A Mega File of It for Current Quizzes
-
Upload
talha-shaukat-butt -
Category
Documents
-
view
74 -
download
3
Transcript of A Mega File of It for Current Quizzes
IT430- E-Commerce
Composed By Faheem Saqib
A Mega File for Current Quizzes
For more Help Rep At
0334-6034849--0315-5502544
IT430 Final 2010 Solved with ref
Question No: 1 ( Marks: 1 ) - Please choose one
In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last …………………withdrawals to the E-bank.
► 10
► 12
► 18
► 16 P:119
Lost Coins
In case network fails or computer crashes during payment transaction, coins might be lost. All signed blinded coins from last 16 withdrawals are sent by the bank to the client. Client uses the blinding factor
Question No: 2 ( Marks: 1 ) - Please choose o ne
Which entity does not include in SET(secure Electronic Transaction)?
► Seller
► Buyer
► Payment gateway
► Bank P:122
There are four entities involved in a SET transaction – cardholder, Merchant and certification authority and payment gateway.
Question No: 3 ( Marks: 1 ) - Please choose o ne
Traditionally Marketer use the market segmentation(s) like
► Geo-graphic Segmentation
► Demographic Segmentation
► Psychographic Segmentation
► All of the above P:131
Traditionally, marketers have used three types of variables to define three different market segmentations, namely, geographic segmentation, demographic segmentation and psychographic segmentation.
Question No: 4 ( Marks: 1 ) - Please choose o ne
Class C has:
► Network 01 byte and 03 hosts
► Network 02 bytes and 02 hosts
► Network 03 bytes and 01 host P:10
► None of these
In class C, first three bytes refer to the network address and the last byte to the host
machines on that network, which would therefore be a very small network.
Question No: 5 ( Marks: 1 ) - Please choose o ne
In ring topology, failure of network cable will only take down one computer’s network access.
► True
► False
Question No: 6 ( Marks: 1 ) - Please choose o ne
Which device uses the IP address
► Switch
► Router P:16
A router is a decision making device. When a data packet arrives at a router it reads the network addresses from the IP address on the data packet and determines the shortest possible path through which this packet can be delivered to its destination.
► Repeater
► None of these
Question No: 7 ( Marks: 1 ) - Please choose o ne
What is the correct HTML for inserting an image?
► <image src="image.gif">
► <img src="image.gif"> P:21
<HTML> <BODY> <HI>On Sale Cassettes</H1> <Img Src=“cassette.gif”> </Body></HTML>
► <img href="image.gif>
► <img>image.gif</img>
Question No: 8 ( Marks: 1 ) - Please choose o ne
Cryptographic Algorithms are measured in terms of
► Key length P:108
Cryptographic algorithms are measured in terms of key length.
► Complexity
► Simplicity
► All of the above
Question No: 9 ( Marks: 1 ) - Please choose o ne
Upstream activities relate to?
► Materials/services or the input from suppliers P:155
Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities.
• Upstream activities relate to materials/services or the input from suppliers
• Internal activities relate to manufacturing and packaging of goods
• Downstream activities relate to distribution and sale of goods to distributors/customers
► Manufacturing and packaging of goods
► Distribution and sale of goods to distributors/customers
► Input from suppliers and Distribution
Question No: 10 ( Marks: 1 ) - Please choose one
Television, radio and print media are in a (n) ……………………. Mode.
► Passive P:139
Emotional branding vs. rational branding
In case of television, radio or print media people are normally in a passive mode. To a greater extent they do not control the communication channel and thus have to listen or view the advertisement about a brand.
► Active
► Static
► Dynamic
Question No: 11 ( Marks: 1 ) - Please choose one
Which of the following Barriers to International E-Commerce?
► Advertising
► Patents
► Infrastructure P:161
Barriers to International e-commerce
Barriers to international ecommerce include lack of trust, lack of infrastructure, language and culture.
► Capital
Question No: 12 ( Marks: 1 ) - Please choose one
Exclusive right granted by law to make, use and sell an invention. What is called?
► Parasites
���������Trade mark
������������������Patent infringement P:181
Patent infringement
A patent is an exclusive right granted by law to make, use and sell an invention. In order to be patentable, the invention must be unique, genuine, and useful according to the prevalent technological standards.
���������Copyright
Question No: 13 ( Marks: 1 ) - Please choose one
Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act.
Which legal issue arises due to such acts?
► Cyber Crimes
► Online Defamation P:182
Online Defamation
A defamatory statement is a false statement that injures the reputation of on another person or company. If a statement injures the reputation of a product or service instead of a person, it is called product disparagement.
► Cyber squatting
► None
Question No: 14 ( Marks: 1 ) - Please choose one
Characterization and Clustering belong to which of the following types of Data Mining?
► Additive
► Predictive
► Selective
► Descriptive P:141
Types of Data Mining
There are four main types of data mining as follows:
• Classification
• Association
• Characterization
• Clustering
Classification and association are predictive types of data mining while characterization and clustering represent the descriptive type.
Question No: 15 ( Marks: 1 ) - Please choose one
EDI stands for……..
► Electronic Digital Information
► Electronic Data Integration
► Electronic Data Interchange P:147
Lesson 36
ELECTRONIC DATA INTERCHANGE (EDI)
► All of these
Question No: 16 ( Marks: 1 ) - Please choose one
Implementing Value Chain model can help us to…
► Reduce cost
► Improve quality of products
► Create new ways of selling products
► All of these. P:153
Examining value chains one finds that EC can help in four different ways as follows:
It can reduce costs of a business;
It can improve quality of products
It can help in reaching new customers or suppliers;
It can create new ways of selling products.
Question No: 17 ( Marks: 1 ) - Please choose one
Following are malicious programs EXCEPT ----------------- .
► Back doors
► Trojan Horses
► Firewalls P:96
Lesson 21
FIREWALLS
A firewall is a combination of hardware and software that sits between the internet and internal network of an organization to protect the network from outside attack (Fig. 1). It can examine the data entering or leaving from the network and can filter the data according to certain rules, thus, protects the network from an attack.
► Worms
Question No: 18 ( Marks: 1 ) - Please choose one
Which of the following is a valid variable name?
► 6th_student_CGPA
► first_student_CGPA P:54
Rules for variables
Variable names can begin with an uppercase letter (A-Z), lower case letter (a-z), an underscore character (_), or dollar sign ($). Remaining characters can be any of the above or from digits (0-9). In JavaScript variables are case sensitive.
► last student CGPA
► *any_student_CGPA
Question No: 19 ( Marks: 1 ) - Please choose one
Which of the following payment mode does not require customer to
pay interest to the bank on each transaction?
► Credit card
► Debit card P:110
Note that in case of a credit card the issuer bank charges interest from the client at a specified rate on the amount lent. On the other hand, in case of a debit card no such interest is payable since the customer uses his/her own money in that case.
► Electronic check
► All of the above
Question No: 20 ( Marks: 1 ) - Please choose one
FVIPSS stands for _________.
► First Virtual Internet Payment System Server P:110
First Virtual InternePayment System Server
► First Virtual International Payment System Server
► First Virtual International Payment System Services
► First Virtual Internal Payment System Services
Question No: 21 ( Marks: 1 ) - Please choose one
Which e-business helps to improve policies, procedures, customer services, and general operations of other businesses?
► Online shopping malls.
► Selling intellectual property online.
► Online service providers. P:129
Online Service Providers
These e-businesses help improve policies, procedures, customer service and general operations of other businesses. They can provide consultancy / professional services, for example, web site development services, online legal consultancy services etc.
► Online automotive sites and energy online.
Question No: 22 ( Marks: 1 ) - Please choose one
Which of the following is NOT an identified behavioral mode of customers on the web?
► Browsers
► Buyers
► Shoppers
► Seller
Behavioral segmentation
Creation of separate experiences for customers based on their behavior is called
Three identified behavioral modes of the customers on the web are:
• Browsers – customers who just browse through the site with no intention of buying
• Buyers – customers who are ready to buy right away
• Shoppers – customers who are motivated to buy but want more information
Question No: 23 ( Marks: 1 ) - Please choose one
Downstream activities relate to distribution and sale of goods to distributors/customers
► True P:155
Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities.
• Upstream activities relate to materials/services or the input from suppliers
• Internal activities relate to manufacturing and packaging of goods
• Downstream activities relate to distribution and sale of goods to distributors/customers
► False
Question No: 24 ( Marks: 1 ) - Please choose one
Online banking is a substitute of tradition banking. Is it?
► True
► False
Question No: 25 ( Marks: 1 ) - Please choose one
-------------means services in relation to the transformation of contents of an electronic
Document from its original form to one that cannot be understood or decoded by any unauthorized person
► Cryptography services P:163
“‘Cryptography services’ means services in relation to the transformation of contents of an electronic document from its original form to one that cannot be understood or decoded by any unauthorized person”.
► Accredited Certification Service Provider’
► Originator
► Addressee
Question No: 26 ( Marks: 1 ) - Please choose one
Law is broadly divided into two classes on the basis of nature of wrong, namely, ------------ and ---------------
► Civil law and criminal law P:176
Law is broadly divided into two classes on the basis of nature of wrong, namely, civil law and criminal law. Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Civil wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general.
► ETO and criminal law
► Supreme and Civil Law
► None
Question No: 27 ( Marks: 1 ) - Please choose one
Each layer except ………… has got a header.
► Physical layer P:05
Header is a piece of information which is attached to the data at its beginning by each layer except the physical layer. The process of moving the data down the OSI Protocol.
► Datalink layer
► Session layer
► Network layer
Question No: 28 ( Marks: 1 ) - Please choose one
Symmetric algorithms are faster than asymmetric?
► true P:105
The advantage of using symmetric key is that since symmetric algorithms are faster as compared to asymmetric, therefore, the encryption of a message with the symmetric key takes place quickly.
► false
Question No: 29 ( Marks: 1 ) - Please choose one
SET was developed in _____.
► 1996
► 1997 P:122
Secure Electronic Transaction (SET)
The drawback in SSL that the credit card/debit card information remains with the merchant led to the development of a more sophisticated protocol called SET. It was developed in 1997 jointly by Visa, MasterCard, Netscape and Microsoft.
► 1998
► 1999
Question No: 30 ( Marks: 1 ) - Please choose one
LDA stands for _______
► Lahore Development Authority P:165
A statutory body is a body/organization established under some statute/law. For example, the Lahore Development Authority (LDA) is a statutory body established under the Lahore Development Act, 1975 (a provincial statute).
► Lahore Development Act
Question No: 31 ( Marks: 2 )
What is Data Mining? P: 140
Data Mining
Data Mining can be defined as the task of discovering interesting patterns from large amounts of data, where the data can be stored in databases, data warehouses, or other information repositories. Data mining has a lot of business application in today’s world. We can identify the behavior of our customers and can effectively target them with personalized messages using data mining techniques.
Assume that there is a shopping store where the data/information about customers has been recorded /stored over a period of time. Using a data mining technique on the customers’ data, certain pattern can be generated that can provide useful information. For example, this pattern may tell us that people having a certain demographic profile (age over 20 years and sex male) coming from a particular location have shown inclination to buy computer related items. It is an interesting clue for the marketers.
Question No: (Marks: 2 )
What is the purpose of FRAMESET tag? P: 31
<Frameset> and <Frame> are the two basic tags. This concept uses two different types of pages –
Frameset page and content pages. Frameset page divides the browser window into a set of frames and defines the size of each frame. It also specifies which content pages are displayed in which frame. It has nobody section (no body tag). Content pages are just regular HTML pages.
Question No: 33 (Marks: 2 )
What do we mean by "Free-Trial" promotion technique? P: 133
Promotions
E-business promotions can attract visitors to your site and induce them to purchase. Promotional messages can be sent both online and offline.
Free-trials
Customers can sign up for a free service. For example, they can be allowed to download software for certain days free of cost on trial basis before buying it.
Question No: 34 (Marks: 2 )
What is UNCITRAL?
Most of the countries have, by now, made laws providing recognition to electronic documents an electronic signature. They have basically followed a model law on e-commerce proposed by a U.N. body called UNCITRAL (United Nations Commission on International Trade Law) in 1996.
On analysis, appears that ETO has certain deficiencies. For instance, difference between an electronic signature and an advanced electronic signature is not clear. Sections dealing with the offences of violation of information a privacy and damage to information /informational systems are too broadly worded, which may lead to confusion. International aspects of e-commerce such as recognition of the foreign certificates and electronic signatures etc. are missing.
Question No: 35 (Marks: 3 )
Write precisely about the 4th stage of planning cycle? P:159
Strategic Planning Cycle
E-business competitive strategy is normally formed and implemented according to a planning cycle which is called strategic planning cycle.
There are four stages in this planning cycle
1. Industry and Competitive Analysis Strategy 2. Formulation 3. Implementation 4. Performance Assessment or Strategy Reassessment
The 4th stage is Performance Assessment or Strategy Reassessment
Strategy assessment:
Results of implementation plan are monitored and assessed so that any corrective measures or expansion plan can take place. Basically, you want to assess whether your strategy has delivered what it was supposed to deliver; whether your strategy is still viable/workable in the ever changing environment. In strategy assessment phase, you can learn from your mistakes and do your future planning. In case your EC project has been a failure, you can identity the problems and try to remove them. Some of the corrective measures can be to property train your web team, establish or review your security or privacy policy, review or reassess your web design content, reconsider your marketing plan etc. For the strategy assessment, you can conduct surveys, collect information and receive feedback from different groups of people so that you have solid input from people coming from a variety of background. Sometimes, you have to entirety give up a particular strategy you followed and formulate a new strategy or set of strategies in light of the company’s main objective or its mission.
Question No: 36 (Marks: 3 )
Discuss the role and responsibilities of “Transport layer” in OSI model?
Transport layer
TCP (Transmission Control Protocol) or UDP (User Datagram Protocol) operate at this layer. It has two functions. It converts the data into data packets. Secondly, it is
responsible for flow control of data. TCP is more reliable as it is acknowledgment based as opposed to UDP which does not use any system of acknowledgment for the delivery of data packets.
Question No: 37 (Marks: 3 )
How lack of trust barrier can be overcome or minimized? Discuss it briefly
Lack of Trust
It is very important for online businesses to establish trusting relationships with their customers like in the physical world where companies ensure that customers know who they are. However, it is difficult to build trust because a kind of anonymity exists for companies trying to establish web presence. Lack of trust barrier can be overcome or minimized:
• A plan for establishing credibility of an online business is extremely crucial for its success.
• In this behalf, attention to the needs of the site visitors is very important while designing the web site, since it can be helpful in building trust with customers. For instance, there should be easy to find web pages that answer questions of the visitors.
• Note that companies with established brands can build trust for online business more quickly as compared to a new company/business without reputation, since a brand conveys expectations about how the online business would behave. For example, how the seller online business would react to a claim of refund by the customer.
Question No: 38 (Marks: 3 )
Write the names of companies who were helper in developing Secure Electronic Transaction.
Secure Electronic Transaction. (SET)
It was developed in 1997 jointly by Visa, MasterCard, Netscape and Microsoft.
Question No: 39 (Marks: 5 )
Differentiate between Cyber squatting and concurrent use with example. P: 181
Cyber squatting
The act of intentionally registering domain names containing trademarks/trade names of prominent companies to later blackmail or demand ransom from those companies is called cyber squatting.
Example:
Assume there is a firm ‘Glory Enterprise’ and it wants to have its web site. It also wants to have the word ‘glory’ as a part of its domain name because for years it has been recognized in the physical world through this word. However, at the time of registration of its domain name it finds that a person Mr. ‘A’ who has nothing to do with the business of the firm or the word ‘glory’ has already registered a domain name containing this word as a part of it. Since there cannot be two similar domain names, the firm is forced to request Mr. ‘A’ to transfer that domain name to it. In response, if Mr. ‘A’ blackmails or claims ransom from the said firm, he would be said to have committed cyber squatting. Concurrent use
This problem arises when two organizations have apparently legitimate claim to use the same domain name but cannot do so due to the uniqueness of domain names.
Example:
Suppose, there is a company manufacturing electronic goods and another company selling French fries. Under the traditional trade mark law both these companies can have the same trade mark/trade name such as ‘frys’. The problem arises when both apply for the registration of a domain name containing the word ‘frys’. Here, both are legitimate claimants of this domain name but due to the element of uniqueness of domain names only
one of them can be assigned the desired domain name.
Question No: 40 (Marks: 5 )
Explain ‘Confidence’ and ‘Support’ as two measures of Association? P: 144
CONFIDENCE AND SUPPORT
There are two terms/measures used in association, that is, support and confidence. Confidence’ is a measure of how often the relationship holds true e.g, what percentage of time did people who bought milk also bought eggs. Support means what is the percentage of two items occurring together overall. Mathematically, they can be expressed as follows if we take the example of eggs and milk:
Confidence = Transactions (eggs + milk)
Transactions (eggs or milk or both)
In case no. of transactions involving eggs and milk are 25 and those involving eggs or milk or both are 75
then confidence is 25/75*100=33.3%
Support = Transactions (eggs + milk)
Total no. of transactions
In case no. of transactions involving eggs and milk are 10 and total no. of transactions in a day is 50 then
support is 10/50*100 = 20%
Suppose if confidence is 90% but the support is 5%., then we can gather from this that the two items have very strong affinity or relationship with each other such that when an item is sold the other is sold together, However, the chance of this pair being purchased out of the total no. of transactions is very slim, just 5%. One can adjust these measures to discover items having corresponding level of association and accordingly set marketing strategy. So, if I feed the data to the association mining tool and specify the percentage of confidence and support, it will list down the items that have association
corresponding to these percentages. Results of association mining are shown with the help of double arrows as indicated below:
Bread Å----Æ Butter
Computer Å----Æ Furniture
Clothes Å----Æ Shoes
Using the result of association mining, a marketer can take a number of
useful steps to set or modify marketing strategy. For example, items that
have closeness/affinity with each other can be shelved together to improve
customer service. Certain promotional schemes can be introduced in view
of the association mining result etc.
FINALTERM EXAMINATION
Fall 2009
IT430- E-Commerce
Question No: 1 ( Marks: 1 ) - Please choose one
In
case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed
coins from last …………………withdrawals to the E-bank.
► 10 Correct
► 12
► 18
► 16
Question No: 2 ( Marks: 1 ) - Please choose o ne
In
Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT
included:
► Buyer Accounts identifier
► Buyer password Correct
► Address of Merchant
► Actual amount of money in favor of merchant
Question No: 3 ( Marks: 1 ) - Please choose o ne
Which 5th P introduced by E-business in Marketing Mix?
► Proper coverage
► Personalized Services Correct
► Proper access
► Personal style
Question No: 4 ( Marks: 1 ) - Please choose o ne
Creation of separate experiences for customers based on their behavior is called
► Demographic segmentation
► Behavioral segmentation Correct
► Geo-Graphic Segmentation
► None of the above
Question No: 5 ( Marks: 1 ) - Please choose o ne
Call
handling, sales tracking and Transaction support(technology / personnel) activities are included in which
management system
► Customer Relationship Management system
► Public relation management system
► Inventory management system Correct
► Data Base Management system
Question No: 6 ( Marks: 1 ) - Please choose o ne
Network addresses 128--- 191 range belongs to which of the following class networks?
► A
► B
► C Correct
► E
Question No: 7 ( Marks: 1 ) - Please choose o ne
What is the correct HTML for making a text input fi eld?
► <textinput type="text">
► <input type="text">
► <input type="textfield"> Correct
► <textfield>
Question No: 8 ( Marks: 1 ) - Please choose o ne
What is the correct HTML for making a hyperlink?
► <a href="http://www.w3schools.com">W3Schools</a>
► <a name="http://www.w3schools.com">W3Schools.com</a> Correct
► <a url="http://www.w3schools.com">W3Schools.com</a>
► <a>http://www.w3schools.com</a>
Question No: 9 ( Marks: 1 ) - Please choose one
DOS is a type of attack and it stands for:
► Denial of Services Correct
► Digital Operation Services
► Dynamic Object Solution
► All of these
Question No: 10 ( Marks: 1 ) - Please choose one
An electronic check contains a(n)………………… to the payer’s bank to make a specified payment to the payee
► Serial#
► Private key
► Instruction
► All of the above Correct
Question No: 11 ( Marks: 1 ) - Please choose one
What is a E-Cash wallet ?
► Hardware
► Agent
► Software
► All of the above Correct
Question No: 12 ( Marks: 1 ) - Please choose one
Internal activities relate to?
► Materials/services or the input from suppliers
► Manufacturing and packaging of goods Correct
► Distribution and sale of goods to distributors/customers
► Input from suppliers and Manufacturing
Question No: 13 ( Marks: 1 ) - Please choose one
Customer data can be gathered and analyzing it customers can be served in a better
Manner according to their needs, Which is best option?
► Customization
► Customer orientation
► Customer satisfaction
► Focus Correct
Question No: 14 ( Marks: 1 ) - Please choose one
Popular software packages for personal finance is(are):
► Quicken
► MS Money
► Money 2003
► All of these Correct
Question No: 15 ( Marks: 1 ) - Please choose one
An
array can contain ----------.
► only text
► only numbers
► only numbers or text Correct
► any valid variable
Question No: 16 ( Marks: 1 ) - Please choose one
You
define a method using
► obj.method Correct
► obj.method[]
► obj.method()
► obj-method
Question No: 17 ( Marks: 1 ) - Please choose one
Which of them is NOT an attribute of border?
► border-width
► border-style
► border-pattern Correct
► border-bottom-color
Question No: 18 ( Marks: 1 ) - Please choose one
If a
key is 4 bits in length, how many unique key values are possible?
► 4
► 8
► 16 Correct
► 32
Question No: 19 ( Marks: 1 ) - Please choose one
PKI
stands for ___________.
► Public Key Instrument
► Public Key Information
► Public Key Instruction
► Public Key Infrastructure Correct
Question No: 20 ( Marks: 1 ) - Please choose one
Which of the following payment system does not involve the use of encryption?
► Electronic check
► Electronic cash
► Virtual PIN
► None of above Correct
Question No: 21 ( Marks: 1 ) - Please choose one
ACH
is a centralized system used by electronically inter-connected banks for clearing payment requests.
► True Correct
► False
Question No: 22 ( Marks: 1 ) - Please choose one
Cyber wallet can automatically assemble the correct payment and pay it too.
► True Correct
► False
Question No: 23 ( Marks: 1 ) - Please choose one
In E-
Cash Payment system, merchant deposits the coins in the bank to check the ______ of coins.
► Number
► Validity Correct
► Private key
► Sender
Question No: 24 ( Marks: 1 ) - Please choose one
SET
transactions are slower than SSL.
► True Correct
► False
Question No: 25 ( Marks: 1 ) - Please choose one
Which of the following is an advantage of electronic catalogue?
► Large fix cost if used for small no. of products.
► Ability of updating product information. Correct
► Need for customer skill of computers and browsers.
► Difficult to develop catalogue.
Question No: 26 ( Marks: 1 ) - Please choose one
Suppose you are running a business. You want to target customers of age less than 30 years. Which type
of segmentation would you use?
► Demographic Segmentation Correct
► Geographic Segmentation
► Psychographic segmentation
► Behavioral segmentation
Question No: 27 ( Marks: 1 ) - Please choose one
Data cleaning means ________.
► Adding missing values
► Correction of erroneous values
► Both of above Correct
► None of above
Question No: 28 ( Marks: 1 ) - Please choose one
Online banking is a substitute of tradition banking. Is it?
► True
► False Correct
Question No: 29 ( Marks: 1 ) - Please choose one
IT/EC can reduce the overall ------------- and afford to keep the price of
the product relatively low
► Production cost Correct
► Marketing cost
► Distribution cost
► None
Question No: 30 ( Marks: 1 ) - Please choose one
Which organization is used to supervise the task of registration of domain names worldwide?
► ICCAN
► ICAAN Correct
► IICAN
► None of the given
Question No: 31 ( Marks: 1 )
What stands for CRM?
Ans:
CUSTOMER RELATIONSHIP MANAGEMENT (CRM)
Question No: 32 ( Marks: 1 )
Here
is an e-coin minted by the bank with 2 dollar key.
)(mod.#)(mod)#.( 22222 mrSerialmrSerial dedde =
If the bank had signed the same coin with 3 dollar key, what would be the resulting e-coin?
Question No: 33 ( Marks: 2 )
Briefly describe analytical attack on public key algorithms.
Analytical Attacks
These attacks are some fundamental flaws in the mathematical problems on which the encryption system itself is based.
A branch, Quantum computing is the branch of computer science that deals with the development of cryptographic algorithms. It can also be used to find flaws in the cryptographic system/algorithms and to launch attacks.
Question No: 34 ( Marks: 2 )
Do
you agree that Differentiate a product in terms of quality of service is one of the role of e-commerce
in Competitive Strategy. Discuss briefly
Question No: 35 ( Marks: 3 )
Digital signatures are considered more reliable than paper signatures. Do you agree with this
statement? Briefly justify your answer. 1+2
Ans:
Yes, digital signature is more reliable than paper signature. Because digital signature contain more
information than paper.
Question No: 36 ( Marks: 3 )
What is clustering? Briefly explain with help of ex ample. 1+2
This is a group of data objects that are similar to another within the same cluster and are dissimilar to the objects in other clusters. For example, web usage of different categories or list of email addresses in data base.
Question No: 37 ( Marks: 3 )
Point out the certain deficiencies in ETO?
ETO stands for Electronic Transactions Ordinance
Question No: 38 ( Marks: 5 )
Explain the advantages of E-business regarding toda y’s scenario.
Advantages of E-business
Personalized service
Product, place, price and promotion are generally recognized as the 4 P’s of marketing in relation to
Traditional offline businesses. However, personalization is the 5th ‘P’ added to the other 4 P’s when we are discussing about an e-business. By using internet data we can gather information for database and make personalized data for services.
High-quality customer service
By getting online suggestion we can improve our quality.
No inventory cost
In such there is no warehouse is required therefore inventory cost is very low. Because we take order from client and fulfill it by procuring from open market.
Worldwide reach of your business
An online business can work anywhere in world. This is a good concept of Global business.
Electronic catalogues
Electronic cards and catalogues are used to enhance the procedure for customers.
Therefore, online shopping can be done more quickly and in a more convenient environment.
Question No: 39 ( Marks: 5 )
List
down three Supporting activities with examples as d iscussed by Michael Porter in a strategic business unit.
Ans;
1- Human Resource – This is referred to activities that are coordination of management employees e.g. staffing, compensation and benefits.
2- Financial And Administration - It is relating to paying bills, accounting.
3- Technology Department – It is used for improvement of product and services for best selling the product. E.g. improvement of field tests, process improvement studies.
Question No: 40 ( Marks: 10 )
How anonymity is ensured in E-Cash payment system? Explain with the help of examples.
Ans:
In E cash payment system, anonymity means that the identity of client or customer will not be disclosed.
In this payment mechanism, there are two stages,
1- Minting Stage 2- Deposit Stage
1- At minting stage e- cash bank signed the serial no. to provide the third part of valid coin. But at this stage bank actually knows that who are amongst its different account holders whose are requesting for the banks signature on the serial no, but it does not mean that it knows the serial no, it is just a blinding factor due to signing.
2- This is reverse to minting stage. In this case we sent the coins toe- cash bank to check the validity. In this case bank know the serial no. but this time doesn’t know the client who sent these for payment purpose. Because the bank may have issued the coins to many clients and bank at deposit stage doesn’t know who did shopping and making payment now.
So, the relationship between the client and the serial no. is broken
at the minting and deposit stage to ensure anonymity of the client.
So if we summarize it then as follows
Minting Stage
Serial number is unknown
Client is known
Deposit Stage
Serial no. is known
Client is unknown
------------------------------------------------------------------------------------------------
Question No: 41 ( Marks: 10 )
Differentiate between the centralized electronic payment system and electronic checks.
Centralized Electronic Payment System
Electronic Check
In an electronic check, information contains are that instruction to the payer’ bank to make a specific payment to payee.
This concept is launched by Financial Services Technology Consortium (FSTC). It is a group of US banks.
In this system two types of cryptography are used
1- Symmetric 2- Asymmetric
Certificates are issued to both parties in standard format by their respective banks and these are issued to check the digital signature on the check. These certificates may have some restrictions on the certificates like, max check value, or currencies allowed etc.
This check book device is a combination of hardware and software. In hardware a smart card may be used. It is like s credit cad. Certain information are provided on the card and one secrete key is also issued.
Centralized Electronic Payment System
This is a popular payment system on the internet. In this both the payer and the payee
hold accounts at the same centralized on-line financial institution. Many payment systems use this approach e.g., PayPal, E-gold, Billpoint, Cybergold, Yahoo! Pay Direct, Amazon.com Payments etc
On-line opening/ of one’s account is done in a centralized bank using credit/debit card. To make payment an account holder is authenticated using an account identifier and a password, account identifier of the payee and the payment amount.
In this system, payee is notified by their account statement y phone sms or email.
The centralized bank charges a transaction fees either from the payer, or payee
or both on funding an account or withdrawing funds from an account or receiving payments by the
payee. This payment model requires that all participants must have their account with the same central payment system/bank. Note that the payee can eventually withdraw the money received in hi account in the centralized bank through Automated Clearing House (ACH).
IT430 Final 2010
Question No: 1 ( Marks: 1 ) - Please choose o ne
In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last …………………withdrawals to the E-bank.
► 10
► 12
► 18
► 16
Ref: Page # 119
Lost Coins
In case network fails or computer crashes during payment transaction, coins might be lost. All signed blinded
coins from last 16 withdrawals are sent by the bank to the client
Question No: 2 ( Marks: 1 ) - Please choose o ne
www.amzon.com as you all familiar with it.
Which of the following loyalty stages its customers are:
( Who don’t know about it): Detail about amzon.com )
"Amazon was one of the first major companies to sell goods by Internet, and was an iconic "stock in which to invest" of the late 1990s dot-com bubble. Jeff Bezos founded Amazon.com, Inc. in 1994, and launched it online in 1995. Amazon.com started as an on-line bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3 format, computer software, , etc. Amazon has established separate websites in Canada, the United Kingdom, Germany, France, China, and Japan. It also provides global shipping to certain countries for some of its products. "
► Awareness
► Exploration
► Familiarity
► Commitment
Page # 136http://vugoogle.com/
Awareness
This is the first stage where customers recognize the name of the company or any of its products. However,
they have never interacted with the company before. A company/business can achieve this level by properly
advertising its brand.
Question No: 3 ( Marks: 1 ) - Please choose o ne
Customer Loyalty model is also called
► Customer Life Cycle
► Customer Segmentation
► Customer Awareness
► All of the options
Page # 136--137
Question No: 4 ( Marks: 1 ) - Please choose o ne
Which of the following is True for Class B:
► Network 01 byte and 03 hosts
► Network 02 bytes and 02 hosts
► Network 03 bytes and 01 host
► None of these
Page # 10
In class B, the first two bytes indicate the network address and the last two bytes indicate the host machines
on that network
Question No: 5 ( Marks: 1 ) - Please choose o ne
RIP(Routing Information protocol) is used by---------- , to build a ------------ table
► bridges , hash
► routers, matrix
► routers , routing
► All of these
Page # 16
A router can communicate with another router on the internet with the help of Routing Information
Protocol, and thus it can build a routing table.
Question No: 6 ( Marks: 1 ) - Please choose o ne
Switch is used on the layer
► First Layer
► Second Layer
► Third Layer
► None of these
Ref: IT430 1 st assignment solution file uploaded by instructor.
Question No: 7 ( Marks: 1 ) - Please choose o ne
Router is used on the layer
► First Layer
► Second Layer
► Third Layer
► None of these
Ref: IT430 1 st assignment solution file uploaded by instructor.
Question No: 8 ( Marks: 1 ) - Please choose o ne
In HTML If you leave out the setting for scrolling what will happen?
► No scrollbar will appear even if needed.
► A scrollbar will always be present.
► A scrollbar will appear if needed.
► All options.
SCROLLING – this attribute determines whether a scroll bar appears with a frame (e.g,
Scrolling=“yes” in the <frame> tag makes it appear)
Question No: 9 ( Marks: 1 ) - Please choose o ne
Which one of the following attacks does not include in the attacks on Symmetric key
► Key search attack
► Cryptanalysis
► System based attacks
► Organization attacks
Page # 108
Attacks on Symmetric Key Algorithms
Following attacks have been reported on symmetric key algorithms:
Key Search Attacks
Cryptanalysis
System-based Attacks
http://vugoogle.com/
Question No: 10 ( Marks: 1 ) - Please choose one
What is a E-Cash wallet ?
► Hardware
► Agent
► Software
► All of the above
Page # 116
Buyers withdraw coins against their account and store them in e-cash wallet software (Cyber wallet) on their
computer. Cyber wallet stores and manages coins and records every transaction.
Question No: 11 ( Marks: 1 ) - Please choose one
It is the ability to sell the goods or provide the service at a price that is lower than that of competitors, and thus attract more customers.
What is called?
► Cost leadership
► Price leadership
► Focus
► Differentiation
Ref: PAGE # 157
Cost leadership:
It is the ability to sell the goods or provide the service at a price that is lower than that of
competitors, and thus attract more customers.
http://vugoogle.com/
Question No: 12 ( Marks: 1 ) - Please choose one
Meta tag contains:
► User information
► seller information
► web page key information
► bank information
Ref: PAGE # 138
META INFORMATION:
You know that a Meta tag contains the key information of a web page.
Question No: 13 ( Marks: 1 ) - Please choose one
In many countries, stealing and misusing of meta information for getting competitive advantage is considered as an offence known as
► Tort of Private Nuisance
► Tort of Tress passing
► Tort of passing off
► Defamation
Ref: PAGE # 138
In many countries, stealing and misusing Meta information in this manner to gain
business/competitive advantage is considered as an offence known as the tort of passing-
off.
Question No: 14 ( Marks: 1 ) - Please choose one
Which of the following is NOT force of Porter’s competitive rivalry Model?
► Threat of potential/new entrants
► Threat of substitute
► Differentiation and cost leadership
► Competition between existing players
Page # 158
Threat of potential/new entrants to the sector
Threat of substitute product or service in the existing trade
Bargaining power of the buyers
Bargaining power of the suppliers
Competition between existing players
Question No: 15 ( Marks: 1 ) - Please choose one
Exclusive right granted by law to make, use and sell an invention. What is called?
► Parasites
► Trade mark
► Patent infringement
► Copyright
Ref: PAGE # 181
Patent infringement:
A patent is an exclusive right granted by law to make, use and sell an invention. In
order to be patentable, the invention must be unique, genuine, and useful according to the
prevalent technological standards.
Question No: 16 ( Marks: 1 ) - Please choose one
GM Celebes manufacturing electronic goods and FryChips co selling French fries. Under the traditional trade mark law both these companies can have the same trade mark/trade name such as ‘frys’.
The problem arises when both apply for the registration of a domain name containing the word ‘frys’. Here, both are legitimate claimants of this domain name but due to the element of uniqueness of domain names only one of them can be assigned the desired domain name.
Which legal issue arises in this situation?
► Domain name conflict
► Cyber squatting
► Concurrent use
► None
Ref: PAGE # 181
Concurrent use
This problem arises when two organizations have apparently legitimate claim to use
the same domain name but cannot do so due to the uniqueness of domain names.
Suppose, there is a company manufacturing electronic goods and another company
selling french fries. Under the traditional trade mark law both these companies can
have the same trade mark/trade name such as ‘frys’. The problem arises when
both apply for the registration of a domain name containing the word ‘frys’. Here,
both are legitimate claimants of this domain name but due to the element of
uniqueness of domain names only one of them can be assigned the desired domain
name.
Question No: 17 ( Marks: 1 ) - Please choose one
ANSI stands for ……….
► American National Standards Institute
► All Network Standards Institute
► American New standards Institute
► Australia National standards Institute
Page # 147
ANSI (American National Standards Institute)
Question No: 18 ( Marks: 1 ) - Please choose one
Which of the following company develop ERP soft wares?
► SAP
► Oracle
► JD Edward
► All of these
Page # 150
SAP is an example of ERP software. ERP is complex. It is not intended for public consumption as proper
integration of ERP with ecommerce applications is still a major problem.
Question No: 19 ( Marks: 1 ) - Please choose one
Company collecting information assumes that the customer does not object to a specific use of information unless the customer specifically denies the permission. Thus, the company may use the collected information for its own purpose, as well as, sell or rent it out to other firms or persons.
Which of the following Approach it is using?
► Opt-inout
► Opt-out
► Swap-out
► Opt-in
Page # 183
opt-out approach, the company collecting information assumes that the customer does not object to a
specific use of information unless the customer specifically denies the permission. Thus, the company may
use the collected information for its own purpose, as well as, sell or rent it out to other firms or persons.
Question No: 20 ( Marks: 1 ) - Please choose one
What does ++ operator do?
► Adds two numbers together
► Joins two text strings together
► Adds 1 to a number
► Adds 2 to a number
Page # 58
Operators in java script
Mathematical operators ‘+’ For addition of two values ‘-‘ for subtraction of two values ‘*’ for multiplication
‘/’ for division ‘%’ modulus (for calculating the remainder) ‘++’ for increment ‘--‘ for decrement Logical
operators ‘&&’ for logical and ‘||’ for logical or ‘!’ for logical not
Question No: 21 ( Marks: 1 ) - Please choose one
A paper signature is believed to be more reliable than a digital signature.
► True
► False
Ref: PAGE # 106
A digital or electronic signature is believed to be more reliable as compared to
paper signatures because it is not ordinarily possible to copy or forge an electronic/digital
signature. But, that is very much possible in case of paper signatures.
Question No: 22 ( Marks: 1 ) - Please choose one
Job searchers can search for jobs and employers can hire effectively using _____________.
► Online recruiting web sites.
► Online banking web sites.
► Online trading and lending web sites.
► Online news services web sites.
Ref: PAGE # 128
Online Recruiting:
Employers can recruit and job searchers can search for jobs effectively through online
recruiting web sites.
Question No: 23 ( Marks: 1 ) - Please choose one
Suppose you want to search from Virtual University’s database that how many students have taken MBA in a specific semester. In this scenario, which type of data mining you are using?
► Classification
► Association
► Characterization
► Clustering
Page # 144
Characterization
It is discovering interesting concepts in concise and succinct terms at generalized levels for examining the
general behavior of the data. For example, in a database of graduate students of a university the students of
different nationalities can be enrolled in different departments such as music history, physics etc. We can
apply characterization technique to find a generalized concept/answer in response to the question that how
many students of a particular country are studying science or arts
Question No: 24 ( Marks: 1 ) - Please choose one
For example, white color denotes purity in Europe and America but is associated with death and mourning in china and some Asian countries. Similarly, a web page divided
into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death .
Which of the following barrier involve in above example
► Culture
► Language
► Trust
► Infrastructure Issues
Page # 162
For example, white color denotes purity in Europe and America but is associated with death and mourning in
china and some Asian countries. Similarly, a web page divided into four segments can be unpleasant to a
Japanese visitor because no. four is a symbol of death in that culture.
Question No: 25 ( Marks: 1 ) - Please choose one
-------------means services in relation to the transformation of contents of an electronic
document from its original form to one that cannot be understood or decoded by any unauthorized person
► Cryptography services
► Accredited Certification Service Provider’
► Originator
► Addressee
Page # 163
“‘Cryptography services’ means services in relation to the transformation of contents of an electronic
document from its original form to one that cannot be understood or decoded by any unauthorized person”.
Question No: 26 ( Marks: 1 ) - Please choose one
“Risk Management “ is the part of which activity?
► E-business
► E-commerce
► E-marketing
► All of the given
Question No: 27 ( Marks: 1 ) - Please choose one
Which type of algorithm is used by virtual pin system for encryption?
► DES (Data Encryption Standard)
► IDEA (International Data Encryption Algorithm)
► Rinjdael
► Non of above
Page # 110
Virtual PIN system does not involve the use of encryption.
Question No: 28 ( Marks: 1 ) - Please choose one
Which one is not the life cycle stage of the customer relation?
► Awareness
► Exploration
► Familiarity
► Cancelation
Page # 136
Question No: 29 ( Marks: 1 ) - Please choose one
Popular EDI documents formatting standards _______
X12 ►
EDIFACT ►
X12 ► and EDIFACT
None ►
Page # 147
EDI documents are formatted using published standards. Two popular EDI standards are - ANSI
(American National Standards Institute) X12 standard and EDIFACT (United Nations Standard of
Electronic Data Interchange for Administration, Commerce and Transport).
Question No: 30 ( Marks: 1 ) - Please choose one
LDA stands for _______
Lahore ► Development Authority
Lahore ► Development Act
Page # 165
For example, the Lahore Development Authority (LDA) is a statutory body established under the
Lahore Development Act, 1975 (a provincial statute).
Question No: 31 ( Marks: 2 )
What is meant by EDI?
Question No: 32 ( Marks: 2 )
What do we mean by “Affiliation” between two parti es? Explain shortly.
Question No: 33 ( Marks: 2 )
Write HTML code for two input fields, one for Login Name and other for Password.
Question No: 34 ( Marks: 2 )
What term/matters does the concurrent legislative list sets out according to (ETO) 2002?
Question No: 35 ( Marks: 3 )
Describe the importance of Customer Relationship Management (CRM) in current scenario.
Question No: 36 ( Marks: 3 )
In ETO, what are functions of Accredited Certification Service Provider?
Question No: 37 ( Marks: 3 )
How many legislative list(s) is(are) in Constitution of Islamic Republic of Pakistan at end?
Question No: 38 ( Marks: 3 )
Write short note on Packet Filter Firewall?
Question No: 39 ( Marks: 5 )
Discuss briefly how companies are getting competi tive advantage over the other organizations through differentiation and focus?
Question No: 40 ( Marks: 5 )
Write a short note on the following Global legal issues (Marks: 2.5+2.5=5)
1. Territorial Jurisdiction
2. Online contracts
FINALTERM EXAMINATION
Spring 2009
IT430- E-Commerce (Session - 3)
Ref No: 17
Time: 120 min
Question No: 1 ( Marks: 1 ) - Please choose one
At
minting stage, the serial number is ……………..by E-Cashbank
► Known
► Unknown
► Secret
Secret
► Forwarded
Forwarded
Question No: 2 ( Marks: 1 ) - Please choose o ne
SET
and SSL both are same with respect to security.
► True
► False
Question No: 3 ( Marks: 1 ) - Please choose o ne
Advertising Supported Revenue Model includes
► Yahoo portal
► Employment sites
► Newspaper Publishers
► All of the above
Question No: 4 ( Marks: 1 ) - Please choose o ne
Advertising Subscription Mixed Revenue Model includes
► Online journals
► Sports information services
► Business week online
► All of the above
Question No: 5 ( Marks: 1 ) - Please choose o ne
Let
us, suppose that you have hosted your e-commerce website,
When you provide “opt-in e-mail” option to your customers on your website and customer opt for it ,
what does it mean to receive ?
► Information about product through advertisement
► Information about product through e-mail
► Information about services available on it
► Information about News through e-mail.
Question No: 6 ( Marks: 1 ) - Please choose o ne
What does Telemarketing means?
► Marketing through charting
► Marketing through telephone
► Marketing through email
► Marketing through web casting
Question No: 7 ( Marks: 1 ) - Please choose o ne
Visitor’s location, IP address, time of visit related information are added, in which of the following
► call handling files
► cookies
► log files
► Data mining files.
Question No: 8 ( Marks: 1 ) - Please choose o ne
HTML stands for ?
► Hyper Text Marked Language
► Hyper Text Markup Language
► Hyper Text Member License
► None of these
Question No: 9 ( Marks: 1 ) - Please choose o ne
For
which one of the following,<MARQUEE ...> tag can work better
► News headlines
► Announcements
► Sound pulgin
► Movie controls
Question No: 10 ( Marks: 1 ) - Please choose one
Which of the following ,in Javascript, we could not create our own?
► Textboxes
► Dropdown
► Object
► Image
Question No: 11 ( Marks: 1 ) - Please choose one
How do you write a conditional statement for executing some statements only if "i" is equal to 5?
► if i=5
► if i=5 then
► if i==5 then
► if (i==5)
Question No: 12 ( Marks: 1 ) - Please choose one
Which one of the following ,is the correct way to declare a JavaScript array?
► var txt = new Array="tim","kim","jim"
► var txt = new Array(1:"tim",2:"kim",3:"jim")
► var txt = new Array("tim","kim","jim")
► var txt = new Array:1=("tim")2=("kim")3=("jim")
Question No: 13 ( Marks: 1 ) - Please choose one
Upstream activities relate to?
► Materials/services or the input from suppliers
► Manufacturing and packaging of goods
► Distribution and sale of goods to distributors/customers
► Input from suppliers and Distribution
Question No: 14 ( Marks: 1 ) - Please choose one
Downstream activities relate to?
► Materials/services or the input from suppliers
► Manufacturing and packaging of goods
► Distribution and sale of goods to distributors/customers
► Manufacturing and Distribution
Question No: 15 ( Marks: 1 ) - Please choose one
Porter’s Model helps a firm to identify threats to its competitive position and to devise plans including
the use of IT and e-commerce to protect or enhance that position.
► True
► False
Question No: 16 ( Marks: 1 ) - Please choose one
A
company collecting information assumes that the customer does not object to a specific use of
information unless the customer specifically denies the permission. Thus, the ompany may use the
collected information for its own purpose, as well as, sell or rent it out to other firms or persons.
Which of the following Approach it is using?
► Opt-inout
► Swap-out
► Opt-in
► Opt-out
Question No: 17 ( Marks: 1 ) - Please choose one
Which type of Data Mining contains the elements as Support and confidence?
► Classification
► Association
► Characterization
► Clustering
Question No: 18 ( Marks: 1 ) - Please choose one
In which type of data mining, Apriori algorithms is used?
► Classification
► Association
► Characterization
► Clustering
Question No: 19 ( Marks: 1 ) - Please choose one
How
do you define a numerical value?
► var mynum = new Math;
► var mynum = Math(6);
► var mynum = 6;
► Math.mynum = 6;
Question No: 20 ( Marks: 1 ) - Please choose one
Which CSS property controls the text size?
► font-style
► text-style
► font-size
► text-size
Question No: 21 ( Marks: 1 ) - Please choose one
Which of the following is a function of Cyberwallet?
► Store coins
► Manage Coins
► Record transactions
► All of above
Question No: 22 ( Marks: 1 ) - Please choose one
Which model allows the users to log-on on a website and assume the role of bidder or seller?
► Online Banking.
► Storefront Model.
► E-Learning.
► Auction Model.
Question No: 23 ( Marks: 1 ) - Please choose one
Job
searchers can search for jobs and employers can hire effectively using _____________.
► Online recruiting web sites.
► Online banking web sites.
► Online trading and lending web sites.
► Online news services web sites.
Question No: 24 ( Marks: 1 ) - Please choose one
Which of these is a rule about bondage or affinity of two items such that if one item is purchased, the other is purchased too?
► Classification
► Association
► Characterization
► Clustering
Question No: 25 ( Marks: 1 ) - Please choose one
Electronic banking is also known as __________.
► Cyber banking
► Virtual banking
► Online banking
► All of above
Question No: 26 ( Marks: 1 ) - Please choose one
Identify the necessary aspect for a business to work to establish long term relationship with at least small number
of capable suppliers.
► Supply chain management
► Demand chain management
► Ultimate consumer orientation
► None of the given
Question No: 27 ( Marks: 1 ) - Please choose one
IT/EC can reduce the overall ------------- and afford to keep the price of
the product relatively low
► Production cost
► Marketing cost
► Distribution cost
► None
Question No: 28 ( Marks: 1 ) - Please choose one
------
-------means services in relation to the transformation of contents of an electronic
document from its original form to one that cannot be understood or decoded by any unauthorized
person
► Cryptography services
► Accredited Certification Service Provider’
► Originator
► Addressee
Question No: 29 ( Marks: 1 ) - Please choose one
Criminal wrongs such as breach of contract are deemed to violate only the rights of individuals and not
the society in general
► True
► False
Question No: 30 ( Marks: 1 ) - Please choose one
A ……. Is a group of data objects that are similar to one another in each group?
► Character
► Classification
► Association
► Cluster
Question No: 31 ( Marks: 1 )
What stands for CRM?
CRM stands for costumer relationship management.
Question No: 32 ( Marks: 1 )
What are the three attacks on symmetric key algorithms? Write names only.
1. Key Search Attacks
2. Cryptanalysis
3. System-based Attacks
Question No: 33 ( Marks: 2 )
What is ONLINE BANKING?
Online banking provides services to the customers through internet including services of electronic
funds transfer.
Question No: 34 ( Marks: 2 )
Define these two terms plaintiff and defendant?
The person who files a lawsuit are called plaintiff. And the person against whom it is filed is called
defendant.
Question No: 35 ( Marks: 3 )
How
lack of trust barrier can be overcome or minimized? Discuss it briefly
Online companies must establish a trust relationship with its costumers, because as we know that there
is a gap that we feel that web based companies are not present in physical. There for web businesses
the trust must be present between costumer and sellers.
Question No: 36 ( Marks: 3 )
What do we mean by internet-based EDI? Briefly explain how could it be used as substitute of VAN? (1 + 2)
Internet can support EDI in a variety of ways. Internet e-mail can be used as EDI message transport
mechanism in place of having a VAN. An extranet can be created with the trading partner allowing a
partner to enter information in the fields of web forms which correspond to the fields of EDI message.
Also, web-based EDI hosting service can be utilized through web-based EDI software.
Question No: 37 ( Marks: 3 )
Briefly explain how does the bank check validity of e-coins when merchant sends them for deposit?
Coins used in the payment are encrypted with bank’s public key, preventing the merchant to view them.
Payment information is forwarded to the bank with encrypted coins during merchant’s deposit. Only
hash of the order description is included in payment information preventing the bank from knowing the
order details.
Question No: 38 ( Marks: 5 )
Describe the advantages and disadvantages of Virtual PIN.(2.5+2.5)
Advantages and disadvantages of Virtual PIN:
Simplicity and no encryption is the biggest advantage of this payment system, which means that no
special software is needed at the frond end. This payment system is good for low-cost information
items. Therefore, it is suitable for buying online articles, journals, music. Where the cost of the items is
not much. In that eventuality, only sales are lost rather than actual financial loss to the merchant if there
is a fraud. In other words, only some extra copies of the information items are made in case of a fraud.
On the other hand merchant is exposed too much greater financial loss if the purchase relates to the
actual physical goods. One of the disadvantages of this payment model is that pre-registration of the
buyer and the merchant with FV is mandatory in this set up. Moreover, maintaining a bank account (in
case of merchant) and having a credit card (in case of a buyer) is also essential part of this system. One
can say that the merchant side is less secured in the transaction because the goods are delivered by the
merchant before the payment is actually received. The popularity of this payment system declined after
1998 mainly because of the introduction and development of encryption based payment mechanisms.
Question No: 39 ( Marks: 5 )
Differentiate between Cyber squatting and concurrent use with example.
Cyber squatting:
The act of intentionally registering domain names containing trademarks/trade names of prominent
companies to later blackmail or demand ransom from those companies is called cyber squatting. It is
regarded as an offence in most countries. Assume there is a firm ‘Glory Enterprise’ and it wants to have
its web site. It also wants to have the word ‘glory’ as a part of its domain name because for years it has
been recognized in the physical world through this word. However, at the time of registration of its
domain name it finds that a person Mr. ‘A’ who has nothing to do with the business of the firm or the
word ‘glory’ has already registered a domain name containing this word as a part of it. Since there
cannot be two similar domain names, the firm is forced to request Mr. ‘A’ to transfer that domain name
to it. In response, if Mr. ‘A’ blackmails or claims ransom from the said firm, he would be said to have
committed cyber squatting.
Concurrent use:
This problem arises when two organizations have apparently legitimate claim to use the same domain
name but cannot do so due to the uniqueness of domain names. Suppose, there is a company
manufacturing electronic goods and another company selling French fries. Under the traditional trade
mark law both these companies can have the same trade mark/trade name such as ‘fry’s’. The problem
arises when both apply for the registration of a domain name containing the word ‘fry’s’. Here, both are
legitimate claimants of this domain name but due to the element of uniqueness of domain names only
one of them can be assigned the desired domain name.
Question No: 40 ( Marks: 10 )
How strategies are formulated and implemented? Explain it with real world example.
Strategy Formulation:
Based upon this study of internal and external business environment and in light of a company’s
strengths and weaknesses, a competitive business strategy is formed. It may be a strategy of cost
leadership, product differentiation or focus. One can also identify ways how information technology
can be used to implement/enforce such strategy.
Strategy Implementation:
In the implementation stage, you build a plan to identify steps needed to put the strategy into
action and practically take those steps. For example, where your strategy is to pursue differentiation
in terms of quality of service by using/arranging a web-based call centre through which the
customers can immediately register their complaints; then you will have to select appropriate
individuals who are suitable for the job in the implementation stage. Creating a web team and
defining the role of each member of the team is a critical component of implementation stage. For
example, you define that this person would be the team leader; this would be in the technical staff,
or the management staff. Note that involvement of key persons from marketing, accounting,
finance, human resource, IT, customer relations etc. will be important in decision marking as to how
a particular implementation plan can be executed. A strategic plan can be at times initially
implemented in terms of a pilot project before launching it to a full scale. For example, an
automobile manufacturer in America had implemented a plan/scheme which allowed the potential
customers to have scheduled test drives before buying a particular car. Initially, this scheme was
introduced to four American states but later it was implemented all over the country. Another point
is to consider whether you should build your own infrastructure for execution or outsource the task
of execution of a strategic plan. For example, where a strategic plan requires a particular web
design, you can either mange your own team of web designers or outsource this task to an outside
firm having expertise in this area.
Question No: 41 ( Marks: 10 )
How
can you define the concept of cyber banking? How it takes place? What is its important role in E-Commerce? (3+2+5)
Electronic banking, also known as cyber banking, virtual banking, home banking and online banking,
includes various banking activities conducted from home, business, or on the road, instead of at a
physical bank location.
Important roles of cyber banking in e-commerce.
1. Get current account balances at any time
2. Obtain credit card statements
3. Pay utility bills
4. Download account information
5. Transfer money between accounts
6. Send e-mail to your bank
7. Manage your own schedule
8. Handle your finances from any location
9. Apply for loans online
FINALTERM EXAMINATION
Fall 2009
IT430- E-Commerce (Session - 1)
Question No: 1 ( Marks: 1 ) - Please choose one
Key
version represents public key by
► Buyer
► Seller
► E-Bank
► Certification Authority
Question No: 2 ( Marks: 1 ) - Please choose one
SSL
stands for
► Secure Socket Layer
► Security Service Layer
► Sub Secured Length
► None of these
Question No: 3 ( Marks: 1 ) - Please choose one
How
many kinds of Web Portals are?
► 3
► 2
► 5
► 6
Question No: 4 ( Marks: 1 ) - Please choose one
Brick
and Mortar refers to
► Offline business
► Online business
► Transport
► Building
Question No: 5 ( Marks: 1 ) - Please choose one
Digital Content Revenue Model Includes
► Legal information services
► Online journals
► Online Libraries
► All of the above
Question No: 6 ( Marks: 1 ) - Please choose one
Which of following marketing campaigns are cheap an effective way to target potential customers?
► Sale forces
► Media promotion
► Marketing software
Question No: 7 ( Marks: 1 ) - Please choose one
What does Telemarketing means?
► Marketing through charting
► Marketing through telephone
► Marketing through email
► Marketing through web casting
Question No: 8 ( Marks: 1 ) - Please choose one
Which of following services build a strong customer loyalty towards company and its products?
► Customer services
► Public relations(PR)
► Bulletin board
► Exhibitions.
Question No: 9 ( Marks: 1 ) - Please choose one
Track the customers online and do personalization is only possible through which of the following file(s)
analysis.
► log files
► cookie
► data mining
► log files and cookies.
Question No: 10 ( Marks: 1 ) - Please choose one
Which of the following is true for Class A:
► Network 01 byte and 03 hosts
► Network 02 bytes and 02 hosts
► Network 03 bytes and 01 host
► None of these
Question No: 11 ( Marks: 1 ) - Please choose one
What is the correct HTML for making a text input field?
► <textinput type="text">
► <input type="text">
► <input type="textfield">
► <textfield>
Question No: 12 ( Marks: 1 ) - Please choose one
IIS stands for:
► International Information Service
► Internet Information Server
► Internet Information standards
► All of these
Question No: 13 ( Marks: 1 ) - Please choose one
The payer and the payee are issued digital certificates in ………… standard format by their respective
banks.
► X. 509
► F. 609
► L.8999
► N.586
Question No: 14 ( Marks: 1 ) - Please choose one
What is a E-Cash wallet ?
► Hardware
► Agent
► Software
► All of the above
Question No: 15 ( Marks: 1 ) - Please choose one
An E-cash coin consists of element (s) like:
► Serial # provided by client
► Key version
► Serial# signed by E-cash bank
► All of the above
Question No: 16 ( Marks: 1 ) - Please choose one
What is Ultimate consumer orientation?
► Primary objective of supply chain is to help each company to meet needs of the consumer at the
end of supply chain.
► Secondary Primary objective of supply chain is to help each company to meet needs of the
consumer at the end of supply chain.
► Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of
supply chain.
► None of them
Question No: 17 ( Marks: 1 ) - Please choose one
Customer data can be gathered and analyzing it customers can be served in a better
Manner according to their needs, Which is best option?
► Customization
► Customer orientation
► Customer satisfaction
► Focus
Question No: 18 ( Marks: 1 ) - Please choose one
A
company ABC web page divided into four segments can be unpleasant to a Japanese visitor because
no. four is a symbol of death in that culture.
Which is the international barrier it is having?
► Culture
► Language
► Lack of trust
► Infrastructure
Question No: 19 ( Marks: 1 ) - Please choose one
Exclusive right granted by law to make, use and sell an invention. What is called?
► Parasites
► Trade mark
► Patent infringement
► Copyright
Question No: 20 ( Marks: 1 ) - Please choose one
Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to
be professionally incompetent and negligent. This doctor may then file a lawsuit against that person
claiming that his reputation has been injured due to such an act.
Which legal issue arises due to such acts?
► Cyber Crimes
► Online Defamation
► Cyber squatting
► None
Question No: 21 ( Marks: 1 ) - Please choose one
How
can you reference part of a string?
► text.substr(5,6);
► text.part(5,6)
► text.piece(5,6)
► text.split(5,6);
Question No: 22 ( Marks: 1 ) - Please choose one
This
is an example of
► 0-tier architecture
► 1-tier architecture
► 2-tier architecture
► n-tier architecture
Question No: 23 ( Marks: 1 ) - Please choose one
Following are the names of some well known e-commerce software, EXCEPT ----------- .
► Intershop
► IBM's WebSphere Commerce Professional Edition
► Microsoft Commerce Server 2002
► Microsoft SQL Server 2005
Question No: 24 ( Marks: 1 ) - Please choose one
In
Style Sheets, How do you change the font of an element?
► font-face:
► font:
► font-family:
► font-style:
Question No: 25 ( Marks: 1 ) - Please choose one
A
paper signature is believed to be more reliable than a digital signature.
► True
► False
Question No: 26 ( Marks: 1 ) - Please choose one
The
serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the
___________.
► Client
► Bank
► Merchant
► None of above
Question No: 27 ( Marks: 1 ) - Please choose one
SET
doesn’t require special software on the client or merchant side.
► True
► False
Question No: 28 ( Marks: 1 ) - Please choose one
The
result of OLAP is displayed in the form of a __________.
► Data square
► Data Triangle
► Data cube
► Data circle
Question No: 29 ( Marks: 1 ) - Please choose one
Classification and Association belong to which of the following types of Data Mining?
► Selective
► Predictive
► Descriptive
► Additive
Question No: 30 ( Marks: 1 ) - Please choose one
Which one of the following algorithms does not include in public key algorithms?
► DSS
► RSA
► Elliptic Curves
► RC4
Question No: 31 ( Marks: 1 )
What is a basic purpose of payment gateway in SET transactions? Explain shortly.
Question No: 32 ( Marks: 1 )
‘Provide after sales service and support’ is one of the areas in a strategic business unit according to
Michael Porter. List what kind of activities is performed in this area?
Question No: 33 ( Marks: 2 )
What do we mean by “Affiliation” between two parties? Explain shortly.
Question No: 34 ( Marks: 2 )
Discuss briefly how a software developer who releases annual updates of his software can reduce the
price of his product and increase sales revenue in an E- Commerce environment.
Question No: 35 ( Marks: 3 )
Under Section 21 of the ETO, the funds of the Certification Council shall comprise of:?
Question No: 36 ( Marks: 3 )
What is business promotion? Briefly explain any two methods of business promotion. 1+2
Question No: 37 (Marks: 3 )
How
does the client purchase from merchant using E-Cash Payment system? Show the payment request
format.
Question No: 38 ( Marks: 5 )
Explain the advantages of E-business regarding today’s scenario.
Question No: 39 ( Marks: 5 )
Elaborate the importance of OLAP in decision making support for an organization.
Answer: Online Analytical Processing (OLAP) uses knowledge for the purpose of presenting data at
different levels of abstraction. It is different from data mining as it does not help in making predictions.
But data can be viewed and reviewed in many different ways for decision making purpose. The result is
showed in form of a data cube.
Question No: 40 ( Marks: 10 )
What elements should we consider for global marketing of e-businesses? Describe briefly.
Question No: 41 ( Marks: 10 )
Give
an example to show how members of supply chain can work together to reduce inventory, increase
quality of product, reduce production cost and increase process speed.
FINALTERM EXAMINATION
Fall 2009
IT430- E-Commerce (Session - 1)
Question No: 1 ( Marks: 1 ) - Please choose o ne
Browser is installed at :
► Client side machine ► Web server machine
► none ► both Client and Server Machines
Question No: 2 ( Marks: 1 ) - Please choose o ne
Key version represents public key by
► Buyer ► Seller
► E-Bank ► Certification Authority
Question No: 3 ( Marks: 1 ) - Please choose o ne
In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT included:
► Buyer Accounts identifier ► Buyer password
► Address of Merchant ► Actual amount of money in favor of merchant
Question No: 4 ( Marks: 1 ) - Please choose o ne
To overcome the lack of physical proximity appearance problem in e-business, which technology is going to be used
► Biometrics ► Video conferencing
► Cryptography ► Biometrics and Video conferencing
Question No: 5 ( Marks: 1 ) - Please choose o ne
Dividing the potential customers into groups is called
► Market Segmentation ► Market Promotion ► Market Research ► Market Survey
Question No: 6 ( Marks: 1 ) - Please choose one
Traditionally Marketer use the market segmentation(s) like
► Geo-graphic Segmentation ► Demographic Segmentation
► Psychographic Segmentation ► All of the above
Question No: 7 ( Marks: 1 ) - Please choose o ne
In…………………, there is no direct contact with the end users.
► B2B ► B2C ► C2C ► All above options
Question No: 8 ( Marks: 1 ) - Please choose o ne
Allocation of MAC addresses is administered by --------------------------
► ICAAN ► ISO ► IEEE ► None
Question No: 9 ( Marks: 1 ) - Please choose o ne
As a Web developer you can define a style sheet for?
► HTML elements and apply to many Web pages.
► A HTML element and apply to single Web page.
► A HTML element and apply to many Web pages.
► HTML elements and apply to one Web page.
Question No: 10 ( Marks: 1 ) - Please choose one
What shall come in blanks for proper result,
Here blanks are numbered with 1,2 and 3
<html>
<head>
<SCRIPT language="JavaScript">
Var num1, var num2
Document.container .result.value=parseFloat(num1)-parseFloat(num2)
</script>
</head>
<body>
<FORM name=”---------1-----------”>
<input type=”----------2-------” name=”-------3---------” maxlength=”5”>
</form>
</body>
</html>
► container, text and result
► result, value and container
► container , button and value
► result, container and text
Question No: 11 ( Marks: 1 ) - Please choose one
What does XML stand for?
► eXtra Modern Link ► X-Markup Language
► eXtensible Markup Language ► Example Markup Language
Question No: 12 ( Marks: 1 ) - Please choose one
Cryptographic Algorithms are measured in terms of
► Key length ► Complexity
► Simplicity ► All of the above
Question No: 13 ( Marks: 1 ) - Please choose one
-----------means that your product/service has certain quality that makes it more attractive than the one offered by your competitor, despite the price of your competitor’s product/service is somewhat lower
► Differentiation ► Focus
► Cost leadership ► None of them
Question No: 14 ( Marks: 1 ) - Please choose one
Customer data can be gathered and analyzing it customers can be served in a better
Manner according to their needs, Which is best option?
► Customization ► Customer orientation
► Customer satisfaction ► Focus
Question No: 15 ( Marks: 1 ) - Please choose one
Characterization and Clustering belong to which of the following types of Data Mining?
► Additive ► Predictive
► Selective ► Descriptive
Question No: 16 ( Marks: 1 ) - Please choose one
In which type of data mining, ID3 algorithms is used?
► Classification ► Association
► Characterization ► Clustering
Question No: 17 ( Marks: 1 ) - Please choose one
ANSI stands for ……….
► American National Standards Institute ► All Network Standards Institute ► American New standards Institute
► Australia National standards Institute
Question No: 18 ( Marks: 1 ) - Please choose one
Who is making the Web standards?
► International Standard Organization
► ANSI ► Microsoft ► The World Wide Web Consortium
Question No: 19 ( Marks: 1 ) - Please choose one
Which of following is NOT an attribute of <AREA> tag?
► shape ► circle ► href ► coords
Question No: 20 ( Marks: 1 ) - Please choose one
Which of the following is an advantage of symmetri c algorithms?
► Symmetric algorithms are faster
► Symmetric algorithms don't include any encryption
► Symmetric algorithms are slow in nature
► None of above
Question No: 21 ( Marks: 1 ) - Please choose one
What is the right sequence of steps in Electronic Check process?
► Payee’s bank → Payer’s bank → Payee → Payer.
► Payer’s bank → Payee → Payee’s bank → Payer.
► Payer’s bank → Payee’s bank → Payer → Payee.
► Payer → Payee → Payee’s bank → Payer’s bank.
Question No: 22 ( Marks: 1 ) - Please choose one
The key feature of E-Cash Payment system is ______ ____.
► Simplicity ► Anonymity ► Availability ► Connectivity
Question No: 23 ( Marks: 1 ) - Please choose one
In storefront e-business model buyers and sellers interact ___________ with each other.
► Directly. ► Indirectly ► Through a third party ► None of above.
Question No: 24 ( Marks: 1 ) - Please choose one
Customers grouped by variables such as social class, personality or approach to life or lifestyle, is called ___________.
► Demographic Segmentation. ► Geographic Segmentation.
► Psychographic segmentation . ► Behavioral segmentation.
Question No: 25 ( Marks: 1 ) - Please choose one
According to Michael Porter, “material handling” is an example of primary activity in a strategic business unit. Identify the area in which this task is performed.
► Identify customers ► Market and sell
► Deliver’ activities relate to storage ► Purchase materials and supplies
Question No: 26 ( Marks: 1 ) - Please choose one
According to Michael Porter, “fabricating” is an example of primary activity in a strategic business unit. Identify the area in which this task is performed.
► Market and sell ► Deliver’ activities relate to storage
► Purchase materials and supplies ► Manufacture product or create service
Question No: 27 ( Marks: 1 ) - Please choose one
Electronic banking is also known as __________.
► Cyber banking ► Virtual banking
► Online banking ► All of above
Question No: 28 ( Marks: 1 ) - Please choose one
Classification and Association belong to which of the following types of Data Mining?
► Selective ► Predictive ► Descriptive ► Additive
Question No: 29 ( Marks: 1 ) - Please choose one
Web catalogue revenue model includes
► Online sellers of computer ► Gifts, flowers, clothes
► Journals ► Both first & second options
Question No: 30 ( Marks: 1 ) - Please choose one
In which type of approach, we sum up and integrate the information in a particular dimension to show the result?
► Dice ► Drill down ► Roll up ► Slice
Question No: 31 ( Marks: 1 )
What is Strategic Planning Cycle?
E-business competitive strategy is normally formed and implemented according to a planning cycle which is called strategic planning cycle.
Question No: 32 ( Marks: 1 )
In Pakistan, which is the apex court? Name only.
Supreme Court of Pakistan.
Question No: 33 ( Marks: 2 )
What is the purpose of SETCo?
SETCo. is a company formed to lead the implementation and promotion of SET specifications It ensures that the vendors of SET software comply with the requirements laid down by its originators. A merchant holds certificate from card brand indicating that the merchant is authorized to accept credit card payment. The customer holds certificate from the card issuing bank. SETCo acts as a root certification authority in the certification hierarchy.
Question No: 34 ( Marks: 2 )
Is Delivery activity in Strategic business Unit identified as supporting activity and why?
Question No: 35 ( Marks: 3 )
Elaborate data mining advantages in business applications.
Question No: 36 ( Marks: 3 )
Write precisely about the 4th stage of planning cycle?
The 4th stage of planning cycle is strategy assessment. In this stage results of implementation plan are monitored and assessed so in this way corrective measures can be planned. Actually, we want to asses that weather our strategy has delivered what it supposed to deliver, whether our strategy is still workable in changing environment. In strategy assessment portion, we can learn from our mistakes and can do our future planning. In case of e-commerce project has been a failure, we can easily identify the problems and can try to remove them, for the strategy assessment, we can conduct surveys, collect information and receive feedback.
Question No: 37 ( Marks: 3 )
How does the client purchase from merchant using E -Cash Payment system?Show the payment request format.
Question No: 38 ( Marks: 5 )
What do you perceive by Value Added Network? Explain its advantages too with reference to EDI. (2+3)
Value Added Network are third party networks that provide services to execute authorized transactions with valid trading partners using EDI (Electronic Data Interchange). Each VAN (Value Added Network) has a centralized computer system that maintains two files for each user that are Postbox and Mailbox.
