Monday, March 1, 2010

IT430- E-Commerce FINALTERM EXAMINATION Fall 2009

FINALTERM EXAMINATION

Fall 2009

IT430- E-Commerce

Question No: 1 ( Marks: 1 ) - Please choose one

At deposit stage, the serial number is ……………..by E-Cashbank

Known

Unknown

Kept Secret

Informed

Reference:

(Page # 118)

Question No: 2 ( Marks: 1 ) - Please choose one

How many kinds of Web Portals are?

3

2

5

6

Explanation:

There are only two kinds of web portals, one is vertical portals which provides information about single interest like online shopping sites are best example of vertical portal site, educational site is also an example of vertical portal. Second kind of web portal is horizontal web portals which provide information about everything or multiple things. Search engine is best example of horizontal web portal.

Reference:

(page # 129)



Question No: 3 ( Marks: 1 ) - Please choose one

Let us, suppose that you have hosted your e-commerce website,

When you provide “opt-in e-mail” option to your customers on your website and customer opt for it , what does it mean to receive ?

Information about product through advertisement

Information about product through e-mail

Information about services available on it

Information about News through e-mail.

Reference:

(page # 133)



Question No: 4 ( Marks: 1 ) - Please choose one

Track the customers online and do personalization is only possible through which of the following file(s) analysis.

log files

cookie

data mining

log files and cookies.

Reference:

(page # 136)



Question No: 5 ( Marks: 1 ) - Please choose one

When customer life cycle is used to create different groups of customers, it is called?

Targeting Customers

Dynamic groups

Customer Life Cycle Segmentation

Group Development

Reference:

(page # 137)



Question No: 6 ( Marks: 1 ) - Please choose one

Network addresses 128--- 191 range belongs to which of the following class networks?

A

B

C

E


Reference:

(page # 10)

Question No: 7 ( Marks: 1 ) - Please choose one

Which one of following illustrates relationship between "" and // ?

Closely related

Hide the code

Different

Hide the tags



Question No: 8 ( Marks: 1 ) - Please choose one

Which of the following property falls in HTTP?

Stateless

Stateful

Temporary

All of these

Reference:

(page # 3)



Question No: 9 ( Marks: 1 ) - Please choose one

FSTC stands for:

Financial Services Technology Consortium

Financial Secrets Technology Consortium

Final Security threats control

First Service Technology Consortium

Reference:

(page # 113)



Question No: 10 ( Marks: 1 ) - Please choose one

Supply chain can be broken into three parts, that is ----------------- , ----------------------- and -------------------- activities.

Internal, external support

Upstream, internal ,downstream

Primary, Secondary ,R&D

None of them

Reference:

(page # 155)



Question No: 11 ( Marks: 1 ) - Please choose one

The process of taking active role in working with suppliers to improve products and processes is called?

Value chain management

Supply chain management

Supply chain management software

Porter Model

Reference:

(page # 155)



Question No: 12 ( Marks: 1 ) - Please choose one

What is Ultimate consumer orientation?

Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain.

Secondary Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain.

Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of supply chain.

None of them

Reference:

(page # 156)



Question No: 13 ( Marks: 1 ) - Please choose one

Many search engines rank the site by using a program called

Spider

Scorpion

Moon

Cobweb

Reference:

(page # 138)



Question No: 14 ( Marks: 1 ) - Please choose one

E-commerce is a combination of three different areas of study, namely, --------,

---------------- and ----------------

Internal, external support, Support

Technology, business and law/policy

Primary, Secondary, R&D

Sale, purchase, feed back

Reference:

(page # 161)



Question No: 15 ( Marks: 1 ) - Please choose one

In which type of data mining, Apriori algorithms is used?

