E-Commerce Important questions unit wise:
1. What is EDI? ? Give one advantage of EDI
Ans: Electronic Data Interchange (EDI) is the exchange of business documents between any two
trading partners in a structured, machine – readable form. It can be used to electronically transmit
documents such as purchase – orders, invoices, shipping bills, receiving advices, and other standard
business correspondence between trading partners.
2. According to the EDI University, what is EDI?
Ans: “EDI stands for Electronic Data Interchange, a method of transporting all types of information,
such as purchase orders, invoices, payments and even graphics, to another party electronically.
3. What is TCP/IP?
Ans: The term TCP/IP(transmission control protocol/internet protocol) refers to the protocols suite
and a pair of the TCP and IP are the most important internet communication protocols. An internet
protocol is a unique address or identifier of each computer or communication devices on the network
and internet.
4. What is Ethernet?
Ans:This is the most widely used protocol. This protocol uses an access method called
CSMA/CD(carrier sense multiple access/collision detection)
5. What is HTTP?
Ans: hypertext transfer protocol is a method of transmitting the information on the web. HTTP
basically publishes and retrieves the HTTP pages on the World Wide Web .HTTP is a language that is
used to communicate between the browser and web browser.
6. What is FTP?
Ans: FTP or file transfer protocol is used to transfer(upload/download) data from one computer to
another over the internet or through or computer network.FTP is a most commonly communication
protocol for transferring the files over the internet.
7. What is SMTP?
Ans: Simple message transfer protocol that is used to send the email messages between the servers.
Most email systems and email clients use the SMTP protocol to send messages to one server to
another.
8. What is POP3?
Ans: in computing, email clients such as ms outlook, outlook express and thunderbird use post office
protocol to retrieve emails from the remote server over the TCP/IP connection. most email
applications use POP protocol.
9. what is DHCP?
Ans: the DHCP or dynamic host configuration protocol is a set of rules used by a communication
device such a router.
10. what is UDP?
Ans: the user datagram protocol is almost important protocol of the TCP/IP suite and is used to send
the short messages known as datagram.
11. Expand OSI/ISO
Ans: OSI-Open systems interconnection and ISO- International organization for standardization.
12. What is DNS?
Ans: the Domain name system is a method of administering names by giving different groups
responsibility for subsets of names. These are separated by periods.
13. What is router?
Ans: In reality packets are being passed from one system to another, the networks on the internet uses
a hardware device called a Router.
14. What is IP address?
Ans: Each machine on the internet is assigned a unique address called an IP address.
15. What is m-commerce?
Ans: it is the buying and selling of goods and services through wireless handheld devices such as
cellular telephone and personal digital assistants(PDA’s).it is known as m-commerce.
16. what is E-commerce?
Ans: e-commerce commonly associated with information on buying and selling of products and
services via computer networks using technologies like web,
E-mail, EFT, EDI etc..
Or
E-commerce is also defined as the process of using digital technology for transmitting information
between organizations.
17. What is firewall?
Ans: firewall (software or hardware) protect a server, a network and an individual personal computer
by viruses and hackers.
18. What is E-mail?
Ans: E-mail or electronic mail permits the transmission of electronic messages between computer
users.
19. What is HTML?
Ans: Hypertext mark-up language used to create World Wide Web pages.
20. What is URL?
Ans: uniform resource locator is the address of a file or resource accessible on the internet. Ex:
http://www.kckclg.org/
21. What is Cryptography?
Ans: Cryptography is a method of storing and transmitting data in a particular form so that only those
for whom it is intended can read and process it.
22. What is Encryption?
Ans: Encryption Means of hiding a message through substitution or rearranging.
23. What is Decryption?
Ans: Decryption is the process of converting encrypted data back into its original form, so it can be
understood.
24. Expand NAP and ISP?
Ans: NAP—Network access point or network access provider
ISP—Internet service providers
25. Expand IPOP.
Ans: Internet point of presence
26. What is e-commerce?
Ans: E-commerce is a modern business methodology that addresses the needs of organization,
merchants and consumers to cut costs while improvin the quality of goods and services and increasing
the speed of service delivery.
