it430- e-commerce (session - 3) final 2008
TRANSCRIPT
7/29/2019 IT430- E-Commerce (Session - 3) Final 2008
http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 1/16
FINALTERM EXAMINATION Fall 2008
IT430- E-Commerce (Session - 1)
Question No: 1 ( Marks: 1 ) - Please choose one
Which one of the following is NOT recorded in log files at server side? IP addresses
Requested(url)
Date
Cookies
Reference: : page #136 handouts lecture #32 Log files consist of data generated by site visits and include information about eachvisitor‟s location, IP address, time of visit,frequency of visits etc. There are
businesses that provide the services of analyzing web log files. The results wouldshow how effective your web site is and indicate the top-referring web sites. Youknow that cookies allow e-commerce sites to record visitor behavior. They can beused to track customers online and do personalization. Many customers do notknow that their information is being collected and used by the ebusiness site. Thus,informational privacy rights of customers can be breached in cases where cookiesare used. Question No: 2 ( Marks: 1 ) - Please choose one
Key version represents public key by Buyer
Seller
E-Bank
Certification Authority
7/29/2019 IT430- E-Commerce (Session - 3) Final 2008
http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 2/16
Question No: 3 ( Marks: 1 ) - Please choose one
SET and SSL both are same with respect to security. True
False
Question No: 4 ( Marks: 1 ) - Please choose one
To overcome the lack of physical proximity appearance problem in e-business,which technology is going to be used Biometrics
Video conferencing
Cryptography
Biometrics and Video conferencing
Question No: 5 ( Marks: 1 ) - Please choose one
Web catalogue revenue model includes a. Online sellers of computer
b. Gifts, flowers, clothes
c. Journals
d. A and B
Reference: : page #130 handouts lecture #30 Web Catalogue Revenue Model Though the goal of an e-business can be to reduce cost or improve customer service, however, the primary aim of most e-commerce sites is to generate revenue
and earn profit. This is the most simple and common type of e-business model for generating revenue. This model would use electronic catalogue and shopping cart
providing access to customers throughout the world. Businesses using this type of
7/29/2019 IT430- E-Commerce (Session - 3) Final 2008
http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 3/16
a model include online sellers of computers, electronic items, books, music,videos, toys, flowers, gifts, clothes etc. Payment received from customers is thesource of earning revenue. Question No: 6 ( Marks: 1 ) - Please choose one
Advertising Supported Revenue Model includes Yahoo portal
Employment sites
Newspaper Publishers
All of the above
Reference: : page #130 handouts lecture #30 Advertising-Supported Revenue Model In this model service/information is provided free of any charge to certain audienceand the advertising revenue is sufficient to support the operation of the businessand its cost. For example, Yahoo portal provides useful information and a searchengine free of cost, but earns revenue through advertisements on its portal web siteto bear the operational cost.
Question No: 7 ( Marks: 1 ) - Please choose one
Do you think, vulms.vu.edu.pk is an example of E-mail marketing? True
False
Question No: 8 ( Marks: 1 ) - Please choose one
Which of following services build a strong customer loyalty towards company andits products?
Customer services
Public relations(PR)
7/29/2019 IT430- E-Commerce (Session - 3) Final 2008
http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 4/16
Bulletin board
Exhibitions.
Reference: : page #136 handouts lecture #32 One major goal of CRM is to establish a long-lasting relationship between acompany and its customers. Good customer services can help in building a sense of loyalty towards companyand its products or services. Experts have pointed out five stages of loyalty ascustomer relationships develop over a period of time. One can find that theintensi ty of relationship increases as the customer moves through the first four stages. In the fifth stage a decline occurs and the relationship terminates.
Question No: 9 ( Marks: 1 ) - Please choose one
Track the customers online and do personalization is only possible through whichof the following file(s) analysis.
log files
cookie
data mining
log files and cookies.
Reference: : page #136 handouts lecture #32 You know that cookies allow e-commerce sites to record visitor behavior. Theycan be used to track customers online and do personalization. Many customers donot know that their information is being collected and used by the ebusiness site.Thus, informational privacy rights of customers can be breached in cases wherecookies are used.
