IT430 MCQs


IT430 Solved MCQs


Do you think that "www.vu.edu.pk" can be considered as university's advertisement website?
Select correct option:
Yes
No


Characterization and Clustering belong to which of the following types of Data Mining?
Select correct option:

Predictive
Selective
Descriptive
Additive
Reference:
(Page # 141)


Traditionally Marketer use the market segmentation(s) like
Select correct option:


Geo-graphic Segmentation
Demographic Segmentation
Psychographic Segmentation
All of the above
  Reference:
(Page # 131)



Advertising Subscription Mixed Revenue Model includes
Select correct option:

Online journals
Sports information services
Business week online
All of the above
  

OLAP stands for……………
Select correct option:


Online Analytical Program
Online Analytical Processing
Online Application Program
Online Analysis Performance
Reference:
(Page # 145)



E-Business promotions are used to _______.
Select correct option:

Attract the customer to the product and convince him/her to buy it.
Get credit card information from the customer.
Complete a transaction between customer and seller.
None of above
Reference:
(Page # 133)


Television, radio and print media are in a (n) ……………………. Mode.
Select correct option:


Passive
Active
Static
Dynamic
Reference:
(Page # 139)
 
CRM stands for ...............
Select correct option:


Customer Relationship Management
Customer Related Management
Customer Resembling Management
Customer Reallocation Management
 Reference:
(Page # 136)

Which one is not an example of search engine?
Select correct option:


Yahoo
Google
Alta vista
Gawab
Reference:
(Page # 137)


Meta tag contains:
Select correct option:


User information
seller information
web page key information
bank information
 Reference:
(Page # 138)


Free-Trial advertisement means _________.
Select correct option:


Free coupons are placed on certain websites for customers so that they can use it for shopping.
Customer is offered to use the product free of cost for a specific amount of time.
Items bought are delivered to the customers with no delivery cost.
The company didn’t had to pay for this advertisement.
  Reference:
(Page # 133)

In many countries, stealing and misusing of meta information for getting competitive advantage is considered as an offence known as
Select correct option:


Tort of Private Nuisance
Tort of Tress passing
Tort of passing off
Defamation
Reference:
(Page # 138)

If a company's marketing stretegy is focusing on customers having age less than 30, which of the following marketing segmentation technique is being used by company?
Select correct option:


Demographic Segmentation
Geographic Segmentation
Psychographic segmentation
Behavioral segmentation
Reference:
(Page # 131)

Press release can provide information about current events and news to, which of following, via internet?
Select correct option:


Print media
T.v commercial
Press or media
T.v program.
Reference:
(Page # 135)


Fee for Transaction Models include
Select correct option:


Travel Agents and Insurance brokers
Automobile Sales and event tickets
Stock brokers and online banking
All of the above
 Reference:
(Page # 130)


An E-Business can't have direct feedback from the customer in B2C.
Select correct option:


True
False
  
Creation of separate experiences for customers based on their behavior is called
Select correct option:


Demographic segmentation
Behavioral segmentation
Geo-Graphic Segmentation
None of the above
 Reference:
(Page # 132)

What is the right sequence of steps involved in development of customer’s relationship with the business?
Select correct option:

Familiarity, Awareness, Commitment, Exploration, Separation
Awareness, Exploration, Familiarity, Commitment, Separation
Familiarity, Awareness, Exploration, Commitment, Separation
Awareness, Commitment, Familiarity, Exploration, Separation
   Reference:
(Page # 136)

At deposit stage, the serial number is ……………..by E-Cashbank


       Known


       Unknown


       Kept Secret


       Informed

Reference:
(Page # 118)


How many kinds of Web Portals are?

       3

       2

       5

       6

Explanation:
There are only two kinds of web portals, one is vertical portals which provides information about single interest like online shopping sites are best example of vertical portal site, educational site is also an example of vertical portal. Second kind of web portal is horizontal web portals which provide information about everything or multiple things. Search engine is best example of horizontal web portal.
Reference:
(page # 129)



Let us, suppose that you have hosted your e-commerce website,
 When you provide “opt-in e-mail” option to your customers on your website and customer opt for it , what does it mean to receive ?


       Information about product through advertisement


       Information about product through e-mail


       Information about services available on it


       Information about News through e-mail.

