bba-401

16
BBA401- E-COMMERCE 1) a. listing the opportunities and explaining :- 1. Tourism and Travel Sector: This sector has updated its system with ecommerce services. 2. Banking Sector: Most banks have changed their working style by making their services available online through their respective websites. 3. Health Care Sector: This sector is large and uses a major part of government expenses. 4. Stock Sector: In the stock exchange sector, e- commerce services provide demat account facilities for customers who can do an overall analysis of the status of the stock areas and do their respective transactions. 5. Financial Sector: In India, the financial sector has adopted e-commerce services and the users make maximum use of the same. b. listing the main advantages :- 1. All-time processing: Customers can use the marketplace at all times with the use of e-commerce services. 2. Better service: Customers are fully satisfied and receive better service. 3. No mediators: Customers can directly contact the suppliers and remove all mediators. 4. Data on consumer performance: Using the e-commerce services, onecan understand consumer behaviour, for example, websites, products,

Upload: nirali

Post on 15-Nov-2015

2 views

Category:

Documents


0 download

DESCRIPTION

assignment

TRANSCRIPT

BBA401- E-COMMERCE

1) a. listing the opportunities and explaining :- 1. Tourism and Travel Sector: This sector has updated its system with ecommerce services. 2. Banking Sector: Most banks have changed their working style by makingtheir services available online through their respective websites.3. Health Care Sector: This sector is large and uses a major part ofgovernment expenses. 4. Stock Sector: In the stock exchange sector, e-commerce services provide demat account facilities for customers who can do an overall analysis of the status of the stock areas and do their respective transactions.5. Financial Sector: In India, the financial sector has adopted e-commerce services and the users make maximum use of the same.

b. listing the main advantages :- 1. All-time processing: Customers can use the marketplace at all timeswith the use of e-commerce services.2. Better service: Customers are fully satisfied and receive better service.3. No mediators: Customers can directly contact the suppliers and remove all mediators.4. Data on consumer performance: Using the e-commerce services, onecan understand consumer behaviour, for example, websites, products,schemes and modes of payment which are preferred by the customer.5. Time saving: Customers can save time because they can purchaseanything through the merchant websites.

listing the disadvantages:- 1. Lack of customer awareness: People who have no knowledge aboutelectronic communication like the Internet, and computers find it difficultto transact electronically.2. Not for small business: Small businessmen do not want to take anyextra burden because they have no knowledge of e-commerce functions.3. Does not support all types of businesses: Some types of businessesare not fit for e-commerce services.4. Legal formalities: Before implementing e-commerce services in thebusiness, it is necessary to complete certain legal formalities likeauthorization and authentication.2) Write short note on Hyper Text Markup Language (HTML) with exampleCharacteristics :- Gateway routers are used to connect dissimilar LANs and perform all thefunctions of bridges and routers. It operates as all seven layers of theOSI Reference Model. Gateways provide full protocol conversion from one proprietary LAN technology to another. Gateway uses higher layers of the OSI model, perhaps through layer 7,the application layer.1. Application:- Represents data to the user plus encodingand dialog control.2. Transport:- Support communication between diversedevices across diverse networks (usingTCP/IP).3. Internet:- Determines the best path through the Network ( using gateway).Controls the hardware devices and media4. Network Layer that make up the network .

explanation on HTML :-HTML is a method where ordinary text can be converted into hypertext. It is aset of special codes included to control the layout and appearance of the text.Technically, HTML is not a programming language.The following is the structure of HTML:

about authors First Page

Hello this my Home page!

< HTML>: This tag defines the top most elements, identifying it as an HTML document.: This tag contains information about your HTML file.: This tag is nested within the head tag. It identifies your page to the rest of the world. Output of tag is displayed on your browsers title bar but does not appear as part of the page.:This is a body part of your HTML web page. Within this tag all thevarious tag is used. Every tag has prespecified attributes and there possibleLevels of Heading: Six different levels up to ,,,,,Adding a comments:Creating List: There are two types of list : ordered list and unordered list.Ordered List:

  1. MS-Windows
  2. MS-Excel
  3. MS-Word

Unordered List:

  • MS-Windows
  • MS-Excel
  • MS-Word

    Creating Definition Lists:A glossary consists of three tag elements:: Define the List: Define term: Define the definitionInserting Images:To insert images in your page use tag as follows:

    Marquee tag:This tag offers some movement from up, down, left, right of given text: MY Moving Textis displayed here Table tag:Page layout on the web has to be set by using tables because HTML has nomethod to set margin or columns.Form tag:Form tag is an important element for doing online business. Forms are necessaryfor gathering user information, conducting surveys, or even providing interactive services. Forms are supported by both client and server for successful implementation. A number of features are available for building forms, includingtext boxes, check boxes, radio buttons, submit buttons and text area. A user can enter text, selects items from a list, check boxes, and then submit the information to the server.

