You are on page 1of 18

1.Define commerce.

AnswerCommerce is normally associated with the buying and selling of items.


2.Before the advent of networks, how was data being transferred between computers?
AnswerWith secondary memories like floppies
3.Name two stages of commerce that cannot be automated.
AnswerProduction of goods and delivery of goods.
4.What is the role of encryption in data transfer
AnswerTo ensure security of data.
5.Name two areas which are reasons of worry in e-commerce.
AnswerSecurity and legal acceptance
6. List the categories of operations comes under e-commerce.
AnswerThe following categories of operations comes under e-commerce.

Transactions between a supplier/a shopkeeper and a buyer or between two companies


over a public network like the service provider network (like ISP). With suitable
encryption of data and security for transaction, entire operation of selling/buying and
settlement of accounts can be automated.

Transactions with the trading partners or between the officers of the company located at
different locations.

Information gathering needed for market research.

Information processing for decision making at different levels of management.

Information manipulation for operations and supply chain management.

Maintenance of records needed for legal purposes, including taxation, legal suits etc.

Transactions for information distributions to different retailers, customers etc. including


Advertising, sales and marketing.
7. List any three basic needs of consumer oriented e-commerce.
Answer-

Standard processes for buying and selling; well accepted hardware and software and
secure
commercial and transport practices.
8. List any three basic banking activities.
AnswerThree basic banking activities
1. Account checking,
2. ATM, payment of bills,
3. fund transfer etc.
9.What does ATM stand for.
AnswerATM stand for Automated Teller machine
10. Define EDI.
AnswerElectronic Data Interchange.
11. Define EFT.
AnswerElectronic Data Interchange.
12. Name a few operations performed by e-commerce.
AnswerPayment, fund transfer, order entry, invoicing etc.
13. Define a framework.
AnswerFramework is intended to define and create tools that integrate information.
14.. Define a information Brokerage.
AnswerAn intermediary who provides integration between customers and information providers
15. Define middle ware.
AnswerIt is a mediator between diverse application programs that talk to each other.
16. Name the three stages of e-commerce architecture on web.
AnswerThe three stages of e-commerce architecture on web are
1. Client browser
2. WWW server functions and
3. Third party services.
17. Name the three broad phases of consumers perspective.
Answer-

Pre-purchase determination, purchase consummation, post purchase interaction.


18. What are the categories of consumers?
AnswerImpulsive buyers, patient buyers and analytical buyers.
19. What are the four types of purchases?
AnswerThe four types of purchases areSpecifically planned, Generally planned, reminder purchases and unplanned purchases.
20. Why are information brokerages needed?
AnswerTo help in comparison shopping, reduce search costs and integration.
21. What is order selection?
AnswerPrioritize orders based on same factors.
22. What is the need for standardization?
AnswerTo move seamlessly across various hardware and software.
23. List the desirable characteristics of e-commerce market place?
AnswerThe following criteria are essential for consumer-oriented electronic commerce:

Critical mass of buyers and sellers. The trick is getting a critical mass of corporations
andconsumers to use electronic mechanisms. In other words, the electronic marketplace
should be the first place customers go to find the products and services they need.

Opportunity for independent evaluations and for customer dialogue and discussion. In the
marketplace, not only do users buy and sell products or services, they also compare notes
on who has the best products and whose prices are outrageous. The ability to openly
evaluate the wares offered is a fundamental principle of a viable marketplace

Negotiation and bargaining. No market place is complete if it does not support


negotiation. Buyers and sellers need to be able to haggle over conditions of mutual
satisfaction, including money, terms and conditions, delivery dates, and evaluation
criteria.

New products and services. In a viable marketplace, consumers can make requests for
products and services not currently offered and have a reasonable expectations that
someone will turn up with a proposed offering to meet that request.

Seamless interface. The biggest barrier to electronic trade is having all the pieces work
together so that information can flow seamlessly from one source to another. This
requires standardization. On the corporate side, companies need compatible EDI software
and network services in order to send electronic purchase orders, invoices, and payments
back and forth.

Recourse for disgruntled buyers. A viable marketplace must have a recognized


mechanism for resolving disputes among buyers and sellers. Markets typically include a
provision for resolving disagreements by returning the product or through arbitrage in
other cases.

24.What is double spending?


AnswerDouble spending Spending the same cash in more than one place.
25. What are the three types of electronic tokens?
AnswerCash, debit and credit (also called real time, prepaid and post paid).
26. What is an electronic purse.
AnswerIt is card with a pre-determined amount of money loaded.
27. What is movie on demand?
AnswerThe viewer selects the movie to view an the TV against payment.
28. Name any two concepts of TV based home entertainment?
AnswerMovie an demand and on line games.
29. List the tangible benefits of EDI.
AnswerSaving also accrue from the following improvements:

Reduced paper-based systems: EDI can impact the effort and expense a company devotes
to maintaining records, paper- related supplies, filing cabinets, or other storage systems
and to the personnel required to maintain all of these systems. EDI can also reduce
postage bills because of the amounts of paper that no longer need be sent..

Improved problem resolution and customer service: EDI can minimize the time
companies spend to identify and resolve interbusiness problems. EDI can improve
customer service by enabling the quick transfer of business documents and a marked
decrease in errors.

Expanded customer/supplier base: Many large manufacturers and retailers with the
necessary clout are ordering their suppliers to institute an EDI program. However, these
are isolated islands of productivity because they are unable to build bridges to other
companies. With the advent of electronic commerce, the bridge is now available.
30. List four advantages of Internets.
AnswerFlat pricing, cheap access, common standards and secure.
31. What is supply chain management?

AnswerIt is the chain of suppliers and customers for a particular business.


32. Define virtual organization?
AnswerIt is a network closely coupled upstream with suppliers and downstream with
customers.
33. What are the primary elements of SCM
AnswerLogistics, integrated marketing and agile manufacturing
34. What is non-repudiation?
AnswerA person cannot deny after having sent / received a message.
35. List the four basic goals of electronic Security?
AnswerPrivacy, Integrity, authentication and availability.
36. What is IP spoofing?
AnswerIt is a tool that intruders use to take over an open terminal and login
connections after they
get root access.
37. What is Telnet?
AnswerTelnet enables users to log in to remote computers.
38. Name the two type of threats to data.
AnswerActive threats and passive threats.
10. On what factors can negotiations take place?
AnswerOver money, terms and conditions, delivery dates and evaluation criteria.

. What is a virus?
Ans:
A virus is a program that infects other programs by modifying these programs to include its
copy. Viruses can easily replicate themselves to spread to other computer systems. Viruses are
responsible for various security breaches. For example, they can alter data in files, change
disk assignments, create bad sectors, decrease fee space on disk, destroy File Allocation Table
(FAT), erase specific programs, format specific tracks or entire disk, hang the system,
overwrite disk directory, suppress execution of RAM resident programs, write a volume label
on the disk, and so on.

1.key element of e commerce:The basic elements of E-commerce consists of a strategy, design,technology


(code) , content and marketing.Strategy will define the initial purpose of your

business online. The strategy is the basic of the other elements. According to the
strategy, you will define the design and technology.After having the platform
ready,define the design and technology.After having the platform ready,its time to
fill in it with content. Content consists of product information, images, videos and
other useful information to help
customers buy products or services.Its impossible to have a successful e-commerce
channel without marketing. Online marketing will do the job.After online marketing,
you have to start testing and optimizing your store in order
to increase sales.

2.factor can negotiation takes place.


So far, Section 2 of this paper has outlined the commerce process, and shown how
the negotiation part of it currently has little electronic support.Section 3 outlined a
road map of negotiation processes and broke the work down along two dimensions
the type of problem and the type of approach to the
problem. Section 4 provided a literature review of research which appears to be the
most applicable, and directed the reader to the Appendix for more literature on the
other areas outlined in the road map.This section uses contributions from the
various fields covered in the
literature review to help synthesize the requirements for automated negotiation
processes in electronic commerce. It divides the issues into four major categories of
consideration: phrasing the negotiation properly, system architecture, the actual
negotiation process, and macroscopic considerations.While we are not irrevocably
committed to each of these requirements, we feel that they are worth strong
consideration.

3.E-Commerce Goals
We will work with you to implement your e-commerce goals. We do however have
certain goals that we wish to accomplish in conjunction with yours. A common belief
on the internet is 'the one second principle'. This means you have one second to
make a strong, professional impression that will establish
trust and generate interest. Remember, it takes less than a second to click the back
button on your browser to go back to a search engine. So you have a second or so
to present your company as a vendor of products or services and begin the sales
process. Recent research by Gartner and Jupiter Media Metrix suggests,
convenience, usability and marketing clarity are even more important
than price for online shoppers. With that in mind AgaveIS creates sites with
the goals of: Top E-Commerce Goals

Fast loading pages.


