Wednesday, August 11, 2010

HOLY RAMAZAN MUBARAK

Dear students/visitors,

HAPPY RAMAZAN TO ALL OF U and lot of BEST WISHES AND PRAYERS FOR ALL OF U.

PLEASE REMEMBER us in your PRAYERS.

Thanks

VUsolutions HelpDesk..

HOLY RAMAZAN MUBARAK

Dear students/visitors,

HAPPY RAMAZAN TO ALL OF U and lot of BEST WISHES AND PRAYERS FOR ALL OF U.

PLEASE REMEMBER us in your PRAYERS.

Thanks

VUsolutions HelpDesk..

Tuesday, August 10, 2010

Reality Behind Air Blue Crash - VUsolutions


click on image for LARGE VIEW

click on image for LARGE VIEW

Reality Behind Air Blue Crash - VUsolutions


click on image for LARGE VIEW

click on image for LARGE VIEW

For LATEST assignments'/GDBs/Quizzes solutions, DOWNLOAD our FREE toolbar

Click the image for LARGE view


To get promptly LATEST current assignments/Quizzes/GDBs solutions, Click the following link to FREE download our TOOLBAR
http://vusolutions1.ourtoolbar.com/ 

For LATEST assignments'/GDBs/Quizzes solutions, DOWNLOAD our FREE toolbar

Click the image for LARGE view


To get promptly LATEST current assignments/Quizzes/GDBs solutions, Click the following link to FREE download our TOOLBAR
http://vusolutions1.ourtoolbar.com/ 

Sunday, August 8, 2010

IT430 Final Paper 2010

FINAL TERM  EXAMINATION
Spring 2010
IT430- E-Commerce (Session - 1)
Time: 90 min
Marks: 60
Question No: 1    ( Marks: 1 )    - Please choose one
 JIT Stands for
 Just In Tim
 Joint investigation Technique
 Join in Training
 Just In Total
Page 147 :For instance, packaging material should only be ordered for just in time (JIT) delivery,
Question No: 2    (Marks: 1)    - Please choose one
 JIT concept means
 No distribution channel
 No warehousing
 Easily delivery
 No communicatio
Question No: 3    ( Marks: 1 )    - Please choose one
Press release can provide information about current events and news to, which of following, via a internet?
 Print media
 T.v commercial
 Press or media
 T.v program.
Page 135: Press releases can provide information about current events and other important news to the press or media via internet.

Question No: 4    ( Marks: 1 )    - Please choose one
Visitor’s location, IP address, time of visit related information are added, in which of the following
 call handling files
 cookies
 log files
 Data mining files.
Page 136: Log files consist of data generated by site visits and include information about each visitor’s location.
Question No: 5    ( Marks: 1 )    - Please choose one
 FSTC stands for:
 Financial Services Technology Consortium
  Financial Secrets Technology Consortium
 Final Security threats control
 First Service Technology Consortium
Page 113: Financial Services Technology Consortium (FSTC) is a group of U.S banks, research agencies and government organizations formed in 1993.
Question No: 6    ( Marks: 1 )    - Please choose one
 Downstream activities relate to?
  Materials/services or the input from suppliers
 Manufacturing and packaging of goods
 Distribution and sale of goods to distributors/customers
 Manufacturing and Distribution
 Page 155: Downstream activities relate to distribution and sale of goods to distributors/customers  
Question No: 7    ( Marks: 1 )    - Please choose one
 The process of taking active role in working with suppliers to improve products and processes is called?
  Value chain management
 Supply chain management
 Supply chain management software
 Porter Model
 Page 155: The process of taking active role in working with suppliers to improve products and processes is called supply chain management.Today, firms are reaching beyond limits of their own organizational structure.  
Question No: 8    ( Marks: 1 )    - Please choose one
 Porter’s Model helps a firm to identify threats to its competitive position and to devise plans including the use of IT and e-commerce to protect or enhance that position.
  True
 False
 Page 158 : Porter’s Model helps a firm to identify threats to its competitive position and to devise plans including the use of IT and e-commerce to protect or enhance that position.

