Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

FOR MORE PAPERS | LOGON TO WWW.VUSSS.

COM
MID TERM

IT430 - E-Commerce

Question No: 1 (Marks: 1) - Please choose one


For which of the following we need to know the classification of E-commerce?
► arket lanning strateg
► ild ission statement
► anagement strateg
► none

Question No: 2 ( Marks: 1 ) - Please choose one


Switch is a device that joins m lti le com ters together within one local area
network (LAN).
► r e ( age )
► False

Question No: 3 ( Marks: 1 ) - Please choose one


In which rotocol, the messages are not deleted from email server.
► S P
► P P
► I AP ( age )
► I P

Question No: 4 ( Marks: 1 ) - Please choose one


How can o o en a link in a new browser window?
► a href rl target new
► a href rl target blank ( age )
► a href rl new
► None of these

Question No: 5 ( Marks: 1 ) - Please choose one


What does the arget “ to ” tag erform?
► Loads the new age into the same frame
► Loads the new age into the entire window ( age )
► Loads the new age into a new browser window
► All of the above

Question No: 6 ( Marks: 1 ) - Please choose one


Which attrib te is sed in a tag to control the la o t of element?
► view
► css
► St le (PA E )
► La o t

FOR MORE PAPERS | LOGON TO WWW.VUSSS.COM


Page 1 of 6
FOR MORE PAPERS | LOGON TO WWW.VUSSS.COM
MID TERM

Question No: 7 ( Marks: 1 ) - Please choose one


hoose the correct H L code line which left-align the content inside a
tablecell.
► td leftalign
► td valign left
► td align left (PA E , )
► tdleft

Question No: 8 ( Marks: 1 ) - Please choose one


Where in an H L doc ment is the correct lace to refer to an external st le
sheet?
► In the bod section
► At the end of the doc ment
► In the head section (PA E )
► At the to of the doc ment

Question No: 9 ( Marks: 1 ) - Please choose one


When o declare a variable within a f nction, the variable can onl be
accessed within that f nction. When o exit the f nction, the variable is
destro ed. hese variables are called
► Local ariables
► lobal ariables
► Local and lobal
► None of the above

Question No: 10 ( Marks: 1 ) - Please choose one


onstr ctor is defined as the initializing f nction sed to create…........
► Instance of object
► o of object
► Instance co of object ( age )
► Shallow co of object

Question No: 11 ( Marks: 1 ) - Please choose one


What does X L stand for?
► eXtra odern Link
► X- ark Lang age
► eXtensible ark Lang age ( age 7 )
► Exam le ark Lang age

Question No: 12 ( Marks: 1 ) - Please choose one


For which of following r ose the Firewall is sed ?
► Efficient working
► Protection against sec rit attacks ( age )

FOR MORE PAPERS | LOGON TO WWW.VUSSS.COM


Page 2 of 6
FOR MORE PAPERS | LOGON TO WWW.VUSSS.COM
MID TERM

► Networking r ose
► None of these

Question No: 13 ( Marks: 1 ) - Please choose one


PPP stands for
► Point to Point Protocol ( age )
► Post to Post Protocol
► Point to Post Protocol
► None of these

Question No: 14 ( Marks: 1 ) - Please choose one


Which of the following is N rocessed on the client side?
► ookies
► avaScri t
► I scri ts ( age 7 )
► A lets

Question No: 15 ( Marks: 1 ) - Please choose one


Firewall is sed to
I - examine the data entering the network
II - examine the data leaving the network
III - filter the data according to certain r les
► I, II and III ( age )
► I onl
► I and III onl
► I and II onl

Question No: 16 ( Marks: 1 ) - Please choose one


Which firewall ses strong ser a thentication to verif identit of a host
attem ting to connect to the network?
► Packet filter firewall
► irc it level firewall
► A lication gatewa firewall ( age )
► H brid firewall

Question No: 17 ( Marks: 1 ) - Please choose one


s networks is same as the s stem b s of a com ter.
► r e
► False ( age )

