NPTEL E-Business Assignment Solutions
![[Week 12] NPTEL E-Business Assignment Answers 2023 3 E Business](https://gecmunger.in/wp-content/uploads/2023/08/E-Business-1024x576.png)
NPTEL E-Business Week 12 Assignment Answers 2023
Q1. Maximization of social surplus in the context of efficient auction is about
a. Minimizing buyer’s cost
b. Maximizing the welfare of the entire system
с. Maximizing Seller’s profit
d. Conducting auction for public goods?
Answer:- b
Q2. All the bidders in a coal mine auction have the same knowledge about the market potential of the mine. It is an example of
a. Common value model
b. Private value model
c. Interdependent Value Models
d. Primary value model
[ihc-hide-content ihc_mb_type=”show” ihc_mb_who=”1,2,3″ ihc_mb_template=”1″ ]
Answer:- a
Q3. English auctions an example of
a. Common value model
b. Interdependent value model
c. Iterative value model
d. Multiple value model
Answer:- b
Q4. Bidding Strategy in second price auction ensures:
a. Efficiency
b. Truthfulness of the bidders
c. The item goes to the buyer, who values it most.
d. All of the above
Answer:- d
Q5. As revenue equivalence theorem first price, second price and English auctions generate the same revenue under which of the following conditions?
a. Bidder’s values are independent and identical random variables
b. Bidders are risk neutral
c. They show no collusion or predatory behavior
d. All of the above
Answer:- d
Q6. Incentive compatible direct mechanism ensures
a. Social welfare
b. Maximum profit
с. Truthful bidding
d. Collusion
Answer:- c
Q7. In a double auction the market price is determined from _______
a. Arranging the ask prices of all the buyers in increasing order and choosing the median
b. The intersection of demand and supply curve generated from bid and ask prices
c. Mean price of both demand and supply units in the market.
d. Median values of both ask and bid prices of both buyers and sellers
Answer:- b
Q8. A single-unit and single-item forward auction is an integer programming problem, but can be solved as a
a. Searching problem
b. Sorting problem
c. Linear programming problem
d. Combinatorial optimization problem
Answer:- d
Q9. The bid for a volume discount auction consists of a
a. Quantity schedule
b. Price schedule
c. Bid schedule
d. Auction schedule
Answer:- a
Q10. If a perpetrator buys items from an online merchant using stolen credit card number and then sells them to unsuspecting buyers, the fraud committed is called
a. Triangulation
b. Fee stacking
c. Selling of black-market goods
d. misrepresentation of the items
Answer:- b
[/ihc-hide-content]
NPTEL E-Business Week 11 Assignment Answers 2023
Q1. Which of the following is an automated method for dimensionality reduction?
a. Adjusted Product Taxonomy
b. Latent Semantic Indexinger
c. None of a and b
d. Both a and b
Answer:- d
Q2.
![[Week 12] NPTEL E-Business Assignment Answers 2023 4 image 53](https://gecmunger.in/wp-content/uploads/2023/10/image-53.png)
Answer:- c
Q3.
![[Week 12] NPTEL E-Business Assignment Answers 2023 5 image 54](https://gecmunger.in/wp-content/uploads/2023/10/image-54.png)
Answer:- b
Q4.
![[Week 12] NPTEL E-Business Assignment Answers 2023 6 image 55](https://gecmunger.in/wp-content/uploads/2023/10/image-55.png)
Answer:- b
Q5.
![[Week 12] NPTEL E-Business Assignment Answers 2023 7 image 56](https://gecmunger.in/wp-content/uploads/2023/10/image-56.png)
Answer:- c
Q6.
![[Week 12] NPTEL E-Business Assignment Answers 2023 8 image 57](https://gecmunger.in/wp-content/uploads/2023/10/image-57.png)
Answer:- d
Q7.
![[Week 12] NPTEL E-Business Assignment Answers 2023 9 image 58](https://gecmunger.in/wp-content/uploads/2023/10/image-58.png)
Answer:- c
Q8.
![[Week 12] NPTEL E-Business Assignment Answers 2023 10 image 59](https://gecmunger.in/wp-content/uploads/2023/10/image-59.png)
Answer:- d
Q9.
![[Week 12] NPTEL E-Business Assignment Answers 2023 11 image 60](https://gecmunger.in/wp-content/uploads/2023/10/image-60.png)
Answer:- d
Q10.
![[Week 12] NPTEL E-Business Assignment Answers 2023 12 image 61](https://gecmunger.in/wp-content/uploads/2023/10/image-61.png)
Answer:- d
NPTEL E-Business Week 10 Assignment Answers 2023
Q1. In a customer behavior model graph, no transition can be made to the Entry state from any state other than the Exit state. This is because, the model assumes.
a. The exit state to be the last state of the visit for every website user.
b. The customer cannot leave the site without going to the exit URL
c. The entry and exit states are dummy states
d. Transitions can be made from a dummy state to another dummy state only.
Answer:- a
Q2. Maximum throughput of a computer system is same as that of the throughput of the
a. Processor
b. Input-Output device
c. Memory
d. Any resource which is a bottleneck, not limited to the above
Answer:- d
Q3. Average session length of a website is synonymous with
a. Mean time spent to reach the payment state
b. Mean time spent in the website per session
c. Mean number of transitions in the process starting
d. Mean number of transitions in the process starting from the entry state
Answer:- d
Q4. Future workload is a function of
a. Number of web pages in a website
b. Changes in customer behavior
c. Performance Models
d. Customer behavior model graph
Answer:- b
Q5. What is Bottleneck Analysis in the context of capacity planning?
a. Assessment of a system throughput and response time
b. Identification of the component of a system, whose capacity caps the capacity of the entire system
C. Analyzing the customers’ response towards inadequate capacity
d. Analyzing the impact of deployment of new application and services on response time of a system
Answer:- b
Q6.
![[Week 12] NPTEL E-Business Assignment Answers 2023 13 image 1](https://gecmunger.in/wp-content/uploads/2023/10/image-1.png)
Answer:- b
Q7.
![[Week 12] NPTEL E-Business Assignment Answers 2023 14 image 2](https://gecmunger.in/wp-content/uploads/2023/10/image-2.png)
Answer:- c
Q8.
![[Week 12] NPTEL E-Business Assignment Answers 2023 15 image 3](https://gecmunger.in/wp-content/uploads/2023/10/image-3.png)
Answer:- d
Q9.
![[Week 12] NPTEL E-Business Assignment Answers 2023 16 image 4](https://gecmunger.in/wp-content/uploads/2023/10/image-4.png)
Answer:- c
Q10.
![[Week 12] NPTEL E-Business Assignment Answers 2023 17 image 5](https://gecmunger.in/wp-content/uploads/2023/10/image-5.png)
Answer:- a
NPTEL E-Business Week 9 Assignment Answers 2023
1. What do web crawlers do?
a. Downloads access log files from all the websites
b. Analyze user behavior of a target website
c. Download contents from various websites and index them.
d. Hacks target websites
Answer :- c
2. Where is the access log file stored?
a. In the web server
b. In the client browser
c. In the proxy server
d. In the name server
Answer :- a
3. Web usage mining is the process of discovering the interesting patterns from
a. Customer blogs
b. Robots.txt
c. The website
d. The access log
Answer :- d
4.
Answer :- d
5. Time oriented sessionization heuristics assume
a. Time taken for a http request to reach the website must not exceed a set limit
b. Time taken for a http response to reach the user must not exceed a set limit
c. The page stay time must not exceed a maximum set limit.
d. None of the above
Answer :- c
6. What is Page View?
a. No of all requests made to a web server and collected in the access log file
b. No of requests for a valid html page made to a web server and collected in the access log file
c. List of all the referrer URLs for the website
d. The sequence of hyperlinks one or more website visitors follows on a given site
Answer :- d
7. Any website can use the online log analysis software “Google Analytics”, if
a. The page tagging information is added to every page of the website.
b. The website is hosted in cloud
c. The page tagging request is sent to google.com using HITP protocol.
d. The website installs google analytics on its server.
