IT430 E-Commerce Solved Objective Papers For Preparation of final Term Exam

Size: px
Start display at page:

Download "IT430 E-Commerce Solved Objective Papers For Preparation of final Term Exam"

Transcription

1 IT430 E-Commerce Solved Objective Papers For Preparation of final Term Exam Question No: 1 ( Marks: 1 ) - Please choose one In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last withdrawals to the E-bank P:119 Lost Coins In case network fails or computer crashes during payment transaction, coins might be lost. All signed blinded coins from last 16 withdrawals are sent by the bank to the client. Client uses the blinding factor Question No: 2 ( Marks: 1 ) - Please choose one Which entity does not include in SET(secure Electronic Transaction)? Seller

2 Buyer Payment gateway Bank P:122 There are four entities involved in a SET transaction cardholder, Merchant and certification authority and payment gateway. Question No: 3 ( Marks: 1 ) - Please choose one Traditionally Marketer use the market segmentation(s) like Geo-graphic Segmentation Demographic Segmentation Psychographic Segmentation All of the above P:131 Traditionally, marketers have used three types of variables to define three different market segmentations, namely, geographic segmentation, demographic segmentation and psychographic segmentation. Question No: 4 ( Marks: 1 ) - Please choose one Class C has: Network 01 byte and 03 hosts Network 02 bytes and 02 hosts Network 03 bytes and 01 host P:10 None of these In class C, first three bytes refer to the network address and the last byte to the host machines on that network, which would therefore be a very small network. Question No: 5 ( Marks: 1 ) - Please choose one

3 In ring topology, failure of network cable will only take down one computer s network access. True False Question No: 6 ( Marks: 1 ) - Please choose one Which device uses the IP address Switch Router P:16 A router is a decision making device. When a data packet arrives at a router it reads the network addresses from the IP address on the data packet and determines the shortest possible path through which this packet can be delivered to its destination. Repeater None of these Question No: 7 ( Marks: 1 ) - Please choose one What is the correct HTML for inserting an image? <image src="image.gif"> <img src="image.gif"> P:21 <HTML> <BODY> <HI>On Sale Cassettes</H1> <Img Src= cassette.gif > </Body></HTML> <img href="image.gif> <img>image.gif</img> Question No: 8 ( Marks: 1 ) - Please choose one Cryptographic Algorithms are measured in terms of

4 Key length P:108 Cryptographic algorithms are measured in terms of key length. Complexity Simplicity All of the above Question No: 9 ( Marks: 1 ) - Please choose one Upstream activities relate to? Materials/services or the input from suppliers P:155 Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities. Upstream activities relate to materials/services or the input from suppliers Internal activities relate to manufacturing and packaging of goods Downstream activities relate to distribution and sale of goods to distributors/customers Manufacturing and packaging of goods Distribution and sale of goods to distributors/customers Input from suppliers and Distribution Question No: 10 ( Marks: 1 ) - Please choose one Television, radio and print media are in a (n). Mode. Passive P:139 Emotional branding vs. rational branding In case of television, radio or print media people are normally in a passive mode. To a greater extent they do not control the communication channel and thus have to listen or view the advertisement about a brand.

5 Active Static Dynamic Question No: 11 ( Marks: 1 ) - Please choose one Which of the following Barriers to International E-Commerce? Advertising Patents Infrastructure P:161 Barriers to International e-commerce Barriers to international ecommerce include lack of trust, lack of infrastructure, language and culture. Capital Question No: 12 ( Marks: 1 ) - Please choose one Exclusive right granted by law to make, use and sell an invention. What is called? Parasites...cg.Trade mark...cg.patent infringement P:181 Patent infringement A patent is an exclusive right granted by law to make, use and sell an invention. In order to be patentable, the invention must be unique, genuine, and useful according to the prevalent technological standards....cg.copyright

6 Question No: 13 ( Marks: 1 ) - Please choose one Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act. Which legal issue arises due to such acts? Cyber Crimes Online Defamation P:182 Online Defamation A defamatory statement is a false statement that injures the reputation of on another person or company. If a statement injures the reputation of a product or service instead of a person, it is called product disparagement. Cyber squatting None Question No: 14 ( Marks: 1 ) - Please choose one Characterization and Clustering belong to which of the following types of Data Mining? Additive Predictive Selective Descriptive P:141 Types of Data Mining There are four main types of data mining as follows: Classification Association Characterization

7 Clustering Classification and association are predictive types of data mining while characterization and clustering represent the descriptive type. Question No: 15 ( Marks: 1 ) - Please choose one EDI stands for.. Electronic Digital Information Electronic Data Integration Electronic Data Interchange P:147 Lesson 36 ELECTRONIC DATA INTERCHANGE (EDI) All of these Question No: 16 ( Marks: 1 ) - Please choose one Implementing Value Chain model can help us to Reduce cost Improve quality of products Create new ways of selling products All of these. P:153 Examining value chains one finds that EC can help in four different ways as follows: It can reduce costs of a business; It can improve quality of products It can help in reaching new customers or suppliers; It can create new ways of selling products.

8 Question No: 17 ( Marks: 1 ) - Please choose one Following are malicious programs EXCEPT Back doors Trojan Horses Firewalls P:96 Lesson 21 FIREWALLS A firewall is a combination of hardware and software that sits between the internet and internal network of an organization to protect the network from outside attack (Fig. 1). It can examine the data entering or leaving from the network and can filter the data according to certain rules, thus, protects the network from an attack. Worms Question No: 18 ( Marks: 1 ) - Please choose one Which of the following is a valid variable name? 6th_student_CGPA first_student_cgpa P:54 Rules for variables Variable names can begin with an uppercase letter (A-Z), lower case letter (a-z), an underscore character (_), or dollar sign ($). Remaining characters can be any of the above or from digits (0-9). In JavaScript variables are case sensitive. last student CGPA *any_student_cgpa

9 Question No: 19 ( Marks: 1 ) - Please choose one Which of the following payment mode does not require customer to pay interest to the bank on each transaction? Credit card Debit card P:110 Note that in case of a credit card the issuer bank charges interest from the client at a specified rate on the amount lent. On the other hand, in case of a debit card no such interest is payable since the customer uses his/her own money in that case. Electronic check All of the above Question No: 20 ( Marks: 1 ) - Please choose one FVIPSS stands for. First Virtual Internet Payment System Server P:110 First Virtual InternePayment System Server First Virtual International Payment System Server First Virtual International Payment System Services First Virtual Internal Payment System Services Question No: 21 ( Marks: 1 ) - Please choose one Which e-business helps to improve policies, procedures, customer services, and general operations of other businesses? Online shopping malls. Selling intellectual property online. Online service providers. P:129 Online Service Providers

10 These e-businesses help improve policies, procedures, customer service and general operations of other businesses. They can provide consultancy / professional services, for example, web site development services, online legal consultancy services etc. Online automotive sites and energy online. Question No: 22 ( Marks: 1 ) - Please choose one Which of the following is NOT an identified behavioral mode of customers on the web? Browsers Buyers Shoppers Seller Behavioral segmentation Creation of separate experiences for customers based on their behavior is called Three identified behavioral modes of the customers on the web are: Browsers customers who just browse through the site with no intention of buying Buyers customers who are ready to buy right away Shoppers customers who are motivated to buy but want more information Question No: 23 ( Marks: 1 ) - Please choose one Downstream activities relate to distribution and sale of goods to distributors/customers True P:155

11 Supply chain can be broken into three parts, that is, upstream activities, internal activities and downstream activities. Upstream activities relate to materials/services or the input from suppliers Internal activities relate to manufacturing and packaging of goods Downstream activities relate to distribution and sale of goods to distributors/customers False Question No: 24 ( Marks: 1 ) - Please choose one Online banking is a substitute of tradition banking. Is it? True False Question No: 25 ( Marks: 1 ) - Please choose one means services in relation to the transformation of contents of an electronic Document from its original form to one that cannot be understood or decoded by any unauthorized person Cryptography services P:163 Cryptography services means services in relation to the transformation of contents of an electronic document from its original form to one that cannot be understood or decoded by any unauthorized person. Accredited Certification Service Provider Originator Addressee

12 Question No: 26 ( Marks: 1 ) - Please choose one Law is broadly divided into two classes on the basis of nature of wrong, namely, and Civil law and criminal law P:176 Law is broadly divided into two classes on the basis of nature of wrong, namely, civil law and criminal law. Civil law deals with the private rights of the parties, whereas the object of criminal law is to punish the wrong-doer. Civil wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general. ETO and criminal law Supreme and Civil Law None Question No: 27 ( Marks: 1 ) - Please choose one Each layer except has got a header. Physical layer P:05 Header is a piece of information which is attached to the data at its beginning by each layer except the physical layer. The process of moving the data down the OSI Protocol. Datalink layer Session layer Network layer Question No: 28 ( Marks: 1 ) - Please choose one Symmetric algorithms are faster than asymmetric? true P:105

13 The advantage of using symmetric key is that since symmetric algorithms are faster as compared to asymmetric, therefore, the encryption of a message with the symmetric key takes place quickly. false Question No: 29 ( Marks: 1 ) - Please choose one SET was developed in P:122 Secure Electronic Transaction (SET) The drawback in SSL that the credit card/debit card information remains with the merchant led to the development of a more sophisticated protocol called SET. It was developed in 1997 jointly by Visa, MasterCard, Netscape and Microsoft Question No: 30 ( Marks: 1 ) - Please choose one LDA stands for Lahore Development Authority P:165 A statutory body is a body/organization established under some statute/law. For example, the Lahore Development Authority (LDA) is a statutory body established under the Lahore Development Act, 1975 (a provincial statute). Lahore Development Act Question No: 31 ( Marks: 2 ) What is Data Mining? P: 140 Data Mining

14 Data Mining can be defined as the task of discovering interesting patterns from large amounts of data, where the data can be stored in databases, data warehouses, or other information repositories. Data mining has a lot of business application in today s world. We can identify the behavior of our customers and can effectively target them with personalized messages using data mining techniques. Assume that there is a shopping store where the data/information about customers has been recorded /stored over a period of time. Using a data mining technique on the customers data, certain pattern can be generated that can provide useful information. For example, this pattern may tell us that people having a certain demographic profile (age over 20 years and sex male) coming from a particular location have shown inclination to buy computer related items. It is an interesting clue for the marketers. Question No: (Marks: 2 ) What is the purpose of FRAMESET tag? P: 31 <Frameset> and <Frame> are the two basic tags. This concept uses two different types of pages Frameset page and content pages. Frameset page divides the browser window into a set of frames and defines the size of each frame. It also specifies which content pages are displayed in which frame. It has nobody section (no body tag). Content pages are just regular HTML pages. Question No: 33 (Marks: 2 ) What do we mean by "Free-Trial" promotion technique? P: 133 Promotions E-business promotions can attract visitors to your site and induce them to purchase. Promotional messages can be sent both online and offline. Free-trials

