Sunteți pe pagina 1din 44

Join Us on http://vustudents.ning.

com/

Come & Join Us at VUSTUDENTS.net

For Assignment Solution, GDB, Online Quizzes, Helping Study material,


Past Solved Papers, Solved MCQs, Current Papers, E-Books & more.

Go to http://www.vustudents.net and click Sing up to register.

VUSTUENTS.NET is a community formed to overcome the disadvantages of distant


learning and virtual environment, where pupils don’t have any formal contact with their
mentors, This community provides its members with the solution to current as well as the
past Assignments, Quizzes, GDBs, and Papers. This community also facilitates its
members in resolving the issues regarding subject and university matters, by providing
text e-books, notes, and helpful conversations in chat room as well as study groups. Only
members are privileged with the right to access all the material, so if you are not a
member yet, kindly SIGN UP to get access to the resources of VUSTUDENTS.NET

» » Regards » »
VUSTUDENTS.NET TEAM.
Virtual University of Pakistan

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

T430 SHORT NOTES


What is Server? Where is the server situated?
The internet is neither at one place nor does it can be
controlled from one place. Internet has many servers at
different locations. Internet is on every server that runs
even one website. But there are companies that register
websites these companies are called internet service
providers (ISP). Internet service providers have different
servers to register websites. For example brainnet, paknet,
PTCL are examples of internet service providers (ISP)
Why we classify E. Commerce and what is the need for
that?
In Classification objects are categorized into different
groups based on similar features. A general classification of
E Commerce is done by the nature of transactions. Dividing
different transactions which are similar to each other into
different groups helps reduce complexity. This Classification
makes things simple and easy to understand.
What is the difference between intranets and extranet
what is the term stateless means?
Intranet is networks that provide communication within an

organization. While extranet is a network that provides

communication within an organization and between its

allies. The term stateless means that sever does not store

information about previous or request after it.

Consumer to consumer and Consumer to business

C2C also called person to person e commerce is a type of

business in which buying and selling of goods occur

between individual consumers via the internet. In most

cases, a third party may also involve to facilitate the

transactions. EBay application is an example of

C2C. Through Ebay.com consumers sell their goods and

services to other consumers.

C2B is a type of e commerce business in which consumers

sell their products to the companies and the companies pay

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

them. This is completely opposite to business to consumer


where the businesses pay the individual. An example of C2B
is the online advertisement people put on major websites
like Amazon and Google. There is also a website called C2B
Direct that facilitates consumers to get in contact with
businesses to do e commerce.
What is work of logs files?
A log file is a file that is automatically created and
maintained by the servers and it automatically stores the
activities of a user. A log file normally contains the record
of transactions performed. The positive thing about a log
file is that it stores the transactions of the users for
example pages visited by user and the disadvantage of the
log file is that log files does not maintain privacy of the
users.
What is the main different between internet and
extranet?
Intranet is networks that provide communication within an
organization. While extranet is a network that provides
communication within an organization and between its
allies. While internets is a network that provides
communication throughout the world. Internet is a public
network i.e. The information flows in its actual form while
intranet is a private network, it is not accessible to users
outside the organization and the information is transmitted
in the form that is not understandable for hackers if they
access the information while transmission between sender
and receiver. for this different encryption algorithms are
used.
How the “log file" will be created in presence of http
statelessness and on which location it is created?
As HTTP is stateless which means that server is not aware
about the previous requests or the requests following it and
you are aware of the four steps given in the handouts that a
connection request is made by the client, makes a TCP/IP
connection, web site is download at the client side and at

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

the last step connection is terminated and a new connection


is established. Now as you know that HTTP is stateless in
order to recover previous states, log files are explicitly
maintained by the servers. Through log files server knows
about previous requests and states. Log files are maintained
at server side.
In the lecture statelessness of the HTTP has been
explained that the connection with server is broken not
with the Internet. How the connection is broken we have
never noticed it. Can we notice how the server
connection is broken?
HTTP is stateless because every request is independent of
the other requests. Server is not aware about the previous
request or the request after it. Server does not store
information about the previous request. Statelessness of
HTTP can be easily understood from the analog telephone
system which is a very good example of statelessness. In
analog telephone system a user calls a pre specified number
like 17 and a connection is established. Then the user tells
the telephone operator the required number and they
provide the number required. The call is disconnected
freeing the line to serve other users. The advantage of
stateless is that we can fulfill large number of requests.
In HTTP switches between connection establishment
and disconnection is so fast that we are not able to observe
it. Moreover connection is established or disconnected by a
server.
What is stateless?
Here, the term stateless means independence. HTTP is
called stateless because of the reason that execution of
commands is independent. It does not require any
knowledge of the commands that came before it or after it.
It is completely separated from the previous and up
coming commands.
What is common log file?

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

A common log file is a file that is automatically created and


maintained by the servers and it automatically stores the
activities at server side. Common log file resides at server
side.i.e. It is stored at server side. A log file normally
contains the record of transactions performed. The positive
thing about a log file is that it stores the transactions of the
users for example pages visited by user and the
disadvantage of the log file is that log files does not
maintain privacy of the users.
What is the basic concept of the server?

What is the role of the server in internet connection?

Who is the server?

What is the protocol?