Question No: 9    ( Marks: 1 )    - Please choose one
 Which of the following is NOT force of Porter’s  competitive  rivalry  Model?
  Threat of potential/new entrants
 Threat of substitute
 Differentiation  and cost leadership
 Competition between existing players
 Page 158: force of Porter’s competitive
  • Threat of potential/new entrants to the sector
  • Threat of substitute product or service in the existing trade
  • Bargaining power of the buyers
  • Bargaining power of the suppliers
  • Competition between existing players

 Question No: 10    ( Marks: 1 )    - Please choose one
ANSI stands for ……….
  American National Standards Institute
 All Network Standards Institute
 American New standards Institute
 Australia National standards Institute
Page 147: ANSI (American National Standards Institute)

Question No: 11    ( Marks: 1 )    - Please choose one
 Company collecting information assumes that the customer does not object to a specific use of information unless the customer specifically denies the permission. Thus, the company may use the collected information for its own purpose, as well as, sell or rent it out to other firms or persons. Which of the following Approach it is using?
  Opt-inout
 Opt-out
 Swap-out
 Opt-in
Question No: 12    ( Marks: 1 )    - Please choose one
An address represented by four decimal numbers separated by a period is the
   IP
 RIP
 MAC
 None of the given
 Page no 7: IP addressing
It is the logical addressing scheme used to identify computer machines on the internet. Each computer has a unique IP address provided by IP protocol for a given session. It is represented by four decimal numbers separated by a period e.g, 140.57.220.200 (see Fig. 5 below). Computers see this information as a stream of 32 bits.
Question No: 13    ( Marks: 1 )    - Please choose one
 Who is making the Web standards?
  International Standard Organization
 ANSI
 Microsoft
 The World Wide Web Consortium
Page 74: World Wide Web Consortium (W3C), a non-profit organization that maintains standards for the web presented the draft of XML in late 1990’s.
Question No: 14    ( Marks: 1 )    - Please choose one
Individuals who write programs or manipulate technologies to gain unauthorized access to computers and networks are --------------- .
 administrators
 experts
 hackers
 coders
Page 94: Hackers Hackers or crackers are those individuals who write programs or manipulate technologies to gain unauthorized access to computers and networks.
Question No: 15    ( Marks: 1 )    - Please choose one
 The process of scrambling a message with the help of a key is called -------------- .
 Cryptography
 Filtering
 Transposition
 Encryption
Page 100: The process of scrambling a message with the help of a key is called Encryption.
Question No: 16    ( Marks: 1 )    - Please choose one
 Which of the following is NOT supported by position property?
 Relative
 absolute
 static
 dynamic
Question No: 17    ( Marks: 1 )    - Please choose one
 JavaScript variables can begin with ----------- .
  a lower case letter
 an underscore character
 a dollar sign
 all of the above
 Page 54: Variable names can begin with an uppercase letter (A-Z), lower case letter (a-z), an underscore character (_), or dollar sign ($). Remaining characters can be any of the above or from digits (0-9). In JavaScript variables are case sensitive.
Question No: 18    ( Marks: 1 )    - Please choose one
 Symmetric algorithms are faster than asymmetric.
  True
 False
Page 105: The advantage of using symmetric key is that since symmetric algorithms are faster as compared to asymmetric,
Question No: 19    ( Marks: 1 )    - Please choose one
SET doesn’t require special software on the client or merchant side.
 True
 False
Question No: 20    ( Marks: 1 )    - Please choose one
Which e-business helps to improve policies, procedures, customer services, and general operations of other businesses?
 Online shopping malls.
 Selling intellectual property online.
 Online service providers.
 Online automotive sites and energy online.
Page 129: Online Service Providers e-businesses help improve policies, procedures, customer service and general operations of other businesses. They can provide consultancy/professional services, for example, web site development services, online legal consultancy services etc.
Question No: 21    ( Marks: 1 )    - Please choose one
 Choose which one is a very critical element in supply chain management in an E-commerce environment.
 Transaction
 Communication
 None of the given
 All of the given
Page 155: Internet is a very quick and effective tool of communication. On the other hand, communication is also a very critical element in supply chain management.
Question No: 22    ( Marks: 1 )    - Please choose one
Established ----------- can build trust for online business more quickly as compared to a new company/business without reputation
 Brand
 Language
 Culture
 Infrastructure
 Page 161: Note that companies with established brands can build trust for online business more quickly as compared to a new company/business without reputation, since a brand conveys expectations about how the online business would behave.
Question No: 23    ( Marks: 1 )    - Please choose one
 -------------means services in relation to the transformation of contents of an electronic
document from its original form to one that cannot be understood or decoded by any unauthorized person
  Cryptography services
 Accredited Certification Service Provider
 Originator
 Addressee
 Page 163: “‘Cryptography services’ means services in relation to the transformation of contents of an electronic document from its original form to one that cannot be understood or decoded by any unauthorized person”.
Question No: 24    ( Marks: 1 )    - Please choose one
Choose the right one that which organization based in Switzerland is one such arbitration service provider nominated under the UDRP.
  WITO
 WIPO
 MIPO
 MITO
Page 182: World Intellectual Property Organization (WIPO) based inSwitzerland is one such arbitration service provider nominated under the UDRP.
Question No: 25    ( Marks: 1 )    - Please choose one
 ------------- wrong is an act deemed by law to be harmful to the society in general such as theft or murder etc. and the state itself is a party in such matters.
 Criminal
 Civil
 Plentiful
 None
Page 176: criminal wrong (crime) is an act deemed by law to be harmful to the society in
general such as theft or murder etc. and the state itself is a party in such matters.
Question No: 26    ( Marks: 1 )    - Please choose one
 Why we use reset tag in HTML?
 To remove the text written in Notepad.
 To remove the text written in between and tag.
 To remove the text written in between and tag.
 To remove the text written in between
and
tag.

