E-commernce Final
Page 1 of 1
E-commernce Final
Question No:
1 ( Marks: 1 ) - Please choose one
According to centralized account payment model It
is necessary for both buyer and seller to have their account in the
---------E-bank.
► Same
► Separate
► Any
► partially same
Question No: 2 ( Marks:
1 ) - Please choose one
Click
and Mortar refers to
► Offline business
► Online business
► Engineering
► Building
Question No: 3 ( Marks:
1 ) - Please choose one
Advertising Supported Revenue Model includes
► Yahoo portal
► Employment sites
► Newspaper Publishers
► All of the above
Question No: 4 ( Marks:
1 ) - Please choose one
Fee for Transaction Models include
► Travel Agents and Insurance brokers
► Automobile Sales and event tickets
► Stock
brokers and online banking
► All of the above
Question No: 5 ( Marks:
1 ) - Please choose one
Call handling, sales tracking and Transaction
support(technology / personnel) activities are included in which management
system
► Customer Relationship Management
system
► Public relation
management system
► Inventory management system
► Data Base Management system
Question No: 6 ( Marks:
1 ) - Please choose one
In a Frameset code, do the BODY tags belong
inside or outside of the NOFRAMES tag pair?
► Inside because an HTM Document can only include
one or the other.
► Outside, to be seen by the older browsers [NN
version 1 and IE version 2].
► Outside because the W3C says that to be valid.
► Contain a BODY tags pair.
Question No:
7 ( Marks: 1 ) - Please choose one
XML is a markup language for documents containing
------
► Structured information.
► Unstructured Data
► Text information
► Predefined Tags
Question No:
8 ( Marks: 1 ) - Please choose one
CERT stand for:
► Computer Emergency Response Team
► Computer Efficiency Response Time
► Computer Emergency Real Time
► All of these
Question No: 9 ( Marks:
1 ) - Please choose one
In the digital signature technique, the receiver o f the
message uses ______ to create plaintext.
► His or Her own symmetric key
► His or her own private key
► His or her own public key
► The receiver’s private key
Question No: 10 (
Marks: 1 ) - Please choose one
DSS stands for
► Digital Signature Standards
► Digital Support Standards
► Decision support system
► Digital Sign System
Question No: 11 (
Marks: 1 ) - Please choose one
Which one of the followings is an example of Banner advertising?
► Branding
► Affiliate programs
► Partnership
► All of these
Question No: 12 (
Marks: 1 ) - Please choose one
Meta tag contains:
► User information
► seller information
► web page key information
► bank information
Question No: 13 (
Marks: 1 ) - Please choose one
Exclusive right granted by law to make, use and
sell an invention. What is called?
► Parasites
► Trade mark
► Patent infringement
► Copyright
Question No: 14 (
Marks: 1 ) - Please choose one
A -------------is that sign/symbol that
associates the manufacturer or service provider with the manufactured goods
or services,
► Parasites
► Trade Mark
► Patent infringement
► Cyber squatting
Question No: 15 (
Marks: 1 ) - Please choose one
A firm ‘Glory Enterprise’ and it wants to have
its web site. It also wants to have the word ‘glory’ as a part of its domain
name because for years it has been recognized in the physical world through
this word. However, at the time of registration of its domain name it finds
that a person Mr. ‘A’ who has nothing to do with the business of the firm or
the
word ‘glory’ has already registered a domain name containing this word
as a part of it. Since there cannot be two similar domain names, the firm is
forced to request Mr. ‘A’ to transfer that domain name to it. In response, if
Mr. ‘A’ blackmails or claims ransom from the said firm,
He would be said to have committed -------------.
► Cyber squatting.
► Parasites
► Patent infringement
► Trade mark and domain name conflicts
Question No: 16 (
Marks: 1 ) - Please choose one
A company collecting information assumes that the
customer does not object to a specific use of information unless the customer
specifically denies the permission. Thus, the ompany may use the collected
information for its own purpose, as well as, sell or rent it out to other firms
or persons.
Which of the following Approach it is using?
