Professional Documents
Culture Documents
Spring 2010
IT430- E-Commerce (Session - 3)
Margins(page 50)
margin-top: specifies the size of the top margin margin-right: specifies the size of the right
margin marginbottom: specifies the size of the bottom margin margin-left: specifies the size
of the left margin margin: specifies the size of all the margins in the order, margin-top,
margin-right, margin-bottom and margin-left
(PAGE 181)
CYBER SQUATTING
THE ACT OF INTENTIONALLY REGISTERING DOMAIN NAMES CONTAINING
TRADEMARKS/TRADE NAMES OF PROMINENT COMPANIES TO LATER
BLACKMAIL OR DEMAND RANSOM FROM THOSE COMPANIES IS CALLED
CYBER SQUATTING.
Question No: 11 ( Marks: 1 ) - Please choose one
In which type of data mining, Apriori algorithms is used?
► Classification
► Association
► Characterization
► Clustering
(page 122)
The drawback in SSL that the credit card/debit card information remains with the merchant
led to the development of a more sophisticated protocol called SET.
Question No: 18 ( Marks: 1 ) - Please choose one
Dividing market, with respect to people having income level greater than Rs 30000, is geographic
segmentation.
► True.
► False.
(HANDOUT PAGE 131)
Question No: 19 ( Marks: 1 ) - Please choose one
Data cleaning means ________.
► Adding missing values
► Correction of erroneous values
► Both of above
► None of above
(PAGE 141)
DATA CLEANING MEANS THAT MISSING VALUES SHOULD BE PROVIDED IN
DIFFERENT FIELDS/COLUMNS WHEREVER NEEDED AND ANY IMPOSSIBLE
OR ERRONEOUS VALUES SHOULD BE SUBSTITUTED BY
CORRECT/REASONABLE ONES.
(PAGE 118)
ANONYMITY IN E-CASH SYSTEM MEANS THAT THE IDENTITY OF THE
CLIENT/BUYER IS NOT DISCLOSED. NOTE THAT THERE ARE TWO MAIN
STAGES IN THIS PAYMENT MECHANISM – MINTING STAGE AND DEPOSIT
STAGE.
Question No: 29 ( Marks: 1 ) - Please choose one
What is/are the advantages of EDI?
► No paper work
► No human intervention
► Exchange of information takes place in seconds
► All of Above
(PAGE 147)
Question No: 30 ( Marks: 1 ) - Please choose one
The term “Appropriate Authority” includes ______________ legislative assemblies
►2
►3
►5
►4
(PAGE 165)
GENERALLY SPEAKING THE TERM ‘APPROPRIATE AUTHORITY’ INCLUDES
THE FIVE LEGISLATIVE ASSEMBLIES
FINALTERM EXAMINATION
Spring 2010
IT430- E-Commerce
Time: 90 min
Marks: 60
► Offline business
► Online business
► Engineering
► Building
These two terms refer to the offline and the online businesses,
respectively. Where a company is doing its business both online and
offline, there is often the problem of lack of proper integration
between the two different channels of business.
Note: Offline business = Brick-and-Mortar
Which of the following option best represent “Data mining can improve response rate
tremendously”?
► Direct mailing
► Personalization technology
► E-business
► Opt-in e-mail
Which of following services build a strong customer loyalty towards company and its
products?
► Customer services
► Public relations(PR)
► Bulletin board
► Exhibitions.
Visitor’s location, IP address, time of visit related information are added, in which of the
following
► cookies
► log files
Track the customers online and do personalization is only possible through which of the
following file(s) analysis.
► log files
► cookie
► data mining
► True
► False
► response.write("Hello World")
► document.write("Hello World")
► ("Hello World")
► “Hello world”
Ref: PAGE # 57
<html>
<head>
<SCRIPT language="JavaScript">
Document.container .result.value=parseFloat(num1)-parseFloat(num2)
</script>
</head>
<body>
<FORM name=”---------1-----------”>
</form>
</body>
</html>
► Child element
► Root element
► <?xml version="1.0"?>
► <XML>
Ref: PAGE # 76
In given XML code, which of following element represents the highlighted node.
<?xml version="1.0"?>
<note>
<to>Mr.Riaz</to>
<from>Aamer</from>
<heading>Reminder</heading>
</note>
► Property
► Root
► Child
► Nothing
(page 76)
► Software
► Hardware
► None of these
► None of these
There are three participants in it, namely, buyer, merchant and bank.
Question No: 13 ( Marks: 1 ) - Please choose one
► Advertising
► Patents
► Infrastructure
► Capital
In which type of approach, we further dig the data for retrieving information from data
warehouse?
► Slice
► Dice
► Drill down
► Roll up
Using drill-down we can further dig the data to receive some specific
information. For example using that I can find the sale of furniture in a
specific month of the first quarter, say, February. Roll-up is the
reverse of drill-down.
Where there are quite a few erroneous or missing values in a row then that row can be
deleted or discarded. This process is called...............
► Data Deletion
► Data Selection
► Data Integration
► Data Transformation
► Technology Development
► All of these.
► obj.method
► obj.method[]
► obj.method()
► obj-method
Ref:
http://bytes.com/topic/javascript/answers/857483-using-
event-handler-call-obj-method-within-method
► Dollar
► Coin
► Penny
► Cent
► Store coins
► Manage Coins
► Record transactions
Cyber wallet stores and manages coins and records every transaction.
Which of these is a rule about bondage or affinity of two items such that if one item is
purchased, the other is purchased too?
► Classification
► Association
► Characterization
► Clustering
Association:
► Cyber banking
► Virtual banking
► Online banking
► All of above
Electronic Banking:
A patent is an exclusive right granted by law to make, use and sell an invention. In order
to be patentable, the invention must be unique, genuine, and useful
► Unique
► Genuine
► Useful
Patent infringement:
------------ wrongs such as breach of contract are deemed to violate only the rights of
individuals and not the society in general.
► Criminal
► Civil
► Plentiful
► None
Ref: PAGE # 176
Civil wrongs such as breach of contract are deemed to violate only the
rights of individuals and not the society in general.
In the physical world three elements must be satisfied in order to make a valid contract,
namely, offer, ---------------- and ----------
► None
Online contracts:
Ref: PAGE # 27
The form data is shipped to the URL specified by the <form> tag’s
action attribute.
► none of above
A ------------- is a program that scans web sites and forms a list of relevant sites based on
keywords.
► An Application
► Search Engine
► Operating System
► Device Drivers
A search engine is a program that scans web sites and forms a list of
relevant sites based on keywords
Question No: 29 ( Marks: 1 ) - Please choose one
► No paper work
► No human intervention
► All of Above
EDI include:
• No paper work
• No human intervention
►2
►3
►5
►4
Page # 58
Operators in java script
Mathematical operators ‘+’ For addition of two values ‘-‘ for subtraction of two values ‘*’ for
multiplication ‘/’ for division ‘%’ modulus (for calculating the remainder) ‘++’ for increment ‘--‘ for
decrement Logical operators ‘&&’ for logical and ‘||’ for logical or ‘!’ for logical not
http://books.google.com/books?id=U69Hzz2jLPUC&pg=PA102&dq=What+does+%2B
%2B+operator+do%3F&hl=en&ei=JsAZTd7-
MIabOrqFzbYJ&sa=X&oi=book_result&ct=result&resnum=10&ved=0CFAQ6AEwCQ
#v=onepage&q=What%20does%20%2B%2B%20operator%20do%3F&f=false
FINALTERM EXAMINATION
Spring 2010
IT430- E-Commerce (Session - 3)
In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded
signed coins from last …………………withdrawals to the E-bank.
