it430- e-commerce (session - 3) final 2008

17
 FINALTERM EXAMINATION Fall 2008 IT430- E-Commerce (Session - 1) Question No: 1 ( Marks: 1 ) - Please choose one  Which one of the following is NOT recorded in log files at server side?  IP addresses Requested(url)  Date Cookies Reference: : page #136 handouts lecture #32 Log files consist of  data generated by site visits and include information about each visitors location, IP address, time of visit,frequency of visits etc. There are  businesses that provide the services of analyzing web log files. The results  would show how effective your web site is and indicate the top-referring web sites. You know that cookies  allow e-commerce sites to record visitor behavior. They can be used to track customers online and do   personalization. Many customers do not know that their information is being collected and used by the ebusiness  site. Thus, informational privacy rights of customers can be breached in cases where cookies are used. Question No: 2 ( Marks: 1 ) - Please choose one  Key version represents public key by  Buyer Seller  E-Bank  Certification Authority  

Upload: zahidwahla1

Post on 14-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IT430- E-Commerce (Session - 3) Final 2008

7/29/2019 IT430- E-Commerce (Session - 3) Final 2008

http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 1/16

FINALTERM EXAMINATION Fall 2008

IT430- E-Commerce (Session - 1)

Question No: 1 ( Marks: 1 ) - Please choose one

Which one of the following is NOT recorded in log files at server side? IP addresses

Requested(url)

Date

Cookies

Reference: : page #136 handouts lecture #32 Log files consist of data generated by site visits and include information about eachvisitor‟s location, IP address, time of visit,frequency of visits etc. There are

businesses that provide the services of analyzing web log files. The results wouldshow how effective your web site is and indicate the top-referring web sites. Youknow that cookies allow e-commerce sites to record visitor behavior. They can beused to track customers online and do personalization. Many customers do notknow that their information is being collected and used by the ebusiness site. Thus,informational privacy rights of customers can be breached in cases where cookiesare used. Question No: 2 ( Marks: 1 ) - Please choose one

Key version represents public key by Buyer

Seller

E-Bank

Certification Authority

Page 2: IT430- E-Commerce (Session - 3) Final 2008

7/29/2019 IT430- E-Commerce (Session - 3) Final 2008

http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 2/16

Question No: 3 ( Marks: 1 ) - Please choose one

SET and SSL both are same with respect to security. True

False

Question No: 4 ( Marks: 1 ) - Please choose one

To overcome the lack of physical proximity appearance problem in e-business,which technology is going to be used Biometrics

Video conferencing

Cryptography

Biometrics and Video conferencing

Question No: 5 ( Marks: 1 ) - Please choose one

Web catalogue revenue model includes a. Online sellers of computer

b. Gifts, flowers, clothes

c. Journals

d. A and B

Reference: : page #130 handouts lecture #30 Web Catalogue Revenue Model Though the goal of an e-business can be to reduce cost or improve customer service, however, the primary aim of most e-commerce sites is to generate revenue

and earn profit. This is the most simple and common type of e-business model for generating revenue. This model would use electronic catalogue and shopping cart

providing access to customers throughout the world. Businesses using this type of

Page 3: IT430- E-Commerce (Session - 3) Final 2008

7/29/2019 IT430- E-Commerce (Session - 3) Final 2008

http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 3/16

a model include online sellers of computers, electronic items, books, music,videos, toys, flowers, gifts, clothes etc. Payment received from customers is thesource of earning revenue. Question No: 6 ( Marks: 1 ) - Please choose one

Advertising Supported Revenue Model includes Yahoo portal

Employment sites

Newspaper Publishers

All of the above

Reference: : page #130 handouts lecture #30 Advertising-Supported Revenue Model In this model service/information is provided free of any charge to certain audienceand the advertising revenue is sufficient to support the operation of the businessand its cost. For example, Yahoo portal provides useful information and a searchengine free of cost, but earns revenue through advertisements on its portal web siteto bear the operational cost.

Question No: 7 ( Marks: 1 ) - Please choose one

Do you think, vulms.vu.edu.pk is an example of E-mail marketing? True

False

Question No: 8 ( Marks: 1 ) - Please choose one

Which of following services build a strong customer loyalty towards company andits products?

Customer services

Public relations(PR)

Page 4: IT430- E-Commerce (Session - 3) Final 2008

7/29/2019 IT430- E-Commerce (Session - 3) Final 2008

http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 4/16

Bulletin board

Exhibitions.