► Opt-inout
► Swap-out
► Opt-in
► Opt-out
Question No: 17 (
Marks: 1 ) - Please choose one
Idea of Value Chain Model was given by..
► Micheal Porter
► Henry Porter
► Welkin Tin
► Soleman
Question No: 18 (
Marks: 1 ) - Please choose one
Addresses are tied to the device itself and give
no clue to it's location on a global scale. This is the characteristics of
► IP
► RIP
► MAC
► None of the given
Question No: 19 (
Marks: 1 ) - Please choose one
Which of the following is NOT processed on the client side?
► Cookies
► JavaScript
► CGI scripts
► Applets
Question No: 20 (
Marks: 1 ) - Please choose one
Which SQL
statement is used to insert new data in a database?
► ADD NEW
► INSERT NEW
► INSERT INTO
► ADD RECORD
Question No: 21 (
Marks: 1 ) - Please choose one
If a key is 4 bits in length, how many unique key values are possible?
► 4
► 8
► 16
► 32
Question No: 22 (
Marks: 1 ) - Please choose one
The key feature of E-Cash Payment system is
__________.
► Simplicity
► Anonymity
► Availability
► Connectivity
Question No: 23 (
Marks: 1 ) - Please choose one
An e-coin consists on ________ elements.
► One
► Two
► Three
► Four
Question No: 24 (
Marks: 1 ) - Please choose one
Web browser and client wallet are installed on __________.
► Client's computer
► Bank's computer
► Merchant's computer
► None of above
Question No: 25 (
Marks: 1 ) - Please choose one
Customers grouped by variables such as social
class, personality or approach to life or lifestyle, is called ___________.
► Demographic Segmentation.
► Geographic Segmentation.
► Psychographic segmentation.
► Behavioral segmentation.
Question No: 26 (
Marks: 1 ) - Please choose one
Data cleaning means ________.
► Adding missing values
► Correction of erroneous values
► Both of above
► None of above
Question No: 27 (
Marks: 1 ) - Please choose one
According toMichael Porter, “process improvement
studies” is an example of Support activities in a strategic business
unit. Identify the area in which this task is performed.
► Design
► Finance and administration
► Human resources
► Technology development
Question No:
28 ( Marks: 1 ) - Please choose one
Law is broadly divided into two classes on the
basis of nature of wrong, namely, ------------ and ---------------
► Civil law and criminal law
► ETO and criminal law
► Supreme and Civil Law
► None
Question No:
29 ( Marks: 1 ) - Please choose one
Civil law deals with the private rights of the
parties, whereas the object of criminal law is to punish the wrong-doer. Is it?
► True
► False
Question No:
30 ( Marks: 1 ) - Please choose one
IP,
RIP, and ARP protocols work on
► Application
layer
► Session
layer
► Network
layer
► Datalink
layer
Question No: 31 (
Marks: 1 )
In Pakistan, which is the apex court? Name only.
Supreme
Court
Question No:
32 ( Marks: 1 )
What was the reason of decline in popularity of
Virtual PIN Payment system?
Some extra
copies of the information items are made in case of a fraud
Question No:
33 ( Marks: 2 )
What do you know about promotion by
"Coupons"?
Coupons are
placed on certain popular sites to attract customers for online shopping
Question No:
34 ( Marks: 2 )
Do you agree that Differentiate a product in
terms of quality of service is one of therole of e-commerce in Competitive Strategy.
Discuss briefly
Ability of an
organization to prosper arises from its competitive advantage over other
organizatio
operating
within its market sector. The strategy of a business to achieve this goal of
competitive advanta
is known as
competitive strategy. Three basic strategies for competitive advantage are as
under:
Cost leadership
Differentiation
Focus
Question No:
35 ( Marks: 3 )
How Technology development is supporting activities in value
Chain.
A value chain
is a way of organizing activities that each strategic business unit undertakes
to design, produce, promote, market, deliver and support the products or
services it sells. Technology
development highly supported the value chain due to the mass changes in the
commercial areas
Question No: 36 (
Marks: 3 )
What is e-business storefront model?
