Upload
lythu
View
222
Download
0
Embed Size (px)
Citation preview
IT430 Solved MCQs
By http://vustudents.ning.com
Do you think that ʺwww.vu.edu.pkʺ can be considered as universityʹs advertisement website? Select correct option: Yes No
Characterization and Clustering belong to which of the following types of Data Mining? Select correct option: Predictive Selective Descriptive Additive
Reference:
(Page # 141)
Traditionally Marketer use the market segmentation(s) like Select correct option:
http://vustudents.ning.com 1
Geo‐graphic Segmentation Demographic Segmentation
Psychographic Segmentation All of the above
Reference:
(Page # 131)
Advertising Subscription Mixed Revenue Model includes Select correct option: Online journals Sports information services Business week online All of the above
OLAP stands for…………… Select correct option: Online Analytical Program Online Analytical Processing Online Application Program Online Analysis Performance
Reference:
(Page # 145)
http://vustudents.ning.com 2
E‐Business promotions are used to _______.
Select correct option: Attract the customer to the product and convince him/her to buy it. Get credit card information from the customer. Complete a transaction between customer and seller. None of above
Reference:
(Page # 133)
Television, radio and print media are in a (n) ……………………. Mode. Select correct option: Passive Active Static Dynamic
Reference:
(Page # 139)
CRM stands for ............... Select correct option: Customer Relationship Management Customer Related Management Customer Resembling Management Customer Reallocation Management
Reference:
http://vustudents.ning.com 3
(Page # 136)
Which one is not an example of search engine? Select correct option: Yahoo Google Alta vista Gawab
Reference:
(Page # 137)
Meta tag contains: Select correct option: User information seller information web page key information bank information
Reference:
(Page # 138)
http://vustudents.ning.com 4
Free‐Trial advertisement means _________. Select correct option: Free coupons are placed on certain websites for customers so that they can use it for shopping. Customer is offered to use the product free of cost for a specific amount of time.
Items bought are delivered to the customers with no delivery cost. The company didn’t had to pay for this advertisement.
Reference:
(Page # 133)
In many countries, stealing and misusing of meta information for getting competitive advantage is considered as an offence known as Select correct option: Tort of Private Nuisance Tort of Tress passing Tort of passing off Defamation
Reference:
(Page # 138)
If a companyʹs marketing stretegy is focusing on customers having age less than 30, which of the following marketing segmentation technique is being used by company? Select correct option: Demographic Segmentation Geographic Segmentation Psychographic segmentation Behavioral segmentation
Reference:
(Page # 131)
http://vustudents.ning.com 5
Press release can provide information about current events and news to, which of following, via internet?
Select correct option: Print media T.v commercial Press or media T.v program.
Reference:
(Page # 135)
Fee for Transaction Models include Select correct option: Travel Agents and Insurance brokers Automobile Sales and event tickets Stock brokers and online banking All of the above
Reference:
(Page # 130)
An E‐Business canʹt have direct feedback from the customer in B2C. Select correct option: True False
http://vustudents.ning.com 6
Creation of separate experiences for customers based on their behavior is called Select correct option:
Demographic segmentation Behavioral segmentation Geo‐Graphic Segmentation None of the above
Reference:
(Page # 132)
What is the right sequence of steps involved in development of customer’s relationship with the business? Select correct option: Familiarity, Awareness, Commitment, Exploration, Separation Awareness, Exploration, Familiarity, Commitment, Separation Familiarity, Awareness, Exploration, Commitment, Separation Awareness, Commitment, Familiarity, Exploration, Separation
Reference:
(Page # 136)
At deposit stage, the serial number is ……………..by E‐Cashbank
► Known
► Unknown
http://vustudents.ning.com 7
► Kept Secret
► Informed
Reference:
(Page # 118)
How many kinds of Web Portals are?
