Professional Documents
Culture Documents
Transactions with the trading partners or between the officers of the company located at
different locations.
Maintenance of records needed for legal purposes, including taxation, legal suits etc.
Standard processes for buying and selling; well accepted hardware and software and
secure
commercial and transport practices.
8. List any three basic banking activities.
AnswerThree basic banking activities
1. Account checking,
2. ATM, payment of bills,
3. fund transfer etc.
9.What does ATM stand for.
AnswerATM stand for Automated Teller machine
10. Define EDI.
AnswerElectronic Data Interchange.
11. Define EFT.
AnswerElectronic Data Interchange.
12. Name a few operations performed by e-commerce.
AnswerPayment, fund transfer, order entry, invoicing etc.
13. Define a framework.
AnswerFramework is intended to define and create tools that integrate information.
14.. Define a information Brokerage.
AnswerAn intermediary who provides integration between customers and information providers
15. Define middle ware.
AnswerIt is a mediator between diverse application programs that talk to each other.
16. Name the three stages of e-commerce architecture on web.
AnswerThe three stages of e-commerce architecture on web are
1. Client browser
2. WWW server functions and
3. Third party services.
17. Name the three broad phases of consumers perspective.
Answer-
Critical mass of buyers and sellers. The trick is getting a critical mass of corporations
andconsumers to use electronic mechanisms. In other words, the electronic marketplace
should be the first place customers go to find the products and services they need.
Opportunity for independent evaluations and for customer dialogue and discussion. In the
marketplace, not only do users buy and sell products or services, they also compare notes
on who has the best products and whose prices are outrageous. The ability to openly
evaluate the wares offered is a fundamental principle of a viable marketplace
New products and services. In a viable marketplace, consumers can make requests for
products and services not currently offered and have a reasonable expectations that
someone will turn up with a proposed offering to meet that request.
Seamless interface. The biggest barrier to electronic trade is having all the pieces work
together so that information can flow seamlessly from one source to another. This
requires standardization. On the corporate side, companies need compatible EDI software
and network services in order to send electronic purchase orders, invoices, and payments
back and forth.
Reduced paper-based systems: EDI can impact the effort and expense a company devotes
to maintaining records, paper- related supplies, filing cabinets, or other storage systems
and to the personnel required to maintain all of these systems. EDI can also reduce
postage bills because of the amounts of paper that no longer need be sent..
Improved problem resolution and customer service: EDI can minimize the time
companies spend to identify and resolve interbusiness problems. EDI can improve
customer service by enabling the quick transfer of business documents and a marked
decrease in errors.
Expanded customer/supplier base: Many large manufacturers and retailers with the
necessary clout are ordering their suppliers to institute an EDI program. However, these
are isolated islands of productivity because they are unable to build bridges to other
companies. With the advent of electronic commerce, the bridge is now available.
30. List four advantages of Internets.
AnswerFlat pricing, cheap access, common standards and secure.
31. What is supply chain management?
. What is a virus?
Ans:
A virus is a program that infects other programs by modifying these programs to include its
copy. Viruses can easily replicate themselves to spread to other computer systems. Viruses are
responsible for various security breaches. For example, they can alter data in files, change
disk assignments, create bad sectors, decrease fee space on disk, destroy File Allocation Table
(FAT), erase specific programs, format specific tracks or entire disk, hang the system,
overwrite disk directory, suppress execution of RAM resident programs, write a volume label
on the disk, and so on.
business online. The strategy is the basic of the other elements. According to the
strategy, you will define the design and technology.After having the platform
ready,define the design and technology.After having the platform ready,its time to
fill in it with content. Content consists of product information, images, videos and
other useful information to help
customers buy products or services.Its impossible to have a successful e-commerce
channel without marketing. Online marketing will do the job.After online marketing,
you have to start testing and optimizing your store in order
to increase sales.
3.E-Commerce Goals
We will work with you to implement your e-commerce goals. We do however have
certain goals that we wish to accomplish in conjunction with yours. A common belief
on the internet is 'the one second principle'. This means you have one second to
make a strong, professional impression that will establish
trust and generate interest. Remember, it takes less than a second to click the back
button on your browser to go back to a search engine. So you have a second or so
to present your company as a vendor of products or services and begin the sales
process. Recent research by Gartner and Jupiter Media Metrix suggests,
convenience, usability and marketing clarity are even more important
than price for online shoppers. With that in mind AgaveIS creates sites with
the goals of: Top E-Commerce Goals
to distinguish a legitimate credit card user from a thief. In online transactions the
user is usually asked to provide additional information, such as their address and
phone number, and the card's billing address, if different from the customer's
address. However, this information can be easily mistyped. While in a telephone
transaction an operator can use their judgment to approve or reject a transaction
based on how much of the information has matched and how confident the
customer sounds, in an online transaction the level of "tolerance" of typos and
mistakes must be set automatically. Another way of verifying a card number is to
ask the user to provide the additional digits on the card (the digits which do not
appear on the magnetic strip or on a carbon paper when the print of the card is
taken). However, online customers may be reluctant to provide this information
because of fear of merchant's fraud (see below) or of eavesdropping.
Protecting card numbers in transmission. Since information transmitted in an
online transaction is sufficient for approval of a credit card charge, it is
essential that this information is protected from eavesdropping. The most
common way of doing it is to encrypt data in transmission. This is done via SSL.
However, many online businesses do not use SSL when transmitting credit card
numbers and other customer information, or do not make SSL the default for
information sent in plain text (in an e-mail message or via an online form),
so far there hasn't been a known case when a credit card number was stolen
this way.
vulnerability of dealing with credit card numbers is not the transmission, but
the storage. Security experts agree that storing credit card numbers at the
is (at least partially) accessible to customers, nor should they be stored (in
any form) on the web server. See the lecture on security for more details.
fraud. An e-commerce web site may suffer large losses, including those caused
information.
Protecting from merchant fraud The other side of protecting a merchant from a
the merchant knows enough of the customer's credit card information to be able
to protect the reputation of the business and their own, and a fraud is not in
of data over its entire life-cycle,[1] and is a critical aspect to the design,
data. The term data integrity is broad in scope and may have widely different
meanings depending on the specific context - even under the same general
loss. The overall intent of any data integrity technique is the same: ensure
mutually exclusive possibilities,) and upon later retrieval, ensure the data
services and offers to sell them to customers for money or other goods.
mood.[1]
The shopping experience can also be influenced by other shoppers. For example,
research from a field experiment found that male and female shoppers who were
accidentally touched from behind by other shoppers left a store earlier than
people who had not been touched and evaluated brands more negatively,
A larger commercial zone can be found in many cities, more formally called a
central business district, but more commonly called "downtown" in the United
bazaars.
Stores[edit]
Stores are divided into multiple categories of stores which sell a selected
set of goods or services. Usually they are tiered by target demographics based
on the disposable income of the shopper. They can be tiered from cheap to
pricey.
Some shops sell secondhand goods. Often the public can also sell goods to such
shops. In other cases, especially in the case of a nonprofit shops, the public
donates goods to these shops, commonly known as thrift stores in the United
States or charity shops in the United Kingdom. In give-away shops goods can be
taken for free. In antique shops, the public can find goods that are older and
harder to find. Sometimes people are broke and borrow money from a pawn shop
books back though college textbook bookstores. Old used items are often
Many shops are part of a shopping center that carry the same trademark
(company name) and logo using the same branding, same presentation, and sell
the same products but in different locations. The shops may be owned by one
Various types of retail stores that specialize in the selling of goods related
shops, hardware stores, hobby stores, pet stores, pharmacies, sex shops and
supermarkets.
Home shopping[edit]
home. There are three main types of home shopping: mail or telephone ordering
Online shopping has completely redefined the way people make their buying
at any given time. Online shopping allows the buyer to save the time and
expense, which would have been spent traveling to the store or mall.
Neighborhood shopping[edit]
Corner stores are common in the United States, and are often called bodegas in
Spanish speaking communities. Sometimes peddlers and ice cream trucks pass
through neighborhoods offering goods and services. Also, garage sales are a
Party shopping[edit]
using the event to display and demonstrate the product or products to those
gathered, and then to take orders for the products before the gathering ends.
use the same cryptographic keys for both encryption of plaintext and
shared secret between two or more parties that can be used to maintain a
private information link.[2] This requirement that both parties have access to
the secret key is one of the main drawbacks of symmetric key encryption, in
encryption.