► 10
► 12
► 18
► 16
In case network fails or computer crashes during payment transaction, coins might be lost. All
signed blinded coins from last 16 withdrawals are sent by the bank to the client.
► Seller
► Buyer
► Payment gateway
► Bank
(PAGE 122)
► Geo-graphic Segmentation
► Demographic Segmentation
► Psychographic Segmentation
page 131
Class C has:
► None of these
PAGE 10
In ring topology, failure of network cable will only take down one computer’s network access.
► True
► False
page 14
► Switch
► Router
► Repeater
► None of these
page 15
► image.gif
► Key length
► Complexity
► Simplicity
(PAGE 108)
Question No: 9 ( Marks: 1 ) - Please choose one
page 154
► Passive
► Active
► Static
► Dynamic
In case of television, radio or print media people are normally in a passive mode
► Advertising
► Patents
► Infrastructure
► Capital
Ref: page 161
Barriers to international ecommerce include lack of trust, lack of infrastructure, language and
culture.
Exclusive right granted by law to make, use and sell an invention. What is called?
Parasites
► Trade mark
► Patent infringement
► Copyright
A patent is an exclusive right granted by law to make, use and sell an invention.
Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him
to be professionally incompetent and negligent. This doctor may then file a lawsuit against that
person claiming that his reputation has been injured due to such an act.
► Cyber Crimes
► Online Defamation
► Cyber squatting
► None
Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him
to be professionally incompetent and negligent. This doctor may then file a lawsuit against that
person claiming that his reputation has been injured due to such an act.
Characterization and Clustering belong to which of the following types of Data Mining?
► Additive
► Predictive
► Selective
► Descriptive
Classification and association are predictive types of data mining while characterization and
clustering represent the descriptive type.
► All of these
page 147
► Reduce cost
► All of these.
► Back doors
► Trojan Horses
► Firewalls
►Worms
Page 94
► 6th_student_CGPA
► first_student_CGPA
► *any_student_CGPA
Which of the following payment mode does not require customer to pay interest to the bank on each
transaction?
► Credit card
► Debit card
► Electronic check
(PAGE 110)
Which e-business helps to improve policies, procedures, customer services, and general operations
of other businesses?
Which of the following is NOT an identified behavioral mode of customers on the web?
► Browsers
► Buyers
► Shoppers
► Seller
Browsers – customers who just browse through the site with no intention of buying
Shoppers – customers who are motivated to buy but want more information
► True
► False
page 155
► True
► False
Ref:
to start online banking a company does not require heavy investment in constructing buildings
(branch offices), hiring staff etc. as required in traditional banking.
► Cryptography services
► Originator
► Addressee
Law is broadly divided into two classes on the basis of nature of wrong, namely, ------------ and ---------
------
► None
Law is broadly divided into two classes on the basis of nature of wrong, namely, civil law and
criminal law.
► Physical layer
► Datalink layer
► Session layer
► Network layer
(PAGE 6)
► true
► false
► 1996
► 1997
► 1998
► 1999
page 122
page 165
FINAL TERM EXAMINATION
Spring 2010
IT430- E-Commerce (Session - 1)
Time: 90 min
Marks: 60
Question No: 1 ( Marks: 1 ) - Please choose one
JIT Stands for
► Just In Tim
► Joint investigation Technique
► Join in Training
► Just In Total
Page 147 :For instance, packaging material should only be ordered for just in time
(JIT) delivery,
Question No: 2 (Marks: 1) - Please choose one
JIT concept means
► No distribution channel
► No warehousing
► Easily delivery
► No communication
(PAGE 147)
Question No: 3 ( Marks: 1 ) - Please choose one
Press release can provide information about current events and news to, which of following,
via a internet?
► Print media
► T.v commercial
► Press or media
► T.v program.
Page 135: Press releases can provide information about current events and other
important news to the press or media via internet.
► Cryptographic Algorithm
► Authentication methods
► Security layers
► Just In Time
► Join in Training
► Just In Total
Question No: 3 ( Marks: 1 ) - Please choose one
► Offline business
► Online business
► Engineering
► Building
(PAGE 129)
► Online journals
You can add names to each frame window using which setting ?
► src
► ur
► name
► name_frame
► if i=5
► if i=5 then
► if i==5 then
► if (i==5)
► Math.PI : Math.PI
► Math.PI : 3.141592653589793
► Math.PI : 3.141592653589793+<p>
► 3.141592653589793, Math.PI :
Question No: 9 ( Marks: 1 ) - Please choose one
► Stateless
► Stateful
► Temporary
► All of these
Supply chain can be broken into three parts, that is ----------------- , -----------------------
and -------------------- activities.
► Internal, external support
► None of them
(PAGE 155)
In many countries, stealing and misusing of meta information for getting competitive
advantage is considered as an offence known as
► Defamation
(PAGE 138)
► Government regulation
► Economy of scale,
► Globalization
► All options
► Advertising
► Patents
► Infrastructure
► Capital
(PAGE 163)
A company collecting information assumes that the customer does not object to a specific
use of information unless the customer specifically denies the permission. Thus, the
ompany may use the collected information for its own purpose, as well as, sell or rent it
out to other firms or persons.
Which of the following Approach it is using?
► Opt-inout
► Swap-out
► Opt-in
► Opt-out
(PAGE 183)
In more common opt-out approach, the company collecting information assumes that the
customer does not object to a specific use of information unless the customer specifically
denies the permission. Thus, the company may use the collected information for its own
purpose, as well as, sell or rent it out to other firms or persons.
Which type of Data Mining contains the elements as Support and confidence?
► Classification
► Association
► Characterization
► Clustering
(PAGE 144)
► Classification
► Association
► Characterization
► Clustering
(PAGE 141)
► Classification
► Association
► Characterization
► Clustering
(PAGE 143)
► var mynum = 6;
► Math.mynum = 6;
►<
►>
►=
► !=
Comparison operators
‘==’ for Equal
‘!=’ for not equal
‘< ‘ for Less than
‘<=’ for less than equal
‘>’ for Greater than
‘>=’ for Greater than equal
► None of above
(PAGE 105)The advantage of using symmetric key is that since symmetric algorithms are
faster as compared to asymmetric, therefore, the encryption of a message with the symmetric
key takes place quickly.
Which of the following payment mode does not require customer to pay interest to
the bank on each transaction?
► Credit card
► Debit card
► Electronic check
► All of the above
► Less privacy.
► Less security.
http://www.jcmax.com/advantages.html
Suppose you are running a business. You want to target customers of age less than 30
years. Which type of segmentation would you use?
► Demographic Segmentation
► Geographic Segmentation
► Psychographic segmentation
► Behavioral segmentation
(PAGE 131)
► Demographic Segmentation.
► Geographic Segmentation.
► Psychographic segmentation.
