Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

E-Business Infrastructure

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

UNIT-II : E-BUSINESS INFRASTRUCTURE I.

Multiple Choice Questions:-

1. The architecture of hardware, software, content and data is known as:


a. E-business web structure b. E-business web structure c. E-commerce infrastructure d. E-business infrastructure 2. The level of e-business infrastructure which refers to information processed and displayed is: a. Infrastructure b. Application content c. Processing d. Storage/physical

3. The level of e-business infrastructure which refers to computation and logic is:
a. b. c. d. Processing Application content Storage/physical Infrastructure

4. A service provider that manages the server used to host an organisation website and its connections to
the Internet backbones is known as: a. Client server b. Hosting provider c. Internet service provide d. All of the above

5. The website for a company is hosted on a:


a. b. c. d. a. b. c. d. to as: a. b. c. d. a. b. c. d. Web client Web server Web infrastructure Web page Web e-mail Web server Web client/server Web browser

6. The website content of a company is accessed by an end user through using:

7. The popular enabling home or business users access and web hosting services for the internet is referred
Online solutions providers Internet solutions providers Internet service providers Application service providers Selecting high bandwidth connection Selecting a dedicated server Signing a service level agreement Both the second and third answer above

8. The likelihood of a poor response from a website can be reduced through:

9. The most common way of publishing information on the internet accessed through web browsers may
surprise some but it is known as : a. Usenet newsgroups b. Web application frameworks c. Web application servers d. World wide web

10. A private network within a company can be used to provide shared content for staff is known as
a. b. c. d. a. b. c. d. Open source Extranet Intranet Internet Cost reduction Improved levels of customer service Information sharing in secure environment All the above

11. Which of the following could be seen as business of an extranet?

12. An API , which is a method of integrating different software or programs and used by companies such as
Google and Facebook stands for ? a. Appliance programming interface b. Application programming interface c. Applied portable interface d. All the above

13. Skype offers free calls or video-conferencing between internet connected computers and is an example of
a. b. c. d. a. b. c. d. a. b. c. d. a. b. c. d. Really simple syndication Voice over IP Instant Messaging iPTV Google Apps Facebook Apps Twitter or RSS Skype Extensible microformat language Extensible machine language X-programming markup language Extensible markup language E-business transport or network layer E-business content and data layer E-busines services application layer All the above

14. Which of the following is an example of an embedded application

15. XML which is used for exchanging data between different systems, stands for

16. Which of the following could be accepted as a component of an e-business infrastructure?

17. Where do local internet service provider come into the picture?
a. They provide home and business users with a connection to access the internet b. They filter out erroneous data to avoid the internet slowing down

c. They relay messages to speed up transmission d. They form part of a countrys infrastructure

18. How much percentage of the worlds population are using internet?
a. b. c. d. a. b. c. d. a. b. c. d. a. b. c. d. 19.9% 22.2% 30.2% 18.5% Reduced costs through higher productivity and saving on hard copy Better customer service that is more responsive and personalized Lengthened product life cycles Distribution of information through remote offices nationally and globally Improved customer service Greater order processing and product distribution Significant cost increases Information sharing in a secure environment Is the quality of the information adequate and up to date Is it effective and efficacious Will the levels of usage be sufficient to justify investment All the above

19. Which one of the following is not an advantage for a marketing intranet?

20. Which is not a business benefit of using and extranet?

21. Which of the following are key questions to investigate when creating a new extranet?

22. What is the term used for specialized software to prevent unauthorized access to company data from
outsiders? a. Middleware b. Enterprise application integration c. Firewall d. Web analytics system

23. What are Microsoft Internet Explorer, Mozilla Firefox, Apple Safari and Google Chrome examples of ?
a. b. c. d. Web servers Web browsers Web application servers All the above

24. Which internet tool can be described as having the ability to blend real world digital data capture to
create a browser based digital representation or experience mimicking that of the real world? a. Augmented reality b. IPTV c. Podcasting d. Voice over Internet Protocol

25. The body that regulates domain names is_______


a. b. c. d. ICANT The world wide web consortium ICANN The internet society

26. While governments in many countries take certain views on internet access, there is a principle to provide
equal access to different internet services by telecommunications service providers. This is known as: a. Net neutrality principle b. Telecommunication information networking principle c. Internet governance d. Open source principle

27. The problems due to poor internet provision can be reduced through various actions such as:
a. b. c. d. a. b. c. d. a. b. c. d. a. b. c. d. Reducing costs through selecting a shared server Having a dedicated server Not being constrained by signing a service level agreement All the above confidentiality conference congress None ofthe above SCM EDI WWW BPR Contact smart card Contactless smart card Proximity smart card B&C

28. Whatis C standsin CIA ofsmart card?

29. Which is not a feature of e-comerce

30. Which of the smart card uses a sim like structure for reading and writing data?

II Fill in the blanks: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. CAN-Spam is the new anti spam bill. Copyright is the legal protection afforded of expression of an idea, song or documents Key logger software is a program when installed on a computer records every keystroke and mouse click. E-cash/Digital cast is an electronic representation of cash. Smart card is better protected than other cards using Encryption Trust card is introduced by BSNL & itzcash PaisaPay is offered only by eBay.in The E-payment mechanism widely used in B2B is E-cheque Credit card is also known as plastic money. E-cheques are prepaid. The presence of microchip make the smart card smart Proximity smart card is read only. CIA of smart card stands for Confidentiality Authenticity Integrity Oxicash/PayMate/PayPass is the third party payment providers who offer digital wallets for E-merchants MMID is used to identify mobile money Secret key is used for private key cryptography SSL/S-HTTP is a communication channel security protocol

18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28.

The protocol which allows the file transfer between computers is FTP VAN stands for value added network EPS is the backbone of all E-payments in E-commerce RSA/DES is an encryption technique Hacking is a logical threat An extranet uses the TCP/IP protocol The internet with tunneling technology is known as Virtually private Network The Intranet servers are protected by Firewall Digital signature is used for the authentication of senders by applying public key cryptography in reverse Decoding data that has been included is known as decryption A set of rules that determine how two computers communicate with one another over a network is called protocol 29. Cryptography is the process of encryption and decryption message 30. Digital certificates are issued by certificate authorities III Short Answer Questions: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Define Internet Define Protocol Define Intranet Define Extranet List any three security issues in e-commerce List any three tax issues in e-commerce Define Encryption List out the types of payment systems List the legal issues in e-commerce List the ethical issues in e-commerce

You might also like