PROMOTE MY BLOG: JUST CLICK BELOW BUTTON

Search Any Paper On This Blog

Thursday, December 9, 2010

Solved Midterm IT430- E-Commerce Complete Paper

MIDTERM EXAMINATION
Spring 2010
IT430- E-Commerce (Session - 5)


Question No: 1 ( Marks: 1 ) - Please choose one
Network addresses 128--- 191 range belongs to which of the following class networks?
► A
► B
► C
► E
http://www.allvupastpapers.blogspot.com/
Question No: 2 ( Marks: 1 ) - Please choose one
Which of the following is true for Class A:
► Network 01 byte and 03 hosts
► Network 02 bytes and 02 hosts
► Network 03 bytes and 01 host
► None of these
Question No: 3 ( Marks: 1 ) - Please choose one
Which one is not included in the networking topologies?
► Star Topology
► Bus Topology
► Media Topology
► Ring Topology
Question No: 4 ( Marks: 1 ) - Please choose one
What is the correct HTML for making a hyperlink?
<a name="http://www.vu.edu.pk”>Virtual university</a>
► <a href=" http://www.vu.edu.pk "> Virtual university </a>
<a>http://www. vu.edu.pk </a>
<a url="http://www. vu.edu.pk "> Virtual university of pakistan</a>
Question No: 5 ( Marks: 1 ) - Please choose one
What is the correct HTML for making a text input field?
► <textinput type="text">
► <input type="text">
► <input type="textfield">
► <textfield>
http://www.allvupastpapers.blogspot.com/
Question No: 6 ( Marks: 1 ) - Please choose one
If we leave out the target attribute in frame tag and link was clicked ,the document loads into the window
► In Same page
► In other blank page.
► To display browser error.
► All of the options.
Question No: 7 ( Marks: 1 ) - Please choose one
Where in an HTML document is the correct place to refer to an external style sheet?
► In the <body> section
► At the end of the document
► In the <head> section
► At the top of the document
Question No: 8 ( Marks: 1 ) - Please choose one
How do you write a conditional statement for executing some statements only if "i" is equal to
5?
if i=5
► if i=5 then
► if i==5 then
► if (i==5)
Question No: 9 ( Marks: 1 ) - Please choose one
Which of the following is used to get remote access of any computer on a network?
► Trojan Horse
► Backdoor
► Virus
► All of these
Question No: 10 ( Marks: 1 ) - Please choose one
PPP stands for
► Point to Point Protocol
► Post to Post Protocol
► Point to Post Protocol
► None of these
Question No: 11 ( Marks: 1 ) - Please choose one
JavaScript is mainly a ___________ language.
► Server Side Scripting
► Cross Side Scripting
► Client Side Scripting
► both Cross and Server Side Scripting
http://www.allvupastpapers.blogspot.com/
Question No: 12 ( Marks: 1 ) - Please choose one
Inside which HTML element do we put the JavaScript?
► <scripting>
► <javascript>
► <script>
► <js>
Question No: 13 ( Marks: 1 ) - Please choose one
a++; is the same as which of the following?
► a=a*1;
► a=a+2;
► a=1+2;
► a=a+1;
Question No: 14 ( Marks: 1 ) - Please choose one
If a web server is bombarded with thousands of HTTP requests, that would be an example of ---------------.
► sniffing
► password attack
► man in the middle attack
► denial of service attack
Question No: 15 ( Marks: 1 ) - Please choose one
Outside attacks on a network include the following, EXCEPT --------------- .
► Password attack
► DoS
► Back doors
► IP spoofing
Question No: 16 ( Marks: 1 ) - Please choose one
Digital signature uses --------- .
► Symmetric cryptography
► Private key cryptography
► Public key cryptography
► Hash function
http://www.allvupastpapers.blogspot.com/
Question No: 17 ( Marks: 1 ) - Please choose one
In star topology, If hub fails, the entire network also fails.
► True
► False
Question No: 18 ( Marks: 1 ) - Please choose one
Which one is the correct CSS syntax?
► h1 {font-size:72pt}
► h1:font-size=72pt
► {h1:font-size=72pt}
► {h1;font-size:72pt}
Question No: 19 ( Marks: 1 ) - Please choose one
In CSS, How do you make each word in a text start with a capital letter?
► text-transform:capitalize
► text-transform:uppercase
► text:capitalize
► You can't do that with CSS
Question No: 20 ( Marks: 1 ) - Please choose one
Which of the following is the default alignment in HTML?
► Left
► Center
► Right
► None
Question No: 21 ( Marks: 2 )
What is Term „Catalog Display means?
It provides photos, detailed description and search facility about the availability of
products or items..
It is simple list written in HTML. Some has to has to edit the HTML code to
change it. Dynamic catalog stores information in a database.
