The opening case, “Wireless Technology makes Dundee Precious Metals Good as Gold,” illustrates some of the new capabilities and opportunities provided by contemporary networking technology. Dundee implemented an underground wireless Wi-Fi network that allows electronic devices to exchange data wirelessly to monitor the location of equipment, people, and ore throughout the mine’s tunnels and facilities. The company also uses Wi-Fi radio frequency identification (RFID) technology to track workers, equipment, and vehicles in underground gold mines. Dundee has decreased equipment downtime and utilizes its resources more efficiently. It uses data from the underground wireless network in its mine management software and mobile planning software. Now the company can more closely account for its mine workers, making them more safe and the workers can communicate more closely with the mine’s control room. Control room staff can actually see the location of machinery and direct traffic more effectively, quickly identify problems and respond more rapidly to emergencies. The opening vignette provides an example of how businesses are adapting to new technologies based on the Internet. It shows how companies must continually evolve as technology improves. Section 7-1, “What are the principal components of telecommunications networks and key networking technologies?” Telecommunications and networks are vital to the majority of businesses today, and this section explains why. Because telecommunications technology serves as the foundation for electronic commerce and the digital economy, the concepts and terminology in Chapter 7 are important for both MIS and business majors. This section explains the basic configuration of networks, regardless of their size. You may want to contrast the origin and history of telephone networks and computer networks. Then diagram how the two are converging into one pipeline for all types of communication transmissions. Convergence is leading to more efficient transmission traffic and ubiquitous communications thanks to the Internet. A contemporary corporate network infrastructure relies on both public and private infrastructures to support the movement of information across diverse technological platforms. It includes the traditional telephone system, mobile cellular communications, wireless local area networks, videoconferencing systems, a corporate website, intranets, extranets, and an array of local and wide area networks, including the Internet. Contemporary networks have been shaped by the rise of client/server computing, the use of packet switching, and the adoption of TCP/IP as a universal communications standard for linking disparate networks and computers. Client/server networks have distributed much of the organization’s computing power to the desktop and factory floor. Packet switching makes more
  • 8. Copyright © 2017 Pearson Education, Inc. 4 efficient use of network communications capacity by breaking messages into small packets that are sent independently along different paths in a network and then reassembled at their destination. Protocols provide a common set of rules that enable communication among diverse components in a telecommunications network. TCP/IP is a suite of protocols that has become the dominant model of achieving connectivity among different networks and computers. It is the connectivity model used in the Internet. One exercise you may try to help show how much we rely on communications today is to ask students to count the number of text messages, phone calls, e-mails, and IM messages they either sent or received in the last 24 hours or the last week. You could even go so far as to ask them to not send or receive any of these communications for a day to prove how reliant we’ve become on telecommunications. Section 7-2, “What are the different types of networks?” It may help for you to bring several props to show the different transmission media explained in this section. For example, bring twisted wire, coaxial cable, and fiber-optic cable to show to the class and discuss the advantages and disadvantages of each type of media. Students should note the different ranges (frequencies) of wireless media. Also, you should discuss bandwidth and its connection to frequencies, as this is a critical concept today. Table 7.1 compares the range of four different area networks. This section describes the different network topologies and how they pass data across a network. If you have students working in business, ask them to identify the network topologies used in their organizations. Section 7-3, “How do the Internet and Internet technology work and how do they support communication and e-business?” Most students are familiar with the Internet and motivated to discuss it. You might begin this section by asking students how they spend their time on the Internet and how their online activities have changed since they started using the Internet. Also, ask them to identify which client platforms they currently use or have used. Ask your students to identify several of the many benefits that the Internet offers to organizations. Ask them to provide specific examples that they have read about in the text or have personally observed. The principal Internet services and communication tools are e-mail, chatting, instant messaging, newsgroups, telnet, file transfer protocol, and the web. Most students will probably be familiar with these services, having used them in their personal life. What they may not understand or relate to quite yet is how effective the tools are in a business setting. These tools reduce time and cost when firms must manage organizational activities and communicate with many employees. If you have students working in businesses, ask them to discuss the communications tools their organization uses. This section introduces a fairly new concept of unified communications. It also compares Web 2.0 with Web 3.0 that is now in the conceptual stage. Make students aware that while the new information technology infrastructure provides many benefits and capabilities, it does require careful management and planning. Challenges posed by networking and the Internet include loss of management control over information systems; the need for organizational change; and the difficulty of ensuring infrastructure scalability and reliability.
  • 9. Copyright © 2017 Pearson Education, Inc. 5 Interactive Session: Organizations: The Battle over Net Neutrality Case Study Questions 1. What is network neutrality? Why has the Internet operated under net neutrality up to this point in time? Network neutrality is the idea that Internet service providers must allow customers equal access to content and applications, regardless of the source or nature of the content. Presently the Internet is indeed neutral: all Internet traffic is treated equally on a first-come, first-serve basis by Internet backbone owners. The Internet is neutral because it was built on phone lines, which are subject to ‘common carriage’ laws. These laws require phone companies to treat all calls and customers equally. They cannot offer extra benefits to customers willing to pay higher premiums for faster or clearer calls, a model known as tiered service. 2. Who’s in favor of network neutrality? Who’s opposed? Why? Those in favor of network neutrality include organizations like MoveOn.org, the Christian Coalition, the American Library Association, every major consumer group, many bloggers and small businesses, and some large Internet companies like Google and Amazon. Verizon and Google proposed a split proposition – enforce net neutrality on wired connections, but not on wireless networks. Some members of the U.S. Congress also support network neutrality. This group argues that the risk of censorship increases when network operators can selectively block or slow access to certain content. Others are concerned about the effect of slower transmission rates on their business models if users can’t download or access content in a speedy fashion. Those who oppose network neutrality include telecommunications and cable companies who want to be able to charge differentiated prices based on the amount of bandwidth consumed by content being delivered over the Internet. Some companies report that five percent of their customers use about half the capacity on local lines without paying any more than low-usage customers. They state that metered pricing is “the fairest way” to finance necessary investments in its network infrastructure. Internet service providers point to the upsurge in piracy of copyrighted materials over the Internet as a reason to oppose network neutrality. Comcast reported that illegal file sharing of copyrighted material was consuming 50 percent of its network capacity. The company posits that if network transmission rates were slower for this type of content, users would be less likely to download or access it. Those who oppose network neutrality argue that it removes the incentive for network providers to innovate, provide new capabilities, and upgrade to new technology. 3. What would be the impact on individual users, businesses, and government if Internet providers switched to a tiered service model for transmission over landlines as well as wireless? Proponents of net neutrality argue that a neutral Internet encourages everyone to innovate without permission from the phone and cable companies or other authorities. A more level
  • 10. Copyright © 2017 Pearson Education, Inc. 6 playing field spawns countless new businesses. Allowing unrestricted information flow becomes essential to free markets and democracy as commerce and society increasingly move online. Heavy users of network bandwidth would pay higher prices without necessarily experiencing better service. Even those who use less bandwidth could run into the same situation. Network owners believe regulation like the bills proposed by net neutrality advocates will impede U.S. competitiveness by stifling innovation and hurt customers who will benefit from ‘discriminatory’ network practices. U.S. Internet service already lags behind other nations in overall speed, cost, and quality of service, adding credibility to the providers’ arguments. Obviously, by increasing the cost of heavy users of network bandwidth, telecommunication and cable companies and Internet service providers stand to increase their profit margins. 4. It has been said that net neutrality is the most important issue facing the Internet since the advent of the Internet. Discuss the implications of this statement. Under current conditions, the Internet is neutral; all Internet traffic is treated equally on a first- come, first-served basis by Internet backbone owners. Proponents of net neutrality say that changing anything would disrupt normal service for users and begin a trend of discrimination based on the types of Internet usage. Network owners believe regulation to enforce net neutrality will impede U.S. competitiveness by discouraging capital expenditure for new networks and curbing their networks’ ability to cope with the exploding demand for Internet and wireless traffic. Internet service providers (ISPs) assert that network congestion is a serious problem and that expanding their networks would require passing on burdensome costs to consumers. These companies believe differential pricing methods, which include data caps and metered use— charging based on the amount of bandwidth consumed—are the fairest way to finance necessary investments in their network infrastructures. 5. Are you in favor of legislation enforcing network neutrality? Why or why not? Student answers will vary. Some components and principles to consider in answering this question include: • Price differentials: how much more would heavy bandwidth users pay than those who consume less bandwidth? • Speed: how much faster would network transmissions be with a tiered service model? • Stifle innovation: would a tiered service model stifle innovation by charging more for heavy bandwidth use or would it free up bandwidth thus allowing more innovation? • Censorship: would telecommunication and cable companies and Internet service providers increase censorship of content transmitted over networks? • Discrimination by carriers: would the end of network neutrality be the beginning of more discrimination? Interactive Session: People: Monitoring Employees on Networks: Unethical or Good Business?
  • 11. Copyright © 2017 Pearson Education, Inc. 7 Case Study Questions 1. Should managers monitor employee e-mail and Internet usage? Why or why not? Student answers will vary on this question. The case study statistics show that corporate misuse and abuse of e-mail for personal reasons is exploding. Simply stated, employees who use company resources for work not related to the company are, in essence, engaged in “service theft.” They are being paid to work for the company, and this does not include abusing corporate resources for personal time. Companies are in business to generate profits for their shareholders. Managers certainly should be concerned with the loss of time and employee productivity, the additional traffic it creates on their networks that inhibits the efficiency for real business purposes, lost revenue or missed opportunities, as well as overcharging clients because of lost employee efficiencies. The company itself is responsible for the use of its resources and what employees do while using them. Adverse publicity can seriously affect a company and could even result in expensive lawsuits. Companies also fear e-mail leakage of trade secrets. Other legal and regulatory problems involve the safe keeping of all e-mails that are generated on corporate equipment. This information must be retained for specific time periods and may be requested as evidence in a lawsuit. 2. Describe an effective e-mail and web use policy for a company. Like all policies, an effective e-mail and web use policy must be carefully designed and clearly communicated to all persons who use these corporate resources. There are a number of different policies in existence. Some companies allow absolutely no personal use of corporate networks, whereas others allow some degree of activity that is easily monitored. A good policy will detail exactly what type of activity is acceptable and what is not allowed. The policy should clearly articulate sanctions that will be followed for any and all offenses in relation to the policy. Most of all, rules for Internet usage should be tailored to specific business needs and organizational cultures. As an instructor you might wish to show students an example of the University of South Australia’s policy at http://www.unisa.edu.au/policies/policies/corporate/C22.asp 3. Should managers inform employees that their web behavior is being monitored? Or should managers monitor secretly? Why or why not? Opinions will vary according to personal values and workplace experiences. However, most students will probably answer that managers should inform employees that their web behavior is being monitored as a way to foster open communications and trust between both sides. Many consultants believe companies should write corporate policies on employee e-mail and Internet use. The policies should include explicit ground rules that state, by position or level, under what circumstances employees can use company facilities for e-mail, blogging, or web surfing. The policies should also inform employees whether these activities are monitored and explain why. Section 7-4, “What are the principal technologies and standards for wireless networking, communication, and Internet access?” Ask your students how many of them use cellular
  • 12. Copyright © 2017 Pearson Education, Inc. 8 phones, smartphones, wireless laptops, tablet computers, or wireless e-book readers. Most students are excited to demonstrate their “latest devices,” and you may wish to ask one of them to discuss the capabilities of theirs. Ask them to discuss what they like or dislike about the features found on their appliance. If you have the class time, you can ask the campus IT director to discuss the telecommunications technology used on your campus, take a tour of the campus facilities, or invite an IT director from a local company to discuss his company’s telecommunications technology. Ask your students to find out what their university does in order to support mobile wireless communications. Have them investigate applications where Bluetooth, Wi-FI, or hotspot technology is used and how it benefits them. Are they able to use their own personal appliances to connect and utilize these technologies on their campus? Review Questions 7-1 What are the principal components of telecommunications networks and key networking technologies? Describe the features of a simple network and the network infrastructure for a large company. A simple network consists of two or more connected computers. Basic network components include computers, network interfaces, a connection medium, network operating system software, and either a hub or a switch. The networking infrastructure for a large company relies on both public and private infrastructures to support the movement of information across diverse technological platforms. It includes the traditional telephone system, mobile cellular communication, wireless local-area networks, videoconferencing systems, a corporate website, intranets, extranets, and an array of local and wide-area networks, including the Internet. This collection of networks evolved from two fundamentally different types of networks: telephone networks and computer networks. (Learning Objective 1: What are the principal components of telecommunications networks and key networking technologies?, AACSB: Application of knowledge.) Name and describe the principal technologies and trends that have shaped contemporary telecommunications systems. Client/server computing, the use of packet switching, and the development of widely used communications standards such as TCP/IP are the three technologies that have shaped contemporary telecommunications systems. Client/server computing has extended to networking departments, workgroups, factory floors, and other parts of the business that could not be served by a centralized architecture. The Internet is based on client/server computing. Packet switching technology allows nearly full use of almost all available lines and capacity. This was not possible with the traditional dedicated circuit-switching techniques that were used in the past. TCP/IP is a suite of protocols that has become the dominant standard of network communications. Having a set
  • 13. Copyright © 2017 Pearson Education, Inc. 9 of protocols for connecting diverse hardware and software components has provided a universally agreed upon method for data transmission. (Learning Objective 1: What are the principal components of telecommunications networks and key networking technologies?, AACSB: Application of knowledge.) 7-2 What are the different types of networks? Define an analog and a digital signal. Analog: a continuous waveform that passes through a communications medium and has been used for voice communication. Traditionally used by telephone handsets, computer speakers, or earphones. Digital: a discrete, binary waveform, rather than a continuous waveform, represented by strings of two states: one bit and zero bits, which are represented as on-off electrical pulses. Computers use digital signals and require a modem to convert these digital signals into analog signals that are transmitted across telephone lines, cable lines, or wireless media. (Learning Objective 2: What are the different types of networks?, AACSB: Application of knowledge.) Distinguish between a LAN, MAN, and WAN. LAN (Local Area Network): a telecommunications network that is designed to connect personal computers and other digital devices within a half-mile or 500-meter radius. LANs typically connect a few computers in a small office, all the computers in one building, or all the computers in several buildings in close proximity. LANs require their own dedicated channels. MAN (Metropolitan Area Network): a network that spans a metropolitan area, usually a city and its major suburbs. Its geographic scope falls between a WAN and a LAN. WAN (Wide Area Network): spans broad geographical distances – entire regions, states, continents, or the entire globe. The most universal and powerful WAN is the Internet. Computers connect to a WAN through public networks, such as the telephone system or private cable systems, or through leased lines or satellites. (Learning Objective 2: What are the different types of networks?, AACSB: Application of knowledge.) 7-3 How do the Internet and Internet technology work and how do they support communication and e-business? Define the Internet, describe how it works, and explain how it provides business value. The Internet is a vast network of computers that connects millions of people all over the world. The Internet uses the client/server model of computing and the TCP/IP network reference model. Every computer on the Internet is assigned a unique numeric IP address. No one owns the Internet, and it has no formal management organization. However, worldwide Internet policies are established by organizations and government bodies, such as the Internet
  • 14. Copyright © 2017 Pearson Education, Inc. 10 Architecture Board and the World Wide Web Consortium. The Internet must also conform to the laws of the sovereign nation-states in which it operates, as well as the technical infrastructure that exists within the nation-state. The Internet enables employees to gain remote access to the company’s internal systems through its website. They are able to better service customers and suppliers, improve operational efficiency, increase productivity, lower operational costs, have a broader market base, and reach more individual customers on a global scale by establishing a web presence. The cost of email and other Internet services tend to be far lower than equivalent voice, postal, or over night delivery costs, making the Internet a very inexpensive communication medium. It is also a very fast method of communication, with messages arriving anywhere in the world in a matter of seconds or minutes. (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Application of knowledge.) Explain how the Domain Name System (DNS) and IP addressing system work. The Internet is based on the TCP/IP networking protocol suite. Every computer on the Internet is assigned a unique Internet Protocol (IP) address, which currently is a 32-bit number represented by four strings of numbers ranging from 0 to 255 separated by periods. A domain name is the English-like name that corresponds to the unique 32-bit numeric IP address for each computer connected to the Internet. The Domain Name System (DNS) converts IP addresses to domain names so that users only need to specify a domain name to access a computer on the Internet, instead of typing the numeric IP address. DNS servers maintain a database containing IP addresses mapped to their corresponding domain names. When a user sends a message to another user on the Internet, the message is first decomposed into packets using the TCP protocol. Each packet contains its destination address. The packets are then sent from the client to the network server and from there on to as many other servers as necessary to arrive at a specific computer with a known address. At the destination address, the packets are reassembled into the original message. (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e- business?, AACSB: Analytical thinking.) List and describe the principal Internet services. Table 7-2 lists and describes the major Internet services: • Email—person-to-person messaging; document sharing. • Newsgroups—discussion groups on electronic bulletin boards. • Chatting and instant messaging—interactive conversations. • Telnet—logging on to one computer system and doing work on another. • File Transfer Protocol (FTP)—transferring files from computer to computer. • World Wide Web—retrieving, formatting, and displaying information (including text, audio, graphics, and video) using hypertext links.