Question No: 27    ( Marks: 1 )    - Please choose one
If we apply hash function on any message the message will become message digest. Can we get original message by applying hash function again on message digest?
 Yes
 No
Page 103: A hash function is said to be one way because we cannot go back to the original text on applying the hash function to a message digest.
 Question No: 28    ( Marks: 1 )    - Please choose one
 The process of key search attack is driving private key from _____.
 Public key
 Symmetric key
 Asymmetric key
 Private key
Page 108: The public key and its corresponding private key are linked with each other with the help of a large composite number. These attacks attempt to derive the private key from its corresponding public key using that number.
Question No: 29    ( Marks: 1 )    - Please choose one
 In e-cash system which type of encryption is used?
 a) Symmetric
 b) Asymmetric
 Both a&b
 None
Page 118 : The request is encrypted with a symmetric key and that symmetric key is encrypted with the public key of the bank, thus creating a secure envelope.
 Question No: 30    ( Marks: 1 )    - Please choose one
Brand marketing is related to the barrier
  Language Barrier
 Cultural
 Lack of Trust
 Network Barrier
Question No: 31    ( Marks: 2 )
What is Competition between existing players?.
Competition within businesses to get more customers and trade at a price that produces a satisfactory profit. If there are lots of players of the same size, capacity and strategy having little difference between their goods, then there is fierce competition among them as regards the price of the goods.
 Question No: 32    (Marks: 2 )
 What is the use of CRC in communication over the network?
Cyclical Redundancy Check (CRC), help us to confirm integrity of data frames.
Question No: 33    ( Marks: 2 )
 What is the Key difference between the B2C and B2B?
B2C stands for Business-to-Consumer and deals between electronic markets to consumer (end user) directly e.g. Amazon.com, while B2B is Business-to-Business and make bridge between two or more organization.
Question No: 34    ( Marks: 2 )
What is meant by online defamation?
A defamatory statement is a false statement that injures the reputation of on another company. In cases of defamation the appeal taken by the defendant is that his statement is not false. Rather, it is a ‘fair comment’. In case defamation is done using the internet, it is termed as online defamation

