SCDL SOLVED PAPERS | scdl assighnments | symbiosis assignments |scdlassignments.blogspot | scdl paper | question papers for Pghrm,scdl | scdl assignments third semester for marketing |business communication assignments, symbiosis | solved papers of scdl | FREE SCDL Assignments | SCDL ASSIGNMENTS 3 SEM PGDBA HR | FREE SCDL Assignments And Solved Papers, delhi, India | scdl pgdba assignments scdl pune symbiosis center for distance learning scdl symbiosis centre for distance learning scdl| Scdl Solved Assignments

Wednesday, April 29, 2009

SCDL Software Engineering and Project Management Part 9

Multiple Choice Multiple Answer
Question Select the agencies besides the customer and vendor in a credit card transaction
Correct Answer Vendor's bank , Customer's bank , Card issuing company
Your Answer Vendor's bank , Customer's bank , Card issuing company


Multiple Choice Single Answer
Question A process of making information indeipherable except to those with a decoding key
Correct Answer Encryption
Your Answer Encryption


Match The Following
Question Correct Answer Your Answer

Secret data Existance is secret Existance is secret

Public data Protected from modification Protected from modification

Copyright data Content is not secret Content is not secret

Confidential data Content is secret Content is secret



True/False
Question The customer feedback got through the Web site should be the input for maintainance and enhancement of the site.
Correct Answer True
Your Answer True


Select The Blank
Question In public key encryption method one key is public and one key is ________.
Correct Answer Private
Your Answer Private


Multiple Choice Single Answer
Question The science of deciphering encrypted messages without knowing right key is known as
Correct Answer Cryptoanalysis
Your Answer Cryptography


Multiple Choice Multiple Answer
Question The Online equivalent of stored value card is
Correct Answer Ecash , Network Money
Your Answer Ecash , Network Money


True/False
Question A hardened firewall computer records not only the user logged in but also who has failed loging
Correct Answer True
Your Answer True


Multiple Choice Multiple Answer
Question Off-the-shelf home finance software are
Correct Answer Microsoft Money , Intuit's Quicken
Your Answer Microsoft Money , Intuit's Quicken


Multiple Choice Multiple Answer
Question The advantages of Ecash are
Correct Answer Cheap , Useful for small payments
Your Answer Cheap , Useful for small payments


Multiple Choice Multiple Answer
Question The key elements of a brand at the advertising agency are
Correct Answer Differentiation , Relevance , Perceived Value
Your Answer Differentiation , Relevance , Perceived Value


Multiple Choice Single Answer
Question A set of rules for encoding and decoing message is called as
Correct Answer Cipher
Your Answer Public Key

True/False
Question Select command modify information in the database.
Correct Answer False
Your Answer False


Multiple Choice Single Answer
Question The Link which gives error to display page is called
Correct Answer Broken Link
Your Answer Error Link


Multiple Choice Single Answer
Question The short form of world wide web consortium is :
Correct Answer W3C
Your Answer WWWC


Multiple Choice Single Answer
Question The most common way of paying for an ecommerce transaction is with
Correct Answer Credit Card
Your Answer Credit Card


Multiple Choice Multiple Answer
Question The advantages of Ecash are
Correct Answer Cheap , Useful for small payments
Your Answer Useful for small payments , Economical , Good Security


Multiple Choice Multiple Answer
Question The critical issues for e-business are
Correct Answer Create distinct distribution channels , Impove supply chain management , Technical competitiveness
Your Answer Create distinct distribution channels , Impove supply chain management , Technical competitiveness


True/False
Question In a credit card, the customer receive a payment for returned goods.
Correct Answer True
Your Answer False


Select The Blank
Question The SSl protocol operates at ________layer
Correct Answer Transport
Your Answer Transport


Multiple Choice Multiple Answer
Question Microsoft Merchant Solution is built on .
Correct Answer Windows NT , Internet Information Server
Your Answer Internet Information Server , Personal Web Server


Multiple Choice Single Answer
Question The banking which allows banks to set up retail branches on subscriber based online services is
Correct Answer Online Services Based Banking
Your Answer Online Services Based Banking


Multiple Choice Single Answer
Question The planning process for e-business include
Correct Answer Deciding about the products and services you want to sell
Your Answer Setting up the security system


True/False
Question Bilateral Transaction is not feasible because of potential for double spending.
Correct Answer True
Your Answer True


Multiple Choice Single Answer
Question The cheap delivery system for Ecommerce purchases is
Correct Answer Post
Your Answer Local Delivery


Select The Blank
Question ________ is a bits of information stored on a user's hard disk that identifies the user the next time he/she accesses the web site.
Correct Answer Cookies
Your Answer Cookies


Select The Blank
Question If the internet consumer is________, then the merchant can submit consumer's payment card immediately.
Correct Answer downloading digital files
Your Answer downloading digital files


True/False
Question To process payment card orders, a merchant must first set up a merchant account.
Correct Answer True
Your Answer True


Select The Blank
Question ________ are used to obtain data from the client for submission to server.
Correct Answer Form
Your Answer Form


Match The Following
Question Correct Answer Your Answer

SSL Address security concerns for inforamtion transfer Security scheme based on public key encryption

PCT Spawn secondary key for authentication Blocks pakcets from unknown user

S-HTTP Security scheme based on public key encryption Provide digital signature capability for financial transaction on web

SET Provide digital signature capability for financial transaction on web Spawn secondary key for authentication



True/False
Question The manner in which browser actually lays out the information is dependent on browser itself.
Correct Answer True
Your Answer False


Multiple Choice Multiple Answer
Question Select the two payment card companies using closed loop system
Correct Answer American Express , Discover
Your Answer Visa , Master card