Reference:
(page # 133)



Track the customers online and do personalization is only possible through which of the following file(s) analysis.


       log files


       cookie


       data mining


       log files and cookies.

Reference:
(page # 136)



When customer life cycle is used to create different groups of customers, it is called?


       Targeting Customers


       Dynamic groups


        Customer Life Cycle Segmentation


       Group Development

Reference:
(page # 137)



Network addresses 128--- 191 range belongs to which of the following class networks?


       A

       B

       C

       E

Reference:
(page # 10)


Which of the following property falls in HTTP?

                               Stateless

       Stateful

       Temporary

       All of these
Reference:
(page # 3)



FSTC stands for:

                          Financial Services Technology Consortium

        Financial Secrets Technology Consortium

       Final Security threats control

       First Service Technology Consortium
Reference:
(page # 113)



Supply chain can be broken into three parts, that is  ----------------- , ----------------------- and -------------------- activities.


       Internal, external  support


        Upstream, internal ,downstream


       Primary, Secondary ,R&D


       None of them

Reference:
(page # 155)



The process of taking active role in working with suppliers to improve products and processes is called?


       Value chain management


       Supply chain management


       Supply chain management software


       Porter Model

Reference:
(page # 155)



What is Ultimate consumer orientation?

       Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain.


       Secondary Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain.

       Supply chain is to help each company to meet needs of the supplier, seller and buyer  at the end of supply chain.


       None of them


Reference:
(page # 156)





Many search engines rank the site by using a program called


              Spider

       Scorpion

       Moon

       Cobweb
Reference:
(page # 138)



E-commerce is a combination of three different areas of study, namely, --------,
---------------- and ----------------


       Internal, external support, Support


       Technology, business and law/policy

       Primary, Secondary, R&D


       Sale, purchase, feed back

Reference:
(page # 161)




In which type of data mining, Apriori algorithms is used?


       Classification

       Association

       Characterization

       Clustering

Reference:
(page # 143)


EDI has the key feature(s)

       No paper work

       No human intervention

       Exchange of information takes place in seconds

       All of these



Reference:
(page # 147)

Addresses are tied to the device itself and give no clue to it's location on a global scale. This is the characteristics of


       IP


       RIP


       MAC


       None of the given




When two or more intranets are connected to each other they form a/an ------------- .

       intranet

       internet

       extranet

       VPN

Reference:
(page # 2)


Which attribute can be used to make a region non-clickable?


       none of the given


       target


       alt


       nohref


Reference:
(page # 37)


Which of the following payment mode does not require customer to pay interest  to the bank on each transaction?

       Credit card

       Debit card

       Electronic check

       All of the above

Reference:
(page # 110)


Cyber wallet can automatically assemble the correct payment and pay it too.

       True

       False




SET doesn’t require special software on the client or merchant side.


       True

       False



Which model allows the users to log-on on a website and assume the role of  bidder or seller?

       Online Banking.

       Storefront Model.

       E-Learning.

       Auction Model.

Reference:
(Page # 128)

According to Michael Porter, “fabricating” is an example of primary activity in a strategic business unit. Identify the area in which this task is performed.


       Market and sell


       Deliver’ activities relate to storage


       Purchase materials and supplies


        Manufacture product or create service

Reference:
(Page # 152)



Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Is it?

       True


       False





In the physical world three elements must be satisfied in order to make a valid contract, namely, offer, ---------------- and ----------

       Acceptance and consideration


       Acceptance and Rejection


       Approval and consideration


       None

Reference:
(page # 178)


In online environment acceptances may be issued by an imposter/cheater that has authority to bind the online business

       True


       False




#00ff00 in HTML indicates

       Pure green color

       Pure blue color

       Pure red color

       Pure yellow color

Reference:
(Page # 23)

Virtual PIN Payment System requires both merchant and buyer to register with _______________.


       Auto Clearing House (ACH)

       First Virtual (FV)

       DSS (Digital Signature Standard)

       DES (Data Encryption Standard)

Reference:
(Page # 110)

Classification and Association belong to which of the following  types of Data Mining?

