SlideShare a Scribd company logo
1 of 4
2008 SECTION-B
1. DISCUSS THE ADVANTAGE OF E-BUSINESS OVER TRADITIONAL BUSINESS
 With the help of E-Business one can develop a more cost-effective Communication and
Marketing Strategy - The most obvious advantage of "upgrading" to e-business is that it gives you
a vital web presence.
 You can reach New Markets World Wide - The internet offers exciting ways of reaching new
markets that could only be dreamed of in the past.
 You can cut Advertising and Marketing Costs - Online advertising is not only more efficient, but it
is often less expensive than traditional advertising. After sales training expenses can also be
reduced by utilizing online seminars, training videos and tutorials.
 You can streamline the Ordering Process by taking orders online - Implementing an online
ordering system allows you to eliminate manual paper work or telephone order taking.
 You don’t have to hire a fancy looking shop
 You don’t have to hire salesmen
 You may take orders at midnight
 Another great advantage of an e-business over traditional business is that it can easily find and
market to a specific niche or segment, which results in a higher conversion of sales. Traditional
businesses are forced to choose correct locations to attract their desired customer base.
 The most significant difference is that e-businesses cost very little upfront when compared to
traditional businesses. Starting a business on the Internet does not have the burden of a physical
storefront and any expenses that accompany it.
2. LIST THE COMPUTER CRIMES. DISCUSS ANY TWO OF THEM
Computer crime has been defined broadly as a criminal act that has been committed using a computer as
the principal tool.
Some of the computer crimes are:-
 Hacking
 Identity theft
 Internet gambling
 Child pornography
Hacking:-
The word "hacking" has two definitions. The first definition refers to the hobby/profession of working with
computers. The second definition refers to breaking into computer systems. While the first definition is older and
is still used by many computer enthusiasts (who refer to cyber-criminals as "crackers"), the second definition is
much more commonly used. In particular, the web pages here refer to "hackers" simply because our web-server
logs show that everyone who reaches these pages are using the second definition as part of their search criteria.
Identity theft:-
The concept is simple: someone gains access to your personal information and uses it for their own
benefit. This could range from a black-hat hacker stealing your online banking account login and
password to getting access to your social security number and using it to pretend to be you. Such people
can make themselves a lot of money with your personal information, and screw you over in the process
Internet gambling:-
It offers all forms of gambling to every online household 24 hours a day. Via the Internet, betters can indulge in
casino-style gambling, such as blackjack, poker, slot machines and roulette. They can bet on sports, horse or dog
races, lotteries, bingo, tournaments, election results, sweepstakes and more. Many observers believe that online
trading in the stock market, especially so-called “day trading,” is nothing more than gambling on stock market
performance.
Child pornography:-
It’s tragic, but the Internet is often used to exploit children. What’s perhaps even sicker is that people
make money doing this.
3. EXPLAIN THE MALICIOUS CODE AND ITS TYPE
Malicious code is the term used to describe any code in any part of a software system or script that is intended to
cause undesired effects, security breaches or damage to a system. Malicious code describes a broad category of
system security terms that includes attack scripts, viruses, worms, Trojan horses, spyware, adware, backdoors,
and malicious active content.
Types of malicious code:-
 Viruses: A computer virus is a program or piece of code that is loaded onto your computer without your
knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are
man-made.

