CHAPTER-1 (Web Commerce)
1.Define commerce.
Answer-
Commerce is normally associated with the buying and selling of items.
2.Before the advent of networks, how was data being transferred between computers?
Answer-
With secondary memories like floppies
3.Name two stages of commerce that cannot be automated.
Answer-
Production of goods and delivery of goods.
4.What is the role of encryption in data transfer
Answer-
To ensure security of data.
5.Name two areas which are reasons of worry in e-commerce.
Answer-
Security and legal acceptance
6. List the categories of operations comes under e-commerce.
Answer-
The following categories of operations comes under e-commerce.
--------------------
CHAPTER-2 (Fundamentals of consumer oriented e-commerce)
1. List any three basic needs of consumer oriented e-commerce.
Answer-
Standard processes for buying and selling; well accepted hardware and software and secure
commercial and transport practices.
2. List any three basic banking activities.
Answer-
Three basic banking activities
3. What does ATM stand for.
Answer-
ATM stand for Automated Teller machine
4. Why does an ATM does not involve a computer at customer’s level?
Answer-
An ATM does not involve a computer at customer’s level Because any average customer is more comfortable with simply inserting an ATM card.
5. What is the samples type of home shopping?
Answer-
The channels describe the product, orders are placed over phone, delivery is made at home
and payment in the standard mode.
6. What is movie on demand?
Answer-
The viewer selects the movie to view an the TV against payment.
7. Name any two concepts of TV based home entertainment?Answer-
Movie an demand and on line games.
8. What is the need for seamless connections?Answer-
So that persons with different types of hardware and software can interact easily.
9. What is the need for market place interacts?
Answer-
To facilitate comparisons, negotiations, bargaining etc.
10. What is the need for settling disputes?
Answer-
To ensure that disgruntled customers / traders can have a standard recourse for settlement.
11. List and explain the desirable characteristics of e-marketing.
Answer-
Characteristics of e-marketing are-
12. Explain basic tenets of e-commerce.
--------------------
CHAPTER-3(Electronic Commerce and the World Wide Web)
1. Define EDI.
Answer-
Electronic Data Interchange.
2. Define EFT.
Answer-
Electronic Data Interchange.
3. Name a few operations performed by e-commerce.
Answer-
Payment, fund transfer, order entry, invoicing etc.
4. Define a framework.
Answer-
Framework is intended to define and create tools that integrate information.
5. List the six layers of e-commerce architecture.
Answer-
The six layers of e-commerce architecture-
.
6. Name the three classes of e-commerce applications based on transactions.
Answer-
Consumer to business, Business to business, intra organization.
7. Define a information Brokerage.
Answer-
An intermediary who provides integration between customers and information providers
8. Define a software agent.
Answer-
Agent is an encapsulation of users’ instructions.
9. Define middle ware.
Answer-
It is a mediator between diverse application programs that talk to each other.
10. Name the three stages of e-commerce architecture on web.
Answer-
The three stages of e-commerce architecture on web are
1. Client browser
2. WWW server functions and
3. Third party services.
11. With the help of an example give the meaning of secure messaging.
Answer-
12. With the help of a diagram explain e-commerce architecture.Answer-
13. Give the architecture framework for e-commerce.
Answer-
--------------------
CHAPTER-4 (Consumer-Oriented Electronic Commerce)
1. Name the three broad phases of consumer’s perspective.
Answer-
Pre-purchase determination, purchase consummation, post purchase interaction.
2. What are the categories of consumers?
Answer-
Impulsive buyers, patient buyers and analytical buyers.
3. What are the four types of purchases?
Answer-
The four types of purchases are-
Specifically planned, Generally planned, reminder purchases and unplanned purchases.
4. Why are information brokerages needed?
Answer-
To help in comparison shopping, reduce search costs and integration.
5. What issues are included in post purchase interaction?
Answer-
Inventory issues, database access issues and customer service issues.
6. Name the phases from the merchants point of view?
Answer-
Presales interaction, product service, production and delivery and post sales interaction.
