A Mega File of It for Current Quizzes

636
IT430- E-Commerce Composed By Faheem Saqib A Mega File for Current Quizzes For more Help Rep At Faheem_[email protected] [email protected] 0334-6034849--0315-5502544 IT430 Final 2010 Solved with ref Question No: 1 ( Marks: 1 ) - Please choose one In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last …………………withdrawals to the E-bank. 10 12 18 16 P:119 Lost Coins In case network fails or computer crashes during payment transaction, coins might be lost. All signed blinded coins from last 16 withdrawals are sent by the bank to the client. Client uses the blinding factor Question No: 2 ( Marks: 1 ) - Please choose one

Transcript of A Mega File of It for Current Quizzes

Page 1: A Mega File of It for Current Quizzes

IT430- E-Commerce

Composed By Faheem Saqib

A Mega File for Current Quizzes

For more Help Rep At

[email protected]

[email protected]

0334-6034849--0315-5502544

IT430 Final 2010 Solved with ref

Question No: 1 ( Marks: 1 ) - Please choose one

In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last …………………withdrawals to the E-bank.

► 10

► 12

► 18

► 16 P:119

Lost Coins

In case network fails or computer crashes during payment transaction, coins might be lost. All signed blinded coins from last 16 withdrawals are sent by the bank to the client. Client uses the blinding factor

Question No: 2 ( Marks: 1 ) - Please choose o ne

Page 2: A Mega File of It for Current Quizzes

Which entity does not include in SET(secure Electronic Transaction)?

► Seller

► Buyer

► Payment gateway

► Bank P:122

There are four entities involved in a SET transaction – cardholder, Merchant and certification authority and payment gateway.

Question No: 3 ( Marks: 1 ) - Please choose o ne

Traditionally Marketer use the market segmentation(s) like

► Geo-graphic Segmentation

► Demographic Segmentation

► Psychographic Segmentation

► All of the above P:131

Traditionally, marketers have used three types of variables to define three different market segmentations, namely, geographic segmentation, demographic segmentation and psychographic segmentation.

Question No: 4 ( Marks: 1 ) - Please choose o ne

Class C has:

► Network 01 byte and 03 hosts

► Network 02 bytes and 02 hosts

► Network 03 bytes and 01 host P:10

► None of these

In class C, first three bytes refer to the network address and the last byte to the host

Page 3: A Mega File of It for Current Quizzes

machines on that network, which would therefore be a very small network.

Question No: 5 ( Marks: 1 ) - Please choose o ne

In ring topology, failure of network cable will only take down one computer’s network access.

► True

► False

Question No: 6 ( Marks: 1 ) - Please choose o ne

Which device uses the IP address

► Switch

► Router P:16

A router is a decision making device. When a data packet arrives at a router it reads the network addresses from the IP address on the data packet and determines the shortest possible path through which this packet can be delivered to its destination.

► Repeater

► None of these

Question No: 7 ( Marks: 1 ) - Please choose o ne

What is the correct HTML for inserting an image?

► <image src="image.gif">

► <img src="image.gif"> P:21

<HTML> <BODY> <HI>On Sale Cassettes</H1> <Img Src=“cassette.gif”> </Body></HTML>

► <img href="image.gif>

Page 4: A Mega File of It for Current Quizzes

► <img>image.gif</img>

Question No: 8 ( Marks: 1 ) - Please choose o ne

Cryptographic Algorithms are measured in terms of

► Key length P:108

Cryptographic algorithms are measured in terms of key length.

► Complexity

► Simplicity

► All of the above

Question No: 9 ( Marks: 1 ) - Please choose o ne

Upstream activities relate to?

► Materials/services or the input from suppliers P:155

Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities.

• Upstream activities relate to materials/services or the input from suppliers

• Internal activities relate to manufacturing and packaging of goods

• Downstream activities relate to distribution and sale of goods to distributors/customers

► Manufacturing and packaging of goods

► Distribution and sale of goods to distributors/customers

► Input from suppliers and Distribution

Question No: 10 ( Marks: 1 ) - Please choose one

Television, radio and print media are in a (n) ……………………. Mode.

Page 5: A Mega File of It for Current Quizzes

► Passive P:139

Emotional branding vs. rational branding

In case of television, radio or print media people are normally in a passive mode. To a greater extent they do not control the communication channel and thus have to listen or view the advertisement about a brand.

► Active

► Static

► Dynamic

Question No: 11 ( Marks: 1 ) - Please choose one

Which of the following Barriers to International E-Commerce?

► Advertising

► Patents

► Infrastructure P:161

Barriers to International e-commerce

Barriers to international ecommerce include lack of trust, lack of infrastructure, language and culture.

► Capital

Question No: 12 ( Marks: 1 ) - Please choose one

Exclusive right granted by law to make, use and sell an invention. What is called?

► Parasites

���������Trade mark

������������������Patent infringement P:181

Page 6: A Mega File of It for Current Quizzes

Patent infringement

A patent is an exclusive right granted by law to make, use and sell an invention. In order to be patentable, the invention must be unique, genuine, and useful according to the prevalent technological standards.

���������Copyright

Question No: 13 ( Marks: 1 ) - Please choose one

Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act.

Which legal issue arises due to such acts?

► Cyber Crimes

► Online Defamation P:182

Online Defamation

A defamatory statement is a false statement that injures the reputation of on another person or company. If a statement injures the reputation of a product or service instead of a person, it is called product disparagement.

► Cyber squatting

► None

Question No: 14 ( Marks: 1 ) - Please choose one

Characterization and Clustering belong to which of the following types of Data Mining?

► Additive

► Predictive

► Selective

Page 7: A Mega File of It for Current Quizzes

► Descriptive P:141

Types of Data Mining

There are four main types of data mining as follows:

• Classification

• Association

• Characterization

• Clustering

Classification and association are predictive types of data mining while characterization and clustering represent the descriptive type.

Question No: 15 ( Marks: 1 ) - Please choose one

EDI stands for……..

► Electronic Digital Information

► Electronic Data Integration

► Electronic Data Interchange P:147

Lesson 36

ELECTRONIC DATA INTERCHANGE (EDI)

► All of these

Question No: 16 ( Marks: 1 ) - Please choose one

Implementing Value Chain model can help us to…

► Reduce cost

► Improve quality of products

► Create new ways of selling products

Page 8: A Mega File of It for Current Quizzes

► All of these. P:153

Examining value chains one finds that EC can help in four different ways as follows:

It can reduce costs of a business;

It can improve quality of products

It can help in reaching new customers or suppliers;

It can create new ways of selling products.

Question No: 17 ( Marks: 1 ) - Please choose one

Following are malicious programs EXCEPT ----------------- .

► Back doors

► Trojan Horses

► Firewalls P:96

Lesson 21

FIREWALLS

A firewall is a combination of hardware and software that sits between the internet and internal network of an organization to protect the network from outside attack (Fig. 1). It can examine the data entering or leaving from the network and can filter the data according to certain rules, thus, protects the network from an attack.

► Worms

Question No: 18 ( Marks: 1 ) - Please choose one

Which of the following is a valid variable name?

► 6th_student_CGPA

► first_student_CGPA P:54

Page 9: A Mega File of It for Current Quizzes

Rules for variables

Variable names can begin with an uppercase letter (A-Z), lower case letter (a-z), an underscore character (_), or dollar sign ($). Remaining characters can be any of the above or from digits (0-9). In JavaScript variables are case sensitive.

► last student CGPA

► *any_student_CGPA

Question No: 19 ( Marks: 1 ) - Please choose one

Which of the following payment mode does not require customer to

pay interest to the bank on each transaction?

► Credit card

► Debit card P:110

Note that in case of a credit card the issuer bank charges interest from the client at a specified rate on the amount lent. On the other hand, in case of a debit card no such interest is payable since the customer uses his/her own money in that case.

► Electronic check

► All of the above

Question No: 20 ( Marks: 1 ) - Please choose one

FVIPSS stands for _________.

► First Virtual Internet Payment System Server P:110

First Virtual InternePayment System Server

► First Virtual International Payment System Server

► First Virtual International Payment System Services

Page 10: A Mega File of It for Current Quizzes

► First Virtual Internal Payment System Services

Question No: 21 ( Marks: 1 ) - Please choose one

Which e-business helps to improve policies, procedures, customer services, and general operations of other businesses?

► Online shopping malls.

► Selling intellectual property online.

► Online service providers. P:129

Online Service Providers

These e-businesses help improve policies, procedures, customer service and general operations of other businesses. They can provide consultancy / professional services, for example, web site development services, online legal consultancy services etc.

► Online automotive sites and energy online.

Question No: 22 ( Marks: 1 ) - Please choose one

Which of the following is NOT an identified behavioral mode of customers on the web?

► Browsers

► Buyers

► Shoppers

► Seller

Behavioral segmentation

Page 11: A Mega File of It for Current Quizzes

Creation of separate experiences for customers based on their behavior is called

Three identified behavioral modes of the customers on the web are:

• Browsers – customers who just browse through the site with no intention of buying

• Buyers – customers who are ready to buy right away

• Shoppers – customers who are motivated to buy but want more information

Question No: 23 ( Marks: 1 ) - Please choose one

Downstream activities relate to distribution and sale of goods to distributors/customers

► True P:155

Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities.

• Upstream activities relate to materials/services or the input from suppliers

• Internal activities relate to manufacturing and packaging of goods

• Downstream activities relate to distribution and sale of goods to distributors/customers

► False

Question No: 24 ( Marks: 1 ) - Please choose one

Online banking is a substitute of tradition banking. Is it?

► True

► False

Page 12: A Mega File of It for Current Quizzes

Question No: 25 ( Marks: 1 ) - Please choose one

-------------means services in relation to the transformation of contents of an electronic

Document from its original form to one that cannot be understood or decoded by any unauthorized person

► Cryptography services P:163

“‘Cryptography services’ means services in relation to the transformation of contents of an electronic document from its original form to one that cannot be understood or decoded by any unauthorized person”.

► Accredited Certification Service Provider’

► Originator

► Addressee

Question No: 26 ( Marks: 1 ) - Please choose one

Law is broadly divided into two classes on the basis of nature of wrong, namely, ------------ and ---------------

► Civil law and criminal law P:176

Law is broadly divided into two classes on the basis of nature of wrong, namely, civil law and criminal law. Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Civil wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general.

► ETO and criminal law

► Supreme and Civil Law

► None

Question No: 27 ( Marks: 1 ) - Please choose one

Page 13: A Mega File of It for Current Quizzes

Each layer except ………… has got a header.

► Physical layer P:05

Header is a piece of information which is attached to the data at its beginning by each layer except the physical layer. The process of moving the data down the OSI Protocol.

► Datalink layer

► Session layer

► Network layer

Question No: 28 ( Marks: 1 ) - Please choose one

Symmetric algorithms are faster than asymmetric?

► true P:105

The advantage of using symmetric key is that since symmetric algorithms are faster as compared to asymmetric, therefore, the encryption of a message with the symmetric key takes place quickly.

► false

Question No: 29 ( Marks: 1 ) - Please choose one

SET was developed in _____.

► 1996

► 1997 P:122

Secure Electronic Transaction (SET)

The drawback in SSL that the credit card/debit card information remains with the merchant led to the development of a more sophisticated protocol called SET. It was developed in 1997 jointly by Visa, MasterCard, Netscape and Microsoft.

Page 14: A Mega File of It for Current Quizzes

► 1998

► 1999

Question No: 30 ( Marks: 1 ) - Please choose one

LDA stands for _______

► Lahore Development Authority P:165

A statutory body is a body/organization established under some statute/law. For example, the Lahore Development Authority (LDA) is a statutory body established under the Lahore Development Act, 1975 (a provincial statute).

► Lahore Development Act

Question No: 31 ( Marks: 2 )

What is Data Mining? P: 140

Data Mining

Data Mining can be defined as the task of discovering interesting patterns from large amounts of data, where the data can be stored in databases, data warehouses, or other information repositories. Data mining has a lot of business application in today’s world. We can identify the behavior of our customers and can effectively target them with personalized messages using data mining techniques.

Assume that there is a shopping store where the data/information about customers has been recorded /stored over a period of time. Using a data mining technique on the customers’ data, certain pattern can be generated that can provide useful information. For example, this pattern may tell us that people having a certain demographic profile (age over 20 years and sex male) coming from a particular location have shown inclination to buy computer related items. It is an interesting clue for the marketers.

Page 15: A Mega File of It for Current Quizzes

Question No: (Marks: 2 )

What is the purpose of FRAMESET tag? P: 31

<Frameset> and <Frame> are the two basic tags. This concept uses two different types of pages –

Frameset page and content pages. Frameset page divides the browser window into a set of frames and defines the size of each frame. It also specifies which content pages are displayed in which frame. It has nobody section (no body tag). Content pages are just regular HTML pages.

Question No: 33 (Marks: 2 )

What do we mean by "Free-Trial" promotion technique? P: 133

Promotions

E-business promotions can attract visitors to your site and induce them to purchase. Promotional messages can be sent both online and offline.

Free-trials

Customers can sign up for a free service. For example, they can be allowed to download software for certain days free of cost on trial basis before buying it.

Question No: 34 (Marks: 2 )

What is UNCITRAL?

Most of the countries have, by now, made laws providing recognition to electronic documents an electronic signature. They have basically followed a model law on e-commerce proposed by a U.N. body called UNCITRAL (United Nations Commission on International Trade Law) in 1996.

On analysis, appears that ETO has certain deficiencies. For instance, difference between an electronic signature and an advanced electronic signature is not clear. Sections dealing with the offences of violation of information a privacy and damage to information /informational systems are too broadly worded, which may lead to confusion. International aspects of e-commerce such as recognition of the foreign certificates and electronic signatures etc. are missing.

Page 16: A Mega File of It for Current Quizzes

Question No: 35 (Marks: 3 )

Write precisely about the 4th stage of planning cycle? P:159

Strategic Planning Cycle

E-business competitive strategy is normally formed and implemented according to a planning cycle which is called strategic planning cycle.

There are four stages in this planning cycle

1. Industry and Competitive Analysis Strategy 2. Formulation 3. Implementation 4. Performance Assessment or Strategy Reassessment

The 4th stage is Performance Assessment or Strategy Reassessment

Strategy assessment:

Results of implementation plan are monitored and assessed so that any corrective measures or expansion plan can take place. Basically, you want to assess whether your strategy has delivered what it was supposed to deliver; whether your strategy is still viable/workable in the ever changing environment. In strategy assessment phase, you can learn from your mistakes and do your future planning. In case your EC project has been a failure, you can identity the problems and try to remove them. Some of the corrective measures can be to property train your web team, establish or review your security or privacy policy, review or reassess your web design content, reconsider your marketing plan etc. For the strategy assessment, you can conduct surveys, collect information and receive feedback from different groups of people so that you have solid input from people coming from a variety of background. Sometimes, you have to entirety give up a particular strategy you followed and formulate a new strategy or set of strategies in light of the company’s main objective or its mission.

Question No: 36 (Marks: 3 )

Discuss the role and responsibilities of “Transport layer” in OSI model?

Transport layer

TCP (Transmission Control Protocol) or UDP (User Datagram Protocol) operate at this layer. It has two functions. It converts the data into data packets. Secondly, it is

Page 17: A Mega File of It for Current Quizzes

responsible for flow control of data. TCP is more reliable as it is acknowledgment based as opposed to UDP which does not use any system of acknowledgment for the delivery of data packets.

Question No: 37 (Marks: 3 )

How lack of trust barrier can be overcome or minimized? Discuss it briefly

Lack of Trust

It is very important for online businesses to establish trusting relationships with their customers like in the physical world where companies ensure that customers know who they are. However, it is difficult to build trust because a kind of anonymity exists for companies trying to establish web presence. Lack of trust barrier can be overcome or minimized:

• A plan for establishing credibility of an online business is extremely crucial for its success.

• In this behalf, attention to the needs of the site visitors is very important while designing the web site, since it can be helpful in building trust with customers. For instance, there should be easy to find web pages that answer questions of the visitors.

• Note that companies with established brands can build trust for online business more quickly as compared to a new company/business without reputation, since a brand conveys expectations about how the online business would behave. For example, how the seller online business would react to a claim of refund by the customer.

Question No: 38 (Marks: 3 )

Write the names of companies who were helper in developing Secure Electronic Transaction.

Secure Electronic Transaction. (SET)

It was developed in 1997 jointly by Visa, MasterCard, Netscape and Microsoft.

Question No: 39 (Marks: 5 )

Page 18: A Mega File of It for Current Quizzes

Differentiate between Cyber squatting and concurrent use with example. P: 181

Cyber squatting

The act of intentionally registering domain names containing trademarks/trade names of prominent companies to later blackmail or demand ransom from those companies is called cyber squatting.

Example:

Assume there is a firm ‘Glory Enterprise’ and it wants to have its web site. It also wants to have the word ‘glory’ as a part of its domain name because for years it has been recognized in the physical world through this word. However, at the time of registration of its domain name it finds that a person Mr. ‘A’ who has nothing to do with the business of the firm or the word ‘glory’ has already registered a domain name containing this word as a part of it. Since there cannot be two similar domain names, the firm is forced to request Mr. ‘A’ to transfer that domain name to it. In response, if Mr. ‘A’ blackmails or claims ransom from the said firm, he would be said to have committed cyber squatting. Concurrent use

This problem arises when two organizations have apparently legitimate claim to use the same domain name but cannot do so due to the uniqueness of domain names.

Example:

Suppose, there is a company manufacturing electronic goods and another company selling French fries. Under the traditional trade mark law both these companies can have the same trade mark/trade name such as ‘frys’. The problem arises when both apply for the registration of a domain name containing the word ‘frys’. Here, both are legitimate claimants of this domain name but due to the element of uniqueness of domain names only

one of them can be assigned the desired domain name.

Question No: 40 (Marks: 5 )

Page 19: A Mega File of It for Current Quizzes

Explain ‘Confidence’ and ‘Support’ as two measures of Association? P: 144

CONFIDENCE AND SUPPORT

There are two terms/measures used in association, that is, support and confidence. Confidence’ is a measure of how often the relationship holds true e.g, what percentage of time did people who bought milk also bought eggs. Support means what is the percentage of two items occurring together overall. Mathematically, they can be expressed as follows if we take the example of eggs and milk:

Confidence = Transactions (eggs + milk)

Transactions (eggs or milk or both)

In case no. of transactions involving eggs and milk are 25 and those involving eggs or milk or both are 75

then confidence is 25/75*100=33.3%

Support = Transactions (eggs + milk)

Total no. of transactions

In case no. of transactions involving eggs and milk are 10 and total no. of transactions in a day is 50 then

support is 10/50*100 = 20%

Suppose if confidence is 90% but the support is 5%., then we can gather from this that the two items have very strong affinity or relationship with each other such that when an item is sold the other is sold together, However, the chance of this pair being purchased out of the total no. of transactions is very slim, just 5%. One can adjust these measures to discover items having corresponding level of association and accordingly set marketing strategy. So, if I feed the data to the association mining tool and specify the percentage of confidence and support, it will list down the items that have association

Page 20: A Mega File of It for Current Quizzes

corresponding to these percentages. Results of association mining are shown with the help of double arrows as indicated below:

Bread Å----Æ Butter

Computer Å----Æ Furniture

Clothes Å----Æ Shoes

Using the result of association mining, a marketer can take a number of

useful steps to set or modify marketing strategy. For example, items that

have closeness/affinity with each other can be shelved together to improve

customer service. Certain promotional schemes can be introduced in view

of the association mining result etc.

FINALTERM EXAMINATION

Fall 2009

IT430- E-Commerce

Question No: 1 ( Marks: 1 ) - Please choose one

In

case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed

coins from last …………………withdrawals to the E-bank.

► 10 Correct

► 12

► 18

► 16

Question No: 2 ( Marks: 1 ) - Please choose o ne

Page 21: A Mega File of It for Current Quizzes

In

Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT

included:

► Buyer Accounts identifier

► Buyer password Correct

► Address of Merchant

► Actual amount of money in favor of merchant

Question No: 3 ( Marks: 1 ) - Please choose o ne

Which 5th P introduced by E-business in Marketing Mix?

► Proper coverage

► Personalized Services Correct

► Proper access

► Personal style

Question No: 4 ( Marks: 1 ) - Please choose o ne

Creation of separate experiences for customers based on their behavior is called

Page 22: A Mega File of It for Current Quizzes

► Demographic segmentation

► Behavioral segmentation Correct

► Geo-Graphic Segmentation

► None of the above

Question No: 5 ( Marks: 1 ) - Please choose o ne

Call

handling, sales tracking and Transaction support(technology / personnel) activities are included in which

management system

► Customer Relationship Management system

► Public relation management system

► Inventory management system Correct

► Data Base Management system

Question No: 6 ( Marks: 1 ) - Please choose o ne

Network addresses 128--- 191 range belongs to which of the following class networks?

► A

Page 23: A Mega File of It for Current Quizzes

► B

► C Correct

► E

Question No: 7 ( Marks: 1 ) - Please choose o ne

What is the correct HTML for making a text input fi eld?

► <textinput type="text">

► <input type="text">

► <input type="textfield"> Correct

► <textfield>

Question No: 8 ( Marks: 1 ) - Please choose o ne

What is the correct HTML for making a hyperlink?

► <a href="http://www.w3schools.com">W3Schools</a>

► <a name="http://www.w3schools.com">W3Schools.com</a> Correct

► <a url="http://www.w3schools.com">W3Schools.com</a>

► <a>http://www.w3schools.com</a>

Question No: 9 ( Marks: 1 ) - Please choose one

DOS is a type of attack and it stands for:

► Denial of Services Correct

► Digital Operation Services

Page 24: A Mega File of It for Current Quizzes

► Dynamic Object Solution

► All of these

Question No: 10 ( Marks: 1 ) - Please choose one

An electronic check contains a(n)………………… to the payer’s bank to make a specified payment to the payee

► Serial#

► Private key

► Instruction

► All of the above Correct

Question No: 11 ( Marks: 1 ) - Please choose one

What is a E-Cash wallet ?

► Hardware

► Agent

► Software

► All of the above Correct

Question No: 12 ( Marks: 1 ) - Please choose one

Internal activities relate to?

► Materials/services or the input from suppliers

Page 25: A Mega File of It for Current Quizzes

► Manufacturing and packaging of goods Correct

► Distribution and sale of goods to distributors/customers

► Input from suppliers and Manufacturing

Question No: 13 ( Marks: 1 ) - Please choose one

Customer data can be gathered and analyzing it customers can be served in a better

Manner according to their needs, Which is best option?

► Customization

► Customer orientation

► Customer satisfaction

► Focus Correct

Question No: 14 ( Marks: 1 ) - Please choose one

Popular software packages for personal finance is(are):

► Quicken

Page 26: A Mega File of It for Current Quizzes

► MS Money

► Money 2003

► All of these Correct

Question No: 15 ( Marks: 1 ) - Please choose one

An

array can contain ----------.

► only text

► only numbers

► only numbers or text Correct

► any valid variable

Question No: 16 ( Marks: 1 ) - Please choose one

You

define a method using

► obj.method Correct

► obj.method[]

► obj.method()

► obj-method

Question No: 17 ( Marks: 1 ) - Please choose one

Which of them is NOT an attribute of border?

► border-width

► border-style

► border-pattern Correct

► border-bottom-color

Page 27: A Mega File of It for Current Quizzes

Question No: 18 ( Marks: 1 ) - Please choose one

If a

key is 4 bits in length, how many unique key values are possible?

► 4

► 8

► 16 Correct

► 32

Question No: 19 ( Marks: 1 ) - Please choose one

PKI

stands for ___________.

► Public Key Instrument

► Public Key Information

► Public Key Instruction

► Public Key Infrastructure Correct

Question No: 20 ( Marks: 1 ) - Please choose one

Which of the following payment system does not involve the use of encryption?

► Electronic check

► Electronic cash

► Virtual PIN

► None of above Correct

Question No: 21 ( Marks: 1 ) - Please choose one

Page 28: A Mega File of It for Current Quizzes

ACH

is a centralized system used by electronically inter-connected banks for clearing payment requests.

► True Correct

► False

Question No: 22 ( Marks: 1 ) - Please choose one

Cyber wallet can automatically assemble the correct payment and pay it too.

► True Correct

► False

Question No: 23 ( Marks: 1 ) - Please choose one

In E-

Cash Payment system, merchant deposits the coins in the bank to check the ______ of coins.

► Number

► Validity Correct

► Private key

► Sender

Question No: 24 ( Marks: 1 ) - Please choose one

SET

transactions are slower than SSL.

► True Correct

► False

Question No: 25 ( Marks: 1 ) - Please choose one

Page 29: A Mega File of It for Current Quizzes

Which of the following is an advantage of electronic catalogue?

► Large fix cost if used for small no. of products.

► Ability of updating product information. Correct

► Need for customer skill of computers and browsers.

► Difficult to develop catalogue.

Question No: 26 ( Marks: 1 ) - Please choose one

Suppose you are running a business. You want to target customers of age less than 30 years. Which type

of segmentation would you use?

► Demographic Segmentation Correct

► Geographic Segmentation

► Psychographic segmentation

► Behavioral segmentation

Question No: 27 ( Marks: 1 ) - Please choose one

Data cleaning means ________.

► Adding missing values

► Correction of erroneous values

► Both of above Correct

► None of above

Question No: 28 ( Marks: 1 ) - Please choose one

Online banking is a substitute of tradition banking. Is it?

► True

Page 30: A Mega File of It for Current Quizzes

► False Correct

Question No: 29 ( Marks: 1 ) - Please choose one

IT/EC can reduce the overall ------------- and afford to keep the price of

the product relatively low

► Production cost Correct

► Marketing cost

► Distribution cost

► None

Question No: 30 ( Marks: 1 ) - Please choose one

Which organization is used to supervise the task of registration of domain names worldwide?

► ICCAN

► ICAAN Correct

► IICAN

Page 31: A Mega File of It for Current Quizzes

► None of the given

Question No: 31 ( Marks: 1 )

What stands for CRM?

Ans:

CUSTOMER RELATIONSHIP MANAGEMENT (CRM)

Question No: 32 ( Marks: 1 )

Here

is an e-coin minted by the bank with 2 dollar key.

)(mod.#)(mod)#.( 22222 mrSerialmrSerial dedde =

If the bank had signed the same coin with 3 dollar key, what would be the resulting e-coin?

Question No: 33 ( Marks: 2 )

Briefly describe analytical attack on public key algorithms.

Analytical Attacks

Page 32: A Mega File of It for Current Quizzes

These attacks are some fundamental flaws in the mathematical problems on which the encryption system itself is based.

A branch, Quantum computing is the branch of computer science that deals with the development of cryptographic algorithms. It can also be used to find flaws in the cryptographic system/algorithms and to launch attacks.

Question No: 34 ( Marks: 2 )

Do

you agree that Differentiate a product in terms of quality of service is one of the role of e-commerce

in Competitive Strategy. Discuss briefly

Question No: 35 ( Marks: 3 )

Digital signatures are considered more reliable than paper signatures. Do you agree with this

statement? Briefly justify your answer. 1+2

Ans:

Yes, digital signature is more reliable than paper signature. Because digital signature contain more

information than paper.

Question No: 36 ( Marks: 3 )

What is clustering? Briefly explain with help of ex ample. 1+2

Page 33: A Mega File of It for Current Quizzes

This is a group of data objects that are similar to another within the same cluster and are dissimilar to the objects in other clusters. For example, web usage of different categories or list of email addresses in data base.

Question No: 37 ( Marks: 3 )

Point out the certain deficiencies in ETO?

ETO stands for Electronic Transactions Ordinance

Question No: 38 ( Marks: 5 )

Explain the advantages of E-business regarding toda y’s scenario.

Advantages of E-business

Personalized service

Product, place, price and promotion are generally recognized as the 4 P’s of marketing in relation to

Traditional offline businesses. However, personalization is the 5th ‘P’ added to the other 4 P’s when we are discussing about an e-business. By using internet data we can gather information for database and make personalized data for services.

High-quality customer service

By getting online suggestion we can improve our quality.

No inventory cost

Page 34: A Mega File of It for Current Quizzes

In such there is no warehouse is required therefore inventory cost is very low. Because we take order from client and fulfill it by procuring from open market.

Worldwide reach of your business

An online business can work anywhere in world. This is a good concept of Global business.

Electronic catalogues

Electronic cards and catalogues are used to enhance the procedure for customers.

Therefore, online shopping can be done more quickly and in a more convenient environment.

Question No: 39 ( Marks: 5 )

List

down three Supporting activities with examples as d iscussed by Michael Porter in a strategic business unit.

Ans;

1- Human Resource – This is referred to activities that are coordination of management employees e.g. staffing, compensation and benefits.

2- Financial And Administration - It is relating to paying bills, accounting.

3- Technology Department – It is used for improvement of product and services for best selling the product. E.g. improvement of field tests, process improvement studies.

Question No: 40 ( Marks: 10 )

Page 35: A Mega File of It for Current Quizzes

How anonymity is ensured in E-Cash payment system? Explain with the help of examples.

Ans:

In E cash payment system, anonymity means that the identity of client or customer will not be disclosed.

In this payment mechanism, there are two stages,

1- Minting Stage 2- Deposit Stage

1- At minting stage e- cash bank signed the serial no. to provide the third part of valid coin. But at this stage bank actually knows that who are amongst its different account holders whose are requesting for the banks signature on the serial no, but it does not mean that it knows the serial no, it is just a blinding factor due to signing.

2- This is reverse to minting stage. In this case we sent the coins toe- cash bank to check the validity. In this case bank know the serial no. but this time doesn’t know the client who sent these for payment purpose. Because the bank may have issued the coins to many clients and bank at deposit stage doesn’t know who did shopping and making payment now.

So, the relationship between the client and the serial no. is broken

at the minting and deposit stage to ensure anonymity of the client.

So if we summarize it then as follows

Minting Stage

Page 36: A Mega File of It for Current Quizzes

Serial number is unknown

Client is known

Deposit Stage

Serial no. is known

Client is unknown

------------------------------------------------------------------------------------------------

Question No: 41 ( Marks: 10 )

Differentiate between the centralized electronic payment system and electronic checks.

Centralized Electronic Payment System

Electronic Check

Page 37: A Mega File of It for Current Quizzes

In an electronic check, information contains are that instruction to the payer’ bank to make a specific payment to payee.

This concept is launched by Financial Services Technology Consortium (FSTC). It is a group of US banks.

In this system two types of cryptography are used

1- Symmetric 2- Asymmetric

Certificates are issued to both parties in standard format by their respective banks and these are issued to check the digital signature on the check. These certificates may have some restrictions on the certificates like, max check value, or currencies allowed etc.

This check book device is a combination of hardware and software. In hardware a smart card may be used. It is like s credit cad. Certain information are provided on the card and one secrete key is also issued.

Centralized Electronic Payment System

This is a popular payment system on the internet. In this both the payer and the payee

hold accounts at the same centralized on-line financial institution. Many payment systems use this approach e.g., PayPal, E-gold, Billpoint, Cybergold, Yahoo! Pay Direct, Amazon.com Payments etc

On-line opening/ of one’s account is done in a centralized bank using credit/debit card. To make payment an account holder is authenticated using an account identifier and a password, account identifier of the payee and the payment amount.

Page 38: A Mega File of It for Current Quizzes

In this system, payee is notified by their account statement y phone sms or email.

The centralized bank charges a transaction fees either from the payer, or payee

or both on funding an account or withdrawing funds from an account or receiving payments by the

payee. This payment model requires that all participants must have their account with the same central payment system/bank. Note that the payee can eventually withdraw the money received in hi account in the centralized bank through Automated Clearing House (ACH).

IT430 Final 2010

Question No: 1 ( Marks: 1 ) - Please choose o ne

In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last …………………withdrawals to the E-bank.

► 10

► 12

► 18

► 16

Ref: Page # 119

Lost Coins

In case network fails or computer crashes during payment transaction, coins might be lost. All signed blinded

coins from last 16 withdrawals are sent by the bank to the client

Question No: 2 ( Marks: 1 ) - Please choose o ne

www.amzon.com as you all familiar with it.

Which of the following loyalty stages its customers are:

( Who don’t know about it): Detail about amzon.com )

Page 39: A Mega File of It for Current Quizzes

"Amazon was one of the first major companies to sell goods by Internet, and was an iconic "stock in which to invest" of the late 1990s dot-com bubble. Jeff Bezos founded Amazon.com, Inc. in 1994, and launched it online in 1995. Amazon.com started as an on-line bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3 format, computer software, , etc. Amazon has established separate websites in Canada, the United Kingdom, Germany, France, China, and Japan. It also provides global shipping to certain countries for some of its products. "

► Awareness

► Exploration

► Familiarity

► Commitment

Page # 136http://vugoogle.com/

Awareness

This is the first stage where customers recognize the name of the company or any of its products. However,

they have never interacted with the company before. A company/business can achieve this level by properly

advertising its brand.

Question No: 3 ( Marks: 1 ) - Please choose o ne

Customer Loyalty model is also called

► Customer Life Cycle

► Customer Segmentation

► Customer Awareness

► All of the options

Page # 136--137

Question No: 4 ( Marks: 1 ) - Please choose o ne

Which of the following is True for Class B:

► Network 01 byte and 03 hosts

► Network 02 bytes and 02 hosts

► Network 03 bytes and 01 host

Page 40: A Mega File of It for Current Quizzes

► None of these

Page # 10

In class B, the first two bytes indicate the network address and the last two bytes indicate the host machines

on that network

Question No: 5 ( Marks: 1 ) - Please choose o ne

RIP(Routing Information protocol) is used by---------- , to build a ------------ table

► bridges , hash

► routers, matrix

► routers , routing

► All of these

Page # 16

A router can communicate with another router on the internet with the help of Routing Information

Protocol, and thus it can build a routing table.

Question No: 6 ( Marks: 1 ) - Please choose o ne

Switch is used on the layer

► First Layer

► Second Layer

► Third Layer

► None of these

Ref: IT430 1 st assignment solution file uploaded by instructor.

Question No: 7 ( Marks: 1 ) - Please choose o ne

Router is used on the layer

► First Layer

► Second Layer

Page 41: A Mega File of It for Current Quizzes

► Third Layer

► None of these

Ref: IT430 1 st assignment solution file uploaded by instructor.

Question No: 8 ( Marks: 1 ) - Please choose o ne

In HTML If you leave out the setting for scrolling what will happen?

► No scrollbar will appear even if needed.

► A scrollbar will always be present.

► A scrollbar will appear if needed.

► All options.

SCROLLING – this attribute determines whether a scroll bar appears with a frame (e.g,

Scrolling=“yes” in the <frame> tag makes it appear)

Question No: 9 ( Marks: 1 ) - Please choose o ne

Which one of the following attacks does not include in the attacks on Symmetric key

► Key search attack

► Cryptanalysis

► System based attacks

► Organization attacks

Page # 108

Attacks on Symmetric Key Algorithms

Following attacks have been reported on symmetric key algorithms:

Key Search Attacks

Cryptanalysis

System-based Attacks

http://vugoogle.com/

Page 42: A Mega File of It for Current Quizzes

Question No: 10 ( Marks: 1 ) - Please choose one

What is a E-Cash wallet ?

► Hardware

► Agent

► Software

► All of the above

Page # 116

Buyers withdraw coins against their account and store them in e-cash wallet software (Cyber wallet) on their

computer. Cyber wallet stores and manages coins and records every transaction.

Question No: 11 ( Marks: 1 ) - Please choose one

It is the ability to sell the goods or provide the service at a price that is lower than that of competitors, and thus attract more customers.

What is called?

► Cost leadership

► Price leadership

► Focus

► Differentiation

Ref: PAGE # 157

Cost leadership:

It is the ability to sell the goods or provide the service at a price that is lower than that of

competitors, and thus attract more customers.

http://vugoogle.com/

Question No: 12 ( Marks: 1 ) - Please choose one

Meta tag contains:

► User information

► seller information

► web page key information

Page 43: A Mega File of It for Current Quizzes

► bank information

Ref: PAGE # 138

META INFORMATION:

You know that a Meta tag contains the key information of a web page.

Question No: 13 ( Marks: 1 ) - Please choose one

In many countries, stealing and misusing of meta information for getting competitive advantage is considered as an offence known as

► Tort of Private Nuisance

► Tort of Tress passing

► Tort of passing off

► Defamation

Ref: PAGE # 138

In many countries, stealing and misusing Meta information in this manner to gain

business/competitive advantage is considered as an offence known as the tort of passing-

off.

Question No: 14 ( Marks: 1 ) - Please choose one

Which of the following is NOT force of Porter’s competitive rivalry Model?

► Threat of potential/new entrants

► Threat of substitute

► Differentiation and cost leadership

► Competition between existing players

Page # 158

Threat of potential/new entrants to the sector

Threat of substitute product or service in the existing trade

Bargaining power of the buyers

Bargaining power of the suppliers

Page 44: A Mega File of It for Current Quizzes

Competition between existing players

Question No: 15 ( Marks: 1 ) - Please choose one

Exclusive right granted by law to make, use and sell an invention. What is called?

► Parasites

► Trade mark

► Patent infringement

► Copyright

Ref: PAGE # 181

Patent infringement:

A patent is an exclusive right granted by law to make, use and sell an invention. In

order to be patentable, the invention must be unique, genuine, and useful according to the

prevalent technological standards.

Question No: 16 ( Marks: 1 ) - Please choose one

GM Celebes manufacturing electronic goods and FryChips co selling French fries. Under the traditional trade mark law both these companies can have the same trade mark/trade name such as ‘frys’.

The problem arises when both apply for the registration of a domain name containing the word ‘frys’. Here, both are legitimate claimants of this domain name but due to the element of uniqueness of domain names only one of them can be assigned the desired domain name.

Which legal issue arises in this situation?

► Domain name conflict

► Cyber squatting

► Concurrent use

► None

Ref: PAGE # 181

Concurrent use

Page 45: A Mega File of It for Current Quizzes

This problem arises when two organizations have apparently legitimate claim to use

the same domain name but cannot do so due to the uniqueness of domain names.

Suppose, there is a company manufacturing electronic goods and another company

selling french fries. Under the traditional trade mark law both these companies can

have the same trade mark/trade name such as ‘frys’. The problem arises when

both apply for the registration of a domain name containing the word ‘frys’. Here,

both are legitimate claimants of this domain name but due to the element of

uniqueness of domain names only one of them can be assigned the desired domain

name.

Question No: 17 ( Marks: 1 ) - Please choose one

ANSI stands for ……….

► American National Standards Institute

► All Network Standards Institute

► American New standards Institute

► Australia National standards Institute

Page # 147

ANSI (American National Standards Institute)

Question No: 18 ( Marks: 1 ) - Please choose one

Which of the following company develop ERP soft wares?

► SAP

► Oracle

► JD Edward

► All of these

Page # 150

SAP is an example of ERP software. ERP is complex. It is not intended for public consumption as proper

integration of ERP with ecommerce applications is still a major problem.

Question No: 19 ( Marks: 1 ) - Please choose one

Page 46: A Mega File of It for Current Quizzes

Company collecting information assumes that the customer does not object to a specific use of information unless the customer specifically denies the permission. Thus, the company may use the collected information for its own purpose, as well as, sell or rent it out to other firms or persons.

Which of the following Approach it is using?

► Opt-inout

► Opt-out

► Swap-out

► Opt-in

Page # 183

opt-out approach, the company collecting information assumes that the customer does not object to a

specific use of information unless the customer specifically denies the permission. Thus, the company may

use the collected information for its own purpose, as well as, sell or rent it out to other firms or persons.

Question No: 20 ( Marks: 1 ) - Please choose one

What does ++ operator do?

► Adds two numbers together

► Joins two text strings together

► Adds 1 to a number

► Adds 2 to a number

Page # 58

Operators in java script

Mathematical operators ‘+’ For addition of two values ‘-‘ for subtraction of two values ‘*’ for multiplication

‘/’ for division ‘%’ modulus (for calculating the remainder) ‘++’ for increment ‘--‘ for decrement Logical

operators ‘&&’ for logical and ‘||’ for logical or ‘!’ for logical not

Question No: 21 ( Marks: 1 ) - Please choose one

A paper signature is believed to be more reliable than a digital signature.

► True

Page 47: A Mega File of It for Current Quizzes

► False

Ref: PAGE # 106

A digital or electronic signature is believed to be more reliable as compared to

paper signatures because it is not ordinarily possible to copy or forge an electronic/digital

signature. But, that is very much possible in case of paper signatures.

Question No: 22 ( Marks: 1 ) - Please choose one

Job searchers can search for jobs and employers can hire effectively using _____________.

► Online recruiting web sites.

► Online banking web sites.

► Online trading and lending web sites.

► Online news services web sites.

Ref: PAGE # 128

Online Recruiting:

Employers can recruit and job searchers can search for jobs effectively through online

recruiting web sites.

Question No: 23 ( Marks: 1 ) - Please choose one

Suppose you want to search from Virtual University’s database that how many students have taken MBA in a specific semester. In this scenario, which type of data mining you are using?

► Classification

► Association

► Characterization

► Clustering

Page # 144

Characterization

It is discovering interesting concepts in concise and succinct terms at generalized levels for examining the

general behavior of the data. For example, in a database of graduate students of a university the students of

different nationalities can be enrolled in different departments such as music history, physics etc. We can

apply characterization technique to find a generalized concept/answer in response to the question that how

many students of a particular country are studying science or arts

Page 48: A Mega File of It for Current Quizzes

Question No: 24 ( Marks: 1 ) - Please choose one

For example, white color denotes purity in Europe and America but is associated with death and mourning in china and some Asian countries. Similarly, a web page divided

into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death .

Which of the following barrier involve in above example

► Culture

► Language

► Trust

► Infrastructure Issues

Page # 162

For example, white color denotes purity in Europe and America but is associated with death and mourning in

china and some Asian countries. Similarly, a web page divided into four segments can be unpleasant to a

Japanese visitor because no. four is a symbol of death in that culture.

Question No: 25 ( Marks: 1 ) - Please choose one

-------------means services in relation to the transformation of contents of an electronic

document from its original form to one that cannot be understood or decoded by any unauthorized person

► Cryptography services

► Accredited Certification Service Provider’

► Originator

► Addressee

Page # 163

“‘Cryptography services’ means services in relation to the transformation of contents of an electronic

document from its original form to one that cannot be understood or decoded by any unauthorized person”.

Question No: 26 ( Marks: 1 ) - Please choose one

“Risk Management “ is the part of which activity?

Page 49: A Mega File of It for Current Quizzes

► E-business

► E-commerce

► E-marketing

► All of the given

Question No: 27 ( Marks: 1 ) - Please choose one

Which type of algorithm is used by virtual pin system for encryption?

► DES (Data Encryption Standard)

► IDEA (International Data Encryption Algorithm)

► Rinjdael

► Non of above

Page # 110

Virtual PIN system does not involve the use of encryption.

Question No: 28 ( Marks: 1 ) - Please choose one

Which one is not the life cycle stage of the customer relation?

► Awareness

► Exploration

► Familiarity

► Cancelation

Page # 136

Question No: 29 ( Marks: 1 ) - Please choose one

Popular EDI documents formatting standards _______

X12 ►

EDIFACT ►

Page 50: A Mega File of It for Current Quizzes

X12 ► and EDIFACT

None ►

Page # 147

EDI documents are formatted using published standards. Two popular EDI standards are - ANSI

(American National Standards Institute) X12 standard and EDIFACT (United Nations Standard of

Electronic Data Interchange for Administration, Commerce and Transport).

Question No: 30 ( Marks: 1 ) - Please choose one

LDA stands for _______

Lahore ► Development Authority

Lahore ► Development Act

Page # 165

For example, the Lahore Development Authority (LDA) is a statutory body established under the

Lahore Development Act, 1975 (a provincial statute).

Question No: 31 ( Marks: 2 )

What is meant by EDI?

Question No: 32 ( Marks: 2 )

What do we mean by “Affiliation” between two parti es? Explain shortly.

Question No: 33 ( Marks: 2 )

Write HTML code for two input fields, one for Login Name and other for Password.

Question No: 34 ( Marks: 2 )

What term/matters does the concurrent legislative list sets out according to (ETO) 2002?

Page 51: A Mega File of It for Current Quizzes

Question No: 35 ( Marks: 3 )

Describe the importance of Customer Relationship Management (CRM) in current scenario.

Question No: 36 ( Marks: 3 )

In ETO, what are functions of Accredited Certification Service Provider?

Question No: 37 ( Marks: 3 )

How many legislative list(s) is(are) in Constitution of Islamic Republic of Pakistan at end?

Question No: 38 ( Marks: 3 )

Write short note on Packet Filter Firewall?

Question No: 39 ( Marks: 5 )

Discuss briefly how companies are getting competi tive advantage over the other organizations through differentiation and focus?

Question No: 40 ( Marks: 5 )

Write a short note on the following Global legal issues (Marks: 2.5+2.5=5)

1. Territorial Jurisdiction

2. Online contracts

FINALTERM EXAMINATION

Spring 2009

IT430- E-Commerce (Session - 3)

Ref No: 17

Time: 120 min

Question No: 1 ( Marks: 1 ) - Please choose one

Page 52: A Mega File of It for Current Quizzes

At

minting stage, the serial number is ……………..by E-Cashbank

► Known

► Unknown

► Secret

Secret

► Forwarded

Forwarded

Question No: 2 ( Marks: 1 ) - Please choose o ne

SET

and SSL both are same with respect to security.

► True

► False

Question No: 3 ( Marks: 1 ) - Please choose o ne

Advertising Supported Revenue Model includes

► Yahoo portal

► Employment sites

Page 53: A Mega File of It for Current Quizzes

► Newspaper Publishers

► All of the above

Question No: 4 ( Marks: 1 ) - Please choose o ne

Advertising Subscription Mixed Revenue Model includes

► Online journals

► Sports information services

► Business week online

► All of the above

Question No: 5 ( Marks: 1 ) - Please choose o ne

Let

us, suppose that you have hosted your e-commerce website,

When you provide “opt-in e-mail” option to your customers on your website and customer opt for it ,

what does it mean to receive ?

► Information about product through advertisement

► Information about product through e-mail

► Information about services available on it

Page 54: A Mega File of It for Current Quizzes

► Information about News through e-mail.

Question No: 6 ( Marks: 1 ) - Please choose o ne

What does Telemarketing means?

► Marketing through charting

► Marketing through telephone

► Marketing through email

► Marketing through web casting

Question No: 7 ( Marks: 1 ) - Please choose o ne

Visitor’s location, IP address, time of visit related information are added, in which of the following

► call handling files

► cookies

► log files

► Data mining files.

Page 55: A Mega File of It for Current Quizzes

Question No: 8 ( Marks: 1 ) - Please choose o ne

HTML stands for ?

► Hyper Text Marked Language

► Hyper Text Markup Language

► Hyper Text Member License

► None of these

Question No: 9 ( Marks: 1 ) - Please choose o ne

For

which one of the following,<MARQUEE ...> tag can work better

► News headlines

► Announcements

► Sound pulgin

► Movie controls

Question No: 10 ( Marks: 1 ) - Please choose one

Which of the following ,in Javascript, we could not create our own?

► Textboxes

► Dropdown

► Object

► Image

Question No: 11 ( Marks: 1 ) - Please choose one

Page 56: A Mega File of It for Current Quizzes

How do you write a conditional statement for executing some statements only if "i" is equal to 5?

► if i=5

► if i=5 then

► if i==5 then

► if (i==5)

Question No: 12 ( Marks: 1 ) - Please choose one

Which one of the following ,is the correct way to declare a JavaScript array?

► var txt = new Array="tim","kim","jim"

► var txt = new Array(1:"tim",2:"kim",3:"jim")

► var txt = new Array("tim","kim","jim")

► var txt = new Array:1=("tim")2=("kim")3=("jim")

Question No: 13 ( Marks: 1 ) - Please choose one

Upstream activities relate to?

► Materials/services or the input from suppliers

► Manufacturing and packaging of goods

► Distribution and sale of goods to distributors/customers

Page 57: A Mega File of It for Current Quizzes

► Input from suppliers and Distribution

Question No: 14 ( Marks: 1 ) - Please choose one

Downstream activities relate to?

► Materials/services or the input from suppliers

► Manufacturing and packaging of goods

► Distribution and sale of goods to distributors/customers

► Manufacturing and Distribution

Question No: 15 ( Marks: 1 ) - Please choose one

Porter’s Model helps a firm to identify threats to its competitive position and to devise plans including

the use of IT and e-commerce to protect or enhance that position.

► True

► False

Page 58: A Mega File of It for Current Quizzes

Question No: 16 ( Marks: 1 ) - Please choose one

A

company collecting information assumes that the customer does not object to a specific use of

information unless the customer specifically denies the permission. Thus, the ompany may use the

collected information for its own purpose, as well as, sell or rent it out to other firms or persons.

Which of the following Approach it is using?

► Opt-inout

► Swap-out

► Opt-in

► Opt-out

Question No: 17 ( Marks: 1 ) - Please choose one

Which type of Data Mining contains the elements as Support and confidence?

► Classification

► Association

► Characterization

► Clustering

Page 59: A Mega File of It for Current Quizzes

Question No: 18 ( Marks: 1 ) - Please choose one

In which type of data mining, Apriori algorithms is used?

► Classification

► Association

► Characterization

► Clustering

Question No: 19 ( Marks: 1 ) - Please choose one

How

do you define a numerical value?

► var mynum = new Math;

► var mynum = Math(6);

► var mynum = 6;

► Math.mynum = 6;

Question No: 20 ( Marks: 1 ) - Please choose one

Which CSS property controls the text size?

► font-style

► text-style

► font-size

► text-size

Page 60: A Mega File of It for Current Quizzes

Question No: 21 ( Marks: 1 ) - Please choose one

Which of the following is a function of Cyberwallet?

► Store coins

► Manage Coins

► Record transactions

► All of above

Question No: 22 ( Marks: 1 ) - Please choose one

Which model allows the users to log-on on a website and assume the role of bidder or seller?

► Online Banking.

► Storefront Model.

► E-Learning.

► Auction Model.

Question No: 23 ( Marks: 1 ) - Please choose one

Job

searchers can search for jobs and employers can hire effectively using _____________.

► Online recruiting web sites.

► Online banking web sites.

► Online trading and lending web sites.

► Online news services web sites.

Question No: 24 ( Marks: 1 ) - Please choose one

Page 61: A Mega File of It for Current Quizzes

Which of these is a rule about bondage or affinity of two items such that if one item is purchased, the other is purchased too?

► Classification

► Association

► Characterization

► Clustering

Question No: 25 ( Marks: 1 ) - Please choose one

Electronic banking is also known as __________.

► Cyber banking

► Virtual banking

► Online banking

► All of above

Question No: 26 ( Marks: 1 ) - Please choose one

Identify the necessary aspect for a business to work to establish long term relationship with at least small number

of capable suppliers.

► Supply chain management

► Demand chain management

► Ultimate consumer orientation

► None of the given

Page 62: A Mega File of It for Current Quizzes

Question No: 27 ( Marks: 1 ) - Please choose one

IT/EC can reduce the overall ------------- and afford to keep the price of

the product relatively low

► Production cost

► Marketing cost

► Distribution cost

► None

Question No: 28 ( Marks: 1 ) - Please choose one

------

-------means services in relation to the transformation of contents of an electronic

document from its original form to one that cannot be understood or decoded by any unauthorized

person

► Cryptography services

► Accredited Certification Service Provider’

► Originator

► Addressee

Page 63: A Mega File of It for Current Quizzes

Question No: 29 ( Marks: 1 ) - Please choose one

Criminal wrongs such as breach of contract are deemed to violate only the rights of individuals and not

the society in general

► True

► False

Question No: 30 ( Marks: 1 ) - Please choose one

A ……. Is a group of data objects that are similar to one another in each group?

► Character

► Classification

► Association

► Cluster

Question No: 31 ( Marks: 1 )

What stands for CRM?

CRM stands for costumer relationship management.

Question No: 32 ( Marks: 1 )

What are the three attacks on symmetric key algorithms? Write names only.

Page 64: A Mega File of It for Current Quizzes

1. Key Search Attacks

2. Cryptanalysis

3. System-based Attacks

Question No: 33 ( Marks: 2 )

What is ONLINE BANKING?

Online banking provides services to the customers through internet including services of electronic

funds transfer.

Question No: 34 ( Marks: 2 )

Define these two terms plaintiff and defendant?

The person who files a lawsuit are called plaintiff. And the person against whom it is filed is called

defendant.

Question No: 35 ( Marks: 3 )

How

lack of trust barrier can be overcome or minimized? Discuss it briefly

Online companies must establish a trust relationship with its costumers, because as we know that there

is a gap that we feel that web based companies are not present in physical. There for web businesses

the trust must be present between costumer and sellers.

Question No: 36 ( Marks: 3 )

Page 65: A Mega File of It for Current Quizzes

What do we mean by internet-based EDI? Briefly explain how could it be used as substitute of VAN? (1 + 2)

Internet can support EDI in a variety of ways. Internet e-mail can be used as EDI message transport

mechanism in place of having a VAN. An extranet can be created with the trading partner allowing a

partner to enter information in the fields of web forms which correspond to the fields of EDI message.

Also, web-based EDI hosting service can be utilized through web-based EDI software.

Question No: 37 ( Marks: 3 )

Briefly explain how does the bank check validity of e-coins when merchant sends them for deposit?

Coins used in the payment are encrypted with bank’s public key, preventing the merchant to view them.

Payment information is forwarded to the bank with encrypted coins during merchant’s deposit. Only

hash of the order description is included in payment information preventing the bank from knowing the

order details.

Question No: 38 ( Marks: 5 )

Describe the advantages and disadvantages of Virtual PIN.(2.5+2.5)

Advantages and disadvantages of Virtual PIN:

Simplicity and no encryption is the biggest advantage of this payment system, which means that no

special software is needed at the frond end. This payment system is good for low-cost information

items. Therefore, it is suitable for buying online articles, journals, music. Where the cost of the items is

not much. In that eventuality, only sales are lost rather than actual financial loss to the merchant if there

Page 66: A Mega File of It for Current Quizzes

is a fraud. In other words, only some extra copies of the information items are made in case of a fraud.

On the other hand merchant is exposed too much greater financial loss if the purchase relates to the

actual physical goods. One of the disadvantages of this payment model is that pre-registration of the

buyer and the merchant with FV is mandatory in this set up. Moreover, maintaining a bank account (in

case of merchant) and having a credit card (in case of a buyer) is also essential part of this system. One

can say that the merchant side is less secured in the transaction because the goods are delivered by the

merchant before the payment is actually received. The popularity of this payment system declined after

1998 mainly because of the introduction and development of encryption based payment mechanisms.

Question No: 39 ( Marks: 5 )

Differentiate between Cyber squatting and concurrent use with example.

Cyber squatting:

The act of intentionally registering domain names containing trademarks/trade names of prominent

companies to later blackmail or demand ransom from those companies is called cyber squatting. It is

regarded as an offence in most countries. Assume there is a firm ‘Glory Enterprise’ and it wants to have

its web site. It also wants to have the word ‘glory’ as a part of its domain name because for years it has

been recognized in the physical world through this word. However, at the time of registration of its

domain name it finds that a person Mr. ‘A’ who has nothing to do with the business of the firm or the

word ‘glory’ has already registered a domain name containing this word as a part of it. Since there

cannot be two similar domain names, the firm is forced to request Mr. ‘A’ to transfer that domain name

to it. In response, if Mr. ‘A’ blackmails or claims ransom from the said firm, he would be said to have

committed cyber squatting.

Concurrent use:

This problem arises when two organizations have apparently legitimate claim to use the same domain

name but cannot do so due to the uniqueness of domain names. Suppose, there is a company

manufacturing electronic goods and another company selling French fries. Under the traditional trade

mark law both these companies can have the same trade mark/trade name such as ‘fry’s’. The problem

arises when both apply for the registration of a domain name containing the word ‘fry’s’. Here, both are

Page 67: A Mega File of It for Current Quizzes

legitimate claimants of this domain name but due to the element of uniqueness of domain names only

one of them can be assigned the desired domain name.

Question No: 40 ( Marks: 10 )

How strategies are formulated and implemented? Explain it with real world example.

Strategy Formulation:

Based upon this study of internal and external business environment and in light of a company’s

strengths and weaknesses, a competitive business strategy is formed. It may be a strategy of cost

leadership, product differentiation or focus. One can also identify ways how information technology

can be used to implement/enforce such strategy.

Strategy Implementation:

In the implementation stage, you build a plan to identify steps needed to put the strategy into

action and practically take those steps. For example, where your strategy is to pursue differentiation

in terms of quality of service by using/arranging a web-based call centre through which the

customers can immediately register their complaints; then you will have to select appropriate

individuals who are suitable for the job in the implementation stage. Creating a web team and

defining the role of each member of the team is a critical component of implementation stage. For

example, you define that this person would be the team leader; this would be in the technical staff,

or the management staff. Note that involvement of key persons from marketing, accounting,

finance, human resource, IT, customer relations etc. will be important in decision marking as to how

a particular implementation plan can be executed. A strategic plan can be at times initially

implemented in terms of a pilot project before launching it to a full scale. For example, an

automobile manufacturer in America had implemented a plan/scheme which allowed the potential

customers to have scheduled test drives before buying a particular car. Initially, this scheme was

introduced to four American states but later it was implemented all over the country. Another point

is to consider whether you should build your own infrastructure for execution or outsource the task

of execution of a strategic plan. For example, where a strategic plan requires a particular web

design, you can either mange your own team of web designers or outsource this task to an outside

firm having expertise in this area.

Page 68: A Mega File of It for Current Quizzes

Question No: 41 ( Marks: 10 )

How

can you define the concept of cyber banking? How it takes place? What is its important role in E-Commerce? (3+2+5)

Electronic banking, also known as cyber banking, virtual banking, home banking and online banking,

includes various banking activities conducted from home, business, or on the road, instead of at a

physical bank location.

Important roles of cyber banking in e-commerce.

1. Get current account balances at any time

2. Obtain credit card statements

3. Pay utility bills

4. Download account information

5. Transfer money between accounts

6. Send e-mail to your bank

7. Manage your own schedule

8. Handle your finances from any location

9. Apply for loans online

FINALTERM EXAMINATION

Fall 2009

Page 69: A Mega File of It for Current Quizzes

IT430- E-Commerce (Session - 1)

Question No: 1 ( Marks: 1 ) - Please choose one

Key

version represents public key by

► Buyer

► Seller

► E-Bank

► Certification Authority

Question No: 2 ( Marks: 1 ) - Please choose one

SSL

stands for

► Secure Socket Layer

► Security Service Layer

► Sub Secured Length

► None of these

Question No: 3 ( Marks: 1 ) - Please choose one

How

many kinds of Web Portals are?

► 3

► 2

Page 70: A Mega File of It for Current Quizzes

► 5

► 6

Question No: 4 ( Marks: 1 ) - Please choose one

Brick

and Mortar refers to

► Offline business

► Online business

► Transport

► Building

Question No: 5 ( Marks: 1 ) - Please choose one

Digital Content Revenue Model Includes

► Legal information services

► Online journals

► Online Libraries

► All of the above

Page 71: A Mega File of It for Current Quizzes

Question No: 6 ( Marks: 1 ) - Please choose one

Which of following marketing campaigns are cheap an effective way to target potential customers?

► Sale forces

► E-mail

► Media promotion

► Marketing software

Question No: 7 ( Marks: 1 ) - Please choose one

What does Telemarketing means?

► Marketing through charting

► Marketing through telephone

► Marketing through email

► Marketing through web casting

Question No: 8 ( Marks: 1 ) - Please choose one

Page 72: A Mega File of It for Current Quizzes

Which of following services build a strong customer loyalty towards company and its products?

► Customer services

► Public relations(PR)

► Bulletin board

► Exhibitions.

Question No: 9 ( Marks: 1 ) - Please choose one

Track the customers online and do personalization is only possible through which of the following file(s)

analysis.

► log files

► cookie

► data mining

► log files and cookies.

Question No: 10 ( Marks: 1 ) - Please choose one

Page 73: A Mega File of It for Current Quizzes

Which of the following is true for Class A:

► Network 01 byte and 03 hosts

► Network 02 bytes and 02 hosts

► Network 03 bytes and 01 host

► None of these

Question No: 11 ( Marks: 1 ) - Please choose one

What is the correct HTML for making a text input field?

► <textinput type="text">

► <input type="text">

► <input type="textfield">

► <textfield>

Question No: 12 ( Marks: 1 ) - Please choose one

IIS stands for:

► International Information Service

► Internet Information Server

► Internet Information standards

Page 74: A Mega File of It for Current Quizzes

► All of these

Question No: 13 ( Marks: 1 ) - Please choose one

The payer and the payee are issued digital certificates in ………… standard format by their respective

banks.

► X. 509

► F. 609

► L.8999

► N.586

Question No: 14 ( Marks: 1 ) - Please choose one

What is a E-Cash wallet ?

► Hardware

► Agent

► Software

► All of the above

Question No: 15 ( Marks: 1 ) - Please choose one

An E-cash coin consists of element (s) like:

► Serial # provided by client

► Key version

Page 75: A Mega File of It for Current Quizzes

► Serial# signed by E-cash bank

► All of the above

Question No: 16 ( Marks: 1 ) - Please choose one

What is Ultimate consumer orientation?

► Primary objective of supply chain is to help each company to meet needs of the consumer at the

end of supply chain.

► Secondary Primary objective of supply chain is to help each company to meet needs of the

consumer at the end of supply chain.

► Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of

supply chain.

► None of them

Question No: 17 ( Marks: 1 ) - Please choose one

Customer data can be gathered and analyzing it customers can be served in a better

Manner according to their needs, Which is best option?

► Customization

► Customer orientation

Page 76: A Mega File of It for Current Quizzes

► Customer satisfaction

► Focus

Question No: 18 ( Marks: 1 ) - Please choose one

A

company ABC web page divided into four segments can be unpleasant to a Japanese visitor because

no. four is a symbol of death in that culture.

Which is the international barrier it is having?

► Culture

► Language

► Lack of trust

► Infrastructure

Question No: 19 ( Marks: 1 ) - Please choose one

Exclusive right granted by law to make, use and sell an invention. What is called?

► Parasites

Page 77: A Mega File of It for Current Quizzes

► Trade mark

► Patent infringement

► Copyright

Question No: 20 ( Marks: 1 ) - Please choose one

Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to

be professionally incompetent and negligent. This doctor may then file a lawsuit against that person

claiming that his reputation has been injured due to such an act.

Which legal issue arises due to such acts?

► Cyber Crimes

► Online Defamation

► Cyber squatting

► None

Question No: 21 ( Marks: 1 ) - Please choose one

How

can you reference part of a string?

Page 78: A Mega File of It for Current Quizzes

► text.substr(5,6);

► text.part(5,6)

► text.piece(5,6)

► text.split(5,6);

Question No: 22 ( Marks: 1 ) - Please choose one

This

is an example of

► 0-tier architecture

► 1-tier architecture

► 2-tier architecture

► n-tier architecture

Question No: 23 ( Marks: 1 ) - Please choose one

Following are the names of some well known e-commerce software, EXCEPT ----------- .

► Intershop

► IBM's WebSphere Commerce Professional Edition

► Microsoft Commerce Server 2002

Page 79: A Mega File of It for Current Quizzes

► Microsoft SQL Server 2005

Question No: 24 ( Marks: 1 ) - Please choose one

In

Style Sheets, How do you change the font of an element?

► font-face:

► font:

► font-family:

► font-style:

Question No: 25 ( Marks: 1 ) - Please choose one

A

paper signature is believed to be more reliable than a digital signature.

► True

► False

Question No: 26 ( Marks: 1 ) - Please choose one

The

serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the

___________.

► Client

► Bank

► Merchant

► None of above

Question No: 27 ( Marks: 1 ) - Please choose one

Page 80: A Mega File of It for Current Quizzes

SET

doesn’t require special software on the client or merchant side.

► True

► False

Question No: 28 ( Marks: 1 ) - Please choose one

The

result of OLAP is displayed in the form of a __________.

► Data square

► Data Triangle

► Data cube

► Data circle

Question No: 29 ( Marks: 1 ) - Please choose one

Classification and Association belong to which of the following types of Data Mining?

► Selective

► Predictive

► Descriptive

► Additive

Question No: 30 ( Marks: 1 ) - Please choose one

Which one of the following algorithms does not include in public key algorithms?

► DSS

Page 81: A Mega File of It for Current Quizzes

► RSA

► Elliptic Curves

► RC4

Question No: 31 ( Marks: 1 )

What is a basic purpose of payment gateway in SET transactions? Explain shortly.

Question No: 32 ( Marks: 1 )

‘Provide after sales service and support’ is one of the areas in a strategic business unit according to

Michael Porter. List what kind of activities is performed in this area?

Question No: 33 ( Marks: 2 )

What do we mean by “Affiliation” between two parties? Explain shortly.

Question No: 34 ( Marks: 2 )

Discuss briefly how a software developer who releases annual updates of his software can reduce the

price of his product and increase sales revenue in an E- Commerce environment.

Page 82: A Mega File of It for Current Quizzes

Question No: 35 ( Marks: 3 )

Under Section 21 of the ETO, the funds of the Certification Council shall comprise of:?

Question No: 36 ( Marks: 3 )

What is business promotion? Briefly explain any two methods of business promotion. 1+2

Question No: 37 (Marks: 3 )

How

does the client purchase from merchant using E-Cash Payment system? Show the payment request

format.

Question No: 38 ( Marks: 5 )

Explain the advantages of E-business regarding today’s scenario.

Question No: 39 ( Marks: 5 )

Elaborate the importance of OLAP in decision making support for an organization.

Page 83: A Mega File of It for Current Quizzes

Answer: Online Analytical Processing (OLAP) uses knowledge for the purpose of presenting data at

different levels of abstraction. It is different from data mining as it does not help in making predictions.

But data can be viewed and reviewed in many different ways for decision making purpose. The result is

showed in form of a data cube.

Question No: 40 ( Marks: 10 )

What elements should we consider for global marketing of e-businesses? Describe briefly.

Question No: 41 ( Marks: 10 )

Give

an example to show how members of supply chain can work together to reduce inventory, increase

quality of product, reduce production cost and increase process speed.

FINALTERM EXAMINATION

Fall 2009

IT430- E-Commerce (Session - 1)

Question No: 1 ( Marks: 1 ) - Please choose o ne

Browser is installed at :

► Client side machine ► Web server machine

► none ► both Client and Server Machines

Question No: 2 ( Marks: 1 ) - Please choose o ne

Key version represents public key by

► Buyer ► Seller

Page 84: A Mega File of It for Current Quizzes

► E-Bank ► Certification Authority

Question No: 3 ( Marks: 1 ) - Please choose o ne

In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT included:

► Buyer Accounts identifier ► Buyer password

► Address of Merchant ► Actual amount of money in favor of merchant

Question No: 4 ( Marks: 1 ) - Please choose o ne

To overcome the lack of physical proximity appearance problem in e-business, which technology is going to be used

► Biometrics ► Video conferencing

► Cryptography ► Biometrics and Video conferencing

Question No: 5 ( Marks: 1 ) - Please choose o ne

Dividing the potential customers into groups is called

► Market Segmentation ► Market Promotion ► Market Research ► Market Survey

Question No: 6 ( Marks: 1 ) - Please choose one

Traditionally Marketer use the market segmentation(s) like

► Geo-graphic Segmentation ► Demographic Segmentation

► Psychographic Segmentation ► All of the above

Question No: 7 ( Marks: 1 ) - Please choose o ne

In…………………, there is no direct contact with the end users.

► B2B ► B2C ► C2C ► All above options

Question No: 8 ( Marks: 1 ) - Please choose o ne

Allocation of MAC addresses is administered by --------------------------

► ICAAN ► ISO ► IEEE ► None

Question No: 9 ( Marks: 1 ) - Please choose o ne

As a Web developer you can define a style sheet for?

► HTML elements and apply to many Web pages.

Page 85: A Mega File of It for Current Quizzes

► A HTML element and apply to single Web page.

► A HTML element and apply to many Web pages.

► HTML elements and apply to one Web page.

Question No: 10 ( Marks: 1 ) - Please choose one

What shall come in blanks for proper result,

Here blanks are numbered with 1,2 and 3

<html>

<head>

<SCRIPT language="JavaScript">

Var num1, var num2

Document.container .result.value=parseFloat(num1)-parseFloat(num2)

</script>

</head>

<body>

<FORM name=”---------1-----------”>

<input type=”----------2-------” name=”-------3---------” maxlength=”5”>

</form>

</body>

</html>

► container, text and result

► result, value and container

► container , button and value

► result, container and text

Question No: 11 ( Marks: 1 ) - Please choose one

What does XML stand for?

► eXtra Modern Link ► X-Markup Language

Page 86: A Mega File of It for Current Quizzes

► eXtensible Markup Language ► Example Markup Language

Question No: 12 ( Marks: 1 ) - Please choose one

Cryptographic Algorithms are measured in terms of

► Key length ► Complexity

► Simplicity ► All of the above

Question No: 13 ( Marks: 1 ) - Please choose one

-----------means that your product/service has certain quality that makes it more attractive than the one offered by your competitor, despite the price of your competitor’s product/service is somewhat lower

► Differentiation ► Focus

► Cost leadership ► None of them

Question No: 14 ( Marks: 1 ) - Please choose one

Customer data can be gathered and analyzing it customers can be served in a better

Manner according to their needs, Which is best option?

► Customization ► Customer orientation

► Customer satisfaction ► Focus

Question No: 15 ( Marks: 1 ) - Please choose one

Characterization and Clustering belong to which of the following types of Data Mining?

► Additive ► Predictive

► Selective ► Descriptive

Question No: 16 ( Marks: 1 ) - Please choose one

In which type of data mining, ID3 algorithms is used?

► Classification ► Association

► Characterization ► Clustering

Question No: 17 ( Marks: 1 ) - Please choose one

ANSI stands for ……….

► American National Standards Institute ► All Network Standards Institute ► American New standards Institute

Page 87: A Mega File of It for Current Quizzes

► Australia National standards Institute

Question No: 18 ( Marks: 1 ) - Please choose one

Who is making the Web standards?

► International Standard Organization

► ANSI ► Microsoft ► The World Wide Web Consortium

Question No: 19 ( Marks: 1 ) - Please choose one

Which of following is NOT an attribute of <AREA> tag?

► shape ► circle ► href ► coords

Question No: 20 ( Marks: 1 ) - Please choose one

Which of the following is an advantage of symmetri c algorithms?

► Symmetric algorithms are faster

► Symmetric algorithms don't include any encryption

► Symmetric algorithms are slow in nature

► None of above

Question No: 21 ( Marks: 1 ) - Please choose one

What is the right sequence of steps in Electronic Check process?

► Payee’s bank → Payer’s bank → Payee → Payer.

► Payer’s bank → Payee → Payee’s bank → Payer.

► Payer’s bank → Payee’s bank → Payer → Payee.

► Payer → Payee → Payee’s bank → Payer’s bank.

Question No: 22 ( Marks: 1 ) - Please choose one

The key feature of E-Cash Payment system is ______ ____.

► Simplicity ► Anonymity ► Availability ► Connectivity

Question No: 23 ( Marks: 1 ) - Please choose one

In storefront e-business model buyers and sellers interact ___________ with each other.

► Directly. ► Indirectly ► Through a third party ► None of above.

Page 88: A Mega File of It for Current Quizzes

Question No: 24 ( Marks: 1 ) - Please choose one

Customers grouped by variables such as social class, personality or approach to life or lifestyle, is called ___________.

► Demographic Segmentation. ► Geographic Segmentation.

► Psychographic segmentation . ► Behavioral segmentation.

Question No: 25 ( Marks: 1 ) - Please choose one

According to Michael Porter, “material handling” is an example of primary activity in a strategic business unit. Identify the area in which this task is performed.

► Identify customers ► Market and sell

► Deliver’ activities relate to storage ► Purchase materials and supplies

Question No: 26 ( Marks: 1 ) - Please choose one

According to Michael Porter, “fabricating” is an example of primary activity in a strategic business unit. Identify the area in which this task is performed.

► Market and sell ► Deliver’ activities relate to storage

► Purchase materials and supplies ► Manufacture product or create service

Question No: 27 ( Marks: 1 ) - Please choose one

Electronic banking is also known as __________.

► Cyber banking ► Virtual banking

► Online banking ► All of above

Question No: 28 ( Marks: 1 ) - Please choose one

Classification and Association belong to which of the following types of Data Mining?

► Selective ► Predictive ► Descriptive ► Additive

Question No: 29 ( Marks: 1 ) - Please choose one

Web catalogue revenue model includes

► Online sellers of computer ► Gifts, flowers, clothes

► Journals ► Both first & second options

Question No: 30 ( Marks: 1 ) - Please choose one

Page 89: A Mega File of It for Current Quizzes

In which type of approach, we sum up and integrate the information in a particular dimension to show the result?

► Dice ► Drill down ► Roll up ► Slice

Question No: 31 ( Marks: 1 )

What is Strategic Planning Cycle?

E-business competitive strategy is normally formed and implemented according to a planning cycle which is called strategic planning cycle.

Question No: 32 ( Marks: 1 )

In Pakistan, which is the apex court? Name only.

Supreme Court of Pakistan.

Question No: 33 ( Marks: 2 )

What is the purpose of SETCo?

SETCo. is a company formed to lead the implementation and promotion of SET specifications It ensures that the vendors of SET software comply with the requirements laid down by its originators. A merchant holds certificate from card brand indicating that the merchant is authorized to accept credit card payment. The customer holds certificate from the card issuing bank. SETCo acts as a root certification authority in the certification hierarchy.

Question No: 34 ( Marks: 2 )

Is Delivery activity in Strategic business Unit identified as supporting activity and why?

Question No: 35 ( Marks: 3 )

Elaborate data mining advantages in business applications.