Value Added Network’s advantages with reference to EDI:
Advantages of using a VAN in EDI are time independence and protocol independence. Time
independence means that the sending and receipt of the interchange or messages can be carried out at the convenience of the users involved. Thus, they are not required to be connected with each other at the same time. Protocol independence means that interchanges are re-enveloped with the transmission protocol appropriate to the recipient when they are retrieved from the postbox by the VAN. Thus, a VAN can provide protocol compatibility between the sender and the recipient, wherever that is missing.
Question No: 39 ( Marks: 5 )
What is market research? Describe any three possib le methods of conducting market research. 2+3
It consists of interviews, paper and phone surveys based on past investigations, actually the basic purpose of market research is to find strengths, weaknesses, opportunities and threats of our business and our competitor business. In this way we can compare our business conditions with our competitor. In case of online businesses, market research is much faster and easy than offline businesses. Market research is much beneficial for any business.
Three possible methods of conducting market researc h:
Questionnaires
Interviews
Phone and Paper surveys
Question No: 40 ( Marks: 10 )
How e-cash payment system is applied on the web? Explain with the help of diagram.
Question No: 41 ( Marks: 10 )
Briefly explain Territorial jurisdiction with the help of example ,Ho territory is important for a court to file a case?
Territorial jurisdiction refers to the legal right of a court of a particular area/territory to entertain and decide a case. ETO says that courts in Pakistan shall have jurisdiction or authority to decide any matter that relates to persons or information systems or events in Pakistan and covered by the terms of the Ordinance. Assume that someone from England accesses an information system in Pakistan and deletes or modifies the data of a person contained therein without any authority, then this act may be treated as an offence under the ETO and Pakistani courts would have jurisdiction to try such a matter.
The jurisdiction to try offences under the ETO is vested with the session courts in Pakistan. Law is broadly divided into two classes on the basis of nature of wrong, namely, civil law and criminal law. Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Civil wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general. On the other hand, a criminal wrong (crime) is an act deemed by law to be harmful to the society in general such as theft or murder etc. and the state itself is a party in such matters.
There are different forms of jurisdiction. Territorial jurisdiction refers to the competence of a court to decide a case on the basis of certain geographical area/territory. So, if a dispute arises in Karachi, the courts in Karachi would only have territorial jurisdiction, and the case cannot be filed in Islamabad or Lahore. Ordinarily, territorial jurisdiction lies where the defendant resides or carries on business or the cause of action has wholly or partly arisen or the immoveable property is situated (in case the matter relates to land etc.).
FINALTERM EXAMINATION Fall 2009
IT430- E-Commerce (Session - 1) (Courtesy xclus!vely m3)
Question No: 1 ( Marks: 1 ) - Please choose one Key version represents public key by ► Buyer ► Seller ► E-Bank ► Certification Authority Question No: 2 ( Marks: 1 ) - Please choose one SSL stands for ► Secure Socket Layer ► Security Service Layer ► Sub Secured Length ► None of these Question No: 3 ( Marks: 1 ) - Please choose one How many kinds of Web Portals are? ► 3 ► 2 ► 5 ► 6 Question No: 4 ( Marks: 1 ) - Please choose one Brick and Mortar refers to ► Offline business ► Online business ► Transport ► Building Question No: 5 ( Marks: 1 ) - Please choose one Digital Content Revenue Model Includes ► Legal information services ► Online journals ► Online Libraries ► All of the above Question No: 6 ( Marks: 1 ) - Please choose one Which of following marketing campaigns are cheap an effective way to target potential customers? ► Sale forces ► E-mail ► Media promotion ► Marketing software Question No: 7 ( Marks: 1 ) - Please choose one What does Telemarketing means? ► Marketing through charting ► Marketing through telephone ► Marketing through email ► Marketing through web casting Question No: 8 ( Marks: 1 ) - Please choose one Which of following services build a strong customer loyalty towards company and its products? ► Customer services ► Public relations(PR) ► Bulletin board ► Exhibitions. Question No: 9 ( Marks: 1 ) - Please choose one Track the customers online and do personalization is only possible through which of the following file(s) analysis. ► log files ► cookie ► data mining ► log files and cookies. Question No: 10 ( Marks: 1 ) - Please choose one Which of the following is true for Class A: ► Network 01 byte and 03 hosts ► Network 02 bytes and 02 hosts ► Network 03 bytes and 01 host ► None of these Question No: 11 ( Marks: 1 ) - Please choose one What is the correct HTML for making a text input fi eld?
►
► ► ► Question No: 12 ( Marks: 1 ) - Please choose one IIS stands for: ► International Information Service► Internet Information Server ► Internet Information standards► All of these Question No: 13 ( Marks: 1 ) - Please choose one The payer and the payee are issued digital certificates in ………… standard format by their respective banks. ► X. 509 ► F. 609 ► L.8999 ► N.586 Question No: 14 ( Marks: 1 ) - Please choose one What is a E-Cash wallet ? ► Hardware ► Agent ►Software ► All of the above Question No: 15 ( Marks: 1 ) - Please choose one An E-cash coin consists of element (s) like: ► Serial # provided by client ► Key version ► Serial# signed by E-cash bank ► All of the above Question No: 16 ( Marks: 1 ) - Please choose one What is Ultimate consumer orientation? ► Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. ► Secondary Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. ► Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of supply chain. ► None of them Question No: 17 ( Marks: 1 ) - Please choose one Customer data can be gathered and analyzing it customers can be served in a better Manner according to their needs, Which is best option? ► Customization ► Customer orientation ► Customer satisfaction ► Focus Question No: 18 ( Marks: 1 ) - Please choose one A company ABC web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death in that culture. Which is the international barrier it is having? ► Culture ► Language ► Lack of trust ► Infrastructure Question No: 19 ( Marks: 1 ) - Please choose one Exclusive right granted by law to make, use and sell an invention. What is called? ► Parasites ► Trade mark ► Patent infringement ► Copyright Question No: 20 ( Marks: 1 ) - Please choose one Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act. Which legal issue arises due to such acts? ► Cyber Crimes ► Online Defamation ► Cyber squatting ► None
Question No: 21 ( Marks: 1 ) - Please choose one How can you reference part of a string? ► text.substr(5,6); ► text.part(5,6) ► text.piece(5,6) ► text.split(5,6); Question No: 22 ( Marks: 1 ) - Please choose one This is an example of ► 0-tier architecture ► 1-tier architecture ► 2-tier architecture ► n-tier architecture Question No: 23 ( Marks: 1 ) - Please choose one Following are the names of some well known e-commerce software, EXCEPT ----------- . ► Intershop ► IBM's WebSphere Commerce Professional Edition ► Microsoft Commerce Server 2002 ► Microsoft SQL Server 2005 Question No: 24 ( Marks: 1 ) - Please choose one In Style Sheets, How do you change the font of an element? ► font-face: ► font: ► font-family: ► font-style: Question No: 25 ( Marks: 1 ) - Please choose one A paper signature is believed to be more reliable than a digital signature. ► True ► False Question No: 26 ( Marks: 1 ) - Please choose one The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the ___________. ► Client ► Bank ► Merchant ► None of above Question No: 27 ( Marks: 1 ) - Please choose one SET doesn’t require special software on the client or merchant side. ► True ► False Question No: 28 ( Marks: 1 ) - Please choose one The result of OLAP is displayed in the form of a __________. ► Data square ► Data Triangle ► Data cube ► Data circle Question No: 29 ( Marks: 1 ) - Please choose one Classification and Association belong to which of the following types of Data Mining? ► Selective ► Predictive ► Descriptive ► Additive Question No: 30 ( Marks: 1 ) - Please choose one Which one of the following algorithms does not include in public key algorithms? ► DSS ► RSA ► Elliptic Curves ► RC4 Question No: 31 ( Marks: 1 ) What is a basic purpose of payment gateway in SET transactions? Explain shortly. Answer: The role of payment gateway is to connect entities on the internet with those which are not on the internet such as the electronic network of banks.Payment gateway provides the security of data transmission to/from the acquirer bank.. Question No: 32 ( Marks: 1 ) ‘Provide after sales service and support’ is one of the areas in a strategic business unit according to Michael Porter. List what kind of activities is performed in this area? Answer: 1-Installing 2-Testing, 3-Repairing 4-Maintaining a product
5-Fulfilling 6-Warranties Question No: 33 ( Marks: 2 ) What do we mean by “Affiliation” between two parties? Explain shortly. Affiliation: Generally, affiliation exists when one business controls or has the power to control another or when a third party (or parties) controls or has the power to control both businesses. Control may arise through ownership, management, or other relationships or interactions between the parties.Merger us an example of afiliation. Question No: 34 ( Marks: 2 ) Discuss briefly how a software developer who releases annual updates of his software can reduce the price of his product and increase sales revenue in an E- Commerce environment. Question No: 35 ( Marks: 3 ) Under Section 21 of the ETO, the funds of the Certification Council shall comprise of:? Answer:Under Section 20: Grants from the Federal Government; Fee for grant and renewal of accreditation certificate; and Fee, not exceeding ten Rupees, for every certificate deposited in the repository; fines.” Question No: 36 ( Marks: 3 ) What is business promotion? Briefly explain any two methods of business promotion. 1+2 Answer: E-business promotions can attract visitors to your site and induce them to purchase. Promotional messages can be sent both online and offline. Discounts Discount advertisements through magazines, newspapers, web sites etc. can attract new and repeat customers. Coupons Online coupons are placed on certain popular sites to attract customers for online shopping. They can use these coupons for shopping through specific web sites. Question No: 37 (Marks: 3 ) How does the client purchase from merchant using E-Cash Payment system? Show the payment request format. Question No: 38 ( Marks: 5 ) Explain the advantages of E-business regarding today’s scenario. Cost Effective Marketing and Promotions: Using the web to market products guarantees worldwide reach at a nominal price. Advertising techniques like pay per click advertising ensure that the advertiser only pays for the advertisements that are actually viewed. Developing a Competitive Strategy: Firms need to have a competitive strategy in order to ensure a competitive advantage. Without an effective strategy, they will find it impossible to maintain the advantage and earn profits. The strategy, that the firms can pursue, can be a be a cost strategy or a differentiation strategy Better Customer Service: E-Business has resulted in improved customer service. Many a times, on visiting a website, the customer is greeted by a pop-up chat window. Readily available
customer service may help in encouraging the customer to know more about the product or service. Moreover, payments can be made online, products can be shipped to the customer without the customer having to leave the house. Bulk transactions One can do bulk transactions during one visit to an e-shop, since there is no limitation of collecting, packaging or carrying goods in contrast to shopping from a traditional offline shop. Question No: 39 ( Marks: 5 ) Elaborate the importance of OLAP in decision making support for an organization. Answer: Online Analytical Processing (OLAP) uses knowledge for the purpose of presenting data at different levels of abstraction. It is different from data mining as it does not help in making predictions. But data can be viewed and reviewed in many different ways for decision making purpose. The result is showed in form of a data cube. Question No: 40 ( Marks: 10 ) What elements should we consider for global marketing of e-businesses? Describe briefly. As a marketer, when you are aiming at marketing your business in the entire world, you have to keep certain considerations in mind. Your web design must provide content in various languages and provide prices in various currencies, so that people belonging to different countries/cultures can understand the information contained in your web site. A regular display of currency exchange rate information can be useful in this behalf. Today, tools exist that can translate emails and your web sites into different languages. Another important consideration should be as to whether the country where you are doing the business has the required infrastructure to support your e-business. For example, whether you have a proper distribution channel of your products in a country you are doing business in. Similarly, you should carefully choose a payment system for your e-business which is compatible with the environment of a country where you are doing business. For example, a payment mechanism using SET cannot be considered as compatible with business environment in most of the third world countries. Question No: 41 ( Marks: 10 ) Give an example to show how members of supply chain can work together to reduce inventory, increase quality of product, reduce production cost and increase process speed. In 1997 the company had to stop its two assembly operations for several weeks due to errors in production and scheduling system causing it a huge financial loss. Thereafter, it decided to invest in information systems in every element of its supply chain. Involving its suppliers in the process, it began the use of EDI
and internet technology, so that the suppliers could supply the right part or assembly at right time to prevent production delay. Now, the suppliers could get engineering specifications and drawings before the start of manufacturing using a secure internet connection, and plan their own business activities, accordingly. Also, members of the supply chain could have the knowledge of the completion of milestones and any changes in production schedule. In two years time, this approach resulted in reducing half the time needed to complete individual assembly processes. Thus, instead of waiting for 3 years the customer airlines could now have the ordered airplane ready for delivery in 10-12 months. Furthermore, the company launched a spare parts web site for ordering replacement parts. The site allowed customer airlines to register and order for replacement parts through browsers. Soon, the site was processing 5000 transactions per day at much lower cost as compared to orders cost through phone, mail, or fax. It also improved customer service in the sense that most parts could now be delivered the same day or the next day.
FINALTERM EXAMINATION
Fall 2009
IT430- E-Commerce (Session - 3)
Solved By vuZs Solution Team
Time: 120 min
Marks: 75
Question No: 1 ( Marks: 1 ) - Please choose one
Four P’s in Marketing Mix are:
► Product, price, place, promotion ► Price, person, place, problem
► Place, product, property, promotion ► Promotion, place, product, planning
Question No: 2 ( Marks: 1 ) - Please choose one
JIT Stands for
► Just In Time ► Joint investigation Technique
► Join in Training ► Just In Total
Question No: 3 ( Marks: 1 ) - Please choose one
Advertising Supported Revenue Model includes
► Yahoo portal ► Employment sites ► Newspaper Publishers ► All of the above
Question No: 4 ( Marks: 1 ) - Please choose one
Which of the following is true for Class A:
► Network 01 byte and 03 hosts ► Network 02 bytes and 02 hosts
► Network 03 bytes and 01 host ► None of these
Question No: 5 ( Marks: 1 ) - Please choose one
What is the correct syntax of the declaration which defines the XML version?
►
►
►
► None of these
Question No: 6 ( Marks: 1 ) - Please choose one
Which of the following needs human action to execute?
► Virus ► Worm ► Trojan Horse ► All of these
Question No: 7 ( Marks: 1 ) - Please choose one
In the digital signature technique, the sender of the message uses ________ to create cipher text
► His or Her own symmetric key ► His or her own private key
► His or her own public key ► The receiver’s private key
Question No: 8 ( Marks: 1 ) - Please choose one
PIN stands for:
► Payment investigation Number ► Password Identification Number
► Personal Identification Number ► Personal Identification Numeric
Question No: 9 ( Marks: 1 ) - Please choose one
An electronic check contains a(n)………………… to the payer’s bank to make a specified payment to the
payee
► Serial# ► Private key ► Instruction ► All of the above
Question No: 10 ( Marks: 1 ) - Please choose one
It is the ability to sell the goods or provide the service at a price that is lower than that of competitors,
and thus attract more customers.
What is called?
► Cost leadership ► Price leadership ► Focus ► Differentiation
Question No: 11 ( Marks: 1 ) - Please choose one
E-commerce is a combination of three different areas of study, namely, --------,
---------------- and ----------------
► Internal, external support, Support
► Technology, business and law/policy
► Primary, Secondary, R&D
► Sale, purchase, feed back
Question No: 12 ( Marks: 1 ) - Please choose one
A company ABC web page divided into four segments can be unpleasant to a Japanese visitor because
no. four is a symbol of death in that culture.
Which is the international barrier it is having?
► Culture ► Language ► Lack of trust ► Infrastructure
Question No: 13 ( Marks: 1 ) - Please choose one
GM Celebes manufacturing electronic goods and FryChips co selling French fries. Under the traditional
trade mark law both these companies can have the same trade mark/trade name such as ‘frys’.
The problem arises when both apply for the registration of a domain name containing the word ‘frys’.
Here, both are legitimate claimants of this domain name but due to the element of uniqueness of
domain names only one of them can be assigned the desired domain name.
Which legal issue arises in this situation?
► Domain name conflict ► Cyber squatting ► Concurrent use ► None
Question No: 14 ( Marks: 1 ) - Please choose one
Which type of Data Mining contains the elements as Support and confidence?
► Classification ► Association ► Characterization ► Clustering
Question No: 15 ( Marks: 1 ) - Please choose one
OLAP stands for……………
► Online Analytical Program ► Online Analytical Processing
► Online Application Program ► Online Analysis Performance
Question No: 16 ( Marks: 1 ) - Please choose one
Characterization and Clustering belong to which of the following types of Data Mining?
► Additive ► Predictive ► Selective ► Descriptive
Question No: 17 ( Marks: 1 ) - Please choose one
Support activities in Value Chain model includes
► Finance and Administration ► Human Resources ► Technology Development ► All of
Question No: 18 ( Marks: 1 ) - Please choose one
Which of the following is NOT processed on the client side?
► Cookies ► JavaScript ► CGI scripts ► Applets
Question No: 19 ( Marks: 1 ) - Please choose one
Due to which characteristics, ATM network are covered under E-commerce ?
► Exchange of information through computer networks ► Internet. ► Exchanging of products,
services. ► None of the above.
Question No: 20 ( Marks: 1 ) - Please choose one
SET is better than SSL.
► True ► False
Question No: 21 ( Marks: 1 ) - Please choose one
Dividing market, with respect to people having income level greater than Rs 30000, is geographic
segmentation.
► True. ► False.
Question No: 22 ( Marks: 1 ) - Please choose one
Which of the following is NOT an identified behavioral mode of customers on the web?
► Browsers ► Buyers ► Shoppers ► Seller
Question No: 23 ( Marks: 1 ) - Please choose one
Which of these is a way of conducting market research?
► Phone. ► Interviews ► Questionnaires ► All of above.
Question No: 24 ( Marks: 1 ) - Please choose one
Which of these is NOT a stage of knowledge discovery process?
► Transformation ► Data mining ► Pattern evaluation ► Process evaluation
Question No: 25 ( Marks: 1 ) - Please choose one
According to Michael Porter, “test marketing” is an example of primary activity in a strategic business
unit. Identify the area in which this task is performed.
► Design ► Market and sell ► Deliver’ activities relate to storage ► Purchase materials and supplies
Question No: 26 ( Marks: 1 ) - Please choose one
Electronic banking is also known as __________.
► Cyber banking ► Virtual banking ► Online banking ► All of above
Question No: 27 ( Marks: 1 ) - Please choose one
Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the
wrong-doer. Is it?
► True ► False
Question No: 28 ( Marks: 1 ) - Please choose one
In datalink layer, data packets are placed inside
► Data frames ► Data boxes ► Data streams ► None of these
Question No: 29 ( Marks: 1 ) - Please choose one
Which one of the following algorithms does not include in public key algorithms?
► DSS ► RSA ► Elliptic Curves ► RC4
Question No: 30 ( Marks: 1 ) - Please choose one
Which of the following is HTML tag could n’t be used as CSS tag?
Question No: 31 ( Marks: 1 )
What is stand for WIPO?
World Intellectual Property Organization
Question No: 32 ( Marks: 1 )
Name any 3 E-Business models?
1-Storfront Model
2-Auction Model
3-Onlien Banking
Question No: 33 ( Marks: 2 )
What is the basic purpose of using hash function in communication?
A hash function is applied on the message to get the message digest.
Question No: 34 ( Marks: 2 )
What is Competition between existing players ?.
If there are many players having same size and stretagy but having different qualities in product and
services. Then there is true competition between them regarding price of that product or service.
Question No: 35 ( Marks: 3 )
On what basis, generally the protection under “fair use” may be sought? Doesn’t need to explain.
Nature of use:The work should be used only for non profitable and for education purposes.
Nature Of Work:The copied work is effectively covered under fair use as compaird to that of some new
or creative work
Extent of the work copied:The extent of work to be copied under fair use shouold be small so that court
take some favourable steps to accussed.
Question No: 36 ( Marks: 3 )
In Virtual PIN Payment system, merchant side is less secure than buyer side. Do you agree with this
statement? Justify your answer.
1+2
Yes , I am agree with this statement that marchant side is less secure than buyer side because marchant
send the product before payment.So there is threat of non payment from buyer side.
Question No: 37 ( Marks: 3 )
What are the disadvantages of Data Mining? (1+1+1)
Privacy Issues
Personal privacy has always been a major concern in this country. In recent years, with the widespread
use of Internet, the concerns about privacy have increase tremendously. Because of the privacy issues,
some people do not shop on Internet. They are afraid that somebody may have access to their personal
information and then use that information in an unethical way; thus causing them harm.
Security issues
Although companies have a lot of personal information about us available online, they do not have
sufficient security systems in place to protect that information. For example, recently the Ford Motor
credit company had to inform 13,000 of the consumers that their personal information including Social
Security number, address, account number and payment history were accessed by hackers who broke
into a database belonging to the Experian credit reporting agency.
Maintanence Problem
Another problem with the data warehouse is that it is difficult to maintain. Any organization that is
considering using a data warehouse must decide if the benefits outweigh the costs. Once you have paid
for the data warehouse, you will still need to pay for the cost of maintenance over time. The costs
involved with this must always be taken into consideration.
Question No: 38 ( Marks: 5 )
Describe the advantages of E-Business in detail.
Personalized service:
product , place , promotion and price are the 4 P`s of marketing mix. Now Personalization is the 5th P
introduced in E-Business.The bahavioural information about customers can be added in data base and
then can be utilized to by teh E-Commerce sites to analyze the needs of taht particular customer.So, in
this way personalized service can be provided to customer.
High-quality customer service
With the help of feed back of potential customers online businesses can improve the quality of their
products according to the needs and demands of thier customers.So it will improve the customer
services of E-Buiseness.
No inventory cost
In case of E-Business we dont need to have any physical place to start business. In this way it reduces
overheads and invemtory costs.An onilne busines can take orders from customers with out bearing teh
inventory cost like offline traditional businesses.
Worldwide reach of your business:
In E-Busines there is a chance to extend your business thruoghout the world. So, global reach is possible
in E-Business.
Electronic catalogues
Electronic catalogue is used in online busines have many adbvantages over paper catalogues.
Bulk transactions
Due to no limitations on collecting , carrying and packaging goods we can order bulk transactions during
even one visit at online shops.
Improved supply chain management
suppliers and manufacturer are the active members of supply chain members. They are effective
addition in E-Business.
Question No: 39 ( Marks: 5 )
Elaborate the importance of OLAP in decision making support for an organization.
OLAP makes use of baksground knowledge regarding the domain of the data being studied .It is different
from data mining as it does not provide patterns for any predictions.It allows the data being studied to
present at different level of abstraction.Informartion stored in the data base can be viewed and
reviewed conveniently in any formate .In case of OLAP at different levels facilitate managers and
decision makers in making decisions.OlAP uses different tools namely, drill down , roll up and and slice
and dice etc.By using drill down we can further dig into the data for recieving more information whcih is
specific.Roll up works opposite to the drill down , It is used to sum up the information in a particular
dimention to show the results.
Question No: 40 ( Marks: 10 )
What is Porter’s 5 forces model ? Discuss briefly 5 forces with its purpose.
Porter`s models helps a firm to identify threats to its sompetitive position.and to devide plans
accordingly which includes uses of IT and E commerce to protect or enhance his competitive position .
Following are the 2 forces models of porter.
1- Threats of new potentian entrants to the sector
This threats relates to the opportunity that how easily a company having different products and
services can enter into the a given trade sector.How effeciently it remove teh barriers liek IT, Capital and
skills.For example to start online banking you need not to
2-Threats of substitute product or service in existingtrade
3-Bragaining power of the buyers
4-Bargaining power of the suppliers
5-Competition between existing players
Question No: 41 ( Marks: 10 )
What are the advantages and disadvantages of offline and online catalogues?
5+5
Online catalogues vs. Paper catalogues
Paper catalogs
Advantages
Easy to create a catalog without high technology
Reader is able to look at the catalog without computer system
More portable than electronic catalog
Disadvantages
Difficult to update changes in the product information
Only limited number of products can be displayed
Online or electronic catalogs
Advantages
Easy to update product information
Able to integrate with the purchasing process
Good search and comparison capabilities
Able to provide timely, up-to-date product information
Can provide broad range of product information
Possibility of adding voice and motion pictures
Cost savings
Easy to customize
FINALTERM EXAMINATION
Fall 2009
IT430- E-Commerce
Question No: 1 ( Marks: 1 ) - Please choose one
At deposit stage, the serial number is ……………..by E-Cashbank
► Known ► Unknown ► Kept Secret ► Informed
Question No: 2 ( Marks: 1 ) - Please choose one
How many kinds of Web Portals are?
► 3 ► 2 ► 5 ► 6
Portals are the web sites which provide chance to the visitors to find almost everything in one place.
Horizontal portals provide information about a very broad range of topics. Search engine is the example
of a horizontal portal. Vertical portals provide information pertaining to a single area of interest.
Community Portals such as those related to medical or legal profession are the examples of a vertical
portal. Online shopping is a popular addition to the some portals such as ‘yahoo.com’. Portals allow
users to browse independently owned storefronts unlike online shopping malls.
Question No: 3 ( Marks: 1 ) - Please choose one
Let us, suppose that you have hosted your e-commerce website,
When you provide “opt-in e-mail” option to your customers on your website and customer opt for it ,
what does it mean to receive ?
► Information about product through advertisement
► Information about product through e-mail
► Information about services available on it
► Information about News through e-mail.
You can also provide the “opt-in e-mail” option to your customers on your web site. If
they opt for it, this means that they want to receive through email any product information, offers
or promotions etc. in the future.
Question No: 4 ( Marks: 1 ) - Please choose one
Track the customers online and do personalization is only possible through which of the following file(s)
analysis.
► log files ► cookie ► data mining ► log files and cookies.
There are software tools or tracking devices that can provide feedback on how many number of internet
users actually viewed a banner or a marketing message and how many actually clicked on the
advertisement. Log files consist of data generated by site visits and include information about each
visitor’s location, IP address, time of visit,
frequency of visits etc. There are businesses that provide the services of analyzing web log files. The
results would show how effective your web site is and indicate the top-referring web sites. You know
that cookies allow e-commerce sites to record visitor behavior. They can be used to track customers
online and do personalization.
Question No: 5 ( Marks: 1 ) - Please choose one
When customer life cycle is used to create different groups of customers, it is called?
► Targeting Customers ► Dynamic groups
► Customer Life Cycle Segmentation ► Group Development
Question No: 6 ( Marks: 1 ) - Please chose one
Network addresses 128--- 191 range belongs to which of the following class networks?
► A ► B ► C ► E
Question No: 7 ( Marks: 1 ) - Please choose one
Which one of following illustrates relationship between "" and // ?
► Closely related ► Hide the code
► Different ► Hide the tags
Question No: 8 ( Marks: 1 ) - Please choose one
Which of the following property falls in HTTP?
► Stateless ► Stateful ► Temporary ► All of these
Page No.88:http is stateless. Another reason why we need to write scripts or develop our back end
is that we want to maintain state.
Question No: 9 ( Marks: 1 ) - Please choose one
FSTC stands for:
► Financial Services Technology Consortium
► Financial Secrets Technology Consortium
► Final Security threats control
► First Service Technology Consortium
Question No: 10 ( Marks: 1 ) - Please choose one
Supply chain can be broken into three parts, that is ----------------- , ----------------------- and --------------------
activities.
► Internal, external support ► Upstream, internal ,downstream
► Primary, Secondary ,R&D ► None of them
1-Upstream activities relate to materials/services or the input from suppliers
2-Internal activities relate to manufacturing and packaging of goods
3-Downstream activities relate to distribution and sale of goods to distributors/customers
Question No: 11 ( Marks: 1 ) - Please choose one
The process of taking active role in working with suppliers to improve products and processes is called?
► Value chain management ► Supply chain management
► Supply chain management software ► Porter Model
Question No: 12 ( Marks: 1 ) - Please choose one
What is Ultimate consumer orientation?
► Primary objective of supply chain is to help each company to meet needs of the consumer at the end
of supply chain.
► Secondary Primary objective of supply chain is to help each company to meet needs of the consumer
at the end of supply chain.
► Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of
supply chain.
► None of them
Question No: 13 ( Marks: 1 ) - Please choose one
Many search engines rank the site by using a program called
► Spider ► Scorpion ► Moon ► Cobweb
Page No.138: Many search engines rank the site by using a program called ‘spider’ which inspects the
site before ranking.
Question No: 14 ( Marks: 1 ) - Please choose one
E-commerce is a combination of three different areas of study, namely, --------,
---------------- and ----------------
► Internal, external support, Support ► Technology, business and law/policy
► Primary, Secondary, R&D ► Sale, purchase, feed back
Page No.161: E-commerce is a combination of three different areas of study, namely, technology,
business and law/policy. We have studied the technology and business side of e-commerce to a
reasonably good extent. Now, we have to start the law and policy side of e – commerce. However,
before we do that lets discuss some interesting issues related to the international aspect of e-
commerce.
Question No: 15 ( Marks: 1 ) - Please choose one
In which type of data mining, Apriori algorithms is used?
► Classification ► Association
► Characterization ► Clustering
Page No.143: Apriori algorithm is used for association mining.
Question No: 16 ( Marks: 1 ) - Please choose one
EDI has the key feature(s)
► No paper work ► No human intervention ► Exchange of information takes place in seconds ► All
of these
Page No.147:ELECTRONIC DATA INTERCHANGE
Question No: 17 ( Marks: 1 ) - Please choose one
Addresses are tied to the device itself and give no clue to it's location on a global scale. This is the
characteristics of
► IP ► RIP ► MAC ► None of the given
MAC addresses are tied to the device itself and give no clue to it's location on a global scale. MAC
AB:CD:EF:01:01:01 may be in the US and MAC AB:CD:EF:01:01:02 may be in Australia. So a router
would have to keep track of where every individual MAC is in the world and how to get to it. That just
isn't feasible.
With an IP address you can be fairly sure that IP 1.2.3.2 and 1.2.3.3 are on the same network and the
router that looks after the subnet they live on will know who is who. Therefor your router (or your
ISP's) need only to know how to get that networks router. Reducing the amount of routes it needs to
know by a couple of magnitudes.
Question No: 18 ( Marks: 1 ) - Please choose one
When two or more intranets are connected to each other they form a/an ------------- .
► intranet ► internet ► extranet ► VPN
Extranet – when two or more intranets are connected with each other, they form an Extranet – e.g,
Virtual Private Network
Question No: 19 ( Marks: 1 ) - Please choose one
Whic
h attribute can be used to make a region non-clickable?
► none of the given ► target ► alt ► nohref
Page No.37: ‘Nohref’ attribute can be used to make a region non-clickable. For example,
Question No: 20 ( Marks: 1 ) - Please choose one
Which of the following payment mode does not require customer to pay interest to the bank on each
transaction?
► Credit card ► Debit card ► Electronic check ► All of the above
Page No.110: In case of a credit card the issuer bank charges interest from the client at a specified rate
on the amount lent. On the other hand, in case of a debit card no such interest is payable since the
customer uses his/her own money in that case.
Question No: 21 ( Marks: 1 ) - Please choose one
Cyber wallet can automatically assemble the correct payment and pay it too.
► True ► False Page No.118:Cyber wallet automatically assembles the correct payment amount and
pays.
Question No: 22 ( Marks: 1 ) - Please choose one
SET doesn’t require special software on the client or merchant side.
► True ► False
SET requires software on, both, the client and the merchant side
Question No: 23 ( Marks: 1 ) - Please choose one
Which model allows the users to log-on on a website and assume the role of bidder or seller?
► Online Banking. ► Storefront Model ► E-Learning. ► Auction Model.
In this model there are auction sites to which the users can log-on and assume the role of a bidder or
seller. As a seller, one has to specify the minimum price to sell one’s item (called reserve price), the
description of the item and the deadline to close the auction. At the end of the auction, the seller and
the bidder are notified by the auction site and the payment mechanism and delivery mode is worked
out. Auction sites charge commission on sales.
Question No: 24 ( Marks: 1 ) - Please choose one
According to Michael Porter, “fabricating” is an example of primary activity in a strategic business unit.
Identify the area in which this task is performed.
► Market and sell ► Deliver’ activities relate to storage
► Purchase materials and supplies ► Manufacture product or create service
‘Manufacture product or create service’ activities relate to transformation of materials and labor into
finished products, e.g, fabricating, assembling, packaging etc.
Question No: 25 ( Marks: 1 ) - Please choose one
Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the
wrong-doer. Is it?
► True ► False
Question No: 26 ( Marks: 1 ) - Please choose one
In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, --
-------------- and ----------
► Acceptance and consideration ► Acceptance and Rejection ► Approval and consideration ► None
An offer is a commitment with certain terms made to another party such as willingness to buy or sell
certain product.sell certain product.A contract is formed when a party accepts the offer of another party
for consideration. Consideration is the agreed exchange of something valuable for both the parties such
as money, property or services.
Question No: 27 ( Marks: 1 ) - Please choose one
In online environment acceptances may be issued by an imposter/cheater that has authority to bind the
online business
► True ► False
In online environment acceptances may be issued by an imposter/cheater that does not have authority
to bind the online business. To overcome this problem companies and individuals can use digital
signatures to establish identity in online transactions.
Question No: 28 ( Marks: 1 ) - Please choose one
#00ff00 in HTML indicates
► Pure green color ► Pure blue color
► Pure red color ► Pure yellow color
Question No: 29 ( Marks: 1 ) - Please choose one
Virtual PIN Payment System requires both merchant and buyer to register with _______________.
► Auto Clearing House (ACH) ► First Virtual (FV) ► DSS (Digital Signature Standard)
► DES (Data Encryption Standard)
Question No: 30 ( Marks: 1 ) - Please choose one
Classification and Association belong to which of the following types of Data Mining?
► Selective ► Predictive ► Descriptive ► Additive
Classification and association are predictive types of data mining while characterization and
clustering represent the descriptive type.
Question No: 31 ( Marks: 1 )
What should be the length range in bits of a message digest?
A message digest is a single large number typically between 128 to 256 bits in length.
Question No: 32 ( Marks: 1 )
Just write down the name of Elements of Branding?
Differentiation Relevance Perceived Value
Question No: 33 ( Marks: 2 )
What is civil law? Give precise answer.
Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the
wrong-doer. Civil wrongs such as breach of contract are deemed to violate only the rights of individuals
and not the society in general.
Question No: 34 ( Marks: 2 )
What do we mean by “Affiliation” between two parties? Explain shortly.
Affiliation:
Generally, affiliation exists when one business controls or has the power to
control another or when a third party (or parties) controls or has the power to control both
businesses. Control may arise through ownership, management, or other relationships or
interactions between the parties.Merger us an example of afiliation.
Question No: 35 ( Marks: 3 )
What is concept of “fair use” in copyright law?
There is a concept of ‘fair use’ or ‘fair dealing’ in copyright law that provides legitimate exceptions
to copyright violation. Generally, fair use of a copyrighted work includes copying it for use in
criticism, comment, news reporting, teaching, scholarship or research. Experts draw support from this
concept of ‘fair use’ to deal with the problem of copyright over the internet. It is also argued that in
cases where the author of a work has himself provided a hyperlink leading to his work, he should be
regarded as giving the implied authority or license to download or make copies of his work. In such an
eventuality, the issue of copyright should not arise according to an opinion.
Question No: 36 ( Marks: 3 )
Digital signatures are considered more reliable than paper signatures. Do you agree with this
statement? Briefly justify your answer. 1+2
Question No: 37 ( Marks: 3 )
What is ERP? Briefly explain its use in an organization? (1 + 2)
ERP is an approach that attempts to integrate all departments and functions across a company onto a
single
computer system that can serve all those different departments' particular needs. For example, finance,
manufacturing and the warehouse department of a company may have their own software to perform
tasks
specific to each one of them. However, each software can be linked together so that a customer service
representative can see the credit rating of a customer from finance module, warehouse information
from
warehouse module, and shipment information from the shipment module. SAP is an example of ERP
software. ERP is complex. It is not intended for public consumption as proper integration of ERP with
ecommerce
applications is still a major problem.
Question No: 38 ( Marks: 5 )
What do you perceive by Value Added Network? Explain its advantages too with reference to EDI. (2+3)
Value added networks are third party networks that provide services to execute authorized transactions
with valid trading partners using EDI. Each VAN has a centralized computer system that maintains two
files for each user, that is,
Postbox: where outgoing messages are placed, and
Mailbox: where incoming messages can be picked up.
Advantages:
Two big advantages of using a VAN in EDI are time independence and protocol independence.
Time independence means that the sending and receipt of the interchange or messages can be carried
out at the convenience of the users involved. Thus, they are not required to be connected with each
other at the same time. Protocol independence means that interchanges are re-enveloped with the
transmission protocol appropriate to the recipient when they are retrieved from the postbox by the
VAN. Thus, a VAN can provide protocol compatibility between the sender and the recipient, wherever
that is missing.
Question No: 39 ( Marks: 5 )
What is ACH? What is its role in Virtual PIN system? 2+3
ACH stands for Automated Clearing House.A house through which the bank of payee clears the check
with the help of traditional automated clearing house.
Role of ACH in Virtual PIN System:
A deposit request encrypted with bank’s public key accompanies the payment information. E-cash bank
maintains a database of spent coins. On receipt it checks whether the coin is valid and whether it has
already been spent or not (to prevent double spending) by referring to its database. If the coins are valid
the
bank credits the merchant’s account. Thus, if the client has sent valid coins worth $10 for payment to
the
merchant, and the merchant already has $90 in his account then an amount of $ 10 would be added in
his
account making it $ 100. Later, the merchant can request the e-cash bank to transfer this amount in his
account with the acquirer bank. This can be done through ACH and the merchant can physically
withdraw
the money form the acquirer bank.
Question No: 40 ( Marks: 10 )
What is data warehousing? What are its main tasks? What is its importance for an organization?
The primary concept behind data warehousing is that the data stored for business analysis can most
effectively be accessed by separating it from the data in the operational systems. A data warehouse,
therefore, is a collection of data gathered from one or more data repositories to create a new, central
database. For example a hospital may create a data warehouse by extracting the operational data it has
accumulated concerning patient information, lab results, drug use, length of stay, disease state, etc,.
Data Warehousing is not just the data in the warehouse, but also the architecture and tools to collect,
query, analyze and present information.
Question No: 41 ( Marks: 10 )
Precisely explain the steps of “Knowledge discovery from database” in order of their occurrence.
Answer: Knowledge discovery process include Data cleaning, Data selection, Data transformation, Data
Mining, Data integration, Pattern evaluation & knowledge presentation.
Explaination of each step:
1-Data cleaning
Data cleaning means that missing values should be provided in different fields/columns wherever
needed and any impossible or erroneous values should be substituted by correct/reasonable ones. For
example if the age of a person is typed as
1000 years in the column ‘age’ then an average age value can be put in its place.
2-Data selection
Where there are quite a few erroneous or missing values in a row, then that row can be
discarded/deleted altogether. This process is called data selection.
3-Data transformation
In data transformation, the data from all different sources is converted into the same format. For
example, date typed under a column should be in the same format in the entire data collected through
different sources.
4-Data integration
In data integration, data from all the sources is assembled or integrated into one
and housed in the data warehouse.
5-Data Mining
Now, this cleaned, transformed, selected and integrated data is fed to the
data mining tool from a data warehouse for data mining purpose.
6-Pattern evaluation & knowledge presentation
The results/ patterns are evaluated by
managers and useful knowledge is thus gained. Note that almost 80% of the total time used in a
knowledge
discovery process is spent on just making the data fit for mining, that is, data cleaning, data
transformation,
data selection etc.
FINALTERM EXAMINATION
Fall 2009 IT430- E-Commerce (Session - 3)
Question No: 1 ( Marks: 1 ) - Please choose one
Four P’s in Marketing Mix are:
► Product, price, place, promotion
► Price, person, place, problem
► Place, product, property, promotion
► Promotion, place, product, planning
Question No: 2 ( Marks: 1 ) - Please choose one
JIT Stands for
► Just In Time ► Joint investigation Technique ► Join in Training ► Just In Total
Question No: 3 ( Marks: 1 ) - Please choose one
Advertising Supported Revenue Model includes
► Yahoo portal ► Employment sites ► Newspaper Publishers ► All of the above
Question No: 4 ( Marks: 1 ) - Please choose one
Which of the following is true for Class A:
► Network 01 byte and 03 hosts ► Network 02 bytes and 02 hosts
► Network 03 bytes and 01 host ► None of these
Question No: 5 ( Marks: 1 ) - Please choose one
What is the correct syntax of the declaration which defines the XML version?
► <xml version="1.0" /> ► <?xml version="1.0" />
► <?xml version="1.0"?> ► None of these
Question No: 6 ( Marks: 1 ) - Please choose one
Which of the following needs human action to execute?
► Virus ► Worm ► Trojan Horse ► All of these
Question No: 7 ( Marks: 1 ) - Please choose one
In the digital signature technique, the sender of the message uses ________ to create cipher text
► His or Her own symmetric key ► His or her own private key
► His or her own public key ► The receiver’s private key
Question No: 8 ( Marks: 1 ) - Please choose one
PIN stands for:
► Payment investigation Number ► Password Identification Number
► Personal Identification Number ► Personal Identification Numeric
Question No: 9 ( Marks: 1 ) - Please choose one
An electronic check contains a(n)………………… to the payer’s bank to make a specified payment to the
payee
► Serial# ► Private key ► Instruction► All of the above
Question No: 10 ( Marks: 1 ) - Please choose one
It is the ability to sell the goods or provide the service at a price that is lower than that of competitors,
and thus attract more customers.
What is called?
► Cost leadership ► Price leadership ► Focus ► Differentiation
Question No: 11 ( Marks: 1 ) - Please choose one
E-commerce is a combination of three different areas of study, namely, --------,
---------------- and ----------------
► Internal, external support, Support ► Technology, business and law/policy
► Primary, Secondary, R&D ► Sale, purchase, feed back
Question No: 12 ( Marks: 1 ) - Please choose one
A company ABC web page divided into four segments can be unpleasant to a Japanese visitor because
no. four is a symbol of death in that culture.
Which is the international barrier it is having?
► Culture ► Language ► Lack of trust ► Infrastructure
Question No: 13 ( Marks: 1 ) - Please choose one
GM Celebes manufacturing electronic goods and FryChips co selling French fries. Under the traditional
trade mark law both these companies can have the same trade mark/trade name such as ‘frys’.
The problem arises when both apply for the registration of a domain name containing the word ‘frys’.
Here, both are legitimate claimants of this domain name but due to the element of uniqueness of
domain names only one of them can be assigned the desired domain name.
Which legal issue arises in this situation?
► Domain name conflict ► Cyber squatting ► Concurrent use ► None
Question No: 14 ( Marks: 1 ) - Please choose one
Which type of Data Mining contains the elements as Support and confidence?
► Classification ► Association ► Characterization ► Clustering
Question No: 15 ( Marks: 1 ) - Please choose one
OLAP stands for……………
► Online Analytical Program ► Online Analytical Processing
► Online Application Program ► Online Analysis Performance
Question No: 16 ( Marks: 1 ) - Please choose one
Characterization and Clustering belong to which of the following types of Data Mining?
► Additive ► Predictive ► Selective ► Descriptive
Question No: 17 ( Marks: 1 ) - Please choose one
Support activities in Value Chain model includes
► Finance and Administration ► Human Resources
► Technology Development ► All of these.
Question No: 18 ( Marks: 1 ) - Please choose one
Which of the following is NOT processed on the client side?
► Cookies ► JavaScript ► CGI scripts ► Applets
Question No: 19 ( Marks: 1 ) - Please choose one
Due to which characteristics, ATM network are covered under E-commerce ?
► Exchange of information through computer networks
► Internet.
► Exchanging of products, services.
► None of the above.
Question No: 20 ( Marks: 1 ) - Please choose one
SET is better than SSL.
► True ► False
Question No: 21 ( Marks: 1 ) - Please choose one
Dividing market, with respect to people having income level greater than Rs 30000, is geographic
segmentation.
► True. ► False.
Question No: 22 ( Marks: 1 ) - Please choose one
Which of the following is NOT an identified behavioral mode of customers on the web?
► Browsers ► Buyers ► Shoppers ► Seller
Question No: 23 ( Marks: 1 ) - Please choose one
Which of these is a way of conducting market research?
► Phone. ► Interviews. ► Questionnaires. ► All of above.
Question No: 24 ( Marks: 1 ) - Please choose one
Which of these is NOT a stage of knowledge discovery process?
► Transformation ► Data mining ► Pattern evaluation ► Process evaluation
Question No: 25 ( Marks: 1 ) - Please choose one
According to Michael Porter, “test marketing” is an example of primary activity in a strategic business
unit. Identify the area in which this task is performed.
► Design ► Market and sell ► Deliver’ activities relate to storage ► Purchase materials and
supplies
Question No: 26 ( Marks: 1 ) - Please choose one
Electronic banking is also known as __________.
► Cyber banking ► Virtual banking ► Online banking ► All of above
Question No: 27 ( Marks: 1 ) - Please choose one
Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the
wrong-doer. Is it?
► True ► False
Question No: 28 ( Marks: 1 ) - Please choose one
In datalink layer, data packets are placed inside
► Data frames ► Data boxes ► Data streams ► None of these
Question No: 29 ( Marks: 1 ) - Please choose one
Which one of the following algorithms does not include in public key algorithms?
► DSS ► RSA ► Elliptic Curves ► RC4
Question No: 30 ( Marks: 1 ) - Please choose one
Which of the following is HTML tag could n’t be used as CSS tag?
► <style> ► <h1> ► <p> ► <a>
Question No: 31 ( Marks: 1 )
What is stand for WIPO?
World Intellectual Property Organization
Question No: 32 ( Marks: 1 )
Name any 3 E-Business models?
1-Storfront Model
2-Auction Model
3-Onlien Banking
Question No: 33 ( Marks: 2 )
What is the basic purpose of using hash function in communication?
A hash function is applied on the message to get the message digest.
Question No: 34 ( Marks: 2 )
What is Competition between existing players ?.
If there are many players having same size and stretagy but having different qualities in product and
services. Then there is true competition between them regarding price of that product or service.
Question No: 35 ( Marks: 3 )
On what basis, generally the protection under “fair use” may be sought? Doesn’t need to explain.
Nature of use:The work should be used only for non profitable and for education purposes.
Nature Of Work:The copied work is effectively covered under fair use as compaird to that of some new
or creative work
Extent of the work copied:The extent of work to be copied under fair use shouold be small so that court
take some favourable steps to accussed.
Question No: 36 ( Marks: 3 )
In Virtual PIN Payment system, merchant side is less secure than buyer side. Do you agree with this
statement? Justify your answer.
Yes , I am agree with this statement that marchant side is less secure than buyer side because marchant
send the product before payment.So there is threat of non payment from buyer side.
Question No: 37 ( Marks: 3 )
What are the disadvantages of Data Mining? (1+1+1)
Privacy Issues
Personal privacy has always been a major concern in this country. In recent years, with the widespread
use of Internet, the concerns about privacy have increase tremendously. Because of the privacy issues,
some people do not shop on Internet. They are afraid that somebody may have access to their personal
information and then use that information in an unethical way; thus causing them harm.
Security issues
Although companies have a lot of personal information about us available online, they do not have
sufficient security systems in place to protect that information. For example, recently the Ford Motor
credit company had to inform 13,000 of the consumers that their personal information including Social
Security number, address, account number and payment history were accessed by hackers who broke
into a database belonging to the Experian credit reporting agency.
Maintanence Problem
Another problem with the data warehouse is that it is difficult to maintain. Any organization that is
considering using a data warehouse must decide if the benefits outweigh the costs. Once you have paid
for the data warehouse, you will still need to pay for the cost of maintenance over time. The costs
involved with this must always be taken into consideration.
Question No: 38 ( Marks: 5 )
Describe the advantages of E-Business in detail.
Personalized service:
product , place , promotion and price are the 4 P`s of marketing mix. Now Personalization is the 5th P
introduced in E-Business.The bahavioural information about customers can be added in data base and
then can be utilized to by teh E-Commerce sites to analyze the needs of taht particular customer.So, in
this way personalized service can be provided to customer.
High-quality customer service
With the help of feed back of potential customers online businesses can improve the quality of their
products according to the needs and demands of thier customers.So it will improve the customer
services of E-Buiseness.
No inventory cost
In case of E-Business we dont need to have any physical place to start business. In this way it reduces
overheads and invemtory costs.An onilne busines can take orders from customers with out bearing teh
inventory cost like offline traditional businesses.
Worldwide reach of your business:
In E-Busines there is a chance to extend your business thruoghout the world. So, global reach is possible
in E-Business.
Electronic catalogues
Electronic catalogue is used in online busines have many adbvantages over paper catalogues.
Bulk transactions
Due to no limitations on collecting , carrying and packaging goods we can order bulk transactions during
even one visit at online shops.
Improved supply chain management
suppliers and manufacturer are the active members of supply chain members. They are effective
addition in E-Business.
Question No: 39 ( Marks: 5 )
Elaborate the importance of OLAP in decision making support for an organization.
OLAP makes use of baksground knowledge regarding the domain of the data being studied .It is different
from data mining as it does not provide patterns for any predictions.It allows the data being studied to
present at different level of abstraction.Informartion stored in the data base can be viewed and
reviewed conveniently in any formate .In case of OLAP at different levels facilitate managers and
decision makers in making decisions.OlAP uses different tools namely, drill down , roll up and and slice
and dice etc.By using drill down we can further dig into the data for recieving more information whcih is
specific.Roll up works opposite to the drill down , It is used to sum up the information in a particular
dimention to show the results.
Question No: 40 ( Marks: 10 )
What is Porter’s 5 forces model ? Discuss briefly 5 forces with its purpose.
Porter`s models helps a firm to identify threats to its sompetitive position.and to devide plans
accordingly which includes uses of IT and E commerce to protect or enhance his competitive position .
Following are the 2 forces models of porter.
1- Threats of new potentian entrants to the sector
This threats relates to the opportunity that how easily a company having different products and
services can enter into the a given trade sector.How effeciently it remove teh barriers liek IT, Capital and
skills.For example to start online banking you need not to
2-Threats of substitute product or service in existingtrade
3-Bragaining power of the buyers
4-Bargaining power of the suppliers
5-Competition between existing players
Question No: 41 ( Marks: 10 )
What are the advantages and disadvantages of offline and online catalogues
Online catalogues vs. Paper catalogues
Paper catalogs
Advantages
Easy to create a catalog without high technology
Reader is able to look at the catalog without computer system
More portable than electronic catalog
Disadvantages
Difficult to update changes in the product information
Only limited number of products can be displayed
Online or electronic catalogs
Advantages
Easy to update product information
Able to integrate with the purchasing process
Good search and comparison capabilities
Able to provide timely, up-to-date product information
Can provide broad range of product information
Possibility of adding voice and motion pictures
Cost savings
Easy to customize
IT430 Final 2010
Question No: 1 (: 1 ) - Please choose one
In case of transaction failure or crash, one can re trieve his or her lost coins by sending all blinded signed coins from last …………………withdrawals to the E-bank.
► 10
► 12
► 18
► 16
reF: page 119
In case network fails or computer crashes during pa yment transaction, coins might be lost. All signed blinded coins from last 16
withdrawals are sent by the bank to the client.
Question No: 2 (: 1 ) - Please choose one
Which entity does not include in SET(secure Electro nic Transaction)?
► Seller
► Buyer
► Payment gateway
► Bank
Question No: 3 (1 ) - Please choose one
Traditionally Marketer use the market segmentation( s) like
► Geo-graphic Segmentation
► Demographic Segmentation
► Psychographic Segmentation
► All of the above page 131
Question No: 4 (1 ) - Please choose one
Class C has:
► Network 01 byte and 03 hosts
► Network 02 bytes and 02 hosts
► Network 03 bytes and 01 host page 10
► None of these
Question No: 5 (: 1 ) - Please choose one
In ring topology, failure of network cable will onl y take down one computer’s network access.
► True
► False page 14
Question No: 6 (: 1 ) - Please choose one
Which device uses the IP address
► Switch
► Router page 15
► Repeater
► None of these
Question No: 7 (: 1 ) - Please choose one
What is the correct HTML for inserting an image?
►
► page 53
►
► image.gif
Question No: 8 (: 1 ) - Please choose one
Cryptographic Algorithms are measured in terms of
► Key length 108
► Complexity
► Simplicity
► All of the above
Question No: 9 (: 1 ) - Please choose one
Upstream activities relate to?
► Materials/services or the input from suppliers page 154
► Manufacturing and packaging of goods
► Distribution and sale of goods to distributors/cus tomers
► Input from suppliers and Distribution
Question No: 10 (: 1 ) - Please choose one
Television, radio and print media are in a (n) ………… …………. Mode.
► Passive
► Active
► Static
► Dynamic
reF: page 139
In case of television, radio or print media people are normally in a passive mode
Question No: 11 (: 1 ) - Please choose one
Which of the following Barriers to International E- Commerce?
► Advertising
► Patents
► Infrastructure
► Capital
Ref: page 161
Barriers to international ecommerce include lack of trust, lack of infrastructure, language and culture.
Question No: 12 (1 ) - Please choose one
Exclusive right granted by law to make, use and sel l an invention. What is called?
Parasites €€€€€€€€
► Trade mark
► Patent infringement
► Copyright
Ref: page 181
A patent is an exclusive right granted by law to make, use and sell an
invention.
Question No: 13 (: 1 ) - Please choose one
Suppose, someone circulates a news item in the medi a about the reputation of a doctor, alleging him to be professi onally incompetent
and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due t o such an act.
Which legal issue arises due to such acts?
► Cyber Crimes
► Online Defamation
► Cyber squatting
► None
Ref: page 182
A defamatory statement is a false statement that in jures the reputation of on another person or company. If a st atement injures the reputation of a product or service instead of a person, it is called product disparagement. Suppose, someone circulates a news item in the media about the reputation of a doctor, allegin g him to be professionally incompetent and negligent. This doct or may then file a lawsuit against that person claiming that his reput ation has been injured due to such an act.
Question No: 14 (: 1 ) - Please choose one
Characterization and Clustering belong to which of the following types of Data Mining?
► Additive
► Predictive
► Selective
► Descriptive
reF; page 141
Classification and association are predictive types of data mining while characterization and clustering represent the descriptive type.
Question No: 15 (.: 1 ) - Please choose one
EDI stands for……..
► Electronic Digital Information
► Electronic Data Integration
► Electronic Data Interchange page 147
► All of these
Question No: 16 (: 1 ) - Please choose one
Implementing Value Chain model can help us to…
► Reduce cost
► Improve quality of products
► Create new ways of selling products
► All of these.
Ref: page 153
It can reduce costs of a business;
It can improve quality of products;
It can help in reaching new customers or suppliers;
It can create new ways of selling products.
Question No: 17 (1 ) - Please choose one
Following are malicious programs EXCEPT ----------- ------ .
► Back doors
► Trojan Horses
► Firewalls page 94
►Worms
Question No: 18 (1 ) - Please choose one
Which of the following is a valid variable name?
► 6th_student_CGPA
► first_student_CGPA page 57
► last student CGPA
► *any_student_CGPA
Question No: 19 (1 ) - Please choose one
Which of the following payment mode does not requir e customer to pay interest to the bank on each transaction?
► Credit card
► Debit card page 110
► Electronic check
► All of the above
Question No: 20 ( 1 ) - Please choose one
FVIPSS stands for _________.
► First Virtual Internet Payment System Server page 110
► First Virtual International Payment System Server
► First Virtual International Payment System Service s
► First Virtual Internal Payment System Services
Question No: 21 (1 ) - Please choose one
Which e-business helps to improve policies, procedu res, customer services, and general operations of other businesse s?
► Online shopping malls.
► Selling intellectual property online.
► Online service providers.
► Online automotive sites and energy online.
reF: page 129
These e-businesses help improve policies, procedure s, customer
service and general operations of other businesses.
Question No: 22 (1 ) - Please choose one
Which of the following is NOT an identified behavioral mode of customers on the web?
► Browsers
► Buyers
► Shoppers
► Seller
Ref: page 132
Browsers – customers who just browse through the si te with no intention of buying
Buyers – customers who are ready to buy right away
Shoppers – customers who are motivated to buy but w ant more information
Question No: 23 (: 1 ) - Please choose one
Downstream activities relate to distribution and sa le of goods to distributors/customers
► True page 155
► False
Ref: Downstream activities relate to distribution and sale of goods to
distributors/customers
Question No: 24 (1 ) - Please choose one
Online banking is a substitute of tradition banking . Is it?
► True page 158
► False
Ref:
For example,
to start online banking a company does not require heavy investment in constructing buildings (branch offices), hiring staff etc. as required in traditional banking.
Question No: 25 () - Please choose one
-------------means services in relation to the tran sformation of contents of an electronic
document from its original form to one that cannot be understood or decoded by any unauthorized person
► Cryptography services
► Accredited Certification Service Provider’
► Originator
► Addressee
reF; pgae 163
“‘Cryptography services’ means services in relation to the transformation of contents of an electronic documen t from its original form to one that cannot be understood or decoded by any unauthorized
person”.
Question No: 26 (: 1 ) - Please choose one
Law is broadly divided into two classes on the basi s of nature of wrong, namely, ------------ and ---------------
► Civil law and criminal law
► ETO and criminal law
► Supreme and Civil Law
► None
Ref: page 176
Law is broadly divided into two classes on the basi s of nature of wrong, namely, civil law and criminal law.
Question No: 27 1 ) - Please choose one
Each layer except ………… has got a header.
► Physical layer page 4
► Datalink layer
► Session layer
► Network layer
Question No: 28 (1 ) - Please choose one
Symmetric algorithms are faster than asymmetric?
► true page 105
► false
Ref; symmetric algorithms are faster as compared to asymmetric,
Question No: 29 (1 ) - Please choose one vuzs
SET was developed in _____.
► 1996
► 1997 page 122
► 1998
► 1999
Question No: 30 : 1 ) - Please choose one
LDA stands for _______
►Lahore Development Authority pafge 165
► Lahore Development Act
Question No: 31 (: 2 )
What is Data Mining?
Question No: 32 (2 )
What is the purpose of FRAMESET tag?
Question No: 33 (: 2 )
What do we mean by "Free-Trial" promotion technique?
Question No: 34 (: 2 )
What is UNCITRAL?
Question No: 35 3 )
Write precisely about the 4th stage of planning cycle?
Question No: 36 : 3 )
Discuss the role and responsibilities of “Transport layer” in OSI
model?
Question No: 37 (: 3 )
How lack of trust barrier can be overcome or minimized? Discuss
it briefly
Question No: 38 (3 )
Write the names of companies who were helper in developing
Secure Electronic Transaction.
Question No: 39 (: 5 )
Differentiate between Cyber squatting and concurrent
use with example.
Question No: 40 (: 5 )
Explain ‘Confidence’ and ‘Support’ as two measures of
Association?
MC080406248 : Salman Ali
Time Left 57
sec(s)
Quiz Start Time: 06:58 PM
Question # 3 of 10 ( Start time: 06:59:47 PM ) Total Marks: 1
Which of the following is a business promotion?
Select correct option:
Free-Trials
Free-Shipping
Both of these (Page # 133)
None
Click here to Save Answer & Move to Next Question
MC080406248 : Salman Ali Quiz Start Time: 06:58 PM
Time Left 62
sec(s)
Question # 4 of 10 ( Start time: 07:00:31 PM ) Total Marks: 1
In many countries, stealing and misusing of meta information for getting competitive advantage is considered as an offence known as
Select correct option:
Tort of Private Nuisance
Tort of Tress passing
Tort of passing off (pg #138)
Defamation
Click here to Save Answer & Move to Next Question
MC080406248 : Salman Ali Quiz Start Time: 06:58 PM
Time Left 50
sec(s)
Question # 5 of 10 ( Start time: 07:01:04 PM ) Total Marks: 1
Digital Content Revenue Model Includes
Select correct option:
Legal information services
Online journals
Online Libraries
All of the above (page # 130)
Click here to Save Answer & Move to Next Question
MC080406248 : Salman Ali Quiz Start Time: 06:58 PM
Time Left 29
sec(s)
Question # 6 of 10 ( Start time: 07:01:56 PM ) Total Marks: 1
Which of the following is an advertising payment mode?
Select correct option:
Pay-per-person
Pay-per-page
Pay-per-sale (pg #134)
Pay-per-minute
Click here to Save Answer & Move to Next Question
MC080406248 : Salman Ali Quiz Start Time: 06:58 PM
Time Left 87
sec(s)
Question # 8 of 10 ( Start time: 07:03:37 PM ) Total Marks: 1
Which one of the followings is an example of Banner advertising?
Select correct option:
Branding
Affiliate programs (page # 138)
Partnership
All of these
Click here to Save Answer & Move to Next Question
MC080406248 : Salman Ali Quiz Start Time: 06:58 PM
Time Left 83
sec(s)
Question # 9 of 10 ( Start time: 07:04:20 PM ) Total Marks: 1
Which of following marketing campaigns are cheap an effective way to target potential customers?
Select correct option:
Sale forces
E-mail (page # 133)
Media promotion
Marketing software
Click here to Save Answer & Move to Next Question
MC080405962 : Muhammad Umer Siddique Quiz Start Time: 07:05 PM
Time Left 87
sec(s)
Question # 1 of 10 ( Start time: 07:05:31 PM ) Total Marks: 1
Call handling, sales tracking and Transaction support(technology / personnel) activities are included in which management system
Select correct option:
Customer Relationship Management system (page # 136)
Public relation management system
Inventory management system
Data Base Management system
Click here to Save Answer & Move to Next Question
MC080405962 : Muhammad Umer Siddique Quiz Start Time: 07:05 PM
Time Left 86
sec(s)
Question # 2 of 10 ( Start time: 07:06:01 PM ) Total Marks: 1
The result of OLAP (Online Data Processing) is displayed in the form of a __________.
Select correct option:
Data square
Data Triangle
Data cube (page # 145)
Data circle
Click here to Save Answer & Move to Next Question
MC080405962 : Muhammad Umer Siddique Quiz Start Time: 07:05 PM
Time Left 84
sec(s)
Question # 3 of 10 ( Start time: 07:06:14 PM ) Total Marks: 1
Which of these is a tool that can be used to improve customer services?
Select correct option:
Log file analysis
Cookies
Data mining
All (page # 136)
Click here to Save Answer & Move to Next Question
MC080405962 : Muhammad Umer Siddique Quiz Start Time: 07:05 PM
Time Left 86
sec(s)
Question # 4 of 10 ( Start time: 07:06:27 PM ) Total Marks: 1
Web catalogue revenue model includes
Select correct option:
a. Online sellers of computer
b. Gifts, flowers, clothes
c. Journals
d. A and B (page # 130)
Click here to Save Answer & Move to Next Question
MC080405962 : Muhammad Umer Siddique Quiz Start Time: 07:05 PM
Time Left 84
sec(s)
Question # 5 of 10 ( Start time: 07:06:37 PM ) Total Marks: 1
When you email at [email protected] , your email is automatically sorted and replied to your ID.
Select correct option:
True
False
Click here to Save Answer & Move to Next Question
MC080405962 : Muhammad Umer Siddique
Time Left 20
sec(s)
Quiz Start Time: 07:05 PM
Question # 6 of 10 ( Start time: 07:06:47 PM ) Total Marks: 1
CPM is an advertising payment mode. CPM stands for ________.
Select correct option:
Cost Per Month
Cost Per Minute
Cost Per Megabyte (Cost per Thousand where thousand=megabyte) pg # 134)
Cost Per Message
Click here to Save Answer & Move to Next Question
MC080405962 : Muhammad Umer Siddique Quiz Start Time: 07:05 PM
Time Left 84
sec(s)
Question # 7 of 10 ( Start time: 07:08:04 PM ) Total Marks: 1
Objective of any marketing strategy is to bring the customers quickly to the ___________.
Select correct option:
Familiarity stage
Exploration stage
Separation stage
Commitment stage (page #137)
Click here to Save Answer & Move to Next Question
MC080405962 : Muhammad Umer Siddique Quiz Start Time: 07:05 PM
Time Left 83
sec(s)
Question # 8 of 10 ( Start time: 07:08:15 PM ) Total Marks: 1
In many countries, stealing and misusing of meta information for getting competitive advantage is considered as an offence known as
Select correct option:
Tort of Private Nuisance
Tort of Tress passing
Tort of passing off (page # 138)
Defamation
Click here to Save Answer & Move to Next Question
MC080405962 : Muhammad Umer Siddique
Time Left 87
sec(s)
Quiz Start Time: 07:05 PM
Question # 9 of 10 ( Start time: 07:08:30 PM ) Total Marks: 1
Meta tag contains:
Select correct option:
User information
seller information
web page key information pg #138
bank information
Click here to Save Answer & Move to Next Question
MC080405962 : Muhammad Umer Siddique Quiz Start Time: 07:05 PM
Time Left 85
sec(s)
Question # 10 of 10 ( Start time: 07:08:38 PM ) Total Marks: 1
Do you think, vulms.vu.edu.pk is an example of E-mail marketing?
Select correct option:
True
False
Click here to Save Answer & Move to Next Question
MC080407990 : Muhammad Rasheed
Quiz Start Time: 07:10 PM
Time Left 77
sec(s)
Question # 2 of 10 ( Start time: 07:11:05 PM ) Total Marks: 1
Which of these is an algorithm used in clustering?
Select correct option:
K-means pg #145
L-means
C-means
F-means
Click here to Save Answer & Move to Next Question
MC080407990 : Muhammad Rasheed
Quiz Start Time: 07:10 PM
Time Left 87
sec(s)
Question # 3 of 10 ( Start time: 07:11:24 PM ) Total Marks: 1
In…………………, there is no direct contact with the end users
Select correct option:
B2B
B2C
C2C (page # 137)
All
Click here to Save Answer & Move to Next Question
MC080407990 : Muhammad Rasheed
Quiz Start Time: 07:10 PM
Time Left 53
sec(s)
Question # 4 of 10 ( Start time: 07:11:38 PM ) Total Marks: 1
Dividing the potential customers into groups is called
Select correct option:
Market Segmentation (page # 131)
Market Promotion
Market Research
Market Survey
Click here to Save Answer & Move to Next Question
MC080407990 : Muhammad Rasheed Quiz Start Time: 07:10 PM
Time Left 52
sec(s)
Question # 6 of 10 ( Start time: 07:12:30 PM ) Total Marks: 1
Which of these is NOT a stage of knowledge discovery process?
Select correct option:
Transformation
Data mining
Pattern evaluation
Process evaluation (page # 140)
Click here to Save Answer & Move to Next Question
MC080407990 : Muhammad Rasheed
Quiz Start Time: 07:10 PM
Time Left 35
sec(s)
Question # 7 of 10 ( Start time: 07:13:20 PM ) Total Marks: 1
In the template prefix, Template<class T> What kind of variable is the parameter T?
Select correct option:
T must be a class.
T must not be a class.
T can be only types built into the C++ language.
T can be any type, whether built into C++ or defined by the programmer.
Click here to Save Answer & Move to Next Question
MC080404926 : JAMAL MIRAN Quiz Start Time: 07:16 PM
Time Left 6
sec(s)
Question # 10 of 10 ( Start time: 07:18:49 PM ) Total Marks: 1
How many stages involve in customer loyalty model for creating good customer relationship?
