16
2 MARKS QUESTION BANK Degree & Branch : MCA UNIT I - INTRODUCTION 1. Define E-com? Electronic commerce commonly known as “E_com”. It is a common via any electronic media such as TV, fax and online networks. Buying and selling the product or services over electronic system, such as the internet and other computer networks. 2. List the goals of electronic commerce. Fast loading pages. Clean, product centric layout. Efficient and intuitive navigations structure. Checkout oriented usage flow. Search engine friendly code. 3. What are the advantages of electronic commerce? Faster buying/selling procedure, as well as easy to find products. More each to customers, there is no theoretical geographic limitations. Low operational costs and better quality of services. Easy to start and manage a business. 4. List the types of electronic commerce. There are mainly five types of e_commerce modes. i)Business to customer(B-to-C) ii)Business to Business(B-to-B) iii)Customer to Customer(C-to-C) iv)Peer to Peer(P-to-P) v)m_commerce. 5. Differentiate E-commerce and E-business. i) E_commerce is the subset of E_Business. If you remember the venn diagram studied in school then u can well understand. ii) Those activities which effectually involve monetary transactions are termed as “e_commerce”. However, e-business is a much broader term. Faculty Name : K.Kavitha Subject Name : Electronic Commerce Subject Code :MC9271 Year : II Year Semester :IV

2 Marks Question Bank-ecom_revised

  • Upload
    ponns

  • View
    463

  • Download
    3

Embed Size (px)

DESCRIPTION

This is anna university Electronic commerce 2marks Q&A

Citation preview

Page 1: 2 Marks Question Bank-ecom_revised

2 MARKS QUESTION BANK

Degree & Branch : MCA

UNIT I - INTRODUCTION

1. Define E-com?

Electronic commerce commonly known as “E_com”. It is a common via any electronic

media such as TV, fax and online networks. Buying and selling the product or services over

electronic system, such as the internet and other computer networks.

2. List the goals of electronic commerce.

Fast loading pages.

Clean, product centric layout.

Efficient and intuitive navigations structure.

Checkout oriented usage flow.

Search engine friendly code.

3. What are the advantages of electronic commerce?

Faster buying/selling procedure, as well as easy to find products.

More each to customers, there is no theoretical geographic limitations.

Low operational costs and better quality of services.

Easy to start and manage a business.

4. List the types of electronic commerce.

There are mainly five types of e_commerce modes.

i)Business to customer(B-to-C)

ii)Business to Business(B-to-B)

iii)Customer to Customer(C-to-C)

iv)Peer to Peer(P-to-P)

v)m_commerce.

5. Differentiate E-commerce and E-business.

i) E_commerce is the subset of E_Business. If you remember the venn diagram studied

in school then u can well understand.

ii) Those activities which effectually involve monetary transactions are termed as

“e_commerce”. However, e-business is a much broader term.

Faculty Name : K.Kavitha

Subject Name : Electronic Commerce Subject Code :MC9271

Year : II Year Semester :IV

Page 2: 2 Marks Question Bank-ecom_revised

iii) To sell online is e_commerce but to bring and retain customers and educate them

online about the product or service is e-business.

6. What are the functions of E-commerce?

Marketing and communication

Student service

Healthcare

Online content and administration

administration and intranet.

7. What are the features of e-commerce?

1. Ubiquity

2. Global each

3. Universal standards

4. Richness

5. Interactivity

6. Information density

7. personalization and customization

8. Define network.

In information technology a network is a series of points or nodes interconnected by

communication paths networks can interconnect with other networks and contain sub

networks.

9. Define distributed processing and is advantages.

A variety of computer systems that use more than one computer, or processor to run an

application. This includes parallel processing in which a single computer uses more than one

CPU to execute programs. More often however, distributed processing refers to local area

networks designed so that. Single program can run simultaneously at various sites. Most

distributed processing systems contains sophisticated software that detects idle CPU on the

network and parcels out programs to utilize them.

Advantage:

Quicker response time Lower costs Improved data integrity Reduced host processors costs Resource sharing

Page 3: 2 Marks Question Bank-ecom_revised

10. Define EDI

EDI can be defined as “the exchange of business data from one organization’s computer

application to the computer application of a trading partner.”

EDI message exchange is typically orders and invoices, although there are hundreds of

available messages.

11. Define TCP/IP

Stands for “transmission control protocol/ Internet protocol”. These two protocols were

developed in the early days of the internet by the U.S military. The purpose was to allow

computers to communicate over long distance networks. The TCP part has to do either the

verifying delivery of the packets.

The IP part refers to the moving of data packets between nodes. TCP/IP has since then

become the foundation of the internet, therefore, TCP/IP software is built into all major o/s,

such as unix, windows and the mac os.

