Gauhati University E-Commerce Question Paper Solution 2022 | B.com 4th Sem CBCS Pettern

Q.1.(i). E-Commerce refers to : Ans: (d) All of the above. (ii) Which segment focuses on consumers dealing with each other? Ans:(a) C2C

Gauhati University E-Commerce Question Paper Solution 2022 | B.com 4th Sem CBCS  Pettern, GU E-Commerce Questions Paper Solution 2022

Gauhati University B.COM 4th Sem E-commerce Question Paper Solution 2022

4 [Sem-4/CBCS) SEC1/2 (E-COM/E-FR)


2022

COMMERCE

(Skill Enhancement Course)

(E-Filing of Returns)

Paper: COM-SEC-4024

Full Marks: 50

Time: Two hours


The figures in the margin indicate


1. Answer any four from the following: 1x4=4


(i). E-Commerce refers to


(a) buying products

(b) selling services

(c) selling products

(d) All of the above


Ans: (d) All of the above.

(ii) Which segment focuses on consumers dealing with each other?


(a) C2C

(b) B2B

(c)C2B 

(d) P2P


Ans: (a) C2C. Consumer-to-consumer (C2C) e-commerce involves consumers selling directly to other consumers through online marketplaces.

(iii) Electronic commerce can increase sales and______Cost. (Fill in the blank)

Ans: Electronic commerce can increase sales and Decrease  Cost.

(iv) IP stands for


(a) Internet Protocol

(b) Internet Programming 

(c) Internal Program 

(d) Intra Program 


Ans: Internet Protocol

(v) Internet is owned by 


(a) Microsoft Corporation 

(b) Tata play 

(c) Facebook 

(d)None of the above 


Ans: None of the above .

(vi).E-payment is doing payment______.(Fill in the blank) 

Ans:E-payment is doing payment electronically.

(vii) E-marketing provides


(a) national coverage 

(b) local coverage 

(c) global coverage

(d) None of the above 

Ans: (c) global coverage.

(viii) <BODY> is a______tag.

(Fill in the blank)


Ans:<BODY> is an HTML tag.


2. Answer any three: 


(i) What is an e-business model?

Ans: An e-business model is a framework for conducting online business, typically involving the sale of goods or services over the internet.


(ii) What is a digital signature?

Ans: A digital signature is an electronic form of a signature that is used to authenticate the identity of the sender of a message or the signer of a document, and to ensure that the original content of the message or document that has been sent is unchanged.

(iii) State few advantages of web ads. 
Ans: Some advantages of web ads include the ability to target specific demographics, the ability to track the effectiveness of the ads, and the potential for a high return on investment.

(iv) Define e-wallet.
Ans: An e-wallet is a digital wallet that stores payment information, such as credit card numbers, in a secure online account. It can be used to make online purchases, pay bills, and transfer funds.

(v) What is cryptography ?
Ans: Cryptography is the practice of secure communication in the presence of third parties. It involves the use of mathematical algorithms to encrypt and decrypt data, allowing it to be transmitted securely over the internet or other communication channels.

(vi) What is phishing?
Ans: Phishing is a form of online fraud in which attackers send emails or text messages purporting to be from legitimate organizations, in an attempt to trick the recipient into divulging sensitive information such as login credentials or financial information.

3.Write short notes on : (any two) 5x2=10 



(i) E-commerce revenue model

(ii) Basic structure of a HTML page 

(iii) Technology used in e-commerce

(iv) Online banking 

(v) IT Act, 2000

(vi) Cryptography


Ans: (i) E-commerce revenue model: An e-commerce revenue model refers to the way in which an online business generates revenue from its products or services. Some common e-commerce revenue models include selling physical or digital products, offering subscription-based services, selling advertising space, and offering services such as consulting or design work.

(ii) Basic structure of a HTML page: A HTML (HyperText Markup Language) page is the basic building block of a website. It consists of a series of elements, including headings, paragraphs, lists, and links, which are organized using tags. The structure of a HTML page includes a head element, which contains metadata such as the page title and links to external stylesheets and scripts, and a body element, which contains the content of the page.

(iii) Technology used in e-commerce: E-commerce relies on a variety of technologies to function, including web development languages such as HTML, CSS, and JavaScript; database management systems; payment processing systems; and security technologies such as SSL (Secure Sockets Layer) and encryption.

