West Bengal Institute of Technology (WBIT) 2009-8th Sem B.Tech Computer Science and Engineering Computer Science -E-Commerce and ERP - Question Paper
CS/B.TBCH (CSE )/SBM-8/C3-o. IE/09 3
' .__...
EUGINlRINU x MANAGEMENT EXAMINATIONS, iiPRI - 2009
Time : b Hours ] I FuJ arks ; 70
GROUP - A ( Multiple Choice Type guestions )
1. Choose the correct alternatives for the following : 10 x 1 - a!
i) EDI requires
a) representation of common business documents In computer readable form
b) data entry operators by receivers
c) special value added networks
d) special hardware at co-operating business premises. ;__________j
ii) By sec urity in e-Commerce we mean
I. protecting an organizations data resource from unauthorised access
II. preventing disasters from happening
III. authenticating messages received by an organization
IV. protecting messages sent on the internet from being read and understock by unauthorized persons/organizations
a) I, II b) II, III
c) III, IV d) I, III, IV; !____~
iii) A firewall may be implemented in
a) rcucvii ; which connect intranet to internet
b) brier ft used in an intranet
c) expensive modem
d) users application programs. i
ivj Public key encryption method is a system
a) which uses a set of public keys one for each participant in e-commerce
b) in which each person who wants to communicate has two keys ; a private key known to him only and a public key which is publicized to enable others tc send message to him
c) which uses the RSA coding system
d) which is a standard for use in e-Commerce. [ j
v) In electronic cash payment
I. a customer withdraws coins in various denominations signed by th . bank
II. the bank has a database of issued coins
III. the bank has a database of spent coins '
IV. the bank cannot trace a customer.
a) I, II c) I, II, III, IV vi) SET protocol is use for a) Securing message transfer c) Securing authentication vii) A key is a a) Value c) Function |
b) i, II, ill d) Ii, III, IV. b) Securing card transaction d) Securing overall e-Commerce. [_ b) Logic d) All of these, T |
viii) Which model of e-commerce deals with virtual auction ?
a) Aggregator model b) Info-mediary ruodel
c) Community model d) Brokerage model.
Jx) A/an ...............is a network that links selected resource of a companys
internet with its customers, suppliers or other business partner
a) internet b) extranet
c) VPN . d) wide area network. i J
x) How many iypes of trade cycle are there in e-eommerce ?
a) One b) Two
c) Three d) Four. ' __.j
GROUP - B ( Short; Answer Type Questions }
Answer any three of the following. 3x5=35
2. YVhut do you mean by knowledge engineering and business process redesign ? "
3. lxp lain E-Governance with suitable examples.
4. What ar.- the benefits and points of concern in CPD ?
5. Wnv.t i3 BPIi '? Explain with an example.
C. Distinguish between CRM und SRM.
GROUP -C ( Lotij Answer Type Questions )
Answer any three of the following questions, 3 x 15 = 45
7. a) What is Digital signature ? How they differ from Digital certificate ?
bj Given two prime nos. P = 17, Q = 29. Find out N, E and D in RSA encryption,
cj What is iirewali ? State the function of firewall in e-comrnerce. ! 5
6. a) What is call center ? Discuss about the call center equipment.
o) What nre the modes of operation of call center ?
c) What is Customer Premises Equipment ( CPE ) ? What do you mean by Denial of Service Aitacks ? (3 + 4) + 3 + (2 + 3)
What is EDI ?
c,
b) What are the basic components of EDI ? Describe briefly.
c] What role does it play in e-commerce ?
d) Explain EDIFACT.
1 + 4 + 4 + 4 r 2
e) Briefly explain the benefits of EDI.
10. a) Deane ERP. How can information be integrated using ERP ?
b) 'What are the reasons for the growth of ERP market ? What are
of ERP system ?
1 r 5 -i e
; x e
i 1. Write short notes on any three of the following :
a) l.\ il
b) SCB framework ,
c) BAAN
d) SAP
c) VPN.
END
do47-lC/F (25/04)
Attachment: |
Earning: Approval pending. |