    3) It allows you to edit the website yourself through a Content Management System(CMS). What is the need for an intelligent website?As per the recent statistics, over 60% of the new websites are built using Content Management System (CMS). It is rapidly gaining popularity among the website owners and developers since it's very user-friendly and easy-to-maintain.Regardless of the size of your business and the niche it caters to, creating and managing your website has to be less time-consuming. CMS allows you the ability to quickly and easily update your website and its content yourself. Using the powerful Content Management System tools such as WordPress, Joomla and Drupal, we, at e-Intelligence, enable you to manage, market and measure your business on the web, more effectively and effortlessly. Work with the Award-winning CMS Website Designing AgencyThe main reason why we stand taller than the rest of the agencies, is that we never compromise on quality and user experience. Right from conceptualization of your website to its delivery and maintenance, perfection is our motto. When developing your dynamic seo-friendly CMS website, our team works closely with your team to identify and thoroughly understand your requirements. This helps us in creating a sharp, subtle and professional website design, which can easily adapt to the future growth requirements of your business. Its our job to make your website look impressive, regardless of what device your visitors are viewing it on.

    4) Explain the different methods of encryption technique

    1. Secret key or symmetic key cryptographyIn this scheme, both the sender and the recipient possess the same key toencrypt and decrypt the data. Data Encryption StandardData Encryption Standard (DES) is an example of secret key cryptography. It was developed by IBM. DES is block cipher-based scheme which encrypts a 64-bit data block using a 56-bit key. Drawbacks of secret key cryptographyIf there are n correspondents, you have to keep track of n differentsecret keys. If the same key is used by more than one correspondent,the common key holders can read each others mail.2. Triple EncryptionAs discussed, the DES is a block cipher and employs shared secret encryption.But, nowadays DES is considered unsafe for various applications primarily due to the 56-bit key size which is too small. 3. Public key cryptographyThis scheme operates on a double key, called pair key, one of which is used to encrypt the message and the other is used to decrypt it. Encryption and Decryption Data encrypted with a public key can only be decrypted with a private key. Data encrypted with a private key can only be decrypted with a public key.

    Advantages of public key cryptographyMessage confidentiality can be proved: The sender uses the recipients public key to encrypt a message, so that only the private key holder can decrypt the message, and no one else.Authenticity of the message originator can be proved: The receiver uses his private key to encrypt a message, to which only the sender has access.Easy to distribute public key: The public key of the pair can be easilydistributed.Hash function:Hash function is a formula that converts a message of a given length into astring of digits called a message digest. A mathematical transformation is usedby the hash function to encrypt information such that it is irreversible. Theencrypted ciphertext message cannot be decrypted back to plaintext. (a) The sender generates a message.(b) A Message Digest of the message is created using the hash function.(c) The sender attaches the digital signature to the end of the message.(d) The sender encrypts both message and signature with the receivers publickey.

