Showing posts with label IT430. Show all posts
Showing posts with label IT430. Show all posts

Sunday, April 18, 2010

IT430















Q2: Perform the conversions [5*2 = 10]

(a) 110 Decimal to Binary

2 110

2 55-0

2 27-1

2 13-1

2 6-1

2 3-0

2 1-1

Decimal to Binary

110 = 1101110

(b) 10011000 Binary to Decimal

2 0 *0+2 1 *0+2 2 *0+2 3 *1+2 4 *1+2 5 *0+2 6 *0+2 7 *1 = 0+0+0+8+16+0+0+128 = 152

(c) 11011100 Binary to Decimal

2 0 *0+2 1 *0+2 2 *1+2 3 *1+2 4 *1+2 5 *0+2 6 *1+2 7 *1 = 0+0+4+8+16+0+64+128 = 220

(d) 11111100 Binary to Decimal

2 0 *0+2 1 *0+2 2 *1+2 3 *1+2 4 *1+2 5 *1+2 6 *1+2 7 *1 = 0+0+4+8+16+32+64+128 = 252

(e) 3009 Decimal to Binary

2 3009

2 1504-1

2 752-0

2 376-0

2 188-0

2 94-0

2 47-0

2 23-1

2 11-1

2 5-1

2 2-1

2 1-0

Friday, March 5, 2010

IT430 Paper

IT430 E-Commerce Date: 5-03-2010 Start Time: 11:00 to 1:00



Total Questions 41 Marks: 75


Total MCQS 30 Marks: 30


Total Long Questions: 11 Marks: 45


Question 1. What is a "concurrent use" in the website? Marks: 1


Question 2. Market and sell’ is one of the areas in a strategic business unit according to Michael Porter. List what kind of activities is performed in this area? Marks: 1


Question 3. What do we mean by E-Business? Marks: 2


Question 4. What is online banking? Marks: 3


Question 5. How the coin is minted by E-Cash bank? Marks: 3


Question 6. Explain the difference types of attacks on public key algorithms? Marks: 3


Question 7. What is Data Mining write the positive and nagtive Data Mining? Marks: 3


Question 8. What is basic content use to design the good website? Marks: 5


Question 9. What is K-Mean use in the E-commerce? Marks: 5


Question 10. What is mean by E-Business? and what the different Between the E-Commerce in explain in example in real life. Marks: 10


Question 11. What is Defarmation? and the what demination can use the web designer and ICP to avoid the Defamation? Marks: 10

Tuesday, February 16, 2010

IT430 Quiz

Fee for Transaction Models include
Select correct option:


Travel Agents and Insurance brokers
Automobile Sales and event tickets
Stock brokers and online banking
All of the above



Which one of the followings is an example of Banner advertising?

Select correct option:


Branding
Affiliate programs
Partnership
All of these



Question # 3 of 10 ( Start time: 12:37:26 PM ) Total Marks: 1

Log files consist on information about each visitor's _________.

Select correct option:



Location

IP address

Time of visit

All of above


Question # 4 of 10 ( Start time: 12:39:08 PM ) Total Marks: 1
In which type of approach, we further dig the data for retrieving information from data warehouse?

Select correct option:

Slice
Dice
Drill down
Roll up
Question # 5 of 10 ( Start time: 12:40:48 PM ) Total Marks: 1

Dividing potential customers on the basis of variables such as social class, personality, or lifestyle is called____________.

Select correct option:

Demographic Segmentation

Geographic Segmentation

Psychographic segmentation

Behavioral segmentation



Question # 7 of 10 ( Start time: 12:44:30 PM ) Total Marks: 1

If a company's marketing stretegy is focusing on customers having age less than 30, which of the following marketing segmentation technique is being used by company?

Select correct option:


Demographic Segmentation

Geographic Segmentation

Psychographic segmentation

Behavioral segmentation


Question # 8 of 10 ( Start time: 12:45:07 PM ) Total Marks: 1

Which of following marketing campaigns are cheap an effective way to target potential customers?

Select correct option:


Sale forces

E-mail

Media promotion

Marketing software


Question # 9 of 10 ( Start time: 12:45:58 PM ) Total Marks: 1

OLAP stands for……………

Select correct option:

Online Analytical Program

Online Analytical Processing

Online Application Program

Online Analysis Performance

Question # 10 of 10 ( Start time: 12:46:36 PM ) Total Marks: 1

Press release can provide information about current events and news to, which of following, via a internet?

Select correct option:


Print media

T.v commercial

Press or media

T.v program.

Thursday, February 11, 2010

IT430

IT430 Assignment#5 Solution…
Provided By
About Virtual University:
- 1) The Virtual University, Pakistan’s first University based completely on modern
Information and Communication Technologies
-2) The Virtual University allows students to follow its rigorous programs regardless
of physical location
-3) By identifying the top professors of the country, regardless of their institutional
affiliations, and requesting them to develop and deliver courses, the Virtual
University aims at providing the best courses not only to its own students but also
to students of all other universities in the country.
SWOT ANALYSIS of Virtual University.

