Search Assignments and Papers Here...


Custom Search

Thursday, February 12, 2009

Software Engineering and Project Management - 2

LIST OF ATTEMPTED QUESTIONS AND ANSWERS


Multiple Choice Multiple Answer
Question Microsoft wallet is currently working with
Correct Answer Master card , American express charge card
Your Answer Electronic cash system , Internet bank accounts


Select The Blank
Question The model used for computer network is called as ________.
Correct Answer OSI
Your Answer OSI


Match The Following
Question Correct Answer Your Answer

Marketing Notice New Products Information New Products Information

Logon Page Business partner's page Business partner's page

Home Page Latest Marketing Update Latest Marketing Update

Order Page Product summaries Summary Of Orders



Multiple Choice Multiple Answer
Question List the three types of information a smart card may contain
Correct Answer Financial facts , Account information , Health information
Your Answer Financial facts , Health information , Weather information


Select The Blank
Question ________ is a software that locates web pages based on matching keywords.
Correct Answer Search engine
Your Answer Search engine


Multiple Choice Multiple Answer
Question If the product picked by the customer is out of stock
Correct Answer The product has to be backordered , Give him options of other similar products , Order the product when the inventory reaches the minimum count
Your Answer The product has to be backordered , Order the product when the inventory reaches the minimum count


Select The Blank
Question A list of company activities that make up the website is called ________.
Correct Answer Content Inventory
Your Answer Content Inventory


True/False
Question Recovery from error is thought of in the planning phase.
Correct Answer False
Your Answer True


Multiple Choice Single Answer
Question There is no real safeguard for ensuring messages. Interent users send and receive messages are not intercepted or even altered by some unknown interloper.This threat is called
Correct Answer Packet Sniffing
Your Answer Packet Sniffing


Multiple Choice Multiple Answer
Question Select the agencies besides the customer and vendor in a credit card transaction
Correct Answer Vendor's bank , Customer's bank , Card issuing company
Your Answer Vendor's bank , Customer's bank , Card issuing company


True/False
Question Technical support can make or break a b-to-c interface for any e-business.
Correct Answer True
Your Answer True


Multiple Choice Multiple Answer
Question Typically what information a new business required to provide the merchant bank in opening an account
Correct Answer Business plan , details about existing bank accounts , credit history
Your Answer Business plan , details about existing bank accounts , Customer list


True/False
Question Insert statement can populate a table with records from another table.
Correct Answer True
Your Answer True


Select The Blank
Question The final phase of site building life cycle is ________.
Correct Answer Visual Design
Your Answer Page Layout


Multiple Choice Single Answer
Question Planning for scalability means
Correct Answer Capacity planning
Your Answer Capacity planning


Multiple Choice Multiple Answer
Question The delivery system of ecommerce purcahses has to depend on
Correct Answer Size of Product , Nature of Product , Urgency
Your Answer Size of Product , Nature of Product , Quantity


True/False
Question SQL statements can be used with higher level languages like Java,C++
Correct Answer True
Your Answer False


Multiple Choice Single Answer
Question The act of sending a message pretending to be authorized user is called as
Correct Answer Spoofing
Your Answer Swapping


True/False
Question All eBay auctions have a minimum bid increment.
Correct Answer True
Your Answer False


Multiple Choice Single Answer
Question Which one of the following is information selling on the web?
Correct Answer Online Publishing Site
Your Answer Online Publishing Site


Multiple Choice Single Answer
Question In composite query the basic requirement is
Correct Answer Join between two tables
Your Answer Similar records


Multiple Choice Multiple Answer
Question Broad Targeted Marketing include following ways
Correct Answer Chat Rooms , Thematic Web Sites , Portals
Your Answer Thematic Web Sites , Portals , Email


Select The Blank
Question Embedded Style Definitions are defined in the ________ section of the HTML file.
Correct Answer HEAD
Your Answer HEAD


Multiple Choice Multiple Answer
Question Secureware has designed a secure web platform utilizing three tiered architecture ,the three tiers are
Correct Answer Encryption technologies , Trusted Operating System , Firewalls
Your Answer Encryption technologies , Decryption Technologies , Firewalls


