PDA

View Full Version : full solve paper It430 current spring July 2011



Vuhelper
07-13-2011, 08:13 PM
It430 final term solve paper 2011 in attachment

Question No: 1 ( Marks: 1 ) - Please choose one
Click and Mortar refers to

► Offline business
► Online business
► Engineering
► Building

Question No: 2 ( Marks: 1 ) - Please choose one
Which of the following option best represent “Data mining can improve response rate tremendously”?

► Direct mailing
► Personalization technology
► E-business
► Opt-in e-mail
Ref: PAGE # 133 http://vuhelp.net/

Question No: 3 ( Marks: 1 ) - Please choose one
Which of following services build a strong customer loyalty towards company and its products?

► Customer services
► Public relations(PR)
► Bulletin board
► Exhibitions.
Ref: PAGE # 136

Question No: 4 ( Marks: 1 ) - Please choose one
Visitor’s location, IP address, time of visit related information are added, in which of the following

► call handling files
► cookies
► log files
► Data mining files.

Question No: 5 ( Marks: 1 ) - Please choose one
Track the customers online and do personalization is only possible through which of the following file(s) analysis.
http://vuhelp.net/
► log files
► cookie
► data mining
► log files and cookies.

Question No: 6 ( Marks: 1 ) - Please choose one
Switch generally contains more "intelligence" than a hub.

► True
► False

Question No: 7 ( Marks: 1 ) - Please choose one
What is the correct JavaScript syntax to write "Hello World"?

► response.write("Hello World")
► document.write("Hello World")
► ("Hello World")
► “Hello world”
Ref: PAGE # 57

Question No: 8 ( Marks: 1 ) - Please choose one

What shall come in blanks for proper result,
Here blanks are numbered with 1,2 and 3




► container, text and result
► result, value and container
► container , button and value
► result, container and text

Question No: 9 ( Marks: 1 ) - Please choose one
In XML, in which of following element tag, other element are enclosed

► Child element
► Root element


http://vuhelp.net/
Question No: 10 ( Marks: 1 ) - Please choose one



In given XML code, which of following element represents the highlighted node.

Mr.Riaz
Aamer
Reminder
Don't forget me this weekend!

► Property
► Root
► Child
► Nothing

Question No: 11 ( Marks: 1 ) - Please choose one
An electronic Check book consists of

► Software
► Hardware
► Software and Hardware
► None of these

Question No: 12 ( Marks: 1 ) - Please choose one

Three participants of the E-Cash Model are
http://vuhelp.net/
► Seller, buyer and E-bank

► Seller, buyer and Certification authority
► Seller, Agent and bank
► None of these
Ref: PAGE # 117

Question No: 13 ( Marks: 1 ) - Please choose one
Which of the following Barriers to International E-Commerce?

► Advertising
► Patents
► Infrastructure
► Capital
Question No: 14 ( Marks: 1 ) - Please choose one
In which type of approach, we further dig the data for retrieving information from data warehouse? http://vuhelp.net/

► Slice
► Dice
► Drill down
► Roll up

Question No: 15 ( Marks: 1 ) - Please choose one
Where there are quite a few erroneous or missing values in a row then that row can be deleted or discarded. This process is called...............

► Data Deletion
► Data Selection
► Data Integration
► Data Transformation

Question No: 16 ( Marks: 1 ) - Please choose one
Support activities in Value Chain model includes

► Finance and Administration
► Human Resources
► Technology Development
► All of these.
Ref: PAGE # 152

Question No: 17 ( Marks: 1 ) - Please choose one
You define a method using

► obj.method
► obj.method[]
► obj.method()
► obj-method

Question No: 18 ( Marks: 1 ) - Please choose one
Which currency is used in e-cash Payment system?

► Dollar
► Coin
► Penny
► Cent
http://vuhelp.net/
Question No: 19 ( Marks: 1 ) - Please choose one

Which of the following is a function of Cyberwallet?

► Store coins
► Manage Coins
► Record transactions
► All of above
(Mehreen,vuhelp,feb11)
Question No: 20 ( Marks: 1 ) - Please choose one
Which of these is a rule about bondage or affinity of two items such that if one item is purchased, the other is purchased too?

► Classification
► Association
► Characterization
► Clustering
Ref: PAGE # 143
Association:
Association analysis is the discovery of association rules showing attribute-value conditions that occur frequently together in a given set of data. It is widely used for market basket analysis. For example, where we are recording sales of a big shopping store in databases, then by applying association mining we may discover that certain items have a strong bondage or affinity with each other such that when one item is purchased the other is purchased, too.