Answer :- a
8. Association rule mining in the context of web log analysis can discover_____relationship.
a. Co-occurrence
b. Causal
c. Sequential
d. Similarity
Answer :- a
9. Cross-selling of products can be enhanced through web usage mining by
a. Mapping of Web pages/objects to products
b. Discovery of associated products
c. Placement of associated products on the same page
d. All of the above
Answer :- d
10. The dynamic part of a Customer Behavior Model Graph represented by a transition probability matrix. The sum of all the elements in each row is
a. 0
b. 1
C. 2
d. 3
Answer :- b
Course Name | E-Business |
Category | NPTEL Assignment Answer |
Home | Click Here |
Join Us on Telegram | Click Here |
NPTEL E-Business Week 8 Assignment Answers 2023
1. Which of the following is benefit of RFID over Barcode
a. Item level identification
b. Keeping item details in a code
c. Low cost
d. No need for a scanner
Answer :- a
2. What are the three elements of an RFID setup?
a. EPC, Savant, PML
b. Tag, reader, middleware
c. Tag. EPC, PML
d. Tag. reader. EPC
Answer :- b
3. Which of the following RFID tags is suitable for supply chain applications?
a. Active read write tag
b. Semi–active read write tag
c. Passive read write tag
d. Passive read only tag
Answer :- d
4. Which of the following tag types have highest read range
a. Passive
b. Active
c. Semi-active
d. Readonly
Answer :- b
5. Which of the following technical concern may arise if an RFID tag is attached to an electric
motor and sends distorted data:
a. Electromagnetic interferences
b. Data formats in compatibility
c. Standard incompatibility
d. Lack of reader coordination
Answer :- a
6. TIGER files are an important data source for
a. GPS
b. GIS
c. RFID
d. IOT
Answer :- b
7. Which of the following is an IoT device
a. GPS device
b. RFID reader
c. RFID tags
d. GIS software
Answer :- b
8. Mobile phones are a powerful loT device. You have a home security APP installed in the phone that not only shows the visuals from the home, it creates alert messages when some unusual movements happen in the home. This detection process is at the________ layer of IoT architecture.
a. Integrated application
b. Information processing
c. Network construction
d. Sensing and identification
Answer :- b
9. Under which condition, barcode is a preferred option over RFID.
a. The items are packed in a wooden box
b. The items are packed in a metal box
c. The items are packed in a plastic box
d. Items are packed in a carton
Answer :- b
10. Which of the following application domain does not generate Big Data
a. Data generated from a social networking site like Facebook
b. Data generated from the traffic cameras from installed in a city
c. Your online transactions in Amazon prime website
d. Tracking the locations of all the moving vehicles from Uber’s control room
Answer :- c
Course Name | E-Business |
Category | NPTEL Assignment Answer |
Home | Click Here |
Join Us on Telegram | Click Here |
NPTEL E-Business Week 7 Assignment Answers 2023
1. Every payment system has four components: Instruments, Rules, Institutions, and Legal systems In the Indian payment system which of the following is an example of an instrument.
a. Bank
b. Cheque
c. ATM
d. RBI
Answer :- b
2. Which of the following entities is responsible for connecting merchants with the credit card companies.
a. The card processing center
b. Merchant’s payment device
c. The credit card company
d. Merchant’s bank
Answer :- a
3. Why is TLS not suitable for credit card payment transactions?
a. TLS supports mutual authentication between client and server
b. TLS cannot guarantee that the payment information is secured and not misused at the merchant’s server.
C. TLS cannot ensure that the merchant is authorized to get the payment through the specified credit card.
d. All of the above
Answer :- d
4. The communication level interoperability between two information system is possible due to
a. REST
b. EDI
c. TCP/IP
d. SOAP
Answer :- c
5. “Preparation of Electronic Documents” stage during EDI process does the following
a. Translates a paper-based business document to standard EDI
b. Translates an electronic business document to standard EDI format
C. Translates a paper-based business document to some electronic format as per the requirement of the outbound translation software
d. Translates a paper-based business document to some electronic format as per the requirement of the inbound translation software
Answer :- c
6. The cost involved in preparation of EDI Trading Partner Agreement, is termed as
a. Consulting cost
b. Legal cost
c. Networking cost
d. Training cost
Answer :- b
7.
