2025
COMMERCE
(E-Commerce)
Paper : COM-SEC-4014
(CBCS PATTERN)
Full Marks : 50
Time : Two hours
The figures in the margin indicate full marks for the questions.
Answer either in English or in Assamese.
1. Answer any four from the following : 1×4=4
(i) E-Commerce refers to
(a) buying products
(b) selling services
(c) selling products
(d) All of the above
Answer: E-Commerce refers to (d) All of the above, as it includes buying products, selling products, and selling services through electronic means, mainly over the internet.
(ii) Which segment focuses on consumers dealing with each other?
(a) C2C
(b) B2B
(c) C2B
(d) P2P
Answer: The correct answer is (a) C2C (Consumer to Consumer), where consumers sell goods or services directly to other consumers through online platforms.
(iii) Electronic commerce can increase sale and ______ costs. (Fill in the blank)
Answer: Electronic commerce can increase sales and reduce costs.
(iv) IP stands for
(a) Internet Protocol
(b) Internet Programming
(c) Internal Program
(d) Intra Program
Answer: The correct answer is (a) Internet Protocol.
(v) Internet is owned by
(a) Microsoft Corporation
(b) Tata Play
(c) Facebook
(d) None of the above
Answer: The correct answer is (d) None of the above, as the Internet is not owned by any single organization; it is a global network of interconnected networks.
(vi) E-payment is doing payment ______. (Fill in the blank)
Answer: E-payment is doing payment electronically.
(vii) E-marketing provides
(a) national coverage
(b) local coverage
(c) global coverage
(d) None of the above
Answer: The correct answer is (c) global coverage, as online marketing can reach customers worldwide.
(viii) <BODY> is a ______ tag. (Fill in the blank)
Answer: <BODY> is a container tag.
2. Answer any three : 2×3=6
(i) What is an e-business model?
Answer: An e-business model is a framework that describes how a business creates, delivers, and earns revenue through electronic means, especially over the internet. It explains the company’s products or services, target customers, value proposition, and sources of income in an online environment.
(ii) What is a digital signature?
Answer: A digital signature is an electronic form of signature used to authenticate the identity of the sender of a digital message or document. It ensures the authenticity, integrity, and non-repudiation of electronic transactions.
(iii) State few advantages of web advertisement.
Answer: i) It has global reach and can target a wide audience.
ii) It is cost-effective compared to traditional advertising.
iii) It allows easy tracking and measurement of results.
iv) It provides interactive communication with customers.
(iv) Define e-wallet.
Answer: An e-wallet, also known as a digital wallet, is an electronic application that allows users to store money digitally and make online payments, transfer funds, and pay bills securely through the internet.
(v) What is cryptography?
Answer: Cryptography is the process of converting plain information into coded form to protect it from unauthorized access. It ensures confidentiality, integrity, and security of data in electronic communication.
(vi) What is phishing?
Answer: Phishing is a type of cyber fraud in which attackers send fake emails or messages that appear to be from legitimate organizations to trick individuals into revealing sensitive information such as passwords, bank details, or credit card numbers.
3. Write short notes on : (any two) 5×2=10
(i) E-commerce revenue model
(ii) Basic structure of a HTML page
(iii) Technology used in e-commerce
(iv) Online banking
(v) IT Act, 2000
(vi) Cryptography
(i) E-Commerce Revenue Model: E-commerce revenue model refers to the methods through which an online business generates income from its operations. It explains how a company earns revenue by selling goods or services through electronic means. The major types of e-commerce revenue models are as follows:
i) Sales Revenue Model – Under this model, a company earns revenue by directly selling goods or services to customers online. The income is generated from the price charged for products. Online retailers follow this model.
ii) Subscription Revenue Model – In this model, customers pay a fixed amount periodically (monthly or yearly) to access a product or service. It ensures regular and predictable income for the business.
iii) Advertising Revenue Model – Revenue is earned by displaying advertisements on websites or apps. Businesses charge advertisers for displaying their ads to website visitors.
iv) Transaction Fee Revenue Model – The company charges a commission or fee for enabling a transaction between buyers and sellers. Online marketplaces and payment gateways follow this model.
v) Affiliate Revenue Model – A company earns commission by promoting other companies’ products and directing customers to their websites through referral links.
