1
Assignment No. 02
SEMESTER Spring 2024
IT430 E-Commerce
Question 1:
Scenario
E-business models are essential frameworks that define how companies leverage the internet to
conduct their operations, serve customers, and generate revenue. They vary based on the nature
of transactions, the parties involved, and the strategies employed to reach target markets. The
following table presents different scenarios that depict various e-business models in action.
Given the scenarios in the Table 1 below, identify which e-commerce model each scenario
represents.
Table 1: E-Business Models with Scenarios
Scenario E-commerce Model
1. Ahmed wants to purchase a rare book. He visits an
online bookstore, finds the book he wants, reads some
reviews, and buys it directly from the website. The B2C
bookstore handles the transaction and shipping directly to
Ahmed.
2. ABC Corporation, a large manufacturer of automotive
parts, sources components from multiple suppliers online.
They have established partnerships with various suppliers B2B
who provide them with the necessary parts to maintain
their production schedules.
3. Zara, a consumer, has an antique piece of furniture she
wants to sell. She lists it on an online marketplace where
other users can bid on the item. John, another consumer, C2C
wins the auction and purchases the antique directly from
Zara.
4. The federal government is seeking a company to
develop a new public health website. They award the
contract to Digital Solutions Ltd., which specializes in
B2G
government projects. Digital Solutions Ltd. develops and
maintains the website as per the government’s
requirements.
5. Faiza, an independent artist, creates a profile on an
online platform dedicated to handcrafted goods. She C2C
uploads images of his art pieces along with detailed
2
Scenario E-commerce Model
descriptions. Customers can browse her portfolio and
purchase her artworks directly through the platform.
Question 2): As an intelligence officer, you are tasked with cryptograph the following message
using two cryptography techniques:
1. Substitution Apply the substitution method where:
o Replace every occurrence of the letter 'a' with 'z' if 'a' appears before the letter’t’,
otherwise replace it with 'w'.
2. Transposition Use the transposition technique with a 4 x 10 table to encrypt the
substituted message.
The Message to be encrypted is: “Plan ahead for the upcoming event with caution”
Solution:
Message to be encrypted: "Plan ahead for the upcoming event with caution"
Step 1: Substitution
Replace every occurrence of the letter 'a' with 'z' if 'a' appears before the letter’t’,
otherwise replace it with 'w'.
Substituted Message: "Plzn zhezd for whe upcoming evenw wiwh czuwion"
Step 2: Transposition
Use the transposition technique with a 4 x 10 table to encrypt the substituted message
(without spaces).
Formatted Message (without spaces): "Plznzhezdforwheupcomingevenwwiwhczuwion"
Transposed Message: "Pzdwpivwcilhfhcneizozeoeognwunnzrumewhw"
The steps and result are detailed below:
1. Substitution Cipher:
3
o Substituted Message: Plzn zhezd for whe upcoming evenw wiwh czuwion
2. Transposition Cipher:
o Message without spaces: Plznzhezdforwheupcomingevenwwiwhczuwion
o 4x10 Table:
Pzdwpivwci
lhfhcneizo
zeoeognwun
nzrumewhw
o Transposed Message: Pzdwpivwcilhfhcneizozeoeognwunnzrumewhw
This completes the encryption process as per the assignment requirements.