IT430- E-Commerce

Solved MCQ's by vuZs Team

Aniqa, Zubair Hussain, Emman Khan & Mehreen Humayun

www.vuzs.info

 

 

ASP runs best on ________.

 

Internet information Software

 Intranet Information Software

 Intranet Information Server

 Internet Information Server

 

http://c.statcounter.com/5369472/0/31a72d6d/1/

What is/are the methods to track the customer.

 

Database

 Cookies

Hidden Fields

All

 

Caching ______.

 

have no effect on downloading of the page

 saves the time of downloading the page

increase the time of downloading the page

None of Above

 www.vuzs.info

 

secure, dedicated point to point connection over the internet ______.

:

Metropolitan area Network

Local area Network

Wide Area Network

 Virtual Private Network

 

Branch to headquarter network _____.

APN
VPN
NPV
PNA

  

ERP Stands for

Entrepreneur Resource Planning
Enterprise Rescue Planning
Enterprise Resource Program
Enterprise Resource Planning

 

Enterprise Resource Planning: Enterprise Resource Planning (ERP) is a concept that integrates all aspects of a business e.g, accounting, logistics, manufacturing, marketing, planning, project management etc. at a single place. An ERP system such as SAP is expensive. E-commerce sites/software has to fully integrate with ERP software, wherever it is used.

www.vuzs.info


Enterprise Resource Planning (ERP) is a concept

That integrates some aspects of business, at many locations.
That integrates all aspects of a business at a single place.
That integrates some aspects of business, at some locations.
That integrates all aspects of business, at many locations.

 

Proxy Server can _____. 

Speed up the processing of http requests by caching web pages 
Translate HTTP request between trusted and un trusted network 
Can also act as a firewall filtering requests for certain web pages 
All of Above

 

Extranet formed when ____. 

When two or more internet is connected to each other. 
When two or more WAN are connected to each other. 
When two or more intranets are connected to each other. 
When two or more LAN is connected to each other.

  

ERP example is __ 

PAS 
DBMS 
SAP 
ASP

 www.vuzs.info

 

Performance of the web server measured in ___. 

A - Throughput 
B - Response Time 
A & B 
None of Above

 

 Throughput is _________. 

No of instruction a server execute in one second. 
No of session a server handle. 
No of http request that a web server can handle. 
None of Above

 Throughput, which is the number of http requests that a particular server hardware and software can handle in the unit time.

www.vuzs.info

 

Agents can be used for ___ 

Comparisons 
Filtering 
Web crawling 
All

 An agent is a software program that is capable of autonomous action in its environment in order to meet its objectives. Agents can be used for comparisons, filtering, web crawling, auctions etc. For example, there may be buyer agents and seller agents each with their goals and constraints. They can negotiate deals on behalf of the users. Agents can monitor health indicators and alert the individuals under given conditions.

 

Large companies establish connections between their e-commerce software and their existing accounting system by using a type of software called ________. 

Shareware 
Freeware 
Middleware 
None

 Large companies establish connections between their e-commerce software and their existing acco system by using a type of software called Middleware which is a part of e-commerce software package.

 www.vuzs.info

 

 CERT _________. 

Computer Elegant Response Time 
Computer Emergency Response Time 
Computer Efficient Response Time 
Computer Enter Response Time

 Computer Emergency Response Time (CERT): Systems Administrator, Audit, Network and Security Institute (SANS Institute). The best response that the experts have come up with to tackle the security issue is in terms of cryptography.

 

SANS stands for _____. 

System Administration, Authentication, Network and Security Institute 
Software Authentication, Audit, Network and Security Institute 
Systems Administrator, Audit, Network and Security Institute 
None of Above

 

 Application gateway firewall operate at ____. 

A -Session Layer 
B - Network Layer 
A & B 
None of Above

 It operates at application layer of the OSI Model. It uses strong user authentication to verify identity of a host attempting to connect to the network using application layer protocols such us FTP. In contrast to packet filter firewall, it filters the requests rather than packets entering/leaving the network. It can block any outgoing HTTP or FTP requests.

 www.vuzs.info

 

 HTTP is a _____. 

State Oriented 
Stateless 
A&B 
None of Above

 

DoS stand for _______.

Disk Operating System
Denial of Services
Do or stand
Disk out System

 

What is web serve?

 
Computer that delivers (serves up) web pages
Computer that is big
Computer that is Fast
None of Above

 www.vuzs.info

 

Password attacks are basically a result of ___

Back door
Sniffing
Eavesdropping
None of the Above

 Such attacks are basically a result of eavesdropping through which the hacker is able to know the account ID or password of a particular user. Then using it the hacker gains access to the network and gather information such as user names, passwords, computer names, resources etc. That can lead to modification, deletion or rerouting of network data.

 

 Self hosting ____.

Companies may opt to run a server in house
Companies may not opt to run a server in house
Companies may opt rent server
None of Above

  

An agent is a software program that is ___

Triggers by human
Not capable of autonomous action.
Capable of autonomous action in its environment in order to meet its objectives
None

 An agent is a software program that is capable of autonomous action in its environment in order to meet its objectives. Agents can be used for comparisons, filtering, web crawling, auctions etc. For example, there may be buyer agents and seller agents each with their goals and constraints. They can negotiate deals on behalf of the users. Agents can monitor health indicators and alert the individuals under given conditions.

 www.vuzs.info

 

 IDS Stands for _______.


