Professional Documents
Culture Documents
Question 1. (2 Scores) : 1 Answer Mark
Question 1. (2 Scores) : 1 Answer Mark
Question 1. (2 Scores) : 1 Answer Mark
(2 scores)
Look at the figure below
Question 5. (2 scores)
Suppose that you are going to sell digital products. What should you do in terms of
giving better solution for your selling products?
Grab, with their clear pricing function, could work in this situation. 1
First, customer would know exactly how much they need to pay. In
driver side, they can’t reject the short distance trip without leaving
reasonable comment on the App. In other words, the driver should feel
comfortable when meeting their guess, which could increase the
quality of service.
Total 2
Question
3
There are two components in a domain name. They are brand and 0.5
extension part.
Total 2
Question
3
First, landing page is a web page with focused content to help business 1.0
reach their goal easier. Regarding information related to contacting
page, UEF is being in the right direction with 3 communication
channels, including telephone, email and address.
However, the page should be improved more to become a lead 1.0
generation landing page. Successful stories, lecturer teams should be
displayed in impressive ways to convert potentials customer to actual
customers.
Total 2
Question
4
There are two common ways when developing a website. In the first
option, we could use a CMS such as WP, Haravan, etc. to build our 0.5
site. If programming is our favourite, front-end, and back end language
would work.
- With CMS approach, we need to manually prepare content for our
website. Moreover, constructing a site with CMS is fast and
convenient for non-IT users. Therefore, digital marketers, and who
primarily work with content, may choose this. 1.5
- Programing alternative, on the other hand, needs some background
knowledge to start. Also, function-focused support is generally a signal
of this type of web site.
Total 2
Question
5
Drop shipping over the Internet is the technique in which sellers don’t 1
need to import selling products and put their effort in inventory
management. The steps below would briefly describe this
1. Customers purchase a product from drop shipping website
2. Order would be redirected to partners
3. Partners choose the correct product in terms of quantity, color,
size, etc. for the order, and then package them.
4. Packaged products are delivered to the clients with YOUR
Company Info
With characteristics above, drop shipping is fit for those don’t have 1
much money to set up a direct selling business. However, they need
- To be an expert of their selling products
- Well understand about their target audiences
- Always find out how to add value to their customers
Total 2
Question 1. (2 scores)
Look at the picture below
Total 2
Question
3
First at all, we need to aware that the company are selling physical 2
product, technological good in this case. Thus, to implement inventory
management tasks, the business should find out answers for following
questions:
- How many remaining items in the warehouse?
- With poor performance products, how to release their occupied
resources such as space, maintenance team?
Total 2
Question
4
- Web page is a document which could be accessed over the Internet 1
by using a web browser such as Google Chrome, Safari.
- Web site is a set of many web pages. Each web site needs to have a
topic, and web pages in it should be supporting material to help visitors
better understand about the subject of the website.
- There are several types of website. In the context of e-commerce
module, the site of FPT shop could be used an illustration example.
+ First, it is a site to sell product online.
1
+ Supporting web pages in this case would be: phone, laptop, and
smart pages. The purpose of this is to help customers easily find out
the product they want to buy.
Total 2
Question
5
At this time (2020), YouTube is being the second largest social 2
platform in the world. Business could utilize such environment in
several ways, including:
- Help customers better understand about their product. For example,
Shiseido set up a channel to serve their clients who purchased their
products.
- Business could work with famous channel to introduce their product
or service. Win-win solution such as ‘Xe hay’ channel and Mercedes
would be a good instance in this case.
-
Total 2
Question 1. (2 scores)
How are the SSL/TLS protocols used in securing Internet communications?
Question 2. (2 scores)
What risks do Bitcoin users face?
Question 3. (2 scores)
What are five of the major differences between the early years of e-commerce and
today’s e-commerce?
Question 4. (2 scores)
What is nonrepudiation and why is it an important dimension of e-commerce security?
What technologies are used to establish nonrepudiation?
Limited Use
Block Withholding
Technology Reliance
Little or No Regulation
Fraud
Cybertheft
Young Technology
Total 2
Question
3
The major differences between the early years of e-commerce (the 1
Innovation stage), the period between 2001-2006 (the Consolidation
stage) and today’s e-commerce (the Reinvention stage) are:
• During the Innovation stage, e-commerce was primarily
technology-driven. During the Consolidation stage, it was primarily
business-driven. Today’s e-commerce, while still business-driven, is
also audience, customer, and community-driven.
• During the Innovation stage, firms placed an emphasis on
revenue growth, quickly achieving high market visibility/market share.
During the Consolidation stage, the emphasis was on building
profitable firms. Today, audience and social network growth are being
emphasized.
• Startups during the Innovation stage were financed by venture
capitalists, while those in the Consolidation stage were primarily
financed by traditional methods. Today, startups are once again being
financed by venture capitalists, albeit with smaller investments. In
addition, many large online firms are now entering the market, and
acquiring early stage firms via buy-outs.
• During the Innovation phase, e-commerce was, for the most
part, ungoverned. In the Consolidation stage, there was a rise in the
amount of regulation and governmental controls by governments
worldwide. Today, there is extensive government regulation and
surveillance.
• The Innovation stage of e-commerce was characterized by the
young entrepreneurial spirit. During the Consolidation stage, e-
commerce was primarily dominated by the retail giants. Today, large
purely Web-based firms are playing a major role.
• The Innovation phase was characterized by an emphasis on
deconstructing traditional distribution channels and disintermediating
existing channels. During the Consolidation stage, intermediaries
strengthened. Today, there are a proliferation of small online
intermediaries that are renting the business processes of larger firms.
C2C- Individuals selling and buying among themselves (eg. Facebook, 0.75
mudah.my)
Total 2
Question
2
The internet of things, or IoT, is a system of interrelated computing 0.5
devices, mechanical and digital machines, objects, animals or people
that are provided with unique identifiers (UIDs) and the ability to
transfer data over a network without requiring human-to-human or
human-to-computer interaction
IoT can also make use of artificial intelligence (AI) and machine
learning to aid in making data collecting processes easier and
more dynamic.
Total 2
Question
3
Man-in-the-middle attack (MITM) is an attack where the attacker 1.0
secretly relays and possibly alters the communications between two
parties who believe that they are directly communicating with each
other.
An example of a MITM attack is active eavesdropping, in which the 1.0
attacker makes independent connections with the victims and relays
messages between them to make them believe they are talking directly
to each other over a private connection, when in fact the entire
conversation is controlled by the attacker. The attacker must be able to
intercept all relevant messages passing between the two victims and
inject new ones. This is straightforward in many circumstances; for
example, an attacker within the reception range of an unencrypted Wi-
Fi access point could insert themselves as a man-in-the-middle.
Total 2
Question
4
Perform a risk assessment - an assessment of the risks and points of
vulnerability.
Develop a security policy - a set of statements prioritizing the
information risks, identifying acceptable risk targets, and
identifying the mechanisms for achieving these targets.
Develop an implementation plan - the action steps you will take to
achieve the security plan goals.
2
Create a security organization - educates and trains users, keeps
management aware of security threats and breakdowns, and
maintains the tools chosen to implement security.