Classification

Association

Characterization

Clustering


Reference:

(page # 143)

Question No: 16 ( Marks: 1 ) - Please choose one

EDI has the key feature(s)

No paper work

No human intervention

Exchange of information takes place in seconds

All of these



Reference:

(page # 147)

Question No: 17 ( Marks: 1 ) - Please choose one

Addresses are tied to the device itself and give no clue to it's location on a global scale. This is the characteristics of

IP

RIP

MAC

None of the given



Question No: 18 ( Marks: 1 ) - Please choose one

When two or more intranets are connected to each other they form a/an ------------- .

intranet

internet

extranet

VPN


Reference:

(page # 2)

Question No: 19 ( Marks: 1 ) - Please choose one

Which attribute can be used to make a region non-clickable?

none of the given

target

alt

nohref


Reference:

(page # 37)

Question No: 20 ( Marks: 1 ) - Please choose one

Which of the following payment mode does not require customer to pay interest to the bank on each transaction?

Credit card

Debit card

Electronic check

All of the above


Reference:

(page # 110)

Question No: 21 ( Marks: 1 ) - Please choose one

Cyber wallet can automatically assemble the correct payment and pay it too.

True

False



Question No: 22 ( Marks: 1 ) - Please choose one

SET doesn’t require special software on the client or merchant side.

True

False



Question No: 23 ( Marks: 1 ) - Please choose one

Which model allows the users to log-on on a website and assume the role of bidder or seller?

Online Banking.

Storefront Model.

E-Learning.

Auction Model.



Question No: 24 ( Marks: 1 ) - Please choose one

According to Michael Porter, “fabricating” is an example of primary activity in a strategic business unit. Identify the area in which this task is performed.

Market and sell

Deliver’ activities relate to storage

Purchase materials and supplies

Manufacture product or create service



Question No: 25 ( Marks: 1 ) - Please choose one

Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Is it?

True

False



Question No: 26 ( Marks: 1 ) - Please choose one

In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, ---------------- and ----------

Acceptance and consideration

Acceptance and Rejection

Approval and consideration

None



Question No: 27 ( Marks: 1 ) - Please choose one

In online environment acceptances may be issued by an imposter/cheater that has authority to bind the online business

True

False



Question No: 28 ( Marks: 1 ) - Please choose one

#00ff00 in HTML indicates

Pure green color

Pure blue color

Pure red color

Pure yellow color



Question No: 29 ( Marks: 1 ) - Please choose one

Virtual PIN Payment System requires both merchant and buyer to register with _______________.

Auto Clearing House (ACH)

First Virtual (FV)

DSS (Digital Signature Standard)

DES (Data Encryption Standard)


Reference:

(Page # 110)

Question No: 30 ( Marks: 1 ) - Please choose one

Classification and Association belong to which of the following types of Data Mining?

Selective

Predictive

Descriptive

Additive



Question No: 31 ( Marks: 1 )

What should be the length range in bits of a message digest?

A message digest is a single large number typically between 128 to 256 bits in length.

Question No: 32 ( Marks: 1 )

Just write down the name of Elements of Branding?

Differentiation

Relevance

Perceived Value

Question No: 33 ( Marks: 2 )

What is civil law? Give precise answer.

Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Civil wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general. On the other hand, a criminal wrong (crime) is an act deemed by law to be harmful to the society in general such as theft or murder etc. and the state itself is a party in such matters.

Question No: 34 ( Marks: 2 )

What do we mean by “Affiliation” between two parties? Explain shortly.

Question No: 35 ( Marks: 3 )

What is concept of “fair use” in copyright law?

There is a concept of ‘fair use’ or ‘fair dealing’ in copyright law that provides legitimate exceptions to copyright violation. Generally, fair use of a copyrighted work includes copying it for use in criticism, comment, news reporting, teaching, scholarship or research. Experts draw support from this concept of ‘fair use’ to deal with the problem of copyright over the internet. It is also argued that in cases where the author of a work has himself provided a hyperlink leading to his work, he should be regarded as giving the

implied authority or license to download or make copies of his work. In such an eventuality, the issue of copyright should not arise according to an opinion.

Question No: 36 ( Marks: 3 )

Digital signatures are considered more reliable than paper signatures. Do you agree with this statement? Briefly justify your answer. 1+2

Question No: 37 ( Marks: 3 )

What is ERP? Briefly explain its use in an organization? (1 + 2)

ERP is an approach that attempts to integrate all departments and functions across a company onto a single computer system that can serve all those different departments' particular needs. For example, finance, manufacturing and the warehouse department of a company may have their own software to perform tasks specific to each one of them. However, each software can be linked together so that a customer service representative can see the credit rating of a customer from finance module, warehouse information from

warehouse module, and shipment information from the shipment module. SAP is an example of ERP software. ERP is complex. It is not intended for public consumption as proper integration of ERP with ecommerce applications is still a major problem.

