You are on page 1of 49

IT430 SOLVED McQs WITH REFERENCEERENCE FOR final Term Exam

Solved With Reference by Hzif $he!kh AND Aisha Awan


(152 McQs)

http://www.vuzs.info/
http://groups.google.com/group/vuZs
Question No: 1
Key version represents public key by

Buyer
Seller
E-Bank
Certification Authority
Ref: PAGE # 116
E-cash Coins
The currency used in this payment system is called an e-cash coin or simply
coin. A coin consists of three elements or parts - serial #, key version and
serial no. signed by the secret or private key of a certain denomination of
the e-cash bank. In other words, a coin of one dollar would consist of the
following:
Coin = Serial#, key version, {Serial #} SK banks $1 key
Each coin has a unique value, partly minted by the client and partly by the
e-cash bank.

Question No: 2
SSL stands for

Secure Socket Layer


Security Service Layer
Sub Secured Length
None of these
Ref: PAGE # 121
SECURE SOCKET LAYER (SSL)
SSL is a protocol developed by Netscape Communications. SSL is built into
many browsers. It operates at the TCP/IP layer of the OSI model, and uses a
combination of symmetric and asymmetric cryptography.

Question No: 3
How many kinds of Web Portals are?

3
2
5
6
Ref: PAGE # 129
Portal Model
Portals are the web sites which provide chance to the visitors to find almost
everything in one place. Horizontalportals provide information about a
very broad range of topics. Search engine is the example of a horizontal
portal. Vertical portalsprovide information pertaining to a single area of
interest. Community Portals such as those related to medical or legal
profession are the examples of a vertical portal.

Question No: 4
Brick and Mortar refers to

Offline business
Online business
Transport
Building
Ref: PAGE # 129
Brick-and-Mortar vs. Click-and-Mortar businesses
These two terms refer to the offline and the online businesses,
respectively. Where a company is doing its business both online and offline,
there is often the problem of lack of proper integration between the two
different channels of business.
Note: Offline business = Brick-and-Mortar
And Online Business = Click-and-Mortar businesses

Question No: 5
Digital Content Revenue Model Includes

Legal information services


Online journals
Online Libraries
All of the above
Ref: PAGE # 130
Digital Content Revenue Model
Web serves as a very efficient distribution mechanism of content. Therefore,
one finds many e-businesses that offer different types of information
services such as legal information, corporate information, government
information, news and resources for academic libraries etc. These services
can be customized by an e-business for different firm sizes depending upon
their needs and usage pattern. Normally, a customer has to subscribe to
such services by paying certain amount as subscription fee. This fee
becomes the main source of generating revenue for the e-business. Instead
of subscription fee, a credit card charge option can be made available for
infrequent users. Online journals, newspapers, libraries fall under this
category
Question No: 6
Which of following marketing campaigns are cheap an effective way to target potential
customers?

Sale forces
E-mail
Media promotion
Marketing software
Ref: PAGE # 133
E-MAIL MARKETING
E-mailmarketing campaigns are cheap and effective way to target potential
customers.

Question No: 7
What does Telemarketing means?

Marketing through charting


Marketing through telephone
Marketing through email
Marketing through web casting
Ref: PAGE # 133
Telemarketing
Live interaction through telephone

Question No: 8
Which of following services build a strong customer loyalty towards company and its products?

Customer services
Public relations(PR)
Bulletin board
Exhibitions.
Ref: PAGE # 136
One major goal of CRM is to establish a long-lasting relationship between a
company and its customers. Good customer services can help in building a
sense of loyalty towards company and its products or services.

Question No: 9
Track the customers online and do personalization is only possible through which of the
following file(s) analysis.

log files
cookie
data mining
log files and cookies.
Ref: PAGE # 136
You know that cookies allow e-commerce sites to record visitor behavior.
They can be used to track customers online and do personalization. Many
customers do not know that their information is being collected and used by
the e-business site.

Question No: 10
Which of the following is true for Class A:

Network 01 byte and 03 hosts


Network 02 bytes and 02 hosts
Network 03 bytes and 01 host
None of these
Ref: PAGE # 10
By rule, in class A networks first byte would refer to the network address
and the remaining three bytesto the host machines on that network
providing a very large network.
http://www.vuzs.info/
http://groups.google.com/group/vuZs

Question No: 11
What is the correct HTML for making a text input field?

<textinput type="text">

<input type="text">

<input type="textfield">

<textfield>
Ref: PAGE # 27
First Name: <INPUT TYPE="TEXT" NAME="First">

Question No: 12
IIS stands for:

International Information Service


Internet Information Server
Internet Information standards
All of these
Ref: PAGE# 85
ASP
We can discuss ASP a little more in detail. It runs best on IIS (Internet
Information Server) which is freely available with Windows NT and
Windows 2000.

Question No: 13
The payer and the payee are issued digital certificates in standard format by their
respective banks.
X. 509
F. 609
L.8999
N.586
Ref: PAGE # 101
Digital certificates
These are the certificates in electronic form which establish whether or not a
public key belongs to the purported owner. A digital certificate at least
comprises a public key, certification information (name, ID etc.) and
electronic signatures of a certification authority. Digital certificates are
prepared according to a generally accepted format called X.509
standard format.

Question No: 14
What is a E-Cash wallet ?
Hardware
Agent
Software
All of the above
Ref: PAGE # 116
Buyers and merchants, both, have accounts in the E-cash bank. Buyers
withdraw coins against their account and store them in e-cash wallet
software (Cyber wallet) on their computer. Cyber wallet stores and
manages coins and records every transaction.

Question No: 15
An E-cash coin consists of element (s) like:
Serial # provided by client
Key version
Serial# signed by E-cash bank
All of the above
Ref: PAGE # 116
Coin = Serial#, key version, {Serial #} SK banks $1 key

Question No: 16
What is Ultimate consumer orientation?

Primary objective of supply chain is to help each company to meet needs of the consumer
at the end of supply chain.

Secondary Primary objective of supply chain is to help each company to meet needs of the
consumer at the end of supply chain.
Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end
of supply chain.

None of them

Ref: PAGE # 156


Supply chain and ultimate consumer orientation:

Primary objective of supply chain is to help each company to meet


needs of the consumer at the end of supply chain.This approach is
called ultimate consumer orientation. In 1995, a company dealing in the
business of production of tiers in America adopted a different approach by
shifting its focus on tire dealers from ultimate customers.

Question No: 17
Customer data can be gathered and analyzing it customers can be served in a better Manner
according to their needs, which is best option?

Customization
Customer orientation
Customer satisfaction
Focus
Ref: PAGE # 157
Customization:
With the help of EC, customer data can be gathered and analyzing it
customers can be served in a better manner according to their
needs. One can, thus, implement differentiation and focus strategy.

Question No: 18
Solved
System Restore
Pattern
America
Cryptography
Customer Data
Customer Satisfaction
Customer service job description
Data Mining
Denomination
Solved
System Restore
Pattern
America
A company ABC web page divided into four segments can be unpleasant to a Japanese visitor
because no. four is a symbol of death in that culture. Which is the international barrier it is
having?