Perform a security audit - involves the routine review of access
logs (identifying how outsiders are using the site as well as how
insiders are accessing the site’s assets).
Total 2
Question
5
Differentiation - refers to all the ways producers can make their 2
products or services unique and different to distinguish them from
those of competitors
Strategy of cost competition - offering products and services at a
lower cost than competitors
Scope strategy - competing in all markets around the globe, rather
than just local, regional, or national markets
Focus/market niche strategy - competing within a narrow market or
product segment
Customer intimacy - focuses on developing strong ties with
customers in order to increase switching costs
Total 2
Question
6
Organic search: inclusion and ranking of sites depends on a more or 0.5
less unbiased application of a set of rules imposed by the search
engine. Search engine optimization (SEO) is the process of improving
the ranking of Web pages with search engines by altering the content
and design of the Web pages and site.
Paid inclusion: for a fee, guarantees a Web site’s inclusion in its list of 0.5
sites, more frequent visits by its Web crawler, and suggestions for
improving the results of organic searching.
Pay-per-click (PPC) search ads are the primary type of search engine 1.0
advertising. In keyword advertising, merchants purchase keywords
through a bidding process at search sites, and whenever a consumer
searches for that word, their advertisement shows up somewhere on the
page, usually as a small text-based advertisement on the right, but also
as a listing on the very top of the page. Network keyword advertising
(context advertising), introduced by Google as its AdSense product in
2002, differs from the ordinary keyword advertising. Publishers accept
ads placed by Google on their Web sites, and receive a fee for any
click-throughs from those ads.
Total 2
Question 1. (2 scores)
What is the difference between HTML and XML?
Question 2. (2 scores)
What does omni-channel mean in terms of e-commerce technology?
Question 3. (2 scores)
What are Java and JavaScript? What role do they play in website design?
Question 4. (2 scores)
Identify and describe the five main steps in establishing a company’s security plan.
From a customer view point, this means that a customer can visit any
sales channel like physical store, website, etc. and find same brand
experience while making the purchase.
From a business stand point, it means that I can sell the product to the
customer irrespective of the product being available in the sales
channel where customer is currently in.
Total 2
Question
3
- Java code must be compiled, and JavaScript code is all-text. Each 2
language requires different plug-ins.
- JavaScript code is run on a browser only, while Java creates
applications that run in a virtual machine or browser.
- Java is an OOP (object-oriented programming) language, and
JavaScript is specifically an OOP scripting language.
Total 2
Question
4
Perform a risk assessment - an assessment of the risks and points of 2
vulnerability.
Develop a security policy - a set of statements prioritizing the
information risks, identifying acceptable risk targets, and
identifying the mechanisms for achieving these targets.
Develop an implementation plan - the action steps you will take to
achieve the security plan goals.
Create a security organization - educates and trains users, keeps
management aware of security threats and breakdowns, and
maintains the tools chosen to implement security.
Perform a security audit - involves the routine review of access
logs (identifying how outsiders are using the site as well as how
insiders are accessing the site’s assets).
Total 2
Question
5
Differentiation - refers to all the ways producers can make their 2
products or services unique and different to distinguish them from
those of competitors.
Strategy of cost competition - offering products and services at a
lower cost than competitors.
Scope strategy - competing in all markets around the globe, rather
than just local, regional, or national markets.
Focus/market niche strategy - competing within a narrow market or
product segment.
Customer intimacy - focuses on developing strong ties with
customers in order to increase switching costs.
Total 2
Question
6
There are four methods that online advertisers use to behaviorally 2
target ads: search engine queries, the collection of data on individual
browsing history online (monitoring the clickstream), the collection of
data from social network sites, and increasingly, the integration of this
online data with offline data like income, education, address, purchase
patterns, credit records, driving records, and hundreds of other
personal descriptors tied to specific, identifiable persons.
Total 2
Firstly, student should introduce the revenue model of the company. In case
of Teespring, profit of the firm comes from two factors: (1) complementors and
(2) …
Next, you should state which strategy the business is utilizing. If it is product-
focus, you should explain in the following way
- Why not Teespring didn’t choose a strategy focusing on customer?
- What happens if the firm applied “complementor” strategy?
Remember that a strategy could fit in current context (at present), but it may
not be the best choice in the past.
2/ Traffic source analysis
Direct: Perform promotions to attract customers.
Search : We can use SEO to increase search performance . We can buy a lot of
keyword to increase search efficiency.
Email : We have to check the percentage of customers who see the content or
subject, thereby improving the redesign of subject or content.
Social network :We can share and post a lot of posts , redesign posts’s content
abudantly.
According to the textbook, cost of attracting a new customer is much higher
than that of retaining a close client. Therefore, we should focus on high
performance channels first. After that, remaining budget could be allocated to
the others.
Direct channel.
- This is a source that has the highest traffic. This means that a large proportion
of marketing budget should be used here. Since ABC (for example) is a service
company, we should implement some activities such as ….
Search.
…
3/ Content in lesson plans
Type of E-Commerce Example
B2C – business to consumer Amazon is a general merchandise that sells
consumer products to retail consumers
B2B – business to besiness Go2Paper is an independent third party
marketplace that serves the paper industry
C2C – consumer to consumer Auction sites as eBay and listing sites such
as Craigslist , enable xonsumer to auctuon
or sell goods directly to other
consumer.Airbnb and Uber provide similar
platfotms for services such as room rental
and transpotation
M - commerce –mobile e-commerce Mobile devices such as tablet computers and
smartphones can be used to conduct
commercial transactions.
Social e-commerce Facebook is both the leading social network
and social e-commerce site.
Local e-comerce Groupon offer sibctibers daily deals form
local businesses in the form of Groupons ,
discount coupons that tame effect once
enough subcribers have agreed to purchase.
Firstly, students should choose table or figure matching with the questions in
relevant lesson plan files. Second, you should explore the textbook to get more
information supporting your answer.
4/ Marketing process
Search (MailChimp)
In offline marketing, customers tend to search their desired products by following
their habit OR their friends’ habit. Online consumers tend to look for key words which
are relevant to scanning products (2).
In order to develop customer list at this stage successfully, a digital marketer have to
do several things such as: SEO your company site, conduct FB marketing, analyze
possible keywords for your campaign, etc.
In case of e-mail marketing, (2) could be translated to: GIVING customers keywords
(or information) that could satisfy their demand. You could use MAILCHIMP to
accomplish this.
As a business man, what should you do to utilize chance generated from that?
CÂU 2. (2 điểm)
In order to grow up the amount of visitors, what should “Dien May Xanh” corporate should
do based on the information conducted from Similar Web?
CÂU 3. (2 điểm)
At the present time (2019), Teespring is being a popular e-commerce platform where clients
could easily sell their own-designed products. Could you please explain how the business
operate by describing the relationship between their supply chain and e-selling/buying
process.
CÂU 4. (2 điểm)
In order to ‘enjoy’ a product, how many stages does an online buyer generally go through?
After identifying the process correctly, students are required to point out stages in which Woo
Commerce and Mail Chimp could help businesses to implement their Marketing task
efficiently. Explain.
