SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR 603203 DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS QUESTION BANK 2017-18 Course / Branch : M.Sc.(CST) Semester / Year : VIII / IV Subject Name : E - Commerce Subject Code : CTC8C Faculty Name : T. Prabakar Designation : Asst. Professor UNIT I Part A 1.1 Define E-Commerce. Apr 12, Nov 12, Apr 13, Apr 16 1.2 Define Internet. Apr 13 1.3 What is electronic business? Apr 14 1.4 What is the one difference between EDI and electronic commerce? Apr 14 1.5 What is virtual enterprise? Apr 14 1.6 List out some Internet service providers. 1.7 What are the components of E-commerce applications?, Apr 17 1.8 Illustrate the issues available in cryptography. Nov 15 1.9 What are the drawbacks of Intranet? Nov 15 1.10 Illustrate the advantages and disadvantages of e-cash. Nov 15 1.11 List out the issues to develop the e-commerce website. Nov 15 1.12 List out the benefits of business from e-commerce. Apr 16 1.13 Give the role of E-commerce. Nov 14 1.14 What is meant by digital signature? Nov 13, Nov 14 1.15 What is the role of independent third party in E-Commerce? Nov 13 1.16 What is Web Linking? Nov 13, Apr 17 1.17 Define Privacy Issues. Nov 13, Apr 17 1.18 Define WWW. Nov 12 1
Part B Q.No. Question Month & Year 1.19 Discuss about E-commerce applications. Apr 13 1.20 Explain about internet sales tax. Apr 14 1.21 How domain name disputes are resolved? Apr 14 1.22 Discuss in detail about the impact of e-commerce in business models. 1.23 Explain the role of www and Internet in e-commerce. Nov 15 1.24 Write about the four virtual spaces of ICDT business strategy model. Apr 16 1.25 Discuss the consulting practices and accounts independence. Apr 16 1.26 Explain about Electronic commerce security. Apr 12 1.27 Discuss the E-commerce architecture and its components with neat Nov 14 diagram. 1.28 Explain in detail about information overload. Nov 13 1.29 Write a note on ISP. Nov 12 1.30 What are the core principles of privacy protection identified by FTC? Explain. Apr 17 1.31 What is TRUSTE? What are its objectives? Apr 17 Part C 1.32 Discuss in detail about cryptography and privacy issues. Apr 13 1.33 Explain the implications for the accounting profession. Apr 14 1.34 Explain about web linking. Apr 14 1.35 Define E-commerce. Mention the categories of E-commerce business and their limitations. 1.36 How does E-commerce differ from traditional E-commerce? Explain it. 1.37 Explain education web enabled service with respect to time saving, efforts of the user, convenience and quality factors. Nov 15 1.38 Discuss the impact of Electronic Commerce on business model. Apr 16 1.39 Briefly explain the types of E-commerce with neat diagram. Nov 14 1.40 Explain in detail about electronic agreement and digital signature. Nov 13 1.41 Discuss about : Nov 12 2
(a) The role of independent third parties. (b) International libel laws. (c) Digital signature. 1.42 Discuss the various issues related to domain Name disputer. Apr 17 Unit II Part A 2.1 What is EDI? Or Define EDI. Nov 12, Apr 13 2.2 What are risks in insecure system? Apr 13 2.3 What is meant by Electronic commerce risk? Apr 14 2.4 What is Trojan horse? Apr 14 2.5 What is meant financial EDI?, Apr 16 2.6 Name some risks that involves in E-commerce., Apr 17 2.7 Write the impact of EDI Internet applications. Nov 15 2.8 What is the use of disaster recovery plan in E-commerce? Nov 15 2.9 What is authentication? Apr 16 2.10 Name the services provided by VAN. Apr 16 2.11 Write any two recovery plans for risks. Nov 12 2.12 Define Social Engineering. Apr 16 2.13 What is VAN? Apr 12 2.14 How domain name disputes are solved? Apr 12 2.15 What is e mail spoofing? Apr 12 2.16 What is virus? Or Define virus Apr 12, Nov 13, Apr 17 2.17 Write the advantages of EDI. Nov 14 2.18 Differentiate between Internet and Intranet. Nov 14 2.19 What are the characteristics of Internet based EDI? Nov 14 2.20 Define Intranet. Nov 13 3