Culture
Language
Lack of trust
Infrastructure
Ref: PAGE # 162
A web page divided into four segments can be unpleasant to a Japanese
visitor because no. four is a symbol of death in that culture.

Question No: 19
Exclusive right granted by law to make, use and sell an invention. What is called?

Parasites
Trade mark
Patent infringement
Copyright
Ref: PAGE # 181
Patent infringement:
A patent is an exclusive right granted by law to make, use and sell an
invention. In order to be patentable, the invention must be unique,
genuine, and useful according to the prevalent technological standards.

Question No: 20
Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging
him to be professionally incompetent and negligent. This doctor may then file a lawsuit against
that person claiming that his reputation has been injured due to such an act. Which legal issue
arises due to such acts?

Cyber Crimes
Online Defamation
Cyber squatting
None
Ref: PAGE # 182
Online Defamation:
A defamatory statement is a false statement that injures the reputation of
on another person or company. If a statement injures the reputation of a
product or service instead of a person, it is called product disparagement.
Suppose, someone circulates a news item in the media about the
reputation of a doctor, alleging him to be professionally incompetent
and negligent. This doctor may then file a lawsuit against that person
claiming that his reputation has been injured due to such an act.
http://www.vuzs.info/
http://groups.google.com/group/vuZs

Question No: 21
How can you reference part of a string?

text.substr(5,6);
text.part(5,6)
text.piece(5,6)
text.split(5,6);
Ref: PAGE # 70
String Object:
In the following example, str and myArray are the instances of string and array objects,
respectively. The size of the array is 10. Here, charAt() is the function/method of string object.
So, charAt(3) would provide the value of the element at the index three. Different other functions
of string object have also been used. In the example, str.Split(' ')splits the string on the basis of
blank space. After splitting, we assign parts of the string as values for the array.

Question No: 22
One Tier Architecture __________.
Select correct option:

The entire processing may take place at individual terminal.


The entire processing may take place at different terminal.
The entire processing may not take place at individual terminal.
None of Above
Ref: PAGE # 88
Client server architecture:
Note that we may have different tiers in client server architecture depending
on where the processing of data takes place. In 1-tier architecture, the
entire processing takes place at a single place/zone.

Question No: 23
Following are the names of some well known e-commerce software, EXCEPT ----------- .
Intershop
IBM's WebSphere Commerce Professional Edition
Microsoft Commerce Server 2002
Microsoft SQL Server 2005
Ref: PAGE # 93
E-commerce Software:
Following are the names of some well-known e-commerce software:
Intershop Enfinity
IBMs WebSphere Commerce Professional Edition
Microsoft Commerce Server 2002

Question No: 24
In Style Sheets, How do you change the font of an element?
font-face:
font:
font-family:
font-style:
Ref: PAGE # 43
Font family styles
<HTML>
<HEAD>
<TITLE>Style Sheets: Font Families</TITLE>
<STYLE>

Question No: 25
A paper signature is believed to be more reliable than a digital signature.
True
False
Ref: PAGE # 106
A digital or electronic signature is believed to be more reliable as
compared to paper signatures because it is not ordinarily possible to
copy or forge an electronic/digital signature. But, that is very much possible
in case of paper signatures.

Question No: 26
The serial # generated by the cyber wallet gets multiplied by blinding factor r which is known
only to the ___________.
Client
Bank
Merchant
None of above
Ref: PAGE # 116
Cyberwallet generates a serial # and a blinding factor r. This blinding factor
r is only known to the client. It is used in the following mathematical
expression which is sent to the bank for signatures. Serial # . re2 (mod m)

Question No: 27
SET doesnt require special software on the client or merchant side.
True
False
Ref: PAGE # 122
Merchants must have special SET software to process transactions.
Customers must have digital wallet software that stores certificates and card
information.

Question No: 28
The result of OLAP is displayed in the form of a __________.
Data square
Data Triangle
Data cube
Data circle
Ref: PAGE # 145
Online Analytical Processing (OLAP):
OLAP makes use of background knowledge regarding the domain of the data
being studied in order to allow the presentation of data at different levels of
abstraction. It is different form data mining in the sense that it does not
provide any patterns for making predictions; rather the information stored in
databases can be presented/ viewed in a convenient format in case of OLAP
at different levels that facilitates decision makers or managers. The result
of OLAP is displayed in the form of a data cube

Question No: 29
Classification and Association belong to which of the following types of Data Mining?

Selective
Predictive
Descriptive
Additive
Ref: PAGE # 145
Online Analytical Processing (OLAP):
OLAP makes use of background knowledge regarding the domain of the data
being studied in order to allow the presentation of data at different levels of
abstraction. It is different form data mining in the sense that it does not
provide any patterns for making predictions

Question No: 30
Which one of the following algorithms does not include in public key algorithms?
DSS
RSA
Elliptic Curves
RC4
Ref: PAGE # 108
Public Key Algorithms:
Following is the list some popular public key algorithms:
DSS Digital Signature Standard based on DSA (Digital Standard
Algorithm) key length is between 512-1024 bits
RSA
Elliptic Curves
http://www.vuzs.info/
http://groups.google.com/group/vuZs

Question No: 31
Four Ps in Marketing Mix are:
Product, price, place, promotion (Sure)
Price, person, place, problem
Place, product, property, promotion
Promotion, place, product, planning

Question No: 32
JIT Stands for

Just In Time
Joint investigation Technique
Join in Training
Just In Total
Ref: PAGE # 147
For instance, packaging material should only be ordered for just in time
(JIT) delivery

Question No: 33
Advertising Supported Revenue Model includes

Yahoo portal
Employment sites
Newspaper Publishers
All of the above
Ref: PAGE # 130
Advertising-Supported Revenue Model:
In this model service/information is provided free of any charge to certain
audience and the advertising revenue is sufficient to support the operation of
the business and its cost. For example, Yahoo portalprovides useful
information and a search engine free of cost, but earns revenue through
advertisements on its portal web site to bear the operational cost.

Question No: 34
Which of the following is true for Class A:

Network 01 byte and 03 hosts


Network 02 bytes and 02 hosts
Network 03 bytes and 01 host
None of these
Ref: PAGE # 10
By rule, in class A networks first byte would refer to the network address
and the remaining three bytesto the host machines on that network
providing a very large network.

Question No: 35
Which of the following needs human action to execute?
Virus
Worm
Trojan Horse
All of these
Ref: PAGE # 94
Viruses, on the other hand, need to be activated through a human
action.

Question No: 36
In the digital signature technique, the sender of the message uses ________ to create cipher text

His or Her own symmetric key


His or her own private key
His or her own public key
The receivers private key
Ref: PAGE # 103
Then the sender adds his private key in the obtained message digest
to create his digital signatures. This digitally singed message is received
by the receiver, who applies the pubic key of the sender to decrypt the
digital signature and reveal the message digest.