  • 15. Copyright © 2017 Pearson Education, Inc. 11 (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Application of knowledge.) Define and describe VoIP and virtual private networks and explain how they provide value to businesses. • Voice over Internet Protocol (VoIP) enables Internet technology to be used for telephone voice transmission over the Internet or private networks. VoIP offers the advantage of avoiding tolls charged by local and long-distance telephone networks. VoIP provides businesses an opportunity to reduce costs because they no longer have to maintain separate networks or provide support services and personnel for each different type of network. It gives organizations flexibility because phones can be added or moved to different offices without rewiring or reconfiguring networks. • Virtual private networks are secure, encrypted, private networks that have been configured within a public network to take advantage of the economies of scale and management facilities of large networks, such as the Internet. VPNs are low-cost alternatives to private WANs. VPNs give businesses a more efficient network infrastructure for combining voice and data networks. (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Application of knowledge.) List and describe alternative ways of locating information on the web. • Search engines are a facility on the web that helps you find sites with the information and/or services you want. Examples: Google, Yahoo!, and MSN. • Intelligent agent shopping bots use intelligent agent software for searching the Internet for shopping information. Examples: MySimon and Froogle. • Blogs are informal yet structured websites where subscribing individuals can publish stories, opinions, and links to other websites of interest. • Rich Site Summary or Really Simple Syndication (RSS) is a simple way for people to have content they want pulled from websites and fed automatically to their computers, where it can be stored for later viewing. It’s commonly used with blogs. • Wikis are collaborative websites where visitors can add, delete, or modify content on the site, including the work of previous authors. • Web 2.0 provides second-generation interactive Internet-based services that enable people to collaborate, share information, and create new services online. Web 2.0 software applications run on the web itself instead of the desktop and bring the vision of web-based computing closer to realization. • Web 3.0 (Semantic Web) reduces the amount of human involvement in searching for and processing web information. It’s still in its infancy but promises to establish specific meanings for data on the web, categories for classifying the data, and relationships between classification categories.
  • 16. Copyright © 2017 Pearson Education, Inc. 12 (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Application of knowledge.) Describe how online search technologies are used for marketing. Search engine marketing monetizes the value of the search process. Searching is one of the web’s most popular activities with billions of queries performed each month. Search engines are the foundation for the most lucrative form of online marketing and advertising. When users enter a search term in a search engine, they receive two types of listings: sponsored links, for which advertisers have paid to be listed, and unsponsored organic search results. Advertisers can also purchase small text boxes on the side of search results pages. Paid, sponsored advertisements are the fastest growing form of Internet advertising and are powerful new marketing tools that precisely match consumer interests with advertising messages at the right moment. (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Application of knowledge.) 7-4 What are the principal technologies and standards for wireless networking, communications, and Internet access? Define Bluetooth, Wi-Fi, WiMax, and 3G and 4G networks. Standards for wireless computer networks include Bluetooth (802.15) for small personal-area networks (PANs), Wi-Fi (802.11) for local-area networks (LANs), and WiMax (802.16) for metropolitan-area networks (MANs). Bluetooth can link up to eight devices within a 10- meter area using low-power, radio-based communication and can transmit up to 722 Kbps in the 2.4 GHz band. Wireless phones, keyboards, computers, printers, and PDAs using Bluetooth can communicate with each other and even operate each other without direct user intervention. Wi-Fi is useful for creating wireless LANs and for providing wireless Internet access. Its access range is limited to anywhere between 300 feet and three miles. Hotspots are public access points individuals use to obtain high speed Internet access. WiMax has a wireless access range of up to 31 miles and a data transfer rate of up to 75 Mbps, making it suitable for providing broadband Internet access in areas lacking DSL and cable lines. The 802.16 specification also has robust security and quality-of-service features to support voice and video. 3G is a short term for third-generation wireless technology, especially mobile communications. Cellular networks have evolved from slow-speed (1G) analog networks to high-speed, high-bandwidth, digital packet-switched, third-generation (3G) networks with speeds ranging from 144 Kbps to more than 2 Mbps for data transmission. 4G is a short term for fourth-generation wireless technology. It is entirely packet-switched and capable of 100 Mbps transmission speed (which can reach 1 Gbps under optimal
  • 17. Copyright © 2017 Pearson Education, Inc. 13 conditions), with premium quality and high security. Voice, data, and high-quality streaming video are available to users anywhere, anytime. (Learning Objective 4: What are the principal technologies and standards for wireless networking, communications, and Internet access?, AACSB: Application of knowledge.) Describe the capabilities of each and for which types of applications each is best suited. • Bluetooth: Access very limited; useful for creating small personal-area networks. • Wi-Fi: Access is limited to 30–50 meters; useful for creating small local area networks. • WiMax: Access is limited to a range up to 31 miles: useful for creating wide area networks. • 3G networks: Access is available on major cellular telephone carriers that have configured their networks for 3G services. • 4G networks: Provides premium quality for voice, data, and streaming video from cellular telephone carriers. (Learning Objective 4: What are the principal technologies and standards for wireless networking, communications, and Internet access?, AACSB: Application of knowledge.) Define RFID, explain how it works, and describe how it provides value to businesses. Mobile wireless technology facilitates supply chain management by capturing data on the movement of goods as these events take place and by providing detailed, immediate information as goods move among supply chain partners. Radio frequency identification (RFID) systems provide a microchip that contains data about an item and its location. The tags transmit radio signals over a short distance to special RFID readers. The RFID readers then pass the data over a network to a computer for processing. RFID gives businesses an opportunity to further automate their supply chain networks. The technology allows more data on an RFID chip than typical barcodes. RFID systems track each pallet, lot, or unit item in a shipment. The technology helps companies improve receiving and storage operations by improving their ability to “see” exactly what stock is stored in warehouses or on retail store shelves. (Learning Objective 4: What are the principal technologies and standards for wireless networking, communications, and Internet access?, AACSB: Application of knowledge.) Define WSNs, explain how they work, and describe the kinds of applications that use them. Wireless sensor networks (WSNs) are networks of interconnected wireless devices with some processing and radio-transmitting capability that are embedded into the physical environment to provide measurements of many points over large spaces. Wireless sensor networks are valuable for monitoring environmental changes, traffic patterns, security incidents, or supply chain events. Wireless sensor networks can be placed
  • 18. Copyright © 2017 Pearson Education, Inc. 14 in the field for years without any maintenance or human intervention. That reduces costs to businesses using them. (Learning Objective 4: What are the principal technologies and standards for wireless networking, communications, and Internet access?, AACSB: Application of knowledge.) Discussion Questions 7-5 It has been said that within the next few years, smartphones will become the single most important digital device we own. Discuss the implications of this statement. Student answers to this question will vary. 7-6 Should all major retailing and manufacturing companies switch to RFID? Why or why not? Student answers to this question will vary. 7-7 What are some of the issues to consider in determining whether the Internet would provide your business with a competitive advantage? Student answers to this question will vary. Hands-On MIS Projects Management Decision Problems 7-8 Floor tile company: Asked by major retailing customers to begin using RFID to improve management of products. Use the web to identify the cost of hardware, software, and networking components for an RFID system for your company. What factors should be considered? What are the key decisions that have to be made in determining whether your firm should adopt this technology? (The following information was copied from www.zebra.com, Nov 2010) What is the estimated incremental cost for adopting RFID? If one is discussing incremental costs over and above what was invested in your bar code infrastructure, then you can say that you will be making an investment in tags, printer/encoders, readers, middleware, and professional services to integrate these components into your bar code legacy environment. If you are not working with bar codes already, obviously you will need to make an investment in back-office, manufacturing, or WMS systems to use RFID data. What is a ballpark figure for implementing RFID in a warehouse and distribution process? According to Forrester Research, a typical supplier that attempts to comply with a mandate
