You are on page 1of 1

Prep - Mid Term Examination

s60361@ocean.umt.edu.my Switch account Saving…

Your email will be recorded when you submit this form

* Required

Matric No *

S60361

Explain why a firm's online inventory control system is an example of e-business rather than
e-commerce. What is the key factor in determining if a transaction is "commerce"?

e-commerce is transaction between organiztion and individuals while e buisness is


transaction amongs firms.

Why study e-commerce?

E-commerce is a huge part of the economy and is vital to businesses that sell their products
or services online. E-commerce gives businesses the ability to reach more customers than
traditional retail. With so many people making their purchases online, it is the fastest-
growing retail market.

Identify the eight unique features of e-commerce technology and explain how these features
set e-commerce apart from more traditional ways of conducting commercial transactions.

ubiquity, global reach, universal standards, social technology, personalization customization,


information density, interactivity, richness. The marketplace has expanded beyond its
conventional confines and is no longer confined by time or geography. The term
"marketspace" is coined, implying that shopping can take place anyplace. Customers will
have more convenience, and shopping expenditures will be lower.

How has e-commerce changed the marketing of goods?

Commerce is possible across cultural and national boundaries in a seamless and unaltered
manner. Globally, "marketspace" might comprise billions of people and millions of firms.

List and briefly explain the main types of e-commerce.

business-to-consumer (B2C) e-commerce is the most widely discussed sort of e-


commerce, in which internet businesses try to reach individual consumers. Business-to-
business means online businesses selling to other businesses. Consumer-to-consumer
means consumers selling to other consumers like reseller market on Muday.my or
Carousell. Mobile e-commerce is use if mobile devices to enable inline transactions. Social
e-commerce is ecommerce enabled by social networks and online social relatiobships.
Local e-commerce is e-commerce that is focused on engaging the consumer based on his
or her current geographic location.

What is a first mover? Why was being a first mover considered to be important during the
early years of e-commerce?

It is considered important because we need to make our products outstanding from the
competitors by take as much of opportunity as we can to reach out the people to buy our
products as we are the pioneer.

What are the major stages in the development of corporate computing, and how does the
Internet and Web fit into this development trajectory?

Mainframe computers -> minicomputers -> personal computers -> local area networks
server computing -> enterprise-wide computing -> Internet and web mobile platform cloud
computing. The Internet and Web, and the emergence of a mobile platform held together by
the Internet cloud, are the latest in a chain of evolving technologies and related business
applications, each of which builds on its predecessors

What are the essential characteristics of cloud computing?

on-demand self-service, ubiquitous network access, location-independent resource pooling,


rapid elasticity, measured service.

What are the implications of cloud computing for e-commerce?

Cloud computing at a high volume because the essential hardware infrastructure and
software can be licenced as a service from CSPs for a fraction of the cost of purchasing
these services as products, the cost of constructing and operating web sites is drastically
reduced.

Explain each of the three important concepts behind the Federal Networking Council's
definition of the term Internet. Explain how each technology contributes to the functioning
of the Internet today.

Logically linked together by a globally unique address space based on the Internet protocol
(IP) or its subsequent extensions. Able to support communications using the transmission
control protocol/internet protocol (TCP/IP) suite or its subsequent extensions/ follows-ons,
and/or other IP-compatible protocols and provides, uses or makes accessible, either
publicly or privately, high level services layered on the communications and related
infrastructures described here in.

You are browsing the Web on your tablet computer. Describe the webpage data path from its
origination point on a distant computer to your tablet.

The data from the website comes from the web server that it is hosted on. After which it
travels over the ISP's network to a local network. From their, the data travels to your
personal network which is accessed by your tablet.

What are some of the issues related to the Internet of Things (IoT)?

Insufficient privacy protection, intrusion ignorance, insufficient physical security.

In developing an e-commerce presence, what questions must be asked and answered about
the firm's target audience?

Who is the target audience? And where can they best be reached?

What are the phases, activities, and milestones for developing an e-commerce presence for a
typical start-up website over a one-year period?

A one-year e-commerce presence timeline might include the following phases, activities,
and milestones. Phase 1/Planning, Phase 2/Web, Phase 3/Web implementation, Phase
4/Social media plan, Phase 5/Social media implementation, Phase 6/Mobile plan

Describe the major issues surrounding the decision to build and/or host your own e-
commerce site or to outsource some aspects of site development. Include the advantages and
disadvantages of each decision.

