You are on page 1of 636

IT430- E-Commerce Composed By Faheem Saqib A Mega File for Current Quizzes For more Help Rep At Faheem_saqib2003@yahoo.

com Faheem.saqib2003@gmail.com

0334-6034849--0315-5502544
IT430 Final 2010 Solved with ref

Question No: 1

( Marks: 1 )

- Please choose one

In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last withdrawals to the E-bank. 10 12 18 16 P:119 Lost Coins In case network fails or computer crashes during payment transaction, coins might be lost. All signed blinded coins from last 16 withdrawals are sent by the bank to the client. Client uses the blinding factor

Question No: 2

( Marks: 1 )

- Please choose one

Which entity does not include in SET(secure Electronic Transaction)? Seller Buyer Payment gateway Bank P:122 There are four entities involved in a SET transaction cardholder, Merchant and certification authority and payment gateway. Question No: 3 ( Marks: 1 ) - Please choose one

Traditionally Marketer use the market segmentation(s) like Geo-graphic Segmentation Demographic Segmentation Psychographic Segmentation All of the above P:131 Traditionally, marketers have used three types of variables to define three different market segmentations, namely, geographic segmentation, demographic segmentation and psychographic segmentation.

Question No: 4 Class C has:

( Marks: 1 )

- Please choose one

Network 01 byte and 03 hosts Network 02 bytes and 02 hosts Network 03 bytes and 01 host P:10

None of these In class C, first three bytes refer to the network address and the last byte to the host

machines on that network, which would therefore be a very small network.

Question No: 5

( Marks: 1 )

- Please choose one

In ring topology, failure of network cable will only take down one computers network access. True False

Question No: 6

( Marks: 1 )

- Please choose one

Which device uses the IP address Switch Router P:16 A router is a decision making device. When a data packet arrives at a router it reads the network addresses from the IP address on the data packet and determines the shortest possible path through which this packet can be delivered to its destination. Repeater None of these

Question No: 7

( Marks: 1 )

- Please choose one

What is the correct HTML for inserting an image? <image src="image.gif"> <img src="image.gif"> P:21 <HTML> <BODY> <HI>On Sale Cassettes</H1> <Img Src=cassette.gif> </Body></HTML> <img href="image.gif>

<img>image.gif</img>

Question No: 8

( Marks: 1 )

- Please choose one

Cryptographic Algorithms are measured in terms of Key length P:108

Cryptographic algorithms are measured in terms of key length. Complexity Simplicity All of the above Question No: 9 ( Marks: 1 ) - Please choose one

Upstream activities relate to? Materials/services or the input from suppliers P:155 Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities. Upstream activities relate to materials/services or the input from suppliers Internal activities relate to manufacturing and packaging of goods

Downstream activities relate to distribution and sale of goods to distributors/customers Manufacturing and packaging of goods Distribution and sale of goods to distributors/customers Input from suppliers and Distribution

Question No: 10

( Marks: 1 )

- Please choose one

Television, radio and print media are in a (n) . Mode.

Passive P:139 Emotional branding vs. rational branding In case of television, radio or print media people are normally in a passive mode. To a greater extent they do not control the communication channel and thus have to listen or view the advertisement about a brand. Active Static Dynamic

Question No: 11

( Marks: 1 )

- Please choose one

Which of the following Barriers to International E-Commerce? Advertising Patents Infrastructure P:161 Barriers to International e-commerce Barriers to international ecommerce include lack of trust, lack of infrastructure, language and culture. Capital

Question No: 12

( Marks: 1 )

- Please choose one

Exclusive right granted by law to make, use and sell an invention. What is called? Parasites Trade mark Patent infringement P:181

Patent infringement A patent is an exclusive right granted by law to make, use and sell an invention. In order to be patentable, the invention must be unique, genuine, and useful according to the prevalent technological standards. Copyright

Question No: 13

( Marks: 1 )

- Please choose one

Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act. Which legal issue arises due to such acts? Cyber Crimes Online Defamation P:182 Online Defamation A defamatory statement is a false statement that injures the reputation of on another person or company. If a statement injures the reputation of a product or service instead of a person, it is called product disparagement. Cyber squatting None

Question No: 14

( Marks: 1 )

- Please choose one

Characterization and Clustering belong to which of the following types of Data Mining? Additive Predictive Selective

Descriptive P:141 Types of Data Mining There are four main types of data mining as follows: Classification Association Characterization Clustering

Classification and association are predictive types of data mining while characterization and clustering represent the descriptive type.

Question No: 15

( Marks: 1 )

- Please choose one

EDI stands for.. Electronic Digital Information Electronic Data Integration Electronic Data Interchange P:147 Lesson 36 ELECTRONIC DATA INTERCHANGE (EDI) All of these

Question No: 16

( Marks: 1 )

- Please choose one

Implementing Value Chain model can help us to Reduce cost Improve quality of products Create new ways of selling products

All of these. P:153 Examining value chains one finds that EC can help in four different ways as follows: It can reduce costs of a business; It can improve quality of products It can help in reaching new customers or suppliers; It can create new ways of selling products.

Question No: 17

( Marks: 1 )

- Please choose one

Following are malicious programs EXCEPT ----------------- . Back doors Trojan Horses Firewalls P:96 Lesson 21 FIREWALLS A firewall is a combination of hardware and software that sits between the internet and internal network of an organization to protect the network from outside attack (Fig. 1). It can examine the data entering or leaving from the network and can filter the data according to certain rules, thus, protects the network from an attack. Worms

Question No: 18

( Marks: 1 )

- Please choose one

Which of the following is a valid variable name? 6th_student_CGPA first_student_CGPA P:54

Rules for variables Variable names can begin with an uppercase letter (A-Z), lower case letter (a-z), an underscore character (_), or dollar sign ($). Remaining characters can be any of the above or from digits (0-9). In JavaScript variables are case sensitive. last student CGPA *any_student_CGPA

Question No: 19

( Marks: 1 )

- Please choose one

Which of the following payment mode does not require customer to pay interest to the bank on each transaction? Credit card Debit card P:110 Note that in case of a credit card the issuer bank charges interest from the client at a specified rate on the amount lent. On the other hand, in case of a debit card no such interest is payable since the customer uses his/her own money in that case. Electronic check All of the above

Question No: 20

( Marks: 1 )

- Please choose one

FVIPSS stands for _________. First Virtual Internet Payment System Server P:110 First Virtual InternePayment System Server First Virtual International Payment System Server First Virtual International Payment System Services

First Virtual Internal Payment System Services

Question No: 21

( Marks: 1 )

- Please choose one

Which e-business helps to improve policies, procedures, customer services, and general operations of other businesses? Online shopping malls. Selling intellectual property online. Online service providers. P:129 Online Service Providers These e-businesses help improve policies, procedures, customer service and general operations of other businesses. They can provide consultancy / professional services, for example, web site development services, online legal consultancy services etc. Online automotive sites and energy online. Question No: 22 ( Marks: 1 ) - Please choose one

Which of the following is NOT an identified behavioral mode of customers on the web? Browsers Buyers Shoppers Seller

Behavioral segmentation

Creation of separate experiences for customers based on their behavior is called Three identified behavioral modes of the customers on the web are: Browsers customers who just browse through the site with no intention of buying Buyers customers who are ready to buy right away

Shoppers customers who are motivated to buy but want more information Question No: 23 ( Marks: 1 ) - Please choose one

Downstream activities relate to distribution and sale of goods to distributors/customers True P:155 Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities. Upstream activities relate to materials/services or the input from suppliers Internal activities relate to manufacturing and packaging of goods

Downstream activities relate to distribution and sale of goods to distributors/customers False

Question No: 24

( Marks: 1 )

- Please choose one

Online banking is a substitute of tradition banking. Is it? True False

Question No: 25

( Marks: 1 )

- Please choose one

-------------means services in relation to the transformation of contents of an electronic Document from its original form to one that cannot be understood or decoded by any unauthorized person Cryptography services P:163 Cryptography services means services in relation to the transformation of contents of an electronic document from its original form to one that cannot be understood or decoded by any unauthorized person. Accredited Certification Service Provider Originator Addressee

Question No: 26

( Marks: 1 )

- Please choose one

Law is broadly divided into two classes on the basis of nature of wrong, namely, ------------ and -------------- Civil law and criminal law P:176 Law is broadly divided into two classes on the basis of nature of wrong, namely, civil law and criminal law. Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Civil wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general. ETO and criminal law Supreme and Civil Law None

Question No: 27

( Marks: 1 )

- Please choose one

Each layer except has got a header. Physical layer P:05 Header is a piece of information which is attached to the data at its beginning by each layer except the physical layer. The process of moving the data down the OSI Protocol. Datalink layer Session layer Network layer

Question No: 28

( Marks: 1 )

- Please choose one

Symmetric algorithms are faster than asymmetric? true P:105 The advantage of using symmetric key is that since symmetric algorithms are faster as compared to asymmetric, therefore, the encryption of a message with the symmetric key takes place quickly. false

Question No: 29

( Marks: 1 )

- Please choose one

SET was developed in _____. 1996 1997 P:122 Secure Electronic Transaction (SET) The drawback in SSL that the credit card/debit card information remains with the merchant led to the development of a more sophisticated protocol called SET. It was developed in 1997 jointly by Visa, MasterCard, Netscape and Microsoft.

1998 1999

Question No: 30

( Marks: 1 )

- Please choose one

LDA stands for _______ Lahore Development Authority P:165 A statutory body is a body/organization established under some statute/law. For example, the Lahore Development Authority (LDA) is a statutory body established under the Lahore Development Act, 1975 (a provincial statute). Lahore Development Act Question No: 31 ( Marks: 2 )

What is Data Mining? P: 140 Data Mining Data Mining can be defined as the task of discovering interesting patterns from large amounts of data, where the data can be stored in databases, data warehouses, or other information repositories. Data mining has a lot of business application in todays world. We can identify the behavior of our customers and can effectively target them with personalized messages using data mining techniques. Assume that there is a shopping store where the data/information about customers has been recorded /stored over a period of time. Using a data mining technique on the customers data, certain pattern can be generated that can provide useful information. For example, this pattern may tell us that people having a certain demographic profile (age over 20 years and sex male) coming from a particular location have shown inclination to buy computer related items. It is an interesting clue for the marketers.

Question No: (Marks: 2 ) What is the purpose of FRAMESET tag? P: 31 <Frameset> and <Frame> are the two basic tags. This concept uses two different types of pages Frameset page and content pages. Frameset page divides the browser window into a set of frames and defines the size of each frame. It also specifies which content pages are displayed in which frame. It has nobody section (no body tag). Content pages are just regular HTML pages.

Question No: 33

(Marks: 2 )

What do we mean by "Free-Trial" promotion technique? P: 133 Promotions E-business promotions can attract visitors to your site and induce them to purchase. Promotional messages can be sent both online and offline. Free-trials Customers can sign up for a free service. For example, they can be allowed to download software for certain days free of cost on trial basis before buying it.

Question No: 34

(Marks: 2 )

What is UNCITRAL? Most of the countries have, by now, made laws providing recognition to electronic documents an electronic signature. They have basically followed a model law on ecommerce proposed by a U.N. body called UNCITRAL (United Nations Commission on International Trade Law) in 1996. On analysis, appears that ETO has certain deficiencies. For instance, difference between an electronic signature and an advanced electronic signature is not clear. Sections dealing with the offences of violation of information a privacy and damage to information /informational systems are too broadly worded, which may lead to confusion. International aspects of e-commerce such as recognition of the foreign certificates and electronic signatures etc. are missing.

Question No: 35

(Marks: 3 )

Write precisely about the 4th stage of planning cycle? P:159 Strategic Planning Cycle E-business competitive strategy is normally formed and implemented according to a planning cycle which is called strategic planning cycle. There are four stages in this planning cycle 1. Industry and Competitive Analysis Strategy 2. Formulation 3. Implementation 4. Performance Assessment or Strategy Reassessment The 4th stage is Performance Assessment or Strategy Reassessment Strategy assessment: Results of implementation plan are monitored and assessed so that any corrective measures or expansion plan can take place. Basically, you want to assess whether your strategy has delivered what it was supposed to deliver; whether your strategy is still viable/workable in the ever changing environment. In strategy assessment phase, you can learn from your mistakes and do your future planning. In case your EC project has been a failure, you can identity the problems and try to remove them. Some of the corrective measures can be to property train your web team, establish or review your security or privacy policy, review or reassess your web design content, reconsider your marketing plan etc. For the strategy assessment, you can conduct surveys, collect information and receive feedback from different groups of people so that you have solid input from people coming from a variety of background. Sometimes, you have to entirety give up a particular strategy you followed and formulate a new strategy or set of strategies in light of the companys main objective or its mission.

Question No: 36

(Marks: 3 )

Discuss the role and responsibilities of Transport layer in OSI model? Transport layer TCP (Transmission Control Protocol) or UDP (User Datagram Protocol) operate at this layer. It has two functions. It converts the data into data packets. Secondly, it is

responsible for flow control of data. TCP is more reliable as it is acknowledgment based as opposed to UDP which does not use any system of acknowledgment for the delivery of data packets.

Question No: 37 (Marks: 3 ) How lack of trust barrier can be overcome or minimized? Discuss it briefly Lack of Trust It is very important for online businesses to establish trusting relationships with their customers like in the physical world where companies ensure that customers know who they are. However, it is difficult to build trust because a kind of anonymity exists for companies trying to establish web presence. Lack of trust barrier can be overcome or minimized:

A plan for establishing credibility of an online business is extremely crucial for its success. In this behalf, attention to the needs of the site visitors is very important while designing the web site, since it can be helpful in building trust with customers. For instance, there should be easy to find web pages that answer questions of the visitors. Note that companies with established brands can build trust for online business more quickly as compared to a new company/business without reputation, since a brand conveys expectations about how the online business would behave. For example, how the seller online business would react to a claim of refund by the customer. Question No: 38 (Marks: 3 ) Write the names of companies who were helper in developing Secure Electronic Transaction. Secure Electronic Transaction. (SET) It was developed in 1997 jointly by Visa, MasterCard, Netscape and Microsoft.

Question No: 39

(Marks: 5 )

Differentiate between Cyber squatting and concurrent use with example. P: 181 Cyber squatting The act of intentionally registering domain names containing trademarks/trade names of prominent companies to later blackmail or demand ransom from those companies is called cyber squatting. Example: Assume there is a firm Glory Enterprise and it wants to have its web site. It also wants to have the word glory as a part of its domain name because for years it has been recognized in the physical world through this word. However, at the time of registration of its domain name it finds that a person Mr. A who has nothing to do with the business of the firm or the word glory has already registered a domain name containing this word as a part of it. Since there cannot be two similar domain names, the firm is forced to request Mr. A to transfer that domain name to it. In response, if Mr. A blackmails or claims ransom from the said firm, he would be said to have committed cyber squatting. Concurrent use This problem arises when two organizations have apparently legitimate claim to use the same domain name but cannot do so due to the uniqueness of domain names. Example: Suppose, there is a company manufacturing electronic goods and another company selling French fries. Under the traditional trade mark law both these companies can have the same trade mark/trade name such as frys. The problem arises when both apply for the registration of a domain name containing the word frys. Here, both are legitimate claimants of this domain name but due to the element of uniqueness of domain names only one of them can be assigned the desired domain name. Question No: 40 (Marks: 5 )

Explain Confidence and Support as two measures of Association? P: 144

CONFIDENCE AND SUPPORT There are two terms/measures used in association, that is, support and confidence. Confidence is a measure of how often the relationship holds true e.g, what percentage of time did people who bought milk also bought eggs. Support means what is the percentage of two items occurring together overall. Mathematically, they can be expressed as follows if we take the example of eggs and milk: Confidence = Transactions (eggs + milk) Transactions (eggs or milk or both) In case no. of transactions involving eggs and milk are 25 and those involving eggs or milk or both are 75 then confidence is 25/75*100=33.3% Support = Transactions (eggs + milk)

Total no. of transactions In case no. of transactions involving eggs and milk are 10 and total no. of transactions in a day is 50 then support is 10/50*100 = 20% Suppose if confidence is 90% but the support is 5%., then we can gather from this that the two items have very strong affinity or relationship with each other such that when an item is sold the other is sold together, However, the chance of this pair being purchased out of the total no. of transactions is very slim, just 5%. One can adjust these measures to discover items having corresponding level of association and accordingly set marketing strategy. So, if I feed the data to the association mining tool and specify the percentage of confidence and support, it will list down the items that have association

corresponding to these percentages. Results of association mining are shown with the help of double arrows as indicated below: Bread ---- Butter Computer ---- Furniture Clothes ---- Shoes Using the result of association mining, a marketer can take a number of useful steps to set or modify marketing strategy. For example, items that have closeness/affinity with each other can be shelved together to improve customer service. Certain promotional schemes can be introduced in view of the association mining result etc.
FINALTERM EXAMINATION Fall 2009 IT430- E-Commerce

Question No: 1 ( Marks: 1 ) - Please choose one In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last withdrawals to the E-bank.

10 Correct 12 18 16

Question No: 2

( Marks: 1 )

- Please choose one

In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT included:

Buyer Accounts identifier

Buyer password Correct

Address of Merchant

Actual amount of money in favor of merchant

Question No: 3

( Marks: 1 )

- Please choose one

Which 5th P introduced by E-business in Marketing Mix? Proper coverage

Personalized Services Correct

Proper access

Personal style

Question No: 4

( Marks: 1 )

- Please choose one

Creation of separate experiences for customers based on their behavior is called

Demographic segmentation

Behavioral segmentation Correct

Geo-Graphic Segmentation

None of the above

Question No: 5

( Marks: 1 )

- Please choose one

Call handling, sales tracking and Transaction support(technology / personnel) activities are included in which management system

Customer Relationship Management system

Public relation management system

Inventory management system Correct

Data Base Management system

Question No: 6

( Marks: 1 )

- Please choose one

Network addresses 128--- 191 range belongs to which of the following class networks?

B C Correct E

Question No: 7

( Marks: 1 )

- Please choose one

What is the correct HTML for making a text input field?

<textinput type="text"> <input type="text"> <input type="textfield"> Correct <textfield>

Question No: 8

( Marks: 1 )

- Please choose one

What is the correct HTML for making a hyperlink?

<a href="http://www.w3schools.com">W3Schools</a> <a name="http://www.w3schools.com">W3Schools.com</a> Correct <a url="http://www.w3schools.com">W3Schools.com</a> <a>http://www.w3schools.com</a>

Question No: 9 ( Marks: 1 ) - Please choose one

DOS is a type of attack and it stands for: Denial of Services Correct Digital Operation Services

Dynamic Object Solution All of these

Question No: 10

( Marks: 1 )

- Please choose one

An electronic check contains a(n) to the payers bank to make a specified payment to the payee Serial#

Private key Instruction All of the above Correct

Question No: 11

( Marks: 1 )

- Please choose one

What is a E-Cash wallet ?

Hardware Agent Software All of the above Correct

Question No: 12

( Marks: 1 )

- Please choose one

Internal activities relate to?

Materials/services or the input from suppliers

Manufacturing and packaging of goods Correct

Distribution and sale of goods to distributors/customers

Input from suppliers and Manufacturing

Question No: 13

( Marks: 1 )

- Please choose one

Customer data can be gathered and analyzing it customers can be served in a better Manner according to their needs, Which is best option?

Customization

Customer orientation

Customer satisfaction

Focus Correct

Question No: 14

( Marks: 1 )

- Please choose one

Popular software packages for personal finance is(are): Quicken

MS Money Money 2003 All of these Correct

Question No: 15

( Marks: 1 )

- Please choose one An

array can contain ----------. only text only numbers only numbers or text Correct any valid variable

Question No: 16

( Marks: 1 )

- Please choose one You

define a method using obj.method Correct obj.method[] obj.method() obj-method

Question No: 17

( Marks: 1 )

- Please choose one

Which of them is NOT an attribute of border? border-width border-style border-pattern Correct border-bottom-color

Question No: 18

( Marks: 1 )

- Please choose one If a

key is 4 bits in length, how many unique key values are possible? 4 8 16 Correct 32

Question No: 19

( Marks: 1 )

- Please choose one PKI

stands for ___________. Public Key Instrument Public Key Information Public Key Instruction Public Key Infrastructure Correct

Question No: 20

( Marks: 1 )

- Please choose one

Which of the following payment system does not involve the use of encryption? Electronic check Electronic cash Virtual PIN None of above Correct

Question No: 21

( Marks: 1 )

- Please choose one

ACH is a centralized system used by electronically inter-connected banks for clearing payment requests.

True Correct False

Question No: 22

( Marks: 1 )

- Please choose one

Cyber wallet can automatically assemble the correct payment and pay it too. True Correct False

Question No: 23

( Marks: 1 )

- Please choose one In E-

Cash Payment system, merchant deposits the coins in the bank to check the ______ of coins.

Number Validity Correct Private key Sender

Question No: 24

( Marks: 1 )

- Please choose one SET

transactions are slower than SSL. True Correct False

Question No: 25

( Marks: 1 )

- Please choose one

Which of the following is an advantage of electronic catalogue? Large fix cost if used for small no. of products. Ability of updating product information. Correct Need for customer skill of computers and browsers. Difficult to develop catalogue.

Question No: 26

( Marks: 1 )

- Please choose one

Suppose you are running a business. You want to target customers of age less than 30 years. Which type of segmentation would you use? Demographic Segmentation Correct Geographic Segmentation Psychographic segmentation Behavioral segmentation

Question No: 27

( Marks: 1 )

- Please choose one

Data cleaning means ________. Adding missing values Correction of erroneous values Both of above Correct None of above

Question No: 28

( Marks: 1 )

- Please choose one

Online banking is a substitute of tradition banking. Is it? True

False Correct

Question No: 29

( Marks: 1 )

- Please choose one

IT/EC can reduce the overall ------------- and afford to keep the price of the product relatively low Production cost Correct

Marketing cost

Distribution cost

None

Question No: 30

( Marks: 1 )

- Please choose one

Which organization is used to supervise the task of registration of domain names worldwide?

ICCAN

ICAAN Correct

IICAN

None of the given

Question No: 31

( Marks: 1 )

What stands for CRM?

Ans:

CUSTOMER RELATIONSHIP MANAGEMENT (CRM)

Question No: 32 ( Marks: 1 ) Here is an e-coin minted by the bank with 2 dollar key.

( Serial #.r e 2 ) d 2 (mod m ) = Serial # d 2 .r e 2 d 2 (mod m )


If the bank had signed the same coin with 3 dollar key, what would be the resulting e-coin?

Question No: 33 ( Marks: 2 )

Briefly describe analytical attack on public key algorithms.

Analytical Attacks

These attacks are some fundamental flaws in the mathematical problems on which the encryption system itself is based.

A branch, Quantum computing is the branch of computer science that deals with the development of cryptographic algorithms. It can also be used to find flaws in the cryptographic system/algorithms and to launch attacks.

Question No: 34 ( Marks: 2 ) Do you agree that Differentiate a product in terms of quality of service is one of the role of e-commerce in Competitive Strategy. Discuss briefly

Question No: 35 ( Marks: 3 )

Digital signatures are considered more reliable than paper signatures. Do you agree with this statement? Briefly justify your answer. 1+2

Ans:

Yes, digital signature is more reliable than paper signature. Because digital signature contain more information than paper.

Question No: 36 ( Marks: 3 )

What is clustering? Briefly explain with help of example.

1+2

This is a group of data objects that are similar to another within the same cluster and are dissimilar to the objects in other clusters. For example, web usage of different categories or list of email addresses in data base.

Question No: 37

( Marks: 3 )

Point out the certain deficiencies in ETO?

ETO stands for Electronic Transactions Ordinance

Question No: 38

( Marks: 5 )

Explain the advantages of E-business regarding todays scenario.

Advantages of E-business

Personalized service

Product, place, price and promotion are generally recognized as the 4 Ps of marketing in relation to Traditional offline businesses. However, personalization is the 5th P added to the other 4 Ps when we are discussing about an e-business. By using internet data we can gather information for database and make personalized data for services.

High-quality customer service

By getting online suggestion we can improve our quality.

No inventory cost

In such there is no warehouse is required therefore inventory cost is very low. Because we take order from client and fulfill it by procuring from open market.

Worldwide reach of your business

An online business can work anywhere in world. This is a good concept of Global business. Electronic catalogues

Electronic cards and catalogues are used to enhance the procedure for customers. Therefore, online shopping can be done more quickly and in a more convenient environment.

Question No: 39

( Marks: 5 ) List

down three Supporting activities with examples as discussed by Michael Porter in a strategic business unit.

Ans;

1- Human Resource This is referred to activities that are coordination of management employees e.g. staffing, compensation and benefits. 2- Financial And Administration- It is relating to paying bills, accounting. 3- Technology Department It is used for improvement of product and services for best selling the product. E.g. improvement of field tests, process improvement studies.

Question No: 40 ( Marks: 10 )

How anonymity is ensured in E-Cash payment system? Explain with the help of examples.

Ans:

In E cash payment system, anonymity means that the identity of client or customer will not be disclosed.

In this payment mechanism, there are two stages,

1- Minting Stage 2- Deposit Stage 1- At minting stage e- cash bank signed the serial no. to provide the third part of valid coin. But at this stage bank actually knows that who are amongst its different account holders whose are requesting for the banks signature on the serial no, but it does not mean that it knows the serial no, it is just a blinding factor due to signing.

2- This is reverse to minting stage. In this case we sent the coins toe- cash bank to check the validity. In this case bank know the serial no. but this time doesnt know the client who sent these for payment purpose. Because the bank may have issued the coins to many clients and bank at deposit stage doesnt know who did shopping and making payment now. So, the relationship between the client and the serial no. is broken at the minting and deposit stage to ensure anonymity of the client.

So if we summarize it then as follows

Minting Stage

Serial number is unknown

Client is known

Deposit Stage

Serial no. is known

Client is unknown

------------------------------------------------------------------------------------------------

Question No: 41

( Marks: 10 )

Differentiate between the centralized electronic payment system and electronic checks.

Centralized Electronic Payment System

Electronic Check

In an electronic check, information contains are that instruction to the payer bank to make a specific payment to payee.

This concept is launched by Financial Services Technology Consortium (FSTC). It is a group of US banks.

In this system two types of cryptography are used

1- Symmetric 2- Asymmetric Certificates are issued to both parties in standard format by their respective banks and these are issued to check the digital signature on the check. These certificates may have some restrictions on the certificates like, max check value, or currencies allowed etc.

This check book device is a combination of hardware and software. In hardware a smart card may be used. It is like s credit cad. Certain information are provided on the card and one secrete key is also issued.

Centralized Electronic Payment System

This is a popular payment system on the internet. In this both the payer and the payee hold accounts at the same centralized on-line financial institution. Many payment systems use this approach e.g., PayPal, E-gold, Billpoint, Cybergold, Yahoo! Pay Direct, Amazon.com Payments etc

On-line opening/ of ones account is done in a centralized bank using credit/debit card. To make payment an account holder is authenticated using an account identifier and a password, account identifier of the payee and the payment amount.

In this system, payee is notified by their account statement y phone sms or email. The centralized bank charges a transaction fees either from the payer, or payee or both on funding an account or withdrawing funds from an account or receiving payments by the payee. This payment model requires that all participants must have their account with the same central payment system/bank. Note that the payee can eventually withdraw the money received in hi account in the centralized bank through Automated Clearing House (ACH).

IT430 Final 2010


Question No: 1 ( Marks: 1 ) - Please choose one In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last withdrawals to the E-bank. 10 12 18 16 Ref: Page # 119 Lost Coins In case network fails or computer crashes during payment transaction, coins might be lost. All signed blinded coins from last 16 withdrawals are sent by the bank to the client

Question No: 2

( Marks: 1 )

- Please choose one

www.amzon.com as you all familiar with it.


Which of the following loyalty stages its customers are: ( Who dont know about it): Detail about amzon.com)

"Amazon was one of the first major companies to sell goods by Internet, and was an iconic "stock in which to invest" of the late 1990s dot-com bubble. Jeff Bezos founded Amazon.com, Inc. in 1994, and launched it online in 1995. Amazon.com started as an on-line bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3 format, computer software, , etc. Amazon has established separate websites in Canada, the United Kingdom, Germany, France, China, and Japan. It also provides global shipping to certain countries for some of its products. " Awareness Exploration Familiarity Commitment Page # 136http://vugoogle.com/ Awareness This is the first stage where customers recognize the name of the company or any of its products. However, they have never interacted with the company before. A company/business can achieve this level by properly advertising its brand.

Question No: 3

( Marks: 1 )

- Please choose one

Customer Loyalty model is also called Customer Life Cycle Customer Segmentation Customer Awareness All of the options Page # 136--137

Question No: 4

( Marks: 1 )

- Please choose one

Which of the following is True for Class B: Network 01 byte and 03 hosts Network 02 bytes and 02 hosts Network 03 bytes and 01 host

None of these Page # 10 In class B, the first two bytes indicate the network address and the last two bytes indicate the host machines on that network

Question No: 5

( Marks: 1 )

- Please choose one

RIP(Routing Information protocol) is used by---------- , to build a ------------ table bridges , hash routers, matrix routers , routing All of these Page # 16 A router can communicate with another router on the internet with the help of Routing Information Protocol, and thus it can build a routing table.

Question No: 6

( Marks: 1 )

- Please choose one

Switch is used on the layer First Layer Second Layer Third Layer None of these Ref: IT430 1st assignment solution file uploaded by instructor.

Question No: 7

( Marks: 1 )

- Please choose one

Router is used on the layer First Layer Second Layer

Third Layer None of these Ref: IT430 1st assignment solution file uploaded by instructor.

Question No: 8

( Marks: 1 )

- Please choose one

In HTML If you leave out the setting for scrolling what will happen? No scrollbar will appear even if needed. A scrollbar will always be present. A scrollbar will appear if needed. All options. SCROLLING this attribute determines whether a scroll bar appears with a frame (e.g, Scrolling=yes in the <frame> tag makes it appear)

Question No: 9

( Marks: 1 )

- Please choose one

Which one of the following attacks does not include in the attacks on Symmetric key Key search attack Cryptanalysis System based attacks Organization attacks Page # 108 Attacks on Symmetric Key Algorithms Following attacks have been reported on symmetric key algorithms: Key Search Attacks Cryptanalysis System-based Attacks http://vugoogle.com/

Question No: 10

( Marks: 1 )

- Please choose one

What is a E-Cash wallet ? Hardware Agent Software All of the above Page # 116 Buyers withdraw coins against their account and store them in e-cash wallet software (Cyber wallet) on their computer. Cyber wallet stores and manages coins and records every transaction.

Question No: 11

( Marks: 1 )

- Please choose one

It is the ability to sell the goods or provide the service at a price that is lower than that of competitors, and thus attract more customers. What is called? Cost leadership Price leadership Focus Differentiation
Ref: PAGE # 157 Cost leadership: It is the ability to sell the goods or provide the service at a price that is lower than that of competitors, and thus attract more customers.

http://vugoogle.com/ Question No: 12 Meta tag contains: User information seller information web page key information ( Marks: 1 ) - Please choose one

bank information
Ref: PAGE # 138 META INFORMATION: You know that a Meta tag contains the key information of a web page.

Question No: 13

( Marks: 1 )

- Please choose one

In many countries, stealing and misusing of meta information for getting competitive advantage is considered as an offence known as Tort of Private Nuisance Tort of Tress passing Tort of passing off Defamation
Ref: PAGE # 138 In many countries, stealing and misusing Meta information in this manner to gain business/competitive advantage is considered as an offence known as the tort of passingoff.

Question No: 14

( Marks: 1 )

- Please choose one

Which of the following is NOT force of Porters competitive rivalry Model? Threat of potential/new entrants Threat of substitute Differentiation and cost leadership Competition between existing players Page # 158 Threat of potential/new entrants to the sector Threat of substitute product or service in the existing trade Bargaining power of the buyers Bargaining power of the suppliers

Competition between existing players

Question No: 15

( Marks: 1 )

- Please choose one

Exclusive right granted by law to make, use and sell an invention. What is called? Parasites Trade mark Patent infringement Copyright
Ref: PAGE # 181 Patent infringement: A patent is an exclusive right granted by law to make, use and sell an invention. In order to be patentable, the invention must be unique, genuine, and useful according to the prevalent technological standards.

Question No: 16

( Marks: 1 )

- Please choose one

GM Celebes manufacturing electronic goods and FryChips co selling French fries. Under the traditional trade mark law both these companies can have the same trade mark/trade name such as frys. The problem arises when both apply for the registration of a domain name containing the word frys. Here, both are legitimate claimants of this domain name but due to the element of uniqueness of domain names only one of them can be assigned the desired domain name. Which legal issue arises in this situation? Domain name conflict Cyber squatting Concurrent use None Ref: PAGE # 181 Concurrent use

This problem arises when two organizations have apparently legitimate claim to use the same domain name but cannot do so due to the uniqueness of domain names. Suppose, there is a company manufacturing electronic goods and another company selling french fries. Under the traditional trade mark law both these companies can have the same trade mark/trade name such as frys. The problem arises when both apply for the registration of a domain name containing the word frys. Here, both are legitimate claimants of this domain name but due to the element of uniqueness of domain names only one of them can be assigned the desired domain name.

Question No: 17

( Marks: 1 )

- Please choose one

ANSI stands for . American National Standards Institute All Network Standards Institute American New standards Institute Australia National standards Institute Page # 147 ANSI (American National Standards Institute)

Question No: 18

( Marks: 1 )

- Please choose one

Which of the following company develop ERP soft wares? SAP Oracle JD Edward All of these Page # 150

SAP is an example of ERP software. ERP is complex. It is not intended for public consumption as proper
integration of ERP with ecommerce applications is still a major problem.

Question No: 19

( Marks: 1 )

- Please choose one

Company collecting information assumes that the customer does not object to a specific use of information unless the customer specifically denies the permission. Thus, the company may use the collected information for its own purpose, as well as, sell or rent it out to other firms or persons. Which of the following Approach it is using? Opt-inout Opt-out Swap-out Opt-in Page # 183

opt-out approach, the company collecting information assumes that the customer does not object to a
specific use of information unless the customer specifically denies the permission. Thus, the company may use the collected information for its own purpose, as well as, sell or rent it out to other firms or persons.

Question No: 20

( Marks: 1 )

- Please choose one

What does ++ operator do? Adds two numbers together Joins two text strings together Adds 1 to a number Adds 2 to a number

Page # 58 Operators in java script Mathematical operators + For addition of two values - for subtraction of two values * for multiplication / for division % modulus (for calculating the remainder) ++ for increment -- for decrement Logical operators && for logical and || for logical or ! for logical not Question No: 21 ( Marks: 1 ) - Please choose one

A paper signature is believed to be more reliable than a digital signature. True

False
Ref: PAGE # 106 A digital or electronic signature is believed to be more reliable as compared to paper signatures because it is not ordinarily possible to copy or forge an electronic/digital signature. But, that is very much possible in case of paper signatures.

Question No: 22

( Marks: 1 )

- Please choose one

Job searchers can search for jobs and employers can hire effectively using _____________. Online recruiting web sites. Online banking web sites. Online trading and lending web sites. Online news services web sites.
Ref: PAGE # 128 Online Recruiting: Employers can recruit and job searchers can search for jobs effectively through online recruiting web sites.

Question No: 23

( Marks: 1 )

- Please choose one

Suppose you want to search from Virtual Universitys database that how many students have taken MBA in a specific semester. In this scenario, which type of data mining you are using? Classification Association Characterization Clustering Page # 144 Characterization It is discovering interesting concepts in concise and succinct terms at generalized levels for examining the general behavior of the data. For example, in a database of graduate students of a university the students of different nationalities can be enrolled in different departments such as music history, physics etc. We can apply characterization technique to find a generalized concept/answer in response to the question that how many students of a particular country are studying science or arts

Question No: 24

( Marks: 1 )

- Please choose one

For example, white color denotes purity in Europe and America but is associated with death and mourning in china and some Asian countries. Similarly, a web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death . Which of the following barrier involve in above example Culture Language Trust Infrastructure Issues Page # 162 For example, white color denotes purity in Europe and America but is associated with death and mourning in china and some Asian countries. Similarly, a web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death in that culture.

Question No: 25

( Marks: 1 )

- Please choose one

-------------means services in relation to the transformation of contents of an electronic document from its original form to one that cannot be understood or decoded by any unauthorized person Cryptography services Accredited Certification Service Provider Originator Addressee Page # 163 Cryptography services means services in relation to the transformation of contents of an electronic document from its original form to one that cannot be understood or decoded by any unauthorized person.

Question No: 26

( Marks: 1 )

- Please choose one

Risk Management is the part of which activity?

E-business E-commerce E-marketing All of the given

Question No: 27

( Marks: 1 )

- Please choose one

Which type of algorithm is used by virtual pin system for encryption? DES (Data Encryption Standard) IDEA (International Data Encryption Algorithm) Rinjdael Non of above Page # 110 Virtual PIN system does not involve the use of encryption.

Question No: 28

( Marks: 1 )

- Please choose one

Which one is not the life cycle stage of the customer relation? Awareness Exploration Familiarity Cancelation Page # 136

Question No: 29

( Marks: 1 )

- Please choose one

Popular EDI documents formatting standards _______ X12 EDIFACT

X12 None

and EDIFACT

Page # 147 EDI documents are formatted using published standards. Two popular EDI standards are - ANSI (American National Standards Institute) X12 standard and EDIFACT (United Nations Standard of Electronic Data Interchange for Administration, Commerce and Transport).

Question No: 30

( Marks: 1 )

- Please choose one

LDA stands for _______ Lahore Lahore Page # 165 For example, the Lahore Development Authority (LDA) is a statutory body established under the Lahore Development Act, 1975 (a provincial statute). Development Authority Development Act

Question No: 31

( Marks: 2 )

What is meant by EDI?

Question No: 32

( Marks: 2 )

What do we mean by Affiliation between two parties? Explain shortly.

Question No: 33

( Marks: 2 )

Write HTML code for two input fields, one for Login Name and other for Password.

Question No: 34

( Marks: 2 )

What term/matters does the concurrent legislative list sets out according to (ETO) 2002?

Question No: 35

( Marks: 3 )

Describe the importance of Customer Relationship Management (CRM) in current scenario.

Question No: 36

( Marks: 3 )

In ETO, what are functions of Accredited Certification Service Provider?

Question No: 37

( Marks: 3 )

How many legislative list(s) is(are) in Constitution of Islamic Republic of Pakistan at end?

Question No: 38

( Marks: 3 )

Write short note on Packet Filter Firewall?

Question No: 39

( Marks: 5 )

Discuss briefly how companies are getting competitive advantage over the other organizations through differentiation and focus?

Question No: 40

( Marks: 5 )

Write a short note on the following Global legal issues (Marks: 2.5+2.5=5) 1. 2. Territorial Jurisdiction Online contracts FINALTERM EXAMINATION Spring 2009 IT430- E-Commerce (Session - 3) Ref No: 17 Time: 120 min Question No: 1 ( Marks: 1 ) - Please choose one

At minting stage, the serial number is ..by E-Cashbank

Known

Unknown

Secret Secret

Forwarded Forwarded

Question No: 2

( Marks: 1 )

- Please choose one SET

and SSL both are same with respect to security. True

False

Question No: 3

( Marks: 1 )

- Please choose one

Advertising Supported Revenue Model includes Yahoo portal

Employment sites

Newspaper Publishers

All of the above

Question No: 4

( Marks: 1 )

- Please choose one

Advertising Subscription Mixed Revenue Model includes

Online journals

Sports information services

Business week online

All of the above

Question No: 5

( Marks: 1 )

- Please choose one Let

us, suppose that you have hosted your e-commerce website, When you provide opt-in e-mail option to your customers on your website and customer opt for it , what does it mean to receive ?

Information about product through advertisement

Information about product through e-mail

Information about services available on it

Information about News through e-mail.

Question No: 6

( Marks: 1 )

- Please choose one

What does Telemarketing means?

Marketing through charting

Marketing through telephone

Marketing through email

Marketing through web casting

Question No: 7

( Marks: 1 )

- Please choose one

Visitors location, IP address, time of visit related information are added, in which of the following

call handling files

cookies

log files

Data mining files.

Question No: 8

( Marks: 1 )

- Please choose one

HTML stands for ? Hyper Text Marked Language Hyper Text Markup Language Hyper Text Member License None of these

Question No: 9

( Marks: 1 )

- Please choose one


For

which one of the following,<MARQUEE ...> tag can work better

News headlines Announcements Sound pulgin Movie controls

Question No: 10

( Marks: 1 )

- Please choose one

Which of the following ,in Javascript, we could not create our own? Textboxes Dropdown Object Image

Question No: 11

( Marks: 1 )

- Please choose one

How do you write a conditional statement for executing some statements only if "i" is equal to 5?

if i=5 if i=5 then if i==5 then if (i==5)

Question No: 12

( Marks: 1 )

- Please choose one

Which one of the following ,is the correct way to declare a JavaScript array?

var txt = new Array="tim","kim","jim" var txt = new Array(1:"tim",2:"kim",3:"jim") var txt = new Array("tim","kim","jim") var txt = new Array:1=("tim")2=("kim")3=("jim")

Question No: 13 ( Marks: 1 ) - Please choose one

Upstream activities relate to?

Materials/services or the input from suppliers

Manufacturing and packaging of goods

Distribution and sale of goods to distributors/customers

Input from suppliers and Distribution

Question No: 14 ( Marks: 1 ) - Please choose one

Downstream activities relate to?

Materials/services or the input from suppliers

Manufacturing and packaging of goods

Distribution and sale of goods to distributors/customers

Manufacturing and Distribution

Question No: 15 ( Marks: 1 ) - Please choose one

Porters Model helps a firm to identify threats to its competitive position and to devise plans including the use of IT and e-commerce to protect or enhance that position.

True

False

Question No: 16 ( Marks: 1 ) - Please choose one A company collecting information assumes that the customer does not object to a specific use of information unless the customer specifically denies the permission. Thus, the ompany may use the collected information for its own purpose, as well as, sell or rent it out to other firms or persons. Which of the following Approach it is using?

Opt-inout

Swap-out

Opt-in

Opt-out

Question No: 17

( Marks: 1 )

- Please choose one

Which type of Data Mining contains the elements as Support and confidence?

Classification

Association

Characterization

Clustering

Question No: 18

( Marks: 1 )

- Please choose one

In which type of data mining, Apriori algorithms is used?

Classification Association Characterization Clustering

Question No: 19

( Marks: 1 )

- Please choose one How

do you define a numerical value? var mynum = new Math; var mynum = Math(6); var mynum = 6; Math.mynum = 6;

Question No: 20

( Marks: 1 )

- Please choose one

Which CSS property controls the text size? font-style text-style font-size text-size

Question No: 21

( Marks: 1 )

- Please choose one

Which of the following is a function of Cyberwallet? Store coins Manage Coins Record transactions All of above

Question No: 22

( Marks: 1 )

- Please choose one

Which model allows the users to log-on on a website and assume the role of bidder or seller?

Online Banking. Storefront Model. E-Learning. Auction Model.

Question No: 23

( Marks: 1 )

- Please choose one Job

searchers can search for jobs and employers can hire effectively using _____________. Online recruiting web sites. Online banking web sites. Online trading and lending web sites. Online news services web sites.

Question No: 24

( Marks: 1 )

- Please choose one

Which of these is a rule about bondage or affinity of two items such that if one item is purchased, the other is purchased too? Classification Association Characterization Clustering

Question No: 25

( Marks: 1 )

- Please choose one

Electronic banking is also known as __________. Cyber banking Virtual banking Online banking All of above

Question No: 26

( Marks: 1 )

- Please choose one

Identify the necessary aspect for a business to work to establish long term relationship with at least small number of capable suppliers.

Supply chain management

Demand chain management

Ultimate consumer orientation

None of the given

Question No: 27 ( Marks: 1 ) - Please choose one

IT/EC can reduce the overall ------------- and afford to keep the price of the product relatively low Production cost

Marketing cost

Distribution cost

None

Question No: 28

( Marks: 1 )

- Please choose one ------

-------means services in relation to the transformation of contents of an electronic document from its original form to one that cannot be understood or decoded by any unauthorized person Cryptography services

Accredited Certification Service Provider

Originator

Addressee

Question No: 29

( Marks: 1 )

- Please choose one

Criminal wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general True

False

Question No: 30

( Marks: 1 )

- Please choose one

A . Is a group of data objects that are similar to one another in each group?

Character Classification Association Cluster

Question No: 31

( Marks: 1 )

What stands for CRM?

CRM stands for costumer relationship management.

Question No: 32 ( Marks: 1 )

What are the three attacks on symmetric key algorithms? Write names only.

1. Key Search Attacks 2. Cryptanalysis 3. System-based Attacks

Question No: 33

( Marks: 2 )

What is ONLINE BANKING?

Online banking provides services to the customers through internet including services of electronic funds transfer.

Question No: 34

( Marks: 2 )

Define these two terms plaintiff and defendant?

The person who files a lawsuit are called plaintiff. And the person against whom it is filed is called defendant.

Question No: 35

( Marks: 3 ) How

lack of trust barrier can be overcome or minimized? Discuss it briefly

Online companies must establish a trust relationship with its costumers, because as we know that there is a gap that we feel that web based companies are not present in physical. There for web businesses the trust must be present between costumer and sellers.

Question No: 36

( Marks: 3 )

What do we mean by internet-based EDI? Briefly explain how could it be used as substitute of VAN? (1 + 2)

Internet can support EDI in a variety of ways. Internet e-mail can be used as EDI message transport mechanism in place of having a VAN. An extranet can be created with the trading partner allowing a partner to enter information in the fields of web forms which correspond to the fields of EDI message. Also, web-based EDI hosting service can be utilized through web-based EDI software.

Question No: 37

( Marks: 3 )

Briefly explain how does the bank check validity of e-coins when merchant sends them for deposit?

Coins used in the payment are encrypted with banks public key, preventing the merchant to view them. Payment information is forwarded to the bank with encrypted coins during merchants deposit. Only hash of the order description is included in payment information preventing the bank from knowing the order details.

Question No: 38

( Marks: 5 )

Describe the advantages and disadvantages of Virtual PIN.(2.5+2.5)

Advantages and disadvantages of Virtual PIN:

Simplicity and no encryption is the biggest advantage of this payment system, which means that no special software is needed at the frond end. This payment system is good for low-cost information items. Therefore, it is suitable for buying online articles, journals, music. Where the cost of the items is not much. In that eventuality, only sales are lost rather than actual financial loss to the merchant if there

is a fraud. In other words, only some extra copies of the information items are made in case of a fraud. On the other hand merchant is exposed too much greater financial loss if the purchase relates to the actual physical goods. One of the disadvantages of this payment model is that pre-registration of the buyer and the merchant with FV is mandatory in this set up. Moreover, maintaining a bank account (in case of merchant) and having a credit card (in case of a buyer) is also essential part of this system. One can say that the merchant side is less secured in the transaction because the goods are delivered by the merchant before the payment is actually received. The popularity of this payment system declined after 1998 mainly because of the introduction and development of encryption based payment mechanisms.

Question No: 39

( Marks: 5 )

Differentiate between Cyber squatting and concurrent use with example.

Cyber squatting:

The act of intentionally registering domain names containing trademarks/trade names of prominent companies to later blackmail or demand ransom from those companies is called cyber squatting. It is regarded as an offence in most countries. Assume there is a firm Glory Enterprise and it wants to have its web site. It also wants to have the word glory as a part of its domain name because for years it has been recognized in the physical world through this word. However, at the time of registration of its domain name it finds that a person Mr. A who has nothing to do with the business of the firm or the word glory has already registered a domain name containing this word as a part of it. Since there cannot be two similar domain names, the firm is forced to request Mr. A to transfer that domain name to it. In response, if Mr. A blackmails or claims ransom from the said firm, he would be said to have committed cyber squatting.

Concurrent use:

This problem arises when two organizations have apparently legitimate claim to use the same domain name but cannot do so due to the uniqueness of domain names. Suppose, there is a company manufacturing electronic goods and another company selling French fries. Under the traditional trade mark law both these companies can have the same trade mark/trade name such as frys. The problem arises when both apply for the registration of a domain name containing the word frys. Here, both are

legitimate claimants of this domain name but due to the element of uniqueness of domain names only one of them can be assigned the desired domain name.

Question No: 40

( Marks: 10 )

How strategies are formulated and implemented? Explain it with real world example.

Strategy Formulation:

Based upon this study of internal and external business environment and in light of a companys strengths and weaknesses, a competitive business strategy is formed. It may be a strategy of cost leadership, product differentiation or focus. One can also identify ways how information technology can be used to implement/enforce such strategy.

Strategy Implementation:

In the implementation stage, you build a plan to identify steps needed to put the strategy into action and practically take those steps. For example, where your strategy is to pursue differentiation in terms of quality of service by using/arranging a web-based call centre through which the customers can immediately register their complaints; then you will have to select appropriate individuals who are suitable for the job in the implementation stage. Creating a web team and defining the role of each member of the team is a critical component of implementation stage. For example, you define that this person would be the team leader; this would be in the technical staff, or the management staff. Note that involvement of key persons from marketing, accounting, finance, human resource, IT, customer relations etc. will be important in decision marking as to how a particular implementation plan can be executed. A strategic plan can be at times initially implemented in terms of a pilot project before launching it to a full scale. For example, an automobile manufacturer in America had implemented a plan/scheme which allowed the potential customers to have scheduled test drives before buying a particular car. Initially, this scheme was introduced to four American states but later it was implemented all over the country. Another point is to consider whether you should build your own infrastructure for execution or outsource the task of execution of a strategic plan. For example, where a strategic plan requires a particular web design, you can either mange your own team of web designers or outsource this task to an outside firm having expertise in this area.

Question No: 41

( Marks: 10 )

How can you define the concept of cyber banking? How it takes place? What is its important role in E-Commerce? (3+2+5)

Electronic banking, also known as cyber banking, virtual banking, home banking and online banking, includes various banking activities conducted from home, business, or on the road, instead of at a physical bank location.

Important roles of cyber banking in e-commerce.

1. Get current account balances at any time 2. Obtain credit card statements 3. Pay utility bills 4. Download account information 5. Transfer money between accounts 6. Send e-mail to your bank 7. Manage your own schedule 8. Handle your finances from any location 9. Apply for loans online

FINALTERM EXAMINATION Fall 2009

IT430- E-Commerce (Session - 1) Question No: 1 ( Marks: 1 ) - Please choose one Key version represents public key by Buyer

Seller E-Bank

Certification Authority

Question No: 2 ( Marks: 1 ) - Please choose one SSL stands for Secure Socket Layer

Security Service Layer

Sub Secured Length

None of these

Question No: 3 ( Marks: 1 ) - Please choose one How many kinds of Web Portals are? 3 2

5 6

Question No: 4 ( Marks: 1 ) - Please choose one Brick and Mortar refers to

Offline business

Online business

Transport

Building

Question No: 5 ( Marks: 1 ) - Please choose one

Digital Content Revenue Model Includes

Legal information services

Online journals

Online Libraries

All of the above

Question No: 6 ( Marks: 1 ) - Please choose one

Which of following marketing campaigns are cheap an effective way to target potential customers?

Sale forces

E-mail

Media promotion

Marketing software

Question No: 7 ( Marks: 1 ) - Please choose one

What does Telemarketing means?

Marketing through charting

Marketing through telephone

Marketing through email

Marketing through web casting

Question No: 8 ( Marks: 1 ) - Please choose one

Which of following services build a strong customer loyalty towards company and its products?

Customer services

Public relations(PR)

Bulletin board

Exhibitions.

Question No: 9 ( Marks: 1 ) - Please choose one

Track the customers online and do personalization is only possible through which of the following file(s) analysis.

log files

cookie

data mining

log files and cookies.

Question No: 10 ( Marks: 1 ) - Please choose one

Which of the following is true for Class A: Network 01 byte and 03 hosts

Network 02 bytes and 02 hosts

Network 03 bytes and 01 host

None of these

Question No: 11 ( Marks: 1 ) - Please choose one

What is the correct HTML for making a text input field?

<textinput type="text"> <input type="text"> <input type="textfield"> <textfield>

Question No: 12 ( Marks: 1 ) - Please choose one

IIS stands for: International Information Service Internet Information Server Internet Information standards

All of these

Question No: 13 ( Marks: 1 ) - Please choose one

The payer and the payee are issued digital certificates in standard format by their respective banks.

X. 509 F. 609 L.8999 N.586

Question No: 14 ( Marks: 1 ) - Please choose one

What is a E-Cash wallet ?

Hardware Agent Software All of the above

Question No: 15 ( Marks: 1 ) - Please choose one

An E-cash coin consists of element (s) like:

Serial # provided by client Key version

Serial# signed by E-cash bank All of the above

Question No: 16 ( Marks: 1 ) - Please choose one

What is Ultimate consumer orientation? Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain.

Secondary Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of supply chain.

None of them

Question No: 17 ( Marks: 1 ) - Please choose one

Customer data can be gathered and analyzing it customers can be served in a better Manner according to their needs, Which is best option?

Customization

Customer orientation

Customer satisfaction

Focus

Question No: 18 ( Marks: 1 ) - Please choose one A company ABC web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death in that culture. Which is the international barrier it is having?

Culture

Language

Lack of trust

Infrastructure

Question No: 19 ( Marks: 1 ) - Please choose one

Exclusive right granted by law to make, use and sell an invention. What is called?

Parasites

Trade mark

Patent infringement

Copyright

Question No: 20 ( Marks: 1 ) - Please choose one

Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act. Which legal issue arises due to such acts?

Cyber Crimes

Online Defamation

Cyber squatting

None

Question No: 21 ( Marks: 1 ) - Please choose one How can you reference part of a string?

text.substr(5,6); text.part(5,6) text.piece(5,6) text.split(5,6);

Question No: 22 ( Marks: 1 ) - Please choose one This is an example of

0-tier architecture 1-tier architecture 2-tier architecture n-tier architecture

Question No: 23 ( Marks: 1 ) - Please choose one

Following are the names of some well known e-commerce software, EXCEPT ----------- . Intershop IBM's WebSphere Commerce Professional Edition Microsoft Commerce Server 2002

Microsoft SQL Server 2005

Question No: 24 ( Marks: 1 ) - Please choose one In Style Sheets, How do you change the font of an element? font-face: font: font-family: font-style:

Question No: 25 ( Marks: 1 ) - Please choose one A paper signature is believed to be more reliable than a digital signature. True False

Question No: 26 ( Marks: 1 ) - Please choose one The serial # generated by the cyberwallet gets multiplied by blinding factor r which is known only to the ___________. Client Bank Merchant None of above

Question No: 27 ( Marks: 1 ) - Please choose one

SET doesnt require special software on the client or merchant side.

True False

Question No: 28 ( Marks: 1 ) - Please choose one The result of OLAP is displayed in the form of a __________. Data square Data Triangle Data cube Data circle

Question No: 29 ( Marks: 1 ) - Please choose one

Classification and Association belong to which of the following types of Data Mining? Selective Predictive Descriptive Additive

Question No: 30 ( Marks: 1 ) - Please choose one

Which one of the following algorithms does not include in public key algorithms?

DSS

RSA Elliptic Curves RC4

Question No: 31 ( Marks: 1 )

What is a basic purpose of payment gateway in SET transactions? Explain shortly.

Question No: 32 ( Marks: 1 )

Provide after sales service and support is one of the areas in a strategic business unit according to

Michael Porter. List what kind of activities is performed in this area?

Question No: 33 ( Marks: 2 )

What do we mean by Affiliation between two parties? Explain shortly.

Question No: 34 ( Marks: 2 )

Discuss briefly how a software developer who releases annual updates of his software can reduce the price of his product and increase sales revenue in an E- Commerce environment.

Question No: 35 ( Marks: 3 )

Under Section 21 of the ETO, the funds of the Certification Council shall comprise of:?

Question No: 36 ( Marks: 3 )

What is business promotion? Briefly explain any two methods of business promotion. 1+2

Question No: 37 (Marks: 3 ) How does the client purchase from merchant using E-Cash Payment system? Show the payment request format.

Question No: 38 ( Marks: 5 )

Explain the advantages of E-business regarding todays scenario.

Question No: 39 ( Marks: 5 )

Elaborate the importance of OLAP in decision making support for an organization.

Answer: Online Analytical Processing (OLAP) uses knowledge for the purpose of presenting data at different levels of abstraction. It is different from data mining as it does not help in making predictions. But data can be viewed and reviewed in many different ways for decision making purpose. The result is showed in form of a data cube.

Question No: 40 ( Marks: 10 )

What elements should we consider for global marketing of e-businesses? Describe briefly.

Question No: 41 ( Marks: 10 ) Give an example to show how members of supply chain can work together to reduce inventory, increase quality of product, reduce production cost and increase process speed.

FINALTERM EXAMINATION Fall 2009 IT430- E-Commerce (Session - 1) Question No: 1 ( Marks: 1 ) - Please choose one

Browser is installed at : Client side machine none Web server machine

both Client and Server Machines ( Marks: 1 ) - Please choose one

Question No: 2

Key version represents public key by Buyer Seller

E-Bank Question No: 3

Certification Authority ( Marks: 1 ) - Please choose one

In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT included: Buyer Accounts identifier Address of Merchant Question No: 4 Buyer password Actual amount of money in favor of merchant - Please choose one

( Marks: 1 )

To overcome the lack of physical proximity appearance problem in e-business, which technology is going to be used Biometrics Cryptography Question No: 5 Video conferencing Biometrics and Video conferencing - Please choose one

( Marks: 1 )

Dividing the potential customers into groups is called Market Segmentation Market Promotion Market Research Market Survey Question No: 6 ( Marks: 1 ) - Please choose one

Traditionally Marketer use the market segmentation(s) like Geo-graphic Segmentation Psychographic Segmentation Question No: 7 ( Marks: 1 ) Demographic Segmentation All of the above

- Please choose one

In, there is no direct contact with the end users. B2B B2C C2C All above options - Please choose one

Question No: 8

( Marks: 1 )

Allocation of MAC addresses is administered by ------------------------- ICAAN ISO IEEE None

Question No: 9

( Marks: 1 )

- Please choose one

As a Web developer you can define a style sheet for? HTML elements and apply to many Web pages.

A HTML element and apply to single Web page. A HTML element and apply to many Web pages. HTML elements and apply to one Web page. Question No: 10 ( Marks: 1 ) - Please choose one

What shall come in blanks for proper result, Here blanks are numbered with 1,2 and 3 <html> <head> <SCRIPT language="JavaScript"> Var num1, var num2

Document.container .result.value=parseFloat(num1)-parseFloat(num2) </script> </head> <body> <FORM name=---------1-----------> <input type=----------2------- name=-------3--------- maxlength=5> </form> </body> </html> container, text and result result, value and container container , button and value result, container and text Question No: 11 ( Marks: 1 ) - Please choose one

What does XML stand for? eXtra Modern Link X-Markup Language

eXtensible Markup Language Question No: 12 ( Marks: 1 )

Example Markup Language

- Please choose one

Cryptographic Algorithms are measured in terms of Key length Simplicity Question No: 13 Complexity All of the above ( Marks: 1 ) - Please choose one

-----------means that your product/service has certain quality that makes it more attractive than the one offered by your competitor, despite the price of your competitors product/service is somewhat lower Differentiation Cost leadership Question No: 14 Focus None of them - Please choose one

( Marks: 1 )

Customer data can be gathered and analyzing it customers can be served in a better Manner according to their needs, Which is best option? Customization Customer orientation Focus - Please choose one

Customer satisfaction Question No: 15

( Marks: 1 )

Characterization and Clustering belong to which of the following types of Data Mining? Additive Selective Question No: 16 Predictive Descriptive ( Marks: 1 ) - Please choose one

In which type of data mining, ID3 algorithms is used? Classification Characterization Question No: 17 Association Clustering - Please choose one

( Marks: 1 )

ANSI stands for . American National Standards Institute American New standards Institute All Network Standards Institute

Australia National standards Institute Question No: 18 ( Marks: 1 ) - Please choose one

Who is making the Web standards? International Standard Organization ANSI Microsoft The World Wide Web Consortium - Please choose one

Question No: 19

( Marks: 1 )

Which of following is NOT an attribute of <AREA> tag? shape circle href coords

Question No: 20

( Marks: 1 )

- Please choose one

Which of the following is an advantage of symmetric algorithms? Symmetric algorithms are faster Symmetric algorithms don't include any encryption Symmetric algorithms are slow in nature None of above Question No: 21 ( Marks: 1 ) - Please choose one

What is the right sequence of steps in Electronic Check process? Payees bank Payers bank Payee Payer. Payers bank Payee Payees bank Payer. Payers bank Payees bank Payer Payee. Payer Payee Payees bank Payers bank. Question No: 22 ( Marks: 1 ) - Please choose one

The key feature of E-Cash Payment system is __________. Simplicity Question No: 23 Anonymity ( Marks: 1 ) Availability Connectivity

- Please choose one

In storefront e-business model buyers and sellers interact ___________ with each other. Directly. Indirectly Through a third party None of above.

Question No: 24

( Marks: 1 )

- Please choose one

Customers grouped by variables such as social class, personality or approach to life or lifestyle, is called ___________. Demographic Segmentation. Psychographic segmentation. Question No: 25 ( Marks: 1 ) Geographic Segmentation. Behavioral segmentation.

- Please choose one

According to Michael Porter, material handling is an example of primary activity in a strategic business unit. Identify the area in which this task is performed. Identify customers Market and sell Purchase materials and supplies

Deliver activities relate to storage Question No: 26 ( Marks: 1 )

- Please choose one

According to Michael Porter, fabricating is an example of primary activity in a strategic business unit. Identify the area in which this task is performed. Market and sell Deliver activities relate to storage Manufacture product or create service

Purchase materials and supplies Question No: 27 ( Marks: 1 )

- Please choose one

Electronic banking is also known as __________. Cyber banking Online banking Question No: 28 Virtual banking All of above ( Marks: 1 ) - Please choose one

Classification and Association belong to which of the following types of Data Mining? Selective Question No: 29 Predictive Descriptive Additive

( Marks: 1 )

- Please choose one

Web catalogue revenue model includes Online sellers of computer Journals Question No: 30 Gifts, flowers, clothes

Both first & second options ( Marks: 1 ) - Please choose one

In which type of approach, we sum up and integrate the information in a particular dimension to show the result? Dice Drill down Roll up Slice

Question No: 31

( Marks: 1 )

What is Strategic Planning Cycle? E-business competitive strategy is normally formed and implemented according to a planning cycle which is called strategic planning cycle.

Question No: 32

( Marks: 1 )

In Pakistan, which is the apex court? Name only. Supreme Court of Pakistan.

Question No: 33

( Marks: 2 )

What is the purpose of SETCo? SETCo. is a company formed to lead the implementation and promotion of SET specifications It ensures that the vendors of SET software comply with the requirements laid down by its originators. A merchant holds certificate from card brand indicating that the merchant is authorized to accept credit card payment. The customer holds certificate from the card issuing bank. SETCo acts as a root certification authority in the certification hierarchy.

Question No: 34

( Marks: 2 )

Is Delivery activity in Strategic business Unit identified as supporting activity and why?

Question No: 35

( Marks: 3 )

Elaborate data mining advantages in business applications.

Question No: 36

( Marks: 3 )

Write precisely about the 4th stage of planning cycle?

The 4th stage of planning cycle is strategy assessment. In this stage results of implementation plan are monitored and assessed so in this way corrective measures can be planned. Actually, we want to asses that weather our strategy has delivered what it supposed to deliver, whether our strategy is still workable in changing environment. In strategy assessment portion, we can learn from our mistakes and can do our future planning. In case of e-commerce project has been a failure, we can easily identify the problems and can try to remove them, for the strategy assessment, we can conduct surveys, collect information and receive feedback. Question No: 37 ( Marks: 3 )

How does the client purchase from merchant using E-Cash Payment system?Show the payment request format.

Question No: 38

( Marks: 5 )

What do you perceive by Value Added Network? Explain its advantages too with reference to EDI. (2+3) Value Added Network are third party networks that provide services to execute authorized transactions with valid trading partners using EDI (Electronic Data Interchange). Each VAN (Value Added Network) has a centralized computer system that maintains two files for each user that are Postbox and Mailbox. Value Added Networks advantages with reference to EDI: Advantages of using a VAN in EDI are time independence and protocol independence. Time independence means that the sending and receipt of the interchange or messages can be carried out at the convenience of the users involved. Thus, they are not required to be connected with each other at the same time. Protocol independence means that interchanges are re-enveloped with the transmission protocol appropriate to the recipient when they are retrieved from the postbox by the VAN. Thus, a VAN can provide protocol compatibility between the sender and the recipient, wherever that is missing. Question No: 39 ( Marks: 5 )

What is market research? Describe any three possible methods of conducting market research. 2+3 It consists of interviews, paper and phone surveys based on past investigations, actually the basic purpose of market research is to find strengths, weaknesses, opportunities and threats of our business and our competitor business. In this way we can compare our business conditions with our competitor. In case of online businesses, market research is much faster and easy than offline businesses. Market research is much beneficial for any business. Three possible methods of conducting market research:

Questionnaires Interviews Phone and Paper surveys Question No: 40 ( Marks: 10 )

How e-cash payment system is applied on the web? Explain with the help of diagram.