  • 19. Copyright © 2017 Pearson Education, Inc. 15 can expect to spend as much as $9 million on RFID—depending on the size of its distribution network and Walmart volume. According to this research, the largest expenditures are tag costs and additional warehouse labor. Again, it is stressed that this figure is derived from studying one company seeking compliance with the Walmart mandate. However, this study provides a good perspective on the areas from which costs will derive. How do smart label costs compare to conventional thermal/thermal-transfer printed labels? A smart label runs in the vicinity of about $0.50 per label vs. about $0.01 for a conventional label. This is mainly due to the addition of the tag. This cost is also variable based on the total volume printed and the economies of scale associated with large quantities. What companies are currently developing RFID software? Is it all customized or are there off-the-shelf solutions? Numerous start-up and established software providers—including those who provide ERP software—have developed applications to deal with RFID reader and printer/encoder management, plus “tag data capture event” management. As with most business applications software, packages are typically customized to meet customers’ requirements rather than being ready to go “off the shelf.” How will RFID integrate with EDI software? EDI messages contain data about business transactions. While the format of an EDI message may change to accommodate “new data” (such as an EPC by comparison with a GTIN), fundamentally EDI message processors are unaware of the source of the data contained in messages. So there should be no reason that RFID cannot integrate with EDI software, provided the data structures are fundamentally the same. However, one area of difference is that many EDI systems typically deliver data in periodic batch mode; in contrast, the strength of RFID is its ability to deliver real-time data, so systems are up-to-the-minute. Key decisions that a company needs to make when considering adopting RFID include: • Hardware and software costs • Implementation costs • Return on investments • How technology fits into overall business strategy (Learning Objective 4: What are the principal technologies and standards for wireless networking, communications, and Internet access?, AACSB: Analytical thinking, Application of knowledge.) 7-9 BestMed Medical Supplies Corporation: Sells products and equipment from over 700 different manufacturers to hospitals, health clinics, and medical offices. The company employs 500 people at seven different locations. Management is considering adopting a unified communications system. What factors should be considered? What are the key
  • 20. Copyright © 2017 Pearson Education, Inc. 16 decisions that have to be made in determining whether to adopt this technology? Use the web, if necessary, to find out more about unified communications and its costs. Because the costs of purchasing and implementing a unified communication system will vary based on the chosen system, so too will student answers. (The following information was copied from www.networkworld.com, Nov 2010) From a broad perspective, Verizon Business suggests that organizations need to evaluate and measure how UC&C will benefit their organizations, determine whether the enterprise has adequate in-house technical resources, personnel and network capacity; and define how to integrate UC&C into business processes to align the deployment with critical business initiatives. At a more detailed level, Verizon Business suggested that in preparation for UC&C, enterprises should: • Invest in advanced IP networks because “UC&C starts with a capabilities-rich IP infrastructure. . . [and] flexible and expansive IP networks serve as the foundation of a successful UC&C deployment.” • Inventory technology and personnel resources to better understand the technological scope of UC&C deployments and “help identify potential network, equipment, and application gaps.” Verizon Business also recommends a skills-assessment of technical staff “to identify possible new hires and individuals requiring additional training.” • Align technology with business objectives to “make purchasing decisions with a focus on meeting specific business goals.” Any deployment should be designed to maximize the impact of UC&C on business processes. The enterprise should also establish benchmarks for success to better understand its ultimate objectives. • Create a comprehensive roadmap that is “far reaching and covers areas such as technology and finances, as well as detailed deployment and implementation plans.” • Tackle security at the onset, with a design that integrates “seamlessly with a business’ current network and leverage existing technology investments.” • Determine capabilities for ongoing management and decide “whether in-house staff has the skills and time required to effectively manage and troubleshoot performance issues.” As needed, enterprise should “select a managed services provider with the people, tools, and processes to help provide consistent performance of UC&C applications.” • Develop support systems and processes so that the corporate IT staff is prepared to address end-user performance issues and questions. • Train and educate end users “to help users adopt and embrace these new tools so they can work more efficiently and productively.” • Measure and modify, with built-in milestones planned that “go beyond reliability and availability measurements to assess the impact of UC&C from a financial, customer service, business process, and end-user satisfaction perspective.”
  • 21. Copyright © 2017 Pearson Education, Inc. 17 (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Analytical thinking, Reflective thinking, Application of knowledge.) Improving Decision Making: Using Spreadsheet Software to Evaluate Wireless Services Software skills: Spreadsheet formulas, formatting Business skills: Analyzing telecommunications services and costs 7-10 You would like to equip your sales force of 35, based in St. Louis, Missouri with mobile phones that have capabilities for voice transmission, text messaging, Internet access, and taking and sending photos. Use the web to select two wireless providers that offer nationwide voice and data service as well as good service in your home area. Examine the features of the mobile handsets and wireless plans offered by each of these vendors. Assume that each of the 35 salespeople will need to spend three hours per weekday between 8 a.m. and 6 p.m. on mobile voice communication, send 30 text messages per weekday, use 1 gigabyte of data per month, and send five photos per week. Use your spreadsheet software to determine the wireless service and handset that will offer the best pricing per user over a two-year period. For the purposes of this exercise, you do not need to consider corporate discounts. Answers will vary, since plan rates and costs of mobile phones are constantly changing. The answer to this question can be found in the sample solution found in the Microsoft Excel file named MIS14ch07solutionfile.xls. (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Analytical thinking, Reflective thinking, Application of knowledge.) Achieving Operational Excellence: Using Web Search Engines for Business Research Software skills: Web search tools Business skills: Researching new technologies 7-11 Use Google and Bing to obtain information about ethanol as an alternative fuel for motor vehicles. If you wish, try some other search engines as well. Compare the volume and quality of information you find with each search tool. Which tool is the easiest to use? Which produced the best results for your research? Why? Answers will vary according to the search phrases students enter in the search engines. The object of this question should be for students to explore new search engines and web services and not stick with “what they already know.” To that end, encourage students to use a different search engine than what they normally use and explore how their search results are framed— sponsored links or organic listings. Also encourage them to search for audio and video files, blogs, wikis, and Web 2.0 services about the subject. Is the information more useful, less useful, pertinent, or trustworthy? Do they prefer simple text documents or do they find the newer web services more helpful? (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Analytical thinking, Reflective thinking, Application of knowledge.)
