IT430 - E-Commerce (Session - 3) Final 2008
IT430 - E-Commerce (Session - 3) Final 2008
IT430 - E-Commerce (Session - 3) Final 2008
Fall 2008
IT430- E-Commerce (Session - 1)
Question No: 1 ( Marks: 1 ) - Please choose one
Which one of the following is NOT recorded in log files at server side?
IP addresses
Requested(url)
Date
Cookies
Reference: : page #136 handouts lecture #32
Log files consist of data generated by site visits and include information about each
visitors location, IP address, time of visit,frequency of visits etc. There are
businesses that provide the services of analyzing web log files. The results would
show how effective your web site is and indicate the top-referring web sites. You
know that cookies allow e-commerce sites to record visitor behavior. They can be
used to track customers online and do personalization. Many customers do not
know that their information is being collected and used by the ebusiness site. Thus,
informational privacy rights of customers can be breached in cases where cookies
are used.
Question No: 2 ( Marks: 1 ) - Please choose one
Key version represents public key by
Buyer
Seller
E-Bank
Certification Authority
Question No: 3 ( Marks: 1 ) - Please choose one
SET and SSL both are same with respect to security.
True
False
Question No: 4 ( Marks: 1 ) - Please choose one
To overcome the lack of physical proximity appearance problem in e-business,
which technology is going to be used
Biometrics
Video conferencing
Cryptography
Biometrics and Video conferencing
Question No: 5 ( Marks: 1 ) - Please choose one
Web catalogue revenue model includes
a. Online sellers of computer
b. Gifts, flowers, clothes
c. Journals
d. A and B
Reference: : page #130 handouts lecture #30
Web Catalogue Revenue Model
Though the goal of an e-business can be to reduce cost or improve customer
service, however, the primary aim of most e-commerce sites is to generate revenue
and earn profit. This is the most simple and common type of e-business model for
generating revenue. This model would use electronic catalogue and shopping cart
providing access to customers throughout the world. Businesses using this type of
a model include online sellers of computers, electronic items, books, music,
videos, toys, flowers, gifts, clothes etc. Payment received from customers is the
source of earning revenue.
Question No: 6 ( Marks: 1 ) - Please choose one
Advertising Supported Revenue Model includes
Yahoo portal
Employment sites
Newspaper Publishers
All of the above
Reference: : page #130 handouts lecture #30
Advertising-Supported Revenue Model
In this model service/information is provided free of any charge to certain audience
and the advertising revenue is sufficient to support the operation of the business
and its cost. For example, Yahoo portal provides useful information and a search
engine free of cost, but earns revenue through advertisements on its portal web site
to bear the operational cost.
Question No: 7 ( Marks: 1 ) - Please choose one
Do you think, vulms.vu.edu.pk is an example of E-mail marketing?
True
False
Question No: 8 ( Marks: 1 ) - Please choose one
Which of following services build a strong customer loyalty towards company and
its products?
Customer services
Public relations(PR)
Bulletin board
Exhibitions.
Reference: : page #136 handouts lecture #32
One major goal of CRM is to establish a long-lasting relationship between a
company and its customers.
Good customer services can help in building a sense of loyalty towards company
and its products or services. Experts have pointed out five stages of loyalty as
customer relationships develop over a period of time. One can find that the
intensity of relationship increases as the customer moves through the first four
stages. In the fifth stage a decline occurs and the relationship terminates.
Question No: 9 ( Marks: 1 ) - Please choose one
Track the customers online and do personalization is only possible through which
of the following file(s) analysis.
log files
cookie
data mining
log files and cookies.
Reference: : page #136 handouts lecture #32
You know that cookies allow e-commerce sites to record visitor behavior. They
can be used to track customers online and do personalization. Many customers do
not know that their information is being collected and used by the ebusiness site.
Thus, informational privacy rights of customers can be breached in cases where
cookies are used.
Question No: 10 ( Marks: 1 ) - Please choose one
www.amzon.com as you all familiar with it.
Which of the following loyalty stages its customers are:
( Who don t know about it): Detail about amzon.com)
"Amazon was one of the first major companies to sell goods by Internet, and was
an iconic "stock in which to invest" of the late 1990s dot-com bubble. Jeff Bezos
founded Amazon.com, Inc. in 1994, and launched it online in 1995. Amazon.com
started as an on-line
bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3
format, computer software, , etc. Amazon has established separate websites
in Canada, the United Kingdom, Germany, France, China, and Japan. It also
provides global shipping to certain countries for some of its products. "
Awareness
Exploration
Familiarity
Commitment
Question No: 11 ( Marks: 1 ) - Please choose one
Which one is not included in the networking topologies?
Star Topology
Bus Topology
Media Topology
Ring Topology
Reference: : page #14handouts lecture #04
Topology of a LAN means its physical lay out. There are three main types of
Network Topology, namely,
Bus Topology, Star Topology and Ring Topology as shown in Figures 1-3 below.