Reference: : page #136 handouts lecture #32 One major goal of CRM is to establish a long-lasting relationship between acompany and its customers. Good customer services can help in building a sense of loyalty towards companyand its products or services. Experts have pointed out five stages of loyalty ascustomer relationships develop over a period of time. One can find that theintensi ty of relationship increases as the customer moves through the first four stages. In the fifth stage a decline occurs and the relationship terminates.

Question No: 9 ( Marks: 1 ) - Please choose one

Track the customers online and do personalization is only possible through whichof the following file(s) analysis.

log files

cookie

data mining

log files and cookies.

Reference: : page #136 handouts lecture #32 You know that cookies allow e-commerce sites to record visitor behavior. Theycan be used to track customers online and do personalization. Many customers donot know that their information is being collected and used by the ebusiness site.Thus, informational privacy rights of customers can be breached in cases wherecookies are used.

Question No: 10 ( Marks: 1 ) - Please choose one

www.amzon.com as you all familiar with it.

Page 5: IT430- E-Commerce (Session - 3) Final 2008

7/29/2019 IT430- E-Commerce (Session - 3) Final 2008

http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 5/16

Which of the following loyalty stages its customers are: ( Who don t know about it): Detail about amzon.com )

"Amazon was one of the first major companies to sell goods by Internet, and wasan iconic "stock in which to invest" of the late 1990s dot-com bubble. Jeff Bezosfounded Amazon.com, Inc. in 1994, and launched it online in 1995. Amazon.comstarted as an on-line

bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3format, computer software, , etc. Amazon has established separate websitesin Canada, the United Kingdom, Germany, France, China, and Japan. It also

provides global shipping to certain countries for some of its products. " Awareness

Exploration

Familiarity

Commitment

Question No: 11 ( Marks: 1 ) - Please choose one

Which one is not included in the networking topologies? Star Topology

Bus Topology

Media Topology

Ring Topology Reference: : page #14handouts lecture #04

Topology of a LAN means its physical lay out. There are three main types of Network Topology, namely,

Bus Topology, Star Topology and Ring Topology as shown in Figures 1-3 below.There are two different approaches to networking – Server-based and Peer-to-Peer

Page 6: IT430- E-Commerce (Session - 3) Final 2008

7/29/2019 IT430- E-Commerce (Session - 3) Final 2008

http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 6/16

approach. In server-based approach there is a centralized server machine that canserve users‟ requests for the sharing of resources on a network. Contrarily, in peer-to-peer, the machines on the network have an equal capabilitywhich means that they can act both as a client and a server .

Question No: 12 ( Marks: 1 ) - Please choose one

Where in an HTML document is the correct place to refer to an external stylesheet?

At the end of the document

At the top of the document

In the <body> section

In the <head> section Reference: http://www.ex-designz.net/test_page.asp?tid=37 Question No: 13 ( Marks: 1 ) - Please choose one

Where does the massage in Alert function display?

Browser page

Popup window

Task bar

Menu bar

Reference: : page #57 handouts lecture #13 Note we can embed JavaScript code/instructions in the plain HTML code with the

help of <script> and </script> tags. In the above example „alert‟ is the function/method of a predefined

browser object that is, window object, and is used to create alert boxes or popup

Page 7: IT430- E-Commerce (Session - 3) Final 2008

7/29/2019 IT430- E-Commerce (Session - 3) Final 2008

http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 7/16

messages on the window. „//‟ is used in JavaScript to provide comments. Here, weuse „//‟so that old browsers that do not support JavaScript treat information withinthe Script tag as comments.

Question No: 14 ( Marks: 1 ) - Please choose one

An electronic check contains a(n) to the payer s bank to make a specified

payment to the payee Serial#

Private key

Instruction

All of the above

Reference: : page #113 handouts lecture #25 check contains an instruction to the payer‟s bank to make a specified payment to a

payee. Question No: 15 ( Marks: 1 ) - Please choose one

Television, radio and print media are in a (n) . Mode.

Passive

Active

Static

Dynamic

Reference: : page #139 handouts lecture #33

Emotional branding vs. rational branding In case of television, radio or print media people are normally in a passive mode. Question No: 16 ( Marks: 1 ) - Please choose one

Page 8: IT430- E-Commerce (Session - 3) Final 2008

7/29/2019 IT430- E-Commerce (Session - 3) Final 2008

http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 8/16

In many countries, stealing and misusing of meta information for gettingcompetitive advantage is considered as an offence known as Tort of Private Nuisance

Tort of Tress passing

Tort of passing off

Defamation

Reference: : page #138 handouts lecture #33 Meta information it actually is. In many countries, stealing andmisusing Meta information in this manner to gain business/competitive advantage

is considered as an offence known as the tort of passing-off.

