CUSAT Electronic Data Interchange June 2006

 CUSAT Electronic Data Interchange June 2006

 

CUSAT B-Tech Degree VII Semester (Supplementary) Examination June 2006

IT 703 ELECTRONIC DATA INTERCHANGE

(1999 – 2002 Admissions)

Maximum Marks : 100

(I)          (a)        What are the advantages of EDI over a paper-based document transfer system?

               (b)         What are EDI standards? Briefly discuss about ED1FACT?

OR

                           (ii)                     What are the guidelines to be considered for EDI implementation?

(10)

(10)

(20)

 

 

 

 

(III) (a) What are Value Added Networks? Briefly discuss about th ; benefits of VAN.                                             (10)

(b)     Explain the legal issues of EDI.                                                                                                                        (10)

OR

(a)                  Discuss about Trading Partner Agreement.                                                                                                (10)

(b)                  What is EDP Auditing? What are the various phases invoh ed in EDP Auditing?                                       (10)

What are the key controls that project manager should cons ider in EDI implementation? (20)

OR

What is Open EDI model? Discuss business operational and functional service views of Open EDI conceptual model.         (20)

  1. (a) Discuss the role of corporate gateways in EDI environment                                                                                 (10)

(b) What is APEC? Discuss the role played by APEC for promoting open trade and cooperation.                                                                                                                                               (10)

OR

  1. What are the main compcnents of International Trade? Discuss about the Role of EDI in International Trade.                                                                                                                               (20)

(X).                           Discuss EDI security threats and measures against them.                                                                           (20)

OR

X.                            Explain symmetric and asymmetric key algorithms. Compare their uses.                                                   (20)

Leave a Comment