0% found this document useful (0 votes)
84 views

Finalterm Examination It430

Uploaded by

piyara222
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views

Finalterm Examination It430

Uploaded by

piyara222
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 29

Raheel.Shahbaz@Hotmail.

com
FINALTERM EXAMINATION
Spring 2010
IT430- E-Commerce
Question No: 1 ( Marks: 1 ) - Please choose one
Click and Mortar refers to
► Offline business
► Online business
► Engineering
► Building
Ref: PAGE # 129
Brick-and-Mortar vs. Click-and-Mortar businesses
These two terms refer to the offline and the online businesses, respectively. Where a company is doing
its business both online and offline, there is often the problem of lack of proper integration between the
two different channels of business.
Note: Offline business = Brick-and-Mortar
And Online Business = Click-and-Mortar businesses
 Question No: 2 ( Marks: 1 ) - Please choose one
Which of the following option best represent “Data mining can improve response rate tremendously”?
► Direct mailing
► Personalization technology
► E-business
► Opt-in e-mail
Ref: PAGE # 133
Personalization technology (data mining) can also improve response rate tremendously.
 Question No: 3 ( Marks: 1 ) - Please choose one
Which of following services build a strong customer loyalty towards company and its products?
► Customer services
► Public relations(PR)
► Bulletin board
► Exhibitions.
Ref: PAGE # 136
One major goal of CRM is to establish a long-lasting relationship between a company and its customers.
Good customer services can help in building a sense of loyalty towards company and its products or
services.
 Question No: 4 ( Marks: 1 ) - Please choose one
Visitor’s location, IP address, time of visit related information are added, in which of the following
 
► call handling files
► cookies
► log files
► Data mining files.
Ref: PAGE # 136
Log files consist of data generated by site visits and include information about each visitor’s location, IP
address, time of visit, frequency of visits etc.
 
Question No: 5 ( Marks: 1 ) - Please choose one
Track the customers online and do personalization is only possible through which of the following file(s)
analysis.

► log files
► cookie
► data mining
► log files and cookies.
Ref: PAGE # 136
You know that cookies allow e-commerce sites to record visitor behavior. They can be used to track
customers online and do personalization. Many customers do not know that their information is being
collected and used by the e-business site.
 
Question No: 6 ( Marks: 1 ) - Please choose one
Switch generally contains more "intelligence" than a hub.
 
► True
► False

Note: Solve these papers by yourself. I am not responsible for any solved content 1
0301-6133581, 0334-9602729
[email protected]
Ref: 1st Assignment solution provided by instructor.
Switches operate at the Data Link or second layer. Switches are "intelligent" hubs.
 
Question No: 7 ( Marks: 1 ) - Please choose one
What is the correct JavaScript syntax to write "Hello World"?
 
► response.write("Hello World")
► document.write("Hello World")
► ("Hello World")
► “Hello world”
Ref: PAGE # 57
 
Question No: 8 ( Marks: 1 ) - Please choose one
 
What shall come in blanks for proper result,
Here blanks are numbered with 1,2 and 3
<html>
<head>
<SCRIPT language="JavaScript">
Var num1, var num2
Document.container .result.value=parseFloat(num1)-parseFloat(num2)
</script>
</head>
<body>
<FORM name=”---------1-----------”>
<input type=”----------2-------” name=”-------3---------” maxlength=”5”>
</form>
</body>
</html>
 
► container, text and result
► result, value and container
► container , button and value
► result, container and text
 
Question No: 9 ( Marks: 1 ) - Please choose one
In XML, in which of following element tag, other element are enclosed
► Child element
► Root element
► <?xml version="1.0"?>
► <XML>
Ref: PAGE # 76
We enclose other elements within the root element tags.

Question No: 10 ( Marks: 1 ) - Please choose one


In given XML code, which of following element represents the highlighted node.
<?xml version="1.0"?>
<note>
<to>Mr.Riaz</to>
<from>Aamer</from>
<heading>Reminder</heading>
<body>Don't forget me this weekend!</body>
</note>
 
► Property
► Root
► Child
► Nothing
 
Question No: 11 ( Marks: 1 ) - Please choose one
An electronic Check book consists of
 
► Software
► Hardware
► Software and Hardware

Note: Solve these papers by yourself. I am not responsible for any solved content 2
0301-6133581, 0334-9602729
[email protected]
► None of these
Ref: PAGE # 113
All individuals capable of issuing electronic checks will have an electronic check book device. An
electronic check book device is a combination of secure hardware such as a smart card and appropriate
software.
 
Question No: 12 ( Marks: 1 ) - Please choose one
Three participants of the E-Cash Model are

► Seller, buyer and E-bank


► Seller, buyer and Certification authority
► Seller, Agent and bank
► None of these
Ref: PAGE # 117

Question No: 13 ( Marks: 1 ) - Please choose one


Which of the following Barriers to International E-Commerce?
 
► Advertising
► Patents
► Infrastructure
► Capital
Ref: PAGE # 163
Infrastructure issues is the one of Barriers to International E-Commerce
 
Question No: 14 ( Marks: 1 ) - Please choose one
In which type of approach, we further dig the data for retrieving information from data warehouse?
 
► Slice
► Dice
► Drill down
► Roll up
Ref: PAGE # 146
Using drill-down we can further dig the data to receive some specific information. For example using that
I can find the sale of furniture in a specific month of the first quarter, say, February. Roll-up is the reverse
of drill-down.
 
Question No: 15 ( Marks: 1 ) - Please choose one
Where there are quite a few erroneous or missing values in a row then that row can be deleted or
discarded. This process is called...............
 
► Data Deletion
Note: Solve these papers by yourself. I am not responsible for any solved content 3
0301-6133581, 0334-9602729
[email protected]
► Data Selection
► Data Integration
► Data Transformation
Ref: PAGE # 141
Where there are quite a few erroneous or missing values in a row, then that row can be
discarded/deleted altogether. This process is called data selection.
 
Question No: 16 ( Marks: 1 ) - Please choose one
Support activities in Value Chain model includes
 
► Finance and Administration
► Human Resources
► Technology Development
► All of these.
Ref: PAGE # 152

Question No: 17 ( Marks: 1 ) - Please choose one


You define a method using

► obj.method
► obj.method[]
► obj.method()
► obj-method
Ref:
http://bytes.com/topic/javascript/answers/857483-using-event-handler-call-obj-method-within-
method
 
Question No: 18 ( Marks: 1 ) - Please choose one
Which currency is used in e-cash Payment system?
 
► Dollar
► Coin
► Penny
► Cent
Ref: PAGE # 116
Buyers and merchants, both, have accounts in the E-cash bank. Buyers withdraw coins against their
account and store them in e-cash wallet software (Cyber wallet) on their computer.

Question No: 19 ( Marks: 1 ) - Please choose one


Which of the following is a function of Cyberwallet?
 
► Store coins
► Manage Coins
► Record transactions
► All of above
Ref: PAGE # 117
Client wallet or cyber wallet can generate serial nos., store coins, make and accept payments.
 
Question No: 20 ( Marks: 1 ) - Please choose one
Which of these is a rule about bondage or affinity of two items such that if one item is purchased, the
other is purchased too?
 
► Classification
► Association
► Characterization
► Clustering
Ref: PAGE # 143
Association:

Note: Solve these papers by yourself. I am not responsible for any solved content 4
0301-6133581, 0334-9602729
[email protected]
Association analysis is the discovery of association rules showing attribute-value conditions that occur
frequently together in a given set of data. It is widely used for market basket analysis. For example, where
we are recording sales of a big shopping store in databases, then by applying association mining we may
discover that certain items have a strong bondage or affinity with each other such that when one
item is purchased the other is purchased, too.

Question No: 21 ( Marks: 1 ) - Please choose one


Electronic banking is also known as __________.
 
► Cyber banking
► Virtual banking
► Online banking
► All of above
Ref: PAGE # 150
Electronic Banking:
Electronic banking, also known as cyber banking, virtual banking, home banking and online banking,
includes various banking activities conducted from home, business, or on the road, instead of at a
physical bank location.
 
Question No: 22 ( Marks: 1 ) - Please choose one
A patent is an exclusive right granted by law to make, use and sell an invention. In order to be patentable,
the invention must be unique, genuine, and useful
 
► Unique
► Genuine
► Useful
► All of the given
Ref: PAGE # 181
Patent infringement:
A patent is an exclusive right granted by law to make, use and sell an invention. In order to be patentable,
the invention must be unique, genuine, and useful according to the prevalent technological standards.
 