CÂU 5. (2 điểm)
What is the business strategy that Grab company is utilizing? Explain.
Câu 1 Nội dung đáp án Điểm
ý1 - Visit all links, from the one has the highest search to the 0.5
lowest link.
ý2 - Choose link that has contain is relevant to your business, or 0.5
your interest
ý3 - Generate possible relevant keywords 0.5
ý4 - Build up an e-commerce site 0.5
Cộng 2
Câu 2
ý1 - Identify sources generating lots of traffic: Direct and Search 0.25
ý2 - In case of Direct source, the business could focus on two
things:
+ Retain old customers: promotion, customer service 1.25
+ Attract new customers: offline marketing activities, affiliate
marketing
ý3 - Regarding Search source, we need to explore more by
checking performance of every marketing channels. After that,
0.5
we may decide if we should inject money into SEO, FB
Marketing or Google AdWords, for example.
…
Cộng 2
Câu 3
ý1 At the first glance, students need to point out that Teespring has
to stock a number of goods which are easily to customize.
Besides, the company set up a professional e-commerce system
0.5
which really help clients to sell corporate products. That is,
users could modify on available templates of the company, and
then sell it to potential customers.
ý2 In order to selling products in Teespring platform, clients need: 1.5
- Set up e-stores in Teespring platform. This step requires users
to purchase some products from the company. In other words,
purchase orders will be forwarded to production team of
Teespring.
- Customers purchase products. When the system receives
orders, finished products will be packaged and then shipped to
address of customers from the company’s stores.
- Delivering goods. This stage is based on third-party
organizations.
- Transaction complete. Depending on the payment mode that
customers selected, they are required to completely pay for their
orders when their desired products arrive.
Cộng 2
Câu 4
ý1 There are five steps, including Need recognition, Search,
0.25
Compare alternatives, Purchase and Post-sale.
ý2 Since Word Press (WP) could help e-sellers design a
professional web sites, hence they could attract potential
customers at the Alternatives step.
If we add Woo Commerce plugin to our WP site, clients could
purchase our products easily. Moreover, this plugin could help 1
us to track order status. Therefore, Woo Commerce could help
us at the Purchase stage.
Finally, WP users could easily communicate with shop owner.
This could enhance Post-sale activity of a business.
ý3 Mail Chimp is a system which help us to implement a
marketing campaign as well as measure its performance easily.
Submitting e-mail register form on ‘right’ FB group could help
marketers to reach customers easier. In other words, it is an
0.75
active Search.
The process of identifying customers demand could be
implemented through a survey targeting at a set of leads. With
Mail Chimp, we could do it quite simple.
… 2
Cộng
Câu 5
ý1 Introduce Grab company and Delta model. 0.5
ý2 Best-Product. Why or why not? 0.5
ý3 Customer Focus. Why or why not? 0.5
ý4 Complementor. Why or why not? 0.5
Cộng 2
Question 1. (2 scores)
What are 8 unique features of e-commerce technology? Does an e-commerce
company need all 8 features above or not?
Question 2. (2 scores)
What does omni-channel mean in terms of e-commerce technology? Let's give a
specific example.
Question 3. (2 scores)
What is Java and Javascript? What role do they play in website design?
Question 4. (2 scores)
Define CTR, CPM, CPC, CPA and VTR
Question 5. (2 scores)
What types of services does Amazon provide for businesses? Which e-commerce
business models do Amazon’s services fall into?
Question Answer Mark
1
Ubiquity, Global reach, Richness and complexity of content, 0.75
Interactivity
From a customer view point, this means that a customer can visit any
sales channel like physical store, website, etc. and find same brand
experience while making the purchase.
From a business stand point, it means that I can sell the product to the
customer irrespective of the product being available in the sales
channel where customer is currently in.
Total 2
Question
3
Java code must be compiled, and JavaScript code is all-text. Each 2
language requires different plug-ins.
JavaScript code is run on a browser only, while Java creates
applications that run in a virtual machine or browser.
Java is an OOP (object-oriented programming) language, and
JavaScript is specifically an OOP scripting language.
Total 2
Question
4
CPM (Cost Per Mile/Thousand) 1
A confusing one this as many assume it means cost per million, when
in actual fact it means cost per thousand or mile (another term), the
amount is based on impressions and the base unit is one thousand.
Cost-per-click (CPC) bidding means that you pay for each click on
your ads.
Total 2
Question Amazon offers its business operations – such as its warehouses, 1
5 packaging, shipping, advertising and checkout services – to other
businesses. So Amazon is also in the "fulfillment" business, helping
other companies take care of their customers from the point of sale to
delivery of the product. In 2013, the company revealed that outside
sellers accounted for 41 percent of units sold on the Amazon site in a
recent quarter, according to the Bloomberg article "Amazon Surges to
Record High on Global E-Commerce Growth."
Amazon provides an array of products and services to businesses and 1
individuals worldwide. As an online retailer and third-party, Amazon’s
products range from books and music to furniture and clothing. This e-
business operates under several business models, all of which are
designed to capture and retain customers while keeping up with
evolving technological customer demands. Amazon creates business
relationships with businesses of all sizes, from sole proprietorships to
corporations. New and un-established businesses can start with
personal accounts and then upgrade to a business account when their
sales increase. Amazon’s various platforms and services are the
foundations for many of Amazon’s businesses and affiliates. These
businesses benefit from the customer exposure and increased sales
opportunities while Amazon earns income through its own product
sales, as well as through earnings from memberships, fees, royalties
and commissions.
Total 2
Question 1. (2 scores)
Define and give examples of B2C, B2B, C2C, C2B E-commerce?
Question 2. (2 scores)
What are the primary differences between online and offline consumer behavior?
Question 3. (2 scores)
What is the man in the middle attack?
Question 4. (2 scores)
What disadvantages are faced by “first-mover” companies entering a marketspace?
Question 5. (2 scores)
What is an unfair competitive advantage?
Question Answer Mark
1
B2C- Consumer shopping on the web (eg. Lazada, McDonalds, Tiki) 0.5
C2C- Individuals selling and buying among themselves (eg. Facebook, 0.75
mudah.my)
C2B – Consumer to Business (eg. Pinduoduo)
Total 2
Question
2
The same customer, shopping both online and offline, can display 1
completely different behaviors in each case. The time of day when
they shop is one of the biggest differences – and we will explore this in
more detail further down – but there are other factors as well.
Total 2
Question
3
Man-in-the-middle attack (MITM) is an attack where the attacker 1.0
secretly relays and possibly alters the communications between two
parties who believe that they are directly communicating with each
other.
An example of a MITM attack is active eavesdropping, in which the 1.0
attacker makes independent connections with the victims and relays
messages between them to make them believe they are talking directly
to each other over a private connection, when in fact the entire
conversation is controlled by the attacker. The attacker must be able to
intercept all relevant messages passing between the two victims and
inject new ones. This is straightforward in many circumstances; for
example, an attacker within the reception range of an unencrypted Wi-
Fi access point could insert themselves as a man-in-the-middle.
Total 2
Question
4
1. Everyone goes after the first movers 0.75
2. Being first is expensive
3. Educating a new market is expensive. Navigating unknown
regulatory & legal territories is expensive. Setting up
production for a new product at scale is expensive.
