meo786
Welcome to meo786
Please Log In and Enjoy with us. I hope you will find more "Fun With Mobile, Computer & Management"

Thanks.

Muhammad Afzal Meo
+092 333 497 62 77

Join the forum, it's quick and easy

meo786
Welcome to meo786
Please Log In and Enjoy with us. I hope you will find more "Fun With Mobile, Computer & Management"

Thanks.

Muhammad Afzal Meo
+092 333 497 62 77
meo786
Would you like to react to this message? Create an account in a few clicks or log in to continue.

IT430- E-Commerce All Quiz 2

Go down

IT430- E-Commerce All Quiz 2 Empty IT430- E-Commerce All Quiz 2

Post by Admin Thu Dec 17, 2009 12:54 pm

In _________key cryptography, everyone has
access to all the public keys

► Public► Private
► Symmetric
► Certified

In given XML code, which of following
element represents the highlighted node.

http://Mr.RiazAamerReminderDon't forget me this weekend!

► Property
► Root► Child
► Nothing

What does DTD stand for?
► Do The Dance.
► Dynamic Type Definition.
► Data Type Definition.► Direct Type Définition.

How do you write a conditional
statement for executing some statements only if "i" is NOT equal to
5?
► if =! 5 then
► if (i != 5)► if <>5
► if (i <> 5)

Border-width: specifies the width of all borders in the order

► ‘border-right-width, border-bottom-width, border-left-width,
border-top-width’
► ‘border-bottom-width, border-left-width, border-top-width, border-right-width’
► ‘border-top-width, border-right-width, border-bottom-width,
border-left-width’
► None of these

Which of these is NOT a stage of knowledge discovery process?



Transformation


Data
mining



Pattern
evaluation



Process
evaluation






For
example, white color denotes purity in Europe and America but is associated
with death and mourning in china and some Asian countries. Similarly, a web
page divided into four segments can be unpleasant to a Japanese visitor because
no. four is a symbol of death in that culture. What type of barrier is this



TRUST


LANGUAGE


CULTURE


INFRASTRUCTURE ISSUES





According
to centralized account payment model It is necessary for both buyer and seller
to have their account in the ---------E-bank.



► Same



Separate



► Any



partially same






In a
Frameset code, do the BODY tags belong inside or outside of the NOFRAMES tag
pair?



► Inside because an HTM
Document can only include one or the other. ???




Outside, to be seen by the older browsers [NN version 1 and IE version 2].




Outside because the W3C says that to be valid.




Contain a BODY tags pair.






XML is
a markup language for documents containing ------



► Structured information.


► Unstructured
Data???



► Text information


► Predefined Tags





CERT
stand for:



► Computer Emergency Response
Team




Computer Efficiency Response Time




Computer Emergency Real Time




All of these



In
the digital signature technique, the receiver o f the message uses ______ to
create plaintext.



► His or Her own symmetric
key



► His or her own private key


► His or her own public key


► The receiver’s private key


DSS
stands for



► Digital Signature Standards


► Digital Support Standards


► Decision support system


► Digital
Sign System



Exclusive
right granted by law to make, use and sell an invention. What is called?




Parasites




Trade mark



► Patent
infringement




Copyright



A
-------------is that sign/symbol that associates the manufacturer or service
provider with the manufactured goods or
services,




Parasites



► Trade Mark


► Patent infringement



Cyber squatting









A firm
‘Glory Enterprise’ and it wants to have its web site. It also wants to have the
word ‘glory’ as a part of its domain name because for years it has been
recognized in the physical world through this word. However, at the time of
registration of its domain name it finds that a person Mr. ‘A’ who has nothing
to do with the business of the firm or the word ‘glory’ has already registered
a domain name containing this word as a part of it. Since there cannot be two
similar domain names, the firm is forced to request Mr. ‘A’ to transfer that
domain name to it. In response, if Mr. ‘A’ blackmails or claims ransom from the
said firm,






He
would be said to have committed -------------.



► Cyber squatting.



Parasites



► Patent infringement



Trade mark and domain name conflicts






A
company collecting information assumes that the customer does not object to a
specific use of information unless the customer specifically denies the
permission. Thus, the company may use the collected information for its own
purpose, as well as, sell or rent it out to other firms or persons.



Which
of the following Approach it is using?