  • 22. Copyright © 2017 Pearson Education, Inc. 18 Collaboration and Teamwork Project 7-12. In MyMISLab, you will find a Collaboration and Teamwork Project dealing with the concepts in this chapter. You will be able to use Google Drive, Google Docs, Google Sites, Google +, or other open source collaboration tools to complete the assignment. Case Study: Google, Apple, and Facebook Battle for Your Internet Experience 7-13 Compare the business models and core competencies of Google, Apple, and Facebook. Google: Its business model has always focused on the Internet and the web. It began as one of many search engines. It quickly ran away from the pack with its copyrighted PageRank search algorithm which returns superior search results for web users. It also has developed extensive online advertising services for businesses of all sizes. Google provides value to the user by using an inexpensive, flexible infrastructure to speed up web searches and provide its users with a vast array of web-based services and software tools. Apple: Its business model focuses on centralized control of almost all aspects of its hardware and software. It believes smartphones and tablets should have proprietary standards and be tightly controlled. It only allows apps from its App store that have been vetted by the company to be loaded to its products. Apple has a very loyal user base that has steadily grown and most likely will stay with Apple products in the future. Facebook: Facebook has built its business around social networking better than any other company. It has more worldwide users than any other company. Facebook Platform enables developers to build applications and websites that integrate with Facebook to reach its global network of users and to build pesonalized and social products. (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e- business?, AACSB: Analytical thinking, Reflective thinking, Application of knowledge.) 7-14 Why is mobile computing so important to these three firms? Evaluate the mobile strategies of each firm. This case demonstrates the fundamental paradigm shift from primarily desktop PC computing to mobile computing devices accessing services through the Internet that is currently taking place. This environment is projected to be a $400 billion e-commerce marketplace where the major access device will be a mobile smartphone or tablet computer. Each company is vying for the lead in a world of ubiquitous computing based on Internet access. The leader stands to make untold profits from advertising but in order to do that, the leader needs to claim the largest user base. Apps greatly enrich the experience of using a mobile device. Whoever creates the most appealing set of devices and applications will derive a significant competitive advantage over rival companies.
  • 23. Copyright © 2017 Pearson Education, Inc. 19 Google: Aggressively follows eyeballs. It has introduced the Android mobile operating system for a host of non-Apple devices. The Droid system adds features that Apple devices don’t have – the ability to run multiple apps at the same time. Uses an open non-proprietary system that allows users to grab apps from any source. Command of the smartphone operating system market provides built-in channels for serving ads to mobile devices. Google has successfully tailored its search results to respond to mobile searchers needs and accommodate smartphone functionality. Apple: By far the current leader in the number of apps users can download – over one million. Apple takes a 30% cut of every app purchased. Uses a closed proprietary system and apps that only provide “one way in.” It unveiled Siri in 2011 that has the potential to serve as a market disruption technology by combining search, navigation, and personal assistant tools. Facebook: Realized that much of its advertising revenue will come from mobile device searches. Introduced Sponsored Stories as a way to triple its revenue. It overhauled its home page to increase the size of both photos and links and allow users to create topical streams. It de-cluttered smartphone screens. It gave advertisers more opportunties and more interesting information with which to target markets. Facrbook has a mobile application suite that replaces the typical smartphone home screen. It essentially turns an Android mobile device into a Facebook phone. (Learning Objective 4: What are the principal technologies and standards for wireless networking, communication, and Internet access?, AACSB: Analytical thinking, Reflective thinking, Application of knowledge.) 7-15 What is the significance of search to the success or failure of mobile computing? How have Apple and Facebook attempted to compete with Google? Will their strategies succeed? Mobile computing is eclipsing desktop computing as the main entry point to the Internet. Today, people spend more than half their time online using mobile devices. Mobile devices take advantage of a growing cloud of computing capacity available to anyone with a smartphone and Internet connectivity. Apple’s attempt to compete with Google came in the form of Siri, a combined search, navigation, and personal assistant app. Siri uses Yelp for local business searches, tapping into its user recommendations and ratings. It uses Wolfram Alpha for factual and mathematical questions. It only uses Google search when all else fails. Facebook is attempting to create a Graph Search feature to rival Google’s search. It mines Facebook’s vast repository of user-generated data and delivers results based on social signals such as Facebook ‘likes’ and friend recommendations. If the desire for friend-based recommendations outweighs users’ reluctance to divulge more personal information, Graph Search may be a winner. However, Facebook has an uphill battle in its efforts to convince users to trust it with their Facebook activities. (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Analytical thinking, Reflective thinking, Application of knowledge.)
  • 24. Copyright © 2017 Pearson Education, Inc. 20 7-16 Which company and business model do you think is most likely to dominate the Internet and why? Students should consider these principles in their answers: • The size, complexity, and bureaucracy of organizations affect the ability of any company to continue to innovate, grow, and expand its reach. (see Chapter 3) As all three companies try to expand into mobile computing, their ability to “turn on a dime” in the face of other competitors may be in serious jeopardy. • Google currently has the major share of the web-based advertising market, however Facebook and other market entrants will be a major threat to them. Apple has had a significant lead in mobile computing for several years. However, as more companies, Google, Facebook, and others, continue to expand into the arena, its lead will be threatened. Legal and regulatory compliance will be a major issue as this market grows and more concerns are expressed from external environments. • History is not on anyone’s side. Every major company that’s been a force in technology in one era has lost its lead in the next era. For example, IBM was king of mainframe computing in the 1940s and 1950s. DEC was king in the mini-computer era during the 1970s. Microsoft was king in the 1980s and 1990s during the reign of desktop computers. Google reigns in the 2000s with its web-based services. Apple began as king of mobile computing devices. Will it remain on top as technology continues to evolve? (Learning Objective 1: What are the principal components of telecommunications networks and key networking technologies?, Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Analytical thinking, Reflective thinking, Application of knowledge.) 7-17 What difference would it make to a business or to an individual consumer if Apple, Google, or Facebook dominated the Internet experience? Explain your answer. Right now, Apple leads Google in the number of apps available to users. That gap is closing quickly thanks to Google’s improvements of the Android operating system and its encouragement to app developers. Open, non-proprietary systems historically have beat closed, proprietary systems because developers and users have a wider range of choices. Business managers must try to forecast which platform will provide the right choices for employees. Consumers must choose which platform will best fulfill their personal needs for the next two to three years. Switching costs play into both scenarios, not just in terms of phone purchases but the price of apps. Once a user purchases and adjusts to using a certain platform, it’s difficult and expensive to switch to a whole different system. Apps greatly enrich the experience of using a mobile device, and without them, the predictions for the future of mobile Internet would not be nearly as bright. Whoever creates the most appealing set of devices and applications will derive a significant competitive advantage over rival companies. (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, Learning Objective 4: What are the principal technologies and standards for wireless networking,
  • 25. Another Random Scribd Document with Unrelated Content
  • 26. XII. SLOTH. I. The command to be diligent is plain. Rom. xii. 11. 2 Thess. iii. 10, 11. II. See the miserable results of sloth. 1. It leads to tattling. 1 Tim. v. 13. 2. Decay. Eccles. x. 18. 3. Difficulties. Prov. xv. 19. 4. Waste. Prov. xviii. 9. 5. Want. Prov. xx. 4; xxiv. 30, 34. III. Contrast excellent woman (Prov. xxxi. 27) with the slothful person. Prov. xix. 24; xxiv. 30; x. 26. IV. Learn a lesson from the ant for yourselves—for your children. Prov. vi. 6, &c. Give your children something to do. Remember, they must be set to work, though it is often more trouble to you to teach them to do it, than to do it yourself—yet persevere. V. If not slothful in your temporal affairs, above all be not slothful concerning the salvation of your souls. Heb. vi. 11, 12. 2 Pet. i. 10.