Question No: 41

( Marks: 10 )

Briefly explain Territorial jurisdiction with the help of example ,Ho territory is important for a court to file a case? Territorial jurisdiction refers to the legal right of a court of a particular area/territory to entertain and decide a case. ETO says that courts in Pakistan shall have jurisdiction or authority to decide any matter that relates to persons or information systems or events in Pakistan and covered by the terms of the Ordinance. Assume that someone from England accesses an information system in Pakistan and deletes or modifies the data of a person contained therein without any authority, then this act may be treated as an offence under the ETO and Pakistani courts would have jurisdiction to try such a matter. The jurisdiction to try offences under the ETO is vested with the session courts in Pakistan. Law is broadly divided into two classes on the basis of nature of wrong, namely, civil law and criminal law. Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Civil wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general. On the other hand, a criminal wrong (crime) is an act deemed by law to be harmful to the society in general such as theft or murder etc. and the state itself is a party in such matters. There are different forms of jurisdiction. Territorial jurisdiction refers to the competence of a court to decide a case on the basis of certain geographical area/territory. So, if a dispute arises in Karachi, the courts in Karachi would only have territorial jurisdiction, and the case cannot be filed in Islamabad or Lahore. Ordinarily, territorial jurisdiction lies where the defendant resides or carries on business or the cause of action has wholly or partly arisen or the immoveable property is situated (in case the matter relates to land etc.).

FINALTERM EXAMINATION Fall 2009 IT430- E-Commerce (Session - 1) (Courtesy xclus!vely m3) Question No: 1 ( Marks: 1 ) - Please choose one Key version represents public key by Buyer Seller E-Bank Certification Authority Question No: 2 ( Marks: 1 ) - Please choose one SSL stands for Secure Socket Layer Security Service Layer Sub Secured Length None of these Question No: 3 ( Marks: 1 ) - Please choose one How many kinds of Web Portals are? 3 2 5 6 Question No: 4 ( Marks: 1 ) - Please choose one Brick and Mortar refers to Offline business Online business Transport Building Question No: 5 ( Marks: 1 ) - Please choose one Digital Content Revenue Model Includes Legal information services Online journals Online Libraries All of the above Question No: 6 ( Marks: 1 ) - Please choose one Which of following marketing campaigns are cheap an effective way to target potential customers? Sale forces E-mail Media promotion Marketing software Question No: 7 ( Marks: 1 ) - Please choose one What does Telemarketing means? Marketing through charting Marketing through telephone Marketing through email Marketing through web casting Question No: 8 ( Marks: 1 ) - Please choose one Which of following services build a strong customer loyalty towards company and its products? Customer services Public relations(PR) Bulletin board Exhibitions. Question No: 9 ( Marks: 1 ) - Please choose one Track the customers online and do personalization is only possible through which of the following file(s) analysis. log files cookie data mining log files and cookies. Question No: 10 ( Marks: 1 ) - Please choose one Which of the following is true for Class A: Network 01 byte and 03 hosts Network 02 bytes and 02 hosts Network 03 bytes and 01 host None of these Question No: 11 ( Marks: 1 ) - Please choose one What is the correct HTML for making a text input field?

Question No: 12 ( Marks: 1 ) - Please choose one IIS stands for: International Information Service Internet Information Server Internet Information standards All of these Question No: 13 ( Marks: 1 ) - Please choose one The payer and the payee are issued digital certificates in standard format by their respective banks. X. 509 F. 609 L.8999 N.586 Question No: 14 ( Marks: 1 ) - Please choose one What is a E-Cash wallet ? Hardware Agent Software All of the above Question No: 15 ( Marks: 1 ) - Please choose one An E-cash coin consists of element (s) like: Serial # provided by client Key version Serial# signed by E-cash bank All of the above Question No: 16 ( Marks: 1 ) - Please choose one What is Ultimate consumer orientation? Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. Secondary Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of supply chain. None of them Question No: 17 ( Marks: 1 ) - Please choose one Customer data can be gathered and analyzing it customers can be served in a better Manner according to their needs, Which is best option? Customization Customer orientation Customer satisfaction Focus Question No: 18 ( Marks: 1 ) - Please choose one A company ABC web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death in that culture. Which is the international barrier it is having? Culture Language Lack of trust Infrastructure Question No: 19 ( Marks: 1 ) - Please choose one Exclusive right granted by law to make, use and sell an invention. What is called? Parasites Trade mark Patent infringement Copyright Question No: 20 ( Marks: 1 ) - Please choose one Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act. Which legal issue arises due to such acts? Cyber Crimes Online Defamation Cyber squatting None

Question No: 21 ( Marks: 1 ) - Please choose one How can you reference part of a string? text.substr(5,6); text.part(5,6) text.piece(5,6) text.split(5,6); Question No: 22 ( Marks: 1 ) - Please choose one This is an example of 0-tier architecture 1-tier architecture 2-tier architecture n-tier architecture Question No: 23 ( Marks: 1 ) - Please choose one Following are the names of some well known e-commerce software, EXCEPT ----------- . Intershop IBM's WebSphere Commerce Professional Edition Microsoft Commerce Server 2002 Microsoft SQL Server 2005 Question No: 24 ( Marks: 1 ) - Please choose one In Style Sheets, How do you change the font of an element? font-face: font: font-family: font-style: Question No: 25 ( Marks: 1 ) - Please choose one A paper signature is believed to be more reliable than a digital signature. True False Question No: 26 ( Marks: 1 ) - Please choose one The serial # generated by the cyberwallet gets multiplied by blinding factor r which is known only to the ___________. Client Bank Merchant None of above Question No: 27 ( Marks: 1 ) - Please choose one SET doesnt require special software on the client or merchant side. True False Question No: 28 ( Marks: 1 ) - Please choose one The result of OLAP is displayed in the form of a __________. Data square Data Triangle Data cube Data circle Question No: 29 ( Marks: 1 ) - Please choose one Classification and Association belong to which of the following types of Data Mining? Selective Predictive Descriptive Additive Question No: 30 ( Marks: 1 ) - Please choose one Which one of the following algorithms does not include in public key algorithms? DSS RSA Elliptic Curves RC4 Question No: 31 ( Marks: 1 ) What is a basic purpose of payment gateway in SET transactions? Explain shortly. Answer: The role of payment gateway is to connect entities on the internet with those which are not on the internet such as the electronic network of banks.Payment gateway provides the security of data transmission to/from the acquirer bank.. Question No: 32 ( Marks: 1 ) Provide after sales service and support is one of the areas in a strategic business unit according to Michael Porter. List what kind of activities is performed in this area? Answer: 1-Installing 2-Testing, 3-Repairing 4-Maintaining a product

5-Fulfilling 6-Warranties Question No: 33 ( Marks: 2 ) What do we mean by Affiliation between two parties? Explain shortly. Affiliation: Generally, affiliation exists when one business controls or has the power to control another or when a third party (or parties) controls or has the power to control both businesses. Control may arise through ownership, management, or other relationships or interactions between the parties.Merger us an example of afiliation. Question No: 34 ( Marks: 2 ) Discuss briefly how a software developer who releases annual updates of his software can reduce the price of his product and increase sales revenue in an E- Commerce environment. Question No: 35 ( Marks: 3 ) Under Section 21 of the ETO, the funds of the Certification Council shall comprise of:? Answer:Under Section 20: Grants from the Federal Government; Fee for grant and renewal of accreditation certificate; and Fee, not exceeding ten Rupees, for every certificate deposited in the repository; fines. Question No: 36 ( Marks: 3 ) What is business promotion? Briefly explain any two methods of business promotion. 1+2 Answer: E-business promotions can attract visitors to your site and induce them to purchase. Promotional messages can be sent both online and offline. Discounts Discount advertisements through magazines, newspapers, web sites etc. can attract new and repeat customers. Coupons Online coupons are placed on certain popular sites to attract customers for online shopping. They can use these coupons for shopping through specific web sites. Question No: 37 (Marks: 3 ) How does the client purchase from merchant using E-Cash Payment system? Show the payment request format. Question No: 38 ( Marks: 5 ) Explain the advantages of E-business regarding todays scenario. Cost Effective Marketing and Promotions: Using the web to market products guarantees worldwide reach at a nominal price. Advertising techniques like pay per click advertising ensure that the advertiser only pays for the advertisements that are actually viewed. Developing a Competitive Strategy: Firms need to have a competitive strategy in order to ensure a competitive advantage. Without an effective strategy, they will find it impossible to maintain the advantage and earn profits. The strategy, that the firms can pursue, can be a be a cost strategy or a differentiation strategy Better Customer Service: E-Business has resulted in improved customer service. Many a times, on visiting a website, the customer is greeted by a pop-up chat window. Readily available

customer service may help in encouraging the customer to know more about the product or service. Moreover, payments can be made online, products can be shipped to the customer without the customer having to leave the house. Bulk transactions One can do bulk transactions during one visit to an e-shop, since there is no limitation of collecting, packaging or carrying goods in contrast to shopping from a traditional offline shop. Question No: 39 ( Marks: 5 ) Elaborate the importance of OLAP in decision making support for an organization. Answer: Online Analytical Processing (OLAP) uses knowledge for the purpose of presenting data at different levels of abstraction. It is different from data mining as it does not help in making predictions. But data can be viewed and reviewed in many different ways for decision making purpose. The result is showed in form of a data cube. Question No: 40 ( Marks: 10 ) What elements should we consider for global marketing of e-businesses? Describe briefly. As a marketer, when you are aiming at marketing your business in the entire world, you have to keep certain considerations in mind. Your web design must provide content in various languages and provide prices in various currencies, so that people belonging to different countries/cultures can understand the information contained in your web site. A regular display of currency exchange rate information can be useful in this behalf. Today, tools exist that can translate emails and your web sites into different languages. Another important consideration should be as to whether the country where you are doing the business has the required infrastructure to support your e-business. For example, whether you have a proper distribution channel of your products in a country you are doing business in. Similarly, you should carefully choose a payment system for your e-business which is compatible with the environment of a country where you are doing business. For example, a payment mechanism using SET cannot be considered as compatible with business environment in most of the third world countries. Question No: 41 ( Marks: 10 ) Give an example to show how members of supply chain can work together to reduce inventory, increase quality of product, reduce production cost and increase process speed. In 1997 the company had to stop its two assembly operations for several weeks due to errors in production and scheduling system causing it a huge financial loss. Thereafter, it decided to invest in information systems in every element of its supply chain. Involving its suppliers in the process, it began the use of EDI

and internet technology, so that the suppliers could supply the right part or assembly at right time to prevent production delay. Now, the suppliers could get engineering specifications and drawings before the start of manufacturing using a secure internet connection, and plan their own business activities, accordingly. Also, members of the supply chain could have the knowledge of the completion of milestones and any changes in production schedule. In two years time, this approach resulted in reducing half the time needed to complete individual assembly processes. Thus, instead of waiting for 3 years the customer airlines could now have the ordered airplane ready for delivery in 10-12 months. Furthermore, the company launched a spare parts web site for ordering replacement parts. The site allowed customer airlines to register and order for replacement parts through browsers. Soon, the site was processing 5000 transactions per day at much lower cost as compared to orders cost through phone, mail, or fax. It also improved customer service in the sense that most parts could now be delivered the same day or the next day.
FINALTERM EXAMINATION Fall 2009 IT430- E-Commerce (Session - 3) Solved By vuZs Solution Team Time: 120 min Marks: 75 Question No: 1 ( Marks: 1 ) - Please choose one Four Ps in Marketing Mix are: Product, price, place, promotion Price, person, place, problem Place, product, property, promotion Promotion, place, product, planning Question No: 2 ( Marks: 1 ) - Please choose one JIT Stands for Just In Time Joint investigation Technique Join in Training Just In Total Question No: 3 ( Marks: 1 ) - Please choose one

Advertising Supported Revenue Model includes Yahoo portal Employment sites Newspaper Publishers All of the above Question No: 4 ( Marks: 1 ) - Please choose one Which of the following is true for Class A: Network 01 byte and 03 hosts Network 02 bytes and 02 hosts Network 03 bytes and 01 host None of these Question No: 5 ( Marks: 1 ) - Please choose one What is the correct syntax of the declaration which defines the XML version? None of these Question No: 6 ( Marks: 1 ) - Please choose one Which of the following needs human action to execute? Virus Worm Trojan Horse All of these

Question No: 7 ( Marks: 1 ) - Please choose one In the digital signature technique, the sender of the message uses ________ to create cipher text

His or Her own symmetric key His or her own private key His or her own public key The receivers private key Question No: 8 ( Marks: 1 ) - Please choose one PIN stands for: Payment investigation Number Password Identification Number Personal Identification Number Personal Identification Numeric Question No: 9 ( Marks: 1 ) - Please choose one

An electronic check contains a(n) to the payers bank to make a specified payment to the payee Serial# Private key Instruction All of the above Question No: 10 ( Marks: 1 ) - Please choose one It is the ability to sell the goods or provide the service at a price that is lower than that of competitors, and thus attract more customers. What is called? Cost leadership Price leadership Focus Differentiation Question No: 11 ( Marks: 1 ) - Please choose one E-commerce is a combination of three different areas of study, namely, --------, ---------------- and --------------- Internal, external support, Support Technology, business and law/policy Primary, Secondary, R&D Sale, purchase, feed back Question No: 12 ( Marks: 1 ) - Please choose one A company ABC web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death in that culture. Which is the international barrier it is having? Culture Language Lack of trust Infrastructure Question No: 13 ( Marks: 1 ) - Please choose one GM Celebes manufacturing electronic goods and FryChips co selling French fries. Under the traditional trade mark law both these companies can have the same trade mark/trade name such as frys. The problem arises when both apply for the registration of a domain name containing the word frys. Here, both are legitimate claimants of this domain name but due to the element of uniqueness of domain names only one of them can be assigned the desired domain name.

Which legal issue arises in this situation?

Domain name conflict Cyber squatting Concurrent use None Question No: 14 ( Marks: 1 ) - Please choose one Which type of Data Mining contains the elements as Support and confidence? Classification Association Characterization Clustering Question No: 15 ( Marks: 1 ) - Please choose one OLAP stands for Online Analytical Program Online Analytical Processing Online Application Program Online Analysis Performance Question No: 16 ( Marks: 1 ) - Please choose one Characterization and Clustering belong to which of the following types of Data Mining? Additive Predictive Selective Descriptive Question No: 17 ( Marks: 1 ) - Please choose one Support activities in Value Chain model includes Finance and Administration Human Resources Technology Development All of

Question No: 18 ( Marks: 1 ) - Please choose one Which of the following is NOT processed on the client side? Cookies JavaScript CGI scripts Applets Question No: 19 ( Marks: 1 ) - Please choose one Due to which characteristics, ATM network are covered under E-commerce ? Exchange of information through computer networks Internet. services. None of the above. Question No: 20 ( Marks: 1 ) - Please choose one SET is better than SSL. True False Question No: 21 ( Marks: 1 ) - Please choose one Exchanging of products,

Dividing market, with respect to people having income level greater than Rs 30000, is geographic segmentation. True. False. Question No: 22 ( Marks: 1 ) - Please choose one Which of the following is NOT an identified behavioral mode of customers on the web? Browsers Buyers Shoppers Seller Question No: 23 ( Marks: 1 ) - Please choose one Which of these is a way of conducting market research? Phone. Interviews Questionnaires All of above. Question No: 24 ( Marks: 1 ) - Please choose one Which of these is NOT a stage of knowledge discovery process? Transformation Data mining Pattern evaluation Process evaluation Question No: 25 ( Marks: 1 ) - Please choose one According to Michael Porter, test marketing is an example of primary activity in a strategic business unit. Identify the area in which this task is performed. Design Market and sell Deliver activities relate to storage Purchase materials and supplies

Question No: 26 ( Marks: 1 ) - Please choose one Electronic banking is also known as __________. Cyber banking Virtual banking Online banking All of above Question No: 27 ( Marks: 1 ) - Please choose one Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Is it? True False

Question No: 28 ( Marks: 1 ) - Please choose one In datalink layer, data packets are placed inside Data frames Data boxes Data streams None of these

Question No: 29 ( Marks: 1 ) - Please choose one Which one of the following algorithms does not include in public key algorithms? DSS RSA Elliptic Curves RC4

Question No: 30 ( Marks: 1 ) - Please choose one Which of the following is HTML tag could nt be used as CSS tag? Question No: 31 ( Marks: 1 ) What is stand for WIPO? World Intellectual Property Organization Question No: 32 ( Marks: 1 ) Name any 3 E-Business models? 1-Storfront Model 2-Auction Model 3-Onlien Banking Question No: 33 ( Marks: 2 ) What is the basic purpose of using hash function in communication? A hash function is applied on the message to get the message digest.

Question No: 34 ( Marks: 2 ) What is Competition between existing players ?. If there are many players having same size and stretagy but having different qualities in product and services. Then there is true competition between them regarding price of that product or service.

Question No: 35 ( Marks: 3 ) On what basis, generally the protection under fair use may be sought? Doesnt need to explain.

Nature of use:The work should be used only for non profitable and for education purposes.

Nature Of Work:The copied work is effectively covered under fair use as compaird to that of some new or creative work Extent of the work copied:The extent of work to be copied under fair use shouold be small so that court take some favourable steps to accussed. Question No: 36 ( Marks: 3 ) In Virtual PIN Payment system, merchant side is less secure than buyer side. Do you agree with this statement? Justify your answer. 1+2 Yes , I am agree with this statement that marchant side is less secure than buyer side because marchant send the product before payment.So there is threat of non payment from buyer side.

Question No: 37 ( Marks: 3 ) What are the disadvantages of Data Mining? Privacy Issues Personal privacy has always been a major concern in this country. In recent years, with the widespread use of Internet, the concerns about privacy have increase tremendously. Because of the privacy issues, some people do not shop on Internet. They are afraid that somebody may have access to their personal information and then use that information in an unethical way; thus causing them harm. (1+1+1)

Security issues Although companies have a lot of personal information about us available online, they do not have sufficient security systems in place to protect that information. For example, recently the Ford Motor credit company had to inform 13,000 of the consumers that their personal information including Social Security number, address, account number and payment history were accessed by hackers who broke into a database belonging to the Experian credit reporting agency.

Maintanence Problem Another problem with the data warehouse is that it is difficult to maintain. Any organization that is considering using a data warehouse must decide if the benefits outweigh the costs. Once you have paid for the data warehouse, you will still need to pay for the cost of maintenance over time. The costs involved with this must always be taken into consideration.

Question No: 38 ( Marks: 5 ) Describe the advantages of E-Business in detail. Personalized service: product , place , promotion and price are the 4 P`s of marketing mix. Now Personalization is the 5th P introduced in E-Business.The bahavioural information about customers can be added in data base and then can be utilized to by teh E-Commerce sites to analyze the needs of taht particular customer.So, in this way personalized service can be provided to customer.

High-quality customer service With the help of feed back of potential customers online businesses can improve the quality of their products according to the needs and demands of thier customers.So it will improve the customer services of E-Buiseness.

No inventory cost In case of E-Business we dont need to have any physical place to start business. In this way it reduces overheads and invemtory costs.An onilne busines can take orders from customers with out bearing teh inventory cost like offline traditional businesses. Worldwide reach of your business: In E-Busines there is a chance to extend your business thruoghout the world. So, global reach is possible in E-Business. Electronic catalogues Electronic catalogue is used in online busines have many adbvantages over paper catalogues.

Bulk transactions Due to no limitations on collecting , carrying and packaging goods we can order bulk transactions during even one visit at online shops. Improved supply chain management suppliers and manufacturer are the active members of supply chain members. They are effective addition in E-Business.

Question No: 39 ( Marks: 5 ) Elaborate the importance of OLAP in decision making support for an organization. OLAP makes use of baksground knowledge regarding the domain of the data being studied .It is different from data mining as it does not provide patterns for any predictions.It allows the data being studied to present at different level of abstraction.Informartion stored in the data base can be viewed and reviewed conveniently in any formate .In case of OLAP at different levels facilitate managers and decision makers in making decisions.OlAP uses different tools namely, drill down , roll up and and slice and dice etc.By using drill down we can further dig into the data for recieving more information whcih is specific.Roll up works opposite to the drill down , It is used to sum up the information in a particular dimention to show the results.

Question No: 40 ( Marks: 10 ) What is Porters 5 forces model ? Discuss briefly 5 forces with its purpose. Porter`s models helps a firm to identify threats to its sompetitive position.and to devide plans accordingly which includes uses of IT and E commerce to protect or enhance his competitive position .

Following are the 2 forces models of porter. 1- Threats of new potentian entrants to the sector This threats relates to the opportunity that how easily a company having different products and services can enter into the a given trade sector.How effeciently it remove teh barriers liek IT, Capital and skills.For example to start online banking you need not to 2-Threats of substitute product or service in existingtrade 3-Bragaining power of the buyers 4-Bargaining power of the suppliers 5-Competition between existing players Question No: 41 ( Marks: 10 ) What are the advantages and disadvantages of offline and online catalogues? 5+5 Online catalogues vs. Paper catalogues

Paper catalogs Advantages Easy to create a catalog without high technology Reader is able to look at the catalog without computer system More portable than electronic catalog Disadvantages Difficult to update changes in the product information Only limited number of products can be displayed Online or electronic catalogs Advantages Easy to update product information Able to integrate with the purchasing process Good search and comparison capabilities Able to provide timely, up-to-date product information Can provide broad range of product information Possibility of adding voice and motion pictures Cost savings Easy to customize

FINALTERM EXAMINATION Fall 2009 IT430- E-Commerce

Question No: 1 ( Marks: 1 ) - Please choose one

At deposit stage, the serial number is ..by E-Cashbank

Known Unknown Kept Secret Informed Question No: 2 ( Marks: 1 ) - Please choose one How many kinds of Web Portals are? 3 2 56 Portals are the web sites which provide chance to the visitors to find almost everything in one place. Horizontal portals provide information about a very broad range of topics. Search engine is the example of a horizontal portal. Vertical portals provide information pertaining to a single area of interest. Community Portals such as those related to medical or legal profession are the examples of a vertical portal. Online shopping is a popular addition to the some portals such as yahoo.com. Portals allow users to browse independently owned storefronts unlike online shopping malls. Question No: 3 ( Marks: 1 ) - Please choose one Let us, suppose that you have hosted your e-commerce website, When you provide opt-in e-mail option to your customers on your website and customer opt for it , what does it mean to receive ? Information about product through advertisement Information about product through e-mail Information about services available on it Information about News through e-mail. You can also provide the opt-in e-mail option to your customers on your web site. If they opt for it, this means that they want to receive through email any product information, offers or promotions etc. in the future. Question No: 4 ( Marks: 1 ) - Please choose one Track the customers online and do personalization is only possible through which of the following file(s) analysis. log files cookie data mining log files and cookies. There are software tools or tracking devices that can provide feedback on how many number of internet users actually viewed a banner or a marketing message and how many actually clicked on the

advertisement. Log files consist of data generated by site visits and include information about each visitors location, IP address, time of visit, frequency of visits etc. There are businesses that provide the services of analyzing web log files. The results would show how effective your web site is and indicate the top-referring web sites. You know that cookies allow e-commerce sites to record visitor behavior. They can be used to track customers online and do personalization. Question No: 5 ( Marks: 1 ) - Please choose one When customer life cycle is used to create different groups of customers, it is called? Targeting Customers Dynamic groups Customer Life Cycle Segmentation Group Development Question No: 6 ( Marks: 1 ) - Please chose one Network addresses 128--- 191 range belongs to which of the following class networks? A B C E Question No: 7 ( Marks: 1 ) - Please choose one Which one of following illustrates relationship between "" and // ? Closely related Hide the code Different Hide the tags

Question No: 8 ( Marks: 1 ) - Please choose one Which of the following property falls in HTTP? Stateless Stateful Temporary All of these Page No.88:http is stateless. Another reason why we need to write scripts or develop our back end is that we want to maintain state. Question No: 9 ( Marks: 1 ) - Please choose one FSTC stands for: Financial Services Technology Consortium Financial Secrets Technology Consortium Final Security threats control

First Service Technology Consortium Question No: 10 ( Marks: 1 ) - Please choose one Supply chain can be broken into three parts, that is ----------------- , ----------------------- and -------------------activities. Internal, external support Upstream, internal ,downstream Primary, Secondary ,R&D None of them 1-Upstream activities relate to materials/services or the input from suppliers 2-Internal activities relate to manufacturing and packaging of goods 3-Downstream activities relate to distribution and sale of goods to distributors/customers Question No: 11 ( Marks: 1 ) - Please choose one The process of taking active role in working with suppliers to improve products and processes is called?

Value chain management Supply chain management Supply chain management software Porter Model Question No: 12 ( Marks: 1 ) - Please choose one What is Ultimate consumer orientation? Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. Secondary Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of supply chain. None of them Question No: 13 ( Marks: 1 ) - Please choose one Many search engines rank the site by using a program called Spider Scorpion Moon Cobweb

Page No.138: Many search engines rank the site by using a program called spider which inspects the site before ranking. Question No: 14 ( Marks: 1 ) - Please choose one E-commerce is a combination of three different areas of study, namely, --------, ---------------- and --------------- Internal, external support, Support Technology, business and law/policy Primary, Secondary, R&D Sale, purchase, feed back

Page No.161: E-commerce is a combination of three different areas of study, namely, technology, business and law/policy. We have studied the technology and business side of e-commerce to a reasonably good extent. Now, we have to start the law and policy side of e commerce. However, before we do that lets discuss some interesting issues related to the international aspect of ecommerce.

Question No: 15 ( Marks: 1 ) - Please choose one In which type of data mining, Apriori algorithms is used? Classification Association Characterization Clustering Page No.143: Apriori algorithm is used for association mining. Question No: 16 ( Marks: 1 ) - Please choose one EDI has the key feature(s) No paper work No human intervention Exchange of information takes place in seconds of these Page No.147:ELECTRONIC DATA INTERCHANGE Question No: 17 ( Marks: 1 ) - Please choose one Addresses are tied to the device itself and give no clue to it's location on a global scale. This is the characteristics of IP RIP MAC None of the given All

MAC addresses are tied to the device itself and give no clue to it's location on a global scale. MAC AB:CD:EF:01:01:01 may be in the US and MAC AB:CD:EF:01:01:02 may be in Australia. So a router would have to keep track of where every individual MAC is in the world and how to get to it. That just isn't feasible. With an IP address you can be fairly sure that IP 1.2.3.2 and 1.2.3.3 are on the same network and the router that looks after the subnet they live on will know who is who. Therefor your router (or your ISP's) need only to know how to get that networks router. Reducing the amount of routes it needs to know by a couple of magnitudes. Question No: 18 ( Marks: 1 ) - Please choose one When two or more intranets are connected to each other they form a/an ------------- . intranet internet extranet VPN

Extranet when two or more intranets are connected with each other, they form an Extranet e.g, Virtual Private Network Question No: 19 ( Marks: 1 ) - Please choose one Whic h attribute can be used to make a region non-clickable? none of the given target alt nohref

Page No.37: Nohref attribute can be used to make a region non-clickable. For example, Question No: 20 ( Marks: 1 ) - Please choose one Which of the following payment mode does not require customer to pay interest to the bank on each transaction? Credit card Debit card Electronic check All of the above

Page No.110: In case of a credit card the issuer bank charges interest from the client at a specified rate on the amount lent. On the other hand, in case of a debit card no such interest is payable since the customer uses his/her own money in that case. Question No: 21 ( Marks: 1 ) - Please choose one Cyber wallet can automatically assemble the correct payment and pay it too. True False Page No.118:Cyber wallet automatically assembles the correct payment amount and pays. Question No: 22 ( Marks: 1 ) - Please choose one

SET doesnt require special software on the client or merchant side. True False SET requires software on, both, the client and the merchant side Question No: 23 ( Marks: 1 ) - Please choose one Which model allows the users to log-on on a website and assume the role of bidder or seller?

Online Banking. Storefront Model E-Learning. Auction Model. In this model there are auction sites to which the users can log-on and assume the role of a bidder or seller. As a seller, one has to specify the minimum price to sell ones item (called reserve price), the description of the item and the deadline to close the auction. At the end of the auction, the seller and the bidder are notified by the auction site and the payment mechanism and delivery mode is worked out. Auction sites charge commission on sales. Question No: 24 ( Marks: 1 ) - Please choose one According to Michael Porter, fabricating is an example of primary activity in a strategic business unit. Identify the area in which this task is performed. Market and sell Deliver activities relate to storage Purchase materials and supplies Manufacture product or create service Manufacture product or create service activities relate to transformation of materials and labor into finished products, e.g, fabricating, assembling, packaging etc. Question No: 25 ( Marks: 1 ) - Please choose one Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Is it? True False

Question No: 26 ( Marks: 1 ) - Please choose one In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, --------------- and --------- Acceptance and consideration Acceptance and Rejection Approval and consideration None An offer is a commitment with certain terms made to another party such as willingness to buy or sell certain product.sell certain product.A contract is formed when a party accepts the offer of another party

for consideration. Consideration is the agreed exchange of something valuable for both the parties such as money, property or services. Question No: 27 ( Marks: 1 ) - Please choose one In online environment acceptances may be issued by an imposter/cheater that has authority to bind the online business True False

In online environment acceptances may be issued by an imposter/cheater that does not have authority to bind the online business. To overcome this problem companies and individuals can use digital signatures to establish identity in online transactions. Question No: 28 ( Marks: 1 ) - Please choose one #00ff00 in HTML indicates Pure green color Pure blue color Pure red color Pure yellow color Question No: 29 ( Marks: 1 ) - Please choose one Virtual PIN Payment System requires both merchant and buyer to register with _______________. Auto Clearing House (ACH) First Virtual (FV) DSS (Digital Signature Standard) DES (Data Encryption Standard) Question No: 30 ( Marks: 1 ) - Please choose one Classification and Association belong to which of the following types of Data Mining? Selective Predictive Descriptive Additive Classification and association are predictive types of data mining while characterization and clustering represent the descriptive type. Question No: 31 ( Marks: 1 ) What should be the length range in bits of a message digest? A message digest is a single large number typically between 128 to 256 bits in length. Question No: 32 ( Marks: 1 ) Just write down the name of Elements of Branding?

Differentiation Relevance Perceived Value Question No: 33 ( Marks: 2 ) What is civil law? Give precise answer. Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Civil wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general. Question No: 34 ( Marks: 2 ) What do we mean by Affiliation between two parties? Explain shortly. Affiliation: Generally, affiliation exists when one business controls or has the power to control another or when a third party (or parties) controls or has the power to control both

businesses. Control may arise through ownership, management, or other relationships or interactions between the parties.Merger us an example of afiliation. Question No: 35 ( Marks: 3 ) What is concept of fair use in copyright law? There is a concept of fair use or fair dealing in copyright law that provides legitimate exceptions to copyright violation. Generally, fair use of a copyrighted work includes copying it for use in criticism, comment, news reporting, teaching, scholarship or research. Experts draw support from this concept of fair use to deal with the problem of copyright over the internet. It is also argued that in cases where the author of a work has himself provided a hyperlink leading to his work, he should be regarded as giving the implied authority or license to download or make copies of his work. In such an eventuality, the issue of copyright should not arise according to an opinion.

Question No: 36 ( Marks: 3 ) Digital signatures are considered more reliable than paper signatures. Do you agree with this statement? Briefly justify your answer. 1+2 Question No: 37 ( Marks: 3 ) What is ERP? Briefly explain its use in an organization? (1 + 2)

ERP is an approach that attempts to integrate all departments and functions across a company onto a single computer system that can serve all those different departments' particular needs. For example, finance,

manufacturing and the warehouse department of a company may have their own software to perform tasks specific to each one of them. However, each software can be linked together so that a customer service

representative can see the credit rating of a customer from finance module, warehouse information from

warehouse module, and shipment information from the shipment module. SAP is an example of ERP

software. ERP is complex. It is not intended for public consumption as proper integration of ERP with ecommerce applications is still a major problem. Question No: 38 ( Marks: 5 ) What do you perceive by Value Added Network? Explain its advantages too with reference to EDI. (2+3)

Value added networks are third party networks that provide services to execute authorized transactions with valid trading partners using EDI. Each VAN has a centralized computer system that maintains two files for each user, that is, Postbox: where outgoing messages are placed, and Mailbox: where incoming messages can be picked up.

Advantages: Two big advantages of using a VAN in EDI are time independence and protocol independence. Time independence means that the sending and receipt of the interchange or messages can be carried out at the convenience of the users involved. Thus, they are not required to be connected with each other at the same time. Protocol independence means that interchanges are re-enveloped with the transmission protocol appropriate to the recipient when they are retrieved from the postbox by the VAN. Thus, a VAN can provide protocol compatibility between the sender and the recipient, wherever that is missing.

Question No: 39 ( Marks: 5 ) What is ACH? What is its role in Virtual PIN system? 2+3 ACH stands for Automated Clearing House.A house through which the bank of payee clears the check with the help of traditional automated clearing house.

Role of ACH in Virtual PIN System:

A deposit request encrypted with banks public key accompanies the payment information. E-cash bank

maintains a database of spent coins. On receipt it checks whether the coin is valid and whether it has

already been spent or not (to prevent double spending) by referring to its database. If the coins are valid the bank credits the merchants account. Thus, if the client has sent valid coins worth $10 for payment to the

merchant, and the merchant already has $90 in his account then an amount of $ 10 would be added in his

account making it $ 100. Later, the merchant can request the e-cash bank to transfer this amount in his

account with the acquirer bank. This can be done through ACH and the merchant can physically withdraw the money form the acquirer bank.

Question No: 40 ( Marks: 10 )

What is data warehousing? What are its main tasks? What is its importance for an organization?

The primary concept behind data warehousing is that the data stored for business analysis can most effectively be accessed by separating it from the data in the operational systems. A data warehouse, therefore, is a collection of data gathered from one or more data repositories to create a new, central database. For example a hospital may create a data warehouse by extracting the operational data it has accumulated concerning patient information, lab results, drug use, length of stay, disease state, etc,. Data Warehousing is not just the data in the warehouse, but also the architecture and tools to collect, query, analyze and present information.

Question No: 41 ( Marks: 10 )

Precisely explain the steps of Knowledge discovery from database in order of their occurrence.

Answer: Knowledge discovery process include Data cleaning, Data selection, Data transformation, Data Mining, Data integration, Pattern evaluation & knowledge presentation.

Explaination of each step: 1-Data cleaning Data cleaning means that missing values should be provided in different fields/columns wherever needed and any impossible or erroneous values should be substituted by correct/reasonable ones. For example if the age of a person is typed as 1000 years in the column age then an average age value can be put in its place. 2-Data selection Where there are quite a few erroneous or missing values in a row, then that row can be discarded/deleted altogether. This process is called data selection. 3-Data transformation In data transformation, the data from all different sources is converted into the same format. For example, date typed under a column should be in the same format in the entire data collected through different sources. 4-Data integration In data integration, data from all the sources is assembled or integrated into one and housed in the data warehouse.

5-Data Mining Now, this cleaned, transformed, selected and integrated data is fed to the data mining tool from a data warehouse for data mining purpose. 6-Pattern evaluation & knowledge presentation The results/ patterns are evaluated by managers and useful knowledge is thus gained. Note that almost 80% of the total time used in a knowledge discovery process is spent on just making the data fit for mining, that is, data cleaning, data transformation, data selection etc.

FINALTERM EXAMINATION Fall 2009 Question No: 1 ( Marks: 1 ) - Please choose one Four Ps in Marketing Mix are: Product, price, place, promotion Price, person, place, problem Place, product, property, promotion Promotion, place, product, planning Question No: 2 ( Marks: 1 ) - Please choose one JIT Stands for Just In Time Joint investigation Technique Join in Training Just In Total IT430- E-Commerce (Session - 3)

Question No: 3 ( Marks: 1 ) - Please choose one Advertising Supported Revenue Model includes Yahoo portal Employment sites Newspaper Publishers All of the above Question No: 4 ( Marks: 1 ) - Please choose one Which of the following is true for Class A: Network 01 byte and 03 hosts Network 02 bytes and 02 hosts Network 03 bytes and 01 host None of these Question No: 5 ( Marks: 1 ) - Please choose one What is the correct syntax of the declaration which defines the XML version? <xml version="1.0" /> <?xml version="1.0" />

<?xml version="1.0"?> None of these Question No: 6 ( Marks: 1 ) - Please choose one Which of the following needs human action to execute? Virus Worm Trojan Horse All of these

Question No: 7 ( Marks: 1 ) - Please choose one

In the digital signature technique, the sender of the message uses ________ to create cipher text His or Her own symmetric key His or her own private key His or her own public key The receivers private key

Question No: 8 ( Marks: 1 ) - Please choose one PIN stands for: Payment investigation Number Password Identification Number Personal Identification Number Personal Identification Numeric Question No: 9 ( Marks: 1 ) - Please choose one An electronic check contains a(n) to the payers bank to make a specified payment to the payee Serial# Private key Instruction All of the above Question No: 10 ( Marks: 1 ) - Please choose one It is the ability to sell the goods or provide the service at a price that is lower than that of competitors, and thus attract more customers. What is called? Cost leadership Price leadership Focus Differentiation Question No: 11 ( Marks: 1 ) - Please choose one E-commerce is a combination of three different areas of study, namely, --------, ---------------- and --------------- Internal, external support, Support Technology, business and law/policy Primary, Secondary, R&D Sale, purchase, feed back Question No: 12 ( Marks: 1 ) - Please choose one A company ABC web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death in that culture. Which is the international barrier it is having? Culture Language Lack of trust Infrastructure Question No: 13 ( Marks: 1 ) - Please choose one GM Celebes manufacturing electronic goods and FryChips co selling French fries. Under the traditional trade mark law both these companies can have the same trade mark/trade name such as frys.

The problem arises when both apply for the registration of a domain name containing the word frys. Here, both are legitimate claimants of this domain name but due to the element of uniqueness of domain names only one of them can be assigned the desired domain name. Which legal issue arises in this situation? Domain name conflict Cyber squatting Concurrent use None Question No: 14 ( Marks: 1 ) - Please choose one Which type of Data Mining contains the elements as Support and confidence? Classification Association Characterization Clustering Question No: 15 ( Marks: 1 ) - Please choose one OLAP stands for Online Analytical Program Online Analytical Processing Online Application Program Online Analysis Performance Question No: 16 ( Marks: 1 ) - Please choose one Characterization and Clustering belong to which of the following types of Data Mining? Additive Predictive Selective Descriptive

Question No: 17 ( Marks: 1 ) - Please choose one Support activities in Value Chain model includes Finance and Administration Human Resources

Technology Development All of these. Question No: 18 ( Marks: 1 ) - Please choose one Which of the following is NOT processed on the client side? Cookies JavaScript CGI scripts Applets Question No: 19 ( Marks: 1 ) - Please choose one Due to which characteristics, ATM network are covered under E-commerce ? Exchange of information through computer networks Internet. Exchanging of products, services. None of the above.

Question No: 20 ( Marks: 1 ) - Please choose one SET is better than SSL. True False

Question No: 21 ( Marks: 1 ) - Please choose one Dividing market, with respect to people having income level greater than Rs 30000, is geographic segmentation. True. False.

Question No: 22 ( Marks: 1 ) - Please choose one Which of the following is NOT an identified behavioral mode of customers on the web? Browsers Buyers Shoppers Seller Question No: 23 ( Marks: 1 ) - Please choose one Which of these is a way of conducting market research? Phone. Interviews. Questionnaires. All of above. Question No: 24 ( Marks: 1 ) - Please choose one Which of these is NOT a stage of knowledge discovery process? Transformation Data mining Pattern evaluation Process evaluation Question No: 25 ( Marks: 1 ) - Please choose one According to Michael Porter, test marketing is an example of primary activity in a strategic business unit. Identify the area in which this task is performed. Design Market and sell Deliver activities relate to storage Purchase materials and supplies Question No: 26 ( Marks: 1 ) - Please choose one Electronic banking is also known as __________. Cyber banking Virtual banking Online banking All of above Question No: 27 ( Marks: 1 ) - Please choose one Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Is it? True False

Question No: 28 ( Marks: 1 ) - Please choose one

In datalink layer, data packets are placed inside Data frames Data boxes Data streams Question No: 29 ( Marks: 1 ) - Please choose one Which one of the following algorithms does not include in public key algorithms? DSS RSA Elliptic Curves RC4 None of these

Question No: 30 ( Marks: 1 ) - Please choose one Which of the following is HTML tag could nt be used as CSS tag? <style> <h1> <p> Question No: 31 ( Marks: 1 ) What is stand for WIPO? World Intellectual Property Organization Question No: 32 ( Marks: 1 ) Name any 3 E-Business models? 1-Storfront Model 2-Auction Model 3-Onlien Banking Question No: 33 ( Marks: 2 ) What is the basic purpose of using hash function in communication? A hash function is applied on the message to get the message digest. <a>

Question No: 34 ( Marks: 2 ) What is Competition between existing players ?. If there are many players having same size and stretagy but having different qualities in product and services. Then there is true competition between them regarding price of that product or service. Question No: 35 ( Marks: 3 ) On what basis, generally the protection under fair use may be sought? Doesnt need to explain. Nature of use:The work should be used only for non profitable and for education purposes.

Nature Of Work:The copied work is effectively covered under fair use as compaird to that of some new or creative work Extent of the work copied:The extent of work to be copied under fair use shouold be small so that court take some favourable steps to accussed. Question No: 36 ( Marks: 3 ) In Virtual PIN Payment system, merchant side is less secure than buyer side. Do you agree with this statement? Justify your answer. Yes , I am agree with this statement that marchant side is less secure than buyer side because marchant send the product before payment.So there is threat of non payment from buyer side. Question No: 37 ( Marks: 3 ) What are the disadvantages of Data Mining? Privacy Issues Personal privacy has always been a major concern in this country. In recent years, with the widespread use of Internet, the concerns about privacy have increase tremendously. Because of the privacy issues, some people do not shop on Internet. They are afraid that somebody may have access to their personal information and then use that information in an unethical way; thus causing them harm. Security issues Although companies have a lot of personal information about us available online, they do not have sufficient security systems in place to protect that information. For example, recently the Ford Motor credit company had to inform 13,000 of the consumers that their personal information including Social Security number, address, account number and payment history were accessed by hackers who broke into a database belonging to the Experian credit reporting agency. Maintanence Problem Another problem with the data warehouse is that it is difficult to maintain. Any organization that is considering using a data warehouse must decide if the benefits outweigh the costs. Once you have paid for the data warehouse, you will still need to pay for the cost of maintenance over time. The costs involved with this must always be taken into consideration. Question No: 38 ( Marks: 5 ) Describe the advantages of E-Business in detail. Personalized service: product , place , promotion and price are the 4 P`s of marketing mix. Now Personalization is the 5th P introduced in E-Business.The bahavioural information about customers can be added in data base and (1+1+1)

then can be utilized to by teh E-Commerce sites to analyze the needs of taht particular customer.So, in this way personalized service can be provided to customer.

High-quality customer service With the help of feed back of potential customers online businesses can improve the quality of their products according to the needs and demands of thier customers.So it will improve the customer services of E-Buiseness. No inventory cost In case of E-Business we dont need to have any physical place to start business. In this way it reduces overheads and invemtory costs.An onilne busines can take orders from customers with out bearing teh inventory cost like offline traditional businesses. Worldwide reach of your business: In E-Busines there is a chance to extend your business thruoghout the world. So, global reach is possible in E-Business. Electronic catalogues Electronic catalogue is used in online busines have many adbvantages over paper catalogues. Bulk transactions Due to no limitations on collecting , carrying and packaging goods we can order bulk transactions during even one visit at online shops. Improved supply chain management suppliers and manufacturer are the active members of supply chain members. They are effective addition in E-Business. Question No: 39 ( Marks: 5 ) Elaborate the importance of OLAP in decision making support for an organization. OLAP makes use of baksground knowledge regarding the domain of the data being studied .It is different from data mining as it does not provide patterns for any predictions.It allows the data being studied to present at different level of abstraction.Informartion stored in the data base can be viewed and reviewed conveniently in any formate .In case of OLAP at different levels facilitate managers and decision makers in making decisions.OlAP uses different tools namely, drill down , roll up and and slice and dice etc.By using drill down we can further dig into the data for recieving more information whcih is specific.Roll up works opposite to the drill down , It is used to sum up the information in a particular dimention to show the results. Question No: 40 ( Marks: 10 )

What is Porters 5 forces model ? Discuss briefly 5 forces with its purpose. Porter`s models helps a firm to identify threats to its sompetitive position.and to devide plans accordingly which includes uses of IT and E commerce to protect or enhance his competitive position . Following are the 2 forces models of porter. 1- Threats of new potentian entrants to the sector This threats relates to the opportunity that how easily a company having different products and services can enter into the a given trade sector.How effeciently it remove teh barriers liek IT, Capital and skills.For example to start online banking you need not to 2-Threats of substitute product or service in existingtrade 3-Bragaining power of the buyers 4-Bargaining power of the suppliers 5-Competition between existing players Question No: 41 ( Marks: 10 ) What are the advantages and disadvantages of offline and online catalogues Online catalogues vs. Paper catalogues Paper catalogs Advantages Easy to create a catalog without high technology Reader is able to look at the catalog without computer system More portable than electronic catalog Disadvantages Difficult to update changes in the product information Only limited number of products can be displayed Online or electronic catalogs Advantages Easy to update product information Able to integrate with the purchasing process Good search and comparison capabilities

Able to provide timely, up-to-date product information Can provide broad range of product information Possibility of adding voice and motion pictures Cost savings Easy to customize

IT430 Final 2010 Question No: 1 (: 1 ) - Please choose one

In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last withdrawals to the E-bank. 10 12 18 16 reF: page 119 In case network fails or computer crashes during payment transaction, coins might be lost. All signed blinded coins from last 16 withdrawals are sent by the bank to the client. Question No: 2 (: 1 ) - Please choose one

Which entity does not include in SET(secure Electronic Transaction)? Seller Buyer Payment gateway Bank

Question No: 3

(1 )

- Please choose one

Traditionally Marketer use the market segmentation(s) like Geo-graphic Segmentation Demographic Segmentation Psychographic Segmentation All of the above page 131 Question No: 4 Class C has: Network 01 byte and 03 hosts Network 02 bytes and 02 hosts Network 03 bytes and 01 host page 10 (1 ) - Please choose one

None of these Question No: 5 (: 1 ) - Please choose one

In ring topology, failure of network cable will only take down one computers network access. True False page 14 (: 1 ) - Please choose one

Question No: 6

Which device uses the IP address Switch Router Repeater None of these Question No: 7 (: 1 ) - Please choose one page 15

What is the correct HTML for inserting an image? image.gif (: 1 ) - Please choose one page 53

Question No: 8

Cryptographic Algorithms are measured in terms of Key length 108 Complexity Simplicity All of the above Question No: 9 (: 1 ) - Please choose one

Upstream activities relate to? Materials/services or the input from suppliers page 154 Manufacturing and packaging of goods Distribution and sale of goods to distributors/customers Input from suppliers and Distribution Question No: 10 (: 1 ) - Please choose one

Television, radio and print media are in a (n) . Mode. Passive Active Static

Dynamic reF: page 139 In case of television, radio or print media people are normally in a passive mode Question No: 11 (: 1 ) - Please choose one

Which of the following Barriers to International E-Commerce? Advertising Patents Infrastructure Capital Ref: page 161 Barriers to international ecommerce include lack of trust, lack of infrastructure, language and culture. Question No: 12 (1 ) - Please choose one

Exclusive right granted by law to make, use and sell an invention. What is called? Parasites Trade mark Patent infringement Copyright Ref: page 181 A patent is an exclusive right granted by law to make, use and sell an invention. Question No: 13 (: 1 ) - Please choose one

Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent

and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act. Which legal issue arises due to such acts? Cyber Crimes Online Defamation Cyber squatting None Ref: page 182 A defamatory statement is a false statement that injures the reputation of on another person or company. If a statement injures the reputation of a product or service instead of a person, it is called product disparagement. Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act. Question No: 14 (: 1 ) - Please choose one

Characterization and Clustering belong to which of the following types of Data Mining? Additive Predictive Selective Descriptive reF; page 141 Classification and association are predictive types of data mining while characterization and clustering represent the descriptive type. Question No: 15 (.: 1 ) - Please choose one

EDI stands for..

Electronic Digital Information Electronic Data Integration Electronic Data Interchange page 147 All of these Question No: 16 (: 1 ) - Please choose one

Implementing Value Chain model can help us to Reduce cost Improve quality of products Create new ways of selling products All of these. Ref: page 153 It can reduce costs of a business; It can improve quality of products; It can help in reaching new customers or suppliers; It can create new ways of selling products. Question No: 17 (1 ) - Please choose one

Following are malicious programs EXCEPT ----------------- . Back doors Trojan Horses Firewalls Worms Question No: 18 (1 ) - Please choose one page 94

Which of the following is a valid variable name? 6th_student_CGPA

first_student_CGPA last student CGPA *any_student_CGPA Question No: 19 (1 )

page 57

- Please choose one

Which of the following payment mode does not require customer to pay interest to the bank on each transaction? Credit card Debit card page 110 Electronic check All of the above Question No: 20 (1) - Please choose one

FVIPSS stands for _________. First Virtual Internet Payment System Server page 110 First Virtual International Payment System Server First Virtual International Payment System Services First Virtual Internal Payment System Services Question No: 21 (1 ) - Please choose one

Which e-business helps to improve policies, procedures, customer services, and general operations of other businesses? Online shopping malls. Selling intellectual property online. Online service providers. Online automotive sites and energy online. reF: page 129

These e-businesses help improve policies, procedures, customer service and general operations of other businesses. Question No: 22 (1 ) - Please choose one

Which of the following is NOT an identified behavioral mode of customers on the web? Browsers Buyers Shoppers Seller Ref: page 132 Browsers customers who just browse through the site with no intention of buying Buyers customers who are ready to buy right away Shoppers customers who are motivated to buy but want more information Question No: 23 (: 1 ) - Please choose one

Downstream activities relate to distribution and sale of goods to distributors/customers True False Ref: Downstream activities relate to distribution and sale of goods to distributors/customers Question No: 24 (1 ) - Please choose one page 155

Online banking is a substitute of tradition banking. Is it? True False page 158

Ref: For example, to start online banking a company does not require heavy investment in constructing buildings (branch offices), hiring staff etc. as required in traditional banking. Question No: 25 () - Please choose one

-------------means services in relation to the transformation of contents of an electronic document from its original form to one that cannot be understood or decoded by any unauthorized person Cryptography services Accredited Certification Service Provider Originator Addressee reF; pgae 163 Cryptography services means services in relation to the transformation of contents of an electronic document from its original form to one that cannot be understood or decoded by any unauthorized person. Question No: 26 (: 1 ) - Please choose one

Law is broadly divided into two classes on the basis of nature of wrong, namely, ------------ and -------------- Civil law and criminal law ETO and criminal law Supreme and Civil Law None

Ref: page 176 Law is broadly divided into two classes on the basis of nature of wrong, namely, civil law and criminal law. Question No: 27 1) - Please choose one

Each layer except has got a header. Physical layer Datalink layer Session layer Network layer Question No: 28 (1 ) - Please choose one page 4

Symmetric algorithms are faster than asymmetric? true page 105 false Ref; symmetric algorithms are faster as compared to asymmetric, Question No: 29 (1 ) - Please choose one vuzs

SET was developed in _____. 1996 1997 1998 1999 Question No: 30 : 1 ) LDA stands for _______ Lahore Development Authority Lahore Development Act pafge 165 - Please choose one page 122

Question No: 31

(: 2 )

What is Data Mining?

Question No: 32

(2 )

What is the purpose of FRAMESET tag?

Question No: 33

(: 2 )

What do we mean by "Free-Trial" promotion technique?

Question No: 34 What is UNCITRAL?

(: 2 )

Question No: 35

3)

Write precisely about the 4th stage of planning cycle?

Question No: 36

:3)

Discuss the role and responsibilities of Transport layer in OSI model?

Question No: 37

(: 3 )

How lack of trust barrier can be overcome or minimized? Discuss it briefly

Question No: 38

(3 )

Write the names of companies who were helper in developing Secure Electronic Transaction.

Question No: 39

(: 5 )

Differentiate between Cyber squatting and concurrent use with example.

Question No: 40

(: 5 )

Explain Confidence and Support as two measures of Association?

MC080406248 : Salman Ali


Time Left

57
sec(s)

Quiz Start Time: 06:58 PM

Question # 3 of 10 ( Start time: 06:59:47 PM ) Which of the following is a business promotion? Select correct option:

Total Marks: 1

Free-Trials

Free-Shipping

Both of these (Page # 133)

None

Click here to Save Answer & Move to Next Question

MC080406248 : Salman Ali


Time Left

62
sec(s)

Quiz Start Time: 06:58 PM Question # 4 of 10 ( Start time: 07:00:31 PM ) Total Marks: 1

In many countries, stealing and misusing of meta information for getting competitive advantage is considered as an offence known as Select correct option:

Tort of Private Nuisance

Tort of Tress passing

Tort of passing off (pg #138)

Defamation

Click here to Save Answer & Move to Next Question

MC080406248 : Salman Ali


Time Left

50
sec(s)

Quiz Start Time: 06:58 PM Question # 5 of 10 ( Start time: 07:01:04 PM ) Digital Content Revenue Model Includes Select correct option: Total Marks: 1

Legal information services

Online journals

Online Libraries

All of the above (page # 130)

Click here to Save Answer & Move to Next Question

MC080406248 : Salman Ali


Time Left

29
sec(s)

Quiz Start Time: 06:58 PM

Question # 6 of 10 ( Start time: 07:01:56 PM ) Which of the following is an advertising payment mode? Select correct option:

Total Marks: 1

Pay-per-person

Pay-per-page

Pay-per-sale (pg #134)

Pay-per-minute

Click here to Save Answer & Move to Next Question

MC080406248 : Salman Ali


Time Left

87
sec(s)

Quiz Start Time: 06:58 PM Question # 8 of 10 ( Start time: 07:03:37 PM ) Which one of the followings is an example of Banner advertising? Select correct option: Total Marks: 1

Branding

Affiliate programs (page # 138)

Partnership

All of these

Click here to Save Answer & Move to Next Question

MC080406248 : Salman Ali


Time Left

83
sec(s)

Quiz Start Time: 06:58 PM Question # 9 of 10 ( Start time: 07:04:20 PM ) Which of following marketing campaigns are cheap an effective way to target potential customers? Select correct option: Total Marks: 1

Sale forces

E-mail (page # 133)

Media promotion

Marketing software

Click here to Save Answer & Move to Next Question

MC080405962 : Muhammad Umer Siddique


Time Left

87
sec(s)

Quiz Start Time: 07:05 PM Question # 1 of 10 ( Start time: 07:05:31 PM ) Total Marks: 1

Call handling, sales tracking and Transaction support(technology / personnel) activities are included in which management system Select correct option:

Customer Relationship Management system (page # 136)

Public relation management system

Inventory management system

Data Base Management system

Click here to Save Answer & Move to Next Question

MC080405962 : Muhammad Umer Siddique


Time Left

86
sec(s)

Quiz Start Time: 07:05 PM Question # 2 of 10 ( Start time: 07:06:01 PM ) The result of OLAP (Online Data Processing) is displayed in the form of a __________. Select correct option: Total Marks: 1

Data square

Data Triangle

Data cube (page # 145)

Data circle

Click here to Save Answer & Move to Next Question

MC080405962 : Muhammad Umer Siddique


Time Left

84
sec(s)

Quiz Start Time: 07:05 PM Question # 3 of 10 ( Start time: 07:06:14 PM ) Which of these is a tool that can be used to improve customer services? Select correct option: Total Marks: 1

Log file analysis

Cookies

Data mining

All (page # 136)

Click here to Save Answer & Move to Next Question

MC080405962 : Muhammad Umer Siddique


Time Left

86
sec(s)

Quiz Start Time: 07:05 PM Question # 4 of 10 ( Start time: 07:06:27 PM ) Web catalogue revenue model includes Select correct option: Total Marks: 1

a. Online sellers of computer

b. Gifts, flowers, clothes

c. Journals

d. A and B (page # 130)

Click here to Save Answer & Move to Next Question

MC080405962 : Muhammad Umer Siddique


Time Left

84
sec(s)

Quiz Start Time: 07:05 PM Question # 5 of 10 ( Start time: 07:06:37 PM ) When you email at it430@vu.edu.pk , your email is automatically sorted and replied to your ID. Select correct option: Total Marks: 1

True

False

Click here to Save Answer & Move to Next Question

MC080405962 : Muhammad Umer Siddique


Time Left

20
sec(s)

Quiz Start Time: 07:05 PM

Question # 6 of 10 ( Start time: 07:06:47 PM ) CPM is an advertising payment mode. CPM stands for ________. Select correct option:

Total Marks: 1

Cost Per Month

Cost Per Minute

Cost Per Megabyte (Cost per Thousand where thousand=megabyte) pg # 134)

Cost Per Message

Click here to Save Answer & Move to Next Question

MC080405962 : Muhammad Umer Siddique


Time Left

84
sec(s)

Quiz Start Time: 07:05 PM Question # 7 of 10 ( Start time: 07:08:04 PM ) Objective of any marketing strategy is to bring the customers quickly to the ___________. Select correct option: Total Marks: 1

Familiarity stage

Exploration stage

Separation stage

Commitment stage (page #137)

Click here to Save Answer & Move to Next Question

MC080405962 : Muhammad Umer Siddique


Time Left

83
sec(s)

Quiz Start Time: 07:05 PM Question # 8 of 10 ( Start time: 07:08:15 PM ) Total Marks: 1

In many countries, stealing and misusing of meta information for getting competitive advantage is considered as an offence known as Select correct option:

Tort of Private Nuisance

Tort of Tress passing

Tort of passing off (page # 138)

Defamation

Click here to Save Answer & Move to Next Question

MC080405962 : Muhammad Umer Siddique


Time Left

87
sec(s)

Quiz Start Time: 07:05 PM

Question # 9 of 10 ( Start time: 07:08:30 PM ) Meta tag contains: Select correct option:

Total Marks: 1

User information

seller information

web page key information pg #138

bank information

Click here to Save Answer & Move to Next Question

MC080405962 : Muhammad Umer Siddique


Time Left

85
sec(s)

Quiz Start Time: 07:05 PM Question # 10 of 10 ( Start time: 07:08:38 PM ) Do you think, vulms.vu.edu.pk is an example of E-mail marketing? Select correct option: Total Marks: 1

True

False

Click here to Save Answer & Move to Next Question

MC080407990 : Muhammad Rasheed


Time Left

77
sec(s)

Quiz Start Time: 07:10 PM Question # 2 of 10 ( Start time: 07:11:05 PM ) Which of these is an algorithm used in clustering? Select correct option: Total Marks: 1

K-means pg #145

L-means

C-means

F-means

Click here to Save Answer & Move to Next Question

MC080407990 : Muhammad Rasheed


Time Left

87
sec(s)

Quiz Start Time: 07:10 PM Question # 3 of 10 ( Start time: 07:11:24 PM ) In, there is no direct contact with the end users Select correct option: Total Marks: 1

B2B

B2C

C2C (page # 137)

All

Click here to Save Answer & Move to Next Question

MC080407990 : Muhammad Rasheed


Time Left

53
sec(s)

Quiz Start Time: 07:10 PM Question # 4 of 10 ( Start time: 07:11:38 PM ) Dividing the potential customers into groups is called Select correct option: Total Marks: 1

Market Segmentation (page # 131)

Market Promotion

Market Research

Market Survey

Click here to Save Answer & Move to Next Question

MC080407990 : Muhammad Rasheed


Time Left

52
sec(s)

Quiz Start Time: 07:10 PM Question # 6 of 10 ( Start time: 07:12:30 PM ) Which of these is NOT a stage of knowledge discovery process? Select correct option: Total Marks: 1

Transformation

Data mining

Pattern evaluation

Process evaluation (page # 140)

Click here to Save Answer & Move to Next Question

MC080407990 : Muhammad Rasheed


Time Left

35
sec(s)

Quiz Start Time: 07:10 PM Question # 7 of 10 ( Start time: 07:13:20 PM ) In the template prefix, Template<class T> What kind of variable is the parameter T? Select correct option: Total Marks: 1

T must be a class.

T must not be a class.

T can be only types built into the C++ language.

T can be any type, whether built into C++ or defined by the programmer.

Click here to Save Answer & Move to Next Question

MC080404926 : JAMAL MIRAN


Time Left

6
sec(s)

Quiz Start Time: 07:16 PM Question # 10 of 10 ( Start time: 07:18:49 PM ) How many stages involve in customer loyalty model for creating good customer relationship? Select correct option: Total Marks: 1

Click here to Save Answer & Move to Next Question

What is true about ERP? Select correct option: Integrate all business functions At Single Location Efficient use of resource ALL Above Enterprise Resource Planning (ERP) is a concept that integrates all aspects of a business e.g, accounting, logistics, manufacturing, marketing, planning, project management etc. at a single place http://vuzs.net/ The process of taking active role in working with suppliers to improve products and processes is called ______________. Select correct option: ERP Marketing Supply Chain Management Sale Engaging and negotiating with suppliers can be extremely beneficial. The process of taking active role in working with suppliers to improve products and processes is called supply chain management. Today, firms are reaching beyond limits of their own organizational structure Consider the following definition template < class T > class Xyz { }; Select correct option: it defines a class template for integers only it defines a class template for any class class templates are not defined in this way***** none of given options Question # 1 of 10 ( Start time: 11:41:47 AM ) Total Marks: 1 EDI involves exchange of ________. Select correct option: Electronic business documents Data Resources NONE of Above EDI is used by organizations for transactions that occur on a regular basis according to a pre-determined format. It involves exchange of electronic business documents, i.e., purchase orders, invoices etc. EDI transactions are carried through special EDI software http://vuzs.net/ Question # 6 of 10 ( Start time: 11:46:36 AM ) Total Marks: 1 Survey and market research are used for which poetr identified activity? Select correct option: Identify Design**** I was select Identify customer Identify customers refer to those activities which try to find new customers and ways to serve better to the existing ones, e.g, surveys and market research; Question # 5 of 10 ( Start time: 11:45:11 AM ) Total Marks: 1 In which type of approach, we further dig the data for retrieving information from data warehouse? Select correct option:

Slice Dice Drill down Roll up Using drill-down we can further dig the data to receive some specific information. For example using that I can find the sale of furniture in a specific month of the first quarter, say, February Question # 2 of 10 ( Start time: 11:42:39 AM ) Total Marks: 1 Supply Chain Mangment broken down into ___________. Select correct option: Upstream activities Internal activities Downstream activities All of Above Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities Question # 8 of 10 ( Start time: 11:48:11 AM ) Total Marks: 1 Poter Market and sell activities relates to _____________. Select correct option: advertising, promotions managing salespersons monitoring distribution channel All of Above Market and sell activities give buyers a way to purchase and provide inducement for them to do sohttp://vuzs.net/ , e.g, advertising, promotions, managing salespersons, monitoring distribution channel, pricing etc. ==========done VAN can _____. Select correct option: Reduce network traffic Provide protocol compatibility between the sender and the recipient, wherever that is missing. Question # 2 of 10 ( Start time: 10:25:45 AM ) Total Marks: 1 What is true about Personal finance? Select correct option: Sell you products in no time. Buy you products in no time. allows the management of your financial matters in a customized manner. None Question # 3 of 10 ( Start time: 10:26:36 AM ) Total Marks: 1 A value chain is a way of organizing activities that each strategic business unit undertakes to ___________. Select correct option: design produce promote All of Above A value chain is a way of organizing activities that each strategic business unit undertakes to design, produce, promote, market, deliver and support the products or services it sells. Question # 4 of 10 ( Start time: 10:27:47 AM )

Total Marks: 1 Activities associated with the flow and transformation of goods from the raw materials stage all the way to the end user ___________. Select correct option: Marketing Suply Chain Managment ERP Online Chain Control Supply chain includes all the activities associated with the flow and transformation of goods from the raw materials stage all the way to the end user. Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities. Question # 5 of 10 ( Start time: 10:28:35 AM ) Total Marks: 1 Porter Market and sell activities relates to _____________. Select correct option: advertising, promotions managing salespersons monitoring distribution channel All of Above Market and sell activities give buyers a way to purchase and provide inducement for them to do so, e.g, advertising, promotions, managing salespersons, monitoring distribution channel, pricing etc. Page 152 http://vuzs.net/ Question # 6 of 10 ( Start time: 10:29:59 AM ) Total Marks: 1 Technology development relates to activities ___________. Select correct option: fields tests maintenance of procedures process improvement studies All of Above Technology development relates to activities which help improve product/service that a business is selling and also help improve processes in every primary activity, e.g, fields tests, maintenance of procedures, process improvement studies etc. In personal finance what is true? Select correct option: online data is imported automatically into the register. transactions maintained by the software package. vuzs account/transaction details are downloaded through the internet. All of Above In personal finance online data is imported automatically into the register of transactions maintained by the software package as the account/transaction details are downloaded through the internet. Question # 8 of 10 ( Start time: 10:31:35 AM ) Total Marks: 1 ___________ strategy is defined as concentration on a single aspect of the market. Select correct option: Focus Differentation Focus strategy is defined as concentration on a single aspect of the market. http://vuzs.net/ Question # 9 of 10 ( Start time:

10:32:02 AM ) Total Marks: 1 Popular software packages for personal finance are ___________. Select correct option: Quicken MS Money Money 2003 All of Above Question # 10 of 10 ( Start time: 10:32:57 AM ) Total Marks: 1 Which of these is NOT a stage of knowledge discovery process? Select correct option: Transformation Data mining Pattern evaluation Process evaluation A knowledge discovery process includes data cleaning, data integration, data selection, data transformation, data mining, pattern evaluation and knowledge presentation. Total Marks: 1 Strategic business unit is a combination of a particular _____________. Select correct option: product distribution channel customer type All of Above ) In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT included: Select correct option: Buyer Accounts identifier Buyer password Address of Merchant Actual amount of money in favor of merchant 2) By adding which of the following to your website improve customer service? Select correct option: Attractive products Banner Advertisement Email links Interactive Advertising Reference: E-mails can be used to improve customer service by adding an e-mail link to your web site. Thus, you can receive your customers complaints through e-mails. It should be ensured that your e-business is capable of 3) Objective of any marketing strategy is to bring the customers quickly to the _________. Select correct option: Familiarity stage Exploration stage Separation stage Commitment stage

4) Which of these is a tool that can be used to improve customer services? Select correct option: Log file analysis Cookies Data mining All 5) How many stages involve in customer loyalty model for creating good customer relationship? Select correct option: 6 5 4 3 www.vuzs.net 6) Call handling, sales tracking and Transaction support(technology / personnel) activities are included in which management system Select correct option: Customer Relationship Management system Public relation management system Inventory management system Data Base Management system 7) You read about a company X in newspaper. Your relation with company X is at familiarity stage. Select correct option: True False 8) JIT Stands for Select correct option: Just In Time Joint investigation Technique Join in Training Just In Total 9) Let us, suppose that you have hosted early your e-commerce website to sell sweets online: Your customers are acquaint with the name of your company and DesiGhee Burfi . They have never interacted with your company. Which of following loyalty stages they are? Select correct option: Awareness Exploration Familiarity Commitment Reference: Awareness This is the first stage where customers recognize the name of the company or any of its products. However, they have never interacted with the company before. A company/business can achieve this level by properly advertising its brand.

