E-Commerce Solved Question Paper 2023 PDF [Gauhati University BCom 4th Sem CBCS]

GU E-Commerce Solved Question Paper 2023 PDF | B.com 4th Sem CBCS Pattern | Gauhati University , Guwahati University E-Commerce Solved question paper

In this post we have shared GU E-Commerce Solved Question Paper 2023 PDF | B.com 4th Sem CBCS Pattern | Gauhati University , Guwahati University E-Commerce Solved question paper 2023, E-Commerce Solved question paper for Guwahati University 2023, E-Commerce Solved question paper 2023 Guwahati University Assam, 4th sem E-Commerce Solved question paper Guwahati University,GU HRM Solved Question Paper 2023.

E-Commerce Solved Question Paper 2023 PDF [Gauhati University BCom 4th Sem CBCS]

4 (Sem-4/CBCS) SEC1/2 (E-COM/E-FR)



(Skill Enhancement Course)

Answer the Questions from any one Option.



Paper: COM-SEC-4014

Full Mark - 50

The figures in the margin indicate full marks for the questions.

1. Choose the right option from the following: 1×4=4

(i) Search engine optimization is an strategy for 

(a) getting wider audience 

(b) enhancing the search engine 

(c) testing the website 

(d) registering a website

Explanation:- Search engine optimization (SEO) is the process of improving the quality and quantity of website traffic from search engines. SEO aims to increase the visibility of a website or a web page to users of a web search engine. ¹

(ii) What do you mean by ISP?

(a) Internet Service Protocol

(b) Internal Service Protocol

(c) Internet Service Provider 

(d) None of the above 

Explanation:- An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs may provide internet access, web hosting, email services, domain name registration, and other related services. ²

(iii) Google.co.in is a/an_______of Google.com  

(a) duplicate site 

(b) Indian copy 

(c) mirror site 

(d) replica 

Explaination :- A mirror site is a website or set of files on a server that has been copied to another server so that the site or files are available from more than one place. A mirror site has its own URL, but is otherwise identical to the original site. Mirror sites are often used to reduce network traffic, improve access speed, or provide a backup of the original site. ³

(iv) CSS stands for

(a) Cascading Style Shorts 

(b) Cascading Style Shifts 

(c) Cascading Slope Shorts 

(d) Cascading Style Sheets 

Explanation :- Cascading Style Sheets (CSS) is a style sheet language used for describing the presentation of a document written in a markup language such as HTML. CSS is a cornerstone technology of the World Wide Web, alongside HTML and JavaScript. CSS allows web designers to control the appearance and layout of web pages.

2. Answer the following questions: 2×3=6

(i) What is affiliate marketing?

Ans:- Affiliate marketing is a type of performance-based marketing in which a business rewards one or more affiliates for each visitor or customer brought by the affiliate's own marketing efforts. The affiliates typically earn a commission or a fixed amount for each sale or action they generate. ⁵

(ii) What is a digital signature ?

Ans:-  Digital signature is a mathematical scheme that is used to verify the authenticity and integrity of digital messages or documents. It may be considered as a digital version of the handwritten signature or stamped seal. The digital signatures use asymmetric cryptography, also known as public key cryptography. ⁶

(iii) What is UPI ?

Ans:- Unified Payments Interface (UPI) is an Indian instant payment system developed by the National Payments Corporation of India (NPCI) in 2016. The interface facilitates inter-bank peer-to-peer (P2P) and person-to-merchant (P2M) transactions. It is used on mobile devices to instantly transfer funds between two bank accounts. 

Also Read: 

3. Write short notes on: (any two) 5x2=10

(i) E-commerce revenue model 

Ans :- An E-commerce revenue model is a framework that defines how an e-commerce business generates income from its products, services, or other sources of value. There are different types of e-commerce revenue models, such as:

- Advertising: The e-commerce business earns money by displaying ads on its website or app, or by selling ad space to third-party advertisers. The revenue depends on the number of impressions, clicks, or conversions generated by the ads.

- Subscription: The e-commerce business charges a recurring fee to its customers for accessing its content, service, or product. The revenue depends on the number of subscribers and the subscription duration.

- Transaction fee: The e-commerce business charges a fee for facilitating a transaction between a buyer and a seller, or for providing a payment gateway. The revenue depends on the number of transactions and the fee percentage or amount.

- Sales: The e-commerce business sells its own products or services directly to its customers. The revenue depends on the number of sales and the profit margin.

(ii) Different HTML tags 

Ans:- HTML tags are keywords that define the structure and content of a web page. They are enclosed in angle brackets (< and >) and usually come in pairs, such as <p> and </p>. Some common HTML tags are:

- <html>: Defines the root element of an HTML document.

