AMIETE – IT (OLD SCHEME)
NOTE: There are 9 Questions in all.
· Question 1 is compulsory and
carries 20 marks. Answer to Q.1 must be written in the space provided for it in
the answer book supplied and nowhere else.
· Out of the remaining EIGHT
Questions answer any FIVE Questions. Each question carries 16 marks.
· Any required data not
explicitly given, may be suitably assumed and stated.
Q.1 Choose
the correct or the best alternative in the following: (210)
a. E-commerce operations can be performed with
(A) a computer only
(B) a computer and a modem
(C) a computer and internet connection
(D) a computer, internet connection,
and a web site
b. A network that requires human intervention of
route signals is called a
(A) bus network (B)
ring network
(C) star network (D)
T-switched network
c. A protocol is a
set of rules governing a time sequence of events that must take place
(A) between peers (B) between modems
(C) between an interface (D) across an interface
d. Estimation of currency convertibility may be
done by a software known as
(A) P NET (B) Nino
(C) FOREX (D) Visa
e. Online information services may be used for
(A) Cyber café operations (B) Software technology park
(C) Virtual office (D) all of the above
f. A data unit in the TCP/IP application layer
is called a
(A) message (B) segment
(C) datagram (D) frame
g. Which
of the following may be a clue for a possible attempt to break the security of
e-business?
(A) Changes in disk space (B) Change in the size of file
(C) Presence of an unwanted file (D)
All of the above
h. An
error-detecting code inserted as a field in a block of data to the transmitted
is known as
(A) Frame check sequence (B) Error detecting code
(C) Checksum (D) Flow control
i. Transformation
of a computer program into another form, without changing its functionality, is
known as
(A) re-engineering (B) reverse engineering
(C) restructuring (D) redesigning
j. A machine that
connects to two or more electronic mail systems and transfers mail messages
among them is known as
(A) gateways (B) mail gateway
(C) bridges (D) user agent
Answer any FIVE Questions out
of EIGHT Questions.
Each question carries 16
marks.
Q.2 a. Describe the function of supply chain
management. (8)
b. List any four problems or drawbacks of
e-commerce. (4)
c. What are wireless connections? (4)
Q.3 a. Summarize the key benefits and drawbacks of
peer-to-peer networks. (8)
b. Explain the
services provided by Internet to address variety of user needs. (8)
Q.4 a. Explain
client server network security problems. Also give any two methods of
protection of client server networks. (8)
b. Explain the following terms:
(i)
Firewalls (ii)
Public-key Cryptography (8)
Q.5 a. Explain the architectural framework for e-commerce. (8)
b. What are the desirable characteristics of an
electronic marketplace? (4)
c. Explain the pre-purchase phase of the
business process model. (4)
Q.6 a. Which are the three types of electronic
tokens? (4)
b. Describe the features and uses of smart card. (8)
c. What is Electronic Funds Transfer (EFT)? (4)
Q.7 a. What do you understand by shopping cart
software with reference to web commerce site? Explain the role of cookies in
this. (8)
b. What are the benefits of Intranet? (4)
c. What are the characteristics of large firms
conducting business-to-business and business-to consumer transactions? (4)
Q.8 a. How does e-mail contrast with the regular
postal mail? How is e-mail helpful to e-commerce? (5)
b. What are ‘packet sniffers’ and ‘kerberos’ in
respect of detecting impostors in e-payments? (5)
c. List the advantages and disadvantages of
encryption. (6)
Q.9 Write
short notes on the following:
(i)
Hypertext
Transfer Protocol
(ii)
Security
Concerns in Electronic Commerce
(iii)
Third-party
authentication
(iv)
Properties
of electronic cash (44)