You are on page 1of 16

2 MARKS QUESTION BANK

Faculty Name Subject Name Year Degree & Branch : K.Kavitha : Electronic Commerce : II Year : MCA Subject Code Semester :MC9271 :IV

UNIT I - INTRODUCTION
1. Define E-com? Electronic commerce commonly known as E_com. It is a common via any electronic media such as TV, fax and online networks. Buying and selling the product or services over electronic system, such as the internet and other computer networks. 2. List the goals of electronic commerce. Fast loading pages. Clean, product centric layout. Efficient and intuitive navigations structure. Checkout oriented usage flow. Search engine friendly code. 3. What are the advantages of electronic commerce? Faster buying/selling procedure, as well as easy to find products. More each to customers, there is no theoretical geographic limitations. Low operational costs and better quality of services. Easy to start and manage a business. 4. List the types of electronic commerce. There are mainly five types of e_commerce modes. i)Business to customer(B-to-C) ii)Business to Business(B-to-B) iii)Customer to Customer(C-to-C) iv)Peer to Peer(P-to-P) v)m_commerce. 5. Differentiate E-commerce and E-business. i) E_commerce is the subset of E_Business. If you remember the venn diagram studied in school then u can well understand. ii) Those activities which effectually involve monetary transactions are termed as e_commerce. However, e-business is a much broader term.

iii) To sell online is e_commerce but to bring and retain customers and educate them online about the product or service is e-business. 6. What are the functions of E-commerce? Marketing and communication Student service Healthcare Online content and administration administration and intranet. 7. What are the features of e-commerce? 1. Ubiquity 2. Global each 3. Universal standards 4. Richness 5. Interactivity 6. Information density 7. personalization and customization 8. Define network. In information technology a network is a series of points or nodes interconnected by communication paths networks can interconnect with other networks and contain sub networks. 9. Define distributed processing and is advantages. A variety of computer systems that use more than one computer, or processor to run an application. This includes parallel processing in which a single computer uses more than one CPU to execute programs. More often however, distributed processing refers to local area networks designed so that. Single program can run simultaneously at various sites. Most distributed processing systems contains sophisticated software that detects idle CPU on the network and parcels out programs to utilize them. Advantage: Quicker response time Lower costs Improved data integrity Reduced host processors costs Resource sharing

10. Define EDI EDI can be defined as the exchange of business data from one organizations computer application to the computer application of a trading partner. EDI message exchange is typically orders and invoices, although there are hundreds of available messages. 11. Define TCP/IP Stands for transmission control protocol/ Internet protocol. These two protocols were developed in the early days of the internet by the U.S military. The purpose was to allow computers to communicate over long distance networks. The TCP part has to do either the verifying delivery of the packets. The IP part refers to the moving of data packets between nodes. TCP/IP has since then become the foundation of the internet, therefore, TCP/IP software is built into all major o/s, such as unix, windows and the mac os. 12. What is commercial transaction? Give an example.
An interaction between two or more parties in which goods, services or something of value is exchanged for some type of remuneration. Some aspects of commercial transactions, such as truthful representation and contract provisions, are governed by law . Examples: Sales Contracts Generally for goods (toasters, cars, etc.) License Contracts Generally for intangibles (software, electronic media, etc.) Banking Transactions Negotiable instruments (checks, promissory notes, letters of credit, warehouse receipts, bills of lading).

13. Define Internet and Intranet. The Internet is sometimes called as The Net, is a world wide system of computer networks a networks in which users at any one computer can ,if they have permission ,get information from any other computer. An intranet is a private network that is contained with in an enterprise. It may consists of many inter linked local area network and also used leased lines in the world wide area network. They typically, the intranet includes connections through one or more gateway computer to the outside Internet.