A server can be both hardware and software. In software


terminology we can define a server as, a server is a
computer program that fulfills the requests or needs of
other programs running on the same or different computers.
In hardware terminology we can define a server as, a server
is a computer dedicated to fulfill the requests of other
clients computers. Or more simply there are two types of
computers in a network the first one are requesting
computers called client and the others are those who fulfills
the requests of clients called server.
In internet servers can be used for different purposes like
storing websites and providing them to client computers on
requests, fulfilling needs of client computers, sharing
internet connection to the client computers, sharing load of
clients, providing central security, providing central storage
and backup space and hardware/software sharing purpose.
In computer terminologies protocol is a set of rules that are
used by communication devices while communicating e.g.

What is IP (Internet protocol)?

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

IP is internet protocol and it is also called transmission


control protocole.It is a web program which make a
connection between the sender address and the server
machine. It deliver msg to the server machine and then
server machine accept this msg.it is the second step of
HTTP. Programs which are made for the internet connection
which are called protocol these are responsible.
Internet Protocol (IP) is a communication protocol that is
used for communication between computers on the
internet. It works at layer 3 of the OSI model. It is often
used together with the Transport Control Protocol (TCP) and
referred to interchangeably as TCP/IP. TCP/IP represents all
communication rules for the internet and is based on the IP
addressing notion, i.e. the idea of assigning unique numbers
to each device connected to the network so as to be able to
route data packets. Each device on the internet is identified
by its IP address. "216.27.60.130" is an example of an IP
address.
The Internet Assigned Numbers Authority (IANA) manages
the IP address space allocations globally and delegates five
regional Internet registries (RIRs) that allocates IP address
blocks to local Internet registries (Internet service
providers) and other entities.
What is header?
Header is a piece of information that is attached to the data
at the beginning. Header is used at each layer except the
physical layer. Header is used by the sending device to tell
the receiving device that how the data will be treated by
receiving device. The added headers are part of process to
make it possible to send data from source to destination.
What are Stacks?
In computer terminology a stack is a data type in which the
next item to be removed is the most recently added.
Normally we call stack LIFO i.e. last in first out. For
Example

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

Consider collection of four books placed on each other on a


table. Now in order to remove the second book from the
bottom side, it is necessary to remove the third and fourth
books first.
But in handouts the term Stack is used for an ordered
collection of items.
What is router?
A router is a networking device that is used to transmit the
data between two different networks or more simply we can
say that a router is a device that provides communication
between LAN to WAN or vice versa. Router is an intelligent
device and it has the capability to select the best suitable
path leading to the destination.
What is the subnet mask itself?

What are their functions?

And its relation with the IP address.

Subnet mask is used in conjunction with the IP address.


Subnet Mask tells the computer that in a particular IP
address, how many bits are used to identify a network, and
how many remaining bits are used to refer to a particular
host in that network.
For example,
IP address: 192.168.1.1
Subnet Mask: 255.255.255.0
it shows that the first three octets (8-bits portions) are used
to identify a network address, and the remaining last octet
is a host address in that network.
What is ISP?
ISP stands for internet service provider. it is basically a
company that provides access to custormers in a specific
region. For example paknet, brainnet etc are internet
service providers.
What is one zone domain name and two zone domain
name?

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

Single zone domain name means that you only need to


contact a single name server to find the ip address of your
required web server. Whereas in two zone domain name the
local name server needs to contact two different name
servers to find the desired ip address.
Want to know that hexadecimal has 16 bases or 12
bases? Why u describe 12 characters.
The base of Hexadecimal is 16.
MAC address uses 12 Hexadecimal digits. Because the MAC
address is unique for each device, and there are millions of
devices; so a huge number of bits are reuired to generate
different number of patterns. 12 Hexadecimal digits = 48
bits. It means 248 (281,474,976,710,656) different MAC
addresses can be generated.
What is the top level domain? Or without top-level
domain any DNS exist?
A domain name consists of one or more parts, technically
called labels that are conventionally concatenated, and
delimited by dots, such as example.com. The right-most
label conveys the top-level domain. In www.google.com,
com is the top level domain.
How can we attach an image into our html code?
<HTML><BODY>

<IMG SRC="a.jpg" >

</HTML></BODY>

Make sure that you have given the complete address of the

image against "SRC" attribute if image is not available in the

same folder where your html file is saved.

e.g. <HTML><BODY>

<IMG SRC="http://www.vu.edu.pk/images/topbar/vu.jpg" >

<IMG SRC="Y:/a. jpg" >

</HTML></BODY>

What is the difference between thicknet and thinet


Cooper cables?

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

Thicknet and Thinnet are types of coaxial cables which are


used in Ethernet local area networks. Thicknet is 0.4 inches
in diameter and able to span distances of up to 500 meters.
Thinnet is 0.2 inches in diameter able to span distances of
up to 185 meters. Thicknet was the original Ethernet wiring,
but thinnet, which is cheaper and can be installed more
easily.
What are Bridges switches and routers?
Bridges just forward data depending on the destination
address in the data packet. This address is not the IP
address, but the MAC (Media Access Control) address that is
unique to each network adapter card. Bridging makes no
assumptions about where in a network a particular address
is located. A bridge operates at the data link layer in an OSI
model. This device ensures connectivity between two
segments of a computing network.
A network switch is a small hardware device that joins
multiple computers together within one local area network
(LAN). Technically, network switches operate at Data Link
Layer. A switch is a device that filters and forwards packets
between LAN segments or in other words switches channel
incoming data from any of multiple input ports to the
specific output port that will take the data toward its
intended destination.
A network router joins two computer networks together. A
router is a device that forwards data packets across
computer networks. Routers perform the data "traffic
directing" functions on the Internet.
I'll suggest you to study the page #15 of it430 handouts. And
if you still want some more details on bridges, switches and
routers, you can visit the following links.
http://en.wikipedia.org/wiki/Network_bridge
http://en.wikipedia.org/wiki/Network_switch
http://en.wikipedia.org/wiki/Router
Types of cables?