12. What is commercial transaction? Give an example.

An interaction between two or more parties in which goods, services or something of value is

exchanged for some type of remuneration. Some aspects of commercial transactions, such as

truthful representation and contract provisions, are governed by law .

Examples: Sales Contracts

– Generally for goods (toasters, cars, etc.)

License Contracts

– Generally for intangibles (software, electronic media, etc.)

Banking Transactions

– Negotiable instruments (checks, promissory notes, letters of credit, warehouse receipts, bills

of lading).

13. Define Internet and Intranet.

The Internet is sometimes called as “The Net”, is a world wide system of computer

networks – a networks in which users at any one computer can ,if they have permission ,get

information from any other computer.

An intranet is a private network that is contained with in an enterprise. It may consists of

many inter linked local area network and also used leased lines in the world wide area network.

They typically, the intranet includes connections through one or more gateway computer to the

outside Internet.

Page 4: 2 Marks Question Bank-ecom_revised

14. Define web server and web browsers.

A web server is a program, that using the client/server model and world wide web’s Hyper

Text Transfer Protocol (HTTP),serves the files that form web pages to web users. For example.

MS IIS (Internet Information Server).

Novell’s web server for users of its NetWare.

A browser is an application program that provides a wave to look at and interact with all

the information an the “world wide web”. The word browser seems to have originated prior to

the web as a generic term for user interfaces that let you brows text file online.

15. What is the purpose of IETF?

Internet Engineering Task Force.

To create high quality, relevant standard for the internet.

develop and promotes internet standards.

16. Define electronic transaction.

An electronic transaction is the sale or purchase of goods or services, whether between

businesses, households, individuals, governments, and other public or private organizations, conducted

over computer-mediated networks. The goods and services are ordered over those networks, but the

payment and the ultimate delivery of the good or service may be conducted on or off-line.

17. Advantages of internet.

1. communication

2. Information

3. Entertainment

4. Services

5. Ecommerce.

18. What are the advantages of electronic transaction?

Invoice Processing

Sales Order Processing

Finance and Insurance

19. Define EFT.

Moving founds between different accounts in the same or different banks , through the

use of write transfer ,Automated Teller Machine or Computers but without the use of paper

documents.

20. What are the advantages of electronic transaction?

Reduces Errors

Creates Transaction Database

Page 5: 2 Marks Question Bank-ecom_revised

Increases Accountability

Minimizes Fraud

Quicker Transactions

Eliminates Equipment

Lowers Transaction Costs

Faster Billing

Recurring Billing

21. What are the features of electronic transaction?

Electronic transaction has the following features

1. Simple to use 2. Cost effective 3. Flexible 4. Secure.

22. Define WWW.

The term WWW refers to the World Wide Web or simply the Web. The World Wide Web consists

of all the public Web sites connected to the Internet worldwide, including the client devices (such as

computers and cell phones) that access Web content. The WWW is just one of many applications of the

Internet and computer networks.

23. 23. What are the components of WWW?

Structural Components

– Clients/browsers – to dominant implementations

– Servers – run on sophisticated hardware

– Caches – many interesting implementations

– Internet – the global infrastructure which facilitates data transfer

Semantic Components

– Hyper Text Transfer Protocol (HTTP)

– Hyper Text Markup Language (HTML)

• eXtensible Markup Language (XML)

– Uniform Resource Identifiers (URIs)

Page 6: 2 Marks Question Bank-ecom_revised

SECURITY TECHNOLOGIES

1. Objective of cryptography.

The whole point of cryptography is to keep information out of the hands of

anyone but its intended recipient. Even if the massage gets intercepted, the meaning

won’t be apparent to the interceptor –unless the interceptor is able to decipher it.

Cryptography as we know it uses encryption to transform plain texts into

encrypted texts.

2. Notes on codes and ciphers.

Code:

A code actually uses some method of interchanging vocabularies so that

each code word represents some other non code word. Codes requires special code books

which act like dictionaries; it the code book is lost encoded text cannot be interpreted -

and any one with the code book can read encoded text.

Cipher:

Ciphers are the basis of encryption scheme ciphers act on each character

of a massage, transforming it according to some repeatable rule or algorithm.

3. What is the disadvantage of internet?

The fit of personal information

Spamming

Virus threat

Pornography.

Theft of personal information :

Name, address, credit card number can be accessed by the culprits.

Spamming: It refers to sending unknown email bulk.

Virus: It causes crashing your hard disk disrupts the normal functioning of computer.

Pornography:The biggest threat related to your children healthy mental life.

Page 7: 2 Marks Question Bank-ecom_revised

4. Role of internet in E_com?

Role of internet in E_com internet helps in connecting today’s online savvy shopper

with any retail or wholesale merchant that you can think of on easy task.

