Problem:
(a) Distinguish between a virus, a worm, and a Trojan horse.
(b) A computer can be a target of a crime or an instrument of a crime. State three examples of each.
(c) A carefully executed information requirements gathering phase will ensure successful implementation of IS projects. Discuss.
(d) Name and describe the telecommunications applications that can provide strategic benefits to businesses.
(e) What is the significance of telecommunications deregulation for managers and organizations? Illustrate with an example.