14. Define web server and web browsers. A web server is a program, that using the client/server model and world wide webs Hyper Text Transfer Protocol (HTTP),serves the files that form web pages to web users. For example. MS IIS (Internet Information Server). Novells web server for users of its NetWare. A browser is an application program that provides a wave to look at and interact with all the information an the world wide web. The word browser seems to have originated prio r to the web as a generic term for user interfaces that let you brows text file online. 15. What is the purpose of IETF? Internet Engineering Task Force. To create high quality, relevant standard for the internet. develop and promotes internet standards. 16. Define electronic transaction.
An electronic transaction is the sale or purchase of goods or services, whether between businesses, households, individuals, governments, and other public or private organizations, conducted over computer-mediated networks. The goods and services are ordered over those networks, but the payment and the ultimate delivery of the good or service may be conducted on or off-line.

17. Advantages of internet. 1. communication 2. Information 3. Entertainment 4. Services 5. Ecommerce. 18. What are the advantages of electronic transaction?
Invoice Processing Sales Order Processing Finance and Insurance

19. Define EFT. Moving founds between different accounts in the same or different banks , through the use of write transfer ,Automated Teller Machine or Computers but without the use of paper documents. 20. What are the advantages of electronic transaction? Reduces Errors Creates Transaction Database

Increases Accountability Minimizes Fraud Quicker Transactions Eliminates Equipment Lowers Transaction Costs Faster Billing Recurring Billing 21. What are the features of electronic transaction? Electronic transaction has the following features
1. 2. 3. 4. Simple to use Cost effective Flexible Secure.

22. Define WWW.


The term WWW refers to the World Wide Web or simply the Web. The World Wide Web consists of all the public Web sites connected to the Internet worldwide, including the client devices (such as computers and cell phones) that access Web content. The WWW is just one of many applications of the Internet and computer networks.

23. 23. What are the components of WWW?


Structural Components Clients/browsers to dominant implementations Servers run on sophisticated hardware Caches many interesting implementations Internet the global infrastructure which facilitates data transfer Semantic Components Hyper Text Transfer Protocol (HTTP) Hyper Text Markup Language (HTML) eXtensible Markup Language (XML) Uniform Resource Identifiers (URIs)

SECURITY TECHNOLOGIES 1. Objective of cryptography. The whole point of cryptography is to keep information out of the hands of anyone but its intended recipient. Even if the massage gets intercepted, the meaning wont be apparent to the interceptor unless the interceptor is able to decipher it. Cryptography as we know it uses encryption to transform plain texts into encrypted texts. 2. Notes on codes and ciphers. Code: A code actually uses some method of interchanging vocabularies so that each code word represents some other non code word. Codes requires special code books which act like dictionaries; it the code book is lost encoded text cannot be interpreted and any one with the code book can read encoded text. Cipher: Ciphers are the basis of encryption scheme ciphers act on each character of a massage, transforming it according to some repeatable rule or algorithm. 3. What is the disadvantage of internet? The fit of personal information Spamming Virus threat Pornography. Theft of personal information : Name, address, credit card number can be accessed by the culprits. Spamming: It refers to sending unknown email bulk. Virus: It causes crashing your hard disk disrupts the normal functioning of computer. Pornography:The biggest threat related to your children healthy mental life.

4. Role of internet in E_com? Role of internet in E_com internet helps in connecting todays online savvy shopper with any retail or wholesale merchant that you can think of on easy task. From gathering information, knowledge, news, online shopping is one of the most promising function of the internet world. Compare prices on various item for purchasing. 5. Define confidentiality? When a message sent electronically sender and receiver can decide the message remain confidential and it should not read by another user. 6. What is message integrity? When a message send electronically both sender and receiver want to ensure that the message received exactly same as the message transmitted by the sender. It deals with methods that ensure that the contents of a message have not been tampered with and altered. 7. Define authentication? When a electronic message by the user or system identification of sender is verified in order to determine the correct sender. 8. What are the types of Security Attacks? Security attacks can be divided into two types.They are (I) Passive attack (II) Active attack 9. What is passive attack? Attends to learn for make use of information from the system and doesnt affect the system resources. It is difficult to detect, because they do not involve any alteration of the data. 10. What is active attack? Attends to alter system resources or affect their operation. Modifies the data s stream and creates a false stream. Eg: Modification of message Denial of service