(iv) Online banking: Online banking refers to the use of the internet to perform financial transactions, such as transferring funds, paying bills, and checking account balances. Online banking is typically accessed through a secure website or app, and requires the use of login credentials such as a username and password.

(v) IT Act, 2000: The Information Technology Act, 2000 is an Indian law that regulates the use of electronic data and electronic transactions. It establishes legal recognition for electronic records and digital signatures, and provides for the establishment of a legal framework for electronic commerce in India.

(vi) Cryptography: Cryptography is the practice of secure communication in the presence of third parties. It involves the use of mathematical algorithms to encrypt and decrypt data, allowing it to be transmitted securely over the internet or other communication channels. Cryptography is used in a variety of applications, including online banking, email, and secure messaging.

4.Answer any three:  10×3= 30


(i) Define lists. Explain different types of lists used in HTML with one simple example. 2+8=10

Ans: A list is an ordered or unordered collection of items, typically displayed with bullet points or numbers. Lists are a common element in HTML and are used to organize and present information in a clear and logical way.


In HTML, there are three types of lists:


1.Unordered lists: These lists use bullet points to mark each list item. The list items are marked with the <li> tag.


Example: 


<ul>
<li>Milk</li>
<li>Bread</li>
<li>Eggs</li>
</ul>

This would be displayed as:

  • Milk
  • Bread
  • Eggs

2.Ordered lists: These lists use numbers or letters to mark each list item. The list items are marked with the <li> tag.

Example: 

<ol>
  <li>Step 1: Preheat the oven</li>
  <li>Step 2: Combine ingredients in a bowl</li>
  <li>Step 3: Pour mixture into a baking dish</li>
</ol>

This would be displayed as:

Step 1: Preheat the oven
Step 2: Combine ingredients in a bowl
Step 3: Pour mixture into a baking dish

3.Description lists: These lists consist of term-description pairs, where the term is marked with the <dt> tag and the description is marked with the <dd> tag.

Example:

<dl>
  <dt>Milk</dt>
  <dd>A white liquid produced by mammals to feed their young.</dd>
  <dt>Bread</dt>
  <dd>A type of food made from flour, water, and yeast or another leavening agent.</dd>
  <dt>Eggs</dt>
  <dd>A round or oval object laid by female birds, reptiles, or insects, typically containing a developing embryo.</dd>
</dl>

This would be displayed as:

Milk: A white liquid produced by mammals to feed their young.
Bread: A type of food made from flour, water, and yeast or another leavening agent.
Eggs: A round or oval object laid by female birds, reptiles, or insects, typically containing a developing embryo.


(ii) Write the salient features of the IT Act, 2000.

Ans: The Information Technology Act, 2000 (IT Act) is a legal framework in India that aims to provide a legal framework for electronic governance, electronic commerce, and cybercrime prevention. Some of the key features of the IT Act are:


Recognition of electronic records and digital signatures: The IT Act recognises electronic records and digital signatures as legally valid and equivalent to paper-based documents and handwritten signatures.


Legal recognition of electronic contracts: The IT Act provides legal recognition to electronic contracts, making them enforceable in the same way as traditional paper-based contracts.


Cybercrime prevention: The IT Act includes provisions for the prevention, investigation, and prosecution of cybercrimes, including unauthorised access to computer systems, data theft, and cyber stalking.


Electronic governance: The IT Act allows for the use of electronic means to deliver government services and enables the use of electronic records and digital signatures in government transactions.


Electronic commerce: The IT Act provides a legal framework for electronic commerce, including provisions related to electronic payment systems, consumer protection, and dispute resolution.


Appointment of Adjudicating Officers: The IT Act allows for the appointment of Adjudicating Officers to handle disputes related to the Act.


Data protection: The IT Act includes provisions for the protection of personal data and sensitive personal data, including the establishment of a Data Protection Authority.


(iii) What is online shopping? Explain different steps involved in the online shopping process.  2+8=10

Ans: Online shopping is the process of purchasing goods or services over the internet. It allows consumers to shop for products or services from the comfort of their own homes, using a computer, laptop, or smartphone.


The steps involved in the online shopping process are:


Searching for products: The first step in online shopping is to search for the products or services you want to purchase. This can be done through the use of search engines, online marketplaces, or the websites of individual retailers.


Adding items to the shopping cart: Once you have found the products or services you want to purchase, you can add them to your online shopping cart. This is a virtual cart that allows you to keep track of the items you want to buy.


