IT430- E-Commerce
Solved MCQ's by vuZs Team
Aniqa, Zubair Hussain, Emman Khan & Mehreen Humayun
ASP runs best on ________.
Internet information Software
Intranet Information Software
Intranet Information Server
What is/are the methods to track the customer.
Database
Hidden Fields
All
Caching ______.
have no effect on downloading of the page
saves the time of downloading the page
increase the time of downloading the page
None of Above
secure, dedicated point to point connection over the internet ______.
:
Metropolitan area Network
Local area Network
Wide Area Network
Branch to headquarter network _____.
APN
VPN
NPV
PNA
ERP Stands for
Entrepreneur Resource Planning
Enterprise Rescue Planning
Enterprise Resource Program
Enterprise Resource Planning
Enterprise Resource Planning: Enterprise Resource Planning (ERP) is a concept that integrates all aspects of a business e.g, accounting, logistics, manufacturing, marketing, planning, project management etc. at a single place. An ERP system such as SAP is expensive. E-commerce sites/software has to fully integrate with ERP software, wherever it is used.
Enterprise Resource Planning (ERP) is a concept
That integrates some aspects of business, at many locations.
That integrates all aspects of a business at a single place.
That integrates some aspects of business, at some locations.
That integrates all aspects of business, at many locations.
Proxy Server can _____.
Speed up the processing of http requests by caching web pages
Translate HTTP request between trusted and un trusted network
Can also act as a firewall filtering requests for certain web pages
All of Above
Extranet formed when ____.
When two or more internet is connected to each other.
When two or more WAN are connected to each other.
When two or more intranets are connected to each other.
When two or more LAN is connected to each other.
ERP example is __
PAS
DBMS
SAP
ASP
Performance of the web server measured in ___.
A - Throughput
B - Response Time
A & B
None of Above
Throughput is _________.
No of instruction a server execute in one second.
No of session a server handle.
No of http request that a web server can handle.
None of Above
Throughput, which is the number of http requests that a particular server hardware and software can handle in the unit time.
Agents can be used for ___
Comparisons
Filtering
Web crawling
All
An agent is a software program that is capable of autonomous action in its environment in order to meet its objectives. Agents can be used for comparisons, filtering, web crawling, auctions etc. For example, there may be buyer agents and seller agents each with their goals and constraints. They can negotiate deals on behalf of the users. Agents can monitor health indicators and alert the individuals under given conditions.
Large companies establish connections between their e-commerce software and their existing accounting system by using a type of software called ________.
Shareware
Freeware
Middleware
None
Large companies establish connections between their e-commerce software and their existing acco system by using a type of software called Middleware which is a part of e-commerce software package.
CERT _________.
Computer Elegant Response Time
Computer Emergency Response Time
Computer Efficient Response Time
Computer Enter Response Time
Computer Emergency Response Time (CERT): Systems Administrator, Audit, Network and Security Institute (SANS Institute). The best response that the experts have come up with to tackle the security issue is in terms of cryptography.
SANS stands for _____.
System Administration, Authentication, Network and Security Institute
Software Authentication, Audit, Network and Security Institute
Systems Administrator, Audit, Network and Security Institute
None of Above
Application gateway firewall operate at ____.
A -Session Layer
B - Network Layer
A & B
None of Above
It operates at application layer of the OSI Model. It uses strong user authentication to verify identity of a host attempting to connect to the network using application layer protocols such us FTP. In contrast to packet filter firewall, it filters the requests rather than packets entering/leaving the network. It can block any outgoing HTTP or FTP requests.
HTTP is a _____.
State Oriented
Stateless
A&B
None of Above
DoS stand for _______.
Disk Operating System
Denial of Services
Do or stand
Disk out System
What is web serve?
Computer that delivers (serves up) web pages
Computer that is big
Computer that is Fast
None of Above
Password attacks are basically a result of ___
Back door
Sniffing
Eavesdropping
None of the Above
Such attacks are basically a result of eavesdropping through which the hacker is able to know the account ID or password of a particular user. Then using it the hacker gains access to the network and gather information such as user names, passwords, computer names, resources etc. That can lead to modification, deletion or rerouting of network data.
Self hosting ____.
Companies may opt to run a server in house
Companies may not opt to run a server in house
Companies may opt rent server
None of Above
An agent is a software program that is ___
Triggers by human
Not capable of autonomous action.
Capable of autonomous action in its environment in order to meet its objectives
None
An agent is a software program that is capable of autonomous action in its environment in order to meet its objectives. Agents can be used for comparisons, filtering, web crawling, auctions etc. For example, there may be buyer agents and seller agents each with their goals and constraints. They can negotiate deals on behalf of the users. Agents can monitor health indicators and alert the individuals under given conditions.
IDS Stands for _______.
