Professional Documents
Culture Documents
(* ALL THE ANSWERS MAY NOT BE COMPLETE AND UPTO MARK ,BUT NONE OF THE ANSWER IS WRONG ,SOME ANSWERS ARE NOT GIVEN IN THE TEXT BECAUSE I DIDN’T FOUND THOSE
ANSWERS ON INTERNET AND NEITHER ON MY BOOK” MAMTA BHUSRY”,NO ONE IS RESPONSIBLE FOR THE CORRECTNESS OF ANY OF THE ANSWER)
Ans : The client-server software architecture model distinguishes client systems from
server systems, which communicate over a computer network. A client-server application
is a distributed system comprising both client and server software. A client software
process may initiate a communication session, while the server waits for requests from
any client.
3. (a) What is WAP technology? Discuss the various mobile Information devices.
Ans: WAP technology as discussed in Q1.
Some of the specific benefits for implementing SCM which have been
mentioned in this newsgroup over the years include:
Ans: Mobile computing is a generic term describing one's ability to use technology
while moving, as opposed to portable computers, which are only practical for use while
deployed in a stationary configuration.
5. (a) Explain clearly, the concept of supply chain management giving
Suitable example.
purchasin distributio
production
suppliers g n
internal supply chain
consumers
Packet Private
internet network
filtering
router
Packet filtering applies a set of rules to each incoming IP packet and then forwards or
discard the packet on the basis whether the firewall deny or permit the request.It is based
on IP only,and work in both direction
Application-level proxies stand outside a network and relay data between the Internet and
applications on a desktop. Instead of a direct connection between an internal and external
network, application-level proxies serve as a middle-man for Internet services. The proxy
intercepts all traffic and relays packets of data back and forth between a desktop
application and an Internet service. Many of today's firewalls use and depend on
application-level proxy technology .It is provides more secure connection than packet
filtering.
6. (a) What are the various components of the I-way, discuss it along with a
proper diagram.
Ans: Components of I-way
There are basically three components
(i)Consumer access equipment : it includes various software and hardware which
provides basis for I-way like routers,switches,computers ,set top box,operating
system etc..
(ii)Local on ramps: it provides the linkage between acess equipment and distribution
network. It is of further four types
(a) Telecom based
(b) Cable TV based
(c) Wireless based
(d) Computer based
TDMA features
• Shares single carrier frequency with multiple users
• Non-continuous transmission makes handoff simpler
• Slots can be assigned on demand in dynamic TDMA
• Less stringent power control than CDMA due to reduced intra cell interference
• Higher synchronization overhead than CDMA
• Advanced equalization is necessary for high data rates
• Cell breathing (borrowing resources from adjacent cells) is more complicated than
in CDMA
• Frequency/slot allocation complexity
• Pulsating power envelop: Interference with other devices
CDMA and TDMA both technology have their own set of merits and it can not be
concluded that which one is better
Benefits of TDMA over CDMA
--Dynamic channel allocation
--multiple users can share same network equipment
--CDMA transmits continuously at slow rate, while TDMA transmits only during
assigned burst period
--CDMA increase networkcost by continuously comparing & selecting voice
path,while TDMA doesn’t do such things
8. What do you mean by Encryption? Discuss various Encryption Techniques used
for web security.
encryption is the process of transforming information (referred to as plaintext) using an
algorithm (called cipher) to make it unreadable to anyone except those possessing special
knowledge, usually referred to as a key
It is broadly classified into two types
(i) Private key encryption
(iii) Worm
A computer worm is a self-replicating computer program. It uses a network to send
copies of itself to other nodes (computer terminals on the network) and it may do so
without any user intervention. Unlike a virus, it does not need to attach itself to an
existing program. Worms almost always cause harm to the network, if only by consuming
bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
10 (i) What are the two broad areas of security concerns in E-Commerce?
(ii) What are the various protection mechanisms employed for security.
(iii) Discuss Firewalls and Network Security
Ans same Q17.
(iv) What is health care EDI?
11. Explain the various issues involved in Electronic Payment System. Also give the
various types of EPS.
12. List the different models of Electronic Payment. Explain in details the digital token
based electronic payment system.
First and foremost, online banking is very, very, very convenient. It will allow you to pay
your bills and make transactions anytime during the day and the week. The bank will
never close because you can access it through your laptop or computer. So, no matter in
which country you are anywhere in the world, you can go online and handle your
finances.