Select correct option:
6
5
4
3
Click here to Save Answer & Move to Next Question
What is true about ERP? Select correct option: Integrate all business functions At Single Location Efficient use of resource ALL Above Enterprise Resource Planning (ERP) is a concept that integrates all aspects of a business e.g, accounting, logistics, manufacturing, marketing, planning, project management etc. at a single place http://vuzs.net/ The process of taking active role in working with suppliers to improve products and processes is called ______________. Select correct option: ERP Marketing Supply Chain Management Sale Engaging and negotiating with suppliers can be extremely beneficial. The process of taking active role in working with suppliers to improve products and processes is called supply chain management. Today, firms are reaching beyond limits of their own organizational structure Consider the following definition template < class T > class Xyz { … }; Select correct option: it defines a class template for integers only it defines a class template for any class class templates are not defined in this way***** none of given options Question # 1 of 10 ( Start time: 11:41:47 AM ) Total Marks: 1 EDI involves exchange of ________. Select correct option: Electronic business documents Data Resources NONE of Above EDI is used by organizations for transactions that occur on a regular basis according to a pre-determined format. It involves exchange of electronic business documents, i.e., purchase orders, invoices etc. EDI transactions are carried through special EDI software http://vuzs.net/ Question # 6 of 10 ( Start time: 11:46:36 AM ) Total Marks: 1 Survey and market research are used for which poetr identified activity? Select correct option: Identify Design**** I was select Identify customer Identify customers’ refer to those activities which try to find new customers and ways to serve better to the existing ones, e.g, surveys and market research; Question # 5 of 10 ( Start time: 11:45:11 AM ) Total Marks: 1 In which type of approach, we further dig the data for retrieving information from data warehouse? Select correct option:
Slice Dice Drill down Roll up Using drill-down we can further dig the data to receive some specific information. For example using that I can find the sale of furniture in a specific month of the first quarter, say, February Question # 2 of 10 ( Start time: 11:42:39 AM ) Total Marks: 1 Supply Chain Mangment broken down into ___________. Select correct option: Upstream activities Internal activities Downstream activities All of Above Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities Question # 8 of 10 ( Start time: 11:48:11 AM ) Total Marks: 1 Poter Market and sell activities relates to _____________. Select correct option: advertising, promotions managing salespersons monitoring distribution channel All of Above ‘Market and sell’ activities give buyers a way to purchase and provide inducement for them to do sohttp://vuzs.net/ , e.g, advertising, promotions, managing salespersons, monitoring distribution channel, pricing etc. ==========done VAN can _____. Select correct option: Reduce network traffic Provide protocol compatibility between the sender and the recipient, wherever that is missing. Question # 2 of 10 ( Start time: 10:25:45 AM ) Total Marks: 1 What is true about Personal finance? Select correct option: Sell you products in no time. Buy you products in no time. allows the management of your financial matters in a customized manner. None Question # 3 of 10 ( Start time: 10:26:36 AM ) Total Marks: 1 A value chain is a way of organizing activities that each strategic business unit undertakes to ___________. Select correct option: design produce promote All of Above A value chain is a way of organizing activities that each strategic business unit undertakes to design, produce, promote, market, deliver and support the products or services it sells. Question # 4 of 10 ( Start time: 10:27:47 AM )
Total Marks: 1 Activities associated with the flow and transformation of goods from the raw materials stage all the way to the end user ___________. Select correct option: Marketing Suply Chain Managment ERP Online Chain Control Supply chain includes all the activities associated with the flow and transformation of goods from the raw materials stage all the way to the end user. Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities. Question # 5 of 10 ( Start time: 10:28:35 AM ) Total Marks: 1 Porter Market and sell activities relates to _____________. Select correct option: advertising, promotions managing salespersons monitoring distribution channel All of Above Market and sell’ activities give buyers a way to purchase and provide inducement for them to do so, e.g, advertising, promotions, managing salespersons, monitoring distribution channel, pricing etc. Page 152 http://vuzs.net/ Question # 6 of 10 ( Start time: 10:29:59 AM ) Total Marks: 1 Technology development relates to activities ___________. Select correct option: fields tests maintenance of procedures process improvement studies All of Above Technology development’ relates to activities which help improve product/service that a business is selling and also help improve processes in every primary activity, e.g, fields tests, maintenance of procedures, process improvement studies etc. In personal finance what is true? Select correct option: online data is imported automatically into the register. transactions maintained by the software package. vuzs account/transaction details are downloaded through the internet. All of Above In personal finance online data is imported automatically into the register of transactions maintained by the software package as the account/transaction details are downloaded through the internet. Question # 8 of 10 ( Start time: 10:31:35 AM ) Total Marks: 1 ___________ strategy is defined as concentration on a single aspect of the market. Select correct option: Focus Differentation Focus strategy is defined as concentration on a single aspect of the market. http://vuzs.net/ Question # 9 of 10 ( Start time:
10:32:02 AM ) Total Marks: 1 Popular software packages for personal finance are ___________. Select correct option: Quicken MS Money Money 2003 All of Above Question # 10 of 10 ( Start time: 10:32:57 AM ) Total Marks: 1 Which of these is NOT a stage of knowledge discovery process? Select correct option: Transformation Data mining Pattern evaluation Process evaluation A knowledge discovery process includes data cleaning, data integration, data selection, data transformation, data mining, pattern evaluation and knowledge presentation. Total Marks: 1 Strategic business unit is a combination of a particular _____________. Select correct option: product distribution channel customer type All of Above ) In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT included: Select correct option: Buyer Accounts identifier Buyer password Address of Merchant Actual amount of money in favor of merchant 2) By adding which of the following to your website improve customer service? Select correct option: Attractive products Banner Advertisement Email links Interactive Advertising Reference: E-mails can be used to improve customer service by adding an e-mail link to your web site. Thus, you can receive your customers’ complaints through e-mails. It should be ensured that your e-business is capable of 3) Objective of any marketing strategy is to bring the customers quickly to the _________. Select correct option: Familiarity stage Exploration stage Separation stage Commitment stage
4) Which of these is a tool that can be used to improve customer services? Select correct option: Log file analysis Cookies Data mining All 5) How many stages involve in customer loyalty model for creating good customer relationship? Select correct option: 6 5 4 3 www.vuzs.net 6) Call handling, sales tracking and Transaction support(technology / personnel) activities are included in which management system Select correct option: Customer Relationship Management system Public relation management system Inventory management system Data Base Management system 7) You read about a company X in newspaper. Your relation with company X is at familiarity stage. Select correct option: True False 8) JIT Stands for Select correct option: Just In Time Joint investigation Technique Join in Training Just In Total 9) Let us, suppose that you have hosted early your e-commerce website to sell sweets online: Your customers are acquaint with the name of your company and “DesiGhee Burfi ”. They have never interacted with your company. Which of following loyalty stages they are? Select correct option: Awareness Exploration Familiarity Commitment Reference: Awareness This is the first stage where customers recognize the name of the company or any of its products. However, they have never interacted with the company before. A company/business can achieve this level by properly advertising its brand.
10) ET and SSL both are same with respect to security. Select correct option: True False 11) Which statement is most appropriate description of the term “Interactive-advertisement”? Select correct option: By making an advertisement message using flash animation. Putting an audio or video message on the website to attract customer. By avoiding customer’s involvement in the advertisement process. By involving the customer in the advertisement process itself. 12) Quiz Start Time: 04:28 PM Time Left 88 sec(s) Question # 1 of 10 ( Start time: 04:28:31 PM ) Total Marks: 1 Four P’s in Marketing Mix are Select correct option: Product, price, place, promotion Price, person, place, problem Place, product, property, promotion Promotion, place, product, planning 13) Quiz Start Time: 04:28 PM Time Left 87 sec(s) Question # 2 of 10 ( Start time: 04:29:03 PM ) Total Marks: 1 Let us, suppose that you have hosted your e-commerce website, When you provide “opt-in e-mail” option to your customers on your website and customer opt for it , what does it mean to receive ? Select correct option: Information about product through advertisement Information about product through e-mail Information about services available on it Information about News through e-mail. 14) Quiz Start Time: 04:28 PM Time Left 83 sec(s) Question # 3 of 10 ( Start time: 04:30:16 PM ) Total Marks: 1 How many stages involve in customer loyalty model for creating good customer relationship? Select correct option: 6 5 4 3 www.vuzs.net 15) Quiz Start Time: 04:28 PM Time Left 86 sec(s) Question # 4 of 10 ( Start time: 04:30:55 PM ) Total Marks: 1 Free-Trial advertisement means _________. Select correct option: Free coupons are placed on certain websites for customers so that they can use it for shopping. Customer is offered to use the product free of cost for a specific amount of time.
Items bought are delivered to the customers with no delivery cost. The company didn’t had to pay for this advertisement 16) Quiz Start Time: 04:28 PM Time Left 87 sec(s) Question # 5 of 10 ( Start time: 04:31:46 PM ) Total Marks: 1 What is the right sequence of steps involved in development of customer’s relationship with the business? Select correct option: Familiarity, Awareness, Commitment, Exploration, Separation Awareness, Exploration, Familiarity, Commitment, Separation Familiarity, Awareness, Exploration, Commitment, Separation Awareness, Commitment, Familiarity, Exploration, Separation 17) Quiz Start Time: 04:28 PM Time Left 87 sec(s) Question # 6 of 10 ( Start time: 04:33:04 PM ) Total Marks: 1 SETSET(secure Electronic Transaction) was developed in Select correct option: 1995 1996 1997 1999 18) Quiz Start Time: 04:28 PM Time Left 86 sec(s) Question # 7 of 10 ( Start time: 04:34:49 PM ) Total Marks: 1 Some web retailers allow their customers to create their own product. It is called. Select correct option: One to one Marketing One to many Marketing Many to one marketing All of the above Reference: Some web retailers allow their customers to create their own product. For example there are computer companies online that allow their customers to choose component of a computer to configure their own computer according to their need. This is called one-to-one marketing. 19) Quiz Start Time: 04:28 PM Time Left 84 sec(s) Question # 8 of 10 ( Start time: 04:35:40 PM ) Total Marks: 1 Vertical Web portals are made for Select correct option: Single area Broad range of topics Wide variety of things Broad range of topics and Wide variety of things 20) Quiz Start Time: 04:28 PM Time Left 86 sec(s) Question # 9 of 10 ( Start time: 04:36:45 PM ) Total Marks: 1
Which of following services build a strong customer loyalty towards company and its products? Select correct option: Customer services Public relations(PR) Bulletin board Exhibitions 21) Question # 1 of 10 ( Start time: 04:42:31 PM ) Total Marks: 1 To overcome the lack of physical proximity appearance problem in e-business, which technology is going to be used? Select correct option: Biometrics Video conferencing Cryptography Biometrics and Video conferencing 22) Question # 2 of 10 ( Start time: 04:44:07 PM ) Total Marks: 1 Using SSL, we type in URL as : Select correct option: www.vuzs.net https httpc httpc httpi 23) Question # 3 of 10 ( Start time: 04:45:14 PM ) Total Marks: 1 CRM stands for ............... Select correct option: Customer Relationship Management Customer Related Management Customer Resembling Management Customer Reallocation Managemen 24) Question # 4 of 10 ( Start time: 04:45:41 PM ) Total Marks: 1 SET and SSL both are same with respect to security. Select correct option: True False 25) Question # 5 of 10 ( Start time: 04:46:11 PM ) Total Marks: 1 In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT included: Select correct option: Buyer Accounts identifier Buyer password Address of Merchant Actual amount of money in favor of merchant 26) Question # 6 of 10 ( Start time: 04:46:42 PM ) Total Marks: 1 Which of following services build a strong customer loyalty towards company and its products? Select correct option: Customer services
Public relations(PR) Bulletin board Exhibitions. 27) Question # 7 of 10 ( Start time: 04:47:35 PM ) Total Marks: 1 Which of following marketing campaigns are cheap an effective way to target potential customers? Select correct option: Sale forces E-mail Media promotion Marketing software 28) Question # 8 of 10 ( Start time: 04:48:20 PM ) Total Marks: 1 Free-Trial advertisement means _________. Select correct option: Free coupons are placed on certain websites for customers so that they can use it for shopping. Customer is offered to use the product free of cost for a specific amount of time. Items bought are delivered to the customers with no delivery cost. The company didn’t had to pay for this advertisement. 29) Question # 9 of 10 ( Start time: 04:48:59 PM ) Total Marks: 1 Which of the following option best represent “Data mining can improve response rate tremendously”? Select correct option: Direct mailing Personalization technology E-business Opt-in e-mail 30) Question # 10 of 10 ( Start time: 04:50:29 PM ) Total Marks: 1 CPM is an advertising payment mode. CPM stands for ______. Select correct option: Cost Per Month Cost Per Minute Cost Per Megabyte Cost Per Message 31) Which statement is most appropriate description of the term “Interactive-advertisement”? Select correct option: By making an advertisement message using flash animation. Putting an audio or video message on the website to attract customer. By avoiding customer’s involvement in the advertisement process. By involving the customer in the advertisement process itself. 32) What does Telemarketing means? Select correct option: Marketing through charting Marketing through telephone Marketing through emai Marketing through web casting
33) What is the right sequence of steps involved in development of customer’s relationship with the business? Select correct option: Familiarity, Awareness, Commitment, Exploration, Separation Awareness, Exploration, Familiarity, Commitment, Separation Familiarity, Awareness, Exploration, Commitment, Separation Awareness, Commitment, Familiarity, Exploration, Separation 34) www.amzon.com as you all familiar with it. Which of the following loyalty stages its customers are: ( Who don’t know about it): Detail about amzon.com Amazon was one of the first major companies to sell goods by Internet, and was an iconic "stock in which to invest" of the late 1990s dot-com bubble. Jeff Bezos founded Amazon.com, Inc. in 1994, and launched it online in 1995. Amazon.com started as an on-line bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3 format, computer software, , etc. Amazon has established separate websites in Canada, the United Kingdom, Germany, France, China, and Japan. It also provides global shipping to certain countries for some of its products. Select correct option: Awareness Exploration Familiarity Commitment 35) Web catalogue revenue model includes Select correct option: a. Online sellers of computer b. Gifts, flowers, clothes c. Journals d. A and B 36) Track the customers online and do personalization is only possible through which of the following file(s) analysis. Select correct option: log files cookie data mining log files and cookies. Reference: Cookies can be used to track customers online. Typically, a unique ID of the customer is stored in the cookie file on the hard disk. Same ID is also stored in the database along with the record of previously purchased items by the customer. When the customer again visits the online store, cookie (having customer ID prepared against that URL) is transmitted by the browser to the server side. There, it is matched with the ID in the database. This enables the merchant side to know that a particular customer (with a known buying pattern) has come to visit again. By tracking the customer in this manner, personalized recommendations for certain items can be made to the customer in real time. 37) In the template prefix, Template<class T> What kind of variable is the parameter T? Select correct option: T must be a class. T must not be a class. T can be only types built into the C++ language. ………… (Not sure L) T can be any type, whether built into C++ or defined by the programmer.
38) Fee for Transaction Models include Select correct option: Travel Agents and Insurance brokers Automobile Sales and event tickets Stock brokers and online banking All of the above 39) While designing a website, which of the following factors an internet marketer should pay attention to? Select correct option: Easy site navigation (i.e. Site map) Frequently asked questions (FAQs) section Privacy policy All of above 40) Question # 1 of 10 ( Start time: 05:17:27 PM ) Total Marks: 1 Four P’s in Marketing Mix are Select correct option: Product, price, place, promotion Price, person, place, problem Place, product, property, promotion Promotion, place, product, planning 41) Question # 2 of 10 ( Start time: 05:17:43 PM ) Total Marks: 1 In…………………, there is no direct contact with the end users Select correct option: B2B B2C C2C All 42) Question # 3 of 10 ( Start time: 05:18:01 PM ) Total Marks: 1 What is the right sequence of steps involved in development of customer’s relationship with the business? Select correct option: Familiarity, Awareness, Commitment, Exploration, Separation Awareness, Exploration, Familiarity, Commitment, Separation Familiarity, Awareness, Exploration, Commitment, Separation Awareness, Commitment, Familiarity, Exploration, Separation 43) Question # 4 of 10 ( Start time: 05:18:13 PM ) Total Marks: 1 Payment gateway is an organization which connects those entities to the internet which are offline. Select correct option: True False 44) Question # 5 of 10 ( Start time: 05:18:55 PM ) Total Marks: 1 Customer Loyalty model is also called Select correct option: Customer Life Cycle Customer Segmentation Customer Awareness All 45) Question # 8 of 10 ( Start time: 05:20:28 PM ) Total Marks: 1 Creation of separate experiences for customers based on their behavior is called
Select correct option: Demographic segmentation Behavioral segmentation Geo-Graphic Segmentation None of the above 46) Question # 9 of 10 ( Start time: 05:20:53 PM ) Total Marks: 1 Which of the following option best represent “Data mining can improve response rate tremendously”? Select correct option: Direct mailing Personalization technology E-business Opt-in e-mail 47) Question # 10 of 10 ( Start time: 05:21:04 PM ) Total Marks: 1 Dividing the potential customers into groups is called Select correct option: Market Segmentation Market Promotion Market Research Market Survey 48) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 1 of 10 ( Start time: 05:24:11 PM ) Total Marks: 1 Web catalogue revenue model includes Select correct option: a. Online sellers of computer b. Gifts, flowers, clothes c. Journals d. A and B 49) Quiz Start Time: 05:24 PM Time Left 88 sec(s) Question # 2 of 10 ( Start time: 05:24:25 PM ) Total Marks: 1 Which entity does not include in SET(secure Electronic Transaction)? Select correct option: Seller Buyer Payment gateway Bank 50) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 3 of 10 ( Start time: 05:25:05 PM ) Total Marks: 1 Call handling, sales tracking and Transaction support(technology / personnel) activities are included in which management system Select correct option: Customer Relationship Management system Public relation management system Inventory management system Data Base Management system
51) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 5 of 10 ( Start time: 05:25:32 PM ) Total Marks: 1 Do you think that "www.vu.edu.pk" can be considered as university's advertisement website? Select correct option: Yes No 51) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 6 of 10 ( Start time: 05:26:29 PM ) Total Marks: 1 Traditionally Marketer use the market segmentation(s) like Select correct option: Geo-graphic Segmentation Demographic Segmentation Psychographic Segmentation All of the above 52) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 7 of 10 ( Start time: 05:27:00 PM ) Total Marks: 1 Advertising Supported Revenue Model includes Select correct option: Yahoo portal Employment sites Newspaper Publishers All of the above 53) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 8 of 10 ( Start time: 05:27:37 PM ) Total Marks: 1 SSL stands for Select correct option: Secure Socket Layer Security Service Layer Sub Secured Length None of these 54) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 10 of 10 ( Start time: 05:28:22 PM ) Total Marks: 1 In e-business, market research is slower than offline business. Select correct option: True False 55) ipher suite is a combination of Select correct option: Cryptographic Algorithm Authentication methods
Security layers Cryptographic Algorithm And Authentication methods 56) Question # 5 of 10 ( Start time: 05:36:53 PM ) Total Marks: 1 www.amzon.com as you all familiar with it. Which of the following loyalty stages its customers are: ( Who don’t know about it): Detail about amzon.com Amazon was one of the first major companies to sell goods by Internet, and was an iconic "stock in which to invest" of the late 1990s dot-com bubble. Jeff Bezos founded Amazon.com, Inc. in 1994, and launched it online in 1995. Amazon.com started as an on-line bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3 format, computer software, , etc. Amazon has established separate websites in Canada, the United Kingdom, Germany, France, China, and Japan. It also provides global shipping to certain countries for some of its products. Select correct option: Awareness Exploration Familiarity Commitment 57) Question # 2 of 10 ( Start time: 05:43:49 PM ) Total Marks: 1 Which of the following is cheapest and quickest marketing technique to reach distant customers? Select correct option: E-Mail marketing Telephone marketing SMS marketing Advertisement letters marketing Quiz Start Time: 05:42 PM Time Left 89 sec(s) 58) Question # 3 of 10 ( Start time: 05:44:52 PM ) Total Marks: 1 JIT concept means Select correct option: No distribution channel No warehousing Easily delivery No communication 59) Question # 6 of 10 ( Start time: 05:47:03 PM ) Total Marks: 1 Brick and Mortar refers to Select correct option: Offline business Online business Transport Building 60) Question # 7 of 10 ( Start time: 05:48:16 PM ) Total Marks: 1 How many kinds of Web Portals are? Select correct option: 3 2 5 6
61) Quiz Start Time: 05:42 PM Time Left 88 sec(s) Question # 8 of 10 ( Start time: 05:49:06 PM ) Total Marks: 1 Press release can provide information about current events and news to, which of following, via a internet? Select correct option: Print media T.v commercial Press or media T.v program. 62) Question # 1 of 10 ( Start time: 05:53:24 PM ) Total Marks: 1 When you email at [email protected] , your email is automatically sorted and replied to your ID. Select correct option: True False 63) Question # 5 of 10 ( Start time: 05:55:05 PM ) Total Marks: 1 Visitor’s location, IP address, time of visit related information are added, in which of the following Select correct option: call handling files cookies log files Data mining files. 64) Question # 7 of 10 ( Start time: 05:55:50 PM ) Total Marks: 1 Which of following marketing campaigns are cheap an effective way to target potential customers? Select correct option: Sale forces E-mail Media promotion Marketing software 65) Question # 8 of 10 ( Start time: 05:56:06 PM ) Total Marks: 1 Suppose you are using "warid telecom" as your mobile connection and you ignor any other mobile company's advertisement because you want to keep using warid no matter what others offer. Your relationship with warid is at _____________. Select correct option: Exploration stage Commitment stage Awareness stage Separation stage 66) Question # 9 of 10 ( Start time: 05:57:03 PM ) Total Marks: 1 Dividing potential customers on the basis of variables such as social class, personality, or lifestyle is called__________. Select correct option: Demographic Segmentation Geographic Segmentation Psychographic segmentation Behavioral segmentation
67) Question # 1 of 10 ( Start time: 06:02:08 PM ) Total Marks: 1 Do you think, vulms.vu.edu.pk is an example of E-mail marketing? Select correct option: True False 68) Which one is not an example of search engine? Select correct option: Yahoo Google Alta vista Gawab 69) Let us, suppose that you have hosted early your e-commerce website to sell sweets online: Your customers are acquaint with the name of your company and “DesiGhee Burfi ”. They have never interacted with your company. Which of following loyalty stages they are? Select correct option: Awareness Exploration Familiarity Commitment 70) Which 5th P introduced by E-business in Marketing Mix? Select correct option: Proper coverage Personalized Services Proper access Personal style 71) ETSET(secure Electronic Transaction) was developed by Select correct option: Microsoft Netscape Navigator Master Cards and VISA All of the options 72) Which of these can be used for advertisement purpose? Select correct option: Telephone Newspapers Magazines All of above 73) Question # 5 of 10 ( Start time: 06:21:36 PM ) Total Marks: 1 Which of the following is a method for conducting market research? Select correct option: Phone Interviews Questionnaires All of above
74) Which of the following is NOT an advertising payment mode? Select correct option: Pay-per-sale Pay-per-click Pay-per-keypress Pay-per-lead 75) Question # 1 of 10 ( Start time: 06:25:05 PM ) Total Marks: 1 Advertising Subscription Mixed Revenue Model includes Select correct option: Online journals Sports information services Business week online All of the above 76) Question # 2 of 10 ( Start time: 06:25:59 PM ) Total Marks: 1 Digital Content Revenue Model Includes Select correct option: Legal information services Online journals Online Libraries All of the above 77) Question # 4 of 10 ( Start time: 06:27:06 PM ) Total Marks: 1 Which of these is a tool that can be used to improve customer services? Select correct option: Log file analysis Cookies Data mining All 78) Question # 9 of 10 ( Start time: 06:29:26 PM ) Total Marks: 1 Which of the following is an advertising payment mode? Select correct option: Pay-per-person Pay-per-page Pay-per-sale Pay-per-minute 79) Question # 10 of 10 ( Start time: 06:29:52 PM ) Total Marks: 1 If a company's marketing stretegy is focusing on customers having age less than 30, which of the following marketing segmentation technique is being used by company? Select correct option: Demographic Segmentation Geographic Segmentation Psychographic segmentation Behavioral segmentation 80) E-Business promotions are used to _______. Select correct option: Attract the customer to the product and convince him/her to buy it. Get credit card information from the customer. Complete a transaction between customer and seller. None of above
1. Public Key of the receiver is used to-------------------. a. Decrypt the message b. Encrypt the message c. Scramble the message d. None of the mentioned options
2. Receiver applies ----------------to the received original message a. Digital signature b. Message digest c. Hash function d. None of the mentioned options
3. Symmetric key can be replaced with----------------------------.
a. Symmetric algorithms b. Pair of public and private keys c. Asymmetric key d. None of the mentioned options
4. In --------------------attack an attempt is made by the attacker to decrypt the message with every possible key.
a. Key search attack b. Cryptanalysis c. System based d. None of the mentioned options
5. Most of the electronic payment systems on internet use ------------------to ensure confidentiality and security of the payment information.
a. Quantum computing b. Cryptography c. Both of the mentioned options d. None of the mentioned options
for more contents visit
http://groups.google.com/group/vuZs
6. Simplicity and ----------------is the biggest advantage of Virtual PIN payment system.
a. Full encryption b. Dual encryption c. No encryption d. None of the mentioned options
7. In electronic checks which type of cryptography is used
a. Both symmetric and asymmetric b. Symmetric c. Asymmetric d. None of the mentioned options
8. An electronic check book device is a combination of
a. Hardware and a digital signature b. Software and information about user c. Secure hardware and software d. None of the mentioned options
9. Which of the following is disadvantage of virtual PIN payment system? 1. Bogus purchases are possible 2. Stolen credit card number can be used 3. Only some extra copies of the information items are made in case of a fraud 4. All of the mentioned options are disadvantages of Virtual PIN payment system 10. FV stands for
a. First Virtual b. Forward Virtual c. Famous virtual d. None of the mentioned options
E-COMMERCE QUIZ 3
JANUARY 2007 http://groups.google.com/group/vuZs
Shared By China Rose ( [email protected] )
Solved By vuZs Solution Team umeed.e.( [email protected] )
1. Customers can provide their feedback or register their complaints quite conveniently in case of online business as compared to offline business True False
2. Physical proximity with items purchased and no inventory cost are disadvantages of e-business
True False
3. Online publishing is attractive because printing and distribution costs are involved in it.
True False
4. In Geographic segmentation customers are divided into groups on the basis of where they live or work
True False
5. Discount advertisements through web sites are form of e-marketing
True False
for more contents visit http://groups.google.com/group/vuZs
http://groups.google.com/group/vuZs
Visit this group
6. Interactive advertising is a term used to refer to internet-based broadcasting of audio and video content.
True False
7. One major goal of CRM is to establish a long-lasting relationship between a company and its customers
True False
8. In case of B2B there is direct contact with the end users
True False
9. AltaVista and yahoo are examples of search engines
True False
10. Segment information is useful for companies to develop better relationship with other companies.
True False
for more contents visit http://groups.google.com/group/vuZs
E-COMMERCE QUIZ 2
DECEMBER 18, 2006 Solved By vuZs Solution Team
http://groups.google.com/group/vuZs
1. Public Key of the receiver is used to-------------------.
a. Decrypt the message b. Encrypt the message c. Scramble the message d. None of the mentioned options
2. Receiver applies ----------------to the received original message a. Digital signature b. Message digest
http://groups.google.com/group/vuZs
Visit this group
c. Hash function d. None of the mentioned options
3. Symmetric key can be replaced with----------------------------.
a. Symmetric algorithms b. Pair of public and private keys c. Asymmetric key d. None of the mentioned options
4. In --------------------attack an attempt is made by the attacker to decrypt the message with every possible key.
a. Key search attack b. Cryptanalysis c. System based d. None of the mentioned options
5. Most of the electronic payment systems on internet use ------------------to ensure confidentiality and security of the payment information.
a. Quantum computing b. Cryptography c. Both of the mentioned options d. None of the mentioned options
for more contents visit http://groups.google.com/group/vuZs
6. Simplicity and ----------------is the biggest advantage of Virtual PIN payment system. a. Full encryption b. Dual encryption c. No encryption d. None of the mentioned options
7. In electronic checks which type of cryptography is used?
a. Both symmetric and asymmetric b. Symmetric c. Asymmetric d. None of the mentioned options
8. An electronic check book device is a combination of
a. Hardware and a digital signature b. Software and information about user c. Secure hardware and software d. None of the mentioned options
9. Which of the following is disadvantage of virtual PIN payment system? 1. Bogus purchases are possible 2. Stolen credit card number can be used 3. Only some extra copies of the information items are made in case of a fraud 4. All of the mentioned options are disadvantages of Virtual PIN payment system 10. FV stands for
a. First Virtual b. Forward Virtual c. Famous virtual d. None of the mentioned options
for more contents visit SETSET(secure Electronic Transaction) was developed by Select correct option: Microsoft Netscape Navigator Master Cards and VISA All of the options SSL stands for Select correct option: Secure Socket Layer Security Service Layer Sub Secured Length None of these What is basic advantage of symmetric algorithms? Select correct option: Symmetric key does not use any encryption Symmetric algorithms are faster Symmetric algorithms are easy to understand All of above Which of these keys can be used for encryption instead of using pair of private and public keys? Select correct option: Systematic key Asymmetric key Symmetric key All of above Using SSL, we type in URL as : Select correct option: https httpc httpc httpi Reference: (Page # 121) In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT included: Select correct option: Buyer Accounts identifier Buyer password Address of Merchant Actual amount of money in favor of merchant A unique large number, generated as a result of applying hash function on a message is called ______. Select correct option: Hash message Message digest Digitally singed message Secret message Reference: (page # 103)
FVIPSS stands for _______. Select correct option: First Virtual Internet Payment System Server First Virtual International Payment System Server First Virtual International Payment System Services First Virtual Internal Payment System Services Reference: (Page # 110) Virtual PIN Payment system is considered suitable for ________. Select correct option: Low-cost items High-cost items Very expensive items Every kind of items Which of these is a primary participant in E-Cash Payment system? Select correct option: Buyer Bank Merchant All Most of the electronic payment systems on internet use cryptography. Select correct option: True False In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last …………………withdrawals to the E-bank. Select correct option:
10
12
14
16 Reference: (page # 119) The key feature of E-Cash Payment system is
Select correct option:
Anonymity
Security
Cryptography
None of these
Reference: (page # 116) At minting stage, the client is ……………..by E-Cashbank
Select correct option:
Known
Unknown
Secret
informed
Reference: (page. 118) Cipher suite is a combination of
Select correct option:
Cryptographic Algorithm
Authentication methods
Security layers
Cryptographic Algorithm And Authentication methods Reference: (page. 121)
SETSET(secure Electronic Transaction) was developed in Select correct option:
1995
1996
1997
1999
Reference: (page no. 122) Symmetric algorithms are faster than asymmetric. Select correct option: True False Reference: (Page # 105) Which entity does not include in SET(secure Electronic Transaction)? Select correct option: Seller Buyer Payment gateway Bank Reference: (Page # 122) A paper signature is believed to be more reliable than a digital signature. Select correct option: True False If a key is 4 bit in length, how many unique key values are possible? Select correct option: 4 8 16 32 Explanation: A key value is always in binary form. A Binary Number is made up of only 0s and 1s. So each digit has only two possibilities: 0 or 1, So now we try to check all possible values of 4. 4 bit = 0000, 0001,
0010, 0100, 1000, 0011,
0110, 1100, 0101, 1010, 1011, 1101, 1001, 1110, 0111, 1111
Hence prove that if a key is 4 bit in length, then 16 unique key values are possible of that key. Hash function is a __________ Select correct option: Communication protocol Hardware device Encryption mechanism Log file Which of these attacks have been reported on symmetric key algorithms? Select correct option: Key Search Attacks Cryptanalysis System-Based Attacks All Reference: (Page # 108) Payment gateway is an organization which connects those entities to the internet which are offline. Select correct option: True False Reference: (Page # 122) How many elements an e-coin has? Select correct option: 1 2 3 4 Reference: (page # 116) EFT stands for _____________. Select correct option: Electronic Film Transmission Electronic Funds Transfer Electronic File Translation None of above Reference: (Page # 114) ________ is used to interpret and show contents of the webpage. Select correct option:
HTML Notepad Browser Computer What is identified by the tag ? Select correct option: Horizontal frame Bottom Frame Top Frame Vertical Frame Which of the following is NOT an advantage of CSS? Select correct option: Define the look of your pages in one place Works on version 4 browsers or newer Easily change the look Implement same formatting each time tag is used. Links are used to connect ____________. Select correct option: Images Text Images and web documents All of the given Which of the following are correct tags used for frames, Select correct option:
Do you think that "www.vu.edu.pk" can be considered as university's advertisement website? Select correct option: Yes No Characterization and Clustering belong to which of the following types of Data Mining? Select correct option: Predictive Selective Descriptive Additive Reference: (Page # 141) Traditionally Marketer use the market segmentation(s) like Select correct option: Geo-graphic Segmentation Demographic Segmentation Psychographic Segmentation All of the above Reference: (Page # 131) Advertising Subscription Mixed Revenue Model includes Select correct option: Online journals Sports information services Business week online All of the above OLAP stands for…………… Select correct option: Online Analytical Program Online Analytical Processing Online Application Program Online Analysis Performance Reference: (Page # 145) E-Business promotions are used to _______. Select correct option: Attract the customer to the product and convince him/her to buy it. Get credit card information from the customer. Complete a transaction between customer and seller. None of above Reference: (Page # 133) Television, radio and print media are in a (n) ……………………. Mode. Select correct option: Passive Active
Static Dynamic Reference: (Page # 139) CRM stands for ............... Select correct option: Customer Relationship Management Customer Related Management Customer Resembling Management Customer Reallocation Management Reference: (Page # 136) Which one is not an example of search engine? Select correct option: Yahoo Google Alta vista Gawab Reference: (Page # 137) Meta tag contains: Select correct option: User information seller information web page key information bank information Reference: (Page # 138) Free-Trial advertisement means _________. Select correct option: Free coupons are placed on certain websites for customers so that they can use it for shopping. Customer is offered to use the product free of cost for a specific amount of time. Items bought are delivered to the customers with no delivery cost. The company didn’t had to pay for this advertisement. Reference: (Page # 133) In many countries, stealing and misusing of meta information for getting competitive advantage is considered as an offence known as Select correct option: Tort of Private Nuisance Tort of Tress passing Tort of passing off Defamation Reference: (Page # 138)
If a company's marketing stretegy is focusing on customers having age less than 30, which of the following marketing segmentation technique is being used by company? Select correct option: Demographic Segmentation Geographic Segmentation Psychographic segmentation Behavioral segmentation Reference: (Page # 131) Press release can provide information about current events and news to, which of following, via internet? Select correct option: Print media T.v commercial Press or media T.v program. Reference: (Page # 135) Fee for Transaction Models include Select correct option: Travel Agents and Insurance brokers Automobile Sales and event tickets Stock brokers and online banking All of the above Reference: (Page # 130) An E-Business can't have direct feedback from the customer in B2C. Select correct option: True False Creation of separate experiences for customers based on their behavior is called Select correct option: Demographic segmentation Behavioral segmentation Geo-Graphic Segmentation None of the above Reference: (Page # 132) What is the right sequence of steps involved in development of customer’s relationship with the business? Select correct option: Familiarity, Awareness, Commitment, Exploration, Separation Awareness, Exploration, Familiarity, Commitment, Separation Familiarity, Awareness, Exploration, Commitment, Separation Awareness, Commitment, Familiarity, Exploration, Separation Reference:
(Page # 136) At deposit stage, the serial number is ……………..by E-Cashbank ► Known ► Unknown ► Kept Secret ► Informed Reference: (Page # 118) How many kinds of Web Portals are? ► 3 ► 2 ► 5 ► 6 Explanation: There are only two kinds of web portals, one is vertical portals which provides information about single interest like online shopping sites are best example of vertical portal site, educational site is also an example of vertical portal. Second kind of web portal is horizontal web portals which provide information about everything or multiple things. Search engine is best example of horizontal web portal. Reference: (page # 129) Let us, suppose that you have hosted your e-commerce website, When you provide “opt-in e-mail” option to your customers on your website and customer opt for it , what does it mean to receive ? ► Information about product through advertisement ► Information about product through e-mail ► Information about services available on it ► Information about News through e-mail. Reference: (page # 133) Track the customers online and do personalization is only possible through which of the following file(s) analysis. ► log files ► cookie ► data mining ► log files and cookies. Reference: (page # 136) When customer life cycle is used to create different groups of customers, it is called? ► Targeting Customers ► Dynamic groups ► Customer Life Cycle Segmentation ► Group Development Reference: (page # 137)
Network addresses 128--- 191 range belongs to which of the following class networks? ► A ► B ► C ► E Reference: (page # 10)
Which of the following property falls in HTTP? ► Stateless
► Stateful ► Temporary ► All of these
Reference: (page # 3) FSTC stands for: ► Financial Services Technology Consortium
► Financial Secrets Technology Consortium ► Final Security threats control ► First Service Technology Consortium
Reference: (page # 113) Supply chain can be broken into three parts, that is ----------------- , ----------------------- and -------------------- activities. ► Internal, external support ► Upstream, internal ,downstream ► Primary, Secondary ,R&D ► None of them Reference: (page # 155) The process of taking active role in working with suppliers to improve products and processes is called? ► Value chain management ► Supply chain management ► Supply chain management software ► Porter Model Reference: (page # 155) What is Ultimate consumer orientation? ► Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. ► Secondary Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. ► Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of supply chain. ► None of them Reference: (page # 156)
Many search engines rank the site by using a program called ► Spider
► Scorpion ► Moon ► Cobweb
Reference: (page # 138) E-commerce is a combination of three different areas of study, namely, --------, ---------------- and ---------------- ► Internal, external support, Support ► Technology, business and law/policy ► Primary, Secondary, R&D
► Sale, purchase, feed back Reference: (page # 161)
In which type of data mining, Apriori algorithms is used? ► Classification ► Association ► Characterization ► Clustering Reference: (page # 143) EDI has the key feature(s) ► No paper work ► No human intervention ► Exchange of information takes place in seconds ► All of these Reference: (page # 147) Addresses are tied to the device itself and give no clue to it's location on a global scale. This is the characteristics of
► IP ► RIP ► MAC ► None of the given
When two or more intranets are connected to each other they form a/an ------------- . ► intranet ► internet ► extranet ► VPN Reference: (page # 2) Which attribute can be used to make a region non-clickable?
► none of the given ► target ► alt ► nohref
Reference: (page # 37) Which of the following payment mode does not require customer to pay interest to the bank on each transaction? ► Credit card ► Debit card ► Electronic check ► All of the above Reference: (page # 110) Cyber wallet can automatically assemble the correct payment and pay it too. ► True ► False
SET doesn’t require special software on the client or merchant side. ► True ► False Which model allows the users to log-on on a website and assume the role of bidder or seller?
► Online Banking. ► Storefront Model. ► E-Learning. ► Auction Model.
Reference: (Page # 128) According to Michael Porter, “fabricating” is an example of primary activity in a strategic business unit. Identify the area in which this task is performed. ► Market and sell ► Deliver’ activities relate to storage ► Purchase materials and supplies ► Manufacture product or create service Reference: (Page # 152) Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Is it?
► True ► False
In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, ---------------- and ----------
► Acceptance and consideration ► Acceptance and Rejection ► Approval and consideration ► None
Reference: (page # 178) In online environment acceptances may be issued by an imposter/cheater that has authority to bind the online business
► True ► False
#00ff00 in HTML indicates ► Pure green color ► Pure blue color ► Pure red color ► Pure yellow color Reference: (Page # 23) Virtual PIN Payment System requires both merchant and buyer to register with _______________. ► Auto Clearing House (ACH) ► First Virtual (FV) ► DSS (Digital Signature Standard) ► DES (Data Encryption Standard) Reference: (Page # 110) Classification and Association belong to which of the following types of Data Mining?
► Selective ► Predictive
► Descriptive ► Additive
Reference: (Page # 141) Which one of the followings is an example of Banner advertising? Select correct option: Branding Affiliate programs Partnership All of these Reference: (Page # 138) CPM is an advertising payment mode. CPM stands for ________. Select correct option: Cost Per Month Cost Per Minute Cost Per Megabyte Cost Per Message Reference: (Page # 134) Which one is not an example of search engine? Select correct option: Yahoo Google Alta vista Gawab Reference: (Page # 137) In which type of approach, we further dig the data for retrieving information from data warehouse? Select correct option: Slice Dice Drill down Roll up Reference: (Page # 146) Let us, suppose that you have hosted your e-commerce website, Promotion messages can be sent when potential client is Select correct option: online offline both online and offline visiting head office Reference: (Page # 133) Digital Content Revenue Model Includes Select correct option: Legal information services Online journals Online Libraries All of the above Reference: (Page # 130) Which of these is a tool that can be used to improve customer services?
Select correct option: Log file analysis Cookies Data mining All Reference: (Page # 136) What does Telemarketing means? Select correct option: Marketing through charting Marketing through telephone Marketing through emai Marketing through web casting Reference: (Page # 133) In which type of data mining, ID3 algorithms is used? Select correct option: Classification Association Characterization Clustering Reference: (Page # 141) Some web retailers allow their customers to create their own product. It is called. Select correct option: One to one Marketing One to many Marketing Many to one marketing All of the above Reference: (Page # 132) Free-Trial advertisement means ___________. Select correct option: Free coupons are placed on certain websites for customers so that they can use it for shopping. Customer is offered to use the product free of cost for a specific amount of time. Items bought are delivered to the customers with no delivery cost. The company didn’t had to pay for this advertisement Reference: (Page # 133) Total Marks: 1
The length of a message digest is ________.
Select correct option:
32 to 64 bits
64 to 128 bits
128 to 256 bits
256 to 512 bit
Reference: (Page # 103) Key version represents public key by
Select correct option:
Buyer
Seller
E-Bank
Certification Authority
Reference: (Page # 116) The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the ___________.
Select correct option:
Bank
Merchant
Client
None
Reference: (Page # 116) ACH is a centralized system used by different interconnected banks for clearing payment requests. Select correct option: True False Centralized Account Payment Model uses unique _______ of users as their account identifier. Select correct option: Residence address E-mail address Office address None Reference: (Page # 113) SET and SSL both are same with respect to security. Select correct option: True False
What are the security threats in VPS? Select correct option: a. Email hacking b. Credit card number stolen c. Missing of delivery d. A and B What is function of Cyberwallet? Select correct option: Store coins Manage Coins Record transactions All of above SET and SSL both are same with respect to security. Select correct option: True False Basic difference between Virtual PIN Payment System and Electronic Check is _____. Select correct option: Encryption Registration with bank No. of participants There is no difference between them You are free to distribute and use it. In case you wanted to host or re-distribute it. Please don’t remove the links of group and website. Question No: 1 Key version represents public key by Buyer Seller E-Bank Certification Authority Ref: PAGE # 116 E-cash Coins The currency used in this payment system is called an e-cash coin or simply coin. A coin consists of three elements or parts - serial #, key version and serial no. signed by the secret or private key of a certain denomination of the e-cash bank. In other words, a coin of one dollar would consist of the following: Coin = Serial#, key version, {Serial #} SK bank’s $1 key Each coin has a unique value, partly minted by the client and partly by the e-cash bank. Question No: 2 SSL stands for Secure Socket Layer Security Service Layer Sub Secured Length None of these Ref: PAGE # 121 SECURE SOCKET LAYER (SSL) SSL is a protocol developed by Netscape Communications. SSL is built into many browsers. It operates at the TCP/IP layer of the OSI model, and uses a combination of symmetric and asymmetric cryptography. Question No: 3 How many kinds of Web Portals are?
3 2 5 6 Ref: PAGE # 129 Portal Model Portals are the web sites which provide chance to the visitors to find almost everything in one place. Horizontal portals provide information about a very broad range of topics. Search engine is the example of a horizontal portal. Vertical portals provide information pertaining to a single area of interest. Community Portals such as those related to medical or legal profession are the examples of a vertical portal. Question No: 4 Brick and Mortar refers to Offline business Online business Transport Building Ref: PAGE # 129 Brick-and-Mortar vs. Click-and-Mortar businesses These two terms refer to the offline and the online businesses, respectively. Where a company is doing its business both online and offline, there is often the problem of lack of proper integration between the two different channels of business. Note: Offline business = Brick-and-Mortar And Online Business = Click-and-Mortar businesses Question No: 5 Digital Content Revenue Model Includes Legal information services Online journals Online Libraries All of the above Ref: PAGE # 130 Digital Content Revenue Model Web serves as a very efficient distribution mechanism of content. Therefore, one finds many e-businesses that offer different types of information services such as legal information, corporate information, government information, news and resources for academic libraries etc. These services can be customized by an e-business for different firm sizes depending upon their needs and usage pattern. Normally, a customer has to subscribe to such services by paying certain amount as subscription fee. This fee becomes the main source of generating revenue for the e-business. Instead of subscription fee, a credit card charge option can be made available for infrequent users. Online journals, newspapers, libraries fall under this category Question No: 6 Which of following marketing campaigns are cheap an effective way to target potential customers? Sale forces E-mail Media promotion Marketing software Ref: PAGE # 133 E-MAIL MARKETING E-mail marketing campaigns are cheap and effective way to target potential customers. Question No: 7
What does Telemarketing means? Marketing through charting Marketing through telephone Marketing through email Marketing through web casting Ref: PAGE # 133 Telemarketing Live interaction through telephone Question No: 8 Which of following services build a strong customer loyalty towards company and its products? Customer services Public relations(PR) Bulletin board Exhibitions. Ref: PAGE # 136 One major goal of CRM is to establish a long-lasting relationship between a company and its customers. Good customer services can help in building a sense of loyalty towards company and its products or services. Question No: 9 Track the customers online and do personalization is only possible through which of the following file(s) analysis. log files cookie data mining log files and cookies. Ref: PAGE # 136 You know that cookies allow e-commerce sites to record visitor behavior. They can be used to track customers online and do personalization. Many customers do not know that their information is being collected and used by the e-business site. Question No: 10 Which of the following is true for Class A: Network 01 byte and 03 hosts Network 02 bytes and 02 hosts Network 03 bytes and 01 host None of these Ref: PAGE # 10 By rule, in class A networks first byte would refer to the network address and the remaining three bytes to the host machines on that network providing a very large network.
http://vuzs.net/ http://groups.google.com/group/vuZs
Question No: 11 What is the correct HTML for making a text input field? <textinput type="text"> <input type="text"> <input type="textfield"> <textfield>
Ref: PAGE # 27 First Name: <INPUT TYPE="TEXT" NAME="First"> Question No: 12
IIS stands for:
International Information Service Internet Information Server Internet Information standards All of these Ref: PAGE# 85 ASP We can discuss ASP a little more in detail. It runs best on IIS (Internet Information Server) which is freely available with Windows NT and Windows 2000. Question No: 13 The payer and the payee are issued digital certificates in ………… standard format by their respective banks. X. 509 F. 609 L.8999 N.586 Ref: PAGE # 101 Digital certificates These are the certificates in electronic form which establish whether or not a public key belongs to the purported owner. A digital certificate at least comprises a public key, certification information (name, ID etc.) and electronic signatures of a certification authority. Digital certificates are prepared according to a generally accepted format called X.509 standard format. Question No: 14
What is a E-Cash wallet ? Hardware Agent Software All of the above Ref: PAGE # 116 Buyers and merchants, both, have accounts in the E-cash bank. Buyers withdraw coins against their account and store them in e-cash wallet software (Cyber wallet) on their computer. Cyber wallet stores and manages coins and records every transaction. Question No: 15
An E-cash coin consists of element (s) like: Serial # provided by client Key version Serial# signed by E-cash bank All of the above Ref: PAGE # 116 Coin = Serial#, key version, {Serial #} SK bank’s $1 key Question No: 16 What is Ultimate consumer orientation? Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. Secondary Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain.
Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of supply chain. None of them Ref: PAGE # 156 Supply chain and ultimate consumer orientation: Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. This approach is called ultimate consumer orientation. In 1995, a company dealing in the business of production of tiers in America adopted a different approach by shifting its focus on tire dealers from ultimate customers. Question No: 17 Customer data can be gathered and analyzing it customers can be served in a better Manner according to their needs, which is best option? Customization Customer orientation Customer satisfaction Focus Ref: PAGE # 157 Customization: With the help of EC, customer data can be gathered and analyzing it customers can be served in a better manner according to their needs. One can, thus, implement differentiation and focus strategy. Question No: 18 A company ABC web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death in that culture. Which is the international barrier it is having? Culture Language Lack of trust Infrastructure Ref: PAGE # 162 A web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death in that culture. Question No: 19 Exclusive right granted by law to make, use and sell an invention. What is called? Parasites Trade mark Patent infringement Copyright Ref: PAGE # 181 Patent infringement: A patent is an exclusive right granted by law to make, use and sell an invention. In order to be patentable, the invention must be unique, genuine, and useful according to the prevalent technological standards. Question No: 20 Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act. Which legal issue arises due to such acts? Cyber Crimes
Online Defamation Cyber squatting None Ref: PAGE # 182 Online Defamation: A defamatory statement is a false statement that injures the reputation of on another person or company. If a statement injures the reputation of a product or service instead of a person, it is called product disparagement. Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act.
http://vuzs.net/ http://groups.google.com/group/vuZs
Question No: 21 How can you reference part of a string? text.substr(5,6); text.part(5,6) text.piece(5,6) text.split(5,6); Ref: PAGE # 70 String Object: In the following example, ‘str’ and ‘myArray’ are the instances of string and array objects, respectively. The size of the array is 10. Here, charAt() is the function/method of string object. So, charAt(3) would provide the value of the element at the index three. Different other functions of string object have also been used. In the example, str.Split(' ') splits the string on the basis of blank space. After splitting, we assign parts of the string as values for the array. Question No: 22 One Tier Architecture __________. Select correct option: The entire processing may take place at individual terminal. The entire processing may take place at different terminal. The entire processing may not take place at individual terminal. None of Above Ref: PAGE # 88 Client server architecture: Note that we may have different tiers in client server architecture depending on where the processing of data takes place. In 1-tier architecture, the entire processing takes place at a single place/zone. Question No: 23 Following are the names of some well known e-commerce software, EXCEPT ----------- . Intershop IBM's WebSphere Commerce Professional Edition Microsoft Commerce Server 2002 Microsoft SQL Server 2005 Ref: PAGE # 93 E-commerce Software: Following are the names of some well-known e-commerce software: Intershop Enfinity IBM’s WebSphere Commerce Professional Edition Microsoft Commerce Server 2002 Question No: 24 In Style Sheets, How do you change the font of an element? font-face: font:
font-family: font-style: Ref: PAGE # 43 Font family styles <HTML> <HEAD> <TITLE>Style Sheets: Font Families</TITLE> <STYLE> Question No: 25 A paper signature is believed to be more reliable than a digital signature. ► True ► False Ref: PAGE # 106 A digital or electronic signature is believed to be more reliable as compared to paper signatures because it is not ordinarily possible to copy or forge an electronic/digital signature. But, that is very much possible in case of paper signatures. Question No: 26 The serial # generated by the cyber wallet gets multiplied by blinding factor ‘r’ which is known only to the ___________. Client Bank Merchant None of above Ref: PAGE # 116 Cyberwallet generates a serial # and a blinding factor ‘r’. This blinding factor “r” is only known to the client. It is used in the following mathematical expression which is sent to the bank for signatures. Serial # . re2 (mod m) Question No: 27 SET doesn’t require special software on the client or merchant side. True False Ref: PAGE # 122 Merchants must have special SET software to process transactions. Customers must have digital wallet software that stores certificates and card information. Question No: 28 The result of OLAP is displayed in the form of a __________. Data square Data Triangle Data cube Data circle Ref: PAGE # 145 Online Analytical Processing (OLAP): OLAP makes use of background knowledge regarding the domain of the data being studied in order to allow the presentation of data at different levels of abstraction. It is different form data mining in the sense that it does not provide any patterns for making predictions; rather the information stored in databases can be presented/ viewed in a convenient format in case of OLAP at different levels that facilitates decision makers or managers. The result of OLAP is displayed in the form of a data cube Question No: 29 Classification and Association belong to which of the following types of Data Mining? Selective Predictive
Descriptive Additive Ref: PAGE # 145 Online Analytical Processing (OLAP): OLAP makes use of background knowledge regarding the domain of the data being studied in order to allow the presentation of data at different levels of abstraction. It is different form data mining in the sense that it does not provide any patterns for making predictions Question No: 30
Which one of the following algorithms does not include in public key algorithms? DSS RSA Elliptic Curves RC4 Ref: PAGE # 108 Public Key Algorithms: Following is the list some popular public key algorithms:
• DSS – Digital Signature Standard based on DSA (Digital Standard Algorithm) – key length is between 512-1024 bits
• RSA • Elliptic Curves
http://vuzs.net/ http://groups.google.com/group/vuZs
Question No: 31 Four P’s in Marketing Mix are: Product, price, place, promotion (Sure) Price, person, place, problem Place, product, property, promotion Promotion, place, product, planning Question No: 32 JIT Stands for Just In Time Joint investigation Technique Join in Training Just In Total Ref: PAGE # 147 For instance, packaging material should only be ordered for just in time (JIT) delivery Question No: 33 Advertising Supported Revenue Model includes Yahoo portal Employment sites Newspaper Publishers All of the above Ref: PAGE # 130 Advertising-Supported Revenue Model: In this model service/information is provided free of any charge to certain audience and the advertising revenue is sufficient to support the operation of the business and its cost. For example, Yahoo portal provides useful information and a search engine free of cost, but earns revenue through advertisements on its portal web site to bear the operational cost.
Question No: 34 Which of the following is true for Class A: Network 01 byte and 03 hosts Network 02 bytes and 02 hosts Network 03 bytes and 01 host None of these Ref: PAGE # 10 By rule, in class A networks first byte would refer to the network address and the remaining three bytes to the host machines on that network providing a very large network. Question No: 35 Which of the following needs human action to execute? Virus Worm Trojan Horse All of these Ref: PAGE # 94 Viruses, on the other hand, need to be activated through a human action. Question No: 36 In the digital signature technique, the sender of the message uses ________ to create cipher text His or Her own symmetric key His or her own private key His or her own public key The receiver’s private key Ref: PAGE # 103 Then the sender adds his private key in the obtained message digest to create his digital signatures. This digitally singed message is received by the receiver, who applies the pubic key of the sender to decrypt the digital signature and reveal the message digest. Question No: 37 PIN stands for: Payment investigation Number Password Identification Number Personal Identification Number Personal Identification Numeric Ref: http://www.wsu.edu/~brians/errors/pin.html Those who object to “PIN number” on the grounds that the N in “PIN” stands for “number” in the phrase “personal identification number” are quite right, but it may be difficult to get people to say anything else. “PIN” was invented to meet the objection that a “password” consisting of nothing but numbers is not a word Question No: 38 An electronic check contains a(n)………………… to the payer’s bank to make a specified payment to the payee Serial# Private key Instruction All of the above Ref: PAGE # 113 Electronic Checks:
Financial Services Technology Consortium (FSTC) is a group of U.S banks, research agencies and government organizations formed in 1993. It has introduced the concept of electronic checks. An electronic check contains an instruction to the payer’s bank to make a specified payment to a payee. Question No: 40 It is the ability to sell the goods or provide the service at a price that is lower than that of competitors, and thus attract more customers. What is called? Cost leadership Price leadership Focus Differentiation Ref: PAGE # 157 Cost leadership: It is the ability to sell the goods or provide the service at a price that is lower than that of competitors, and thus attract more customers.
http://vuzs.net/ http://groups.google.com/group/vuZs
Question No: 41 E-commerce is a combination of three different areas of study, namely, --------, ---------------- and ---------------- Internal, external support, Support Technology, business and law/policy Primary, Secondary, R&D Sale, purchase, feed back Ref: PAGE # 161 E-commerce is a combination of three different areas of study, namely, technology, business and law/policy. We have studied the technology and business side of e-commerce to a reasonably good extent. Question No: 42 GM Celebes manufacturing electronic goods and FryChips co selling French fries. Under the traditional trade mark law both these companies can have the same trade mark/trade name such as ‘frys’. The problem arises when both apply for the registration of a domain name containing the word ‘frys’. Here, both are legitimate claimants of this domain name but due to the element of uniqueness of domain names only one of them can be assigned the desired domain name. Which legal issue arises in this situation? Domain name conflict Cyber squatting Concurrent use None Ref: PAGE # 181 Concurrent use This problem arises when two organizations have apparently legitimate claim to use the same domain name but cannot do so due to the uniqueness of domain names. Suppose, there is a company manufacturing electronic goods and another company selling french fries. Under the traditional trade mark law both these companies can have the same trade mark/trade name such as ‘frys’ . The problem arises when both apply for the registration of a domain name containing the word ‘frys’ . Here, both are legitimate claimants of this domain name but due to the element of uniqueness of domain names only one of them can be assigned the desired domain name. Question No: 43 Which type of Data Mining contains the elements as Support and confidence? Classification Association Characterization
Clustering Ref: PAGE # 144 CONFIDENCE AND SUPPORT: There are two terms/measures used in association, that is, support and confidence. Confidence’ is a measure of how often the relationship holds true e.g, what percentage of time did people who bought milk also bought eggs. Question No: 44 OLAP stands for…………… Online Analytical Program Online Analytical Processing Online Application Program Online Analysis Performance Ref: PAGE # 145 Online Analytical Processing (OLAP): OLAP makes use of background knowledge regarding the domain of the data being studied in order to allow the presentation of data at different levels of abstraction. Question No: 45 Support activities in Value Chain model includes Finance and Administration Human Resources Technology Development All of these Ref: PAGE # 152 Question No: 46 Which of the following is NOT processed on the client side? Cookies JavaScript CGI scripts Applets Ref: PAGE # 82 CGI scripts: Term Common Gateway Interface (CGI) is defined as a standard method/protocol that allows data from forms to be used by programs on the server. Question No: 47 Due to which characteristics, ATM network are covered under E-commerce ? Exchange of information through computer networks (Doubt) Internet. Exchanging of products, services. None of the above. Basically ATM works to Exchange of information through computer networks so in my point of view it will held in definition of e-commerce. Ref: PAGE # 2 E-Commerce definition: Electronic commerce is an emerging concept that describes the process of buying and selling or exchanging of products, services and information via computer networks including the internet Question No: 48 SET is better than SSL.
True False Ref: PAGE # 122 Secure Electronic Transaction (SET): The drawback in SSL that the credit card/debit card information remains with the merchant led to the development of a more sophisticated protocol called SET. Question No: 49 Dividing market, with respect to people having income level greater than Rs 30000, is geographic segmentation. True. False. Ref: PAGE # 131 Segments are defined in terms of demographic characteristics such as age, gender, marital status, income level Question No: 50 Which of the following is NOT an identified behavioral mode of customers on the web? Browsers Buyers Shoppers Seller Ref: PAGE # 132 Behavioral segmentation Creation of separate experiences for customers based on their behavior is called behavioral segmentation. Three identified behavioral modes of the customers on the web are: Browsers – customers who just browse through the site with no intention of buying Buyers – customers who are ready to buy right away Shoppers – customers who are motivated to buy but want more information
http://vuzs.net/ http://groups.google.com/group/vuZs
Question No: 51 Which of these is a way of conducting market research? Phone. Interviews. Questionnaires. All of above. Ref: PAGE # 132 Marketing Research: It consists of interviews, paper and phone surveys, questionnaires, findings based on previous investigations etc. to find strengths and weaknesses of your business and the business of your competitors. It also includes the analysis of opportunities and threats to your business. Question No: 52 Which of these is NOT a stage of knowledge discovery process? Transformation Data mining Pattern evaluation Process evaluation Ref: PAGE # 140 Knowledge discovery:
A knowledge discovery process includes data cleaning, data integration, data selection, data transformation, data mining, pattern evaluation and knowledge presentation. Question No: 53 According to Michael Porter, “test marketing” is an example of primary activity in a strategic business unit. Identify the area in which this task is performed. Design Market and sell Deliver’ activities relate to storage Purchase materials and supplies Ref: PAGE # 152 Design’ activities take a product form concept stage to manufacturing stage. They include concept research, engineering, drawings preparation, test marketing etc. Question No: 54 Electronic banking is also known as __________. Cyber banking Virtual banking Online banking All of above Ref: PAGE # 150 Electronic Banking: Electronic banking, also known as cyber banking, virtual banking, home banking and online banking, includes various banking activities conducted from home, business, or on the road, instead of at a physical bank location. Question No: 55 Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Is it? True False Ref: PAGE # 176 Civil law and criminal law. Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Civil wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general. Question No: 56 In datalink layer, data packets are placed inside Data frames Data boxes Data streams None of these Ref: PAGE # 6 Data link layer: It places data packets into data frames. Network Interface Card Drivers/Protocols operate at this layer. It is used to identify MAC or hardware address of computer machines. Question No: 57
At deposit stage, the serial number is ……………..by E-Cashbank Known Unknown Kept Secret
Informed Ref: PAGE # 118 Deposit Stage Serial no. (Known) Client (unknown) Question No: 58 Let us, suppose that you have hosted your e-commerce website, When you provide “opt-in e-mail” option to your customers on your website and customer opt for it , what does it mean to receive ? Information about product through advertisement Information about product through e-mail Information about services available on it Information about News through e-mail. Ref: PAGE # 133 Internet mailing lists can also be conveniently used to send targeted personalized emails. You can also provide the “opt-in e-mail” option to your customers on your web site. If they opt for it, this means that they want to receive through email any product information, offers or promotions etc. Question No: 59
Track the customers online and do personalization is only possible through which of the following file(s) analysis. log files cookie data mining log files and cookies. Ref: PAGE # 136 You know that cookies allow e-commerce sites to record visitor behavior. They can be used to track customers online and do personalization. Many customers do not know that their information is being collected and used by the e-business site. Thus, informational privacy rights of customers can be breached in cases where cookies are used. Question No: 60 When customer life cycle is used to create different groups of customers, it is called? Targeting Customers Dynamic groups Customer Life Cycle Segmentation Group Development Ref: PAGE #137 Life Cycle Segmentation: These five stages are also called customer life cycle. Using them to create groups of customers is called customer life-cycle segmentation. Segment information is useful for companies to develop better relationship with the customers. Companies, thus, know about their customers and their level of relationship with the company, and can customize their product/service.
http://vuzs.net/ http://groups.google.com/group/vuZs
Question No: 61 Network addresses 128--- 191 range belongs to which of the following class networks? A B C E Ref: PAGE # 11
Examples Class A: 255.0.0.0 Class B: 255.255.0.0 Class C: 255.255.255.0 NOTE: in McQ 128--- 191 is not written after one dot it means they are separate from each other so it belong to A class. Question No: 62 Which of the following property falls in HTTP? Stateless Stateful Temporary All of these Ref: PAGE # 3 HTTP is stateless because in the fourth step the server breaks the connection. We can say, therefore:
• Each operation or transaction makes a new connection • Each operation is unaware of any other connection • Each click is a new connection
Question No: 63
FSTC stands for: Financial Services Technology Consortium Financial Secrets Technology Consortium Final Security threats control First Service Technology Consortium Ref: PAGE # 113 Financial Services Technology Consortium (FSTC) is a group of U.S banks, research agencies and government organizations formed in 1993. It has introduced the concept of electronic checks. An electronic check contains an instruction to the payer’s bank to make a specified payment to a payee. Question No: 64 Supply chain can be broken into three parts, that is ----------------- , ----------------------- and -------------------- activities. Internal, external support Upstream, internal ,downstream Primary, Secondary, R&D None of them Ref: PAGE # 155 SUPPLY CHAIN: Supply chain includes all the activities associated with the flow and transformation of goods from the raw materials stage all the way to the end user. Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities…
• Upstream activities relate to materials/services or the input from suppliers • Internal activities relate to manufacturing and packaging of goods • Downstream activities relate to distribution and sale of goods to distributors/customers
Question No: 65 The process of taking active role in working with suppliers to improve products and processes is called? Value chain management Supply chain management Supply chain management software Porter Model
Ref: PAGE # 155 Supply chain management: Engaging and negotiating with suppliers can be extremely beneficial. The process of taking active role in working with suppliers to improve products and processes is called supply chain management. Question No: 66 Many search engines rank the site by using a program called Spider Scorpion Moon Cobweb Ref: PAGE # 138 Some search engines search the entire internet each time. Many search engines rank the site by using a program called ‘spider’ which inspects the site before ranking. Question No: 67 In which type of data mining, Apriori algorithms is used? Classification Association Characterization Clustering Ref: PAGE # 143 Association: Association analysis is the discovery of association rules showing attribute-value conditions that occur frequently together in a given set of data. It is widely used for market basket analysis. For example, where we are recording sales of a big shopping store in databases, then by applying association mining we may discover that certain items have a strong bondage or affinity with each other such that when one item is purchased the other is purchased, too. Apriori algorithm is used for association mining. Question No: 68 EDI has the key feature(s) No paper work No human intervention Exchange of information takes place in seconds All of these Ref: PAGE # 147 EDI include:
• No paper work • No human intervention • Exchange of information takes place in seconds
Question No: 69 Addresses are tied to the device itself and give no clue to it's location on a global scale. This is the characteristics of IP RIP MAC None of the given Ref: PAGE # 13 Media access control (MAC) address: Data to be delivered on a network has to be converted first into serial transmission. This is done through a device called Network Interface Card (NIC) that must be installed in a computer on the network. NIC has also got printed on it a 48 bits unique address called the MAC or hardware address of the computer machine. In other words, it consists of 12 hexadecimal characters and can have different format as shown Below: 090017A9B2EF 09:00:17:A9:B2:EF
09-00-17-A9-B2-EF Whereas the IP address of a computer may change from time to time, its MAC address would remain the same unless the existing NIC is replaced with another. It can easily be inferred that there are 248 unique MAC addresses possible (which is an unimaginably high number). An organization called Institute of Electrical and Electronic Engineers (IEEE) administers the allocation of MAC addresses, worldwide. It ensures that there is no duplication of MAC addresses by the manufacturers of NICs. Question No: 70 When two or more intranets are connected to each other they form a/an ------------- . intranet internet extranet VPN Ref: PAGE # 98 VPN is the example of an extranet. You know that when two or more intranets are connected to each other they form an extranet. A manufacturing company thus can be connected to its suppliers of raw material and its distributors through VPN.
http://vuzs.net/ http://groups.google.com/group/vuZs
Question No: 71 ( Marks: 1 ) - Please choose one Which attribute can be used to make a region non-clickable? none of the given target alt nohref Ref: PAGE # 37 <Area> tag attributes: ‘alt’ attribute is used to label the clickable region. ‘Target’ attribute can be used to display result in a given frame. ‘Nohref’ attribute can be used to make a region non-clickable. For example, <Area shape=“circle” coords=“70,45,25” href=“a.htm” alt=“a.htm” target=“upper” nohref> Question No: 72 Which of the following payment mode does not require customer to pay interest to the bank on each transaction? Credit card Debit card Electronic check All of the above Ref: PAGE # 110 In case of a credit card the issuer bank charges interest from the client at a specified rate on the amount lent. On the other hand, in case of a debit card no such interest is payable since the customer uses his/her own money in that case. Question No: 73 Cyber wallet can automatically assemble the correct payment and pay it too. True False Ref: PAGE # 118 E-cash Purchase: Having received an order the merchant sends a payment request to the client in the following format: Payreq={currency,amount,timestamp,merchant_bank ID, merchant_accID, order description}
Cyber wallet automatically assembles the correct payment amount and pays. Question No: 74
SET doesn’t require special software on the client or merchant side. True False Ref: PAGE # 122 Merchants must have special SET software to process transactions. Customers must have digital wallet software that stores certificates and card information. Question No: 75 Which model allows the users to log-on on a website and assume the role of bidder or seller? Online Banking. Storefront Model. E-Learning. Auction Model Ref: PAGE # 128 Auction Model: In this model there are auction sites to which the users can log-on and assume the role of a bidder or seller. Question No: 76 Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Is it? True False Ref: PAGE # 176 Civil law and criminal law. Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Civil wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general. Question No: 77 In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, ---------------- and ---------- Acceptance and consideration Acceptance and Rejection Approval and consideration None Ref: PAGE # 178 Online contracts: In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, acceptance and consideration. The same three elements must also be present in case of a valid online contract. Question No: 78 In online environment acceptances may be issued by an imposter/cheater that has authority to bind the online business True False Ref: PAGE # 178
In online environment acceptances may be issued by an imposter/cheater that does not have authority to bind the online business. To overcome this problem companies and individuals can use digital signatures to establish identity in online transactions. Question No: 79 #00ff00 in HTML indicates Pure green color Pure blue color Pure red color Pure yellow color Ref: PAGE # 23 <BODY bgcolor=“Green” text=“white” link=“red”> Instead of giving the color name as value of ‘bgcolor’ one can also provide value in terms of a six digit code based on hexadecimal numbers called RGB values, e.g, #00FF00 refers to pure green color. Question No: 80 Virtual PIN Payment System requires both merchant and buyer to register with _______________. Auto Clearing House (ACH) First Virtual (FV) DSS (Digital Signature Standard) DES (Data Encryption Standard) Ref: PAGE # 110 Both merchants and buyers are required to register with First Virtual (FV) . A buyer registering with FV forwards his or her credit card details and email address to FV and in exchange receives a pass phrase called, Virtual PIN.
http://vuzs.net/ http://groups.google.com/group/vuZs
Question No: 81 Identity that machine which services the internet request? Web Client Web Server Browser Mozilla Ref: PAGE # 2 Basic Definitions: Web client- machine that initiates internet request Web server – machine that services internet request Browser - software at the client side to interact with web data Intranet – an internal network of computers confined to a single place Extranet – when two or more intranets are connected with each other, they form an Extranet – e.g, Virtual Private Network Internet – a global network of networks is defined as internet Question No: 82 What does ETO stands for Electronic Transactions Ordinance Electric Transport ordinance Electronic Treaty Organization All Ref: PAGE # 163 Electronic Transactions Ordinance, 2002 (ETO):
ETO is the law introduced in 2002 which extends to the whole of Pakistan. It basically provides legal recognition to documents in electronic form and to electronic signatures. To understand this law, it would be useful to revise the concept related to the working of digital signature technology (refer to Lecture no. 23). We shall look at salient provisions/features of this law as it directly deals with e commerce in Pakistan. Section 2 of the ETO defines different terms used in it. For convenience these terms have been reproduced here (you do not need to memorize these for exam). Question No: 83 Which one of the following algorithms does not include in symmetric key algorithms DES RC2 RC4 RSA Ref: PAGE # 108 Following is the list of some popular symmetric key algorithms: DES (Data Encryption Standard) – 56 bits IDEA (International Data Encryption Algorithm (IDEA) – 128 bits RC2 – (block cipher) 1-2048 bits RC4 (stream cipher) – 1-2048 bits Rinjdael – 128-256 bits Question No: 84 EFT stands for Electronic Funds Transfer Electronic Finance Transfer Easy Funds Transfer Early Funds Transaction Ref: PAGE # 114 EFT stands for ‘electronic funds transfer’. Question No: 85 Television, radio and print media are in a (n) ……………………. Mode Passive Active Static Dynamic Ref: PAGE # 139 Emotional branding vs. rational branding: In case of television, radio or print media people are normally in a passive mode. To a greater extent they do not control the communication channel and thus have to listen or view the advertisement about a brand. Question No: 86 Cipher suite is a combination of Cryptographic Algorithm Authentication methods Security layers Cryptographic Algorithm And Authentication methods Ref: PAGE # 121 SSL Handshake: SSL supports a variety of encryption algorithm and authentication methods. The combination of algorithms and methods is called a cipher suite. When a client connects to an SSL server, the SSL handshake begins, which means that the two negotiate a cipher suite selecting the strongest suite the two have in common.
