CLICK HERE FOR VARIOUS NEW JOBS 
CLICK HERE FOR VARIOUS EDUCATIONAL NEWS 
CLICK HERE FOR NEW SCHOLARSHIPS 
CLICK HERE FOR ADMISSION NOTICES 
Click And Follow On Google+ To Get Updates
Please Wait 10 Seconds... OR You CanSkip

ADMISSION NOTICES
Scholarships

Scholarship-300x291

BUDGET 2014-15
budget_2014-2015
New Date Sheets
VU SOLVED ASSIGNMENTS
Recent Posts

Posts Tagged ‘VU .IT430.(E-Commerce). midterm .solved. unsolved .past .papers .spring .2011’

VU IT430(E-Commerce) midterm solved unsolved past papers spring 2011

.

IT430(E-Commerce)

Mid term Material

1) Name three Style Properties (2 Marks)

ANSWER

 background-break

 background-clip

 background-origin

http://webdesign.about.com/od/css/a/aastylelibrary_3.htm

2) Name Three Server Side Scripting Language (2 Marks)

ANSWER

PHP: Hypertext Preprocessor

ASP – Active Server Pages

JSP : Java server page

2) What are servlets (MARKS 2)

ANSWER

Servlets are very fast Java applications on the server side which

are available in an active form in the memory of the server.

They use JDBC to connect to the databases.

.

Q.No.4: Short Note on Circuit Firewall ? 2marks

ANSWER

It is quite similar to the packet filter firewall. It also works on the basis of a set of

rules for filtering packets but operates at the transport layer of the OSI Model so has

greater functionality. As a rule, the higher the layer of OSI model where a firewall

operates, the more sophisticated is the firewall. It can also determine whether

TCP/IP connection between a host and a machine outside firewall has been properly

established.

Question No: 19 ( Marks: 2 )

Suppose, there is an applet at “http://www.vu.edu.pk/demo.class”. Write the code to

include this applet in your web page.

ANSWER

<HTML> <BODY>

<APPLET CODE= “http://www.vu.edu.pk/demo.class”. width=100

height=200>DEMO</APPLET>

</BODY> </HTML>

Question No: 19 __ ( Marks: 2 )

When does we use the parseFloat() function?

ANSWER

‘parseFloat()’, that is, a function of predefined global object.

Question No: 19 __ ( Marks: 2 )

What is bandwidth of a network?

.

Bandwidth is the speed of a network. It indicates how many bits can be transmitted

across a network in a given time.

Question No: 19 ( Marks: 2 )

What are the three position style properties?

Absolute – you can place the element box anywhere on the page position:

Relative – position is relative to the normal position of the element

Position: static – position remains unchanged

Question No: 19 ( Marks: 2 )

What is common between proxy server and firewall?

common things in proxy server and firewall filtering request for web

pages

Question No: 21

( Marks: 2 )

What does PPTP stand for?

Ans (page98)

PPTP stands for point to point transfer protocol.

Question No: 22

( Marks: 2 )

What are the keywords to define a variable and a function in JavaScript?

“var” is the keyword used to define a variable in Javascript

e.g var a; “function” is the keyword to define a function in javascript

e.g function myfunction(){ // some code }

Question No: 21

( Marks: 2 )

.

What value will be printed after executing the following statement in JavaScript:

document.write( Math.pow(3, 2) );

document.write(“Math.pow(2,3) :”+Math.pow(2,3)+”<P>”);

Question No: 22

( Marks: 2 )

.

What is a web server? ANSWER:

Web server – machine that services internet request

OR

Web server

web server is a machine that serves up the web page requests of a client on the

internet. It is a combination of hardware and software. Decision as regards the type

of a web server is largely dependent on the volume and type of web activities.

Question No: 22

( Marks: 2 )

What does ‘parseFloat(string)’ And NaN mean?

The parseFloat() function parses a string and returns a floating point number. This

function determines if the first character in the specified string is a number. If it is,

it parses the string until it reaches the end of the number, and returns the number

as a number, not as a string.

The NaN property represents “Not-a-Number” value. This property indicates that a

value is not a legal number.

Question No: 22

( Marks: 2 )

.

What is meant by a constructor? (page 69)

Constructor is defined as the initializing function used to create instance/copy of an

object. It is after the name of the object whose constructor it is

Question No: 19 ( Marks: 2 )

Suppose, there is an applet at “http://www.vu.edu.pk/demo.class”. Write the code to

include this applet in your web page.