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

There are two types of coaxial cabling: thinnet and


thicknet. Thicknet and Thinnet are types of coaxial cables
which are used in Ethernet local area networks. Thicknet is
0.4 inches in diameter and able to span distances of up to
500 meters. Thinnet is 0.2 inches in diameter able to span
distances of up to 185 meters. Thicknet was the original
Ethernet wiring, but thinnet, which is cheaper and can be
installed more easily.
What is hper text markup language? Why it is used in for
internet development .What are basic commands of html?
HTML stands for Hypertext Markup Language and it is used
to define web pages or you can say HTML is a computer
language to create web documents, which provides
instructions that tell the browser how to display pages. It is
a language of tags. A tag is a special letter or key word
enclosed in angular brackets. Most tags have their
corresponding closing tags represented by the same special
letter or key word enclosed in angular brackets but
preceded by a slash (/).
Three main network topology my question is this which is
the best network in the three network?
Each topology has its own benefits and weaknesses but the
most common one is Star topology. It normally depends on
how and what you want it to be.
What is Network address and Host Machine address?
Every machine on the Internet has a unique identifying
number, called an IP Address. IP addresses (IPv4) are 32 bit
addresses and typically look like: 172.16.254.1. To make it
easier for us to remember, IP addresses are normally
expressed in decimal format as a dotted decimal number.
An IP address serves two principal functions: host and
network. A defined structure of IP classes tell us that which
portion of the IP address will serve as Host and which
portion will serve as network. As you know there are a lot of
networks available over the internet and there are many
hosts in each network. Network portion is used to identify

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

the network that a computer belongs to and Host


(sometimes referred to as Node) identifies the actual
computer on the network.
Write a note on any two methods to main state between
http request?

Methods of maintaining the state of HTTP


Cookies
Cookies are used to store small amounts of frequently
changed information on the client. The information is sent
with the request to the server.
Hidden files
Page-specific information can be stored in a hidden field on
the page as a way of maintaining the state of that page.
What is Transition control protocol (TCP)

What is host??

What is byte??

What is the classes ABC network mean?

TCP:

Transmission control protocol is a protocol developed for


the internet to get data from one network device to
another. TCP uses a retransmission strategy to insure that
data will not be lost in transmission.
Host computer:
A host is a computer connected to a computer network. A
network host may offer information resources, services, and
applications to users or other nodes on the network.
Byte:
The byte is a unit of digital information in computing and
telecommunications. It is an ordered collection of bits, in
which each bit denotes the binary value of 1 or 0. Collection
of 8 bits is called a byte.
Class
IP addresses are assigned to organizations in blocks. Each

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

block belongs to one of three classes: class A, class B, or


class C.
URL?
URL stands for Uniform Resource Locator. It is the unique
address for a file that is accessible on the internet. The
most common examples are the addresses of the websites.
Every website has a unique address. For example:
www.vu.edu.pk
www.google.com
What stands for Asp? And what is the default scripting

language in ASP?

ASP stands for Active Server Pages and the default scripting

language used for writing ASP is VBScript

What is the difference between sniffing and IP address


spoofing?
In sniffing the hacker has the ability to monitor network
traffic using some kind of network monitoring software. For
example, a hacker may install some backdoor or Trojan
horse that can monitor the key strokes of a user while
typing and send the typed information to the hacker.
It is possible that a hacker (having special capabilities)
seizes the control of a router, changes the IP address of the
source/sender on data packets and thus forces the
destination machine to send the information/web page to a
different machine, that is, the machine of the hacker. This
is called IP address spoofing.

he Difference b/w Java script language And Html


Language?
HTML is a markup language while JavaScript is an object
based language.HTML is the language in which web pages
are written to be interpreted by the server as a graphic
interface. Javascipt is similar, but is actually a web-adapted
version of actual programming code, intended to write
applets (small, web-based applications) for use on websites.

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

They are both a type of code, but html is NOT a


programming code. The HTML defines what the webpage
looks like, the javascript handles things like counters,
games, etc.
Name any 3 E-Business models?
Ans: 1 online banking, 2: on line recruiting, 3: on line
entertainment 4: e
learning, 5: auction modal
Question No: 32 (Marks: 1)
What is the condition of contract to be formed?
Ans: Offer, acceptance and consideration.
Question No: 33 (Marks: 2)
Briefly describe analytical attack on public key
algorithms.
Ans: Attacks on Public Key Algorithms

Key Search Attacks

The public key and its corresponding private key are linked

with each other

with the help of a large composite number. These attacks

attempt to derive

the private key from its corresponding public key using that

number.

Analytical Attacks

Such attacks use some fundamental flaw in the

mathematical problem on

which the encryption system itself is based so as to break

the encryption.

Question No: 34 ( Marks: 2 )

Do you agree that Customization is one of the role of e-

commerce in

Competitive Strategy. Discuss briefly

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

Ans: customization:

With the help of e-commerce the customer data can b

gathered and analyze

it nd customer serve it in a better manner according to their

need one can

thus implement differentiation and focus strategy.KHALID

PERVEZ(MBA+MCS)CHICHAWATNI

Question No: 35 (Marks: 3)

How the coin is minted by E-Cash bank?