► Behavioral segmentation.
(PAGE 131)
► 50%
► 60%
► 70%
► 80%
(PAGE 143)
Which of these is a rule about bondage or affinity of two items such that if one item is
purchased, the other is purchased too?
► Classification
► Association
► Characterization
► Clustering
► Data square
► Data Triangle
► Data cube
► Data circle
(PAGE 145)
► None
(PAGE 182)
FINALTERM EXAMINATION
Spring 2010
IT430- E-Commerce
Time: 90 min
Marks: 60
► Known
► Unknown
► Kept Secret
► Informed
Deposit Stage
► Demographic segmentation
► Behavioral segmentation
► Geo-Graphic Segmentation
Behavioral segmentation:
Let us, suppose that you have hosted your e-commerce website,
► online
► offline
Promotions:
► <a href="http://www.w3schools.com">W3Schools</a>
► <a name="http://www.w3schools.com">W3Schools.com</a>
► <a url="http://www.w3schools.com">W3Schools.com</a>
► <a>http://www.w3schools.com</a>
Ref: PAGE # 23
► None of these
Ref: PAGE # 50
The transfer takes place with the help of Automated Clearing House
(ACH) service.
► Serial#
► Private key
► Instruction
A company ABC web page divided into four segments can be unpleasant to a Japanese
visitor because no. four is a symbol of death in that culture. Which is the international
barrier it is having?
► Culture
► Language
► Lack of trust
► Infrastructure
► Parasites
► Concurrent use
► Cyber squatting
► None
Parasites:
A company collecting information assumes that the customer does not object to a
specific use of information unless the customer specifically denies the permission. Thus,
the company may use the collected information for its own purpose, as well as, sell or
rent it out to other firms or persons.
► Opt-inout
► Swap-out
► Opt-in
► Opt-out
Page # 183
► Slice
► Dice
► Drill down
► Roll up
Using drill-down we can further dig the data to receive some specific
information. For example using that I can find the sale of furniture in a
specific month of the first quarter, say, February. Roll-up is the
reverse of drill-down.
► authenticity
► integrity
► non-repudiation
► all of them
Digital/electronic signature:
Where in an HTML document is the correct place to refer to an external style sheet?
► In the <body> section
Ref: PAGE # 39
Use <Link> tag inside a web page header to apply these style
definitions.
mystyles.css:
h1{color:red}
p{font-size:34pt}
► True
► False
► Identify customers
► True
► False
SUPPLY CHAIN:
Supply chain includes all the activities associated with the flow and
transformation of goods from the raw materials stage all the way to
the end user. Supply chain can be broken into three parts, that is,
upstream activities, internal activities and downstream activities…
document from its original form to one that cannot be understood or decoded by any
unauthorized person
► Cryptography services
► Originator
► Addressee
► True
► False
Law is broadly divided into two classes on the basis of nature of wrong, namely, ---------
--- and ---------------
► None
► True
► False
META INFORMATION:
► Physical layer
► Datalink layer
► Session layer
► Network layer
Ref: PAGE # 4
Each layer (except physical layer) at the sending machine sends
instructions through its header to the receiving machine as to how the
accompanying data be interpreted or treated by the receiving
machine.
If 140.57 is network address and 220.200 is machine address then which class of
network it is?
►A
►B
►C
►D
Ref: PAGE # 11
Examples
Class A: 255.0.0.0
Class B: 255.255.0.0
Class C: 255.255.255.0
Classification and Association belong to which of the following types of Data Mining?
► Selective
► Predictive
► Descriptive
► Additive
Ref: PAGE # 141
► 1996
► 1997
► 1998
► 1999
► Online businesses
► Offline businesses
► Both
► None of above
Which tag holds the key information about the Web Page?
► META
► HEAD
► BODY
► HTML
META INFORMATION:
► None
FINALTERM EXAMINATION
Fall 2008
Secret
Unknown
Known
None of these
Minting Stage
Deposit Stage
Product, place, price and promotion are generally recognized as the 4 P’s of marketing in
relation to traditional offline businesses.
Customer Segmentation
Customer Awareness
These five stages are also called customer life cycle. Using them to create groups of
customers is called customer life-cycle segmentation. Segment information is useful for
companies to develop better relationship with the customers. Companies, thus, know about
their customers and their level of relationship with the company, and can customize their
product/service.
None of these
Reference: Page # 13
http://en.wikipedia.org/wiki/MAC_address
SMTP
POP3
IMAP
xxx@yyy
href="mailto:xxx@yyy">
In order to create a mailto link, one should use the following syntax:
Target=“_self” – loads the new page into the same frame that contains the link
Target=“_top” - loads the new page into the entire window Target=“_blank” –
loads the new page into a new browser window
Serial#
Private key
Instruction
Spider
Scorpion
Moon
Cobweb
Reference: : page #138
Many search engines rank the site by using a program called ‘spider’
Exclusive right granted by law to make, use and sell an invention. What is called?
Parasites
Trade mark
Patent infringement
Copyright
Copyright in cyberspace
Predictive
Selective
Descriptive
Additive
Human Resources
Technology Development
All of these.
True
False
Reference: : page # 5
UDP which does not use any system of acknowledgment for the delivery of data packets.
obj.method
obj.method[]
obj.method()
obj-method
Repeated
Question
6th_student_CGPA
first_student_CGPA
last student CGPA
*any_student_CGPA
Reference: : page # 54
Variable names can begin with an uppercase letter (A-Z), lower case letter (a-z), an
underscore character (_), or dollar sign ($).
Question No: 19 ( Marks: 1 ) - Please choose one
Which of the following payment system does not involve the use of encryption?
Electronic check
Electronic cash
Virtual PIN
None of above
The basic difference between Virtual PIN System and Electronic Check is
_________.
Use of encryption
No. of participants
In E-Cash Payment system, merchant deposits the coins in the bank to check the
______ of coins
Number
Validity
Private key
Sender
True Repeated
False
SSL does not require special software on the client or merchant side.
True
False
Advantages
All of above
Paper catalogs
Advantages
Easy to create a catalog without high technology
Reader is able to look at the catalog without computer system
More portable than electronic catalog
True.
False.
FINALTERM EXAMINATION
fall 2008
Sale forces
E-mail
Media promotion
Marketing software
E-mail marketing campaigns are cheap and effective way to target potential customers. E-
mails can instantaneously convey a marketing message to customers at distant areas.
True
False
bridges , hash
routers, matrix
routers , routing
All of these
Reference: : page # 06
When you declare a variable within a function, the variable can only be
accessed within that function. When you exit the function, the variable is
destroyed. These variables are called
Local Variables
Global Variables
Reference
http://www.w3schools.com/js/js_functions.asp
If you declare a variable within a function, the variable can only be accessed within that
function. When you exit the function, the variable is destroyed. These variables are called
local variables. You can have local variables with the same name in different functions,
because each is recognized only by the function in which it is declared.
Instance of object
Copy of object
User A
User B
Network
Both Users A and B
Reference
http://www.cren.net/crenca/onepagers/guidebook/sectionthree.html#pgp
So, if user A wants to send an encrypted message to user B, user A would first
obtain user B’s public key. This is possible because public keys are meant to be widely
distributed. Then user A encrypts the message using user B’s public
key. The encrypted messagecan now only be decrypted with B’s private key, which only
he possesses
Passive
Active
Static
Dynamic
In case of television, radio or print media people are normally in a passive mode.