Question No: 35    ( Marks: 3 )
In ETO, what are functions of Accredited Certification Service Provider?
 Accredited Certification Service Provider means a Certification Service Provider accredited under this Ordinance to issue certificates for the use of its cryptography services.
 Question No: 36    ( Marks: 3 )
 SSL is better than SET. Do you agree with this statement? Justify your answer. (1+2)
Question No: 37    ( Marks: 3 )
 What is meant by connectivity media in networking? What are two different options to connect computers on a network?              1+2
 Question No: 38    ( Marks: 3 )
 Write down the principles of private legislation?
 Following are the principles:
·        A private bill should only be passed at the explicit request of the persons who are to benefit from the legislation.
·        Pertinent information regarding a private bill should be made available to all interested persons.
·        All persons or bodies affected by a private bill should be heard and the need for the bill demonstrated.
·        The financial burden of considering a bill for the benefit of private interests should not be borne solely by the public treasury.
Question No: 39    ( Marks: 5 )
 What is cyber squatting and  its purpose ?Give its example.
The act of deliberately registering domain names having trademarks of famous companies to later blackmail or demand payment from those companies is called cyber squatting. For example; Assume there is a firm ‘Nassir Enterprise’ and it wants to have its web site. It also wants to have the word ‘Nassir’ as a part of its domain name because for years it has been recognized in the market through this word. However, at the time of registration of its domain name it finds that a person Mr. ‘A’ who has nothing to do with the business of the firm or the word ‘Nassir’ has already registered a domain name containing this word as a part of it. Since there cannot be two similar domain names, the firm is forced to request Mr. ‘A’ to transfer that domain name to it. In response, if Mr. ‘A’ blackmails or claims ransom from the said firm, he would be said to have committed cyber squatting.

Question No: 40    ( Marks: 5 )
How much benefits you can derive from E-banking? Brief shortly each.
Followings are some advantages getting from E-banking:
·        Get current account balances at any time
We can check our accounts balances from anywhere of world, no need to go bank.
 ·        Obtain credit card statements
If you want reconcile your statements you can get easily from it.
 ·        Pay utility bills
Paying bills by credit card give much relief to users, no need of stand in queue for long time.
 ·        Download account information
Any info you want about your account, get from online bank accounts
 ·        Transfer money between accounts
Money transferring is not headache, no need of stand in queue for long time.
 ·        Send e-mail to your bank
It’s no easier to live in contact with your bank.
 ·        Handle your finances from
You can manage finances from it.

IT430 Final Paper 2010

FINAL TERM  EXAMINATION
Spring 2010
IT430- E-Commerce (Session - 1)
Time: 90 min
Marks: 60
Question No: 1    ( Marks: 1 )    - Please choose one
 JIT Stands for
 Just In Tim
 Joint investigation Technique
 Join in Training
 Just In Total
Page 147 :For instance, packaging material should only be ordered for just in time (JIT) delivery,
Question No: 2    (Marks: 1)    - Please choose one
 JIT concept means
 No distribution channel
 No warehousing
 Easily delivery
 No communicatio
Question No: 3    ( Marks: 1 )    - Please choose one
Press release can provide information about current events and news to, which of following, via a internet?
 Print media
 T.v commercial
 Press or media
 T.v program.
Page 135: Press releases can provide information about current events and other important news to the press or media via internet.