It represents
basic form of e-commerce where buyers and sellers interact directly. Merchants
need to organize online catalog of products, take orders through their
websites, accept payments in a secure environment and send items to the
customers. They can also store and manage customer data in databases.
Question No: 37 (
Marks: 3 )
Which stage of strategic planning cycle put light
on company’s strength and weaknesses? Briefly explain stage.
E-business
competitive strategy is normally formed and implemented according to a planning
cycle which is called strategic planning cycle.
Industry and
Competitive Analysis
Strategy
Formulation
Implementation
Performance
Assessment or Strategy Reassessment
Question No: 38 (
Marks: 5 )
How many types of attacks on Symmetric key algorithm?
Explain each of these.
Following
attacks have been reported on symmetric key algorithms:
Key Search Attacks
Cryptanalysis
System-based Attacks
Question No: 39 (
Marks: 5 )
Write a short note on the following Global legal
issues (Marks: 2.5+2.5=5)
Territorial Jurisdiction
Territorial jurisdiction refers to the competence of a court to decide
a case on the basis of certain geographical area
Online contracts
offer,
acceptance and consideration these three elements must also be present in case
of a valid online contract.
Question No: 40 (
Marks: 10 )
Describe the process of SSL handshake with the help of
diagram?(7+3)
When a client
connects to an SSL server, the SSL handshake begins, which means that the two
negotiate a cipher suite selecting the strongest suite the two have in common.
Thus, the handshake establishes the protocols that will be used during the
communication, selects cryptographic algorithms and authenticates the parties
using digital certificates.
A client sends
a message to the server; the server responds and sends its digital certificate
that authenticates its public key. The client generates a secret symmetric key
for the session. The client encrypts the secret key using the public key that
it has just received and transmits it to the server. The server decrypts the
message using its private key and now has the secret or symmetric key. Further
communication between the customer’s browser and the merchant’s server can now
be encrypted and decrypted using the secret session key.
Question No: 41 (
Marks: 10 )
How SWOT Analysis is helpful in our business development and
strategic decisions? Explain with the help of an example
SWOT
(strengths, weaknesses, opportunities and threats) analysis
In SWOT
analysis, an analyst first looks into the business unit to identify its
strengths and weaknesses then looks into the environment in which the business
operates and identifies opportunities and threats presented by such
environment.
While judging
the strengths of a business, questions can be asked such as what a business
does well. Does it have a sense of purpose and culture to support that purpose?
While judging weaknesses of a business questions can be asked as to what does a
company do poorly? Has it any serious financial liabilities? Has it got the
required skilled manpower? In analyzing opportunities a company can try to find
answers to questions, such as, what is the industry trend? Are there any new
markets to enter? Are there any new technologies to use? In finding threats to
a company’s business it can ask questions as to what things the competitors of
the business doing better? Are there any troublesome changes in company’s
business environment? Are there any new technologies or laws likely to be
introduced that might cause problem to the company?
Example of
Dell
Dell, a famous
computer manufacturing brand, used SWOT analysis in mid 1990s to create a
strong business strategy that made it a successful competitor in its industry
value chain. It found that its strength was to sell directly to customers and
design its computers to reduce manufacturing costs. It also found that it had
no relation with local computer dealers. It faced threats from competitors
which had much stronger brand names/quality at that time. Dell identified an
opportunity by noting that its customers were becoming more knowledgeable about
computers and could specify what they wanted to buy without Dell sales person
helping them or answering their questions to develop configuration for them.
Moreover, it decided to use internet as a potential marketing tool.
The computers
could be built according to the order or specifications of the customers who
could place orders through phone and internet. Thus, it developed a strategy
using its strengths effectively and avoiding reliance on dealer network. Note
that brand and quality threats from competitors were reduced in this case by
Dell’s ability to deliver higher perceived quality of its product in the sense
that each computer could be customized according to the needs/specifications of
the customers.
-------------------------------------------------------------------
1 ( Marks: 1 ) - Please choose one
According to centralized account payment model It
is necessary for both buyer and seller to have their account in the
---------E-bank.