► 3
► 2
► 5
► 6
Explanation:
There are only two kinds of web portals, one is vertical portals which provides information about single interest like online shopping sites are best example of vertical portal site, educational site is also an example of vertical portal. Second kind of web portal is horizontal web portals which provide information about everything or multiple things. Search engine is best example of horizontal web portal.
http://vustudents.ning.com 8
Reference:
(page # 129)
Let us, suppose that you have hosted your e‐commerce website,
When you provide “opt‐in e‐mail” option to your customers on your website and customer opt for it , what does it mean to receive ?
► Information about product through advertisement
► Information about product through e‐mail
► Information about services available on it
► Information about News through e‐mail.
Reference:
(page # 133)
http://vustudents.ning.com 9
Track the customers online and do personalization is only possible through which of the following file(s) analysis.
► log files
► cookie
► data mining
► log files and cookies.
Reference:
(page # 136)
When customer life cycle is used to create different groups of customers, it is called?
http://vustudents.ning.com 10
► Targeting Customers
► Dynamic groups
► Customer Life Cycle Segmentation
► Group Development
Reference:
(page # 137)
Network addresses 128‐‐‐ 191 range belongs to which of the following class networks?
► A
► B
http://vustudents.ning.com 11
► C
► E
Reference:
(page # 10)
Which of the following property falls in HTTP?
► Stateless
► Stateful
► Temporary
► All of these
Reference:
(page # 3)
FSTC stands for:
http://vustudents.ning.com 12
► Financial Services Technology Consortium
► Financial Secrets Technology Consortium
► Final Security threats control
► First Service Technology Consortium
Reference:
(page # 113)
Supply chain can be broken into three parts, that is ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ , ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ and ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ activities.
► Internal, external support
► Upstream, internal ,downstream
http://vustudents.ning.com 13
► Primary, Secondary ,R&D
► None of them
Reference:
(page # 155)
The process of taking active role in working with suppliers to improve products and processes is called?
► Value chain management
► Supply chain management
► Supply chain management software
http://vustudents.ning.com 14
► Porter Model
Reference:
(page # 155)
What is Ultimate consumer orientation?
► Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain.
► Secondary Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain.
► Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of supply chain.
► None of them
Reference:
http://vustudents.ning.com 15
(page # 156)
Many search engines rank the site by using a program called
► Spider
► Scorpion
► Moon
► Cobweb
Reference:
(page # 138)
E‐commerce is a combination of three different areas of study, namely, ‐‐‐‐‐‐‐‐,
‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ and ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐
http://vustudents.ning.com 16
► Internal, external support, Support
► Technology, business and law/policy
► Primary, Secondary, R&D
► Sale, purchase, feed back
Reference:
(page # 161)
In which type of data mining, Apriori algorithms is used?
► Classification
http://vustudents.ning.com 17
► Association
► Characterization
► Clustering
Reference:
(page # 143)
EDI has the key feature(s)
► No paper work
► No human intervention
► Exchange of information takes place in seconds
► All of these
Reference:
http://vustudents.ning.com 18
(page # 147)
Addresses are tied to the device itself and give no clue to itʹs location on a global scale. This is the characteristics of
► IP
► RIP
► MAC
► None of the given
When two or more intranets are connected to each other they form a/an ‐‐‐‐‐‐‐‐‐‐‐‐‐ .
► intranet
http://vustudents.ning.com 19
► internet
► extranet
► VPN
Reference:
(page # 2)
Which attribute can be used to make a region non‐clickable?
► none of the given
► target
► alt
http://vustudents.ning.com 20
► nohref
Reference:
(page # 37)
Which of the following payment mode does not require customer to pay interest to the bank on each transaction?
► Credit card
► Debit card
► Electronic check
► All of the above
Reference:
(page # 110)
Cyber wallet can automatically assemble the correct payment and pay it too.
http://vustudents.ning.com 21
► True
► False
SET doesn’t require special software on the client or merchant side.
► True
► False
Which model allows the users to log‐on on a website and assume the role of bidder or seller?
► Online Banking.
► Storefront Model.
