Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

IT430 Assignment 2 2024 .

By Pin✌️ And Muhammad.

Scenario

E-business models show how a company uses the internet to make money and satisfy customers. A business plan
describes how to reach its target market, sell its goods and services, and generate money. E-business models
depend on product or service type, target market, and competitive landscape. Different e-business models can be
used as needed. The following table 1 shows real- world and practical instances.

Question 1: You are required to identify according to the scenarios as given in the Table 1 which model suits which scenario.

Table 1: E-Busnuess Models with Scenarios

Scenario E-commerce Model


Jamila, a consumer, is looking to buy a new Jamila purchasing a laptop directly from an online electronics
laptop. She visits an online electronics store represents the Business-to- Consumer (B2C) e-commerce
store, browses through various models, model. In this model, businesses sell products or services
reads reviews, and eventually makes a directly to end consumers.
purchase directly from the website. The
transaction is straightforward, with the
business (the electronics store) selling the
product directly to the end consumer
(Jamila).

XYZ Manufacturing Company needs raw XYZ Manufacturing Company partnering with ABC Suppliers
materials for their production line. They to procure raw materials for their production line corresponds
establish a partnership with ABC to the Business-to-Business (B2B) e- commerce model. This
Suppliers, a company specializing in model involves transactions between businesses, such as
providing industrial materials. XYZ manufacturers and suppliers.
Manufacturing Company places a bulk
order with ABC Suppliers to procure the
necessary materials for their manufacturing
process.

Sara has a collection of vintage clothing . Sara selling her vintage clothing on an online marketplace like
that she no longer wears. She decides to sell eBay, where Malik purchases directly from her, exemplifies the
these items on an online marketplace like Consumer-to- Consumer (C2C) e-commerce model. This
eBay. Another individual. Malik, is model involves transactions between individual consumers.
interested in vintage fashion and purchases
a few items directly from Sarah through the
platform. The transaction occurs directly
between consumers.

The city government of Metropolis is The city government of Metropolis entering into a contract
looking to upgrade its IT infrastructure. with TechSolutions Inc. to upgrade its IT infrastructure falls
They enter into a contract with under the Business-to-Government (B2G)
TechSolutions Inc., a technology services e-Business-to-Government (B2G) e- commerce model. This
provider. TechSolutions Inc. provides model involves transactions between businesses and
Metropolis with the necessary hardware, government entities.
software, and IT support services to
enhance the city's technological
capabilities.
Umair starts by creating a seller profile on Umair creating a seller profile on Handmade Hub and
Handmade Hub. He provides details about showcasing his handmade crafts represents the
himself, his artistic background, and Consumer-to-Business (C2B) e- commerce model. In this
uploads high-quality images of his model, individuals or consumers offer products or services to
handmade crafts. This establishes his businesses.
presence as a seller on the platform. He
includes detailed descriptions, dimensions,
and pricing for each item. Potential buyers
on Handmade Hub can now browse and
discover Umair's unique creations

Question 2:
Being a member of an intelligence company, you are asked to cryptograph the given message using both
cryptography techniques:

1. Substitution

While applying the substitution method, replace the occurrences of the letter 'e' with the letter 'x' when 'e' appears in the
message after the letter 'r' otherwise replace the occurrences of 'e' with the letter "y".

2. Transposition

Apply the Transposition technique using the encryoted table. The size of the table should be 5 x 9.

The Message to be encrypted is:

"Your suggestion has been noted for future reference".

Answer:

encrypt the given message using both substitution and transposition techniques.

1.Substitution:
Replace 'e' with 'x' when 'e' appears after 'r'.
Replace 'e' with 'y' otherwise.

Original Message: "Your suggestion has been noted for future reference"

Substituted Message: "Your sugxgyxtion hax bxxn notxd for futurx rxfxrxncx"
2. Transposition:
Use a table of size 5 ×9 for transposition.

Original Message (without spaces):


"YourSuggestionHasBeenNotedForFutureReference"

Encrypted Table:

1 Y O U R S U G G E

2 X T I O N H A S B

3 E E N N O T E D F

4 O R F U T U R E R

5 E F E R E N C E

KEY:"YXTEOEEOFSEUEURGTHNSOYERXUGASDIONBERRCNEFEETEDFEN"

You might also like