Thus, the revenue model is essential for the sustainability and profitability of an e-commerce business as it determines the primary source of income.
(ii) Basic Structure of an HTML Page: HTML (Hyper Text Markup Language) is the standard language used to create web pages. The basic structure of an HTML page consists of different tags arranged in a systematic format. The main components are:
i) Declaration – It defines the document type and tells the browser that the document is an HTML5 file.
ii) Tag – It is the root element of an HTML page. All other tags are written inside this tag.
iii) Tag – It contains meta-information about the webpage such as title, character set, links to CSS files, and scripts. It does not display content directly on the webpage.
iv) Tag</strong> – It is written inside the head section and displays the title of the webpage on the browser tab.</p>
v) Tag – It contains the main content of the webpage such as text, images, links, tables, and forms. Everything inside the body tag is visible to the users.
Therefore, the basic structure of an HTML page provides a framework that helps browsers to display content properly and systematically.
(iii) Technology Used in E-Commerce: E-commerce depends upon various technologies to operate efficiently and securely. These technologies include:
i) Internet and World Wide Web (WWW) – They provide the platform for online communication and transactions between buyers and sellers.
ii) Web Servers and Browsers – Web servers store websites and deliver web pages to users. Browsers help users access websites.
iii) Electronic Data Interchange (EDI) – It allows the electronic exchange of business documents such as invoices and purchase orders between organizations.
iv) Payment Gateway Technology – It facilitates secure online payments by connecting the customer, merchant, and bank.
v) Database Management Systems (DBMS) – Databases store customer information, product details, and transaction records.
vi) Security Technologies – Technologies such as SSL (Secure Socket Layer), encryption, and firewalls protect data from unauthorized access.
vii) Cloud Computing – It provides scalable infrastructure and storage solutions for e-commerce platforms.
These technologies collectively ensure smooth operation, security, and efficiency of e-commerce activities.
(iv) Online Banking: Online banking, also known as internet banking or e-banking, refers to the facility provided by banks that allows customers to perform financial transactions through the internet without visiting the bank branch.
The main features of online banking include checking account balance, transferring funds, paying bills, applying for loans, and viewing transaction history. It provides 24/7 access to banking services, making transactions faster and more convenient.
The advantages of online banking include time-saving, cost-effectiveness, easy fund transfer, and improved customer satisfaction. However, it also involves risks such as cyber fraud and phishing if proper security measures are not followed.
Online banking has revolutionized the banking sector by making financial services more accessible and efficient.
(v) IT Act, 2000: The Information Technology Act, 2000 is an important legislation enacted by the Government of India to provide legal recognition to electronic transactions and digital signatures. It came into force on 17th October 2000.
The objectives of the IT Act, 2000 include:
i) To give legal validity to electronic records and digital signatures.
ii) To facilitate electronic filing of documents with government agencies.
iii) To prevent cyber crimes and provide penalties for hacking and online fraud.
iv) To promote e-commerce and secure online transactions.
The Act also defines cyber offences such as hacking, identity theft, cyber terrorism, and data theft. It provides punishment and compensation for victims of cyber crimes. The IT Act plays a significant role in regulating cyber activities in India.
(vi) Cryptography: Cryptography is the science of securing information by converting it into an unreadable format called cipher text. It protects data from unauthorized access during storage and transmission.
There are two main types of cryptography:
i) Symmetric Key Cryptography – The same key is used for both encryption and decryption of data.
ii) Asymmetric Key Cryptography – Two different keys (public key and private key) are used. The public key encrypts the data, and the private key decrypts it.
Cryptography ensures confidentiality, integrity, authentication, and non-repudiation of data. It is widely used in online banking, digital signatures, e-commerce transactions, and secure communications.
Thus, cryptography is an essential component of modern electronic commerce and information security systems.
4. Answer any three : 10×3=30
(i) Define lists. Explain different types of lists used in HTML with one simple example.