Question No: 10 ( Marks: 1 ) - Please choose one
www.amzon.com as you all familiar with it.
7/29/2019 IT430- E-Commerce (Session - 3) Final 2008
http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 5/16
Which of the following loyalty stages its customers are: ( Who don t know about it): Detail about amzon.com )
"Amazon was one of the first major companies to sell goods by Internet, and wasan iconic "stock in which to invest" of the late 1990s dot-com bubble. Jeff Bezosfounded Amazon.com, Inc. in 1994, and launched it online in 1995. Amazon.comstarted as an on-line
bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3format, computer software, , etc. Amazon has established separate websitesin Canada, the United Kingdom, Germany, France, China, and Japan. It also
provides global shipping to certain countries for some of its products. " Awareness
Exploration
Familiarity
Commitment
Question No: 11 ( Marks: 1 ) - Please choose one
Which one is not included in the networking topologies? Star Topology
Bus Topology
Media Topology
Ring Topology Reference: : page #14handouts lecture #04
Topology of a LAN means its physical lay out. There are three main types of Network Topology, namely,
Bus Topology, Star Topology and Ring Topology as shown in Figures 1-3 below.There are two different approaches to networking – Server-based and Peer-to-Peer
7/29/2019 IT430- E-Commerce (Session - 3) Final 2008
http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 6/16
approach. In server-based approach there is a centralized server machine that canserve users‟ requests for the sharing of resources on a network. Contrarily, in peer-to-peer, the machines on the network have an equal capabilitywhich means that they can act both as a client and a server .
Question No: 12 ( Marks: 1 ) - Please choose one
Where in an HTML document is the correct place to refer to an external stylesheet?
At the end of the document
At the top of the document
In the <body> section
In the <head> section Reference: http://www.ex-designz.net/test_page.asp?tid=37 Question No: 13 ( Marks: 1 ) - Please choose one
Where does the massage in Alert function display?
Browser page
Popup window
Task bar
Menu bar
Reference: : page #57 handouts lecture #13 Note we can embed JavaScript code/instructions in the plain HTML code with the
help of <script> and </script> tags. In the above example „alert‟ is the function/method of a predefined
browser object that is, window object, and is used to create alert boxes or popup
7/29/2019 IT430- E-Commerce (Session - 3) Final 2008
http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 7/16
messages on the window. „//‟ is used in JavaScript to provide comments. Here, weuse „//‟so that old browsers that do not support JavaScript treat information withinthe Script tag as comments.
Question No: 14 ( Marks: 1 ) - Please choose one
An electronic check contains a(n) to the payer s bank to make a specified
payment to the payee Serial#
Private key
Instruction
All of the above
Reference: : page #113 handouts lecture #25 check contains an instruction to the payer‟s bank to make a specified payment to a
payee. Question No: 15 ( Marks: 1 ) - Please choose one
Television, radio and print media are in a (n) . Mode.
Passive
Active
Static
Dynamic
Reference: : page #139 handouts lecture #33
Emotional branding vs. rational branding In case of television, radio or print media people are normally in a passive mode. Question No: 16 ( Marks: 1 ) - Please choose one
7/29/2019 IT430- E-Commerce (Session - 3) Final 2008
http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 8/16
In many countries, stealing and misusing of meta information for gettingcompetitive advantage is considered as an offence known as Tort of Private Nuisance
Tort of Tress passing
Tort of passing off
Defamation
Reference: : page #138 handouts lecture #33 Meta information it actually is. In many countries, stealing andmisusing Meta information in this manner to gain business/competitive advantage
is considered as an offence known as the tort of passing-off.
