Sie sind auf Seite 1von 8

SIKKIM MANIPAL UNIVERSITY, D E

Student Name: Akshay Bhatnagar Reg. No.: 521117401 Subject Name: e Commerce Course: BBA LC Code:00918 Subject Code: BBA401

Q1. a. There is always a need of bigger network in the usiness because such network between consumers and companies can lead to new business opportunity. Suppose a company offering bouquets online may also think of delivering cakes, greeting cards and gifts for some price. Think of such others requirements of e-commerce and write a note on it b. Network Interface Card (NIC) operates at the physical layer of OSI model. The MAC address provides a way to distinguish one NIC from other NIC. Bring out the properties of different network access equipment Ans 1) A) The following are the requirements of e-commerce Improved customer services : These days consumers want better services. Therefore, e-commerce services offer a means of communication between the consumer and the company. The consumer can even make online complaints can to a company. Most websites provide a different e-mail id where complaints can be mailed. Customer-oriented hearing. Action is taken almost immedietly . It is possible for satisfied as well as dissatified cuntomer to express their opinions and also make suggestions. The bonding between the company and the cuntomer strengthens. Origin of new business opportunity: Bigger network between companies can lead to new businees opportunities. consumers and

Enhanced speed and accuracy of a product: The usage of e-commerce services reduces human errors and other problems like a duplication of proceedings. This perfection in speed and accuarcy, plus easy access to documents and information affect the increase in production. A customer care executive may often forget to enter necessary details of a transaction. She may have to call up and bother the customer will fill in his own details. Reconfirmation may not be necessary at all. Wastage of time and money can be checked. Product cost saving: Despite the fact that you can reduce the cost of a product by the use of e-commerce services, it also reduces the errors and the cost of sending the information to partners. b) Network Access Equipment

SIKKIM MANIPAL UNIVERSITY, D E


Hubs: All networks (except those using coaxial cable) require a central locationto bring media segments together. These central locations are called Hubs. Hubs are special repeaters that overcome the electromechanical limitations ofa media signal path. Switches: It supports transmitting receiving and controling traffic with othercomputers on the network. MAC (Media Access Control) address is hard-codedon the card by manufacture. This MAC address is globally unique. Comparison of Hubs and Switch Hub is broadcasting device while switch is point-to-point communicationdevice. Hub operates at physical layer while switch operates atdata ink layer. Switch can be used as a repeater but hub cannot be used as repeater. Switch uses switching table to find out the correct destination while hubsimply broadcasts the incoming packet.

Repeaters: Repeaters are devices that operate at thephysical layer of the OSI model. The basic purpus of a repeaters is to extenndhe of LAN. Their primary purpose is simply to regenerate a signalrecived from input and correct the signal to its original state for output. Q2. a. Firewall must be easy to install, run and use. Brief the different factors to be considered in a firewall. b. List and explain the three different types of software which help to connect to the internet. A)Factors to Consider in a Firewall When selecting a firewall, the following factors should be considered: Ease of use Level and quality of protection Whether it is free Its level of intelligence Its technique/strategy for coping with Internet connection sharing Ease of use The firewall must be easy to install, run and use. Take the example of Windows

SIKKIM MANIPAL UNIVERSITY, D E


SP2firewall; it is quite good, but not user friendly. How good is the protection? Does the firewall block outgoing security threats, as it does with incoming ones? Is it free? If not, why should I purchase as opposed to a free solution? It is important to check out if the firewall software is free. If it is being offered free, chances are it will be a basic, cut-down version of the complete package. . How intelligent is it? Some firewall software may be more intelligent than others. An intelligent firewall will recognize a genuine Windows application when it tries to access the Internet, while another (which is not intelligent) will need to be prompted on whether access should be denied or not. How does it cope with Internet connection sharing? Those that use Internet Connection Sharing (ICS) through Windows XP, a firewall that blocks the user from identifying an IP address or from making use of an internet connection can be a botheration. However, it is definitely not advisable to frequent the net without the assistance of a firewall. You will probably have to do a trial and error before you find the firewall best suited to your needs. B) Internet Software There are three types of Internet software which help to connect to the Internet. 1. Protocol: Transmission Control Protocol/Internet Protocol (TCP/IP) is the basic communication protocol which enables users to communicate over the Internet. It is the group of communication protocols used to connect hosts on the Internet. 2. Dialer software: This software is given by an Internet Service Provider (ISP). It identifies a users name and telephone number through a modem. After successful identification, the modem connects the computer to the Internet. 3. Web browser: A Web browser accesses content on the Web and then displays it on a computer screen. Examples of Web browsers are Internet Explorer, Mozilla Firefox and Google Chrome, which allow users to view content on the Web. Q3. Explain the different standards for a secure electronic payment system Ans. Electronic payment systems Electronic payment systems are non-credit-card online payment systems. The goal of their development is to create analogs of checks and cash on the Internet, i.e. to implement all or some of the following features: Protecting customers from merchant's fraud by keeping credit card numbers unknown to merchants. Allowing people without credit cards to engage in online transactions.