Answer: Lists in HTML are used to group related items together in a systematic and organized manner. They help in presenting information clearly, either in a numbered sequence or in bullet form. Lists improve readability of web pages and are widely used in menus, instructions, features, and product descriptions.
HTML mainly provides three types of lists:
i) Ordered List () – An ordered list displays items in a numbered sequence. It is used when the order of items is important, such as steps in a procedure or ranking. Each item in the list is defined using the (list item) tag. By default, ordered lists use numbers, but they can also use letters or Roman numerals.
Simple Example:
<ol>
<li>Search the product</li>
<li>Add to cart</li>
<li>Make payment</li>
</ol>
This will display the steps in numerical order.
ii) Unordered List () – An unordered list displays items with bullet points. It is used when the order of items is not important, such as listing features or services. Each item is also defined using the tag.
Simple Example:
<ul>
<li>Mobile</li>
<li>Laptop</li>
<li>Tablet</li>
</ul>
This will display items with bullet symbols.
iii) Definition List () – A definition list is used to display terms and their definitions. It is suitable for glossaries or explaining technical terms. It uses three tags:
(definition list),
(definition term), and
(definition description).
Simple Example:
<dl>
<dt>E-commerce</dt>
<dd>Buying and selling goods through the internet.</dd>
</dl>
Thus, HTML lists are essential tools for structuring content effectively and making web pages user-friendly.
Now move to the very long in very detailed each answer
(ii) Write the salient features of the IT Act, 2000.
Answer: The Information Technology Act, 2000 was enacted by the Government of India to provide legal recognition to electronic transactions and to control cyber crimes. It plays a vital role in promoting e-commerce and digital governance in India. The salient features of the IT Act, 2000 are as follows:
i) Legal Recognition of Electronic Records – The Act gives legal validity to electronic records and documents, making them equivalent to paper-based documents.
ii) Recognition of Digital Signatures – It provides legal recognition to digital signatures for authentication of electronic records and transactions.
iii) Facilitation of E-Governance – The Act allows electronic filing of documents with government agencies and supports online communication between citizens and government departments.
iv) Regulation of Certifying Authorities – It provides for the appointment of Controller of Certifying Authorities to regulate the issuance of digital signature certificates.
v) Definition and Punishment of Cyber Crimes – The Act defines various cyber offences such as hacking, identity theft, cyber terrorism, data theft, and spreading viruses, and prescribes penalties and punishment for such crimes.
vi) Adjudication and Cyber Appellate Tribunal – It establishes a mechanism for adjudication of cyber disputes and provides for appeals against orders.
vii) Data Protection and Privacy Provisions – The Act includes provisions to protect sensitive personal data and maintain confidentiality.
viii) Amendment of Other Laws – The IT Act amended the Indian Penal Code, Evidence Act, and Bankers’ Books Evidence Act to make them compatible with electronic transactions.
Therefore, the IT Act, 2000 provides a legal framework for electronic commerce and cyber security in India.
(iii) What is online shopping? Explain different steps involved in online shopping process.
Answer: Online shopping refers to the process of purchasing goods or services through the internet using a web browser or mobile application. It enables customers to buy products from anywhere at any time without physically visiting a store. Online shopping is an important component of e-commerce and has gained popularity due to convenience and variety.
The different steps involved in the online shopping process are explained below:
i) Accessing the Website or App – The customer visits the online shopping website or mobile application and creates an account or logs in.
ii) Searching for Products – The customer searches for desired products using the search bar or by browsing different categories.
iii) Selecting the Product – After comparing features, prices, and reviews, the customer selects the desired product and views detailed information.
iv) Adding to Shopping Cart – The selected product is added to the shopping cart, where multiple items can be stored temporarily before purchase.
v) Placing the Order – The customer proceeds to checkout, enters shipping details such as address and contact number.
vi) Choosing Payment Method – The customer selects the mode of payment such as debit card, credit card, net banking, UPI, e-wallet, or cash on delivery.
vii) Payment Confirmation – After successful payment, the customer receives order confirmation through email or SMS.
viii) Order Processing and Delivery – The seller processes the order, packages the product, and ships it to the customer’s address.
ix) After-Sales Service – The customer may track the order, request return or replacement, or give feedback after receiving the product.