10) ET and SSL both are same with respect to security. Select correct option: True False 11) Which statement is most appropriate description of the term Interactive-advertisement? Select correct option: By making an advertisement message using flash animation. Putting an audio or video message on the website to attract customer. By avoiding customers involvement in the advertisement process. By involving the customer in the advertisement process itself. 12) Quiz Start Time: 04:28 PM Time Left 88 sec(s) Question # 1 of 10 ( Start time: 04:28:31 PM ) Total Marks: 1 Four Ps in Marketing Mix are Select correct option: Product, price, place, promotion Price, person, place, problem Place, product, property, promotion Promotion, place, product, planning 13) Quiz Start Time: 04:28 PM Time Left 87 sec(s) Question # 2 of 10 ( Start time: 04:29:03 PM ) Total Marks: 1 Let us, suppose that you have hosted your e-commerce website, When you provide opt-in e-mail option to your customers on your website and customer opt for it , what does it mean to receive ? Select correct option: Information about product through advertisement Information about product through e-mail Information about services available on it Information about News through e-mail. 14) Quiz Start Time: 04:28 PM Time Left 83 sec(s) Question # 3 of 10 ( Start time: 04:30:16 PM ) Total Marks: 1 How many stages involve in customer loyalty model for creating good customer relationship? Select correct option: 6 5 4 3 www.vuzs.net 15) Quiz Start Time: 04:28 PM Time Left 86 sec(s) Question # 4 of 10 ( Start time: 04:30:55 PM ) Total Marks: 1 Free-Trial advertisement means _________. Select correct option: Free coupons are placed on certain websites for customers so that they can use it for shopping. Customer is offered to use the product free of cost for a specific amount of time.

Items bought are delivered to the customers with no delivery cost. The company didnt had to pay for this advertisement 16) Quiz Start Time: 04:28 PM Time Left 87 sec(s) Question # 5 of 10 ( Start time: 04:31:46 PM ) Total Marks: 1 What is the right sequence of steps involved in development of customers relationship with the business? Select correct option: Familiarity, Awareness, Commitment, Exploration, Separation Awareness, Exploration, Familiarity, Commitment, Separation Familiarity, Awareness, Exploration, Commitment, Separation Awareness, Commitment, Familiarity, Exploration, Separation 17) Quiz Start Time: 04:28 PM Time Left 87 sec(s) Question # 6 of 10 ( Start time: 04:33:04 PM ) Total Marks: 1 SETSET(secure Electronic Transaction) was developed in Select correct option: 1995 1996 1997 1999 18) Quiz Start Time: 04:28 PM Time Left 86 sec(s) Question # 7 of 10 ( Start time: 04:34:49 PM ) Total Marks: 1 Some web retailers allow their customers to create their own product. It is called. Select correct option: One to one Marketing One to many Marketing Many to one marketing All of the above Reference: Some web retailers allow their customers to create their own product. For example there are computer companies online that allow their customers to choose component of a computer to configure their own computer according to their need. This is called one-to-one marketing. 19) Quiz Start Time: 04:28 PM Time Left 84 sec(s) Question # 8 of 10 ( Start time: 04:35:40 PM ) Total Marks: 1 Vertical Web portals are made for Select correct option: Single area Broad range of topics Wide variety of things Broad range of topics and Wide variety of things 20) Quiz Start Time: 04:28 PM Time Left 86 sec(s) Question # 9 of 10 ( Start time: 04:36:45 PM ) Total Marks: 1

Which of following services build a strong customer loyalty towards company and its products? Select correct option: Customer services Public relations(PR) Bulletin board Exhibitions 21) Question # 1 of 10 ( Start time: 04:42:31 PM ) Total Marks: 1 To overcome the lack of physical proximity appearance problem in e-business, which technology is going to be used? Select correct option: Biometrics Video conferencing Cryptography Biometrics and Video conferencing 22) Question # 2 of 10 ( Start time: 04:44:07 PM ) Total Marks: 1 Using SSL, we type in URL as : Select correct option: www.vuzs.net https httpc httpc httpi 23) Question # 3 of 10 ( Start time: 04:45:14 PM ) Total Marks: 1 CRM stands for ............... Select correct option: Customer Relationship Management Customer Related Management Customer Resembling Management Customer Reallocation Managemen 24) Question # 4 of 10 ( Start time: 04:45:41 PM ) Total Marks: 1 SET and SSL both are same with respect to security. Select correct option: True False 25) Question # 5 of 10 ( Start time: 04:46:11 PM ) Total Marks: 1 In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT included: Select correct option: Buyer Accounts identifier Buyer password Address of Merchant Actual amount of money in favor of merchant 26) Question # 6 of 10 ( Start time: 04:46:42 PM ) Total Marks: 1 Which of following services build a strong customer loyalty towards company and its products? Select correct option: Customer services

Public relations(PR) Bulletin board Exhibitions. 27) Question # 7 of 10 ( Start time: 04:47:35 PM ) Total Marks: 1 Which of following marketing campaigns are cheap an effective way to target potential customers? Select correct option: Sale forces E-mail Media promotion Marketing software 28) Question # 8 of 10 ( Start time: 04:48:20 PM ) Total Marks: 1 Free-Trial advertisement means _________. Select correct option: Free coupons are placed on certain websites for customers so that they can use it for shopping. Customer is offered to use the product free of cost for a specific amount of time. Items bought are delivered to the customers with no delivery cost. The company didnt had to pay for this advertisement. 29) Question # 9 of 10 ( Start time: 04:48:59 PM ) Total Marks: 1 Which of the following option best represent Data mining can improve response rate tremendously? Select correct option: Direct mailing Personalization technology E-business Opt-in e-mail 30) Question # 10 of 10 ( Start time: 04:50:29 PM ) Total Marks: 1 CPM is an advertising payment mode. CPM stands for ______. Select correct option: Cost Per Month Cost Per Minute Cost Per Megabyte Cost Per Message 31) Which statement is most appropriate description of the term Interactive-advertisement? Select correct option: By making an advertisement message using flash animation. Putting an audio or video message on the website to attract customer. By avoiding customers involvement in the advertisement process. By involving the customer in the advertisement process itself. 32) What does Telemarketing means? Select correct option: Marketing through charting Marketing through telephone Marketing through emai Marketing through web casting

33) What is the right sequence of steps involved in development of customers relationship with the business? Select correct option: Familiarity, Awareness, Commitment, Exploration, Separation Awareness, Exploration, Familiarity, Commitment, Separation Familiarity, Awareness, Exploration, Commitment, Separation Awareness, Commitment, Familiarity, Exploration, Separation 34) www.amzon.com as you all familiar with it. Which of the following loyalty stages its customers are: ( Who dont know about it): Detail about amzon.com Amazon was one of the first major companies to sell goods by Internet, and was an iconic "stock in which to invest" of the late 1990s dot-com bubble. Jeff Bezos founded Amazon.com, Inc. in 1994, and launched it online in 1995. Amazon.com started as an on-line bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3 format, computer software, , etc. Amazon has established separate websites in Canada, the United Kingdom, Germany, France, China, and Japan. It also provides global shipping to certain countries for some of its products. Select correct option: Awareness Exploration Familiarity Commitment 35) Web catalogue revenue model includes Select correct option: a. Online sellers of computer b. Gifts, flowers, clothes c. Journals d. A and B 36) Track the customers online and do personalization is only possible through which of the following file(s) analysis. Select correct option: log files cookie data mining log files and cookies. Reference: Cookies can be used to track customers online. Typically, a unique ID of the customer is stored in the cookie file on the hard disk. Same ID is also stored in the database along with the record of previously purchased items by the customer. When the customer again visits the online store, cookie (having customer ID prepared against that URL) is transmitted by the browser to the server side. There, it is matched with the ID in the database. This enables the merchant side to know that a particular customer (with a known buying pattern) has come to visit again. By tracking the customer in this manner, personalized recommendations for certain items can be made to the customer in real time. 37) In the template prefix, Template<class T> What kind of variable is the parameter T? Select correct option: T must be a class. T must not be a class. T can be only types built into the C++ language. (Not sure L) T can be any type, whether built into C++ or defined by the programmer.

38) Fee for Transaction Models include Select correct option: Travel Agents and Insurance brokers Automobile Sales and event tickets Stock brokers and online banking All of the above 39) While designing a website, which of the following factors an internet marketer should pay attention to? Select correct option: Easy site navigation (i.e. Site map) Frequently asked questions (FAQs) section Privacy policy All of above 40) Question # 1 of 10 ( Start time: 05:17:27 PM ) Total Marks: 1 Four Ps in Marketing Mix are Select correct option: Product, price, place, promotion Price, person, place, problem Place, product, property, promotion Promotion, place, product, planning 41) Question # 2 of 10 ( Start time: 05:17:43 PM ) Total Marks: 1 In, there is no direct contact with the end users Select correct option: B2B B2C C2C All 42) Question # 3 of 10 ( Start time: 05:18:01 PM ) Total Marks: 1 What is the right sequence of steps involved in development of customers relationship with the business? Select correct option: Familiarity, Awareness, Commitment, Exploration, Separation Awareness, Exploration, Familiarity, Commitment, Separation Familiarity, Awareness, Exploration, Commitment, Separation Awareness, Commitment, Familiarity, Exploration, Separation 43) Question # 4 of 10 ( Start time: 05:18:13 PM ) Total Marks: 1 Payment gateway is an organization which connects those entities to the internet which are offline. Select correct option: True False 44) Question # 5 of 10 ( Start time: 05:18:55 PM ) Total Marks: 1 Customer Loyalty model is also called Select correct option: Customer Life Cycle Customer Segmentation Customer Awareness All 45) Question # 8 of 10 ( Start time: 05:20:28 PM ) Total Marks: 1 Creation of separate experiences for customers based on their behavior is called

Select correct option: Demographic segmentation Behavioral segmentation Geo-Graphic Segmentation None of the above 46) Question # 9 of 10 ( Start time: 05:20:53 PM ) Total Marks: 1 Which of the following option best represent Data mining can improve response rate tremendously? Select correct option: Direct mailing Personalization technology E-business Opt-in e-mail 47) Question # 10 of 10 ( Start time: 05:21:04 PM ) Total Marks: 1 Dividing the potential customers into groups is called Select correct option: Market Segmentation Market Promotion Market Research Market Survey 48) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 1 of 10 ( Start time: 05:24:11 PM ) Total Marks: 1 Web catalogue revenue model includes Select correct option: a. Online sellers of computer b. Gifts, flowers, clothes c. Journals d. A and B 49) Quiz Start Time: 05:24 PM Time Left 88 sec(s) Question # 2 of 10 ( Start time: 05:24:25 PM ) Total Marks: 1 Which entity does not include in SET(secure Electronic Transaction)? Select correct option: Seller Buyer Payment gateway Bank 50) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 3 of 10 ( Start time: 05:25:05 PM ) Total Marks: 1 Call handling, sales tracking and Transaction support(technology / personnel) activities are included in which management system Select correct option: Customer Relationship Management system Public relation management system Inventory management system Data Base Management system

51) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 5 of 10 ( Start time: 05:25:32 PM ) Total Marks: 1 Do you think that "www.vu.edu.pk" can be considered as university's advertisement website? Select correct option: Yes No 51) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 6 of 10 ( Start time: 05:26:29 PM ) Total Marks: 1 Traditionally Marketer use the market segmentation(s) like Select correct option: Geo-graphic Segmentation Demographic Segmentation Psychographic Segmentation All of the above 52) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 7 of 10 ( Start time: 05:27:00 PM ) Total Marks: 1 Advertising Supported Revenue Model includes Select correct option: Yahoo portal Employment sites Newspaper Publishers All of the above 53) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 8 of 10 ( Start time: 05:27:37 PM ) Total Marks: 1 SSL stands for Select correct option: Secure Socket Layer Security Service Layer Sub Secured Length None of these 54) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 10 of 10 ( Start time: 05:28:22 PM ) Total Marks: 1 In e-business, market research is slower than offline business. Select correct option: True False 55) ipher suite is a combination of Select correct option: Cryptographic Algorithm Authentication methods

Security layers Cryptographic Algorithm And Authentication methods 56) Question # 5 of 10 ( Start time: 05:36:53 PM ) Total Marks: 1 www.amzon.com as you all familiar with it. Which of the following loyalty stages its customers are: ( Who dont know about it): Detail about amzon.com Amazon was one of the first major companies to sell goods by Internet, and was an iconic "stock in which to invest" of the late 1990s dot-com bubble. Jeff Bezos founded Amazon.com, Inc. in 1994, and launched it online in 1995. Amazon.com started as an on-line bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3 format, computer software, , etc. Amazon has established separate websites in Canada, the United Kingdom, Germany, France, China, and Japan. It also provides global shipping to certain countries for some of its products. Select correct option: Awareness Exploration Familiarity Commitment 57) Question # 2 of 10 ( Start time: 05:43:49 PM ) Total Marks: 1 Which of the following is cheapest and quickest marketing technique to reach distant customers? Select correct option: E-Mail marketing Telephone marketing SMS marketing Advertisement letters marketing Quiz Start Time: 05:42 PM Time Left 89 sec(s)

58) Question # 3 of 10 ( Start time: 05:44:52 PM ) Total Marks: 1 JIT concept means Select correct option: No distribution channel No warehousing Easily delivery No communication 59) Question # 6 of 10 ( Start time: 05:47:03 PM ) Total Marks: 1 Brick and Mortar refers to Select correct option: Offline business Online business Transport Building 60) Question # 7 of 10 ( Start time: 05:48:16 PM ) Total Marks: 1 How many kinds of Web Portals are? Select correct option: 3 2 5 6

61) Quiz Start Time: 05:42 PM Time Left 88 sec(s)

Question # 8 of 10 ( Start time: 05:49:06 PM ) Total Marks: 1 Press release can provide information about current events and news to, which of following, via a internet? Select correct option: Print media T.v commercial Press or media T.v program. 62) Question # 1 of 10 ( Start time: 05:53:24 PM ) Total Marks: 1 When you email at it430@vu.edu.pk , your email is automatically sorted and replied to your ID. Select correct option: True False 63) Question # 5 of 10 ( Start time: 05:55:05 PM ) Total Marks: 1 Visitors location, IP address, time of visit related information are added, in which of the following Select correct option: call handling files cookies log files Data mining files. 64) Question # 7 of 10 ( Start time: 05:55:50 PM ) Total Marks: 1 Which of following marketing campaigns are cheap an effective way to target potential customers? Select correct option: Sale forces E-mail Media promotion Marketing software 65) Question # 8 of 10 ( Start time: 05:56:06 PM ) Total Marks: 1 Suppose you are using "warid telecom" as your mobile connection and you ignor any other mobile company's advertisement because you want to keep using warid no matter what others offer. Your relationship with warid is at _____________. Select correct option: Exploration stage Commitment stage Awareness stage Separation stage 66) Question # 9 of 10 ( Start time: 05:57:03 PM ) Total Marks: 1 Dividing potential customers on the basis of variables such as social class, personality, or lifestyle is called__________. Select correct option: Demographic Segmentation Geographic Segmentation Psychographic segmentation Behavioral segmentation

67) Question # 1 of 10 ( Start time: 06:02:08 PM ) Total Marks: 1 Do you think, vulms.vu.edu.pk is an example of E-mail marketing? Select correct option: True False 68) Which one is not an example of search engine? Select correct option: Yahoo Google Alta vista Gawab 69) Let us, suppose that you have hosted early your e-commerce website to sell sweets online: Your customers are acquaint with the name of your company and DesiGhee Burfi . They have never interacted with your company. Which of following loyalty stages they are? Select correct option: Awareness Exploration Familiarity Commitment 70) Which 5th P introduced by E-business in Marketing Mix? Select correct option: Proper coverage Personalized Services Proper access Personal style 71) ETSET(secure Electronic Transaction) was developed by Select correct option: Microsoft Netscape Navigator Master Cards and VISA All of the options 72) Which of these can be used for advertisement purpose? Select correct option: Telephone Newspapers Magazines All of above 73) Question # 5 of 10 ( Start time: 06:21:36 PM ) Total Marks: 1 Which of the following is a method for conducting market research? Select correct option: Phone Interviews Questionnaires All of above

74) Which of the following is NOT an advertising payment mode? Select correct option: Pay-per-sale Pay-per-click Pay-per-keypress Pay-per-lead 75) Question # 1 of 10 ( Start time: 06:25:05 PM ) Total Marks: 1 Advertising Subscription Mixed Revenue Model includes Select correct option: Online journals Sports information services Business week online All of the above 76) Question # 2 of 10 ( Start time: 06:25:59 PM ) Total Marks: 1 Digital Content Revenue Model Includes Select correct option: Legal information services Online journals Online Libraries All of the above 77) Question # 4 of 10 ( Start time: 06:27:06 PM ) Total Marks: 1 Which of these is a tool that can be used to improve customer services? Select correct option: Log file analysis Cookies Data mining All 78) Question # 9 of 10 ( Start time: 06:29:26 PM ) Total Marks: 1 Which of the following is an advertising payment mode? Select correct option: Pay-per-person Pay-per-page Pay-per-sale Pay-per-minute 79) Question # 10 of 10 ( Start time: 06:29:52 PM ) Total Marks: 1 If a company's marketing stretegy is focusing on customers having age less than 30, which of the following marketing segmentation technique is being used by company? Select correct option: Demographic Segmentation Geographic Segmentation Psychographic segmentation Behavioral segmentation 80) E-Business promotions are used to _______. Select correct option: Attract the customer to the product and convince him/her to buy it. Get credit card information from the customer. Complete a transaction between customer and seller. None of above

1.

Public Key of the receiver is used to-------------------. a. Decrypt the message b. Encrypt the message c. Scramble the message d. None of the mentioned options

2.

Receiver applies ----------------to the received original message a. Digital signature b. Message digest c. Hash function d. None of the mentioned options Symmetric key can be replaced with----------------------------. a. Symmetric algorithms b. Pair of public and private keys c. Asymmetric key d. None of the mentioned options

3.

4. In --------------------attack an attempt is made by the attacker to decrypt the message with every possible key. a. Key search attack b. Cryptanalysis c. System based d. None of the mentioned options 5. Most of the electronic payment systems on internet use ------------------to ensure confidentiality and security of the payment information. a. Quantum computing b. Cryptography c. Both of the mentioned options d. None of the mentioned options

for more contents visit http://groups.google.com/group/vuZs 6. Simplicity and ----------------is the biggest advantage of Virtual PIN payment system. a. Full encryption b. Dual encryption c. No encryption d. None of the mentioned options 7. In electronic checks which type of cryptography is used a. Both symmetric and asymmetric b. Symmetric c. Asymmetric d. None of the mentioned options An electronic check book device is a combination of a. Hardware and a digital signature b. Software and information about user c. Secure hardware and software d. None of the mentioned options

8.

9. 1. 2. 3. 4. 10.

Which of the following is disadvantage of virtual PIN payment system? Bogus purchases are possible Stolen credit card number can be used Only some extra copies of the information items are made in case of a fraud All of the mentioned options are disadvantages of Virtual PIN payment system FV stands for a. First Virtual b. Forward Virtual c. Famous virtual d. None of the mentioned options E-COMMERCE QUIZ 3 JANUARY 2007 http://groups.google.com/group/vuZs Shared By China Rose ( gtown.malik@gmail.com ) Solved By vuZs Solution Team umeed.e.( subh@gmail.com )

http://groups.google.com/group/vuZs Visit this group 1. Customers can provide their feedback or register their complaints quite conveniently in case of online business as compared to offline business True False 2. Physical proximity with items purchased and no inventory cost are disadvantages of e-business True False 3. Online publishing is attractive because printing and distribution costs are involved in it. True False In Geographic segmentation customers are divided into groups on the basis of where they live or work True False 5. True False Discount advertisements through web sites are form of e-marketing

4.

for more contents visit http://groups.google.com/group/vuZs

6.

Interactive advertising is a term used to refer to internet-based broadcasting of audio and video content. True False 7. True False 8. True False 9. True False 10. Segment information is useful for companies to develop better relationship with other companies. True False AltaVista and yahoo are examples of search engines In case of B2B there is direct contact with the end users One major goal of CRM is to establish a long-lasting relationship between a company and its customers

for more contents visit http://groups.google.com/group/vuZs E-COMMERCE QUIZ 2 DECEMBER 18, 2006 Solved By vuZs Solution Team umeed.e.subh@gmail.com

http://groups.google.com/group/vuZs

1.

Public Key of the receiver is used to-------------------.

a. Decrypt the message b. Encrypt the message c. Scramble the message d. None of the mentioned options

http://groups.google.com/group/vuZs Visit this group

2. a. b.

Receiver applies ----------------to the received original message Digital signature Message digest

c. Hash function d. None of the mentioned options 3. Symmetric key can be replaced with----------------------------. a. Symmetric algorithms b. Pair of public and private keys c. Asymmetric key d. None of the mentioned options

4. In --------------------attack an attempt is made by the attacker to decrypt the message with every possible key. a. Key search attack b. Cryptanalysis c. System based d. None of the mentioned options 5. Most of the electronic payment systems on internet use ------------------to ensure confidentiality and security of the payment information. a. Quantum computing b. Cryptography c. Both of the mentioned options d. None of the mentioned options

for more contents visit http://groups.google.com/group/vuZs 6. a. b. c. d. 7. Simplicity and ----------------is the biggest advantage of Virtual PIN payment system. Full encryption Dual encryption No encryption None of the mentioned options

In electronic checks which type of cryptography is used? a. Both symmetric and asymmetric b. Symmetric c. Asymmetric d. None of the mentioned options An electronic check book device is a combination of a. Hardware and a digital signature b. Software and information about user c. Secure hardware and software d. None of the mentioned options Which of the following is disadvantage of virtual PIN payment system? Bogus purchases are possible Stolen credit card number can be used Only some extra copies of the information items are made in case of a fraud All of the mentioned options are disadvantages of Virtual PIN payment system

8.

9. 1. 2. 3. 4.

10. FV stands for a. First Virtual b. Forward Virtual c. Famous virtual d. None of the mentioned options

for more contents visit SETSET(secure Electronic Transaction) was developed by Select correct option: Microsoft Netscape Navigator Master Cards and VISA All of the options

SSL stands for Select correct option: Secure Socket Layer Security Service Layer Sub Secured Length None of these What is basic advantage of symmetric algorithms? Select correct option: Symmetric key does not use any encryption Symmetric algorithms are faster Symmetric algorithms are easy to understand All of above Which of these keys can be used for encryption instead of using pair of private and public keys? Select correct option: Systematic key Asymmetric key Symmetric key All of above Using SSL, we type in URL as : Select correct option: https httpc httpc httpi Reference: (Page # 121) In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT included: Select correct option: Buyer Accounts identifier Buyer password Address of Merchant Actual amount of money in favor of merchant A unique large number, generated as a result of applying hash function on a message is called ______. Select correct option: Hash message Message digest Digitally singed message Secret message Reference: (page # 103)

FVIPSS stands for _______. Select correct option: First Virtual Internet Payment System Server First Virtual International Payment System Server First Virtual International Payment System Services First Virtual Internal Payment System Services Reference: (Page # 110) Virtual PIN Payment system is considered suitable for ________. Select correct option: Low-cost items High-cost items Very expensive items Every kind of items Which of these is a primary participant in E-Cash Payment system? Select correct option: Buyer Bank Merchant All Most of the electronic payment systems on internet use cryptography. Select correct option: True False In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last withdrawals to the E-bank. Select correct option: 10 12 14 16 Reference: (page # 119) The key feature of E-Cash Payment system is Select correct option: Anonymity Security Cryptography None of these Reference: (page # 116) At minting stage, the client is ..by E-Cashbank Select correct option: Known Unknown Secret informed

Reference: (page. 118) Cipher suite is a combination of Select correct option: Cryptographic Algorithm Authentication methods Security layers Cryptographic Algorithm And Authentication methods Reference: (page. 121) SETSET(secure Electronic Transaction) was developed in Select correct option: 1995 1996 1997 1999 Reference: (page no. 122) Symmetric algorithms are faster than asymmetric. Select correct option: True False Reference: (Page # 105) Which entity does not include in SET(secure Electronic Transaction)? Select correct option: Seller Buyer Payment gateway Bank Reference: (Page # 122) A paper signature is believed to be more reliable than a digital signature. Select correct option: True False If a key is 4 bit in length, how many unique key values are possible? Select correct option: 4 8 16 32 Explanation: A key value is always in binary form. A Binary Number is made up of only 0s and 1s. So each digit has only two possibilities: 0 or 1, So now we try to check all possible values of 4. 4 bit = 0000, 0001, 0010, 0100, 1000, 0011,

0110, 1100, 0101, 1010, 1011, 1101, 1001, 1110, 0111, 1111 Hence prove that if a key is 4 bit in length, then 16 unique key values are possible of that key. Hash function is a __________ Select correct option: Communication protocol Hardware device Encryption mechanism Log file Which of these attacks have been reported on symmetric key algorithms? Select correct option: Key Search Attacks Cryptanalysis System-Based Attacks All Reference: (Page # 108) Payment gateway is an organization which connects those entities to the internet which are offline. Select correct option: True False Reference: (Page # 122) How many elements an e-coin has? Select correct option: 1 2 3 4 Reference: (page # 116) EFT stands for _____________. Select correct option: Electronic Film Transmission Electronic Funds Transfer Electronic File Translation None of above Reference: (Page # 114)

________ is used to interpret and show contents of the webpage.

Select correct option:

HTML Notepad Browser Computer

What is identified by the tag ?

Select correct option:

Horizontal frame Bottom Frame Top Frame Vertical Frame

Which of the following is NOT an advantage of CSS?

Select correct option:

Define the look of your pages in one place Works on version 4 browsers or newer Easily change the look Implement same formatting each time tag is used. Links are used to connect ____________.

Select correct option:

Images Text Images and web documents All of the given

Which of the following are correct tags used for frames,

Select correct option:

Do you think that "www.vu.edu.pk" can be considered as university's advertisement website? Select correct option: Yes No Characterization and Clustering belong to which of the following types of Data Mining? Select correct option: Predictive Selective Descriptive Additive Reference: (Page # 141) Traditionally Marketer use the market segmentation(s) like Select correct option: Geo-graphic Segmentation Demographic Segmentation Psychographic Segmentation All of the above Reference: (Page # 131) Advertising Subscription Mixed Revenue Model includes Select correct option: Online journals Sports information services Business week online All of the above OLAP stands for Select correct option: Online Analytical Program Online Analytical Processing Online Application Program Online Analysis Performance Reference: (Page # 145) E-Business promotions are used to _______. Select correct option: Attract the customer to the product and convince him/her to buy it. Get credit card information from the customer. Complete a transaction between customer and seller. None of above Reference: (Page # 133) Television, radio and print media are in a (n) . Mode. Select correct option: Passive Active

Static Dynamic Reference: (Page # 139) CRM stands for ............... Select correct option: Customer Relationship Management Customer Related Management Customer Resembling Management Customer Reallocation Management Reference: (Page # 136) Which one is not an example of search engine? Select correct option: Yahoo Google Alta vista Gawab Reference: (Page # 137) Meta tag contains: Select correct option: User information seller information web page key information bank information Reference: (Page # 138) Free-Trial advertisement means _________. Select correct option: Free coupons are placed on certain websites for customers so that they can use it for shopping. Customer is offered to use the product free of cost for a specific amount of time. Items bought are delivered to the customers with no delivery cost. The company didnt had to pay for this advertisement. Reference: (Page # 133) In many countries, stealing and misusing of meta information for getting competitive advantage is considered as an offence known as Select correct option: Tort of Private Nuisance Tort of Tress passing Tort of passing off Defamation Reference: (Page # 138)

If a company's marketing stretegy is focusing on customers having age less than 30, which of the following marketing segmentation technique is being used by company? Select correct option: Demographic Segmentation Geographic Segmentation Psychographic segmentation Behavioral segmentation Reference: (Page # 131) Press release can provide information about current events and news to, which of following, via internet? Select correct option: Print media T.v commercial Press or media T.v program. Reference: (Page # 135)

Fee for Transaction Models include Select correct option: Travel Agents and Insurance brokers Automobile Sales and event tickets Stock brokers and online banking All of the above Reference: (Page # 130) An E-Business can't have direct feedback from the customer in B2C. Select correct option: True False Creation of separate experiences for customers based on their behavior is called Select correct option: Demographic segmentation Behavioral segmentation Geo-Graphic Segmentation None of the above Reference: (Page # 132) What is the right sequence of steps involved in development of customers relationship with the business? Select correct option: Familiarity, Awareness, Commitment, Exploration, Separation Awareness, Exploration, Familiarity, Commitment, Separation Familiarity, Awareness, Exploration, Commitment, Separation Awareness, Commitment, Familiarity, Exploration, Separation Reference:

(Page # 136) At deposit stage, the serial number is ..by E-Cashbank Known Unknown Kept Secret Informed Reference: (Page # 118) How many kinds of Web Portals are? 3 2 5 6 Explanation: There are only two kinds of web portals, one is vertical portals which provides information about single interest like online shopping sites are best example of vertical portal site, educational site is also an example of vertical portal. Second kind of web portal is horizontal web portals which provide information about everything or multiple things. Search engine is best example of horizontal web portal. Reference: (page # 129) Let us, suppose that you have hosted your e-commerce website, When you provide opt-in e-mail option to your customers on your website and customer opt for it , what does it mean to receive ? Information about product through advertisement Information about product through e-mail Information about services available on it Information about News through e-mail. Reference: (page # 133) Track the customers online and do personalization is only possible through which of the following file(s) analysis. log files cookie data mining log files and cookies. Reference: (page # 136) When customer life cycle is used to create different groups of customers, it is called? Targeting Customers Dynamic groups Customer Life Cycle Segmentation Group Development Reference: (page # 137) Network addresses 128--- 191 range belongs to which of the following class networks? A B C E Reference: (page # 10)

Which of the following property falls in HTTP? Stateless Stateful Temporary All of these Reference: (page # 3) FSTC stands for: Financial Services Technology Consortium Financial Secrets Technology Consortium Final Security threats control First Service Technology Consortium Reference: (page # 113) Supply chain can be broken into three parts, that is ----------------- , ----------------------- and -------------------activities. Internal, external support Upstream, internal ,downstream Primary, Secondary ,R&D None of them Reference: (page # 155) The process of taking active role in working with suppliers to improve products and processes is called? Value chain management Supply chain management Supply chain management software Porter Model Reference: (page # 155) What is Ultimate consumer orientation? Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. Secondary Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of supply chain. None of them Reference: (page # 156) Many search engines rank the site by using a program called Spider Scorpion Moon Cobweb Reference: (page # 138) E-commerce is a combination of three different areas of study, namely, --------, ---------------- and --------------- Internal, external support, Support Technology, business and law/policy Primary, Secondary, R&D

Sale, purchase, feed back Reference: (page # 161) In which type of data mining, Apriori algorithms is used? Classification Association Characterization Clustering Reference: (page # 143) EDI has the key feature(s) No paper work No human intervention Exchange of information takes place in seconds All of these Reference: (page # 147) Addresses are tied to the device itself and give no clue to it's location on a global scale. This is the characteristics of IP RIP MAC None of the given When two or more intranets are connected to each other they form a/an ------------- . intranet internet extranet VPN Reference: (page # 2) Which attribute can be used to make a region non-clickable? none of the given target alt nohref Reference: (page # 37) Which of the following payment mode does not require customer to pay interest to the bank on each transaction? Credit card Debit card Electronic check All of the above Reference: (page # 110) Cyber wallet can automatically assemble the correct payment and pay it too. True False

SET doesnt require special software on the client or merchant side. True False Which model allows the users to log-on on a website and assume the role of bidder or seller? Online Banking. Storefront Model. E-Learning. Auction Model. Reference: (Page # 128) According to Michael Porter, fabricating is an example of primary activity in a strategic business unit. Identify the area in which this task is performed. Market and sell Deliver activities relate to storage Purchase materials and supplies Manufacture product or create service Reference: (Page # 152) Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Is it? True False In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, ---------------and --------- Acceptance and consideration Acceptance and Rejection Approval and consideration None Reference: (page # 178) In online environment acceptances may be issued by an imposter/cheater that has authority to bind the online business True False #00ff00 in HTML indicates Pure green color Pure blue color Pure red color Pure yellow color Reference: (Page # 23) Virtual PIN Payment System requires both merchant and buyer to register with _______________. Auto Clearing House (ACH) First Virtual (FV) DSS (Digital Signature Standard) DES (Data Encryption Standard) Reference: (Page # 110) Classification and Association belong to which of the following types of Data Mining?

Selective Predictive Descriptive Additive Reference: (Page # 141) Which one of the followings is an example of Banner advertising? Select correct option: Branding Affiliate programs Partnership All of these Reference: (Page # 138) CPM is an advertising payment mode. CPM stands for ________. Select correct option: Cost Per Month Cost Per Minute Cost Per Megabyte Cost Per Message Reference: (Page # 134) Which one is not an example of search engine? Select correct option: Yahoo Google Alta vista Gawab Reference: (Page # 137) In which type of approach, we further dig the data for retrieving information from data warehouse? Select correct option: Slice Dice Drill down Roll up Reference: (Page # 146) Let us, suppose that you have hosted your e-commerce website, Promotion messages can be sent when potential client is Select correct option: online offline both online and offline visiting head office Reference: (Page # 133) Digital Content Revenue Model Includes Select correct option: Legal information services Online journals Online Libraries All of the above Reference: (Page # 130) Which of these is a tool that can be used to improve customer services?

Select correct option: Log file analysis Cookies Data mining All Reference: (Page # 136) What does Telemarketing means? Select correct option: Marketing through charting Marketing through telephone Marketing through emai Marketing through web casting Reference: (Page # 133) In which type of data mining, ID3 algorithms is used? Select correct option: Classification Association Characterization Clustering Reference: (Page # 141) Some web retailers allow their customers to create their own product. It is called. Select correct option: One to one Marketing One to many Marketing Many to one marketing All of the above Reference: (Page # 132) Free-Trial advertisement means ___________. Select correct option: Free coupons are placed on certain websites for customers so that they can use it for shopping. Customer is offered to use the product free of cost for a specific amount of time. Items bought are delivered to the customers with no delivery cost. The company didnt had to pay for this advertisement Reference: (Page # 133) Total Marks: 1 The length of a message digest is ________. Select correct option:

32 to 64 bits 64 to 128 bits 128 to 256 bits 256 to 512 bit

Reference: (Page # 103) Key version represents public key by Select correct option:

Buyer Seller E-Bank Certification Authority Reference: (Page # 116) The serial # generated by the cyberwallet gets multiplied by blinding factor r which is known only to the ___________. Select correct option:

Bank Merchant Client None Reference: (Page # 116) ACH is a centralized system used by different interconnected banks for clearing payment requests. Select correct option: True False Centralized Account Payment Model uses unique _______ of users as their account identifier. Select correct option: Residence address E-mail address Office address None Reference: (Page # 113) SET and SSL both are same with respect to security. Select correct option: True False

What are the security threats in VPS? Select correct option: a. Email hacking b. Credit card number stolen c. Missing of delivery d. A and B What is function of Cyberwallet? Select correct option: Store coins Manage Coins Record transactions All of above SET and SSL both are same with respect to security. Select correct option: True False Basic difference between Virtual PIN Payment System and Electronic Check is _____. Select correct option: Encryption Registration with bank No. of participants There is no difference between them You are free to distribute and use it. In case you wanted to host or re-distribute it. Please dont remove the links of group and website. Question No: 1 Key version represents public key by Buyer Seller E-Bank Certification Authority Ref: PAGE # 116 E-cash Coins The currency used in this payment system is called an e-cash coin or simply coin. A coin consists of three elements or parts - serial #, key version and serial no. signed by the secret or private key of a certain denomination of the ecash bank. In other words, a coin of one dollar would consist of the following: Coin = Serial#, key version, {Serial #} SK banks $1 key Each coin has a unique value, partly minted by the client and partly by the e-cash bank. Question No: 2 SSL stands for Secure Socket Layer Security Service Layer Sub Secured Length None of these Ref: PAGE # 121 SECURE SOCKET LAYER (SSL) SSL is a protocol developed by Netscape Communications. SSL is built into many browsers. It operates at the TCP/IP layer of the OSI model, and uses a combination of symmetric and asymmetric cryptography. Question No: 3 How many kinds of Web Portals are?

3 2 5 6 Ref: PAGE # 129 Portal Model Portals are the web sites which provide chance to the visitors to find almost everything in one place. Horizontal portals provide information about a very broad range of topics. Search engine is the example of a horizontal portal. Vertical portals provide information pertaining to a single area of interest. Community Portals such as those related to medical or legal profession are the examples of a vertical portal. Question No: 4 Brick and Mortar refers to Offline business Online business Transport Building Ref: PAGE # 129 Brick-and-Mortar vs. Click-and-Mortar businesses These two terms refer to the offline and the online businesses, respectively. Where a company is doing its business both online and offline, there is often the problem of lack of proper integration between the two different channels of business. Note: Offline business = Brick-and-Mortar And Online Business = Click-and-Mortar businesses Question No: 5 Digital Content Revenue Model Includes Legal information services Online journals Online Libraries All of the above Ref: PAGE # 130 Digital Content Revenue Model Web serves as a very efficient distribution mechanism of content. Therefore, one finds many e-businesses that offer different types of information services such as legal information, corporate information, government information, news and resources for academic libraries etc. These services can be customized by an e-business for different firm sizes depending upon their needs and usage pattern. Normally, a customer has to subscribe to such services by paying certain amount as subscription fee. This fee becomes the main source of generating revenue for the ebusiness. Instead of subscription fee, a credit card charge option can be made available for infrequent users. Online journals, newspapers, libraries fall under this category Question No: 6 Which of following marketing campaigns are cheap an effective way to target potential customers? Sale forces E-mail Media promotion Marketing software Ref: PAGE # 133 E-MAIL MARKETING E-mail marketing campaigns are cheap and effective way to target potential customers. Question No: 7

What does Telemarketing means? Marketing through charting Marketing through telephone Marketing through email Marketing through web casting Ref: PAGE # 133 Telemarketing Live interaction through telephone Question No: 8 Which of following services build a strong customer loyalty towards company and its products? Customer services Public relations(PR) Bulletin board Exhibitions. Ref: PAGE # 136 One major goal of CRM is to establish a long-lasting relationship between a company and its customers. Good customer services can help in building a sense of loyalty towards company and its products or services. Question No: 9 Track the customers online and do personalization is only possible through which of the following file(s) analysis. log files cookie data mining log files and cookies. Ref: PAGE # 136 You know that cookies allow e-commerce sites to record visitor behavior. They can be used to track customers online and do personalization. Many customers do not know that their information is being collected and used by the e-business site. Question No: 10 Which of the following is true for Class A: Network 01 byte and 03 hosts Network 02 bytes and 02 hosts Network 03 bytes and 01 host None of these Ref: PAGE # 10 By rule, in class A networks first byte would refer to the network address and the remaining three bytes to the host machines on that network providing a very large network. http://vuzs.net/ http://groups.google.com/group/vuZs Question No: 11 What is the correct HTML for making a text input field? <textinput type="text"> <input type="text"> <input type="textfield"> <textfield>

Ref: PAGE # 27 First Name: <INPUT TYPE="TEXT" NAME="First"> Question No: 12 IIS stands for: International Information Service Internet Information Server Internet Information standards All of these Ref: PAGE# 85 ASP We can discuss ASP a little more in detail. It runs best on IIS (Internet Information Server) which is freely available with Windows NT and Windows 2000. Question No: 13 The payer and the payee are issued digital certificates in standard format by their respective banks. X. 509 F. 609 L.8999 N.586 Ref: PAGE # 101 Digital certificates These are the certificates in electronic form which establish whether or not a public key belongs to the purported owner. A digital certificate at least comprises a public key, certification information (name, ID etc.) and electronic signatures of a certification authority. Digital certificates are prepared according to a generally accepted format called X.509 standard format. Question No: 14 What is a E-Cash wallet ? Hardware Agent Software All of the above Ref: PAGE # 116 Buyers and merchants, both, have accounts in the E-cash bank. Buyers withdraw coins against their account and store them in e-cash wallet software (Cyber wallet) on their computer. Cyber wallet stores and manages coins and records every transaction. Question No: 15 An E-cash coin consists of element (s) like: Serial # provided by client Key version Serial# signed by E-cash bank All of the above Ref: PAGE # 116 Coin = Serial#, key version, {Serial #} SK banks $1 key Question No: 16 What is Ultimate consumer orientation? Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. Secondary Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain.

Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of supply chain. None of them Ref: PAGE # 156 Supply chain and ultimate consumer orientation: Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. This approach is called ultimate consumer orientation. In 1995, a company dealing in the business of production of tiers in America adopted a different approach by shifting its focus on tire dealers from ultimate customers. Question No: 17 Customer data can be gathered and analyzing it customers can be served in a better Manner according to their needs, which is best option? Customization Customer orientation Customer satisfaction Focus Ref: PAGE # 157 Customization: With the help of EC, customer data can be gathered and analyzing it customers can be served in a better manner according to their needs. One can, thus, implement differentiation and focus strategy. Question No: 18 A company ABC web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death in that culture. Which is the international barrier it is having? Culture Language Lack of trust Infrastructure Ref: PAGE # 162 A web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death in that culture. Question No: 19 Exclusive right granted by law to make, use and sell an invention. What is called? Parasites Trade mark Patent infringement Copyright Ref: PAGE # 181 Patent infringement: A patent is an exclusive right granted by law to make, use and sell an invention. In order to be patentable, the invention must be unique, genuine, and useful according to the prevalent technological standards. Question No: 20 Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act. Which legal issue arises due to such acts? Cyber Crimes

Online Defamation Cyber squatting None Ref: PAGE # 182 Online Defamation: A defamatory statement is a false statement that injures the reputation of on another person or company. If a statement injures the reputation of a product or service instead of a person, it is called product disparagement. Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act. http://vuzs.net/ http://groups.google.com/group/vuZs Question No: 21 How can you reference part of a string? text.substr(5,6); text.part(5,6) text.piece(5,6) text.split(5,6); Ref: PAGE # 70 String Object: In the following example, str and myArray are the instances of string and array objects, respectively. The size of the array is 10. Here, charAt() is the function/method of string object. So, charAt(3) would provide the value of the element at the index three. Different other functions of string object have also been used. In the example, str.Split(' ') splits the string on the basis of blank space. After splitting, we assign parts of the string as values for the array. Question No: 22 One Tier Architecture __________. Select correct option: The entire processing may take place at individual terminal. The entire processing may take place at different terminal. The entire processing may not take place at individual terminal. None of Above Ref: PAGE # 88 Client server architecture: Note that we may have different tiers in client server architecture depending on where the processing of data takes place. In 1-tier architecture, the entire processing takes place at a single place/zone. Question No: 23 Following are the names of some well known e-commerce software, EXCEPT ----------- . Intershop IBM's WebSphere Commerce Professional Edition Microsoft Commerce Server 2002 Microsoft SQL Server 2005 Ref: PAGE # 93 E-commerce Software: Following are the names of some well-known e-commerce software: Intershop Enfinity IBMs WebSphere Commerce Professional Edition Microsoft Commerce Server 2002 Question No: 24 In Style Sheets, How do you change the font of an element? font-face: font:

font-family: font-style: Ref: PAGE # 43 Font family styles <HTML> <HEAD> <TITLE>Style Sheets: Font Families</TITLE> <STYLE> Question No: 25 A paper signature is believed to be more reliable than a digital signature. True False Ref: PAGE # 106 A digital or electronic signature is believed to be more reliable as compared to paper signatures because it is not ordinarily possible to copy or forge an electronic/digital signature. But, that is very much possible in case of paper signatures. Question No: 26 The serial # generated by the cyber wallet gets multiplied by blinding factor r which is known only to the ___________. Client Bank Merchant None of above Ref: PAGE # 116 Cyberwallet generates a serial # and a blinding factor r. This blinding factor r is only known to the client. It is used in the following mathematical expression which is sent to the bank for signatures. Serial # . re2 (mod m) Question No: 27 SET doesnt require special software on the client or merchant side. True False Ref: PAGE # 122 Merchants must have special SET software to process transactions. Customers must have digital wallet software that stores certificates and card information. Question No: 28 The result of OLAP is displayed in the form of a __________. Data square Data Triangle Data cube Data circle Ref: PAGE # 145 Online Analytical Processing (OLAP): OLAP makes use of background knowledge regarding the domain of the data being studied in order to allow the presentation of data at different levels of abstraction. It is different form data mining in the sense that it does not provide any patterns for making predictions; rather the information stored in databases can be presented/ viewed in a convenient format in case of OLAP at different levels that facilitates decision makers or managers. The result of OLAP is displayed in the form of a data cube Question No: 29 Classification and Association belong to which of the following types of Data Mining? Selective Predictive

Descriptive Additive Ref: PAGE # 145 Online Analytical Processing (OLAP): OLAP makes use of background knowledge regarding the domain of the data being studied in order to allow the presentation of data at different levels of abstraction. It is different form data mining in the sense that it does not provide any patterns for making predictions Question No: 30 Which one of the following algorithms does not include in public key algorithms? DSS RSA Elliptic Curves RC4 Ref: PAGE # 108 Public Key Algorithms: Following is the list some popular public key algorithms: DSS Digital Signature Standard based on DSA (Digital Standard Algorithm) key length is between 512-1024 bits RSA Elliptic Curves http://vuzs.net/ http://groups.google.com/group/vuZs Question No: 31 Four Ps in Marketing Mix are: Product, price, place, promotion (Sure) Price, person, place, problem Place, product, property, promotion Promotion, place, product, planning Question No: 32 JIT Stands for Just In Time Joint investigation Technique Join in Training Just In Total Ref: PAGE # 147 For instance, packaging material should only be ordered for just in time (JIT) delivery Question No: 33 Advertising Supported Revenue Model includes Yahoo portal Employment sites Newspaper Publishers All of the above Ref: PAGE # 130 Advertising-Supported Revenue Model: In this model service/information is provided free of any charge to certain audience and the advertising revenue is sufficient to support the operation of the business and its cost. For example, Yahoo portal provides useful information and a search engine free of cost, but earns revenue through advertisements on its portal web site to bear the operational cost.

Question No: 34 Which of the following is true for Class A: Network 01 byte and 03 hosts Network 02 bytes and 02 hosts Network 03 bytes and 01 host None of these Ref: PAGE # 10 By rule, in class A networks first byte would refer to the network address and the remaining three bytes to the host machines on that network providing a very large network. Question No: 35 Which of the following needs human action to execute? Virus Worm Trojan Horse All of these Ref: PAGE # 94 Viruses, on the other hand, need to be activated through a human action. Question No: 36 In the digital signature technique, the sender of the message uses ________ to create cipher text His or Her own symmetric key His or her own private key His or her own public key The receivers private key Ref: PAGE # 103 Then the sender adds his private key in the obtained message digest to create his digital signatures. This digitally singed message is received by the receiver, who applies the pubic key of the sender to decrypt the digital signature and reveal the message digest. Question No: 37 PIN stands for: Payment investigation Number Password Identification Number Personal Identification Number Personal Identification Numeric Ref: http://www.wsu.edu/~brians/errors/pin.html Those who object to PIN number on the grounds that the N in PIN stands for number in the phrase personal identification number are quite right, but it may be difficult to get people to say anything else. PIN was invented to meet the objection that a password consisting of nothing but numbers is not a word Question No: 38 An electronic check contains a(n) to the payers bank to make a specified payment to the payee Serial# Private key Instruction All of the above Ref: PAGE # 113 Electronic Checks:

Financial Services Technology Consortium (FSTC) is a group of U.S banks, research agencies and government organizations formed in 1993. It has introduced the concept of electronic checks. An electronic check contains an instruction to the payers bank to make a specified payment to a payee. Question No: 40 It is the ability to sell the goods or provide the service at a price that is lower than that of competitors, and thus attract more customers. What is called? Cost leadership Price leadership Focus Differentiation Ref: PAGE # 157 Cost leadership: It is the ability to sell the goods or provide the service at a price that is lower than that of competitors, and thus attract more customers. http://vuzs.net/ http://groups.google.com/group/vuZs Question No: 41 E-commerce is a combination of three different areas of study, namely, --------, ---------------- and ---------------Internal, external support, Support Technology, business and law/policy Primary, Secondary, R&D Sale, purchase, feed back Ref: PAGE # 161 E-commerce is a combination of three different areas of study, namely, technology, business and law/policy. We have studied the technology and business side of e-commerce to a reasonably good extent. Question No: 42 GM Celebes manufacturing electronic goods and FryChips co selling French fries. Under the traditional trade mark law both these companies can have the same trade mark/trade name such as frys. The problem arises when both apply for the registration of a domain name containing the word frys. Here, both are legitimate claimants of this domain name but due to the element of uniqueness of domain names only one of them can be assigned the desired domain name. Which legal issue arises in this situation? Domain name conflict Cyber squatting Concurrent use None Ref: PAGE # 181 Concurrent use This problem arises when two organizations have apparently legitimate claim to use the same domain name but cannot do so due to the uniqueness of domain names. Suppose, there is a company manufacturing electronic goods and another company selling french fries. Under the traditional trade mark law both these companies can have the same trade mark/trade name such as frys. The problem arises when both apply for the registration of a domain name containing the word frys. Here, both are legitimate claimants of this domain name but due to the element of uniqueness of domain names only one of them can be assigned the desired domain name. Question No: 43 Which type of Data Mining contains the elements as Support and confidence? Classification Association Characterization

Clustering Ref: PAGE # 144 CONFIDENCE AND SUPPORT: There are two terms/measures used in association, that is, support and confidence. Confidence is a measure of how often the relationship holds true e.g, what percentage of time did people who bought milk also bought eggs. Question No: 44 OLAP stands for Online Analytical Program Online Analytical Processing Online Application Program Online Analysis Performance Ref: PAGE # 145 Online Analytical Processing (OLAP): OLAP makes use of background knowledge regarding the domain of the data being studied in order to allow the presentation of data at different levels of abstraction. Question No: 45 Support activities in Value Chain model includes Finance and Administration Human Resources Technology Development All of these Ref: PAGE # 152 Question No: 46 Which of the following is NOT processed on the client side? Cookies JavaScript CGI scripts Applets Ref: PAGE # 82 CGI scripts: Term Common Gateway Interface (CGI) is defined as a standard method/protocol that allows data from forms to be used by programs on the server. Question No: 47 Due to which characteristics, ATM network are covered under E-commerce ? Exchange of information through computer networks (Doubt) Internet. Exchanging of products, services. None of the above. Basically ATM works to Exchange of information through computer networks so in my point of view it will held in definition of e-commerce. Ref: PAGE # 2 E-Commerce definition: Electronic commerce is an emerging concept that describes the process of buying and selling or exchanging of products, services and information via computer networks including the internet Question No: 48 SET is better than SSL.

True False Ref: PAGE # 122 Secure Electronic Transaction (SET): The drawback in SSL that the credit card/debit card information remains with the merchant led to the development of a more sophisticated protocol called SET. Question No: 49 Dividing market, with respect to people having income level greater than Rs 30000, is geographic segmentation. True. False. Ref: PAGE # 131 Segments are defined in terms of demographic characteristics such as age, gender, marital status, income level Question No: 50 Which of the following is NOT an identified behavioral mode of customers on the web? Browsers Buyers Shoppers Seller Ref: PAGE # 132 Behavioral segmentation Creation of separate experiences for customers based on their behavior is called behavioral segmentation. Three identified behavioral modes of the customers on the web are: Browsers customers who just browse through the site with no intention of buying Buyers customers who are ready to buy right away Shoppers customers who are motivated to buy but want more information http://vuzs.net/ http://groups.google.com/group/vuZs Question No: 51 Which of these is a way of conducting market research? Phone. Interviews. Questionnaires. All of above. Ref: PAGE # 132 Marketing Research: It consists of interviews, paper and phone surveys, questionnaires, findings based on previous investigations etc. to find strengths and weaknesses of your business and the business of your competitors. It also includes the analysis of opportunities and threats to your business. Question No: 52 Which of these is NOT a stage of knowledge discovery process? Transformation Data mining Pattern evaluation Process evaluation Ref: PAGE # 140 Knowledge discovery:

A knowledge discovery process includes data cleaning, data integration, data selection, data transformation, data mining, pattern evaluation and knowledge presentation. Question No: 53 According to Michael Porter, test marketing is an example of primary activity in a strategic business unit. Identify the area in which this task is performed. Design Market and sell Deliver activities relate to storage Purchase materials and supplies Ref: PAGE # 152 Design activities take a product form concept stage to manufacturing stage. They include concept research, engineering, drawings preparation, test marketing etc. Question No: 54 Electronic banking is also known as __________. Cyber banking Virtual banking Online banking All of above Ref: PAGE # 150 Electronic Banking: Electronic banking, also known as cyber banking, virtual banking, home banking and online banking, includes various banking activities conducted from home, business, or on the road, instead of at a physical bank location. Question No: 55 Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Is it? True False Ref: PAGE # 176 Civil law and criminal law. Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Civil wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general. Question No: 56 In datalink layer, data packets are placed inside Data frames Data boxes Data streams None of these Ref: PAGE # 6 Data link layer: It places data packets into data frames. Network Interface Card Drivers/Protocols operate at this layer. It is used to identify MAC or hardware address of computer machines. Question No: 57 At deposit stage, the serial number is ..by E-Cashbank Known Unknown Kept Secret

Informed Ref: PAGE # 118 Deposit Stage Serial no. (Known) Client (unknown) Question No: 58 Let us, suppose that you have hosted your e-commerce website, When you provide opt-in e-mail option to your customers on your website and customer opt for it , what does it mean to receive ? Information about product through advertisement Information about product through e-mail Information about services available on it Information about News through e-mail. Ref: PAGE # 133 Internet mailing lists can also be conveniently used to send targeted personalized emails. You can also provide the opt-in e-mail option to your customers on your web site. If they opt for it, this means that they want to receive through email any product information, offers or promotions etc. Question No: 59 Track the customers online and do personalization is only possible through which of the following file(s) analysis. log files cookie data mining log files and cookies. Ref: PAGE # 136 You know that cookies allow e-commerce sites to record visitor behavior. They can be used to track customers online and do personalization. Many customers do not know that their information is being collected and used by the e-business site. Thus, informational privacy rights of customers can be breached in cases where cookies are used. Question No: 60 When customer life cycle is used to create different groups of customers, it is called? Targeting Customers Dynamic groups Customer Life Cycle Segmentation Group Development Ref: PAGE #137 Life Cycle Segmentation: These five stages are also called customer life cycle. Using them to create groups of customers is called customer life-cycle segmentation. Segment information is useful for companies to develop better relationship with the customers. Companies, thus, know about their customers and their level of relationship with the company, and can customize their product/service. http://vuzs.net/ http://groups.google.com/group/vuZs Question No: 61 Network addresses 128--- 191 range belongs to which of the following class networks? A B C E Ref: PAGE # 11

Examples Class A: 255.0.0.0 Class B: 255.255.0.0 Class C: 255.255.255.0 NOTE: in McQ 128--- 191 is not written after one dot it means they are separate from each other so it belong to A class. Question No: 62 Which of the following property falls in HTTP? Stateless Stateful Temporary All of these Ref: PAGE # 3 HTTP is stateless because in the fourth step the server breaks the connection. We can say, therefore: Each operation or transaction makes a new connection Each operation is unaware of any other connection Each click is a new connection Question No: 63 FSTC stands for: Financial Services Technology Consortium Financial Secrets Technology Consortium Final Security threats control First Service Technology Consortium Ref: PAGE # 113 Financial Services Technology Consortium (FSTC) is a group of U.S banks, research agencies and government organizations formed in 1993. It has introduced the concept of electronic checks. An electronic check contains an instruction to the payers bank to make a specified payment to a payee. Question No: 64 Supply chain can be broken into three parts, that is ----------------- , ----------------------- and -------------------activities. Internal, external support Upstream, internal ,downstream Primary, Secondary, R&D None of them Ref: PAGE # 155 SUPPLY CHAIN: Supply chain includes all the activities associated with the flow and transformation of goods from the raw materials stage all the way to the end user. Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities Upstream activities relate to materials/services or the input from suppliers Internal activities relate to manufacturing and packaging of goods Downstream activities relate to distribution and sale of goods to distributors/customers Question No: 65 The process of taking active role in working with suppliers to improve products and processes is called? Value chain management Supply chain management Supply chain management software Porter Model

Ref: PAGE # 155 Supply chain management: Engaging and negotiating with suppliers can be extremely beneficial. The process of taking active role in working with suppliers to improve products and processes is called supply chain management. Question No: 66 Many search engines rank the site by using a program called Spider Scorpion Moon Cobweb Ref: PAGE # 138 Some search engines search the entire internet each time. Many search engines rank the site by using a program called spider which inspects the site before ranking. Question No: 67 In which type of data mining, Apriori algorithms is used? Classification Association Characterization Clustering Ref: PAGE # 143 Association: Association analysis is the discovery of association rules showing attribute-value conditions that occur frequently together in a given set of data. It is widely used for market basket analysis. For example, where we are recording sales of a big shopping store in databases, then by applying association mining we may discover that certain items have a strong bondage or affinity with each other such that when one item is purchased the other is purchased, too. Apriori algorithm is used for association mining. Question No: 68 EDI has the key feature(s) No paper work No human intervention Exchange of information takes place in seconds All of these Ref: PAGE # 147 EDI include: No paper work No human intervention Exchange of information takes place in seconds Question No: 69 Addresses are tied to the device itself and give no clue to it's location on a global scale. This is the characteristics of IP RIP MAC None of the given Ref: PAGE # 13 Media access control (MAC) address: Data to be delivered on a network has to be converted first into serial transmission. This is done through a device called Network Interface Card (NIC) that must be installed in a computer on the network. NIC has also got printed on it a 48 bits unique address called the MAC or hardware address of the computer machine. In other words, it consists of 12 hexadecimal characters and can have different format as shown Below: 090017A9B2EF 09:00:17:A9:B2:EF

09-00-17-A9-B2-EF Whereas the IP address of a computer may change from time to time, its MAC address would remain the same unless the existing NIC is replaced with another. It can easily be inferred that there are 248 unique MAC addresses possible (which is an unimaginably high number). An organization called Institute of Electrical and Electronic Engineers (IEEE) administers the allocation of MAC addresses, worldwide. It ensures that there is no duplication of MAC addresses by the manufacturers of NICs. Question No: 70 When two or more intranets are connected to each other they form a/an ------------- . intranet internet extranet VPN Ref: PAGE # 98 VPN is the example of an extranet. You know that when two or more intranets are connected to each other they form an extranet. A manufacturing company thus can be connected to its suppliers of raw material and its distributors through VPN. http://vuzs.net/ http://groups.google.com/group/vuZs Question No: 71 ( Marks: 1 ) - Please choose one Which attribute can be used to make a region non-clickable? none of the given target alt nohref Ref: PAGE # 37 <Area> tag attributes: alt attribute is used to label the clickable region. Target attribute can be used to display result in a given frame. Nohref attribute can be used to make a region non-clickable. For example, <Area shape=circle coords=70,45,25 href=a.htm alt=a.htm target=upper nohref> Question No: 72 Which of the following payment mode does not require customer to pay interest to the bank on each transaction? Credit card Debit card Electronic check All of the above Ref: PAGE # 110 In case of a credit card the issuer bank charges interest from the client at a specified rate on the amount lent. On the other hand, in case of a debit card no such interest is payable since the customer uses his/her own money in that case. Question No: 73 Cyber wallet can automatically assemble the correct payment and pay it too. True False Ref: PAGE # 118 E-cash Purchase: Having received an order the merchant sends a payment request to the client in the following format: Payreq={currency,amount,timestamp,merchant_bank ID, merchant_accID, order description}

Cyber wallet automatically assembles the correct payment amount and pays. Question No: 74 SET doesnt require special software on the client or merchant side. True False Ref: PAGE # 122 Merchants must have special SET software to process transactions. Customers must have digital wallet software that stores certificates and card information. Question No: 75 Which model allows the users to log-on on a website and assume the role of bidder or seller? Online Banking. Storefront Model. E-Learning. Auction Model Ref: PAGE # 128 Auction Model: In this model there are auction sites to which the users can log-on and assume the role of a bidder or seller. Question No: 76 Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Is it? True False Ref: PAGE # 176 Civil law and criminal law. Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Civil wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general. Question No: 77 In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, ---------------and ---------Acceptance and consideration Acceptance and Rejection Approval and consideration None Ref: PAGE # 178 Online contracts: In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, acceptance and consideration. The same three elements must also be present in case of a valid online contract. Question No: 78 In online environment acceptances may be issued by an imposter/cheater that has authority to bind the online business True False Ref: PAGE # 178

In online environment acceptances may be issued by an imposter/cheater that does not have authority to bind the online business. To overcome this problem companies and individuals can use digital signatures to establish identity in online transactions. Question No: 79 #00ff00 in HTML indicates Pure green color Pure blue color Pure red color Pure yellow color Ref: PAGE # 23 <BODY bgcolor=Green text=white link=red> Instead of giving the color name as value of bgcolor one can also provide value in terms of a six digit code based on hexadecimal numbers called RGB values, e.g, #00FF00 refers to pure green color. Question No: 80 Virtual PIN Payment System requires both merchant and buyer to register with _______________. Auto Clearing House (ACH) First Virtual (FV) DSS (Digital Signature Standard) DES (Data Encryption Standard) Ref: PAGE # 110 Both merchants and buyers are required to register with First Virtual (FV). A buyer registering with FV forwards his or her credit card details and email address to FV and in exchange receives a pass phrase called, Virtual PIN. http://vuzs.net/ http://groups.google.com/group/vuZs Question No: 81 Identity that machine which services the internet request? Web Client Web Server Browser Mozilla Ref: PAGE # 2 Basic Definitions: Web client- machine that initiates internet request Web server machine that services internet request Browser - software at the client side to interact with web data Intranet an internal network of computers confined to a single place Extranet when two or more intranets are connected with each other, they form an Extranet e.g, Virtual Private Network Internet a global network of networks is defined as internet Question No: 82 What does ETO stands for Electronic Transactions Ordinance Electric Transport ordinance Electronic Treaty Organization All Ref: PAGE # 163 Electronic Transactions Ordinance, 2002 (ETO):

ETO is the law introduced in 2002 which extends to the whole of Pakistan. It basically provides legal recognition to documents in electronic form and to electronic signatures. To understand this law, it would be useful to revise the concept related to the working of digital signature technology (refer to Lecture no. 23). We shall look at salient provisions/features of this law as it directly deals with e commerce in Pakistan. Section 2 of the ETO defines different terms used in it. For convenience these terms have been reproduced here (you do not need to memorize these for exam). Question No: 83 Which one of the following algorithms does not include in symmetric key algorithms DES RC2 RC4 RSA Ref: PAGE # 108 Following is the list of some popular symmetric key algorithms: DES (Data Encryption Standard) 56 bits IDEA (International Data Encryption Algorithm (IDEA) 128 bits RC2 (block cipher) 1-2048 bits RC4 (stream cipher) 1-2048 bits Rinjdael 128-256 bits Question No: 84 EFT stands for Electronic Funds Transfer Electronic Finance Transfer Easy Funds Transfer Early Funds Transaction Ref: PAGE # 114 EFT stands for electronic funds transfer. Question No: 85 Television, radio and print media are in a (n) . Mode Passive Active Static Dynamic Ref: PAGE # 139 Emotional branding vs. rational branding: In case of television, radio or print media people are normally in a passive mode. To a greater extent they do not control the communication channel and thus have to listen or view the advertisement about a brand. Question No: 86 Cipher suite is a combination of Cryptographic Algorithm Authentication methods Security layers Cryptographic Algorithm And Authentication methods Ref: PAGE # 121 SSL Handshake: SSL supports a variety of encryption algorithm and authentication methods. The combination of algorithms and methods is called a cipher suite. When a client connects to an SSL server, the SSL handshake begins, which means that the two negotiate a cipher suite selecting the strongest suite the two have in common.