4. There’s no prior experience to fall back on. When you’re doing 1.25
something new, you’re bound to make mistakes.
5. All your eggs are in one basket
6. Being the first to do something usually requires significant
investments
7. Someone has to pay for the up-front investments
8. Regulatory resistance
9. When you shake up an industry, you’re bound to face
resistance from lobbyists, politicians and, of course, other
businesses. Not to mention legal systems that might not even be
ready for you.
10. The price of educating your customers
11. Selling products or services that people don’t trust or
understand has never proven to work…
Total 2
Question 1. (2 scores)
What is an on-demand services company?
Question 2. (2 scores)
What are the primary marketing functions of a Website?
Question 3. (2 scores)
What are four internet protocols beside HTTP and SMTP?
Question 4. (2 scores)
What are five of the major differences between the early years of e-commerce and
today’s e-commerce
Question 5. (2 scores)
What are three concerns about the Internet of Things?
Question Answer Mark
1
Providing goods and services is almost instant or in minimal time. The 0.5
service request to destination is performed using an app.
Email Marketing
Affiliate Marketing 1
Viral marketing
Total 2
Question
3
DNS, DHCP, TFTP, TLS/SSL, FTP, IMAP4, POP3, SIP, SNMP, 2
SSH, Telnet, RTP
Total 2
Question
4
The major differences between the early years of e-commerce (the 1
Innovation stage), the period between 2001-2006 (the Consolidation
stage) and today’s e-commerce (the Reinvention stage) are:
• During the Innovation stage, e-commerce was primarily
technology-driven. During the Consolidation stage, it was primarily
business-driven. Today’s e-commerce, while still business-driven, is
also audience, customer, and community-driven.
• During the Innovation stage, firms placed an emphasis on
revenue growth, quickly achieving high market visibility/market share.
During the Consolidation stage, the emphasis was on building
profitable firms. Today, audience and social network growth are being
emphasized.
• Startups during the Innovation stage were financed by venture
capitalists, while those in the Consolidation stage were primarily
financed by traditional methods. Today, startups are once again being
financed by venture capitalists, albeit with smaller investments. In
addition, many large online firms are now entering the market, and
acquiring early stage firms via buy-outs.
• During the Innovation phase, e-commerce was, for the most
part, ungoverned. In the Consolidation stage, there was a rise in the
amount of regulation and governmental controls by governments
worldwide. Today, there is extensive government regulation and
surveillance.
• The Innovation stage of e-commerce was characterized by the
young entrepreneurial spirit. During the Consolidation stage, e-
commerce was primarily dominated by the retail giants. Today, large
purely Web-based firms are playing a major role.
• The Innovation phase was characterized by an emphasis on
deconstructing traditional distribution channels and disintermediating
existing channels. During the Consolidation stage, intermediaries
strengthened. Today, there are a proliferation of small online
intermediaries that are renting the business processes of larger firms.
Total 2
Question Three of the main concerns that accompany the Internet of Things are 1
5 the breach of privacy, over-reliance on technology, and the loss of
jobs. When anything is put on the internet it will always be there. Of
course there are security measures that are taken to protect
information, but there is always the possibility of hackers breaking into
the system and stealing the data. For example, Anonymous is a group
of individuals that hacked into federal sites and released confidential
information to the public. Meanwhile the government is supposed to
have the highest level of security, yet their system was easily breached.
Another argument against IoT is the over-reliance on technology. As 1
time has progressed, our current generation has grown up with the
readily availability of the internet and technology in general.
However, relying on technology on a day to day basis, making
decisions by the information that it gives up could lead to devastation.
No system is robust and fault-free. We see glitches that occur
constantly in technology, specifically involving the internet.
Finally the connecting of more and more devices to the Internet will
result in the loss of jobs. The automation of IoT “will have a
devastating impact on the employment prospects of less-educated
workers” (Schumpeter, 2010).
Total 2
Question 1. (2 scores)
What is multivariate testing and how does it differ from A/B testing (split testing)?
Question 2. (2 scores)
Identify the key security threats in the e-commerce environment. Describe in detail any
three of them.
Question 3. (2 scores)
Which are the E-commerce Web site features that annoy customers? (List 8 features)
Question 4. (2 scores)
Identify and describe the main technologies that support online marketing.
Question 5. (2 scores)
What types of services does Amazon provide for businesses? Which e-commerce
business models do Amazon’s services fall into?
Question Answer Mark
1
Multivariate testing is a much more sophisticated form of testing than 2
A/B testing. Multivariate testing involves identifying specific
elements, or variables, on a Web page, such as a headline, image,
button and text, creating versions for each element, and then creating a
unique combination of each element and version to test. A/B testing
(split testing) involves showing two versions of a Web page or Web
site to different users to see which one performs better.
Total 2
Question
2
Malicious code—viruses, worms, Trojan horses, ransomware, and 2
bot networks are a threat to a system’s integrity and continued
operation, often changing how a system functions or altering
documents created on the system.
Potentially unwanted programs (adware, spyware, etc.)—a kind of
security threat that arises when programs are surreptitiously
installed on your computer or computer network without your
consent.
Phishing—any deceptive, online attempt by a third party to obtain
confidential information for financial gain.
Hacking and cybervandalism—intentionally disrupting, defacing,
or even destroying a site.
Credit card fraud/theft—one of the most-feared occurrences and
one of the main reasons more consumers do not participate in e-
commerce. The most common cause of credit card fraud is a lost or
stolen card that is used by someone else, followed by employee
theft of customer numbers and stolen identities (criminals applying
for credit cards using false identities).
Identity fraud—involves the unauthorized use of another person’s
personal data, such as social security, driver’s license, and/or credit
card numbers, as well as user names and passwords, for illegal
financial benefit.
Spoofing—occurs when hackers attempt to hide their true identities
or misrepresent themselves by using fake e-mail addresses or
masquerading as someone else.
Pharming—involves redirecting a Web link to an address different
from the intended one, with the site masquerading as the intended
destination.
Denial of Service (DoS) and Distributed Denial of Service (DDoS)
attacks—hackers flood a Web site with useless traffic to inundate
and overwhelm the network, frequently causing it to shut down and
damaging a site’s reputation and customer relationships. Sniffing—
a type of eavesdropping program that monitors information
traveling over a network, enabling hackers to steal proprietary
information from anywhere on a network, including e-mail
messages, company files, and confidential reports. The threat of
sniffing is that confidential or personal information will be made
public.
Insider jobs—although the bulk of Internet security efforts are
focused on keeping outsiders out, the biggest threat is from
employees who have access to sensitive information and
procedures.
Poorly designed server and client software—the increase in
complexity and size of software programs has contributed to an
increase in software flaws or vulnerabilities that hackers can
exploit.
Social network security issues—malicious code, PUPs, phishing,
data breaches, identity fraud, and other e-commerce security
threats have all infiltrated social networks.
Mobile platform security issues—the mobile platform presents an
alluring target for hackers and cybercriminals, and faces all the
same risks as other Internet devices, as well as new risks associated
with wireless network security.