Question No: 37
PIN stands for:

Payment investigation Number


Password Identification Number
Personal Identification Number
Personal Identification Numeric
Ref: http://www.wsu.edu/~brians/errors/pin.html
Those who object to PIN number on the grounds that the N in PIN stands
for number in the phrase personal identification numberare quite
right, but it may be difficult to get people to say anything else. PIN was
invented to meet the objection that a password consisting of nothing but
numbers is not a word

Question No: 38
An electronic check contains a(n) to the payers bank to make a specified
payment to the payee

Serial#
Private key
Instruction
All of the above
Ref: PAGE # 113
Electronic Checks:
Financial Services Technology Consortium (FSTC) is a group of U.S banks,
research agencies and government organizations formed in 1993. It has
introduced the concept of electronic checks. An electronic check contains
an instruction to the payers bank to make a specified payment to a
payee.

Question No: 40
It is the ability to sell the goods or provide the service at a price that is lower than that of
competitors, and thus attract more customers. What is called?

Cost leadership
Price leadership
Focus
Differentiation
Ref: PAGE # 157
Cost leadership:
It is the ability to sell the goods or provide the service at a price that is
lower than that of competitors, and thus attract more customers.
http://www.vuzs.info/
http://groups.google.com/group/vuZs

Question No: 41
E-commerce is a combination of three different areas of study, namely, --------, ---------------- and
----------------

Internal, external support, Support


Technology, business and law/policy
Primary, Secondary, R&D
Sale, purchase, feed back
Ref: PAGE # 161
E-commerce is a combination of three different areas of study, namely,
technology, business and law/policy. We have studied the technology
and business side of e-commerce to a reasonably good extent.

Question No: 42
GM Celebes manufacturing electronic goods and FryChips co selling French fries. Under the
traditional trade mark law both these companies can have the same trade mark/trade name such
as frys. The problem arises when both apply for the registration of a domain name containing
the word frys. Here, both are legitimate claimants of this domain name but due to the element
of uniqueness of domain names only one of them can be assigned the desired domain name.
Which legal issue arises in this situation?

Domain name conflict


Cyber squatting
Concurrent use
None
Ref: PAGE # 181
Concurrent use
This problem arises when two organizations have apparently legitimate claim
to use the same domain name but cannot do so due to the uniqueness of
domain names. Suppose, there is a company manufacturing electronic goods
and another company selling french fries. Under the traditional trade mark
law both these companies can have the same trade mark/trade name such
as frys. The problem arises when both apply for the registration of a
domain name containing the word frys. Here, both are legitimate claimants
of this domain name but due to the element of uniqueness of domain names
only one of them can be assigned the desired domain name.

Question No: 43
Which type of Data Mining contains the elements as Support and confidence?

Classification
Association
Characterization
Clustering
Ref: PAGE # 144
CONFIDENCE AND SUPPORT:
There are two terms/measures used in association, that is, support and
confidence. Confidence is a measure of how often the relationship holds
true e.g, what percentage of time did people who bought milk also bought
eggs.

Question No: 44
OLAP stands for

Online Analytical Program


Online Analytical Processing
Online Application Program
Online Analysis Performance
Ref: PAGE # 145
Online Analytical Processing (OLAP):
OLAP makes use of background knowledge regarding the domain of the data
being studied in order to allow the presentation of data at different levels of
abstraction.

Question No: 45
Support activities in Value Chain model includes

Finance and Administration


Human Resources
Technology Development
All of these
Ref: PAGE # 152

Question No: 46
Which of the following is NOT processed on the client side?

Cookies
JavaScript
CGI scripts
Applets
Ref: PAGE # 82
CGI scripts:
Term Common Gateway Interface (CGI) is defined as a standard
method/protocol that allows data from forms to be used by programs on the
server.

Question No: 47
Due to which characteristics, ATM network are covered under E-commerce ?

Exchange of information through computer networks (Doubt)


Internet.
Exchanging of products, services.
None of the above.

Basically ATM works to Exchange of information through computer networks so in my


point of view it will held in definition of e-commerce.
Ref: PAGE # 2
E-Commerce definition:
Electronic commerce is an emerging concept that describes the process of
buying and selling or exchanging of products, services and information via
computer networks including the internet

Question No: 48
SET is better than SSL.

True
False
Ref: PAGE # 122
Secure Electronic Transaction (SET):
The drawback in SSL that the credit card/debit card information remains
with the merchant led to the development of a more sophisticated protocol
called SET.

Question No: 49
Dividing market, with respect to people having income level greater than Rs 30000, is
geographic segmentation.

True.
False.
Ref: PAGE # 131
Segments are defined in terms of demographic characteristics such as
age, gender, marital status, income level

Question No: 50
Which of the following is NOT an identified behavioral mode of customers on the web?

Browsers
Buyers
Shoppers
Seller
Ref: PAGE # 132
Behavioral segmentation
Creation of separate experiences for customers based on their behavior is
called behavioral segmentation. Three identified behavioral modes of the
customers on the web are:
Browsers customers who just browse through the site with no intention of
buying
Buyers customers who are ready to buy right away
Shoppers customers who are motivated to buy but want more
information
http://www.vuzs.info/
http://groups.google.com/group/vuZs

Question No: 51
Which of these is a way of conducting market research?

Phone.
Interviews.
Questionnaires.
All of above.
Ref: PAGE # 132
Marketing Research:
It consists of interviews, paper and phone surveys, questionnaires,
findings based on previous investigations etc. to find strengths and
weaknesses of your business and the business of your competitors. It also
includes the analysis of opportunities and threats to your business.

Question No: 52
Which of these is NOT a stage of knowledge discovery process?

Transformation
Data mining
Pattern evaluation
Process evaluation
Ref: PAGE # 140
Knowledge discovery:
A knowledge discovery process includes data cleaning, data integration,
data selection, data transformation, data mining, pattern evaluation
and knowledge presentation.

Question No: 53
According to Michael Porter, test marketing is an example of primary activity in a strategic
business unit. Identify the area in which this task is performed.

Design
Market and sell
Deliver activities relate to storage
Purchase materials and supplies
Ref: PAGE # 152
Design activities take a product form concept stage to manufacturing
stage. They include concept research, engineering, drawings preparation,
test marketingetc.

Question No: 54
Electronic banking is also known as __________.

Cyber banking
Virtual banking
Online banking
All of above
Ref: PAGE # 150
Electronic Banking:
Electronic banking, also known as cyber banking, virtual banking, home
banking and online banking, includes various banking activities conducted
from home, business, or on the road, instead of at a physical bank location.

Question No: 55
Civil law deals with the private rights of the parties, whereas the object of criminal law is to
punish the wrong-doer. Is it?
True
False
Ref: PAGE # 176
Civil law and criminal law. Civil law deals with the private rights of the
parties, whereas the object of criminal law is to punish the wrong-
doer. Civil wrongs such as breach of contract are deemed to violate only the
rights of individuals and not the society in general.

Question No: 56
In datalink layer, data packets are placed inside

Data frames
Data boxes
Data streams
None of these
Ref: PAGE # 6
Data link layer:
It places data packets into data frames. Network Interface Card
Drivers/Protocols operate at this layer. It is used to identify MAC or
hardware address of computer machines.

