SlideShare a Scribd company logo
1 of 4
2008 SECTION-B
1. DISCUSS THE ADVANTAGE OF E-BUSINESS OVER TRADITIONAL BUSINESS
 With the help of E-Business one can develop a more cost-effective Communication and
Marketing Strategy - The most obvious advantage of "upgrading" to e-business is that it gives you
a vital web presence.
 You can reach New Markets World Wide - The internet offers exciting ways of reaching new
markets that could only be dreamed of in the past.
 You can cut Advertising and Marketing Costs - Online advertising is not only more efficient, but it
is often less expensive than traditional advertising. After sales training expenses can also be
reduced by utilizing online seminars, training videos and tutorials.
 You can streamline the Ordering Process by taking orders online - Implementing an online
ordering system allows you to eliminate manual paper work or telephone order taking.
 You don’t have to hire a fancy looking shop
 You don’t have to hire salesmen
 You may take orders at midnight
 Another great advantage of an e-business over traditional business is that it can easily find and
market to a specific niche or segment, which results in a higher conversion of sales. Traditional
businesses are forced to choose correct locations to attract their desired customer base.
 The most significant difference is that e-businesses cost very little upfront when compared to
traditional businesses. Starting a business on the Internet does not have the burden of a physical
storefront and any expenses that accompany it.
2. LIST THE COMPUTER CRIMES. DISCUSS ANY TWO OF THEM
Computer crime has been defined broadly as a criminal act that has been committed using a computer as
the principal tool.
Some of the computer crimes are:-
 Hacking
 Identity theft
 Internet gambling
 Child pornography
Hacking:-
The word "hacking" has two definitions. The first definition refers to the hobby/profession of working with
computers. The second definition refers to breaking into computer systems. While the first definition is older and
is still used by many computer enthusiasts (who refer to cyber-criminals as "crackers"), the second definition is
much more commonly used. In particular, the web pages here refer to "hackers" simply because our web-server
logs show that everyone who reaches these pages are using the second definition as part of their search criteria.
Identity theft:-
The concept is simple: someone gains access to your personal information and uses it for their own
benefit. This could range from a black-hat hacker stealing your online banking account login and
password to getting access to your social security number and using it to pretend to be you. Such people
can make themselves a lot of money with your personal information, and screw you over in the process
Internet gambling:-
It offers all forms of gambling to every online household 24 hours a day. Via the Internet, betters can indulge in
casino-style gambling, such as blackjack, poker, slot machines and roulette. They can bet on sports, horse or dog
races, lotteries, bingo, tournaments, election results, sweepstakes and more. Many observers believe that online
trading in the stock market, especially so-called “day trading,” is nothing more than gambling on stock market
performance.
Child pornography:-
It’s tragic, but the Internet is often used to exploit children. What’s perhaps even sicker is that people
make money doing this.
3. EXPLAIN THE MALICIOUS CODE AND ITS TYPE
Malicious code is the term used to describe any code in any part of a software system or script that is intended to
cause undesired effects, security breaches or damage to a system. Malicious code describes a broad category of
system security terms that includes attack scripts, viruses, worms, Trojan horses, spyware, adware, backdoors,
and malicious active content.
Types of malicious code:-
 Viruses: A computer virus is a program or piece of code that is loaded onto your computer without your
knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are
man-made.

 Adware, or advertising-supported software, is any software package which automatically
renders advertisements in order to generate revenue for its author. The advertisements may be in
the user interface of the software or on a screen presented to the user during the installation
process.
 Spyware is a type of malicious program installed on computers that collects information about
users without their knowledge. The presence of spyware is typically hidden from the user and can
be difficult to detect.
 Worms: A computer worm is a standalone malware computer program that replicates itself in
order to spread to other computers
 Trojan Horses: hide malicious intent inside a host program that appears to do something useful
 Attack scripts: programs written by experts to exploit security weaknesses, usually across the network
 Java attack applets: programs embedded in Web pages that gain foothold through a browser
 ActiveX controls: program components that allow malicious code fragment to control applications or the
OS
4. WHAT IS DIGITAL SIGNATURE? HOW IT IS OBTAINED?
A digital signature is an electronic, encrypted, stamp of authentication on digital information
such as e-mail messages, macros, or electronic documents. A signature confirms that the
information originated from the signer and has not been altered.
HOW IT IS OBTAINED?
5. WHAT IS FIREWALL? EXPLAIN
A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in
both hardware and software, or a combination of both. Firewalls are frequently used to prevent
unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All
messages entering or leaving the intranet pass through the firewall, which examines each message and blocks
those that do not meet the specified security criteria.
A firewall can either be software-based or hardware-based and is used to keep a network secure. Its
primary objective is to control the incoming and outgoing network traffic by analyzing the data packets
and determining whether it should be allowed through or not, based on a predetermined rule set. A
network's firewall builds a bridge between an internal network that is assumed to be secure and trusted,
and another network, usually an external (inter)network, such as the Internet, that is not assumed to be
secure and trusted
There are a number of firewall screening methods. A simple one is to screen requests to make
sure they come from acceptable (previously identified) domain name and Internet
Protocol addresses. For mobile users, firewalls allow remote access in to the private network by
the use of secure logon procedures and authentication certificates.
A number of companies make firewall products. Features include logging and reporting,
automatic alarms at given thresholds of attack, and a graphical user interface for controlling the
firewall.
Computer security borrows this term from firefighting, where it originated. In firefighting, a
firewall is a barrier established to prevent the spread of fire.

More Related Content

More from StudsPlanet.com

More from StudsPlanet.com (20)

Weberian model
Weberian modelWeberian model
Weberian model
 
Value orientation model
Value orientation modelValue orientation model
Value orientation model
 
Value orientation model
Value orientation modelValue orientation model
Value orientation model
 
Uk intellectual model
Uk intellectual modelUk intellectual model
Uk intellectual model
 
Trompenaars cultural dimensions
Trompenaars cultural dimensionsTrompenaars cultural dimensions
Trompenaars cultural dimensions
 
The building of the toyota car factory
The building of the toyota car factoryThe building of the toyota car factory
The building of the toyota car factory
 
The International legal environment of business
The International legal environment of businessThe International legal environment of business
The International legal environment of business
 
Textile Industry
Textile IndustryTextile Industry
Textile Industry
 
Sales
SalesSales
Sales
 
Roles of strategic leaders
Roles  of  strategic  leadersRoles  of  strategic  leaders
Roles of strategic leaders
 
Role of ecgc
Role of ecgcRole of ecgc
Role of ecgc
 
Resolution of intl commr disputes
Resolution of intl commr disputesResolution of intl commr disputes
Resolution of intl commr disputes
 
Presentation on india's ftp
Presentation on india's ftpPresentation on india's ftp
Presentation on india's ftp
 
Players in ib
Players in ibPlayers in ib
Players in ib
 
Philips case study analysis
Philips case study analysisPhilips case study analysis
Philips case study analysis
 
Performance of intl sale contract
Performance of intl sale contractPerformance of intl sale contract
Performance of intl sale contract
 
Module test mcm
Module test  mcmModule test  mcm
Module test mcm
 
Methods of facility location selection
Methods of facility location selectionMethods of facility location selection
Methods of facility location selection
 
Locational factors 2
Locational factors 2Locational factors 2
Locational factors 2
 
Location theories
Location theoriesLocation theories
Location theories
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