Cloud security issues—as devices, identities, and data become more
and more intertwined in the cloud, safeguarding data in the cloud
becomes a major concern.
Total 2
Question
3
Requiring user to view ad or Flash introduction before going to 2
Web site content
Pop-up and pop-under ads and windows
Too many clicks to get to the content
Links that don’t work
Confusing navigation; no search function
Requirement to register and log in before viewing content or
ordering
Slow loading pages
Content that is out of date
Total 2
Question
4
• Web transaction logs—records that document user activity at a Web
site. Coupled with data from the registration forms and shopping cart
database, these represent a treasure trove of marketing information for
both individual sites and the online industry as a whole.
• Tracking files—Various files, like cookies, Web beacons, Flash
cookies, and apps, that follow users and track their behavior as they
visit sites across the entire Web.
• Databases, data warehouses, data mining, and profiling—
2
technologies that allow marketers to identify exactly who the online
customer is and what they want, and then to present the customer with
exactly what they want, when they want it, for the right price.
• CRM systems—a repository of customer information that records all
of the contacts a customer has with a firm and generates a customer
profile available to everyone in the firm who has a need to “know the
customer.”
Total 2
Question
5
Amazon offers its business operations – such as its warehouses, 1
packaging, shipping, advertising and checkout services – to other
businesses. So Amazon is also in the "fulfillment" business, helping
other companies take care of their customers from the point of sale to
delivery of the product. In 2013, the company revealed that outside
sellers accounted for 41 percent of units sold on the Amazon site in a
recent quarter, according to the Bloomberg article "Amazon Surges to
Record High on Global E-Commerce Growth."
Amazon provides an array of products and services to businesses and 1
individuals worldwide. As an online retailer and third-party, Amazon’s
products range from books and music to furniture and clothing. This e-
business operates under several business models, all of which are
designed to capture and retain customers while keeping up with
evolving technological customer demands. Amazon creates business
relationships with businesses of all sizes, from sole proprietorships to
corporations. New and un-established businesses can start with
personal accounts and then upgrade to a business account when their
sales increase. Amazon’s various platforms and services are the
foundations for many of Amazon’s businesses and affiliates. These
businesses benefit from the customer exposure and increased sales
opportunities while Amazon earns income through its own product
sales, as well as through earnings from memberships, fees, royalties
and commissions.
Total 2
Question 1. (2 scores)
Name the four main types of e-commerce presence, the different platforms and
activities for each type.
Question 2. (2 scores)
What are the primary differences between online and offline consumer behavior?
Question 3. (2 scores)
Identify the key components of a successful business model. Describe in detail any
three components.
Question 4. (2 scores)
What are four methods that online advertisers use to behaviourally target ads?
Question 5. (2 scores)
What does omni-channel mean in terms of e-commerce technology?
Question Answer Mark
1
Type: Web site/App 0.5
Platforms: traditional desktop, tablets, and smartphones,
Activities: engage in search engine marketing, display ads, affiliate
programs, and sponsorships.
Type: E-mail 0.5
Platforms: internal lists, purchased lists
Activities: news letter, update, sales,..
Type: Social media 0.5
Platforms: Facebook, Twitter, Zalo, …
Activities: conversation, sharing, engagement,
Type: Offline media 0.5
Platforms: print, television, or radio
Activities: ads refer customers to Web sites and apps
Total 2
Question
2
The same customer, shopping both online and offline, can display 1
completely different behaviors in each case. The time of day when
they shop is one of the biggest differences – and we will explore this in
more detail further down – but there are other factors as well.
Unlike offline shopping, where finding and traveling to a physical
store is key, those who purchase online can be more easily inclined to
‘shop around’ – after all, the competition is often only a click away.
For businesses, the challenge then becomes finding ways to keep their
potential online customers’ attention.
Total 2
Question
3
Value proposition—how a company’s product or service fulfills the 2
needs of customers. Typical e-commerce value propositions include
personalization, customization, convenience, and reduction of product
search and price delivery costs.
Revenue model—how the company plans to make money from its
operations. Major e-commerce revenue models include the
advertising model, subscription model, transaction fee model, sales
model, and affiliate model.
Market opportunity—the revenue potential within a company’s
intended marketspace.
Competitive environment—the direct and indirect competitors
doing business in the same marketspace, including how many there
are and how profitable they are.
Competitive advantage—the factors that differentiate the business
from its competition, enabling it to provide a superior product at a
lower cost.
Market strategy—the plan a company develops that outlines how it
will enter a market and attract customers.
Organizational development—the process of defining all the
functions within a business and the skills necessary to perform
each job, as well as the process of recruiting and hiring strong
employees.
Management team—the group of individuals retained to guide the
company’s growth and expansion.
Total 2
Question
4
There are four methods that online advertisers use to behaviorally 2
target ads: search engine queries, the collection of data on individual
browsing history online (monitoring the clickstream), the collection of
data from social network sites, and increasingly, the integration of this
online data with offline data like income, education, address, purchase
patterns, credit records, driving records, and hundreds of other
personal descriptors tied to specific, identifiable persons.
Total 2
2
Question 2
5
Omni Channel by literal meaning would mean ‘Available in all 2
channels’. This concept is used primarily in retail sales wherein
channel refers to a selling site like physical store, website,
marketplace, call center, etc.
From a customer view point, this means that a customer can visit any
sales channel like physical store, website, etc. and find same brand
experience while making the purchase.
From a business stand point, it means that I can sell the product to the
customer irrespective of the product being available in the sales
channel where customer is currently in.
Total 2
Question 1. (2 scores)
What is an on-demand services company?
Question 2. (2 scores)
What are the various components of a Website budget?
Question 3. (2 scores)
Define CTR, VTR, CPM, CPC, CPA.
Question 4. (2 scores)
What are five of the major differences between the early years of e-commerce and
today’s e-commerce
Question 5. (2 scores)
In your opinion, what are some key metrics to track in any e-commerce model?
Question Answer Mark
1
Providing goods and services is almost instant or in minimal time. The 0.5
service request to destination is performed using an app.
Allows consumers to customize computing capabilities, such as server 0.75
time and network storage, as needed automatically, without requiring
human interaction with the cloud provider.
On-demand self-service allows users to obtain, configure and deploy 0.75
applications themselves using cloud service catalogues, without
requiring the assistance of trained person.
Total 2
Question
2
- In order to build up a website, we need to spend on key components, 1
including: (1) hardware, (2) software, (3) telecommunication, (4)
hosting service, (5) design, (6) content development, and (7)
marketing.
Total 2
Question
3
(CTR) click-through rate the percentage of people exposed to an 2
online advertisement who actually click on the banner
(VTR) view-through rate measures the 30-day response rate to an ad
(CPM) cost per thousand advertiser pays for impressions in 1000-unit
lots
(CPC) cost per click advertiser pays renegotiated fee for each click an
ad receives
(CPA) cost per action advertiser pays only for those users who perform
a specific action
Total 2
Question
4
The major differences between the early years of e-commerce (the 1
Innovation stage), the period between 2001-2006 (the
Consolidation stage) and today’s e-commerce (the Reinvention
stage) are:
During the Innovation stage, e-commerce was primarily
technology-driven. During the Consolidation stage, it was primarily
business-driven. Today’s e-commerce, while still business-driven,
is also audience, customer, and community-driven.