Ans: Minting of the coin:

A long serial no. is randomly generated by the client’s Cyber

wallet in order

to mint a coin. This serial no. is blinded, which means that

it is multiplied

with a blinding factor “r” and sent to the e-cash bank for

signatures. Thus,

the e-cash bank cannot see the serial no. it is signing. Key

version

(corresponding public key of the bank) is also part of the

coin, and is sent

usually at the time of account opening. An e-cash bank may

have 1 dollar

signature, 5 dollar signature or 10 dollar signature etc. If

the client wants to

mint a coin of 2 dollars then e-cash bank would use its

private or secret key

of 2 dollars to sign the serial no.

Question No: 36 (Marks: 3)

What do we mean by Relevance element of branding?

Ans: elements of branding:

There are three types of branding elements.

1: differentiation

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

2: relevance

3: perceived value

Question No: 37 (Marks: 3)

How lack of trust barrier can be overcome or minimized?

Discuss it

briefly

Ans: It is very important for online businesses to establish

trusting

relationships with their customers like in the physical world

where

companies ensure that customers know who they are.

However, it is difficult

to build trust because lack of kind of anonymity exists for

companies trying

to establish web presence.

So lack of trust barrier can be minimized not overcome.

Question No: 38 (Marks: 5)

What is the importance of hash function and how it is

applied on

Message digest?(3+2)

Ans: importance of hash function:

Hash function is one way mathematical function apply on

massage digest.

Result of the hash function is unique to each message called

message digest.

hash function can easily convert large data into small datum

hash function is

mostly use for look up the data ,findings and detecting the

similar files.

How it is applied on message digest:

Message digest is obtained by applying the hash function

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

For instance, the client may choose the word “Bluesky” as a


code. By
applying a hash function on this code, a message digest is
obtain
Question No: 39 ( Marks: 5 )
Where the originator has not agreed with the addressee that
the
acknowledgment be
given in a particular form or by a particular method, an
acknowledgment may be given by?
1: any communication, automated or otherwise, by the
addressee; or
2: any conduct of the addressee, sufficient to indicate to
the originator that
the
electronic communication is received.”
Question No: 40 ( Marks: 10 )

Differentiate between the online businesses (E-business)

with offline

businesses (Traditional business). Support your answer with

solid

examples.

Ans: difference between online and off line business:

On line business:

-No shop or show room is required, very less number of

employees.

-Remote handling of business.

-Less expenditures of running business

Offline business:

-High customer satisfaction level.

- Large number of employees.

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

-existence of physically goods and services

-large number of buyers and seller.

Example:plz give in ur own words.

Question No: 41 ( Marks: 10 )

Give an example to show how members of supply chain can

work

together to reduce inventory, increase quality of product,

reduce

production cost and increase process speed.

Examples of technology use in supply chain

Another example is of a famous computer selling brand. It

realized that by

increasing the amount of information about its customers it

was able to

reduce amount of inventory it should hold. It decided to

share this

information with other members of the supply chain by

allowing its top

suppliers to have access to a secure web site which

informed them about its

latest sales forecasts, planned product changes or any

warranty claims etc. It

also provided information about its customers and their

buying pattern.

Thus, it helped suppliers to plan their own production in a

much better way.

The above examples show how members of supply chain can

work together

to reduce inventory, increase quality of product, reduce

production cost and

increase process speed.

What is quantum computing?

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

Quantum computing is the branch of computer science that

deals with the

development of cryptographic algorithms.

Reference:

(Page # 109)

What is CRM stands for?(1)

Customer Relationship Management

Reference:

(Page # 136 )

What is cyber wallet .It uses is e-cah payment system.(2)

Cyber wallet is software which is installed on the buyer’s

computer. It

stores and manages e-coins and records every transaction.

Reference:

(Page # 116 )

What is section 3 of ETO.(3)

Section 3 of the ETO provides:

“No document, record, information, communication or

transaction shall be

denied legal recognition,admissibility, effect, validity, proof

or

enforceability on the ground that it is in electronic form and

has not been

attested by any witness”.

Reference:

(Page # 164 )

Difference between primary and support activities of

porter`s model.(3)

Describe the deficiencies of ETO.(5)

How a client can prove its payment in e-cash payment

system .Explain

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

with one example.(2+3)

Take a product and implement primary and secondary

activities of

porter`s model in stretagic units.(10)

Question No: 21 ( Marks: 2 )

What is Term ‘Catalog Display’ means?

It provides photos, detailed description and search facility

about the

availability of products or items..

It is simple list written in HTML. Some has to has to edit the

HTML code to
change it. Dynamic catalog stores information in a
database.

Question No: 22 ( Marks: 2 )


What is meant by a constructor?
It is initializing function used to create instance of an
object. It is after the
name of the object whose constructor it is.
Question No: 23 ( Marks: 3 )
What is meant by ‘Shopping Cart’ in context of e commerce?

It is an electronic shopping cart or basket that keeps record

of the items the

customer has select and allow him to view the details of the

items selected.

He/she can add new items or remove items. To order an

item, a customer

simply clicks at that item option. All details of that item

like product No.

Item name and its price store in cart automatically.

Question No: 24 ( Marks: 3 )

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

We have an array named myArray where this sentence is

stored. “Welcome

to Virtual University!”