Question No: 17 ( Marks: 1 ) - Please choose one ---------------

An array is .

a variable

an object

a method

a function

Question No: 18 ( Marks: 1 ) - Please choose one

Which SQL statement is used to delete data from a database? DELETE

COLLAPSE

Page 9: IT430- E-Commerce (Session - 3) Final 2008

7/29/2019 IT430- E-Commerce (Session - 3) Final 2008

http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 9/16

REMOVE

DISCARD

Reference: http://publib.boulder.ibm.com/infocenter/rtnlhelp/v6r0m0/index.jsp?topic=/com.ibm.etools.sqlbuilder.doc/topics/tdelete.html Question No: 19 ( Marks: 1 ) - Please choose one

Which of following is NOT an attribute of <AREA> tag? shape circle href coords Reference: : page #36 handouts lecture #08 <Map Name=“Testmap”> <Area shape=“Rect” coords=“0,0,199,99” href=“a.htm”> <Area

shape=“Rect” coords=“199,0,399,99” href=“b.htm”> <Area shape=“Rect” coords=“399,0,599,99” href=“c.htm”> </Map> Note that we use area tag within the <Map> tag, and use„shape‟, „coords‟ and „href‟ attributes of the area tag. „href‟ attribute specifies the file which would openon clicking the clickable area.

Question No: 20 ( Marks: 1 ) - Please choose one

A unique large number, generated as a result of applying hash function on amessage is called ________. Hash message

Message digest

Digitally singed message

Secret message

Reference: : page #103 handouts lecture #23

Page 10: IT430- E-Commerce (Session - 3) Final 2008

7/29/2019 IT430- E-Commerce (Session - 3) Final 2008

http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 10/16

There are two terms that you should note here – hash function and message digest.Hash function is a oneway mathematical function applied to a message. Result of the hash function is unique to each message called Message Digest. A messagedigest is a single large number typically between 128 to 256 bits in length. Thus, we can have up to 2256 different messages each having a unique messagedigest associated with it. This gives rise to almost an incalculable figure. We cansafely assume that each different message that can possibly be typed would have aunique message digest on applying a hash function. A hash function is said to beone way because we cannot go back to the original text on applying the hashfunction to a message digest. Basically, the concept of hash function and messagedigest is used to confirm the integrity of a message. Following is the example of ahash function that can be used in a code (no need to prepare it for exam)

Question No: 21 ( Marks: 1 ) - Please choose one

Which of the following payment mode does not require customer to payinterest to the bank on each transaction? Credit card

Debit card

Electronic check

All of the above

Reference: : page #110 handouts lecture #24 Note that in case of a credit card the issuer bank charges interest from the client ata specified rate on the amount lent. On the other hand, in case of a debit card nosuch interest is payable since the customer uses his/her own money in that case.

Question No: 22 ( Marks: 1 ) - Please choose one

The combination of encryption algorithms and authentication methods is called

__________. Cyber suite

Page 11: IT430- E-Commerce (Session - 3) Final 2008

7/29/2019 IT430- E-Commerce (Session - 3) Final 2008

http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 11/16

Cyclic suite

Circle suite

Cipher suite

Reference: : page #120 handouts lecture #28 SSL supports a variety of encryption algorithm and authentication methods. Thecombination of algorithms and methods is called a cipher suite.

Question No: 23 ( Marks: 1 ) - Please choose one

Which model allows the users to log-on on a website and assume the role of bidder or seller?

Online Banking.

Storefront Model.

E-Learning.

Auction Model.

Reference: : page #128 handouts lecture #29

Auction Model

In this model there are auction sites to which the users can log-on and assume therole of a bidder or seller. As a seller, one has to specify the minimum price to sell one‟s item (called reserve

price), the description of the item and the deadline to close the auction. At the endof the auction, the seller and the bidder are notified by the auction site and the

payment mechanism and delivery mode is worked out. Auction sites chargecommission on sales. Question No: 24 ( Marks: 1 ) - Please choose one

Dividing market, with respect to people having income level greater than Rs30000, is geographic segmentation. True.

Page 12: IT430- E-Commerce (Session - 3) Final 2008

7/29/2019 IT430- E-Commerce (Session - 3) Final 2008

http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 12/16

False.