During the Innovation stage, firms placed an emphasis on revenue
growth, quickly achieving high market visibility/market share.
During the Consolidation stage, the emphasis was on building
profitable firms. Today, audience and social network growth are
being emphasized.
Startups during the Innovation stage were financed by venture
capitalists, while those in the Consolidation stage were primarily
financed by traditional methods. Today, startups are once again
being financed by venture capitalists, albeit with smaller
investments. In addition, many large online firms are now entering
the market, and acquiring early stage firms via buy-outs.
During the Innovation phase, e-commerce was, for the most part,
ungoverned. In the Consolidation stage, there was a rise in the
amount of regulation and governmental controls by governments
worldwide. Today, there is extensive government regulation and
surveillance.
The Innovation stage of e-commerce was characterized by the
young entrepreneurial spirit. During the Consolidation stage, e-
commerce was primarily dominated by the retail giants. Today,
large purely Web-based firms are playing a major role.
The Innovation phase was characterized by an emphasis on
deconstructing traditional distribution channels and
disintermediating existing channels. During the Consolidation
stage, intermediaries strengthened. Today, there are a proliferation
of small online intermediaries that are renting the business
processes of larger firms.
Question 1. (2 marks)
Describe the unique features of e-commerce technology.
Question 2. (2 marks)
What is packet switching? Why is packet switching so essential to the Internet?
Question 3. (2 marks)
What are the various components of a Web site budget?
Question 4. (2 marks)
What is the Internet of Things (IoT). And what security issues and challenges does it
raise?
Question 5. (2 marks)
How can e-commerce technologies be used to improve a firm’s value web?
Total 2
Question
3
- In order to build up a website, we need to spend on key 1
components, including: (1) hardware, (2) software, (3)
telecommunication, (4) hosting service, (5) design, (6) content
development, and (7) marketing.
- In general, the cost of hardware, software, and 0.5
telecommunications for building and operating a Web site has
fallen dramatically (by over 50%) in the last decade, making it
possible for very small entrepreneurs to build fairly sophisticated
sites.
- At the same time, while technology has lowered the costs of 0.5
system development, the costs of marketing, content
development, and design have risen to make up more than half of
typical Web site budgets.
Total 2
Question
4
- The Internet of Things (IoT) involves the use of the Internet to 1
connect a wide variety of sensors, devices, and machines, and is
powering the development of a multitude of smart connected
things, such as home electronics (smart TVs, thermostats, home
security systems, and more), connected cars, medical devices and
industrial equipment that supports manufacturing, energy,
transportation, and other industrial sectors. IoT raises a host of
security issues that are in some ways similar to existing security
issues, but even more challenging, given the need to deal with a
wider range of devices, operating in a less controlled, global
environment, and with an expanded range of attack. In a world of
connected things, the devices, the data produced and used by the
devices, and the systems and applications supported by those
devices, can all potentially be attacked. IoT poses a number of
unique security challenges. For instance, many IoT devices, such
as sensors, are intended to be deployed on a much greater scale
than traditional Internet-connected devices, creating a vast
quantity of interconnected links that can be exploited. Existing
tools, methods, and strategies need to be developed to deal with
this unprecedented scale.
- Many instances of IoT consist of collections of identical devices 1
that all have the same characteristics, which magnifies the
potential impact of security vulnerabilities. Many IoT devices are
anticipated to have a much longer service life than typical
equipment, which raises the possibility that devices may
"outlive" manufacturer, leaving them without long-term support
that creates persistent vulnerabilities. Many IoT devices are
intentionally designed without the ability to be upgraded, or the
upgrade process is difficult, which raises the possibility that
vulnerable devices cannot or will not be fixed, leaving them
perpetually vulnerable. Many IoT devices do not provide the user
with visibility into the workings of the device or the data being
produced, nor alert the user when a security problem arises, so
users may believe an IoT device is functioning as intended when
in fact, it may be performing in a malicious manner. Finally,
some IoT devices, such as sensors, are unobtrusively embedded
in the environment such that a user may not even be aware of the
device, so a security breach might persist for a long time before
being noticed.
Total 2
Question
5
- A value web is a networked business ecosystem that uses e- 0.5
commerce technology to coordinate the value chains of business
partners within an industry, or at the first level, to coordinate the
value chains of a group of firms.
- A value web coordinates a firm’s suppliers with its own 1.5
production needs using an Internet-based supply chain
management system. Firms also use the Internet to develop close
relationships with their logistics partners. For instance,
Amazon relies on UPS tracking systems to provide its customers
with online package tracking, and it relies on the U.S. Postal
Service systems to insert packages directly into the mail stream.
Amazon has partnership relations with hundreds of firms to
generate customers and to manage relationships with customers.
In fact, when you examine Amazon closely, you realize that the
value it delivers to customers is in large part the result of
coordination with other firms and not simply the result of
activities internal to Amazon. The value of Amazon is, in large
part, the value delivered by its value web partners. This is
difficult for other firms to imitate in the short run.
Total 2
TOTAL MARK 10
Question 1. (2 marks)
Describe the major types of e-commerce.
Question 2. (2 marks)
What is the Internet of Things and how is it being created and enabled?
Question 3. (2 marks)
What is a content management system and what function does it serve? Give some
examples on CMS.
Question 4. (2 marks)
Identify and describe the five main steps in establishing a company’s security plan.
Question 5. (2 marks)
Define value chain and explain the difference between a firm value chain, an industry
value chain, and a value web.
Total 2
Question
2
No discussion of the future Internet would be complete without 1
mentioning the Internet of Things (IoT), also sometimes
referred to as the Industrial Internet. Internet technology is
spreading beyond the desktop, laptop, and tablet computer, and a
new technology that assigns levels of priority to packets based on
the type of data being transmitted beyond the smartphone, to
consumer electronics, electrical appliances, cars, medical devices,
utility systems, machines of all types, even clothing—just about
anything that can be equipped with sensors that can collect data
and connect to the Internet, enabling the data to be analyzed with
data analytics software.
Total 2
Question
3
A content management system (CMS) is software that help users 0.5
create, manage, and modify content on a website without the
need for specialized technical knowledge.
Total 2
Question
4
Five main steps when developing a security plan include: (1) 0.5
Perform a risk assessment; (2) develop a security policy; (3)
develop an implementation plan; (4) create a security
organization; and (5) perform a security audit.
- A security plan begins with risk assessment—an assessment of 1.5
the risks and points of vulnerability.
- Based on your quantified list of risks, you can start to develop a
security policy— a set of statements prioritizing the information
risks, identifying acceptable risk targets, and identifying the
mechanisms for achieving these targets.
- Next, consider an implementation plan—the steps you will take
to achieve the security plan goals. Specifically, you must
determine how you will translate the levels of acceptable risk into
a set of tools, technologies, policies, and procedures.
- The security organization educates and trains users, keeps
management aware of security threats and breakdowns, and
maintains the tools chosen to implement security.