7. What is order selection?
Answer-
Prioritize orders based on same factors.
8. Why is a critical mass necessary for market?
Answer-
Otherwise the cost per unit goes up.
9. What is the need for standardization?
Answer-
To move seamlessly across various hardware and software.
10. On what factors can negotiations take place?
Answer-
Over money, terms and conditions, delivery dates and evaluation criteria.
11. List the desirable characteristics of e-commerce market place?
Answer-
The following criteria are essential for consumer-oriented electronic commerce:
12. Explain mercantile model from consumer’s perspective?
Answer-
The business process model from a consumer’s perspective consist of seven activities that can be grouped into three phases: pre-purchase phase, purchase consummation, and post-purchase interaction.
Let’s consider each of the consumer purchasing phases in detail.
13. Explain mercantile model from merchant’s perspective?
Answer-
--------------------
CHAPTER-5 (Electronic Payment Systems)
1. What are the three types of electronic tokens?
Answer-
Cash, debit and credit (also called real time, prepaid and post paid).
2. What are the four properties that e-cash should have?Answer-
Monetary value, inter operability, retrievability and security.
3. How does digital signature works?Answer-
By providing two keys, one with the public and the other privately with the buyer. The
signature is coded with both.
4. What are the two desirable properties in any e-transaction?Answer-
Anonymity and security.
5. What is double spending?Answer-
Double spending Spending the same cash in more than one place.
6. What is the difficulty in storing e-cash?
Answer-
It does not provide interest. Also exchange fluctuations affect it.
7. What are the normal constraints put on e-cash?Answer-
A validity limit, the more amount that can be stored, more no. of exchanges and no. of exchanges within a time period.
8. What is an electronic purse.
Answer-
It is card with a pre-determined amount of money loaded.
9. What are the three ways in which payment through credit cards can be made over the net?
Answer-
Using plain cards, encrypted cards and cards with third party verification.
10. Name any four issues addressed in a e-payment system.
Answer-
Privacy, security, database integration, brokers etc.
11. Explain the various issues to be addressed while designing e-payment system.
Answer-
12. Explain the categories of credit card payment system on on-line networks.
Answer-
We can break credit card payment on on-line networks into three basic categories:
--------------------
CHAPTER-6 (Inter-organizational Commerce and EDI (Electronic Data Interchange)
1. Define EDI.
Answer-
Inter-process communication of business information in standard electronic form.
2. List the four layers of EDI architecture.
Answer-
Semantic layer, standard layer, transport layer and physical layer.
3. List any two tangible benefits of EDI.Answer-
Reduced paper based systems, improved customer service.
4. Who is liable if an EDI network fails to deliver the message?Answer-
Not decided as yet.
5. Can the digital signature fully replace handwritten signature?Answer- No
6. What is EFT?Answer-
Electronic Fund transfer.
7. What is the need for open EDI?Answer-
To allow e-commerce between two organizations for a short duration.
8. With the help of a diagram explain the flow of in formation in EDI.Answer-
9. List the tangible benefits of EDI.
Answer-
Saving also accrue from the following improvements:
10. Explain the layered architecture of EDI.
Answer-
--------------------
CHAPTER-7 (EDI Implementation, Value-Added Networks)
1. List any four components of EDI implementation.
Answer-
EDI standard, translation software, trading partners, value added networks etc.
2. What is the common structure of EDI messages?
Answer-
Each message is made up of transaction sets which are divided into data segments, which in
turn are made up of data elements.
3. What are the four layers of EDI implementation?
Answer-
Business application layer, format conversion layer, translator layer and envelop for document
messaging.
4. List any three disadvantages of custom translators.
Answer-
They are restrictive, difficult to up date and are unsupported.
5. What are main types of EDI access methods?
Answer-
Direct dialing, limited Third party VAN and full service Third party VAN.
6. What are the costs of EDI implementation.
Answer-
Fixed costs, Maintenance fees, VAN charges.
7. List the factors that affect the fixed costs.
Answer-
Volume of documents, cost of EDI translation software and implementation time.