15 Customers can sign up for a free service. For example, they can be allowed to download software for certain days free of cost on trial basis before buying it. Question No: 34 (Marks: 2 ) What is UNCITRAL? Most of the countries have, by now, made laws providing recognition to electronic documents an electronic signature. They have basically followed a model law on e- commerce proposed by a U.N. body called UNCITRAL (United Nations Commission on International Trade Law) in On analysis, appears that ETO has certain deficiencies. For instance, difference between an electronic signature and an advanced electronic signature is not clear. Sections dealing with the offences of violation of information a privacy and damage to information /informational systems are too broadly worded, which may lead to confusion. International aspects of e-commerce such as recognition of the foreign certificates and electronic signatures etc. are missing. Question No: 35 (Marks: 3 ) Write precisely about the 4 th stage of planning cycle? P:159 Strategic Planning Cycle E- business competitive strategy is normally formed and implemented according to a planning cycle which is called strategic planning cycle. There are four stages in this planning cycle 1. Industry and Competitive Analysis Strategy 2. Formulation 3. Implementation 4. Performance Assessment or Strategy Reassessment The 4 th stage is Performance Assessment or Strategy Reassessment Strategy assessment: Results of implementation plan are monitored and assessed so that any corrective measures or expansion plan can take place. Basically, you want to assess whether your strategy has delivered what it was supposed to deliver; whether your strategy is still viable/workable in the ever changing environment. In strategy assessment phase, you can learn from your mistakes and do your future planning. In case your

16 EC project has been a failure, you can identity the problems and try to remove them. Some of the corrective measures can be to property train your web team, establish or review your security or privacy policy, review or reassess your web design content, reconsider your marketing plan etc. For the strategy assessment, you can conduct surveys, collect information and receive feedback from different groups of people so that you have solid input from people coming from a variety of background. Sometimes, you have to entirety give up a particular strategy you followed and formulate a new strategy or set of strategies in light of the company s main objective or its mission. Question No: 36 (Marks: 3 ) Discuss the role and responsibilities of Transport layer in OSI model? Transport layer TCP (Transmission Control Protocol) or UDP (User Datagram Protocol) operate at this layer. It has two functions. It converts the data into data packets. Secondly, it is responsible for flow control of data. TCP is more reliable as it is acknowledgment based as opposed to UDP which does not use any system of acknowledgment for the delivery of data packets. Question No: 37 (Marks: 3 ) How lack of trust barrier can be overcome or minimized? Discuss it briefly Lack of Trust It is very important for online businesses to establish trusting relationships with their customers like in the physical world where companies ensure that customers know who they are. However, it is difficult to build trust because a kind of anonymity exists for companies trying to establish web presence. Lack of trust barrier can be overcome or minimized: A plan for establishing credibility of an online business is extremely crucial for its success. In this behalf, attention to the needs of the site visitors is very important while designing the web site, since it can be helpful in building

17 trust with customers. For instance, there should be easy to find web pages that answer questions of the visitors. Note that companies with established brands can build trust for online business more quickly as compared to a new company/business without reputation, since a brand conveys expectations about how the online business would behave. For example, how the seller online business would react to a claim of refund by the customer. Question No: 38 (Marks: 3 ) Write the names of companies who were helper in developing Secure Electronic Transaction. Secure Electronic Transaction. (SET) It was developed in 1997 jointly by Visa, MasterCard, Netscape and Microsoft. Question No: 39 (Marks: 5 ) Differentiate between Cyber squatting and concurrent use with example. P: 181 Cyber squatting The act of intentionally registering domain names containing trademarks/trade names of prominent companies to later blackmail or demand ransom from those companies is called cyber squatting. Example: Assume there is a firm Glory Enterprise and it wants to have its web site. It also wants to have the word glory as a part of its domain name because for years it has been recognized in the physical world through this word. However, at the time of registration of its domain name it finds that a person Mr. A who has nothing to do with the business of the firm or the word glory has already registered a domain name containing this word as a part of it. Since there cannot be two similar domain names, the firm is forced to request Mr. A to transfer that domain name to it. In response, if

18 Mr. A blackmails or claims ransom from the said firm, he would be said to have committed cyber squatting. Concurrent use This problem arises when two organizations have apparently legitimate claim to use the same domain name but cannot do so due to the uniqueness of domain names. Example: Suppose, there is a company manufacturing electronic goods and another company selling French fries. Under the traditional trade mark law both these companies can have the same trade mark/trade name such as frys. The problem arises when both apply for the registration of a domain name containing the word frys. Here, both are legitimate claimants of this domain name but due to the element of uniqueness of domain names only one of them can be assigned the desired domain name. Question No: 40 (Marks: 5 ) Explain Confidence and Support as two measures of Association? P: 144 CONFIDENCE AND SUPPORT There are two terms/measures used in association, that is, support and confidence. Confidence is a measure of how often the relationship holds true e.g, what percentage of time did people who bought milk also bought eggs. Support means what is the percentage of two items occurring together overall. Mathematically, they can be expressed as follows if we take the example of eggs and milk: Confidence = Transactions (eggs + milk) Transactions (eggs or milk or both)

19 In case no. of transactions involving eggs and milk are 25 and those involving eggs or milk or both are 75 then confidence is 25/75*100=33.3% Support = Total no. of transactions Transactions (eggs + milk) In case no. of transactions involving eggs and milk are 10 and total no. of transactions in a day is 50 then support is 10/50*100 = 20% Suppose if confidence is 90% but the support is 5%., then we can gather from this that the two items have very strong affinity or relationship with each other such that when an item is sold the other is sold together, However, the chance of this pair being purchased out of the total no. of transactions is very slim, just 5%. One can adjust these measures to discover items having corresponding level of association and accordingly set marketing strategy. So, if I feed the data to the association mining tool and specify the percentage of confidence and support, it will list down the items that have association corresponding to these percentages. Results of association mining are shown with the help of double arrows as indicated below: Bread Å----Æ Butter Computer Å----Æ Furniture Clothes Å----Æ Shoes Using the result of association mining, a marketer can take a number of useful steps to set or modify marketing strategy. For example, items that have closeness/affinity with each other can be shelved together to improve customer service. Certain promotional schemes can be introduced in view of the association mining result etc. FINALTERM EXAMINATION Fall 2009

20 IT430- E-Commerce Question No: 1 ( Marks: 1 ) - Please choose one In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last withdrawals to the E-bank. 10 Correct Question No: 2 ( Marks: 1 ) - Please choose one In Virtual Payment system, Four kinds of information is provided to e-bank. Identify which one is NOT included: Buyer Accounts identifier Buyer password Correct Address of Merchant Actual amount of money in favor of merchant Question No: 3 ( Marks: 1 ) - Please choose one Which 5th P introduced by E-business in Marketing Mix?

21 Proper coverage Personalized Services Correct Proper access Personal style Question No: 4 ( Marks: 1 ) - Please choose one Creation of separate experiences for customers based on their behavior is called Demographic segmentation Behavioral segmentation Correct Geo-Graphic Segmentation None of the above Question No: 5 ( Marks: 1 ) - Please choose one Call handling, sales tracking and Transaction support(technology / personnel) activities are included in which management system Customer Relationship Management system

22 Public relation management system Inventory management system Correct Data Base Management system Question No: 6 ( Marks: 1 ) - Please choose one Network addresses range belongs to which of the following class networks? A B C Correct E Question No: 7 ( Marks: 1 ) - Please choose one What is the correct HTML for making a text input field? <textinput type="text"> <input type="text"> <input type="textfield"> Correct <textfield> Question No: 8 ( Marks: 1 ) - Please choose one

23 What is the correct HTML for making a hyperlink? <a href=" <a name=" Correct <a url=" <a> Question No: 9 ( Marks: 1 ) - Please choose one DOS is a type of attack and it stands for: Denial of Services Correct Digital Operation Services Dynamic Object Solution All of these Question No: 10 ( Marks: 1 ) - Please choose one An electronic check contains a(n) to the payer s bank to make a specified payment to the payee Serial# Private key Instruction All of the above Correct Question No: 11 ( Marks: 1 ) - Please choose one

24 What is a E-Cash wallet? Hardware Agent Software All of the above Correct Question No: 12 ( Marks: 1 ) - Please choose one Internal activities relate to? Materials/services or the input from suppliers Manufacturing and packaging of goods Correct Distribution and sale of goods to distributors/customers Input from suppliers and Manufacturing Question No: 13 ( Marks: 1 ) - Please choose one Customer data can be gathered and analyzing it customers can be served in a better Manner according to their needs, Which is best option? Customization

25 Customer orientation Customer satisfaction Focus Correct Question No: 14 ( Marks: 1 ) - Please choose one Popular software packages for personal finance is(are): Quicken MS Money Money 2003 All of these Correct Question No: 15 ( Marks: 1 ) - Please choose one array can contain An only text only numbers only numbers or text Correct any valid variable Question No: 16 ( Marks: 1 ) - Please choose one

26 define a method using You obj.method Correct obj.method[] obj.method() obj-method Question No: 17 ( Marks: 1 ) - Please choose one Which of them is NOT an attribute of border? border-width border-style border-pattern Correct border-bottom-color Question No: 18 ( Marks: 1 ) - Please choose one key is 4 bits in length, how many unique key values are possible? If a Correct 32 Question No: 19 ( Marks: 1 ) - Please choose one stands for. PKI Public Key Instrument

27 Public Key Information Public Key Instruction Public Key Infrastructure Correct Question No: 20 ( Marks: 1 ) - Please choose one Which of the following payment system does not involve the use of encryption? Electronic check Electronic cash Virtual PIN None of above Correct Question No: 21 ( Marks: 1 ) - Please choose one ACH is a centralized system used by electronically inter-connected banks for clearing payment requests. True Correct False Question No: 22 ( Marks: 1 ) - Please choose one Cyber wallet can automatically assemble the correct payment and pay it too. True Correct False Question No: 23 ( Marks: 1 ) - Please choose one

28 Cash Payment system, merchant deposits the coins in the bank to check the coins. In E- of Number Validity Correct Private key Sender Question No: 24 ( Marks: 1 ) - Please choose one transactions are slower than SSL. SET True Correct False Question No: 25 ( Marks: 1 ) - Please choose one Which of the following is an advantage of electronic catalogue? Large fix cost if used for small no. of products. Ability of updating product information. Correct Need for customer skill of computers and browsers. Difficult to develop catalogue. Question No: 26 ( Marks: 1 ) - Please choose one Suppose you are running a business. You want to target customers of age less than 30 years. Which type of segmentation would you use? Demographic Segmentation Correct

29 Geographic Segmentation Psychographic segmentation Behavioral segmentation Question No: 27 ( Marks: 1 ) - Please choose one Data cleaning means. Adding missing values Correction of erroneous values Both of above Correct None of above Question No: 28 ( Marks: 1 ) - Please choose one Online banking is a substitute of tradition banking. Is it? True False Correct Question No: 29 ( Marks: 1 ) - Please choose one IT/EC can reduce the overall and afford to keep the price of the product relatively low Production cost Correct Marketing cost