Question No: 4    ( Marks: 1 )    - Please choose one
Visitor’s location, IP address, time of visit related information are added, in which of the following
 call handling files
 cookies
 log files
 Data mining files.
Page 136: Log files consist of data generated by site visits and include information about each visitor’s location.
Question No: 5    ( Marks: 1 )    - Please choose one
 FSTC stands for:
 Financial Services Technology Consortium
  Financial Secrets Technology Consortium
 Final Security threats control
 First Service Technology Consortium
Page 113: Financial Services Technology Consortium (FSTC) is a group of U.S banks, research agencies and government organizations formed in 1993.
Question No: 6    ( Marks: 1 )    - Please choose one
 Downstream activities relate to?
  Materials/services or the input from suppliers
 Manufacturing and packaging of goods
 Distribution and sale of goods to distributors/customers
 Manufacturing and Distribution
 Page 155: Downstream activities relate to distribution and sale of goods to distributors/customers  
Question No: 7    ( Marks: 1 )    - Please choose one
 The process of taking active role in working with suppliers to improve products and processes is called?
  Value chain management
 Supply chain management
 Supply chain management software
 Porter Model
 Page 155: The process of taking active role in working with suppliers to improve products and processes is called supply chain management.Today, firms are reaching beyond limits of their own organizational structure.  
Question No: 8    ( Marks: 1 )    - Please choose one
 Porter’s Model helps a firm to identify threats to its competitive position and to devise plans including the use of IT and e-commerce to protect or enhance that position.
  True
 False
 Page 158 : Porter’s Model helps a firm to identify threats to its competitive position and to devise plans including the use of IT and e-commerce to protect or enhance that position.

Question No: 9    ( Marks: 1 )    - Please choose one
 Which of the following is NOT force of Porter’s  competitive  rivalry  Model?
  Threat of potential/new entrants
 Threat of substitute
 Differentiation  and cost leadership
 Competition between existing players
 Page 158: force of Porter’s competitive
  • Threat of potential/new entrants to the sector
  • Threat of substitute product or service in the existing trade
  • Bargaining power of the buyers
  • Bargaining power of the suppliers
  • Competition between existing players

 Question No: 10    ( Marks: 1 )    - Please choose one
ANSI stands for ……….
  American National Standards Institute
 All Network Standards Institute
 American New standards Institute
 Australia National standards Institute
Page 147: ANSI (American National Standards Institute)