 Adware, or advertising-supported software, is any software package which automatically
renders advertisements in order to generate revenue for its author. The advertisements may be in
the user interface of the software or on a screen presented to the user during the installation
process.
 Spyware is a type of malicious program installed on computers that collects information about
users without their knowledge. The presence of spyware is typically hidden from the user and can
be difficult to detect.
 Worms: A computer worm is a standalone malware computer program that replicates itself in
order to spread to other computers
 Trojan Horses: hide malicious intent inside a host program that appears to do something useful
 Attack scripts: programs written by experts to exploit security weaknesses, usually across the network
 Java attack applets: programs embedded in Web pages that gain foothold through a browser
 ActiveX controls: program components that allow malicious code fragment to control applications or the
OS
4. WHAT IS DIGITAL SIGNATURE? HOW IT IS OBTAINED?
A digital signature is an electronic, encrypted, stamp of authentication on digital information
such as e-mail messages, macros, or electronic documents. A signature confirms that the
information originated from the signer and has not been altered.
HOW IT IS OBTAINED?
5. WHAT IS FIREWALL? EXPLAIN
A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in
both hardware and software, or a combination of both. Firewalls are frequently used to prevent
unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All
messages entering or leaving the intranet pass through the firewall, which examines each message and blocks
those that do not meet the specified security criteria.
A firewall can either be software-based or hardware-based and is used to keep a network secure. Its
primary objective is to control the incoming and outgoing network traffic by analyzing the data packets
and determining whether it should be allowed through or not, based on a predetermined rule set. A
network's firewall builds a bridge between an internal network that is assumed to be secure and trusted,
and another network, usually an external (inter)network, such as the Internet, that is not assumed to be
secure and trusted
There are a number of firewall screening methods. A simple one is to screen requests to make
sure they come from acceptable (previously identified) domain name and Internet
Protocol addresses. For mobile users, firewalls allow remote access in to the private network by
the use of secure logon procedures and authentication certificates.
A number of companies make firewall products. Features include logging and reporting,
automatic alarms at given thresholds of attack, and a graphical user interface for controlling the
firewall.
Computer security borrows this term from firefighting, where it originated. In firefighting, a
firewall is a barrier established to prevent the spread of fire.

More Related Content

More from StudsPlanet.com

More from StudsPlanet.com (20)

Weberian model
Weberian modelWeberian model
Weberian model
 
Value orientation model
Value orientation modelValue orientation model
Value orientation model
 
Value orientation model
Value orientation modelValue orientation model
Value orientation model
 
Uk intellectual model
Uk intellectual modelUk intellectual model
Uk intellectual model
 
Trompenaars cultural dimensions
Trompenaars cultural dimensionsTrompenaars cultural dimensions
Trompenaars cultural dimensions
 
The building of the toyota car factory
The building of the toyota car factoryThe building of the toyota car factory
The building of the toyota car factory
 
The International legal environment of business
The International legal environment of businessThe International legal environment of business
The International legal environment of business
 
Textile Industry
Textile IndustryTextile Industry
Textile Industry
 
Sales
SalesSales
Sales
 
Roles of strategic leaders
Roles  of  strategic  leadersRoles  of  strategic  leaders
Roles of strategic leaders
 
Role of ecgc
Role of ecgcRole of ecgc
Role of ecgc
 
Resolution of intl commr disputes
Resolution of intl commr disputesResolution of intl commr disputes
Resolution of intl commr disputes
 
Presentation on india's ftp
Presentation on india's ftpPresentation on india's ftp
Presentation on india's ftp
 
Players in ib
Players in ibPlayers in ib
Players in ib
 
Philips case study analysis
Philips case study analysisPhilips case study analysis
Philips case study analysis
 
Performance of intl sale contract
Performance of intl sale contractPerformance of intl sale contract
Performance of intl sale contract
 
Module test mcm
Module test  mcmModule test  mcm
Module test mcm
 
Methods of facility location selection
Methods of facility location selectionMethods of facility location selection
Methods of facility location selection
 
Locational factors 2
Locational factors 2Locational factors 2
Locational factors 2
 
Location theories
Location theoriesLocation theories
Location theories
 

Recently uploaded

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Recently uploaded (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