Compact, efficient code and images are all essential to fast loading pages that allow
visitors to see what they came to the site for quickly before hitting the back button.
Clean, product centric layout.
We want your visitors to be able to find the products that they want quickly and in
as little number of steps as possible. This means dynamically
generating web pages based on user metrics so that they are presented with the
best possible product mix on their visits. It also means an emphasis on displaying
products and not on gimmick.
Efficient and intuitive navigation structure.Customers should be able to browse your
site as easily as possible so that they can find what they came for and even what
they may not be aware of.Checkout oriented usage flow.The site should be as simple
to use as possible and inspire confidence in the
user so as to lead them from product selection through payment as painlessly as
possible.Search engine friendly code.
The site should be as search engine friendly as possible so that potential customers
can find your site when searching for the goods or services which you carry. To
accomplish this the pages should be created in such a way to emphasize specific
keywords. Other strategies can include creating multiple landing pages for specific
products or services that different end users might be searching for using different
terms.

4.name any four issues addressed by payment system?


Quick check for typos. Since the merchant may be charged for each credit card
authorization, it is convenient to check that the credit card number makes sense
before sending it to the issuing bank to authorize. There is an easy algorithm to
verify a credit card number: the last digit of the credit card
number is computed from the other digits using a simple procedure. The details are
given here.
The algorithm is public, and therefore can be used only to catch typos and disallow
random data, but not to check the validity of a credit card number.
Authenticating the user -- protection from customer fraud. Since the card is not
physically present during the transaction, it is practically impossible for a merchant

to distinguish a legitimate credit card user from a thief. In online transactions the
user is usually asked to provide additional information, such as their address and
phone number, and the card's billing address, if different from the customer's
address. However, this information can be easily mistyped. While in a telephone
transaction an operator can use their judgment to approve or reject a transaction
based on how much of the information has matched and how confident the
customer sounds, in an online transaction the level of "tolerance" of typos and
mistakes must be set automatically. Another way of verifying a card number is to
ask the user to provide the additional digits on the card (the digits which do not
appear on the magnetic strip or on a carbon paper when the print of the card is
taken). However, online customers may be reluctant to provide this information
because of fear of merchant's fraud (see below) or of eavesdropping.
Protecting card numbers in transmission. Since information transmitted in an
online transaction is sufficient for approval of a credit card charge, it is
essential that this information is protected from eavesdropping. The most
common way of doing it is to encrypt data in transmission. This is done via SSL.

However, many online businesses do not use SSL when transmitting credit card

numbers and other customer information, or do not make SSL the default for

such transmissions. While it is theoretically possible to obtain credit card

information sent in plain text (in an e-mail message or via an online form),

so far there hasn't been a known case when a credit card number was stolen

this way.

Protecting card numbers on the merchant's site. In practice, the main

vulnerability of dealing with credit card numbers is not the transmission, but

the storage. Security experts agree that storing credit card numbers at the

merchant's site is a risky practice, and should be avoided. If credit card

numbers need to be stored, they should be stored on a secure machine, and

preferably in an encrypted form. They should not be stored in a database which

is (at least partially) accessible to customers, nor should they be stored (in

any form) on the web server. See the lecture on security for more details.

It is the merchant's responsibility to protect customer's information from

fraud. An e-commerce web site may suffer large losses, including those caused

by the loss of customer's trust, it fails to protect confidential customer

information.

Protecting from merchant fraud The other side of protecting a merchant from a

customer's fraud is protection of a customer against a merchant's fraud. If

the merchant knows enough of the customer's credit card information to be able

to authorize a transaction, then the merchant (including many of the

merchant's employees) know enough to be able to use the credit card

themselves! In the majority of cases the highest priority of the merchant is

to protect the reputation of the business and their own, and a fraud is not in

the merchant's interests. However, there may be exceptions, such as a

desperate owner whose business is about to go broke, a disgruntled employee,

or an online scam which uses a fake online business as a coverup for

collecting credit card information.

5.What are the normal constraints put on e-cash?


A validity limit, the more amount that can be stored, more no. of exchanges

and no. of exchanges within a time period.

6.what is mean by integrity of data?


Data integrity refers to maintaining and assuring the accuracy and consistency

of data over its entire life-cycle,[1] and is a critical aspect to the design,

implementation and usage of any system which stores, processes or retrieves

data. The term data integrity is broad in scope and may have widely different

meanings depending on the specific context - even under the same general

umbrella of computing. This article provides only a broad overview of some of

the different types and concerns of data integrity.

