1) Cyberwar is not considered a viable threat to security.

80
1) Cyberwar is not considered a viable threat to security.

Transcript of 1) Cyberwar is not considered a viable threat to security.

Page 1: 1) Cyberwar is not considered a viable threat to security.

1)

Cyberwar is not considered a viable threat to security.

Page 2: 1) Cyberwar is not considered a viable threat to security.

2)

The smallest gender difference in internet usage was reported in Canada.

Page 3: 1) Cyberwar is not considered a viable threat to security.

3)

Internet users are less likely to socialize with friends.

Page 4: 1) Cyberwar is not considered a viable threat to security.

4)

Bandwidth refers to the transmission of all forms of information, including digital data, voice, fax, sound, and video, from one location to another over some

type of network.

Page 5: 1) Cyberwar is not considered a viable threat to security.

5)

An electronic brochure is one way of using the Web to disseminate sales and marketing information.

Page 6: 1) Cyberwar is not considered a viable threat to security.

6)

Firewalls can be hardware or software but not a combination of both.

Page 7: 1) Cyberwar is not considered a viable threat to security.

7)

Telnet allows users to log into any computer on the internet.

Page 8: 1) Cyberwar is not considered a viable threat to security.

8)

The keys used by current encryption technologies such as SSL and PGP cannot be cracked.

Page 9: 1) Cyberwar is not considered a viable threat to security.

9)

A Virtual Private Network is also called a secure tunnel.

Page 10: 1) Cyberwar is not considered a viable threat to security.

10)

Risk reduction, risk acceptance and risk transference are all courses of action arising from a

risk analysis.

Page 11: 1) Cyberwar is not considered a viable threat to security.

11)

In the late 1990s, InterNIC morphed into SERT/CC.

Page 12: 1) Cyberwar is not considered a viable threat to security.

12)

The exchange of medical information from one location to another via a computer network is

called electronic medicine or e-medicine.

Page 13: 1) Cyberwar is not considered a viable threat to security.

13)

In this Web address, http://www.pcWebopedia.com/index.html, the

domain name is ".com".

Page 14: 1) Cyberwar is not considered a viable threat to security.

14)

A Denial of Service (DoS) attack is created by SPAM.

Page 15: 1) Cyberwar is not considered a viable threat to security.

15)

Distance learning is the process of providing instruction to students who are physically separated from instructors through the use of communications

technologies.

Page 16: 1) Cyberwar is not considered a viable threat to security.

16)

An Internet connection called DSL stands for Direct Signal Link-up.

Page 17: 1) Cyberwar is not considered a viable threat to security.

17)

Videoconferencing is the act of working at home or from another remote location and connecting to the office via computing and networking technologies.

Page 18: 1) Cyberwar is not considered a viable threat to security.

18)

Women use the internet more frequently than do men.

Page 19: 1) Cyberwar is not considered a viable threat to security.

19)

HTTP stands for HyperText Transmission Permission.

Page 20: 1) Cyberwar is not considered a viable threat to security.

20)

Online ordering enables customers to order and, in many cases, actually pay for products and services

online.

Page 21: 1) Cyberwar is not considered a viable threat to security.

21)

Biometric access controls are becoming obsolete.

Page 22: 1) Cyberwar is not considered a viable threat to security.

22)

Websites and specific Web pages within those sites have a unique Internet address called a uniform

resource locator.

Page 23: 1) Cyberwar is not considered a viable threat to security.

23)

In 2002, the NUA internet Survey reported that 600 million persons wordwide use the internet.

Page 24: 1) Cyberwar is not considered a viable threat to security.

24)

Canadians are the most frequent users of the internet, per capita, in the world.

Page 25: 1) Cyberwar is not considered a viable threat to security.

25)

The protocol for the Internet is called TCP/IP.

Page 26: 1) Cyberwar is not considered a viable threat to security.

26)

Data mining involves the use of telecommunications technology to transfer

business information between organizations.

Page 27: 1) Cyberwar is not considered a viable threat to security.

27)

Enterprise portals come in two basic forms, the distribution portal and the production portal.

Page 28: 1) Cyberwar is not considered a viable threat to security.