Question No: 21 ( Marks: 1 ) - Please choose one
Electronic banking is also known as __________.

► Cyber banking
► Virtual banking
► Online banking
► All of above
Ref: PAGE # 150
Electronic Banking:
Electronic banking, also known as cyber banking, virtual banking, home banking and online banking, includes various banking activities conducted from home, business, or on the road, instead of at a physical bank location.

Question No: 22 ( Marks: 1 ) - Please choose one
A patent is an exclusive right granted by law to make, use and sell an invention. In order to be patentable, the invention must be unique, genuine, and useful

► Unique
► Genuine
► Useful
► All of the given
Ref: PAGE # 181 http://vuhelp.net/
Patent infringement:
A patent is an exclusive right granted by law to make, use and sell an invention. In order to be patentable, the invention must be unique, genuine, and useful according to the prevalent technological standards.

Question No: 23 ( Marks: 1 ) - Please choose one
(PIPEDA) Stands for ------------------

► Personal Information Protection and Electronic Defamation Act
► Personal Information Privacy and Electronic Documents Act
► Personal Information Privacy and Electronic Defamation Act
► Personal Information Privacy and Electronic Defamation Act
None of above 4 options.




Question No: 24 ( Marks: 1 ) - Please choose one
------------ wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general.

► Criminal
► Civil
► Plentiful
► None
Ref: PAGE # 176
Civil wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general.

Question No: 25 ( Marks: 1 ) - Please choose one
In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, ---------------- and ----------

► Acceptance and consideration
► Acceptance and Rejection
► Approval and consideration
► None
Ref: PAGE # 178

Question No: 26 ( Marks: 1 ) - Please choose one
Your browser may not support display of this image. Why we use reset tag in HTML?
► To remove the text written in Notepad.
► To remove the text written in between and tag.
► To remove the text written in between and tag.
► To remove the text written in between
and tag.
Reference:
Reset buttons exist to reset the fields of your form.
Question No: 27 ( Marks: 1 ) - Please choose one
E-cash coin consist of three parts or elements that are ______.

► serial #, key version and r(binding factor)
► serial #, key version and serial no(SK)
► serial #, serial no(SK) and r(binding factor)
► none of above
Ref: PAGE # 116
Coin = Serial#, key version, {Serial #} SK

Question No: 28 ( Marks: 1 ) - Please choose one
A ------------- is a program that scans web sites and forms a list of relevant sites based on keywords.

► An Application
► Search Engine
► Operating System
► Device Drivers
Ref: PAGE # 137
A search engine is a program that scans web sites and forms a list of relevant sites based on keywords

Question No: 29 ( Marks: 1 ) - Please choose one
What is/are the advantages of EDI?

► No paper work
► No human intervention
► Exchange of information takes place in seconds
► All of Above
Ref: PAGE # 147
EDI include:
• No paper work
• No human intervention
• Exchange of information takes place in seconds

Question No: 30 ( Marks: 1 ) - Please choose one
The term “Appropriate Authority” includes ______________ legislative assemblies

► 2
► 3
► 5
► 4
http://vuhelp.net/
Question No: 31 ( Marks: 2 )
How the Porter’s model helps a firm to devise a plan?


Threat of potential/new entrants to the sector
Threat of substitute product or service in the existing trade
Bargaining power of the buyers
Bargaining power of the suppliers
Competition between existing players

