PDA

View Full Version : it430 full final term solve paper spring July 2011



Vuhelper
07-13-2011, 08:18 PM
full solve paper in attachment


Question No: 1 ( Marks: 1 ) - Please choose one
At deposit stage, the serial number is ……………..by E-Cashbank
► Known
► Unknown
► Kept Secret
Question No: 2 ( Marks: 1 ) - Please choose one
Creation of separate experiences for customers based on their behavior is called
► Demographic segmentation
► Behavioral segmentation
► Geo-Graphic Segmentation
► None of the above
Question No: 3 ( Marks: 1 ) - Please choose one
Let us, suppose that you have hosted your e-commerce website,
Promotion messages can be sent when potential client is
► online
► offline
► both online and offline
► visiting head office
Question No: 4 ( Marks: 1 ) - Please choose one
Call handling, sales tracking and Transaction support(technology / personnel) activities are included in which management system
► Customer Relationship Management system
► Public relation management system
► Inventory management system
► Data Base Management system
Question No: 5 ( Marks: 1 ) - Please choose one
What is the correct HTML for making a hyperlink?
► <a href="http://www.w3schools.com">W3Schools</a>
► <a name="http://www.w3schools.com">W3Schools.com</a>
► <a url="http://www.w3schools.com">W3Schools.com</a>
► <a>http://www.w3schools.com</a>
Question No: 6 ( Marks: 1 ) - Please choose one
border-color: specifies the color of all borders in the order:
► ‘border-right-color, border-bottom-color, border-left-color,border-top-color’
► ‘border-left-color ,border-top-color, border-right-color, border-bottom-color,’
► ‘border-top-color, border-right-color, border-bottom-color, border-left-color’
► None of these
Question No: 7 ( Marks: 1 ) - Please choose one
ACH stands for which of the followings?
► Automated Clearing House
► Action Clearing House
► Asynchronous Cryptographic Hash
► All Cryptographic Hostages
Question No: 8 ( Marks: 1 ) - Please choose one
An electronic check contains a(n)………………… to the payer’s bank to make a specified payment to the payee
► Serial#
► Private key
► Instruction
► All of the above
Question No: 9 ( Marks: 1 ) - Please choose one
A company ABC web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death in that culture.
Which is the international barrier it is having?
► Culture
► Language
► Lack of trust
► Infrastructure
Question No: 10 ( Marks: 1 ) - Please choose one
A software company may intentionally register a domain name as ‘macrosoft.com’ (a variant of domain name of the famous company ‘Microsoft’) to take advantage of the reputation of ‘Microsoft’. The idea is that someone intending to reach the web site of ‘Microsoft’ may mistype or misspell and reach the web site of ‘Microsoft’, instead. xyz.com vs. xyz.org Which legal issue arises due to such acts?
► Parasites
► Concurrent use
► Cyber squatting
► None
Question No: 11 ( Marks: 1 ) - Please choose one
A company collecting information assumes that the customer does not object to a specific use of information unless the customer specifically denies the permission. Thus, the company may use the collected information for its own purpose, as well as, sell or rent it out to other firms or persons.
Which of the following Approach it is using?
► Opt-inout
► Swap-out
► Opt-in
► Opt-out
Question No: 12 ( Marks: 1 ) - Please choose one
In which type of approach, we further dig the data for retrieving information from data warehouse?
► Slice
► Dice
► Drill down
► Roll up
Question No: 13 ( Marks: 1 ) - Please choose one
An electronic signature can ensure --------- .
► authenticity
► integrity
► non-repudiation
► all of them
Question No: 14 ( Marks: 1 ) - Please choose one
Where in an HTML document is the correct place to refer to an external style sheet?
► In the <body> section
► At the top of the document
► In the <head> section

► Between head and body




Question No: 15 ( Marks: 1 ) - Please choose one


Symmetric algorithms are faster than asymmetric.

► True

► False



Question No: 16 ( Marks: 1 ) - Please choose one


PKI stands for ___________.