Question No: 87 Which device uses the MAC address Switch Router Repeater None of these Ref: PAGE # 15 & 16 A switch would read the MAC address on a data packet and match it with the list of MAC addresses of the user machines contained in it. It then sends data packets only to that machine on a VLAN to which these packets relate. But on PAGE 16 about router see below line Routers: Routers use a combination of hardware and software to forward data packets to their destination on the internet. They are more efficient and sophisticated than bridges and switches. So my answer is Router Question No: 88 Choose the correct HTML code line which left-align the content inside a tablecell. <td leftalign> <td valign="left"> <td align="left"> <tdleft> Ref: PAGE # 26 Attributes for <TD> tag: Width - <td width=“50%”> specifies width of a cell with reference to the table width. Align - <td align=“center”> is used to align the text in a cell accordingly (you can also use left and right as values of ‘align’) . Valign- <td valign=“top”> is used to vertically align the text in a cell (you can also use bottom or middle as values of ‘valign’). Question No: 89 Which one of following illustrates relationship between "<! -->" and // ? Closely related Hide the code Different Hide the tags Question No: 90 We can divide the Client Server architecture up to: 1 Tier 2 Tier 3 Tier N –Tier Ref: PAGE # 89 We can divide the client server architecture into n – tiers.
http://vuzs.net/ http://groups.google.com/group/vuZs
Question No: 91 DSS stands for Digital Signature Standards Digital Support Standards
Decision support system Digital Sign System Ref: PAGE # 108 Following is the list some popular public key algorithms: DSS – Digital Signature Standard based on DSA (Digital Standard Algorithm) – key length is between 512-1024 bits Question No: 92 Which one of the followings is an example of Banner advertising? Branding Affiliate programs Partnership All of these Ref: PAGE # 138 Affiliate Programs: An affiliate program is an agreement between two parties that one will pay the other a commission based on a specified customer action. It is not a strategic union as is partnership. Rather, it is for limited purpose and time. Banner advertising is the example of an affiliate program. Question No: 93 A firm Glory Enterprise and it wants to have its web site. It also wants to have the word glory as a part of its domain name because for years it has been recognized in the physical world through this word. However, at the time of registration of its domain name it finds that a person Mr. A. who has nothing to do with the business of the firm or the word glory have already registered a domain name containing this word as a part of it. Since there cannot be two similar domain names, the firm is forced to request Mr. A to transfer that domain name to it. In response, if Mr. A blackmails or claims ransom from the said firm, He would be said to have committed -------------. Cyber squatting Parasites Patent infringement Trade mark and domain name conflicts Ref: PAGE # 181 Cyber squatting: The act of intentionally registering domain names containing trademarks/trade names of prominent Companies to later blackmail or demand ransom from those companies is called cyber squatting. It is Regarded as an offence in most countries. Assume there is a firm ‘Glory Enterprise’ and it wants to have its web site. It also wants to have the word ‘glory’ as a part of its domain name because for years it has been recognized in the physical world through this word. However, at the time of registration of its domain name it finds that a person Mr. ‘A’ who has nothing to do with the business of the firm or the word ‘glory’ has already registered a domain name containing this word as a part of it. Since there cannot be two similar domain names, the firm is forced to request Mr. ‘A’ to transfer that domain name to it. In response, if Mr. ‘A’ blackmails or claims ransom from the said firm, he would be said to have committed cyber squatting. Question No: 94 In which type of approach, we further dig the data for retrieving information from data warehouse? Slice Dice Drill down Roll up Ref: PAGE # 146 Using drill-down we can further dig the data to receive some specific information. For example using that I can find the sale of furniture in a specific month of the first quarter, say, February. Roll-up is the reverse of drill-down.
Question No: 95 Which activity does not include in Primary Identify Customers Design Delivery Administration Ref: PAGE # 152 Question No: 96 What of the following is the correct HTML tag for making a drop-down list? <input type="list"> <input type="dropdown"> <select> <list> Ref: PAGE # 29 Selection lists: General format <select name=“field name” size=“no. of items”> between the <select> and </select> tags are the <option> and </option> tags which define the list items. If you omit “size” the list becomes a drop-down list. If size is two or more, the list becomes a rectangle with scroll bars for navigating the choices. Using ‘Selected’ attribute an item is selected by default. Question No: 97 What does HTML stand for? Hyperlinks and Text Markup Language Home Tool Markup Language Hyper Text Markup Language Homepage Text Making Language Ref: PAGE # 18 Hypertext markup language: Web documents are defined by the Hypertext Markup Language (HTML). It is a language of tags. A tag is a special letter or key word enclosed in angular brackets. Question No: 98 JavaScript variables can begin with ----------- . a lower case letter an underscore character a dollar sign all of the above Ref: PAGE # 54 Rules for variables: Variable names can begin with an uppercase letter (A-Z), lower case letter (a-z), an underscore character (_), or dollar sign ($). Question No: 99 A unique large number, generated as a result of applying hash function on a message is called ________. Hash message Message digest Digitally singed message Secret message Ref: PAGE # 124
SET software on the customer side splits the order information from the account information. MDI is the message digest obtained by applying hash function on the order information . Question No: 100 FVIPSS stands for _________. First Virtual Internet Payment System Server First Virtual International Payment System Server First Virtual International Payment System Services First Virtual Internal Payment System Services Ref: PAGE # 110 Merchant queries the FV Internet Payment System Server (FVIPSS) to confirm Virtual PIN
http://vuzs.net/ http://groups.google.com/group/vuZs
Question No: 101 Which currency is used in e-cash Payment system? Dollar Coin Penny Cent Ref: PAGE # 116 Buyers and merchants, both, have accounts in the E-cash bank. Buyers withdraw coins against their account and store them in e-cash wallet software (Cyber wallet) on their computer. Question No: 102 Web browser and client wallet are installed on __________. Client's computer Bank's computer Merchant's computer None of above Ref: PAGE # 120 Client wallet and web browser are installed on the client machine. Question No: 103 Job searchers can search for jobs and employers can hire effectively using..... Online recruiting web sites. Online banking web sites. Online trading and lending web sites. Online news services web sites. Ref: PAGE # 128 Online Recruiting: Employers can recruit and job searchers can search for jobs effectively through online recruiting web sites. Question No: 104 According to Michael Porter, material handling is an example of primary activity in a strategic business unit. Identify the area in which this task is performed. Identify customers Market and sell Deliver activities relate to storage Purchase materials and supplies Ref: PAGE # 105 ‘Deliver’ activities relate to storage, distribution and shipment of final product, e.g, warehousing, selecting shippers, material handling, timely delivery to customers etc.
Question No: 105 IT/EC can reduce the overall ------------- and afford to keep the price of the product relatively low Production cost Marketing cost Distribution cost None Ref: PAGE # 159 A business using IT/EC can reduce the overall production cost and afford to keep the price of the product relatively low. Question No: 106 Law is broadly divided into two classes on the basis of nature of wrong, namely, --------- and --------------- Civil law and criminal law ETO and criminal law Supreme and Civil Law None Ref: PAGE # 176 Law is broadly divided into two classes on the basis of nature of wrong, namely, civil law and criminal law . Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Question No: 107 Browser is installed at : Client side machine Web server machine none both Client and Server Machines Ref: PAGE # 120 Web browser are installed on the client machine. Question No: 108 In Virtual Payment system, four kinds of information are provided to e-bank. Identify which one is NOT included: Buyer Accounts identifier Buyer password Address of Merchant Actual amount of money in favor of merchant Ref: PAGE # 112 To make payment an account holder is authenticated using an account identifier and a password, account identifier of the payee and the payment amount. Question No: 109 To overcome the lack of physical proximity appearance problem in e-business, which technology is going to be used Biometrics Video conferencing Cryptography Biometrics and Video conferencing Ref: PAGE # 134 Video conferencing is an example of web casting. For example, using this technique, doctors sitting in China, England and Pakistan etc. can, in real time, exchange and benefit from each other’s ideas as if they are physically holding a meeting.
Question No: 110 Dividing the potential customers into groups is called Market Segmentation Market Promotion Market Research Market Survey Ref: PAGE # 131 Market Segmentation: Businesses need to identify specific portions of their markets in order to target them with specific advertising messages. The practice called market segmentation divides the potential customers into segments or groups.
http://vuzs.net/ http://groups.google.com/group/vuZs
Question No: 111 Traditionally Marketer use the market segmentation(s) like Geo-graphic Segmentation Demographic Segmentation Psychographic Segmentation All of the above Ref: PAGE # 131 Traditionally, marketers have used three types of variables to define three different market segmentations, namely, geographic segmentation, demographic segmentation and psychographic segmentation. Question No: 112 In…………………, there is no direct contact with the end users. B2B B2C C2C All above options Ref: PAGE # 137 Key difference between B2C and B2B is that in case of B2B there is no direct contact with the end users, whereas this contact exists in B2C. Thus, an e-business can have direct response or feedback from its customers in B2C as compared to B2B. Question No: 113 Allocation of MAC addresses is administered by -------------------------- ICAAN ISO IEEE None Ref: PAGE # 13 It can easily be inferred that there are 248 unique MAC addresses possible (which is an unimaginably high number). An organization called Institute of Electrical and Electronic Engineers (IEEE) administers the allocation of MAC addresses, worldwide. It ensures that there is no duplication of MAC addresses by the manufacturers of NICs. Question No: 114 As a Web developer you can define a style sheet for? HTML elements and apply to many Web pages. A HTML element and apply to single Web page. A HTML element and apply to many Web pages. HTML elements and apply to one Web page. Ref: PAGE # 38 Style sheets:
Style sheet instructions can be embedded in the HTML document. An advantage of applying style sheets is that definition of the style’s formatting is created once and the browser applies that formatting each time the tag is used. Secondly, pages are easier to modify, that is, edit the style definition and all the places where the style is used within the page get updated automatically. Most popular type of style sheets is Cascading Style Sheets. Question No: 115 What shall come in blanks for proper result, Here blanks are numbered with 1,2 and 3 <html> <head> <SCRIPT language="JavaScript"> Var num1, var num2 Document.container .result.value=parseFloat(num1)-parseFloat(num2) </script> </head> <body> <FORM name=”---------1-----------”> <input type=”----------2-------” name=”-------3---------” maxlength=”5”> </form> </body> </html> container, text and result result, value and container container , button and value result, container and text Question No: 116 What does XML stand for? eXtra Modern Link X-Markup Language eXtensible Markup Language Example Markup Language Ref: PAGE # 74 Extensible markup language: World Wide Web Consortium (W3C), a non-profit organization that maintains standards for the web presented the draft of XML in late 1990’s. Question No: 117 Cryptographic Algorithms are measured in terms of Key length Complexity Simplicity All of the above Ref: PAGE # 107 & 108 Key Length: A cryptographic key is represented as a string of binary digits – 0’s & 1’s- inside a computer. & Cryptographic algorithms are measured in terms of key length. Question No: 118 -----------means that your product/service has certain quality that makes it more attractive than the one offered by your competitor, despite the price of your competitor’s product/service is somewhat lower Differentiation
Focus Cost leadership None of them Ref: PAGE # 157 Differentiation: Differentiation means that your product/service has certain quality that makes it more attractive than the one offered by your competitor, despite the price of your competitor’s product/service is somewhat lower. Question No: 119 Characterization and Clustering belong to which of the following types of Data Mining? Additive Predictive Selective Descriptive Ref: PAGE # 141 Classification and association are predictive types of data mining while characterization and clustering represent the descriptive type. Question No: 120 In which type of data mining, ID3 algorithms is used? Classification Association Characterization Clustering Ref: PAGE # 141 Classification: It allows you to have a predictive model labeling different samples to different classes. The results of this type of mining/model are represented as (if-then) rules, decision trees, neural networks etc. Two important algorithms used for this type are ID3 Algorithm , and Bayesian classification.
http://vuzs.net/ http://groups.google.com/group/vuZs
Question No: 121 ANSI stands for ………. American National Standards Institute All Network Standards Institute American New standards Institute Australia National standards Institute Ref: PAGE # 147 ANSI (American National Standards Institute) Question No: 122 Who is making the Web standards? International Standard Organization ANSI Microsoft The World Wide Web Consortium Ref: PAGE # 74 World Wide Web Consortium (W3C), a non-profit organization that maintains standards for the web presented Question No: 123 Which of following is NOT an attribute of <AREA> tag? shape circle href cords
Ref: PAGE # 37 <Area shape=“circle” coords=“70,45,25” href=“a.htm” alt=“a.htm” target=“upper” nohref> Question No: 124 Which of the following is an advantage of symmetric algorithms? Symmetric algorithms are faster Symmetric algorithms don't include any encryption Symmetric algorithms are slow in nature None of above Ref: PAGE # 105 A symmetric key can also be used for encrypting a message instead of using the pair of public and private keys. The advantage of using symmetric key is that since symmetric algorithms are faster as compared to asymmetric, therefore, the encryption of a message with the symmetric key takes place quickly. Question No: 125 What is the right sequence of steps in? Payee’s bank → Payer’s bank → Payee → Payer. Payer’s bank → Payee → Payee’s bank → Payer. Payer’s bank → Payee’s bank → Payer → Payee. Payer → Payee → Payee’s bank → Payer’s bank. Ref: PAGE # 113 Question No: 126 The key feature of E-Cash Payment system is __________. Simplicity Anonymity Availability Connectivity Ref: PAGE # 116 A company, DigiCash, has pioneered the use of electronic cash or e-cash. Anonymity of the buyer is the key feature of this system. There are three participants in it, namely, buyer, merchant and bank. Both, symmetric and asymmetric type of cryptography is used in this system. Question No: 127 In storefront e-business model buyers and sellers interact ___________ with each other. Directly. Indirectly. Through a third party. None of above. Ref: PAGE # 128 Storefront Model: It represents basic form of e-commerce where buyers and sellers interact directly . Question No: 128 Customers grouped by variables such as social class, personality or approach to life or lifestyle, is called ___________. Demographic Segmentation. Geographic Segmentation. Psychographic segmentation. Behavioral segmentation. Ref: PAGE # 131 Psychographic segmentation: Here customers are grouped by variables such as social class, personality or approach to life or lifestyle. Question No: 129 According to Michael Porter, “material handling” is an example of primary activity in a strategic business unit. Identify the area in which this task is performed.
Identify customers Market and sell Deliver’ activities relate to storage Purchase materials and supplies Ref: PAGE # 152 ‘Deliver’ activities relate to storage, distribution and shipment of final product, e.g, warehousing, selecting shippers, material handling, timely delivery to customers etc. Question No: 130 According to Michael Porter, “fabricating” is an example of primary activity in a strategic business unit. Identify the area in which this task is performed. Market and sell Deliver’ activities relate to storage Purchase materials and supplies Manufacture product or create service Ref: PAGE # 152 ‘Manufacture product or create service’ activities relate to transformation of materials and labor into finished products, e.g, fabricating, assembling, packaging etc.
http://vuzs.net/ http://groups.google.com/group/vuZs
Question No: 131 Web catalogue revenue model includes Online sellers of computer Gifts, flowers, clothes Journals Both first & second options Ref: PAGE # 130 Businesses using this type of a model include online sellers of computers, electronic items, books, music, videos, toys, flowers, gifts, clothes etc. Payment received from customers is the source of earning revenue. Question No: 132 In which type of approach, we sum up and integrate the information in a particular dimension to show the result? Dice Drill down Roll up Slice Ref: PAGE # 146 Roll-up is the reverse of drill-down. In it we can sum-up or integrate the information in a particular dimension to show the result. For example the sale of furniture or computers in a particular year (rather than a specific quarter) can be viewed using roll-up . Question No: 133 EDI used for ______. Used by organizations for transactions that not occur on a regular basis according to a pre-determined format. Used by organizations for transactions that occur on a regular basis according to a pre-determined format. Both NONE of Above Ref: PAGE # 147 ELECTRONIC DATA INTERCHANGE (EDI)
EDI is used by organizations for transactions that occur on a regular basis according to a pre–determined format . Question No: 134 Supply Chain Mangment broken down into ___________. Upstream activities Internal activities Downstream activities All of Above Ref: PAGE # 155 SUPPLY CHAIN: Supply chain includes all the activities associated with the flow and transformation of goods from the raw materials stage all the way to the end user. Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities…
• Upstream activities relate to materials/services or the input from suppliers • Internal activities relate to manufacturing and packaging of goods • Downstream activities relate to distribution and sale of goods to distributors/customers
Question No: 135 Mailbox: Outgoing messages can be placed. Incoming messages can be picked up. Ref: PAGE # 148 Postbox: where outgoing messages are placed, and Mailbox: where incoming messages can be picked up Question No: 136 In many countries, stealing and misusing of meta information for getting competitive advantage is considered as an offence known as Tort of Private Nuisance Tort of Tress passing Tort of passing off Defamation Ref: PAGE # 138 In many countries, stealing and misusing Meta information in this manner to gain business/competitive advantage is considered as an offence known as the tort of passing-off. Question No: 137 Three basic strategies for competitive advantage: __________. Cost leadership Differentiation
Focus All of Above Ref: PAGE # 157 Competitive Strategy: Ability of an organization to prosper arises from its competitive advantage over other organizations operating within its market sector. The strategy of a business to achieve this goal of competitive advantage is known as competitive strategy. Three basic strategies for competitive advantage are as under:
• Cost leadership • Differentiation • Focus
Question No: 138 Which of these is an algorithm used in clustering? K-means L-means C-means F-means Ref: PAGE # 145 K-means algorithm is normally used in clustering. Question No: 139 Web is a(n)…………….. Medium to disseminate information. Passive Active Static All of these Ref: PAGE # 139 Emotional appeals are difficult to covey on the internet because web is an active medium largely controlled by the customers Question No: 140 Each VAN has a centralized computer system that maintains ______________. One File Two Files Three Files Four Files Ref: PAGE # 148 Each VAN has a centralized computer system that maintains two files for each user, that is, Postbox: where outgoing messages are placed, and Mailbox: where incoming messages can be picked up
http://vuzs.net/ http://groups.google.com/group/vuZs
Question No: 141 EDI Advantages inclues ______ Short time Reduced Costs Both None of Above Ref: PAGE # 147 Instance, packaging material should only be ordered for just in time (JIT) delivery, so that E-Pens can cut down on its stock of packaging and reduce the inventory cost. Question No: 142 Popular software packages for personal finance are ___________. Quicken MS Money Money 2003 All of Above Ref: PAGE # 152 Popular software packages for personal finance are Quicken, MS Money and Money 2003 etc. Question No: 143 Meta tag contains: User information Seller information Web page key information Bank information Ref: PAGE # 138 META INFORMATION: You know that a Meta tag contains the key information of a web page. Question No: 144 Popular EDI standards are _______. ANSI (American National Standards Institute) X12 standard EDIFACT (United Nations Standard of Electronic Data Interchange for Administration, Commerce and Transport) Both None of Above REF: PAGE # 147
EDI documents are formatted using published standards. Two popular EDI standards are – ANSI (American National Standards Institute) X 12 standards and EDIFACT (United Nations Standard of Electronic Data Interchange for Administration, Commerce and Transport). Question No: 145 Technology development relates to activities ___________. Fields tests Maintenance of procedures Process improvement studies All of Above Ref: PAGE # 153 ‘Technology development’ relates to activities which help improve product/service that a business is selling and also help improve processes in every primary activity, e.g., fields tests, maintenance of procedures, process improvement studies etc. Question No: 146 Where there are quite a few erroneous or missing values in a row then that row can be deleted or discarded. This process is called............... Data Deletion Data Selection Data Integration Data Transformation Ref: PAGE # 141 Where there are quite a few erroneous or missing values in a row, then that row can be discarded/deleted altogether. This process is called data selection. Question No: 147 Upstream activities of the Supply Chain Managment relate to ___________. materials/services The input from suppliers Both None of Above Ref: PAGE # 155 Upstream activities relate to materials/services or the input from suppliers Question No: 148 Focus strategy means _____________________. That ability to sell the goods or provide the service at a price that is lower than that of competitors That your product/service has certain quality that makes it more attractive That concentration on a single aspect of the market
Concentration on many aspect of the market Ref: PAGE # 157 Focus: Focus strategy is defined as concentration on a single aspect of the market. That single aspect can be a particular market segment or market area or product type. Question No: 149 What is true about Personal finance? Sell you products in no time. Buy you products in no time. Allows the management of your financial matters in a customized manner None Ref: PAGE # 152 PERSONAL FINANCE ONLINE: Personal finance allows the management of your financial matters in a customized manner. Question No: 150 What is true about ERP? Integrate all business functions At Single Location Efficient use of resource ALL Above Ref: PAGE # 93 Enterprise Resource Planning: Enterprise Resource Planning (ERP) is a concept that integrates all aspects of a business e.g, accounting, logistics, manufacturing, marketing, planning, project management etc. at a single place. An ERP system such as SAP is expensive.
http://vuzs.net/ http://groups.google.com/group/vuZs
Question No: 151 Supply Chain Managment can be broken down into ___________. One Activity Two Activities Three Activities Four Activties Ref: PAGE # 155
• Upstream activities relate to materials/services or the input from suppliers • Internal activities relate to manufacturing and packaging of goods • Downstream activities relate to distribution and sale of goods to distributors/customers
Question No: 152
VAN Stands for ______. Value Added Network Value Added Noise Ref: PAGE # 148 Value Added Network (VAN): MIDTERM EXAMINATION Spring 2009 IT430- E-Commerce (Session - 4) Question No: 1 ( Marks: 1 ) - Please choose one In datalink layer, data packets are placed inside ► Data frames ► Data boxes ► Data streams ► None of these Question No: 2 ( Marks: 1 ) - Please choose one …..tag is used into …….tag because a row contains multi cells and to fill up these cells with data. ► TD…… TR ► TR…… TD ► TD…… TG ► TG…… TR Question No: 3 ( Marks: 1 ) - Please choose one Which tag is used for the hidden fields? ► <FIELD> ► <TEXT> ► <INPUT> ► <HIDDEN> Question No: 4 ( Marks: 1 ) - Please choose one Which of them is NOT a predefined object? ► Document ► Date ► Loop ► Array Question No: 5 ( Marks: 1 ) - Please choose one Which of these is not a comparison operator? ► < ► > ► = ► != Question No: 6 ( Marks: 1 ) - Please choose one Var d = new date() Which of the following is correct about the d variable? ► instance of new ► instance of Date() method ► instance of Date object ► Simple Variable Question No: 7 ( Marks: 1 ) - Please choose one
When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called ► Local Variables ► Global Variables ► Local and Global ► None of the above Question No: 8 ( Marks: 1 ) - Please choose one Which of the following , is condition part of given For loop for (i = 0; i <= 5; i++). ► i=0. ► i++. ► i<=5. ► (i = 0; i <= 5; i++). Question No: 9 ( Marks: 1 ) - Please choose one Which of the following is NOT valid HTML code line? ► <frameset rows="16%,84%"> ► <frameset columns="16%,84%"> ► <frameset cols="100,150"> ► <frameset cols=”50%,50%” rows=”16%,84%”> Question No: 10 ( Marks: 1 ) - Please choose one CSS is a breakthrough in Web design because it allows developers to control the--------- ► Processing speed on client side ► Data grid view on client side ► Style and layout of home page. ► Style and layout of multiple Web pages Question No: 11 (Marks: 1) - Please choose one For which of the following we need to know the classification of E-commerce? ► Market planning strategy ► Build Mission statement ► Management strategy ► none Question No: 12 ( Marks: 1 ) - Please choose one How can you open a link in a new browser window? ► <a href="/url" target="new"> ► <a href="/url" target="_blank"> ► <a href="/url" new> ► None of these Question No: 13 ( Marks: 1 ) - Please choose one What does the Target= “_top” tag perform? ► Loads the new page into the same frame ► Loads the new page into the entire window ► Loads the new page into a new browser window ► All of the above Question No: 14 ( Marks: 1 ) - Please choose one Which attribute is used in a tag to control the layout of element? ► view ► css
► Style ► Layout Question No: 15 ( Marks: 1 ) - Please choose one Choose the correct HTML code line which left-align the content inside a tablecell. ► <td leftalign> ► <td valign="left"> ► <td align="left"> ► <tdleft> Question No: 16 ( Marks: 1 ) - Please choose one Where in an HTML document is the correct place to refer to an external style sheet? ► In the <body> section ► At the end of the document ► In the <head> section ► At the top of the document Question No: 17 ( Marks: 1 ) - Please choose one Constructor is defined as the initializing function used to create…........ ► Instance of object ► Copy of object ► Instance / copy of object ► Shallow copy of object Question No: 18 ( Marks: 1 ) - Please choose one What does XML stand for? ► eXtra Modern Link ► X-Markup Language ► eXtensible Markup Language ► Example Markup Language Question No: 19 ( Marks: 1 ) - Please choose one For which of following purpose the Firewall is used ? ► Efficient working ► Protection against security attacks ► Networking purpose ► None of these Question No: 20 ( Marks: 1 ) - Please choose one PPP stands for ► Point to Point Protocol ► Post to Post Protocol ► Point to Post Protocol ► None of these Question No: 21 ( Marks: 1 ) - Please choose one Which of the following is NOT processed on the client side? ► Cookies ► JavaScript ► CGI scripts ► Applets ► Cookies Question No: 22 ( Marks: 1 ) - Please choose one
Firewall is used to I - examine the data entering the network II - examine the data leaving the network III - filter the data according to certain rules ► I, II and III ► I only ► I and III only ► I and II only Question No: 23 ( Marks: 1 ) - Please choose one Which firewall uses strong user authentication to verify identity of a host attempting to connect to the network? ► Packet filter firewall ► Circuit level firewall ► Application gateway firewall ► Hybrid firewall Question No: 24 ( Marks: 1 ) - Please choose one Bus networks is same as the system bus of a computer. ► True ► False Question No: 25 ( Marks: 1 ) - Please choose one In Style Sheets, How do you add a background color for all "<h1>" elements? ► all.h1 {background-color:#FFFFFF} ► h1.all {background-color:#FFFFFF} ► h1 {background-color:#FFFFFF} ► h1 {bgcolor:#FFFFFF} Question No: 26 ( Marks: 1 ) - Please choose one How do you make each word in a text start with a capital letter? ► text-transform:capitalize ► text-transform:first_capitalize. ► Cann’t be possible with CSS ► text-transform:uppercase Question No: 27 ( Marks: 1 ) - Please choose one MAC address is written in Binary form 0-1 ► Decimal form 0-9 ► Hexadecimal form 0-f ► None of these ► Question No: 28 ( Marks: 1 ) - Please choose one MAC stand for ► Media Access Control 13 ► Media Access Consortium ► Member of Asian Community ► None of these Question No: 29 ( Marks: 1 ) - Please choose one Choose the correct HTML tag for the largest heading ► <head>
► <h1> ► <Heading> ► <h6> Question No: 30 ( Marks: 1 ) - Please choose one Which of the following tags are used for embedding sound files into HTML code? ► <A href=“song.wav”> ► <EMBED SRC="Skylar.MP3"> ► <A href=“song.wav”> and <EMBED SRC="Skylar.MP3"> ► None of these Do correction in all midterm file J Question No:44 answer is 3rd Question No: 31 ( Marks: 1 ) - Please choose one Which of the following is NOT an advantage of CSS ? ► Works on version 4 browsers or newer ► Define the look of your pages in one place ► Easily change the look ► Implement same formatting each time tag is used. Question No: 32 ( Marks: 1 ) - Please choose one Which of the following is correct line to add separated css file with name xxxx.css? ► <link scr=stylesheet href="/xxxx.css" type="text/css"> ► <link rel=stylesheet href="/xxxx.css" type="text/css"> ► <style rel=stylesheet href="/xxxx.css" type="text/css"> ► <link rel=stylesheet scr="xxxx.css" type="text/css"> Question No: 33 ( Marks: 1 ) - Please choose one Which of the following is correct syntax to define color in CSS? ► body {color: black} ► body:color=black ► {body:color=black(body} ► {body;color:black} Question No: 34 ( Marks: 1 ) - Please choose one Inside which of the following HTML element do we put the JavaScript? ► <script> ► <js> ► <javascript> ► <scripting> Question No: 35 ( Marks: 1 ) - Please choose one Which one is the responsible to manage “Internal processes”? ► E-business ► E-commerce ► E-marketing ► All of the given
Question No: 36 ( Marks: 1 ) - Please choose one The first control statement in a for loop usually ► sets the termination condition ► increments a counter ► creates a control variable
► none of the above Question No: 37 ( Marks: 1 ) - Please choose one You define a method using ► obj.method ► obj.method[] ► obj.method() ► obj-method Question No: 38 ( Marks: 1 ) - Please choose one What is the default scripting language in ASP? ► EcmaScript ► JavaScript ► Java ► VBScript 85 Question No: 39 ( Marks: 1 ) - Please choose one Following are malicious programs EXCEPT ----------------- . ► Back doors ► Trojan Horses ► Firewalls 94 ► Worms Question No: 40 ( Marks: 1 ) - Please choose one Outside attacks on a network include the following, EXCEPT --------------- . ► Password attack ► DoS ► Back doors ► IP spoofing Question No: 41 ( Marks: 1 ) - Please choose one The process of scrambling a message with the help of a key is called -------------- . ► Cryptography 100 ► Filtering ► Transposition ► Encryption Question No: 42 ( Marks: 1 ) - Please choose one In a ring network, every device has exactly ______ neighbors for communication purpose. ► more than two ► Two ► Four ► None of these Question No: 43 ( Marks: 1 ) - Please choose one What is identified by the tag <FRAMESET COLS="20%,60%,20%">? ► Horizontal frame ► Vertical Frame 31 ► Top Frame ► Bottom Frame Question No: 44 ( Marks: 1 ) - Please choose one Why we use reset tag in HTML? ► To remove the text written in Notepad.
► To remove the text written in between <body> and </body>tag. ► To remove the text written in between <head> and </head> tag. ► To remove the text written in between <form> and </form> tag. Question No: 45 ( Marks: 1 ) - Please choose one Network Interface Card is operated at ► Application layer ► Session layer ► Network layer ► Datalink layer 6
Question No: 46 ( Marks: 1 ) - Please choose one Academic institutions, religious organizations and government using --------------------- e-commerce classification ► Business-to-Business(B2B) ► Intra Business ► Non Business EC 2 ► Business-to-consumer(B2C) Question No: 47 ( Marks: 1 ) - Please choose one What is the correct HTML tag for adding a background color? ► <background>yellow</background> ► <body bgcolor="yellow"> ► <body color="yellow"> ► None Question No: 48 ( Marks: 1 ) - Please choose one
Which HTML tag is used to define an internal style sheet? ► <css> ► <script> ► <style> (Ans) ► <sheet> Question No: 49 ( Marks: 1 ) - Please choose one What is the correct HTML for making a hyperlink? ► <a href="http://www.w3schools.com">W3Schools</a> (Ans) ► <a name="http://www.w3schools.com">W3Schools.com</a> ► <a url="http://www.w3schools.com">W3Schools.com</a> ► <a>http://www.w3schools.com</a> Question No: 50 ( Marks: 1 ) - Please choose one If we leave out the target attribute in frame tag and link was clicked ,the document loads into the window ► In Same page ► In other blank page. ► To display browser error. ► All of the options. Question No: 51 ( Marks: 1 ) - Please choose one What does mean by != comparison operator? ► Equal to ► Not ► Equal
► Not Equal 58 Question No: 52 ( Marks: 1 ) - Please choose one
What does the string. match (“abc”) object do? ► Concatenates the “abc” word to other “abc” words ► Matches the “abc” words with other “abc” words ► It does replacement of abc word with other words ► All of the above Question No: 53 ( Marks: 1 ) - Please choose one
var txt="Hello World!" document.write(txt.length), it would return the length as. ► 10 ► 11 ► 12 ► 13 Question No: 55 ( Marks: 1 ) - Please choose one How can you convert information consisting of comma separated values into an array? ► txtArray = txt.indexOf(','); ► txtArray = txt.split(','); page 70 ► txtArray = txt.trim(','); ► txtArray = txt.substring(','); Question No: 56 ( Marks: 1 ) - Please choose one The control statement on a while loop is tested ► before each time through the loop ► after each time through the loop ► once at the start ► once at the end Question No: 57 ( Marks: 1 ) - Please choose one Which SQL statement is used to delete data from a database? ► DELETE ► COLLAPSE ► REMOVE ► DISCARD Question No: 58 ( Marks: 1 ) - Please choose one A program that performs a specific function such as creating invoices/bills or processing payment received from customers is called a/an ---------------. ► Middleware ► Web Service ► CRM Software ► Appplication Program page 92 Question No: 59 ( Marks: 1 ) - Please choose one When data moves upward in the OSI stack it is called ► Encapsulation ► De-encapsulation ► Synchronization ► None of these Question No: 60 ( Marks: 1 ) - Please choose one In star network features a central connection point called a "hub" that ought to be only a hub.
► True ► False Question No: 61 ( Marks: 1 ) - Please choose one Switch is a device that joins multiple computers together within one local area network (LAN). ► True ► False Question No: 62 ( Marks: 1 ) - Please choose one Switch generally contains more "intelligence" than a hub. ► True ► False Question No: 63 ( Marks: 1 ) - Please choose one ► SMTP ► POP3 ► IMAP 18 ► ICMP Question No: 64 ( Marks: 1 ) - Please choose one Which protocol does Virtual university use to send email to student Accounts? ► SMTP ► POP ► IMAP ► TCP Question No: 65 ( Marks: 1 ) - Please choose one For which one of the following,<MARQUEE ...> tag can work better ► News headlines ► Announcements ► Sound pulgin ► Movie controls Question No: 66 ( Marks: 1 ) - Please choose one Can you add a style in a single place on a page ? ► Yes, with a style-definition written into the tag ► Yes, with a global style definition that redefines the tag. ► No - CSS can only be defined for entire pages. Question No: 67 ( Marks: 1 ) - Please choose one
Which CSS tag is used to place an image that would remain when user scrolls down or up the page?
► background-attachment: fixed 48 ► background-attachment: scroll ► background-attachment: up ► All of these Question No: 68 ( Marks: 1 ) - Please choose one What shall come in blanks for proper result, Here blanks are numbered with 1,2 and 3 <html> <head> <SCRIPT language="JavaScript"> Var num1, var num2
Document.container .result.value=parseFloat(num1)-parseFloat(num2) </script> </head> <body> <FORM name=”---------1-----------”> <input type=”----------2-------” name=”-------3---------” maxlength=”5”> </form> </body> </html> ► container, text and result ► result, value and container ► container , button and value ► result, container and text Question No: 69 ( Marks: 1 ) - Please choose one Correct syntax of "for" loop is : ► for (i = 0; i <= 5) ► for i = 1 to 5 ► for (i <= 5; i++) ►for (i = 0; i <= 5; i++) Question No: 70 ( Marks: 1 ) - Please choose one CGI stands for ► Common Gate Information ► Common Gate Interface 82 ► Common Goal Interest ► Common Global Interaction Question No: 71 ( Marks: 1 ) - Please choose one Which of the following property falls in HTTP? ►Stateless ► Stateful ► Temporary ► All of these Question No: 72 ( Marks: 1 ) - Please choose one What is a correct way of referring to a stylesheet called "mystyle.xsl" ? ► <?xml-stylesheet type="text/xsl" href="/mystyle.xsl" ?> ► <link type="text/xsl" href="/mystyle.xsl" /> ► <stylesheet type="text/xsl" href="/mystyle.xsl" /> ► <?stylesheet type="text/xsl" href="/mystyle.xsl" ?> Question No: 73 ( Marks: 1 ) - Please choose one Which of the following does not interpret its code? ► ASP ► PHP ► JSP 85 ► Coldfusion Technologies like ASP, PHP and Coldfusion interpret their code except Question No: 74 ( Marks: 1 ) - Please choose one Asymmetric cryptography is also called -------------- .
► Public key cryptography 100 ► Private key cryptography ► Substitution cryptography ► Transposition Question No: 75 ( Marks: 1 ) - Please choose one Digital signature uses --------- . ► Symmetric cryptography ► Private key cryptography ► Public key cryptography ► Hash function Question No: 76 ( Marks: 1 ) - Please choose one Which one of the following is NOT a valid JavaScript variable? ► _name1 ► $studentScore ► first_name ► 2ndName 54 Question No: 77 ( Marks: 1 ) - Please choose one Which of these is the correct HTML code for creating a reset button? ► <input type =”button” name=”reset” value=”reset”> ► <input type=”resetButton” value=”Clear”> ► <input type=”reset” value=”reset”> ► <input type=”button” name=”reset” value=”clear”> Question No: 78 ( Marks: 1 ) - Please choose one http://cs.vu.edu is an example of ► Two zone domain name ► Three zone domain name ► Four zone domain name ► Five zone domain name
MIDTERM EXAMINATION Spring 2009
IT430- E-Commerce (Session - 4) Question No: 79 ( Marks: 1 ) - Please choose one In datalink layer, data packets are placed inside ► Data frames ► Data boxes ► Data streams ► None of these Question No: 80 ( Marks: 1 ) - Please choose one …..tag is used into …….tag because a row contains multi cells and to fill up these cells with data. ► TD…… TR ► TR…… TD ► TD…… TG ► TG…… TR
Question No: 81 ( Marks: 1 ) - Please choose one
Individuals who write programs or manipulate technologies to gain unauthorized access to computers and networks are --------------- . ► administrators ► experts ► hackers ► coders Question No: 82 ( Marks: 1 ) - Please choose one What is the correct JavaScript syntax to write "Virtual University of Paistan"? ► document.write("Virtual University of Paistan ") ► ("Virtual University of Paistan ") ► " Virtual University of Paistan " ► response.write("Virtual University of Paistan ") Question No: ( Marks: 1 ) - Please choose one Question No: 83 ( Marks: 1 ) - Please choose one CSS is a breakthrough in Web design because it allows developers to control the--------- ► Processing speed on client side ► Data grid view on client side ► Style and layout of home page. ► Style and layout of multiple Web pages uestion No: 84 ( Marks: 1 ) - Please choose one In which direction all messages travel through a ring Topology ► Same direction (clockwise) ► Same direction( either "clockwise" or "countercloc kwise") ► Dual direction (both "clockwise" and "counterclockwise") ► None of these Question No: 85 ( Marks: 1 ) - Please choose one
Identify the networking device which regenerates the signals if these become weak. ► Hub ► Switch ► Router ► Repeater Question No: 86 ( Marks: 1 ) - Please choose one Which of the following is not the Data types in Javascript? ► Int ► Float ► String ► Null Question No: 87 ( Marks: 1 ) - Please choose one There is a way of describing XML data, how? ►XML uses a description node to describe data ►XML uses a DTD to describe the data ►XML uses XSL to describe data ► None of these Question No: 88 ( Marks: 1 ) - Please choose one Which of the following needs human action to execut e? ► Virus
► Worm ► Trojan Horse ► All of these Question No: 89 ( Marks: 1 ) - Please choose one
A ___________certifies the binding between public key and its owner ► CA ► KDC ► TLS ► Firewall Question No: 90 ( Marks: 1 ) - Please choose one An address represented by four decimal numbers separated by a period is the ► IP ► RIP ► MAC ► None of the given Question No: 91 ( Marks: 1 ) - Please choose one Which SQL statement is used to update data in a database? ► SAVE ► SAVE AS ► MODIFY ► UPDATE Question No: 92 ( Marks: 1 ) - Please choose one Attributes ‘colspan’ and ‘rowspan’ are used in a tag for spanning the cells to a particular no. of columns or rows, respectively. Select the right one tag. ► tag ► tag ► tag ► None of the given
Question No: 93 ( Marks: 1 ) - Please choose one
Which one of the following ,divides large network in small logical segments called subnets on basis of IP addresses ► Routers ► Bridge ► None of these ► Switches Question No: 94 ( Marks: 1 ) - Please choose one
Switch is used on the layer
► First Layer
► Second Layer
► Third Layer
► None of these
Question No: 95 ( Marks: 1 ) - Please choose one
Router is used on the layer
► First Layer
► Second Layer
► Third Layer
► None of these
Question No: 96 ( Marks: 1 ) - Please choose one
What is the correct JavaScript syntax to insert a comment that has more than one line?
► /*This comment has more than one line*/
► //This comment has more than one line//
► <!--This comment has more than one line-->
► None of these
Question No: 97 ( Marks: 1 ) - Please choose one
► CA
► KDC
► TLS
► Firewall
Question No: 98 ( Marks: 1 ) - Please choose one
How do you define a numerical value?
► var mynum = new Math;
► var mynum = Math(6);
► var mynum = 6;
► Math.mynum = 6;
Question No: 99 ( Marks: 1 ) - Please choose one
Question No: 99 ( Marks: 1 ) - Please choose one
Which of the following is NOT true about Applets?
► Applets are compiled Java programs
► Applet code is sent from server to the browser for processing
► <script> tag is used to make a call for the applet code
► Typically applets take more space on the window screen
Question No: 100 ( Marks: 1 ) - Please choose one
After compilation, the JSP page is converted into a
► JavaScript
► HTML
► Applet
► Servlet
Question No: 101 ( Marks: 1 ) - Please choose one
Following are the names of some well known e-commerce software, EXCEPT ----------- .
► Intershop
► IBM's WebSphere Commerce Professional Edition
► Microsoft Commerce Server 2002
► Microsoft SQL Server 2005
Question No: 102 ( Marks: 1 ) - Please choose one
At which layer of the OSI model the circuit level firewall operates?
► Application layer
► Presentation layer
► Network layer
► Transport layer
Question No: 103 ( Marks: 1 ) - Please choose one
Which attribute can be used to make a region non-clickable? ► none of the given ► target ► alt
► nohref Question No: 104 ( Marks: 1 ) - Please choose one
Which of following is NOT an attribute of <AREA> tag?
► shape
► circle
► href
► coords
Question No: 105 ( Marks: 1 ) - Please choose one
In star topology, If hub fails, the entire network also fails. ► True ► False Question No: 106 ( Marks: 1 ) - Please choose one
Which HTML tag is used to define an internal (embedded) style sheet?
► css
► text/style
► style
► script
question No: 107 ( Marks: 1 ) - Please choose one
Which of the following is correct for displaying a box around a paragraph?
► P {box:yes}
► P {box:thin solid}
► P {box:1}
► P {border:thin solid}
Question No: 108 ( Marks: 1 ) - Please choose one
How the tables in HTML are expanded?
► Row by Row
► Column by Column
► One row and one column
► None of these
Question No: 109 ( Marks: 1 ) - Please choose one
Which of the following is the default alignment in HTML?
► Left
► Center
► Right
► None
Question No: 110 ( Marks: 1 ) - Please choose one RIP(Routing Information protocol) is used by---------- , to build a ------------ table ► bridges , hash ► routers, matrix ► routers , routing ► All of these Question No: 111 ( Marks: 1 ) - Please choose one
In which protocol, the messages are not deleted from email server. ► SMTP ► POP3 ► IMAP ► ICMP Question No: 112 ( Marks: 1 ) - Please choose one For which one of the following,<MARQUEE ...> tag can work better
► News headlines ► Announcements ► Sound pulgin ► Movie controls uestion No: 113 ( Marks: 1 ) - Please choose one At line code 5 which of the following Css methods has been applied? <html> <head> 1. <style type="text/css"> 2. h3 {font-family: times} 3. p {font-family: courier} 4. p.sansserif {font-family: sans-serif} </style> 5. <Link rel=” stylesheet” type=” text/css” herf=”mystyle.css”> </head> <body> 6. <h3 style=”font-size:40pt”>This is header 3</h3> </body> </html>
àmystyle.css: h3{ color:red} ► Browser default ► External style sheet ► Inline style ► Internal style sheet Question No: 114 ( Marks: 1 ) - Please choose one Which of the following is NOT valid HTML code line?
► <frameset rows="16%,84%"> ► <frameset columns="16%,84%"> ► <frameset cols="100,150"> ► <frameset cols=”50%,50%” rows=”16%,84%”> Question No: 115 ( Marks: 1 ) - Please choose one Let us assume in Javascript, Variabales num1 and num2 are assigned values 10 and 30 respectively The following text was displayed on browser page: OUTPUT: The result of addition is (40) Which one of following code will display the output? ► document.write(“The result of addition is (”+(parseFloat(num1)+parseFloat(num2))+”)”; ► document.write(“The result of addition is (”+(parseFloat(num1)+parseFloat(num2))+”)”. ► document.write(“The result of addition is (”+(parseFloat(num1)+parseFloat(num2)));. ► document.alert (“The result of addition is (” (parseFloat(num1)+parseFloat(num2)) ”)”; Question No: 116 ( Marks: 1 ) - Please choose one Constructor is defined as the initializing function used to create…........ ► Instance of object
► Copy of object ► Instance / copy of object ► Shallow copy of object Question No: 117 ( Marks: 1 ) - Please choose one
Which language does not compile its code but interpret it? ► ASP. Net ► ASP ► C++ ► None of these Question No: 118 ( Marks: 1 ) - Please choose one JavaScript is mainly a ___________ language. ► Server Side Scripting ► Cross Side Scripting ► Client Side Scripting ► both Cross and Server Side Scripting Question No: 119 ( Marks: 1 ) - Please choose one Which loop type always runs the enclosed code at least once http://vustudents.ning.com ► for ► while ► do while ► all of them Question No: 120 ( Marks: 1 ) - Please choose one
Which one from the following uses IP addresses on network layer? ► Swithes ► Routers ► Bridges ► All of the given
Question No: 121 ( Marks: 1 ) - Please choose one Which object has the property of 'cookie'? http://vustudents.ning.com ► window ► location ► document ► string Question No: 122 ( Marks: 1 ) - Please choose one Pretty Good Privacy (PGP) is the name of a popular _________ system which is available for general public use. http://vustudents.ning.com ► Filtering ► Cryptographic ► Server ► Security Question No: 123 ( Marks: 1 ) - Please choose one An electronic signature can ensure --------- . ► authenticity ► integrity ► non-repudiation ► all of them Question No: 124 ( Marks: 1 ) - Please choose one Which one is the correct CSS syntax? ► h1 {font-size:72pt} ► h1:font-size=72pt
► {h1:font-size=72pt} ► {h1;font-size:72pt} Question No: 125 ( Marks: 1 ) - Please choose one In Style Sheets, How do you change the font of an element? ► font-face: ► font: ► font-family: ► font-style: Question No: 126 ( Marks: 1 ) - Please choose one How many characters MAC address consists on? http://vustudents.ning.com ► 11 ► 12 ► 13 ► 14 Question No: 127 ( Marks: 1 ) - Please choose one Choose which one is the not the columns of Log files. ► IP addresses ► Request (url) ► Date ► Contents
MIDTERM EXAMINATION
Spring 2010
IT430- E-Commerce (Session - 2)
Question No: 128 ( Marks: 1 ) - Please choose one
► <background>yellow</background>
► <body bgcolor="yellow"> (Ans) ► <body color="yellow"> ► None Question No: 7 ( Marks: 1 ) - Please choose one
Question No: 129 ( Marks: 1 ) - Please choose one Which one of the following certifies the binding between public key and its owner.
► CA (Ans) ► KDC ► TLS ► Firewall Question No: 130 ( Marks: 1 ) - Please choose one Cyclical Redundancy Check (CRC), takes place in which layer of OSI Model. ► Session Layer
► Transport Layer (Ans) ► Network Layer ► Data link layer Question No: 131 ( Marks: 1 ) - Please choose one In what form are style rules presented?
► selector { property: value }
► selector { property= value } (Ans)
► selector ( property: value )
► selector ( property= value )
Question No: 1 ( Marks: 1 ) - Please choose one
Academic institutions, religious organizations and government using --------------------- e-commerce
classification
► Business-to-Business(B2B)
► Intra Business
► Non Business EC (Ans)
► Business-to-consumer(B2C)
Question No: 2 ( Marks: 1 ) - Please choose one
In which protocol, the messages are not deleted from email server.
► SMTP
► POP3
► IMAP (Ans)
► ICMP
Question No: 3 ( Marks: 1 ) - Please choose one
What is the correct HTML tag for adding a background color? http://vustudents.ning.com
► <background>yellow</background>
► <body bgcolor="yellow"> (Ans)
► <body color="yellow">
► None
Question No: 4 ( Marks: 1 ) - Please choose one
Which HTML tag is used to define an internal style sheet?
► <css>
► <script>
► <style> (Ans)
► <sheet>
Question No: 5 ( Marks: 1 ) - Please choose one
What is the correct HTML for making a hyperlink?
► <a href="http://www.w3schools.com">W3Schools</a> (Ans)
► <a name="http://www.w3schools.com">W3Schools.com</a>
► <a url="http://www.w3schools.com">W3Schools.com</a>
► <a>http://www.w3schools.com</a>
Question No: 6 ( Marks: 1 ) - Please choose one
If we
leave out the target attribute in frame tag and link was clicked ,the document loads into the window
► In Same page (Ans)
► In other blank page.
► To display browser error.
► All of the options.
Question No: 7 ( Marks: 1 ) - Please choose one
What does mean by != comparison operator?
► Equal to
► Not
► Equal
► Not Equal (Ans)
Question No: 8 ( Marks: 1 ) - Please choose one
What does the string.match (“abc”) object do? http: //vustudents.ning.com
► Concatenates the “abc” word to other “abc” words
► Matches the “abc” words with other “abc” words (An s)
► It does replacement of abc word with other words
► All of the above
Question No: 9 ( Marks: 1 ) - Please choose o ne
var txt="Hello World!" document.write(txt.leng th), it would return the length as.
► 10
► 11
► 12 (Ans)
► 13
Question No: 10 ( Marks: 1 ) - Please choose one
Which of the following property falls in HTTP? http://vustudents.ning.com
► Stateless (Ans)
► Stateful
► Temporary
► All of these
Question No: 11 ( Marks: 1 ) - Please choose one
Which one of the following certifies the binding between public key and its owner.
► CA (Ans)
► KDC
► TLS
► Firewall
Question No: 12 ( Marks: 1 ) - Please choose one
Cyclical Redundancy Check (CRC), takes place in which layer of OSI Model.
► Session Layer
► Transport Layer (Ans)
► Network Layer
► Data link layer
Question No: 13 ( Marks: 1 ) - Please choose one
How
can you convert information consisting of comma separated values into an array?
► txtArray = txt.indexOf(','); (Ans)
► txtArray = txt.split(',');
► txtArray = txt.trim(',');
► txtArray = txt.substring(',');
Question No: 14 ( Marks: 1 ) - Please choose one
The
control statement on a while loop is tested
► before each time through the loop (Ans)
► after each time through the loop
► once at the start
► once at the end
Question No: 15 ( Marks: 1 ) - Please choose one
Which SQL statement is used to delete data from a database? http://vustudents.ning.com
► DELETE (Ans)
► COLLAPSE
► REMOVE
► DISCARD
Question No: 16 ( Marks: 1 ) - Please choose one
A
program that performs a specific function such as creating invoices/bills or processing payment received
from customers is called a/an ---------------.
► Middleware
► Web Service
► CRM Software
► Appplication Program (Ans)
Question No: 17 ( Marks: 1 ) - Please choose one
Which firewall uses strong user authentication to verify identity of a host attempting to connect to the
network?
► Packet filter firewall
► Circuit level firewall
► Application gateway firewall (Ans)
► Hybrid firewall
Question No: 18 ( Marks: 1 ) - Please choose one
In
what form are style rules presented?
► selector { property: value }
► selector { property= value } (Ans)
► selector ( property: value )
► selector ( property= value )
Question No: 19 ( Marks: 1 ) - Please choose one
Why
we use reset tag in HTML?
► To remove the text written in Notepad.
► To remove the text written in between <body> and </ body>tag. (Ans)
► To remove the text written in between <head> and </head> tag.
► To remove the text written in between <form> and </form> tag.
Question No: 20 ( Marks: 1 ) - Please choose one
When data moves upward in the OSI stack it is called
► Encapsulation
► De-encapsulation
► Synchronization (Ans)
► None of these
Question No: 21 ( Marks: 2 )
What does PPTP stand for? http://vustudents.ning.com
Ans:
PPTP stads for point to point transfer protocol.
Question No: 22 ( Marks: 2 )
What are the keywords to define a variable and a function in JavaScript?
Question No: 23 ( Marks: 3 )
Identify the object, property and method in the following:
Math.sin(45)
Math.PI
Ans:
Math.PI we are using for mathematical calculation.
Question No: 24 ( Marks: 3 )
Performance of web servers can be evaluated mainly on the basis of two factors. What are they?
Ans:
We can evaluate web servers performance by below basic factors.
1. Response time.
2. Request process time.
1. this is one of the basic factor to evaluate the web server process, we can evaluate
performance of web server by its response time, once you write web add how long it take to
open its home page.
2. Secondly we can evaluate performance of web server by the time which server take to do
process, suppose you submit some query or you did some transaction how long it will take to
process it. By this way also we can evaluate performance of a web servers.
Question No: 25 ( Marks: 5 )
Write the code for a web page displaying a button named "Testing". After clicking that button an alert
should be displayed saying "The test is successful".
SANS stands for _______.
Select correct option:
System Administration, Authentication, Network and Security Institute
Software Authentication, Audit, Network and Security Institute
Systems Administrator, Audit, Network and Security Institute
None of Above
Proxy Server can _______.
Select correct option:
Speed up the processing of http requests by caching web pages
Translate HTTP request between trusted and un trusted network
Can also act as a firewall filtering requests for certain web pages
All of Above
Response time ________.
Select correct option:
Time a server take to process one request.
Time a server take to process all the request.
Time a server take to process some request.
Time a server take to process ten request
attacks are basically a result of _____
Select correct option:
Back door
Sniffing
Eavesdropping
None of the Above
IDS Stands for _________.
Select correct option:
http://vustudents.ning.com
Intrusion Defense System
Intervention Detection System
Intervention Defense System
Intrusion Detection System
Question # 8 of 10 ( Start time: 02:45:30 PM ) Total Marks: 1
ASP runs best on ________.
Select correct option:
Internet information Software
Intranet Information Software
Intranet Information Server
Internet Information Server
Plug in is ________.
Select correct option:
Program that make the computer server.
Programs that work with the browser to enhance its capabilities.
Program that communicate with the client from the server.
None of Above
http://vustudents.ning.com
Question # 10 of 10 ( Start time: 02:47:59 PM ) Total Marks: 1
It occurs when a customer clicks at checkout or confirm order button and is subjected to some payment
_______.
Select correct option:
Transaction Processing
E cash System
E Funds system
None of Above
Question # 1 of 10 ( Start time: 01:51:41 AM ) Total Marks: 1
An agent is a software program that is _____
Select correct option:
Triggers by human
Not capable of autonomous action.
Capable of autonomous action in its environment in order to meet its
objectives
None
Question # 2 of 10 ( Start time: 01:52:21 AM ) Total Marks: 1
ASP runs best on ________.
Select correct option:
Internet information Software
Intranet Information Software
Intranet Information Server
Internet Information Server
Question # 3 of 10 ( Start time: 01:53:48 AM ) Total Marks: 1
What is/are the methods to track the customer.
Select correct option:
Database
Cookies
Hidden Fields
All
Question # 4 of 10 ( Start time: 01:54:32 AM ) Total Marks: 1
Large companies establish connections between their e-commerce software and
their existing accounting system by using a type of software called
__________.
Select correct option:
Shareware
Freeware
Middleware
None
http://vustudents.ning.com
Question # 5 of 10 ( Start time: 01:55:19 AM ) Total Marks: 1
Password attacks are basically a result of _____
Select correct option:
Back door
Sniffing
Eavesdropping
None of the Above
Question # 6 of 10 ( Start time: 01:56:03 AM ) Total Marks: 1
Caching ______.
Select correct option:
have no effect on downloading of the page
saves the time of downloading the page
increase the time of downloading the page
None of Above
Question # 7 of 10 ( Start time: 01:56:58 AM ) Total Marks: 1
. A program that performs a specific function such as creating invoices/bills or
processing payment received from customers is called _______.
Select correct option:
Firewall
Application program
Protocol
Web Services
Question # 8 of 10 ( Start time: 01:57:54 AM ) Total Marks: 1
Programs that work with the browser to enhance its capabilities.
Select correct option:
Driver
Flash
PlugIn
None of Above
Question # 9 of 10 ( Start time: 01:58:10 AM ) Total Marks: 1
Agents can be used for _____
Select correct option:
Comparisons
Filtering
Web crawling
All
Question # 10 of 10 ( Start time: 01:58:53 AM ) Total Marks: 1
secure, dedicated point to point connection over the internet ______.
Select correct option:
Metropolitan area Network
Local area Network
Wide Area Network
Virtual Private Network
http://vustudents.ning.com
Question # 1 of 10 ( Start time: 10:06:21 PM ) Total Marks: 1
Extranet formed when ______.
Select correct option:
When two or more internet is connected to each other.
When two or more WAN are connected to each other.
When two or more intranets are connected to each other.
When two or more LAN is connected to each other.
Question # 2 of 10 ( Start time: 10:07:19 PM ) Total Marks: 1
E-commerce Site must provide ________.
Select correct option:
Transaction processing
Shopping cart capabilities
A catalog display
All of the above
Question # 3 of 10 ( Start time: 10:08:12 PM ) Total Marks: 1
In this type of attack, the attacker gains access to the network and then send invalid data to network, services or applications. These services or applications consequently become unable to perform their normal tasks or functions.
Select correct option:
Trojan Horse
Virus
DoS
Worms
Question # 4 of 10 ( Start time: 10:09:16 PM ) Total Marks: 1
ERP Stands for
Select correct option:
Entrepreneur Resource Planning
Enterprise Rescue Planning
Enterprise Resource Program
Enterprise Resource Planning
http://vustudents.ning.com
Question # 5 of 10 ( Start time: 10:10:21 PM ) Total Marks: 1
Large companies establish connections between their e-commerce software and their existing accounting system by using a type of software called __________.
Select correct option:
Shareware
Freeware
Middleware
None
http://vustudents.ning.com
Question # 6 of 10 ( Start time: 10:11:04 PM ) Total Marks: 1
Plug in is ________.
Select correct option:
Program that make the computer server.
Programs that work with the browser to enhance its capabilities.
Program that communicate with the client from the server.
None of Above
Question # 7 of 10 ( Start time: 10:12:12 PM ) Total Marks: 1
Throughput is ___________.
Select correct option:
No of instruction a server execute in one second.
No of session a server handle.
No of http request that a web server can handle.
None of Above
http://vustudents.ning.com
Question # 8 of 10 ( Start time: 10:13:44 PM ) Total Marks: 1
HTTP is a _______.
Select correct option:
State Oriented
Stateless
A&B
None of Above
http://vustudents.ning.com
Question # 9 of 10 ( Start time: 10:14:47 PM ) Total Marks: 1
Caching ______.
Select correct option:
have no effect on downloading of the page
saves the time of downloading the page
increase the time of downloading the page
None of Above
http://vustudents.ning.com
# 10 of 10 ( Start time: 10:16:03 PM ) Total Marks: 1
secure, dedicated point to point connection over the internet ______.
Select correct option:
Metropolitan area Network
Local area Network
Wide Area Network
Virtual Private Network
Question No: 1 ( Marks: 1 ) - Please choose one
Which one of the following ,divides large network in small logical segments called subnets on basis of IP addresses
► Routers
► Bridge
► None of these
► Switches
Question No: 2 ( Marks: 1 ) - Please choose one
Switch is used on the layer
► First Layer
► Second Layer
► Third Layer
► None of these
Question No: 3 ( Marks: 1 ) - Please choose one
Router is used on the layer
► First Layer
► Second Layer
► Third Layer
► None of these
Question No: 4 ( Marks: 1 ) - Please choose one
What shall come in blanks for proper result,
Here blanks are numbered with 1,2 and 3
<html>
<head>
<SCRIPT language="JavaScript">
Var num1, var num2
Document.container .result.value=parseFloat(num1)-parseFloat(num2)
</script>
</head>
<body>
<FORM name=”---------1-----------”>
<input type=”----------2-------” name=”-------3---------” maxlength=”5”>
</form>
</body>
</html>
► container, text and result
► result, value and container
► container , button and value
► result, container and text
Question No: 5 ( Marks: 1 ) - Please choose one
What is the correct JavaScript syntax to insert a comment that has more than one line?
► /*This comment has more than one line*/
► //This comment has more than one line//
► <!--This comment has more than one line-->
► None of these
Question No: 6 ( Marks: 1 ) - Please choose one
Which one of the following certifies the binding between public key and its owner.
► CA
► KDC
► TLS
► Firewall
Question No: 7 ( Marks: 1 ) - Please choose one
How
do you define a numerical value?
► var mynum = new Math;
► var mynum = Math(6);
► var mynum = 6;
► Math.mynum = 6;
Question No: 8 ( Marks: 1 ) - Please choose one
How
can you convert information consisting of comma separated values into an array?
► txtArray = txt.indexOf(',');
► txtArray = txt.split(',');
► txtArray = txt.trim(',');
► txtArray = txt.substring(',');
Question No: 9 ( Marks: 1 ) - Please choose one
Which of the following is NOT true about Applets?
► Applets are compiled Java programs
► Applet code is sent from server to the browser for processing
► <script> tag is used to make a call for the applet code
► Typically applets take more space on the window screen
Question No: 10 ( Marks: 1 ) - Please choose one
After
compilation, the JSP page is converted into a
► JavaScript
► HTML
► Applet
► Servlet
Question No: 11 ( Marks: 1 ) - Please choose one
Following are the names of some well known e-commerce software, EXCEPT ----------- .
► Intershop
► IBM's WebSphere Commerce Professional Edition
► Microsoft Commerce Server 2002
► Microsoft SQL Server 2005
Question No: 12 ( Marks: 1 ) - Please choose one
At
which layer of the OSI model the circuit level firewall operates?
► Application layer
► Presentation layer
► Network layer
► Transport layer
Question No: 13 ( Marks: 1 ) - Please choose one
Which attribute can be used to make a region non-clickable?
► none of the given
► target
► alt
► nohref
Question No: 14 ( Marks: 1 ) - Please choose one
Which of following is NOT an attribute of <AREA> tag?
► shape
► circle
► href
► coords
Question No: 15 ( Marks: 1 ) - Please choose one
In
star topology, If hub fails, the entire network also fails.
► True
► False
Question No: 16 ( Marks: 1 ) - Please choose one
Which HTML tag is used to define an internal (embedded) style sheet?
► css
► text/style
► style
► script
Question No: 17 ( Marks: 1 ) - Please choose one
In
Style Sheets, How do you change the font of an element?
► font-face:
► font:
► font-family:
► font-style:
Question No: 18 ( Marks: 1 ) - Please choose one
Which of the following is correct for displaying a box around a paragraph?
► P {box:yes}
► P {box:thin solid}
► P {box:1}
► P {border:thin solid}
Question No: 19 ( Marks: 1 ) - Please choose one
How
the tables in HTML are expanded?
► Row by Row
► Column by Column
► One row and one column
► None of these
Question No: 20 ( Marks: 1 ) - Please choose one
Which of the following is the default alignment in HTML?
► Left
► Center
► Right
► None
Question No: 21 ( Marks: 2 )
We
want to create left margin of 10 pixels and right margin of 15 pixels. Write css code to apply both
properties.
<HTML><STYLE>P{margin-left:10px;margin-right:15px;}</STYLE>
<BODY></BODY></HTML>
Question No: 22 ( Marks: 2 )
JDBC and ODBC Stands for?
Java based database connectivity
Open database connectivity
Question No: 23 ( Marks: 3 )
Write a brief note on ERP? Also write any two ERP software names.
Enterprise Resource Planning is a computer based system which manages internal and external
resources of business that includes assets, financial issues, project management, human resource and
marketing.
The purpose of this software is to regulate the flow of information among all business functions. It
builds a centralized database and it has the common platform. EFP System creates unique and
enterprise system environment.
The names of ERP Software
SAP
SAGE
Microsoft Dynamics
Question No: 24 ( Marks: 3 )
Create an instance of date and write the methods to get date and minutes?
getDate() - Get the day of the month.
var curdate = new Date()
var mday = curdate.getDate()
document.write(mday + "<BR>")
Question No: 25 ( Marks: 5 )
Write any four essential features and two extra features which should exist in E-Commerce soft
wares.
A catalog display
Shopping cart capability
Transaction processing
Web services
Application integration
Middleware
Question No: 26 ( Marks: 5 )
What are the three logical operators in JavaScript? Write their symbols and their functions.
“++” FOR LOGICAL INCREMENT
“&&” FOR LOGICAL AND
“!” FOR LOGICAL NOT
Logical increment adds one to the previous number that holds a given variable, logical AND returns true
when all the given statements are true and logical NOT retunes true only when the given statement is
not true otherwise it returns false
MIDTERM EXAMINATION
Spring 2009
IT430- E-Commerce (Session - 1)
Question No: 1___( Marks: 1 ) - Please choose one
Which of the following is Default subnet mask of class C?
255.0.0.0
255.255.0.0
255.255.255.0 (page 11)
None of above
Question No: 2 ( Marks: 1 ) - Please choose one
Which one of the following ,divides large network in small logical segments called subnets on basis of
IP addresses
Routers (page 16)
Bridge
None of these
Switches
Question No: 3 __ ( Marks: 1 ) - Please choose one
Which one is not included in the networking topologies?
Star Topology
Bus Topology
Media Topology
Ring Topology
Question No: 4 __ ( Marks: 1 ) - Please choose one
CSS is a breakthrough in Web design because it allows developers to control the -----------
Processing speed on client side
Style and layout of multiple Web pages
Data grid view on client side
Style and layout of home page.
Ref
http://www.w3schools.com/web/web_css.asp
Question No: 5 ( Marks: 1 ) - Please
choose one Border-width: specifies the width of all borders in the order
‘border-right-width, border-bottom-width, border-left-width, border-top-width’
‘border-bottom-width, border-left-width, border-top-width, border-right-width’
‘border-top-width, border-right-width, border-bottom-width, border-left-width’ (page 49)
None of these
Question No: 6 __ ( Marks: 1 ) - Please choose one
document.write(str.replace(/Microsoft/,"W3Schools"))
This string object is deleting Microsoft word
This string object is concatenating the Microsoft with W3schools
This string object is replacing Microsoft with W3schools
None of these
Ref
http://iswww.w3schools.com/jsref/jsref_replace.asp
Question No: 7 ( Marks: 1 ) -
Please choose one How do you define a function in Javascript?
function:myFunction()
function myFunction() (page 58)
declare myFunction()
new myFunction
Question No: 8___( Marks: 1 ) - Please choose one
The first control statement in a for loop usually
sets the termination condition
increments a counter
creates a control variable
none of the above
Question No: 9 ( Marks: 1 ) - Please choose one The
second control statement in a for loop usually
sets the termination condition
increments a counter
creates a control variable
none of the above
Question No: 10 ( Marks: 1 ) - Please choose one
Choose the correct HTML tag to make a text italic
<it>
<i> (page 19)
<italics>
<italic>
Question No: 11 __ ( Marks: 1 ) - Please choose one
The 'shape' attribute of <AREA> tag accepts the following values, EXCEPT
Rect
Circle
poly
square (page 36)
Question No: 12 ( Marks: 1 ) - Please choose one
<AREA> tag is used within the
<MAP> tag (page 35)
<FRAME> tag
<FRAMESET> tag
<IMG> tag
Question No: 13 __ ( Marks: 1 ) - Please choose one
Where in an HTML document is the correct place to refer to an external style sheet?
In the <body> section
At the top of the document In
the <head> section (page 42)
Between head and body
Question No: 14 __ ( Marks: 1 ) - Please choose one
In CSS, How do you make the text italic?
font:i
style:italic
font-style: italic (page 44)
font:italic
ref
http://tom.me.uk/html-to-css/bold-italic.html
Question No: 15 __ ( Marks: 1 ) - Please choose one
What is identified by the tag <FRAMESET COLS="20%,60%,20%">?
Horizontal frame
Vertical Frame (page 31)
Top Frame
Bottom Frame
Question No: 16 __ ( Marks: 1 ) - Please choose one
Creating your own tags is not possible in HTML but in XML it is possible to create
Your own tags.
True
False
Question No: 17 __ ( Marks: 1 )
What is the function of UDP protocol at TCP/IP stack?Give precise answer.
Connectionless transport protocol
Question No: 18 ( Marks: 1 )
What tag is used for displaying a border between the frames?
- BORDER or FRAMEBORDER – Set this attribute to 0 for not displaying a border between the frames
Question No: 19 ( Marks: 2 )
Suppose, there is an applet at "http://www.vu.edu.pk/demo.class". Write the code to
include this applet in your web page.
<HTML> <BODY>
<APPLET CODE= "http://www.vu.edu.pk/demo.class". width=100 height=200>DEMO</APPLET>
</BODY> </HTML>
Question No: 20 __ ( Marks: 3 )
Identify the object, property and method in the following:
Math.sin(45)
Math.PI
document.write("Math.sin(45) :"+Math.sin(45)+"<P>");
document.write("Math.PI :" +Math.PI +"<P>");
Question No: 21 __ ( Marks: 5 )
What is a web form? What is its usage in reference to client-server communication? 2+3
A webform on a web page allows a user to enter data that is sent to a server for processing. Webforms
resemble paper forms because internet users fill out the forms using checkboxes, radio buttons, or text
fields.
You are now familiar with the fact that internet presents a two-way communication model, also called
theClient-Server Model. In the client server model some data is processed on the client side and
certain data is processed by the server on the server side.
Question No: 22 ( Marks: 10 )
Explain the following frame tags? Discuss the usage of these
a) <frameset>
b) <frame>
c) <Noframes>
d) <Iframe>
MIDTERM EXAMINATION Spring 2009
IT430- E-Commerce (Session - 3)
Question No: 1 __ ( Marks: 1 ) - Please choose one
In which protocol, the messages are not deleted from email server.
SMTP
POP3
IMAP (page 18)
ICMP
Question No: 2 ( Marks: 1 ) - Please choose one
Which HTML tag is used to define the internal style sheet ?
<css>
<script >
<sheet>
<style>
ref
http://www.ex-designz.net/test_grade.asp?tid=37
Question No: 3 ( Marks: 1 ) - Please choose one
For which one of the following,<MARQUEE ...> tag can work better
News headlines
Announcements
Sound pulgin
Movie controls
Ref
http://www.htmlcodetutorial.com/_MARQUEE.html
Question No: 4 __ ( Marks: 1 ) - Please choose one
Choose the correct HTML code line which left-align the content inside a tablecell.