Question No: 36 ( Marks: 3 )

Write precisely about the 4th stage of planning cycle?

Page 90: A Mega File of It for Current Quizzes

The 4th stage of planning cycle is strategy assessment. In this stage results of implementation plan are monitored and assessed so in this way corrective measures can be planned. Actually, we want to asses that weather our strategy has delivered what it supposed to deliver, whether our strategy is still workable in changing environment. In strategy assessment portion, we can learn from our mistakes and can do our future planning. In case of e-commerce project has been a failure, we can easily identify the problems and can try to remove them, for the strategy assessment, we can conduct surveys, collect information and receive feedback.

Question No: 37 ( Marks: 3 )

How does the client purchase from merchant using E -Cash Payment system?Show the payment request format.

Question No: 38 ( Marks: 5 )

What do you perceive by Value Added Network? Explain its advantages too with reference to EDI. (2+3)

Value Added Network are third party networks that provide services to execute authorized transactions with valid trading partners using EDI (Electronic Data Interchange). Each VAN (Value Added Network) has a centralized computer system that maintains two files for each user that are Postbox and Mailbox.

Value Added Network’s advantages with reference to EDI:

Advantages of using a VAN in EDI are time independence and protocol independence. Time

independence means that the sending and receipt of the interchange or messages can be carried out at the convenience of the users involved. Thus, they are not required to be connected with each other at the same time. Protocol independence means that interchanges are re-enveloped with the transmission protocol appropriate to the recipient when they are retrieved from the postbox by the VAN. Thus, a VAN can provide protocol compatibility between the sender and the recipient, wherever that is missing.

Question No: 39 ( Marks: 5 )

What is market research? Describe any three possib le methods of conducting market research. 2+3

It consists of interviews, paper and phone surveys based on past investigations, actually the basic purpose of market research is to find strengths, weaknesses, opportunities and threats of our business and our competitor business. In this way we can compare our business conditions with our competitor. In case of online businesses, market research is much faster and easy than offline businesses. Market research is much beneficial for any business.

Three possible methods of conducting market researc h:

Page 91: A Mega File of It for Current Quizzes

Questionnaires

Interviews

Phone and Paper surveys

Question No: 40 ( Marks: 10 )

How e-cash payment system is applied on the web? Explain with the help of diagram.

Question No: 41 ( Marks: 10 )

Briefly explain Territorial jurisdiction with the help of example ,Ho territory is important for a court to file a case?

Territorial jurisdiction refers to the legal right of a court of a particular area/territory to entertain and decide a case. ETO says that courts in Pakistan shall have jurisdiction or authority to decide any matter that relates to persons or information systems or events in Pakistan and covered by the terms of the Ordinance. Assume that someone from England accesses an information system in Pakistan and deletes or modifies the data of a person contained therein without any authority, then this act may be treated as an offence under the ETO and Pakistani courts would have jurisdiction to try such a matter.

The jurisdiction to try offences under the ETO is vested with the session courts in Pakistan. Law is broadly divided into two classes on the basis of nature of wrong, namely, civil law and criminal law. Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Civil wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general. On the other hand, a criminal wrong (crime) is an act deemed by law to be harmful to the society in general such as theft or murder etc. and the state itself is a party in such matters.

There are different forms of jurisdiction. Territorial jurisdiction refers to the competence of a court to decide a case on the basis of certain geographical area/territory. So, if a dispute arises in Karachi, the courts in Karachi would only have territorial jurisdiction, and the case cannot be filed in Islamabad or Lahore. Ordinarily, territorial jurisdiction lies where the defendant resides or carries on business or the cause of action has wholly or partly arisen or the immoveable property is situated (in case the matter relates to land etc.).

Page 92: A Mega File of It for Current Quizzes

FINALTERM EXAMINATION Fall 2009

IT430- E-Commerce (Session - 1) (Courtesy xclus!vely m3)

Question No: 1 ( Marks: 1 ) - Please choose one Key version represents public key by ► Buyer ► Seller ► E-Bank ► Certification Authority Question No: 2 ( Marks: 1 ) - Please choose one SSL stands for ► Secure Socket Layer ► Security Service Layer ► Sub Secured Length ► None of these Question No: 3 ( Marks: 1 ) - Please choose one How many kinds of Web Portals are? ► 3 ► 2 ► 5 ► 6 Question No: 4 ( Marks: 1 ) - Please choose one Brick and Mortar refers to ► Offline business ► Online business ► Transport ► Building Question No: 5 ( Marks: 1 ) - Please choose one Digital Content Revenue Model Includes ► Legal information services ► Online journals ► Online Libraries ► All of the above Question No: 6 ( Marks: 1 ) - Please choose one Which of following marketing campaigns are cheap an effective way to target potential customers? ► Sale forces ► E-mail ► Media promotion ► Marketing software Question No: 7 ( Marks: 1 ) - Please choose one What does Telemarketing means? ► Marketing through charting ► Marketing through telephone ► Marketing through email ► Marketing through web casting Question No: 8 ( Marks: 1 ) - Please choose one Which of following services build a strong customer loyalty towards company and its products? ► Customer services ► Public relations(PR) ► Bulletin board ► Exhibitions. Question No: 9 ( Marks: 1 ) - Please choose one Track the customers online and do personalization is only possible through which of the following file(s) analysis. ► log files ► cookie ► data mining ► log files and cookies. Question No: 10 ( Marks: 1 ) - Please choose one Which of the following is true for Class A: ► Network 01 byte and 03 hosts ► Network 02 bytes and 02 hosts ► Network 03 bytes and 01 host ► None of these Question No: 11 ( Marks: 1 ) - Please choose one What is the correct HTML for making a text input fi eld?

Page 93: A Mega File of It for Current Quizzes

► ► ► Question No: 12 ( Marks: 1 ) - Please choose one IIS stands for: ► International Information Service► Internet Information Server ► Internet Information standards► All of these Question No: 13 ( Marks: 1 ) - Please choose one The payer and the payee are issued digital certificates in ………… standard format by their respective banks. ► X. 509 ► F. 609 ► L.8999 ► N.586 Question No: 14 ( Marks: 1 ) - Please choose one What is a E-Cash wallet ? ► Hardware ► Agent ►Software ► All of the above Question No: 15 ( Marks: 1 ) - Please choose one An E-cash coin consists of element (s) like: ► Serial # provided by client ► Key version ► Serial# signed by E-cash bank ► All of the above Question No: 16 ( Marks: 1 ) - Please choose one What is Ultimate consumer orientation? ► Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. ► Secondary Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. ► Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of supply chain. ► None of them Question No: 17 ( Marks: 1 ) - Please choose one Customer data can be gathered and analyzing it customers can be served in a better Manner according to their needs, Which is best option? ► Customization ► Customer orientation ► Customer satisfaction ► Focus Question No: 18 ( Marks: 1 ) - Please choose one A company ABC web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death in that culture. Which is the international barrier it is having? ► Culture ► Language ► Lack of trust ► Infrastructure Question No: 19 ( Marks: 1 ) - Please choose one Exclusive right granted by law to make, use and sell an invention. What is called? ► Parasites ► Trade mark ► Patent infringement ► Copyright Question No: 20 ( Marks: 1 ) - Please choose one Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act. Which legal issue arises due to such acts? ► Cyber Crimes ► Online Defamation ► Cyber squatting ► None

Page 94: A Mega File of It for Current Quizzes

Question No: 21 ( Marks: 1 ) - Please choose one How can you reference part of a string? ► text.substr(5,6); ► text.part(5,6) ► text.piece(5,6) ► text.split(5,6); Question No: 22 ( Marks: 1 ) - Please choose one This is an example of ► 0-tier architecture ► 1-tier architecture ► 2-tier architecture ► n-tier architecture Question No: 23 ( Marks: 1 ) - Please choose one Following are the names of some well known e-commerce software, EXCEPT ----------- . ► Intershop ► IBM's WebSphere Commerce Professional Edition ► Microsoft Commerce Server 2002 ► Microsoft SQL Server 2005 Question No: 24 ( Marks: 1 ) - Please choose one In Style Sheets, How do you change the font of an element? ► font-face: ► font: ► font-family: ► font-style: Question No: 25 ( Marks: 1 ) - Please choose one A paper signature is believed to be more reliable than a digital signature. ► True ► False Question No: 26 ( Marks: 1 ) - Please choose one The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the ___________. ► Client ► Bank ► Merchant ► None of above Question No: 27 ( Marks: 1 ) - Please choose one SET doesn’t require special software on the client or merchant side. ► True ► False Question No: 28 ( Marks: 1 ) - Please choose one The result of OLAP is displayed in the form of a __________. ► Data square ► Data Triangle ► Data cube ► Data circle Question No: 29 ( Marks: 1 ) - Please choose one Classification and Association belong to which of the following types of Data Mining? ► Selective ► Predictive ► Descriptive ► Additive Question No: 30 ( Marks: 1 ) - Please choose one Which one of the following algorithms does not include in public key algorithms? ► DSS ► RSA ► Elliptic Curves ► RC4 Question No: 31 ( Marks: 1 ) What is a basic purpose of payment gateway in SET transactions? Explain shortly. Answer: The role of payment gateway is to connect entities on the internet with those which are not on the internet such as the electronic network of banks.Payment gateway provides the security of data transmission to/from the acquirer bank.. Question No: 32 ( Marks: 1 ) ‘Provide after sales service and support’ is one of the areas in a strategic business unit according to Michael Porter. List what kind of activities is performed in this area? Answer: 1-Installing 2-Testing, 3-Repairing 4-Maintaining a product

Page 95: A Mega File of It for Current Quizzes

5-Fulfilling 6-Warranties Question No: 33 ( Marks: 2 ) What do we mean by “Affiliation” between two parties? Explain shortly. Affiliation: Generally, affiliation exists when one business controls or has the power to control another or when a third party (or parties) controls or has the power to control both businesses. Control may arise through ownership, management, or other relationships or interactions between the parties.Merger us an example of afiliation. Question No: 34 ( Marks: 2 ) Discuss briefly how a software developer who releases annual updates of his software can reduce the price of his product and increase sales revenue in an E- Commerce environment. Question No: 35 ( Marks: 3 ) Under Section 21 of the ETO, the funds of the Certification Council shall comprise of:? Answer:Under Section 20: Grants from the Federal Government; Fee for grant and renewal of accreditation certificate; and Fee, not exceeding ten Rupees, for every certificate deposited in the repository; fines.” Question No: 36 ( Marks: 3 ) What is business promotion? Briefly explain any two methods of business promotion. 1+2 Answer: E-business promotions can attract visitors to your site and induce them to purchase. Promotional messages can be sent both online and offline. Discounts Discount advertisements through magazines, newspapers, web sites etc. can attract new and repeat customers. Coupons Online coupons are placed on certain popular sites to attract customers for online shopping. They can use these coupons for shopping through specific web sites. Question No: 37 (Marks: 3 ) How does the client purchase from merchant using E-Cash Payment system? Show the payment request format. Question No: 38 ( Marks: 5 ) Explain the advantages of E-business regarding today’s scenario. Cost Effective Marketing and Promotions: Using the web to market products guarantees worldwide reach at a nominal price. Advertising techniques like pay per click advertising ensure that the advertiser only pays for the advertisements that are actually viewed. Developing a Competitive Strategy: Firms need to have a competitive strategy in order to ensure a competitive advantage. Without an effective strategy, they will find it impossible to maintain the advantage and earn profits. The strategy, that the firms can pursue, can be a be a cost strategy or a differentiation strategy Better Customer Service: E-Business has resulted in improved customer service. Many a times, on visiting a website, the customer is greeted by a pop-up chat window. Readily available

Page 96: A Mega File of It for Current Quizzes

customer service may help in encouraging the customer to know more about the product or service. Moreover, payments can be made online, products can be shipped to the customer without the customer having to leave the house. Bulk transactions One can do bulk transactions during one visit to an e-shop, since there is no limitation of collecting, packaging or carrying goods in contrast to shopping from a traditional offline shop. Question No: 39 ( Marks: 5 ) Elaborate the importance of OLAP in decision making support for an organization. Answer: Online Analytical Processing (OLAP) uses knowledge for the purpose of presenting data at different levels of abstraction. It is different from data mining as it does not help in making predictions. But data can be viewed and reviewed in many different ways for decision making purpose. The result is showed in form of a data cube. Question No: 40 ( Marks: 10 ) What elements should we consider for global marketing of e-businesses? Describe briefly. As a marketer, when you are aiming at marketing your business in the entire world, you have to keep certain considerations in mind. Your web design must provide content in various languages and provide prices in various currencies, so that people belonging to different countries/cultures can understand the information contained in your web site. A regular display of currency exchange rate information can be useful in this behalf. Today, tools exist that can translate emails and your web sites into different languages. Another important consideration should be as to whether the country where you are doing the business has the required infrastructure to support your e-business. For example, whether you have a proper distribution channel of your products in a country you are doing business in. Similarly, you should carefully choose a payment system for your e-business which is compatible with the environment of a country where you are doing business. For example, a payment mechanism using SET cannot be considered as compatible with business environment in most of the third world countries. Question No: 41 ( Marks: 10 ) Give an example to show how members of supply chain can work together to reduce inventory, increase quality of product, reduce production cost and increase process speed. In 1997 the company had to stop its two assembly operations for several weeks due to errors in production and scheduling system causing it a huge financial loss. Thereafter, it decided to invest in information systems in every element of its supply chain. Involving its suppliers in the process, it began the use of EDI

Page 97: A Mega File of It for Current Quizzes

and internet technology, so that the suppliers could supply the right part or assembly at right time to prevent production delay. Now, the suppliers could get engineering specifications and drawings before the start of manufacturing using a secure internet connection, and plan their own business activities, accordingly. Also, members of the supply chain could have the knowledge of the completion of milestones and any changes in production schedule. In two years time, this approach resulted in reducing half the time needed to complete individual assembly processes. Thus, instead of waiting for 3 years the customer airlines could now have the ordered airplane ready for delivery in 10-12 months. Furthermore, the company launched a spare parts web site for ordering replacement parts. The site allowed customer airlines to register and order for replacement parts through browsers. Soon, the site was processing 5000 transactions per day at much lower cost as compared to orders cost through phone, mail, or fax. It also improved customer service in the sense that most parts could now be delivered the same day or the next day.

FINALTERM EXAMINATION

Fall 2009

IT430- E-Commerce (Session - 3)

Solved By vuZs Solution Team

Time: 120 min

Marks: 75

Question No: 1 ( Marks: 1 ) - Please choose one

Four P’s in Marketing Mix are:

► Product, price, place, promotion ► Price, person, place, problem

► Place, product, property, promotion ► Promotion, place, product, planning

Question No: 2 ( Marks: 1 ) - Please choose one

JIT Stands for

► Just In Time ► Joint investigation Technique

► Join in Training ► Just In Total

Question No: 3 ( Marks: 1 ) - Please choose one

Page 98: A Mega File of It for Current Quizzes

Advertising Supported Revenue Model includes

► Yahoo portal ► Employment sites ► Newspaper Publishers ► All of the above

Question No: 4 ( Marks: 1 ) - Please choose one

Which of the following is true for Class A:

► Network 01 byte and 03 hosts ► Network 02 bytes and 02 hosts

► Network 03 bytes and 01 host ► None of these

Question No: 5 ( Marks: 1 ) - Please choose one

What is the correct syntax of the declaration which defines the XML version?

► None of these

Question No: 6 ( Marks: 1 ) - Please choose one

Which of the following needs human action to execute?

► Virus ► Worm ► Trojan Horse ► All of these

Question No: 7 ( Marks: 1 ) - Please choose one

In the digital signature technique, the sender of the message uses ________ to create cipher text

► His or Her own symmetric key ► His or her own private key

► His or her own public key ► The receiver’s private key

Question No: 8 ( Marks: 1 ) - Please choose one

PIN stands for:

► Payment investigation Number ► Password Identification Number

► Personal Identification Number ► Personal Identification Numeric

Question No: 9 ( Marks: 1 ) - Please choose one

Page 99: A Mega File of It for Current Quizzes

An electronic check contains a(n)………………… to the payer’s bank to make a specified payment to the

payee

► Serial# ► Private key ► Instruction ► All of the above

Question No: 10 ( Marks: 1 ) - Please choose one

It is the ability to sell the goods or provide the service at a price that is lower than that of competitors,

and thus attract more customers.

What is called?

► Cost leadership ► Price leadership ► Focus ► Differentiation

Question No: 11 ( Marks: 1 ) - Please choose one

E-commerce is a combination of three different areas of study, namely, --------,

---------------- and ----------------

► Internal, external support, Support

► Technology, business and law/policy

► Primary, Secondary, R&D

► Sale, purchase, feed back

Question No: 12 ( Marks: 1 ) - Please choose one

A company ABC web page divided into four segments can be unpleasant to a Japanese visitor because

no. four is a symbol of death in that culture.

Which is the international barrier it is having?

► Culture ► Language ► Lack of trust ► Infrastructure

Question No: 13 ( Marks: 1 ) - Please choose one

GM Celebes manufacturing electronic goods and FryChips co selling French fries. Under the traditional

trade mark law both these companies can have the same trade mark/trade name such as ‘frys’.

The problem arises when both apply for the registration of a domain name containing the word ‘frys’.

Here, both are legitimate claimants of this domain name but due to the element of uniqueness of

domain names only one of them can be assigned the desired domain name.

Which legal issue arises in this situation?

Page 100: A Mega File of It for Current Quizzes

► Domain name conflict ► Cyber squatting ► Concurrent use ► None

Question No: 14 ( Marks: 1 ) - Please choose one

Which type of Data Mining contains the elements as Support and confidence?

► Classification ► Association ► Characterization ► Clustering

Question No: 15 ( Marks: 1 ) - Please choose one

OLAP stands for……………

► Online Analytical Program ► Online Analytical Processing

► Online Application Program ► Online Analysis Performance

Question No: 16 ( Marks: 1 ) - Please choose one

Characterization and Clustering belong to which of the following types of Data Mining?

► Additive ► Predictive ► Selective ► Descriptive

Question No: 17 ( Marks: 1 ) - Please choose one

Support activities in Value Chain model includes

► Finance and Administration ► Human Resources ► Technology Development ► All of

Question No: 18 ( Marks: 1 ) - Please choose one

Which of the following is NOT processed on the client side?

► Cookies ► JavaScript ► CGI scripts ► Applets

Question No: 19 ( Marks: 1 ) - Please choose one

Due to which characteristics, ATM network are covered under E-commerce ?

► Exchange of information through computer networks ► Internet. ► Exchanging of products,

services. ► None of the above.

Question No: 20 ( Marks: 1 ) - Please choose one

SET is better than SSL.

► True ► False

Question No: 21 ( Marks: 1 ) - Please choose one

Page 101: A Mega File of It for Current Quizzes

Dividing market, with respect to people having income level greater than Rs 30000, is geographic

segmentation.

► True. ► False.

Question No: 22 ( Marks: 1 ) - Please choose one

Which of the following is NOT an identified behavioral mode of customers on the web?

► Browsers ► Buyers ► Shoppers ► Seller

Question No: 23 ( Marks: 1 ) - Please choose one

Which of these is a way of conducting market research?

► Phone. ► Interviews ► Questionnaires ► All of above.

Question No: 24 ( Marks: 1 ) - Please choose one

Which of these is NOT a stage of knowledge discovery process?

► Transformation ► Data mining ► Pattern evaluation ► Process evaluation

Question No: 25 ( Marks: 1 ) - Please choose one

According to Michael Porter, “test marketing” is an example of primary activity in a strategic business

unit. Identify the area in which this task is performed.

► Design ► Market and sell ► Deliver’ activities relate to storage ► Purchase materials and supplies

Question No: 26 ( Marks: 1 ) - Please choose one

Electronic banking is also known as __________.

► Cyber banking ► Virtual banking ► Online banking ► All of above

Question No: 27 ( Marks: 1 ) - Please choose one

Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the

wrong-doer. Is it?

► True ► False

Question No: 28 ( Marks: 1 ) - Please choose one

In datalink layer, data packets are placed inside

► Data frames ► Data boxes ► Data streams ► None of these

Page 102: A Mega File of It for Current Quizzes

Question No: 29 ( Marks: 1 ) - Please choose one

Which one of the following algorithms does not include in public key algorithms?

► DSS ► RSA ► Elliptic Curves ► RC4

Question No: 30 ( Marks: 1 ) - Please choose one

Which of the following is HTML tag could n’t be used as CSS tag?

Question No: 31 ( Marks: 1 )

What is stand for WIPO?

World Intellectual Property Organization

Question No: 32 ( Marks: 1 )

Name any 3 E-Business models?

1-Storfront Model

2-Auction Model

3-Onlien Banking

Question No: 33 ( Marks: 2 )

What is the basic purpose of using hash function in communication?

A hash function is applied on the message to get the message digest.

Question No: 34 ( Marks: 2 )

What is Competition between existing players ?.

If there are many players having same size and stretagy but having different qualities in product and

services. Then there is true competition between them regarding price of that product or service.

Question No: 35 ( Marks: 3 )

On what basis, generally the protection under “fair use” may be sought? Doesn’t need to explain.

Nature of use:The work should be used only for non profitable and for education purposes.

Page 103: A Mega File of It for Current Quizzes

Nature Of Work:The copied work is effectively covered under fair use as compaird to that of some new

or creative work

Extent of the work copied:The extent of work to be copied under fair use shouold be small so that court

take some favourable steps to accussed.

Question No: 36 ( Marks: 3 )

In Virtual PIN Payment system, merchant side is less secure than buyer side. Do you agree with this

statement? Justify your answer.

1+2

Yes , I am agree with this statement that marchant side is less secure than buyer side because marchant

send the product before payment.So there is threat of non payment from buyer side.

Question No: 37 ( Marks: 3 )

What are the disadvantages of Data Mining? (1+1+1)

Privacy Issues

Personal privacy has always been a major concern in this country. In recent years, with the widespread

use of Internet, the concerns about privacy have increase tremendously. Because of the privacy issues,

some people do not shop on Internet. They are afraid that somebody may have access to their personal

information and then use that information in an unethical way; thus causing them harm.

Security issues

Although companies have a lot of personal information about us available online, they do not have

sufficient security systems in place to protect that information. For example, recently the Ford Motor

credit company had to inform 13,000 of the consumers that their personal information including Social

Security number, address, account number and payment history were accessed by hackers who broke

into a database belonging to the Experian credit reporting agency.

Maintanence Problem

Another problem with the data warehouse is that it is difficult to maintain. Any organization that is

considering using a data warehouse must decide if the benefits outweigh the costs. Once you have paid

for the data warehouse, you will still need to pay for the cost of maintenance over time. The costs

involved with this must always be taken into consideration.

Page 104: A Mega File of It for Current Quizzes

Question No: 38 ( Marks: 5 )

Describe the advantages of E-Business in detail.

Personalized service:

product , place , promotion and price are the 4 P`s of marketing mix. Now Personalization is the 5th P

introduced in E-Business.The bahavioural information about customers can be added in data base and

then can be utilized to by teh E-Commerce sites to analyze the needs of taht particular customer.So, in

this way personalized service can be provided to customer.

High-quality customer service

With the help of feed back of potential customers online businesses can improve the quality of their

products according to the needs and demands of thier customers.So it will improve the customer

services of E-Buiseness.

No inventory cost

In case of E-Business we dont need to have any physical place to start business. In this way it reduces

overheads and invemtory costs.An onilne busines can take orders from customers with out bearing teh

inventory cost like offline traditional businesses.

Worldwide reach of your business:

In E-Busines there is a chance to extend your business thruoghout the world. So, global reach is possible

in E-Business.

Electronic catalogues

Electronic catalogue is used in online busines have many adbvantages over paper catalogues.

Bulk transactions

Due to no limitations on collecting , carrying and packaging goods we can order bulk transactions during

even one visit at online shops.

Improved supply chain management

suppliers and manufacturer are the active members of supply chain members. They are effective

addition in E-Business.

Page 105: A Mega File of It for Current Quizzes

Question No: 39 ( Marks: 5 )

Elaborate the importance of OLAP in decision making support for an organization.

OLAP makes use of baksground knowledge regarding the domain of the data being studied .It is different

from data mining as it does not provide patterns for any predictions.It allows the data being studied to

present at different level of abstraction.Informartion stored in the data base can be viewed and

reviewed conveniently in any formate .In case of OLAP at different levels facilitate managers and

decision makers in making decisions.OlAP uses different tools namely, drill down , roll up and and slice

and dice etc.By using drill down we can further dig into the data for recieving more information whcih is

specific.Roll up works opposite to the drill down , It is used to sum up the information in a particular

dimention to show the results.

Question No: 40 ( Marks: 10 )

What is Porter’s 5 forces model ? Discuss briefly 5 forces with its purpose.

Porter`s models helps a firm to identify threats to its sompetitive position.and to devide plans

accordingly which includes uses of IT and E commerce to protect or enhance his competitive position .

Following are the 2 forces models of porter.

1- Threats of new potentian entrants to the sector

This threats relates to the opportunity that how easily a company having different products and

services can enter into the a given trade sector.How effeciently it remove teh barriers liek IT, Capital and

skills.For example to start online banking you need not to

2-Threats of substitute product or service in existingtrade

3-Bragaining power of the buyers

4-Bargaining power of the suppliers

5-Competition between existing players

Question No: 41 ( Marks: 10 )

What are the advantages and disadvantages of offline and online catalogues?

5+5

Online catalogues vs. Paper catalogues

Page 106: A Mega File of It for Current Quizzes

Paper catalogs

Advantages

Easy to create a catalog without high technology

Reader is able to look at the catalog without computer system

More portable than electronic catalog

Disadvantages

Difficult to update changes in the product information

Only limited number of products can be displayed

Online or electronic catalogs

Advantages

Easy to update product information

Able to integrate with the purchasing process

Good search and comparison capabilities

Able to provide timely, up-to-date product information

Can provide broad range of product information

Possibility of adding voice and motion pictures

Cost savings

Easy to customize

FINALTERM EXAMINATION

Fall 2009

IT430- E-Commerce

Question No: 1 ( Marks: 1 ) - Please choose one

Page 107: A Mega File of It for Current Quizzes

At deposit stage, the serial number is ……………..by E-Cashbank

► Known ► Unknown ► Kept Secret ► Informed

Question No: 2 ( Marks: 1 ) - Please choose one

How many kinds of Web Portals are?

► 3 ► 2 ► 5 ► 6

Portals are the web sites which provide chance to the visitors to find almost everything in one place.

Horizontal portals provide information about a very broad range of topics. Search engine is the example

of a horizontal portal. Vertical portals provide information pertaining to a single area of interest.

Community Portals such as those related to medical or legal profession are the examples of a vertical

portal. Online shopping is a popular addition to the some portals such as ‘yahoo.com’. Portals allow

users to browse independently owned storefronts unlike online shopping malls.

Question No: 3 ( Marks: 1 ) - Please choose one

Let us, suppose that you have hosted your e-commerce website,

When you provide “opt-in e-mail” option to your customers on your website and customer opt for it ,

what does it mean to receive ?

► Information about product through advertisement

► Information about product through e-mail

► Information about services available on it

► Information about News through e-mail.

You can also provide the “opt-in e-mail” option to your customers on your web site. If

they opt for it, this means that they want to receive through email any product information, offers

or promotions etc. in the future.

Question No: 4 ( Marks: 1 ) - Please choose one

Track the customers online and do personalization is only possible through which of the following file(s)

analysis.

► log files ► cookie ► data mining ► log files and cookies.

There are software tools or tracking devices that can provide feedback on how many number of internet

users actually viewed a banner or a marketing message and how many actually clicked on the

Page 108: A Mega File of It for Current Quizzes

advertisement. Log files consist of data generated by site visits and include information about each

visitor’s location, IP address, time of visit,

frequency of visits etc. There are businesses that provide the services of analyzing web log files. The

results would show how effective your web site is and indicate the top-referring web sites. You know

that cookies allow e-commerce sites to record visitor behavior. They can be used to track customers

online and do personalization.

Question No: 5 ( Marks: 1 ) - Please choose one

When customer life cycle is used to create different groups of customers, it is called?

► Targeting Customers ► Dynamic groups

► Customer Life Cycle Segmentation ► Group Development

Question No: 6 ( Marks: 1 ) - Please chose one

Network addresses 128--- 191 range belongs to which of the following class networks?

► A ► B ► C ► E

Question No: 7 ( Marks: 1 ) - Please choose one

Which one of following illustrates relationship between "" and // ?

► Closely related ► Hide the code

► Different ► Hide the tags

Question No: 8 ( Marks: 1 ) - Please choose one

Which of the following property falls in HTTP?

► Stateless ► Stateful ► Temporary ► All of these

Page No.88:http is stateless. Another reason why we need to write scripts or develop our back end

is that we want to maintain state.

Question No: 9 ( Marks: 1 ) - Please choose one

FSTC stands for:

► Financial Services Technology Consortium

► Financial Secrets Technology Consortium

► Final Security threats control

Page 109: A Mega File of It for Current Quizzes

► First Service Technology Consortium

Question No: 10 ( Marks: 1 ) - Please choose one

Supply chain can be broken into three parts, that is ----------------- , ----------------------- and --------------------

activities.

► Internal, external support ► Upstream, internal ,downstream

► Primary, Secondary ,R&D ► None of them

1-Upstream activities relate to materials/services or the input from suppliers

2-Internal activities relate to manufacturing and packaging of goods

3-Downstream activities relate to distribution and sale of goods to distributors/customers

Question No: 11 ( Marks: 1 ) - Please choose one

The process of taking active role in working with suppliers to improve products and processes is called?

► Value chain management ► Supply chain management

► Supply chain management software ► Porter Model

Question No: 12 ( Marks: 1 ) - Please choose one

What is Ultimate consumer orientation?

► Primary objective of supply chain is to help each company to meet needs of the consumer at the end

of supply chain.

► Secondary Primary objective of supply chain is to help each company to meet needs of the consumer

at the end of supply chain.

► Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of

supply chain.

► None of them

Question No: 13 ( Marks: 1 ) - Please choose one

Many search engines rank the site by using a program called

► Spider ► Scorpion ► Moon ► Cobweb

Page 110: A Mega File of It for Current Quizzes

Page No.138: Many search engines rank the site by using a program called ‘spider’ which inspects the

site before ranking.

Question No: 14 ( Marks: 1 ) - Please choose one

E-commerce is a combination of three different areas of study, namely, --------,

---------------- and ----------------

► Internal, external support, Support ► Technology, business and law/policy

► Primary, Secondary, R&D ► Sale, purchase, feed back

Page No.161: E-commerce is a combination of three different areas of study, namely, technology,

business and law/policy. We have studied the technology and business side of e-commerce to a

reasonably good extent. Now, we have to start the law and policy side of e – commerce. However,

before we do that lets discuss some interesting issues related to the international aspect of e-

commerce.

Question No: 15 ( Marks: 1 ) - Please choose one

In which type of data mining, Apriori algorithms is used?

► Classification ► Association

► Characterization ► Clustering

Page No.143: Apriori algorithm is used for association mining.

Question No: 16 ( Marks: 1 ) - Please choose one

EDI has the key feature(s)

► No paper work ► No human intervention ► Exchange of information takes place in seconds ► All

of these

Page No.147:ELECTRONIC DATA INTERCHANGE

Question No: 17 ( Marks: 1 ) - Please choose one

Addresses are tied to the device itself and give no clue to it's location on a global scale. This is the

characteristics of

► IP ► RIP ► MAC ► None of the given

Page 111: A Mega File of It for Current Quizzes

MAC addresses are tied to the device itself and give no clue to it's location on a global scale. MAC

AB:CD:EF:01:01:01 may be in the US and MAC AB:CD:EF:01:01:02 may be in Australia. So a router

would have to keep track of where every individual MAC is in the world and how to get to it. That just

isn't feasible.

With an IP address you can be fairly sure that IP 1.2.3.2 and 1.2.3.3 are on the same network and the

router that looks after the subnet they live on will know who is who. Therefor your router (or your

ISP's) need only to know how to get that networks router. Reducing the amount of routes it needs to

know by a couple of magnitudes.

Question No: 18 ( Marks: 1 ) - Please choose one

When two or more intranets are connected to each other they form a/an ------------- .

► intranet ► internet ► extranet ► VPN

Extranet – when two or more intranets are connected with each other, they form an Extranet – e.g,

Virtual Private Network

Question No: 19 ( Marks: 1 ) - Please choose one

Whic

h attribute can be used to make a region non-clickable?

► none of the given ► target ► alt ► nohref

Page No.37: ‘Nohref’ attribute can be used to make a region non-clickable. For example,

Question No: 20 ( Marks: 1 ) - Please choose one

Which of the following payment mode does not require customer to pay interest to the bank on each

transaction?

► Credit card ► Debit card ► Electronic check ► All of the above

Page No.110: In case of a credit card the issuer bank charges interest from the client at a specified rate

on the amount lent. On the other hand, in case of a debit card no such interest is payable since the

customer uses his/her own money in that case.

Question No: 21 ( Marks: 1 ) - Please choose one

Cyber wallet can automatically assemble the correct payment and pay it too.

► True ► False Page No.118:Cyber wallet automatically assembles the correct payment amount and

pays.

Question No: 22 ( Marks: 1 ) - Please choose one

Page 112: A Mega File of It for Current Quizzes

SET doesn’t require special software on the client or merchant side.

► True ► False

SET requires software on, both, the client and the merchant side

Question No: 23 ( Marks: 1 ) - Please choose one

Which model allows the users to log-on on a website and assume the role of bidder or seller?

► Online Banking. ► Storefront Model ► E-Learning. ► Auction Model.

In this model there are auction sites to which the users can log-on and assume the role of a bidder or

seller. As a seller, one has to specify the minimum price to sell one’s item (called reserve price), the

description of the item and the deadline to close the auction. At the end of the auction, the seller and

the bidder are notified by the auction site and the payment mechanism and delivery mode is worked

out. Auction sites charge commission on sales.

Question No: 24 ( Marks: 1 ) - Please choose one

According to Michael Porter, “fabricating” is an example of primary activity in a strategic business unit.

Identify the area in which this task is performed.

► Market and sell ► Deliver’ activities relate to storage

► Purchase materials and supplies ► Manufacture product or create service

‘Manufacture product or create service’ activities relate to transformation of materials and labor into

finished products, e.g, fabricating, assembling, packaging etc.

Question No: 25 ( Marks: 1 ) - Please choose one

Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the

wrong-doer. Is it?

► True ► False

Question No: 26 ( Marks: 1 ) - Please choose one

In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, --

-------------- and ----------

► Acceptance and consideration ► Acceptance and Rejection ► Approval and consideration ► None

An offer is a commitment with certain terms made to another party such as willingness to buy or sell

certain product.sell certain product.A contract is formed when a party accepts the offer of another party

Page 113: A Mega File of It for Current Quizzes

for consideration. Consideration is the agreed exchange of something valuable for both the parties such

as money, property or services.

Question No: 27 ( Marks: 1 ) - Please choose one

In online environment acceptances may be issued by an imposter/cheater that has authority to bind the

online business

► True ► False

In online environment acceptances may be issued by an imposter/cheater that does not have authority

to bind the online business. To overcome this problem companies and individuals can use digital

signatures to establish identity in online transactions.

Question No: 28 ( Marks: 1 ) - Please choose one

#00ff00 in HTML indicates

► Pure green color ► Pure blue color

► Pure red color ► Pure yellow color

Question No: 29 ( Marks: 1 ) - Please choose one

Virtual PIN Payment System requires both merchant and buyer to register with _______________.

► Auto Clearing House (ACH) ► First Virtual (FV) ► DSS (Digital Signature Standard)

► DES (Data Encryption Standard)

Question No: 30 ( Marks: 1 ) - Please choose one

Classification and Association belong to which of the following types of Data Mining?

► Selective ► Predictive ► Descriptive ► Additive

Classification and association are predictive types of data mining while characterization and

clustering represent the descriptive type.

Question No: 31 ( Marks: 1 )

What should be the length range in bits of a message digest?

A message digest is a single large number typically between 128 to 256 bits in length.

Question No: 32 ( Marks: 1 )

Just write down the name of Elements of Branding?

Page 114: A Mega File of It for Current Quizzes

Differentiation Relevance Perceived Value

Question No: 33 ( Marks: 2 )

What is civil law? Give precise answer.

Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the

wrong-doer. Civil wrongs such as breach of contract are deemed to violate only the rights of individuals

and not the society in general.

Question No: 34 ( Marks: 2 )

What do we mean by “Affiliation” between two parties? Explain shortly.

Affiliation:

Generally, affiliation exists when one business controls or has the power to

control another or when a third party (or parties) controls or has the power to control both

businesses. Control may arise through ownership, management, or other relationships or

interactions between the parties.Merger us an example of afiliation.

Question No: 35 ( Marks: 3 )

What is concept of “fair use” in copyright law?

There is a concept of ‘fair use’ or ‘fair dealing’ in copyright law that provides legitimate exceptions

to copyright violation. Generally, fair use of a copyrighted work includes copying it for use in

criticism, comment, news reporting, teaching, scholarship or research. Experts draw support from this

concept of ‘fair use’ to deal with the problem of copyright over the internet. It is also argued that in

cases where the author of a work has himself provided a hyperlink leading to his work, he should be

regarded as giving the implied authority or license to download or make copies of his work. In such an

eventuality, the issue of copyright should not arise according to an opinion.

Question No: 36 ( Marks: 3 )

Digital signatures are considered more reliable than paper signatures. Do you agree with this

statement? Briefly justify your answer. 1+2

Question No: 37 ( Marks: 3 )

What is ERP? Briefly explain its use in an organization? (1 + 2)

Page 115: A Mega File of It for Current Quizzes

ERP is an approach that attempts to integrate all departments and functions across a company onto a

single

computer system that can serve all those different departments' particular needs. For example, finance,

manufacturing and the warehouse department of a company may have their own software to perform

tasks

specific to each one of them. However, each software can be linked together so that a customer service

representative can see the credit rating of a customer from finance module, warehouse information

from

warehouse module, and shipment information from the shipment module. SAP is an example of ERP

software. ERP is complex. It is not intended for public consumption as proper integration of ERP with

ecommerce

applications is still a major problem.

Question No: 38 ( Marks: 5 )

What do you perceive by Value Added Network? Explain its advantages too with reference to EDI. (2+3)

Value added networks are third party networks that provide services to execute authorized transactions

with valid trading partners using EDI. Each VAN has a centralized computer system that maintains two

files for each user, that is,

Postbox: where outgoing messages are placed, and

Mailbox: where incoming messages can be picked up.

Page 116: A Mega File of It for Current Quizzes

Advantages:

Two big advantages of using a VAN in EDI are time independence and protocol independence.

Time independence means that the sending and receipt of the interchange or messages can be carried

out at the convenience of the users involved. Thus, they are not required to be connected with each

other at the same time. Protocol independence means that interchanges are re-enveloped with the

transmission protocol appropriate to the recipient when they are retrieved from the postbox by the

VAN. Thus, a VAN can provide protocol compatibility between the sender and the recipient, wherever

that is missing.

Question No: 39 ( Marks: 5 )

What is ACH? What is its role in Virtual PIN system? 2+3

ACH stands for Automated Clearing House.A house through which the bank of payee clears the check

with the help of traditional automated clearing house.

Role of ACH in Virtual PIN System:

A deposit request encrypted with bank’s public key accompanies the payment information. E-cash bank

maintains a database of spent coins. On receipt it checks whether the coin is valid and whether it has

already been spent or not (to prevent double spending) by referring to its database. If the coins are valid

the

bank credits the merchant’s account. Thus, if the client has sent valid coins worth $10 for payment to

the

merchant, and the merchant already has $90 in his account then an amount of $ 10 would be added in

his

Page 117: A Mega File of It for Current Quizzes

account making it $ 100. Later, the merchant can request the e-cash bank to transfer this amount in his

account with the acquirer bank. This can be done through ACH and the merchant can physically

withdraw

the money form the acquirer bank.

Question No: 40 ( Marks: 10 )

What is data warehousing? What are its main tasks? What is its importance for an organization?

The primary concept behind data warehousing is that the data stored for business analysis can most

effectively be accessed by separating it from the data in the operational systems. A data warehouse,

therefore, is a collection of data gathered from one or more data repositories to create a new, central

database. For example a hospital may create a data warehouse by extracting the operational data it has

accumulated concerning patient information, lab results, drug use, length of stay, disease state, etc,.

Data Warehousing is not just the data in the warehouse, but also the architecture and tools to collect,

query, analyze and present information.

Question No: 41 ( Marks: 10 )

Precisely explain the steps of “Knowledge discovery from database” in order of their occurrence.

Answer: Knowledge discovery process include Data cleaning, Data selection, Data transformation, Data

Mining, Data integration, Pattern evaluation & knowledge presentation.

Page 118: A Mega File of It for Current Quizzes

Explaination of each step:

1-Data cleaning

Data cleaning means that missing values should be provided in different fields/columns wherever

needed and any impossible or erroneous values should be substituted by correct/reasonable ones. For

example if the age of a person is typed as

1000 years in the column ‘age’ then an average age value can be put in its place.

2-Data selection

Where there are quite a few erroneous or missing values in a row, then that row can be

discarded/deleted altogether. This process is called data selection.

3-Data transformation

In data transformation, the data from all different sources is converted into the same format. For

example, date typed under a column should be in the same format in the entire data collected through

different sources.

4-Data integration

In data integration, data from all the sources is assembled or integrated into one

and housed in the data warehouse.

5-Data Mining

Now, this cleaned, transformed, selected and integrated data is fed to the

data mining tool from a data warehouse for data mining purpose.

6-Pattern evaluation & knowledge presentation

The results/ patterns are evaluated by

managers and useful knowledge is thus gained. Note that almost 80% of the total time used in a

knowledge

discovery process is spent on just making the data fit for mining, that is, data cleaning, data

transformation,

data selection etc.

Page 119: A Mega File of It for Current Quizzes

FINALTERM EXAMINATION

Fall 2009 IT430- E-Commerce (Session - 3)

Question No: 1 ( Marks: 1 ) - Please choose one

Four P’s in Marketing Mix are:

► Product, price, place, promotion

► Price, person, place, problem

► Place, product, property, promotion

► Promotion, place, product, planning

Question No: 2 ( Marks: 1 ) - Please choose one

JIT Stands for

► Just In Time ► Joint investigation Technique ► Join in Training ► Just In Total

Question No: 3 ( Marks: 1 ) - Please choose one

Advertising Supported Revenue Model includes

► Yahoo portal ► Employment sites ► Newspaper Publishers ► All of the above

Question No: 4 ( Marks: 1 ) - Please choose one

Which of the following is true for Class A:

► Network 01 byte and 03 hosts ► Network 02 bytes and 02 hosts

► Network 03 bytes and 01 host ► None of these

Question No: 5 ( Marks: 1 ) - Please choose one

What is the correct syntax of the declaration which defines the XML version?

► <xml version="1.0" /> ► <?xml version="1.0" />

► <?xml version="1.0"?> ► None of these

Question No: 6 ( Marks: 1 ) - Please choose one

Which of the following needs human action to execute?

► Virus ► Worm ► Trojan Horse ► All of these

Question No: 7 ( Marks: 1 ) - Please choose one

Page 120: A Mega File of It for Current Quizzes

In the digital signature technique, the sender of the message uses ________ to create cipher text

► His or Her own symmetric key ► His or her own private key

► His or her own public key ► The receiver’s private key

Question No: 8 ( Marks: 1 ) - Please choose one

PIN stands for:

► Payment investigation Number ► Password Identification Number

► Personal Identification Number ► Personal Identification Numeric

Question No: 9 ( Marks: 1 ) - Please choose one

An electronic check contains a(n)………………… to the payer’s bank to make a specified payment to the

payee

► Serial# ► Private key ► Instruction► All of the above

Question No: 10 ( Marks: 1 ) - Please choose one

It is the ability to sell the goods or provide the service at a price that is lower than that of competitors,

and thus attract more customers.

What is called?

► Cost leadership ► Price leadership ► Focus ► Differentiation

Question No: 11 ( Marks: 1 ) - Please choose one

E-commerce is a combination of three different areas of study, namely, --------,

---------------- and ----------------

► Internal, external support, Support ► Technology, business and law/policy

► Primary, Secondary, R&D ► Sale, purchase, feed back

Question No: 12 ( Marks: 1 ) - Please choose one

A company ABC web page divided into four segments can be unpleasant to a Japanese visitor because

no. four is a symbol of death in that culture.

Which is the international barrier it is having?

► Culture ► Language ► Lack of trust ► Infrastructure

Question No: 13 ( Marks: 1 ) - Please choose one

GM Celebes manufacturing electronic goods and FryChips co selling French fries. Under the traditional

trade mark law both these companies can have the same trade mark/trade name such as ‘frys’.

Page 121: A Mega File of It for Current Quizzes

The problem arises when both apply for the registration of a domain name containing the word ‘frys’.

Here, both are legitimate claimants of this domain name but due to the element of uniqueness of

domain names only one of them can be assigned the desired domain name.

Which legal issue arises in this situation?

► Domain name conflict ► Cyber squatting ► Concurrent use ► None

Question No: 14 ( Marks: 1 ) - Please choose one

Which type of Data Mining contains the elements as Support and confidence?

► Classification ► Association ► Characterization ► Clustering

Question No: 15 ( Marks: 1 ) - Please choose one

OLAP stands for……………

► Online Analytical Program ► Online Analytical Processing

► Online Application Program ► Online Analysis Performance

Question No: 16 ( Marks: 1 ) - Please choose one

Characterization and Clustering belong to which of the following types of Data Mining?

► Additive ► Predictive ► Selective ► Descriptive

Question No: 17 ( Marks: 1 ) - Please choose one

Support activities in Value Chain model includes

► Finance and Administration ► Human Resources

► Technology Development ► All of these.

Question No: 18 ( Marks: 1 ) - Please choose one

Which of the following is NOT processed on the client side?

► Cookies ► JavaScript ► CGI scripts ► Applets

Question No: 19 ( Marks: 1 ) - Please choose one

Due to which characteristics, ATM network are covered under E-commerce ?

► Exchange of information through computer networks

► Internet.

► Exchanging of products, services.

► None of the above.

Page 122: A Mega File of It for Current Quizzes

Question No: 20 ( Marks: 1 ) - Please choose one

SET is better than SSL.

► True ► False

Question No: 21 ( Marks: 1 ) - Please choose one

Dividing market, with respect to people having income level greater than Rs 30000, is geographic

segmentation.

► True. ► False.

Question No: 22 ( Marks: 1 ) - Please choose one

Which of the following is NOT an identified behavioral mode of customers on the web?

► Browsers ► Buyers ► Shoppers ► Seller

Question No: 23 ( Marks: 1 ) - Please choose one

Which of these is a way of conducting market research?

► Phone. ► Interviews. ► Questionnaires. ► All of above.

Question No: 24 ( Marks: 1 ) - Please choose one

Which of these is NOT a stage of knowledge discovery process?

► Transformation ► Data mining ► Pattern evaluation ► Process evaluation

Question No: 25 ( Marks: 1 ) - Please choose one

According to Michael Porter, “test marketing” is an example of primary activity in a strategic business

unit. Identify the area in which this task is performed.

► Design ► Market and sell ► Deliver’ activities relate to storage ► Purchase materials and

supplies

Question No: 26 ( Marks: 1 ) - Please choose one

Electronic banking is also known as __________.

► Cyber banking ► Virtual banking ► Online banking ► All of above

Question No: 27 ( Marks: 1 ) - Please choose one

Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the

wrong-doer. Is it?

► True ► False

Question No: 28 ( Marks: 1 ) - Please choose one

Page 123: A Mega File of It for Current Quizzes

In datalink layer, data packets are placed inside

► Data frames ► Data boxes ► Data streams ► None of these

Question No: 29 ( Marks: 1 ) - Please choose one

Which one of the following algorithms does not include in public key algorithms?

► DSS ► RSA ► Elliptic Curves ► RC4

Question No: 30 ( Marks: 1 ) - Please choose one

Which of the following is HTML tag could n’t be used as CSS tag?

► <style> ► <h1> ► <p> ► <a>

Question No: 31 ( Marks: 1 )

What is stand for WIPO?

World Intellectual Property Organization

Question No: 32 ( Marks: 1 )

Name any 3 E-Business models?

1-Storfront Model

2-Auction Model

3-Onlien Banking

Question No: 33 ( Marks: 2 )

What is the basic purpose of using hash function in communication?

A hash function is applied on the message to get the message digest.

Question No: 34 ( Marks: 2 )

What is Competition between existing players ?.

If there are many players having same size and stretagy but having different qualities in product and

services. Then there is true competition between them regarding price of that product or service.

Question No: 35 ( Marks: 3 )

On what basis, generally the protection under “fair use” may be sought? Doesn’t need to explain.

Nature of use:The work should be used only for non profitable and for education purposes.

Page 124: A Mega File of It for Current Quizzes

Nature Of Work:The copied work is effectively covered under fair use as compaird to that of some new

or creative work

Extent of the work copied:The extent of work to be copied under fair use shouold be small so that court

take some favourable steps to accussed.

Question No: 36 ( Marks: 3 )

In Virtual PIN Payment system, merchant side is less secure than buyer side. Do you agree with this

statement? Justify your answer.

Yes , I am agree with this statement that marchant side is less secure than buyer side because marchant

send the product before payment.So there is threat of non payment from buyer side.

Question No: 37 ( Marks: 3 )

What are the disadvantages of Data Mining? (1+1+1)

Privacy Issues

Personal privacy has always been a major concern in this country. In recent years, with the widespread

use of Internet, the concerns about privacy have increase tremendously. Because of the privacy issues,

some people do not shop on Internet. They are afraid that somebody may have access to their personal

information and then use that information in an unethical way; thus causing them harm.

Security issues

Although companies have a lot of personal information about us available online, they do not have

sufficient security systems in place to protect that information. For example, recently the Ford Motor

credit company had to inform 13,000 of the consumers that their personal information including Social

Security number, address, account number and payment history were accessed by hackers who broke

into a database belonging to the Experian credit reporting agency.

Maintanence Problem

Another problem with the data warehouse is that it is difficult to maintain. Any organization that is

considering using a data warehouse must decide if the benefits outweigh the costs. Once you have paid

for the data warehouse, you will still need to pay for the cost of maintenance over time. The costs

involved with this must always be taken into consideration.

Question No: 38 ( Marks: 5 )

Describe the advantages of E-Business in detail.

Personalized service:

product , place , promotion and price are the 4 P`s of marketing mix. Now Personalization is the 5th P

introduced in E-Business.The bahavioural information about customers can be added in data base and

Page 125: A Mega File of It for Current Quizzes

then can be utilized to by teh E-Commerce sites to analyze the needs of taht particular customer.So, in

this way personalized service can be provided to customer.

High-quality customer service

With the help of feed back of potential customers online businesses can improve the quality of their

products according to the needs and demands of thier customers.So it will improve the customer

services of E-Buiseness.

No inventory cost

In case of E-Business we dont need to have any physical place to start business. In this way it reduces

overheads and invemtory costs.An onilne busines can take orders from customers with out bearing teh

inventory cost like offline traditional businesses.

Worldwide reach of your business:

In E-Busines there is a chance to extend your business thruoghout the world. So, global reach is possible

in E-Business.

Electronic catalogues

Electronic catalogue is used in online busines have many adbvantages over paper catalogues.

Bulk transactions

Due to no limitations on collecting , carrying and packaging goods we can order bulk transactions during

even one visit at online shops.

Improved supply chain management

suppliers and manufacturer are the active members of supply chain members. They are effective

addition in E-Business.

Question No: 39 ( Marks: 5 )

Elaborate the importance of OLAP in decision making support for an organization.

OLAP makes use of baksground knowledge regarding the domain of the data being studied .It is different

from data mining as it does not provide patterns for any predictions.It allows the data being studied to

present at different level of abstraction.Informartion stored in the data base can be viewed and

reviewed conveniently in any formate .In case of OLAP at different levels facilitate managers and

decision makers in making decisions.OlAP uses different tools namely, drill down , roll up and and slice

and dice etc.By using drill down we can further dig into the data for recieving more information whcih is

specific.Roll up works opposite to the drill down , It is used to sum up the information in a particular

dimention to show the results.

Question No: 40 ( Marks: 10 )

Page 126: A Mega File of It for Current Quizzes

What is Porter’s 5 forces model ? Discuss briefly 5 forces with its purpose.

Porter`s models helps a firm to identify threats to its sompetitive position.and to devide plans

accordingly which includes uses of IT and E commerce to protect or enhance his competitive position .

Following are the 2 forces models of porter.

1- Threats of new potentian entrants to the sector

This threats relates to the opportunity that how easily a company having different products and

services can enter into the a given trade sector.How effeciently it remove teh barriers liek IT, Capital and

skills.For example to start online banking you need not to

2-Threats of substitute product or service in existingtrade

3-Bragaining power of the buyers

4-Bargaining power of the suppliers

5-Competition between existing players

Question No: 41 ( Marks: 10 )

What are the advantages and disadvantages of offline and online catalogues

Online catalogues vs. Paper catalogues

Paper catalogs

Advantages

Easy to create a catalog without high technology

Reader is able to look at the catalog without computer system

More portable than electronic catalog

Disadvantages

Difficult to update changes in the product information

Only limited number of products can be displayed

Online or electronic catalogs

Advantages

Easy to update product information

Able to integrate with the purchasing process

Good search and comparison capabilities

Page 127: A Mega File of It for Current Quizzes

Able to provide timely, up-to-date product information

Can provide broad range of product information

Possibility of adding voice and motion pictures

Cost savings

Easy to customize

IT430 Final 2010

Question No: 1 (: 1 ) - Please choose one

In case of transaction failure or crash, one can re trieve his or her lost coins by sending all blinded signed coins from last …………………withdrawals to the E-bank.

► 10

► 12

► 18

► 16

reF: page 119

In case network fails or computer crashes during pa yment transaction, coins might be lost. All signed blinded coins from last 16

withdrawals are sent by the bank to the client.

Question No: 2 (: 1 ) - Please choose one

Which entity does not include in SET(secure Electro nic Transaction)?

► Seller

► Buyer

► Payment gateway

► Bank

Page 128: A Mega File of It for Current Quizzes

Question No: 3 (1 ) - Please choose one

Traditionally Marketer use the market segmentation( s) like

► Geo-graphic Segmentation

► Demographic Segmentation

► Psychographic Segmentation

► All of the above page 131

Question No: 4 (1 ) - Please choose one

Class C has:

► Network 01 byte and 03 hosts

► Network 02 bytes and 02 hosts

► Network 03 bytes and 01 host page 10

► None of these

Question No: 5 (: 1 ) - Please choose one

In ring topology, failure of network cable will onl y take down one computer’s network access.

► True

► False page 14

Question No: 6 (: 1 ) - Please choose one

Which device uses the IP address

► Switch

► Router page 15

► Repeater

► None of these

Question No: 7 (: 1 ) - Please choose one

Page 129: A Mega File of It for Current Quizzes

What is the correct HTML for inserting an image?

► page 53

► image.gif

Question No: 8 (: 1 ) - Please choose one

Cryptographic Algorithms are measured in terms of

► Key length 108

► Complexity

► Simplicity

► All of the above

Question No: 9 (: 1 ) - Please choose one

Upstream activities relate to?

► Materials/services or the input from suppliers page 154

► Manufacturing and packaging of goods

► Distribution and sale of goods to distributors/cus tomers

► Input from suppliers and Distribution

Question No: 10 (: 1 ) - Please choose one

Television, radio and print media are in a (n) ………… …………. Mode.

► Passive

► Active

► Static

Page 130: A Mega File of It for Current Quizzes

► Dynamic

reF: page 139

In case of television, radio or print media people are normally in a passive mode

Question No: 11 (: 1 ) - Please choose one

Which of the following Barriers to International E- Commerce?

► Advertising

► Patents

► Infrastructure

► Capital

Ref: page 161

Barriers to international ecommerce include lack of trust, lack of infrastructure, language and culture.

Question No: 12 (1 ) - Please choose one

Exclusive right granted by law to make, use and sel l an invention. What is called?

Parasites €€€€€€€€

► Trade mark

► Patent infringement

► Copyright

Ref: page 181

A patent is an exclusive right granted by law to make, use and sell an

invention.

Question No: 13 (: 1 ) - Please choose one

Suppose, someone circulates a news item in the medi a about the reputation of a doctor, alleging him to be professi onally incompetent

Page 131: A Mega File of It for Current Quizzes

and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due t o such an act.

Which legal issue arises due to such acts?

► Cyber Crimes

► Online Defamation

► Cyber squatting

► None

Ref: page 182

A defamatory statement is a false statement that in jures the reputation of on another person or company. If a st atement injures the reputation of a product or service instead of a person, it is called product disparagement. Suppose, someone circulates a news item in the media about the reputation of a doctor, allegin g him to be professionally incompetent and negligent. This doct or may then file a lawsuit against that person claiming that his reput ation has been injured due to such an act.

Question No: 14 (: 1 ) - Please choose one

Characterization and Clustering belong to which of the following types of Data Mining?

► Additive

► Predictive

► Selective

► Descriptive

reF; page 141

Classification and association are predictive types of data mining while characterization and clustering represent the descriptive type.

Question No: 15 (.: 1 ) - Please choose one

EDI stands for……..

Page 132: A Mega File of It for Current Quizzes

► Electronic Digital Information

► Electronic Data Integration

► Electronic Data Interchange page 147

► All of these

Question No: 16 (: 1 ) - Please choose one

Implementing Value Chain model can help us to…

► Reduce cost

► Improve quality of products

► Create new ways of selling products

► All of these.

Ref: page 153

It can reduce costs of a business;

It can improve quality of products;

It can help in reaching new customers or suppliers;

It can create new ways of selling products.

Question No: 17 (1 ) - Please choose one

Following are malicious programs EXCEPT ----------- ------ .

► Back doors

► Trojan Horses

► Firewalls page 94

►Worms

Question No: 18 (1 ) - Please choose one

Which of the following is a valid variable name?

► 6th_student_CGPA

Page 133: A Mega File of It for Current Quizzes

► first_student_CGPA page 57

► last student CGPA

► *any_student_CGPA

Question No: 19 (1 ) - Please choose one

Which of the following payment mode does not requir e customer to pay interest to the bank on each transaction?

► Credit card

► Debit card page 110

► Electronic check

► All of the above

Question No: 20 ( 1 ) - Please choose one

FVIPSS stands for _________.

► First Virtual Internet Payment System Server page 110

► First Virtual International Payment System Server

► First Virtual International Payment System Service s

► First Virtual Internal Payment System Services

Question No: 21 (1 ) - Please choose one

Which e-business helps to improve policies, procedu res, customer services, and general operations of other businesse s?

► Online shopping malls.

► Selling intellectual property online.

► Online service providers.

► Online automotive sites and energy online.

reF: page 129

Page 134: A Mega File of It for Current Quizzes

These e-businesses help improve policies, procedure s, customer

service and general operations of other businesses.

Question No: 22 (1 ) - Please choose one

Which of the following is NOT an identified behavioral mode of customers on the web?

► Browsers

► Buyers

► Shoppers

► Seller

Ref: page 132

Browsers – customers who just browse through the si te with no intention of buying

Buyers – customers who are ready to buy right away

Shoppers – customers who are motivated to buy but w ant more information

Question No: 23 (: 1 ) - Please choose one

Downstream activities relate to distribution and sa le of goods to distributors/customers

► True page 155

► False

Ref: Downstream activities relate to distribution and sale of goods to

distributors/customers

Question No: 24 (1 ) - Please choose one

Online banking is a substitute of tradition banking . Is it?

► True page 158

► False

Page 135: A Mega File of It for Current Quizzes

Ref:

For example,

to start online banking a company does not require heavy investment in constructing buildings (branch offices), hiring staff etc. as required in traditional banking.

Question No: 25 () - Please choose one

-------------means services in relation to the tran sformation of contents of an electronic

document from its original form to one that cannot be understood or decoded by any unauthorized person

► Cryptography services

► Accredited Certification Service Provider’

► Originator

► Addressee

reF; pgae 163

“‘Cryptography services’ means services in relation to the transformation of contents of an electronic documen t from its original form to one that cannot be understood or decoded by any unauthorized

person”.

Question No: 26 (: 1 ) - Please choose one

Law is broadly divided into two classes on the basi s of nature of wrong, namely, ------------ and ---------------

► Civil law and criminal law

► ETO and criminal law

► Supreme and Civil Law

► None

Page 136: A Mega File of It for Current Quizzes

Ref: page 176

Law is broadly divided into two classes on the basi s of nature of wrong, namely, civil law and criminal law.

Question No: 27 1 ) - Please choose one

Each layer except ………… has got a header.

► Physical layer page 4

► Datalink layer

► Session layer

► Network layer

Question No: 28 (1 ) - Please choose one

Symmetric algorithms are faster than asymmetric?

► true page 105

► false

Ref; symmetric algorithms are faster as compared to asymmetric,

Question No: 29 (1 ) - Please choose one vuzs

SET was developed in _____.

► 1996

► 1997 page 122

► 1998

► 1999

Question No: 30 : 1 ) - Please choose one

LDA stands for _______

►Lahore Development Authority pafge 165

► Lahore Development Act

Page 137: A Mega File of It for Current Quizzes

Question No: 31 (: 2 )

What is Data Mining?

Question No: 32 (2 )

What is the purpose of FRAMESET tag?

Question No: 33 (: 2 )

What do we mean by "Free-Trial" promotion technique?

Question No: 34 (: 2 )

What is UNCITRAL?

Question No: 35 3 )

Write precisely about the 4th stage of planning cycle?

Question No: 36 : 3 )

Page 138: A Mega File of It for Current Quizzes

Discuss the role and responsibilities of “Transport layer” in OSI

model?

Question No: 37 (: 3 )

How lack of trust barrier can be overcome or minimized? Discuss

it briefly

Question No: 38 (3 )

Write the names of companies who were helper in developing

Secure Electronic Transaction.

Question No: 39 (: 5 )

Differentiate between Cyber squatting and concurrent

use with example.

Question No: 40 (: 5 )

Explain ‘Confidence’ and ‘Support’ as two measures of

Association?

MC080406248 : Salman Ali

Time Left 57

sec(s)

Page 139: A Mega File of It for Current Quizzes

Quiz Start Time: 06:58 PM

Question # 3 of 10 ( Start time: 06:59:47 PM ) Total Marks: 1

Which of the following is a business promotion?

Select correct option:

Free-Trials

Free-Shipping

Both of these (Page # 133)

None

Click here to Save Answer & Move to Next Question

MC080406248 : Salman Ali Quiz Start Time: 06:58 PM

Time Left 62

sec(s)

Question # 4 of 10 ( Start time: 07:00:31 PM ) Total Marks: 1

In many countries, stealing and misusing of meta information for getting competitive advantage is considered as an offence known as

Select correct option:

Tort of Private Nuisance

Tort of Tress passing

Page 140: A Mega File of It for Current Quizzes

Tort of passing off (pg #138)

Defamation

Click here to Save Answer & Move to Next Question

MC080406248 : Salman Ali Quiz Start Time: 06:58 PM

Time Left 50

sec(s)

Question # 5 of 10 ( Start time: 07:01:04 PM ) Total Marks: 1

Digital Content Revenue Model Includes

Select correct option:

Legal information services

Online journals

Online Libraries

All of the above (page # 130)

Click here to Save Answer & Move to Next Question

MC080406248 : Salman Ali Quiz Start Time: 06:58 PM

Time Left 29

sec(s)

Page 141: A Mega File of It for Current Quizzes

Question # 6 of 10 ( Start time: 07:01:56 PM ) Total Marks: 1

Which of the following is an advertising payment mode?

Select correct option:

Pay-per-person

Pay-per-page

Pay-per-sale (pg #134)

Pay-per-minute

Click here to Save Answer & Move to Next Question

MC080406248 : Salman Ali Quiz Start Time: 06:58 PM

Time Left 87

sec(s)

Question # 8 of 10 ( Start time: 07:03:37 PM ) Total Marks: 1

Which one of the followings is an example of Banner advertising?

Select correct option:

Branding

Affiliate programs (page # 138)

Partnership

Page 142: A Mega File of It for Current Quizzes

All of these

Click here to Save Answer & Move to Next Question

MC080406248 : Salman Ali Quiz Start Time: 06:58 PM

Time Left 83

sec(s)

Question # 9 of 10 ( Start time: 07:04:20 PM ) Total Marks: 1

Which of following marketing campaigns are cheap an effective way to target potential customers?

Select correct option:

Sale forces

E-mail (page # 133)

Media promotion

Marketing software

Click here to Save Answer & Move to Next Question

MC080405962 : Muhammad Umer Siddique Quiz Start Time: 07:05 PM

Time Left 87

sec(s)

Question # 1 of 10 ( Start time: 07:05:31 PM ) Total Marks: 1

Page 143: A Mega File of It for Current Quizzes

Call handling, sales tracking and Transaction support(technology / personnel) activities are included in which management system

Select correct option:

Customer Relationship Management system (page # 136)

Public relation management system

Inventory management system

Data Base Management system

Click here to Save Answer & Move to Next Question

MC080405962 : Muhammad Umer Siddique Quiz Start Time: 07:05 PM

Time Left 86

sec(s)

Question # 2 of 10 ( Start time: 07:06:01 PM ) Total Marks: 1

The result of OLAP (Online Data Processing) is displayed in the form of a __________.

Select correct option:

Data square

Data Triangle

Data cube (page # 145)

Data circle

Page 144: A Mega File of It for Current Quizzes

Click here to Save Answer & Move to Next Question

MC080405962 : Muhammad Umer Siddique Quiz Start Time: 07:05 PM

Time Left 84

sec(s)

Question # 3 of 10 ( Start time: 07:06:14 PM ) Total Marks: 1

Which of these is a tool that can be used to improve customer services?

Select correct option:

Log file analysis

Cookies

Data mining

All (page # 136)

Click here to Save Answer & Move to Next Question

MC080405962 : Muhammad Umer Siddique Quiz Start Time: 07:05 PM

Time Left 86

sec(s)

Question # 4 of 10 ( Start time: 07:06:27 PM ) Total Marks: 1

Web catalogue revenue model includes

Select correct option:

Page 145: A Mega File of It for Current Quizzes

a. Online sellers of computer

b. Gifts, flowers, clothes

c. Journals

d. A and B (page # 130)

Click here to Save Answer & Move to Next Question

MC080405962 : Muhammad Umer Siddique Quiz Start Time: 07:05 PM

Time Left 84

sec(s)

Question # 5 of 10 ( Start time: 07:06:37 PM ) Total Marks: 1

When you email at [email protected] , your email is automatically sorted and replied to your ID.

Select correct option:

True

False

Click here to Save Answer & Move to Next Question

MC080405962 : Muhammad Umer Siddique

Time Left 20

sec(s)

Page 146: A Mega File of It for Current Quizzes

Quiz Start Time: 07:05 PM

Question # 6 of 10 ( Start time: 07:06:47 PM ) Total Marks: 1

CPM is an advertising payment mode. CPM stands for ________.

Select correct option:

Cost Per Month

Cost Per Minute

Cost Per Megabyte (Cost per Thousand where thousand=megabyte) pg # 134)

Cost Per Message

Click here to Save Answer & Move to Next Question

MC080405962 : Muhammad Umer Siddique Quiz Start Time: 07:05 PM

Time Left 84

sec(s)

Question # 7 of 10 ( Start time: 07:08:04 PM ) Total Marks: 1

Objective of any marketing strategy is to bring the customers quickly to the ___________.

Select correct option:

Familiarity stage

Exploration stage

Page 147: A Mega File of It for Current Quizzes

Separation stage

Commitment stage (page #137)

Click here to Save Answer & Move to Next Question

MC080405962 : Muhammad Umer Siddique Quiz Start Time: 07:05 PM

Time Left 83

sec(s)

Question # 8 of 10 ( Start time: 07:08:15 PM ) Total Marks: 1

In many countries, stealing and misusing of meta information for getting competitive advantage is considered as an offence known as

Select correct option:

Tort of Private Nuisance

Tort of Tress passing

Tort of passing off (page # 138)

Defamation

Click here to Save Answer & Move to Next Question

MC080405962 : Muhammad Umer Siddique

Time Left 87

sec(s)

Page 148: A Mega File of It for Current Quizzes

Quiz Start Time: 07:05 PM

Question # 9 of 10 ( Start time: 07:08:30 PM ) Total Marks: 1

Meta tag contains:

Select correct option:

User information

seller information

web page key information pg #138

bank information

Click here to Save Answer & Move to Next Question

MC080405962 : Muhammad Umer Siddique Quiz Start Time: 07:05 PM

Time Left 85

sec(s)

Question # 10 of 10 ( Start time: 07:08:38 PM ) Total Marks: 1

Do you think, vulms.vu.edu.pk is an example of E-mail marketing?

Select correct option:

True

False

Page 149: A Mega File of It for Current Quizzes

Click here to Save Answer & Move to Next Question

MC080407990 : Muhammad Rasheed

Quiz Start Time: 07:10 PM

Time Left 77

sec(s)

Question # 2 of 10 ( Start time: 07:11:05 PM ) Total Marks: 1

Which of these is an algorithm used in clustering?

Select correct option:

K-means pg #145

L-means

C-means

F-means

Click here to Save Answer & Move to Next Question

MC080407990 : Muhammad Rasheed

Quiz Start Time: 07:10 PM

Time Left 87

sec(s)

Question # 3 of 10 ( Start time: 07:11:24 PM ) Total Marks: 1

In…………………, there is no direct contact with the end users

Select correct option:

Page 150: A Mega File of It for Current Quizzes

B2B

B2C

C2C (page # 137)

All

Click here to Save Answer & Move to Next Question

MC080407990 : Muhammad Rasheed

Quiz Start Time: 07:10 PM

Time Left 53

sec(s)

Question # 4 of 10 ( Start time: 07:11:38 PM ) Total Marks: 1

Dividing the potential customers into groups is called

Select correct option:

Market Segmentation (page # 131)

Market Promotion

Market Research

Market Survey

Click here to Save Answer & Move to Next Question

Page 151: A Mega File of It for Current Quizzes

MC080407990 : Muhammad Rasheed Quiz Start Time: 07:10 PM

Time Left 52

sec(s)

Question # 6 of 10 ( Start time: 07:12:30 PM ) Total Marks: 1

Which of these is NOT a stage of knowledge discovery process?

Select correct option:

Transformation

Data mining

Pattern evaluation

Process evaluation (page # 140)

Click here to Save Answer & Move to Next Question

MC080407990 : Muhammad Rasheed

Quiz Start Time: 07:10 PM

Time Left 35

sec(s)

Question # 7 of 10 ( Start time: 07:13:20 PM ) Total Marks: 1

In the template prefix, Template<class T> What kind of variable is the parameter T?

Select correct option:

T must be a class.

Page 152: A Mega File of It for Current Quizzes

T must not be a class.

T can be only types built into the C++ language.

T can be any type, whether built into C++ or defined by the programmer.

Click here to Save Answer & Move to Next Question

MC080404926 : JAMAL MIRAN Quiz Start Time: 07:16 PM

Time Left 6

sec(s)

Question # 10 of 10 ( Start time: 07:18:49 PM ) Total Marks: 1

How many stages involve in customer loyalty model for creating good customer relationship?