► Same
► Separate
► Any
► partially same
Question No: 2 ( Marks:
1 ) - Please choose one
Click
and Mortar refers to
► Offline business
► Online business
► Engineering
► Building
Question No: 3 ( Marks:
1 ) - Please choose one
Advertising Supported Revenue Model includes
► Yahoo portal
► Employment sites
► Newspaper Publishers
► All of the above
Question No: 4 ( Marks:
1 ) - Please choose one
Fee for Transaction Models include
► Travel Agents and Insurance brokers
► Automobile Sales and event tickets
► Stock
brokers and online banking
► All of the above
Question No: 5 ( Marks:
1 ) - Please choose one
Call handling, sales tracking and Transaction
support(technology / personnel) activities are included in which management
system
► Customer Relationship Management
system
► Public relation
management system
► Inventory management system
► Data Base Management system
Question No: 6 ( Marks:
1 ) - Please choose one
In a Frameset code, do the BODY tags belong
inside or outside of the NOFRAMES tag pair?
► Inside because an HTM Document can only include
one or the other.
► Outside, to be seen by the older browsers [NN
version 1 and IE version 2].
► Outside because the W3C says that to be valid.
► Contain a BODY tags pair.
Question No:
7 ( Marks: 1 ) - Please choose one
XML is a markup language for documents containing
------
► Structured information.
► Unstructured Data
► Text information
► Predefined Tags
Question No:
8 ( Marks: 1 ) - Please choose one
CERT stand for:
► Computer Emergency Response Team
► Computer Efficiency Response Time
► Computer Emergency Real Time
► All of these
Question No: 9 ( Marks:
1 ) - Please choose one
In the digital signature technique, the receiver o f the
message uses ______ to create plaintext.
► His or Her own symmetric key
► His or her own private key
► His or her own public key
► The receiver’s private key
Question No: 10 (
Marks: 1 ) - Please choose one
DSS stands for
► Digital Signature Standards
► Digital Support Standards
► Decision support system
► Digital Sign System
Question No: 11 (
Marks: 1 ) - Please choose one
Which one of the followings is an example of Banner advertising?
► Branding
► Affiliate programs
► Partnership
► All of these
Question No: 12 (
Marks: 1 ) - Please choose one
Meta tag contains:
► User information
► seller information
► web page key information
► bank information
Question No: 13 (
Marks: 1 ) - Please choose one
Exclusive right granted by law to make, use and
sell an invention. What is called?
► Parasites
► Trade mark
► Patent infringement
► Copyright
Question No: 14 (
Marks: 1 ) - Please choose one
A -------------is that sign/symbol that
associates the manufacturer or service provider with the manufactured goods
or services,
► Parasites
► Trade Mark
► Patent infringement
► Cyber squatting
Question No: 15 (
Marks: 1 ) - Please choose one
A firm ‘Glory Enterprise’ and it wants to have
its web site. It also wants to have the word ‘glory’ as a part of its domain
name because for years it has been recognized in the physical world through
this word. However, at the time of registration of its domain name it finds
that a person Mr. ‘A’ who has nothing to do with the business of the firm or
the
word ‘glory’ has already registered a domain name containing this word
as a part of it. Since there cannot be two similar domain names, the firm is
forced to request Mr. ‘A’ to transfer that domain name to it. In response, if
Mr. ‘A’ blackmails or claims ransom from the said firm,
He would be said to have committed -------------.
► Cyber squatting.
► Parasites
► Patent infringement
► Trade mark and domain name conflicts
Question No: 16 (
Marks: 1 ) - Please choose one
A company collecting information assumes that the
customer does not object to a specific use of information unless the customer
specifically denies the permission. Thus, the ompany may use the collected
information for its own purpose, as well as, sell or rent it out to other firms
or persons.
Which of the following Approach it is using?
► Opt-inout
► Swap-out
► Opt-in
► Opt-out
Question No: 17 (
Marks: 1 ) - Please choose one
Idea of Value Chain Model was given by..