30 Distribution cost None Question No: 30 ( Marks: 1 ) - Please choose one Which organization is used to supervise the task of registration of domain names worldwide? ICCAN ICAAN Correct IICAN None of the given Question No: 31 ( Marks: 1 ) What stands for CRM? Ans: CUSTOMER RELATIONSHIP MANAGEMENT (CRM)

31 Question No: 32 ( Marks: 1 ) Here is an e-coin minted by the bank with 2 dollar key. (Serial #.r e 2 ) d 2 (mod m) Serial # d 2.r e 2 d 2 (mod m) If the bank had signed the same coin with 3 dollar key, what would be the resulting e- coin? Question No: 33 ( Marks: 2 ) Briefly describe analytical attack on public key algorithms. Analytical Attacks These attacks are some fundamental flaws in the mathematical problems on which the encryption system itself is based. A branch, Quantum computing is the branch of computer science that deals with the development of cryptographic algorithms. It can also be used to find flaws in the cryptographic system/algorithms and to launch attacks. Question No: 34 ( Marks: 2 ) Do you agree that Differentiate a product in terms of quality of service is one of the role of e-commerce in Competitive Strategy. Discuss briefly

32 Question No: 35 ( Marks: 3 ) Digital signatures are considered more reliable than paper signatures. Do you agree with this statement? Briefly justify your answer. 1+2 Ans: Yes, digital signature is more reliable than paper signature. Because digital signature contain more information than paper. Question No: 36 ( Marks: 3 ) What is clustering? Briefly explain with help of example. 1+2 This is a group of data objects that are similar to another within the same cluster and are dissimilar to the objects in other clusters. For example, web usage of different categories or list of addresses in data base. Question No: 37 ( Marks: 3 ) Point out the certain deficiencies in ETO? ETO stands for Electronic Transactions Ordinance Question No: 38 ( Marks: 5 ) Explain the advantages of E-business regarding today s scenario.

33 Advantages of E-business Personalized service Product, place, price and promotion are generally recognized as the 4 P s of marketing in relation to Traditional offline businesses. However, personalization is the 5th P added to the other 4 P s when we are discussing about an e-business. By using internet data we can gather information for database and make personalized data for services. High-quality customer service By getting online suggestion we can improve our quality. No inventory cost In such there is no warehouse is required therefore inventory cost is very low. Because we take order from client and fulfill it by procuring from open market. Worldwide reach of your business An online business can work anywhere in world. This is a good concept of Global business. Electronic catalogues Electronic cards and catalogues are used to enhance the procedure for customers. Therefore, online shopping can be done more quickly and in a more convenient environment. Question No: 39 ( Marks: 5 )

34 down three Supporting activities with examples as discussed by Michael Porter in a strategic business unit. List Ans; 1- Human Resource This is referred to activities that are coordination of management employees e.g. staffing, compensation and benefits. 2- Financial And Administration- It is relating to paying bills, accounting. 3- Technology Department It is used for improvement of product and services for best selling the product. E.g. improvement of field tests, process improvement studies. Question No: 40 ( Marks: 10 ) How anonymity is ensured in E-Cash payment system? Explain with the help of examples. Ans: In E cash payment system, anonymity means that the identity of client or customer will not be disclosed. In this payment mechanism, there are two stages, 1- Minting Stage 2- Deposit Stage 1- At minting stage e- cash bank signed the serial no. to provide the third part of

35 valid coin. But at this stage bank actually knows that who are amongst its different account holders whose are requesting for the banks signature on the serial no, but it does not mean that it knows the serial no, it is just a blinding factor due to signing. 2- This is reverse to minting stage. In this case we sent the coins toe- cash bank to check the validity. In this case bank know the serial no. but this time doesn t know the client who sent these for payment purpose. Because the bank may have issued the coins to many clients and bank at deposit stage doesn t know who did shopping and making payment now. So, the relationship between the client and the serial no. is broken at the minting and deposit stage to ensure anonymity of the client. So if we summarize it then as follows Minting Stage Serial number is unknown Client is known Deposit Stage Serial no. is known Client is unknown

36 Question No: 41 ( Marks: 10 ) Differentiate between the centralized electronic payment system and electronic checks. Centralized Electronic Payment System Electronic Check In an electronic check, information contains are that instruction to the payer bank to make a specific payment to payee. This concept is launched by Financial Services Technology Consortium (FSTC). It is a group of US banks. In this system two types of cryptography are used 1- Symmetric 2- Asymmetric Certificates are issued to both parties in standard format by their respective banks and these are issued to check the digital signature on the check. These certificates may have some restrictions on the certificates like, max check value, or currencies allowed etc.

37 This check book device is a combination of hardware and software. In hardware a smart card may be used. It is like s credit cad. Certain information are provided on the card and one secrete key is also issued. Centralized Electronic Payment System This is a popular payment system on the internet. In this both the payer and the payee hold accounts at the same centralized on-line financial institution. Many payment systems use this approach e.g., PayPal, E-gold, Billpoint, Cybergold, Yahoo! Pay Direct, Amazon.com Payments etc On-line opening/ of one s account is done in a centralized bank using credit/debit card. To make payment an account holder is authenticated using an account identifier and a password, account identifier of the payee and the payment amount. In this system, payee is notified by their account statement y phone sms or . The centralized bank charges a transaction fees either from the payer, or payee or both on funding an account or withdrawing funds from an account or receiving payments by the payee. This payment model requires that all participants must have their account with the same central payment system/bank. Note that the payee can eventually withdraw the money received in hi account in the centralized bank through Automated Clearing House (ACH). IT430 Final 2010 Question No: 1 ( Marks: 1 ) - Please choose one In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last withdrawals to the E-bank.

38 Ref: Page # 119 Lost Coins In case network fails or computer crashes during payment transaction, coins might be lost. All signed blinded coins from last 16 withdrawals are sent by the bank to the client Question No: 2 ( Marks: 1 ) - Please choose one as you all familiar with it. Which of the following loyalty stages its customers are: ( Who don t know about it): Detail about amzon.com) "Amazon was one of the first major companies to sell goods by Internet, and was an iconic "stock in which to invest" of the late 1990s dot-com bubble. Jeff Bezos founded Amazon.com, Inc. in 1994, and launched it online in Amazon.com started as an on-line bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3 format, computer software,, etc. Amazon has established separate websites in Canada, the United Kingdom, Germany, France, China, and Japan. It also provides global shipping to certain countries for some of its products. " Awareness Exploration Familiarity Commitment Page # 136 Awareness This is the first stage where customers recognize the name of the company or any of its products. However, they have never interacted with the company before. A company/business can achieve this level by properly advertising its brand.

39 Question No: 3 ( Marks: 1 ) - Please choose one Customer Loyalty model is also called Customer Life Cycle Customer Segmentation Customer Awareness All of the options Page # Question No: 4 ( Marks: 1 ) - Please choose one Which of the following is True for Class B: Network 01 byte and 03 hosts Network 02 bytes and 02 hosts Network 03 bytes and 01 host None of these Page # 10 In class B, the first two bytes indicate the network address and the last two bytes indicate the host machines on that network Question No: 5 ( Marks: 1 ) - Please choose one RIP(Routing Information protocol) is used by , to build a table bridges, hash routers, matrix routers, routing All of these Page # 16 A router can communicate with another router on the internet with the help of Routing Information Protocol, and thus it can build a routing table.

40 Question No: 6 ( Marks: 1 ) - Please choose one Switch is used on the layer First Layer Second Layer Third Layer None of these Ref: IT430 1 st assignment solution file uploaded by instructor. Question No: 7 ( Marks: 1 ) - Please choose one Router is used on the layer First Layer Second Layer Third Layer None of these Ref: IT430 1 st assignment solution file uploaded by instructor. Question No: 8 ( Marks: 1 ) - Please choose one In HTML If you leave out the setting for scrolling what will happen? No scrollbar will appear even if needed. A scrollbar will always be present. A scrollbar will appear if needed. All options. SCROLLING this attribute determines whether a scroll bar appears with a frame (e.g, Scrolling= yes in the <frame> tag makes it appear)

41 Question No: 9 ( Marks: 1 ) - Please choose one Which one of the following attacks does not include in the attacks on Symmetric key Key search attack Cryptanalysis System based attacks Organization attacks Page # 108 Attacks on Symmetric Key Algorithms Following attacks have been reported on symmetric key algorithms: Key Search Attacks Cryptanalysis Systembased Attacks Question No: 10 ( Marks: 1 ) - Please choose one What is a E-Cash wallet? Hardware Agent Software All of the above Page # 116 Buyers withdraw coins against their account and store them in e-cash wallet software (Cyber wallet) on their computer. Cyber wallet stores and manages coins and records every transaction. Question No: 11 ( Marks: 1 ) - Please choose one It is the ability to sell the goods or provide the service at a price that is lower than that of competitors, and thus attract more customers. What is called?

42 Cost leadership Price leadership Focus Differentiation Ref: PAGE # 157 Cost leadership: It is the ability to sell the goods or provide the service at a price that is lower than that of competitors, and thus attract more customers. Question No: 12 ( Marks: 1 ) - Please choose one Meta tag contains: User information seller information web page key information bank information Ref: PAGE # 138 META INFORMATION: You know that a Meta tag contains the key information of a web page. Question No: 13 ( Marks: 1 ) - Please choose one In many countries, stealing and misusing of meta information for getting competitive advantage is considered as an offence known as Tort of Private Nuisance Tort of Tress passing Tort of passing off Defamation Ref: PAGE # 138

43 In many countries, stealing and misusing Meta information in this manner to gain business/competitive advantage is considered as an offence known as the tort of passingoff. Question No: 14 ( Marks: 1 ) - Please choose one Which of the following is NOT force of Porter s competitive rivalry Model? Threat of potential/new entrants Threat of substitute Differentiation and cost leadership Competition between existing players Page # 158 Threat of potential/new entrants to the sector Threat of substitute product or service in the existing trade Bargaining power of the buyers Bargaining power of the suppliers Competition between existing players Question No: 15 ( Marks: 1 ) - Please choose one Exclusive right granted by law to make, use and sell an invention. What is called? Parasites Trade mark Patent infringement Copyright Ref: PAGE # 181 Patent infringement: A patent is an exclusive right granted by law to make, use and sell an invention. In order to be patentable, the invention must be unique, genuine, and useful according to the prevalent technological standards.