Intrusion Defense System
Intervention Detection System
Intervention Defense System
Intrusion Detection System
In distributed denial of service attack, the compromised system itself is used as a source for further attacks. The use of firewalls and a proper Intrusion Detection System (IDS) can minimize.
Application gateway firewall______
Can not block any outgoing HTTP or FTP requests
Can block any outgoing HTTP but not FTP requests
Can not block any outgoing HTTP but FTP requests
Can block any outgoing HTTP or FTP requests
Application gateway firewall: It operates at application layer of the OSI Model. It uses strong user authentication to verify identity of a host attempting to connect to the network using application layer protocols such us FTP. In contrast to packet filter firewall, it filters the requests rather than packets entering/leaving the network. It can block any outgoing HTTP or FTP requests.
Caching ____.
have no effect on downloading of the page
saves the time of downloading the page
increase the time of downloading the page
None of Above
Worms have the characteristics;
Can replicate it
Have the capability to travel without any help or human action
Can spread from computer to computer
All
E-commerce Site must provide ______.
Transaction processing
Shopping cart capabilities
A catalog display
All of the above
Circuit level firewall operate at the ______.
Data Link
Presentation
Network
Transport
It is quite similar to the packet filter firewall. It also works on the basis of a set of rules for filtering packets but operates at the transport layer of the OSI Model so has greater functionality. As a rule, the higher the layer of OSI model where a firewall operates, the more sophisticated is the firewall. It can make packets sent from internal network to a destination outside the firewall appear as if they originated at the firewall. Thus information regarding hosts on the internal network remains secret. It can also determine whether TCP/IP connection between a host and a machine outside firewall has been properly established. Thus it can cut off any connection which has been hijacked by a hacker trying to pass through the firewall.
Those hostile programs which, when run on a machine, install hidden services in order to give attackers remote access capabilities to a compromised machine.
Back Doors
Virus
Worms
Trapdoors
Front end consist of ______.
Information which invisible to the user and he can interact with the same through some interface.
Information which visible to the user and he can not interact with the same through some interface.
Information which visible to the user and he can interact with the same through some interface.
Information which is hidden.
Asp, JSP, PHP ?
Server Side Scripts
Client Side Script
A & B
None of Above
Solved By:Aniqa ( This email address is being protected from spambots. You need JavaScript enabled to view it.)
Proxy Server can _______.
Speed up the processing of http requests by caching web pages
Translate HTTP request between trusted and un trusted network
Can also act as a firewall filtering requests for certain web pages
All of Above
Response time ________.
Time a server take to process one request.
Time a server take to process all the request.
Time a server take to process some request.
Time a server take to process ten request
It occurs when a customer clicks at checkout or confirm order button and is subjected to some payment _______.
Transaction Processing
E cash System
E Funds system
None of Above
In this type of attack the hacker has the ability to monitor network traffic using some kind of network monitoring software.
Snooping
Sniffing
Eavesdropping
All of Above
Eavesdropping/ sniffing/snooping: In this type of attack the hacker has the ability to monitor network traffic using some kind of network monitoring software. For example, a hacker may install some backdoor or Trojan horse that can monitor
the key strokes of a user we were wrong only master mind was right while typing and send the typed information to the hacker.
Processing of HTML code on the Client Side and web page request on the server.
One Tier Architecture
Two Tier Architecture
Three Tier architecture
N tier Architecture
Example of 2-tier architecture is where processing of HTML code takes place on the client side and the web page request is processed on the server.
Solved by Mehreen Humayun
In java script "alert" function displays ________.(Chose best suitable answer)
Popup window
Web page
Task bar
Menu bar
Lesson 13
‘alert’ is the function/method of a predefined browser object that is, window object, and is used to create alert boxes or popup messages on the window.
Border-style: specifies the style of all borders in the order _________________.
border top style, border right style, border bottom style, border left style
border top style, border left style, border bottom style, border right style
border bottom style, border right style, border top style, border left style
border top style, border bottom style, border bottom right, border left style
Lesson 11
Border style
border-top-style: specifies style of the top border
border-right-style: specifies style of the right border
border-bottom-style: specifies style of the bottom border
border-left-style: specifies style of the left border
border-style: specifies the style of all borders in the order ‘border-top-style, border-right
style, border-bottom-style, border-left-style’
In case mouse moves over a link, ________ event will be detected.
onMouseOver
onRollOver
overMouse
All of the given
Lesson 12
________ is not a data type in java script.
int
float
string
null
Lesson 12
JavaScript Data types are Number, Boolean, String, Null and Undefined.
!= comparison operator means __________.
Equal to
Not equal to
Greater than
None of the given
Lesson 13
‘!=’ for not equal
________ tag is used to control the layout of different elements.
css
style
span
None of the given
Ref: The