Looking for May 2015 GITAM University Question Paper for E-BUSINESS paper? Download it here now,
GITAM University Question Paper
[CUDCO-303A]
B.Com. Degree Examination
III YEAR
E-BUSINESS
(Effective from the admitted batch 2012-13)
Time: 3 Hours
Max.Marks: 70
Instructions: All parts of the unit must be answered in one place only. Figures in the right hand margin indicate marks allotted.
Answer the following questions
1) C 2 G ________
a) Business to Government b) Business to Business
c) Customer to Government d) Business to Customer
2) It belongs to Wholesale Trader
a) B 2 C b) B 2 G c) B 2 B d) G 2 B
3) Data is converted into coding
a) Authentication b) Firewall c) Encryption d) Virtual Private Network
4) E-Commerce site –
a) E-T.V.com b) Pogo.com c) Blogger.com d) Amazon.com
5) Which type deals with auction?
a) B 2 B b) B 2 C c) C 2 B d) C 2 C
6) E-Banking is also known as _____ F
a) A.T.M. b) Net Banking c) Traditional Banking d) None of these
7) Who protects system from external threats?
a) Firewall b) E.R.P. c) E.D.I d) Script Kiddies
8) Secret key is used for ____
a) Public key b) Private key c) Permits Traffic d) None of these
GITAM University Question Paper
[CUDCO-303A]
B.Com. Degree Examination
III YEAR
E-BUSINESS
(Effective from the admitted batch 2012-13)
Time: 3 Hours
Max.Marks: 70
Instructions: All parts of the unit must be answered in one place only. Figures in the right hand margin indicate marks allotted.
Answer the following questions
1) C 2 G ________
a) Business to Government b) Business to Business
c) Customer to Government d) Business to Customer
2) It belongs to Wholesale Trader
a) B 2 C b) B 2 G c) B 2 B d) G 2 B
3) Data is converted into coding
a) Authentication b) Firewall c) Encryption d) Virtual Private Network
4) E-Commerce site –
a) E-T.V.com b) Pogo.com c) Blogger.com d) Amazon.com
5) Which type deals with auction?
a) B 2 B b) B 2 C c) C 2 B d) C 2 C
6) E-Banking is also known as _____ F
a) A.T.M. b) Net Banking c) Traditional Banking d) None of these
7) Who protects system from external threats?
a) Firewall b) E.R.P. c) E.D.I d) Script Kiddies
8) Secret key is used for ____
a) Public key b) Private key c) Permits Traffic d) None of these
0 comments:
Pen down your valuable important comments below