Question No: 57

At deposit stage, the serial number is ..by E-Cashbank


Known
Unknown
Kept Secret
Informed
Ref: PAGE # 118
Deposit Stage
Serial no. (Known) Client (unknown)

Question No: 58
Let us, suppose that you have hosted your e-commerce website,
When you provide opt-in e-mail option to your customers on your website and customer opt
for it , what does it mean to receive ?

Information about product through advertisement


Information about product through e-mail
Information about services available on it
Information about News through e-mail.
Ref: PAGE # 133
Internet mailing lists can also be conveniently used to send targeted
personalized emails. You can also provide the opt-in e-mail option to
your customers on your web site. If they opt for it, this means that they
want to receive through email any product information, offers or
promotions etc.

Question No: 59
T
rack the customers online and do personalization is only possible through which of the following
file(s) analysis.

log files
cookie
data mining
log files and cookies.
Ref: PAGE # 136
You know that cookies allow e-commerce sites to record visitor behavior.
They can be used to track customers online and do personalization.
Many customers do not know that their information is being collected and
used by the e-business site. Thus, informational privacy rights of customers
can be breached in cases where cookies are used.

Question No: 60
When customer life cycle is used to create different groups of customers, it is called?

Targeting Customers
Dynamic groups
Customer Life Cycle Segmentation
Group Development
Ref: PAGE #137
Life Cycle Segmentation:
These five stages are also called customer life cycle. Using them to create
groups of customers is called customer life-cycle segmentation.
Segment information is useful for companies to develop better relationship
with the customers. Companies, thus, know about their customers and their
level of relationship with the company, and can customize their
product/service.
http://www.vuzs.info/
http://groups.google.com/group/vuZs

Question No: 61
Network addresses 128--- 191 range belongs to which of the following class networks?

A
B
C
E
Ref: PAGE # 11
Examples
Class A: 255.0.0.0
Class B: 255.255.0.0
Class C: 255.255.255.0
NOTE: in McQ 128--- 191 is not written after one dot it means they
are separate from each other so it belong to A class.

Question No: 62
Which of the following property falls in HTTP?
Stateless
Stateful
Temporary
All of these
Ref: PAGE # 3
HTTP is stateless because in the fourth step the server breaks the
connection. We can say, therefore:
Each operation or transaction makes a new connection
Each operation is unaware of any other connection
Each click is a new connection

Question No: 63

FSTC stands for:

Financial Services Technology Consortium


Financial Secrets Technology Consortium
Final Security threats control
First Service Technology Consortium
Ref: PAGE # 113
Financial Services Technology Consortium (FSTC) is a group of U.S
banks, research agencies and government organizations formed in 1993. It
has introduced the concept of electronic checks. An electronic check contains
an instruction to the payers bank to make a specified payment to a payee.

Question No: 64
Supply chain can be broken into three parts, that is ----------------- , ----------------------- and
-------------------- activities.
Internal, external support
Upstream, internal ,downstream
Primary, Secondary, R&D
None of them
Ref: PAGE # 155
SUPPLY CHAIN:
Supply chain includes all the activities associated with the flow and
transformation of goods from the raw materials stage all the way to the end
user. Supply chain can be broken into three parts, that is, upstream
activities, internal activities and downstream activities
Upstream activities relate to materials/services or the input from
suppliers
Internal activities relate to manufacturing and packaging of goods
Downstream activities relate to distribution and sale of goods to
distributors/customers

Question No: 65
The process of taking active role in working with suppliers to improve products and processes is
called?

Value chain management


Supply chain management
Supply chain management software
Porter Model
Ref: PAGE # 155
Supply chain management:
Engaging and negotiating with suppliers can be extremely beneficial. The
process of taking active role in working with suppliers to improve
products and processes is called supply chain management.

Question No: 66
Many search engines rank the site by using a program called
Spider
Scorpion
Moon
Cobweb
Ref: PAGE # 138
Some search engines search the entire internet each time. Many search
engines rank the site by using a program called spider which inspects
the site before ranking.
Question No: 67
In which type of data mining, Apriori algorithms is used?
Classification
Association
Characterization
Clustering
Ref: PAGE # 143
Association:
Association analysis is the discovery of association rules showing attribute-
value conditions that occur frequently together in a given set of data. It is
widely used for market basket analysis. For example, where we are
recording sales of a big shopping store in databases, then by applying
association mining we may discover that certain items have a strong
bondage or affinity with each other such that when one item is purchased
the other is purchased, too. Apriori algorithm is used for association
mining.

Question No: 68
EDI has the key feature(s)
No paper work
No human intervention
Exchange of information takes place in seconds
All of these
Ref: PAGE # 147
EDI include:
No paper work
No human intervention
Exchange of information takes place in seconds

Question No: 69
Addresses are tied to the device itself and give no clue to it's location on a global scale. This is
the characteristics of

IP
RIP
MAC
None of the given
Ref: PAGE # 13
Media access control (MAC) address:
Data to be delivered on a network has to be converted first into serial
transmission. This is done through a device called Network Interface Card
(NIC) that must be installed in a computer on the network. NIC has also got
printed on it a 48 bits unique address called the MAC or hardware address of
the computer machine. In other words, it consists of 12 hexadecimal
characters and can have different format as shown
Below:
090017A9B2EF
09:00:17:A9:B2:EF
09-00-17-A9-B2-EF

Whereas the IP address of a computer may change from time to time, its
MAC address would remain the same unless the existing NIC is replaced with
another. It can easily be inferred that there are 248 unique MAC addresses
possible (which is an unimaginably high number). An organization called
Institute of Electrical and Electronic Engineers (IEEE) administers the
allocation of MAC addresses, worldwide. It ensures that there is no
duplication of MAC addresses by the manufacturers of NICs.
Question No: 70
When two or more intranets are connected to each other they form a/an ------------- .

intranet
internet
extranet
VPN
Ref: PAGE # 98
VPN is the example of an extranet. You know that when two or more
intranets are connected to each other they form an extranet. A
manufacturing company thus can be connected to its suppliers of raw
material and its distributors through VPN.
http://www.vuzs.info/
http://groups.google.com/group/vuZs

Question No: 71 ( M - 1 ) .
Which attribute can be used to make a region non-clickable?

none of the given


target
alt
nohref
Ref: PAGE # 37
<Area> tag attributes:
alt attribute is used to label the clickable region. Target attribute can be
used to display result in a given frame. Nohrefattribute can be used to
make a region non-clickable. For example, <Area shape=circle
coords=70,45,25 href=a.htm alt=a.htm target=upper nohref>

Question No: 72
Which of the following payment mode does not require customer to pay interest to the bank on
each transaction?

Credit card
Debit card
Electronic check
All of the above
Ref: PAGE # 110
In case of a credit card the issuer bank charges interest from the client at a
specified rate on the amount lent. On the other hand, in case of a debit
card no such interest is payable since the customer uses his/her
own money in that case.

