Skip to main content

*~* VuPak2009 *~* IT430 Current Paper Complete Shared By Kamran Haider

Thanks Kamran....

---------- Forwarded message ----------
From: Kamran Haider <alliswell.kamran@gmail.com>
Date: Sat, Feb 19, 2011 at 12:59 PM
Subject: IT430 discussion and material
To: "Qazi Muhammad Umer (Rashid)" <1.nation.vu@gmail.com>, MAHA SHAH <maha.shah.askari@gmail.com>, Hafiz Salman Majeed <hafiz.salman.majeed1@gmail.com>, LAIBA BUTT <laiba.butt98@gmail.com>, Imran Ali <candle.in.winds@gmail.com>, Admin Askari <vuaskarihelpline110@gmail.com>



CURRENT PAPER


Which of the following Barriers to International E-Commerce?        

 

► Advertising      

 

► Patents      

 

Infrastructure       

 

► Capital

 

Which currency is used in e-cash Payment system?        

 

► Dollar      

 

Coin      

 

► Penny      

 

► Cent

 

We can divide the Client Server architecture up to:

 

1 Tier

 

2 Tier

 

3 Tier

 

N –Tier

 

In the digital signature technique, the sender of the message uses ________ to create cipher text.

 

His or Her own symmetric key

 

His or her own private key

 

His or her own public key

 

The receiver`s private key

 

Law is broadly divided into two classes on the basis of nature of wrong, namely, ----------and ---------------

 

Civil law and criminal law 

 

ETO and criminal law

 

Supreme and Civil Law

 

None

 

At deposit stage, the serial number is ……………..by E-Cashbank       

 

► Known      

 

► Unknown      

 

► Kept Secret      

 

► Informed

 

An electronic check contains a(n)………………… to the payer's bank to make a specified payment to the payee       

 

► Serial#      

 

► Private key      

 

► Instruction      

 

► All of the above

 

HTML is a case sensitive language

 

True

 

False 

 

To overcome the lack of physical proximity appearance problem in e-business, which technology is going to be used        

 

► Biometrics      

 

► Video conferencing      

 

► Cryptography      

 

► Biometrics and Video conferencing

 

Dividing the potential customers into groups is called       

 

► Market Segmentation      

 

► Market Promotion      

 

► Market Research      

 

► Market Survey 

 

What does XML stand for?       

 

► eXtra Modern Link       

 

► X-Markup Language      

 

► eXtensible Markup Language      

 

► Example Markup Language

 

In which type of data mining, ID3 algorithms is used?       

 

Classification      

 

► Association      

 

► Characterization      

 

► Clustering

 

Who is making the Web standards?       

 

► International Standard Organization       

 

► ANSI      

 

► Microsoft      

 

► The World Wide Web Consortium

 

Class B has:       

 

► Network 01 byte and 03 hosts      

 

► Network 02 bytes and 02 hosts      

 

       Network 03 bytes and 01 host      

 

► None of these

 

Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act. Which legal issue arises due to such acts?       

 

► Cyber Crimes      

 

► Online Defamation       

 

► Cyber squatting      

 

► None

 

What is a E-Cash wallet ?       

 

► Hardware      

 

► Agent      

 

► Software      

 

► All of the above 

 

In many countries, stealing and misusing of Meta information for getting competitive advantage is considered as an offence known as       

 

► Tort of Private Nuisance      

 

► Tort of Tress passing       

 

► Tort of passing off      

 

► Defamation

 

ANSI stands for ……….        

 

► American National Standards Institute      

 

► All Network Standards Institute      

 

► American New standards Institute      

 

Australia National standards Institute 

 

Which of the following is NOT valid HTML code line?

 

► <frameset rows="16%,84%">

 

► <frameset columns="16%,84%">

 

► <frameset cols="100,150">

 

► <frameset cols="50%,50%" rows="16%,84%"> 

 

Dividing market, with respect to people having income level greater than Rs 30000, is geographic segmentation.

 

► True.

 

► False.

 

The term "Appropriate Authority" includes ______________ legislative assemblies

 

► 2

 

► 3

 

► 5

 

► 4

 

What does the Target=  _self   tag perform function?

 

Loads the new page into the same frame

 

Loads the new page into the entire window

 

Loads the new page into a new browser window

 

All of the above

 

E-business ---------     strategy is normally formed and implemented according to a planning cycle which is called strategic planning cycle.

 

Differentiation

 

Focus

 

Competitive

 

Diversification

 

An array can contain ----------.