<APPLET CODE= “http://www.vu.edu.pk/demo.class” width=100 height=200> DEMO

</APPLET>

Question No: 21 ( Marks: 2 )

How Certification Authority (CA) issues the certificates? Describe briefly

Certification authorities work in a hierarchical fashion. There is the CA at the top

called root CA (the most reputed CA). It can issue certificates to CAs working below

it and those CAs’ can further issue certificates to CAs working under them. In this

fashion a hierarchy of CAs is developed with each CA confirming the public key of

the CA below it through a digital certificate

Question No: 22 ( Marks: 2 )

Discuss the role of child element tags while in writing XML code.

Question No: 21 ( Marks: 2 )

What you understand about Denial of services (DOS) attacks?

.

DOS important to establish a security policy for an e-business organization outlining

as to which assets have to be protected and how to be protected.

The attacker gains access to the network and then send invalid data to network

services or applications. These services or applications consequently become unable

to perform their normal tasks or functions

Question No: 22 ( Marks: 2 )

Discuss the role of (W3C) keeping in view the web documents ?

Not sure

This area encompasses defining the Web, Web documents, and the protocols for

accessing and disseminating Web documents. Furthermore, the consortium also

addresses issues of intellectual ownership of Web documents, rating systems for

Web documents, and Internet privacy.

3) Types of Cryptography and difference between them. (3 Marks)

Cryptography is a collection of mathematical techniques used to ensure confidentiality of

information

Two type

Symmetric Cryptography

In symmetric cryptography same keys are used for encryption and decryption.

Asymmetric or Public Key Cryptography

In this type a pair of public and private keys is used for encryption and decryption

Question No: 20 __ ( Marks: 3 )

Identify the object, property and method in the following:

Math.sin(45)

Math.PI

.

document.write(“Math.sin(45) :”+Math.sin(45)+”<P>”);

document.write(“Math.PI :” +Math.PI +”<P>”);4) What is function of Commands: (3 Marks)

str.toLowerCase() :The capitalize, lowercase,

str.toUpperCase() :Uppercase capitalize

str.Split(“) :splits the string on the basis of blank space.

document.write(“str.toLowerCase() :”+str.toLowerCase()+”<P>”);

document.write(“str.toUpperCase():”+str.toUpperCase()+”<P>”);

document.write(“str.Split(‘ ‘) myArray[0] :”+myArray[0]+”<P>”);

document.write(“str.Split(‘ ‘) myArray[1]:”+myArray[1]+”<P>”);

Q.No.3: Different logical operators in Java script?

Only write there name and there symbols? 3 marks

Logical operators

‘&&’ for logical and

‘||’ for logical or

‘!’ for logical not

Question No: 20 ( Marks: 3 )

Name the JavaScript function that convert strings to float numbers. How do you

give the function a string value to convert to a number?

String to number

If you want to change a string to a number, first make sure there are only the

.

characters 0-9 in the string. What I always do is simply multiplying the string by 1.

var c = ‘1234’;

d = c * 1;

Since multiplying assumes numbers, JavaScript makes the string a number, if

possible. If that isn’t possible, the result is NaN. Note that you cannot do

var c = ‘1234’;

d = c + 0;

Question No: 20 ( Marks: 3 )

What is the purpose of padding? How many types of padding are: Name of these?

Padding – general property that applies to all four padding properties in this order:

Padding top

padding-right

padding-bottom

padding-left

Question No: 20 ( Marks: 3 )

Write at least three rules for writing an XML code.

-All elements must be properly nested <outer><inner>content</inner></outer>

-All attribute values must be quoted <FRIES SIZE=“LARGE”>

-All elements with empty content must be identified by ending in />

Question No: 20 ( Marks: 3 )

What does RAS and RAC stand for in context of virtual private network?

Answer

.

That server machine may be called a Remote Access Server (RAS) and

the client may be called a Remote Access Client (RAC).

Question No: 24

( Marks: 3 )

Performance of web servers can be evaluated mainly on the basis of two factors. What

are they?

Ans:

Performance of web sever

Performance of web servers can be evaluated mainly on the basis of two

factors:

Throughput, which is the number of http requests that a particular

server hardware and software can handle in the unit time; and

Response time , which is the amount of time a web server requires to

process one request. Web server hardware architectures

Question No: 23

( Marks: 3 )

To calculate the area of a circle the formula pi r squared is used. How would you code it

in JavaScript?