Tuesday, January 26, 2010

IT430 GDB

Advantages of online business in Pakistan

1. One person can run the whole business.

2. With a very low cost, we can start an online business.

3. Without any special marketing campaign, just send a swarm e-mail to a lot of people for marketing.

4. No place restriction to operate and update your business.

5. In Pakistan the IT technology now grow up fastly and this is very help full for the industry to contact with whole of the world.6. New generation of the Pakistan have much interest in IT base business so that is in faver of Online business.

Disadvantages of online business in Pakistan

1. Knowledge about computer and internet is very low, so every one is not able to check your business site.

2. Access of internet is not everywhere

3. Low speed of internet.

4. Lack of technical person to, maintain a business.

5. In Pakistan the Internet facility is not in every area of Pakistan and not much fast and due to that business cannot run smoothly.

Wednesday, January 20, 2010

IT430 Quiz

IT430 Quiz # 2

Question # 1 of 10 ( Star time: 05:33:37 PM ) Total Marks: 1
At deposit stage, the serial number is ……………..by E-Cashbank

Known
Unknow
Secure
View

Question # 2 of 10 ( Start time: 05:34:37 PM ) Total Marks: 1
User generates blank electronic check by using his checkbook device.
Select correct option:

True
False

Question # 3 of 10 ( Start time: 05:36:04 PM ) Total Marks: 1
In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last …………………withdrawals to the E-bank.
Select correct option:

10
12
14
16

Question # 4 of 10 ( Start time: 05:36:54 PM ) Total Marks: 1
Using SSL, we type in URL as :
Select correct option:

https
httpc
httpc
httpi

Question # 5 of 10 ( Start time: 05:37:49 PM ) Total Marks: 1
Which of the following represents correct sequence of steps for electronic check payment system?
Select correct option:

Payer’s bank ? Payee ? Payee’s bank ? Payer
Payer’s bank ? Payee’s bank ? Payer ? Payee
Payer ? Payee ? Payee’s bank ? Payer’s bank
Payee’s bank ? Payer’s bank ? Payee ? Payer

Question # 6 of 10 ( Start time: 05:39:21 PM ) Total Marks: 1
Suppose you want to buy diamonds. Which of the following payment system you should give LEAST preference for this purpose?
Select correct option:

Virtual PIN payment system
Electronic checks
Electronic Cash
Credit card

Question # 7 of 10 ( Start time: 05:40:53 PM ) Total Marks: 1
It is necessary for both buyer and seller to have their account in the ---------E-bank.
Select correct option:

Same
Separate
Any
partially same

Question # 8 of 10 ( Start time: 05:42:00 PM ) Total Marks: 1
How many elements an e-coin has?
Select correct option:

1
2
3
4

Question # 9 of 10 ( Start time: 05:42:49 PM ) Total Marks: 1
ACH is a centralized system used by different interconnected banks for clearing payment requests.
Select correct option:

True
False

Question # 10 of 10 ( Start time: 05:44:06 PM ) Total Marks: 1
If a key is 4 bit in length, how many unique key values are possible?
Select correct option:

4
8
16
32




Monday, January 11, 2010

IT430

IT430 Complete Assignment Solution
Question No. 1: Write down advantages and disadvantages of “Virtual PIN
Payment System”.

Answer: Virtual PIN payment system is one of the earliest credit card based system. This
system does not involve use of encryption and payment is made through credit card.
There are certain advantages and disadvantages associated with this system
Advantages:
• No special software or hardware in needed at buyer or seller side
• First Virtual has very low processing fee as compared to other Internet payment
schemes or even straight credit card processing
• Purchases are essentially anonymous. The merchant is never given the buyer's
name from First Virtual
• Buyers are fully protected from fraud. No charges are processed against their
account without their confirmation
Disadvantages:
• Pre-registration with First Virtual in set up is mandatory for buyer and seller
• Most risk is borne by merchant because goods are delivered by merchant before
actual payment
• Long waiting period between sale and actual payment made to merchant
_________________________________
Question No. 2: How stolen credit cards can be used for fraud in Virtual PIN
Payment System?
Answer: Virtual PIN payment system is a credit card based payment system. Both
merchant and buyer need to register with First Virtual (FV).
When the customer makes an order, they give the merchant their virtual PIN. The
merchant then contacts First Virtual, quotes them the PIN and asks for the money. First
Composed
Hafiz Salman Majeed
These Assignments OR Quiz are just for idea, So kindly don't just
copy it, after viewing it make your own. Please help to each other in
Assignments Thanks. Do remember me in Your prays...
Note: Solve these papers by yourself
This VU Group is not responsible for any solved content
Virtual send the customer an e-mail asking for their confirmation, customer either replies
YES, NO or Fraud. If the answer indicates “fraud” it means that the goods were never
ordered. In such an eventuality the First Virtual Internet Payment Server System
(FVIPSS) immediately blacklists Virtual PIN so that it cannot be used in the future. In
case of fraud indication it means buyer to whom PIN actually belongs has not made the
order and somebody might have stolen the PIN and misused it. There is a said waiting
period to answer the e-mail about indication of transaction and in case of no reply FV
proceeds the payment, in such a case since no fraud indication is made by buyer the
stolen Virtual PIN can then be used for transaction. Similarly a stolen credit card number
can also be used to set up Virtual PIN associated with an email address controlled by the
attacker to carry out bogus transactions.
______________________________________________

Friday, November 20, 2009

IT430


IT430 E-Commerce 3rd Assignmrnt Solution:

Any one want the 3rd Assignment solution of E-Commerce IT430 then send Email HTML file not upload in blog send mail:: uzair777@gmail.com

Tuesday, November 17, 2009

IT430

IT430 Assignment No. 3
Dated: Nov 17, 09
Assignment No. 3 have been Uploaded and due date for this assignment is 24th November 2009. You will upload HTML file of your solution.