8. What are the disadvantages of VANs for EDI.
Answer-
Slowness, high costs.
9. List the main costs of VAN.
Answer-
Account startup costs, usage costs and interconnect costs.
10. List four advantages of Internets.
Answer-
Flat pricing, cheap access, common standards and secure.
11. How much will an EDI implementation cost?
Answer-
Prices for EDI products vary from no cost ( for very simple one-function products) to several thousands of dollars for full-function applications.
The final cost depends on several factors:
12. What is VAN? with the help of a diagram explain the functions of third party VAN.
Answer-
A VAN is a communications network that typically exchanges EDI messages among trading partners. It also provides other services, including holding messages in “electronic mailboxes,” interfacing with other VANs and supporting many telecommunications modes and transfer protocols.
13. What is EDI? List the factors that make the inteRnet useful for EDI
Answer-
--------------------
CHAPTER-8 (Intra organizational Electronic Commerce)
1. What is work flow management?
Answer-
It is the concept of task coordination for better results.
2. What are the two main issues that are focused by customization?Answer-
Time to market and flexible operations.
3. What is supply chain management?Answer-
It is the chain of suppliers and customers for a particular business.
4. What is the main disadvantage of vertical organization?Answer-
It allows gaps to exist between employees of different departments.
5. What is the main difference between horizontal and vertical organizations?Answer-
Horizontal organization is two tiered as against multiple tiered organization.
6. Define virtual organization?
Answer-
It is a network closely coupled upstream with suppliers and downstream with customers.
7. What are the two approaches of virtual organization?
Answer-
Downward and lateral.
8. What are the two main categories of SCM?
Answer-
Push based and pull based.
9. What are the primary elements of SCM
Answer-
Logistics, integrated marketing and agile manufacturing
10. What is meaning of push based and pull based supply chains.
Answer-
--------------------
CHAPTER-9 (The Need for Computer Security)
1. What are the two basic types of physical data security?
Answer-
Data integrity and Data availability.
2. Name the two type of threats to data.
Answer-
Active threats and passive threats.
3. What is masquerade?
Answer-
The attacker pretends to e some one else.
4. What is IP spoofing?
Answer-
It is a tool that intruders use to take over an open terminal and login connections after they
get root access.
5. What is Telnet?
Answer-
Telnet enables users to log in to remote computers.
6. What is the basic principle of kerberos?
Answer- It provides authentication to messages in an open network.
7. What is the unit over which kerberon acts?
Answer- Tickets
8. What are the three ownership groupings in unix files?
Answer-
Owner, user, others.
9. What are the three levels of file access permissions in unix?
Answer-
Read, write and execution.
10. What are the three main categories of fire walls?
Answer-
Packet filters, application level gateways and proxy servers.
11. Give the remarks on hacking technionces.
Answer-
12. What is the meaning of Active and passive theats.Answer-
13. List the guidelines to be followed for security policy?Answer-
14. List the issues to he addressed while displaying a security policy.Answer-
15. Differntiate between viruses and worrms.Answer-
16. Explain the most prominent secure transmission protocol for web communications.
Answer-
--------------------
CHAPTER-10 (Approaches to Safe Electronic Commerce)
1. List the four basic goals of electronic Security?
Answer-
Privacy, Integrity, authentication and availability.
2. What is non-repudiation?
Answer-
A person cannot deny after having sent / received a message.
3. What is key Management?
Answer-
To create, distribute, revoke and manage keys.
4. What is encryption of data?
Answer-
Encoding of data with a suitable key.
5. What is the encryption algorithm on which SSL depends?
Answer-
The RSA algorithm.
6. What are basic elements in a SEPP process?
Answer-
Card holder, merchant, acquirer and certificate management systems.
7. What does SET stand for?
Answer-
Secure Electronic Transaction.
8. What is meant by integrity of data?9. List the key functions of SET specification.
Answer-
The contents should not get changed.
10. Lisy the major business requirements addressed by SEPP.Answer-
11. Explain S-HTTP and SSL protocols.
Answer-
--------------------
CHAPTER-11(Secure Electronic Transaction)
1.Define commerce.