       Selective

               Predictive

       Descriptive

       Additive
Reference:
(Page # 141)


Which one of the followings is an example of Banner advertising?
Select correct option:

Branding
Affiliate programs 
Partnership
All of these
Reference:
(Page # 138)
CPM is an advertising payment mode. CPM stands for ________.
Select correct option:

Cost Per Month
Cost Per Minute
Cost Per Megabyte
Cost Per Message
Reference:
(Page # 134)

Which one is not an example of search engine?
Select correct option:

Yahoo
Google
Alta vista
Gawab  

Reference:
(Page # 137)

In which type of approach, we further dig the data for retrieving information from data warehouse?
Select correct option:

Slice
Dice
Drill down 
Roll up
Reference:
(Page # 146)
Let us, suppose that you have hosted your e-commerce website, Promotion messages can be sent when potential client is
Select correct option:

online
offline
both online and offline
visiting head office

Reference:
(Page # 133)
Digital Content Revenue Model Includes
Select correct option:

Legal information services
Online journals
Online Libraries
All of the above

Reference:
  (Page # 130)

Which of these is a tool that can be used to improve customer services?
Select correct option:

Log file analysis
Cookies
Data mining
All 

Reference:
(Page # 136)

What does Telemarketing means?
Select correct option:

Marketing through charting
Marketing through telephone
Marketing through emai
Marketing through web casting
Reference:
(Page # 133)
In which type of data mining, ID3 algorithms is used?
Select correct option:

Classification 
Association
Characterization
Clustering
Reference:
(Page # 141)

Some web retailers allow their customers to create their own product. It is called.
Select correct option:

One to one Marketing 
One to many Marketing
Many to one marketing
All of the above
Reference:
(Page # 132)
Free-Trial advertisement means ___________.
Select correct option:

Free coupons are placed on certain websites for customers so that they can use it for shopping.
Customer is offered to use the product free of cost for a specific amount of time.
Items bought are delivered to the customers with no delivery cost.
The company didn’t had to pay for this advertisement
Reference:
(Page # 133)

Total Marks: 1
The length of a message digest is ________.
Select correct option:

32 to 64 bits
64 to 128 bits
128 to 256 bits
256 to 512 bit
 Reference:
(Page # 103)

Key version represents public key by
Select correct option:

Buyer
Seller
E-Bank
Certification Authority
 Reference:
(Page # 116)





The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the ___________.
Select correct option:

Bank
Merchant
Client
None
 Reference:
(Page # 116)


ACH is a centralized system used by different interconnected banks for clearing payment requests.
Select correct option:

True
False


Centralized Account Payment Model uses unique _______ of users as their account identifier.
Select correct option:

Residence address
E-mail address
Office address
None
 Reference:
(Page # 113)

SET and SSL both are same with respect to security.
Select correct option:

True
False
 
What are the security threats in VPS?
Select correct option:


a. Email hacking
b. Credit card number stolen
c. Missing of delivery
d. A and B


What is function of Cyberwallet?
Select correct option:

Store coins
Manage Coins
Record transactions
All of above

SET and SSL both are same with respect to security.
Select correct option:

True
False



Basic difference between Virtual PIN Payment System and Electronic Check is _____.
Select correct option:

Encryption
Registration with bank
No. of participants
There is no difference between them


SETSET(secure Electronic Transaction) was developed by
Select correct option:

Microsoft
Netscape Navigator
Master Cards and VISA
All of the options

 
SSL stands for
Select correct option:

Secure Socket Layer
Security Service Layer
Sub Secured Length
None of these

What is basic advantage of symmetric algorithms?
Select correct option:

Symmetric key does not use any encryption
Symmetric algorithms are faster
Symmetric algorithms are easy to understand
All of above

 
Which of these keys can be used for encryption instead of using pair of private and public keys?
Select correct option:

Systematic key
Asymmetric key
Symmetric key
All of above

Using SSL, we type in URL as :
Select correct option:

https
httpc
httpc
httpi
 Reference:
(Page # 121)

In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT included:
Select correct option:


Buyer Accounts identifier
Buyer password
Address of Merchant
Actual amount of money in favor of merchant
 
A unique large number, generated as a result of applying hash function on a message is called ______.
Select correct option:


Hash message
Message digest
Digitally singed message
Secret message
 Reference:
(page # 103)
FVIPSS stands for _______.
Select correct option:


First Virtual Internet Payment System Server
First Virtual International Payment System Server
First Virtual International Payment System Services
First Virtual Internal Payment System Services
Reference:
(Page # 110)
 
Virtual PIN Payment system is considered suitable for ________.
Select correct option:


