View Single Post
  #2  
Old 24-12-2009, 05:50 PM
BSIT07-01's Avatar
BSIT07-01 BSIT07-01 is offline
Addicted to Computer


 
Join Date: Sep 2007
Location: ------------
Age: 34
Posts: 1,309
Contact Number: ---------------
Program / Discipline: BSIT
Class Roll Number: 07-01
BSIT07-01 has a brilliant futureBSIT07-01 has a brilliant futureBSIT07-01 has a brilliant futureBSIT07-01 has a brilliant futureBSIT07-01 has a brilliant futureBSIT07-01 has a brilliant futureBSIT07-01 has a brilliant futureBSIT07-01 has a brilliant futureBSIT07-01 has a brilliant futureBSIT07-01 has a brilliant futureBSIT07-01 has a brilliant future
Default Re: Finel term Paper E commerce BSIT 5th semester By sir adnan Rafiq

Solution Provided by: Sir. Adnan Rafiq


Part I Objective
Roll no: ____________ Name:________________

NOTE:
(I)First attempt PART-I Which shall be taken back after 30 minutes
(II)Overwriting/cutting of the options will not be given credit.

1.Customers can provide their feedback or register their complaints quite conveniently in case of online business as compared to offline business
□ True □ False
2.Physical proximity with items purchased and no inventory cost are disadvantages of e-business

□ True □ False
3.Online publishing is attractive because printing and distribution costs are involved in it.

□ True □ False
4.In Geographic segmentation customers are divided into groups on the basis of where they live or work

□ TrueFalse

5.Discount advertisements through web sites are form of e-marketing
□ True □ False
6.Interactive advertising is a term used to refer to internet-based broadcasting of audio and video content.

□ True □ False

7.One major goal of CRM is to establish a long-lasting relationship between a company and its customers
□ True □ False
8.In case of B2B there is direct contact with the end users
□ True □ False
9.AltaVista and yahoo are examples of search engines
□ True □ False
10.Segment information is useful for companies to develop better relationship with other companies.
□ True □ False
1.Public Key of the receiver is used to-------------------.
a.Decrypt the message
b.Encrypt the message
c.Scramble the message
d.None of the mentioned options

2.Receiver applies ----------------to the received original message
a.Digital signature
b.Message digest
c.Hash function
d.None of the mentioned options

3.Symmetric key can be replaced with----------------------------.
a.Symmetric algorithms
b.Pair of public and private keys
c.Asymmetric key
d.None of the mentioned options

4.In --------------------attack an attempt is made by the attacker to decrypt the message with every possible key.
a.Key search attack
b.Cryptanalysis
c.System based
d.None of the mentioned options

5.In Hosting ISP offers on rent a physical space to client to install its own server hardware and software and maintain it by itself.
a.Dedicated hosting
b.Co-location hosting
c.Shared Hosting

6.Typically all e-commerce software must at least provide:
a.A catalog display
b.Shopping cart capabilities
c.Transaction processing
d.All of These

7.SEO Black Hat approach there are
a.Non-related Keywords
b.Duplicate contents
c.Both a. and b.
d.None of the mentioned options

8.In ______ SEO technique Submit articles in different article directories
a.ON Page
b.OFF Page
c.Both a. and b.
d.None of the mentioned option

9.In SEO Good meta Description can be terms as ____ technique
a.ON Page
b.OFF page
c.Both a. and b.

10.Crawler visits list of URLs called
a.BOT
b.Seeds.
c.None of the mentioned options
Attached Files
File Type: doc solution.doc (44.0 KB, 288 views)
Reply With Quote