Answer-
Commerce is normally associated with the buying and selling of items.
2.Before the advent of networks, how was data being transferred between computers?
Answer-
With secondary memories like floppies
3.Name two stages of commerce that cannot be automated.
Answer-
Production of goods and delivery of goods.
4.What is the role of encryption in data transfer
Answer-
To ensure security of data.
5.Name two areas which are reasons of worry in e-commerce.
Answer-
Security and legal acceptance
6. List the categories of operations comes under e-commerce.
Answer-
The following categories of operations comes under e-commerce.
--------------------
CHAPTER-2 (Fundamentals of consumer oriented e-commerce)
1. List any three basic needs of consumer oriented e-commerce.
Answer-
Standard processes for buying and selling; well accepted hardware and software and secure
commercial and transport practices.
2. List any three basic banking activities.
Answer-
Three basic banking activities
3. What does ATM stand for.
Answer-
ATM stand for Automated Teller machine
4. Why does an ATM does not involve a computer at customer’s level?
Answer-
An ATM does not involve a computer at customer’s level Because any average customer is more comfortable with simply inserting an ATM card.
5. What is the samples type of home shopping?
Answer-
The channels describe the product, orders are placed over phone, delivery is made at home
and payment in the standard mode.
6. What is movie on demand?
Answer-
The viewer selects the movie to view an the TV against payment.
7. Name any two concepts of TV based home entertainment?Answer-
Movie an demand and on line games.
8. What is the need for seamless connections?Answer-
So that persons with different types of hardware and software can interact easily.
9. What is the need for market place interacts?
Answer-
To facilitate comparisons, negotiations, bargaining etc.
10. What is the need for settling disputes?
Answer-
To ensure that disgruntled customers / traders can have a standard recourse for settlement.
11. List and explain the desirable characteristics of e-marketing.
Answer-
Characteristics of e-marketing are-
12. Explain basic tenets of e-commerce.
--------------------
CHAPTER-3(Electronic Commerce and the World Wide Web)
1. Define EDI.
Answer-
Electronic Data Interchange.
2. Define EFT.
Answer-
Electronic Data Interchange.
3. Name a few operations performed by e-commerce.
Answer-
Payment, fund transfer, order entry, invoicing etc.
4. Define a framework.
Answer-
Framework is intended to define and create tools that integrate information.
5. List the six layers of e-commerce architecture.
Answer-
The six layers of e-commerce architecture-
.
6. Name the three classes of e-commerce applications based on transactions.
Answer-
Consumer to business, Business to business, intra organization.
7. Define a information Brokerage.
Answer-
An intermediary who provides integration between customers and information providers
8. Define a software agent.
Answer-
Agent is an encapsulation of users’ instructions.
9. Define middle ware.
Answer-
It is a mediator between diverse application programs that talk to each other.
10. Name the three stages of e-commerce architecture on web.
Answer-
The three stages of e-commerce architecture on web are
1. Client browser
2. WWW server functions and
3. Third party services.
11. With the help of an example give the meaning of secure messaging.
Answer-
12. With the help of a diagram explain e-commerce architecture.Answer-
13. Give the architecture framework for e-commerce.
Answer-
--------------------
CHAPTER-4 (Consumer-Oriented Electronic Commerce)
1. Name the three broad phases of consumer’s perspective.
Answer-
Pre-purchase determination, purchase consummation, post purchase interaction.
2. What are the categories of consumers?
Answer-
Impulsive buyers, patient buyers and analytical buyers.
3. What are the four types of purchases?
Answer-
The four types of purchases are-
Specifically planned, Generally planned, reminder purchases and unplanned purchases.
4. Why are information brokerages needed?
Answer-
To help in comparison shopping, reduce search costs and integration.
5. What issues are included in post purchase interaction?
Answer-
Inventory issues, database access issues and customer service issues.
6. Name the phases from the merchants point of view?
Answer-
Presales interaction, product service, production and delivery and post sales interaction.
7. What is order selection?
Answer-
Prioritize orders based on same factors.
