Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 2

1.Distinguish between firewall and encryption.

03

2.What steps can individuals and businesses take to make their Information System
more secure?

3. Suppose your business had an e-commerce website where it sold goods and accepted
credit card payments. Discuss the major security threats to this website and their
potential impact. What can be done to minimize these threats? 04

4. Explain Internet/e-commerce revenue models. 05

5. List any three e-commerce sites of US, Japan and UK and identify and explain the
features of those e-commerce sites.

6.List basic BI tools. Write short note on "RFM Analysis".

7.Explain any three-e-commerce process 05

8.Imagine that you are the owner of a small business. How might you use datamining
to improve your performance?
Write short note on market basket analysis.

9.Differentiate between primary key and foreign key. 04

10.Explain DBMS capabilities with some codes/commands.05

11. List and discuss the key capabilities of BI systems

12 Why are information systems so essential for running and managing a business
today?

13 What are data integrity problems and when do it happen? As a manager some data
administering tasks. Write short note on data normalization.

14 Write short note on lol and cloud computing".

15 Write short note on DRP and computer forensics.


16 Why there is a growing need for cyber security responds team? What
potentialsecurity threats do you see in the increasing use of Internet in business?
Explain.

17 List five global e-commerce platforms and explain their Internet/e-commerce


revenue models.
18 Distinguish between digital market and traditional market.

19 Write short note on "RFM Analysis" with an example.


20 Distinguish between profiling and personalizing and content and catalog
management.

21 Differentiate between spear phishing and whaling.


22 What is BI infrastructure? Write short note on encryption.
b List and discuss the key capabilities of BI system. Who are power users of BI
System? 03

23 What is moon-lighting? Why is it harmful for the organization?

You might also like