Replay 11. Define cryptanalysis? Techniques used for deciphering a message without any knowledge of the enciphering details. 12. Define cryptography? The schemes used for enciphering is known as cryptography. 13. What is encryption ? The process of converting plaintext to cipher text is known as encryption or enciphering. 14. What is plain text? This is the original message or data that is fetch into the algorithm as input. 15. What is secret key? It is also an input of an input of an encryption algorithm. It is the value independent of the plain text. The algorithm will product a different output depending on the specific key being used at the time. 16. What is cipher text? This is the scrambled message produced as output. It depends on the plain text and the secret key. 17. What is Decryption Algorithm? This is essentially the encryption algorithm run in reverse . It takes the cipher text and the secret key and produces the original plain text. 18. What are the two requirements for secures use of conventional encryption? We need a strong encryption algorithm. Sender and receiver must have obtained office of the secret key in a secure fashion and must keep the key secure. 19. What is brute-force attack? The attacker tries every possible key on a piece of cipher text until an intelligible translation into plain text is obtained.

20. What are the cryptography application? There are three cryptography application .they are Encryption Digital signature Non-repudiation 21. Define non-reputation? It reference to digital security. Non-reputiation means to ensure that a transformed message has been send and received by the parties claiming to have send and received the message. Non-reputation is a way to guarantee that the sender of a message cannot later deny having send the message and that the recipient cant deny received the message.

UNIT III ELECTRONIC PAYMENT METHODS

1. What is the objective of S-HTTP? The objective of S-HTTP is to add support for a wide range of security mechanisms on top Of the interactions between browser and server. Protection mechanisms include the following Digital signature Message authentication Message encryption These mechanisms are used as negotiated between browser and server. 2. Define offline and online payment? The internet directly uses that to transmit transaction information protect that information with some kind of encryption method. That transaction is called number of evs-dropping than that the online payment of transactions. 3. What are the steps involved in credit card transaction? Authorization: The credit card holder makes purchase and the merchant submit the transaction to acquirer. Batching: It refers to storing of the entires day transactions together before sent to acquirer. Clearing and settlement: This request is transferred money form customers account to the merchant amount. Funding: After the money reaches to acquirer the amount transfers from acquirer to the merchant account. The merchant receives the amount from acquirer after the deduction of transaction fee. 4. What are the credit card features? The main feature of credit card is inerest rate the user pay unpaid balance. After purchase, the user get 30 days to make the user payment. There is no ineterst charge because is no balance , left to pay. The next feature is credit limits. This is the amount of money the user one allowed to change to the user. A credit card are fees associated with just having the credit card. This is the annual fee. Many cards have n annual fee.

5. Define EFT: Electronic funds transfer. Any transfer of funds that is indicated by electronic means, such as the electronic terminal, telephone, computer, ATM or the magnetic tape. A banking system by which transaction, such as the deposits or bill payments ,are made through computer database. (E.g): the user investment for therapeutic work with EFT(via telephone). It is used to solve problem through phone. 6. what are the different things that need to get types of negotiation between servers and browsers? Web browsers must able to send HTTP request and receive HTTP replies for mservers. The most popular browsers are fully graphical, although non graphical browsers are necessity for character-based OS. Browser functions can also be integrated into more complete network or communication packages. Web servers software is also orderly available. A computer must be connected to the internet running web server program and have web documents available. Server contain highly graphical content without being able to display that cont locally. E.g. for browser: Netscape navigator, internet explorer. E.g. for server: apache HTTP. Server, IIs, sun java system. 7. What are the credit card basics? A credit card definitions are in order. These terms are used throughout the SET document. Cardholder: the customer, customer Issuer: the bank who issued credit card. Merchant: the party from whom buying goods and services Acquirer: the financial institution/bank. Payment gateway: a device operated by acquirer. Brand; visa, MasterCard, discard.

