Answer:
Actions that Bobbi should take to identify opportunities for online business growth are:
Review competitor websites
Identify a USP
Build a SWOT analysis
Explanation:
The first thing Bobbi should do is to review competitor website.
This will give her information about her competitors the products that they offer, the price of their products, the website layout and structure of the competitors, any strategy they are using to boost their online product sale such as by offering product promotion, discounted price etc.
After reviewing competitor websites, next thing that Bobbi should do is identify a Unique Selling Proposition. Bobbi should identify the unique features, benefits of her products that induce her business to stand out from the competitors. Identify all those unique aspects and factors that make her product different from others.
After identifying USP, Bobbi should now build a Strengths, Weaknesses, Opportunities and Threats (SWOT) analysis. This way she will be able to recognize and understand her website's strengths, distinctive competencies, limitations, opportunities and risks. This will help her to analyse the overall strategic position of her website as well as her business. That will help her create a strategy for the future.
The available options are:
Emails
Financial spreadsheets
User downloads
Databases
Answer:
User downloads
Explanation:
The correct answer is User downloads, this is because, the downloaded files are in cloud or another website memory or database, which serves as an alternative backup already. Thus, those downloaded files can still be recovered at later time when one needs to get the files back.
However, Emails, Financial spreadsheets and Databases, do not have any other place to retrieve them, because they are originally created and are yet to be uploaded to cloud or another website memory space to serves as alternative back up.
Answer:
1. Cybercrimes are online crimes that cause loss of money some examples are: Identity fraud, Cyber bribery, Debit/credit card fr/ud, and Email fr/ud.
2. In medical offices devices linked to CT scans are able to be h/cked, there is r/nsomw/re that uses their devices. Since medic/l computers are always linked to the internet. it makes it easier for them to be h/cked. They make an employee click on an e-mail carrying m/lw/re, then the cybercrimin/ls encrypt p/tient data then dem/nd p/yment for its decryption.
3. This is a personal question but if you have ever been sc/mmed or witnessed someone being sc/mmed or almost got sc/mmed it might apply to this question
Answer:
Instead of using a key or entering a code to open a door, a user can use an object, such as an ID badge, to identify themselves in order to gain access to a secure area. What term describes this type of object?
Explanation: