E-Business Assignment 06 Answers | January 2022 | NPTEL | Week 06 | The Today Blog

Rate this post

Want to Know the Answers to NPTEL E-Business Assignment 06? This article will tell you the answer to the National Programme on Technology Enhanced Learning (NPTEL) Course E-Business. So read the complete article carefully.

About the Course: E-Business

The Internet has changed the way companies carry out their businesses. The primary objective of this course is to introduce concepts, tools and approaches to electronic business to post-graduate and undergraduate students. Further, the subject will help the students to develop skills to manage businesses in the digital world.

CRITERIA TO GET A CERTIFICATE

Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100

Final score = Average assignment score + Exam score

YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.

The certificate will have your name, photograph, and score in the final exam with the breakup. It will have the logos of NPTEL and IIT Roorkee. It will be e-verifiable at nptel.ac.in/noc.

E-Business Assignment 06 Answers

Question 01 of 10

Which of the following are the solutions to network security problems?

 i) Encryption
ii) Authentication
iii) Authorization
iv) Non-repudiation 

A. i, ii and iii only

B. i, ii and iii only

C. i, ii and iii only

D. All i, ii, iii and iv

D. All i, ii, iii and iv

Question 02 of 10

Whenever you try to execute a transaction on your bank website, the bank conducts a certain process to ensure that the right person is doing the transaction. This process is called:

A. Authentication

B. Phishing

C. Integrity test

D. None of the above

A. Authentication

Question 03 of 10

When you send a message to your friend on Whatsapp messenger, it is claimed that nobody can access the message other than the intended recipient as the original message is scrambled. The technique used to ensure this is called _________

A. Authorization

B. Cryptography

C. Authentication

D. None of the above

A. Authorization

E-Business Assignment 06 Answers

Question 04 of 10

Which one of the below statements are FALSE with respect to encryption?

A. The strength of encryption is determined by the key size

B. Block algorithms are typically faster than stream algorithms

C. Hash functions are used for encryption

D. Generally, bulk data transfer is not done by asymmetric key cryptography

D. Generally, bulk data transfer is not done by asymmetric key cryptography

Question 05 of 10

A software program that allows intruders to take remote control of a computer without the owner’s knowledge is called:

A. Malware

B. Adware

C. Trojan Horse

D. None of the above

A. Malware

Question 06 of 10

Mr. Girish got an e-mail from his bank saying that his account has been compromised. The e-mail also asked him to click a link given in the e-mail and update his account details and debit card details to avoid losing any money. Mr. Girish promptly followed the instruction and entered the details, following which a lot of money was stolen from his account. This is an example of _______

A. Hacking

B. Phishing

C. Social engineering

D. None of the above

B. Phishing

E-Business Assignment 06 Answers

Question 07 of 10

A digital signature on a document ensures:

A. Authenticity

B. Integrity

C. Non-repudiation

D. All of the above

D. All of the above

Question 08 of 10

If the average time for a disk access is 0.02 sec then what will be the throughput with insecure connection (Without TLS)?

A. 100 requests per second

B. 75 requests per second

C. 50 requests per second

D. 25 requests per second

C. 50 requests per second

Question 09 of 10

The average size of a file requested by the client is 20,436 bytes, the time for client side handshaking is 10.58 ms with 1024 bit keysize, and the encryption/decryption for RC-4 and message digest (MD-5) generation/verification are 140 mbps and 180 mbps respectively. in this setting, find the service time at the client.

A. Range (1.2 – 1.3) s

B. Range (0.12 – 0.13) s

C. Range (0.012 – 0.013) s

D. Range (0.0012 – 0.0013) s

A. Range (1.2 – 1.3) s

Question 10 of 10

The average CPU time for accessing a file at the server when secure connection is not required is 0.002 sec, the time for server side handshaking is 48.03 ms with 1024 key size, and the encryption/decryption for RC-4 and message digest (MD) generation/verification are 140 mbps and 180 mbps respectively. In this setting, find the service time at the server when the file size is 16,385 bytes.

A. Range (5 – 6) s

B. Range (0.5 – 0.6) s

C. Range (0.05 – 0.06) s

D. Range (0.005 – 0.006) s

C. Range (0.05 – 0.06) s

That’s All Guys! Hope you Like the Article.

That It Guys, in this article I have told you about the Answers to  E-Business Assignment 06.

Disclaimer: We do not claim 100% surety of answers, these answers are based on our sole knowledge, and by posting these answers we are just trying to help students, so we urge do your assignment on your own.

if you have any suggestions then comment below or contact us at admin@thetodayblog.com

If you found this article Interesting and helpful, don’t forget to share it with your friends to get this information.

READ ALSO:

Air Pollution and Control ASSIGNMENT 01 ANSWERS

WILDLIFE ECOLOGY ASSIGNMENT 12 ANSWERS

Compiler Design Assignment 01 Answers

PROGRAMMING IN JAVA ASSIGNMENT 01 ANSWERS

Don’t forget to share it with your friends.

Follow us on Instagram, Twitter, and Facebook also.

Follow me personally on Instagram and Twitter.

Leave a Comment