Question No: 23 ( Marks: 1 ) - Please choose one
(PIPEDA) Stands for ------------------
 
► Personal Information Protection and Electronic Defamation Act
► Personal Information Privacy and Electronic Documents Act
► Personal Information Privacy and Electronic Defamation Act
► Personal Information Privacy and Electronic Defamation Act
None of above 4 options.
Ref: PAGE # 183
Personal Information Protection and Electronic Documents Act, 2000 (PIPEDA) is the federal law in
Canada in this regard. In 1998
For further visit this link
http://www.uoguelph.ca/secretariat/pipeda/
 
Question No: 24 ( Marks: 1 ) - Please choose one
------------ wrongs such as breach of contract are deemed to violate only the rights of individuals and not
the society in general.
 
► Criminal
► Civil
► Plentiful
► None
Ref: PAGE # 176
Civil wrongs such as breach of contract are deemed to violate only the rights of individuals and not the
society in general.
 
Question No: 25 ( Marks: 1 ) - Please choose one
In the physical world three elements must be satisfied in order to make a valid contract, namely, offer,
---------------- and ----------
 
► Acceptance and consideration
► Acceptance and Rejection
► Approval and consideration

Note: Solve these papers by yourself. I am not responsible for any solved content 5
0301-6133581, 0334-9602729
[email protected]
► None
Ref: PAGE # 178
Online contracts:
In the physical world three elements must be satisfied in order to make a valid contract, namely, offer,
acceptance and consideration. The same three elements must also be present in case of a valid online
contract.
 
Question No: 26 ( Marks: 1 ) - Please choose one
Why we use reset tag in HTML?

► To remove the text written in Notepad.


► To remove the text written in between <body> and </body>tag.
► To remove the text written in between <head> and </head> tag.
► To remove the text written in between <form> and </form> tag.
Ref: PAGE # 27
The form data is shipped to the URL specified by the <form> tag’s action attribute.
 
Question No: 27 ( Marks: 1 ) - Please choose one
E-cash coin consist of three parts or elements that are ______.
 
► serial #, key version and r(binding factor)
► serial #, key version and serial no(SK)
► serial #, serial no(SK) and r(binding factor)
► none of above
Ref: PAGE # 116
Coin = Serial#, key version, {Serial #} SK
 
Question No: 28 ( Marks: 1 ) - Please choose one
A ------------- is a program that scans web sites and forms a list of relevant sites based on keywords.
 
► An Application
► Search Engine
► Operating System
► Device Drivers
Ref: PAGE # 137
A search engine is a program that scans web sites and forms a list of relevant sites based on keywords
 
Question No: 29 ( Marks: 1 ) - Please choose one
What is/are the advantages of EDI?
 
► No paper work
► No human intervention
► Exchange of information takes place in seconds
► All of Above
Ref: PAGE # 147
EDI include:
• No paper work
• No human intervention
• Exchange of information takes place in seconds
 
Question No: 30 ( Marks: 1 ) - Please choose one
The term “Appropriate Authority” includes ______________ legislative assemblies
 
►2
►3
►5
►4
Ref: PAGE # 165
Generally speaking the term ‘Appropriate authority’ includes the five legislative assemblies

Question No: 31 ( Marks: 2 )


How the Porter’s model helps a firm to devise a plan?
 
Question No: 32 ( Marks: 2 )
What is meant by “1973 is the supreme law of the country”?

Note: Solve these papers by yourself. I am not responsible for any solved content 6
0301-6133581, 0334-9602729
[email protected]
 
Question No: 33 ( Marks: 2 )
Why are hidden forms' fields used?
 
Question No: 34 ( Marks: 2 )
Briefly explain the customer’s level of loyalty to company at “Familiarity level”.
 
Question No: 35 ( Marks: 3 )
Identify the different areas of study involve in e-commerce?
 
Question No: 36 ( Marks: 3 )
On what basis, generally the protection under “fair use” may be sought? Doesn’t need to explain.
 
Question No: 37 ( Marks: 3 )
Discuss the role and responsibilities of “Transport layer” in OSI model?
 
Question No: 38 ( Marks: 3 )
Explain the “Separation” stage of customer’s loyalty to business. Give any 2 reasons of why a customer
may get into this stage. 1+2
 
Question No: 39 ( Marks: 5 )
What do you perceive by Value Added Network? Explain its advantages too with reference to EDI. (2+3)
 
Question No: 40 ( Marks: 5 )
What are the four guiding principles to form the basis of any privacy legislation?
Bottom of Form
FINALTERM  EXAMINATION
Spring 2010
IT430- E-Commerce
Question No: 1 ( Marks: 1 ) - Please choose one
At deposit stage, the serial number is ……………..by E-Cashbank
► Known
► Unknown
► Kept Secret
► Informed
Ref: PAGE # 118
Deposit Stage
Serial no. (Known) Client (unknown)

Question No: 2 ( Marks: 1 ) - Please choose one


Creation of separate experiences for customers based on their behavior is called
► Demographic segmentation
► Behavioral segmentation
► Geo-Graphic Segmentation
► None of the above
Ref: PAGE # 132
Behavioral segmentation:
Creation of separate experiences for customers based on their behavior is called behavioral
segmentation.

Question No: 3 ( Marks: 1 ) - Please choose one


Let us, suppose that you have hosted your e-commerce website,
Promotion messages can be sent when potential client is
► online
► offline
► both online and offline
► visiting head office
Ref: PAGE # 133
Promotions:
E-business promotions can attract visitors to your site and induce them to purchase. Promotional
messages can be sent both online and offline.

Question No: 4 ( Marks: 1 ) - Please choose one

Note: Solve these papers by yourself. I am not responsible for any solved content 7
0301-6133581, 0334-9602729
[email protected]
Call handling, sales tracking and Transaction support(technology / personnel) activities are included in
which management system
► Customer Relationship Management system
► Public relation management system
► Inventory management system
► Data Base Management system
Ref: PAGE # 136
CRM includes call handling, sales tracking and Transaction support (technology/personnel etc.).

Question No: 5 ( Marks: 1 ) - Please choose one


What is the correct HTML for making a hyperlink?
► <a href="http://www.w3schools.com">W3Schools</a>
► <a name="http://www.w3schools.com">W3Schools.com</a>
► <a url="http://www.w3schools.com">W3Schools.com</a>
► <a>http://www.w3schools.com</a>
Ref: PAGE # 23
Welcome to <A HREF=http://www.vu.edu>Virtual University</A>

Question No: 6 ( Marks: 1 ) - Please choose one


border-color: specifies the color of all borders in the order:
 
► ‘border-right-color, border-bottom-color, border-left-color,border-top-color’
► ‘border-left-color ,border-top-color, border-right-color, border-bottom-color,’
► ‘border-top-color, border-right-color, border-bottom-color, border-left-color’
► None of these
Ref: PAGE # 50
border-color: specifies the color of all borders in the order ‘border-top-color, border-right-color, border-
bottom-color, border-left-color’

Question No: 7 ( Marks: 1 ) - Please choose one


ACH stands for which of the followings?
► Automated Clearing House
► Action Clearing House
► Asynchronous Cryptographic Hash
► All Cryptographic Hostages
Ref: PAGE # 110
The transfer takes place with the help of Automated Clearing House (ACH) service.

Question No: 8 ( Marks: 1 ) - Please choose one


An electronic check contains a(n)………………… to the payer’s bank to make a specified payment to the
payee
► Serial#
► Private key
► Instruction
► All of the above
Ref: PAGE # 113
Electronic Checks:
Financial Services Technology Consortium (FSTC) is a group of U.S banks, research agencies and
government organizations formed in 1993. It has introduced the concept of electronic checks. An
electronic check contains an instruction to the payer’s bank to make a specified payment to a payee.

Question No: 9 ( Marks: 1 ) - Please choose one


A company ABC web page divided into four segments can be unpleasant to a Japanese visitor because
no. four is a symbol of death in that culture. Which is the international barrier it is having?
► Culture
► Language
► Lack of trust
► Infrastructure
Ref: PAGE # 162
A web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a
symbol of death in that culture.
 
