Question 1
Explain unintentional and intentional threats. What is the difference between them? Provide examples of each one of them.
Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
Question 2
Exchanges are sites where sellers and many buyers buy and sell. There are four major types of exchanges. List and explain these exchanges.
Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
Question 3
Compare and contrast between e-business transactions. Provide examples of each. You might need to search the CSU Online Library for external resources.
Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
Question 4
Explain why it would be important for organizations to have a business continuity plan.
Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
References:
Turban, E.&Volonino, L. (2011). Information Technology For Management: Improving Strategic and Operational Performance.Hoboken, NJ: John Wiley & Sons, Inc.
Click here for more on this paper…….








Jermaine Byrant
Nicole Johnson