Low-cost items
High-cost items
Very expensive items
Every kind of items

Which of these is a primary participant in E-Cash Payment system?
Select correct option:

Buyer
Bank
Merchant
All

Most of the electronic payment systems on internet use cryptography.
Select correct option:

True
False

In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last …………………withdrawals to the E-bank.
Select correct option:

10

12

14

16
Reference:
(page # 119)
 
The key feature of E-Cash Payment system is
 Select correct option:

Anonymity

Security

Cryptography

None of these
Reference:
(page # 116)

At minting stage, the client is ……………..by E-Cashbank
 Select correct option:

Known

Unknown

Secret

informed
Reference:
 (page. 118)

Cipher suite is a combination of
 Select correct option:

Cryptographic Algorithm

Authentication methods

Security layers

Cryptographic Algorithm And Authentication methods

Reference:
(page. 121)
SETSET(secure Electronic Transaction) was developed in
Your browser may not support display of 
this image.Select correct option:  
Your
 browser may not support display of this image.
1995
Your
 browser may not support display of this image.
1996
Your
 browser may not support display of this image.
1997
Your
 browser may not support display of this image.
1999
Reference:
(page no. 122) 
Symmetric algorithms are faster than asymmetric.
Select correct option:
            True
            False
 Reference:
(Page # 105)
Which entity does not include in SET(secure Electronic Transaction)?
Select correct option:
            Seller
            Buyer
           Payment gateway
            Bank
 Reference:
(Page # 122)





A paper signature is believed to be more reliable than a digital signature.
Select correct option:
            True
            False


If a key is 4 bit in length, how many unique key values are possible?
Select correct option:
            4
            8
            16
            32
Explanation:
 A key value is always in binary form. A Binary Number is made up of only 0s and 1s.

So each digit has only two possibilities: 0 or 1, So now we try to check all possible values of 4.
4 bit = 0000,
            0001,
0010,
0100,
1000,
0011,
 0110,
1100,
0101,
1010,
1011,
1101,
1001,
1110,
0111,
1111
 Hence prove that if a key is 4 bit in length, then 16 unique key values are possible of that key.




Hash function is a __________
Select correct option:
            Communication protocol
            Hardware device
            Encryption mechanism
            Log file





Which of these attacks have been reported on symmetric key algorithms?
Select correct option:
            Key Search Attacks
            Cryptanalysis
            System-Based Attacks
            All
 Reference:
(Page # 108)
Payment gateway is an organization which connects those entities to the internet which are offline.
Select correct option:
            True
            False

 Reference:
(Page # 122)



How many elements an e-coin has?
Select correct option:
            1
            2
            3
            4

 Reference:
(page # 116)




EFT stands for _____________.
Select correct option:
            Electronic Film Transmission
            Electronic Funds Transfer
            Electronic File Translation
            None of above
 Reference:
(Page # 114)



________ is used to interpret and show contents of the webpage.


Select correct option:



HTML
Notepad
Browser
Computer




What is identified by the tag ?


Select correct option:




Horizontal frame
Bottom Frame
Top Frame
Vertical Frame




Which of the following is NOT an advantage of CSS?


Select correct option:




Define the look of your pages in one place
Works on version 4 browsers or newer
Easily change the look
Implement same formatting each time tag is used.

Links are used to connect ____________.


Select correct option:




Images
Text
Images and web documents
All of the given


Which of the following are correct tags used for frames,


Select correct option:




<Frame></Frame>
<Frameset><Frame></Frame></Frameset>
<Frameset><Frame></Frameset>
<Frameset><Frame></Frame>




If you have a less space for e-mails on internet then _________ protocol is used.
Select correct option:

SMTP
IMAP
POP
POP3

A _________ is a web page populated with text boxes,drop-down lists and commands buttons to get information from the user.
Select correct option:


Hypertext Link
Form
Table
Button


Default web page background color is __________.
Select correct option:

Green
Red
White
Blue

_____________ are normally used to get yes/no or true/falseinformation from a reader.
Select correct option:


Check Boxes
Radio buttons
Submit Buttons
Selection List

Which of the following is NOT valid HTML code line?
Select correct option:

<frameset rows="16%,84%">
<frameset columns="16%,84%">
<frameset cols="100,150">
<frameset cols=”50%,50%” rows=”16%,84%”>

The attributes used by depend on the type of?
Select correct option:

Plug-in being used
Browser being used
ISP being used
Sound/movie being used

When a visitor clicks a _________, the entries in form areset to the default values.