Answer :- a
8. Gmail is example of an _____ cloud model
a. Infrastructure as a service (laaS)
b. Platform as a service (PaaS)
c. Software as a service (SaaS)
d. Email as a service (EaaS)
Answer :- c
9. Our organization has adopted cloud service hosted in the institute premises. Since we do not have inhouse expertise in managing the cloud, we have a contract with Google to help us out Our cloud can be termed as
a. Private cloud
b. Public cloud
c. Hybrid cloud
d. Community cloud
Answer :- a
10. A software system designed to support interoperable machine-to-machine interaction over a network is called a _____
a. CORBA
b. XMI
c. Web service
d. None of the above
Answer :- c
Course Name | E-Business |
Category | NPTEL Assignment Answer |
Home | Click Here |
Join Us on Telegram | Click Here |
NPTEL E-Business Week 6 Assignment Answers 2023
Q1. I observed that some additional income tax is charged to me. I placed a complaint with the tax department and got the details of the financial transaction that led to this additional tax deduction. The security category that best explains this process is
a. Integrity
b. Availability
c. Non-repudiation
d. Auditing
Answer:- d
Q2. Denial of Service Attacks is a compromise on the system at the _______________ layer of TCP/IP protocol stack.
a. IP
b. ICP
c. Application
d. Link
Answer:- b
Q3. The strength of a cryptographic algorithm is high if the ______ size is _____
a. Data packet, high
b. Key, high
c. Data packet, low
d. Key, low
Answer:- b
Q4. I was getting frequent email communications from my bank for sharing my personal details and sharing my password to update this information. Upon sharing. I lost my money. While putting my complaints to the bank, I came to know that the emails were not from the bank. This type of attack is called
a. Hackinging
b. Phishing
c. Intruding
d. None of the above
Answer:- b
Q5. Which of the following can be prevented using hash functions
a. Insertion of message from fraudulent source
b. Changing content of message
c. Insertion, deletion and reordering of message sequence
d. All of the above
Answer:- d
Q6. Which of the following cryptographic algorithms are used in TLS protocol
a. Symmetric key algorithms
b. Asymmetric key algorithms
c. Both symmetric and asymmetric key algorithms
d. Hashing algorithms
Answer:- c
Q7. During the TLS protocol the digital certificate verification requires
a. Certifying Authority’s public and private key pair
b. Certifying Authority’s private key
c. Certifying Authority’s public key
d. Certifying Authority’s hash key
Answer:- c
Q8. A web server throughput is 19.3 requests per sec. It turns out that server disk is the bottleneck resource. What is the service demand at the disk?
a. 0.051694 sec
b. 0.01405 sec
c. 0.001737 sec
d. 0.01sec
Answer:- a
Q9. During the execution of TLS protocol, if cached session states are available at client/server side and valid, which the following will happen
a. The time taken to execute handshake protocol will reduce
b. Information exchange for creating symmetric key for bulk message transfer is not necessary
c. Time taken to execute record protocol will remain unchanged
d. All of the above
Answer:- d
Q10. Which of the following is the work of Public Key Infrastructure (PI) of a country
a. Building public infrastructure for key exchange
b. Development of security protocols
c. Digital certificate issuance. validation and revocation
d. Development of cryptographic algorithms
Answer:- c
NPTEL E-Business Week 5 Assignment Answers 2023
1. Which of the following metrics does not relate to maintenance of an information system
a. MTTF (meantime to failure)
b. MTTR (meantime to repair)
c. Response time
d. All of the above
Answer :- c
2. Splitting the traffic across the servers is called
a. Dynamic load balancing
b. Multi-threading
c. Forking
d. Traffic handling
Answer :- a
3. The proxy server is responsible for which of the following tasks
a. Caching for traffic reduction
b. Firewalls for security and privacy
c. Load balancing
d. All of the above
Answer :- d
4. If an http response is marked as “non-authoritative”, it is sent by the_____
a. Name servers
b. Internet Corporation for Assigned Names and Numbers
c. Internet service provider’s cache
d. None of the above
Answer :- c
5. Which of the following is not true for the cookies
a. It creates security threat by sending local information
b. It contains the browsing history of the associated website
c. It creates privacy issues for a website
d. They are just small text files
Answer :- b
6. During memory reference, a page fault occurs if.
a. A page is not present in the cache memory
b. A page is not present in the virtual memory
c. A page is not present in the main memory
d. A page is not present in the register memory
Answer :- c
7. Hard disk of a computer is a
a. Optical memory
b. Magnetic memory
c. Semiconductor memory
d. Flash memory
Answer :- b
8. Operating system is a
a. System management software
b. System development software
c. Application software
d. None of the above
Answer :- a
9. System CPU time is the time taken by
a. User specific program module running in a system
b. Operating system and other system management software
c. All the application programs running in a system
d. All of the above
Answer :- b
10. Which of the following is not a part of TCP/IP protocol stack
a. Physical Layer
b. Data Link Layer
c. Network Layer
d. Transport Layer
Answer :- a
Course Name | E-Business |
Category | NPTEL Assignment Answer |
Home | Click Here |
Join Us on Telegram | Click Here |
NPTEL E-Business Week 4 Assignment Answers 2023
Q1. The Internet has transformed the marketing paradigm from undifferentiated mass marketing to mass customized marketing. Here, undifferentiated mass marketing and mass customized marketing means ___________, ___________ respectably.
a. Each customer can be used for marketing, each product has a customized marketing strategy
b. Tailor Made product for everyone, same product for everyone in the market,
c. Same product for everyone in the market, tailor made product for everyone
d. Both the concepts are essentially same
Answer:- c
2. A visitors to an online store is called an online key customers if he/she
a. Is willing to share personal details
b. Carefully browses through all the products
c. Makes multiple purchases
d. Makes one purchase
Answer:- c
3. Two-way transactions through chat and discussion groups, web forms and questionnaires, instant messaging, and e-mail correspondence, are called
a. Interactive marketing
b. Customer Relationship Management
c. Advertising and promotion
d. Product management
Answer:- a
4. The increase in the variability as we travel up in the supply chain is referred to as the bullwhip effect. This effect can be reduced by the adoption of e-procurement practices due to
a. Controlled price fluctuations
b. Information sharing across the supply chain
c. Reduction in batch ordering
d. All of the above
Answer:- b
5. Inter-enterprise Supply Chain Management information systems at strategic level can help in
a. Demand forecast
b. Production, procurement, logistics plan
c. Customer Order Fulfillment/Service
d. Establish objectives, policies, and operating footprint
Answer:- d
6. If both planning and inventory level collaboration is established between two business partners,
it is called a
a. Collaborative planning and forecasting supply chain
b. Vendor managed inventory supply chain
c. Synchronized Supply Chain
d. None of the above
Answer:- c
7. In a vendor managed inventory system, the supplier forecasts the demand the inventory level of
the retailer. This is possible because
a. Inventory level information from the retailer is seamlessly shared with the supplier.
b. Planning level information from the retailer is seamlessly shared with the supplier
c. Both planning and inventory level information from the retailer is seamlessly shared with the supplier
d. None of the above
Answer:- a
8. Carbon Footprint Calculations, the process of calculating the CO2 footprint of the distribution
network, is a part of?
a. Strategic transportation functionality
b. Tactical transportation functionality
c. Operational transportation functionality
d. None of the above, as it is not a transportation functionality
Answer:- a
9. Which of the following is a concern in the context of digital distribution of goods and services.
a. Digital products can be copied and distributed illegally.
b. The distribution costs are in most cases passed on to the customer directly
c. No social and interpersonal contact
d. All of the above
Answer:- d
10. You ordered some items from an online retailer. The item is delivered to your local retailer. You visit the retailer and collect your item. This model of distribution is called
a. Distributor storage with package carrier delivery
b. Retail storage with customer pickup
c. Distributor storage with last mile delivery
d. None of the above
Answer:- b
NPTEL E-Business Week 3 Assignment Answers 2023
1. Who of the following stakeholders of a company is not supposed to have access to enterprise information portal
a. Managers
b. Supervisors
c. Government
d. Clerks
Answer :- c
2. Which of the following activities can occur only in the context of e-procurement, but does not exist in the traditional procurement process?
a. Data aggregation
b. Catalog buying
c. Approval workflow automation
d. All of the above occur in the context of e-procurement
Answer :- d
3. Which of the following is not an e-procurement model.
a. E-Procurement software
b. Internet market exchanges
c. Internet B2B auctions
d. Internet C2B auctions
Answer :- d
4. During spend analysis an integrated view of all the relevant data from different sources are aggregated for report generation. This process if called
a. Data Cleansing
b. Data Scrubbing
c. Data Warehousing
d. Data Analytics
Answer :- c
5. Minimum typical evaluations to consider in a supplier scorecard is
a. Quality of the product supplied
b. Maintenance service quality during warranty period
c. Timeliness of Delivery
d. All of the above
Answer :- d
6. Legal documents containing the price of the items to be procured and other terms and conditions is called
a. Bill of materials
b. Contracts
c. Quotations
d. Letter of credit
Answer :- b
7. What is purchase solicitation?
a. The process of conducting the reverse auction through a third party.
b. The process of seeking information, proposals, and quotations from suppliers
c.The process of requisition generation and communication with the purchase department
d. The process of supplier management and score card generation
Answer :- b
8. Which of the following is an example of external business risk while adopting e-procurement.
a. Deteriorating buyer-supplier relationship
b. Technical failure to connect with supplier driven e-catalogue
c. Ensuring investment from the suppliers in compatible e-procurement technologies
d. All of the above indicate external business risk
Answer :- d
9. E-procurement initiatives by any organization may hamper buyer-supplier relationship. This is kind of
a. Internal business risks
b. External business risks
c. Technology risks
d. Process risks
Answer :- b
10. Which of the following is a solution to provide solution for “Customer Service and Support” in
a. Call center software
b. Help desk software
c. Web-based self-service
d. All of the above
Answer :- d
11. Allows greater responsiveness to customer needs through sourcing of products and services outside of the enterprise, enabling easy collaboration with customers, suppliers, and partners, and thereby improves efficiency and integration throughout the supply chain is called Customer Relationship Management(CRM).
a. Collaborative CRM
b. Operational CRM
c. Analytical CRM
d. General CRM
Answer :- a
12. What is a customer touchpoint?
a. Any communication channel through which the customer can connect
b. Call centers to answer customer queries
c. Web based customer support system
d. Toll free numbers for connecting with the call center
Answer :- a
13. Investments needed for technological integration of e-procurement systems with the existing information infrastructure of a company, and the uncertainties associated with them can be termed as
a. External business risk
b. Internal business risk
C. Technical risk
d. Process risk
Answer :- b
Course Name | E-Business |
Category | NPTEL Assignment Answer |
Home | Click Here |
Join Us on Telegram | Click Here |
NPTEL E-Business Week 2 Assignment Answers 2023
1. Which of the following is not a part of the Enterprise Resource Planning (ERP) system?
a. Manufacturing and production
b. Sales and marketing
c. Warehouse management
d. Finance and accounts
Answer :- c. Warehouse management
2. Three types of flows occur during the execution of a business process. Which one the following does not happen when you book an air ticket and receive it online.
a. Money
b. Material
c. Information
d. None
Answer :- b. Material When you book an air ticket and receive it online, the flow of material does not occur. The other two flows, i.e., the flow of money (payment transaction) and the flow of information (booking details, ticket confirmation, etc.), are essential components of the online booking process.
3. Data scientists belong to _____level of management, whereas data workers belong to_______level .
a. Middle, operational
b. Senior, middle
c. Senior, operational
d. Operational, middle
Answer :- a. Middle, operational Data scientists typically belong to the middle level of management, as they are involved in analyzing and interpreting data to inform business decisions and strategies. They work with complex data sets and use their expertise to provide insights.
4. Which of the following entities is a stakeholder of a company?
a. Supplier
b. Customer
c. Government
d. All of the above
Answer :- d. All of the above Stakeholders of a company are individuals, groups, or entities that have an interest in or can be affected by the company's operations, decisions, and outcomes. This includes suppliers, customers, government entities, employees, investors, shareholders, communities, and more. All of these entities can have an impact on or be impacted by the company's activities, making them stakeholders.