<td leftalign>
<td valign="left">
<td align="left"> (page 26)
<tdleft>
Question No: 5 __ ( Marks: 1 ) - Please choose one
How do you write a conditional statement for executing some statements only if "i" is
NOT equal to 5?
if =! 5 then
if (i != 5) (page 58)
if <>5
if (i <> 5)
Question No: 6 ( Marks: 1 ) - Please choose one
What is the correct JavaScript syntax to write "Virtual University of Paistan"?
document.write("Virtual University of Paistan ")
("Virtual University of Paistan ")
" Virtual University of Paistan "
response .write("Vi rtual University of Paistan ")
Question No: 7 __ ( Marks: 1 ) - Please choose one
We can divide the Client Server architecture up to:
3 Tier
N -Tier
1 Tier
2 Tier
ref
[PPT]
CLIENT SERVER ARCHITECTURE
Question No: 8 ( Marks: 1 ) - Please choose one
Choose which one is the not the columns of Log files.
IP addresses
Request (url)
Date
Contents (page 136 and 3)
Question No: 9 __ ( Marks: 1 ) - Please choose one
An address represented by four decimal numbers separated by a period is the
IP (PAGE 7)
RIP
MAC
NON OF THE GIVEN
Question No: 10 ( Marks: 1 ) - Please choose one
Which operator is used to concatenate two strings?
+ (PAGE 61)
*
&&
&
Question No: 11 __ ( Marks: 1 ) - Please choose one
Which SQL statement is used to extract data from a database?
GET (page 83)
OPEN
SELECT
EXTRACT
Question No: 12 __ ( Marks: 1 ) - Please choose one
Which firewall uses strong user authentication to verify identity of a host
attempting to connect to the network?
Packet filter firewall Circuit
level firewall Application (PAGE 96)
gateway firewall
Hybrid firewall
Question No: 13 __ ( Marks: 1 ) - Please choose one
In CSS, How do you make each word in a text start with a capital letter?
text-transform :capitalize
text-transform: uppercase
text:capitalize
You can't do that with CSS
REF
http://www.ex-designz.net/test_page.asp?tid=37
Question No: 14 __ ( Marks: 1 ) - Please choose one
Why we use reset tag in HTML?
To remove the text written in Notepad.
To remove the text written in between <body> and </body>tag.
To remove the text written in between <head> and </head> tag.
To remove the text written in between <form> and </form> tag.
Question No: 15 ( Marks: 1 ) - Please choose one
http://cs.vu.edu is an example of
Two zone domain name
Three zone domain name (page 12)
Four zone domain name
Five zone domain name
Question No: 16 __( Marks: 1 ) - Please choose one
In data link layer, data packets are placed inside
Data frames (page 6)
Data boxes
Data streams
None of these
Question No: 17 __ ( Marks: 1 )
What are the two types of twisted pair cables for networking ?
Question No: 18 ( Marks: 1 )
What it stands for IIS?
Question No: 19 __ ( Marks: 2 )
When does we use the parseFloat() function?
Question No: 20 ( Marks: 3 )
Name the JavaScript function that convert strings to float numbers. How do you
give the function a string value to convert to a number?
Question No: 21 __ ( Marks: 5 )
Write your personal profile in a file saving it with the extension of e.g. “abc.js”and then call it in
a JavaScript code.
Question No: 22 ( Marks: 10 )
Explain any three of the outside attacks briefly.
MIDTERM EXAMINATION
Spring 2009
IT430- E-Commerce (Session - 3)
Question No: 1 __ ( Marks: 1 ) - Please choose one
Which one of the following ,divides large network in small logical segments called subnets on basis of
IP addresses
Routers (page 16)
Bridge
None of these
Switches
Question No: 2 ( Marks: 1 ) - Please choose one
Which one is not included in the networking topologies?
Star Topology
Bus Topology
Media Topology
Ring Topology
Question No: 3 __ ( Marks: 1 ) - Please choose one
At line code 5 which of the following Css methods has been applied?
<html>
<head>
1. <style type="text/css">
2. h3 {font-family: times}
3. p {font-family: courier}
4. p.sansserif {font-family: sans-serif}
</style>
5. <Link rel=”stylesheet” type=”text/css” herf=”mystyle.css”>
</head>
<body>
6. <h3 style=”font-size:40pt”>This is header 3</h3>
</body>
</html>
mystyle.css:
h3{ color: red}
Browser default
External style sheet
Inline style
Internal style sheet
Question No: 4 ( Marks: 1 ) - Please choose one
Which attribute is used in a tag to control the layout of element?
view
css
Style
Layout
Ref
http://www.yourhtmlsource.com/stylesheets/csslayout.html
Question No: 5___( Marks: 1 ) - Please choose one What is the correct HTML
for making a hyperlink? http://www.vustudents.net
<a url="http://www.w3schools.com">W3Schools.com</a>
<a>http://www.w3schools.com</a>
<a h ref="http ://www.w3schools.com">W3Schools</a> (page 23)
<a name="http://www.w3schools.com">W3Schools.com</a>
Question No: 6 ( Marks: 1 ) - Please choose one
How do you write a conditional statement for executing some statements only if "i" is
NOT equal to 5?
if =! 5 then
if (i != 5) (repeated)
if <>5
if (i <> 5)
Question No: 7 __ ( Marks: 1 ) - Please choose one
How many different kind of loops are there in JavaScript?
One. The "for" loop only
Two. The "for" loop and the "while" loop
Four. The "for" loop, the "while" loop, the "do...while" loop, and the "loop.. .until" loop
None of the above
REF
http://www.ex-designz.net/test_grade.asp?tid=65
Question No: 8___( Marks: 1 ) - Please choose one
What does DTD stand for?
Do The Dance.
Dynamic Type Definition.
Data Type Definition. (page 76)
Direct Type Définition.
Question No: 9 ( Marks: 1 ) - Please choose one
Which of the following needs human action to execute?
Virus (page 94)
Worm
Trojan Horse
All of these
Question No: 10 __ ( Marks: 1 ) - Please choose one
For showing image on web page, save your image at any drive or folder like C:\abc.jpeg is an example
of
Relative Address
Absolute address
None of the given
Ref
Absolute paths are called that because they refer to the very specific location, including the domain
name. The absolute path to a Web element is also often referred to as the UR
Question No: 11 __ ( Marks: 1 ) - Please choose one
ASP server scripts are surrounded by delimiters, which?
<script>.. .</script>
<%...%>
<%>...</%>
<&>...</&>
MIDTERM EXAMINATION Spring 2009
IT430- E-Commerce (Session - 2)
Question No: 1 __ ( Marks: 1 ) - Please choose one
For which of the following we need to know the classification of E-commerce?
Market planning strategy
Build Mission statement
Management strategy
none
Question No: 2 ( Marks: 1 ) - Please choose
one Who is making the Web standards?
Netscape
Internet service providers
The World Wide Web Consortium
Microsoft
Question No: 3 __ ( Marks: 1 ) - Please choose one
When you declare a variable within a function, the variable can only be accessed within that function.
When you exit the function, the variable is destroyed. These variables are called
Local Variables
Global Variables
Local and Global
None of the above
Ref
http://www.authorpick.net/what-is-variables-in-programming-language/
Question No: 4___( Marks: 1 ) - Please choose one
There is a way of describing XML data, how?
XML uses a description node to describe data
XML uses a DTD to describe the data (page 75)
XML uses XSL to describe data
None of these
Ref
http://www.dotnetspider.com/questions/ViewQuestion.aspx?QuestionId=6754&
Question No: 5 ( Marks: 1 ) - Please choose
One which of the following property falls in HTTP?
Stateless (repeated)
State full
Temporary
All of these
Question No: 6 ( Marks: 1 ) - Please choose one
Choose the correct HTML tag to make a text bold
<tbold>
<b>
<bld>
<bold>
Question No: 7 ( Marks: 1 ) - Please choose one
What is the default scripting language in ASP?
EcmaScri pt
JavaScri pt
Java
VBScript (page 85)
Question No: 8 __ ( Marks: 1 ) - Please choose one
Which one of them is not a feature of e-commerce software?
catalog display
web hosting (page 92)
web services
transaction processing
Question No: 9 ( Marks: 1 ) - Please choose one
When two or more intranets are connected to each other they form a/an ----------
VPN
Intranet
Internet
Extranet (page 2)
Question No: 10 ( Marks: 1 ) - Please choose one
Pretty Good Privacy (PGP) is the name of a popular _________system which is available for general
public use. http://www.vustudents.net
Filtering
Cryptographic (page 100)
Server
Security
Question No: 11 __ ( Marks: 1 ) - Please choose one
Which one is NOT a valid frame attribute?
NORESIZE
ROWS (page 33)
FRAMEBORDER
BORDER
Question No: 12 ( Marks: 1 ) - Please choose one
IP version 6 provides ---------------bits and also contains ----------------------
128, hexadecimal (page 11)
64, hexadecimal
32, binary
None of the Above
Question No: 13 ___( Marks: 1 ) - Please choose one
A JavaScript event is generated when a user -------- .
clicks a hyperlink
clicks a button
enters data in a form
all of the above (page 54)
Question No: 14 __ ( Marks: 1 ) - Please choose one
Creating your own tags is not possible in HTML but in XML it is possible to create your own tags.
True
False
Question No: 15 __ ( Marks: 1 ) - Please choose one
IP, RIP, and ARP protocols work on
Application layer
Session layer
Network layer (page 6)
Data link layer
Question No: 16 __ ( Marks: 1 ) - Please choose one
In the communication between two computers on a network, CRC is calculated at
Sender’s side
Receiver’s side
Both sender and receiver sides
Neither on sender nor on receiver side
Ref
[PPT]
Business Data Communications and Networking
Question No: 17 ( Marks: 1 )
What is the function of ARP protocol at TCP/IP stack?Give precise answer.
Question No: 18 __ ( Marks: 1 )
Do you agree or not that in In Java Script we are not provided with certain
already defined objects which are ready to use? justify
Question No: 19 ( Marks: 2 )
What are the three position style properties?
Question No: 20 ( Marks: 3 )
Write at least three rules for writing an XML code.
Question No: 21 ( Marks: 5 )
What is the difference between an interpreted and a compiled language? Give one example of each.
Question No: 22 __ ( Marks: 10 )
Consider the following code of an XML document and identify where its standard code rules
are being applied. You are required to write the identified tag along with its related rule side
by side. http://www.vustudents.net
<?xml version=“1.0”?>
<PlanetsList>
<Planet Name=“Mercury”> <Distance>36 million miles</Distance> <Moons>None</Moons>
<DayLength> 176 days</DayLength> </Planet>
<Planet Name=“Venus”> <Distance>67 million miles</Distance> <Moons>None</Moons>
<DayLength>1 17 days</DayLength> </Planet>
<Planet Name=“Earth”> <Distance>93 million miles</Distance> <Moons>One</Moons>
<DayLength>24 Hours</DayLength> </Planet>
</PlanetsList> <BR/>
MIDTERM EXAMINATION
Spring 2010
IT430- E-Commerce (Session - 6)
Solved
Question No: 1 ( Marks: 1 ) - Please choose one
MAC stand for
► Media Access Control ( page 13)
► Media Access Consortium
► Member of Asian Community
► None of these
Question No: 2 ( Marks: 1 ) - Please choose one
Choose the correct HTML tag for the largest heading
► <head>
► <h1> (page 20)
► <Heading>
► <h6>
Question No: 3 ( Marks: 1 ) - Please choose one
Which of the following tags are used for embedding sound files into HTML code?
► <A href=“song.wav”>
► <EMBED SRC="Skylar.MP3">
► <A href=“song.wav”> and <EMBED SRC="Skylar.MP3"> (page 37)
► None of these
Do correction in all midterm file J
Question No:44 answer is 3rd
Question No: 4 ( Marks: 1 ) - Please choose one
Which of the following is NOT an advantage of CSS ?
► Works on version 4 browsers or newer
► Define the look of your pages in one place
► Easily change the look
► Implement same formatting each time tag is used.
Advantages
1) Improved Search Engine Results
2) Sites Load Faster
3) Design Separated from Content:
4) Displayed on Various Media
5) Compatibility with Browsers
Browser inserts a line break before the <DIV> tag and after the </DIV> end tag.
They are used when you want to apply a specific style to a number of different tags and sections
throughout the document http://www.vustudents.net
Question No: 5 ( Marks: 1 ) - Please choose one
Which of the following is correct line to add separated css file with name xxxx.css?
► <link scr=stylesheet href="/xxxx.css" type="text/css">
► <link rel=stylesheet href="/xxxx.css" type="text/css"> (page 77)
► <style rel=stylesheet href="/xxxx.css" type="text/css">
► <link rel=stylesheet scr="xxxx.css" type="text/css">
Question No: 6 ( Marks: 1 ) - Please choose one
Which of the following is correct syntax to define color in CSS?
► body {color: black} (page 77)
► body:color=black
► {body:color=black(body}
► {body;color:black}
Question No: 7 ( Marks: 1 ) - Please choose one
Inside which of the following HTML element do we put the JavaScript?
► <script> (page 58)
► <js>
► <javascript>
► <scripting>
Question No: 8 ( Marks: 1 ) - Please choose one
JavaScript is mainly a ___________ language.
► Server Side Scripting
► Cross Side Scripting
► Client Side Scripting (page79)
► both Cross and Server Side Scripting
Question No: 9 ( Marks: 1 ) - Please choose one
Which one is the responsible to manage “Internal processes”?
► E-business
► E-commerce
► E-marketing
► All of the given
Question No: 10 ( Marks: 1 ) - Please choose one
The first control statement in a for loop usually
► sets the termination condition
► increments a counter
► creates a control variable
► none of the above
Question No: 11 ( Marks: 1 ) - Please choose one
You define a method using
► obj.method
► obj.method[]
► obj.method() (PAGE 58)
► obj-method
Question No: 12 ( Marks: 1 ) - Please choose one
What is the default scripting language in ASP?
► EcmaScript
► JavaScript
► Java
► VBScript (PAGE 85)
Question No: 13 ( Marks: 1 ) - Please choose one
Following are malicious programs EXCEPT ----------------- .
► Back doors
► Trojan Horses
► Firewalls (PAGE 94)
► Worms
Question No: 14 ( Marks: 1 ) - Please choose one
Outside attacks on a network include the following, EXCEPT --------------- .
► Password attack http://www.vustudents.net
► DoS
► Back doors ( PAGE 95)
► IP spoofing
Question No: 15 ( Marks: 1 ) - Please choose one
At which layer of the OSI model the circuit level firewall operates?
► Application layer
► Presentation layer
► Network layer
► Transport layer (PAGE 96)
Question No: 16 ( Marks: 1 ) - Please choose one
The process of scrambling a message with the help of a key is called -------------- .
► Cryptography
► Filtering
► Transposition
► Encryption (PAGE 100)
The process of scrambling a message with the help of a key is called Encryption.
Question No: 17 ( Marks: 1 ) - Please choose one
In a ring network, every device has exactly ______ neighbors for communication purpose.
► more than two
► Two (PAGE 14)
► Four
► None of these
Question No: 18 ( Marks: 1 ) - Please choose one
What is identified by the tag <FRAMESET COLS="20%,60%,20%">?
► Horizontal frame ► Vertical Frame (PAGE 31) ► Top Frame ► Bottom Frame
Question No: 19 ( Marks: 1 ) - Please choose one
Why we use reset tag in HTML?
► To remove the text written in Notepad.
► To remove the text written in between <body> and </body>tag.
► To remove the text written in between <head> and </head> tag.
► To remove the text written in between <form> and </form> tag. (PAGE 27)
Question No: 20 ( Marks: 1 ) - Please choose one
Network Interface Card is operated at
► Application layer
► Session layer
► Network layer
► Datalink layer (PAGE 6)
Question No: 21 ( Marks: 2 ) http://www.vustudents.net
What value will be printed after executing the following statement in JavaScript:
document.write( Math.pow(3, 2) );
document.write("Math.pow(2,3) :"+Math.pow(2,3)+"<P>");
Question No: 22 ( Marks: 2 )
What is a web server?
ANSWER:
Web server
web server is a machine that serves up the web page requests of a client on the internet. It is a
combination of hardware and software. Decision as regards the type of a web server is largely
dependent on the volume and type of web activities. So, transaction processing sites generating
dynamic pages with high traffic volumes would need web server software that is more efficient and
can easily be upgraded.
Question No: 23 ( Marks: 3 )
To calculate the area of a circle the formula pi r squared is used. How would you code it in JavaScript?
<html>
<script type="text/javascript">
var radius,area;
radius = 10;
area = Math.PI*Math.pow(radius,2);
document.write("Area of circle with radius 10 is " + area );
</script>
</html>
Question No: 24 ( Marks: 3 )
Name four commonly used web server operating systems. (PAGE 91)
Commonly used web server operating systems are Microsoft Windows NT Server, Microsoft Windows
2000 Advanced Server, Microsoft.NET Server, Linux or Unix based operating systems such as Solaris.
Question No: 25 http://www.vustudents.net ( Marks: 5 )
Write the types of firewalls. Only names? Explain these briefly
Packet filter firewall
It uses a set of rules to determine whether outgoing or incoming data packets are allowed to pass
through the firewall.
Circuit level firewall
It is quite similar to the packet filter firewall. It also works on the basis of a set of rules for filtering
packets but operates at the transport layer of the OSI Model so has greater functionality.
Application gateway firewall
It operates at application layer of the OSI Model. It uses strong user authentication to verify identity of a
host attempting to connect to the network using application layer protocols such us FTP. In contrast to
packet filter firewall, it filters the requests rather than packets entering/leaving the network. It can block
any outgoing HTTP or FTP requests.
Question No: 26 ( Marks: 5 )
Write the JavaScript code which will display the following in a web page using a FOR loop:
The number is 0
The number is 1
The number is 2
The number is 3
The number is 4
The number is 5
<html>
<script type="text/javascript">
var no;
for (no=0; no<6 ; no++)
{
document.write("The number is " + no + "<br>" );
}
</script>
</html>
MIDTERM EXAMINATION
Spring 2010
IT430- E-Commerce (Session - 6)
Solved
Question No: 1 (Marks: 1) - Please choose one For which of the following we need to know the classification of E-commerce? ► Market planning strategy ► Build Mission statement ► Management strategy ► none (not sure ) Question No: 2 ( Marks: 1 ) - Please choose one Switch is a device that joins multiple computers together within one local area network (LAN). ► True (page 4) ► False Question No: 3 ( Marks: 1 ) - Please choose one In which protocol, the messages are not deleted from email server. ► SMTP ► POP3 ► IMAP (page 18) ► ICMP Question No: 4 ( Marks: 1 ) - Please choose one How can you open a link in a new browser window? ► <a href="/url" target="new"> ► <a href="/url" target="_blank"> (page 33) ► <a href="/url" new> ► None of these Question No: 5 ( Marks: 1 ) - Please choose one What does the Target= “_top” tag perform?
► Loads the new page into the same frame ► Loads the new page into the entire window (page 33) ► Loads the new page into a new browser window ► All of the above Question No: 6 ( Marks: 1 ) - Please choose one Which attribute is used in a tag to control the layout of element? ► view ► css (PAGE 39) ► Style ► Layout Question No: 7 ( Marks: 1 ) - Please choose one Choose the correct HTML code line which left-align the content inside a tablecell. ► <td leftalign> ► <td valign="left"> ► <td align="left">(PAGE 26) ► <tdleft> Question No: 8 ( Marks: 1 ) - Please choose one
Where in an HTML document is the correct place to refer to an external style sheet? ► In the <body> section ► At the end of the document ► In the <head> section (PAGE 39) ► At the top of the document Question No: 9 http://www.vustudents.net ( Marks: 1 ) - Please choose one When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called ► Local Variables ► Global Variables ► Local and Global ► None of the above ref http://en.wikipedia.org/wiki/Local_variable Question No: 10 ( Marks: 1 ) - Please choose one Constructor is defined as the initializing function used to create…........ ► Instance of object ► Copy of object ► Instance / copy of object (page 69) ► Shallow copy of object Question No: 11 ( Marks: 1 ) - Please choose one What does XML stand for? ► eXtra Modern Link ► X-Markup Language ► eXtensible Markup Language (page 74) ► Example Markup Language Question No: 12 ( Marks: 1 ) - Please choose one For which of following purpose the Firewall is used ? ► Efficient working ► Protection against security attacks (page 95) ► Networking purpose ► None of these Question No: 13 ( Marks: 1 ) - Please choose one PPP stands for ► Point to Point Protocol (page 98) ► Post to Post Protocol ► Point to Post Protocol ► None of these Question No: 14 ( Marks: 1 ) - Please choose one Which of the following is NOT processed on the client side? ► Cookies ► JavaScript ► CGI scripts (page 79) ► Applets Question No: 15 ( Marks: 1 ) - Please choose one Firewall is used to I - examine the data entering the network II - examine the data leaving the network III - filter the data according to certain rules ► I, II and III (page 96)
► I only ► I and III only ► I and II only Question No: 16 ( Marks: 1 ) http://www.vustudents.net- Please choose one Which firewall uses strong user authentication to verify identity of a host attempting to connect to the network? ► Packet filter firewall ► Circuit level firewall ► Application gateway firewall (page 96) ► Hybrid firewall Question No: 17 ( Marks: 1 ) - Please choose one Bus networks is same as the system bus of a computer. ► True ► False (page 14) Question No: 18 ( Marks: 1 ) - Please choose one In Style Sheets, How do you add a background color for all "<h1>" elements? ► all.h1 {background-color:#FFFFFF} ► h1.all {background-color:#FFFFFF} ► h1 {background-color:#FFFFFF}(page 47) ► h1 {bgcolor:#FFFFFF} Question No: 19 ( Marks: 1 ) - Please choose one How do you make each word in a text start with a capital letter? ► text-transform:capitalize ► text-transform:first_capitalize. (page 46) ► Cann’t be possible with CSS ► text-transform:uppercase Question No: 20 ( Marks: 1 ) - Please choose one MAC address is written in Binary form 0-1 ► Decimal form 0-9 ► Hexadecimal form 0-f ► (page 13) None of these ► Question No: 21 ( Marks: 2 ) What is a web server? Answer : Web server – machine that services internet request. Web server – machine that services internet request
web server is a machine that serves up the web page requests of a client on the internet. It is a
combination of hardware and software. Decision as regards the type of a web server is largely
dependent on the volume and type of web activities. So, transaction processing sites generating
dynamic pages with high traffic volumes would need web server software that is more efficient and can
easily be upgraded.
Question No: 22 ( Marks: 2 ) What does ‘parseFloat(string)’ And NaN mean? The parseFloat() function parses a string and returns a floating point number. This function determines if the first character in the specified string is a number. If it is, it parses the string until it reaches the end of the number, and returns the number as a number, not as a string. The NaN property represents "Not-a-Number" value. This property indicates that a value is not a legal number.
Question No: 23 ( Marks: 3 ) Write at least three rules for writing an XML code. Rules for writing an XML code
-All elements must be properly nested <outer><inner>content</inner></outer>
-All attribute values must be quoted <FRIES SIZE=“LARGE”>
-All elements with empty content must be identified by ending in /> Question No: 24 ( Marks: 3 ) How ‘Man in The middle Attacks’ operates? Man in the middle attacks
In it the attacker is able to monitor, capture and control data between sending and receiving
machines. He may apply IP address spoofing technique to divert the packets to its machine, then
modify the packets and resend the misleading information to the actual client. Another form of man-
in-the-middle attack is where the hacker is able to substitute the IP address of a genuine web site with
the IP address of his own web site due to some security hole in the software that runs on a domain
name server. A client would think that he is communicating or receiving the information form a
genuine web site, though it would not be the case actually.
Question No: 25 ( Marks: 5 ) Write the code for a web page displaying a button named "Testing". After clicking that button an alert should be displayed saying "The test is successful". <html> <head> <script type="text/javascript"> function sndAlert() { window.alert("The test is successful!!!"); } </script> </head> <body> <FORM NAME="form1"> <INPUT TYPE="Button" name="showAlert" VALUE="Show Alert" onclick="sndAlert()"> </FORM> </body> </html> Question No: 26 ( Marks: 5 ) Differentiate between front end and back end. Answer: Front end consists of that information which is visible to the user and he can interact with the same through some interface. The back end comprises that information which resides on the server side and is used to create certain dynamic results for the user. It would include different programs or scripts that may be developed in different languages/tools. Backend is mainly used for two purposes – for querying with the databases and for the maintenance of state. We can use
different tools (ASP, JSP etc.) for that purpose depending upon their respective advantages/disadvantages.
MIDTERM EXAMINATION
Spring 2010
IT430- E-Commerce (Session - 5)
Question No: 1 ( Marks: 1 ) - Please choose one
Network addresses 128--- 191 range belongs to which of the following class networks?
► A
► B (page 10)
► C
► E
Question No: 2 ( Marks: 1 ) - Please choose one
Which of the following is true for Class A:
► Network 01 byte and 03 hosts (page 10)
► Network 02 bytes and 02 hosts
► Network 03 bytes and 01 host
► None of these
Question No: 3 ( Marks: 1 ) - Please choose one
Which one is not included in the networking topologies?
► Star Topology
► Bus Topology
► Media Topology (page 14)
► Ring Topology
Question No: 4 ( Marks: 1 ) - Please choose one
What is the correct HTML for making a hyperlink?
► <a name="http://www.vu.edu.pk”>Virtual university</a>
► <a href=" http://www.vu.edu.pk "> Virtual university </a> (page 23)
► <a>http://www. vu.edu.pk </a>
► <a url="http://www. vu.edu.pk "> Virtual university of pakistan</a>
Question No: 5 ( Marks: 1 ) - Please choose one
What is the correct HTML for making a text input field?
► <textinput type="text">
► <input type="text"> (page 27)
► <input type="textfield">
► <textfield>
Question No: 6 ( Marks: 1 ) - Please choose one
If we leave out the target attribute in frame tag and link was clicked ,the document loads into the
window
► In Same page (page 37)
► In other blank page.
► To display browser error.
► All of the options.
Question No: 7 ( Marks: 1 ) http://www.vustudents.net - Please choose one
Where in an HTML document is the correct place to refer to an external style sheet?
► In the <body> section
► At the end of the document
► In the <head> section (repeated )
► At the top of the document
Question No: 8 ( Marks: 1 ) - Please choose one
How do you write a conditional statement for executing some statements only if "i" is equal to 5?
► if i=5
► if i=5 then
► if i==5 then
► if (i==5)
ref
http://www.ex-designz.net/test_page.asp?tid=65
Question No: 9 ( Marks: 1 ) - Please choose one
Which of the following is used to get remote access of any computer on a network?
► Trojan Horse
► Backdoor
► Virus
► All of these (page 94)
Question No: 10 ( Marks: 1 ) - Please choose one
PPP stands for
► Point to Point Protocol (repeated )
► Post to Post Protocol
► Point to Post Protocol
► None of these
Question No: 11 ( Marks: 1 ) - Please choose one
JavaScript is mainly a ___________ language.
► Server Side Scripting
► Cross Side Scripting
► Client Side Scripting (page 79)
► both Cross and Server Side Scripting
Question No: 12 ( Marks: 1 ) - Please choose one
Inside which HTML element do we put the JavaScript?
► <scripting>
► <javascript>
► <script> (page 57)
► <js>
Question No: 13 ( Marks: 1 ) http://www.vustudents.net - Please choose one
a++; is the same as which of the following?
► a=a*1;
► a=a+2;
► a=1+2;
► a=a+1;
ref
http://www.academictutorials.com/answers.asp?id=6
Question No: 14 ( Marks: 1 ) - Please choose one
If a web server is bombarded with thousands of HTTP requests, that would be an example of --------------
-.
► sniffing
► password attack
► man in the middle attack
► denial of service attack (page 95)
Question No: 15 ( Marks: 1 ) - Please choose one
Outside attacks on a network include the following, EXCEPT --------------- .
► Password attack
► DoS
► Back doors (page 95)
► IP spoofing
Question No: 16 ( Marks: 1 ) - Please choose one
Digital signature uses --------- .
► Symmetric cryptography
► Private key cryptography
► Public key cryptography
► Hash function
ref
http://www.digistamp.com/signature.htm
http://ecommerce.hostip.info/pages/271/Cryptography-Public-Private-Key.html
Question No: 17 ( Marks: 1 ) - Please choose one
In star topology, If hub fails, the entire network also fails.
► True
► False
ref
http://www.exforsys.com/tutorials/networking/star-topology.html
Question No: 18 ( Marks: 1 ) - Please choose one
Which one is the correct CSS syntax?
► h1 {font-size:72pt}
► h1:font-size=72pt
► {h1:font-size=72pt}
► {h1;font-size:72pt}
ref
http://uk.answers.yahoo.com/question/index?qid=20100308120234AAPKmAf
Question No: 19 ( Marks: 1 ) - Please choose one
In CSS, How do you make each word in a text start with a capital letter?
► text-transform:capitalize
► text-transform:uppercase (correct )
► text:capitalize
► You can't do that with CSS
REFERENCE
http://www.ex-designz.net/test_grade.asp?tid=37 (question 24 in this link )
Question No: 20 ( Marks: 1 ) - Please choose one
Which of the following is the default alignment in HTML?
► Left
► Center
► Right
► None
REFERENCE
align = left|center|right|justify|char [CI]
This attribute specifies the alignment of data and the justification of text in a cell. Possible values:
• left: Left-flush data/Left-justify text. This is the default value for table data.
• center: Center data/Center-justify text. This is the default value for table headers.
• right: Right-flush data/Right-justify text.
• justify: Double-justify text.
• char: Align text around a specific character. If a user agent doesn't support character alignment,
behavior in the presence of this value is unspecified.
Question No: 21 http://www.vustudents.net ( Marks: 2 )
What is Term ‘Catalog Display’ means? (page 92)
A Static catalog is a simple list written in HTML. One has to edit the HTML code to change it. A
dynamic catalog stores information about items in a database usually on a different computer
accessible by the web server. It can provide photos, detailed description and search facility about the
availability of items.
Question No: 22 ( Marks: 2 )
What is meant by a constructor? (page 69)
It is initializing function used to create instance of an object. It is after the name of the object whose
constructor it is.
Question No: 23 ( Marks: 3 )
What is meant by ‘Shopping Cart’ in context of e commerce? (page 92)
shopping cart was used wherein the user had to remember and type certain information. It is now
replaced by electronic shopping cart/basket that keeps record of the items the customer has selected
and allows customers to view the details of the items selected. The customer can add new items or
remove items. To order an item, a customer simply clicks at that item option. All details of an item,
including its price, product no. and order identifying information are stored automatically in the cart.
Question No: 24 ( Marks: 3 )
We have an array named my Array where this sentence is stored. “Welcome to Virtual University!”
If we apply str.split(’’) method.
What will be the output of str.split(’’)myArray(4) and str.split(’’)myArray(2) respectively.
Str.Split split the string based on the blank spaces.
str.split(’’)myArray(4) = blank
str.split(’’)myArray(2) = virtual
Question No: 25 ( Marks: 5 )
Describe the importance of Cryptography in internet data transfer security in E-Commerce?
It is a collection of mathematical techniques used to ensure confidentiality of information. The
process of scrambling a message with the help of a key is called Encryption.
Now a days as internet is widely used. So danger of data safety and serurity also rose. Compare to its
earlier use.
It provide the Transaction Integrity. Tranasction detail of both the parties can be verified which help
to built the confidence between business community.
It provide Privacy like it provide controls to prevent third parties from geting access to the
information within the transaction
Without cryptography, it is doubtful that banks, businesses and individuals would feel safe doing
business online.
Cryptography provides the confidence to the customer that their data is safe and secure. Otherwise
due to lack of confidence and doubt e-commerce business can not flourish.
Question No: 26 ( Marks: 5 )
Write a list of comparison operators in JavaScript with symbols.
Comparison operators
‘==’ for Equal
‘!=’ for not equal
‘< ‘ for Less than
‘<=’ for less than equal
‘>’ for Greater than
‘>=’ for Greater than equal
MIDTERM EXAMINATION
Spring 2009
IT430- E-Commerce (Session - 4)
Question No: 1 ( Marks: 1 ) - Please choose one
In
datalink layer, data packets are placed inside
► Data frames (page 6)
► Data boxes
► Data streams
► None of these
Question No: 2 ( Marks: 1 ) - Please choose one
Which of these is the correct HTML code for creating a reset button?
► <input type =”button” name=”reset” value=”reset”>
► <input type=”resetButton” value=”Clear”>
► <input type=”reset” value=”reset”> (page 26)
► <input type=”button” name=”reset” value=”clear”>
Question No: 3 ( Marks: 1 ) - Please choose one
…..tag is used into …….tag because a row contains multi cells and to fill up these cells with data.
► TD…… TR
► TR…… TD (page 25)
► TD…… TG
► TG…… TR
Question No: 4 ( Marks: 1 ) - Please choose one
Individuals who write programs or manipulate technologies to gain unauthorized access to computers
and networks are --------------- .
► administrators
► experts
► hackers (page 54)
► coders
Question No: 5 ( Marks: 1 ) - Please choose one
Which tag is used for the hidden fields?
► <FIELD>
► <TEXT>
► <INPUT> page 88
► <HIDDEN>
<INPUT TYPE= "HIDDEN" NAME= "Shirt1" VALUE="25">
Question No: 6 ( Marks: 1 ) - Please choose one
What is a correct way of referring to a stylesheet called "mystyle.xsl" ?
► <?xml-stylesheet type="text/xsl" href="mystyle.xsl" ?>
► <link type="text/xsl" href="mystyle.xsl" />
► <stylesheet type="text/xsl" href="mystyle.xsl" />
► <?stylesheet type="text/xsl" href="mystyle.xsl" ?> page 39
<Link Rel="stylesheet" Type="text/css" href="mystyles.css">
Question No: 7 ( Marks: 1 ) - Please choose one
Which of them is NOT a predefined object?
► Document
► Date (repeated)
► Loop
► Array
Question No: 8 ( Marks: 1 ) - Please choose one
Which of these is not a comparison operator?
► <
► >
► = (repeated)
► !=
Question No: 9 ( Marks: 1 ) - Please choose one
Var
d = new date()
Which of the following is correct about the d variable?
► instance of new
► instance of Date() method
► instance of Date object (repeated)
► Simple Variable
Question No: 10 ( Marks: 1 ) - Please choose one
When you declare a variable within a function, the variable can only be accessed within that function.
When you exit the function, the variable is destroyed. These variables are called
► Local Variables (repeated)
► Global Variables
► Local and Global
► None of the above
Question No: 11 ( Marks: 1 ) - Please choose one
Which of the following , is condition part of given For loop
for (i = 0; i <= 5; i++).
► i=0.
► i++.
► i<=5.
► (i = 0; i <= 5; i++).
Question No: 12 ( Marks: 1 ) - Please choose one
What is the correct JavaScript syntax to write "Virtual University of Paistan"?
► document.write("Virtual University of Paistan ")
► ("Virtual University of Paistan ")
► " Virtual University of Paistan "
► response.write("Virtual University of Paistan ")
Question No: 13 ( Marks: 1 ) - Please choose one
Which of the following is NOT valid HTML code line?
► <frameset rows="16%,84%">
► <frameset columns="16%,84%">
► <frameset cols="100,150">
► <frameset cols=”50%,50%” rows=”16%,84%”>
Ref
http://www.academictutorials.com/answers.asp?id=1
Question No: 14 ( Marks: 1 ) - Please choose one
CSS
is a breakthrough in Web design because it allows developers to control the---------
► Processing speed on client side
► Data grid view on client side
► Style and layout of home page.
► Style and layout of multiple Web pages (repeated)
Question No: 15 ( Marks: 1 ) - Please choose one
Which HTML tag is used to define an internal style sheet?
► <css>
► <script>
► <style> (repeated)
► <sheet>
Question No: 16 ( Marks: 1 ) - Please choose one
What is the correct HTML tag for adding a background color?
► <background>yellow</background>
► <body bgcolor="yellow"> (repeated)
► <body color="yellow">
► None
Question No: 17 ( Marks: 1 )
What does this mean?
padding-right
Question No: 18 ( Marks: 1 )
Do
you agree or not that using Cascading Style Sheets one can apply an image to sections of one’s page or
even to individual words.
Question No: 19 ( Marks: 2 )
Suppose, there is an applet at "http://www.vu.edu.pk/demo.class". Write the code to include this applet
in your web page.
<APPLET CODE= “http://www.vu.edu.pk/demo.class” width=100 height=200> DEMO </APPLET>
Question No: 20 ( Marks: 3 )
What do you think, is there any difference between Static and Dynamic IP Address assignment? Discuss.
Question No: 21 ( Marks: 5 )
What is cryptography? What techniques are used for cryptography?
Question No: 22 ( Marks: 10 )
Analyze the following given code showing some Cascading Style Sheets tags and explain its lines one
by one.
<html>
<head>
<style type="text/css">
h1 {text-decoration: overline}
h2 {text-decoration: line-through}
h3 {text-decoration: underline}
a {text-decoration: none}
</style>
</head>
<body>
<h1>This is header 1</h1>
<h2>This is header 2</h2>
<h3>This is header 3</h3>
<p><a href="http://www.w3schools.com/default.asp">This is a link</a></p>
</body>
</html>
MIDTERM EXAMINATION
Spring 2010
IT430- E-Commerce (Session - 6)
Question No: 1 ( Marks: 1 ) - Please choose one
In star network features a central connection point called a "hub" that ought to be only a hub.
_ True
_ False
Question No: 2 ( Marks: 1 ) - Please choose one
Switch is a device that joins multiple computers together within one local area network (LAN).
_ True (page 15)
_ False
Question No: 3 ( Marks: 1 ) - Please choose one
Switch generally contains more "intelligence" than a hub.
_ True
_ False
Question No: 4 ( Marks: 1 ) - Please choose one
In which protocol, the messages are not deleted from email server.
_ SMTP
_ POP3
_ IMAP (page 18)
_ ICMP
Question No: 5 ( Marks: 1 ) - Please choose one
Which protocol does Virtual university use to send email to student Accounts?
_ SMTP
_ POP
_ IMAP
_ TCP
Question No: 6 ( Marks: 1 ) - Please choose one
For which one of the following,<MARQUEE ...> tag can work better
_ News headlines
_ Announcements
_ Sound pulgin
_ Movie controls
Question No: 7 ( Marks: 1 ) - Please choose one
Can you add a style in a single place on a page ?
_ Yes, with a style-definition written into the tag
_ Yes, with a global style definition that redefines the tag.
_ No - CSS can only be defined for entire pages.
Question No: 8 ( Marks: 1 ) - Please choose one
Which CSS tag is used to place an image that would remain when user scrolls down or up the page?
_ background-attachment: fixed
_ background-attachment: scroll
_ background-attachment: up
_ All of these
Question No: 9 ( Marks: 1 ) - Please choose one
What shall come in blanks for proper result,
Here blanks are numbered with 1,2 and 3
<html>
<head>
<SCRIPT language="JavaScript">
Var num1, var num2
Document.container .result.value=parseFloat(num1)-parseFloat(num2)
</script>
</head>
<body>
<FORM name=”---------1-----------”>
<input type=”----------2-------” name=”-------3---------” maxlength=”5”>
</form>
</body>
</html>
_ container, text and result
_ result, value and container
_ container , button and value
_ result, container and text
Question No: 10 ( Marks: 1 ) - Please choose one
Correct syntax of "for" loop is :
_ for (i = 0; i <= 5)
_ for i = 1 to 5
_ for (i <= 5; i++)
_ for (i = 0; i <= 5; i++)
REF
http://www.ex-designz.net/test_grade.asp?tid=65
Question No: 11 ( Marks: 1 ) - Please choose one
CGI stands for
_ Common Gate Information
_ Common Gate Interface (PAGE 82)
_ Common Goal Interest
_ Common Global Interaction
Question No: 12 ( Marks: 1 ) - Please choose one
Which of the following property falls in HTTP?
_ Stateless
_ Stateful
_ Temporary
_ All of these
Question No: 13 ( Marks: 1 ) - Please choose one
What is a correct way of referring to a stylesheet called "mystyle.xsl" ?
_ <?xml-stylesheet type="text/xsl" href="mystyle.xsl" ?>
_ <link type="text/xsl" href="mystyle.xsl" />
_ <stylesheet type="text/xsl" href="mystyle.xsl" />
_ <?stylesheet type="text/xsl" href="mystyle.xsl" ?>
Question No: 14 ( Marks: 1 ) - Please choose one
Which of the following does not interpret its code?
_ ASP
_ PHP
_ JSP (page 85)
_ Coldfusion
Question No: 15 ( Marks: 1 ) - Please choose one
Asymmetric cryptography is also called -------------- .
_ Public key cryptography (PAGE 100)
_ Private key cryptography
_ Substitution cryptography
_ Transposition
Question No: 16 ( Marks: 1 ) - Please choose one
Digital signature uses --------- .
_ Symmetric cryptography
_ Private key cryptography
_ Public key cryptography (PAGE 100)
_ Hash function
Question No: 17 ( Marks: 1 ) - Please choose one
Which one of the following is NOT a valid JavaScript variable?
_ _name1
_ $studentScore
_ first_name
_ 2ndName
Question No: 18 ( Marks: 1 ) - Please choose one
Which of these is the correct HTML code for creating a reset button?
_ <input type =”button” name=”reset” value=”reset”>
_ <input type=”resetButton” value=”Clear”>
_ <input type=”reset” value=”reset”> (page 61)
_ <input type=”button” name=”reset” value=”clear”>
Question No: 19 ( Marks: 1 ) - Please choose one
Why we use reset tag in HTML?
_ To remove the text written in Notepad.
_ To remove the text written in between <body> and </body>tag.
_ To remove the text written in between <head> and </head> tag.
_ To remove the text written in between <form> and </form> tag. (page 61)
Question No: 20 ( Marks: 1 ) - Please choose one
http://cs.vu.edu is an example of
_ Two zone domain name
_ Three zone domain name
_ Four zone domain name
_ Five zone domain name
Question No: 21 ( Marks: 2 )
How
Certification Authority (CA) issues the certificates? Describe briefly
Question No: 22 ( Marks: 2 )
Discuss the role of child element tags while in writing XML code.
Question No: 23 ( Marks: 3 )
Performance of web servers can be evaluated mainly on the basis of two factors. What are they?
Question No: 24 ( Marks: 3 )
Write a function for the addition of two numbers?
Question No: 25 ( Marks: 5 )
Write the JavaScript code which will display the following in a web page using a FOR loop:
The number is 0
The number is 1
The number is 2
The number is 3
The number is 4
The number is 5
Question No: 26 ( Marks: 5 )
What is the difference between an interpreted and a compiled language? Give one example of
each.
MIDTERM EXAMINATION Spring 2009
IT430- E-Commerce (Session - 2)
Question No: 1 __ ( Marks: 1 ) - Please choose one
Academic institutions, religious organizations and government using ----------------------e-commerce
classification
Busi ness-to-Business(B2B)
Intra Business
Non Business EC (page 2)
Busi ness-to-consumer(B2C)
Question No: 2___ ( Marks: 1 ) - Please choose one
Network addresses 128--- 191 range belongs to which of the following class networks?
A
B (page 10)
C
E
Question No: 3 ( Marks: 1 ) - Please choose one
Where in an HTML document is the correct place to refer to an external style sheet?
In the <body> section
At the end of the document
In the <head> section
At the top of the document
Ref
http://www.ex-designz.net/test_grade.asp?tid=37
Question No: 4 __ ( Marks: 1 ) - Please choose one
Constructor is defined as the initializing function used to create…..........
Instance of object
Copy of object
Instance / copy of object (page 69)
Shallow copy of object
Question No: 5 ( Marks: 1 ) - Please
choose one What does DTD stand for?
Do The Dance.
Dynamic Type Definition.
Data Type Definition. (page 76)
Direct Type Définition.
Question No: 6 __ ( Marks: 1 ) - Please choose one Which one of
following file is used to translate XML:
DTD
XSL (repeated )
XML parser
Browser
Question No: 7 __ ( Marks: 1 ) - Please choose one
In which of the following language ,XML parser is usually written.
VB.net
Java (page 77)
Asp.net
C++
Question No: 8 __ ( Marks: 1 ) - Please choose one
In _________key cryptography, everyone has access to all the public keys
Public (page 100)
Private
Symmetric
Certified
Question No: 9___ ( Marks: 1 ) - Please choose one
How do you define a numerical value?
var mynum = new Math;
var mynum = Math(6);
var mynum = 6;
Math.mynum = 6;
Question No: 10___ ( Marks: 1 ) - Please choose one
What is 17%5 ?
2
3
85
84
Question No: 11___( Marks: 1 ) - Please choose one
An array can contain ---------- .
only text
only numbers
only numbers or text
any valid variable
ref
http://java.sun.com/docs/books/jls/second_edition/html/arrays.doc.html
Question No: 12 ( Marks: 1 ) - Please choose
one Which tag is used for the hidden fields?
<FIELD>
<TEXT>
<INPUT> (page 88)
<HIDDEN>
Question No: 13 __ ( Marks: 1 ) - Please choose one
Packet filter firewall operates at
a) data link layer
b) network layer
c) transport layer
a and b only (page 5)
c only
b and c only
a, b and c
Question No: 14 ( Marks: 1 ) - Please choose one
Which one has the functionality to redirect the filled information to an other page.
Submit button
Reset button
Radio button
None of the given
Question No: 15 ( Marks: 1 ) - Please choose one
Due to which characteristics, ATM network are covered under E-commerce ?
Exchange of information through computer networks
Internet.
Exchanging of products, services.
None of the above.
Question No: 16 __ ( Marks: 1 ) - Please choose one
IP, RIP, and ARP protocols work on
Application layer
Session layer
Network layer (page 6)
Data link layer
Question No: 17 __ ( Marks: 1 )
Shortly Explain RIP?
Question No: 18 __ ( Marks: 1 )
In HTML , for displaying information systematically which tag do we usually use ?
Question No: 19 ( Marks: 2 )
How Certification Authority (CA) issues the certificates? Describe briefly
Question No: 20 __ ( Marks: 3 )
What is MAC address? How does it help server to identify the client?
Question No: 21 ( Marks: 5 )
How can we classify E-Commerce by the nature of its transactions? Give at least one real life
example for each of its classification.
Question No: 22 ( Marks: 10 )
Analyze the following given code showing some Cascading Style Sheets tags and explain its
lines one by one.
<html>
<head>
<style type="text/css">
h1 {text-decoration: overline}
h2 {text-decoration: line-through}
h3 {text-decoration: underline}
a {text-decoration: none}
</style>
</head>
</html>
<body>
<h1>This is header 1</h1>
<h2>This is header 2</h2>
<h3>This is header 3</h3>
<p><a href="http ://www.w3schools.com/default.asp">This is a link</a></p>
</body>
IDTERM EXAMINATION Spring 2009
IT430- E-Commerce (Session - 1)
Question No: 1 __ ( Marks: 1 ) - Please choose one
Marketing plan should be same for all E-commerce classification.
True
False
Question No: 2 ( Marks: 1 ) - Please choose one
Identify the networking device which regenerates the signals if these become
weak.
Hub
Switch
Router
Repeater (page 15)
Question No: 3 ( Marks: 1 ) - Please choose one
How can you open a link in a new browser window?
<a href="url" target="new">
<a href="url"target="_blank"> (page 33)
<a href="url"new>
None of these
Question No: 4 ( Marks: 1 ) - Please choose one
Content pages relate to which of the following tag?
<iframe>
<Frame>
<frameset>
<noframes>
Question No: 5 __ ( Marks: 1 ) - Please choose one
What is the correct HTML for referring to an external style sheet?
<style src=mystlye.css>
<link re = “stylesheet” type= “text/css” herf= “mystyle.css”>
<stlyesheet> mystyle.css</stlyesheet>
All of these
Ref
http://www.ex-designz.net/test_grade.asp?tid=37
Question No: 6 __ ( Marks: 1 ) - Please choose one
Choose the correct HTML code line which left-align the content inside a table cell.
<td leftalign>
<td valign="left">
<td align="left"> (page 26)
<tdleft>
Question No: 7 ( Marks: 1 ) - Please choose one
In a Frameset code, do the BODY tags belong inside or outside of the NOFRAMES tag pair?
Inside because an HTM Document can only include one or the other.
Outside, to be seen by the older browsers [NN version 1 and IE version 2].
Outside because the W3C says that to be valid.
Contain a BODY tags pair.
Ref
http://www.tjkdesign.com/articles/frames/quiz.asp
Question No: 8 ________________ ( Marks: 1 ) - Please choose one
In CSS, the font-style property can make text what?
Bigger.
Italic.
Different colors.
Change size.
Ref
http://www.w3schools.com/css/css_font.asp
Question No: 9 ( Marks: 1 ) - Please choose one
Which CSS tag is used to place an image that would remain when user scrolls down or up the page?
background-attachment: fixed
background-attachment: scroll
background-at tachment : up
All of these
Question No: 10 ( Marks: 1 ) - Please choose one
Which of the following ,in Javascript, we could not create our own?
Textboxes
Dropdown
Object
Image
Ref
http://www.w3schools.com/js/js_objects.asp
Question No: 11 ( Marks: 1 ) - Please choose one
How do you write a conditional statement for executing some statements only if "i" is
equal to 5?
if i=5
if i=5 then
if i==5 then
if (i==5) (page 58)
Ref
http://www.ex-designz.net/test_grade.asp?tid=65
Question No: 12 __ ( Marks: 1 ) - Please choose one
Constructor is defined as the initializing function used to create…..........
Instance of object
Copy of object
Instance / copy of object (page 69)
Shallow copy of object
Question No: 13 ( Marks: 1 ) - Please choose one
Which one of following file is used to translate XML:
DTD
XSL (page 77)
XML parser
Browser
Question No: 14 ( Marks: 1 ) - Please choose one
How can you reference part of a string?
text.substr(5,6);
text.part(5,6)
text. piece(5 ,6)
text.split(5,6);
http://php.net/manual/en/function.substr.php
Question No: 15___( Marks: 1 ) - Please choose one
Which one is the correct CSS syntax?
h1 {font-size:72pt} (page 39)
h1:font-size=72pt
{h1:font-size=72pt}
{h1;font-size:72pt}
Question No: 16 __ ( Marks: 1 ) - Please choose one
In the communication between two computers on a network, CRC is calculated at
Sender’s side
Receiver’s side
Both sender and receiver sides
Neither on sender nor on receiver side (100% tuka )
Question No: 17 __ ( Marks: 1 )
What does this mean document.write("str.charAt(3) : "+str.charAt(3) +"<P>"); ?
Question No: 18 __ ( Marks: 1 )
What does this term mean "Non-repudiation"?
Question No: 19 __ ( Marks: 2 )
What are servlets?
Question No: 20 ( Marks: 3 )
What are the three methods for using style sheets with a web page?
Question No: 21 __ ( Marks: 5 )
Identify protocol stack used in each layer of OSI model?
Question No: 22 ( Marks: 10 )
"The role of a Certification Authority is similar to a passport office." Explain it.
MIDTERM EXAMINATION Spring 2009
IT430- E-Commerce (Session - 4)
Question No: 1 ( Marks: 1 ) - Please choose one In data link layer, data packets are placed inside ► Data frames (PAGE 6) ► Data boxes ► Data streams ► None of these
Question No: 2 ( Marks: 1 ) - Please choose one Which of these is the correct HTML code for creating a reset button? ► ► ► ► Question No: 3 ( Marks: 1 ) - Please choose one …..tag is used into …….tag because a row contains multi cells and to fill up these cells with data. ► TD…… TR ► TR…… TD ► TD…… TG ► TG…… TR RFF
http://www.w3.org/TR/WCAG10-HTML-TECHS/ Question No: 4 ( Marks: 1 ) - Please choose one Individuals who write programs or manipulate technologies to gain unauthorized access to computers and networks are --------------- . ► administrators
► experts ► hackers (PAGE 94) ► coders Question No: 5 ( Marks: 1 ) - Please choose one Which tag is used for the hidden fields? ► ►
► ► Question No: 6 ( Marks: 1 ) - Please choose one What is a correct way of referring to a stylesheet called "mystyle.xsl" ? ► <?xml-stylesheet type="text/xsl" href="/mystyle.xsl" ?> ► ► ► <?stylesheet type="text/xsl" href="/mystyle.xsl" ?> Question No: 7 ( Marks: 1 ) - Please choose one Which of them is NOT a predefined object? ► Document ► Date ► Loop ► Array ref http://www.webreference.com/programming/javascript/diaries/15/ Question No: 8 ( Marks: 1 ) - Please choose one Which of these is not a comparison operator? ► < ► > ► = (PAGE 58) ► != Question No: 9 ( Marks: 1 ) - Please choose one
Var d = new date() Which of the following is correct about the d variable?
► instance of new ► instance of Date() method ► instance of Date object ► Simple Variable REF http://www.webreference.com/programming/javascript/diaries/15/
Question No: 10 ( Marks: 1 ) - Please choose one When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called
► Local Variables
► Global Variables
► Local and Global
► None of the above
ref If you declare a variable within a function, the variable can only be accessed ... the variable is destroyed. These variables are called local variables. ... Question No: 11 ( Marks: 1 ) - Please choose one Which of the following , is condition part of given For loop for (i = 0; i <= 5; i++).
► i=0. ► i++. ► i<=5. ► (i = 0; i <= 5; i++). Ref http://www.blackwasp.co.uk/CSharpForLoop.aspx
Question No: 12 ( Marks: 1 ) - Please choose one What is the correct JavaScript syntax to write "Virtual University of Paistan"?
► document.write("Virtual University of Paistan ") ► ("Virtual University of Paistan ") ► " Virtual University of Paistan " ► response.write("Virtual University of Paistan ")
Question No: 13 ( Marks: 1 ) - Please choose one Which of the following is NOT valid HTML code line?
► ,84%"> ► ,84%"> ► ► ,50%” rows=”16%,84%”>
Question No: 14 ( Marks: 1 ) - Please choose one CSS is a breakthrough in Web design because it allows developers to control the--------- ► Processing speed on client side
► Data grid view on client side ► Style and layout of home page. ► Style and layout of multiple Web pages ref http://ezinearticles.com/?Advantages-of-Using-CSS-in-Web-Design&id=1433066
Question No: 15 ( Marks: 1 ) - Please choose one
Which HTML tag is used to define an internal style sheet?
►
►
►
►
Question No: 16 ( Marks: 1 ) - Please choose one What is the correct HTML tag for adding a background color? ► yellow ► ► ► None Question No: 17 ( Marks: 1 ) What does this mean? (page 49) padding-right padding-right – adds space to the right of the content Question No: 18 ( Marks: 1 ) Do you agree or not that using Cascading Style Sheets one can apply an image to sections of one’s page or even to individual words. Yes! I agree, using CSS one can apply his/her defined design, image or wording to muliple pages of his/her website. Question No: 19 ( Marks: 2 ) Suppose, there is an applet at "http://www.vu.edu.pk/demo.class". Write the code to include this applet in your web page. Question No: 20 ( Marks: 3 ) What do you think, is there any difference between Static and Dynamic IP Address assignment? Discuss. A static IP address is a number (in the form of a dotted quad) that is assigned to a computer by an Internet service provider (ISP) to be its permanent address on the Internet. Computers use IP addresses to locate and talk to each other on the Internet, much the same way people use phone numbers to locate and talk to one another on the telephone. When you want to visit whatis.com, your computer asks a domain name system (DNS) server (think telephone information operator) for the correct dotted quad number (think phone number) for whatis.com and your computer uses the answer it receives to connect to the whatis.com server. Question No: 21 ( Marks: 5 ) What is cryptography? What techniques are used for cryptography? Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized or unwanted person intercepts the message he/she would still not be able to make any sense out of it. Cryptography is thousands of years old. Techniques used for cryptography Substitution In substitution we replace each letter in the message with another to make the message non-understandable. For example, each letter “a” in the message can be replaced with letter “d” and letter “b” with letter “e” and so on. Transposition It is based on scrambling the characters in a message. A transposition system may first write a message into a table row by row then the message can be read and rewritten column by column to make it scrambled.
Question No: 22 ( Marks: 10 ) Analyze the following given code showing some Cascading Style Sheets tags and explain its lines one by one.
<html>
<head>
h1 {text-decoration: overline}
h2 {text-decoration: line-through}
h3 {text-decoration: underline}
a {text-decoration: none}
<body>
This is header 1
This is header 2
This is header 3
This is a link
MIDTERM EXAMINATION
Spring 2010
IT430- E-Commerce (Session - 6)
Solved
Question No: 1 ( Marks: 1 ) - Please choose one
Academic institutions, religious organizations and government using --------------------- e-commerce
classification
► Business-to-Business(B2B)
► Intra Business
► Non Business EC (page 2)
► Business-to-consumer(B2C)
Question No: 2 ( Marks: 1 ) - Please choose one
In which protocol, the messages are not deleted from email server.
► SMTP
► POP3
► IMAP (page 18)
► ICMP
in case of IMAP the message is not deleted in the email server and thus can be reopened from another
location/machine.
Question No: 3 ( Marks: 1 ) - Please choose one
What is the correct HTML tag for adding a background color?
► <background>yellow</background>
► <body bgcolor="yellow"> (page 47)
► <body color="yellow">
► None
Question No: 4 ( Marks: 1 ) - Please choose one
Which HTML tag is used to define an internal style sheet?
► <css>
► <script>
► <style> (Ans)
► <sheet>
reference
http://www.ex-designz.net/test_grade.asp?tid=37 (question no 3)
Question No: 5 ( Marks: 1 ) - Please choose one
What is the correct HTML for making a hyperlink?
► <a href="http://www.w3schools.com">W3Schools</a>
► <a name="http://www.w3schools.com">W3Schools.com</a>
► <a url="http://www.w3schools.com">W3Schools.com</a>
► <a>http://www.w3schools.com</a>
REFERENCE
http://www.w3schools.com/html/html_links.asp
Question No: 6 ( Marks: 1 ) - Please choose one
If we leave out the target attribute in frame tag and link was clicked ,the document loads into the
window
► In Same page (repeated )
► In other blank page.
► To display browser error.
► All of the options.
Question No: 7 ( Marks: 1 ) - Please choose one
What does mean by != comparison operator? http://www.vustudents.net
► Equal to
► Not
► Equal
► Not Equal (page 58)
Question No: 8 ( Marks: 1 ) - Please choose one
What does the string. match (“abc”) object do?
► Concatenates the “abc” word to other “abc” words
► Matches the “abc” words with other “abc” words
► It does replacement of abc word with other words
► All of the above
ref
http://www.regular-expressions.info/reference.html
Question No: 9 ( Marks: 1 ) - Please choose one
var txt="Hello World!" Document. Write (txt.length), it would return the length as.
► 10
► 11
► 12
► 13
REFERENCE
http://www.w3schools.com/js/js_obj_string.asp
Question No: 10 ( Marks: 1 ) - Please choose one
Which of the following property falls in HTTP?
►Stateless (Ans)
► Stateful
► Temporary
► All of these
Question No: 11 ( Marks: 1 ) - Please choose one
Which one of the following certifies the binding between public key and its owner.
►CA (page101)
► KDC
► TLS
► Firewall
Question No: 12 ( Marks: 1 ) - Please choose one
Cyclical Redundancy Check (CRC), takes place in which layer of OSI Model.
► Session Layer
► Transport Layer
► Network Layer
► Data link layer (page 6)
Question No: 13 ( Marks: 1 ) - Please choose one
How can you convert information consisting of comma separated values into an array?
► txtArray = txt.indexOf(',');
► txtArray = txt.split(','); page 70
► txtArray = txt.trim(',');
► txtArray = txt.substring(',');
Question No: 14 ( Marks: 1 ) - Please choose one
The control statement on a while loop is tested
► before each time through the loop
► after each time through the loop
► once at the start
► once at the end
Ref
http://en.wikipedia.org/wiki/While_loop
Question No: 15 ( Marks: 1 ) - Please choose one
Which SQL statement is used to delete data from a database?
► DELETE (page 83)
► COLLAPSE
► REMOVE
► DISCARD
Question No: 16 ( Marks: 1 ) - Please choose one
A program that performs a specific function such as creating invoices/bills or processing payment
received from customers is called a/an ---------------.
► Middleware
► Web Service
► CRM Software
► Appplication Program (page 92)
Question No: 17 ( Marks: 1 ) - Please choose one
Which firewall uses strong user authentication to verify identity of a host attempting to connect to the
network?
► Packet filter firewall
► Circuit level firewall
► Application gateway firewall (page 96)
► Hybrid firewall
Question No: 18 ( Marks: 1 ) - Please choose one
In what form are style rules presented?
► Selector { property: value }
► selector { property= value }
► selector ( property: value )
► selector ( property= value )
Question No: 19 ( Marks: 1 ) - Please choose one
Why we use reset tag in HTML?
► To remove the text written in Notepad.
► To remove the text written in between <body> and </body>tag.
► To remove the text written in between <head> and </head> tag.
► To remove the text written in between <form> and </form> tag.
Reference
http://www.echoecho.com/htmlforms13.htm
Question No: 20 ( Marks: 1 ) - Please choose one
When data moves upward in the OSI stack it is called
► Encapsulation
► De-encapsulation (page 5)
► Synchronization
► None of these
Question No: 21 ( Marks: 2 )
What does PPTP stand for?
Ans (�page98)
PPTP stands for point to point transfer protocol.
Question No: 22 ( Marks: 2 )
What are the keywords to define a variable and a function in JavaScript?
“var” is the keyword used to define a variable in Javascript
e.g var a; “function” is the keyword to define a function in javascript
e.g function myfunction(){ // some code }
Question No: 23 ( Marks: 3 ) http://www.vustudents.net
Identify the object, property and method in the following:
Math.sin(45)
Math.PI
Ans:
Math is the object in above case
PI is the property of Math object
Sin() is the method of Math object
Question No: 24 ( Marks: 3 )
Performance of web servers can be evaluated mainly on the basis of two factors. What are they?
Ans:
Performance of web sever
Performance of web servers can be evaluated mainly on the basis of two factors:
Throughput, which is the number of http requests that a particular server hardware and software can
handle in the unit time; and
Response time, which is the amount of time a web server requires to process one request. Web server
hardware architectures
Question No: 25 ( Marks: 5 )
Write the code for a web page displaying a button named "Testing". After clicking that button an alert
should be displayed saying "The test is successful".
<html> <head> <script type="text/javascript"> function sndAlert() { window.alert("The test is successful!!!"); } </script> </head> <body> <FORM NAME="form1"> <INPUT TYPE="Button" name="showAlert" VALUE="Show Alert" onclick="sndAlert()"> </FORM> </body> </html> Question No: 26 ( Marks: 5 )
What is the difference between an interpreted and a compiled language? Give one example of each.
http://www.vustudents.net
Ans:
In a compiled language we compile to code or convert into machine language using a software called
compiler as we can case C++
Example C++
with interpret language we interpret the code (line by line) at run time using a program called
interpreter browser is an interpreter.
Example Browser…
MIDTERM EXAMINATION
Spring 2009
IT430- E-Commerce (Session - 2)
Question No: 1 __ ( Marks: 1 ) - Please choose one
Enable Virtual private network protocol (VPN) to become a part of
Extranet .(page 98)
Intranet.
Extranet and Intranet.
None of these.
Question No: 2 ( Marks: 1 ) - Please choose one
Content pages relate to which of the following tag?
<iframe>
<Frame>
<frameset> (page 31)
<noframes>
Question No: 3 __ ( Marks: 1 ) - Please choose one
The attributes used by <EMBED . . .> depend on the type of ?
plugin being used
Browser being used (page 38)
ISP being used
Sound/movie being used
Question No: 4 ( Marks: 1 ) - Please choose one
Which of the following is HML tag could n’t be used as CSS tag?
<style>
<h1>
<p>
<a> (page 39)
css coding
<HTML><HEAD>
<STYLE TYPE="text/css">
<!--
H1 { color: blue }
-->
</STYLE>
</HEAD><BODY>
<H1> A blue header </H1>
</BODY></HTML>
H1 { color: blue;
text-align: center; }
H1 { color: blue; text-align: center; }
<STYLE TYPE="text/css">
<!--
.myIndent { margin-left: 1.0in }
-->
</STYLE>
The HTML tags to reference the above .myIndent class is:
<H1 CLASS=myIndent>Indented Header</H1>
<P CLASS=myIndent>Also this whole paragraph would
be indented one inch</P>
<P>but this wouldn't be indented</P>
Question No: 5 ( Marks: 1 ) - Please choose one
Which CSS tag is used to place an image that would remain when user scrolls down or
up the page?
background-attachment: fixed (page 48)
background-attachment: scroll
background-attachment: up
__ _ ___ _ ___ __
Question No: 6___( Marks: 1 ) - Please choose one
What does mean by != comparison operator?
Equal to Not
Equal
Not Equal (page 58)
Question No: 7 ( Marks: 1 ) - Please choose one
For which of following purpose the Firewall is used ?
Efficient working
None of these
Protection against security attacks (page 96)
Networking purpose
Question No: 8 ( Marks: 1 ) - Please choose one
Which one of the following certifies the binding between public key and its owner.
CA (page 101)
KDC
TLS
Firewall
Question No: 9 __ ( Marks: 1 ) - Please choose one
Choose the correct HTML tag to make a text bold
<tbold>
<b> (page 19)
<bld>
<bold>
ref http://www.w3schools.com/quiztest/quiztest.asp?qtest=HTML
Question No: 10 __ ( Marks: 1 ) - Please choose one
Middleware establishes connections between ----------- .
e-commerce software and accounting system (page 92)
e-commerce software and web services web
services and CRM software
ERP and CRM software
Question No: 11 ( Marks: 1 ) - Please choose one
Firewall is used to
I - examin the data entering the network
II - examin the data leaving the network
III - filter the data according to certain rules
I and II only
I, II and III (page 96)
I and III only
I only
Ref http://www.webopedia.com/TERM/F/firewall.html
Question No: 12 ( Marks: 1 ) - Please choose one
When two or more intranets are connected to each other they form a/an ----------
VPN
intranet
internet
extranet (page 2)
Question No: 13 __ ( Marks: 1 ) - Please choose one
Which one specify the amount of space between the edges of the cell and the text inside?
Space tag
CELLSPACING
CELLPADDING
FRAMESPACING
Question No: 14 ( Marks: 1 ) - Please choose one
Which of the following CANNOT be a value for the 'target' attribute in anchor tag?
_new
_top
_blank
_self
ref
• _blank renders the link in a new, unnamed window
• _self renders the link in the current frame (useful for overriding a BASE TARGET)
• _parent renders the link in the immediate FRAMESET parent
• _top renders the link in the full, unframed window
Question No: 15 ( Marks: 1 ) - Please choose
one In what form are style rules presented?
selector { property: value }
selector { property=value }
selector ( property: value )
selector ( property= value )
Question No: 16 __ ( Marks: 1 ) - Please choose one
What is identified by the tag <FRAMESET COLS="20%,60%,20%">?
Horizontal frame
Vertical Frame (page 31)
Top Frame
Bottom Frame
Question No: 17 __ ( Marks: 1 )
What it stands for (W3C)?
Answer
World Wide Web Consortium
Question No: 18 ( Marks: 1 )
Do you agree or not that using Cascading Style Sheets one can apply an image to sections of one’s
page or even to individual words.
Question No: 19 ( Marks: 2 )
Which attribute is used to describe , how many times you want the sound to repeat. Discuss briefly.
Question No: 20 __ ( Marks: 3 )
What are cookies? Why these are used in web development?
Question No: 21 ( Marks: 5 )
What is the difference between physical address and logical address? Support your answer with
at least two examples.
Question No: 22 ( Marks: 10 )
How can we change a Font style of a text? Write complete tag by using an example by yourself.
E-Commerce
Quiz No.1
Lecture 10 to 16 Repeated MCQs ignored
var txt="Hello World!" document.write(txt.length), it would return the length as.
Select correct option:
13
12
11
10
__________ is an event handler in JavaScript.
None of the given
onloading
onpress
onbuttondown
In Java script , New key word is used to create:
Instance of method
Instance of Object
Initialize the Variable
Assign the vale of object
Border-style: specifies the style of all borders in the order _________________.
border top style, border right style, border bottom style, border left style
border top style, border left style, border bottom style, border right style
border bottom style, border right style, border top style, border left style
border top style, border bottom style, border bottom right, border left style
Which is NOT a correct name for an XML element?
<Note>
<1dollar>
All 3 tags are incorrect
<h1>
___________ is a valid JavaScript variable.
first_name
2nd_name
third name
*lastname*
_________ is not a comparison operator.
>
<
!=
=
In CSS, how do you make the text bold?
font:b
font-style:bold
font-size:bold
font-weight:bold
_______________ will display the border having top border = 10 pixels, bottom border =
5 pixels, left border = 20 pixels and right border = 1 pixel.
border-width:10px 1px 5px 20px
border-width:5px 1px 10px 20px
border-width:10px 20px 5px 1px
border-width:5px 20px 10px 1px
The control statement on a while loop is tested
once at the start
after each time through the loop
once at the end
before each time through the loop
The first control statement in a for loop usually
increments a counter
sets the termination condition
creates a control variable
All of the given
How does a "for" loop start?
for i = 1 to 8
for (i = 0; i <= 8)
for (i = 0; i <= 8; i++)
for (i <= 8; i++)
_________ will refer to an external script called "xyz.js".
<script file="xyz.js">
<script link="xyz.js">
<script src="xyz.js">
<script name="xyz.js">
For which of the following, XSL is the recommended as style sheet language?
