Вы находитесь на странице: 1из 0

FINALTERM EXAMINATION

Fall 2008
IT430- E-Commerce (Session - 2)
Question No: 1 ( Marks: 1 ) - Please choose one
Which of following marketing campaigns are cheap an effective way to target
potential customers?
Sale forces
E-mail
Media promotion
Marketing software
Reference: : page #133 handouts lecture #31
E-mail marketing campaigns are cheap and effective way to target potential
customers. E-mails can instantaneously convey a marketing message to customers
at distant areas.
Question No: 2 ( Marks: 1 ) - Please choose one
Do you think, vulms.vu.edu.pk is an example of E-mail marketing?
True
False
Question No: 3 ( Marks: 1 ) - Please choose one
RIP(Routing Information protocol) is used by---------- , to build a ------------ table
bridges , hash
routers, matrix
routers , routing
All of these


Reference: : page #06 handouts lecture #02
It is responsible for providing IP addresses on data packets using IP protocol.
Routing Information
Protocol (RIP) also operates here which enables routers to build their routing table.
Another protocol,
Address Resolution Protocol (ARP) is also designed to operate at network layer.
Question No: 4 ( Marks: 1 ) - Please choose one
When you declare a variable within a function, the variable can only be accessed
within that function. When you exit the function, the variable is destroyed. These
variables are called
Local Variables
Global Variables
Local and Global
None of the above
Reference
http://www.w3schools.com/js/js_functions.asp
Question No: 5 ( Marks: 1 ) - Please choose one
Constructor is defined as the initializing function used to create ........
Instance of object
Copy of object
Instance / copy of object
Shallow copy of object
Reference: : page #69 handouts lecture #15
Constructor is defined as the initializing function used to create instance/copy of an
object. It is after the name of the object whose constructor it is. Note that we can


invoke or apply different methods/functions of the date object using this instance
d, e.g, d.getDay(),
Question No: 6 ( Marks: 1 ) - Please choose one
If user A wants to send an encrypted message to user B, the plaintext is
encrypted with public key of ___________
User A
User B
Network
Both Users A and B
How is encryption used with digital signatures

So, if user A wants to send an encrypted message to user B, user A would first
obtain user Bs public key. This is possible because public keys are meant to be
widely distributed. Then user A encrypts the message using user Bs public
key. The encrypted messagecan now only be decrypted with Bs private key,
which only he possesses
Question No: 7 ( Marks: 1 ) - Please choose one
Television, radio and print media are in a (n) . Mode.
Passive
Active
Static
Dynamic
Reference: : page #139 handouts lecture #33
Emotional branding vs. rational branding
In case of television, radio or print media people are normally in a passive mode.
Question No: 8 ( Marks: 1 ) - Please choose one


-----------means that your product/service has certain quality that makes it more
attractive than the one offered by your competitor, despite the price of your
competitor s product/service is somewhat lower
None of them
Differentiation
Focus
Cost leadership
Reference: : page #157 handouts lecture #38
Differentiation
Differentiation means that your product/service has certain quality that makes it
more attractive than the
one offered by your competitor, despite the price of your competitors
product/service is somewhat lower.For instance, you can beat your competitors for
the reason that the air conditioner produced by your company is unique as it does
not produce noise while in operation, whereas this feature is missing in the air
conditioners produced by your competitors.
Question No: 9 ( Marks: 1 ) - Please choose one
It is the ability to sell the goods or provide the service at a price that is lower than
that of competitors, and thus attract more customers.
What is called?
Cost leadership
Price leadership
Focus
Differentiation
Reference: : page #157 handouts lecture #38
Cost leadership


It is the ability to sell the goods or provide the service at a price that is lower than
that of competitors, and thus attract more customers.
Question No: 10( Marks: 1 ) - Please choose one
E-business --------- strategy is normally formed and implemented according to a
planning cycle which is called strategic planning cycle.
Differentiation
Focus
Competitive
Diversification
Reference: : page #159 handouts lecture #39
Strategic Planning Cycle
E-business competitive strategy is normally formed and implemented according to
a planning cycle which is called strategic planning cycle.
Question No: 11 ( Marks: 1 ) - Please choose one
ETO Stand for??
Electronic transaction Organization
Electronic trade Organization
Electronic Transactions Ordinance
None of them
Reference: : page #163 handouts lecture #40
Electronic Transactions Ordinance, 2002 (ETO)
ETO is the law introduced in 2002 which extends to the whole of Pakistan. It
basically provides legal recognition to documents in electronic form and to
electronic signatures. To understand this law, it would be useful to revise the
concept related to the working of digital signature technology (refer to Lecture no.


