0% found this document useful (0 votes)
82 views19 pages

IT430-E-Commerce From Midterm Papers (1 TO 22 Lectures)

The document provides solved multiple choice questions (MCQs) from midterm papers for the IT430 - E-Commerce course covering lectures 1 to 22. There are 29 MCQs with explanations provided for each answer. The MCQs cover topics like HTML tags, CSS stylesheets, JavaScript arrays and functions, SQL statements, networking concepts, and more. The document is authored by Arslan Arshad and provides contact information.

Uploaded by

Umer Farooq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views19 pages

IT430-E-Commerce From Midterm Papers (1 TO 22 Lectures)

The document provides solved multiple choice questions (MCQs) from midterm papers for the IT430 - E-Commerce course covering lectures 1 to 22. There are 29 MCQs with explanations provided for each answer. The MCQs cover topics like HTML tags, CSS stylesheets, JavaScript arrays and functions, SQL statements, networking concepts, and more. The document is authored by Arslan Arshad and provides contact information.

Uploaded by

Umer Farooq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

IT430- E-COMMERCE

OCT
Solved MCQ(S) 21,2016
From Midterm Papers (1 TO 22 Lectures)
BY Arslan Arshad
BS110401050 BS110401050@vu.edu.pk Arslan.arshad01@gmail.com AKMP01

IT430 - E-COMMERCE Midterm Papers Solved MCQ(S) (1 TO 22 Lectures)

1. What is the correct HTML tag for inserting a line break?

 <br> PG # 19
 <lib>
 <break>
 <span>

<br> tag is used to provide a line break.


2. If we leave out the target attribute in frame tag and link was clicked, the document loads into the window
_______.

 In the same page.


 In other blank page.
 Will display browser error.
 Will open in new window

The target attribute specifies where to open the linked document.


Attribute Values and description:
_blank: Opens the linked document in a new window or tab
_self : Opens the linked document in the same frame as it was clicked (this is default)
_parent : Opens the linked document in the parent frame
_top: Opens the linked document in the full body of the window

3. In Style Sheets, how do you add a background color for all “<h1>” elements?

 all.h1 {background-color:#FFFFFF}
 h1.all {background-color:#FFFFFF}
 h1{background-color:#FFFFFF}
 h1{bgcolor:#FFFFFF}

4. what are the three methods for using style sheets with a webpage?

 Dreamweaver, GoLive and FrontPage


 Inline, embedded or document level and external
 User-defined, Hard-coded and Machine-generated
 Styling, Markup and embedded method
5. Border-width: specifies the width of all borders in which of the following order?

 „border-right-width, border-bottom-width, border-left-width, border-top-width‟


 „border-bottom-width, border-left-width, border-top -width, border-right-width‟
 „border-top-width, border-right-width, border-bottom -width, border-left-width‟
 „border-bottom-width, border-right-width, border-top -width, border-left-width‟

border-width: specifies the width of all borders in the order „border-top-width, border-right width, border-bottom-
width, border-left-width‟

6. Border-style: specifies the style of all borders in which of the following order?

 „border-top-style, border-right- style, border-bottom-style, border-left-style‟ PG # 50


 „border-right-style, border-bottom-style, border-left-style, border-top-style‟
 „border-left-style, border-top-style, border-right-style, border-bottom-style‟
 „border-right-style, border-left-style, border-top-style, border-bottom-style‟

border-style: specifies the style of all borders in the order „border-top-style, border-right style, border-bottom-style,
border-left-style‟

7. In JavaScript you can reference an entry in an array using _________.


 myarray (entry)
 myarray [entry] PG # 67
 myarray {entry}
 myarray <entry>

myArray=[0,1,2,3,4,5,6,7,8,9,10];
8. Which SQL statement is used to insert new data in a database?

 ADD NEW
 INSERT NEW
 INSERT INTO PG # 83 ,84
 ADD RECORD

We can use insert statement of SQL in order to insert certain data in a database.