There are two different approaches to networking Server-based and Peer-to-Peer
approach. In server-based approach there is a centralized server machine that can
serve users requests for the sharing of resources on a network.
Contrarily, in peer-to-peer, the machines on the network have an equal capability
which means that they can act both as a client and a server.
Question No: 12 ( Marks: 1 ) - Please choose one
Where in an HTML document is the correct place to refer to an external style
sheet?
At the end of the document
At the top of the document
In the <body> section
In the <head> section
Reference:
http://www.ex-designz.net/test_page.asp?tid=37
Question No: 13 ( Marks: 1 ) - Please choose one
Where does the massage in Alert function display?
Browser page
Popup window
Task bar
Menu bar
Reference: : page #57 handouts lecture #13
Note we can embed JavaScript code/instructions in the plain HTML code with the
help of <script> and
</script> tags. In the above example alert is the function/method of a predefined
browser object that is, window object, and is used to create alert boxes or popup
messages on the window. // is used in JavaScript to provide comments. Here, we
use // so that old browsers that do not support JavaScript treat information within
the Script tag as comments.
Question No: 14 ( Marks: 1 ) - Please choose one
An electronic check contains a(n) to the payer s bank to make a specified
payment to the payee
Serial#
Private key
Instruction
All of the above
Reference: : page #113 handouts lecture #25
check contains an instruction to the payers bank to make a specified payment to a
payee.
Question No: 15 ( Marks: 1 ) - Please choose one
Television, radio and print media are in a (n) . Mode.
Passive
Active
Static
Dynamic
Reference: : page #139 handouts lecture #33
Emotional branding vs. rational branding
In case of television, radio or print media people are normally in a passive mode.
Question No: 16 ( Marks: 1 ) - Please choose one
In many countries, stealing and misusing of meta information for getting
competitive advantage is considered as an offence known as
Tort of Private Nuisance
Tort of Tress passing
Tort of passing off
Defamation
Reference: : page #138 handouts lecture #33
Meta information it actually is. In many countries, stealing and
misusing Meta information in this manner to gain business/competitive advantage
is considered as an offence known as the tort of passing-off.
Question No: 17 ( Marks: 1 ) - Please choose one
---------------
An array is .
a variable
an object
a method
a function
Question No: 18 ( Marks: 1 ) - Please choose one
Which SQL statement is used to delete data from a database?
DELETE
COLLAPSE
REMOVE
DISCARD
Reference:
http://publib.boulder.ibm.com/infocenter/rtnlhelp/v6r0m0/index.jsp?topic=/com.ib
m.etools.sqlbuilder.doc/topics/tdelete.html
Question No: 19 ( Marks: 1 ) - Please choose one
Which of following is NOT an attribute of <AREA> tag?
shape circle href coords
Reference: : page #36 handouts lecture #08
<Map Name=Testmap> <Area shape=Rect coords=0,0,199,99
href=a.htm> <Area
shape=Rect coords=199,0,399,99 href=b.htm> <Area shape=Rect
coords=399,0,599,99
href=c.htm> </Map> Note that we use area tag within the <Map> tag, and use
shape, coords and
href attributes of the area tag. href attribute specifies the file which would open
on clicking the clickable
area.
Question No: 20 ( Marks: 1 ) - Please choose one
A unique large number, generated as a result of applying hash function on a
message is called ________.
Hash message
Message digest
Digitally singed message
Secret message
Reference: : page #103 handouts lecture #23
There are two terms that you should note here hash function and message digest.
Hash function is a oneway mathematical function applied to a message. Result of
the hash function is unique to each message called Message Digest. A message
digest is a single large number typically between 128 to 256 bits in length.
Thus, we can have up to 2256 different messages each having a unique message
digest associated with it. This gives rise to almost an incalculable figure. We can
safely assume that each different message that can possibly be typed would have a
unique message digest on applying a hash function. A hash function is said to be
one way because we cannot go back to the original text on applying the hash
function to a message digest. Basically, the concept of hash function and message
digest is used to confirm the integrity of a message. Following is the example of a
hash function that can be used in a code (no need to prepare it for exam)
Question No: 21 ( Marks: 1 ) - Please choose one
Which of the following payment mode does not require customer to pay
interest to the bank on each transaction?
Credit card
Debit card
Electronic check
All of the above
Reference: : page #110 handouts lecture #24
Note that in case of a credit card the issuer bank charges interest from the client at
a specified rate on the amount lent. On the other hand, in case of a debit card no
such interest is payable since the customer uses his/her own money in that case.
Question No: 22 ( Marks: 1 ) - Please choose one
The combination of encryption algorithms and authentication methods is called
__________.
Cyber suite
Cyclic suite
Circle suite
Cipher suite
Reference: : page #120 handouts lecture #28
SSL supports a variety of encryption algorithm and authentication methods. The
combination of algorithms and methods is called a cipher suite.
Question No: 23 ( Marks: 1 ) - Please choose one
Which model allows the users to log-on on a website and assume the role of bidder
or seller?