► E‐Learning.
http://vustudents.ning.com 22
► Auction Model.
Reference:
(Page # 128)
According to Michael Porter, “fabricating” is an example of primary activity in a strategic business unit. Identify the area in which this task is performed.
► Market and sell
► Deliver’ activities relate to storage
► Purchase materials and supplies
► Manufacture product or create service
Reference:
(Page # 152)
http://vustudents.ning.com 23
Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong‐doer. Is it?
► True
► False
In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ and ‐‐‐‐‐‐‐‐‐‐
► Acceptance and consideration
► Acceptance and Rejection
► Approval and consideration
http://vustudents.ning.com 24
► None
Reference:
(page # 178)
In online environment acceptances may be issued by an imposter/cheater that has authority to bind the online business
► True
► False
#00ff00 in HTML indicates
► Pure green color
► Pure blue color
http://vustudents.ning.com 25
► Pure red color
► Pure yellow color
Reference:
(Page # 23)
Virtual PIN Payment System requires both merchant and buyer to register with _______________.
► Auto Clearing House (ACH)
► First Virtual (FV)
► DSS (Digital Signature Standard)
► DES (Data Encryption Standard)
Reference:
(Page # 110)
http://vustudents.ning.com 26
Classification and Association belong to which of the following types of Data Mining?
► Selective
► Predictive
► Descriptive
► Additive
Reference:
(Page # 141)
Which one of the followings is an example of Banner advertising?
Select correct option:
Branding
Affiliate programs
Partnership
All of these
Reference:
(Page # 138)
CPM is an advertising payment mode. CPM stands for ________.
http://vustudents.ning.com 27
Select correct option:
Cost Per Month
Cost Per Minute
Cost Per Megabyte
Cost Per Message
Reference:
(Page # 134)
Which one is not an example of search engine?
Select correct option:
Yahoo
Alta vista
Gawab
Reference:
(Page # 137)
In which type of approach, we further dig the data for retrieving information from data warehouse?
Select correct option:
http://vustudents.ning.com 28
Slice
Dice
Drill down
Roll up
Reference:
(Page # 146)
Let us, suppose that you have hosted your e‐commerce website, Promotion messages can be sent when potential client is
Select correct option:
online
offline
both online and offline
visiting head office
Reference:
(Page # 133)
Digital Content Revenue Model Includes
Select correct option:
Legal information services
Online journals
http://vustudents.ning.com 29
Online Libraries
All of the above
Reference:
(Page # 130)
Which of these is a tool that can be used to improve customer services?
Select correct option:
Log file analysis
Cookies
Data mining
All
Reference:
(Page # 136)
What does Telemarketing means?
Select correct option:
Marketing through charting
Marketing through telephone
Marketing through emai
http://vustudents.ning.com 30
Marketing through web casting
Reference:
(Page # 133)
In which type of data mining, ID3 algorithms is used?
Select correct option:
Classification
Association
Characterization
Clustering
Reference: (Page # 141)
Some web retailers allow their customers to create their own product. It is called.
Select correct option:
One to one Marketing
One to many Marketing
Many to one marketing
All of the above
Reference:
(Page # 132)
Free‐Trial advertisement means ___________.
http://vustudents.ning.com 31
Select correct option:
Free coupons are placed on certain websites for customers so that they can use it for shopping.
Customer is offered to use the product free of cost for a specific amount of time.
Items bought are delivered to the customers with no delivery cost.
The company didn’t had to pay for this advertisement
Reference:
(Page # 133)
Total Marks: 1 The length of a message digest is ________.
Select correct option:
32 to 64 bits
64 to 128 bits
128 to 256 bits
256 to 512 bit
Reference:
(Page # 103)
http://vustudents.ning.com 32
Key version represents public key by
Select correct option:
Buyer
Seller
The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the ___________.
Select correct option:
Bank
Merchant
Client
None
E‐Bank
Certification Authority
Reference:
(Page # 116)
Reference:
(Page # 116)
http://vustudents.ning.com 33
ACH is a centralized system used by different interconnected banks for clearing payment requests.