  • 27. XIII. THE WATCHFUL MOTHER. No eye should be so wakeful and watchful as a mother’s. I. Watch over your children in infancy. Exod. ii. 8. 1 Sam. i. 23. It is described as next to impossible for a woman to forget her sucking child. Isa. xlix. 15. A well-watched infancy, under God’s blessing, avoids many future ills. II. Watch over your children’s education. Judg. xiii. 8. In every minute particular. Learning—clothing, &c. 1 Sam. ii. 19. Prov. xxxi. 21, 23. Contrast the dirty, unmended clothes of the poor, uncared-for child, with the clean and neatly mended garments of him whose childhood is guarded by the watchful eye of a mother. III. Watch them in times of sickness and death. No eye so quick to discover a hidden ill. 2 Kings, iv. 19, 20. John, xix. 25. IV. Above all watch over the precious soul.
  • 28. Never lose sight of the soul, in care for the body. 1. Watch, as those that must give account. Heb. xiii. 17. 2. Watch, to detect sin, and check its growth. Mark first sign of the plague spot. 3. Watch, for opportunity to lead to Christ. Prov. xv. 23. Deut. vi. 6, 9. Mark, x. 13.
  • 29. XIV. THE HASTY MOTHER. I. How common! Yet the Bible commands us not to be hasty. Eccles. vii. 9. A woman’s ornament should be a meek, and quiet spirit (1 Pet. iii. 4), and a nurse is mentioned as being especially gentle to the little ones. 1 Thess. ii. 7. II. Observe the angry woman, How foolish! Prov. xiv. 29; xxix. 20. How provoking! Prov. xv. 1. How wearing! Prov. xix. 13; xxvii. 15; xxi. 19. Drives the husband from his fireside. Sets an evil example to the children. Often does in her haste, what she heartily repents at leisure. III. Therefore, 1. Put away anger. Eph. iv. 31. Do not be soon angry. Prov. xiv. 17. Jam. i. 19. ‘Meekness gives smooth answers to rough questions.’ 2. Exercise self-control. Prov. xxv. 28; xvi. 32. 3. Teach it to your children.
  • 30. III. Remember, a hasty temper is a fault, not a misfortune. Accustom yourself, and your children, to view it in its right light. IV. Ask help from God to subdue it, for temper is hard to conquer, and meekness is a fruit of the Spirit. Gal. v. 22. Matt. v. 5. You need help, for there is much to provoke a wife, and mother. You need help, for you are very weak, but you can do all things through Christ who strengtheneth you. Phil. iv. 13.
  • 31. XV. THE WEARY MOTHER. Many things below make a mother weary. The blessing of rest is chiefly future. Notice various things that often make mothers weary, and the remedy for them. Cause. Remedy. I. Weary with cares and sorrows— ready to exclaim, ‘My burden is greater than I can bear.’ I. Do not carry your burden alone. Ps. lv. 22. 1 Pet. v. 7. Jer. xxxi. 25. Hereafter rest. Psa. xciv. 13. Isa. xiv. 3. II. Weary with work. II. Make more use of the rest of the Sabbath. Exod. xx. 8. Called ‘Sabbath of rest.’ Lev. xxiii. 3. Hereafter. Heb. iv. 9. III. Weary with sickness. Job, vii. 3, 4. Isa. xxxviii. 12, 14. May be your own, your husband’s, your children’s. III. Comfort in time of sickness. Ps. xli. 3. Great alleviation in true spirit of submission.
  • 32. Wearisome nights of pain, or watching. Hereafter. Isa. xxxiii. 24. Rev. xxi. 4. IV. Weary of your sins. Ps. vi. 6; xxxviii. 4. Oft repented. Oft repeated. IV. Come with your sins to Christ. Matt. xi. 28, 29. Hereafter. Rev. xxi. 27. V. Weary with your children’s sins. V. Correct, and they shall give you rest. Prov. xxix. 17. Consider Christ, lest ye be weary. Heb. xii. 3. Do you know where to go for rest? Jer. vi. 16. Or are you wandering hither and thither in vain, having forgotten your resting- place? Jer. l. 6. Remember, it is only to those who are in Christ that these promises of rest apply. It is only His own sheep who can say, ‘He maketh me to lie down in green pastures.’ To others there is no rest here, or hereafter, for, ‘The wicked are like the troubled sea, when it cannot rest. . . . There is no peace, saith my God, to the wicked.’ Isa. lvii. 20, 21.
  • 33. XVI. THE CARELESS MOTHER. Isa. xxxii. 9–13. Motherless children are often uncared for. No one ‘naturally cares for their state.’ No child with a mother ought to be so. But too often mothers are careless about— I. Their minds. No schooling—no teaching—no training—no Sunday School. Cares not whether in time, or too late—regular or truant, &c., &c. II. Their respectability, and associates. Will take in bad lodgers, hire bad characters to help at the wash-tub because they can be had cheaper than the respectable, forgetting that ‘a good name is rather to be chosen than great riches.’ Prov. xxii. 1. Eccles. vii. 1. What guilty carelessness! III. Their happiness. What misery here awaits a neglected child! What woe hereafter! IV. Their souls. To a parent guilty of this carelessness, it is said, ‘His blood will I require at thine hand.’ Ezek. iii. 18, 19; xxxiii. 6.
  • 34. Have you ever lost a child, for whose soul you never cared? Pray Ps. li. 14. This arises from want of real religion. You do not know the immense value of a soul. Would you be thus careless of an earthly treasure? Would you not watch it—lock it up—guard it with a jealous eye? Your child’s soul a treasure passing all price. Yet you allow Satan to steal it—bad companions to corrupt it—ruin it yourself by neglect. A thing neglected is ruined. Keep in view the judgment day. Will your child then say, ‘No man cared for my soul’—‘even my mother cared not that I perished!’
  • 35. XVII. THE CAREFUL MOTHER. I. Careful in her house. No waste. Prov. xviii. 9. John, vi. 12. Yet not stingy. No needless expense—makes a little go a long way. II. Careful over her children. Their bodies—health—clothes—future. 1 Tim. v. 8. 2 Cor. xii. 14. Provident Club. Penny Bank, &c. Their minds. Gives education suitable to their station. No fortune so good. What a disgrace in these days to a mother, if a child cannot read and write! Their souls. Above all, let not care for the body choke this. Mark, iv. 19. Lay up treasure in heaven. Matt. vi. 20. III. Let not careful mother be too full of care. Not overcharged. Luke, xxi. 34; x. 41, 42. ‘Live not in careful suspense.’ Luke, xii. 29 (margin).
  • 36. Cast your care on One who can bear it. 1 Pet. v. 7. Phil. iv. 6. He will not despise it, ‘for He careth for you.’ For the future, take this for your motto when over-pressed by cares and trials, ‘The Lord will provide.’ Gen. xxii, 14. Philip, iv. 19. Ps. xxiii. 1.
