Answer:-A. The Various Opportunities Offered by Ecommerce For Businesses
Answer:-A. The Various Opportunities Offered by Ecommerce For Businesses
Answer:-A. The Various Opportunities Offered by Ecommerce For Businesses
Amazon is the world's online marketplace for all the books, enabling
trade on a local, national and international basis. With a diverse and passionate
community of individuals and small businesses, Amazon offers an online platform
where millions of items are traded each day. Mention and explain the various
opportunities offered by ecommerce for businesses.
b. What are the advantages and disadvantages of eCommerce?
Answer:- a. The various opportunities offered by ecommerce for businesses.
Many businesses need e-commerce software services to help take advantage
of e-commerce areas.
1. Tourism and Travel Sector: This sector has updated its system with ecommerce
services. Consumers can make online reservations of hotels,
motels, air tickets, railway tickets, etc.
2. Banking Sector: Most banks have changed their working style by making
their services available online through their respective websites.
3. Health Care Sector: This sector is large and uses a major part of
government expenses. So, most health care companies communicate or
exchange their services with each other.
4. Stock Sector: In the stock exchange sector, e-commerce services provide
demat account facilities for customers who can do an overall analysis of
the status of the stock areas and do their respective transactions.
5. Financial Sector: In India, the financial sector has adopted e-commerce
Disadvantages of E-Commerce
1. Lack of customer awareness: People who have no knowledge about
Que:- a. The TCP/IP reference model is the network model used in the current
Internet architecture. This model is derived from the OSI model and they are
relatively same in nature. Explain the different characteristics of Gateways in the
TCP/IP reference model with a neat diagram
b. Write short note on Hyper Text Markup Language (HTML) with example
Answer:- In spite of the model you use to represent the function of a networkand
regardless of what you call that modelthe functions that the model represents
are pretty much the same. This means that the TCP/IP and the OSI models are
relatively same in nature even if they do not carve up the network functionality
pie in precisely the same way. There is a fairly natural correspondence between
the TCP/IP and OSI layers; it just isnt always a one-to-one relationship. Since
the OSI model is used so widely, it is common to explain the TCP/IP architecture
both in terms of the TCP/IP layers and the corresponding OSI layers.
Diagram
Characteristics of Gateways
Gateway routers are used to connect dissimilar LANs and perform all the
functions of bridges and routers. It operates as all seven layers of the
OSI Reference Model.
Gateways provide full protocol conversion from one proprietary LAN
technology to another.
Gateway uses higher layers of the OSI model, perhaps through layer 7,
the application layer.
Diagram
The TCP/IP model (refer to Figure 2.5) has four layers that match six of
the seven layers in the OSI Reference Model. The TCP/IP model does not
address the physical layer, which is where network component and hardware
devices reside. The next three layersnetwork interface, the Internet and (hosttohost) transportcorrespond to layers 2, 3 and 4 of the OSI model. The TCP/
IP application layer conceptually blurs the top three OSI layers. It is important
to note that some people consider certain aspects of the OSI session layer to
be possibly part of the TCP/IP host-to-host transport layer.
HTML
HTML is a method where ordinary text can be converted into hypertext. It is a
set of special codes included to control the layout and appearance of the text.
Technically, HTML is not a programming language. It combines instruction within
data to tell a display program called browser, how to render the data that the
document contains.
The following is the structure of HTML:
<html>
<head> about authors </head>
<title> First Page </title>
<body>
<h1> Hello this my Home page!
</body>
</html>
Form tag is an important element for doing online business. Forms are necessary
for gathering user information, conducting surveys, or even providing interactive
services. Forms are supported by both client and server for successful
implementation. A number of features are available for building forms, including
text boxes, check boxes, radio buttons, submit buttons and text area. A user
can enter text, selects items from a list, check boxes, and then submit the
information to the server. A program on the server then interprets the data acts
on it appropriately, either by returning information in hypertext form, downloading
a file, or electronically notifying the company of your order. Generating forms in
HTML is only half the task. The harder part is to
decode the input data submitted from the form. All the programs use data
submitted from the form. All the programs that use data submitted from an
HTML form must conform to the specification called Common Gateway Interface
(CGI).
The important aspect of web server development is application gateway,
more specifically, CGI, which is a specification for communicating data between
an information server, in this case, Web server, and another application. CGI is
used wherever the web server needs to send or receive data from another
application, such as a database. A CGI script is a program that negotiates the
movement of data between the Web server and an outside application.
Use of CGI is to pass data, filled in by a user in an HTML form, from the
web server to a database. Data also can be returned to the users browser via
CGI. CGI scripts may be written in high level language such as C and Perl,
because they can run so many platforms.
Que3:-Hanson websites are built to work for your business and are built on the
concept of intelligent website. An intelligent website is more than just a brochure on
the web. It allows you to edit the website yourself through a Content Management
System (CMS). What is the need for an intelligent website?
Answer :One cannot build an intelligent website that optimally has all sources of
information for an online company, overnight. Actually, it is a long process that
requires significant investment in technology, and an accumulation of knowledge
that can come only with experimentation and trial and error. Website intelligence
leverages four types of information.
(i) Demographics:
(ii) Expressed Preferences
(iii) Past Transactions.
(iv) Observed Behaviour:
Consider the following steps that e-commerce companies typically follow
in leveraging their information.
Step 1: Basic Web traffic analysis
Before starting any Web activity, one first needs to analyse the Web traffic. This
type of data provides a record of the entry and exit points into a website, pages
that were visited, links that were followed, the duration for which a person viewed
a particular page, the precise day and time of visit, the browser type, visitors IP
address and other information.
Step 2: Customer interaction analysis
This step is used to collect more information about the customers interactions
with the website. The registered users are people who have had to register for
site usage, generally by filling out a survey form. As you know, in any site (even
a free site) the user has to fill a registration form in which there are various
types of questions related to profession, education, age, gender, leisure activities,
merchandise purchasing, etc. Through this registration process, the site is able
to get information related to both the demographics and preference. This type
of data is used to help inform personalization engines to serve the contents
according to the visitors interests.
Step 3: Real-time personalization
Personalization is the ultimate realization of the one-to-one marketing dream.
Customers are recognized when they come in; they can tailor the way they
interact with the merchant; and receive promotions and marketing pogrammes
that perfectly fit their personal requirements and preferences.
Hash function
cryptography works.
encrypt the message and the other is used to decrypt it. This can be viewed as
two parts; one part of the key pair, the private key, is known only by the designated
owner. The other part, the public key, is published widely but is still associated
with the owner of the private key. Figure 8.3 shows how public key encryption works.
Que 5:- Explain the different categories of electronic payment system in detail
Answer :- A secured payment transaction system is of critical importance to e-commerce.
Without standard security, you cannot assume the success of e-commerce,
hence, there are two common standards used for a secure electronic payment
system:
1. Secure Socket Layer (SSL)
2. Secure Electronic Transaction (SET)
1. Secure Socket Layer (SSL)
Secure socket layer (SSL), is a protocol that enables data security layers between
high-level application protocols and TCP/IP. It provides:
Data encryption
Server authentication
Message integrity
Optional client authentication
SSL is layered between application protocols such as HTTP, SMTP,
TELNET, FTP and GOPHER, above the Internet connection protocol,
TCP/IP.
SSL gives a security Handshake protocol to start the TCP/IP connection.
The consequence of this handshake is that the client and the server agree on
the level of security they would use and completes any verification necessities
required for the connection. After that, it is only used to decrypt and encrypt the
message stream.
SSL makes available encryption that begins a secure channel to thwart
third parties on the network from being able to interfere with and read messages
that are communicated between the client and the server. It also helps
confirmation that uses a digital signature to verify the authenticity of the server.
To offer security, the Netscape Navigator supports a new URL access method,
https, for linking to HTTP servers using SSL (that means http is a protocol that
is simply SSL underneath HTTP).
We should use https:// for HTTP URLs with SSL, whereas you continue
to use http;// for HTTP URLs without SSL, as (HTTP + SSL)= https, and HTTP
are different protocols and typically reside on different ports (443 and 80,
respectively). However, the similar server system can run boththe server and
the insecure HTTP server simultaneously. This shows that HTTP can offer some
information to all users using no security and https can provide only secure
information. As for instance, merchant catalogue can be insecure but the ordering
payment forms could be secure.
The advantage of SSL over secure HTTP is that SSL is not limited to
HTTP, but can also be used for making secure FTP and TELNET among other
the bank.
4. Over a web page, the customer places an order.
5. The merchants certificate is received by the browser of the customer and
the latter confirms it from the certificate of the merchant, the validity/
invalidity of the merchant.
6. The order information is sent by the browser after encryption with the
merchants public key, and the payment information is encrypted with the
banks public key.
7. The merchant validates the customer by examining the customers
certificate on the digital signature. This is done by referring the certificate
to the bank or third party.
8. With the banks public key, the merchant gives the order message to the
bank as well as the merchants certificate, and the customers information.
9. The bank authenticates the merchant and the message with the help of
the digital signature on the certificate along with the message and verifies
the payment part of the message.
10. The bank digitally signs and sends authorization to the merchant, who