-----------means that your product/service has certain quality that makes it more
attractive than the one offered by your competitor, despite the price of your competitor s
product/service is somewhat lower
None of them
Differentiation
Focus
Cost leadership
Reference: : page #157
Differentiation
Differentiation means that your product/service has certain quality that makes it more
attractive than theone offered by your competitor, despite the price of your competitor’s
product/service is somewhat lower.
It is the ability to sell the goods or provide the service at a price that is lower than that
of competitors, and thus attract more customers.
What is called?
Cost leadership
Price leadership
Focus
Differentiation
Cost leadership
It is the ability to sell the goods or provide the service at a price that is lower than that of
competitors, and thus attract more customers.
Differentiation
Focus
Competitive
Diversification
None of them
Suppose, someone circulates a news item in the media about the reputation of a doctor,
alleging him to be professionally incompetent and negligent. This doctor may then file a
lawsuit against that person claiming that his reputation has been injured due to such an
act.
Online Defamation
Cyber squatting
None
Cyber Crimes
Online Defamation
A defamatory statement is a false statement that injures the reputation of on another person
orcompany. If a statement injures the reputation of a product or service instead of a person,
it is called product disparagement. Suppose, someone circulates a news item in the media
about the reputation of adoctor, alleging him to be professionally incompetent and negligent.
This doctor may then file a lawsuitagainst that person claiming that his reputation has been
injured due to such an act. Often, in cases ofdefamation the plea taken by the defendant is
that his statement is not false. Rather, it is a ‘fair comment’. In case defamation is done using
the internet, it is termed as online defamation. In countries abroad, the courts are replete
with cases of online defamation, mainly, because the person causing defamation can expect
to remain anonymous due to the nature of internet technology.
Parasites
Concurrent use
Cyber squatting
None
Cyber squatting
Time independence
Protocol Independence
Network independence
Advantages of VAN
Two big advantages of using a VAN in EDI are time independence and protocol
independence. Timeindependence means that the sending and receipt of the interchange or
messages can be carried out at the convenience of the users involved. Thus, they are not
required to be connected with each other at the same time. Protocol independence means
that interchanges are re-enveloped with the transmissionprotocol appropriate to the recipient
when they are retrieved from the postbox by the VAN. Thus, a VAN can provide protocol
compatibility between the sender and the recipient, wherever that is missing.
only text
only numbers
Reference
http://java.sun.com/docs/books/jls/second_edition/html/arrays.doc.html
Question No: 16 ( Marks: 1 ) - Please choose one
IP addresses
Date
Contents
C++
VBSCRIPT
JAVASCRIPT
JAVA
a {underline:none}
a {text-decoration:no underline}
a {decoration:no underline}
a {text-decoration:none}
Reference:
http://www.geekinterview.com/question_details/57379
In CSS
text-decoration: none;
True
False
True
False
The transfer takes place with the help of Automated Clearing House (ACH) service. Note
that an ACH is a centralized system to which different banks are electronically connected
forming a network for clearing payment requests.
The basic difference between Virtual PIN System and Electronic Check is _________.
Use of encryption
Registration with bank
No. of participants
Four
One
Two
Three
E-cash Coins
The currency used in this payment system is called an e-cash coin or simply coin. A coin
consists of three elements or parts - serial #, key version and serial no. signed by the secret
or private key of a certain denomination of the e-cash bank. In other words, a coi
Dollar
Coin
Penny
Cent
E-cash Coins
The currency used in this payment system is called an e-cash coin or simply coin. A coin
consists of three elments or parts - serial #, key version and serial no. signed by the secret or
private key of a certaindenomination of the e-cash bank. In other words, a coin of one dollar
would consist of the following:
Policy
Operations
Technology
All of above
E-Business
True
False
Electronic catalogues
Electronic catalogues are used in case of an online shop. They have many advantages over
paper catalogues. Therefore, online shopping can be done more quickly and in a more
convenient environment.
Advantages
Easy to update product information
Able to integrate with the purchasing process
Good search and comparison capabilities
Able to provide timely, up-to-date product information
Can provide broad range of product information
Possibility of adding voice and motion pictures
Cost savings
Easy to customize
True.
False.
Transformation
Data mining
Pattern evaluation
Process evaluation
Knowledge discovery
A knowledge discovery process includes data cleaning, data integration, data selection, data
transformation, data mining, pattern evaluation and knowledge presentation.
1-dimentional
2-dimentional
3-dimentional
4-dimentional
item type and location are the three dimensions. OLAP data cube indicates the sale of 605
and 825 units of furniture and computers, respectively, in the first quarter of the year in
Lahore, 440 units of furniture and 345 phone sets in Karachi in the first quarter, respectively,
and 400 grocery items in Lahore during second quarter. Results can be displayed through
data cube against more
Which one of the following is NOT recorded in log files at server side?
IP addresses
Requested(url)
Date
Cookies
Seller
E-Bank
Certification Authority
Reference: : page #116
Cryptography
Employment sites
Newspaper Publishers
False
Which of following services build a strong customer loyalty towards company and its
products?
Customer services
Public relations(PR)
Bulletin board
Exhibitions.
Track the customers online and do personalization is only possible through which of the
following file(s) analysis.
log files
cookie
data mining
"Amazon was one of the first major companies to sell goods by Internet, and was an
iconic "stock in which to invest" of the late 1990s dot-com bubble. Jeff Bezos founded
Amazon.com, Inc. in 1994, and launched it online in 1995. Amazon.com started as an on-
line
bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3 format,
computer software, , etc. Amazon has established separate websites in Canada, the United
Kingdom, Germany, France, China, and Japan. It also provides global shipping to certain
countries for some of its products. "
Awareness
Exploration
Familiarity
Commitment
Reference: : page #136
Commitment
Having completed a number of satisfactory transactions, some customers may have
developed a strong sense of loyalty or preference for the products or brand of a company.
They are said to be at the commitment stage in their relationship with a business. Such loyal
customers often tell others about their satisfaction as regards products/services offered by
the company. Sometimes, companies make concessions on price or other terms of business
to bring customers into this stage.
Bus Topology
Media Topology
Ring Topology
Reference: : page #14
. There are three main types of Network Topology,
Bus Topology,
Star Topology and
Ring Topology
Question No: 12 ( Marks: 1 ) - Please choose one
Browser page
Popup window
Task bar
Menu bar
Private key
Instruction
Passive
Active
Static
Dynamic
Defamation
An array is .
a variable
an object
a method
a function
Reference: :
http://java.sun.com/docs/books/jls/second_edition/html/arrays.doc.html
Reference: Page # 83
http://publib.boulder.ibm.com/infocenter/rtnlhelp/v6r0m0/index.jsp?topic=/com.ibm.etoo
ls.sqlbuilder.doc/topics/tdelete.html
Message digest
Secret message
Which of the following payment mode does not require customer to pay
interest to the bank on each transaction?
Credit card
Debit card
Electronic check
Cyclic suite
Circle suite
Cipher suite
Which model allows the users to log-on on a website and assume the role of bidder or
seller?
