You Are Here: Home » Inspiration » Read it before appearing into Ecommerce odesk test, am sure you will pass if you read it :)

Read it before appearing into Ecommerce odesk test, am sure you will pass if you read it :)

Read it before appearing into Ecommerce odesk test.

I am sure you will pass if you read it :) before appearing into the Ecommerce odesk test. I have collected most of the questions documentation for the odesk solution which will help you to be success in the odesk test as well as be logical in accomplishing the ecommerce application development.

This takes me around three days to collect all these data and the content. I have not collected the questions and the answers but have collected all the related document that will help you to be successful in the odesk e-commerce test

Question 1: Disadvantages of E-Business
Sectoral Limitations.
Shipping problems.
Costly E-Business Solutions for Optimization.

Question 2: Automated Clearing House Transaction
Automated Clearing House (ACH) is an electronic network for financial transactions in the United States.ACH processes large volumes of credit and debit transactions in batches. ACH credit transfers include direct deposit payroll and vendor payments. ACH direct debit transfers include consumer payments on insurance premiums, mortgage loans, and other kinds of bills. Debit transfers also include new applications such as the point-of-purchase(POP) check conversion pilot program sponsored by NACHA-The Electronic Payments Association. Electronic ACH payments provide better cash management capabilities and lower costs than traditional paper payments. 

Question 3: 128 bit SSL

SSL (Secure Sockets Layer), is the standard security technology for encrypting a connection between a web server and a browser. Once established, this connection will encrypt all traffic and ensure that all data passed between the web server and browser remains private.
A key size of 512 bits is considered weak. A key size of 1024 is exponentially stronger, however, it is more and more likely to be broken as computing power increases.The session keys are usually between 40-bit and 256-bit
For more details: http://www.inet2000.com/public/encryption.htm

Question 4: Mondex
Mondex, part of the MasterCard WorldWide suite of smart card products, enables cardholders to carry, store and spend cash value using a payment card. It is faster than handling conventional currency, and in many cases safer. It behaves exactly like cash, offering immediate transfer of value while requiring no signature, PIN or transaction authorization. The unique Mondex platform allows its use in multiple channels where cash cannot be used including:

Question 5: Page Views Portions of the website are called?

Question 6: Superstitials
SUPERSTITIALs are highly interactive, non-banner ads that can be any size on the computer screen and up to 100K in file size, featuring full animation, sound and graphics capable of effectively conveying integrated advertising while protecting a Web site’s performance. A superstitial is a Web ad format developed by Unicast, which calls itself a rich media company.

Question 7: Certificate Revocation List(CRL)
 A certificate revocation list (CRL) is a list of certificates that have been revoked, and therefore should not be relied upon. The CRL is exactly what its name implies: a list of subscribers paired with digital certificate status. The list enumerates revoked certificates along with the reason(s) for revocation. The dates of certificate issue, and the entities that issued them, are also included.

Question 8: DISA (Data Interchange Standards Association)
DISA is a not-for-profit organization with a mission of advancing the foundation of electronic commerce and trade by supporting and promoting standards used for business-to-business (B2B) data exchange. Providing administrative and technical support to the Accredited Standards Committee (ASC) X12, DISA helps individuals and organizations improve business processes, reduce costs, increase productivity and take advantage of new opportunities.

Question 9: EDIFACT
United Nations/Electronic Data Interchange For Administration, Commerce and Transport (UN/EDIFACT) is the international EDI standard developed under the United Nations.
The EDIFACT standard provides:

  • a set of syntax rules to structure data
  • an interactive exchange protocol (I-EDI)
  • standard messages which allow multi-country and multi-industry exchange

Question 12: 12 digit numeric bar code standard used in supermarkets on grocery items
Called UPC bar code.
UPC is universal product code. The Universal Product Code (UPC) is a barcode symbology (i.e., a specific type of barcode), that is widely used in North America, and in countries including the UK, Australia, and New Zealand for tracking trade items in stores. Its most common form, the UPC-A, consists of 12 numerical digits, which are uniquely assigned to each trade item.

Question 12: Subject in digital certificates means?
A digital certificate is an electronic “credit card” that establishes your credentials when doing business or other transactions on the Web. It is issued by a certification authority (CA). Certificates can be created for Unix-based servers with tools such as OpenSSL.

Content of  a digital certificate:
Serial Number: Used to uniquely identify the certificate.
Subject: The person, or entity identified.
Signature Algorithm: The algorithm used to create the signature.
Issuer: The entity that verified the information and issued the certificate.
Valid-From: The date the certificate is first valid from.
Valid-To: The expiration date.
Key-Usage: Purpose of the public key (e.g. encipherment, signature, certificate signing…).
Public Key: The public key.
Thumbprint Algorithm: The algorithm used to hash the certificate.
Thumbprint: The hash itself to ensure that the certificate has not been tampered with.

Question 13: XBRL (eXtensible Business Reporting Language)

XBRL (eXtensible Business Reporting Language) is a freely available, market-driven, open, and global standard for exchanging business information. XBRL allows information modeling and the expression of semantic meaning commonly required in business reporting. XBRL is XML-based. It uses the XML syntax and related XML technologies such as XML SchemaXLinkXPath, and Namespaces to articulate this semantic meaning. One use of XBRL is to define and exchange financial information, such as a financial statement. The XBRL Specification is developed and published by XBRL International, Inc. (XII).