Question No: 10 ( Marks: 1 ) - Please choose one
A software company may intentionally register a domain name as ‘macrosoft.com’ (a variant of domain
name of the famous company ‘Microsoft’) to take advantage of the reputation of ‘Microsoft’. The idea is

Note: Solve these papers by yourself. I am not responsible for any solved content 8
0301-6133581, 0334-9602729
[email protected]
that someone intending to reach the web site of ‘Microsoft’ may mistype or misspell and reach the web
site of ‘Microsoft’, instead. xyz.com vs. xyz.org Which legal issue arises due to such acts?
► Parasites
► Concurrent use
► Cyber squatting
► None
Ref: PAGE # 182
Parasites:
Parasite domain names are variants on famous domain names, and are confusingly similar to them to
gain business advantage. For instance, a software company may intentionally register a domain name as
‘macrosoft.com’ (a variant of domain name of the famous company ‘Microsoft’) to take advantage of the
reputation of ‘Microsoft’. The idea is that someone intending to reach the web site of ‘Microsoft’ may
mistype or misspell and reach the web site of ‘Microsoft’, instead. xyz.com vs. xyz.org
 
Question No: 11 ( Marks: 1 ) - Please choose one
A company collecting information assumes that the customer does not object to a specific use of
information unless the customer specifically denies the permission. Thus, the company may use the
collected information for its own purpose, as well as, sell or rent it out to other firms or persons.
Which of the following Approach it is using?
► Opt-inout
► Swap-out
► Opt-in
► Opt-out
Page # 183
opt-out approach, the company collecting information assumes that the customer does not object to a
specific use of information unless the customer specifically denies the permission. Thus, the company
may use the collected information for its own purpose, as well as, sell or rent it out to other firms or
persons.
 
Question No: 12 ( Marks: 1 ) - Please choose one
In which type of approach, we further dig the data for retrieving information from data warehouse?
► Slice
► Dice
► Drill down
► Roll up
Ref: PAGE # 146
Using drill-down we can further dig the data to receive some specific information. For example using that
I can find the sale of furniture in a specific month of the first quarter, say, February. Roll-up is the reverse
of drill-down.
 
Question No: 13 ( Marks: 1 ) - Please choose one
An electronic signature can ensure --------- .
► authenticity
► integrity
► non-repudiation
► all of them
Ref: PAGE # 100
Digital/electronic signature:
An electronic signature means any letters, numbers, symbols, images, characters or any combination
thereof in electronic form applied to an electronic document which can ensure authenticity, integrity and
non repudiation.
 
Question No: 14 ( Marks: 1 ) - Please choose one
Where in an HTML document is the correct place to refer to an external style sheet?
► In the <body> section
► At the top of the document
► In the <head> section
► Between head and body
Ref: PAGE # 39
Method # 2: Linking to an external style sheet
A separate file is created with the extension ‘.css’, containing your style definitions (see mystyles.css
below).
Use <Link> tag inside a web page header to apply these style definitions.
mystyles.css:
h1{color:red}

Note: Solve these papers by yourself. I am not responsible for any solved content 9
0301-6133581, 0334-9602729
[email protected]
p{font-size:34pt}
Example <HTML> <head> <Link Rel="stylesheet" Type="text/css" href="mystyles.css"> </head>
 
Question No: 15 ( Marks: 1 ) - Please choose one
Symmetric algorithms are faster than asymmetric.
► True
► False
Ref: PAGE # 105
Symmetric algorithms are faster as compared to asymmetric.
 
Question No: 16 ( Marks: 1 ) - Please choose one
PKI stands for ___________.
► Public Key Instrument
► Public Key Information
► Public Key Instruction
► Public Key Infrastructure
Ref: PAGE # 107
Public Key Infrastructure (PKI)
A PKI is defines as a structured system that provides key management facilities, storage and
management facilities of digital certificates and involves a certification authority.
 
Question No: 17 ( Marks: 1 ) - Please choose one
According to Michael Porter, “surveys and market research” is an example of primary activity in a
strategic business unit. Identify the area in which this task is performed.
► Identify customers
► Market and sell
► Deliver’ activities relate to storage
► Purchase materials and supplies
Ref: PAGE # 152
‘Identify customers’ refer to those activities which try to find new customers and ways to serve better to
the existing ones, e.g, surveys and market research;
 
Question No: 18 ( Marks: 1 ) - Please choose one
According to Michael Porter, “material handling” is an example of primary activity in a strategic business
unit. Identify the area in which this task is performed.
► Identify customers
► Market and sell
► Deliver’ activities relate to storage
► Purchase materials and supplies
Ref: PAGE # 152
‘Deliver’ activities relate to storage, distribution and shipment of final product, e.g, warehousing,
selecting shippers, material handling, timely delivery to customers etc.
 
Question No: 19 ( Marks: 1 ) - Please choose one
Upstream activities relate to materials/services or the input from suppliers
► True
► False
Ref: PAGE # 155
SUPPLY CHAIN:
Supply chain includes all the activities associated with the flow and transformation of goods from the raw
materials stage all the way to the end user. Supply chain can be broken into three parts, that is, upstream
activities, internal activities and downstream activities…
Upstream activities relate to materials/services or the input from suppliers
 
Question No: 20 ( Marks: 1 ) - Please choose one
-------------means services in relation to the transformation of contents of an electronic
document from its original form to one that cannot be understood or decoded by any unauthorized person
► Cryptography services
► Accredited Certification Service Provider’
► Originator
► Addressee
Ref: Page # 163
“‘Cryptography services’ means services in relation to the transformation of contents of an electronic
document from its original form to one that cannot be understood or decoded by any unauthorized
person”.

Note: Solve these papers by yourself. I am not responsible for any solved content 10
0301-6133581, 0334-9602729
[email protected]
 
Question No: 21 ( Marks: 1 ) - Please choose one
Arbitration is a legal concept in which parties, through an agreement, appoint/nominate a person or a
panel to act as a judge in the matter instead of referring the dispute to the ordinary court of law.
► True
► False
Ref: PAGE # 182
Arbitration is a legal concept in which parties, through an agreement, appoint/nominate a person or a
panel to act as a judge in the matter instead of referring the dispute to the ordinary court of law.
 
Question No: 22 ( Marks: 1 ) - Please choose one
Law is broadly divided into two classes on the basis of nature of wrong, namely, ------------ and
---------------
► Civil law and criminal law
► ETO and criminal law
► Supreme and Civil Law
► None
Ref: PAGE # 176
Law is broadly divided into two classes on the basis of nature of wrong, namely, civil law and criminal
law. Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish
the wrong-doer.
 
Question No: 23 ( Marks: 1 ) - Please choose one
Meta tag is called information about information.
► True
► False
Ref: PAGE # 138
META INFORMATION:
a Meta tag contains the key information of a web page.
 
Question No: 24 ( Marks: 1 ) - Please choose one
Each layer except ………… has got a header.
► Physical layer
► Datalink layer
► Session layer
► Network layer
Ref: PAGE # 4
Each layer (except physical layer) at the sending machine sends instructions through its header to the
receiving machine as to how the accompanying data be interpreted or treated by the receiving machine.
 
Question No: 25 ( Marks: 1 ) - Please choose one
If 140.57 is network address and 220.200 is machine address then which class of network it is?
►A
►B
►C
►D
Ref: PAGE # 11
Examples
Class A: 255.0.0.0
Class B: 255.255.0.0
Class C: 255.255.255.0
 
Question No: 26 ( Marks: 1 ) - Please choose one
Classification and Association belong to which of the following types of Data Mining?
► Selective
► Predictive
► Descriptive
► Additive
Ref: PAGE # 141
Classification and association are predictive types of data mining while characterization and clustering
represent the descriptive type

Question No: 27 ( Marks: 1 ) - Please choose one


SET was developed in _____.
► 1996

Note: Solve these papers by yourself. I am not responsible for any solved content 11
0301-6133581, 0334-9602729
[email protected]
► 1997
► 1998
► 1999
Ref: PAGE # 122
Secure Electronic Transaction (SET)
The drawback in SSL that the credit card/debit card information remains with the merchant led to the
development of a more sophisticated protocol called SET. It was developed in 1997
 
Question No: 28 ( Marks: 1 ) - Please choose one
Brick-and-Mortar businesses are referring to ______.
► Online businesses
► Offline businesses
► Both
► None of above
Ref: PAGE # 129
Brick-and-Mortar vs. Click-and-Mortar businesses
These two terms refer to the offline and the online businesses, respectively. Where a company is doing
its business both online and offline, there is often the problem of lack of proper integration between the
two different channels of business.
 
Note: Offline business = Brick-and-Mortar
And Online Business = Click-and-Mortar businesses
 
Question No: 29 ( Marks: 1 ) - Please choose one
Which tag holds the key information about the Web Page?
► META
► HEAD
► BODY
► HTML
Ref: PAGE # 138
META INFORMATION:
a Meta tag contains the key information of a web page.
 