23). We shall look at salient provisions/features of this law as it directly deals with
e-commerce in Pakistan. Section 2 of the ETO defines different terms used in it.
For convenience these terms have been reproduced here (you do not need to
memorize these for exam).
Question No: 12 ( Marks: 1 ) - Please choose one
Suppose, someone circulates a news item in the media about the reputation of a
doctor, alleging him to be professionally incompetent and negligent. This doctor
may then file a lawsuit against that person claiming that his reputation has been
injured due to such an act.
Which legal issue arises due to such acts?
Online Defamation
Cyber squatting
None
Cyber Crimes
Reference: : page #182 handouts lecture #45
Online Defamation
A defamatory statement is a false statement that injures the reputation of on
another person or company. If a statement injures the reputation of a product or
service instead of a person, it is called product disparagement. Suppose, someone
circulates a news item in the media about the reputation of a doctor, alleging him
to be professionally incompetent and negligent. This doctor may then file a lawsuit
against that person claiming that his reputation has been injured due to such an act.
Often, in cases of defamation the plea taken by the defendant is that his statement
is not false. Rather, it is a fair comment. In case defamation is done using the
internet, it is termed as online defamation. In countries abroad, the courts are
replete with cases of online defamation, mainly, because the person causing
defamation can expect to remain anonymous due to the nature of internet
technology.
Question No: 13 ( Marks: 1 ) - Please choose one


A software company may intentionally register a domain name as
macrosoft.com (a variant of domain name of the famous company Microsoft )
to take advantage of the reputation of Microsoft . The idea is that someone
intending to reach the web site of Microsoft may mistype or misspell and reach
the web site of Microsoft , instead. xyz.com vs. xyz.org
Which legal issue arises due to such acts?
Parasites
Concurrent use
Cyber squatting
None
Reference: : page #181 handouts lecture #45
Cyber squatting
The act of intentionally registering domain names containing trademarks/trade
names of prominent companies to later blackmail or demand ransom from those
companies is called cyber squatting. It is regarded as an offence in most countries.
Assume there is a firm Glory Enterprise and it wants to have its web site. It also
wants to have the word glory as a part of its domain name because for years it has
been recognized in the physical world through this word. However, at the time of
registration of itsdomain name it finds that a person Mr. A who has nothing to do
with the business of the firm or the word glory has already registered a domain
name containing this word as a part of it. Since there cannot be two similar domain
names, the firm is forced to request Mr. A to transfer that domain name to it. In
response, if Mr. A blackmails or claims ransom from the said firm, he would be
said to have committed cyber squatting.
Question No: 14 ( Marks: 1 ) - Please choose one
Big advantages of using VAN in EDI is(are):
Time independence
Protocol Independence
Network independence


Time and Protocol Independence
Reference: : page #149 handouts lecture #36
Advantages of VAN
Two big advantages of using a VAN in EDI are time independence and protocol
independence. Timeindependence means that the sending and receipt of the
interchange or messages can be carried out at the convenience of the users
involved. Thus, they are not required to be connected with each other at the same
time. Protocol independence means that interchanges are re-enveloped with the
transmissionprotocol appropriate to the recipient when they are retrieved from the
postbox by the VAN. Thus, a VAN can provide protocol compatibility between the
sender and the recipient, wherever that is missing.
Question No: 15 ( Marks: 1 ) - Please choose one
An array can contain ----------.
only text
only numbers
only numbers or text
any valid variable
Question No: 16 ( Marks: 1 ) - Please choose one
Choose which one is the not the columns of Log files.
IP addresses
Request (url)
Date
Contents
Reference: : page #136 handouts lecture #32
Log files consist ofdata generated by site visits and include information about each
visitors location, IP address, time of visit, frequency of visits etc. There are


businesses that provide the services of analyzing web log files. The results would
show how effective your web site is and indicate the top-referring web sites.
Question No: 17 ( Marks: 1 ) - Please choose one
JSP uses which programming language for coding?
C++
VBSCRIPT
JAVASCRIPT
JAVA
Reference: : page #85 handouts lecture #18
VBScript and JSP uses Java programming language for coding.
Question No: 18 ( Marks: 1 ) - Please choose one
In Style Sheets, How do you display hyperlinks without an underline?
{underline:none}
{text-decoration:no underline}
{decoration:no underline}
a {text-decoration:none}
Reference:
http://www.geekinterview.com/question_details/57379
Question No: 19 ( Marks: 1 ) - Please choose one
Symmetric algorithms are faster than asymmetric.
True
False
Reference: : page #85 handouts lecture #18


symmetric algorithms are faster as compared to asymmetric, therefore, the
encryption of a message with the symmetric key takes place quickly. In order to
send the symmetric key to the receiver, however, the asymmetric cryptography has
to be used. PGP uses this system.
Question No: 20 ( Marks: 1 ) - Please choose one
ACH is a centralized system used by electronically inter-connected
banks for clearing payment requests.
True
False
Reference: : page #110 handouts lecture #24
The transfer takes place with the help of Automated Clearing House (ACH)
service. Note that
an ACH is a centralized system to which different banks are electronically
connected forming a network for clearing payment requests.
Question No: 21 ( Marks: 1 ) - Please choose one
The basic difference between Virtual PIN System and Electronic Check is
_________.
Registration with bank
No. of participants
Use of encryption
No difference between them
Virtual PIN Payment System

It is one of the earliest credit card-based systems launched for the internet in 1994
by a company; First Virtual Holdings, Inc. Virtual PIN system does not
involve the use of encryption.