Question No: 73
Cyber wallet can automatically assemble the correct payment and pay it too.
True
False
Ref: PAGE # 118
E-cash Purchase:
Having received an order the merchant sends a payment request to the
client in the following format:
Payreq={currency,amount,timestamp,merchant_bank ID, merchant_accID,
order description}

Cyber wallet automatically assembles the correct payment amount


and pays.
Question No: 74

SET doesnt require special software on the client or merchant side.

True
False
Ref: PAGE # 122
Merchants must have special SET software to process transactions.
Customers must have digital wallet software that stores certificates and card
information.

Question No: 75
Which model allows the users to log-on on a website and assume the role of bidder or seller?

Online Banking.
Storefront Model.
E-Learning.
Auction Model
Ref: PAGE # 128
Auction Model:
In this model there are auction sites to which the users can log-on and
assume the role of a bidder or seller.

Question No: 76
Civil law deals with the private rights of the parties, whereas the object of criminal law is to
punish the wrong-doer. Is it?

True
False
Ref: PAGE # 176
Civil law and criminal law. Civil law deals with the private rights of the
parties, whereas the object of criminal law is to punish the wrong-
doer. Civil wrongs such as breach of contract are deemed to violate only the
rights of individuals and not the society in general.
Question No: 77
In the physical world three elements must be satisfied in order to make a valid contract, namely,
offer, ---------------- and ----------

Acceptance and consideration


Acceptance and Rejection
Approval and consideration
None
Ref: PAGE # 178
Online contracts:
In the physical world three elements must be satisfied in order to make a
valid contract, namely, offer, acceptance and consideration. The same
three elements must also be present in case of a valid online contract.

Question No: 78
In online environment acceptances may be issued by an imposter/cheater that has authority to
bind the online business

True
False
Ref: PAGE # 178
In online environment acceptances may be issued by an
imposter/cheater that does not have authority to bind the online
business. To overcome this problem companies and individuals can use
digital signatures to establish identity in online transactions.

Question No: 79
#00ff00 in HTML indicates

Pure green color


Pure blue color
Pure red color
Pure yellow color
Ref: PAGE # 23
<BODY bgcolor=Green text=white link=red> Instead of giving the
color name as value of bgcolor one can also provide value in terms of a six
digit code based on hexadecimal numbers called RGB values, e.g, #00FF00
refers to pure green color.

Question No: 80
Virtual PIN Payment System requires both merchant and buyer to register with
_______________.

Auto Clearing House (ACH)


First Virtual (FV)
DSS (Digital Signature Standard)
DES (Data Encryption Standard)
Ref: PAGE # 110
Both merchants and buyers are required to register with First Virtual
(FV). A buyer registering with FV forwards his or her credit card details and
email address to FV and in exchange receives a pass phrase called, Virtual
PIN.
http://www.vuzs.info/
http://groups.google.com/group/vuZs

Question No: 81
Identity that machine which services the internet request?

Web Client
Web Server
Browser
Mozilla
Ref: PAGE # 2
Basic Definitions:
Web client- machine that initiates internet request
Web server machine that services internet request
Browser - software at the client side to interact with web data
Intranet an internal network of computers confined to a single place
Extranet when two or more intranets are connected with each other, they
form an Extranet e.g, Virtual Private Network
Internet a global network of networks is defined as internet

Question No: 82
What does ETO stands for

Electronic Transactions Ordinance


Electric Transport ordinance
Electronic Treaty Organization
All
Ref: PAGE # 163
Electronic Transactions Ordinance, 2002 (ETO):
ETO is the law introduced in 2002 which extends to the whole of Pakistan. It
basically provides legal recognition to documents in electronic form and to
electronic signatures. To understand this law, it would be useful to revise the
concept related to the working of digital signature technology (refer to
Lecture no. 23). We shall look at salient provisions/features of this law as it
directly deals with e commerce in Pakistan. Section 2 of the ETO defines
different terms used in it. For convenience these terms have been
reproduced here (you do not need to memorize these for exam).
Question No: 83
Which one of the following algorithms does not include in symmetric key algorithms

DES
RC2
RC4
RSA
Ref: PAGE # 108
Following is the list of some popular symmetric key algorithms:
DES (Data Encryption Standard) 56 bits
IDEA (International Data Encryption Algorithm (IDEA) 128 bits
RC2 (block cipher) 1-2048 bits
RC4 (stream cipher) 1-2048 bits
Rinjdael 128-256 bits

Question No: 84
EFT stands for

Electronic Funds Transfer


Electronic Finance Transfer
Easy Funds Transfer
Early Funds Transaction
Ref: PAGE # 114
EFT stands for electronic funds transfer.

Question No: 85
Television, radio and print media are in a (n) . Mode

Passive
Active
Static
Dynamic
Ref: PAGE # 139
Emotional branding vs. rational branding:
In case of television, radio or print media people are normally in a
passive mode. To a greater extent they do not control the communication
channel and thus have to listen or view the advertisement about a brand.

Question No: 86
Cipher suite is a combination of

Cryptographic Algorithm
Authentication methods
Security layers
Cryptographic Algorithm And Authentication methods
Ref: PAGE # 121
SSL Handshake:
SSL supports a variety of encryption algorithm and authentication
methods. The combination of algorithms and methods is called a cipher
suite. When a client connects to an SSL server, the SSL handshake begins,
which means that the two negotiate a cipher suite selecting the strongest
suite the two have in common.

Question No: 87
Which device uses the MAC address

Switch
Router
Repeater
None of these
Ref: PAGE # 15 & 16
A switch would read the MAC address on a data packet and match it with
the list of MAC addresses of the user machines contained in it. It then sends
data packets only to that machine on a VLAN to which these packets relate.
But on PAGE 16 about router see below line
Routers:
Routers use a combination of hardware and software to forward data packets
to their destination on the internet. They are more efficient and
sophisticated than bridges and switches.

So my answer is Router

Question No: 88
Choose the correct HTML code line which left-align the content inside a tablecell.

<td leftalign>
<td valign="left">
<td align="left">
<tdleft>
Ref: PAGE # 26
Attributes for <TD> tag:
Width - <td width=50%> specifies width of a cell with reference to the
table width. Align - <td align=center> is used to align the text in a cell
accordingly (you can also use left and right as values of align).
Valign- <td valign=top> is used to vertically align the text in a cell (you
can also use bottom or middle as values of valign).

Question No: 89
Which one of following illustrates relationship between "<! -->" and // ?

Closely related
Hide the code
Different
Hide the tags

Question No: 90
We can divide the Client Server architecture up to:

1 Tier
2 Tier
3 Tier
N Tier
Ref: PAGE # 89
We can divide the client server architecture into n tiers.
http://www.vuzs.info/
http://groups.google.com/group/vuZs

Question No: 91
DSS stands for

Digital Signature Standards


Digital Support Standards
Decision support system
Digital Sign System
Ref: PAGE # 108
Following is the list some popular public key algorithms:
DSS Digital Signature Standard based on DSA (Digital Standard
Algorithm) key length is between 512-1024 bits

Question No: 92
Which one of the followings is an example of Banner advertising?

Branding
Affiliate programs
Partnership
All of these
Ref: PAGE # 138
Affiliate Programs:
An affiliate program is an agreement between two parties that one will pay
the other a commission based on a specified customer action. It is not a
strategic union as is partnership. Rather, it is for limited purpose and time.
Banner advertising is the example of an affiliate program.