HTML
XML
HTML and XML
XSLT
border-color: specifies the color of all borders in the order________________.
border right color, border bottom color, border left color, border top color
border top color, border right color, border bottom color, border left color
border top color, border bottom color, border right color, border left color
border bottom color, border top color, border left color, border right color
What is a correct way of referring to a stylesheet called "mystyle.xsl" ?
<?xml-stylesheet type="text/xsl" href="mystyle.xsl" ?>
<link type="text/xsl" href="mystyle.xsl" />
<stylesheet type="text/xsl" href="mystyle.xsl" />
<?stylesheet type="text/xsl" href="mystyle.xsl" ?>
Constructor is defined as the initializing function used to create…........
Instance / copy of object
copy of object
Instance of object
shallow copy of object
The second control statement in a for loop usually
increments a counter
sets the termination condition
creates a control variable
none of the given
Border-width: specifies the width of all borders in the order ______________.
border right width, border bottom width, border left width, border top width
border top width, border right width, border bottom width, border left width
border bottom width, border left width, border top width, border right width
border bottom width, border top width, border left width, border right width
What is the correct HTML for adding a background color?
<background>yellow</background>
<body color="yellow">
<body bgcolor="yellow">
<bgcolor>yellow</bgcolor>
__________ is a Java script comment.
//comment
%comment
$comment
*comment*
Date () is the -------------------- of the date object which provides current date of the
system.
method
property
constructor
Destructor
Left margin of an element can be changed using _________.
padding:
margin:
margin-left:
text-indent:
In case mouse moves over a link, ________ event will be detected.
onMouseOver
onRollOver
overMouse
All of the given
CSS definitions can be written in __________ to define the styles for entire site.
Body section
Head section
Text file
Anywhere in the web page
Correct javascript code for writing "hello world" is _______________.
document.write("hello world")
write("hello world")
response.write("hello world")
None of the given
Which of the following is HTML tag could not be used as CSS tag?
<h1>
<style>
<a>
<p>
We put the JavaScript in the following ___________ html element.
<script>
<javascript>
<js>
<java_script>
What is the correct HTML for making a text input field?
<input type="textfield">
<input type="text">
<textfield>
<textinput type="text">
i++ means ________.
i=i+i
i=i+1
i=i+2
i=1+1
What is the correct JavaScript syntax to insert a comment that has more than one line?
/*This comment has more than one line*/
/#This comment has more than one line#/
<!--This comment has more than one line-->
none of the given
In what form style rules are presented?
selector { property= value }
selector ( property: value )
selector { property: value }
selector ( property= value )
__________ is an invalid JavaScript variable.
3rd_name
first_name
secondName
$myName
!= comparison operator means __________.
Equal to
Not equal to
Greater than
None of the given
Actions that can be detected by javascript are called _____________. (Chose best
suitable option)
Events
Functions
Methods
Hyper links
Which statement is true?
All XML documents must have a DTD
All XML elements must be lower case
All the statements are true
All XML elements must be properly closed
charAt() is the function/method of
String object
Date object
Time object
Array object
<span> is used to apply style to ___________.
text
image
frames
webpage
Which loop type always runs the enclosed code at least once
do while
for
while
none of them
The conditional statement "i is not equal to 5" can be written as _____________.
if (i<>5)
if (i != 5)
if (i not equal to 5)
if (i ! 5)
________ is not a data type in java script.
int
float
string
null
_________ object’s properties and functions are accessible every where.
Local
Global
Predefined
All of the given
In java script "alert" function displays ________.(Chose best suitable answer)
Popup window
Web page
Task bar
Menu bar
What does DTD stand for?
Do The Dance
Dynamic Type Definition
Data Type Definition
Direct Type Définition
Which of the following is NOT an advantage of CSS?
Define the look of your pages in one place
Works on version 4 browsers or newer
Easily change the look
Implement same formatting each time tag is used.
_________ tag is used to control the layout of different elements.
css
style
span
None of the given
Style sheets can be used in a web page using ________ method/s.
Inline
Embedded
Document level and external
All of the given
JavaScript can be placed in __________.
Head section
Body section
Both of the given
None of the given
The conditional statement "i is equal to 5" can be written as _____________.
if (i == 5)
if (i = 5)
if (i is equal to 5)
if (i <> 5)
Who is making the Web standards?
International Standard Organization
ANSI
Microsoft
The World Wide Web Consortium
Variables in java script can begin with _____________.
dolloar sign
lower case letter
under score character
All of the given
What value is returned by getMonth in April?
2
3
4
5
___________ is NOT an attribute of border.
border-pattern
border-style
border-bottom-color
border-width
Code: JavaScript var a = ["v","i","r","t", "u", "a", "l"]; document.write(a.join("-")); What
would be the output of the above code fragment?
virtual
virtual-
v:i:r:t:u:a:l
v-i-r-t-u-a-l
What does XML stand for?
eXtra Modern Link
X-Markup Language
eXtensible Markup Language
Example Markup Language
Padding is the space between __________.
Two tables
Two borders
Content and border
Border and window
Which one of the following is the correct HTML tag for making a drop-down list?
<input type="list">
<input type="dropdown">
<select>
<list>
Which you will NOT be able to do with CSS?
Add text
Position the content
Define the look of your pages in one place
Change the background color
What is the correct HTML for making a hyperlink?
<a href="http://www.w3schools.com"> W3Schools</a>
<a name="http://www.w3schools.com"> W3Schools.com</a>
<a url ="http://www.w3schools.com"> W3Schools.com </a>
<a>http://www.w3schools.com</a>
1. _________ attribute indicates the unique field name for a checkbox.
• Type • Name • Input • Value 2. In HTML, depending upon which tag is used, the enclosed content can then have Specific effect Style Format Specific effect, style and format 3. Which of the following is true for selection list? <select name="field name" size="no. of items"> <select "name=field name" size="no. of items"></select> <select name="field name" size="no. of items"></select> None of the above 4. List tag used in html is ______ Paired Unpaired Single None of the given options 5. Which of the following is HTML tag could not be used as CSS tag? <h1> <style> <a> <p>
6. What is identified by the tag? Horizontal frame Bottom Frame Top Frame Vertical Frame 7. HTML documents are connected with each other by ________. Big Tag Small Tag Link Tag None of the given options 8. The web addresses are first translated into IP address through ________ SMTP HTML IPV6 DNS
9. In Style sheets, how do you change the text color of an element? color: text-color= text-color: font-color:
10. ________ is used to interpret and show contents of the web page. • HTML • Notepad • Browser • Computer
11. A _________ is a web page populated with text boxes, drop-down lists and commands buttons to get information from the user. • Hypertext Link • Form • Table • Button
12. Which of the following is NOT an advantage of CSS? • Define the look of your pages in one place • Works on version 4 browsers or newer • Easily change the look • Implement same formatting each time tag is used.
13. Links are used to connect ____________. • Images • Text • Images and web documents • All of the given 14. When a visitor clicks a _________, the entries in form are set to the default values. • Button • Radio Button • Submit Button • Reset Button 15. Which of the following are correct tags used for frames, • <Frame></Frame> • <Frameset><Frame></Frame></Frameset> • <Frameset><Frame></Frameset> • <Frameset><Frame></Frame> 16. question_2you: if you have a less space for e-mails on internet then _________ protocol is used. • SMTP • IMAP • POP • POP3
17. _____________ are normally used to get yes/no or true/false information from a reader. • Check Boxes • Radio buttons • Submit Buttons • Selection List 18. Default web page background color is __________. • Green • Red • White • Blue 19. _____________ are normally used to get yes/no or true/false information from a reader. • Check Boxes • Radio buttons • Submit Buttons • Selection List 20. Which of the following is NOT valid HTML code line? • <frameset rows="16%,84%"> • <frameset columns="16%,84%"> • <frameset cols="100,150"> • <frameset cols="50%,50%" rows="16%,84%"> 21. What is the meaning of SRC in frame tag? • Source for image saved on your disk • Source for images saved on your disk • Source of page saved on your disk • Source of Pages saved on your disk 22. In what form style rules are presented? • selector { property= value } • selector ( property: value ) • selector { property: value } • selector ( property= value ) 23. __________ is the code for blank space in HTML. • ‘ • • ‚ • ¡ 24. Which CSS property controls the text size? • font-style • font-size • text-style • text-size 25. Which HTML tag is used to define an internal (embedded) style sheet? • CSS • Text / Style
• Style • Script 26. Meta Data is important for easier ____________. • Web page creation • Web site upload • Web page search through search engine • None of the above 27. Which HTML attribute is used to define inline styles? • Styles
• Text
• Style
• CSS
29. Which attribute can be used to make a region non-clickable? • Alt • Target • nohref • none of the given 31. With _________, you can display more than one Web page in the same browser window. • Forms • Frames • Post Action • Java Scripts 32. In CSS, how do you make the text bold? • font:b • font-size:bold • font-weight:bold • FTP • Telnet • none 33. Which of the following is used for web page requests? • HTTP 34. Which of the following provides an interface & series for file transfer over the network? • HTTP • FTP • Telnet • None 35. __________________ connects a local computer with a remote computer. • SMPT • VPN • Telnet
• none 36. Which of the followings provide e-mail services on the internet? • MAC • Telnet • none
37. ________________ is connectionless transport protocol. • SMPT • SMPT • TCP • UDP • MAC
38. ___________ is connection-oriented transport protocol. • SMPT • TCP • UDP • MAC 39. Public Key of the receiver is used to-------------------. a. Decrypt the message b. Encrypt the message c. Scramble the message d. None of the mentioned options 40. Receiver applies ----------------to the received original message • Digital signature • Message digest • Hash function • None of the mentioned options 41. Symmetric key can be replaced with----------------------------. • Symmetric algorithms • Pair of public and private keys • Asymmetric key • None of the mentioned options 43. Most of the electronic payment systems on internet use ------------------to ensure confidentiality and security of the payment information. • Quantum computing • Cryptography • Both of the mentioned options • None of the mentioned options 44. Simplicity and ----------------is the biggest advantage of Virtual PIN payment system. • Full encryption • Dual encryption • No encryption • None of the mentioned options 46. An electronic check book device is a combination of • Hardware and a digital signature • Software and information about user
• Secure hardware and software • None of the mentioned options 47. Which of the following is disadvantage of virtual PIN payment system? • Bogus purchases are possible • Stolen credit card number can be used • Only some extra copies of the information items are made in case of a fraud • All of the mentioned options are disadvantages of Virtual PIN payment system 48. FV stands for • Forward Virtual • Famous virtual • None of the mentioned options • First Virtual 50. In the statement var myAr = new Array (60); what does the number 60 represent? • The value assigned to the 1st element in the array • The number of elements to be used in the array • The number of dimensions created in a multi-dimensional arra • All 51. Which of the following is the valid syntax for initialization of a string object? • Var Girl = "salmanoreen" • Girl = new string( "salmanoreen") • Var Girl = new string( "salmanoreen") • Var Girl = new Girl( "salmanoreen") 52. Identify that machine which services the internet request? • Web client • Web server • Browser • Mozilla
ITA430 Solved Quizzes BY
http://vustudents.ning.com
An agent is a software program that is _____
Select correct option:
Triggers by human
Not capable of autonomous action.
Capable of autonomous action in its environment in order to meet its objectives
None
ASP runs best on ________.
Select correct option:
Internet information Software
Intranet Information Software
Intranet Information Server
Internet Information Server
What is/are the methods to track the customer.
Select correct option:
Database
Cookies
Hidden Fields
All
Large companies establish connections between their e-commerce software and their existing accounting system by using a type of software called
__________.
Select correct option:
Shareware
Freeware
Middleware
None
Question # 5 of 10 ( Start time: 01:55:19 AM ) Total Marks: 1
Password attacks are basically a result of _____
Select correct option:
Back door
Sniffing
Eavesdropping
None of the Above
Question # 6 of 10 ( Start time: 01:56:03 AM ) Total Marks: 1
Caching ______.
Select correct option:
have no effect on downloading of the page
saves the time of downloading the page
increase the time of downloading the page
None of Above
Question # 7 of 10 ( Start time: 01:56:58 AM ) Total Marks: 1
. A program that performs a specific function such as creating invoices/bills or processing payment received from customers is called _______.
Select correct option:
Firewall
Application program
Protocol
Web Services
Question # 8 of 10 ( Start time: 01:57:54 AM ) Total Marks: 1
Programs that work with the browser to enhance its capabilities.
Select correct option:
Driver
Flash
PlugIn
None of Above
Question # 9 of 10 ( Start time: 01:58:10 AM ) Total Marks: 1
Agents can be used for _____
Select correct option:
Comparisons
Filtering
Web crawling
All
Question # 10 of 10 ( Start time: 01:58:53 AM ) Total Marks: 1
secure, dedicated point to point connection over the internet ______.
Select correct option:
Metropolitan area Network
Local area Network
Wide Area Network
Virtual Private Network
Question # 7 of 10 ( Start time: 04:06:28 PM ) Total Marks: 1 Branch to headquarter network _____. Select correct option: APN VPN NPV PNA ERP Stands for Select correct option: Entrepreneur Resource Planning Enterprise Rescue Planning Enterprise Resource Program Enterprise Resource Planning
Enterprise Resource Planning Enterprise Resource Planning (ERP) is a concept that integrates all aspects of a business e.g, accounting, logistics, manufacturing, marketing, planning, project management etc. at a single place. An ERP system such as SAP is expensive. E-commerce sites/software has to fully integrate with ERP software, wherever it is used. Enterprise Resource Planning (ERP) is a concept Select correct option: That integrates some aspects of business, at many locations. That integrates all aspects of a business at a single place. That integrates some aspects of business, at some locations. That integrates all aspects of business, at many locations. Proxy Server can _____. Select correct option: Speed up the processing of http requests by caching web pages Translate HTTP request between trusted and un trusted network Can also act as a firewall filtering requests for certain web pages All of Above Extranet formed when ____. Select correct option: When two or more internet is connected to each other. When two or more WAN are connected to each other. When two or more intranets are connected to each other. When two or more LAN is connected to each other. secure, dedicated point to point connection over the internet ____. Select correct option: Metropolitan area Network Local area Network Wide Area Network Virtual Private Network Plug in is ______. Select correct option: Program that make the computer server. Programs that work with the browser to enhance its capabilities.
Program that communicate with the client from the server. None of Above ERP example is __ Select correct option: PAS DBMS SAP ASP Performance of the web server measured in ___. Select correct option: A - Throughput B - Response Time A & B None of Above Throughput is _________. Select correct option: No of instruction a server execute in one second. No of session a server handle. No of http request that a web server can handle. None of Above Throughput, which is the number of http requests that a particular server hardware and software can handle in the unit time; and Select correct option: Internet information Software Intranet Information Software Intranet Information Server Internet Information Server Agents can be used for ___ Select correct option: Comparisons Filtering Web crawling All An agent is a software program that is capable of autonomous action in its environment in order to meet its objectives. Agents can be used for comparisons, filtering, web crawling, auctions etc. For example, there may be buyer agents and seller agents each with their goals and constraints. They can negotiate deals on behalf of the users. Agents can monitor health indicators and alert the individuals under given conditions.
Large companies establish connections between their e-commerce software and their existing accounting system by using a type of software called ________. Select correct option: Shareware Freeware Middleware None Large companies establish connections between their e-commerce software and their existing acco system by using a type of software called Middleware which is a part of e-commerce software package CERT _________. Select correct option: Computer Elegant Response Time Computer Emergency Response Time Computer Efficient Response Time Computer Enter Response Time Computer Emergency Response Time (CERT) Systems Administrator, Audit, Network and Security Institute (SANS Institute) The best response that the experts have come up with to tackle the security issue is in terms of cryptography. SANS stands for _____. Select correct option: System Administration, Authentication, Network and Security Institute Software Authentication, Audit, Network and Security Institute Systems Administrator, Audit, Network and Security Institute None of Above Application gateway firewall operate at ____. Select correct option: A -Session Layer B - Network Layer A & B None of Above
It operates at application layer of the OSI Model. It uses strong user authentication to verify identity of a host attempting to connect to the network using application layer protocols such us FTP. In contrast to packet filter firewall, it filters the requests rather than packets entering/leaving the network. It can block any outgoing HTTP or FTP requests. Select correct option: Time a server take to process one request. Time a server take to process all the request. Time a server take to process some request. Time a server take to process ten request HTTP is a _____. Select correct option: State Oriented Stateless A&B None of Above What is/are the methods to track the customer. Select correct option: Database Cookies Hidden Fields All DoS stand for _______. Select correct option: Disk Operating System Denial of Services Do or stand Disk out System What is web serve? Select correct option: Computer that delivers (serves up) web pages Computer that is big Computer that is Fast None of Above
One Tier Architecture __________. Select correct option: The entire processing may take place at individual terminal. The entire processing may take place at different terminal. The entire processing may not take place at individual terminal. None of Above In 1-tier architecture, the entire processing takes place at a single place/zone. Password attacks are basically a result of ___ Select correct option: Back door Sniffing Eavesdropping None of the Above Such attacks are basically a result of eavesdropping through which the hacker is able to know the account ID or password of a particular user. Then using it the hacker gains access to the network and gather information such as user names, passwords, computer names, resources etc. That can lead to modification, deletion or rerouting of network data. Self hosting ____. Select correct option: Companies may opt to run a server in house Companies may not opt to run a server in house Companies may opt rent server None of Above An agent is a software program that is ___ Select correct option: Triggers by human Not capable of autonomous action. Capable of autonomous action in its environment in order to meet its objectives None An agent is a software program that is capable of autonomous action in its environment in order to meet its objectives. Agents can be used for comparisons, filtering, web crawling, auctions etc.
For example, there may be buyer agents and seller agents each with their goals and constraints. They can negotiate deals on behalf of the users. Agents can monitor health indicators and alert the individuals under given conditions. IDS Stands for _______. Select correct option: Intrusion Defense System Intervention Detection System Intervention Defense System Intrusion Detection System In distributed denial of service attack, the compromised system itself is used as a source for further attacks. The use of firewalls and a proper Intrusion Detection System (IDS) can minimize Can not block any outgoing HTTP or FTP requests Can block any outgoing HTTP but not FTP requests Can not block any outgoing HTTP but FTP requests Can block any outgoing HTTP or FTP requests Application gateway firewall It operates at application layer of the OSI Model. It uses strong user authentication to verify identity of a host attempting to connect to the network using application layer protocols such us FTP. In contrast to packet filter firewall, it filters the requests rather than packets entering/leaving the network. It can block any outgoing HTTP or FTP requests. Caching ____. Select correct option: have no effect on downloading of the page saves the time of downloading the page increase the time of downloading the page None of Above
Worms have the characteristics; Select correct option: Can replicate it Have the capability to travel without any help or human action Can spread from computer to computer All Branch to headquarter network _____. Select correct option: APN VPN NPV PNA mote access capabilities to a compromised machine. Select correct option: Back Doors Virus Worms Trapdoors Back Doors are those hostile programs which, when run on a machine, install hidden services in order to give attackers remote access capabilities to a compromised machine. Trojan horses are those programs that appear harmless but actually have some malicious purpose.
E-commerce Site must provide ______. Select correct option: Transaction processing Shopping cart capabilities A catalog display All of the above
Circuit level firewall operate at the ______. Select correct option: Data Link Presentation Network Transport
It is quite similar to the packet filter firewall. It also works on the basis of a set of rules for filtering packets but operates at the transport layer of the OSI Model so has greater functionality. As a rule, the higher the layer of OSI model where a firewall operates, the more sophisticated is the firewall. It can make packets sent from internal network to a destination outside the firewall appear as if they originated at the firewall. Thus
information regarding hosts on the internal network remains secret. It can also determine whether TCP/IP connection between a host and a machine outside firewall has been properly established. Thus it can cut off any connection which has been hijacked by a hacker trying to pass through the firewall.
Those hostile programs which, when run on a machine, install hidden services in order to give attackers remote access capabilities to a compromised machine. Select correct option: Back Doors Virus Worms Trapdoors
Front end consist of ______. Select correct option: Information which invisible to the user and he can interact with the same through some interface. Information which visible to the user and he can no t interact with the same through some interface. Information which visible to the user and he can interact with the same through some interface. Information which is hidden.
Asp, JSP, PHP ? Select correct option: Server Side Scripts Client Side Script A & B None of Above
SANS stands for _______.
Select correct option:
System Administration, Authentication, Network and Security Institute
Software Authentication, Audit, Network and Security Institute
Systems Administrator, Audit, Network and Security Institute
None of Above
Proxy Server can _______.
Select correct option:
Speed up the processing of http requests by caching web pages
Translate HTTP request between trusted and un trusted network
Can also act as a firewall filtering requests for certain web pages
All of Above
Response time ________.
Select correct option:
Time a server take to process one request.
Time a server take to process all the request.
Time a server take to process some request.
Time a server take to process ten request
attacks are basically a result of _____
Select correct option:
Back door
Sniffing
Eavesdropping
None of the Above
IDS Stands for _________.
Select correct option:
Intrusion Defense System
Intervention Detection System
Intervention Defense System
Intrusion Detection System
Question # 8 of 10 ( Start time: 02:45:30 PM ) Total Marks: 1
ASP runs best on ________.
Select correct option:
Internet information Software
Intranet Information Software
Intranet Information Server
Internet Information Server
Plug in is ________.
Select correct option:
Program that make the computer server.
Programs that work with the browser to enhance its capabilities.
Program that communicate with the client from the server.
None of Above
Question # 10 of 10 ( Start time: 02:47:59 PM ) Total Marks: 1
It occurs when a customer clicks at checkout or confirm order button and is subjected to some payment _______.
Select correct option:
Transaction Processing
E cash System
E Funds system
None of Above
In this type of attack the hacker has the ability to monitor network traffic using some kind of network monitoring software. Select correct option: Snooping Sniffing Eavesdropping All of Above
Eavesdropping/ sniffing/snooping
In this type of attack the hacker has the ability to monitor network traffic using some kind of networkmonitoring
software. For example, a hacker may install some backdoor or Trojan horse that can monitor
the key strokes of a user w
we were wrong only master mind was right
hile typing and send the typed information to the hacker.
Processing of HTML code on the Client Side and web page request on the server. Select correct option: One Tier Architecture Two Tier Architecture Three Tier architecture N tier Architecture
Example of 2-tier architecture is where
processing of HTML code takes place on the client side and the web page request is processed on the server
In this type of attack the hacker has the ability to monitor network traffic using some kind of network monitoring software. Select correct option: Snooping Sniffing Eavesdropping All of Above
Eavesdropping/ sniffing/snooping
In this type of attack the hacker has the ability to monitor network traffic using some kind of networkmonitoring
software. For example, a hacker may install some backdoor or Trojan horse that can monitor
the key strokes of a user
1. _________ attribute indicates the unique field name for a checkbox. • Type • Name • Input • Value 2. In HTML, depending upon which tag is used, the enclosed content can then have Specific effect Style Format Specific effect, style and format 3. Which of the following is true for selection list? <select name="field name" size="no. of items"> <select "name=field name" size="no. of items"></select> <select name="field name" size="no. of items"></select> None of the above 4. List tag used in html is ______ Paired Unpaired
Single None of the given options 5. Which of the following is HTML tag could not be used as CSS tag? <h1> <style> <a> <p>
6. What is identified by the tag? Horizontal frame Bottom Frame Top Frame Vertical Frame 7. HTML documents are connected with each other by ________. Big Tag Small Tag Link Tag None of the given options 8. The web addresses are first translated into IP address through ________ SMTP HTML IPV6 DNS 9. In Style sheets, how do you change the text color of an element? color: text-color= text-color: font-color:
10. ________ is used to interpret and show contents of the web page. • HTML • Notepad • Browser • Computer
11. A _________ is a web page populated with text boxes, drop-down lists and commands buttons to get information from the user.
• Hypertext Link • Form • Table • Button
12. Which of the following is NOT an advantage of CSS? • Define the look of your pages in one place • Works on version 4 browsers or newer • Easily change the look • Implement same formatting each time tag is used.
13. Links are used to connect ____________. • Images • Text • Images and web documents • All of the given 14. When a visitor clicks a _________, the entries in form are set to the default values. • Button • Radio Button • Submit Button • Reset Button 15. Which of the following are correct tags used for frames, • <Frame></Frame> • <Frameset><Frame></Frame></Frameset> • <Frameset><Frame></Frameset> • <Frameset><Frame></Frame> 16. question_2you: if you have a less space for e-mails on internet then _________ protocol is used. • SMTP • IMAP • POP • POP3 17. _____________ are normally used to get yes/no or true/false information from a reader. • Check Boxes • Radio buttons • Submit Buttons • Selection List 18. Default web page background color is __________. • Green • Red • White • Blue
19. _____________ are normally used to get yes/no or true/false information from a reader. • Check Boxes • Radio buttons • Submit Buttons • Selection List 20. Which of the following is NOT valid HTML code line? • <frameset rows="16%,84%"> • <frameset columns="16%,84%"> • <frameset cols="100,150"> • <frameset cols="50%,50%" rows="16%,84%"> 21. What is the meaning of SRC in frame tag? • Source for image saved on your disk • Source for images saved on your disk • Source of page saved on your disk • Source of Pages saved on your disk 22. In what form style rules are presented? • selector { property= value } • selector ( property: value ) • selector { property: value } • selector ( property= value ) 23. __________ is the code for blank space in HTML. • ‘ • • ‚ • ¡ 24. Which CSS property controls the text size? • font-style • font-size • text-style • text-size 25. Which HTML tag is used to define an internal (embedded) style sheet? • CSS • Text / Style • Style • Script 26. Meta Data is important for easier ____________. • Web page creation • Web site upload • Web page search through search engine • None of the above
27. Which HTML attribute is used to define inline styles? • Styles
• Text
• Style
• CSS
29. Which attribute can be used to make a region non-clickable? • Alt • Target • nohref • none of the given 31. With _________, you can display more than one Web page in the same browser window. • Forms • Frames • Post Action • Java Scripts 32. In CSS, how do you make the text bold? • font:b • font-size:bold • font-weight:bold • FTP • Telnet • none 33. Which of the following is used for web page requests? • HTTP 34. Which of the following provides an interface & series for file transfer over the network? • HTTP • FTP • Telnet • None 35. __________________ connects a local computer with a remote computer. • SMPT • VPN • Telnet • none
36. Which of the followings provide e-mail services on the internet? • MAC • Telnet • none
37. ________________ is connectionless transport protocol. • SMPT • SMPT • TCP • UDP • MAC
38. ___________ is connection-oriented transport protocol. • SMPT • TCP • UDP • MAC 39. Public Key of the receiver is used to-------------------. a. Decrypt the message b. Encrypt the message c. Scramble the message d. None of the mentioned options 40. Receiver applies ----------------to the received original message • Digital signature • Message digest • Hash function • None of the mentioned options 41. Symmetric key can be replaced with----------------------------. • Symmetric algorithms • Pair of public and private keys • Asymmetric key • None of the mentioned options 43. Most of the electronic payment systems on internet use ------------------to ensure confidentiality and security of the payment information. • Quantum computing • Cryptography • Both of the mentioned options • None of the mentioned options 44. Simplicity and ----------------is the biggest advantage of Virtual PIN payment system. • Full encryption • Dual encryption • No encryption • None of the mentioned options 46. An electronic check book device is a combination of
• Hardware and a digital signature • Software and information about user • Secure hardware and software • None of the mentioned options 47. Which of the following is disadvantage of virtual PIN payment system? • Bogus purchases are possible • Stolen credit card number can be used • Only some extra copies of the information items are made in case of a fraud • All of the mentioned options are disadvantages of Virtual PIN payment system 48. FV stands for • Forward Virtual • Famous virtual • None of the mentioned options • First Virtual 50. In the statement var myAr = new Array (60); what does the number 60 represent? • The value assigned to the 1st element in the array • The number of elements to be used in the array • The number of dimensions created in a multi-dimensional arra • All 51. Which of the following is the valid syntax for initialization of a string object? • Var Girl = "salmanoreen" • Girl = new string( "salmanoreen") • Var Girl = new string( "salmanoreen") • Var Girl = new Girl( "salmanoreen") 52. Identify that machine which services the internet request? • Web client • Web server • Browser • Mozilla .
Question # 1 of 10 ( Start time: 04:52:38 PM ) Total Marks: 1
Poter Market and sell activities relates to _____________.
Select correct option:
1. advertising, promotions
2. managing salespersons
3. monitoring distribution channel
4. All of Above
Question # 2 of 10 ( Start time: 04:53:59 PM ) Total Marks: 1
Advantages of VAN in EDI are __________.
Select correct option:
1. Time independence.
2. Protocol dependence.
Question # 3 of 10 ( Start time: 04:54:52 PM ) Total Marks: 1
In personal finance what is true?
Select correct option:
1. online data is imported automatically into the register.
2. transactions maintained by the software package.
3. account/transaction details are downloaded through the internet.
4. All of Above
Question # 4 of 10 ( Start time: 04:55:51 PM ) Total Marks: 1
Characterization and Clustering belong to which of the following types of Data Mining?
Select correct option:
1. Predictive
2. Selective
3. Descriptive
4. Additive
Question # 5 of 10 ( Start time: 04:57:00 PM ) Total Marks: 1
Poter Finance and administration activities relate to _____________.
Select correct option:
1. accounting, paying bills and borrowing funds
2. purchasing and borrowing funds
Question # 6 of 10 ( Start time: 04:57:43 PM ) Total Marks: 1
What is true about Personal finance?
Select correct option:
1. Sell you products in no time.
2. Buy you products in no time.
3. allows the management of your financial matters in a customized manner.
4. None
Question # 7 of 10 ( Start time: 04:59:07 PM ) Total Marks: 1
Electronic Data Interchange Includes ________.
Select correct option:
1. No paper work
2. No human intervention
3. Exchange of information takes place in seconds
4. ALL Above
Question # 8 of 10 ( Start time: 05:00:11 PM ) Total Marks: 1
Three basic strategies for competitive advantage: __________.
Select correct option:
1. Cost leadership
2. Differentiation
3. Focus
4. All of Above
Question # 9 of 10 ( Start time: 05:01:08 PM ) Total Marks: 1
___________ strategy is defined as concentration on a single aspect of the market.
Select correct option:
1. Focus
2. Differentation
Question # 10 of 10 ( Start time: 05:01:42 PM ) Total Marks: 1
VAN can _____.
Select correct option:
1. Reduce network traffic
2. Provide protocol compatibility between the sender and the recipient, wherever that is
missing.
Question No: 1
Key version represents public key by
Buyer
Seller E-Bank Certification Authority Ref: PAGE # 116
E-cash Coins
The currency used in this payment system is called an e-cash coin or simply coin. A coin consists of three
elements or parts - serial #, key version and serial no. signed by the secret or private key of a certain
denomination of the e-cash bank. In other words, a coin of one dollar would consist of the following:
Coin = Serial#, key version, {Serial #} SK bank’s $1 key
Each coin has a unique value, partly minted by the client and partly by the e-cash bank.
Question No: 2 SSL stands for Secure Socket Layer Security Service Layer Sub Secured Length None of these Ref: PAGE # 121
SECURE SOCKET LAYER (SSL)
SSL is a protocol developed by Netscape Communications. SSL is built into many browsers. It operates at
the TCP/IP layer of the OSI model, and uses a combination of symmetric and asymmetric cryptography.
Question No: 3
How many kinds of Web Portals are?
3 2 5 6 Ref: PAGE # 129
Portal Model
Portals are the web sites which provide chance to the visitors to find almost everything in one
place. Horizontalportals provide information about a very broad range of topics. Search engine is the
example of a horizontal portal.Vertical portals provide information pertaining to a single area of
interest. Community Portals such as those related to medical or legal profession are the examples of a
vertical portal.
Question No: 4
Brick and Mortar refers to
Offline business
Online business
Transport
Building Ref: PAGE # 129
Brick-and-Mortar vs. Click-and-Mortar businesses
These two terms refer to the offline and the online businesses, respectively. Where a company is doing
its business both online and offline, there is often the problem of lack of proper integration between the
two different channels of business.
Note: Offline business = Brick-and-Mortar
And Online Business = Click-and-Mortar businesses
Question No: 5
Digital Content Revenue Model Includes
Legal information services
Online journals
Online Libraries
All of the above Ref: PAGE # 130
Digital Content Revenue Model
Web serves as a very efficient distribution mechanism of content. Therefore, one finds many e-
businesses that offer different types of information services such as legal information, corporate
information, government information, news and resources for academic libraries etc. These services can
be customized by an e-business for different firm sizes depending upon their needs and usage pattern.
Normally, a customer has to subscribe to such services by paying certain amount as subscription fee.
This fee becomes the main source of generating revenue for the e-business. Instead of subscription fee,
a credit card charge option can be made available for infrequent users.Online journals,
newspapers, libraries fall under this category
Question No: 6 Which of following marketing campaigns are cheap an effective way to target potential customers?
Sale forces
Media promotion
Marketing software
Ref: PAGE # 133
E-MAIL MARKETING
E-mail marketing campaigns are cheap and effective way to target potential customers.
Question No: 7
What does Telemarketing means?
Marketing through charting
Marketing through telephone
Marketing through email
Marketing through web casting
Ref: PAGE # 133
Telemarketing
Live interaction through telephone
Question No: 8
Which of following services build a strong customer loyalty towards company and its products?
Customer services
Public relations(PR)
Bulletin board
Exhibitions.
Ref: PAGE # 136
One major goal of CRM is to establish a long-lasting relationship between a company and its customers.
Good customerservices can help in building a sense of loyalty towards company and its products or
services.
Question No: 9
Track the customers online and do personalization is only possible through which of the following file(s) analysis.
log files
cookie
data mining
log files and cookies.
Ref: PAGE # 136
You know that cookies allow e-commerce sites to record visitor behavior. They can be used to track
customers online and do personalization. Many customers do not know that their information is being
collected and used by the e-business site.
Question No: 10 Which of the following is true for Class A: Network 01 byte and 03 hosts Network 02 bytes and 02 hosts
Network 03 bytes and 01 host
None of these
Ref: PAGE # 10
By rule, in class A networks first byte would refer to the network address and the remaining three
bytesto the host machines on that network providing a very large network.
Question No: 11
What is the correct HTML for making a text input field?
<textinput type="text">
<input type="text">
<input type="textfield">
<textfield>
Ref: PAGE # 27
First Name: <INPUT TYPE="TEXT" NAME="First">
Question No: 12
IIS stands for:
International Information Service
Internet Information Server Internet Information standards
All of these
Ref: PAGE# 85
ASP
We can discuss ASP a little more in detail. It runs best on IIS (Internet Information Server)which is freely
available with Windows NT and Windows 2000.
Question No: 13 The payer and the payee are issued digital certificates in ………… standard format by their respective banks.
X. 509 F. 609
L.8999
N.586
Ref: PAGE # 101
Digital certificates
These are the certificates in electronic form which establish whether or not a public key belongs to the
purported owner.A digital certificate at least comprises a public key, certification information (name, ID
etc.) and electronic signatures of a certification authority. Digital certificates are prepared according to
a generally accepted format called X.509standard format.
Question No: 14
What is a E-Cash wallet ?
Hardware
Agent
Software All of the above
Ref: PAGE # 116
Buyers and merchants, both, have accounts in the E-cash bank. Buyers withdraw coins against their
account and store them in e-cash wallet software (Cyber wallet) on their computer. Cyber wallet stores
and manages coins and records every transaction.
Question No: 15
An E-cash coin consists of element (s) like:
Serial # provided by client
Key version
Serial# signed by E-cash bank
All of the above Ref: PAGE # 116
Coin = Serial#, key version, {Serial #} SK bank’s $1 key
Question No: 16 What is Ultimate consumer orientation? Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. Secondary Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of supply chain. None of them Ref: PAGE # 156
Supply chain and ultimate consumer orientation:
Primary objective of supply chain is to help each company to meet needs of the consumer at the end
of supply chain. This approach is called ultimate consumer orientation. In 1995, a company dealing in
the business of production of tiers in America adopted a different approach by shifting its focus on tire
dealers from ultimate customers.
Question No: 17 Customer data can be gathered and analyzing it customers can be served in a better Manner according to their needs, which is best option? Customization Customer orientation Customer satisfaction Focus Ref: PAGE # 157
Customization:
With the help of EC, customer data can be gathered and analyzing it customers can be served in a
better manner according to their needs. One can, thus, implement differentiation and focus strategy.
Question No: 18 A company ABC web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death in that culture. Which is the international barrier it is having? Culture Language Lack of trust Infrastructure Ref: PAGE # 162
A web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a
symbol of death in that culture.
Question No: 19 Exclusive right granted by law to make, use and sell an invention. What is called? Parasites Trade mark Patent infringement Copyright Ref: PAGE # 181
Patent infringement:
A patent is an exclusive right granted by law to make, use and sell an invention. In order to be
patentable, the invention must be unique, genuine, and useful according to the prevalent technological
standards.
Question No: 20 Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act. Which legal issue arises due to such acts? Cyber Crimes Online Defamation Cyber squatting None Ref: PAGE # 182
Online Defamation:
A defamatory statement is a false statement that injures the reputation of on another person or
company. If a statement injures the reputation of a product or service instead of a person, it is called
product disparagement.Suppose, someone circulates a news item in the media about the reputation
of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a
lawsuit against that person claiming that his reputation has been injured due to such an act.
Question No: 21 How can you reference part of a string? text.substr(5,6); text.part(5,6) text.piece(5,6) text.split(5,6); Ref: PAGE # 70
String Object:
In the following example, ‘str’ and ‘myArray’ are the instances of string and array objects, respectively.
The size of the array is 10. Here, charAt() is the function/method of string object. So, charAt(3) would
provide the value of the element at the index three. Different other functions of string object have also
been used. In the example, str.Split(' ') splits the string on the basis of blank space. After splitting, we
assign parts of the string as values for the array.
Question No: 22 One Tier Architecture __________.
Select correct option:
The entire processing may take place at individual terminal.
The entire processing may take place at different terminal.
The entire processing may not take place at individual terminal.
None of Above
Ref: PAGE # 88
Client server architecture:
Note that we may have different tiers in client server architecture depending on where the processing of
data takes place. In 1-tier architecture, the entire processing takes place at a single place/zone.
Question No: 23 Following are the names of some well known e-commerce software, EXCEPT ----------- . Intershop IBM's WebSphere Commerce Professional Edition Microsoft Commerce Server 2002 Microsoft SQL Server 2005 Ref: PAGE # 93
E-commerce Software:
Following are the names of some well-known e-commerce software:
Intershop Enfinity
IBM’s WebSphere Commerce Professional Edition
Microsoft Commerce Server 2002
Question No: 24 In Style Sheets, How do you change the font of an element? font-face: font: font-family: font-style: Ref: PAGE # 43
Font family styles
<HTML>
<HEAD>
<TITLE>Style Sheets: Font Families</TITLE>
<STYLE>
Question No: 25 A paper signature is believed to be more reliable than a digital signature. ► True ► False Ref: PAGE # 106
A digital or electronic signature is believed to be more reliable as compared to paper
signatures because it is not ordinarily possible to copy or forge an electronic/digital signature. But, that
is very much possible in case of paper signatures.
Question No: 26 The serial # generated by the cyber wallet gets multiplied by blinding factor ‘r’ which is known only to the ___________. Client Bank Merchant None of above Ref: PAGE # 116
Cyberwallet generates a serial # and a blinding factor ‘r’. This blinding factor “r” is only known to the
client. It is used in the following mathematical expression which is sent to the bank for signatures. Serial
# . re2 (mod m)
Question No: 27 SET doesn’t require special software on the client or merchant side. True False Ref: PAGE # 122
Merchants must have special SET software to process transactions. Customers must have digital wallet
software that stores certificates and card information.
Question No: 28 The result of OLAP is displayed in the form of a __________. Data square Data Triangle Data cube Data circle Ref: PAGE # 145
Online Analytical Processing (OLAP):
OLAP makes use of background knowledge regarding the domain of the data being studied in order to
allow the presentation of data at different levels of abstraction. It is different form data mining in the
sense that it does not provide any patterns for making predictions; rather the information stored in
databases can be presented/ viewed in a convenient format in case of OLAP at different levels that
facilitates decision makers or managers. The result of OLAP is displayed in the form of a data cube
Question No: 29 Classification and Association belong to which of the following types of Data Mining?
Selective
Predictive
Descriptive
Additive
Ref: PAGE # 145
Online Analytical Processing (OLAP):
OLAP makes use of background knowledge regarding the domain of the data being studied in order to
allow the presentation of data at different levels of abstraction. It is different form data mining in the
sense that it does not provide any patterns for making predictions
Question No: 30
Which one of the following algorithms does not include in public key algorithms?
DSS RSA Elliptic Curves RC4 Ref: PAGE # 108
Public Key Algorithms:
Following is the list some popular public key algorithms:
• DSS – Digital Signature Standard based on DSA (Digital Standard Algorithm) – key length is
between 512-1024 bits
• RSA
• Elliptic Curves
Question No: 31
Four P’s in Marketing Mix are:
Product, price, place, promotion (Sure)
Price, person, place, problem
Place, product, property, promotion
Promotion, place, product, planning
Question No: 32
JIT Stands for
Just In Time
Joint investigation Technique
Join in Training
Just In Total
Ref: PAGE # 147
For instance, packaging material should only be ordered for just in time (JIT) delivery
Question No: 33
Advertising Supported Revenue Model includes
Yahoo portal
Employment sites
Newspaper Publishers
All of the above
Ref: PAGE # 130
Advertising-Supported Revenue Model:
In this model service/information is provided free of any charge to certain audience and the advertising
revenue is sufficient to support the operation of the business and its cost. For example, Yahoo
portal provides useful information and a search engine free of cost, but earns revenue through
advertisements on its portal web site to bear the operational cost.
Question No: 34
Which of the following is true for Class A:
Network 01 byte and 03 hosts
Network 02 bytes and 02 hosts
Network 03 bytes and 01 host
None of these
Ref: PAGE # 10
By rule, in class A networks first byte would refer to the network address and the remaining three
bytesto the host machines on that network providing a very large network.
Question No: 35
Which of the following needs human action to execute?
Virus
Worm
Trojan Horse
All of these
Ref: PAGE # 94
Viruses, on the other hand, need to be activated through a human action.
Question No: 36
In the digital signature technique, the sender of the message uses ________ to create cipher text
His or Her own symmetric key
His or her own private key
His or her own public key
The receiver’s private key
Ref: PAGE # 103
Then the sender adds his private key in the obtained message digest to create his digital signatures.
This digitally singed message is received by the receiver, who applies the pubic key of the sender to
decrypt the digital signature and reveal the message digest.
Question No: 37
PIN stands for:
Payment investigation Number
Password Identification Number
Personal Identification Number
Personal Identification Numeric
Ref: http://www.wsu.edu/~brians/errors/pin.html
Those who object to “PIN number” on the grounds that the N in “PIN” stands for “number” in the
phrase“personal identification number” are quite right, but it may be difficult to get people to say
anything else. “PIN” was invented to meet the objection that a “password” consisting of nothing but
numbers is not a word
Question No: 38
An electronic check contains a(n)………………… to the payer’s bank to make a specified payment to the
payee
Serial#
Private key
Instruction
All of the above
Ref: PAGE # 113
Electronic Checks:
Financial Services Technology Consortium (FSTC) is a group of U.S banks, research agencies and
government organizations formed in 1993. It has introduced the concept of electronic checks. An
electronic check contains aninstruction to the payer’s bank to make a specified payment to a payee.
Question No: 40
It is the ability to sell the goods or provide the service at a price that is lower than that of competitors,
and thus attract more customers. What is called?
Cost leadership
Price leadership
Focus
Differentiation
Ref: PAGE # 157
Cost leadership:
It is the ability to sell the goods or provide the service at a price that is lower than that of competitors,
and thus attract more customers.
Question No: 41
E-commerce is a combination of three different areas of study, namely, --------, ---------------- and -----------
-----
Internal, external support, Support
Technology, business and law/policy
Primary, Secondary, R&D
Sale, purchase, feed back
Ref: PAGE # 161
E-commerce is a combination of three different areas of study, namely, technology, business and
law/policy. We have studied the technology and business side of e-commerce to a reasonably good
extent.
Question No: 42
GM Celebes manufacturing electronic goods and FryChips co selling French fries. Under the traditional
trade mark law both these companies can have the same trade mark/trade name such as ‘frys’. The
problem arises when both apply for the registration of a domain name containing the word ‘frys’. Here,
both are legitimate claimants of this domain name but due to the element of uniqueness of domain
names only one of them can be assigned the desired domain name. Which legal issue arises in this
situation?
Domain name conflict
Cyber squatting
Concurrent use
None
Ref: PAGE # 181
Concurrent use
This problem arises when two organizations have apparently legitimate claim to use the same domain
name but cannot do so due to the uniqueness of domain names. Suppose, there is a company
manufacturing electronic goods and another company selling french fries. Under the traditional trade
mark law both these companies can have the same trade mark/trade name such as ‘frys’. The problem
arises when both apply for the registration of a domain name containing the word ‘frys’. Here, both are
legitimate claimants of this domain name but due to the element of uniqueness of domain names only
one of them can be assigned the desired domain name.
Question No: 43
Which type of Data Mining contains the elements as Support and confidence?
Classification
Association
Characterization
Clustering
Ref: PAGE # 144
CONFIDENCE AND SUPPORT:
There are two terms/measures used in association, that is, support and confidence. Confidence’ is a
measure of how often the relationship holds true e.g, what percentage of time did people who bought
milk also bought eggs.
Question No: 44
OLAP stands for……………
Online Analytical Program
Online Analytical Processing
Online Application Program
Online Analysis Performance
Ref: PAGE # 145
Online Analytical Processing (OLAP):
OLAP makes use of background knowledge regarding the domain of the data being studied in order to
allow the presentation of data at different levels of abstraction.
Question No: 45
Support activities in Value Chain model includes
Finance and Administration
Human Resources
Technology Development
All of these
Ref: PAGE # 152
Question No: 46
Which of the following is NOT processed on the client side?
Cookies
JavaScript
CGI scripts
Applets
Ref: PAGE # 82
CGI scripts:
Term Common Gateway Interface (CGI) is defined as a standard method/protocol that allows data from
forms to be used by programs on the server.
Question No: 47
Due to which characteristics, ATM network are covered under E-commerce ?
Exchange of information through computer networks (Doubt)
Internet.
Exchanging of products, services.
None of the above.
Basically ATM works to Exchange of information through computer networks so in my point of view it
will held in definition of e-commerce.
Ref: PAGE # 2
E-Commerce definition:
Electronic commerce is an emerging concept that describes the process of buying and selling or
exchanging of products, services and information via computer networks including the internet
Question No: 48
SET is better than SSL.
True
False
Ref: PAGE # 122
Secure Electronic Transaction (SET):
The drawback in SSL that the credit card/debit card information remains with the merchant led to the
development of a more sophisticated protocol called SET.
Question No: 49
Dividing market, with respect to people having income level greater than Rs 30000, is geographic
segmentation.
True.
False.
Ref: PAGE # 131
Segments are defined in terms of demographic characteristics such as age, gender, marital status,
income level
Question No: 50
Which of the following is NOT an identified behavioral mode of customers on the web?
Browsers
Buyers
Shoppers
Seller
Ref: PAGE # 132
Behavioral segmentation
Creation of separate experiences for customers based on their behavior is called behavioral
segmentation. Three identified behavioral modes of the customers on the web are:
Browsers – customers who just browse through the site with no intention of buying
Buyers – customers who are ready to buy right away
Shoppers – customers who are motivated to buy but want more information
Question No: 51
Which of these is a way of conducting market research?
Phone.
Interviews.
Questionnaires.
All of above.
Ref: PAGE # 132
Marketing Research:
It consists of interviews, paper and phone surveys, questionnaires, findings based on previous
investigations etc. to find strengths and weaknesses of your business and the business of your
competitors. It also includes the analysis of opportunities and threats to your business.
Question No: 52
Which of these is NOT a stage of knowledge discovery process?
Transformation
Data mining
Pattern evaluation
Process evaluation
Ref: PAGE # 140
Knowledge discovery:
A knowledge discovery process includes data cleaning, data integration, data selection, data
transformation, data mining, pattern evaluation and knowledge presentation.
Question No: 53
According to Michael Porter, “test marketing” is an example of primary activity in a strategic business
unit. Identify the area in which this task is performed.
Design
Market and sell
Deliver’ activities relate to storage
Purchase materials and supplies
Ref: PAGE # 152
Design’ activities take a product form concept stage to manufacturing stage. They include concept
research, engineering, drawings preparation, test marketing etc.
Question No: 54
Electronic banking is also known as __________.
Cyber banking
Virtual banking
Online banking
All of above
Ref: PAGE # 150
Electronic Banking:
Electronic banking, also known as cyber banking, virtual banking, home banking and online banking,
includes various banking activities conducted from home, business, or on the road, instead of at a
physical bank location.
Question No: 55
Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the
wrong-doer. Is it?
True
False
Ref: PAGE # 176
Civil law and criminal law. Civil law deals with the private rights of the parties, whereas the object of
criminal law is to punish the wrong-doer. Civil wrongs such as breach of contract are deemed to violate
only the rights of individuals and not the society in general.
Question No: 56
In datalink layer, data packets are placed inside
Data frames
Data boxes
Data streams
None of these
Ref: PAGE # 6
Data link layer:
It places data packets into data frames. Network Interface Card Drivers/Protocols operate at this layer.
It is used to identify MAC or hardware address of computer machines.
Question No: 57
At deposit stage, the serial number is ……………..by E-Cashbank
Known
Unknown
Kept Secret
Informed
Ref: PAGE # 118
Deposit Stage
Serial no. (Known) Client (unknown)
Question No: 58 Let us, suppose that you have hosted your e-commerce website, When you provide “opt-in e-mail” option to your customers on your website and customer opt for it , what does it mean to receive ?
Information about product through advertisement
Information about product through e-mail
Information about services available on it
Information about News through e-mail.
Ref: PAGE # 133
Internet mailing lists can also be conveniently used to send targeted personalized emails. You can also
provide the “opt-in e-mail” option to your customers on your web site. If they opt for it, this means
that they want to receive through email any product information, offers or promotions etc.
Question No: 59
Track the customers online and do personalization is only possible through which of the following file(s) analysis.
log files
cookie
data mining
log files and cookies. Ref: PAGE # 136
You know that cookies allow e-commerce sites to record visitor behavior. They can be used to track
customers online and do personalization. Many customers do not know that their information is being
collected and used by the e-business site. Thus, informational privacy rights of customers can be
breached in cases where cookies are used.
Question No: 60
When customer life cycle is used to create different groups of customers, it is called?
Targeting Customers
Dynamic groups Customer Life Cycle Segmentation
Group Development
Ref: PAGE #137
Life Cycle Segmentation:
These five stages are also called customer life cycle. Using them to create groups of customers is called
customer life-cycle segmentation. Segment information is useful for companies to develop better
relationship with the customers. Companies, thus, know about their customers and their level of
relationship with the company, and can customize their product/service.
Question No: 61 Network addresses 128--- 191 range belongs to which of the following class networks?
A B C E Ref: PAGE # 11
Examples
Class A: 255.0.0.0
Class B: 255.255.0.0
Class C: 255.255.255.0
NOTE: in McQ 128--- 191 is not written after one dot it means they are separate from each other so it
belong to A class.
Question No: 62 Which of the following property falls in HTTP?
Stateless
Stateful
Temporary
All of these
Ref: PAGE # 3
HTTP is stateless because in the fourth step the server breaks the connection. We can say, therefore:
• Each operation or transaction makes a new connection
• Each operation is unaware of any other connection
• Each click is a new connection
Question No: 63
FSTC stands for: Financial Services Technology Consortium
Financial Secrets Technology Consortium
Final Security threats control
First Service Technology Consortium
Ref: PAGE # 113
Financial Services Technology Consortium (FSTC) is a group of U.S banks, research agencies and
government organizations formed in 1993. It has introduced the concept of electronic checks. An
electronic check contains an instruction to the payer’s bank to make a specified payment to a payee.
Question No: 64
Supply chain can be broken into three parts, that is ----------------- , ----------------------- and -------------------- activities.
Internal, external support Upstream, internal ,downstream
Primary, Secondary, R&D None of them Ref: PAGE # 155
SUPPLY CHAIN:
Supply chain includes all the activities associated with the flow and transformation of goods from the
raw materials stage all the way to the end user. Supply chain can be broken into three parts, that is,
upstream activities, internal activities and downstream activities…
• Upstream activities relate to materials/services or the input from suppliers
• Internal activities relate to manufacturing and packaging of goods
• Downstream activities relate to distribution and sale of goods to distributors/customers
Question No: 65 The process of taking active role in working with suppliers to improve products and processes is called? Value chain management Supply chain management Supply chain management software Porter Model Ref: PAGE # 155
Supply chain management:
Engaging and negotiating with suppliers can be extremely beneficial. The process of taking active role in
working with suppliers to improve products and processes is called supply chain management.
Question No: 66 Many search engines rank the site by using a program called Spider
Scorpion
Moon
Cobweb
Ref: PAGE # 138
Some search engines search the entire internet each time. Many search engines rank the site by using a
program called ‘spider’ which inspects the site before ranking.
Question No: 67 In which type of data mining, Apriori algorithms is used?
Classification Association Characterization
Clustering
Ref: PAGE # 143
Association:
Association analysis is the discovery of association rules showing attribute-value conditions that occur
frequently together in a given set of data. It is widely used for market basket analysis. For example,
where we are recording sales of a big shopping store in databases, then by applying association mining
we may discover that certain items have a strong bondage or affinity with each other such that when
one item is purchased the other is purchased, too.Apriori algorithm is used for association mining.
Question No: 68 EDI has the key feature(s)
No paper work
No human intervention
Exchange of information takes place in seconds
All of these Ref: PAGE # 147
EDI include:
• No paper work
• No human intervention
• Exchange of information takes place in seconds
Question No: 69 Addresses are tied to the device itself and give no clue to it's location on a global scale. This is the characteristics of IP RIP MAC None of the given Ref: PAGE # 13
Media access control (MAC) address:
Data to be delivered on a network has to be converted first into serial transmission. This is done
through a devicecalled Network Interface Card (NIC) that must be installed in a computer on the
network. NIC has also got printed on it a 48 bits unique address called the MAC or hardware address of
the computer machine. In other words, it consists of 12 hexadecimal characters and can have different
format as shown
Below:
090017A9B2EF
09:00:17:A9:B2:EF
09-00-17-A9-B2-EF
Whereas the IP address of a computer may change from time to time, its MAC address would remain
the same unless the existing NIC is replaced with another. It can easily be inferred that there are 248
unique MAC addresses possible (which is an unimaginably high number). An organization
called Institute of Electrical and Electronic Engineers (IEEE) administers the allocation of MAC
addresses, worldwide. It ensures that there is no duplication of MAC addresses by the manufacturers
of NICs.
Question No: 70 When two or more intranets are connected to each other they form a/an ------------- . intranet internet extranet VPN Ref: PAGE # 98
VPN is the example of an extranet. You know that when two or more intranets are connected to each
other they form an extranet. A manufacturing company thus can be connected to its suppliers of raw
material and its distributors through VPN.
Question No: 71 ( Marks: 1 ) - Please choose one Which attribute can be used to make a region non-clickable? none of the given target alt nohref Ref: PAGE # 37
<Area> tag attributes:
‘alt’ attribute is used to label the clickable region. ‘Target’ attribute can be used to display result in a
given frame.‘Nohref’ attribute can be used to make a region non-clickable. For example, <Area
shape=“circle” coords=“70,45,25” href=“a.htm” alt=“a.htm” target=“upper” nohref>
Question No: 72 Which of the following payment mode does not require customer to pay interest to the bank on each transaction? Credit card Debit card Electronic check All of the above Ref: PAGE # 110
In case of a credit card the issuer bank charges interest from the client at a specified rate on the amount
lent. On the other hand, in case of a debit card no such interest is payable since the customer uses
his/her own money in that case.
Question No: 73 Cyber wallet can automatically assemble the correct payment and pay it too. True False Ref: PAGE # 118
E-cash Purchase:
Having received an order the merchant sends a payment request to the client in the following format:
Payreq={currency,amount,timestamp,merchant_bank ID, merchant_accID, order description}
Cyber wallet automatically assembles the correct payment amount and pays.
Question No: 74 SET doesn’t require special software on the client or merchant side. True False Ref: PAGE # 122
Merchants must have special SET software to process transactions. Customers must have digital wallet
software that stores certificates and card information.
Question No: 75 Which model allows the users to log-on on a website and assume the role of bidder or seller? Online Banking. Storefront Model. E-Learning. Auction Model Ref: PAGE # 128
Auction Model:
In this model there are auction sites to which the users can log-on and assume the role of a bidder or
seller.
Question No: 76 Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Is it? True False Ref: PAGE # 176
Civil law and criminal law. Civil law deals with the private rights of the parties, whereas the object of
criminal law is to punish the wrong-doer. Civil wrongs such as breach of contract are deemed to violate
only the rights of individuals and not the society in general.
Question No: 77 In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, ---------------- and ---------- Acceptance and consideration Acceptance and Rejection Approval and consideration None Ref: PAGE # 178
Online contracts:
In the physical world three elements must be satisfied in order to make a valid contract, namely, offer,
acceptance and consideration. The same three elements must also be present in case of a valid online
contract.
Question No: 78 In online environment acceptances may be issued by an imposter/cheater that has authority to bind the online business
True False Ref: PAGE # 178
In online environment acceptances may be issued by an imposter/cheater that does not have
authority to bind the online business. To overcome this problem companies and individuals can use
digital signatures to establish identity in online transactions.
Question No: 79 #00ff00 in HTML indicates Pure green color Pure blue color Pure red color Pure yellow color Ref: PAGE # 23
<BODY bgcolor=“Green” text=“white” link=“red”> Instead of giving the color name as value of ‘bgcolor’
one can also provide value in terms of a six digit code based on hexadecimal numbers called RGB values,
e.g, #00FF00 refers to pure green color.
Question No: 80 Virtual PIN Payment System requires both merchant and buyer to register with _______________. Auto Clearing House (ACH) First Virtual (FV) DSS (Digital Signature Standard) DES (Data Encryption Standard) Ref: PAGE # 110
Both merchants and buyers are required to register with First Virtual (FV). A buyer registering with FV
forwards his or her credit card details and email address to FV and in exchange receives a pass phrase
called, Virtual PIN.
Question No: 81 Identity that machine which services the internet request? Web Client Web Server Browser
Mozilla Ref: PAGE # 2
Basic Definitions:
Web client- machine that initiates internet request
Web server – machine that services internet request
Browser - software at the client side to interact with web data
Intranet – an internal network of computers confined to a single place
Extranet – when two or more intranets are connected with each other, they form an Extranet – e.g,
Virtual Private Network
Internet – a global network of networks is defined as internet
Question No: 82 What does ETO stands for Electronic Transactions Ordinance Electric Transport ordinance Electronic Treaty Organization All Ref: PAGE # 163
Electronic Transactions Ordinance, 2002 (ETO):
ETO is the law introduced in 2002 which extends to the whole of Pakistan. It basically provides legal
recognition to documents in electronic form and to electronic signatures. To understand this law, it
would be useful to revise the concept related to the working of digital signature technology (refer to
Lecture no. 23). We shall look at salient provisions/features of this law as it directly deals with e
commerce in Pakistan. Section 2 of the ETO defines different terms used in it. For convenience these
terms have been reproduced here (you do not need to memorize these for exam).
Question No: 83 Which one of the following algorithms does not include in symmetric key algorithms DES RC2 RC4 RSA Ref: PAGE # 108
Following is the list of some popular symmetric key algorithms:
DES (Data Encryption Standard) – 56 bits
IDEA (International Data Encryption Algorithm (IDEA) – 128 bits
RC2 – (block cipher) 1-2048 bits
RC4 (stream cipher) – 1-2048 bits
Rinjdael – 128-256 bits
Question No: 84 EFT stands for Electronic Funds Transfer Electronic Finance Transfer Easy Funds Transfer Early Funds Transaction Ref: PAGE # 114
EFT stands for ‘electronic funds transfer’.
Question No: 85 Television, radio and print media are in a (n) ……………………. Mode Passive Active Static Dynamic Ref: PAGE # 139
Emotional branding vs. rational branding:
In case of television, radio or print media people are normally in a passive mode. To a greater extent
they do not control the communication channel and thus have to listen or view the advertisement about
a brand.
Question No: 86 Cipher suite is a combination of Cryptographic Algorithm Authentication methods Security layers Cryptographic Algorithm And Authentication methods Ref: PAGE # 121
SSL Handshake:
SSL supports a variety of encryption algorithm and authentication methods. The combination of
algorithms and methods is called a cipher suite. When a client connects to an SSL server, the SSL
handshake begins, which means that the two negotiate a cipher suite selecting the strongest suite the
two have in common.
Question No: 87 Which device uses the MAC address Switch Router Repeater None of these Ref: PAGE # 15 & 16
A switch would read the MAC address on a data packet and match it with the list of MAC addresses of
the user machines contained in it. It then sends data packets only to that machine on a VLAN to which
these packets relate. But on PAGE 16 about router see below line
Routers:
Routers use a combination of hardware and software to forward data packets to their destination on the
internet. They are more efficient and sophisticated than bridges and switches.
So my answer is Router
Question No: 88 Choose the correct HTML code line which left-align the content inside a tablecell. <td leftalign> <td valign="left"> <td align="left"> <tdleft> Ref: PAGE # 26
Attributes for <TD> tag:
Width - <td width=“50%”> specifies width of a cell with reference to the table width. Align - <td
align=“center”> is used to align the text in a cell accordingly (you can also use left and right as values of
‘align’). Valign- <td valign=“top”> is used to vertically align the text in a cell (you can also use bottom or
middle as values of ‘valign’).
Question No: 89 Which one of following illustrates relationship between "<! -->" and // ?
Closely related Hide the code Different Hide the tags Question No: 90 We can divide the Client Server architecture up to: 1 Tier 2 Tier 3 Tier N –Tier Ref: PAGE # 89
We can divide the client server architecture into n – tiers.
Question No: 91 DSS stands for Digital Signature Standards Digital Support Standards Decision support system Digital Sign System Ref: PAGE # 108
Following is the list some popular public key algorithms:
DSS – Digital Signature Standard based on DSA (Digital Standard Algorithm) – key length is between
512-1024 bits
Question No: 92 Which one of the followings is an example of Banner advertising? Branding Affiliate programs Partnership All of these Ref: PAGE # 138
Affiliate Programs:
An affiliate program is an agreement between two parties that one will pay the other a commission
based on a specified customer action. It is not a strategic union as is partnership. Rather, it is for limited
purpose and time. Banner advertising is the example of an affiliate program.
Question No: 93 A firm Glory Enterprise and it wants to have its web site. It also wants to have the word glory as a part of its domain name because for years it has been recognized in the physical world through this word. However, at the time of registration of its domain name it finds that a person Mr. A. who has nothing to do with the business of the firm or the word glory have already registered a domain name containing this word as a part of it. Since there cannot be two similar domain names, the firm is forced to request Mr. A to transfer that domain name to it. In response, if Mr. A blackmails or claims ransom from the said firm, He would be said to have committed -------------. Cyber squatting Parasites Patent infringement Trade mark and domain name conflicts Ref: PAGE # 181
Cyber squatting:
The act of intentionally registering domain names containing trademarks/trade names of prominent
Companies to later blackmail or demand ransom from those companies is called cyber squatting. It is
Regarded as an offence in most countries. Assume there is a firm ‘Glory Enterprise’ and it wants to have
its web site. It also wants to have the word ‘glory’ as a part of its domain name because for years it has
been recognized in the physical world through this word. However, at the time of registration of its
domain name it finds that a person Mr. ‘A’ who has nothing to do with the business of the firm or the
word ‘glory’ has already registered a domain name containing this word as a part of it. Since there
cannot be two similar domain names, the firm is forced to request Mr. ‘A’ to transfer that domain name
to it. In response, if Mr. ‘A’ blackmails or claims ransom from the said firm, he would be said to have
committed cyber squatting.
Question No: 94 In which type of approach, we further dig the data for retrieving information from data warehouse? Slice Dice Drill down Roll up Ref: PAGE # 146
Using drill-down we can further dig the data to receive some specific information. For example using
that I can find the sale of furniture in a specific month of the first quarter, say, February. Roll-up is the
reverse of drill-down.
Question No: 95 Which activity does not include in Primary Identify Customers Design Delivery Administration Ref: PAGE # 152
Question No: 96 What of the following is the correct HTML tag for making a drop-down list? <input type="list"> <input type="dropdown"> <select> <list> Ref: PAGE # 29
Selection lists:
General format <select name=“field name” size=“no. of items”> between
the <select> and </select> tags are the <option> and </option> tags which define the list items. If you
omit “size” the list becomes a drop-down list. If size is two or more, the list becomes a rectangle with
scroll bars for navigating the choices. Using ‘Selected’ attribute an item is selected by default.
Question No: 97 What does HTML stand for? Hyperlinks and Text Markup Language Home Tool Markup Language Hyper Text Markup Language Homepage Text Making Language Ref: PAGE # 18
Hypertext markup language:
Web documents are defined by the Hypertext Markup Language (HTML). It is a language of tags. A tag is
a special letter or key word enclosed in angular brackets.
Question No: 98 JavaScript variables can begin with ----------- . a lower case letter an underscore character a dollar sign all of the above Ref: PAGE # 54
Rules for variables:
Variable names can begin with an uppercase letter (A-Z), lower case letter (a-z), an underscore
character (_), ordollar sign ($).
Question No: 99 A unique large number, generated as a result of applying hash function on a message is called ________. Hash message Message digest Digitally singed message Secret message Ref: PAGE # 124
SET software on the customer side splits the order information from the account information. MDI is
the message digest obtained by applying hash function on the order information.
Question No: 100 FVIPSS stands for _________.
First Virtual Internet Payment System Server First Virtual International Payment System Server First Virtual International Payment System Services First Virtual Internal Payment System Services Ref: PAGE # 110
Merchant queries the FV Internet Payment System Server (FVIPSS) to confirm Virtual PIN
Question No: 101 Which currency is used in e-cash Payment system? Dollar Coin Penny Cent Ref: PAGE # 116
Buyers and merchants, both, have accounts in the E-cash bank. Buyers withdraw coins against their
account and store them in e-cash wallet software (Cyber wallet) on their computer.
Question No: 102 Web browser and client wallet are installed on __________. Client's computer Bank's computer Merchant's computer None of above
Ref: PAGE # 120
Client wallet and web browser are installed on the client machine.
Question No: 103 Job searchers can search for jobs and employers can hire effectively using..... Online recruiting web sites. Online banking web sites. Online trading and lending web sites. Online news services web sites. Ref: PAGE # 128
Online Recruiting:
Employers can recruit and job searchers can search for jobs effectively through online recruiting web
sites.
Question No: 104 According to Michael Porter, material handling is an example of primary activity in a strategic business unit. Identify the area in which this task is performed. Identify customers Market and sell Deliver activities relate to storage Purchase materials and supplies Ref: PAGE # 105
‘Deliver’ activities relate to storage, distribution and shipment of final product, e.g, warehousing,
selecting shippers, material handling, timely delivery to customers etc.
Question No: 105 IT/EC can reduce the overall ------------- and afford to keep the price of the product relatively low Production cost Marketing cost Distribution cost None Ref: PAGE # 159
A business using IT/EC can reduce the overall production cost and afford to keep the price of the
product relatively low.
Question No: 106
Law is broadly divided into two classes on the basis of nature of wrong, namely, --------- and ---------------
Civil law and criminal law ETO and criminal law Supreme and Civil Law None Ref: PAGE # 176
Law is broadly divided into two classes on the basis of nature of wrong, namely, civil law and criminal
law. Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish
the wrong-doer.
Question No: 107
Browser is installed at :
Client side machine
Web server machine
none
both Client and Server Machines
Ref: PAGE # 120
Web browser are installed on the client machine.
Question No: 108
In Virtual Payment system, four kinds of information are provided to e-bank. Identify which one is NOT
included:
Buyer Accounts identifier Buyer password Address of Merchant Actual amount of money in favor of merchant Ref: PAGE # 112
To make payment an account holder is authenticated using an account identifier and
a password, account identifier of the payee and the payment amount.
Question No: 109
To overcome the lack of physical proximity appearance problem in e-business, which technology is
going to be used
Biometrics Video conferencing Cryptography Biometrics and Video conferencing Ref: PAGE # 134
Video conferencing is an example of web casting. For example, using this technique, doctors sitting
in China, Englandand Pakistan etc. can, in real time, exchange and benefit from each other’s ideas as if
they are physically holding a meeting.
Question No: 110
Dividing the potential customers into groups is called
Market Segmentation
Market Promotion
Market Research
Market Survey
Ref: PAGE # 131
Market Segmentation:
Businesses need to identify specific portions of their markets in order to target them with specific
advertising messages. The practice called market segmentation divides the potential customers into
segments or groups.
Question No: 111
Traditionally Marketer use the market segmentation(s) like
Geo-graphic Segmentation Demographic Segmentation Psychographic Segmentation All of the above Ref: PAGE # 131
Traditionally, marketers have used three types of variables to define three different market
segmentations, namely,geographic segmentation, demographic segmentation and psychographic
segmentation.
Question No: 112
In…………………, there is no direct contact with the end users.
B2B B2C C2C All above options Ref: PAGE # 137
Key difference between B2C and B2B is that in case of B2B there is no direct contact with the end
users, whereas this contact exists in B2C. Thus, an e-business can have direct response or feedback from
its customers in B2C as compared to B2B.
Question No: 113
Allocation of MAC addresses is administered by --------------------------
ICAAN ISO IEEE None Ref: PAGE # 13
It can easily be inferred that there are 248 unique MAC addresses possible (which is an unimaginably
high number). An organization called Institute of Electrical and Electronic Engineers (IEEE) administers
the allocation of MAC addresses, worldwide. It ensures that there is no duplication of MAC addresses by
the manufacturers of NICs.
