CUSAT Electronic Data Interchange Exam Paper Nov 1999

CUSAT Electronic Data Interchange Exam Paper Nov 1999

 

B.Tech. Degree VII Semester Examination in

Information Technolgy November -1999

IT- 703

Electronic Data Interchange

Time : 3hrs                                                                                           Max Marks : 100

I                With reference to the advances in computer and communication technology, 20 discuss the evolution of Electronic Data Interchange

OR

II                 Explain in detail the elements of EDI services                                                                            20

III                 Discuss the various standards of EDI how it helped the concept of EDI to 20 become accepted in the business community

OR

IV              What are the implications of translation of documents in paper to digital 20 form.?

V               a) What are the functions provided by a Value Added Data Service?.                             10 b) What are the legal issues arising out of an agreement with a Value

Added Data Service.?                                                                                                                    10

OR

VI              a) Discuss the aspects of EDI which will have conflicts with the                                         10

implementations of trade agreements b) What are the differences between the auditing on paper based systems 10 and that on EDI based systems.?

VII          What is meant by Business Process Reengineering in the context of EDI?. 20

OR

VIII      Write shorts notes on                                                                                                                   20

a)             Open EDI Model

b)           Knowledge Based Design

c)             Software interfaces for EDI

d)            Knowledge Management Issues in EDI                        .

IX              Discuss the aspects of security, privacy and authenticity in the context of 20 EDI.

OR

X               Discuss the algorithms for encryption using public and private keys                      20

Leave a Comment