FINALTERM EXAMINATION
Fall 2009
IT430- E-Commerce
Question No: 1 ( Marks: 1 ) - Please choose one
At deposit stage, the serial number is ……………..by E-Cashbank
► Known
► Unknown
► Kept Secret
► Informed
Reference:
(Page # 118)
Question No: 2 ( Marks: 1 ) - Please choose one
How many kinds of Web Portals are?
► 3
► 2
► 5
► 6
Explanation:
There are only two kinds of web portals, one is vertical portals which provides information about single interest like online shopping sites are best example of vertical portal site, educational site is also an example of vertical portal. Second kind of web portal is horizontal web portals which provide information about everything or multiple things. Search engine is best example of horizontal web portal.
Reference:
(page # 129)
Question No: 3 ( Marks: 1 ) - Please choose one
Let us, suppose that you have hosted your e-commerce website,
When you provide “opt-in e-mail” option to your customers on your website and customer opt for it , what does it mean to receive ?
► Information about product through advertisement
► Information about product through e-mail
► Information about services available on it
► Information about News through e-mail.
Reference:
(page # 133)
Question No: 4 ( Marks: 1 ) - Please choose one
Track the customers online and do personalization is only possible through which of the following file(s) analysis.
► log files
► cookie
► data mining
► log files and cookies.
Reference:
(page # 136)
Question No: 5 ( Marks: 1 ) - Please choose one
When customer life cycle is used to create different groups of customers, it is called?
► Targeting Customers
► Dynamic groups
► Customer Life Cycle Segmentation
► Group Development
Reference:
(page # 137)
Question No: 6 ( Marks: 1 ) - Please choose one
Network addresses 128--- 191 range belongs to which of the following class networks?
► A
► B
► C
► E
Reference:
(page # 10)
Question No: 7 ( Marks: 1 ) - Please choose one
Which one of following illustrates relationship between "" and // ?
► Closely related
► Hide the code
► Different
► Hide the tags
Question No: 8 ( Marks: 1 ) - Please choose one
Which of the following property falls in HTTP?
► Stateless
► Stateful
► Temporary
► All of these
Reference:
(page # 3)
Question No: 9 ( Marks: 1 ) - Please choose one
FSTC stands for:
► Financial Services Technology Consortium
► Financial Secrets Technology Consortium
► Final Security threats control
► First Service Technology Consortium
Reference:
(page # 113)
Question No: 10 ( Marks: 1 ) - Please choose one
Supply chain can be broken into three parts, that is ----------------- , ----------------------- and -------------------- activities.
► Internal, external support
► Upstream, internal ,downstream
► Primary, Secondary ,R&D
► None of them
Reference:
(page # 155)
Question No: 11 ( Marks: 1 ) - Please choose one
The process of taking active role in working with suppliers to improve products and processes is called?
► Value chain management
► Supply chain management
► Supply chain management software
► Porter Model
Reference:
(page # 155)
Question No: 12 ( Marks: 1 ) - Please choose one
What is Ultimate consumer orientation?
► Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain.
► Secondary Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain.
► Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of supply chain.
► None of them
Reference:
(page # 156)
Question No: 13 ( Marks: 1 ) - Please choose one
Many search engines rank the site by using a program called
► Spider
► Scorpion
► Moon
► Cobweb
Reference:
(page # 138)
Question No: 14 ( Marks: 1 ) - Please choose one
E-commerce is a combination of three different areas of study, namely, --------,
---------------- and ----------------
► Internal, external support, Support
► Technology, business and law/policy
► Primary, Secondary, R&D
► Sale, purchase, feed back
Reference:
(page # 161)
Question No: 15 ( Marks: 1 ) - Please choose one
In which type of data mining, Apriori algorithms is used?
► Classification
► Association
► Characterization
► Clustering
Reference:
(page # 143)
Question No: 16 ( Marks: 1 ) - Please choose one
EDI has the key feature(s)
► No paper work
► No human intervention
► Exchange of information takes place in seconds
► All of these
Reference:
(page # 147)
Question No: 17 ( Marks: 1 ) - Please choose one
Addresses are tied to the device itself and give no clue to it's location on a global scale. This is the characteristics of
► IP
► RIP
► MAC
► None of the given
Question No: 18 ( Marks: 1 ) - Please choose one
When two or more intranets are connected to each other they form a/an ------------- .