44 Question No: 16 ( Marks: 1 ) - Please choose one GM Celebes manufacturing electronic goods and FryChips co selling French fries. Under the traditional trade mark law both these companies can have the same trade mark/trade name such as frys. The problem arises when both apply for the registration of a domain name containing the word frys. Here, both are legitimate claimants of this domain name but due to the element of uniqueness of domain names only one of them can be assigned the desired domain name. Which legal issue arises in this situation? Domain name conflict Cyber squatting Concurrent use None Ref: PAGE # 181 Concurrent use This problem arises when two organizations have apparently legitimate claim to use the same domain name but cannot do so due to the uniqueness of domain names. Suppose, there is a company manufacturing electronic goods and another company selling french fries. Under the traditional trade mark law both these companies can have the same trade mark/trade name such as frys. The problem arises when both apply for the registration of a domain name containing the word frys. Here, both are legitimate claimants of this domain name but due to the element of uniqueness of domain names only one of them can be assigned the desired domain name. Question No: 17 ( Marks: 1 ) - Please choose one ANSI stands for. American National Standards Institute All Network Standards Institute American New standards Institute Australia National standards Institute

45 Page # 147 ANSI (American National Standards Institute) Question No: 18 ( Marks: 1 ) - Please choose one Which of the following company develop ERP soft wares? SAP Oracle JD Edward All of these Page # 150 SAP is an example of ERP software. ERP is complex. It is not intended for public consumption as proper integration of ERP with ecommerce applications is still a major problem. Question No: 19 ( Marks: 1 ) - Please choose one Company collecting information assumes that the customer does not object to a specific use of information unless the customer specifically denies the permission. Thus, the company may use the collected information for its own purpose, as well as, sell or rent it out to other firms or persons. Which of the following Approach it is using? Opt-inout Opt-out Swap-out Opt-in Page # 183 opt-out approach, the company collecting information assumes that the customer does not object to a specific use of information unless the customer specifically denies the permission. Thus, the company may use the collected information for its own purpose, as well as, sell or rent it out to other firms or persons. Question No: 20 ( Marks: 1 ) - Please choose one

46 What does ++ operator do? Adds two numbers together Joins two text strings together Adds 1 to a number Adds 2 to a number Page # 58 Operators in java script Mathematical operators + For addition of two values - for subtraction of two values * for multiplication / for division % modulus (for calculating the remainder) ++ for increment -- for decrement Logical operators && for logical and for logical or! for logical not Question No: 21 ( Marks: 1 ) - Please choose one A paper signature is believed to be more reliable than a digital signature. True False Ref: PAGE # 106 A digital or electronic signature is believed to be more reliable as compared to paper signatures because it is not ordinarily possible to copy or forge an electronic/digital signature. But, that is very much possible in case of paper signatures. Question No: 22 ( Marks: 1 ) - Please choose one Job searchers can search for jobs and employers can hire effectively using. Online recruiting web sites. Online banking web sites. Online trading and lending web sites. Online news services web sites. Ref: PAGE # 128 Online Recruiting: Employers can recruit and job searchers can search for jobs effectively through online recruiting web sites.

47 Question No: 23 ( Marks: 1 ) - Please choose one Suppose you want to search from Virtual University s database that how many students have taken MBA in a specific semester. In this scenario, which type of data mining you are using? Classification Association Characterization Clustering Page # 144 Characterization It is discovering interesting concepts in concise and succinct terms at generalized levels for examining the general behavior of the data. For example, in a database of graduate students of a university the students of different nationalities can be enrolled in different departments such as music history, physics etc. We can apply characterization technique to find a generalized concept/answer in response to the question that how many students of a particular country are studying science or arts Question No: 24 ( Marks: 1 ) - Please choose one For example, white color denotes purity in Europe and America but is associated with death and mourning in china and some Asian countries. Similarly, a web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death. Which of the following barrier involve in above example Culture Language Trust Infrastructure Issues Page # 162 For example, white color denotes purity in Europe and America but is associated with death and mourning in china and some Asian countries. Similarly, a web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death in that culture.

48 Question No: 25 ( Marks: 1 ) - Please choose one means services in relation to the transformation of contents of an electronic document from its original form to one that cannot be understood or decoded by any unauthorized person Cryptography services Accredited Certification Service Provider Originator Addressee Page # 163 Cryptography services means services in relation to the transformation of contents of an electronic document from its original form to one that cannot be understood or decoded by any unauthorized person. Question No: 26 ( Marks: 1 ) - Please choose one Risk Management is the part of which activity? E-business E-commerce E-marketing All of the given Question No: 27 ( Marks: 1 ) - Please choose one Which type of algorithm is used by virtual pin system for encryption? DES (Data Encryption Standard) IDEA (International Data Encryption Algorithm) Rinjdael Non of above Page # 110 Virtual PIN system does not involve the use of encryption.

49 Question No: 28 ( Marks: 1 ) - Please choose one Which one is not the life cycle stage of the customer relation? Awareness Exploration Familiarity Cancelation Page # 136 Question No: 29 ( Marks: 1 ) - Please choose one Popular EDI documents formatting standards X12 EDIFACT X12 and EDIFACT None Page # 147 EDI documents are formatted using published standards. Two popular EDI standards are - ANSI (American National Standards Institute) X12 standard and EDIFACT (United Nations Standard of Electronic Data Interchange for Administration, Commerce and Transport). Question No: 30 ( Marks: 1 ) - Please choose one LDA stands for Lahore Lahore Development Authority Development Act Page # 165

50 For example, the Lahore Development Authority (LDA) is a statutory body established under the Lahore Development Act, 1975 (a provincial statute). Question No: 31 ( Marks: 2 ) What is meant by EDI? Question No: 32 ( Marks: 2 ) What do we mean by Affiliation between two parties? Explain shortly. Question No: 33 ( Marks: 2 ) Write HTML code for two input fields, one for Login Name and other for Password. Question No: 34 ( Marks: 2 ) What term/matters does the concurrent legislative list sets out according to (ETO) 2002? Question No: 35 ( Marks: 3 ) Describe the importance of Customer Relationship Management (CRM) in current scenario. Question No: 36 ( Marks: 3 ) In ETO, what are functions of Accredited Certification Service Provider? Question No: 37 ( Marks: 3 ) How many legislative list(s) is(are) in Constitution of Islamic Republic of Pakistan at end? Question No: 38 ( Marks: 3 ) Write short note on Packet Filter Firewall?

51 Question No: 39 ( Marks: 5 ) Discuss briefly how companies are getting competitive advantage over the other organizations through differentiation and focus? Question No: 40 ( Marks: 5 ) Write a short note on the following Global legal issues (Marks: =5) 1. Territorial Jurisdiction 2. Online contracts FINALTERM EXAMINATION Spring 2009 IT430- E-Commerce (Session - 3) Ref No: 17 Time: 120 min Question No: 1 ( Marks: 1 ) - Please choose one minting stage, the serial number is..by E-Cashbank At Known Unknown Secret Secret Forwarded Forwarded

52 Question No: 2 ( Marks: 1 ) - Please choose one and SSL both are same with respect to security. SET True False Question No: 3 ( Marks: 1 ) - Please choose one Advertising Supported Revenue Model includes Yahoo portal Employment sites Newspaper Publishers All of the above Question No: 4 ( Marks: 1 ) - Please choose one Advertising Subscription Mixed Revenue Model includes Online journals Sports information services Business week online

53 All of the above Question No: 5 ( Marks: 1 ) - Please choose one us, suppose that you have hosted your e-commerce website, Let When you provide opt-in option to your customers on your website and customer opt for it, what does it mean to receive? Information about product through advertisement Information about product through Information about services available on it Information about News through . Question No: 6 ( Marks: 1 ) - Please choose one What does Telemarketing means? Marketing through charting Marketing through telephone Marketing through

54 Marketing through web casting Question No: 7 ( Marks: 1 ) - Please choose one Visitor s location, IP address, time of visit related information are added, in which of the following call handling files cookies log files Data mining files. Question No: 8 ( Marks: 1 ) - Please choose one HTML stands for? Hyper Text Marked Language Hyper Text Markup Language Hyper Text Member License None of these Question No: 9 ( Marks: 1 ) - Please choose one which one of the following,<marquee...> tag can work better For

55 News headlines Announcements Sound pulgin Movie controls Question No: 10 ( Marks: 1 ) - Please choose one Which of the following,in Javascript, we could not create our own? Textboxes Dropdown Object Image Question No: 11 ( Marks: 1 ) - Please choose one How do you write a conditional statement for executing some statements only if "i" is equal to 5? if i=5 if i=5 then if i==5 then if (i==5) Question No: 12 ( Marks: 1 ) - Please choose one Which one of the following,is the correct way to declare a JavaScript array?

56 var txt = new Array="tim","kim","jim" var txt = new Array(1:"tim",2:"kim",3:"jim") var txt = new Array("tim","kim","jim") var txt = new Array:1=("tim")2=("kim")3=("jim") Question No: 13 ( Marks: 1 ) - Please choose one Upstream activities relate to? Materials/services or the input from suppliers Manufacturing and packaging of goods Distribution and sale of goods to distributors/customers Input from suppliers and Distribution Question No: 14 ( Marks: 1 ) - Please choose one Downstream activities relate to? Materials/services or the input from suppliers Manufacturing and packaging of goods

57 Distribution and sale of goods to distributors/customers Manufacturing and Distribution Question No: 15 ( Marks: 1 ) - Please choose one Porter s Model helps a firm to identify threats to its competitive position and to devise plans including the use of IT and e-commerce to protect or enhance that position. True False Question No: 16 ( Marks: 1 ) - Please choose one A company collecting information assumes that the customer does not object to a specific use of information unless the customer specifically denies the permission. Thus, the ompany may use the collected information for its own purpose, as well as, sell or rent it out to other firms or persons. Which of the following Approach it is using? Opt-inout Swap-out Opt-in

58 Opt-out Question No: 17 ( Marks: 1 ) - Please choose one Which type of Data Mining contains the elements as Support and confidence? Classification Association Characterization Clustering Question No: 18 ( Marks: 1 ) - Please choose one In which type of data mining, Apriori algorithms is used? Classification Association Characterization Clustering Question No: 19 ( Marks: 1 ) - Please choose one

59 How do you define a numerical value? var mynum = new Math; var mynum = Math(6); var mynum = 6; Math.mynum = 6; Question No: 20 ( Marks: 1 ) - Please choose one Which CSS property controls the text size? font-style text-style font-size text-size Question No: 21 ( Marks: 1 ) - Please choose one Which of the following is a function of Cyberwallet? Store coins Manage Coins Record transactions All of above Question No: 22 ( Marks: 1 ) - Please choose one Which model allows the users to log-on on a website and assume the role of bidder or seller? Online Banking.

60 Storefront Model. E-Learning. Auction Model. Question No: 23 ( Marks: 1 ) - Please choose one Job searchers can search for jobs and employers can hire effectively using. Online recruiting web sites. Online banking web sites. Online trading and lending web sites. Online news services web sites. Question No: 24 ( Marks: 1 ) - Please choose one Which of these is a rule about bondage or affinity of two items such that if one item is purchased, the other is purchased too? Classification Association Characterization Clustering Question No: 25 ( Marks: 1 ) - Please choose one Electronic banking is also known as. Cyber banking Virtual banking Online banking

61 All of above Question No: 26 ( Marks: 1 ) - Please choose one Identify the necessary aspect for a business to work to establish long term relationship with at least small number of capable suppliers. Supply chain management Demand chain management Ultimate consumer orientation None of the given Question No: 27 ( Marks: 1 ) - Please choose one IT/EC can reduce the overall and afford to keep the price of the product relatively low Production cost Marketing cost Distribution cost None

62 Question No: 28 ( Marks: 1 ) - Please choose one means services in relation to the transformation of contents of an electronic document from its original form to one that cannot be understood or decoded by any unauthorized person Cryptography services Accredited Certification Service Provider Originator Addressee Question No: 29 ( Marks: 1 ) - Please choose one Criminal wrongs such as breach of contract are deemed to violate only the rights of individuals and not the society in general True False Question No: 30 ( Marks: 1 ) - Please choose one A. Is a group of data objects that are similar to one another in each group?