Online Banking.
Storefront Model.
E-Learning.
Auction Model.
Dividing market, with respect to people having income level greater than Rs 30000, is
geographic segmentation.
True.
False. REPEATED
Which of the following is NOT an identified behavioral mode of customers on the web?
Browsers
Buyers
Shoppers
Seller
Identify customers
Value Added Network (VAN) maintains two files of each customer that are
________.
Inbox and Outbox
None of them
None
FINALTERM EXAMINATION
Fall 2008
IT430- E-Commerce (Session - 1)
Demographic Segmentation
Geographic Segmentation
Psychographic segmentation
Behavioral segmentation
(PAGE 131)
Question No: 29 ( Marks: 1 ) - Please choose one
Which of these is a rule about bondage or affinity of two items such that if one item
is
purchased, the other is purchased too?
Classification
Association
Characterization
Clustering
(PAGE 143)
Question No: 30 ( Marks: 1 ) - Please choose one
Internal activities relate to manufacturing and packaging of goods.
True
False
(PAGE 155)
FINALTERM EXAMINATION
Fall 2008
IT430- E-Commerce (Session - 1)
Question No: 1 ( Marks: 1 ) - Please choose one
At minting stage, the serial number is ..by E-Cashbank
Known
Unknown
Secret
Forwarded
(PAGE 118)
Question No: 2 ( Marks: 1 ) - Please choose one
JIT Stands for
Just In Time
Joint investigation Technique
Join in Training
Just In Total
(Page 141)
Where there are quite a few erroneous or missing values in a row, then that row can
be discarded/deleted altogether. This process is
called data selection
Question No: 15 ( Marks: 1 ) - Please choose one
Popular software packages for personal finance is(are):
Quicken
MS Money
Money 2003
All of these
(page 152)
Popular software packages for personal finance are Quicken, MS Money and Money
2003 etc.
http://www.daaq.net/old/javascript/index.php?page=js+syntax&parent=core+javascript
(page 92)
A program that performs a specific function such as creating invoices/bills or
processing payment received
from customers is called an application program.
Question No: 19 ( Marks: 1 ) - Please choose one
Following are malicious programs EXCEPT ----------------- .
Back doors
Trojan Horses
Firewalls
Worms
(PAGE 94)
(PAGE 141)
Identify customers
Market and sell
Deliver activities relate to storage
Purchase materials and supplies
(PAGE 152)
Question No: 29 ( Marks: 1 ) - Please choose one
IT/EC can reduce the overall ------------- and afford to keep the price of
the product relatively low
Production cost
Marketing cost
Distribution cost
None
FINALTERM EXAMINATION
Spring 2009
IT430- E-Commerce (Session - 3)
► Known
► Unknown
► Secret
► Forwarded
(page 118)
Minting Stage
Serial number (unknown) Client (known)
Question No: 2 ( Marks: 1 ) - Please choose one
SET and SSL both are same with respect to security.
► True
► False
► Employment sites
► Newspaper Publishers
(PAGE 130)
Question No: 4 ( Marks: 1 ) - Please choose one
Advertising Subscription Mixed Revenue Model includes
► Online journals
► cookies
► log files
► None of these
► if i=5
► if i=5 then
► if i==5 then
► if (i==5)
(PAGE 58)
Question No: 12 ( Marks: 1 ) - Please choose one
Which one of the following ,is the correct way to declare a JavaScript array?
► True
► False
Porter’s Model helps a firm to identify threats to its competitive position and to
devise plans including the use of IT and e-commerce to protect or enhance that
position. PAGE#158
► Opt-inout
► Swap-out
► Opt-in
► Opt-out
(page 183)
opt-out approach, the company collecting information assumes that the customer
does not object to a specific use of information unless the customer specifically
denies the permission
Question No: 17 ( Marks: 1 ) - Please choose one
Which type of Data Mining contains the elements as Support and confidence?
► Classification
► Association
► Characterization
► Clustering
(page 144)
Question No: 18 ( Marks: 1 ) - Please choose one
In which type of data mining, Apriori algorithms is used?
► Classification
► Association
► Characterization
► Clustering
(PAGE 143)
Question No: 19 ( Marks: 1 ) - Please choose one
How do you define a numerical value?
► var mynum = new Math;
► var mynum = Math(6);
► var mynum = 6;
► Math.mynum = 6;
(page 128)
Employers can recruit and job searchers can search for jobs effectively through online
recruiting web sites.
Question No: 24 ( Marks: 1 ) - Please choose one
Which of these is a rule about bondage or affinity of two items such that if one
item is purchased, the other is purchased too?
► Classification
► Association
► Characterization
► Clustering
(PAGE 143)
Question No: 25 ( Marks: 1 ) - Please choose one
Electronic banking is also known as __________.
► Cyber banking
► Virtual banking
► Online banking
► All of above
(page 150)
► Marketing cost
► Distribution cost
► None
(page 159)
Question No: 28 ( Marks: 1 ) - Please choose one
-------------means services in relation to the transformation of contents of an electronic
document from its original form to one that cannot be understood or decoded by any
unauthorized person
► Cryptography services
► Originator
► Addressee
(PAGE 163)
► False
(PAGE 176)
FINALTERM EXAMINATION
Fall 2009
IT430- E-Commerce (Session - 1)
(page 133)
E-mail marketing campaigns are cheap and effective way to target potential customers.
Question No: 7 ( Marks: 1 ) - Please choose one
What does Telemarketing means?
► Marketing through charting
► Marketing through telephone
► Marketing through email
► Marketing through web casting
(PAGE 133)
TELEMARKETING (LIVE INTERACTION THROUGH TELEPHONE) AND E-
MAILS CAN BE COMBINED TO REACH PROSPECTIVE CUSTOMERS.
SIMILARLY, DIRECT MAILING AND E-MAILS CAN ALSO BE COMBINED.
Question No: 8 ( Marks: 1 ) - Please choose one
Which of following services build a strong customer loyalty towards company and
its products?
► Customer services
► Public relations(PR)
► Bulletin board
► Exhibitions.
(page 136)
One major goal of CRM is to establish a long-lasting relationship between a
company and its customers. Good customer services can help in building a sense of
loyalty towards company and its products or services
Question No: 9 ( Marks: 1 ) - Please choose one
Track the customers online and do personalization is only possible through which
of the following file(s) analysis.
► log files
► cookie
► data mining
► log files and cookies.
(page 136)
Question No: 10 ( Marks: 1 ) - Please choose one
Which of the following is true for Class A:
► Network 01 byte and 03 hosts
(PAGE 156)
Question No: 17 ( Marks: 1 ) - Please choose one
Customer data can be gathered and analyzing it customers can be served in a
better Manner according to their needs, Which is best option?
► Customization
► Customer orientation
► Customer satisfaction
► Focus
(PAGE 157)
Question No: 18 ( Marks: 1 ) - Please choose one
A company ABC web page divided into four segments can be unpleasant to a
Japanese visitor because no. four is a symbol of death in that culture.
Which is the international barrier it is having?
► Culture
► Language
► Lack of trust
► Infrastructure
(PAGE 161)
Question No: 19 ( Marks: 1 ) - Please choose one
Exclusive right granted by law to make, use and sell an invention. What is called?
► Parasites
► Trade mark
► Patent infringement
► Copyright
(PAGE 181)
PATENT INFRINGEMENT
(page 106)
Note that a digital or electronic signature is believed to be more reliable as
compared to paper signatures because it is not ordinarily possible to copy or forge
an electronic/digital signature. But, that is very much possible in case of paper
signatures.
Question No: 26 ( Marks: 1 ) - Please choose one
The serial # generated by the cyberwallet gets multiplied by blinding factor
‘r’ which is known only to the ___________.
► Client
► Bank
► Merchant
► None of above
(PAGE 116)
CYBERWALLET GENERATES A SERIAL # AND A BLINDING FACTOR ‘R’. THIS
BLINDING FACTOR “R” IS ONLY KNOWN TO THE CLIENT.
Question No: 27 ( Marks: 1 ) - Please choose one
SET doesn’t require special software on the client or merchant side.
► True
► False
Question No: 28 ( Marks: 1 ) - Please choose one
The result of OLAP is displayed in the form of a __________.
► Data square
► Data Triangle
► Data cube
► Data circle
(PAGE 145)
The result of OLAP is displayed in the form of a data cube
Question No: 29 ( Marks: 1 ) - Please choose one
Classification and Association belong to which of the following types of Data
Mining?
► Selective
► Predictive
► Descriptive
► Additive
(PAGE 141)
FINALTERM EXAMINATION
Fall 2009
IT430- E-Commerce (Session - 3)
Time: 120 min
Marks: 75
Question No: 1 ( Marks: 1 ) - Please choose one
Four P’s in Marketing Mix are:
► Product, price, place, promotion
► Price, person, place, problem
► Place, product, property, promotion
► Promotion, place, product, planning
Page 147 :For instance, packaging material should only be ordered for just in time
(JIT) delivery,
Question No: 3 ( Marks: 1 ) - Please choose one
Advertising Supported Revenue Model includes
► Yahoo portal
► Employment sites
► Newspaper Publishers
► All of the above
(PAGE 94)
Question No: 7 ( Marks: 1 ) - Please choose one
In the digital signature technique, the sender of the message uses ________ to
create cipher text
► His or Her own symmetric key
► His or her own private key
► His or her own public key
► The receiver’s private key
(PAGE 103)
THE MESSAGE IS ENCRYPTED USING PUBLIC KEY OF THE RECEIVER, THUS IT
BECOMES SCRAMBLED OR CONFIDENTIAL. THEN THE SENDER ADDS HIS
PRIVATE KEY IN THE OBTAINED MESSAGE DIGEST TO CREATE HIS DIGITAL
SIGNATURES.
Question No: 8 ( Marks: 1 ) - Please choose one
PIN stands for:
► Payment investigation Number
► Password Identification Number
► Personal Identification Number
► Personal Identification Numeric
http://wiki.answers.com/Q/PIN_stands_for_what
► Cost leadership
► Price leadership
► Focus
► Differentiation
(page 141)
Classification and association are predictive types of data mining while characterization and
clustering represent the descriptive type.
(page 140)
A knowledge discovery process includes data cleaning, data integration, data selection, data
transformation, data mining, pattern evaluation and knowledge presentation.
Question No: 25 ( Marks: 1 ) - Please choose one
According to Michael Porter, “test marketing” is an example of primary activity in
a strategic business unit. Identify the area in which this task is performed.
► Design
► Market and sell
► Deliver’ activities relate to storage
► Purchase materials and supplies
(PAGE 152)
‘DESIGN’ ACTIVITIES TAKE A PRODUCT FORM CONCEPT STAGE TO
MANUFACTURING STAGE. THEY INCLUDE CONCEPT RESEARCH,
ENGINEERING, DRAWINGS PREPARATION, TEST MARKETING ETC.
Question No: 26 ( Marks: 1 ) - Please choose one
Electronic banking is also known as __________.
► Cyber banking
► Virtual banking
► Online banking
► All of above
(page 150)
Electronic banking, also known as cyberbanking, virtual banking, home banking and online
banking, includes various banking activities conducted from home, business, or on the road,
instead of at a physical bank location.
Question No: 27 ( Marks: 1 ) - Please choose one
Civil law deals with the private rights of the parties, whereas the object of criminal
law is to punish the wrong-doer. Is it?
► True
► False
(HANDOUT PAGE 176)
Question No: 28 ( Marks: 1 ) - Please choose one
In datalink layer, data packets are placed inside
► Data frames
► Data boxes
► Data streams
► None of these
(page 6)
Question No: 29 ( Marks: 1 ) - Please choose one
Which one of the following algorithms does not include in public key algorithms?
► DSS
► RSA
► Elliptic Curves
► RC4
FINALTERM EXAMINATION
Fall 2009
IT430- E-Commerce
► Buyer
► Seller
► E-Bank
► Certification Authority
(page 116)
► Secret
► Unknown
► Known
► None of these
(PAGE 118)
DEPOSIT STAGE
SERIAL NO. (KNOWN) CLIENT (UNKNOWN)
► No distribution channel
► No warehousing
► Easily delivery
► No communication
(page 147)
For instance, packaging
material should only be ordered for just in time (JIT) delivery,
► Single area
► Broad range of topics
► Offline business
► Online business
► Transport
► Building
Which of following services build a strong customer loyalty towards company and its
products?
► Customer services
► Public relations(PR)
► Bulletin board
► Exhibitions.
(page 136)
In which protocol, the messages are not deleted from email server.
► SMTP
► POP3
► IMAP
► ICMP
(PAGE 18)
► <head>
► <h1>
► <Heading>
► <h6>
In the digital signature technique, the sender of the message uses ________ to create cipher
text
(page 103)
The message is encrypted using public key of the receiver, thus it becomes scrambled or
confidential. Then the sender adds his private key in the obtained message digest to create
his digital signatures.
Question No: 10 ( Marks: 1 ) - Please choose one
-----------means that your product/service has certain quality that makes it more attractive
than the one offered by your competitor, despite the price of your competitor’s
product/service is somewhat lower
► Differentiation
► Focus
► Cost leadership
► None of them
(PAGE 157)
It is the ability to sell the goods or provide the service at a price that is lower than that of
competitors, and thus attract more customers.
What is called?
► Cost leadership
► Price leadership
► Focus
► Differentiation
(PAGE 157)
Question No: 12 ( Marks: 1 ) - Please choose one
A company ABC web page divided into four segments can be unpleasant to a Japanese
visitor because no. four is a symbol of death in that culture.
Which is the international barrier it is having?
► Culture
► Language
► Lack of trust
► Infrastructure
(PAGE 152)
Question No: 13 ( Marks: 1 ) - Please choose one
Suppose, someone circulates a news item in the media about the reputation of a doctor,
alleging him to be professionally incompetent and negligent. This doctor may then file a
lawsuit against that person claiming that his reputation has been injured due to such an
act. Which legal issue arises due to such acts?
