You are on page 1of 6

Paper Time [90 minutes]

IT430 – E-Commerce

Final Term Fall 2022 (Sample Paper)

MCQs
Take an assessment.

Question#1
What are the different methods available for maintaining state in a stateless system?
A. Temporary file
B. Cookies
C. Hidden form fields
D. All of the above
Question#2
What is the role of servlets in maintaining state in a stateless system?
A. To make the processing faster
B. To write scripts
C. To act as a web server
D. To act as a database management system
Question#3
What are the different methods available for maintaining state in a stateless system?
A. Temporary file
B. Cookies
C. Hidden form fields
D. All of the above
Question#4
What is the main function of a web server?
A. To process HTML code on the client side
B. To serve up the web page requests of a client on the internet
C. To act as a payment processing system
D. To store files in a centralized manner.
Question#5
What is the primary goal of Customer Relationship Management (CRM) software?
A. To integrate all aspects of a business
B. To control the large amounts of data used in conducting business
C. To understand each customer’s needs and customize the product/service
D. To manage the knowledge itself regardless of documentary representation
Question#6
What is an agent in the context of e-commerce?
A. A software program that is capable of autonomous action in its environment
B. A type of e-commerce software used for comparisons and filtering
C. A virus protection software
D. None of the above
Question#7
What are the steps to protect against viruses in e-commerce?
A. Install anti-virus software and avoid downloading plug-ins from the internet
B. Download plug-ins from the vendor’s official website and install a firewall
C. Scan newly obtained disks, programs or files for viruses before use
D. All of the above
Question#8
What type of firewall operates at the network and data link layer of the OSI model?
A. Circuit level firewall
B. Application gateway firewall
C. Packet filter firewall
D. Hybrid firewall
Question#9
What protocol is used to set up a VPN connection?
A. Point to Point Protocol (PPP)
B. Point to Point Tunneling Protocol (PPTP)
C. Remote Access Protocol (RAP)
D. Tunneling Protocol (TP)
Question#10
What is the process of scrambling a message with the help of a key called?
A. Encryption
B. Decryption
C. Authentication
D. Verification
Question#11
What is the name of a popular cryptographic system available for general public use?
A. RSA
B. PGP
C. AES
D. DES
Question#12
What is an electronic signature?
A. A signature in electronic form
B. A physical signature
C. An image of a signature
D. A verbal signature
Question#13
What is a certification authority?
A. A trusted public/private body that attests the association of a particular individual with
his/her corresponding public key.
B. A top-level CA in the hierarchy of CAs
C. A key server
D. A passport office
Question#14
What is a hash function in cryptography?
A. A mathematical function that encrypts a message
B. A method to reveal the original text
C. A unique number representing a message
D. A way to check the authenticity of a message
Question#15
What is the purpose of using a hash function and message digest in cryptography?
A. To decrypt the original text
B. To check the authenticity of a message
C. To encrypt a message
D. To create a digital signature
Question#16
What is Public Key Infrastructure (PKI)?
A. A structured system for key management in cryptography
B. A digital certificate management system
C. A method to create electronic signatures
D. All of the above
Question#17
What is the key length of DES (Data Encryption Standard)?
A. 56 bits
B. 128 bits
C. 2048 bits
D. 256 bits
Question#18
What is the most popular symmetric key algorithm?
A. DES
B. IDEA
C. RC2
D. RC4
Question#19
What type of attack is Key Search Attacks on Public Key Algorithms?
A. Cryptanalysis
B. System-based attacks
C. Attempt to derive the private key from its corresponding public key
D. Analytical Attacks
Question#20
What is the key feature of the E-cash payment system?
A. Speed of transaction
B. Anonymity of the buyer
C. Security of the transaction
D. Traceability of the transaction
Question#21
Who are the participants in the E-cash payment system?
A. Buyer and merchant only
B. Bank and merchant only
C. Buyer, merchant and bank
D. None of the above
Question#22
What is SSL?
A. A protocol developed by Microsoft
B. A protocol developed by Netscape Communications
C. A protocol developed by Internet Explorer
D. d. A protocol developed by Google
Question#23
What does "https" in a URL indicate?
A. The web server is not SSL enabled
B. The web server is SSL enabled
C. The web server is using a different protocol
D. The web server is using a different encryption method
Question#24
What does SSL do at the OSI model?
A. It operates at the Application layer
B. It operates at the Presentation layer
C. It operates at the Session layer
D. d. It operates at the TCP/IP layer
Question#25