If we apply str.split(’’) method.

What will be the output of str.split(’’)myArray(4) and

str.split(’’)myArray(2) respectively.

Str.Split split the string based on the blank spaces.

str.split(’’)myArray(4) = blank

str.split(’’)myArray(2) = virtual

Question No: 25 ( Marks: 5 )

Describe the importance of Cryptography in internet data

transfer security

in E-Commerce?

It is a collection of mathematical techniques used to ensure

confidentiality

of information. The process of scrambling a message with

the help of a key

is called Encryption.

Now a days as internet is widely used. So danger of data

safety and serurity

also rose.

Compare to its earlier use.

It provide the Transaction Integrity. Tranasction detail of

both the parties

can be verified which help to built the confidence between

business

community.

It provide Privacy like it provide controls to prevent third

parties

from geting access to the information within the transaction

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

Without cryptography, it is doubtful that banks, businesses

and individuals

would feel safe doing business online.

Cryptography provides the confidence to the customer that

their data is safe

and secure. Otherwise due to lack of confidence and doubt

e-commerce

business can not flourish.

Question No: 26 ( Marks: 5 )

Write a list of comparison operators in JavaScript with

symbols.

1. <= less than equal


1.
2. >= Greater than equal
3. == for Equal
4. != not equal
5. < Less than
6. > Greater than

Question No: 31 ( Marks: 1 )

What is stand for WIPO?

World Intellectual Property Organization

Question No: 32 ( Marks: 1 )

Name any 3 E-Business models?

1-Storfront Model

2-Auction Model

3-Onlien Banking

Question No: 33 ( Marks: 2 )

What is the basic purpose of using hash function in

communication?

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

A hash function is applied on the message to get the

message digest.

Question No: 34 ( Marks: 2 )

What is Competition between existing players ?.

If there are many players having same size and stretagy but

having different

qualities in product and services. Then there is true

competition between

them regarding price of that product or service.

Question No: 35 ( Marks: 3 )

On what basis, generally the protection under “fair use”

may be sought?

Doesn’t need to explain.

Nature of use:The work should be used only for non

profitable and for

education purposes.

Nature Of Work:The copied work is effectively covered

under fair use as

compaird to that of some new or creative work

Extent of the work copied:The extent of work to be copied

under fair use

shouold be small so that court take some favourable steps

to accussed.

Question No: 36 ( Marks: 3 )

In Virtual PIN Payment system, merchant side is less secure

than buyer side.

Do you agree with this statement? Justify your answer.

1+2

Yes , I am agree with this statement that marchant side is

less secure than

buyer side because marchant send the product before

payment.So there is

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

threat of non payment from buyer side.


Question No: 37 ( Marks: 3 )
What are the disadvantages of Data Mining? (1+1+1)
Privacy Issues
Personal privacy has always been a major concern in this
country. In recent
years, with the widespread use of Internet, the concerns
about privacy have
increase tremendously. Because of the privacy issues, some
people do not
shop on Internet. They are afraid that somebody may have
access to their
personal information and then use that information in an
unethical way; thus
causing them harm.
Security issues
Although companies have a lot of personal information
about us available
online, they do not have sufficient security systems in place
to protect that
information. For example, recently the Ford Motor credit
company had to
inform 13,000 of the consumers that their personal
information including
Social Security number, address, account number and
payment history were
accessed by hackers who broke into a database belonging to
the Experian
credit reporting agency.
Maintanence Problem
Another problem with the data warehouse is that it is
difficult to maintain.

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

Any organization that is considering using a data warehouse

must decide if

the benefits outweigh the costs. Once you have paid for the

data warehouse,

you will still need to pay for the cost of maintenance over

time. The costs

involved with this must always be taken into consideration.

Question No: 38 ( Marks: 5 )

Describe the advantages of E-Business in detail.

Personalized service:

product , place , promotion and price are the 4 P`s of

marketing mix. Now

Personalization is the 5th P introduced in E-Business.The

bahavioural

information about customers can be added in data base and

then can be

utilized to by teh E-Commerce sites to analyze the needs of

taht particular

customer.So, in this way personalized service can be

provided to customer.

High-quality customer service

With the help of feed back of potential customers online

businesses can

improve the quality of their products according to the needs

and demands of

thier customers.So it will improve the customer services of

E-Buiseness.

No inventory cost

In case of E-Business we dont need to have any physical

place to start

business. In this way it reduces overheads and invemtory

costs.An onilne

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

busines can take orders from customers with out bearing

teh inventory cost

like offline traditional businesses.

Worldwide reach of your business:

In E-Busines there is a chance to extend your business

thruoghout the world.

So, global reach is possible in E-Business.

Electronic catalogues

Electronic catalogue is used in online busines have many

adbvantages over

paper catalogues.

Bulk transactions

Due to no limitations on collecting , carrying and packaging

goods we can

order bulk transactions during even one visit at online

shops.

Improved supply chain management

suppliers and manufacturer are the active members of

supply chain

members. They are effective addition in E-Business.

Question No: 39 ( Marks: 5 )

Elaborate the importance of OLAP in decision making

support for an

organization.

OLAP makes use of baksground knowledge regarding the

domain of the

data being studied .It is different from data mining as it

does not provide

patterns for any predictions.It allows the data being studied

to present at

different level of abstraction.Informartion stored in the

data base can be

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

viewed and reviewed conveniently in any formate .In case

of OLAP at

different levels facilitate managers and decision makers in

making

decisions.OlAP uses different tools namely, drill down , roll

up and and slice

and dice etc.By using drill down we can further dig into the

data for

recieving more information whcih is specific.Roll up works

opposite to the

drill down , It is used to sum up the information in a

particular dimention to

show the results.

Question No: 40 ( Marks: 10 )

What is Porter’s 5 forces model ? Discuss briefly 5 forces

with its

purpose.

Porter`s models helps a firm to identify threats to its

sompetitive

position.and to devide plans accordingly which includes uses

of IT and E

commerce to protect or enhance his competitive position .

Following are the 2 forces models of porter.

1- Threats of new potentian entrants to the sector

This threats relates to the opportunity that how easily a

company having

different products and services can enter into the a given

trade sector.How

effeciently it remove teh barriers liek IT, Capital and

skills.For example to

start online banking you need not to

2-Threats of substitute product or service in existingtrade

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

3-Bragaining power of the buyers


4-Bargaining power of the suppliers
5-Competition between existing players
Question No: 41 ( Marks: 10 )
What are the advantages and disadvantages of offline and
online catalogues?
5+5
Online catalogues vs. Paper catalogues
Paper catalogs
Advantages
Easy to create a catalog without high technology
Reader is able to look at the catalog without computer
system
More portable than electronic catalog
Disadvantages
Difficult to update changes in the product information
Only limited number of products can be displayed
Online or electronic catalogs
Advantages
Easy to update product information
Able to integrate with the purchasing process
Good search and comparison capabilities
Able to provide timely, up-to-date product information
Can provide broad range of product information
Possibility of adding voice and motion pictures
Cost savings
Easy to customize
What does PPTP stand for?
page98)ΛAns (

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

PPTP stands for point to point transfer protocol.

Question No: 22 ( Marks: 2 )

What are the keywords to define a variable and a function

in JavaScript?

“var” is the keyword used to define a variable in Javascript

e.g var a; “function” is the keyword to define a function in

javascript

e.g function myfunction(){ // some code }


Question No: 23 ( Marks: 3 )

Identify the object, property and method in the following:

Math.sin(45)

Math.PI

Ans:

Math is the object in above case

PI is the property of Math object

Sin() is the method of Math object

Question No: 24 ( Marks: 3 )

Performance of web servers can be evaluated mainly on the

basis of two

factors. What are they?

Ans:

Performance of web sever

Performance of web servers can be evaluated mainly on the

basis of two

factors:

Throughput, which is the number of http requests that a

particular

server hardware and software can handle in the unit time;

and

Response time, which is the amount of time a web server

requires to

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

process one request. Web server hardware architectures


Question No: 25 ( Marks: 5 )
Write the code for a web page displaying a button named
"Testing". After
clicking that button an alert should be displayed saying "The
test is
successful".
<html>
<head>
<script type="text/javascript">
function sndAlert()
{
window.alert("The test is successful!!!");
}
</script>
</head>
<body>
<FORM
NAME="form1">
<INPUT TYPE="Button" name="showAlert" VALUE="Show
Alert"
onclick="sndAlert()">
</FORM>
</body>
</html>
Question No: 26 ( Marks: 5 )
What is the difference between an interpreted and a
compiled
language? Give one example of each.
Ans:

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

In a compiled language we compile to code or convert into

machine

language using a software called compiler as we can case

C++

Example C++

with interpret language we interpret the code (line by line)

at run time

using a program called interpreter browser is an

interpreter.

Example Browser…

Question No: 21 ( Marks: 2 )

What value will be printed after executing the following

statement in

JavaScript:

document.write( Math.pow(3, 2) );

document.write("Math.pow(2,3) :"+Math.pow(2,3)+"<P>");

Question No: 22 ( Marks: 2 )

What is a web server?

ANSWER:

Web server

web server is a machine that serves up the web page

requests of a client

on the internet. It is a combination of hardware and

software. Decision

as regards the type of a web server is largely dependent on

the volume

and type of web activities. So, transaction processing sites

generating

dynamic pages with high traffic volumes would need web

server

software that is more efficient and can easily be upgraded.

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

Question No: 23 ( Marks: 3 )

To calculate the area of a circle the formula pi r squared is

used. How would

you code it in JavaScript?

<html>

<script type="text/javascript">

var radius,area;

radius = 10;

area = Math.PI*Math.pow(radius,2);

document.write("Area of circle with radius 10 is " + area );

</script>

</html>

Question No: 24 ( Marks: 3 )

Name four commonly used web server operating systems.

(PAGE 91)

Commonly used web server operating systems are Microsoft

Windows

NT Server, Microsoft Windows 2000 Advanced Server,

Microsoft.NET

Server, Linux or Unix based operating systems such as

Solaris.

Question No: 25 ( Marks: 5 )

Write the types of firewalls. Only names? Explain these

briefly

Packet filter firewall

It uses a set of rules to determine whether outgoing or

incoming data packets

are allowed to pass through the firewall.

Circuit level firewall

It is quite similar to the packet filter firewall. It also works

on the basis of a

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

set of rules for filtering packets but operates at the

transport layer of the OSI

Model so has greater functionality.

Application gateway firewall

It operates at application layer of the OSI Model. It uses

strong user

authentication to verify identity of a host attempting to

connect to the

network using application layer protocols such us FTP. In

contrast to packet

filter firewall, it filters the requests rather than packets

entering/leaving the

network. It can block any outgoing HTTP or FTP requests.