28)

E-information is more flexible than traditional promotional methods such as hard-copy

catalogues and print advertisements.

Page 29: 1) Cyberwar is not considered a viable threat to security.

29)

An extranet is a vehicle for communicating public information with authorized users outside

organizational boundaries.

Page 30: 1) Cyberwar is not considered a viable threat to security.

30)

Tailoring products and services to particular companies creates a horizontal market.

Page 31: 1) Cyberwar is not considered a viable threat to security.

31)

Very few countries have at least some type of Internet access.

Page 32: 1) Cyberwar is not considered a viable threat to security.

32)

To gain access to the Internet, the TCP/IP protocol must be implemented on an organizations

LAN/WAN.

Page 33: 1) Cyberwar is not considered a viable threat to security.

33)

Extranets connect two or more business partners.

Page 34: 1) Cyberwar is not considered a viable threat to security.

34)

Providing customers with information or products that they can find nowhere else leads to EC

profitability.

Page 35: 1) Cyberwar is not considered a viable threat to security.

35)

E-integration, the second stage of EC, is focused on accommodating requests for customized

information.

Page 36: 1) Cyberwar is not considered a viable threat to security.

36)

In reverse pricing systems customers specify the product they are looking for and how much they

are willing to pay for it.

Page 37: 1) Cyberwar is not considered a viable threat to security.

37)

XML doesn't specify any particular formatting. Rather it specifies the rules for tagging.

Page 38: 1) Cyberwar is not considered a viable threat to security.

38)

The Internet and the World Wide Web are extremely well suited for conducting business

electronically.

Page 39: 1) Cyberwar is not considered a viable threat to security.

39)

Virtual private networks use a technology called channelling.

Page 40: 1) Cyberwar is not considered a viable threat to security.

40)

Push marketing is an advertising strategy that attempts to draw visitors to companies' Web sites.

Page 41: 1) Cyberwar is not considered a viable threat to security.

41)

The Web enables interactive (two-way) communication, which is called collaboration.

Page 42: 1) Cyberwar is not considered a viable threat to security.

42)

The e-transaction stage of EC helps companies fulfill their goals of collaboration, interactive communication, and transactional support.

Page 43: 1) Cyberwar is not considered a viable threat to security.

43)

Ford Motor Company, DamilerChrysler, and General Motors have teamed up to create a procurement portal that suppliers to the big three can access.

Page 44: 1) Cyberwar is not considered a viable threat to security.

44)

A 'Value Proposition' is partly defined as 'A summary of how a company will generate revenue.'

Page 45: 1) Cyberwar is not considered a viable threat to security.

45)

For semistructured decisions, some procedures to follow can be specified in advance, but not to the

extent where a specific recommendation can be made.

Page 46: 1) Cyberwar is not considered a viable threat to security.

46)

The Internet has made it much easier to gather hard data to support executive decision making.

Page 47: 1) Cyberwar is not considered a viable threat to security.

47)

At the executive level, managers focus on short-term strategic issues facing the organization.

Page 48: 1) Cyberwar is not considered a viable threat to security.

48)

In the current legal environment in Canada, it is legal for employers to collect almost any information they want about what employees are doing on company

time.

Page 49: 1) Cyberwar is not considered a viable threat to security.

49)

Sources for soft data include transaction systems, simulations and what-if analysis output.

Page 50: 1) Cyberwar is not considered a viable threat to security.

50)

A drill-down report provides a summary of critical information on a recurring schedule.

Page 51: 1) Cyberwar is not considered a viable threat to security.

51)

Inventory planning is an example of the activities supported by transaction processing systems.

Page 52: 1) Cyberwar is not considered a viable threat to security.

52)

At the executive level of the organization, managers focus on tactical issues facing the organization.

Page 53: 1) Cyberwar is not considered a viable threat to security.

53)

At the managerial level, the scope of the decision is moderately complex and has a time horizon of a

few days to a few months.

Page 54: 1) Cyberwar is not considered a viable threat to security.

54)

In a semiautomated data entry system, two computers talk to each other via a computer network without any human intervention.