Select The Blank
Question The model used for computer network is called as ________.
Correct Answer OSI
Your Answer OSI


Multiple Choice Multiple Answer
Question Microsoft wallet is currently working with
Correct Answer American express charge card , Master card
Your Answer Electronic cash system , American express charge card , Master card


True/False
Question Cybercash supports smart cards .
Correct Answer False
Your Answer True


Multiple Choice Single Answer
Question The act of sending a message pretending to be authorized user is called as
Correct Answer Spoofing
Your Answer Spammig


Multiple Choice Multiple Answer
Question Select the agencies besides the customer and vendor in a credit card transaction
Correct Answer Vendor's bank , Customer's bank , Card issuing company
Your Answer Vendor's bank , Card issuing company


Multiple Choice Multiple Answer
Question To evaulate a web site using the model the following statements should be accessed.
Correct Answer Aesthetic Effect , Product Information , Customer Information
Your Answer Aesthetic Effect , Product Information , Customer Information


True/False
Question The efficiency of user interface increases if error prevention is good
Correct Answer True
Your Answer True


Multiple Choice Multiple Answer
Question Pure Cyberbanks provide following services
Correct Answer Personal Banking , Financial Services
Your Answer Personal Banking , Request a trade , Trade Mutual Funds


True/False
Question Microsoft wallet comes preinstalled in Internet Explorer and Netscape Navigator
Correct Answer False
Your Answer False


Multiple Choice Single Answer
Question Digital Signatures are used for
Correct Answer Sender Authentication
Your Answer Sender Authentication


Select The Blank
Question An ________ system is one that people can easily enhance without providing any earlier work on the system
Correct Answer extensible
Your Answer extensible


Multiple Choice Single Answer
Question The main security feature to prevent double spending is
Correct Answer Threat of prosecution
Your Answer Serial numbering of electronic cash


Select The Blank
Question File Transfer protocol transfers ________ data.
Correct Answer Binary
Your Answer Binary


Multiple Choice Multiple Answer
Question Typically what information a new business required to provide the merchant bank in opening an account
Correct Answer Business plan , details about existing bank accounts , credit history
Your Answer Business plan , details about existing bank accounts , credit history


True/False
Question SQL statements can be used with higher level languages like Java,C++
Correct Answer True
Your Answer True


True/False
Question Customers must have an account with central online bank in most digital cash systems
Correct Answer True
Your Answer False


Select The Blank
Question ________ hubs have built in programmable features to handle packet switching ,routing traffic
Correct Answer Intelligent
Your Answer Intelligent


Multiple Choice Multiple Answer
Question Hit counter
Correct Answer Counts number of hits for a web site , Provided by ISP , Is a s/w
Your Answer Counts number of hits for a web site , Provided by ISP


Match The Following
Question Correct Answer Your Answer

Marketing Notice New Products Information Latest Marketing Update

Logon Page Business partner's page Business partner's page

Home Page Latest Marketing Update New Products Information

Order Page Product summaries Summary Of Orders



Multiple Choice Single Answer
Question To create temper proof electronic cash that can be traced back to its origin, what is used?
Correct Answer Complex Cryptographic algorithm
Your Answer Complex Cryptographic algorithm


Select The Blank
Question A list of company activities that make up the website is called ________.
Correct Answer Content Inventory
Your Answer Event List


Multiple Choice Single Answer
Question In Millicent system when a consumer locates a product on a merchan's web site that he or she would like to purchase ,the consumer converts the broker's strip into
Correct Answer Vendor specific scrip
Your Answer Merchan specific scrip


Select The Blank
Question In ________auction the seller puts up an item for sale at a high price.
Correct Answer Reverse
Your Answer Increasing


Multiple Choice Single Answer
Question An attack on the information and communication services by a third party that prevents legitimate users from using the infrastructure is
Correct Answer Denial of Service
Your Answer Spoofing


True/False
Question For Online Retailing to Succeed ,online technology must compliment management and opeational straegy.
Correct Answer True
Your Answer True


Multiple Choice Multiple Answer
Question The server developed by cybercash handles
Correct Answer Consumer payment and purchase information , Quick and safe transaction completion
Your Answer Consumer payment and purchase information , Quick and safe transaction completion


Select The Blank
Question ECML stands for ________.
Correct Answer Electronic Commerce modeling language
Your Answer Electronic Commerce modeling language

True/False
Question If you have limited hardware and networking technology then your ISP can load your Web site on its server and manage it.
Correct Answer True
Your Answer True


Multiple Choice Multiple Answer
Question Select the two payment card companies using open loop system.
Correct Answer Visa , Master card
Your Answer Visa , Master card


Multiple Choice Single Answer
Question Which electronic tokens are issued by ecoin.net that can be used to pay for online goods?
Correct Answer Ecoins
Your Answer Ecoins


Select The Blank
Question ________ was developed to use DSL protocol suite .
Correct Answer Integrated Services Digital Network
Your Answer Integrated Services Digital Network


True/False
Question There is no preset spending limit based on the user's credit limit in a credit card.
Correct Answer False
Your Answer False


Multiple Choice Single Answer
Question The way of dividing browser window into a number of subwindows is
Correct Answer Frame
Your Answer Frame


Multiple Choice Single Answer
Question The act of sending a message pretending to be authorized user is called as
Correct Answer Spoofing
Your Answer Spoofing


Multiple Choice Single Answer
Question To create temper proof electronic cash that can be traced back to its origin, what is used?
Correct Answer Complex Cryptographic algorithm
Your Answer Electronic security


Select The Blank
Question Most Popular Internet ads are ________.
Correct Answer Banners
Your Answer Banners

No comments:

Post a Comment