Select correct option:




Button
Radio Button
Submit Button
Reset Button



What is the meaning of SRC in frame tag?

Source for image saved on your disk
Source for images saved on your disk
Source of page saved on your disk
Source of Pages saved on your disk


In what form style rules are presented?
Select correct option:

selector { property= value }
selector ( property: value )
selector { property: value }
selector ( property= value )

www.amzon.com as you all familiar with it. Which of the following loyalty stages its customers are:: Detail about amzon.com Amazon was one of the first major companies to sell goods by Internet, and was an iconic "stock in which to invest" of the late 1990s dot-com bubble. Jeff Bezos founded Amazon.com, Inc. in 1994, and launched it online in 1995. Amazon.com started as an on-line bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3 format, computer software, , etc. Amazon has established separate websites in Canada, the United Kingdom, Germany, France, China, and Japan.

Affiliation
Awareness
Separation
committment



Which of following marketing campaigns are cheap an effective way to target potential customers?
Select correct option:

Sale forces
E-mail
Media promotion
Marketing software
Reference:
(Page # 133)
Which of the following is cheapest and quickest marketing technique to reach distant customers?
Select correct option:

E-Mail marketing
Telephone marketing
SMS marketing
Advertisement letters marketing
Reference:
(Page # 133)
In Frequent-Flyer Miles marketing, customer of the business earns specific miles free of charge from _______.
Select correct option:

Bus service
Train service
Airline
None of above
Reference:
(Page # 133)
Web catalogue revenue model includes
Select correct option:

Online sellers of computer
Gifts, flowers, clothes
Journals
A and B 
Reference:
(Page # 132)

Press release can provide information about current events and news to, which of following, via a internet?
Select correct option:

Print media
T.v commercial
Press or media
T.v program.
Reference:
(Page # 135)


Which of these can be used for advertisement purpose?
Select correct option:

Telephone
Newspapers
Magazines
All of above 
Reference:
(Page # 133)
Which of these is NOT a stage of knowledge discovery process?
Select correct option:

Transformation
Data mining
Pattern evaluation
Process evaluation

Reference:
(Page # 140)





How many stages involve in customer loyalty model for creating good customer relationship?
Select correct option:

6
5
4
3

In e-business, market research is slower than offline business.
Select correct option:

True
False

Which statement is most appropriate description of the term “Interactive-advertisement”? 
Select correct option: 

By making an advertisement message using flash animation.
Putting an audio or video message on the website to attract customer.
By avoiding customer’s involvement in the advertisement process.
By involving the customer in the advertisement process itself.
Reference:
(Page # 134)

An E-Business can't have direct feedback from the customer in B2C. 
Select correct option: 

True
False

When you email at it430@vu.edu.pk , your email is automatically sorted and replied to your ID. 
Select correct option: 

True
False

Many search engines rank the site by using a program called 
Select correct option: 

Spider 
Scorpion 
Moon 
Cobweb

Reference:
(Page # 138)

Advertising Supported Revenue Model includes 
Select correct option: 

Yahoo portal
Employment sites
Newspaper Publishers
All of the above

Reference:
(Page # 130)

When customer life cycle is used to create different groups of customers, it is called? 
Select correct option: 

Targeting Customers
Dynamic groups
Customer Life Cycle Segmentation
Group Development 

Reference:
(Page # 137)


While designing a website, which of the following factors an internet marketer should pay attention to?
Select correct option:

Easy site navigation (i.e. Site map)
Frequently asked questions (FAQs) section
Privacy policy
All of above 
Reference:
(Page # 132)





What is the right sequence of steps involved in development of customer’s relationship with the business

Familiarity, Awareness, Commitment, Exploration, Separation
Awareness, Exploration, Familiarity, Commitment, Separation
Familiarity, Awareness, Exploration, Commitment, Separation
Awareness, Commitment, Familiarity, Exploration, Separatio


Reference:
(Page # 137-138)


Dividing potential customers on the basis of variables such as social class, personality, or lifestyle is called____________.
Select correct option:

Demographic Segmentation
Geographic Segmentation
Psychographic segmentation 
Behavioral segmentation
Reference:
(Page # 131)