9. IIS stands for ______.

 International Information Service

 Internet Information Server PG # 85

 Internet Information Standards

 Internet Information Service

10. <MARQUEE ...> tag creates a ___________.

 Scrolling display PG # 37

 Static display

 Frame display

 Panel display

Text that we put between <Marquee> and </Marquee> tags scrolls across the screen

11. charAt( ) is the function/method of ____________.

 String object PG # 70
 Date object
 Time object
 Array object

charAt() is the function/method of string object.


12. Which is the correct syntax to display images in HTML specification?

 <PIC src = “Picture file name”>

 <IMG src = “Picture file name”> Click here For More

 <GIF src = “Picture file name”>

 <PIC name= “Picture file name”>

The <img> tag defines an image in an HTML page. <img src="smiley.gif" alt="Smiley face" height="42" width="42">

13. To insert a JavaScript into an HTML page, which tag is used?

 <script=‟java‟>
 <Javascript>
 <script> PG # 57
 <js>

Note we can embed JavaScript code/instructions in the plain HTML code with the help of <script> and </script> tags.

14. Consider the following code

var string1 =”123”;

var string2 =”123”;

alert(string1 + string2);

 123246
 246
 123123
 Exception

Because in variable type is string It cannot add. It will do concatenation


15. Which of these is the correct HTML code for creating a reset button?

 <input type = “button” name = “reset” value = “reset”>

 <input type = “resetButton” value = “clear”>

 <input type = “reset” value = “reset”> PG # 26

 <input type = “button” name = “reset” value = “clear”>

16. ___________ specify the amount of space between the edges of the cell and the text inside.

 SPACE TAG

 CELLSPACING

 CELLPADDING Click Here for More

 FRAMESPACING

Cell padding is used for formatting purpose which is used to specify the space needed between the edges of the cells
and also in the cell contents.

17. Constructor defined as the initializing function used to create __________.

 Instance of object

 Copy of object

 Instance / copy of object PG # 69

 Shallow copy of object

18. _________ divides large network in small logical segments called subnets on basis of IP addresses.

 Router PG # 15 & 16

 Bridge

 Repeater

 Switches
19. ASP server scripts are surrounded by which delimiters?

 <script>…</ script >

 <%...%> PG # 85

 <%>...</%>

 <&>…/<&>

ASP statements are contained within <% and %> which are called delimiters.

20. ASP server scripts are surrounded by delimiters, which?

 <script>…</ script >

 <%...%> PG # 85

 <%>...</%>

 <&>…/<&>

21. An array in JavaScript language is _____________.

 A variable

 An object

 A method

 A function
22. Network addresses 128 - - - 191 range belongs to which of the following class network?

 A

 B Click here for more

 C

 E

23. What is the correct HTML for inserting an image?

 <image src = “image.gif>

 <img src = “image.gif> PG # 21

 <img href = “image.gif>

 <img>image.gif</img>

To apply an image in html, use <img> tag. Also, use attribute „src‟ and keep the name of the image file as its value.
24. What is the correct HTML for making a hyperlink?

 < a href = “http://www.w3school.com”>W3Schools</a> PG # 23

 < a name = “http://www.w3school.com”>W3Schools.com</a>

 < a url = “http://www.w3school.com”>W3Schools.com</a>

 < a> http://www.w3school.com </a>

Hypertext links are used to connect HTML documents. Text can be links. Images can be links. Links can by used for
email also. An attribute „href‟ is used in anchor tag <A>, and its value is set as the URL of a web page or a file name
which is required to be opened by clicking the hyperlink. Content enclosed between <A> and </A> becomes clickable.

25. What does mean by != comparison operator?

 Equal to

 Not

 Equal

 Not Equal PG # 58

Comparison operators
„==‟ for Equal
„!=‟ for not equal
„< „ for Less than
„<=‟ for less than equal
„>‟ for Greater than
‘>=’ for Greater than equal

26. Which one of the following object‟s properties and functions are accessible every where?

 Global object PG # 67

 Browser object

 Window object

 Predefined object

Global object is an object with globally-accessible variables/properties and functions


27. In XML, in which of following element tag, other element or enclosed

 Child element

 Root element PG # 76

 <?xml version =”1.0”?>

 <XML>

First line of the code is a declaration that it is an XML document (version 1). Second and last lines of the code are
called root element tags. We enclose other elements within the root element tags.

