NIELIT Question Paper : B Level Course E-Business
Institute : National Institute of Electronics and Information Technology (nielit.gov.in)
Course : B Level Course
Subject Code/Name : BE3-R4/ E-Business
Document Type : Old Question Paper
Location : India
Website : nielit.gov.in
Download Model/Sample Question Paper :
January 2012 : https://www.pdfquestion.in/uploads/nielit.in/7095-jan12BE3-R4.pdf
JULY 2012 : https://www.pdfquestion.in/uploads/nielit.in/7095-jul12BE3-R4.pdf
January 2013 : https://www.pdfquestion.in/uploads/nielit.in/7095-jan13BE3-R4.pdf
JULY 2013 : https://www.pdfquestion.in/uploads/nielit.in/7095-jul13BE3-R4.pdf
January 2014 : https://www.pdfquestion.in/uploads/nielit.in/7095-jan14BE3-R4.pdf
July 2014 : https://www.pdfquestion.in/uploads/nielit.in/7095-jul14BE3-R4.pdf
E-Business Sample Paper :
BE3-R4:
NOTE:
Time: 3 Hours
Total Marks: 100
1. a) Explain the impact of e-commerce on business models.
Related : NIELIT Question Paper B Level Course Embedded Systems : www.pdfquestion.in/7094.html
b) What do you understand by URL?
c) Explain Hyper Text Transfer Protocol.
d) Explain the secure socket layer.
e) Distinguish between public and private keys.
f) What is E-retailing? Explain.
g) What are the threats to E-commerce security? (7×4)
2. a) Explain the constraints in growth of E-commerce.
b) How does business to consumer (B2C) model work? Explain. (8+10)
3. a) Explain the Internet protocol suite.
b) Describe the client server architecture. (9+9)
4. a) Explain the following:
i) Pure business model
ii) Brick & Click model
b) What do you understand by Launching business on internet? ([5+5]+8)
5. a) Describe the packet filtering firewall.
b) Explain the following:
i) SET protocols
ii) Micro payment systems (8+[5+5])
6. a) Describe the advantages and disadvantages of on-line banking.
b) What is RSA? Explain the RSA encryption algorithm. (9+9)
7. a) Describe the consumer to consumer e-business model.
b) Explain the objectives of E-commerce security infrastructure. (9+9)
1. Answer question 1 and any FOUR from questions 2 to 7.
2. Parts of the same question should be answered together and in the same sequence.
E-BUSINESS :
NOTE:
Time: 3 Hours
Total Marks: 100
1. a) Differentiate between Applet and servlet with an example.
b) What is a payment gateway? How it works?
c) List and explain various drivers of e-business.
d) Explain the significance of Tort Law with reference to internet.
e) What is IP Spoofing?
f) What is encryption? What all online activities can use encryption?
g) Wh at is a SET protocol? Explain its features.(7×4)
2. a) Explain the role of firewall in securing organizational data. Further list and explain characteristics of various types of firewalls.
b) Explain the process of domain name dispute resolution. (12+6)
3. a) Explain how Secure Socket Layer (SSL) protocol ensures secure data transport service for application layer protocol.
b) Explain the process of hierarchical digital certificate system. (12+6)
4. What is e-retailing? How is this different from traditional retailing? Discuss various models for e-retailing with examples. (18)
5. What is a digital signature? Explain various steps involved in generation and verification of digital signature in detail. (18)
6. a) What are the steps involved in the process of using e-cash as payment method over the internet. Explain it with an example.
b) Define various types of e-auctions and list their characteristics. (10+8)
7. You are an owner of book store and now, due to increasing competition, you also want to give customer an option to purchase books online from your store. Discuss various activities you need to perform in different phases involved in launching this business on internet. (18)
BE3-R4: E-Business Jan 2013 :
1. a) Explain the methods that are used to protect against online piracy.
b) Explain the difference between Internet and World Wide Web.
c) Identify the Key components of C2C model and explain their usage in e-business.
d) What is meant by Payment gateway? List the specific tasks that are performed by a payment gateway.
e) Explain the importance of SET protocol in the context of e-business transactions.
f) Identify and explain the tools that are used to establish secure internet communication channels.
g) Distinguish between maintenance and enhancement. Which one assures compliance with the original plan for launching online business? (7×4)
2. a) Describe the Strategizing phase for launching on-line retailing business by a middle level business organization with suitable examples.
b) While designing a web store front, what factors, constraints or parameters would you consider? Explain. (12+6)
3. a) Specify and explain the types of actions that are meant to cause infringement of trademark laws in Internet commerce.
b) Describe the various types of firewalls, the functions they perform and the kind of internet security they provide. (9+9)
4. a) Discuss the factors that account for slow growth of online e-retailing business in B2C segment.
b) Describe the components and features of online education services that are provided using internet infrastructure. (9+9)
5. a) Describe the key dimensions of e-business security. Explain the measures that are used to design e-business security to protect against any of the e-business security threats.
b) What do you understand by Digital Certificate? Describe its key components and their importance in creating and maintaining public key infrastructure. (9+9)