vu it430 Mid Term Subjective Solved Past Paper No.8

vu it430 E-Commerce Solved Past Papers

Solved Past Papers

This subjective solved past paper is related to book/course code vu it430 E-Commerce which belongs to vu organization. We have 8 past papers available related to the book/course E-Commerce. This past paper has a total of 10 subjective questions belongs to topic Mid Term to get prepared. NVAEducation wants its users to help them learn in an easy way. For that purpose, you are free to get prepared for exams by learning subjective questions online on NVAEducatio.

NVAEducation also facilitates users to download these solved past papers with an affordable prices. However, users are not enforced to pay for money, rather they can use credits to buy such stuff on NVAEducation. Users can earn credits for doing some little tasks and then you will be able to use that credits to buy solved past papers on NVAEducation.

Question 1: Discuss the role of child element tags while in writing XML code.
Answer:
When creating an effective file following the rules of XML, child elements organize the information. A root element is a container for all other elements. While you must have a root to create a viable XML file, it is the child elements that add functionality to the page.
Question 2: Discuss the role of (W3C) keeping in view the web documents?
Answer:
The goal of the W3C is to help the World Wide Web (also known as the Web) evolve by developing common languages and formats that will allow users with different hardware and software to enjoy similar features of the Web. In essence, its objective is to make the Web accessible to all and not dependent on the technology of any single company. This area encompasses defining the Web, Web documents, and the protocols for accessing and disseminating Web documents.
Question 3: Enlist the "Outside attacks on the Network" and write note on DoS
Answer:
  1. Outside attacks
  2. Password attacks
  3. IP address spoofing
  4. Man in the middle attacks
  5. Eavesdropping/ sniffing/snooping
  6. Denial of services (DOS) attacks

DOS

In this type of attack, the attacker gains access to the network and then send invalid data to network services or applications. These services or applications consequently become unable to perform their normal tasks or functions. Hence, sending a flood of data to a particular service or computer can cause it to overload or shutdown. This attack is specially used to take down websites on the internet, when repeated requests for web pages are deliberately initiated so as to choke down a web server.

Question 4: Explain any three of the outside attacks briefly.
Answer:

Eavesdropping/ sniffing/snooping In this type of attack the hacker has the ability to monitor network traffic using some kind of network monitoring software. For example, a hacker may install some backdoor or Trojan horse that can monitor the key strokes of a user while typing and send the typed information to the hacker.

Password attacks Such attacks are basically a result of eavesdropping through which the hacker is able to know the account ID or password of a particular user. Then using it the hacker gains access to the network and gather information such as user names, passwords, computer names, resources etc. That can lead to modification, deletion or rerouting of network data.

IP address spoofing You know that there are two IP addresses available on a data packet - IP addresses of the sender and the destination. The address of the destination only matters for routing. It is possible that a hacker (having special capabilities) seizes the control of a router, changes the IP address of the source/sender on data packets and thus forces the destination machine to send the information/web page to a different machine, that is, the machine of the hacker. This is called IP address spoofing.

Man in the middle attacks In it the attacker is able to monitor, capture and control data between sending and receiving machines. He may apply IP address spoofing technique to divert the packets to its machine, then modify the packets and resend the misleading information to the actual client. Another form of man-in-the-middle attack is where the hacker is able to substitute the IP address of a genuine web site with the IP address of his own web site due to some security hole in the software that runs on a domain name server. A client would think that he is communicating or receiving the information form a genuine web site, though it would not be the case actually.

Denial of services (DOS) attacks In this type of attack, the attacker gains access to the network and then send invalid data to network services or applications. These services or applications consequently become unable to perform their normal tasks or functions. Hence, sending a flood of data to a particular service or computer can cause it to overload or shutdown. This attack is specially used to take down websites on the internet, when repeated requests for web pages are deliberately initiated so as to choke down a web server.

Question 5: Explain the following frame tags. Discuss the usage of these
Answer:
<frameset>…</frameset> Contains the frameset The frames layout is given by comma separated lists in the rows and cols attributes. <frame> or <frame/> Delimits a single frame, or region, within the frameset A separate document linked with the src attribute appears inside. <noframes>…</noframes> Contains normal HTML content for user agents that don't support frames. <iframe>…</iframe> An inline frame places another HTML document in a frame. Unlike an object element, an inline frame can be the "target" frame for links defined by other elements and it can be selected by the user agent as the focus for printing, viewing its source etc.
Question 7: How can we change a Font style of a textWrite complete tag by using an example by yourself?
Answer:
Font tag defines various font properties. Size, face and color are its attributes. Attributes can be used simultaneously in a tag as you can see below: <font size=5 color=red face=Arial>internet and ecommerce</ font>
Example code
<HTML>
<HEAD>
</HEAD>
<BODY> <H1>this is my main title</H1>
<p>here is the first paragraph. This is some <b> <i>bold text</i> </b> </p>
<p> <font face="Arial"> this text is in the Arial font. </font>
</BODY>
</HTML>
Question 8: How can we classify E-Commerce by the nature of its transactionsGive at least one real life example for each of its classification.
Answer:

A common classification of EC is by the nature of transaction:

Business-to-Business (B2B):

Electronic market transactions that take place between organizations

Business-to-Consumer (B2C):

retailing transactions with individual shoppers - typical shopper at Amazon.com is a consumer

Consumer-to-Consumer (C2C):

consumer sells directly to consumers, examples -individuals selling in classified ads, auction sites allowing individuals to put up items for auction - e.g, e-bay

Consumer-to-Business (C2B):

individuals who sell products or services to organizations and those who seek sellers and conclude a transaction

Intra Business (organizational) EC:

all internal organizational activities involving exchange of goods, services or information, selling corporate products to employees, online training and cost reduction activities

Non-Business EC

  1. academic institutions, not-for-profit organizations, religious/social organizations and government agencies using EC to improve their operations, customer service and reduce expense
Question 9: How Certification Authority (CA) issues the certificates. Describe briefly
Answer:

A certification authority is defined to be a trusted public/private body that attests the association of a particular individual with his/her corresponding public key. A CA signs digital certificates with its private key. There are many CAs working in the field but the pioneering or the most reputed CA is Verisign which is based in America.

Certification authorities work in a hierarchical fashion. There is the CA at the top called root CA (the most reputed CA). It can issue certificates to CAs working below it and those CAs' can further issue certificates to CAs working under them. In this fashion a hierarchy of CAs is developed with each CA confirming the public key of the CA below it through a digital certificate.

Question 10: Name four commonly used web server operating systems.
Answer:
Commonly used web server operating systems are:
  1. Microsoft Windows NT Server
  2. Microsoft Windows 2000 Advanced Server
  3. Microsoft.NET Server
  4. Linux or Unix based operating systems such as Solaris

Solved Past Papers of it430 E-Commerce

Other it related subjective solved past papers

Other categories of vu Solved Past Papers

Other organizations

Theme Customizer

Gaussian Texture



Gradient Background