Part B 2.21 Write a note on risk management paradigm. Apr 13 2.22 What are the risks associated with virus and malicious? Explain. Apr 14 2.23 Can a control risk become a weakness? How? Apr 14 2.24 Write short note on the risks associated with internet and intranet transactions. 2.25 What is EDI? Discuss its layered structure in detail? Nov 15 2.26 Explain about traditional EDI system. Apr 16 2.27 Discuss on "Control weakness Vs Control risks". Or Differentiate Control weakness and control Risks. Apr 12, Nov 12, Nov 13, Nov 14 2.28 What are the risks associated with Internet transactions? Apr 12 2.29 Write a note on Financial Edi-Edi Systems. Nov 12 2.30 What are the characteristic of good risk management controls? Apr 17 2.31 Explain the benefits of EDI-Internet systems. Apr 17 Part C 2.32 Explain in detail about EDI. Apr 13 2.33 What kinds of risk we have to fall in transactions? Explain. Apr 13 2.34 What is the functionality of antivirus programs? How are viruses detected and fixed? 2.35 Illustrate disaster recovery plan. Apr 16 2.36 Explain about financial EDI systems and the internet. Apr 12 2.37 Describe the working mechanism of EDI and discuss its types. Nov 14 2.38 What are the risks associated with internet transactions? Explain. Nov 13 2.39 Discuss about EDI Systems. Nov 12 2.40 What is an Extranet? How do Extranets differs from the internet? Explain. Apr 17 4
Unit III Part A 3.1 Write some of the security protocols. Apr 13 3.2 Define cryptography. Apr 13 3.3 What is SMTP? Apr 14 3.4 What is encryption? Or Define Encryption. Nov 12, Apr 14 3.5 What is message digest? Apr 14 3.6 What is message authentication?, Apr 17 3.7 List out the keys that available in encryption. 3.8 What are the issues available in security protocols? Nov 15 3.9 List out the types of authentications in Encryption. Nov 15 3.10 Give any two examples of RFCs. Apr 16 3.11 Mention the functions of ICANN. Apr 16 3.12 What was the Original primary purpose of HTML? Apr 12 3.13 What is key? Apr 12 3.14 Explain public key cryptography. Apr 12 3.15 What are the techniques available in Encryption? Nov 14 3.16 Write the advantages of Encryption. Nov 14 3.17 Write some of the messaging protocols. Nov 12 3.18 Define Authentication. Nov 12 Part B 3.19 Explain in detail about authentication methods. Apr 13 3.20 Discuss about the role of accountant in Internet related standard setting process. Apr 13 3.21 Discuss in brief about messaging securities issues. Apr 14 5
3.22 List out some of the security requirements for safe e-payments and explain it. 3.23 What are the security requirements for using online e-cash services? 3.24 How are security services implemented through SET? Discuss it. Nov 15 3.25 Draw the neat diagram of Encryption and discuss its techniques. Nov 15 3.26 What are the security requirements for using online e-cash services? Apr 16 3.27 Write short note on cryptography and its techniques. Nov 14 3.28 Write short note on key management in E-commerce. Nov 14 3.29 Explain in detail about public key cryptography. Nov 13 3.30 Explain about E-Commerce Security. Nov 13 3.31 Explain in detail about the usage of authentication in cryptography. Nov 13 3.32 Write a note on Security protocol and Messaging protocols. Nov 12 3.33 Tabulate the various security services and the techniques used to provide these service. Apr 17 Part C 3.34 Discuss about Internet security standards. Apr 13 3.35 Explain about security protocols and language. Apr 14 3.36 Write a brief note on (a) Security protocols and languages. (b) Secure Electronic payments and protocols. 3.37 Briefly describe the intrusion mechanisms and intrusion detection Nov 15 techniques in E-commerce. 3.38 What are various encryption techniques? Explain. Apr 12, Nov 13, Apr 16, Apr 17 3.39 Explain about Cryptography issues. Apr 12 3.40 Explain about key management. Apr 12, Nov 13 3.41 Explain the symmetric and asymmetric algorithm of encryption standard. Nov 14 3.42 Discuss about Cryptography and Authentication. Nov 12 6
Unit IV Part A 4.1 What is firewall? Apr 13 4.2 Define the set protocol. Apr 13, Nov 13, Nov 12 4.3 Write any two commercial firewall software. Apr 13, Nov 12 4.4 Define proxy. Apr 14 4.5 What is an electronic check? Apr 14 4.6 What are the ways to secure firewall? 4.7 Mention the purpose of smart card. 4.8 What do you mean by Electronic cash?, Apr 17 4.9 Write the limitations of security prevention provided by firewall. Nov 15 4.10 What do you meant by magnetic strip card. Nov 15 4.11 What do you mean by firewall? Apr 16 4.12 When will IP spoofing occur? Apr 16 4.13 What is a network topology? Apr 12 4.14 What is an smart card? Apr 12 4.15 List out the security issues in electronic payments. Nov 14 4.16 Mention the purpose of SET protocol. Nov 14 4.17 Illustrate the components of firewall. Nov 14 4.18 What is the usage of magnetic strip cards? Nov 13, Apr 17 4.19 Write any two secure Electronic Payment System. Nov 12 Part B 4.20 Write a note on magnetic strip, smart cards. Apr 13 4.21 What are the factors to consider in firewall design? Apr 13 7