- <head>: Contains information about the document, such as the title, meta data, style sheets, scripts, etc.

- <title>: Defines the title of the document, which is displayed in the browser's tab or window.

- <body>: Contains the visible content of the document, such as text, images, links, forms, etc.

- <h1> to <h6>: Define headings of different levels, from the most important (<h1>) to the least important (<h6>).

- <p>: Defines a paragraph of text.

- <a>: Defines a hyperlink to another document or resource.

- <img>: Defines an image.

- <ul> and <ol>: Define unordered and ordered lists, respectively.

- <li>: Defines a list item.

- <div>: Defines a division or a section of the document.

- <span>: Defines a span of text that can be styled differently from its surrounding text.

- <table>: Defines a table of data.

- <tr>: Defines a table row.

- <td>: Defines a table cell.

- <form>: Defines a form that collects user input.

- <input>: Defines an input field, such as a text box, a checkbox, a radio button, etc.

- <select>: Defines a drop-down list of options.

- <option>: Defines an option in a drop-down list.

- <button>: Defines a clickable button.

(iii) IT Act, 2000 

Ans:- Information Technology Act, 2000 is an Indian law that regulates the use of information technology and electronic communication in India. It aims to provide legal recognition to electronic transactions, digital signatures, cyber security, data protection, and e-governance. It also defines the offences and penalties related to cyber crimes, such as hacking, phishing, identity theft, cyber terrorism, etc. The IT Act, 2000 has been amended twice, in 2008 and 2011, to incorporate new provisions and update existing ones.

(iv) Encryption 

Ans:- Encryption is a process of transforming data into an unreadable form, using a secret key or algorithm, to protect its confidentiality, integrity, and authenticity. Encryption can be applied to data at rest, such as files, databases, or disks, or data in transit, such as emails, messages, or web traffic. Encryption can be classified into two types, based on the key used:

- Symmetric encryption: The same key is used to encrypt and decrypt the data. The key must be shared securely between the sender and the receiver. Examples of symmetric encryption algorithms are AES, DES, RC4, etc.

- Asymmetric encryption: Two different keys are used to encrypt and decrypt the data. One key is public and can be shared with anyone, while the other key is private and must be kept secret. The public key is used to encrypt the data, and the private key is used to decrypt it, or vice versa. Examples of asymmetric encryption algorithms are RSA, ECC, DSA, etc.

4. Answer any three:

(i) What is a HTML form? Write code for creating a form to collect personnel details such as name, age, gender, phone number, address etc. Place a dropdown box for selecting gender. 2+8=10

Ans:- A HTML form is a section of a web page that allows users to enter and submit data to a server or a script. A HTML form consists of one or more input elements, such as text boxes, checkboxes, radio buttons, drop-down lists, etc., and a submit button. A HTML form uses the <form> tag to define its attributes, such as the action, method, and name. The input elements use the <input> tag, or other tags such as <select>, <option>, <textarea>, etc., to define their attributes, such as the type, name, value, placeholder, etc.

Following are the example of a HTML form that collects personnel details:


<form action="submit.php" method="post" name="personnel_form">

  <p>Name: <input type="text" name="name" placeholder="Enter your name" required></p>

  <p>Age: <input type="number" name="age" min="18" max="100" placeholder="Enter your age" required></p>

  <p>Gender: <select name="gender" required>

    <option value="">Select your gender</option>

    <option value="male">Male</option>

    <option value="female">Female</option>

    <option value="other">Other</option>


  <p>Phone number: <input type="tel" name="phone" placeholder="Enter your phone number" pattern="[0-9]{10}" required></p>

  <p>Address: <textarea name="address" rows="4" cols="40" placeholder="Enter your address" required></textarea></p>

  <p><input type="submit" value="Submit"></p>



(ii) What are the different security threats in the E-commerce environment? Also write about cyber crimes associated with E-commerce. 10 marks

Ans:- E-commerce is the activity of buying and selling goods and services over the internet. It involves the use of electronic platforms, such as websites, mobile applications, and social media, to conduct transactions between businesses and consumers or between businesses. E-commerce has revolutionized the way businesses operate and has created new opportunities for entrepreneurs and consumers alike.

However, e-commerce also faces various security threats and cyber crimes that can harm both the businesses and the customers. Some of the common security threats and cyber crimes in the e-commerce environment are:

- Financial frauds : This refers to the unauthorized or illegal use of financial information, such as credit card details, bank account numbers, or passwords, to make purchases or transfers without the consent of the owner. Financial frauds can result in monetary losses, identity theft, or damage to credit reputation. Some examples of financial frauds are credit card fraud, fake return and refund fraud, and chargeback fraud.