 

only text

 

only numbers

 

only numbers or text

 

any valid variable

 

How do you write a conditional statement for executing some statements only if "i" is equal to 5? 

 

► if i=5

 

► if i=5 then

 

► if i==5 then

 

► if (i==5)

 

 

Question : Discuss the role and responsibilities of "Transport layer" in OSI model? 

 

Question: Is electronic signature more reliable than paper signature? Discuss

 

Question: Write down the hierarchy of courts with reference to the global legal issues of e-commerce?

 

Question : How Technology development is supporting activities in value Chain.

 

Question: What type of issues civil and criminal laws deals with?

 

Question: What do we mean by "Free-Trial" promotion technique?

 

Question: How language barrier can be removed. Explain two approaches.

 

Question : How many legislative list(s)  is(are) in Constitution of Islamic Republic of Pakistan at end?

 

Question: Briefly elaborate the concept of Perceived Value as an element of branding?

 

Question: Which currency is used in e-cash banking system?

 

Question: What is market segmentation? Explain market segmentation in web.

 

Question: How data mining can be helpful?

 



--
Shah ast Hussain, Badshah ast Hussain
Deen ast Hussain, Deen Panah ast Hussain
Sardad na dad dast, dar dast-e-yazeed,
Haqaa key binaey La ila ast Hussain

 
                                         




--
█▓▒░ Hafiz Salman Majeed░▒▓█
            www.vuaskari.com
MBA -III (Finance Group)
                  LAHORE

اللہ آپ کو آسانیاں عطا فرمائے۔
جزاكم الله خيرا وأحسن الجزاء في الدنيا والأخرة
جہاں رہیے اللہ کے بندوں کے لیے باعثِ آزار نہیں، باعثِ رحمت بن کر رہیے


--
You received this message because you are subscribed to the Google Groups "Virtual University of Pakistan 2009" group.
To post to this group, send email to virtual-university-of-pakistan-2009@googlegroups.com.
To unsubscribe from this group, send email to virtual-university-of-pakistan-2009+unsubscribe@googlegroups.com.
For more options, visit this group at http://groups.google.com/group/virtual-university-of-pakistan-2009?hl=en.

Comments

Popular posts from this blog

Re: ::: vuaskari.com ::: CS408 - FINAL TERM SUBJECTIVE WITH REFERENCE SOLVED BY UMAIR SAULAT

GREAT WORK On Wed, Feb 20, 2013 at 11:30 PM, Umair Saulat < saulat.umair@gmail.com > wrote: CS408- Human Computer Interaction Solved Subjective Fall Semester 2012   QNo.1    it has been observed that most computer users use menu option for input instead of keyboard accelerator. What is the reason behind it? (2 Marks) Answer:- 1.        Menu options are easier to find. 2.        You don't have to memories the keys for menu option but for key board accelerators you have to memories them REF:: Handouts Page No. 127   QNo.2    Define active intervention.  (2 Marks) Answer:- Active intervention with the participant and actively probes the participant understands of whatever is being tested. REF:: Handouts Page No. 276 QNo.3    what is Ubiquitous Computing? (2 Marks) Answer:- The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indi

Updating our Google Account inactivity policy

Every day Google works hard to keep you and your private information safe and secure by preventing unauthorized access to your Google Account with our built-in security protections. And keeping you safe means having strong privacy practices across our products that minimize how long we store your personal files and any data associated with them. We want to protect your private information and prevent any unauthorized access to your account even if you're no longer using our services. Therefore, we are updating the inactivity period for a Google Account to two years across all our products and services. This change starts rolling out today and will apply to any Google Account that's been inactive, meaning it has not been signed into or used within a two-year period. An inactive account and any content in it will be eligible for deletion from December 1, 2023. What this means for you: These changes do not impact you unless you h

Learn more about our updated Terms of Service

stargthb@gmail.com On January 5, 2022, we're making some changes to our Terms of Service. These changes won't affect the way you use Google services, but they'll make it easier for you to understand what to expect from Google — and what we expect from you — as you use our services. You can review the new terms here . At a glance, here's what this update means for you: More clarity on what you can expect from Google and what we expect from you : We're providing more examples to describe the mutually respectful conduct that we expect from all our users. Improved readability : While our terms remain a legal document, we've done our best to make them easier to understand, including reorganizing some topics so that they're easier to find. If you use Family Link to manage a Google Account for someone else, please take some time to talk to them about these changes. Thank you for using Google!