Select correct option: True False
Centralized Account Payment Model uses unique _______ of users as their account identifier. Select correct option: Residence address E‐mail address Office address None
Reference:
(Page # 113)
SET and SSL both are same with respect to security. Select correct option: True False
What are the security threats in VPS? Select correct option:
a. Email hacking b. Credit card number stolen c. Missing of delivery d. A and B
http://vustudents.ning.com 34
What is function of Cyberwallet? Select correct option:
Store coins Manage Coins Record transactions All of above
SET and SSL both are same with respect to security. Select correct option: True False
Basic difference between Virtual PIN Payment System and Electronic Check is _____. Select correct option: Encryption Registration with bank No. of participants There is no difference between them
SETSET(secure Electronic Transaction) was developed by Select correct option: Microsoft Netscape Navigator Master Cards and VISA All of the options
http://vustudents.ning.com 35
SSL stands for Select correct option: Secure Socket Layer Security Service Layer
Sub Secured Length None of these
What is basic advantage of symmetric algorithms? Select correct option: Symmetric key does not use any encryption Symmetric algorithms are faster Symmetric algorithms are easy to understand All of above
Which of these keys can be used for encryption instead of using pair of private and public keys? Select correct option: Systematic key Asymmetric key Symmetric key All of above
Using SSL, we type in URL as : Select correct option: https httpc httpc httpi
Reference:
(Page # 121)
http://vustudents.ning.com 36
In Virtual Payment system , Four kinds of information is provided to e‐bank. Identify which one is NOT included: Select correct option:
Buyer Accounts identifier Buyer password Address of Merchant Actual amount of money in favor of merchant
A unique large number, generated as a result of applying hash function on a message is called ______. Select correct option:
Hash message Message digest Digitally singed message Secret message
Reference:
(page # 103)
FVIPSS stands for _______. Select correct option:
First Virtual Internet Payment System Server First Virtual International Payment System Server First Virtual International Payment System Services First Virtual Internal Payment System Services
Reference:
(Page # 110)
Virtual PIN Payment system is considered suitable for ________. Select correct option:
http://vustudents.ning.com 37
Low‐cost items High‐cost items
Very expensive items Every kind of items
Which of these is a primary participant in E‐Cash Payment system? Select correct option: Buyer Bank Merchant All
Most of the electronic payment systems on internet use cryptography. Select correct option: True False
In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last …………………withdrawals to the E‐bank.
Select correct option:
http://vustudents.ning.com 38
10
12
14
16
Reference:
(page # 119)
The key feature of E‐Cash Payment system is
http://vustudents.ning.com 39
Select correct option:
Anonymity
Security
Cryptography
None of these
Reference:
(page # 116)
At minting stage, the client is ……………..by E‐Cashbank
Select correct option:
Known
Unknown
Secret
informed
Reference:
(page. 118)
Cipher suite is a combination of
Select correct option:
Cryptographic Algorithm
Authentication methods
Security layers
Cryptographic Algorithm And Authentication methods
Reference:
(page. 121)
SETSET(secure Electronic Transaction) was developed in
Select correct option:
1995
1996
1997
1999
Reference:
(page no. 122)
Symmetric algorithms are faster than asymmetric.
Select correct option:
True
False
Reference:
(Page # 105)
Which entity does not include in SET(secure Electronic Transaction)?
Select correct option:
Seller
http://vustudents.ning.com 40
Buyer
Payment gateway
Bank
Reference:
(Page # 122)
A paper signature is believed to be more reliable than a digital signature.
Select correct option:
True
False
If a key is 4 bit in length, how many unique key values are possible?
Select correct option:
4
8
16
http://vustudents.ning.com 41
32
Explanation:
A key value is always in binary form. A Binary Number is made up of only 0s and 1s.
So each digit has only two possibilities: 0 or 1, So now we try to check all possible values of 4.