Select correct option:

6

5

4

3

Click here to Save Answer & Move to Next Question

Page 153: A Mega File of It for Current Quizzes

What is true about ERP? Select correct option: Integrate all business functions At Single Location Efficient use of resource ALL Above Enterprise Resource Planning (ERP) is a concept that integrates all aspects of a business e.g, accounting, logistics, manufacturing, marketing, planning, project management etc. at a single place http://vuzs.net/ The process of taking active role in working with suppliers to improve products and processes is called ______________. Select correct option: ERP Marketing Supply Chain Management Sale Engaging and negotiating with suppliers can be extremely beneficial. The process of taking active role in working with suppliers to improve products and processes is called supply chain management. Today, firms are reaching beyond limits of their own organizational structure Consider the following definition template < class T > class Xyz { … }; Select correct option: it defines a class template for integers only it defines a class template for any class class templates are not defined in this way***** none of given options Question # 1 of 10 ( Start time: 11:41:47 AM ) Total Marks: 1 EDI involves exchange of ________. Select correct option: Electronic business documents Data Resources NONE of Above EDI is used by organizations for transactions that occur on a regular basis according to a pre-determined format. It involves exchange of electronic business documents, i.e., purchase orders, invoices etc. EDI transactions are carried through special EDI software http://vuzs.net/ Question # 6 of 10 ( Start time: 11:46:36 AM ) Total Marks: 1 Survey and market research are used for which poetr identified activity? Select correct option: Identify Design**** I was select Identify customer Identify customers’ refer to those activities which try to find new customers and ways to serve better to the existing ones, e.g, surveys and market research; Question # 5 of 10 ( Start time: 11:45:11 AM ) Total Marks: 1 In which type of approach, we further dig the data for retrieving information from data warehouse? Select correct option:

Page 154: A Mega File of It for Current Quizzes

Slice Dice Drill down Roll up Using drill-down we can further dig the data to receive some specific information. For example using that I can find the sale of furniture in a specific month of the first quarter, say, February Question # 2 of 10 ( Start time: 11:42:39 AM ) Total Marks: 1 Supply Chain Mangment broken down into ___________. Select correct option: Upstream activities Internal activities Downstream activities All of Above Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities Question # 8 of 10 ( Start time: 11:48:11 AM ) Total Marks: 1 Poter Market and sell activities relates to _____________. Select correct option: advertising, promotions managing salespersons monitoring distribution channel All of Above ‘Market and sell’ activities give buyers a way to purchase and provide inducement for them to do sohttp://vuzs.net/ , e.g, advertising, promotions, managing salespersons, monitoring distribution channel, pricing etc. ==========done VAN can _____. Select correct option: Reduce network traffic Provide protocol compatibility between the sender and the recipient, wherever that is missing. Question # 2 of 10 ( Start time: 10:25:45 AM ) Total Marks: 1 What is true about Personal finance? Select correct option: Sell you products in no time. Buy you products in no time. allows the management of your financial matters in a customized manner. None Question # 3 of 10 ( Start time: 10:26:36 AM ) Total Marks: 1 A value chain is a way of organizing activities that each strategic business unit undertakes to ___________. Select correct option: design produce promote All of Above A value chain is a way of organizing activities that each strategic business unit undertakes to design, produce, promote, market, deliver and support the products or services it sells. Question # 4 of 10 ( Start time: 10:27:47 AM )

Page 155: A Mega File of It for Current Quizzes

Total Marks: 1 Activities associated with the flow and transformation of goods from the raw materials stage all the way to the end user ___________. Select correct option: Marketing Suply Chain Managment ERP Online Chain Control Supply chain includes all the activities associated with the flow and transformation of goods from the raw materials stage all the way to the end user. Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities. Question # 5 of 10 ( Start time: 10:28:35 AM ) Total Marks: 1 Porter Market and sell activities relates to _____________. Select correct option: advertising, promotions managing salespersons monitoring distribution channel All of Above Market and sell’ activities give buyers a way to purchase and provide inducement for them to do so, e.g, advertising, promotions, managing salespersons, monitoring distribution channel, pricing etc. Page 152 http://vuzs.net/ Question # 6 of 10 ( Start time: 10:29:59 AM ) Total Marks: 1 Technology development relates to activities ___________. Select correct option: fields tests maintenance of procedures process improvement studies All of Above Technology development’ relates to activities which help improve product/service that a business is selling and also help improve processes in every primary activity, e.g, fields tests, maintenance of procedures, process improvement studies etc. In personal finance what is true? Select correct option: online data is imported automatically into the register. transactions maintained by the software package. vuzs account/transaction details are downloaded through the internet. All of Above In personal finance online data is imported automatically into the register of transactions maintained by the software package as the account/transaction details are downloaded through the internet. Question # 8 of 10 ( Start time: 10:31:35 AM ) Total Marks: 1 ___________ strategy is defined as concentration on a single aspect of the market. Select correct option: Focus Differentation Focus strategy is defined as concentration on a single aspect of the market. http://vuzs.net/ Question # 9 of 10 ( Start time:

Page 156: A Mega File of It for Current Quizzes

10:32:02 AM ) Total Marks: 1 Popular software packages for personal finance are ___________. Select correct option: Quicken MS Money Money 2003 All of Above Question # 10 of 10 ( Start time: 10:32:57 AM ) Total Marks: 1 Which of these is NOT a stage of knowledge discovery process? Select correct option: Transformation Data mining Pattern evaluation Process evaluation A knowledge discovery process includes data cleaning, data integration, data selection, data transformation, data mining, pattern evaluation and knowledge presentation. Total Marks: 1 Strategic business unit is a combination of a particular _____________. Select correct option: product distribution channel customer type All of Above ) In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT included: Select correct option: Buyer Accounts identifier Buyer password Address of Merchant Actual amount of money in favor of merchant 2) By adding which of the following to your website improve customer service? Select correct option: Attractive products Banner Advertisement Email links Interactive Advertising Reference: E-mails can be used to improve customer service by adding an e-mail link to your web site. Thus, you can receive your customers’ complaints through e-mails. It should be ensured that your e-business is capable of 3) Objective of any marketing strategy is to bring the customers quickly to the _________. Select correct option: Familiarity stage Exploration stage Separation stage Commitment stage

Page 157: A Mega File of It for Current Quizzes

4) Which of these is a tool that can be used to improve customer services? Select correct option: Log file analysis Cookies Data mining All 5) How many stages involve in customer loyalty model for creating good customer relationship? Select correct option: 6 5 4 3 www.vuzs.net 6) Call handling, sales tracking and Transaction support(technology / personnel) activities are included in which management system Select correct option: Customer Relationship Management system Public relation management system Inventory management system Data Base Management system 7) You read about a company X in newspaper. Your relation with company X is at familiarity stage. Select correct option: True False 8) JIT Stands for Select correct option: Just In Time Joint investigation Technique Join in Training Just In Total 9) Let us, suppose that you have hosted early your e-commerce website to sell sweets online: Your customers are acquaint with the name of your company and “DesiGhee Burfi ”. They have never interacted with your company. Which of following loyalty stages they are? Select correct option: Awareness Exploration Familiarity Commitment Reference: Awareness This is the first stage where customers recognize the name of the company or any of its products. However, they have never interacted with the company before. A company/business can achieve this level by properly advertising its brand.

Page 158: A Mega File of It for Current Quizzes

10) ET and SSL both are same with respect to security. Select correct option: True False 11) Which statement is most appropriate description of the term “Interactive-advertisement”? Select correct option: By making an advertisement message using flash animation. Putting an audio or video message on the website to attract customer. By avoiding customer’s involvement in the advertisement process. By involving the customer in the advertisement process itself. 12) Quiz Start Time: 04:28 PM Time Left 88 sec(s) Question # 1 of 10 ( Start time: 04:28:31 PM ) Total Marks: 1 Four P’s in Marketing Mix are Select correct option: Product, price, place, promotion Price, person, place, problem Place, product, property, promotion Promotion, place, product, planning 13) Quiz Start Time: 04:28 PM Time Left 87 sec(s) Question # 2 of 10 ( Start time: 04:29:03 PM ) Total Marks: 1 Let us, suppose that you have hosted your e-commerce website, When you provide “opt-in e-mail” option to your customers on your website and customer opt for it , what does it mean to receive ? Select correct option: Information about product through advertisement Information about product through e-mail Information about services available on it Information about News through e-mail. 14) Quiz Start Time: 04:28 PM Time Left 83 sec(s) Question # 3 of 10 ( Start time: 04:30:16 PM ) Total Marks: 1 How many stages involve in customer loyalty model for creating good customer relationship? Select correct option: 6 5 4 3 www.vuzs.net 15) Quiz Start Time: 04:28 PM Time Left 86 sec(s) Question # 4 of 10 ( Start time: 04:30:55 PM ) Total Marks: 1 Free-Trial advertisement means _________. Select correct option: Free coupons are placed on certain websites for customers so that they can use it for shopping. Customer is offered to use the product free of cost for a specific amount of time.

Page 159: A Mega File of It for Current Quizzes

Items bought are delivered to the customers with no delivery cost. The company didn’t had to pay for this advertisement 16) Quiz Start Time: 04:28 PM Time Left 87 sec(s) Question # 5 of 10 ( Start time: 04:31:46 PM ) Total Marks: 1 What is the right sequence of steps involved in development of customer’s relationship with the business? Select correct option: Familiarity, Awareness, Commitment, Exploration, Separation Awareness, Exploration, Familiarity, Commitment, Separation Familiarity, Awareness, Exploration, Commitment, Separation Awareness, Commitment, Familiarity, Exploration, Separation 17) Quiz Start Time: 04:28 PM Time Left 87 sec(s) Question # 6 of 10 ( Start time: 04:33:04 PM ) Total Marks: 1 SETSET(secure Electronic Transaction) was developed in Select correct option: 1995 1996 1997 1999 18) Quiz Start Time: 04:28 PM Time Left 86 sec(s) Question # 7 of 10 ( Start time: 04:34:49 PM ) Total Marks: 1 Some web retailers allow their customers to create their own product. It is called. Select correct option: One to one Marketing One to many Marketing Many to one marketing All of the above Reference: Some web retailers allow their customers to create their own product. For example there are computer companies online that allow their customers to choose component of a computer to configure their own computer according to their need. This is called one-to-one marketing. 19) Quiz Start Time: 04:28 PM Time Left 84 sec(s) Question # 8 of 10 ( Start time: 04:35:40 PM ) Total Marks: 1 Vertical Web portals are made for Select correct option: Single area Broad range of topics Wide variety of things Broad range of topics and Wide variety of things 20) Quiz Start Time: 04:28 PM Time Left 86 sec(s) Question # 9 of 10 ( Start time: 04:36:45 PM ) Total Marks: 1

Page 160: A Mega File of It for Current Quizzes

Which of following services build a strong customer loyalty towards company and its products? Select correct option: Customer services Public relations(PR) Bulletin board Exhibitions 21) Question # 1 of 10 ( Start time: 04:42:31 PM ) Total Marks: 1 To overcome the lack of physical proximity appearance problem in e-business, which technology is going to be used? Select correct option: Biometrics Video conferencing Cryptography Biometrics and Video conferencing 22) Question # 2 of 10 ( Start time: 04:44:07 PM ) Total Marks: 1 Using SSL, we type in URL as : Select correct option: www.vuzs.net https httpc httpc httpi 23) Question # 3 of 10 ( Start time: 04:45:14 PM ) Total Marks: 1 CRM stands for ............... Select correct option: Customer Relationship Management Customer Related Management Customer Resembling Management Customer Reallocation Managemen 24) Question # 4 of 10 ( Start time: 04:45:41 PM ) Total Marks: 1 SET and SSL both are same with respect to security. Select correct option: True False 25) Question # 5 of 10 ( Start time: 04:46:11 PM ) Total Marks: 1 In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT included: Select correct option: Buyer Accounts identifier Buyer password Address of Merchant Actual amount of money in favor of merchant 26) Question # 6 of 10 ( Start time: 04:46:42 PM ) Total Marks: 1 Which of following services build a strong customer loyalty towards company and its products? Select correct option: Customer services

Page 161: A Mega File of It for Current Quizzes

Public relations(PR) Bulletin board Exhibitions. 27) Question # 7 of 10 ( Start time: 04:47:35 PM ) Total Marks: 1 Which of following marketing campaigns are cheap an effective way to target potential customers? Select correct option: Sale forces E-mail Media promotion Marketing software 28) Question # 8 of 10 ( Start time: 04:48:20 PM ) Total Marks: 1 Free-Trial advertisement means _________. Select correct option: Free coupons are placed on certain websites for customers so that they can use it for shopping. Customer is offered to use the product free of cost for a specific amount of time. Items bought are delivered to the customers with no delivery cost. The company didn’t had to pay for this advertisement. 29) Question # 9 of 10 ( Start time: 04:48:59 PM ) Total Marks: 1 Which of the following option best represent “Data mining can improve response rate tremendously”? Select correct option: Direct mailing Personalization technology E-business Opt-in e-mail 30) Question # 10 of 10 ( Start time: 04:50:29 PM ) Total Marks: 1 CPM is an advertising payment mode. CPM stands for ______. Select correct option: Cost Per Month Cost Per Minute Cost Per Megabyte Cost Per Message 31) Which statement is most appropriate description of the term “Interactive-advertisement”? Select correct option: By making an advertisement message using flash animation. Putting an audio or video message on the website to attract customer. By avoiding customer’s involvement in the advertisement process. By involving the customer in the advertisement process itself. 32) What does Telemarketing means? Select correct option: Marketing through charting Marketing through telephone Marketing through emai Marketing through web casting

Page 162: A Mega File of It for Current Quizzes

33) What is the right sequence of steps involved in development of customer’s relationship with the business? Select correct option: Familiarity, Awareness, Commitment, Exploration, Separation Awareness, Exploration, Familiarity, Commitment, Separation Familiarity, Awareness, Exploration, Commitment, Separation Awareness, Commitment, Familiarity, Exploration, Separation 34) www.amzon.com as you all familiar with it. Which of the following loyalty stages its customers are: ( Who don’t know about it): Detail about amzon.com Amazon was one of the first major companies to sell goods by Internet, and was an iconic "stock in which to invest" of the late 1990s dot-com bubble. Jeff Bezos founded Amazon.com, Inc. in 1994, and launched it online in 1995. Amazon.com started as an on-line bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3 format, computer software, , etc. Amazon has established separate websites in Canada, the United Kingdom, Germany, France, China, and Japan. It also provides global shipping to certain countries for some of its products. Select correct option: Awareness Exploration Familiarity Commitment 35) Web catalogue revenue model includes Select correct option: a. Online sellers of computer b. Gifts, flowers, clothes c. Journals d. A and B 36) Track the customers online and do personalization is only possible through which of the following file(s) analysis. Select correct option: log files cookie data mining log files and cookies. Reference: Cookies can be used to track customers online. Typically, a unique ID of the customer is stored in the cookie file on the hard disk. Same ID is also stored in the database along with the record of previously purchased items by the customer. When the customer again visits the online store, cookie (having customer ID prepared against that URL) is transmitted by the browser to the server side. There, it is matched with the ID in the database. This enables the merchant side to know that a particular customer (with a known buying pattern) has come to visit again. By tracking the customer in this manner, personalized recommendations for certain items can be made to the customer in real time. 37) In the template prefix, Template<class T> What kind of variable is the parameter T? Select correct option: T must be a class. T must not be a class. T can be only types built into the C++ language. ………… (Not sure L) T can be any type, whether built into C++ or defined by the programmer.

Page 163: A Mega File of It for Current Quizzes

38) Fee for Transaction Models include Select correct option: Travel Agents and Insurance brokers Automobile Sales and event tickets Stock brokers and online banking All of the above 39) While designing a website, which of the following factors an internet marketer should pay attention to? Select correct option: Easy site navigation (i.e. Site map) Frequently asked questions (FAQs) section Privacy policy All of above 40) Question # 1 of 10 ( Start time: 05:17:27 PM ) Total Marks: 1 Four P’s in Marketing Mix are Select correct option: Product, price, place, promotion Price, person, place, problem Place, product, property, promotion Promotion, place, product, planning 41) Question # 2 of 10 ( Start time: 05:17:43 PM ) Total Marks: 1 In…………………, there is no direct contact with the end users Select correct option: B2B B2C C2C All 42) Question # 3 of 10 ( Start time: 05:18:01 PM ) Total Marks: 1 What is the right sequence of steps involved in development of customer’s relationship with the business? Select correct option: Familiarity, Awareness, Commitment, Exploration, Separation Awareness, Exploration, Familiarity, Commitment, Separation Familiarity, Awareness, Exploration, Commitment, Separation Awareness, Commitment, Familiarity, Exploration, Separation 43) Question # 4 of 10 ( Start time: 05:18:13 PM ) Total Marks: 1 Payment gateway is an organization which connects those entities to the internet which are offline. Select correct option: True False 44) Question # 5 of 10 ( Start time: 05:18:55 PM ) Total Marks: 1 Customer Loyalty model is also called Select correct option: Customer Life Cycle Customer Segmentation Customer Awareness All 45) Question # 8 of 10 ( Start time: 05:20:28 PM ) Total Marks: 1 Creation of separate experiences for customers based on their behavior is called

Page 164: A Mega File of It for Current Quizzes

Select correct option: Demographic segmentation Behavioral segmentation Geo-Graphic Segmentation None of the above 46) Question # 9 of 10 ( Start time: 05:20:53 PM ) Total Marks: 1 Which of the following option best represent “Data mining can improve response rate tremendously”? Select correct option: Direct mailing Personalization technology E-business Opt-in e-mail 47) Question # 10 of 10 ( Start time: 05:21:04 PM ) Total Marks: 1 Dividing the potential customers into groups is called Select correct option: Market Segmentation Market Promotion Market Research Market Survey 48) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 1 of 10 ( Start time: 05:24:11 PM ) Total Marks: 1 Web catalogue revenue model includes Select correct option: a. Online sellers of computer b. Gifts, flowers, clothes c. Journals d. A and B 49) Quiz Start Time: 05:24 PM Time Left 88 sec(s) Question # 2 of 10 ( Start time: 05:24:25 PM ) Total Marks: 1 Which entity does not include in SET(secure Electronic Transaction)? Select correct option: Seller Buyer Payment gateway Bank 50) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 3 of 10 ( Start time: 05:25:05 PM ) Total Marks: 1 Call handling, sales tracking and Transaction support(technology / personnel) activities are included in which management system Select correct option: Customer Relationship Management system Public relation management system Inventory management system Data Base Management system

Page 165: A Mega File of It for Current Quizzes

51) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 5 of 10 ( Start time: 05:25:32 PM ) Total Marks: 1 Do you think that "www.vu.edu.pk" can be considered as university's advertisement website? Select correct option: Yes No 51) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 6 of 10 ( Start time: 05:26:29 PM ) Total Marks: 1 Traditionally Marketer use the market segmentation(s) like Select correct option: Geo-graphic Segmentation Demographic Segmentation Psychographic Segmentation All of the above 52) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 7 of 10 ( Start time: 05:27:00 PM ) Total Marks: 1 Advertising Supported Revenue Model includes Select correct option: Yahoo portal Employment sites Newspaper Publishers All of the above 53) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 8 of 10 ( Start time: 05:27:37 PM ) Total Marks: 1 SSL stands for Select correct option: Secure Socket Layer Security Service Layer Sub Secured Length None of these 54) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 10 of 10 ( Start time: 05:28:22 PM ) Total Marks: 1 In e-business, market research is slower than offline business. Select correct option: True False 55) ipher suite is a combination of Select correct option: Cryptographic Algorithm Authentication methods

Page 166: A Mega File of It for Current Quizzes

Security layers Cryptographic Algorithm And Authentication methods 56) Question # 5 of 10 ( Start time: 05:36:53 PM ) Total Marks: 1 www.amzon.com as you all familiar with it. Which of the following loyalty stages its customers are: ( Who don’t know about it): Detail about amzon.com Amazon was one of the first major companies to sell goods by Internet, and was an iconic "stock in which to invest" of the late 1990s dot-com bubble. Jeff Bezos founded Amazon.com, Inc. in 1994, and launched it online in 1995. Amazon.com started as an on-line bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3 format, computer software, , etc. Amazon has established separate websites in Canada, the United Kingdom, Germany, France, China, and Japan. It also provides global shipping to certain countries for some of its products. Select correct option: Awareness Exploration Familiarity Commitment 57) Question # 2 of 10 ( Start time: 05:43:49 PM ) Total Marks: 1 Which of the following is cheapest and quickest marketing technique to reach distant customers? Select correct option: E-Mail marketing Telephone marketing SMS marketing Advertisement letters marketing Quiz Start Time: 05:42 PM Time Left 89 sec(s) 58) Question # 3 of 10 ( Start time: 05:44:52 PM ) Total Marks: 1 JIT concept means Select correct option: No distribution channel No warehousing Easily delivery No communication 59) Question # 6 of 10 ( Start time: 05:47:03 PM ) Total Marks: 1 Brick and Mortar refers to Select correct option: Offline business Online business Transport Building 60) Question # 7 of 10 ( Start time: 05:48:16 PM ) Total Marks: 1 How many kinds of Web Portals are? Select correct option: 3 2 5 6

Page 167: A Mega File of It for Current Quizzes

61) Quiz Start Time: 05:42 PM Time Left 88 sec(s) Question # 8 of 10 ( Start time: 05:49:06 PM ) Total Marks: 1 Press release can provide information about current events and news to, which of following, via a internet? Select correct option: Print media T.v commercial Press or media T.v program. 62) Question # 1 of 10 ( Start time: 05:53:24 PM ) Total Marks: 1 When you email at [email protected] , your email is automatically sorted and replied to your ID. Select correct option: True False 63) Question # 5 of 10 ( Start time: 05:55:05 PM ) Total Marks: 1 Visitor’s location, IP address, time of visit related information are added, in which of the following Select correct option: call handling files cookies log files Data mining files. 64) Question # 7 of 10 ( Start time: 05:55:50 PM ) Total Marks: 1 Which of following marketing campaigns are cheap an effective way to target potential customers? Select correct option: Sale forces E-mail Media promotion Marketing software 65) Question # 8 of 10 ( Start time: 05:56:06 PM ) Total Marks: 1 Suppose you are using "warid telecom" as your mobile connection and you ignor any other mobile company's advertisement because you want to keep using warid no matter what others offer. Your relationship with warid is at _____________. Select correct option: Exploration stage Commitment stage Awareness stage Separation stage 66) Question # 9 of 10 ( Start time: 05:57:03 PM ) Total Marks: 1 Dividing potential customers on the basis of variables such as social class, personality, or lifestyle is called__________. Select correct option: Demographic Segmentation Geographic Segmentation Psychographic segmentation Behavioral segmentation

Page 168: A Mega File of It for Current Quizzes

67) Question # 1 of 10 ( Start time: 06:02:08 PM ) Total Marks: 1 Do you think, vulms.vu.edu.pk is an example of E-mail marketing? Select correct option: True False 68) Which one is not an example of search engine? Select correct option: Yahoo Google Alta vista Gawab 69) Let us, suppose that you have hosted early your e-commerce website to sell sweets online: Your customers are acquaint with the name of your company and “DesiGhee Burfi ”. They have never interacted with your company. Which of following loyalty stages they are? Select correct option: Awareness Exploration Familiarity Commitment 70) Which 5th P introduced by E-business in Marketing Mix? Select correct option: Proper coverage Personalized Services Proper access Personal style 71) ETSET(secure Electronic Transaction) was developed by Select correct option: Microsoft Netscape Navigator Master Cards and VISA All of the options 72) Which of these can be used for advertisement purpose? Select correct option: Telephone Newspapers Magazines All of above 73) Question # 5 of 10 ( Start time: 06:21:36 PM ) Total Marks: 1 Which of the following is a method for conducting market research? Select correct option: Phone Interviews Questionnaires All of above

Page 169: A Mega File of It for Current Quizzes

74) Which of the following is NOT an advertising payment mode? Select correct option: Pay-per-sale Pay-per-click Pay-per-keypress Pay-per-lead 75) Question # 1 of 10 ( Start time: 06:25:05 PM ) Total Marks: 1 Advertising Subscription Mixed Revenue Model includes Select correct option: Online journals Sports information services Business week online All of the above 76) Question # 2 of 10 ( Start time: 06:25:59 PM ) Total Marks: 1 Digital Content Revenue Model Includes Select correct option: Legal information services Online journals Online Libraries All of the above 77) Question # 4 of 10 ( Start time: 06:27:06 PM ) Total Marks: 1 Which of these is a tool that can be used to improve customer services? Select correct option: Log file analysis Cookies Data mining All 78) Question # 9 of 10 ( Start time: 06:29:26 PM ) Total Marks: 1 Which of the following is an advertising payment mode? Select correct option: Pay-per-person Pay-per-page Pay-per-sale Pay-per-minute 79) Question # 10 of 10 ( Start time: 06:29:52 PM ) Total Marks: 1 If a company's marketing stretegy is focusing on customers having age less than 30, which of the following marketing segmentation technique is being used by company? Select correct option: Demographic Segmentation Geographic Segmentation Psychographic segmentation Behavioral segmentation 80) E-Business promotions are used to _______. Select correct option: Attract the customer to the product and convince him/her to buy it. Get credit card information from the customer. Complete a transaction between customer and seller. None of above

Page 170: A Mega File of It for Current Quizzes

1. Public Key of the receiver is used to-------------------. a. Decrypt the message b. Encrypt the message c. Scramble the message d. None of the mentioned options

2. Receiver applies ----------------to the received original message a. Digital signature b. Message digest c. Hash function d. None of the mentioned options

3. Symmetric key can be replaced with----------------------------.

a. Symmetric algorithms b. Pair of public and private keys c. Asymmetric key d. None of the mentioned options

4. In --------------------attack an attempt is made by the attacker to decrypt the message with every possible key.

a. Key search attack b. Cryptanalysis c. System based d. None of the mentioned options

5. Most of the electronic payment systems on internet use ------------------to ensure confidentiality and security of the payment information.

a. Quantum computing b. Cryptography c. Both of the mentioned options d. None of the mentioned options

for more contents visit

http://groups.google.com/group/vuZs

6. Simplicity and ----------------is the biggest advantage of Virtual PIN payment system.

a. Full encryption b. Dual encryption c. No encryption d. None of the mentioned options

7. In electronic checks which type of cryptography is used

a. Both symmetric and asymmetric b. Symmetric c. Asymmetric d. None of the mentioned options

8. An electronic check book device is a combination of

a. Hardware and a digital signature b. Software and information about user c. Secure hardware and software d. None of the mentioned options

Page 171: A Mega File of It for Current Quizzes

9. Which of the following is disadvantage of virtual PIN payment system? 1. Bogus purchases are possible 2. Stolen credit card number can be used 3. Only some extra copies of the information items are made in case of a fraud 4. All of the mentioned options are disadvantages of Virtual PIN payment system 10. FV stands for

a. First Virtual b. Forward Virtual c. Famous virtual d. None of the mentioned options

E-COMMERCE QUIZ 3

JANUARY 2007 http://groups.google.com/group/vuZs

Shared By China Rose ( [email protected] )

Solved By vuZs Solution Team umeed.e.( [email protected] )

1. Customers can provide their feedback or register their complaints quite conveniently in case of online business as compared to offline business True False

2. Physical proximity with items purchased and no inventory cost are disadvantages of e-business

True False

3. Online publishing is attractive because printing and distribution costs are involved in it.

True False

4. In Geographic segmentation customers are divided into groups on the basis of where they live or work

True False

5. Discount advertisements through web sites are form of e-marketing

True False

for more contents visit http://groups.google.com/group/vuZs

http://groups.google.com/group/vuZs

Visit this group

Page 172: A Mega File of It for Current Quizzes

6. Interactive advertising is a term used to refer to internet-based broadcasting of audio and video content.

True False

7. One major goal of CRM is to establish a long-lasting relationship between a company and its customers

True False

8. In case of B2B there is direct contact with the end users

True False

9. AltaVista and yahoo are examples of search engines

True False

10. Segment information is useful for companies to develop better relationship with other companies.

True False

for more contents visit http://groups.google.com/group/vuZs

E-COMMERCE QUIZ 2

DECEMBER 18, 2006 Solved By vuZs Solution Team

[email protected]

http://groups.google.com/group/vuZs

1. Public Key of the receiver is used to-------------------.

a. Decrypt the message b. Encrypt the message c. Scramble the message d. None of the mentioned options

2. Receiver applies ----------------to the received original message a. Digital signature b. Message digest

http://groups.google.com/group/vuZs

Visit this group

Page 173: A Mega File of It for Current Quizzes

c. Hash function d. None of the mentioned options

3. Symmetric key can be replaced with----------------------------.

a. Symmetric algorithms b. Pair of public and private keys c. Asymmetric key d. None of the mentioned options

4. In --------------------attack an attempt is made by the attacker to decrypt the message with every possible key.

a. Key search attack b. Cryptanalysis c. System based d. None of the mentioned options

5. Most of the electronic payment systems on internet use ------------------to ensure confidentiality and security of the payment information.

a. Quantum computing b. Cryptography c. Both of the mentioned options d. None of the mentioned options

for more contents visit http://groups.google.com/group/vuZs

6. Simplicity and ----------------is the biggest advantage of Virtual PIN payment system. a. Full encryption b. Dual encryption c. No encryption d. None of the mentioned options

7. In electronic checks which type of cryptography is used?

a. Both symmetric and asymmetric b. Symmetric c. Asymmetric d. None of the mentioned options

8. An electronic check book device is a combination of

a. Hardware and a digital signature b. Software and information about user c. Secure hardware and software d. None of the mentioned options

9. Which of the following is disadvantage of virtual PIN payment system? 1. Bogus purchases are possible 2. Stolen credit card number can be used 3. Only some extra copies of the information items are made in case of a fraud 4. All of the mentioned options are disadvantages of Virtual PIN payment system 10. FV stands for

a. First Virtual b. Forward Virtual c. Famous virtual d. None of the mentioned options

Page 174: A Mega File of It for Current Quizzes

for more contents visit SETSET(secure Electronic Transaction) was developed by Select correct option: Microsoft Netscape Navigator Master Cards and VISA All of the options SSL stands for Select correct option: Secure Socket Layer Security Service Layer Sub Secured Length None of these What is basic advantage of symmetric algorithms? Select correct option: Symmetric key does not use any encryption Symmetric algorithms are faster Symmetric algorithms are easy to understand All of above Which of these keys can be used for encryption instead of using pair of private and public keys? Select correct option: Systematic key Asymmetric key Symmetric key All of above Using SSL, we type in URL as : Select correct option: https httpc httpc httpi Reference: (Page # 121) In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT included: Select correct option: Buyer Accounts identifier Buyer password Address of Merchant Actual amount of money in favor of merchant A unique large number, generated as a result of applying hash function on a message is called ______. Select correct option: Hash message Message digest Digitally singed message Secret message Reference: (page # 103)

Page 175: A Mega File of It for Current Quizzes

FVIPSS stands for _______. Select correct option: First Virtual Internet Payment System Server First Virtual International Payment System Server First Virtual International Payment System Services First Virtual Internal Payment System Services Reference: (Page # 110) Virtual PIN Payment system is considered suitable for ________. Select correct option: Low-cost items High-cost items Very expensive items Every kind of items Which of these is a primary participant in E-Cash Payment system? Select correct option: Buyer Bank Merchant All Most of the electronic payment systems on internet use cryptography. Select correct option: True False In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last …………………withdrawals to the E-bank. Select correct option:

10

12

14

16 Reference: (page # 119) The key feature of E-Cash Payment system is

Select correct option:

Anonymity

Security

Cryptography

None of these

Reference: (page # 116) At minting stage, the client is ……………..by E-Cashbank

Select correct option:

Known

Unknown

Secret

informed

Page 176: A Mega File of It for Current Quizzes

Reference: (page. 118) Cipher suite is a combination of

Select correct option:

Cryptographic Algorithm

Authentication methods

Security layers

Cryptographic Algorithm And Authentication methods Reference: (page. 121)

SETSET(secure Electronic Transaction) was developed in Select correct option:

1995

1996

1997

1999

Reference: (page no. 122) Symmetric algorithms are faster than asymmetric. Select correct option: True False Reference: (Page # 105) Which entity does not include in SET(secure Electronic Transaction)? Select correct option: Seller Buyer Payment gateway Bank Reference: (Page # 122) A paper signature is believed to be more reliable than a digital signature. Select correct option: True False If a key is 4 bit in length, how many unique key values are possible? Select correct option: 4 8 16 32 Explanation: A key value is always in binary form. A Binary Number is made up of only 0s and 1s. So each digit has only two possibilities: 0 or 1, So now we try to check all possible values of 4. 4 bit = 0000, 0001,

0010, 0100, 1000, 0011,

Page 177: A Mega File of It for Current Quizzes

0110, 1100, 0101, 1010, 1011, 1101, 1001, 1110, 0111, 1111

Hence prove that if a key is 4 bit in length, then 16 unique key values are possible of that key. Hash function is a __________ Select correct option: Communication protocol Hardware device Encryption mechanism Log file Which of these attacks have been reported on symmetric key algorithms? Select correct option: Key Search Attacks Cryptanalysis System-Based Attacks All Reference: (Page # 108) Payment gateway is an organization which connects those entities to the internet which are offline. Select correct option: True False Reference: (Page # 122) How many elements an e-coin has? Select correct option: 1 2 3 4 Reference: (page # 116) EFT stands for _____________. Select correct option: Electronic Film Transmission Electronic Funds Transfer Electronic File Translation None of above Reference: (Page # 114) ________ is used to interpret and show contents of the webpage. Select correct option:

Page 178: A Mega File of It for Current Quizzes

HTML Notepad Browser Computer What is identified by the tag ? Select correct option: Horizontal frame Bottom Frame Top Frame Vertical Frame Which of the following is NOT an advantage of CSS? Select correct option: Define the look of your pages in one place Works on version 4 browsers or newer Easily change the look Implement same formatting each time tag is used. Links are used to connect ____________. Select correct option: Images Text Images and web documents All of the given Which of the following are correct tags used for frames, Select correct option:

Page 179: A Mega File of It for Current Quizzes

Do you think that "www.vu.edu.pk" can be considered as university's advertisement website? Select correct option: Yes No Characterization and Clustering belong to which of the following types of Data Mining? Select correct option: Predictive Selective Descriptive Additive Reference: (Page # 141) Traditionally Marketer use the market segmentation(s) like Select correct option: Geo-graphic Segmentation Demographic Segmentation Psychographic Segmentation All of the above Reference: (Page # 131) Advertising Subscription Mixed Revenue Model includes Select correct option: Online journals Sports information services Business week online All of the above OLAP stands for…………… Select correct option: Online Analytical Program Online Analytical Processing Online Application Program Online Analysis Performance Reference: (Page # 145) E-Business promotions are used to _______. Select correct option: Attract the customer to the product and convince him/her to buy it. Get credit card information from the customer. Complete a transaction between customer and seller. None of above Reference: (Page # 133) Television, radio and print media are in a (n) ……………………. Mode. Select correct option: Passive Active

Page 180: A Mega File of It for Current Quizzes

Static Dynamic Reference: (Page # 139) CRM stands for ............... Select correct option: Customer Relationship Management Customer Related Management Customer Resembling Management Customer Reallocation Management Reference: (Page # 136) Which one is not an example of search engine? Select correct option: Yahoo Google Alta vista Gawab Reference: (Page # 137) Meta tag contains: Select correct option: User information seller information web page key information bank information Reference: (Page # 138) Free-Trial advertisement means _________. Select correct option: Free coupons are placed on certain websites for customers so that they can use it for shopping. Customer is offered to use the product free of cost for a specific amount of time. Items bought are delivered to the customers with no delivery cost. The company didn’t had to pay for this advertisement. Reference: (Page # 133) In many countries, stealing and misusing of meta information for getting competitive advantage is considered as an offence known as Select correct option: Tort of Private Nuisance Tort of Tress passing Tort of passing off Defamation Reference: (Page # 138)

Page 181: A Mega File of It for Current Quizzes

If a company's marketing stretegy is focusing on customers having age less than 30, which of the following marketing segmentation technique is being used by company? Select correct option: Demographic Segmentation Geographic Segmentation Psychographic segmentation Behavioral segmentation Reference: (Page # 131) Press release can provide information about current events and news to, which of following, via internet? Select correct option: Print media T.v commercial Press or media T.v program. Reference: (Page # 135) Fee for Transaction Models include Select correct option: Travel Agents and Insurance brokers Automobile Sales and event tickets Stock brokers and online banking All of the above Reference: (Page # 130) An E-Business can't have direct feedback from the customer in B2C. Select correct option: True False Creation of separate experiences for customers based on their behavior is called Select correct option: Demographic segmentation Behavioral segmentation Geo-Graphic Segmentation None of the above Reference: (Page # 132) What is the right sequence of steps involved in development of customer’s relationship with the business? Select correct option: Familiarity, Awareness, Commitment, Exploration, Separation Awareness, Exploration, Familiarity, Commitment, Separation Familiarity, Awareness, Exploration, Commitment, Separation Awareness, Commitment, Familiarity, Exploration, Separation Reference:

Page 182: A Mega File of It for Current Quizzes

(Page # 136) At deposit stage, the serial number is ……………..by E-Cashbank ► Known ► Unknown ► Kept Secret ► Informed Reference: (Page # 118) How many kinds of Web Portals are? ► 3 ► 2 ► 5 ► 6 Explanation: There are only two kinds of web portals, one is vertical portals which provides information about single interest like online shopping sites are best example of vertical portal site, educational site is also an example of vertical portal. Second kind of web portal is horizontal web portals which provide information about everything or multiple things. Search engine is best example of horizontal web portal. Reference: (page # 129) Let us, suppose that you have hosted your e-commerce website, When you provide “opt-in e-mail” option to your customers on your website and customer opt for it , what does it mean to receive ? ► Information about product through advertisement ► Information about product through e-mail ► Information about services available on it ► Information about News through e-mail. Reference: (page # 133) Track the customers online and do personalization is only possible through which of the following file(s) analysis. ► log files ► cookie ► data mining ► log files and cookies. Reference: (page # 136) When customer life cycle is used to create different groups of customers, it is called? ► Targeting Customers ► Dynamic groups ► Customer Life Cycle Segmentation ► Group Development Reference: (page # 137)

Network addresses 128--- 191 range belongs to which of the following class networks? ► A ► B ► C ► E Reference: (page # 10)

Page 183: A Mega File of It for Current Quizzes

Which of the following property falls in HTTP? ► Stateless

► Stateful ► Temporary ► All of these

Reference: (page # 3) FSTC stands for: ► Financial Services Technology Consortium

► Financial Secrets Technology Consortium ► Final Security threats control ► First Service Technology Consortium

Reference: (page # 113) Supply chain can be broken into three parts, that is ----------------- , ----------------------- and -------------------- activities. ► Internal, external support ► Upstream, internal ,downstream ► Primary, Secondary ,R&D ► None of them Reference: (page # 155) The process of taking active role in working with suppliers to improve products and processes is called? ► Value chain management ► Supply chain management ► Supply chain management software ► Porter Model Reference: (page # 155) What is Ultimate consumer orientation? ► Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. ► Secondary Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. ► Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of supply chain. ► None of them Reference: (page # 156)

Many search engines rank the site by using a program called ► Spider

► Scorpion ► Moon ► Cobweb

Reference: (page # 138) E-commerce is a combination of three different areas of study, namely, --------, ---------------- and ---------------- ► Internal, external support, Support ► Technology, business and law/policy ► Primary, Secondary, R&D

Page 184: A Mega File of It for Current Quizzes

► Sale, purchase, feed back Reference: (page # 161)

In which type of data mining, Apriori algorithms is used? ► Classification ► Association ► Characterization ► Clustering Reference: (page # 143) EDI has the key feature(s) ► No paper work ► No human intervention ► Exchange of information takes place in seconds ► All of these Reference: (page # 147) Addresses are tied to the device itself and give no clue to it's location on a global scale. This is the characteristics of

► IP ► RIP ► MAC ► None of the given

When two or more intranets are connected to each other they form a/an ------------- . ► intranet ► internet ► extranet ► VPN Reference: (page # 2) Which attribute can be used to make a region non-clickable?

► none of the given ► target ► alt ► nohref

Reference: (page # 37) Which of the following payment mode does not require customer to pay interest to the bank on each transaction? ► Credit card ► Debit card ► Electronic check ► All of the above Reference: (page # 110) Cyber wallet can automatically assemble the correct payment and pay it too. ► True ► False

Page 185: A Mega File of It for Current Quizzes

SET doesn’t require special software on the client or merchant side. ► True ► False Which model allows the users to log-on on a website and assume the role of bidder or seller?

► Online Banking. ► Storefront Model. ► E-Learning. ► Auction Model.

Reference: (Page # 128) According to Michael Porter, “fabricating” is an example of primary activity in a strategic business unit. Identify the area in which this task is performed. ► Market and sell ► Deliver’ activities relate to storage ► Purchase materials and supplies ► Manufacture product or create service Reference: (Page # 152) Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Is it?

► True ► False

In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, ---------------- and ----------

► Acceptance and consideration ► Acceptance and Rejection ► Approval and consideration ► None

Reference: (page # 178) In online environment acceptances may be issued by an imposter/cheater that has authority to bind the online business

► True ► False

#00ff00 in HTML indicates ► Pure green color ► Pure blue color ► Pure red color ► Pure yellow color Reference: (Page # 23) Virtual PIN Payment System requires both merchant and buyer to register with _______________. ► Auto Clearing House (ACH) ► First Virtual (FV) ► DSS (Digital Signature Standard) ► DES (Data Encryption Standard) Reference: (Page # 110) Classification and Association belong to which of the following types of Data Mining?

Page 186: A Mega File of It for Current Quizzes

► Selective ► Predictive

► Descriptive ► Additive

Reference: (Page # 141) Which one of the followings is an example of Banner advertising? Select correct option: Branding Affiliate programs Partnership All of these Reference: (Page # 138) CPM is an advertising payment mode. CPM stands for ________. Select correct option: Cost Per Month Cost Per Minute Cost Per Megabyte Cost Per Message Reference: (Page # 134) Which one is not an example of search engine? Select correct option: Yahoo Google Alta vista Gawab Reference: (Page # 137) In which type of approach, we further dig the data for retrieving information from data warehouse? Select correct option: Slice Dice Drill down Roll up Reference: (Page # 146) Let us, suppose that you have hosted your e-commerce website, Promotion messages can be sent when potential client is Select correct option: online offline both online and offline visiting head office Reference: (Page # 133) Digital Content Revenue Model Includes Select correct option: Legal information services Online journals Online Libraries All of the above Reference: (Page # 130) Which of these is a tool that can be used to improve customer services?

Page 187: A Mega File of It for Current Quizzes

Select correct option: Log file analysis Cookies Data mining All Reference: (Page # 136) What does Telemarketing means? Select correct option: Marketing through charting Marketing through telephone Marketing through emai Marketing through web casting Reference: (Page # 133) In which type of data mining, ID3 algorithms is used? Select correct option: Classification Association Characterization Clustering Reference: (Page # 141) Some web retailers allow their customers to create their own product. It is called. Select correct option: One to one Marketing One to many Marketing Many to one marketing All of the above Reference: (Page # 132) Free-Trial advertisement means ___________. Select correct option: Free coupons are placed on certain websites for customers so that they can use it for shopping. Customer is offered to use the product free of cost for a specific amount of time. Items bought are delivered to the customers with no delivery cost. The company didn’t had to pay for this advertisement Reference: (Page # 133) Total Marks: 1

The length of a message digest is ________.

Select correct option:

32 to 64 bits

64 to 128 bits

128 to 256 bits

256 to 512 bit

Page 188: A Mega File of It for Current Quizzes

Reference: (Page # 103) Key version represents public key by

Select correct option:

Buyer

Seller

E-Bank

Certification Authority

Reference: (Page # 116) The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the ___________.

Select correct option:

Bank

Merchant

Client

None

Reference: (Page # 116) ACH is a centralized system used by different interconnected banks for clearing payment requests. Select correct option: True False Centralized Account Payment Model uses unique _______ of users as their account identifier. Select correct option: Residence address E-mail address Office address None Reference: (Page # 113) SET and SSL both are same with respect to security. Select correct option: True False

Page 189: A Mega File of It for Current Quizzes

What are the security threats in VPS? Select correct option: a. Email hacking b. Credit card number stolen c. Missing of delivery d. A and B What is function of Cyberwallet? Select correct option: Store coins Manage Coins Record transactions All of above SET and SSL both are same with respect to security. Select correct option: True False Basic difference between Virtual PIN Payment System and Electronic Check is _____. Select correct option: Encryption Registration with bank No. of participants There is no difference between them You are free to distribute and use it. In case you wanted to host or re-distribute it. Please don’t remove the links of group and website. Question No: 1 Key version represents public key by Buyer Seller E-Bank Certification Authority Ref: PAGE # 116 E-cash Coins The currency used in this payment system is called an e-cash coin or simply coin. A coin consists of three elements or parts - serial #, key version and serial no. signed by the secret or private key of a certain denomination of the e-cash bank. In other words, a coin of one dollar would consist of the following: Coin = Serial#, key version, {Serial #} SK bank’s $1 key Each coin has a unique value, partly minted by the client and partly by the e-cash bank. Question No: 2 SSL stands for Secure Socket Layer Security Service Layer Sub Secured Length None of these Ref: PAGE # 121 SECURE SOCKET LAYER (SSL) SSL is a protocol developed by Netscape Communications. SSL is built into many browsers. It operates at the TCP/IP layer of the OSI model, and uses a combination of symmetric and asymmetric cryptography. Question No: 3 How many kinds of Web Portals are?

Page 190: A Mega File of It for Current Quizzes

3 2 5 6 Ref: PAGE # 129 Portal Model Portals are the web sites which provide chance to the visitors to find almost everything in one place. Horizontal portals provide information about a very broad range of topics. Search engine is the example of a horizontal portal. Vertical portals provide information pertaining to a single area of interest. Community Portals such as those related to medical or legal profession are the examples of a vertical portal. Question No: 4 Brick and Mortar refers to Offline business Online business Transport Building Ref: PAGE # 129 Brick-and-Mortar vs. Click-and-Mortar businesses These two terms refer to the offline and the online businesses, respectively. Where a company is doing its business both online and offline, there is often the problem of lack of proper integration between the two different channels of business. Note: Offline business = Brick-and-Mortar And Online Business = Click-and-Mortar businesses Question No: 5 Digital Content Revenue Model Includes Legal information services Online journals Online Libraries All of the above Ref: PAGE # 130 Digital Content Revenue Model Web serves as a very efficient distribution mechanism of content. Therefore, one finds many e-businesses that offer different types of information services such as legal information, corporate information, government information, news and resources for academic libraries etc. These services can be customized by an e-business for different firm sizes depending upon their needs and usage pattern. Normally, a customer has to subscribe to such services by paying certain amount as subscription fee. This fee becomes the main source of generating revenue for the e-business. Instead of subscription fee, a credit card charge option can be made available for infrequent users. Online journals, newspapers, libraries fall under this category Question No: 6 Which of following marketing campaigns are cheap an effective way to target potential customers? Sale forces E-mail Media promotion Marketing software Ref: PAGE # 133 E-MAIL MARKETING E-mail marketing campaigns are cheap and effective way to target potential customers. Question No: 7

Page 191: A Mega File of It for Current Quizzes

What does Telemarketing means? Marketing through charting Marketing through telephone Marketing through email Marketing through web casting Ref: PAGE # 133 Telemarketing Live interaction through telephone Question No: 8 Which of following services build a strong customer loyalty towards company and its products? Customer services Public relations(PR) Bulletin board Exhibitions. Ref: PAGE # 136 One major goal of CRM is to establish a long-lasting relationship between a company and its customers. Good customer services can help in building a sense of loyalty towards company and its products or services. Question No: 9 Track the customers online and do personalization is only possible through which of the following file(s) analysis. log files cookie data mining log files and cookies. Ref: PAGE # 136 You know that cookies allow e-commerce sites to record visitor behavior. They can be used to track customers online and do personalization. Many customers do not know that their information is being collected and used by the e-business site. Question No: 10 Which of the following is true for Class A: Network 01 byte and 03 hosts Network 02 bytes and 02 hosts Network 03 bytes and 01 host None of these Ref: PAGE # 10 By rule, in class A networks first byte would refer to the network address and the remaining three bytes to the host machines on that network providing a very large network.

http://vuzs.net/ http://groups.google.com/group/vuZs

Question No: 11 What is the correct HTML for making a text input field? <textinput type="text"> <input type="text"> <input type="textfield"> <textfield>

Page 192: A Mega File of It for Current Quizzes

Ref: PAGE # 27 First Name: <INPUT TYPE="TEXT" NAME="First"> Question No: 12

IIS stands for:

International Information Service Internet Information Server Internet Information standards All of these Ref: PAGE# 85 ASP We can discuss ASP a little more in detail. It runs best on IIS (Internet Information Server) which is freely available with Windows NT and Windows 2000. Question No: 13 The payer and the payee are issued digital certificates in ………… standard format by their respective banks. X. 509 F. 609 L.8999 N.586 Ref: PAGE # 101 Digital certificates These are the certificates in electronic form which establish whether or not a public key belongs to the purported owner. A digital certificate at least comprises a public key, certification information (name, ID etc.) and electronic signatures of a certification authority. Digital certificates are prepared according to a generally accepted format called X.509 standard format. Question No: 14

What is a E-Cash wallet ? Hardware Agent Software All of the above Ref: PAGE # 116 Buyers and merchants, both, have accounts in the E-cash bank. Buyers withdraw coins against their account and store them in e-cash wallet software (Cyber wallet) on their computer. Cyber wallet stores and manages coins and records every transaction. Question No: 15

An E-cash coin consists of element (s) like: Serial # provided by client Key version Serial# signed by E-cash bank All of the above Ref: PAGE # 116 Coin = Serial#, key version, {Serial #} SK bank’s $1 key Question No: 16 What is Ultimate consumer orientation? Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. Secondary Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain.

Page 193: A Mega File of It for Current Quizzes

Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of supply chain. None of them Ref: PAGE # 156 Supply chain and ultimate consumer orientation: Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. This approach is called ultimate consumer orientation. In 1995, a company dealing in the business of production of tiers in America adopted a different approach by shifting its focus on tire dealers from ultimate customers. Question No: 17 Customer data can be gathered and analyzing it customers can be served in a better Manner according to their needs, which is best option? Customization Customer orientation Customer satisfaction Focus Ref: PAGE # 157 Customization: With the help of EC, customer data can be gathered and analyzing it customers can be served in a better manner according to their needs. One can, thus, implement differentiation and focus strategy. Question No: 18 A company ABC web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death in that culture. Which is the international barrier it is having? Culture Language Lack of trust Infrastructure Ref: PAGE # 162 A web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death in that culture. Question No: 19 Exclusive right granted by law to make, use and sell an invention. What is called? Parasites Trade mark Patent infringement Copyright Ref: PAGE # 181 Patent infringement: A patent is an exclusive right granted by law to make, use and sell an invention. In order to be patentable, the invention must be unique, genuine, and useful according to the prevalent technological standards. Question No: 20 Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act. Which legal issue arises due to such acts? Cyber Crimes

Page 194: A Mega File of It for Current Quizzes

Online Defamation Cyber squatting None Ref: PAGE # 182 Online Defamation: A defamatory statement is a false statement that injures the reputation of on another person or company. If a statement injures the reputation of a product or service instead of a person, it is called product disparagement. Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act.

http://vuzs.net/ http://groups.google.com/group/vuZs

Question No: 21 How can you reference part of a string? text.substr(5,6); text.part(5,6) text.piece(5,6) text.split(5,6); Ref: PAGE # 70 String Object: In the following example, ‘str’ and ‘myArray’ are the instances of string and array objects, respectively. The size of the array is 10. Here, charAt() is the function/method of string object. So, charAt(3) would provide the value of the element at the index three. Different other functions of string object have also been used. In the example, str.Split(' ') splits the string on the basis of blank space. After splitting, we assign parts of the string as values for the array. Question No: 22 One Tier Architecture __________. Select correct option: The entire processing may take place at individual terminal. The entire processing may take place at different terminal. The entire processing may not take place at individual terminal. None of Above Ref: PAGE # 88 Client server architecture: Note that we may have different tiers in client server architecture depending on where the processing of data takes place. In 1-tier architecture, the entire processing takes place at a single place/zone. Question No: 23 Following are the names of some well known e-commerce software, EXCEPT ----------- . Intershop IBM's WebSphere Commerce Professional Edition Microsoft Commerce Server 2002 Microsoft SQL Server 2005 Ref: PAGE # 93 E-commerce Software: Following are the names of some well-known e-commerce software: Intershop Enfinity IBM’s WebSphere Commerce Professional Edition Microsoft Commerce Server 2002 Question No: 24 In Style Sheets, How do you change the font of an element? font-face: font:

Page 195: A Mega File of It for Current Quizzes

font-family: font-style: Ref: PAGE # 43 Font family styles <HTML> <HEAD> <TITLE>Style Sheets: Font Families</TITLE> <STYLE> Question No: 25 A paper signature is believed to be more reliable than a digital signature. ► True ► False Ref: PAGE # 106 A digital or electronic signature is believed to be more reliable as compared to paper signatures because it is not ordinarily possible to copy or forge an electronic/digital signature. But, that is very much possible in case of paper signatures. Question No: 26 The serial # generated by the cyber wallet gets multiplied by blinding factor ‘r’ which is known only to the ___________. Client Bank Merchant None of above Ref: PAGE # 116 Cyberwallet generates a serial # and a blinding factor ‘r’. This blinding factor “r” is only known to the client. It is used in the following mathematical expression which is sent to the bank for signatures. Serial # . re2 (mod m) Question No: 27 SET doesn’t require special software on the client or merchant side. True False Ref: PAGE # 122 Merchants must have special SET software to process transactions. Customers must have digital wallet software that stores certificates and card information. Question No: 28 The result of OLAP is displayed in the form of a __________. Data square Data Triangle Data cube Data circle Ref: PAGE # 145 Online Analytical Processing (OLAP): OLAP makes use of background knowledge regarding the domain of the data being studied in order to allow the presentation of data at different levels of abstraction. It is different form data mining in the sense that it does not provide any patterns for making predictions; rather the information stored in databases can be presented/ viewed in a convenient format in case of OLAP at different levels that facilitates decision makers or managers. The result of OLAP is displayed in the form of a data cube Question No: 29 Classification and Association belong to which of the following types of Data Mining? Selective Predictive

Page 196: A Mega File of It for Current Quizzes

Descriptive Additive Ref: PAGE # 145 Online Analytical Processing (OLAP): OLAP makes use of background knowledge regarding the domain of the data being studied in order to allow the presentation of data at different levels of abstraction. It is different form data mining in the sense that it does not provide any patterns for making predictions Question No: 30

Which one of the following algorithms does not include in public key algorithms? DSS RSA Elliptic Curves RC4 Ref: PAGE # 108 Public Key Algorithms: Following is the list some popular public key algorithms:

• DSS – Digital Signature Standard based on DSA (Digital Standard Algorithm) – key length is between 512-1024 bits

• RSA • Elliptic Curves

http://vuzs.net/ http://groups.google.com/group/vuZs

Question No: 31 Four P’s in Marketing Mix are: Product, price, place, promotion (Sure) Price, person, place, problem Place, product, property, promotion Promotion, place, product, planning Question No: 32 JIT Stands for Just In Time Joint investigation Technique Join in Training Just In Total Ref: PAGE # 147 For instance, packaging material should only be ordered for just in time (JIT) delivery Question No: 33 Advertising Supported Revenue Model includes Yahoo portal Employment sites Newspaper Publishers All of the above Ref: PAGE # 130 Advertising-Supported Revenue Model: In this model service/information is provided free of any charge to certain audience and the advertising revenue is sufficient to support the operation of the business and its cost. For example, Yahoo portal provides useful information and a search engine free of cost, but earns revenue through advertisements on its portal web site to bear the operational cost.

Page 197: A Mega File of It for Current Quizzes

Question No: 34 Which of the following is true for Class A: Network 01 byte and 03 hosts Network 02 bytes and 02 hosts Network 03 bytes and 01 host None of these Ref: PAGE # 10 By rule, in class A networks first byte would refer to the network address and the remaining three bytes to the host machines on that network providing a very large network. Question No: 35 Which of the following needs human action to execute? Virus Worm Trojan Horse All of these Ref: PAGE # 94 Viruses, on the other hand, need to be activated through a human action. Question No: 36 In the digital signature technique, the sender of the message uses ________ to create cipher text His or Her own symmetric key His or her own private key His or her own public key The receiver’s private key Ref: PAGE # 103 Then the sender adds his private key in the obtained message digest to create his digital signatures. This digitally singed message is received by the receiver, who applies the pubic key of the sender to decrypt the digital signature and reveal the message digest. Question No: 37 PIN stands for: Payment investigation Number Password Identification Number Personal Identification Number Personal Identification Numeric Ref: http://www.wsu.edu/~brians/errors/pin.html Those who object to “PIN number” on the grounds that the N in “PIN” stands for “number” in the phrase “personal identification number” are quite right, but it may be difficult to get people to say anything else. “PIN” was invented to meet the objection that a “password” consisting of nothing but numbers is not a word Question No: 38 An electronic check contains a(n)………………… to the payer’s bank to make a specified payment to the payee Serial# Private key Instruction All of the above Ref: PAGE # 113 Electronic Checks:

Page 198: A Mega File of It for Current Quizzes

Financial Services Technology Consortium (FSTC) is a group of U.S banks, research agencies and government organizations formed in 1993. It has introduced the concept of electronic checks. An electronic check contains an instruction to the payer’s bank to make a specified payment to a payee. Question No: 40 It is the ability to sell the goods or provide the service at a price that is lower than that of competitors, and thus attract more customers. What is called? Cost leadership Price leadership Focus Differentiation Ref: PAGE # 157 Cost leadership: It is the ability to sell the goods or provide the service at a price that is lower than that of competitors, and thus attract more customers.

http://vuzs.net/ http://groups.google.com/group/vuZs

Question No: 41 E-commerce is a combination of three different areas of study, namely, --------, ---------------- and ---------------- Internal, external support, Support Technology, business and law/policy Primary, Secondary, R&D Sale, purchase, feed back Ref: PAGE # 161 E-commerce is a combination of three different areas of study, namely, technology, business and law/policy. We have studied the technology and business side of e-commerce to a reasonably good extent. Question No: 42 GM Celebes manufacturing electronic goods and FryChips co selling French fries. Under the traditional trade mark law both these companies can have the same trade mark/trade name such as ‘frys’. The problem arises when both apply for the registration of a domain name containing the word ‘frys’. Here, both are legitimate claimants of this domain name but due to the element of uniqueness of domain names only one of them can be assigned the desired domain name. Which legal issue arises in this situation? Domain name conflict Cyber squatting Concurrent use None Ref: PAGE # 181 Concurrent use This problem arises when two organizations have apparently legitimate claim to use the same domain name but cannot do so due to the uniqueness of domain names. Suppose, there is a company manufacturing electronic goods and another company selling french fries. Under the traditional trade mark law both these companies can have the same trade mark/trade name such as ‘frys’ . The problem arises when both apply for the registration of a domain name containing the word ‘frys’ . Here, both are legitimate claimants of this domain name but due to the element of uniqueness of domain names only one of them can be assigned the desired domain name. Question No: 43 Which type of Data Mining contains the elements as Support and confidence? Classification Association Characterization

Page 199: A Mega File of It for Current Quizzes

Clustering Ref: PAGE # 144 CONFIDENCE AND SUPPORT: There are two terms/measures used in association, that is, support and confidence. Confidence’ is a measure of how often the relationship holds true e.g, what percentage of time did people who bought milk also bought eggs. Question No: 44 OLAP stands for…………… Online Analytical Program Online Analytical Processing Online Application Program Online Analysis Performance Ref: PAGE # 145 Online Analytical Processing (OLAP): OLAP makes use of background knowledge regarding the domain of the data being studied in order to allow the presentation of data at different levels of abstraction. Question No: 45 Support activities in Value Chain model includes Finance and Administration Human Resources Technology Development All of these Ref: PAGE # 152 Question No: 46 Which of the following is NOT processed on the client side? Cookies JavaScript CGI scripts Applets Ref: PAGE # 82 CGI scripts: Term Common Gateway Interface (CGI) is defined as a standard method/protocol that allows data from forms to be used by programs on the server. Question No: 47 Due to which characteristics, ATM network are covered under E-commerce ? Exchange of information through computer networks (Doubt) Internet. Exchanging of products, services. None of the above. Basically ATM works to Exchange of information through computer networks so in my point of view it will held in definition of e-commerce. Ref: PAGE # 2 E-Commerce definition: Electronic commerce is an emerging concept that describes the process of buying and selling or exchanging of products, services and information via computer networks including the internet Question No: 48 SET is better than SSL.

Page 200: A Mega File of It for Current Quizzes

True False Ref: PAGE # 122 Secure Electronic Transaction (SET): The drawback in SSL that the credit card/debit card information remains with the merchant led to the development of a more sophisticated protocol called SET. Question No: 49 Dividing market, with respect to people having income level greater than Rs 30000, is geographic segmentation. True. False. Ref: PAGE # 131 Segments are defined in terms of demographic characteristics such as age, gender, marital status, income level Question No: 50 Which of the following is NOT an identified behavioral mode of customers on the web? Browsers Buyers Shoppers Seller Ref: PAGE # 132 Behavioral segmentation Creation of separate experiences for customers based on their behavior is called behavioral segmentation. Three identified behavioral modes of the customers on the web are: Browsers – customers who just browse through the site with no intention of buying Buyers – customers who are ready to buy right away Shoppers – customers who are motivated to buy but want more information

http://vuzs.net/ http://groups.google.com/group/vuZs

Question No: 51 Which of these is a way of conducting market research? Phone. Interviews. Questionnaires. All of above. Ref: PAGE # 132 Marketing Research: It consists of interviews, paper and phone surveys, questionnaires, findings based on previous investigations etc. to find strengths and weaknesses of your business and the business of your competitors. It also includes the analysis of opportunities and threats to your business. Question No: 52 Which of these is NOT a stage of knowledge discovery process? Transformation Data mining Pattern evaluation Process evaluation Ref: PAGE # 140 Knowledge discovery:

Page 201: A Mega File of It for Current Quizzes

A knowledge discovery process includes data cleaning, data integration, data selection, data transformation, data mining, pattern evaluation and knowledge presentation. Question No: 53 According to Michael Porter, “test marketing” is an example of primary activity in a strategic business unit. Identify the area in which this task is performed. Design Market and sell Deliver’ activities relate to storage Purchase materials and supplies Ref: PAGE # 152 Design’ activities take a product form concept stage to manufacturing stage. They include concept research, engineering, drawings preparation, test marketing etc. Question No: 54 Electronic banking is also known as __________. Cyber banking Virtual banking Online banking All of above Ref: PAGE # 150 Electronic Banking: Electronic banking, also known as cyber banking, virtual banking, home banking and online banking, includes various banking activities conducted from home, business, or on the road, instead of at a physical bank location. Question No: 55 Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Is it? True False Ref: PAGE # 176 Civil law and criminal law. Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Civil wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general. Question No: 56 In datalink layer, data packets are placed inside Data frames Data boxes Data streams None of these Ref: PAGE # 6 Data link layer: It places data packets into data frames. Network Interface Card Drivers/Protocols operate at this layer. It is used to identify MAC or hardware address of computer machines. Question No: 57

At deposit stage, the serial number is ……………..by E-Cashbank Known Unknown Kept Secret

Page 202: A Mega File of It for Current Quizzes

Informed Ref: PAGE # 118 Deposit Stage Serial no. (Known) Client (unknown) Question No: 58 Let us, suppose that you have hosted your e-commerce website, When you provide “opt-in e-mail” option to your customers on your website and customer opt for it , what does it mean to receive ? Information about product through advertisement Information about product through e-mail Information about services available on it Information about News through e-mail. Ref: PAGE # 133 Internet mailing lists can also be conveniently used to send targeted personalized emails. You can also provide the “opt-in e-mail” option to your customers on your web site. If they opt for it, this means that they want to receive through email any product information, offers or promotions etc. Question No: 59

Track the customers online and do personalization is only possible through which of the following file(s) analysis. log files cookie data mining log files and cookies. Ref: PAGE # 136 You know that cookies allow e-commerce sites to record visitor behavior. They can be used to track customers online and do personalization. Many customers do not know that their information is being collected and used by the e-business site. Thus, informational privacy rights of customers can be breached in cases where cookies are used. Question No: 60 When customer life cycle is used to create different groups of customers, it is called? Targeting Customers Dynamic groups Customer Life Cycle Segmentation Group Development Ref: PAGE #137 Life Cycle Segmentation: These five stages are also called customer life cycle. Using them to create groups of customers is called customer life-cycle segmentation. Segment information is useful for companies to develop better relationship with the customers. Companies, thus, know about their customers and their level of relationship with the company, and can customize their product/service.

http://vuzs.net/ http://groups.google.com/group/vuZs

Question No: 61 Network addresses 128--- 191 range belongs to which of the following class networks? A B C E Ref: PAGE # 11

Page 203: A Mega File of It for Current Quizzes

Examples Class A: 255.0.0.0 Class B: 255.255.0.0 Class C: 255.255.255.0 NOTE: in McQ 128--- 191 is not written after one dot it means they are separate from each other so it belong to A class. Question No: 62 Which of the following property falls in HTTP? Stateless Stateful Temporary All of these Ref: PAGE # 3 HTTP is stateless because in the fourth step the server breaks the connection. We can say, therefore:

• Each operation or transaction makes a new connection • Each operation is unaware of any other connection • Each click is a new connection

Question No: 63

FSTC stands for: Financial Services Technology Consortium Financial Secrets Technology Consortium Final Security threats control First Service Technology Consortium Ref: PAGE # 113 Financial Services Technology Consortium (FSTC) is a group of U.S banks, research agencies and government organizations formed in 1993. It has introduced the concept of electronic checks. An electronic check contains an instruction to the payer’s bank to make a specified payment to a payee. Question No: 64 Supply chain can be broken into three parts, that is ----------------- , ----------------------- and -------------------- activities. Internal, external support Upstream, internal ,downstream Primary, Secondary, R&D None of them Ref: PAGE # 155 SUPPLY CHAIN: Supply chain includes all the activities associated with the flow and transformation of goods from the raw materials stage all the way to the end user. Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities…

• Upstream activities relate to materials/services or the input from suppliers • Internal activities relate to manufacturing and packaging of goods • Downstream activities relate to distribution and sale of goods to distributors/customers

Question No: 65 The process of taking active role in working with suppliers to improve products and processes is called? Value chain management Supply chain management Supply chain management software Porter Model

Page 204: A Mega File of It for Current Quizzes

Ref: PAGE # 155 Supply chain management: Engaging and negotiating with suppliers can be extremely beneficial. The process of taking active role in working with suppliers to improve products and processes is called supply chain management. Question No: 66 Many search engines rank the site by using a program called Spider Scorpion Moon Cobweb Ref: PAGE # 138 Some search engines search the entire internet each time. Many search engines rank the site by using a program called ‘spider’ which inspects the site before ranking. Question No: 67 In which type of data mining, Apriori algorithms is used? Classification Association Characterization Clustering Ref: PAGE # 143 Association: Association analysis is the discovery of association rules showing attribute-value conditions that occur frequently together in a given set of data. It is widely used for market basket analysis. For example, where we are recording sales of a big shopping store in databases, then by applying association mining we may discover that certain items have a strong bondage or affinity with each other such that when one item is purchased the other is purchased, too. Apriori algorithm is used for association mining. Question No: 68 EDI has the key feature(s) No paper work No human intervention Exchange of information takes place in seconds All of these Ref: PAGE # 147 EDI include:

• No paper work • No human intervention • Exchange of information takes place in seconds

Question No: 69 Addresses are tied to the device itself and give no clue to it's location on a global scale. This is the characteristics of IP RIP MAC None of the given Ref: PAGE # 13 Media access control (MAC) address: Data to be delivered on a network has to be converted first into serial transmission. This is done through a device called Network Interface Card (NIC) that must be installed in a computer on the network. NIC has also got printed on it a 48 bits unique address called the MAC or hardware address of the computer machine. In other words, it consists of 12 hexadecimal characters and can have different format as shown Below: 090017A9B2EF 09:00:17:A9:B2:EF

Page 205: A Mega File of It for Current Quizzes

09-00-17-A9-B2-EF Whereas the IP address of a computer may change from time to time, its MAC address would remain the same unless the existing NIC is replaced with another. It can easily be inferred that there are 248 unique MAC addresses possible (which is an unimaginably high number). An organization called Institute of Electrical and Electronic Engineers (IEEE) administers the allocation of MAC addresses, worldwide. It ensures that there is no duplication of MAC addresses by the manufacturers of NICs. Question No: 70 When two or more intranets are connected to each other they form a/an ------------- . intranet internet extranet VPN Ref: PAGE # 98 VPN is the example of an extranet. You know that when two or more intranets are connected to each other they form an extranet. A manufacturing company thus can be connected to its suppliers of raw material and its distributors through VPN.

http://vuzs.net/ http://groups.google.com/group/vuZs

Question No: 71 ( Marks: 1 ) - Please choose one Which attribute can be used to make a region non-clickable? none of the given target alt nohref Ref: PAGE # 37 <Area> tag attributes: ‘alt’ attribute is used to label the clickable region. ‘Target’ attribute can be used to display result in a given frame. ‘Nohref’ attribute can be used to make a region non-clickable. For example, <Area shape=“circle” coords=“70,45,25” href=“a.htm” alt=“a.htm” target=“upper” nohref> Question No: 72 Which of the following payment mode does not require customer to pay interest to the bank on each transaction? Credit card Debit card Electronic check All of the above Ref: PAGE # 110 In case of a credit card the issuer bank charges interest from the client at a specified rate on the amount lent. On the other hand, in case of a debit card no such interest is payable since the customer uses his/her own money in that case. Question No: 73 Cyber wallet can automatically assemble the correct payment and pay it too. True False Ref: PAGE # 118 E-cash Purchase: Having received an order the merchant sends a payment request to the client in the following format: Payreq={currency,amount,timestamp,merchant_bank ID, merchant_accID, order description}

Page 206: A Mega File of It for Current Quizzes

Cyber wallet automatically assembles the correct payment amount and pays. Question No: 74

SET doesn’t require special software on the client or merchant side. True False Ref: PAGE # 122 Merchants must have special SET software to process transactions. Customers must have digital wallet software that stores certificates and card information. Question No: 75 Which model allows the users to log-on on a website and assume the role of bidder or seller? Online Banking. Storefront Model. E-Learning. Auction Model Ref: PAGE # 128 Auction Model: In this model there are auction sites to which the users can log-on and assume the role of a bidder or seller. Question No: 76 Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Is it? True False Ref: PAGE # 176 Civil law and criminal law. Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Civil wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general. Question No: 77 In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, ---------------- and ---------- Acceptance and consideration Acceptance and Rejection Approval and consideration None Ref: PAGE # 178 Online contracts: In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, acceptance and consideration. The same three elements must also be present in case of a valid online contract. Question No: 78 In online environment acceptances may be issued by an imposter/cheater that has authority to bind the online business True False Ref: PAGE # 178

Page 207: A Mega File of It for Current Quizzes

In online environment acceptances may be issued by an imposter/cheater that does not have authority to bind the online business. To overcome this problem companies and individuals can use digital signatures to establish identity in online transactions. Question No: 79 #00ff00 in HTML indicates Pure green color Pure blue color Pure red color Pure yellow color Ref: PAGE # 23 <BODY bgcolor=“Green” text=“white” link=“red”> Instead of giving the color name as value of ‘bgcolor’ one can also provide value in terms of a six digit code based on hexadecimal numbers called RGB values, e.g, #00FF00 refers to pure green color. Question No: 80 Virtual PIN Payment System requires both merchant and buyer to register with _______________. Auto Clearing House (ACH) First Virtual (FV) DSS (Digital Signature Standard) DES (Data Encryption Standard) Ref: PAGE # 110 Both merchants and buyers are required to register with First Virtual (FV) . A buyer registering with FV forwards his or her credit card details and email address to FV and in exchange receives a pass phrase called, Virtual PIN.

http://vuzs.net/ http://groups.google.com/group/vuZs

Question No: 81 Identity that machine which services the internet request? Web Client Web Server Browser Mozilla Ref: PAGE # 2 Basic Definitions: Web client- machine that initiates internet request Web server – machine that services internet request Browser - software at the client side to interact with web data Intranet – an internal network of computers confined to a single place Extranet – when two or more intranets are connected with each other, they form an Extranet – e.g, Virtual Private Network Internet – a global network of networks is defined as internet Question No: 82 What does ETO stands for Electronic Transactions Ordinance Electric Transport ordinance Electronic Treaty Organization All Ref: PAGE # 163 Electronic Transactions Ordinance, 2002 (ETO):

Page 208: A Mega File of It for Current Quizzes

ETO is the law introduced in 2002 which extends to the whole of Pakistan. It basically provides legal recognition to documents in electronic form and to electronic signatures. To understand this law, it would be useful to revise the concept related to the working of digital signature technology (refer to Lecture no. 23). We shall look at salient provisions/features of this law as it directly deals with e commerce in Pakistan. Section 2 of the ETO defines different terms used in it. For convenience these terms have been reproduced here (you do not need to memorize these for exam). Question No: 83 Which one of the following algorithms does not include in symmetric key algorithms DES RC2 RC4 RSA Ref: PAGE # 108 Following is the list of some popular symmetric key algorithms: DES (Data Encryption Standard) – 56 bits IDEA (International Data Encryption Algorithm (IDEA) – 128 bits RC2 – (block cipher) 1-2048 bits RC4 (stream cipher) – 1-2048 bits Rinjdael – 128-256 bits Question No: 84 EFT stands for Electronic Funds Transfer Electronic Finance Transfer Easy Funds Transfer Early Funds Transaction Ref: PAGE # 114 EFT stands for ‘electronic funds transfer’. Question No: 85 Television, radio and print media are in a (n) ……………………. Mode Passive Active Static Dynamic Ref: PAGE # 139 Emotional branding vs. rational branding: In case of television, radio or print media people are normally in a passive mode. To a greater extent they do not control the communication channel and thus have to listen or view the advertisement about a brand. Question No: 86 Cipher suite is a combination of Cryptographic Algorithm Authentication methods Security layers Cryptographic Algorithm And Authentication methods Ref: PAGE # 121 SSL Handshake: SSL supports a variety of encryption algorithm and authentication methods. The combination of algorithms and methods is called a cipher suite. When a client connects to an SSL server, the SSL handshake begins, which means that the two negotiate a cipher suite selecting the strongest suite the two have in common.