► Micheal Porter
► Henry Porter
► Welkin Tin
► Soleman
Question No: 18 (
Marks: 1 ) - Please choose one
Addresses are tied to the device itself and give
no clue to it's location on a global scale. This is the characteristics of
► IP
► RIP
► MAC
► None of the given
Question No: 19 (
Marks: 1 ) - Please choose one
Which of the following is NOT processed on the client side?
► Cookies
► JavaScript
► CGI scripts
► Applets
Question No: 20 (
Marks: 1 ) - Please choose one
Which SQL
statement is used to insert new data in a database?
► ADD NEW
► INSERT NEW
► INSERT INTO
► ADD RECORD
Question No: 21 (
Marks: 1 ) - Please choose one
If a key is 4 bits in length, how many unique key values are possible?
► 4
► 8
► 16
► 32
Question No: 22 (
Marks: 1 ) - Please choose one
The key feature of E-Cash Payment system is
__________.
► Simplicity
► Anonymity
► Availability
► Connectivity
Question No: 23 (
Marks: 1 ) - Please choose one
An e-coin consists on ________ elements.
► One
► Two
► Three
► Four
Question No: 24 (
Marks: 1 ) - Please choose one
Web browser and client wallet are installed on __________.
► Client's computer
► Bank's computer
► Merchant's computer
► None of above
Question No: 25 (
Marks: 1 ) - Please choose one
Customers grouped by variables such as social
class, personality or approach to life or lifestyle, is called ___________.
► Demographic Segmentation.
► Geographic Segmentation.
► Psychographic segmentation.
► Behavioral segmentation.
Question No: 26 (
Marks: 1 ) - Please choose one
Data cleaning means ________.
► Adding missing values
► Correction of erroneous values
► Both of above
► None of above
Question No: 27 (
Marks: 1 ) - Please choose one
According toMichael Porter, “process improvement
studies” is an example of Support activities in a strategic business
unit. Identify the area in which this task is performed.
► Design
► Finance and administration
► Human resources
► Technology development
Question No:
28 ( Marks: 1 ) - Please choose one
Law is broadly divided into two classes on the
basis of nature of wrong, namely, ------------ and ---------------
► Civil law and criminal law
► ETO and criminal law
► Supreme and Civil Law
► None
Question No:
29 ( Marks: 1 ) - Please choose one
Civil law deals with the private rights of the
parties, whereas the object of criminal law is to punish the wrong-doer. Is it?
► True
► False
Question No:
30 ( Marks: 1 ) - Please choose one
IP,
RIP, and ARP protocols work on
► Application
layer
► Session
layer
► Network
layer
► Datalink
layer
Question No: 31 (
Marks: 1 )
In Pakistan, which is the apex court? Name only.
Supreme
Court
Question No:
32 ( Marks: 1 )
What was the reason of decline in popularity of
Virtual PIN Payment system?
Some extra
copies of the information items are made in case of a fraud
Question No:
33 ( Marks: 2 )
What do you know about promotion by
"Coupons"?
Coupons are
placed on certain popular sites to attract customers for online shopping
Question No:
34 ( Marks: 2 )
Do you agree that Differentiate a product in
terms of quality of service is one of therole of e-commerce in Competitive Strategy.
Discuss briefly
Ability of an
organization to prosper arises from its competitive advantage over other
organizatio
operating
within its market sector. The strategy of a business to achieve this goal of
competitive advanta
is known as
competitive strategy. Three basic strategies for competitive advantage are as
under:
Cost leadership
Differentiation
Focus
Question No:
35 ( Marks: 3 )
How Technology development is supporting activities in value
Chain.
A value chain
is a way of organizing activities that each strategic business unit undertakes
to design, produce, promote, market, deliver and support the products or
services it sells. Technology
development highly supported the value chain due to the mass changes in the
commercial areas
Question No: 36 (
Marks: 3 )
What is e-business storefront model?
It represents
basic form of e-commerce where buyers and sellers interact directly. Merchants
need to organize online catalog of products, take orders through their
websites, accept payments in a secure environment and send items to the
customers. They can also store and manage customer data in databases.
Question No: 37 (
Marks: 3 )
Which stage of strategic planning cycle put light
on company’s strength and weaknesses? Briefly explain stage.