FOR MORE PAPERS | LOGON TO WWW.VUSSS.COM


Page 3 of 6
FOR MORE PAPERS | LOGON TO WWW.VUSSS.COM
MID TERM

Question No: 18 ( Marks: 1 ) - Please choose one


In St le Sheets, How do o add a backgro nd color for all h elements?
► all.h backgro nd-color:#FFFFFF}
► h .all backgro nd-color:#FFFFFF}
► h backgro nd-color:#FFFFFF}( age 7)
► h bgcolor:#FFFFFF}

Question No: 19 ( Marks: 1 ) - Please choose one


How do o make each word in a text start with a ca ital letter?
► text-transform:ca italize
► text-transform:first ca italize. ( age )
► ann t be ossible with SS
► text-transform: ercase

Question No: 20 ( Marks: 1 ) - Please choose one


A address is written in
 inar form 0-
 Decimal form 0-
 Hexadecimal form 0-f ( age )
 None of these

Question No: 21 ( Marks: 2 )


What is a web server?

Answer: Web server – machine that services internet req est.

Question No: 22 ( Marks: 2 )


What does ‘ arseFloat(string) And NaN mean?

Answer:
he arseFloat() f nction arses a string and ret rns a floating oint n mber.
his f nction determines if the first character in the s ecified string is a
n mber. If it is, it arses the string ntil it reaches the end of the n mber,
and ret rns the n mber as a n mber, not as a string. he NaN ro ert
re resents Not-a-N mber val e. his ro ert indicates that a val e is not a
legal n mber.

FOR MORE PAPERS | LOGON TO WWW.VUSSS.COM


Page 4 of 6
FOR MORE PAPERS | LOGON TO WWW.VUSSS.COM
MID TERM

Question No: 23 ( Marks: 3 )


Write at least three r les for writing an X L code.

Answer:
R les for writing an X L code
-All elements m st be ro erl nested
o ter inner content inner o ter

-All attrib te val es m st be q oted FRIES


SIZE “LAR E”

-All elements with em t content m st be identified


b ending in

Question No: 24 ( Marks: 3 )


How ‘ an in he middle Attacks o erates?

Answer:
Man in the middle attacks
In it the attacker is able to monitor, ca t re and control data between
sending and receiving machines. He ma a l IP address s oofing techniq e
to divert the ackets to its machine, then modif the ackets and resend the
misleading information to the act al client. Another form of man-in-the-
middle attack is where the hacker is able to s bstit te the IP address of a
gen ine web site with the IP address of his own web site d e to some
sec rit hole in the software that r ns on a domain name server. A client
wo ld think that he is comm nicating or receiving the information form a
gen ine web site, tho gh it wo ld not be the case act all .

Question No: 25 ( Marks: 5 )


Write the code for a web age dis la ing a b tton named
esting . After clicking that b tton an alert sho ld be
dis la ed sa ing he test is s ccessf l .

Answer:
html
head
scri t t e text javascri t
f nction sndAlert()

window.alert( he test is s ccessf l!!! );


}
scri t

FOR MORE PAPERS | LOGON TO WWW.VUSSS.COM


Page 5 of 6
FOR MORE PAPERS | LOGON TO WWW.VUSSS.COM
MID TERM

head
bod
F R
NA E form
INPU YPE tton name showAlert ALUE Show
Alert
onclick sndAlert()
F R
bod
html

Question No: 26 ( Marks: 5 )


Differentiate between front end and back end.

Answer:
Front end consists of that information which is visible to the ser and he can
interact with the same thro gh some interface. he back end com rises that
information which resides on the server side and is sed to create certain
d namic res lts for the ser. It wo ld incl de different rograms or scri ts
that ma be develo ed in different lang ages tools. ackend is mainl sed
for two r oses – for q er ing with the databases and for the maintenance
of state. We can se different tools (ASP, SP etc.) for that r ose
de ending on their res ective advantages disadvantages.

FOR MORE PAPERS | LOGON TO WWW.VUSSS.COM


Page 6 of 6

You might also like