8. Define non-repudiation. It means that a message of transferred has been sent and received by the parties climbing to have send and received the message. It is the way to guarantee that sender of the message cannot later having sent the message and that the recipient cannot deny having received the message . 9.Define digital currency. While secure commerce server are intended to protect transactions data being sent over the Internet, digital currencies and other types of digital payment mechanisms are intended to carry value in a protected digital form over the internet. It and payment systems do not necessarily complete against secure internet secure internet servers or commercial environment but can complement sun products by adding another way to exchange values. 10. Define electronic malls. Setting up a website for buying and selling can be complicated and expansive. Some companies have setting up electronic or virtual or online malls. The shopping mall is familiar and comfortable model for consumer and merchants and it is relatively to stimulate using www. 11. Define cash. Cash refers to money in the physical form of currency such as bank notes and coins. The word comes from French which means money box. Money in the form of bills or coins, there is a separate shortage of hard cash. Prompt payment for goods or services in negotiable money orders and checks. currency and coins on hand, bank balance and

12. what are the type of e_payment system? Online electronic commerce payment: a) Digital token based system b) Credit card based system Banking and financial payments. Retailing payments a)credit cards b)private label credit card, debit cards c)charge cards Electronic cash. 13. Define advantages of SLL. The first advantage is that SLL can be applied to any internet application not just world wide web although it was initially implemented only under HTTP. The second advantage is that once SSL connection has been negotiated between a server and a client, the resulting data communication channel private authentication and reliable. 14. Define acquirer. The financial institution or bank who establishes an account with the merchant and processes payment authorization and transactions for the merchants. Acquirer verities that credit card number of the credit holder and the transaction type. 15. What are the requirement of SET? Provide confidentiality of payment information and enable confidentiality of order information that is transmitted along with the payment information. Ensure the integrity of all transmitted data. Provide authentication that a cardholder is a legitimate user of a branded payment card account. Ensure the use of the best practices and system design technique to protect all legitimate parties in an electronic commerce transaction. Facilitate and encourage interoperability among software and network providers.

16. what are the SET participants? draw diagram? cardholder


internet

merchant certificate authority


Payment network interne t

Payment gateway
acquirer

17. Define digital signature and message integrity. It is a mathematical scheme for the demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was create by known sender and that it was not altered in transmit. The usages are following Software distribution Financial transaction Detect forgery / pampering

18. Define message integrity. The validity of transmitted message. It deals with methods that contents of a message have not been tampered with and altered. The most common approach is to use a one way hash function that combine all bytes in the message with a secret key and produces a message digest that is impossible to reverse. 19.What are the security protocol available in e-transactions. Listing ssl or HTTP is a matter of using special identifiers to indicate www document that require them. URL indicating a document defined with HTTP like as http://www.company.com/Math.html The first part defines that transmit that document s-HTTP is used to transmit data securely. The ssl use different scheme for document. 20. what are the methods of doing direct online purchase? Online purchasing seems to be breaking down into two categories: i) ii) Buying commodities online Buying specialty items online.

Buying commodity item online is much like buying them in person. The customer has many opportunities for comparison of specialty item, however, may be more impulsive. 21. what are the traditional transaction methods? The typically modern consumer uses a handful of different methods to pay for goods and services on a regular basis. Cash Credit Personal check. 22. What are the different things that need to get done to setup a server? Internet connection for requests from remote clients Request has been received \, the server software a creates a separate a process on the computer acting as server to handle that request. Server is able to respond to multiple concurrent requests from different clients of making each one wait for the server program itself to handle each individual request. Installation, configuration, and maintenance are performed by using CGI forms.

You might also like