CUSAT Exam Papers Electronic Data Interchange Nov 2009

CUSAT Electronic Data Interchange Nov 2009

CUSAT B.Tech. Degree VII Semester Examination,

November 2009

IT 703 ELECTRONIC DATA INTERCHANGE

                                                                                    (Common for 1999 & 2002 Schemes)

Time: 3 Hours                                                                                                                                     Maximum Marks: 100

I.

(a)

What is EDI? Explain its historical background.

(8)

 

(b)

Briefly describe EDIFACT.

(5)

 

(c)

Explain the working of EDI.

OR „

(7)

II.

(a)

Explain the implementation guidelines of EDI.

(8)

,

(b)

Describe the stragegic implications of EDI.

(12)

III.

(a)

Briefly explain the legal and audit issues of EDI.

(7)

 

(b)

Write a note on Trading Partner Agreements.

(5)

 

(c)

What is EDP Auditing? Explain the various phases involved in EDP Auditing.

OR

(8)

IV.

(a)

Explain the issues that arise in international trade.

(12)

 

(b)

Explain the issues in a Future Global Trading Network.

(8)

V.

(a)

Explain the following: „

(i)                   Open EDI

(ii)                 Business Re-engineering

(8)

(5)

 

(b)

Describe software interfaces for commercial integration in EDI.

OR

(7)

VI.

(a)

Explain knowledge based design for EDI integration.

(8)

 

(b)

What are the project management issues in development of EDI business?

(12)

 

  1. (a) Explain the role of corporate gateways in EDI networks.                                                                        (12)

(b)                 Describe the role of EDI in international trade.                                                                                                  (8)

OR

  1. ; Explain the following with suitable examples.

(i)                   APEC and its relevance                                                                                         (8)

(ii)                  Communication protocols used in EDI                                                              (7)

(iii)                International Trading Networks                                                                           (5)

  1. (a) Describe EDI security threats.                     (10) (b) Briefly explain any two symmetric key algorithms.      (10)

OR

  1. (a) Explain Key Management.                                                                                                                              (7)

(b)                 Briefly explain any one asymmetric key algorithm.                                                                        (8)

(c)                 Why EDI systems are more vulnerable than the systems they replace?                                      (5)

Leave a Comment