28. In given XML code, which of following element represents the highlighted node?

<?xml version =”1.0”?>


<note>
<to>Mr.Riaz</to>
<from>Aamer</from>

 Property

 Root PG # 76

 Child

 Nothing

29. Which of the following is NOT true about Applets?

 Applets are compiled java programs

 Applet code is send from server to the browser for processing

 <script> tag is used to make a call for the applet code PG # 79

 Typically applets take more space on the window screen

special <applet> tag has been used to make a call for the applet code
30. What is the biggest factor slowing down the growth of e-commerce worldwide?

 Internet bandwidth

 Governments

 Security PG # 93

 Illiteracy

Security is the biggest factor slowing down the growth of e-commerce worldwide. For instance, when you enter your
credit card no. in a text box, it is potentially exposed to millions of people on the internet and can be misused. It is
important to know following terms in connection with the security threats over the internet.

31. If a web server is bombarded with thousands of HTTP request, that would be example of ______________.

 sniffing

 password attack

 man in the middle attack

 denial of service attack PG # 95

32. The „shape‟ attribute of <AREA> tag accepts the following values, EXCEPT

 rect

 circle

 poly

 square PG # 36

33. What is the correct HTML for referring to an external style sheet?

 <link rel = “stylesheet” type =”text/css” href = ”mainstyle.css”> PG # 39

 <style src = “mainstyle.css”>

 <stylesheet>mainstyle.css</stylesheet>

 <link url = “stylesheet” type =”text/css” href = ”mainstyle.css”>


34. In Style Sheets, how do you change the text color of an element?

 text-color:

 color: PG # 42

 text-color=

 front-color:

35. http://cs.vu.edu is an example of

 Two zone domain name

 Three zone domain name

 Four zone domain name

 Five zone domain name

36. TCP/IP consists of ___________

 4 layers PG # 6

 7 layers

 9 layers

 None of the given

Internet communication model (TCP/IP Stack) proposes a 4 layer architecture. Following are the names of internet
layers that map with the OSI model‟s layers:

Application layer is equivalent to OSI model‟s Application, Presentation and Session layers
Host-to-Host Layer is equivalent to OSI model‟s Transport layer
Internet layer is equivalent to OSI model‟s Network layer
Network Access layer is equivalent to OSI model‟s data link layer
37. The control statement on a while loop is tested _______

 Before each time through the loop Click Here For More

 after each time through the loop

 once at the start

 once at the end

while loop checks the condition/expression before the block is executed and do while loops check the
condition after the block is executed

38. Choose the correct HTML tag to make a text italic:

 <it>

 <i> PG # 19

 <italics>

 <italic>

-<i> and </i> are used for italic text.

39. HTML is a case sensitive language.

 True

 False PG # 45

Hypertext Markup Language was initially developed in America for military purposes. Now it is a popular tool for
creating web pages. It is a language of tags. It has a fixed vocabulary. It is not case sensitive.
40. DOS is a type of attack and its stands for:

 Denial of Services

 Digital Operation Services

 Dynamic Object Solution

 Dynamics Object Services

Denial of services (DOS) attacks


In this type of attack, the attacker gains access to the network and then send invalid data to network services or
applications. These services or applications consequently become unable to perform their normal tasks or functions.

41. Firewall is used for ___________

 Efficient Working

 Protection against security attacks PG # 96

 Networking purpose

 Internet Service

A firewall is a combination of hardware and software that sits between the internet and internal network of an
organization to protect the network from outside attack.