- Access controls determine which outsiders and insiders can gain
legitimate access to your networks. Outsider access controls
include firewalls and proxy servers, while insider access controls
typically consist of login procedures.
Total 2
Question
5
A value chain is the set of activities performed that transforms 0.5
raw inputs into
final products and services.
Question 1. (2 marks)
Why is a multidisciplinary approach necessary if one hopes to understand e-
commerce?
Question 2. (2 marks)
Discuss the origins of, and the key technology concepts behind, the Internet.
Question 3. (2 marks)
What is CGI and how does it enable interactivity?
Question 4. (2 marks)
What is a VPN and what is its value to an organization?
Question 5. (2 marks)
Define and describe the transaction broker business model. And discuss the eight
components of the business model for this type of firm.
Behavioral Approaches
From a behavioral perspective, information systems researchers
are primarily inter- ested in e-commerce because of its
implications for firm and industry value chains, industry
structure, and corporate strategy. Economists have focused on
online con- sumer behavior, pricing of digital goods, and on the
unique features of digital electronic markets. (0.75)
Total 2
Question
2
• The Internet has evolved from a collection of mainframe
computers located on a few U.S. college cam- puses to an
interconnected network of thousands of networks and
millions of computers worldwide.
Total 2
Question
3
Common Gateway Interface (CGI) is a set of standards for 1
communication between a browser and a program running on a
server that allows for interaction between the user and the server.
Question 1. (2 scores)
What is e-commerce? How does it differ from e-business? Where does it intersect
with e-business?
Question 2. (2 scores)
What is web client? What advantages does client/server computing have over
mainframe computing?
Question 3. (2 scores)
What are the basic capabilities of a web server?
Question 4. (2 scores)
Presenting the scope of e-commerce crime and security problems, the key dimensions
of e-commerce security, and the tension between security and other values?
E-business takes place within a firm and involves information systems 0.75
under the control of the firm. Unlike e-commerce, e-business does not
involve commercial transaction across organizational boundaries
where value is exchanged.
The intersection occurs where the needs of e-business and e-commerce 0.75
merge during the areas of technology infrastructure.
Total 2
Question
2
A Web client, on the other hand, is any computing device attached to 0.5
the Internet that is capable of making HTTP requests and displaying
HTML pages. The most common client is a Windows or Macintosh
desktop computer.
If one server goes down, backup or mirror servers can pick up the
slack: if a client computer is inoperable, the rest of the network
continues operating.
Total 2
Question
3
Web server software refers to the software that enables a computer to 0.5
deliver web pages written in HTML to client computers on a network
that request this service by sending an HTTP request
Web servers provide some additional basic capabilities such as the 1.5
following:
- Security services: These consist mainly of authentication services that
verify that the person trying to access the site is authorized to do so.
For websites that process payment transactions, the web server also
supports SSL and TLS, the protocols for transmitting and receiving
information securely over the Internet. When private information such
as names, phone numbers, addresses, and credit card data needs to be
provided to a website, the web server uses SSL to ensure that the data
passing back and forth from the browser to the server is not
compromised.
- FTP: This protocol allows users to transfer files to and from the
server. Some sites limit file uploads to the web server, while others
restrict downloads, depending on the user’s identity.
- Search engine: Just as search engine sites enable users to search the
entire Web for particular documents, search engine modules within the
basic web server software package enable indexing of the site’s web
pages and content and permit easy keyword searching of the site’s
content. When conducting a search, a search engine makes use of an
index, which is a list of all the documents on the server. The search
term is compared to the index to identify likely matches.
- Data capture: Web servers are also helpful at monitoring site traffic,
capturing information on who has visited a site, how long the user
stayed there, the date and time of each visit, and which specific pages
on the server were accessed. This information is compiled and saved in
a log file, which can then be analyzed. By analyzing a log file, a site
manager can find out the total number of visitors, the average length of
each visit, and the most popular destinations, or web pages.
Total 2
Question
4
While the overall size of cybercrime is unclear, cybercrime against e- 0.5
commerce sites is growing rapidly, the amount of losses is growing,
and the management of e-commerce sites must prepare for a variety of
criminal assaults
There are six key dimensions to e-commerce security: integrity, 0.5
nonrepudiation, authenticity, confidentiality, privacy, and availability.
Although computer security is considered necessary to protect e- 1
commerce activities, it is not without a downside. Two major areas
where there are tensions between security and website operations are:
• Ease of use—The more security measures that are added to an e-
commerce site, the more difficult it is to use and the slower the site
becomes, hampering ease of use. Security is purchased at the price of
slowing down processors and adding significantly to data storage
demands. Too much security can harm profitability, while not enough
can potentially put a company out of business.
• Public safety—There is a tension between the claims of individuals
to act anonymously and the needs of public officials to maintain public
safety that can be threatened by criminals or terrorists.
Total 2
Question
5
Inter-firm rivalry (competition) is one area of the business environment 2
where e-commerce technologies have had an impact on most
industries. In general, e-commerce has increased price competition in
nearly all markets. It has been relatively easy for existing firms to
adopt e-commerce technology and attempt to use it to achieve
competitive advantage vis-à-vis rivals. For instance, e-commerce
inherently changes the scope of competition from local and regional to
national and global. Because consumers have access to global price
information, e-commerce produces pressures on firms to compete by
lowering prices (and lowering profits). On the other hand, e-commerce
has made it possible for some firms to differentiate their products or
services from others. Amazon patented one-click purchasing, for
instance, while eBay created a unique, easyto-use interface and a
differentiating brand name. Therefore, although e-commerce has
increased emphasis on price competition, it has also enabled
businesses to create new strategies for differentiation and branding so
that they can retain higher prices.
Total 2
Question
6
- Click-through rate (CTR) the percentage of people exposed to an 2
online advertisement who actually click on the banner
- Cost per thousand (CPM) advertiser pays for impressions in 1,000-
unit lots
- Cost per click (CPC) advertiser pays pre-negotiated fee for each click
an ad receives
- Cost per action (CPA) advertiser pays only for those users who
perform a specific action
- View-through rate (VTR): Percentage of times an ad is not clicked
immediately but the website is visited within 30 days
Total 2
TOTAL MARK 10
Question 1. (2 scores)
What is marketspace?
Question 2. (2 scores)
What are the eight key components of an effective business model?
Question 3. (2 scores)
What is the difference between a mobile app and a native app?
Question 4. (2 scores)
What is a VPN and what is its value to an organization?
Total 2
Question
2
They are: value proposition, revenue model, market opportunity, 2
competitive environment, competitive advantage, market strategy,
organizational development and management team.
Total 2
Question
3
A mobile web app is an application built to run on the mobile web 1
browser built into a smartphone or tablet computer. In the case of
Apple, the native browser is Safari. Generally it is built to mimic the
qualities of a native app using HTML5 and Java. Mobile web apps are
specifically designed for the mobile platform in terms of screen size,
finger navigation, and graphical simplicity. Mobile web apps can
support complex interactions used in games and rich media, perform
real-time, on-the-fly calculations, and can be geo-sensitive using the
smartphone’s built-in global positioning system (GPS) function.
Mobile web apps typically operate faster than mobile websites but not
as fast as native apps.