63 Character Classification Association Cluster Question No: 31 ( Marks: 1 ) What stands for CRM? CRM stands for costumer relationship management. Question No: 32 ( Marks: 1 ) What are the three attacks on symmetric key algorithms? Write names only. 1. Key Search Attacks 2. Cryptanalysis 3. System-based Attacks Question No: 33 ( Marks: 2 ) What is ONLINE BANKING? Online banking provides services to the customers through internet including services of electronic funds transfer. Question No: 34 ( Marks: 2 )

64 Define these two terms plaintiff and defendant? The person who files a lawsuit are called plaintiff. And the person against whom it is filed is called defendant. Question No: 35 ( Marks: 3 ) How lack of trust barrier can be overcome or minimized? Discuss it briefly Online companies must establish a trust relationship with its costumers, because as we know that there is a gap that we feel that web based companies are not present in physical. There for web businesses the trust must be present between costumer and sellers. Question No: 36 ( Marks: 3 ) What do we mean by internet-based EDI? Briefly explain how could it be used as substitute of VAN? (1 + 2) Internet can support EDI in a variety of ways. Internet can be used as EDI message transport mechanism in place of having a VAN. An extranet can be created with the trading partner allowing a partner to enter information in the fields of web forms which correspond to the fields of EDI message. Also, web-based EDI hosting service can be utilized through web-based EDI software. Question No: 37 ( Marks: 3 ) Briefly explain how does the bank check validity of e-coins when merchant sends them for deposit?

65 Coins used in the payment are encrypted with bank s public key, preventing the merchant to view them. Payment information is forwarded to the bank with encrypted coins during merchant s deposit. Only hash of the order description is included in payment information preventing the bank from knowing the order details. Question No: 38 ( Marks: 5 ) Describe the advantages and disadvantages of Virtual PIN.( ) Advantages and disadvantages of Virtual PIN: Simplicity and no encryption is the biggest advantage of this payment system, which means that no special software is needed at the frond end. This payment system is good for low-cost information items. Therefore, it is suitable for buying online articles, journals, music. Where the cost of the items is not much. In that eventuality, only sales are lost rather than actual financial loss to the merchant if there is a fraud. In other words, only some extra copies of the information items are made in case of a fraud. On the other hand merchant is exposed too much greater financial loss if the purchase relates to the actual physical goods. One of the disadvantages of this payment model is that pre-registration of the buyer and the merchant with FV is mandatory in this set up. Moreover, maintaining a bank account (in case of merchant) and having a credit card (in case of a buyer) is also essential part of this system. One can say that the merchant side is less secured in the transaction because the goods are delivered by the merchant before the payment is actually received. The popularity of this payment system declined after 1998 mainly because of the introduction and development of encryption based payment mechanisms. Question No: 39 ( Marks: 5 ) Differentiate between Cyber squatting and concurrent use with example. Cyber squatting:

66 The act of intentionally registering domain names containing trademarks/trade names of prominent companies to later blackmail or demand ransom from those companies is called cyber squatting. It is regarded as an offence in most countries. Assume there is a firm Glory Enterprise and it wants to have its web site. It also wants to have the word glory as a part of its domain name because for years it has been recognized in the physical world through this word. However, at the time of registration of its domain name it finds that a person Mr. A who has nothing to do with the business of the firm or the word glory has already registered a domain name containing this word as a part of it. Since there cannot be two similar domain names, the firm is forced to request Mr. A to transfer that domain name to it. In response, if Mr. A blackmails or claims ransom from the said firm, he would be said to have committed cyber squatting. Concurrent use: This problem arises when two organizations have apparently legitimate claim to use the same domain name but cannot do so due to the uniqueness of domain names. Suppose, there is a company manufacturing electronic goods and another company selling French fries. Under the traditional trade mark law both these companies can have the same trade mark/trade name such as fry s. The problem arises when both apply for the registration of a domain name containing the word fry s. Here, both are legitimate claimants of this domain name but due to the element of uniqueness of domain names only one of them can be assigned the desired domain name. Question No: 40 ( Marks: 10 ) How strategies are formulated and implemented? Explain it with real world example. Strategy Formulation: Based upon this study of internal and external business environment and in light of a company s strengths and weaknesses, a competitive business strategy is formed. It may be a strategy of cost leadership, product differentiation or focus. One can also

67 identify ways how information technology can be used to implement/enforce such strategy. Strategy Implementation: In the implementation stage, you build a plan to identify steps needed to put the strategy into action and practically take those steps. For example, where your strategy is to pursue differentiation in terms of quality of service by using/arranging a web-based call centre through which the customers can immediately register their complaints; then you will have to select appropriate individuals who are suitable for the job in the implementation stage. Creating a web team and defining the role of each member of the team is a critical component of implementation stage. For example, you define that this person would be the team leader; this would be in the technical staff, or the management staff. Note that involvement of key persons from marketing, accounting, finance, human resource, IT, customer relations etc. will be important in decision marking as to how a particular implementation plan can be executed. A strategic plan can be at times initially implemented in terms of a pilot project before launching it to a full scale. For example, an automobile manufacturer in America had implemented a plan/scheme which allowed the potential customers to have scheduled test drives before buying a particular car. Initially, this scheme was introduced to four American states but later it was implemented all over the country. Another point is to consider whether you should build your own infrastructure for execution or outsource the task of execution of a strategic plan. For example, where a strategic plan requires a particular web design, you can either mange your own team of web designers or outsource this task to an outside firm having expertise in this area. Question No: 41 ( Marks: 10 ) How can you define the concept of cyber banking? How it takes place? What is its important role in E-Commerce? (3+2+5)

68 Electronic banking, also known as cyber banking, virtual banking, home banking and online banking, includes various banking activities conducted from home, business, or on the road, instead of at a physical bank location. Important roles of cyber banking in e-commerce. 1. Get current account balances at any time 2. Obtain credit card statements 3. Pay utility bills 4. Download account information 5. Transfer money between accounts 6. Send to your bank 7. Manage your own schedule 8. Handle your finances from any location 9. Apply for loans online FINALTERM EXAMINATION Fall 2009 IT430- E-Commerce (Session - 1) Question No: 1 ( Marks: 1 ) - Please choose one version represents public key by Buyer Key Seller E-Bank

69 Certification Authority Question No: 2 ( Marks: 1 ) - Please choose one stands for SSL Secure Socket Layer Security Service Layer Sub Secured Length None of these Question No: 3 ( Marks: 1 ) - Please choose one How many kinds of Web Portals are? Question No: 4 ( Marks: 1 ) - Please choose one Brick and Mortar refers to Offline business

70 Online business Transport Building Question No: 5 ( Marks: 1 ) - Please choose one Digital Content Revenue Model Includes Legal information services Online journals Online Libraries All of the above Question No: 6 ( Marks: 1 ) - Please choose one Which of following marketing campaigns are cheap an effective way to target potential customers? Sale forces

71 Media promotion Marketing software Question No: 7 ( Marks: 1 ) - Please choose one What does Telemarketing means? Marketing through charting Marketing through telephone Marketing through Marketing through web casting Question No: 8 ( Marks: 1 ) - Please choose one Which of following services build a strong customer loyalty towards company and its products? Customer services Public relations(pr) Bulletin board

72 Exhibitions. Question No: 9 ( Marks: 1 ) - Please choose one Track the customers online and do personalization is only possible through which of the following file(s) analysis. log files cookie data mining log files and cookies. Question No: 10 ( Marks: 1 ) - Please choose one Which of the following is true for Class A: Network 01 byte and 03 hosts Network 02 bytes and 02 hosts Network 03 bytes and 01 host None of these

73 Question No: 11 ( Marks: 1 ) - Please choose one What is the correct HTML for making a text input field? <textinput type="text"> <input type="text"> <input type="textfield"> <textfield> Question No: 12 ( Marks: 1 ) - Please choose one IIS stands for: International Information Service Internet Information Server Internet Information standards All of these Question No: 13 ( Marks: 1 ) - Please choose one The payer and the payee are issued digital certificates in standard format by their respective banks. X. 509 F. 609 L.8999 N.586

74 Question No: 14 ( Marks: 1 ) - Please choose one What is a E-Cash wallet? Hardware Agent Software All of the above Question No: 15 ( Marks: 1 ) - Please choose one An E-cash coin consists of element (s) like: Serial # provided by client Key version Serial# signed by E-cash bank All of the above Question No: 16 ( Marks: 1 ) - Please choose one What is Ultimate consumer orientation? Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain. Secondary Primary objective of supply chain is to help each company to meet needs of the consumer at the end of supply chain.

75 Supply chain is to help each company to meet needs of the supplier, seller and buyer at the end of supply chain. None of them Question No: 17 ( Marks: 1 ) - Please choose one Customer data can be gathered and analyzing it customers can be served in a better Manner according to their needs, Which is best option? Customization Customer orientation Customer satisfaction Focus Question No: 18 ( Marks: 1 ) - Please choose one company ABC web page divided into four segments can be unpleasant to a Japanese visitor because no. four is a symbol of death in that culture. A Which is the international barrier it is having?

76 Culture Language Lack of trust Infrastructure Question No: 19 ( Marks: 1 ) - Please choose one Exclusive right granted by law to make, use and sell an invention. What is called? Parasites Trade mark Patent infringement Copyright Question No: 20 ( Marks: 1 ) - Please choose one

77 Suppose, someone circulates a news item in the media about the reputation of a doctor, alleging him to be professionally incompetent and negligent. This doctor may then file a lawsuit against that person claiming that his reputation has been injured due to such an act. Which legal issue arises due to such acts? Cyber Crimes Online Defamation Cyber squatting None Question No: 21 ( Marks: 1 ) - Please choose one How can you reference part of a string? text.substr(5,6); text.part(5,6) text.piece(5,6) text.split(5,6); Question No: 22 ( Marks: 1 ) - Please choose one is an example of This

78 0-tier architecture 1-tier architecture 2-tier architecture n-tier architecture Question No: 23 ( Marks: 1 ) - Please choose one Following are the names of some well known e-commerce software, EXCEPT Intershop IBM's WebSphere Commerce Professional Edition Microsoft Commerce Server 2002 Microsoft SQL Server 2005 Question No: 24 ( Marks: 1 ) - Please choose one Style Sheets, How do you change the font of an element? In font-face: font: font-family: font-style:

FINALTERM EXAMINATION. Spring IT430- E-Commerce (Session - 1)

FINALTERM EXAMINATION. Spring IT430- E-Commerce (Session - 1) FINALTERM EXAMINATION Spring 2010 IT430- E-Commerce (Session - 1) Time: 90 min Marks: 60 Question No: 1 ( Marks: 1 ) - Please choose one JIT Stands for Just In Tim Join in Training Just In Total Page 147:

More information

E-COMMERCE (www.cse.hcmut.edu.vn/~c503007)

