Flowchart: Alternate Process: DECEMBER 2007
Code: AT-16                                                                                           Subject: E-COMMERCE

Time: 3 Hours                                                                                                     Max. Marks: 100

 

NOTE: There are 9 Questions in all.

·      Question 1 is compulsory and carries 20 marks. Answer to Q. 1. must be written in the space provided for it in the answer book supplied and nowhere else.

·      Out of the remaining EIGHT Questions answer any FIVE Questions. Each question carries 16 marks.

·      Any required data not explicitly given, may be suitably assumed and stated.

 

 

Q.1       Choose the correct or best alternative in the following:                                         (2x10)

 

a.       The two pillars supporting all E-commerce applications and infrastructure are                  

 

               (A) Public policy and privacy issues.                                                                          

               (B) Technical standards and network protocols

               (C) Public policy and technical standards

               (D) None of the above

 

b.      Which type of convergence, compress and store digitized information so that it can travel through existing phone and cable wiring?

 

               (A) Convergence of content

               (B) Convergence of transmission

               (C) Convergence of information access devices.

               (D) None of these

 

       c.      The client server model allows the client to interact with the server through a request reply sequence governed by a paradigm known as.

 

 (A) Message Passing                             (B) E-mail

 (C) Cables                                            (D) Network

 

       d.     The integrated management system which is consisted of a number of different management practices, dependent on the characteristics of specific plants.

                                                                                                                                                   

               (A) Just in Time Manufacturing               (B) Quick response Retailing

               (C) Supply Chain Management               (D) None of these

 

       e.      Which protocol makes the hypermedia world possible despite many different protocols.

 

               (A) URL                                                (B) HTTP

               (C) HTML                                             (D) ICMP

 

       f.      Which device is used as the wiring centre for large LANs?

 

               (A) Routers                                            (B) Gateways

               (C) Bridges                                            (D) Hubs

 


       g.      Which server service allows the customer to display hypertext documents on the web server?

 

               (A) Gopher Server Service                     (B) WWW Server Service  

               (C) FTP archive Service                         (D) Mailing List Service

 

       h.      ICMP stands for

 

               (A) Internet Common Message Protocol

               (B) Internet Control Mail Protocol

               (C) Internet Control Message Protocol

               (D) Internet Common Mail Protocol

 

       i.       Secret key cryptography involves which type of key for both encryption by the transmitter and decryption by the receiver.

 

               (A) Secret Key                                      (B) Public Key

               (C) Secret Key and Public Key both      (D) Shared Key

 

       j.      A group of computer services, through which a network send, receive and combine messages, faxes and large data files is known as

 

               (A) Internet Messaging                           (B) Intranet Messaging

               (C) Extranet Messaging                          (D) Integrated Messaging

 

 

 

Answer any FIVE Questions out of EIGHT Questions.

Each question carries 16 marks.

 

 

Q2.  a.    Explain the generic framework of E-Commerce with the help of diagram. Also specify the e-commerce organization applications                                                                                    (5+3)

 

        b.    What is media convergence ? Describe the phenomenon of convergence.           (4+4)

 

Q3.  a.    Explain the internet protocol suite with all its layers, also specify the

               function of each layer present in the suite.                                                                (8)

 

        b.    What is the difference between the working of TCP and UDP protocol?                 (4)

 

        c.    Explain the working of SMTP protocol.                                                                 (4)

                     

Q4.  a.    Which protection methods are used to provide security to the client server network? Also, explain different emerging client-server security threats.                                                              (4+4)

 

         b.   Explain the following terms:-

                                                                                                                                                                                                                                                                                                                                                                                      

               (i) Secret Key cryptography

               (ii) Data Encryption Standard

               (iii) Public Key cryptography

               (iv) RSA & public key cryptography                                                                (2 x 4)

 


Q5.  a.   What is Customer Relationship Management (CRM)? What are the various phases of CRM?                                                             (4+4)

 

        b.    What are viruses and how do they function?                                                          (5)

 

        c.    What are the benefits of carrying out business transactions over the Intranets and Extranets?                    (3)

 

Q6.  a.    Explain, different types of the electronic tokens. Also, explain the dimensions which are useful for analyzing the different initiatives.                                                                                             (4+4)

 

       b.    What is difference between credit cards, debit cards and smart cards?                    (3)

 

        c.    How payments are processed using encrypted credit cards, explain in detail?         (5)

 

Q7.  a.    Explain, three distinct classes of electronic commerce applications.                          (5)

 

        b.    Explain the relationship between SSL and https.                                                    (3)  

 

        c.    Explain the following terms:-

(i) URL

(ii) CGI Gateway Services

(iii) HTTP

               (iv) HTTPD Server                                                                                          (2 x 4)

 

Q8.  a.    Explain different categories of data that must be encrypted for providing internet data security. Also, explain different methods which can provide security in web framework.                        (3+3)

 

       b.    How SCM (Supply Chain Management) provides flawless delivery of basic and customized services. What are different characteristics of SCM in e-commerce? Also, explain three primary elements of two primary models of SCM i.e., push and pull.                                                                (3+3+4)

 

Q9.  a.    Explain the structure of EDI transactions? Also, write the comparison between EDIFACT and X .12 standards.                                                                                                         (4+4)

 

        b.    How EDI works and also explain different layers of EDI software.                     (4+4)