<html>

<script type=”text/javascript”>

var radius,area;

radius = 10;

area = Math.PI*Math.pow(radius,2);

document.write(“Area of circle with radius 10 is ” + area );

</script>

.

</html>

Question No: 24

( Marks: 3 )

.

How ‘Man in The middle Attacks’ operates?

Man in the middle attacks In it the attacker is able to monitor, capture and control data between

sending and

receiving machines. He may apply IP address spoofing technique to divert the

packets to its machine, then modify the packets and resend the misleading

information to the actual client. Another form of man-in-the-middle attack is where

the hacker is able to substitute the IP address of a genuine web site with the IP

address of his own web site due to some security hole in the software that runs on a

domain name server. A client would think that he is communicating or receiving the

information form a genuine web site, though it would not be the case actually.

Question No: 23

( Marks: 3 )

.

What is meant by ‘Shopping Cart’ in context of e commerce? (page 92)

Shopping cart was used wherein the user had to remember and type certain

information. It is now replaced by electronic shopping cart/basket that keeps record

of the items the customer has selected and allows customers to view the details of the

items selected. The customer can add new items or remove items. To order an item,

a customer simply clicks at that item option. All details of an item, including its

price, product no. and order identifying information are stored automatically in the

cart.

Question No: 20 ( Marks: 3 )

What do you think, is there any difference between Static and Dynamic IP

Address assignment? Discuss.

A static IP address is a number (in the form of a dotted quad ) that is assigned to a

computer by an Internet service provider (ISP) to be its permanent address on the

Internet. Computers use IP addresses to locate and talk to each other on the

Internet, much the same way people use phone numbers to locate and talk to one

another on the telephone. When you want to visit whatis.com, your computer asks a

domain name system (DNS) server (think telephone information operator) for the

correct dotted quad number (think phone number) for whatis.com and your

computer uses the answer it receives to connect to the whatis.com server

.

Question No: 24 ( Marks: 3 )

Write a function for the addition of two numbers?

Question No: 23 ( Marks: 3 )

Differentiate between the HTML and XML. Identify At least three major

differences.

(1) XML was designed to describe data and to focus on what data is. HTML was

designed to display data and to focus on how data looks(2) HTML is about displaying

information, while XML is about describing

information.

(2) XML data can also be stored inside HTML pages as “Data Islands”. You can

still concentrate on using HTML only for formatting and displaying the data.

Question No: 24 ( Marks: 3 )

What are the different logical operators in JavaScript? Only write their names. Also write

the

symbols of operators.

ANSWER

Logical operators „&&‟ for logical and „||‟ for logical or „!‟ for logical not

Question No: 20 __ ( Marks: 3 )

What is MAC address? How does it help server to identify the client?

Data to be delivered on a network has to be converted first into serial transmission. This is

.

done through a device called Network Interface Card (NIC) that must be installed in a

computer on the network. NIC has also got printed on it a 48 bits unique address called the

MAC or hardware address of the computer machine. In other words, it consists of 12

hexadecimal characters and can have different format as shown below:

090017A9B2EF

09:00:17:A9:B2:EF

09-00-17-A9-B2-EF

Question No: 20 ( Marks: 3 )

What are the three methods for using style sheets with a web page?

Method #1: Embedded method

Method # 2: Linking to an external style sheet

Method # 3: Inline styles

Question No: 20 __ ( Marks: 3 )

What are cookies? Why these are used in web development?

Not complete answer

Cookies are text files stored on client’s hard disk sent by the server side due to cookie related

programming in the code. Cookies are usually generated by JavaScript or CGI scripts.

What is a web form? What is its usage in reference to client-server

communication? 2+3

A webform on a web page allows a user to enter data that is sent to a server for

processing. Webforms resemble paper forms because internet users fill out the forms

using checkboxes, radio buttons , or text fields.

You are now familiar with the fact that internet presents a two-way

.

communication model, also called theClient-Server Model. In the client

server model some data is processed on the client side and certain data is

processed by the server on the server side.

Question No: 21 __ ( Marks: 5 )

Write your personal profile in a file saving it with the extension of e.g. “abc.js”and then

call it in

a JavaScript code.

Question No: 21 __ ( Marks: 5 )

Write any four essential features and two extra features which should exist in ECommerce

softwares.

