- What is e-commerce?
- How has e-commerce companies like Amazon and eBay change capitalism (i.e. the corporate model)?
- What is Moore's law? What is the significance of it?
- What is Metcalfe's law? How does it work?
- How does web encryption (public key cryptography) work?
- What is a "daytrader?"
- How is data transferred around the Internet?
- What is a "bubble" as described in the movie? How did it develop (boom)? How did it pop (bust)?
Tuesday, January 19, 2010
Download - Episode 3 - Bubble
Based on "Bubble," Episode 3 of the series Download: The True Story of the Internet, answer the following questions:
Subscribe to:
Post Comments (Atom)

1.Electronic commerce, commonly known as (electronic marketing) e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks.
ReplyDelete2. Made more accessible to buy stuffs.
3.Moore's law describes a long-term trend in the history of computing hardware, in which the number of transistors that can be placed inexpensively on an integrated circuit has doubled approximately every two years.
4.Metcalfe's law states that the value of a telecommunications network is proportional to the square of the number of connected users of the system (n2). First formulated in this form by George Gilder in 1993,[1] and attributed to Robert Metcalfe in regard to Ethernet, Metcalfe's law was originally presented, circa 1980, not in terms of users, but rather of "compatibly communicating devices" (for example, fax machines.)
5.Public-key cryptography is a cryptographic approach which involves the use of asymmetric key algorithms instead of or in addition to symmetric key algorithms. Unlike symmetric key algorithms, it does not require a secure initial exchange of one or more secret keys to both sender and receiver. The asymmetric key algorithms are used to create a mathematically related key pair: a secret private key and a published public key. Use of these keys allows protection of the authenticity of a message by creating a digital signature of a message using the private key, which can be verified using the public key. It also allows protection of the confidentiality and integrity of a message, by public key encryption, encrypting the message using the public key, which can only be decrypted using the private key.
6.Someone who trades stocks for a living during the day.
7. Through datastreams and lots of programs and processing, and things I struggle to understand.
8. The Economic Situation, Through ambitious men and women, and when the need reached peak power.
1)e-Commerce is another name for electronic market it is basicalley the buying and saleing of goods or serveses online.
ReplyDelete2)makes buying things online more accesable.
3)Moore's law describes a long-term trend in the history of computing hardware, in which the number of transistors that can be placed inexpensively on an integrated circuit has doubled approximately every two years
4 Metcalfe's law states that the value of a telecommunications network is proportional to the square of the number of connected users of the system (n2). First formulated in this form by George Gilder in 1993,[1] and attributed to Robert Metcalfe in regard to Ethernet, Metcalfe's law was originally presented, circa 1980, not in terms of users, but rather of "compatibly communicating devices"
5)Public-key cryptography is a cryptographic approach which involves the use of asymmetric key algorithms instead of or in addition to symmetric key algorithms. Unlike symmetric key algorithms, it does not require a secure initial exchange of one or more secret keys to both sender and receiver. The asymmetric key algorithms are used to create a mathematically related key pair: a secret private key and a published public key. Use of these keys allows protection of the authenticity of a message by creating a digital signature of a message using the private key, which can be verified using the public key. It also allows protection of the confidentiality and integrity of a message, by public key encryption, encrypting the message using the public key, which can only be decrypted using the private key.
6) a day trader is a person that trades stocks during the day
7)info travels throu the internet on datestreams
8)men an women how wanted to make a diffrence and it popped from getting to big and powerful