Question No: 17 ( Marks: 1 ) - Please choose one ---------------
An array is .
a variable
an object
a method
a function
Question No: 18 ( Marks: 1 ) - Please choose one
Which SQL statement is used to delete data from a database? DELETE
COLLAPSE
7/29/2019 IT430- E-Commerce (Session - 3) Final 2008
http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 9/16
REMOVE
DISCARD
Reference: http://publib.boulder.ibm.com/infocenter/rtnlhelp/v6r0m0/index.jsp?topic=/com.ibm.etools.sqlbuilder.doc/topics/tdelete.html Question No: 19 ( Marks: 1 ) - Please choose one
Which of following is NOT an attribute of <AREA> tag? shape circle href coords Reference: : page #36 handouts lecture #08 <Map Name=“Testmap”> <Area shape=“Rect” coords=“0,0,199,99” href=“a.htm”> <Area
shape=“Rect” coords=“199,0,399,99” href=“b.htm”> <Area shape=“Rect” coords=“399,0,599,99” href=“c.htm”> </Map> Note that we use area tag within the <Map> tag, and use„shape‟, „coords‟ and „href‟ attributes of the area tag. „href‟ attribute specifies the file which would openon clicking the clickable area.
Question No: 20 ( Marks: 1 ) - Please choose one
A unique large number, generated as a result of applying hash function on amessage is called ________. Hash message
Message digest
Digitally singed message
Secret message
Reference: : page #103 handouts lecture #23
7/29/2019 IT430- E-Commerce (Session - 3) Final 2008
http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 10/16
There are two terms that you should note here – hash function and message digest.Hash function is a oneway mathematical function applied to a message. Result of the hash function is unique to each message called Message Digest. A messagedigest is a single large number typically between 128 to 256 bits in length. Thus, we can have up to 2256 different messages each having a unique messagedigest associated with it. This gives rise to almost an incalculable figure. We cansafely assume that each different message that can possibly be typed would have aunique message digest on applying a hash function. A hash function is said to beone way because we cannot go back to the original text on applying the hashfunction to a message digest. Basically, the concept of hash function and messagedigest is used to confirm the integrity of a message. Following is the example of ahash function that can be used in a code (no need to prepare it for exam)
Question No: 21 ( Marks: 1 ) - Please choose one
Which of the following payment mode does not require customer to payinterest to the bank on each transaction? Credit card
Debit card
Electronic check
All of the above
Reference: : page #110 handouts lecture #24 Note that in case of a credit card the issuer bank charges interest from the client ata specified rate on the amount lent. On the other hand, in case of a debit card nosuch interest is payable since the customer uses his/her own money in that case.
Question No: 22 ( Marks: 1 ) - Please choose one
The combination of encryption algorithms and authentication methods is called
__________. Cyber suite
7/29/2019 IT430- E-Commerce (Session - 3) Final 2008
http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 11/16
Cyclic suite
Circle suite
Cipher suite
Reference: : page #120 handouts lecture #28 SSL supports a variety of encryption algorithm and authentication methods. Thecombination of algorithms and methods is called a cipher suite.
Question No: 23 ( Marks: 1 ) - Please choose one
Which model allows the users to log-on on a website and assume the role of bidder or seller?
Online Banking.
Storefront Model.
E-Learning.
Auction Model.
Reference: : page #128 handouts lecture #29
Auction Model
In this model there are auction sites to which the users can log-on and assume therole of a bidder or seller. As a seller, one has to specify the minimum price to sell one‟s item (called reserve
price), the description of the item and the deadline to close the auction. At the endof the auction, the seller and the bidder are notified by the auction site and the
payment mechanism and delivery mode is worked out. Auction sites chargecommission on sales. Question No: 24 ( Marks: 1 ) - Please choose one
Dividing market, with respect to people having income level greater than Rs30000, is geographic segmentation. True.
7/29/2019 IT430- E-Commerce (Session - 3) Final 2008
http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 12/16
False.
Question No: 25 ( Marks: 1 ) - Please choose one
Which of the following is NOT an identified behavioral mode of customers on theweb? Browsers
Buyers
Shoppers
Seller
Reference: : page #132 handouts lecture #30 Behavioral segmentation Creation of separate experiences for customers based on their behavior is called
behavioral segmentation. Three identified behavioral modes of the customers on the web are: Browsers – customers who just browse through the site with no intention of buying Buyers – customers who are ready to buy right away Shoppers – customers who are motivated to buy but want more information An e-business site should devise right combination of marketing strategy to lurevisitors in different behavioral modes to become its customers.