Page 209: A Mega File of It for Current Quizzes

Question No: 87 Which device uses the MAC address Switch Router Repeater None of these Ref: PAGE # 15 & 16 A switch would read the MAC address on a data packet and match it with the list of MAC addresses of the user machines contained in it. It then sends data packets only to that machine on a VLAN to which these packets relate. But on PAGE 16 about router see below line Routers: Routers use a combination of hardware and software to forward data packets to their destination on the internet. They are more efficient and sophisticated than bridges and switches. So my answer is Router Question No: 88 Choose the correct HTML code line which left-align the content inside a tablecell. <td leftalign> <td valign="left"> <td align="left"> <tdleft> Ref: PAGE # 26 Attributes for <TD> tag: Width - <td width=“50%”> specifies width of a cell with reference to the table width. Align - <td align=“center”> is used to align the text in a cell accordingly (you can also use left and right as values of ‘align’) . Valign- <td valign=“top”> is used to vertically align the text in a cell (you can also use bottom or middle as values of ‘valign’). Question No: 89 Which one of following illustrates relationship between "<! -->" and // ? Closely related Hide the code Different Hide the tags Question No: 90 We can divide the Client Server architecture up to: 1 Tier 2 Tier 3 Tier N –Tier Ref: PAGE # 89 We can divide the client server architecture into n – tiers.

http://vuzs.net/ http://groups.google.com/group/vuZs

Question No: 91 DSS stands for Digital Signature Standards Digital Support Standards

Page 210: A Mega File of It for Current Quizzes

Decision support system Digital Sign System Ref: PAGE # 108 Following is the list some popular public key algorithms: DSS – Digital Signature Standard based on DSA (Digital Standard Algorithm) – key length is between 512-1024 bits Question No: 92 Which one of the followings is an example of Banner advertising? Branding Affiliate programs Partnership All of these Ref: PAGE # 138 Affiliate Programs: An affiliate program is an agreement between two parties that one will pay the other a commission based on a specified customer action. It is not a strategic union as is partnership. Rather, it is for limited purpose and time. Banner advertising is the example of an affiliate program. Question No: 93 A firm Glory Enterprise and it wants to have its web site. It also wants to have the word glory as a part of its domain name because for years it has been recognized in the physical world through this word. However, at the time of registration of its domain name it finds that a person Mr. A. who has nothing to do with the business of the firm or the word glory have already registered a domain name containing this word as a part of it. Since there cannot be two similar domain names, the firm is forced to request Mr. A to transfer that domain name to it. In response, if Mr. A blackmails or claims ransom from the said firm, He would be said to have committed -------------. Cyber squatting Parasites Patent infringement Trade mark and domain name conflicts Ref: PAGE # 181 Cyber squatting: The act of intentionally registering domain names containing trademarks/trade names of prominent Companies to later blackmail or demand ransom from those companies is called cyber squatting. It is Regarded as an offence in most countries. Assume there is a firm ‘Glory Enterprise’ and it wants to have its web site. It also wants to have the word ‘glory’ as a part of its domain name because for years it has been recognized in the physical world through this word. However, at the time of registration of its domain name it finds that a person Mr. ‘A’ who has nothing to do with the business of the firm or the word ‘glory’ has already registered a domain name containing this word as a part of it. Since there cannot be two similar domain names, the firm is forced to request Mr. ‘A’ to transfer that domain name to it. In response, if Mr. ‘A’ blackmails or claims ransom from the said firm, he would be said to have committed cyber squatting. Question No: 94 In which type of approach, we further dig the data for retrieving information from data warehouse? Slice Dice Drill down Roll up Ref: PAGE # 146 Using drill-down we can further dig the data to receive some specific information. For example using that I can find the sale of furniture in a specific month of the first quarter, say, February. Roll-up is the reverse of drill-down.

Page 211: A Mega File of It for Current Quizzes

Question No: 95 Which activity does not include in Primary Identify Customers Design Delivery Administration Ref: PAGE # 152 Question No: 96 What of the following is the correct HTML tag for making a drop-down list? <input type="list"> <input type="dropdown"> <select> <list> Ref: PAGE # 29 Selection lists: General format <select name=“field name” size=“no. of items”> between the <select> and </select> tags are the <option> and </option> tags which define the list items. If you omit “size” the list becomes a drop-down list. If size is two or more, the list becomes a rectangle with scroll bars for navigating the choices. Using ‘Selected’ attribute an item is selected by default. Question No: 97 What does HTML stand for? Hyperlinks and Text Markup Language Home Tool Markup Language Hyper Text Markup Language Homepage Text Making Language Ref: PAGE # 18 Hypertext markup language: Web documents are defined by the Hypertext Markup Language (HTML). It is a language of tags. A tag is a special letter or key word enclosed in angular brackets. Question No: 98 JavaScript variables can begin with ----------- . a lower case letter an underscore character a dollar sign all of the above Ref: PAGE # 54 Rules for variables: Variable names can begin with an uppercase letter (A-Z), lower case letter (a-z), an underscore character (_), or dollar sign ($). Question No: 99 A unique large number, generated as a result of applying hash function on a message is called ________. Hash message Message digest Digitally singed message Secret message Ref: PAGE # 124

Page 212: A Mega File of It for Current Quizzes

SET software on the customer side splits the order information from the account information. MDI is the message digest obtained by applying hash function on the order information . Question No: 100 FVIPSS stands for _________. First Virtual Internet Payment System Server First Virtual International Payment System Server First Virtual International Payment System Services First Virtual Internal Payment System Services Ref: PAGE # 110 Merchant queries the FV Internet Payment System Server (FVIPSS) to confirm Virtual PIN

http://vuzs.net/ http://groups.google.com/group/vuZs

Question No: 101 Which currency is used in e-cash Payment system? Dollar Coin Penny Cent Ref: PAGE # 116 Buyers and merchants, both, have accounts in the E-cash bank. Buyers withdraw coins against their account and store them in e-cash wallet software (Cyber wallet) on their computer. Question No: 102 Web browser and client wallet are installed on __________. Client's computer Bank's computer Merchant's computer None of above Ref: PAGE # 120 Client wallet and web browser are installed on the client machine. Question No: 103 Job searchers can search for jobs and employers can hire effectively using..... Online recruiting web sites. Online banking web sites. Online trading and lending web sites. Online news services web sites. Ref: PAGE # 128 Online Recruiting: Employers can recruit and job searchers can search for jobs effectively through online recruiting web sites. Question No: 104 According to Michael Porter, material handling is an example of primary activity in a strategic business unit. Identify the area in which this task is performed. Identify customers Market and sell Deliver activities relate to storage Purchase materials and supplies Ref: PAGE # 105 ‘Deliver’ activities relate to storage, distribution and shipment of final product, e.g, warehousing, selecting shippers, material handling, timely delivery to customers etc.

Page 213: A Mega File of It for Current Quizzes

Question No: 105 IT/EC can reduce the overall ------------- and afford to keep the price of the product relatively low Production cost Marketing cost Distribution cost None Ref: PAGE # 159 A business using IT/EC can reduce the overall production cost and afford to keep the price of the product relatively low. Question No: 106 Law is broadly divided into two classes on the basis of nature of wrong, namely, --------- and --------------- Civil law and criminal law ETO and criminal law Supreme and Civil Law None Ref: PAGE # 176 Law is broadly divided into two classes on the basis of nature of wrong, namely, civil law and criminal law . Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Question No: 107 Browser is installed at : Client side machine Web server machine none both Client and Server Machines Ref: PAGE # 120 Web browser are installed on the client machine. Question No: 108 In Virtual Payment system, four kinds of information are provided to e-bank. Identify which one is NOT included: Buyer Accounts identifier Buyer password Address of Merchant Actual amount of money in favor of merchant Ref: PAGE # 112 To make payment an account holder is authenticated using an account identifier and a password, account identifier of the payee and the payment amount. Question No: 109 To overcome the lack of physical proximity appearance problem in e-business, which technology is going to be used Biometrics Video conferencing Cryptography Biometrics and Video conferencing Ref: PAGE # 134 Video conferencing is an example of web casting. For example, using this technique, doctors sitting in China, England and Pakistan etc. can, in real time, exchange and benefit from each other’s ideas as if they are physically holding a meeting.

Page 214: A Mega File of It for Current Quizzes

Question No: 110 Dividing the potential customers into groups is called Market Segmentation Market Promotion Market Research Market Survey Ref: PAGE # 131 Market Segmentation: Businesses need to identify specific portions of their markets in order to target them with specific advertising messages. The practice called market segmentation divides the potential customers into segments or groups.

http://vuzs.net/ http://groups.google.com/group/vuZs

Question No: 111 Traditionally Marketer use the market segmentation(s) like Geo-graphic Segmentation Demographic Segmentation Psychographic Segmentation All of the above Ref: PAGE # 131 Traditionally, marketers have used three types of variables to define three different market segmentations, namely, geographic segmentation, demographic segmentation and psychographic segmentation. Question No: 112 In…………………, there is no direct contact with the end users. B2B B2C C2C All above options Ref: PAGE # 137 Key difference between B2C and B2B is that in case of B2B there is no direct contact with the end users, whereas this contact exists in B2C. Thus, an e-business can have direct response or feedback from its customers in B2C as compared to B2B. Question No: 113 Allocation of MAC addresses is administered by -------------------------- ICAAN ISO IEEE None Ref: PAGE # 13 It can easily be inferred that there are 248 unique MAC addresses possible (which is an unimaginably high number). An organization called Institute of Electrical and Electronic Engineers (IEEE) administers the allocation of MAC addresses, worldwide. It ensures that there is no duplication of MAC addresses by the manufacturers of NICs. Question No: 114 As a Web developer you can define a style sheet for? HTML elements and apply to many Web pages. A HTML element and apply to single Web page. A HTML element and apply to many Web pages. HTML elements and apply to one Web page. Ref: PAGE # 38 Style sheets:

Page 215: A Mega File of It for Current Quizzes

Style sheet instructions can be embedded in the HTML document. An advantage of applying style sheets is that definition of the style’s formatting is created once and the browser applies that formatting each time the tag is used. Secondly, pages are easier to modify, that is, edit the style definition and all the places where the style is used within the page get updated automatically. Most popular type of style sheets is Cascading Style Sheets. Question No: 115 What shall come in blanks for proper result, Here blanks are numbered with 1,2 and 3 <html> <head> <SCRIPT language="JavaScript"> Var num1, var num2 Document.container .result.value=parseFloat(num1)-parseFloat(num2) </script> </head> <body> <FORM name=”---------1-----------”> <input type=”----------2-------” name=”-------3---------” maxlength=”5”> </form> </body> </html> container, text and result result, value and container container , button and value result, container and text Question No: 116 What does XML stand for? eXtra Modern Link X-Markup Language eXtensible Markup Language Example Markup Language Ref: PAGE # 74 Extensible markup language: World Wide Web Consortium (W3C), a non-profit organization that maintains standards for the web presented the draft of XML in late 1990’s. Question No: 117 Cryptographic Algorithms are measured in terms of Key length Complexity Simplicity All of the above Ref: PAGE # 107 & 108 Key Length: A cryptographic key is represented as a string of binary digits – 0’s & 1’s- inside a computer. & Cryptographic algorithms are measured in terms of key length. Question No: 118 -----------means that your product/service has certain quality that makes it more attractive than the one offered by your competitor, despite the price of your competitor’s product/service is somewhat lower Differentiation

Page 216: A Mega File of It for Current Quizzes

Focus Cost leadership None of them Ref: PAGE # 157 Differentiation: Differentiation means that your product/service has certain quality that makes it more attractive than the one offered by your competitor, despite the price of your competitor’s product/service is somewhat lower. Question No: 119 Characterization and Clustering belong to which of the following types of Data Mining? Additive Predictive Selective Descriptive Ref: PAGE # 141 Classification and association are predictive types of data mining while characterization and clustering represent the descriptive type. Question No: 120 In which type of data mining, ID3 algorithms is used? Classification Association Characterization Clustering Ref: PAGE # 141 Classification: It allows you to have a predictive model labeling different samples to different classes. The results of this type of mining/model are represented as (if-then) rules, decision trees, neural networks etc. Two important algorithms used for this type are ID3 Algorithm , and Bayesian classification.

http://vuzs.net/ http://groups.google.com/group/vuZs

Question No: 121 ANSI stands for ………. American National Standards Institute All Network Standards Institute American New standards Institute Australia National standards Institute Ref: PAGE # 147 ANSI (American National Standards Institute) Question No: 122 Who is making the Web standards? International Standard Organization ANSI Microsoft The World Wide Web Consortium Ref: PAGE # 74 World Wide Web Consortium (W3C), a non-profit organization that maintains standards for the web presented Question No: 123 Which of following is NOT an attribute of <AREA> tag? shape circle href cords

Page 217: A Mega File of It for Current Quizzes

Ref: PAGE # 37 <Area shape=“circle” coords=“70,45,25” href=“a.htm” alt=“a.htm” target=“upper” nohref> Question No: 124 Which of the following is an advantage of symmetric algorithms? Symmetric algorithms are faster Symmetric algorithms don't include any encryption Symmetric algorithms are slow in nature None of above Ref: PAGE # 105 A symmetric key can also be used for encrypting a message instead of using the pair of public and private keys. The advantage of using symmetric key is that since symmetric algorithms are faster as compared to asymmetric, therefore, the encryption of a message with the symmetric key takes place quickly. Question No: 125 What is the right sequence of steps in? Payee’s bank → Payer’s bank → Payee → Payer. Payer’s bank → Payee → Payee’s bank → Payer. Payer’s bank → Payee’s bank → Payer → Payee. Payer → Payee → Payee’s bank → Payer’s bank. Ref: PAGE # 113 Question No: 126 The key feature of E-Cash Payment system is __________. Simplicity Anonymity Availability Connectivity Ref: PAGE # 116 A company, DigiCash, has pioneered the use of electronic cash or e-cash. Anonymity of the buyer is the key feature of this system. There are three participants in it, namely, buyer, merchant and bank. Both, symmetric and asymmetric type of cryptography is used in this system. Question No: 127 In storefront e-business model buyers and sellers interact ___________ with each other. Directly. Indirectly. Through a third party. None of above. Ref: PAGE # 128 Storefront Model: It represents basic form of e-commerce where buyers and sellers interact directly . Question No: 128 Customers grouped by variables such as social class, personality or approach to life or lifestyle, is called ___________. Demographic Segmentation. Geographic Segmentation. Psychographic segmentation. Behavioral segmentation. Ref: PAGE # 131 Psychographic segmentation: Here customers are grouped by variables such as social class, personality or approach to life or lifestyle. Question No: 129 According to Michael Porter, “material handling” is an example of primary activity in a strategic business unit. Identify the area in which this task is performed.

Page 218: A Mega File of It for Current Quizzes

Identify customers Market and sell Deliver’ activities relate to storage Purchase materials and supplies Ref: PAGE # 152 ‘Deliver’ activities relate to storage, distribution and shipment of final product, e.g, warehousing, selecting shippers, material handling, timely delivery to customers etc. Question No: 130 According to Michael Porter, “fabricating” is an example of primary activity in a strategic business unit. Identify the area in which this task is performed. Market and sell Deliver’ activities relate to storage Purchase materials and supplies Manufacture product or create service Ref: PAGE # 152 ‘Manufacture product or create service’ activities relate to transformation of materials and labor into finished products, e.g, fabricating, assembling, packaging etc.

http://vuzs.net/ http://groups.google.com/group/vuZs

Question No: 131 Web catalogue revenue model includes Online sellers of computer Gifts, flowers, clothes Journals Both first & second options Ref: PAGE # 130 Businesses using this type of a model include online sellers of computers, electronic items, books, music, videos, toys, flowers, gifts, clothes etc. Payment received from customers is the source of earning revenue. Question No: 132 In which type of approach, we sum up and integrate the information in a particular dimension to show the result? Dice Drill down Roll up Slice Ref: PAGE # 146 Roll-up is the reverse of drill-down. In it we can sum-up or integrate the information in a particular dimension to show the result. For example the sale of furniture or computers in a particular year (rather than a specific quarter) can be viewed using roll-up . Question No: 133 EDI used for ______. Used by organizations for transactions that not occur on a regular basis according to a pre-determined format. Used by organizations for transactions that occur on a regular basis according to a pre-determined format. Both NONE of Above Ref: PAGE # 147 ELECTRONIC DATA INTERCHANGE (EDI)

Page 219: A Mega File of It for Current Quizzes

EDI is used by organizations for transactions that occur on a regular basis according to a pre–determined format . Question No: 134 Supply Chain Mangment broken down into ___________. Upstream activities Internal activities Downstream activities All of Above Ref: PAGE # 155 SUPPLY CHAIN: Supply chain includes all the activities associated with the flow and transformation of goods from the raw materials stage all the way to the end user. Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities…

• Upstream activities relate to materials/services or the input from suppliers • Internal activities relate to manufacturing and packaging of goods • Downstream activities relate to distribution and sale of goods to distributors/customers

Question No: 135 Mailbox: Outgoing messages can be placed. Incoming messages can be picked up. Ref: PAGE # 148 Postbox: where outgoing messages are placed, and Mailbox: where incoming messages can be picked up Question No: 136 In many countries, stealing and misusing of meta information for getting competitive advantage is considered as an offence known as Tort of Private Nuisance Tort of Tress passing Tort of passing off Defamation Ref: PAGE # 138 In many countries, stealing and misusing Meta information in this manner to gain business/competitive advantage is considered as an offence known as the tort of passing-off. Question No: 137 Three basic strategies for competitive advantage: __________. Cost leadership Differentiation

Page 220: A Mega File of It for Current Quizzes

Focus All of Above Ref: PAGE # 157 Competitive Strategy: Ability of an organization to prosper arises from its competitive advantage over other organizations operating within its market sector. The strategy of a business to achieve this goal of competitive advantage is known as competitive strategy. Three basic strategies for competitive advantage are as under:

• Cost leadership • Differentiation • Focus

Question No: 138 Which of these is an algorithm used in clustering? K-means L-means C-means F-means Ref: PAGE # 145 K-means algorithm is normally used in clustering. Question No: 139 Web is a(n)…………….. Medium to disseminate information. Passive Active Static All of these Ref: PAGE # 139 Emotional appeals are difficult to covey on the internet because web is an active medium largely controlled by the customers Question No: 140 Each VAN has a centralized computer system that maintains ______________. One File Two Files Three Files Four Files Ref: PAGE # 148 Each VAN has a centralized computer system that maintains two files for each user, that is, Postbox: where outgoing messages are placed, and Mailbox: where incoming messages can be picked up

http://vuzs.net/ http://groups.google.com/group/vuZs

Page 221: A Mega File of It for Current Quizzes

Question No: 141 EDI Advantages inclues ______ Short time Reduced Costs Both None of Above Ref: PAGE # 147 Instance, packaging material should only be ordered for just in time (JIT) delivery, so that E-Pens can cut down on its stock of packaging and reduce the inventory cost. Question No: 142 Popular software packages for personal finance are ___________. Quicken MS Money Money 2003 All of Above Ref: PAGE # 152 Popular software packages for personal finance are Quicken, MS Money and Money 2003 etc. Question No: 143 Meta tag contains: User information Seller information Web page key information Bank information Ref: PAGE # 138 META INFORMATION: You know that a Meta tag contains the key information of a web page. Question No: 144 Popular EDI standards are _______. ANSI (American National Standards Institute) X12 standard EDIFACT (United Nations Standard of Electronic Data Interchange for Administration, Commerce and Transport) Both None of Above REF: PAGE # 147

Page 222: A Mega File of It for Current Quizzes

EDI documents are formatted using published standards. Two popular EDI standards are – ANSI (American National Standards Institute) X 12 standards and EDIFACT (United Nations Standard of Electronic Data Interchange for Administration, Commerce and Transport). Question No: 145 Technology development relates to activities ___________. Fields tests Maintenance of procedures Process improvement studies All of Above Ref: PAGE # 153 ‘Technology development’ relates to activities which help improve product/service that a business is selling and also help improve processes in every primary activity, e.g., fields tests, maintenance of procedures, process improvement studies etc. Question No: 146 Where there are quite a few erroneous or missing values in a row then that row can be deleted or discarded. This process is called............... Data Deletion Data Selection Data Integration Data Transformation Ref: PAGE # 141 Where there are quite a few erroneous or missing values in a row, then that row can be discarded/deleted altogether. This process is called data selection. Question No: 147 Upstream activities of the Supply Chain Managment relate to ___________. materials/services The input from suppliers Both None of Above Ref: PAGE # 155 Upstream activities relate to materials/services or the input from suppliers Question No: 148 Focus strategy means _____________________. That ability to sell the goods or provide the service at a price that is lower than that of competitors That your product/service has certain quality that makes it more attractive That concentration on a single aspect of the market

Page 223: A Mega File of It for Current Quizzes

Concentration on many aspect of the market Ref: PAGE # 157 Focus: Focus strategy is defined as concentration on a single aspect of the market. That single aspect can be a particular market segment or market area or product type. Question No: 149 What is true about Personal finance? Sell you products in no time. Buy you products in no time. Allows the management of your financial matters in a customized manner None Ref: PAGE # 152 PERSONAL FINANCE ONLINE: Personal finance allows the management of your financial matters in a customized manner. Question No: 150 What is true about ERP? Integrate all business functions At Single Location Efficient use of resource ALL Above Ref: PAGE # 93 Enterprise Resource Planning: Enterprise Resource Planning (ERP) is a concept that integrates all aspects of a business e.g, accounting, logistics, manufacturing, marketing, planning, project management etc. at a single place. An ERP system such as SAP is expensive.

http://vuzs.net/ http://groups.google.com/group/vuZs

Question No: 151 Supply Chain Managment can be broken down into ___________. One Activity Two Activities Three Activities Four Activties Ref: PAGE # 155

• Upstream activities relate to materials/services or the input from suppliers • Internal activities relate to manufacturing and packaging of goods • Downstream activities relate to distribution and sale of goods to distributors/customers

Question No: 152

Page 224: A Mega File of It for Current Quizzes

VAN Stands for ______. Value Added Network Value Added Noise Ref: PAGE # 148 Value Added Network (VAN): MIDTERM EXAMINATION Spring 2009 IT430- E-Commerce (Session - 4) Question No: 1 ( Marks: 1 ) - Please choose one In datalink layer, data packets are placed inside ► Data frames ► Data boxes ► Data streams ► None of these Question No: 2 ( Marks: 1 ) - Please choose one …..tag is used into …….tag because a row contains multi cells and to fill up these cells with data. ► TD…… TR ► TR…… TD ► TD…… TG ► TG…… TR Question No: 3 ( Marks: 1 ) - Please choose one Which tag is used for the hidden fields? ► <FIELD> ► <TEXT> ► <INPUT> ► <HIDDEN> Question No: 4 ( Marks: 1 ) - Please choose one Which of them is NOT a predefined object? ► Document ► Date ► Loop ► Array Question No: 5 ( Marks: 1 ) - Please choose one Which of these is not a comparison operator? ► < ► > ► = ► != Question No: 6 ( Marks: 1 ) - Please choose one Var d = new date() Which of the following is correct about the d variable? ► instance of new ► instance of Date() method ► instance of Date object ► Simple Variable Question No: 7 ( Marks: 1 ) - Please choose one

Page 225: A Mega File of It for Current Quizzes

When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called ► Local Variables ► Global Variables ► Local and Global ► None of the above Question No: 8 ( Marks: 1 ) - Please choose one Which of the following , is condition part of given For loop for (i = 0; i <= 5; i++). ► i=0. ► i++. ► i<=5. ► (i = 0; i <= 5; i++). Question No: 9 ( Marks: 1 ) - Please choose one Which of the following is NOT valid HTML code line? ► <frameset rows="16%,84%"> ► <frameset columns="16%,84%"> ► <frameset cols="100,150"> ► <frameset cols=”50%,50%” rows=”16%,84%”> Question No: 10 ( Marks: 1 ) - Please choose one CSS is a breakthrough in Web design because it allows developers to control the--------- ► Processing speed on client side ► Data grid view on client side ► Style and layout of home page. ► Style and layout of multiple Web pages Question No: 11 (Marks: 1) - Please choose one For which of the following we need to know the classification of E-commerce? ► Market planning strategy ► Build Mission statement ► Management strategy ► none Question No: 12 ( Marks: 1 ) - Please choose one How can you open a link in a new browser window? ► <a href="/url" target="new"> ► <a href="/url" target="_blank"> ► <a href="/url" new> ► None of these Question No: 13 ( Marks: 1 ) - Please choose one What does the Target= “_top” tag perform? ► Loads the new page into the same frame ► Loads the new page into the entire window ► Loads the new page into a new browser window ► All of the above Question No: 14 ( Marks: 1 ) - Please choose one Which attribute is used in a tag to control the layout of element? ► view ► css

Page 226: A Mega File of It for Current Quizzes

► Style ► Layout Question No: 15 ( Marks: 1 ) - Please choose one Choose the correct HTML code line which left-align the content inside a tablecell. ► <td leftalign> ► <td valign="left"> ► <td align="left"> ► <tdleft> Question No: 16 ( Marks: 1 ) - Please choose one Where in an HTML document is the correct place to refer to an external style sheet? ► In the <body> section ► At the end of the document ► In the <head> section ► At the top of the document Question No: 17 ( Marks: 1 ) - Please choose one Constructor is defined as the initializing function used to create…........ ► Instance of object ► Copy of object ► Instance / copy of object ► Shallow copy of object Question No: 18 ( Marks: 1 ) - Please choose one What does XML stand for? ► eXtra Modern Link ► X-Markup Language ► eXtensible Markup Language ► Example Markup Language Question No: 19 ( Marks: 1 ) - Please choose one For which of following purpose the Firewall is used ? ► Efficient working ► Protection against security attacks ► Networking purpose ► None of these Question No: 20 ( Marks: 1 ) - Please choose one PPP stands for ► Point to Point Protocol ► Post to Post Protocol ► Point to Post Protocol ► None of these Question No: 21 ( Marks: 1 ) - Please choose one Which of the following is NOT processed on the client side? ► Cookies ► JavaScript ► CGI scripts ► Applets ► Cookies Question No: 22 ( Marks: 1 ) - Please choose one

Page 227: A Mega File of It for Current Quizzes

Firewall is used to I - examine the data entering the network II - examine the data leaving the network III - filter the data according to certain rules ► I, II and III ► I only ► I and III only ► I and II only Question No: 23 ( Marks: 1 ) - Please choose one Which firewall uses strong user authentication to verify identity of a host attempting to connect to the network? ► Packet filter firewall ► Circuit level firewall ► Application gateway firewall ► Hybrid firewall Question No: 24 ( Marks: 1 ) - Please choose one Bus networks is same as the system bus of a computer. ► True ► False Question No: 25 ( Marks: 1 ) - Please choose one In Style Sheets, How do you add a background color for all "<h1>" elements? ► all.h1 {background-color:#FFFFFF} ► h1.all {background-color:#FFFFFF} ► h1 {background-color:#FFFFFF} ► h1 {bgcolor:#FFFFFF} Question No: 26 ( Marks: 1 ) - Please choose one How do you make each word in a text start with a capital letter? ► text-transform:capitalize ► text-transform:first_capitalize. ► Cann’t be possible with CSS ► text-transform:uppercase Question No: 27 ( Marks: 1 ) - Please choose one MAC address is written in Binary form 0-1 ► Decimal form 0-9 ► Hexadecimal form 0-f ► None of these ► Question No: 28 ( Marks: 1 ) - Please choose one MAC stand for ► Media Access Control 13 ► Media Access Consortium ► Member of Asian Community ► None of these Question No: 29 ( Marks: 1 ) - Please choose one Choose the correct HTML tag for the largest heading ► <head>

Page 228: A Mega File of It for Current Quizzes

► <h1> ► <Heading> ► <h6> Question No: 30 ( Marks: 1 ) - Please choose one Which of the following tags are used for embedding sound files into HTML code? ► <A href=“song.wav”> ► <EMBED SRC="Skylar.MP3"> ► <A href=“song.wav”> and <EMBED SRC="Skylar.MP3"> ► None of these Do correction in all midterm file J Question No:44 answer is 3rd Question No: 31 ( Marks: 1 ) - Please choose one Which of the following is NOT an advantage of CSS ? ► Works on version 4 browsers or newer ► Define the look of your pages in one place ► Easily change the look ► Implement same formatting each time tag is used. Question No: 32 ( Marks: 1 ) - Please choose one Which of the following is correct line to add separated css file with name xxxx.css? ► <link scr=stylesheet href="/xxxx.css" type="text/css"> ► <link rel=stylesheet href="/xxxx.css" type="text/css"> ► <style rel=stylesheet href="/xxxx.css" type="text/css"> ► <link rel=stylesheet scr="xxxx.css" type="text/css"> Question No: 33 ( Marks: 1 ) - Please choose one Which of the following is correct syntax to define color in CSS? ► body {color: black} ► body:color=black ► {body:color=black(body} ► {body;color:black} Question No: 34 ( Marks: 1 ) - Please choose one Inside which of the following HTML element do we put the JavaScript? ► <script> ► <js> ► <javascript> ► <scripting> Question No: 35 ( Marks: 1 ) - Please choose one Which one is the responsible to manage “Internal processes”? ► E-business ► E-commerce ► E-marketing ► All of the given

Question No: 36 ( Marks: 1 ) - Please choose one The first control statement in a for loop usually ► sets the termination condition ► increments a counter ► creates a control variable

Page 229: A Mega File of It for Current Quizzes

► none of the above Question No: 37 ( Marks: 1 ) - Please choose one You define a method using ► obj.method ► obj.method[] ► obj.method() ► obj-method Question No: 38 ( Marks: 1 ) - Please choose one What is the default scripting language in ASP? ► EcmaScript ► JavaScript ► Java ► VBScript 85 Question No: 39 ( Marks: 1 ) - Please choose one Following are malicious programs EXCEPT ----------------- . ► Back doors ► Trojan Horses ► Firewalls 94 ► Worms Question No: 40 ( Marks: 1 ) - Please choose one Outside attacks on a network include the following, EXCEPT --------------- . ► Password attack ► DoS ► Back doors ► IP spoofing Question No: 41 ( Marks: 1 ) - Please choose one The process of scrambling a message with the help of a key is called -------------- . ► Cryptography 100 ► Filtering ► Transposition ► Encryption Question No: 42 ( Marks: 1 ) - Please choose one In a ring network, every device has exactly ______ neighbors for communication purpose. ► more than two ► Two ► Four ► None of these Question No: 43 ( Marks: 1 ) - Please choose one What is identified by the tag <FRAMESET COLS="20%,60%,20%">? ► Horizontal frame ► Vertical Frame 31 ► Top Frame ► Bottom Frame Question No: 44 ( Marks: 1 ) - Please choose one Why we use reset tag in HTML? ► To remove the text written in Notepad.

Page 230: A Mega File of It for Current Quizzes

► To remove the text written in between <body> and </body>tag. ► To remove the text written in between <head> and </head> tag. ► To remove the text written in between <form> and </form> tag. Question No: 45 ( Marks: 1 ) - Please choose one Network Interface Card is operated at ► Application layer ► Session layer ► Network layer ► Datalink layer 6

Question No: 46 ( Marks: 1 ) - Please choose one Academic institutions, religious organizations and government using --------------------- e-commerce classification ► Business-to-Business(B2B) ► Intra Business ► Non Business EC 2 ► Business-to-consumer(B2C) Question No: 47 ( Marks: 1 ) - Please choose one What is the correct HTML tag for adding a background color? ► <background>yellow</background> ► <body bgcolor="yellow"> ► <body color="yellow"> ► None Question No: 48 ( Marks: 1 ) - Please choose one

Which HTML tag is used to define an internal style sheet? ► <css> ► <script> ► <style> (Ans) ► <sheet> Question No: 49 ( Marks: 1 ) - Please choose one What is the correct HTML for making a hyperlink? ► <a href="http://www.w3schools.com">W3Schools</a> (Ans) ► <a name="http://www.w3schools.com">W3Schools.com</a> ► <a url="http://www.w3schools.com">W3Schools.com</a> ► <a>http://www.w3schools.com</a> Question No: 50 ( Marks: 1 ) - Please choose one If we leave out the target attribute in frame tag and link was clicked ,the document loads into the window ► In Same page ► In other blank page. ► To display browser error. ► All of the options. Question No: 51 ( Marks: 1 ) - Please choose one What does mean by != comparison operator? ► Equal to ► Not ► Equal

Page 231: A Mega File of It for Current Quizzes

► Not Equal 58 Question No: 52 ( Marks: 1 ) - Please choose one

What does the string. match (“abc”) object do? ► Concatenates the “abc” word to other “abc” words ► Matches the “abc” words with other “abc” words ► It does replacement of abc word with other words ► All of the above Question No: 53 ( Marks: 1 ) - Please choose one

var txt="Hello World!" document.write(txt.length), it would return the length as. ► 10 ► 11 ► 12 ► 13 Question No: 55 ( Marks: 1 ) - Please choose one How can you convert information consisting of comma separated values into an array? ► txtArray = txt.indexOf(','); ► txtArray = txt.split(','); page 70 ► txtArray = txt.trim(','); ► txtArray = txt.substring(','); Question No: 56 ( Marks: 1 ) - Please choose one The control statement on a while loop is tested ► before each time through the loop ► after each time through the loop ► once at the start ► once at the end Question No: 57 ( Marks: 1 ) - Please choose one Which SQL statement is used to delete data from a database? ► DELETE ► COLLAPSE ► REMOVE ► DISCARD Question No: 58 ( Marks: 1 ) - Please choose one A program that performs a specific function such as creating invoices/bills or processing payment received from customers is called a/an ---------------. ► Middleware ► Web Service ► CRM Software ► Appplication Program page 92 Question No: 59 ( Marks: 1 ) - Please choose one When data moves upward in the OSI stack it is called ► Encapsulation ► De-encapsulation ► Synchronization ► None of these Question No: 60 ( Marks: 1 ) - Please choose one In star network features a central connection point called a "hub" that ought to be only a hub.

Page 232: A Mega File of It for Current Quizzes

► True ► False Question No: 61 ( Marks: 1 ) - Please choose one Switch is a device that joins multiple computers together within one local area network (LAN). ► True ► False Question No: 62 ( Marks: 1 ) - Please choose one Switch generally contains more "intelligence" than a hub. ► True ► False Question No: 63 ( Marks: 1 ) - Please choose one ► SMTP ► POP3 ► IMAP 18 ► ICMP Question No: 64 ( Marks: 1 ) - Please choose one Which protocol does Virtual university use to send email to student Accounts? ► SMTP ► POP ► IMAP ► TCP Question No: 65 ( Marks: 1 ) - Please choose one For which one of the following,<MARQUEE ...> tag can work better ► News headlines ► Announcements ► Sound pulgin ► Movie controls Question No: 66 ( Marks: 1 ) - Please choose one Can you add a style in a single place on a page ? ► Yes, with a style-definition written into the tag ► Yes, with a global style definition that redefines the tag. ► No - CSS can only be defined for entire pages. Question No: 67 ( Marks: 1 ) - Please choose one

Which CSS tag is used to place an image that would remain when user scrolls down or up the page?

► background-attachment: fixed 48 ► background-attachment: scroll ► background-attachment: up ► All of these Question No: 68 ( Marks: 1 ) - Please choose one What shall come in blanks for proper result, Here blanks are numbered with 1,2 and 3 <html> <head> <SCRIPT language="JavaScript"> Var num1, var num2

Page 233: A Mega File of It for Current Quizzes

Document.container .result.value=parseFloat(num1)-parseFloat(num2) </script> </head> <body> <FORM name=”---------1-----------”> <input type=”----------2-------” name=”-------3---------” maxlength=”5”> </form> </body> </html> ► container, text and result ► result, value and container ► container , button and value ► result, container and text Question No: 69 ( Marks: 1 ) - Please choose one Correct syntax of "for" loop is : ► for (i = 0; i <= 5) ► for i = 1 to 5 ► for (i <= 5; i++) ►for (i = 0; i <= 5; i++) Question No: 70 ( Marks: 1 ) - Please choose one CGI stands for ► Common Gate Information ► Common Gate Interface 82 ► Common Goal Interest ► Common Global Interaction Question No: 71 ( Marks: 1 ) - Please choose one Which of the following property falls in HTTP? ►Stateless ► Stateful ► Temporary ► All of these Question No: 72 ( Marks: 1 ) - Please choose one What is a correct way of referring to a stylesheet called "mystyle.xsl" ? ► <?xml-stylesheet type="text/xsl" href="/mystyle.xsl" ?> ► <link type="text/xsl" href="/mystyle.xsl" /> ► <stylesheet type="text/xsl" href="/mystyle.xsl" /> ► <?stylesheet type="text/xsl" href="/mystyle.xsl" ?> Question No: 73 ( Marks: 1 ) - Please choose one Which of the following does not interpret its code? ► ASP ► PHP ► JSP 85 ► Coldfusion Technologies like ASP, PHP and Coldfusion interpret their code except Question No: 74 ( Marks: 1 ) - Please choose one Asymmetric cryptography is also called -------------- .

Page 234: A Mega File of It for Current Quizzes

► Public key cryptography 100 ► Private key cryptography ► Substitution cryptography ► Transposition Question No: 75 ( Marks: 1 ) - Please choose one Digital signature uses --------- . ► Symmetric cryptography ► Private key cryptography ► Public key cryptography ► Hash function Question No: 76 ( Marks: 1 ) - Please choose one Which one of the following is NOT a valid JavaScript variable? ► _name1 ► $studentScore ► first_name ► 2ndName 54 Question No: 77 ( Marks: 1 ) - Please choose one Which of these is the correct HTML code for creating a reset button? ► <input type =”button” name=”reset” value=”reset”> ► <input type=”resetButton” value=”Clear”> ► <input type=”reset” value=”reset”> ► <input type=”button” name=”reset” value=”clear”> Question No: 78 ( Marks: 1 ) - Please choose one http://cs.vu.edu is an example of ► Two zone domain name ► Three zone domain name ► Four zone domain name ► Five zone domain name

MIDTERM EXAMINATION Spring 2009

IT430- E-Commerce (Session - 4) Question No: 79 ( Marks: 1 ) - Please choose one In datalink layer, data packets are placed inside ► Data frames ► Data boxes ► Data streams ► None of these Question No: 80 ( Marks: 1 ) - Please choose one …..tag is used into …….tag because a row contains multi cells and to fill up these cells with data. ► TD…… TR ► TR…… TD ► TD…… TG ► TG…… TR

Question No: 81 ( Marks: 1 ) - Please choose one

Page 235: A Mega File of It for Current Quizzes

Individuals who write programs or manipulate technologies to gain unauthorized access to computers and networks are --------------- . ► administrators ► experts ► hackers ► coders Question No: 82 ( Marks: 1 ) - Please choose one What is the correct JavaScript syntax to write "Virtual University of Paistan"? ► document.write("Virtual University of Paistan ") ► ("Virtual University of Paistan ") ► " Virtual University of Paistan " ► response.write("Virtual University of Paistan ") Question No: ( Marks: 1 ) - Please choose one Question No: 83 ( Marks: 1 ) - Please choose one CSS is a breakthrough in Web design because it allows developers to control the--------- ► Processing speed on client side ► Data grid view on client side ► Style and layout of home page. ► Style and layout of multiple Web pages uestion No: 84 ( Marks: 1 ) - Please choose one In which direction all messages travel through a ring Topology ► Same direction (clockwise) ► Same direction( either "clockwise" or "countercloc kwise") ► Dual direction (both "clockwise" and "counterclockwise") ► None of these Question No: 85 ( Marks: 1 ) - Please choose one

Identify the networking device which regenerates the signals if these become weak. ► Hub ► Switch ► Router ► Repeater Question No: 86 ( Marks: 1 ) - Please choose one Which of the following is not the Data types in Javascript? ► Int ► Float ► String ► Null Question No: 87 ( Marks: 1 ) - Please choose one There is a way of describing XML data, how? ►XML uses a description node to describe data ►XML uses a DTD to describe the data ►XML uses XSL to describe data ► None of these Question No: 88 ( Marks: 1 ) - Please choose one Which of the following needs human action to execut e? ► Virus

Page 236: A Mega File of It for Current Quizzes

► Worm ► Trojan Horse ► All of these Question No: 89 ( Marks: 1 ) - Please choose one

A ___________certifies the binding between public key and its owner ► CA ► KDC ► TLS ► Firewall Question No: 90 ( Marks: 1 ) - Please choose one An address represented by four decimal numbers separated by a period is the ► IP ► RIP ► MAC ► None of the given Question No: 91 ( Marks: 1 ) - Please choose one Which SQL statement is used to update data in a database? ► SAVE ► SAVE AS ► MODIFY ► UPDATE Question No: 92 ( Marks: 1 ) - Please choose one Attributes ‘colspan’ and ‘rowspan’ are used in a tag for spanning the cells to a particular no. of columns or rows, respectively. Select the right one tag. ► tag ► tag ► tag ► None of the given

Question No: 93 ( Marks: 1 ) - Please choose one

Which one of the following ,divides large network in small logical segments called subnets on basis of IP addresses ► Routers ► Bridge ► None of these ► Switches Question No: 94 ( Marks: 1 ) - Please choose one

Switch is used on the layer

► First Layer

► Second Layer

► Third Layer

► None of these

Question No: 95 ( Marks: 1 ) - Please choose one

Router is used on the layer

► First Layer

► Second Layer

► Third Layer

► None of these

Page 237: A Mega File of It for Current Quizzes

Question No: 96 ( Marks: 1 ) - Please choose one

What is the correct JavaScript syntax to insert a comment that has more than one line?

► /*This comment has more than one line*/

► //This comment has more than one line//

► <!--This comment has more than one line-->

► None of these

Question No: 97 ( Marks: 1 ) - Please choose one

► CA

► KDC

► TLS

► Firewall

Question No: 98 ( Marks: 1 ) - Please choose one

How do you define a numerical value?

► var mynum = new Math;

► var mynum = Math(6);

► var mynum = 6;

► Math.mynum = 6;

Question No: 99 ( Marks: 1 ) - Please choose one

Question No: 99 ( Marks: 1 ) - Please choose one

Which of the following is NOT true about Applets?

► Applets are compiled Java programs

► Applet code is sent from server to the browser for processing

► <script> tag is used to make a call for the applet code

► Typically applets take more space on the window screen

Question No: 100 ( Marks: 1 ) - Please choose one

After compilation, the JSP page is converted into a

► JavaScript

► HTML

► Applet

► Servlet

Question No: 101 ( Marks: 1 ) - Please choose one

Following are the names of some well known e-commerce software, EXCEPT ----------- .

► Intershop

► IBM's WebSphere Commerce Professional Edition

► Microsoft Commerce Server 2002

► Microsoft SQL Server 2005

Question No: 102 ( Marks: 1 ) - Please choose one

At which layer of the OSI model the circuit level firewall operates?

► Application layer

► Presentation layer

► Network layer

► Transport layer

Question No: 103 ( Marks: 1 ) - Please choose one

Which attribute can be used to make a region non-clickable? ► none of the given ► target ► alt

Page 238: A Mega File of It for Current Quizzes

► nohref Question No: 104 ( Marks: 1 ) - Please choose one

Which of following is NOT an attribute of <AREA> tag?

► shape

► circle

► href

► coords

Question No: 105 ( Marks: 1 ) - Please choose one

In star topology, If hub fails, the entire network also fails. ► True ► False Question No: 106 ( Marks: 1 ) - Please choose one

Which HTML tag is used to define an internal (embedded) style sheet?

► css

► text/style

► style

► script

question No: 107 ( Marks: 1 ) - Please choose one

Which of the following is correct for displaying a box around a paragraph?

► P {box:yes}

► P {box:thin solid}

► P {box:1}

► P {border:thin solid}

Question No: 108 ( Marks: 1 ) - Please choose one

How the tables in HTML are expanded?

► Row by Row

► Column by Column

► One row and one column

► None of these

Question No: 109 ( Marks: 1 ) - Please choose one

Which of the following is the default alignment in HTML?

► Left

► Center

► Right

► None

Question No: 110 ( Marks: 1 ) - Please choose one RIP(Routing Information protocol) is used by---------- , to build a ------------ table ► bridges , hash ► routers, matrix ► routers , routing ► All of these Question No: 111 ( Marks: 1 ) - Please choose one

In which protocol, the messages are not deleted from email server. ► SMTP ► POP3 ► IMAP ► ICMP Question No: 112 ( Marks: 1 ) - Please choose one For which one of the following,<MARQUEE ...> tag can work better

Page 239: A Mega File of It for Current Quizzes

► News headlines ► Announcements ► Sound pulgin ► Movie controls uestion No: 113 ( Marks: 1 ) - Please choose one At line code 5 which of the following Css methods has been applied? <html> <head> 1. <style type="text/css"> 2. h3 {font-family: times} 3. p {font-family: courier} 4. p.sansserif {font-family: sans-serif} </style> 5. <Link rel=” stylesheet” type=” text/css” herf=”mystyle.css”> </head> <body> 6. <h3 style=”font-size:40pt”>This is header 3</h3> </body> </html>

àmystyle.css: h3{ color:red} ► Browser default ► External style sheet ► Inline style ► Internal style sheet Question No: 114 ( Marks: 1 ) - Please choose one Which of the following is NOT valid HTML code line?

► <frameset rows="16%,84%"> ► <frameset columns="16%,84%"> ► <frameset cols="100,150"> ► <frameset cols=”50%,50%” rows=”16%,84%”> Question No: 115 ( Marks: 1 ) - Please choose one Let us assume in Javascript, Variabales num1 and num2 are assigned values 10 and 30 respectively The following text was displayed on browser page: OUTPUT: The result of addition is (40) Which one of following code will display the output? ► document.write(“The result of addition is (”+(parseFloat(num1)+parseFloat(num2))+”)”; ► document.write(“The result of addition is (”+(parseFloat(num1)+parseFloat(num2))+”)”. ► document.write(“The result of addition is (”+(parseFloat(num1)+parseFloat(num2)));. ► document.alert (“The result of addition is (” (parseFloat(num1)+parseFloat(num2)) ”)”; Question No: 116 ( Marks: 1 ) - Please choose one Constructor is defined as the initializing function used to create…........ ► Instance of object

Page 240: A Mega File of It for Current Quizzes

► Copy of object ► Instance / copy of object ► Shallow copy of object Question No: 117 ( Marks: 1 ) - Please choose one

Which language does not compile its code but interpret it? ► ASP. Net ► ASP ► C++ ► None of these Question No: 118 ( Marks: 1 ) - Please choose one JavaScript is mainly a ___________ language. ► Server Side Scripting ► Cross Side Scripting ► Client Side Scripting ► both Cross and Server Side Scripting Question No: 119 ( Marks: 1 ) - Please choose one Which loop type always runs the enclosed code at least once http://vustudents.ning.com ► for ► while ► do while ► all of them Question No: 120 ( Marks: 1 ) - Please choose one

Which one from the following uses IP addresses on network layer? ► Swithes ► Routers ► Bridges ► All of the given

Question No: 121 ( Marks: 1 ) - Please choose one Which object has the property of 'cookie'? http://vustudents.ning.com ► window ► location ► document ► string Question No: 122 ( Marks: 1 ) - Please choose one Pretty Good Privacy (PGP) is the name of a popular _________ system which is available for general public use. http://vustudents.ning.com ► Filtering ► Cryptographic ► Server ► Security Question No: 123 ( Marks: 1 ) - Please choose one An electronic signature can ensure --------- . ► authenticity ► integrity ► non-repudiation ► all of them Question No: 124 ( Marks: 1 ) - Please choose one Which one is the correct CSS syntax? ► h1 {font-size:72pt} ► h1:font-size=72pt

Page 241: A Mega File of It for Current Quizzes

► {h1:font-size=72pt} ► {h1;font-size:72pt} Question No: 125 ( Marks: 1 ) - Please choose one In Style Sheets, How do you change the font of an element? ► font-face: ► font: ► font-family: ► font-style: Question No: 126 ( Marks: 1 ) - Please choose one How many characters MAC address consists on? http://vustudents.ning.com ► 11 ► 12 ► 13 ► 14 Question No: 127 ( Marks: 1 ) - Please choose one Choose which one is the not the columns of Log files. ► IP addresses ► Request (url) ► Date ► Contents

MIDTERM EXAMINATION

Spring 2010

IT430- E-Commerce (Session - 2)

Question No: 128 ( Marks: 1 ) - Please choose one

► <background>yellow</background>

► <body bgcolor="yellow"> (Ans) ► <body color="yellow"> ► None Question No: 7 ( Marks: 1 ) - Please choose one

Question No: 129 ( Marks: 1 ) - Please choose one Which one of the following certifies the binding between public key and its owner.

► CA (Ans) ► KDC ► TLS ► Firewall Question No: 130 ( Marks: 1 ) - Please choose one Cyclical Redundancy Check (CRC), takes place in which layer of OSI Model. ► Session Layer

► Transport Layer (Ans) ► Network Layer ► Data link layer Question No: 131 ( Marks: 1 ) - Please choose one In what form are style rules presented?

► selector { property: value }

► selector { property= value } (Ans)

► selector ( property: value )

Page 242: A Mega File of It for Current Quizzes

► selector ( property= value )

Question No: 1 ( Marks: 1 ) - Please choose one

Academic institutions, religious organizations and government using --------------------- e-commerce

classification

► Business-to-Business(B2B)

► Intra Business

► Non Business EC (Ans)

► Business-to-consumer(B2C)

Question No: 2 ( Marks: 1 ) - Please choose one

In which protocol, the messages are not deleted from email server.

► SMTP

► POP3

► IMAP (Ans)

► ICMP

Question No: 3 ( Marks: 1 ) - Please choose one

What is the correct HTML tag for adding a background color? http://vustudents.ning.com

► <background>yellow</background>

► <body bgcolor="yellow"> (Ans)

► <body color="yellow">

► None

Page 243: A Mega File of It for Current Quizzes

Question No: 4 ( Marks: 1 ) - Please choose one

Which HTML tag is used to define an internal style sheet?

► <css>

► <script>

► <style> (Ans)

► <sheet>

Question No: 5 ( Marks: 1 ) - Please choose one

What is the correct HTML for making a hyperlink?

► <a href="http://www.w3schools.com">W3Schools</a> (Ans)

► <a name="http://www.w3schools.com">W3Schools.com</a>

► <a url="http://www.w3schools.com">W3Schools.com</a>

► <a>http://www.w3schools.com</a>

Question No: 6 ( Marks: 1 ) - Please choose one

If we

leave out the target attribute in frame tag and link was clicked ,the document loads into the window

► In Same page (Ans)

► In other blank page.

► To display browser error.

► All of the options.

Page 244: A Mega File of It for Current Quizzes

Question No: 7 ( Marks: 1 ) - Please choose one

What does mean by != comparison operator?

► Equal to

► Not

► Equal

► Not Equal (Ans)

Question No: 8 ( Marks: 1 ) - Please choose one

What does the string.match (“abc”) object do? http: //vustudents.ning.com

► Concatenates the “abc” word to other “abc” words

► Matches the “abc” words with other “abc” words (An s)

► It does replacement of abc word with other words

► All of the above

Question No: 9 ( Marks: 1 ) - Please choose o ne

var txt="Hello World!" document.write(txt.leng th), it would return the length as.

► 10

► 11

► 12 (Ans)

► 13

Question No: 10 ( Marks: 1 ) - Please choose one

Page 245: A Mega File of It for Current Quizzes

Which of the following property falls in HTTP? http://vustudents.ning.com

► Stateless (Ans)

► Stateful

► Temporary

► All of these

Question No: 11 ( Marks: 1 ) - Please choose one

Which one of the following certifies the binding between public key and its owner.

► CA (Ans)

► KDC

► TLS

► Firewall

Question No: 12 ( Marks: 1 ) - Please choose one

Cyclical Redundancy Check (CRC), takes place in which layer of OSI Model.

► Session Layer

► Transport Layer (Ans)

► Network Layer

► Data link layer

Page 246: A Mega File of It for Current Quizzes

Question No: 13 ( Marks: 1 ) - Please choose one

How

can you convert information consisting of comma separated values into an array?

► txtArray = txt.indexOf(','); (Ans)

► txtArray = txt.split(',');

► txtArray = txt.trim(',');

► txtArray = txt.substring(',');

Question No: 14 ( Marks: 1 ) - Please choose one

The

control statement on a while loop is tested

► before each time through the loop (Ans)

► after each time through the loop

► once at the start

► once at the end

Question No: 15 ( Marks: 1 ) - Please choose one

Which SQL statement is used to delete data from a database? http://vustudents.ning.com

► DELETE (Ans)

► COLLAPSE

► REMOVE

► DISCARD

Question No: 16 ( Marks: 1 ) - Please choose one

A

program that performs a specific function such as creating invoices/bills or processing payment received

from customers is called a/an ---------------.

Page 247: A Mega File of It for Current Quizzes

► Middleware

► Web Service

► CRM Software

► Appplication Program (Ans)

Question No: 17 ( Marks: 1 ) - Please choose one

Which firewall uses strong user authentication to verify identity of a host attempting to connect to the

network?

► Packet filter firewall

► Circuit level firewall

► Application gateway firewall (Ans)

► Hybrid firewall

Question No: 18 ( Marks: 1 ) - Please choose one

In

what form are style rules presented?

► selector { property: value }

► selector { property= value } (Ans)

► selector ( property: value )

► selector ( property= value )

Question No: 19 ( Marks: 1 ) - Please choose one

Why

we use reset tag in HTML?

► To remove the text written in Notepad.

Page 248: A Mega File of It for Current Quizzes

► To remove the text written in between <body> and </ body>tag. (Ans)

► To remove the text written in between <head> and </head> tag.

► To remove the text written in between <form> and </form> tag.

Question No: 20 ( Marks: 1 ) - Please choose one

When data moves upward in the OSI stack it is called

► Encapsulation

► De-encapsulation

► Synchronization (Ans)

► None of these

Question No: 21 ( Marks: 2 )

What does PPTP stand for? http://vustudents.ning.com

Ans:

PPTP stads for point to point transfer protocol.

Question No: 22 ( Marks: 2 )

What are the keywords to define a variable and a function in JavaScript?

Question No: 23 ( Marks: 3 )

Identify the object, property and method in the following:

Page 249: A Mega File of It for Current Quizzes

Math.sin(45)

Math.PI

Ans:

Math.PI we are using for mathematical calculation.

Question No: 24 ( Marks: 3 )

Performance of web servers can be evaluated mainly on the basis of two factors. What are they?

Ans:

We can evaluate web servers performance by below basic factors.

1. Response time.

2. Request process time.

1. this is one of the basic factor to evaluate the web server process, we can evaluate

performance of web server by its response time, once you write web add how long it take to

open its home page.

2. Secondly we can evaluate performance of web server by the time which server take to do

process, suppose you submit some query or you did some transaction how long it will take to

process it. By this way also we can evaluate performance of a web servers.

Question No: 25 ( Marks: 5 )

Write the code for a web page displaying a button named "Testing". After clicking that button an alert

should be displayed saying "The test is successful".

SANS stands for _______.

Select correct option:

Page 250: A Mega File of It for Current Quizzes

System Administration, Authentication, Network and Security Institute

Software Authentication, Audit, Network and Security Institute

Systems Administrator, Audit, Network and Security Institute

None of Above

Proxy Server can _______.

Select correct option:

Speed up the processing of http requests by caching web pages

Translate HTTP request between trusted and un trusted network

Can also act as a firewall filtering requests for certain web pages

All of Above

Response time ________.

Select correct option:

Time a server take to process one request.

Time a server take to process all the request.

Time a server take to process some request.

Time a server take to process ten request

attacks are basically a result of _____

Select correct option:

Page 251: A Mega File of It for Current Quizzes

Back door

Sniffing

Eavesdropping

None of the Above

IDS Stands for _________.

Select correct option:

http://vustudents.ning.com

Intrusion Defense System

Intervention Detection System

Intervention Defense System

Intrusion Detection System

Question # 8 of 10 ( Start time: 02:45:30 PM ) Total Marks: 1

ASP runs best on ________.

Select correct option:

Internet information Software

Intranet Information Software

Intranet Information Server

Internet Information Server

Plug in is ________.

Select correct option:

Page 252: A Mega File of It for Current Quizzes

Program that make the computer server.

Programs that work with the browser to enhance its capabilities.

Program that communicate with the client from the server.

None of Above

http://vustudents.ning.com

Question # 10 of 10 ( Start time: 02:47:59 PM ) Total Marks: 1

It occurs when a customer clicks at checkout or confirm order button and is subjected to some payment

_______.

Select correct option:

Transaction Processing

E cash System

E Funds system

None of Above

Question # 1 of 10 ( Start time: 01:51:41 AM ) Total Marks: 1

An agent is a software program that is _____

Select correct option:

Triggers by human

Not capable of autonomous action.

Capable of autonomous action in its environment in order to meet its

objectives

Page 253: A Mega File of It for Current Quizzes

None

Question # 2 of 10 ( Start time: 01:52:21 AM ) Total Marks: 1

ASP runs best on ________.

Select correct option:

Internet information Software

Intranet Information Software

Intranet Information Server

Internet Information Server

Question # 3 of 10 ( Start time: 01:53:48 AM ) Total Marks: 1

What is/are the methods to track the customer.

Select correct option:

Database

Cookies

Hidden Fields

All

Question # 4 of 10 ( Start time: 01:54:32 AM ) Total Marks: 1

Page 254: A Mega File of It for Current Quizzes

Large companies establish connections between their e-commerce software and

their existing accounting system by using a type of software called

__________.

Select correct option:

Shareware

Freeware

Middleware

None

http://vustudents.ning.com

Question # 5 of 10 ( Start time: 01:55:19 AM ) Total Marks: 1

Password attacks are basically a result of _____

Select correct option:

Back door

Sniffing

Eavesdropping

None of the Above

Question # 6 of 10 ( Start time: 01:56:03 AM ) Total Marks: 1

Caching ______.

Page 255: A Mega File of It for Current Quizzes

Select correct option:

have no effect on downloading of the page

saves the time of downloading the page

increase the time of downloading the page

None of Above

Question # 7 of 10 ( Start time: 01:56:58 AM ) Total Marks: 1

. A program that performs a specific function such as creating invoices/bills or

processing payment received from customers is called _______.

Select correct option:

Firewall

Application program

Protocol

Web Services

Question # 8 of 10 ( Start time: 01:57:54 AM ) Total Marks: 1

Programs that work with the browser to enhance its capabilities.

Select correct option:

Driver

Page 256: A Mega File of It for Current Quizzes

Flash

PlugIn

None of Above

Question # 9 of 10 ( Start time: 01:58:10 AM ) Total Marks: 1

Agents can be used for _____

Select correct option:

Comparisons

Filtering

Web crawling

All

Question # 10 of 10 ( Start time: 01:58:53 AM ) Total Marks: 1

secure, dedicated point to point connection over the internet ______.

Select correct option:

Metropolitan area Network

Local area Network

Wide Area Network

Virtual Private Network

http://vustudents.ning.com

Page 257: A Mega File of It for Current Quizzes

Question # 1 of 10 ( Start time: 10:06:21 PM ) Total Marks: 1

Extranet formed when ______.

Select correct option:

When two or more internet is connected to each other.

When two or more WAN are connected to each other.

When two or more intranets are connected to each other.

When two or more LAN is connected to each other.

Question # 2 of 10 ( Start time: 10:07:19 PM ) Total Marks: 1

E-commerce Site must provide ________.

Select correct option:

Transaction processing

Shopping cart capabilities

A catalog display

All of the above

Question # 3 of 10 ( Start time: 10:08:12 PM ) Total Marks: 1

In this type of attack, the attacker gains access to the network and then send invalid data to network, services or applications. These services or applications consequently become unable to perform their normal tasks or functions.

Select correct option:

Page 258: A Mega File of It for Current Quizzes

Trojan Horse

Virus

DoS

Worms

Question # 4 of 10 ( Start time: 10:09:16 PM ) Total Marks: 1

ERP Stands for

Select correct option:

Entrepreneur Resource Planning

Enterprise Rescue Planning

Enterprise Resource Program

Enterprise Resource Planning

http://vustudents.ning.com

Question # 5 of 10 ( Start time: 10:10:21 PM ) Total Marks: 1

Large companies establish connections between their e-commerce software and their existing accounting system by using a type of software called __________.

Select correct option:

Shareware

Page 259: A Mega File of It for Current Quizzes

Freeware

Middleware

None

http://vustudents.ning.com

Question # 6 of 10 ( Start time: 10:11:04 PM ) Total Marks: 1

Plug in is ________.

Select correct option:

Program that make the computer server.

Programs that work with the browser to enhance its capabilities.

Program that communicate with the client from the server.

None of Above

Question # 7 of 10 ( Start time: 10:12:12 PM ) Total Marks: 1

Throughput is ___________.

Select correct option:

No of instruction a server execute in one second.

No of session a server handle.

No of http request that a web server can handle.

Page 260: A Mega File of It for Current Quizzes

None of Above

http://vustudents.ning.com

Question # 8 of 10 ( Start time: 10:13:44 PM ) Total Marks: 1

HTTP is a _______.

Select correct option:

State Oriented

Stateless

A&B

None of Above

http://vustudents.ning.com

Question # 9 of 10 ( Start time: 10:14:47 PM ) Total Marks: 1

Caching ______.

Select correct option:

have no effect on downloading of the page

saves the time of downloading the page

increase the time of downloading the page

None of Above

http://vustudents.ning.com

# 10 of 10 ( Start time: 10:16:03 PM ) Total Marks: 1

Page 261: A Mega File of It for Current Quizzes

secure, dedicated point to point connection over the internet ______.

Select correct option:

Metropolitan area Network

Local area Network

Wide Area Network

Virtual Private Network

Question No: 1 ( Marks: 1 ) - Please choose one

Which one of the following ,divides large network in small logical segments called subnets on basis of IP addresses

► Routers

► Bridge

► None of these

► Switches

Question No: 2 ( Marks: 1 ) - Please choose one

Switch is used on the layer

► First Layer

► Second Layer

► Third Layer

Page 262: A Mega File of It for Current Quizzes

► None of these

Question No: 3 ( Marks: 1 ) - Please choose one

Router is used on the layer

► First Layer

► Second Layer

► Third Layer

► None of these

Question No: 4 ( Marks: 1 ) - Please choose one

What shall come in blanks for proper result,

Here blanks are numbered with 1,2 and 3

<html>

<head>

<SCRIPT language="JavaScript">

Var num1, var num2

Document.container .result.value=parseFloat(num1)-parseFloat(num2)

</script>

Page 263: A Mega File of It for Current Quizzes

</head>

<body>

<FORM name=”---------1-----------”>

<input type=”----------2-------” name=”-------3---------” maxlength=”5”>

</form>

</body>

</html>

► container, text and result

► result, value and container

► container , button and value

► result, container and text

Question No: 5 ( Marks: 1 ) - Please choose one

What is the correct JavaScript syntax to insert a comment that has more than one line?

► /*This comment has more than one line*/

► //This comment has more than one line//

► <!--This comment has more than one line-->

► None of these

Question No: 6 ( Marks: 1 ) - Please choose one

Which one of the following certifies the binding between public key and its owner.

► CA

Page 264: A Mega File of It for Current Quizzes

► KDC

► TLS

► Firewall

Question No: 7 ( Marks: 1 ) - Please choose one

How

do you define a numerical value?

► var mynum = new Math;

► var mynum = Math(6);

► var mynum = 6;

► Math.mynum = 6;

Question No: 8 ( Marks: 1 ) - Please choose one

How

can you convert information consisting of comma separated values into an array?

► txtArray = txt.indexOf(',');

► txtArray = txt.split(',');

► txtArray = txt.trim(',');

► txtArray = txt.substring(',');

Question No: 9 ( Marks: 1 ) - Please choose one

Which of the following is NOT true about Applets?

► Applets are compiled Java programs

► Applet code is sent from server to the browser for processing

► <script> tag is used to make a call for the applet code

► Typically applets take more space on the window screen

Page 265: A Mega File of It for Current Quizzes

Question No: 10 ( Marks: 1 ) - Please choose one

After

compilation, the JSP page is converted into a

► JavaScript

► HTML

► Applet

► Servlet

Question No: 11 ( Marks: 1 ) - Please choose one

Following are the names of some well known e-commerce software, EXCEPT ----------- .

► Intershop

► IBM's WebSphere Commerce Professional Edition

► Microsoft Commerce Server 2002

► Microsoft SQL Server 2005

Question No: 12 ( Marks: 1 ) - Please choose one

At

which layer of the OSI model the circuit level firewall operates?

► Application layer

► Presentation layer

► Network layer

► Transport layer

Question No: 13 ( Marks: 1 ) - Please choose one

Page 266: A Mega File of It for Current Quizzes

Which attribute can be used to make a region non-clickable?

► none of the given

► target

► alt

► nohref

Question No: 14 ( Marks: 1 ) - Please choose one

Which of following is NOT an attribute of <AREA> tag?

► shape

► circle

► href

► coords

Question No: 15 ( Marks: 1 ) - Please choose one

In

star topology, If hub fails, the entire network also fails.

► True

► False

Page 267: A Mega File of It for Current Quizzes

Question No: 16 ( Marks: 1 ) - Please choose one

Which HTML tag is used to define an internal (embedded) style sheet?

► css

► text/style

► style

► script

Question No: 17 ( Marks: 1 ) - Please choose one

In

Style Sheets, How do you change the font of an element?

► font-face:

► font:

► font-family:

► font-style:

Question No: 18 ( Marks: 1 ) - Please choose one

Which of the following is correct for displaying a box around a paragraph?

► P {box:yes}

► P {box:thin solid}

► P {box:1}

► P {border:thin solid}

Question No: 19 ( Marks: 1 ) - Please choose one

Page 268: A Mega File of It for Current Quizzes

How

the tables in HTML are expanded?

► Row by Row

► Column by Column

► One row and one column

► None of these

Question No: 20 ( Marks: 1 ) - Please choose one

Which of the following is the default alignment in HTML?

► Left

► Center

► Right

► None

Question No: 21 ( Marks: 2 )

We

want to create left margin of 10 pixels and right margin of 15 pixels. Write css code to apply both

properties.

<HTML><STYLE>P{margin-left:10px;margin-right:15px;}</STYLE>

<BODY></BODY></HTML>

Question No: 22 ( Marks: 2 )

JDBC and ODBC Stands for?

Java based database connectivity

Page 269: A Mega File of It for Current Quizzes

Open database connectivity

Question No: 23 ( Marks: 3 )

Write a brief note on ERP? Also write any two ERP software names.

Enterprise Resource Planning is a computer based system which manages internal and external

resources of business that includes assets, financial issues, project management, human resource and

marketing.

The purpose of this software is to regulate the flow of information among all business functions. It

builds a centralized database and it has the common platform. EFP System creates unique and

enterprise system environment.

The names of ERP Software

SAP

SAGE

Microsoft Dynamics

Question No: 24 ( Marks: 3 )

Create an instance of date and write the methods to get date and minutes?

getDate() - Get the day of the month.

var curdate = new Date()

var mday = curdate.getDate()

document.write(mday + "<BR>")

Page 270: A Mega File of It for Current Quizzes

Question No: 25 ( Marks: 5 )

Write any four essential features and two extra features which should exist in E-Commerce soft

wares.

A catalog display

Shopping cart capability

Transaction processing

Web services

Application integration

Middleware

Question No: 26 ( Marks: 5 )

What are the three logical operators in JavaScript? Write their symbols and their functions.

“++” FOR LOGICAL INCREMENT

“&&” FOR LOGICAL AND

“!” FOR LOGICAL NOT

Logical increment adds one to the previous number that holds a given variable, logical AND returns true

when all the given statements are true and logical NOT retunes true only when the given statement is

not true otherwise it returns false

MIDTERM EXAMINATION

Spring 2009

Page 271: A Mega File of It for Current Quizzes

IT430- E-Commerce (Session - 1)

Question No: 1___( Marks: 1 ) - Please choose one

Which of the following is Default subnet mask of class C?

255.0.0.0

255.255.0.0

255.255.255.0 (page 11)

None of above

Question No: 2 ( Marks: 1 ) - Please choose one

Which one of the following ,divides large network in small logical segments called subnets on basis of

IP addresses

Routers (page 16)

Bridge

None of these

Switches

Question No: 3 __ ( Marks: 1 ) - Please choose one

Which one is not included in the networking topologies?

Star Topology

Bus Topology

Media Topology

Ring Topology

Page 272: A Mega File of It for Current Quizzes

Question No: 4 __ ( Marks: 1 ) - Please choose one

CSS is a breakthrough in Web design because it allows developers to control the -----------

Processing speed on client side

Style and layout of multiple Web pages

Data grid view on client side

Style and layout of home page.

Ref

http://www.w3schools.com/web/web_css.asp

Question No: 5 ( Marks: 1 ) - Please

choose one Border-width: specifies the width of all borders in the order

‘border-right-width, border-bottom-width, border-left-width, border-top-width’

‘border-bottom-width, border-left-width, border-top-width, border-right-width’

‘border-top-width, border-right-width, border-bottom-width, border-left-width’ (page 49)

None of these

Question No: 6 __ ( Marks: 1 ) - Please choose one

document.write(str.replace(/Microsoft/,"W3Schools"))

This string object is deleting Microsoft word

This string object is concatenating the Microsoft with W3schools

Page 273: A Mega File of It for Current Quizzes

This string object is replacing Microsoft with W3schools

None of these

Ref

http://iswww.w3schools.com/jsref/jsref_replace.asp

Question No: 7 ( Marks: 1 ) -

Please choose one How do you define a function in Javascript?

function:myFunction()

function myFunction() (page 58)

declare myFunction()

new myFunction

Question No: 8___( Marks: 1 ) - Please choose one

The first control statement in a for loop usually

sets the termination condition

increments a counter

creates a control variable

none of the above

Question No: 9 ( Marks: 1 ) - Please choose one The

second control statement in a for loop usually

Page 274: A Mega File of It for Current Quizzes

sets the termination condition

increments a counter

creates a control variable

none of the above

Question No: 10 ( Marks: 1 ) - Please choose one

Choose the correct HTML tag to make a text italic

<it>

<i> (page 19)

<italics>

<italic>

Question No: 11 __ ( Marks: 1 ) - Please choose one

The 'shape' attribute of <AREA> tag accepts the following values, EXCEPT

Rect

Circle

poly

square (page 36)

Question No: 12 ( Marks: 1 ) - Please choose one

<AREA> tag is used within the

Page 275: A Mega File of It for Current Quizzes

<MAP> tag (page 35)

<FRAME> tag

<FRAMESET> tag

<IMG> tag

Question No: 13 __ ( Marks: 1 ) - Please choose one

Where in an HTML document is the correct place to refer to an external style sheet?

In the <body> section

At the top of the document In

the <head> section (page 42)

Between head and body

Question No: 14 __ ( Marks: 1 ) - Please choose one

In CSS, How do you make the text italic?

font:i

style:italic

font-style: italic (page 44)

font:italic

ref

http://tom.me.uk/html-to-css/bold-italic.html

Page 276: A Mega File of It for Current Quizzes

Question No: 15 __ ( Marks: 1 ) - Please choose one

What is identified by the tag <FRAMESET COLS="20%,60%,20%">?

Horizontal frame

Vertical Frame (page 31)

Top Frame

Bottom Frame

Question No: 16 __ ( Marks: 1 ) - Please choose one

Creating your own tags is not possible in HTML but in XML it is possible to create

Your own tags.

True

False

Question No: 17 __ ( Marks: 1 )

What is the function of UDP protocol at TCP/IP stack?Give precise answer.

Connectionless transport protocol

Question No: 18 ( Marks: 1 )

Page 277: A Mega File of It for Current Quizzes

What tag is used for displaying a border between the frames?

- BORDER or FRAMEBORDER – Set this attribute to 0 for not displaying a border between the frames

Question No: 19 ( Marks: 2 )

Suppose, there is an applet at "http://www.vu.edu.pk/demo.class". Write the code to

include this applet in your web page.

<HTML> <BODY>

<APPLET CODE= "http://www.vu.edu.pk/demo.class". width=100 height=200>DEMO</APPLET>

</BODY> </HTML>

Question No: 20 __ ( Marks: 3 )

Identify the object, property and method in the following:

Math.sin(45)

Math.PI

document.write("Math.sin(45) :"+Math.sin(45)+"<P>");

document.write("Math.PI :" +Math.PI +"<P>");

Question No: 21 __ ( Marks: 5 )

What is a web form? What is its usage in reference to client-server communication? 2+3

A webform on a web page allows a user to enter data that is sent to a server for processing. Webforms

resemble paper forms because internet users fill out the forms using checkboxes, radio buttons, or text

fields.

Page 278: A Mega File of It for Current Quizzes

You are now familiar with the fact that internet presents a two-way communication model, also called

theClient-Server Model. In the client server model some data is processed on the client side and

certain data is processed by the server on the server side.

Question No: 22 ( Marks: 10 )

Explain the following frame tags? Discuss the usage of these

a) <frameset>

b) <frame>

c) <Noframes>

d) <Iframe>

MIDTERM EXAMINATION Spring 2009

IT430- E-Commerce (Session - 3)

Question No: 1 __ ( Marks: 1 ) - Please choose one

In which protocol, the messages are not deleted from email server.

SMTP

POP3

IMAP (page 18)

ICMP

Page 279: A Mega File of It for Current Quizzes

Question No: 2 ( Marks: 1 ) - Please choose one

Which HTML tag is used to define the internal style sheet ?

<css>

<script >

<sheet>

<style>

ref

http://www.ex-designz.net/test_grade.asp?tid=37

Question No: 3 ( Marks: 1 ) - Please choose one

For which one of the following,<MARQUEE ...> tag can work better

News headlines

Announcements

Sound pulgin

Movie controls

Ref

http://www.htmlcodetutorial.com/_MARQUEE.html

Question No: 4 __ ( Marks: 1 ) - Please choose one

Choose the correct HTML code line which left-align the content inside a tablecell.

<td leftalign>

<td valign="left">

<td align="left"> (page 26)

Page 280: A Mega File of It for Current Quizzes

<tdleft>

Question No: 5 __ ( Marks: 1 ) - Please choose one

How do you write a conditional statement for executing some statements only if "i" is

NOT equal to 5?

if =! 5 then

if (i != 5) (page 58)

if <>5

if (i <> 5)

Question No: 6 ( Marks: 1 ) - Please choose one

What is the correct JavaScript syntax to write "Virtual University of Paistan"?

document.write("Virtual University of Paistan ")

("Virtual University of Paistan ")

" Virtual University of Paistan "

response .write("Vi rtual University of Paistan ")

Question No: 7 __ ( Marks: 1 ) - Please choose one

We can divide the Client Server architecture up to:

3 Tier

N -Tier

1 Tier

Page 281: A Mega File of It for Current Quizzes

2 Tier

ref

[PPT]

CLIENT SERVER ARCHITECTURE

Question No: 8 ( Marks: 1 ) - Please choose one

Choose which one is the not the columns of Log files.

IP addresses

Request (url)

Date

Contents (page 136 and 3)

Question No: 9 __ ( Marks: 1 ) - Please choose one

An address represented by four decimal numbers separated by a period is the

IP (PAGE 7)

RIP

MAC

NON OF THE GIVEN

Question No: 10 ( Marks: 1 ) - Please choose one

Which operator is used to concatenate two strings?

+ (PAGE 61)

*

Page 282: A Mega File of It for Current Quizzes

&&

&

Question No: 11 __ ( Marks: 1 ) - Please choose one

Which SQL statement is used to extract data from a database?