Question No: 22 ( Marks: 2 )
What is meant by a constructor?
It is initializing function used to create instance of an object. It is after the name of the object whose
constructor it is.
http://www.allvupastpapers.blogspot.com/
Question No: 23 ( Marks: 3 )
What is meant by „Shopping Cart in context of e commerce?
It is an electronic shopping cart or basket that keeps record of the items the
customer has select and allow him to view the details of the items selected.
He/she can add new items or remove items. To order an item, a customer simply
clicks at that item option. All details of that item like product No. Item name and
its price store in cart automatically.
Question No: 24 ( Marks: 3 )
We have an array named myArray where this sentence is stored. “Welcome to Virtual University!”
If we apply str.split(‟‟) method.
What will be the output of str.split(‟‟)myArray(4) and str.split(‟‟)myArray(2) respectively.
Str.Split split the string based on the blank spaces.
str.split(‟‟)myArray(4) = blank
str.split(‟‟)myArray(2) = virtual
Question No: 25 ( Marks: 5 )
Describe the importance of Cryptography in internet data transfer security in E-Commerce?
It is a collection of mathematical techniques used to ensure confidentiality of
information. The process of scrambling a message with the help of a key is called
Encryption.
Now a days as internet is widely used. So danger of data safety and serurity also
rose.
Compare to its earlier use.
It provide the Transaction Integrity. Tranasction detail of both the parties can be
verified which help to built the confidence between business community.
It provide Privacy like it provide controls to prevent third parties from geting access to the information within
the transaction
Without cryptography, it is doubtful that banks, businesses and individuals would
feel safe doing business online.
Cryptography provides the confidence to the customer that their data is safe
and secure. Otherwise due to lack of confidence and doubt e-commerce
business can not flourish.
Question No: 26 ( Marks: 5 )
Write a list of comparison operators in JavaScript with symbols.
http://www.allvupastpapers.blogspot.com/
Question No: 31 (Marks: 1)
Name any 3 E-Business models?
Ans: 1 online banking, 2: on line recruiting, 3: on line entertainment 4: e learning, 5: auction modal
Question No: 32 (Marks: 1)
What is the condition of contract to be formed?
Ans: Offer, acceptance and consideration.
Question No: 33 (Marks: 2)
Briefly describe analytical attack on public key algorithms.
Ans: Attacks on Public Key Algorithms
Key Search Attacks
The public key and its corresponding private key are linked with each other with the help of a large
composite number. These attacks attempt to derive the private key from its corresponding public key using
that number.
Analytical Attacks
Such attacks use some fundamental flaw in the mathematical problem on which the encryption system itself
is based so as to break the encryption.
http://www.allvupastpapers.blogspot.com/
.
Question No: 34 ( Marks: 2 )
Do you agree that Customization is one of the role of e-commerce in Competitive Strategy. Discuss
briefly
Ans: customization:
With the help of e-commerce the customer data can b gathered and analyze it nd customer serve it in a
better manner according to their need one can thus implement differentiation and focus strategy.
Question No: 35 (Marks: 3)
How the coin is minted by E-Cash bank?
Ans: Minting of the coin:
A long serial no. is randomly generated by the clients Cyber wallet in order to mint a coin. This serial no. is
blinded, which means that it is multiplied with a blinding factor “r” and sent to the e-cash bank for signatures.
Thus, the e-cash bank cannot see the serial no. it is signing. Key version (corresponding public key of the
bank) is also part of the coin, and is sent usually at the time of account opening. An e-cash bank may have 1
dollar signature, 5 dollar signature or 10 dollar signature etc. If the client wants to mint a coin of 2 dollars
then e-cash bank would use its private or secret key of 2 dollars to sign the serial no.
Question No: 36 (Marks: 3)
What do we mean by Relevance element of branding?
Ans: elements of branding:
There are three types of branding elements.
1: differentiation
2: relevance
3: perceived value
Question No: 37 (Marks: 3)
How lack of trust barrier can be overcome or minimized? Discuss it briefly
