THEORY EXAMINATION (SEM–VI) 2016-17 E-COMMERCE
E-COMMERCE – NCS068
B.Tech (SEM VI) | Section-wise Solved Answers
SECTION – A
(10 × 2 = 20 Marks)
(a) Wireless Application Protocol (WAP)
WAP is a communication protocol that enables mobile devices to access internet content and services. It was designed to support wireless devices with limited bandwidth and display capability.
(b) Anonymous / Auditable Transfer
Anonymous transfer hides the identity of the user during transactions, while auditable transfer allows authorized agencies to trace transactions if required for legal or security reasons.
(c) E-cash
E-cash is a form of electronic money used for online transactions. It functions like physical cash and supports fast, low-value digital payments.
(d) CRM (Customer Relationship Management)
CRM is a strategy and software system used to manage customer interactions, sales, marketing, and support to improve customer satisfaction and retention.
(e) SCM (Supply Chain Management)
SCM manages the flow of goods, information, and finances from suppliers to consumers. E-commerce enhances SCM through real-time tracking and automation.
(f) E-mail spoofing
Email spoofing is a cyber-attack where the sender’s email address is forged to appear as a trusted source, often used for phishing and fraud.
(g) VPN (Virtual Private Network)
A VPN creates a secure encrypted tunnel over the internet, allowing users to safely access private networks and protect data transmission.
(h) Active Server Pages (ASP)
ASP is a server-side scripting technology used to create dynamic and interactive web pages by embedding scripts within HTML.
(i) Common Gateway Interface (CGI)
CGI is a standard protocol that allows web servers to execute external programs to generate dynamic web content.
(j) VRML (Virtual Reality Modeling Language)
VRML is a language used to create interactive 3D objects and virtual environments on the web.
SECTION – B
(Attempt any five – 5 × 10 = 50 Marks)
(a) Intra-organizational Commerce & B2E
Intra-organizational commerce supports internal business processes.
B2E services include employee portals, payroll systems, training modules, and internal procurement systems.
(b) Protocol & Role of TCP/IP
A protocol is a set of rules governing data communication.
TCP/IP enables reliable data transmission, routing, error detection, and end-to-end communication on the internet.
(c) Radio-based LANs
Radio-based LANs (Wireless LANs) use radio waves instead of cables.
Limitations include interference, lower speed, security risks, and limited range.
(d) Domain Name System (DNS)
DNS translates domain names into IP addresses.
It is a global distributed information system because data is stored and managed across multiple servers worldwide.
(e) Firewall & its Types
A firewall protects networks by filtering traffic.
Types include packet filtering firewall, proxy firewall, stateful inspection firewall, and next-generation firewall, each offering increasing security levels.
(f) SMTP vs HTTP
SMTP is used for email transmission, while HTTP is used for web communication.
HTTP supports multimedia content, hyperlinks, stateless communication, and client-server architecture.
(g) EDI & Four-Layer Architecture
EDI is the electronic exchange of business documents.
Four layers are:
Application layer
Translation layer
Transport layer
Physical layer
(h) Impact of E-commerce on SCM
E-commerce improves supply chain visibility, reduces delays, lowers costs, and enables just-in-time inventory management.
SECTION – C
(Attempt any two – 2 × 15 = 30 Marks)
(3)
(i) Interoperability in online payment systems
Interoperability allows different payment platforms, banks, and networks to work together seamlessly.
(ii) Security issues in online payments
Security issues include data theft, fraud, identity theft, hacking, and denial-of-service attacks.
(iii) Mondex Smart Card System
Mondex uses smart cards to store electronic cash. Transactions occur offline with secure authentication between cards.
(4) Short Notes
ATM: Electronic banking system for cash withdrawal and services.
ISDN: Digital transmission system for voice and data.
SONET & SDH: High-speed optical fiber communication standards used in telecom networks.
(5)
(i) Non-repudiation in E-commerce
Achieved using digital signatures and public key infrastructure to ensure parties cannot deny transactions.
(ii) Low encryption attack on RSA
Occurs when small key sizes are used, making RSA vulnerable to brute-force or mathematical attacks.
(iii) SET Protocol
SET (Secure Electronic Transaction) ensures secure online card payments using encryption and digital certificates.
Related Notes
BASIC ELECTRICAL ENGINEERING
ENGINEERING PHYSICS THEORY EXAMINATION 2024-25
(SEM I) ENGINEERING CHEMISTRY THEORY EXAMINATION...
THEORY EXAMINATION 2024-25 ENGINEERING MATHEMATICS...
(SEM I) THEORY EXAMINATION 2024-25 ENGINEERING CHE...
(SEM I) THEORY EXAMINATION 2024-25 ENVIRONMENT AND...
Need more notes?
Return to the notes store to keep exploring curated study material.
Back to Notes StoreLatest Blog Posts
Best Home Tutors for Class 12 Science in Dwarka, Delhi
Top Universities in Chennai for Postgraduate Courses with Complete Guide
Best Home Tuition for Competitive Exams in Dwarka, Delhi
Best Online Tutors for Maths in Noida 2026
Best Coaching Centers for UPSC in Rajender Place, Delhi 2026
How to Apply for NEET in Gurugram, Haryana for 2026
Admission Process for BTech at NIT Warangal 2026
Best Home Tutors for JEE in Maharashtra 2026
Meet Our Exceptional Teachers
Discover passionate educators who inspire, motivate, and transform learning experiences with their expertise and dedication
Explore Tutors In Your Location
Discover expert tutors in popular areas across India
Discover Elite Educational Institutes
Connect with top-tier educational institutions offering world-class learning experiences, expert faculty, and innovative teaching methodologies