BBA401- E-COMMERCE


Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
  “ help.mbaassignments@gmail.com ”


ASSIGNMENT

DRIVE FALL
2013
PROGRAM
BBA
SUBJECT CODE & NAME
BBA401- E-COMMERCE
SEMESTER
4
BK ID
B1712
CREDITS
4
MARKS
60


Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.


Q.1 a. eBay is The World's Online Marketplace®, enabling trade on a local, national and international basis. With a diverse and passionate community of individuals and small businesses, eBay offers an online platform where millions of items are traded each day. Mention and explain the various opportunities offered by ecommerce for businesses.
b. What are the advantages and disadvantages of e Commerce?

Ans :  a. Listing the opportunities and explaining

Electronic commerce or e-commerce refers to a wide range of online business activities for products and services. 

Three primary opportunities are:-

1. Fastest Growing Segment:-

Jack Plunkett of Plunkett Research says that growth can be seen across all age spectra. About 75 million people ages 46 to 84 are living today, many of whom are still in their "power-earning years" and have a high potential for discretionary spending.

2. Competition:-



Q.2  a. The TCP/IP reference model is the network model used in the current Internet architecture. This model is derived from the OSI model and they are relatively same in nature. Explain the different characteristics of Gateways in the TCP/IP reference model with a neat diagram
b. Write short note on Hyper Text Mark up Language (HTML) with example

Ans : a. Characteristics of Gateways in the TCP/IP reference model:

1. TCP/IP has characteristics that enable the protocol to operate as its standardized implementation requirements dictate. These characteristics can combine with development choices that result in poor performance.

2. Transactional applications are affected by the overhead required for connection establishment and termination. For example, each time a connection is established on an Ethernet network, three packets of approximately 60 bytes each must be


Q.3 Hanson websites are built to work for your business and are built on the concept of intelligent website. An intelligent website is more than just a brochure on the web. It allows you to edit the website yourself through a Content Management System (CMS). What is the need for an intelligent website?

Ans : Need of intelligent Website:-

An intelligent site is always attractive. It always has the right balance or attributes, functional characteristics and content and they are organized in the way that they serve the best to the visits, and also stimulate revisits to the site. Following are the benefits of an intelligent website:

1. Save you precious time:


Q.4.  When a data is sent across the network it is encrypted and arranged in a way that even
if there is a diversion in the flow of data should not leak the data. At the reception it is decrypted and actual data is obtained. Explain the different methods of encryption technique.

Ans : Encryption:-

In cryptography, encryption is the process of encoding messages (or information) in such a way that third parties cannot read it, but only authorized parties can. Encryption doesn't prevent hacking but it prevents the hacker from reading the data that is encrypted. In an encryption scheme, the message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable cipher text (ibid.). This is usually done with the use of an encryption key, which specifies how the message is to be encoded. Any adversary that can see the cipher text should not be able to determine anything about the original message. An authorized party, however, is able to decode the cipher text using a decryption algorithm, that usually requires a secret decryption key, that adversaries do not have access to. For technical reasons, an encryption scheme usually needs a key-generation algorithm to randomly produce keys.

Various methods of encryption are:



Q.5.  Explain the different categories of electronic payment system in detail.

Ans : These are the kind of systems that will accept payments through electronic means.

Types of Electronic payment system:

1. Electronic cards:

Electronic cards are designed to reflect your bank


Q.6. We know that there are various internet services which help us to make the use of network efficiently. Being a regular user of the various services without probably knowing the technical aspects explain those services in details with an example. 

Ans :  Internet services:

1. Electronic Mail:-

Electronic mail is one of the most popular and basic network services. It's relatively low risk, but that doesn't mean it's risk free. Forging electronic mail is trivial (just as is forging regular postal mail), and forgeries facilitate two different types of attacks: attacks against your reputation and social manipulation attacks (e.g., attacks in which users are sent mail purporting to come from an administrator and advising them to change to a specific password). Particularly with modern multimedia mail systems, people can send electronic mail containing programs that run with insufficient supervision and may turn out to be Trojan horses .


Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
  “ help.mbaassignments@gmail.com ”

No comments:

Post a Comment

Note: only a member of this blog may post a comment.