Intrusion Defense System
Intervention Detection System
Intervention Defense System
Intrusion Detection System

In distributed denial of service attack, the compromised system itself is used as a source for further attacks. The use of firewalls and a proper Intrusion Detection System (IDS) can minimize.

 

 

Application gateway firewall______

 

Can not block any outgoing HTTP or FTP requests
Can block any outgoing HTTP but not FTP requests
Can not block any outgoing HTTP but FTP requests
Can block any outgoing HTTP or FTP requests

 Application gateway firewall: It operates at application layer of the OSI Model. It uses strong user authentication to verify identity of a host attempting to connect to the network using application layer protocols such us FTP. In contrast to packet filter firewall, it filters the requests rather than packets entering/leaving the network. It can block any outgoing HTTP or FTP requests.

 www.vuzs.info

 

 Caching ____. 

 have no effect on downloading of the page 
saves the time of downloading the page 
increase the time of downloading the page 
None of Above

 

 Worms have the characteristics; 

Can replicate it 
Have the capability to travel without any help or human action 
Can spread from computer to computer 
All

  

E-commerce Site must provide ______.

Transaction processing
Shopping cart capabilities
A catalog display
All of the above

 www.vuzs.info

 

 Circuit level firewall operate at the ______.

Data Link
Presentation
Network
Transport

 It is quite similar to the packet filter firewall. It also works on the basis of a set of rules for filtering packets but operates at the transport layer of the OSI Model so has greater functionality. As a rule, the higher the layer of OSI model where a firewall operates, the more sophisticated is the firewall. It can make packets sent from internal network to a destination outside the firewall appear as if they originated at the firewall. Thus information regarding hosts on the internal network remains secret. It can also determine whether TCP/IP connection between a host and a machine outside firewall has been properly established. Thus it can cut off any connection which has been hijacked by a hacker trying to pass through the firewall.

  www.vuzs.info

 

Those hostile programs which, when run on a machine, install hidden services in order to give attackers remote access capabilities to a compromised machine.

Back Doors
Virus
Worms
Trapdoors

 

 

 Front end consist of ______. 

Information which invisible to the user and he can interact with the same through some interface. 
Information which visible to the user and he can not interact with the same through some interface. 
Information which visible to the user and he can interact with the same through some interface. 
Information which is hidden.

 

 

Asp, JSP, PHP ?

Server Side Scripts
Client Side Script
A & B
None of Above

 www.vuzs.info

 

 Solved By:Aniqa ( This email address is being protected from spambots. You need JavaScript enabled to view it.)

 

Proxy Server can _______.

 

Speed up the processing of http requests by caching web pages

Translate HTTP request between trusted and un trusted network

Can also act as a firewall filtering requests for certain web pages

All of Above

 

Response time ________.

 

Time a server take to process one request.

Time a server take to process all the request.

Time a server take to process some request.

Time a server take to process ten request

 

It occurs when a customer clicks at checkout or confirm order button and is subjected to some payment _______.

 

Transaction Processing

E cash System

E Funds system

None of Above

 

 In this type of attack the hacker has the ability to monitor network traffic using some kind of network monitoring software.

Snooping
Sniffing
Eavesdropping
All of Above

 Eavesdropping/ sniffing/snooping: In this type of attack the hacker has the ability to monitor network traffic using some kind of network monitoring software. For example, a hacker may install some backdoor or Trojan horse that can monitor

the key strokes of a user we were wrong only master mind was right while typing and send the typed information to the hacker.

 

Processing of HTML code on the Client Side and web page request on the server.

One Tier Architecture
Two Tier Architecture

Three Tier architecture
N tier Architecture

 Example of 2-tier architecture is where processing of HTML code takes place on the client side and the web page request is processed on the server.

 www.vuzs.info

 

Solved by Mehreen Humayun

 

In java script "alert" function displays ________.(Chose best suitable answer) 

  

Popup window

Web page

Task bar

Menu bar

Lesson 13

‘alert’ is the function/method of a predefined browser object that is, window object, and is used to create alert boxes or popup messages on the window.

 

Border-style: specifies the style of all borders in the order _________________. 

 

 

border top style, border right style, border bottom style, border left style

border top style, border left style, border bottom style, border right style

border bottom style, border right style, border top style, border left style

border top style, border bottom style, border bottom right, border left style

Lesson 11

Border style

border-top-style: specifies style of the top border

border-right-style: specifies style of the right border

border-bottom-style: specifies style of the bottom border

border-left-style: specifies style of the left border

border-style: specifies the style of all borders in the order ‘border-top-style, border-right

style, border-bottom-style, border-left-style’

 www.vuzs.info

 

 In case mouse moves over a link, ________ event will be detected. 

 

onMouseOver

onRollOver

overMouse

All of the given

Lesson 12

 

 www.vuzs.info

________ is not a data type in java script. 

 

 int

float

string

null

Lesson 12

JavaScript Data types are Number, Boolean, String, Null and Undefined.

 

www.vuzs.info

!= comparison operator means __________. 

 

Equal to

Not equal to

Greater than

None of the given

Lesson 13

‘!=’ for not equal

 

________ tag is used to control the layout of different elements. 

 

 

css

style

span

None of the given

Ref: The