2 marks question bank-ecom_revised
DESCRIPTION
This is anna university Electronic commerce 2marks Q&ATRANSCRIPT
2 MARKS QUESTION BANK
Degree & Branch : MCA
UNIT I - INTRODUCTION
1. Define E-com?
Electronic commerce commonly known as “E_com”. It is a common via any electronic
media such as TV, fax and online networks. Buying and selling the product or services over
electronic system, such as the internet and other computer networks.
2. List the goals of electronic commerce.
Fast loading pages.
Clean, product centric layout.
Efficient and intuitive navigations structure.
Checkout oriented usage flow.
Search engine friendly code.
3. What are the advantages of electronic commerce?
Faster buying/selling procedure, as well as easy to find products.
More each to customers, there is no theoretical geographic limitations.
Low operational costs and better quality of services.
Easy to start and manage a business.
4. List the types of electronic commerce.
There are mainly five types of e_commerce modes.
i)Business to customer(B-to-C)
ii)Business to Business(B-to-B)
iii)Customer to Customer(C-to-C)
iv)Peer to Peer(P-to-P)
v)m_commerce.
5. Differentiate E-commerce and E-business.
i) E_commerce is the subset of E_Business. If you remember the venn diagram studied
in school then u can well understand.
ii) Those activities which effectually involve monetary transactions are termed as
“e_commerce”. However, e-business is a much broader term.
Faculty Name : K.Kavitha
Subject Name : Electronic Commerce Subject Code :MC9271
Year : II Year Semester :IV
iii) To sell online is e_commerce but to bring and retain customers and educate them
online about the product or service is e-business.
6. What are the functions of E-commerce?
Marketing and communication
Student service
Healthcare
Online content and administration
administration and intranet.
7. What are the features of e-commerce?
1. Ubiquity
2. Global each
3. Universal standards
4. Richness
5. Interactivity
6. Information density
7. personalization and customization
8. Define network.
In information technology a network is a series of points or nodes interconnected by
communication paths networks can interconnect with other networks and contain sub
networks.
9. Define distributed processing and is advantages.
A variety of computer systems that use more than one computer, or processor to run an
application. This includes parallel processing in which a single computer uses more than one
CPU to execute programs. More often however, distributed processing refers to local area
networks designed so that. Single program can run simultaneously at various sites. Most
distributed processing systems contains sophisticated software that detects idle CPU on the
network and parcels out programs to utilize them.
Advantage:
Quicker response time Lower costs Improved data integrity Reduced host processors costs Resource sharing
10. Define EDI
EDI can be defined as “the exchange of business data from one organization’s computer
application to the computer application of a trading partner.”
EDI message exchange is typically orders and invoices, although there are hundreds of
available messages.
11. Define TCP/IP
Stands for “transmission control protocol/ Internet protocol”. These two protocols were
developed in the early days of the internet by the U.S military. The purpose was to allow
computers to communicate over long distance networks. The TCP part has to do either the
verifying delivery of the packets.
The IP part refers to the moving of data packets between nodes. TCP/IP has since then
become the foundation of the internet, therefore, TCP/IP software is built into all major o/s,
such as unix, windows and the mac os.
12. What is commercial transaction? Give an example.
An interaction between two or more parties in which goods, services or something of value is
exchanged for some type of remuneration. Some aspects of commercial transactions, such as
truthful representation and contract provisions, are governed by law .
Examples: Sales Contracts
– Generally for goods (toasters, cars, etc.)
License Contracts
– Generally for intangibles (software, electronic media, etc.)
Banking Transactions
– Negotiable instruments (checks, promissory notes, letters of credit, warehouse receipts, bills
of lading).
13. Define Internet and Intranet.
The Internet is sometimes called as “The Net”, is a world wide system of computer
networks – a networks in which users at any one computer can ,if they have permission ,get
information from any other computer.
An intranet is a private network that is contained with in an enterprise. It may consists of
many inter linked local area network and also used leased lines in the world wide area network.
They typically, the intranet includes connections through one or more gateway computer to the
outside Internet.
14. Define web server and web browsers.
A web server is a program, that using the client/server model and world wide web’s Hyper
Text Transfer Protocol (HTTP),serves the files that form web pages to web users. For example.