How is the secret symmetric key established during an SSL handshake?
A. By the client generating it and sending it to the server in plaintext
B. By the server generating it and sending it to the client in plaintext
C. By the client generating it and encrypting it using the public key received from the server
D. By the server generating it and encrypting it using the private key
Question#26
What is the role of the payment gateway in SET transactions?
A. To connect entities on the internet with those not on the internet
B. To provide security of data transmission to and from the merchant
C. To store certificates and card information
D. To store certificates and order information
Question#27
What is the 5th 'P' of marketing in an e-business?
A. Personalized service
B. Place
C. Price
D. Promotion
Question#28
What are the advantages of electronic catalogues over paper catalogues?
A. Easy to create
B. Good search and comparison capabilities
C. Portable
D. Only limited number of products can be displayed
Question#29
Which e-business model represents the basic form of e-commerce where buyers and sellers interact
directly?
A. Storefront Model
B. Auction Model
C. Drop-Shipping Model
D. Subscription Model
Question#30
Which of the following is the most common type of e-business revenue model?
A. Digital Content Revenue Model
B. Web Catalogue Revenue Model
C. Advertising-Supported Revenue Model
D. Fee-for-Transaction Revenue Model
Question#31
Which of the following revenue models provides service/information for free and earns revenue
through advertisements?
A. Web Catalogue Revenue Model
B. Digital Content Revenue Model
C. Advertising-Supported Revenue Model
D. d) Fee-for-Service Revenue Model
Question#32
What is e-mail marketing used for?
A. Improving customer service
B. Targeting potential customers
C. Global marketing
D. All of the above
Question#33
What is the benefit of personalized direct e-mails?
A. Better response rate
B. Global marketing
C. Better customer service
D. Increased brand recognition
Question#34
What is the purpose of a Meta tag?
A. To locate and rank the web site by search engine
B. To improve the ranking of the website by stealing the Meta information of competitors
C. To enter into a strategic union with another company
D. To differentiate the product from competitors
Question#35
What are the three elements of branding?
A. Differentiation, Relevance, and Cost
B. Differentiation, Relevance, and Perceived Value
C. Cost, Relevance, and Perceived Value
D. Differentiation, Cost, and Perceived Value
Question#36
What is the benefit of transferring an existing brand to the web?
A. It is much easier and less expensive
B. It requires more effort and investment
C. It can help in creating an entirely new brand
D. It is not possible to transfer an existing brand to the web
Question#37
What is clustering in data mining?
A. Grouping data objects that are similar to each other and dissimilar to objects in other
groups
B. A measure of the percentage of time two items occur together
C. A measure of the percentage of time the relationship between two items holds true
D. None of the above
Question#38
What is the objective of supply chain?
A. To help each company to meet needs of the consumer at the end of supply chain
B. To increase quality of product and reduce production cost
C. To manage internal activities of a business
D. Supply, transformation, and end user
Question#39
What is the main purpose of OLAP in data mining?
A. To provide patterns for making predictions
B. To present information stored in databases in a convenient format for decision making
C. To measure the similarity between two items
D. None of the above
Question#40
What are some payment modes accepted for online advertising?
A. Monthly charges
B. Cost per thousand
C. Pay-Per-Performance
D. All of the above

Subjective Questions (3 Marks)

Question#1
What is the main purpose of a firewall in an organization's network?
Question#2
Can a hybrid type of firewall be created by combining circuit level capabilities with application
gateway services?
Question#3
Can the original message be retrieved from a message digest?
Question#4
How is a cryptographic key represented in a computer?
Question#5
How does a merchant get paid for a product or service paid through a credit card?
Question#6
How does the E-cash model work?

Subjective Questions (5 Marks)

Question#1
Analyze the different tiers of the client-server architecture and explain the role of each tier in the
processing of data. Discuss the different operating systems used for web servers and the factors that
determine the choice of a web server in an organization. Provide an example to illustrate your
explanation.
Question#2
What is the process of registration for a buyer and a merchant in the Virtual PIN system?
Question#3
Explain the minting process of an e-cash coin in the E-cash payment system.
Question#4
Explain the concept of market segmentation and its importance in Internet Marketing.

You might also like