GET (page 83)

OPEN

SELECT

EXTRACT

Question No: 12 __ ( Marks: 1 ) - Please choose one

Which firewall uses strong user authentication to verify identity of a host

attempting to connect to the network?

Packet filter firewall Circuit

level firewall Application (PAGE 96)

gateway firewall

Hybrid firewall

Question No: 13 __ ( Marks: 1 ) - Please choose one

In CSS, How do you make each word in a text start with a capital letter?

text-transform :capitalize

text-transform: uppercase

text:capitalize

Page 283: A Mega File of It for Current Quizzes

You can't do that with CSS

REF

http://www.ex-designz.net/test_page.asp?tid=37

Question No: 14 __ ( Marks: 1 ) - Please choose one

Why we use reset tag in HTML?

To remove the text written in Notepad.

To remove the text written in between <body> and </body>tag.

To remove the text written in between <head> and </head> tag.

To remove the text written in between <form> and </form> tag.

Question No: 15 ( Marks: 1 ) - Please choose one

http://cs.vu.edu is an example of

Two zone domain name

Three zone domain name (page 12)

Four zone domain name

Five zone domain name

Question No: 16 __( Marks: 1 ) - Please choose one

In data link layer, data packets are placed inside

Data frames (page 6)

Data boxes

Page 284: A Mega File of It for Current Quizzes

Data streams

None of these

Question No: 17 __ ( Marks: 1 )

What are the two types of twisted pair cables for networking ?

Question No: 18 ( Marks: 1 )

What it stands for IIS?

Question No: 19 __ ( Marks: 2 )

When does we use the parseFloat() function?

Question No: 20 ( Marks: 3 )

Name the JavaScript function that convert strings to float numbers. How do you

give the function a string value to convert to a number?

Question No: 21 __ ( Marks: 5 )

Write your personal profile in a file saving it with the extension of e.g. “abc.js”and then call it in

a JavaScript code.

Question No: 22 ( Marks: 10 )

Explain any three of the outside attacks briefly.

MIDTERM EXAMINATION

Page 285: A Mega File of It for Current Quizzes

Spring 2009

IT430- E-Commerce (Session - 3)

Question No: 1 __ ( Marks: 1 ) - Please choose one

Which one of the following ,divides large network in small logical segments called subnets on basis of

IP addresses

Routers (page 16)

Bridge

None of these

Switches

Question No: 2 ( Marks: 1 ) - Please choose one

Which one is not included in the networking topologies?

Star Topology

Bus Topology

Media Topology

Ring Topology

Question No: 3 __ ( Marks: 1 ) - Please choose one

At line code 5 which of the following Css methods has been applied?

<html>

<head>

1. <style type="text/css">

2. h3 {font-family: times}

Page 286: A Mega File of It for Current Quizzes

3. p {font-family: courier}

4. p.sansserif {font-family: sans-serif}

</style>

5. <Link rel=”stylesheet” type=”text/css” herf=”mystyle.css”>

</head>

<body>

6. <h3 style=”font-size:40pt”>This is header 3</h3>

</body>

</html>

mystyle.css:

h3{ color: red}

Browser default

External style sheet

Inline style

Internal style sheet

Page 287: A Mega File of It for Current Quizzes

Question No: 4 ( Marks: 1 ) - Please choose one

Which attribute is used in a tag to control the layout of element?

view

css

Style

Layout

Ref

http://www.yourhtmlsource.com/stylesheets/csslayout.html

Question No: 5___( Marks: 1 ) - Please choose one What is the correct HTML

for making a hyperlink? http://www.vustudents.net

<a url="http://www.w3schools.com">W3Schools.com</a>

<a>http://www.w3schools.com</a>

<a h ref="http ://www.w3schools.com">W3Schools</a> (page 23)

<a name="http://www.w3schools.com">W3Schools.com</a>

Question No: 6 ( Marks: 1 ) - Please choose one

How do you write a conditional statement for executing some statements only if "i" is

NOT equal to 5?

if =! 5 then

if (i != 5) (repeated)

if <>5

if (i <> 5)

Page 288: A Mega File of It for Current Quizzes

Question No: 7 __ ( Marks: 1 ) - Please choose one

How many different kind of loops are there in JavaScript?

One. The "for" loop only

Two. The "for" loop and the "while" loop

Four. The "for" loop, the "while" loop, the "do...while" loop, and the "loop.. .until" loop

None of the above

REF

http://www.ex-designz.net/test_grade.asp?tid=65

Question No: 8___( Marks: 1 ) - Please choose one

What does DTD stand for?

Do The Dance.

Dynamic Type Definition.

Data Type Definition. (page 76)

Direct Type Définition.

Question No: 9 ( Marks: 1 ) - Please choose one

Which of the following needs human action to execute?

Virus (page 94)

Worm

Trojan Horse

All of these

Page 289: A Mega File of It for Current Quizzes

Question No: 10 __ ( Marks: 1 ) - Please choose one

For showing image on web page, save your image at any drive or folder like C:\abc.jpeg is an example

of

Relative Address

Absolute address

None of the given

Ref

Absolute paths are called that because they refer to the very specific location, including the domain

name. The absolute path to a Web element is also often referred to as the UR

Question No: 11 __ ( Marks: 1 ) - Please choose one

ASP server scripts are surrounded by delimiters, which?

<script>.. .</script>

<%...%>

<%>...</%>

<&>...</&>

MIDTERM EXAMINATION Spring 2009

IT430- E-Commerce (Session - 2)

Question No: 1 __ ( Marks: 1 ) - Please choose one

For which of the following we need to know the classification of E-commerce?

Page 290: A Mega File of It for Current Quizzes

Market planning strategy

Build Mission statement

Management strategy

none

Question No: 2 ( Marks: 1 ) - Please choose

one Who is making the Web standards?

Netscape

Internet service providers

The World Wide Web Consortium

Microsoft

Question No: 3 __ ( Marks: 1 ) - Please choose one

When you declare a variable within a function, the variable can only be accessed within that function.

When you exit the function, the variable is destroyed. These variables are called

Local Variables

Global Variables

Local and Global

None of the above

Ref

http://www.authorpick.net/what-is-variables-in-programming-language/

Page 291: A Mega File of It for Current Quizzes

Question No: 4___( Marks: 1 ) - Please choose one

There is a way of describing XML data, how?

XML uses a description node to describe data

XML uses a DTD to describe the data (page 75)

XML uses XSL to describe data

None of these

Ref

http://www.dotnetspider.com/questions/ViewQuestion.aspx?QuestionId=6754&

Question No: 5 ( Marks: 1 ) - Please choose

One which of the following property falls in HTTP?

Stateless (repeated)

State full

Temporary

All of these

Question No: 6 ( Marks: 1 ) - Please choose one

Choose the correct HTML tag to make a text bold

<tbold>

<b>

<bld>

<bold>

Page 292: A Mega File of It for Current Quizzes

Question No: 7 ( Marks: 1 ) - Please choose one

What is the default scripting language in ASP?

EcmaScri pt

JavaScri pt

Java

VBScript (page 85)

Question No: 8 __ ( Marks: 1 ) - Please choose one

Which one of them is not a feature of e-commerce software?

catalog display

web hosting (page 92)

web services

transaction processing

Question No: 9 ( Marks: 1 ) - Please choose one

When two or more intranets are connected to each other they form a/an ----------

VPN

Intranet

Internet

Extranet (page 2)

Question No: 10 ( Marks: 1 ) - Please choose one

Page 293: A Mega File of It for Current Quizzes

Pretty Good Privacy (PGP) is the name of a popular _________system which is available for general

public use. http://www.vustudents.net

Filtering

Cryptographic (page 100)

Server

Security

Question No: 11 __ ( Marks: 1 ) - Please choose one

Which one is NOT a valid frame attribute?

NORESIZE

ROWS (page 33)

FRAMEBORDER

BORDER

Question No: 12 ( Marks: 1 ) - Please choose one

IP version 6 provides ---------------bits and also contains ----------------------

128, hexadecimal (page 11)

64, hexadecimal

32, binary

None of the Above

Question No: 13 ___( Marks: 1 ) - Please choose one

A JavaScript event is generated when a user -------- .

Page 294: A Mega File of It for Current Quizzes

clicks a hyperlink

clicks a button

enters data in a form

all of the above (page 54)

Question No: 14 __ ( Marks: 1 ) - Please choose one

Creating your own tags is not possible in HTML but in XML it is possible to create your own tags.

True

False

Question No: 15 __ ( Marks: 1 ) - Please choose one

IP, RIP, and ARP protocols work on

Application layer

Session layer

Network layer (page 6)

Data link layer

Question No: 16 __ ( Marks: 1 ) - Please choose one

In the communication between two computers on a network, CRC is calculated at

Sender’s side

Receiver’s side

Both sender and receiver sides

Page 295: A Mega File of It for Current Quizzes

Neither on sender nor on receiver side

Ref

[PPT]

Business Data Communications and Networking

Question No: 17 ( Marks: 1 )

What is the function of ARP protocol at TCP/IP stack?Give precise answer.

Question No: 18 __ ( Marks: 1 )

Do you agree or not that in In Java Script we are not provided with certain

already defined objects which are ready to use? justify

Question No: 19 ( Marks: 2 )

What are the three position style properties?

Question No: 20 ( Marks: 3 )

Write at least three rules for writing an XML code.

Question No: 21 ( Marks: 5 )

What is the difference between an interpreted and a compiled language? Give one example of each.

Question No: 22 __ ( Marks: 10 )

Consider the following code of an XML document and identify where its standard code rules

Page 296: A Mega File of It for Current Quizzes

are being applied. You are required to write the identified tag along with its related rule side

by side. http://www.vustudents.net

<?xml version=“1.0”?>

<PlanetsList>

<Planet Name=“Mercury”> <Distance>36 million miles</Distance> <Moons>None</Moons>

<DayLength> 176 days</DayLength> </Planet>

<Planet Name=“Venus”> <Distance>67 million miles</Distance> <Moons>None</Moons>

<DayLength>1 17 days</DayLength> </Planet>

<Planet Name=“Earth”> <Distance>93 million miles</Distance> <Moons>One</Moons>

<DayLength>24 Hours</DayLength> </Planet>

</PlanetsList> <BR/>

MIDTERM EXAMINATION

Spring 2010

IT430- E-Commerce (Session - 6)

Solved

Question No: 1 ( Marks: 1 ) - Please choose one

MAC stand for

► Media Access Control ( page 13)

► Media Access Consortium

► Member of Asian Community

► None of these

Question No: 2 ( Marks: 1 ) - Please choose one

Page 297: A Mega File of It for Current Quizzes

Choose the correct HTML tag for the largest heading

► <head>

► <h1> (page 20)

► <Heading>

► <h6>

Question No: 3 ( Marks: 1 ) - Please choose one

Which of the following tags are used for embedding sound files into HTML code?

► <A href=“song.wav”>

► <EMBED SRC="Skylar.MP3">

► <A href=“song.wav”> and <EMBED SRC="Skylar.MP3"> (page 37)

► None of these

Do correction in all midterm file J

Question No:44 answer is 3rd

Question No: 4 ( Marks: 1 ) - Please choose one

Which of the following is NOT an advantage of CSS ?

► Works on version 4 browsers or newer

► Define the look of your pages in one place

► Easily change the look

► Implement same formatting each time tag is used.

Advantages

1) Improved Search Engine Results

2) Sites Load Faster

3) Design Separated from Content:

4) Displayed on Various Media

5) Compatibility with Browsers

Browser inserts a line break before the <DIV> tag and after the </DIV> end tag.

Page 298: A Mega File of It for Current Quizzes

They are used when you want to apply a specific style to a number of different tags and sections

throughout the document http://www.vustudents.net

Question No: 5 ( Marks: 1 ) - Please choose one

Which of the following is correct line to add separated css file with name xxxx.css?

► <link scr=stylesheet href="/xxxx.css" type="text/css">

► <link rel=stylesheet href="/xxxx.css" type="text/css"> (page 77)

► <style rel=stylesheet href="/xxxx.css" type="text/css">

► <link rel=stylesheet scr="xxxx.css" type="text/css">

Question No: 6 ( Marks: 1 ) - Please choose one

Which of the following is correct syntax to define color in CSS?

► body {color: black} (page 77)

► body:color=black

► {body:color=black(body}

► {body;color:black}

Question No: 7 ( Marks: 1 ) - Please choose one

Inside which of the following HTML element do we put the JavaScript?

► <script> (page 58)

► <js>

► <javascript>

► <scripting>

Question No: 8 ( Marks: 1 ) - Please choose one

JavaScript is mainly a ___________ language.

Page 299: A Mega File of It for Current Quizzes

► Server Side Scripting

► Cross Side Scripting

► Client Side Scripting (page79)

► both Cross and Server Side Scripting

Question No: 9 ( Marks: 1 ) - Please choose one

Which one is the responsible to manage “Internal processes”?

► E-business

► E-commerce

► E-marketing

► All of the given

Question No: 10 ( Marks: 1 ) - Please choose one

The first control statement in a for loop usually

► sets the termination condition

► increments a counter

► creates a control variable

► none of the above

Question No: 11 ( Marks: 1 ) - Please choose one

You define a method using

► obj.method

► obj.method[]

► obj.method() (PAGE 58)

► obj-method

Page 300: A Mega File of It for Current Quizzes

Question No: 12 ( Marks: 1 ) - Please choose one

What is the default scripting language in ASP?

► EcmaScript

► JavaScript

► Java

► VBScript (PAGE 85)

Question No: 13 ( Marks: 1 ) - Please choose one

Following are malicious programs EXCEPT ----------------- .

► Back doors

► Trojan Horses

► Firewalls (PAGE 94)

► Worms

Question No: 14 ( Marks: 1 ) - Please choose one

Outside attacks on a network include the following, EXCEPT --------------- .

► Password attack http://www.vustudents.net

► DoS

► Back doors ( PAGE 95)

► IP spoofing

Question No: 15 ( Marks: 1 ) - Please choose one

At which layer of the OSI model the circuit level firewall operates?

► Application layer

► Presentation layer

Page 301: A Mega File of It for Current Quizzes

► Network layer

► Transport layer (PAGE 96)

Question No: 16 ( Marks: 1 ) - Please choose one

The process of scrambling a message with the help of a key is called -------------- .

► Cryptography

► Filtering

► Transposition

► Encryption (PAGE 100)

The process of scrambling a message with the help of a key is called Encryption.

Question No: 17 ( Marks: 1 ) - Please choose one

In a ring network, every device has exactly ______ neighbors for communication purpose.

► more than two

► Two (PAGE 14)

► Four

► None of these

Question No: 18 ( Marks: 1 ) - Please choose one

What is identified by the tag <FRAMESET COLS="20%,60%,20%">?

► Horizontal frame ► Vertical Frame (PAGE 31) ► Top Frame ► Bottom Frame

Question No: 19 ( Marks: 1 ) - Please choose one

Page 302: A Mega File of It for Current Quizzes

Why we use reset tag in HTML?

► To remove the text written in Notepad.

► To remove the text written in between <body> and </body>tag.

► To remove the text written in between <head> and </head> tag.

► To remove the text written in between <form> and </form> tag. (PAGE 27)

Question No: 20 ( Marks: 1 ) - Please choose one

Network Interface Card is operated at

► Application layer

► Session layer

► Network layer

► Datalink layer (PAGE 6)

Question No: 21 ( Marks: 2 ) http://www.vustudents.net

What value will be printed after executing the following statement in JavaScript:

document.write( Math.pow(3, 2) );

document.write("Math.pow(2,3) :"+Math.pow(2,3)+"<P>");

Question No: 22 ( Marks: 2 )

What is a web server?

ANSWER:

Web server

web server is a machine that serves up the web page requests of a client on the internet. It is a

combination of hardware and software. Decision as regards the type of a web server is largely

dependent on the volume and type of web activities. So, transaction processing sites generating

Page 303: A Mega File of It for Current Quizzes

dynamic pages with high traffic volumes would need web server software that is more efficient and

can easily be upgraded.

Question No: 23 ( Marks: 3 )

To calculate the area of a circle the formula pi r squared is used. How would you code it in JavaScript?

<html>

<script type="text/javascript">

var radius,area;

radius = 10;

area = Math.PI*Math.pow(radius,2);

document.write("Area of circle with radius 10 is " + area );

</script>

</html>

Question No: 24 ( Marks: 3 )

Name four commonly used web server operating systems. (PAGE 91)

Commonly used web server operating systems are Microsoft Windows NT Server, Microsoft Windows

2000 Advanced Server, Microsoft.NET Server, Linux or Unix based operating systems such as Solaris.

Question No: 25 http://www.vustudents.net ( Marks: 5 )

Write the types of firewalls. Only names? Explain these briefly

Packet filter firewall

It uses a set of rules to determine whether outgoing or incoming data packets are allowed to pass

through the firewall.

Page 304: A Mega File of It for Current Quizzes

Circuit level firewall

It is quite similar to the packet filter firewall. It also works on the basis of a set of rules for filtering

packets but operates at the transport layer of the OSI Model so has greater functionality.

Application gateway firewall

It operates at application layer of the OSI Model. It uses strong user authentication to verify identity of a

host attempting to connect to the network using application layer protocols such us FTP. In contrast to

packet filter firewall, it filters the requests rather than packets entering/leaving the network. It can block

any outgoing HTTP or FTP requests.

Question No: 26 ( Marks: 5 )

Write the JavaScript code which will display the following in a web page using a FOR loop:

The number is 0

The number is 1

The number is 2

The number is 3

The number is 4

The number is 5

<html>

<script type="text/javascript">

var no;

for (no=0; no<6 ; no++)

{

document.write("The number is " + no + "<br>" );

}

</script>

</html>

Page 305: A Mega File of It for Current Quizzes

MIDTERM EXAMINATION

Spring 2010

IT430- E-Commerce (Session - 6)

Solved

Question No: 1 (Marks: 1) - Please choose one For which of the following we need to know the classification of E-commerce? ► Market planning strategy ► Build Mission statement ► Management strategy ► none (not sure ) Question No: 2 ( Marks: 1 ) - Please choose one Switch is a device that joins multiple computers together within one local area network (LAN). ► True (page 4) ► False Question No: 3 ( Marks: 1 ) - Please choose one In which protocol, the messages are not deleted from email server. ► SMTP ► POP3 ► IMAP (page 18) ► ICMP Question No: 4 ( Marks: 1 ) - Please choose one How can you open a link in a new browser window? ► <a href="/url" target="new"> ► <a href="/url" target="_blank"> (page 33) ► <a href="/url" new> ► None of these Question No: 5 ( Marks: 1 ) - Please choose one What does the Target= “_top” tag perform?

► Loads the new page into the same frame ► Loads the new page into the entire window (page 33) ► Loads the new page into a new browser window ► All of the above Question No: 6 ( Marks: 1 ) - Please choose one Which attribute is used in a tag to control the layout of element? ► view ► css (PAGE 39) ► Style ► Layout Question No: 7 ( Marks: 1 ) - Please choose one Choose the correct HTML code line which left-align the content inside a tablecell. ► <td leftalign> ► <td valign="left"> ► <td align="left">(PAGE 26) ► <tdleft> Question No: 8 ( Marks: 1 ) - Please choose one

Page 306: A Mega File of It for Current Quizzes

Where in an HTML document is the correct place to refer to an external style sheet? ► In the <body> section ► At the end of the document ► In the <head> section (PAGE 39) ► At the top of the document Question No: 9 http://www.vustudents.net ( Marks: 1 ) - Please choose one When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called ► Local Variables ► Global Variables ► Local and Global ► None of the above ref http://en.wikipedia.org/wiki/Local_variable Question No: 10 ( Marks: 1 ) - Please choose one Constructor is defined as the initializing function used to create…........ ► Instance of object ► Copy of object ► Instance / copy of object (page 69) ► Shallow copy of object Question No: 11 ( Marks: 1 ) - Please choose one What does XML stand for? ► eXtra Modern Link ► X-Markup Language ► eXtensible Markup Language (page 74) ► Example Markup Language Question No: 12 ( Marks: 1 ) - Please choose one For which of following purpose the Firewall is used ? ► Efficient working ► Protection against security attacks (page 95) ► Networking purpose ► None of these Question No: 13 ( Marks: 1 ) - Please choose one PPP stands for ► Point to Point Protocol (page 98) ► Post to Post Protocol ► Point to Post Protocol ► None of these Question No: 14 ( Marks: 1 ) - Please choose one Which of the following is NOT processed on the client side? ► Cookies ► JavaScript ► CGI scripts (page 79) ► Applets Question No: 15 ( Marks: 1 ) - Please choose one Firewall is used to I - examine the data entering the network II - examine the data leaving the network III - filter the data according to certain rules ► I, II and III (page 96)

Page 307: A Mega File of It for Current Quizzes

► I only ► I and III only ► I and II only Question No: 16 ( Marks: 1 ) http://www.vustudents.net- Please choose one Which firewall uses strong user authentication to verify identity of a host attempting to connect to the network? ► Packet filter firewall ► Circuit level firewall ► Application gateway firewall (page 96) ► Hybrid firewall Question No: 17 ( Marks: 1 ) - Please choose one Bus networks is same as the system bus of a computer. ► True ► False (page 14) Question No: 18 ( Marks: 1 ) - Please choose one In Style Sheets, How do you add a background color for all "<h1>" elements? ► all.h1 {background-color:#FFFFFF} ► h1.all {background-color:#FFFFFF} ► h1 {background-color:#FFFFFF}(page 47) ► h1 {bgcolor:#FFFFFF} Question No: 19 ( Marks: 1 ) - Please choose one How do you make each word in a text start with a capital letter? ► text-transform:capitalize ► text-transform:first_capitalize. (page 46) ► Cann’t be possible with CSS ► text-transform:uppercase Question No: 20 ( Marks: 1 ) - Please choose one MAC address is written in Binary form 0-1 ► Decimal form 0-9 ► Hexadecimal form 0-f ► (page 13) None of these ► Question No: 21 ( Marks: 2 ) What is a web server? Answer : Web server – machine that services internet request. Web server – machine that services internet request

web server is a machine that serves up the web page requests of a client on the internet. It is a

combination of hardware and software. Decision as regards the type of a web server is largely

dependent on the volume and type of web activities. So, transaction processing sites generating

dynamic pages with high traffic volumes would need web server software that is more efficient and can

easily be upgraded.

Question No: 22 ( Marks: 2 ) What does ‘parseFloat(string)’ And NaN mean? The parseFloat() function parses a string and returns a floating point number. This function determines if the first character in the specified string is a number. If it is, it parses the string until it reaches the end of the number, and returns the number as a number, not as a string. The NaN property represents "Not-a-Number" value. This property indicates that a value is not a legal number.

Page 308: A Mega File of It for Current Quizzes

Question No: 23 ( Marks: 3 ) Write at least three rules for writing an XML code. Rules for writing an XML code

-All elements must be properly nested <outer><inner>content</inner></outer>

-All attribute values must be quoted <FRIES SIZE=“LARGE”>

-All elements with empty content must be identified by ending in /> Question No: 24 ( Marks: 3 ) How ‘Man in The middle Attacks’ operates? Man in the middle attacks

In it the attacker is able to monitor, capture and control data between sending and receiving

machines. He may apply IP address spoofing technique to divert the packets to its machine, then

modify the packets and resend the misleading information to the actual client. Another form of man-

in-the-middle attack is where the hacker is able to substitute the IP address of a genuine web site with

the IP address of his own web site due to some security hole in the software that runs on a domain

name server. A client would think that he is communicating or receiving the information form a

genuine web site, though it would not be the case actually.

Question No: 25 ( Marks: 5 ) Write the code for a web page displaying a button named "Testing". After clicking that button an alert should be displayed saying "The test is successful". <html> <head> <script type="text/javascript"> function sndAlert() { window.alert("The test is successful!!!"); } </script> </head> <body> <FORM NAME="form1"> <INPUT TYPE="Button" name="showAlert" VALUE="Show Alert" onclick="sndAlert()"> </FORM> </body> </html> Question No: 26 ( Marks: 5 ) Differentiate between front end and back end. Answer: Front end consists of that information which is visible to the user and he can interact with the same through some interface. The back end comprises that information which resides on the server side and is used to create certain dynamic results for the user. It would include different programs or scripts that may be developed in different languages/tools. Backend is mainly used for two purposes – for querying with the databases and for the maintenance of state. We can use

Page 309: A Mega File of It for Current Quizzes

different tools (ASP, JSP etc.) for that purpose depending upon their respective advantages/disadvantages.

MIDTERM EXAMINATION

Spring 2010

IT430- E-Commerce (Session - 5)

Question No: 1 ( Marks: 1 ) - Please choose one

Network addresses 128--- 191 range belongs to which of the following class networks?

► A

► B (page 10)

► C

► E

Question No: 2 ( Marks: 1 ) - Please choose one

Which of the following is true for Class A:

► Network 01 byte and 03 hosts (page 10)

► Network 02 bytes and 02 hosts

► Network 03 bytes and 01 host

► None of these

Question No: 3 ( Marks: 1 ) - Please choose one

Which one is not included in the networking topologies?

Page 310: A Mega File of It for Current Quizzes

► Star Topology

► Bus Topology

► Media Topology (page 14)

► Ring Topology

Question No: 4 ( Marks: 1 ) - Please choose one

What is the correct HTML for making a hyperlink?

► <a name="http://www.vu.edu.pk”>Virtual university</a>

► <a href=" http://www.vu.edu.pk "> Virtual university </a> (page 23)

► <a>http://www. vu.edu.pk </a>

► <a url="http://www. vu.edu.pk "> Virtual university of pakistan</a>

Question No: 5 ( Marks: 1 ) - Please choose one

What is the correct HTML for making a text input field?

► <textinput type="text">

► <input type="text"> (page 27)

► <input type="textfield">

► <textfield>

Question No: 6 ( Marks: 1 ) - Please choose one

If we leave out the target attribute in frame tag and link was clicked ,the document loads into the

window

► In Same page (page 37)

► In other blank page.

► To display browser error.

Page 311: A Mega File of It for Current Quizzes

► All of the options.

Question No: 7 ( Marks: 1 ) http://www.vustudents.net - Please choose one

Where in an HTML document is the correct place to refer to an external style sheet?

► In the <body> section

► At the end of the document

► In the <head> section (repeated )

► At the top of the document

Question No: 8 ( Marks: 1 ) - Please choose one

How do you write a conditional statement for executing some statements only if "i" is equal to 5?

► if i=5

► if i=5 then

► if i==5 then

► if (i==5)

ref

http://www.ex-designz.net/test_page.asp?tid=65

Question No: 9 ( Marks: 1 ) - Please choose one

Which of the following is used to get remote access of any computer on a network?

► Trojan Horse

► Backdoor

Page 312: A Mega File of It for Current Quizzes

► Virus

► All of these (page 94)

Question No: 10 ( Marks: 1 ) - Please choose one

PPP stands for

► Point to Point Protocol (repeated )

► Post to Post Protocol

► Point to Post Protocol

► None of these

Question No: 11 ( Marks: 1 ) - Please choose one

JavaScript is mainly a ___________ language.

► Server Side Scripting

► Cross Side Scripting

► Client Side Scripting (page 79)

► both Cross and Server Side Scripting

Question No: 12 ( Marks: 1 ) - Please choose one

Inside which HTML element do we put the JavaScript?

► <scripting>

► <javascript>

► <script> (page 57)

► <js>

Question No: 13 ( Marks: 1 ) http://www.vustudents.net - Please choose one

Page 313: A Mega File of It for Current Quizzes

a++; is the same as which of the following?

► a=a*1;

► a=a+2;

► a=1+2;

► a=a+1;

ref

http://www.academictutorials.com/answers.asp?id=6

Question No: 14 ( Marks: 1 ) - Please choose one

If a web server is bombarded with thousands of HTTP requests, that would be an example of --------------

-.

► sniffing

► password attack

► man in the middle attack

► denial of service attack (page 95)

Question No: 15 ( Marks: 1 ) - Please choose one

Outside attacks on a network include the following, EXCEPT --------------- .

► Password attack

► DoS

► Back doors (page 95)

► IP spoofing

Question No: 16 ( Marks: 1 ) - Please choose one

Digital signature uses --------- .

► Symmetric cryptography

Page 314: A Mega File of It for Current Quizzes

► Private key cryptography

► Public key cryptography

► Hash function

ref

http://www.digistamp.com/signature.htm

http://ecommerce.hostip.info/pages/271/Cryptography-Public-Private-Key.html

Question No: 17 ( Marks: 1 ) - Please choose one

In star topology, If hub fails, the entire network also fails.

► True

► False

ref

http://www.exforsys.com/tutorials/networking/star-topology.html

Question No: 18 ( Marks: 1 ) - Please choose one

Which one is the correct CSS syntax?

► h1 {font-size:72pt}

► h1:font-size=72pt

► {h1:font-size=72pt}

► {h1;font-size:72pt}

ref

http://uk.answers.yahoo.com/question/index?qid=20100308120234AAPKmAf

Question No: 19 ( Marks: 1 ) - Please choose one

Page 315: A Mega File of It for Current Quizzes

In CSS, How do you make each word in a text start with a capital letter?

► text-transform:capitalize

► text-transform:uppercase (correct )

► text:capitalize

► You can't do that with CSS

REFERENCE

http://www.ex-designz.net/test_grade.asp?tid=37 (question 24 in this link )

Question No: 20 ( Marks: 1 ) - Please choose one

Which of the following is the default alignment in HTML?

► Left

► Center

► Right

► None

REFERENCE

align = left|center|right|justify|char [CI]

This attribute specifies the alignment of data and the justification of text in a cell. Possible values:

• left: Left-flush data/Left-justify text. This is the default value for table data.

• center: Center data/Center-justify text. This is the default value for table headers.

• right: Right-flush data/Right-justify text.

• justify: Double-justify text.

• char: Align text around a specific character. If a user agent doesn't support character alignment,

behavior in the presence of this value is unspecified.

Question No: 21 http://www.vustudents.net ( Marks: 2 )

What is Term ‘Catalog Display’ means? (page 92)

A Static catalog is a simple list written in HTML. One has to edit the HTML code to change it. A

dynamic catalog stores information about items in a database usually on a different computer

Page 316: A Mega File of It for Current Quizzes

accessible by the web server. It can provide photos, detailed description and search facility about the

availability of items.

Question No: 22 ( Marks: 2 )

What is meant by a constructor? (page 69)

It is initializing function used to create instance of an object. It is after the name of the object whose

constructor it is.

Question No: 23 ( Marks: 3 )

What is meant by ‘Shopping Cart’ in context of e commerce? (page 92)

shopping cart was used wherein the user had to remember and type certain information. It is now

replaced by electronic shopping cart/basket that keeps record of the items the customer has selected

and allows customers to view the details of the items selected. The customer can add new items or

remove items. To order an item, a customer simply clicks at that item option. All details of an item,

including its price, product no. and order identifying information are stored automatically in the cart.

Question No: 24 ( Marks: 3 )

We have an array named my Array where this sentence is stored. “Welcome to Virtual University!”

If we apply str.split(’’) method.

What will be the output of str.split(’’)myArray(4) and str.split(’’)myArray(2) respectively.

Str.Split split the string based on the blank spaces.

str.split(’’)myArray(4) = blank

str.split(’’)myArray(2) = virtual

Page 317: A Mega File of It for Current Quizzes

Question No: 25 ( Marks: 5 )

Describe the importance of Cryptography in internet data transfer security in E-Commerce?

It is a collection of mathematical techniques used to ensure confidentiality of information. The

process of scrambling a message with the help of a key is called Encryption.

Now a days as internet is widely used. So danger of data safety and serurity also rose. Compare to its

earlier use.

It provide the Transaction Integrity. Tranasction detail of both the parties can be verified which help

to built the confidence between business community.

It provide Privacy like it provide controls to prevent third parties from geting access to the

information within the transaction

Without cryptography, it is doubtful that banks, businesses and individuals would feel safe doing

business online.

Cryptography provides the confidence to the customer that their data is safe and secure. Otherwise

due to lack of confidence and doubt e-commerce business can not flourish.

Question No: 26 ( Marks: 5 )

Write a list of comparison operators in JavaScript with symbols.

Comparison operators

‘==’ for Equal

‘!=’ for not equal

‘< ‘ for Less than

‘<=’ for less than equal

Page 318: A Mega File of It for Current Quizzes

‘>’ for Greater than

‘>=’ for Greater than equal

MIDTERM EXAMINATION

Spring 2009

IT430- E-Commerce (Session - 4)

Question No: 1 ( Marks: 1 ) - Please choose one

In

datalink layer, data packets are placed inside

► Data frames (page 6)

► Data boxes

► Data streams

► None of these

Question No: 2 ( Marks: 1 ) - Please choose one

Which of these is the correct HTML code for creating a reset button?

► <input type =”button” name=”reset” value=”reset”>

► <input type=”resetButton” value=”Clear”>

► <input type=”reset” value=”reset”> (page 26)

► <input type=”button” name=”reset” value=”clear”>

Page 319: A Mega File of It for Current Quizzes

Question No: 3 ( Marks: 1 ) - Please choose one

…..tag is used into …….tag because a row contains multi cells and to fill up these cells with data.

► TD…… TR

► TR…… TD (page 25)

► TD…… TG

► TG…… TR

Question No: 4 ( Marks: 1 ) - Please choose one

Individuals who write programs or manipulate technologies to gain unauthorized access to computers

and networks are --------------- .

► administrators

► experts

► hackers (page 54)

► coders

Question No: 5 ( Marks: 1 ) - Please choose one

Which tag is used for the hidden fields?

► <FIELD>

Page 320: A Mega File of It for Current Quizzes

► <TEXT>

► <INPUT> page 88

► <HIDDEN>

<INPUT TYPE= "HIDDEN" NAME= "Shirt1" VALUE="25">

Question No: 6 ( Marks: 1 ) - Please choose one

What is a correct way of referring to a stylesheet called "mystyle.xsl" ?

► <?xml-stylesheet type="text/xsl" href="mystyle.xsl" ?>

► <link type="text/xsl" href="mystyle.xsl" />

► <stylesheet type="text/xsl" href="mystyle.xsl" />

► <?stylesheet type="text/xsl" href="mystyle.xsl" ?> page 39

<Link Rel="stylesheet" Type="text/css" href="mystyles.css">

Question No: 7 ( Marks: 1 ) - Please choose one

Which of them is NOT a predefined object?

► Document

► Date (repeated)

► Loop

► Array

Page 321: A Mega File of It for Current Quizzes

Question No: 8 ( Marks: 1 ) - Please choose one

Which of these is not a comparison operator?

► <

► >

► = (repeated)

► !=

Question No: 9 ( Marks: 1 ) - Please choose one

Var

d = new date()

Which of the following is correct about the d variable?

► instance of new

► instance of Date() method

► instance of Date object (repeated)

► Simple Variable

Question No: 10 ( Marks: 1 ) - Please choose one

When you declare a variable within a function, the variable can only be accessed within that function.

When you exit the function, the variable is destroyed. These variables are called

► Local Variables (repeated)

► Global Variables

Page 322: A Mega File of It for Current Quizzes

► Local and Global

► None of the above

Question No: 11 ( Marks: 1 ) - Please choose one

Which of the following , is condition part of given For loop

for (i = 0; i <= 5; i++).

► i=0.

► i++.

► i<=5.

► (i = 0; i <= 5; i++).

Question No: 12 ( Marks: 1 ) - Please choose one

What is the correct JavaScript syntax to write "Virtual University of Paistan"?

► document.write("Virtual University of Paistan ")

► ("Virtual University of Paistan ")

► " Virtual University of Paistan "

► response.write("Virtual University of Paistan ")

Question No: 13 ( Marks: 1 ) - Please choose one

Which of the following is NOT valid HTML code line?

► <frameset rows="16%,84%">

► <frameset columns="16%,84%">

► <frameset cols="100,150">

Page 323: A Mega File of It for Current Quizzes

► <frameset cols=”50%,50%” rows=”16%,84%”>

Ref

http://www.academictutorials.com/answers.asp?id=1

Question No: 14 ( Marks: 1 ) - Please choose one

CSS

is a breakthrough in Web design because it allows developers to control the---------

► Processing speed on client side

► Data grid view on client side

► Style and layout of home page.

► Style and layout of multiple Web pages (repeated)

Question No: 15 ( Marks: 1 ) - Please choose one

Which HTML tag is used to define an internal style sheet?

► <css>

► <script>

► <style> (repeated)

► <sheet>

Question No: 16 ( Marks: 1 ) - Please choose one

What is the correct HTML tag for adding a background color?

► <background>yellow</background>

► <body bgcolor="yellow"> (repeated)

Page 324: A Mega File of It for Current Quizzes

► <body color="yellow">

► None

Question No: 17 ( Marks: 1 )

What does this mean?

padding-right

Question No: 18 ( Marks: 1 )

Do

you agree or not that using Cascading Style Sheets one can apply an image to sections of one’s page or

even to individual words.

Question No: 19 ( Marks: 2 )

Suppose, there is an applet at "http://www.vu.edu.pk/demo.class". Write the code to include this applet

in your web page.

<APPLET CODE= “http://www.vu.edu.pk/demo.class” width=100 height=200> DEMO </APPLET>

Question No: 20 ( Marks: 3 )

What do you think, is there any difference between Static and Dynamic IP Address assignment? Discuss.

Question No: 21 ( Marks: 5 )

What is cryptography? What techniques are used for cryptography?

Page 325: A Mega File of It for Current Quizzes

Question No: 22 ( Marks: 10 )

Analyze the following given code showing some Cascading Style Sheets tags and explain its lines one

by one.

<html>

<head>

<style type="text/css">

h1 {text-decoration: overline}

h2 {text-decoration: line-through}

h3 {text-decoration: underline}

a {text-decoration: none}

</style>

</head>

<body>

<h1>This is header 1</h1>

<h2>This is header 2</h2>

<h3>This is header 3</h3>

<p><a href="http://www.w3schools.com/default.asp">This is a link</a></p>

</body>

</html>

Page 326: A Mega File of It for Current Quizzes

MIDTERM EXAMINATION

Spring 2010

IT430- E-Commerce (Session - 6)

Question No: 1 ( Marks: 1 ) - Please choose one

In star network features a central connection point called a "hub" that ought to be only a hub.

_ True

_ False

Question No: 2 ( Marks: 1 ) - Please choose one

Switch is a device that joins multiple computers together within one local area network (LAN).

_ True (page 15)

_ False

Question No: 3 ( Marks: 1 ) - Please choose one

Switch generally contains more "intelligence" than a hub.

_ True

_ False

Question No: 4 ( Marks: 1 ) - Please choose one

In which protocol, the messages are not deleted from email server.

_ SMTP

_ POP3

_ IMAP (page 18)

Page 327: A Mega File of It for Current Quizzes

_ ICMP

Question No: 5 ( Marks: 1 ) - Please choose one

Which protocol does Virtual university use to send email to student Accounts?

_ SMTP

_ POP

_ IMAP

_ TCP

Question No: 6 ( Marks: 1 ) - Please choose one

For which one of the following,<MARQUEE ...> tag can work better

_ News headlines

_ Announcements

_ Sound pulgin

_ Movie controls

Question No: 7 ( Marks: 1 ) - Please choose one

Can you add a style in a single place on a page ?

_ Yes, with a style-definition written into the tag

_ Yes, with a global style definition that redefines the tag.

_ No - CSS can only be defined for entire pages.

Question No: 8 ( Marks: 1 ) - Please choose one

Which CSS tag is used to place an image that would remain when user scrolls down or up the page?

_ background-attachment: fixed

_ background-attachment: scroll

Page 328: A Mega File of It for Current Quizzes

_ background-attachment: up

_ All of these

Question No: 9 ( Marks: 1 ) - Please choose one

What shall come in blanks for proper result,

Here blanks are numbered with 1,2 and 3

<html>

<head>

<SCRIPT language="JavaScript">

Var num1, var num2

Document.container .result.value=parseFloat(num1)-parseFloat(num2)

</script>

</head>

<body>

<FORM name=”---------1-----------”>

<input type=”----------2-------” name=”-------3---------” maxlength=”5”>

</form>

</body>

</html>

_ container, text and result

_ result, value and container

_ container , button and value

_ result, container and text

Question No: 10 ( Marks: 1 ) - Please choose one

Page 329: A Mega File of It for Current Quizzes

Correct syntax of "for" loop is :

_ for (i = 0; i <= 5)

_ for i = 1 to 5

_ for (i <= 5; i++)

_ for (i = 0; i <= 5; i++)

REF

http://www.ex-designz.net/test_grade.asp?tid=65

Question No: 11 ( Marks: 1 ) - Please choose one

CGI stands for

_ Common Gate Information

_ Common Gate Interface (PAGE 82)

_ Common Goal Interest

_ Common Global Interaction

Question No: 12 ( Marks: 1 ) - Please choose one

Which of the following property falls in HTTP?

_ Stateless

_ Stateful

_ Temporary

_ All of these

Question No: 13 ( Marks: 1 ) - Please choose one

What is a correct way of referring to a stylesheet called "mystyle.xsl" ?

_ <?xml-stylesheet type="text/xsl" href="mystyle.xsl" ?>

Page 330: A Mega File of It for Current Quizzes

_ <link type="text/xsl" href="mystyle.xsl" />

_ <stylesheet type="text/xsl" href="mystyle.xsl" />

_ <?stylesheet type="text/xsl" href="mystyle.xsl" ?>

Question No: 14 ( Marks: 1 ) - Please choose one

Which of the following does not interpret its code?

_ ASP

_ PHP

_ JSP (page 85)

_ Coldfusion

Question No: 15 ( Marks: 1 ) - Please choose one

Asymmetric cryptography is also called -------------- .

_ Public key cryptography (PAGE 100)

_ Private key cryptography

_ Substitution cryptography

_ Transposition

Question No: 16 ( Marks: 1 ) - Please choose one

Digital signature uses --------- .

_ Symmetric cryptography

_ Private key cryptography

_ Public key cryptography (PAGE 100)

Page 331: A Mega File of It for Current Quizzes

_ Hash function

Question No: 17 ( Marks: 1 ) - Please choose one

Which one of the following is NOT a valid JavaScript variable?

_ _name1

_ $studentScore

_ first_name

_ 2ndName

Question No: 18 ( Marks: 1 ) - Please choose one

Which of these is the correct HTML code for creating a reset button?

_ <input type =”button” name=”reset” value=”reset”>

_ <input type=”resetButton” value=”Clear”>

_ <input type=”reset” value=”reset”> (page 61)

_ <input type=”button” name=”reset” value=”clear”>

Question No: 19 ( Marks: 1 ) - Please choose one

Why we use reset tag in HTML?

_ To remove the text written in Notepad.

_ To remove the text written in between <body> and </body>tag.

_ To remove the text written in between <head> and </head> tag.

_ To remove the text written in between <form> and </form> tag. (page 61)

Question No: 20 ( Marks: 1 ) - Please choose one

Page 332: A Mega File of It for Current Quizzes

http://cs.vu.edu is an example of

_ Two zone domain name

_ Three zone domain name

_ Four zone domain name

_ Five zone domain name

Question No: 21 ( Marks: 2 )

How

Certification Authority (CA) issues the certificates? Describe briefly

Question No: 22 ( Marks: 2 )

Discuss the role of child element tags while in writing XML code.

Question No: 23 ( Marks: 3 )

Performance of web servers can be evaluated mainly on the basis of two factors. What are they?

Question No: 24 ( Marks: 3 )

Write a function for the addition of two numbers?

Question No: 25 ( Marks: 5 )

Write the JavaScript code which will display the following in a web page using a FOR loop:

The number is 0

The number is 1

The number is 2

The number is 3

The number is 4

The number is 5

Page 333: A Mega File of It for Current Quizzes

Question No: 26 ( Marks: 5 )

What is the difference between an interpreted and a compiled language? Give one example of

each.

MIDTERM EXAMINATION Spring 2009

IT430- E-Commerce (Session - 2)

Question No: 1 __ ( Marks: 1 ) - Please choose one

Academic institutions, religious organizations and government using ----------------------e-commerce

classification

Busi ness-to-Business(B2B)

Intra Business

Non Business EC (page 2)

Busi ness-to-consumer(B2C)

Question No: 2___ ( Marks: 1 ) - Please choose one

Network addresses 128--- 191 range belongs to which of the following class networks?

A

B (page 10)

C

E

Question No: 3 ( Marks: 1 ) - Please choose one

Page 334: A Mega File of It for Current Quizzes

Where in an HTML document is the correct place to refer to an external style sheet?

In the <body> section

At the end of the document

In the <head> section

At the top of the document

Ref

http://www.ex-designz.net/test_grade.asp?tid=37

Question No: 4 __ ( Marks: 1 ) - Please choose one

Constructor is defined as the initializing function used to create…..........

Instance of object

Copy of object

Instance / copy of object (page 69)

Shallow copy of object

Question No: 5 ( Marks: 1 ) - Please

choose one What does DTD stand for?

Do The Dance.

Dynamic Type Definition.

Data Type Definition. (page 76)

Direct Type Définition.

Question No: 6 __ ( Marks: 1 ) - Please choose one Which one of

following file is used to translate XML:

Page 335: A Mega File of It for Current Quizzes

DTD

XSL (repeated )

XML parser

Browser

Question No: 7 __ ( Marks: 1 ) - Please choose one

In which of the following language ,XML parser is usually written.

VB.net

Java (page 77)

Asp.net

C++

Question No: 8 __ ( Marks: 1 ) - Please choose one

In _________key cryptography, everyone has access to all the public keys

Public (page 100)

Private

Symmetric

Certified

Question No: 9___ ( Marks: 1 ) - Please choose one

How do you define a numerical value?

Page 336: A Mega File of It for Current Quizzes

var mynum = new Math;

var mynum = Math(6);

var mynum = 6;

Math.mynum = 6;

Question No: 10___ ( Marks: 1 ) - Please choose one

What is 17%5 ?

2

3

85

84

Question No: 11___( Marks: 1 ) - Please choose one

An array can contain ---------- .

only text

only numbers

only numbers or text

any valid variable

ref

http://java.sun.com/docs/books/jls/second_edition/html/arrays.doc.html

Question No: 12 ( Marks: 1 ) - Please choose

one Which tag is used for the hidden fields?

Page 337: A Mega File of It for Current Quizzes

<FIELD>

<TEXT>

<INPUT> (page 88)

<HIDDEN>

Question No: 13 __ ( Marks: 1 ) - Please choose one

Packet filter firewall operates at

a) data link layer

b) network layer

c) transport layer

a and b only (page 5)

c only

b and c only

a, b and c

Question No: 14 ( Marks: 1 ) - Please choose one

Which one has the functionality to redirect the filled information to an other page.

Submit button

Reset button

Radio button

None of the given

Question No: 15 ( Marks: 1 ) - Please choose one

Page 338: A Mega File of It for Current Quizzes

Due to which characteristics, ATM network are covered under E-commerce ?

Exchange of information through computer networks

Internet.

Exchanging of products, services.

None of the above.

Question No: 16 __ ( Marks: 1 ) - Please choose one

IP, RIP, and ARP protocols work on

Application layer

Session layer

Network layer (page 6)

Data link layer

Question No: 17 __ ( Marks: 1 )

Shortly Explain RIP?

Question No: 18 __ ( Marks: 1 )

In HTML , for displaying information systematically which tag do we usually use ?

Question No: 19 ( Marks: 2 )

How Certification Authority (CA) issues the certificates? Describe briefly

Question No: 20 __ ( Marks: 3 )

What is MAC address? How does it help server to identify the client?

Question No: 21 ( Marks: 5 )

Page 339: A Mega File of It for Current Quizzes

How can we classify E-Commerce by the nature of its transactions? Give at least one real life

example for each of its classification.

Question No: 22 ( Marks: 10 )

Analyze the following given code showing some Cascading Style Sheets tags and explain its

lines one by one.

<html>

<head>

<style type="text/css">

h1 {text-decoration: overline}

h2 {text-decoration: line-through}

h3 {text-decoration: underline}

a {text-decoration: none}

</style>

</head>

</html>

<body>

<h1>This is header 1</h1>

<h2>This is header 2</h2>

<h3>This is header 3</h3>

<p><a href="http ://www.w3schools.com/default.asp">This is a link</a></p>

</body>

IDTERM EXAMINATION Spring 2009

IT430- E-Commerce (Session - 1)

Page 340: A Mega File of It for Current Quizzes

Question No: 1 __ ( Marks: 1 ) - Please choose one

Marketing plan should be same for all E-commerce classification.

True

False

Question No: 2 ( Marks: 1 ) - Please choose one

Identify the networking device which regenerates the signals if these become

weak.

Hub

Switch

Router

Repeater (page 15)

Question No: 3 ( Marks: 1 ) - Please choose one

How can you open a link in a new browser window?

<a href="url" target="new">

<a href="url"target="_blank"> (page 33)

<a href="url"new>

None of these

Question No: 4 ( Marks: 1 ) - Please choose one

Page 341: A Mega File of It for Current Quizzes

Content pages relate to which of the following tag?

<iframe>

<Frame>

<frameset>

<noframes>

Question No: 5 __ ( Marks: 1 ) - Please choose one

What is the correct HTML for referring to an external style sheet?

<style src=mystlye.css>

<link re = “stylesheet” type= “text/css” herf= “mystyle.css”>

<stlyesheet> mystyle.css</stlyesheet>

All of these

Ref

http://www.ex-designz.net/test_grade.asp?tid=37

Question No: 6 __ ( Marks: 1 ) - Please choose one

Choose the correct HTML code line which left-align the content inside a table cell.

<td leftalign>

<td valign="left">

<td align="left"> (page 26)

<tdleft>

Page 342: A Mega File of It for Current Quizzes

Question No: 7 ( Marks: 1 ) - Please choose one

In a Frameset code, do the BODY tags belong inside or outside of the NOFRAMES tag pair?

Inside because an HTM Document can only include one or the other.

Outside, to be seen by the older browsers [NN version 1 and IE version 2].

Outside because the W3C says that to be valid.

Contain a BODY tags pair.

Ref

http://www.tjkdesign.com/articles/frames/quiz.asp

Question No: 8 ________________ ( Marks: 1 ) - Please choose one

In CSS, the font-style property can make text what?

Bigger.

Italic.

Different colors.

Change size.

Ref

http://www.w3schools.com/css/css_font.asp

Question No: 9 ( Marks: 1 ) - Please choose one

Which CSS tag is used to place an image that would remain when user scrolls down or up the page?

Page 343: A Mega File of It for Current Quizzes

background-attachment: fixed

background-attachment: scroll

background-at tachment : up

All of these

Question No: 10 ( Marks: 1 ) - Please choose one

Which of the following ,in Javascript, we could not create our own?

Textboxes

Dropdown

Object

Image

Ref

http://www.w3schools.com/js/js_objects.asp

Question No: 11 ( Marks: 1 ) - Please choose one

How do you write a conditional statement for executing some statements only if "i" is

equal to 5?

if i=5

if i=5 then

if i==5 then

if (i==5) (page 58)

Ref

Page 344: A Mega File of It for Current Quizzes

http://www.ex-designz.net/test_grade.asp?tid=65

Question No: 12 __ ( Marks: 1 ) - Please choose one

Constructor is defined as the initializing function used to create…..........

Instance of object

Copy of object

Instance / copy of object (page 69)

Shallow copy of object

Question No: 13 ( Marks: 1 ) - Please choose one

Which one of following file is used to translate XML:

DTD

XSL (page 77)

XML parser

Browser

Question No: 14 ( Marks: 1 ) - Please choose one

How can you reference part of a string?

text.substr(5,6);

text.part(5,6)

text. piece(5 ,6)

text.split(5,6);

http://php.net/manual/en/function.substr.php

Page 345: A Mega File of It for Current Quizzes

Question No: 15___( Marks: 1 ) - Please choose one

Which one is the correct CSS syntax?

h1 {font-size:72pt} (page 39)

h1:font-size=72pt

{h1:font-size=72pt}

{h1;font-size:72pt}

Question No: 16 __ ( Marks: 1 ) - Please choose one

In the communication between two computers on a network, CRC is calculated at

Sender’s side

Receiver’s side

Both sender and receiver sides

Neither on sender nor on receiver side (100% tuka )

Question No: 17 __ ( Marks: 1 )

What does this mean document.write("str.charAt(3) : "+str.charAt(3) +"<P>"); ?

Question No: 18 __ ( Marks: 1 )

What does this term mean "Non-repudiation"?

Question No: 19 __ ( Marks: 2 )

What are servlets?

Page 346: A Mega File of It for Current Quizzes

Question No: 20 ( Marks: 3 )

What are the three methods for using style sheets with a web page?

Question No: 21 __ ( Marks: 5 )

Identify protocol stack used in each layer of OSI model?

Question No: 22 ( Marks: 10 )

"The role of a Certification Authority is similar to a passport office." Explain it.

MIDTERM EXAMINATION Spring 2009

IT430- E-Commerce (Session - 4)

Question No: 1 ( Marks: 1 ) - Please choose one In data link layer, data packets are placed inside ► Data frames (PAGE 6) ► Data boxes ► Data streams ► None of these

Question No: 2 ( Marks: 1 ) - Please choose one Which of these is the correct HTML code for creating a reset button? ► ► ► ► Question No: 3 ( Marks: 1 ) - Please choose one …..tag is used into …….tag because a row contains multi cells and to fill up these cells with data. ► TD…… TR ► TR…… TD ► TD…… TG ► TG…… TR RFF

http://www.w3.org/TR/WCAG10-HTML-TECHS/ Question No: 4 ( Marks: 1 ) - Please choose one Individuals who write programs or manipulate technologies to gain unauthorized access to computers and networks are --------------- . ► administrators

Page 347: A Mega File of It for Current Quizzes

► experts ► hackers (PAGE 94) ► coders Question No: 5 ( Marks: 1 ) - Please choose one Which tag is used for the hidden fields? ► ►

► ► Question No: 6 ( Marks: 1 ) - Please choose one What is a correct way of referring to a stylesheet called "mystyle.xsl" ? ► <?xml-stylesheet type="text/xsl" href="/mystyle.xsl" ?> ► ► ► <?stylesheet type="text/xsl" href="/mystyle.xsl" ?> Question No: 7 ( Marks: 1 ) - Please choose one Which of them is NOT a predefined object? ► Document ► Date ► Loop ► Array ref http://www.webreference.com/programming/javascript/diaries/15/ Question No: 8 ( Marks: 1 ) - Please choose one Which of these is not a comparison operator? ► < ► > ► = (PAGE 58) ► != Question No: 9 ( Marks: 1 ) - Please choose one

Var d = new date() Which of the following is correct about the d variable?

► instance of new ► instance of Date() method ► instance of Date object ► Simple Variable REF http://www.webreference.com/programming/javascript/diaries/15/

Question No: 10 ( Marks: 1 ) - Please choose one When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called

► Local Variables

► Global Variables

► Local and Global

Page 348: A Mega File of It for Current Quizzes

► None of the above

ref If you declare a variable within a function, the variable can only be accessed ... the variable is destroyed. These variables are called local variables. ... Question No: 11 ( Marks: 1 ) - Please choose one Which of the following , is condition part of given For loop for (i = 0; i <= 5; i++).

► i=0. ► i++. ► i<=5. ► (i = 0; i <= 5; i++). Ref http://www.blackwasp.co.uk/CSharpForLoop.aspx

Question No: 12 ( Marks: 1 ) - Please choose one What is the correct JavaScript syntax to write "Virtual University of Paistan"?

► document.write("Virtual University of Paistan ") ► ("Virtual University of Paistan ") ► " Virtual University of Paistan " ► response.write("Virtual University of Paistan ")

Question No: 13 ( Marks: 1 ) - Please choose one Which of the following is NOT valid HTML code line?

► ,84%"> ► ,84%"> ► ► ,50%” rows=”16%,84%”>

Question No: 14 ( Marks: 1 ) - Please choose one CSS is a breakthrough in Web design because it allows developers to control the--------- ► Processing speed on client side

► Data grid view on client side ► Style and layout of home page. ► Style and layout of multiple Web pages ref http://ezinearticles.com/?Advantages-of-Using-CSS-in-Web-Design&id=1433066

Question No: 15 ( Marks: 1 ) - Please choose one

Which HTML tag is used to define an internal style sheet?

Page 349: A Mega File of It for Current Quizzes

Question No: 16 ( Marks: 1 ) - Please choose one What is the correct HTML tag for adding a background color? ► yellow ► ► ► None Question No: 17 ( Marks: 1 ) What does this mean? (page 49) padding-right padding-right – adds space to the right of the content Question No: 18 ( Marks: 1 ) Do you agree or not that using Cascading Style Sheets one can apply an image to sections of one’s page or even to individual words. Yes! I agree, using CSS one can apply his/her defined design, image or wording to muliple pages of his/her website. Question No: 19 ( Marks: 2 ) Suppose, there is an applet at "http://www.vu.edu.pk/demo.class". Write the code to include this applet in your web page. Question No: 20 ( Marks: 3 ) What do you think, is there any difference between Static and Dynamic IP Address assignment? Discuss. A static IP address is a number (in the form of a dotted quad) that is assigned to a computer by an Internet service provider (ISP) to be its permanent address on the Internet. Computers use IP addresses to locate and talk to each other on the Internet, much the same way people use phone numbers to locate and talk to one another on the telephone. When you want to visit whatis.com, your computer asks a domain name system (DNS) server (think telephone information operator) for the correct dotted quad number (think phone number) for whatis.com and your computer uses the answer it receives to connect to the whatis.com server. Question No: 21 ( Marks: 5 ) What is cryptography? What techniques are used for cryptography? Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized or unwanted person intercepts the message he/she would still not be able to make any sense out of it. Cryptography is thousands of years old. Techniques used for cryptography Substitution In substitution we replace each letter in the message with another to make the message non-understandable. For example, each letter “a” in the message can be replaced with letter “d” and letter “b” with letter “e” and so on. Transposition It is based on scrambling the characters in a message. A transposition system may first write a message into a table row by row then the message can be read and rewritten column by column to make it scrambled.

Page 350: A Mega File of It for Current Quizzes

Question No: 22 ( Marks: 10 ) Analyze the following given code showing some Cascading Style Sheets tags and explain its lines one by one.

<html>

<head>

h1 {text-decoration: overline}

h2 {text-decoration: line-through}

h3 {text-decoration: underline}

a {text-decoration: none}

<body>

This is header 1

This is header 2

This is header 3

This is a link

MIDTERM EXAMINATION

Spring 2010

IT430- E-Commerce (Session - 6)

Solved

Question No: 1 ( Marks: 1 ) - Please choose one

Academic institutions, religious organizations and government using --------------------- e-commerce

classification

► Business-to-Business(B2B)

► Intra Business

Page 351: A Mega File of It for Current Quizzes

► Non Business EC (page 2)

► Business-to-consumer(B2C)

Question No: 2 ( Marks: 1 ) - Please choose one

In which protocol, the messages are not deleted from email server.

► SMTP

► POP3

► IMAP (page 18)

► ICMP

in case of IMAP the message is not deleted in the email server and thus can be reopened from another

location/machine.

Question No: 3 ( Marks: 1 ) - Please choose one

What is the correct HTML tag for adding a background color?

► <background>yellow</background>

► <body bgcolor="yellow"> (page 47)

► <body color="yellow">

► None

Question No: 4 ( Marks: 1 ) - Please choose one

Which HTML tag is used to define an internal style sheet?

► <css>

► <script>

► <style> (Ans)

► <sheet>

reference

http://www.ex-designz.net/test_grade.asp?tid=37 (question no 3)

Page 352: A Mega File of It for Current Quizzes

Question No: 5 ( Marks: 1 ) - Please choose one

What is the correct HTML for making a hyperlink?

► <a href="http://www.w3schools.com">W3Schools</a>

► <a name="http://www.w3schools.com">W3Schools.com</a>

► <a url="http://www.w3schools.com">W3Schools.com</a>

► <a>http://www.w3schools.com</a>

REFERENCE

http://www.w3schools.com/html/html_links.asp

Question No: 6 ( Marks: 1 ) - Please choose one

If we leave out the target attribute in frame tag and link was clicked ,the document loads into the

window

► In Same page (repeated )

► In other blank page.

► To display browser error.

► All of the options.

Question No: 7 ( Marks: 1 ) - Please choose one

What does mean by != comparison operator? http://www.vustudents.net

► Equal to

► Not

► Equal

► Not Equal (page 58)

Page 353: A Mega File of It for Current Quizzes

Question No: 8 ( Marks: 1 ) - Please choose one

What does the string. match (“abc”) object do?

► Concatenates the “abc” word to other “abc” words

► Matches the “abc” words with other “abc” words

► It does replacement of abc word with other words

► All of the above

ref

http://www.regular-expressions.info/reference.html

Question No: 9 ( Marks: 1 ) - Please choose one

var txt="Hello World!" Document. Write (txt.length), it would return the length as.

► 10

► 11

► 12

► 13

REFERENCE

http://www.w3schools.com/js/js_obj_string.asp

Question No: 10 ( Marks: 1 ) - Please choose one

Which of the following property falls in HTTP?

►Stateless (Ans)

► Stateful

► Temporary

► All of these

Question No: 11 ( Marks: 1 ) - Please choose one

Which one of the following certifies the binding between public key and its owner.

►CA (page101)

► KDC

Page 354: A Mega File of It for Current Quizzes

► TLS

► Firewall

Question No: 12 ( Marks: 1 ) - Please choose one

Cyclical Redundancy Check (CRC), takes place in which layer of OSI Model.

► Session Layer

► Transport Layer

► Network Layer

► Data link layer (page 6)

Question No: 13 ( Marks: 1 ) - Please choose one

How can you convert information consisting of comma separated values into an array?

► txtArray = txt.indexOf(',');

► txtArray = txt.split(','); page 70

► txtArray = txt.trim(',');

► txtArray = txt.substring(',');

Question No: 14 ( Marks: 1 ) - Please choose one

The control statement on a while loop is tested

► before each time through the loop

► after each time through the loop

► once at the start

► once at the end

Ref

http://en.wikipedia.org/wiki/While_loop

Question No: 15 ( Marks: 1 ) - Please choose one

Which SQL statement is used to delete data from a database?

Page 355: A Mega File of It for Current Quizzes

► DELETE (page 83)

► COLLAPSE

► REMOVE

► DISCARD

Question No: 16 ( Marks: 1 ) - Please choose one

A program that performs a specific function such as creating invoices/bills or processing payment

received from customers is called a/an ---------------.

► Middleware

► Web Service

► CRM Software

► Appplication Program (page 92)

Question No: 17 ( Marks: 1 ) - Please choose one

Which firewall uses strong user authentication to verify identity of a host attempting to connect to the

network?

► Packet filter firewall

► Circuit level firewall

► Application gateway firewall (page 96)

► Hybrid firewall

Question No: 18 ( Marks: 1 ) - Please choose one

In what form are style rules presented?

Page 356: A Mega File of It for Current Quizzes

► Selector { property: value }

► selector { property= value }

► selector ( property: value )

► selector ( property= value )

Question No: 19 ( Marks: 1 ) - Please choose one

Why we use reset tag in HTML?

► To remove the text written in Notepad.

► To remove the text written in between <body> and </body>tag.

► To remove the text written in between <head> and </head> tag.

► To remove the text written in between <form> and </form> tag.

Reference

http://www.echoecho.com/htmlforms13.htm

Question No: 20 ( Marks: 1 ) - Please choose one

When data moves upward in the OSI stack it is called

► Encapsulation

► De-encapsulation (page 5)

► Synchronization

► None of these

Question No: 21 ( Marks: 2 )

What does PPTP stand for?

Page 357: A Mega File of It for Current Quizzes

Ans (�page98)

PPTP stands for point to point transfer protocol.

Question No: 22 ( Marks: 2 )

What are the keywords to define a variable and a function in JavaScript?

“var” is the keyword used to define a variable in Javascript

e.g var a; “function” is the keyword to define a function in javascript

e.g function myfunction(){ // some code }

Question No: 23 ( Marks: 3 ) http://www.vustudents.net

Identify the object, property and method in the following:

Math.sin(45)

Math.PI

Ans:

Math is the object in above case

PI is the property of Math object

Sin() is the method of Math object

Question No: 24 ( Marks: 3 )

Performance of web servers can be evaluated mainly on the basis of two factors. What are they?

Ans:

Performance of web sever

Performance of web servers can be evaluated mainly on the basis of two factors:

Throughput, which is the number of http requests that a particular server hardware and software can

handle in the unit time; and

Page 358: A Mega File of It for Current Quizzes

Response time, which is the amount of time a web server requires to process one request. Web server

hardware architectures

Question No: 25 ( Marks: 5 )

Write the code for a web page displaying a button named "Testing". After clicking that button an alert

should be displayed saying "The test is successful".

<html> <head> <script type="text/javascript"> function sndAlert() { window.alert("The test is successful!!!"); } </script> </head> <body> <FORM NAME="form1"> <INPUT TYPE="Button" name="showAlert" VALUE="Show Alert" onclick="sndAlert()"> </FORM> </body> </html> Question No: 26 ( Marks: 5 )

What is the difference between an interpreted and a compiled language? Give one example of each.

http://www.vustudents.net

Ans:

In a compiled language we compile to code or convert into machine language using a software called

compiler as we can case C++

Example C++

with interpret language we interpret the code (line by line) at run time using a program called

interpreter browser is an interpreter.

Example Browser…

MIDTERM EXAMINATION

Spring 2009

IT430- E-Commerce (Session - 2)

Page 359: A Mega File of It for Current Quizzes

Question No: 1 __ ( Marks: 1 ) - Please choose one

Enable Virtual private network protocol (VPN) to become a part of

Extranet .(page 98)

Intranet.

Extranet and Intranet.

None of these.

Question No: 2 ( Marks: 1 ) - Please choose one

Content pages relate to which of the following tag?

<iframe>

<Frame>

<frameset> (page 31)

<noframes>

Question No: 3 __ ( Marks: 1 ) - Please choose one

The attributes used by <EMBED . . .> depend on the type of ?

plugin being used

Browser being used (page 38)

ISP being used

Sound/movie being used

Page 360: A Mega File of It for Current Quizzes

Question No: 4 ( Marks: 1 ) - Please choose one

Which of the following is HML tag could n’t be used as CSS tag?

<style>

<h1>

<p>

<a> (page 39)

css coding

<HTML><HEAD>

<STYLE TYPE="text/css">

<!--

H1 { color: blue }

-->

</STYLE>

</HEAD><BODY>

<H1> A blue header </H1>

</BODY></HTML>

H1 { color: blue;

text-align: center; }

H1 { color: blue; text-align: center; }

<STYLE TYPE="text/css">

<!--

.myIndent { margin-left: 1.0in }

-->

</STYLE>

Page 361: A Mega File of It for Current Quizzes

The HTML tags to reference the above .myIndent class is:

<H1 CLASS=myIndent>Indented Header</H1>

<P CLASS=myIndent>Also this whole paragraph would

be indented one inch</P>

<P>but this wouldn't be indented</P>

Question No: 5 ( Marks: 1 ) - Please choose one

Which CSS tag is used to place an image that would remain when user scrolls down or

up the page?

background-attachment: fixed (page 48)

background-attachment: scroll

background-attachment: up

__ _ ___ _ ___ __

Question No: 6___( Marks: 1 ) - Please choose one

What does mean by != comparison operator?

Equal to Not

Equal

Not Equal (page 58)

Question No: 7 ( Marks: 1 ) - Please choose one

For which of following purpose the Firewall is used ?

Page 362: A Mega File of It for Current Quizzes

Efficient working

None of these

Protection against security attacks (page 96)

Networking purpose

Question No: 8 ( Marks: 1 ) - Please choose one

Which one of the following certifies the binding between public key and its owner.

CA (page 101)

KDC

TLS

Firewall

Question No: 9 __ ( Marks: 1 ) - Please choose one

Choose the correct HTML tag to make a text bold

<tbold>

<b> (page 19)

<bld>

<bold>

ref http://www.w3schools.com/quiztest/quiztest.asp?qtest=HTML

Question No: 10 __ ( Marks: 1 ) - Please choose one

Middleware establishes connections between ----------- .

Page 363: A Mega File of It for Current Quizzes

e-commerce software and accounting system (page 92)

e-commerce software and web services web

services and CRM software

ERP and CRM software

Question No: 11 ( Marks: 1 ) - Please choose one

Firewall is used to

I - examin the data entering the network

II - examin the data leaving the network

III - filter the data according to certain rules

I and II only

I, II and III (page 96)

I and III only

I only

Ref http://www.webopedia.com/TERM/F/firewall.html

Question No: 12 ( Marks: 1 ) - Please choose one

When two or more intranets are connected to each other they form a/an ----------

VPN

intranet

internet

extranet (page 2)

Question No: 13 __ ( Marks: 1 ) - Please choose one

Which one specify the amount of space between the edges of the cell and the text inside?

Page 364: A Mega File of It for Current Quizzes

Space tag

CELLSPACING

CELLPADDING

FRAMESPACING

Question No: 14 ( Marks: 1 ) - Please choose one

Which of the following CANNOT be a value for the 'target' attribute in anchor tag?

_new

_top

_blank

_self

ref

• _blank renders the link in a new, unnamed window

• _self renders the link in the current frame (useful for overriding a BASE TARGET)

• _parent renders the link in the immediate FRAMESET parent

• _top renders the link in the full, unframed window

Question No: 15 ( Marks: 1 ) - Please choose

one In what form are style rules presented?

selector { property: value }

selector { property=value }

selector ( property: value )

selector ( property= value )

Page 365: A Mega File of It for Current Quizzes

Question No: 16 __ ( Marks: 1 ) - Please choose one

What is identified by the tag <FRAMESET COLS="20%,60%,20%">?

Horizontal frame

Vertical Frame (page 31)

Top Frame

Bottom Frame

Question No: 17 __ ( Marks: 1 )

What it stands for (W3C)?

Answer

World Wide Web Consortium

Question No: 18 ( Marks: 1 )

Do you agree or not that using Cascading Style Sheets one can apply an image to sections of one’s

page or even to individual words.

Question No: 19 ( Marks: 2 )

Which attribute is used to describe , how many times you want the sound to repeat. Discuss briefly.

Question No: 20 __ ( Marks: 3 )

What are cookies? Why these are used in web development?

Page 366: A Mega File of It for Current Quizzes

Question No: 21 ( Marks: 5 )

What is the difference between physical address and logical address? Support your answer with

at least two examples.

Question No: 22 ( Marks: 10 )

How can we change a Font style of a text? Write complete tag by using an example by yourself.

E-Commerce

Quiz No.1

Lecture 10 to 16 Repeated MCQs ignored

var txt="Hello World!" document.write(txt.length), it would return the length as.

Select correct option:

13

12

11

10

__________ is an event handler in JavaScript.

None of the given

onloading

onpress

Page 367: A Mega File of It for Current Quizzes

onbuttondown

In Java script , New key word is used to create:

Instance of method

Instance of Object

Initialize the Variable

Assign the vale of object

Border-style: specifies the style of all borders in the order _________________.

border top style, border right style, border bottom style, border left style

border top style, border left style, border bottom style, border right style

border bottom style, border right style, border top style, border left style

border top style, border bottom style, border bottom right, border left style

Which is NOT a correct name for an XML element?

<Note>

<1dollar>

All 3 tags are incorrect

<h1>

___________ is a valid JavaScript variable.

first_name

2nd_name

Page 368: A Mega File of It for Current Quizzes

third name

*lastname*

_________ is not a comparison operator.

>

<

!=

=

In CSS, how do you make the text bold?

font:b

font-style:bold

font-size:bold

font-weight:bold

_______________ will display the border having top border = 10 pixels, bottom border =

5 pixels, left border = 20 pixels and right border = 1 pixel.

border-width:10px 1px 5px 20px

border-width:5px 1px 10px 20px

border-width:10px 20px 5px 1px

border-width:5px 20px 10px 1px

The control statement on a while loop is tested

Page 369: A Mega File of It for Current Quizzes

once at the start

after each time through the loop

once at the end

before each time through the loop

The first control statement in a for loop usually

increments a counter

sets the termination condition

creates a control variable

All of the given

How does a "for" loop start?

for i = 1 to 8

for (i = 0; i <= 8)

for (i = 0; i <= 8; i++)

for (i <= 8; i++)

_________ will refer to an external script called "xyz.js".

<script file="xyz.js">

<script link="xyz.js">

<script src="xyz.js">

<script name="xyz.js">

For which of the following, XSL is the recommended as style sheet language?

Page 370: A Mega File of It for Current Quizzes

HTML

XML

HTML and XML

XSLT

border-color: specifies the color of all borders in the order________________.

border right color, border bottom color, border left color, border top color

border top color, border right color, border bottom color, border left color

border top color, border bottom color, border right color, border left color

border bottom color, border top color, border left color, border right color

What is a correct way of referring to a stylesheet called "mystyle.xsl" ?

<?xml-stylesheet type="text/xsl" href="mystyle.xsl" ?>

<link type="text/xsl" href="mystyle.xsl" />

<stylesheet type="text/xsl" href="mystyle.xsl" />

<?stylesheet type="text/xsl" href="mystyle.xsl" ?>

Constructor is defined as the initializing function used to create…........

Instance / copy of object

copy of object

Instance of object

shallow copy of object

Page 371: A Mega File of It for Current Quizzes

The second control statement in a for loop usually

increments a counter

sets the termination condition

creates a control variable

none of the given

Border-width: specifies the width of all borders in the order ______________.

border right width, border bottom width, border left width, border top width

border top width, border right width, border bottom width, border left width

border bottom width, border left width, border top width, border right width

border bottom width, border top width, border left width, border right width

What is the correct HTML for adding a background color?

<background>yellow</background>

<body color="yellow">

<body bgcolor="yellow">

<bgcolor>yellow</bgcolor>

__________ is a Java script comment.

//comment

%comment

$comment

*comment*

Page 372: A Mega File of It for Current Quizzes

Date () is the -------------------- of the date object which provides current date of the

system.

method

property

constructor

Destructor

Left margin of an element can be changed using _________.

padding:

margin:

margin-left:

text-indent:

In case mouse moves over a link, ________ event will be detected.

onMouseOver

onRollOver

overMouse

All of the given

CSS definitions can be written in __________ to define the styles for entire site.

Body section

Head section

Text file

Page 373: A Mega File of It for Current Quizzes

Anywhere in the web page

Correct javascript code for writing "hello world" is _______________.

document.write("hello world")

write("hello world")

response.write("hello world")

None of the given

Which of the following is HTML tag could not be used as CSS tag?

<h1>

<style>

<a>

<p>

We put the JavaScript in the following ___________ html element.

<script>

<javascript>

<js>

<java_script>

What is the correct HTML for making a text input field?

<input type="textfield">

<input type="text">

Page 374: A Mega File of It for Current Quizzes

<textfield>

<textinput type="text">

i++ means ________.

i=i+i

i=i+1

i=i+2

i=1+1

What is the correct JavaScript syntax to insert a comment that has more than one line?

/*This comment has more than one line*/

/#This comment has more than one line#/

<!--This comment has more than one line-->

none of the given

In what form style rules are presented?

selector { property= value }

selector ( property: value )

selector { property: value }

selector ( property= value )

__________ is an invalid JavaScript variable.

3rd_name

Page 375: A Mega File of It for Current Quizzes

first_name

secondName

$myName

!= comparison operator means __________.

Equal to

Not equal to

Greater than

None of the given

Actions that can be detected by javascript are called _____________. (Chose best

suitable option)

Events

Functions

Methods

Hyper links

Which statement is true?

All XML documents must have a DTD

All XML elements must be lower case

All the statements are true

All XML elements must be properly closed

charAt() is the function/method of

Page 376: A Mega File of It for Current Quizzes

String object

Date object

Time object

Array object

<span> is used to apply style to ___________.

text

image

frames

webpage

Which loop type always runs the enclosed code at least once

do while

for

while

none of them

The conditional statement "i is not equal to 5" can be written as _____________.

if (i<>5)

if (i != 5)

if (i not equal to 5)

if (i ! 5)

Page 377: A Mega File of It for Current Quizzes

________ is not a data type in java script.

int

float

string

null

_________ object’s properties and functions are accessible every where.

Local

Global

Predefined

All of the given

In java script "alert" function displays ________.(Chose best suitable answer)

Popup window

Web page

Task bar

Menu bar

What does DTD stand for?

Do The Dance

Dynamic Type Definition

Data Type Definition

Direct Type Définition

Page 378: A Mega File of It for Current Quizzes

Which of the following is NOT an advantage of CSS?

Define the look of your pages in one place

Works on version 4 browsers or newer

Easily change the look

Implement same formatting each time tag is used.

_________ tag is used to control the layout of different elements.

css

style

span

None of the given

Style sheets can be used in a web page using ________ method/s.

Inline

Embedded

Document level and external

All of the given

JavaScript can be placed in __________.

Head section

Body section

Both of the given

None of the given

Page 379: A Mega File of It for Current Quizzes

The conditional statement "i is equal to 5" can be written as _____________.

if (i == 5)

if (i = 5)

if (i is equal to 5)

if (i <> 5)

Who is making the Web standards?

International Standard Organization

ANSI

Microsoft

The World Wide Web Consortium

Variables in java script can begin with _____________.

dolloar sign

lower case letter

under score character

All of the given

What value is returned by getMonth in April?

2

3

4

Page 380: A Mega File of It for Current Quizzes

5

___________ is NOT an attribute of border.

border-pattern

border-style

border-bottom-color

border-width

Code: JavaScript var a = ["v","i","r","t", "u", "a", "l"]; document.write(a.join("-")); What

would be the output of the above code fragment?

virtual

virtual-

v:i:r:t:u:a:l

v-i-r-t-u-a-l

What does XML stand for?

eXtra Modern Link

X-Markup Language

eXtensible Markup Language

Example Markup Language

Padding is the space between __________.

Two tables

Page 381: A Mega File of It for Current Quizzes

Two borders

Content and border

Border and window

Which one of the following is the correct HTML tag for making a drop-down list?

<input type="list">

<input type="dropdown">

<select>

<list>

Which you will NOT be able to do with CSS?

Add text

Position the content

Define the look of your pages in one place

Change the background color

What is the correct HTML for making a hyperlink?

<a href="http://www.w3schools.com"> W3Schools</a>

<a name="http://www.w3schools.com"> W3Schools.com</a>

<a url ="http://www.w3schools.com"> W3Schools.com </a>

<a>http://www.w3schools.com</a>

1. _________ attribute indicates the unique field name for a checkbox.

Page 382: A Mega File of It for Current Quizzes

• Type • Name • Input • Value 2. In HTML, depending upon which tag is used, the enclosed content can then have Specific effect Style Format Specific effect, style and format 3. Which of the following is true for selection list? <select name="field name" size="no. of items"> <select "name=field name" size="no. of items"></select> <select name="field name" size="no. of items"></select> None of the above 4. List tag used in html is ______ Paired Unpaired Single None of the given options 5. Which of the following is HTML tag could not be used as CSS tag? <h1> <style> <a> <p>

6. What is identified by the tag? Horizontal frame Bottom Frame Top Frame Vertical Frame 7. HTML documents are connected with each other by ________. Big Tag Small Tag Link Tag None of the given options 8. The web addresses are first translated into IP address through ________ SMTP HTML IPV6 DNS

Page 383: A Mega File of It for Current Quizzes

9. In Style sheets, how do you change the text color of an element? color: text-color= text-color: font-color:

10. ________ is used to interpret and show contents of the web page. • HTML • Notepad • Browser • Computer

11. A _________ is a web page populated with text boxes, drop-down lists and commands buttons to get information from the user. • Hypertext Link • Form • Table • Button

12. Which of the following is NOT an advantage of CSS? • Define the look of your pages in one place • Works on version 4 browsers or newer • Easily change the look • Implement same formatting each time tag is used.

13. Links are used to connect ____________. • Images • Text • Images and web documents • All of the given 14. When a visitor clicks a _________, the entries in form are set to the default values. • Button • Radio Button • Submit Button • Reset Button 15. Which of the following are correct tags used for frames, • <Frame></Frame> • <Frameset><Frame></Frame></Frameset> • <Frameset><Frame></Frameset> • <Frameset><Frame></Frame> 16. question_2you: if you have a less space for e-mails on internet then _________ protocol is used. • SMTP • IMAP • POP • POP3

Page 384: A Mega File of It for Current Quizzes

17. _____________ are normally used to get yes/no or true/false information from a reader. • Check Boxes • Radio buttons • Submit Buttons • Selection List 18. Default web page background color is __________. • Green • Red • White • Blue 19. _____________ are normally used to get yes/no or true/false information from a reader. • Check Boxes • Radio buttons • Submit Buttons • Selection List 20. Which of the following is NOT valid HTML code line? • <frameset rows="16%,84%"> • <frameset columns="16%,84%"> • <frameset cols="100,150"> • <frameset cols="50%,50%" rows="16%,84%"> 21. What is the meaning of SRC in frame tag? • Source for image saved on your disk • Source for images saved on your disk • Source of page saved on your disk • Source of Pages saved on your disk 22. In what form style rules are presented? • selector { property= value } • selector ( property: value ) • selector { property: value } • selector ( property= value ) 23. __________ is the code for blank space in HTML. • &lsquo; • &nbsp; • &sbquo; • &iexcl; 24. Which CSS property controls the text size? • font-style • font-size • text-style • text-size 25. Which HTML tag is used to define an internal (embedded) style sheet? • CSS • Text / Style

Page 385: A Mega File of It for Current Quizzes

• Style • Script 26. Meta Data is important for easier ____________. • Web page creation • Web site upload • Web page search through search engine • None of the above 27. Which HTML attribute is used to define inline styles? • Styles

• Text

• Style

• CSS

29. Which attribute can be used to make a region non-clickable? • Alt • Target • nohref • none of the given 31. With _________, you can display more than one Web page in the same browser window. • Forms • Frames • Post Action • Java Scripts 32. In CSS, how do you make the text bold? • font:b • font-size:bold • font-weight:bold • FTP • Telnet • none 33. Which of the following is used for web page requests? • HTTP 34. Which of the following provides an interface & series for file transfer over the network? • HTTP • FTP • Telnet • None 35. __________________ connects a local computer with a remote computer. • SMPT • VPN • Telnet

Page 386: A Mega File of It for Current Quizzes

• none 36. Which of the followings provide e-mail services on the internet? • MAC • Telnet • none

37. ________________ is connectionless transport protocol. • SMPT • SMPT • TCP • UDP • MAC

38. ___________ is connection-oriented transport protocol. • SMPT • TCP • UDP • MAC 39. Public Key of the receiver is used to-------------------. a. Decrypt the message b. Encrypt the message c. Scramble the message d. None of the mentioned options 40. Receiver applies ----------------to the received original message • Digital signature • Message digest • Hash function • None of the mentioned options 41. Symmetric key can be replaced with----------------------------. • Symmetric algorithms • Pair of public and private keys • Asymmetric key • None of the mentioned options 43. Most of the electronic payment systems on internet use ------------------to ensure confidentiality and security of the payment information. • Quantum computing • Cryptography • Both of the mentioned options • None of the mentioned options 44. Simplicity and ----------------is the biggest advantage of Virtual PIN payment system. • Full encryption • Dual encryption • No encryption • None of the mentioned options 46. An electronic check book device is a combination of • Hardware and a digital signature • Software and information about user

Page 387: A Mega File of It for Current Quizzes

• Secure hardware and software • None of the mentioned options 47. Which of the following is disadvantage of virtual PIN payment system? • Bogus purchases are possible • Stolen credit card number can be used • Only some extra copies of the information items are made in case of a fraud • All of the mentioned options are disadvantages of Virtual PIN payment system 48. FV stands for • Forward Virtual • Famous virtual • None of the mentioned options • First Virtual 50. In the statement var myAr = new Array (60); what does the number 60 represent? • The value assigned to the 1st element in the array • The number of elements to be used in the array • The number of dimensions created in a multi-dimensional arra • All 51. Which of the following is the valid syntax for initialization of a string object? • Var Girl = "salmanoreen" • Girl = new string( "salmanoreen") • Var Girl = new string( "salmanoreen") • Var Girl = new Girl( "salmanoreen") 52. Identify that machine which services the internet request? • Web client • Web server • Browser • Mozilla

ITA430 Solved Quizzes BY

http://vustudents.ning.com

An agent is a software program that is _____

Select correct option:

Triggers by human

Page 388: A Mega File of It for Current Quizzes

Not capable of autonomous action.

Capable of autonomous action in its environment in order to meet its objectives

None

ASP runs best on ________.

Select correct option:

Internet information Software

Intranet Information Software

Intranet Information Server

Internet Information Server

What is/are the methods to track the customer.

Select correct option:

Database

Cookies

Hidden Fields

All

Large companies establish connections between their e-commerce software and their existing accounting system by using a type of software called

__________.

Page 389: A Mega File of It for Current Quizzes

Select correct option:

Shareware

Freeware

Middleware

None

Question # 5 of 10 ( Start time: 01:55:19 AM ) Total Marks: 1

Password attacks are basically a result of _____

Select correct option:

Back door

Sniffing

Eavesdropping

None of the Above

Question # 6 of 10 ( Start time: 01:56:03 AM ) Total Marks: 1

Caching ______.

Select correct option:

have no effect on downloading of the page

saves the time of downloading the page

increase the time of downloading the page

None of Above

Question # 7 of 10 ( Start time: 01:56:58 AM ) Total Marks: 1

Page 390: A Mega File of It for Current Quizzes

. A program that performs a specific function such as creating invoices/bills or processing payment received from customers is called _______.

Select correct option:

Firewall

Application program

Protocol

Web Services

Question # 8 of 10 ( Start time: 01:57:54 AM ) Total Marks: 1

Programs that work with the browser to enhance its capabilities.

Select correct option:

Driver

Flash

PlugIn

None of Above

Question # 9 of 10 ( Start time: 01:58:10 AM ) Total Marks: 1

Agents can be used for _____

Select correct option:

Page 391: A Mega File of It for Current Quizzes

Comparisons

Filtering

Web crawling

All

Question # 10 of 10 ( Start time: 01:58:53 AM ) Total Marks: 1

secure, dedicated point to point connection over the internet ______.

Select correct option:

Metropolitan area Network

Local area Network

Wide Area Network

Virtual Private Network

Question # 7 of 10 ( Start time: 04:06:28 PM ) Total Marks: 1 Branch to headquarter network _____. Select correct option: APN VPN NPV PNA ERP Stands for Select correct option: Entrepreneur Resource Planning Enterprise Rescue Planning Enterprise Resource Program Enterprise Resource Planning

Page 392: A Mega File of It for Current Quizzes

Enterprise Resource Planning Enterprise Resource Planning (ERP) is a concept that integrates all aspects of a business e.g, accounting, logistics, manufacturing, marketing, planning, project management etc. at a single place. An ERP system such as SAP is expensive. E-commerce sites/software has to fully integrate with ERP software, wherever it is used. Enterprise Resource Planning (ERP) is a concept Select correct option: That integrates some aspects of business, at many locations. That integrates all aspects of a business at a single place. That integrates some aspects of business, at some locations. That integrates all aspects of business, at many locations. Proxy Server can _____. Select correct option: Speed up the processing of http requests by caching web pages Translate HTTP request between trusted and un trusted network Can also act as a firewall filtering requests for certain web pages All of Above Extranet formed when ____. Select correct option: When two or more internet is connected to each other. When two or more WAN are connected to each other. When two or more intranets are connected to each other. When two or more LAN is connected to each other. secure, dedicated point to point connection over the internet ____. Select correct option: Metropolitan area Network Local area Network Wide Area Network Virtual Private Network Plug in is ______. Select correct option: Program that make the computer server. Programs that work with the browser to enhance its capabilities.

Page 393: A Mega File of It for Current Quizzes

Program that communicate with the client from the server. None of Above ERP example is __ Select correct option: PAS DBMS SAP ASP Performance of the web server measured in ___. Select correct option: A - Throughput B - Response Time A & B None of Above Throughput is _________. Select correct option: No of instruction a server execute in one second. No of session a server handle. No of http request that a web server can handle. None of Above Throughput, which is the number of http requests that a particular server hardware and software can handle in the unit time; and Select correct option: Internet information Software Intranet Information Software Intranet Information Server Internet Information Server Agents can be used for ___ Select correct option: Comparisons Filtering Web crawling All An agent is a software program that is capable of autonomous action in its environment in order to meet its objectives. Agents can be used for comparisons, filtering, web crawling, auctions etc. For example, there may be buyer agents and seller agents each with their goals and constraints. They can negotiate deals on behalf of the users. Agents can monitor health indicators and alert the individuals under given conditions.

Page 394: A Mega File of It for Current Quizzes

Large companies establish connections between their e-commerce software and their existing accounting system by using a type of software called ________. Select correct option: Shareware Freeware Middleware None Large companies establish connections between their e-commerce software and their existing acco system by using a type of software called Middleware which is a part of e-commerce software package CERT _________. Select correct option: Computer Elegant Response Time Computer Emergency Response Time Computer Efficient Response Time Computer Enter Response Time Computer Emergency Response Time (CERT) Systems Administrator, Audit, Network and Security Institute (SANS Institute) The best response that the experts have come up with to tackle the security issue is in terms of cryptography. SANS stands for _____. Select correct option: System Administration, Authentication, Network and Security Institute Software Authentication, Audit, Network and Security Institute Systems Administrator, Audit, Network and Security Institute None of Above Application gateway firewall operate at ____. Select correct option: A -Session Layer B - Network Layer A & B None of Above

Page 395: A Mega File of It for Current Quizzes

It operates at application layer of the OSI Model. It uses strong user authentication to verify identity of a host attempting to connect to the network using application layer protocols such us FTP. In contrast to packet filter firewall, it filters the requests rather than packets entering/leaving the network. It can block any outgoing HTTP or FTP requests. Select correct option: Time a server take to process one request. Time a server take to process all the request. Time a server take to process some request. Time a server take to process ten request HTTP is a _____. Select correct option: State Oriented Stateless A&B None of Above What is/are the methods to track the customer. Select correct option: Database Cookies Hidden Fields All DoS stand for _______. Select correct option: Disk Operating System Denial of Services Do or stand Disk out System What is web serve? Select correct option: Computer that delivers (serves up) web pages Computer that is big Computer that is Fast None of Above

Page 396: A Mega File of It for Current Quizzes

One Tier Architecture __________. Select correct option: The entire processing may take place at individual terminal. The entire processing may take place at different terminal. The entire processing may not take place at individual terminal. None of Above In 1-tier architecture, the entire processing takes place at a single place/zone. Password attacks are basically a result of ___ Select correct option: Back door Sniffing Eavesdropping None of the Above Such attacks are basically a result of eavesdropping through which the hacker is able to know the account ID or password of a particular user. Then using it the hacker gains access to the network and gather information such as user names, passwords, computer names, resources etc. That can lead to modification, deletion or rerouting of network data. Self hosting ____. Select correct option: Companies may opt to run a server in house Companies may not opt to run a server in house Companies may opt rent server None of Above An agent is a software program that is ___ Select correct option: Triggers by human Not capable of autonomous action. Capable of autonomous action in its environment in order to meet its objectives None An agent is a software program that is capable of autonomous action in its environment in order to meet its objectives. Agents can be used for comparisons, filtering, web crawling, auctions etc.

Page 397: A Mega File of It for Current Quizzes

For example, there may be buyer agents and seller agents each with their goals and constraints. They can negotiate deals on behalf of the users. Agents can monitor health indicators and alert the individuals under given conditions. IDS Stands for _______. Select correct option: Intrusion Defense System Intervention Detection System Intervention Defense System Intrusion Detection System In distributed denial of service attack, the compromised system itself is used as a source for further attacks. The use of firewalls and a proper Intrusion Detection System (IDS) can minimize Can not block any outgoing HTTP or FTP requests Can block any outgoing HTTP but not FTP requests Can not block any outgoing HTTP but FTP requests Can block any outgoing HTTP or FTP requests Application gateway firewall It operates at application layer of the OSI Model. It uses strong user authentication to verify identity of a host attempting to connect to the network using application layer protocols such us FTP. In contrast to packet filter firewall, it filters the requests rather than packets entering/leaving the network. It can block any outgoing HTTP or FTP requests. Caching ____. Select correct option: have no effect on downloading of the page saves the time of downloading the page increase the time of downloading the page None of Above

Page 398: A Mega File of It for Current Quizzes

Worms have the characteristics; Select correct option: Can replicate it Have the capability to travel without any help or human action Can spread from computer to computer All Branch to headquarter network _____. Select correct option: APN VPN NPV PNA mote access capabilities to a compromised machine. Select correct option: Back Doors Virus Worms Trapdoors Back Doors are those hostile programs which, when run on a machine, install hidden services in order to give attackers remote access capabilities to a compromised machine. Trojan horses are those programs that appear harmless but actually have some malicious purpose.

E-commerce Site must provide ______. Select correct option: Transaction processing Shopping cart capabilities A catalog display All of the above

Circuit level firewall operate at the ______. Select correct option: Data Link Presentation Network Transport

It is quite similar to the packet filter firewall. It also works on the basis of a set of rules for filtering packets but operates at the transport layer of the OSI Model so has greater functionality. As a rule, the higher the layer of OSI model where a firewall operates, the more sophisticated is the firewall. It can make packets sent from internal network to a destination outside the firewall appear as if they originated at the firewall. Thus

Page 399: A Mega File of It for Current Quizzes

information regarding hosts on the internal network remains secret. It can also determine whether TCP/IP connection between a host and a machine outside firewall has been properly established. Thus it can cut off any connection which has been hijacked by a hacker trying to pass through the firewall.

Those hostile programs which, when run on a machine, install hidden services in order to give attackers remote access capabilities to a compromised machine. Select correct option: Back Doors Virus Worms Trapdoors

Front end consist of ______. Select correct option: Information which invisible to the user and he can interact with the same through some interface. Information which visible to the user and he can no t interact with the same through some interface. Information which visible to the user and he can interact with the same through some interface. Information which is hidden.

Asp, JSP, PHP ? Select correct option: Server Side Scripts Client Side Script A & B None of Above

SANS stands for _______.

Select correct option:

System Administration, Authentication, Network and Security Institute

Software Authentication, Audit, Network and Security Institute

Systems Administrator, Audit, Network and Security Institute

None of Above

Page 400: A Mega File of It for Current Quizzes

Proxy Server can _______.

Select correct option:

Speed up the processing of http requests by caching web pages

Translate HTTP request between trusted and un trusted network

Can also act as a firewall filtering requests for certain web pages

All of Above

Response time ________.

Select correct option:

Time a server take to process one request.

Time a server take to process all the request.

Time a server take to process some request.

Time a server take to process ten request

attacks are basically a result of _____

Select correct option:

Back door

Sniffing

Eavesdropping

None of the Above

Page 401: A Mega File of It for Current Quizzes

IDS Stands for _________.

Select correct option:

Intrusion Defense System

Intervention Detection System

Intervention Defense System

Intrusion Detection System

Question # 8 of 10 ( Start time: 02:45:30 PM ) Total Marks: 1

ASP runs best on ________.

Select correct option:

Internet information Software

Intranet Information Software

Intranet Information Server

Internet Information Server

Plug in is ________.

Select correct option:

Program that make the computer server.

Programs that work with the browser to enhance its capabilities.

Program that communicate with the client from the server.

None of Above

Page 402: A Mega File of It for Current Quizzes

Question # 10 of 10 ( Start time: 02:47:59 PM ) Total Marks: 1

It occurs when a customer clicks at checkout or confirm order button and is subjected to some payment _______.

Select correct option:

Transaction Processing

E cash System

E Funds system

None of Above

In this type of attack the hacker has the ability to monitor network traffic using some kind of network monitoring software. Select correct option: Snooping Sniffing Eavesdropping All of Above

Eavesdropping/ sniffing/snooping

In this type of attack the hacker has the ability to monitor network traffic using some kind of networkmonitoring

software. For example, a hacker may install some backdoor or Trojan horse that can monitor

the key strokes of a user w

we were wrong only master mind was right

hile typing and send the typed information to the hacker.

Processing of HTML code on the Client Side and web page request on the server. Select correct option: One Tier Architecture Two Tier Architecture Three Tier architecture N tier Architecture

Page 403: A Mega File of It for Current Quizzes

Example of 2-tier architecture is where

processing of HTML code takes place on the client side and the web page request is processed on the server

In this type of attack the hacker has the ability to monitor network traffic using some kind of network monitoring software. Select correct option: Snooping Sniffing Eavesdropping All of Above

Eavesdropping/ sniffing/snooping

In this type of attack the hacker has the ability to monitor network traffic using some kind of networkmonitoring

software. For example, a hacker may install some backdoor or Trojan horse that can monitor

the key strokes of a user

1. _________ attribute indicates the unique field name for a checkbox. • Type • Name • Input • Value 2. In HTML, depending upon which tag is used, the enclosed content can then have Specific effect Style Format Specific effect, style and format 3. Which of the following is true for selection list? <select name="field name" size="no. of items"> <select "name=field name" size="no. of items"></select> <select name="field name" size="no. of items"></select> None of the above 4. List tag used in html is ______ Paired Unpaired

Page 404: A Mega File of It for Current Quizzes

Single None of the given options 5. Which of the following is HTML tag could not be used as CSS tag? <h1> <style> <a> <p>

6. What is identified by the tag? Horizontal frame Bottom Frame Top Frame Vertical Frame 7. HTML documents are connected with each other by ________. Big Tag Small Tag Link Tag None of the given options 8. The web addresses are first translated into IP address through ________ SMTP HTML IPV6 DNS 9. In Style sheets, how do you change the text color of an element? color: text-color= text-color: font-color:

10. ________ is used to interpret and show contents of the web page. • HTML • Notepad • Browser • Computer

11. A _________ is a web page populated with text boxes, drop-down lists and commands buttons to get information from the user.

Page 405: A Mega File of It for Current Quizzes

• Hypertext Link • Form • Table • Button

12. Which of the following is NOT an advantage of CSS? • Define the look of your pages in one place • Works on version 4 browsers or newer • Easily change the look • Implement same formatting each time tag is used.

13. Links are used to connect ____________. • Images • Text • Images and web documents • All of the given 14. When a visitor clicks a _________, the entries in form are set to the default values. • Button • Radio Button • Submit Button • Reset Button 15. Which of the following are correct tags used for frames, • <Frame></Frame> • <Frameset><Frame></Frame></Frameset> • <Frameset><Frame></Frameset> • <Frameset><Frame></Frame> 16. question_2you: if you have a less space for e-mails on internet then _________ protocol is used. • SMTP • IMAP • POP • POP3 17. _____________ are normally used to get yes/no or true/false information from a reader. • Check Boxes • Radio buttons • Submit Buttons • Selection List 18. Default web page background color is __________. • Green • Red • White • Blue

Page 406: A Mega File of It for Current Quizzes

19. _____________ are normally used to get yes/no or true/false information from a reader. • Check Boxes • Radio buttons • Submit Buttons • Selection List 20. Which of the following is NOT valid HTML code line? • <frameset rows="16%,84%"> • <frameset columns="16%,84%"> • <frameset cols="100,150"> • <frameset cols="50%,50%" rows="16%,84%"> 21. What is the meaning of SRC in frame tag? • Source for image saved on your disk • Source for images saved on your disk • Source of page saved on your disk • Source of Pages saved on your disk 22. In what form style rules are presented? • selector { property= value } • selector ( property: value ) • selector { property: value } • selector ( property= value ) 23. __________ is the code for blank space in HTML. • &lsquo; • &nbsp; • &sbquo; • &iexcl; 24. Which CSS property controls the text size? • font-style • font-size • text-style • text-size 25. Which HTML tag is used to define an internal (embedded) style sheet? • CSS • Text / Style • Style • Script 26. Meta Data is important for easier ____________. • Web page creation • Web site upload • Web page search through search engine • None of the above

Page 407: A Mega File of It for Current Quizzes

27. Which HTML attribute is used to define inline styles? • Styles

• Text

• Style

• CSS

29. Which attribute can be used to make a region non-clickable? • Alt • Target • nohref • none of the given 31. With _________, you can display more than one Web page in the same browser window. • Forms • Frames • Post Action • Java Scripts 32. In CSS, how do you make the text bold? • font:b • font-size:bold • font-weight:bold • FTP • Telnet • none 33. Which of the following is used for web page requests? • HTTP 34. Which of the following provides an interface & series for file transfer over the network? • HTTP • FTP • Telnet • None 35. __________________ connects a local computer with a remote computer. • SMPT • VPN • Telnet • none

Page 408: A Mega File of It for Current Quizzes

36. Which of the followings provide e-mail services on the internet? • MAC • Telnet • none

37. ________________ is connectionless transport protocol. • SMPT • SMPT • TCP • UDP • MAC

38. ___________ is connection-oriented transport protocol. • SMPT • TCP • UDP • MAC 39. Public Key of the receiver is used to-------------------. a. Decrypt the message b. Encrypt the message c. Scramble the message d. None of the mentioned options 40. Receiver applies ----------------to the received original message • Digital signature • Message digest • Hash function • None of the mentioned options 41. Symmetric key can be replaced with----------------------------. • Symmetric algorithms • Pair of public and private keys • Asymmetric key • None of the mentioned options 43. Most of the electronic payment systems on internet use ------------------to ensure confidentiality and security of the payment information. • Quantum computing • Cryptography • Both of the mentioned options • None of the mentioned options 44. Simplicity and ----------------is the biggest advantage of Virtual PIN payment system. • Full encryption • Dual encryption • No encryption • None of the mentioned options 46. An electronic check book device is a combination of

Page 409: A Mega File of It for Current Quizzes

• Hardware and a digital signature • Software and information about user • Secure hardware and software • None of the mentioned options 47. Which of the following is disadvantage of virtual PIN payment system? • Bogus purchases are possible • Stolen credit card number can be used • Only some extra copies of the information items are made in case of a fraud • All of the mentioned options are disadvantages of Virtual PIN payment system 48. FV stands for • Forward Virtual • Famous virtual • None of the mentioned options • First Virtual 50. In the statement var myAr = new Array (60); what does the number 60 represent? • The value assigned to the 1st element in the array • The number of elements to be used in the array • The number of dimensions created in a multi-dimensional arra • All 51. Which of the following is the valid syntax for initialization of a string object? • Var Girl = "salmanoreen" • Girl = new string( "salmanoreen") • Var Girl = new string( "salmanoreen") • Var Girl = new Girl( "salmanoreen") 52. Identify that machine which services the internet request? • Web client • Web server • Browser • Mozilla .

Question # 1 of 10 ( Start time: 04:52:38 PM ) Total Marks: 1

Poter Market and sell activities relates to _____________.

Select correct option:

Page 410: A Mega File of It for Current Quizzes

1. advertising, promotions

2. managing salespersons

3. monitoring distribution channel

4. All of Above

Question # 2 of 10 ( Start time: 04:53:59 PM ) Total Marks: 1

Advantages of VAN in EDI are __________.

Select correct option:

1. Time independence.

2. Protocol dependence.

Question # 3 of 10 ( Start time: 04:54:52 PM ) Total Marks: 1

In personal finance what is true?

Select correct option:

1. online data is imported automatically into the register.

2. transactions maintained by the software package.

3. account/transaction details are downloaded through the internet.

4. All of Above

Question # 4 of 10 ( Start time: 04:55:51 PM ) Total Marks: 1

Characterization and Clustering belong to which of the following types of Data Mining?

Select correct option:

1. Predictive

2. Selective

3. Descriptive

4. Additive

Page 411: A Mega File of It for Current Quizzes

Question # 5 of 10 ( Start time: 04:57:00 PM ) Total Marks: 1

Poter Finance and administration activities relate to _____________.

Select correct option:

1. accounting, paying bills and borrowing funds

2. purchasing and borrowing funds

Question # 6 of 10 ( Start time: 04:57:43 PM ) Total Marks: 1

What is true about Personal finance?

Select correct option:

1. Sell you products in no time.

2. Buy you products in no time.

3. allows the management of your financial matters in a customized manner.

4. None

Question # 7 of 10 ( Start time: 04:59:07 PM ) Total Marks: 1

Electronic Data Interchange Includes ________.

Select correct option:

1. No paper work

2. No human intervention

3. Exchange of information takes place in seconds

4. ALL Above

Question # 8 of 10 ( Start time: 05:00:11 PM ) Total Marks: 1

Three basic strategies for competitive advantage: __________.

Select correct option:

Page 412: A Mega File of It for Current Quizzes

1. Cost leadership

2. Differentiation

3. Focus

4. All of Above

Question # 9 of 10 ( Start time: 05:01:08 PM ) Total Marks: 1

___________ strategy is defined as concentration on a single aspect of the market.

Select correct option:

1. Focus

2. Differentation

Question # 10 of 10 ( Start time: 05:01:42 PM ) Total Marks: 1

VAN can _____.

Select correct option:

1. Reduce network traffic

2. Provide protocol compatibility between the sender and the recipient, wherever that is

missing.

Question No: 1

Key version represents public key by

Buyer

Seller E-Bank Certification Authority Ref: PAGE # 116

E-cash Coins

The currency used in this payment system is called an e-cash coin or simply coin. A coin consists of three

elements or parts - serial #, key version and serial no. signed by the secret or private key of a certain

denomination of the e-cash bank. In other words, a coin of one dollar would consist of the following:

Coin = Serial#, key version, {Serial #} SK bank’s $1 key

Each coin has a unique value, partly minted by the client and partly by the e-cash bank.

Page 413: A Mega File of It for Current Quizzes

Question No: 2 SSL stands for Secure Socket Layer Security Service Layer Sub Secured Length None of these Ref: PAGE # 121

SECURE SOCKET LAYER (SSL)

SSL is a protocol developed by Netscape Communications. SSL is built into many browsers. It operates at

the TCP/IP layer of the OSI model, and uses a combination of symmetric and asymmetric cryptography.

Question No: 3

How many kinds of Web Portals are?

3 2 5 6 Ref: PAGE # 129

Portal Model

Portals are the web sites which provide chance to the visitors to find almost everything in one

place. Horizontalportals provide information about a very broad range of topics. Search engine is the

example of a horizontal portal.Vertical portals provide information pertaining to a single area of

interest. Community Portals such as those related to medical or legal profession are the examples of a

vertical portal.

Question No: 4

Brick and Mortar refers to

Offline business

Online business

Transport

Building Ref: PAGE # 129

Page 414: A Mega File of It for Current Quizzes

Brick-and-Mortar vs. Click-and-Mortar businesses

These two terms refer to the offline and the online businesses, respectively. Where a company is doing

its business both online and offline, there is often the problem of lack of proper integration between the

two different channels of business.

Note: Offline business = Brick-and-Mortar

And Online Business = Click-and-Mortar businesses

Question No: 5

Digital Content Revenue Model Includes

Legal information services

Online journals

Online Libraries

All of the above Ref: PAGE # 130

Digital Content Revenue Model

Web serves as a very efficient distribution mechanism of content. Therefore, one finds many e-

businesses that offer different types of information services such as legal information, corporate

information, government information, news and resources for academic libraries etc. These services can

be customized by an e-business for different firm sizes depending upon their needs and usage pattern.

Normally, a customer has to subscribe to such services by paying certain amount as subscription fee.

This fee becomes the main source of generating revenue for the e-business. Instead of subscription fee,

a credit card charge option can be made available for infrequent users.Online journals,

newspapers, libraries fall under this category

Question No: 6 Which of following marketing campaigns are cheap an effective way to target potential customers?

Sale forces

E-mail

Media promotion

Marketing software

Ref: PAGE # 133

Page 415: A Mega File of It for Current Quizzes

E-MAIL MARKETING

E-mail marketing campaigns are cheap and effective way to target potential customers.

Question No: 7

What does Telemarketing means?

Marketing through charting

Marketing through telephone

Marketing through email

Marketing through web casting

Ref: PAGE # 133

Telemarketing

Live interaction through telephone

Question No: 8

Which of following services build a strong customer loyalty towards company and its products?

Customer services

Public relations(PR)

Bulletin board

Exhibitions.

Ref: PAGE # 136

One major goal of CRM is to establish a long-lasting relationship between a company and its customers.

Good customerservices can help in building a sense of loyalty towards company and its products or

services.

Question No: 9

Track the customers online and do personalization is only possible through which of the following file(s) analysis.

Page 416: A Mega File of It for Current Quizzes

log files

cookie

data mining

log files and cookies.

Ref: PAGE # 136

You know that cookies allow e-commerce sites to record visitor behavior. They can be used to track

customers online and do personalization. Many customers do not know that their information is being

collected and used by the e-business site.

Question No: 10 Which of the following is true for Class A: Network 01 byte and 03 hosts Network 02 bytes and 02 hosts

Network 03 bytes and 01 host

None of these

Ref: PAGE # 10

By rule, in class A networks first byte would refer to the network address and the remaining three

bytesto the host machines on that network providing a very large network.

Question No: 11

What is the correct HTML for making a text input field?

<textinput type="text">

<input type="text">

<input type="textfield">

Page 417: A Mega File of It for Current Quizzes

<textfield>

Ref: PAGE # 27

First Name: <INPUT TYPE="TEXT" NAME="First">

Question No: 12

IIS stands for:

International Information Service

Internet Information Server Internet Information standards

All of these

Ref: PAGE# 85

ASP

We can discuss ASP a little more in detail. It runs best on IIS (Internet Information Server)which is freely

available with Windows NT and Windows 2000.

Question No: 13 The payer and the payee are issued digital certificates in ………… standard format by their respective banks.

X. 509 F. 609

L.8999

N.586

Ref: PAGE # 101

Digital certificates

These are the certificates in electronic form which establish whether or not a public key belongs to the

purported owner.A digital certificate at least comprises a public key, certification information (name, ID

etc.) and electronic signatures of a certification authority. Digital certificates are prepared according to

a generally accepted format called X.509standard format.

Question No: 14

What is a E-Cash wallet ?

Hardware

Page 418: A Mega File of It for Current Quizzes

Agent

Software All of the above

Ref: PAGE # 116

Buyers and merchants, both, have accounts in the E-cash bank. Buyers withdraw coins against their

account and store them in e-cash wallet software (Cyber wallet) on their computer. Cyber wallet stores

and manages coins and records every transaction.

Question No: 15

An E-cash coin consists of element (s) like:

Serial # provided by client

Key version

Serial# signed by E-cash bank

All of the above Ref: PAGE # 116

Coin = Serial#, key version, {Serial #} SK bank’s $1 key

Question No: 16 What is Ultimate consumer orientation? Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. Secondary Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of supply chain. None of them Ref: PAGE # 156

Supply chain and ultimate consumer orientation:

Primary objective of supply chain is to help each company to meet needs of the consumer at the end

of supply chain. This approach is called ultimate consumer orientation. In 1995, a company dealing in

Page 419: A Mega File of It for Current Quizzes

the business of production of tiers in America adopted a different approach by shifting its focus on tire

dealers from ultimate customers.

Question No: 17 Customer data can be gathered and analyzing it customers can be served in a better Manner according to their needs, which is best option? Customization Customer orientation Customer satisfaction Focus Ref: PAGE # 157

Customization:

With the help of EC, customer data can be gathered and analyzing it customers can be served in a

better manner according to their needs. One can, thus, implement differentiation and focus strategy.

Question No: 18 A company ABC web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death in that culture. Which is the international barrier it is having? Culture Language Lack of trust Infrastructure Ref: PAGE # 162

A web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a

symbol of death in that culture.

Question No: 19 Exclusive right granted by law to make, use and sell an invention. What is called? Parasites Trade mark Patent infringement Copyright Ref: PAGE # 181

Patent infringement:

Page 420: A Mega File of It for Current Quizzes

A patent is an exclusive right granted by law to make, use and sell an invention. In order to be

patentable, the invention must be unique, genuine, and useful according to the prevalent technological

standards.

Question No: 20 Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act. Which legal issue arises due to such acts? Cyber Crimes Online Defamation Cyber squatting None Ref: PAGE # 182

Online Defamation:

A defamatory statement is a false statement that injures the reputation of on another person or

company. If a statement injures the reputation of a product or service instead of a person, it is called

product disparagement.Suppose, someone circulates a news item in the media about the reputation

of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a

lawsuit against that person claiming that his reputation has been injured due to such an act.

Question No: 21 How can you reference part of a string? text.substr(5,6); text.part(5,6) text.piece(5,6) text.split(5,6); Ref: PAGE # 70

String Object:

In the following example, ‘str’ and ‘myArray’ are the instances of string and array objects, respectively.

The size of the array is 10. Here, charAt() is the function/method of string object. So, charAt(3) would

provide the value of the element at the index three. Different other functions of string object have also

been used. In the example, str.Split(' ') splits the string on the basis of blank space. After splitting, we

assign parts of the string as values for the array.

Page 421: A Mega File of It for Current Quizzes

Question No: 22 One Tier Architecture __________.

Select correct option:

The entire processing may take place at individual terminal.

The entire processing may take place at different terminal.

The entire processing may not take place at individual terminal.

None of Above

Ref: PAGE # 88

Client server architecture:

Note that we may have different tiers in client server architecture depending on where the processing of

data takes place. In 1-tier architecture, the entire processing takes place at a single place/zone.

Question No: 23 Following are the names of some well known e-commerce software, EXCEPT ----------- . Intershop IBM's WebSphere Commerce Professional Edition Microsoft Commerce Server 2002 Microsoft SQL Server 2005 Ref: PAGE # 93

E-commerce Software:

Following are the names of some well-known e-commerce software:

Intershop Enfinity

IBM’s WebSphere Commerce Professional Edition

Microsoft Commerce Server 2002

Question No: 24 In Style Sheets, How do you change the font of an element? font-face: font: font-family: font-style: Ref: PAGE # 43

Font family styles

<HTML>

Page 422: A Mega File of It for Current Quizzes

<HEAD>

<TITLE>Style Sheets: Font Families</TITLE>

<STYLE>

Question No: 25 A paper signature is believed to be more reliable than a digital signature. ► True ► False Ref: PAGE # 106

A digital or electronic signature is believed to be more reliable as compared to paper

signatures because it is not ordinarily possible to copy or forge an electronic/digital signature. But, that

is very much possible in case of paper signatures.

Question No: 26 The serial # generated by the cyber wallet gets multiplied by blinding factor ‘r’ which is known only to the ___________. Client Bank Merchant None of above Ref: PAGE # 116

Cyberwallet generates a serial # and a blinding factor ‘r’. This blinding factor “r” is only known to the

client. It is used in the following mathematical expression which is sent to the bank for signatures. Serial

# . re2 (mod m)

Question No: 27 SET doesn’t require special software on the client or merchant side. True False Ref: PAGE # 122

Merchants must have special SET software to process transactions. Customers must have digital wallet

software that stores certificates and card information.

Question No: 28 The result of OLAP is displayed in the form of a __________. Data square Data Triangle Data cube Data circle Ref: PAGE # 145

Page 423: A Mega File of It for Current Quizzes

Online Analytical Processing (OLAP):

OLAP makes use of background knowledge regarding the domain of the data being studied in order to

allow the presentation of data at different levels of abstraction. It is different form data mining in the

sense that it does not provide any patterns for making predictions; rather the information stored in

databases can be presented/ viewed in a convenient format in case of OLAP at different levels that

facilitates decision makers or managers. The result of OLAP is displayed in the form of a data cube

Question No: 29 Classification and Association belong to which of the following types of Data Mining?

Selective

Predictive

Descriptive

Additive

Ref: PAGE # 145

Online Analytical Processing (OLAP):

OLAP makes use of background knowledge regarding the domain of the data being studied in order to

allow the presentation of data at different levels of abstraction. It is different form data mining in the

sense that it does not provide any patterns for making predictions

Question No: 30

Which one of the following algorithms does not include in public key algorithms?

DSS RSA Elliptic Curves RC4 Ref: PAGE # 108

Public Key Algorithms:

Following is the list some popular public key algorithms:

• DSS – Digital Signature Standard based on DSA (Digital Standard Algorithm) – key length is

between 512-1024 bits

• RSA

• Elliptic Curves

Page 424: A Mega File of It for Current Quizzes

Question No: 31

Four P’s in Marketing Mix are:

Product, price, place, promotion (Sure)

Price, person, place, problem

Place, product, property, promotion

Promotion, place, product, planning

Question No: 32

JIT Stands for

Just In Time

Joint investigation Technique

Join in Training

Just In Total

Ref: PAGE # 147

For instance, packaging material should only be ordered for just in time (JIT) delivery

Question No: 33

Advertising Supported Revenue Model includes

Yahoo portal

Employment sites

Newspaper Publishers

All of the above

Ref: PAGE # 130

Page 425: A Mega File of It for Current Quizzes

Advertising-Supported Revenue Model:

In this model service/information is provided free of any charge to certain audience and the advertising

revenue is sufficient to support the operation of the business and its cost. For example, Yahoo

portal provides useful information and a search engine free of cost, but earns revenue through

advertisements on its portal web site to bear the operational cost.

Question No: 34

Which of the following is true for Class A:

Network 01 byte and 03 hosts

Network 02 bytes and 02 hosts

Network 03 bytes and 01 host

None of these

Ref: PAGE # 10

By rule, in class A networks first byte would refer to the network address and the remaining three

bytesto the host machines on that network providing a very large network.

Question No: 35

Which of the following needs human action to execute?

Virus

Worm

Trojan Horse

All of these

Ref: PAGE # 94

Viruses, on the other hand, need to be activated through a human action.

Question No: 36

Page 426: A Mega File of It for Current Quizzes

In the digital signature technique, the sender of the message uses ________ to create cipher text

His or Her own symmetric key

His or her own private key

His or her own public key

The receiver’s private key

Ref: PAGE # 103

Then the sender adds his private key in the obtained message digest to create his digital signatures.

This digitally singed message is received by the receiver, who applies the pubic key of the sender to

decrypt the digital signature and reveal the message digest.

Question No: 37

PIN stands for:

Payment investigation Number

Password Identification Number

Personal Identification Number

Personal Identification Numeric

Ref: http://www.wsu.edu/~brians/errors/pin.html

Those who object to “PIN number” on the grounds that the N in “PIN” stands for “number” in the

phrase“personal identification number” are quite right, but it may be difficult to get people to say

anything else. “PIN” was invented to meet the objection that a “password” consisting of nothing but

numbers is not a word

Question No: 38

An electronic check contains a(n)………………… to the payer’s bank to make a specified payment to the

payee

Serial#

Private key

Page 427: A Mega File of It for Current Quizzes

Instruction

All of the above

Ref: PAGE # 113

Electronic Checks:

Financial Services Technology Consortium (FSTC) is a group of U.S banks, research agencies and

government organizations formed in 1993. It has introduced the concept of electronic checks. An

electronic check contains aninstruction to the payer’s bank to make a specified payment to a payee.

Question No: 40

It is the ability to sell the goods or provide the service at a price that is lower than that of competitors,

and thus attract more customers. What is called?

Cost leadership

Price leadership

Focus

Differentiation

Ref: PAGE # 157

Cost leadership:

It is the ability to sell the goods or provide the service at a price that is lower than that of competitors,

and thus attract more customers.

Question No: 41

E-commerce is a combination of three different areas of study, namely, --------, ---------------- and -----------

-----

Internal, external support, Support

Technology, business and law/policy

Primary, Secondary, R&D

Page 428: A Mega File of It for Current Quizzes

Sale, purchase, feed back

Ref: PAGE # 161

E-commerce is a combination of three different areas of study, namely, technology, business and

law/policy. We have studied the technology and business side of e-commerce to a reasonably good

extent.

Question No: 42

GM Celebes manufacturing electronic goods and FryChips co selling French fries. Under the traditional

trade mark law both these companies can have the same trade mark/trade name such as ‘frys’. The

problem arises when both apply for the registration of a domain name containing the word ‘frys’. Here,

both are legitimate claimants of this domain name but due to the element of uniqueness of domain

names only one of them can be assigned the desired domain name. Which legal issue arises in this

situation?

Domain name conflict

Cyber squatting

Concurrent use

None

Ref: PAGE # 181

Concurrent use

This problem arises when two organizations have apparently legitimate claim to use the same domain

name but cannot do so due to the uniqueness of domain names. Suppose, there is a company

manufacturing electronic goods and another company selling french fries. Under the traditional trade

mark law both these companies can have the same trade mark/trade name such as ‘frys’. The problem

arises when both apply for the registration of a domain name containing the word ‘frys’. Here, both are

legitimate claimants of this domain name but due to the element of uniqueness of domain names only

one of them can be assigned the desired domain name.

Question No: 43

Which type of Data Mining contains the elements as Support and confidence?

Classification

Page 429: A Mega File of It for Current Quizzes

Association

Characterization

Clustering

Ref: PAGE # 144

CONFIDENCE AND SUPPORT:

There are two terms/measures used in association, that is, support and confidence. Confidence’ is a

measure of how often the relationship holds true e.g, what percentage of time did people who bought

milk also bought eggs.

Question No: 44

OLAP stands for……………

Online Analytical Program

Online Analytical Processing

Online Application Program

Online Analysis Performance

Ref: PAGE # 145

Online Analytical Processing (OLAP):

OLAP makes use of background knowledge regarding the domain of the data being studied in order to

allow the presentation of data at different levels of abstraction.

Question No: 45

Support activities in Value Chain model includes

Finance and Administration

Human Resources

Technology Development

All of these

Ref: PAGE # 152

Page 430: A Mega File of It for Current Quizzes

Question No: 46

Which of the following is NOT processed on the client side?

Cookies

JavaScript

CGI scripts

Applets

Ref: PAGE # 82

CGI scripts:

Term Common Gateway Interface (CGI) is defined as a standard method/protocol that allows data from

forms to be used by programs on the server.

Question No: 47

Due to which characteristics, ATM network are covered under E-commerce ?

Exchange of information through computer networks (Doubt)

Internet.

Exchanging of products, services.

None of the above.

Basically ATM works to Exchange of information through computer networks so in my point of view it

will held in definition of e-commerce.

Ref: PAGE # 2

E-Commerce definition:

Page 431: A Mega File of It for Current Quizzes

Electronic commerce is an emerging concept that describes the process of buying and selling or

exchanging of products, services and information via computer networks including the internet

Question No: 48

SET is better than SSL.

True

False

Ref: PAGE # 122

Secure Electronic Transaction (SET):

The drawback in SSL that the credit card/debit card information remains with the merchant led to the

development of a more sophisticated protocol called SET.

Question No: 49

Dividing market, with respect to people having income level greater than Rs 30000, is geographic

segmentation.

True.

False.

Ref: PAGE # 131

Segments are defined in terms of demographic characteristics such as age, gender, marital status,

income level

Question No: 50

Which of the following is NOT an identified behavioral mode of customers on the web?

Browsers

Buyers

Shoppers

Page 432: A Mega File of It for Current Quizzes

Seller

Ref: PAGE # 132

Behavioral segmentation

Creation of separate experiences for customers based on their behavior is called behavioral

segmentation. Three identified behavioral modes of the customers on the web are:

Browsers – customers who just browse through the site with no intention of buying

Buyers – customers who are ready to buy right away

Shoppers – customers who are motivated to buy but want more information

Question No: 51

Which of these is a way of conducting market research?

Phone.

Interviews.

Questionnaires.

All of above.

Ref: PAGE # 132

Marketing Research:

It consists of interviews, paper and phone surveys, questionnaires, findings based on previous

investigations etc. to find strengths and weaknesses of your business and the business of your

competitors. It also includes the analysis of opportunities and threats to your business.

Question No: 52

Which of these is NOT a stage of knowledge discovery process?

Transformation

Page 433: A Mega File of It for Current Quizzes

Data mining

Pattern evaluation

Process evaluation

Ref: PAGE # 140

Knowledge discovery:

A knowledge discovery process includes data cleaning, data integration, data selection, data

transformation, data mining, pattern evaluation and knowledge presentation.

Question No: 53

According to Michael Porter, “test marketing” is an example of primary activity in a strategic business

unit. Identify the area in which this task is performed.

Design

Market and sell

Deliver’ activities relate to storage

Purchase materials and supplies

Ref: PAGE # 152

Design’ activities take a product form concept stage to manufacturing stage. They include concept

research, engineering, drawings preparation, test marketing etc.

Question No: 54

Electronic banking is also known as __________.

Cyber banking

Virtual banking

Online banking

All of above

Ref: PAGE # 150

Electronic Banking:

Page 434: A Mega File of It for Current Quizzes

Electronic banking, also known as cyber banking, virtual banking, home banking and online banking,

includes various banking activities conducted from home, business, or on the road, instead of at a

physical bank location.

Question No: 55

Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the

wrong-doer. Is it?

True

False

Ref: PAGE # 176

Civil law and criminal law. Civil law deals with the private rights of the parties, whereas the object of

criminal law is to punish the wrong-doer. Civil wrongs such as breach of contract are deemed to violate

only the rights of individuals and not the society in general.

Question No: 56

In datalink layer, data packets are placed inside

Data frames

Data boxes

Data streams

None of these

Ref: PAGE # 6

Data link layer:

It places data packets into data frames. Network Interface Card Drivers/Protocols operate at this layer.

It is used to identify MAC or hardware address of computer machines.

Question No: 57

At deposit stage, the serial number is ……………..by E-Cashbank

Page 435: A Mega File of It for Current Quizzes

Known

Unknown

Kept Secret

Informed

Ref: PAGE # 118

Deposit Stage

Serial no. (Known) Client (unknown)

Question No: 58 Let us, suppose that you have hosted your e-commerce website, When you provide “opt-in e-mail” option to your customers on your website and customer opt for it , what does it mean to receive ?

Information about product through advertisement

Information about product through e-mail

Information about services available on it

Information about News through e-mail.

Ref: PAGE # 133

Internet mailing lists can also be conveniently used to send targeted personalized emails. You can also

provide the “opt-in e-mail” option to your customers on your web site. If they opt for it, this means

that they want to receive through email any product information, offers or promotions etc.

Question No: 59

Track the customers online and do personalization is only possible through which of the following file(s) analysis.

log files

cookie

data mining

log files and cookies. Ref: PAGE # 136

Page 436: A Mega File of It for Current Quizzes

You know that cookies allow e-commerce sites to record visitor behavior. They can be used to track

customers online and do personalization. Many customers do not know that their information is being

collected and used by the e-business site. Thus, informational privacy rights of customers can be

breached in cases where cookies are used.

Question No: 60

When customer life cycle is used to create different groups of customers, it is called?

Targeting Customers

Dynamic groups Customer Life Cycle Segmentation

Group Development

Ref: PAGE #137

Life Cycle Segmentation:

These five stages are also called customer life cycle. Using them to create groups of customers is called

customer life-cycle segmentation. Segment information is useful for companies to develop better

relationship with the customers. Companies, thus, know about their customers and their level of

relationship with the company, and can customize their product/service.

Question No: 61 Network addresses 128--- 191 range belongs to which of the following class networks?

A B C E Ref: PAGE # 11

Examples

Class A: 255.0.0.0

Class B: 255.255.0.0

Class C: 255.255.255.0

Page 437: A Mega File of It for Current Quizzes

NOTE: in McQ 128--- 191 is not written after one dot it means they are separate from each other so it

belong to A class.

Question No: 62 Which of the following property falls in HTTP?

Stateless

Stateful

Temporary

All of these

Ref: PAGE # 3

HTTP is stateless because in the fourth step the server breaks the connection. We can say, therefore:

• Each operation or transaction makes a new connection

• Each operation is unaware of any other connection

• Each click is a new connection

Question No: 63

FSTC stands for: Financial Services Technology Consortium

Financial Secrets Technology Consortium

Final Security threats control

First Service Technology Consortium

Ref: PAGE # 113

Financial Services Technology Consortium (FSTC) is a group of U.S banks, research agencies and

government organizations formed in 1993. It has introduced the concept of electronic checks. An

electronic check contains an instruction to the payer’s bank to make a specified payment to a payee.

Question No: 64

Supply chain can be broken into three parts, that is ----------------- , ----------------------- and -------------------- activities.

Internal, external support Upstream, internal ,downstream

Page 438: A Mega File of It for Current Quizzes

Primary, Secondary, R&D None of them Ref: PAGE # 155

SUPPLY CHAIN:

Supply chain includes all the activities associated with the flow and transformation of goods from the

raw materials stage all the way to the end user. Supply chain can be broken into three parts, that is,

upstream activities, internal activities and downstream activities…

• Upstream activities relate to materials/services or the input from suppliers

• Internal activities relate to manufacturing and packaging of goods

• Downstream activities relate to distribution and sale of goods to distributors/customers

Question No: 65 The process of taking active role in working with suppliers to improve products and processes is called? Value chain management Supply chain management Supply chain management software Porter Model Ref: PAGE # 155

Supply chain management:

Engaging and negotiating with suppliers can be extremely beneficial. The process of taking active role in

working with suppliers to improve products and processes is called supply chain management.

Question No: 66 Many search engines rank the site by using a program called Spider

Scorpion

Moon

Cobweb

Ref: PAGE # 138

Some search engines search the entire internet each time. Many search engines rank the site by using a

program called ‘spider’ which inspects the site before ranking.

Question No: 67 In which type of data mining, Apriori algorithms is used?

Page 439: A Mega File of It for Current Quizzes

Classification Association Characterization

Clustering

Ref: PAGE # 143

Association:

Association analysis is the discovery of association rules showing attribute-value conditions that occur

frequently together in a given set of data. It is widely used for market basket analysis. For example,

where we are recording sales of a big shopping store in databases, then by applying association mining

we may discover that certain items have a strong bondage or affinity with each other such that when

one item is purchased the other is purchased, too.Apriori algorithm is used for association mining.

Question No: 68 EDI has the key feature(s)

No paper work

No human intervention

Exchange of information takes place in seconds

All of these Ref: PAGE # 147

EDI include:

• No paper work

• No human intervention

• Exchange of information takes place in seconds

Question No: 69 Addresses are tied to the device itself and give no clue to it's location on a global scale. This is the characteristics of IP RIP MAC None of the given Ref: PAGE # 13

Media access control (MAC) address:

Data to be delivered on a network has to be converted first into serial transmission. This is done

through a devicecalled Network Interface Card (NIC) that must be installed in a computer on the

Page 440: A Mega File of It for Current Quizzes

network. NIC has also got printed on it a 48 bits unique address called the MAC or hardware address of

the computer machine. In other words, it consists of 12 hexadecimal characters and can have different

format as shown

Below:

090017A9B2EF

09:00:17:A9:B2:EF

09-00-17-A9-B2-EF

Whereas the IP address of a computer may change from time to time, its MAC address would remain

the same unless the existing NIC is replaced with another. It can easily be inferred that there are 248

unique MAC addresses possible (which is an unimaginably high number). An organization

called Institute of Electrical and Electronic Engineers (IEEE) administers the allocation of MAC

addresses, worldwide. It ensures that there is no duplication of MAC addresses by the manufacturers

of NICs.

Question No: 70 When two or more intranets are connected to each other they form a/an ------------- . intranet internet extranet VPN Ref: PAGE # 98

VPN is the example of an extranet. You know that when two or more intranets are connected to each

other they form an extranet. A manufacturing company thus can be connected to its suppliers of raw

material and its distributors through VPN.

Question No: 71 ( Marks: 1 ) - Please choose one Which attribute can be used to make a region non-clickable? none of the given target alt nohref Ref: PAGE # 37

<Area> tag attributes:

Page 441: A Mega File of It for Current Quizzes

‘alt’ attribute is used to label the clickable region. ‘Target’ attribute can be used to display result in a

given frame.‘Nohref’ attribute can be used to make a region non-clickable. For example, <Area

shape=“circle” coords=“70,45,25” href=“a.htm” alt=“a.htm” target=“upper” nohref>

Question No: 72 Which of the following payment mode does not require customer to pay interest to the bank on each transaction? Credit card Debit card Electronic check All of the above Ref: PAGE # 110

In case of a credit card the issuer bank charges interest from the client at a specified rate on the amount

lent. On the other hand, in case of a debit card no such interest is payable since the customer uses

his/her own money in that case.

Question No: 73 Cyber wallet can automatically assemble the correct payment and pay it too. True False Ref: PAGE # 118

E-cash Purchase:

Having received an order the merchant sends a payment request to the client in the following format:

Payreq={currency,amount,timestamp,merchant_bank ID, merchant_accID, order description}

Cyber wallet automatically assembles the correct payment amount and pays.

Question No: 74 SET doesn’t require special software on the client or merchant side. True False Ref: PAGE # 122

Merchants must have special SET software to process transactions. Customers must have digital wallet

software that stores certificates and card information.

Page 442: A Mega File of It for Current Quizzes

Question No: 75 Which model allows the users to log-on on a website and assume the role of bidder or seller? Online Banking. Storefront Model. E-Learning. Auction Model Ref: PAGE # 128

Auction Model:

In this model there are auction sites to which the users can log-on and assume the role of a bidder or

seller.

Question No: 76 Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Is it? True False Ref: PAGE # 176

Civil law and criminal law. Civil law deals with the private rights of the parties, whereas the object of

criminal law is to punish the wrong-doer. Civil wrongs such as breach of contract are deemed to violate

only the rights of individuals and not the society in general.

Question No: 77 In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, ---------------- and ---------- Acceptance and consideration Acceptance and Rejection Approval and consideration None Ref: PAGE # 178

Online contracts:

In the physical world three elements must be satisfied in order to make a valid contract, namely, offer,

acceptance and consideration. The same three elements must also be present in case of a valid online

contract.

Question No: 78 In online environment acceptances may be issued by an imposter/cheater that has authority to bind the online business

Page 443: A Mega File of It for Current Quizzes

True False Ref: PAGE # 178

In online environment acceptances may be issued by an imposter/cheater that does not have

authority to bind the online business. To overcome this problem companies and individuals can use

digital signatures to establish identity in online transactions.

Question No: 79 #00ff00 in HTML indicates Pure green color Pure blue color Pure red color Pure yellow color Ref: PAGE # 23

<BODY bgcolor=“Green” text=“white” link=“red”> Instead of giving the color name as value of ‘bgcolor’

one can also provide value in terms of a six digit code based on hexadecimal numbers called RGB values,

e.g, #00FF00 refers to pure green color.

Question No: 80 Virtual PIN Payment System requires both merchant and buyer to register with _______________. Auto Clearing House (ACH) First Virtual (FV) DSS (Digital Signature Standard) DES (Data Encryption Standard) Ref: PAGE # 110

Both merchants and buyers are required to register with First Virtual (FV). A buyer registering with FV

forwards his or her credit card details and email address to FV and in exchange receives a pass phrase

called, Virtual PIN.

Question No: 81 Identity that machine which services the internet request? Web Client Web Server Browser

Page 444: A Mega File of It for Current Quizzes

Mozilla Ref: PAGE # 2

Basic Definitions:

Web client- machine that initiates internet request

Web server – machine that services internet request

Browser - software at the client side to interact with web data

Intranet – an internal network of computers confined to a single place

Extranet – when two or more intranets are connected with each other, they form an Extranet – e.g,

Virtual Private Network

Internet – a global network of networks is defined as internet

Question No: 82 What does ETO stands for Electronic Transactions Ordinance Electric Transport ordinance Electronic Treaty Organization All Ref: PAGE # 163

Electronic Transactions Ordinance, 2002 (ETO):

ETO is the law introduced in 2002 which extends to the whole of Pakistan. It basically provides legal

recognition to documents in electronic form and to electronic signatures. To understand this law, it

would be useful to revise the concept related to the working of digital signature technology (refer to

Lecture no. 23). We shall look at salient provisions/features of this law as it directly deals with e

commerce in Pakistan. Section 2 of the ETO defines different terms used in it. For convenience these

terms have been reproduced here (you do not need to memorize these for exam).

Question No: 83 Which one of the following algorithms does not include in symmetric key algorithms DES RC2 RC4 RSA Ref: PAGE # 108

Following is the list of some popular symmetric key algorithms:

DES (Data Encryption Standard) – 56 bits

Page 445: A Mega File of It for Current Quizzes

IDEA (International Data Encryption Algorithm (IDEA) – 128 bits

RC2 – (block cipher) 1-2048 bits

RC4 (stream cipher) – 1-2048 bits

Rinjdael – 128-256 bits

Question No: 84 EFT stands for Electronic Funds Transfer Electronic Finance Transfer Easy Funds Transfer Early Funds Transaction Ref: PAGE # 114

EFT stands for ‘electronic funds transfer’.

Question No: 85 Television, radio and print media are in a (n) ……………………. Mode Passive Active Static Dynamic Ref: PAGE # 139

Emotional branding vs. rational branding:

In case of television, radio or print media people are normally in a passive mode. To a greater extent

they do not control the communication channel and thus have to listen or view the advertisement about

a brand.

Question No: 86 Cipher suite is a combination of Cryptographic Algorithm Authentication methods Security layers Cryptographic Algorithm And Authentication methods Ref: PAGE # 121

SSL Handshake:

Page 446: A Mega File of It for Current Quizzes

SSL supports a variety of encryption algorithm and authentication methods. The combination of

algorithms and methods is called a cipher suite. When a client connects to an SSL server, the SSL

handshake begins, which means that the two negotiate a cipher suite selecting the strongest suite the

two have in common.

Question No: 87 Which device uses the MAC address Switch Router Repeater None of these Ref: PAGE # 15 & 16

A switch would read the MAC address on a data packet and match it with the list of MAC addresses of

the user machines contained in it. It then sends data packets only to that machine on a VLAN to which

these packets relate. But on PAGE 16 about router see below line

Routers:

Routers use a combination of hardware and software to forward data packets to their destination on the

internet. They are more efficient and sophisticated than bridges and switches.

So my answer is Router

Question No: 88 Choose the correct HTML code line which left-align the content inside a tablecell. <td leftalign> <td valign="left"> <td align="left"> <tdleft> Ref: PAGE # 26

Attributes for <TD> tag:

Width - <td width=“50%”> specifies width of a cell with reference to the table width. Align - <td

align=“center”> is used to align the text in a cell accordingly (you can also use left and right as values of

‘align’). Valign- <td valign=“top”> is used to vertically align the text in a cell (you can also use bottom or

middle as values of ‘valign’).

Question No: 89 Which one of following illustrates relationship between "<! -->" and // ?

Page 447: A Mega File of It for Current Quizzes

Closely related Hide the code Different Hide the tags Question No: 90 We can divide the Client Server architecture up to: 1 Tier 2 Tier 3 Tier N –Tier Ref: PAGE # 89

We can divide the client server architecture into n – tiers.

Question No: 91 DSS stands for Digital Signature Standards Digital Support Standards Decision support system Digital Sign System Ref: PAGE # 108

Following is the list some popular public key algorithms:

DSS – Digital Signature Standard based on DSA (Digital Standard Algorithm) – key length is between

512-1024 bits

Question No: 92 Which one of the followings is an example of Banner advertising? Branding Affiliate programs Partnership All of these Ref: PAGE # 138

Affiliate Programs:

Page 448: A Mega File of It for Current Quizzes

An affiliate program is an agreement between two parties that one will pay the other a commission

based on a specified customer action. It is not a strategic union as is partnership. Rather, it is for limited

purpose and time. Banner advertising is the example of an affiliate program.

Question No: 93 A firm Glory Enterprise and it wants to have its web site. It also wants to have the word glory as a part of its domain name because for years it has been recognized in the physical world through this word. However, at the time of registration of its domain name it finds that a person Mr. A. who has nothing to do with the business of the firm or the word glory have already registered a domain name containing this word as a part of it. Since there cannot be two similar domain names, the firm is forced to request Mr. A to transfer that domain name to it. In response, if Mr. A blackmails or claims ransom from the said firm, He would be said to have committed -------------. Cyber squatting Parasites Patent infringement Trade mark and domain name conflicts Ref: PAGE # 181

Cyber squatting:

The act of intentionally registering domain names containing trademarks/trade names of prominent

Companies to later blackmail or demand ransom from those companies is called cyber squatting. It is

Regarded as an offence in most countries. Assume there is a firm ‘Glory Enterprise’ and it wants to have

its web site. It also wants to have the word ‘glory’ as a part of its domain name because for years it has

been recognized in the physical world through this word. However, at the time of registration of its

domain name it finds that a person Mr. ‘A’ who has nothing to do with the business of the firm or the

word ‘glory’ has already registered a domain name containing this word as a part of it. Since there

cannot be two similar domain names, the firm is forced to request Mr. ‘A’ to transfer that domain name

to it. In response, if Mr. ‘A’ blackmails or claims ransom from the said firm, he would be said to have

committed cyber squatting.

Question No: 94 In which type of approach, we further dig the data for retrieving information from data warehouse? Slice Dice Drill down Roll up Ref: PAGE # 146

Page 449: A Mega File of It for Current Quizzes

Using drill-down we can further dig the data to receive some specific information. For example using

that I can find the sale of furniture in a specific month of the first quarter, say, February. Roll-up is the

reverse of drill-down.

Question No: 95 Which activity does not include in Primary Identify Customers Design Delivery Administration Ref: PAGE # 152

Question No: 96 What of the following is the correct HTML tag for making a drop-down list? <input type="list"> <input type="dropdown"> <select> <list> Ref: PAGE # 29

Selection lists:

General format <select name=“field name” size=“no. of items”> between

the <select> and </select> tags are the <option> and </option> tags which define the list items. If you

omit “size” the list becomes a drop-down list. If size is two or more, the list becomes a rectangle with

scroll bars for navigating the choices. Using ‘Selected’ attribute an item is selected by default.

Page 450: A Mega File of It for Current Quizzes

Question No: 97 What does HTML stand for? Hyperlinks and Text Markup Language Home Tool Markup Language Hyper Text Markup Language Homepage Text Making Language Ref: PAGE # 18

Hypertext markup language:

Web documents are defined by the Hypertext Markup Language (HTML). It is a language of tags. A tag is

a special letter or key word enclosed in angular brackets.

Question No: 98 JavaScript variables can begin with ----------- . a lower case letter an underscore character a dollar sign all of the above Ref: PAGE # 54

Rules for variables:

Variable names can begin with an uppercase letter (A-Z), lower case letter (a-z), an underscore

character (_), ordollar sign ($).

Question No: 99 A unique large number, generated as a result of applying hash function on a message is called ________. Hash message Message digest Digitally singed message Secret message Ref: PAGE # 124

SET software on the customer side splits the order information from the account information. MDI is

the message digest obtained by applying hash function on the order information.

Question No: 100 FVIPSS stands for _________.

Page 451: A Mega File of It for Current Quizzes

First Virtual Internet Payment System Server First Virtual International Payment System Server First Virtual International Payment System Services First Virtual Internal Payment System Services Ref: PAGE # 110

Merchant queries the FV Internet Payment System Server (FVIPSS) to confirm Virtual PIN

Question No: 101 Which currency is used in e-cash Payment system? Dollar Coin Penny Cent Ref: PAGE # 116

Buyers and merchants, both, have accounts in the E-cash bank. Buyers withdraw coins against their

account and store them in e-cash wallet software (Cyber wallet) on their computer.

Question No: 102 Web browser and client wallet are installed on __________. Client's computer Bank's computer Merchant's computer None of above

Ref: PAGE # 120

Client wallet and web browser are installed on the client machine.

Question No: 103 Job searchers can search for jobs and employers can hire effectively using..... Online recruiting web sites. Online banking web sites. Online trading and lending web sites. Online news services web sites. Ref: PAGE # 128

Online Recruiting:

Page 452: A Mega File of It for Current Quizzes

Employers can recruit and job searchers can search for jobs effectively through online recruiting web

sites.

Question No: 104 According to Michael Porter, material handling is an example of primary activity in a strategic business unit. Identify the area in which this task is performed. Identify customers Market and sell Deliver activities relate to storage Purchase materials and supplies Ref: PAGE # 105

‘Deliver’ activities relate to storage, distribution and shipment of final product, e.g, warehousing,

selecting shippers, material handling, timely delivery to customers etc.

Question No: 105 IT/EC can reduce the overall ------------- and afford to keep the price of the product relatively low Production cost Marketing cost Distribution cost None Ref: PAGE # 159

A business using IT/EC can reduce the overall production cost and afford to keep the price of the

product relatively low.

Question No: 106

Law is broadly divided into two classes on the basis of nature of wrong, namely, --------- and ---------------

Civil law and criminal law ETO and criminal law Supreme and Civil Law None Ref: PAGE # 176

Law is broadly divided into two classes on the basis of nature of wrong, namely, civil law and criminal

law. Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish

the wrong-doer.

Page 453: A Mega File of It for Current Quizzes

Question No: 107

Browser is installed at :

Client side machine

Web server machine

none

both Client and Server Machines

Ref: PAGE # 120

Web browser are installed on the client machine.

Question No: 108

In Virtual Payment system, four kinds of information are provided to e-bank. Identify which one is NOT

included:

Buyer Accounts identifier Buyer password Address of Merchant Actual amount of money in favor of merchant Ref: PAGE # 112

To make payment an account holder is authenticated using an account identifier and

a password, account identifier of the payee and the payment amount.

Question No: 109

To overcome the lack of physical proximity appearance problem in e-business, which technology is

going to be used

Biometrics Video conferencing Cryptography Biometrics and Video conferencing Ref: PAGE # 134

Video conferencing is an example of web casting. For example, using this technique, doctors sitting

in China, Englandand Pakistan etc. can, in real time, exchange and benefit from each other’s ideas as if

they are physically holding a meeting.

Page 454: A Mega File of It for Current Quizzes

Question No: 110

Dividing the potential customers into groups is called

Market Segmentation

Market Promotion

Market Research

Market Survey

Ref: PAGE # 131

Market Segmentation:

Businesses need to identify specific portions of their markets in order to target them with specific

advertising messages. The practice called market segmentation divides the potential customers into

segments or groups.

Question No: 111

Traditionally Marketer use the market segmentation(s) like

Geo-graphic Segmentation Demographic Segmentation Psychographic Segmentation All of the above Ref: PAGE # 131

Traditionally, marketers have used three types of variables to define three different market

segmentations, namely,geographic segmentation, demographic segmentation and psychographic

segmentation.

Question No: 112

In…………………, there is no direct contact with the end users.

B2B B2C C2C All above options Ref: PAGE # 137

Page 455: A Mega File of It for Current Quizzes

Key difference between B2C and B2B is that in case of B2B there is no direct contact with the end

users, whereas this contact exists in B2C. Thus, an e-business can have direct response or feedback from

its customers in B2C as compared to B2B.

Question No: 113

Allocation of MAC addresses is administered by --------------------------

ICAAN ISO IEEE None Ref: PAGE # 13

It can easily be inferred that there are 248 unique MAC addresses possible (which is an unimaginably

high number). An organization called Institute of Electrical and Electronic Engineers (IEEE) administers

the allocation of MAC addresses, worldwide. It ensures that there is no duplication of MAC addresses by

the manufacturers of NICs.

Question No: 114

As a Web developer you can define a style sheet for?

HTML elements and apply to many Web pages. A HTML element and apply to single Web page. A HTML element and apply to many Web pages. HTML elements and apply to one Web page. Ref: PAGE # 38

Style sheets:

Style sheet instructions can be embedded in the HTML document. An advantage of applying style sheets

is that definition of the style’s formatting is created once and the browser applies that formatting each

time the tag is used. Secondly, pages are easier to modify, that is, edit the style definition and all the

places where the style is used within the page get updated automatically. Most popular type of style

sheets is Cascading Style Sheets.

