1 / 80

1) Cyberwar is not considered a viable threat to security.

1) Cyberwar is not considered a viable threat to security. . 2) The smallest gender difference in internet usage was reported in Canada. . 3) Internet users are less likely to socialize with friends. . 4)

kolina
Download Presentation

1) Cyberwar is not considered a viable threat to security.

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 1) Cyberwar is not considered a viable threat to security.

  2. 2) The smallest gender difference in internet usage was reported in Canada.

  3. 3) Internet users are less likely to socialize with friends.

  4. 4) Bandwidth refers to the transmission of all forms of information, including digital data, voice, fax, sound, and video, from one location to another over some type of network.

  5. 5) An electronic brochure is one way of using the Web to disseminate sales and marketing information.

  6. 6) Firewalls can be hardware or software but not a combination of both.

  7. 7) Telnet allows users to log into any computer on the internet.

  8. 8) The keys used by current encryption technologies such as SSL and PGP cannot be cracked.

  9. 9) A Virtual Private Network is also called a secure tunnel.

  10. 10) Risk reduction, risk acceptance and risk transference are all courses of action arising from a risk analysis.

  11. 11) In the late 1990s, InterNIC morphed into SERT/CC.

  12. 12) The exchange of medical information from one location to another via a computer network is called electronic medicine or e-medicine.

  13. 13) In this Web address, http://www.pcWebopedia.com/index.html, the domain name is ".com".

  14. 14) A Denial of Service (DoS) attack is created by SPAM.

  15. 15) Distance learning is the process of providing instruction to students who are physically separated from instructors through the use of communications technologies.

  16. 16) An Internet connection called DSL stands for Direct Signal Link-up.

  17. 17) Videoconferencing is the act of working at home or from another remote location and connecting to the office via computing and networking technologies.

  18. 18) Women use the internet more frequently than do men.

  19. 19) HTTP stands for HyperText Transmission Permission.

  20. 20) Online ordering enables customers to order and, in many cases, actually pay for products and services online.

  21. 21) Biometric access controls are becoming obsolete.

  22. 22) Websites and specific Web pages within those sites have a unique Internet address called a uniform resource locator.

  23. 23) In 2002, the NUA internet Survey reported that 600 million persons wordwide use the internet.

  24. 24) Canadians are the most frequent users of the internet, per capita, in the world.

  25. 25) The protocol for the Internet is called TCP/IP.

  26. 26) Data mining involves the use of telecommunications technology to transfer business information between organizations.

  27. 27) Enterprise portals come in two basic forms, the distribution portal and the production portal.

  28. 28) E-information is more flexible than traditional promotional methods such as hard-copy catalogues and print advertisements.

  29. 29) An extranet is a vehicle for communicating public information with authorized users outside organizational boundaries.

  30. 30) Tailoring products and services to particular companies creates a horizontal market.

  31. 31) Very few countries have at least some type of Internet access.

  32. 32) To gain access to the Internet, the TCP/IP protocol must be implemented on an organizations LAN/WAN.

  33. 33) Extranets connect two or more business partners.

  34. 34) Providing customers with information or products that they can find nowhere else leads to EC profitability.

  35. 35) E-integration, the second stage of EC, is focused on accommodating requests for customized information.

  36. 36) In reverse pricing systems customers specify the product they are looking for and how much they are willing to pay for it.

  37. 37) XML doesn't specify any particular formatting. Rather it specifies the rules for tagging.

  38. 38) The Internet and the World Wide Web are extremely well suited for conducting business electronically.

  39. 39) Virtual private networks use a technology called channelling.

  40. 40) Push marketing is an advertising strategy that attempts to draw visitors to companies' Web sites.

  41. 41) The Web enables interactive (two-way) communication, which is called collaboration.

  42. 42) The e-transaction stage of EC helps companies fulfill their goals of collaboration, interactive communication, and transactional support.

  43. 43) Ford Motor Company, DamilerChrysler, and General Motors have teamed up to create a procurement portal that suppliers to the big three can access.

  44. 44) A 'Value Proposition' is partly defined as 'A summary of how a company will generate revenue.'

  45. 45) For semistructured decisions, some procedures to follow can be specified in advance, but not to the extent where a specific recommendation can be made.

  46. 46) The Internet has made it much easier to gather hard data to support executive decision making.

  47. 47) At the executive level, managers focus on short-term strategic issues facing the organization.

  48. 48) In the current legal environment in Canada, it is legal for employers to collect almost any information they want about what employees are doing on company time.

  49. 49) Sources for soft data include transaction systems, simulations and what-if analysis output.

  50. 50) A drill-down report provides a summary of critical information on a recurring schedule.

More Related