E Business
E Business
E Business
Ans - E-Business: E-Business, short for electronic business, refers to conducting business
activities using the internet and other digital technologies. It encompasses a wide range of
functions, including buying and selling goods and services, managing customer relationships,
conducting financial transactions, and collaborating with business partners, all facilitated
through electronic networks.
Evolution of E-Business:
1. Early Internet Presence: E-Business began to emerge in the 1990s with the increasing
popularity and accessibility of the internet. Initially, companies created basic websites to
provide information about their products and services.
3. Expansion of Services: E-Business evolved beyond online retail to include various digital
services such as online banking, travel reservations, digital content distribution, and more.
This expansion broadened the scope of e-business applications.
4. Mobile and Social Integration: With the proliferation of smartphones and social media
platforms, e-businesses adapted their strategies to cater to mobile users and leverage social
networks for marketing, customer engagement, and sales.
Significance of E-Business:
2. 24/7 Accessibility: Online platforms enable businesses to operate round the clock, providing
customers with the convenience of accessing products and services anytime, anywhere.
3. Cost Efficiency: E-Business often reduces operational costs associated with traditional brick-
and-mortar establishments, such as rental expenses, staffing, and inventory management.
Overall, E-Business has revolutionized the way businesses operate, offering unprecedented
opportunities for growth, efficiency, and innovation in the digital age.
Importance of EDI:
2. Accuracy: EDI eliminates the need for paper-based documentation and manual data entry,
reducing the risk of errors associated with transcription and interpretation. This ensures the
accuracy and integrity of data exchanged between trading partners.
Merits of EDI:
1. Increased Productivity: EDI automates routine tasks such as order processing, invoicing,
and inventory management, freeing up employees to focus on more strategic activities.
2. Improved Accuracy: EDI reduces the likelihood of errors inherent in manual data entry and
paper-based processes, leading to higher data accuracy and reliability.
4. Enhanced Security: EDI employs encryption and authentication mechanisms to secure data
transmission, safeguarding sensitive business information from unauthorized access,
interception, or tampering.
5. Better Customer Service: EDI enables businesses to respond quickly to customer inquiries,
track orders in real-time, and provide accurate and timely information, thereby enhancing
customer satisfaction and loyalty.
Demerits of EDI:
1. Implementation Costs: The initial setup and implementation of EDI systems can be
expensive, involving investment in hardware, software, training, and integration with existing
systems.
2. Complexity: EDI standards and protocols can be complex, requiring specialized knowledge
and expertise to implement, configure, and maintain. This complexity may pose challenges
for smaller businesses or those with limited technical resources.
5. Lack of Flexibility: EDI standards are often rigid and may not accommodate custom
requirements or changes in business processes without significant effort and cost. This lack of
flexibility can limit agility and innovation in business operations.
History of the Internet: The development of the internet can be traced back to the
late 1960s, with the inception of ARPANET (Advanced Research Projects Agency
Network), a pioneering network funded by the U.S. Department of Defense.
ARPANET was designed to facilitate communication and resource sharing among
researchers and institutions involved in defense-related projects. It introduced
packet-switching technology, which allowed data to be broken down into packets
and transmitted across multiple nodes on the network.
Over the following decades, the internet evolved from a limited research network
into a global communication infrastructure. Key milestones in its history include:
1. TCP/IP Protocol Suite: The development of the Transmission Control Protocol (TCP)
and Internet Protocol (IP) in the 1970s laid the foundation for the modern internet
architecture. TCP/IP became the standard communication protocol for networking
devices and facilitated the interoperability of diverse computer systems.
3. Global Connectivity: The 1990s saw the proliferation of internet service providers
(ISPs) and the establishment of high-speed internet infrastructure, including fiber-
optic cables and broadband networks. This expansion facilitated global connectivity,
enabling individuals and organizations worldwide to access the internet and
participate in online activities.
4. Web 2.0 and Social Media: The early 2000s witnessed the emergence of Web 2.0
technologies, characterized by user-generated content, interactive applications, and
social media platforms. Websites such as Facebook, YouTube, Twitter, and Wikipedia
transformed the internet into a dynamic and participatory platform, enabling users to
create, share, and collaborate on content in real-time.
5. Mobile Internet and IoT: The proliferation of smartphones and mobile devices in
the 2010s fueled the growth of mobile internet usage, allowing users to access online
services and content on the go. Furthermore, the rise of the Internet of Things (IoT)
connected devices, such as smart home appliances, wearable gadgets, and industrial
sensors, expanded the internet's reach into various aspects of daily life and business
operations.
Ans
1 Digital cash -
Digital cash refers to an electronic form of currency that enables secure and instantaneous
transactions over digital networks. It serves as a digital equivalent of physical cash, allowing
individuals and businesses to make payments, transfers, and purchases online without the
need for physical currency or traditional banking infrastructure. Here are some key points
about digital cash:
2. Security: Digital cash transactions are secured through cryptographic techniques, such as
encryption and digital signatures, which protect the integrity and confidentiality of financial
data. These security measures help prevent unauthorized access, fraud, and counterfeiting.
3. Anonymity and Privacy: Digital cash systems may offer varying levels of anonymity and
privacy for users. While some systems allow for pseudonymous transactions, others may
require user identification and verification to comply with regulatory requirements.
5. Types of Digital Cash: Digital cash can take various forms, including cryptocurrencies like
Bitcoin, stablecoins pegged to fiat currencies, electronic payment systems like PayPal and
Venmo, and mobile payment apps like Apple Pay and Google Pay.
Overall, digital cash offers convenience, security, and efficiency in conducting financial
transactions in the digital age, while also posing regulatory and technological challenges that
require careful consideration and adaptation by stakeholders.
2 . E-Cheques:
E-Cheques, short for electronic cheques, are digital equivalents of traditional paper-based
cheques used for making payments and transferring funds between bank accounts. They
leverage electronic networks and digital technologies to facilitate secure and efficient cheque
transactions. Here are some key points about e-cheques:
1. Digital Format: E-cheques are represented in digital format, typically in the form of
electronic files or data packets, instead of physical paper documents. They contain essential
cheque information, such as the payer's account details, payee's information, amount, and
signature.
6. Advantages:
Overall, e-cheques offer a modern and efficient alternative to traditional paper-based cheque
payments, providing users with greater convenience, speed, and security in conducting
cheque transactions in the digital age.
3. MICR Cheques:
MICR (Magnetic Ink Character Recognition) cheques are a type of paper-based payment
instrument commonly used in banking transactions. Here's a brief overview:
1. Encoding Technology: MICR cheques contain specific characters printed with magnetic ink,
which is capable of being magnetized. These characters typically include the cheque number,
bank routing number, account number, and transaction amount.
2. Machine Recognition: MICR technology allows for the rapid and accurate reading of
cheque information by specialized MICR readers. These devices use magnetic sensors to
detect and interpret the magnetic patterns on the cheque, facilitating automated processing
and validation.
3. Security Features: MICR encoding enhances cheque security by making it difficult to alter
or counterfeit cheque information. The magnetic ink characters are resistant to tampering and
forgery, providing an added layer of authentication and fraud prevention.
4. Banking Standard: MICR encoding has become a standard method for encoding cheque
information in many countries. It ensures consistency and interoperability in cheque
processing across different banks and financial institutions, streamlining the clearing and
settlement process.
5. Usage: MICR cheques are commonly used for various banking transactions, including
issuing payments, making deposits, and transferring funds. They are widely accepted by
businesses, organizations, and individuals for conducting cheque-based transactions.
6. Advantages:
Accuracy: MICR technology offers high accuracy and reliability in reading and
processing cheque data, reducing errors and processing delays.
Efficiency: MICR cheques enable automated processing and sorting, leading to faster
cheque clearing and settlement times.
Security: The magnetic ink characters on MICR cheques provide enhanced security
against fraud and unauthorized alterations, ensuring the integrity of cheque
transactions.
7. Limitations:
Cost: MICR cheque printing requires specialized equipment and magnetic ink, which
can increase printing costs compared to standard cheques.
Maintenance: MICR reading devices and processing equipment require regular
maintenance to ensure optimal performance, adding to operational expenses for banks
and financial institutions.
Overall, MICR cheques continue to be an integral part of the banking infrastructure, offering
a reliable and secure method for processing cheque-based transactions. Their widespread
adoption and standardized encoding contribute to the efficiency and security of cheque
processing systems.
1. Usage: Online credit cards function similarly to physical credit cards but are primarily used
for online transactions. They allow users to make purchases from online retailers, pay bills,
book travel accommodations, and engage in other e-commerce activities.
2. Digital Format: Online credit cards are typically represented in a digital format, with card
details stored electronically. Users can access their credit card information through online
banking portals, mobile apps, or digital wallets for online transactions.
3. Security Measures: Online credit cards incorporate security features to protect against fraud
and unauthorized use. These may include encryption, tokenization, two-factor authentication,
and fraud monitoring systems to safeguard sensitive card information and detect suspicious
activity.
4. Virtual Cards: Some online credit card issuers offer virtual credit cards, which are
temporary card numbers generated specifically for online transactions. Virtual cards provide
an added layer of security by allowing users to create unique card numbers for each online
purchase, reducing the risk of card data theft and fraud.
5. Convenience: Online credit cards offer convenience and flexibility for making online
purchases without the need for cash or physical cards. They allow users to shop from the
comfort of their homes or on the go, accessing a wide range of products and services from
online merchants worldwide.
6. Credit Limits and Rewards: Online credit cards come with predefined credit limits,
allowing users to spend up to a certain amount based on their creditworthiness. Additionally,
many online credit cards offer rewards programs, cashback incentives, and other perks for
cardholders who make online purchases.
7. International Transactions: Online credit cards are widely accepted for international
transactions, enabling users to shop from global retailers and merchants. They may also offer
currency conversion services and protection against foreign transaction fees for cross-border
purchases.
8. Payment Security: Online credit cards provide protection against unauthorized transactions
and disputes through chargeback rights and fraud liability protection. Users can report
fraudulent charges or unauthorized transactions to their card issuer for investigation and
resolution.
Overall, online credit cards offer a convenient, secure, and flexible payment method for
conducting online transactions, empowering users to shop and pay for goods and services
across the digital landscape.