Search Papers On This Blog. Just Write The Name Of The Course

Thursday 9 December 2010

IT430- E-Commerce Midterm Past VU papers

MIDTERM EXAMINATION
Spring 2009
IT430- E-Commerce (Session - 4)

Question No: 1 ( Marks: 1 ) - Please choose one
In datalink layer, data packets are placed inside
► Data frames
► Data boxes
► Data streams
► None of these
Question No: 2 ( Marks: 1 ) - Please choose one
Which of these is the correct HTML code for creating a reset button?
Question No: 3 ( Marks: 1 ) - Please choose one
…..tag is used into …….tag because a row contains multi cells and to fill up
these cells with data.
► TD…… TR
► TR…… TD
► TD…… TG
► TG…… TR
Question No: 4 ( Marks: 1 ) - Please choose one
Individuals who write programs or manipulate technologies to gain unauthorized
access to computers and networks are --------------- .
► administrators
► experts
hackers
► coders
Question No: 5 ( Marks: 1 ) - Please choose one
Which tag is used for the hidden fields?
Question No: 6 ( Marks: 1 ) - Please choose one
What is a correct way of referring to a stylesheet called "mystyle.xsl" ?
► <?xml-stylesheet type="text/xsl" href="/mystyle.xsl" ?>
► <?stylesheet type="text/xsl" href="/mystyle.xsl" ?>
Question No: 7 ( Marks: 1 ) - Please choose one
Which of them is NOT a predefined object?
► Document
Date
Loop
► Array
Question No: 8 ( Marks: 1 ) - Please choose one
Which of these is not a comparison operator?
► <
► >
=
► !=
Question No: 9 ( Marks: 1 ) - Please choose one
Var d = new date()
Which of the following is correct about the d variable?
► instance of new
► instance of Date() method
instance of Date object
► Simple Variable
Question No: 10 ( Marks: 1 ) - Please choose one
When you declare a variable within a function, the variable can only be
accessed within that function. When you exit the function, the variable is
destroyed. These variables are called
Local Variables
► Global Variables
► Local and Global
► None of the above
Question No: 11 ( Marks: 1 ) - Please choose one
Which of the following , is condition part of given For loop
for (i = 0; i <= 5; i++).
► i=0.
► i++.
i<=5.
► (i = 0; i <= 5; i++).
Question No: 12 ( Marks: 1 ) - Please choose one
What is the correct JavaScript syntax to write "Virtual University of Paistan"?
document.write("Virtual University of Paistan ")
► ("Virtual University of Paistan ")
► " Virtual University of Paistan "
► response.write("Virtual University of Paistan ")
Question No: 13 ( Marks: 1 ) - Please choose one
Which of the following is NOT valid HTML code line?
► ,84%">
► ,84%">
► ,50%” rows=”16%,84%”>
Question No: 14 ( Marks: 1 ) - Please choose one
CSS is a breakthrough in Web design because it allows developers to control
the---------
► Processing speed on client side
► Data grid view on client side
► Style and layout of home page.
Style and layout of multiple Web pages
Question No: 15 ( Marks: 1 ) - Please choose one
Which HTML tag is used to define an internal style sheet?
Question No: 16 ( Marks: 1 ) - Please choose one
What is the correct HTML tag for adding a background color?
► yellow
► None
Question No: 17 ( Marks: 1 )
What does this mean?
padding-right
padding-right adds space to the right of the content
Question No: 18 ( Marks: 1 )
Do you agree or not that using Cascading Style Sheets one can apply an image
to sections of ones
page or even to individual words.
Yes! I agree, using CSS one can apply his/her defined design, image or
wording to muliple pages of his/her website.
Question No: 19 ( Marks: 2 )
Suppose, there is an applet at "http://www.vu.edu.pk/demo.class". Write the code
to include this applet in your web page.
Question No: 20 ( Marks: 3 )
What do you think, is there any difference between Static and Dynamic IP
Address assignment? Discuss.
Question No: 21 ( Marks: 5 )
What is cryptography? What techniques are used for cryptography?
Cryptography is the technique of converting a message into unintelligible
or non-understandable form such
that even if some unauthorized or unwanted person intercepts the message
he/she would still not be able to
make any sense out of it. Cryptography is thousands of years old.
Techniques used for cryptography Substitution In substitution we replace
each letter in the message with
another to make the message non-understandable. For example, each letter
“a” in the message can be
replaced with letter “d” and letter “b” with letter “e” and so on.
Transposition It is based on scrambling the
characters in a message. A transposition system may first write a message
into a table row by row then the
message can be read and rewritten column by column to make it
scrambled.
Question No: 22 ( Marks: 10 )
Analyze the following given code showing some Cascading Style Sheets
tags and explain its lines one by one.
<html>
<head>
h1 {text-decoration: overline}
h2 {text-decoration: line-through}
h3 {text-decoration: underline}
a {text-decoration: none}
<body>
This is header 1
This is header 2
This is header 3
http://www.allvupastpapers.blogspot.com/

No comments:

Post a Comment