8. Why is a critical mass necessary for market?
Answer-
Otherwise the cost per unit goes up.
9. What is the need for standardization?
Answer-
To move seamlessly across various hardware and software.
10. On what factors can negotiations take place?
Answer-
Over money, terms and conditions, delivery dates and evaluation criteria.
11. List the desirable characteristics of e-commerce market place?
Answer-
The following criteria are essential for consumer-oriented electronic commerce:
12. Explain mercantile model from consumer’s perspective?
Answer-
The business process model from a consumer’s perspective consist of seven activities that can be grouped into three phases: pre-purchase phase, purchase consummation, and post-purchase interaction.
Let’s consider each of the consumer purchasing phases in detail.
13. Explain mercantile model from merchant’s perspective?
Answer-
--------------------
CHAPTER-5 (Electronic Payment Systems)
1. What are the three types of electronic tokens?
Answer-
Cash, debit and credit (also called real time, prepaid and post paid).
2. What are the four properties that e-cash should have?Answer-
Monetary value, inter operability, retrievability and security.
3. How does digital signature works?Answer-
By providing two keys, one with the public and the other privately with the buyer. The
signature is coded with both.
4. What are the two desirable properties in any e-transaction?Answer-
Anonymity and security.
5. What is double spending?Answer-
Double spending Spending the same cash in more than one place.
6. What is the difficulty in storing e-cash?
Answer-
It does not provide interest. Also exchange fluctuations affect it.
7. What are the normal constraints put on e-cash?Answer-
A validity limit, the more amount that can be stored, more no. of exchanges and no. of exchanges within a time period.
8. What is an electronic purse.
Answer-
It is card with a pre-determined amount of money loaded.
9. What are the three ways in which payment through credit cards can be made over the net?
Answer-
Using plain cards, encrypted cards and cards with third party verification.
10. Name any four issues addressed in a e-payment system.
Answer-
Privacy, security, database integration, brokers etc.
11. Explain the various issues to be addressed while designing e-payment system.
Answer-
12. Explain the categories of credit card payment system on on-line networks.
Answer-
We can break credit card payment on on-line networks into three basic categories:
--------------------
CHAPTER-6 (Inter-organizational Commerce and EDI (Electronic Data Interchange)
1. Define EDI.
Answer-
Inter-process communication of business information in standard electronic form.
2. List the four layers of EDI architecture.
Answer-
Semantic layer, standard layer, transport layer and physical layer.
3. List any two tangible benefits of EDI.Answer-
Reduced paper based systems, improved customer service.
4. Who is liable if an EDI network fails to deliver the message?Answer-
Not decided as yet.
5. Can the digital signature fully replace handwritten signature?Answer- No
6. What is EFT?Answer-
Electronic Fund transfer.
7. What is the need for open EDI?Answer-
To allow e-commerce between two organizations for a short duration.
8. With the help of a diagram explain the flow of in formation in EDI.Answer-
9. List the tangible benefits of EDI.
Answer-
Saving also accrue from the following improvements:
10. Explain the layered architecture of EDI.
Answer-
--------------------
CHAPTER-7 (EDI Implementation, Value-Added Networks)
1. List any four components of EDI implementation.
Answer-
EDI standard, translation software, trading partners, value added networks etc.
2. What is the common structure of EDI messages?
Answer-
Each message is made up of transaction sets which are divided into data segments, which in
turn are made up of data elements.
3. What are the four layers of EDI implementation?
Answer-
Business application layer, format conversion layer, translator layer and envelop for document
messaging.
4. List any three disadvantages of custom translators.
Answer-
They are restrictive, difficult to up date and are unsupported.
5. What are main types of EDI access methods?
Answer-
Direct dialing, limited Third party VAN and full service Third party VAN.
6. What are the costs of EDI implementation.
Answer-
Fixed costs, Maintenance fees, VAN charges.
7. List the factors that affect the fixed costs.
Answer-
Volume of documents, cost of EDI translation software and implementation time.
8. What are the disadvantages of VANs for EDI.
Answer-
Slowness, high costs.
