Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

B

TILAK MAHARASHTRA VIDYAPEETH, PUNE


BACHELOR OF COMPUTER APPLICATIONS (B.C.A.)
EXAMINATION : APRIL – MAY 2015
FOURTH SEMESTER
Sub: E-Commerce (BCA-425)

Date : 16/05/2015 Total Marks : 80 Time: 2.00 pm to 5.00 pm


Instructions:
1. All questions are compulsory unless and otherwise stated.
2. Bold figures to the right of every question are the maximum marks for that question.
3. Candidates are advised to attempt questions in order.
4. Answers written illegibly are likely to be marked zero.
5. Use of scientific calculators, Log tables, Mollier Charts is allowed.
6. Draw neat and labelled diagrams wherever necessary.
Q.1. A) Fill in the blanks. (Solve any 5) (5)
1. _______ are people with money who want to purchase a good or service.
2. The _______ layer is responsible for establishing a dialogue between computers.
3. _______ I uses two distinct keys: a public key and a private key.
4. _______ Fidelity refers to a standard 802.11b which most of the wireless local area
networks are based on.
5. _______ is an extension to GSM that allows more efficient packet data transfer
compared to traditional GSM data services.
6. Public-key encryption uses two different keys at once -- a combination of a private
key and a _______ key.
7. _______ of information means ensuring that a communication received has not been
altered or tampered with.

B) State True/False. (Solve any 5) (5)


1. Retailers sell product directly to consumers.
2. Cryptographic protocols don't work unless both parties to the communication use the
same algorithms.
3. Payment information sent from consumers to merchants includes order information,
personal data, and payment instructions.
4. Point-to-point dedicated link actually places a user’s computer or network on the
internet.
5. In GSM technology, a large number of users are able to access wireless channels on demand.
6. UI backend to parse and execute the JavaScript code.
7. Private key can be derived if the public key is known.

C) Answer the following. (Solve any 5) (10)


1. Explain any two benefit of E-Commerce to organization.
2. Explain the use to following E-Commerce Tools; a) FTP b) Telnet.
3. Define the following terms; a) Integrity b) Availability.
4. Explain the term A-symmetric key cryptography.
5. Explain the following terminologies; a) SMS b) PDA
6. Explain the advantage of Internet Publishing.
7. Explain the advantages of Log-file Analysis.

Q. 2. Answer the following in detail. (Solve any 6) (30)


1. Explain the reasons for companies to build an E-Commerce enabled website.
2. Define the term “E-Commerce”. Explain the following type of E-Commerce:
B to C and C to G.
3. Explain the techniques used to secure Web Server & Enterprise Network.
4. Define the term “E-Cash”. Explain disadvantages of E-Cash.
5. Explain the Basic Computer Security Tips.

E-Commerce ( BCA-425) AD / II 1/2


6. Explain the security engineering life cycle.
7. Explain any Five Web server technologies.
8. Explain the key area around which L-Commerce services revolve.

Q. 3. Answer the following in detail. (30)


1. What is EDI? Explain the working of EDI and advantages of EDI.
2. Explain in detail the working of SET protocol with help of neat diagram.
3. Explain in details following transactions done using SET protocol;
a) Purchase request
b) Payment authorization
c) Payment capture
_____________________

E-Commerce ( BCA-425) AD / II 2/2

You might also like