► Cyber Crimes
► Online Defamation
► Cyber squatting
► None
(PAGE 182)
► <scripting>
► <javascript>
► <script>
► <js>
http://www.ex-designz.net/test_page.asp?tid=65
► var mynum = 6;
► Math.mynum = 6;
► <background>yellow</background>
► <body color="yellow">
► <body bgcolor="yellow">
► <bgcolor>yellow</bgcolor>
► bgcolor:
► background-color:
► color:
► bg-color:
(page 23)
Changing colors in a page In order to provide a specific background color to a web
page, an attribute ‘bgcolor’ is used in the body tag.
Question No: 18 ( Marks: 1 ) - Please choose one
► Symmetric
► Asymmetric
► Both of above
► None of above
(page 113)
An electronic check contains an instruction to the payer’s bank to make a specified payment
to a payee. Both, symmetric and asymmetric type of cryptography is used in this system.
Question No: 19 ( Marks: 1 ) - Please choose one
► E-Business
► E-Transaction
► E-Cash
► E-Transfer
(PAGE 125)
Which of the following issue is considered the biggest obstacle in the growth of e-
commerce?
► Issue of security.
(PAGE 127)
► True
► False
(page 126)
Electronic catalogues are used in case of an online shop. They have many advantages over
paper catalogues. Therefore, online shopping can be done more quickly and in a more
convenient environment.
Question No: 22 ( Marks: 1 ) - Please choose one
Which e-business helps to improve policies, procedures, customer services, and general
operations of other businesses?
Which of the following is NOT an identified behavioral mode of customers on the web?
► Browsers
► Buyers
► Shoppers
► Seller
(page 141)
► Classification
► Association
► Characterization
► Clustering
(PAGE 143)
► 1-dimentional
► 2-dimentional
► 3-dimentional
► 4-dimentional
(page 146)
Note that in the above diagram, time, item type and location are the three dimensions.
OLAP data cube
According to Michael Porter, “fabricating” is an example of primary activity in a strategic business unit.
Identify the area in which this task is performed.
ERP is an approach that attempts to integrate all departments and functions across a company
into a single computer system.
► True
► False
(PAGE 150)
► True
► False
(PAGE 149)
► None of these
► Design
► Delivery
► Administration
(Page 152)
FINALTERM EXAMINATION
Fall 2009
Browser is installed at :
► none
(PAGE 116)
In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT
included:
► Buyer Accounts identifier
► Buyer password
► Address of Merchant
► Actual amount of money in favor of merchant
To overcome the lack of physical proximity appearance problem in e-business, which technology is going to
be used
► Biometrics
► Video conferencing
► Cryptography
► Biometrics and Video conferencing
(PAGE 134)
VIDEO CONFERENCING IS AN EXAMPLE OF WEB CASTING. FOR EXAMPLE,
USING THIS TECHNIQUE, DOCTORS SITTING IN CHINA, ENGLAND AND
PAKISTAN ETC. CAN, IN REAL TIME, EXCHANGE AND BENEFIT FROM EACH
OTHER’S IDEAS AS IF THEY ARE PHYSICALLY HOLDING A MEETING.
► Market Segmentation
► Market Promotion
► Market Research
► Market Survey
(PAGE 131)
MARKET SEGMENTATION
BUSINESSES NEED TO IDENTIFY SPECIFIC PORTIONS OF THEIR MARKETS IN
ORDER TO TARGET THEM WITH SPECIFIC ADVERTISING MESSAGES. THE
PRACTICE CALLED MARKET SEGMENTATION DIVIDES THE POTENTIAL
CUSTOMERS INTO SEGMENTS OR GROUPS.
(PAGE 137)
KEY DIFFERENCE BETWEEN B2C AND B2B IS THAT IN CASE OF B2B THERE
IS NO DIRECT CONTACT WITH THE END USERS, WHEREAS THIS CONTACT
EXISTS IN B2C.
► ICAAN
► ISO
► IEEE
► None
(PAGE 13)
► X-Markup Language
(PAGE 74)
► Key length
► Complexity
► Simplicity
(page 108)
► Differentiation
► Focus
► Cost leadership
► None of them
(PAGE 157)
DIFFERENTIATION MEANS THAT YOUR PRODUCT/SERVICE HAS CERTAIN
QUALITY THAT MAKES IT MORE ATTRACTIVE THAN THE ONE OFFERED BY
YOUR COMPETITOR, DESPITE THE PRICE OF YOUR COMPETITOR’S
PRODUCT/SERVICE IS SOMEWHAT LOWER.
Customer data can be gathered and analyzing it customers can be served in a better
► Customization
► Customer orientation
► Customer satisfaction
► Focus
(PAGE 157)
CUSTOMIZATION
WITH THE HELP OF EC, CUSTOMER DATA CAN BE GATHERED AND
ANALYZING IT CUSTOMERS CAN BE SERVED IN A BETTER MANNER
ACCORDING TO THEIR NEEDS. ONE CAN, THUS, IMPLEMENT
DIFFERENTIATION AND FOCUS STRATEGY.
Characterization and Clustering belong to which of the following types of Data Mining?
► Additive
► Predictive
► Selective
► Descriptive
(page 141)
Classification and association are predictive types of data mining while characterization
and clustering represent the descriptive type.
► Classification
► Association
► Characterization
► Clustering
(PAGE 147)
ANSI(AMERICAN NATIONAL STANDARDS INSTITUTE)
► ANSI
► Microsoft
(page 74)
World Wide Web Consortium (W3C), a non-profit organization that maintains standards for
the web presented the draft of XML in late 1990’s.
Question No: 19 ( Marks: 1 ) - Please choose one
► shape
► circle
► href
► cords
► None of above
(PAGE 105)
(PAGE 113)
► Simplicity
► Anonymity
► Availability
► Connectivity
(page 116)
A company, DigiCash, has pioneered the use of electronic cash or e-cash. Anonymity of the
buyer is the key feature of this system.
In storefront e-business model buyers and sellers interact ___________ with each other.
► Directly.
► Indirectly.
► None of above.
Customers grouped by variables such as social class, personality or approach to life or lifestyle, is called
___________.
► Demographic Segmentation.
► Geographic Segmentation.
► Psychographic segmentation.
► Behavioral segmentation.
According to Michael Porter, “material handling” is an example of primary activity in a strategic business
unit. Identify the area in which this task is performed.
► Identify customers
(PAGE 152)
‘DELIVER’ ACTIVITIES RELATE TO STORAGE, DISTRIBUTION AND SHIPMENT
OF FINAL PRODUCT, E.G, WAREHOUSING, SELECTING SHIPPERS, MATERIAL
HANDLING, TIMELY DELIVERY TO CUSTOMERS ETC.
(PAGE 152)
‘MANUFACTURE PRODUCT OR CREATE SERVICE’ ACTIVITIES RELATE TO
TRANSFORMATION OF MATERIALS AND LABOR INTO FINISHED PRODUCTS,
E.G, FABRICATING, ASSEMBLING, PACKAGING ETC.
► Cyber banking
► Virtual banking
► Online banking
► All of above
(PAGE 150)
Classification and Association belong to which of the following types of Data Mining?
► Selective
► Predictive
► Descriptive
► Additive
(PAGE 141)
CLASSIFICATION AND ASSOCIATION ARE PREDICTIVE TYPES OF DATA
MINING WHILE CHARACTERIZATION AND CLUSTERING REPRESENT THE
DESCRIPTIVE TYPE.