Online Banking.
Storefront Model.
E-Learning.
Auction Model.
Reference: : page #128 handouts lecture #29
Auction Model
In this model there are auction sites to which the users can log-on and assume the
role of a bidder or seller.
As a seller, one has to specify the minimum price to sell ones item (called reserve
price), the description of the item and the deadline to close the auction. At the end
of the auction, the seller and the bidder are notified by the auction site and the
payment mechanism and delivery mode is worked out. Auction sites charge
commission on sales.
Question No: 24 ( Marks: 1 ) - Please choose one
Dividing market, with respect to people having income level greater than Rs
30000, is geographic segmentation.
True.
False.
Question No: 25 ( Marks: 1 ) - Please choose one
Which of the following is NOT an identified behavioral mode of customers on the
web?
Browsers
Buyers
Shoppers
Seller
Reference: : page #132 handouts lecture #30
Behavioral segmentation
Creation of separate experiences for customers based on their behavior is called
behavioral segmentation.
Three identified behavioral modes of the customers on the web are:
Browsers customers who just browse through the site with no intention of buying
Buyers customers who are ready to buy right away
Shoppers customers who are motivated to buy but want more information
An e-business site should devise right combination of marketing strategy to lure
visitors in different behavioral modes to become its customers.
Question No: 26 ( Marks: 1 ) - Please choose one
According to Michael Porter, material handling is an example of primary activity
in a strategic business unit. Identify the area in which this task is performed.
Identify customers
Market and sell
Deliver activities relate to storage
Purchase materials and supplies
Question No: 27 ( Marks: 1 ) - Please choose one
Which of these is NOT an advantage of e-banking?
Get current account balances at any time.
Handle your finances from any location.
Get more money than your actual balance.
Transfer money between accounts.
Reference: : page #150 handouts lecture #36
Advantages of e-banking
Get current account balances at any time
Obtain credit card statements
Pay utility bills
Download account information
Transfer money between accounts
Send e-mail to your bank
Manage your own schedule
Handle your finances from any location
Apply for loans online
Question No: 28 ( Marks: 1 ) - Please choose one
Value Added Network (VAN) maintains two files of each customer that are
________.
Inbox and Outbox
Postbox and Mailbox
Sendbox and Getbox
None of them
Reference: : page #148 handouts lecture #36
Value Added Network (VAN)
Value added networks are third party networks that provide services to execute
authorized transactions with
valid trading partners using EDI. Each VAN has a centralized computer system
that maintains two files for
each user, that is,
Postbox: where outgoing messages are placed, and
Mailbox: where incoming messages can be picked up
Question No: 29 ( Marks: 1 ) - Please choose one
Internet e-mail could be used as an alternative to EDI message transport
mechanism.
True
False
Reference: : page #149 handouts lecture #36
Internet-Based EDI
Internet can support EDI in a variety of ways. Internet e-mail can be used as EDI
message transport mechanism in place of having a VAN. An extranet can be
created with the trading partner allowing a partner to enter information in the fields
of web forms which correspond to the fields of EDI message.
Also, web-based EDI hosting service can be utilized through web-based EDI
software. However, a lot of work is still required to be done to make use of and
popularize internet-based EDI.
Question No: 30 ( Marks: 1 ) - Please choose one
(UDRP) Stands for ------------------
Uniform Defamation Resolution Policy
Uniform Dispute Resolution Policy
Uniform Domain Resolution Policy
None
Reference: : page #182 handouts lecture #45
International Corporation for Assigned Names and Numbers (ICAAN), which
supervises the task of registration of domain names worldwide, has developed and
implemented a policy known as Uniform Dispute Resolution Policy (UDRP) for
deciding domain name disputes.
Question No:
31 ( Marks: 1 )
What stands for CRM?
Question No:
32 ( Marks: 1 )
Identify customers is one of the areas in a strategic business unit according
to Michael Porter. List what kind of activities is performed in this area?
Question No: 33 ( Marks: 2 )
What are data warehousing main tasks?
Question No: 34 ( Marks: 2 )
What do you know about promotion by "Coupons"?
Question No: 35 ( Marks: 3 )
What do you know about interactive advertisement? Briefly explain.
Question No: 36 ( Marks: 3 )
What is e-business storefront model?
Question No: 37 ( Marks: 3 )
How lack of trust barrier can be overcome or minimized? Discuss it briefly
Question No: 38 ( Marks: 5 )
Describe the role of E-commerce in competitive strategies.
Question No: 39 ( Marks: 5 )
What is the importance of hash function and how it is applied on Message
digest?(3+2)
Question No: 40 ( Marks: 10 )
How the processes of selling, buying, marketing, front-end and back-end
operations can be integrated each other for creating an effective CRM.
Question No:
41 ( Marks: 10 )
What steps you should adopt for
process called knowledge discovery from
database . Precisely
explain them? Order wise steps require.
(2+2+1+1+2+1+1)