Question No: 26 ( Marks: 1 ) - Please choose one
According to Michael Porter, material handling is an example of primary activityin a strategic business unit. Identify the area in which this task is performed.
Identify customers
Market and sell
Deliver activities relate to storage
7/29/2019 IT430- E-Commerce (Session - 3) Final 2008
http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 13/16
Purchase materials and supplies
Question No: 27 ( Marks: 1 ) - Please choose one
Which of these is NOT an advantage of e-banking? Get current account balances at any time.
Handle your finances from any location.
Get more money than your actual balance.
Transfer money between accounts.
Reference: : page #150 handouts lecture #36 Advantages of e-banking Get current account balances at any time Obtain credit card statements Pay utility bills Download account information Transfer money between accounts Send e-mail to your bank Manage your own schedule Handle your finances from any location Apply for loans online Question No: 28 ( Marks: 1 ) - Please choose one
Value Added Network (VAN) maintains two files of each customer that are ________. Inbox and Outbox
Postbox and Mailbox
Sendbox and Getbox
None of them
7/29/2019 IT430- E-Commerce (Session - 3) Final 2008
http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 14/16
Reference: : page #148 handouts lecture #36 Value Added Network (VAN) Value added networks are third party networks that provide services to executeauthorized transactions with valid trading partners using EDI. Each VAN has a centralized computer systemthat maintains two files for each user, that is, Postbox: where outgoing messages are placed, and Mailbox: where incoming messages can be picked up Question No: 29 ( Marks: 1 ) - Please choose one
Internet e-mail could be used as an alternative to EDI message transportmechanism.
True
False
Reference: : page #149 handouts lecture #36 Internet-Based EDI Internet can support EDI in a variety of ways. Internet e-mail can be used as EDImessage transport mechanism in place of having a VAN. An extranet can becreated with the trading partner allowing a partner to enter information in the fieldsof web forms which correspond to the fields of EDI message. Also, web-based EDI hosting service can be utilized through web-based EDIsoftware. However, a lot of work is still required to be done to make use of and
popularize internet-based EDI. Question No: 30 ( Marks: 1 ) - Please choose one
(UDRP) Stands for ------------------ Uniform Defamation Resolution Policy
Uniform Dispute Resolution Policy
Uniform Domain Resolution Policy
7/29/2019 IT430- E-Commerce (Session - 3) Final 2008
http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 15/16
None
Reference: : page #182 handouts lecture #45 International Corporation for Assigned Names and Numbers (ICAAN), whichsupervises the task of registration of domain names worldwide, has developed andimplemented a policy known as Uniform Dispute Resolution Policy (UDRP) for deciding domain name disputes.
Question No:31 ( Marks: 1 )
What stands for CRM?
Question No:32 ( Marks: 1 )
Identify customers is one of the areas in a strategic business unit accordingto Michael Porter. List what kind of activities is performed in this area?
Question No: 33 ( Marks: 2 )
What are data warehousing main tasks? Question No: 34 ( Marks: 2 )
What do you know about promotion by "Coupons"? Question No: 35 ( Marks: 3 )
What do you know about interactive advertisement? Briefly explain. Question No: 36 ( Marks: 3 )
What is e-business storefront model? Question No: 37 ( Marks: 3 )
How lack of trust barrier can be overcome or minimized? Discuss it briefly Question No: 38 ( Marks: 5 ) Describe the role of E-commerce in competitive strategies. Question No: 39 ( Marks: 5 )
7/29/2019 IT430- E-Commerce (Session - 3) Final 2008
http://slidepdf.com/reader/full/it430-e-commerce-session-3-final-2008 16/16
What is the importance of hash function and how it is applied on Messagedigest?(3+2) Question No: 40 ( Marks: 10 )
How the processes of selling, buying, marketing, front-end and back-endoperations can be integrated each other for creating an effective CRM.
Question No:41 ( Marks: 10 ) What steps you should adopt forprocess called knowledge discovery from database . Precisely
explain them? Order wise steps require. (2+2+1+1+2+1+1)