4.22 Explain about components of firewalls. Apr 14, Apr 16 4.23 Write short note on: (a) E-check and (b) SSL. 4.24 Write about the open system interconnect. Apr 16 4.25 Explain about secure Electronic payment protocols. Apr 12 4.26 What are the factors to consider in Firewall design? Apr 12 4.27 What are the different layers of TCP/IP protocol stack? Discuss it. Nov 14 4.28 Explain the concept of functionality of firewalls. Nov 14 4.29 Explain about secure electronic payment protocols. Nov 13 4.30 What are the limitations of security prevention provided by firewall? Nov 12 4.31 Discuss about E-Cash, E-Check, Smart Card. Nov 12 4.32 What is a Smart Card? What are its types? Explain. Apr 17 Part C 4.33 Discuss about components and functionality of firewalls. Nov 12, Apr 13 4.34 Explain about SET and differences between SET & SSL. Apr 14 4.35 Explain the features of an e-payment system and its capabilities of intelligent agent. 4.36 List out some of the Electronic Payment System. Explain. Nov 12, Nov 15 4.37 Discuss in detail about the secure electronic payments and protocols Nov 15 with suitable diagram 4.38 Describe the factors to consider in firewall design. Apr 16 4.39 What are the various functionalities of Firewalls? Apr 12, Nov 13, Apr 17 4.40 Illustrate and describe how SSL helps an E-commerce system to be secure. Unit V Nov 14 Part A 5.1 Define in-house solutions. Apr 13 5.2 What are the scopes of web based marketing? Apr 13, Nov 12 8
5.3 Write any two P s applied to Internet marketing. Apr 13 5.4 What is an intelligent agent? Apr 14 5.5 What is an impression? Apr 14 5.6 What are the goals of web based marketing., Apr 17 5.7 Write the impacts of Intelligent agent. 5.8 Write the scope of marketing., Nov 13 5.9 Write the impacts of Marketing techniques. Nov 15 5.10 Write the scope of online advertisement. Nov 15 5.11 What is single agent system? Apr 16 5.12 Mention the capabilities on intelligent agent. Apr 16, Apr 17, Nov 13 5.13 Define information overload. Apr 12 5.14 What is an online banner advertising? Apr 12 5.15 Give any two limitations of Intelligent agent. Nov 14 5.16 Write down the impacts of Internet marketing. Nov 14 5.17 Give any two website design issues. Nov 13, Apr 17 5.18 Give out the impacts on marketing. Nov 13, Apr 17 5.19 Define P personalization. Nov 12 Part B Q.No. Question Month & Year 5.20 Explain in detail about web based marketing. Apr 13 5.21 Explain about online information chain. Apr 14, Apr 12 5.22 Explain the role of E-commerce in Supply chain management. 5.23 Write short note on : (a) fifth P personalization and (b) online information chain. Nov 15 5.24 Discuss any two passive and active advertising methods. Nov 15 5.25 Explain the different web technologies used for E-commerce. Nov 15 5.26 Write about Internet advertisement categories in E-commerce scenario. 9
5.27 Write short note on Spam mail. Apr 16 5.28 What are the four "P"s applied to internet marketing? Apr 12 5.29 Enumerate the difficulties faced in business marketing and advertisements. Nov 14 5.30 What are the four s applied to Internet marketing? Nov 13 5.31 What are the capabilities and limitations of intelligent agent? Nov 12 5.32 Explain the different ways to On-line advertisements through e-mails. Apr 17 Part C 5.33 Explain in detail capabilities, levels and limitations of intelligent agent. Apr 13 5.34 a) Discuss capabilities of internet agents. b) Explain about intelligent agents and electronic commerce. Apr 14 5.35 Explain about online advertising mechanisms. Apr 14, Apr 12, Nov 13 5.36 Write about various Internet tools required for successful E-commerce. Discuss in detail. 5.37 Discuss about the various issues in website design and the limitations of e- advertisement. 5.38 How are intelligent agents utilized for the online advertising mechanism and discuss the strategies of marketing? Nov 15 Nov 15 5.39 Elaborate the Internet marketing techniques. Apr 16 5.40 Discuss the life cycle for developing an E-commerce website and mention its issues. Nov 14 5.41 Write about different strategies involved in online. Discuss in detail. Nov 14 5.42 Explain in detail about web based marketing. Nov 12 5.43 Elaborate the relationship of five P s and the customer oriented value chain. Apr 17 5.44 Illustrate the role of Intelligence agents in E-Commerce Apr 17 10