XBRL is a standards-based way to communicate and exchange business information between business systems. These communications are defined bymetadata set out in XBRL taxonomies, which capture the definition of individual reporting concepts as well as the relationships between concepts and othersemantic meaning. Information being communicated or exchanged is provided within an XBRL instance
The XBRL files included on this web page are displayed in their native XML format and have been included to provide you the option of importing them into your XBRL viewer of choice.

For more details http://en.wikipedia.org/wiki/XBRL

 

Question 14:Sabotaging your website

Seven ways to avoid tarnishing your credibility via your Web site:

  1.  Keep text short

    Web users, myself included, are typically very ADD. They have short attention spans and want to find what they are looking for as quickly as possible and with little effort. If a Web site can deliver the info they need in a simple manner, they will view the site as a credible resource of information, to which they will likely return.  Keep content short, concise, and engaging. No one wants to read your fluffy sales text or complicated tech-speak.

  2.  Update content regularly

    If your last blog post is from more than two months ago people will likely move on. Visitors want to see fresh content on a regular basis. Fresh content also has great SEO benefits.

  3.  Fix errors immediately

    You should regularly test your Web site pages, forms, links and other functionality to make sure it’s working correctly. Users are very turned off by sites with errors. If your Web site doesn’t function properly, how are they supposed to believe your product or service will function properly?

  4.  Maintain short page load time so that google indexing is taking consideration about the load time

    Web users don’t have the patience to sit around and wait for pages to load. They want information and they want it now. The quicker your page, video, and Flash presentations load, the better.

  5.  Don’t make them think

    By intentionally designing your site to be user-friendly and simple to navigate you will be taking a giant step forward toward converting your visitors into customers. The design should clearly guide your visitors where you want them to go so they don’t get stuck and have to think about where they should go next.

  6.  Integrate social media

    56% of social media users feel a company is providing a better product or service if they interact with them online. The more transparent, active, and visual you are in social spaces, the more credible you become.

     7. Use current and latest  technologies

    The use of video and motion graphics on Web sites has grown tremendously. By utilizing these technologies to explain complex processes or to tell your story, you are demonstrating to your visitors that keeping up to date with technology is important to your business which is viewed as a highly credible trait.

http://www.effectwebagency.com/marketers-annex-blog/web-strategy/7-ways-to-prevent-sabotaging-your-credibility-via-your-web-site/

Question 15: AVS stands for in the context of ecommerce
Address Verification System. AVS is a service used in the United States to verify a cardholder’s billing address. This service provides fraud prevention for transactions that are completed without a credit card being physically presented (CNP), usually for mail-order, telephone or Internetpurchases.

Question 16: Speed of T-3 internet  connection

T1 and T3 are both examples of high-speed telephone lines. Both of them may be used to provide broadband internet access. Technically, a T1 connection is a fiber-optic or copper line that is separate from the regular phone line. However, the T1 line can be used for both broadband Internet access in addition to phone purposes.

T1 and T3 lines are commonly used by businesses because they offer very fast data transfer rates. This is appealing to businesses that need to transfer large amounts of data each day. Additionally, T lines provide very reliable forms ofInternet access, with “always on” capability and very few incidences of lost Internet connections. In terms of speed, T1 lines operate at 1.5 Mbps, and T3 lines operate at 44.6 Mbps. In other words, T3 lines are about 30 times faster than T1. These high speeds are very useful for heavy Internet traffic situations as well as for situations in which a network must be accessed by a larger number of users. A T1 line operating at full capacity can accommodate up to 24 users working at 64 Kbps.

T-carrier and E-Carrier systems North American Japanese European (CEPT)
Level zero (channel data rate) 64 kbit/s (DS0) 64 kbit/s 64 kbit/s
First level 1.544 Mbit/s (DS1) (24 user channels) (T1) 1.544 Mbit/s (24 user channels) 2.048 Mbit/s (32 user channels) (E1)
(Intermediate level, T-carrier hierarchy only) 3.152 Mbit/s (DS1C) (48 Ch.)
Second level 6.312 Mbit/s (DS2) (96 Ch.) (T2) 6.312 Mbit/s (96 Ch.), or 7.786 Mbit/s (120 Ch.) 8.448 Mbit/s (128 Ch.) (E2)
Third level 44.736 Mbit/s (DS3) (672 Ch.) (T3) 32.064 Mbit/s (480 Ch.) 34.368 Mbit/s (512 Ch.) (E3)
Fourth level 274.176 Mbit/s (DS4) (4032 Ch.) 97.728 Mbit/s (1440 Ch.) 139.264 Mbit/s (2048 Ch.) (E4)
Fifth level 400.352 Mbit/s (DS5) (5760 Ch.) 565.148 Mbit/s (8192 Ch.) 565.148 Mbit/s (8192 Ch.) (E5)

Continue at the following link 

http://rupaknepali.com.np/read-it-before-appearing-into-ecommerce-odesk-test-am-sure-you-will-pass-if-you-read-it-part-2/900.php

Leave a Comment

Read previous post:
Close
Scroll to top