  • 37. XVIII. THE PATIENT MOTHER. A mother has, in a peculiar degree, ‘need of patience.’ Heb. x. 36. I. In trials of temper. 1 Cor. xiii. 4, 5, 7. Prov. xiv. 17. II. With your children’s faults. Matt. xviii. 22, 35. Look back to the days of your childhood. Were not you equally trying to your mother? Remember your own faults, and God’s patience with you. He bears long with you. III. It may be you need patience in bearing with unjust tempers, and unkind treatment. 1 Pet. ii. 19, 23. Ps. xxxvii. 7. IV. For answers to prayer. Syro-Phenician mother. Matt. xv. 22, 28. Jam. v. 7, 8. ‘Tarry thou the Lord’s leisure.’ V. In tribulation, sickness, and poverty. Rom. xii. 12. Jam. v. 10, 11. Luke, xxi. 19.
  • 38. XIX. THE FIRM MOTHER. I. To obey is a child’s duty. Exod. xx. 12. Eph. vi. 1. Col. iii. 20. II. This obedience should be— 1. Implicit. 2. Unquestioning. 3. Immediate. 4. In manner, and spirit. 5. From love. 6. In absence, as well as presence. 7. To the mother as well as the father. Prov. i. 8; vi. 20; xv. 20. Lev. xix. 3. e.g. Luke, ii. 51. This is most important. In the Bible no difference is drawn between the authority of the father and mother. III. A promise attached to obedience. Exod. xx. 12. Eph. vi. 2. Jer. xxxv. 18, 19. IV. To disobey is sin. Deut. xxi. 18, 21. Ezek. xxii. 7. Rom. i. 30. 2 Tim. iii. 2. 1 Sam. ii. 25.
  • 39. V. A punishment attached to disobedience. Deut. xxvii. 16. Prov. xxx. 17. VI. It is a parent’s duty to enforce obedience. Allowed disobedience brings misery into the home. 1 Tim. iii. 4; v. 4. Eli. 1 Sam. ii. 23. David. 1 Kings, i. 6. How solemn then, Mothers, is your responsibility. How earnest should be your prayers that your commands may agree with God’s. Gen. xviii. 19. Deut. xxxii. 46. Eph. vi. 1. Seek for wisdom in commanding. Firmness in insisting.
  • 40. XX. CONVERSION. We meet time after time at our Mothers’ Meeting, but how few of us are truly converted, and changed in heart. Ask yourselves this night two questions. I. Do you earnestly seek your own conversion? ‘What shall it profit you, if you gain the whole world, and lose your own soul?’ Mark, viii. 36, 37. Delay not. Isa. lix. 1. II. Do you earnestly seek for the conversion of your children?## 1. Perhaps you do not care for it. You do not seek first for them the kingdom of God. Matt. vi. 33. Be honest to yourselves in this matter. Are you ready to give up for them anything that keeps them from Christ? Matt. v. 29, 30. 2. Perhaps you do not pray for it. Observe how the mother prayed. Matt. xv. 22, 28. David. 1 Chron. xxix. 19. Job, i. 5. 3. Perhaps you place hindrances in the way. You draw them to the world instead of to Christ. Matt. xviii. 6.
  • 41. 4. Perhaps you forget the necessity of the Holy Spirit’s power. Isa. xliv. 3, 4, 5. Pray this night for the outpouring of the Holy Spirit upon yourselves—your husbands—your children. Matt. vii. 11. Remember, ‘except ye be converted, and become as little children, ye shall not enter into the kingdom of heaven.’ Matt. xviii. 3.
  • 42. XXI. THOU, GOD, SEEST ME. God’s penetrating eye. Rev. i 14. I. He sees all. Prov. v. 21. Bad and good. Prov. xv. 3. II. Where does He see you? 1. He sees the mother in secret. Matt. vi. 6. Each secret prayer—each sigh—each tear. No privacy from Him. Eccles. xii. 14. Ps. xix. 12. Jer. xxiii. 24. Many would give worlds to hide from God. 2. In her daily path. Job, xxxiv. 21. Ps. cxxxix. 3. 3. In every circumstance. 2 Chron. xvi. 9. III. What does He see? 1. The mother’s heart. Jer. xx. 12. 1 Sam. xvi. 7. Her motives— desires—yearnings. You may deceive others. You may even deceive yourselves, ‘but all things are naked, and opened unto the eyes of Him with whom we have to do.’ Heb. iv. 13. Luke, xvi. 15. 2. The mother’s sins. Ps. xix. 12; xc. 8. Isa. lvii. 18. Amos, v. 12. Sins of omission and commission.
  • 43. 3. The mother’s sorrows. Exod. iii. 7. Both inward and outward trials. 2 Kings, xx. 5. Ps. cxlii. 3. Acts, vii. 34. There are many sorrows it is not well for a wife and mother to speak of to others, but take comfort! Your Saviour knows each grief—each trouble—each tear for your own sins or the sins of others. 4. The mother’s need. Matt. vi. 8, 32. And He promises to supply it. Ps. xxiii. 1. Philip, iv. 19.
  • 44. XXII. JESUS THE MOTHER’S FRIEND. I. Mothers need a friend! In joy and in sorrow, in dark hours and in light, in life and in death, they need a Friend who is always the same—even ‘the same yesterday, to-day, and for ever.’ II. You may have such a Friend. 1. Even Jesus. Prov. xviii. 24. John, xv. 15. The Friend of sinners. Matt. xi. 19. 2. He loveth always. Prov. xvii. 17. 3. He is faithful. Prov. xviii. 24. John, xiii. 1. III. Is He your Friend? Can you point to Jesus and say, ‘This is my Beloved, and this is my Friend?’ Cant. v. 16. If not, do not rest until you can say so. IV. If Jesus is your Friend. 1. Go to Him in trouble. ‘Pour out your heart before Him.’ John, xi. 3, 11. In sorrow lean on His bosom, as John did. John, xiii. 23. ‘He weeps with those who weep.’
  • 45. 2. Go to Him in joy, for He ‘rejoices with those who do rejoice.’ 3. Do not have hard thoughts of Him because He afflicts. ‘Faithful are the wounds of a friend.’ Prov. xxvii. 6. Ps. cxli. 5. He sympathises in every sorrow. Heb. iv. 15. And has borne your griefs. Isa. liii. 4.
  • 46. XXIII. HELPS FOR MOTHERS. 1. A mother has many hindrances in seeking Christ. She needs much help from the means of grace. To obtain this is often difficult, and requires much effort. Outward means are, therefore, too often neglected. If you would grow in grace this must not be. Be diligent, therefore, in the use of— I. Daily prayer. Matt. vi. 6, 11. No business should prevent this. David had the business of a kingdom upon him, nevertheless, he says, ‘Evening, and morning, and at noon, will I pray.’ Ps. lv. 17. II. Daily Scripture reading. Acts, xvii. 11. Ps. cxix. 103. III. Family prayer. Judgment pronounced on those who neglect family religion. Jer. x. 25. Promise to united prayer. Matt. xviii. 19, 20. IV. Attendance on the public means of grace. Observe the command. Deut. xii. 12, 18. Heb. x. 25. What a blessing rested on it in the case of Lydia. Acts, xvi. 13, 15.
  • 47. There are great difficulties to the mother of a young family in going to Church on Sunday, but make an effort to overcome them. This can generally be done if husband and wife make a united effort. If you are truly hungering and thirsting after righteousness, you will earnestly use every means for obtaining the bread and the water of life. If you are careless in this respect, it is because there is no real hunger, no craving of soul for heavenly food.