4 bit = 0000,
0001,
0010,
0100,
1000,
0011,
0110,
1100,
0101,
1010,
1011,
1101,
1001,
1110,
0111,
http://vustudents.ning.com 42
1111
Hence prove that if a key is 4 bit in length, then 16 unique key values are possible of that key.
Hash function is a __________
Select correct option:
Communication protocol
Hardware device
Encryption mechanism
Log file
Which of these attacks have been reported on symmetric key algorithms?
Select correct option:
Key Search Attacks
Cryptanalysis
http://vustudents.ning.com 43
System‐Based Attacks
All
Reference:
(Page # 108)
Payment gateway is an organization which connects those entities to the internet which are offline.
Select correct option:
True
False
Reference:
(Page # 122)
How many elements an e‐coin has?
Select correct option:
1
2
3
4
http://vustudents.ning.com 44
Reference:
(page # 116)
EFT stands for _____________.
Select correct option:
Electronic Film Transmission
Electronic Funds Transfer
Electronic File Translation
None of above
Reference:
(Page # 114)
http://vustudents.ning.com 45
________ is used to interpret and show contents of the webpage. Select correct option: HTML Notepad Browser Computer
http://vustudents.ning.com 46
What is identified by the tag ? Select correct option: Horizontal frame Bottom Frame Top Frame Vertical Frame Which of the following is NOT an advantage of CSS? Select correct option: Define the look of your pages in one place Works on version 4 browsers or newer Easily change the look Implement same formatting each time tag is used. Links are used to connect ____________. Select correct option: Images Text Images and web documents
All of the given Which of the following are correct tags used for frames, Select correct option: <Frame></Frame> <Frameset><Frame></Frame></Frameset> <Frameset><Frame></Frameset> <Frameset><Frame></Frame>
If you have a less space for e‐mails on internet then _________ protocol is used. Select correct option: SMTP IMAP POP POP3
A _________ is a web page populated with text boxes,drop‐down lists and commands buttons to get information from the user. Select correct option:
http://vustudents.ning.com 47
Hypertext Link Form Table Button
Default web page background color is __________. Select correct option: Green Red White Blue
_____________ are normally used to get yes/no or true/falseinformation from a reader. Select correct option:
Check Boxes Radio buttons Submit Buttons Selection List
Which of the following is NOT valid HTML code line? Select correct option: <frameset rows=ʺ16%,84%ʺ> <frameset columns=ʺ16%,84%ʺ> <frameset cols=ʺ100,150ʺ> <frameset cols=”50%,50%” rows=”16%,84%”>
The attributes used by depend on the type of? Select correct option: Plug‐in being used Browser being used ISP being used Sound/movie being used
http://vustudents.ning.com 48
When a visitor clicks a _________, the entries in form areset to the default values. Select correct option:
Button Radio Button Submit Button Reset Button What is the meaning of SRC in frame tag?
Source for image saved on your disk Source for images saved on your disk Source of page saved on your disk Source of Pages saved on your disk
In what form style rules are presented? Select correct option: selector { property= value } selector ( property: value ) selector { property: value } selector ( property= value )
www.amzon.com as you all familiar with it. Which of the following loyalty stages its customers are:: Detail about amzon.com Amazon was one of the first major companies to sell goods by Internet, and was an iconic ʺstock in which to investʺ of the late 1990s dot‐com bubble. Jeff Bezos founded Amazon.com, Inc. in 1994, and launched it online in 1995. Amazon.com started as an on‐line bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3 format, computer software, , etc. Amazon has established separate websites in Canada, the United Kingdom, Germany, France, China, and Japan.
Affiliation
http://vustudents.ning.com 49
Awareness
Separation
committment
Which of following marketing campaigns are cheap an effective way to target potential customers?
Select correct option:
Sale forces
E‐mail
Media promotion
Marketing software
Reference:
(Page # 133)
Which of the following is cheapest and quickest marketing technique to reach distant customers?