E commerce 2008 section-b

  • 1. 2008 SECTION-B 1. DISCUSS THE ADVANTAGE OF E-BUSINESS OVER TRADITIONAL BUSINESS  With the help of E-Business one can develop a more cost-effective Communication and Marketing Strategy - The most obvious advantage of "upgrading" to e-business is that it gives you a vital web presence.  You can reach New Markets World Wide - The internet offers exciting ways of reaching new markets that could only be dreamed of in the past.  You can cut Advertising and Marketing Costs - Online advertising is not only more efficient, but it is often less expensive than traditional advertising. After sales training expenses can also be reduced by utilizing online seminars, training videos and tutorials.  You can streamline the Ordering Process by taking orders online - Implementing an online ordering system allows you to eliminate manual paper work or telephone order taking.  You don’t have to hire a fancy looking shop  You don’t have to hire salesmen  You may take orders at midnight  Another great advantage of an e-business over traditional business is that it can easily find and market to a specific niche or segment, which results in a higher conversion of sales. Traditional businesses are forced to choose correct locations to attract their desired customer base.  The most significant difference is that e-businesses cost very little upfront when compared to traditional businesses. Starting a business on the Internet does not have the burden of a physical storefront and any expenses that accompany it. 2. LIST THE COMPUTER CRIMES. DISCUSS ANY TWO OF THEM Computer crime has been defined broadly as a criminal act that has been committed using a computer as the principal tool. Some of the computer crimes are:-  Hacking  Identity theft  Internet gambling  Child pornography
  • 2. Hacking:- The word "hacking" has two definitions. The first definition refers to the hobby/profession of working with computers. The second definition refers to breaking into computer systems. While the first definition is older and is still used by many computer enthusiasts (who refer to cyber-criminals as "crackers"), the second definition is much more commonly used. In particular, the web pages here refer to "hackers" simply because our web-server logs show that everyone who reaches these pages are using the second definition as part of their search criteria. Identity theft:- The concept is simple: someone gains access to your personal information and uses it for their own benefit. This could range from a black-hat hacker stealing your online banking account login and password to getting access to your social security number and using it to pretend to be you. Such people can make themselves a lot of money with your personal information, and screw you over in the process Internet gambling:- It offers all forms of gambling to every online household 24 hours a day. Via the Internet, betters can indulge in casino-style gambling, such as blackjack, poker, slot machines and roulette. They can bet on sports, horse or dog races, lotteries, bingo, tournaments, election results, sweepstakes and more. Many observers believe that online trading in the stock market, especially so-called “day trading,” is nothing more than gambling on stock market performance. Child pornography:- It’s tragic, but the Internet is often used to exploit children. What’s perhaps even sicker is that people make money doing this. 3. EXPLAIN THE MALICIOUS CODE AND ITS TYPE Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. Malicious code describes a broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses, spyware, adware, backdoors, and malicious active content. Types of malicious code:-  Viruses: A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are man-made.   Adware, or advertising-supported software, is any software package which automatically renders advertisements in order to generate revenue for its author. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process.
  • 3.  Spyware is a type of malicious program installed on computers that collects information about users without their knowledge. The presence of spyware is typically hidden from the user and can be difficult to detect.  Worms: A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers  Trojan Horses: hide malicious intent inside a host program that appears to do something useful  Attack scripts: programs written by experts to exploit security weaknesses, usually across the network  Java attack applets: programs embedded in Web pages that gain foothold through a browser  ActiveX controls: program components that allow malicious code fragment to control applications or the OS 4. WHAT IS DIGITAL SIGNATURE? HOW IT IS OBTAINED? A digital signature is an electronic, encrypted, stamp of authentication on digital information such as e-mail messages, macros, or electronic documents. A signature confirms that the information originated from the signer and has not been altered. HOW IT IS OBTAINED? 5. WHAT IS FIREWALL? EXPLAIN A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. A firewall can either be software-based or hardware-based and is used to keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network's firewall builds a bridge between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted
  • 4. There are a number of firewall screening methods. A simple one is to screen requests to make sure they come from acceptable (previously identified) domain name and Internet Protocol addresses. For mobile users, firewalls allow remote access in to the private network by the use of secure logon procedures and authentication certificates. A number of companies make firewall products. Features include logging and reporting, automatic alarms at given thresholds of attack, and a graphical user interface for controlling the firewall. Computer security borrows this term from firefighting, where it originated. In firefighting, a firewall is a barrier established to prevent the spread of fire.