AMIETE – IT (OLD SCHEME)
NOTE: There are 9 Questions in all.
· Question 1 is
compulsory and carries 20 marks. Answer to Q.1 must be written in the space
provided for it in the answer book supplied and nowhere else.
· Out of the
remaining EIGHT Questions, answer any FIVE Questions. Each question carries 16
marks.
· Any required data
not explicitly given, may be suitably assumed and stated.
Q.1 Choose the correct or the best alternative in the following: (210)
a. EDI
stands for _________.
(A) Electronic
data Interchange
(B) E commerce data Interface
(C) Electronic
Digital signature Interchange
(D) Electronic data
Information
b. Digital
signature is _______________.
(A) signature
in binary form (B) scanned signature
(C) encrypting
information (D) hand written signature
c. Telnet
is a service that runs ______________.
(A) Television
on net (B) Cable TV network
(C) Search
Engine (D) Remote login
d. Which protocol
provides common specification for exchange of e-mail massages between systems
and networks?
(A) HTTP (B) ICMP
(C) SMTP (D) FTP
e. Firewall is
used to provide ______________.
(A) application
security (B) Network security
(C) All
of the above (D) None of the above
f. Which
protocol provides secure communication between web client and web server?
(A) HTTP. (B) HTTPD.
(C) S-HTTP. (D) FTP.
g. Shopping
cart is a______________.
(A) Smart
card
(B) Virtual card that
holds items before purchasing.
(C) Software
program that holds items after purchasing
(D) Debit card
h. Kerberos
is an encryption-based system that uses _________.
(A) secret
key encryption (B) public key encryption
(C) data
key encryption (D) private key encryption
i. Computer
worm _____________.
(A) is self
replicating program
(B) does not require a host program
(C) performs useful and undesired
function
(D) requires user intervention
j. X.400
standard is for ____________.
(A) the
storing and forwarding of messages
(B) message encryption
(C) transaction
massage interchange
(D) networking
connection settings
Answer any FIVE
Questions out of EIGHT Questions.
Each question
carries 16 marks.
Q.2 a. What is media convergence? Describe the
phenomenon of convergence. (8)
b. Explain
the working of SMTP protocol. (4)
c. Differentiate
between Internet and Intranet. (4)
Q.3 Write short notes on the following:
(i) Digital
or Electronic case
(ii) Electronic Eavesdropping
(iii) Issues in
implementing E Commerce
(iv) MIME. (16)
Q.4 Explain
briefly the role of e-Commerce in the following applications: (16)
(i) Retailing
(ii) Supply Chain Management
(iii) Publishing
(iv) Billing
Q.5 a. With
the help of a diagram, describe all the steps in DES algorithm. (8)
b. What is Digital Signature Certificate?
Explain its contents with suitable diagram. (8)
Q.6 a. Describe the e-commerce architecture. (8)
b. Describe the benefits of e-Commerce to
organizations, consumers, and society. (8)
Q.7 a. Describe the major types of B2B models. (8)
b. Distinguish Internet-based EDI from
traditional EDI. (8)
Q.8 a. Distinguish between e-procurement and
e-selling consortia. (8)
b. Describe the extranet and its role in
supporting marketplaces and exchanges. (8)
Q.9 Explain the following terms: (16)
(i)
Public key Infrastructure
(ii)
HTTP
(iii)
HTML
(iv)
POP
(v)
TCP/IP
(vi)
Electronic Payment Systems
(vii)
Work Flow Management
(viii)
Electronic Brokerage