Data integrity is the opposite of data corruption, which is a form of data

loss. The overall intent of any data integrity technique is the same: ensure

data is recorded exactly as intended (such as a database correctly rejecting

mutually exclusive possibilities,) and upon later retrieval, ensure the data

is the same as it was when it was originally recorded. In short, data

integrity aims to prevent unintentional changes to information. Data integrity

is not to be confused with data security, the discipline of protecting data

from unauthorized parties.

7.note on different kind of shopping


A retailer or shop is a business that presents a selection of goods or

services and offers to sell them to customers for money or other goods.

Shopping is an activity in which a customer browses the available goods or

services presented by one or more retailers with the intent to purchase a

suitable selection of them. In some contexts it may be considered a leisure

activity as well as an economic one.


A woman shopping at a shopping mall in the United States in December 2005.
The shopping experience can range from delightful to terrible, based on a

variety of factors including how the customer is treated, convenience, and

mood.[1]
The shopping experience can also be influenced by other shoppers. For example,

research from a field experiment found that male and female shoppers who were

accidentally touched from behind by other shoppers left a store earlier than

people who had not been touched and evaluated brands more negatively,

resulting in the Accidental Interpersonal Touch effect


Shopping hubs[edit]

A larger commercial zone can be found in many cities, more formally called a

central business district, but more commonly called "downtown" in the United

States, or in Arab cities, souks. Shopping hubs, or shopping centers, are

collections of stores; that is a grouping of several businesses.

A group of women window shopping in Toronto, Canada in 1937.


Typical examples include shopping malls, town squares, flea markets and

bazaars.

Stores[edit]

Stores are divided into multiple categories of stores which sell a selected

set of goods or services. Usually they are tiered by target demographics based

on the disposable income of the shopper. They can be tiered from cheap to

pricey.

Some shops sell secondhand goods. Often the public can also sell goods to such

shops. In other cases, especially in the case of a nonprofit shops, the public

donates goods to these shops, commonly known as thrift stores in the United

States or charity shops in the United Kingdom. In give-away shops goods can be

taken for free. In antique shops, the public can find goods that are older and

harder to find. Sometimes people are broke and borrow money from a pawn shop

using an item of value as collateral. College students are known to resell

books back though college textbook bookstores. Old used items are often

distributed though surplus stores.

Many shops are part of a shopping center that carry the same trademark

(company name) and logo using the same branding, same presentation, and sell

the same products but in different locations. The shops may be owned by one

company, or there may be a franchising company that has franchising agreements

with the shop owners often found in relation to restaurant chains.

Various types of retail stores that specialize in the selling of goods related

to a theme include bookstores, boutiques, candy shops, liquor stores, gift

shops, hardware stores, hobby stores, pet stores, pharmacies, sex shops and

supermarkets.

Other stores such as big-box stores, hypermarkets, convenience stores,

department stores, general stores, dollar stores sell a wider variety of

products not horizontally related to each other.

Home shopping[edit]

Home mail delivery systems and modern technology (such as television,

telephones, and the Internet), in combination with electronic commerce and

business-to-consumer electronic commerce systems, allow consumers to shop from

home. There are three main types of home shopping: mail or telephone ordering

from catalogs; telephone ordering in response to advertisements in print and

electronic media (such as periodicals, TV and radio); and online shopping.

Online shopping has completely redefined the way people make their buying

decisions; the Internet provides access to a lot of information about a

particular product, which can be looked at, evaluated, and comparison-priced

at any given time. Online shopping allows the buyer to save the time and

expense, which would have been spent traveling to the store or mall.

Neighborhood shopping[edit]

Corner stores are common in the United States, and are often called bodegas in

Spanish speaking communities. Sometimes peddlers and ice cream trucks pass

through neighborhoods offering goods and services. Also, garage sales are a

common form of second hand resale.

Party shopping[edit]

The party plan is a method of marketing products by hosting a social event,

using the event to display and demonstrate the product or products to those

gathered, and then to take orders for the products before the gathering ends.

8.secret key cryptography?

Symmetric-key algorithms[1] are a class of algorithms for cryptography that

use the same cryptographic keys for both encryption of plaintext and

decryption of ciphertext. The keys may be identical or there may be a simple

transformation to go between the two keys. The keys, in practice, represent a

shared secret between two or more parties that can be used to maintain a

private information link.[2] This requirement that both parties have access to

the secret key is one of the main drawbacks of symmetric key encryption, in

comparison to public-key encryption.[3]This is also known as private key

encryption.

9.what is the role of encryption in data transfer?


Encryption process help to send the data in uncripted format thus it provide security
of data to send source to destination.

You might also like