Question No: 87 Which device uses the MAC address Switch Router Repeater None of these Ref: PAGE # 15 & 16 A switch would read the MAC address on a data packet and match it with the list of MAC addresses of the user machines contained in it. It then sends data packets only to that machine on a VLAN to which these packets relate. But on PAGE 16 about router see below line Routers: Routers use a combination of hardware and software to forward data packets to their destination on the internet. They are more efficient and sophisticated than bridges and switches. So my answer is Router Question No: 88 Choose the correct HTML code line which left-align the content inside a tablecell. <td leftalign> <td valign="left"> <td align="left"> <tdleft> Ref: PAGE # 26 Attributes for <TD> tag: Width - <td width=50%> specifies width of a cell with reference to the table width. Align - <td align=center> is used to align the text in a cell accordingly (you can also use left and right as values of align). Valign- <td valign=top> is used to vertically align the text in a cell (you can also use bottom or middle as values of valign). Question No: 89 Which one of following illustrates relationship between "<! -->" and // ? Closely related Hide the code Different Hide the tags Question No: 90 We can divide the Client Server architecture up to: 1 Tier 2 Tier 3 Tier N Tier Ref: PAGE # 89 We can divide the client server architecture into n tiers. http://vuzs.net/ http://groups.google.com/group/vuZs Question No: 91 DSS stands for Digital Signature Standards Digital Support Standards

Decision support system Digital Sign System Ref: PAGE # 108 Following is the list some popular public key algorithms: DSS Digital Signature Standard based on DSA (Digital Standard Algorithm) key length is between 512-1024 bits Question No: 92 Which one of the followings is an example of Banner advertising? Branding Affiliate programs Partnership All of these Ref: PAGE # 138 Affiliate Programs: An affiliate program is an agreement between two parties that one will pay the other a commission based on a specified customer action. It is not a strategic union as is partnership. Rather, it is for limited purpose and time. Banner advertising is the example of an affiliate program. Question No: 93 A firm Glory Enterprise and it wants to have its web site. It also wants to have the word glory as a part of its domain name because for years it has been recognized in the physical world through this word. However, at the time of registration of its domain name it finds that a person Mr. A. who has nothing to do with the business of the firm or the word glory have already registered a domain name containing this word as a part of it. Since there cannot be two similar domain names, the firm is forced to request Mr. A to transfer that domain name to it. In response, if Mr. A blackmails or claims ransom from the said firm, He would be said to have committed -------------. Cyber squatting Parasites Patent infringement Trade mark and domain name conflicts Ref: PAGE # 181 Cyber squatting: The act of intentionally registering domain names containing trademarks/trade names of prominent Companies to later blackmail or demand ransom from those companies is called cyber squatting. It is Regarded as an offence in most countries. Assume there is a firm Glory Enterprise and it wants to have its web site. It also wants to have the word glory as a part of its domain name because for years it has been recognized in the physical world through this word. However, at the time of registration of its domain name it finds that a person Mr. A who has nothing to do with the business of the firm or the word glory has already registered a domain name containing this word as a part of it. Since there cannot be two similar domain names, the firm is forced to request Mr. A to transfer that domain name to it. In response, if Mr. A blackmails or claims ransom from the said firm, he would be said to have committed cyber squatting. Question No: 94 In which type of approach, we further dig the data for retrieving information from data warehouse? Slice Dice Drill down Roll up Ref: PAGE # 146 Using drill-down we can further dig the data to receive some specific information. For example using that I can find the sale of furniture in a specific month of the first quarter, say, February. Roll-up is the reverse of drill-down.

Question No: 95 Which activity does not include in Primary Identify Customers Design Delivery Administration Ref: PAGE # 152

Question No: 96 What of the following is the correct HTML tag for making a drop-down list? <input type="list"> <input type="dropdown"> <select> <list> Ref: PAGE # 29 Selection lists: General format <select name=field name size=no. of items> between the <select> and </select> tags are the <option> and </option> tags which define the list items. If you omit size the list becomes a drop-down list. If size is two or more, the list becomes a rectangle with scroll bars for navigating the choices. Using Selected attribute an item is selected by default. Question No: 97 What does HTML stand for? Hyperlinks and Text Markup Language Home Tool Markup Language Hyper Text Markup Language Homepage Text Making Language Ref: PAGE # 18 Hypertext markup language: Web documents are defined by the Hypertext Markup Language (HTML). It is a language of tags. A tag is a special letter or key word enclosed in angular brackets. Question No: 98 JavaScript variables can begin with ----------- . a lower case letter an underscore character a dollar sign all of the above Ref: PAGE # 54 Rules for variables: Variable names can begin with an uppercase letter (A-Z), lower case letter (a-z), an underscore character (_), or dollar sign ($). Question No: 99 A unique large number, generated as a result of applying hash function on a message is called ________. Hash message Message digest Digitally singed message Secret message Ref: PAGE # 124

SET software on the customer side splits the order information from the account information. MDI is the message digest obtained by applying hash function on the order information. Question No: 100 FVIPSS stands for _________. First Virtual Internet Payment System Server First Virtual International Payment System Server First Virtual International Payment System Services First Virtual Internal Payment System Services Ref: PAGE # 110 Merchant queries the FV Internet Payment System Server (FVIPSS) to confirm Virtual PIN http://vuzs.net/ http://groups.google.com/group/vuZs Question No: 101 Which currency is used in e-cash Payment system? Dollar Coin Penny Cent Ref: PAGE # 116 Buyers and merchants, both, have accounts in the E-cash bank. Buyers withdraw coins against their account and store them in e-cash wallet software (Cyber wallet) on their computer. Question No: 102 Web browser and client wallet are installed on __________. Client's computer Bank's computer Merchant's computer None of above Ref: PAGE # 120 Client wallet and web browser are installed on the client machine. Question No: 103 Job searchers can search for jobs and employers can hire effectively using..... Online recruiting web sites. Online banking web sites. Online trading and lending web sites. Online news services web sites. Ref: PAGE # 128 Online Recruiting: Employers can recruit and job searchers can search for jobs effectively through online recruiting web sites. Question No: 104 According to Michael Porter, material handling is an example of primary activity in a strategic business unit. Identify the area in which this task is performed. Identify customers Market and sell Deliver activities relate to storage Purchase materials and supplies Ref: PAGE # 105 Deliver activities relate to storage, distribution and shipment of final product, e.g, warehousing, selecting shippers, material handling, timely delivery to customers etc.

Question No: 105 IT/EC can reduce the overall ------------- and afford to keep the price of the product relatively low Production cost Marketing cost Distribution cost None Ref: PAGE # 159 A business using IT/EC can reduce the overall production cost and afford to keep the price of the product relatively low. Question No: 106 Law is broadly divided into two classes on the basis of nature of wrong, namely, --------- and --------------Civil law and criminal law ETO and criminal law Supreme and Civil Law None Ref: PAGE # 176 Law is broadly divided into two classes on the basis of nature of wrong, namely, civil law and criminal law. Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Question No: 107 Browser is installed at : Client side machine Web server machine none both Client and Server Machines Ref: PAGE # 120 Web browser are installed on the client machine. Question No: 108 In Virtual Payment system, four kinds of information are provided to e-bank. Identify which one is NOT included: Buyer Accounts identifier Buyer password Address of Merchant Actual amount of money in favor of merchant Ref: PAGE # 112 To make payment an account holder is authenticated using an account identifier and a password, account identifier of the payee and the payment amount. Question No: 109 To overcome the lack of physical proximity appearance problem in e-business, which technology is going to be used Biometrics Video conferencing Cryptography Biometrics and Video conferencing Ref: PAGE # 134 Video conferencing is an example of web casting. For example, using this technique, doctors sitting in China, England and Pakistan etc. can, in real time, exchange and benefit from each others ideas as if they are physically holding a meeting.

Question No: 110 Dividing the potential customers into groups is called Market Segmentation Market Promotion Market Research Market Survey Ref: PAGE # 131 Market Segmentation: Businesses need to identify specific portions of their markets in order to target them with specific advertising messages. The practice called market segmentation divides the potential customers into segments or groups. http://vuzs.net/ http://groups.google.com/group/vuZs Question No: 111 Traditionally Marketer use the market segmentation(s) like Geo-graphic Segmentation Demographic Segmentation Psychographic Segmentation All of the above Ref: PAGE # 131 Traditionally, marketers have used three types of variables to define three different market segmentations, namely, geographic segmentation, demographic segmentation and psychographic segmentation. Question No: 112 In, there is no direct contact with the end users. B2B B2C C2C All above options Ref: PAGE # 137 Key difference between B2C and B2B is that in case of B2B there is no direct contact with the end users, whereas this contact exists in B2C. Thus, an e-business can have direct response or feedback from its customers in B2C as compared to B2B. Question No: 113 Allocation of MAC addresses is administered by -------------------------ICAAN ISO IEEE None Ref: PAGE # 13 It can easily be inferred that there are 248 unique MAC addresses possible (which is an unimaginably high number). An organization called Institute of Electrical and Electronic Engineers (IEEE) administers the allocation of MAC addresses, worldwide. It ensures that there is no duplication of MAC addresses by the manufacturers of NICs. Question No: 114 As a Web developer you can define a style sheet for? HTML elements and apply to many Web pages. A HTML element and apply to single Web page. A HTML element and apply to many Web pages. HTML elements and apply to one Web page. Ref: PAGE # 38 Style sheets:

Style sheet instructions can be embedded in the HTML document. An advantage of applying style sheets is that definition of the styles formatting is created once and the browser applies that formatting each time the tag is used. Secondly, pages are easier to modify, that is, edit the style definition and all the places where the style is used within the page get updated automatically. Most popular type of style sheets is Cascading Style Sheets. Question No: 115 What shall come in blanks for proper result, Here blanks are numbered with 1,2 and 3 <html> <head> <SCRIPT language="JavaScript"> Var num1, var num2 Document.container .result.value=parseFloat(num1)-parseFloat(num2) </script> </head> <body> <FORM name=---------1-----------> <input type=----------2------- name=-------3--------- maxlength=5> </form> </body> </html> container, text and result result, value and container container , button and value result, container and text Question No: 116 What does XML stand for? eXtra Modern Link X-Markup Language eXtensible Markup Language Example Markup Language Ref: PAGE # 74 Extensible markup language: World Wide Web Consortium (W3C), a non-profit organization that maintains standards for the web presented the draft of XML in late 1990s. Question No: 117 Cryptographic Algorithms are measured in terms of Key length Complexity Simplicity All of the above Ref: PAGE # 107 & 108 Key Length: A cryptographic key is represented as a string of binary digits 0s & 1s- inside a computer. & Cryptographic algorithms are measured in terms of key length. Question No: 118 -----------means that your product/service has certain quality that makes it more attractive than the one offered by your competitor, despite the price of your competitors product/service is somewhat lower Differentiation

Focus Cost leadership None of them Ref: PAGE # 157 Differentiation: Differentiation means that your product/service has certain quality that makes it more attractive than the one offered by your competitor, despite the price of your competitors product/service is somewhat lower. Question No: 119 Characterization and Clustering belong to which of the following types of Data Mining? Additive Predictive Selective Descriptive Ref: PAGE # 141 Classification and association are predictive types of data mining while characterization and clustering represent the descriptive type. Question No: 120 In which type of data mining, ID3 algorithms is used? Classification Association Characterization Clustering Ref: PAGE # 141 Classification: It allows you to have a predictive model labeling different samples to different classes. The results of this type of mining/model are represented as (if-then) rules, decision trees, neural networks etc. Two important algorithms used for this type are ID3 Algorithm, and Bayesian classification. http://vuzs.net/ http://groups.google.com/group/vuZs Question No: 121 ANSI stands for . American National Standards Institute All Network Standards Institute American New standards Institute Australia National standards Institute Ref: PAGE # 147 ANSI (American National Standards Institute) Question No: 122 Who is making the Web standards? International Standard Organization ANSI Microsoft The World Wide Web Consortium Ref: PAGE # 74 World Wide Web Consortium (W3C), a non-profit organization that maintains standards for the web presented Question No: 123 Which of following is NOT an attribute of <AREA> tag? shape circle href cords

Ref: PAGE # 37 <Area shape=circle coords=70,45,25 href=a.htm alt=a.htm target=upper nohref> Question No: 124 Which of the following is an advantage of symmetric algorithms? Symmetric algorithms are faster Symmetric algorithms don't include any encryption Symmetric algorithms are slow in nature None of above Ref: PAGE # 105 A symmetric key can also be used for encrypting a message instead of using the pair of public and private keys. The advantage of using symmetric key is that since symmetric algorithms are faster as compared to asymmetric, therefore, the encryption of a message with the symmetric key takes place quickly. Question No: 125 What is the right sequence of steps in? Payees bank Payers bank Payee Payer. Payers bank Payee Payees bank Payer. Payers bank Payees bank Payer Payee. Payer Payee Payees bank Payers bank. Ref: PAGE # 113 Question No: 126 The key feature of E-Cash Payment system is __________. Simplicity Anonymity Availability Connectivity Ref: PAGE # 116 A company, DigiCash, has pioneered the use of electronic cash or e-cash. Anonymity of the buyer is the key feature of this system. There are three participants in it, namely, buyer, merchant and bank. Both, symmetric and asymmetric type of cryptography is used in this system. Question No: 127 In storefront e-business model buyers and sellers interact ___________ with each other. Directly. Indirectly. Through a third party. None of above. Ref: PAGE # 128 Storefront Model: It represents basic form of e-commerce where buyers and sellers interact directly. Question No: 128 Customers grouped by variables such as social class, personality or approach to life or lifestyle, is called ___________. Demographic Segmentation. Geographic Segmentation. Psychographic segmentation. Behavioral segmentation. Ref: PAGE # 131 Psychographic segmentation: Here customers are grouped by variables such as social class, personality or approach to life or lifestyle. Question No: 129 According to Michael Porter, material handling is an example of primary activity in a strategic business unit. Identify the area in which this task is performed.

Identify customers Market and sell Deliver activities relate to storage Purchase materials and supplies Ref: PAGE # 152 Deliver activities relate to storage, distribution and shipment of final product, e.g, warehousing, selecting shippers, material handling, timely delivery to customers etc. Question No: 130 According to Michael Porter, fabricating is an example of primary activity in a strategic business unit. Identify the area in which this task is performed. Market and sell Deliver activities relate to storage Purchase materials and supplies Manufacture product or create service Ref: PAGE # 152 Manufacture product or create service activities relate to transformation of materials and labor into finished products, e.g, fabricating, assembling, packaging etc. http://vuzs.net/ http://groups.google.com/group/vuZs Question No: 131 Web catalogue revenue model includes Online sellers of computer Gifts, flowers, clothes Journals Both first & second options Ref: PAGE # 130 Businesses using this type of a model include online sellers of computers, electronic items, books, music, videos, toys, flowers, gifts, clothes etc. Payment received from customers is the source of earning revenue. Question No: 132 In which type of approach, we sum up and integrate the information in a particular dimension to show the result? Dice Drill down Roll up Slice Ref: PAGE # 146 Roll-up is the reverse of drill-down. In it we can sum-up or integrate the information in a particular dimension to show the result. For example the sale of furniture or computers in a particular year (rather than a specific quarter) can be viewed using roll-up. Question No: 133 EDI used for ______. Used by organizations for transactions that not occur on a regular basis according to a pre-determined format. Used by organizations for transactions that occur on a regular basis according to a pre-determined format. Both NONE of Above Ref: PAGE # 147 ELECTRONIC DATA INTERCHANGE (EDI)

EDI is used by organizations for transactions that occur on a regular basis according to a predetermined format.

Question No: 134 Supply Chain Mangment broken down into ___________. Upstream activities Internal activities Downstream activities All of Above Ref: PAGE # 155 SUPPLY CHAIN: Supply chain includes all the activities associated with the flow and transformation of goods from the raw materials stage all the way to the end user. Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities Upstream activities relate to materials/services or the input from suppliers Internal activities relate to manufacturing and packaging of goods Downstream activities relate to distribution and sale of goods to distributors/customers Question No: 135 Mailbox: Outgoing messages can be placed. Incoming messages can be picked up. Ref: PAGE # 148 Postbox: where outgoing messages are placed, and Mailbox: where incoming messages can be picked up

Question No: 136 In many countries, stealing and misusing of meta information for getting competitive advantage is considered as an offence known as Tort of Private Nuisance Tort of Tress passing Tort of passing off Defamation Ref: PAGE # 138 In many countries, stealing and misusing Meta information in this manner to gain business/competitive advantage is considered as an offence known as the tort of passing-off.

Question No: 137 Three basic strategies for competitive advantage: __________. Cost leadership Differentiation

Focus All of Above Ref: PAGE # 157 Competitive Strategy: Ability of an organization to prosper arises from its competitive advantage over other organizations operating within its market sector. The strategy of a business to achieve this goal of competitive advantage is known as competitive strategy. Three basic strategies for competitive advantage are as under: Cost leadership Differentiation Focus Question No: 138 Which of these is an algorithm used in clustering? K-means L-means C-means F-means Ref: PAGE # 145 K-means algorithm is normally used in clustering. Question No: 139 Web is a(n).. Medium to disseminate information. Passive Active Static All of these Ref: PAGE # 139 Emotional appeals are difficult to covey on the internet because web is an active medium largely controlled by the customers Question No: 140 Each VAN has a centralized computer system that maintains ______________. One File Two Files Three Files Four Files Ref: PAGE # 148 Each VAN has a centralized computer system that maintains two files for each user, that is, Postbox: where outgoing messages are placed, and Mailbox: where incoming messages can be picked up http://vuzs.net/ http://groups.google.com/group/vuZs

Question No: 141 EDI Advantages inclues ______ Short time Reduced Costs Both None of Above Ref: PAGE # 147 Instance, packaging material should only be ordered for just in time (JIT) delivery, so that E-Pens can cut down on its stock of packaging and reduce the inventory cost. Question No: 142 Popular software packages for personal finance are ___________. Quicken MS Money Money 2003 All of Above Ref: PAGE # 152 Popular software packages for personal finance are Quicken, MS Money and Money 2003 etc. Question No: 143 Meta tag contains:

User information

Seller information Web page key information Bank information Ref: PAGE # 138 META INFORMATION: You know that a Meta tag contains the key information of a web page. Question No: 144 Popular EDI standards are _______. ANSI (American National Standards Institute) X12 standard EDIFACT (United Nations Standard of Electronic Data Interchange for Administration, Commerce and Transport) Both None of Above REF: PAGE # 147

EDI documents are formatted using published standards. Two popular EDI standards are ANSI (American National Standards Institute) X 12 standards and EDIFACT (United Nations Standard of Electronic Data Interchange for Administration, Commerce and Transport).

Question No: 145 Technology development relates to activities ___________. Fields tests Maintenance of procedures Process improvement studies All of Above Ref: PAGE # 153 Technology development relates to activities which help improve product/service that a business is selling and also help improve processes in every primary activity, e.g., fields tests, maintenance of procedures, process improvement studies etc. Question No: 146 Where there are quite a few erroneous or missing values in a row then that row can be deleted or discarded. This process is called............... Data Deletion Data Selection Data Integration Data Transformation Ref: PAGE # 141 Where there are quite a few erroneous or missing values in a row, then that row can be discarded/deleted altogether. This process is called data selection. Question No: 147 Upstream activities of the Supply Chain Managment relate to ___________. materials/services The input from suppliers Both None of Above Ref: PAGE # 155 Upstream activities relate to materials/services or the input from suppliers Question No: 148 Focus strategy means _____________________. That ability to sell the goods or provide the service at a price that is lower than that of competitors That your product/service has certain quality that makes it more attractive That concentration on a single aspect of the market

Concentration on many aspect of the market Ref: PAGE # 157 Focus: Focus strategy is defined as concentration on a single aspect of the market. That single aspect can be a particular market segment or market area or product type.

Question No: 149 What is true about Personal finance? Sell you products in no time. Buy you products in no time. Allows the management of your financial matters in a customized manner None Ref: PAGE # 152 PERSONAL FINANCE ONLINE: Personal finance allows the management of your financial matters in a customized manner. Question No: 150 What is true about ERP? Integrate all business functions At Single Location Efficient use of resource ALL Above Ref: PAGE # 93 Enterprise Resource Planning: Enterprise Resource Planning (ERP) is a concept that integrates all aspects of a business e.g, accounting, logistics, manufacturing, marketing, planning, project management etc. at a single place. An ERP system such as SAP is expensive. http://vuzs.net/ http://groups.google.com/group/vuZs Question No: 151 Supply Chain Managment can be broken down into ___________. One Activity Two Activities Three Activities Four Activties Ref: PAGE # 155 Upstream activities relate to materials/services or the input from suppliers Internal activities relate to manufacturing and packaging of goods Downstream activities relate to distribution and sale of goods to distributors/customers Question No: 152

VAN Stands for ______. Value Added Network Value Added Noise Ref: PAGE # 148 Value Added Network (VAN):

MIDTERM EXAMINATION Spring 2009 IT430- E-Commerce (Session - 4) Question No: 1 ( Marks: 1 ) - Please choose one In datalink layer, data packets are placed inside Data frames Data boxes Data streams None of these Question No: 2 ( Marks: 1 ) - Please choose one
..tag is used into .tag because a row contains multi cells and to fill up these cells with data.

TD TR TR TD TD TG TG TR Question No: 3 ( Marks: 1 ) - Please choose one Which tag is used for the hidden fields? <FIELD> <TEXT> <INPUT> <HIDDEN> Question No: 4 ( Marks: 1 ) - Please choose one Which of them is NOT a predefined object? Document Date Loop Array Question No: 5 ( Marks: 1 ) - Please choose one Which of these is not a comparison operator? < > = != Question No: 6 ( Marks: 1 ) - Please choose one Var d = new date() Which of the following is correct about the d variable? instance of new instance of Date() method instance of Date object Simple Variable Question No: 7 ( Marks: 1 ) - Please choose one

When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called Local Variables Global Variables Local and Global None of the above

Question No: 8

( Marks: 1 ) - Please choose one

Which of the following , is condition part of given For loop for (i = 0; i <= 5; i++). i=0. i++. i<=5. (i = 0; i <= 5; i++).

Question No: 9

( Marks: 1 ) - Please choose one

Which of the following is NOT valid HTML code line? <frameset rows="16%,84%"> <frameset columns="16%,84%"> <frameset cols="100,150"> <frameset cols=50%,50% rows=16%,84%>

Question No: 10

( Marks: 1 )

- Please choose one

CSS is a breakthrough in Web design because it allows developers to control the-------- Processing speed on client side Data grid view on client side Style and layout of home page. Style and layout of multiple Web pages

Question No: 11 (Marks: 1) - Please choose one For which of the following we need to know the classification of E-commerce? Market planning strategy Build Mission statement Management strategy none Question No: 12 ( Marks: 1 ) - Please choose one How can you open a link in a new browser window? <a href="/url" target="new"> <a href="/url" target="_blank"> <a href="/url" new> None of these Question No: 13 ( Marks: 1 ) - Please choose one What does the Target= _top tag perform? Loads the new page into the same frame Loads the new page into the entire window Loads the new page into a new browser window All of the above Question No: 14 ( Marks: 1 ) - Please choose one Which attribute is used in a tag to control the layout of element? view css

Style Layout Question No: 15 ( Marks: 1 ) - Please choose one Choose the correct HTML code line which left-align the content inside a tablecell. <td leftalign> <td valign="left"> <td align="left"> <tdleft> Question No: 16 ( Marks: 1 ) - Please choose one Where in an HTML document is the correct place to refer to an external style sheet? In the <body> section At the end of the document In the <head> section At the top of the document Question No: 17 ( Marks: 1 ) - Please choose one Constructor is defined as the initializing function used to create........ Instance of object Copy of object Instance / copy of object Shallow copy of object Question No: 18 ( Marks: 1 ) - Please choose one What does XML stand for? eXtra Modern Link X-Markup Language eXtensible Markup Language Example Markup Language Question No: 19 ( Marks: 1 ) - Please choose one For which of following purpose the Firewall is used ? Efficient working Protection against security attacks Networking purpose None of these Question No: 20 ( Marks: 1 ) - Please choose one PPP stands for Point to Point Protocol Post to Post Protocol Point to Post Protocol None of these Question No: 21 ( Marks: 1 ) - Please choose one Which of the following is NOT processed on the client side? Cookies JavaScript CGI scripts Applets Cookies Question No: 22 ( Marks: 1 ) - Please choose one

Firewall is used to I - examine the data entering the network II - examine the data leaving the network III - filter the data according to certain rules I, II and III I only I and III only I and II only Question No: 23 ( Marks: 1 ) - Please choose one Which firewall uses strong user authentication to verify identity of a host attempting to connect to the network? Packet filter firewall Circuit level firewall Application gateway firewall Hybrid firewall Question No: 24 ( Marks: 1 ) - Please choose one Bus networks is same as the system bus of a computer. True False Question No: 25 ( Marks: 1 ) - Please choose one In Style Sheets, How do you add a background color for all "<h1>" elements? all.h1 {background-color:#FFFFFF} h1.all {background-color:#FFFFFF} h1 {background-color:#FFFFFF} h1 {bgcolor:#FFFFFF} Question No: 26 ( Marks: 1 ) - Please choose one How do you make each word in a text start with a capital letter? text-transform:capitalize text-transform:first_capitalize. Cannt be possible with CSS text-transform:uppercase Question No: 27 ( Marks: 1 ) - Please choose one MAC address is written in Binary form 0-1 Decimal form 0-9 Hexadecimal form 0-f None of these Question No: 28 ( Marks: 1 ) - Please choose one MAC stand for Media Access Control 13 Media Access Consortium Member of Asian Community None of these Question No: 29 ( Marks: 1 ) - Please choose one Choose the correct HTML tag for the largest heading <head>

<h1> <Heading> <h6> Question No: 30 ( Marks: 1 ) - Please choose one Which of the following tags are used for embedding sound files into HTML code? <A href=song.wav> <EMBED SRC="Skylar.MP3"> <A href=song.wav> and <EMBED SRC="Skylar.MP3"> None of these Do correction in all midterm file J Question No:44 answer is 3rd Question No: 31 ( Marks: 1 ) - Please choose one Which of the following is NOT an advantage of CSS ? Works on version 4 browsers or newer Define the look of your pages in one place Easily change the look Implement same formatting each time tag is used. Question No: 32 ( Marks: 1 ) - Please choose one Which of the following is correct line to add separated css file with name xxxx.css? <link scr=stylesheet href="/xxxx.css" type="text/css"> <link rel=stylesheet href="/xxxx.css" type="text/css"> <style rel=stylesheet href="/xxxx.css" type="text/css"> <link rel=stylesheet scr="xxxx.css" type="text/css"> Question No: 33 ( Marks: 1 ) - Please choose one Which of the following is correct syntax to define color in CSS? body {color: black} body:color=black {body:color=black(body} {body;color:black} Question No: 34 ( Marks: 1 ) - Please choose one Inside which of the following HTML element do we put the JavaScript? <script> <js> <javascript> <scripting> Question No: 35 ( Marks: 1 ) - Please choose one Which one is the responsible to manage Internal processes? E-business E-commerce E-marketing All of the given Question No: 36 ( Marks: 1 ) - Please choose one The first control statement in a for loop usually sets the termination condition increments a counter creates a control variable

none of the above Question No: 37 ( Marks: 1 ) - Please choose one You define a method using obj.method obj.method[] obj.method() obj-method Question No: 38 ( Marks: 1 ) - Please choose one What is the default scripting language in ASP? EcmaScript JavaScript Java VBScript 85 Question No: 39 ( Marks: 1 ) - Please choose one Following are malicious programs EXCEPT ----------------- . Back doors Trojan Horses Firewalls 94 Worms Question No: 40 ( Marks: 1 ) - Please choose one Outside attacks on a network include the following, EXCEPT --------------- . Password attack DoS Back doors IP spoofing Question No: 41 ( Marks: 1 ) - Please choose one The process of scrambling a message with the help of a key is called -------------- . Cryptography 100 Filtering Transposition Encryption Question No: 42 ( Marks: 1 ) - Please choose one In a ring network, every device has exactly ______ neighbors for communication purpose. more than two Two Four None of these Question No: 43 ( Marks: 1 ) - Please choose one What is identified by the tag <FRAMESET COLS="20%,60%,20%">? Horizontal frame Vertical Frame 31 Top Frame Bottom Frame Question No: 44 ( Marks: 1 ) - Please choose one Why we use reset tag in HTML? To remove the text written in Notepad.

To remove the text written in between <body> and </body>tag. To remove the text written in between <head> and </head> tag. To remove the text written in between <form> and </form> tag. Question No: 45 ( Marks: 1 ) - Please choose one Network Interface Card is operated at Application layer Session layer Network layer Datalink layer 6 Question No: 46 ( Marks: 1 ) - Please choose one Academic institutions, religious organizations and government using --------------------- ecommerce classification Business-to-Business(B2B) Intra Business Non Business EC 2 Business-to-consumer(B2C) Question No: 47 ( Marks: 1 ) - Please choose one What is the correct HTML tag for adding a background color? <background>yellow</background> <body bgcolor="yellow"> <body color="yellow"> None Question No: 48 ( Marks: 1 ) - Please choose one Which HTML tag is used to define an internal style sheet? <css> <script> <style> (Ans) <sheet> Question No: 49 ( Marks: 1 ) - Please choose one What is the correct HTML for making a hyperlink? <a href="http://www.w3schools.com">W3Schools</a> (Ans) <a name="http://www.w3schools.com">W3Schools.com</a> <a url="http://www.w3schools.com">W3Schools.com</a> <a>http://www.w3schools.com</a> Question No: 50 ( Marks: 1 ) - Please choose one If we leave out the target attribute in frame tag and link was clicked ,the document loads into the window In Same page In other blank page. To display browser error. All of the options. Question No: 51 ( Marks: 1 ) - Please choose one What does mean by != comparison operator? Equal to Not Equal

Not Equal 58 Question No: 52 ( Marks: 1 ) - Please choose one What does the string. match (abc) object do? Concatenates the abc word to other abc words Matches the abc words with other abc words It does replacement of abc word with other words All of the above Question No: 53 ( Marks: 1 ) - Please choose one var txt="Hello World!" document.write(txt.length), it would return the length as. 10 11 12 13 Question No: 55 ( Marks: 1 ) - Please choose one How can you convert information consisting of comma separated values into an array? txtArray = txt.indexOf(','); txtArray = txt.split(','); page 70 txtArray = txt.trim(','); txtArray = txt.substring(','); Question No: 56 ( Marks: 1 ) - Please choose one The control statement on a while loop is tested before each time through the loop after each time through the loop once at the start once at the end Question No: 57 ( Marks: 1 ) - Please choose one Which SQL statement is used to delete data from a database? DELETE COLLAPSE REMOVE DISCARD Question No: 58 ( Marks: 1 ) - Please choose one A program that performs a specific function such as creating invoices/bills or processing payment received from customers is called a/an ---------------. Middleware Web Service CRM Software Appplication Program page 92 Question No: 59 ( Marks: 1 ) - Please choose one When data moves upward in the OSI stack it is called Encapsulation De-encapsulation Synchronization None of these Question No: 60 ( Marks: 1 ) - Please choose one In star network features a central connection point called a "hub" that ought to be only a hub.

True False Question No: 61 ( Marks: 1 ) - Please choose one Switch is a device that joins multiple computers together within one local area network (LAN). True False Question No: 62 ( Marks: 1 ) - Please choose one Switch generally contains more "intelligence" than a hub. True False Question No: 63 ( Marks: 1 ) - Please choose one SMTP POP3 IMAP 18 ICMP Question No: 64 ( Marks: 1 ) - Please choose one Which protocol does Virtual university use to send email to student Accounts? SMTP POP IMAP TCP Question No: 65 ( Marks: 1 ) - Please choose one For which one of the following,<MARQUEE ...> tag can work better News headlines Announcements Sound pulgin Movie controls Question No: 66 ( Marks: 1 ) - Please choose one Can you add a style in a single place on a page ? Yes, with a style-definition written into the tag Yes, with a global style definition that redefines the tag. No - CSS can only be defined for entire pages. Question No: 67 ( Marks: 1 ) - Please choose one Which CSS tag is used to place an image that would remain when user scrolls down or up the page? background-attachment: fixed 48 background-attachment: scroll background-attachment: up All of these Question No: 68 ( Marks: 1 ) - Please choose one What shall come in blanks for proper result, Here blanks are numbered with 1,2 and 3 <html> <head> <SCRIPT language="JavaScript"> Var num1, var num2

Document.container .result.value=parseFloat(num1)-parseFloat(num2) </script> </head> <body> <FORM name=---------1-----------> <input type=----------2------- name=-------3--------- maxlength=5> </form> </body> </html> container, text and result result, value and container container , button and value result, container and text Question No: 69 ( Marks: 1 ) - Please choose one Correct syntax of "for" loop is : for (i = 0; i <= 5) for i = 1 to 5 for (i <= 5; i++) for (i = 0; i <= 5; i++) Question No: 70 ( Marks: 1 ) - Please choose one CGI stands for Common Gate Information Common Gate Interface 82 Common Goal Interest Common Global Interaction Question No: 71 ( Marks: 1 ) - Please choose one Which of the following property falls in HTTP? Stateless Stateful Temporary All of these Question No: 72 ( Marks: 1 ) - Please choose one What is a correct way of referring to a stylesheet called "mystyle.xsl" ? <?xml-stylesheet type="text/xsl" href="/mystyle.xsl" ?> <link type="text/xsl" href="/mystyle.xsl" /> <stylesheet type="text/xsl" href="/mystyle.xsl" /> <?stylesheet type="text/xsl" href="/mystyle.xsl" ?> Question No: 73 ( Marks: 1 ) - Please choose one Which of the following does not interpret its code? ASP PHP JSP 85 Coldfusion Technologies like ASP, PHP and Coldfusion interpret their code except Question No: 74 ( Marks: 1 ) - Please choose one Asymmetric cryptography is also called -------------- .

Public key cryptography 100 Private key cryptography Substitution cryptography Transposition Question No: 75 ( Marks: 1 ) - Please choose one Digital signature uses --------- . Symmetric cryptography Private key cryptography Public key cryptography Hash function Question No: 76 ( Marks: 1 ) - Please choose one Which one of the following is NOT a valid JavaScript variable? _name1 $studentScore first_name 2ndName 54 Question No: 77 ( Marks: 1 ) - Please choose one Which of these is the correct HTML code for creating a reset button? <input type =button name=reset value=reset> <input type=resetButton value=Clear> <input type=reset value=reset> <input type=button name=reset value=clear> Question No: 78 ( Marks: 1 ) - Please choose one http://cs.vu.edu is an example of Two zone domain name Three zone domain name Four zone domain name Five zone domain name MIDTERM EXAMINATION Spring 2009 IT430- E-Commerce (Session - 4) Question No: 79 ( Marks: 1 ) - Please choose one In datalink layer, data packets are placed inside Data frames Data boxes Data streams None of these Question No: 80 ( Marks: 1 ) - Please choose one ..tag is used into .tag because a row contains multi cells and to fill up these cells with data. TD TR TR TD TD TG TG TR Question No: 81 ( Marks: 1 ) - Please choose one

Individuals who write programs or manipulate technologies to gain unauthorized access to computers and networks are --------------- . administrators experts hackers coders Question No: 82 ( Marks: 1 ) - Please choose one What is the correct JavaScript syntax to write "Virtual University of Paistan"? document.write("Virtual University of Paistan ") ("Virtual University of Paistan ") " Virtual University of Paistan " response.write("Virtual University of Paistan ") Question No: ( Marks: 1 ) - Please choose one Question No: 83 ( Marks: 1 ) - Please choose one CSS is a breakthrough in Web design because it allows developers to control the-------- Processing speed on client side Data grid view on client side Style and layout of home page. Style and layout of multiple Web pages uestion No: 84 ( Marks: 1 ) - Please choose one In which direction all messages travel through a ring Topology Same direction (clockwise) Same direction( either "clockwise" or "counterclockwise") Dual direction (both "clockwise" and "counterclockwise") None of these Question No: 85 ( Marks: 1 ) - Please choose one Identify the networking device which regenerates the signals if these become weak. Hub Switch Router Repeater Question No: 86 ( Marks: 1 ) - Please choose one Which of the following is not the Data types in Javascript? Int Float String Null Question No: 87 ( Marks: 1 ) - Please choose one There is a way of describing XML data, how? XML uses a description node to describe data XML uses a DTD to describe the data XML uses XSL to describe data None of these Question No: 88 ( Marks: 1 ) - Please choose one Which of the following needs human action to execute? Virus

Worm Trojan Horse All of these Question No: 89 ( Marks: 1 ) - Please choose one A ___________certifies the binding between public key and its owner CA KDC TLS Firewall Question No: 90 ( Marks: 1 ) - Please choose one An address represented by four decimal numbers separated by a period is the IP RIP MAC None of the given Question No: 91 ( Marks: 1 ) - Please choose one Which SQL statement is used to update data in a database? SAVE SAVE AS MODIFY UPDATE Question No: 92 ( Marks: 1 ) - Please choose one Attributes colspan and rowspan are used in a tag for spanning the cells to a particular no. of columns or rows, respectively. Select the right one tag. tag tag tag None of the given
Question No: 93 ( Marks: 1 ) - Please choose one Which one of the following ,divides large network in small logical segments called subnets on basis of IP addresses Routers Bridge None of these Switches Question No: 94 ( Marks: 1 ) - Please choose one Switch is used on the layer First Layer Second Layer Third Layer None of these Question No: 95 ( Marks: 1 ) - Please choose one Router is used on the layer First Layer Second Layer Third Layer None of these

Question No: 96 ( Marks: 1 ) - Please choose one What is the correct JavaScript syntax to insert a comment that has more than one line? /*This comment has more than one line*/ //This comment has more than one line// <!--This comment has more than one line--> None of these Question No: 97 ( Marks: 1 ) - Please choose one CA KDC TLS Firewall Question No: 98 ( Marks: 1 ) - Please choose one How do you define a numerical value? var mynum = new Math; var mynum = Math(6); var mynum = 6; Math.mynum = 6; Question No: 99 ( Marks: 1 ) - Please choose one Question No: 99 ( Marks: 1 ) - Please choose one Which of the following is NOT true about Applets? Applets are compiled Java programs Applet code is sent from server to the browser for processing <script> tag is used to make a call for the applet code Typically applets take more space on the window screen Question No: 100 ( Marks: 1 ) - Please choose one After compilation, the JSP page is converted into a JavaScript HTML Applet Servlet Question No: 101 ( Marks: 1 ) - Please choose one Following are the names of some well known e-commerce software, EXCEPT ----------- . Intershop IBM's WebSphere Commerce Professional Edition Microsoft Commerce Server 2002 Microsoft SQL Server 2005 Question No: 102 ( Marks: 1 ) - Please choose one At which layer of the OSI model the circuit level firewall operates? Application layer Presentation layer Network layer Transport layer Question No: 103 ( Marks: 1 ) - Please choose one Which attribute can be used to make a region non-clickable? none of the given target alt

nohref Question No: 104 ( Marks: 1 ) - Please choose one Which of following is NOT an attribute of <AREA> tag? shape circle href coords Question No: 105 ( Marks: 1 ) - Please choose one In star topology, If hub fails, the entire network also fails. True False Question No: 106 ( Marks: 1 ) - Please choose one Which HTML tag is used to define an internal (embedded) style sheet? css text/style style script question No: 107 ( Marks: 1 ) - Please choose one Which of the following is correct for displaying a box around a paragraph? P {box:yes} P {box:thin solid} P {box:1} P {border:thin solid} Question No: 108 ( Marks: 1 ) - Please choose one How the tables in HTML are expanded? Row by Row Column by Column One row and one column None of these Question No: 109 ( Marks: 1 ) - Please choose one Which of the following is the default alignment in HTML? Left Center Right None Question No: 110 ( Marks: 1 ) - Please choose one RIP(Routing Information protocol) is used by---------- , to build a ------------ table bridges , hash routers, matrix routers , routing All of these Question No: 111 ( Marks: 1 ) - Please choose one In which protocol, the messages are not deleted from email server. SMTP POP3 IMAP ICMP Question No: 112 ( Marks: 1 ) - Please choose one For which one of the following,<MARQUEE ...> tag can work better

News headlines Announcements Sound pulgin Movie controls uestion No: 113 ( Marks: 1 ) - Please choose one At line code 5 which of the following Css methods has been applied? <html> <head> 1. <style type="text/css"> 2. h3 {font-family: times} 3. p {font-family: courier} 4. p.sansserif {font-family: sans-serif} </style> 5. <Link rel=stylesheet type=text/css herf=mystyle.css> </head> <body> 6. <h3 style=font-size:40pt>This is header 3</h3> </body> </html>

mystyle.css: h3{ color:red} Browser default External style sheet Inline style Internal style sheet Question No: 114 ( Marks: 1 ) - Please choose one Which of the following is NOT valid HTML code line? <frameset rows="16%,84%"> <frameset columns="16%,84%"> <frameset cols="100,150"> <frameset cols=50%,50% rows=16%,84%> Question No: 115 ( Marks: 1 ) - Please choose one Let us assume in Javascript, Variabales num1 and num2 are assigned values 10 and 30 respectively The following text was displayed on browser page: OUTPUT: The result of addition is (40) Which one of following code will display the output? document.write(The result of addition is (+(parseFloat(num1)+parseFloat(num2))+); document.write(The result of addition is (+(parseFloat(num1)+parseFloat(num2))+). document.write(The result of addition is (+(parseFloat(num1)+parseFloat(num2)));. document.alert (The result of addition is ( (parseFloat(num1)+parseFloat(num2)) ); Question No: 116 ( Marks: 1 ) - Please choose one Constructor is defined as the initializing function used to create........ Instance of object

Copy of object Instance / copy of object Shallow copy of object Question No: 117 ( Marks: 1 ) - Please choose one Which language does not compile its code but interpret it? ASP. Net ASP C++ None of these Question No: 118 ( Marks: 1 ) - Please choose one JavaScript is mainly a ___________ language. Server Side Scripting Cross Side Scripting Client Side Scripting both Cross and Server Side Scripting Question No: 119 ( Marks: 1 ) - Please choose one Which loop type always runs the enclosed code at least once http://vustudents.ning.com for while do while all of them Question No: 120 ( Marks: 1 ) - Please choose one Which one from the following uses IP addresses on network layer? Swithes Routers Bridges All of the given Question No: 121 ( Marks: 1 ) - Please choose one Which object has the property of 'cookie'? http://vustudents.ning.com window location document string Question No: 122 ( Marks: 1 ) - Please choose one Pretty Good Privacy (PGP) is the name of a popular _________ system which is available for general public use. http://vustudents.ning.com Filtering Cryptographic Server Security Question No: 123 ( Marks: 1 ) - Please choose one An electronic signature can ensure --------- . authenticity integrity non-repudiation all of them Question No: 124 ( Marks: 1 ) - Please choose one Which one is the correct CSS syntax? h1 {font-size:72pt} h1:font-size=72pt

{h1:font-size=72pt} {h1;font-size:72pt} Question No: 125 ( Marks: 1 ) - Please choose one In Style Sheets, How do you change the font of an element? font-face: font: font-family: font-style: Question No: 126 ( Marks: 1 ) - Please choose one How many characters MAC address consists on? http://vustudents.ning.com 11 12 13 14 Question No: 127 ( Marks: 1 ) - Please choose one Choose which one is the not the columns of Log files. IP addresses Request (url) Date Contents MIDTERM EXAMINATION Spring 2010 IT430- E-Commerce (Session - 2) Question No: 128 ( Marks: 1 ) - Please choose one <background>yellow</background> <body bgcolor="yellow"> (Ans) <body color="yellow"> None Question No: 7 ( Marks: 1 ) - Please choose one Question No: 129 ( Marks: 1 ) - Please choose one Which one of the following certifies the binding between public key and its owner. CA (Ans) KDC TLS Firewall Question No: 130 ( Marks: 1 ) - Please choose one Cyclical Redundancy Check (CRC), takes place in which layer of OSI Model. Session Layer Transport Layer (Ans) Network Layer Data link layer Question No: 131 ( Marks: 1 ) - Please choose one In what form are style rules presented? selector { property: value } selector { property= value } (Ans) selector ( property: value )

selector ( property= value )

Question No: 1 ( Marks: 1 ) - Please choose one

Academic institutions, religious organizations and government using --------------------- e-commerce classification Business-to-Business(B2B) Intra Business Non Business EC (Ans) Business-to-consumer(B2C)

Question No: 2 ( Marks: 1 ) - Please choose one

In which protocol, the messages are not deleted from email server.

SMTP POP3 IMAP (Ans) ICMP

Question No: 3 ( Marks: 1 ) - Please choose one

What is the correct HTML tag for adding a background color? http://vustudents.ning.com <background>yellow</background> <body bgcolor="yellow"> (Ans) <body color="yellow"> None

Question No: 4 ( Marks: 1 ) - Please choose one

Which HTML tag is used to define an internal style sheet?

<css> <script>
<style> (Ans)

<sheet>

Question No: 5 ( Marks: 1 ) - Please choose one

What is the correct HTML for making a hyperlink?

<a href="http://www.w3schools.com">W3Schools</a> (Ans) <a name="http://www.w3schools.com">W3Schools.com</a> <a url="http://www.w3schools.com">W3Schools.com</a> <a>http://www.w3schools.com</a>

Question No: 6 ( Marks: 1 ) - Please choose one If we leave out the target attribute in frame tag and link was clicked ,the document loads into the window In Same page (Ans) In other blank page. To display browser error. All of the options.

Question No: 7 ( Marks: 1 ) - Please choose one

What does mean by != comparison operator?

Equal to Not Equal Not Equal (Ans)

Question No: 8 ( Marks: 1 ) - Please choose one

What does the string.match (abc) object do? http://vustudents.ning.com Concatenates the abc word to other abc words Matches the abc words with other abc words (Ans) It does replacement of abc word with other words All of the above

Question No: 9

( Marks: 1 )

- Please choose one

var txt="Hello World!"

document.write(txt.length), it would return the length as.

10 11 12 (Ans) 13

Question No: 10

( Marks: 1 )

- Please choose one

Which of the following property falls in HTTP? http://vustudents.ning.com Stateless (Ans) Stateful Temporary All of these

Question No: 11

( Marks: 1 )

- Please choose one

Which one of the following certifies the binding between public key and its owner. CA (Ans) KDC TLS Firewall

Question No: 12

( Marks: 1 )

- Please choose one

Cyclical Redundancy Check (CRC), takes place in which layer of OSI Model.

Session Layer Transport Layer (Ans)

Network Layer

Data link layer

Question No: 13

( Marks: 1 )

- Please choose one How

can you convert information consisting of comma separated values into an array? txtArray = txt.indexOf(','); (Ans) txtArray = txt.split(','); txtArray = txt.trim(','); txtArray = txt.substring(',');

Question No: 14

( Marks: 1 )

- Please choose one The

control statement on a while loop is tested before each time through the loop (Ans) after each time through the loop once at the start once at the end

Question No: 15

( Marks: 1 )

- Please choose one

Which SQL statement is used to delete data from a database? http://vustudents.ning.com DELETE (Ans) COLLAPSE REMOVE DISCARD

Question No: 16

( Marks: 1 )

- Please choose one

A program that performs a specific function such as creating invoices/bills or processing payment received from customers is called a/an ---------------.

Middleware Web Service CRM Software Appplication Program (Ans)

Question No: 17

( Marks: 1 )

- Please choose one

Which firewall uses strong user authentication to verify identity of a host attempting to connect to the network? Packet filter firewall Circuit level firewall Application gateway firewall (Ans) Hybrid firewall

Question No: 18

( Marks: 1 )

- Please choose one In

what form are style rules presented? selector { property: value } selector { property= value } (Ans) selector ( property: value ) selector ( property= value )

Question No: 19

( Marks: 1 )

- Please choose one Why

we use reset tag in HTML?

To remove the text written in Notepad.

To remove the text written in between <body> and </body>tag. (Ans) To remove the text written in between <head> and </head> tag. To remove the text written in between <form> and </form> tag.

Question No: 20

( Marks: 1 )

- Please choose one

When data moves upward in the OSI stack it is called Encapsulation De-encapsulation Synchronization (Ans) None of these

Question No: 21

( Marks: 2 )

What does PPTP stand for? http://vustudents.ning.com

Ans:

PPTP stads for point to point transfer protocol.

Question No: 22

( Marks: 2 )

What are the keywords to define a variable and a function in JavaScript?

Question No: 23

( Marks: 3 )

Identify the object, property and method in the following:

Math.sin(45) Math.PI Ans:

Math.PI we are using for mathematical calculation. Question No: 24 ( Marks: 3 )

Performance of web servers can be evaluated mainly on the basis of two factors. What are they?

Ans:

We can evaluate web servers performance by below basic factors.

1. Response time. 2. Request process time. 1. this is one of the basic factor to evaluate the web server process, we can evaluate performance of web server by its response time, once you write web add how long it take to open its home page. 2. Secondly we can evaluate performance of web server by the time which server take to do process, suppose you submit some query or you did some transaction how long it will take to process it. By this way also we can evaluate performance of a web servers.

Question No: 25

( Marks: 5 )

Write the code for a web page displaying a button named "Testing". After clicking that button an alert should be displayed saying "The test is successful".

SANS stands for _______. Select correct option:

System Administration, Authentication, Network and Security Institute Software Authentication, Audit, Network and Security Institute Systems Administrator, Audit, Network and Security Institute None of Above

Proxy Server can _______. Select correct option:

Speed up the processing of http requests by caching web pages Translate HTTP request between trusted and un trusted network Can also act as a firewall filtering requests for certain web pages All of Above

Response time ________. Select correct option:

Time a server take to process one request. Time a server take to process all the request. Time a server take to process some request. Time a server take to process ten request

attacks are basically a result of _____ Select correct option:

Back door Sniffing Eavesdropping None of the Above

IDS Stands for _________. Select correct option: http://vustudents.ning.com Intrusion Defense System Intervention Detection System Intervention Defense System Intrusion Detection System

Question # 8 of 10 ( Start time: 02:45:30 PM ) Total Marks: 1 ASP runs best on ________. Select correct option:

Internet information Software Intranet Information Software Intranet Information Server Internet Information Server

Plug in is ________. Select correct option:

Program that make the computer server. Programs that work with the browser to enhance its capabilities. Program that communicate with the client from the server. None of Above http://vustudents.ning.com

Question # 10 of 10 ( Start time: 02:47:59 PM ) Total Marks: 1 It occurs when a customer clicks at checkout or confirm order button and is subjected to some payment _______. Select correct option:

Transaction Processing E cash System E Funds system None of Above

Question # 1 of 10 ( Start time: 01:51:41 AM ) An agent is a software program that is _____ Select correct option: Triggers by human Not capable of autonomous action.

Total Marks: 1

Capable of autonomous action in its environment in order to meet its objectives

None

Question # 2 of 10 ( Start time: 01:52:21 AM ) ASP runs best on ________. Select correct option: Internet information Software Intranet Information Software Intranet Information Server Internet Information Server

Total Marks: 1

Question # 3 of 10 ( Start time: 01:53:48 AM ) What is/are the methods to track the customer. Select correct option: Database Cookies Hidden Fields All

Total Marks: 1

Question # 4 of 10 ( Start time: 01:54:32 AM )

Total Marks: 1

Large companies establish connections between their e-commerce software and their existing accounting system by using a type of software called

__________. Select correct option: Shareware Freeware Middleware None

http://vustudents.ning.com Question # 5 of 10 ( Start time: 01:55:19 AM ) Password attacks are basically a result of _____ Select correct option: Back door Sniffing Eavesdropping None of the Above Total Marks: 1

Question # 6 of 10 ( Start time: 01:56:03 AM ) Caching ______.

Total Marks: 1

Select correct option: have no effect on downloading of the page saves the time of downloading the page increase the time of downloading the page None of Above

Question # 7 of 10 ( Start time: 01:56:58 AM )

Total Marks: 1

. A program that performs a specific function such as creating invoices/bills or processing payment received from customers is called _______.

Select correct option: Firewall Application program Protocol Web Services

Question # 8 of 10 ( Start time: 01:57:54 AM )

Total Marks: 1

Programs that work with the browser to enhance its capabilities. Select correct option: Driver

Flash PlugIn None of Above

Question # 9 of 10 ( Start time: 01:58:10 AM ) Agents can be used for _____ Select correct option: Comparisons Filtering Web crawling All

Total Marks: 1

Question # 10 of 10 ( Start time: 01:58:53 AM )

Total Marks: 1

secure, dedicated point to point connection over the internet ______. Select correct option: Metropolitan area Network Local area Network Wide Area Network Virtual Private Network http://vustudents.ning.com

Question # 1 of 10 ( Start time: 10:06:21 PM ) Extranet formed when ______. Select correct option:

Total Marks: 1

When two or more internet is connected to each other.

When two or more WAN are connected to each other.

When two or more intranets are connected to each other.

When two or more LAN is connected to each other.

Question # 2 of 10 ( Start time: 10:07:19 PM ) E-commerce Site must provide ________. Select correct option:

Total Marks: 1

Transaction processing

Shopping cart capabilities

A catalog display

All of the above

Question # 3 of 10 ( Start time: 10:08:12 PM )

Total Marks: 1

In this type of attack, the attacker gains access to the network and then send invalid data to network, services or applications. These services or applications consequently become unable to perform their normal tasks or functions. Select correct option:

Trojan Horse

Virus

DoS

Worms

Question # 4 of 10 ( Start time: 10:09:16 PM ) ERP Stands for Select correct option:

Total Marks: 1

Entrepreneur Resource Planning

Enterprise Rescue Planning

Enterprise Resource Program

Enterprise Resource Planning

http://vustudents.ning.com
Question # 5 of 10 ( Start time: 10:10:21 PM ) Total Marks: 1

Large companies establish connections between their e-commerce software and their existing accounting system by using a type of software called __________. Select correct option:

Shareware

Freeware

Middleware

None

http://vustudents.ning.com
Question # 6 of 10 ( Start time: 10:11:04 PM ) Plug in is ________. Select correct option: Total Marks: 1

Program that make the computer server.

Programs that work with the browser to enhance its capabilities.

Program that communicate with the client from the server.

None of Above

Question # 7 of 10 ( Start time: 10:12:12 PM ) Throughput is ___________. Select correct option:

Total Marks: 1

No of instruction a server execute in one second.

No of session a server handle.

No of http request that a web server can handle.

None of Above

http://vustudents.ning.com
Question # 8 of 10 ( Start time: 10:13:44 PM ) HTTP is a _______. Select correct option: Total Marks: 1

State Oriented

Stateless

A&B

None of Above

http://vustudents.ning.com
Question # 9 of 10 ( Start time: 10:14:47 PM ) Caching ______. Select correct option: Total Marks: 1

have no effect on downloading of the page

saves the time of downloading the page

increase the time of downloading the page

None of Above

http://vustudents.ning.com
# 10 of 10 ( Start time: 10:16:03 PM ) Total Marks: 1

secure, dedicated point to point connection over the internet ______. Select correct option:

Metropolitan area Network

Local area Network

Wide Area Network

Virtual Private Network

Question No: 1 ( Marks: 1 ) - Please choose one

Which one of the following ,divides large network in small logical segments called subnets on basis of IP addresses

Routers Bridge None of these Switches

Question No: 2 ( Marks: 1 ) - Please choose one

Switch is used on the layer First Layer Second Layer Third Layer

None of these

Question No: 3 ( Marks: 1 ) - Please choose one

Router is used on the layer

First Layer Second Layer Third Layer None of these

Question No: 4 ( Marks: 1 ) - Please choose one

What shall come in blanks for proper result, Here blanks are numbered with 1,2 and 3

<html> <head> <SCRIPT language="JavaScript">

Var num1,

var num2

Document.container .result.value=parseFloat(num1)-parseFloat(num2)

</script>

</head> <body> <FORM name=---------1-----------> <input type=----------2------- name=-------3--------- maxlength=5> </form> </body> </html>

container, text and result result, value and container container , button and value result, container and text

Question No: 5 ( Marks: 1 ) - Please choose one

What is the correct JavaScript syntax to insert a comment that has more than one line?

/*This comment has more than one line*/ //This comment has more than one line// <!--This comment has more than one line--> None of these

Question No: 6 ( Marks: 1 ) - Please choose one

Which one of the following certifies the binding between public key and its owner. CA

KDC TLS Firewall

Question No: 7 ( Marks: 1 ) - Please choose one How do you define a numerical value? var mynum = new Math; var mynum = Math(6); var mynum = 6; Math.mynum = 6;

Question No: 8 ( Marks: 1 ) - Please choose one How can you convert information consisting of comma separated values into an array? txtArray = txt.indexOf(','); txtArray = txt.split(','); txtArray = txt.trim(','); txtArray = txt.substring(',');

Question No: 9 ( Marks: 1 ) - Please choose one

Which of the following is NOT true about Applets? Applets are compiled Java programs Applet code is sent from server to the browser for processing <script> tag is used to make a call for the applet code Typically applets take more space on the window screen

Question No: 10 ( Marks: 1 ) - Please choose one After compilation, the JSP page is converted into a JavaScript HTML Applet Servlet

Question No: 11 ( Marks: 1 ) - Please choose one

Following are the names of some well known e-commerce software, EXCEPT ----------- . Intershop IBM's WebSphere Commerce Professional Edition Microsoft Commerce Server 2002 Microsoft SQL Server 2005

Question No: 12 ( Marks: 1 ) - Please choose one At which layer of the OSI model the circuit level firewall operates? Application layer Presentation layer Network layer Transport layer

Question No: 13 ( Marks: 1 ) - Please choose one

Which attribute can be used to make a region non-clickable?

none of the given

target

alt

nohref

Question No: 14 ( Marks: 1 ) - Please choose one

Which of following is NOT an attribute of <AREA> tag? shape circle href coords

Question No: 15 ( Marks: 1 ) - Please choose one In star topology, If hub fails, the entire network also fails.

True

False

Question No: 16 ( Marks: 1 ) - Please choose one

Which HTML tag is used to define an internal (embedded) style sheet? css text/style style script

Question No: 17 ( Marks: 1 ) - Please choose one In Style Sheets, How do you change the font of an element? font-face: font: font-family: font-style:

Question No: 18 ( Marks: 1 ) - Please choose one

Which of the following is correct for displaying a box around a paragraph? P {box:yes} P {box:thin solid} P {box:1} P {border:thin solid}

Question No: 19 ( Marks: 1 ) - Please choose one

How the tables in HTML are expanded? Row by Row Column by Column One row and one column None of these

Question No: 20 ( Marks: 1 ) - Please choose one

Which of the following is the default alignment in HTML? Left Center Right None

Question No: 21 ( Marks: 2 ) We want to create left margin of 10 pixels and right margin of 15 pixels. Write css code to apply both properties.

<HTML><STYLE>P{margin-left:10px;margin-right:15px;}</STYLE> <BODY></BODY></HTML>

Question No: 22 ( Marks: 2 )

JDBC and ODBC Stands for?

Java based database connectivity

Open database connectivity

Question No: 23 ( Marks: 3 )

Write a brief note on ERP? Also write any two ERP software names.

Enterprise Resource Planning is a computer based system which manages internal and external resources of business that includes assets, financial issues, project management, human resource and marketing. The purpose of this software is to regulate the flow of information among all business functions. It builds a centralized database and it has the common platform. EFP System creates unique and enterprise system environment.

The names of ERP Software SAP SAGE Microsoft Dynamics

Question No: 24 ( Marks: 3 )

Create an instance of date and write the methods to get date and minutes?

getDate() - Get the day of the month. var curdate = new Date() var mday = curdate.getDate() document.write(mday + "<BR>")

Question No: 25 ( Marks: 5 )

Write any four essential features and two extra features which should exist in E-Commerce soft wares.

A catalog display Shopping cart capability Transaction processing Web services Application integration Middleware

Question No: 26 ( Marks: 5 )

What are the three logical operators in JavaScript? Write their symbols and their functions.

++ FOR LOGICAL INCREMENT && FOR LOGICAL AND ! FOR LOGICAL NOT

Logical increment adds one to the previous number that holds a given variable, logical AND returns true when all the given statements are true and logical NOT retunes true only when the given statement is not true otherwise it returns false

MIDTERM EXAMINATION Spring 2009

IT430- E-Commerce (Session - 1)

Question No: 1___( Marks: 1 ) - Please choose one Which of the following is Default subnet mask of class C?

255.0.0.0 255.255.0.0 255.255.255.0 (page 11) None of above

Question No: 2 ( Marks: 1 ) - Please choose one Which one of the following ,divides large network in small logical segments called subnets on basis of IP addresses

Routers (page 16) Bridge None of these Switches

Question No: 3 __ ( Marks: 1 ) - Please choose one Which one is not included in the networking topologies?

Star Topology Bus Topology Media Topology Ring Topology

Question No: 4 __ ( Marks: 1 ) - Please choose one CSS is a breakthrough in Web design because it allows developers to control the -----------

Processing speed on client side Style and layout of multiple Web pages Data grid view on client side Style and layout of home page.

Ref http://www.w3schools.com/web/web_css.asp

Question No: 5 ( Marks: 1 ) - Please choose one Border-width: specifies the width of all borders in the order

border-right-width, border-bottom-width, border-left-width, border-top-width border-bottom-width, border-left-width, border-top-width, border-right-width border-top-width, border-right-width, border-bottom-width, border-left-width (page 49)

None of these

Question No: 6 __ ( Marks: 1 ) - Please choose one document.write(str.replace(/Microsoft/,"W3Schools"))

This string object is deleting Microsoft word This string object is concatenating the Microsoft with W3schools

This string object is replacing Microsoft with W3schools None of these

Ref http://iswww.w3schools.com/jsref/jsref_replace.asp

Question No: 7 ( Marks: 1 ) Please choose one How do you define a function in Javascript?

function:myFunction() function myFunction() (page 58) declare myFunction() new myFunction

Question No: 8___( Marks: 1 ) - Please choose one The first control statement in a for loop usually

sets the termination condition increments a counter creates a control variable none of the above

Question No: 9 ( Marks: 1 ) - Please choose one The second control statement in a for loop usually

sets the termination condition increments a counter creates a control variable none of the above

Question No: 10 ( Marks: 1 ) - Please choose one Choose the correct HTML tag to make a text italic

<it> <i> (page 19) <italics> <italic>

Question No: 11 __ ( Marks: 1 ) - Please choose one The 'shape' attribute of <AREA> tag accepts the following values, EXCEPT

Rect Circle poly square (page 36)

Question No: 12 ( Marks: 1 ) - Please choose one <AREA> tag is used within the

<MAP> tag (page 35) <FRAME> tag <FRAMESET> tag <IMG> tag

Question No: 13 __ ( Marks: 1 ) - Please choose one Where in an HTML document is the correct place to refer to an external style sheet?

In the <body> section At the top of the document In the <head> section (page 42) Between head and body

Question No: 14 __ ( Marks: 1 ) - Please choose one In CSS, How do you make the text italic? font:i style:italic font-style: italic (page 44) font:italic ref http://tom.me.uk/html-to-css/bold-italic.html

Question No: 15 __ ( Marks: 1 ) - Please choose one What is identified by the tag <FRAMESET COLS="20%,60%,20%">?

Horizontal frame Vertical Frame (page 31) Top Frame Bottom Frame

Question No: 16 __ ( Marks: 1 ) - Please choose one Creating your own tags is not possible in HTML but in XML it is possible to create Your own tags.

True False

Question No: 17 __ ( Marks: 1 ) What is the function of UDP protocol at TCP/IP stack?Give precise answer.

Connectionless transport protocol

Question No: 18 ( Marks: 1 )

What tag is used for displaying a border between the frames? - BORDER or FRAMEBORDER Set this attribute to 0 for not displaying a border between the frames

Question No: 19 ( Marks: 2 ) Suppose, there is an applet at "http://www.vu.edu.pk/demo.class". Write the code to include this applet in your web page.

<HTML> <BODY> <APPLET CODE= "http://www.vu.edu.pk/demo.class". width=100 height=200>DEMO</APPLET>

</BODY> </HTML>

Question No: 20 __ ( Marks: 3 ) Identify the object, property and method in the following: Math.sin(45) Math.PI

document.write("Math.sin(45) :"+Math.sin(45)+"<P>"); document.write("Math.PI :" +Math.PI +"<P>");

Question No: 21 __ ( Marks: 5 ) What is a web form? What is its usage in reference to client-server communication? 2+3 A webform on a web page allows a user to enter data that is sent to a server for processing. Webforms resemble paper forms because internet users fill out the forms using checkboxes, radio buttons, or text fields.