    5) Explain the different categories of electronicpayment system in detail:-Electronic Token-based Payment System electronictoken (e-token) in the form of electronic cash/cheque has been developed. It isrecognized as equivalent to cash and is backed by banks.Types of electronic tokens: There are three types of e-tokens.(a) Type 1- In this type of electronic business deal, the cash transaction iscompleted with the exchange of electronic currency(b) Type 2 Debit or prepaid: In this type of transaction, users have to pay inadvance for any product or services. (c) Type 3Credit or Postpaid: In this type of transaction, a central serververifies the customer and checks with the bank whether funds are sufficientbefore any interchanges are made. 1. Electronic CashElectronic cash (e-cash) is a form of electronic payment system based onencryption. This means it is a secure payment system. Before a product isbought or services availed cash has to be obtained from a currency server. How to purchase e-cashThe buying of e-cash from an online currency server (or bank) involves twosteps:(a) Establishing an account(b) Keeping an adequate amount of money in the bank to back the purchasesCurrently, in most e-cash trials, all customers must have an account witha central online bank. Transactions must be available to access and pay forforeign services or national services. The customer applies for the amount and denomination of e-cash thathe/she needs. This amount is debited from the customers account.To digitally sign the note for the given amount, the bank uses its privatekey and sends the note back to the customer. For encoding a message into a cipher text, a locking key is used.While the key that encodes is kept private, the key that decodes ismade public. The bank gives to all its customersboth sellers and buyersits publickey. In e-cash, transaction takes place in three steps as follows:Step - 1: Getting electronic cash(a) The consumer requests his/her bank to transfer money to the currencyserver to get e-cash.(b) The consumer bank transfers money from the consumers account to thecurrency server.(c) The e-mint sends e-cash to the consumer. The consumer receives his/her cash.Step - 2: Purchasing with electronic cash(a) The consumers select the goods and transfer the e-cash to the merchant.(b) The product is made available to the customers by the merchant. Step step - 3: Redeeming cash by the merchant(a) The merchant may send the e-cash to its bank and the bank in turnredeems the money from the currency server.(b) The currency server transfers money to the merchants bank for creditingthe merchants account.Currency ServerThe currency server is a special term used in EPS. The customer and themerchant can exchange the different currencies depending upon the machineused. Properties of e-cashThe following are the four properties of e-cash:(a) Monetary value: Although one bank creates e-cash but other banks acceptit.(b) Interoperability: E-cash is negotiable as payment for paper currency, goodsand services.(c) Retrieval and storage: The other quality of e-cash is that it is storable andretrievable.(d) Security: E-cash is not easy to copy.Advantages of e-cash E-cash is best suited for small transactions. Authentication is not an issue. Who pays is not important as long as themerchant gets his payment. E-cash can be issued in very small denominations that can be used topay for small transactions. The low cost of e-transactions makes it feasible for merchants to chargesmall amounts without losing profit.2. Electronic ChequesElectronic cheque (e-cheque) is a form of e-token. E-cheque is planned to accept individuals or a group who prefers to pay on credit or through some method, but not through cash. An electronic cheque has all the same features as a paper cheque. Step - 1: Purchasing goods(a) The consumer accesses the merchant server and the merchant serverpresents its goods to the consumer.(b) The consumer selects the goods and purchases them by sending anelectronic cheque to the merchant.(c) The merchant may validate the electronic cheque with its bank for paymentauthorization.(d) Assuming the cheque is validated, the merchant closes the transactionwith the consumer.Step - 2: Depositing cheques at the merchants bank(a) The merchant electronically forwards the cheque to the bank.(b) The merchant bank forwards the e-cheque to the clearing house forcashing.(c) The clearing house with the consumer bank, clears the cheque andtransfers the money to the merchants bank, which updates the merchantaccount.(d) The consumers bank updates the consumer with the withdrawalinformation. FSTC systemThe Financial Services Technology Corporation (FSTC) is a consortium of banks and clearing houses that has designed the electronic cheque. The electronic cheque system uses digital signature for signing and endorsing. FSTC offers users the choice of payment instruments that allow them to designate an electronic cheque as a certified cheque or an electronic charge card slip for greater flexibility.Cyber cash electronic chequeCyber cash is an extension of a wallet for credit cards. Unlike the cyber cashcredit card system, cyber cash will not serve as an intermediate party forprocessing cheques. 3. Smart CardsSmart cards, containing microprocessors, are able to hold more informationthan cards based on the traditional magnetic strips. They help the cardholder to perform operations, especially of financial nature. Most of these methods areknown as stored value cards or electronic purse system. There are two types of smart cards, (a) relationship-based smart creditcard and (b) electronic purses.(a) Relationship-based smart credit cardAs you must be aware, smart credit card is based on some kind of relationshipbetween a cardholder and an organization, such as between Delhi Metro andits commuters or between the users of toll bridges or highways, and the companythat has built them. Relationship-based smart credit card offers consumers the followingoptions: On a smart credit card a customer can access many accounts, such ascredit, debit, investments or stored value for e-cash. There are multifarious uses of smart credit card, such as payment of bills,access to cash, or funds transfer for selected accounts, etc. Smart credit cards provide access to ATMs, a screen phone, a PC, orinteractive TVs anywhere and at all times.(b) Electronic purse and debit cardsE-purse is a wallet-size smart card with programmable microchips that store monetary value in the form of money. After the purse is loaded with money at an ATM or through the use of aninexpensive special telephone, it can be used to pay for candy, for instance, in a vending machine equipped with a card reader. Credit Card-based Payment SystemsSo far, we have seen the problems associated with e-cash and electroniccheques. The credit card payment system on the Internet provides one possible time-tested alternative. The credit card provider makes the payment.We can divide the credit card system into three basic categories:(a) Payment made by simply furnishing the details of the credit card(b) Payment made by providing the encrypted details of the credit card(c) Payment made on the basis of verification by a third party(a) Payment using plain credit card detailsIn plain credit card payments, unencrypted information is exchanged throughthe Internet or telephone lines. However, this system provides a low-level security as any snooper can read a credit card number, and programs can be created to scan the Internet traffic for credit card numbers and send the numbers. (b) Payment using encrypted credit card detailsIn this type of credit card system, the credit card data is encrypted and fed into a browser or any other e-commerce devices and safely sent through the network from the buyers to the sellers. (c) Payment using third party verificationThis credit card system uses a third party for security. An organization thatgathers and allows payments from one client to another is known as third party. Working of encrypted credit card system A consumer presents his credit card information along with hisauthentication signature (or PIN number) to a merchant server. The customers identity as the proprietor of the credit card account isauthenticated by the merchant server.

    6) Being a regular user ofthe various services without probablyknowing the technical aspects explain those services in details with an example.Local Area Network (LAN):- A LAN covers only a limited geographically area rangingfrom 0 to 2 Km, such as organizations, home, buildings. In a local area network,nodes are connected in a network and operating systems are installed on them.In this type of networking, generally, Cat 5 cable (8 wires) is used, meaning the connection is done through wire. However, there is another option of connecting LAN, which is WLAN, where connection is possible without wires. LAN storesthe system and application software that can be shared by the computers to other computers and peripherals. Most LANs connect nodes and computers.

    Metropolitan Area Network (MAN): Metropolitan Area Network or MAN occupies a larger area compared to LAN, such as a town or auniversity/organization premises (which is spread between 05 km to 20 km). It incorporates a number of LANs to form a network. This bulky network comprises of an optical fibre setup.