Question No: 26 ( Marks: 5 )

Write the JavaScript code which will display the following in

a web page

using a FOR loop:

The number is 0

The number is 1

The number is 2

The number is 3

The number is 4

The number is 5

<html>

<script type="text/javascript">

var no;

for (no=0; no<6 ; no++)

document.write("The number is " + no + "<br>" );

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

</script>

</html>

What is a web server?

Answer : Web server – machine that services internet

request.

Web server – machine that services internet request

web server is a machine that serves up the web page

requests of a client on

the internet. It is a combination of hardware and software.

Decision as

regards the type of a web server is largely dependent on the

volume and type

of web activities. So, transaction processing sites generating

dynamic pages

with high traffic volumes would need web server software

that is more

efficient and can easily be upgraded.

Question No: 22 ( Marks: 2 )

What does ‘parseFloat(string)’ And NaN mean?

The parseFloat() function parses a string and returns a

floating point

number. This function determines if the first character in

the specified

string is a number. If it is, it parses the string until it

reaches the end of

the number, and returns the number as a number, not as a

string.

The NaN property represents "Not-a-Number" value. This

property

indicates that a value is not a legal number.

Question No: 23 ( Marks: 3 )

Write at least three rules for writing an XML code.

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

Rules for writing an XML code


-All elements must be properly nested
<outer><inner>content</inner></outer>
-All attribute values must be quoted <FRIES SIZE=“LARGE”>
-All elements with empty content must be identified by
ending in />
Question No: 24 ( Marks: 3 )
How ‘Man in The middle Attacks’ operates?
Man in the middle attacks
In it the attacker is able to monitor, capture and control
data between
sending and receiving machines. He may apply IP address
spoofing
technique to divert the packets to its machine, then modify
the packets
and resend the misleading information to the actual client.
form of man-in-the-middle attack is where the hacker is
able to
substitute the IP address of a genuine web site with the IP
address of his
own web site due to some security hole in the software that
runs on a
domain name server. A client would think that he is
communicating or
receiving the information form a genuine web site, though it
would not
be the case actually.
Question No: 25 ( Marks: 5 )
Write the code for a web page displaying a button named
"Testing". After
clicking that button an alert should be displayed saying "The
test is

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

successful".

<html>

<head>

<script type="text/javascript">

function sndAlert()

window.alert("The test is successful!!!");

</script>

</head>

<body>

<FORM

NAME="form1">
<INPUT TYPE="Button" name="showAlert" VALUE="Show
Alert"

onclick="sndAlert()">
</FORM>KHALID PERVEZ(MBA+MCS)CHICHAWATNI
</body>

</html>

Question No: 26 ( Marks: 5 )

Differentiate between front end and back end.

Answer: Front end consists of that information which is

visible to the
user and he can interact with the same through some
interface. The
back end comprises that information which resides on the
server side
and is used to create certain dynamic results for the user. It
would

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

include different programs or scripts that may be developed

in different

languages/tools. Backend is mainly used for two purposes –

for querying

with the databases and for the maintenance of state. We

can use

different tools (ASP, JSP etc.) for that purpose depending

upon their

respective advantages/disadvantages.

Question No: 21 ( Marks: 2 )

What is Term ‘Catalog Display’ means? (page 92)

A Static catalog is a simple list written in HTML. One has to

edit the

HTML code to change it. A dynamic catalog stores

information about

items in a database usually on a different computer

accessible by the

web server. It can provide photos, detailed description and

search

facility about the availability of items.

Question No: 22 ( Marks: 2 )

What is meant by a constructor? (page 69)

It is initializing function used to create instance of an

object. It is after

the name of the object whose constructor it is.

Question No: 23 ( Marks: 3 )

What is meant by ‘Shopping Cart’ in context of e commerce?

(page 92)

shopping cart was used wherein the user had to remember

and type

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

certain information. It is now replaced by electronic

shopping

cart/basket that keeps record of the items the customer has

selected and

allows customers to view the details of the items selected.

The customer

can add new items or remove items. To order an item, a

customer

simply clicks at that item option. All details of an item,

including its

price, product no. and order identifying information are

stored

automatically in the cart.

Question No: 24 ( Marks: 3 )

We have an array named my Array where this sentence is

stored. “Welcome

to Virtual University!”

If we apply str.split(’’) method.

What will be the output of str.split(’’)myArray(4) and

str.split(’’)myArray(2) respectively.

Str.Split split the string based on the blank spaces.

str.split(’’)myArray(4) = blank

str.split(’’)myArray(2) = virtual

Question No: 25 ( Marks: 5 )

Describe the importance of Cryptography in internet data

transfer security

in E-Commerce?

It is a collection of mathematical techniques used to ensure

confidentiality of information. The process of scrambling a

message

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

with the help of a key is called Encryption.


Now a days as internet is widely used. So danger of data
safety and
serurity also rose. Compare to its earlier use.
It provide the Transaction Integrity. Tranasction detail of
both the
parties can be verified which help to built the confidence
between
business community.
It provide Privacy like it provide controls to prevent third
parties from
geting access to the information within the transaction
Without cryptography, it is doubtful that banks, businesses
and
individuals would feel safe doing business online.
Cryptography provides the confidence to the customer that
their data
is safe and secure. Otherwise due to lack of confidence and
doubt ecommerce business can not flourish.