Reviewing and adjusting the shopping cart: Before checkout, you can review the items in your shopping cart and make any necessary adjustments, such as changing the quantity or removing items.


Entering shipping and payment information: After reviewing your shopping cart, you will need to enter your shipping and payment information. This typically includes your name, address, phone number, email address, and payment method (e.g. credit card or PayPal).


Reviewing and submitting the order: Before submitting the order, you should carefully review the details of your purchase, including the items, quantities, prices, shipping fees, and taxes. Once you are satisfied with the order, you can submit it for processing.


Receiving confirmation: After you submit your order, you should receive a confirmation email or message with the details of your purchase. This will typically include an order number and a summary of the items, quantities, and prices.


Tracking the order: Many online retailers offer tracking services that allow you to monitor the progress of your order from the time it is placed until it is delivered. This can typically be done through the retailer's website or through a tracking number provided in the confirmation email.


Receiving and reviewing the order: After your order has been shipped, you should receive it in the mail or through a delivery service. Once you receive the order, you can review it to make sure everything is correct and in good condition.


Gauhati University E-Commerce Question paper Solution 2022 Bcom 4th Semester CBCS Pettern 

(iv) What is an electronic payment system ? Describe different methods of electronic payment system. 2+8=10

Ans: An electronic payment system is a system that allows for the transfer of funds electronically, rather than through the exchange of physical currency or checks. Electronic payment systems can be used for a variety of purposes, including online shopping, bill payment, and peer-to-peer transactions.


There are several different methods of electronic payment systems, including:


Credit cards: Credit cards are a type of electronic payment system that allows consumers to borrow money from a financial institution in order to make purchases. When making a purchase with a credit card, the consumer agrees to pay back the borrowed amount, plus interest, at a later date.


Debit cards: Debit cards are a type of electronic payment system that allows consumers to access funds in their checking or savings accounts in order to make purchases. When making a purchase with a debit card, the funds are transferred immediately from the consumer's bank account to the merchant's account.


E-wallets: E-wallets are digital wallets that allow consumers to store and manage their financial information and make electronic payments. E-wallets typically require users to create an account and link it to their bank accounts or credit cards.


Mobile payments: Mobile payments refer to electronic payment systems that use a mobile device, such as a smartphone or tablet, to make payments. Mobile payments can be made through a variety of methods, including NFC (near field communication) technology, QR codes, and mobile apps.


Online banking: Online banking refers to the use of a bank's website or mobile app to make electronic payments. Consumers can use online banking to transfer funds between accounts, pay bills, and make other types of payments


(v) Write about different factors involved in e-commerce website design.

Ans: There are several factors that are involved in the design of an e-commerce website, including:


  • Usability: The website should be easy to navigate and use, with clear and concise calls to action and a logical layout.
  • Responsiveness: The website should be designed to be responsive, meaning it should display and function properly on a range of devices, including desktop computers, laptops, tablets, and smartphones.
  • Search engine optimization (SEO): The website should be optimised for search engines, with well-written and relevant content, descriptive page titles, and appropriate use of keywords.
  • Security: The website should be secure, with measures in place to protect against cyber threats and ensure the privacy and security of customer data.
  • Trust and credibility: The website should establish trust and credibility with customers, through the use of logos, reviews, and other trust indicators.
  • Branding: The website should reflect the brand's identity and values, through the use of color, typography, imagery, and other design elements.
  • Product presentation: The website should showcase the products in a clear and attractive way, with high-quality images, detailed product descriptions, and options for customization or personalization.
  • Customer service: The website should provide clear and easy-to-use channels for customer service, including contact information, a FAQ section, and options for live chat or email support.
  • Payment options: The website should offer a range of payment options, including credit cards, debit cards, e-wallets, and other digital payment methods.
  • Shipping and delivery: The website should clearly communicate shipping and delivery options, including costs, estimated delivery times, and tracking information.


(vi) Write about different steps and techniques for promoting e-commerce websites. 

Ans: There are several steps and techniques that can be used to promote an e-commerce website, including:


Search engine optimization (SEO): SEO involves optimizing the website's content and technical aspects in order to improve its ranking in search engine results pages. This can be achieved through the use of relevant keywords, high-quality content, and technical optimizations such as proper use of headings, alt tags, and sitemaps.


