FINALTERM EXAMINATION
Spring 2010
IT430- E-Commerce
Time: 90 min
Marks: 60
Question No: 1 ( Marks: 1 ) - Please choose one
Creation of separate experiences for customers based on their behavior is called
► Demographic segmentation
► Behavioral segmentation
► Geo-Graphic Segmentation
► None of the above
Question No: 2 ( Marks: 1 ) - Please choose one
Track the customers online and do personalization is only possible through which of the following file(s) analysis.
► log files
► Cookie
► data mining
► log files and cookies.
Question No: 3 ( Marks: 1 ) - Please choose one
Which one of the following ,divides large network in small logical segments called subnets on basis of IP addresses
► Routers
► Bridge
► None of these
► Switches
Question No: 4 ( Marks: 1 ) - Please choose one
Where in an HTML document is the correct place to refer to an external style sheet?
► At the end of the document
► At the top of the document
► In the section
► In the section
Question No: 5 ( Marks: 1 ) - Please choose one
Which of the following is NOT valid HTML code line?
►
►
►
►
Question No: 6 ( Marks: 1 ) - Please choose one
How do you change the left margin of an element?
► Padding-left
► Margin
► Text-indent
► margin-left
Question No: 7 ( Marks: 1 ) - Please choose one
document.write (str.replace (/Microsoft/,"W3Schools"))
►This string object is deleting Microsoft word
► This string object is concatenating the Microsoft with W3schools
► This string object is replacing Microsoft with W3schools
► None of these
http://www.w3schools.com/jsref/jsref_replace.asp
Question No: 8 ( Marks: 1 ) - Please choose one
► User information
► seller information
► web page key information
► bank information
Question No: 9 ( Marks: 1 ) - Please choose one
Porter’s Model helps a firm to identify threats to its competitive position and to devise plans including the use of IT and e-commerce to protect or enhance that position.
► True
► False
Question No: 10 ( Marks: 1 ) - Please choose one
The act of intentionally registering domain names containing trademarks/trade names of prominent companies to later blackmail or demand ransom from those companies is called ------------------
► Cyber squatting.
► Trade mark
► Online Defamation
► Parasites
Question No: 11 ( Marks: 1 ) - Please choose one
In which type of data mining, Apriori algorithms is used?
► Classification
► Association
► Characterization
► Clustering
Question No: 12 ( Marks: 1 ) - Please choose one
Idea of Value Chain Model was given by..
► Micheal Porter
► Henry Porter
► Welkin Tin
► Soleman
Question No: 13 ( Marks: 1 ) - Please choose one
Support activities in Value Chain model includes
► Finance and Administration
► Human Resources
► Technology Development
► All of these
Question No: 14 ( Marks: 1 ) - Please choose one
Which property of the document object is used to create a cookie?
► creatcookie
► cookie
► cookies
► updatecookie
Question No: 15 ( Marks: 1 ) - Please choose one
Cyber wallet can automatically assemble the correct payment and pay it too.
► True
► False
Question No: 16 ( Marks: 1 ) - Please choose one
DSMD stands for "Dual Signature Message Digest".
► True
► False
Question No: 17 ( Marks: 1 ) - Please choose one
In SSL, the credit card/debit card information remains with the merchant. It is considered as a(n)________________.
► Advantage of SSL
► Disadvantage of SSL
► Benefit of SSL
► Secure factor of SSL
Question No: 18 ( Marks: 1 ) - Please choose one
Dividing market, with respect to people having income level greater than Rs 30000, is geographic segmentation.
► True.
► False.
Question No: 19 ( Marks: 1 ) - Please choose one
Data cleaning means ________.
► Adding missing values
► Correction of erroneous values
► Both of above
► None of above
Question No: 20 ( Marks: 1 ) - Please choose one
Established ----------- can build trust for online business more quickly as compared to a new company/business without reputation
► Brand
► Language
► Culture
► Infrastructure
Question No: 21 ( Marks: 1 ) - Please choose one
Choose the right one that which organization based in
► WITO
► WIPO
► MIPO
►
Question No: 22 ( Marks: 1 ) - Please choose one
Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Is it?
► True
► False
Question No: 23 ( Marks: 1 ) - Please choose one
Criminal wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general
► True
► False
Civil wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general
Question No: 24 ( Marks: 1 ) - Please choose one
#00ff00 in HTML indicates
► Pure green color
► Pure blue color
► Pure red color
► Pure yellow color
Question No: 25 ( Marks: 1 ) - Please choose one
Virtual PIN Payment System requires both merchant and buyer to register with _______________.
► Auto Clearing House (ACH)
► First Virtual (FV)
► DSS (Digital Signature Standard)
► DES (Data Encryption Standard)
Question No: 26 ( Marks: 1 ) - Please choose one
The process of key search attack is driving private key from _____.
► Public key
► Symmetric key
► Asymmetric key
► Private key
Question No: 27 ( Marks: 1 ) - Please choose one
In e-cash system which type of encryption is used?
► a) Symmetric
► b) Asymmetric
► Both a&b
► None
Question No: 28 ( Marks: 1 ) - Please choose one
The number of stages in e-cash payment system is/are _____.
► one
► two
► three
► four
Question No: 29 ( Marks: 1 ) - Please choose one
What is/are the advantages of EDI?
► No paper work
► No human intervention
► Exchange of information takes place in seconds
► All of Above
Question No: 30 ( Marks: 1 ) - Please choose one
The term “Appropriate Authority” includes ______________ legislative assemblies
► 2
► 3
► 5
► 4