Question No: 114
As a Web developer you can define a style sheet for?
HTML elements and apply to many Web pages. A HTML element and apply to single Web page. A HTML element and apply to many Web pages. HTML elements and apply to one Web page. Ref: PAGE # 38
Style sheets:
Style sheet instructions can be embedded in the HTML document. An advantage of applying style sheets
is that definition of the style’s formatting is created once and the browser applies that formatting each
time the tag is used. Secondly, pages are easier to modify, that is, edit the style definition and all the
places where the style is used within the page get updated automatically. Most popular type of style
sheets is Cascading Style Sheets.
Question No: 115
What shall come in blanks for proper result,
Here blanks are numbered with 1,2 and 3
<html>
<head>
<SCRIPT language="JavaScript">
Var num1, var num2
Document.container .result.value=parseFloat(num1)-parseFloat(num2)
</script>
</head>
<body>
<FORM name=”---------1-----------”>
<input type=”----------2-------” name=”-------3---------” maxlength=”5”>
</form>
</body>
</html>
container, text and result result, value and container container , button and value result, container and text
Question No: 116
What does XML stand for?
eXtra Modern Link X-Markup Language eXtensible Markup Language Example Markup Language Ref: PAGE # 74
Extensible markup language:
World Wide Web Consortium (W3C), a non-profit organization that maintains standards for the web
presented the draft of XML in late 1990’s.
Question No: 117
Cryptographic Algorithms are measured in terms of
Key length Complexity Simplicity All of the above Ref: PAGE # 107 & 108
Key Length:
A cryptographic key is represented as a string of binary digits – 0’s & 1’s- inside a computer.
&
Cryptographic algorithms are measured in terms of key length.
Question No: 118
-----------means that your product/service has certain quality that makes it more attractive than the one
offered by your competitor, despite the price of your competitor’s product/service is somewhat lower
Differentiation Focus Cost leadership None of them Ref: PAGE # 157
Differentiation:
Differentiation means that your product/service has certain quality that makes it more attractive than
the one offered by your competitor, despite the price of your competitor’s product/service is somewhat
lower.
Question No: 119
Characterization and Clustering belong to which of the following types of Data Mining?
Additive Predictive Selective Descriptive Ref: PAGE # 141
Classification and association are predictive types of data mining while characterization and clustering
represent the descriptive type.
Question No: 120
In which type of data mining, ID3 algorithms is used?
Classification Association Characterization Clustering Ref: PAGE # 141
Classification:
It allows you to have a predictive model labeling different samples to different classes. The results of this
type of mining/model are represented as (if-then) rules, decision trees, neural networks etc. Two
important algorithms used for this type are ID3 Algorithm, and Bayesian classification.
Question No: 121
ANSI stands for ……….
American National Standards Institute All Network Standards Institute American New standards Institute Australia National standards Institute Ref: PAGE # 147
ANSI (American National Standards Institute)
Question No: 122
Who is making the Web standards?
International Standard Organization ANSI Microsoft The World Wide Web Consortium Ref: PAGE # 74
World Wide Web Consortium (W3C), a non-profit organization that maintains standards for the
web presented
Question No: 123
Which of following is NOT an attribute of <AREA> tag?
shape circle href cords Ref: PAGE # 37
<Area shape=“circle” coords=“70,45,25” href=“a.htm” alt=“a.htm” target=“upper” nohref>
Question No: 124
Which of the following is an advantage of symmetric algorithms?
Symmetric algorithms are faster Symmetric algorithms don't include any encryption Symmetric algorithms are slow in nature None of above Ref: PAGE # 105
A symmetric key can also be used for encrypting a message instead of using the pair of public and
private keys. The advantage of using symmetric key is that since symmetric algorithms are faster as
compared to asymmetric, therefore, the encryption of a message with the symmetric key takes place
quickly.
Question No: 125
What is the right sequence of steps in?
Payee’s bank → Payer’s bank → Payee → Payer. Payer’s bank → Payee → Payee’s bank → Payer. Payer’s bank → Payee’s bank → Payer → Payee. Payer → Payee → Payee’s bank → Payer’s bank. Ref: PAGE # 113
Question No: 126
The key feature of E-Cash Payment system is __________.
Simplicity Anonymity Availability Connectivity Ref: PAGE # 116
A company, DigiCash, has pioneered the use of electronic cash or e-cash. Anonymity of the buyer is the
key feature of this system. There are three participants in it, namely, buyer, merchant and bank. Both,
symmetric and asymmetric type of cryptography is used in this system.
Question No: 127
In storefront e-business model buyers and sellers interact ___________ with each other.
Directly. Indirectly. Through a third party.
None of above. Ref: PAGE # 128
Storefront Model:
It represents basic form of e-commerce where buyers and sellers interact directly.
Question No: 128
Customers grouped by variables such as social class, personality or approach to life or lifestyle, is called
___________.
Demographic Segmentation. Geographic Segmentation. Psychographic segmentation. Behavioral segmentation. Ref: PAGE # 131
Psychographic segmentation:
Here customers are grouped by variables such as social class, personality or approach to life or lifestyle.
Question No: 129
According to Michael Porter, “material handling” is an example of primary activity in a strategic business
unit. Identify the area in which this task is performed.
Identify customers Market and sell Deliver’ activities relate to storage Purchase materials and supplies Ref: PAGE # 152
‘Deliver’ activities relate to storage, distribution and shipment of final product, e.g, warehousing,
selecting shippers, material handling, timely delivery to customers etc.
Question No: 130
According to Michael Porter, “fabricating” is an example of primary activity in a strategic business unit.
Identify the area in which this task is performed.
Market and sell Deliver’ activities relate to storage Purchase materials and supplies Manufacture product or create service
Ref: PAGE # 152
‘Manufacture product or create service’ activities relate to transformation of materials and labor into
finished products, e.g, fabricating, assembling, packaging etc.
Question No: 131
Web catalogue revenue model includes
Online sellers of computer Gifts, flowers, clothes Journals Both first & second options Ref: PAGE # 130
Businesses using this type of a model include online sellers of computers, electronic items, books,
music, videos, toys, flowers, gifts, clothes etc. Payment received from customers is the source of
earning revenue.
Question No: 132
In which type of approach, we sum up and integrate the information in a particular dimension to show
the result?
Dice Drill down Roll up Slice Ref: PAGE # 146
Roll-up is the reverse of drill-down. In it we can sum-up or integrate the information in a particular
dimension to show the result. For example the sale of furniture or computers in a particular year
(rather than a specific quarter) can be viewed using roll-up.
Question No: 133
EDI used for ______.
Used by organizations for transactions that not occur on a regular basis according to a pre-determined
format.
Used by organizations for transactions that occur on a regular basis according to a pre-determined
format.
Both
NONE of Above
Ref: PAGE # 147
ELECTRONIC DATA INTERCHANGE (EDI)
EDI is used by organizations for transactions that occur on a regular basis according to a pre–
determined format.
Question No: 134
Supply Chain Mangment broken down into ___________.
Upstream activities
Internal activities
Downstream activities
All of Above
Ref: PAGE # 155
SUPPLY CHAIN:
Supply chain includes all the activities associated with the flow and transformation of goods from the
raw materials stage all the way to the end user. Supply chain can be broken into three parts, that is,
upstream activities, internal activities and downstream activities…
• Upstream activities relate to materials/services or the input from suppliers
• Internal activities relate to manufacturing and packaging of goods
• Downstream activities relate to distribution and sale of goods to distributors/customers
Question No: 135
Mailbox:
Outgoing messages can be placed.
Incoming messages can be picked up.
Ref: PAGE # 148
Postbox: where outgoing messages are placed, and
Mailbox: where incoming messages can be picked up
Question No: 136
In many countries, stealing and misusing of meta information for getting competitive advantage is
considered as an offence known as
Tort of Private Nuisance
Tort of Tress passing
Tort of passing off
Defamation
Ref: PAGE # 138
In many countries, stealing and misusing Meta information in this manner to gain business/competitive
advantage is considered as an offence known as the tort of passing-off.
Question No: 137
Three basic strategies for competitive advantage: __________.
Cost leadership
Differentiation
Focus
All of Above
Ref: PAGE # 157
Competitive Strategy:
Ability of an organization to prosper arises from its competitive advantage over other organizations
operating within its market sector. The strategy of a business to achieve this goal of competitive
advantage is known as competitive strategy. Three basic strategies for competitive advantage are as
under:
• Cost leadership
• Differentiation
• Focus
Question No: 138
Which of these is an algorithm used in clustering?
K-means
L-means
C-means
F-means
Ref: PAGE # 145
K-means algorithm is normally used in clustering.
Question No: 139
Web is a(n)…………….. Medium to disseminate information.
Passive
Active
Static
All of these
Ref: PAGE # 139
Emotional appeals are difficult to covey on the internet because web is an active medium largely
controlled by the customers
Question No: 140
Each VAN has a centralized computer system that maintains ______________.
One File
Two Files
Three Files
Four Files
Ref: PAGE # 148
Each VAN has a centralized computer system that maintains two files for each user, that is,
Postbox: where outgoing messages are placed, and
Mailbox: where incoming messages can be picked up
Question No: 141
EDI Advantages inclues ______
Short time
Reduced Costs
Both
None of Above
Ref: PAGE # 147
Instance, packaging material should only be ordered for just in time (JIT) delivery, so that E-Pens can cut
down on its stock of packaging and reduce the inventory cost.
Question No: 142
Popular software packages for personal finance are ___________.
Quicken
MS Money
Money 2003
All of Above
Ref: PAGE # 152
Popular software packages for personal finance are Quicken, MS Money and Money 2003 etc.
Question No: 143
Meta tag contains:
User information
Seller information
Web page key information
Bank information
Ref: PAGE # 138
META INFORMATION:
You know that a Meta tag contains the key information of a web page.
Question No: 144
Popular EDI standards are _______.
ANSI (American National Standards Institute) X12 standard
EDIFACT (United Nations Standard of Electronic Data Interchange for Administration, Commerce and
Transport)
Both
None of Above
REF: PAGE # 147
EDI documents are formatted using published standards. Two popular EDI standards are –
ANSI (American National Standards Institute) X 12 standards and EDIFACT (United Nations Standard of
Electronic Data Interchange for Administration, Commerce and Transport).
Question No: 145
Technology development relates to activities ___________.
Fields tests
Maintenance of procedures
Process improvement studies
All of Above
Ref: PAGE # 153
‘Technology development’ relates to activities which help improve product/service that a business is
selling and also help improve processes in every primary activity, e.g., fields tests, maintenance of
procedures, process improvement studies etc.
Question No: 146
Where there are quite a few erroneous or missing values in a row then that row can be deleted or
discarded. This process is called...............
Data Deletion
Data Selection
Data Integration
Data Transformation
Ref: PAGE # 141
Where there are quite a few erroneous or missing values in a row, then that row can be
discarded/deleted altogether. This process is called data selection.
Question No: 147
Upstream activities of the Supply Chain Managment relate to ___________.
materials/services
The input from suppliers
Both
None of Above
Ref: PAGE # 155
Upstream activities relate to materials/services or the input from suppliers
Question No: 148
Focus strategy means _____________________.
That ability to sell the goods or provide the service at a price that is lower than that of competitors
That your product/service has certain quality that makes it more attractive
That concentration on a single aspect of the market
Concentration on many aspect of the market
Ref: PAGE # 157
Focus:
Focus strategy is defined as concentration on a single aspect of the market. That single aspect can be a
particular market segment or market area or product type.
Question No: 149
What is true about Personal finance?
Sell you products in no time.
Buy you products in no time.
Allows the management of your financial matters in a customized manner
None
Ref: PAGE # 152
PERSONAL FINANCE ONLINE:
Personal finance allows the management of your financial matters in a customized manner.
Question No: 150
What is true about ERP?
Integrate all business functions
At Single Location
Efficient use of resource
ALL Above
Ref: PAGE # 93
Enterprise Resource Planning:
Enterprise Resource Planning (ERP) is a concept that integrates all aspects of a business e.g, accounting,
logistics, manufacturing, marketing, planning, project management etc. at a single place. An ERP system
such as SAP is expensive.
Question No: 151
Supply Chain Managment can be broken down into ___________.
One Activity
Two Activities
Three Activities
Four Activties
Ref: PAGE # 155
• Upstream activities relate to materials/services or the input from suppliers
• Internal activities relate to manufacturing and packaging of goods
• Downstream activities relate to distribution and sale of goods to distributors/customers
Question No: 152
VAN Stands for ______.
Value Added Network
Value Added Noise
Ref: PAGE # 148
Value Added Network (VAN):
Value added networks are third party networks that provide services to execute authorized transactions
with valid trading partners using EDI.
Question # 1 Advantages of VAN in EDI are ________.
Select correct option:
Time independence.
Protocol dependence.
Reference page 149
Advantages of VAN
Two big advantages of using a VAN in EDI are time independence and protocol independence. Time
independence means that the sending and receipt of the interchange or messages can be carried out at
the convenience of the users involved. Thus, they are not required to be connected with each other at
the same time. Protocol independence means that interchanges are re-enveloped with the transmission
protocol appropriate to the recipient when they are retrieved from the postbox by the VAN. Thus, a
VAN can provide protocol compatibility between the sender and the recipient, wherever that is missing.
Question #2
VAN Stands for ____.
Select correct option:
Value Added Network
Value Added Noise
www..net
Reference: page 148
Value Added Network (VAN)
Value added networks are third party networks that provide services to execute authorized transactions
with valid trading partners using EDI. Each VAN has a centralized computer system that maintains two
files for each user, that is, Postbox: where outgoing messages are placed, and Mailbox: where incoming
messages can be picked up
Question # 3
Web is a(n)…………….. Medium to disseminate information.
Select correct option:
Passive
Active
Static
All
Question # 4
In which type of data mining, ID3 algorithms is used?
Select correct option:
Classification
Association
Characterization
Clustering
Reference: page 141
Classification
It allows you to have a predictive model labeling different samples to different classes. The results of this
type of mining/model are represented as (if-then) rules, decision trees, neural networks etc. Two
important algorithms used for this type are ID3 Algorithm, and Bayesian classification. Decision tree is
a graphical representation of the if-then rules. Fig. 3 below shows the result of classification in the form
of a decision tree. Initially, the whole data is divided into two sets – training data and test data.
www..net
Question # 5
In many countries, stealing and misusing of meta information for getting competitive advantage is
considered as an offence known as Select correct option:
Tort of Private Nuisance
Tort of Tress passing
Tort of passing off
Defamation
Reference: page 138
A business can improve its ranking on search engines by capitalizing upon the reputation of the business
whose Meta information it actually is. In many countries, stealing and misusing Meta information in this
manner to gain business/competitive advantage is considered as an offence known as the tort of
passing-off.
Defamation
Question # 6
Which of these is NOT a stage of knowledge discovery process?
Select correct option:
Transformation
Data mining
Pattern evaluation
Process evaluation
Reference: page 140
Knowledge discovery
A knowledge discovery process includes data cleaning, data integration, data selection, data
transformation, data mining, pattern evaluation and knowledge presentation.
www..net
Question #7
Poter Market and sell activities relates to ___________.
Select correct option:
advertising, promotions
managing salespersons
monitoring distribution channel
All of Above
Question #8
Human resources refer to the activities that coordinate ___________.
Select correct option:
management of employees
recruiting
hiring, compensation and benefits
All of Above
Reference: page 153
‘Human resources’ refer to the activities that coordinate management of employees, e.g,
recruiting, hiring, compensation and benefits etc.
www..net
Question #9
EDI used for ____.
Select correct option:
used by organizations for transactions that not occur on a regular basis according to a pre-determined
format.
used by organizations for transactions that occur on a regular basis according to a pre-determined
format.
Both
NONE of Above
Reference: page 147
EDI is used by organizations for transactions that occur on a regular basis according to a pre-determined
format. It involves exchange of electronic business documents, i.e., purchase orders, invoices etc. EDI
transactions are carried through special EDI software. This technology was popularly used before the
introduction of e-commerce by different trading partners on private electronic networks. Key features of
EDI include:
No paper work
No human intervention
Exchange of information takes place in seconds
Question #10
Strategic business unit is a combination of a particular ___________.
Select correct option:
product
distribution channel
customer type
All of Above
Reference page 152
strategic business unit undertakes to design, produce, promote, market, deliver and support the
products or services it sells.
www..net
Question #11
VAN can ___.
Select correct option:
Reduce network traffic
Provide protocol compatibility between the sender and the recipient, wherever that is missing.
Reference: page 147
Advantages of VAN
Two big advantages of using a VAN in EDI are time independence and protocol independence. Time
independence means that the sending and receipt of the interchange or messages can be carried out at
the convenience of the users involved. Thus, they are not required to be connected with each other at
the same time. Protocol independence means that interchanges are re-enveloped with the transmission
protocol appropriate to the recipient when they are retrieved from the postbox by the VAN. Thus, Van
can provide protocol compatibility between the sender and the recipient, wherever that dismissing.
Question #12
Poter Finance and administration activities relate to ___________.
Select correct option:
accounting, paying bills and borrowing funds
purchasing and borrowing funds
‘Finance and administration’ activities relate to accounting, paying bills, borrowing funds and
complying with government regulations etc.
Question # 13
Characterization and Clustering belong to which of the following types of Data Mining?
Select correct option:
Predictive
Selective
Descriptive
Additive
Reference: page 141
Classification and association are predictive types of data mining while characterization and clustering
represent the descriptive type.
Question #14
Consider the following definition template < class T > class Xyz { … };
Select correct option:
it defines a class template for integers only
it defines a class template for any class
class templates are not defined in this way
none of given options
www..net
Question #15
Technology development relates to activities _________.
Select correct option:
fields tests
maintenance of procedures
process improvement studies
All of Above
Reference: page 153
‘Technology development’ relates to activities which help improve product/service that a business is
selling and also help improve processes in every primary activity, e.g, fields tests, maintenance of
procedures, process improvement studies etc.
Question #16
The process of taking active role in working with suppliers to improve products and processes is
called____________.
Select correct option:
ERP
Marketing
Supply Chain Management
Sale
Reference: page 155
Supply chain management
Engaging and negotiating with suppliers can be extremely beneficial. The process of taking active role in
working with suppliers to improve products and processes is called supply chain management.
Question # 17
What is true about ERP?
Select correct option:
Integrate all business functions
At Single Location
Efficient use of resource
ALL Above
Reference: page 150
Enterprise Resource Planning (ERP)
ERP is an approach that attempts to integrate all departments and functions across a company onto a
single computer system that can serve all those different departments' particular needs. For example,
finance, manufacturing and the warehouse department of a company may have their own software to
perform tasks specific to each one of them. However, each software can be linked together so that a
customer service representative can see the credit rating of a customer from finance module,
warehouse information from warehouse module, and shipment information from the shipment module.
SAP is an example of ERP software. ERP is complex. It is not intended for public consumption as
properintegration of ERP with e-commerce applications is still a major problem.
Question # 18
Each VAN has a centralized computer system that maintains ____________.
Select correct option:
One File
Two Files
Three Files
Four Files
www..net
Reference: page 148
Value Added Network (VAN)
Value added networks are third party networks that provide services to execute authorized transactions
with valid trading partners using EDI. Each VAN has a centralized computer system that maintains two
files for each user, that is,
Postbox: where outgoing messages are placed, and
Mailbox: where incoming messages can be picked up
Question #19
_________ strategy is defined as concentration on a single aspect of the market.
Select correct option:
Focus
Differentiation
Reference: page 157
Focus
Focus strategy is defined as concentration on a single aspect of the market. That single aspect can be
particular market segment or market area or product type. For example, if my competitors are focusing
indifferent market areas, I may, on the other hand, plan that I can be more profitable by concentrating
on one particular area. It may be a particular province or a city etc. where I may have a better
distribution channel.
Question # 20
Survey and market research are used for which poetr identified activity?
Select correct option:
Identify Design
Identify customer
Reference: page 152
Identify customers’ refer to those activities which try to find new customers and ways to serve
better to the existing ones, e.g, surveys and market research;
‘Design’ activities take a product form concept stage to manufacturing stage. They include concept
research, engineering, drawings preparation, test marketing etc..
Question # 21
Internal activities of the Supply Chain Management relate to ________________.
Select correct option:
manufacturing
packaging of goods
Both
NONE of Above
Reference: page 155
SUPPLY CHAIN
Supply chain includes all the activities associated with the flow and transformation of goods from the
raw materials stage all the way to the end user. Supply chain can be broken into three parts, that is,
upstream activities, internal activities and downstream activities.
Upstream activities relate to materials/services or the input from suppliers
Internal activities relate to manufacturing and packaging of goods
Downstream activities relate to distribution and sale of goods to distributors/customers
Question #22
Upstream activities of the Supply Chain Managment relate to _________.
Select correct option:
materials/services
the input from suppliers
Both
None of Above
Reference: page
Supply chain includes all the activities associated with the flow and transformation of goods from the
raw
materials stage all the way to the end user. Supply chain can be broken into three parts, that is,
upstream
activities, internal activities and downstream activities.
Upstream activities relate to materials/services or the input from suppliers
Internal activities relate to manufacturing and packaging of goods
Downstream activities relate to distribution and sale of goods to distributors/customers
www..net
Question #23
Ability of an organization to prosper arises from its competitive advantage over other organizations
operating within its market sector: _________.
Select correct option:
Differentation
Focus
Competitive Startegy
None
Reference: page 157
Competitive Strategy
Ability of an organization to prosper arises from its competitive advantage over other organizations
operating within its market sector. The strategy of a business to achieve this goal of competitive
advantage
is known as competitive strategy. Three basic strategies for competitive advantage are as under:
Activities associated with the flow and transformation of goods from the raw materials stage all
theQuestion #24
way to the end user _________.
Select correct option:
Marketing
Supply Chain Management
ERP
Reference: page 93
Supply Chain Management (SCM) Software
Supply chain involves all activities associated with flow and transformation of goods from raw material
stage to the finished stage and their supply to the end users. Supply chain management software helps
companies to coordinate planning and operations with their partners in industry. SCM planning software
helps companies develop demand forecasts using information from each player in supply chain. SCM
execution software helps with tasks such as the management of warehouses and transportation
facilities.
Question #25
Where there are quite a few erroneous or missing values in a row then that row can be deleted or
discarded. This process is called...............
Select correct option:
Data Deletion
Data Selection
Data Integration
Data Transformation
www..net
Reference: page 141
Where there are quite a few erroneous or missing values in a row, then that row can be
discarded/deleted altogether. This process iscalled data selection. In data transformation, the data from
all different sources is converted into the same format..
Question #26
Poter identify certain activities what is the name of activity which take a product from concept stage to
manufacturing stage.
Select correct option:
Market Stage
Human Resource
Design Stage
None of Above
Design’ activities take a product form concept stage to manufacturing stage. They include concept
research, engineering, drawings preparation, test marketing etc.
Question #27
The result of OLAP is displayed in the form of a ________.
Select correct option:
Data square
Data Triangle
Data cube
Data circle
Reference: page 145
Online Analytical Processing (OLAP)
OLAP makes use of background knowledge regarding the domain of the data being studied in order to
allow the presentation of data at different levels of abstraction. It is different form data mining in the
sense that it does not provide any patterns for making predictions; rather the information stored in
databases can be presented/ viewed in a convenient format in case of OLAP at different levels that
facilitates decision makers or managers. The result of OLAP is displayed in the form of a data cube
Question #26
Television, radio and print media are in a (n) ……………………. Mode.
Select correct option:
Passive
Active
Static
Dynamic
www..net
Question #27
EDI involves exchange of ______.
Select correct option:
Electronic business documents
Data
Resources
NONE of Above
Reference: page 146
EDI is used by organizations for transactions that occur on a regular basis according to a pre-determined
format. It involves exchange of electronic business documents, i.e., purchase orders, invoices etc.EDI
transactions are carried through special EDI software. This technology was popularly used before the
introduction of e-commerce by different trading partners on private electronic networks.
Question #28
In personal finance what is true?
Select correct option:
online data is imported automatically into the register.
transactions maintained by the software package.
account/transaction details are downloaded through the internet.
All of Above
Reference: page 152
PERSONAL FINANCE ONLINE
Personal finance allows the management of your financial matters in a customized manner. For
example, tax calculations or financial budgeting can be done through personal finance software.
Popular software packages for personal finance are Quicken, MS Money and Money 2003 etc. In
personal finance online data is imported automatically into the register of transactions maintained by
the software package as the account/transaction details are downloaded through the internet. This
information can then systematically be used to calculate taxes or prepare a budget for certain
activities.
Question #29
Mailbox:
Select correct option:
Outgoing messages can be placed.
Incoming messages can be picked up.
Reference: Page 148
Postbox: where outgoing messages are placed, and
Mailbox: where incoming messages can be picked up
Question # 30
Which of these is an algorithm used in clustering?
K-means
L-means
C-means
F-means
Reference: page 145
K-means algorithm is normally used in clustering.
www..net
Question # 31
Many search engines rank the site by using a program called
Spider
Scorpion
Moon
Cobweb
Reference: page 138
Many search engines rank the site by using a program called ‘spider’ which inspects the site before
ranking.
Question # 32
Popular EDI standards are _______.
ANSI(American National Standards Institute) X12 standard .
EDIFACT (United Nations Standard of Electronic Data Interchange for Administration,
Commerce and Transport).
Both
None of Above
Reference: page 147
EDI documents are formatted using published standards. Two popular EDI standards are - ANSI
(American National Standards Institute) X12 standard and EDIFACT (United Nations Standard of
Electronic Data Interchange for Administration, Commerce and Transport).
Question #33
SWOT used for _______________.
Strategic Planning
Short Term Planning
Long Term Planning
None of Above
SWOT (strengths, weaknesses, opportunities and threats) analysis
In SWOT analysis, an analyst first looks into the business unit to identify its strengths and weaknesses
then looks into the environment in which the business operates and identifies opportunities and
threatspresented by such environment.
What is true about ERP?
Select correct option:
Integrate all business functions
At Single Location
Efficient use of resource
ALL Above
Enterprise Resource Planning (ERP) is a concept that integrates all aspects of a business e.g, accounting,
logistics, manufacturing, marketing, planning, project management etc. at a single place
The process of taking active role in working with suppliers to improve products and processes is called
______________.
Select correct option:
ERP
Marketing
Supply Chain Management
Sale
Engaging and negotiating with suppliers can be extremely beneficial. The process of taking active role in
working with suppliers to improve products and processes is called supply chain management. Today,
firms are reaching beyond limits of their own organizational structure
Consider the following definition template < class T > class Xyz { … };
Select correct option:
it defines a class template for integers only
it defines a class template for any class
class templates are not defined in this way*****
none of given options
Question # 1 of 10 ( Start time: 11:41:47 AM )
Total Marks: 1
EDI involves exchange of ________.
Select correct option:
Electronic business documents
Data
Resources
NONE of Above
EDI is used by organizations for transactions that occur on a regular basis according to a pre-determined
format. It involves exchange of electronic business documents, i.e., purchase orders, invoices etc. EDI
transactions are carried through special EDI software
Question # 6 of 10 ( Start time:
11:46:36 AM )
Total Marks: 1
Survey and market research are used for which poetr identified activity?
Select correct option:
Identify Design**** I was select
Identify customer
Identify customers’ refer to those activities which try to find new customers and ways to serve
better to the existing ones, e.g, surveys and market research;
Question # 5 of 10 ( Start time: 11:45:11 AM )
Total Marks: 1
In which type of approach, we further dig the data for retrieving information from data warehouse?
Select correct option:
Slice
Dice
Drill down
Roll up
Using drill-down we can further dig the data to receive some specific information.
For example using that I can find the sale of furniture in a specific month of the first quarter, say,
February
Question # 2 of 10 ( Start time: 11:42:39 AM )
Total Marks: 1
Supply Chain Mangment broken down into ___________.
Select correct option:
Upstream activities
Internal activities
Downstream activities
All of Above
Supply chain can be broken into three parts, that is, upstream activities, internal activities and
downstream activities
Question # 8 of 10 ( Start time: 11:48:11 AM )
Total Marks: 1
Poter Market and sell activities relates to _____________.
Select correct option:
advertising, promotions
managing salespersons
monitoring distribution channel
All of Above
‘Market and sell’ activities give buyers a way to purchase and provide inducement for them to do
so
, e.g, advertising, promotions, managing salespersons, monitoring distribution channel, pricing
etc.
==========done
VAN can _____.
Select correct option:
Reduce network traffic
Provide protocol compatibility between the sender and the recipient, wherever that is missing.
Question # 2 of 10 ( Start time: 10:25:45 AM )
Total Marks: 1
What is true about Personal finance?
Select correct option:
Sell you products in no time.
Buy you products in no time.
allows the management of your financial matters in a customized manner.
None
Question # 3 of 10 ( Start time: 10:26:36 AM )
Total Marks: 1
A value chain is a way of organizing activities that each strategic business unit undertakes to
___________.
Select correct option:
design
produce
promote
All of Above
A value chain is a way of
organizing activities that each strategic business unit undertakes to design, produce, promote, market,
deliver and support the products or services it sells.
Question # 4 of 10 ( Start time: 10:27:47 AM )
Total Marks: 1
Activities associated with the flow and transformation of goods from the raw materials stage all the way
to the end user ___________.
Select correct option:
Marketing
Suply Chain Managment
ERP
Online Chain Control
Supply chain includes all the activities associated with the flow and transformation of goods from the
raw materials stage all the way to the end user. Supply chain can be broken into three parts, that is,
upstream activities, internal activities and downstream activities.
Question # 5 of 10 ( Start time: 10:28:35 AM )
Total Marks: 1
Porter Market and sell activities relates to _____________.
Select correct option:
advertising, promotions
managing salespersons
monitoring distribution channel
All of Above
Market and sell’ activities give buyers a way to purchase and provide inducement for them to do
so, e.g, advertising, promotions, managing salespersons, monitoring distribution channel, pricing
etc. Page 152
Question # 6 of 10 ( Start time: 10:29:59 AM )
Total Marks: 1
Technology development relates to activities ___________.
Select correct option:
fields tests
maintenance of procedures
process improvement studies
All of Above
Technology development’ relates to activities which help improve product/service that a business
is selling and also help improve processes in every primary activity, e.g, fields tests, maintenance of
procedures, process improvement studies etc.
In personal finance what is true?
Select correct option:
online data is imported automatically into the register.
transactions maintained by the software package.
account/transaction details are downloaded through the internet.
All of Above
In personal finance online data
is imported automatically into the register of transactions maintained by the software package as the
account/transaction details are downloaded through the internet.
Question # 8 of 10 ( Start time: 10:31:35 AM )
Total Marks: 1
___________ strategy is defined as concentration on a single aspect of the market.
Select correct option:
Focus
Differentation
Focus strategy is defined as concentration on a single aspect of the market.
Question # 9 of 10 ( Start time:
10:32:02 AM )
Total Marks: 1
Popular software packages for personal finance are ___________.
Select correct option:
Quicken
MS Money
Money 2003
All of Above
Question # 10 of 10 ( Start time:
10:32:57 AM )
Total Marks: 1
Which of these is NOT a stage of knowledge discovery process?
Select correct option:
Transformation
Data mining
Pattern evaluation
Process evaluation
A knowledge discovery process includes data cleaning, data integration, data selection, data
transformation, data mining, pattern evaluation and knowledge presentation.
Total Marks: 1
Strategic business unit is a combination of a particular _____________.
Select correct option:
product
distribution channel
customer type
All of Above
A strategic business unit is a combination of a particular product, distribution channel and customer
type.
1) In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT
included:
Select correct option:
Buyer Accounts identifier
Buyer password
Address of Merchant
Actual amount of money in favor of merchant
2) By adding which of the following to your website improve customer service?
Select correct option:
Attractive products
Banner Advertisement
Email links
Interactive Advertising
Reference:
E-mails can be used to improve customer service by adding an e-mail link to your web site. Thus, you
can
receive your customers’ complaints through e-mails. It should be ensured that your e-business is
capable of
3) Objective of any marketing strategy is to bring the customers quickly to the _________.
Select correct option:
Familiarity stage
Exploration stage
Separation stage
Commitment stage
4) Which of these is a tool that can be used to improve customer services?
Select correct option:
Log file analysis
Cookies
Data mining
All
5) How many stages involve in customer loyalty model for creating good customer relationship?
Select correct option:
6
5
4
3
www..net
6) Call handling, sales tracking and Transaction support(technology / personnel) activities are included in
which management system
Select correct option:
Customer Relationship Management system
Public relation management system
Inventory management system
Data Base Management system
7) You read about a company X in newspaper. Your relation with company X is at familiarity stage.
Select correct option:
True
False
8) JIT Stands for
Select correct option:
Just In Time
Joint investigation Technique
Join in Training
Just In Total
9) Let us, suppose that you have hosted early your e-commerce website to sell sweets online: Your
customers are acquaint with the name of your company and “DesiGhee Burfi ”. They have never
interacted with your company. Which of following loyalty stages they are?
Select correct option:
Awareness
Exploration
Familiarity
Commitment
Reference:
Awareness
This is the first stage where customers recognize the name of the company or any of its products.
However,
they have never interacted with the company before. A company/business can achieve this level by
properly
advertising its brand.
10) ET and SSL both are same with respect to security.
Select correct option:
True
False
11) Which statement is most appropriate description of the term “Interactive-advertisement”?
Select correct option:
By making an advertisement message using flash animation.
Putting an audio or video message on the website to attract customer.
By avoiding customer’s involvement in the advertisement process.
By involving the customer in the advertisement process itself.
12) Quiz Start Time: 04:28 PM
Time Left 88
sec(s)
Question # 1 of 10 ( Start time: 04:28:31 PM ) Total Marks: 1
Four P’s in Marketing Mix are
Select correct option:
Product, price, place, promotion
Price, person, place, problem
Place, product, property, promotion
Promotion, place, product, planning
13) Quiz Start Time: 04:28 PM
Time Left 87
sec(s)
Question # 2 of 10 ( Start time: 04:29:03 PM ) Total Marks: 1
Let us, suppose that you have hosted your e-commerce website, When you provide “opt-in e-mail”
option to your customers on your website and customer opt for it , what does it mean to receive ?
Select correct option:
Information about product through advertisement
Information about product through e-mail
Information about services available on it
Information about News through e-mail.
14) Quiz Start Time: 04:28 PM
Time Left 83
sec(s)
Question # 3 of 10 ( Start time: 04:30:16 PM ) Total Marks: 1
How many stages involve in customer loyalty model for creating good customer relationship?
Select correct option:
6
5
4
3
www..net
15) Quiz Start Time: 04:28 PM
Time Left 86
sec(s)
Question # 4 of 10 ( Start time: 04:30:55 PM ) Total Marks: 1
Free-Trial advertisement means _________.
Select correct option:
Free coupons are placed on certain websites for customers so that they can use it for shopping.
Customer is offered to use the product free of cost for a specific amount of time.
Items bought are delivered to the customers with no delivery cost.
The company didn’t had to pay for this advertisement
16) Quiz Start Time: 04:28 PM
Time Left 87
sec(s)
Question # 5 of 10 ( Start time: 04:31:46 PM ) Total Marks: 1
What is the right sequence of steps involved in development of customer’s relationship with the
business?
Select correct option:
Familiarity, Awareness, Commitment, Exploration, Separation
Awareness, Exploration, Familiarity, Commitment, Separation
Familiarity, Awareness, Exploration, Commitment, Separation
Awareness, Commitment, Familiarity, Exploration, Separation
17) Quiz Start Time: 04:28 PM
Time Left 87
sec(s)
Question # 6 of 10 ( Start time: 04:33:04 PM ) Total Marks: 1
SETSET(secure Electronic Transaction) was developed in
Select correct option:
1995
1996
1997
1999
18) Quiz Start Time: 04:28 PM
Time Left 86
sec(s)
Question # 7 of 10 ( Start time: 04:34:49 PM ) Total Marks: 1
Some web retailers allow their customers to create their own product. It is called.
Select correct option:
One to one Marketing
One to many Marketing
Many to one marketing
All of the above
Reference:
Some web retailers allow their customers to create their own product. For example there are
computer companies online that allow their customers to choose component of a computer to
configure
their own computer according to their need. This is called one-to-one marketing.
19) Quiz Start Time: 04:28 PM
Time Left 84
sec(s)
Question # 8 of 10 ( Start time: 04:35:40 PM ) Total Marks: 1
Vertical Web portals are made for
Select correct option:
Single area
Broad range of topics
Wide variety of things
Broad range of topics and Wide variety of things
20) Quiz Start Time: 04:28 PM
Time Left 86
sec(s)
Question # 9 of 10 ( Start time: 04:36:45 PM ) Total Marks: 1
Which of following services build a strong customer loyalty towards company and its products?
Select correct option:
Customer services
Public relations(PR)
Bulletin board
Exhibitions
21) Question # 1 of 10 ( Start time: 04:42:31 PM ) Total Marks: 1
To overcome the lack of physical proximity appearance problem in e-business, which technology is going
to be used?
Select correct option:
Biometrics
Video conferencing
Cryptography
Biometrics and Video conferencing
22) Question # 2 of 10 ( Start time: 04:44:07 PM ) Total Marks: 1
Using SSL, we type in URL as :
Select correct option:
www..net
https
httpc
httpc
httpi
23) Question # 3 of 10 ( Start time: 04:45:14 PM ) Total Marks: 1
CRM stands for ...............
Select correct option:
Customer Relationship Management
Customer Related Management
Customer Resembling Management
Customer Reallocation Managemen
24) Question # 4 of 10 ( Start time: 04:45:41 PM ) Total Marks: 1
SET and SSL both are same with respect to security.
Select correct option:
True
False
25) Question # 5 of 10 ( Start time: 04:46:11 PM ) Total Marks: 1
In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT
included:
Select correct option:
Buyer Accounts identifier
Buyer password
Address of Merchant
Actual amount of money in favor of merchant
26) Question # 6 of 10 ( Start time: 04:46:42 PM ) Total Marks: 1
Which of following services build a strong customer loyalty towards company and its products?
Select correct option:
Customer services
Public relations(PR)
Bulletin board
Exhibitions.
27) Question # 7 of 10 ( Start time: 04:47:35 PM ) Total Marks: 1
Which of following marketing campaigns are cheap an effective way to target potential customers?
Select correct option:
Sale forces
Media promotion
Marketing software
28) Question # 8 of 10 ( Start time: 04:48:20 PM ) Total Marks: 1
Free-Trial advertisement means _________.
Select correct option:
Free coupons are placed on certain websites for customers so that they can use it for shopping.
Customer is offered to use the product free of cost for a specific amount of time.
Items bought are delivered to the customers with no delivery cost.
The company didn’t had to pay for this advertisement.
29) Question # 9 of 10 ( Start time: 04:48:59 PM ) Total Marks: 1
Which of the following option best represent “Data mining can improve response rate tremendously”?
Select correct option:
Direct mailing
Personalization technology
E-business
Opt-in e-mail
30) Question # 10 of 10 ( Start time: 04:50:29 PM ) Total Marks: 1
CPM is an advertising payment mode. CPM stands for ______.
Select correct option:
Cost Per Month
Cost Per Minute
Cost Per Megabyte
Cost Per Message
31) Which statement is most appropriate description of the term “Interactive-advertisement”?
Select correct option:
By making an advertisement message using flash animation.
Putting an audio or video message on the website to attract customer.
By avoiding customer’s involvement in the advertisement process.
By involving the customer in the advertisement process itself.
32) What does Telemarketing means?
Select correct option:
Marketing through charting
Marketing through telephone
Marketing through emai
Marketing through web casting
33) What is the right sequence of steps involved in development of customer’s relationship with the
business?
Select correct option:
Familiarity, Awareness, Commitment, Exploration, Separation
Awareness, Exploration, Familiarity, Commitment, Separation
Familiarity, Awareness, Exploration, Commitment, Separation
Awareness, Commitment, Familiarity, Exploration, Separation
34) www.amzon.com as you all familiar with it. Which of the following loyalty stages its customers are: (
Who don’t know about it): Detail about amzon.com Amazon was one of the first major companies to sell
goods by Internet, and was an iconic "stock in which to invest" of the late 1990s dot-com bubble. Jeff
Bezos founded Amazon.com, Inc. in 1994, and launched it online in 1995. Amazon.com started as an on-
line bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3 format, computer
software, , etc. Amazon has established separate websites in Canada, the United
Kingdom, Germany, France, China, andJapan. It also provides global shipping to certain countries for
some of its products.
Select correct option:
Awareness
Exploration
Familiarity
Commitment
35) Web catalogue revenue model includes
Select correct option:
a. Online sellers of computer
b. Gifts, flowers, clothes
c. Journals
d. A and B
36) Track the customers online and do personalization is only possible through which of the following
file(s) analysis.
Select correct option:
log files
cookie
data mining
log files and cookies.
Reference:
Cookies can be used to track customers online. Typically, a unique ID of the customer is stored in the
cookie file on the hard disk. Same ID is also stored in the database along with the record of previously
purchased items by the customer. When the customer again visits the online store, cookie (having
customer ID prepared against that URL) is transmitted by the browser to the server side. There, it is
matched with the ID in the database. This enables the merchant side to know that a particular customer
(with a known buying pattern) has come to visit again. By tracking the customer in this manner,
personalized recommendations for certain items can be made to the customer in real time.
37) In the template prefix, Template<class T> What kind of variable is the parameter T?
Select correct option:
T must be a class.
T must not be a class.
T can be only types built into the C++ language. ………… (Not sure L)
T can be any type, whether built into C++ or defined by the programmer.
38) Fee for Transaction Models include
Select correct option:
Travel Agents and Insurance brokers
Automobile Sales and event tickets
Stock brokers and online banking
All of the above
39) While designing a website, which of the following factors an internet marketer should pay attention
to?
Select correct option:
Easy site navigation (i.e. Site map)
Frequently asked questions (FAQs) section
Privacy policy
All of above
40) Question # 1 of 10 ( Start time: 05:17:27 PM ) Total Marks: 1
Four P’s in Marketing Mix are
Select correct option:
Product, price, place, promotion
Price, person, place, problem
Place, product, property, promotion
Promotion, place, product, planning
41) Question # 2 of 10 ( Start time: 05:17:43 PM ) Total Marks: 1
In…………………, there is no direct contact with the end users
Select correct option:
B2B
B2C
C2C
All
42) Question # 3 of 10 ( Start time: 05:18:01 PM ) Total Marks: 1
What is the right sequence of steps involved in development of customer’s relationship with the
business?
Select correct option:
Familiarity, Awareness, Commitment, Exploration, Separation
Awareness, Exploration, Familiarity, Commitment, Separation
Familiarity, Awareness, Exploration, Commitment, Separation
Awareness, Commitment, Familiarity, Exploration, Separation
43) Question # 4 of 10 ( Start time: 05:18:13 PM ) Total Marks: 1
Payment gateway is an organization which connects those entities to the internet which are offline.
Select correct option:
True
False
44) Question # 5 of 10 ( Start time: 05:18:55 PM ) Total Marks: 1
Customer Loyalty model is also called
Select correct option:
Customer Life Cycle
Customer Segmentation
Customer Awareness
All
45) Question # 8 of 10 ( Start time: 05:20:28 PM ) Total Marks: 1
Creation of separate experiences for customers based on their behavior is called
Select correct option:
Demographic segmentation
Behavioral segmentation
Geo-Graphic Segmentation
None of the above
46) Question # 9 of 10 ( Start time: 05:20:53 PM ) Total Marks: 1
Which of the following option best represent “Data mining can improve response rate tremendously”?
Select correct option:
Direct mailing
Personalization technology
E-business
Opt-in e-mail
47) Question # 10 of 10 ( Start time: 05:21:04 PM ) Total Marks: 1
Dividing the potential customers into groups is called
Select correct option:
Market Segmentation
Market Promotion
Market Research
Market Survey
48) Quiz Start Time: 05:24 PM
Time Left 89
sec(s)
Question # 1 of 10 ( Start time: 05:24:11 PM ) Total Marks: 1
Web catalogue revenue model includes
Select correct option:
a. Online sellers of computer
b. Gifts, flowers, clothes
c. Journals
d. A and B
49) Quiz Start Time: 05:24 PM
Time Left 88
sec(s)
Question # 2 of 10 ( Start time: 05:24:25 PM ) Total Marks: 1
Which entity does not include in SET(secure Electronic Transaction)?
Select correct option:
Seller
Buyer
Payment gateway
Bank
50) Quiz Start Time: 05:24 PM
Time Left 89
sec(s)
Question # 3 of 10 ( Start time: 05:25:05 PM ) Total Marks: 1
Call handling, sales tracking and Transaction support(technology / personnel) activities are included in
which management system
Select correct option:
Customer Relationship Management system
Public relation management system
Inventory management system
Data Base Management system
51) Quiz Start Time: 05:24 PM
Time Left 89
sec(s)
Question # 5 of 10 ( Start time: 05:25:32 PM ) Total Marks: 1
Do you think that "www.vu.edu.pk" can be considered as university's advertisement website?
Select correct option:
Yes
No
51) Quiz Start Time: 05:24 PM
Time Left 89
sec(s)
Question # 6 of 10 ( Start time: 05:26:29 PM ) Total Marks: 1
Traditionally Marketer use the market segmentation(s) like
Select correct option:
Geo-graphic Segmentation
Demographic Segmentation
Psychographic Segmentation
All of the above
52) Quiz Start Time: 05:24 PM
Time Left 89
sec(s)
Question # 7 of 10 ( Start time: 05:27:00 PM ) Total Marks: 1
Advertising Supported Revenue Model includes
Select correct option:
Yahoo portal
Employment sites
Newspaper Publishers
All of the above
53) Quiz Start Time: 05:24 PM
Time Left 89
sec(s)
Question # 8 of 10 ( Start time: 05:27:37 PM ) Total Marks: 1
SSL stands for
Select correct option:
Secure Socket Layer
Security Service Layer
Sub Secured Length
None of these
54) Quiz Start Time: 05:24 PM
Time Left 89
sec(s)
Question # 10 of 10 ( Start time: 05:28:22 PM ) Total Marks: 1
In e-business, market research is slower than offline business.
Select correct option:
True
False
55) ipher suite is a combination of
Select correct option:
Cryptographic Algorithm
Authentication methods
Security layers
Cryptographic Algorithm And Authentication methods
56) Question # 5 of 10 ( Start time: 05:36:53 PM ) Total Marks: 1
www.amzon.com as you all familiar with it. Which of the following loyalty stages its customers are: (
Who don’t know about it): Detail about amzon.com Amazon was one of the first major companies to sell
goods by Internet, and was an iconic "stock in which to invest" of the late 1990s dot-com bubble. Jeff
Bezos founded Amazon.com, Inc. in 1994, and launched it online in 1995. Amazon.com started as an on-
line bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3 format, computer
software, , etc. Amazon has established separate websites in Canada, the United
Kingdom, Germany, France, China, andJapan. It also provides global shipping to certain countries for
some of its products.
Select correct option:
Awareness
Exploration
Familiarity
Commitment
57) Question # 2 of 10 ( Start time: 05:43:49 PM ) Total Marks: 1
Which of the following is cheapest and quickest marketing technique to reach distant customers?
Select correct option:
E-Mail marketing
Telephone marketing
SMS marketing
Advertisement letters marketing
Quiz Start Time: 05:42 PM Time Left 89
sec(s)
58) Question # 3 of 10 ( Start time: 05:44:52 PM ) Total Marks: 1
JIT concept means
Select correct option:
No distribution channel
No warehousing
Easily delivery
No communication
59) Question # 6 of 10 ( Start time: 05:47:03 PM ) Total Marks: 1
Brick and Mortar refers to
Select correct option:
Offline business
Online business
Transport
Building
60) Question # 7 of 10 ( Start time: 05:48:16 PM ) Total Marks: 1
How many kinds of Web Portals are?
Select correct option:
3
2
5
6
61) Quiz Start Time: 05:42 PM Time Left 88
sec(s)
Question # 8 of 10 ( Start time: 05:49:06 PM ) Total Marks: 1
Press release can provide information about current events and news to, which of following, via a
internet?
Select correct option:
Print media
T.v commercial
Press or media
T.v program.
62) Question # 1 of 10 ( Start time: 05:53:24 PM ) Total Marks: 1
When you email at [email protected] , your email is automatically sorted and replied to your ID.
Select correct option:
True
False
63) Question # 5 of 10 ( Start time: 05:55:05 PM ) Total Marks: 1
Visitor’s location, IP address, time of visit related information are added, in which of the following
Select correct option:
call handling files
cookies
log files
Data mining files.
64) Question # 7 of 10 ( Start time: 05:55:50 PM ) Total Marks: 1
Which of following marketing campaigns are cheap an effective way to target potential customers?
Select correct option:
Sale forces
Media promotion
Marketing software
65) Question # 8 of 10 ( Start time: 05:56:06 PM ) Total Marks: 1
Suppose you are using "warid telecom" as your mobile connection and you ignor any other mobile
company's advertisement because you want to keep using warid no matter what others offer. Your
relationship with warid is at _____________.
Select correct option:
Exploration stage
Commitment stage
Awareness stage
Separation stage
66) Question # 9 of 10 ( Start time: 05:57:03 PM ) Total Marks: 1
Dividing potential customers on the basis of variables such as social class, personality, or lifestyle is
called__________.
Select correct option:
Demographic Segmentation
Geographic Segmentation
Psychographic segmentation
Behavioral segmentation
67) Question # 1 of 10 ( Start time: 06:02:08 PM ) Total Marks: 1
Do you think, vulms.vu.edu.pk is an example of E-mail marketing?
Select correct option:
True
False
68) Which one is not an example of search engine?
Select correct option:
Yahoo
Alta vista
Gawab
69) Let us, suppose that you have hosted early your e-commerce website to sell sweets online: Your
customers are acquaint with the name of your company and “DesiGhee Burfi ”. They have never
interacted with your company. Which of following loyalty stages they are?
Select correct option:
Awareness
Exploration
Familiarity
Commitment
70) Which 5th P introduced by E-business in Marketing Mix?
Select correct option:
Proper coverage
Personalized Services
Proper access
Personal style
71) ETSET(secure Electronic Transaction) was developed by
Select correct option:
Microsoft
Netscape Navigator
Master Cards and VISA
All of the options
72) Which of these can be used for advertisement purpose?
Select correct option:
Telephone
Newspapers
Magazines
All of above
73) Question # 5 of 10 ( Start time: 06:21:36 PM ) Total Marks: 1
Which of the following is a method for conducting market research?
Select correct option:
Phone
Interviews
Questionnaires
All of above
74) Which of the following is NOT an advertising payment mode?
Select correct option:
Pay-per-sale
Pay-per-click
Pay-per-keypress
Pay-per-lead
75) Question # 1 of 10 ( Start time: 06:25:05 PM ) Total Marks: 1
Advertising Subscription Mixed Revenue Model includes
Select correct option:
Online journals
Sports information services
Business week online
All of the above
76) Question # 2 of 10 ( Start time: 06:25:59 PM ) Total Marks: 1
Digital Content Revenue Model Includes
Select correct option:
Legal information services
Online journals
Online Libraries
All of the above
77) Question # 4 of 10 ( Start time: 06:27:06 PM ) Total Marks: 1
Which of these is a tool that can be used to improve customer services?
Select correct option:
Log file analysis
Cookies
Data mining
All
78) Question # 9 of 10 ( Start time: 06:29:26 PM ) Total Marks: 1
Which of the following is an advertising payment mode?
Select correct option:
Pay-per-person
Pay-per-page
Pay-per-sale
Pay-per-minute
79) Question # 10 of 10 ( Start time: 06:29:52 PM ) Total Marks: 1
If a company's marketing stretegy is focusing on customers having age less than 30, which of the
following marketing segmentation technique is being used by company?
Select correct option:
Demographic Segmentation
Geographic Segmentation
Psychographic segmentation
Behavioral segmentation
80) E-Business promotions are used to _______.
Select correct option:
Attract the customer to the product and convince him/her to buy it.
Get credit card information from the customer.
Complete a transaction between customer and seller.
SETSET(secure Electronic Transaction) was developed by Select correct option: Microsoft Netscape Navigator Master Cards and VISA All of the options
SSL stands for
Select correct option:
Secure Socket Layer
Security Service Layer
Sub Secured Length
None of these
What is basic advantage of symmetric algorithms?
Select correct option:
Symmetric key does not use any encryption
Symmetric algorithms are faster
Symmetric algorithms are easy to understand
All of above
Which of these keys can be used for encryption instead of using pair of private and public keys?
Select correct option:
Systematic key
Asymmetric key
Symmetric key
All of above
Using SSL, we type in URL as :
Select correct option:
https
httpc
httpc
httpi
Reference:
(Page # 121)
In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT
included:
Select correct option:
Buyer Accounts identifier
Buyer password
Address of Merchant
Actual amount of money in favor of merchant
A unique large number, generated as a result of applying hash function on a message is called ______.
Select correct option:
Hash message
Message digest
Digitally singed message
Secret message
Reference:
(page # 103)
FVIPSS stands for _______.
Select correct option:
First Virtual Internet Payment System Server
First Virtual International Payment System Server
First Virtual International Payment System Services
First Virtual Internal Payment System Services
Reference:
(Page # 110)
Virtual PIN Payment system is considered suitable for ________.
Select correct option:
Low-cost items
High-cost items
Very expensive items
Every kind of items
Which of these is a primary participant in E-Cash Payment system?
Select correct option:
Buyer
Bank
Merchant
All
Most of the electronic payment systems on internet use cryptography.
Select correct option:
True
False
In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded
signed coins from last …………………withdrawals to the E-bank.
Select correct option:
10
12
14
16
Reference:
(page # 119)
The key feature of E-Cash Payment system is
Select correct option:
Anonymity
Security
Cryptography
None of these
Reference:
(page # 116)
At minting stage, the client is ……………..by E-Cashbank
Select correct option:
Known
Unknown
Secret
informed
Reference:
(page. 118)
Cipher suite is a combination of
Select correct option:
Cryptographic Algorithm
Authentication methods
Security layers
Cryptographic Algorithm And Authentication methods
Reference:
(page. 121)
SETSET(secure Electronic Transaction) was developed in
Select correct option:
1995
1996
1997
1999
Reference:
(page no. 122)
Symmetric algorithms are faster than asymmetric. Select correct option: True False Reference: (Page # 105) Which entity does not include in SET(secure Electronic Transaction)? Select correct option: Seller Buyer Payment gateway Bank Reference: (Page # 122) A paper signature is believed to be more reliable than a digital signature. Select correct option: True False If a key is 4 bit in length, how many unique key values are possible? Select correct option: 4 8
16 32 Explanation: A key value is always in binary form. A Binary Number is made up of only 0s and 1s. So each digit has only two possibilities: 0 or 1, So now we try to check all possible values of 4. 4 bit = 0000, 0001,
0010, 0100, 1000, 0011, 0110, 1100, 0101, 1010, 1011, 1101, 1001, 1110, 0111, 1111
Hence prove that if a key is 4 bit in length, then 16 unique key values are possible of that key. Hash function is a __________ Select correct option: Communication protocol Hardware device Encryption mechanism Log file Which of these attacks have been reported on symmetric key algorithms? Select correct option: Key Search Attacks Cryptanalysis System-Based Attacks All Reference: (Page # 108) Payment gateway is an organization which connects those entities to the internet which are offline. Select correct option: True False Reference: (Page # 122) How many elements an e-coin has? Select correct option: 1
2 3 4 Reference: (page # 116) EFT stands for _____________. Select correct option: Electronic Film Transmission Electronic Funds Transfer Electronic File Translation None of above Reference: (Page # 114)
________ is used to interpret and show contents of the webpage.
Select correct option:
HTML
Notepad
Browser
Computer
What is identified by the tag ?
Select correct option:
Horizontal frame
Bottom Frame
Top Frame
Vertical Frame
Which of the following is NOT an advantage of CSS?
Select correct option:
Define the look of your pages in one place
Works on version 4 browsers or newer
Easily change the look
Implement same formatting each time tag is used.
Links are used to connect ____________.
Select correct option:
Images
Text
Images and web documents
All of the given
Do you think that "www.vu.edu.pk" can be considered as university's advertisement website?
Select correct option:
Yes
No
Characterization and Clustering belong to which of the following types of Data Mining?
Select correct option:
Predictive
Selective
Descriptive
Additive
Reference:
(Page # 141)
Traditionally Marketer use the market segmentation(s) like
Select correct option:
Geo-graphic Segmentation
Demographic Segmentation
Psychographic Segmentation
All of the above
Reference:
(Page # 131)
Advertising Subscription Mixed Revenue Model includes
Select correct option:
Online journals
Sports information services
Business week online
All of the above
OLAP stands for……………
Select correct option:
Online Analytical Program
Online Analytical Processing
Online Application Program
Online Analysis Performance
Reference:
(Page # 145)
E-Business promotions are used to _______.
Select correct option:
Attract the customer to the product and convince him/her to buy it.
Get credit card information from the customer.
Complete a transaction between customer and seller.
None of above
Reference:
(Page # 133)
Television, radio and print media are in a (n) ……………………. Mode.
Select correct option:
Passive
Active
Static
Dynamic
Reference:
(Page # 139)
CRM stands for ...............
Select correct option:
Customer Relationship Management
Customer Related Management
Customer Resembling Management
Customer Reallocation Management
Reference:
(Page # 136)
Which one is not an example of search engine?
Select correct option:
Yahoo
Alta vista
Gawab
Reference:
(Page # 137)
Meta tag contains:
Select correct option:
User information
seller information
web page key information
bank information
Reference:
(Page # 138)
Free-Trial advertisement means _________.
Select correct option:
Free coupons are placed on certain websites for customers so that they can use it for shopping.
Customer is offered to use the product free of cost for a specific amount of time.
Items bought are delivered to the customers with no delivery cost.
The company didn’t had to pay for this advertisement.
Reference:
(Page # 133)
In many countries, stealing and misusing of meta information for getting competitive advantage is
considered as an offence known as
Select correct option:
Tort of Private Nuisance
Tort of Tress passing
Tort of passing off
Defamation
Reference:
(Page # 138)
If a company's marketing stretegy is focusing on customers having age less than 30, which of the
following marketing segmentation technique is being used by company?
Select correct option:
Demographic Segmentation
Geographic Segmentation
Psychographic segmentation
Behavioral segmentation
Reference:
(Page # 131)
Press release can provide information about current events and news to, which of following, via
internet?
Select correct option:
Print media
T.v commercial
Press or media
T.v program.
Reference:
(Page # 135)
Fee for Transaction Models include
Select correct option:
Travel Agents and Insurance brokers
Automobile Sales and event tickets
Stock brokers and online banking
All of the above
Reference:
(Page # 130)
An E-Business can't have direct feedback from the customer in B2C.
Select correct option:
True
False
Creation of separate experiences for customers based on their behavior is called
Select correct option:
Demographic segmentation
Behavioral segmentation
Geo-Graphic Segmentation
None of the above
Reference:
(Page # 132)
What is the right sequence of steps involved in development of customer’s relationship with the
business?
Select correct option:
Familiarity, Awareness, Commitment, Exploration, Separation
Awareness, Exploration, Familiarity, Commitment, Separation
Familiarity, Awareness, Exploration, Commitment, Separation
Awareness, Commitment, Familiarity, Exploration, Separation
Reference:
(Page # 136)
At deposit stage, the serial number is ……………..by E-Cashbank
► Known
► Unknown
► Kept Secret
► Informed
Reference:
(Page # 118)
How many kinds of Web Portals are?
► 3
► 2
► 5
► 6
Explanation:
There are only two kinds of web portals, one is vertical portals which provides information about single
interest like online shopping sites are best example of vertical portal site, educational site is also an
example of vertical portal. Second kind of web portal is horizontal web portals which provide
information about everything or multiple things. Search engine is best example of horizontal web portal.
Reference:
(page # 129)
Let us, suppose that you have hosted your e-commerce website,
When you provide “opt-in e-mail” option to your customers on your website and customer opt for it ,
what does it mean to receive ?
► Information about product through advertisement
► Information about product through e-mail
► Information about services available on it
► Information about News through e-mail.
Reference:
(page # 133)
Track the customers online and do personalization is only possible through which of the following
file(s) analysis.
► log files
► cookie
► data mining
► log files and cookies.
Reference:
(page # 136)
When customer life cycle is used to create different groups of customers, it is called?
► Targeting Customers
► Dynamic groups
► Customer Life Cycle Segmentation
► Group Development
Reference:
(page # 137)
Network addresses 128--- 191 range belongs to which of the following class networks? ► A
► B
► C
► E
Reference:
(page # 10)
Which of the following property falls in HTTP? ► Stateless
► Stateful ► Temporary ► All of these
Reference:
(page # 3)
FSTC stands for:
► Financial Services Technology Consortium
► Financial Secrets Technology Consortium ► Final Security threats control ► First Service Technology Consortium
Reference:
(page # 113)
Supply chain can be broken into three parts, that is ----------------- , ----------------------- and -------------------
- activities.
► Internal, external support
► Upstream, internal ,downstream
► Primary, Secondary ,R&D
► None of them
Reference:
(page # 155)
The process of taking active role in working with suppliers to improve products and processes is
called?
► Value chain management
► Supply chain management
► Supply chain management software
► Porter Model
Reference:
(page # 155)
What is Ultimate consumer orientation?
► Primary objective of supply chain is to help each company to meet needs of the consumer at the end
of supply chain.
► Secondary Primary objective of supply chain is to help each company to meet needs of the consumer
at the end of supply chain.
► Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of
supply chain.
► None of them
Reference:
(page # 156)
Many search engines rank the site by using a program called ► Spider
► Scorpion ► Moon ► Cobweb
Reference:
(page # 138)
E-commerce is a combination of three different areas of study, namely, --------,
---------------- and ----------------
► Internal, external support, Support
► Technology, business and law/policy
► Primary, Secondary, R&D
► Sale, purchase, feed back
Reference:
(page # 161)
In which type of data mining, Apriori algorithms is used? ► Classification ► Association
► Characterization ► Clustering
Reference:
(page # 143)
EDI has the key feature(s) ► No paper work ► No human intervention ► Exchange of information takes place in seconds ► All of these
Reference:
(page # 147)
Addresses are tied to the device itself and give no clue to it's location on a global scale. This is the
characteristics of
► IP
► RIP
► MAC
► None of the given
When two or more intranets are connected to each other they form a/an ------------- .
► intranet
► internet
► extranet
► VPN
Reference:
(page # 2)
Which attribute can be used to make a region non-clickable?
► none of the given
► target
► alt
► nohref
Reference:
(page # 37)
Which of the following payment mode does not require customer to pay interest to the bank on each
transaction?
► Credit card
► Debit card
► Electronic check
► All of the above
Reference:
(page # 110)
Cyber wallet can automatically assemble the correct payment and pay it too.
► True
► False
SET doesn’t require special software on the client or merchant side.
► True
► False
Which model allows the users to log-on on a website and assume the role of bidder or seller?
► Online Banking.
► Storefront Model.
► E-Learning.
► Auction Model.
Reference:
(Page # 128)
According to Michael Porter, “fabricating” is an example of primary activity in a strategic business
unit. Identify the area in which this task is performed.
► Market and sell
► Deliver’ activities relate to storage
► Purchase materials and supplies
► Manufacture product or create service
Reference:
(Page # 152)
Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish
the wrong-doer. Is it?
► True
► False
In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, --
-------------- and ----------
► Acceptance and consideration
► Acceptance and Rejection
► Approval and consideration
► None
Reference:
(page # 178)
In online environment acceptances may be issued by an imposter/cheater that has authority to bind
the online business
► True
► False
#00ff00 in HTML indicates
► Pure green color
► Pure blue color
► Pure red color
► Pure yellow color
Reference:
(Page # 23)
Virtual PIN Payment System requires both merchant and buyer to register with _______________.
► Auto Clearing House (ACH)
► First Virtual (FV)
► DSS (Digital Signature Standard)
► DES (Data Encryption Standard)
Reference:
(Page # 110)
Classification and Association belong to which of the following types of Data Mining?
► Selective ► Predictive
► Descriptive ► Additive
Reference:
(Page # 141)
Which one of the followings is an example of Banner advertising?
Select correct option:
Branding
Affiliate programs
Partnership
All of these
Reference:
(Page # 138)
CPM is an advertising payment mode. CPM stands for ________.
Select correct option:
Cost Per Month
Cost Per Minute
Cost Per Megabyte
Cost Per Message
Reference:
(Page # 134)
Which one is not an example of search engine?
Select correct option:
Yahoo
Alta vista
Gawab
Reference:
(Page # 137)
In which type of approach, we further dig the data for retrieving information from data warehouse?
Select correct option:
Slice
Dice
Drill down
Roll up
Reference:
(Page # 146)
Let us, suppose that you have hosted your e-commerce website, Promotion messages can be sent
when potential client is
Select correct option:
online
offline
both online and offline
visiting head office
Reference:
(Page # 133)
Digital Content Revenue Model Includes
Select correct option:
Legal information services
Online journals
Online Libraries
All of the above
Reference:
(Page # 130)
Which of these is a tool that can be used to improve customer services?
Select correct option:
Log file analysis
Cookies
Data mining
All
Reference:
(Page # 136)
What does Telemarketing means?
Select correct option:
Marketing through charting
Marketing through telephone
Marketing through emai
Marketing through web casting
Reference:
(Page # 133)
In which type of data mining, ID3 algorithms is used?
Select correct option:
Classification
Association
Characterization
Clustering
Reference:
(Page # 141)
Some web retailers allow their customers to create their own product. It is called.
Select correct option:
One to one Marketing
One to many Marketing
Many to one marketing
All of the above
Reference:
(Page # 132)
Free-Trial advertisement means ___________.
Select correct option:
Free coupons are placed on certain websites for customers so that they can use it for shopping.
Customer is offered to use the product free of cost for a specific amount of time.
Items bought are delivered to the customers with no delivery cost.
The company didn’t had to pay for this advertisement
Reference:
(Page # 133)
Total Marks: 1
The length of a message digest is ________.
Select correct option:
32 to 64 bits
64 to 128 bits
128 to 256 bits
256 to 512 bit
Reference:
(Page # 103)
Key version represents public key by
Select correct option:
Buyer
Seller
E-Bank
Certification Authority
Reference:
(Page # 116)
The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to
the ___________.
Select correct option:
Bank
Merchant
Client
None
Reference:
(Page # 116)
ACH is a centralized system used by different interconnected banks for clearing payment requests.
Select correct option:
True
False
Centralized Account Payment Model uses unique _______ of users as their account identifier.
Select correct option:
Residence address
E-mail address
Office address
None
Reference:
(Page # 113)
SET and SSL both are same with respect to security.
Select correct option:
True
False
What are the security threats in VPS?
Select correct option:
a. Email hacking
b. Credit card number stolen
c. Missing of delivery
d. A and B
What is function of Cyberwallet?
Select correct option:
Store coins
Manage Coins
Record transactions
All of above
SET and SSL both are same with respect to security.
Select correct option:
True
False
Basic difference between Virtual PIN Payment System and Electronic Check is _____.
Select correct option:
Encryption
Registration with bank
No. of participants
There is no difference between them
MIDTERM EXAMINATION Spring 2009
IT430- E-Commerce (Session - 3)
http://www.vustudents.net
Question No: 1 __ ( Marks: 1 ) - Please choose one
In which protocol, the messages are not deleted fro m email server.
SMTP
POP3
IMAP (page 18)
ICMP
Question No: 2 ( Marks: 1 ) - Please choose one
Which HTML tag is used to define the internal style sheet ?
<css>
<script >
<sheet>
<style>
ref
http://www.ex-designz.net/test_grade.asp?tid=37
Question No: 3 ( Marks: 1 ) - Please choose one
For which one of the following,<MARQUEE ...> tag can work better
News headlines
Announcements
Sound pulgin
Movie controls
Ref
http://www.htmlcodetutorial.com/_MARQUEE.html
Question No: 4 __ ( Marks: 1 ) - Please choose one
Choose the correct HTML code line which left-align the content inside a tablecell.
<td leftalign>
<td valign="left">
<td align="left"> (page 26)
<tdleft>
Question No: 5 __ ( Marks: 1 ) - Please choose one
How do you write a conditional statement for execut ing some statements only if "i" is
NOT equal to 5?
if =! 5 then
if (i != 5) (page 58)
if <>5
if (i <> 5)
Question No: 6 ( Marks: 1 ) - Please choose one
What is the correct JavaScript syntax to write "Vir tual University of Paistan"?
document.write("Virtual University of Paistan ")
("Virtual University of Paistan ")
" Virtual University of Paistan "
response .write( "Vi rtual University of Paistan ")
Question No: 7 __ ( Marks: 1 ) - Please choose one
We can divide the Client Server architecture up to:
3 Tier
N -Tier
1 Tier
2 Tier
ref
[PPT]
CLIENT SERVER ARCHITECTURE
Question No: 8 ( Marks: 1 ) - Please choose one
Choose which one is the not the columns of Log file s.
IP addresses
Request (url)
Date
Contents (page 136 and 3)
Question No: 9 __ ( Marks: 1 ) - Please choose one
An address represented by four decimal numbers sepa rated by a period is the
IP (PAGE 7)
RIP MAC
NON OF THE GIVEN
Question No: 10 ( Marks: 1 ) - Please choose one
Which operator is used to concatenate two strings?
+ (PAGE 61)
*
&&
&
Question No: 11 __ ( Marks: 1 ) - Please choose one
Which SQL statement is used to extract data from a database?
GET (page 83)
OPEN
SELECT
EXTRACT
Question No: 12 __ ( Marks: 1 ) - Please choose one
Which firewall uses strong user authentication to v erify identity of a host
attempting to connect to the network?