Match The Following
Question Correct Answer Your Answer

Secret data Existance is secret Blaocked data

Public data Protected from modification Restored data

Copyright data Content is not secret Protected from modification

Confidential data Content is secret Content is secret



True/False
Question EBT systems are designed to provide no cost or low cost access methods.
Correct Answer True
Your Answer True


True/False
Question Customers must have an account with central online bank in most digital cash systems
Correct Answer True
Your Answer True


Multiple Choice Single Answer
Question The banking which allows banks to set up retail branches on subscriber based online services is
Correct Answer Online Services Based Banking
Your Answer Online Services Based Banking


True/False
Question Company Information lets the potential online shopper know the sort of outfit of the eshop.
Correct Answer True
Your Answer True


True/False
Question Two mondex card holders can transfer cash between their cards over a telephone line.
Correct Answer True
Your Answer True


Multiple Choice Single Answer
Question Internet payments for items costing $1 or less than the lower threshold of credit card payments
Correct Answer Micropayments
Your Answer Micropayments


Multiple Choice Single Answer
Question A process of making information indeipherable except to those with a decoding key
Correct Answer Encryption
Your Answer Encryption


Select The Blank
Question ________ is a bits of information stored on a user's hard disk that identifies the user the next time he/she accesses the web site.
Correct Answer Cookies
Your Answer Cookies


Multiple Choice Multiple Answer
Question Select the three main advantages of smart card
Correct Answer portable , Contain encrypted information , Impossible for credit theft
Your Answer portable , Contain encrypted information , Smart cards accepted every where


Multiple Choice Multiple Answer
Question A trusted operating system provides
Correct Answer strong access controls , create virtual lockbox , protect against unauthoprized tampering with private account information
Your Answer strong access controls , create virtual lockbox , to limit access to the system form external networks


True/False
Question E-services give new dimension to original service
Correct Answer True
Your Answer True


Multiple Choice Single Answer
Question A home banking service in combination with a PC and modem and bank become an electronic gateway to customers and accounts is
Correct Answer Proprietary Bank dial up services
Your Answer Online Services based banking


Select The Blank
Question In working of digital signature private key is applied to a shorter form of data called ________.
Correct Answer Hash
Your Answer Abbreivation


Select The Blank
Question In ________ style sheets the style definitions are store in seprate file with extension CSS.
Correct Answer External
Your Answer Linked


Select The Blank
Question In Netscape's security socket layer the test of GET command and the text of HTML file are sent and received through connections called ________.
Correct Answer Sockets
Your Answer Sockets


Multiple Choice Single Answer
Question Which electronic tokens are issued by ecoin.net that can be used to pay for online goods?
Correct Answer Ecoins
Your Answer Ecoins


Multiple Choice Single Answer
Question The planning process for e-business include
Correct Answer Deciding about the products and services you want to sell
Your Answer Deciding about the products and services you want to sell


Multiple Choice Multiple Answer
Question Open Universities have moved into providing internet based version of course.The reason behind it is,
Correct Answer Clientbase outside their catchment is possible , Delivery of courses at reduced cost
Your Answer Clientbase outside their catchment is possible , Delivery of courses at reduced cost , Setup cost is reduced


Select The Blank
Question ________ means keeping a system or a business in a up-to-date state based on the initial design or plan.
Correct Answer maintainance
Your Answer Development


Select The Blank
Question ________ auction sites involve a customer selling an item to another customer through auction site.
Correct Answer C2C
Your Answer C2C


Multiple Choice Single Answer
Question Agile wallet secure electronic server was developed by :
Correct Answer Cybercash
Your Answer Cybercash


True/False
Question In hardened firewall host FTP ,Gopher services are located on firewall systems rather than being maintained on many systems.
Correct Answer True
Your Answer True

0 Comments:

An Appeal to SCDL students

Dear SCDL Student,

We at http://scdlpapers.blogspot.com tries to collect and spread the knowledge in terms of the solved papers and assignments which we are getting through SCDL Alumni.
Now we request you to help other students through mutual sharing. Please send your assignment questions/papers to "mindgrill@gmail.com" . We will publish them on this blog along with your name.
Your help can be boon for many students to clear their exams.

Best of Luck and waiting for your contributions.

Team @ MindGrill
 

Interview Preparation | Placement Papers