From gathering information, knowledge, news, online shopping is one of the most

promising function of the internet world.

Compare prices on various item for purchasing.

5. Define confidentiality?

When a message sent electronically sender and receiver can decide the message remain

confidential and it should not read by another user.

6. What is message integrity?

When a message send electronically both sender and receiver want to ensure that the

message received exactly same as the message transmitted by the sender.

It deals with methods that ensure that the contents of a message have not been tampered

with and altered.

7. Define authentication?

When a electronic message by the user or system identification of sender is verified in

order to determine the correct sender.

8. What are the types of Security Attacks?

Security attacks can be divided into two types.They are

(I) Passive attack

(II) Active attack

9. What is passive attack?

Attends to learn for make use of information from the system and doesn’t affect the

system resources.

It is difficult to detect, because they do not involve any alteration of the data.

10. What is active attack?

Attends to alter system resources or affect their operation. Modifies the data ‘s stream

and creates a false stream.

Eg: Modification of message

Denial of service

Page 8: 2 Marks Question Bank-ecom_revised

Replay

11. Define cryptanalysis?

Techniques used for deciphering a message without any knowledge of the enciphering

details.

12. Define cryptography?

The schemes used for enciphering is known as cryptography.

13. What is encryption ?

The process of converting plaintext to cipher text is known as “encryption” or

enciphering.

14. What is plain text?

This is the original message or data that is fetch into the algorithm as input.

15. What is secret key?

It is also an input of an input of an encryption algorithm. It is the value independent of

the plain text. The algorithm will product a different output depending on the specific key being

used at the time.

16. What is cipher text?

This is the scrambled message produced as output. It depends on the plain text and the

secret key.

17. What is Decryption Algorithm?

This is essentially the encryption algorithm run in reverse . It takes the cipher text and

the secret key and produces the original plain text.

18. What are the two requirements for secures use of conventional encryption?

We need a strong encryption algorithm.

Sender and receiver must have obtained office of the secret key in a secure fashion and

must keep the key secure.

19. What is brute-force attack?

The attacker tries every possible key on a piece of cipher text until an intelligible

translation into plain text is obtained.

Page 9: 2 Marks Question Bank-ecom_revised

20. What are the cryptography application?

There are three cryptography application .they are

Encryption

Digital signature

Non-repudiation

21. Define non-reputation?

It reference to digital security. Non-reputiation means to ensure that a transformed

message has been send and received by the parties claiming to have send and received the

message.

Non-reputation is a way to guarantee that the sender of a message cannot later deny

having send the message and that the recipient can’t deny received the message.

Page 10: 2 Marks Question Bank-ecom_revised

UNIT III – ELECTRONIC PAYMENT METHODS

1. What is the objective of S-HTTP?

The objective of S-HTTP is to add support for a wide range of security mechanisms on

top

Of the interactions between browser and server.

Protection mechanisms include the following

Digital signature

Message authentication

Message encryption

These mechanisms are used as negotiated between browser and server.

2. Define offline and online payment?

The internet directly uses that to transmit transaction information protect that

information with some kind of encryption method.

That transaction is called number of evs-dropping than that the online payment of

transactions.

3. What are the steps involved in credit card transaction?

Authorization:

The credit card holder makes purchase and the merchant submit the

transaction to acquirer.

Batching:

It refers to storing of the entire’s day transactions together before sent to

acquirer.

Clearing and settlement:

This request is transferred money form customers account to the merchant

amount.

Funding:

After the money reaches to acquirer the amount transfers from acquirer to

the merchant account. The merchant receives the amount from acquirer after the

deduction of transaction fee.

4. What are the credit card features?

The main feature of credit card is inerest rate the user pay unpaid balance. After

purchase, the user get 30 days to make the user payment. There is no ineterst charge

because is no balance , left to pay.

The next feature is credit limits. This is the amount of money the user one allowed

to change to the user. A credit card are fees associated with just having the credit card.

This is the annual fee. Many cards have n annual fee.

Page 11: 2 Marks Question Bank-ecom_revised

5. Define EFT:

Electronic funds transfer. Any transfer of funds that is indicated by electronic

means, such as the electronic terminal, telephone, computer, ATM or the magnetic tape.

A banking system by which transaction, such as the deposits or bill payments ,are

made through computer database.

(E.g): the user investment for therapeutic work with EFT(via telephone). It is used

to solve problem through phone.

6. what are the different things that need to get types of negotiation between servers and

browsers?

Web browsers must able to send HTTP request and receive HTTP replies for mservers.

The most popular browsers are fully graphical, although non graphical browsers are necessity for

character-based OS.

Browser functions can also be integrated into more complete network or communication

packages.

Web servers software is also orderly available. A computer must be connected to the

internet running web server program and have web documents available.

