BE3-R3: E-BUSINESS Question Papers
JANUARY 2007 July, 2006 January, 2005 July, 2004 January, 2004 (JANUARY 2007) BE3-R3: E-BUSINESS NOTE: 1. 2.
Answer question 1 and any FOUR questions from 2 to 7. Parts of the same question should be answered together and in the same sequence.
Time: 3 Hours
1. a) b) c) d) e) f) g)
Total Marks: 100
What are Signature Files? How can they be used for e-marketing? What is the difference between e-Business and eCommerce? What are digital rights? What is chaffing? What is a microsite? What is the Digital Divide? What RDF? (7x4)
2.
What is an eBusiness strategy? What benefits can you derive from a good e-business strategy? (18)
3. a) b) c)
Explain the differences between Firewalls and firewires Content management systems and document management systems Hyper-linking and deep linking (3x6)
4. 5. a) b) c) 6. a) b)
How can CRM benefit from E-business and Internet technologies? How are they linked? (18)
What do you understand by competitive intelligence? What role can Internet technology play in it? What are the legal aspects of e-business? What do you understand with BLOGS? (8+7+3)
In what ways is security critical in e-Commerce? Explain in brief of the following: i) e-Payment ii) PGP protocol (6+12)
7. a) b) c) d) e) f)
What are the applications of the following technology solutions in e-business? Explain in brief. Clickstream Analysis Data Mining Proxy Server RSA Spider Spyware (3x6)
: E-BUSINESS(JULY 2006) NOTE: 1. Answer question 1 and any FOUR questions from 2 to 7. 2. Parts of the same question should be answered together and in the same sequence. Time: 3 Hours
1. a) b) c) d) e) f) g) 2. a)
Total Marks: 100
What do you understand by E-commerce? How does it differ from E-business? What is meant by Credit Card Laundering? Explain. What is unique about the E-wallet? How does it differ from real money? What is meant by Spam? How does it differ from viral marketing? Explain various types of Net market places. What do you understand by SET? Explain the important goals, which SET is meant to achieve. Describe the major feature of the online service sector. (7x4)
Explain briefly the limitations of transacting the business online.
b) c)
Explain, how companies can migrate from traditional to Internet based EDI. Describe the implications of web for managing a small e-business especially for small and medium entrepreneurs. (6+6+6)
3. a) b) c)
What are the characteristics of B2B e-commerce? Describe various architectural models of B2B e-commerce. Describe the features and functionality of the major types of digital payments systems in B2B Arena. (6+6+6)
4. a)
Compare the contrast Cash Check and Credit Card using ICES test that addresses money transfer properties? Describe major legal issues related to e-commerce promoting. Explain, how IT Act helps in e-commerce. (10+8)
b) 5. a)
What do you understand by Digital Certificates? Discuss various classes of these certificates. Describe various data encryption standards. (8+10)
b) 6. a)
What is Client/Server Architecture? How does two-tier architecture differ from three-tier architecture? Explain the limitations of two-tier architecture. Describe various protocols underlying Internet based Client/Server applications (12+6)
b) 7. a) b) c)
Explain, how online market research is conducted. Explain briefly Pretty Good Privacy Protocol (PGP). Write short notes on Secure Socket Layer (SSL). (6+6+6)
January, 2005 Note: 1. Answer question 1 and any FOUR questions from 2 to 6. 2. Parts of the same question should be answered together and in the same sequence. Time: 3 Hours Total Marks:100 1. Give brief answer to the following questions: 1. Describe the process of electronic fund transfer.
2. 3. 4. 5. 6. 7.
Explain how Internet can be used to conduct competitive intelligence. . What is Intellectual Property and how is it protected over the Internet. Explain the working of Electronic Check Systems. What are the entitites of B2B EC? Describe what SWOT is. Describe what are Secure Electronic Transactions.
(7x4) 2. What are components of digital economics? Give a brief description of each one of them. Give three detailed examples of digital products. (18) 3. In the strategy planning cycle for EC, what is strategy formulation? What are the critical success factors for EC? (18) 4. What are the considerations in Internet-based Advertisement design? Compare and contrast "pulling" information to "pushing" it. (18) 5. Describe the various security schemes in Electronic Payment Systems. (18) 6. Describe the online job market, its drivers, benefits and limitations. (18)
July, 2004 Note: 1. Answer question 1 and any FOUR questions from 2 to 7. 2. Parts of the same question should be answered together and in the same sequence. Time: 3 Hours Total Marks:100 1. 1. What is a Shopping Cart? Where does it fit into B2C e-business? 2. Compare e-Commerce with e-Business?
3. Briefly explain what security and privacy limitations of web-based eBusiness? 4. Elaborate on the distinctive types of hardware and software necessary to launch a business on the Internet. 5. Explain the unique features and uses of smart cards. 6. What are the design and implementation issues that should be addressed for designing a firewall for e-Business applications? 7. Explain the basic concept of how a information on a computer is encrypted? (7x4) 2. 1. What is a business model? How does business-to-consumer (B2C) work? 2. How does the web effect our traditional sales channels, partners and suppliers. Explain in detail? (10+8) 3. 1. Distinguish between the Public and Private keys. Describe the key generation of RSA. 2. Discuss the security and implementation consequences of the choices made in the key generation, in particular the sizes of the chosen numbers. (10+8) 4. 1. Describe traditional versus internet-based advertising. Explain the advantages of online marketing. 2. Briefly describe the use of Biometrics in e-Banking applications? How is it useful? (9+9) 5. 1. What are the various techniques used by firewalls to control access and enforce a security policy as related to e-transactions? 2. What are the common techniques used to protect a password file? What are the benefits that a intrusion detection system can provide? (9+9) 6. 1. Explain the SET Protocol.
2. Describe the salient features in IT Act of India that supports e-Business/eCommerce. (9+9) 7. 1. What is Spam? How does it differ from viral marketing? Compare and contrast B2B and B2C e-Business? 2. Elaborate on the general approaches to web personalization. In what way cookies considered a personalization tool? (6+6+6)
January, 2004 Note: 1. Answer question 1 and any FOUR questions from 2 to 7. 2. Parts of the same question should be answered together and in the same sequence. Time: 3 Hours Total Marks:100 1. Give brief answer to the following questions: 1. Describe how a banner exchange works and how it can be customised. 2. Describe the role of certificates, digital signatures and digital envelopes. 3. What are the roles and types of firewalls for Intranets and extranets? 4. Define data mining and describe its use in market research. 5. What are the essentials of SET? 6. Describe the protocols underlying Internet client-server applications. 7. How do private and public key encryption works? (7 x4) 2. 1. How can companies migrate from traditional to Internet-based EDI? How do they eliminate the potential limitations and risks associated with Internet-based EDI? 2. In what ways is security critical in e-commerce? (12+6) 3. 1. What are the characteristics of B2B e-Commerce? Classify the architectural models of B2B e-Commerce.
2. What implications does the web have for managing a small e-business? (12+6) 4. 1. What is online, market research, what are its methods and what are the potential limitations of this research? Can they be overcome? How? 2. Electronic-Commerce (e-Commerce) means the end of mass marketing. Do you agree? (12+6) 5. List and describe the major legal issues related to e-Commerce. How is privacy protected and describe the measures taken by companies and individuals to protect it. (18) 6. 1. Discuss the security requirements of Internet and e-Commerce applications and how these requirements are fulfilled by various hardware and software systems. 2. How can an enterprise protect its network against IP spoofing? (12+6) 7. Write short notes on the following: 1. e-payment 2. Pretty Good Privacy (PGP) protocol 3. MIME protocol (6+6+6)