Question No: 11    ( Marks: 1 )    - Please choose one
 Company collecting information assumes that the customer does not object to a specific use of information unless the customer specifically denies the permission. Thus, the company may use the collected information for its own purpose, as well as, sell or rent it out to other firms or persons. Which of the following Approach it is using?
  Opt-inout
 Opt-out
 Swap-out
 Opt-in
Question No: 12    ( Marks: 1 )    - Please choose one
An address represented by four decimal numbers separated by a period is the
   IP
 RIP
 MAC
 None of the given
 Page no 7: IP addressing
It is the logical addressing scheme used to identify computer machines on the internet. Each computer has a unique IP address provided by IP protocol for a given session. It is represented by four decimal numbers separated by a period e.g, 140.57.220.200 (see Fig. 5 below). Computers see this information as a stream of 32 bits.
Question No: 13    ( Marks: 1 )    - Please choose one
 Who is making the Web standards?
  International Standard Organization
 ANSI
 Microsoft
 The World Wide Web Consortium
Page 74: World Wide Web Consortium (W3C), a non-profit organization that maintains standards for the web presented the draft of XML in late 1990’s.
Question No: 14    ( Marks: 1 )    - Please choose one
Individuals who write programs or manipulate technologies to gain unauthorized access to computers and networks are --------------- .
 administrators
 experts
 hackers
 coders
Page 94: Hackers Hackers or crackers are those individuals who write programs or manipulate technologies to gain unauthorized access to computers and networks.
Question No: 15    ( Marks: 1 )    - Please choose one
 The process of scrambling a message with the help of a key is called -------------- .
 Cryptography
 Filtering
 Transposition
 Encryption
Page 100: The process of scrambling a message with the help of a key is called Encryption.
Question No: 16    ( Marks: 1 )    - Please choose one
 Which of the following is NOT supported by position property?
 Relative
 absolute
 static
 dynamic
Question No: 17    ( Marks: 1 )    - Please choose one
 JavaScript variables can begin with ----------- .
  a lower case letter
 an underscore character
 a dollar sign
 all of the above
 Page 54: Variable names can begin with an uppercase letter (A-Z), lower case letter (a-z), an underscore character (_), or dollar sign ($). Remaining characters can be any of the above or from digits (0-9). In JavaScript variables are case sensitive.
Question No: 18    ( Marks: 1 )    - Please choose one
 Symmetric algorithms are faster than asymmetric.
  True
 False
Page 105: The advantage of using symmetric key is that since symmetric algorithms are faster as compared to asymmetric,
Question No: 19    ( Marks: 1 )    - Please choose one
SET doesn’t require special software on the client or merchant side.
 True
 False
Question No: 20    ( Marks: 1 )    - Please choose one
Which e-business helps to improve policies, procedures, customer services, and general operations of other businesses?
 Online shopping malls.
 Selling intellectual property online.
 Online service providers.
 Online automotive sites and energy online.
Page 129: Online Service Providers e-businesses help improve policies, procedures, customer service and general operations of other businesses. They can provide consultancy/professional services, for example, web site development services, online legal consultancy services etc.
Question No: 21    ( Marks: 1 )    - Please choose one
 Choose which one is a very critical element in supply chain management in an E-commerce environment.
 Transaction
 Communication
 None of the given
 All of the given
Page 155: Internet is a very quick and effective tool of communication. On the other hand, communication is also a very critical element in supply chain management.
Question No: 22    ( Marks: 1 )    - Please choose one
Established ----------- can build trust for online business more quickly as compared to a new company/business without reputation
 Brand
 Language
 Culture
 Infrastructure
 Page 161: Note that companies with established brands can build trust for online business more quickly as compared to a new company/business without reputation, since a brand conveys expectations about how the online business would behave.
Question No: 23    ( Marks: 1 )    - Please choose one
 -------------means services in relation to the transformation of contents of an electronic
document from its original form to one that cannot be understood or decoded by any unauthorized person
  Cryptography services
 Accredited Certification Service Provider
 Originator
 Addressee
 Page 163: “‘Cryptography services’ means services in relation to the transformation of contents of an electronic document from its original form to one that cannot be understood or decoded by any unauthorized person”.
Question No: 24    ( Marks: 1 )    - Please choose one
Choose the right one that which organization based in Switzerland is one such arbitration service provider nominated under the UDRP.
  WITO
 WIPO
 MIPO
 MITO
Page 182: World Intellectual Property Organization (WIPO) based inSwitzerland is one such arbitration service provider nominated under the UDRP.
Question No: 25    ( Marks: 1 )    - Please choose one
 ------------- wrong is an act deemed by law to be harmful to the society in general such as theft or murder etc. and the state itself is a party in such matters.
 Criminal
 Civil
 Plentiful
 None
Page 176: criminal wrong (crime) is an act deemed by law to be harmful to the society in
general such as theft or murder etc. and the state itself is a party in such matters.
Question No: 26    ( Marks: 1 )    - Please choose one
 Why we use reset tag in HTML?
 To remove the text written in Notepad.
 To remove the text written in between and tag.
 To remove the text written in between and tag.
 To remove the text written in between
and
tag.