Secondly, online banking is very fast, effective and efficient. Over the Internet, you can
make transactions that are typically executed and performed at a much faster pace than
at ATM’s. Online banking services also give you the option of handling several different
bank accounts from one site itself.
Most online banking sites are compatible with programs like Microsoft Money and
Quicken, which makes management of assets more effective.
Just like with anything else, there are disadvantages to online banking services too!
--
the biggest problem is that most people lack trust.
--
Online banking can be difficult to learn for a beginner and a site could take time to start
up.
Some sites provide live online customer support to provide solutions for any problems.
Banking frauds: The number of cases of banking frauds is considerably low so you don’t
have to worry about the safety of your money.
Interorganisational E-commerce
E-commerce activities such as Electronic data interchange, electronic fund transfer
,supply chain management etc. between two or more organizations is called
interorganisational e-commerce.
(iii) What are the two pillars of e-commerce business? Describe in detail.
15. Give the layered structure of EDI and compare EDI versus e-mail. Conceptualize EDI
and compare EDI versus e-mail. Discuss the Legal issues related with e-commerce.
Ans: EDI is considered to be a technical representation of a business conversation
between two entities, either internal or external. EDI constitutes the entire electronic data
interchange paradigm, including the transmission, message flow, document format, and
software used to interpret the documents. EDI is considered to describe the rigorously
standardized format of electronic documents.
16. What do you understand by customer relationship management? What importance has
customer relationship mgmt got in E-Com? How will you implement customer
CRM stands for Customer Relationship Management. It is a process or
methodology used to learn more about customers' needs and behaviors in
order to develop stronger relationships with them. There are many
technological components to CRM, but thinking about CRM in primarily
technological terms is a mistake. The more useful way to think about CRM is
as a process that will help bring together lots of pieces of information about
customers, sales, marketing effectiveness, responsiveness and market
trends.
CRM helps businesses use technology and human resources to gain insight
into the behavior of customers and the value of those customers
Importance of CRM
18. Critically comment on E-commerce as a new and effective way for conducting
business product and providing better customer services on the Internet.
Ans: E-commerce is new and effective way for conducting business due to following
reasons -:
• The Internet gives customers the opportunity to browse and shop at their
convenience and at their place. They can access your services from home,
office, or on the road, 24 hours a day, 7 days a week.
• The Internet allows you to reach people around the world, offering your products
to a global customer base.
Eliminate Middlemen
• With right software, store inventory levels, shipping and receiving logs, and other
business administration tasks can be automatically stored, categorized and
updated in real-time, and accessed on demand.
Workflow automation
• Shipping, real time inventory accounting system which adjusts stock levels and
site, location availability instantaneously
• Secured, automated registration verification, account entry and transaction
authorization features
• Automated RFP and RTQ features for vendor bid development and selection.
• Banking and accounting features customized for pre-approved third party direct
sales, vendor, consignment or internal transfer transactions.
19. What is the Customer-Oriented value chain? Describe three forces lead to the www’s
emerges as the single most dynamic force in information technology.
20. (i) What is the difference between public key encryption and private key encryption?
Ans: Difference between public key encryption and private key encryption
--public key encryption do not use any shared key
--digitals signature can be used in public key encryption for authentication
--public key encryption is considered more secure than private key
Keeping in line with other countries, India also has passed its first cyber law, The Information
Technology Act 2000, which aims to provide the legal backbone for enabling ecommerce in the
country. However the arrival of Internet resulted in the rise of new and complex legal issues.
Though India has a detailed and welldefined legal system in place, with laws like the Indian
Penal Code, the Indian Evidence Act 1872, the Banker's Book Evidence Act, 1891 and the
Reserve Bank of India Act, 1934, the Companies Act, and so on. But at the time of enactment of
these laws nobody could really visualise about the Internet. We must remember that all the
existing laws in place in India were enacted keeping in mind the relevant political, social,
economic, and cultural scenario of the corresponding time. As like the rest of the world, the
existing laws of India also could not handle the various cyber space activities. As such the need
arose for a Cyber Law.
BEST OF LUCK !!!!! SECURE FULL MARKS!!!
AND REMEMBER ONE RULE “CONFUSE THE EXAMINER WHEN YOU DO NOT
KNOW THE EXACT ANSWER”