IT430-E-Commerce From Midterm Papers (1 TO 22 Lectures)
IT430-E-Commerce From Midterm Papers (1 TO 22 Lectures)
OCT
Solved MCQ(S) 21,2016
From Midterm Papers (1 TO 22 Lectures)
BY Arslan Arshad
BS110401050 BS110401050@vu.edu.pk Arslan.arshad01@gmail.com AKMP01
<br> PG # 19
<lib>
<break>
<span>
3. In Style Sheets, how do you add a background color for all “<h1>” elements?
all.h1 {background-color:#FFFFFF}
h1.all {background-color:#FFFFFF}
h1{background-color:#FFFFFF}
h1{bgcolor:#FFFFFF}
4. what are the three methods for using style sheets with a webpage?
border-width: specifies the width of all borders in the order „border-top-width, border-right width, border-bottom-
width, border-left-width‟
6. Border-style: specifies the style of all borders in which of the following order?
border-style: specifies the style of all borders in the order „border-top-style, border-right style, border-bottom-style,
border-left-style‟
myArray=[0,1,2,3,4,5,6,7,8,9,10];
8. Which SQL statement is used to insert new data in a database?
ADD NEW
INSERT NEW
INSERT INTO PG # 83 ,84
ADD RECORD
We can use insert statement of SQL in order to insert certain data in a database.
Scrolling display PG # 37
Static display
Frame display
Panel display
Text that we put between <Marquee> and </Marquee> tags scrolls across the screen
String object PG # 70
Date object
Time object
Array object
The <img> tag defines an image in an HTML page. <img src="smiley.gif" alt="Smiley face" height="42" width="42">
<script=‟java‟>
<Javascript>
<script> PG # 57
<js>
Note we can embed JavaScript code/instructions in the plain HTML code with the help of <script> and </script> tags.
alert(string1 + string2);
123246
246
123123
Exception
16. ___________ specify the amount of space between the edges of the cell and the text inside.
SPACE TAG
CELLSPACING
FRAMESPACING
Cell padding is used for formatting purpose which is used to specify the space needed between the edges of the cells
and also in the cell contents.
Instance of object
Copy of object
18. _________ divides large network in small logical segments called subnets on basis of IP addresses.
Router PG # 15 & 16
Bridge
Repeater
Switches
19. ASP server scripts are surrounded by which delimiters?
<%...%> PG # 85
<%>...</%>
<&>…/<&>
ASP statements are contained within <% and %> which are called delimiters.
<%...%> PG # 85
<%>...</%>
<&>…/<&>
A variable
An object
A method
A function
22. Network addresses 128 - - - 191 range belongs to which of the following class network?
A
C
E
<img>image.gif</img>
To apply an image in html, use <img> tag. Also, use attribute „src‟ and keep the name of the image file as its value.
24. What is the correct HTML for making a hyperlink?
Hypertext links are used to connect HTML documents. Text can be links. Images can be links. Links can by used for
email also. An attribute „href‟ is used in anchor tag <A>, and its value is set as the URL of a web page or a file name
which is required to be opened by clicking the hyperlink. Content enclosed between <A> and </A> becomes clickable.
Equal to
Not
Equal
Not Equal PG # 58
Comparison operators
„==‟ for Equal
„!=‟ for not equal
„< „ for Less than
„<=‟ for less than equal
„>‟ for Greater than
‘>=’ for Greater than equal
26. Which one of the following object‟s properties and functions are accessible every where?
Global object PG # 67
Browser object
Window object
Predefined object
Child element
Root element PG # 76
<XML>
First line of the code is a declaration that it is an XML document (version 1). Second and last lines of the code are
called root element tags. We enclose other elements within the root element tags.
28. In given XML code, which of following element represents the highlighted node?
Property
Root PG # 76
Child
Nothing
special <applet> tag has been used to make a call for the applet code
30. What is the biggest factor slowing down the growth of e-commerce worldwide?
Internet bandwidth
Governments
Security PG # 93
Illiteracy
Security is the biggest factor slowing down the growth of e-commerce worldwide. For instance, when you enter your
credit card no. in a text box, it is potentially exposed to millions of people on the internet and can be misused. It is
important to know following terms in connection with the security threats over the internet.