Question No: 30 ( Marks: 1 ) - Please choose one
OLAP stands for
► Object linked Application Program
► Object Linked Analytical Processing
► Online Analytical Processing
► None
Ref: PAGE # 145
Online Analytical Processing (OLAP)
 
Question No: 31 ( Marks: 2 )
List and explain the name of protocol used at "Network" layer of OSI model?

Question No: 32 ( Marks: 2 )


What do we mean by “Affiliation” between two parties? Explain shortly.

Question No: 33 ( Marks: 2 )


Do you agree that Customization is one of the role of e-commerce in Competitive Strategy. Discuss
briefly

Question No: 34 ( Marks: 2 )


Write down the hierarchy of courts with reference to the global legal issues of e-commerce?

Question No: 35 ( Marks: 3 )


How Technology development is supporting activities in value Chain.

Question No: 36 ( Marks: 3 )


What is e-business storefront model?

Question No: 37 ( Marks: 3 )


What are three different modes of transmission? Shortly explain each.

Question No: 38 ( Marks: 3 )

Note: Solve these papers by yourself. I am not responsible for any solved content 12
0301-6133581, 0334-9602729
[email protected]
What type of issues civil and criminal laws deals with?

Question No: 39 ( Marks: 5 )


What is supply chain management? Write down advantages and disadvantage of using internet
technologies in Supply chain.

Question No: 40 ( Marks: 5 )


Under Section 25, each certification service provider shall prepare a Certification Practice Statement
(CPS).
What you understand by CPS?
 
IT430 Final 2010
Question No: 1    ( Marks: 1 )    - Please choose one
In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed
coins from last …………………withdrawals to the E-bank.
► 10
► 12
► 18
► 16
Ref: Page # 119
Lost Coins
In case network fails or computer crashes during payment transaction, coins might be lost. All signed
blinded coins from last 16 withdrawals are sent by the bank to the client

Question No: 2 ( Marks: 1 ) - Please choose one


www.amzon.com as you all familiar with it.
Which of the following loyalty stages its customers are:
( Who don’t know about it): Detail about amzon.com)
"Amazon was one of the first major companies to sell goods by Internet, and was an iconic
"stock in which to invest" of the late 1990s dot-com bubble. Jeff Bezos founded Amazon.com, Inc. in
1994, and launched it online in 1995. Amazon.com started as an on-line bookstore, but soon diversified to
product lines of VHS, DVD, music CDs, MP3 format, computer software, , etc. Amazon has established
separate websites in Canada, the United Kingdom, Germany, France, China, and Japan. It also provides
global shipping to certain countries for some of its products. "
► Awareness
► Exploration
► Familiarity
► Commitment
Page # 136
Awareness
This is the first stage where customers recognize the name of the company or any of its products.
However, they have never interacted with the company before. A company/business can achieve this
level by properly advertising its brand.

Question No: 3 ( Marks: 1 ) - Please choose one


Customer Loyalty model is also called
► Customer Life Cycle
► Customer Segmentation
► Customer Awareness
► All of the options
Page # 136--137

Question No: 4 ( Marks: 1 ) - Please choose one


Which of the following is True for Class B:
► Network 01 byte and 03 hosts
► Network 02 bytes and 02 hosts
► Network 03 bytes and 01 host
► None of these
Page # 10
In class B, the first two bytes indicate the network address and the last two bytes indicate the host
machines on that network
   
Question No: 5 ( Marks: 1 ) - Please choose one
RIP(Routing Information protocol) is used by---------- , to build a ------------ table
► bridges , hash
Note: Solve these papers by yourself. I am not responsible for any solved content 13
0301-6133581, 0334-9602729
[email protected]
► routers, matrix
► routers , routing
► All of these
Page # 16
A router can communicate with another router on the internet with the help of Routing Information
Protocol, and thus it can build a routing table.

Question No: 6 ( Marks: 1 ) - Please choose one


Switch is used on the layer
► First Layer
► Second Layer
► Third Layer
► None of these
Ref: IT430 1st assignment solution file uploaded by instructor.

Question No: 7 ( Marks: 1 ) - Please choose one


Router is used on the layer
► First Layer
► Second Layer
► Third Layer
► None of these
Ref: IT430 1st assignment solution file uploaded by instructor.

Question No: 8 ( Marks: 1 ) - Please choose one


In HTML If you leave out the setting for scrolling what will happen?
► No scrollbar will appear even if needed.
► A scrollbar will always be present.
► A scrollbar will appear if needed.
► All options.
SCROLLING – this attribute determines whether a scroll bar appears with a frame (e.g,
Scrolling=“yes” in the <frame> tag makes it appear)

Question No: 9 ( Marks: 1 ) - Please choose one


Which one of the following attacks does not include in the attacks on Symmetric key
► Key search attack
► Cryptanalysis
► System based attacks
► Organization attacks
Page # 108
Attacks on Symmetric Key Algorithms
Following attacks have been reported on symmetric key algorithms:
Key Search Attacks
Cryptanalysis
System-based Attacks

Question No: 10 ( Marks: 1 ) - Please choose one


What is a E-Cash wallet ?
► Hardware
► Agent
► Software
► All of the above
Page # 116
Buyers withdraw coins against their account and store them in e-cash wallet software (Cyber wallet) on
their computer. Cyber wallet stores and manages coins and records every transaction.

Question No: 11 ( Marks: 1 ) - Please choose one


It is the ability to sell the goods or provide the service at a price that is lower than that of competitors, and
thus attract more customers.
What is called?
► Cost leadership
► Price leadership
► Focus
► Differentiation
Ref: PAGE # 157
Cost leadership:

Note: Solve these papers by yourself. I am not responsible for any solved content 14
0301-6133581, 0334-9602729
[email protected]
It is the ability to sell the goods or provide the service at a price that is lower than that of competitors, and
thus attract more customers.

Question No: 12 ( Marks: 1 ) - Please choose one


Meta tag contains:
► User information
► seller information
► web page key information
► bank information
Ref: PAGE # 138
META INFORMATION:
You know that a Meta tag contains the key information of a web page.

Question No: 13 ( Marks: 1 ) - Please choose one


In many countries, stealing and misusing of meta information for getting competitive advantage is
considered as an offence known as
► Tort of Private Nuisance
► Tort of Tress passing
► Tort of passing off
► Defamation
Ref: PAGE # 138
In many countries, stealing and misusing Meta information in this manner to gain business/competitive
advantage is considered as an offence known as the tort of passing-off.

Question No: 14 ( Marks: 1 ) - Please choose one


Which of the following is NOT force of Porter’s competitive rivalry Model?
► Threat of potential/new entrants
► Threat of substitute
► Differentiation and cost leadership
► Competition between existing players
Page # 158
Threat of potential/new entrants to the sector
Threat of substitute product or service in the existing trade
Bargaining power of the buyers
Bargaining power of the suppliers
Competition between existing players

Question No: 15 ( Marks: 1 ) - Please choose one


Exclusive right granted by law to make, use and sell an invention. What is called?
► Parasites
► Trade mark
► Patent infringement
► Copyright
Ref: PAGE # 181
Patent infringement:
A patent is an exclusive right granted by law to make, use and sell an invention. In order to be
patentable, the invention must be unique, genuine, and useful according to the prevalent technological
standards.

Question No: 16 ( Marks: 1 ) - Please choose one


GM Celebes manufacturing electronic goods and FryChips co selling French fries. Under the traditional
trade mark law both these companies can have the same trade mark/trade name such as ‘frys’.
The problem arises when both apply for the registration of a domain name containing the word ‘frys’.
Here, both are legitimate claimants of this domain name but due to the element of uniqueness of domain
names only one of them can be assigned the desired domain name.
Which legal issue arises in this situation?
► Domain name conflict
► Cyber squatting
► Concurrent use
► None
Ref: PAGE # 181
Concurrent use
This problem arises when two organizations have apparently legitimate claim to use the same domain
name but cannot do so due to the uniqueness of domain names. Suppose, there is a company
manufacturing electronic goods and another company selling french fries. Under the traditional trade mark

Note: Solve these papers by yourself. I am not responsible for any solved content 15
0301-6133581, 0334-9602729
[email protected]
law both these companies can have the same trade mark/trade name such as ‘frys’. The problem arises
when both apply for the registration of a domain name containing the word ‘frys’. Here, both are
legitimate claimants of this domain name but due to the element of uniqueness of domain names only one
of them can be assigned the desired domain name.
   