You are now familiar with the fact that internet presents a two-way communication model, also called theClient-Server Model. In the client server model some data is processed on the client side and certain data is processed by the server on the server side.

Question No: 22 ( Marks: 10 ) Explain the following frame tags? Discuss the usage of these

a) <frameset> b) <frame> c) <Noframes> d) <Iframe>

MIDTERM EXAMINATION Spring 2009 IT430- E-Commerce (Session - 3)

Question No: 1 __ ( Marks: 1 ) - Please choose one In which protocol, the messages are not deleted from email server.

SMTP POP3 IMAP (page 18) ICMP

Question No: 2 ( Marks: 1 ) - Please choose one Which HTML tag is used to define the internal style sheet ?

<css> <script > <sheet> <style> ref http://www.ex-designz.net/test_grade.asp?tid=37

Question No: 3 ( Marks: 1 ) - Please choose one For which one of the following,<MARQUEE ...> tag can work better

News headlines Announcements Sound pulgin Movie controls Ref http://www.htmlcodetutorial.com/_MARQUEE.html Question No: 4 __ ( Marks: 1 ) - Please choose one Choose the correct HTML code line which left-align the content inside a tablecell. <td leftalign> <td valign="left"> <td align="left"> (page 26)

<tdleft>

Question No: 5 __ ( Marks: 1 ) - Please choose one How do you write a conditional statement for executing some statements only if "i" is NOT equal to 5?

if =! 5 then if (i != 5) (page 58) if <>5 if (i <> 5)

Question No: 6 ( Marks: 1 ) - Please choose one What is the correct JavaScript syntax to write "Virtual University of Paistan"?

document.write("Virtual University of Paistan ") ("Virtual University of Paistan ") " Virtual University of Paistan " response .write("Vi rtual University of Paistan ")

Question No: 7 __ ( Marks: 1 ) - Please choose one We can divide the Client Server architecture up to:

3 Tier N -Tier 1 Tier

2 Tier ref [PPT] CLIENT SERVER ARCHITECTURE

Question No: 8 ( Marks: 1 ) - Please choose one Choose which one is the not the columns of Log files.

IP addresses Request (url) Date Contents (page 136 and 3)

Question No: 9 __ ( Marks: 1 ) - Please choose one An address represented by four decimal numbers separated by a period is the

IP (PAGE 7) RIP MAC NON OF THE GIVEN

Question No: 10 ( Marks: 1 ) - Please choose one Which operator is used to concatenate two strings?

+ (PAGE 61) *

&& &

Question No: 11 __ ( Marks: 1 ) - Please choose one Which SQL statement is used to extract data from a database? GET (page 83) OPEN SELECT EXTRACT

Question No: 12 __ ( Marks: 1 ) - Please choose one Which firewall uses strong user authentication to verify identity of a host attempting to connect to the network?

Packet filter firewall Circuit level firewall Application (PAGE 96) gateway firewall Hybrid firewall

Question No: 13 __ ( Marks: 1 ) - Please choose one In CSS, How do you make each word in a text start with a capital letter?

text-transform :capitalize text-transform: uppercase text:capitalize

You can't do that with CSS

REF http://www.ex-designz.net/test_page.asp?tid=37 Question No: 14 __ ( Marks: 1 ) - Please choose one Why we use reset tag in HTML?

To remove the text written in Notepad. To remove the text written in between <body> and </body>tag. To remove the text written in between <head> and </head> tag. To remove the text written in between <form> and </form> tag.

Question No: 15 ( Marks: 1 ) - Please choose one http://cs.vu.edu is an example of

Two zone domain name Three zone domain name (page 12) Four zone domain name Five zone domain name

Question No: 16 __( Marks: 1 ) - Please choose one In data link layer, data packets are placed inside

Data frames (page 6) Data boxes

Data streams None of these

Question No: 17 __ ( Marks: 1 ) What are the two types of twisted pair cables for networking ?

Question No: 18 ( Marks: 1 ) What it stands for IIS?

Question No: 19 __ ( Marks: 2 ) When does we use the parseFloat() function?

Question No: 20 ( Marks: 3 ) Name the JavaScript function that convert strings to float numbers. How do you give the function a string value to convert to a number?

Question No: 21 __ ( Marks: 5 ) Write your personal profile in a file saving it with the extension of e.g. abc.jsand then call it in

a JavaScript code.

Question No: 22 ( Marks: 10 ) Explain any three of the outside attacks briefly.

MIDTERM EXAMINATION

Spring 2009 IT430- E-Commerce (Session - 3)

Question No: 1 __ ( Marks: 1 ) - Please choose one Which one of the following ,divides large network in small logical segments called subnets on basis of IP addresses

Routers (page 16) Bridge None of these Switches

Question No: 2 ( Marks: 1 ) - Please choose one Which one is not included in the networking topologies? Star Topology Bus Topology Media Topology Ring Topology

Question No: 3 __ ( Marks: 1 ) - Please choose one At line code 5 which of the following Css methods has been applied? <html> <head> 1. <style type="text/css">

2. h3 {font-family: times}

3. p {font-family: courier}

4. p.sansserif {font-family: sans-serif} </style>

5. <Link rel=stylesheet type=text/css herf=mystyle.css> </head>

<body>

6. <h3 style=font-size:40pt>This is header 3</h3> </body>

</html>

mystyle.css: h3{ color: red}

Browser default External style sheet Inline style Internal style sheet

Question No: 4 ( Marks: 1 ) - Please choose one Which attribute is used in a tag to control the layout of element?

view css Style Layout Ref http://www.yourhtmlsource.com/stylesheets/csslayout.html

Question No: 5___( Marks: 1 ) - Please choose one What is the correct HTML for making a hyperlink? http://www.vustudents.net

<a url="http://www.w3schools.com">W3Schools.com</a> <a>http://www.w3schools.com</a> <a h ref="http ://www.w3schools.com">W3Schools</a> (page 23) <a name="http://www.w3schools.com">W3Schools.com</a>

Question No: 6 ( Marks: 1 ) - Please choose one How do you write a conditional statement for executing some statements only if "i" is NOT equal to 5? if =! 5 then if (i != 5) (repeated) if <>5 if (i <> 5)

Question No: 7 __ ( Marks: 1 ) - Please choose one How many different kind of loops are there in JavaScript?

One. The "for" loop only Two. The "for" loop and the "while" loop Four. The "for" loop, the "while" loop, the "do...while" loop, and the "loop.. .until" loop None of the above REF http://www.ex-designz.net/test_grade.asp?tid=65 Question No: 8___( Marks: 1 ) - Please choose one What does DTD stand for? Do The Dance. Dynamic Type Definition. Data Type Definition. (page 76) Direct Type Dfinition.

Question No: 9 ( Marks: 1 ) - Please choose one Which of the following needs human action to execute? Virus (page 94) Worm Trojan Horse All of these

Question No: 10 __ ( Marks: 1 ) - Please choose one For showing image on web page, save your image at any drive or folder like C:\abc.jpeg is an example of

Relative Address Absolute address None of the given Ref Absolute paths are called that because they refer to the very specific location, including the domain name. The absolute path to a Web element is also often referred to as the UR

Question No: 11 __ ( Marks: 1 ) - Please choose one ASP server scripts are surrounded by delimiters, which?

<script>.. .</script> <%...%> <%>...</%> <&>...</&>

MIDTERM EXAMINATION Spring 2009 IT430- E-Commerce (Session - 2)

Question No: 1 __ ( Marks: 1 ) - Please choose one For which of the following we need to know the classification of E-commerce?

Market planning strategy Build Mission statement Management strategy none

Question No: 2 ( Marks: 1 ) - Please choose one Who is making the Web standards?

Netscape Internet service providers The World Wide Web Consortium Microsoft

Question No: 3 __ ( Marks: 1 ) - Please choose one When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called

Local Variables Global Variables Local and Global None of the above

Ref http://www.authorpick.net/what-is-variables-in-programming-language/

Question No: 4___( Marks: 1 ) - Please choose one There is a way of describing XML data, how?

XML uses a description node to describe data XML uses a DTD to describe the data (page 75) XML uses XSL to describe data None of these

Ref http://www.dotnetspider.com/questions/ViewQuestion.aspx?QuestionId=6754&

Question No: 5 ( Marks: 1 ) - Please choose One which of the following property falls in HTTP?

Stateless (repeated) State full Temporary All of these

Question No: 6 ( Marks: 1 ) - Please choose one Choose the correct HTML tag to make a text bold <tbold> <b> <bld> <bold>

Question No: 7 ( Marks: 1 ) - Please choose one What is the default scripting language in ASP?

EcmaScri pt JavaScri pt Java VBScript (page 85)

Question No: 8 __ ( Marks: 1 ) - Please choose one Which one of them is not a feature of e-commerce software?

catalog display web hosting (page 92) web services transaction processing

Question No: 9 ( Marks: 1 ) - Please choose one When two or more intranets are connected to each other they form a/an ---------VPN Intranet Internet Extranet (page 2)

Question No: 10 ( Marks: 1 ) - Please choose one

Pretty Good Privacy (PGP) is the name of a popular _________system which is available for general public use. http://www.vustudents.net

Filtering Cryptographic (page 100) Server Security

Question No: 11 __ ( Marks: 1 ) - Please choose one Which one is NOT a valid frame attribute?

NORESIZE ROWS (page 33) FRAMEBORDER BORDER

Question No: 12 ( Marks: 1 ) - Please choose one IP version 6 provides ---------------bits and also contains ----------------------

128, hexadecimal (page 11) 64, hexadecimal 32, binary None of the Above

Question No: 13 ___( Marks: 1 ) - Please choose one A JavaScript event is generated when a user -------- .

clicks a hyperlink clicks a button enters data in a form all of the above (page 54)

Question No: 14 __ ( Marks: 1 ) - Please choose one Creating your own tags is not possible in HTML but in XML it is possible to create your own tags.

True False

Question No: 15 __ ( Marks: 1 ) - Please choose one IP, RIP, and ARP protocols work on

Application layer Session layer Network layer (page 6) Data link layer

Question No: 16 __ ( Marks: 1 ) - Please choose one In the communication between two computers on a network, CRC is calculated at Senders side Receivers side Both sender and receiver sides

Neither on sender nor on receiver side

Ref [PPT] Business Data Communications and Networking

Question No: 17 ( Marks: 1 ) What is the function of ARP protocol at TCP/IP stack?Give precise answer.

Question No: 18 __ ( Marks: 1 ) Do you agree or not that in In Java Script we are not provided with certain already defined objects which are ready to use? justify

Question No: 19 ( Marks: 2 ) What are the three position style properties?

Question No: 20 ( Marks: 3 ) Write at least three rules for writing an XML code.

Question No: 21 ( Marks: 5 ) What is the difference between an interpreted and a compiled language? Give one example of each.

Question No: 22 __ ( Marks: 10 ) Consider the following code of an XML document and identify where its standard code rules

are being applied. You are required to write the identified tag along with its related rule side

by side. http://www.vustudents.net <?xml version=1.0?> <PlanetsList> <Planet Name=Mercury> <Distance>36 million miles</Distance> <Moons>None</Moons>

<DayLength> 176 days</DayLength> </Planet> <Planet Name=Venus> <Distance>67 million miles</Distance> <Moons>None</Moons>

<DayLength>1 17 days</DayLength> </Planet> <Planet Name=Earth> <Distance>93 million miles</Distance> <Moons>One</Moons> <DayLength>24 Hours</DayLength> </Planet> </PlanetsList> <BR/>

MIDTERM EXAMINATION Spring 2010 IT430- E-Commerce (Session - 6) Solved Question No: 1 ( Marks: 1 ) - Please choose one MAC stand for Media Access Control ( page 13) Media Access Consortium Member of Asian Community None of these Question No: 2 ( Marks: 1 ) - Please choose one

Choose the correct HTML tag for the largest heading <head> <h1> (page 20) <Heading>

<h6> Question No: 3 ( Marks: 1 ) - Please choose one Which of the following tags are used for embedding sound files into HTML code? <A href=song.wav> <EMBED SRC="Skylar.MP3"> <A href=song.wav> and <EMBED SRC="Skylar.MP3"> (page 37) None of these Do correction in all midterm file J Question No:44 answer is 3rd Question No: 4 ( Marks: 1 ) - Please choose one Which of the following is NOT an advantage of CSS ? Works on version 4 browsers or newer Define the look of your pages in one place Easily change the look Implement same formatting each time tag is used.

Advantages

1) 2) 3) 4) 5)

Improved Search Engine Results Sites Load Faster Design Separated from Content: Displayed on Various Media Compatibility with Browsers Browser inserts a line break before the <DIV> tag and after the </DIV> end tag.

They are used when you want to apply a specific style to a number of different tags and sections throughout the document http://www.vustudents.net

Question No: 5 ( Marks: 1 ) - Please choose one Which of the following is correct line to add separated css file with name xxxx.css? <link scr=stylesheet href="/xxxx.css" type="text/css"> <link rel=stylesheet href="/xxxx.css" type="text/css"> (page 77) <style rel=stylesheet href="/xxxx.css" type="text/css"> <link rel=stylesheet scr="xxxx.css" type="text/css">

Question No: 6 ( Marks: 1 ) - Please choose one Which of the following is correct syntax to define color in CSS? body {color: black} (page 77) body:color=black {body:color=black(body} {body;color:black}

Question No: 7 ( Marks: 1 ) - Please choose one Inside which of the following HTML element do we put the JavaScript? <script> (page 58) <js> <javascript> <scripting>

Question No: 8 ( Marks: 1 ) - Please choose one JavaScript is mainly a ___________ language.

Server Side Scripting Cross Side Scripting Client Side Scripting (page79) both Cross and Server Side Scripting

Question No: 9 ( Marks: 1 ) - Please choose one Which one is the responsible to manage Internal processes? E-business E-commerce E-marketing All of the given

Question No: 10 ( Marks: 1 ) - Please choose one The first control statement in a for loop usually sets the termination condition increments a counter creates a control variable none of the above Question No: 11 ( Marks: 1 ) - Please choose one You define a method using obj.method obj.method[] obj.method() (PAGE 58) obj-method

Question No: 12 ( Marks: 1 ) - Please choose one What is the default scripting language in ASP? EcmaScript JavaScript Java VBScript (PAGE 85)

Question No: 13 ( Marks: 1 ) - Please choose one Following are malicious programs EXCEPT ----------------- . Back doors Trojan Horses Firewalls (PAGE 94) Worms

Question No: 14 ( Marks: 1 ) - Please choose one Outside attacks on a network include the following, EXCEPT --------------- . Password attack http://www.vustudents.net DoS Back doors ( PAGE 95) IP spoofing

Question No: 15 ( Marks: 1 ) - Please choose one At which layer of the OSI model the circuit level firewall operates? Application layer Presentation layer

Network layer Transport layer (PAGE 96)

Question No: 16 ( Marks: 1 ) - Please choose one The process of scrambling a message with the help of a key is called -------------- . Cryptography Filtering Transposition Encryption (PAGE 100)

The process of scrambling a message with the help of a key is called Encryption.

Question No: 17 ( Marks: 1 ) - Please choose one In a ring network, every device has exactly ______ neighbors for communication purpose. more than two Two (PAGE 14) Four None of these

Question No: 18 ( Marks: 1 ) - Please choose one What is identified by the tag <FRAMESET COLS="20%,60%,20%">? Horizontal frame Vertical Frame (PAGE 31) Top Frame Bottom Frame

Question No: 19 ( Marks: 1 ) - Please choose one

Why we use reset tag in HTML? To remove the text written in Notepad. To remove the text written in between <body> and </body>tag. To remove the text written in between <head> and </head> tag. To remove the text written in between <form> and </form> tag. (PAGE 27)

Question No: 20 ( Marks: 1 ) - Please choose one Network Interface Card is operated at Application layer Session layer Network layer Datalink layer (PAGE 6)

Question No: 21 ( Marks: 2 ) http://www.vustudents.net What value will be printed after executing the following statement in JavaScript: document.write( Math.pow(3, 2) ); document.write("Math.pow(2,3) :"+Math.pow(2,3)+"<P>"); Question No: 22 ( Marks: 2 ) What is a web server?

ANSWER:

Web server web server is a machine that serves up the web page requests of a client on the internet. It is a combination of hardware and software. Decision as regards the type of a web server is largely dependent on the volume and type of web activities. So, transaction processing sites generating

dynamic pages with high traffic volumes would need web server software that is more efficient and can easily be upgraded.

Question No: 23 ( Marks: 3 ) To calculate the area of a circle the formula pi r squared is used. How would you code it in JavaScript?

<html> <script type="text/javascript"> var radius,area; radius = 10; area = Math.PI*Math.pow(radius,2); document.write("Area of circle with radius 10 is " + area ); </script> </html>

Question No: 24 ( Marks: 3 ) Name four commonly used web server operating systems. (PAGE 91) Commonly used web server operating systems are Microsoft Windows NT Server, Microsoft Windows 2000 Advanced Server, Microsoft.NET Server, Linux or Unix based operating systems such as Solaris.

Question No: 25 http://www.vustudents.net ( Marks: 5 ) Write the types of firewalls. Only names? Explain these briefly Packet filter firewall It uses a set of rules to determine whether outgoing or incoming data packets are allowed to pass through the firewall.

Circuit level firewall It is quite similar to the packet filter firewall. It also works on the basis of a set of rules for filtering packets but operates at the transport layer of the OSI Model so has greater functionality.

Application gateway firewall It operates at application layer of the OSI Model. It uses strong user authentication to verify identity of a host attempting to connect to the network using application layer protocols such us FTP. In contrast to packet filter firewall, it filters the requests rather than packets entering/leaving the network. It can block any outgoing HTTP or FTP requests. Question No: 26 ( Marks: 5 ) Write the JavaScript code which will display the following in a web page using a FOR loop:

The number is 0 The number is 1 The number is 2 The number is 3 The number is 4 The number is 5 <html> <script type="text/javascript"> var no; for (no=0; no<6 ; no++) { document.write("The number is " + no + "<br>" ); } </script> </html>

MIDTERM EXAMINATION Spring 2010 IT430- E-Commerce (Session - 6) Solved

Question No: 1 (Marks: 1) - Please choose one For which of the following we need to know the classification of E-commerce? Market planning strategy Build Mission statement Management strategy none (not sure ) Question No: 2 ( Marks: 1 ) - Please choose one Switch is a device that joins multiple computers together within one local area network (LAN). True (page 4) False Question No: 3 ( Marks: 1 ) - Please choose one In which protocol, the messages are not deleted from email server. SMTP POP3 IMAP (page 18) ICMP Question No: 4 ( Marks: 1 ) - Please choose one How can you open a link in a new browser window? <a href="/url" target="new"> <a href="/url" target="_blank"> (page 33) <a href="/url" new> None of these Question No: 5 ( Marks: 1 ) - Please choose one What does the Target= _top tag perform? Loads the new page into the same frame Loads the new page into the entire window (page 33) Loads the new page into a new browser window All of the above Question No: 6 ( Marks: 1 ) - Please choose one Which attribute is used in a tag to control the layout of element? view css (PAGE 39) Style Layout Question No: 7 ( Marks: 1 ) - Please choose one Choose the correct HTML code line which left-align the content inside a tablecell. <td leftalign> <td valign="left"> <td align="left">(PAGE 26) <tdleft> Question No: 8 ( Marks: 1 ) - Please choose one

Where in an HTML document is the correct place to refer to an external style sheet? In the <body> section At the end of the document In the <head> section (PAGE 39) At the top of the document Question No: 9 http://www.vustudents.net ( Marks: 1 ) - Please choose one When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called Local Variables Global Variables Local and Global None of the above ref http://en.wikipedia.org/wiki/Local_variable Question No: 10 ( Marks: 1 ) - Please choose one Constructor is defined as the initializing function used to create........ Instance of object Copy of object Instance / copy of object (page 69) Shallow copy of object Question No: 11 ( Marks: 1 ) - Please choose one What does XML stand for? eXtra Modern Link X-Markup Language eXtensible Markup Language (page 74) Example Markup Language Question No: 12 ( Marks: 1 ) - Please choose one For which of following purpose the Firewall is used ? Efficient working Protection against security attacks (page 95) Networking purpose None of these Question No: 13 ( Marks: 1 ) - Please choose one PPP stands for Point to Point Protocol (page 98) Post to Post Protocol Point to Post Protocol None of these Question No: 14 ( Marks: 1 ) - Please choose one Which of the following is NOT processed on the client side? Cookies JavaScript CGI scripts (page 79) Applets Question No: 15 ( Marks: 1 ) - Please choose one Firewall is used to I - examine the data entering the network II - examine the data leaving the network III - filter the data according to certain rules I, II and III (page 96)

I only I and III only I and II only Question No: 16 ( Marks: 1 ) http://www.vustudents.net- Please choose one Which firewall uses strong user authentication to verify identity of a host attempting to connect to the network? Packet filter firewall Circuit level firewall Application gateway firewall (page 96) Hybrid firewall Question No: 17 ( Marks: 1 ) - Please choose one Bus networks is same as the system bus of a computer. True False (page 14) Question No: 18 ( Marks: 1 ) - Please choose one In Style Sheets, How do you add a background color for all "<h1>" elements? all.h1 {background-color:#FFFFFF} h1.all {background-color:#FFFFFF} h1 {background-color:#FFFFFF}(page 47) h1 {bgcolor:#FFFFFF} Question No: 19 ( Marks: 1 ) - Please choose one How do you make each word in a text start with a capital letter? text-transform:capitalize text-transform:first_capitalize. (page 46) Cannt be possible with CSS text-transform:uppercase Question No: 20 ( Marks: 1 ) - Please choose one MAC address is written in Binary form 0-1 Decimal form 0-9 Hexadecimal form 0-f (page 13) None of these Question No: 21 ( Marks: 2 ) What is a web server? Answer : Web server machine that services internet request. Web server machine that services internet request web server is a machine that serves up the web page requests of a client on the internet. It is a combination of hardware and software. Decision as regards the type of a web server is largely dependent on the volume and type of web activities. So, transaction processing sites generating dynamic pages with high traffic volumes would need web server software that is more efficient and can easily be upgraded. Question No: 22 ( Marks: 2 ) What does parseFloat(string) And NaN mean? The parseFloat() function parses a string and returns a floating point number. This function determines if the first character in the specified string is a number. If it is, it parses the string until it reaches the end of the number, and returns the number as a number, not as a string. The NaN property represents "Not-a-Number" value. This property indicates that a value is not a legal number.

Question No: 23 ( Marks: 3 ) Write at least three rules for writing an XML code. Rules for writing an XML code -All elements must be properly nested <outer><inner>content</inner></outer> -All attribute values must be quoted <FRIES SIZE=LARGE> -All elements with empty content must be identified by ending in /> Question No: 24 ( Marks: 3 ) How Man in The middle Attacks operates? Man in the middle attacks In it the attacker is able to monitor, capture and control data between sending and receiving machines. He may apply IP address spoofing technique to divert the packets to its machine, then modify the packets and resend the misleading information to the actual client. Another form of manin-the-middle attack is where the hacker is able to substitute the IP address of a genuine web site with the IP address of his own web site due to some security hole in the software that runs on a domain name server. A client would think that he is communicating or receiving the information form a genuine web site, though it would not be the case actually.

Question No: 25 ( Marks: 5 ) Write the code for a web page displaying a button named "Testing". After clicking that button an alert should be displayed saying "The test is successful". <html> <head> <script type="text/javascript"> function sndAlert() { window.alert("The test is successful!!!"); } </script> </head> <body> <FORM NAME="form1"> <INPUT TYPE="Button" name="showAlert" VALUE="Show Alert" onclick="sndAlert()"> </FORM> </body> </html> Question No: 26 ( Marks: 5 ) Differentiate between front end and back end. Answer: Front end consists of that information which is visible to the user and he can interact with the same through some interface. The back end comprises that information which resides on the server side and is used to create certain dynamic results for the user. It would include different programs or scripts that may be developed in different languages/tools. Backend is mainly used for two purposes for querying with the databases and for the maintenance of state. We can use

different tools (ASP, JSP etc.) for that purpose depending upon their respective advantages/disadvantages.

MIDTERM EXAMINATION Spring 2010 IT430- E-Commerce (Session - 5) Question No: 1 ( Marks: 1 ) - Please choose one Network addresses 128--- 191 range belongs to which of the following class networks?

A B (page 10) C E

Question No: 2 ( Marks: 1 ) - Please choose one Which of the following is true for Class A: Network 01 byte and 03 hosts (page 10) Network 02 bytes and 02 hosts Network 03 bytes and 01 host None of these

Question No: 3 ( Marks: 1 ) - Please choose one Which one is not included in the networking topologies?

Star Topology Bus Topology Media Topology (page 14) Ring Topology

Question No: 4 ( Marks: 1 ) - Please choose one What is the correct HTML for making a hyperlink? <a name="http://www.vu.edu.pk>Virtual university</a> <a href=" http://www.vu.edu.pk "> Virtual university </a> (page 23) <a>http://www. vu.edu.pk </a> <a url="http://www. vu.edu.pk "> Virtual university of pakistan</a>

Question No: 5 ( Marks: 1 ) - Please choose one What is the correct HTML for making a text input field?

<textinput type="text"> <input type="text"> (page 27) <input type="textfield"> <textfield>

Question No: 6 ( Marks: 1 ) - Please choose one If we leave out the target attribute in frame tag and link was clicked ,the document loads into the window In Same page (page 37) In other blank page. To display browser error.

All of the options.

Question No: 7 ( Marks: 1 ) http://www.vustudents.net - Please choose one Where in an HTML document is the correct place to refer to an external style sheet? In the <body> section At the end of the document In the <head> section (repeated ) At the top of the document

Question No: 8 ( Marks: 1 ) - Please choose one How do you write a conditional statement for executing some statements only if "i" is equal to 5?

if i=5 if i=5 then if i==5 then if (i==5) ref http://www.ex-designz.net/test_page.asp?tid=65

Question No: 9 ( Marks: 1 ) - Please choose one Which of the following is used to get remote access of any computer on a network?

Trojan Horse Backdoor

Virus All of these (page 94)

Question No: 10 ( Marks: 1 ) - Please choose one PPP stands for Point to Point Protocol (repeated ) Post to Post Protocol Point to Post Protocol None of these

Question No: 11 ( Marks: 1 ) - Please choose one JavaScript is mainly a ___________ language. Server Side Scripting Cross Side Scripting Client Side Scripting (page 79) both Cross and Server Side Scripting

Question No: 12 ( Marks: 1 ) - Please choose one Inside which HTML element do we put the JavaScript? <scripting> <javascript> <script> (page 57) <js>

Question No: 13 ( Marks: 1 ) http://www.vustudents.net - Please choose one

a++; is the same as which of the following? a=a*1; a=a+2; a=1+2; a=a+1; ref http://www.academictutorials.com/answers.asp?id=6

Question No: 14 ( Marks: 1 ) - Please choose one If a web server is bombarded with thousands of HTTP requests, that would be an example of --------------. sniffing password attack man in the middle attack denial of service attack (page 95)

Question No: 15 ( Marks: 1 ) - Please choose one Outside attacks on a network include the following, EXCEPT --------------- . Password attack DoS Back doors (page 95) IP spoofing

Question No: 16 ( Marks: 1 ) - Please choose one Digital signature uses --------- . Symmetric cryptography

Private key cryptography Public key cryptography Hash function ref http://www.digistamp.com/signature.htm http://ecommerce.hostip.info/pages/271/Cryptography-Public-Private-Key.html

Question No: 17 ( Marks: 1 ) - Please choose one In star topology, If hub fails, the entire network also fails.

True

False ref http://www.exforsys.com/tutorials/networking/star-topology.html

Question No: 18 ( Marks: 1 ) - Please choose one Which one is the correct CSS syntax? h1 {font-size:72pt} h1:font-size=72pt {h1:font-size=72pt} {h1;font-size:72pt} ref http://uk.answers.yahoo.com/question/index?qid=20100308120234AAPKmAf Question No: 19 ( Marks: 1 ) - Please choose one

In CSS, How do you make each word in a text start with a capital letter? text-transform:capitalize text-transform:uppercase (correct ) text:capitalize You can't do that with CSS REFERENCE http://www.ex-designz.net/test_grade.asp?tid=37 Question No: 20 ( Marks: 1 ) - Please choose one Which of the following is the default alignment in HTML? Left Center Right None REFERENCE align = left|center|right|justify|char [CI] This attribute specifies the alignment of data and the justification of text in a cell. Possible values: (question 24 in this link )

left: Left-flush data/Left-justify text. This is the default value for table data. center: Center data/Center-justify text. This is the default value for table headers. right: Right-flush data/Right-justify text. justify: Double-justify text. char: Align text around a specific character. If a user agent doesn't support character alignment, behavior in the presence of this value is unspecified.

Question No: 21 http://www.vustudents.net ( Marks: 2 ) What is Term Catalog Display means? (page 92) A Static catalog is a simple list written in HTML. One has to edit the HTML code to change it. A dynamic catalog stores information about items in a database usually on a different computer

accessible by the web server. It can provide photos, detailed description and search facility about the availability of items.

Question No: 22 ( Marks: 2 ) What is meant by a constructor? (page 69) It is initializing function used to create instance of an object. It is after the name of the object whose constructor it is.

Question No: 23 ( Marks: 3 ) What is meant by Shopping Cart in context of e commerce? (page 92) shopping cart was used wherein the user had to remember and type certain information. It is now replaced by electronic shopping cart/basket that keeps record of the items the customer has selected and allows customers to view the details of the items selected. The customer can add new items or remove items. To order an item, a customer simply clicks at that item option. All details of an item, including its price, product no. and order identifying information are stored automatically in the cart.

Question No: 24 ( Marks: 3 ) We have an array named my Array where this sentence is stored. Welcome to Virtual University!

If we apply str.split() method. What will be the output of str.split()myArray(4) and str.split()myArray(2) respectively.

Str.Split split the string based on the blank spaces.

str.split()myArray(4) = blank str.split()myArray(2) = virtual

Question No: 25 ( Marks: 5 ) Describe the importance of Cryptography in internet data transfer security in E-Commerce?

It is a collection of mathematical techniques used to ensure confidentiality of information. The process of scrambling a message with the help of a key is called Encryption.

Now a days as internet is widely used. So danger of data safety and serurity also rose. Compare to its earlier use. It provide the Transaction Integrity. Tranasction detail of both the parties can be verified which help to built the confidence between business community. It provide Privacy like it provide controls to prevent third parties from geting access to the information within the transaction Without cryptography, it is doubtful that banks, businesses and individuals would feel safe doing business online. Cryptography provides the confidence to the customer that their data is safe and secure. Otherwise due to lack of confidence and doubt e-commerce business can not flourish.

Question No: 26 ( Marks: 5 ) Write a list of comparison operators in JavaScript with symbols. Comparison operators == for Equal != for not equal < for Less than <= for less than equal

> for Greater than >= for Greater than equal

MIDTERM EXAMINATION Spring 2009 IT430- E-Commerce (Session - 4)

Question No: 1 ( Marks: 1 ) - Please choose one In datalink layer, data packets are placed inside Data frames (page 6) Data boxes Data streams None of these

Question No: 2 ( Marks: 1 ) - Please choose one

Which of these is the correct HTML code for creating a reset button?

<input type =button name=reset value=reset> <input type=resetButton value=Clear> <input type=reset value=reset> (page 26) <input type=button name=reset value=clear>

Question No: 3 ( Marks: 1 ) - Please choose one

..tag is used into .tag because a row contains multi cells and to fill up these cells with data.

TD TR

TR TD (page 25)

TD TG

TG TR

Question No: 4 ( Marks: 1 ) - Please choose one

Individuals who write programs or manipulate technologies to gain unauthorized access to computers and networks are --------------- . administrators experts hackers (page 54) coders

Question No: 5 ( Marks: 1 ) - Please choose one

Which tag is used for the hidden fields? <FIELD>

<TEXT> <INPUT> page 88 <HIDDEN> <INPUT TYPE= "HIDDEN" NAME= "Shirt1" VALUE="25">

Question No: 6 ( Marks: 1 ) - Please choose one

What is a correct way of referring to a stylesheet called "mystyle.xsl" ?

<?xml-stylesheet type="text/xsl" href="mystyle.xsl" ?>

<link type="text/xsl" href="mystyle.xsl" />

<stylesheet type="text/xsl" href="mystyle.xsl" />

<?stylesheet type="text/xsl" href="mystyle.xsl" ?> page 39

<Link Rel="stylesheet" Type="text/css" href="mystyles.css">

Question No: 7 ( Marks: 1 ) - Please choose one

Which of them is NOT a predefined object? Document Date (repeated) Loop Array

Question No: 8 ( Marks: 1 ) - Please choose one

Which of these is not a comparison operator? < > = (repeated) !=

Question No: 9 ( Marks: 1 ) - Please choose one Var d = new date() Which of the following is correct about the d variable? instance of new instance of Date() method instance of Date object (repeated) Simple Variable

Question No: 10 ( Marks: 1 ) - Please choose one

When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called

Local Variables (repeated)

Global Variables

Local and Global None of the above

Question No: 11 ( Marks: 1 ) - Please choose one

Which of the following , is condition part of given For loop for (i = 0; i <= 5; i++). i=0. i++. i<=5. (i = 0; i <= 5; i++).

Question No: 12 ( Marks: 1 ) - Please choose one

What is the correct JavaScript syntax to write "Virtual University of Paistan"?

document.write("Virtual University of Paistan ") ("Virtual University of Paistan ") " Virtual University of Paistan " response.write("Virtual University of Paistan ")

Question No: 13 ( Marks: 1 ) - Please choose one

Which of the following is NOT valid HTML code line? <frameset rows="16%,84%"> <frameset columns="16%,84%"> <frameset cols="100,150">

<frameset cols=50%,50% rows=16%,84%> Ref http://www.academictutorials.com/answers.asp?id=1

Question No: 14 ( Marks: 1 ) - Please choose one CSS is a breakthrough in Web design because it allows developers to control the---------

Processing speed on client side

Data grid view on client side Style and layout of home page. Style and layout of multiple Web pages (repeated)

Question No: 15 ( Marks: 1 ) - Please choose one

Which HTML tag is used to define an internal style sheet?

<css> <script> <style> (repeated) <sheet>

Question No: 16 ( Marks: 1 ) - Please choose one

What is the correct HTML tag for adding a background color? <background>yellow</background> <body bgcolor="yellow"> (repeated)

<body color="yellow"> None

Question No: 17 ( Marks: 1 )

What does this mean? padding-right

Question No: 18 ( Marks: 1 ) Do you agree or not that using Cascading Style Sheets one can apply an image to sections of ones page or even to individual words.

Question No: 19 ( Marks: 2 )

Suppose, there is an applet at "http://www.vu.edu.pk/demo.class". Write the code to include this applet in your web page. <APPLET CODE= http://www.vu.edu.pk/demo.class width=100 height=200> DEMO </APPLET>

Question No: 20 ( Marks: 3 )

What do you think, is there any difference between Static and Dynamic IP Address assignment? Discuss.

Question No: 21 ( Marks: 5 )

What is cryptography? What techniques are used for cryptography?

Question No: 22 ( Marks: 10 )

Analyze the following given code showing some Cascading Style Sheets tags and explain its lines one by one.

<html> <head> <style type="text/css"> h1 {text-decoration: overline} h2 {text-decoration: line-through} h3 {text-decoration: underline} a {text-decoration: none} </style> </head>

<body> <h1>This is header 1</h1> <h2>This is header 2</h2> <h3>This is header 3</h3> <p><a href="http://www.w3schools.com/default.asp">This is a link</a></p> </body>

</html>

MIDTERM EXAMINATION Spring 2010 IT430- E-Commerce (Session - 6)

Question No: 1 ( Marks: 1 ) - Please choose one In star network features a central connection point called a "hub" that ought to be only a hub.

_ True _ False

Question No: 2 ( Marks: 1 ) - Please choose one Switch is a device that joins multiple computers together within one local area network (LAN).

_ True (page 15) _ False

Question No: 3 ( Marks: 1 ) - Please choose one Switch generally contains more "intelligence" than a hub. _ True _ False

Question No: 4 ( Marks: 1 ) - Please choose one In which protocol, the messages are not deleted from email server. _ SMTP _ POP3 _ IMAP (page 18)

_ ICMP

Question No: 5 ( Marks: 1 ) - Please choose one Which protocol does Virtual university use to send email to student Accounts? _ SMTP _ POP _ IMAP _ TCP

Question No: 6 ( Marks: 1 ) - Please choose one For which one of the following,<MARQUEE ...> tag can work better _ News headlines _ Announcements _ Sound pulgin _ Movie controls

Question No: 7 ( Marks: 1 ) - Please choose one Can you add a style in a single place on a page ? _ Yes, with a style-definition written into the tag _ Yes, with a global style definition that redefines the tag. _ No - CSS can only be defined for entire pages. Question No: 8 ( Marks: 1 ) - Please choose one Which CSS tag is used to place an image that would remain when user scrolls down or up the page?

_ background-attachment: fixed _ background-attachment: scroll

_ background-attachment: up _ All of these

Question No: 9 ( Marks: 1 ) - Please choose one What shall come in blanks for proper result, Here blanks are numbered with 1,2 and 3 <html> <head> <SCRIPT language="JavaScript"> Var num1, var num2 Document.container .result.value=parseFloat(num1)-parseFloat(num2) </script> </head> <body> <FORM name=---------1-----------> <input type=----------2------- name=-------3--------- maxlength=5> </form> </body> </html> _ container, text and result _ result, value and container _ container , button and value _ result, container and text

Question No: 10 ( Marks: 1 ) - Please choose one

Correct syntax of "for" loop is : _ for (i = 0; i <= 5) _ for i = 1 to 5 _ for (i <= 5; i++) _ for (i = 0; i <= 5; i++)

REF http://www.ex-designz.net/test_grade.asp?tid=65

Question No: 11 ( Marks: 1 ) - Please choose one CGI stands for _ Common Gate Information _ Common Gate Interface (PAGE 82) _ Common Goal Interest _ Common Global Interaction

Question No: 12 ( Marks: 1 ) - Please choose one Which of the following property falls in HTTP? _ Stateless _ Stateful _ Temporary _ All of these

Question No: 13 ( Marks: 1 ) - Please choose one What is a correct way of referring to a stylesheet called "mystyle.xsl" ? _ <?xml-stylesheet type="text/xsl" href="mystyle.xsl" ?>

_ <link type="text/xsl" href="mystyle.xsl" /> _ <stylesheet type="text/xsl" href="mystyle.xsl" /> _ <?stylesheet type="text/xsl" href="mystyle.xsl" ?>

Question No: 14 ( Marks: 1 ) - Please choose one Which of the following does not interpret its code? _ ASP _ PHP _ JSP (page 85) _ Coldfusion

Question No: 15 ( Marks: 1 ) - Please choose one Asymmetric cryptography is also called -------------- .

_ Public key cryptography (PAGE 100) _ Private key cryptography _ Substitution cryptography _ Transposition

Question No: 16 ( Marks: 1 ) - Please choose one Digital signature uses --------- .

_ Symmetric cryptography _ Private key cryptography _ Public key cryptography (PAGE 100)

_ Hash function

Question No: 17 ( Marks: 1 ) - Please choose one Which one of the following is NOT a valid JavaScript variable? _ _name1 _ $studentScore _ first_name _ 2ndName

Question No: 18 ( Marks: 1 ) - Please choose one Which of these is the correct HTML code for creating a reset button? _ <input type =button name=reset value=reset> _ <input type=resetButton value=Clear> _ <input type=reset value=reset> (page 61) _ <input type=button name=reset value=clear>

Question No: 19 ( Marks: 1 ) - Please choose one Why we use reset tag in HTML?

_ To remove the text written in Notepad. _ To remove the text written in between <body> and </body>tag. _ To remove the text written in between <head> and </head> tag. _ To remove the text written in between <form> and </form> tag. (page 61)

Question No: 20 ( Marks: 1 ) - Please choose one

http://cs.vu.edu is an example of

_ Two zone domain name _ Three zone domain name _ Four zone domain name _ Five zone domain name

Question No: 21 ( Marks: 2 ) How Certification Authority (CA) issues the certificates? Describe briefly Question No: 22 ( Marks: 2 ) Discuss the role of child element tags while in writing XML code. Question No: 23 ( Marks: 3 ) Performance of web servers can be evaluated mainly on the basis of two factors. What are they?

Question No: 24 ( Marks: 3 ) Write a function for the addition of two numbers? Question No: 25 ( Marks: 5 ) Write the JavaScript code which will display the following in a web page using a FOR loop:

The number is 0 The number is 1 The number is 2 The number is 3 The number is 4 The number is 5

Question No: 26 ( Marks: 5 ) What is the difference between an interpreted and a compiled language? Give one example of

each.

MIDTERM EXAMINATION Spring 2009 IT430- E-Commerce (Session - 2)

Question No: 1 __ ( Marks: 1 ) - Please choose one Academic institutions, religious organizations and government using ----------------------e-commerce classification Busi ness-to-Business(B2B) Intra Business Non Business EC (page 2) Busi ness-to-consumer(B2C)

Question No: 2___ ( Marks: 1 ) - Please choose one Network addresses 128--- 191 range belongs to which of the following class networks? A B (page 10) C E

Question No: 3 ( Marks: 1 ) - Please choose one

Where in an HTML document is the correct place to refer to an external style sheet?

In the <body> section At the end of the document In the <head> section At the top of the document Ref http://www.ex-designz.net/test_grade.asp?tid=37 Question No: 4 __ ( Marks: 1 ) - Please choose one Constructor is defined as the initializing function used to create..........

Instance of object Copy of object Instance / copy of object (page 69) Shallow copy of object

Question No: 5 ( Marks: 1 ) - Please choose one What does DTD stand for? Do The Dance. Dynamic Type Definition. Data Type Definition. (page 76) Direct Type Dfinition.

Question No: 6 __ ( Marks: 1 ) - Please choose one Which one of following file is used to translate XML:

DTD XSL (repeated ) XML parser Browser

Question No: 7 __ ( Marks: 1 ) - Please choose one In which of the following language ,XML parser is usually written.

VB.net Java (page 77) Asp.net C++ Question No: 8 __ ( Marks: 1 ) - Please choose one In _________key cryptography, everyone has access to all the public keys

Public (page 100) Private Symmetric Certified

Question No: 9___ ( Marks: 1 ) - Please choose one How do you define a numerical value?

var mynum = new Math; var mynum = Math(6); var mynum = 6; Math.mynum = 6;

Question No: 10___ ( Marks: 1 ) - Please choose one What is 17%5 ? 2 3 85 84

Question No: 11___( Marks: 1 ) - Please choose one An array can contain ---------- .

only text only numbers only numbers or text any valid variable ref http://java.sun.com/docs/books/jls/second_edition/html/arrays.doc.html Question No: 12 ( Marks: 1 ) - Please choose one Which tag is used for the hidden fields?

<FIELD> <TEXT> <INPUT> (page 88) <HIDDEN>

Question No: 13 __ ( Marks: 1 ) - Please choose one Packet filter firewall operates at a) data link layer b) network layer c) transport layer

a and b only (page 5) c only b and c only a, b and c

Question No: 14 ( Marks: 1 ) - Please choose one Which one has the functionality to redirect the filled information to an other page.

Submit button Reset button Radio button None of the given

Question No: 15 ( Marks: 1 ) - Please choose one

Due to which characteristics, ATM network are covered under E-commerce ?

Exchange of information through computer networks Internet. Exchanging of products, services. None of the above.

Question No: 16 __ ( Marks: 1 ) - Please choose one IP, RIP, and ARP protocols work on

Application layer Session layer Network layer (page 6) Data link layer

Question No: 17 __ ( Marks: 1 ) Shortly Explain RIP?

Question No: 18 __ ( Marks: 1 ) In HTML , for displaying information systematically which tag do we usually use ? Question No: 19 ( Marks: 2 ) How Certification Authority (CA) issues the certificates? Describe briefly Question No: 20 __ ( Marks: 3 ) What is MAC address? How does it help server to identify the client? Question No: 21 ( Marks: 5 )

How can we classify E-Commerce by the nature of its transactions? Give at least one real life

example for each of its classification. Question No: 22 ( Marks: 10 ) Analyze the following given code showing some Cascading Style Sheets tags and explain its

lines one by one. <html> <head> <style type="text/css"> h1 {text-decoration: overline} h2 {text-decoration: line-through} h3 {text-decoration: underline} a {text-decoration: none} </style> </head> </html> <body> <h1>This is header 1</h1> <h2>This is header 2</h2> <h3>This is header 3</h3> <p><a href="http ://www.w3schools.com/default.asp">This is a link</a></p> </body>

IDTERM EXAMINATION Spring 2009 IT430- E-Commerce (Session - 1)

Question No: 1 __ ( Marks: 1 ) - Please choose one Marketing plan should be same for all E-commerce classification. True False

Question No: 2 ( Marks: 1 ) - Please choose one Identify the networking device which regenerates the signals if these become weak.

Hub Switch Router Repeater (page 15)

Question No: 3 ( Marks: 1 ) - Please choose one How can you open a link in a new browser window?

<a href="url" target="new"> <a href="url"target="_blank"> (page 33) <a href="url"new> None of these

Question No: 4 ( Marks: 1 ) - Please choose one

Content pages relate to which of the following tag?

<iframe> <Frame> <frameset> <noframes>

Question No: 5 __ ( Marks: 1 ) - Please choose one What is the correct HTML for referring to an external style sheet?

<style src=mystlye.css> <link re = stylesheet type= text/css herf= mystyle.css> <stlyesheet> mystyle.css</stlyesheet> All of these

Ref http://www.ex-designz.net/test_grade.asp?tid=37

Question No: 6 __ ( Marks: 1 ) - Please choose one Choose the correct HTML code line which left-align the content inside a table cell.

<td leftalign> <td valign="left"> <td align="left"> (page 26) <tdleft>

Question No: 7 ( Marks: 1 ) - Please choose one In a Frameset code, do the BODY tags belong inside or outside of the NOFRAMES tag pair?

Inside because an HTM Document can only include one or the other. Outside, to be seen by the older browsers [NN version 1 and IE version 2]. Outside because the W3C says that to be valid. Contain a BODY tags pair.

Ref http://www.tjkdesign.com/articles/frames/quiz.asp

Question No: 8 ________________ ( Marks: 1 ) - Please choose one In CSS, the font-style property can make text what? Bigger. Italic. Different colors. Change size. Ref http://www.w3schools.com/css/css_font.asp

Question No: 9 ( Marks: 1 ) - Please choose one Which CSS tag is used to place an image that would remain when user scrolls down or up the page?

background-attachment: fixed background-attachment: scroll background-at tachment : up All of these

Question No: 10 ( Marks: 1 ) - Please choose one Which of the following ,in Javascript, we could not create our own?

Textboxes Dropdown Object Image Ref http://www.w3schools.com/js/js_objects.asp

Question No: 11 ( Marks: 1 ) - Please choose one How do you write a conditional statement for executing some statements only if "i" is equal to 5? if i=5 if i=5 then if i==5 then if (i==5) (page 58)

Ref

http://www.ex-designz.net/test_grade.asp?tid=65

Question No: 12 __ ( Marks: 1 ) - Please choose one Constructor is defined as the initializing function used to create..........

Instance of object Copy of object Instance / copy of object (page 69) Shallow copy of object

Question No: 13 ( Marks: 1 ) - Please choose one Which one of following file is used to translate XML: DTD XSL (page 77) XML parser Browser

Question No: 14 ( Marks: 1 ) - Please choose one How can you reference part of a string?

text.substr(5,6); text.part(5,6) text. piece(5 ,6) text.split(5,6); http://php.net/manual/en/function.substr.php

Question No: 15___( Marks: 1 ) - Please choose one Which one is the correct CSS syntax?

h1 {font-size:72pt} (page 39) h1:font-size=72pt {h1:font-size=72pt} {h1;font-size:72pt}

Question No: 16 __ ( Marks: 1 ) - Please choose one In the communication between two computers on a network, CRC is calculated at

Senders side Receivers side Both sender and receiver sides Neither on sender nor on receiver side (100% tuka )

Question No: 17 __ ( Marks: 1 ) What does this mean document.write("str.charAt(3) : "+str.charAt(3) +"<P>"); ?

Question No: 18 __ ( Marks: 1 ) What does this term mean "Non-repudiation"?

Question No: 19 __ ( Marks: 2 ) What are servlets?

Question No: 20 ( Marks: 3 ) What are the three methods for using style sheets with a web page?

Question No: 21 __ ( Marks: 5 ) Identify protocol stack used in each layer of OSI model?

Question No: 22 ( Marks: 10 ) "The role of a Certification Authority is similar to a passport office." Explain it.

MIDTERM EXAMINATION Spring 2009 IT430- E-Commerce (Session - 4) Question No: 1 ( Marks: 1 ) - Please choose one In data link layer, data packets are placed inside Data frames (PAGE 6) Data boxes Data streams None of these Question No: 2 ( Marks: 1 ) - Please choose one Which of these is the correct HTML code for creating a reset button? Question No: 3 ( Marks: 1 ) - Please choose one ..tag is used into .tag because a row contains multi cells and to fill up these cells with data. TD TR TR TD TD TG TG TR RFF http://www.w3.org/TR/WCAG10-HTML-TECHS/ Question No: 4 ( Marks: 1 ) - Please choose one Individuals who write programs or manipulate technologies to gain unauthorized access to computers and networks are --------------- . administrators

experts hackers (PAGE 94) coders Question No: 5 ( Marks: 1 ) - Please choose one Which tag is used for the hidden fields? Question No: 6 ( Marks: 1 ) - Please choose one What is a correct way of referring to a stylesheet called "mystyle.xsl" ? <?xml-stylesheet type="text/xsl" href="/mystyle.xsl" ?> <?stylesheet type="text/xsl" href="/mystyle.xsl" ?> Question No: 7 ( Marks: 1 ) - Please choose one Which of them is NOT a predefined object? Document Date Loop Array ref http://www.webreference.com/programming/javascript/diaries/15/ Question No: 8 ( Marks: 1 ) - Please choose one Which of these is not a comparison operator? < > = (PAGE 58) != Question No: 9 ( Marks: 1 ) - Please choose one Var d = new date() Which of the following is correct about the d variable? instance of new instance of Date() method instance of Date object Simple Variable REF http://www.webreference.com/programming/javascript/diaries/15/ Question No: 10 ( Marks: 1 ) - Please choose one When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called Local Variables Global Variables Local and Global

None of the above ref If you declare a variable within a function, the variable can only be accessed ... the variable is destroyed. These variables are called local variables. ... Question No: 11 ( Marks: 1 ) - Please choose one Which of the following , is condition part of given For loop for (i = 0; i <= 5; i++). i=0. i++. i<=5. (i = 0; i <= 5; i++). Ref http://www.blackwasp.co.uk/CSharpForLoop.aspx Question No: 12 ( Marks: 1 ) - Please choose one What is the correct JavaScript syntax to write "Virtual University of Paistan"? document.write("Virtual University of Paistan ") ("Virtual University of Paistan ") " Virtual University of Paistan " response.write("Virtual University of Paistan ") Question No: 13 ( Marks: 1 ) - Please choose one Which of the following is NOT valid HTML code line? ,84%"> ,84%"> ,50% rows=16%,84%> Question No: 14 ( Marks: 1 ) - Please choose one CSS is a breakthrough in Web design because it allows developers to control the-------- Processing speed on client side Data grid view on client side Style and layout of home page. Style and layout of multiple Web pages ref http://ezinearticles.com/?Advantages-of-Using-CSS-in-Web-Design&id=1433066 Question No: 15 ( Marks: 1 ) - Please choose one Which HTML tag is used to define an internal style sheet?

Question No: 16 ( Marks: 1 ) - Please choose one What is the correct HTML tag for adding a background color? yellow None Question No: 17 ( Marks: 1 ) What does this mean? (page 49) padding-right padding-right adds space to the right of the content

Question No: 18 ( Marks: 1 ) Do you agree or not that using Cascading Style Sheets one can apply an image to sections of ones page or even to individual words. Yes! I agree, using CSS one can apply his/her defined design, image or wording to muliple pages of his/her website. Question No: 19 ( Marks: 2 ) Suppose, there is an applet at "http://www.vu.edu.pk/demo.class". Write the code to include this applet in your web page. Question No: 20 ( Marks: 3 ) What do you think, is there any difference between Static and Dynamic IP Address assignment? Discuss. A static IP address is a number (in the form of a dotted quad) that is assigned to a computer by an Internet service provider (ISP) to be its permanent address on the Internet. Computers use IP addresses to locate and talk to each other on the Internet, much the same way people use phone numbers to locate and talk to one another on the telephone. When you want to visit whatis.com, your computer asks a domain name system (DNS) server (think telephone information operator) for the correct dotted quad number (think phone number) for whatis.com and your computer uses the answer it receives to connect to the whatis.com server. Question No: 21 ( Marks: 5 ) What is cryptography? What techniques are used for cryptography? Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized or unwanted person intercepts the message he/she would still not be able to make any sense out of it. Cryptography is thousands of years old. Techniques used for cryptography Substitution In substitution we replace each letter in the message with another to make the message non-understandable. For example, each letter a in the message can be replaced with letter d and letter b with letter e and so on. Transposition It is based on scrambling the characters in a message. A transposition system may first write a message into a table row by row then the message can be read and rewritten column by column to make it scrambled.

Question No: 22 ( Marks: 10 ) Analyze the following given code showing some Cascading Style Sheets tags and explain its lines one by one. <html> <head> h1 {text-decoration: overline} h2 {text-decoration: line-through} h3 {text-decoration: underline} a {text-decoration: none} <body> This is header 1 This is header 2 This is header 3 This is a link

MIDTERM EXAMINATION Spring 2010 IT430- E-Commerce (Session - 6) Solved Question No: 1 ( Marks: 1 ) - Please choose one Academic institutions, religious organizations and government using --------------------- e-commerce classification Business-to-Business(B2B) Intra Business

Non Business EC (page 2) Business-to-consumer(B2C)

Question No: 2 ( Marks: 1 ) - Please choose one In which protocol, the messages are not deleted from email server. SMTP POP3 IMAP (page 18) ICMP in case of IMAP the message is not deleted in the email server and thus can be reopened from another location/machine.

Question No: 3 ( Marks: 1 ) - Please choose one What is the correct HTML tag for adding a background color? <background>yellow</background> <body bgcolor="yellow"> (page 47) <body color="yellow"> None

Question No: 4 ( Marks: 1 ) - Please choose one Which HTML tag is used to define an internal style sheet? <css> <script> <style> (Ans) <sheet> reference http://www.ex-designz.net/test_grade.asp?tid=37 (question no 3)

Question No: 5 ( Marks: 1 ) - Please choose one What is the correct HTML for making a hyperlink? <a href="http://www.w3schools.com">W3Schools</a> <a name="http://www.w3schools.com">W3Schools.com</a> <a url="http://www.w3schools.com">W3Schools.com</a> <a>http://www.w3schools.com</a> REFERENCE http://www.w3schools.com/html/html_links.asp

Question No: 6 ( Marks: 1 ) - Please choose one If we leave out the target attribute in frame tag and link was clicked ,the document loads into the window In Same page (repeated ) In other blank page. To display browser error. All of the options.

Question No: 7 ( Marks: 1 ) - Please choose one What does mean by != comparison operator? http://www.vustudents.net Equal to Not Equal Not Equal (page 58)

Question No: 8 ( Marks: 1 ) - Please choose one What does the string. match (abc) object do? Concatenates the abc word to other abc words Matches the abc words with other abc words It does replacement of abc word with other words All of the above ref http://www.regular-expressions.info/reference.html Question No: 9 ( Marks: 1 ) - Please choose one var txt="Hello World!" 10 11 12 13 REFERENCE http://www.w3schools.com/js/js_obj_string.asp Document. Write (txt.length), it would return the length as.

Question No: 10 ( Marks: 1 ) - Please choose one Which of the following property falls in HTTP? Stateless (Ans) Stateful Temporary All of these Question No: 11 ( Marks: 1 ) - Please choose one Which one of the following certifies the binding between public key and its owner. CA (page101) KDC

TLS Firewall Question No: 12 ( Marks: 1 ) - Please choose one Cyclical Redundancy Check (CRC), takes place in which layer of OSI Model. Session Layer Transport Layer Network Layer Data link layer (page 6)

Question No: 13 ( Marks: 1 ) - Please choose one How can you convert information consisting of comma separated values into an array? txtArray = txt.indexOf(','); txtArray = txt.split(','); txtArray = txt.trim(','); txtArray = txt.substring(','); page 70

Question No: 14 ( Marks: 1 ) - Please choose one The control statement on a while loop is tested before each time through the loop after each time through the loop once at the start once at the end Ref http://en.wikipedia.org/wiki/While_loop Question No: 15 ( Marks: 1 ) - Please choose one Which SQL statement is used to delete data from a database?

DELETE (page 83) COLLAPSE REMOVE DISCARD

Question No: 16 ( Marks: 1 ) - Please choose one A program that performs a specific function such as creating invoices/bills or processing payment received from customers is called a/an ---------------. Middleware Web Service CRM Software Appplication Program (page 92)

Question No: 17 ( Marks: 1 ) - Please choose one Which firewall uses strong user authentication to verify identity of a host attempting to connect to the network? Packet filter firewall Circuit level firewall Application gateway firewall (page 96) Hybrid firewall

Question No: 18 ( Marks: 1 ) - Please choose one In what form are style rules presented?

Selector { property: value } selector { property= value } selector ( property: value ) selector ( property= value )

Question No: 19 ( Marks: 1 ) - Please choose one Why we use reset tag in HTML? To remove the text written in Notepad. To remove the text written in between <body> and </body>tag. To remove the text written in between <head> and </head> tag. To remove the text written in between <form> and </form> tag.

Reference http://www.echoecho.com/htmlforms13.htm

Question No: 20 ( Marks: 1 ) - Please choose one When data moves upward in the OSI stack it is called Encapsulation De-encapsulation (page 5) Synchronization None of these

Question No: 21 ( Marks: 2 ) What does PPTP stand for?

Ans ( page98) PPTP stands for point to point transfer protocol.

Question No: 22 ( Marks: 2 ) What are the keywords to define a variable and a function in JavaScript? var is the keyword used to define a variable in Javascript e.g var a; function is the keyword to define a function in javascript e.g function myfunction(){ // some code }

Question No: 23 ( Marks: 3 ) http://www.vustudents.net Identify the object, property and method in the following: Math.sin(45) Math.PI Ans: Math is the object in above case PI is the property of Math object Sin() is the method of Math object Question No: 24 ( Marks: 3 ) Performance of web servers can be evaluated mainly on the basis of two factors. What are they?

Ans: Performance of web sever Performance of web servers can be evaluated mainly on the basis of two factors: Throughput, which is the number of http requests that a particular server hardware and software can handle in the unit time; and

Response time, which is the amount of time a web server requires to process one request. Web server hardware architectures Question No: 25 ( Marks: 5 ) Write the code for a web page displaying a button named "Testing". After clicking that button an alert should be displayed saying "The test is successful". <html> <head> <script type="text/javascript"> function sndAlert() { window.alert("The test is successful!!!"); } </script> </head> <body> <FORM NAME="form1"> <INPUT TYPE="Button" name="showAlert" VALUE="Show Alert" onclick="sndAlert()"> </FORM> </body> </html> Question No: 26 ( Marks: 5 ) What is the difference between an interpreted and a compiled language? Give one example of each. http://www.vustudents.net Ans: In a compiled language we compile to code or convert into machine language using a software called compiler as we can case C++ Example C++ with interpret language we interpret the code (line by line) at run time using a program called interpreter browser is an interpreter. Example Browser

MIDTERM EXAMINATION Spring 2009 IT430- E-Commerce (Session - 2)

Question No: 1 __ ( Marks: 1 ) - Please choose one Enable Virtual private network protocol (VPN) to become a part of

Extranet .(page 98) Intranet. Extranet and Intranet. None of these.

Question No: 2 ( Marks: 1 ) - Please choose one Content pages relate to which of the following tag?

<iframe> <Frame> <frameset> (page 31) <noframes>

Question No: 3 __ ( Marks: 1 ) - Please choose one The attributes used by <EMBED . . .> depend on the type of ?

plugin being used Browser being used (page 38) ISP being used Sound/movie being used

Question No: 4 ( Marks: 1 ) - Please choose one Which of the following is HML tag could nt be used as CSS tag?

<style> <h1> <p> <a> (page 39)

css coding <HTML><HEAD> <STYLE TYPE="text/css"> <!-H1 { color: blue } --> </STYLE> </HEAD><BODY> <H1> A blue header </H1> </BODY></HTML> H1 { color: blue; text-align: center; } H1 { color: blue; text-align: center; } <STYLE TYPE="text/css"> <!-.myIndent { margin-left: 1.0in } --> </STYLE>

The HTML tags to reference the above .myIndent class is: <H1 CLASS=myIndent>Indented Header</H1> <P CLASS=myIndent>Also this whole paragraph would be indented one inch</P> <P>but this wouldn't be indented</P>

Question No: 5 ( Marks: 1 ) - Please choose one Which CSS tag is used to place an image that would remain when user scrolls down or up the page?

background-attachment: fixed (page 48) background-attachment: scroll background-attachment: up

__ _ ___ _ ___ __

Question No: 6___( Marks: 1 ) - Please choose one What does mean by != comparison operator?

Equal to Not Equal Not Equal (page 58)

Question No: 7 ( Marks: 1 ) - Please choose one For which of following purpose the Firewall is used ?

Efficient working None of these Protection against security attacks (page 96) Networking purpose

Question No: 8 ( Marks: 1 ) - Please choose one Which one of the following certifies the binding between public key and its owner. CA (page 101) KDC TLS Firewall

Question No: 9 __ ( Marks: 1 ) - Please choose one Choose the correct HTML tag to make a text bold <tbold> <b> (page 19) <bld> <bold>

ref http://www.w3schools.com/quiztest/quiztest.asp?qtest=HTML

Question No: 10 __ ( Marks: 1 ) - Please choose one Middleware establishes connections between ----------- .

e-commerce software and accounting system (page 92) e-commerce software and web services web services and CRM software ERP and CRM software

Question No: 11 ( Marks: 1 ) - Please choose one Firewall is used to I - examin the data entering the network II - examin the data leaving the network III - filter the data according to certain rules

I and II only I, II and III (page 96) I and III only I only Ref http://www.webopedia.com/TERM/F/firewall.html Question No: 12 ( Marks: 1 ) - Please choose one When two or more intranets are connected to each other they form a/an ---------VPN intranet internet extranet (page 2)

Question No: 13 __ ( Marks: 1 ) - Please choose one Which one specify the amount of space between the edges of the cell and the text inside?

Space tag CELLSPACING CELLPADDING FRAMESPACING

Question No: 14 ( Marks: 1 ) - Please choose one Which of the following CANNOT be a value for the 'target' attribute in anchor tag? _new _top _blank _self

ref
_blank renders the link in a new, unnamed window _self renders the link in the current frame (useful for overriding a BASE TARGET) _parent renders the link in the immediate FRAMESET parent _top renders the link in the full, unframed window

Question No: 15 ( Marks: 1 ) - Please choose one In what form are style rules presented?

selector { property: value } selector { property=value } selector ( property: value ) selector ( property= value )

Question No: 16 __ ( Marks: 1 ) - Please choose one What is identified by the tag <FRAMESET COLS="20%,60%,20%">? Horizontal frame Vertical Frame (page 31) Top Frame Bottom Frame

Question No: 17 __ ( Marks: 1 ) What it stands for (W3C)? Answer World Wide Web Consortium

Question No: 18 ( Marks: 1 ) Do you agree or not that using Cascading Style Sheets one can apply an image to sections of ones page or even to individual words.

Question No: 19 ( Marks: 2 ) Which attribute is used to describe , how many times you want the sound to repeat. Discuss briefly.

Question No: 20 __ ( Marks: 3 ) What are cookies? Why these are used in web development?

Question No: 21 ( Marks: 5 ) What is the difference between physical address and logical address? Support your answer with

at least two examples.

Question No: 22 ( Marks: 10 ) How can we change a Font style of a text? Write complete tag by using an example by yourself.

E-Commerce Quiz No.1 Lecture 10 to 16 Repeated MCQs ignored

var txt="Hello World!" document.write(txt.length), it would return the length as. Select correct option: 13 12 11 10

__________ is an event handler in JavaScript.

None of the given onloading onpress

onbuttondown

In Java script , New key word is used to create:

Instance of method Instance of Object Initialize the Variable Assign the vale of object

Border-style: specifies the style of all borders in the order _________________.

border top style, border right style, border bottom style, border left style border top style, border left style, border bottom style, border right style border bottom style, border right style, border top style, border left style border top style, border bottom style, border bottom right, border left style

Which is NOT a correct name for an XML element?

<Note> <1dollar> All 3 tags are incorrect <h1>

___________ is a valid JavaScript variable.

first_name 2nd_name

third name *lastname*

_________ is not a comparison operator.

> < != =

In CSS, how do you make the text bold?

font:b font-style:bold font-size:bold font-weight:bold

_______________ will display the border having top border = 10 pixels, bottom border = 5 pixels, left border = 20 pixels and right border = 1 pixel.

border-width:10px 1px 5px 20px border-width:5px 1px 10px 20px border-width:10px 20px 5px 1px border-width:5px 20px 10px 1px

The control statement on a while loop is tested

once at the start after each time through the loop once at the end before each time through the loop

The first control statement in a for loop usually

increments a counter sets the termination condition creates a control variable All of the given

How does a "for" loop start?

for i = 1 to 8 for (i = 0; i <= 8) for (i = 0; i <= 8; i++) for (i <= 8; i++)

_________ will refer to an external script called "xyz.js".

<script file="xyz.js"> <script link="xyz.js"> <script src="xyz.js"> <script name="xyz.js">

For which of the following, XSL is the recommended as style sheet language?