Packet filter firewall Circuit
level firewall Application (PAGE 96)
gateway firewall
Hybrid firewall
Question No: 13 __ ( Marks: 1 ) - Please choose one
In CSS, How do you make each word in a text start w ith a capital letter?
text-transform :capitalize
text-transform: uppercase
text:capitalize
You can't do that with CSS
REF
http://www.ex-designz.net/test_page.asp?tid=37
Question No: 14 __ ( Marks: 1 ) - Please choose one
Why we use reset tag in HTML?
To remove the text written in Notepad.
To remove the text written in between <body> and </ body>tag.
To remove the text written in between <head> and </ head> tag.
To remove the text written in between <form> and </ form> tag.
Question No: 15 ( Marks: 1 ) - Please choose one
http://cs.vu.edu is an example of
Two zone domain name
Three zone domain name (page 12)
Four zone domain name
Five zone domain name
Question No: 16 __( Marks: 1 ) - Please choose one
In data link layer, data packets are placed inside
Data frames (page 6)
Data boxes
Data streams
None of these
Question No: 17 __ ( Marks: 1 )
What are the two types of twisted pair cables for n etworking ?
Question No: 18 ( Marks: 1 )
What it stands for IIS?
Question No: 19 __ ( Marks: 2 )
When does we use the parseFloat() function?
Question No: 20 ( Marks: 3 )
Name the JavaScript function that convert strings t o float numbers. How do you
give the function a string value to convert to a nu mber?
Question No: 21 __ ( Marks: 5 )
Write your personal profile in a file saving it wit h the extension of e.g. “abc.js”and then call it in
a JavaScript code.
Question No: 22 ( Marks: 10 )
Explain any three of the outside attacks briefly.
MIDTERM EXAMINATION
Spring 2009
IT430- E-Commerce (Session - 3)
http://www.vustudents.net
Question No: 1 __ ( Marks: 1 ) - Please choose one
Which one of the following ,divides large network i n small logical segments called subnets on basis of IP addresses
Routers (page 16)
Bridge
None of these
Switches
Question No: 2 ( Marks: 1 ) - Please choose one
Which one is not included in the networking topolog ies?
Star Topology
Bus Topology
Media Topology
Ring Topology
Question No: 3 __ ( Marks: 1 ) - Please choose one
At line code 5 which of the following Css methods h as been applied?
<html>
<head>
1. <style type= "text/css ">
2. h3 {font-family: times}
3. p {font-family: courier}
4. p.sansserif {font-family: sans-serif}
</style>
5. <Link rel= ”stylesheet ” type= ” text/css ” herf= ”mystyle.css ”>
</head>
<body>
6. <h3 style= ” font-size:40pt ”>This is header 3</h3>
</body>
</html>
mystyle.css:
h3{ color: red}
Browser default
External style sheet
Inline style
Internal style sheet
Question No: 4 ( Marks: 1 ) - Please choose one
Which attribute is used in a tag to control the lay out of element?
view
css
Style
Layout
Ref
http://www.yourhtmlsource.com/stylesheets/csslayout .html
Question No: 5___( Marks: 1 ) - Please choose one W hat is the correct HTML
for making a hyperlink? http://www.vustudents.net
<a url=" http://www.w3schools.com ">W3Schools.com </a>
<a>http://www.w3schools.com </a>
<a h ref= "http ://www.w3schools.com ">W3Schools</a> (page 23)
<a name=" http://www.w3schools.com ">W3Schools.com </a>
Question No: 6 ( Marks: 1 ) - Please choose one
How do you write a conditional statement for execut ing some statements only if "i" is
NOT equal to 5?
if =! 5 then
if (i != 5) (repeated)
if <>5
if (i <> 5)
Question No: 7 __ ( Marks: 1 ) - Please choose one
How many different kind of loops are there in JavaS cript?
One. The "for" loop only
Two. The "for" loop and the "while" loop
Four. The "for" loop, the "while" loop, the "do...w hile" loop, and the "loop.. .until" loop
None of the above
REF
http://www.ex-designz.net/test_grade.asp?tid=65
Question No: 8___( Marks: 1 ) - Please choose one
What does DTD stand for?
Do The Dance.
Dynamic Type Definition.
Data Type Definition. (page 76)
Direct Type Définition.
Question No: 9 ( Marks: 1 ) - Please choose one
Which of the following needs human action to execut e?
Virus (page 94)
Worm
Trojan Horse
All of these
Question No: 10 __ ( Marks: 1 ) - Please choose one
For showing image on web page, save your image at a ny drive or folder like C:\abc.jpeg is an example of
Relative Address
Absolute address
None of the given
Ref
Absolute paths are called that because they refer t o the very specific location, including the domain name. The absolute path to a Web element is also often referred to as the UR
Question No: 11 __ ( Marks: 1 ) - Please choose one
ASP server scripts are surrounded by delimiters, wh ich?
<script>.. .</script>
<%...%>
<%>...</%>
<&>...</&>
ref
http://www.w3schools.com/asp/asp_syntax.asp
Question No: 12 ( Marks: 1 ) - Please choose one
This is an example of
0-tier architecture
1-tier architecture
2-tier architecture
n-tier architecture
Question No: 13 __ ( Marks: 1 ) - Please choose one
Which protocol is used to set up the dial up connec tion between RAC and RAS
for exchange of data packets? http://www.vustudents .net
PPP (page 98)
POP3
SMTP
FTP
Question No: 14 ( Marks: 1 ) - Please choose one
Pretty Good Privacy (PGP) is the name of a popular _________system which is available for general public use.
Filtering
Cryptographic (page 100)
Server
Security
Question No: 15 ( Marks: 1 ) - Please choose one
Intra Business involves only selling of corporate p roducts to consumer.
True (page 2)
False
Question No: 16 __ ( Marks: 1 ) - Please choose one
#00ff00 in HTML indicates
Pure green color (page 23)
Pure blue color
Pure red color
Pure yellow color
Question No: 17 ( Marks: 1 )
What is the function of TCP protocol at TCP/IP stac k?Give precise answer.
Question No: 18 __ ( Marks: 1 )
What do you say that Cookies can also be used to ma intain state between two broken sessions. Justify with solid argument
Question No: 19 __ ( Marks: 2 )
What is bandwidth of a network?
Question No: 20 ( Marks: 3 )
What is the purpose of padding? How many types of p adding are: Name of these?
Question No: 21 __ ( Marks: 5 )
Write any four essential features and two extra fea tures which should exist in E-Commerce
soft wares.
Question No: 22 ( Marks: 10 )
Differentiate the one tier, two tiers, three tiers and four tiers separately with respect to client
server architecture.
MIDTERM EXAMINATION Spring 2009
IT430- E-Commerce (Session - 2)
http://www.vustudents.net
Question No: 1 __ ( Marks: 1 ) - Please choose one
For which of the following we need to know the clas sification of E-commerce?
Market planning strategy
Build Mission statement
Management strategy
none
Question No: 2 ( Marks: 1 ) - Please choose
one Who is making the Web standards?
Netscape
Internet service providers
The World Wide Web Consortium
Microsoft
Question No: 3 __ ( Marks: 1 ) - Please choose one
When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called
Local Variables
Global Variables
Local and Global
None of the above
Ref
http://www.authorpick.net/what-is-variables-in-prog ramming-language/
Question No: 4___( Marks: 1 ) - Please choose one
There is a way of describing XML data, how?
XML uses a description node to describe data
XML uses a DTD to describe the data (page 75)
XML uses XSL to describe data
None of these
Ref
http://www.dotnetspider.com/questions/ViewQuestion. aspx?QuestionId=6754&
Question No: 5 ( Marks: 1 ) - Please choose
One which of the following property falls in HTTP?
Stateless (repeated)
State full
Temporary
All of these
Question No: 6 ( Marks: 1 ) - Please choose one
Choose the correct HTML tag to make a text bold
<tbold>
<b>
<bld>
<bold>
Question No: 7 ( Marks: 1 ) - Please choose one
What is the default scripting language in ASP?
EcmaScri pt
JavaScri pt
Java
VBScript (page 85)
Question No: 8 __ ( Marks: 1 ) - Please choose one
Which one of them is not a feature of e-commerce so ftware?
catalog display
web hosting (page 92)
web services
transaction processing
Question No: 9 ( Marks: 1 ) - Please choose one
When two or more intranets are connected to each ot her they form a/an ----------
VPN
Intranet
Internet
Extranet (page 2)
Question No: 10 ( Marks: 1 ) - Please choose one
Pretty Good Privacy (PGP) is the name of a popular _________system which is available for general public use. http://www.vustudents.net
Filtering
Cryptographic (page 100)
Server
Security
Question No: 11 __ ( Marks: 1 ) - Please choose one
Which one is NOT a valid frame attribute?
NORESIZE
ROWS (page 33)
FRAMEBORDER
BORDER
Question No: 12 ( Marks: 1 ) - Please choose one
IP version 6 provides ---------------bits and also contains ----------------------
128, hexadecimal (page 11)
64, hexadecimal
32, binary
None of the Above
Question No: 13 ___( Marks: 1 ) - Please choose one
A JavaScript event is generated when a user ------- - .
clicks a hyperlink
clicks a button
enters data in a form
all of the above (page 54)
Question No: 14 __ ( Marks: 1 ) - Please choose one
Creating your own tags is not possible in HTML but in XML it is possible to create your own tags.
True
False
Question No: 15 __ ( Marks: 1 ) - Please choose one
IP, RIP, and ARP protocols work on
Application layer
Session layer
Network layer (page 6)
Data link layer
Question No: 16 __ ( Marks: 1 ) - Please choose one
In the communication between two computers on a net work, CRC is calculated at
Sender’s side
Receiver ’s side
Both sender and receiver sides
Neither on sender nor on receiver side
Ref
[PPT]
Business Data Communications and Networking
Question No: 17 ( Marks: 1 )
What is the function of ARP protocol at TCP/IP stac k?Give precise answer.
Question No: 18 __ ( Marks: 1 )
Do you agree or not that in In Java Script we are n ot provided with certain
already defined objects which are ready to use? jus tify
Question No: 19 ( Marks: 2 )
What are the three position style properties?
Question No: 20 ( Marks: 3 )
Write at least three rules for writing an XML code.
Question No: 21 ( Marks: 5 )
What is the difference between an interpreted and a compiled language? Give one example of each.
Question No: 22 __ ( Marks: 10 )
Consider the following code of an XML document and identify where its standard code rules
are being applied. You are required to write the id entified tag along with its related rule side
by side. http://www.vustudents.net
<?xml version=“1.0”?>
<PlanetsList>
<Planet Name=“Mercury”> <Distance>36 million miles< /Distance> <Moons>None</Moons>
<DayLength> 176 days</DayLength> </Planet>
<Planet Name=“Venus”> <Distance>67 million miles</D istance> <Moons>None</Moons>
<DayLength>1 17 days</DayLength> </Planet>
<Planet Name=“Earth”> <Distance>93 million miles</D istance> <Moons>One</Moons>
<DayLength>24 Hours</DayLength> </Planet>
</PlanetsList> <BR/>
MIDTERM EXAMINATION
Spring 2009
IT430- E-Commerce (Session - 4)
http://www.vustudents.net
Question No: 1 ( Marks: 1 ) - Please choose one
In
datalink layer, data packets are placed inside
► Data frames (page 6)
► Data boxes
► Data streams
► None of these
Question No: 2 ( Marks: 1 ) - Please choose one
Which of these is the correct HTML code for creating a reset button?
► <input type =”button” name=”reset” value=”reset”>
► <input type=”resetButton” value=”Clear”>
► <input type=”reset” value=”reset”> (page 26)
► <input type=”button” name=”reset” value=”clear”>
Question No: 3 ( Marks: 1 ) - Please choose one
…..tag is used into …….tag because a row contains multi cells and to fill up these cells with data.
► TD…… TR
► TR…… TD (page 25)
► TD…… TG
► TG…… TR
Question No: 4 ( Marks: 1 ) - Please choose one
Individuals who write programs or manipulate technologies to gain unauthorized access to computers
and networks are --------------- .
► administrators
► experts
► hackers (page 54)
► coders
Question No: 5 ( Marks: 1 ) - Please choose one
Which tag is used for the hidden fields?
► <FIELD>
► <TEXT>
► <INPUT> page 88
► <HIDDEN>
<INPUT TYPE= "HIDDEN" NAME= "Shirt1" VALUE="25">
Question No: 6 ( Marks: 1 ) - Please choose one
What is a correct way of referring to a stylesheet called "mystyle.xsl" ?
► <?xml-stylesheet type="text/xsl" href="mystyle.xsl" ?>
► <link type="text/xsl" href="mystyle.xsl" />
► <stylesheet type="text/xsl" href="mystyle.xsl" />
► <?stylesheet type="text/xsl" href="mystyle.xsl" ?> page 39
<Link Rel="stylesheet" Type="text/css" href="mystyles.css">
Question No: 7 ( Marks: 1 ) - Please choose one
Which of them is NOT a predefined object?
► Document
► Date (repeated)
► Loop
► Array
Question No: 8 ( Marks: 1 ) - Please choose one
Which of these is not a comparison operator?
► <
► >
► = (repeated)
► !=
Question No: 9 ( Marks: 1 ) - Please choose one
Var d = new date()
Which of the following is correct about the d variable?
► instance of new
► instance of Date() method
► instance of Date object (repeated)
► Simple Variable
Question No: 10 ( Marks: 1 ) - Please choose one
When you declare a variable within a function, the variable can only be accessed within that
function. When you exit the function, the variable is destroyed. These variables are called
► Local Variables (repeated)
► Global Variables
► Local and Global
► None of the above
Question No: 11 ( Marks: 1 ) - Please choose one
Which of the following , is condition part of given For loop
for (i = 0; i <= 5; i++).
► i=0.
► i++.
► i<=5.
► (i = 0; i <= 5; i++).
Question No: 12 ( Marks: 1 ) - Please choose one
What is the correct JavaScript syntax to write "Virtual University of Paistan"?
► document.write("Virtual University of Paistan ")
► ("Virtual University of Paistan ")
► " Virtual University of Paistan "
► response.write("Virtual University of Paistan ")
Question No: 13 ( Marks: 1 ) - Please choose one
Which of the following is NOT valid HTML code line?
► <frameset rows="16%,84%">
► <frameset columns="16%,84%">
► <frameset cols="100,150">
► <frameset cols=”50%,50%” rows=”16%,84%”>
Ref
http://www.academictutorials.com/answers.asp?id=1
Question No: 14 ( Marks: 1 ) - Please choose one
CSS
is a breakthrough in Web design because it allows developers to control the---------
► Processing speed on client side
► Data grid view on client side
► Style and layout of home page.
► Style and layout of multiple Web pages (repeated)
Question No: 15 ( Marks: 1 ) - Please choose one
Which HTML tag is used to define an internal style sheet?
► <css>
► <script>
► <style> (repeated)
► <sheet>
Question No: 16 ( Marks: 1 ) - Please choose one
What is the correct HTML tag for adding a background color?
► <background>yellow</background>
► <body bgcolor="yellow"> (repeated)
► <body color="yellow">
► None
MIDTERM EXAMINATION
Spring 2009
IT430- E-Commerce (Session - 4)
http://www.vustudents.net
Question No: 1 ( Marks: 1 ) - Please choose one
In datalink layer, data packets are placed inside
► Data frames
► Data boxes
► Data streams
► None of these
Question No: 2 ( Marks: 1 ) - Please choose one
Which of these is the correct HTML code for creating a reset button?
► <input type =”button” name=”reset” value=”reset”>
► <input type=”resetButton” value=”Clear”>
► <input type=”reset” value=”reset”>
► <input type=”button” name=”reset” value=”clear”>
Question No: 3 ( Marks: 1 ) - Please choose one
…..tag is used into …….tag because a row contains multi cells and to fill up these cells with data.
► TD…… TR
► TR…… TD
► TD…… TG
► TG…… TR
Question No: 4 ( Marks: 1 ) - Please choose one
Individuals who write programs or manipulate technologies to gain unauthorized access to computers
and networks are --------------- .
► administrators
► experts
► hackers
► coders
Question No: 5 ( Marks: 1 ) - Please choose one
Which tag is used for the hidden fields?
► <FIELD>
► <TEXT>
► <INPUT>
► <HIDDEN>
Question No: 6 ( Marks: 1 ) - Please choose one
What is a correct way of referring to a stylesheet called "mystyle.xsl" ?
► <?xml-stylesheet type="text/xsl" href="mystyle.xsl" ?>
► <link type="text/xsl" href="mystyle.xsl" />
► <stylesheet type="text/xsl" href="mystyle.xsl" />
► <?stylesheet type="text/xsl" href="mystyle.xsl" ?>
Question No: 7 ( Marks: 1 ) - Please choose one
Which of them is NOT a predefined object?
► Document
► Date
► Loop
► Array
Question No: 8 ( Marks: 1 ) - Please choose one
Which of these is not a comparison operator?
► <
► >
► =
► !=
Question No: 9 ( Marks: 1 ) - Please choose one
Var d = new date()
Which of the following is correct about the d variable?
► instance of new
► instance of Date() method
► instance of Date object
► Simple Variable
Question No: 10 ( Marks: 1 ) - Please choose one
When you declare a variable within a function, the variable can only be accessed within that
function. When you exit the function, the variable is destroyed. These variables are called
► Local Variables
► Global Variables
► Local and Global
► None of the above
Question No: 11 ( Marks: 1 ) - Please choose one
Which of the following , is condition part of given For loop
for (i = 0; i <= 5; i++).
► i=0.
► i++.
► i<=5.
► (i = 0; i <= 5; i++).
Question No: 12 ( Marks: 1 ) - Please choose one
What is the correct JavaScript syntax to write "Virtual University of Paistan"?
► document.write("Virtual University of Paistan ")
► ("Virtual University of Paistan ")
► " Virtual University of Paistan "
► response.write("Virtual University of Paistan ")
Question No: 13 ( Marks: 1 ) - Please choose one
Which of the following is NOT valid HTML code line?
► <frameset rows="16%,84%">
► <frameset columns="16%,84%">
► <frameset cols="100,150">
► <frameset cols=”50%,50%” rows=”16%,84%”>
Question No: 14 ( Marks: 1 ) - Please choose one
CSS is a breakthrough in Web design because it allows developers to control the---------
► Processing speed on client side
► Data grid view on client side
► Style and layout of home page.
► Style and layout of multiple Web pages
Question No: 15 ( Marks: 1 ) - Please choose one
Which HTML tag is used to define an internal style sheet?
► <css>
► <script>
► <style>
► <sheet>
Question No: 16 ( Marks: 1 ) - Please choose one
What is the correct HTML tag for adding a background color?
► <background>yellow</background>
► <body bgcolor="yellow">
► <body color="yellow">
► None
Question No: 17 ( Marks: 1 )
What does this mean?
padding-right
adds space to the right of the content
Question No: 18 ( Marks: 1 )
Do you agree or not that using Cascading Style Sheets one can apply an image to sections of one’s
page or even to individual words.
YES! I AGREE
Question No: 19 ( Marks: 2 )
Suppose, there is an applet at "http://www.vu.edu.pk/demo.class". Write the code to include this applet
in your web page.
<APPLET CODE= “http://www.vu.edu.pk/demo.class” width=100 height=200> DEMO
</APPLET>
MIDTERM EXAMINATION
Spring 2010
IT430- E-Commerce (Session - 6)
http://www.vustudents.net
Question No: 1 ( Marks: 1 ) - Please choose one
In star network features a central connection point called a "hub" that ought to be only a hub.
_ True
_ False
Question No: 2 ( Marks: 1 ) - Please choose one
Switch is a device that joins multiple computers to gether within one local area network (LAN).
_ True (page 15)
_ False
Question No: 3 ( Marks: 1 ) - Please choose one
Switch generally contains more "intelligence" than a hub.
_ True
_ False
Question No: 4 ( Marks: 1 ) - Please choose one
In which protocol, the messages are not deleted fro m email server.
_ SMTP
_ POP3
_ IMAP (page 18)
_ ICMP
Question No: 5 ( Marks: 1 ) - Please choose one
Which protocol does Virtual university use to send email to student Accounts?
_ SMTP
_ POP
_ IMAP
_ TCP
Question No: 6 ( Marks: 1 ) - Please choose one
For which one of the following,<MARQUEE ...> tag can work better
_ News headlines
_ Announcements
_ Sound pulgin
_ Movie controls
Question No: 7 ( Marks: 1 ) - Please choose one
Can you add a style in a single place on a page ?
_ Yes, with a style-definition written into the tag
_ Yes, with a global style definition that redefine s the tag.
_ No - CSS can only be defined for entire pages.
Question No: 8 ( Marks: 1 ) - Please choose one
Which CSS tag is used to place an image that would rem ain when user scrolls down or up the page?
_ background-attachment: fixed
_ background-attachment: scroll
_ background-attachment: up
_ All of these
Question No: 9 ( Marks: 1 ) - Please choose one
What shall come in blanks for proper result,
Here blanks are numbered with 1,2 and 3
<html>
<head>
<SCRIPT language="JavaScript">
Var num1, var num2
Document.container .result.value=parseFloat(num1)-p arseFloat(num2)
</script>
</head>
<body>
<FORM name=”---------1-----------”>
<input type=”----------2-------” name=”-------3---- -----” maxlength=”5”>
</form>
</body>
</html>
_ container, text and result
_ result, value and container
_ container , button and value
_ result, container and text
Question No: 10 ( Marks: 1 ) - Please choose one
Correct syntax of "for" loop is :
_ for (i = 0; i <= 5)
_ for i = 1 to 5
_ for (i <= 5; i++)
_ for (i = 0; i <= 5; i++)
REF
http://www.ex-designz.net/test_grade.asp?tid=65
Question No: 11 ( Marks: 1 ) - Please choose one
CGI stands for
_ Common Gate Information
_ Common Gate Interface (PAGE 82) _ Common Goal Interest
_ Common Global Interaction
Question No: 12 ( Marks: 1 ) - Please choose one
Which of the following property falls in HTTP?
_ Stateless
_ Stateful
_ Temporary
_ All of these
Question No: 13 ( Marks: 1 ) - Please choose one
What is a correct way of referring to a stylesheet called "mystyle.xsl" ?
_ <?xml-stylesheet type="text/xsl" href="mystyle.xs l" ?>
_ <link type="text/xsl" href="mystyle.xsl" />
_ <stylesheet type="text/xsl" href="mystyle.xsl" />
_ <?stylesheet type="text/xsl" href="mystyle.xsl" ?>
Question No: 14 ( Marks: 1 ) - Please choose one
Which of the following does not interpret its code?
_ ASP
_ PHP
_ JSP (page 85)
_ Coldfusion
Question No: 15 ( Marks: 1 ) - Please choose one
Asymmetric cryptography is also called ------------ -- .
_ Public key cryptography (PAGE 100)
_ Private key cryptography
_ Substitution cryptography
_ Transposition
Question No: 16 ( Marks: 1 ) - Please choose one
Digital signature uses --------- .
_ Symmetric cryptography
_ Private key cryptography
_ Public key cryptography (PAGE 100)
_ Hash function
Question No: 17 ( Marks: 1 ) - Please choose one
Which one of the following is NOT a valid JavaScrip t variable?
_ _name1
_ $studentScore
_ first_name
_ 2ndName
Question No: 18 ( Marks: 1 ) - Please choose one
Which of these is the correct HTML code for creatin g a reset button?
_ <input type =”button” name=”reset” value=”reset”>
_ <input type=”resetButton” value=”Clear”>
_ <input type=”reset” value=”reset”> (page 61)
_ <input type=”button” name=”reset” value=”clear”>
Question No: 19 ( Marks: 1 ) - Please choose one
Why we use reset tag in HTML?
_ To remove the text written in Notepad.
_ To remove the text written in between <body> and </body>tag.
_ To remove the text written in between <head> and </head> tag.
_ To remove the text written in between <form> and < /form> tag. (page 61)
Question No: 20 ( Marks: 1 ) - Please choose one
http://cs.vu.edu is an example of
_ Two zone domain name
_ Three zone domain name
_ Four zone domain name
_ Five zone domain name
Question No: 21 ( Marks: 2 )
How
Certification Authority (CA) issues the certificate s? Describe briefly
Question No: 22 ( Marks: 2 )
Discuss the role of child element tags while in wri ting XML code.
MIDTERM EXAMINATION Spring 2009
IT430- E-Commerce (Session - 2)
http://www.vustudents.net
Question No: 1 __ ( Marks: 1 ) - Please choose one
Academic institutions, religious organizations and government using ----------------------e-commerce classification
Busi ness-to-Business(B2B)
Intra Business
Non Business EC (page 2)
Busi ness-to-consumer(B2C)
Question No: 2___ ( Marks: 1 ) - Please choose one
Network addresses 128--- 191 range belongs to which of the following class networks?
A
B (page 10)
C
E
Question No: 3 ( Marks: 1 ) - Please choose one
Where in an HTML document is the correct place to r efer to an external style sheet?
In the <body> section
At the end of the document
In the <head> section
At the top of the document
Ref
http://www.ex-designz.net/test_grade.asp?tid=37 Question No: 4 __ ( Marks: 1 ) - Please choose one
Constructor is defined as the initializing function used to create…..........
Instance of object
Copy of object
Instance / copy of object (page 69)
Shallow copy of object
Question No: 5 ( Marks: 1 ) - Please
choose one What does DTD stand for?
Do The Dance.
Dynamic Type Definition.
Data Type Definition. (page 76)
Direct Type Définition.
Question No: 6 __ ( Marks: 1 ) - Please choose one Which one of
following file is used to translate XML:
DTD
XSL (repeated )
XML parser
Browser
Question No: 7 __ ( Marks: 1 ) - Please choose one
In which of the following language ,XML parser is u sually written.
VB.net
Java (page 77)
Asp.net
C++
Question No: 8 __ ( Marks: 1 ) - Please choose one
In _________key cryptography, everyone has access t o all the public keys
Public (page 100)
Private
Symmetric
Certified
Question No: 9___ ( Marks: 1 ) - Please choose one
How do you define a numerical value?
var mynum = new Math;
var mynum = Math(6);
var mynum = 6;
Math.mynum = 6;
Question No: 10___ ( Marks: 1 ) - Please choose one
What is 17%5 ?
2
3
85
84
Question No: 11___( Marks: 1 ) - Please choose one
An array can contain ---------- .
only text
only numbers
only numbers or text
any valid variable
ref
http://java.sun.com/docs/books/jls/second_edition/html/arrays.doc.html
Question No: 12 ( Marks: 1 ) - Please choose
one Which tag is used for the hidden fields?
<FIELD>
<TEXT>
<INPUT> (page 88)
<HIDDEN>
Question No: 13 __ ( Marks: 1 ) - Please choose one
Packet filter firewall operates at
a) data link layer
b) network layer
c) transport layer
a and b only (page 5)
c only
b and c only
a, b and c
Question No: 14 ( Marks: 1 ) - Please choose one
Which one has the functionality to redirect the fil led information to an other page.
Submit button
Reset button
Radio button
None of the given
Question No: 15 ( Marks: 1 ) - Please choose one
Due to which characteristics, ATM network are cover ed under E-commerce ?
Exchange of information through computer networks
Internet.
Exchanging of products, services.
None of the above.
Question No: 16 __ ( Marks: 1 ) - Please choose one
IP, RIP, and ARP protocols work on
Application layer
Session layer
Network layer (page 6)
Data link layer
MIDTERM EXAMINATION Spring 2009
IT430- E-Commerce (Session - 1)
http://www.vustudents.net
Question No: 1 __ ( Marks: 1 ) - Please choose one
Marketing plan should be same for all E-commerce cl assification.
True
False
Question No: 2 ( Marks: 1 ) - Please choose one
Identify the networking device which regenerates th e signals if these become
weak.
Hub
Switch
Router
Repeater (page 15)
Question No: 3 ( Marks: 1 ) - Please choose one
How can you open a link in a new browser window?
<a href="url" target="new">
<a href="url"target="_blank"> (page 33)
<a href="url"new>
None of these
Question No: 4 ( Marks: 1 ) - Please choose one
Content pages relate to which of the following tag?
<iframe>
<Frame>
<frameset>
<noframes>
Question No: 5 __ ( Marks: 1 ) - Please choose one
What is the correct HTML for referring to an external style sheet?
<style src=mystlye.css>
<link re = “stylesheet” type= “text/css” herf= “mys tyle.css”>
<stlyesheet> mystyle.css</stlyesheet>
All of these
Ref
http://www.ex-designz.net/test_grade.asp?tid=37
Question No: 6 __ ( Marks: 1 ) - Please choose one
Choose the correct HTML code line which left-align the content inside a table cell.
<td leftalign>
<td valign="left">
<td align="left"> (page 26)
<tdleft>
Question No: 7 ( Marks: 1 ) - Please choose one
In a Frameset code, do the BODY tags belong inside or outside of the NOFRAMES tag pair?
Inside because an HTM Document can only include one or the other.
Outside, to be seen by the older browsers [NN versi on 1 and IE version 2].
Outside because the W3C says that to be valid.
Contain a BODY tags pair.
Ref
http://www.tjkdesign.com/articles/frames/quiz.asp
Question No: 8 ________________ ( Marks: 1 ) - Plea se choose one
In CSS, the font-style property can make text what?
Bigger.
Italic.
Different colors.
Change size .
Ref
http://www.w3schools.com/css/css_font.asp
Question No: 9 ( Marks: 1 ) - Please choose one
Which CSS tag is used to place an image that would remain when user scrolls down or up the page?
background-attachment: fixed
background-attachment: scroll
background-at tachment : up
All of these
Question No: 10 ( Marks: 1 ) - Please choose one
Which of the following ,in Javascript, we could not create our own?
Textboxes
Dropdown
Object
Image
Ref
http://www.w3schools.com/js/js_objects.asp
Question No: 11 ( Marks: 1 ) - Please choose one
How do you write a conditional statement for execut ing some statements only if "i" is
equal to 5?
if i=5
if i=5 then
if i==5 then
if (i==5) (page 58)
Ref
http://www.ex-designz.net/test_grade.asp?tid=65
Question No: 12 __ ( Marks: 1 ) - Please choose one
Constructor is defined as the initializing function used to create…..........
Instance of object
Copy of object
Instance / copy of object (page 69)
Shallow copy of object
Question No: 13 ( Marks: 1 ) - Please choose one
Which one of following file is used to translate X ML:
DTD
XSL (page 77)
XML parser
Browser
Question No: 14 ( Marks: 1 ) - Please choose one
How can you reference part of a string?
text.substr(5,6);
text.part(5,6)
text. piece(5 ,6)
text.split(5,6);
http://php.net/manual/en/function.substr.php
Question No: 15___( Marks: 1 ) - Please choose one
Which one is the correct CSS syntax?
h1 {font-size:72pt } (page 39)
h1:font-size =72pt
{h1:font-size =72pt}
{h1;font-size:72pt}
Question No: 16 __ ( Marks: 1 ) - Please choose one
In the communication between two computers on a net work, CRC is calculated at
Sender ’s side
Receiver ’s side
Both sender and receiver sides
Neither on sender nor on receiver side (100% tuka )
Question No: 17 __ ( Marks: 1 )
What does this mean document.write("str.charAt(3) : "+str.charAt(3) +"<P>"); ?
Question No: 18 __ ( Marks: 1 )
What does this term mean "Non-repudiation"?
Question No: 19 __ ( Marks: 2 )
What are servlets?
Question No: 20 ( Marks: 3 )
What are the three methods for using style sheets w ith a web page?
Question No: 21 __ ( Marks: 5 )
Identify protocol stack used in each layer of OSI m odel?
Question No: 22 ( Marks: 10 )
"The role of a Certification Authority is similar t o a passport office." Explain it.
MIDTERM EXAMINATION Spring 2009
IT430- E-Commerce (Session - 4) http://www.vustudents.net
Question No: 1 ( Marks: 1 ) - Please choose one In data link layer, data packets are placed inside ► Data frames (PAGE 6) ► Data boxes ► Data streams ► None of these
Question No: 2 ( Marks: 1 ) - Please choose one Which of these is the correct HTML code for creating a reset button? ► ► ► ► Question No: 3 ( Marks: 1 ) - Please choose one …..tag is used into …….tag because a row contains multi cells and to fill up these cells with data. ► TD…… TR ► TR…… TD ► TD…… TG
► TG…… TR RFF
http://www.w3.org/TR/WCAG10-HTML-TECHS/ Question No: 4 ( Marks: 1 ) - Please choose one Individuals who write programs or manipulate technologies to gain unauthorized access to computers and networks are --------------- . ► administrators ► experts ► hackers (PAGE 94) ► coders Question No: 5 ( Marks: 1 ) - Please choose one Which tag is used for the hidden fields? ► ►
► ► Question No: 6 ( Marks: 1 ) - Please choose one What is a correct way of referring to a stylesheet called "mystyle.xsl" ? ► <?xml-stylesheet type="text/xsl" href="/mystyle.xs l" ?> ► ► ► <?stylesheet type="text/xsl" href="/mystyle.xsl" ?> Question No: 7 ( Marks: 1 ) - Please choose one Which of them is NOT a predefined object? ► Document ► Date ► Loop ► Array ref http://www.webreference.com/programming/javascript/diaries/15/ Question No: 8 ( Marks: 1 ) - Please choose one Which of these is not a comparison operator? ► < ► > ► = (PAGE 58) ► != Question No: 9 ( Marks: 1 ) - Please choose one
Var d = new date() Which of the following is correct about the d variable?
► instance of new ► instance of Date() method ► instance of Date object ► Simple Variable
REF http://www.webreference.com/programming/javascript/diaries/15/
Question No: 10 ( Marks: 1 ) - Please choose one When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called
► Local Variables
► Global Variables
► Local and Global
► None of the above
ref If you declare a variable within a function, the va riable can only be accessed ... the variable is destroyed. These variables are call ed local variables. ... Question No: 11 ( Marks: 1 ) - Please choose one Which of the following , is condition part of given For loop for (i = 0; i <= 5; i++).
► i=0. ► i++. ► i<=5. ► (i = 0; i <= 5; i++). Ref http://www.blackwasp.co.uk/CSharpForLoop.aspx
Question No: 12 ( Marks: 1 ) - Please choose one What is the correct JavaScript syntax to write "Virtual University of Paistan"?
► document.write("Virtual University of Paistan ") ► ("Virtual University of Paistan ") ► " Virtual University of Paistan " ► response.write("Virtual University of Paistan ")
Question No: 13 ( Marks: 1 ) - Please choose one Which of the following is NOT valid HTML code line?
► ,84%"> ► ,84%"> ► ► ,50%” rows=”16%,84%”>
Question No: 14 ( Marks: 1 ) - Please choose one CSS is a breakthrough in Web design because it allows developers to control the---------
► Processing speed on client side ► Data grid view on client side ► Style and layout of home page. ► Style and layout of multiple Web pages ref http://ezinearticles.com/?Advantages-of-Using-CSS-in-Web-Design&id=1433066
Question No: 15 ( Marks: 1 ) - Please choose one
Which HTML tag is used to define an internal style sheet?
►
►
►
►
Question No: 16 ( Marks: 1 ) - Please choose one What is the correct HTML tag for adding a background color? ► yellow ► ► ► None Question No: 17 ( Marks: 1 ) What does this mean? (page 49) padding-right padding-right – adds space to the right of the cont ent Question No: 18 ( Marks: 1 ) Do you agree or not that using Cascading Style Sheets one can apply an image to sections of one’s page or even to individual words. Yes! I agree, using CSS one can apply his/her defin ed design, image or wording to muliple pages of his/her website. Question No: 19 ( Marks: 2 ) Suppose, there is an applet at "http://www.vu.edu.pk/demo.class". Write the code to include this applet in your web page. Question No: 20 ( Marks: 3 ) What do you think, is there any difference between Static and Dynamic IP Address assignment? Discuss. A static IP address is a number (in the form of a dotted quad) that is assigned to a computer by an Internet service provider (ISP) to be its permanent address on the Internet. Computers use IP addresses to locate and talk to each other on the Internet, much
the same way people use phone numbers to locate and talk to one another on the telephone. When you want to visit whatis.com, your computer asks a domain name system (DNS) server (think telephone information operator) for the correct dotted quad number (think phone number) for whatis.com and your computer uses the answer it receives to connect to the whatis.com server. Question No: 21 ( Marks: 5 ) What is cryptography? What techniques are used for cryptography? Cryptography is the technique of converting a messa ge into unintelligible or non-understandable form such that even if some unauthorized or unwanted person i ntercepts the message he/she would still not be able to make any sense out of it. Cryptography is thousands of years old. Techniques used for cryptography Substitution In su bstitution we replace each letter in the message with another to make the message non-understandable. For example, each letter “a” in the message can be replaced with letter “d” and letter “b” with letter “e” and so on. Transposition It is based on scrambling the characters in a message. A transposition system may first write a message into a table row by row then the message can be read and rewritten column by column to make it scrambled.
Question No: 22 ( Marks: 10 ) Analyze the following given code showing some Cascading Style Sheets tags and explain its lines one by one.
<html>
<head>
h1 {text-decoration: overline}
h2 {text-decoration: line-through}
h3 {text-decoration: underline}
a {text-decoration: none}
<body>
This is header 1
This is header 2
This is header 3
This is a link
MIDTERM EXAMINATION
Spring 2010
IT430- E-Commerce (Session - 6)
Solved
http://www.vustudents.net
Question No: 1 ( Marks: 1 ) - Please choose one
Academic institutions, religious organizations and government using --------------------- e-commerce
classification
► Business-to-Business(B2B)
► Intra Business
► Non Business EC (page 2)
► Business-to-consumer(B2C)
Question No: 2 ( Marks: 1 ) - Please choose one
In which protocol, the messages are not deleted from email server.
► SMTP
► POP3
► IMAP (page 18)
► ICMP
in case of IMAP the message is not deleted in the email server and thus can be reopened from another
location/machine.
Question No: 3 ( Marks: 1 ) - Please choose one
What is the correct HTML tag for adding a background color?
► <background>yellow</background>
► <body bgcolor="yellow"> (page 47)
► <body color="yellow">
► None
Question No: 4 ( Marks: 1 ) - Please choose one
Which HTML tag is used to define an internal style sheet?
► <css>
► <script>
► <style> (Ans)
► <sheet>
reference
http://www.ex-designz.net/test_grade.asp?tid=37 (question no 3)
Question No: 5 ( Marks: 1 ) - Please choose one
What is the correct HTML for making a hyperlink?
► <a href="http://www.w3schools.com">W3Schools</a>
► <a name="http://www.w3schools.com">W3Schools.com</a>
► <a url="http://www.w3schools.com">W3Schools.com</a>
► <a>http://www.w3schools.com</a>
REFERENCE
http://www.w3schools.com/html/html_links.asp
Question No: 6 ( Marks: 1 ) - Please choose one
If we leave out the target attribute in frame tag and link was clicked ,the document loads into the
window
► In Same page (repeated )
► In other blank page.
► To display browser error.
► All of the options.
Question No: 7 ( Marks: 1 ) - Please choose one
What does mean by != comparison operator? http://www.vustudents.net
► Equal to
► Not
► Equal
► Not Equal (page 58)
Question No: 8 ( Marks: 1 ) - Please choose one
What does the string. match (“abc”) object do?
► Concatenates the “abc” word to other “abc” words
► Matches the “abc” words with other “abc” words
► It does replacement of abc word with other words
► All of the above
ref
http://www.regular-expressions.info/reference.html
Question No: 9 ( Marks: 1 ) - Please choose one
var txt="Hello World!" Document. Write (txt.length), it would return the length as.
► 10
► 11
► 12
► 13
REFERENCE
http://www.w3schools.com/js/js_obj_string.asp
Question No: 10 ( Marks: 1 ) - Please choose one
Which of the following property falls in HTTP?
►Stateless (Ans)
► Stateful
► Temporary
► All of these
Question No: 11 ( Marks: 1 ) - Please choose one
Which one of the following certifies the binding between public key and its owner.
►CA (page101)
► KDC
► TLS
► Firewall
Question No: 12 ( Marks: 1 ) - Please choose one
Cyclical Redundancy Check (CRC), takes place in which layer of OSI Model.
► Session Layer
► Transport Layer
► Network Layer
► Data link layer (page 6)
Question No: 13 ( Marks: 1 ) - Please choose one
How can you convert information consisting of comma separated values into an array?
► txtArray = txt.indexOf(',');
► txtArray = txt.split(','); page 70
► txtArray = txt.trim(',');
► txtArray = txt.substring(',');
Question No: 14 ( Marks: 1 ) - Please choose one
The control statement on a while loop is tested
► before each time through the loop
► after each time through the loop
► once at the start
► once at the end
Ref
http://en.wikipedia.org/wiki/While_loop
Question No: 15 ( Marks: 1 ) - Please choose one
Which SQL statement is used to delete data from a database?
► DELETE (page 83)
► COLLAPSE
► REMOVE
► DISCARD
Question No: 16 ( Marks: 1 ) - Please choose one
A program that performs a specific function such as creating invoices/bills or processing payment
received from customers is called a/an ---------------.
► Middleware
► Web Service
► CRM Software
► Appplication Program (page 92)
Question No: 17 ( Marks: 1 ) - Please choose one
Which firewall uses strong user authentication to verify identity of a host attempting to connect to the
network?
► Packet filter firewall
► Circuit level firewall
► Application gateway firewall (page 96)
► Hybrid firewall
Question No: 18 ( Marks: 1 ) - Please choose one
In what form are style rules presented?
► Selector { property: value }
► selector { property= value }
► selector ( property: value )
► selector ( property= value )
Question No: 19 ( Marks: 1 ) - Please choose one
Why we use reset tag in HTML?
► To remove the text written in Notepad.
► To remove the text written in between <body> and </body>tag.
► To remove the text written in between <head> and </head> tag.
► To remove the text written in between <form> and </form> tag.
Reference
http://www.echoecho.com/htmlforms13.htm
Question No: 20 ( Marks: 1 ) - Please choose one
When data moves upward in the OSI stack it is called
► Encapsulation
► De-encapsulation (page 5)
► Synchronization
► None of these
Question No: 21 ( Marks: 2 )
What does PPTP stand for?
Ans (�page98)
PPTP stands for point to point transfer protocol.
Question No: 22 ( Marks: 2 )
What are the keywords to define a variable and a function in JavaScript?
“var” is the keyword used to define a variable in Javascript
e.g var a; “function” is the keyword to define a function in javascript
e.g function myfunction(){ // some code }
Question No: 23 ( Marks: 3 ) http://www.vustudents.net
Identify the object, property and method in the following:
Math.sin(45)
Math.PI
Ans:
Math is the object in above case
PI is the property of Math object
Sin() is the method of Math object
Question No: 24 ( Marks: 3 )
Performance of web servers can be evaluated mainly on the basis of two factors. What are they?
Ans:
Performance of web sever
Performance of web servers can be evaluated mainly on the basis of two
factors:
Throughput, which is the number of http requests that a particular server
hardware and software can handle in the unit time; and
Response time, which is the amount of time a web server requires to process
one request. Web server hardware architectures
Question No: 25 ( Marks: 5 )
Write the code for a web page displaying a button named "Testing". After clicking that button an alert
should be displayed saying "The test is successful".
<html> <head> <script type="text/javascript"> function sndAlert() { window.alert("The test is successful!!!");
} </script> </head> <body> <FORM NAME="form1"> <INPUT TYPE="Button" name="showAlert" VALUE="Show Alert" onclick="sndAlert()"> </FORM> </body> </html> Question No: 26 ( Marks: 5 )
What is the difference between an interpreted and a compiled language? Give one example of each.
http://www.vustudents.net
Ans:
In a compiled language we compile to code or convert into machine language using a software called
compiler as we can case C++
Example C++
with interpret language we interpret the code (line by line) at run time using a program called
interpreter browser is an interpreter.
Example Browser…
MIDTERM EXAMINATION
Spring 2010
IT430- E-Commerce (Session - 6)
Solved
http://www.vustudents.net
Question No: 1 ( Marks: 1 ) - Please choose one
MAC stand for
► Media Access Control ( page 13)
► Media Access Consortium
► Member of Asian Community
► None of these
Question No: 2 ( Marks: 1 ) - Please choose one
Choose the correct HTML tag for the largest heading
► <head>
► <h1> (page 20)
► <Heading>
► <h6>
Question No: 3 ( Marks: 1 ) - Please choose one
Which of the following tags are used for embedding sound files into HTML code?
► <A href=“song.wav”>
► <EMBED SRC="Skylar.MP3">
► <A href=“song.wav”> and <EMBED SRC="Skylar.MP3"> (page 37)
► None of these
Do correction in all midterm file J
Question No:44 answer is 3rd
Question No: 4 ( Marks: 1 ) - Please choose one
Which of the following is NOT an advantage of CSS ?
► Works on version 4 browsers or newer
► Define the look of your pages in one place
► Easily change the look
► Implement same formatting each time tag is used.
Advantages
6) Improved Search Engine Results
7) Sites Load Faster
8) Design Separated from Content:
9) Displayed on Various Media
10) Compatibility with Browsers
Browser inserts a line break before the <DIV> tag and after the </DIV> end tag.
They are used when you want to apply a specific style to a number of different tags and sections
throughout the document http://www.vustudents.net
Question No: 5 ( Marks: 1 ) - Please choose one
Which of the following is correct line to add separated css file with name xxxx.css?
► <link scr=stylesheet href="/xxxx.css" type="text/css">
► <link rel=stylesheet href="/xxxx.css" type="text/css"> (page 77)
► <style rel=stylesheet href="/xxxx.css" type="text/css">
► <link rel=stylesheet scr="xxxx.css" type="text/css">
Question No: 6 ( Marks: 1 ) - Please choose one
Which of the following is correct syntax to define color in CSS?
► body {color: black} (page 77)
► body:color=black
► {body:color=black(body}
► {body;color:black}
Question No: 7 ( Marks: 1 ) - Please choose one
Inside which of the following HTML element do we put the JavaScript?
► <script> (page 58)
► <js>
► <javascript>
► <scripting>
Question No: 8 ( Marks: 1 ) - Please choose one
JavaScript is mainly a ___________ language.
► Server Side Scripting
► Cross Side Scripting
► Client Side Scripting (page79)
► both Cross and Server Side Scripting
Question No: 9 ( Marks: 1 ) - Please choose one
Which one is the responsible to manage “Internal processes”?
► E-business
► E-commerce
► E-marketing
► All of the given
Question No: 10 ( Marks: 1 ) - Please choose one
The first control statement in a for loop usually
► sets the termination condition
► increments a counter
► creates a control variable
► none of the above
Question No: 11 ( Marks: 1 ) - Please choose one
You define a method using
► obj.method
► obj.method[]
► obj.method() (PAGE 58)
► obj-method
Question No: 12 ( Marks: 1 ) - Please choose one
What is the default scripting language in ASP?
► EcmaScript
► JavaScript
► Java
► VBScript (PAGE 85)
Question No: 13 ( Marks: 1 ) - Please choose one
Following are malicious programs EXCEPT ----------------- .
► Back doors
► Trojan Horses
► Firewalls (PAGE 94)
► Worms
Question No: 14 ( Marks: 1 ) - Please choose one
Outside attacks on a network include the following, EXCEPT --------------- .
► Password attack http://www.vustudents.net
► DoS
► Back doors ( PAGE 95)
► IP spoofing
Question No: 15 ( Marks: 1 ) - Please choose one
At which layer of the OSI model the circuit level firewall operates?
► Application layer
► Presentation layer
► Network layer
► Transport layer (PAGE 96)
Question No: 16 ( Marks: 1 ) - Please choose one
The process of scrambling a message with the help of a key is called -------------- .
► Cryptography
► Filtering
► Transposition
► Encryption (PAGE 100)
The process of scrambling a message with the help of a key is called Encryption.
Question No: 17 ( Marks: 1 ) - Please choose one
In a ring network, every device has exactly ______ neighbors for communication purpose.
► more than two
► Two (PAGE 14)
► Four
► None of these
Question No: 18 ( Marks: 1 ) - Please choose one
What is identified by the tag <FRAMESET COLS="20%,60%,20%">?
► Horizontal frame ► Vertical Frame (PAGE 31)
► Top Frame ► Bottom Frame
Question No: 19 ( Marks: 1 ) - Please choose one
Why we use reset tag in HTML?
► To remove the text written in Notepad.
► To remove the text written in between <body> and </body>tag.
► To remove the text written in between <head> and </head> tag.
► To remove the text written in between <form> and </form> tag. (PAGE 27)
Question No: 20 ( Marks: 1 ) - Please choose one
Network Interface Card is operated at
► Application layer
► Session layer
► Network layer
► Datalink layer (PAGE 6)
Question No: 21 ( Marks: 2 ) http://www.vustudents.net
What value will be printed after executing the following statement in JavaScript:
document.write( Math.pow(3, 2) );
document.write("Math.pow(2,3) :"+Math.pow(2,3)+"<P>");
Question No: 22 ( Marks: 2 )
What is a web server?
ANSWER:
Web server
web server is a machine that serves up the web page requests of a client on the internet. It is a
combination of hardware and software. Decision as regards the type of a web server is largely
dependent on the volume and type of web activities. So, transaction processing sites generating
dynamic pages with high traffic volumes would need web server software that is more efficient and
can easily be upgraded.
Question No: 23 ( Marks: 3 )
To calculate the area of a circle the formula pi r squared is used. How would you code it in JavaScript?
<html>
<script type="text/javascript">
var radius,area;
radius = 10;
area = Math.PI*Math.pow(radius,2);
document.write("Area of circle with radius 10 is " + area );
</script>
</html>
Question No: 24 ( Marks: 3 )
Name four commonly used web server operating systems. (PAGE 91)
Commonly used web server operating systems are Microsoft Windows NT Server, Microsoft Windows
2000 Advanced Server, Microsoft.NET Server, Linux or Unix based operating systems such as Solaris.
Question No: 25 http://www.vustudents.net ( Marks: 5 )
Write the types of firewalls. Only names? Explain these briefly
Packet filter firewall
It uses a set of rules to determine whether outgoing or incoming data packets are allowed to pass
through the firewall.
Circuit level firewall
It is quite similar to the packet filter firewall. It also works on the basis of a set of rules for filtering
packets but operates at the transport layer of the OSI Model so has greater functionality.
Application gateway firewall
It operates at application layer of the OSI Model. It uses strong user authentication to verify identity of a
host attempting to connect to the network using application layer protocols such us FTP. In contrast to
packet filter firewall, it filters the requests rather than packets entering/leaving the network. It can block
any outgoing HTTP or FTP requests.
Question No: 26 ( Marks: 5 )
Write the JavaScript code which will display the following in a web page using a FOR loop:
The number is 0
The number is 1
The number is 2
The number is 3
The number is 4
The number is 5
<html>
<script type="text/javascript">
var no;
for (no=0; no<6 ; no++)
{
document.write("The number is " + no + "<br>" );
}
</script>
</html>
MIDTERM EXAMINATION
Spring 2010
IT430- E-Commerce (Session - 6)
Solved
http://www.vustudents.net
Question No: 1 (Marks: 1) - Please choose one
For which of the following we need to know the classification of E-commerce?
► Market planning strategy
► Build Mission statement
► Management strategy
► none (not sure )
Question No: 2 ( Marks: 1 ) - Please choose one
Switch is a device that joins multiple computers together within one local area network (LAN).
► True (page 4)
► False
Question No: 3 ( Marks: 1 ) - Please choose one
In which protocol, the messages are not deleted from email server.
► SMTP
► POP3
► IMAP (page 18)
► ICMP
Question No: 4 ( Marks: 1 ) - Please choose one
How can you open a link in a new browser window?
► <a href="/url" target="new">
► <a href="/url" target="_blank"> (page 33)
► <a href="/url" new>
► None of these
Question No: 5 ( Marks: 1 ) - Please choose one
What does the Target= “_top” tag perform?
► Loads the new page into the same frame
► Loads the new page into the entire window (page 33)
► Loads the new page into a new browser window
► All of the above
Question No: 6 ( Marks: 1 ) - Please choose one
Which attribute is used in a tag to control the layout of element?
► view
► css (PAGE 39)
► Style
► Layout
Question No: 7 ( Marks: 1 ) - Please choose one
Choose the correct HTML code line which left-align the content inside a tablecell.
► <td leftalign>
► <td valign="left">
► <td align="left">(PAGE 26)
► <tdleft>
Question No: 8 ( Marks: 1 ) - Please choose one
Where in an HTML document is the correct place to refer to an external style sheet?
► In the <body> section
► At the end of the document
► In the <head> section (PAGE 39)
► At the top of the document
Question No: 9 http://www.vustudents.net ( Marks: 1 ) - Please choose one
When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called
► Local Variables
► Global Variables
► Local and Global
► None of the above
ref
http://en.wikipedia.org/wiki/Local_variable
Question No: 10 ( Marks: 1 ) - Please choose one
Constructor is defined as the initializing function used to create…........
► Instance of object
► Copy of object
► Instance / copy of object (page 69)
► Shallow copy of object
Question No: 11 ( Marks: 1 ) - Please choose one
What does XML stand for?
► eXtra Modern Link
► X-Markup Language
► eXtensible Markup Language (page 74)
► Example Markup Language
Question No: 12 ( Marks: 1 ) - Please choose one
For which of following purpose the Firewall is used ?
► Efficient working
► Protection against security attacks (page 95)
► Networking purpose
► None of these
Question No: 13 ( Marks: 1 ) - Please choose one
PPP stands for
► Point to Point Protocol (page 98)
► Post to Post Protocol
► Point to Post Protocol
► None of these
Question No: 14 ( Marks: 1 ) - Please choose one
Which of the following is NOT processed on the client side?
► Cookies
► JavaScript
► CGI scripts (page 79)
► Applets
Question No: 15 ( Marks: 1 ) - Please choose one
Firewall is used to
I - examine the data entering the network
II - examine the data leaving the network
III - filter the data according to certain rules
► I, II and III (page 96)
► I only
► I and III only
► I and II only
Question No: 16 ( Marks: 1 ) http://www.vustudents.net- Please choose one
Which firewall uses strong user authentication to verify identity of a host attempting to connect to the network?
► Packet filter firewall
► Circuit level firewall
► Application gateway firewall (page 96)
► Hybrid firewall
Question No: 17 ( Marks: 1 ) - Please choose one
Bus networks is same as the system bus of a computer.
► True
► False (page 14)
Question No: 18 ( Marks: 1 ) - Please choose one
In Style Sheets, How do you add a background color for all "<h1>" elements?
► all.h1 {background-color:#FFFFFF}
► h1.all {background-color:#FFFFFF}
► h1 {background-color:#FFFFFF}(page 47)
► h1 {bgcolor:#FFFFFF}
Question No: 19 ( Marks: 1 ) - Please choose one
How do you make each word in a text start with a capital letter?
► text-transform:capitalize
► text-transform:first_capitalize. (page 46)
► Cann’t be possible with CSS
► text-transform:uppercase
Question No: 20 ( Marks: 1 ) - Please choose one
MAC address is written in
Binary form 0-1 ►
Decimal form 0-9 ►
Hexadecimal form 0-f ► (page 13)
None of these ►
Question No: 21 ( Marks: 2 )
What is a web server?
Answer : Web server – machine that services internet request.
Web server – machine that services internet request
web server is a machine that serves up the web page requests of a client on the internet. It is a
combination of hardware and software. Decision as regards the type of a web server is largely
dependent on the volume and type of web activities. So, transaction processing sites generating
dynamic pages with high traffic volumes would need web server software that is more efficient and can
easily be upgraded.
Question No: 22 ( Marks: 2 )
What does ‘parseFloat(string)’ And NaN mean?
The parseFloat() function parses a string and returns a floating point number. This function determines if the first character in the specified string is a number. If it is, it parses the string until it reaches the end of the number, and returns the number as a number, not as a string.
The NaN property represents "Not-a-Number" value. This property indicates that a value is not a legal number.
Question No: 23 ( Marks: 3 )
Write at least three rules for writing an XML code.
Rules for writing an XML code
-All elements must be properly nested <outer><inner>content</inner></outer>
-All attribute values must be quoted <FRIES SIZE=“LARGE”>
-All elements with empty content must be identified by ending in />
Question No: 24 ( Marks: 3 )
How ‘Man in The middle Attacks’ operates?
Man in the middle attacks
In it the attacker is able to monitor, capture and control data between sending and receiving
machines. He may apply IP address spoofing technique to divert the packets to its machine, then
modify the packets and resend the misleading information to the actual client. Another form of man-
in-the-middle attack is where the hacker is able to substitute the IP address of a genuine web site with
the IP address of his own web site due to some security hole in the software that runs on a domain
name server. A client would think that he is communicating or receiving the information form a
genuine web site, though it would not be the case actually.
Question No: 25 ( Marks: 5 )
Write the code for a web page displaying a button named "Testing". After clicking that button an alert should be displayed saying "The test is successful".
<html>
<head>
<script type="text/javascript">
function sndAlert()
{
window.alert("The test is successful!!!");
}
</script>
</head>
<body>
<FORM
NAME="form1">
<INPUT TYPE="Button" name="showAlert" VALUE="Show Alert"
onclick="sndAlert()">
</FORM>
</body>
</html>
Question No: 26 ( Marks: 5 )
Differentiate between front end and back end.
Answer: Front end consists of that information which is visible to the user and he can interact with the same through some interface. The back end comprises that information which resides on the server side and is used to create certain dynamic results for the user. It would include different programs or scripts that may be developed in different languages/tools. Backend is mainly used for two purposes – for querying with the databases and for the maintenance of state. We can use different tools (ASP, JSP etc.) for that purpose depending upon their respective advantages/disadvantages.
MIDTERM EXAMINATION
Spring 2010
IT430- E-Commerce (Session - 5)
http://www.vustudents.net
Question No: 1 ( Marks: 1 ) - Please choose one
Network addresses 128--- 191 range belongs to which of the following class networks?
► A
► B (page 10)
► C
► E
Question No: 2 ( Marks: 1 ) - Please choose one
Which of the following is true for Class A:
► Network 01 byte and 03 hosts (page 10)
► Network 02 bytes and 02 hosts
► Network 03 bytes and 01 host
► None of these
Question No: 3 ( Marks: 1 ) - Please choose one
Which one is not included in the networking topologies?
► Star Topology
► Bus Topology
► Media Topology (page 14)
► Ring Topology
Question No: 4 ( Marks: 1 ) - Please choose one
What is the correct HTML for making a hyperlink?
► <a name="http://www.vu.edu.pk”>Virtual university</a>
► <a href=" http://www.vu.edu.pk "> Virtual university </a> (page 23)
► <a>http://www. vu.edu.pk </a>
► <a url="http://www. vu.edu.pk "> Virtual university of pakistan</a>
Question No: 5 ( Marks: 1 ) - Please choose one
What is the correct HTML for making a text input field?
► <textinput type="text">
► <input type="text"> (page 27)
► <input type="textfield">
► <textfield>
Question No: 6 ( Marks: 1 ) - Please choose one
If we leave out the target attribute in frame tag and link was clicked ,the document loads into the
window
► In Same page (page 37)
► In other blank page.
► To display browser error.
► All of the options.
Question No: 7 ( Marks: 1 ) http://www.vustudents.net - Please choose one
Where in an HTML document is the correct place to refer to an external style sheet?
► In the <body> section
► At the end of the document
► In the <head> section (repeated )
► At the top of the document
Question No: 8 ( Marks: 1 ) - Please choose one
How do you write a conditional statement for executing some statements only if "i" is equal to 5?
► if i=5
► if i=5 then
► if i==5 then
► if (i==5)
ref
http://www.ex-designz.net/test_page.asp?tid=65
Question No: 9 ( Marks: 1 ) - Please choose one
Which of the following is used to get remote access of any computer on a network?
► Trojan Horse
► Backdoor
► Virus
► All of these (page 94)
Question No: 10 ( Marks: 1 ) - Please choose one
PPP stands for
► Point to Point Protocol (repeated )
► Post to Post Protocol
► Point to Post Protocol
► None of these
Question No: 11 ( Marks: 1 ) - Please choose one
JavaScript is mainly a ___________ language.
► Server Side Scripting
► Cross Side Scripting
► Client Side Scripting (page 79)
► both Cross and Server Side Scripting
Question No: 12 ( Marks: 1 ) - Please choose one
Inside which HTML element do we put the JavaScript?
► <scripting>
► <javascript>
► <script> (page 57)
► <js>
Question No: 13 ( Marks: 1 ) http://www.vustudents.net - Please choose one
a++; is the same as which of the following?
► a=a*1;
► a=a+2;
► a=1+2;
► a=a+1;
ref
http://www.academictutorials.com/answers.asp?id=6
Question No: 14 ( Marks: 1 ) - Please choose one
If a web server is bombarded with thousands of HTTP requests, that would be an example of --------------
-.
► sniffing
► password attack
► man in the middle attack
► denial of service attack (page 95)
Question No: 15 ( Marks: 1 ) - Please choose one
Outside attacks on a network include the following, EXCEPT --------------- .
► Password attack
► DoS
► Back doors (page 95)
► IP spoofing
Question No: 16 ( Marks: 1 ) - Please choose one
Digital signature uses --------- .
► Symmetric cryptography
► Private key cryptography
► Public key cryptography
► Hash function
ref
http://www.digistamp.com/signature.htm
http://ecommerce.hostip.info/pages/271/Cryptography-Public-Private-Key.html
Question No: 17 ( Marks: 1 ) - Please choose one
In star topology, If hub fails, the entire network also fails.
► True
► False
ref
http://www.exforsys.com/tutorials/networking/star-topology.html
Question No: 18 ( Marks: 1 ) - Please choose one
Which one is the correct CSS syntax?
► h1 {font-size:72pt}
► h1:font-size=72pt
► {h1:font-size=72pt}
► {h1;font-size:72pt}
ref
http://uk.answers.yahoo.com/question/index?qid=20100308120234AAPKmAf
Question No: 19 ( Marks: 1 ) - Please choose one
In CSS, How do you make each word in a text start with a capital letter?
► text-transform:capitalize
► text-transform:uppercase (correct )
► text:capitalize
► You can't do that with CSS
REFERENCE
http://www.ex-designz.net/test_grade.asp?tid=37 (question 24 in this link )
Question No: 20 ( Marks: 1 ) - Please choose one
Which of the following is the default alignment in HTML?
► Left
► Center
► Right
► None
REFERENCE
align = left|center|right|justify|char [CI]
This attribute specifies the alignment of data and the justification of text in a cell. Possible values:
• left: Left-flush data/Left-justify text. This is the default value for table data.
• center: Center data/Center-justify text. This is the default value for table headers.
• right: Right-flush data/Right-justify text. • justify: Double-justify text. • char: Align text around a specific character. If a user agent
doesn't support character alignment, behavior in the presence of this value is unspecified.
Question No: 21 http://www.vustudents.net ( Marks: 2 )
What is Term ‘Catalog Display’ means? (page 92)
A Static catalog is a simple list written in HTML. One has to edit the HTML code
to change it. A dynamic catalog stores information about items in a database
usually on a different computer accessible by the web server. It can provide
photos, detailed description and search facility about the availability of items.
Question No: 22 ( Marks: 2 )
What is meant by a constructor? (page 69)
It is initializing function used to create instance of an object. It is after the name of the object whose
constructor it is.
Question No: 23 ( Marks: 3 )
What is meant by ‘Shopping Cart’ in context of e commerce? (page 92)
shopping cart was used wherein the user had to remember and type certain information. It is now
replaced by electronic shopping cart/basket that keeps record of the items the customer has selected
and allows customers to view the details of the items selected. The customer can add new items or
remove items. To order an item, a customer simply clicks at that item option. All details of an item,
including its price, product no. and order identifying information are stored automatically in the cart.
Question No: 24 ( Marks: 3 )
We have an array named my Array where this sentence is stored. “Welcome to Virtual University!”
If we apply str.split(’’) method.
What will be the output of str.split(’’)myArray(4) and str.split(’’)myArray(2) respectively.
Str.Split split the string based on the blank spaces.
str.split(’’)myArray(4) = blank
str.split(’’)myArray(2) = virtual
Question No: 25 ( Marks: 5 )
Describe the importance of Cryptography in internet data transfer security in E-Commerce?
It is a collection of mathematical techniques used to ensure confidentiality of information. The
process of scrambling a message with the help of a key is called Encryption.
Now a days as internet is widely used. So danger of data safety and serurity also rose. Compare to its
earlier use.
It provide the Transaction Integrity. Tranasction detail of both the parties can be verified which help
to built the confidence between business community.
It provide Privacy like it provide controls to prevent third parties from geting access to the
information within the transaction
Without cryptography, it is doubtful that banks, businesses and individuals would feel safe doing
business online.
Cryptography provides the confidence to the customer that their data is safe and secure. Otherwise
due to lack of confidence and doubt e-commerce business can not flourish.
Question No: 26 ( Marks: 5 )
Write a list of comparison operators in JavaScript with symbols.
Comparison operators
‘==’ for Equal
‘!=’ for not equal
‘< ‘ for Less than
‘<=’ for less than equal
‘>’ for Greater than
‘>=’ for Greater than equal
MIDTERM EXAMINATION
Spring 2009
IT430- E-Commerce (Session - 2)
http://www.vustudents.net
Question No: 1 __ ( Marks: 1 ) - Please choose one
Enable Virtual private network protocol (VPN) to be come a part of
Extranet .(page 98)
Intranet.
Extranet and Intranet.
None of these.
Question No: 2 ( Marks: 1 ) - Please choose one
Content pages relate to which of the following tag?
<iframe>
<Frame>
<frameset> (page 31)
<noframes>
Question No: 3 __ ( Marks: 1 ) - Please choose one
The attributes used by <EMBED . . .> depend on the type of ?
plugin being used
Browser being used (page 38)
ISP being used
Sound/movie being used
Question No: 4 ( Marks: 1 ) - Please choose one
Which of the following is HML tag could n’t be used as CSS tag?
<style>
<h1>
<p>
<a> (page 39)
css coding
<HTML><HEAD> <STYLE TYPE="text/css"> <!-- H1 { color: blue } --> </STYLE> </HEAD><BODY> <H1> A blue header </H1> </BODY></HTML>
H1 { color: blue; text-align: center; }
H1 { color: blue; text-align: center; }
<STYLE TYPE="text/css"> <!-- .myIndent { margin-left: 1.0in } --> </STYLE>
The HTML tags to reference the above .myIndent class is:
<H1 CLASS=myIndent>Indented Header</H1> <P CLASS=myIndent>Also this whole paragraph would be indented one inch</P> <P>but this wouldn't be indented</P>
Question No: 5 ( Marks: 1 ) - Please choose one
Which CSS tag is used to place an image that would remain when user scrolls down or
up the page?
background-attachment: fixed (page 48)
background-attachment: scroll
background-attachment: up
__ _ ___ _ ___ __
Question No: 6___( Marks: 1 ) - Please choose one
What does mean by != comparison operator?
Equal to Not
Equal
Not Equal (page 58)
Question No: 7 ( Marks: 1 ) - Please choose one
For which of following purpose the Firewall is used ?
Efficient working
None of these
Protection against security attacks (page 96)
Networking purpose
Question No: 8 ( Marks: 1 ) - Please choose one
Which one of the following certifies the binding be tween public key and its owner.
CA (page 101)
KDC
TLS
Firewall
Question No: 9 __ ( Marks: 1 ) - Please choose one
Choose the correct HTML tag to make a text bold
<tbold>
<b> (page 19)
<bld>
<bold>
ref http://www.w3schools.com/quiztest/quiztest.asp?qtest=HTML
Question No: 10 __ ( Marks: 1 ) - Please choose one
Middleware establishes connections between -------- --- .
e-commerce software and accounting system (page 92)
e-commerce software and web services web
services and CRM software
ERP and CRM software
Question No: 11 ( Marks: 1 ) - Please choose one
Firewall is used to
I - examin the data entering the network
II - examin the data leaving the network
III - filter the data according to certain rules
I and II only
I, II and III (page 96)
I and III only
I only
Ref http://www.webopedia.com/TERM/F/firewall.html
Question No: 12 ( Marks: 1 ) - Please choose one
When two or more intranets are connected to each ot her they form a/an ----------
VPN
intranet
internet
extranet (page 2)
Question No: 13 __ ( Marks: 1 ) - Please choose one
Which one specify the amount of space between the e dges of the cell and the text inside?
Space tag
CELLSPACING
CELLPADDING
FRAMESPACING
Question No: 14 ( Marks: 1 ) - Please choose one
Which of the following CANNOT be a value for the 't arget' attribute in anchor tag?
_new
_top
_blank
_self
ref
• _blank renders the link in a new, unnamed window
• _self renders the link in the current frame (useful for overriding
a BASE TARGET)
• _parent renders the link in the immediate FRAMESET parent
• _top renders the link in the full, unframed window
Question No: 15 ( Marks: 1 ) - Please choose
one In what form are style rules presented?
selector { property: value }
selector { property=value }
selector ( property: value )
selector ( property = value )
Question No: 16 __ ( Marks: 1 ) - Please choose one
What is identified by the tag <FRAMESET COLS="20%,6 0%,20%">?
Horizontal frame
Vertical Frame (page 31)
Top Frame
Bottom Frame
Question No: 17 __ ( Marks: 1 )
What it stands for (W3C)?
Answer
World Wide Web Consortium
Question No: 18 ( Marks: 1 )
Do you agree or not that using Cascading Style Shee ts one can apply an image to sections of one ’s page or even to individual words.
Question No: 19 ( Marks: 2 )
Which attribute is used to describe , how many time s you want the sound to repeat. Discuss briefly.
Question No: 20 __ ( Marks: 3 )
What are cookies? Why these are used in web develop ment?
Question No: 21 ( Marks: 5 )
What is the difference between physical address and logical address? Support your answer with
at least two examples.
Question No: 22 ( Marks: 10 )
How can we change a Font style of a text? Write com plete tag by using an example by yourself.