A native app is an application designed specifically to operate using 1
the mobile device’s hardware and operating system. These stand-alone
programs can connect to the Internet to download and upload data, and
can operate on this data even when not connected to the Internet.
Download a book to an app reader, disconnect from the Internet, and
read your book. Because the various types of smartphones have
different hardware and operating systems, apps are not “one size fits
all” and therefore need to be developed for different mobile platforms.
An Apple app that runs on an iPhone cannot operate on Android
phones. As you learned in Chapter 3, native apps are built using
different programming languages depending on the device for which
they are intended, which is then compiled into binary code, and which
executes extremely fast on mobile devices, much faster than HTML or
Java-based mobile web apps. For this reason, native apps are ideal for
games, complex interactions, on-the-fly calculations, graphic
manipulations, and rich media advertising.
Total 2
Question
4
A virtual private network (VPN) is a technology that creates safe and 0.5
encrypted over a less secure network, such as the Internet
A virtual private network (VPN) allows remote users to securely
access a corporation’s local area network via the Internet, using a
variety of VPN protocols. VPNs use both authentication and
encryption to secure information from unauthorized persons (providing
confidentiality and integrity).
The primary use of VPNs is to establish secure communications 1.5
among business partners—larger suppliers or customers, and
employees working remotely. A dedicated connection to a business
partner can be very expensive. Using the Internet and VPN as the
connection method significantly reduces the cost of secure
communications
Total 2
Question
5
Stealing online allows criminals to remain anonymous and lowers the 2
risk of being caught when compared to walking into a bank and
robbing the establishment.
Criminals are able to deceive customers and merchants by placing
fraudulent online orders, stealing information, and using viruses and
malware to shutdown e-commerce sites
Total 2
Question
6
The five main elements of a comprehensive multi-channel marketing 2
plan are: website (traditional Website), traditional online marketing
(search engine marketing, display marketing, email and affiliates),
social marketing (social networks, microblogging sites, blogs/forums,
video marketing and game marketing), mobile marketing (smartphone
and table sites and apps), and offline marketing (television, newspapers
and magazines).
Total 2
TOTAL MARK 10
- Society: With around 267 million Americans now using the Internet, 0.5
many for e-commerce purposes, and more than 3.3 billion users
worldwide, the impact of the Internet and e-commerce on society is
significant and global. Increasingly, e-commerce is subject to the laws
of nations and global entities. You will need to understand the
pressures that global e-commerce places on contemporary society in
order to conduct a successful e-commerce business or understand the
e-commerce phenomenon. The primary societal issues we discuss in
this book are individual privacy, intellectual property, and public
welfare policy
Total 2
Question
2
Packet switching is a method of slicing digital messages into discrete 0.5
units called packets, sending the packets along different
communication paths as they become available, and then reassembling
the packets once they arrive at their destination
Packet switching is what allows communication between computers in 1.5
a way that doesn’t require a direct, point-to-point connection
between two computers. A point-to-point connection wastes
communication capacity because the connection is required
regardless of whether data is being sent. Packet switching allows
information to be broken up into smaller segments, each of which
can be routed in different ways to its final destination. Thus, packet
switching allows better use of network communication lines in terms
of speed and also the amount of data that can be exchanged. Also,
because of the routing and switching, this means that if one network
computer or routing path goes down, a packet can be sent along
another route and not lost.
Total 2
Question
3
A content management system (CMS) is software that help users 0.5
create, manage, and modify content on a website without the need for
specialized technical knowledge.
A content management system is made up of two core parts: 1
- A content management application (CMA): this is the part that allows
you to actually add and manage content on your site.
- A content delivery application (CDA): this is the back-end (or
behind-the-scenes) process that takes the content you put in the CMA,
store it properly, and make it visible to your visitors.
Total 2
Question
5
The sender encrypts a message using the recipient’s public key, and 2
then sends it over the Internet. The only person who can decrypt this
message is the recipient, using his or her private key. However, this
simple case does not ensure integrity or an authentic message
Total 2
Question
6
The process of attracting/generating leads (potential customers who 2
later can be contacted and converted into customers through sales calls,
email, or other means) for businesses, using multiple e-commerce
presences.
Total 2
TOTAL MARK 10
CÂU 1. (2 điểm)
Describe 8 features of e-commerce technology.
CÂU 2. (2 điểm)
List some issues of traditional taxi in Vietnam in 2013. After that, find out functions
in Grab taxi could help users overcome identified problems.
CÂU 3. (2 điểm)
What are some features could annoy customers in an e-commerce web site?
Explain.
CÂU 4. (2 điểm)
In order to grow up the amount of visitors, what should “Dien May Xanh” corporate should
do based on the information conducted from Similar Web?
CÂU 5. (2 điểm)
Describe some common strategies if we want to focus on product.
Cán bộ coi thi không được giải thích gì thêm.
ĐÁP ÁN HỌC KỲ 3A NĂM HỌC 2018 - 2019
Ngành/Lớp: ……………….….…….……………
Môn thi: ………….…….…………….…………..
Mã môn học: BUS1104E.183A01E)……….…
Số ĐVHT/TC: ……........
Ngày thi: ………………....……………………….
KHOA CÔNG NGHỆ THÔNG TIN Thời gian làm bài: 75p Hình thức thi: ...…......
Mã đề (Nếu có): 1……………………………........
Provide product
Display goods Personalize product
information
Engage customers in Accumulate customer
Execute a transaction
conversations information
Provide after-sale Coordinate Understanding marketing
customer support marketing/advertising effectiveness
CÂU 4. (2 điểm)
Describe some common strategies if we want to focus on customer.
CÂU 5. (2 điểm)
What is the business strategy that Grab company is utilizing? Explain.
CÂU 3. (2 điểm)
At the present time (2019), Teespring is being a popular e-commerce platform where clients
could easily sell their own-designed products. Could you please explain how the business
operate by describing the relationship between their supply chain and e-selling process.
CÂU 4. (2 điểm)
In order to ‘enjoy’ a product, how many stages does an online buyer generally go through?
After identifying the process correctly, students are required to point out stages in which Woo
Commerce and Mail Chimp could help businesses to implement their Marketing task
efficiently. Explain.
CÂU 5. (2 điểm)
What is the business strategy that Microsoft company is utilizing? Explain.
CÂU 1. (2 điểm)
The figure below is a result of a request to Google Trends in Vietnam on 30th July, 2019.
As a business man, what should you do to utilize chance generated from that?
CÂU 2. (2 điểm)
In order to grow up the amount of visitors, what should “Dien May Xanh” corporate should
do based on the information conducted from Similar Web?
CÂU 3. (2 điểm)
At the present time (2019), Teespring is being a popular e-commerce platform where clients
could easily sell their own-designed products. Could you please explain how the business
operate by describing the relationship between their supply chain and e-selling/buying
process.
CÂU 4. (2 điểm)
In order to ‘enjoy’ a product, how many stages does an online buyer generally go through?
After identifying the process correctly, students are required to point out stages in which Woo
Commerce and Mail Chimp could help businesses to implement their Marketing task
efficiently. Explain.
CÂU 5. (2 điểm)
What is the business strategy that Grab company is utilizing? Explain.