Opt-inout




Swap-out




Opt-in



► Opt-out





Idea of Value Chain Model was
given by..



Micheal Porter


► Henry Porter


► Welkin Tin


► Soleman


Addresses
are tied to the device itself and give no clue to it's location on a global
scale. This is the characteristics of



► IP


► RIP


► MAC


► None of the
given



Which
of the following is NOT processed on the client side?




Cookies




Javascript



► CGI scripts



Applets



Which SQL statement is used to insert new data in a
database?



► ADD
NEW




INSERT NEW



► INSERT INTO


► ADD
RECORD



If a
key is 4 bits in length, how many unique key values are possible?



► 4


► 8


► 16


► 32


The
key feature of E-Cash Payment system is __________.




Simplicity




Anonymity




Availability




Connectivity



An
e-coin consists on ________ elements.



► One


► Two


► Three


► Four


Web browser and client wallet are installed on __________.


► Client's computer



Bank's computer




Merchant's computer



► None
of above






Data
cleaning means ________.




Adding missing values




Correction of erroneous values



► Both of above


► None
of above



According
toMichael Porter, “process improvement studies” is an example of Support
activities
in a strategic business unit. Identify the area in which this
task is performed.



► Design



Finance and administration




Human resources




Technology development



Law is
broadly divided into two classes on the basis of nature of wrong, namely,
------------ and ---------------



► Civil law and
criminal law



► ETO and criminal law


► Supreme and Civil Law


► None


Civil
law deals with the private rights of the parties, whereas the object of
criminal law is to punish the wrong-doer. Is it?



► True


► False


IP,
RIP, and ARP protocols work on




Application layer




Session layer



► Network layer



Datalink layer









In
datalink layer, data packets are placed inside



► Data frames


► Data boxes


► Data streams


► None of these


Which
of these is the correct HTML code for creating a reset button?



value=”reset”>


value=”Clear”>


value=”reset”>









…..tag is used into …….tag because a row contains
multi cells and to fill up these cells with data.






► TD…… TR ??





► TR…… TD





► TD…… TG





► TG…… TR





Which
tag is used for the hidden fields?


















What
is a correct way of referring to a stylesheet called "mystyle.xsl" ?




?>



/>


type="text/xsl" href="mystyle.xsl" />


type="text/xsl" href="mystyle.xsl" ?>





Which
of them is NOT a predefined object?



► Document


► Date


► Loop


► Array





Which
of these is not a comparison operator?



► <


► >


► =


► !=





Var d = new date()


Which of the following is correct about the d
variable?



► instance of new


► instance of Date() method ??


► instance of Date object


► Simple Variable


When you declare a variable
within a function, the variable can only be accessed within that function. When
you exit the function, the variable is destroyed. These variables are called



Local Variables


► Global Variables


► Local and Global


► None of the above





Which of the following , is condition part of
given For loop



for (i = 0; i <= 5; i++).


► i=0.


► i++.


► i<=5.


► (i = 0; i <= 5; i++).


IT430- E-Commerce All Quiz 2 Clip_image002 What is the correct
Javascript syntax to write "Virtual University of Paistan"?






► document.write("Virtual University of Paistan ")


► ("Virtual University of Paistan ")


► " Virtual University of Paistan "


► response.write("Virtual University of Paistan ")








CSS is a breakthrough in Web design because it
allows developers to control the---------







Processing speed on client side



► Data grid view on client side


► Style and layout of home page.


► Style and layout of multiple Web pages





Which HTML tag is used to
define an internal style sheet?





















This is header
1




This is header
2




This is header
3




href="http://www.w3schools.com/default.asp">This is a
link






















10 marks
1. define the steps involve in knowledge discovery
2. what is cyber banking and it's role in e-commerce.

means firts about knowledge discovery and second about cyber banking
5 mars question
advantages and disadvatages of e-cash payment system

QUESTION 01 MARKS



WHAT STANDS FOR WIPO?


QUESTION 01 MARKS


WHERE Meta information is
recorded AND USED? EXPLAIN SHORTLY.



QUESTION 02 MARKS


(I AM NOT SURE ABOUT THE
BELOW STATEMENT WORDING BUT IT RELATED TO)



BRANDING: PERCEIVED VALUE OF
AN ELEMENT



QUESTION 02 MARKS


WHAT ARE BARRIERS IN
ECOMMERCE? JUST NAME THEM.



