Professional Documents
Culture Documents
B Com III Year Ecom Oct
B Com III Year Ecom Oct
B Com III Year Ecom Oct
E- Commerce
Part A
1. What is E- Advertising?
Electronic advertising is advertising that uses the Internet and other forms of digital media
to help a business promote and sell goods and services.
Features :
Because large search engines contain millions and sometimes billions of pages, many
search engines not only just search the pages but also display the results depending upon
their importance. This importance is commonly determined by using various algorithms.
3. What is EDI
Tax Evasion
Businesses are required by law to provide records of their financial transactions to
the government so that their tax compliance can be verified. Electronic payment however
can frustrate the efforts of tax collection.
Fraud
Electronic payment systems are prone to fraud. The payment is done usually after
keying in a password and sometimes answering security questions. There is no way of
verifying the true identity of the maker of the transaction. As long as the password and
security questions are correct, the system assumes you are the right person.
Impulse Buying
Electronic payment systems encourage impulse buying, especially online. You are
likely to make a decision to purchase an item you find on sale online, even though you had
not planned to buy it, just because it will cost you just a click to buy it through your credit
card. Impulse buying leads to disorganized budgets and is one of the disadvantages of
electronic payment systems.
Payment Conflict
Payment conflicts often arise because the payments are not done manually but by
an automated system that can cause errors. This is especially common when payment is
done on a regular basis to many recipients. If you do not check your pay slip at the end of
every pay period, for instance, then you might end up with a conflict due to these technical
glitches, or anomalies.
There are two ways for sites to be included in a Web directory's listings; either the site
owner can submit the site by hand, or the directory's editor(s) will eventually come across
that site.
6. What is internet
The Internet, sometimes called simply "the Net," is a worldwide system of computer
networks - a network of networks in which users at any one computer can, if they have
permission, get information from any other computer (and sometimes talk directly to
users at other computers). It was conceived by the Advanced Research Projects Agency
(ARPA) of the U.S. government in 1969 and was first known as the ARPANet. The original
aim was to create a network that would allow users of a research computer at one
university to "talk to" research computers at other universities. A side benefit of
ARPANet's design was that, because messages could be routed or rerouted in more than
one direction, the network could continue to function even if parts of it were destroyed in
the event of a military attack or other disaster.
7. What is HTML?
NTP uses Coordinated Universal Time (UTC) to synchronize computer clock times to a
millisecond, and sometimes to a fraction of a millisecond. UTC time is obtained using
several different methods, including radio and satellite systems. Specialized receivers are
available for high-level services such as the Global Positioning System (GPS) and the
governments of some nations. However, it is not practical or cost-effective to equip every
computer with one of these receivers. Instead, computers designated as primary time
servers are outfitted with the receivers and they use protocols such as NTP to synchronize
the clock times of networked computers. Degrees of separation from the UTC source are
defined as strata. A radio clock (which receives true time from a dedicated transmitter or
satellite navigation system) is stratum-0; a computer that is directly linked to the radio
clock is stratum-1; a computer that receives its time from a stratum-1 computer is
stratum-2, and so on.
Accurate time across a network is important for many reasons; even small fractions of a
second can cause problems. For example, distributed procedures depend on coordinated
times to ensure that proper sequences are followed. Security mechanisms depend on
coordinated times across the network. File system updates carried out by a number of
computers also depend on synchronized clock times. Air traffic control systems provide a
graphic illustration of the need for coordinated times, since flight paths require very
precise timing (imagine the situation if air traffic controller computer clock times were not
synchronized).
The term NTP applies to both the protocol and the client/server programs that run on
computers. The programs are compiled by the user as an NTP client, NTP server, or both.
In basic terms, the NTP client initiates a time request exchange with the time server. As a
result of this exchange, the client is able to calculate the link delay and its local offset, and
adjust its local clock to match the clock at the server's computer. As a rule, six exchanges
over a period of about five to 10 minutes are required to initially set the clock. Once
synchronized, the client updates the clock about once every 10 minutes, usually requiring
only a single message exchange. In addition to client/server synchronization, NTP also
supports broadcast synchronization of peer computer clocks. Unfortunately, the NTP
protocol can be exploited and used for denial of service (DoS) attacks because it will reply
to a packet with a spoofed source IP address and because at least one of its built-in
commands will send a long reply to a short request
S-HTTP does not use any single encryptionsystem, but it does support the Rivest-Shamir-
Adleman public key infrastructure encryption system. SSL works at a program layer slightly
higher than the Transmission Control Protocol (TCP) level. S-HTTP works at the even higher
level of the HTTP application. Both security protocols can be used by a browser user, but
only one can be used with a given document. Terisa Systems includes both SSL and S-HTTP
in their Internet security tool kits.
The online consumer expects quality, convenience, value, low price and control.
To meet these expectations, the business process model from consumer’s perspective
grouped seven activities into 3 phases.
1) Buyer contact vender to purchase product, through WWW, Email, Telephone etc.
2) Vender states price
3) Buyer and vender may or may not engage in negotiation.
4) If satisfy, a buyer authorized payment to the vendor with an encrypted transaction for
the agreed price.
5) Vendor contacts his or her billing service to verify the encrypted authorization for
authentication.
6) Billing service decrypts authorization and check buyer’s account balance and put hold
on the amount of transfer
7) Billing service gives the vendor the ‘green light’ to deliver products and sends a
standardize message giving details of transactions for merchants records.
8) On notification of adequate funds to cover financial transactions, vendor delivers the
goods to buyers.
9) On receiving the goods the buyers signs and delivers receipt. Vendor tells billing service
to complete the transactions.
PURCHASING SELLING
Some steps are done manually like searching for vendor & selecting a vendor.
After selecting, rest of the steps I.e. purchase order, sales order etc. through VAN.
Then again preparing check, mailing check, under purchasing and shipping good, invoice
mailing to customer are done manually.
Advantages:-
1. The time from approving a purchase order to receipt of the purchase order and
preparation of the sales order by the vendor is typically reduced by as much as 3-7 days.
2. The no. of clerks to perform the entire cycle are reduced.
3. The possibility of clerical errors is also reduced as in the amount of paperwork
generated by duplicate copies.
EDI continues to prove its worth as an electronic message data format. This research states
that “the annual volume of global EDI transactions exceeds 20 billion per year and is still
growing.”1 For buyers that handle numerous transactions, using EDI can result in millions
of dollars of annual savings due to early payment discounts. From a financial perspective
alone, there are impressive benefits from implementing EDI. Exchanging documents
electronically improves transaction speed and visibility while decreasing the amount of
money you spend on manual processes. But cost savings is far from the only benefit of
using EDI.