Question No: 32 ( Marks: 2 )
What is meant by “1973 is the supreme law of the country”?
The Constitution of Islamic Republic of Pakistan, 1973 is the supreme law of the country, which means that
every other law in Pakistan has to confirm to the terms of the constitution. It contains two legislative lists at
its end, that is, the Federal legislative list and Concurrent legislative list. The federal legislative list sets out
those items/subjects on which only the federal legislature can make laws such as the subject related to
defense of Pakistan and armed forces etc. On the other hand, matters contained in concurrent legislative list
are those on which both the federal and provincial legislature can enact/make laws, such as the subject
related to marriage and divorce etc.
Question No: 33 ( Marks: 2 )
Why are hidden forms' fields used?
page 88
Information regarding
Registration and Add to Cart can be stored in cookies and at Confirm Order cookies against these URLs
would revert to the serve side and be stored in databases against a common ID.
We can also use hidden forms’ fields. We keep data back and forth within forms to maintain state.
Following is a piece of HTML code for a form (Add to cart) in which hidden fields are used. I have used
pairs of input tags with type hidden and type checkboxes. (I can also use them in a For loop using Recordset object of ASP then it would be possible that these pairs of input tags are generated in a loop and information of records available in databases is directly picked up and printed for me). Because of type hidden the item name and item code/value for each item would be there in the form against each item but would remain hidden. When the user selects items (through check boxes) and presses Add to Cart his selected information would go to some script which would be coded such that it would open a new page with button Confirm Order. In this new form the item code or value of selected items would be present but would remain hidden. When a user presses the button Confirm Order the information of selected items is stored in the databases (through a script) against the item code present in the form, though hidden. We can say that state is maintained here between steps Add to Cart and Confirm Order in the sense that selections made in step Add to Cart were passed over or provided to the next step Confirm Order.
Question No: 34 ( Marks: 2 )
Briefly explain the customer’s level of loyalty to company at “Familiarity level”.
Question No: 35 ( Marks: 3 )
Identify the different areas of study involve in e-commerce?
page 161 lesson 40
E-commerce is a combination of three different areas of study, namely, technology, business and
law/policy. We have studied the technology and business side of e-commerce to a reasonably good extent.
Question No: 36 ( Marks: 3 )
On what basis, generally the protection under “fair use” may be sought? Doesn’t need to explain.
lesson 45 page 171

Generally, the protection under ‘fair use’ may be sought on the following basis:
Nature of use:- the work has been used for educational and/or non-profit purposes only;
Nature of work:- if the copied work contains factual information then it may be more effectively covered
under the fair use clause as opposed to some creative work;
Extent of the work copied:- if the amount of work copied is insignificantly small then the courts might take
a view favorable to the accused;
Effect on the market value of the work:- A person alleged with the copyright violation may escape any
liability arguing that the work has not been circulated to many people and there has not been any negative
impact on the value of actual work due to the circulation.
Question No: 37 ( Marks: 3 )
Discuss the role and responsibilities of “Transport layer” in OSI model?
Transport layer
TCP (Transmission Control Protocol) or UDP (User Datagram Protocol) operate at this layer. It has two functions. It converts the data into data packets. Secondly, it is responsible for flow control of data. TCP is more reliable as it is acknowledgment based as opposed to UDP which does not use any system of acknowledgment for the delivery of data packets.
Question No: 38 ( Marks: 3 )
Explain the “Separation” stage of customer’s loyalty to business. Give any 2 reasons of why a customer may get into this stage. 1+2
Separation:
After a period of time those conditions over which a valuable customer relationship is established might
change.
1: Customers might not be any longer satisfied with the product quality or customer service.
2: On the other hand, a company may also find that a loyal customer is proving to be very expensive to maintain. Thus, the parties enter into the separation stage. Note that the objective of any marketing strategy is to bring the customers quickly to the committed stage and try to hold them there as long as possible.
Question No: 39 ( Marks: 5 )
What do you perceive by Value Added Network? Explain its advantages too with reference to EDI. (2+3)

page 148 +149
Value Added Network (VAN)
Value added networks are third party networks that provide services to execute authorized transactions with valid trading partners using EDI. Each VAN has a centralized computer system that maintains two files for each user, that is,
Postbox: where outgoing messages are placed, and
Mailbox: where incoming messages can be picked up

Advantages of VAN
Two big advantages of using a VAN in EDI are time independence and protocol independence. Time independence means that the sending and receipt of the interchange or messages can be carried out at the convenience of the users involved. Thus, they are not required to be connected with each other at the same time. Protocol independence means that interchanges are re-enveloped with the transmission protocol appropriate to the recipient when they are retrieved from the postbox by the VAN. Thus, a VAN can provide protocol compatibility between the sender and the recipient, wherever that is missing.
Question No: 40 ( Marks: 5 )
What are the four guiding principles to form the basis of any privacy legislation?
Answer is Here:

page 183
Experts have highlighted four guiding principles to form the basis of any privacy
legislation. These are as follows:
1. collected data may be used for improved customer service;
2. sharing of personal data with outside firms/persons should not be allowed unless the customer consents to that;
3 : customers should have the right to receive information about what type of data has been
collected from them and in what manner has it been used;
4 : customers should have the right to ask for the deletion of any of their data collected by the company.