QUESTION 02 MARKS


WHAT IS MEANT BY “AFFILIATION
BETWEEN TWO PARTIES”.



QUESTION 03 MARKS


WHAT IS E-BUSINESS?
DIFFERENTIATE IT FROM E-COMMERCE WITH EXAMPLE.



QUESTION 05 MARKS


WHAT
ARE THE ADVANTAGES OF E-BANKING? EXPLAIN WITH REAL LIFE EXAMPLE












Question
No: 31 ( Marks: 1 )



In
Pakistan, which is the apex court? Name only.



Supreme
Court



What
was the reason of decline in popularity of Virtual PIN Payment system?



Some
extra copies of the information items are made in case of a fraud



Question
No: 33 ( Marks: 2 )



What
do you know about promotion by "Coupons"?



Coupons
are placed on certain popular sites to attract customers for online shopping



Question
No: 34 ( Marks: 2 )



Do you
agree that Differentiate a product in terms of quality of service is one of therole of e-commerce in Competitive Strategy. Discuss briefly



Ability
of an organization to prosper arises from its competitive advantage over other
organizatio



operating
within its market sector. The strategy of a business to achieve this goal of
competitive advanta



is
known as competitive strategy. Three basic strategies for competitive advantage
are as under:



Cost
leadership



Differentiation



Focus


Question
No: 35 ( Marks: 3 )



How
Technology development is supporting activities in value Chain.



A
value chain is a way of organizing activities that each strategic business unit
undertakes to design, produce, promote, market, deliver and support the
products or services it sells. Technology development highly supported the
value chain due to the mass changes in the commercial areas



Question
No: 36 ( Marks: 3 )



What
is e-business storefront model?



It
represents basic form of e-commerce where buyers and sellers interact directly.
Merchants need to organize online catalog of products, take orders through
their websites, accept payments in a secure environment and send items to the
customers. They can also store and manage customer data in databases.



Question
No: 37 ( Marks: 3 )



Which
stage of strategic planning cycle put light on company’s strength and
weaknesses? Briefly explain stage.



E-business
competitive strategy is normally formed and implemented according to a planning
cycle which is called strategic planning cycle.



Industry
and Competitive Analysis



Strategy
Formulation



Implementation


Performance
Assessment or Strategy Reassessment



Question
No: 38 ( Marks: 5 )



How
many types of attacks on Symmetric key algorithm? Explain each of these.



Following
attacks have been reported on symmetric key algorithms:



Key Search Attacks


Cryptanalysis


System-based Attacks


Question
No: 39 ( Marks: 5 )



Write
a short note on the following Global legal issues (Marks: 2.5+2.5=5)



Territorial Jurisdiction


Territorial jurisdiction refers to the competence of a court
to decide a case on the basis of certain geographical area



Online contracts


offer,
acceptance and consideration these three elements must also be present in case
of a valid online contract.



Question
No: 40 ( Marks: 10 )



Describe
the process of SSL handshake with the help of diagram?(7+3)



When a
client connects to an SSL server, the SSL handshake begins, which means that
the two negotiate a cipher suite selecting the strongest suite the two have in
common. Thus, the handshake establishes the protocols that will be used during
the communication, selects cryptographic algorithms and authenticates the
parties using digital certificates.



A
client sends a message to the server; the server responds and sends its digital
certificate that authenticates its public key. The client generates a secret
symmetric key for the session. The client encrypts the secret key using the
public key that it has just received and transmits it to the server. The server
decrypts the message using its private key and now has the secret or symmetric
key. Further communication between the customer’s browser and the merchant’s
server can now be encrypted and decrypted using the secret session key.



Question
No: 41 ( Marks: 10 )



How
SWOT Analysis is helpful in our business development and strategic decisions? Explain
with the help of an example



SWOT
(strengths, weaknesses, opportunities and threats) analysis



In
SWOT analysis, an analyst first looks into the business unit to identify its
strengths and weaknesses then looks into the environment in which the business
operates and identifies opportunities and threats presented by such
environment.