E-business
competitive strategy is normally formed and implemented according to a planning
cycle which is called strategic planning cycle.
Industry and
Competitive Analysis
Strategy
Formulation
Implementation
Performance
Assessment or Strategy Reassessment
Question No: 38 (
Marks: 5 )
How many types of attacks on Symmetric key algorithm?
Explain each of these.
Following
attacks have been reported on symmetric key algorithms:
Key Search Attacks
Cryptanalysis
System-based Attacks
Question No: 39 (
Marks: 5 )
Write a short note on the following Global legal
issues (Marks: 2.5+2.5=5)
Territorial Jurisdiction
Territorial jurisdiction refers to the competence of a court to decide
a case on the basis of certain geographical area
Online contracts
offer,
acceptance and consideration these three elements must also be present in case
of a valid online contract.
Question No: 40 (
Marks: 10 )
Describe the process of SSL handshake with the help of
diagram?(7+3)
When a client
connects to an SSL server, the SSL handshake begins, which means that the two
negotiate a cipher suite selecting the strongest suite the two have in common.
Thus, the handshake establishes the protocols that will be used during the
communication, selects cryptographic algorithms and authenticates the parties
using digital certificates.
A client sends
a message to the server; the server responds and sends its digital certificate
that authenticates its public key. The client generates a secret symmetric key
for the session. The client encrypts the secret key using the public key that
it has just received and transmits it to the server. The server decrypts the
message using its private key and now has the secret or symmetric key. Further
communication between the customer’s browser and the merchant’s server can now
be encrypted and decrypted using the secret session key.
Question No: 41 (
Marks: 10 )
How SWOT Analysis is helpful in our business development and
strategic decisions? Explain with the help of an example
SWOT
(strengths, weaknesses, opportunities and threats) analysis
In SWOT
analysis, an analyst first looks into the business unit to identify its
strengths and weaknesses then looks into the environment in which the business
operates and identifies opportunities and threats presented by such
environment.
While judging
the strengths of a business, questions can be asked such as what a business
does well. Does it have a sense of purpose and culture to support that purpose?
While judging weaknesses of a business questions can be asked as to what does a
company do poorly? Has it any serious financial liabilities? Has it got the
required skilled manpower? In analyzing opportunities a company can try to find
answers to questions, such as, what is the industry trend? Are there any new
markets to enter? Are there any new technologies to use? In finding threats to
a company’s business it can ask questions as to what things the competitors of
the business doing better? Are there any troublesome changes in company’s
business environment? Are there any new technologies or laws likely to be
introduced that might cause problem to the company?
Example of
Dell
Dell, a famous
computer manufacturing brand, used SWOT analysis in mid 1990s to create a
strong business strategy that made it a successful competitor in its industry
value chain. It found that its strength was to sell directly to customers and
design its computers to reduce manufacturing costs. It also found that it had
no relation with local computer dealers. It faced threats from competitors
which had much stronger brand names/quality at that time. Dell identified an
opportunity by noting that its customers were becoming more knowledgeable about
computers and could specify what they wanted to buy without Dell sales person
helping them or answering their questions to develop configuration for them.
Moreover, it decided to use internet as a potential marketing tool.
The computers
could be built according to the order or specifications of the customers who
could place orders through phone and internet. Thus, it developed a strategy
using its strengths effectively and avoiding reliance on dealer network. Note
that brand and quality threats from competitors were reduced in this case by
Dell’s ability to deliver higher perceived quality of its product in the sense
that each computer could be customized according to the needs/specifications of
the customers.
-------------------------------------------------------------------
Similar topics
» Jbak taskman - V1.0 Final release
» E590 final solution for pa jumper
» Nokia Maps 2.0_1904 S60v3 final
» VU Online Final Term Papers of 2009
» Final Solution For Z Series Blinkling On Board
» E590 final solution for pa jumper
» Nokia Maps 2.0_1904 S60v3 final
» VU Online Final Term Papers of 2009
» Final Solution For Z Series Blinkling On Board
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum
|
|