E-COMMERCE (www.cse.hcmut.edu.vn/~c503007) E-COMMERCE- 503007 (www.cse.hcmut.edu.vn/~c503007) Chapter 2: E-commerce environment & revenue models Đặng Trần Trí E-mail: tridang@cse.hcmut.edu.vn Website: http://www.cse.hcmut.edu.vn/~tridang E-commerce

More information

The Bank of Elk River: Digital Wallet Terms and Conditions

The Bank of Elk River: Digital Wallet Terms and Conditions The Bank of Elk River: Digital Wallet Terms and Conditions These Terms of Use ("Terms") govern your use of any eligible debit card issued by The Bank of Elk River (a "Payment Card") when you add, attempt

More information

Ebusiness: A Canadian Perspective for a Networked World, 4e Chapter 2 Internet Business Models and Strategies

Ebusiness: A Canadian Perspective for a Networked World, 4e Chapter 2 Internet Business Models and Strategies 1) Which of the following would be appropriate when defining a business model? A) the manner in which a business organizes itself so as to achieve its objectives B) traditional business models have usually

More information

OpenBank - banking platform for e-money management based on blockchain technology (version 0.2)

OpenBank - banking platform for e-money management based on blockchain technology (version 0.2) OpenBank - banking platform for e-money management based on blockchain technology (version 0.2) Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin Abstract Traditional banking technology has multiple

More information

Fundamentals of Information Systems, Seventh Edition

Fundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition Chapter 5 Electronic and Mobile Commerce and Enterprise Systems Fundamentals of Information Systems, Seventh Edition 1 Why Learn About Electronic and

More information

This tutorial takes adopts a simple and practical approach to explain the governing principles of e-commerce.

This tutorial takes adopts a simple and practical approach to explain the governing principles of e-commerce. About the Tutorial E-Commerce or Electronics Commerce is a methodology of modern business, which addresses the requirements of business organizations. It can be broadly defined as the process of buying

More information

Good 4 Global Charity Foundation Ltd Good 4 Global Limited. On behalf of all Affiliates and Software Licensees

Good 4 Global Charity Foundation Ltd Good 4 Global Limited. On behalf of all Affiliates and Software Licensees Good 4 Global Charity Foundation Ltd Good 4 Global Limited On behalf of all Affiliates and Software Licensees Website terms and conditions relate to all online transactions, goods and services purchased

More information

Procurement Assistance Software & Support, LLC. The USA Buyers eprocurement Marketplace

Procurement Assistance Software & Support, LLC. The USA Buyers eprocurement Marketplace Procurement Assistance Software & Support, LLC Toll Free Customer Support (866) 526 0160 838 East High Street, #254 Lexington, Ky 40502 Phone (859) 335 5306 The USA Buyers eprocurement Marketplace PARTICIPATING

More information

E-INVOICING Action Required: OB10 Registration

E-INVOICING Action Required: OB10 Registration E-INVOICING Action Required: OB10 Registration June 2013 Dear..Sir/Madam, Unilever has taken a strategic decision to encourage all suppliers to migrate towards electronic invoicing. Unilever Europe receives

More information

Privacy Policy MONAT GLOBAL

Privacy Policy MONAT GLOBAL MONAT GLOBAL Monat Global (referred to herein as Monat Global, our, us or we ) is committed to respecting the privacy rights of those visiting our websites, including our Market Partners Replicated Websites

More information

ANZ EFTPOS card and ANZ Visa Debit card CONDITIONS OF USE

ANZ EFTPOS card and ANZ Visa Debit card CONDITIONS OF USE ANZ EFTPOS card and ANZ Visa Debit card CONDITIONS OF USE As part of our commitment to you, this document meets the WriteMark Plain English Standard. If you have any questions about these Conditions of

More information

Sample Exam. INFS 2019: Intro to e-business 30 marks 2h

Sample Exam. INFS 2019: Intro to e-business 30 marks 2h Sample Exam INFS 2019: Intro to e-business 30 marks 2h Q1 Define e-commerce and describe how it differs from e-business? Where does e-commerce intersect with e- business? (3 marks) E-commerce vs. E-business

More information

BIT GREEN COIN IS DIGITAL CASH

BIT GREEN COIN IS DIGITAL CASH WHITE PAPER ` BIT GREEN COIN IS DIGITAL CASH The next generation of advance dissolution for global money transaction A break through digital solution related to money transaction. BIT GREEN is a kind of

More information

Virtual Terminal User Guide

Virtual Terminal User Guide Virtual Terminal User Guide Table of Contents Introduction... 4 Features of Virtual Terminal... 4 Getting Started... 4 3.1 Logging in and Changing Your Password 4 3.2 Logging Out 5 3.3 Navigation Basics

More information

Important changes to our Individual Savings Accounts (ISAs) Terms and Conditions

Important changes to our Individual Savings Accounts (ISAs) Terms and Conditions Important changes to our Individual Savings Accounts (ISAs) Terms and Conditions Which take effect on 13 January 2018 What s in this brochure We re letting you know about some important changes we re making

More information

ET MedialabsPvt. Ltd. Opp. WHY Select GO City ONLINE Walk?- Mall, New Delhi ; Contact :

ET MedialabsPvt. Ltd.  Opp. WHY Select GO City ONLINE Walk?- Mall, New Delhi ; Contact : ET MedialabsPvt. Ltd. www.etmedialabs.com Opp. WHY Select GO City ONLINE Walk?- Mall, New Delhi -110017 ; Contact : 011-41016331 Managing Large Scale Google PPC Campaigns Running ecommerce campaigns on

More information

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright Chapter 5

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright Chapter 5 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 E-Business and E-Commerce 2 Chapter Outline Overview of E-Business and E-Commerce Major EC Mechanisms

More information

Final Exam December 18, 2001

Final Exam December 18, 2001 E-Commerce, Doing Business on the Internet Page 1 of 7 Final Exam December 18, 2001 Instructions: Answer exactly 12 of the following 14 questions. Do not answer more than 12. If you answer more than 12,

More information

Create Items Sell on ebay Manual

Create Items Sell on ebay Manual Vendio Merchant s Guide Create Items Sell on ebay Manual Vendio Services, Inc. 2800 Campus Drive San Mateo, CA 94403 www.vendio.com Contents Create Items Overview... 5 Create Items Concepts... 5 Marketplaces

More information

BillQuick MYOB Integration

BillQuick MYOB Integration Time Billing and Business Management Software Built With Your Industry Knowledge BillQuickMYOB Integration Integration Guide BQE Software, Inc. 2601 Airport Drive Suite 380 Torrance CA 90505 Support: (310)

More information

Internet Options. Building Relationships: The Internet s Real Purpose. Growing Wisely Using The Internet

Internet Options. Building Relationships: The Internet s Real Purpose. Growing Wisely Using The Internet March 17, 2002 Internet Options Growing Wisely Using The Internet By Ian Lurie President, Portent Interactive www.portent.biz Copyright 2002, Portent Interactive Even in the post-bubble age, it s clear

More information

EDI Services. Leveraging your investments in EDI for e-business advantage.

EDI Services. Leveraging your investments in EDI for e-business advantage. IBM Global Application Services Hosting- EDI Services Leveraging your investments in EDI for e-business advantage. IBM: the right choice for competitive advantage In today s on demand world, business relationships

More information

Doc P-Card Services Provider RFP

Doc P-Card Services Provider RFP 1 of 9 2/29/2016 4:55 PM Go To Dashboard Help Keith Haran Doc706066747 - P-Card Services Provider RFP Prev Next Exit On this page you create the information that participants will read and respond to during

More information

Charging and Billing (C&B)

Charging and Billing (C&B) Charging and Billing (C&B) Slide 1 Schedule Slide 2 Definitions Charging: To set or ask (a given amount) as a price Billing: Request for payment of a debt Price is cost of one unit (of usage), tariffs

More information

Table of Contents. Topic

Table of Contents. Topic Student Handbook Table of Contents Section Topic 1 Creating Account.1 School/University Sign Up.2 Instructor Sign Up.3 Corporate Account Sign Up.4 Logging into the 2 Banking Tasks.1 Bank Balances.2 Transfer

More information

LESSON 6: CONSUMER ORIENTED E COMMERCE

LESSON 6: CONSUMER ORIENTED E COMMERCE LESSON 6: CONSUMER ORIENTED E COMMERCE Topic: Introduction Difference between Traditional Retailing and E-Retailing Benefits and disadvantages associated with E-Retailing Various models of E-Retailing

More information

WHITE PAPER. Focus on value added services by network companies a paradigm shift. Rahul Kaushal, Ramakant Mittal

WHITE PAPER. Focus on value added services by network companies a paradigm shift. Rahul Kaushal, Ramakant Mittal WHITE PAPER Focus on value added services by network companies a paradigm shift Rahul Kaushal, Ramakant Mittal Introduction Network association is the most critical player in the payment card industry.

More information

Evertson Croes ( ) Danny Hendrix ( ) Carlo Meijer ( ) Roland Verbruggen ( ) Akis Dimakogiannis ( ) December 5, 2013

Evertson Croes ( ) Danny Hendrix ( ) Carlo Meijer ( ) Roland Verbruggen ( ) Akis Dimakogiannis ( ) December 5, 2013 Final Report Evertson Croes (4241754) Danny Hendrix (4241746) Carlo Meijer (4335880) Roland Verbruggen (3038084) Akis Dimakogiannis (4384202) December 5, 2013 This document serves as a high level design

More information

Verizon Enterprise Center CALNET 3 Invoices User Guide

Verizon Enterprise Center CALNET 3 Invoices User Guide Version 1.17 Last Updated: March 2017 2017 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon s products and services are trademarks and

More information

(3) If you have cause for complaint, you may contact us using the information provided in the first paragraph.

(3) If you have cause for complaint, you may contact us using the information provided in the first paragraph. 1 Scope (1) The following terms and conditions form an integral part of any contract between Kannaway Europe sp. z o.o., Przemysłowa 6, 05-092 Blizne Łaszczyńskiego, Poland, VAT ID. 1182153795, REGON 368316614,

More information

ISSF Online Shop - Terms and Conditions

ISSF Online Shop - Terms and Conditions ISSF Online Shop - Terms and Conditions Article 1 General (1) The following Terms and Conditions shall apply to all contracts concluded via the ISSF Online Shop between the International Shooting Sport

More information

Ensuring the Safety & Security of Payments. Faster Payments Symposium August 4, 2015

Ensuring the Safety & Security of Payments. Faster Payments Symposium August 4, 2015 Ensuring the Safety & Security of Payments Faster Payments Symposium August 4, 2015 Problem Statement: The proliferation of live consumer account credentials Bank issues physical card Plastic at point

More information

My name is Sam Mulholland and I am the Managing Director of Standby Consulting.