5. What is information?
a. data that are processed to be useful
b. data that has been given meaning by establishing relational connection
c. provides answers to “who”, “what”, “where”, and “when” questions
d. All of the above
Answer :- d. All of the above Information encompasses all the provided options: a. Information is data that has been processed to be useful and meaningful. It involves transforming raw data into a more organized and structured form to make it usable for decision-making and understanding. b. Information is also data that has been given meaning by establishing relational connections or context. It involves putting data into a meaningful context or structure that allows for better interpretation and understanding. c. Information provides answers to "who," "what," "where," and "when" questions. It addresses various aspects of data to provide a more comprehensive understanding of the situation or topic. In summary, information is derived from data through processing, meaning establishment, and contextualization, making it useful for decision-making and understanding.
6. Which one of the below is not a resource for an information system?
a. People
b. Data
c. Building infrastructure
d. Hardware and software
Answer :- c. Building infrastructure Building infrastructure is not typically considered a direct resource for an information system.
7. Which of the following types of the information system is responsible for capturing various data generated during operational activities of the organization.
a. TPS
b. MIS
c. DSS
d. All of the above
Answer :- a. TPS (Transaction Processing System) TPS, or Transaction Processing System, is responsible for capturing various data generated during the operational activities of the organization. It processes and records routine transactions and activities, such as sales, purchases, inventory changes, and other day-to-day operations. TPS is focused on collecting and processing transactional data to support the operational needs of the organization.
8. Determining special offers to customers is a decision taken by ________.
a. Senior Management
b. Operational Management
c. Middle Management
d. None of the above
Answer :- b. Operational Management
9. An academic ERP system prepares a grade sheet for the individual students at the end of the semester based on the grades entered by professors. Grade sheet generation is activity, whereas grade entry is activity.
a. IPS, DSS
b. DSS. MIS
c. IPS, MIS
d. MIS. IPS
Answer :- d. MIS. IPS An academic ERP system prepares a grade sheet for individual students (Management Information System - MIS) based on the grades entered by professors (Information Processing System - IPS). Grade entry is an activity within the IPS, where professors input the grades, and grade sheet generation is an activity within the MIS, which involves processing and presenting the grades to students in a structured format.
10. Google map provides you the shortest yet less crowded path using a variation of Dijkstra’s shortest path algorithm. It is an example of _________.
a. MIS
b. TPS
c. ESS
d. DSS
Answer :- d. DSS (Decision Support System) Google Maps providing the shortest yet less crowded path using a variation of Dijkstra's shortest path algorithm is an example of a Decision Support System (DSS). DSS are systems designed to assist with decision-making by providing information, analysis, and insights to support the decision-making process. In this case, Google Maps uses data and algorithms to help users make informed decisions about the best route to take based on their preferences and current traffic conditions.
11. Which of the following is not a knowledge representation method in expert systems
a. Hardware based
b. Case based
c. Obiect based
d. Rule based
Answer :- a. Hardware based In expert systems, knowledge representation methods include rule-based systems, case-based reasoning, and object-based systems. However, "hardware based" is not a commonly recognized knowledge representation method in the context of expert systems. Hardware may refer to the physical components that the expert system runs on but is not a method for representing knowledge within the system.
12. Analyzing clickstream data for customer behavior modeling is a ________ decision support scenario
a. Analytical
b. Mathematical
c. Event driven
d. Data driven
Answer :- d. Data driven
13. The quality characteristics of an information system for providing up-to-date whenever accesses, is termed as
a. Currency
b. Timeliness
c. Frequency
d. Reliability
Answer :- a. Currency
Course Name | E-Business |
Category | NPTEL Assignment Answer |
Home | Click Here |
Join Us on Telegram | Click Here |
NPTEL E-Business Week 1 Assignment Answers 2023
1. ABC company uses Amazon’s fulfillment network to deliver its product directly to the customer. The customer can track the delivery status of the product online. This process can be termed as a_________ transaction.
a. E-Business
b. E-commerce
c. Both a) and b)
d. None of the above
Answer :-a. E-Business
2. Pantaloons Fashion & Retail Limited retails a mix of private labels and licensed brands in apparel and accessories. It has many stores across the country. Placing orders, receipt of goods. unloading. and recording the details of received goods are a few of the activities at the store level. These activities can be termed as
a. Value chain activities
b. Value delivery activities
c. Value creation activities
d. None of the above
Answer :- a. Value chain activities Value chain activities are the various processes and activities that a company engages in to create and deliver value to its customers. In the scenario described, activities such as placing orders, receiving goods, unloading, and recording details of received goods are part of the overall value chain of Pantaloons Fashion & Retail Limited's operations.