Question No: 17 ( Marks: 1 ) - Please choose one
ANSI stands for ……….
► American National Standards Institute
► All Network Standards Institute
► American New standards Institute
► Australia National standards Institute
Page # 147
ANSI (American National Standards Institute)

Question No: 18 ( Marks: 1 ) - Please choose one


Which of the following company develop ERP soft wares?
► SAP
► Oracle
► JD Edward
► All of these
Page # 150
SAP is an example of ERP software. ERP is complex. It is not intended for public consumption as proper
integration of ERP with ecommerce applications is still a major problem.

Question No: 19 ( Marks: 1 ) - Please choose one


Company collecting information assumes that the customer does not object to a specific use of
information unless the customer specifically denies the permission. Thus, the company may use the
collected information for its own purpose, as well as, sell or rent it out to other firms or persons.
Which of the following Approach it is using?
► Opt-inout
► Opt-out
► Swap-out
► Opt-in
Page # 183
opt-out approach, the company collecting information assumes that the customer does not object to a
specific use of information unless the customer specifically denies the permission. Thus, the company
may use the collected information for its own purpose, as well as, sell or rent it out to other firms or
persons.

Question No: 20 ( Marks: 1 ) - Please choose one


What does ++ operator do?
► Adds two numbers together
► Joins two text strings together
► Adds 1 to a number
► Adds 2 to a number

Page # 58
Operators in java script
Mathematical operators ‘+’ For addition of two values ‘-‘ for subtraction of two values ‘*’ for multiplication
‘/’ for division ‘%’ modulus (for calculating the remainder) ‘++’ for increment ‘--‘ for decrement Logical
operators ‘&&’ for logical and ‘||’ for logical or ‘!’ for logical not
Question No: 21 ( Marks: 1 ) - Please choose one
A paper signature is believed to be more reliable than a digital signature.
► True
► False
Ref: PAGE # 106
A digital or electronic signature is believed to be more reliable as compared to paper
signatures because it is not ordinarily possible to copy or forge an electronic/digital signature. But, that is
very much possible in case of paper signatures.
Question No: 22 ( Marks: 1 ) - Please choose one
Job searchers can search for jobs and employers can hire effectively using _____________.
► Online recruiting web sites.
► Online banking web sites.
► Online trading and lending web sites.
► Online news services web sites.

Note: Solve these papers by yourself. I am not responsible for any solved content 16
0301-6133581, 0334-9602729
[email protected]
Ref: PAGE # 128
Online Recruiting:
Employers can recruit and job searchers can search for jobs effectively through online recruiting web
sites.

Question No: 23 ( Marks: 1 ) - Please choose one


Suppose you want to search from Virtual University’s database that how many students have taken MBA
in a specific semester. In this scenario, which type of data mining you are using?
► Classification
► Association
► Characterization
► Clustering
Page # 144
Characterization
It is discovering interesting concepts in concise and succinct terms at generalized levels for examining the
general behavior of the data. For example, in a database of graduate students of a university the students
of different nationalities can be enrolled in different departments such as music history, physics etc. We
can apply characterization technique to find a generalized concept/answer in response to the question
that how many students of a particular country are studying science or arts
Question No: 24 ( Marks: 1 ) - Please choose one
For example, white color denotes purity in Europe and America but is associated with death and
mourning in china and some Asian countries. Similarly, a web page divided
into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death .
Which of the following barrier involve in above example
► Culture
► Language
► Trust
► Infrastructure Issues
Page # 162
For example, white color denotes purity in Europe and America but is associated with death and
mourning in china and some Asian countries. Similarly, a web page divided into four segments can be
unpleasant to a Japanese visitor because no. four is a symbol of death in that culture.

Question No: 25 ( Marks: 1 ) - Please choose one


-------------means services in relation to the transformation of contents of an electronic
document from its original form to one that cannot be understood or decoded by any unauthorized person
► Cryptography services
► Accredited Certification Service Provider’
► Originator
► Addressee
Page # 163
“‘Cryptography services’ means services in relation to the transformation of contents of an electronic
document from its original form to one that cannot be understood or decoded by any unauthorized
person”.

Question No: 26 ( Marks: 1 ) - Please choose one


“Risk Management “ is the part of which activity?
► E-business
► E-commerce
► E-marketing
► All of the given

Question No: 27 ( Marks: 1 ) - Please choose one


Which type of algorithm is used by virtual pin system for encryption?
► DES (Data Encryption Standard)
► IDEA (International Data Encryption Algorithm)
► Rinjdael
► Non of above
Page # 110
Virtual PIN system does not involve the use of encryption.

Question No: 28 ( Marks: 1 ) - Please choose one


Which one is not the life cycle stage of the customer relation?
► Awareness
► Exploration

Note: Solve these papers by yourself. I am not responsible for any solved content 17
0301-6133581, 0334-9602729
[email protected]
► Familiarity
► Cancelation
Page # 136

Question No: 29 ( Marks: 1 ) - Please choose one


Popular EDI documents formatting standards _______
X12►
EDIFACT►
X12► and EDIFACT
None►
Page # 147
EDI documents are formatted using published standards. Two popular EDI standards are - ANSI
(American National Standards Institute) X12 standard and EDIFACT (United Nations Standard of
Electronic Data Interchange for Administration, Commerce and Transport).

Question No: 30 ( Marks: 1 ) - Please choose one


LDA stands for _______
Lahore► Development Authority
Lahore► Development Act
Page # 165
For example, the Lahore Development Authority (LDA) is a statutory body established under the
Lahore Development Act, 1975 (a provincial statute).

Question No: 31 ( Marks: 2 )


What is meant by EDI?

Question No: 32 ( Marks: 2 )


What do we mean by “Affiliation” between two parties? Explain shortly.

Question No: 33 ( Marks: 2 )


Write HTML code for two input fields, one for Login Name and other for Password.

Question No: 34 ( Marks: 2 )


What term/matters does the concurrent legislative list sets out according to (ETO) 2002?

Question No: 35 ( Marks: 3 )


Describe the importance of Customer Relationship Management (CRM) in current scenario.

Question No: 36 ( Marks: 3 )


In ETO, what are functions of Accredited Certification Service Provider?

Question No: 37 ( Marks: 3 )


How many legislative list(s) is(are) in Constitution of Islamic Republic of Pakistan at end?

Question No: 38 ( Marks: 3 )


Write short note on Packet Filter Firewall?

Question No: 39 ( Marks: 5 )


Discuss briefly how companies are getting competitive advantage over the other organizations
through differentiation and focus?

Question No: 40 ( Marks: 5 )


Write a short note on the following Global legal issues (Marks: 2.5+2.5=5)
1.                        Territorial Jurisdiction
2.                        Online contracts
 
Question No: 1    ( Marks: 1 )    - Please choose one
 Creation of separate experiences for customers based on their behavior is called
► Demographic segmentation
► Behavioral segmentation
► Geo-Graphic Segmentation
► None of the above
Question No: 2    ( Marks: 1 )    - Please choose one
 Track the customers online and do personalization is only possible through which of the following file(s)
analysis.
Note: Solve these papers by yourself. I am not responsible for any solved content 18
0301-6133581, 0334-9602729
[email protected]
► log files
 
► Cookie
► data mining
► log files and cookies.
Question No: 3    ( Marks: 1 )    - Please choose one
Which one of the following ,divides large network in small logical segments called subnets on basis of IP
addresses
► Routers
► Bridge
► None of these
► Switches
Question No: 4    ( Marks: 1 )    - Please choose one
Where in an HTML document is the correct place to refer to an external style sheet?
► At the end of the document
► At the top of the document
► In the <body> section
► In the <head> section
Question No: 5    ( Marks: 1 )    - Please choose one
 Which of the following is NOT valid HTML code line?
► <frameset rows="16%,84%">
► <frameset columns="16%,84%">
 
► <frameset cols="100,150">
► <frameset cols=”50%,50%” rows=”16%,84%”>
Question No: 6    ( Marks: 1 )    - Please choose one
 How do you change the left margin of an element?
► Padding-left
► Margin
► Text-indent
► margin-left
Question No: 7    ( Marks: 1 )    - Please choose one
document.write (str.replace (/Microsoft/,"W3Schools"))
►This string object is deleting Microsoft word
► This string object is concatenating the Microsoft with W3schools
► This string object is replacing Microsoft with W3schools
► None of these
http://www.w3schools.com/jsref/jsref_replace.asp
Question No: 8    ( Marks: 1 )    - Please choose one
Meta tag contains:
► User information
► seller information
► web page key information
► bank information
 