Question No: 26 ( Marks: 5 )

Write a list of comparison operators in JavaScript with

symbols.

Comparison operators

‘==’ for Equal

‘!=’ for not equal

‘< ‘ for Less than

‘<=’ for less than equal

‘>’ for Greater than

‘>=’ for Greater than equal

Question No: 17 ( Marks: 1 )

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

What does this mean? padding-right


adds space to the right of the content
Question No: 18 ( Marks: 1 )
Do you agree or not that using Cascading Style Sheets one
can apply an
image to sections of one’spage or even to individual words.
YES! I AGREE
Question No: 19 ( Marks: 2 )
Suppose, there is an applet at
"http://www.vu.edu.pk/demo.class". Write the
code to include this applet in your web page.
<APPLET CODE= “http://www.vu.edu.pk/demo.class”
width=100
height=200> DEMO </APPLET>KHALID
PERVEZ(MBA+MCS)CHICHAWATNI

Question No: 20 ( Marks: 3 )

What do you think, is there any difference between Static

and Dynamic IP

Address assignment? Discuss.

A static IP address is an address that does not change over


time unless
changed manually. It is used when you need the IP address
or network
location to remain the same consistently. A good example
of this is for a
web server. If you go to www.google.com you are really
going to the IP
address of 66.102.7.99. If this were to change suddenly you
would not be
able to get to Google unless you knew the new IP address or
until Google
updated their DNS records.

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

A Dynamic IP address is an address that keeps on changing.

It is mostly

used when having a consistent IP address is not necessary.

An example of

this would be the IP address your ISP (internet service

provider) assigns you

when you log on to the internet. You must have an IP

address to surf the web

but once you disconnect you loose that address. Then the

next time you sign

on you are assigned a new one. This is done using DHCP.

Question No: 21 ( Marks: 5 )

What is cryptography? What techniques are used for

cryptography?

Cryptography is the technique of converting a message into

unintelligible or

non-understandable form such that even if some

unauthorized or unwanted

person intercepts the message he/she would still not be

able to make any

sense out of it. Cryptography is thousands of years old.

Techniques used for cryptography Substitution In

substitution we replace

each letter in the message with another to make the

message non-

understandable. For example, each letter “a” in the

message can be replaced

with letter “d” and letter “b” with letter “e” and so on.

Transposition It is

based on scrambling the characters in a message. A

transposition system

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

may first write a message into a table row by row then the

message can be

read and rewritten column by column to make it scrambled.

Question No: 22 ( Marks: 10 )

Analyze the following given code showing some Cascading

Style Sheets

tags and explain its lines one by one.

<html>

<head>

<style type="text/css"> // Definition of internal style sheet

h1 {text-decoration: overline} // Defines a line above the

text

h2 {text-decoration: line-through} // Defines a line through

the text

h3 {text-decoration: underline} // Defines a line below the

text

a {text-decoration: none} // Defines a normal text. This is

default

</style> // end of internal style sheet

</head>

<body>

<h1>This is header 1</h1>

<h2>This is header 2</h2>

<h3>This is header 3</h3>

<p><a href="http://www.w3schools.com/default.asp">This

is a

link</a></p>

</body>

</html>

Question No: 21 ( Marks: 2 )

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

What is Term ‘Catalog Display’ means?

It provides photos, detailed description and search facility

about the

availability of products or items..

It is simple list written in HTML. Some has to has to edit the

HTML code

to change it. Dynamic catalog stores information in a

database.

Question No: 22 ( Marks: 2 )

What is meant by a constructor?

It is initializing function used to create instance of an

object. It is after the

name of the object whose constructor it is.

Question No: 23 ( Marks: 3 )

What is meant by ‘Shopping Cart’ in context of e commerce?

It is an electronic shopping cart or basket that keeps record

of the items the

customer has select and allow him to view the details of the

items selected.

He/she can add new items or remove items. To order an

item, a customer

simply clicks at that item option. All details of that item

like product No.

Item name and its price store in cart automatically.

Question No: 24 ( Marks: 3 )

We have an array named myArray where this sentence is

stored. “Welcome

to Virtual University!”

If we apply str.split(’’) method.

What will be the output of str.split(’’)myArray(4) and

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

str.split(’’)myArray(2) respectively.
Str.Split split the string based on the blank spaces.
str.split(’’)myArray(4) = blank
str.split(’’)myArray(2) = virtual
Question No: 25 ( Marks: 5 )
Describe the importance of Cryptography in internet data
transfer security
in E-Commerce?
It is a collection of mathematical techniques used to ensure
confidentiality
of information. The process of scrambling a message with
the help of a key
is called Encryption.
Now a days as internet is widely used. So danger of data
safety and serurity
also rose.
Compare to its earlier use.
It provide the Transaction Integrity. Tranasction detail of
both the parties
can be verified which help to built the confidence between
business
community.
It provide Privacy like it provide controls to prevent third
parties from geting
access to the information within the transaction
Without cryptography, it is doubtful that banks, businesses
and individuals
would feel safe doing business online.
Cryptography provides the confidence to the customer that
their data is safe

http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/

and secure. Otherwise due to lack of confidence and doubt

e-commerce

business can not flourish.

Question No: 26 ( Marks: 5 )

Write a list of comparison operators in JavaScript with

symbols.

1. <= less than equal


1. >= Greater than equal
2. == for Equal
3. != not equal
4. < Less than
5. > Greater than

http://vustudents.ning.com/

S-ar putea să vă placă și