Thus, online shopping is a systematic process that involves searching, selecting, ordering, and paying electronically, making purchasing simple and convenient for customers.
(iv) What is Electronic Payment System? Describe different methods of Electronic Payment System.
Answer: Electronic Payment System (EPS) refers to a system that enables payment for goods and services through electronic means without using physical cash or cheques. It allows transfer of money between buyer and seller through digital platforms such as the internet, mobile applications, or banking networks. Electronic payment systems play a crucial role in the development of e-commerce as they ensure fast, secure, and convenient financial transactions.
An electronic payment system involves three main parties: the payer (customer), the payee (merchant), and the payment intermediary (bank or payment gateway). When a customer initiates a payment, the system verifies the transaction, transfers funds electronically, and confirms the transaction to both parties.
The different methods of electronic payment system are explained below:
i) Credit Card Payment A credit card is one of the most popular methods of electronic payment. It allows the cardholder to purchase goods and services on credit up to a specified limit. The bank pays the merchant on behalf of the customer, and the customer repays the bank later. It provides convenience and security through authentication systems like OTP and CVV.
ii) Debit Card Payment A debit card allows customers to make payments directly from their bank account. The amount is immediately deducted from the customer’s account at the time of transaction. It is widely used for online shopping and POS transactions.
iii) Net Banking (Internet Banking) Net banking enables customers to transfer money directly from their bank account to the merchant’s account through the bank’s official website or application. It requires login credentials and authentication for security.
iv) Unified Payments Interface (UPI) UPI is a real-time payment system that allows instant transfer of funds between bank accounts using mobile applications. It uses a Virtual Payment Address (VPA) and does not require bank details for each transaction. It is fast, convenient, and widely used in India.
v) Electronic Wallet (E-Wallet) An e-wallet is a digital wallet that stores money electronically. Customers can load money into the wallet and use it to make payments for online purchases, bill payments, and recharges. It ensures quick transactions and often provides rewards or cashback.
vi) Electronic Cheque (E-Cheque) An electronic cheque works similar to a traditional cheque but is issued and processed electronically. It uses digital signatures for authentication and is commonly used in business-to-business transactions.
vii) Smart Cards Smart cards contain embedded microchips that store information and can be used for electronic transactions. These are often used for prepaid services and secure authentication.
viii) Mobile Payment Systems Mobile payment systems allow payments through smartphones using apps, QR codes, or NFC (Near Field Communication) technology. It provides portability and ease of use.
Electronic payment systems offer several advantages such as speed, convenience, reduced risk of theft, lower transaction cost, and global accessibility. However, they also require strong security measures to prevent fraud and cybercrime. Thus, electronic payment systems form the backbone of modern e-commerce transactions.
(v) Write about different factors involved in E-Commerce Website Design.
Answer: E-commerce website design refers to the planning, creation, and structuring of an online store in a manner that attracts customers and ensures smooth transactions. A well-designed website plays a significant role in increasing sales, building trust, and enhancing customer satisfaction. The success of an online business largely depends on effective website design.
The different factors involved in e-commerce website design are discussed below:
i) User-Friendly Interface
The website should be simple, easy to navigate, and visually appealing. Customers should be able to find products quickly without confusion. Clear menus and search options improve user experience.
ii) Responsive Design
The website should be compatible with different devices such as smartphones, tablets, and desktops. A responsive design adjusts automatically according to screen size, ensuring accessibility for all users.
iii) Fast Loading Speed
A website must load quickly. Slow loading pages may lead to customer dissatisfaction and abandonment. Optimized images and efficient coding help improve speed.
iv) Secure Payment Gateway Security is a crucial factor. The website should use secure payment gateways and encryption technologies such as SSL to protect customer data and financial information.
v) Clear Product Information Each product should have detailed descriptions, specifications, prices, and high-quality images. Customer reviews and ratings also help in decision-making.
vi) Easy Checkout Process The checkout process should be simple and require minimal steps. Complicated procedures may discourage customers from completing the purchase.
vii) Search and Filter Options Advanced search features and filtering options help customers locate products based on price, category, brand, or other specifications.
viii) Customer Support System Availability of customer support through chat, email, or phone builds trust and improves customer satisfaction.
ix) SEO and Marketing Integration The website should be optimized for search engines to attract organic traffic. Integration with social media platforms enhances marketing efforts.
x) Legal and Policy Information The website must clearly mention privacy policy, return policy, terms and conditions, and contact details to ensure transparency and compliance with laws.