Ans: It is very important for online businesses to establish trusting relationships with their customers like in
the physical world where companies ensure that customers know who they are. However, it is difficult to
build trust because lack of kind of anonymity exists for companies trying to establish web presence.
So lack of trust barrier can be minimized not overcome.
http://www.allvupastpapers.blogspot.com/
Question No: 38 (Marks: 5)
What is the importance of hash function and how it is applied on Message digest?(3+2)
Ans: importance of hash function:
Hash function is one way mathematical function apply on massage digest. Result of the hash function is
unique to each message called message digest. hash function can easily convert large data into small
datum hash function is mostly use for look up the data ,findings and detecting the similar files.
How it is applied on message digest:
Message digest is obtained by applying the hash function
For instance, the client may choose the word “Bluesky” as a code. By applying a hash function on this code,
a message digest is obtain
Question No: 39 ( Marks: 5 )
Where the originator has not agreed with the addressee that the acknowledgment be
given in a particular form or by a particular method, an acknowledgment may be given by?
1: any communication, automated or otherwise, by the addressee; or
2: any conduct of the addressee, sufficient to indicate to the originator that the
electronic communication is received.”
http://www.allvupastpapers.blogspot.com/
Question No: 40 ( Marks: 10 )
Differentiate between the online businesses (E-business) with offline businesses (Traditional
business). Support your answer with solid examples.
Ans: difference between online and off line business:
On line business:
-Less investment required.
-No shop or show room is required, very less number of employees.
-Remote handling of business.
-Less expenditures of running business
Offline business:
-High customer satisfaction level.
- Large number of employees.
-existence of physically goods and services
-large number of buyers and seller.
Example:plz give in ur own words.
Question No: 41 ( Marks: 10 )
Give an example to show how members of supply chain can work together to reduce inventory,
increase quality of product, reduce production cost and increase process speed.
Examples of technology use in supply chain
Another example is of a famous computer selling brand. It realized that by increasing the amount of
information about its customers it was able to reduce amount of inventory it should hold. It decided to share
this information with other members of the supply chain by allowing its top suppliers to have access to a
secure web site which informed them about its latest sales forecasts, planned product changes or any
warranty claims etc. It also provided information about its customers and their buying pattern. Thus, it helped
suppliers to plan their own production in a much better way.
The above examples show how members of supply chain can work together to reduce inventory, increase
quality of product, reduce production cost and increase process speed.
What is quantum computing?(1)
Quantum computing is the branch of computer science that deals with the
development of cryptographic algorithms.
Reference:
(Page # 109)
What is CRM stands for?(1)
Customer Relationship Management
Reference:
(Page # 136 )
What is cyber wallet .It uses is e-cah payment system.(2)
Cyber wallet is software which is installed on the buyers computer. It stores and
manages e-coins and records every transaction.
Reference:
(Page # 116 )
What is section 3 of ETO.(3)
Section 3 of the ETO provides:
“No document, record, information, communication or transaction shall be denied legal
recognition,admissibility, effect, validity, proof or enforceability on the ground that it is in electronic form and
has not been attested by any witness”.
Reference:
(Page # 164 )
Difference between primary and support activities of porter`s model.(3)
Describe the deficiencies of ETO.(5)
How a client can prove its payment in e-cash payment system .Explain with one example.(2+3)
Take a product and implement primary and secondary activities of porter`s
model in stretagic units.(
1. <= less than equal
1.
2. >= Greater than equal
3. == for Equal
4. != not equal
5. < Less than
6. > Greater than
http://www.allvupastpapers.blogspot.com/

No comments:

Post a Comment

PLEASE COMMENT ABOUT YOUR VISIT AND MY SITE

Note: Only a member of this blog may post a comment.