27 What is I-way?
Ans: E-commerce is associated with the buying and selling of information, Products and services via
computer networks today and in the future via any one of the myriad of networks
that make up the
information superhighway (I-way).
28. What is message passing?
Ans: The client-server model allows the client to interact with the server. Through a request –reply
sequence governed by a paradigm known as message Passing.
28. What is authentication?
Ans: The process of identifying an individual usually based on a username and password. In security
systems, authentication is distinct from authorization , which is the process of giving individuals
access to system objects based on their identity. Authentication merely ensures that the individual is
who he or she claims to be, but says nothing about the access rights of the individual.
Five marks questions
29. List some challenges that each highway route provider faces?
Ans: • Telecom-based
• Cable-based
• Computer Network-based
• Wireless
30. What is a Network Access Point?
A NAP is a high speed network or switch to which a number of routers can be connected for the
purpose of traffic exchange and interoperation.
31. List some services of the internet? Ans: Some services of the internet are:
• Individual to group communications
• Information Transfer and delivery services
• Information Databases
• Information processing services
• Resource-sharing services
32. What are the 3 types of electronic tokens? Ans: • Cash or real-time
• Debit or prepaid
• Credit or postpaid
33. What are the properties of e-cash?
Ans: • E-cash must have a monetary value
• It must be interoperable
• It must be storable and retrievable
• It should not be easy to copy or tamper with while being exchanged
34. What are smart cards?
Ans: Smart cards are credit and debit cards and other card products enhanced with microprocessors
capable of holding more information than the traditional magnetic stripe.
35. Mention the 2 types of smart cards.
Ans: • Relationship-based smart credit cards
• Electronic purses
36. Mention some factors to be included for designing electronic payment systems.
Ans: • Privacy
• Security
• Intuitive interface
• Database integration
• Brokers
• Pricing
• Standards
37. Specify the 4 layers of EDI architecture. Ans: • EDI semantic layer
• EDI standard layer
• EDI transport layer
• Physical layer
38. What are the 2 major EDI standards? Ans: • ANSI X.12
• EDIFACT
39. Give the uses of smart card.
Ans: A smart card, typically a type of chip card, is a plastic card that contains an embedded computer
chip– either a memory or microprocessor type that stores and transacts data. This data is usually
associated with either value, information, or both and is stored and processed within the card's chip.
40. why do you need Encryption of data?
Ans: The main purpose for Encrypting your data and need is to ensure your privacy, protect your data,
and secure intellectual property. This is also known as endpoint encryption it can still be used to
protect a user's identity and privacy.
41. What is digital signature?
Ans: A digital signature is an authentication mechanism that enables the creator of the message to
attach a code that acts as a signature.
43. What is Mobile Commerce?
Mobile Commerce is any transaction, involving the transfer of ownership or Rights to use goods and
services, which is initiated and/or completed by using mobile access to compute mediated networks
with the help of an electronic device."
or
The digital signature is to the electronic world what the handwritten signature is to the commerce.
Five marks questions:
1. Describe EDI applications used in business
2. Explain website design issues
3. Explain: 1)E-mail 2) Business to Business e- commerce
4. Explain the E-mail security?
5. Explain the internet industry structure with diagram?
6. Explain the follows:1.LAN 2.WAN
7. What is meant by security policy? Explain the security procedures?
8. Explain the follows:1.FTP 2 E-mail
9. Describe silent features of hypertext transfer protocol
10. Explain the concept of World Wide Web server.
11. Explain the transaction security in network?
12. Explain the follows 1.Internet 2.DNS
13. Explain the Features of E-Commerce
Ten marks questions
1. Explain the types of Business models in E-Commerce
2. Explain the applications of E-commerce
3. Explain the conventional trading process?
4. Explain framework or architecture of E- commerce?
5. Explain the basic building blocks of an EDI system?
6. Describe TCP/IP reference model with diagram?
7. Explain framework or architecture of M- commerce?
8. What is firewall? Explain its types in detail?
9. Explain the protecting the network services?
10. Explain internet marketing in detail.
11. Explain web clients and web servers
12. Describe the credit card transactions process in detail.
13. Explain the follows: 1.cryptography 2.digital signature
14. Explain the transaction security in network
13. Explain the different types of online payment system.