HTML XML HTML and XML XSLT

border-color: specifies the color of all borders in the order________________.

border right color, border bottom color, border left color, border top color border top color, border right color, border bottom color, border left color border top color, border bottom color, border right color, border left color border bottom color, border top color, border left color, border right color

What is a correct way of referring to a stylesheet called "mystyle.xsl" ?

<?xml-stylesheet type="text/xsl" href="mystyle.xsl" ?> <link type="text/xsl" href="mystyle.xsl" /> <stylesheet type="text/xsl" href="mystyle.xsl" /> <?stylesheet type="text/xsl" href="mystyle.xsl" ?>

Constructor is defined as the initializing function used to create........

Instance / copy of object copy of object Instance of object shallow copy of object

The second control statement in a for loop usually

increments a counter sets the termination condition creates a control variable none of the given

Border-width: specifies the width of all borders in the order ______________. border right width, border bottom width, border left width, border top width border top width, border right width, border bottom width, border left width border bottom width, border left width, border top width, border right width border bottom width, border top width, border left width, border right width

What is the correct HTML for adding a background color?

<background>yellow</background> <body color="yellow"> <body bgcolor="yellow"> <bgcolor>yellow</bgcolor>

__________ is a Java script comment.

//comment %comment $comment *comment*

Date () is the -------------------- of the date object which provides current date of the system.

method property constructor Destructor

Left margin of an element can be changed using _________.

padding: margin: margin-left: text-indent:

In case mouse moves over a link, ________ event will be detected.

onMouseOver onRollOver overMouse All of the given

CSS definitions can be written in __________ to define the styles for entire site.

Body section Head section Text file

Anywhere in the web page

Correct javascript code for writing "hello world" is _______________.

document.write("hello world") write("hello world") response.write("hello world") None of the given

Which of the following is HTML tag could not be used as CSS tag?

<h1> <style> <a> <p>

We put the JavaScript in the following ___________ html element.

<script> <javascript> <js> <java_script>

What is the correct HTML for making a text input field?

<input type="textfield"> <input type="text">

<textfield> <textinput type="text">

i++ means ________.

i=i+i i=i+1 i=i+2 i=1+1

What is the correct JavaScript syntax to insert a comment that has more than one line?

/*This comment has more than one line*/ /#This comment has more than one line#/ <!--This comment has more than one line--> none of the given

In what form style rules are presented?

selector { property= value } selector ( property: value ) selector { property: value } selector ( property= value )

__________ is an invalid JavaScript variable.

3rd_name

first_name secondName $myName

!= comparison operator means __________.

Equal to Not equal to Greater than None of the given

Actions that can be detected by javascript are called _____________. (Chose best suitable option)

Events Functions Methods Hyper links

Which statement is true?

All XML documents must have a DTD All XML elements must be lower case All the statements are true All XML elements must be properly closed

charAt() is the function/method of

String object Date object Time object Array object

<span> is used to apply style to ___________.

text image frames webpage

Which loop type always runs the enclosed code at least once

do while for while none of them

The conditional statement "i is not equal to 5" can be written as _____________.

if (i<>5) if (i != 5) if (i not equal to 5) if (i ! 5)

________ is not a data type in java script.

int float string null

_________ objects properties and functions are accessible every where.

Local Global Predefined All of the given

In java script "alert" function displays ________.(Chose best suitable answer)

Popup window Web page Task bar Menu bar

What does DTD stand for?

Do The Dance Dynamic Type Definition Data Type Definition Direct Type Dfinition

Which of the following is NOT an advantage of CSS?

Define the look of your pages in one place Works on version 4 browsers or newer Easily change the look Implement same formatting each time tag is used. _________ tag is used to control the layout of different elements.

css style span None of the given

Style sheets can be used in a web page using ________ method/s.

Inline Embedded Document level and external All of the given

JavaScript can be placed in __________.

Head section Body section Both of the given None of the given

The conditional statement "i is equal to 5" can be written as _____________.

if (i == 5) if (i = 5) if (i is equal to 5) if (i <> 5)

Who is making the Web standards?

International Standard Organization ANSI Microsoft The World Wide Web Consortium

Variables in java script can begin with _____________.

dolloar sign lower case letter under score character All of the given

What value is returned by getMonth in April?

2 3 4

___________ is NOT an attribute of border.

border-pattern border-style border-bottom-color border-width

Code: JavaScript var a = ["v","i","r","t", "u", "a", "l"]; document.write(a.join("-")); What would be the output of the above code fragment?

virtual virtualv:i:r:t:u:a:l v-i-r-t-u-a-l

What does XML stand for?

eXtra Modern Link X-Markup Language eXtensible Markup Language Example Markup Language

Padding is the space between __________.

Two tables

Two borders Content and border Border and window

Which one of the following is the correct HTML tag for making a drop-down list?

<input type="list"> <input type="dropdown"> <select> <list>

Which you will NOT be able to do with CSS?

Add text Position the content Define the look of your pages in one place Change the background color

What is the correct HTML for making a hyperlink?

<a href="http://www.w3schools.com"> W3Schools</a> <a name="http://www.w3schools.com"> W3Schools.com</a> <a url ="http://www.w3schools.com"> W3Schools.com </a> <a>http://www.w3schools.com</a>

1. _________ attribute indicates the unique field name for a checkbox.

Type Name Input Value 2. In HTML, depending upon which tag is used, the enclosed content can then have Specific effect Style Format Specific effect, style and format 3. Which of the following is true for selection list? <select name="field name" size="no. of items"> <select "name=field name" size="no. of items"></select> <select name="field name" size="no. of items"></select> None of the above 4. List tag used in html is ______ Paired Unpaired Single None of the given options 5. Which of the following is HTML tag could not be used as CSS tag? <h1> <style> <a> <p> 6. What is identified by the tag? Horizontal frame Bottom Frame Top Frame Vertical Frame 7. HTML documents are connected with each other by ________. Big Tag Small Tag Link Tag None of the given options 8. The web addresses are first translated into IP address through ________ SMTP HTML IPV6 DNS

9. In Style sheets, how do you change the text color of an element? color: text-color= text-color: font-color: 10. ________ is used to interpret and show contents of the web page. HTML Notepad Browser Computer

11. A _________ is a web page populated with text boxes, drop-down lists and commands buttons to get information from the user. Hypertext Link Form Table Button 12. Which of the following is NOT an advantage of CSS? Define the look of your pages in one place Works on version 4 browsers or newer Easily change the look Implement same formatting each time tag is used. 13. Links are used to connect ____________. Images Text Images and web documents All of the given 14. When a visitor clicks a _________, the entries in form are set to the default values. Button Radio Button Submit Button Reset Button 15. Which of the following are correct tags used for frames, <Frame></Frame> <Frameset><Frame></Frame></Frameset> <Frameset><Frame></Frameset> <Frameset><Frame></Frame> 16. question_2you: if you have a less space for e-mails on internet then _________ protocol is used. SMTP IMAP POP POP3

17. _____________ are normally used to get yes/no or true/false information from a reader. Check Boxes Radio buttons Submit Buttons Selection List 18. Default web page background color is __________. Green Red White Blue 19. _____________ are normally used to get yes/no or true/false information from a reader. Check Boxes Radio buttons Submit Buttons Selection List 20. Which of the following is NOT valid HTML code line? <frameset rows="16%,84%"> <frameset columns="16%,84%"> <frameset cols="100,150"> <frameset cols="50%,50%" rows="16%,84%"> 21. What is the meaning of SRC in frame tag? Source for image saved on your disk Source for images saved on your disk Source of page saved on your disk Source of Pages saved on your disk 22. In what form style rules are presented? selector { property= value } selector ( property: value ) selector { property: value } selector ( property= value ) 23. __________ is the code for blank space in HTML. &lsquo; &nbsp; &sbquo; &iexcl; 24. Which CSS property controls the text size? font-style font-size text-style text-size 25. Which HTML tag is used to define an internal (embedded) style sheet? CSS Text / Style

Style Script 26. Meta Data is important for easier ____________. Web page creation Web site upload Web page search through search engine None of the above 27. Which HTML attribute is used to define inline styles? Styles Text Style CSS

29. Which attribute can be used to make a region non-clickable? Alt Target nohref none of the given

31. With _________, you can display more than one Web page in the same browser window. Forms Frames Post Action Java Scripts 32. In CSS, how do you make the text bold? font:b font-size:bold font-weight:bold FTP Telnet none 33. Which of the following is used for web page requests? HTTP 34. Which of the following provides an interface & series for file transfer over the network? HTTP FTP Telnet None 35. __________________ connects a local computer with a remote computer. SMPT VPN Telnet

none 36. Which of the followings provide e-mail services on the internet? MAC Telnet none 37. ________________ is connectionless transport protocol. SMPT SMPT TCP UDP MAC 38. ___________ is connection-oriented transport protocol. SMPT TCP UDP MAC 39. Public Key of the receiver is used to-------------------. a. Decrypt the message b. Encrypt the message c. Scramble the message d. None of the mentioned options 40. Receiver applies ----------------to the received original message Digital signature Message digest Hash function None of the mentioned options 41. Symmetric key can be replaced with----------------------------. Symmetric algorithms Pair of public and private keys Asymmetric key None of the mentioned options 43. Most of the electronic payment systems on internet use ------------------to ensure confidentiality and security of the payment information. Quantum computing Cryptography Both of the mentioned options None of the mentioned options 44. Simplicity and ----------------is the biggest advantage of Virtual PIN payment system. Full encryption Dual encryption No encryption None of the mentioned options 46. An electronic check book device is a combination of Hardware and a digital signature Software and information about user

Secure hardware and software None of the mentioned options 47. Which of the following is disadvantage of virtual PIN payment system? Bogus purchases are possible Stolen credit card number can be used Only some extra copies of the information items are made in case of a fraud All of the mentioned options are disadvantages of Virtual PIN payment system 48. FV stands for

Forward Virtual Famous virtual None of the mentioned options First Virtual 50. In the statement var myAr = new Array (60); what does the number 60 represent? The value assigned to the 1st element in the array The number of elements to be used in the array The number of dimensions created in a multi-dimensional arra All 51. Which of the following is the valid syntax for initialization of a string object? Var Girl = "salmanoreen" Girl = new string( "salmanoreen") Var Girl = new string( "salmanoreen") Var Girl = new Girl( "salmanoreen") 52. Identify that machine which services the internet request? Web client Web server Browser Mozilla

ITA430 Solved Quizzes BY


http://vustudents.ning.com

An agent is a software program that is _____ Select correct option: Triggers by human

Not capable of autonomous action. Capable of autonomous action in its environment in order to meet its objectives None ASP runs best on ________. Select correct option: Internet information Software Intranet Information Software Intranet Information Server Internet Information Server

What is/are the methods to track the customer. Select correct option: Database Cookies Hidden Fields All

Large companies establish connections between their e-commerce software and their existing accounting system by using a type of software called

__________.

Select correct option: Shareware Freeware Middleware None

Question # 5 of 10 ( Start time: 01:55:19 AM ) Password attacks are basically a result of _____ Select correct option: Back door Sniffing Eavesdropping None of the Above

Total Marks: 1

Question # 6 of 10 ( Start time: 01:56:03 AM ) Caching ______. Select correct option: have no effect on downloading of the page saves the time of downloading the page increase the time of downloading the page None of Above

Total Marks: 1

Question # 7 of 10 ( Start time: 01:56:58 AM )

Total Marks: 1

. A program that performs a specific function such as creating invoices/bills or processing payment received from customers is called _______. Select correct option: Firewall Application program Protocol Web Services

Question # 8 of 10 ( Start time: 01:57:54 AM )

Total Marks: 1

Programs that work with the browser to enhance its capabilities. Select correct option: Driver Flash PlugIn None of Above

Question # 9 of 10 ( Start time: 01:58:10 AM ) Agents can be used for _____ Select correct option:

Total Marks: 1

Comparisons Filtering Web crawling All

Question # 10 of 10 ( Start time: 01:58:53 AM )

Total Marks: 1

secure, dedicated point to point connection over the internet ______. Select correct option: Metropolitan area Network Local area Network Wide Area Network Virtual Private Network

Question # 7 of 10 ( Start time: 04:06:28 PM ) Branch to headquarter network _____. Select correct option: APN VPN NPV PNA

Total Marks: 1

ERP Stands for Select correct option: Entrepreneur Resource Planning Enterprise Rescue Planning Enterprise Resource Program Enterprise Resource Planning

Enterprise Resource Planning Enterprise Resource Planning (ERP) is a concept that integrates all aspects of a business e.g, accounting, logistics, manufacturing, marketing, planning, project management etc. at a single place. An ERP system such as SAP is expensive. E-commerce sites/software has to fully integrate with ERP software, wherever it is used. Enterprise Resource Planning (ERP) is a concept Select correct option: That integrates some aspects of business, at many locations. That integrates all aspects of a business at a single place. That integrates some aspects of business, at some locations. That integrates all aspects of business, at many locations.

Proxy Server can _____. Select correct option: Speed up the processing of http requests by caching web pages Translate HTTP request between trusted and un trusted network Can also act as a firewall filtering requests for certain web pages All of Above Extranet formed when ____. Select correct option: When two or more internet is connected to each other. When two or more WAN are connected to each other. When two or more intranets are connected to each other. When two or more LAN is connected to each other. secure, dedicated point to point connection over the internet ____. Select correct option:

Metropolitan area Network Local area Network Wide Area Network Virtual Private Network

Plug in is ______. Select correct option: Program that make the computer server. Programs that work with the browser to enhance its capabilities.

Program that communicate with the client from the server. None of Above ERP example is __ Select correct option: PAS DBMS SAP ASP Performance of the web server measured in ___. Select correct option: A - Throughput B - Response Time A&B None of Above Throughput is _________. Select correct option: No of instruction a server execute in one second. No of session a server handle. No of http request that a web server can handle. None of Above Throughput, which is the number of http requests that a particular server hardware and software can handle in the unit time; and Select correct option: Internet information Software Intranet Information Software Intranet Information Server Internet Information Server Agents can be used for ___ Select correct option: Comparisons Filtering Web crawling All An agent is a software program that is capable of autonomous action in its environment in order to meet its objectives. Agents can be used for comparisons, filtering, web crawling, auctions etc. For example, there may be buyer agents and seller agents each with their goals and constraints. They can negotiate deals on behalf of the users. Agents can monitor health indicators and alert the individuals under given conditions.

Large companies establish connections between their e-commerce software and their existing accounting system by using a type of software called ________. Select correct option: Shareware Freeware Middleware None Large companies establish connections between their e-commerce software and their existing acco system by using a type of software called Middleware which is a part of e-commerce software package CERT _________. Select correct option: Computer Elegant Response Time Computer Emergency Response Time Computer Efficient Response Time Computer Enter Response Time Computer Emergency Response Time (CERT) Systems Administrator, Audit, Network and Security Institute (SANS Institute) The best response that the experts have come up with to tackle the security issue is in terms of cryptography. SANS stands for _____. Select correct option: System Administration, Authentication, Network and Security Institute Software Authentication, Audit, Network and Security Institute Systems Administrator, Audit, Network and Security Institute None of Above

Application gateway firewall operate at ____. Select correct option: A -Session Layer B - Network Layer A&B None of Above

It operates at application layer of the OSI Model. It uses strong user authentication to verify identity of a host attempting to connect to the network using application layer protocols such us FTP. In contrast to packet filter firewall, it filters the requests rather than packets entering/leaving the network. It can block any outgoing HTTP or FTP requests. Select correct option: Time a server take to process one request. Time a server take to process all the request. Time a server take to process some request. Time a server take to process ten request HTTP is a _____. Select correct option: State Oriented Stateless A&B None of Above What is/are the methods to track the customer. Select correct option: Database Cookies Hidden Fields All

DoS stand for _______. Select correct option: Disk Operating System Denial of Services Do or stand Disk out System

What is web serve? Select correct option: Computer that delivers (serves up) web pages Computer that is big Computer that is Fast None of Above

One Tier Architecture __________. Select correct option: The entire processing may take place at individual terminal. The entire processing may take place at different terminal. The entire processing may not take place at individual terminal. None of Above

In 1-tier architecture, the entire processing takes place at a single place/zone. Password attacks are basically a result of ___ Select correct option: Back door Sniffing Eavesdropping None of the Above

Such attacks are basically a result of eavesdropping through which the hacker is able to know the account ID or password of a particular user. Then using it the hacker gains access to the network and gather information such as user names, passwords, computer names, resources etc. That can lead to modification, deletion or rerouting of network data. Self hosting ____. Select correct option: Companies may opt to run a server in house Companies may not opt to run a server in house Companies may opt rent server None of Above

An agent is a software program that is ___ Select correct option: Triggers by human Not capable of autonomous action. Capable of autonomous action in its environment in order to meet its objectives None An agent is a software program that is capable of autonomous action in its environment in order to meet its objectives. Agents can be used for comparisons, filtering, web crawling, auctions etc.

For example, there may be buyer agents and seller agents each with their goals and constraints. They can negotiate deals on behalf of the users. Agents can monitor health indicators and alert the individuals under given conditions.

IDS Stands for _______. Select correct option: Intrusion Defense System Intervention Detection System Intervention Defense System Intrusion Detection System In distributed denial of service attack, the compromised system itself is used as a source for further attacks. The use of firewalls and a proper Intrusion Detection System (IDS) can minimize Can not block any outgoing HTTP or FTP requests Can block any outgoing HTTP but not FTP requests Can not block any outgoing HTTP but FTP requests Can block any outgoing HTTP or FTP requests Application gateway firewall It operates at application layer of the OSI Model. It uses strong user authentication to verify identity of a host attempting to connect to the network using application layer protocols such us FTP. In contrast to packet filter firewall, it filters the requests rather than packets entering/leaving the network. It can block any outgoing HTTP or FTP requests.

Caching ____. Select correct option: have no effect on downloading of the page saves the time of downloading the page increase the time of downloading the page None of Above

Worms have the characteristics; Select correct option: Can replicate it Have the capability to travel without any help or human action Can spread from computer to computer All

Branch to headquarter network _____. Select correct option: APN VPN NPV PNA mote access capabilities to a compromised machine. Select correct option: Back Doors Virus Worms Trapdoors Back Doors are those hostile programs which, when run on a machine, install hidden services in order to give attackers remote access capabilities to a compromised machine. Trojan horses are those programs that appear harmless but actually have some malicious purpose.

E-commerce Site must provide ______. Select correct option: Transaction processing Shopping cart capabilities A catalog display All of the above Circuit level firewall operate at the ______. Select correct option: Data Link Presentation Network Transport It is quite similar to the packet filter firewall. It also works on the basis of a set of rules for filtering packets but operates at the transport layer of the OSI Model so has greater functionality. As a rule, the higher the layer of OSI model where a firewall operates, the more sophisticated is the firewall. It can make packets sent from internal network to a destination outside the firewall appear as if they originated at the firewall. Thus

information regarding hosts on the internal network remains secret. It can also determine whether TCP/IP connection between a host and a machine outside firewall has been properly established. Thus it can cut off any connection which has been hijacked by a hacker trying to pass through the firewall. Those hostile programs which, when run on a machine, install hidden services in order to give attackers remote access capabilities to a compromised machine. Select correct option: Back Doors Virus Worms Trapdoors

Front end consist of ______. Select correct option: Information which invisible to the user and he can interact with the same through some interface. Information which visible to the user and he can not interact with the same through some interface. Information which visible to the user and he can interact with the same through some interface. Information which is hidden. Asp, JSP, PHP ? Select correct option: Server Side Scripts Client Side Script A&B None of Above

SANS stands for _______. Select correct option: System Administration, Authentication, Network and Security Institute Software Authentication, Audit, Network and Security Institute Systems Administrator, Audit, Network and Security Institute None of Above

Proxy Server can _______. Select correct option: Speed up the processing of http requests by caching web pages Translate HTTP request between trusted and un trusted network Can also act as a firewall filtering requests for certain web pages All of Above

Response time ________. Select correct option: Time a server take to process one request. Time a server take to process all the request. Time a server take to process some request. Time a server take to process ten request

attacks are basically a result of _____ Select correct option: Back door Sniffing Eavesdropping None of the Above

IDS Stands for _________. Select correct option: Intrusion Defense System Intervention Detection System Intervention Defense System Intrusion Detection System

Question # 8 of 10 ( Start time: 02:45:30 PM ) Total Marks: 1 ASP runs best on ________. Select correct option: Internet information Software Intranet Information Software Intranet Information Server Internet Information Server

Plug in is ________. Select correct option: Program that make the computer server. Programs that work with the browser to enhance its capabilities. Program that communicate with the client from the server. None of Above

Question # 10 of 10 ( Start time: 02:47:59 PM ) Total Marks: 1 It occurs when a customer clicks at checkout or confirm order button and is subjected to some payment _______. Select correct option: Transaction Processing E cash System E Funds system None of Above

In this type of attack the hacker has the ability to monitor network traffic using some kind of network monitoring software. Select correct option: Snooping Sniffing Eavesdropping All of Above Eavesdropping/ sniffing/snooping In this type of attack the hacker has the ability to monitor network traffic using some kind of networkmonitoring software. For example, a hacker may install some backdoor or Trojan horse that can monitor the key strokes of a user w we were wrong only master mind was right hile typing and send the typed information to the hacker. Processing of HTML code on the Client Side and web page request on the server. Select correct option: One Tier Architecture Two Tier Architecture Three Tier architecture N tier Architecture

Example of 2-tier architecture is where processing of HTML code takes place on the client side and the web page request is processed on the server In this type of attack the hacker has the ability to monitor network traffic using some kind of network monitoring software. Select correct option: Snooping Sniffing Eavesdropping All of Above Eavesdropping/ sniffing/snooping In this type of attack the hacker has the ability to monitor network traffic using some kind of networkmonitoring software. For example, a hacker may install some backdoor or Trojan horse that can monitor the key strokes of a user

1. _________ attribute indicates the unique field name for a checkbox. Type Name Input Value 2. In HTML, depending upon which tag is used, the enclosed content can then have Specific effect Style Format Specific effect, style and format 3. Which of the following is true for selection list? <select name="field name" size="no. of items"> <select "name=field name" size="no. of items"></select> <select name="field name" size="no. of items"></select> None of the above 4. List tag used in html is ______ Paired Unpaired

Single None of the given options 5. Which of the following is HTML tag could not be used as CSS tag? <h1> <style> <a> <p> 6. What is identified by the tag? Horizontal frame Bottom Frame Top Frame Vertical Frame 7. HTML documents are connected with each other by ________. Big Tag Small Tag Link Tag None of the given options 8. The web addresses are first translated into IP address through ________ SMTP HTML IPV6 DNS 9. In Style sheets, how do you change the text color of an element? color: text-color= text-color: font-color: 10. ________ is used to interpret and show contents of the web page. HTML Notepad Browser Computer 11. A _________ is a web page populated with text boxes, drop-down lists and commands buttons to get information from the user.

Hypertext Link Form Table Button 12. Which of the following is NOT an advantage of CSS? Define the look of your pages in one place Works on version 4 browsers or newer Easily change the look Implement same formatting each time tag is used. 13. Links are used to connect ____________. Images Text Images and web documents All of the given 14. When a visitor clicks a _________, the entries in form are set to the default values. Button Radio Button Submit Button Reset Button 15. Which of the following are correct tags used for frames, <Frame></Frame> <Frameset><Frame></Frame></Frameset> <Frameset><Frame></Frameset> <Frameset><Frame></Frame> 16. question_2you: if you have a less space for e-mails on internet then _________ protocol is used. SMTP IMAP POP POP3 17. _____________ are normally used to get yes/no or true/false information from a reader. Check Boxes Radio buttons Submit Buttons Selection List 18. Default web page background color is __________. Green Red White Blue

19. _____________ are normally used to get yes/no or true/false information from a reader. Check Boxes Radio buttons Submit Buttons Selection List 20. Which of the following is NOT valid HTML code line? <frameset rows="16%,84%"> <frameset columns="16%,84%"> <frameset cols="100,150"> <frameset cols="50%,50%" rows="16%,84%"> 21. What is the meaning of SRC in frame tag? Source for image saved on your disk Source for images saved on your disk Source of page saved on your disk Source of Pages saved on your disk 22. In what form style rules are presented? selector { property= value } selector ( property: value ) selector { property: value } selector ( property= value ) 23. __________ is the code for blank space in HTML. &lsquo; &nbsp; &sbquo; &iexcl; 24. Which CSS property controls the text size? font-style font-size text-style text-size 25. Which HTML tag is used to define an internal (embedded) style sheet? CSS Text / Style Style Script 26. Meta Data is important for easier ____________. Web page creation Web site upload Web page search through search engine None of the above

27. Which HTML attribute is used to define inline styles?


Styles Text Style CSS

29. Which attribute can be used to make a region non-clickable? Alt Target nohref none of the given

31. With _________, you can display more than one Web page in the same browser window. Forms Frames Post Action Java Scripts 32. In CSS, how do you make the text bold? font:b font-size:bold font-weight:bold FTP Telnet none 33. Which of the following is used for web page requests? HTTP 34. Which of the following provides an interface & series for file transfer over the network? HTTP FTP Telnet None 35. __________________ connects a local computer with a remote computer. SMPT VPN Telnet none

36. Which of the followings provide e-mail services on the internet? MAC Telnet none 37. ________________ is connectionless transport protocol. SMPT SMPT TCP UDP MAC 38. ___________ is connection-oriented transport protocol. SMPT TCP UDP MAC 39. Public Key of the receiver is used to-------------------. a. Decrypt the message b. Encrypt the message c. Scramble the message d. None of the mentioned options 40. Receiver applies ----------------to the received original message Digital signature Message digest Hash function None of the mentioned options 41. Symmetric key can be replaced with----------------------------. Symmetric algorithms Pair of public and private keys Asymmetric key None of the mentioned options 43. Most of the electronic payment systems on internet use ------------------to ensure confidentiality and security of the payment information. Quantum computing Cryptography Both of the mentioned options None of the mentioned options 44. Simplicity and ----------------is the biggest advantage of Virtual PIN payment system. Full encryption Dual encryption No encryption None of the mentioned options 46. An electronic check book device is a combination of

Hardware and a digital signature Software and information about user Secure hardware and software None of the mentioned options 47. Which of the following is disadvantage of virtual PIN payment system? Bogus purchases are possible Stolen credit card number can be used Only some extra copies of the information items are made in case of a fraud All of the mentioned options are disadvantages of Virtual PIN payment system 48. FV stands for

Forward Virtual Famous virtual None of the mentioned options First Virtual 50. In the statement var myAr = new Array (60); what does the number 60 represent? The value assigned to the 1st element in the array The number of elements to be used in the array The number of dimensions created in a multi-dimensional arra All 51. Which of the following is the valid syntax for initialization of a string object? Var Girl = "salmanoreen" Girl = new string( "salmanoreen") Var Girl = new string( "salmanoreen") Var Girl = new Girl( "salmanoreen") 52. Identify that machine which services the internet request? Web client Web server Browser Mozilla
.

Question # 1 of 10 ( Start time: 04:52:38 PM ) Total Marks: 1 Poter Market and sell activities relates to _____________. Select correct option:

1. 2. 3. 4.

advertising, promotions managing salespersons monitoring distribution channel All of Above

Question # 2 of 10 ( Start time: 04:53:59 PM ) Total Marks: 1 Advantages of VAN in EDI are __________. Select correct option:

1. Time independence. 2. Protocol dependence.

Question # 3 of 10 ( Start time: 04:54:52 PM ) Total Marks: 1 In personal finance what is true? Select correct option:

1. 2. 3. 4.

online data is imported automatically into the register. transactions maintained by the software package. account/transaction details are downloaded through the internet. All of Above

Question # 4 of 10 ( Start time: 04:55:51 PM ) Total Marks: 1 Characterization and Clustering belong to which of the following types of Data Mining? Select correct option:

1. 2. 3. 4.

Predictive Selective Descriptive Additive

Question # 5 of 10 ( Start time: 04:57:00 PM ) Total Marks: 1 Poter Finance and administration activities relate to _____________. Select correct option:

1. accounting, paying bills and borrowing funds 2. purchasing and borrowing funds

Question # 6 of 10 ( Start time: 04:57:43 PM ) Total Marks: 1 What is true about Personal finance? Select correct option:

1. 2. 3. 4.

Sell you products in no time. Buy you products in no time. allows the management of your financial matters in a customized manner. None

Question # 7 of 10 ( Start time: 04:59:07 PM ) Total Marks: 1 Electronic Data Interchange Includes ________. Select correct option:

1. 2. 3. 4.

No paper work No human intervention Exchange of information takes place in seconds ALL Above

Question # 8 of 10 ( Start time: 05:00:11 PM ) Total Marks: 1 Three basic strategies for competitive advantage: __________. Select correct option:

1. 2. 3. 4.

Cost leadership Differentiation Focus All of Above

Question # 9 of 10 ( Start time: 05:01:08 PM ) Total Marks: 1 ___________ strategy is defined as concentration on a single aspect of the market. Select correct option:

1. Focus 2. Differentation Question # 10 of 10 ( Start time: 05:01:42 PM ) Total Marks: 1 VAN can _____. Select correct option:

1. Reduce network traffic 2. Provide protocol compatibility between the sender and the recipient, wherever that is missing. Question No: 1

Key version represents public key by Buyer Seller E-Bank Certification Authority
Ref: PAGE # 116 E-cash Coins The currency used in this payment system is called an e-cash coin or simply coin. A coin consists of three elements or parts - serial #, key version and serial no. signed by the secret or private key of a certain denomination of the e-cash bank. In other words, a coin of one dollar would consist of the following: Coin = Serial#, key version, {Serial #} SK banks $1 key Each coin has a unique value, partly minted by the client and partly by the e-cash bank.

Question No: 2 SSL stands for Secure Socket Layer Security Service Layer Sub Secured Length None of these
Ref: PAGE # 121 SECURE SOCKET LAYER (SSL) SSL is a protocol developed by Netscape Communications. SSL is built into many browsers. It operates at the TCP/IP layer of the OSI model, and uses a combination of symmetric and asymmetric cryptography.

Question No: 3 How many kinds of Web Portals are?

3 2 5 6
Ref: PAGE # 129 Portal Model Portals are the web sites which provide chance to the visitors to find almost everything in one place. Horizontalportals provide information about a very broad range of topics. Search engine is the example of a horizontal portal.Vertical portals provide information pertaining to a single area of interest. Community Portals such as those related to medical or legal profession are the examples of a vertical portal.

Question No: 4 Brick and Mortar refers to

Offline business Online business Transport Building


Ref: PAGE # 129

Brick-and-Mortar vs. Click-and-Mortar businesses These two terms refer to the offline and the online businesses, respectively. Where a company is doing its business both online and offline, there is often the problem of lack of proper integration between the two different channels of business. Note: Offline business = Brick-and-Mortar And Online Business = Click-and-Mortar businesses

Question No: 5 Digital Content Revenue Model Includes

Legal information services Online journals Online Libraries All of the above
Ref: PAGE # 130 Digital Content Revenue Model Web serves as a very efficient distribution mechanism of content. Therefore, one finds many ebusinesses that offer different types of information services such as legal information, corporate information, government information, news and resources for academic libraries etc. These services can be customized by an e-business for different firm sizes depending upon their needs and usage pattern. Normally, a customer has to subscribe to such services by paying certain amount as subscription fee. This fee becomes the main source of generating revenue for the e-business. Instead of subscription fee, a credit card charge option can be made available for infrequent users.Online journals, newspapers, libraries fall under this category

Question No: 6 Which of following marketing campaigns are cheap an effective way to target potential customers? Sale forces E-mail Media promotion Marketing software
Ref: PAGE # 133

E-MAIL MARKETING E-mail marketing campaigns are cheap and effective way to target potential customers.

Question No: 7 What does Telemarketing means?

Marketing through charting Marketing through telephone Marketing through email Marketing through web casting
Ref: PAGE # 133 Telemarketing Live interaction through telephone

Question No: 8 Which of following services build a strong customer loyalty towards company and its products?

Customer services Public relations(PR) Bulletin board Exhibitions.


Ref: PAGE # 136 One major goal of CRM is to establish a long-lasting relationship between a company and its customers. Good customerservices can help in building a sense of loyalty towards company and its products or services.

Question No: 9 Track the customers online and do personalization is only possible through which of the following file(s) analysis.

log files cookie data mining log files and cookies.


Ref: PAGE # 136 You know that cookies allow e-commerce sites to record visitor behavior. They can be used to track customers online and do personalization. Many customers do not know that their information is being collected and used by the e-business site.

Question No: 10 Which of the following is true for Class A: Network 01 byte and 03 hosts Network 02 bytes and 02 hosts Network 03 bytes and 01 host None of these
Ref: PAGE # 10 By rule, in class A networks first byte would refer to the network address and the remaining three bytesto the host machines on that network providing a very large network.

Question No: 11
What is the correct HTML for making a text input field?

<textinput type="text">

<input type="text">

<input type="textfield">

<textfield> Ref: PAGE # 27 First Name: <INPUT TYPE="TEXT" NAME="First">

Question No: 12 IIS stands for: International Information Service Internet Information Server Internet Information standards All of these
Ref: PAGE# 85 ASP We can discuss ASP a little more in detail. It runs best on IIS (Internet Information Server)which is freely available with Windows NT and Windows 2000.

Question No: 13 The payer and the payee are issued digital certificates in standard format by their respective banks. X. 509 F. 609 L.8999 N.586
Ref: PAGE # 101 Digital certificates These are the certificates in electronic form which establish whether or not a public key belongs to the purported owner.A digital certificate at least comprises a public key, certification information (name, ID etc.) and electronic signatures of a certification authority. Digital certificates are prepared according to a generally accepted format called X.509standard format.

Question No: 14 What is a E-Cash wallet ? Hardware

Agent Software All of the above


Ref: PAGE # 116 Buyers and merchants, both, have accounts in the E-cash bank. Buyers withdraw coins against their account and store them in e-cash wallet software (Cyber wallet) on their computer. Cyber wallet stores and manages coins and records every transaction.

Question No: 15 An E-cash coin consists of element (s) like: Serial # provided by client Key version Serial# signed by E-cash bank All of the above
Ref: PAGE # 116 Coin = Serial#, key version, {Serial #} SK banks $1 key

Question No: 16 What is Ultimate consumer orientation? Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. Secondary Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of supply chain. None of them
Ref: PAGE # 156 Supply chain and ultimate consumer orientation:

Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. This approach is called ultimate consumer orientation. In 1995, a company dealing in

the business of production of tiers in America adopted a different approach by shifting its focus on tire dealers from ultimate customers.

Question No: 17 Customer data can be gathered and analyzing it customers can be served in a better Manner according to their needs, which is best option? Customization Customer orientation Customer satisfaction Focus
Ref: PAGE # 157 Customization: With the help of EC, customer data can be gathered and analyzing it customers can be served in a better manner according to their needs. One can, thus, implement differentiation and focus strategy.

Question No: 18 A company ABC web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death in that culture. Which is the international barrier it is having? Culture Language Lack of trust Infrastructure
Ref: PAGE # 162 A web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death in that culture.

Question No: 19 Exclusive right granted by law to make, use and sell an invention. What is called? Parasites Trade mark Patent infringement Copyright
Ref: PAGE # 181 Patent infringement:

A patent is an exclusive right granted by law to make, use and sell an invention. In order to be patentable, the invention must be unique, genuine, and useful according to the prevalent technological standards.

Question No: 20 Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act. Which legal issue arises due to such acts? Cyber Crimes Online Defamation Cyber squatting None
Ref: PAGE # 182 Online Defamation: A defamatory statement is a false statement that injures the reputation of on another person or company. If a statement injures the reputation of a product or service instead of a person, it is called product disparagement.Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act.

Question No: 21 How can you reference part of a string? text.substr(5,6); text.part(5,6) text.piece(5,6) text.split(5,6);
Ref: PAGE # 70 String Object: In the following example, str and myArray are the instances of string and array objects, respectively. The size of the array is 10. Here, charAt() is the function/method of string object. So, charAt(3) would provide the value of the element at the index three. Different other functions of string object have also been used. In the example, str.Split(' ') splits the string on the basis of blank space. After splitting, we assign parts of the string as values for the array.

Question No: 22
One Tier Architecture __________. Select correct option:

The entire processing may take place at individual terminal. The entire processing may take place at different terminal. The entire processing may not take place at individual terminal. None of Above Ref: PAGE # 88 Client server architecture: Note that we may have different tiers in client server architecture depending on where the processing of data takes place. In 1-tier architecture, the entire processing takes place at a single place/zone.

Question No: 23 Following are the names of some well known e-commerce software, EXCEPT ----------- . Intershop IBM's WebSphere Commerce Professional Edition Microsoft Commerce Server 2002 Microsoft SQL Server 2005
Ref: PAGE # 93 E-commerce Software: Following are the names of some well-known e-commerce software: Intershop Enfinity IBMs WebSphere Commerce Professional Edition Microsoft Commerce Server 2002

Question No: 24 In Style Sheets, How do you change the font of an element? font-face: font: font-family: font-style:
Ref: PAGE # 43 Font family styles <HTML>

<HEAD> <TITLE>Style Sheets: Font Families</TITLE> <STYLE>

Question No: 25 A paper signature is believed to be more reliable than a digital signature. True False
Ref: PAGE # 106 A digital or electronic signature is believed to be more reliable as compared to paper signatures because it is not ordinarily possible to copy or forge an electronic/digital signature. But, that is very much possible in case of paper signatures.

Question No: 26 The serial # generated by the cyber wallet gets multiplied by blinding factor r which is known only to the ___________. Client Bank Merchant None of above
Ref: PAGE # 116 Cyberwallet generates a serial # and a blinding factor r. This blinding factor r is only known to the client. It is used in the following mathematical expression which is sent to the bank for signatures. Serial # . re2 (mod m)

Question No: 27 SET doesnt require special software on the client or merchant side. True False
Ref: PAGE # 122 Merchants must have special SET software to process transactions. Customers must have digital wallet software that stores certificates and card information.

Question No: 28 The result of OLAP is displayed in the form of a __________. Data square Data Triangle Data cube Data circle
Ref: PAGE # 145

Online Analytical Processing (OLAP): OLAP makes use of background knowledge regarding the domain of the data being studied in order to allow the presentation of data at different levels of abstraction. It is different form data mining in the sense that it does not provide any patterns for making predictions; rather the information stored in databases can be presented/ viewed in a convenient format in case of OLAP at different levels that facilitates decision makers or managers. The result of OLAP is displayed in the form of a data cube

Question No: 29 Classification and Association belong to which of the following types of Data Mining?
Selective Predictive Descriptive Additive Ref: PAGE # 145 Online Analytical Processing (OLAP): OLAP makes use of background knowledge regarding the domain of the data being studied in order to allow the presentation of data at different levels of abstraction. It is different form data mining in the sense that it does not provide any patterns for making predictions

Question No: 30 Which one of the following algorithms does not include in public key algorithms? DSS RSA Elliptic Curves RC4
Ref: PAGE # 108 Public Key Algorithms: Following is the list some popular public key algorithms:

DSS Digital Signature Standard based on DSA (Digital Standard Algorithm) key length is between 512-1024 bits RSA Elliptic Curves

Question No: 31 Four Ps in Marketing Mix are:

Product, price, place, promotion (Sure) Price, person, place, problem Place, product, property, promotion Promotion, place, product, planning

Question No: 32 JIT Stands for

Just In Time Joint investigation Technique Join in Training Just In Total Ref: PAGE # 147 For instance, packaging material should only be ordered for just in time (JIT) delivery

Question No: 33 Advertising Supported Revenue Model includes

Yahoo portal Employment sites Newspaper Publishers All of the above Ref: PAGE # 130

Advertising-Supported Revenue Model: In this model service/information is provided free of any charge to certain audience and the advertising revenue is sufficient to support the operation of the business and its cost. For example, Yahoo portal provides useful information and a search engine free of cost, but earns revenue through advertisements on its portal web site to bear the operational cost.

Question No: 34 Which of the following is true for Class A:

Network 01 byte and 03 hosts Network 02 bytes and 02 hosts Network 03 bytes and 01 host None of these Ref: PAGE # 10 By rule, in class A networks first byte would refer to the network address and the remaining three bytesto the host machines on that network providing a very large network.

Question No: 35 Which of the following needs human action to execute?

Virus Worm Trojan Horse All of these Ref: PAGE # 94 Viruses, on the other hand, need to be activated through a human action.

Question No: 36

In the digital signature technique, the sender of the message uses ________ to create cipher text

His or Her own symmetric key His or her own private key His or her own public key The receivers private key Ref: PAGE # 103 Then the sender adds his private key in the obtained message digest to create his digital signatures. This digitally singed message is received by the receiver, who applies the pubic key of the sender to decrypt the digital signature and reveal the message digest.

Question No: 37 PIN stands for:

Payment investigation Number Password Identification Number Personal Identification Number Personal Identification Numeric Ref: http://www.wsu.edu/~brians/errors/pin.html Those who object to PIN number on the grounds that the N in PIN stands for number in the phrasepersonal identification number are quite right, but it may be difficult to get people to say anything else. PIN was invented to meet the objection that a password consisting of nothing but numbers is not a word

Question No: 38 An electronic check contains a(n) to the payers bank to make a specified payment to the payee

Serial# Private key

Instruction All of the above Ref: PAGE # 113 Electronic Checks: Financial Services Technology Consortium (FSTC) is a group of U.S banks, research agencies and government organizations formed in 1993. It has introduced the concept of electronic checks. An electronic check contains aninstruction to the payers bank to make a specified payment to a payee.

Question No: 40 It is the ability to sell the goods or provide the service at a price that is lower than that of competitors, and thus attract more customers. What is called?

Cost leadership Price leadership Focus Differentiation Ref: PAGE # 157 Cost leadership: It is the ability to sell the goods or provide the service at a price that is lower than that of competitors, and thus attract more customers.

Question No: 41 E-commerce is a combination of three different areas of study, namely, --------, ---------------- and ---------------

Internal, external support, Support Technology, business and law/policy Primary, Secondary, R&D

Sale, purchase, feed back Ref: PAGE # 161 E-commerce is a combination of three different areas of study, namely, technology, business and law/policy. We have studied the technology and business side of e-commerce to a reasonably good extent.

Question No: 42 GM Celebes manufacturing electronic goods and FryChips co selling French fries. Under the traditional trade mark law both these companies can have the same trade mark/trade name such as frys. The problem arises when both apply for the registration of a domain name containing the word frys. Here, both are legitimate claimants of this domain name but due to the element of uniqueness of domain names only one of them can be assigned the desired domain name. Which legal issue arises in this situation?

Domain name conflict Cyber squatting Concurrent use None Ref: PAGE # 181 Concurrent use This problem arises when two organizations have apparently legitimate claim to use the same domain name but cannot do so due to the uniqueness of domain names. Suppose, there is a company manufacturing electronic goods and another company selling french fries. Under the traditional trade mark law both these companies can have the same trade mark/trade name such as frys. The problem arises when both apply for the registration of a domain name containing the word frys. Here, both are legitimate claimants of this domain name but due to the element of uniqueness of domain names only one of them can be assigned the desired domain name.

Question No: 43 Which type of Data Mining contains the elements as Support and confidence?

Classification

Association Characterization Clustering Ref: PAGE # 144 CONFIDENCE AND SUPPORT: There are two terms/measures used in association, that is, support and confidence. Confidence is a measure of how often the relationship holds true e.g, what percentage of time did people who bought milk also bought eggs.

Question No: 44 OLAP stands for

Online Analytical Program Online Analytical Processing Online Application Program Online Analysis Performance Ref: PAGE # 145 Online Analytical Processing (OLAP): OLAP makes use of background knowledge regarding the domain of the data being studied in order to allow the presentation of data at different levels of abstraction.

Question No: 45 Support activities in Value Chain model includes

Finance and Administration Human Resources Technology Development All of these Ref: PAGE # 152

Question No: 46 Which of the following is NOT processed on the client side?

Cookies JavaScript CGI scripts Applets Ref: PAGE # 82 CGI scripts: Term Common Gateway Interface (CGI) is defined as a standard method/protocol that allows data from forms to be used by programs on the server.

Question No: 47 Due to which characteristics, ATM network are covered under E-commerce ?

Exchange of information through computer networks (Doubt) Internet. Exchanging of products, services. None of the above.

Basically ATM works to Exchange of information through computer networks so in my point of view it will held in definition of e-commerce. Ref: PAGE # 2 E-Commerce definition:

Electronic commerce is an emerging concept that describes the process of buying and selling or exchanging of products, services and information via computer networks including the internet

Question No: 48 SET is better than SSL.

True False Ref: PAGE # 122 Secure Electronic Transaction (SET): The drawback in SSL that the credit card/debit card information remains with the merchant led to the development of a more sophisticated protocol called SET.

Question No: 49 Dividing market, with respect to people having income level greater than Rs 30000, is geographic segmentation.

True. False. Ref: PAGE # 131 Segments are defined in terms of demographic characteristics such as age, gender, marital status, income level

Question No: 50 Which of the following is NOT an identified behavioral mode of customers on the web?

Browsers Buyers Shoppers

Seller Ref: PAGE # 132 Behavioral segmentation Creation of separate experiences for customers based on their behavior is called behavioral segmentation. Three identified behavioral modes of the customers on the web are: Browsers customers who just browse through the site with no intention of buying Buyers customers who are ready to buy right away Shoppers customers who are motivated to buy but want more information

Question No: 51 Which of these is a way of conducting market research?

Phone. Interviews. Questionnaires. All of above. Ref: PAGE # 132 Marketing Research: It consists of interviews, paper and phone surveys, questionnaires, findings based on previous investigations etc. to find strengths and weaknesses of your business and the business of your competitors. It also includes the analysis of opportunities and threats to your business.

Question No: 52 Which of these is NOT a stage of knowledge discovery process?

Transformation

Data mining Pattern evaluation Process evaluation Ref: PAGE # 140 Knowledge discovery: A knowledge discovery process includes data cleaning, data integration, data selection, data transformation, data mining, pattern evaluation and knowledge presentation.

Question No: 53 According to Michael Porter, test marketing is an example of primary activity in a strategic business unit. Identify the area in which this task is performed.

Design Market and sell Deliver activities relate to storage Purchase materials and supplies Ref: PAGE # 152 Design activities take a product form concept stage to manufacturing stage. They include concept research, engineering, drawings preparation, test marketing etc.

Question No: 54 Electronic banking is also known as __________.

Cyber banking Virtual banking Online banking All of above Ref: PAGE # 150 Electronic Banking:

Electronic banking, also known as cyber banking, virtual banking, home banking and online banking, includes various banking activities conducted from home, business, or on the road, instead of at a physical bank location.

Question No: 55 Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Is it?

True False Ref: PAGE # 176 Civil law and criminal law. Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Civil wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general.

Question No: 56 In datalink layer, data packets are placed inside

Data frames Data boxes Data streams None of these Ref: PAGE # 6 Data link layer: It places data packets into data frames. Network Interface Card Drivers/Protocols operate at this layer. It is used to identify MAC or hardware address of computer machines.

Question No: 57 At deposit stage, the serial number is ..by E-Cashbank

Known Unknown Kept Secret Informed


Ref: PAGE # 118 Deposit Stage Serial no. (Known) Client (unknown)

Question No: 58 Let us, suppose that you have hosted your e-commerce website, When you provide opt-in e-mail option to your customers on your website and customer opt for it , what does it mean to receive ? Information about product through advertisement Information about product through e-mail Information about services available on it Information about News through e-mail.
Ref: PAGE # 133 Internet mailing lists can also be conveniently used to send targeted personalized emails. You can also provide the opt-in e-mail option to your customers on your web site. If they opt for it, this means that they want to receive through email any product information, offers or promotions etc.

Question No: 59 Track the customers online and do personalization is only possible through which of the following file(s) analysis.

log files cookie data mining log files and cookies.


Ref: PAGE # 136

You know that cookies allow e-commerce sites to record visitor behavior. They can be used to track customers online and do personalization. Many customers do not know that their information is being collected and used by the e-business site. Thus, informational privacy rights of customers can be breached in cases where cookies are used.

Question No: 60 When customer life cycle is used to create different groups of customers, it is called?

Targeting Customers Dynamic groups Customer Life Cycle Segmentation Group Development
Ref: PAGE #137 Life Cycle Segmentation: These five stages are also called customer life cycle. Using them to create groups of customers is called customer life-cycle segmentation. Segment information is useful for companies to develop better relationship with the customers. Companies, thus, know about their customers and their level of relationship with the company, and can customize their product/service.

Question No: 61 Network addresses 128--- 191 range belongs to which of the following class networks? A B C E
Ref: PAGE # 11 Examples Class A: 255.0.0.0 Class B: 255.255.0.0 Class C: 255.255.255.0

NOTE: in McQ 128--- 191 is not written after one dot it means they are separate from each other so it belong to A class.

Question No: 62 Which of the following property falls in HTTP?


Stateless Stateful Temporary All of these Ref: PAGE # 3 HTTP is stateless because in the fourth step the server breaks the connection. We can say, therefore:

Each operation or transaction makes a new connection Each operation is unaware of any other connection Each click is a new connection

Question No: 63 FSTC stands for:


Financial Services Technology Consortium Financial Secrets Technology Consortium Final Security threats control First Service Technology Consortium Ref: PAGE # 113 Financial Services Technology Consortium (FSTC) is a group of U.S banks, research agencies and government organizations formed in 1993. It has introduced the concept of electronic checks. An electronic check contains an instruction to the payers bank to make a specified payment to a payee.

Question No: 64 Supply chain can be broken into three parts, that is ----------------- , ----------------------- and ------------------- activities. Internal, external support Upstream, internal ,downstream

Primary, Secondary, R&D None of them


Ref: PAGE # 155 SUPPLY CHAIN: Supply chain includes all the activities associated with the flow and transformation of goods from the raw materials stage all the way to the end user. Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities

Upstream activities relate to materials/services or the input from suppliers Internal activities relate to manufacturing and packaging of goods Downstream activities relate to distribution and sale of goods to distributors/customers

Question No: 65 The process of taking active role in working with suppliers to improve products and processes is called? Value chain management Supply chain management Supply chain management software Porter Model
Ref: PAGE # 155 Supply chain management: Engaging and negotiating with suppliers can be extremely beneficial. The process of taking active role in working with suppliers to improve products and processes is called supply chain management.

Question No: 66 Many search engines rank the site by using a program called
Spider Scorpion Moon Cobweb Ref: PAGE # 138 Some search engines search the entire internet each time. Many search engines rank the site by using a program called spider which inspects the site before ranking.

Question No: 67 In which type of data mining, Apriori algorithms is used?

Classification Association Characterization Clustering


Ref: PAGE # 143 Association: Association analysis is the discovery of association rules showing attribute-value conditions that occur frequently together in a given set of data. It is widely used for market basket analysis. For example, where we are recording sales of a big shopping store in databases, then by applying association mining we may discover that certain items have a strong bondage or affinity with each other such that when one item is purchased the other is purchased, too.Apriori algorithm is used for association mining.

Question No: 68 EDI has the key feature(s) No paper work No human intervention Exchange of information takes place in seconds All of these
Ref: PAGE # 147 EDI include:

No paper work No human intervention Exchange of information takes place in seconds

Question No: 69 Addresses are tied to the device itself and give no clue to it's location on a global scale. This is the characteristics of IP RIP MAC None of the given
Ref: PAGE # 13 Media access control (MAC) address: Data to be delivered on a network has to be converted first into serial transmission. This is done through a devicecalled Network Interface Card (NIC) that must be installed in a computer on the

network. NIC has also got printed on it a 48 bits unique address called the MAC or hardware address of the computer machine. In other words, it consists of 12 hexadecimal characters and can have different format as shown Below: 090017A9B2EF 09:00:17:A9:B2:EF 09-00-17-A9-B2-EF

Whereas the IP address of a computer may change from time to time, its MAC address would remain the same unless the existing NIC is replaced with another. It can easily be inferred that there are 248 unique MAC addresses possible (which is an unimaginably high number). An organization called Institute of Electrical and Electronic Engineers (IEEE) administers the allocation of MAC addresses, worldwide. It ensures that there is no duplication of MAC addresses by the manufacturers of NICs.

Question No: 70 When two or more intranets are connected to each other they form a/an ------------- . intranet internet extranet VPN
Ref: PAGE # 98 VPN is the example of an extranet. You know that when two or more intranets are connected to each other they form an extranet. A manufacturing company thus can be connected to its suppliers of raw material and its distributors through VPN.

Question No: 71 ( Marks: 1 ) - Please choose one Which attribute can be used to make a region non-clickable? none of the given target alt nohref
Ref: PAGE # 37 <Area> tag attributes:

alt attribute is used to label the clickable region. Target attribute can be used to display result in a given frame.Nohref attribute can be used to make a region non-clickable. For example, <Area shape=circle coords=70,45,25 href=a.htm alt=a.htm target=upper nohref>

Question No: 72 Which of the following payment mode does not require customer to pay interest to the bank on each transaction? Credit card Debit card Electronic check All of the above
Ref: PAGE # 110 In case of a credit card the issuer bank charges interest from the client at a specified rate on the amount lent. On the other hand, in case of a debit card no such interest is payable since the customer uses his/her own money in that case.

Question No: 73 Cyber wallet can automatically assemble the correct payment and pay it too. True False
Ref: PAGE # 118 E-cash Purchase: Having received an order the merchant sends a payment request to the client in the following format: Payreq={currency,amount,timestamp,merchant_bank ID, merchant_accID, order description}

Cyber wallet automatically assembles the correct payment amount and pays.

Question No: 74 SET doesnt require special software on the client or merchant side. True False
Ref: PAGE # 122 Merchants must have special SET software to process transactions. Customers must have digital wallet software that stores certificates and card information.

Question No: 75 Which model allows the users to log-on on a website and assume the role of bidder or seller? Online Banking. Storefront Model. E-Learning. Auction Model
Ref: PAGE # 128 Auction Model: In this model there are auction sites to which the users can log-on and assume the role of a bidder or seller.

Question No: 76 Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Is it? True False
Ref: PAGE # 176 Civil law and criminal law. Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Civil wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general.

Question No: 77 In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, ---------------- and ---------Acceptance and consideration Acceptance and Rejection Approval and consideration None
Ref: PAGE # 178 Online contracts: In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, acceptance and consideration. The same three elements must also be present in case of a valid online contract.

Question No: 78 In online environment acceptances may be issued by an imposter/cheater that has authority to bind the online business

True False
Ref: PAGE # 178 In online environment acceptances may be issued by an imposter/cheater that does not have authority to bind the online business. To overcome this problem companies and individuals can use digital signatures to establish identity in online transactions.

Question No: 79 #00ff00 in HTML indicates Pure green color Pure blue color Pure red color Pure yellow color
Ref: PAGE # 23 <BODY bgcolor=Green text=white link=red> Instead of giving the color name as value of bgcolor one can also provide value in terms of a six digit code based on hexadecimal numbers called RGB values, e.g, #00FF00 refers to pure green color.

Question No: 80 Virtual PIN Payment System requires both merchant and buyer to register with _______________. Auto Clearing House (ACH) First Virtual (FV) DSS (Digital Signature Standard) DES (Data Encryption Standard)
Ref: PAGE # 110 Both merchants and buyers are required to register with First Virtual (FV). A buyer registering with FV forwards his or her credit card details and email address to FV and in exchange receives a pass phrase called, Virtual PIN.

Question No: 81 Identity that machine which services the internet request? Web Client Web Server Browser

Mozilla
Ref: PAGE # 2 Basic Definitions: Web client- machine that initiates internet request Web server machine that services internet request Browser - software at the client side to interact with web data Intranet an internal network of computers confined to a single place Extranet when two or more intranets are connected with each other, they form an Extranet e.g, Virtual Private Network Internet a global network of networks is defined as internet

Question No: 82 What does ETO stands for Electronic Transactions Ordinance Electric Transport ordinance Electronic Treaty Organization All
Ref: PAGE # 163 Electronic Transactions Ordinance, 2002 (ETO): ETO is the law introduced in 2002 which extends to the whole of Pakistan. It basically provides legal recognition to documents in electronic form and to electronic signatures. To understand this law, it would be useful to revise the concept related to the working of digital signature technology (refer to Lecture no. 23). We shall look at salient provisions/features of this law as it directly deals with e commerce in Pakistan. Section 2 of the ETO defines different terms used in it. For convenience these terms have been reproduced here (you do not need to memorize these for exam).

Question No: 83 Which one of the following algorithms does not include in symmetric key algorithms DES RC2 RC4 RSA
Ref: PAGE # 108 Following is the list of some popular symmetric key algorithms: DES (Data Encryption Standard) 56 bits

IDEA (International Data Encryption Algorithm (IDEA) 128 bits RC2 (block cipher) 1-2048 bits RC4 (stream cipher) 1-2048 bits Rinjdael 128-256 bits

Question No: 84 EFT stands for Electronic Funds Transfer Electronic Finance Transfer Easy Funds Transfer Early Funds Transaction
Ref: PAGE # 114 EFT stands for electronic funds transfer.

Question No: 85 Television, radio and print media are in a (n) . Mode Passive Active Static Dynamic
Ref: PAGE # 139 Emotional branding vs. rational branding: In case of television, radio or print media people are normally in a passive mode. To a greater extent they do not control the communication channel and thus have to listen or view the advertisement about a brand.

Question No: 86 Cipher suite is a combination of Cryptographic Algorithm Authentication methods Security layers Cryptographic Algorithm And Authentication methods
Ref: PAGE # 121 SSL Handshake:

SSL supports a variety of encryption algorithm and authentication methods. The combination of algorithms and methods is called a cipher suite. When a client connects to an SSL server, the SSL handshake begins, which means that the two negotiate a cipher suite selecting the strongest suite the two have in common.

Question No: 87 Which device uses the MAC address Switch Router Repeater None of these
Ref: PAGE # 15 & 16 A switch would read the MAC address on a data packet and match it with the list of MAC addresses of the user machines contained in it. It then sends data packets only to that machine on a VLAN to which these packets relate. But on PAGE 16 about router see below line Routers: Routers use a combination of hardware and software to forward data packets to their destination on the internet. They are more efficient and sophisticated than bridges and switches.

So my answer is Router

Question No: 88 Choose the correct HTML code line which left-align the content inside a tablecell. <td leftalign> <td valign="left"> <td align="left"> <tdleft>
Ref: PAGE # 26 Attributes for <TD> tag: Width - <td width=50%> specifies width of a cell with reference to the table width. Align - <td align=center> is used to align the text in a cell accordingly (you can also use left and right as values of align). Valign- <td valign=top> is used to vertically align the text in a cell (you can also use bottom or middle as values of valign).

Question No: 89 Which one of following illustrates relationship between "<! -->" and // ?

Closely related Hide the code Different Hide the tags Question No: 90 We can divide the Client Server architecture up to: 1 Tier 2 Tier 3 Tier N Tier
Ref: PAGE # 89 We can divide the client server architecture into n tiers.

Question No: 91 DSS stands for Digital Signature Standards Digital Support Standards Decision support system Digital Sign System
Ref: PAGE # 108 Following is the list some popular public key algorithms: DSS Digital Signature Standard based on DSA (Digital Standard Algorithm) key length is between 512-1024 bits

Question No: 92 Which one of the followings is an example of Banner advertising? Branding Affiliate programs Partnership All of these
Ref: PAGE # 138 Affiliate Programs:

An affiliate program is an agreement between two parties that one will pay the other a commission based on a specified customer action. It is not a strategic union as is partnership. Rather, it is for limited purpose and time. Banner advertising is the example of an affiliate program.

Question No: 93 A firm Glory Enterprise and it wants to have its web site. It also wants to have the word glory as a part of its domain name because for years it has been recognized in the physical world through this word. However, at the time of registration of its domain name it finds that a person Mr. A. who has nothing to do with the business of the firm or the word glory have already registered a domain name containing this word as a part of it. Since there cannot be two similar domain names, the firm is forced to request Mr. A to transfer that domain name to it. In response, if Mr. A blackmails or claims ransom from the said firm, He would be said to have committed -------------. Cyber squatting Parasites Patent infringement Trade mark and domain name conflicts
Ref: PAGE # 181 Cyber squatting: The act of intentionally registering domain names containing trademarks/trade names of prominent Companies to later blackmail or demand ransom from those companies is called cyber squatting. It is Regarded as an offence in most countries. Assume there is a firm Glory Enterprise and it wants to have its web site. It also wants to have the word glory as a part of its domain name because for years it has been recognized in the physical world through this word. However, at the time of registration of its domain name it finds that a person Mr. A who has nothing to do with the business of the firm or the word glory has already registered a domain name containing this word as a part of it. Since there cannot be two similar domain names, the firm is forced to request Mr. A to transfer that domain name to it. In response, if Mr. A blackmails or claims ransom from the said firm, he would be said to have committed cyber squatting.

Question No: 94 In which type of approach, we further dig the data for retrieving information from data warehouse? Slice Dice Drill down Roll up
Ref: PAGE # 146

Using drill-down we can further dig the data to receive some specific information. For example using that I can find the sale of furniture in a specific month of the first quarter, say, February. Roll-up is the reverse of drill-down.

Question No: 95 Which activity does not include in Primary Identify Customers Design Delivery Administration
Ref: PAGE # 152

Question No: 96 What of the following is the correct HTML tag for making a drop-down list? <input type="list"> <input type="dropdown"> <select> <list>
Ref: PAGE # 29 Selection lists: General format <select name=field name size=no. of items> between the <select> and </select> tags are the <option> and </option> tags which define the list items. If you omit size the list becomes a drop-down list. If size is two or more, the list becomes a rectangle with scroll bars for navigating the choices. Using Selected attribute an item is selected by default.

Question No: 97 What does HTML stand for? Hyperlinks and Text Markup Language Home Tool Markup Language Hyper Text Markup Language Homepage Text Making Language
Ref: PAGE # 18 Hypertext markup language: Web documents are defined by the Hypertext Markup Language (HTML). It is a language of tags. A tag is a special letter or key word enclosed in angular brackets.

Question No: 98 JavaScript variables can begin with ----------- . a lower case letter an underscore character a dollar sign all of the above
Ref: PAGE # 54 Rules for variables: Variable names can begin with an uppercase letter (A-Z), lower case letter (a-z), an underscore character (_), ordollar sign ($).

Question No: 99 A unique large number, generated as a result of applying hash function on a message is called ________. Hash message Message digest Digitally singed message Secret message
Ref: PAGE # 124 SET software on the customer side splits the order information from the account information. MDI is the message digest obtained by applying hash function on the order information.

Question No: 100 FVIPSS stands for _________.

First Virtual Internet Payment System Server First Virtual International Payment System Server First Virtual International Payment System Services First Virtual Internal Payment System Services
Ref: PAGE # 110 Merchant queries the FV Internet Payment System Server (FVIPSS) to confirm Virtual PIN

Question No: 101 Which currency is used in e-cash Payment system? Dollar Coin Penny Cent
Ref: PAGE # 116 Buyers and merchants, both, have accounts in the E-cash bank. Buyers withdraw coins against their account and store them in e-cash wallet software (Cyber wallet) on their computer.

Question No: 102 Web browser and client wallet are installed on __________. Client's computer Bank's computer Merchant's computer None of above
Ref: PAGE # 120 Client wallet and web browser are installed on the client machine.

Question No: 103 Job searchers can search for jobs and employers can hire effectively using..... Online recruiting web sites. Online banking web sites. Online trading and lending web sites. Online news services web sites.
Ref: PAGE # 128 Online Recruiting:

Employers can recruit and job searchers can search for jobs effectively through online recruiting web sites.

Question No: 104 According to Michael Porter, material handling is an example of primary activity in a strategic business unit. Identify the area in which this task is performed. Identify customers Market and sell Deliver activities relate to storage Purchase materials and supplies
Ref: PAGE # 105 Deliver activities relate to storage, distribution and shipment of final product, e.g, warehousing, selecting shippers, material handling, timely delivery to customers etc.

Question No: 105 IT/EC can reduce the overall ------------- and afford to keep the price of the product relatively low Production cost Marketing cost Distribution cost None
Ref: PAGE # 159 A business using IT/EC can reduce the overall production cost and afford to keep the price of the product relatively low.

Question No: 106 Law is broadly divided into two classes on the basis of nature of wrong, namely, --------- and ---------------

Civil law and criminal law ETO and criminal law Supreme and Civil Law None
Ref: PAGE # 176 Law is broadly divided into two classes on the basis of nature of wrong, namely, civil law and criminal law. Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer.

Question No: 107 Browser is installed at : Client side machine Web server machine none both Client and Server Machines Ref: PAGE # 120 Web browser are installed on the client machine.

Question No: 108 In Virtual Payment system, four kinds of information are provided to e-bank. Identify which one is NOT included:

Buyer Accounts identifier Buyer password Address of Merchant Actual amount of money in favor of merchant
Ref: PAGE # 112 To make payment an account holder is authenticated using an account identifier and a password, account identifier of the payee and the payment amount.

