Professional Documents
Culture Documents
Answer: Technology isn’t strictly reserved for multichannel brands. While it’s true that global
retailers use robust platforms, eCommerce technology is also a great tool for emerging, growth-
minded brands.
No matter the size of your company, the right technology can deliver several organizational
advantages:
Answer: There are many types of E-commerce and all of them represent a different purchasing
dynamic.
Answer: E-payment system is a way of making transactions or paying for goods and services
through an electronic medium without the use of check or cash.
● Direct debit is a financial transaction in which the account holder instructs the bank to
collect a specific amount of money from his account electronically for payment of goods
or services.
● E-Check is a digital version of an old paper check. It’s an electronic transfer of money
from a bank account, usually checking account without the use of the paper check.
● Credit Card is another form of the e-payment system which required the use of the card
issued by a financial institute to the cardholder for making payments online or through an
electronic device without the use of cash.
● E-Wallet is a form of prepaid account that stored user’s financial data like debit and
credit card information to make an online transaction easier.
● Smart card is a plastic card embedded with the microprocessor that can be loaded with
funds to make transactions and instant payment of bills. It is also known as a chip card.
6. What are the E- commerce
drawback?
Answer: E-Commerce has become one of the most popular mediums of transactions in the
recent years. While it does offer quite a lot of benefits to both buyers and sellers, it is not
totally free from disadvantages. E-commerce’s drawback are-
3. Tax Issue: In case of different geographical locations, sales tax becomes an issue.
Many a time sellers have faced problems in the computation of sales tax.
4. Fear: In spite of popularity, there still resides an element of doubt in the mind of
people when it comes to online shopping.
5. Product Suitability: In many cases, the original product may not match with the
picture or specifications in the E-Commerce site. This absence of ‘touch and feel’ creates
a discouraging effect.
7. High Labor Cost: To get all these in the right shape, companies have to shed a good
amount of money and employ a talented pool of people.
8. Legal Issues: A lot of legal compliances and cyber laws that need to be taken care of
in an E-Commerce business.
10. Huge Technological Cost: Last but not the least; a lot of money needs to be invested
to be built up the technical infrastructure needed to run an E-Commerce business.
Answer: A group of connected computers that communicate, exchange information and share
resources.
Answer:
● Local area network (LAN): A LAN network is the type of network that all small
businesses with just one office would use. It covers a small region of space, typically
a single building. They typically have a lot higher bandwidth capability than a WAN
or a MAN. And they are usually run and maintained by the business.
● Wide area network (WAN): A WAN is a long distance network. It connects systems
together throughout a country, or even to outside the country.
Answer: Network topology is physical or logical layout of cables and devices that connect
the network nodes.
● Bus topology: A bus network is a network topology in which nodes are directly
connected to a common half-duplex link called a bus.
● Ring topology: A ring topology is a topology for a Local Area Network (LAN) in
which every device has exactly two neighbors for communication purposes.
Answer: Computer security is the protection of computer systems and networks from the theft of
or damage to their hardware, software, or electronic data, as well as from the disruption or
misdirection of the services they provide. Basic security issues of different information systems
are described below-
● Boot Sector Virus: This type of virus infects the master boot record and it is challenging
and a complex task to remove this virus and often requires the system to be formatted.
Mostly it spreads through removable media.
● Direct Action Virus: This is also called non-resident virus, it gets installed or stays
hidden in the computer memory. It stays attached to the specific type of files that it infect.
It does not affect the user experience and system’s performance.
● Resident Virus: Unlike direct action viruses, resident viruses get installed on the
computer. It is difficult to identify the virus and it is even difficult to remove a resident
virus.
● Multipartite Virus: This type of virus spreads through multiple ways. It infects both the
boot sector and executable files at the same time.
● Polymorphic Virus: These type of viruses are difficult to identify with a traditional anti-
virus program. This is because the polymorphic viruses alters its signature pattern
whenever it replicates.
● Overwrite Virus: This type of virus deletes all the files that it infects. The only possible
mechanism to remove is to delete the infected files and the end-user has to lose all the
contents in it. Identifying the overwrite virus is difficult as it spreads through emails.
● Space filler Virus: This is also called “Cavity Viruses”. This is called so as they fill up
the empty spaces between the codes and hence does not cause any damage to the file.
Answer: Without the security plan a PC may be subjected to be following types of attacks-
Answer: Hackers are individuals or programs that attempts to gain access to a system without
permission or knowledge. A computer hacker is any skilled computer expert who uses their
technical knowledge to overcome a problem. Today, mainstream usage of "hacker" mostly
refers to computer criminals. People are breaking into computers using programs written by
others, with very little knowledge about the way they work. This usage has become so
predominant that the general public is largely unaware that different meanings exist.
Answer: A firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules. Basically there are four types
of firewalls-
● Packet filters: Packet filters operate at a relatively low level of the TCP/IP stack,
blocking packets unless they match the established rule set.
● Application proxies: Application proxies firewalls work on the application layer of
the Internet protocol suite and may intercept all packets traveling to or from an
application.
● Circuit gateways: It works at the session layer of the OSI Model. It acts as a virtual
connection between the remote host and the internal users by creating a new
connection between itself and the remote host and also changes the source IP address
in the packet and puts its own address at the place of source IP address of the packet
from end users.
● Hybrid: A hybrid firewall may consist of a packet filtering combined with an
application proxy or a circuit gateway combined with an application proxy firewall.
Answer: Encryption is the process of translating plain text data (plaintext) into something
that appears to be random and meaningless. Decryption is the process of converting cipher
text back to plaintext. To encrypt more than a small amount of data, symmetric encryption is
used. A symmetric key is used during both the encryption and decryption processes. To
decrypt a particular piece of cipher text, the key that was used to encrypt the data must be
used. The goal of every encryption algorithm is to make it as difficult as possible to decrypt
the generated cipher text without using the key. If a really good encryption algorithm is used,
there is no technique significantly better than methodically trying every possible key. For
such an algorithm, the longer the key, the more difficult it is to decrypt a piece of cipher text
without possessing the key. It is difficult to determine the quality of an encryption algorithm.