A catalog display

Shopping cart capabilities

Transaction processing

Another feature

Middleware

Application integration

Web services

Integration with ERP Software

Supply chain management software

Customer Relationship Management (CRM) Software

Content Management Software

.

Knowledge Management Software

Question No: 21 ( Marks: 5 )

What is the difference between an interpreted and a compiled language?

Give one example of each.

We compile the code or convert it into machine language using software called

compiler, as we use in case of C or C++. The other way is that we interpret the code(line by

line) at the run time using a program called interpreter. Browser is an

interpreter

Question No: 21 ( Marks: 5 )

Identify protocol stack used in each layer of OSI model?

Network protocol

Network protocols are those standard rules using which

computers on a network communicate and

Exchange data with each other. A group of protocols that

prepare the data for communication on the

Network is called the Protocol stack

Question No: 25

( Marks: 5 )

.

Write the code for a web page displaying a button named “Testing”. After clicking

that button an alert should be displayed saying “The test is successful”.

<html>

<head>

<script type=”text/javascript”>

function sndAlert()

{

window.alert(“The test is successful!!!”);

}

</script>

</head>

<body>

<FORM

NAME=”form1″>

<INPUT TYPE=”Button” name=”showAlert” VALUE=”Show Alert”

onclick=”sndAlert()”>

</FORM>

</body>

</html>

Q.No.1: Enlist the “Outside attacks on the

Network” and write note on DoS? 5 marks

Q.No.2: Differentiate between the relative

position and absolute position of a text by using CSS tags? 5 Marks

.

5) Difference b/w (i) Virus & Worms

(ii) Backdoors & Trojan Horse (5 Marks)

Question No: 25

( Marks: 5 )

Write the types of firewalls. Only names? Explain these briefly

Packet filter firewall

It uses a set of rules to determine whether outgoing or incoming data packets are allowed

to pass through the firewall.

Circuit level firewall

It is quite similar to the packet filter firewall. It also works on the basis of a set of rules

for filtering packets but operates at the transport layer of the OSI Model so has greater

functionality.

Application gateway firewall

It operates at application layer of the OSI Model. It uses strong user authentication to

verify identity of a host attempting to connect to the network using application layer

protocols such us FTP. In contrast to packet filter firewall, it filters the requests rather

than packets entering/leaving the network. It can block any outgoing HTTP or FTP

requests.

.

Question No: 26

( Marks: 5 )

Differentiate between front end and back end.

Answer: Front end consists of that information which is visible to the user and he

can interact with the same through some interface. The back end comprises that

information which resides on the server side and is used to create certain dynamic

results for the user. It would include different programs or scripts that may be

developed in different languages/tools. Backend is mainly used for two purposes –

for querying with the databases and for the maintenance of state. We can use

different tools (ASP, JSP etc.) for that purpose depending upon their respective

advantages/disadvantages.

.

Question No: 25

.

( Marks: 5Describe the importance of Cryptography in internet data transfer security in ECommerce?

1. It is a collection of mathematical techniques used to ensure confidentiality of

information. The process of scrambling a message with the help of a key is

called Encryption.

2. It provides the Transaction Integrity. Transaction detail of both the parties

can be verified which help to built the confidence between business

communities.

3. It provide Privacy like it provide controls to prevent third parties from

getting access to the information within the transaction

4. Without cryptography, it is doubtful that banks, businesses and individuals

would feel safe doing business online.

5. Cryptography provides the confidence to the customer that their data is safe

and secure. Otherwise due to lack of confidence and doubt e-commerce

business can not flourish.

Question No: 26

.

( Marks: 5 )

.

Write a list of comparison operators in JavaScript with symbols.

Comparison operators

„==‟ for Equal

„!=‟ for not equal

„< „ for Less than

„<=‟ for less than equal

„>‟ for Greater than

„>=‟ for Greater than equal

Question No: 21 ( Marks: 5 )

What is cryptography? What techniques are used for cryptography?

Cryptography is the technique of converting a message into

unintelligible

or non-understandable form such

that even if some unauthorized or unwanted person intercepts

the message

he/she would still not be able to

.

make any sense out of it. Cryptography is thousands of years

old.

Techniques used for cryptography Substitution In substitution

we replace

each letter in the message with

another to make the message non-understandable. For

example, each letter

“a” in the message can be replaced with letter “d” and letter “b”

with letter “e” and so on.

