FINALTERM EXAMINATION
Spring 2010
IT430- E-Commerce
Time: 90 min
Marks: 60
Question No: 1 ( Marks: 1 ) - Please choose one
Creation of separate experiences for customers based on their behavior is called
► Demographic segmentation
► Behavioral segmentation
► Geo-Graphic Segmentation
► None of the above
Question No: 2 ( Marks: 1 ) - Please choose one
Track the customers online and do personalization is only possible through which of the following file(s) analysis.
► log files
► cookie
► data mining
► log files and cookies.
Question No: 3 ( Marks: 1 ) - Please choose one
Which one of the following ,divides large network in small logical segments called subnets on basis of IP addresses
► Routers
► Bridge
► None of these
► Switches
Question No: 4 ( Marks: 1 ) - Please choose one
Where in an HTML document is the correct place to refer to an external style sheet?
► At the end of the document
► At the top of the document
► In the section
► In the section
Question No: 5 ( Marks: 1 ) - Please choose one
Which of the following is NOT valid HTML code line?
►
►
►
►
Question No: 6 ( Marks: 1 ) - Please choose one
How do you change the left margin of an element?
► Padding-left
► Margin
► Text-indent
► margin-left
Question No: 7 ( Marks: 1 ) - Please choose one
document.write(str.replace(/Microsoft/,"W3Schools"))
► This string object is deleting Microsoft word
► This string object is concatenating the Microsoft with W3schools
► This string object is replacing Microsoft with W3schools
► None of these
Question No: 8 ( Marks: 1 ) - Please choose one
► User information
► seller information
► web page key information
► bank information
Question No: 9 ( Marks: 1 ) - Please choose one
Porter’s Model helps a firm to identify threats to its competitive position and to devise plans including the use of IT and e-commerce to protect or enhance that position.
► True
► False
Question No: 10 ( Marks: 1 ) - Please choose one
The act of intentionally registering domain names containing trademarks/trade names of prominent companies to later blackmail or demand ransom from those companies is called ------------------
► Cyber squatting.
► Trade mark
► Online Defamation
► Parasites
Question No: 11 ( Marks: 1 ) - Please choose one
In which type of data mining, Apriori algorithms is used?
► Classification
► Association
► Characterization
► Clustering
Question No: 12 ( Marks: 1 ) - Please choose one
Idea of Value Chain Model was given by..
► Micheal Porter
► Henry Porter
► Welkin Tin
► Soleman
Question No: 13 ( Marks: 1 ) - Please choose one
Support activities in Value Chain model includes
► Finance and Administration
► Human Resources
► Technology Development
► All of these.
Question No: 14 ( Marks: 1 ) - Please choose one
Which property of the document object is used to create a cookie?
► creatcookie
► cookie
► cookies
► updatecookie
Question No: 15 ( Marks: 1 ) - Please choose one
Cyber wallet can automatically assemble the correct payment and pay it too.
► True
► False
Question No: 16 ( Marks: 1 ) - Please choose one
DSMD stands for "Dual Signature Message Digest".
► True
► False
Question No: 17 ( Marks: 1 ) - Please choose one
In SSL, the credit card/debit card information remains with the merchant. It is considered as a(n)________________.
► Advantage of SSL.
► Disadvantageof SSL.
► Benefit of SSL.
► Secure factor of SSL.
Question No: 18 ( Marks: 1 ) - Please choose one
Dividing market, with respect to people having income level greater than Rs 30000, is geographic segmentation.
► True.
► False.
Question No: 19 ( Marks: 1 ) - Please choose one
Data cleaning means ________.
► Adding missing values
► Correction of erroneous values
► Both of above
► None of above
Question No: 20 ( Marks: 1 ) - Please choose one
Established ----------- can build trust for online business more quickly as compared to a new company/business without reputation
► Brand
► Language
► Culture
► Infrastructure
Question No: 21 ( Marks: 1 ) - Please choose one
Choose the right one that which organization based in Switzerland is one such arbitration service provider nominated under the UDRP.
► WITO
► WIPO
► MIPO
►
Question No: 22 ( Marks: 1 ) - Please choose one
Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Is it?
► True
► False
Question No: 23 ( Marks: 1 ) - Please choose one
Criminal wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general
► True
► False
Question No: 24 ( Marks: 1 ) - Please choose one
#00ff00 in HTML indicates
► Pure green color
► Pure blue color
► Pure red color
► Pure yellow color
Question No: 25 ( Marks: 1 ) - Please choose one
Virtual PIN Payment System requires both merchant and buyer to register with _______________.
► Auto Clearing House (ACH)
► First Virtual (FV)
► DSS (Digital Signature Standard)
► DES (Data Encryption Standard)
Question No: 26 ( Marks: 1 ) - Please choose one
The process of key search attack is driving private key from _____.
► Public key
► Symmetric key
► Asymmetric key
► Private key
Question No: 27 ( Marks: 1 ) - Please choose one
In e-cash system which type of encryption is used?
► a) Symmetric
► b) Asymmetric
► Both a&b
► None
Question No: 28 ( Marks: 1 ) - Please choose one
The number of stages in e-cash payment system is/are _____.
► one
► two
► three
► four
Question No: 29 ( Marks: 1 ) - Please choose one
What is/are the advantages of EDI?
► No paper work
► No human intervention
► Exchange of information takes place in seconds
► All of Above
Question No: 30 ( Marks: 1 ) - Please choose one
The term “Appropriate Authority” includes ______________ legislative assemblies
► 2
► 3
► 5
► 4
Question No: 31 ( Marks: 2 )
What you understand about Denial of services (DOS) attacks?
Question No: 32 ( Marks: 2 )
How the Porter’s model helps a firm to devise a plan?
Question No: 33 ( Marks: 2 )
Define electronic signature?
Question No: 34 ( Marks: 2 )
In SSL handshaking what is mean by Cipher Suite?
Question No: 35 ( Marks: 3 )
What do you know about interactive advertisement? Briefly explain.
Question No: 36 ( Marks: 3 )
How lack of trust barrier can be overcome or minimized? Discuss it briefly
Question No: 37 ( Marks: 3 )
In the code given below what is meaning of "20%, *, 20%" describe briefly.
Question No: 38 ( Marks: 3 )
Describe ‘Online Analytical Processing (OLAP)’ in short?
Question No: 39 ( Marks: 5 )
Elaborate the importance of OLAP in decision making support for an organization.
Question No: 40 ( Marks: 5 )
Write down the list of major global issues of e-commerce.