Question No: 109 To overcome the lack of physical proximity appearance problem in e-business, which technology is going to be used

Biometrics Video conferencing Cryptography Biometrics and Video conferencing


Ref: PAGE # 134 Video conferencing is an example of web casting. For example, using this technique, doctors sitting in China, Englandand Pakistan etc. can, in real time, exchange and benefit from each others ideas as if they are physically holding a meeting.

Question No: 110 Dividing the potential customers into groups is called Market Segmentation Market Promotion Market Research Market Survey Ref: PAGE # 131 Market Segmentation: Businesses need to identify specific portions of their markets in order to target them with specific advertising messages. The practice called market segmentation divides the potential customers into segments or groups.

Question No: 111 Traditionally Marketer use the market segmentation(s) like

Geo-graphic Segmentation Demographic Segmentation Psychographic Segmentation All of the above


Ref: PAGE # 131 Traditionally, marketers have used three types of variables to define three different market segmentations, namely,geographic segmentation, demographic segmentation and psychographic segmentation.

Question No: 112 In, there is no direct contact with the end users.

B2B B2C C2C All above options


Ref: PAGE # 137

Key difference between B2C and B2B is that in case of B2B there is no direct contact with the end users, whereas this contact exists in B2C. Thus, an e-business can have direct response or feedback from its customers in B2C as compared to B2B.

Question No: 113 Allocation of MAC addresses is administered by --------------------------

ICAAN ISO IEEE None


Ref: PAGE # 13 It can easily be inferred that there are 248 unique MAC addresses possible (which is an unimaginably high number). An organization called Institute of Electrical and Electronic Engineers (IEEE) administers the allocation of MAC addresses, worldwide. It ensures that there is no duplication of MAC addresses by the manufacturers of NICs.

Question No: 114 As a Web developer you can define a style sheet for?

HTML elements and apply to many Web pages. A HTML element and apply to single Web page. A HTML element and apply to many Web pages. HTML elements and apply to one Web page.
Ref: PAGE # 38 Style sheets: Style sheet instructions can be embedded in the HTML document. An advantage of applying style sheets is that definition of the styles formatting is created once and the browser applies that formatting each time the tag is used. Secondly, pages are easier to modify, that is, edit the style definition and all the places where the style is used within the page get updated automatically. Most popular type of style sheets is Cascading Style Sheets.

Question No: 115 What shall come in blanks for proper result,

Here blanks are numbered with 1,2 and 3

<html> <head> <SCRIPT language="JavaScript"> Var num1, var num2

Document.container .result.value=parseFloat(num1)-parseFloat(num2) </script> </head> <body> <FORM name=---------1-----------> <input type=----------2------- name=-------3--------- maxlength=5> </form> </body> </html>

container, text and result result, value and container container , button and value result, container and text

Question No: 116 What does XML stand for?

eXtra Modern Link X-Markup Language eXtensible Markup Language Example Markup Language
Ref: PAGE # 74 Extensible markup language: World Wide Web Consortium (W3C), a non-profit organization that maintains standards for the web presented the draft of XML in late 1990s.

Question No: 117

Cryptographic Algorithms are measured in terms of

Key length Complexity Simplicity All of the above


Ref: PAGE # 107 & 108 Key Length: A cryptographic key is represented as a string of binary digits 0s & 1s- inside a computer. & Cryptographic algorithms are measured in terms of key length.

Question No: 118 -----------means that your product/service has certain quality that makes it more attractive than the one offered by your competitor, despite the price of your competitors product/service is somewhat lower

Differentiation Focus Cost leadership None of them


Ref: PAGE # 157 Differentiation: Differentiation means that your product/service has certain quality that makes it more attractive than the one offered by your competitor, despite the price of your competitors product/service is somewhat lower.

Question No: 119 Characterization and Clustering belong to which of the following types of Data Mining?

Additive Predictive Selective Descriptive


Ref: PAGE # 141 Classification and association are predictive types of data mining while characterization and clustering represent the descriptive type.

Question No: 120 In which type of data mining, ID3 algorithms is used?

Classification Association Characterization Clustering


Ref: PAGE # 141 Classification: It allows you to have a predictive model labeling different samples to different classes. The results of this type of mining/model are represented as (if-then) rules, decision trees, neural networks etc. Two important algorithms used for this type are ID3 Algorithm, and Bayesian classification.

Question No: 121 ANSI stands for .

American National Standards Institute All Network Standards Institute American New standards Institute Australia National standards Institute
Ref: PAGE # 147 ANSI (American National Standards Institute)

Question No: 122 Who is making the Web standards?

International Standard Organization ANSI Microsoft The World Wide Web Consortium
Ref: PAGE # 74 World Wide Web Consortium (W3C), a non-profit organization that maintains standards for the web presented

Question No: 123 Which of following is NOT an attribute of <AREA> tag?

shape circle href cords


Ref: PAGE # 37 <Area shape=circle coords=70,45,25 href=a.htm alt=a.htm target=upper nohref>

Question No: 124 Which of the following is an advantage of symmetric algorithms?

Symmetric algorithms are faster Symmetric algorithms don't include any encryption Symmetric algorithms are slow in nature None of above
Ref: PAGE # 105 A symmetric key can also be used for encrypting a message instead of using the pair of public and private keys. The advantage of using symmetric key is that since symmetric algorithms are faster as compared to asymmetric, therefore, the encryption of a message with the symmetric key takes place quickly.

Question No: 125 What is the right sequence of steps in?

Payees bank Payers bank Payee Payer. Payers bank Payee Payees bank Payer. Payers bank Payees bank Payer Payee. Payer Payee Payees bank Payers bank.
Ref: PAGE # 113

Question No: 126 The key feature of E-Cash Payment system is __________.

Simplicity Anonymity Availability Connectivity


Ref: PAGE # 116 A company, DigiCash, has pioneered the use of electronic cash or e-cash. Anonymity of the buyer is the key feature of this system. There are three participants in it, namely, buyer, merchant and bank. Both, symmetric and asymmetric type of cryptography is used in this system.

Question No: 127 In storefront e-business model buyers and sellers interact ___________ with each other.

Directly. Indirectly. Through a third party.

None of above.
Ref: PAGE # 128 Storefront Model: It represents basic form of e-commerce where buyers and sellers interact directly.

Question No: 128 Customers grouped by variables such as social class, personality or approach to life or lifestyle, is called ___________.

Demographic Segmentation. Geographic Segmentation. Psychographic segmentation. Behavioral segmentation.


Ref: PAGE # 131 Psychographic segmentation: Here customers are grouped by variables such as social class, personality or approach to life or lifestyle.

Question No: 129 According to Michael Porter, material handling is an example of primary activity in a strategic business unit. Identify the area in which this task is performed.

Identify customers Market and sell Deliver activities relate to storage Purchase materials and supplies
Ref: PAGE # 152 Deliver activities relate to storage, distribution and shipment of final product, e.g, warehousing, selecting shippers, material handling, timely delivery to customers etc.

Question No: 130 According to Michael Porter, fabricating is an example of primary activity in a strategic business unit. Identify the area in which this task is performed.

Market and sell Deliver activities relate to storage Purchase materials and supplies Manufacture product or create service

Ref: PAGE # 152 Manufacture product or create service activities relate to transformation of materials and labor into finished products, e.g, fabricating, assembling, packaging etc.

Question No: 131 Web catalogue revenue model includes

Online sellers of computer Gifts, flowers, clothes Journals Both first & second options
Ref: PAGE # 130 Businesses using this type of a model include online sellers of computers, electronic items, books, music, videos, toys, flowers, gifts, clothes etc. Payment received from customers is the source of earning revenue.

Question No: 132 In which type of approach, we sum up and integrate the information in a particular dimension to show the result?

Dice Drill down Roll up Slice


Ref: PAGE # 146 Roll-up is the reverse of drill-down. In it we can sum-up or integrate the information in a particular dimension to show the result. For example the sale of furniture or computers in a particular year (rather than a specific quarter) can be viewed using roll-up.

Question No: 133 EDI used for ______.

Used by organizations for transactions that not occur on a regular basis according to a pre-determined format.

Used by organizations for transactions that occur on a regular basis according to a pre-determined format.

Both

NONE of Above Ref: PAGE # 147 ELECTRONIC DATA INTERCHANGE (EDI) EDI is used by organizations for transactions that occur on a regular basis according to a pre determined format.

Question No: 134 Supply Chain Mangment broken down into ___________.

Upstream activities

Internal activities

Downstream activities

All of Above Ref: PAGE # 155 SUPPLY CHAIN: Supply chain includes all the activities associated with the flow and transformation of goods from the raw materials stage all the way to the end user. Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities

Upstream activities relate to materials/services or the input from suppliers Internal activities relate to manufacturing and packaging of goods Downstream activities relate to distribution and sale of goods to distributors/customers

Question No: 135 Mailbox:

Outgoing messages can be placed.

Incoming messages can be picked up. Ref: PAGE # 148 Postbox: where outgoing messages are placed, and Mailbox: where incoming messages can be picked up

Question No: 136 In many countries, stealing and misusing of meta information for getting competitive advantage is considered as an offence known as

Tort of Private Nuisance

Tort of Tress passing

Tort of passing off

Defamation Ref: PAGE # 138 In many countries, stealing and misusing Meta information in this manner to gain business/competitive advantage is considered as an offence known as the tort of passing-off.

Question No: 137 Three basic strategies for competitive advantage: __________.

Cost leadership

Differentiation

Focus

All of Above Ref: PAGE # 157 Competitive Strategy: Ability of an organization to prosper arises from its competitive advantage over other organizations operating within its market sector. The strategy of a business to achieve this goal of competitive advantage is known as competitive strategy. Three basic strategies for competitive advantage are as under:

Cost leadership Differentiation Focus Question No: 138 Which of these is an algorithm used in clustering?

K-means

L-means

C-means

F-means Ref: PAGE # 145 K-means algorithm is normally used in clustering.

Question No: 139 Web is a(n).. Medium to disseminate information.

Passive

Active

Static

All of these Ref: PAGE # 139 Emotional appeals are difficult to covey on the internet because web is an active medium largely controlled by the customers

Question No: 140 Each VAN has a centralized computer system that maintains ______________.

One File

Two Files

Three Files

Four Files Ref: PAGE # 148 Each VAN has a centralized computer system that maintains two files for each user, that is, Postbox: where outgoing messages are placed, and Mailbox: where incoming messages can be picked up

Question No: 141 EDI Advantages inclues ______

Short time

Reduced Costs

Both

None of Above Ref: PAGE # 147 Instance, packaging material should only be ordered for just in time (JIT) delivery, so that E-Pens can cut down on its stock of packaging and reduce the inventory cost.

Question No: 142 Popular software packages for personal finance are ___________.

Quicken

MS Money

Money 2003

All of Above Ref: PAGE # 152 Popular software packages for personal finance are Quicken, MS Money and Money 2003 etc.

Question No: 143 Meta tag contains:

User information

Seller information

Web page key information

Bank information Ref: PAGE # 138 META INFORMATION: You know that a Meta tag contains the key information of a web page.

Question No: 144 Popular EDI standards are _______.

ANSI (American National Standards Institute) X12 standard

EDIFACT (United Nations Standard of Electronic Data Interchange for Administration, Commerce and Transport)

Both

None of Above REF: PAGE # 147 EDI documents are formatted using published standards. Two popular EDI standards are ANSI (American National Standards Institute) X 12 standards and EDIFACT (United Nations Standard of Electronic Data Interchange for Administration, Commerce and Transport).

Question No: 145 Technology development relates to activities ___________.

Fields tests

Maintenance of procedures

Process improvement studies

All of Above Ref: PAGE # 153 Technology development relates to activities which help improve product/service that a business is selling and also help improve processes in every primary activity, e.g., fields tests, maintenance of procedures, process improvement studies etc.

Question No: 146 Where there are quite a few erroneous or missing values in a row then that row can be deleted or discarded. This process is called...............

Data Deletion

Data Selection

Data Integration

Data Transformation Ref: PAGE # 141 Where there are quite a few erroneous or missing values in a row, then that row can be discarded/deleted altogether. This process is called data selection.

Question No: 147 Upstream activities of the Supply Chain Managment relate to ___________.

materials/services

The input from suppliers

Both

None of Above Ref: PAGE # 155 Upstream activities relate to materials/services or the input from suppliers

Question No: 148 Focus strategy means _____________________.

That ability to sell the goods or provide the service at a price that is lower than that of competitors

That your product/service has certain quality that makes it more attractive

That concentration on a single aspect of the market

Concentration on many aspect of the market Ref: PAGE # 157 Focus: Focus strategy is defined as concentration on a single aspect of the market. That single aspect can be a particular market segment or market area or product type.

Question No: 149 What is true about Personal finance?

Sell you products in no time.

Buy you products in no time.

Allows the management of your financial matters in a customized manner

None Ref: PAGE # 152

PERSONAL FINANCE ONLINE: Personal finance allows the management of your financial matters in a customized manner.

Question No: 150 What is true about ERP?

Integrate all business functions

At Single Location

Efficient use of resource

ALL Above Ref: PAGE # 93 Enterprise Resource Planning: Enterprise Resource Planning (ERP) is a concept that integrates all aspects of a business e.g, accounting, logistics, manufacturing, marketing, planning, project management etc. at a single place. An ERP system such as SAP is expensive.

Question No: 151 Supply Chain Managment can be broken down into ___________.

One Activity

Two Activities

Three Activities

Four Activties Ref: PAGE # 155


Upstream activities relate to materials/services or the input from suppliers Internal activities relate to manufacturing and packaging of goods Downstream activities relate to distribution and sale of goods to distributors/customers

Question No: 152 VAN Stands for ______.

Value Added Network

Value Added Noise Ref: PAGE # 148 Value Added Network (VAN): Value added networks are third party networks that provide services to execute authorized transactions with valid trading partners using EDI.

Question # 1
Advantages of VAN in EDI are ________. Select correct option: Time independence. Protocol dependence. Reference page 149 Advantages of VAN Two big advantages of using a VAN in EDI are time independence and protocol independence. Time independence means that the sending and receipt of the interchange or messages can be carried out at the convenience of the users involved. Thus, they are not required to be connected with each other at the same time. Protocol independence means that interchanges are re-enveloped with the transmission protocol appropriate to the recipient when they are retrieved from the postbox by the VAN. Thus, a VAN can provide protocol compatibility between the sender and the recipient, wherever that is missing.

Question #2 VAN Stands for ____. Select correct option: Value Added Network Value Added Noise www..net Reference: page 148 Value Added Network (VAN) Value added networks are third party networks that provide services to execute authorized transactions with valid trading partners using EDI. Each VAN has a centralized computer system that maintains two files for each user, that is, Postbox: where outgoing messages are placed, and Mailbox: where incoming messages can be picked up Question # 3 Web is a(n).. Medium to disseminate information. Select correct option: Passive Active Static All Question # 4 In which type of data mining, ID3 algorithms is used? Select correct option: Classification Association Characterization Clustering Reference: page 141 Classification It allows you to have a predictive model labeling different samples to different classes. The results of this type of mining/model are represented as (if-then) rules, decision trees, neural networks etc. Two important algorithms used for this type are ID3 Algorithm, and Bayesian classification. Decision tree is a graphical representation of the if-then rules. Fig. 3 below shows the result of classification in the form of a decision tree. Initially, the whole data is divided into two sets training data and test data. www..net Question # 5

In many countries, stealing and misusing of meta information for getting competitive advantage is considered as an offence known as Select correct option: Tort of Private Nuisance Tort of Tress passing Tort of passing off Defamation Reference: page 138 A business can improve its ranking on search engines by capitalizing upon the reputation of the business whose Meta information it actually is. In many countries, stealing and misusing Meta information in this manner to gain business/competitive advantage is considered as an offence known as the tort of passing-off. Defamation Question # 6 Which of these is NOT a stage of knowledge discovery process? Select correct option: Transformation Data mining Pattern evaluation Process evaluation Reference: page 140 Knowledge discovery A knowledge discovery process includes data cleaning, data integration, data selection, data transformation, data mining, pattern evaluation and knowledge presentation. www..net Question #7

Poter Market and sell activities relates to ___________. Select correct option: advertising, promotions managing salespersons monitoring distribution channel All of Above

Question #8

Human resources refer to the activities that coordinate ___________. Select correct option: management of employees recruiting hiring, compensation and benefits All of Above Reference: page 153 Human resources refer to the activities that coordinate management of employees, e.g, recruiting, hiring, compensation and benefits etc. www..net Question #9 EDI used for ____. Select correct option: used by organizations for transactions that not occur on a regular basis according to a pre-determined format. used by organizations for transactions that occur on a regular basis according to a pre-determined format. Both NONE of Above Reference: page 147 EDI is used by organizations for transactions that occur on a regular basis according to a pre-determined format. It involves exchange of electronic business documents, i.e., purchase orders, invoices etc. EDI transactions are carried through special EDI software. This technology was popularly used before the introduction of e-commerce by different trading partners on private electronic networks. Key features of EDI include: No paper work No human intervention Exchange of information takes place in seconds Question #10 Strategic business unit is a combination of a particular ___________. Select correct option: product distribution channel customer type All of Above Reference page 152 strategic business unit undertakes to design, produce, promote, market, deliver and support the products or services it sells.

www..net Question #11 VAN can ___. Select correct option: Reduce network traffic Provide protocol compatibility between the sender and the recipient, wherever that is missing. Reference: page 147 Advantages of VAN Two big advantages of using a VAN in EDI are time independence and protocol independence. Time independence means that the sending and receipt of the interchange or messages can be carried out at the convenience of the users involved. Thus, they are not required to be connected with each other at the same time. Protocol independence means that interchanges are re-enveloped with the transmission protocol appropriate to the recipient when they are retrieved from the postbox by the VAN. Thus, Van can provide protocol compatibility between the sender and the recipient, wherever that dismissing.

Question #12 Poter Finance and administration activities relate to ___________. Select correct option: accounting, paying bills and borrowing funds purchasing and borrowing funds Finance and administration activities relate to accounting, paying bills, borrowing funds and complying with government regulations etc. Question # 13 Characterization and Clustering belong to which of the following types of Data Mining? Select correct option: Predictive Selective Descriptive Additive Reference: page 141 Classification and association are predictive types of data mining while characterization and clustering represent the descriptive type. Question #14

Consider the following definition template < class T > class Xyz { }; Select correct option: it defines a class template for integers only it defines a class template for any class class templates are not defined in this way none of given options www..net Question #15 Technology development relates to activities _________. Select correct option: fields tests maintenance of procedures process improvement studies All of Above Reference: page 153 Technology development relates to activities which help improve product/service that a business is selling and also help improve processes in every primary activity, e.g, fields tests, maintenance of procedures, process improvement studies etc. Question #16 The process of taking active role in working with suppliers to improve products and processes is called____________. Select correct option: ERP Marketing Supply Chain Management Sale Reference: page 155 Supply chain management Engaging and negotiating with suppliers can be extremely beneficial. The process of taking active role in working with suppliers to improve products and processes is called supply chain management. Question # 17 What is true about ERP? Select correct option: Integrate all business functions At Single Location Efficient use of resource ALL Above Reference: page 150

Enterprise Resource Planning (ERP) ERP is an approach that attempts to integrate all departments and functions across a company onto a single computer system that can serve all those different departments' particular needs. For example, finance, manufacturing and the warehouse department of a company may have their own software to perform tasks specific to each one of them. However, each software can be linked together so that a customer service representative can see the credit rating of a customer from finance module, warehouse information from warehouse module, and shipment information from the shipment module. SAP is an example of ERP software. ERP is complex. It is not intended for public consumption as properintegration of ERP with e-commerce applications is still a major problem. Question # 18 Each VAN has a centralized computer system that maintains ____________. Select correct option: One File Two Files Three Files Four Files

www..net Reference: page 148 Value Added Network (VAN) Value added networks are third party networks that provide services to execute authorized transactions with valid trading partners using EDI. Each VAN has a centralized computer system that maintains two files for each user, that is, Postbox: where outgoing messages are placed, and Mailbox: where incoming messages can be picked up Question #19 _________ strategy is defined as concentration on a single aspect of the market. Select correct option: Focus Differentiation Reference: page 157 Focus Focus strategy is defined as concentration on a single aspect of the market. That single aspect can be particular market segment or market area or product type. For example, if my competitors are focusing indifferent market areas, I may, on the other hand, plan that I can be more profitable by concentrating on one particular area. It may be a particular province or a city etc. where I may have a better distribution channel.

Question # 20 Survey and market research are used for which poetr identified activity? Select correct option: Identify Design Identify customer Reference: page 152 Identify customers refer to those activities which try to find new customers and ways to serve better to the existing ones, e.g, surveys and market research; Design activities take a product form concept stage to manufacturing stage. They include concept research, engineering, drawings preparation, test marketing etc..

Question # 21 Internal activities of the Supply Chain Management relate to ________________. Select correct option: manufacturing packaging of goods Both NONE of Above Reference: page 155 SUPPLY CHAIN Supply chain includes all the activities associated with the flow and transformation of goods from the raw materials stage all the way to the end user. Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities. Upstream activities relate to materials/services or the input from suppliers Internal activities relate to manufacturing and packaging of goods Downstream activities relate to distribution and sale of goods to distributors/customers Question #22 Upstream activities of the Supply Chain Managment relate to _________. Select correct option: materials/services the input from suppliers Both None of Above Reference: page Supply chain includes all the activities associated with the flow and transformation of goods from the raw

materials stage all the way to the end user. Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities. Upstream activities relate to materials/services or the input from suppliers Internal activities relate to manufacturing and packaging of goods Downstream activities relate to distribution and sale of goods to distributors/customers www..net Question #23 Ability of an organization to prosper arises from its competitive advantage over other organizations operating within its market sector: _________. Select correct option: Differentation Focus Competitive Startegy None Reference: page 157 Competitive Strategy Ability of an organization to prosper arises from its competitive advantage over other organizations operating within its market sector. The strategy of a business to achieve this goal of competitive advantage is known as competitive strategy. Three basic strategies for competitive advantage are as under:

Activities associated with the flow and transformation of goods from the raw materials stage all theQuestion #24 way to the end user _________. Select correct option: Marketing Supply Chain Management ERP Reference: page 93 Supply Chain Management (SCM) Software Supply chain involves all activities associated with flow and transformation of goods from raw material stage to the finished stage and their supply to the end users. Supply chain management software helps companies to coordinate planning and operations with their partners in industry. SCM planning software helps companies develop demand forecasts using information from each player in supply chain. SCM execution software helps with tasks such as the management of warehouses and transportation facilities.

Question #25 Where there are quite a few erroneous or missing values in a row then that row can be deleted or discarded. This process is called............... Select correct option: Data Deletion Data Selection Data Integration Data Transformation www..net Reference: page 141 Where there are quite a few erroneous or missing values in a row, then that row can be discarded/deleted altogether. This process iscalled data selection. In data transformation, the data from all different sources is converted into the same format.. Question #26 Poter identify certain activities what is the name of activity which take a product from concept stage to manufacturing stage. Select correct option: Market Stage Human Resource Design Stage None of Above Design activities take a product form concept stage to manufacturing stage. They include concept research, engineering, drawings preparation, test marketing etc. Question #27 The result of OLAP is displayed in the form of a ________. Select correct option: Data square Data Triangle Data cube Data circle Reference: page 145 Online Analytical Processing (OLAP) OLAP makes use of background knowledge regarding the domain of the data being studied in order to allow the presentation of data at different levels of abstraction. It is different form data mining in the sense that it does not provide any patterns for making predictions; rather the information stored in

databases can be presented/ viewed in a convenient format in case of OLAP at different levels that facilitates decision makers or managers. The result of OLAP is displayed in the form of a data cube Question #26 Television, radio and print media are in a (n) . Mode. Select correct option: Passive Active Static Dynamic www..net Question #27 EDI involves exchange of ______. Select correct option: Electronic business documents Data Resources NONE of Above Reference: page 146 EDI is used by organizations for transactions that occur on a regular basis according to a pre-determined format. It involves exchange of electronic business documents, i.e., purchase orders, invoices etc.EDI transactions are carried through special EDI software. This technology was popularly used before the introduction of e-commerce by different trading partners on private electronic networks. Question #28 In personal finance what is true? Select correct option: online data is imported automatically into the register. transactions maintained by the software package. account/transaction details are downloaded through the internet. All of Above Reference: page 152 PERSONAL FINANCE ONLINE Personal finance allows the management of your financial matters in a customized manner. For example, tax calculations or financial budgeting can be done through personal finance software. Popular software packages for personal finance are Quicken, MS Money and Money 2003 etc. In personal finance online data is imported automatically into the register of transactions maintained by the software package as the account/transaction details are downloaded through the internet. This information can then systematically be used to calculate taxes or prepare a budget for certain activities.

Question #29 Mailbox: Select correct option: Outgoing messages can be placed. Incoming messages can be picked up. Reference: Page 148 Postbox: where outgoing messages are placed, and Mailbox: where incoming messages can be picked up Question # 30 Which of these is an algorithm used in clustering? K-means L-means C-means F-means Reference: page 145 K-means algorithm is normally used in clustering. www..net Question # 31 Many search engines rank the site by using a program called Spider Scorpion Moon Cobweb Reference: page 138 Many search engines rank the site by using a program called spider which inspects the site before ranking. Question # 32 Popular EDI standards are _______. ANSI(American National Standards Institute) X12 standard .

EDIFACT (United Nations Standard of Electronic Data Interchange for Administration, Commerce and Transport). Both None of Above Reference: page 147 EDI documents are formatted using published standards. Two popular EDI standards are - ANSI (American National Standards Institute) X12 standard and EDIFACT (United Nations Standard of Electronic Data Interchange for Administration, Commerce and Transport). Question #33 SWOT used for _______________. Strategic Planning Short Term Planning Long Term Planning None of Above SWOT (strengths, weaknesses, opportunities and threats) analysis In SWOT analysis, an analyst first looks into the business unit to identify its strengths and weaknesses then looks into the environment in which the business operates and identifies opportunities and threatspresented by such environment. What is true about ERP? Select correct option: Integrate all business functions At Single Location Efficient use of resource ALL Above Enterprise Resource Planning (ERP) is a concept that integrates all aspects of a business e.g, accounting, logistics, manufacturing, marketing, planning, project management etc. at a single place

The process of taking active role in working with suppliers to improve products and processes is called ______________.

Select correct option: ERP Marketing Supply Chain Management Sale Engaging and negotiating with suppliers can be extremely beneficial. The process of taking active role in working with suppliers to improve products and processes is called supply chain management. Today, firms are reaching beyond limits of their own organizational structure

Consider the following definition template < class T > class Xyz { };

Select correct option: it defines a class template for integers only it defines a class template for any class class templates are not defined in this way***** none of given options

Question # 1 of 10 ( Start time: 11:41:47 AM ) Total Marks: 1 EDI involves exchange of ________. Select correct option: Electronic business documents Data Resources NONE of Above

EDI is used by organizations for transactions that occur on a regular basis according to a pre-determined format. It involves exchange of electronic business documents, i.e., purchase orders, invoices etc. EDI transactions are carried through special EDI software

Question # 6 of 10 ( Start time: 11:46:36 AM ) Total Marks: 1 Survey and market research are used for which poetr identified activity? Select correct option: Identify Design**** I was select Identify customer Identify customers refer to those activities which try to find new customers and ways to serve better to the existing ones, e.g, surveys and market research; Question # 5 of 10 ( Start time: 11:45:11 AM ) Total Marks: 1 In which type of approach, we further dig the data for retrieving information from data warehouse? Select correct option: Slice Dice Drill down Roll up Using drill-down we can further dig the data to receive some specific information. For example using that I can find the sale of furniture in a specific month of the first quarter, say, February

Question # 2 of 10 ( Start time: 11:42:39 AM ) Total Marks: 1

Supply Chain Mangment broken down into ___________. Select correct option: Upstream activities Internal activities Downstream activities All of Above Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities

Question # 8 of 10 ( Start time: 11:48:11 AM ) Total Marks: 1 Poter Market and sell activities relates to _____________. Select correct option: advertising, promotions managing salespersons monitoring distribution channel All of Above Market and sell activities give buyers a way to purchase and provide inducement for them to do so , e.g, advertising, promotions, managing salespersons, monitoring distribution channel, pricing etc. ==========done VAN can _____. Select correct option: Reduce network traffic Provide protocol compatibility between the sender and the recipient, wherever that is missing.

Question # 2 of 10 ( Start time: 10:25:45 AM ) Total Marks: 1 What is true about Personal finance? Select correct option: Sell you products in no time. Buy you products in no time. allows the management of your financial matters in a customized manner. None Question # 3 of 10 ( Start time: 10:26:36 AM ) Total Marks: 1 A value chain is a way of organizing activities that each strategic business unit undertakes to ___________. Select correct option: design produce promote All of Above A value chain is a way of organizing activities that each strategic business unit undertakes to design, produce, promote, market, deliver and support the products or services it sells.

Question # 4 of 10 ( Start time: 10:27:47 AM ) Total Marks: 1 Activities associated with the flow and transformation of goods from the raw materials stage all the way to the end user ___________. Select correct option: Marketing

Suply Chain Managment ERP Online Chain Control Supply chain includes all the activities associated with the flow and transformation of goods from the raw materials stage all the way to the end user. Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities.

Question # 5 of 10 ( Start time: 10:28:35 AM ) Total Marks: 1 Porter Market and sell activities relates to _____________. Select correct option: advertising, promotions managing salespersons monitoring distribution channel All of Above Market and sell activities give buyers a way to purchase and provide inducement for them to do so, e.g, advertising, promotions, managing salespersons, monitoring distribution channel, pricing etc. Page 152

Question # 6 of 10 ( Start time: 10:29:59 AM ) Total Marks: 1 Technology development relates to activities ___________. Select correct option: fields tests maintenance of procedures process improvement studies All of Above

Technology development relates to activities which help improve product/service that a business is selling and also help improve processes in every primary activity, e.g, fields tests, maintenance of procedures, process improvement studies etc.

In personal finance what is true? Select correct option: online data is imported automatically into the register. transactions maintained by the software package. account/transaction details are downloaded through the internet. All of Above In personal finance online data is imported automatically into the register of transactions maintained by the software package as the account/transaction details are downloaded through the internet.

Question # 8 of 10 ( Start time: 10:31:35 AM ) Total Marks: 1 ___________ strategy is defined as concentration on a single aspect of the market. Select correct option: Focus Differentation Focus strategy is defined as concentration on a single aspect of the market.

Question # 9 of 10 ( Start time: 10:32:02 AM ) Total Marks: 1 Popular software packages for personal finance are ___________.

Select correct option: Quicken MS Money Money 2003 All of Above

Question # 10 of 10 ( Start time: 10:32:57 AM ) Total Marks: 1 Which of these is NOT a stage of knowledge discovery process? Select correct option: Transformation Data mining Pattern evaluation Process evaluation A knowledge discovery process includes data cleaning, data integration, data selection, data transformation, data mining, pattern evaluation and knowledge presentation.

Total Marks: 1

Strategic business unit is a combination of a particular _____________. Select correct option: product distribution channel customer type All of Above A strategic business unit is a combination of a particular product, distribution channel and customer type.

1) In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT included: Select correct option: Buyer Accounts identifier Buyer password Address of Merchant Actual amount of money in favor of merchant

2) By adding which of the following to your website improve customer service? Select correct option: Attractive products Banner Advertisement Email links Interactive Advertising

Reference: E-mails can be used to improve customer service by adding an e-mail link to your web site. Thus, you can receive your customers complaints through e-mails. It should be ensured that your e-business is capable of

3) Objective of any marketing strategy is to bring the customers quickly to the _________. Select correct option: Familiarity stage Exploration stage Separation stage Commitment stage

4) Which of these is a tool that can be used to improve customer services? Select correct option: Log file analysis Cookies Data mining All

5) How many stages involve in customer loyalty model for creating good customer relationship? Select correct option: 6 5 4 3 www..net 6) Call handling, sales tracking and Transaction support(technology / personnel) activities are included in which management system Select correct option: Customer Relationship Management system Public relation management system Inventory management system Data Base Management system

7) You read about a company X in newspaper. Your relation with company X is at familiarity stage. Select correct option: True False

8) JIT Stands for Select correct option: Just In Time Joint investigation Technique Join in Training Just In Total

9) Let us, suppose that you have hosted early your e-commerce website to sell sweets online: Your customers are acquaint with the name of your company and DesiGhee Burfi . They have never interacted with your company. Which of following loyalty stages they are? Select correct option: Awareness Exploration Familiarity Commitment

Reference: Awareness This is the first stage where customers recognize the name of the company or any of its products. However, they have never interacted with the company before. A company/business can achieve this level by properly advertising its brand.

10) ET and SSL both are same with respect to security. Select correct option: True False

11) Which statement is most appropriate description of the term Interactive-advertisement? Select correct option: By making an advertisement message using flash animation. Putting an audio or video message on the website to attract customer. By avoiding customers involvement in the advertisement process. By involving the customer in the advertisement process itself.

12) Quiz Start Time: 04:28 PM Time Left 88 sec(s) Question # 1 of 10 ( Start time: 04:28:31 PM ) Total Marks: 1 Four Ps in Marketing Mix are Select correct option: Product, price, place, promotion Price, person, place, problem Place, product, property, promotion Promotion, place, product, planning

13) Quiz Start Time: 04:28 PM Time Left 87 sec(s) Question # 2 of 10 ( Start time: 04:29:03 PM ) Total Marks: 1 Let us, suppose that you have hosted your e-commerce website, When you provide opt-in e-mail

option to your customers on your website and customer opt for it , what does it mean to receive ? Select correct option: Information about product through advertisement Information about product through e-mail Information about services available on it Information about News through e-mail.

14) Quiz Start Time: 04:28 PM Time Left 83 sec(s) Question # 3 of 10 ( Start time: 04:30:16 PM ) Total Marks: 1 How many stages involve in customer loyalty model for creating good customer relationship? Select correct option: 6 5 4 3 www..net 15) Quiz Start Time: 04:28 PM Time Left 86 sec(s) Question # 4 of 10 ( Start time: 04:30:55 PM ) Total Marks: 1 Free-Trial advertisement means _________. Select correct option: Free coupons are placed on certain websites for customers so that they can use it for shopping. Customer is offered to use the product free of cost for a specific amount of time. Items bought are delivered to the customers with no delivery cost. The company didnt had to pay for this advertisement

16) Quiz Start Time: 04:28 PM Time Left 87 sec(s) Question # 5 of 10 ( Start time: 04:31:46 PM ) Total Marks: 1 What is the right sequence of steps involved in development of customers relationship with the business? Select correct option: Familiarity, Awareness, Commitment, Exploration, Separation Awareness, Exploration, Familiarity, Commitment, Separation Familiarity, Awareness, Exploration, Commitment, Separation Awareness, Commitment, Familiarity, Exploration, Separation

17) Quiz Start Time: 04:28 PM Time Left 87 sec(s) Question # 6 of 10 ( Start time: 04:33:04 PM ) Total Marks: 1 SETSET(secure Electronic Transaction) was developed in Select correct option: 1995 1996 1997 1999

18) Quiz Start Time: 04:28 PM Time Left 86 sec(s) Question # 7 of 10 ( Start time: 04:34:49 PM ) Total Marks: 1 Some web retailers allow their customers to create their own product. It is called. Select correct option: One to one Marketing One to many Marketing Many to one marketing All of the above

Reference: Some web retailers allow their customers to create their own product. For example there are computer companies online that allow their customers to choose component of a computer to configure their own computer according to their need. This is called one-to-one marketing.

19) Quiz Start Time: 04:28 PM Time Left 84 sec(s) Question # 8 of 10 ( Start time: 04:35:40 PM ) Total Marks: 1 Vertical Web portals are made for Select correct option: Single area Broad range of topics Wide variety of things Broad range of topics and Wide variety of things

20) Quiz Start Time: 04:28 PM Time Left 86 sec(s) Question # 9 of 10 ( Start time: 04:36:45 PM ) Total Marks: 1 Which of following services build a strong customer loyalty towards company and its products? Select correct option: Customer services Public relations(PR) Bulletin board Exhibitions

21) Question # 1 of 10 ( Start time: 04:42:31 PM ) Total Marks: 1 To overcome the lack of physical proximity appearance problem in e-business, which technology is going to be used? Select correct option: Biometrics Video conferencing Cryptography Biometrics and Video conferencing

22) Question # 2 of 10 ( Start time: 04:44:07 PM ) Total Marks: 1 Using SSL, we type in URL as : Select correct option: www..net https httpc httpc httpi

23) Question # 3 of 10 ( Start time: 04:45:14 PM ) Total Marks: 1 CRM stands for ............... Select correct option: Customer Relationship Management Customer Related Management Customer Resembling Management Customer Reallocation Managemen

24) Question # 4 of 10 ( Start time: 04:45:41 PM ) Total Marks: 1 SET and SSL both are same with respect to security.

Select correct option: True False

25) Question # 5 of 10 ( Start time: 04:46:11 PM ) Total Marks: 1 In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT included: Select correct option: Buyer Accounts identifier Buyer password Address of Merchant Actual amount of money in favor of merchant

26) Question # 6 of 10 ( Start time: 04:46:42 PM ) Total Marks: 1 Which of following services build a strong customer loyalty towards company and its products? Select correct option: Customer services Public relations(PR) Bulletin board Exhibitions.

27) Question # 7 of 10 ( Start time: 04:47:35 PM ) Total Marks: 1 Which of following marketing campaigns are cheap an effective way to target potential customers? Select correct option: Sale forces E-mail Media promotion Marketing software

28) Question # 8 of 10 ( Start time: 04:48:20 PM ) Total Marks: 1 Free-Trial advertisement means _________. Select correct option: Free coupons are placed on certain websites for customers so that they can use it for shopping. Customer is offered to use the product free of cost for a specific amount of time.

Items bought are delivered to the customers with no delivery cost. The company didnt had to pay for this advertisement.

29) Question # 9 of 10 ( Start time: 04:48:59 PM ) Total Marks: 1 Which of the following option best represent Data mining can improve response rate tremendously? Select correct option: Direct mailing Personalization technology E-business Opt-in e-mail

30) Question # 10 of 10 ( Start time: 04:50:29 PM ) Total Marks: 1 CPM is an advertising payment mode. CPM stands for ______. Select correct option: Cost Per Month Cost Per Minute Cost Per Megabyte Cost Per Message

31) Which statement is most appropriate description of the term Interactive-advertisement? Select correct option: By making an advertisement message using flash animation. Putting an audio or video message on the website to attract customer. By avoiding customers involvement in the advertisement process. By involving the customer in the advertisement process itself.

32) What does Telemarketing means? Select correct option: Marketing through charting Marketing through telephone Marketing through emai Marketing through web casting

33) What is the right sequence of steps involved in development of customers relationship with the business? Select correct option: Familiarity, Awareness, Commitment, Exploration, Separation Awareness, Exploration, Familiarity, Commitment, Separation Familiarity, Awareness, Exploration, Commitment, Separation Awareness, Commitment, Familiarity, Exploration, Separation

34) www.amzon.com as you all familiar with it. Which of the following loyalty stages its customers are: ( Who dont know about it): Detail about amzon.com Amazon was one of the first major companies to sell goods by Internet, and was an iconic "stock in which to invest" of the late 1990s dot-com bubble. Jeff Bezos founded Amazon.com, Inc. in 1994, and launched it online in 1995. Amazon.com started as an online bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3 format, computer software, , etc. Amazon has established separate websites in Canada, the United Kingdom, Germany, France, China, andJapan. It also provides global shipping to certain countries for some of its products. Select correct option: Awareness Exploration Familiarity Commitment

35) Web catalogue revenue model includes Select correct option: a. Online sellers of computer b. Gifts, flowers, clothes c. Journals d. A and B

36) Track the customers online and do personalization is only possible through which of the following file(s) analysis. Select correct option: log files cookie data mining log files and cookies.

Reference: Cookies can be used to track customers online. Typically, a unique ID of the customer is stored in the cookie file on the hard disk. Same ID is also stored in the database along with the record of previously purchased items by the customer. When the customer again visits the online store, cookie (having customer ID prepared against that URL) is transmitted by the browser to the server side. There, it is matched with the ID in the database. This enables the merchant side to know that a particular customer (with a known buying pattern) has come to visit again. By tracking the customer in this manner, personalized recommendations for certain items can be made to the customer in real time.

37) In the template prefix, Template<class T> What kind of variable is the parameter T? Select correct option: T must be a class. T must not be a class. T can be only types built into the C++ language. (Not sure L) T can be any type, whether built into C++ or defined by the programmer.

38) Fee for Transaction Models include Select correct option: Travel Agents and Insurance brokers Automobile Sales and event tickets Stock brokers and online banking All of the above

39) While designing a website, which of the following factors an internet marketer should pay attention to? Select correct option: Easy site navigation (i.e. Site map) Frequently asked questions (FAQs) section Privacy policy All of above

40) Question # 1 of 10 ( Start time: 05:17:27 PM ) Total Marks: 1 Four Ps in Marketing Mix are Select correct option:

Product, price, place, promotion Price, person, place, problem Place, product, property, promotion Promotion, place, product, planning

41) Question # 2 of 10 ( Start time: 05:17:43 PM ) Total Marks: 1 In, there is no direct contact with the end users Select correct option: B2B B2C C2C All

42) Question # 3 of 10 ( Start time: 05:18:01 PM ) Total Marks: 1 What is the right sequence of steps involved in development of customers relationship with the business? Select correct option: Familiarity, Awareness, Commitment, Exploration, Separation Awareness, Exploration, Familiarity, Commitment, Separation Familiarity, Awareness, Exploration, Commitment, Separation Awareness, Commitment, Familiarity, Exploration, Separation

43) Question # 4 of 10 ( Start time: 05:18:13 PM ) Total Marks: 1 Payment gateway is an organization which connects those entities to the internet which are offline. Select correct option: True False

44) Question # 5 of 10 ( Start time: 05:18:55 PM ) Total Marks: 1 Customer Loyalty model is also called Select correct option: Customer Life Cycle Customer Segmentation Customer Awareness All

45) Question # 8 of 10 ( Start time: 05:20:28 PM ) Total Marks: 1 Creation of separate experiences for customers based on their behavior is called Select correct option:

Demographic segmentation Behavioral segmentation Geo-Graphic Segmentation None of the above

46) Question # 9 of 10 ( Start time: 05:20:53 PM ) Total Marks: 1 Which of the following option best represent Data mining can improve response rate tremendously? Select correct option: Direct mailing Personalization technology E-business Opt-in e-mail

47) Question # 10 of 10 ( Start time: 05:21:04 PM ) Total Marks: 1 Dividing the potential customers into groups is called Select correct option: Market Segmentation Market Promotion Market Research Market Survey

48) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 1 of 10 ( Start time: 05:24:11 PM ) Total Marks: 1 Web catalogue revenue model includes Select correct option: a. Online sellers of computer b. Gifts, flowers, clothes c. Journals d. A and B

49) Quiz Start Time: 05:24 PM Time Left 88 sec(s) Question # 2 of 10 ( Start time: 05:24:25 PM ) Total Marks: 1 Which entity does not include in SET(secure Electronic Transaction)? Select correct option: Seller Buyer

Payment gateway Bank

50) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 3 of 10 ( Start time: 05:25:05 PM ) Total Marks: 1 Call handling, sales tracking and Transaction support(technology / personnel) activities are included in which management system Select correct option: Customer Relationship Management system Public relation management system Inventory management system Data Base Management system

51) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 5 of 10 ( Start time: 05:25:32 PM ) Total Marks: 1 Do you think that "www.vu.edu.pk" can be considered as university's advertisement website? Select correct option: Yes No

51) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 6 of 10 ( Start time: 05:26:29 PM ) Total Marks: 1 Traditionally Marketer use the market segmentation(s) like Select correct option: Geo-graphic Segmentation Demographic Segmentation Psychographic Segmentation All of the above

52) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 7 of 10 ( Start time: 05:27:00 PM ) Total Marks: 1 Advertising Supported Revenue Model includes Select correct option:

Yahoo portal Employment sites Newspaper Publishers All of the above

53) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 8 of 10 ( Start time: 05:27:37 PM ) Total Marks: 1 SSL stands for Select correct option: Secure Socket Layer Security Service Layer Sub Secured Length None of these

54) Quiz Start Time: 05:24 PM Time Left 89 sec(s) Question # 10 of 10 ( Start time: 05:28:22 PM ) Total Marks: 1 In e-business, market research is slower than offline business. Select correct option: True False

55) ipher suite is a combination of Select correct option: Cryptographic Algorithm Authentication methods Security layers Cryptographic Algorithm And Authentication methods

56) Question # 5 of 10 ( Start time: 05:36:53 PM ) Total Marks: 1 www.amzon.com as you all familiar with it. Which of the following loyalty stages its customers are: ( Who dont know about it): Detail about amzon.com Amazon was one of the first major companies to sell goods by Internet, and was an iconic "stock in which to invest" of the late 1990s dot-com bubble. Jeff Bezos founded Amazon.com, Inc. in 1994, and launched it online in 1995. Amazon.com started as an online bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3 format, computer software, , etc. Amazon has established separate websites in Canada, the United Kingdom, Germany, France, China, andJapan. It also provides global shipping to certain countries for some of its products. Select correct option:

Awareness Exploration Familiarity Commitment

57) Question # 2 of 10 ( Start time: 05:43:49 PM ) Total Marks: 1 Which of the following is cheapest and quickest marketing technique to reach distant customers? Select correct option: E-Mail marketing Telephone marketing SMS marketing Advertisement letters marketing

Quiz Start Time: 05:42 PM Time Left 89 sec(s)

58) Question # 3 of 10 ( Start time: 05:44:52 PM ) Total Marks: 1 JIT concept means Select correct option: No distribution channel No warehousing Easily delivery No communication

59) Question # 6 of 10 ( Start time: 05:47:03 PM ) Total Marks: 1 Brick and Mortar refers to Select correct option: Offline business Online business Transport Building

60) Question # 7 of 10 ( Start time: 05:48:16 PM ) Total Marks: 1 How many kinds of Web Portals are? Select correct option: 3

2 5 6

61) Quiz Start Time: 05:42 PM Time Left 88 sec(s)

Question # 8 of 10 ( Start time: 05:49:06 PM ) Total Marks: 1 Press release can provide information about current events and news to, which of following, via a internet? Select correct option: Print media T.v commercial Press or media T.v program.

62) Question # 1 of 10 ( Start time: 05:53:24 PM ) Total Marks: 1 When you email at it430@vu.edu.pk , your email is automatically sorted and replied to your ID. Select correct option: True False

63) Question # 5 of 10 ( Start time: 05:55:05 PM ) Total Marks: 1 Visitors location, IP address, time of visit related information are added, in which of the following Select correct option: call handling files cookies log files Data mining files.

64) Question # 7 of 10 ( Start time: 05:55:50 PM ) Total Marks: 1 Which of following marketing campaigns are cheap an effective way to target potential customers? Select correct option: Sale forces E-mail Media promotion Marketing software

65) Question # 8 of 10 ( Start time: 05:56:06 PM ) Total Marks: 1 Suppose you are using "warid telecom" as your mobile connection and you ignor any other mobile company's advertisement because you want to keep using warid no matter what others offer. Your relationship with warid is at _____________. Select correct option: Exploration stage Commitment stage Awareness stage Separation stage

66) Question # 9 of 10 ( Start time: 05:57:03 PM ) Total Marks: 1 Dividing potential customers on the basis of variables such as social class, personality, or lifestyle is called__________. Select correct option: Demographic Segmentation Geographic Segmentation Psychographic segmentation Behavioral segmentation

67) Question # 1 of 10 ( Start time: 06:02:08 PM ) Total Marks: 1 Do you think, vulms.vu.edu.pk is an example of E-mail marketing? Select correct option: True False

68) Which one is not an example of search engine? Select correct option: Yahoo Google Alta vista Gawab

69) Let us, suppose that you have hosted early your e-commerce website to sell sweets online: Your customers are acquaint with the name of your company and DesiGhee Burfi . They have never interacted with your company. Which of following loyalty stages they are? Select correct option: Awareness Exploration

Familiarity Commitment

70) Which 5th P introduced by E-business in Marketing Mix? Select correct option: Proper coverage Personalized Services Proper access Personal style

71) ETSET(secure Electronic Transaction) was developed by Select correct option: Microsoft Netscape Navigator Master Cards and VISA All of the options

72) Which of these can be used for advertisement purpose? Select correct option: Telephone Newspapers Magazines All of above

73) Question # 5 of 10 ( Start time: 06:21:36 PM ) Total Marks: 1 Which of the following is a method for conducting market research? Select correct option: Phone Interviews Questionnaires All of above

74) Which of the following is NOT an advertising payment mode? Select correct option: Pay-per-sale Pay-per-click Pay-per-keypress Pay-per-lead

75) Question # 1 of 10 ( Start time: 06:25:05 PM ) Total Marks: 1 Advertising Subscription Mixed Revenue Model includes Select correct option: Online journals Sports information services Business week online All of the above

76) Question # 2 of 10 ( Start time: 06:25:59 PM ) Total Marks: 1 Digital Content Revenue Model Includes Select correct option: Legal information services Online journals Online Libraries All of the above

77) Question # 4 of 10 ( Start time: 06:27:06 PM ) Total Marks: 1 Which of these is a tool that can be used to improve customer services? Select correct option: Log file analysis Cookies Data mining All

78) Question # 9 of 10 ( Start time: 06:29:26 PM ) Total Marks: 1 Which of the following is an advertising payment mode? Select correct option: Pay-per-person Pay-per-page Pay-per-sale Pay-per-minute

79) Question # 10 of 10 ( Start time: 06:29:52 PM ) Total Marks: 1 If a company's marketing stretegy is focusing on customers having age less than 30, which of the following marketing segmentation technique is being used by company? Select correct option: Demographic Segmentation Geographic Segmentation Psychographic segmentation Behavioral segmentation

80) E-Business promotions are used to _______. Select correct option: Attract the customer to the product and convince him/her to buy it. Get credit card information from the customer. Complete a transaction between customer and seller.

SETSET(secure Electronic Transaction) was developed by Select correct option: Microsoft Netscape Navigator Master Cards and VISA All of the options

SSL stands for Select correct option: Secure Socket Layer Security Service Layer Sub Secured Length None of these

What is basic advantage of symmetric algorithms? Select correct option: Symmetric key does not use any encryption Symmetric algorithms are faster Symmetric algorithms are easy to understand All of above

Which of these keys can be used for encryption instead of using pair of private and public keys? Select correct option: Systematic key Asymmetric key Symmetric key All of above

Using SSL, we type in URL as : Select correct option:

https httpc httpc httpi Reference: (Page # 121)

In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT included: Select correct option:

Buyer Accounts identifier Buyer password Address of Merchant Actual amount of money in favor of merchant

A unique large number, generated as a result of applying hash function on a message is called ______. Select correct option:

Hash message Message digest Digitally singed message Secret message Reference: (page # 103) FVIPSS stands for _______. Select correct option:

First Virtual Internet Payment System Server First Virtual International Payment System Server

First Virtual International Payment System Services First Virtual Internal Payment System Services Reference: (Page # 110)

Virtual PIN Payment system is considered suitable for ________. Select correct option:

Low-cost items High-cost items Very expensive items Every kind of items Which of these is a primary participant in E-Cash Payment system? Select correct option: Buyer Bank Merchant All Most of the electronic payment systems on internet use cryptography. Select correct option: True False In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last withdrawals to the E-bank. Select correct option: 10 12 14 16

Reference: (page # 119) The key feature of E-Cash Payment system is Select correct option: Anonymity Security Cryptography None of these Reference: (page # 116) At minting stage, the client is ..by E-Cashbank Select correct option: Known Unknown Secret informed Reference: (page. 118) Cipher suite is a combination of Select correct option: Cryptographic Algorithm Authentication methods

Security layers Cryptographic Algorithm And Authentication methods Reference: (page. 121) SETSET(secure Electronic Transaction) was developed in Select correct option: 1995 1996 1997 1999 Reference: (page no. 122)

Symmetric algorithms are faster than asymmetric. Select correct option: True False Reference: (Page # 105) Which entity does not include in SET(secure Electronic Transaction)? Select correct option: Seller Buyer Payment gateway Bank Reference: (Page # 122) A paper signature is believed to be more reliable than a digital signature. Select correct option: True False If a key is 4 bit in length, how many unique key values are possible? Select correct option: 4 8

16 32 Explanation: A key value is always in binary form. A Binary Number is made up of only 0s and 1s. So each digit has only two possibilities: 0 or 1, So now we try to check all possible values of 4. 4 bit = 0000, 0001, 0010, 0100, 1000, 0011, 0110, 1100, 0101, 1010, 1011, 1101, 1001, 1110, 0111, 1111 Hence prove that if a key is 4 bit in length, then 16 unique key values are possible of that key. Hash function is a __________ Select correct option: Communication protocol Hardware device Encryption mechanism Log file Which of these attacks have been reported on symmetric key algorithms? Select correct option: Key Search Attacks Cryptanalysis System-Based Attacks All Reference: (Page # 108) Payment gateway is an organization which connects those entities to the internet which are offline. Select correct option: True False Reference: (Page # 122) How many elements an e-coin has? Select correct option: 1

2 3 4 Reference: (page # 116) EFT stands for _____________. Select correct option: Electronic Film Transmission Electronic Funds Transfer Electronic File Translation None of above Reference: (Page # 114)

________ is used to interpret and show contents of the webpage.

Select correct option:

HTML Notepad Browser Computer

What is identified by the tag ?

Select correct option:

Horizontal frame Bottom Frame Top Frame Vertical Frame

Which of the following is NOT an advantage of CSS?

Select correct option:

Define the look of your pages in one place Works on version 4 browsers or newer Easily change the look Implement same formatting each time tag is used. Links are used to connect ____________.

Select correct option:

Images Text Images and web documents All of the given

Do you think that "www.vu.edu.pk" can be considered as university's advertisement website? Select correct option: Yes No

Characterization and Clustering belong to which of the following types of Data Mining? Select correct option: Predictive Selective Descriptive Additive Reference: (Page # 141)

Traditionally Marketer use the market segmentation(s) like Select correct option:

Geo-graphic Segmentation Demographic Segmentation Psychographic Segmentation All of the above Reference: (Page # 131) Advertising Subscription Mixed Revenue Model includes Select correct option: Online journals Sports information services Business week online All of the above OLAP stands for Select correct option: Online Analytical Program Online Analytical Processing Online Application Program Online Analysis Performance Reference: (Page # 145) E-Business promotions are used to _______. Select correct option: Attract the customer to the product and convince him/her to buy it. Get credit card information from the customer. Complete a transaction between customer and seller. None of above Reference: (Page # 133)

Television, radio and print media are in a (n) . Mode. Select correct option: Passive Active Static Dynamic Reference: (Page # 139) CRM stands for ............... Select correct option: Customer Relationship Management Customer Related Management Customer Resembling Management Customer Reallocation Management Reference: (Page # 136) Which one is not an example of search engine? Select correct option: Yahoo Google Alta vista Gawab Reference: (Page # 137) Meta tag contains: Select correct option: User information seller information web page key information bank information Reference:

(Page # 138) Free-Trial advertisement means _________. Select correct option: Free coupons are placed on certain websites for customers so that they can use it for shopping. Customer is offered to use the product free of cost for a specific amount of time. Items bought are delivered to the customers with no delivery cost. The company didnt had to pay for this advertisement. Reference: (Page # 133) In many countries, stealing and misusing of meta information for getting competitive advantage is considered as an offence known as Select correct option: Tort of Private Nuisance Tort of Tress passing Tort of passing off Defamation Reference: (Page # 138) If a company's marketing stretegy is focusing on customers having age less than 30, which of the following marketing segmentation technique is being used by company? Select correct option: Demographic Segmentation Geographic Segmentation Psychographic segmentation Behavioral segmentation Reference: (Page # 131) Press release can provide information about current events and news to, which of following, via internet? Select correct option: Print media

T.v commercial Press or media T.v program. Reference: (Page # 135)

Fee for Transaction Models include Select correct option: Travel Agents and Insurance brokers Automobile Sales and event tickets Stock brokers and online banking All of the above Reference: (Page # 130) An E-Business can't have direct feedback from the customer in B2C. Select correct option: True False Creation of separate experiences for customers based on their behavior is called Select correct option: Demographic segmentation Behavioral segmentation Geo-Graphic Segmentation None of the above Reference: (Page # 132) What is the right sequence of steps involved in development of customers relationship with the business? Select correct option: Familiarity, Awareness, Commitment, Exploration, Separation Awareness, Exploration, Familiarity, Commitment, Separation Familiarity, Awareness, Exploration, Commitment, Separation Awareness, Commitment, Familiarity, Exploration, Separation

Reference: (Page # 136) At deposit stage, the serial number is ..by E-Cashbank Known Unknown Kept Secret Informed Reference: (Page # 118)

How many kinds of Web Portals are? 3 2 5 6 Explanation: There are only two kinds of web portals, one is vertical portals which provides information about single interest like online shopping sites are best example of vertical portal site, educational site is also an example of vertical portal. Second kind of web portal is horizontal web portals which provide information about everything or multiple things. Search engine is best example of horizontal web portal. Reference: (page # 129)

Let us, suppose that you have hosted your e-commerce website, When you provide opt-in e-mail option to your customers on your website and customer opt for it , what does it mean to receive ? Information about product through advertisement Information about product through e-mail

Information about services available on it Information about News through e-mail. Reference: (page # 133)

Track the customers online and do personalization is only possible through which of the following file(s) analysis. log files cookie data mining log files and cookies. Reference: (page # 136)

When customer life cycle is used to create different groups of customers, it is called? Targeting Customers Dynamic groups Customer Life Cycle Segmentation Group Development Reference: (page # 137)

Network addresses 128--- 191 range belongs to which of the following class networks?
A B

C E Reference: (page # 10)

Which of the following property falls in HTTP?


Stateless

Stateful Temporary All of these


Reference: (page # 3)

FSTC stands for: Financial Services Technology Consortium

Financial Secrets Technology Consortium Final Security threats control First Service Technology Consortium
Reference: (page # 113)

Supply chain can be broken into three parts, that is ----------------- , ----------------------- and ------------------- activities. Internal, external support Upstream, internal ,downstream Primary, Secondary ,R&D None of them Reference: (page # 155)

The process of taking active role in working with suppliers to improve products and processes is called? Value chain management Supply chain management Supply chain management software Porter Model Reference: (page # 155)

What is Ultimate consumer orientation? Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. Secondary Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of supply chain. None of them Reference: (page # 156)

Many search engines rank the site by using a program called


Spider

Scorpion Moon Cobweb


Reference:

(page # 138)

E-commerce is a combination of three different areas of study, namely, --------, ---------------- and --------------- Internal, external support, Support Technology, business and law/policy Primary, Secondary, R&D Sale, purchase, feed back Reference: (page # 161)

In which type of data mining, Apriori algorithms is used? Classification


Association

Characterization Clustering
Reference: (page # 143)

EDI has the key feature(s) No paper work No human intervention Exchange of information takes place in seconds
All of these

Reference: (page # 147)

Addresses are tied to the device itself and give no clue to it's location on a global scale. This is the characteristics of IP RIP MAC None of the given

When two or more intranets are connected to each other they form a/an ------------- . intranet internet extranet VPN Reference: (page # 2) Which attribute can be used to make a region non-clickable? none of the given target alt nohref Reference: (page # 37) Which of the following payment mode does not require customer to pay interest to the bank on each transaction? Credit card Debit card Electronic check

All of the above Reference: (page # 110) Cyber wallet can automatically assemble the correct payment and pay it too. True False

SET doesnt require special software on the client or merchant side. True False

Which model allows the users to log-on on a website and assume the role of bidder or seller? Online Banking. Storefront Model. E-Learning. Auction Model. Reference: (Page # 128) According to Michael Porter, fabricating is an example of primary activity in a strategic business unit. Identify the area in which this task is performed. Market and sell Deliver activities relate to storage Purchase materials and supplies Manufacture product or create service Reference:

(Page # 152)

Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Is it? True False

In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, --------------- and --------- Acceptance and consideration Acceptance and Rejection Approval and consideration None Reference: (page # 178)

In online environment acceptances may be issued by an imposter/cheater that has authority to bind the online business True False

#00ff00 in HTML indicates Pure green color Pure blue color Pure red color

Pure yellow color Reference: (Page # 23) Virtual PIN Payment System requires both merchant and buyer to register with _______________. Auto Clearing House (ACH) First Virtual (FV) DSS (Digital Signature Standard) DES (Data Encryption Standard) Reference: (Page # 110) Classification and Association belong to which of the following types of Data Mining?

Selective
Predictive

Descriptive Additive
Reference: (Page # 141)

Which one of the followings is an example of Banner advertising? Select correct option: Branding Affiliate programs Partnership All of these Reference: (Page # 138) CPM is an advertising payment mode. CPM stands for ________.

Select correct option: Cost Per Month Cost Per Minute Cost Per Megabyte Cost Per Message Reference: (Page # 134) Which one is not an example of search engine? Select correct option: Yahoo Google Alta vista Gawab Reference: (Page # 137) In which type of approach, we further dig the data for retrieving information from data warehouse? Select correct option: Slice Dice Drill down Roll up Reference: (Page # 146) Let us, suppose that you have hosted your e-commerce website, Promotion messages can be sent when potential client is Select correct option: online

offline both online and offline visiting head office Reference: (Page # 133) Digital Content Revenue Model Includes Select correct option: Legal information services Online journals Online Libraries All of the above Reference: (Page # 130) Which of these is a tool that can be used to improve customer services? Select correct option: Log file analysis Cookies Data mining All Reference: (Page # 136) What does Telemarketing means? Select correct option: Marketing through charting Marketing through telephone Marketing through emai Marketing through web casting Reference:

(Page # 133) In which type of data mining, ID3 algorithms is used? Select correct option: Classification Association Characterization Clustering Reference: (Page # 141) Some web retailers allow their customers to create their own product. It is called. Select correct option: One to one Marketing One to many Marketing Many to one marketing All of the above Reference: (Page # 132) Free-Trial advertisement means ___________. Select correct option: Free coupons are placed on certain websites for customers so that they can use it for shopping. Customer is offered to use the product free of cost for a specific amount of time. Items bought are delivered to the customers with no delivery cost. The company didnt had to pay for this advertisement Reference: (Page # 133) Total Marks: 1 The length of a message digest is ________.

Select correct option:

32 to 64 bits 64 to 128 bits 128 to 256 bits 256 to 512 bit

Reference: (Page # 103) Key version represents public key by

Select correct option:

Buyer Seller E-Bank Certification Authority

Reference: (Page # 116)

The serial # generated by the cyberwallet gets multiplied by blinding factor r which is known only to the ___________.

Select correct option:

Bank Merchant Client None

Reference: (Page # 116) ACH is a centralized system used by different interconnected banks for clearing payment requests. Select correct option: True False

Centralized Account Payment Model uses unique _______ of users as their account identifier. Select correct option: Residence address E-mail address Office address None

Reference:

(Page # 113) SET and SSL both are same with respect to security. Select correct option: True False

What are the security threats in VPS? Select correct option:

a. Email hacking b. Credit card number stolen c. Missing of delivery d. A and B

What is function of Cyberwallet? Select correct option: Store coins Manage Coins Record transactions All of above SET and SSL both are same with respect to security. Select correct option: True False

Basic difference between Virtual PIN Payment System and Electronic Check is _____. Select correct option: Encryption Registration with bank No. of participants There is no difference between them

MIDTERM EXAMINATION Spring 2009 IT430- E-Commerce (Session - 3) http://www.vustudents.net

Question No: 1 __ ( Marks: 1 ) - Please choose one


In which protocol, the messages are not deleted from email server.

SMTP POP3 IMAP (page 18) ICMP

Question No: 2 ( Marks: 1 ) - Please choose one Which HTML tag is used to define the internal style sheet ?

<css> <script > <sheet> <style> ref http://www.ex-designz.net/test_grade.asp?tid=37

Question No: 3 ( Marks: 1 ) - Please choose one


For which one of the following,<MARQUEE ...> tag

can work better

News headlines

Announcements Sound pulgin Movie controls Ref http://www.htmlcodetutorial.com/_MARQUEE.html Question No: 4 __ ( Marks: 1 ) - Please choose one
Choose the correct HTML code line which left-align the content inside a tablecell. <td leftalign> <td valign="left"> <td align="left"> (page 26) <tdleft>

Question No: 5 __ ( Marks: 1 ) - Please choose one


How do you write a conditional statement for executing some statements only if "i" is NOT equal to 5?

if =! 5 then if (i != 5) (page 58) if <>5 if (i <> 5)

Question No: 6 ( Marks: 1 ) - Please choose one What is the correct JavaScript syntax to write "Virtual University of Paistan"?

document.write("Virtual University of Paistan ") ("Virtual University of Paistan ") " Virtual University of Paistan "

response .write("Vi rtual University of Paistan ")

Question No: 7 __ ( Marks: 1 ) - Please choose one


We can divide the Client Server architecture up to:

3 Tier N -Tier 1 Tier 2 Tier

ref
[PPT]

CLIENT SERVER ARCHITECTURE


Question No: 8 ( Marks: 1 ) - Please choose one Choose which one is the not the columns of Log files.

