Questions from General Supply Chain


Q: How could an auto manufacturer use transportation to increase the efficiency of

How could an auto manufacturer use transportation to increase the efficiency of its supply chain?

See Answer

Q: List and describe the most common threats against contemporary information systems.

List and describe the most common threats against contemporary information systems.

See Answer

Q: Define malware and distinguish among a virus, a worm, and

Define malware and distinguish among a virus, a worm, and a Trojan horse.

See Answer

Q: Define a hacker and explain how hackers create security problems and damage

Define a hacker and explain how hackers create security problems and damage systems.

See Answer

Q: Define computer crime. Provide two examples of crime in which computers

Define computer crime. Provide two examples of crime in which computers are targets and two examples in which computers are used as instruments of crime.

See Answer

Q: Define identity theft and phishing and explain why identity theft is such

Define identity theft and phishing and explain why identity theft is such a big problem today.

See Answer

Q: Describe the security and system reliability problems employees create.

Describe the security and system reliability problems employees create.

See Answer

Q: How powerful is Watson? Describe its technology. Why does it

How powerful is Watson? Describe its technology. Why does it require so much powerful hardware? How intelligent is Watson? What can it do? What can’t it do? What kinds of problems is Watson able to so...

See Answer

Q: Explain how software defects affect system reliability and security.

Explain how software defects affect system reliability and security.

See Answer

Q: Explain how security and control provide value for businesses.

Explain how security and control provide value for businesses.

See Answer