Which of the following option best represent “Data mining can improve response rate tremendously”? 
Select correct option

Direct mailing
Personalization technology  
E-business
Opt-in e-mail
Reference:
(Page # 140)
Creation of separate experiences for customers based on their behavior is called 
Select correct option

Demographic segmentation
Behavioral segmentation   
Geo-Graphic Segmentation
None of the above
Reference:
(Page # 132)
Which of the following is NOT an advertising payment mode
Select correct option

Pay-per-sale
Pay-per-click
Pay-per-keypress
Pay-per-lead
Reference:
(page 134)

The result of OLAP is displayed in the form of a __________. 
Select correct option

Data square
Data Triangle
Data cube  
Data circle
Reference:
(Page # 145)

Which of the following is a business promotion?
 
Select correct option

Free-Trials
Free-Shipping
Both of these
None
Reference:
(Page # 133)







Top of Form



Suppose you are using "warid telecom" as your mobile connection and you ignor any other mobile company's advertisement because you want to keep using warid no matter what others offer. Your relationship with warid is at _______________.
pointer5Select correct option:

Exploration stage
Commitment stage
Awareness stage
Separation stage
pointer5 
Bottom of Form
Top of Form
Bottom of Form
Top of Form
Bottom of Form
Top of Form

Question # 8 of 10 ( Start time: 04:25:46 PM )
Total Marks: 1
Which of the following is an advertising payment mode?
pointer5Select correct option:

Pay-per-person
Pay-per-page
Pay-per-sale
Pay-per-minute
pointer5 
Bottom of Form
Top of Form

Bottom of Form



 





http://c.statcounter.com/5369472/0/31a72d6d/1/
At deposit stage, the client is ………....by E-Cash bank
Secret
Unknown
Known
None of these

Reference:
(Page # 118)


Four P s in Marketing Mix are

Product, price, place, promotion
Price, person, place, problem
Place, product, property, promotion
Promotion, place, product, planning



MAC stand for

Media Access Control
Media Access Consortium
Member of Asian Community
None of these

Reference:
(Page # 13)

Which Protocol is used for downloading messages to client machine from servers?

SMTP
POP3
IMAP
POP3 and IMAP

Reference:
(Page # 18)


How can you make an e-mail link?

<mail>xxx@yyy</mail>
<mail href="xxx@yyy">
<a href="mailto:xxx@yyy">
<a href="xxx@yyy">


What does the Target= _self tag perform function?

Loads the new page into the same frame
Loads the new page into the entire window
Loads the new page into a new browser window
All of the above
 Reference:
(Page # 33)



An electronic check contains a(n)__________________ to the payer s bank to make a specified payment to the payee.
Serial#
Private key
Instruction
All of the above

Reference:
(Page # 113)


Upstream activities relate to?

Materials/services or the input from suppliers
Manufacturing and packaging of goods
Distribution and sale of goods to distributors/customers
Input from suppliers and Distribution

Reference:
(Page # 155)


Exclusive right granted by law to make, use and sell an invention. What is called?
Parasites
Trade mark
Patent infringement
Copyright

Reference:
(Page # 181)



ANSI stands for ……?

American National Standards Institute
All Network Standards Institute
American New standards Institute
Australia National standards Institute
Reference:
(Page # 147)


Support activities in Value Chain model includes

Finance and Administration
Human Resources
Technology Development
All of these.

Reference:
(Page # 153)

UDP uses a ACKNOWLEDGEMENT mechanism for the delivery of data.

True
False


You define a method using

obj.method
obj.method[]
obj.method()     
obj-method

Which of the following is a valid variable name?

6th_student_CGPA
first_student_CGPA
last student CGPA
*any_student_CGPA

Reference:
(Page # 54)



PKI stands for ___________.

Public Key Instrument
Public Key Information
Public Key Instruction
Public Key Infrastructure

Reference:
(Page # 107)


Which of the following payment system does not involve the use of encryption?

Electronic check
Electronic cash
Virtual PIN
None of above

What is the right sequence of steps in Electronic Check process?

Payee s bank Payer s bank Payee Payer.
Payer Payee Payee s bank Payer s bank.
Payer s bank Payee Payee s bank Payer.
Payer s bank Payee s bank Payer Payee.