Pay-per-click (PPC) advertising: PPC advertising involves placing sponsored ads on search engine results pages or other websites, and paying a fee each time the ad is clicked. This can be an effective way to drive targeted traffic to the website.


Social media marketing: Social media platforms, such as Facebook, Instagram, and Twitter, can be used to promote the website and engage with potential customers. This can be done through the use of social media ads, sponsored posts, and organic content.


Email marketing: Email marketing involves sending targeted emails to a list of subscribers in order to promote the website and its products. This can be done through the use of newsletters, promotional emails, and abandoned cart emails.


Influencer marketing: Influencer marketing involves partnering with social media influencers or industry experts to promote the website and its products. This can be done through sponsored posts, product reviews, or other forms of content promotion.


Content marketing: Content marketing involves creating and sharing high-quality, relevant content in order to attract and retain customers. This can be done through the use of blog posts, articles, videos, podcasts, or other types of content.


Referral marketing: Referral marketing involves encouraging existing customers to refer friends and family to the website in exchange for discounts or other incentives. This can be done through the use of referral programs or referral codes.


Affiliate marketing: Affiliate marketing involves partnering with other websites or individuals to promote the website and its products in exchange for a commission on sales.


Traditional marketing: Traditional marketing methods, such as print ads, radio ads, and television ads, can also be used to promote an e-commerce website


(vii) Describe e-commerce security threats.

Ans: E-commerce security threats refer to the various risks and vulnerabilities that can compromise the security of online transactions and customer data. Some common e-commerce security threats include:


Phishing attacks: Phishing attacks are fraudulent emails or websites that are designed to trick users into divulging sensitive information, such as login credentials or financial information.


Malware: Malware is malicious software that can infect a computer or device and compromise its security. Malware can be spread through email attachments, malicious websites, or other means, and can be used to steal sensitive information or disrupt computer systems.


SQL injection attacks: SQL injection attacks are a type of cyber attack that involves injecting malicious code into a database through a website's input fields. This can allow attackers to access sensitive information or manipulate the database.


Cross-site scripting (XSS) attacks: XSS attacks are a type of cyber attack that involves injecting malicious code into a website, which is then executed by the website's users. This can allow attackers to steal sensitive information or compromise the security of the website.


Unsecured networks: Unsecured networks, such as public WiFi, can be vulnerable to cyber attacks, as they may not have proper security measures in place to protect against malicious activity.


Unsecured websites: Websites that do not have proper security measures, such as SSL encryption, can be vulnerable to cyber attacks, as they may not be able to protect sensitive information from being intercepted or stolen.


Unsecured payment systems: Payment systems that do not have proper security measures, such as strong encryption or fraud detection, can be vulnerable to cyber attacks, as they may not be able to protect against unauthorized transactions or data theft.


It is important for e-commerce businesses to be aware of these security threats and take steps to protect against them, such as implementing proper security measures, educating employees and customers about cyber threats, and regularly updating systems and software.


(viii) Describe the major e-commerce business models.

Ans: There are several major e-commerce business models that companies can use to sell products or services online. These include:


Business-to-consumer (B2C): This is the most common e-commerce model, where a business sells directly to consumers. Examples include online retailers such as Amazon, eBay, and Zara.


Consumer-to-consumer (C2C): In this model, consumers sell directly to other consumers through online marketplaces such as eBay or Etsy.


Business-to-business (B2B): In this model, businesses sell products or services to other businesses. Examples include wholesalers, distributors, and manufacturers.


Consumer-to-business (C2B): In this model, consumers sell products or services to businesses. Examples include freelance professionals or individuals selling handmade goods.


Subscription-based: In this model, customers pay a recurring fee to access a product or service, such as a streaming service or a monthly box of products.


Crowdfunding: In this model, businesses or individuals raise funds for a project or product through small contributions from a large number of people, typically through an online platform such as Kickstarter or Indiegogo.


Drop shipping: In this model, a retailer does not keep goods in stock, but instead transfers customer orders and shipment details to either the manufacturer or a wholesaler, who then ships the goods directly to the customer.



***


Post a Comment

Cookie Consent
Dear Students, We serve cookies on this site to analyze traffic, remember your preferences, and optimize your experience.
Oops!
It seems there is something wrong with your internet connection. Please connect to the internet and start browsing again.
AdBlock Detected!
We have detected that you are using adblocking plugin in your browser.
The revenue we earn by the advertisements is used to manage this website, we request you to whitelist our website in your adblocking plugin.