Question No: 115

What shall come in blanks for proper result,

Here blanks are numbered with 1,2 and 3

Page 456: A Mega File of It for Current Quizzes

<html>

<head>

<SCRIPT language="JavaScript">

Var num1, var num2

Document.container .result.value=parseFloat(num1)-parseFloat(num2)

</script>

</head>

<body>

<FORM name=”---------1-----------”>

<input type=”----------2-------” name=”-------3---------” maxlength=”5”>

</form>

</body>

</html>

container, text and result result, value and container container , button and value result, container and text

Question No: 116

What does XML stand for?

eXtra Modern Link X-Markup Language eXtensible Markup Language Example Markup Language Ref: PAGE # 74

Extensible markup language:

World Wide Web Consortium (W3C), a non-profit organization that maintains standards for the web

presented the draft of XML in late 1990’s.

Question No: 117

Page 457: A Mega File of It for Current Quizzes

Cryptographic Algorithms are measured in terms of

Key length Complexity Simplicity All of the above Ref: PAGE # 107 & 108

Key Length:

A cryptographic key is represented as a string of binary digits – 0’s & 1’s- inside a computer.

&

Cryptographic algorithms are measured in terms of key length.

Question No: 118

-----------means that your product/service has certain quality that makes it more attractive than the one

offered by your competitor, despite the price of your competitor’s product/service is somewhat lower

Differentiation Focus Cost leadership None of them Ref: PAGE # 157

Differentiation:

Differentiation means that your product/service has certain quality that makes it more attractive than

the one offered by your competitor, despite the price of your competitor’s product/service is somewhat

lower.

Question No: 119

Characterization and Clustering belong to which of the following types of Data Mining?

Additive Predictive Selective Descriptive Ref: PAGE # 141

Classification and association are predictive types of data mining while characterization and clustering

represent the descriptive type.

Page 458: A Mega File of It for Current Quizzes

Question No: 120

In which type of data mining, ID3 algorithms is used?

Classification Association Characterization Clustering Ref: PAGE # 141

Classification:

It allows you to have a predictive model labeling different samples to different classes. The results of this

type of mining/model are represented as (if-then) rules, decision trees, neural networks etc. Two

important algorithms used for this type are ID3 Algorithm, and Bayesian classification.

Question No: 121

ANSI stands for ……….

American National Standards Institute All Network Standards Institute American New standards Institute Australia National standards Institute Ref: PAGE # 147

ANSI (American National Standards Institute)

Question No: 122

Who is making the Web standards?

International Standard Organization ANSI Microsoft The World Wide Web Consortium Ref: PAGE # 74

World Wide Web Consortium (W3C), a non-profit organization that maintains standards for the

web presented

Page 459: A Mega File of It for Current Quizzes

Question No: 123

Which of following is NOT an attribute of <AREA> tag?

shape circle href cords Ref: PAGE # 37

<Area shape=“circle” coords=“70,45,25” href=“a.htm” alt=“a.htm” target=“upper” nohref>

Question No: 124

Which of the following is an advantage of symmetric algorithms?

Symmetric algorithms are faster Symmetric algorithms don't include any encryption Symmetric algorithms are slow in nature None of above Ref: PAGE # 105

A symmetric key can also be used for encrypting a message instead of using the pair of public and

private keys. The advantage of using symmetric key is that since symmetric algorithms are faster as

compared to asymmetric, therefore, the encryption of a message with the symmetric key takes place

quickly.

Question No: 125

What is the right sequence of steps in?

Payee’s bank → Payer’s bank → Payee → Payer. Payer’s bank → Payee → Payee’s bank → Payer. Payer’s bank → Payee’s bank → Payer → Payee. Payer → Payee → Payee’s bank → Payer’s bank. Ref: PAGE # 113

Page 460: A Mega File of It for Current Quizzes

Question No: 126

The key feature of E-Cash Payment system is __________.

Simplicity Anonymity Availability Connectivity Ref: PAGE # 116

A company, DigiCash, has pioneered the use of electronic cash or e-cash. Anonymity of the buyer is the

key feature of this system. There are three participants in it, namely, buyer, merchant and bank. Both,

symmetric and asymmetric type of cryptography is used in this system.

Question No: 127

In storefront e-business model buyers and sellers interact ___________ with each other.

Directly. Indirectly. Through a third party.

Page 461: A Mega File of It for Current Quizzes

None of above. Ref: PAGE # 128

Storefront Model:

It represents basic form of e-commerce where buyers and sellers interact directly.

Question No: 128

Customers grouped by variables such as social class, personality or approach to life or lifestyle, is called

___________.

Demographic Segmentation. Geographic Segmentation. Psychographic segmentation. Behavioral segmentation. Ref: PAGE # 131

Psychographic segmentation:

Here customers are grouped by variables such as social class, personality or approach to life or lifestyle.

Question No: 129

According to Michael Porter, “material handling” is an example of primary activity in a strategic business

unit. Identify the area in which this task is performed.

Identify customers Market and sell Deliver’ activities relate to storage Purchase materials and supplies Ref: PAGE # 152

‘Deliver’ activities relate to storage, distribution and shipment of final product, e.g, warehousing,

selecting shippers, material handling, timely delivery to customers etc.

Question No: 130

According to Michael Porter, “fabricating” is an example of primary activity in a strategic business unit.

Identify the area in which this task is performed.

Market and sell Deliver’ activities relate to storage Purchase materials and supplies Manufacture product or create service

Page 462: A Mega File of It for Current Quizzes

Ref: PAGE # 152

‘Manufacture product or create service’ activities relate to transformation of materials and labor into

finished products, e.g, fabricating, assembling, packaging etc.

Question No: 131

Web catalogue revenue model includes

Online sellers of computer Gifts, flowers, clothes Journals Both first & second options Ref: PAGE # 130

Businesses using this type of a model include online sellers of computers, electronic items, books,

music, videos, toys, flowers, gifts, clothes etc. Payment received from customers is the source of

earning revenue.

Question No: 132

In which type of approach, we sum up and integrate the information in a particular dimension to show

the result?

Dice Drill down Roll up Slice Ref: PAGE # 146

Roll-up is the reverse of drill-down. In it we can sum-up or integrate the information in a particular

dimension to show the result. For example the sale of furniture or computers in a particular year

(rather than a specific quarter) can be viewed using roll-up.

Question No: 133

EDI used for ______.

Page 463: A Mega File of It for Current Quizzes

Used by organizations for transactions that not occur on a regular basis according to a pre-determined

format.

Used by organizations for transactions that occur on a regular basis according to a pre-determined

format.

Both

NONE of Above

Ref: PAGE # 147

ELECTRONIC DATA INTERCHANGE (EDI)

EDI is used by organizations for transactions that occur on a regular basis according to a pre–

determined format.

Question No: 134

Supply Chain Mangment broken down into ___________.

Upstream activities

Internal activities

Downstream activities

All of Above

Ref: PAGE # 155

SUPPLY CHAIN:

Supply chain includes all the activities associated with the flow and transformation of goods from the

raw materials stage all the way to the end user. Supply chain can be broken into three parts, that is,

upstream activities, internal activities and downstream activities…

Page 464: A Mega File of It for Current Quizzes

• Upstream activities relate to materials/services or the input from suppliers

• Internal activities relate to manufacturing and packaging of goods

• Downstream activities relate to distribution and sale of goods to distributors/customers

Question No: 135

Mailbox:

Outgoing messages can be placed.

Incoming messages can be picked up.

Ref: PAGE # 148

Postbox: where outgoing messages are placed, and

Mailbox: where incoming messages can be picked up

Question No: 136

In many countries, stealing and misusing of meta information for getting competitive advantage is

considered as an offence known as

Tort of Private Nuisance

Tort of Tress passing

Tort of passing off

Defamation

Ref: PAGE # 138

In many countries, stealing and misusing Meta information in this manner to gain business/competitive

advantage is considered as an offence known as the tort of passing-off.

Page 465: A Mega File of It for Current Quizzes

Question No: 137

Three basic strategies for competitive advantage: __________.

Cost leadership

Differentiation

Focus

All of Above

Ref: PAGE # 157

Competitive Strategy:

Ability of an organization to prosper arises from its competitive advantage over other organizations

operating within its market sector. The strategy of a business to achieve this goal of competitive

advantage is known as competitive strategy. Three basic strategies for competitive advantage are as

under:

• Cost leadership

• Differentiation

• Focus

Question No: 138

Which of these is an algorithm used in clustering?

K-means

L-means

C-means

Page 466: A Mega File of It for Current Quizzes

F-means

Ref: PAGE # 145

K-means algorithm is normally used in clustering.

Question No: 139

Web is a(n)…………….. Medium to disseminate information.

Passive

Active

Static

All of these

Ref: PAGE # 139

Emotional appeals are difficult to covey on the internet because web is an active medium largely

controlled by the customers

Question No: 140

Each VAN has a centralized computer system that maintains ______________.

One File

Two Files

Three Files

Page 467: A Mega File of It for Current Quizzes

Four Files

Ref: PAGE # 148

Each VAN has a centralized computer system that maintains two files for each user, that is,

Postbox: where outgoing messages are placed, and

Mailbox: where incoming messages can be picked up

Question No: 141

EDI Advantages inclues ______

Short time

Reduced Costs

Both

None of Above

Ref: PAGE # 147

Instance, packaging material should only be ordered for just in time (JIT) delivery, so that E-Pens can cut

down on its stock of packaging and reduce the inventory cost.

Question No: 142

Popular software packages for personal finance are ___________.

Quicken

Page 468: A Mega File of It for Current Quizzes

MS Money

Money 2003

All of Above

Ref: PAGE # 152

Popular software packages for personal finance are Quicken, MS Money and Money 2003 etc.

Question No: 143

Meta tag contains:

User information

Seller information

Web page key information

Bank information

Ref: PAGE # 138

META INFORMATION:

You know that a Meta tag contains the key information of a web page.

Question No: 144

Popular EDI standards are _______.

Page 469: A Mega File of It for Current Quizzes

ANSI (American National Standards Institute) X12 standard

EDIFACT (United Nations Standard of Electronic Data Interchange for Administration, Commerce and

Transport)

Both

None of Above

REF: PAGE # 147

EDI documents are formatted using published standards. Two popular EDI standards are –

ANSI (American National Standards Institute) X 12 standards and EDIFACT (United Nations Standard of

Electronic Data Interchange for Administration, Commerce and Transport).

Question No: 145

Technology development relates to activities ___________.

Fields tests

Maintenance of procedures

Process improvement studies

All of Above

Ref: PAGE # 153

‘Technology development’ relates to activities which help improve product/service that a business is

selling and also help improve processes in every primary activity, e.g., fields tests, maintenance of

procedures, process improvement studies etc.

Page 470: A Mega File of It for Current Quizzes

Question No: 146

Where there are quite a few erroneous or missing values in a row then that row can be deleted or

discarded. This process is called...............

Data Deletion

Data Selection

Data Integration

Data Transformation

Ref: PAGE # 141

Where there are quite a few erroneous or missing values in a row, then that row can be

discarded/deleted altogether. This process is called data selection.

Question No: 147

Upstream activities of the Supply Chain Managment relate to ___________.

materials/services

The input from suppliers

Both

None of Above

Ref: PAGE # 155

Upstream activities relate to materials/services or the input from suppliers

Page 471: A Mega File of It for Current Quizzes

Question No: 148

Focus strategy means _____________________.

That ability to sell the goods or provide the service at a price that is lower than that of competitors

That your product/service has certain quality that makes it more attractive

That concentration on a single aspect of the market

Concentration on many aspect of the market

Ref: PAGE # 157

Focus:

Focus strategy is defined as concentration on a single aspect of the market. That single aspect can be a

particular market segment or market area or product type.

Question No: 149

What is true about Personal finance?

Sell you products in no time.

Buy you products in no time.

Allows the management of your financial matters in a customized manner

None

Ref: PAGE # 152

Page 472: A Mega File of It for Current Quizzes

PERSONAL FINANCE ONLINE:

Personal finance allows the management of your financial matters in a customized manner.

Question No: 150

What is true about ERP?

Integrate all business functions

At Single Location

Efficient use of resource

ALL Above

Ref: PAGE # 93

Enterprise Resource Planning:

Enterprise Resource Planning (ERP) is a concept that integrates all aspects of a business e.g, accounting,

logistics, manufacturing, marketing, planning, project management etc. at a single place. An ERP system

such as SAP is expensive.

Question No: 151

Supply Chain Managment can be broken down into ___________.

One Activity

Two Activities

Page 473: A Mega File of It for Current Quizzes

Three Activities

Four Activties

Ref: PAGE # 155

• Upstream activities relate to materials/services or the input from suppliers

• Internal activities relate to manufacturing and packaging of goods

• Downstream activities relate to distribution and sale of goods to distributors/customers

Question No: 152

VAN Stands for ______.

Value Added Network

Value Added Noise

Ref: PAGE # 148

Value Added Network (VAN):

Value added networks are third party networks that provide services to execute authorized transactions

with valid trading partners using EDI.

Question # 1 Advantages of VAN in EDI are ________.

Select correct option:

Time independence.

Protocol dependence.

Reference page 149

Advantages of VAN

Two big advantages of using a VAN in EDI are time independence and protocol independence. Time

independence means that the sending and receipt of the interchange or messages can be carried out at

the convenience of the users involved. Thus, they are not required to be connected with each other at

the same time. Protocol independence means that interchanges are re-enveloped with the transmission

protocol appropriate to the recipient when they are retrieved from the postbox by the VAN. Thus, a

VAN can provide protocol compatibility between the sender and the recipient, wherever that is missing.

Page 474: A Mega File of It for Current Quizzes

Question #2

VAN Stands for ____.

Select correct option:

Value Added Network

Value Added Noise

www..net

Reference: page 148

Value Added Network (VAN)

Value added networks are third party networks that provide services to execute authorized transactions

with valid trading partners using EDI. Each VAN has a centralized computer system that maintains two

files for each user, that is, Postbox: where outgoing messages are placed, and Mailbox: where incoming

messages can be picked up

Question # 3

Web is a(n)…………….. Medium to disseminate information.

Select correct option:

Passive

Active

Static

All

Question # 4

In which type of data mining, ID3 algorithms is used?

Select correct option:

Classification

Association

Characterization

Clustering

Reference: page 141

Classification

It allows you to have a predictive model labeling different samples to different classes. The results of this

type of mining/model are represented as (if-then) rules, decision trees, neural networks etc. Two

important algorithms used for this type are ID3 Algorithm, and Bayesian classification. Decision tree is

a graphical representation of the if-then rules. Fig. 3 below shows the result of classification in the form

of a decision tree. Initially, the whole data is divided into two sets – training data and test data.

www..net

Question # 5

Page 475: A Mega File of It for Current Quizzes

In many countries, stealing and misusing of meta information for getting competitive advantage is

considered as an offence known as Select correct option:

Tort of Private Nuisance

Tort of Tress passing

Tort of passing off

Defamation

Reference: page 138

A business can improve its ranking on search engines by capitalizing upon the reputation of the business

whose Meta information it actually is. In many countries, stealing and misusing Meta information in this

manner to gain business/competitive advantage is considered as an offence known as the tort of

passing-off.

Defamation

Question # 6

Which of these is NOT a stage of knowledge discovery process?

Select correct option:

Transformation

Data mining

Pattern evaluation

Process evaluation

Reference: page 140

Knowledge discovery

A knowledge discovery process includes data cleaning, data integration, data selection, data

transformation, data mining, pattern evaluation and knowledge presentation.

www..net

Question #7

Poter Market and sell activities relates to ___________.

Select correct option:

advertising, promotions

managing salespersons

monitoring distribution channel

All of Above

Question #8

Page 476: A Mega File of It for Current Quizzes

Human resources refer to the activities that coordinate ___________.

Select correct option:

management of employees

recruiting

hiring, compensation and benefits

All of Above

Reference: page 153

‘Human resources’ refer to the activities that coordinate management of employees, e.g,

recruiting, hiring, compensation and benefits etc.

www..net

Question #9

EDI used for ____.

Select correct option:

used by organizations for transactions that not occur on a regular basis according to a pre-determined

format.

used by organizations for transactions that occur on a regular basis according to a pre-determined

format.

Both

NONE of Above

Reference: page 147

EDI is used by organizations for transactions that occur on a regular basis according to a pre-determined

format. It involves exchange of electronic business documents, i.e., purchase orders, invoices etc. EDI

transactions are carried through special EDI software. This technology was popularly used before the

introduction of e-commerce by different trading partners on private electronic networks. Key features of

EDI include:

No paper work

No human intervention

Exchange of information takes place in seconds

Question #10

Strategic business unit is a combination of a particular ___________.

Select correct option:

product

distribution channel

customer type

All of Above

Reference page 152

strategic business unit undertakes to design, produce, promote, market, deliver and support the

products or services it sells.

Page 477: A Mega File of It for Current Quizzes

www..net

Question #11

VAN can ___.

Select correct option:

Reduce network traffic

Provide protocol compatibility between the sender and the recipient, wherever that is missing.

Reference: page 147

Advantages of VAN

Two big advantages of using a VAN in EDI are time independence and protocol independence. Time

independence means that the sending and receipt of the interchange or messages can be carried out at

the convenience of the users involved. Thus, they are not required to be connected with each other at

the same time. Protocol independence means that interchanges are re-enveloped with the transmission

protocol appropriate to the recipient when they are retrieved from the postbox by the VAN. Thus, Van

can provide protocol compatibility between the sender and the recipient, wherever that dismissing.

Question #12

Poter Finance and administration activities relate to ___________.

Select correct option:

accounting, paying bills and borrowing funds

purchasing and borrowing funds

‘Finance and administration’ activities relate to accounting, paying bills, borrowing funds and

complying with government regulations etc.

Question # 13

Characterization and Clustering belong to which of the following types of Data Mining?

Select correct option:

Predictive

Selective

Descriptive

Additive

Reference: page 141

Classification and association are predictive types of data mining while characterization and clustering

represent the descriptive type.

Question #14

Page 478: A Mega File of It for Current Quizzes

Consider the following definition template < class T > class Xyz { … };

Select correct option:

it defines a class template for integers only

it defines a class template for any class

class templates are not defined in this way

none of given options

www..net

Question #15

Technology development relates to activities _________.

Select correct option:

fields tests

maintenance of procedures

process improvement studies

All of Above

Reference: page 153

‘Technology development’ relates to activities which help improve product/service that a business is

selling and also help improve processes in every primary activity, e.g, fields tests, maintenance of

procedures, process improvement studies etc.

Question #16

The process of taking active role in working with suppliers to improve products and processes is

called____________.

Select correct option:

ERP

Marketing

Supply Chain Management

Sale

Reference: page 155

Supply chain management

Engaging and negotiating with suppliers can be extremely beneficial. The process of taking active role in

working with suppliers to improve products and processes is called supply chain management.

Question # 17

What is true about ERP?

Select correct option:

Integrate all business functions

At Single Location

Efficient use of resource

ALL Above

Reference: page 150

Page 479: A Mega File of It for Current Quizzes

Enterprise Resource Planning (ERP)

ERP is an approach that attempts to integrate all departments and functions across a company onto a

single computer system that can serve all those different departments' particular needs. For example,

finance, manufacturing and the warehouse department of a company may have their own software to

perform tasks specific to each one of them. However, each software can be linked together so that a

customer service representative can see the credit rating of a customer from finance module,

warehouse information from warehouse module, and shipment information from the shipment module.

SAP is an example of ERP software. ERP is complex. It is not intended for public consumption as

properintegration of ERP with e-commerce applications is still a major problem.

Question # 18

Each VAN has a centralized computer system that maintains ____________.

Select correct option:

One File

Two Files

Three Files

Four Files

www..net

Reference: page 148

Value Added Network (VAN)

Value added networks are third party networks that provide services to execute authorized transactions

with valid trading partners using EDI. Each VAN has a centralized computer system that maintains two

files for each user, that is,

Postbox: where outgoing messages are placed, and

Mailbox: where incoming messages can be picked up

Question #19

_________ strategy is defined as concentration on a single aspect of the market.

Select correct option:

Focus

Differentiation

Reference: page 157

Focus

Focus strategy is defined as concentration on a single aspect of the market. That single aspect can be

particular market segment or market area or product type. For example, if my competitors are focusing

indifferent market areas, I may, on the other hand, plan that I can be more profitable by concentrating

on one particular area. It may be a particular province or a city etc. where I may have a better

distribution channel.

Page 480: A Mega File of It for Current Quizzes

Question # 20

Survey and market research are used for which poetr identified activity?

Select correct option:

Identify Design

Identify customer

Reference: page 152

Identify customers’ refer to those activities which try to find new customers and ways to serve

better to the existing ones, e.g, surveys and market research;

‘Design’ activities take a product form concept stage to manufacturing stage. They include concept

research, engineering, drawings preparation, test marketing etc..

Question # 21

Internal activities of the Supply Chain Management relate to ________________.

Select correct option:

manufacturing

packaging of goods

Both

NONE of Above

Reference: page 155

SUPPLY CHAIN

Supply chain includes all the activities associated with the flow and transformation of goods from the

raw materials stage all the way to the end user. Supply chain can be broken into three parts, that is,

upstream activities, internal activities and downstream activities.

Upstream activities relate to materials/services or the input from suppliers

Internal activities relate to manufacturing and packaging of goods

Downstream activities relate to distribution and sale of goods to distributors/customers

Question #22

Upstream activities of the Supply Chain Managment relate to _________.

Select correct option:

materials/services

the input from suppliers

Both

None of Above

Reference: page

Supply chain includes all the activities associated with the flow and transformation of goods from the

raw

Page 481: A Mega File of It for Current Quizzes

materials stage all the way to the end user. Supply chain can be broken into three parts, that is,

upstream

activities, internal activities and downstream activities.

Upstream activities relate to materials/services or the input from suppliers

Internal activities relate to manufacturing and packaging of goods

Downstream activities relate to distribution and sale of goods to distributors/customers

www..net

Question #23

Ability of an organization to prosper arises from its competitive advantage over other organizations

operating within its market sector: _________.

Select correct option:

Differentation

Focus

Competitive Startegy

None

Reference: page 157

Competitive Strategy

Ability of an organization to prosper arises from its competitive advantage over other organizations

operating within its market sector. The strategy of a business to achieve this goal of competitive

advantage

is known as competitive strategy. Three basic strategies for competitive advantage are as under:

Activities associated with the flow and transformation of goods from the raw materials stage all

theQuestion #24

way to the end user _________.

Select correct option:

Marketing

Supply Chain Management

ERP

Reference: page 93

Supply Chain Management (SCM) Software

Supply chain involves all activities associated with flow and transformation of goods from raw material

stage to the finished stage and their supply to the end users. Supply chain management software helps

companies to coordinate planning and operations with their partners in industry. SCM planning software

helps companies develop demand forecasts using information from each player in supply chain. SCM

execution software helps with tasks such as the management of warehouses and transportation

facilities.

Page 482: A Mega File of It for Current Quizzes

Question #25

Where there are quite a few erroneous or missing values in a row then that row can be deleted or

discarded. This process is called...............

Select correct option:

Data Deletion

Data Selection

Data Integration

Data Transformation

www..net

Reference: page 141

Where there are quite a few erroneous or missing values in a row, then that row can be

discarded/deleted altogether. This process iscalled data selection. In data transformation, the data from

all different sources is converted into the same format..

Question #26

Poter identify certain activities what is the name of activity which take a product from concept stage to

manufacturing stage.

Select correct option:

Market Stage

Human Resource

Design Stage

None of Above

Design’ activities take a product form concept stage to manufacturing stage. They include concept

research, engineering, drawings preparation, test marketing etc.

Question #27

The result of OLAP is displayed in the form of a ________.

Select correct option:

Data square

Data Triangle

Data cube

Data circle

Reference: page 145

Online Analytical Processing (OLAP)

OLAP makes use of background knowledge regarding the domain of the data being studied in order to

allow the presentation of data at different levels of abstraction. It is different form data mining in the

sense that it does not provide any patterns for making predictions; rather the information stored in

Page 483: A Mega File of It for Current Quizzes

databases can be presented/ viewed in a convenient format in case of OLAP at different levels that

facilitates decision makers or managers. The result of OLAP is displayed in the form of a data cube

Question #26

Television, radio and print media are in a (n) ……………………. Mode.

Select correct option:

Passive

Active

Static

Dynamic

www..net

Question #27

EDI involves exchange of ______.

Select correct option:

Electronic business documents

Data

Resources

NONE of Above

Reference: page 146

EDI is used by organizations for transactions that occur on a regular basis according to a pre-determined

format. It involves exchange of electronic business documents, i.e., purchase orders, invoices etc.EDI

transactions are carried through special EDI software. This technology was popularly used before the

introduction of e-commerce by different trading partners on private electronic networks.

Question #28

In personal finance what is true?

Select correct option:

online data is imported automatically into the register.

transactions maintained by the software package.

account/transaction details are downloaded through the internet.

All of Above

Reference: page 152

PERSONAL FINANCE ONLINE

Personal finance allows the management of your financial matters in a customized manner. For

example, tax calculations or financial budgeting can be done through personal finance software.

Popular software packages for personal finance are Quicken, MS Money and Money 2003 etc. In

personal finance online data is imported automatically into the register of transactions maintained by

the software package as the account/transaction details are downloaded through the internet. This

information can then systematically be used to calculate taxes or prepare a budget for certain

activities.

Page 484: A Mega File of It for Current Quizzes

Question #29

Mailbox:

Select correct option:

Outgoing messages can be placed.

Incoming messages can be picked up.

Reference: Page 148

Postbox: where outgoing messages are placed, and

Mailbox: where incoming messages can be picked up

Question # 30

Which of these is an algorithm used in clustering?

K-means

L-means

C-means

F-means

Reference: page 145

K-means algorithm is normally used in clustering.

www..net

Question # 31

Many search engines rank the site by using a program called

Spider

Scorpion

Moon

Cobweb

Reference: page 138

Many search engines rank the site by using a program called ‘spider’ which inspects the site before

ranking.

Question # 32

Popular EDI standards are _______.

ANSI(American National Standards Institute) X12 standard .

Page 485: A Mega File of It for Current Quizzes

EDIFACT (United Nations Standard of Electronic Data Interchange for Administration,

Commerce and Transport).

Both

None of Above

Reference: page 147

EDI documents are formatted using published standards. Two popular EDI standards are - ANSI

(American National Standards Institute) X12 standard and EDIFACT (United Nations Standard of

Electronic Data Interchange for Administration, Commerce and Transport).

Question #33

SWOT used for _______________.

Strategic Planning

Short Term Planning

Long Term Planning

None of Above

SWOT (strengths, weaknesses, opportunities and threats) analysis

In SWOT analysis, an analyst first looks into the business unit to identify its strengths and weaknesses

then looks into the environment in which the business operates and identifies opportunities and

threatspresented by such environment.

What is true about ERP?

Select correct option:

Integrate all business functions

At Single Location

Efficient use of resource

ALL Above

Enterprise Resource Planning (ERP) is a concept that integrates all aspects of a business e.g, accounting,

logistics, manufacturing, marketing, planning, project management etc. at a single place

Page 486: A Mega File of It for Current Quizzes

The process of taking active role in working with suppliers to improve products and processes is called

______________.

Select correct option:

ERP

Marketing

Supply Chain Management

Sale

Engaging and negotiating with suppliers can be extremely beneficial. The process of taking active role in

working with suppliers to improve products and processes is called supply chain management. Today,

firms are reaching beyond limits of their own organizational structure

Consider the following definition template < class T > class Xyz { … };

Select correct option:

it defines a class template for integers only

it defines a class template for any class

class templates are not defined in this way*****

none of given options

Question # 1 of 10 ( Start time: 11:41:47 AM )

Total Marks: 1

EDI involves exchange of ________.

Select correct option:

Electronic business documents

Data

Resources

NONE of Above

Page 487: A Mega File of It for Current Quizzes

EDI is used by organizations for transactions that occur on a regular basis according to a pre-determined

format. It involves exchange of electronic business documents, i.e., purchase orders, invoices etc. EDI

transactions are carried through special EDI software

Question # 6 of 10 ( Start time:

11:46:36 AM )

Total Marks: 1

Survey and market research are used for which poetr identified activity?

Select correct option:

Identify Design**** I was select

Identify customer

Identify customers’ refer to those activities which try to find new customers and ways to serve

better to the existing ones, e.g, surveys and market research;

Question # 5 of 10 ( Start time: 11:45:11 AM )

Total Marks: 1

In which type of approach, we further dig the data for retrieving information from data warehouse?

Select correct option:

Slice

Dice

Drill down

Roll up

Using drill-down we can further dig the data to receive some specific information.

For example using that I can find the sale of furniture in a specific month of the first quarter, say,

February

Question # 2 of 10 ( Start time: 11:42:39 AM )

Total Marks: 1

Page 488: A Mega File of It for Current Quizzes

Supply Chain Mangment broken down into ___________.

Select correct option:

Upstream activities

Internal activities

Downstream activities

All of Above

Supply chain can be broken into three parts, that is, upstream activities, internal activities and

downstream activities

Question # 8 of 10 ( Start time: 11:48:11 AM )

Total Marks: 1

Poter Market and sell activities relates to _____________.

Select correct option:

advertising, promotions

managing salespersons

monitoring distribution channel

All of Above

‘Market and sell’ activities give buyers a way to purchase and provide inducement for them to do

so

, e.g, advertising, promotions, managing salespersons, monitoring distribution channel, pricing

etc.

==========done

VAN can _____.

Select correct option:

Reduce network traffic

Provide protocol compatibility between the sender and the recipient, wherever that is missing.

Page 489: A Mega File of It for Current Quizzes

Question # 2 of 10 ( Start time: 10:25:45 AM )

Total Marks: 1

What is true about Personal finance?

Select correct option:

Sell you products in no time.

Buy you products in no time.

allows the management of your financial matters in a customized manner.

None

Question # 3 of 10 ( Start time: 10:26:36 AM )

Total Marks: 1

A value chain is a way of organizing activities that each strategic business unit undertakes to

___________.

Select correct option:

design

produce

promote

All of Above

A value chain is a way of

organizing activities that each strategic business unit undertakes to design, produce, promote, market,

deliver and support the products or services it sells.

Question # 4 of 10 ( Start time: 10:27:47 AM )

Total Marks: 1

Activities associated with the flow and transformation of goods from the raw materials stage all the way

to the end user ___________.

Select correct option:

Marketing

Page 490: A Mega File of It for Current Quizzes

Suply Chain Managment

ERP

Online Chain Control

Supply chain includes all the activities associated with the flow and transformation of goods from the

raw materials stage all the way to the end user. Supply chain can be broken into three parts, that is,

upstream activities, internal activities and downstream activities.

Question # 5 of 10 ( Start time: 10:28:35 AM )

Total Marks: 1

Porter Market and sell activities relates to _____________.

Select correct option:

advertising, promotions

managing salespersons

monitoring distribution channel

All of Above

Market and sell’ activities give buyers a way to purchase and provide inducement for them to do

so, e.g, advertising, promotions, managing salespersons, monitoring distribution channel, pricing

etc. Page 152

Question # 6 of 10 ( Start time: 10:29:59 AM )

Total Marks: 1

Technology development relates to activities ___________.

Select correct option:

fields tests

maintenance of procedures

process improvement studies

All of Above

Page 491: A Mega File of It for Current Quizzes

Technology development’ relates to activities which help improve product/service that a business

is selling and also help improve processes in every primary activity, e.g, fields tests, maintenance of

procedures, process improvement studies etc.

In personal finance what is true?

Select correct option:

online data is imported automatically into the register.

transactions maintained by the software package.

account/transaction details are downloaded through the internet.

All of Above

In personal finance online data

is imported automatically into the register of transactions maintained by the software package as the

account/transaction details are downloaded through the internet.

Question # 8 of 10 ( Start time: 10:31:35 AM )

Total Marks: 1

___________ strategy is defined as concentration on a single aspect of the market.

Select correct option:

Focus

Differentation

Focus strategy is defined as concentration on a single aspect of the market.

Question # 9 of 10 ( Start time:

10:32:02 AM )

Total Marks: 1

Popular software packages for personal finance are ___________.

Page 492: A Mega File of It for Current Quizzes

Select correct option:

Quicken

MS Money

Money 2003

All of Above

Question # 10 of 10 ( Start time:

10:32:57 AM )

Total Marks: 1

Which of these is NOT a stage of knowledge discovery process?

Select correct option:

Transformation

Data mining

Pattern evaluation

Process evaluation

A knowledge discovery process includes data cleaning, data integration, data selection, data

transformation, data mining, pattern evaluation and knowledge presentation.

Total Marks: 1

Strategic business unit is a combination of a particular _____________.

Select correct option:

product

distribution channel

customer type

All of Above

A strategic business unit is a combination of a particular product, distribution channel and customer

type.

Page 493: A Mega File of It for Current Quizzes

1) In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT

included:

Select correct option:

Buyer Accounts identifier

Buyer password

Address of Merchant

Actual amount of money in favor of merchant

2) By adding which of the following to your website improve customer service?

Select correct option:

Attractive products

Banner Advertisement

Email links

Interactive Advertising

Reference:

E-mails can be used to improve customer service by adding an e-mail link to your web site. Thus, you

can

receive your customers’ complaints through e-mails. It should be ensured that your e-business is

capable of

3) Objective of any marketing strategy is to bring the customers quickly to the _________.

Select correct option:

Familiarity stage

Exploration stage

Separation stage

Commitment stage

4) Which of these is a tool that can be used to improve customer services?

Select correct option:

Log file analysis

Cookies

Data mining

All

Page 494: A Mega File of It for Current Quizzes

5) How many stages involve in customer loyalty model for creating good customer relationship?

Select correct option:

6

5

4

3

www..net

6) Call handling, sales tracking and Transaction support(technology / personnel) activities are included in

which management system

Select correct option:

Customer Relationship Management system

Public relation management system

Inventory management system

Data Base Management system

7) You read about a company X in newspaper. Your relation with company X is at familiarity stage.

Select correct option:

True

False

8) JIT Stands for

Select correct option:

Just In Time

Joint investigation Technique

Join in Training

Just In Total

9) Let us, suppose that you have hosted early your e-commerce website to sell sweets online: Your

customers are acquaint with the name of your company and “DesiGhee Burfi ”. They have never

interacted with your company. Which of following loyalty stages they are?

Select correct option:

Awareness

Exploration

Familiarity

Commitment

Page 495: A Mega File of It for Current Quizzes

Reference:

Awareness

This is the first stage where customers recognize the name of the company or any of its products.

However,

they have never interacted with the company before. A company/business can achieve this level by

properly

advertising its brand.

10) ET and SSL both are same with respect to security.

Select correct option:

True

False

11) Which statement is most appropriate description of the term “Interactive-advertisement”?

Select correct option:

By making an advertisement message using flash animation.

Putting an audio or video message on the website to attract customer.

By avoiding customer’s involvement in the advertisement process.

By involving the customer in the advertisement process itself.

12) Quiz Start Time: 04:28 PM

Time Left 88

sec(s)

Question # 1 of 10 ( Start time: 04:28:31 PM ) Total Marks: 1

Four P’s in Marketing Mix are

Select correct option:

Product, price, place, promotion

Price, person, place, problem

Place, product, property, promotion

Promotion, place, product, planning

13) Quiz Start Time: 04:28 PM

Time Left 87

sec(s)

Question # 2 of 10 ( Start time: 04:29:03 PM ) Total Marks: 1

Let us, suppose that you have hosted your e-commerce website, When you provide “opt-in e-mail”

Page 496: A Mega File of It for Current Quizzes

option to your customers on your website and customer opt for it , what does it mean to receive ?

Select correct option:

Information about product through advertisement

Information about product through e-mail

Information about services available on it

Information about News through e-mail.

14) Quiz Start Time: 04:28 PM

Time Left 83

sec(s)

Question # 3 of 10 ( Start time: 04:30:16 PM ) Total Marks: 1

How many stages involve in customer loyalty model for creating good customer relationship?

Select correct option:

6

5

4

3

www..net

15) Quiz Start Time: 04:28 PM

Time Left 86

sec(s)

Question # 4 of 10 ( Start time: 04:30:55 PM ) Total Marks: 1

Free-Trial advertisement means _________.

Select correct option:

Free coupons are placed on certain websites for customers so that they can use it for shopping.

Customer is offered to use the product free of cost for a specific amount of time.

Items bought are delivered to the customers with no delivery cost.

The company didn’t had to pay for this advertisement

16) Quiz Start Time: 04:28 PM

Time Left 87

sec(s)

Question # 5 of 10 ( Start time: 04:31:46 PM ) Total Marks: 1

What is the right sequence of steps involved in development of customer’s relationship with the

business?

Select correct option:

Familiarity, Awareness, Commitment, Exploration, Separation

Awareness, Exploration, Familiarity, Commitment, Separation

Familiarity, Awareness, Exploration, Commitment, Separation

Awareness, Commitment, Familiarity, Exploration, Separation

Page 497: A Mega File of It for Current Quizzes

17) Quiz Start Time: 04:28 PM

Time Left 87

sec(s)

Question # 6 of 10 ( Start time: 04:33:04 PM ) Total Marks: 1

SETSET(secure Electronic Transaction) was developed in

Select correct option:

1995

1996

1997

1999

18) Quiz Start Time: 04:28 PM

Time Left 86

sec(s)

Question # 7 of 10 ( Start time: 04:34:49 PM ) Total Marks: 1

Some web retailers allow their customers to create their own product. It is called.

Select correct option:

One to one Marketing

One to many Marketing

Many to one marketing

All of the above

Reference:

Some web retailers allow their customers to create their own product. For example there are

computer companies online that allow their customers to choose component of a computer to

configure

their own computer according to their need. This is called one-to-one marketing.

19) Quiz Start Time: 04:28 PM

Time Left 84

sec(s)

Question # 8 of 10 ( Start time: 04:35:40 PM ) Total Marks: 1

Vertical Web portals are made for

Select correct option:

Single area

Broad range of topics

Wide variety of things

Broad range of topics and Wide variety of things

Page 498: A Mega File of It for Current Quizzes

20) Quiz Start Time: 04:28 PM

Time Left 86

sec(s)

Question # 9 of 10 ( Start time: 04:36:45 PM ) Total Marks: 1

Which of following services build a strong customer loyalty towards company and its products?

Select correct option:

Customer services

Public relations(PR)

Bulletin board

Exhibitions

21) Question # 1 of 10 ( Start time: 04:42:31 PM ) Total Marks: 1

To overcome the lack of physical proximity appearance problem in e-business, which technology is going

to be used?

Select correct option:

Biometrics

Video conferencing

Cryptography

Biometrics and Video conferencing

22) Question # 2 of 10 ( Start time: 04:44:07 PM ) Total Marks: 1

Using SSL, we type in URL as :

Select correct option:

www..net

https

httpc

httpc

httpi

23) Question # 3 of 10 ( Start time: 04:45:14 PM ) Total Marks: 1

CRM stands for ...............

Select correct option:

Customer Relationship Management

Customer Related Management

Customer Resembling Management

Customer Reallocation Managemen

24) Question # 4 of 10 ( Start time: 04:45:41 PM ) Total Marks: 1

SET and SSL both are same with respect to security.

Page 499: A Mega File of It for Current Quizzes

Select correct option:

True

False

25) Question # 5 of 10 ( Start time: 04:46:11 PM ) Total Marks: 1

In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT

included:

Select correct option:

Buyer Accounts identifier

Buyer password

Address of Merchant

Actual amount of money in favor of merchant

26) Question # 6 of 10 ( Start time: 04:46:42 PM ) Total Marks: 1

Which of following services build a strong customer loyalty towards company and its products?

Select correct option:

Customer services

Public relations(PR)

Bulletin board

Exhibitions.

27) Question # 7 of 10 ( Start time: 04:47:35 PM ) Total Marks: 1

Which of following marketing campaigns are cheap an effective way to target potential customers?

Select correct option:

Sale forces

E-mail

Media promotion

Marketing software

28) Question # 8 of 10 ( Start time: 04:48:20 PM ) Total Marks: 1

Free-Trial advertisement means _________.

Select correct option:

Free coupons are placed on certain websites for customers so that they can use it for shopping.

Customer is offered to use the product free of cost for a specific amount of time.

Page 500: A Mega File of It for Current Quizzes

Items bought are delivered to the customers with no delivery cost.

The company didn’t had to pay for this advertisement.

29) Question # 9 of 10 ( Start time: 04:48:59 PM ) Total Marks: 1

Which of the following option best represent “Data mining can improve response rate tremendously”?

Select correct option:

Direct mailing

Personalization technology

E-business

Opt-in e-mail

30) Question # 10 of 10 ( Start time: 04:50:29 PM ) Total Marks: 1

CPM is an advertising payment mode. CPM stands for ______.

Select correct option:

Cost Per Month

Cost Per Minute

Cost Per Megabyte

Cost Per Message

31) Which statement is most appropriate description of the term “Interactive-advertisement”?

Select correct option:

By making an advertisement message using flash animation.

Putting an audio or video message on the website to attract customer.

By avoiding customer’s involvement in the advertisement process.

By involving the customer in the advertisement process itself.

32) What does Telemarketing means?

Select correct option:

Marketing through charting

Marketing through telephone

Marketing through emai

Marketing through web casting

Page 501: A Mega File of It for Current Quizzes

33) What is the right sequence of steps involved in development of customer’s relationship with the

business?

Select correct option:

Familiarity, Awareness, Commitment, Exploration, Separation

Awareness, Exploration, Familiarity, Commitment, Separation

Familiarity, Awareness, Exploration, Commitment, Separation

Awareness, Commitment, Familiarity, Exploration, Separation

34) www.amzon.com as you all familiar with it. Which of the following loyalty stages its customers are: (

Who don’t know about it): Detail about amzon.com Amazon was one of the first major companies to sell

goods by Internet, and was an iconic "stock in which to invest" of the late 1990s dot-com bubble. Jeff

Bezos founded Amazon.com, Inc. in 1994, and launched it online in 1995. Amazon.com started as an on-

line bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3 format, computer

software, , etc. Amazon has established separate websites in Canada, the United

Kingdom, Germany, France, China, andJapan. It also provides global shipping to certain countries for

some of its products.

Select correct option:

Awareness

Exploration

Familiarity

Commitment

35) Web catalogue revenue model includes

Select correct option:

a. Online sellers of computer

b. Gifts, flowers, clothes

c. Journals

d. A and B

36) Track the customers online and do personalization is only possible through which of the following

file(s) analysis.

Select correct option:

log files

cookie

data mining

log files and cookies.

Page 502: A Mega File of It for Current Quizzes

Reference:

Cookies can be used to track customers online. Typically, a unique ID of the customer is stored in the

cookie file on the hard disk. Same ID is also stored in the database along with the record of previously

purchased items by the customer. When the customer again visits the online store, cookie (having

customer ID prepared against that URL) is transmitted by the browser to the server side. There, it is

matched with the ID in the database. This enables the merchant side to know that a particular customer

(with a known buying pattern) has come to visit again. By tracking the customer in this manner,

personalized recommendations for certain items can be made to the customer in real time.

37) In the template prefix, Template<class T> What kind of variable is the parameter T?

Select correct option:

T must be a class.

T must not be a class.

T can be only types built into the C++ language. ………… (Not sure L)

T can be any type, whether built into C++ or defined by the programmer.

38) Fee for Transaction Models include

Select correct option:

Travel Agents and Insurance brokers

Automobile Sales and event tickets

Stock brokers and online banking

All of the above

39) While designing a website, which of the following factors an internet marketer should pay attention

to?

Select correct option:

Easy site navigation (i.e. Site map)

Frequently asked questions (FAQs) section

Privacy policy

All of above

40) Question # 1 of 10 ( Start time: 05:17:27 PM ) Total Marks: 1

Four P’s in Marketing Mix are

Select correct option:

Page 503: A Mega File of It for Current Quizzes

Product, price, place, promotion

Price, person, place, problem

Place, product, property, promotion

Promotion, place, product, planning

41) Question # 2 of 10 ( Start time: 05:17:43 PM ) Total Marks: 1

In…………………, there is no direct contact with the end users

Select correct option:

B2B

B2C

C2C

All

42) Question # 3 of 10 ( Start time: 05:18:01 PM ) Total Marks: 1

What is the right sequence of steps involved in development of customer’s relationship with the

business?

Select correct option:

Familiarity, Awareness, Commitment, Exploration, Separation

Awareness, Exploration, Familiarity, Commitment, Separation

Familiarity, Awareness, Exploration, Commitment, Separation

Awareness, Commitment, Familiarity, Exploration, Separation

43) Question # 4 of 10 ( Start time: 05:18:13 PM ) Total Marks: 1

Payment gateway is an organization which connects those entities to the internet which are offline.

Select correct option:

True

False

44) Question # 5 of 10 ( Start time: 05:18:55 PM ) Total Marks: 1

Customer Loyalty model is also called

Select correct option:

Customer Life Cycle

Customer Segmentation

Customer Awareness

All

45) Question # 8 of 10 ( Start time: 05:20:28 PM ) Total Marks: 1

Creation of separate experiences for customers based on their behavior is called

Select correct option:

Page 504: A Mega File of It for Current Quizzes

Demographic segmentation

Behavioral segmentation

Geo-Graphic Segmentation

None of the above

46) Question # 9 of 10 ( Start time: 05:20:53 PM ) Total Marks: 1

Which of the following option best represent “Data mining can improve response rate tremendously”?

Select correct option:

Direct mailing

Personalization technology

E-business

Opt-in e-mail

47) Question # 10 of 10 ( Start time: 05:21:04 PM ) Total Marks: 1

Dividing the potential customers into groups is called

Select correct option:

Market Segmentation

Market Promotion

Market Research

Market Survey

48) Quiz Start Time: 05:24 PM

Time Left 89

sec(s)

Question # 1 of 10 ( Start time: 05:24:11 PM ) Total Marks: 1

Web catalogue revenue model includes

Select correct option:

a. Online sellers of computer

b. Gifts, flowers, clothes

c. Journals

d. A and B

49) Quiz Start Time: 05:24 PM

Time Left 88

sec(s)

Question # 2 of 10 ( Start time: 05:24:25 PM ) Total Marks: 1

Which entity does not include in SET(secure Electronic Transaction)?

Select correct option:

Seller

Buyer

Page 505: A Mega File of It for Current Quizzes

Payment gateway

Bank

50) Quiz Start Time: 05:24 PM

Time Left 89

sec(s)

Question # 3 of 10 ( Start time: 05:25:05 PM ) Total Marks: 1

Call handling, sales tracking and Transaction support(technology / personnel) activities are included in

which management system

Select correct option:

Customer Relationship Management system

Public relation management system

Inventory management system

Data Base Management system

51) Quiz Start Time: 05:24 PM

Time Left 89

sec(s)

Question # 5 of 10 ( Start time: 05:25:32 PM ) Total Marks: 1

Do you think that "www.vu.edu.pk" can be considered as university's advertisement website?

Select correct option:

Yes

No

51) Quiz Start Time: 05:24 PM

Time Left 89

sec(s)

Question # 6 of 10 ( Start time: 05:26:29 PM ) Total Marks: 1

Traditionally Marketer use the market segmentation(s) like

Select correct option:

Geo-graphic Segmentation

Demographic Segmentation

Psychographic Segmentation

All of the above

52) Quiz Start Time: 05:24 PM

Time Left 89

sec(s)

Question # 7 of 10 ( Start time: 05:27:00 PM ) Total Marks: 1

Advertising Supported Revenue Model includes

Select correct option:

Page 506: A Mega File of It for Current Quizzes

Yahoo portal

Employment sites

Newspaper Publishers

All of the above

53) Quiz Start Time: 05:24 PM

Time Left 89

sec(s)

Question # 8 of 10 ( Start time: 05:27:37 PM ) Total Marks: 1

SSL stands for

Select correct option:

Secure Socket Layer

Security Service Layer

Sub Secured Length

None of these

54) Quiz Start Time: 05:24 PM

Time Left 89

sec(s)

Question # 10 of 10 ( Start time: 05:28:22 PM ) Total Marks: 1

In e-business, market research is slower than offline business.

Select correct option:

True

False

55) ipher suite is a combination of

Select correct option:

Cryptographic Algorithm

Authentication methods

Security layers

Cryptographic Algorithm And Authentication methods

56) Question # 5 of 10 ( Start time: 05:36:53 PM ) Total Marks: 1

www.amzon.com as you all familiar with it. Which of the following loyalty stages its customers are: (

Who don’t know about it): Detail about amzon.com Amazon was one of the first major companies to sell

goods by Internet, and was an iconic "stock in which to invest" of the late 1990s dot-com bubble. Jeff

Bezos founded Amazon.com, Inc. in 1994, and launched it online in 1995. Amazon.com started as an on-

line bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3 format, computer

software, , etc. Amazon has established separate websites in Canada, the United

Kingdom, Germany, France, China, andJapan. It also provides global shipping to certain countries for

some of its products.

Select correct option:

Page 507: A Mega File of It for Current Quizzes

Awareness

Exploration

Familiarity

Commitment

57) Question # 2 of 10 ( Start time: 05:43:49 PM ) Total Marks: 1

Which of the following is cheapest and quickest marketing technique to reach distant customers?

Select correct option:

E-Mail marketing

Telephone marketing

SMS marketing

Advertisement letters marketing

Quiz Start Time: 05:42 PM Time Left 89

sec(s)

58) Question # 3 of 10 ( Start time: 05:44:52 PM ) Total Marks: 1

JIT concept means

Select correct option:

No distribution channel

No warehousing

Easily delivery

No communication

59) Question # 6 of 10 ( Start time: 05:47:03 PM ) Total Marks: 1

Brick and Mortar refers to

Select correct option:

Offline business

Online business

Transport

Building

60) Question # 7 of 10 ( Start time: 05:48:16 PM ) Total Marks: 1

How many kinds of Web Portals are?

Select correct option:

3

Page 508: A Mega File of It for Current Quizzes

2

5

6

61) Quiz Start Time: 05:42 PM Time Left 88

sec(s)

Question # 8 of 10 ( Start time: 05:49:06 PM ) Total Marks: 1

Press release can provide information about current events and news to, which of following, via a

internet?

Select correct option:

Print media

T.v commercial

Press or media

T.v program.

62) Question # 1 of 10 ( Start time: 05:53:24 PM ) Total Marks: 1

When you email at [email protected] , your email is automatically sorted and replied to your ID.

Select correct option:

True

False

63) Question # 5 of 10 ( Start time: 05:55:05 PM ) Total Marks: 1

Visitor’s location, IP address, time of visit related information are added, in which of the following

Select correct option:

call handling files

cookies

log files

Data mining files.

64) Question # 7 of 10 ( Start time: 05:55:50 PM ) Total Marks: 1

Which of following marketing campaigns are cheap an effective way to target potential customers?

Select correct option:

Sale forces

E-mail

Media promotion

Marketing software

Page 509: A Mega File of It for Current Quizzes

65) Question # 8 of 10 ( Start time: 05:56:06 PM ) Total Marks: 1

Suppose you are using "warid telecom" as your mobile connection and you ignor any other mobile

company's advertisement because you want to keep using warid no matter what others offer. Your

relationship with warid is at _____________.

Select correct option:

Exploration stage

Commitment stage

Awareness stage

Separation stage

66) Question # 9 of 10 ( Start time: 05:57:03 PM ) Total Marks: 1

Dividing potential customers on the basis of variables such as social class, personality, or lifestyle is

called__________.

Select correct option:

Demographic Segmentation

Geographic Segmentation

Psychographic segmentation

Behavioral segmentation

67) Question # 1 of 10 ( Start time: 06:02:08 PM ) Total Marks: 1

Do you think, vulms.vu.edu.pk is an example of E-mail marketing?

Select correct option:

True

False

68) Which one is not an example of search engine?

Select correct option:

Yahoo

Google

Alta vista

Gawab

69) Let us, suppose that you have hosted early your e-commerce website to sell sweets online: Your

customers are acquaint with the name of your company and “DesiGhee Burfi ”. They have never

interacted with your company. Which of following loyalty stages they are?

Select correct option:

Awareness

Exploration

Page 510: A Mega File of It for Current Quizzes

Familiarity

Commitment

70) Which 5th P introduced by E-business in Marketing Mix?

Select correct option:

Proper coverage

Personalized Services

Proper access

Personal style

71) ETSET(secure Electronic Transaction) was developed by

Select correct option:

Microsoft

Netscape Navigator

Master Cards and VISA

All of the options

72) Which of these can be used for advertisement purpose?

Select correct option:

Telephone

Newspapers

Magazines

All of above

73) Question # 5 of 10 ( Start time: 06:21:36 PM ) Total Marks: 1

Which of the following is a method for conducting market research?

Select correct option:

Phone

Interviews

Questionnaires

All of above

74) Which of the following is NOT an advertising payment mode?

Select correct option:

Pay-per-sale

Pay-per-click

Pay-per-keypress

Pay-per-lead

Page 511: A Mega File of It for Current Quizzes

75) Question # 1 of 10 ( Start time: 06:25:05 PM ) Total Marks: 1

Advertising Subscription Mixed Revenue Model includes

Select correct option:

Online journals

Sports information services

Business week online

All of the above

76) Question # 2 of 10 ( Start time: 06:25:59 PM ) Total Marks: 1

Digital Content Revenue Model Includes

Select correct option:

Legal information services

Online journals

Online Libraries

All of the above

77) Question # 4 of 10 ( Start time: 06:27:06 PM ) Total Marks: 1

Which of these is a tool that can be used to improve customer services?

Select correct option:

Log file analysis

Cookies

Data mining

All

78) Question # 9 of 10 ( Start time: 06:29:26 PM ) Total Marks: 1

Which of the following is an advertising payment mode?

Select correct option:

Pay-per-person

Pay-per-page

Pay-per-sale

Pay-per-minute

79) Question # 10 of 10 ( Start time: 06:29:52 PM ) Total Marks: 1

If a company's marketing stretegy is focusing on customers having age less than 30, which of the

following marketing segmentation technique is being used by company?

Select correct option:

Demographic Segmentation

Geographic Segmentation

Psychographic segmentation

Behavioral segmentation

Page 512: A Mega File of It for Current Quizzes

80) E-Business promotions are used to _______.

Select correct option:

Attract the customer to the product and convince him/her to buy it.

Get credit card information from the customer.

Complete a transaction between customer and seller.

SETSET(secure Electronic Transaction) was developed by Select correct option: Microsoft Netscape Navigator Master Cards and VISA All of the options

SSL stands for

Select correct option:

Secure Socket Layer

Security Service Layer

Sub Secured Length

None of these

What is basic advantage of symmetric algorithms?

Select correct option:

Symmetric key does not use any encryption

Symmetric algorithms are faster

Symmetric algorithms are easy to understand

All of above

Which of these keys can be used for encryption instead of using pair of private and public keys?

Select correct option:

Systematic key

Asymmetric key

Symmetric key

All of above

Using SSL, we type in URL as :

Select correct option:

Page 513: A Mega File of It for Current Quizzes

https

httpc

httpc

httpi

Reference:

(Page # 121)

In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT

included:

Select correct option:

Buyer Accounts identifier

Buyer password

Address of Merchant

Actual amount of money in favor of merchant

A unique large number, generated as a result of applying hash function on a message is called ______.

Select correct option:

Hash message

Message digest

Digitally singed message

Secret message

Reference:

(page # 103)

FVIPSS stands for _______.

Select correct option:

First Virtual Internet Payment System Server

First Virtual International Payment System Server

Page 514: A Mega File of It for Current Quizzes

First Virtual International Payment System Services

First Virtual Internal Payment System Services

Reference:

(Page # 110)

Virtual PIN Payment system is considered suitable for ________.

Select correct option:

Low-cost items

High-cost items

Very expensive items

Every kind of items

Which of these is a primary participant in E-Cash Payment system?

Select correct option:

Buyer

Bank

Merchant

All

Most of the electronic payment systems on internet use cryptography.

Select correct option:

True

False

In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded

signed coins from last …………………withdrawals to the E-bank.

Select correct option:

10

12

14

16

Page 515: A Mega File of It for Current Quizzes

Reference:

(page # 119)

The key feature of E-Cash Payment system is

Select correct option:

Anonymity

Security

Cryptography

None of these

Reference:

(page # 116)

At minting stage, the client is ……………..by E-Cashbank

Select correct option:

Known

Unknown

Secret

informed

Reference:

(page. 118)

Cipher suite is a combination of

Select correct option:

Cryptographic Algorithm

Authentication methods

Page 516: A Mega File of It for Current Quizzes

Security layers

Cryptographic Algorithm And Authentication methods

Reference:

(page. 121)

SETSET(secure Electronic Transaction) was developed in

Select correct option:

1995

1996

1997

1999

Reference:

(page no. 122)

Symmetric algorithms are faster than asymmetric. Select correct option: True False Reference: (Page # 105) Which entity does not include in SET(secure Electronic Transaction)? Select correct option: Seller Buyer Payment gateway Bank Reference: (Page # 122) A paper signature is believed to be more reliable than a digital signature. Select correct option: True False If a key is 4 bit in length, how many unique key values are possible? Select correct option: 4 8

Page 517: A Mega File of It for Current Quizzes

16 32 Explanation: A key value is always in binary form. A Binary Number is made up of only 0s and 1s. So each digit has only two possibilities: 0 or 1, So now we try to check all possible values of 4. 4 bit = 0000, 0001,

0010, 0100, 1000, 0011, 0110, 1100, 0101, 1010, 1011, 1101, 1001, 1110, 0111, 1111

Hence prove that if a key is 4 bit in length, then 16 unique key values are possible of that key. Hash function is a __________ Select correct option: Communication protocol Hardware device Encryption mechanism Log file Which of these attacks have been reported on symmetric key algorithms? Select correct option: Key Search Attacks Cryptanalysis System-Based Attacks All Reference: (Page # 108) Payment gateway is an organization which connects those entities to the internet which are offline. Select correct option: True False Reference: (Page # 122) How many elements an e-coin has? Select correct option: 1

Page 518: A Mega File of It for Current Quizzes

2 3 4 Reference: (page # 116) EFT stands for _____________. Select correct option: Electronic Film Transmission Electronic Funds Transfer Electronic File Translation None of above Reference: (Page # 114)

________ is used to interpret and show contents of the webpage.

Select correct option:

HTML

Notepad

Browser

Computer

What is identified by the tag ?

Select correct option:

Horizontal frame

Bottom Frame

Top Frame

Vertical Frame

Page 519: A Mega File of It for Current Quizzes

Which of the following is NOT an advantage of CSS?

Select correct option:

Define the look of your pages in one place

Works on version 4 browsers or newer

Easily change the look

Implement same formatting each time tag is used.

Links are used to connect ____________.

Select correct option:

Images

Text

Images and web documents

All of the given

Do you think that "www.vu.edu.pk" can be considered as university's advertisement website?

Select correct option:

Yes

No

Characterization and Clustering belong to which of the following types of Data Mining?

Select correct option:

Predictive

Selective

Descriptive

Additive

Reference:

(Page # 141)

Page 520: A Mega File of It for Current Quizzes

Traditionally Marketer use the market segmentation(s) like

Select correct option:

Geo-graphic Segmentation

Demographic Segmentation

Psychographic Segmentation

All of the above

Reference:

(Page # 131)

Advertising Subscription Mixed Revenue Model includes

Select correct option:

Online journals

Sports information services

Business week online

All of the above

OLAP stands for……………

Select correct option:

Online Analytical Program

Online Analytical Processing

Online Application Program

Online Analysis Performance

Reference:

(Page # 145)

E-Business promotions are used to _______.

Select correct option:

Attract the customer to the product and convince him/her to buy it.

Get credit card information from the customer.

Complete a transaction between customer and seller.

None of above

Reference:

(Page # 133)

Page 521: A Mega File of It for Current Quizzes

Television, radio and print media are in a (n) ……………………. Mode.

Select correct option:

Passive

Active

Static

Dynamic

Reference:

(Page # 139)

CRM stands for ...............

Select correct option:

Customer Relationship Management

Customer Related Management

Customer Resembling Management

Customer Reallocation Management

Reference:

(Page # 136)

Which one is not an example of search engine?

Select correct option:

Yahoo

Google

Alta vista

Gawab

Reference:

(Page # 137)

Meta tag contains:

Select correct option:

User information

seller information

web page key information

bank information

Reference:

Page 522: A Mega File of It for Current Quizzes

(Page # 138)

Free-Trial advertisement means _________.

Select correct option:

Free coupons are placed on certain websites for customers so that they can use it for shopping.

Customer is offered to use the product free of cost for a specific amount of time.

Items bought are delivered to the customers with no delivery cost.

The company didn’t had to pay for this advertisement.

Reference:

(Page # 133)

In many countries, stealing and misusing of meta information for getting competitive advantage is

considered as an offence known as

Select correct option:

Tort of Private Nuisance

Tort of Tress passing

Tort of passing off

Defamation

Reference:

(Page # 138)

If a company's marketing stretegy is focusing on customers having age less than 30, which of the

following marketing segmentation technique is being used by company?

Select correct option:

Demographic Segmentation

Geographic Segmentation

Psychographic segmentation

Behavioral segmentation

Reference:

(Page # 131)

Press release can provide information about current events and news to, which of following, via

internet?

Select correct option:

Print media

Page 523: A Mega File of It for Current Quizzes

T.v commercial

Press or media

T.v program.

Reference:

(Page # 135)

Fee for Transaction Models include

Select correct option:

Travel Agents and Insurance brokers

Automobile Sales and event tickets

Stock brokers and online banking

All of the above

Reference:

(Page # 130)

An E-Business can't have direct feedback from the customer in B2C.

Select correct option:

True

False

Creation of separate experiences for customers based on their behavior is called

Select correct option:

Demographic segmentation

Behavioral segmentation

Geo-Graphic Segmentation

None of the above

Reference:

(Page # 132)

What is the right sequence of steps involved in development of customer’s relationship with the

business?

Select correct option:

Familiarity, Awareness, Commitment, Exploration, Separation

Awareness, Exploration, Familiarity, Commitment, Separation

Familiarity, Awareness, Exploration, Commitment, Separation

Awareness, Commitment, Familiarity, Exploration, Separation

Page 524: A Mega File of It for Current Quizzes

Reference:

(Page # 136)

At deposit stage, the serial number is ……………..by E-Cashbank

► Known

► Unknown

► Kept Secret

► Informed

Reference:

(Page # 118)

How many kinds of Web Portals are?

► 3

► 2

► 5

► 6

Explanation:

There are only two kinds of web portals, one is vertical portals which provides information about single

interest like online shopping sites are best example of vertical portal site, educational site is also an

example of vertical portal. Second kind of web portal is horizontal web portals which provide

information about everything or multiple things. Search engine is best example of horizontal web portal.

Reference:

(page # 129)

Let us, suppose that you have hosted your e-commerce website,

When you provide “opt-in e-mail” option to your customers on your website and customer opt for it ,

what does it mean to receive ?

► Information about product through advertisement

► Information about product through e-mail

Page 525: A Mega File of It for Current Quizzes

► Information about services available on it

► Information about News through e-mail.

Reference:

(page # 133)

Track the customers online and do personalization is only possible through which of the following

file(s) analysis.

► log files

► cookie

► data mining

► log files and cookies.

Reference:

(page # 136)

When customer life cycle is used to create different groups of customers, it is called?

► Targeting Customers

► Dynamic groups

► Customer Life Cycle Segmentation

► Group Development

Reference:

(page # 137)

Network addresses 128--- 191 range belongs to which of the following class networks? ► A

► B

Page 526: A Mega File of It for Current Quizzes

► C

► E

Reference:

(page # 10)

Which of the following property falls in HTTP? ► Stateless

► Stateful ► Temporary ► All of these

Reference:

(page # 3)

FSTC stands for:

► Financial Services Technology Consortium

► Financial Secrets Technology Consortium ► Final Security threats control ► First Service Technology Consortium

Reference:

(page # 113)

Supply chain can be broken into three parts, that is ----------------- , ----------------------- and -------------------

- activities.

► Internal, external support

► Upstream, internal ,downstream

► Primary, Secondary ,R&D

► None of them

Reference:

(page # 155)

Page 527: A Mega File of It for Current Quizzes

The process of taking active role in working with suppliers to improve products and processes is

called?

► Value chain management

► Supply chain management

► Supply chain management software

► Porter Model

Reference:

(page # 155)

What is Ultimate consumer orientation?

► Primary objective of supply chain is to help each company to meet needs of the consumer at the end

of supply chain.

► Secondary Primary objective of supply chain is to help each company to meet needs of the consumer

at the end of supply chain.

► Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of

supply chain.

► None of them

Reference:

(page # 156)

Many search engines rank the site by using a program called ► Spider

► Scorpion ► Moon ► Cobweb

Reference:

Page 528: A Mega File of It for Current Quizzes

(page # 138)

E-commerce is a combination of three different areas of study, namely, --------,

---------------- and ----------------

► Internal, external support, Support

► Technology, business and law/policy

► Primary, Secondary, R&D

► Sale, purchase, feed back

Reference:

(page # 161)

In which type of data mining, Apriori algorithms is used? ► Classification ► Association

► Characterization ► Clustering

Reference:

(page # 143)

EDI has the key feature(s) ► No paper work ► No human intervention ► Exchange of information takes place in seconds ► All of these

Reference:

(page # 147)

Page 529: A Mega File of It for Current Quizzes

Addresses are tied to the device itself and give no clue to it's location on a global scale. This is the

characteristics of

► IP

► RIP

► MAC

► None of the given

When two or more intranets are connected to each other they form a/an ------------- .

► intranet

► internet

► extranet

► VPN

Reference:

(page # 2)

Which attribute can be used to make a region non-clickable?

► none of the given

► target

► alt

► nohref

Reference:

(page # 37)

Which of the following payment mode does not require customer to pay interest to the bank on each

transaction?

► Credit card

► Debit card

► Electronic check

Page 530: A Mega File of It for Current Quizzes

► All of the above

Reference:

(page # 110)

Cyber wallet can automatically assemble the correct payment and pay it too.

► True

► False

SET doesn’t require special software on the client or merchant side.

► True

► False

Which model allows the users to log-on on a website and assume the role of bidder or seller?

► Online Banking.

► Storefront Model.

► E-Learning.

► Auction Model.

Reference:

(Page # 128)

According to Michael Porter, “fabricating” is an example of primary activity in a strategic business

unit. Identify the area in which this task is performed.

► Market and sell

► Deliver’ activities relate to storage

► Purchase materials and supplies

► Manufacture product or create service

Reference:

Page 531: A Mega File of It for Current Quizzes

(Page # 152)

Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish

the wrong-doer. Is it?

► True

► False

In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, --

-------------- and ----------

► Acceptance and consideration

► Acceptance and Rejection

► Approval and consideration

► None

Reference:

(page # 178)

In online environment acceptances may be issued by an imposter/cheater that has authority to bind

the online business

► True

► False

#00ff00 in HTML indicates

► Pure green color

► Pure blue color

► Pure red color

Page 532: A Mega File of It for Current Quizzes

► Pure yellow color

Reference:

(Page # 23)

Virtual PIN Payment System requires both merchant and buyer to register with _______________.

► Auto Clearing House (ACH)

► First Virtual (FV)

► DSS (Digital Signature Standard)

► DES (Data Encryption Standard)

Reference:

(Page # 110)

Classification and Association belong to which of the following types of Data Mining?

► Selective ► Predictive

► Descriptive ► Additive

Reference:

(Page # 141)

Which one of the followings is an example of Banner advertising?

Select correct option:

Branding

Affiliate programs

Partnership

All of these

Reference:

(Page # 138)

CPM is an advertising payment mode. CPM stands for ________.

Page 533: A Mega File of It for Current Quizzes

Select correct option:

Cost Per Month

Cost Per Minute

Cost Per Megabyte

Cost Per Message

Reference:

(Page # 134)

Which one is not an example of search engine?

Select correct option:

Yahoo

Google

Alta vista

Gawab

Reference:

(Page # 137)

In which type of approach, we further dig the data for retrieving information from data warehouse?

Select correct option:

Slice

Dice

Drill down

Roll up

Reference:

(Page # 146)

Let us, suppose that you have hosted your e-commerce website, Promotion messages can be sent

when potential client is

Select correct option:

online

Page 534: A Mega File of It for Current Quizzes

offline

both online and offline

visiting head office

Reference:

(Page # 133)

Digital Content Revenue Model Includes

Select correct option:

Legal information services

Online journals

Online Libraries

All of the above

Reference:

(Page # 130)

Which of these is a tool that can be used to improve customer services?

Select correct option:

Log file analysis

Cookies

Data mining

All

Reference:

(Page # 136)

What does Telemarketing means?

Select correct option:

Marketing through charting

Marketing through telephone

Marketing through emai

Marketing through web casting

Reference:

Page 535: A Mega File of It for Current Quizzes

(Page # 133)

In which type of data mining, ID3 algorithms is used?

Select correct option:

Classification

Association

Characterization

Clustering

Reference:

(Page # 141)

Some web retailers allow their customers to create their own product. It is called.

Select correct option:

One to one Marketing

One to many Marketing

Many to one marketing

All of the above

Reference:

(Page # 132)

Free-Trial advertisement means ___________.

Select correct option:

Free coupons are placed on certain websites for customers so that they can use it for shopping.

Customer is offered to use the product free of cost for a specific amount of time.

Items bought are delivered to the customers with no delivery cost.

The company didn’t had to pay for this advertisement

Reference:

(Page # 133)

Total Marks: 1

The length of a message digest is ________.

Page 536: A Mega File of It for Current Quizzes

Select correct option:

32 to 64 bits

64 to 128 bits

128 to 256 bits

256 to 512 bit

Reference:

(Page # 103)

Key version represents public key by

Select correct option:

Buyer

Seller

E-Bank

Certification Authority

Reference:

(Page # 116)

Page 537: A Mega File of It for Current Quizzes

The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to

the ___________.

Select correct option:

Bank

Merchant

Client

None

Reference:

(Page # 116)

ACH is a centralized system used by different interconnected banks for clearing payment requests.

Select correct option:

True

False

Centralized Account Payment Model uses unique _______ of users as their account identifier.

Select correct option:

Residence address

E-mail address

Office address

None

Reference:

Page 538: A Mega File of It for Current Quizzes

(Page # 113)

SET and SSL both are same with respect to security.

Select correct option:

True

False

What are the security threats in VPS?

Select correct option:

a. Email hacking

b. Credit card number stolen

c. Missing of delivery

d. A and B

What is function of Cyberwallet?

Select correct option:

Store coins

Manage Coins

Record transactions

All of above

SET and SSL both are same with respect to security.

Select correct option:

True

False

Basic difference between Virtual PIN Payment System and Electronic Check is _____.

Select correct option:

Encryption

Registration with bank

No. of participants

There is no difference between them

Page 539: A Mega File of It for Current Quizzes

MIDTERM EXAMINATION Spring 2009

IT430- E-Commerce (Session - 3)

http://www.vustudents.net

Question No: 1 __ ( Marks: 1 ) - Please choose one

In which protocol, the messages are not deleted fro m email server.

SMTP

POP3

IMAP (page 18)

ICMP

Question No: 2 ( Marks: 1 ) - Please choose one

Which HTML tag is used to define the internal style sheet ?

<css>

<script >

<sheet>

<style>

ref

http://www.ex-designz.net/test_grade.asp?tid=37

Question No: 3 ( Marks: 1 ) - Please choose one

For which one of the following,<MARQUEE ...> tag can work better

News headlines

Page 540: A Mega File of It for Current Quizzes

Announcements

Sound pulgin

Movie controls

Ref

http://www.htmlcodetutorial.com/_MARQUEE.html

Question No: 4 __ ( Marks: 1 ) - Please choose one

Choose the correct HTML code line which left-align the content inside a tablecell.

<td leftalign>

<td valign="left">

<td align="left"> (page 26)

<tdleft>

Question No: 5 __ ( Marks: 1 ) - Please choose one

How do you write a conditional statement for execut ing some statements only if "i" is

NOT equal to 5?

if =! 5 then

if (i != 5) (page 58)

if <>5

if (i <> 5)

Question No: 6 ( Marks: 1 ) - Please choose one

What is the correct JavaScript syntax to write "Vir tual University of Paistan"?

document.write("Virtual University of Paistan ")

("Virtual University of Paistan ")

" Virtual University of Paistan "

Page 541: A Mega File of It for Current Quizzes

response .write( "Vi rtual University of Paistan ")

Question No: 7 __ ( Marks: 1 ) - Please choose one

We can divide the Client Server architecture up to:

3 Tier

N -Tier

1 Tier

2 Tier

ref

[PPT]

CLIENT SERVER ARCHITECTURE

Question No: 8 ( Marks: 1 ) - Please choose one

Choose which one is the not the columns of Log file s.

IP addresses

Request (url)

Date

Contents (page 136 and 3)

Question No: 9 __ ( Marks: 1 ) - Please choose one

An address represented by four decimal numbers sepa rated by a period is the

IP (PAGE 7)

RIP MAC

NON OF THE GIVEN

Page 542: A Mega File of It for Current Quizzes

Question No: 10 ( Marks: 1 ) - Please choose one

Which operator is used to concatenate two strings?

+ (PAGE 61)

*

&&

&

Question No: 11 __ ( Marks: 1 ) - Please choose one

Which SQL statement is used to extract data from a database?

GET (page 83)

OPEN

SELECT

EXTRACT

Question No: 12 __ ( Marks: 1 ) - Please choose one

Which firewall uses strong user authentication to v erify identity of a host

attempting to connect to the network?

Packet filter firewall Circuit

level firewall Application (PAGE 96)

gateway firewall

Hybrid firewall

Question No: 13 __ ( Marks: 1 ) - Please choose one

Page 543: A Mega File of It for Current Quizzes

In CSS, How do you make each word in a text start w ith a capital letter?

text-transform :capitalize

text-transform: uppercase

text:capitalize

You can't do that with CSS

REF

http://www.ex-designz.net/test_page.asp?tid=37

Question No: 14 __ ( Marks: 1 ) - Please choose one

Why we use reset tag in HTML?

To remove the text written in Notepad.

To remove the text written in between <body> and </ body>tag.

To remove the text written in between <head> and </ head> tag.

To remove the text written in between <form> and </ form> tag.