► Public Key Instrument


► Public Key Information


► Public Key Instruction

► Public Key Infrastructure


Question No: 17 ( Marks: 1 ) - Please choose one


According to Michael Porter, “surveys and market research” is an example of primary activity in a strategic business unit. Identify the area in which this task is performed.

► Identify customers

► Market and sell


► Deliver’ activities relate to storage


► Purchase materials and supplies

;


Question No: 18 ( Marks: 1 ) - Please choose one


According to Michael Porter, “material handling” is an example of primary activity in a strategic business unit. Identify the area in which this task is performed.


► Identify customers


► Market and sell

► Deliver’ activities relate to storage

► Purchase materials and supplies



Question No: 19 ( Marks: 1 ) - Please choose one


Upstream activities relate to materials/services or the input from suppliers

► True

► False


Question No: 20 ( Marks: 1 ) - Please choose one


-------------means services in relation to the transformation of contents of an electronic


document from its original form to one that cannot be understood or decoded by any unauthorized person

► Cryptography services

► Accredited Certification Service Provider’


► Originator


► Addressee



Question No: 21 ( Marks: 1 ) - Please choose one


Arbitration is a legal concept in which parties, through an agreement, appoint/nominate a person or a panel to act as a judge in the matter instead of referring the dispute to the ordinary court of law.

► True

► False



Question No: 22 ( Marks: 1 ) - Please choose one


Law is broadly divided into two classes on the basis of nature of wrong, namely, ------------ and ---------------

► Civil law and criminal law

► ETO and criminal law


► Supreme and Civil Law


► None




Question No: 23 ( Marks: 1 ) - Please choose one


Meta
tag is called information about information.

► True

► False





Question No: 24 ( Marks: 1 ) - Please choose one


Each layer except ………… has got a header.

► Physical layer

► Datalink layer


► Session layer


► Network layer



Question No: 25 ( Marks: 1 ) - Please choose one


If 140.57 is network address and 220.200 is machine address then which class of network it is?


► A

► B

► C


► D

Ref: PAGE # 11
Examples
Class A: 255.0.0.0
Class B: 255.255.0.0
Class C: 255.255.255.0





Question No: 26 ( Marks: 1 ) - Please choose one


Classification and Association belong to which of the following types of Data Mining?


► Selective

► Predictive

► Descriptive


► Additive

Ref: PAGE # 141
Classification and association are predictive types of data mining while characterization and clustering represent the descriptive type




Question No: 27 ( Marks: 1 ) - Please choose one


SET was developed in _____.


► 1996

► 1997

► 1998


► 1999

Ref: PAGE # 122
Secure Electronic Transaction (SET)
The drawback in SSL that the credit card/debit card information remains with the merchant led to the development of a more sophisticated protocol called SET. It was developed in 1997


Question No: 28 ( Marks: 1 ) - Please choose one


Brick-and-Mortar businesses are referring to ______.


► Online businesses

► Offline businesses

► Both


► None of above

Ref: PAGE # 129
Brick-and-Mortar vs. Click-and-Mortar businesses
These two terms refer to the offline and the online businesses, respectively. Where a company is doing its business both online and offline, there is often the problem of lack of proper integration between the two different channels of business.




Note: Offline business = Brick-and-Mortar

And Online Business = Click-and-Mortar businesses


Question No: 29 ( Marks: 1 ) - Please choose one


Which tag holds the key information about the Web Page?

► META

► HEAD


► BODY


► HTML

Ref: PAGE # 138
META INFORMATION:
a Meta tag contains the key information of a web page.


Question No: 30 ( Marks: 1 ) - Please choose one


OLAP stands for


► Object linked Application Program


► Object Linked Analytical Processing

► Online Analytical Processing

► None

Ref: PAGE # 145

Online Analytical Processing (OLAP)



Question No: 31 ( Marks: 2 )


List and explain the name of protocol used at "Network" layer of OSI model?


Answer is here :

page 6 lesson 2


Network layer

It is responsible for providing IP addresses on data packets using IP protocol. Routing Information

Protocol (RIP) also operates here which enables routers to build their routing table. Another protocol,

Address Resolution Protocol (ARP) is also designed to operate at network layer.