Select correct option:
E‐Mail marketing
Telephone marketing
SMS marketing
http://vustudents.ning.com 50
Advertisement letters marketing
Reference:
(Page # 133)
In Frequent‐Flyer Miles marketing, customer of the business earns specific miles free of charge from _______.
Select correct option:
Bus service
Train service
Airline
None of above
Reference:
(Page # 133)
Web catalogue revenue model includes
Select correct option:
Online sellers of computer
Gifts, flowers, clothes
Journals
A and B
Reference:
(Page # 132)
http://vustudents.ning.com 51
Press release can provide information about current events and news to, which of
following, via a internet?
Select correct option:
Print media
T.v commercial
Press or media
T.v program.
Reference:
(Page # 135)
Which of these can be used for advertisement purpose?
Select correct option:
Telephone
Newspapers
Magazines
All of above
Reference:
(Page # 133)
Which of these is NOT a stage of knowledge discovery process?
Select correct option:
http://vustudents.ning.com 52
Transformation
Data mining
Pattern evaluation
Process evaluation
Reference:
(Page # 140)
How many stages involve in customer loyalty model for creating good customer relationship?
Select correct option:
6
5
4
3
In e‐business, market research is slower than offline business.
http://vustudents.ning.com 53
Select correct option:
True
False
Which statement is most appropriate description of the term “Interactive‐advertisement”?
Select correct option:
By making an advertisement message using flash animation.
Putting an audio or video message on the website to attract customer.
By avoiding customer’s involvement in the advertisement process.
By involving the customer in the advertisement process itself.
Reference:
(Page # 134)
An E‐Business canʹt have direct feedback from the customer in B2C.
Select correct option:
True
False
http://vustudents.ning.com 54
When you email at [email protected] , your email is automatically sorted and replied to your ID.
Select correct option:
True
False
Many search engines rank the site by using a program called
Select correct option:
Spider
Scorpion
Moon
Cobweb
Reference:
(Page # 138)
Advertising Supported Revenue Model includes
Select correct option:
Yahoo portal
Employment sites
Newspaper Publishers
http://vustudents.ning.com 55
All of the above
Reference:
(Page # 130)
When customer life cycle is used to create different groups of customers, it is called?
Select correct option:
Targeting Customers
Dynamic groups
Customer Life Cycle Segmentation
Group Development
Reference:
(Page # 137)
While designing a website, which of the following factors an internet marketer should pay attention to?
Select correct option:
Easy site navigation (i.e. Site map)
Frequently asked questions (FAQs) section
http://vustudents.ning.com 56
Privacy policy
All of above
Reference:
(Page # 132)
What is the right sequence of steps involved in development of customer’s relationship with the business
Familiarity, Awareness, Commitment, Exploration, Separation
Awareness, Exploration, Familiarity, Commitment, Separation
Familiarity, Awareness, Exploration, Commitment, Separation
Awareness, Commitment, Familiarity, Exploration, Separatio
Reference:
(Page # 137‐138)
http://vustudents.ning.com 57
Dividing potential customers on the basis of variables such as social class, personality, or lifestyle is called ____________.
Select correct option:
Demographic Segmentation
Geographic Segmentation
Psychographic segmentation
Behavioral segmentation
Reference:
(Page # 131)
Which of the following option best represent “Data mining can improve response rate tremendously ” ?
Select correct option :
Direct mailing
Personalization technology
E‐business
Opt‐in e‐mail
Reference:
(Page # 140)
Creation of separate experiences for customers based on their behavior is called
Select correct option :
http://vustudents.ning.com 58
Demographic segmentation
Behavioral segmentation
Geo‐Graphic Segmentation
None of the above
Reference:
(Page # 132)
Which of the following is NOT an advertising payment mode ?
Select correct option :
Pay‐per‐sale
Pay‐per‐click
Pay‐per‐keypress
Pay‐per‐lead
Reference:
(page 134)
The result of OLAP is displayed in the form of a __________ .