Question No: 9    ( Marks: 1 )    - Please choose one
 Porter’s Model helps a firm to identify threats to its competitive position and to devise plans including the
use of IT and e-commerce to protect or enhance that position.
► True
► False
Question No: 10    ( Marks: 1 )    - Please choose one
 The act of intentionally registering domain names containing trademarks/trade names of prominent
companies to later blackmail or demand ransom from those companies is called ------------------
► Cyber squatting.
► Trade mark
► Online Defamation
► Parasites
Question No: 11    ( Marks: 1 )    - Please choose one
 In which type of data mining, Apriori algorithms is used?
► Classification
► Association
 
► Characterization
► Clustering
Question No: 12    ( Marks: 1 )    - Please choose one

Note: Solve these papers by yourself. I am not responsible for any solved content 19
0301-6133581, 0334-9602729
[email protected]
 Idea of Value Chain Model was given by..
► Micheal Porter
► Henry Porter
► Welkin Tin
► Soleman
Question No: 13    ( Marks: 1 )    - Please choose one
 Support activities in Value Chain model includes
► Finance and Administration
► Human Resources
► Technology Development
► All of these
Question No: 14    ( Marks: 1 )    - Please choose one
 Which property of the document object is used to create a cookie?
► creatcookie
► cookie
► cookies
► updatecookie
Question No: 15    ( Marks: 1 )    - Please choose one
 Cyber wallet can automatically assemble the correct payment and pay it too.
► True
 
► False
Question No: 16    ( Marks: 1 )    - Please choose one
 DSMD stands for "Dual Signature Message Digest".
► True
► False
Question No: 17    ( Marks: 1 )    - Please choose one
 In SSL, the credit card/debit card information remains with the merchant. It is considered as
a(n)________________.
► Advantage of SSL
► Disadvantage of SSL
► Benefit of SSL
► Secure factor of SSL
Question No: 18    ( Marks: 1 )    - Please choose one
 Dividing market, with respect to people having income level greater than Rs 30000, is geographic
segmentation.
► True.
► False.
Question No: 19    ( Marks: 1 )    - Please choose one
 Data cleaning means ________.
 
► Adding missing values
► Correction of erroneous values
► Both of above
► None of above
Question No: 20    ( Marks: 1 )    - Please choose one
 Established ----------- can build trust for online business more quickly as compared to a new
company/business without reputation
► Brand
► Language
► Culture
► Infrastructure
Question No: 21    ( Marks: 1 )    - Please choose one
 Choose the right one that which organization based in Switzerland is one such arbitration service
provider nominated under the UDRP.
► WITO
► WIPO
► MIPO
► MITO
 vuzs
Question No: 22    ( Marks: 1 )    - Please choose one
 Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the
wrong-doer. Is it?
► True
► False

Note: Solve these papers by yourself. I am not responsible for any solved content 20
0301-6133581, 0334-9602729
[email protected]
Question No: 23    ( Marks: 1 )    - Please choose one
 Criminal  wrongs such as breach of contract are deemed to violate only the rights of individuals and not
the society in general
► True
► False
 Civil wrongs such as breach of contract are deemed to violate only the rights of individuals and not the
society in general
Question No: 24    ( Marks: 1 )    - Please choose one
 #00ff00 in HTML indicates
► Pure green color
► Pure blue color
► Pure red color
► Pure yellow color
Question No: 25    ( Marks: 1 )    - Please choose one
 Virtual PIN Payment System requires both merchant and buyer to register with _______________.
► Auto Clearing House (ACH)
► First Virtual (FV)
► DSS (Digital Signature Standard)
► DES (Data Encryption Standard)
Question No: 26    ( Marks: 1 )    - Please choose one
 The process of key search attack is driving private key from _____.
► Public key
► Symmetric key
► Asymmetric key
► Private key
Question No: 27    ( Marks: 1 )    - Please choose one
 In e-cash system which type of encryption is used?
► a) Symmetric
► b) Asymmetric
► Both a&b
► None
Question No: 28    ( Marks: 1 )    - Please choose one
 The number of stages in e-cash payment system is/are _____.
► one
► two
► three
► four
Question No: 29    ( Marks: 1 )    - Please choose one
 What is/are the advantages of EDI?
► No paper work
► No human intervention
► Exchange of information takes place in seconds
► All of Above
Question No: 30    ( Marks: 1 )    - Please choose one
 The term “Appropriate Authority” includes ______________ legislative assemblies
►2
►3
►5
►4
   
Question No: 31    ( Marks: 2 )
 What you understand about Denial of services (DOS) attacks?
 
Question No: 32    ( Marks: 2 )
 
 How the Porter’s model helps a firm to devise a plan?
 
Question No: 33    ( Marks: 2 )
 Define electronic signature?
 
Question No: 34    ( Marks: 2 )
 In SSL handshaking what is mean by Cipher Suite?
   
Question No: 35    ( Marks: 3 )
 What do you know about interactive advertisement? Briefly explain.

Note: Solve these papers by yourself. I am not responsible for any solved content 21
0301-6133581, 0334-9602729
[email protected]
 
Question No: 36    ( Marks: 3 )
 How lack of trust barrier can be overcome or minimized? Discuss it briefly
    
Question No: 37    ( Marks: 3 )
 In the code given below what is meaning of "20%, *, 20%" describe briefly.
 
Question No: 38    ( Marks: 3 )
 Describe ‘Online Analytical Processing (OLAP)’ in short?
 
Question No: 39    ( Marks: 5 )
 Elaborate the importance of OLAP in decision making support for an organization.
 
Question No: 40    ( Marks: 5 )
 Write down the list of major global issues of e-commerce.
IT430 Final 2010
Question No: 1    ( Marks: 1 )    - Please choose one
 In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed
coins from last …………………withdrawals to the E-bank.
       ► 10
       ► 12
       ► 18
       ► 16 P:119
Lost Coins
In case network fails or computer crashes during payment transaction, coins might be lost. All signed
blinded coins from last 16 withdrawals are sent by the bank to the client. Client uses the blinding factor
   
Question No: 2    ( Marks: 1 )    - Please choose one
 Which entity does not include in SET(secure Electronic Transaction)?
       ► Seller
       ► Buyer
       ► Payment gateway
       ► Bank P:122
There are four entities involved in a SET transaction – cardholder, Merchant and certification authority
and payment gateway.

Question No: 3    ( Marks: 1 )    - Please choose one


 Traditionally Marketer use the market segmentation(s) like
       ► Geo-graphic Segmentation
       ► Demographic Segmentation
       ► Psychographic Segmentation
       ► All of the above P:131
Traditionally, marketers have used three types of variables to define three different market
segmentations, namely, geographic segmentation, demographic segmentation and psychographic
segmentation.
   
Question No: 4    ( Marks: 1 )    - Please choose one
 Class C has:
       ► Network 01 byte and 03 hosts
       ► Network 02 bytes and 02 hosts
       ►       Network 03 bytes and 01 host P:10
       ► None of these
In class C, first three bytes refer to the network address and the last byte to the host
machines on that network, which would therefore be a very small network.
   
Question No: 5    ( Marks: 1 )    - Please choose one
 In ring topology, failure of network cable will only take down one computer’s network access.
       ► True
       ► False

Question No: 6    ( Marks: 1 )    - Please choose one


 Which device uses the IP address
    ► Switch
       ► Router P:16

Note: Solve these papers by yourself. I am not responsible for any solved content 22
0301-6133581, 0334-9602729
[email protected]
A router is a decision making device. When a data packet arrives at a router it reads the network
addresses from the IP address on the data packet and determines the shortest possible path through
which this packet can be delivered to its destination. 
       ► Repeater
       ► None of these
   
Question No: 7    ( Marks: 1 )    - Please choose one
 What is the correct HTML for inserting an image?
       ► <image src="image.gif">
       ► <img src="image.gif"> P:21
<HTML> <BODY> <HI>On Sale Cassettes</H1> <Img Src=“cassette.gif”> </Body></HTML>
       ► <img href="image.gif>
       ► <img>image.gif</img>
   
Question No: 8    ( Marks: 1 )    - Please choose one
 Cryptographic Algorithms are measured in terms of
       ►                       Key length   P:108
Cryptographic algorithms are measured in terms of key length.
       ► Complexity
       ► Simplicity
       ► All of the above
 
Question No: 9    ( Marks: 1 )    - Please choose one
 Upstream activities relate to?
       ► Materials/services or the input from suppliers P:155
Supply chain can be broken into three parts, that is, upstream activities, internal activities and
downstream activities.
         Upstream activities relate to materials/services or the input from suppliers 
          Internal activities relate to manufacturing and packaging of goods
         Downstream activities relate to distribution and sale of goods to distributors/customers
       ► Manufacturing and packaging of goods
       ► Distribution and sale of goods to distributors/customers
       ► Input from suppliers and Distribution
   