SIKKIM MANIPAL UNIVERSITY, D E


Protecting confidentiality of customers. In some cases providing anonymity of customers ("electronic cash"). The problems in implementing electronic payment systems, especially anonymous electronic money, are: Preventing double-spending: copying the "money" and spending it several times. This is especially hard to do with anonymous money. Making sure that neither the customer nor the merchant can make an unauthorized transaction. The procedure for purchasing an item using Virtual PIN is as follows: The customer gives the merchant their Virtual PIN. The merchant sends the Virtual PIN and the amount of transaction to First Virtual. First Virtual sends an e-mail to the customer asking to confirm the purchase. The customer answered "Yes", "No", or "Fraud".

DigiCash (or E-cash) DigiCash (also known as E-cash) is an electronic payment system developed by Dr. David Chaum, who is widely regarded as an inventor of digital cash. The system was based on digital tokens called digital coins. DigiCash operated as follows:

CyberCash/CyberCoin CyberCash is a system that allows customers to pay by a credit card without revealing the credit card number to the merchant. To achieve this, a credit card number is sent to the merchant in an encrypted form. A purchase was conducted the following way: When the purchase was initiated, the CyberCash wallet displayed the amount, the merchant's name, and other information. After the customer approved the transaction, an encrypted payment order was sent to the merchant. The company was eventually bought by VeriSign. SET (Secure Electronic Transactions)

SIKKIM MANIPAL UNIVERSITY, D E


SET is the Secure Electronic Transaction protocol for sending money over Internet. It has been developed jointly by MasterCard, Visa, and several computer companies. SET uses mechanisms similar to CyberCash. However, being a standard protocol, it is built into a wide variety of commercial products. In SET the order information consists of two parts: the part which is private between the PayPal PayPal is an electronic payment system which can transfer money between its accounts. In order to use PayPal, one has to obtain a PayPal account, which is associated either with the customer's credit card or with their regular bank account. The validity of a credit card is checked by the usual ways. The validity of a checking account is checked as follows: the customer gives PayPal their account number, PayPal makes two small-amount (less than $1) deposits to the account. If the customer is able to tell PayPal the value of these deposits, then the customer is assumed to be a legitimate user of the account.

Q4. Rajesh works in Bangalore office in a Multi-national Company. He goes to Delhi on an official duty and wishes to log into his system there. How can he do that? Explain different types of internet services. Ans. INTERNET SERVICES are as follows: World Wide Web According to Wikipedia, the World Wide Web is a system of interlinked hypertext documents accessed via the Internet. You can use a Web browser to view texts, images, videos and multimedia on web pages and navigate between them using hyperlinks. Electronic Mail Electronic mailor e-mailhas been around from even before the Internet. Wikipedia explains that e-mail is any method of digitally creating, transmitting or storing human communication that is primarily textual. A host of electronic mail systems have been designed in the past, but there were problems with respect to compatibility and interoperability. However, with the proliferation of the Internet since the 1980s, major efforts have been madeand successfully File Transfer Protocol File Transfer Protocol (FTP) is a generic term for a cluster of programs used to transfer files or data from one computer to another. It is a network protocol that allows an FTP client to connect to an FTP server and manipulate files on that server. Therefore, this protocol can be used to exchange and manipulate files across computers.

SIKKIM MANIPAL UNIVERSITY, D E


Telnet Telnet (Telecommunication network) is a network protocol used on the Internet or in local area network (LAN) connections. It was developed in 1969 and is one of the first Internet standards. With Telnet, a user can get access to a command line interface on a remote machine. . Web Chat Web chat allows users to communicate with one another in real time through Web interfaces. A Web browser is the only requirement to be able to chat on the Web. Online Services The first commercial online services became available in 1979. Anyone who had a modem and communicating software could chat and e-mail; or access news, financial and stock market information, various forums, bulletin boardsand other general information. These services used text-based interfaces and menus. The problem with these services was that subscribers could exchangee-mails only with those who subscribed to the same service. Instant Messaging Instant messaging (IM), as explained by Wikipedia is, A form of real-time communication between two or more people based on typed text. The text is conveyed via devices connected over a network such as the Internet. Q5. Write note on a. Hyper Text Markup language b. Hyper Text Transfer Protocol c. Uniform Resource Locators d. Website e. Search engines Ans. HyperText Markup Language (HTML) is the main markup language for creating web pages and other information that can be displayed in a web browser. a) HTML is written in the form of HTML elements consisting of tags enclosed in angle brackets (like <html>), within the web page content. HTML tags most commonly come in pairs like <h1> and </h1>, although some tags, known as empty elements, are unpaired, for example <img>. The first tag in a pair is the start tag, the second tag is the end tag (they are also called opening tags and closing tags). In between these tags web designers can add text, tags, comments and other types of text-based content. b) The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems.[1] HTTP is the foundation of data communication for the World Wide Web.

SIKKIM MANIPAL UNIVERSITY, D E


Hypertext is a multi-linear set of objects, building a network by using logical links (the so-called hyperlinks) between the nodes (e.g. text or words). HTTP is the protocol to exchange or transfer hypertext. c) URL stands for Uniform Resource Locator. A URL is a formatted text string used by Web browsers, email clients and other software to identify a network resource on the d) A website, also written as Web site,[1] web site, or simply site,[2] is a set of related web pages served from a single web domain. A website is hosted on at least one web server, accessible via a network such as the Internet or a private local area network through an Internet address known as a Uniform Resource Locator. All publicly accessible websites collectively constitute the World Wide Web. A webpage is a document, typically written in plain text interspersed with formatting instructions of Hypertext Markup Language (HTML, XHTML). A webpage may incorporate elements from other websites with suitable markup anchors. e) A web search engine is a software system that is designed to search for information on the World Wide Web. The search results are generally presented in a line of results often referred to as search engine results pages (SERPs). The information may be a specialist in web pages, images, information and other types of files. Some search engines also mine data available in databases or open directories. Unlike web directories, which are maintained only by human editors, search engines also maintain real-time information by running an algorithm on a web crawler. Q6.Describe the different types of Internet marketing. Ans. Internet marketing is the online marketing which refers to the marketing of services or products through internet. It is the most cost effective way to connect with your customers as well as to advertise your products and services. But if you are a businessman and started using internet for marketing your services or products, you must keep few things, in your mind like, 1. Who are your target customers? 2. Are you making full use of internet for promoting your services? 3. Is this promotion effective enough? 4. If you are advertising your products properly and are these advertisements enough for services you are providing? Easy and fast access to the internet not only makes it user-friendly but is an important factor to make your customer base strong. It results in very fast response as your

SIKKIM MANIPAL UNIVERSITY, D E


customer can contact you directly. You must know what to offer visitors of your website and turn them into customers. Internet Marketing Strategies: Search Engine Optimization: Use proper keywords or tags while writing blogs or articles for your website, so that it becomes visible when users click on popular search engines. Paid advertising or advertising through banners: You must put the banners of your website on others website on the profit sharing basis so that viewers get attracted towards your website. Social Networking Sites: By signing up on social networking sites, you can easily interact with your potential customers and even send them emails and get their feedback on your services. Measuring the ROI (Return on Investment): You must keep check on profit you are earning from your investments. RSS and News Article feeds: To advertise and keep check on your services. This really is absolutely a strong foundation however, might too take this research to the upcoming level by incorporating keyword research. This will include having to determine the key terms employed by industry leaders, competitors plus most crucial, a target market. The internal research can fuel the creative back-end of your collateral generation, if inside print, whilst the keyword compilation might help the meta info and content generation for the website laying the groundwork for the much publicized need for SEO (search engine optimization).

Das könnte Ihnen auch gefallen