Select correct option :
Data square
Data Triangle
Data cube
Data circle
http://vustudents.ning.com 59
Reference:
(Page # 145)
Which of the following is a business promotion?
Select correct option :
Free‐Trials
Free‐Shipping
Both of these
None
Reference:
(Page # 133)
http://vustudents.ning.com 60
Suppose you are using ʺwarid telecomʺ as your mobile connection and you ignor any other mobile companyʹs advertisement because you want to keep using warid no matter what others offer. Your relationship with warid is at _______________.
Select correct option:
Exploration stage
Commitment stage
Awareness stage
Separation stage
Click here to Save Answ er & Move to Next Question
http://vustudents.ning.com 61
Question # 8 of 10 ( Start time: 04:25:46 PM ) Total Marks: 1
Which of the following is an advertising payment mode?
Select correct option:
Pay‐per‐person
Pay‐per‐page
Pay‐per‐sale
Pay‐per‐minute
Click here to Save Answ er & Move to Next Question
At deposit stage, the client is ………....by E‐Cash bank Secret Unknown Known None of these Reference:
http://vustudents.ning.com 62
(Page # 118)
Four P s in Marketing Mix are Product, price, place, promotion Price, person, place, problem Place, product, property, promotion Promotion, place, product, planning MAC stand for Media Access Control Media Access Consortium Member of Asian Community None of these Reference: (Page # 13) Which Protocol is used for downloading messages to client machine from servers? SMTP POP3 IMAP POP3 and IMAP Reference: (Page # 18) How can you make an e‐mail link? <mail>xxx@yyy</mail> <mail href=ʺxxx@yyyʺ> <a href=ʺmailto:xxx@yyyʺ> <a href=ʺxxx@yyyʺ>
http://vustudents.ning.com 63
What does the Target= _self tag perform function? Loads the new page into the same frame Loads the new page into the entire window Loads the new page into a new browser window All of the above Reference: (Page # 33) An electronic check contains a(n)__________________ to the payer s bank to make a specified payment to the payee. Serial# Private key Instruction All of the above Reference: (Page # 113) Upstream activities relate to? Materials/services or the input from suppliers Manufacturing and packaging of goods Distribution and sale of goods to distributors/customers Input from suppliers and Distribution Reference: (Page # 155) Exclusive right granted by law to make, use and sell an invention. What is called? Parasites Trade mark Patent infringement Copyright
http://vustudents.ning.com 64
Reference:
(Page # 181) ANSI stands for ……? American National Standards Institute All Network Standards Institute American New standards Institute Australia National standards Institute Reference: (Page # 147) Support activities in Value Chain model includes Finance and Administration Human Resources Technology Development All of these. Reference: (Page # 153) UDP uses a ACKNOWLEDGEMENT mechanism for the delivery of data. True False You define a method using obj.method obj.method[] obj.method() obj‐method Which of the following is a valid variable name?
http://vustudents.ning.com 65
6th_student_CGPA
first_student_CGPA last student CGPA *any_student_CGPA Reference: (Page # 54) PKI stands for ___________. Public Key Instrument Public Key Information Public Key Instruction Public Key Infrastructure Reference: (Page # 107) Which of the following payment system does not involve the use of encryption? Electronic check Electronic cash Virtual PIN None of above What is the right sequence of steps in Electronic Check process? Payee s bank Payer s bank Payee Payer. Payer Payee Payee s bank Payer s bank. Payer s bank Payee Payee s bank Payer. Payer s bank Payee s bank Payer Payee. The basic difference between Virtual PIN System and Electronic Check is _________. Use of encryption Registration with bank
http://vustudents.ning.com 66
No. of participants
No difference between them In E‐Cash Payment system, merchant deposits the coins in the bank to check the ______ of coins. Number Validity Private key Sender SSL doesn t require special software on the client or merchant side. True False Which e‐business helps to improve policies, procedures, customer services, and general operations of other businesses? Online shopping malls. Selling intellectual property online. Online service providers. Online automotive sites and energy online. Reference: (Page # 129) Which of the following is an advantage of electronic catalogue? Large fix cost if used for small no. of products. Ability of updating product information. Need for customer skill of computers and browsers. Difficult to develop catalogue. Which of the following is an advantage of paper catalogue? Easy to create catalogue without high technology
http://vustudents.ning.com 67
Reader is able to look at catalogue without computer system
More portable than electronic catalogue All of above Reference: (Page # 127) In online business, market research becomes slower than offline business. True. False. Identity that machine which services the internet request? Web Client Web Server Browser Mozilla Reference: (Page # 2) What does ETO stands for Electronic Transactions Ordinance Electric Transport ordinance Electronic Treaty Organization All Reference: (Page # 163) In which type of data mining, ID3 algorithms is used?