Server contain highly graphical content without being able to display that cont locally.

E.g. for browser: Netscape navigator, internet explorer.

E.g. for server: apache HTTP. Server, IIs, sun java system.

7. What are the credit card basics?

A credit card definitions are in order. These terms are used throughout the SET

document.

Cardholder: the customer, customer

Issuer: the bank who issued credit card.

Merchant: the party from whom buying goods and services

Acquirer: the financial institution/bank.

Payment gateway: a device operated by acquirer.

Brand; visa, MasterCard, discard.

Page 12: 2 Marks Question Bank-ecom_revised

8. Define non-repudiation.

It means that a message of transferred has been sent and received by the parties

climbing to have send and received the message.

It is the way to guarantee that sender of the message cannot later having sent the

message and that the recipient cannot deny having received the message .

9.Define digital currency.

While secure commerce server are intended to protect transactions data being sent

over the Internet, digital currencies and other types of digital payment

mechanisms are intended to carry value in a protected digital form over the

internet.

It and payment systems do not necessarily complete against secure internet secure

internet servers or commercial environment but can complement sun products by adding another

way to exchange values.

10. Define electronic malls.

Setting up a website for buying and selling can be complicated and expansive. Some

companies have setting up electronic or virtual or online malls.

The shopping mall is familiar and comfortable model for consumer and merchants and it is

relatively to stimulate using www.

11. Define cash.

Cash refers to money in the physical form of currency such as bank notes and coins. The

word comes from French which means” money box”.

Money in the form of bills or coins, ”there is a separate shortage of hard cash”.

Prompt payment for goods or services in currency and coins on hand, bank balance and

negotiable money orders and checks.

Page 13: 2 Marks Question Bank-ecom_revised

12. what are the type of e_payment system?

Online electronic commerce payment:

a) Digital token – based system

b) Credit card based system

Banking and financial payments.

Retailing payments

a)credit cards

b)private label credit card, debit cards

c)charge cards

Electronic cash.

13. Define advantages of SLL.

The first advantage is that SLL can be applied to any internet application not just world

wide web although it was initially implemented only under HTTP.

The second advantage is that once SSL connection has been negotiated between a server

and a client, the resulting data communication channel private authentication and reliable.

14. Define acquirer.

The financial institution or bank who establishes an account with the merchant and

processes payment authorization and transactions for the merchants.

Acquirer verities that credit card number of the credit holder and the transaction type.

15. What are the requirement of SET?

Provide confidentiality of payment information and enable confidentiality of order

information that is transmitted along with the payment information.

Ensure the integrity of all transmitted data. Provide authentication that a cardholder is a

legitimate user of a branded payment card account.

Ensure the use of the best practices and system design technique to protect all legitimate

parties in an electronic commerce transaction.

Facilitate and encourage interoperability among software and network providers.

Page 14: 2 Marks Question Bank-ecom_revised

16. what are the SET participants? draw diagram?

cardholder

merchant

certificate authority

Payment gateway

17. Define digital signature and message integrity.

It is a mathematical scheme for the demonstrating the authenticity of a digital message or

document.

A valid digital signature gives a recipient reason to believe that the message was create

by known sender and that it was not altered in transmit. The usages are following

Software distribution

Financial transaction

Detect forgery / pampering

internet

interne

t

acquirer

Payment

network

Page 15: 2 Marks Question Bank-ecom_revised

18. Define message integrity.

The validity of transmitted message. It deals with methods that contents of a message

have not been tampered with and altered.

The most common approach is to use a one way hash function that combine all bytes in

the message with a secret key and produces a message digest that is impossible to reverse.

19.What are the security protocol available in e-transactions.

Listing ssl or HTTP is a matter of using special identifiers to indicate www document

that require them.

URL indicating a document defined with HTTP like as http://www.company.com/Math.html

The first part defines that transmit that document s-HTTP is used to transmit data

securely. The ssl use different scheme for document.

20. what are the methods of doing direct online purchase?

Online purchasing seems to be breaking down into two categories:

i) Buying commodities online

ii) Buying specialty items online.

Buying commodity item online is much like buying them in person. The customer has many

opportunities for comparison of specialty item, however, may be more impulsive.

21. what are the traditional transaction methods?

The typically modern consumer uses a handful of different methods to pay for goods and

services on a regular basis.

Cash

Credit

Personal check.

22. What are the different things that need to get done to setup a server?

Internet connection for requests from remote clients

Request has been received \, the server software a creates a separate a process on

the computer acting as server to handle that request.

Server is able to respond to multiple concurrent requests from different clients of

making each one wait for the server program itself to handle each individual

request.

Installation, configuration, and maintenance are performed by using CGI forms.

Page 16: 2 Marks Question Bank-ecom_revised