Spring 2010
Question No: 1 ( Marks: 1 ) - Please choose one
In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last …………………withdrawals to the E-bank.
► 10
► 12
► 18
► 16 P:119
Lost Coins
In case network fails or computer crashes during payment transaction, coins might be lost. All signed blinded coins from last 16 withdrawals are sent by the bank to the client. Client uses the blinding factor
Question No: 2 ( Marks: 1 ) - Please choose one
Which entity does not include in SET(secure Electronic Transaction)?
► Seller
► Buyer
► Payment gateway
► Bank P:122
There are four entities involved in a SET transaction – cardholder, Merchant and certification authority and payment gateway.
Question No: 3 ( Marks: 1 ) - Please choose one
Traditionally Marketer use the market segmentation(s) like
► Geo-graphic Segmentation
► Demographic Segmentation
► Psychographic Segmentation
► All of the above P:131
Traditionally, marketers have used three types of variables to define three different market segmentations, namely, geographic segmentation, demographic segmentation and psychographic segmentation.
Question No: 4 ( Marks: 1 ) - Please choose one
Class C has:
► Network 01 byte and 03 hosts
► Network 02 bytes and 02 hosts
► Network 03 bytes and 01 host P:10
► None of these
In class C, first three bytes refer to the network address and the last byte to the host
machines on that network, which would therefore be a very small network.
Question No: 5 ( Marks: 1 ) - Please choose one
In ring topology, failure of network cable will only take down one computer’s network access.
► True
► False
Question No: 6 ( Marks: 1 ) - Please choose one
Which device uses the IP address
► Switch
► Router P:16
A router is a decision making device. When a data packet arrives at a router it reads the network addresses from the IP address on the data packet and determines the shortest possible path through which this packet can be delivered to its destination.
► Repeater
► None of these
Question No: 7 ( Marks: 1 ) - Please choose one
What is the correct HTML for inserting an image?
►
►
P:21
On Sale Cassettes
►
► image.gif
Question No: 8 ( Marks: 1 ) - Please choose one
Cryptographic Algorithms are measured in terms of
► Key length P:108
Cryptographic algorithms are measured in terms of key length.
► Complexity
► Simplicity
► All of the above
Question No: 9 ( Marks: 1 ) - Please choose one
Upstream activities relate to?
► Materials/services or the input from suppliers P:155
Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities.
· Upstream activities relate to materials/services or the input from suppliers
· Internal activities relate to manufacturing and packaging of goods
· Downstream activities relate to distribution and sale of goods to distributors/customers
► Manufacturing and packaging of goods
► Distribution and sale of goods to distributors/customers
► Input from suppliers and Distribution
Question No: 10 ( Marks: 1 ) - Please choose one
Television, radio and print media are in a (n) ……………………. Mode.
► Passive P:139
Emotional branding vs. rational branding
In case of television, radio or print media people are normally in a passive mode. To a greater extent they do not control the communication channel and thus have to listen or view the advertisement about a brand.
► Active
► Static
► Dynamic
Question No: 11 ( Marks: 1 ) - Please choose one
Which of the following Barriers to International E-Commerce?
► Advertising
► Patents
► Infrastructure P:161
Barriers to International e-commerce
Barriers to international ecommerce include lack of trust, lack of infrastructure, language and culture.
► Capital
Question No: 12 ( Marks: 1 ) - Please choose one
Exclusive right granted by law to make, use and sell an invention. What is called?
► Parasites
► Trade mark
► Patent infringement P:181
Patent infringement
A patent is an exclusive right granted by law to make, use and sell an invention. In order to be patentable, the invention must be unique, genuine, and useful according to the prevalent technological standards.
► Copyright
Question No: 13 ( Marks: 1 ) - Please choose one
Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act.
Which legal issue arises due to such acts?
► Cyber Crimes
► Online Defamation P:182
Online Defamation
A defamatory statement is a false statement that injures the reputation of on another person or company. If a statement injures the reputation of a product or service instead of a person, it is called product disparagement.
► Cyber squatting
► None
Question No: 14 ( Marks: 1 ) - Please choose one
Characterization and Clustering belong to which of the following types of Data Mining?
► Additive
► Predictive
► Selective
► Descriptive P:141
Types of Data Mining
There are four main types of data mining as follows:
· Classification
· Association
· Characterization
· Clustering
Classification and association are predictive types of data mining while characterization and clustering represent the descriptive type.
Question No: 15 ( Marks: 1 ) - Please choose one
EDI stands for……..
► Electronic Digital Information
► Electronic Data Integration
► Electronic Data Interchange P:147
Lesson 36
ELECTRONIC DATA INTERCHANGE (EDI)
► All of these
Question No: 16 ( Marks: 1 ) - Please choose one
Implementing Value Chain model can help us to…
► Reduce cost
► Improve quality of products
► Create new ways of selling products
► All of these. P:153
Examining value chains one finds that EC can help in four different ways as follows:
It can reduce costs of a business;
It can improve quality of products
It can help in reaching new customers or suppliers;
It can create new ways of selling products.
Question No: 17 ( Marks: 1 ) - Please choose one
Following are malicious programs EXCEPT ----------------- .
► Back doors
► Trojan Horses
► Firewalls P:96
Lesson 21
FIREWALLS
A firewall is a combination of hardware and software that sits between the internet and internal network of an organization to protect the network from outside attack (Fig. 1). It can examine the data entering or leaving from the network and can filter the data according to certain rules, thus, protects the network from an attack.
► Worms
Question No: 18 ( Marks: 1 ) - Please choose one
Which of the following is a valid variable name?
► 6th_student_CGPA
► first_student_CGPA P:54
Rules for variables
Variable names can begin with an uppercase letter (A-Z), lower case letter (a-z), an underscore character (_), or dollar sign ($). Remaining characters can be any of the above or from digits (0-9). In JavaScript variables are case sensitive.
► last student CGPA
► *any_student_CGPA
Question No: 19 ( Marks: 1 ) - Please choose one
Which of the following payment mode does not require customer to pay interest to the bank on each transaction?
► Credit card
► Debit card P:110
Note that in case of a credit card the issuer bank charges interest from the client at a specified rate on the amount lent. On the other hand, in case of a debit card no such interest is payable since the customer uses his/her own money in that case.
► Electronic check
► All of the above
Question No: 20 ( Marks: 1 ) - Please choose one
FVIPSS stands for _________.
► First Virtual Internet Payment System Server P:110
First Virtual InternePayment System Server
► First Virtual International Payment System Server
► First Virtual International Payment System Services
► First Virtual Internal Payment System Services
Question No: 21 ( Marks: 1 ) - Please choose one
Which e-business helps to improve policies, procedures, customer services, and general operations of other businesses?
► Online shopping malls.
► Selling intellectual property online.
► Online service providers. P:129
Online Service Providers
These e-businesses help improve policies, procedures, customer service and general operations of other businesses. They can provide consultancy / professional services, for example, web site development services, online legal consultancy services etc.
► Online automotive sites and energy online.
Question No: 22 ( Marks: 1 ) - Please choose one
Which of the following is NOT an identified behavioral mode of customers on the web?
► Browsers
► Buyers
Behavioral segmentation
Creation of separate experiences for customers based on their behavior is called
Three identified behavioral modes of the customers on the web are:
· Browsers – customers who just browse through the site with no intention of buying
· Buyers – customers who are ready to buy right away
· Shoppers – customers who are motivated to buy but want more information
► Shoppers
► Seller