31. If a web server is bombarded with thousands of HTTP request, that would be example of ______________.
sniffing
password attack
32. The „shape‟ attribute of <AREA> tag accepts the following values, EXCEPT
rect
circle
poly
square PG # 36
33. What is the correct HTML for referring to an external style sheet?
<stylesheet>mainstyle.css</stylesheet>
text-color:
color: PG # 42
text-color=
front-color:
4 layers PG # 6
7 layers
9 layers
Internet communication model (TCP/IP Stack) proposes a 4 layer architecture. Following are the names of internet
layers that map with the OSI model‟s layers:
Application layer is equivalent to OSI model‟s Application, Presentation and Session layers
Host-to-Host Layer is equivalent to OSI model‟s Transport layer
Internet layer is equivalent to OSI model‟s Network layer
Network Access layer is equivalent to OSI model‟s data link layer
37. The control statement on a while loop is tested _______
Before each time through the loop Click Here For More
while loop checks the condition/expression before the block is executed and do while loops check the
condition after the block is executed
<it>
<i> PG # 19
<italics>
<italic>
True
False PG # 45
Hypertext Markup Language was initially developed in America for military purposes. Now it is a popular tool for
creating web pages. It is a language of tags. It has a fixed vocabulary. It is not case sensitive.
40. DOS is a type of attack and its stands for:
Denial of Services
Efficient Working
Networking purpose
Internet Service
A firewall is a combination of hardware and software that sits between the internet and internal network of an
organization to protect the network from outside attack.
42. Which protocol is used for downloading messages to client machine from servers?
SMTP
POP3 PG # 18
IMAP
There are three protocols commonly used for emails. Simple Mail Transfer Protocol (SMTP) is used for sending email
messages between servers. In other words, it is used for message uploads. Post Office Protocol 3 (POP3) or Internet
Message Access Protocol (IMAP) can be used to retrieve messages. They should also be configured with SMTP. POP
is used to download email to the client machine from the server side and the message is deleted from the email server
after download. On the other hand, in case of IMAP the message is not deleted in the email server and thus can be
reopened from another location/machine.
43. What does the Target = “_top” tag perform?
Add text.
46. CSS can be defined for entire pages by simply adding what to the head section?
Class structure
Style definition
Script
XML
47. CSS can be defined for entire web site by simply writing the CSS definition in _________.
Int
Float
String
Null
In JavaScript null is "nothing". It is supposed to be something that doesn't exist. Unfortunately, in JavaScript, the data
type of null is an object.You can consider it a bug in JavaScript that type of null is an object. It should be null
3 Tier
N-Tier
1 Tier
2 Tier
50. Which of the following needs human action to execute?
Worm
Trojan horse
All of these
Viruses and Worms are malicious programs that can travel between computers as attachments on email or
independently over a network. These terms are sometimes used interchangeably; however, essentially, they are
different. Worms spread from computer to computer and having the capability to travel without any help or human
action.
Substitution cryptography
Transposition
Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt
data. The keys are simply large numbers that have been paired together but are not identical (asymmetric). One key in
the pair can be shared with everyone; it is called the public key. The other key in the pair is kept secret; it is called
the private key. Either of the keys can be used to encrypt a message; the opposite key from the one used to encrypt the
message is used for decryption.
Relative
Absolute
Static
Dynamic PG # 51
Position Property position: absolute – you can place the element box anywhere on the page
position: relative – position is relative to the normal position of the element
position: static – position remains unchanged
53. Which of the following is the correct place to refer an external style sheet in HTML document?
With an external style sheet, you can change the look of an entire website by changing just one file. Each page must
include a reference to the external style sheet file inside the <link> element. The <link> element goes inside the <head>
section:
<head>
<link rel="stylesheet" type="text/css" href="mystyle.css">
</head>
An external style sheet can be written in any text editor. The file should not contain any html tags. The style sheet file
must be saved with a .css extension.
54. The mode of business in which the process of buying, selling or exchanging of products is done via internet is
termed as _____________.
Internet banking
Traditional business
E-commerce
E-marketing
The process of buying, selling, or exchanging products, services, or information via computer networks
55. In star network features a central connection point called a “hub” which considers to be backbone of the star
topology.
True
False
56. HTML is abbreviation of:
Web documents are defined by the Hypertext Markup Language (HTML). It is a language of tags. A tag is a special
letter or key word enclosed in angular brackets.
Note: If you found any mistake in mcqz please mail at above mentioned email address.
And tell me your answer with references.