AMIETE – IT (OLD SCHEME)

 

Code: AT16                                                                                            Subject: E-COMMERCE

Flowchart: Alternate Process: DECEMBER 2009Time: 3 Hours                                                                                                     Max. Marks: 100

 

 

NOTE: There are 9 Questions in all.

·      Question 1 is compulsory and carries 20 marks. Answer to Q.1 must be written in the space provided for it in the answer book supplied and nowhere else.

·      Out of the remaining EIGHT Questions answer any FIVE Questions. Each question carries 16 marks.

·      Any required data not explicitly given, may be suitably assumed and stated.

 

 

Q.1       Choose the correct or the best alternative in the following:                                  (210)

                

             a.  E-commerce operations can be performed with                                                                 

 

                  (A) a computer only

                  (B) a computer and a modem             

                  (C) a computer and internet connection

                  (D) a computer, internet connection, and a web site

       

             b.  A network that requires human intervention of route signals is called a                                

 

                  (A) bus network                                 (B) ring network                                                    

                  (C) star network                                 (D) T-switched network

       

             c.  A protocol is a set of rules governing a time sequence of events that must take place          

 

                  (A) between peers                              (B) between modems                                             

                  (C) between an interface                     (D) across an interface                                           

 

             d.  Estimation of currency convertibility may be done by a software known as                         

 

                  (A) P NET                                         (B) Nino                                                                

                  (C) FOREX                                       (D) Visa                                                                

 

             e.  Online information services may be used for                                                                      

 

                  (A) Cyber café operations                   (B) Software technology park                                

                  (C) Virtual office                                 (D) all of the above

                

             f.   A data unit in the TCP/IP application layer is called a                                                        

 

                  (A) message                                       (B) segment                                                           

                  (C) datagram                                      (D) frame

                

             g.  Which of the following may be a clue for a possible attempt to break the security of e-business?      

 

                  (A) Changes in disk space                   (B) Change in the size of file                                   

                  (C) Presence of an unwanted file         (D) All of the above

       

            

             h.  An error-detecting code inserted as a field in a block of data to the transmitted is known as            

 

                  (A) Frame check sequence                 (B) Error detecting code                                        

                  (C) Checksum                                    (D) Flow control                                                    

            

             i.   Transformation of a computer program into another form, without changing its functionality, is known as

 

                  (A) re-engineering                               (B) reverse engineering

                  (C) restructuring                                  (D) redesigning

       

             j.   A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as

 

                  (A) gateways                                      (B) mail gateway

                  (C) bridges                                         (D) user agent

 

 

Answer any FIVE Questions out of EIGHT Questions.

Each question carries 16 marks.

 

 

   Q.2     a.   Describe the function of supply chain management.                                             (8)

 

              b.   List any four problems or drawbacks of e-commerce.                                        (4)

 

              c.   What are wireless connections?                                                                         (4)

 

   Q.3     a.   Summarize the key benefits and drawbacks of peer-to-peer networks.               (8)

 

              b.   Explain the services provided by Internet to address variety of user needs.          (8)

 

   Q.4     a.   Explain client server network security problems. Also give any two methods of protection of client server networks.                                                                                                          (8)

 

              b.   Explain the following terms:

                    (i) Firewalls                                    (ii) Public-key Cryptography                       (8)

             

   Q.5     a.   Explain the architectural framework for e-commerce.                                         (8)

                   

              b.   What are the desirable characteristics of an electronic marketplace?                   (4)

 

              c.   Explain the pre-purchase phase of the business process model.                          (4)

 

   Q.6     a.   Which are the three types of electronic tokens?                                                  (4)

 

              b.   Describe the features and uses of smart card.                                                     (8)

 

              c.   What is Electronic Funds Transfer (EFT)?                                                         (4)

 

 

 

 

   Q.7     a.   What do you understand by shopping cart software with reference to web commerce site? Explain the role of cookies in this.                                                                                              (8)

 

              b.   What are the benefits of Intranet?                                                                      (4)

 

              c.   What are the characteristics of large firms conducting business-to-business and business-to consumer transactions?                                                                                                     (4)

 

   Q.8     a.   How does e-mail contrast with the regular postal mail? How is e-mail helpful to e-commerce?        (5)

 

              b.   What are ‘packet sniffers’ and ‘kerberos’ in respect of detecting impostors in e-payments?            (5)

 

              c.   List the advantages and disadvantages of encryption.                                          (6)

 

   Q.9           Write short notes on the following:

                   

(i)                  Hypertext Transfer Protocol

(ii)                Security Concerns in Electronic Commerce

(iii)               Third-party authentication

(iv)              Properties of electronic cash                                                        (44)