3. Enterprise Resource Planning (ERP) software automates
a. Supply chain
b. Value chain
c. E-procurement
d. Logistics activity activities.
Answer :- b. Value chain Enterprise Resource Planning (ERP) software helps automate and integrate various processes across the value chain of an organization, including functions such as manufacturing, distribution, procurement, human resources, finance, and more. It aims to improve overall efficiency and effectiveness by streamlining processes and facilitating better communication and coordination among different departments and functions.
4. A business model provides a road map for a company and includes:
a. Cost structure
b. Revenue generation plan
c. Profit architecture
d. All of the above
Answer :- d. All of the above A business model provides a comprehensive framework that outlines how a company plans to create, deliver, and capture value. It includes various components, such as the cost structure (how costs are incurred), the revenue generation plan (how the company earns money), and the overall profit architecture (how the company aims to achieve profitability). All these elements collectively form the business model, which guides the company's strategic decisions and operations.
5. An online content streaming platform like Netflix generates its revenue using
a. Merchant model
b. Utility model
c. Subscription-based model
d. Advertisement model
Answer :- c. Subscription-based model An online content streaming platform like Netflix generates its revenue primarily through a subscription-based model. Users pay a subscription fee to access the platform's content library and enjoy streaming movies, TV shows, and other content without interruptions from advertisements. This model allows users to access a wide range of content for a recurring fee, and the platform's revenue is generated from these subscriptions rather than from advertisements or individual purchases.
6. It is evident in TATA Steel’s e-procurement study that when buy volume is low and criticality to cost or quality is low, a company should go for
a. Reverse auction
b. Business process outsourcing
c. B2B market places
d. All of the above
Answer :- b. Business process outsourcing
7. Yatra.com is an online
a. Manufacture
b. Merchant
c. Brokerage
d. Advertisement site?
Answer :- c. Brokerage Yatra.com is an online travel agency that acts as a brokerage site. It connects customers with various travel services such as flights, hotels, vacation packages, and more, provided by different manufacturers (airlines, hotels, etc.). Yatra.com facilitates transactions between customers and service providers, earning commissions or fees for the bookings made through its platform. This makes it a brokerage site in the context of the travel industry.
8. As per Gartner’s Hype Cycle, if technology is in the plateau of productivity, it indicates
a. The product is getting very high visibility and market expectations are high
b. The disillusionment about the product is over, it is not accepted in the the market.
c. The disillusionment about the product is over, it is mature and adopted in the market.
d. The product has potential and is trying to improve based on market feedback.
Answer :- c. The disillusionment about the product is over, it is mature and adopted in the market. In Gartner's Hype Cycle, when a technology is in the "plateau of productivity," it indicates that the initial hype and disillusionment phases are over, and the technology has matured and become widely adopted in the market. It is a stage where the technology has proven its value and is stable, and organizations are reaping the benefits from its implementation.
9. IT’s eChoupal Initiative is about improving the ________of agricultural produces.
a. Marketing model
b. Supply chain
c. Sales
d. Accountability
Answer :- b. Supply chain IT's eChoupal Initiative is about improving the supply chain of agricultural produces. The initiative uses technology to connect farmers directly with buyers and markets, facilitating better access to information, fairer pricing, and more efficient distribution of agricultural products. This helps in optimizing the supply chain processes and benefiting both farmers and consumers.
10. Paying income taxes online is example of _______transaction.
a. G2C
b. G2B
c. C2G
d. G2G
Answer:- c. C2G
Course Name | E-Business |
Category | NPTEL Assignment Answer |
Home | Click Here |
Join Us on Telegram | Click Here |
Pingback: [Week 7] NPTEL E-Business Assignment Answers 2023 – Context UAE