While
judging the strengths of a business, questions can be asked such as what a
business does well. Does it have a sense of purpose and culture to support that
purpose? While judging weaknesses of a business questions can be asked as to
what does a company do poorly? Has it any serious financial liabilities? Has it
got the required skilled manpower? In analyzing opportunities a company can try
to find answers to questions, such as, what is the industry trend? Are there
any new markets to enter? Are there any new technologies to use? In finding
threats to a company’s business it can ask questions as to what things the
competitors of the business doing better? Are there any troublesome changes in
company’s business environment? Are there any new technologies or laws likely
to be introduced that might cause problem to the company?



Example
of Dell



Dell,
a famous computer manufacturing brand, used SWOT analysis in mid 1990s to
create a strong business strategy that made it a successful competitor in its
industry value chain. It found that its strength was to sell directly to
customers and design its computers to reduce manufacturing costs. It also found
that it had no relation with local computer dealers. It faced threats from
competitors which had much stronger brand names/quality at that time. Dell
identified an opportunity by noting that its customers were becoming more
knowledgeable about computers and could specify what they wanted to buy without
Dell sales person helping them or answering their questions to develop
configuration for them. Moreover, it decided to use internet as a potential
marketing tool.



The
computers could be built according to the order or specifications of the
customers who could place orders through phone and internet. Thus, it developed
a strategy using its strengths effectively and avoiding reliance on dealer
network. Note that brand and quality threats from competitors were reduced in
this case by Dell’s ability to deliver higher perceived quality of its product
in the sense that each computer could be customized according to the
needs/specifications of the customers.












Total
Marks (75)

1. Apriory algorithm is used in_________ (01) + MCQs (30)
2. How anonymity is ensured in e-cash payment system (10)
3. In data mining briefly explain with examples; Clustering and
Characterization (10)
4. Do you think supply chain has taken importance with the improvement in
E-commerce? (02)
5. What is branding, what is key elements of branding. (05)
6. What will be the upstream activities of a milk packing company? (05)
7. Why digital signatures are reliable than paper signatures. (02)
8. What is ERP? Briefly explain it s role in business (03)
9. Write down the approaches to solve the problem of language in web. (03)
10. What type of cryptography is used in electronic checks (01)
11. List Michel Porter’s primary activities to identify customers (02)
12. what do you know about affiliation programs (03)










----------------------------------------------------------------








1. What is SSL (5)

2. what do mean By E-Business (2)

3. Difference between Rational branding and emotional branding. Give solid
Examples of real life. (10)

4. write a note on knowledge discovery.(Data Mining)… (10)

5. What is primary and support activities. (3)

6. Write a note on Porter’s Model. (5)

7. Write cultural issues on international E-Commerce. (3)

8. Generally, the protection under “fair use” may be sought. Don’t need to
explain. (Lec.44) ……. (2)

9. 4 to 6 MCQ’s was came from the MCQ’s which is given in u’r website thanks
for it Dear.

10. electronic catalogue is better than paper catalogue (True or False…….???)
(1)

11. 1 mcq from adv. And disadv. Of paper and electric catalogue. (1)

12. what is length in bits of message digest…. ?? (1)

13. VAN maintain two files for each user …. Postbox and Mailbox, sandbox, and
getbox, inbox, and outbox…. ??? (1)

14. internal activities relates to manufacturing and packaging of good…… (True
or False….???) (1)

15. internal activities relates to (1.manufacturing and packaging, 2. ……….,
3…………, 4………., (1)

--------------------------------------------------
data warehousing and y it important for organizations 10 marrks
public and private key generated and RSA algorithm with example 10

marks
In Pakistan, which is the apex court? Name only 1mark
major drawbacks of SSL 5marks
ETO 2002 sec 15 1marks
role of e-commerce in Competitive Strategy 3 marks
e business 5 marks
virtual PIN 1marks
What is e-business storefront model? 5 marks












Question
No: 17 ( Marks: 1 )
Do you agree or not that in In Java script we are not provided with certain
already defined objects which are ready to use? justify

ANSWER:

Yes, There are not already defined objects in Java script. We make our own
objects and set their properties ourself.

Question No: 18 ( Marks: 1 )
Do you agree or not that ‘Target’ attribute can not be used to display result
in a given frame? justify.