If you decide to build an e-commerce site in-house, you will need a multiskilled staff
including programmers, graphic artists, web designers, and project managers. You must
also purchase appropriate software and hardware. Building a site from scratch involves a
great deal of risk, and the costs can be high because many of the required elements of an e-
commerce site such as shopping carts, credit card authentication and processing, inventory
management, and order processing are quite complex. Specialized firms have already
perfected these tools and your staff will often have to learn to build these features
themselves. The advantage is that you and your staff may be able to build a site that exactly
suits the specific needs of your company. Another advantage is that you will be developing a
skilled staff and consequently acquiring an invaluable supply of in-house knowledge that
will enable your firm to change the site if necessary due to the rapidly changing business
environment.

Explain the main functionalities included in e-commerce merchant server software and the
decision-making process for a manager choosing from among the various e-commerce
merchant server software packages.

Online catalogue, order taking capabilities utilizing an online shopping cart, and online credit
card processing are the key features of e-commerce merchant server software. A database
is usually included with merchant server software, as well as the ability to post lists, product
descriptions, product photos, and, on larger sites, sound, animations, videos, or
interactivities with product demonstrations and customer care people.

List and describe the eight most important factors in successful e-commerce site design.

quick load time, not only does a slow site discourage buyers, but it can also hurt you in
Google search rankings too.
Mobile responsive, your website must be easily viewed on any device, and responsive design
should include resized text that’s easy to read on smaller screens, changeable navigational
positioning based on how the device is held, fewer images to boost load times, and enough
space around links so thumbs can click them easily.
Easy check-out, make sure all fields in your forms are clearly labelled to help buyers avoid
pesky error messages, if customers feel they’re being led in circles they’ll give up quickly.
Clear calls-to-action, there should be primary CTAs for making purchases, plus secondary
CTAs leading to more information about products, services, and the company as a whole.
Secure shopping.
Product reviews, Almost 50% of online customers read reviews before buying products.
Since people will search for product reviews, your review page could help your rankings in
search results.
High Visibility Contact Info, Having an email contact form at your website is fine, as long as
it’s not the only option your customers have for reaching you. Be sure to include a phone
number, email address, and mailing address in a highly visible place such as the footer of
each page.

Why is it difficult to accurately estimate the actual amount of cybercrime?

It is difficult to accurately estimate the actual amount of cybercrime in part because many
companies are hesitant to report it due to a fear of losing the trust of their customers, and
because even if crime is reported, it may be difficult to quantify the actual dollar amount of
the loss.

What is the Internet of Things (IoT) and what security issues and challenges does it raise?

the interconnection via the internet of computing devices embedded in everyday objects,
enabling them to send and receive data. Weak password protection, lack of regular patches
and updates and weak update mechanism, insecure interfaces, insufficient data protection,
poor IoT device management, the IoT skills gap.

What is a sniffing attack and how does it differ from a MitM attack?

A sniffing attack is a attack on confidentiality. A MITM attack is typically a more active


attack where the traffic route has been altered to include the adversary, such as a rogue
access point, or ARP/DNS poisoning, to allow a sniffing attack, break encryption, and/or
tamper with the delivery of content (an integrity and confidentiality attack).

Discuss and explain the various types of malicious code and how they work. Include the
different types of viruses.

Virus, viruses are designed to damage the target computer or device by corrupting data,
reformatting your hard disk, or completely shutting down your system. Worm, one of the
most common types of malware, worms spread over computer networks by exploiting
operating system vulnerabilities. Trojan Horse, a Trojan horse, or “Trojan”, enters your
system disguised as a normal, harmless file or program designed to trick you into
downloading and installing malware. Spyware , installed on your computer without your
knowledge, spyware is designed to track your browsing habits and internet activity. Adware,
adware is often known for being an aggressive advertising software that puts unwanted
advertising on your computer screen

What dimensions do digital signatures and hash digests add to public key cryptography and
how do they work?

1) A digital signature - is formed by encrypting the hash digest using the sender's private
key. As long as the key is truly secret, it is unforgeable (even if the message and signature
are both public).
2) A hash digest is - a fixed length block of data created by a one-way hash function from an
indeterminate length input (the message).
3) The signature may be verified by decrypting it with the matching public key, recalculating
the message's hash digest, and comparing the two. The public key is often obtained through
the sender's certificate, which is digitally signed by a well-known certificate authority, the
public keys of which are generally distributed.

Submit Clear form

Never submit passwords through Google Forms.

This form was created inside of Universiti Malaysia Terengganu. Report Abuse

 Forms

You might also like