Page 55: 1) Cyberwar is not considered a viable threat to security.

55)

An example of a transnational information system is the foreign exchange systems that allow traders from

different parts of the world to interact with each other.

Page 56: 1) Cyberwar is not considered a viable threat to security.

56)

Traditionally, organizations have used task forces, which are permanent work groups with a finite

task and life cycle, to solve problems.

Page 57: 1) Cyberwar is not considered a viable threat to security.

57)

A backbone network on the Internet manages the bulk of network traffic and typically uses higher-speed

cabling, such as fiber-optic, rather than the individual LAN segments.

Page 58: 1) Cyberwar is not considered a viable threat to security.

58)

Telecapacity is the carrying capacity of telecommunications networks.

Page 59: 1) Cyberwar is not considered a viable threat to security.

59)

Voice mail allows callers to leave voice messages in a voice mailbox in a digitized format that can be

stored on the computer.

Page 60: 1) Cyberwar is not considered a viable threat to security.

60)

The Internet Registry provides central maintenance of the Domain Name Registry (DNS).

Page 61: 1) Cyberwar is not considered a viable threat to security.

61)

Numbers such as 1.160.10.240 which enable networks to route messages to the proper destination. These

numbers are called domain numbers.

Page 62: 1) Cyberwar is not considered a viable threat to security.

62)

Broadband technologies support the transfer of small to medium amounts of data.

Page 63: 1) Cyberwar is not considered a viable threat to security.

63)

Packet filtering and proxy servers are associated with firewalls.

Page 64: 1) Cyberwar is not considered a viable threat to security.

64)

The transfer of funds from one financial account to another via computer is called electronic funds

transfer.

Page 65: 1) Cyberwar is not considered a viable threat to security.

65)

Hypermediation is another term for the pricing scheme called "pay by the click."

Page 66: 1) Cyberwar is not considered a viable threat to security.

66)

In order to facilitate e-integration, Web sites must be integrated with a company's databases.

Page 67: 1) Cyberwar is not considered a viable threat to security.

67)

Menu-driven pricing occurs when the customers set the prices for products and services.

Page 68: 1) Cyberwar is not considered a viable threat to security.

68)

Click-only companies are also referred to as "pure click" companies.

Page 69: 1) Cyberwar is not considered a viable threat to security.

69)

Successful Web sites present a brief summary of their information along with hyperlinks that allow users to

drill down for the information they are seeking.

Page 70: 1) Cyberwar is not considered a viable threat to security.

70)

Because structured decisions are relatively complex, they can be programmed directly into

operation information systems.

Page 71: 1) Cyberwar is not considered a viable threat to security.

71)

Although data in an EIS are provided in a very highly aggregated form, the executive also has the capability

to drill down and see the details if necessary.

Page 72: 1) Cyberwar is not considered a viable threat to security.

72)

Desktop videoconferencing products are relatively large, expensive units that have video quality

similar to that of broadcast television.

Page 73: 1) Cyberwar is not considered a viable threat to security.

73)

A data packet that conforms to the IP specification is called an IP datagram.

Page 74: 1) Cyberwar is not considered a viable threat to security.

74)

Secure Sockets Layer (SSL) is a popular spam filter used on the internet.

Page 75: 1) Cyberwar is not considered a viable threat to security.

75)

RFID technologies use line-of-sight reading techniques.

Page 76: 1) Cyberwar is not considered a viable threat to security.

76)

Another term for an electronic marketplace is a trading exchange.

Page 77: 1) Cyberwar is not considered a viable threat to security.

77)

Managers at the operational level of an organization make unstructured decisions.

Page 78: 1) Cyberwar is not considered a viable threat to security.

78)

The Binary Increase Congestion Transmission Control Protocol (BIC-TCP) is capable of transferring data at

150,000 times the speed of DSL.

Page 79: 1) Cyberwar is not considered a viable threat to security.

79)

Part of the 'Revenue Model' is concerned with how a firm will attract customers.

Page 80: 1) Cyberwar is not considered a viable threat to security.

80)

Beenox's port of The Incredibles required an average of only four people to produce 25 versions of the game in 13 languages.