IP addresses Request (url) Date Contents (page 136 and 3)

Question No: 9 __ ( Marks: 1 ) - Please choose one An address represented by four decimal numbers separated by a period is the

IP (PAGE 7) RIP MAC NON OF THE GIVEN

Question No: 10 ( Marks: 1 ) - Please choose one Which operator is used to concatenate two strings?

+ (PAGE 61)

*
&& &

Question No: 11 __ ( Marks: 1 ) - Please choose one Which SQL statement is used to extract data from a database? GET (page 83) OPEN SELECT EXTRACT

Question No: 12 __ ( Marks: 1 ) - Please choose one Which firewall uses strong user authentication to verify identity of a host attempting to connect to the network?

Packet filter firewall Circuit level firewall Application (PAGE 96) gateway firewall Hybrid firewall

Question No: 13 __ ( Marks: 1 ) - Please choose one

In CSS, How do you make each word in a text start with a capital letter?

text-transform :capitalize text-transform: uppercase text:capitalize You can't do that with CSS

REF http://www.ex-designz.net/test_page.asp?tid=37 Question No: 14 __ ( Marks: 1 ) - Please choose one Why we use reset tag in HTML?

To remove the text written in Notepad. To remove the text written in between <body> and </body>tag. To remove the text written in between <head> and </head> tag. To remove the text written in between <form> and </form> tag.

Question No: 15 ( Marks: 1 ) - Please choose one http://cs.vu.edu is an example of

Two zone domain name Three zone domain name (page 12) Four zone domain name Five zone domain name

Question No: 16 __( Marks: 1 ) - Please choose one

In data link layer, data packets are placed inside

Data frames (page 6) Data boxes Data streams None of these

Question No: 17 __ ( Marks: 1 ) What are the two types of twisted pair cables for networking ?

Question No: 18 ( Marks: 1 ) What it stands for IIS?

Question No: 19 __ ( Marks: 2 ) When does we use the parseFloat() function?

Question No: 20 ( Marks: 3 ) Name the JavaScript function that convert strings to float numbers. How do you give the function a string value to convert to a number?

Question No: 21 __ ( Marks: 5 )


Write your personal profile in a file saving it with the extension of e.g. abc.jsand then call it in a JavaScript code.

Question No: 22 ( Marks: 10 )


Explain any three of the outside attacks briefly.

MIDTERM EXAMINATION Spring 2009 IT430- E-Commerce (Session - 3) http://www.vustudents.net

Question No: 1 __ ( Marks: 1 ) - Please choose one Which one of the following ,divides large network in small logical segments called subnets on basis of IP addresses

Routers (page 16) Bridge None of these Switches

Question No: 2 ( Marks: 1 ) - Please choose one


Which one is not included in the networking topologies? Star Topology Bus Topology Media Topology Ring Topology

Question No: 3 __ ( Marks: 1 ) - Please choose one


At line code 5 which of the following Css methods has been applied? <html> <head> 1. <style type="text/css">

2. h3 {font-family: times}

3. p {font-family: courier}

4. p.sansserif {font-family: sans-serif} </style>

5. <Link rel=stylesheet type=text/css herf=mystyle.css> </head>

<body>

6. <h3 style=font-size:40pt>This is header 3</h3> </body>

</html>

mystyle.css: h3{ color: red}

Browser default External style sheet Inline style Internal style sheet

Question No: 4 ( Marks: 1 ) - Please choose one

Which attribute is used in a tag to control the layout of element?

view css Style Layout Ref http://www.yourhtmlsource.com/stylesheets/csslayout.html

Question No: 5___( Marks: 1 ) - Please choose one What is the correct HTML for making a hyperlink? http://www.vustudents.net

<a url="http://www.w3schools.com">W3Schools.com</a> <a>http://www.w3schools.com</a> <a h ref="http ://www.w3schools.com">W3Schools</a> (page 23) <a name="http://www.w3schools.com">W3Schools.com</a>

Question No: 6 ( Marks: 1 ) - Please choose one


How do you write a conditional statement for executing some statements only if "i" is NOT equal to 5? if =! 5 then if (i != 5) (repeated) if <>5 if (i <> 5)

Question No: 7 __ ( Marks: 1 ) - Please choose one


How many different kind of loops are there in JavaScript?

One. The "for" loop only Two. The "for" loop and the "while" loop Four. The "for" loop, the "while" loop, the "do...while" loop, and the "loop.. .until" loop None of the above

REF http://www.ex-designz.net/test_grade.asp?tid=65 Question No: 8___( Marks: 1 ) - Please choose one What does DTD stand for? Do The Dance. Dynamic Type Definition. Data Type Definition. (page 76) Direct Type Dfinition.

Question No: 9 ( Marks: 1 ) - Please choose one


Which of the following needs human action to execute? Virus (page 94) Worm Trojan Horse All of these

Question No: 10 __ ( Marks: 1 ) - Please choose one For showing image on web page, save your image at any drive or folder like C:\abc.jpeg is an example of

Relative Address Absolute address None of the given Ref Absolute paths are called that because they refer to the very specific location, including the domain name. The absolute path to a Web element is also often referred to as the UR

Question No: 11 __ ( Marks: 1 ) - Please choose one ASP server scripts are surrounded by delimiters, which?

<script>.. .</script> <%...%> <%>...</%> <&>...</&> ref http://www.w3schools.com/asp/asp_syntax.asp

Question No: 12 ( Marks: 1 ) - Please choose one This is an example of

0-tier architecture

1-tier architecture 2-tier architecture n-tier architecture

Question No: 13 __ ( Marks: 1 ) - Please choose one Which protocol is used to set up the dial up connection between RAC and RAS for exchange of data packets? http://www.vustudents.net PPP (page 98) POP3 SMTP FTP

Question No: 14 ( Marks: 1 ) - Please choose one Pretty Good Privacy (PGP) is the name of a popular _________system which is available for general public use. Filtering Cryptographic (page 100) Server Security

Question No: 15 ( Marks: 1 ) - Please choose one Intra Business involves only selling of corporate products to consumer. True (page 2) False

Question No: 16 __ ( Marks: 1 ) - Please choose one


#00ff00 in HTML indicates

Pure green color (page 23) Pure blue color Pure red color Pure yellow color

Question No: 17 ( Marks: 1 ) What is the function of TCP protocol at TCP/IP stack?Give precise answer.

Question No: 18 __ ( Marks: 1 ) What do you say that Cookies can also be used to maintain state between two broken sessions. Justify with solid argument Question No: 19 __ ( Marks: 2 )
What is bandwidth of a network?

Question No: 20 ( Marks: 3 )


What is the purpose of padding? How many types of padding are: Name of these?

Question No: 21 __ ( Marks: 5 )


Write any four essential features and two extra features which should exist in E-Commerce soft wares.

Question No: 22 ( Marks: 10 )


Differentiate the one tier, two tiers, three tiers and four tiers separately with respect to client server architecture.

MIDTERM EXAMINATION Spring 2009 IT430- E-Commerce (Session - 2) http://www.vustudents.net

Question No: 1 __ ( Marks: 1 ) - Please choose one For which of the following we need to know the classification of E-commerce?

Market planning strategy Build Mission statement Management strategy none

Question No: 2 ( Marks: 1 ) - Please choose one Who is making the Web standards?

Netscape Internet service providers The World Wide Web Consortium Microsoft

Question No: 3 __ ( Marks: 1 ) - Please choose one


When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called

Local Variables Global Variables Local and Global


None of the above

Ref http://www.authorpick.net/what-is-variables-in-programming-language/

Question No: 4___( Marks: 1 ) - Please choose one There is a way of describing XML data, how?

XML uses a description node to describe data XML uses a DTD to describe the data (page 75) XML uses XSL to describe data None of these

Ref http://www.dotnetspider.com/questions/ViewQuestion.aspx?QuestionId=6754&

Question No: 5 ( Marks: 1 ) - Please choose One which of the following property falls in HTTP?

Stateless (repeated) State full Temporary All of these

Question No: 6 ( Marks: 1 ) - Please choose one Choose the correct HTML tag to make a text bold <tbold> <b> <bld> <bold>

Question No: 7 ( Marks: 1 ) - Please choose one What is the default scripting language in ASP?

EcmaScri pt JavaScri pt Java VBScript (page 85)

Question No: 8 __ ( Marks: 1 ) - Please choose one Which one of them is not a feature of e-commerce software?

catalog display web hosting (page 92) web services transaction processing

Question No: 9 ( Marks: 1 ) - Please choose one When two or more intranets are connected to each other they form a/an ---------VPN Intranet Internet Extranet (page 2)

Question No: 10 ( Marks: 1 ) - Please choose one Pretty Good Privacy (PGP) is the name of a popular _________system which is available for general public use. http://www.vustudents.net

Filtering Cryptographic (page 100)

Server Security

Question No: 11 __ ( Marks: 1 ) - Please choose one Which one is NOT a valid frame attribute?

NORESIZE ROWS (page 33) FRAMEBORDER BORDER

Question No: 12 ( Marks: 1 ) - Please choose one IP version 6 provides ---------------bits and also contains ----------------------

128, hexadecimal (page 11) 64, hexadecimal 32, binary None of the Above

Question No: 13 ___( Marks: 1 ) - Please choose one A JavaScript event is generated when a user -------- .

clicks a hyperlink clicks a button enters data in a form all of the above (page 54)

Question No: 14 __ ( Marks: 1 ) - Please choose one Creating your own tags is not possible in HTML but in XML it is possible to create your own tags.

True False

Question No: 15 __ ( Marks: 1 ) - Please choose one IP, RIP, and ARP protocols work on

Application layer Session layer Network layer (page 6) Data link layer

Question No: 16 __ ( Marks: 1 ) - Please choose one In the communication between two computers on a network, CRC is calculated at Senders side Receivers side Both sender and receiver sides Neither on sender nor on receiver side

Ref [PPT]

Business Data Communications and Networking

Question No: 17 ( Marks: 1 ) What is the function of ARP protocol at TCP/IP stack?Give precise answer.

Question No: 18 __ ( Marks: 1 ) Do you agree or not that in In Java Script we are not provided with certain already defined objects which are ready to use? justify

Question No: 19 ( Marks: 2 ) What are the three position style properties?

Question No: 20 ( Marks: 3 ) Write at least three rules for writing an XML code.

Question No: 21 ( Marks: 5 ) What is the difference between an interpreted and a compiled language? Give one example of each.

Question No: 22 __ ( Marks: 10 )


Consider the following code of an XML document and identify where its standard code rules are being applied. You are required to write the identified tag along with its related rule side by side. http://www.vustudents.net

<?xml version=1.0?> <PlanetsList> <Planet Name=Mercury> <Distance>36 million miles</Distance> <Moons>None</Moons> <DayLength> 176 days</DayLength> </Planet> <Planet Name=Venus> <Distance>67 million miles</Distance> <Moons>None</Moons> <DayLength>1 17 days</DayLength> </Planet>

<Planet Name=Earth> <Distance>93 million miles</Distance> <Moons>One</Moons> <DayLength>24 Hours</DayLength> </Planet> </PlanetsList> <BR/>

MIDTERM EXAMINATION Spring 2009 IT430- E-Commerce (Session - 4) http://www.vustudents.net

Question No: 1 ( Marks: 1 ) - Please choose one In datalink layer, data packets are placed inside Data frames (page 6) Data boxes Data streams None of these

Question No: 2 ( Marks: 1 ) - Please choose one

Which of these is the correct HTML code for creating a reset button?

<input type =button name=reset value=reset> <input type=resetButton value=Clear> <input type=reset value=reset> (page 26) <input type=button name=reset value=clear>

Question No: 3 ( Marks: 1 ) - Please choose one

..tag is used into .tag because a row contains multi cells and to fill up these cells with data.

TD TR

TR TD (page 25)

TD TG

TG TR

Question No: 4 ( Marks: 1 ) - Please choose one

Individuals who write programs or manipulate technologies to gain unauthorized access to computers and networks are --------------- . administrators experts hackers (page 54) coders

Question No: 5 ( Marks: 1 ) - Please choose one

Which tag is used for the hidden fields?

<FIELD> <TEXT> <INPUT> page 88 <HIDDEN> <INPUT TYPE= "HIDDEN" NAME= "Shirt1" VALUE="25">

Question No: 6 ( Marks: 1 ) - Please choose one

What is a correct way of referring to a stylesheet called "mystyle.xsl" ?

<?xml-stylesheet type="text/xsl" href="mystyle.xsl" ?>

<link type="text/xsl" href="mystyle.xsl" />

<stylesheet type="text/xsl" href="mystyle.xsl" />

<?stylesheet type="text/xsl" href="mystyle.xsl" ?> page 39

<Link Rel="stylesheet" Type="text/css" href="mystyles.css">

Question No: 7 ( Marks: 1 ) - Please choose one

Which of them is NOT a predefined object? Document Date (repeated) Loop

Array

Question No: 8 ( Marks: 1 ) - Please choose one

Which of these is not a comparison operator? < > = (repeated) !=

Question No: 9 ( Marks: 1 ) - Please choose one

Var d = new date() Which of the following is correct about the d variable? instance of new instance of Date() method instance of Date object (repeated) Simple Variable

Question No: 10 ( Marks: 1 ) - Please choose one

When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called

Local Variables (repeated)

Global Variables

Local and Global None of the above

Question No: 11 ( Marks: 1 ) - Please choose one

Which of the following , is condition part of given For loop for (i = 0; i <= 5; i++). i=0. i++. i<=5. (i = 0; i <= 5; i++).

Question No: 12 ( Marks: 1 ) - Please choose one

What is the correct JavaScript syntax to write "Virtual University of Paistan"?

document.write("Virtual University of Paistan ") ("Virtual University of Paistan ") " Virtual University of Paistan " response.write("Virtual University of Paistan ")

Question No: 13 ( Marks: 1 ) - Please choose one

Which of the following is NOT valid HTML code line? <frameset rows="16%,84%"> <frameset columns="16%,84%"> <frameset cols="100,150">

<frameset cols=50%,50% rows=16%,84%> Ref http://www.academictutorials.com/answers.asp?id=1

Question No: 14 ( Marks: 1 ) - Please choose one CSS is a breakthrough in Web design because it allows developers to control the---------

Processing speed on client side Data grid view on client side Style and layout of home page. Style and layout of multiple Web pages (repeated)

Question No: 15 ( Marks: 1 ) - Please choose one

Which HTML tag is used to define an internal style sheet?

<css> <script> <style> (repeated) <sheet>

Question No: 16 ( Marks: 1 ) - Please choose one

What is the correct HTML tag for adding a background color? <background>yellow</background> <body bgcolor="yellow"> (repeated)

<body color="yellow"> None

MIDTERM EXAMINATION Spring 2009 IT430- E-Commerce (Session - 4)

http://www.vustudents.net
Question No: 1 ( Marks: 1 ) - Please choose one In datalink layer, data packets are placed inside Data frames Data boxes Data streams None of these

Question No: 2 ( Marks: 1 ) - Please choose one

Which of these is the correct HTML code for creating a reset button? <input type =button name=reset value=reset> <input type=resetButton value=Clear> <input type=reset value=reset> <input type=button name=reset value=clear>

Question No: 3 ( Marks: 1 ) - Please choose one

..tag is used into .tag because a row contains multi cells and to fill up these cells with data.

TD TR

TR TD

TD TG

TG TR

Question No: 4 ( Marks: 1 ) - Please choose one Individuals who write programs or manipulate technologies to gain unauthorized access to computers and networks are --------------- . administrators experts hackers coders

Question No: 5 ( Marks: 1 ) - Please choose one Which tag is used for the hidden fields? <FIELD> <TEXT> <INPUT> <HIDDEN>

Question No: 6 ( Marks: 1 ) - Please choose one What is a correct way of referring to a stylesheet called "mystyle.xsl" ? <?xml-stylesheet type="text/xsl" href="mystyle.xsl" ?> <link type="text/xsl" href="mystyle.xsl" /> <stylesheet type="text/xsl" href="mystyle.xsl" /> <?stylesheet type="text/xsl" href="mystyle.xsl" ?>

Question No: 7 ( Marks: 1 ) - Please choose one

Which of them is NOT a predefined object? Document Date Loop Array

Question No: 8 ( Marks: 1 ) - Please choose one Which of these is not a comparison operator? < > = !=

Question No: 9 ( Marks: 1 ) - Please choose one Var d = new date() Which of the following is correct about the d variable? instance of new instance of Date() method instance of Date object Simple Variable

Question No: 10 ( Marks: 1 ) - Please choose one When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called

Local Variables Global Variables Local and Global None of the above

Question No: 11 ( Marks: 1 ) - Please choose one Which of the following , is condition part of given For loop for (i = 0; i <= 5; i++). i=0. i++. i<=5. (i = 0; i <= 5; i++).

Question No: 12 ( Marks: 1 ) - Please choose one What is the correct JavaScript syntax to write "Virtual University of Paistan"?

document.write("Virtual University of Paistan ") ("Virtual University of Paistan ") " Virtual University of Paistan " response.write("Virtual University of Paistan ")

Question No: 13 ( Marks: 1 ) - Please choose one

Which of the following is NOT valid HTML code line? <frameset rows="16%,84%"> <frameset columns="16%,84%">

<frameset cols="100,150"> <frameset cols=50%,50% rows=16%,84%>

Question No: 14 ( Marks: 1 ) - Please choose one CSS is a breakthrough in Web design because it allows developers to control the---------

Processing speed on client side Data grid view on client side Style and layout of home page. Style and layout of multiple Web pages

Question No: 15 ( Marks: 1 ) - Please choose one


Which HTML tag is used to define an internal style sheet?

<css> <script> <style> <sheet>

Question No: 16 ( Marks: 1 ) - Please choose one What is the correct HTML tag for adding a background color? <background>yellow</background> <body bgcolor="yellow">

<body color="yellow"> None

Question No: 17 ( Marks: 1 ) What does this mean? padding-right

adds space to the right of the content

Question No: 18 ( Marks: 1 ) Do you agree or not that using Cascading Style Sheets one can apply an image to sections of ones

page or even to individual words.

YES! I AGREE

Question No: 19 ( Marks: 2 ) Suppose, there is an applet at "http://www.vu.edu.pk/demo.class". Write the code to include this applet in your web page.

<APPLET CODE= http://www.vu.edu.pk/demo.class width=100 height=200> DEMO </APPLET>

MIDTERM EXAMINATION Spring 2010 IT430- E-Commerce (Session - 6) http://www.vustudents.net

Question No: 1 ( Marks: 1 ) - Please choose one


In star network features a central connection point called a "hub" that ought to be only a hub.

_ True _ False

Question No: 2 ( Marks: 1 ) - Please choose one Switch is a device that joins multiple computers together within one local area network (LAN). _ True (page 15) _ False

Question No: 3 ( Marks: 1 ) - Please choose one Switch generally contains more "intelligence" than a hub. _ True _ False

Question No: 4 ( Marks: 1 ) - Please choose one In which protocol, the messages are not deleted from email server. _ SMTP _ POP3 _ IMAP (page 18) _ ICMP

Question No: 5 ( Marks: 1 ) - Please choose one Which protocol does Virtual university use to send email to student Accounts? _ SMTP _ POP _ IMAP _ TCP

Question No: 6 ( Marks: 1 ) - Please choose one


For which one of the following,<MARQUEE ...> tag can work better

_ News headlines _ Announcements _ Sound pulgin _ Movie controls

Question No: 7 ( Marks: 1 ) - Please choose one Can you add a style in a single place on a page ? _ Yes, with a style-definition written into the tag _ Yes, with a global style definition that redefines the tag. _ No - CSS can only be defined for entire pages. Question No: 8 ( Marks: 1 ) - Please choose one
Which CSS tag is used to place an image that would remain when user scrolls down or up the page?

_ background-attachment: fixed _ background-attachment: scroll _ background-attachment: up _ All of these

Question No: 9 ( Marks: 1 ) - Please choose one What shall come in blanks for proper result, Here blanks are numbered with 1,2 and 3 <html> <head> <SCRIPT language="JavaScript"> Var num1, var num2 Document.container .result.value=parseFloat(num1)-parseFloat(num2) </script> </head> <body> <FORM name=---------1-----------> <input type=----------2------- name=-------3--------- maxlength=5> </form> </body> </html> _ container, text and result _ result, value and container _ container , button and value _ result, container and text

Question No: 10 ( Marks: 1 ) - Please choose one Correct syntax of "for" loop is : _ for (i = 0; i <= 5) _ for i = 1 to 5 _ for (i <= 5; i++)

_ for (i = 0; i <= 5; i++)

REF http://www.ex-designz.net/test_grade.asp?tid=65

Question No: 11 ( Marks: 1 ) - Please choose one CGI stands for _ Common Gate Information _ Common Gate Interface (PAGE 82) _ Common Goal Interest _ Common Global Interaction

Question No: 12 ( Marks: 1 ) - Please choose one Which of the following property falls in HTTP? _ Stateless _ Stateful _ Temporary _ All of these

Question No: 13 ( Marks: 1 ) - Please choose one What is a correct way of referring to a stylesheet called "mystyle.xsl" ? _ <?xml-stylesheet type="text/xsl" href="mystyle.xsl" ?> _ <link type="text/xsl" href="mystyle.xsl" /> _ <stylesheet type="text/xsl" href="mystyle.xsl" /> _ <?stylesheet type="text/xsl" href="mystyle.xsl" ?>

Question No: 14 ( Marks: 1 ) - Please choose one

Which of the following does not interpret its code? _ ASP _ PHP _ JSP (page 85) _ Coldfusion

Question No: 15 ( Marks: 1 ) - Please choose one Asymmetric cryptography is also called -------------- .

_ Public key cryptography (PAGE 100) _ Private key cryptography _ Substitution cryptography _ Transposition

Question No: 16 ( Marks: 1 ) - Please choose one Digital signature uses --------- .

_ Symmetric cryptography _ Private key cryptography _ Public key cryptography (PAGE 100) _ Hash function

Question No: 17 ( Marks: 1 ) - Please choose one Which one of the following is NOT a valid JavaScript variable? _ _name1 _ $studentScore

_ first_name _ 2ndName

Question No: 18 ( Marks: 1 ) - Please choose one Which of these is the correct HTML code for creating a reset button? _ <input type =button name=reset value=reset> _ <input type=resetButton value=Clear> _ <input type=reset value=reset> (page 61) _ <input type=button name=reset value=clear>

Question No: 19 ( Marks: 1 ) - Please choose one Why we use reset tag in HTML?

_ To remove the text written in Notepad. _ To remove the text written in between <body> and </body>tag. _ To remove the text written in between <head> and </head> tag. _ To remove the text written in between <form> and </form> tag. (page 61)

Question No: 20 ( Marks: 1 ) - Please choose one http://cs.vu.edu is an example of

_ Two zone domain name _ Three zone domain name _ Four zone domain name _ Five zone domain name

Question No: 21 ( Marks: 2 ) How Certification Authority (CA) issues the certificates? Describe briefly Question No: 22 ( Marks: 2 ) Discuss the role of child element tags while in writing XML code. MIDTERM EXAMINATION Spring 2009 IT430- E-Commerce (Session - 2) http://www.vustudents.net

Question No: 1 __ ( Marks: 1 ) - Please choose one Academic institutions, religious organizations and government using ----------------------ecommerce classification Busi ness-to-Business(B2B) Intra Business Non Business EC (page 2) Busi ness-to-consumer(B2C)

Question No: 2___ ( Marks: 1 ) - Please choose one


Network addresses 128--- 191 range belongs to which of the following class networks?

A B (page 10) C E

Question No: 3 ( Marks: 1 ) - Please choose one

Where in an HTML document is the correct place to refer to an external style sheet?

In the <body> section At the end of the document In the <head> section At the top of the document

Ref
http://www.ex-designz.net/test_grade.asp?tid=37 Question No: 4 __ ( Marks: 1 ) - Please choose one Constructor is defined as the initializing function used to create..........

Instance of object Copy of object Instance / copy of object (page 69) Shallow copy of object

Question No: 5 ( Marks: 1 ) - Please choose one What does DTD stand for? Do The Dance. Dynamic Type Definition. Data Type Definition. (page 76) Direct Type Dfinition.

Question No: 6 __ ( Marks: 1 ) - Please choose one Which one of following file is used to translate XML:

DTD XSL (repeated ) XML parser Browser

Question No: 7 __ ( Marks: 1 ) - Please choose one In which of the following language ,XML parser is usually written.

VB.net Java (page 77) Asp.net C++ Question No: 8 __ ( Marks: 1 ) - Please choose one
In _________key cryptography, everyone has access to all the public keys

Public (page 100) Private Symmetric Certified

Question No: 9___ ( Marks: 1 ) - Please choose one How do you define a numerical value?

var mynum = new Math; var mynum = Math(6); var mynum = 6;

Math.mynum = 6;

Question No: 10___ ( Marks: 1 ) - Please choose one What is 17%5 ? 2 3 85 84

Question No: 11___( Marks: 1 ) - Please choose one An array can contain ---------- .

only text only numbers only numbers or text any valid variable ref http://java.sun.com/docs/books/jls/second_edition/html/arrays.doc.html Question No: 12 ( Marks: 1 ) - Please choose one Which tag is used for the hidden fields?

<FIELD> <TEXT> <INPUT> (page 88) <HIDDEN>

Question No: 13 __ ( Marks: 1 ) - Please choose one Packet filter firewall operates at a) data link layer b) network layer c) transport layer

a and b only (page 5) c only b and c only a, b and c

Question No: 14 ( Marks: 1 ) - Please choose one Which one has the functionality to redirect the filled information to an other page.

Submit button Reset button Radio button None of the given

Question No: 15 ( Marks: 1 ) - Please choose one Due to which characteristics, ATM network are covered under E-commerce ?

Exchange of information through computer networks Internet. Exchanging of products, services.

None of the above.

Question No: 16 __ ( Marks: 1 ) - Please choose one IP, RIP, and ARP protocols work on

Application layer Session layer Network layer (page 6) Data link layer

MIDTERM EXAMINATION Spring 2009 IT430- E-Commerce (Session - 1) http://www.vustudents.net

Question No: 1 __ ( Marks: 1 ) - Please choose one Marketing plan should be same for all E-commerce classification. True False

Question No: 2 ( Marks: 1 ) - Please choose one


Identify the networking device which regenerates the signals if these become weak.

Hub Switch Router

Repeater (page 15)

Question No: 3 ( Marks: 1 ) - Please choose one How can you open a link in a new browser window?

<a href="url" target="new"> <a href="url"target="_blank"> (page 33) <a href="url"new> None of these

Question No: 4 ( Marks: 1 ) - Please choose one


Content pages relate to which of the following tag?

<iframe> <Frame> <frameset> <noframes>

Question No: 5 __ ( Marks: 1 ) - Please choose one What is the correct HTML for referring to an external style sheet?

<style src=mystlye.css> <link re = stylesheet type= text/css herf= mystyle.css> <stlyesheet> mystyle.css</stlyesheet> All of these

Ref

http://www.ex-designz.net/test_grade.asp?tid=37

Question No: 6 __ ( Marks: 1 ) - Please choose one


Choose the correct HTML code line which left-align the content inside a table cell.

<td leftalign> <td valign="left">

<td align="left"> (page 26) <tdleft>

Question No: 7 ( Marks: 1 ) - Please choose one In a Frameset code, do the BODY tags belong inside or outside of the NOFRAMES tag pair?

Inside because an HTM Document can only include one or the other. Outside, to be seen by the older browsers [NN version 1 and IE version 2]. Outside because the W3C says that to be valid. Contain a BODY tags pair.

Ref http://www.tjkdesign.com/articles/frames/quiz.asp

Question No: 8 ________________ ( Marks: 1 ) - Please choose one In CSS, the font-style property can make text what? Bigger. Italic. Different colors.

Change size. Ref http://www.w3schools.com/css/css_font.asp

Question No: 9 ( Marks: 1 ) - Please choose one


Which CSS tag is used to place an image that would remain when user scrolls down or up the page?

background-attachment: fixed background-attachment: scroll background-at tachment : up All of these

Question No: 10 ( Marks: 1 ) - Please choose one Which of the following ,in Javascript, we could not create our own?

Textboxes Dropdown Object Image Ref http://www.w3schools.com/js/js_objects.asp

Question No: 11 ( Marks: 1 ) - Please choose one


How do you write a conditional statement for executing some statements only if "i" is equal to 5?

if i=5 if i=5 then if i==5 then if (i==5) (page 58)

Ref

http://www.ex-designz.net/test_grade.asp?tid=65

Question No: 12 __ ( Marks: 1 ) - Please choose one Constructor is defined as the initializing function used to create..........

Instance of object Copy of object Instance / copy of object (page 69) Shallow copy of object

Question No: 13 ( Marks: 1 ) - Please choose one Which one of following file is used to translate XML: DTD XSL (page 77) XML parser Browser

Question No: 14 ( Marks: 1 ) - Please choose one How can you reference part of a string?

text.substr(5,6);

text.part(5,6) text. piece(5 ,6) text.split(5,6); http://php.net/manual/en/function.substr.php

Question No: 15___( Marks: 1 ) - Please choose one Which one is the correct CSS syntax?

h1 {font-size:72pt} (page 39) h1:font-size=72pt {h1:font-size=72pt} {h1;font-size:72pt}

Question No: 16 __ ( Marks: 1 ) - Please choose one In the communication between two computers on a network, CRC is calculated at

Senders side Receivers side Both sender and receiver sides Neither on sender nor on receiver side (100% tuka )

Question No: 17 __ ( Marks: 1 ) What does this mean document.write("str.charAt(3) : "+str.charAt(3) +"<P>"); ?

Question No: 18 __ ( Marks: 1 ) What does this term mean "Non-repudiation"?

Question No: 19 __ ( Marks: 2 ) What are servlets? Question No: 20 ( Marks: 3 ) What are the three methods for using style sheets with a web page?

Question No: 21 __ ( Marks: 5 )


Identify protocol stack used in each layer of OSI model?

Question No: 22 ( Marks: 10 ) "The role of a Certification Authority is similar to a passport office." Explain it.

MIDTERM EXAMINATION Spring 2009 IT430- E-Commerce (Session - 4)

http://www.vustudents.net
Question No: 1 ( Marks: 1 ) - Please choose one In data link layer, data packets are placed inside Data frames (PAGE 6) Data boxes Data streams None of these Question No: 2 ( Marks: 1 ) - Please choose one Which of these is the correct HTML code for creating a reset button? Question No: 3 ( Marks: 1 ) - Please choose one ..tag is used into .tag because a row contains multi cells and to fill up these cells with data. TD TR TR TD TD TG

TG TR RFF http://www.w3.org/TR/WCAG10-HTML-TECHS/ Question No: 4 ( Marks: 1 ) - Please choose one Individuals who write programs or manipulate technologies to gain unauthorized access to computers and networks are --------------- . administrators experts hackers (PAGE 94) coders Question No: 5 ( Marks: 1 ) - Please choose one Which tag is used for the hidden fields? Question No: 6 ( Marks: 1 ) - Please choose one What is a correct way of referring to a stylesheet called "mystyle.xsl" ? <?xml-stylesheet type="text/xsl" href="/mystyle.xsl" ?> <?stylesheet type="text/xsl" href="/mystyle.xsl" ?> Question No: 7 ( Marks: 1 ) - Please choose one Which of them is NOT a predefined object? Document Date Loop Array ref http://www.webreference.com/programming/javascript/diaries/15/ Question No: 8 ( Marks: 1 ) - Please choose one Which of these is not a comparison operator? < > = (PAGE 58) != Question No: 9 ( Marks: 1 ) - Please choose one Var d = new date() Which of the following is correct about the d variable? instance of new instance of Date() method instance of Date object Simple Variable

REF http://www.webreference.com/programming/javascript/diaries/15/ Question No: 10 ( Marks: 1 ) - Please choose one When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called Local Variables Global Variables Local and Global None of the above ref If you declare a variable within a function, the variable can only be accessed ... the variable is destroyed. These variables are called local variables. ... Question No: 11 ( Marks: 1 ) - Please choose one Which of the following , is condition part of given For loop for (i = 0; i <= 5; i++). i=0. i++. i<=5. (i = 0; i <= 5; i++). Ref http://www.blackwasp.co.uk/CSharpForLoop.aspx Question No: 12 ( Marks: 1 ) - Please choose one What is the correct JavaScript syntax to write "Virtual University of Paistan"? document.write("Virtual University of Paistan ") ("Virtual University of Paistan ") " Virtual University of Paistan " response.write("Virtual University of Paistan ") Question No: 13 ( Marks: 1 ) - Please choose one Which of the following is NOT valid HTML code line? ,84%"> ,84%"> ,50% rows=16%,84%> Question No: 14 ( Marks: 1 ) - Please choose one CSS is a breakthrough in Web design because it allows developers to control the---------

Processing speed on client side Data grid view on client side Style and layout of home page. Style and layout of multiple Web pages ref http://ezinearticles.com/?Advantages-of-Using-CSS-in-Web-Design&id=1433066 Question No: 15 ( Marks: 1 ) - Please choose one Which HTML tag is used to define an internal style sheet? Question No: 16 ( Marks: 1 ) - Please choose one What is the correct HTML tag for adding a background color? yellow None Question No: 17 ( Marks: 1 ) What does this mean? (page 49) padding-right padding-right adds space to the right of the content

Question No: 18 ( Marks: 1 ) Do you agree or not that using Cascading Style Sheets one can apply an image to sections of ones page or even to individual words. Yes! I agree, using CSS one can apply his/her defined design, image or wording to muliple pages of his/her website. Question No: 19 ( Marks: 2 ) Suppose, there is an applet at "http://www.vu.edu.pk/demo.class". Write the code to include this applet in your web page. Question No: 20 ( Marks: 3 ) What do you think, is there any difference between Static and Dynamic IP Address assignment? Discuss. A static IP address is a number (in the form of a dotted quad) that is assigned to a computer by an Internet service provider (ISP) to be its permanent address on the Internet. Computers use IP addresses to locate and talk to each other on the Internet, much

the same way people use phone numbers to locate and talk to one another on the telephone. When you want to visit whatis.com, your computer asks a domain name system (DNS) server (think telephone information operator) for the correct dotted quad number (think phone number) for whatis.com and your computer uses the answer it receives to connect to the whatis.com server. Question No: 21 ( Marks: 5 ) What is cryptography? What techniques are used for cryptography? Cryptography is the technique of converting a message into unintelligible or nonunderstandable form such that even if some unauthorized or unwanted person intercepts the message he/she would still not be able to make any sense out of it. Cryptography is thousands of years old. Techniques used for cryptography Substitution In substitution we replace each letter in the message with another to make the message non-understandable. For example, each letter a in the message can be replaced with letter d and letter b with letter e and so on. Transposition It is based on scrambling the characters in a message. A transposition system may first write a message into a table row by row then the message can be read and rewritten column by column to make it scrambled.

Question No: 22 ( Marks: 10 ) Analyze the following given code showing some Cascading Style Sheets tags and explain its lines one by one. <html> <head> h1 {text-decoration: overline} h2 {text-decoration: line-through} h3 {text-decoration: underline} a {text-decoration: none} <body>

This is header 1 This is header 2 This is header 3 This is a link

MIDTERM EXAMINATION Spring 2010 IT430- E-Commerce (Session - 6) Solved http://www.vustudents.net Question No: 1 ( Marks: 1 ) - Please choose one Academic institutions, religious organizations and government using --------------------- e-commerce classification Business-to-Business(B2B) Intra Business Non Business EC (page 2) Business-to-consumer(B2C)

Question No: 2 ( Marks: 1 ) - Please choose one In which protocol, the messages are not deleted from email server. SMTP POP3 IMAP (page 18) ICMP in case of IMAP the message is not deleted in the email server and thus can be reopened from another location/machine.

Question No: 3 ( Marks: 1 ) - Please choose one What is the correct HTML tag for adding a background color? <background>yellow</background> <body bgcolor="yellow"> (page 47) <body color="yellow"> None

Question No: 4 ( Marks: 1 ) - Please choose one Which HTML tag is used to define an internal style sheet? <css> <script> <style> (Ans) <sheet> reference http://www.ex-designz.net/test_grade.asp?tid=37 (question no 3)

Question No: 5 ( Marks: 1 ) - Please choose one What is the correct HTML for making a hyperlink? <a href="http://www.w3schools.com">W3Schools</a> <a name="http://www.w3schools.com">W3Schools.com</a> <a url="http://www.w3schools.com">W3Schools.com</a> <a>http://www.w3schools.com</a> REFERENCE http://www.w3schools.com/html/html_links.asp

Question No: 6 ( Marks: 1 ) - Please choose one If we leave out the target attribute in frame tag and link was clicked ,the document loads into the window In Same page (repeated ) In other blank page. To display browser error. All of the options.

Question No: 7 ( Marks: 1 ) - Please choose one What does mean by != comparison operator? http://www.vustudents.net Equal to Not Equal Not Equal (page 58)

Question No: 8 ( Marks: 1 ) - Please choose one What does the string. match (abc) object do? Concatenates the abc word to other abc words Matches the abc words with other abc words It does replacement of abc word with other words All of the above ref http://www.regular-expressions.info/reference.html Question No: 9 ( Marks: 1 ) - Please choose one var txt="Hello World!" Document. Write (txt.length), it would return the length as.

10 11 12 13 REFERENCE http://www.w3schools.com/js/js_obj_string.asp

Question No: 10 ( Marks: 1 ) - Please choose one Which of the following property falls in HTTP? Stateless (Ans) Stateful Temporary All of these Question No: 11 ( Marks: 1 ) - Please choose one Which one of the following certifies the binding between public key and its owner. CA (page101) KDC TLS Firewall Question No: 12 ( Marks: 1 ) - Please choose one Cyclical Redundancy Check (CRC), takes place in which layer of OSI Model. Session Layer Transport Layer Network Layer Data link layer (page 6)

Question No: 13 ( Marks: 1 ) - Please choose one How can you convert information consisting of comma separated values into an array? txtArray = txt.indexOf(','); txtArray = txt.split(','); txtArray = txt.trim(','); txtArray = txt.substring(','); page 70

Question No: 14 ( Marks: 1 ) - Please choose one The control statement on a while loop is tested before each time through the loop after each time through the loop once at the start once at the end Ref http://en.wikipedia.org/wiki/While_loop Question No: 15 ( Marks: 1 ) - Please choose one Which SQL statement is used to delete data from a database?

DELETE (page 83) COLLAPSE REMOVE DISCARD

Question No: 16 ( Marks: 1 ) - Please choose one A program that performs a specific function such as creating invoices/bills or processing payment received from customers is called a/an ---------------.

Middleware Web Service CRM Software Appplication Program (page 92)

Question No: 17 ( Marks: 1 ) - Please choose one Which firewall uses strong user authentication to verify identity of a host attempting to connect to the network? Packet filter firewall Circuit level firewall Application gateway firewall (page 96) Hybrid firewall

Question No: 18 ( Marks: 1 ) - Please choose one In what form are style rules presented? Selector { property: value } selector { property= value } selector ( property: value ) selector ( property= value )

Question No: 19 ( Marks: 1 ) - Please choose one Why we use reset tag in HTML? To remove the text written in Notepad. To remove the text written in between <body> and </body>tag.

To remove the text written in between <head> and </head> tag. To remove the text written in between <form> and </form> tag.

Reference http://www.echoecho.com/htmlforms13.htm

Question No: 20 ( Marks: 1 ) - Please choose one When data moves upward in the OSI stack it is called Encapsulation De-encapsulation (page 5) Synchronization None of these

Question No: 21 ( Marks: 2 ) What does PPTP stand for? Ans ( page98) PPTP stands for point to point transfer protocol.

Question No: 22 ( Marks: 2 ) What are the keywords to define a variable and a function in JavaScript? var is the keyword used to define a variable in Javascript e.g var a; function is the keyword to define a function in javascript e.g function myfunction(){ // some code }

Question No: 23 ( Marks: 3 ) http://www.vustudents.net Identify the object, property and method in the following: Math.sin(45) Math.PI Ans: Math is the object in above case PI is the property of Math object Sin() is the method of Math object Question No: 24 ( Marks: 3 ) Performance of web servers can be evaluated mainly on the basis of two factors. What are they?

Ans: Performance of web sever Performance of web servers can be evaluated mainly on the basis of two factors: Throughput, which is the number of http requests that a particular server hardware and software can handle in the unit time; and

Response time, which is the amount of time a web server requires to process one request. Web server hardware architectures
Question No: 25 ( Marks: 5 ) Write the code for a web page displaying a button named "Testing". After clicking that button an alert should be displayed saying "The test is successful".

<html> <head> <script type="text/javascript"> function sndAlert() { window.alert("The test is successful!!!");

} </script> </head> <body> <FORM NAME="form1"> <INPUT TYPE="Button" name="showAlert" VALUE="Show Alert" onclick="sndAlert()"> </FORM> </body> </html>
Question No: 26 ( Marks: 5 ) What is the difference between an interpreted and a compiled language? Give one example of each. http://www.vustudents.net Ans: In a compiled language we compile to code or convert into machine language using a software called compiler as we can case C++ Example C++ with interpret language we interpret the code (line by line) at run time using a program called interpreter browser is an interpreter. Example Browser

MIDTERM EXAMINATION Spring 2010 IT430- E-Commerce (Session - 6) Solved

http://www.vustudents.net
Question No: 1 ( Marks: 1 ) - Please choose one MAC stand for Media Access Control ( page 13) Media Access Consortium

Member of Asian Community None of these Question No: 2 ( Marks: 1 ) - Please choose one Choose the correct HTML tag for the largest heading <head> <h1> (page 20) <Heading>

<h6> Question No: 3 ( Marks: 1 ) - Please choose one Which of the following tags are used for embedding sound files into HTML code? <A href=song.wav> <EMBED SRC="Skylar.MP3"> <A href=song.wav> and <EMBED SRC="Skylar.MP3"> (page 37) None of these Do correction in all midterm file J Question No:44 answer is 3rd Question No: 4 ( Marks: 1 ) - Please choose one Which of the following is NOT an advantage of CSS ? Works on version 4 browsers or newer Define the look of your pages in one place Easily change the look Implement same formatting each time tag is used.

Advantages

6) Improved Search Engine Results 7) Sites Load Faster

8) Design Separated from Content: 9) Displayed on Various Media 10) Compatibility with Browsers
Browser inserts a line break before the <DIV> tag and after the </DIV> end tag. They are used when you want to apply a specific style to a number of different tags and sections throughout the document http://www.vustudents.net

Question No: 5 ( Marks: 1 ) - Please choose one Which of the following is correct line to add separated css file with name xxxx.css? <link scr=stylesheet href="/xxxx.css" type="text/css"> <link rel=stylesheet href="/xxxx.css" type="text/css"> (page 77) <style rel=stylesheet href="/xxxx.css" type="text/css"> <link rel=stylesheet scr="xxxx.css" type="text/css">

Question No: 6 ( Marks: 1 ) - Please choose one Which of the following is correct syntax to define color in CSS? body {color: black} (page 77) body:color=black {body:color=black(body} {body;color:black}

Question No: 7 ( Marks: 1 ) - Please choose one Inside which of the following HTML element do we put the JavaScript? <script> (page 58) <js> <javascript> <scripting>

Question No: 8 ( Marks: 1 ) - Please choose one JavaScript is mainly a ___________ language. Server Side Scripting Cross Side Scripting Client Side Scripting (page79) both Cross and Server Side Scripting

Question No: 9 ( Marks: 1 ) - Please choose one Which one is the responsible to manage Internal processes? E-business E-commerce E-marketing All of the given

Question No: 10 ( Marks: 1 ) - Please choose one The first control statement in a for loop usually sets the termination condition increments a counter creates a control variable none of the above Question No: 11 ( Marks: 1 ) - Please choose one You define a method using obj.method obj.method[]

obj.method() (PAGE 58) obj-method

Question No: 12 ( Marks: 1 ) - Please choose one What is the default scripting language in ASP? EcmaScript JavaScript Java VBScript (PAGE 85)

Question No: 13 ( Marks: 1 ) - Please choose one Following are malicious programs EXCEPT ----------------- . Back doors Trojan Horses Firewalls (PAGE 94) Worms

Question No: 14 ( Marks: 1 ) - Please choose one Outside attacks on a network include the following, EXCEPT --------------- . Password attack http://www.vustudents.net DoS Back doors ( PAGE 95) IP spoofing

Question No: 15 ( Marks: 1 ) - Please choose one

At which layer of the OSI model the circuit level firewall operates? Application layer Presentation layer Network layer Transport layer (PAGE 96)

Question No: 16 ( Marks: 1 ) - Please choose one The process of scrambling a message with the help of a key is called -------------- . Cryptography Filtering Transposition Encryption (PAGE 100)

The process of scrambling a message with the help of a key is called Encryption.

Question No: 17 ( Marks: 1 ) - Please choose one In a ring network, every device has exactly ______ neighbors for communication purpose. more than two Two (PAGE 14) Four None of these

Question No: 18 ( Marks: 1 ) - Please choose one What is identified by the tag <FRAMESET COLS="20%,60%,20%">?

Horizontal frame Vertical Frame (PAGE 31)

Top Frame Bottom Frame


Question No: 19 ( Marks: 1 ) - Please choose one Why we use reset tag in HTML? To remove the text written in Notepad. To remove the text written in between <body> and </body>tag. To remove the text written in between <head> and </head> tag. To remove the text written in between <form> and </form> tag. (PAGE 27)

Question No: 20 ( Marks: 1 ) - Please choose one Network Interface Card is operated at Application layer Session layer Network layer Datalink layer (PAGE 6)

Question No: 21 ( Marks: 2 ) http://www.vustudents.net What value will be printed after executing the following statement in JavaScript: document.write( Math.pow(3, 2) );

document.write("Math.pow(2,3) :"+Math.pow(2,3)+"<P>");
Question No: 22 ( Marks: 2 ) What is a web server?

ANSWER:

Web server web server is a machine that serves up the web page requests of a client on the internet. It is a combination of hardware and software. Decision as regards the type of a web server is largely dependent on the volume and type of web activities. So, transaction processing sites generating dynamic pages with high traffic volumes would need web server software that is more efficient and can easily be upgraded.

Question No: 23 ( Marks: 3 ) To calculate the area of a circle the formula pi r squared is used. How would you code it in JavaScript?

<html> <script type="text/javascript"> var radius,area; radius = 10; area = Math.PI*Math.pow(radius,2); document.write("Area of circle with radius 10 is " + area ); </script> </html>

Question No: 24 ( Marks: 3 ) Name four commonly used web server operating systems. (PAGE 91) Commonly used web server operating systems are Microsoft Windows NT Server, Microsoft Windows 2000 Advanced Server, Microsoft.NET Server, Linux or Unix based operating systems such as Solaris.

Question No: 25 http://www.vustudents.net ( Marks: 5 ) Write the types of firewalls. Only names? Explain these briefly

Packet filter firewall It uses a set of rules to determine whether outgoing or incoming data packets are allowed to pass through the firewall. Circuit level firewall It is quite similar to the packet filter firewall. It also works on the basis of a set of rules for filtering packets but operates at the transport layer of the OSI Model so has greater functionality.

Application gateway firewall It operates at application layer of the OSI Model. It uses strong user authentication to verify identity of a host attempting to connect to the network using application layer protocols such us FTP. In contrast to packet filter firewall, it filters the requests rather than packets entering/leaving the network. It can block any outgoing HTTP or FTP requests. Question No: 26 ( Marks: 5 ) Write the JavaScript code which will display the following in a web page using a FOR loop:

The number is 0 The number is 1 The number is 2 The number is 3 The number is 4 The number is 5 <html> <script type="text/javascript"> var no; for (no=0; no<6 ; no++) { document.write("The number is " + no + "<br>" ); }

</script> </html>

MIDTERM EXAMINATION Spring 2010 IT430- E-Commerce (Session - 6) Solved

http://www.vustudents.net

Question No: 1

(Marks: 1) - Please choose one

For which of the following we need to know the classification of E-commerce? Market planning strategy Build Mission statement Management strategy none (not sure ) Question No: 2 ( Marks: 1 ) - Please choose one

Switch is a device that joins multiple computers together within one local area network (LAN). True (page 4) False Question No: 3 ( Marks: 1 ) - Please choose one

In which protocol, the messages are not deleted from email server. SMTP POP3 IMAP (page 18)

ICMP Question No: 4 ( Marks: 1 ) - Please choose one

How can you open a link in a new browser window? <a href="/url" target="new"> <a href="/url" target="_blank"> (page 33) <a href="/url" new> None of these Question No: 5 ( Marks: 1 ) - Please choose one

What does the Target= _top tag perform?

Loads the new page into the same frame Loads the new page into the entire window (page 33) Loads the new page into a new browser window All of the above Question No: 6 ( Marks: 1 ) - Please choose one

Which attribute is used in a tag to control the layout of element? view css (PAGE 39) Style Layout Question No: 7 ( Marks: 1 ) - Please choose one

Choose the correct HTML code line which left-align the content inside a tablecell. <td leftalign>

<td valign="left"> <td align="left">(PAGE 26) <tdleft> Question No: 8 ( Marks: 1 ) - Please choose one

Where in an HTML document is the correct place to refer to an external style sheet? In the <body> section At the end of the document In the <head> section (PAGE 39) At the top of the document Question No: 9 http://www.vustudents.net ( Marks: 1 ) - Please choose one

When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called Local Variables Global Variables Local and Global None of the above ref http://en.wikipedia.org/wiki/Local_variable Question No: 10 ( Marks: 1 ) - Please choose one

Constructor is defined as the initializing function used to create........ Instance of object Copy of object Instance / copy of object (page 69) Shallow copy of object

Question No: 11

( Marks: 1 ) - Please choose one

What does XML stand for? eXtra Modern Link X-Markup Language eXtensible Markup Language (page 74) Example Markup Language Question No: 12 ( Marks: 1 ) - Please choose one

For which of following purpose the Firewall is used ? Efficient working Protection against security attacks (page 95) Networking purpose None of these Question No: 13 PPP stands for Point to Point Protocol (page 98) Post to Post Protocol Point to Post Protocol None of these Question No: 14 ( Marks: 1 ) - Please choose one ( Marks: 1 ) - Please choose one

Which of the following is NOT processed on the client side? Cookies JavaScript CGI scripts (page 79)

Applets

Question No: 15 Firewall is used to

( Marks: 1 ) - Please choose one

I - examine the data entering the network II - examine the data leaving the network III - filter the data according to certain rules I, II and III (page 96) I only I and III only I and II only Question No: 16 ( Marks: 1 ) http://www.vustudents.net- Please choose one

Which firewall uses strong user authentication to verify identity of a host attempting to connect to the network? Packet filter firewall Circuit level firewall Application gateway firewall (page 96) Hybrid firewall Question No: 17 ( Marks: 1 ) - Please choose one

Bus networks is same as the system bus of a computer. True False (page 14) Question No: 18 ( Marks: 1 ) - Please choose one

In Style Sheets, How do you add a background color for all "<h1>" elements?

all.h1 {background-color:#FFFFFF} h1.all {background-color:#FFFFFF} h1 {background-color:#FFFFFF}(page 47) h1 {bgcolor:#FFFFFF} Question No: 19 ( Marks: 1 ) - Please choose one

How do you make each word in a text start with a capital letter? text-transform:capitalize text-transform:first_capitalize. (page 46) Cannt be possible with CSS

text-transform:uppercase Question No: 20 ( Marks: 1 ) - Please choose one

MAC address is written in Binary form 0-1 Decimal form 0-9 (page 13)

Hexadecimal form 0-f None of these Question No: 21 ( Marks: 2 )

What is a web server? Answer : Web server machine that services internet request.

Web server machine that services internet request


web server is a machine that serves up the web page requests of a client on the internet. It is a combination of hardware and software. Decision as regards the type of a web server is largely dependent on the volume and type of web activities. So, transaction processing sites generating dynamic pages with high traffic volumes would need web server software that is more efficient and can easily be upgraded.

Question No: 22

( Marks: 2 )

What does parseFloat(string) And NaN mean? The parseFloat() function parses a string and returns a floating point number. This function determines if the first character in the specified string is a number. If it is, it parses the string until it reaches the end of the number, and returns the number as a number, not as a string. The NaN property represents "Not-a-Number" value. This property indicates that a value is not a legal number. Question No: 23 ( Marks: 3 )

Write at least three rules for writing an XML code.


Rules for writing an XML code -All elements must be properly nested <outer><inner>content</inner></outer> -All attribute values must be quoted <FRIES SIZE=LARGE>

-All elements with empty content must be identified by ending in /> Question No: 24 ( Marks: 3 )

How Man in The middle Attacks operates?


Man in the middle attacks In it the attacker is able to monitor, capture and control data between sending and receiving machines. He may apply IP address spoofing technique to divert the packets to its machine, then modify the packets and resend the misleading information to the actual client. Another form of manin-the-middle attack is where the hacker is able to substitute the IP address of a genuine web site with the IP address of his own web site due to some security hole in the software that runs on a domain name server. A client would think that he is communicating or receiving the information form a genuine web site, though it would not be the case actually.

Question No: 25

( Marks: 5 )

Write the code for a web page displaying a button named "Testing". After clicking that button an alert should be displayed saying "The test is successful". <html>

<head> <script type="text/javascript"> function sndAlert() { window.alert("The test is successful!!!"); } </script> </head> <body> <FORM NAME="form1"> <INPUT TYPE="Button" name="showAlert" VALUE="Show Alert" onclick="sndAlert()"> </FORM> </body> </html> Question No: 26 ( Marks: 5 )

Differentiate between front end and back end. Answer: Front end consists of that information which is visible to the user and he can interact with the same through some interface. The back end comprises that information which resides on the server side and is used to create certain dynamic results for the user. It would include different programs or scripts that may be developed in different languages/tools. Backend is mainly used for two purposes for querying with the databases and for the maintenance of state. We can use different tools (ASP, JSP etc.) for that purpose depending upon their respective advantages/disadvantages.

MIDTERM EXAMINATION Spring 2010 IT430- E-Commerce (Session - 5)

http://www.vustudents.net
Question No: 1 ( Marks: 1 ) - Please choose one Network addresses 128--- 191 range belongs to which of the following class networks?

A B (page 10) C E

Question No: 2 ( Marks: 1 ) - Please choose one Which of the following is true for Class A: Network 01 byte and 03 hosts (page 10)

Network 02 bytes and 02 hosts

Network 03 bytes and 01 host

None of these

Question No: 3 ( Marks: 1 ) - Please choose one Which one is not included in the networking topologies?

Star Topology Bus Topology Media Topology (page 14) Ring Topology

Question No: 4 ( Marks: 1 ) - Please choose one What is the correct HTML for making a hyperlink? <a name="http://www.vu.edu.pk>Virtual university</a> <a href=" http://www.vu.edu.pk "> Virtual university </a> (page 23) <a>http://www. vu.edu.pk </a> <a url="http://www. vu.edu.pk "> Virtual university of pakistan</a>

Question No: 5 ( Marks: 1 ) - Please choose one What is the correct HTML for making a text input field?

<textinput type="text"> <input type="text"> (page 27) <input type="textfield">

<textfield>

Question No: 6 ( Marks: 1 ) - Please choose one If we leave out the target attribute in frame tag and link was clicked ,the document loads into the window In Same page (page 37) In other blank page. To display browser error. All of the options.

Question No: 7 ( Marks: 1 ) http://www.vustudents.net - Please choose one Where in an HTML document is the correct place to refer to an external style sheet? In the <body> section At the end of the document In the <head> section (repeated ) At the top of the document

Question No: 8 ( Marks: 1 ) - Please choose one How do you write a conditional statement for executing some statements only if "i" is equal to 5?

if i=5

if i=5 then if i==5 then if (i==5) ref http://www.ex-designz.net/test_page.asp?tid=65

Question No: 9 ( Marks: 1 ) - Please choose one Which of the following is used to get remote access of any computer on a network?

Trojan Horse Backdoor Virus All of these (page 94)

Question No: 10 ( Marks: 1 ) - Please choose one PPP stands for Point to Point Protocol (repeated ) Post to Post Protocol Point to Post Protocol None of these

Question No: 11 ( Marks: 1 ) - Please choose one JavaScript is mainly a ___________ language.

Server Side Scripting Cross Side Scripting Client Side Scripting (page 79) both Cross and Server Side Scripting

Question No: 12 ( Marks: 1 ) - Please choose one Inside which HTML element do we put the JavaScript? <scripting> <javascript> <script> (page 57) <js>

Question No: 13 ( Marks: 1 ) http://www.vustudents.net - Please choose one a++; is the same as which of the following? a=a*1; a=a+2; a=1+2; a=a+1; ref http://www.academictutorials.com/answers.asp?id=6

Question No: 14 ( Marks: 1 ) - Please choose one

If a web server is bombarded with thousands of HTTP requests, that would be an example of --------------. sniffing password attack man in the middle attack denial of service attack (page 95)

Question No: 15 ( Marks: 1 ) - Please choose one Outside attacks on a network include the following, EXCEPT --------------- . Password attack DoS Back doors (page 95) IP spoofing

Question No: 16 ( Marks: 1 ) - Please choose one Digital signature uses --------- . Symmetric cryptography Private key cryptography Public key cryptography Hash function ref http://www.digistamp.com/signature.htm

http://ecommerce.hostip.info/pages/271/Cryptography-Public-Private-Key.html

Question No: 17 ( Marks: 1 ) - Please choose one In star topology, If hub fails, the entire network also fails.

True

False ref http://www.exforsys.com/tutorials/networking/star-topology.html

Question No: 18 ( Marks: 1 ) - Please choose one Which one is the correct CSS syntax? h1 {font-size:72pt} h1:font-size=72pt {h1:font-size=72pt} {h1;font-size:72pt} ref http://uk.answers.yahoo.com/question/index?qid=20100308120234AAPKmAf Question No: 19 ( Marks: 1 ) - Please choose one In CSS, How do you make each word in a text start with a capital letter? text-transform:capitalize

text-transform:uppercase (correct ) text:capitalize You can't do that with CSS REFERENCE http://www.ex-designz.net/test_grade.asp?tid=37 Question No: 20 ( Marks: 1 ) - Please choose one Which of the following is the default alignment in HTML? Left Center Right None REFERENCE (question 24 in this link )

align = left|center|right|justify|char [CI] This attribute specifies the alignment of data and the justification of text in a cell. Possible values:

left: Left-flush data/Left-justify text. This is the default value for table data. center: Center data/Center-justify text. This is the default value for table headers. right: Right-flush data/Right-justify text. justify: Double-justify text. char: Align text around a specific character. If a user agent doesn't support character alignment, behavior in the presence of this value is unspecified.

Question No: 21 http://www.vustudents.net ( Marks: 2 ) What is Term Catalog Display means? (page 92)

A Static catalog is a simple list written in HTML. One has to edit the HTML code to change it. A dynamic catalog stores information about items in a database usually on a different computer accessible by the web server. It can provide photos, detailed description and search facility about the availability of items.

Question No: 22 ( Marks: 2 ) What is meant by a constructor? (page 69) It is initializing function used to create instance of an object. It is after the name of the object whose constructor it is.

Question No: 23 ( Marks: 3 ) What is meant by Shopping Cart in context of e commerce? (page 92) shopping cart was used wherein the user had to remember and type certain information. It is now replaced by electronic shopping cart/basket that keeps record of the items the customer has selected and allows customers to view the details of the items selected. The customer can add new items or remove items. To order an item, a customer simply clicks at that item option. All details of an item, including its price, product no. and order identifying information are stored automatically in the cart.

Question No: 24 ( Marks: 3 ) We have an array named my Array where this sentence is stored. Welcome to Virtual University!

If we apply str.split() method.

What will be the output of str.split()myArray(4) and str.split()myArray(2) respectively.

Str.Split split the string based on the blank spaces.

str.split()myArray(4) = blank str.split()myArray(2) = virtual

Question No: 25 ( Marks: 5 ) Describe the importance of Cryptography in internet data transfer security in E-Commerce?

It is a collection of mathematical techniques used to ensure confidentiality of information. The process of scrambling a message with the help of a key is called Encryption.

Now a days as internet is widely used. So danger of data safety and serurity also rose. Compare to its earlier use. It provide the Transaction Integrity. Tranasction detail of both the parties can be verified which help to built the confidence between business community. It provide Privacy like it provide controls to prevent third parties from geting access to the information within the transaction Without cryptography, it is doubtful that banks, businesses and individuals would feel safe doing business online. Cryptography provides the confidence to the customer that their data is safe and secure. Otherwise due to lack of confidence and doubt e-commerce business can not flourish.

Question No: 26 ( Marks: 5 ) Write a list of comparison operators in JavaScript with symbols. Comparison operators == for Equal != for not equal < for Less than <= for less than equal > for Greater than >= for Greater than equal

MIDTERM EXAMINATION Spring 2009 IT430- E-Commerce (Session - 2) http://www.vustudents.net

Question No: 1 __ ( Marks: 1 ) - Please choose one Enable Virtual private network protocol (VPN) to become a part of

Extranet .(page 98) Intranet.

Extranet and Intranet. None of these.

Question No: 2 ( Marks: 1 ) - Please choose one


Content pages relate to which of the following tag?

<iframe> <Frame> <frameset> (page 31) <noframes>

Question No: 3 __ ( Marks: 1 ) - Please choose one The attributes used by <EMBED . . .> depend on the type of ?

plugin being used Browser being used (page 38) ISP being used Sound/movie being used

Question No: 4 ( Marks: 1 ) - Please choose one Which of the following is HML tag could nt be used as CSS tag?

<style> <h1> <p> <a> (page 39)

css coding <HTML><HEAD> <STYLE TYPE="text/css"> <!-H1 { color: blue } --> </STYLE> </HEAD><BODY> <H1> A blue header </H1> </BODY></HTML> H1 { color: blue; text-align: center; } H1 { color: blue; text-align: center; } <STYLE TYPE="text/css"> <!-.myIndent { margin-left: 1.0in } --> </STYLE> The HTML tags to reference the above .myIndent class is: <H1 CLASS=myIndent>Indented Header</H1> <P CLASS=myIndent>Also this whole paragraph would be indented one inch</P> <P>but this wouldn't be indented</P>

Question No: 5 ( Marks: 1 ) - Please choose one


Which CSS tag is used to place an image that would remain when user scrolls down or up the page?

background-attachment: fixed (page 48) background-attachment: scroll background-attachment: up

__ _ ___ _ ___

__

Question No: 6___( Marks: 1 ) - Please choose one What does mean by != comparison operator?

Equal to Not
Equal Not Equal (page 58)

Question No: 7 ( Marks: 1 ) - Please choose one


For which of following purpose the Firewall is used ?

Efficient working None of these Protection against security attacks (page 96) Networking purpose

Question No: 8 ( Marks: 1 ) - Please choose one

Which one of the following certifies the binding between public key and its owner.
CA (page 101) KDC TLS Firewall

Question No: 9 __ ( Marks: 1 ) - Please choose one Choose the correct HTML tag to make a text bold <tbold> <b> (page 19) <bld> <bold>

ref http://www.w3schools.com/quiztest/quiztest.asp?qtest=HTML

Question No: 10 __ ( Marks: 1 ) - Please choose one Middleware establishes connections between ----------- .

e-commerce software and accounting system (page 92) e-commerce software and web services web services and CRM software ERP and CRM software

Question No: 11 ( Marks: 1 ) - Please choose one Firewall is used to I - examin the data entering the network II - examin the data leaving the network

III - filter the data according to certain rules

I and II only I, II and III (page 96) I and III only I only Ref http://www.webopedia.com/TERM/F/firewall.html Question No: 12 ( Marks: 1 ) - Please choose one When two or more intranets are connected to each other they form a/an ---------VPN intranet internet extranet (page 2)

Question No: 13 __ ( Marks: 1 ) - Please choose one Which one specify the amount of space between the edges of the cell and the text inside? Space tag CELLSPACING CELLPADDING FRAMESPACING

Question No: 14 ( Marks: 1 ) - Please choose one Which of the following CANNOT be a value for the 'target' attribute in anchor tag? _new _top _blank

_self

ref

_blank renders the link in a new, unnamed window _self renders the link in the current frame (useful for overriding a BASE TARGET) _parent renders the link in the immediate FRAMESET parent _top renders the link in the full, unframed window

Question No: 15 ( Marks: 1 ) - Please choose one In what form are style rules presented?

selector { property: value } selector { property=value } selector ( property: value ) selector ( property= value )

Question No: 16 __ ( Marks: 1 ) - Please choose one


What is identified by the tag <FRAMESET COLS="20%,60%,20%">? Horizontal frame Vertical Frame (page 31) Top Frame Bottom Frame

Question No: 17 __ ( Marks: 1 ) What it stands for (W3C)? Answer

World Wide Web Consortium

Question No: 18 ( Marks: 1 ) Do you agree or not that using Cascading Style Sheets one can apply an image to sections of ones page or even to individual words.

Question No: 19 ( Marks: 2 ) Which attribute is used to describe , how many times you want the sound to repeat. Discuss briefly.

Question No: 20 __ ( Marks: 3 )


What are cookies? Why these are used in web development?

Question No: 21 ( Marks: 5 )


What is the difference between physical address and logical address? Support your answer with at least two examples.

Question No: 22 ( Marks: 10 )


How can we change a Font style of a text? Write complete tag by using an example by yourself.

You might also like