Question No: 27    ( Marks: 1 )    - Please choose one
If we apply hash function on any message the message will become message digest. Can we get original message by applying hash function again on message digest?
 Yes
 No
Page 103: A hash function is said to be one way because we cannot go back to the original text on applying the hash function to a message digest.
 Question No: 28    ( Marks: 1 )    - Please choose one
 The process of key search attack is driving private key from _____.
 Public key
 Symmetric key
 Asymmetric key
 Private key
Page 108: The public key and its corresponding private key are linked with each other with the help of a large composite number. These attacks attempt to derive the private key from its corresponding public key using that number.
Question No: 29    ( Marks: 1 )    - Please choose one
 In e-cash system which type of encryption is used?
 a) Symmetric
 b) Asymmetric
 Both a&b
 None
Page 118 : The request is encrypted with a symmetric key and that symmetric key is encrypted with the public key of the bank, thus creating a secure envelope.
 Question No: 30    ( Marks: 1 )    - Please choose one
Brand marketing is related to the barrier
  Language Barrier
 Cultural
 Lack of Trust
 Network Barrier
Question No: 31    ( Marks: 2 )
What is Competition between existing players?.
Competition within businesses to get more customers and trade at a price that produces a satisfactory profit. If there are lots of players of the same size, capacity and strategy having little difference between their goods, then there is fierce competition among them as regards the price of the goods.
 Question No: 32    (Marks: 2 )
 What is the use of CRC in communication over the network?
Cyclical Redundancy Check (CRC), help us to confirm integrity of data frames.
Question No: 33    ( Marks: 2 )
 What is the Key difference between the B2C and B2B?
B2C stands for Business-to-Consumer and deals between electronic markets to consumer (end user) directly e.g. Amazon.com, while B2B is Business-to-Business and make bridge between two or more organization.
Question No: 34    ( Marks: 2 )
What is meant by online defamation?
A defamatory statement is a false statement that injures the reputation of on another company. In cases of defamation the appeal taken by the defendant is that his statement is not false. Rather, it is a ‘fair comment’. In case defamation is done using the internet, it is termed as online defamation

Question No: 35    ( Marks: 3 )
In ETO, what are functions of Accredited Certification Service Provider?
 Accredited Certification Service Provider means a Certification Service Provider accredited under this Ordinance to issue certificates for the use of its cryptography services.
 Question No: 36    ( Marks: 3 )
 SSL is better than SET. Do you agree with this statement? Justify your answer. (1+2)
Question No: 37    ( Marks: 3 )
 What is meant by connectivity media in networking? What are two different options to connect computers on a network?              1+2
 Question No: 38    ( Marks: 3 )
 Write down the principles of private legislation?
 Following are the principles:
·        A private bill should only be passed at the explicit request of the persons who are to benefit from the legislation.
·        Pertinent information regarding a private bill should be made available to all interested persons.
·        All persons or bodies affected by a private bill should be heard and the need for the bill demonstrated.
·        The financial burden of considering a bill for the benefit of private interests should not be borne solely by the public treasury.
Question No: 39    ( Marks: 5 )
 What is cyber squatting and  its purpose ?Give its example.
The act of deliberately registering domain names having trademarks of famous companies to later blackmail or demand payment from those companies is called cyber squatting. For example; Assume there is a firm ‘Nassir Enterprise’ and it wants to have its web site. It also wants to have the word ‘Nassir’ as a part of its domain name because for years it has been recognized in the market through this word. However, at the time of registration of its domain name it finds that a person Mr. ‘A’ who has nothing to do with the business of the firm or the word ‘Nassir’ has already registered a domain name containing this word as a part of it. Since there cannot be two similar domain names, the firm is forced to request Mr. ‘A’ to transfer that domain name to it. In response, if Mr. ‘A’ blackmails or claims ransom from the said firm, he would be said to have committed cyber squatting.

Question No: 40    ( Marks: 5 )
How much benefits you can derive from E-banking? Brief shortly each.
Followings are some advantages getting from E-banking:
·        Get current account balances at any time
We can check our accounts balances from anywhere of world, no need to go bank.
 ·        Obtain credit card statements
If you want reconcile your statements you can get easily from it.
 ·        Pay utility bills
Paying bills by credit card give much relief to users, no need of stand in queue for long time.
 ·        Download account information
Any info you want about your account, get from online bank accounts
 ·        Transfer money between accounts
Money transferring is not headache, no need of stand in queue for long time.
 ·        Send e-mail to your bank
It’s no easier to live in contact with your bank.
 ·        Handle your finances from
You can manage finances from it.