Question No: 93
A firm Glory Enterprise and it wants to have its web site. It also wants to have the word glory as
a part of its domain name because for years it has been recognized in the physical world through
this word. However, at the time of registration of its domain name it finds that a person Mr. A.
who has nothing to do with the business of the firm or the word glory have already registered a
domain name containing this word as a part of it. Since there cannot be two similar domain
names, the firm is forced to request Mr. A to transfer that domain name to it. In response, if Mr. A
blackmails or claims ransom from the said firm,
He would be said to have committed -------------.

Cyber squatting
Parasites
Patent infringement
Trade mark and domain name conflicts
Ref: PAGE # 181
Cyber squatting:
The act of intentionally registering domain names containing
trademarks/trade names of prominent Companies to later blackmail or
demand ransom from those companies is called cyber squatting. It is
Regarded as an offence in most countries. Assume there is a firm Glory
Enterprise and it wants to have its web site. It also wants to have the word
glory as a part of its domain name because for years it has been recognized
in the physical world through this word. However, at the time of registration
of its domain name it finds that a person Mr. A who has nothing to do with
the business of the firm or the word glory has already registered a domain
name containing this word as a part of it. Since there cannot be two similar
domain names, the firm is forced to request Mr. A to transfer that domain
name to it. In response, if Mr. A blackmails or claims ransom from the said
firm, he would be said to have committed cyber squatting.

Question No: 94
In which type of approach, we further dig the data for retrieving information from data
warehouse?

Slice
Dice
Drill down
Roll up
Ref: PAGE # 146
Using drill-down we can further dig the data to receive some specific
information. For example using that I can find the sale of furniture in a
specific month of the first quarter, say, February. Roll-up is the reverse of
drill-down.

Question No: 95
Which activity does not include in Primary

Identify Customers
Design
Delivery
Administration
Ref: PAGE # 152

Question No: 96
What of the following is the correct HTML tag for making a drop-down list?

<input type="list">
<input type="dropdown">
<select>
<list>
Ref: PAGE # 29
Selection lists:
General format <select name=field name size=no. of items> between
the <select> and </select> tags are the <option> and </option> tags
which define the list items. If you omit size the list becomes a drop-down
list. If size is two or more, the list becomes a rectangle with scroll bars for
navigating the choices. Using Selected attribute an item is selected by
default.

Question No: 97
What does HTML stand for?

Hyperlinks and Text Markup Language


Home Tool Markup Language
Hyper Text Markup Language
Homepage Text Making Language
Ref: PAGE # 18
Hypertext markup language:
Web documents are defined by the Hypertext Markup Language (HTML).
It is a language of tags. A tag is a special letter or key word enclosed in
angular brackets.

Question No: 98
JavaScript variables can begin with ----------- .

a lower case letter


an underscore character
a dollar sign
all of the above
Ref: PAGE # 54
Rules for variables:
Variable names can begin with an uppercase letter (A-Z), lower case
letter (a-z), an underscore character (_), or dollar sign ($).

Question No: 99
A unique large number, generated as a result of applying hash function on a message is called
________.

Hash message
Message digest
Digitally singed message
Secret message
Ref: PAGE # 124
SET software on the customer side splits the order information from the
account information. MDI is the message digest obtained by applying
hash function on the order information.

Question No: 100


FVIPSS stands for _________.

First Virtual Internet Payment System Server


First Virtual International Payment System Server
First Virtual International Payment System Services
First Virtual Internal Payment System Services
Ref: PAGE # 110
Merchant queries the FV Internet Payment System Server (FVIPSS) to
confirm Virtual PIN
http://www.vuzs.info/
http://groups.google.com/group/vuZs

Question No: 101


Which currency is used in e-cash Payment system?
Dollar
Coin
Penny
Cent
Ref: PAGE # 116
Buyers and merchants, both, have accounts in the E-cash bank. Buyers
withdraw coins against their account and store them in e-cash wallet
software (Cyber wallet) on their computer.

Question No: 102


Web browser and client wallet are installed on __________.

Client's computer
Bank's computer
Merchant's computer
None of above
Ref: PAGE # 120
Client wallet and web browser are installed on the client machine.
Question No: 103
Job searchers can search for jobs and employers can hire effectively using.....

Online recruiting web sites.


Online banking web sites.
Online trading and lending web sites.
Online news services web sites.
Ref: PAGE # 128
Online Recruiting:
Employers can recruit and job searchers can search for jobs effectively
through online recruiting web sites.

Question No: 104


According to Michael Porter, material handling is an example of primary activity in a
strategic business unit. Identify the area in which this task is performed.

Identify customers
Market and sell
Deliver activities relate to storage
Purchase materials and supplies
Ref: PAGE # 105
Deliver activities relate to storage, distribution and shipment of final
product, e.g, warehousing, selecting shippers, material handling, timely
delivery to customers etc.

Question No: 105


IT/EC can reduce the overall ------------- and afford to keep the price of the product relatively
low

Production cost
Marketing cost
Distribution cost
None
Ref: PAGE # 159
A business using IT/EC can reduce the overall production costand afford to
keep the price of the product relatively low.

Question No: 106


Law is broadly divided into two classes on the basis of nature of wrong, namely, --------- and
---------------

Civil law and criminal law


ETO and criminal law
Supreme and Civil Law
None
Ref: PAGE # 176
Law is broadly divided into two classes on the basis of nature of wrong,
namely, civil law and criminal law. Civil law deals with the private rights
of the parties, whereas the object of criminal law is to punish the wrong-
doer.

Question No: 107


Browser is installed at :
Client side machine
Web server machine
none
both Client and Server Machines
Ref: PAGE # 120
Web browser are installed on the client machine.

Question No: 108


In Virtual Payment system, four kinds of information are provided to e-bank. Identify which one
is NOT included:

Buyer Accounts identifier


Buyer password
Address of Merchant
Actual amount of money in favor of merchant
Ref: PAGE # 112
To make payment an account holder is authenticated using an account
identifier and a password, account identifier of the payee and the
payment amount.

Question No: 109


To overcome the lack of physical proximity appearance problem in e-business, which
technology is going to be used
Biometrics
Video conferencing
Cryptography
Biometrics and Video conferencing
Ref: PAGE # 134
Video conferencing is an example of web casting. For example, using this
technique, doctors sitting in China, England and Pakistan etc. can, in real
time, exchange and benefit from each others ideas as if they are
physically holding a meeting.

Question No: 110


Dividing the potential customers into groups is called
Market Segmentation
Market Promotion
Market Research
Market Survey
Ref: PAGE # 131
Market Segmentation:
Businesses need to identify specific portions of their markets in order to
target them with specific advertising messages. The practice called market
segmentation divides the potential customers into segments or
groups.
http://www.vuzs.info/
http://groups.google.com/group/vuZs

Question No: 111


Traditionally Marketer use the market segmentation(s) like

Geo-graphic Segmentation
Demographic Segmentation
Psychographic Segmentation
All of the above
Ref: PAGE # 131
Traditionally, marketers have used three types of variables to define three
different market segmentations, namely, geographic segmentation,
demographic segmentation and psychographic segmentation.