In conclusion, an effective e-commerce website design combines aesthetics, functionality, security, and customer convenience. Proper planning and implementation of these factors help in achieving business success in the competitive digital marketplace.
(vi) Write about different steps and techniques for promoting an e-commerce website.
Answer: Promotion of an e-commerce website is essential for attracting customers, increasing website traffic, and boosting sales. In the highly competitive online market, proper promotional strategies help a business to create brand awareness and build customer loyalty. The steps and techniques involved in promoting an e-commerce website are explained below in detail.
i) Search Engine Optimization (SEO) SEO is the process of optimizing a website to rank higher in search engine results. It includes proper use of keywords, meta tags, quality content, backlinks, and mobile-friendly design. Higher ranking in search engines increases visibility and attracts organic traffic.
ii) Search Engine Marketing (SEM) SEM involves paid advertising on search engines. Businesses run paid ads to appear at the top of search results. It provides immediate visibility and targeted marketing.
iii) Social Media Marketing Promotion through social media platforms helps businesses reach a wide audience. Regular posting of engaging content, promotional offers, and customer interaction improves brand recognition and trust.
iv) Content Marketing Content marketing includes writing blogs, articles, videos, and product guides related to the business. Informative and valuable content attracts customers and improves website credibility.
v) Email Marketing Email marketing is a cost-effective method of promoting products and services. Businesses send newsletters, discount offers, and updates to customers to encourage repeat purchases.
vi) Affiliate Marketing In affiliate marketing, other websites or individuals promote the products of the e-commerce business and earn commission on sales generated through their referral links.
vii) Online Advertising Banner advertisements, display ads, and video ads on different websites increase brand awareness and attract potential customers.
viii) Influencer Marketing Collaborating with influencers who have a strong online presence helps in promoting products to their followers and increasing brand credibility.
ix) Customer Reviews and Ratings Encouraging satisfied customers to leave positive reviews enhances trust and influences new customers.
x) Discounts and Promotional Offers Special discounts, cashback offers, festive sales, and referral bonuses attract customers and increase website traffic.
xi) Mobile Optimization and App Promotion With the increase in mobile users, promoting a mobile-friendly website or mobile app improves accessibility and customer engagement.
xii) Analytics and Performance Monitoring Regular monitoring of website traffic, conversion rate, and customer behavior helps in improving promotional strategies.
In conclusion, effective promotion of an e-commerce website requires a combination of organic and paid marketing strategies. Continuous improvement and adaptation to market trends ensure long-term success.
(vii) Describe E-Commerce Security Threats.
Answer: E-commerce security threats refer to various risks and cyber attacks that may compromise the confidentiality, integrity, and availability of online transactions. As e-commerce involves electronic transfer of sensitive information such as personal details and payment data, security becomes a major concern.
The major e-commerce security threats are explained below:
i) Hacking Hacking involves unauthorized access to computer systems or networks. Hackers may steal confidential data such as customer information, passwords, or financial details.
ii) Phishing Phishing is a fraudulent attempt to obtain sensitive information by sending fake emails or messages that appear to be from legitimate organizations. Customers may unknowingly reveal passwords or bank details.
iii) Malware and Viruses Malicious software such as viruses, worms, and trojans can infect systems, damage data, and steal information.
iv) Identity Theft In identity theft, criminals use another person’s personal information to make fraudulent transactions or open accounts.
v) Credit Card Fraud Unauthorized use of credit or debit card details for making online purchases is a common threat in e-commerce.
vi) Denial of Service (DoS) Attacks In a DoS attack, attackers overload a website with excessive traffic, making it unavailable to legitimate users.
vii) Data Breach Data breach occurs when confidential customer data is accessed or disclosed without authorization.
viii) Man-in-the-Middle Attack In this attack, the attacker secretly intercepts communication between two parties to steal information.
ix) Spam and Social Engineering Spam messages and social engineering techniques manipulate users into sharing confidential information.
