IT430- E-Commerce (Session - 2) Final Term 2008

download IT430- E-Commerce (Session - 2) Final Term 2008

of 16

Transcript of IT430- E-Commerce (Session - 2) Final Term 2008

  • 7/29/2019 IT430- E-Commerce (Session - 2) Final Term 2008

    1/16

    FINALTERM EXAMINATION

    Fall 2008

    IT430- E-Commerce (Session - 2)

    Question No: 1 ( Marks: 1 ) - Please choose one

    Which of following marketing campaigns are cheap an effective way to targetpotential customers?

    Sale forces E-mail Media promotion Marketing software

    Reference: : page #133 handouts lecture #31

    E-mail marketing campaigns are cheap and effective way to target potentialcustomers. E-mails can instantaneously convey a marketing message to customersat distant areas.

    Question No: 2 ( Marks: 1 ) - Please choose one

    Do you think, vulms.vu.edu.pk is an example of E-mail marketing?

    True False

    Question No: 3 ( Marks: 1 ) - Please choose one

    RIP(Routing Information protocol) is used by---------- , to build a ------------ table

    bridges , hash routers, matrix routers , routing All of these

  • 7/29/2019 IT430- E-Commerce (Session - 2) Final Term 2008

    2/16

    Reference: : page #06 handouts lecture #02

    It is responsible for providing IP addresses on data packets using IP protocol.Routing Information

    Protocol (RIP) also operates here which enables routers to build their routing table.Another protocol,

    Address Resolution Protocol (ARP) is also designed to operate at network layer.

    Question No: 4 ( Marks: 1 ) - Please choose one

    When you declare a variable within a function, the variable can only be accessedwithin that function. When you exit the function, the variable is destroyed. Thesevariables are called

    Local Variables Global Variables Local and GlobalNone of the above

    Reference

    http://www.w3schools.com/js/js_functions.asp

    Question No: 5 ( Marks: 1 ) - Please choose one

    Constructor is defined as the initializing function used to create ........

    Instance of object Copy of object Instance / copy of object Shallow copy of object

    Reference: : page #69 handouts lecture #15

    Constructor is defined as the initializing function used tocreate instance/copy of anobject. It is after the name of the object whose constructor it is. Note that wecan

  • 7/29/2019 IT430- E-Commerce (Session - 2) Final Term 2008

    3/16

    invoke or apply different methods/functions of the date object using this instanced, e.g, d.getDay(),

    Question No: 6 ( Marks: 1 ) - Please choose one

    If user A wants to send an encrypted message to user B, the plaintext isencrypted with public key of ___________

    User A User BNetwork Both Users A and B

    How is encryption used with digital signatures

    So, if user A wants to send an encrypted message to user B, user A would firstobtain userBs public key. This is possible because public keys are meant to bewidely distributed. Then user A encrypts the message using userBs publickey. The encrypted messagecan now only be decrypted with Bs private key,which only he possesses

    Question No: 7 ( Marks: 1 ) - Please choose one

    Television, radio and print media are in a (n) . Mode.

    Passive Active Static Dynamic

    Reference: : page #139 handouts lecture #33

    Emotional branding vs. rational branding

    In case of television, radio or print media people are normally in a passive mode.

    Question No: 8 ( Marks: 1 ) - Please choose one

    http://www.cren.net/crenca/onepagers/guidebook/sectionthree.html#pgphttp://www.cren.net/crenca/onepagers/guidebook/sectionthree.html#pgphttp://www.cren.net/crenca/onepagers/guidebook/sectionthree.html#pgp
  • 7/29/2019 IT430- E-Commerce (Session - 2) Final Term 2008

    4/16

    -----------means that your product/service has certain quality that makes it moreattractive than the one offered by your competitor, despite the price of yourcompetitor s product/service is somewhat lower

    None of them Differentiation Focus Cost leadership

    Reference: : page #157 handouts lecture #38

    Differentiation

    Differentiation means that your product/service has certain quality that makes itmore attractive than the

    one offered by your competitor, despite the price of your competitorsproduct/service is somewhat lower.For instance, you can beat your competitors forthe reason that the air conditioner produced by your company is unique as it doesnot produce noise while in operation, whereas this feature is missing in the airconditioners produced by your competitors.

    Question No: 9 ( Marks: 1 ) - Please choose one

    It is the ability to sell the goods or provide the service at a price that is lower thanthat of competitors, and thus attract more customers.

    What is called?

    Cost leadership Price leadership Focus Differentiation

    Reference: : page #157 handouts lecture #38

    Cost leadership

  • 7/29/2019 IT430- E-Commerce (Session - 2) Final Term 2008

    5/16

    It is the ability to sell the goods or provide the service at a price that is lower thanthat of competitors, andthus attract more customers.

    Question No: 10( Marks: 1 ) - Please choose one

    E-business --------- strategy is normally formed and implemented according to aplanningcycle which is called strategic planning cycle.

    Differentiation Focus Competitive Diversification

    Reference: : page #159 handouts lecture #39

    Strategic Planning Cycle

    E-business competitive strategy is normally formed and implemented according toa planning cycle which iscalled strategic planning cycle.

    Question No: 11 ( Marks: 1 ) - Please choose one

    ETO Stand for??

    Electronic transaction Organization Electronic trade Organization Electronic Transactions OrdinanceNone of them

    Reference: : page #163 handouts lecture #40

    Electronic Transactions Ordinance, 2002 (ETO)

    ETO is the law introduced in 2002 which extends to the whole of Pakistan. Itbasically provides legal recognition to documents in electronic form and toelectronic signatures. To understand this law, it would be useful to revise theconcept related to the working of digital signature technology (refer to Lecture no.

  • 7/29/2019 IT430- E-Commerce (Session - 2) Final Term 2008

    6/16

    23). We shall look at salient provisions/features of this law as it directly deals withe-commerce in Pakistan. Section 2 of the ETO defines different terms used in it.For convenience these terms have been reproduced here (you do not need tomemorize these for exam).

    Question No: 12 ( Marks: 1 ) - Please choose one

    Suppose, someone circulates a news item in the media about the reputation of adoctor, alleging him to be professionally incompetent and negligent. This doctormay then file a lawsuit against that person claiming that his reputation has beeninjured due to such an act.

    Which legal issue arises due to such acts?

    Online Defamation Cyber squattingNone Cyber Crimes

    Reference: : page #182 handouts lecture #45

    Online Defamation

    A defamatory statement is a false statement that injures the reputation of on

    another person or company. If a statement injures the reputation of a product orservice instead of a person, it is calledproduct disparagement. Suppose, someonecirculates a news item in the media about the reputation of adoctor, alleging himto be professionally incompetent and negligent. This doctor may then file a lawsuitagainst that person claiming that his reputation has been injured due to such an act.Often, in cases ofdefamation the plea taken by the defendant is that his statementis not false. Rather, it is a fair comment. In case defamation is done using theinternet, it is termed as online defamation. In countries abroad, the courts arereplete with cases of online defamation, mainly, because the person causingdefamation can expect to remain anonymous due to the nature of internet

    technology.

    Question No: 13 ( Marks: 1 ) - Please choose one

  • 7/29/2019 IT430- E-Commerce (Session - 2) Final Term 2008

    7/16

    A software company may intentionally register a domain name asmacrosoft.com (a variant of domain name of the famous company Microsoft )to take advantage of the reputation of Microsoft . The idea is that someoneintending to reach the web site of Microsoft may mistype or misspell and reachthe web site of Microsoft , instead. xyz.com vs. xyz.org

    Which legal issue arises due to such acts?

    Parasites Concurrent use Cyber squattingNone

    Reference: : page #181 handouts lecture #45

    Cyber squatting

    The act of intentionally registering domain names containing trademarks/tradenames of prominent companies to later blackmail or demand ransom from thosecompanies is called cyber squatting. It isregarded as an offence in most countries.Assume there is a firm GloryEnterprise and it wants to have its web site. It alsowants to have the word glory as a part of its domain name because for years it has

    been recognized in the physical world through this word. However, at the time ofregistration of itsdomain name it finds that a person Mr. A who has nothing to do

    with the business of the firm or the word glory has already registered a domainname containing this word as a part of it. Since therecannot be two similar domainnames, the firm is forced to request Mr. A to transfer that domain nameto it. Inresponse, if Mr. A blackmails or claims ransom from the said firm, he would besaid to havecommitted cyber squatting.

    Question No: 14 ( Marks: 1 ) - Please choose one

    Big advantages of using VAN in EDI is(are):

    Time independence Protocol IndependenceNetwork independence

  • 7/29/2019 IT430- E-Commerce (Session - 2) Final Term 2008

    8/16

    Time and Protocol IndependenceReference: : page #149 handouts lecture #36

    Advantages of VAN

    Two big advantages of using a VAN in EDI are time independence and protocolindependence. Timeindependence means that the sending and receipt of theinterchange or messages can be carried out at the convenience of the usersinvolved. Thus, they are not required to be connected with each other at the sametime. Protocol independence means that interchanges are re-enveloped with thetransmissionprotocol appropriate to the recipient when they are retrieved from the

    postbox by the VAN. Thus, a VAN can provide protocol compatibility between thesender and the recipient, wherever that is missing.

    Question No: 15 ( Marks: 1 ) - Please choose one

    An array can contain ----------.

    only text only numbers only numbers or text any valid variable

    Question No: 16 ( Marks: 1 ) - Please choose one

    Choose which one is the not the columns of Log files.

    IP addresses Request (url) Date Contents

    Reference: : page #136 handouts lecture #32

    Log files consist ofdata generated by site visits and include information about eachvisitors location, IP address, time of visit, frequency of visits etc. There are

  • 7/29/2019 IT430- E-Commerce (Session - 2) Final Term 2008

    9/16

    businesses that provide the services of analyzing web log files. The results wouldshow how effective your web site is and indicate the top-referring web sites.

    Question No: 17 ( Marks: 1 ) - Please choose one

    JSP uses which programming language for coding?

    C++ VBSCRIPT JAVASCRIPT JAVA

    Reference: : page #85 handouts lecture #18

    VBScript and JSP uses Java programming language for coding.

    Question No: 18 ( Marks: 1 ) - Please choose one

    In Style Sheets, How do you display hyperlinks without an underline?

    {underline:none} {text-decoration:no underline} {decoration:no underline} a {text-decoration:none}

    Reference:

    http://www.geekinterview.com/question_details/57379

    Question No: 19 ( Marks: 1 ) - Please choose one

    Symmetric algorithms are faster than asymmetric.

    True False

    Reference: : page #85 handouts lecture #18

    http://www.geekinterview.com/question_details/57379http://www.geekinterview.com/question_details/57379http://www.geekinterview.com/question_details/57379
  • 7/29/2019 IT430- E-Commerce (Session - 2) Final Term 2008

    10/16

    symmetric algorithms are faster as compared to asymmetric, therefore, theencryption of a message with the symmetric key takes place quickly. In order tosend the symmetric key to the receiver, however, the asymmetric cryptography hasto be used. PGP uses this system.

    Question No: 20 ( Marks: 1 ) - Please choose one

    ACH is a centralized system used by electronically inter-connected

    banks for clearing payment requests.

    True False

    Reference: : page #110 handouts lecture #24

    The transfer takes place with the help of Automated Clearing House (ACH)service. Note that

    an ACH is a centralized system to which different banks are electronicallyconnected forming a network for clearing payment requests.

    Question No: 21 ( Marks: 1 ) - Please choose one

    The basic difference between Virtual PIN System and Electronic Check is_________.

    Registration with bankNo. of participants Use of encryptionNo difference between them

    Virtual PIN Payment System

    It is one of the earliest credit card-based systems launched for the internet in 1994by a company; First Virtual Holdings, Inc. Virtual PIN system does notinvolve the use of encryption.

  • 7/29/2019 IT430- E-Commerce (Session - 2) Final Term 2008

    11/16

    An electronic check contains an instruction to thepayers bankto make a specifiedpayment to a payee. Both, symmetric and asymmetric type of cryptography is usedin this system

    Question No: 22 ( Marks: 1 ) - Please choose one

    An e-coin consists on ________ elements.

    Four One Two Three

    E-cash Coins

    The currency used in this payment system is called an e-cash coin or simply coin.A coin consists of three elements or parts - serial #, key version and serial no.signed by the secret or private key of a certain denomination of the e-cash bank.

    Question No: 23 ( Marks: 1 ) - Please choose one

    Which currency is used in e-cash Payment system?

    Dollar Coin Penny Cent

    Reference: : page #116 handouts lecture #26

    E-cash Coins

    The currency used in this payment system is called an e-cash coin or simply coin.A coin consists of three elments or parts - serial #, key version and serial no.

    signed by the secret or private key of a certaindenomination of the e-cash bank. Inother words, a coin of one dollar would consist of the following:

    Coin = Serial#, keyversion, {Serial #}SKbanks $1 key

  • 7/29/2019 IT430- E-Commerce (Session - 2) Final Term 2008

    12/16

    uestion No: 24 ( Marks: 1 ) - Please choose one

    An e-business is defined by the company s _____________.