MS IIS (Internet Information Server).
Novell’s web server for users of its NetWare.
A browser is an application program that provides a wave to look at and interact with all
the information an the “world wide web”. The word browser seems to have originated prior to
the web as a generic term for user interfaces that let you brows text file online.
15. What is the purpose of IETF?
Internet Engineering Task Force.
To create high quality, relevant standard for the internet.
develop and promotes internet standards.
16. Define electronic transaction.
An electronic transaction is the sale or purchase of goods or services, whether between
businesses, households, individuals, governments, and other public or private organizations, conducted
over computer-mediated networks. The goods and services are ordered over those networks, but the
payment and the ultimate delivery of the good or service may be conducted on or off-line.
17. Advantages of internet.
1. communication
2. Information
3. Entertainment
4. Services
5. Ecommerce.
18. What are the advantages of electronic transaction?
Invoice Processing
Sales Order Processing
Finance and Insurance
19. Define EFT.
Moving founds between different accounts in the same or different banks , through the
use of write transfer ,Automated Teller Machine or Computers but without the use of paper
documents.
20. What are the advantages of electronic transaction?
Reduces Errors
Creates Transaction Database
Increases Accountability
Minimizes Fraud
Quicker Transactions
Eliminates Equipment
Lowers Transaction Costs
Faster Billing
Recurring Billing
21. What are the features of electronic transaction?
Electronic transaction has the following features
1. Simple to use 2. Cost effective 3. Flexible 4. Secure.
22. Define WWW.
The term WWW refers to the World Wide Web or simply the Web. The World Wide Web consists
of all the public Web sites connected to the Internet worldwide, including the client devices (such as
computers and cell phones) that access Web content. The WWW is just one of many applications of the
Internet and computer networks.
23. 23. What are the components of WWW?
Structural Components
– Clients/browsers – to dominant implementations
– Servers – run on sophisticated hardware
– Caches – many interesting implementations
– Internet – the global infrastructure which facilitates data transfer
Semantic Components
– Hyper Text Transfer Protocol (HTTP)
– Hyper Text Markup Language (HTML)
• eXtensible Markup Language (XML)
– Uniform Resource Identifiers (URIs)
SECURITY TECHNOLOGIES
1. Objective of cryptography.
The whole point of cryptography is to keep information out of the hands of
anyone but its intended recipient. Even if the massage gets intercepted, the meaning
won’t be apparent to the interceptor –unless the interceptor is able to decipher it.
Cryptography as we know it uses encryption to transform plain texts into
encrypted texts.
2. Notes on codes and ciphers.
Code:
A code actually uses some method of interchanging vocabularies so that
each code word represents some other non code word. Codes requires special code books
which act like dictionaries; it the code book is lost encoded text cannot be interpreted -
and any one with the code book can read encoded text.
Cipher:
Ciphers are the basis of encryption scheme ciphers act on each character
of a massage, transforming it according to some repeatable rule or algorithm.
3. What is the disadvantage of internet?
The fit of personal information
Spamming
Virus threat
Pornography.
Theft of personal information :
Name, address, credit card number can be accessed by the culprits.
Spamming: It refers to sending unknown email bulk.
Virus: It causes crashing your hard disk disrupts the normal functioning of computer.
Pornography:The biggest threat related to your children healthy mental life.
4. Role of internet in E_com?
Role of internet in E_com internet helps in connecting today’s online savvy shopper
with any retail or wholesale merchant that you can think of on easy task.
From gathering information, knowledge, news, online shopping is one of the most
promising function of the internet world.
Compare prices on various item for purchasing.
5. Define confidentiality?
When a message sent electronically sender and receiver can decide the message remain
confidential and it should not read by another user.
6. What is message integrity?
When a message send electronically both sender and receiver want to ensure that the
message received exactly same as the message transmitted by the sender.
It deals with methods that ensure that the contents of a message have not been tampered
with and altered.
7. Define authentication?
When a electronic message by the user or system identification of sender is verified in
order to determine the correct sender.
8. What are the types of Security Attacks?
Security attacks can be divided into two types.They are
(I) Passive attack
(II) Active attack
9. What is passive attack?
Attends to learn for make use of information from the system and doesn’t affect the
system resources.
It is difficult to detect, because they do not involve any alteration of the data.
10. What is active attack?
Attends to alter system resources or affect their operation. Modifies the data ‘s stream
and creates a false stream.
Eg: Modification of message
Denial of service
Replay
11. Define cryptanalysis?
Techniques used for deciphering a message without any knowledge of the enciphering
details.
12. Define cryptography?
The schemes used for enciphering is known as cryptography.
13. What is encryption ?
The process of converting plaintext to cipher text is known as “encryption” or
enciphering.
14. What is plain text?
This is the original message or data that is fetch into the algorithm as input.
15. What is secret key?
It is also an input of an input of an encryption algorithm. It is the value independent of
the plain text. The algorithm will product a different output depending on the specific key being
used at the time.
16. What is cipher text?
This is the scrambled message produced as output. It depends on the plain text and the
secret key.
17. What is Decryption Algorithm?
This is essentially the encryption algorithm run in reverse . It takes the cipher text and
the secret key and produces the original plain text.
18. What are the two requirements for secures use of conventional encryption?
We need a strong encryption algorithm.
Sender and receiver must have obtained office of the secret key in a secure fashion and
must keep the key secure.
19. What is brute-force attack?
The attacker tries every possible key on a piece of cipher text until an intelligible
translation into plain text is obtained.
20. What are the cryptography application?
There are three cryptography application .they are
Encryption
Digital signature
Non-repudiation
21. Define non-reputation?
It reference to digital security. Non-reputiation means to ensure that a transformed
message has been send and received by the parties claiming to have send and received the
message.
Non-reputation is a way to guarantee that the sender of a message cannot later deny
having send the message and that the recipient can’t deny received the message.
UNIT III – ELECTRONIC PAYMENT METHODS
1. What is the objective of S-HTTP?
The objective of S-HTTP is to add support for a wide range of security mechanisms on
top
Of the interactions between browser and server.
Protection mechanisms include the following
Digital signature
Message authentication
Message encryption
These mechanisms are used as negotiated between browser and server.
2. Define offline and online payment?
The internet directly uses that to transmit transaction information protect that
information with some kind of encryption method.
That transaction is called number of evs-dropping than that the online payment of
transactions.
3. What are the steps involved in credit card transaction?
Authorization:
The credit card holder makes purchase and the merchant submit the
transaction to acquirer.
Batching:
It refers to storing of the entire’s day transactions together before sent to
acquirer.
Clearing and settlement:
This request is transferred money form customers account to the merchant
amount.
Funding:
After the money reaches to acquirer the amount transfers from acquirer to
the merchant account. The merchant receives the amount from acquirer after the
deduction of transaction fee.
4. What are the credit card features?
The main feature of credit card is inerest rate the user pay unpaid balance. After
purchase, the user get 30 days to make the user payment. There is no ineterst charge
because is no balance , left to pay.
The next feature is credit limits. This is the amount of money the user one allowed
to change to the user. A credit card are fees associated with just having the credit card.
This is the annual fee. Many cards have n annual fee.
5. Define EFT:
Electronic funds transfer. Any transfer of funds that is indicated by electronic
means, such as the electronic terminal, telephone, computer, ATM or the magnetic tape.
A banking system by which transaction, such as the deposits or bill payments ,are
made through computer database.
(E.g): the user investment for therapeutic work with EFT(via telephone). It is used
to solve problem through phone.
6. what are the different things that need to get types of negotiation between servers and
browsers?
Web browsers must able to send HTTP request and receive HTTP replies for mservers.
The most popular browsers are fully graphical, although non graphical browsers are necessity for
character-based OS.
Browser functions can also be integrated into more complete network or communication
packages.
Web servers software is also orderly available. A computer must be connected to the
internet running web server program and have web documents available.
Server contain highly graphical content without being able to display that cont locally.
E.g. for browser: Netscape navigator, internet explorer.
E.g. for server: apache HTTP. Server, IIs, sun java system.
7. What are the credit card basics?
A credit card definitions are in order. These terms are used throughout the SET
document.