Question No: 15 ( Marks: 1 ) - Please choose one

http://cs.vu.edu is an example of

Two zone domain name

Three zone domain name (page 12)

Four zone domain name

Five zone domain name

Question No: 16 __( Marks: 1 ) - Please choose one

Page 544: A Mega File of It for Current Quizzes

In data link layer, data packets are placed inside

Data frames (page 6)

Data boxes

Data streams

None of these

Question No: 17 __ ( Marks: 1 )

What are the two types of twisted pair cables for n etworking ?

Question No: 18 ( Marks: 1 )

What it stands for IIS?

Question No: 19 __ ( Marks: 2 )

When does we use the parseFloat() function?

Question No: 20 ( Marks: 3 )

Name the JavaScript function that convert strings t o float numbers. How do you

give the function a string value to convert to a nu mber?

Question No: 21 __ ( Marks: 5 )

Write your personal profile in a file saving it wit h the extension of e.g. “abc.js”and then call it in

a JavaScript code.

Question No: 22 ( Marks: 10 )

Explain any three of the outside attacks briefly.

Page 545: A Mega File of It for Current Quizzes

MIDTERM EXAMINATION

Spring 2009

IT430- E-Commerce (Session - 3)

http://www.vustudents.net

Question No: 1 __ ( Marks: 1 ) - Please choose one

Which one of the following ,divides large network i n small logical segments called subnets on basis of IP addresses

Routers (page 16)

Bridge

None of these

Switches

Question No: 2 ( Marks: 1 ) - Please choose one

Which one is not included in the networking topolog ies?

Star Topology

Bus Topology

Media Topology

Ring Topology

Question No: 3 __ ( Marks: 1 ) - Please choose one

At line code 5 which of the following Css methods h as been applied?

<html>

<head>

1. <style type= "text/css ">

Page 546: A Mega File of It for Current Quizzes

2. h3 {font-family: times}

3. p {font-family: courier}

4. p.sansserif {font-family: sans-serif}

</style>

5. <Link rel= ”stylesheet ” type= ” text/css ” herf= ”mystyle.css ”>

</head>

<body>

6. <h3 style= ” font-size:40pt ”>This is header 3</h3>

</body>

</html>

mystyle.css:

h3{ color: red}

Browser default

External style sheet

Inline style

Internal style sheet

Question No: 4 ( Marks: 1 ) - Please choose one

Page 547: A Mega File of It for Current Quizzes

Which attribute is used in a tag to control the lay out of element?

view

css

Style

Layout

Ref

http://www.yourhtmlsource.com/stylesheets/csslayout .html

Question No: 5___( Marks: 1 ) - Please choose one W hat is the correct HTML

for making a hyperlink? http://www.vustudents.net

<a url=" http://www.w3schools.com ">W3Schools.com </a>

<a>http://www.w3schools.com </a>

<a h ref= "http ://www.w3schools.com ">W3Schools</a> (page 23)

<a name=" http://www.w3schools.com ">W3Schools.com </a>

Question No: 6 ( Marks: 1 ) - Please choose one

How do you write a conditional statement for execut ing some statements only if "i" is

NOT equal to 5?

if =! 5 then

if (i != 5) (repeated)

if <>5

if (i <> 5)

Question No: 7 __ ( Marks: 1 ) - Please choose one

How many different kind of loops are there in JavaS cript?

Page 548: A Mega File of It for Current Quizzes

One. The "for" loop only

Two. The "for" loop and the "while" loop

Four. The "for" loop, the "while" loop, the "do...w hile" loop, and the "loop.. .until" loop

None of the above

REF

http://www.ex-designz.net/test_grade.asp?tid=65

Question No: 8___( Marks: 1 ) - Please choose one

What does DTD stand for?

Do The Dance.

Dynamic Type Definition.

Data Type Definition. (page 76)

Direct Type Définition.

Question No: 9 ( Marks: 1 ) - Please choose one

Which of the following needs human action to execut e?

Virus (page 94)

Worm

Trojan Horse

All of these

Question No: 10 __ ( Marks: 1 ) - Please choose one

For showing image on web page, save your image at a ny drive or folder like C:\abc.jpeg is an example of

Page 549: A Mega File of It for Current Quizzes

Relative Address

Absolute address

None of the given

Ref

Absolute paths are called that because they refer t o the very specific location, including the domain name. The absolute path to a Web element is also often referred to as the UR

Question No: 11 __ ( Marks: 1 ) - Please choose one

ASP server scripts are surrounded by delimiters, wh ich?

<script>.. .</script>

<%...%>

<%>...</%>

<&>...</&>

ref

http://www.w3schools.com/asp/asp_syntax.asp

Question No: 12 ( Marks: 1 ) - Please choose one

This is an example of

Page 550: A Mega File of It for Current Quizzes

0-tier architecture

Page 551: A Mega File of It for Current Quizzes

1-tier architecture

2-tier architecture

n-tier architecture

Question No: 13 __ ( Marks: 1 ) - Please choose one

Which protocol is used to set up the dial up connec tion between RAC and RAS

for exchange of data packets? http://www.vustudents .net

PPP (page 98)

POP3

SMTP

FTP

Question No: 14 ( Marks: 1 ) - Please choose one

Pretty Good Privacy (PGP) is the name of a popular _________system which is available for general public use.

Filtering

Cryptographic (page 100)

Server

Security

Question No: 15 ( Marks: 1 ) - Please choose one

Intra Business involves only selling of corporate p roducts to consumer.

True (page 2)

False

Question No: 16 __ ( Marks: 1 ) - Please choose one

#00ff00 in HTML indicates

Page 552: A Mega File of It for Current Quizzes

Pure green color (page 23)

Pure blue color

Pure red color

Pure yellow color

Question No: 17 ( Marks: 1 )

What is the function of TCP protocol at TCP/IP stac k?Give precise answer.

Question No: 18 __ ( Marks: 1 )

What do you say that Cookies can also be used to ma intain state between two broken sessions. Justify with solid argument

Question No: 19 __ ( Marks: 2 )

What is bandwidth of a network?

Question No: 20 ( Marks: 3 )

What is the purpose of padding? How many types of p adding are: Name of these?

Question No: 21 __ ( Marks: 5 )

Write any four essential features and two extra fea tures which should exist in E-Commerce

soft wares.

Question No: 22 ( Marks: 10 )

Differentiate the one tier, two tiers, three tiers and four tiers separately with respect to client

server architecture.

MIDTERM EXAMINATION Spring 2009

IT430- E-Commerce (Session - 2)

http://www.vustudents.net

Question No: 1 __ ( Marks: 1 ) - Please choose one

For which of the following we need to know the clas sification of E-commerce?

Page 553: A Mega File of It for Current Quizzes

Market planning strategy

Build Mission statement

Management strategy

none

Question No: 2 ( Marks: 1 ) - Please choose

one Who is making the Web standards?

Netscape

Internet service providers

The World Wide Web Consortium

Microsoft

Question No: 3 __ ( Marks: 1 ) - Please choose one

When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called

Local Variables

Global Variables

Local and Global

None of the above

Ref

http://www.authorpick.net/what-is-variables-in-prog ramming-language/

Question No: 4___( Marks: 1 ) - Please choose one

There is a way of describing XML data, how?

Page 554: A Mega File of It for Current Quizzes

XML uses a description node to describe data

XML uses a DTD to describe the data (page 75)

XML uses XSL to describe data

None of these

Ref

http://www.dotnetspider.com/questions/ViewQuestion. aspx?QuestionId=6754&

Question No: 5 ( Marks: 1 ) - Please choose

One which of the following property falls in HTTP?

Stateless (repeated)

State full

Temporary

All of these

Question No: 6 ( Marks: 1 ) - Please choose one

Choose the correct HTML tag to make a text bold

<tbold>

<b>

<bld>

<bold>

Question No: 7 ( Marks: 1 ) - Please choose one

What is the default scripting language in ASP?

Page 555: A Mega File of It for Current Quizzes

EcmaScri pt

JavaScri pt

Java

VBScript (page 85)

Question No: 8 __ ( Marks: 1 ) - Please choose one

Which one of them is not a feature of e-commerce so ftware?

catalog display

web hosting (page 92)

web services

transaction processing

Question No: 9 ( Marks: 1 ) - Please choose one

When two or more intranets are connected to each ot her they form a/an ----------

VPN

Intranet

Internet

Extranet (page 2)

Question No: 10 ( Marks: 1 ) - Please choose one

Pretty Good Privacy (PGP) is the name of a popular _________system which is available for general public use. http://www.vustudents.net

Filtering

Cryptographic (page 100)

Page 556: A Mega File of It for Current Quizzes

Server

Security

Question No: 11 __ ( Marks: 1 ) - Please choose one

Which one is NOT a valid frame attribute?

NORESIZE

ROWS (page 33)

FRAMEBORDER

BORDER

Question No: 12 ( Marks: 1 ) - Please choose one

IP version 6 provides ---------------bits and also contains ----------------------

128, hexadecimal (page 11)

64, hexadecimal

32, binary

None of the Above

Question No: 13 ___( Marks: 1 ) - Please choose one

A JavaScript event is generated when a user ------- - .

clicks a hyperlink

clicks a button

enters data in a form

all of the above (page 54)

Page 557: A Mega File of It for Current Quizzes

Question No: 14 __ ( Marks: 1 ) - Please choose one

Creating your own tags is not possible in HTML but in XML it is possible to create your own tags.

True

False

Question No: 15 __ ( Marks: 1 ) - Please choose one

IP, RIP, and ARP protocols work on

Application layer

Session layer

Network layer (page 6)

Data link layer

Question No: 16 __ ( Marks: 1 ) - Please choose one

In the communication between two computers on a net work, CRC is calculated at

Sender’s side

Receiver ’s side

Both sender and receiver sides

Neither on sender nor on receiver side

Ref

[PPT]

Business Data Communications and Networking

Page 558: A Mega File of It for Current Quizzes

Question No: 17 ( Marks: 1 )

What is the function of ARP protocol at TCP/IP stac k?Give precise answer.

Question No: 18 __ ( Marks: 1 )

Do you agree or not that in In Java Script we are n ot provided with certain

already defined objects which are ready to use? jus tify

Question No: 19 ( Marks: 2 )

What are the three position style properties?

Question No: 20 ( Marks: 3 )

Write at least three rules for writing an XML code.

Question No: 21 ( Marks: 5 )

What is the difference between an interpreted and a compiled language? Give one example of each.

Question No: 22 __ ( Marks: 10 )

Consider the following code of an XML document and identify where its standard code rules

are being applied. You are required to write the id entified tag along with its related rule side

by side. http://www.vustudents.net

<?xml version=“1.0”?>

<PlanetsList>

<Planet Name=“Mercury”> <Distance>36 million miles< /Distance> <Moons>None</Moons>

<DayLength> 176 days</DayLength> </Planet>

<Planet Name=“Venus”> <Distance>67 million miles</D istance> <Moons>None</Moons>

<DayLength>1 17 days</DayLength> </Planet>

Page 559: A Mega File of It for Current Quizzes

<Planet Name=“Earth”> <Distance>93 million miles</D istance> <Moons>One</Moons>

<DayLength>24 Hours</DayLength> </Planet>

</PlanetsList> <BR/>

MIDTERM EXAMINATION

Spring 2009

IT430- E-Commerce (Session - 4)

http://www.vustudents.net

Question No: 1 ( Marks: 1 ) - Please choose one

In

datalink layer, data packets are placed inside

► Data frames (page 6)

► Data boxes

► Data streams

► None of these

Question No: 2 ( Marks: 1 ) - Please choose one

Which of these is the correct HTML code for creating a reset button?

► <input type =”button” name=”reset” value=”reset”>

► <input type=”resetButton” value=”Clear”>

► <input type=”reset” value=”reset”> (page 26)

► <input type=”button” name=”reset” value=”clear”>

Page 560: A Mega File of It for Current Quizzes

Question No: 3 ( Marks: 1 ) - Please choose one

…..tag is used into …….tag because a row contains multi cells and to fill up these cells with data.

► TD…… TR

► TR…… TD (page 25)

► TD…… TG

► TG…… TR

Question No: 4 ( Marks: 1 ) - Please choose one

Individuals who write programs or manipulate technologies to gain unauthorized access to computers

and networks are --------------- .

► administrators

► experts

► hackers (page 54)

► coders

Question No: 5 ( Marks: 1 ) - Please choose one

Which tag is used for the hidden fields?

Page 561: A Mega File of It for Current Quizzes

► <FIELD>

► <TEXT>

► <INPUT> page 88

► <HIDDEN>

<INPUT TYPE= "HIDDEN" NAME= "Shirt1" VALUE="25">

Question No: 6 ( Marks: 1 ) - Please choose one

What is a correct way of referring to a stylesheet called "mystyle.xsl" ?

► <?xml-stylesheet type="text/xsl" href="mystyle.xsl" ?>

► <link type="text/xsl" href="mystyle.xsl" />

► <stylesheet type="text/xsl" href="mystyle.xsl" />

► <?stylesheet type="text/xsl" href="mystyle.xsl" ?> page 39

<Link Rel="stylesheet" Type="text/css" href="mystyles.css">

Question No: 7 ( Marks: 1 ) - Please choose one

Which of them is NOT a predefined object?

► Document

► Date (repeated)

► Loop

Page 562: A Mega File of It for Current Quizzes

► Array

Question No: 8 ( Marks: 1 ) - Please choose one

Which of these is not a comparison operator?

► <

► >

► = (repeated)

► !=

Question No: 9 ( Marks: 1 ) - Please choose one

Var d = new date()

Which of the following is correct about the d variable?

► instance of new

► instance of Date() method

► instance of Date object (repeated)

► Simple Variable

Question No: 10 ( Marks: 1 ) - Please choose one

When you declare a variable within a function, the variable can only be accessed within that

function. When you exit the function, the variable is destroyed. These variables are called

► Local Variables (repeated)

► Global Variables

Page 563: A Mega File of It for Current Quizzes

► Local and Global

► None of the above

Question No: 11 ( Marks: 1 ) - Please choose one

Which of the following , is condition part of given For loop

for (i = 0; i <= 5; i++).

► i=0.

► i++.

► i<=5.

► (i = 0; i <= 5; i++).

Question No: 12 ( Marks: 1 ) - Please choose one

What is the correct JavaScript syntax to write "Virtual University of Paistan"?

► document.write("Virtual University of Paistan ")

► ("Virtual University of Paistan ")

► " Virtual University of Paistan "

► response.write("Virtual University of Paistan ")

Question No: 13 ( Marks: 1 ) - Please choose one

Which of the following is NOT valid HTML code line?

► <frameset rows="16%,84%">

► <frameset columns="16%,84%">

► <frameset cols="100,150">

Page 564: A Mega File of It for Current Quizzes

► <frameset cols=”50%,50%” rows=”16%,84%”>

Ref

http://www.academictutorials.com/answers.asp?id=1

Question No: 14 ( Marks: 1 ) - Please choose one

CSS

is a breakthrough in Web design because it allows developers to control the---------

► Processing speed on client side

► Data grid view on client side

► Style and layout of home page.

► Style and layout of multiple Web pages (repeated)

Question No: 15 ( Marks: 1 ) - Please choose one

Which HTML tag is used to define an internal style sheet?

► <css>

► <script>

► <style> (repeated)

► <sheet>

Question No: 16 ( Marks: 1 ) - Please choose one

What is the correct HTML tag for adding a background color?

► <background>yellow</background>

► <body bgcolor="yellow"> (repeated)

Page 565: A Mega File of It for Current Quizzes

► <body color="yellow">

► None

MIDTERM EXAMINATION

Spring 2009

IT430- E-Commerce (Session - 4)

http://www.vustudents.net

Question No: 1 ( Marks: 1 ) - Please choose one

In datalink layer, data packets are placed inside

► Data frames

► Data boxes

► Data streams

► None of these

Question No: 2 ( Marks: 1 ) - Please choose one

Which of these is the correct HTML code for creating a reset button?

► <input type =”button” name=”reset” value=”reset”>

► <input type=”resetButton” value=”Clear”>

► <input type=”reset” value=”reset”>

► <input type=”button” name=”reset” value=”clear”>

Page 566: A Mega File of It for Current Quizzes

Question No: 3 ( Marks: 1 ) - Please choose one

…..tag is used into …….tag because a row contains multi cells and to fill up these cells with data.

► TD…… TR

► TR…… TD

► TD…… TG

► TG…… TR

Question No: 4 ( Marks: 1 ) - Please choose one

Individuals who write programs or manipulate technologies to gain unauthorized access to computers

and networks are --------------- .

► administrators

► experts

► hackers

► coders

Page 567: A Mega File of It for Current Quizzes

Question No: 5 ( Marks: 1 ) - Please choose one

Which tag is used for the hidden fields?

► <FIELD>

► <TEXT>

► <INPUT>

► <HIDDEN>

Question No: 6 ( Marks: 1 ) - Please choose one

What is a correct way of referring to a stylesheet called "mystyle.xsl" ?

► <?xml-stylesheet type="text/xsl" href="mystyle.xsl" ?>

► <link type="text/xsl" href="mystyle.xsl" />

► <stylesheet type="text/xsl" href="mystyle.xsl" />

► <?stylesheet type="text/xsl" href="mystyle.xsl" ?>

Question No: 7 ( Marks: 1 ) - Please choose one

Which of them is NOT a predefined object?

► Document

► Date

► Loop

► Array

Page 568: A Mega File of It for Current Quizzes

Question No: 8 ( Marks: 1 ) - Please choose one

Which of these is not a comparison operator?

► <

► >

► =

► !=

Question No: 9 ( Marks: 1 ) - Please choose one

Var d = new date()

Which of the following is correct about the d variable?

► instance of new

► instance of Date() method

► instance of Date object

► Simple Variable

Question No: 10 ( Marks: 1 ) - Please choose one

When you declare a variable within a function, the variable can only be accessed within that

function. When you exit the function, the variable is destroyed. These variables are called

► Local Variables

► Global Variables

► Local and Global

► None of the above

Page 569: A Mega File of It for Current Quizzes

Question No: 11 ( Marks: 1 ) - Please choose one

Which of the following , is condition part of given For loop

for (i = 0; i <= 5; i++).

► i=0.

► i++.

► i<=5.

► (i = 0; i <= 5; i++).

Question No: 12 ( Marks: 1 ) - Please choose one

What is the correct JavaScript syntax to write "Virtual University of Paistan"?

► document.write("Virtual University of Paistan ")

► ("Virtual University of Paistan ")

► " Virtual University of Paistan "

► response.write("Virtual University of Paistan ")

Question No: 13 ( Marks: 1 ) - Please choose one

Which of the following is NOT valid HTML code line?

► <frameset rows="16%,84%">

► <frameset columns="16%,84%">

Page 570: A Mega File of It for Current Quizzes

► <frameset cols="100,150">

► <frameset cols=”50%,50%” rows=”16%,84%”>

Question No: 14 ( Marks: 1 ) - Please choose one

CSS is a breakthrough in Web design because it allows developers to control the---------

► Processing speed on client side

► Data grid view on client side

► Style and layout of home page.

► Style and layout of multiple Web pages

Question No: 15 ( Marks: 1 ) - Please choose one

Which HTML tag is used to define an internal style sheet?

► <css>

► <script>

► <style>

► <sheet>

Question No: 16 ( Marks: 1 ) - Please choose one

What is the correct HTML tag for adding a background color?

► <background>yellow</background>

► <body bgcolor="yellow">

Page 571: A Mega File of It for Current Quizzes

► <body color="yellow">

► None

Question No: 17 ( Marks: 1 )

What does this mean?

padding-right

adds space to the right of the content

Question No: 18 ( Marks: 1 )

Do you agree or not that using Cascading Style Sheets one can apply an image to sections of one’s

page or even to individual words.

YES! I AGREE

Question No: 19 ( Marks: 2 )

Suppose, there is an applet at "http://www.vu.edu.pk/demo.class". Write the code to include this applet

in your web page.

<APPLET CODE= “http://www.vu.edu.pk/demo.class” width=100 height=200> DEMO

</APPLET>

Page 572: A Mega File of It for Current Quizzes

MIDTERM EXAMINATION

Spring 2010

IT430- E-Commerce (Session - 6)

http://www.vustudents.net

Question No: 1 ( Marks: 1 ) - Please choose one

In star network features a central connection point called a "hub" that ought to be only a hub.

_ True

_ False

Question No: 2 ( Marks: 1 ) - Please choose one

Switch is a device that joins multiple computers to gether within one local area network (LAN).

_ True (page 15)

_ False

Question No: 3 ( Marks: 1 ) - Please choose one

Switch generally contains more "intelligence" than a hub.

_ True

_ False

Question No: 4 ( Marks: 1 ) - Please choose one

In which protocol, the messages are not deleted fro m email server.

_ SMTP

_ POP3

_ IMAP (page 18)

_ ICMP

Page 573: A Mega File of It for Current Quizzes

Question No: 5 ( Marks: 1 ) - Please choose one

Which protocol does Virtual university use to send email to student Accounts?

_ SMTP

_ POP

_ IMAP

_ TCP

Question No: 6 ( Marks: 1 ) - Please choose one

For which one of the following,<MARQUEE ...> tag can work better

_ News headlines

_ Announcements

_ Sound pulgin

_ Movie controls

Question No: 7 ( Marks: 1 ) - Please choose one

Can you add a style in a single place on a page ?

_ Yes, with a style-definition written into the tag

_ Yes, with a global style definition that redefine s the tag.

_ No - CSS can only be defined for entire pages.

Question No: 8 ( Marks: 1 ) - Please choose one

Which CSS tag is used to place an image that would rem ain when user scrolls down or up the page?

_ background-attachment: fixed

_ background-attachment: scroll

_ background-attachment: up

_ All of these

Page 574: A Mega File of It for Current Quizzes

Question No: 9 ( Marks: 1 ) - Please choose one

What shall come in blanks for proper result,

Here blanks are numbered with 1,2 and 3

<html>

<head>

<SCRIPT language="JavaScript">

Var num1, var num2

Document.container .result.value=parseFloat(num1)-p arseFloat(num2)

</script>

</head>

<body>

<FORM name=”---------1-----------”>

<input type=”----------2-------” name=”-------3---- -----” maxlength=”5”>

</form>

</body>

</html>

_ container, text and result

_ result, value and container

_ container , button and value

_ result, container and text

Question No: 10 ( Marks: 1 ) - Please choose one

Correct syntax of "for" loop is :

_ for (i = 0; i <= 5)

_ for i = 1 to 5

_ for (i <= 5; i++)

Page 575: A Mega File of It for Current Quizzes

_ for (i = 0; i <= 5; i++)

REF

http://www.ex-designz.net/test_grade.asp?tid=65

Question No: 11 ( Marks: 1 ) - Please choose one

CGI stands for

_ Common Gate Information

_ Common Gate Interface (PAGE 82) _ Common Goal Interest

_ Common Global Interaction

Question No: 12 ( Marks: 1 ) - Please choose one

Which of the following property falls in HTTP?

_ Stateless

_ Stateful

_ Temporary

_ All of these

Question No: 13 ( Marks: 1 ) - Please choose one

What is a correct way of referring to a stylesheet called "mystyle.xsl" ?

_ <?xml-stylesheet type="text/xsl" href="mystyle.xs l" ?>

_ <link type="text/xsl" href="mystyle.xsl" />

_ <stylesheet type="text/xsl" href="mystyle.xsl" />

_ <?stylesheet type="text/xsl" href="mystyle.xsl" ?>

Question No: 14 ( Marks: 1 ) - Please choose one

Page 576: A Mega File of It for Current Quizzes

Which of the following does not interpret its code?

_ ASP

_ PHP

_ JSP (page 85)

_ Coldfusion

Question No: 15 ( Marks: 1 ) - Please choose one

Asymmetric cryptography is also called ------------ -- .

_ Public key cryptography (PAGE 100)

_ Private key cryptography

_ Substitution cryptography

_ Transposition

Question No: 16 ( Marks: 1 ) - Please choose one

Digital signature uses --------- .

_ Symmetric cryptography

_ Private key cryptography

_ Public key cryptography (PAGE 100)

_ Hash function

Question No: 17 ( Marks: 1 ) - Please choose one

Which one of the following is NOT a valid JavaScrip t variable?

_ _name1

_ $studentScore

Page 577: A Mega File of It for Current Quizzes

_ first_name

_ 2ndName

Question No: 18 ( Marks: 1 ) - Please choose one

Which of these is the correct HTML code for creatin g a reset button?

_ <input type =”button” name=”reset” value=”reset”>

_ <input type=”resetButton” value=”Clear”>

_ <input type=”reset” value=”reset”> (page 61)

_ <input type=”button” name=”reset” value=”clear”>

Question No: 19 ( Marks: 1 ) - Please choose one

Why we use reset tag in HTML?

_ To remove the text written in Notepad.

_ To remove the text written in between <body> and </body>tag.

_ To remove the text written in between <head> and </head> tag.

_ To remove the text written in between <form> and < /form> tag. (page 61)

Question No: 20 ( Marks: 1 ) - Please choose one

http://cs.vu.edu is an example of

_ Two zone domain name

_ Three zone domain name

_ Four zone domain name

_ Five zone domain name

Page 578: A Mega File of It for Current Quizzes

Question No: 21 ( Marks: 2 )

How

Certification Authority (CA) issues the certificate s? Describe briefly

Question No: 22 ( Marks: 2 )

Discuss the role of child element tags while in wri ting XML code.

MIDTERM EXAMINATION Spring 2009

IT430- E-Commerce (Session - 2)

http://www.vustudents.net

Question No: 1 __ ( Marks: 1 ) - Please choose one

Academic institutions, religious organizations and government using ----------------------e-commerce classification

Busi ness-to-Business(B2B)

Intra Business

Non Business EC (page 2)

Busi ness-to-consumer(B2C)

Question No: 2___ ( Marks: 1 ) - Please choose one

Network addresses 128--- 191 range belongs to which of the following class networks?

A

B (page 10)

C

E

Question No: 3 ( Marks: 1 ) - Please choose one

Page 579: A Mega File of It for Current Quizzes

Where in an HTML document is the correct place to r efer to an external style sheet?

In the <body> section

At the end of the document

In the <head> section

At the top of the document

Ref

http://www.ex-designz.net/test_grade.asp?tid=37 Question No: 4 __ ( Marks: 1 ) - Please choose one

Constructor is defined as the initializing function used to create…..........

Instance of object

Copy of object

Instance / copy of object (page 69)

Shallow copy of object

Question No: 5 ( Marks: 1 ) - Please

choose one What does DTD stand for?

Do The Dance.

Dynamic Type Definition.

Data Type Definition. (page 76)

Direct Type Définition.

Question No: 6 __ ( Marks: 1 ) - Please choose one Which one of

following file is used to translate XML:

Page 580: A Mega File of It for Current Quizzes

DTD

XSL (repeated )

XML parser

Browser

Question No: 7 __ ( Marks: 1 ) - Please choose one

In which of the following language ,XML parser is u sually written.

VB.net

Java (page 77)

Asp.net

C++

Question No: 8 __ ( Marks: 1 ) - Please choose one

In _________key cryptography, everyone has access t o all the public keys

Public (page 100)

Private

Symmetric

Certified

Question No: 9___ ( Marks: 1 ) - Please choose one

How do you define a numerical value?

var mynum = new Math;

var mynum = Math(6);

var mynum = 6;

Page 581: A Mega File of It for Current Quizzes

Math.mynum = 6;

Question No: 10___ ( Marks: 1 ) - Please choose one

What is 17%5 ?

2

3

85

84

Question No: 11___( Marks: 1 ) - Please choose one

An array can contain ---------- .

only text

only numbers

only numbers or text

any valid variable

ref

http://java.sun.com/docs/books/jls/second_edition/html/arrays.doc.html

Question No: 12 ( Marks: 1 ) - Please choose

one Which tag is used for the hidden fields?

<FIELD>

<TEXT>

<INPUT> (page 88)

<HIDDEN>

Page 582: A Mega File of It for Current Quizzes

Question No: 13 __ ( Marks: 1 ) - Please choose one

Packet filter firewall operates at

a) data link layer

b) network layer

c) transport layer

a and b only (page 5)

c only

b and c only

a, b and c

Question No: 14 ( Marks: 1 ) - Please choose one

Which one has the functionality to redirect the fil led information to an other page.

Submit button

Reset button

Radio button

None of the given

Question No: 15 ( Marks: 1 ) - Please choose one

Due to which characteristics, ATM network are cover ed under E-commerce ?

Exchange of information through computer networks

Internet.

Exchanging of products, services.

Page 583: A Mega File of It for Current Quizzes

None of the above.

Question No: 16 __ ( Marks: 1 ) - Please choose one

IP, RIP, and ARP protocols work on

Application layer

Session layer

Network layer (page 6)

Data link layer

MIDTERM EXAMINATION Spring 2009

IT430- E-Commerce (Session - 1)

http://www.vustudents.net

Question No: 1 __ ( Marks: 1 ) - Please choose one

Marketing plan should be same for all E-commerce cl assification.

True

False

Question No: 2 ( Marks: 1 ) - Please choose one

Identify the networking device which regenerates th e signals if these become

weak.

Hub

Switch

Router

Page 584: A Mega File of It for Current Quizzes

Repeater (page 15)

Question No: 3 ( Marks: 1 ) - Please choose one

How can you open a link in a new browser window?

<a href="url" target="new">

<a href="url"target="_blank"> (page 33)

<a href="url"new>

None of these

Question No: 4 ( Marks: 1 ) - Please choose one

Content pages relate to which of the following tag?

<iframe>

<Frame>

<frameset>

<noframes>

Question No: 5 __ ( Marks: 1 ) - Please choose one

What is the correct HTML for referring to an external style sheet?

<style src=mystlye.css>

<link re = “stylesheet” type= “text/css” herf= “mys tyle.css”>

<stlyesheet> mystyle.css</stlyesheet>

All of these

Ref

Page 585: A Mega File of It for Current Quizzes

http://www.ex-designz.net/test_grade.asp?tid=37

Question No: 6 __ ( Marks: 1 ) - Please choose one

Choose the correct HTML code line which left-align the content inside a table cell.

<td leftalign>

<td valign="left">

<td align="left"> (page 26)

<tdleft>

Question No: 7 ( Marks: 1 ) - Please choose one

In a Frameset code, do the BODY tags belong inside or outside of the NOFRAMES tag pair?

Inside because an HTM Document can only include one or the other.

Outside, to be seen by the older browsers [NN versi on 1 and IE version 2].

Outside because the W3C says that to be valid.

Contain a BODY tags pair.

Ref

http://www.tjkdesign.com/articles/frames/quiz.asp

Question No: 8 ________________ ( Marks: 1 ) - Plea se choose one

In CSS, the font-style property can make text what?

Bigger.

Italic.

Different colors.

Page 586: A Mega File of It for Current Quizzes

Change size .

Ref

http://www.w3schools.com/css/css_font.asp

Question No: 9 ( Marks: 1 ) - Please choose one

Which CSS tag is used to place an image that would remain when user scrolls down or up the page?

background-attachment: fixed

background-attachment: scroll

background-at tachment : up

All of these

Question No: 10 ( Marks: 1 ) - Please choose one

Which of the following ,in Javascript, we could not create our own?

Textboxes

Dropdown

Object

Image

Ref

http://www.w3schools.com/js/js_objects.asp

Question No: 11 ( Marks: 1 ) - Please choose one

How do you write a conditional statement for execut ing some statements only if "i" is

equal to 5?

Page 587: A Mega File of It for Current Quizzes

if i=5

if i=5 then

if i==5 then

if (i==5) (page 58)

Ref

http://www.ex-designz.net/test_grade.asp?tid=65

Question No: 12 __ ( Marks: 1 ) - Please choose one

Constructor is defined as the initializing function used to create…..........

Instance of object

Copy of object

Instance / copy of object (page 69)

Shallow copy of object

Question No: 13 ( Marks: 1 ) - Please choose one

Which one of following file is used to translate X ML:

DTD

XSL (page 77)

XML parser

Browser

Question No: 14 ( Marks: 1 ) - Please choose one

How can you reference part of a string?

text.substr(5,6);

Page 588: A Mega File of It for Current Quizzes

text.part(5,6)

text. piece(5 ,6)

text.split(5,6);

http://php.net/manual/en/function.substr.php

Question No: 15___( Marks: 1 ) - Please choose one

Which one is the correct CSS syntax?

h1 {font-size:72pt } (page 39)

h1:font-size =72pt

{h1:font-size =72pt}

{h1;font-size:72pt}

Question No: 16 __ ( Marks: 1 ) - Please choose one

In the communication between two computers on a net work, CRC is calculated at

Sender ’s side

Receiver ’s side

Both sender and receiver sides

Neither on sender nor on receiver side (100% tuka )

Question No: 17 __ ( Marks: 1 )

What does this mean document.write("str.charAt(3) : "+str.charAt(3) +"<P>"); ?

Question No: 18 __ ( Marks: 1 )

What does this term mean "Non-repudiation"?

Page 589: A Mega File of It for Current Quizzes

Question No: 19 __ ( Marks: 2 )

What are servlets?

Question No: 20 ( Marks: 3 )

What are the three methods for using style sheets w ith a web page?

Question No: 21 __ ( Marks: 5 )

Identify protocol stack used in each layer of OSI m odel?

Question No: 22 ( Marks: 10 )

"The role of a Certification Authority is similar t o a passport office." Explain it.

MIDTERM EXAMINATION Spring 2009

IT430- E-Commerce (Session - 4) http://www.vustudents.net

Question No: 1 ( Marks: 1 ) - Please choose one In data link layer, data packets are placed inside ► Data frames (PAGE 6) ► Data boxes ► Data streams ► None of these

Question No: 2 ( Marks: 1 ) - Please choose one Which of these is the correct HTML code for creating a reset button? ► ► ► ► Question No: 3 ( Marks: 1 ) - Please choose one …..tag is used into …….tag because a row contains multi cells and to fill up these cells with data. ► TD…… TR ► TR…… TD ► TD…… TG

Page 590: A Mega File of It for Current Quizzes

► TG…… TR RFF

http://www.w3.org/TR/WCAG10-HTML-TECHS/ Question No: 4 ( Marks: 1 ) - Please choose one Individuals who write programs or manipulate technologies to gain unauthorized access to computers and networks are --------------- . ► administrators ► experts ► hackers (PAGE 94) ► coders Question No: 5 ( Marks: 1 ) - Please choose one Which tag is used for the hidden fields? ► ►

► ► Question No: 6 ( Marks: 1 ) - Please choose one What is a correct way of referring to a stylesheet called "mystyle.xsl" ? ► <?xml-stylesheet type="text/xsl" href="/mystyle.xs l" ?> ► ► ► <?stylesheet type="text/xsl" href="/mystyle.xsl" ?> Question No: 7 ( Marks: 1 ) - Please choose one Which of them is NOT a predefined object? ► Document ► Date ► Loop ► Array ref http://www.webreference.com/programming/javascript/diaries/15/ Question No: 8 ( Marks: 1 ) - Please choose one Which of these is not a comparison operator? ► < ► > ► = (PAGE 58) ► != Question No: 9 ( Marks: 1 ) - Please choose one

Var d = new date() Which of the following is correct about the d variable?

► instance of new ► instance of Date() method ► instance of Date object ► Simple Variable

Page 591: A Mega File of It for Current Quizzes

REF http://www.webreference.com/programming/javascript/diaries/15/

Question No: 10 ( Marks: 1 ) - Please choose one When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called

► Local Variables

► Global Variables

► Local and Global

► None of the above

ref If you declare a variable within a function, the va riable can only be accessed ... the variable is destroyed. These variables are call ed local variables. ... Question No: 11 ( Marks: 1 ) - Please choose one Which of the following , is condition part of given For loop for (i = 0; i <= 5; i++).

► i=0. ► i++. ► i<=5. ► (i = 0; i <= 5; i++). Ref http://www.blackwasp.co.uk/CSharpForLoop.aspx

Question No: 12 ( Marks: 1 ) - Please choose one What is the correct JavaScript syntax to write "Virtual University of Paistan"?

► document.write("Virtual University of Paistan ") ► ("Virtual University of Paistan ") ► " Virtual University of Paistan " ► response.write("Virtual University of Paistan ")

Question No: 13 ( Marks: 1 ) - Please choose one Which of the following is NOT valid HTML code line?

► ,84%"> ► ,84%"> ► ► ,50%” rows=”16%,84%”>

Question No: 14 ( Marks: 1 ) - Please choose one CSS is a breakthrough in Web design because it allows developers to control the---------

Page 592: A Mega File of It for Current Quizzes

► Processing speed on client side ► Data grid view on client side ► Style and layout of home page. ► Style and layout of multiple Web pages ref http://ezinearticles.com/?Advantages-of-Using-CSS-in-Web-Design&id=1433066

Question No: 15 ( Marks: 1 ) - Please choose one

Which HTML tag is used to define an internal style sheet?

Question No: 16 ( Marks: 1 ) - Please choose one What is the correct HTML tag for adding a background color? ► yellow ► ► ► None Question No: 17 ( Marks: 1 ) What does this mean? (page 49) padding-right padding-right – adds space to the right of the cont ent Question No: 18 ( Marks: 1 ) Do you agree or not that using Cascading Style Sheets one can apply an image to sections of one’s page or even to individual words. Yes! I agree, using CSS one can apply his/her defin ed design, image or wording to muliple pages of his/her website. Question No: 19 ( Marks: 2 ) Suppose, there is an applet at "http://www.vu.edu.pk/demo.class". Write the code to include this applet in your web page. Question No: 20 ( Marks: 3 ) What do you think, is there any difference between Static and Dynamic IP Address assignment? Discuss. A static IP address is a number (in the form of a dotted quad) that is assigned to a computer by an Internet service provider (ISP) to be its permanent address on the Internet. Computers use IP addresses to locate and talk to each other on the Internet, much

Page 593: A Mega File of It for Current Quizzes

the same way people use phone numbers to locate and talk to one another on the telephone. When you want to visit whatis.com, your computer asks a domain name system (DNS) server (think telephone information operator) for the correct dotted quad number (think phone number) for whatis.com and your computer uses the answer it receives to connect to the whatis.com server. Question No: 21 ( Marks: 5 ) What is cryptography? What techniques are used for cryptography? Cryptography is the technique of converting a messa ge into unintelligible or non-understandable form such that even if some unauthorized or unwanted person i ntercepts the message he/she would still not be able to make any sense out of it. Cryptography is thousands of years old. Techniques used for cryptography Substitution In su bstitution we replace each letter in the message with another to make the message non-understandable. For example, each letter “a” in the message can be replaced with letter “d” and letter “b” with letter “e” and so on. Transposition It is based on scrambling the characters in a message. A transposition system may first write a message into a table row by row then the message can be read and rewritten column by column to make it scrambled.

Question No: 22 ( Marks: 10 ) Analyze the following given code showing some Cascading Style Sheets tags and explain its lines one by one.

<html>

<head>

h1 {text-decoration: overline}

h2 {text-decoration: line-through}

h3 {text-decoration: underline}

a {text-decoration: none}

<body>

Page 594: A Mega File of It for Current Quizzes

This is header 1

This is header 2

This is header 3

This is a link

MIDTERM EXAMINATION

Spring 2010

IT430- E-Commerce (Session - 6)

Solved

http://www.vustudents.net

Question No: 1 ( Marks: 1 ) - Please choose one

Academic institutions, religious organizations and government using --------------------- e-commerce

classification

► Business-to-Business(B2B)

► Intra Business

► Non Business EC (page 2)

► Business-to-consumer(B2C)

Question No: 2 ( Marks: 1 ) - Please choose one

In which protocol, the messages are not deleted from email server.

► SMTP

► POP3

► IMAP (page 18)

► ICMP

in case of IMAP the message is not deleted in the email server and thus can be reopened from another

location/machine.

Page 595: A Mega File of It for Current Quizzes

Question No: 3 ( Marks: 1 ) - Please choose one

What is the correct HTML tag for adding a background color?

► <background>yellow</background>

► <body bgcolor="yellow"> (page 47)

► <body color="yellow">

► None

Question No: 4 ( Marks: 1 ) - Please choose one

Which HTML tag is used to define an internal style sheet?

► <css>

► <script>

► <style> (Ans)

► <sheet>

reference

http://www.ex-designz.net/test_grade.asp?tid=37 (question no 3)

Question No: 5 ( Marks: 1 ) - Please choose one

What is the correct HTML for making a hyperlink?

► <a href="http://www.w3schools.com">W3Schools</a>

► <a name="http://www.w3schools.com">W3Schools.com</a>

► <a url="http://www.w3schools.com">W3Schools.com</a>

► <a>http://www.w3schools.com</a>

REFERENCE

http://www.w3schools.com/html/html_links.asp

Page 596: A Mega File of It for Current Quizzes

Question No: 6 ( Marks: 1 ) - Please choose one

If we leave out the target attribute in frame tag and link was clicked ,the document loads into the

window

► In Same page (repeated )

► In other blank page.

► To display browser error.

► All of the options.

Question No: 7 ( Marks: 1 ) - Please choose one

What does mean by != comparison operator? http://www.vustudents.net

► Equal to

► Not

► Equal

► Not Equal (page 58)

Question No: 8 ( Marks: 1 ) - Please choose one

What does the string. match (“abc”) object do?

► Concatenates the “abc” word to other “abc” words

► Matches the “abc” words with other “abc” words

► It does replacement of abc word with other words

► All of the above

ref

http://www.regular-expressions.info/reference.html

Question No: 9 ( Marks: 1 ) - Please choose one

var txt="Hello World!" Document. Write (txt.length), it would return the length as.

Page 597: A Mega File of It for Current Quizzes

► 10

► 11

► 12

► 13

REFERENCE

http://www.w3schools.com/js/js_obj_string.asp

Question No: 10 ( Marks: 1 ) - Please choose one

Which of the following property falls in HTTP?

►Stateless (Ans)

► Stateful

► Temporary

► All of these

Question No: 11 ( Marks: 1 ) - Please choose one

Which one of the following certifies the binding between public key and its owner.

►CA (page101)

► KDC

► TLS

► Firewall

Question No: 12 ( Marks: 1 ) - Please choose one

Cyclical Redundancy Check (CRC), takes place in which layer of OSI Model.

► Session Layer

► Transport Layer

► Network Layer

► Data link layer (page 6)

Page 598: A Mega File of It for Current Quizzes

Question No: 13 ( Marks: 1 ) - Please choose one

How can you convert information consisting of comma separated values into an array?

► txtArray = txt.indexOf(',');

► txtArray = txt.split(','); page 70

► txtArray = txt.trim(',');

► txtArray = txt.substring(',');

Question No: 14 ( Marks: 1 ) - Please choose one

The control statement on a while loop is tested

► before each time through the loop

► after each time through the loop

► once at the start

► once at the end

Ref

http://en.wikipedia.org/wiki/While_loop

Question No: 15 ( Marks: 1 ) - Please choose one

Which SQL statement is used to delete data from a database?

► DELETE (page 83)

► COLLAPSE

► REMOVE

► DISCARD

Question No: 16 ( Marks: 1 ) - Please choose one

A program that performs a specific function such as creating invoices/bills or processing payment

received from customers is called a/an ---------------.

Page 599: A Mega File of It for Current Quizzes

► Middleware

► Web Service

► CRM Software

► Appplication Program (page 92)

Question No: 17 ( Marks: 1 ) - Please choose one

Which firewall uses strong user authentication to verify identity of a host attempting to connect to the

network?

► Packet filter firewall

► Circuit level firewall

► Application gateway firewall (page 96)

► Hybrid firewall

Question No: 18 ( Marks: 1 ) - Please choose one

In what form are style rules presented?

► Selector { property: value }

► selector { property= value }

► selector ( property: value )

► selector ( property= value )

Question No: 19 ( Marks: 1 ) - Please choose one

Why we use reset tag in HTML?

► To remove the text written in Notepad.

► To remove the text written in between <body> and </body>tag.

Page 600: A Mega File of It for Current Quizzes

► To remove the text written in between <head> and </head> tag.

► To remove the text written in between <form> and </form> tag.

Reference

http://www.echoecho.com/htmlforms13.htm

Question No: 20 ( Marks: 1 ) - Please choose one

When data moves upward in the OSI stack it is called

► Encapsulation

► De-encapsulation (page 5)

► Synchronization

► None of these

Question No: 21 ( Marks: 2 )

What does PPTP stand for?

Ans (�page98)

PPTP stands for point to point transfer protocol.

Question No: 22 ( Marks: 2 )

What are the keywords to define a variable and a function in JavaScript?

“var” is the keyword used to define a variable in Javascript

e.g var a; “function” is the keyword to define a function in javascript

e.g function myfunction(){ // some code }

Page 601: A Mega File of It for Current Quizzes

Question No: 23 ( Marks: 3 ) http://www.vustudents.net

Identify the object, property and method in the following:

Math.sin(45)

Math.PI

Ans:

Math is the object in above case

PI is the property of Math object

Sin() is the method of Math object

Question No: 24 ( Marks: 3 )

Performance of web servers can be evaluated mainly on the basis of two factors. What are they?

Ans:

Performance of web sever

Performance of web servers can be evaluated mainly on the basis of two

factors:

Throughput, which is the number of http requests that a particular server

hardware and software can handle in the unit time; and

Response time, which is the amount of time a web server requires to process

one request. Web server hardware architectures

Question No: 25 ( Marks: 5 )

Write the code for a web page displaying a button named "Testing". After clicking that button an alert

should be displayed saying "The test is successful".

<html> <head> <script type="text/javascript"> function sndAlert() { window.alert("The test is successful!!!");

Page 602: A Mega File of It for Current Quizzes

} </script> </head> <body> <FORM NAME="form1"> <INPUT TYPE="Button" name="showAlert" VALUE="Show Alert" onclick="sndAlert()"> </FORM> </body> </html> Question No: 26 ( Marks: 5 )

What is the difference between an interpreted and a compiled language? Give one example of each.

http://www.vustudents.net

Ans:

In a compiled language we compile to code or convert into machine language using a software called

compiler as we can case C++

Example C++

with interpret language we interpret the code (line by line) at run time using a program called

interpreter browser is an interpreter.

Example Browser…

MIDTERM EXAMINATION

Spring 2010

IT430- E-Commerce (Session - 6)

Solved

http://www.vustudents.net

Question No: 1 ( Marks: 1 ) - Please choose one

MAC stand for

► Media Access Control ( page 13)

► Media Access Consortium

Page 603: A Mega File of It for Current Quizzes

► Member of Asian Community

► None of these

Question No: 2 ( Marks: 1 ) - Please choose one

Choose the correct HTML tag for the largest heading

► <head>

► <h1> (page 20)

► <Heading>

► <h6>

Question No: 3 ( Marks: 1 ) - Please choose one

Which of the following tags are used for embedding sound files into HTML code?

► <A href=“song.wav”>

► <EMBED SRC="Skylar.MP3">

► <A href=“song.wav”> and <EMBED SRC="Skylar.MP3"> (page 37)

► None of these

Do correction in all midterm file J

Question No:44 answer is 3rd

Question No: 4 ( Marks: 1 ) - Please choose one

Which of the following is NOT an advantage of CSS ?

► Works on version 4 browsers or newer

► Define the look of your pages in one place

► Easily change the look

► Implement same formatting each time tag is used.

Advantages

6) Improved Search Engine Results

7) Sites Load Faster

Page 604: A Mega File of It for Current Quizzes

8) Design Separated from Content:

9) Displayed on Various Media

10) Compatibility with Browsers

Browser inserts a line break before the <DIV> tag and after the </DIV> end tag.

They are used when you want to apply a specific style to a number of different tags and sections

throughout the document http://www.vustudents.net

Question No: 5 ( Marks: 1 ) - Please choose one

Which of the following is correct line to add separated css file with name xxxx.css?

► <link scr=stylesheet href="/xxxx.css" type="text/css">

► <link rel=stylesheet href="/xxxx.css" type="text/css"> (page 77)

► <style rel=stylesheet href="/xxxx.css" type="text/css">

► <link rel=stylesheet scr="xxxx.css" type="text/css">

Question No: 6 ( Marks: 1 ) - Please choose one

Which of the following is correct syntax to define color in CSS?

► body {color: black} (page 77)

► body:color=black

► {body:color=black(body}

► {body;color:black}

Question No: 7 ( Marks: 1 ) - Please choose one

Inside which of the following HTML element do we put the JavaScript?

► <script> (page 58)

► <js>

► <javascript>

► <scripting>

Page 605: A Mega File of It for Current Quizzes

Question No: 8 ( Marks: 1 ) - Please choose one

JavaScript is mainly a ___________ language.

► Server Side Scripting

► Cross Side Scripting

► Client Side Scripting (page79)

► both Cross and Server Side Scripting

Question No: 9 ( Marks: 1 ) - Please choose one

Which one is the responsible to manage “Internal processes”?

► E-business

► E-commerce

► E-marketing

► All of the given

Question No: 10 ( Marks: 1 ) - Please choose one

The first control statement in a for loop usually

► sets the termination condition

► increments a counter

► creates a control variable

► none of the above

Question No: 11 ( Marks: 1 ) - Please choose one

You define a method using

► obj.method

► obj.method[]

Page 606: A Mega File of It for Current Quizzes

► obj.method() (PAGE 58)

► obj-method

Question No: 12 ( Marks: 1 ) - Please choose one

What is the default scripting language in ASP?

► EcmaScript

► JavaScript

► Java

► VBScript (PAGE 85)

Question No: 13 ( Marks: 1 ) - Please choose one

Following are malicious programs EXCEPT ----------------- .

► Back doors

► Trojan Horses

► Firewalls (PAGE 94)

► Worms

Question No: 14 ( Marks: 1 ) - Please choose one

Outside attacks on a network include the following, EXCEPT --------------- .

► Password attack http://www.vustudents.net

► DoS

► Back doors ( PAGE 95)

► IP spoofing

Question No: 15 ( Marks: 1 ) - Please choose one

Page 607: A Mega File of It for Current Quizzes

At which layer of the OSI model the circuit level firewall operates?

► Application layer

► Presentation layer

► Network layer

► Transport layer (PAGE 96)

Question No: 16 ( Marks: 1 ) - Please choose one

The process of scrambling a message with the help of a key is called -------------- .

► Cryptography

► Filtering

► Transposition

► Encryption (PAGE 100)

The process of scrambling a message with the help of a key is called Encryption.

Question No: 17 ( Marks: 1 ) - Please choose one

In a ring network, every device has exactly ______ neighbors for communication purpose.

► more than two

► Two (PAGE 14)

► Four

► None of these

Question No: 18 ( Marks: 1 ) - Please choose one

What is identified by the tag <FRAMESET COLS="20%,60%,20%">?

► Horizontal frame ► Vertical Frame (PAGE 31)

Page 608: A Mega File of It for Current Quizzes

► Top Frame ► Bottom Frame

Question No: 19 ( Marks: 1 ) - Please choose one

Why we use reset tag in HTML?

► To remove the text written in Notepad.

► To remove the text written in between <body> and </body>tag.

► To remove the text written in between <head> and </head> tag.

► To remove the text written in between <form> and </form> tag. (PAGE 27)

Question No: 20 ( Marks: 1 ) - Please choose one

Network Interface Card is operated at

► Application layer

► Session layer

► Network layer

► Datalink layer (PAGE 6)

Question No: 21 ( Marks: 2 ) http://www.vustudents.net

What value will be printed after executing the following statement in JavaScript:

document.write( Math.pow(3, 2) );

document.write("Math.pow(2,3) :"+Math.pow(2,3)+"<P>");

Question No: 22 ( Marks: 2 )

What is a web server?

ANSWER:

Page 609: A Mega File of It for Current Quizzes

Web server

web server is a machine that serves up the web page requests of a client on the internet. It is a

combination of hardware and software. Decision as regards the type of a web server is largely

dependent on the volume and type of web activities. So, transaction processing sites generating

dynamic pages with high traffic volumes would need web server software that is more efficient and

can easily be upgraded.

Question No: 23 ( Marks: 3 )

To calculate the area of a circle the formula pi r squared is used. How would you code it in JavaScript?

<html>

<script type="text/javascript">

var radius,area;

radius = 10;

area = Math.PI*Math.pow(radius,2);

document.write("Area of circle with radius 10 is " + area );

</script>

</html>

Question No: 24 ( Marks: 3 )

Name four commonly used web server operating systems. (PAGE 91)

Commonly used web server operating systems are Microsoft Windows NT Server, Microsoft Windows

2000 Advanced Server, Microsoft.NET Server, Linux or Unix based operating systems such as Solaris.

Question No: 25 http://www.vustudents.net ( Marks: 5 )

Write the types of firewalls. Only names? Explain these briefly

Page 610: A Mega File of It for Current Quizzes

Packet filter firewall

It uses a set of rules to determine whether outgoing or incoming data packets are allowed to pass

through the firewall.

Circuit level firewall

It is quite similar to the packet filter firewall. It also works on the basis of a set of rules for filtering

packets but operates at the transport layer of the OSI Model so has greater functionality.

Application gateway firewall

It operates at application layer of the OSI Model. It uses strong user authentication to verify identity of a

host attempting to connect to the network using application layer protocols such us FTP. In contrast to

packet filter firewall, it filters the requests rather than packets entering/leaving the network. It can block

any outgoing HTTP or FTP requests.

Question No: 26 ( Marks: 5 )

Write the JavaScript code which will display the following in a web page using a FOR loop:

The number is 0

The number is 1

The number is 2

The number is 3

The number is 4

The number is 5

<html>

<script type="text/javascript">

var no;

for (no=0; no<6 ; no++)

{

document.write("The number is " + no + "<br>" );

}

Page 611: A Mega File of It for Current Quizzes

</script>

</html>

MIDTERM EXAMINATION

Spring 2010

IT430- E-Commerce (Session - 6)

Solved

http://www.vustudents.net

Question No: 1 (Marks: 1) - Please choose one

For which of the following we need to know the classification of E-commerce?

► Market planning strategy

► Build Mission statement

► Management strategy

► none (not sure )

Question No: 2 ( Marks: 1 ) - Please choose one

Switch is a device that joins multiple computers together within one local area network (LAN).

► True (page 4)

► False

Question No: 3 ( Marks: 1 ) - Please choose one

In which protocol, the messages are not deleted from email server.

► SMTP

► POP3

► IMAP (page 18)

Page 612: A Mega File of It for Current Quizzes

► ICMP

Question No: 4 ( Marks: 1 ) - Please choose one

How can you open a link in a new browser window?

► <a href="/url" target="new">

► <a href="/url" target="_blank"> (page 33)

► <a href="/url" new>

► None of these

Question No: 5 ( Marks: 1 ) - Please choose one

What does the Target= “_top” tag perform?

► Loads the new page into the same frame

► Loads the new page into the entire window (page 33)

► Loads the new page into a new browser window

► All of the above

Question No: 6 ( Marks: 1 ) - Please choose one

Which attribute is used in a tag to control the layout of element?

► view

► css (PAGE 39)

► Style

► Layout

Question No: 7 ( Marks: 1 ) - Please choose one

Choose the correct HTML code line which left-align the content inside a tablecell.

► <td leftalign>

Page 613: A Mega File of It for Current Quizzes

► <td valign="left">

► <td align="left">(PAGE 26)

► <tdleft>

Question No: 8 ( Marks: 1 ) - Please choose one

Where in an HTML document is the correct place to refer to an external style sheet?

► In the <body> section

► At the end of the document

► In the <head> section (PAGE 39)

► At the top of the document

Question No: 9 http://www.vustudents.net ( Marks: 1 ) - Please choose one

When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called

► Local Variables

► Global Variables

► Local and Global

► None of the above

ref

http://en.wikipedia.org/wiki/Local_variable

Question No: 10 ( Marks: 1 ) - Please choose one

Constructor is defined as the initializing function used to create…........

► Instance of object

► Copy of object

► Instance / copy of object (page 69)

► Shallow copy of object

Page 614: A Mega File of It for Current Quizzes

Question No: 11 ( Marks: 1 ) - Please choose one

What does XML stand for?

► eXtra Modern Link

► X-Markup Language

► eXtensible Markup Language (page 74)

► Example Markup Language

Question No: 12 ( Marks: 1 ) - Please choose one

For which of following purpose the Firewall is used ?

► Efficient working

► Protection against security attacks (page 95)

► Networking purpose

► None of these

Question No: 13 ( Marks: 1 ) - Please choose one

PPP stands for

► Point to Point Protocol (page 98)

► Post to Post Protocol

► Point to Post Protocol

► None of these

Question No: 14 ( Marks: 1 ) - Please choose one

Which of the following is NOT processed on the client side?

► Cookies

► JavaScript

► CGI scripts (page 79)

Page 615: A Mega File of It for Current Quizzes

► Applets

Question No: 15 ( Marks: 1 ) - Please choose one

Firewall is used to

I - examine the data entering the network

II - examine the data leaving the network

III - filter the data according to certain rules

► I, II and III (page 96)

► I only

► I and III only

► I and II only

Question No: 16 ( Marks: 1 ) http://www.vustudents.net- Please choose one

Which firewall uses strong user authentication to verify identity of a host attempting to connect to the network?

► Packet filter firewall

► Circuit level firewall

► Application gateway firewall (page 96)

► Hybrid firewall

Question No: 17 ( Marks: 1 ) - Please choose one

Bus networks is same as the system bus of a computer.

► True

► False (page 14)

Question No: 18 ( Marks: 1 ) - Please choose one

In Style Sheets, How do you add a background color for all "<h1>" elements?

Page 616: A Mega File of It for Current Quizzes

► all.h1 {background-color:#FFFFFF}

► h1.all {background-color:#FFFFFF}

► h1 {background-color:#FFFFFF}(page 47)

► h1 {bgcolor:#FFFFFF}

Question No: 19 ( Marks: 1 ) - Please choose one

How do you make each word in a text start with a capital letter?

► text-transform:capitalize

► text-transform:first_capitalize. (page 46)

► Cann’t be possible with CSS

► text-transform:uppercase

Question No: 20 ( Marks: 1 ) - Please choose one

MAC address is written in

Binary form 0-1 ►

Decimal form 0-9 ►

Hexadecimal form 0-f ► (page 13)

None of these ►

Question No: 21 ( Marks: 2 )

What is a web server?

Answer : Web server – machine that services internet request.

Web server – machine that services internet request

web server is a machine that serves up the web page requests of a client on the internet. It is a

combination of hardware and software. Decision as regards the type of a web server is largely

dependent on the volume and type of web activities. So, transaction processing sites generating

dynamic pages with high traffic volumes would need web server software that is more efficient and can

easily be upgraded.

Page 617: A Mega File of It for Current Quizzes

Question No: 22 ( Marks: 2 )

What does ‘parseFloat(string)’ And NaN mean?

The parseFloat() function parses a string and returns a floating point number. This function determines if the first character in the specified string is a number. If it is, it parses the string until it reaches the end of the number, and returns the number as a number, not as a string.

The NaN property represents "Not-a-Number" value. This property indicates that a value is not a legal number.

Question No: 23 ( Marks: 3 )

Write at least three rules for writing an XML code.

Rules for writing an XML code

-All elements must be properly nested <outer><inner>content</inner></outer>

-All attribute values must be quoted <FRIES SIZE=“LARGE”>

-All elements with empty content must be identified by ending in />

Question No: 24 ( Marks: 3 )

How ‘Man in The middle Attacks’ operates?

Man in the middle attacks

In it the attacker is able to monitor, capture and control data between sending and receiving

machines. He may apply IP address spoofing technique to divert the packets to its machine, then

modify the packets and resend the misleading information to the actual client. Another form of man-

in-the-middle attack is where the hacker is able to substitute the IP address of a genuine web site with

the IP address of his own web site due to some security hole in the software that runs on a domain

name server. A client would think that he is communicating or receiving the information form a

genuine web site, though it would not be the case actually.

Question No: 25 ( Marks: 5 )

Write the code for a web page displaying a button named "Testing". After clicking that button an alert should be displayed saying "The test is successful".

<html>

Page 618: A Mega File of It for Current Quizzes

<head>

<script type="text/javascript">

function sndAlert()

{

window.alert("The test is successful!!!");

}

</script>

</head>

<body>

<FORM

NAME="form1">

<INPUT TYPE="Button" name="showAlert" VALUE="Show Alert"

onclick="sndAlert()">

</FORM>

</body>

</html>

Question No: 26 ( Marks: 5 )

Differentiate between front end and back end.

Answer: Front end consists of that information which is visible to the user and he can interact with the same through some interface. The back end comprises that information which resides on the server side and is used to create certain dynamic results for the user. It would include different programs or scripts that may be developed in different languages/tools. Backend is mainly used for two purposes – for querying with the databases and for the maintenance of state. We can use different tools (ASP, JSP etc.) for that purpose depending upon their respective advantages/disadvantages.

Page 619: A Mega File of It for Current Quizzes

MIDTERM EXAMINATION

Spring 2010

IT430- E-Commerce (Session - 5)

http://www.vustudents.net

Question No: 1 ( Marks: 1 ) - Please choose one

Network addresses 128--- 191 range belongs to which of the following class networks?

► A

► B (page 10)

► C

► E

Question No: 2 ( Marks: 1 ) - Please choose one

Which of the following is true for Class A:

► Network 01 byte and 03 hosts (page 10)

► Network 02 bytes and 02 hosts

► Network 03 bytes and 01 host

► None of these

Page 620: A Mega File of It for Current Quizzes

Question No: 3 ( Marks: 1 ) - Please choose one

Which one is not included in the networking topologies?

► Star Topology

► Bus Topology

► Media Topology (page 14)

► Ring Topology

Question No: 4 ( Marks: 1 ) - Please choose one

What is the correct HTML for making a hyperlink?

► <a name="http://www.vu.edu.pk”>Virtual university</a>

► <a href=" http://www.vu.edu.pk "> Virtual university </a> (page 23)

► <a>http://www. vu.edu.pk </a>

► <a url="http://www. vu.edu.pk "> Virtual university of pakistan</a>

Question No: 5 ( Marks: 1 ) - Please choose one

What is the correct HTML for making a text input field?

► <textinput type="text">

► <input type="text"> (page 27)

► <input type="textfield">

Page 621: A Mega File of It for Current Quizzes

► <textfield>

Question No: 6 ( Marks: 1 ) - Please choose one

If we leave out the target attribute in frame tag and link was clicked ,the document loads into the

window

► In Same page (page 37)

► In other blank page.

► To display browser error.

► All of the options.

Question No: 7 ( Marks: 1 ) http://www.vustudents.net - Please choose one

Where in an HTML document is the correct place to refer to an external style sheet?

► In the <body> section

► At the end of the document

► In the <head> section (repeated )

► At the top of the document

Question No: 8 ( Marks: 1 ) - Please choose one

How do you write a conditional statement for executing some statements only if "i" is equal to 5?

► if i=5

Page 622: A Mega File of It for Current Quizzes

► if i=5 then

► if i==5 then

► if (i==5)

ref

http://www.ex-designz.net/test_page.asp?tid=65

Question No: 9 ( Marks: 1 ) - Please choose one

Which of the following is used to get remote access of any computer on a network?

► Trojan Horse

► Backdoor

► Virus

► All of these (page 94)

Question No: 10 ( Marks: 1 ) - Please choose one

PPP stands for

► Point to Point Protocol (repeated )

► Post to Post Protocol

► Point to Post Protocol

► None of these

Question No: 11 ( Marks: 1 ) - Please choose one

JavaScript is mainly a ___________ language.

Page 623: A Mega File of It for Current Quizzes

► Server Side Scripting

► Cross Side Scripting

► Client Side Scripting (page 79)

► both Cross and Server Side Scripting

Question No: 12 ( Marks: 1 ) - Please choose one

Inside which HTML element do we put the JavaScript?

► <scripting>

► <javascript>

► <script> (page 57)

► <js>

Question No: 13 ( Marks: 1 ) http://www.vustudents.net - Please choose one

a++; is the same as which of the following?

► a=a*1;

► a=a+2;

► a=1+2;

► a=a+1;

ref

http://www.academictutorials.com/answers.asp?id=6

Question No: 14 ( Marks: 1 ) - Please choose one

Page 624: A Mega File of It for Current Quizzes

If a web server is bombarded with thousands of HTTP requests, that would be an example of --------------

-.

► sniffing

► password attack

► man in the middle attack

► denial of service attack (page 95)

Question No: 15 ( Marks: 1 ) - Please choose one

Outside attacks on a network include the following, EXCEPT --------------- .

► Password attack

► DoS

► Back doors (page 95)

► IP spoofing

Question No: 16 ( Marks: 1 ) - Please choose one

Digital signature uses --------- .

► Symmetric cryptography

► Private key cryptography

► Public key cryptography

► Hash function

ref

http://www.digistamp.com/signature.htm

Page 625: A Mega File of It for Current Quizzes

http://ecommerce.hostip.info/pages/271/Cryptography-Public-Private-Key.html

Question No: 17 ( Marks: 1 ) - Please choose one

In star topology, If hub fails, the entire network also fails.

► True

► False

ref

http://www.exforsys.com/tutorials/networking/star-topology.html

Question No: 18 ( Marks: 1 ) - Please choose one

Which one is the correct CSS syntax?

► h1 {font-size:72pt}

► h1:font-size=72pt

► {h1:font-size=72pt}

► {h1;font-size:72pt}

ref

http://uk.answers.yahoo.com/question/index?qid=20100308120234AAPKmAf

Question No: 19 ( Marks: 1 ) - Please choose one

In CSS, How do you make each word in a text start with a capital letter?

► text-transform:capitalize

Page 626: A Mega File of It for Current Quizzes

► text-transform:uppercase (correct )

► text:capitalize

► You can't do that with CSS

REFERENCE

http://www.ex-designz.net/test_grade.asp?tid=37 (question 24 in this link )

Question No: 20 ( Marks: 1 ) - Please choose one

Which of the following is the default alignment in HTML?

► Left

► Center

► Right

► None

REFERENCE

align = left|center|right|justify|char [CI]

This attribute specifies the alignment of data and the justification of text in a cell. Possible values:

• left: Left-flush data/Left-justify text. This is the default value for table data.

• center: Center data/Center-justify text. This is the default value for table headers.

• right: Right-flush data/Right-justify text. • justify: Double-justify text. • char: Align text around a specific character. If a user agent

doesn't support character alignment, behavior in the presence of this value is unspecified.

Page 627: A Mega File of It for Current Quizzes

Question No: 21 http://www.vustudents.net ( Marks: 2 )

What is Term ‘Catalog Display’ means? (page 92)

A Static catalog is a simple list written in HTML. One has to edit the HTML code

to change it. A dynamic catalog stores information about items in a database

usually on a different computer accessible by the web server. It can provide

photos, detailed description and search facility about the availability of items.

Question No: 22 ( Marks: 2 )

What is meant by a constructor? (page 69)

It is initializing function used to create instance of an object. It is after the name of the object whose

constructor it is.

Question No: 23 ( Marks: 3 )

What is meant by ‘Shopping Cart’ in context of e commerce? (page 92)

shopping cart was used wherein the user had to remember and type certain information. It is now

replaced by electronic shopping cart/basket that keeps record of the items the customer has selected

and allows customers to view the details of the items selected. The customer can add new items or

remove items. To order an item, a customer simply clicks at that item option. All details of an item,

including its price, product no. and order identifying information are stored automatically in the cart.

Question No: 24 ( Marks: 3 )

We have an array named my Array where this sentence is stored. “Welcome to Virtual University!”

If we apply str.split(’’) method.

Page 628: A Mega File of It for Current Quizzes

What will be the output of str.split(’’)myArray(4) and str.split(’’)myArray(2) respectively.

Str.Split split the string based on the blank spaces.

str.split(’’)myArray(4) = blank

str.split(’’)myArray(2) = virtual

Question No: 25 ( Marks: 5 )

Describe the importance of Cryptography in internet data transfer security in E-Commerce?

It is a collection of mathematical techniques used to ensure confidentiality of information. The

process of scrambling a message with the help of a key is called Encryption.

Now a days as internet is widely used. So danger of data safety and serurity also rose. Compare to its

earlier use.

It provide the Transaction Integrity. Tranasction detail of both the parties can be verified which help

to built the confidence between business community.

It provide Privacy like it provide controls to prevent third parties from geting access to the

information within the transaction

Without cryptography, it is doubtful that banks, businesses and individuals would feel safe doing

business online.

Cryptography provides the confidence to the customer that their data is safe and secure. Otherwise

due to lack of confidence and doubt e-commerce business can not flourish.

Page 629: A Mega File of It for Current Quizzes

Question No: 26 ( Marks: 5 )

Write a list of comparison operators in JavaScript with symbols.

Comparison operators

‘==’ for Equal

‘!=’ for not equal

‘< ‘ for Less than

‘<=’ for less than equal

‘>’ for Greater than

‘>=’ for Greater than equal

MIDTERM EXAMINATION

Spring 2009

IT430- E-Commerce (Session - 2)

http://www.vustudents.net

Question No: 1 __ ( Marks: 1 ) - Please choose one

Enable Virtual private network protocol (VPN) to be come a part of

Extranet .(page 98)

Intranet.

Page 630: A Mega File of It for Current Quizzes

Extranet and Intranet.

None of these.

Question No: 2 ( Marks: 1 ) - Please choose one

Content pages relate to which of the following tag?

<iframe>

<Frame>

<frameset> (page 31)

<noframes>

Question No: 3 __ ( Marks: 1 ) - Please choose one

The attributes used by <EMBED . . .> depend on the type of ?

plugin being used

Browser being used (page 38)

ISP being used

Sound/movie being used

Question No: 4 ( Marks: 1 ) - Please choose one

Which of the following is HML tag could n’t be used as CSS tag?

<style>

<h1>

<p>

<a> (page 39)

Page 631: A Mega File of It for Current Quizzes

css coding

<HTML><HEAD> <STYLE TYPE="text/css"> <!-- H1 { color: blue } --> </STYLE> </HEAD><BODY> <H1> A blue header </H1> </BODY></HTML>

H1 { color: blue; text-align: center; }

H1 { color: blue; text-align: center; }

<STYLE TYPE="text/css"> <!-- .myIndent { margin-left: 1.0in } --> </STYLE>

The HTML tags to reference the above .myIndent class is:

<H1 CLASS=myIndent>Indented Header</H1> <P CLASS=myIndent>Also this whole paragraph would be indented one inch</P> <P>but this wouldn't be indented</P>

Page 632: A Mega File of It for Current Quizzes

Question No: 5 ( Marks: 1 ) - Please choose one

Which CSS tag is used to place an image that would remain when user scrolls down or

up the page?

background-attachment: fixed (page 48)

background-attachment: scroll

background-attachment: up

__ _ ___ _ ___ __

Question No: 6___( Marks: 1 ) - Please choose one

What does mean by != comparison operator?

Equal to Not

Equal

Not Equal (page 58)

Question No: 7 ( Marks: 1 ) - Please choose one

For which of following purpose the Firewall is used ?

Efficient working

None of these

Protection against security attacks (page 96)

Networking purpose

Question No: 8 ( Marks: 1 ) - Please choose one

Page 633: A Mega File of It for Current Quizzes

Which one of the following certifies the binding be tween public key and its owner.

CA (page 101)

KDC

TLS

Firewall

Question No: 9 __ ( Marks: 1 ) - Please choose one

Choose the correct HTML tag to make a text bold

<tbold>

<b> (page 19)

<bld>

<bold>

ref http://www.w3schools.com/quiztest/quiztest.asp?qtest=HTML

Question No: 10 __ ( Marks: 1 ) - Please choose one

Middleware establishes connections between -------- --- .

e-commerce software and accounting system (page 92)

e-commerce software and web services web

services and CRM software

ERP and CRM software

Question No: 11 ( Marks: 1 ) - Please choose one

Firewall is used to

I - examin the data entering the network

II - examin the data leaving the network

Page 634: A Mega File of It for Current Quizzes

III - filter the data according to certain rules

I and II only

I, II and III (page 96)

I and III only

I only

Ref http://www.webopedia.com/TERM/F/firewall.html

Question No: 12 ( Marks: 1 ) - Please choose one

When two or more intranets are connected to each ot her they form a/an ----------

VPN

intranet

internet

extranet (page 2)

Question No: 13 __ ( Marks: 1 ) - Please choose one

Which one specify the amount of space between the e dges of the cell and the text inside?

Space tag

CELLSPACING

CELLPADDING

FRAMESPACING

Question No: 14 ( Marks: 1 ) - Please choose one

Which of the following CANNOT be a value for the 't arget' attribute in anchor tag?

_new

_top

_blank

Page 635: A Mega File of It for Current Quizzes

_self

ref

• _blank renders the link in a new, unnamed window

• _self renders the link in the current frame (useful for overriding

a BASE TARGET)

• _parent renders the link in the immediate FRAMESET parent

• _top renders the link in the full, unframed window

Question No: 15 ( Marks: 1 ) - Please choose

one In what form are style rules presented?

selector { property: value }

selector { property=value }

selector ( property: value )

selector ( property = value )

Question No: 16 __ ( Marks: 1 ) - Please choose one

What is identified by the tag <FRAMESET COLS="20%,6 0%,20%">?

Horizontal frame

Vertical Frame (page 31)

Top Frame

Bottom Frame

Question No: 17 __ ( Marks: 1 )

What it stands for (W3C)?

Answer

Page 636: A Mega File of It for Current Quizzes

World Wide Web Consortium

Question No: 18 ( Marks: 1 )

Do you agree or not that using Cascading Style Shee ts one can apply an image to sections of one ’s page or even to individual words.

Question No: 19 ( Marks: 2 )

Which attribute is used to describe , how many time s you want the sound to repeat. Discuss briefly.

Question No: 20 __ ( Marks: 3 )

What are cookies? Why these are used in web develop ment?

Question No: 21 ( Marks: 5 )

What is the difference between physical address and logical address? Support your answer with

at least two examples.

Question No: 22 ( Marks: 10 )

How can we change a Font style of a text? Write com plete tag by using an example by yourself.