- Phishing and social engineering: This refers to the deceptive or manipulative techniques used by cybercriminals to trick users into revealing their personal or financial information, or clicking on malicious links or attachments. Phishing and social engineering can be done through emails, messages, calls, or fake websites that impersonate legitimate entities, such as banks, e-commerce platforms, or government agencies. Some examples of phishing and social engineering are spoofing, baiting, and vishing.

- Spamming : This refers to the unsolicited or unwanted emails or messages that are sent to a large number of recipients, usually for advertising or malicious purposes. Spamming can be annoying, distracting, or harmful to the users, as it can contain viruses, malware, or links to phishing sites. Spamming can also affect the performance and reputation of the e-commerce platforms, as it can consume bandwidth, storage, or processing resources, or lower the customer satisfaction and trust.

- Hacking : This refers to the unauthorized or illegal access to a computer system, network, or website, usually for stealing, modifying, or destroying data, or disrupting the normal functioning of the system. Hacking can compromise the security, privacy, or integrity of the e-commerce platforms and their customers, as it can expose sensitive information, such as personal details, transaction records, or passwords, or cause damage, such as data loss, corruption, or deletion.

- Malware: This refers to the malicious software or code that is designed to harm or infect a computer system, network, or website, usually for stealing, modifying, or destroying data, or disrupting the normal functioning of the system. Malware can be introduced to the e-commerce platforms or their customers through various means, such as spamming, phishing, hacking, or downloading infected files. Some examples of malware are viruses, worms, trojans, ransomware, and spyware.

These are some of the major security threats and cyber crimes that affect the e-commerce environment. To prevent or mitigate these threats and crimes, e-commerce platforms and their customers need to adopt various security measures, such as:

- Using strong and unique passwords, and changing them regularly

- Using encryption, authentication, and authorization techniques to protect data and transactions

- Using secure and trusted payment methods and gateways

- Using antivirus, firewall, and anti-spam software to detect and remove malware

- Avoiding opening or clicking on suspicious or unsolicited emails or messages

- Verifying the identity and legitimacy of the sender or the website before providing any personal or financial information

- Reporting any suspicious or fraudulent activity to the relevant authorities or platforms

(iii) Define E-commerce. Describe the basic E-commerce models. 2+8=10

Ans:- E-commerce, or electronic commerce, is the activity of buying and selling goods and services over the internet. It involves the use of electronic platforms, such as websites, mobile applications, and social media, to conduct transactions between businesses and consumers or between businesses.

There are six basic e-commerce models, based on the parties involved in the transactions. They are:

- Business-to-Consumer (B2C) : This model refers to the commerce between a business and an individual consumer. For example, buying a shirt from an online retailer or booking a flight from an online travel agency.

- Business-to-Business (B2B) : This model refers to the commerce between two businesses. For example, buying raw materials from a supplier or selling software to a client.

- Consumer-to-Consumer (C2C) : This model refers to the commerce between two individual consumers. For example, selling a used car to another person on an online marketplace or exchanging goods on an online bartering platform.

- Consumer-to-Business (C2B) : This model refers to the commerce between an individual consumer and a business. For example, offering a service to a business on an online freelancing platform or selling a photo to a business on an online stock image platform.

- Business-to-Government (B2G): This model refers to the commerce between a business and a government entity. For example, bidding for a government contract or paying taxes online.

- Government-to-Consumer (G2C): This model refers to the commerce between a government entity and an individual consumer. For example, applying for a passport or a license online or paying a fine online.

(iv) What is online banking? Write about the different techniques that are adopted by banks to provide online banking to its customers. Also write the advantages of online banking for customers as well as banks. 2+5+3=10

Ans:- Online banking, also known as internet banking, virtual banking, web banking or home banking, is a system that enables customers of a bank or other financial institution to conduct a range of financial transactions through the financial institution's website or mobile app¹². Some of the common online banking services are:

- Checking account balance and transaction history

- Transferring funds between accounts or to other beneficiaries

- Paying bills, taxes, fees, or loans

- Requesting or managing cheques, cards, or statements

- Opening or closing accounts or deposits

- Applying for or managing loans, investments, or insurance

- Updating personal or contact details

- Reporting or blocking lost or stolen cards

- Accessing customer support or grievance redressal

Online banking offers several advantages for both customers and banks, such as:

- Convenience: Online banking is available 24/7 and can be accessed from anywhere with an internet connection. Customers do not need to visit a branch or an ATM to perform banking activities. Banks can reduce their operational costs and overheads by providing online services.