The basic difference between Virtual PIN System and Electronic Check is _________.

Use of encryption
Registration with bank
No. of participants
No difference between them

In E-Cash Payment system, merchant deposits the coins in the bank to check the
______ of coins.

Number
Validity
Private key
Sender

SSL doesn t require special software on the client or merchant side.

True
False


Which e-business helps to improve policies, procedures, customer services, and general operations of other businesses?

Online shopping malls.
Selling intellectual property online.
Online service providers.
Online automotive sites and energy online.

Reference:
(Page # 129)


Which of the following is an advantage of electronic catalogue?

Large fix cost if used for small no. of products.
Ability of updating product information.
Need for customer skill of computers and browsers.
Difficult to develop catalogue.


Which of the following is an advantage of paper catalogue?

Easy to create catalogue without high technology
Reader is able to look at catalogue without computer system
More portable than electronic catalogue
All of above

Reference:
(Page # 127)

In online business, market research becomes slower than offline business.
True.
False.


Identity that machine which services the internet request?

Web Client

Web Server

Browser

Mozilla

Reference:
(Page # 2)

What does ETO stands for

Electronic Transactions Ordinance

Electric Transport ordinance

Electronic Treaty Organization

All

Reference:
(Page # 163)


In which type of data mining, ID3 algorithms is used?

Classification

Association

Characterization

Clustering

Reference:
(Page # 141)


Which one of the following algorithms does not include in symmetric key algorithms

DES

RC2

RC4

RSA

Reference:
(Page # 108)


Choose the correct HTML code line which left-align the content inside a table cell.

<td leftalign>
<td valign="left">
<td align="left">
<tdleft>


We can divide the Client Server architecture up to:

1 Tier
2 Tier
3 Tier
N –Tier

Reference:
(Page # 89)

In the digital signature technique, the sender of the message uses ________ to create cipher text.
His or Her own symmetric key
His or her own private key
His or her own public key
The receiver`s private key

DSS stands for

Digital Signature Standards
Digital Support Standards
Decision support system
Digital Sign System

Reference:
(Page # 108)
The process of taking active role in working with suppliers to improve products and
processes is called?

Value chain management
Supply chain management
Supply chain management software
Porter Model

Reference:
(Page # 155)

A firm Glory Enterprise and it wants to have its web site. It also wants to have the word glory as a part of its domain name because for years it has been recognized in the physical world through this word. However, at the time of registration of its domain name it finds that a person Mr. A who has nothing to do with the business of the firm or the word glory has already registered a domain name containing this word as a part of it. Since there cannot be two similar domain names, the firm is forced to request Mr. A to transfer that domain name to it. In response, if Mr. A blackmails or claims ransom from the said firm, He would be said to have committed -------------.

Cyber squatting.
Parasites
Patent infringement
Trade mark and domain name conflicts

Reference:
(Page # 181) 
In which type of approach, we further dig the data for retrieving information from data warehouse?

Slice
Dice
Drill down
Roll up

Reference:
(Page # 146)

In which type of approach, we sum up and integrate the information in a particular
dimension to show the result?

Dice
Drill down
Roll up
Slice

Reference:
(Page # 146)

 Which activity does not include in Primary activities

Identify Customers
Design
Delivery
Administration

Reference:
(Page # 152)

What of the following is the correct HTML tag for making a drop-down list?

<input type="list">
<input type="dropdown">
<select>
<list>

Reference:
(Page # 29)

What does HTML stand for?

Hyperlinks and Text Markup Language
Home Tool Markup Language
Hyper Text Markup Language
Homepage Text Making Language

JavaScript variables can begin with ----------- .

a lower case letter
an underscore character
a dollar sign
all of the above

Reference:
(Page # 54)


Which currency is used in e-cash Payment system?

Dollar
Coin
Penny
Cent

Web browser and client wallet are installed on __________.

Client's computer
Bank's computer
Merchant's computer
None of above


Job searchers can search for jobs and employers can hire effectively using.....

Online recruiting web sites.
Online banking web sites.
Online trading and lending web sites.
Online news services web sites.

Reference:
(Page # 128)
Customers grouped by variables such as social class, personality or approach to life or lifestyle, is called ___________.

Demographic Segmentation.
Geographic Segmentation.
Psychographic segmentation.
Behavioral segmentation.

Reference:
(Page # 131)