Dear students get fully solved
assignments
Send your semester &
Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
ASSIGNMENT
DRIVE FALL
|
2013
|
PROGRAM
|
BBA
|
SUBJECT CODE & NAME
|
BBA401- E-COMMERCE
|
SEMESTER
|
4
|
BK ID
|
B1712
|
CREDITS
|
4
|
MARKS
|
60
|
Note: Answer all questions. Kindly note that answers for 10 marks
questions should be approximately of 400 words. Each question is followed by
evaluation scheme.
Q.1 a. eBay is The World's Online Marketplace®, enabling trade on a
local, national and international basis. With a diverse and passionate
community of individuals and small businesses, eBay offers an online platform
where millions of items are traded each day. Mention and explain the various
opportunities offered by ecommerce for businesses.
b. What are the advantages and disadvantages of e Commerce?
Ans : a. Listing the
opportunities and explaining
Electronic commerce or e-commerce refers to a wide range of online
business activities for products and services.
Three primary opportunities are:-
1. Fastest Growing Segment:-
Jack Plunkett of Plunkett Research says that growth can be seen across
all age spectra. About 75 million people ages 46 to 84 are living today, many
of whom are still in their "power-earning years" and have a high
potential for discretionary spending.
2. Competition:-
Q.2 a. The TCP/IP reference
model is the network model used in the current Internet architecture. This
model is derived from the OSI model and they are relatively same in nature. Explain
the different characteristics of Gateways in the TCP/IP reference model with a
neat diagram
b. Write short note on Hyper Text Mark up Language (HTML) with example
Ans : a. Characteristics of Gateways in the TCP/IP reference model:
1. TCP/IP has characteristics that enable the protocol to operate as its
standardized implementation requirements dictate. These characteristics can
combine with development choices that result in poor performance.
2. Transactional applications are affected by the overhead required for
connection establishment and termination. For example, each time a connection
is established on an Ethernet network, three packets of approximately 60 bytes
each must be
Q.3 Hanson websites are built to work for your business and are built
on the concept of intelligent website. An intelligent website is more than just
a brochure on the web. It allows you to edit the website yourself through a
Content Management System (CMS). What is the need for an intelligent website?
Ans : Need of intelligent Website:-
An intelligent site is always attractive. It always has the right balance
or attributes, functional characteristics and content and they are organized in
the way that they serve the best to the visits, and also stimulate revisits to
the site. Following are the benefits of an intelligent website:
1. Save you precious time:
Q.4. When a data is sent across
the network it is encrypted and arranged in a way that even
if there is a diversion in the flow of data should not leak the data.
At the reception it is decrypted and actual data is obtained. Explain the different
methods of encryption technique.
Ans : Encryption:-
In cryptography, encryption is the process of encoding messages (or
information) in such a way that third parties cannot read it, but only
authorized parties can. Encryption doesn't prevent hacking but it prevents the
hacker from reading the data that is encrypted. In an encryption scheme, the
message or information (referred to as plaintext) is encrypted using an
encryption algorithm, turning it into an unreadable cipher text (ibid.). This is
usually done with the use of an encryption key, which specifies how the message
is to be encoded. Any adversary that can see the cipher text should not be able
to determine anything about the original message. An authorized party, however,
is able to decode the cipher text using a decryption algorithm, that usually
requires a secret decryption key, that adversaries do not have access to. For
technical reasons, an encryption scheme usually needs a key-generation
algorithm to randomly produce keys.
Various methods of encryption are:
Q.5. Explain the different
categories of electronic payment system in detail.
Ans : These are the kind of
systems that will accept payments through electronic means.
Types of Electronic payment system:
1. Electronic cards:
Electronic cards are designed to reflect your bank
Q.6. We know that there are various internet services which help us to
make the use of network efficiently. Being a regular user of the various
services without probably knowing the technical aspects explain those services
in details with an example.
Ans : Internet services:
1. Electronic Mail:-
Electronic mail is one of the most popular and basic network services.
It's relatively low risk, but that doesn't mean it's risk free. Forging electronic
mail is trivial (just as is forging regular postal mail), and forgeries
facilitate two different types of attacks: attacks against your reputation and
social manipulation attacks (e.g., attacks in which users are sent mail
purporting to come from an administrator and advising them to change to a
specific password). Particularly with modern multimedia mail systems, people
can send electronic mail containing programs that run with insufficient
supervision and may turn out to be Trojan horses .
Dear students get fully solved
assignments
Send your semester &
Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.