Professional Documents
Culture Documents
Faculty Name
Subject Name
Year
: K.Kavitha
: Electronic Commerce
: II Year
: MCA
Subject Code
Semester
:MC9271
:IV
UNIT I - INTRODUCTION
1. Define E-com?
Electronic commerce commonly known as E_com. It is a common via any electronic
media such as TV, fax and online networks. Buying and selling the product or services
over electronic system, such as the internet and other computer networks.
2.
Goal of E_commerce.
Fast loading pages.
Clean, product centric layout.
Efficient and intuitive navigations structure.
Checkout oriented usage flow.
Search engine friendly code.
3.
Ubiquity
Global each
Universal standards
Richness
Interactivity
Information density
personalization and customization
8.Define network.
In information technology a network is a series of points or nodes interconnected by
communication paths networks can interconnect with other networks and contain sub
networks.
9. Define distributed processing and is advantages.
A variety of computer systems that use more than one computer, or processor to run an
application. This includes parallel processing in which a single computer uses more than one
CPU to execute programs. More often however, distributed processing refers to local area
networks designed so that. Single program can run simultaneously at various sites. Most
distributed processing systems contains sophisticated software that detects idle CPU on the
network and parcels out programs to utilize them.
Advantage:
Quicker response time
Lower costs
Improved data integrity
Reduced host processors costs
Resource sharing
10. Define EDI.
EDI can be defined as the exchange of business data from one organizations computer
application to the computer application of a trading partner.
EDI message exchange is typically orders and invoices, although there are hundreds of
available messages.
11. Define TCP/IP:
Stands for transmission control protocol/ Internet protocol. These two protocols were
developed in the early days of the internet by the U.S military. The purpose was to allow
computers to communicate over long distance networks. The TCP part has to do either the
verifying delivery of the packets.
The IP part refers to the moving of data packets between nodes. TCP/IP has since then
become the foundation of the internet, therefore, TCP/IP software is built into all major o/s,
such as unix, windows and the mac os.
12. What is commercial transaction? Give an example.
An interaction between two or more parties in which goods, services or something of value is
exchanged for some type of remuneration. Some aspects of commercial transactions, such as
truthful representation and contract provisions, are governed by law .
Examples:
Sales Contracts
Generally for goods (toasters, cars, etc.)
License Contracts
Generally for intangibles (software, electronic media, etc.)
Banking Transactions
Negotiable instruments (checks, promissory notes, letters of credit, warehouse receipts, bills
of lading).
Reduces Errors
Creates Transaction Database
Increases Accountability
Minimizes Fraud
Quicker Transactions
Eliminates Equipment
Lowers Transaction Costs
Faster Billing
Recurring Billing
Confidentiality
Data Integrity
Non repudiation
Authentication
Modern cipher:- Modern encryption methods can be divided by two criteria: by type of key
used, and by type of input data. By type of key used ciphers are divided into:
* Symmetric key algorithms (Private-key cryptography), where the same key is used for
encryption and decryption, and
* Asymmetric key algorithms (Public-key cryptography), where two different keys are used for
encryption and decryption.
28. What is meant by DES and AES?
The main standard for encrypting data was a symmetric algorithm known as the Data Encryption
Standard (DES). However, this has now been replaced by a new standard known as the
Advanced Encryption Standard (AES) which we will look at later. DES is a 64 bit block cipher which
means that it encrypts data 64 bits at a time. This is contrasted to a stream cipher in which only one
bit at a time (or sometimes small groups of bits such as a byte) is encrypted.
Retail store
Retail special order
Catalogue store
Phone order from catalogue
bargaining
3. What are characteristics of offline transactions?
Identity
Immediacy
Value
Discourse
Community
Privacy
4. What is the payment methods used in traditional transactions?
Debit cards
Money orders
Bank checks
Travelers checks
Barter systems
Tokens
EuroGoldCash: registered in Panama but having its headquarters in Europe, it has a void in
the market for private financial transactions in a secure, honest, and multi-jurisdictional
venue.
Global Digital Pay: a private offshore internet payment system with Digital Trade Network
Ltd handling the currency reserves that back up the complete system.
Liberty Reserve : Instant, real-time currency for international commerce; its safe, reliable
and confidential
Zero payments (0 )
Nanopayments (0.001 0.1 )
Micropayments (0.1 - 5 )
Medium Payments (5 1.000 )
Macropayments (> 1.000 )
Order Cheque
Uncrossed / Open Cheque
Crossed Cheque
Anti-Dated Cheque
Post-Dated Cheque
Stale Cheque
After the money reaches to acquirer the amount transfers from acquirer to
the merchant account. The merchant receives the amount from acquirer after the
deduction of transaction fee.
36. What are the credit card features?
The main feature of credit card is interest rate the user pay unpaid balance. After
purchase, the user gets 30 days to make the user payment. There is no interest charge
because is no balance, left to pay.
The next feature is credit limits. This is the amount of money the user one allowed
to change to the user. A credit card is fees associated with just having the credit card.
This is the annual fee. Many cards have n annual fee.
for
building e-
Networking software
Disadvantages
Easily Lost
false sense of security
Slow Adoption
Possible Risk of Identify Theft
13. What are the three protocols used in Netscape commerce server?
- Uniform Resource Locator(URL)
- Hypertext Transfer Protocol(HTTP)
- Hyper Text Markup Language(HTML)
14. What are the threats available in Netscape commerce server?
The Human Element;
Viruses and Worms;
Trojan Horses;
Logic Bombs;
Denial Of Service Attacks;
Ping Of Death;
SYN Flooding;
Phishing Attacks
Data Packet Sniffing;
IP Spoofing;
Port Scanning;
Trapdoors and Backdoors