E-Business Infrastructure
E-Business Infrastructure
E-Business Infrastructure
3. The level of e-business infrastructure which refers to computation and logic is:
a. b. c. d. Processing Application content Storage/physical Infrastructure
4. A service provider that manages the server used to host an organisation website and its connections to
the Internet backbones is known as: a. Client server b. Hosting provider c. Internet service provide d. All of the above
7. The popular enabling home or business users access and web hosting services for the internet is referred
Online solutions providers Internet solutions providers Internet service providers Application service providers Selecting high bandwidth connection Selecting a dedicated server Signing a service level agreement Both the second and third answer above
9. The most common way of publishing information on the internet accessed through web browsers may
surprise some but it is known as : a. Usenet newsgroups b. Web application frameworks c. Web application servers d. World wide web
10. A private network within a company can be used to provide shared content for staff is known as
a. b. c. d. a. b. c. d. Open source Extranet Intranet Internet Cost reduction Improved levels of customer service Information sharing in secure environment All the above
12. An API , which is a method of integrating different software or programs and used by companies such as
Google and Facebook stands for ? a. Appliance programming interface b. Application programming interface c. Applied portable interface d. All the above
13. Skype offers free calls or video-conferencing between internet connected computers and is an example of
a. b. c. d. a. b. c. d. a. b. c. d. a. b. c. d. Really simple syndication Voice over IP Instant Messaging iPTV Google Apps Facebook Apps Twitter or RSS Skype Extensible microformat language Extensible machine language X-programming markup language Extensible markup language E-business transport or network layer E-business content and data layer E-busines services application layer All the above
15. XML which is used for exchanging data between different systems, stands for
17. Where do local internet service provider come into the picture?
a. They provide home and business users with a connection to access the internet b. They filter out erroneous data to avoid the internet slowing down
c. They relay messages to speed up transmission d. They form part of a countrys infrastructure
18. How much percentage of the worlds population are using internet?
a. b. c. d. a. b. c. d. a. b. c. d. a. b. c. d. 19.9% 22.2% 30.2% 18.5% Reduced costs through higher productivity and saving on hard copy Better customer service that is more responsive and personalized Lengthened product life cycles Distribution of information through remote offices nationally and globally Improved customer service Greater order processing and product distribution Significant cost increases Information sharing in a secure environment Is the quality of the information adequate and up to date Is it effective and efficacious Will the levels of usage be sufficient to justify investment All the above
19. Which one of the following is not an advantage for a marketing intranet?
21. Which of the following are key questions to investigate when creating a new extranet?
22. What is the term used for specialized software to prevent unauthorized access to company data from
outsiders? a. Middleware b. Enterprise application integration c. Firewall d. Web analytics system
23. What are Microsoft Internet Explorer, Mozilla Firefox, Apple Safari and Google Chrome examples of ?
a. b. c. d. Web servers Web browsers Web application servers All the above
24. Which internet tool can be described as having the ability to blend real world digital data capture to
create a browser based digital representation or experience mimicking that of the real world? a. Augmented reality b. IPTV c. Podcasting d. Voice over Internet Protocol
26. While governments in many countries take certain views on internet access, there is a principle to provide
equal access to different internet services by telecommunications service providers. This is known as: a. Net neutrality principle b. Telecommunication information networking principle c. Internet governance d. Open source principle
27. The problems due to poor internet provision can be reduced through various actions such as:
a. b. c. d. a. b. c. d. a. b. c. d. a. b. c. d. Reducing costs through selecting a shared server Having a dedicated server Not being constrained by signing a service level agreement All the above confidentiality conference congress None ofthe above SCM EDI WWW BPR Contact smart card Contactless smart card Proximity smart card B&C
30. Which of the smart card uses a sim like structure for reading and writing data?
II Fill in the blanks: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. CAN-Spam is the new anti spam bill. Copyright is the legal protection afforded of expression of an idea, song or documents Key logger software is a program when installed on a computer records every keystroke and mouse click. E-cash/Digital cast is an electronic representation of cash. Smart card is better protected than other cards using Encryption Trust card is introduced by BSNL & itzcash PaisaPay is offered only by eBay.in The E-payment mechanism widely used in B2B is E-cheque Credit card is also known as plastic money. E-cheques are prepaid. The presence of microchip make the smart card smart Proximity smart card is read only. CIA of smart card stands for Confidentiality Authenticity Integrity Oxicash/PayMate/PayPass is the third party payment providers who offer digital wallets for E-merchants MMID is used to identify mobile money Secret key is used for private key cryptography SSL/S-HTTP is a communication channel security protocol
18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28.
The protocol which allows the file transfer between computers is FTP VAN stands for value added network EPS is the backbone of all E-payments in E-commerce RSA/DES is an encryption technique Hacking is a logical threat An extranet uses the TCP/IP protocol The internet with tunneling technology is known as Virtually private Network The Intranet servers are protected by Firewall Digital signature is used for the authentication of senders by applying public key cryptography in reverse Decoding data that has been included is known as decryption A set of rules that determine how two computers communicate with one another over a network is called protocol 29. Cryptography is the process of encryption and decryption message 30. Digital certificates are issued by certificate authorities III Short Answer Questions: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Define Internet Define Protocol Define Intranet Define Extranet List any three security issues in e-commerce List any three tax issues in e-commerce Define Encryption List out the types of payment systems List the legal issues in e-commerce List the ethical issues in e-commerce