Question No: 10    ( Marks: 1 )    - Please choose one
 Television, radio and print media are in a (n) ……………………. Mode.
             ► Passive P:139
Emotional branding vs. rational branding
In case of television, radio or print media people are normally in a passive mode. To a greater extent they
do not control the communication channel and thus have to listen or view the advertisement about a
brand.
       ► Active
       ► Static
       ► Dynamic
   
Question No: 11    ( Marks: 1 )    - Please choose one
 Which of the following Barriers to International E-Commerce?
             ► Advertising
       ► Patents
       ► Infrastructure P:161
Barriers to International e-commerce
 Barriers to international ecommerce include lack of trust, lack of infrastructure, language and culture.
       ► Capital
   
Question No: 12    ( Marks: 1 )    - Please choose one
 Exclusive right granted by law to make, use and sell an invention. What is called?
►Parasites
►Trade mark
►Patent infringement P:181
  Patent infringement
A patent is an exclusive right granted by law to  make, use and sell an invention. In order to be
patentable, the invention must be unique, genuine, and useful according to the prevalent technological
standards.
►Copyright
   
Note: Solve these papers by yourself. I am not responsible for any solved content 23
0301-6133581, 0334-9602729
[email protected]
Question No: 13    ( Marks: 1 )    - Please choose one
 Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to
be professionally incompetent and negligent. This doctor may then file a lawsuit against that person
claiming that his reputation has been injured due to such an act.
Which legal issue arises due to such acts?
       ► Cyber Crimes
       ► Online Defamation P:182
  Online Defamation 
 A defamatory statement is a false statement that injures the reputation of on another person or company.
If a statement injures the reputation of a product or service instead of a person, it is called product
disparagement.
       ► Cyber squatting
       ► None
   
Question No: 14    ( Marks: 1 )    - Please choose one
 Characterization and Clustering belong to which of the following types of Data Mining?
       ► Additive
       ► Predictive
       ► Selective
       ► Descriptive P:141
Types of Data Mining
There are four main types of data mining as follows:
         Classification 
         Association
         Characterization
         Clustering
Classification and association are predictive types of data mining while characterization and clustering
represent the descriptive type.
 
Question No: 15    ( Marks: 1 )    - Please choose one
 EDI stands for……..
    ► Electronic Digital Information
       ► Electronic Data Integration
       ► Electronic Data Interchange P:147
Lesson 36
ELECTRONIC DATA INTERCHANGE (EDI)
       ► All of these
   
Question No: 16    ( Marks: 1 )    - Please choose one
 Implementing Value Chain model can help us to…
    ► Reduce cost
       ► Improve quality of products
       ► Create new ways of selling products
       ► All of these. P:153
Examining value chains one finds that EC can help in four different ways as follows:
  It can reduce costs of a business;
  It can improve quality of products
  It can help in reaching new customers or suppliers;
  It can create new ways of selling products.
   
Question No: 17    ( Marks: 1 )    - Please choose one
 Following are malicious programs EXCEPT ----------------- .
       ► Back doors
       ► Trojan Horses
       ► Firewalls P:96
Lesson 21
FIREWALLS
A firewall is a combination of hardware and software that sits between the internet and internal network of
an organization to protect the network from outside attack (Fig. 1). It can examine the data entering or
leaving from the network and can filter the data according to certain rules, thus, protects the network from
an attack.
       ► Worms
   
Question No: 18    ( Marks: 1 )    - Please choose one
 Which of the following is a valid variable name?

Note: Solve these papers by yourself. I am not responsible for any solved content 24
0301-6133581, 0334-9602729
[email protected]
       ► 6th_student_CGPA
       ► first_student_CGPA P:54
Rules for variables
Variable names can begin with an uppercase letter (A-Z), lower case letter (a-z), an underscore character
(_), or dollar sign ($). Remaining characters can be any of the above or from digits (0-9). In JavaScript
variables are case sensitive.
       ► last student CGPA
       ► *any_student_CGPA
   
Question No: 19    ( Marks: 1 )    - Please choose one
 Which of the following payment mode does not require customer to pay interest to the bank on
each transaction?
       ► Credit card
       ► Debit card P:110
Note that in case of a credit card the issuer bank charges interest from the client at a specified rate on the
amount lent. On the other hand, in case of a debit card no such interest is payable since the customer
uses his/her own money in that case.
       ► Electronic check
       ► All of the above
Question No: 20    ( Marks: 1 )    - Please choose one
 FVIPSS stands for _________.
       ► First Virtual Internet Payment System Server P:110
       First Virtual InternePayment System Server
       ► First Virtual International Payment System Server
       ► First Virtual International Payment System Services
       ► First Virtual Internal Payment System Services
    
Question No: 21    ( Marks: 1 )    - Please choose one
 Which e-business helps to improve policies, procedures, customer services, and general operations of
other businesses?
       ► Online shopping malls.
       ► Selling intellectual property online.
       ► Online service providers. P:129
Online Service Providers
These e-businesses help improve policies, procedures,  customer service and general operations of other
businesses. They can provide consultancy /  professional services, for example, web site development
services, online legal consultancy services etc. 
       ► Online automotive sites and energy online.
 
Question No: 22    ( Marks: 1 )    - Please choose one
 Which of the following is NOT an identified behavioral mode of customers on the web?
      
► Browsers
► Buyers     
► Shoppers
       ► Seller
   
 Behavioral segmentation
Creation of separate experiences for customers based on their behavior is called
Three identified behavioral modes of the customers on the web are:
         Browsers – customers who just browse through the site with no intention of buying
         Buyers – customers who are ready to buy right away
         Shoppers – customers who are motivated to buy but want more information 
Question No: 23    ( Marks: 1 )    - Please choose one
 Downstream activities relate to distribution and sale of goods to distributors/customers
       ► True P:155
Supply chain can be broken into three parts, that is, upstream activities, internal activities and
downstream activities.
         Upstream activities relate to materials/services or the input from suppliers 
          Internal activities relate to manufacturing and packaging of goods
         Downstream activities relate to distribution and sale of goods to distributors/customers
       ► False
    
Question No: 24    ( Marks: 1 )    - Please choose one
 Online banking is a substitute of tradition banking. Is it?

Note: Solve these papers by yourself. I am not responsible for any solved content 25
0301-6133581, 0334-9602729
[email protected]
       ► True
       ► False
   
Question No: 25    ( Marks: 1 )    - Please choose one
 -------------means services in relation to the transformation of contents of an electronic
Document from its original form to one that cannot be understood or decoded by any unauthorized person
       ► Cryptography services P:163
  “‘Cryptography services’ means services in relation to the transformation of contents of an electronic
document from its original form to one that cannot be understood or decoded by any unauthorized
person”.
       ► Accredited Certification Service Provider’
       ► Originator
       ► Addressee
   
Question No: 26    ( Marks: 1 )    - Please choose one
 Law is broadly divided into two classes on the basis of nature of wrong, namely, ------------ and
---------------  
       ► Civil law and criminal law P:176
Law is broadly divided into two classes on the basis of nature of wrong, namely, civil law and criminal law.
Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the
wrong-doer. Civil wrongs such as breach of contract are deemed to violate only the rights of individuals
and not the society in general.
       ► ETO and criminal law
       ► Supreme and  Civil Law
       ► None
   
Question No: 27    ( Marks: 1 )    - Please choose one
 Each layer except ………… has got a header.
       ► Physical layer P:05
Header is a piece of information which is attached to the data at its beginning by each layer except the
physical layer. The process of moving the data down the OSI Protocol.
       ► Datalink layer
       ► Session layer
       ► Network layer
   
Question No: 28    ( Marks: 1 )    - Please choose one
 Symmetric algorithms are faster than asymmetric?
       ► true P:105
The advantage of using symmetric key  is that since symmetric algorithms are faster as compared to
asymmetric, therefore, the encryption of a message with the symmetric key takes place quickly.
       ► false
   
Question No: 29    ( Marks: 1 )    - Please choose one
 SET was developed in _____.
       ► 1996
       ► 1997 P:122
Secure Electronic Transaction  (SET)
The drawback in SSL that the credit card/debit card information remains with the merchant led to the
development of a more sophisticated protocol called SET. It was developed in 1997 jointly by Visa,
MasterCard, Netscape and Microsoft.
       ► 1998
       ► 1999
   
Question No: 30    ( Marks: 1 )    - Please choose one
 LDA stands for _______
       ► Lahore Development Authority P:165
A statutory body is a body/organization established under some statute/law. For example,
the Lahore Development Authority (LDA) is a statutory body established under the Lahore Development
Act, 1975 (a provincial statute). 
       ► Lahore Development Act
   
Question No: 31    ( Marks: 2 )
 What is Data Mining? P: 140
Data Mining

Note: Solve these papers by yourself. I am not responsible for any solved content 26
0301-6133581, 0334-9602729
[email protected]
Data Mining can be defined as the task of discovering interesting patterns from large amounts of data,
where the data can be stored in databases, data warehouses, or other information repositories.  Data
mining has a lot of business application in today’s world. We can identify the behavior of our customers
and can effectively target them with personalized messages using data mining techniques.
Assume that there is a shopping store where the data/information about customers has been recorded
/stored over a period of time. Using a data mining technique on the customers’ data, certain pattern can
be generated that can provide useful information. For example,
this pattern may tell us that people having a certain demographic profile (age over 20 years and sex male)
coming from a particular location have shown inclination to buy computer related items. It is an interesting
clue for the marketers.
   
