Pages

Friday, August 20, 2010

IT430- E-Commerce (Session - 3) (Part 1 of 2)


FINALTERM EXAMINATION

Spring 2010

IT430- E-Commerce (Session - 3)

Question No: 1 ( Marks: 1 ) - Please choose one

In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last …………………withdrawals to the E-bank.

10

12

18

16 P:119

Lost Coins

In case network fails or computer crashes during payment transaction, coins might be lost. All signed blinded coins from last 16 withdrawals are sent by the bank to the client. Client uses the blinding factor

Question No: 2 ( Marks: 1 ) - Please choose one

Which entity does not include in SET(secure Electronic Transaction)?

Seller

Buyer

Payment gateway

Bank P:122

There are four entities involved in a SET transaction – cardholder, Merchant and certification authority and payment gateway.

Question No: 3 ( Marks: 1 ) - Please choose one

Traditionally Marketer use the market segmentation(s) like

Geo-graphic Segmentation

Demographic Segmentation

Psychographic Segmentation

All of the above P:131

Traditionally, marketers have used three types of variables to define three different market segmentations, namely, geographic segmentation, demographic segmentation and psychographic segmentation.

Question No: 4 ( Marks: 1 ) - Please choose one

Class C has:

Network 01 byte and 03 hosts

Network 02 bytes and 02 hosts

Network 03 bytes and 01 host P:10

None of these

In class C, first three bytes refer to the network address and the last byte to the host

machines on that network, which would therefore be a very small network.

Question No: 5 ( Marks: 1 ) - Please choose one

In ring topology, failure of network cable will only take down one computer’s network access.

True

False

Question No: 6 ( Marks: 1 ) - Please choose one

Which device uses the IP address

Switch

Router P:16

A router is a decision making device. When a data packet arrives at a router it reads the network addresses from the IP address on the data packet and determines the shortest possible path through which this packet can be delivered to its destination.

Repeater

None of these

Question No: 7 ( Marks: 1 ) - Please choose one

What is the correct HTML for inserting an image?

P:21

On Sale Cassettes

image.gif

Question No: 8 ( Marks: 1 ) - Please choose one

Cryptographic Algorithms are measured in terms of

Key length P:108

Cryptographic algorithms are measured in terms of key length.

Complexity

Simplicity

All of the above

Question No: 9 ( Marks: 1 ) - Please choose one

Upstream activities relate to?

Materials/services or the input from suppliers P:155

Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities.

· Upstream activities relate to materials/services or the input from suppliers

· Internal activities relate to manufacturing and packaging of goods

· Downstream activities relate to distribution and sale of goods to distributors/customers

Manufacturing and packaging of goods

Distribution and sale of goods to distributors/customers

Input from suppliers and Distribution

Question No: 10 ( Marks: 1 ) - Please choose one

Television, radio and print media are in a (n) ……………………. Mode.

Passive P:139

Emotional branding vs. rational branding

In case of television, radio or print media people are normally in a passive mode. To a greater extent they do not control the communication channel and thus have to listen or view the advertisement about a brand.

Active

Static

Dynamic

Question No: 11 ( Marks: 1 ) - Please choose one

Which of the following Barriers to International E-Commerce?

Advertising

Patents

Infrastructure P:161

Barriers to International e-commerce

Barriers to international ecommerce include lack of trust, lack of infrastructure, language and culture.

Capital

Question No: 12 ( Marks: 1 ) - Please choose one

Exclusive right granted by law to make, use and sell an invention. What is called?

Parasites

Trade mark

Patent infringement P:181

Patent infringement

A patent is an exclusive right granted by law to make, use and sell an invention. In order to be patentable, the invention must be unique, genuine, and useful according to the prevalent technological standards.

Copyright

Question No: 13 ( Marks: 1 ) - Please choose one

Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act.

Which legal issue arises due to such acts?

Cyber Crimes

Online Defamation P:182

Online Defamation

A defamatory statement is a false statement that injures the reputation of on another person or company. If a statement injures the reputation of a product or service instead of a person, it is called product disparagement.

Cyber squatting

None

Question No: 14 ( Marks: 1 ) - Please choose one

Characterization and Clustering belong to which of the following types of Data Mining?

Additive

Predictive

Selective

Descriptive P:141

Types of Data Mining

There are four main types of data mining as follows:

· Classification

· Association

· Characterization

· Clustering

Classification and association are predictive types of data mining while characterization and clustering represent the descriptive type.

Question No: 15 ( Marks: 1 ) - Please choose one

EDI stands for……..

Electronic Digital Information

Electronic Data Integration

Electronic Data Interchange P:147

Lesson 36

ELECTRONIC DATA INTERCHANGE (EDI)

All of these

Question No: 16 ( Marks: 1 ) - Please choose one

Implementing Value Chain model can help us to…

Reduce cost

Improve quality of products

Create new ways of selling products

All of these. P:153

Examining value chains one finds that EC can help in four different ways as follows:

It can reduce costs of a business;

It can improve quality of products

It can help in reaching new customers or suppliers;

It can create new ways of selling products.

Question No: 17 ( Marks: 1 ) - Please choose one

Following are malicious programs EXCEPT ----------------- .

Back doors

Trojan Horses

Firewalls P:96

Lesson 21

FIREWALLS

A firewall is a combination of hardware and software that sits between the internet and internal network of an organization to protect the network from outside attack (Fig. 1). It can examine the data entering or leaving from the network and can filter the data according to certain rules, thus, protects the network from an attack.

Worms

Question No: 18 ( Marks: 1 ) - Please choose one

Which of the following is a valid variable name?

6th_student_CGPA

first_student_CGPA P:54

Rules for variables

Variable names can begin with an uppercase letter (A-Z), lower case letter (a-z), an underscore character (_), or dollar sign ($). Remaining characters can be any of the above or from digits (0-9). In JavaScript variables are case sensitive.

last student CGPA

*any_student_CGPA

Question No: 19 ( Marks: 1 ) - Please choose one

Which of the following payment mode does not require customer to pay interest to the bank on each transaction?

Credit card

Debit card P:110

Note that in case of a credit card the issuer bank charges interest from the client at a specified rate on the amount lent. On the other hand, in case of a debit card no such interest is payable since the customer uses his/her own money in that case.

Electronic check

All of the above

Question No: 20 ( Marks: 1 ) - Please choose one

FVIPSS stands for _________.

First Virtual Internet Payment System Server P:110

First Virtual InternePayment System Server

First Virtual International Payment System Server

First Virtual International Payment System Services

First Virtual Internal Payment System Services

Question No: 21 ( Marks: 1 ) - Please choose one

Which e-business helps to improve policies, procedures, customer services, and general operations of other businesses?

Online shopping malls.

Selling intellectual property online.

Online service providers. P:129

Online Service Providers

These e-businesses help improve policies, procedures, customer service and general operations of other businesses. They can provide consultancy / professional services, for example, web site development services, online legal consultancy services etc.

Online automotive sites and energy online.

Question No: 22 ( Marks: 1 ) - Please choose one

Which of the following is NOT an identified behavioral mode of customers on the web?

Browsers

Buyers

Behavioral segmentation

Creation of separate experiences for customers based on their behavior is called

Three identified behavioral modes of the customers on the web are:

· Browsers – customers who just browse through the site with no intention of buying

· Buyers – customers who are ready to buy right away

· Shoppers – customers who are motivated to buy but want more information

Shoppers

Seller

Is this blog is useful for you?

Powered by Blogger.