42. Which protocol is used for downloading messages to client machine from servers?

 SMTP

 POP3 PG # 18

 IMAP

 POP3 and IMAP

There are three protocols commonly used for emails. Simple Mail Transfer Protocol (SMTP) is used for sending email
messages between servers. In other words, it is used for message uploads. Post Office Protocol 3 (POP3) or Internet
Message Access Protocol (IMAP) can be used to retrieve messages. They should also be configured with SMTP. POP
is used to download email to the client machine from the server side and the message is deleted from the email server
after download. On the other hand, in case of IMAP the message is not deleted in the email server and thus can be
reopened from another location/machine.
43. What does the Target = “_top” tag perform?

 Loads the new page into the same frame

 Loads the new page into the entire window

 Loads the new page into a new browser window

 All of the above

Target=“_top” - loads the new page into the entire window

44. Which of the following is NOT an advantage of CSS?

 Works on version 4 browser or newer

 Define the look of your page in one place

 Easily change the look

 Implement same formatting each time tage is used.

45. Which would you NOT be able to do with CSS ?

 Add text.

 Change the background color.

 Position the content.

 Define the look of your pages in one place.

46. CSS can be defined for entire pages by simply adding what to the head section?

 Class structure

 Style definition

 Script

 XML
47. CSS can be defined for entire web site by simply writing the CSS definition in _________.

 Body section of each page

 Plain text document

 head section of each page

 top of the page

48. Which of the following is not the Date types in JavaScript?

 Int

 Float

 String

 Null

In JavaScript null is "nothing". It is supposed to be something that doesn't exist. Unfortunately, in JavaScript, the data
type of null is an object.You can consider it a bug in JavaScript that type of null is an object. It should be null

49. We can divide the client Server architecture up to:

 3 Tier

 N-Tier

 1 Tier

 2 Tier
50. Which of the following needs human action to execute?

 Virus Click Here For More Detail

 Worm

 Trojan horse

 All of these

Viruses and Worms are malicious programs that can travel between computers as attachments on email or
independently over a network. These terms are sometimes used interchangeably; however, essentially, they are
different. Worms spread from computer to computer and having the capability to travel without any help or human
action.

51. Asymmetric cryptography is also called _________.

 Public key cryptography

 Private key cryptography

 Substitution cryptography

 Transposition

Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt
data. The keys are simply large numbers that have been paired together but are not identical (asymmetric). One key in
the pair can be shared with everyone; it is called the public key. The other key in the pair is kept secret; it is called
the private key. Either of the keys can be used to encrypt a message; the opposite key from the one used to encrypt the
message is used for decryption.

52. Which of the following is NOT supported by position property?

 Relative

 Absolute

 Static

 Dynamic PG # 51

Position Property position: absolute – you can place the element box anywhere on the page
position: relative – position is relative to the normal position of the element
position: static – position remains unchanged
53. Which of the following is the correct place to refer an external style sheet in HTML document?

 In the <body> section

 At the end of the document

 In the <head> section Click here for more detail

 At the top of the document

With an external style sheet, you can change the look of an entire website by changing just one file. Each page must
include a reference to the external style sheet file inside the <link> element. The <link> element goes inside the <head>
section:
<head>
<link rel="stylesheet" type="text/css" href="mystyle.css">
</head>
An external style sheet can be written in any text editor. The file should not contain any html tags. The style sheet file
must be saved with a .css extension.

54. The mode of business in which the process of buying, selling or exchanging of products is done via internet is
termed as _____________.

 Internet banking

 Traditional business

 E-commerce

 E-marketing

The process of buying, selling, or exchanging products, services, or information via computer networks

55. In star network features a central connection point called a “hub” which considers to be backbone of the star
topology.

 True

 False
56. HTML is abbreviation of:

 Hyper Text Marked Language

 Hyper Text Markup Language PG # 18

 Hyper Text Member license

 Hyper Text Member Language

Web documents are defined by the Hypertext Markup Language (HTML). It is a language of tags. A tag is a special
letter or key word enclosed in angular brackets.

Note: If you found any mistake in mcqz please mail at above mentioned email address.
And tell me your answer with references.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy