Professional Documents
Culture Documents
BCE Assignment 2 - PDF
BCE Assignment 2 - PDF
BCE Assignment 2 - PDF
Vadodara, Gujarat
Assignment No.: 2
Faculty of: FET
Subject Name: Basics of Computer Engineering Subject Code: 1601105341
Chapter No. & Name: 3. Computer Networks and Internet
4. Introduction to E-Commerce
5. Introduction to Cyber Security
Name of Subject Teacher: Ms. Vrunda Joshi
Unit Start Date: 26/08/2023 Unit Completion Date: 20/09/2023
Date of Submission: 25/09/2023
12. Companies like Flipkart, Amazon and Myntra belong to which type of Ecommerce (EC)
segment.
(a) Distributors (b) Manufacturers (c) Publishers (d) None of the above
15. All electronically mediated information exchanges are referred to as _____
(a) E-Business (b) Digital Business (c) E-Commerce (d) None of the above
16. Which is a function of E-commerce?
(a) marketing (b) advertising (c) warehousing (d) all of the above
17. In which year WWW (World Wide Web) was introduced?
(a) 1994 (b) 1996 (c) 1991 (d) 1990
18. Which of the following is an early form of e-commerce?
(a) SCM (b) EDI (c) All of the above (d) None of these
19) What is Cloud Computing?
(a) Cloud Computing means providing services like storage, servers, database, networking, etc
b) Cloud Computing means storing data in a database
Page 2 of 4
c) Cloud Computing is a tool used to create an application
d) None of the mentioned
20) Which of the following are the features of cloud computing?
(a) Security (b) Availability (c) Large Network Access (d) All of the above
21. What is Cyber Security?
(a) Cyber Security provides security against malware
(b) Cyber Security provides security against cyber-terrorists
(c) Cyber Security protects a system from cyber attacks
(d) All of the above
22. According to the CIA Triad, which of the below-mentioned elements is not considered in the
triad?
(a) Confidentiality b) Integrity
c) Authenticity d) Availability
23. When you use the word _____ it means you are protecting your data from getting disclosed.
(a) Confidentiality b) Integrity
c) Authenticity d) Availability
24. ______ means the protection of data from modification by unknown users.
(a) Confidentiality b) Integrity
c) Authenticity d) Availability
25. Which of the following attacks can actively modify data?
(a) Both active and passive attack (b) Neither active nor passive attack
(c) Active Attacks (d) Passive attacks
Q.2 Short Answer Type Questions
1. Give the difference between Computer Network and Internet.
2. Explain modem and RJ45 connector in detail.
3. Explain Unguided media in detail.
4. Explain in detail: Database and Database Management System
5. Explain supervised learning in detail.
6. Explain Forces behind E-Commerce Industry Framework.
7. Explain Different Types of Ecommerce Websites.
8. Explain steps for Implementing web based E-commerce website.
9. Explain Characteristics of Cloud Computing.
10. Explain advantages and disadvantages of Cloud Computing.
11. Explain CIA model in detail.
Page 3 of 4
12. Explain intellectual property and copyright.
13. Explain in detail : Virus, Worms and Trojan Horse
14. Explain in detail: Active Attack
15. Explain in detail: Passive Attack
Q3. Long Answer Type Questions
1. Explain types of computer networks in detail.
2. Explain following network devices in detail:
1) Ethernet Card
2) Router
3) Switch
4) Gateway
5) Wi-Fi Card
3. Explain Guided media in detail.
4. Explain Information Technology Act, 2000 in detail.
5. Explain types of DBMS Architecture.
6. Explain Supervised and Unsupervised Learning in detail.
7. Explain data science with examples.
8. Explain different types of E-commerce business models in detail.
Page 4 of 4