An electronic check contains an instruction to the payers bank to make a specified
payment to a payee. Both, symmetric and asymmetric type of cryptography is used
in this system
Question No: 22 ( Marks: 1 ) - Please choose one
An e-coin consists on ________ elements.
Four
One
Two
Three
E-cash Coins
The currency used in this payment system is called an e-cash coin or simply coin.
A coin consists of three elements or parts - serial #, key version and serial no.
signed by the secret or private key of a certain denomination of the e-cash bank.
Question No: 23 ( Marks: 1 ) - Please choose one
Which currency is used in e-cash Payment system?
Dollar
Coin
Penny
Cent
Reference: : page #116 handouts lecture #26
E-cash Coins
The currency used in this payment system is called an e-cash coin or simply coin.
A coin consists of three elments or parts - serial #, key version and serial no.
signed by the secret or private key of a certaindenomination of the e-cash bank. In
other words, a coin of one dollar would consist of the following:
Coin = Serial#, keyversion, {Serial #}SK banks $1 key


uestion No: 24 ( Marks: 1 ) - Please choose one
An e-business is defined by the company s _____________.
Policy
Operations
Technology
All of above
Reference: : page #125 handouts lecture #28
E-Business
An e-business is defined as a company/entity that has an online presence. E-
businesses that have the ability to sell, trade, barter or transact over the web can be
considered as e-commerce businesses. An e-business model is defined by a
companys policy, operations, technology and ideology.
Question No: 25 ( Marks: 1 ) - Please choose one
Electronic catalogues have advantage over paper catalogues.
True
False
Reference: : page #126 handouts lecture #29
Electronic catalogues
Electronic catalogues are used in case of an online shop. They have many
advantages over paper catalogues. Therefore, online shopping can be done more
quickly and in a more convenient environment.
Question No: 26 ( Marks: 1 ) - Please choose one
Which of the following is an advantage of electronic catalogue?
Large fix cost if used for small no. of products.


Ability of updating product information.
Need for customer skill of computers and browsers.
Difficult to develop catalogue.
Question No: 27 ( Marks: 1 ) - Please choose one
In online business, market research becomes slower than offline business.
True.
False.
Question No: 28 ( Marks: 1 ) - Please choose one
Which of these is NOT a stage of knowledge discovery process?
Transformation
Data mining
Pattern evaluation
Process evaluation
Reference: : page #140 handouts lecture #34
Knowledge discovery
A knowledge discovery process includes data cleaning, data integration, data
selection, data transformation, data mining, pattern evaluation and knowledge
presentation.
Question No: 29 ( Marks: 1 ) - Please choose one
OLAP is ____________ view of data.
1-dimentional
2-dimentional
3-dimentional
4-dimentional
Reference: : page #145 handouts lecture #35


item type and location are the three dimensions. OLAP data cube
indicates the sale of 605 and 825 units of furniture and computers, respectively, in
the first quarter of the year in Lahore, 440 units of furniture and 345 phone sets in
Karachi in the first quarter, respectively, and 400 grocery items in Lahore during
second quarter. Results can be displayed through data cube against more than three
dimensions.
Question No: 30 ( Marks: 1 ) - Please choose one
Which of these is NOT an advantage of e-banking?

Get current account balances at any time.
Handle your finances from any location.
Get more money than your actual balance.
Transfer money between accounts.
Reference: : page #150 handouts lecture #36
Advantages of e-banking
Get current account balances at any time
Obtain credit card statements
Pay utility bills
Download account information
Transfer money between accounts
Send e-mail to your bank
Manage your own schedule
Handle your finances from any location


Apply for loans online
Question No: 31 ( Marks: 1 )
What is Quantum computing?
Question No: 32 ( Marks: 1 )
what are the three attacks on symmetric key algorithms?
Question No: 33 ( Marks: 2 )
What do we mean by the anonymity in E-Cash Payment system?
Question No: 34 ( Marks: 2 )
Define these two terms plaintiff and defendant?
Question No: 35 ( Marks: 3 )
What is E-business? Differentiate it with E-Commerce with the help of real life
examples.
Question No: 36 ( Marks: 3 )
Identify the upstream activities in supply chain of a milk processing?
Question No: 37 ( Marks: 3 )
Briefly elaborate the concept of Perceived Value as an element of branding?
Question No: 38 ( Marks: 5 )
What is branding? What elements should be considered to create and maintain a
successful brand?
Question No: 39 ( Marks: 5 )


How industry value chain proceeds on? Explain with the help any real life
example.
Question No: 40 ( Marks: 10 )
How SWOT Analysis is helpful in our business development and strategic
decisions? Explain with
the help of an example
Question No: 41 ( Marks: 10 )


Give an example to show how members of supply chain can work together to
reduce inventory, increase quality of product, reduce production cost and increase
process speed.

Вам также может понравиться