Question No: 32 ( Marks: 2 )


What do we mean by “Affiliation” between two parties? Explain shortly.


Affiliation:

Generally, affiliation exists when one business controls or has the power to

control another or when a third party (or parties) controls or has the power to control both

businesses. Control may arise through ownership, management, or other relationships or

interactions between the parties. Merger us an example of affiliation.





Question No: 33 ( Marks: 2 )


Do you agree that Customization is one of the role of e-commerce in Competitive Strategy. Discuss briefly


Ans: customization:

With the help of e-commerce the customer data can b gathered and analyze it nd customer serve it in a better manner according to their need one can thus implement differentiation and focus strategy.





Question No: 34 ( Marks: 2 )


Write down the hierarchy of courts with reference to the global legal issues of e-commerce?


Page177 :

Answer is Here :

Major Global legal issue or E-Commerce from Hierarchy of Courts :

1. Territorial jurisdiction
2. Online contracts
3. Copyright in cyberspace
4. Domain name and trademark conflicts
5. Online defamation
6. Online privacy
7. Issues of taxation on internet
8. Cyber crimes





Question No: 35 ( Marks: 3 )


How Technology development is supporting activities in value Chain.

Answer is here : page 153


‘Technology development’ relates to activities which help improve product/service that a business

is selling and also help improve processes in every primary activity, e.g, fields tests, maintenance of

procedures, process improvement studies etc.






Question No: 36 ( Marks: 3 )


What is e-business storefront model?


Storefront Model: Page 128

It represents basic form of e-commerce where buyers and sellers interact directly. Merchants need to

organize online catalog of products, take orders through their websites, accept payments in a secure

environment and send items to the customers. They can also store and manage customer data in databases.

A storefront model uses the shopping cart technology which allows customers to accumulate items they

want to buy during shopping. This is quite popular in B2C transactions.





Question No: 37 ( Marks: 3 )


What are three different models of transmission? Shortly explain each.




Question No: 38 ( Marks: 3 )


What type of issues civil and criminal laws deals with?

Page 176 : lesson 44


Law is broadly divided into two classes on the basis of nature of wrong, namely, civil law and criminal law. Civil law deals

with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Civil

wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in

general. On the other hand, a criminal wrong (crime) is an act deemed by law to be harmful to the society in

general such as theft or murder etc. and the state itself is a party in such matters.





Question No: 39 ( Marks: 5 )


What is supply chain management? Write down advantages and disadvantage of using internet technologies in Supply chain.

Page 155+156 : lesson 38


Supply chain management

Engaging and negotiating with suppliers can be extremely beneficial. The process of taking active role in

working with suppliers to improve products and processes is called supply chain management. Today, firms

are reaching beyond limits of their own organizational structure. They are creating new network form of

organization among the members of supply chain. Supply chain management is now used to add value in

the form of benefits to the ultimate customer at the end of supply chain. It has become important for a

business to work to establish long term relationship with at least small number of capable suppliers.


Internet technologies and supply chain

Internet is a very quick and effective tool of communication. On the other hand, communication is also a

very critical element in supply chain management. Using internet technology:
1. suppliers can share any information about changes in the customer demand;
2. suppliers can have immediate notice of any changes in product design;
3. drawings/specifications of a product can be quickly provided to the suppliers and vice versa;
4. processing speed of a transaction can be increased;
5. cost of handling a transaction can be reduced;
6. chances of errors in entering transaction data are reduced;

Probably, the only disadvantage of using internet technology in a supply chain is that sometimes it may

prove to be costly. However, in ultimate analysis, the advantages override the cost factor.

With the help of supply chain management software, one can not only manage the internal processes but

also processes of other members of the supply chain. Therefore, it can be predicted that when and how

much of certain product would need to be produced.


Question No: 40 ( Marks: 5 )


Under Section 25, each certification service provider shall prepare a Certification Practice Statement (CPS).


What you understand by CPS?