9. List the main costs of VAN.
Answer-
Account startup costs, usage costs and interconnect costs.
10. List four advantages of Internets.
Answer-
Flat pricing, cheap access, common standards and secure.
11. How much will an EDI implementation cost?
Answer-
Prices for EDI products vary from no cost ( for very simple one-function products) to several thousands of dollars for full-function applications.
The final cost depends on several factors:
12. What is VAN? with the help of a diagram explain the functions of third party VAN.
Answer-
A VAN is a communications network that typically exchanges EDI messages among trading partners. It also provides other services, including holding messages in “electronic mailboxes,” interfacing with other VANs and supporting many telecommunications modes and transfer protocols.
13. What is EDI? List the factors that make the inteRnet useful for EDI
Answer-
--------------------
CHAPTER-8 (Intra organizational Electronic Commerce)
1. What is work flow management?
Answer-
It is the concept of task coordination for better results.
2. What are the two main issues that are focused by customization?Answer-
Time to market and flexible operations.
3. What is supply chain management?Answer-
It is the chain of suppliers and customers for a particular business.
4. What is the main disadvantage of vertical organization?Answer-
It allows gaps to exist between employees of different departments.
5. What is the main difference between horizontal and vertical organizations?Answer-
Horizontal organization is two tiered as against multiple tiered organization.
6. Define virtual organization?
Answer-
It is a network closely coupled upstream with suppliers and downstream with customers.
7. What are the two approaches of virtual organization?
Answer-
Downward and lateral.
8. What are the two main categories of SCM?
Answer-
Push based and pull based.
9. What are the primary elements of SCM
Answer-
Logistics, integrated marketing and agile manufacturing
10. What is meaning of push based and pull based supply chains.
Answer-
--------------------
CHAPTER-9 (The Need for Computer Security)
1. What are the two basic types of physical data security?
Answer-
Data integrity and Data availability.
2. Name the two type of threats to data.
Answer-
Active threats and passive threats.
3. What is masquerade?
Answer-
The attacker pretends to e some one else.
4. What is IP spoofing?
Answer-
It is a tool that intruders use to take over an open terminal and login connections after they
get root access.
5. What is Telnet?
Answer-
Telnet enables users to log in to remote computers.
6. What is the basic principle of kerberos?
Answer- It provides authentication to messages in an open network.
7. What is the unit over which kerberon acts?
Answer- Tickets
8. What are the three ownership groupings in unix files?
Answer-
Owner, user, others.
9. What are the three levels of file access permissions in unix?
Answer-
Read, write and execution.
10. What are the three main categories of fire walls?
Answer-
Packet filters, application level gateways and proxy servers.
11. Give the remarks on hacking technionces.
Answer-
12. What is the meaning of Active and passive theats.Answer-
13. List the guidelines to be followed for security policy?Answer-
14. List the issues to he addressed while displaying a security policy.Answer-
15. Differntiate between viruses and worrms.Answer-
16. Explain the most prominent secure transmission protocol for web communications.
Answer-
--------------------
CHAPTER-10 (Approaches to Safe Electronic Commerce)
1. List the four basic goals of electronic Security?
Answer-
Privacy, Integrity, authentication and availability.
2. What is non-repudiation?
Answer-
A person cannot deny after having sent / received a message.
3. What is key Management?
Answer-
To create, distribute, revoke and manage keys.
4. What is encryption of data?
Answer-
Encoding of data with a suitable key.
5. What is the encryption algorithm on which SSL depends?
Answer-
The RSA algorithm.
6. What are basic elements in a SEPP process?
Answer-
Card holder, merchant, acquirer and certificate management systems.
7. What does SET stand for?
Answer-
Secure Electronic Transaction.
8. What is meant by integrity of data?9. List the key functions of SET specification.
Answer-
The contents should not get changed.
10. Lisy the major business requirements addressed by SEPP.Answer-
11. Explain S-HTTP and SSL protocols.
Answer-
--------------------
CHAPTER-11(Secure Electronic Transaction)
No comments:
Post a Comment