What is E-commerce?
List five types of E-commerce and give an example for each.
E-commerce can be divided into a few main categories (3) (and sub categories)
Business:
Consumer
Government E-services
government services to the public and businesses - tenders, municipal account payments
List 5 advantages and 3 disadvantages of E-commerce
Advantages:
Disadvantages
What is E-business? Give an example.
Networks can be categorised according to the geographical area that they cover. What are the three most common networks?
What is the internet?
The internet is a global network of computers which shares and communicates information between users by means of an Internet Protocol (IP)
What is the Internet Protocol (IP)?
IP is the standard communication rules and standards to transfer data over the internet
What is the communication technology called that IP uses?
Give a brief description of it .
Each computer connected to the internet has a unique address to which information is sent to or from. What is this dress called, and give a very brief overview.
This address is called an IP address.
Just like our home address, to send or receive information over the internet, the information needs to be send to/from your the IP address.
Imagine if you had to type an IP address each time you wanted to access google (google:http://172.217.6.132/.) This would be hard to remember and use. What two things do we have in order to make this process easier? Provide full explanations of them.
a. Second Level Domains (SLD): the computer or host organisations name (eg Wits)
b. Top Level Domain (TLD): the nature or geographical location of the organisation using the address. eg; .ac or .edu -used for higher education .co.za -used for South African websites .gov -used for government organisations .org -used for non-profit organisations .net -used for network organisations
What is the World Wide Web (www) and where does it fit in?
The World Wide Web is:
What is the fundamental format of the web?
The fundamental format of the web is a text document called a web page, that has embedded Hyper Text Transfer Protocol (HTTP)
Pages are accessed via a web browser using the URL with the homepage being the point of entry.
What is the difference between an intranet and an extranet?
An intranet is a private network which is available internally to a business’s various departments and employees so that they can have access to information and share data using the internet technology. (eg a webpage of HR policies only visible to employees)
An extranet is an intranet that is accessible via access control to authorised customers, suppliers, and other parties.
the only difference is an extranet is accessible to people outside the business who have authorised use. Eg internet banking
What are email addresses and instant messaging ?
These are methods to communicate with others digitally over the internet to exchange messages which may include documents, pictures, and videos. email and instant messages are applications that run on the internet.
What is cloud computing ?
What are the three main types of cloud computing?
Why don’t all companies use cloud computing? (4 points)
What are the advantages of cloud computing? (3)
Cyber risks and security - what are business risks?
definition and 3 points
Business risk is the possibility of loss or injury that reduces or eliminates an organisations ability to achieve objectives:
What is a cyber crime?
This is a criminal action that seeks to harm the computer itself or users of a computer or network to commit a crime. Cyber crimes often affects businesses negatively both in terms of repetitional and financial damage.
What are the 5 most common cyber crimes?
IP spoofing
Denial of service attack (DoS attack)
Phishing
Computer related scams
Malware
What is IP spoofing?
This is when a hacker impersonates another user/entity by forging their IP address to seem as if the hackers IP address is that of the authorised IP address user/entity
Eg a hacker sends an email with a forged version of an IP address of a municipality department, seeking to purchase certain items. If this is not picked up, the business thinks it is legitimate and supplies the items only to find out it was not legitimate and they incur a loss.
IP spoofing can also be used to hide the identity of a DoS attacker
What is a denial of service attack (DoS)?
This is an assault on a web server to prevent it from servicing users.
This is done by sending vast amounts of messages and requests to access a business’s website/server, which slows down or crashes the site.