Monday, November 16, 2009

IT430 Quiz

IT430 E-Commerce Quiz # 1

Question # 1 of 10 ( Start time: 05:16:14 PM ) Total Marks: 1
In HTML, depending upon which tag is used, the enclosed content can then have
Select correct option:

Specific effect
Style
Format
Specific effect, style and format

Question # 2 of 10 ( Start time: 05:17:39 PM ) Total Marks: 1
Which HTML tag is used to define an internal (embedded) style sheet?
Select correct option:

CSS
Text / Style
Style
Script

Question # 3 of 10 ( Start time: 05:19:04 PM ) Total Marks: 1
For which one of the following, tag can work better
Select correct option:

News headlines
Sound plug-in
Announcements
Movie controls

Question # 4 of 10 ( Start time: 05:20:07 PM ) Total Marks: 1
Which of the following is NOT an advantage of CSS?
Select correct option:

Define the look of your pages in one place
Works on version 4 browsers or newer
Easily change the look
Implement same formatting each time tag is used.

Question # 5 of 10 ( Start time: 05:21:32 PM ) Total Marks: 1
Links are used to connect ____________.
Select correct option:

Images
Text
Images and web documents
All of the given


Question # 6 of 10 ( Start time: 05:22:48 PM ) Total Marks: 1
Meta Data is important for easier ____________.
Select correct option:

Web page creation
Web site upload
Web page search through search engine
None of the above

Question # 7 of 10 ( Start time: 05:23:54 PM ) Total Marks: 1
makes the content --------------
Select correct option:

Bounce back and forth and invisible
Visible all the time
Scroll off the edge of area
Bounce back and forth and visible

Question # 8 of 10The web addresses are first translated into IP address through ________
Select correct option:

DNS
SMTP
HTML
IPV6

Question # 9 of 10 ( Start time: 05:26:37 PM ) Total Marks: 1
A _________ is a web page populated with text boxes, drop-down lists and commands buttons to get information from the user.
Select correct option:

Hypertext Link
Form
Table
Button

Question # 10 of 10 ( Start time: 05:28:06 PM ) Total Marks: 1
When a visitor clicks a _________, the entries in form are set to the default values.
Select correct option:

Button
Radio Button
Submit Button
Reset Button







Monday, November 2, 2009

IT430

IT430 E-Commerce
Question No. 1: [10 Marks]
You are required to write the HTML code for the page shown below.

1) In your code you will submit the form to http://www.vu.edu.pk/ using POST method.
2) Name and VU ID fields will have your name and ID by default.
Figure No.1








Figure No. 2









Note 1: You will submit/upload HTML file only.
If any one required solution then Email me: uzair777@gmail.com

Wednesday, October 21, 2009

IT430

IT430 E-Commerce
Assignment No: 01 Fall 2009



Question # 1
At which layer lost packets are traced?
ANS:
Session Layer is the 3rd Layer from sender side and 5th layer from the receiver side of International organization for standard’s (ISO) model. This layer instructs to create communication link between the sending and receiving machine via combination of protocols. The modes of communication are simplex, half-duplex and full-duplex.

v Simplex means communication in one direction only.
v Half-duplex means communication in two directions but one party can send data at a time.
v Full-duplex means communication in two directions while both parties are able to send data at the same time.
It also places special checkpoints on data packets to trace any lost packets.

Question # 2
Write down three benefits of switching to IP Version 6.
ANS:
As the IP version 6 is the latest version then the IP version 4 so, no doubt it will be more improved one then the older version; here are three basic benefits that we can derive by switching to the IP version 6

1) Large address space.
2) Improved security
3) Better routing.
4) New header format
5) Efficient and hierarchical addressing and routing infrastructure
6) Stateless and state-full address configuration
7) Built-in security
8) Better support for quality of service (QoS)

Question # 3
You have four computers and a switch, you want to make a network of these computers using switch, which networking topology you will use?
ANS:
In this case when I have four computers and a switch to make a network using the switch, I’ll go for the STAR TOPOLGY. As I know that the switch is a computer networking device that connects network segments. It commonly refers to a network bridge that processes and routes data at the Data link layer of the OSI model. The switch which process data at the network layer is referred as Multilayer switches how ever it is generally not intelligent such as hub but the small network like 4 computers network can be easily made by using a switch in the star topology.

Diagram:
In this diagram have four computers and a switch