► intranet
► internet
► extranet
► VPN
Reference:
(page # 2)
Question No: 19 ( Marks: 1 ) - Please choose one
Which attribute can be used to make a region non-clickable?
► none of the given
► target
► alt
► nohref
Reference:
(page # 37)
Question No: 20 ( Marks: 1 ) - Please choose one
Which of the following payment mode does not require customer to pay interest to the bank on each transaction?
► Credit card
► Debit card
► Electronic check
► All of the above
Reference:
(page # 110)
Question No: 21 ( Marks: 1 ) - Please choose one
Cyber wallet can automatically assemble the correct payment and pay it too.
► True
► False
Question No: 22 ( Marks: 1 ) - Please choose one
SET doesn’t require special software on the client or merchant side.
► True
► False
Question No: 23 ( Marks: 1 ) - Please choose one
Which model allows the users to log-on on a website and assume the role of bidder or seller?
► Online Banking.
► Storefront Model.
► E-Learning.
► Auction Model.
Question No: 24 ( Marks: 1 ) - Please choose one
According to Michael Porter, “fabricating” is an example of primary activity in a strategic business unit. Identify the area in which this task is performed.
► Market and sell
► Deliver’ activities relate to storage
► Purchase materials and supplies
► Manufacture product or create service
Question No: 25 ( Marks: 1 ) - Please choose one
Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Is it?
► True
► False
Question No: 26 ( Marks: 1 ) - Please choose one
In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, ---------------- and ----------
► Acceptance and consideration
► Acceptance and Rejection
► Approval and consideration
► None
Question No: 27 ( Marks: 1 ) - Please choose one
In online environment acceptances may be issued by an imposter/cheater that has authority to bind the online business
► True
► False
Question No: 28 ( Marks: 1 ) - Please choose one
#00ff00 in HTML indicates
► Pure green color
► Pure blue color
► Pure red color
► Pure yellow color
Question No: 29 ( Marks: 1 ) - Please choose one
Virtual PIN Payment System requires both merchant and buyer to register with _______________.
► Auto Clearing House (ACH)
► First Virtual (FV)
► DSS (Digital Signature Standard)
► DES (Data Encryption Standard)
Reference:
(Page # 110)
Question No: 30 ( Marks: 1 ) - Please choose one
Classification and Association belong to which of the following types of Data Mining?
► Selective
► Predictive
► Descriptive
► Additive
Question No: 31 ( Marks: 1 )
What should be the length range in bits of a message digest?
A message digest is a single large number typically between 128 to 256 bits in length.
Question No: 32 ( Marks: 1 )
Just write down the name of Elements of Branding?
Differentiation
Relevance
Perceived Value
Question No: 33 ( Marks: 2 )
What is civil law? Give precise answer.
Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Civil wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general. On the other hand, a criminal wrong (crime) is an act deemed by law to be harmful to the society in general such as theft or murder etc. and the state itself is a party in such matters.
Question No: 34 ( Marks: 2 )
What do we mean by “Affiliation” between two parties? Explain shortly.
Question No: 35 ( Marks: 3 )
What is concept of “fair use” in copyright law?
There is a concept of ‘fair use’ or ‘fair dealing’ in copyright law that provides legitimate exceptions to copyright violation. Generally, fair use of a copyrighted work includes copying it for use in criticism, comment, news reporting, teaching, scholarship or research. Experts draw support from this concept of ‘fair use’ to deal with the problem of copyright over the internet. It is also argued that in cases where the author of a work has himself provided a hyperlink leading to his work, he should be regarded as giving the
implied authority or license to download or make copies of his work. In such an eventuality, the issue of copyright should not arise according to an opinion.