Question No: 38 ( Marks: 5 )

What do you perceive by Value Added Network? Explain its advantages too with reference to EDI. (2+3)

Value added networks are third party networks that provide services to execute authorized transactions with valid trading partners using EDI. Each VAN has a centralized computer system that maintains two files for each user, that is,

Postbox: where outgoing messages are placed, and

Mailbox: where incoming messages can be picked up

Advantages:

Two big advantages of using a VAN in EDI are time independence and protocol independence. Time independence means that the sending and receipt of the interchange or messages can be carried out at the convenience of the users involved. Thus, they are not required to be connected with each other at the same time. Protocol independence means that interchanges are re-enveloped with the transmission protocol appropriate to the recipient when they are retrieved from the postbox by the VAN. Thus, a VAN can provide protocol compatibility between the sender and the recipient, wherever that is missing.

Question No: 39 ( Marks: 5 )

What is ACH? What is its role in Virtual PIN system? 2+3

ACH stands for Automated Clearing House.A house through which the bank of payee clears the check with the help of traditional automated clearing house.

Role of ACH in Virtual PIN System:

A deposit request encrypted with bank’s public key accompanies the payment information. E-cash bank maintains a database of spent coins. On receipt it checks whether the coin is valid and whether it has already been spent or not (to prevent double spending) by referring to its database. If the coins are valid the bank credits the merchant’s account. Thus, if the client has sent valid coins worth $10 for payment to the merchant, and the merchant already has $90 in his account then an amount of $ 10 would be added in his account making it $ 100. Later, the merchant can request the e-cash bank to transfer this amount in his account with the acquirer bank. This can be done through ACH and the merchant can physically withdraw the money form the acquirer bank.

Question No: 40 ( Marks: 10 )

What is data warehousing? What are its main tasks? What is its importance for an organization?

The primary concept behind data warehousing is that the data stored for business analysis can most effectively be accessed by separating it from the data in the operational systems. A data warehouse, therefore, is a collection of data gathered from one or more data repositories to create a new, central database. For example a hospital may create a data warehouse by extracting the operational data it has accumulated concerning patient information, lab results, drug use, length of stay, disease state, etc,. Data Warehousing is not just the data in the warehouse, but also the architecture and tools to collect, query, analyze and present information.

Question No: 41 ( Marks: 10 )

Precisely explain the steps of “Knowledge discovery from database” in order of their occurrence.

ANS: Knowledge discovery process include Data cleaning, Data selection, Data transformation, Data Mining, Data integration, Pattern evaluation & knowledge presentation.

Answer: Knowledge discovery process include Data cleaning, Data selection, Data transformation, Data Mining, Data integration, Pattern evaluation & knowledge presentation.

Explaination of each step:

1-Data cleaning

Data cleaning means that missing values should be provided in different fields/columns wherever needed and any impossible or erroneous values should be substituted by correct/reasonable ones. For example if the age of a person is typed as 1000 years in the column ‘age’ then an average age value can be put in its place.

2-Data selection

Where there are quite a few erroneous or missing values in a row, then that row can be discarded/deleted altogether. This process is called data selection.

3-Data transformation

In data transformation, the data from all different sources is converted into the same format. For example, date typed under a column should be in the same format in the entire data collected through different sources.

4-Data integration

In data integration, data from all the sources is assembled or integrated into one and housed in the data warehouse.

5-Data Mining

Now, this cleaned, transformed, selected and integrated data is fed to the data mining tool from a data warehouse for data mining purpose.

6-Pattern evaluation & knowledge presentation

The results/ patterns are evaluated by managers and useful knowledge is thus gained. Note that almost 80% of the total time used in a knowledge discovery process is spent on just making the data fit for mining, that is, data cleaning, data transformation, data selection etc.

No comments:

Post a Comment