Documente Academic
Documente Profesional
Documente Cultură
com/
» » Regards » »
VUSTUDENTS.NET TEAM.
Virtual University of Pakistan
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
allies. The term stateless means that sever does not store
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
</HTML></BODY>
Make sure that you have given the complete address of the
e.g. <HTML><BODY>
</HTML></BODY>
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
What is host??
What is byte??
TCP:
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
language in ASP?
ASP stands for Active Server Pages and the default scripting
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
The public key and its corresponding private key are linked
attempt to derive
the private key from its corresponding public key using that
number.
Analytical Attacks
mathematical problem on
the encryption.
commerce in
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
Ans: customization:
PERVEZ(MBA+MCS)CHICHAWATNI
wallet in order
it is multiplied
with a blinding factor “r” and sent to the e-cash bank for
signatures. Thus,
the e-cash bank cannot see the serial no. it is signing. Key
version
have 1 dollar
1: differentiation
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
2: relevance
3: perceived value
Discuss it
briefly
trusting
where
However, it is difficult
companies trying
applied on
Message digest?(3+2)
massage digest.
message digest.
hash function can easily convert large data into small datum
hash function is
mostly use for look up the data ,findings and detecting the
similar files.
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
with offline
solid
examples.
On line business:
employees.
Offline business:
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
work
reduce
realized that by
was able to
share this
buying pattern.
work together
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
Reference:
(Page # 109)
Reference:
(Page # 136 )
computer. It
Reference:
(Page # 116 )
transaction shall be
or
Reference:
(Page # 164 )
porter`s model.(3)
system .Explain
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
activities of
about the
HTML code to
change it. Dynamic catalog stores information in a
database.
customer has select and allow him to view the details of the
items selected.
item, a customer
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
stored. “Welcome
to Virtual University!”
str.split(’’)myArray(2) respectively.
str.split(’’)myArray(4) = blank
str.split(’’)myArray(2) = virtual
transfer security
in E-Commerce?
confidentiality
is called Encryption.
also rose.
business
community.
parties
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
and individuals
e-commerce
symbols.
1-Storfront Model
2-Auction Model
3-Onlien Banking
communication?
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
message digest.
If there are many players having same size and stretagy but
having different
competition between
may be sought?
education purposes.
to accussed.
1+2
payment.So there is
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
must decide if
the benefits outweigh the costs. Once you have paid for the
data warehouse,
you will still need to pay for the cost of maintenance over
Personalized service:
bahavioural
then can be
taht particular
provided to customer.
businesses can
and demands of
E-Buiseness.
No inventory cost
place to start
costs.An onilne
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
Electronic catalogues
adbvantages over
paper catalogues.
Bulk transactions
goods we can
shops.
supply chain
support for an
organization.
domain of the
to present at
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
of OLAP at
making
and dice etc.By using drill down we can further dig into the
data for
opposite to the
particular dimention to
with its
purpose.
sompetitive
of IT and E
company having
trade sector.How
skills.For example to
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
in JavaScript?
javascript
Math.sin(45)
Math.PI
Ans:
basis of two
Ans:
basis of two
factors:
particular
and
requires to
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
machine
C++
Example C++
at run time
interpreter.
Example Browser…
statement in
JavaScript:
document.write( Math.pow(3, 2) );
document.write("Math.pow(2,3) :"+Math.pow(2,3)+"<P>");
ANSWER:
Web server
requests of a client
software. Decision
the volume
generating
server
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
<html>
<script type="text/javascript">
var radius,area;
radius = 10;
area = Math.PI*Math.pow(radius,2);
</script>
</html>
(PAGE 91)
Windows
Microsoft.NET
Solaris.
briefly
on the basis of a
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
strong user
connect to the
contrast to packet
entering/leaving the
a web page
The number is 0
The number is 1
The number is 2
The number is 3
The number is 4
The number is 5
<html>
<script type="text/javascript">
var no;
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
</script>
</html>
request.
requests of a client on
Decision as
dynamic pages
that is more
floating point
the specified
string.
property
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
successful".
<html>
<head>
<script type="text/javascript">
function sndAlert()
</script>
</head>
<body>
<FORM
NAME="form1">
<INPUT TYPE="Button" name="showAlert" VALUE="Show
Alert"
onclick="sndAlert()">
</FORM>KHALID PERVEZ(MBA+MCS)CHICHAWATNI
</body>
</html>
visible to the
user and he can interact with the same through some
interface. The
back end comprises that information which resides on the
server side
and is used to create certain dynamic results for the user. It
would
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
in different
for querying
can use
upon their
respective advantages/disadvantages.
edit the
information about
accessible by the
search
object. It is after
(page 92)
and type
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
shopping
selected and
The customer
customer
including its
stored
stored. “Welcome
to Virtual University!”
str.split(’’)myArray(2) respectively.
str.split(’’)myArray(4) = blank
str.split(’’)myArray(2) = virtual
transfer security
in E-Commerce?
message
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
symbols.
Comparison operators
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
and Dynamic IP
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
It is mostly
An example of
but once you disconnect you loose that address. Then the
cryptography?
unintelligible or
unauthorized or unwanted
substitution we replace
message non-
with letter “d” and letter “b” with letter “e” and so on.
Transposition It is
transposition system
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
may first write a message into a table row by row then the
message can be
Style Sheets
<html>
<head>
text
the text
text
default
</head>
<body>
<p><a href="http://www.w3schools.com/default.asp">This
is a
link</a></p>
</body>
</html>
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
about the
HTML code
database.
customer has select and allow him to view the details of the
items selected.
item, a customer
stored. “Welcome
to Virtual University!”
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
str.split(’’)myArray(2) respectively.
Str.Split split the string based on the blank spaces.
str.split(’’)myArray(4) = blank
str.split(’’)myArray(2) = virtual
Question No: 25 ( Marks: 5 )
Describe the importance of Cryptography in internet data
transfer security
in E-Commerce?
It is a collection of mathematical techniques used to ensure
confidentiality
of information. The process of scrambling a message with
the help of a key
is called Encryption.
Now a days as internet is widely used. So danger of data
safety and serurity
also rose.
Compare to its earlier use.
It provide the Transaction Integrity. Tranasction detail of
both the parties
can be verified which help to built the confidence between
business
community.
It provide Privacy like it provide controls to prevent third
parties from geting
access to the information within the transaction
Without cryptography, it is doubtful that banks, businesses
and individuals
would feel safe doing business online.
Cryptography provides the confidence to the customer that
their data is safe
http://vustudents.ning.com/
Join Us on http://vustudents.ning.com/
e-commerce
symbols.
http://vustudents.ning.com/