Question No: 36 ( Marks: 3 )
Digital signatures are considered more reliable than paper signatures. Do you agree with this statement? Briefly justify your answer. 1+2
Question No: 37 ( Marks: 3 )
What is ERP? Briefly explain its use in an organization? (1 + 2)
ERP is an approach that attempts to integrate all departments and functions across a company onto a single computer system that can serve all those different departments' particular needs. For example, finance, manufacturing and the warehouse department of a company may have their own software to perform tasks specific to each one of them. However, each software can be linked together so that a customer service representative can see the credit rating of a customer from finance module, warehouse information from
warehouse module, and shipment information from the shipment module. SAP is an example of ERP software. ERP is complex. It is not intended for public consumption as proper integration of ERP with ecommerce applications is still a major problem.
Question No: 38 ( Marks: 5 )
What do you perceive by Value Added Network? Explain its advantages too with reference to EDI. (2+3)
Value added networks are third party networks that provide services to execute authorized transactions with valid trading partners using EDI. Each VAN has a centralized computer system that maintains two files for each user, that is,
Postbox: where outgoing messages are placed, and
Mailbox: where incoming messages can be picked up
Advantages:
Two big advantages of using a VAN in EDI are time independence and protocol independence. Time independence means that the sending and receipt of the interchange or messages can be carried out at the convenience of the users involved. Thus, they are not required to be connected with each other at the same time. Protocol independence means that interchanges are re-enveloped with the transmission protocol appropriate to the recipient when they are retrieved from the postbox by the VAN. Thus, a VAN can provide protocol compatibility between the sender and the recipient, wherever that is missing.
Question No: 39 ( Marks: 5 )
What is ACH? What is its role in Virtual PIN system? 2+3
ACH stands for Automated Clearing House.A house through which the bank of payee clears the check with the help of traditional automated clearing house.
Role of ACH in Virtual PIN System:
A deposit request encrypted with bank’s public key accompanies the payment information. E-cash bank maintains a database of spent coins. On receipt it checks whether the coin is valid and whether it has already been spent or not (to prevent double spending) by referring to its database. If the coins are valid the bank credits the merchant’s account. Thus, if the client has sent valid coins worth $10 for payment to the merchant, and the merchant already has $90 in his account then an amount of $ 10 would be added in his account making it $ 100. Later, the merchant can request the e-cash bank to transfer this amount in his account with the acquirer bank. This can be done through ACH and the merchant can physically withdraw the money form the acquirer bank.
Question No: 40 ( Marks: 10 )
What is data warehousing? What are its main tasks? What is its importance for an organization?
The primary concept behind data warehousing is that the data stored for business analysis can most effectively be accessed by separating it from the data in the operational systems. A data warehouse, therefore, is a collection of data gathered from one or more data repositories to create a new, central database. For example a hospital may create a data warehouse by extracting the operational data it has accumulated concerning patient information, lab results, drug use, length of stay, disease state, etc,. Data Warehousing is not just the data in the warehouse, but also the architecture and tools to collect, query, analyze and present information.
Question No: 41 ( Marks: 10 )
Precisely explain the steps of “Knowledge discovery from database” in order of their occurrence.
ANS: Knowledge discovery process include Data cleaning, Data selection, Data transformation, Data Mining, Data integration, Pattern evaluation & knowledge presentation.
Answer: Knowledge discovery process include Data cleaning, Data selection, Data transformation, Data Mining, Data integration, Pattern evaluation & knowledge presentation.
Explaination of each step:
1-Data cleaning
Data cleaning means that missing values should be provided in different fields/columns wherever needed and any impossible or erroneous values should be substituted by correct/reasonable ones. For example if the age of a person is typed as 1000 years in the column ‘age’ then an average age value can be put in its place.
2-Data selection
Where there are quite a few erroneous or missing values in a row, then that row can be discarded/deleted altogether. This process is called data selection.
3-Data transformation
In data transformation, the data from all different sources is converted into the same format. For example, date typed under a column should be in the same format in the entire data collected through different sources.
4-Data integration
In data integration, data from all the sources is assembled or integrated into one and housed in the data warehouse.
5-Data Mining
Now, this cleaned, transformed, selected and integrated data is fed to the data mining tool from a data warehouse for data mining purpose.
6-Pattern evaluation & knowledge presentation
The results/ patterns are evaluated by managers and useful knowledge is thus gained. Note that almost 80% of the total time used in a knowledge discovery process is spent on just making the data fit for mining, that is, data cleaning, data transformation, data selection etc.
No comments:
Post a Comment