AMIETE – IT (OLD SCHEME)

 

Flowchart: Alternate Process: JUNE 2010Code: AT16                                                                                            Subject: E-COMMERCE

Time: 3 Hours                                                                                                     Max. Marks: 100

 

NOTE: There are 9 Questions in all.

·      Question 1 is compulsory and carries 20 marks. Answer to Q.1 must be written in the space provided for it in the answer book supplied and nowhere else.

·      Out of the remaining EIGHT Questions, answer any FIVE Questions. Each question carries 16 marks.

·      Any required data not explicitly given, may be suitably assumed and stated.

 

 

Q.1       Choose the correct or the best alternative in the following:                                  (210)

       

             a.  EDI stands for _________.               

 

                  (A) Electronic data Interchange          

                  (B) E commerce data Interface           

                  (C) Electronic Digital signature Interchange                                                                       

                  (D) Electronic data Information

       

             b.  Digital signature is _______________.                                                                             

 

                  (A) signature in binary form                 (B) scanned signature                                             

                  (C) encrypting information                   (D) hand written signature

       

             c.  Telnet is a service that runs ______________.                                                                 

 

                  (A) Television on net                           (B) Cable TV network                                           

                  (C) Search Engine                               (D) Remote login                                                   

 

             d.  Which protocol provides common specification for exchange of e-mail massages between systems and networks?  

 

                  (A) HTTP                                           (B) ICMP                                                              

                  (C) SMTP                                          (D) FTP                                                                

 

             e.  Firewall is used to provide ______________.                                                                  

 

                  (A) application security                       (B) Network security                                             

                  (C) All of the above                            (D) None of the above

       

             f.   Which protocol provides secure communication between web client and                        web server?          

 

                  (A)  HTTP.                                         (B)  HTTPD.                                                         

                  (C)  S-HTTP.                                     (D)  FTP.


             g.  Shopping cart is a______________. 

 

                  (A) Smart card                                  

                  (B) Virtual card that holds items before purchasing.                                                           

                  (C) Software program that holds items after purchasing                                                     

                  (D) Debit card

       

             h.  Kerberos is an encryption-based system that uses _________.                                         

 

                  (A) secret key encryption                    (B) public key encryption                                       

                  (C) data key encryption                      (D) private key encryption                                      

            

             i.   Computer worm _____________.

 

                  (A)  is self replicating program            

                  (B)  does not require a host program

                  (C)  performs useful and undesired function                                                                       

                  (D)  requires user intervention             

       

             j.   X.400 standard is for ____________.

 

                  (A) the storing and forwarding of messages                                                                       

                  (B) message encryption

                  (C) transaction massage interchange   

                  (D) networking connection settings

 

 

Answer any FIVE Questions out of EIGHT Questions.

Each question carries 16 marks.

 

 

   Q.2     a.   What is media convergence? Describe the phenomenon of convergence.            (8)

 

              b.   Explain the working of SMTP protocol.                                                             (4)

 

             c.    Differentiate between Internet and Intranet.                                                       (4)

 

   Q.3           Write short notes on the following:

            

                        (i)   Digital or Electronic case

                       (ii)  Electronic Eavesdropping

                       (iii) Issues in implementing E Commerce

                       (iv) MIME.                                                                                                  (16)

 

             

   Q.4          Explain briefly the role of e-Commerce in the following applications:                  (16)

 

                       (i)   Retailing

                       (ii)  Supply Chain Management

                       (iii) Publishing

                       (iv) Billing

 

                                                                                                                                                

   Q.5     a.   With the help of a diagram, describe all the steps in DES algorithm.                    (8)

                   

              b.   What is Digital Signature Certificate? Explain its contents with suitable diagram.  (8)

             

   Q.6     a.   Describe the e-commerce architecture.                                                              (8)

 

              b.   Describe the benefits of e-Commerce to organizations, consumers, and society.  (8)

                   

   Q.7     a.   Describe the major types of B2B models.                                                          (8)

 

              b.   Distinguish Internet-based EDI from traditional EDI.                                          (8)

             

   Q.8     a.   Distinguish between e-procurement and e-selling consortia.                                (8)

 

              b.   Describe the extranet and its role in supporting marketplaces and exchanges.      (8)

             

   Q.9           Explain the following terms:                                                                             (16)

                   

(i)                  Public key Infrastructure

(ii)                HTTP

(iii)               HTML

(iv)              POP

(v)                TCP/IP

(vi)              Electronic Payment Systems

(vii)             Work Flow Management

(viii)           Electronic Brokerage