Question No: 32    (Marks: 2 )
 What is the purpose of FRAMESET tag? P: 31
<Frameset> and <Frame> are the two basic tags. This concept uses two different types of pages –
Frameset page and content pages. Frameset page divides the browser window into a set of frames and
defines the size of each frame. It also specifies which content pages are displayed in which frame. It has
nobody section (no body tag). Content pages are just regular HTML pages. 
   
Question No: 33    (Marks: 2 )
 What do we mean by "Free-Trial" promotion technique? P: 133
Promotions
E-business promotions can attract visitors to your site and induce them to purchase. Promotional
messages can be sent both online and offline.
Free-trials 
Customers can sign up for a free service. For example, they can be allowed to download software for
certain days free of cost on trial basis before buying it.
   
Question No: 34    (Marks: 2 )
 What is UNCITRAL?
Most of the countries have, by now, made laws providing recognition to electronic documents an
electronic signature. They have basically followed a model law on e-commerce proposed by a U.N.
body called UNCITRAL (United Nations Commission on International Trade Law) in 1996.
On analysis, appears that ETO has certain deficiencies. For instance, difference between an electronic
signature and an advanced electronic signature is not clear. Sections dealing with the offences of
violation of information a privacy and damage to information /informational systems are too broadly
worded, which may lead to confusion. International aspects of e-commerce such as recognition of the
foreign certificates and electronic signatures etc. are missing.   
Question No: 35    (Marks: 3 )
 Write precisely about the 4th stage of planning cycle? P:159
Strategic Planning Cycle
E-business competitive strategy is normally formed and implemented according to a planning cycle which
is called strategic planning cycle. 
There are four stages in this planning cycle
Industry and Competitive Analysis Strategy
Formulation
Implementation
Performance Assessment or Strategy Reassessment
The 4th stage is Performance Assessment or Strategy Reassessment
  Strategy assessment: 
Results of implementation plan are monitored and assessed so that any corrective measures or
expansion plan can take place. Basically, you want to assess whether your strategy has delivered what it
was supposed to deliver; whether your strategy is still viable/workable in the ever changing environment.
In strategy assessment phase, you can learn from your mistakes and do your future planning. In case
your EC project has been a failure, you can identity the problems and try to remove them. Some of the
corrective measures can be to property train your web team, establish or review your security or privacy
policy, review or reassess your web design content, reconsider your marketing plan etc. For the strategy
assessment, you can conduct surveys, collect information and receive feedback from different groups of
people so that you have solid input from people coming from a variety of background. Sometimes, you
have to entirety give up a particular strategy you followed and formulate a new strategy or set of
strategies in light of the company’s main objective or its mission.
   
Question No: 36    (Marks: 3 )
 Discuss the role and responsibilities of “Transport layer” in OSI model? 
Transport layer

Note: Solve these papers by yourself. I am not responsible for any solved content 27
0301-6133581, 0334-9602729
[email protected]
TCP (Transmission Control Protocol) or UDP (User Datagram Protocol) operate at this layer. It has two
functions. It converts the data into data packets. Secondly, it is responsible for flow control of data. TCP is
more reliable as it is acknowledgment based as opposed to UDP which does not use any system of
acknowledgment for the delivery of data packets.
   
Question No: 37    (Marks: 3 )
 How lack of trust barrier can be overcome or minimized? Discuss it briefly
Lack of Trust 
It is very important for online businesses to establish trusting relationships with their customers like in the
physical world where companies ensure that customers know who they are. However, it is difficult to build
trust because a kind of anonymity exists for companies trying to establish web presence. 
Lack of trust barrier can be overcome or minimized:
A plan for establishing credibility of an online business is extremely crucial for its success.
In this behalf, attention to the needs of the site visitors is very important while designing the web site,
since it can be helpful in building trust with customers.  For instance, there should be easy to find web
pages that answer questions of the visitors.
Note that companies with established brands can build trust for online business more quickly as
compared to a new company/business without reputation, since a brand conveys expectations about how
the online business would behave. For example, how the seller online business would react to a claim of
refund by the customer.
    
Question No: 38    (Marks: 3 )
 Write the names of companies who were helper in developing Secure Electronic Transaction.
Secure Electronic Transaction. (SET)
It was developed in 1997 jointly by Visa, MasterCard, Netscape and Microsoft.
   
Question No: 39    (Marks: 5 )
 Differentiate between Cyber squatting and concurrent use with example.  P: 181
Cyber squatting
The act of intentionally registering domain names containing trademarks/trade names of prominent
companies to later blackmail or demand ransom from those companies is called cyber squatting.
  
 Example:
Assume there is a firm ‘Glory Enterprise’ and it wants to have its web site. It also wants to have the word
‘glory’ as a part of its domain name because for years it has been recognized in the physical world
through this word. However, at the time of registration of its domain name it finds that a person Mr. ‘A’
who has nothing to do with the business of the firm or the word ‘glory’ has already registered a domain
name containing this word as a part of it. Since there cannot be two similar domain names, the firm is
forced to request Mr. ‘A’ to transfer that domain name to it. In response, if Mr. ‘A’ blackmails or claims
ransom from the said firm, he would be said to have committed cyber squatting. 
Concurrent use
This problem arises when two organizations have apparently legitimate claim to use the same domain
name but cannot do so due to the uniqueness of domain names.
Example:
 Suppose, there is a company manufacturing electronic goods and another company selling French fries.
Under the traditional trade mark law both these companies can have the same trade mark/trade name
such as ‘frys’. The problem
arises when both apply for the registration of a domain name containing the word ‘frys’. Here, both are
legitimate claimants of this domain name but due to the element of uniqueness of domain names only
one of them can be assigned the desired domain name.   
Question No: 40    (Marks: 5 )
 Explain ‘Confidence’ and ‘Support’ as two measures of Association? P: 144
  
CONFIDENCE AND SUPPORT
There are two terms/measures used in association, that is, support and confidence. Confidence’ is a
measure of how often the relationship holds true e.g, what percentage of time did people who bought milk
also bought eggs. Support means what is the percentage of two items occurring together overall.
Mathematically, they can be expressed as follows if we take the example of eggs and milk: 
Confidence = Transactions (eggs + milk)
Transactions (eggs or milk or both)
In case no. of transactions involving eggs and milk are 25 and those involving eggs or milk or both are 75
then confidence is 25/75*100=33.3%
Support =      Transactions (eggs + milk)
Total no. of transactions
In case no. of transactions involving eggs and milk are 10 and total no. of transactions in a day is 50 then

Note: Solve these papers by yourself. I am not responsible for any solved content 28
0301-6133581, 0334-9602729
[email protected]
support is 10/50*100 = 20%
Suppose if confidence is 90% but the support is 5%., then we can gather from this that the two items have
very strong affinity or relationship with each other such that when an item is sold the other is sold
together, However, the chance of this pair being purchased out of the total no. of transactions is very slim,
just 5%.
One can adjust these measures to discover items having corresponding level of association and
accordingly set marketing strategy. So, if I feed the data to the association mining tool and specify the
percentage of confidence and support, it will list down the items that have association corresponding to
these percentages. Results of association mining are shown with the help of double arrows as indicated
below:
Bread Å----Æ Butter
Computer Å----Æ Furniture 
Clothes Å----Æ Shoes
Using the result of association mining, a marketer can take a number of useful steps to set or modify
marketing strategy. For example, items that have closeness/affinity with each other can be shelved
together to improve customer service. Certain promotional schemes can be introduced in view of the
association mining result etc.  

Note: Solve these papers by yourself. I am not responsible for any solved content 29
0301-6133581, 0334-9602729

You might also like