My name is Sam Mulholland and I am the Managing Director of Standby Consulting. Cyber Security Forum Presentation C.B (Sam) Mulholland Good Afternoon My name is Sam Mulholland and I am the Managing Director of Standby Consulting. Just a little bit about myself. I have worked in IT

More information

In-Browser Notifications

In-Browser Notifications The unprecedented online communication engine for Internet service providers In-Browser Notifications The right message, at the right time, in the right format, for the right device Front Porch s innovative

More information

INTERAC Online Schedule Terms and Conditions

INTERAC Online Schedule Terms and Conditions INTERAC Online Schedule Terms and Conditions This Schedule to your Moneris Merchant Agreement (the Agreement ) contains the additional terms and conditions that apply if we provide INTERAC Online Transaction

More information

Forty million credit cards hacked

Forty million credit cards hacked www.breaking News English.com Ready-to-use ESL / EFL Lessons Forty million credit cards hacked URL: http://www.breakingnewsenglish.com/0506/050619-creditcard.html Today s contents The Article 2 Warm-ups

More information

KDFM Premier: The Unique All-Inclusive MPS Program! KDFM Premier A SOLUTION FOR EVERY NEED! KDFM Premier

KDFM Premier: The Unique All-Inclusive MPS Program! KDFM Premier A SOLUTION FOR EVERY NEED! KDFM Premier KDFM Premier: The Unique All-Inclusive MPS Program! A SOLUTION FOR EVERY NEED! One of my customers, a law office, wants to secure its printing jobs and reduce the waste My customers keep asking me for

More information

Moneyspire Help Manual Moneyspire Inc. All rights reserved.

Moneyspire Help Manual Moneyspire Inc. All rights reserved. 2018 Moneyspire Help Manual 2015-18 Moneyspire Inc. All rights reserved. Contents 2. Getting Started 8. Operating the Program 13. Adding Accounts 15. Adding Transactions 18. Adding Reminders 21. Adding

More information

PayPal Industry Analysis. [Name of the Writer] [Course Title &Code] [Name of the Instructor] [Name if the Institution.

PayPal Industry Analysis. [Name of the Writer] [Course Title &Code] [Name of the Instructor] [Name if the Institution. Running Head: PAYPAL INDUSTRY ANALYSIS PayPal Industry Analysis [Name of the Writer] [Course Title &Code] [Name of the Instructor] [Name if the Institution [Date Submitted] PAYPAL INDUSTRY ANALYSIS 1 PayPal

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS MYLEVEL3 SM CUSTOMER PORTAL INVOICE MANAGEMENT AND BILLING REQUEST CAPABILITIES What is the MyLevel3 Customer Portal? The MyLevel3 customer portal is a one-stop online tool that

More information

PURCHASING AND MERCHANDISING POLICY SOCIÉTÉ DES ALCOOLS DU QUÉBEC

PURCHASING AND MERCHANDISING POLICY SOCIÉTÉ DES ALCOOLS DU QUÉBEC PURCHASING AND MERCHANDISING POLICY SOCIÉTÉ DES ALCOOLS DU QUÉBEC APPROVED BY THE BOARD OF DIRECTORS ON JANUARY 25, 2018 CONTENTS 1 THE SAQ BUSINESS ENTERPRISE...4 1.1 Mandate...4 1.2 Exclusivity of Merchandising...4

More information

Savvy Sellers and Bargain Hunters. Basic Guide to Yard Sales and Consignment Shops

Savvy Sellers and Bargain Hunters. Basic Guide to Yard Sales and Consignment Shops Savvy Sellers and Bargain Hunters Basic Guide to Yard Sales and Consignment Shops Yard Sales Hosting a yard sale is a great way to eliminate unused items from your household while earning extra cash Yard

More information

Chapter 2 E-Marketplaces: Structure, Mechanisms, Economics, and Impacts

Chapter 2 E-Marketplaces: Structure, Mechanisms, Economics, and Impacts Electronic Commerce 2006 Chapter 2 E-Marketplaces: Structure, Mechanisms, Economics, and Impacts True-False Questions 1. A central role of markets in an economy is to facilitate the exchange of information,

More information

VISO BUSINESS PLAN. Token sale level Funds raised. Technologies launched. Share of Georgia s cash-desk equipment market

VISO BUSINESS PLAN. Token sale level Funds raised. Technologies launched. Share of Georgia s cash-desk equipment market B U S I N E S S P L A N VISO BUSINESS PLAN The business plan is designed for five scenarios based on the amount collected during the Token sale. The profitability of the VISO business model depends on

More information

Electronic Commerce Engineering

Electronic Commerce Engineering 219322 Electronic Commerce Engineering Lecture 7 Laudon & Traver: Chapter 7 E-commerce Marketing Concepts Copyright 2007 Pearson Education, Inc. Slide 7-1 NetFlix Develops and Defends Its Brand Class Discussion

More information

Version 4.0 MX September MasterCard Worldwide Acceptance Mark Standards

Version 4.0 MX September MasterCard Worldwide Acceptance Mark Standards Version 4.0 MX September 2006 MasterCard Worldwide Acceptance Mark Standards Using MasterCard PDF Standards These standards are optimized for Adobe Acrobat Reader version 6.0, or newer. Using earlier versions

More information

PayPass M/Chip Requirements. 3 July 2013

PayPass M/Chip Requirements. 3 July 2013 PayPass M/Chip Requirements 3 July 2013 Notices Following are policies pertaining to proprietary rights, trademarks, translations, and details about the availability of additional information online. Proprietary

More information

Ariba Network Enabling Business Commerce in a Digital Economy

Ariba Network Enabling Business Commerce in a Digital Economy SAP Brief SAP Ariba s Ariba Network Ariba Network Enabling Business Commerce in a Digital Economy SAP Brief Automate commerce to connect In a digital economy, moving from paper to electronic processing

More information

Because we ve been asked a time or two what s new in AML & digital currency in Canada

Because we ve been asked a time or two what s new in AML & digital currency in Canada Because we ve been asked a time or two what s new in AML & digital currency in Canada The following are a compilation of FINTRAC s policy positions 1 in relation to digital currency. This document is current

More information

Additional Terms & Conditions for Use of Apple Pay to Supplement Your Interactive Brokers Debit Mastercard Cardholder Agreement

Additional Terms & Conditions for Use of Apple Pay to Supplement Your Interactive Brokers Debit Mastercard Cardholder Agreement 4245 10/23/2017 Additional Terms & Conditions for Use of Apple Pay to Supplement Your Interactive Brokers Debit Mastercard Cardholder Agreement These terms and conditions ("Terms and Conditions") are a

More information

WHITEPAPER. Unlocking Your ATM Big Data : Understanding the power of real-time transaction monitoring and analytics.

WHITEPAPER. Unlocking Your ATM Big Data : Understanding the power of real-time transaction monitoring and analytics. Unlocking Your ATM Big Data : Understanding the power of real-time transaction monitoring and analytics www.inetco.com Summary Financial organizations are heavily investing in self-service and omnichannel

More information

UniWeb. Our electronic banking services system available directly on the Internet

UniWeb. Our electronic banking services system available directly on the Internet UniWeb Our electronic banking services system available directly on the Internet Contents 1. WHAT IS UNIWEB 2. SECURITY FEATURES 3. COMMERCIAL SOLUTIONS 3.1. Available operations 3.2. Benefits for the

More information

Terms & Conditions Lucas Bols INTRODUCTION

Terms & Conditions Lucas Bols INTRODUCTION Terms & Conditions Lucas Bols INTRODUCTION This website is operated by Lucas Bols Amsterdam B.V. ("Lucas Bols") is a company incorporated in the Netherlands and registered at the Chamber of Commerce under

More information

Banking at the speed of your life. Online. Mobile. Superior. Safe. PARKSTERLING. Answers You Can Bank On.

Banking at the speed of your life. Online. Mobile. Superior. Safe. PARKSTERLING. Answers You Can Bank On. Banking at the speed of your life. Online. Mobile. Superior. Safe. PARKSTERLING SM Answers You Can Bank On. At Park Sterling Bank, we know that there are times when our answer can help expand a child s

More information

Fed Consultation Paper Association for Financial Professionals (AFP) Response

Fed Consultation Paper Association for Financial Professionals (AFP) Response Fed Consultation Paper Association for Financial Professionals (AFP) Response Q1: Are you in general agreement with the payment system gaps and opportunities identified? What other gaps or opportunities

More information

Cutting Checks: Challenges and Choices for the Adoption of B2B Electronic Payments

Cutting Checks: Challenges and Choices for the Adoption of B2B Electronic Payments Cutting Checks: Challenges and Choices for the Adoption of B2B Electronic Payments Mark J. Cotteleer Marquette University Christopher A. Cotteleer Andrew W. Prochnow Charter Consulting, Inc. September

More information

Growcer. Turnkey solution to build online grocery store. Features List. Growcer

Growcer. Turnkey solution to build online grocery store. Features List. Growcer Growcer Turnkey solution to build online grocery store Features List Growcer Growcer Turnkey solution to build online grocery store Features List Copyright 2004 2017 FATbit Technologies (Ably Soft Pvt.

More information

E-Commerce Law of the People s Republic of China (Draft for Comments)

E-Commerce Law of the People s Republic of China (Draft for Comments) E-Commerce Law of the People s Republic of China (Draft for Comments) 1 Table of Contents Chapter I General Provisions Chapter II E-commerce Business Entities Section 1General Provisions Section 2Third-party

More information

Combine attribution with data onboarding to bridge the digital marketing divide

Combine attribution with data onboarding to bridge the digital marketing divide Combine attribution with data onboarding to bridge the digital marketing divide Understand how online marketing impacts offline sales Google Inc. 360suite-info@google.com g.co/360suite 1 Digital marketing

More information

Aconite Smart Solutions

Aconite Smart Solutions Aconite Smart Solutions PIN Management Services Contents PIN MANAGEMENT... 3 CURRENT CHALLENGES... 3 ACONITE PIN MANAGER SOLUTION... 4 OVERVIEW... 4 CENTRALISED PIN VAULT... 5 CUSTOMER PIN SELF SELECT

More information

e-commerce WEEK7 Learning Objectives

e-commerce WEEK7 Learning Objectives IMS9043 IT IN ORGANISATIONS Learning Objectives Describe electronic commerce, its dimensions, benefits, limitations, and process. e-commerce WEEK7 Describe the major applications of e- commerce in the

More information

Purpose: To document a product and it s functionality for educating users. Page 1 of 34

Purpose: To document a product and it s functionality for educating users. Page 1 of 34 Purpose: To document a product and it s functionality for educating users. Page 1 of 34 ONEVIEW Welcome to the user guide for help and information about the ONEView application. This will provide information

More information

The Internet: Changing the Face of Business

The Internet: Changing the Face of Business Copyright 2014 Pearson Education, Inc. Publishing as Prentice Hall 9-1 The Internet: Changing the Face of Business Successful companies embrace the Internet as a mechanism for transforming their companies

More information

Foreword. Sales Associates Managers

Foreword. Sales Associates Managers Foreword This book is a pocket guide for using the Register module for the InfoTouch Store Manager. It outlines the basic steps and procedures for processing sales, from the beginning to the end of a day.