E commerce 2008 section-b

  • 1. 2008 SECTION-B 1. DISCUSS THE ADVANTAGE OF E-BUSINESS OVER TRADITIONAL BUSINESS  With the help of E-Business one can develop a more cost-effective Communication and Marketing Strategy - The most obvious advantage of "upgrading" to e-business is that it gives you a vital web presence.  You can reach New Markets World Wide - The internet offers exciting ways of reaching new markets that could only be dreamed of in the past.  You can cut Advertising and Marketing Costs - Online advertising is not only more efficient, but it is often less expensive than traditional advertising. After sales training expenses can also be reduced by utilizing online seminars, training videos and tutorials.  You can streamline the Ordering Process by taking orders online - Implementing an online ordering system allows you to eliminate manual paper work or telephone order taking.  You don’t have to hire a fancy looking shop  You don’t have to hire salesmen  You may take orders at midnight  Another great advantage of an e-business over traditional business is that it can easily find and market to a specific niche or segment, which results in a higher conversion of sales. Traditional businesses are forced to choose correct locations to attract their desired customer base.  The most significant difference is that e-businesses cost very little upfront when compared to traditional businesses. Starting a business on the Internet does not have the burden of a physical storefront and any expenses that accompany it. 2. LIST THE COMPUTER CRIMES. DISCUSS ANY TWO OF THEM Computer crime has been defined broadly as a criminal act that has been committed using a computer as the principal tool. Some of the computer crimes are:-  Hacking  Identity theft  Internet gambling  Child pornography
  • 2. Hacking:- The word "hacking" has two definitions. The first definition refers to the hobby/profession of working with computers. The second definition refers to breaking into computer systems. While the first definition is older and is still used by many computer enthusiasts (who refer to cyber-criminals as "crackers"), the second definition is much more commonly used. In particular, the web pages here refer to "hackers" simply because our web-server logs show that everyone who reaches these pages are using the second definition as part of their search criteria. Identity theft:- The concept is simple: someone gains access to your personal information and uses it for their own benefit. This could range from a black-hat hacker stealing your online banking account login and password to getting access to your social security number and using it to pretend to be you. Such people can make themselves a lot of money with your personal information, and screw you over in the process Internet gambling:- It offers all forms of gambling to every online household 24 hours a day. Via the Internet, betters can indulge in casino-style gambling, such as blackjack, poker, slot machines and roulette. They can bet on sports, horse or dog races, lotteries, bingo, tournaments, election results, sweepstakes and more. Many observers believe that online trading in the stock market, especially so-called “day trading,” is nothing more than gambling on stock market performance. Child pornography:- It’s tragic, but the Internet is often used to exploit children. What’s perhaps even sicker is that people make money doing this. 3. EXPLAIN THE MALICIOUS CODE AND ITS TYPE Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. Malicious code describes a broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses, spyware, adware, backdoors, and malicious active content. Types of malicious code:-  Viruses: A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are man-made.   Adware, or advertising-supported software, is any software package which automatically renders advertisements in order to generate revenue for its author. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process.
  • 3.  Spyware is a type of malicious program installed on computers that collects information about users without their knowledge. The presence of spyware is typically hidden from the user and can be difficult to detect.  Worms: A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers  Trojan Horses: hide malicious intent inside a host program that appears to do something useful  Attack scripts: programs written by experts to exploit security weaknesses, usually across the network  Java attack applets: programs embedded in Web pages that gain foothold through a browser  ActiveX controls: program components that allow malicious code fragment to control applications or the OS 4. WHAT IS DIGITAL SIGNATURE? HOW IT IS OBTAINED? A digital signature is an electronic, encrypted, stamp of authentication on digital information such as e-mail messages, macros, or electronic documents. A signature confirms that the information originated from the signer and has not been altered. HOW IT IS OBTAINED? 5. WHAT IS FIREWALL? EXPLAIN A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. A firewall can either be software-based or hardware-based and is used to keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network's firewall builds a bridge between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted
  • 4. There are a number of firewall screening methods. A simple one is to screen requests to make sure they come from acceptable (previously identified) domain name and Internet Protocol addresses. For mobile users, firewalls allow remote access in to the private network by the use of secure logon procedures and authentication certificates. A number of companies make firewall products. Features include logging and reporting, automatic alarms at given thresholds of attack, and a graphical user interface for controlling the firewall. Computer security borrows this term from firefighting, where it originated. In firefighting, a firewall is a barrier established to prevent the spread of fire.