Transposition It is based on scrambling the

characters in a message. A transposition system may first write

a message

into a table row by row then the

message can be read and rewritten column by column to make

it

scrambled.

Question No: 25 ( Marks: 5 )

Write the JavaScript code which will display the following in a

web page

using a FOR loop:

The number is 0

The number is 1

.

The number is 2

The number is 3

The number is 4

The number is 5

Question No: 25 ( Marks: 5 )

Write HTML code for the form displaying a drop-down list containing

the following

entries: Honda, Suzuki, Santro, Corolla.

Question No: 26 ( Marks: 5 )

Write a note on any two methods used to maintain state between

HTTP requests.

HEAD

Asks for the response identical to the one that would correspond to a

GET

request, but without the response body. This is useful for retrieving

metainformation

written in response headers, without having to transport

the entire

.

content.

GET

Requests a representation of the specified resource. Requests using

GET (and a

few other HTTP methods) “SHOULD NOT have the significance of

taking an

action other than retrieval”.[12] The W3C has published guidance

principles on this

distinction, saying, “Web application design should be informed by

the above

principles, but also by the relevant limitations.”[13] See safe methods

below.

Question No: 21 __ ( Marks: 5 )

Identify protocol stack used in each layer of OSI model?

Question No: 21 ( Marks: 5 What is the difference between

physical address and logical address? Support your

answer with

at least two examplesQuestion No: 17 __ ( Marks: 1 )

What is the function of UDP protocol at TCP/IP stack?Give

precise answer.

.

Answer

Function is transport

Connectionless transport protocol

Question No: 18 ( Marks: 1 )

What tag is used for displaying a border between the frames?

ANSWER

– BORDER or FRAMEBORDER – Set this attribute to 0 for not

displaying a border between

the frames

Question No: 17 __ ( Marks: 1 )

What are the two types of twisted pair cables for networking ?

ANSWER

Type of twisted pair cables

Unshielded twisted pair (utp)

Shielded twisted pair (stp)

.

Question No: 18 ( Marks: 1 )

What it stands for IIS?

ANSWER

Internet information serverQuestion No: 18 __ ( Marks: 1 )

What do you say that Cookies can also be used to maintain

state between

two broken sessions. Justify with solid argument

ANSWER

It is possible that some information of the previous session is stored in

the

cookie file, and this information is available (through cookie) to the

server side on

starting a subsequent session.

Question No: 18 __ ( Marks: 1 )

Do you agree or not that in In Java Script we are not provided

with certain

already defined objects which are ready to use? justify

.

ANSWER

I am not agree, because in java script we are

provided with certain already defined objects

which are already to use.

Question No: 17 ( Marks: 1 )

Shortly Explain RIP?

Answer

RIP is a dynamic routing protocol used in local and wide area

networks. As such it

is classified as an interior gateway protocol (IGP). It uses the distancevector

routing algorithm .

Question No: 18 ( Marks: 1 )

In which layer of OSI model, the data is converted into binary digits

or

electric pulses?

Answer

Physical layer

.

Question No: 17 ( Marks: 1 )

What does this mean?

padding-right

ANSWER

Padding-right means adds space to the right of the contentQuestion

No: 18 ( Marks: 1 )

Do you agree or not that using Cascading Style Sheets one can apply

an image to

sections of one‟s page or even to individual words.

Answer

Yes! I agree, using CSS one can apply his/her defined design,

image or

wording to multiple pages of his/her website

Question No: 18 __ ( Marks: 1 )

In HTML , for displaying information systematically which tag do

we usually use ?

.

Answer

Tables are used largely for page layout as well as for displaying

information systematically

Tables use the basic tag <Table> and </Table>.

Question No: 17 __ ( Marks: 1 )

What does this mean document.write(“str.charAt(3) :

“+str.charAt(3)

+”<P>”); ?

Answer

charAt(3) would provide the value of the element at the index three.

Question No: 18 __ ( Marks: 1 )

What does this term mean “Non-repudiation”?

Answer

Non-repudiation means that the execution of the digital signatures

Question No: 17 __ ( Marks: 1 )

What it stands for (W3C)?

Answer

.

World Wide Web Consortium

ALL NEW RESULTS
Educational News

Updated Educational News

Categories
POSTS BY DATE
December 2016
M T W T F S S
« Sep    
 1234
567891011
12131415161718
19202122232425
262728293031