- Speed: Online banking transactions are faster and more efficient than traditional methods. Customers can save time and avoid queues or delays. Banks can process more transactions and improve their service quality and customer satisfaction.

- Security: Online banking transactions are encrypted and protected by various security measures, such as passwords, PINs, OTPs, biometrics, etc. Customers can monitor their accounts and receive alerts for any suspicious or fraudulent activity. Banks can prevent or minimize the risks of theft, fraud, or error.

- Innovation: Online banking enables customers to access new and customized products and services, such as digital wallets, UPI, QR codes, etc. Banks can leverage new technologies and data analytics to offer personalized and value-added solutions to their customers.

(v) Describe different steps of E-commerce website building and hosting. 10

Ans:- E-commerce website building and hosting are the processes of creating and maintaining an online platform for selling goods or services over the internet. The following are the main steps involved in e-commerce website building and hosting:

- Planning: This step involves defining the goals, scope, budget, and timeline of the e-commerce project. It also involves conducting market research, identifying the target audience, choosing the domain name, and selecting the e-commerce platform and hosting provider.

- Designing: This step involves creating the layout, structure, and appearance of the e-commerce website. It also involves choosing the theme, color scheme, fonts, images, logos, and other visual elements that reflect the brand identity and appeal to the customers.

- Developing: This step involves coding and programming the functionality and features of the e-commerce website. It also involves integrating the website with the e-commerce platform, the hosting server, the payment gateway, the inventory management system, the shipping provider, and other third-party services or applications.

- Testing: This step involves checking and verifying the performance, functionality, security, and usability of the e-commerce website. It also involves identifying and fixing any errors, bugs, or issues that may affect the website's quality or customer experience.

- Launching: This step involves deploying and publishing the e-commerce website on the internet. It also involves promoting and marketing the website to attract and retain customers, using various channels and strategies, such as SEO, SEM, SMM, email, etc.

- Maintaining: This step involves updating and improving the e-commerce website regularly to keep it relevant, secure, and competitive. It also involves monitoring and analyzing the website's traffic, sales, feedback, and other metrics to measure its performance and optimize its results.

(vi) What is E-services? Describe the role of E-services in tourism, career and education . 2+8=10

Ans:- E-services, or electronic services, are the services that are delivered or accessed through the internet or other digital technologies. E-services can be provided by various entities, such as governments, businesses, organizations, or individuals, to various customers, such as citizens, consumers, employees, or learners. E-services can be classified into different types, such as information, communication, transaction, or collaboration services³.

E-services play an important role in various sectors, such as tourism, career, and education, by enhancing the efficiency, convenience, accessibility, and quality of the services. Some examples of the role of e-services in these sectors are:

- Tourism: E-services enable tourists to plan, book, and enjoy their travel experiences online. For example, tourists can use e-services to search for information about destinations, attractions, activities, etc., to compare and book flights, hotels, tours, etc., to pay for their travel expenses, to check-in and board their flights, to navigate and explore their destinations, to share their reviews and feedback, etc. E-services also enable tourism providers to reach and serve more customers, to offer personalized and customized solutions, to manage their operations and resources, to improve their competitiveness and profitability, etc.

- Career: E-services enable job seekers and employers to connect and interact online. For example, job seekers can use e-services to search for and apply for jobs, to create and update their resumes and profiles, to access career guidance and counselling, to learn new skills and acquire certifications, to attend interviews and assessments, etc. Employers can use e-services to post and advertise jobs, to screen and shortlist candidates, to conduct background checks and verification, to offer and manage employment contracts, to provide training and development, etc.

- Education: E-services enable learners and educators to access and deliver education online. For example, learners can use e-services to enroll and register for courses, to access and download study materials and resources, to attend and participate in online classes and lectures, to submit and receive assignments and feedback, to take and evaluate tests and exams, to obtain and verify degrees and certificates, etc. Educators can use e-services to design and develop courses and curricula, to upload and share teaching materials and resources, to conduct and monitor online classes and lectures, to assign and grade assignments and tests, to communicate and collaborate with learners and peers, etc.


Buy PDF !

Also Visit :

Post a Comment

Cookie Consent
Dear Students, We serve cookies on this site to analyze traffic, remember your preferences, and optimize your experience.
It seems there is something wrong with your internet connection. Please connect to the internet and start browsing again.
AdBlock Detected!
We have detected that you are using adblocking plugin in your browser.
The revenue we earn by the advertisements is used to manage this website, we request you to whitelist our website in your adblocking plugin.