Escolar Documentos
Profissional Documentos
Cultura Documentos
Spring 2010
IT430- E-Commerce (Session - 1)
Time: 90 min
Marks: 60
► Just In Tim
► Join in Training
► Just In Total
Page 147 :For instance, packaging material should only be ordered for just in time (JIT)
delivery,
► No distribution channel
► No warehousing
► Easily delivery
► No communication
Question No: 3 ( Marks: 1 ) - Please choose one
Press release can provide information about current events and news to, which of following,
via a internet?
► Print media
► T.v commercial
► Press or media
► T.v program.
Page 135: Press releases can provide information about current events and other important
following
► cookies
► log files
visitor’s location.
Page 113: Financial Services Technology Consortium (FSTC) is a group of U.S banks, research
distributors/customers
The process of taking active role in working with suppliers to improve products and processes
is called?
► Porter Model
Page 155: The process of taking active role in working with suppliers to improve products and
processes is called supply chain management.Today, firms are reaching beyond limits of their
Porter’s Model helps a firm to identify threats to its competitive position and to devise plans
► True
► False
Page 158 : Porter’s Model helps a firm to identify threats to its competitive position and to
devise plans including the use of IT and e-commerce to protect or enhance that position.
Question No: 9 ( Marks: 1 ) - Please choose one
Which of the following is NOT force of Porter’s competitive rivalry Model?
► Threat of substitute
of information unless the customer specifically denies the permission. Thus, the company may
use the collected information for its own purpose, as well as, sell or rent it out to other firms
► Opt-inout
► Opt-out
► Swap-out
► Opt-in
► IP
► RIP
► MAC
Page no 7: IP addressing
It is the logical addressing scheme used to identify computer machines on the internet. Each
represented by four decimal numbers separated by a period e.g, 140.57.220.200 (see Fig. 5
► ANSI
► Microsoft
Page 74: World Wide Web Consortium (W3C), a non-profit organization that maintains
standards for the web presented the draft of XML in late 1990’s.
► administrators
► experts
► hackers
► coders
Page 94: Hackers Hackers or crackers are those individuals who write programs or
The process of scrambling a message with the help of a key is called -------------- .
► Cryptography
► Filtering
► Transposition
► Encryption
Page 100: The process of scrambling a message with the help of a key is called Encryption.
► Relative
► absolute
► static
► dynamic
► an underscore character
Page 54: Variable names can begin with an uppercase letter (A-Z), lower case letter (a-z),
an underscore character (_), or dollar sign ($). Remaining characters can be any of the above
► True
► False
Page 105: The advantage of using symmetric key is that since symmetric algorithms are faster
as compared to asymmetric,
► True
► False
Which e-business helps to improve policies, procedures, customer services, and general
Page 129: Online Service Providers e-businesses help improve policies, procedures,
customer service and general operations of other businesses. They can provide
consultancy/professional services, for example, web site development services, online legal
Choose which one is a very critical element in supply chain management in an E-commerce
environment.
► Transaction
► Communication
Page 155: Internet is a very quick and effective tool of communication. On the other hand,
Established ----------- can build trust for online business more quickly as compared to a new
► Brand
► Language
► Culture
► Infrastructure
Page 161: Note that companies with established brands can build trust for online business
document from its original form to one that cannot be understood or decoded by any
unauthorized person
► Cryptography services
► Originator
► Addressee
contents of an electronic document from its original form to one that cannot be understood or
Choose the right one that which organization based in Switzerland is one such arbitration
► WITO
► WIPO
► MIPO
► MITO
Page 182: World Intellectual Property Organization (WIPO) based in Switzerland is one such
------------- wrong is an act deemed by law to be harmful to the society in general such as
theft or murder etc. and the state itself is a party in such matters.
► Criminal
► Civil
► Plentiful
► None
Page 176: criminal wrong (crime) is an act deemed by law to be harmful to the society in
general such as theft or murder etc. and the state itself is a party in such matters.
and
tag.
If we apply hash function on any message the message will become message digest. Can we
► Yes
► No
Page 103: A hash function is said to be one way because we cannot go back to the original
The process of key search attack is driving private key from _____.
► Public key
► Symmetric key
► Asymmetric key
► Private key
Page 108: The public key and its corresponding private key are linked with each other with the
help of a large composite number. These attacks attempt to derive the private key from its
► a) Symmetric
► b) Asymmetric
► Both a&b
► None
Page 118 : The request is encrypted with a symmetric key and that symmetric key is
encrypted with the public key of the bank, thus creating a secure envelope.
► Language Barrier
► Cultural
► Lack of Trust
► Network Barrier
Competition within businesses to get more customers and trade at a price that produces a
satisfactory profit. If there are lots of players of the same size, capacity and strategy having
little difference between their goods, then there is fierce competition among them as regards
B2C stands for Business-to-Consumer and deals between electronic markets to consumer (end
user) directly e.g. Amazon.com, while B2B is Business-to-Business and make bridge between
company. In cases of defamation the appeal taken by the defendant is that his statement is
not false. Rather, it is a ‘fair comment’. In case defamation is done using the internet, it is
under this Ordinance to issue certificates for the use of its cryptography services.
(1+2)
What is meant by connectivity media in networking? What are two different options to
· A private bill should only be passed at the explicit request of the persons who are to benefit
· Pertinent information regarding a private bill should be made available to all interested
persons.
· All persons or bodies affected by a private bill should be heard and the need for the bill
demonstrated.
· The financial burden of considering a bill for the benefit of private interests should not be
The act of deliberately registering domain names having trademarks of famous companies to
later blackmail or demand payment from those companies is called cyber squatting. For
example; Assume there is a firm ‘Nassir Enterprise’ and it wants to have its web site. It also
wants to have the word ‘Nassir’ as a part of its domain name because for years it has been
recognized in the market through this word. However, at the time of registration of its domain
name it finds that a person Mr. ‘A’ who has nothing to do with the business of the firm or the
word ‘Nassir’ has already registered a domain name containing this word as a part of it. Since
there cannot be two similar domain names, the firm is forced to request Mr. ‘A’ to transfer that
domain name to it. In response, if Mr. ‘A’ blackmails or claims ransom from the said firm, he
We can check our accounts balances from anywhere of world, no need to go bank.
If you want reconcile your statements you can get easily from it.
· Pay utility bills
Paying bills by credit card give much relief to users, no need of stand in queue for long time.
Any info you want about your account, get from online bank accounts
Money transferring is not headache, no need of stand in queue for long time.