To prevent these threats, e-commerce websites use security measures such as encryption, Secure Socket Layer (SSL), firewalls, strong authentication, digital signatures, and regular security audits.
Thus, understanding and preventing security threats is essential for maintaining customer trust and ensuring safe online transactions.
(viii) Describe the Major E-Commerce Business Models.
Answer: E-commerce business models refer to the different types of commercial transactions conducted over the internet based on the relationship between buyers and sellers. These models classify e-commerce activities according to the parties involved in the transaction. Understanding these models helps businesses identify their target market and design suitable strategies.
The major e-commerce business models are explained below in detail:
i) Business to Business (B2B) Business to Business (B2B) refers to electronic transactions conducted between two business organizations. In this model, one business sells products or services to another business through online platforms. It generally involves bulk transactions, long-term relationships, and large payment volumes.
Characteristics of B2B model include large order quantities, negotiated pricing, and regular supply contracts. It reduces paperwork and speeds up procurement processes. B2B e-commerce improves efficiency in supply chain management and inventory control.
ii) Business to Consumer (B2C) Business to Consumer (B2C) refers to online transactions between a business and individual consumers. In this model, businesses sell goods or services directly to customers through websites or mobile applications.
This is the most common and popular form of e-commerce. Customers can browse products, compare prices, place orders, and make payments online. The B2C model focuses on customer satisfaction, quick delivery, and promotional offers. It provides convenience, variety, and competitive pricing to consumers.
iii) Consumer to Consumer (C2C) Consumer to Consumer (C2C) refers to transactions conducted between individual consumers through an online platform. In this model, the website acts as an intermediary that connects buyers and sellers.
Individuals sell goods or services directly to other individuals. It is commonly used for selling second-hand goods, handmade products, or personal services. The platform usually charges a small commission or transaction fee.
iv) Consumer to Business (C2B) Consumer to Business (C2B) refers to a model where individuals offer products or services to businesses. In this model, consumers create value, and businesses pay for it.
Examples include freelance services, content creation, photography, and online reviews. Here, the traditional business model is reversed, as consumers become service providers and businesses act as buyers.
v) Business to Government (B2G) Business to Government (B2G) refers to transactions between businesses and government organizations through electronic means. Businesses supply goods or services to government departments via online tenders and procurement systems.
It increases transparency, reduces corruption, and improves efficiency in public procurement processes.
vi) Government to Citizen (G2C) Government to Citizen (G2C) involves electronic transactions between government agencies and citizens. It includes services such as online tax payment, license renewal, utility bill payment, and public information services.
This model improves accessibility, saves time, and promotes digital governance.
vii) Business to Employee (B2E) Business to Employee (B2E) refers to transactions between a company and its employees through internal online platforms. It includes payroll services, employee benefits, training programs, and internal communication.
This model improves organizational efficiency and employee satisfaction.
In conclusion, the major e-commerce business models classify online transactions based on the relationship between participants. Each model serves a specific purpose and target group. With the advancement of digital technology, these business models continue to expand and contribute significantly to global trade and economic development.
-0000-
![E-Commerce Solved Question Paper 2025 [Gauhati University FYUGP BCom 2nd Semester] E-Commerce Solved Question Paper 2025 [Gauhati University FYUGP BCom 2nd Semester]](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZfhBjBQfGsr6MNT1X6D8FLxtDaZRqViaCpLT958LirbCEH2nQa5rbRjjClmeiJkvrqYwcNKUC7-gtzxWYPp2vcp3LNRMihDI1BxBUcbBM6fpb8I15isgtKemNX1uinXNG4HfVAHc7Lm6k4ccfbV4MK98YWSWU0Ma1fIeV_Q2EuSMLes2K4kwKbqrKTM72/s16000-rw/1000413827.webp)