Question No: 112


In, there is no direct contact with the end users.

B2B
B2C
C2C
All above options
Ref: PAGE # 137
Key difference between B2C and B2B is that in case of B2B there is no
direct contact with the end users, whereas this contact exists in B2C.
Thus, an e-business can have direct response or feedback from its
customers in B2C as compared to B2B.

Question No: 113


Allocation of MAC addresses is administered by --------------------------
ICAAN
ISO
IEEE
None
Ref: PAGE # 13
It can easily be inferred that there are 248 unique MAC addresses possible
(which is an unimaginably high number). An organization called Institute of
Electrical and Electronic Engineers (IEEE) administers the allocation of
MAC addresses, worldwide. It ensures that there is no duplication of MAC
addresses by the manufacturers of NICs.

Question No: 114


As a Web developer you can define a style sheet for?
HTML elements and apply to many Web pages.
A HTML element and apply to single Web page.
A HTML element and apply to many Web pages.
HTML elements and apply to one Web page.
Ref: PAGE # 38
Style sheets:
Style sheet instructions can be embedded in the HTML document. An
advantage of applying style sheets is that definition of the styles
formatting is created once and the browser applies that formatting
each time the tag is used. Secondly, pages are easier to modify, that is,
edit the style definition and all the places where the style is used within the
page get updated automatically. Most popular type of style sheets is
Cascading Style Sheets.

Question No: 115


What shall come in blanks for proper result,

Here blanks are numbered with 1,2 and 3

<html>
<head>
<SCRIPT language="JavaScript">
Var num1, var num2
Document.container .result.value=parseFloat(num1)-parseFloat(num2)
</script>
</head>
<body>
<FORM name=---------1----------->
<input type=----------2------- name=-------3--------- maxlength=5>
</form>
</body>
</html>

container, text and result


result, value and container
container , button and value
result, container and text

Question No: 116


What does XML stand for?
eXtra Modern Link
X-Markup Language
eXtensible Markup Language
Example Markup Language
Ref: PAGE # 74
Extensible markup language:
World Wide Web Consortium (W3C), a non-profit organization that maintains
standards for the web presented the draft of XML in late 1990s.

Question No: 117


Cryptographic Algorithms are measured in terms of
Key length
Complexity
Simplicity
All of the above
Ref: PAGE # 107 & 108
Key Length:
A cryptographic key is represented as a string of binary digits 0s & 1s-
inside a computer.
&
Cryptographic algorithms are measured in terms of key length.

Question No: 118


-----------means that your product/service has certain quality that makes it more attractive than
the one offered by your competitor, despite the price of your competitors product/service is
somewhat lower
Differentiation
Focus
Cost leadership
None of them
Ref: PAGE # 157
Differentiation:
Differentiation means that your product/service has certain quality that
makes it more attractive than the one offered by your competitor, despite
the price of your competitors product/service is somewhat lower.

Question No: 119


Characterization and Clustering belong to which of the following types of Data Mining?
Additive
Predictive
Selective
Descriptive
Ref: PAGE # 141
Classification and association are predictive types of data mining while
characterization and clustering represent the descriptive type.

Question No: 120


In which type of data mining, ID3 algorithms is used?
Classification
Association
Characterization
Clustering
Ref: PAGE # 141
Classification:
It allows you to have a predictive model labeling different samples to
different classes. The results of this type of mining/model are represented as
(if-then) rules, decision trees, neural networks etc. Two important
algorithms used for this type are ID3 Algorithm, and Bayesian
classification.
http://www.vuzs.info/
http://groups.google.com/group/vuZs

Question No: 121


ANSI stands for .
American National Standards Institute
All Network Standards Institute
American New standards Institute
Australia National standards Institute
Ref: PAGE # 147
ANSI (American National Standards Institute)

Question No: 122


Who is making the Web standards?
International Standard Organization
ANSI
Microsoft
The World Wide Web Consortium
Ref: PAGE # 74
World Wide Web Consortium (W3C), a non-profit organization that
maintains standards for the web presented

Question No: 123


Which of following is NOT an attribute of <AREA> tag?
shape
circle
href
cords
Ref: PAGE # 37
<Area shape=circle coords=70,45,25 href=a.htm alt=a.htm
target=upper nohref>

Question No: 124


Which of the following is an advantage of symmetric algorithms?
Symmetric algorithms are faster
Symmetric algorithms don't include any encryption
Symmetric algorithms are slow in nature
None of above
Ref: PAGE # 105
A symmetric key can also be used for encrypting a message instead of using
the pair of public and private keys. The advantage of using symmetric key is
that since symmetric algorithms are faster as compared to
asymmetric, therefore, the encryption of a message with the symmetric
key takes place quickly.

Question No: 125


What is the right sequence of steps in?
Payees bank Payers bank Payee Payer.
Payers bank Payee Payees bank Payer.
Payers bank Payees bank Payer Payee.
Payer Payee Payees bank Payers bank.
Ref: PAGE # 113
Question No: 126
The key feature of E-Cash Payment system is __________.
Simplicity
Anonymity
Availability
Connectivity
Ref: PAGE # 116
A company, DigiCash, has pioneered the use of electronic cash or e-cash.
Anonymity of the buyer is the key feature of this system. There are three
participants in it, namely, buyer, merchant and bank. Both, symmetric and
asymmetric type of cryptography is used in this system.

Question No: 127


In storefront e-business model buyers and sellers interact ___________ with each other.
Directly.
Indirectly.
Through a third party.
None of above.
Ref: PAGE # 128
Storefront Model:
It represents basic form of e-commerce where buyers and sellers interact
directly.
Question No: 128
Customers grouped by variables such as social class, personality or approach to life or lifestyle,
is called ___________.
Demographic Segmentation.
Geographic Segmentation.
Psychographic segmentation.
Behavioral segmentation.
Ref: PAGE # 131
Psychographic segmentation:
Here customers are grouped by variables such as social class, personality or
approach to life or lifestyle.

Question No: 129


According to Michael Porter, material handling is an example of primary activity in a strategic
business unit. Identify the area in which this task is performed.
Identify customers
Market and sell
Deliver activities relate to storage
Purchase materials and supplies
Ref: PAGE # 152
Deliver activities relate to storage, distribution and shipment of final
product, e.g, warehousing, selecting shippers, material handling, timely
delivery to customers etc.

Question No: 130


According to Michael Porter, fabricating is an example of primary activity in a strategic
business unit. Identify the area in which this task is performed.
Market and sell
Deliver activities relate to storage
Purchase materials and supplies
Manufacture product or create service
Ref: PAGE # 152
Manufacture product or create service activities relate to
transformation of materials and labor into finished products, e.g, fabricating,
assembling, packaging etc.
http://www.vuzs.info/
http://groups.google.com/group/vuZs

Question No: 131


Web catalogue revenue model includes

Online sellers of computer


Gifts, flowers, clothes
Journals
Both first & second options
Ref: PAGE # 130
Businesses using this type of a model include online sellers of computers,
electronic items, books, music, videos, toys, flowers, gifts, clothes
etc. Payment received from customers is the source of earning revenue.