Cardholder: the customer, customer
Issuer: the bank who issued credit card.
Merchant: the party from whom buying goods and services
Acquirer: the financial institution/bank.
Payment gateway: a device operated by acquirer.
Brand; visa, MasterCard, discard.
8. Define non-repudiation.
It means that a message of transferred has been sent and received by the parties
climbing to have send and received the message.
It is the way to guarantee that sender of the message cannot later having sent the
message and that the recipient cannot deny having received the message .
9.Define digital currency.
While secure commerce server are intended to protect transactions data being sent
over the Internet, digital currencies and other types of digital payment
mechanisms are intended to carry value in a protected digital form over the
internet.
It and payment systems do not necessarily complete against secure internet secure
internet servers or commercial environment but can complement sun products by adding another
way to exchange values.
10. Define electronic malls.
Setting up a website for buying and selling can be complicated and expansive. Some
companies have setting up electronic or virtual or online malls.
The shopping mall is familiar and comfortable model for consumer and merchants and it is
relatively to stimulate using www.
11. Define cash.
Cash refers to money in the physical form of currency such as bank notes and coins. The
word comes from French which means” money box”.
Money in the form of bills or coins, ”there is a separate shortage of hard cash”.
Prompt payment for goods or services in currency and coins on hand, bank balance and
negotiable money orders and checks.
12. what are the type of e_payment system?
Online electronic commerce payment:
a) Digital token – based system
b) Credit card based system
Banking and financial payments.
Retailing payments
a)credit cards
b)private label credit card, debit cards
c)charge cards
Electronic cash.
13. Define advantages of SLL.
The first advantage is that SLL can be applied to any internet application not just world
wide web although it was initially implemented only under HTTP.
The second advantage is that once SSL connection has been negotiated between a server
and a client, the resulting data communication channel private authentication and reliable.
14. Define acquirer.
The financial institution or bank who establishes an account with the merchant and
processes payment authorization and transactions for the merchants.
Acquirer verities that credit card number of the credit holder and the transaction type.
15. What are the requirement of SET?
Provide confidentiality of payment information and enable confidentiality of order
information that is transmitted along with the payment information.
Ensure the integrity of all transmitted data. Provide authentication that a cardholder is a
legitimate user of a branded payment card account.
Ensure the use of the best practices and system design technique to protect all legitimate
parties in an electronic commerce transaction.
Facilitate and encourage interoperability among software and network providers.
16. what are the SET participants? draw diagram?
cardholder
merchant
certificate authority
Payment gateway
17. Define digital signature and message integrity.
It is a mathematical scheme for the demonstrating the authenticity of a digital message or
document.
A valid digital signature gives a recipient reason to believe that the message was create
by known sender and that it was not altered in transmit. The usages are following
Software distribution
Financial transaction
Detect forgery / pampering
internet
interne
t
acquirer
Payment
network
18. Define message integrity.
The validity of transmitted message. It deals with methods that contents of a message
have not been tampered with and altered.
The most common approach is to use a one way hash function that combine all bytes in
the message with a secret key and produces a message digest that is impossible to reverse.
19.What are the security protocol available in e-transactions.
Listing ssl or HTTP is a matter of using special identifiers to indicate www document
that require them.
URL indicating a document defined with HTTP like as http://www.company.com/Math.html
The first part defines that transmit that document s-HTTP is used to transmit data
securely. The ssl use different scheme for document.
20. what are the methods of doing direct online purchase?
Online purchasing seems to be breaking down into two categories:
i) Buying commodities online
ii) Buying specialty items online.
Buying commodity item online is much like buying them in person. The customer has many
opportunities for comparison of specialty item, however, may be more impulsive.
21. what are the traditional transaction methods?
The typically modern consumer uses a handful of different methods to pay for goods and
services on a regular basis.
Cash
Credit
Personal check.
22. What are the different things that need to get done to setup a server?
Internet connection for requests from remote clients
Request has been received \, the server software a creates a separate a process on
the computer acting as server to handle that request.
Server is able to respond to multiple concurrent requests from different clients of
making each one wait for the server program itself to handle each individual
request.
Installation, configuration, and maintenance are performed by using CGI forms.