Question No: 25 ( Marks: 1 ) - Please choose one

Which of the following is NOT an identified behavioral mode of customers on theweb? Browsers

Buyers

Shoppers

Seller

Reference: : page #132 handouts lecture #30 Behavioral segmentation Creation of separate experiences for customers based on their behavior is called

behavioral segmentation. Three identified behavioral modes of the customers on the web are: Browsers – customers who just browse through the site with no intention of buying Buyers – customers who are ready to buy right away Shoppers – customers who are motivated to buy but want more information An e-business site should devise right combination of marketing strategy to lurevisitors in different behavioral modes to become its customers.

Question No: 26 ( Marks: 1 ) - Please choose one

According to Michael Porter, material handling is an example of primary activityin a strategic business unit. Identify the area in which this task is performed.

Identify customers

Market and sell

Deliver activities relate to storage

Page 13: IT430- E-Commerce (Session - 3) Final 2008

7/29/2019 IT430- E-Commerce (Session - 3) Final 2008

http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 13/16

Purchase materials and supplies

Question No: 27 ( Marks: 1 ) - Please choose one

Which of these is NOT an advantage of e-banking? Get current account balances at any time.

Handle your finances from any location.

Get more money than your actual balance.

Transfer money between accounts.

Reference: : page #150 handouts lecture #36 Advantages of e-banking Get current account balances at any time Obtain credit card statements Pay utility bills Download account information Transfer money between accounts Send e-mail to your bank Manage your own schedule Handle your finances from any location Apply for loans online Question No: 28 ( Marks: 1 ) - Please choose one

Value Added Network (VAN) maintains two files of each customer that are ________. Inbox and Outbox

Postbox and Mailbox

Sendbox and Getbox

None of them

Page 14: IT430- E-Commerce (Session - 3) Final 2008

7/29/2019 IT430- E-Commerce (Session - 3) Final 2008

http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 14/16

Reference: : page #148 handouts lecture #36 Value Added Network (VAN) Value added networks are third party networks that provide services to executeauthorized transactions with valid trading partners using EDI. Each VAN has a centralized computer systemthat maintains two files for each user, that is, Postbox: where outgoing messages are placed, and Mailbox: where incoming messages can be picked up Question No: 29 ( Marks: 1 ) - Please choose one

Internet e-mail could be used as an alternative to EDI message transportmechanism.

True

False

Reference: : page #149 handouts lecture #36 Internet-Based EDI Internet can support EDI in a variety of ways. Internet e-mail can be used as EDImessage transport mechanism in place of having a VAN. An extranet can becreated with the trading partner allowing a partner to enter information in the fieldsof web forms which correspond to the fields of EDI message. Also, web-based EDI hosting service can be utilized through web-based EDIsoftware. However, a lot of work is still required to be done to make use of and

popularize internet-based EDI. Question No: 30 ( Marks: 1 ) - Please choose one

(UDRP) Stands for ------------------ Uniform Defamation Resolution Policy

Uniform Dispute Resolution Policy

Uniform Domain Resolution Policy

Page 15: IT430- E-Commerce (Session - 3) Final 2008

7/29/2019 IT430- E-Commerce (Session - 3) Final 2008

http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 15/16

None

Reference: : page #182 handouts lecture #45 International Corporation for Assigned Names and Numbers (ICAAN), whichsupervises the task of registration of domain names worldwide, has developed andimplemented a policy known as Uniform Dispute Resolution Policy (UDRP) for deciding domain name disputes.

Question No:31 ( Marks: 1 )

What stands for CRM?

Question No:32 ( Marks: 1 )

Identify customers is one of the areas in a strategic business unit accordingto Michael Porter. List what kind of activities is performed in this area?

Question No: 33 ( Marks: 2 )

What are data warehousing main tasks? Question No: 34 ( Marks: 2 )

What do you know about promotion by "Coupons"? Question No: 35 ( Marks: 3 )

What do you know about interactive advertisement? Briefly explain. Question No: 36 ( Marks: 3 )

What is e-business storefront model? Question No: 37 ( Marks: 3 )

How lack of trust barrier can be overcome or minimized? Discuss it briefly Question No: 38 ( Marks: 5 ) Describe the role of E-commerce in competitive strategies. Question No: 39 ( Marks: 5 )

Page 16: IT430- E-Commerce (Session - 3) Final 2008

7/29/2019 IT430- E-Commerce (Session - 3) Final 2008

http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 16/16

What is the importance of hash function and how it is applied on Messagedigest?(3+2) Question No: 40 ( Marks: 10 )

How the processes of selling, buying, marketing, front-end and back-endoperations can be integrated each other for creating an effective CRM.

Question No:41 ( Marks: 10 ) What steps you should adopt forprocess called knowledge discovery from database . Precisely

explain them? Order wise steps require. (2+2+1+1+2+1+1)