In which type of approach, we sum up and integrate the information in a particular dimension to show
the result?
► Dice
► Drill down
► Roll up
► Slice
(PAGE 146)
ROLL-UP IS THE REVERSE OF DRILL-DOWN. IN IT WE CAN SUM-UP OR
INTEGRATE THE INFORMATION IN A PARTICULAR DIMENSION TO SHOW
THE RESULT.
FINALTERM EXAMINATION
Fall 2009
IT430- E-Commerce
DEPOSIT STAGE
SERIAL NO. (KNOWN) CLIENT (UNKNOWN)
Let us, suppose that you have hosted your e-commerce website,
When you provide “opt-in e-mail” option to your customers on your website and
customer opt for it , what does it mean to receive ?
► Information about product through advertisement
► Information about product through e-mail
► Information about services available on it
► Information about News through e-mail.
(page 133)
You can also provide the “opt-in e-mail” option to your customers on your web site.
If they opt for it, this means that they want to receive through email any product
information, offers or promotions etc. in the future.
Question No: 4 ( Marks: 1 ) - Please choose one
Track the customers online and do personalization is only possible through which of the
following file(s) analysis.
► log files
► cookie
► data mining
► log files and cookies.
(page 136)
There are software tools or tracking devices that can provide feedback on how
many number of internet users actually viewed a banner or a marketing message
and how many actually clicked on the advertisement. Log files consist of data
generated by site visits and include information about each visitor’s location, IP
address, time of visit, frequency of visits etc. There are businesses that provide the
services of analyzing web log files. The results would show how effective your web
site is and indicate the top-referring web sites. You know that cookies allow e-
commerce sites to record visitor behavior. They can be used to track customers
online and do personalization.
When customer life cycle is used to create different groups of customers, it is called?
► Targeting Customers
► Dynamic groups
► Customer Life Cycle Segmentation
► Group Development
(HANDOUT PAGE 137)
Network addresses 128--- 191 range belongs to which of the following class
networks?
►A
►B
►C
►E
(HANDOUT PAGE 110)
Supply chain can be broken into three parts, that is ----------------- , -----------------------
and -------------------- activities.
► Internal, external support
► Upstream, internal ,downstream
► Primary, Secondary ,R&D
► None of them
(page 155)
1-Upstream activities relate to materials/services or the input from suppliers
2-Internal activities relate to manufacturing and packaging of goods
3-Downstream activities relate to distribution and sale of goods to distributors/customers
The process of taking active role in working with suppliers to improve products and
processes is called?
► Value chain management
► Supply chain management
► Supply chain management software
► Porter Model
(HANDOUT PAGE 155)
► Spider
► Scorpion
► Moon
► Cobweb
Page No.138: Many search engines rank the site by using a program called ‘spider’
which inspects the site before ranking.
Question No: 14 ( Marks: 1 ) - Please choose one
► Association
► Characterization
► Clustering
Page No.143: Apriori algorithm is used for association mining.
► No paper work
► No human intervention
► Exchange of information takes place in seconds
► All of these
Addresses are tied to the device itself and give no clue to it's location on a global scale.
This is the characteristics of
► IP
► RIP
► MAC
► None of the given
MAC addresses are tied to the device itself and give no clue to it's location on a
global scale. MAC AB:CD:EF:01:01:01 may be in the US and MAC
AB:CD:EF:01:01:02 may be in Australia. So a router would have to keep track of
where every individual MAC is in the world and how to get to it. That just isn't
feasible.
With an IP address you can be fairly sure that IP 1.2.3.2 and 1.2.3.3 are on the same
network and the router that looks after the subnet they live on will know who is
who. Therefor your router (or your ISP's) need only to know how to get that
networks router. Reducing the amount of routes it needs to know by a couple of
magnitudes.
Question No: 18 ( Marks: 1 ) - Please choose one
When two or more intranets are connected to each other they form a/an ------------- .
► intranet
► internet
► extranet
► VPN
Extranet – when two or more intranets are connected with each other, they form an
Extranet – e.g, Virtual Private Network
Question No: 19 ( Marks: 1 ) - Please choose one
Page No.37: ‘Nohref’ attribute can be used to make a region non-clickable. For example,
Which of the following payment mode does not require customer to pay interest to
the bank on each transaction?
► Credit card
► Debit card
► Electronic check
► All of the above
Page No.110: In case of a credit card the issuer bank charges interest from the client at a
specified rate on the amount lent. On the other hand, in case of a debit card no such
interest is payable since the customer uses his/her own money in that case.
Cyber wallet can automatically assemble the correct payment and pay it too.
► True
► False
Page No.118:Cyber wallet automatically assembles the correct payment amount and
pays.
Which model allows the users to log-on on a website and assume the role of bidder or
seller?
► Online Banking.
► Storefront Model.
► E-Learning.
► Auction Model.
(page 128)
In this model there are auction sites to which the users can log-on and assume the role of
a bidder or seller. As a seller, one has to specify the minimum price to sell one’s item
(called reserve price), the description of the item and the deadline to close the auction. At
the end of the auction, the seller and the bidder are notified by the auction site and the
payment mechanism and delivery mode is worked out. Auction sites charge commission
on sales.
Question No: 24 ( Marks: 1 ) - Please choose one
Civil law deals with the private rights of the parties, whereas the object of criminal law is
to punish the wrong-doer. Is it?
► True
► False
(PAGE 176)
Question No: 26 ( Marks: 1 ) - Please choose one
In the physical world three elements must be satisfied in order to make a valid contract,
namely, offer, ---------------- and ----------
► Acceptance and consideration
► Acceptance and Rejection
► Approval and consideration
► None
(page 178)
In the physical world three elements must be satisfied in order to make a valid
contract, namely, offer,acceptance and consideration.
Question No: 27 ( Marks: 1 ) - Please choose one
Virtual PIN Payment System requires both merchant and buyer to register with
_______________.
► Auto Clearing House (ACH)
► First Virtual (FV)
► DSS (Digital Signature Standard)
► DES (Data Encryption Standard)
(PAGE 110)
Classification and Association belong to which of the following types of Data Mining?
► Selective
► Predictive
► Descriptive
► Additive
(Page 142)
Classification and association are predictive types of data mining while characterization
and clustering represent the descriptive type.
FINALTERM EXAMINATION
Fall 2008
IT430- E-Commerce (Session - 1)
Ref: When a data packet arrives at the destination router, it inquires about the
corresponding MAC address form the network server, inserts it and delivers the
packet to that MAC address.
FINALTERM EXAMINATION
FALL 2007
IT430 - E-COMMERCE (Session - 6 )
Marks: 70
b) Differentiate between the HTML and XML. Make a comparison table. (4)
(page 2)
Web server – machine that services internet request
(PAGE 145)
ONLINE ANALYTICAL PROCESSING (OLAP)
Question No: 13 ( Marks: 1 ) - Please choose one
Television, radio and print media are in a (n) ……………………. Mode
Passive
Active
Static
Dynamic
(PAGE 139)
IN CASE OF TELEVISION, RADIO OR PRINT MEDIA PEOPLE ARE NORMALLY IN
A PASSIVE MODE