    Policy Operations Technology All of above

    Reference: : page #125 handouts lecture #28

    E-Business

    An e-business is defined as a company/entity that has an online presence. E-businesses that have the ability to sell, trade, barter or transact over the web can beconsidered as e-commerce businesses. An e-business model is defined by acompanys policy, operations, technology and ideology.

    Question No: 25 ( Marks: 1 ) - Please choose one

    Electronic catalogues have advantage over paper catalogues.

    True False

    Reference: : page #126 handouts lecture #29

    Electronic catalogues

    Electronic catalogues are used in case of an online shop. They have manyadvantages over paper catalogues. Therefore, online shopping can be done morequickly and in a more convenient environment.

    Question No: 26 ( Marks: 1 ) - Please choose one

    Which of the following is an advantage of electronic catalogue?

    Large fix cost if used for small no. of products.

  • 7/29/2019 IT430- E-Commerce (Session - 2) Final Term 2008

    13/16

    Ability of updating product information.Need for customer skill of computers and browsers. Difficult to develop catalogue.

    Question No: 27 ( Marks: 1 ) - Please choose one

    In online business, market research becomes slower than offline business.

    True. False.

    Question No: 28 ( Marks: 1 ) - Please choose one

    Which of these is NOT a stage of knowledge discovery process?

    Transformation Data mining Pattern evaluation Process evaluation

    Reference: : page #140 handouts lecture #34

    Knowledge discovery

    A knowledge discovery process includes data cleaning, data integration, dataselection, data transformation, data mining, pattern evaluation and knowledge

    presentation.

    Question No: 29 ( Marks: 1 ) - Please choose one

    OLAP is ____________ view of data.

    1-dimentional 2-dimentional 3-dimentional 4-dimentional

    Reference: : page #145 handouts lecture #35

  • 7/29/2019 IT430- E-Commerce (Session - 2) Final Term 2008

    14/16

    item type and location are the three dimensions. OLAP data cube

    indicates the sale of 605 and 825 units of furniture and computers, respectively, inthe first quarter of the year in Lahore, 440 units of furniture and 345 phone sets inKarachi in the first quarter, respectively, and 400 grocery items in Lahore duringsecond quarter. Results can be displayed through data cube against morethan threedimensions.

    Question No: 30 ( Marks: 1 ) - Please choose one

    Which of these is NOT an advantage of e-banking?

    Get current account balances at any time. Handle your finances from any location. Get more money than your actual balance. Transfer money between accounts.

    Reference: : page #150 handouts lecture #36

    Advantages of e-banking

    Get current account balances at any time

    Obtain credit card statements

    Pay utility bills

    Download account information

    Transfer money between accounts

    Send e-mail to your bank

    Manage your own schedule

    Handle your finances from any location

  • 7/29/2019 IT430- E-Commerce (Session - 2) Final Term 2008

    15/16

    Apply for loans online

    Question No: 31 ( Marks: 1 )

    What is Quantum computing?

    Question No: 32 ( Marks: 1 )

    what are the three attacks on symmetric key algorithms?

    Question No: 33 ( Marks: 2 )

    What do we mean by the anonymity in E-Cash Payment system?

    Question No: 34 ( Marks: 2 )

    Define these two terms plaintiff and defendant?

    Question No: 35 ( Marks: 3 )

    What is E-business? Differentiate it with E-Commerce with the help of real lifeexamples.

    Question No: 36 ( Marks: 3 )

    Identify the upstream activities in supply chain of a milk processing?

    Question No: 37 ( Marks: 3 )

    Briefly elaborate the concept of Perceived Value as an element of branding?

    Question No: 38 ( Marks: 5 )

    What is branding? What elements should be considered to create and maintain asuccessful brand?

    Question No: 39 ( Marks: 5 )

  • 7/29/2019 IT430- E-Commerce (Session - 2) Final Term 2008

    16/16

    How industry value chain proceeds on? Explain with the help any real lifeexample.

    Question No: 40 ( Marks: 10 )

    How SWOT Analysis is helpful in our business development and strategicdecisions? Explain with

    the help of an example

    Question No: 41 ( Marks: 10 )

    Give an example to show how members of supply chain can work together to

    reduce inventory, increase quality of product, reduce production cost and increase

    process speed.