  • 48. XXIV. HELPS FOR MOTHERS. 2. We will notice this evening three more things which are, or ought to be, ‘helps’ to mothers on the heavenly race. I. Husbands and wives should be mutual helps, (see Marriage Service) ‘for the mutual help and comfort the one of the other.’ Gen. ii. 18. 1 Pet. iii. 7. Eph. v. 28, 29. Fellow-pilgrims, fellow-sufferers, fellow-travellers they must be; but what an unspeakable joy is it when they are also fellow- helpers, fellow-labourers, fellow-heirs, fellow-citizens! ‘O happy house, where man and wife are one, Thro’ love of Thee, in spirit, heart, and mind; Together joined by holy bands, which none, Not death itself, can sever or unbind; Where both on thee unfailingly depend, In weal and woe, in good and evil days, And hope with Thee eternity to spend; In sweet communion and eternal praise.’ II. Christian friends. 2 Cor. i. 24. Rom. xvi. 3.
  • 49. What comfort and help may be derived from the visits, counsels, and sympathy of a Christian neighbour, a kind and devoted district visitor, or minister. Especially may Christian friends help each other by prayer. 2 Cor. i. 11. Jam. v. 16, 18. Matt. xviii. 19. How valuable is a Prayer Union, such as we have connected with our Mothers’ Meeting. III. But lastly remember that these ‘helps’ are worth nothing unless you have the Lord for your Helper. Ps. liv. 4. Heb. xiii. 6. Exod. xviii. 4. He is different to any earthly helper, for He is a Helper at all times, and in all circumstances. In trouble. Ps. xlvi. 1. To the widow. Ps. lxviii. 5. To the fatherless. Ps. x. 14. Take, therefore, this short prayer and use it in your daily life, ‘Lord, be Thou my helper.’ Lift up this prayer in the midst of your work—of temptation—of trial, and you will be enabled to add, ‘My heart trusted in Him, and I am helped!’ Ps. xxviii. 7.
  • 50. XXV. TEACH YOUR CHILDREN. A mother may not have much time for instruction, or be very capable of teaching, but she should make it her daily duty to give her children some instruction in the Scriptures. She may know but little herself, but let not this discourage her; for in watering others she shall herself be watered. Prov. xi. 25. I. Teach, seeking the help of the Holy Spirit. Isa. liv. 13. John, xvi. 13. Luke, xii. 12. Job, xxxvi. 22. Ps. xciv. 12. II. Teach in the spirit of prayer. Eph. vi. 18, 19. Remembering these words, ‘Without Me ye can do nothing.’ John, xv. 5. III. Teach, leaning on the promise. Isa. lv. 10, 11. Eccles. xi. 1, 6. IV. Teach, expecting a result. Ps. cxxvi. 6. Prov. xxii. 6. Gen. xviii. 19. 2 Tim. i. 5; iii. 15.
  • 51. XXVI. THE PARTING PLACE, AND THE MEETING PLACE. The following circumstance took place not long after the last meeting. Two mothers, who were both present at the Class, about a fortnight after met in the Cemetery, sorrowing at their children’s graves. Each had during that interval lost a child, but not having heard of each other’s trouble, the meeting was unexpected. On this occasion the following subject was taken. I. The parting place—the child’s death-bed. This is, 1. A parting place. All must die alone. The mother may have watched over her child with untiring care during its years of infancy, the trials of youth, and the snares and cares of riper years, but here they must part. 2 Sam. xii. 15, 23. 2. A weeping place. Gen. xxi. 16. 2 Sam. xii. 21. Jer. xxxi. 15. Mark, v. 38. Luke, vii. 13. Not wrong, for Jesus wept at the grave of Lazarus. John, xi. 35. 3. A birth place To a new and heavenly life. But not so to all. To some, namely, to those who have indeed been born again. Luke, xvi. 22; and to babes. Isa. xl. 11.
  • 52. Contrast David’s sorrow for his infant, (2 Sam. xii. 23) with his sorrow for Absalom, 2 Sam. xix. 4. To one death was the door of life, to the other of death. II. The meeting place—the judgment-seat. Rev. xx. 12. Rom. xiv. 10. You cannot avoid it. It will be. 1. To all a place of recognition. The child you led to Christ—the child you led astray. The child you trained for heaven—the child you trained for hell. All will be there. 2. To many a place of weeping. Matt. xxv. 30. Luke, vi. 25. 3. To many a place of rejoicing. Matt. xxv. 34. Believing mother! Your night of weeping will then be over, your morning of joy will dawn, of which the sun will never set! Ps. xxx. 5. Which will it be to you—a meeting-place of joy or sorrow? May you and your children be so united in Christ here, that you may both part and meet in peace!
  • 53. XXVII. THE MOTHER’S DEATH-BED. On the occasion of the death of a young mother, which took place not long after the first meeting in the new year. I. How near it may be. 1 Sam. xx. 3. Job, xxi. 13. In the midst of life we are in death. We have had a solemn lesson. Almost the youngest in our class cut down the first. II. The hour of death is an hour 1. Of deep solemnity. It is a dark valley. Ps. xxiii. 4. Job. x. 21. 2. Of much regret. Conscience awake, looks back on duties undone—things done— words spoken—words unsaid, &c. 3. Often of great suffering. Ps. cxvi. 3. Not the time to begin to seek the Lord. 4. Of parting. Philip, i. 23, 24. Must die alone. Must leave husband and children. They may go with you to the edge of the river, but no further. 5. Of weeping. Gen. xxxv. 18; xxiii. 2. John, xi. 31. 2 Sam. xix. 4.
  • 54. 6. It is an hour when Christ, and Christ alone, can save you. Thus we pray, ‘In the hour of death, and in the day of judgment, Good Lord, deliver us.’ His rod and staff alone can help you. Ps. xxiii. 4. He alone can take away the sting from death. 1 Cor. xv. 55, 57. Rom. viii. 38, 39. Isa. xliii. 2. It is only if washed in His blood, and clothed in His righteousness, that you need not fear to appear before God.
  • 55. XXVIII. NEW YEAR’S DAY. ‘I must work the work of Him that sent me while it is day: the night cometh, when no man can work.’—John, ix. 4. Time past—is gone, thou canst not it recall. Time is—thou hast, improve the portion small. Time future—is not, and may never be. Time present—is the only time for thee! Therefore, I. Hear to-day. (Ps. xcv. 7.) ‘See that ye refuse not Him that speaketh.’ Exhort to-day your children. (Heb. iii. 13.) Work to-day (John, ix. 4) for your children’s souls. Never postpone. Jam. iv. 13. 2 Cor. vi. 2. Now it is high time to wake out of sleep. Rom. xiii. 11. II. Because the night cometh when no man can work. John, ix. 4. The night of your death—your husband’s death—your children’s death. Perhaps this sentence has gone forth against you, or yours, ‘This year thou shalt die.’ Jer. xxviii. 16. Luke, xii. 20; xiii. 7.
  • 56. Mothers, awake! to your own, and your children’s danger. Awake to the importance of safety in Christ. Mothers, work! for yourselves, for your families. ‘Labour not for the meat which perisheth, but for that meat which endureth unto everlasting life.’ John, vi. 27.
  • 57. Welcome to our website – the perfect destination for book lovers and knowledge seekers. We believe that every book holds a new world, offering opportunities for learning, discovery, and personal growth. That’s why we are dedicated to bringing you a diverse collection of books, ranging from classic literature and specialized publications to self-development guides and children's books. More than just a book-buying platform, we strive to be a bridge connecting you with timeless cultural and intellectual values. With an elegant, user-friendly interface and a smart search system, you can quickly find the books that best suit your interests. Additionally, our special promotions and home delivery services help you save time and fully enjoy the joy of reading. Join us on a journey of knowledge exploration, passion nurturing, and personal growth every day! testbankfan.com