http://vustudents.ning.com 68
Classification Association Characterization Clustering Reference: (Page # 141) Which one of the following algorithms does not include in symmetric key algorithms DES RC2 RC4 RSA Reference: (Page # 108) Choose the correct HTML code line which left‐align the content inside a table cell. <td leftalign> <td valign=ʺleftʺ> <td align=ʺleftʺ> <tdleft> We can divide the Client Server architecture up to: 1 Tier 2 Tier 3 Tier
http://vustudents.ning.com 69
N –Tier
Reference: (Page # 89) In the digital signature technique, the sender of the message uses ________ to create cipher text. His or Her own symmetric key His or her own private key His or her own public key The receiver`s private key DSS stands for Digital Signature Standards Digital Support Standards Decision support system Digital Sign System Reference: (Page # 108) The process of taking active role in working with suppliers to improve products and processes is called? Value chain management Supply chain management Supply chain management software Porter Model Reference: (Page # 155)
http://vustudents.ning.com 70
A firm Glory Enterprise and it wants to have its web site. It also wants to have the word glory as a part of its domain name because for years it has been recognized in the physical world through this word. However, at the time of registration of its domain name it finds that a person Mr. A who has nothing to do with the business of the firm or the word glory has already registered a domain name containing this word as a part of it. Since there cannot be two similar domain names, the firm is forced to request Mr. A to transfer that domain name to it. In response, if Mr. A blackmails or claims ransom from the said firm, He would be said to have committed ‐‐‐‐‐‐‐‐‐‐‐‐‐.
Cyber squatting. Parasites Patent infringement Trade mark and domain name conflicts Reference: (Page # 181) In which type of approach, we further dig the data for retrieving information from data warehouse? Slice Dice Drill down Roll up Reference: (Page # 146) In which type of approach, we sum up and integrate the information in a particular dimension to show the result? Dice Drill down Roll up Slice Reference: (Page # 146) Which activity does not include in Primary activities Identify Customers Design Delivery Administration Reference: (Page # 152)
http://vustudents.ning.com 71
What of the following is the correct HTML tag for making a drop‐down list? <input type=ʺlistʺ> <input type=ʺdropdownʺ> <select> <list> Reference: (Page # 29) What does HTML stand for? Hyperlinks and Text Markup Language Home Tool Markup Language Hyper Text Markup Language Homepage Text Making Language JavaScript variables can begin with ‐‐‐‐‐‐‐‐‐‐‐ . a lower case letter an underscore character a dollar sign all of the above Reference: (Page # 54) Which currency is used in e‐cash Payment system? Dollar Coin Penny Cent Web browser and client wallet are installed on __________. Clientʹs computer Bankʹs computer
http://vustudents.ning.com 72
Merchantʹs computer
None of above
Job searchers can search for jobs and employers can hire effectively using..... Online recruiting web sites. Online banking web sites. Online trading and lending web sites. Online news services web sites. Reference: (Page # 128) Customers grouped by variables such as social class, personality or approach to life or lifestyle, is called ___________. Demographic Segmentation. Geographic Segmentation. Psychographic segmentation. Behavioral segmentation. Reference: (Page # 131)
http://vustudents.ning.com 73