Question No: 132


In which type of approach, we sum up and integrate the information in a particular dimension to
show the result?
Dice
Drill down
Roll up
Slice
Ref: PAGE # 146
Roll-up is the reverse of drill-down. In it we can sum-up or integrate the
information in a particular dimension to show the result. For example
the sale of furniture or computers in a particular year (rather than a specific
quarter) can be viewed using roll-up.

Question No: 133


EDI used for ______.

Used by organizations for transactions that not occur on a regular basis according to a
pre-determined format.

Used by organizations for transactions that occur on a regular basis according to


a pre-determined format.

Both

NONE of Above
Ref: PAGE # 147
ELECTRONIC DATA INTERCHANGE (EDI)
EDI is used by organizations for transactions that occur on a regular
basis according to a predetermined format.

Question No: 134


Supply Chain Mangment broken down into ___________.

Upstream activities

Internal activities

Downstream activities

All of Above
Ref: PAGE # 155
SUPPLY CHAIN:
Supply chain includes all the activities associated with the flow and
transformation of goods from the raw materials stage all the way to the end
user. Supply chain can be broken into three parts, that is, upstream
activities, internal activities and downstream activities
Upstream activities relate to materials/services or the input from
suppliers
Internal activities relate to manufacturing and packaging of goods
Downstream activities relate to distribution and sale of goods to
distributors/customers

Question No: 135


Mailbox:

Outgoing messages can be placed.

Incoming messages can be picked up.


Ref: PAGE # 148
Postbox: where outgoing messages are placed, and
Mailbox: where incoming messages can be picked up

Question No: 136


In many countries, stealing and misusing of meta information for getting competitive advantage
is considered as an offence known as

Tort of Private Nuisance

Tort of Tress passing

Tort of passing off

Defamation
Ref: PAGE # 138
In many countries, stealing and misusing Meta information in this manner to
gain business/competitive advantage is considered as an offence known as
the tort of passing-off.

Question No: 137


Three basic strategies for competitive advantage: __________.

Cost leadership
Differentiation

Focus

All of Above
Ref: PAGE # 157
Competitive Strategy:
Ability of an organization to prosper arises from its competitive advantage
over other organizations operating within its market sector. The strategy of
a business to achieve this goal of competitive advantage is known as
competitive strategy. Three basic strategies for competitive advantage are
as under:
Cost leadership
Differentiation
Focus

Question No: 138


Which of these is an algorithm used in clustering?

K-means

L-means

C-means

F-means
Ref: PAGE # 145
K-means algorithm is normally used in clustering.

Question No: 139


Web is a(n).. Medium to disseminate information.

Passive

Active

Static

All of these
Ref: PAGE # 139
Emotional appeals are difficult to covey on the internet because web is an
active medium largely controlled by the customers

Question No: 140


Each VAN has a centralized computer system that maintains ______________.
One File

Two Files

Three Files

Four Files
Ref: PAGE # 148
Each VAN has a centralized computer system that maintains two
files for each user, that is,
Postbox: where outgoing messages are placed, and
Mailbox: where incoming messages can be picked up
http://www.vuzs.info/
http://groups.google.com/group/vuZs

Question No: 141


EDI Advantages inclues ______

Short time

Reduced Costs

Both

None of Above
Ref: PAGE # 147
Instance, packaging material should only be ordered for just in time (JIT)
delivery, so that E-Pens can cut down on its stock of packaging and reduce
the inventory cost.

Question No: 142


Popular software packages for personal finance are ___________.

Quicken

MS Money

Money 2003

All of Above
Ref: PAGE # 152
Popular software packages for personal finance are Quicken, MS Money
and Money 2003 etc.

Question No: 143


Meta tag contains:
User information

Seller information

Web page key information

Bank information
Ref: PAGE # 138
META INFORMATION:
You know that a Meta tag contains the key information of a web page.

Question No: 144


Popular EDI standards are _______.

ANSI (American National Standards Institute) X12 standard

EDIFACT (United Nations Standard of Electronic Data Interchange for Administration,


Commerce and Transport)

Both

None of Above
REF: PAGE # 147
EDI documents are formatted using published standards. Two popular EDI
standards are ANSI (American National Standards Institute) X 12
standards and EDIFACT (United Nations Standard of Electronic Data
Interchange for Administration, Commerce and Transport).

Question No: 145


Technology development relates to activities ___________.

Fields tests

Maintenance of procedures

Process improvement studies

All of Above
Ref: PAGE # 153
Technology development relates to activities which help improve
product/service that a business is selling and also help improve processes in
every primary activity, e.g., fields tests, maintenance of procedures, process
improvement studies etc.

Question No: 146


Where there are quite a few erroneous or missing values in a row then that row can be deleted or
discarded. This process is called...............

Data Deletion

Data Selection

Data Integration

Data Transformation
Ref: PAGE # 141
Where there are quite a few erroneous or missing values in a row, then that
row can be discarded/deleted altogether. This process is called data
selection.

Question No: 147


Upstream activities of the Supply Chain Managment relate to ___________.

materials/services

The input from suppliers

Both

None of Above
Ref: PAGE # 155
Upstream activities relate to materials/services or the input from
suppliers

Question No: 148


Focus strategy means _____________________.

That ability to sell the goods or provide the service at a price that is lower than that of
competitors

That your product/service has certain quality that makes it more attractive

That concentration on a single aspect of the market

Concentration on many aspect of the market


Ref: PAGE # 157
Focus:
Focus strategy is defined as concentration on a single aspect of the
market. That single aspect can be a particular market segment or market
area or product type.

Question No: 149


What is true about Personal finance?

Sell you products in no time.

Buy you products in no time.

Allows the management of your financial matters in a customized manner

None
Ref: PAGE # 152
PERSONAL FINANCE ONLINE:
Personal finance allows the management of your financial matters in a
customized manner.

Question No: 150


What is true about ERP?

Integrate all business functions

At Single Location

Efficient use of resource

ALL Above
Ref: PAGE # 93
Enterprise Resource Planning:
Enterprise Resource Planning (ERP) is a concept that integrates all aspects
of a business e.g, accounting, logistics, manufacturing, marketing,
planning, project management etc. at a single place. An ERP system such
as SAP is expensive.
http://www.vuzs.info/
http://groups.google.com/group/vuZs

Question No: 151


Supply Chain Managment can be broken down into ___________.

One Activity

Two Activities
Three Activities

Four Activties
Ref: PAGE # 155
Upstream activities relate to materials/services or the input from
suppliers
Internal activities relate to manufacturing and packaging of goods
Downstream activities relate to distribution and sale of goods to
distributors/customers

Question No: 152


VAN Stands for ______.

Value Added Network

Value Added Noise


Ref: PAGE # 148
Value Added Network (VAN):
Value added networks are third party networks that provide services to
execute authorized transactions with valid trading partners using EDI.

You might also like