More information

Getting Started with Drupal Commerce

Getting Started with Drupal Commerce Getting Started with Drupal Commerce Richard Jones Chapter No. 3 "Planning Your Store" In this package, you will find: A Biography of the author of the book A preview chapter from the book, Chapter NO.3

More information

Charging and billing (C&B) Traditional payment systems US market - Value and volume of payments

Charging and billing (C&B) Traditional payment systems US market - Value and volume of payments Charging and billing (C&B) S-38.041 Networking Business Slide 1 Traditional payment systems US market - Value and volume of payments Percentage share Source: U.S.Census Bureau, 2002 50 45 40 35 30 25 20

More information

Pricefalls, LLC PRICEFALLS ORDER MANAGEMENT GUIDE

Pricefalls, LLC PRICEFALLS ORDER MANAGEMENT GUIDE PRICEFALLS ORDER MANAGEMENT GUIDE Version 1-27-2014 1 Contents PRICEFALLS ORDER MANAGEMENT GUIDE... 1 Managing Orders on Pricefalls.com... 3 Viewing Order Details... 4 View Details... 5 Confirming Shipments...

More information

What You Need to Know

What You Need to Know Arbonne Poland What You Need to Know How does a potential Polish Independent Consultant, Preferred Client or Client register? Register at arbonne.pl. This is the only website for Polish registration and

More information

TERMS OF USE OF THE SERVICE OF MOBILE PAYMENTS FOR PARKING. 2. What is the service of mobile payments for parking?

TERMS OF USE OF THE SERVICE OF MOBILE PAYMENTS FOR PARKING. 2. What is the service of mobile payments for parking? TERMS OF USE OF THE SERVICE OF MOBILE PAYMENTS FOR PARKING 1. Framework The present Terms of Use set forth the rules which users must follow in order to use the mobile payments for parking service in adherent

More information

Sage 300 ERP Sage CRM 7.1 Integration Upgrade Guide

Sage 300 ERP Sage CRM 7.1 Integration Upgrade Guide Sage 300 ERP 2012 Sage CRM 7.1 Integration Upgrade Guide This is a publication of Sage Software, Inc. Version 2012 Copyright 2012. Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the

More information

BillQuick-QuickBooks Advanced Integration Guide 2016

BillQuick-QuickBooks Advanced Integration Guide 2016 BillQuick-QuickBooks Advanced Integration Guide 2016 CONTENTS INTRODUCTION 1 HOW TO USE THIS GUIDE 1 SOFTWARE EDITIONS SUPPORTED 2 HOW INTEGRATION WORKS 2 MODES OF SYNCHRONIZATION 3 INTEGRATION RULES 4

More information

EMV: Facts at a Glance

EMV: Facts at a Glance EMV: Facts at a Glance 1. What is EMV? EMV is an open-standard set of specifications for smart card payments and acceptance devices. The EMV specifications were developed to define a set of requirements

More information

UNDERSTANDING E-BUSINESS AND E- COMMERCE I

UNDERSTANDING E-BUSINESS AND E- COMMERCE I UNDERSTANDING E-BUSINESS AND E- COMMERCE I INTRODUCTION The rapid development of internet and e-commerce has dramatically changed the role of information technologies in business. Evolving into e-business

More information

Investigating the myths and realities of contactless payment

Investigating the myths and realities of contactless payment Investigating the myths and realities of contactless payment Questions & Answers There has been much recent coverage in the media (press, web, blogs.) about the perceived security vulnerabilities of contactless

More information

B2B ecommerce Requirements

B2B ecommerce Requirements B2B ecommerce Requirements Manufacturing, Distribution & Wholesale 1 Table of Contents 04 06 10 11 14 16 001 Key B2B Concepts 002 Online Store Front-End Requirements 003 Communication / Email Requirements

More information

Extending EMV to support Murabaha transactions

Extending EMV to support Murabaha transactions Extending EMV to support Murabaha transactions Mansour A. Al-Meaither and Chris J. Mitchell Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom {M.Al-Meaither,

More information

An Executive s Guide to B2B Video Marketing. 8 ways to make video work for your business

An Executive s Guide to B2B Video Marketing. 8 ways to make video work for your business An Executive s Guide to B2B Video Marketing 8 ways to make video work for your business [Video] Content Is King Companies that utilize video content to present their products and services can experience

More information

Enterprise Output Management For Banking, Finance, and Insurance

Enterprise Output Management For Banking, Finance, and Insurance A VPS White Paper from Levi, Ray & Shoup, Inc. Enterprise Output Management For Banking, Finance, and Insurance Slumping markets, industry initiatives such as T+1, and deregulation that allows banks, insurance

More information

Forty million credit cards hacked

Forty million credit cards hacked www.breaking News English.com Ready-to-use ESL / EFL Lessons Forty million credit cards hacked URL: http://www.breakingnewsenglish.com/0506/050619-creditcard-e.html Today s contents The Article 2 Warm-ups

More information

HKT Financial Services (IA) Limited Privacy Statement

HKT Financial Services (IA) Limited Privacy Statement Privacy Statement This Privacy Statement is our privacy policy which sets out how we manage your personal information and other information. It applies to all customers of HKT Financial Services (IA) Limited

More information

UniWeb. Our electronic banking services system available directly on the Internet

UniWeb. Our electronic banking services system available directly on the Internet UniWeb Our electronic banking services system available directly on the Internet Contents 1. WHAT IS UNIWEB 2. SECURITY FEATURES 3. COMMERCIAL SOLUTIONS 3.1. Available operations 3.2. Benefits for the

More information

IMPORTANT - READ CAREFULLY:

IMPORTANT - READ CAREFULLY: London Auction Copyright 2000 Day Management AG, Switzerland. All rights reserved. No portion of this document may be copied, stored, displayed or otherwise reproduced or transmitted in any form or media

More information

TECHNOLOGY. The Resource Center Events calendar Forms Rep relations center Securities America contacts Training resource library

TECHNOLOGY. The Resource Center Events calendar Forms Rep relations center Securities America contacts Training resource library BUSINESS CENTER and ADVANTAGE TECHNOLOGY Your key to daily business solutions. BUSINESS CENTER This is our user-friendly website providing valuable information and tools to help you run a more efficient

More information

The Universal Postal Union (The real THE Post Office) global Postal Trust Services

The Universal Postal Union (The real THE Post Office) global Postal Trust Services The Universal Postal Union (The real THE Post Office) global Postal Trust Services Universal Postal Union, Electronic Services Martin Roe roem@postoffice.co.uk Presentation Objective To provide an understanding

More information

HiringCenter : Creating a Constant Flow of High-Quality Candidates

HiringCenter : Creating a Constant Flow of High-Quality Candidates HiringCenter : Creating a Constant Flow of High-Quality Candidates Most small businesses struggle to source high-quality candidates when their business needs require them to hire employees. For hiring,

More information

SAS. Activity-Based Management Adapter 6.1 for SAP R/3 User s Guide

SAS. Activity-Based Management Adapter 6.1 for SAP R/3 User s Guide SAS Activity-Based Management Adapter 6.1 for SAP R/3 User s Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2004. SAS Activity-Based Management Adapter 6.1 for

More information

Multi Vendor Marketplace

Multi Vendor Marketplace Multi Vendor Marketplace webkul.com /blog/magento2-multi-vendor-marketplace/ Published On - December 24, Multi Vendor Marketplace Extension converts your Store into a complete online 2015 marketplace shop.

More information

Prepaid Cards. Coles Gift Mastercard Conditions of Use. Issued by: Indue Ltd Issue Date: July 2017 ABN

Prepaid Cards. Coles Gift Mastercard Conditions of Use. Issued by: Indue Ltd Issue Date: July 2017 ABN Prepaid Cards Coles Gift Mastercard Conditions of Use Issued by: Indue Ltd Issue Date: July 2017 ABN 97 087 822 464 1 Coles Gift Mastercard Conditions of Use Contents What you re agreeing to 3 Tips to

More information

Third Party Site Reputation Management. Corporate Content Marketing

Third Party Site Reputation Management. Corporate Content Marketing Third Party Site Reputation Management Corporate Content Marketing The New Review Landscape Travelers increasingly rely on online conversations, placing far more trust in consistent feedback of fellow

More information

THE UNIVERSITY OF GEORGIA INTERNAL AUDITING DIVISION INTERNAL CONTROL QUESTIONNAIRE GENERAL

THE UNIVERSITY OF GEORGIA INTERNAL AUDITING DIVISION INTERNAL CONTROL QUESTIONNAIRE GENERAL GENERAL BACKGROUND MATERIAL A. Please provide an organization chart which shows lines of authority and responsibility for the unit. B. What department code(s) does your Office manage? C. Who is the contact

More information

Avangate SkyCommerce Suite

Avangate SkyCommerce Suite Sky Suite Customer Centric for Software and Cloud Reach New Markets Instantly. Transact at Every Customer Touch Point. Optimize New Business Models on the Fly. For software and cloud services, the line

More information

In this module, you will learn to place tickets on hold and sell tickets to a customer.

In this module, you will learn to place tickets on hold and sell tickets to a customer. POS MERCURY PROGRAM GUIDE In this module, you will learn to place tickets on hold and sell tickets to a customer.» Benefits of Joining the Mercury Program Get more money back when buying or selling via

More information

Online Payment Services

Online Payment Services A NetPay Guide to... Online Payment Services Online payments, also commonly referred to as CNP or Cardholder not present are those that provide the capability for a purchase to be made without physically

More information

TransKrypt Security Server

TransKrypt Security Server TransKrypt Security Server Overview Security of transactions is a fundamental requirement for payment transaction industry and this becomes even more critical as the volume of payments are growing at a

More information

ONLINE FOOTBALL BET REVOLUTION

ONLINE FOOTBALL BET REVOLUTION 2018 ONLINE FOOTBALL BET REVOLUTION Benicoin.io Page 1 WHITEPAPER CONTENT 1. Introduction 2. What is BENICOIN 3. Outstanding benefit of BENICOIN 4. BENICOIN Applications 5. ROADMAP 6. ICO 7. Use & Earn

More information

CHAPTER 3: REQUIREMENT ANALYSIS

CHAPTER 3: REQUIREMENT ANALYSIS CHAPTER 3: REQUIREMENT ANALYSIS 3.1 Requirements Gathering At the start of the project, the travel management process handled by the admin department was studied in detail by using the basic requirement

More information

An Introduction to the Global Location Number (GLN)

An Introduction to the Global Location Number (GLN) An Introduction to the Global Location Number (GLN) Release 2.0, Sept 2017 Table of Contents 1 What is a Global Location Number?... 4 2 What is a GLN used for?... 4 3 Key Attribute of the GLN: Uniqueness...

More information

Part 1: Why choose online?

Part 1: Why choose online? The Accountant s Guide to Moving Clients Online Part 1: Why choose online? Brush up on the benefits of moving online and find out how to match your clients with the QuickBooks product that will best suit

More information

Cards and Payments: Innovation Designed Through Empathy

Cards and Payments: Innovation Designed Through Empathy Cards and Payments: Innovation Designed Through Empathy How to Succeed with Truly Customer-centric Technology Introduction Banks, retailers and other organisations looking to drive new revenue are searching

More information