Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
52 views3 pages

E-Commerce Models & Encryption

Spring 2024_IT430_2 Solution

Uploaded by

2myofficesheet
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views3 pages

E-Commerce Models & Encryption

Spring 2024_IT430_2 Solution

Uploaded by

2myofficesheet
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

1

Assignment No. 02
SEMESTER Spring 2024
IT430 E-Commerce

Question 1:

Scenario

E-business models are essential frameworks that define how companies leverage the internet to
conduct their operations, serve customers, and generate revenue. They vary based on the nature
of transactions, the parties involved, and the strategies employed to reach target markets. The
following table presents different scenarios that depict various e-business models in action.

Given the scenarios in the Table 1 below, identify which e-commerce model each scenario
represents.

Table 1: E-Business Models with Scenarios

Scenario E-commerce Model


1. Ahmed wants to purchase a rare book. He visits an
online bookstore, finds the book he wants, reads some
reviews, and buys it directly from the website. The B2C
bookstore handles the transaction and shipping directly to
Ahmed.
2. ABC Corporation, a large manufacturer of automotive
parts, sources components from multiple suppliers online.
They have established partnerships with various suppliers B2B
who provide them with the necessary parts to maintain
their production schedules.
3. Zara, a consumer, has an antique piece of furniture she
wants to sell. She lists it on an online marketplace where
other users can bid on the item. John, another consumer, C2C
wins the auction and purchases the antique directly from
Zara.
4. The federal government is seeking a company to
develop a new public health website. They award the
contract to Digital Solutions Ltd., which specializes in
B2G
government projects. Digital Solutions Ltd. develops and
maintains the website as per the government’s
requirements.
5. Faiza, an independent artist, creates a profile on an
online platform dedicated to handcrafted goods. She C2C
uploads images of his art pieces along with detailed
2

Scenario E-commerce Model


descriptions. Customers can browse her portfolio and
purchase her artworks directly through the platform.

Question 2): As an intelligence officer, you are tasked with cryptograph the following message
using two cryptography techniques:

1. Substitution Apply the substitution method where:


o Replace every occurrence of the letter 'a' with 'z' if 'a' appears before the letter’t’,
otherwise replace it with 'w'.

2. Transposition Use the transposition technique with a 4 x 10 table to encrypt the


substituted message.

The Message to be encrypted is: “Plan ahead for the upcoming event with caution”

Solution:

Message to be encrypted: "Plan ahead for the upcoming event with caution"

Step 1: Substitution

 Replace every occurrence of the letter 'a' with 'z' if 'a' appears before the letter’t’,
otherwise replace it with 'w'.

Substituted Message: "Plzn zhezd for whe upcoming evenw wiwh czuwion"

Step 2: Transposition

 Use the transposition technique with a 4 x 10 table to encrypt the substituted message
(without spaces).

Formatted Message (without spaces): "Plznzhezdforwheupcomingevenwwiwhczuwion"

Transposed Message: "Pzdwpivwcilhfhcneizozeoeognwunnzrumewhw"

The steps and result are detailed below:

1. Substitution Cipher:
3

o Substituted Message: Plzn zhezd for whe upcoming evenw wiwh czuwion
2. Transposition Cipher:
o Message without spaces: Plznzhezdforwheupcomingevenwwiwhczuwion
o 4x10 Table:

Pzdwpivwci
lhfhcneizo
zeoeognwun
nzrumewhw

o Transposed Message: Pzdwpivwcilhfhcneizozeoeognwunnzrumewhw

This completes the encryption process as per the assignment requirements.

You might also like