ANSWER:I am Disagree, ‘Target’ attribute can display result in given frame, like:
Suppose there is a frame named ‘framename’ then
http://www.blogger.com/%3Ca
target=”framename”> Virtual University

Question No: 19 ( Marks: 2 )
What value will be printed after executing the following statement in
Javascript:

document.write( Math.pow(3, 2) );

ANSWER:
9

Question No: 20 ( Marks: 3 )
Discuss the role and responsibilities of “Session layer” in OSI model?

ANSWER:
Session layer provides instructions about the nature of communication link
between the sending and receiving machine during a session. A combination of
protocols called Session protocol Data Units work at this layer. Three modes of
communication are simplex, half-duplex and full-duplex. Simplex means
communication in one direction only. Half-duplex means communication in two
directions but one party can send data at a time. Full-duplex means
communication in two directions while both parties are able to send data
simultaneously. It also places special checkpoints on data packets to trace any
lost packets.

Question No: 21 ( Marks: 5 )
If we are going to develop an IT department of an organization, which topology
will suit us more to rely upon and to run the system successfully.

ANSWER:
Star networks are one of the most common computer network topologies. In its
simplest form, a star network consists of one central switch, hub or computer,
which acts as a conduit to transmit messages.
The star topology reduces the chance of network failure by connecting all of
the systems to a central node. When applied to a bus-based network, this
central hub rebroadcasts all transmissions received from any peripheral node to
all peripheral nodes on the network, sometimes including the originating node.
All peripheral nodes may thus communicate with all others by transmitting to,
and receiving from, the central node only. The failure of a transmission line
linking any peripheral node to the central node will result in the isolation of
that peripheral node from all others, but the rest of the systems will be
unaffected.


Question No: 22 ( Marks: 10 )
What is the usage of “NAME” attribute in different contents of a form? Can we
create form fields without name attribute? Elaborate advantage and disadvantage
of using name attribute in context of client and server communication. 3 + 2 +
5

ANSWER:
USAGE OF NAME ATTRIBUTE:
‘Name’ attribute is used to give special identification to objects used in
form. It is much important when using any script with html or working with that
objects. Other than using name attribute, we can’t work with objects in the
form.
Yes, we can create form fields without name attribute, but it is essential when
we have to work over the objects.

ADVANTAGES:
Without Name attribute we can’t work over the objects.
By naming any field we can use objects for further information like using in
java scripts.

DISADVANTAGE:
It makes the code complicated.
When not working over the objects, they are useless.

OTHER PAPER:

i:There is average performance
ii:There is nill performance
iii:The value variable is 75
iv:the value of variable is 100
(10)
Q3:What are child element tags in xml(3)
Q4:In http,what do u mean by server breaks the connection(2)
Q5:What are relational tables(2)

OTHER PAPER:
1. Difference between margin and position in CSS. explain with examples of
tags. (10)
2. Diffrent types of firewalls with explanation. (5)
3. Write about servlets? (2)
4. Write about SLD. (1)
5. Write about statelessness in HTTP. (1)

OTHER PAPER:
1. Two methods to maintain in statelessness.
2. write about 3 out side attacks.
3. Difference between JPG and GIF.
4. Define Proxy and its 3 uses.

other paper
Total Marks = 38
Total # of questions = 22
MCQ's = 16
Q 17. When there is written Scrolling=yes then what happens? (Mark 1)
Q18. How SMTP protocol works at TCP/IP stake? (Mark 1)
Q19: What is mean by str and my array in given code? (Mark2)
Q20.Write a simple HTML code for the background colour is green, text colour is
white, and
link colour is blue.(Marks 3)
Q21. What is digital certificate? Digital certificates are composed of what?
Why the concept
of Certification Authority is used? (Marks 5)
Q22. Write any three outside attacks breifly? (Marks 10)

Admin
Administrator

Number of posts : 8137
Age : 50
Location : Sharqi Abadi Mustafabad Kasur
Job/hobbies : Do more for other
Mode (i.e. cool, angry etc) : Serious
Warining :
IT430- E-Commerce All Quiz 2 Left_bar_bleue0 / 1000 / 100IT430- E-Commerce All Quiz 2 Right_bar_bleue

Rate by Admin :
IT430- E-Commerce All Quiz 2 Left_bar_bleue0 / 1000 / 100IT430- E-Commerce All Quiz 2 Right_bar_bleue

Reputation : 22
Registration date : 2007-10-23

https://meo786.forumotion.com

Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum