Vuhelper
07-13-2011, 08:18 PM
full solve paper in attachment
Question No: 1 ( Marks: 1 ) - Please choose one
At deposit stage, the serial number is ……………..by E-Cashbank
► Known
► Unknown
► Kept Secret
Question No: 2 ( Marks: 1 ) - Please choose one
Creation of separate experiences for customers based on their behavior is called
► Demographic segmentation
► Behavioral segmentation
► Geo-Graphic Segmentation
► None of the above
Question No: 3 ( Marks: 1 ) - Please choose one
Let us, suppose that you have hosted your e-commerce website,
Promotion messages can be sent when potential client is
► online
► offline
► both online and offline
► visiting head office
Question No: 4 ( Marks: 1 ) - Please choose one
Call handling, sales tracking and Transaction support(technology / personnel) activities are included in which management system
► Customer Relationship Management system
► Public relation management system
► Inventory management system
► Data Base Management system
Question No: 5 ( Marks: 1 ) - Please choose one
What is the correct HTML for making a hyperlink?
► <a href="http://www.w3schools.com">W3Schools</a>
► <a name="http://www.w3schools.com">W3Schools.com</a>
► <a url="http://www.w3schools.com">W3Schools.com</a>
► <a>http://www.w3schools.com</a>
Question No: 6 ( Marks: 1 ) - Please choose one
border-color: specifies the color of all borders in the order:
► ‘border-right-color, border-bottom-color, border-left-color,border-top-color’
► ‘border-left-color ,border-top-color, border-right-color, border-bottom-color,’
► ‘border-top-color, border-right-color, border-bottom-color, border-left-color’
► None of these
Question No: 7 ( Marks: 1 ) - Please choose one
ACH stands for which of the followings?
► Automated Clearing House
► Action Clearing House
► Asynchronous Cryptographic Hash
► All Cryptographic Hostages
Question No: 8 ( Marks: 1 ) - Please choose one
An electronic check contains a(n)………………… to the payer’s bank to make a specified payment to the payee
► Serial#
► Private key
► Instruction
► All of the above
Question No: 9 ( Marks: 1 ) - Please choose one
A company ABC web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death in that culture.
Which is the international barrier it is having?
► Culture
► Language
► Lack of trust
► Infrastructure
Question No: 10 ( Marks: 1 ) - Please choose one
A software company may intentionally register a domain name as ‘macrosoft.com’ (a variant of domain name of the famous company ‘Microsoft’) to take advantage of the reputation of ‘Microsoft’. The idea is that someone intending to reach the web site of ‘Microsoft’ may mistype or misspell and reach the web site of ‘Microsoft’, instead. xyz.com vs. xyz.org Which legal issue arises due to such acts?
► Parasites
► Concurrent use
► Cyber squatting
► None
Question No: 11 ( Marks: 1 ) - Please choose one
A company collecting information assumes that the customer does not object to a specific use of information unless the customer specifically denies the permission. Thus, the company may use the collected information for its own purpose, as well as, sell or rent it out to other firms or persons.
Which of the following Approach it is using?
► Opt-inout
► Swap-out
► Opt-in
► Opt-out
Question No: 12 ( Marks: 1 ) - Please choose one
In which type of approach, we further dig the data for retrieving information from data warehouse?
► Slice
► Dice
► Drill down
► Roll up
Question No: 13 ( Marks: 1 ) - Please choose one
An electronic signature can ensure --------- .
► authenticity
► integrity
► non-repudiation
► all of them
Question No: 14 ( Marks: 1 ) - Please choose one
Where in an HTML document is the correct place to refer to an external style sheet?
► In the <body> section
► At the top of the document
► In the <head> section
► Between head and body
Question No: 15 ( Marks: 1 ) - Please choose one
Symmetric algorithms are faster than asymmetric.
► True
► False
Question No: 16 ( Marks: 1 ) - Please choose one
PKI stands for ___________.
► Public Key Instrument
► Public Key Information
► Public Key Instruction
► Public Key Infrastructure
Question No: 17 ( Marks: 1 ) - Please choose one
According to Michael Porter, “surveys and market research” is an example of primary activity in a strategic business unit. Identify the area in which this task is performed.
► Identify customers
► Market and sell
► Deliver’ activities relate to storage
► Purchase materials and supplies
;
Question No: 18 ( Marks: 1 ) - Please choose one
According to Michael Porter, “material handling” is an example of primary activity in a strategic business unit. Identify the area in which this task is performed.
► Identify customers
► Market and sell
► Deliver’ activities relate to storage
► Purchase materials and supplies
Question No: 19 ( Marks: 1 ) - Please choose one
Upstream activities relate to materials/services or the input from suppliers
► True
► False
Question No: 20 ( Marks: 1 ) - Please choose one
-------------means services in relation to the transformation of contents of an electronic
document from its original form to one that cannot be understood or decoded by any unauthorized person
► Cryptography services
► Accredited Certification Service Provider’
► Originator
► Addressee
Question No: 21 ( Marks: 1 ) - Please choose one
Arbitration is a legal concept in which parties, through an agreement, appoint/nominate a person or a panel to act as a judge in the matter instead of referring the dispute to the ordinary court of law.
► True
► False
Question No: 22 ( Marks: 1 ) - Please choose one
Law is broadly divided into two classes on the basis of nature of wrong, namely, ------------ and ---------------
► Civil law and criminal law
► ETO and criminal law
► Supreme and Civil Law
► None
Question No: 23 ( Marks: 1 ) - Please choose one
Meta
tag is called information about information.
► True
► False
Question No: 24 ( Marks: 1 ) - Please choose one
Each layer except ………… has got a header.
► Physical layer
► Datalink layer
► Session layer
► Network layer
Question No: 25 ( Marks: 1 ) - Please choose one
If 140.57 is network address and 220.200 is machine address then which class of network it is?
► A
► B
► C
► D
Ref: PAGE # 11
Examples
Class A: 255.0.0.0
Class B: 255.255.0.0
Class C: 255.255.255.0
Question No: 26 ( Marks: 1 ) - Please choose one
Classification and Association belong to which of the following types of Data Mining?
► Selective
► Predictive
► Descriptive
► Additive
Ref: PAGE # 141
Classification and association are predictive types of data mining while characterization and clustering represent the descriptive type
Question No: 27 ( Marks: 1 ) - Please choose one
SET was developed in _____.
► 1996
► 1997
► 1998
► 1999
Ref: PAGE # 122
Secure Electronic Transaction (SET)
The drawback in SSL that the credit card/debit card information remains with the merchant led to the development of a more sophisticated protocol called SET. It was developed in 1997
Question No: 28 ( Marks: 1 ) - Please choose one
Brick-and-Mortar businesses are referring to ______.
► Online businesses
► Offline businesses
► Both
► None of above
Ref: PAGE # 129
Brick-and-Mortar vs. Click-and-Mortar businesses
These two terms refer to the offline and the online businesses, respectively. Where a company is doing its business both online and offline, there is often the problem of lack of proper integration between the two different channels of business.
Note: Offline business = Brick-and-Mortar
And Online Business = Click-and-Mortar businesses
Question No: 29 ( Marks: 1 ) - Please choose one
Which tag holds the key information about the Web Page?
► META
► HEAD
► BODY
► HTML
Ref: PAGE # 138
META INFORMATION:
a Meta tag contains the key information of a web page.
Question No: 30 ( Marks: 1 ) - Please choose one
OLAP stands for
► Object linked Application Program
► Object Linked Analytical Processing
► Online Analytical Processing
► None
Ref: PAGE # 145
Online Analytical Processing (OLAP)
Question No: 31 ( Marks: 2 )
List and explain the name of protocol used at "Network" layer of OSI model?
Answer is here :
page 6 lesson 2
Network layer
It is responsible for providing IP addresses on data packets using IP protocol. Routing Information
Protocol (RIP) also operates here which enables routers to build their routing table. Another protocol,
Address Resolution Protocol (ARP) is also designed to operate at network layer.
Question No: 32 ( Marks: 2 )
What do we mean by “Affiliation” between two parties? Explain shortly.
Affiliation:
Generally, affiliation exists when one business controls or has the power to
control another or when a third party (or parties) controls or has the power to control both
businesses. Control may arise through ownership, management, or other relationships or
interactions between the parties. Merger us an example of affiliation.
Question No: 33 ( Marks: 2 )
Do you agree that Customization is one of the role of e-commerce in Competitive Strategy. Discuss briefly
Ans: customization:
With the help of e-commerce the customer data can b gathered and analyze it nd customer serve it in a better manner according to their need one can thus implement differentiation and focus strategy.
Question No: 34 ( Marks: 2 )
Write down the hierarchy of courts with reference to the global legal issues of e-commerce?
Page177 :
Answer is Here :
Major Global legal issue or E-Commerce from Hierarchy of Courts :
1. Territorial jurisdiction
2. Online contracts
3. Copyright in cyberspace
4. Domain name and trademark conflicts
5. Online defamation
6. Online privacy
7. Issues of taxation on internet
8. Cyber crimes
Question No: 35 ( Marks: 3 )
How Technology development is supporting activities in value Chain.
Answer is here : page 153
‘Technology development’ relates to activities which help improve product/service that a business
is selling and also help improve processes in every primary activity, e.g, fields tests, maintenance of
procedures, process improvement studies etc.
Question No: 36 ( Marks: 3 )
What is e-business storefront model?
Storefront Model: Page 128
It represents basic form of e-commerce where buyers and sellers interact directly. Merchants need to
organize online catalog of products, take orders through their websites, accept payments in a secure
environment and send items to the customers. They can also store and manage customer data in databases.
A storefront model uses the shopping cart technology which allows customers to accumulate items they
want to buy during shopping. This is quite popular in B2C transactions.
Question No: 37 ( Marks: 3 )
What are three different models of transmission? Shortly explain each.
Question No: 38 ( Marks: 3 )
What type of issues civil and criminal laws deals with?
Page 176 : lesson 44
Law is broadly divided into two classes on the basis of nature of wrong, namely, civil law and criminal law. Civil law deals
with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Civil
wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in
general. On the other hand, a criminal wrong (crime) is an act deemed by law to be harmful to the society in
general such as theft or murder etc. and the state itself is a party in such matters.
Question No: 39 ( Marks: 5 )
What is supply chain management? Write down advantages and disadvantage of using internet technologies in Supply chain.
Page 155+156 : lesson 38
Supply chain management
Engaging and negotiating with suppliers can be extremely beneficial. The process of taking active role in
working with suppliers to improve products and processes is called supply chain management. Today, firms
are reaching beyond limits of their own organizational structure. They are creating new network form of
organization among the members of supply chain. Supply chain management is now used to add value in
the form of benefits to the ultimate customer at the end of supply chain. It has become important for a
business to work to establish long term relationship with at least small number of capable suppliers.
Internet technologies and supply chain
Internet is a very quick and effective tool of communication. On the other hand, communication is also a
very critical element in supply chain management. Using internet technology:
1. suppliers can share any information about changes in the customer demand;
2. suppliers can have immediate notice of any changes in product design;
3. drawings/specifications of a product can be quickly provided to the suppliers and vice versa;
4. processing speed of a transaction can be increased;
5. cost of handling a transaction can be reduced;
6. chances of errors in entering transaction data are reduced;
Probably, the only disadvantage of using internet technology in a supply chain is that sometimes it may
prove to be costly. However, in ultimate analysis, the advantages override the cost factor.
With the help of supply chain management software, one can not only manage the internal processes but
also processes of other members of the supply chain. Therefore, it can be predicted that when and how
much of certain product would need to be produced.
Question No: 40 ( Marks: 5 )
Under Section 25, each certification service provider shall prepare a Certification Practice Statement (CPS).
What you understand by CPS?
Question No: 1 ( Marks: 1 ) - Please choose one
At deposit stage, the serial number is ……………..by E-Cashbank
► Known
► Unknown
► Kept Secret
Question No: 2 ( Marks: 1 ) - Please choose one
Creation of separate experiences for customers based on their behavior is called
► Demographic segmentation
► Behavioral segmentation
► Geo-Graphic Segmentation
► None of the above
Question No: 3 ( Marks: 1 ) - Please choose one
Let us, suppose that you have hosted your e-commerce website,
Promotion messages can be sent when potential client is
► online
► offline
► both online and offline
► visiting head office
Question No: 4 ( Marks: 1 ) - Please choose one
Call handling, sales tracking and Transaction support(technology / personnel) activities are included in which management system
► Customer Relationship Management system
► Public relation management system
► Inventory management system
► Data Base Management system
Question No: 5 ( Marks: 1 ) - Please choose one
What is the correct HTML for making a hyperlink?
► <a href="http://www.w3schools.com">W3Schools</a>
► <a name="http://www.w3schools.com">W3Schools.com</a>
► <a url="http://www.w3schools.com">W3Schools.com</a>
► <a>http://www.w3schools.com</a>
Question No: 6 ( Marks: 1 ) - Please choose one
border-color: specifies the color of all borders in the order:
► ‘border-right-color, border-bottom-color, border-left-color,border-top-color’
► ‘border-left-color ,border-top-color, border-right-color, border-bottom-color,’
► ‘border-top-color, border-right-color, border-bottom-color, border-left-color’
► None of these
Question No: 7 ( Marks: 1 ) - Please choose one
ACH stands for which of the followings?
► Automated Clearing House
► Action Clearing House
► Asynchronous Cryptographic Hash
► All Cryptographic Hostages
Question No: 8 ( Marks: 1 ) - Please choose one
An electronic check contains a(n)………………… to the payer’s bank to make a specified payment to the payee
► Serial#
► Private key
► Instruction
► All of the above
Question No: 9 ( Marks: 1 ) - Please choose one
A company ABC web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death in that culture.
Which is the international barrier it is having?
► Culture
► Language
► Lack of trust
► Infrastructure
Question No: 10 ( Marks: 1 ) - Please choose one
A software company may intentionally register a domain name as ‘macrosoft.com’ (a variant of domain name of the famous company ‘Microsoft’) to take advantage of the reputation of ‘Microsoft’. The idea is that someone intending to reach the web site of ‘Microsoft’ may mistype or misspell and reach the web site of ‘Microsoft’, instead. xyz.com vs. xyz.org Which legal issue arises due to such acts?
► Parasites
► Concurrent use
► Cyber squatting
► None
Question No: 11 ( Marks: 1 ) - Please choose one
A company collecting information assumes that the customer does not object to a specific use of information unless the customer specifically denies the permission. Thus, the company may use the collected information for its own purpose, as well as, sell or rent it out to other firms or persons.
Which of the following Approach it is using?
► Opt-inout
► Swap-out
► Opt-in
► Opt-out
Question No: 12 ( Marks: 1 ) - Please choose one
In which type of approach, we further dig the data for retrieving information from data warehouse?
► Slice
► Dice
► Drill down
► Roll up
Question No: 13 ( Marks: 1 ) - Please choose one
An electronic signature can ensure --------- .
► authenticity
► integrity
► non-repudiation
► all of them
Question No: 14 ( Marks: 1 ) - Please choose one
Where in an HTML document is the correct place to refer to an external style sheet?
► In the <body> section
► At the top of the document
► In the <head> section
► Between head and body
Question No: 15 ( Marks: 1 ) - Please choose one
Symmetric algorithms are faster than asymmetric.
► True
► False
Question No: 16 ( Marks: 1 ) - Please choose one
PKI stands for ___________.
► Public Key Instrument
► Public Key Information
► Public Key Instruction
► Public Key Infrastructure
Question No: 17 ( Marks: 1 ) - Please choose one
According to Michael Porter, “surveys and market research” is an example of primary activity in a strategic business unit. Identify the area in which this task is performed.
► Identify customers
► Market and sell
► Deliver’ activities relate to storage
► Purchase materials and supplies
;
Question No: 18 ( Marks: 1 ) - Please choose one
According to Michael Porter, “material handling” is an example of primary activity in a strategic business unit. Identify the area in which this task is performed.
► Identify customers
► Market and sell
► Deliver’ activities relate to storage
► Purchase materials and supplies
Question No: 19 ( Marks: 1 ) - Please choose one
Upstream activities relate to materials/services or the input from suppliers
► True
► False
Question No: 20 ( Marks: 1 ) - Please choose one
-------------means services in relation to the transformation of contents of an electronic
document from its original form to one that cannot be understood or decoded by any unauthorized person
► Cryptography services
► Accredited Certification Service Provider’
► Originator
► Addressee
Question No: 21 ( Marks: 1 ) - Please choose one
Arbitration is a legal concept in which parties, through an agreement, appoint/nominate a person or a panel to act as a judge in the matter instead of referring the dispute to the ordinary court of law.
► True
► False
Question No: 22 ( Marks: 1 ) - Please choose one
Law is broadly divided into two classes on the basis of nature of wrong, namely, ------------ and ---------------
► Civil law and criminal law
► ETO and criminal law
► Supreme and Civil Law
► None
Question No: 23 ( Marks: 1 ) - Please choose one
Meta
tag is called information about information.
► True
► False
Question No: 24 ( Marks: 1 ) - Please choose one
Each layer except ………… has got a header.
► Physical layer
► Datalink layer
► Session layer
► Network layer
Question No: 25 ( Marks: 1 ) - Please choose one
If 140.57 is network address and 220.200 is machine address then which class of network it is?
► A
► B
► C
► D
Ref: PAGE # 11
Examples
Class A: 255.0.0.0
Class B: 255.255.0.0
Class C: 255.255.255.0
Question No: 26 ( Marks: 1 ) - Please choose one
Classification and Association belong to which of the following types of Data Mining?
► Selective
► Predictive
► Descriptive
► Additive
Ref: PAGE # 141
Classification and association are predictive types of data mining while characterization and clustering represent the descriptive type
Question No: 27 ( Marks: 1 ) - Please choose one
SET was developed in _____.
► 1996
► 1997
► 1998
► 1999
Ref: PAGE # 122
Secure Electronic Transaction (SET)
The drawback in SSL that the credit card/debit card information remains with the merchant led to the development of a more sophisticated protocol called SET. It was developed in 1997
Question No: 28 ( Marks: 1 ) - Please choose one
Brick-and-Mortar businesses are referring to ______.
► Online businesses
► Offline businesses
► Both
► None of above
Ref: PAGE # 129
Brick-and-Mortar vs. Click-and-Mortar businesses
These two terms refer to the offline and the online businesses, respectively. Where a company is doing its business both online and offline, there is often the problem of lack of proper integration between the two different channels of business.
Note: Offline business = Brick-and-Mortar
And Online Business = Click-and-Mortar businesses
Question No: 29 ( Marks: 1 ) - Please choose one
Which tag holds the key information about the Web Page?
► META
► HEAD
► BODY
► HTML
Ref: PAGE # 138
META INFORMATION:
a Meta tag contains the key information of a web page.
Question No: 30 ( Marks: 1 ) - Please choose one
OLAP stands for
► Object linked Application Program
► Object Linked Analytical Processing
► Online Analytical Processing
► None
Ref: PAGE # 145
Online Analytical Processing (OLAP)
Question No: 31 ( Marks: 2 )
List and explain the name of protocol used at "Network" layer of OSI model?
Answer is here :
page 6 lesson 2
Network layer
It is responsible for providing IP addresses on data packets using IP protocol. Routing Information
Protocol (RIP) also operates here which enables routers to build their routing table. Another protocol,
Address Resolution Protocol (ARP) is also designed to operate at network layer.
Question No: 32 ( Marks: 2 )
What do we mean by “Affiliation” between two parties? Explain shortly.
Affiliation:
Generally, affiliation exists when one business controls or has the power to
control another or when a third party (or parties) controls or has the power to control both
businesses. Control may arise through ownership, management, or other relationships or
interactions between the parties. Merger us an example of affiliation.
Question No: 33 ( Marks: 2 )
Do you agree that Customization is one of the role of e-commerce in Competitive Strategy. Discuss briefly
Ans: customization:
With the help of e-commerce the customer data can b gathered and analyze it nd customer serve it in a better manner according to their need one can thus implement differentiation and focus strategy.
Question No: 34 ( Marks: 2 )
Write down the hierarchy of courts with reference to the global legal issues of e-commerce?
Page177 :
Answer is Here :
Major Global legal issue or E-Commerce from Hierarchy of Courts :
1. Territorial jurisdiction
2. Online contracts
3. Copyright in cyberspace
4. Domain name and trademark conflicts
5. Online defamation
6. Online privacy
7. Issues of taxation on internet
8. Cyber crimes
Question No: 35 ( Marks: 3 )
How Technology development is supporting activities in value Chain.
Answer is here : page 153
‘Technology development’ relates to activities which help improve product/service that a business
is selling and also help improve processes in every primary activity, e.g, fields tests, maintenance of
procedures, process improvement studies etc.
Question No: 36 ( Marks: 3 )
What is e-business storefront model?
Storefront Model: Page 128
It represents basic form of e-commerce where buyers and sellers interact directly. Merchants need to
organize online catalog of products, take orders through their websites, accept payments in a secure
environment and send items to the customers. They can also store and manage customer data in databases.
A storefront model uses the shopping cart technology which allows customers to accumulate items they
want to buy during shopping. This is quite popular in B2C transactions.
Question No: 37 ( Marks: 3 )
What are three different models of transmission? Shortly explain each.
Question No: 38 ( Marks: 3 )
What type of issues civil and criminal laws deals with?
Page 176 : lesson 44
Law is broadly divided into two classes on the basis of nature of wrong, namely, civil law and criminal law. Civil law deals
with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Civil
wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in
general. On the other hand, a criminal wrong (crime) is an act deemed by law to be harmful to the society in
general such as theft or murder etc. and the state itself is a party in such matters.
Question No: 39 ( Marks: 5 )
What is supply chain management? Write down advantages and disadvantage of using internet technologies in Supply chain.
Page 155+156 : lesson 38
Supply chain management
Engaging and negotiating with suppliers can be extremely beneficial. The process of taking active role in
working with suppliers to improve products and processes is called supply chain management. Today, firms
are reaching beyond limits of their own organizational structure. They are creating new network form of
organization among the members of supply chain. Supply chain management is now used to add value in
the form of benefits to the ultimate customer at the end of supply chain. It has become important for a
business to work to establish long term relationship with at least small number of capable suppliers.
Internet technologies and supply chain
Internet is a very quick and effective tool of communication. On the other hand, communication is also a
very critical element in supply chain management. Using internet technology:
1. suppliers can share any information about changes in the customer demand;
2. suppliers can have immediate notice of any changes in product design;
3. drawings/specifications of a product can be quickly provided to the suppliers and vice versa;
4. processing speed of a transaction can be increased;
5. cost of handling a transaction can be reduced;
6. chances of errors in entering transaction data are reduced;
Probably, the only disadvantage of using internet technology in a supply chain is that sometimes it may
prove to be costly. However, in ultimate analysis, the advantages override the cost factor.
With the help of supply chain management software, one can not only manage the internal processes but
also processes of other members of the supply chain. Therefore, it can be predicted that when and how
much of certain product would need to be produced.
Question No: 40 ( Marks: 5 )
Under Section 25, each certification service provider shall prepare a Certification Practice Statement (CPS).
What you understand by CPS?