Are you looking for the Answers to NPTEL E-Business Assignment 6? This article will help you with the answer to the National Programme on Technology Enhanced Learning (NPTEL) Course “NPTEL E-Business Assignment 6″
What is E-Business?
The Internet has changed the way companies carry out their businesses. The primary objective of this course is to introduce concepts, tools and approaches to electronic business to the post- graduate and undergraduate students. Further, the subject will help the students to develop skills to manage businesses in the digital world.
CRITERIA TO GET A CERTIFICATE
Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100
Final score = Average assignment score + Exam score
YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.
Below you can find the answers for the NPTEL E-Business Assignment 6
|E-Business Assignment 1||Click Here|
|E-Business Assignment 2||Click Here|
|E-Business Assignment 3||Click Here|
|E-Business Assignment 4||Click Here|
|E-Business Assignment 5||Click Here|
|E-Business Assignment 6||Click Here|
|E-Business Assignment 7||Click Here|
|E-Business Assignment 8||Click Here|
NPTEL E-Business Assignment 6 Answers:-
Q1. Which of the following are the solutions to network security problems?
Q2.Whenever you try to execute a transaction on your bank website, the bank conducts a certain process to ensure that the right person is doing the transaction. This process is called:
Q3. When you send a message to your friend on Whatsapp messenger, it is claimed that nobody can access the message other than the intended recipient as the original message is scrambled. The technique used to ensure this is called _________
Q4. Which one of the below statements are FALSE with respect to encryption?
???? Next Week Assignment Answers ????
Q5. A software program that allows intruders to take remote control of a computer without the owner’s knowledge is called:
Q6. Mr. Girish got an e-mail from his bank saying that his account has been compromised. The e-mail also asked him to click a link given in the e-mail and update his account details and debit card details to avoid losing any money. Mr. Girish promptly followed the instruction and entered the details, following which a lot of money was stolen from his account. This is an example of _______
Q7. A digital signature on a document ensures:
????If there are any changes in answers will notify you on telegram so you can get a 100% score, So Join???? ????
Q8.If the average time for a disk access is 0.02 sec then what will be the throughput with insecure connection (Without TLS)?
Q9. The average size of a file requested by the client is 20,436 bytes, the time for client side handshaking is 10.58 ms with 1024 bit keysize, and the encryption/decryption for RC-4 and message digest (MD-5) generation/verification are 140 mbps and 180 mbps respectively. in this setting, find the service time at the client.
Q10. The average CPU time for accessing a file at the server when secure connection is not required is 0.002 sec, the time for server side handshaking is 48.03 ms with 1024 key size, and the encryption/decryption for RC-4 and message digest (MD) generation/verification are 140 mbps and 180 mbps respectively. In this setting, find the service time at the server when the file size is 16,385 bytes.
For other courses answers:- Visit
For Internship and job updates:- Visit
Disclaimer: We do not claim 100% surety of answers, these answers are based on our sole knowledge, and by posting these answers we are just trying to help students, so we urge do your assignment on your own.
if you have any suggestions then comment below or contact us at [email protected]
If you found this article Interesting and helpful, don’t forget to share it with your friends to get this information.