Beruflich Dokumente
Kultur Dokumente
Semester 5
Paper Code : BKID-B1186-BT8902
Paper Name : E-Commerce
Question
Number
Question Statement
1 marks question ( Question 1 to 40)
"A system where goods or services are directly exchanged for other goods or services without a
common unit of exchange" is called as ___________
a. EFT
b. Transaction
c. E-commerce system
d. Barter System
In Electronic Commerce Systems ___________is the collection of steps that a company takes to
transform raw components into the final product
a. Interactive marketing
b. Supply chain
c. Online point of sale
d. Product data exchange
Identify the types of man power for any organization which involves in E Commerce related
activities are
a. Technical Staff
b. Operational Managers
c. Executive
d. All of the above
___________ is a text file containing information of users preference and maintains state
information of HTTP requests and responses
a. Web browser
b. HTTP
c. Cookie
d. None of the above
10
11
____________ is a repository of information spread all over the world and linked together
a. Portal
b. ISP
c. World Wide Web
d. Website
12
13
___________ is a type of transmission where only one device can send signal and the other device
can only receive the signal
a. Duplex
b. Simplex
c. Half duplex
d. Full duplex
14
________ is network protocol used on the Internet or local area network connections
a. TCP/IP
b. HTTP
c. Telnet
d. UDP
15
In OSI model __________ layer is responsible for source to destination (end to end) delivery of the
entire message
a. Transport
b. Data link
c. Network
d. Physical
16
____________ specification is used to define the standard style sheet language for XML
a. XML Pointer Language (X Pointer)
b. Extensible Markup Language (XML) 1.0
c. Extensible Style Language (XSL)
d. XML Linking Language (X Link)
17
18
___________helps businesses to convert raw information into a useful analytical tool for business
decision making
a. HTML
b. XML
c. Data warehouse
d. Metadata
19
20
Number of individual, authenticated user sessions, Authenticated user sessions by location and
Authenticated user profiles by region are few examples of ________ metrics
a. Visitation
b. Direct
c. Indirect
d. None of the above
21
______ are the professionals who spend a good deal of time online, mainly at their places of
business
a. Cyber surfers
b. Cyber consumers
c. Cyber buyers
d. All of the above
22
________ replaces a document or an application with its own code and then uses that code position
itself
a. Logic Bomb
b. Trojan Horse
c. Worm
d. Firewall
23
__________is a system or group of systems that enforces a security policy between an organizations
network and the internet
a. Firewall
b. Protocol
c. DoS
b. Trojan Horse
24
________is a small program that inserts itself into other program files that then become "infected"
a. Worm
b. Logic Bomb
c. Virus
d. DoS attack
25
26
A bank enables its customers to access their account information and perform certain bank
transactions using a personal computer and a modem is called as ___________
a. Online Transaction Banking
b. Net Banking
c. PC Banking
d. None of the above
27
__________ is an encryption technology on the server that scrabbles important data such as credit
card numbers and order information when it is being stored or passed from one computer to another
a. Cipher
b. Secure Socket Layer
c. Server
d. None of the above
28
_______ is an interactive computer based systems which help decision makers utilize data and
models to solve unstructured problems
a. Decision support systems
b. Business logic and rules repository
c. Campaign management
b. None of the above
29
30
_____________a fusion of a series of functions, skills, processes and technologies, which together
allows companies to be more profitably manage customers as tangible assets
a. Business
b. E-commerce
c. Customer relationship management
d. Security Management
31
32
33
a. Supplier
b. Customer
c. Business
d. Logistics
34
35
36
37
38
________is a group of application programs that allows an organization to share documents and
exchange emails
a. Lotus Domino
b. EPS systems
c. Intranet
d. Lotus notes
39
___________is a nationwide funds transfer system that aims to facilitate transfer of funds from any
bank branch to any other bank branch
a. EFT
b. Pay pal
c. NEFT
d. None of the above
40
42
43
Differentiate the products listed below can be delivered via physically delivery mode or virtual
delivery mode
44
45
46
47
48
a. HDSL, ASDL
b. ADSL, SDSL
c. ISDN, SDSL
d. ADSL, ISDN
49
In OSI model __________ , ___________ and __________ are the responsibilities of the
Presentation Layer
a. Translation, Encryption and Decryption
b. Synchronization, Encryption and Translation
c. Translation, Encryption and Compression
d. Synchronization, Encryption and Compression
50
A _________is a single logical path between the source and the destination that is associated with all
________ in a message
a. Connection, streams
b. Connection, Packets
c. Layer, nodes
d. Connection, headers
51
X/Secure provides ___________and ______for the safety of the data to be transmitted world wide
52
53
54
55
The modern payment card system is an excellent example of _________, ____________ growth
a. Scientific, User-driven
b. Organic, Socially-driven
c. Organic, User-driven
d. Friendly, Customer-driven
56
57
58
59
60
62
63
64
65
66
2. Full duplex
3. Half duplex
Part B
A. Two devices can send and receive, but the transmission cannot take place simultaneously
B. Only one device can send and the other device can only receive
C. Two devices can send and receive simultaneously
a. 1A, 2C, 3B
b. 1B, 2A, 3C
c. 1B, 2C, 3A
d. 1C, 2B, 3A
67
68
69
C. Worm
Part B
1. It appears to do something useful or entertaining but actually destroys files
2. Is a virus whose attack is triggered by some event such as the date on a computers system clock
3. It replaces a document or an application with its own code and then uses that code position itself
a. A2, B3, C1
b. A2, B1, C3
c. A3, B2, C1
d. A1, B3, C2
70
71
Identify the Tools and technologies involved in the Customer's Information Repository
A. Date extraction tools
B. Cleansing tools
C. Relational database
D. House holding software
E. Data Loading tools
a. A, B, C, D, E
b. B, C, D, E
c. A, B, C, D
d. A, C, D, E
72
73
74
75
Part B
1. Online Auction
2. Paisa Pay
3. Fixed Price
4. Demand Draft
a. A2, A3, B1, B4
b. A1, A3, B2, B4
c. A3, A4, B1, B2
d. A1, A4, B2, B3