APRIL 2012 SUBJECT CODE:SEZ6B DEGREE:BCA SEMESTER:VI
SECTION A — (10 × 2 = 20 marks)
1. List down the Internet technology.
2. What are the additional applications of E-commerce?
3. What are the key aspects of EDI?
4. Write the goals of security.
5. What is SEPP and SET?
6. What is Telnet?
7. What is firewall?
8. Define hashing.
9. List down the types of active threats.
10. What are security strategies? List down.
11. What is digital signature?
12. Define MIME.
SECTION B — (5 × 5 = 25 marks)
13. Write down the applications of E-commerce.
14. What are the links are included in the web-based E-commerce?
15. What are the steps are included in SET?
16. What are the reasons for hackers? Explain.
17. Write short notes on ‘‘ On line electronic cash’’.
18. What are hacking techniques? Explain.
19. Write a note on payment processing.
SECTION C — (3 × 10 = 30 marks)
20. Explain the security issues and approaches related to web-commerce.
21. Explain about SEPP with its architecture.
22. Write a note on host based security.
23. Explain in detail about specific intruder approaches.
24. How does E-mail work? Explain with its technologies.
SECTION A — (10 × 2 = 20 marks)
1. List down the Internet technology.
2. What are the additional applications of E-commerce?
3. What are the key aspects of EDI?
4. Write the goals of security.
5. What is SEPP and SET?
6. What is Telnet?
7. What is firewall?
8. Define hashing.
9. List down the types of active threats.
10. What are security strategies? List down.
11. What is digital signature?
12. Define MIME.
SECTION B — (5 × 5 = 25 marks)
13. Write down the applications of E-commerce.
14. What are the links are included in the web-based E-commerce?
15. What are the steps are included in SET?
16. What are the reasons for hackers? Explain.
17. Write short notes on ‘‘ On line electronic cash’’.
18. What are hacking techniques? Explain.
19. Write a note on payment processing.
SECTION C — (3 × 10 = 30 marks)
20. Explain the security issues and approaches related to web-commerce.
21. Explain about SEPP with its architecture.
22. Write a note on host based security.
23. Explain in detail about specific intruder approaches.
24. How does E-mail work? Explain with its technologies.
No comments:
Post a Comment