You are on page 1of 24

Prepared by

Namra Tariq Goraya

Ecommerce Application and development

BSCS 2018:

1:What is e marketing and how is it playing a vital role in the success of electronic business?

Ans: E-COMMERCE, MARKETING. the process of advertising and selling products and
services on the internet, for example, on a company website or by email: For cost and
efficiency reasons, personal selling is giving the way to telemarketing, call centers,
and e-marketing.

It play a vital role in the success of electronic business due to the following reasons:

1. Convenience And Quick Service

The incredible convenience of marketing online is one of the biggest advantages of


internet marketing. The internet has extremely easy accessibility with consumers using
the internet and reaching markets anywhere in the world. Because of this, purchasing
goods from across borders now reduces the cost of transportation.

2. Low Cost For Operations And A Wider Reach

One of the significant advantages of online marketing for businesses is its low operating
cost. You can advertise at a cheaper rate with internet marketing than with traditional
methods of advertisement such as ads in newspapers, on television and on the radio.
Plus, these advertisements have a wider reach, owing to the increased use of devices
by most consumers. In fact, according to some figures shared by Google, at the 2016
Canadian Doubleclick Leadership Summit, every two out of three Canadians use two or
more devices on a regular basis. And to add to this, around 69% of them use multiple
devices while making just one purchase.

3. Measure And Track Results

An aspect of internet marketing that is rarely available with traditional marketing is the
ability to measure and track results. With online marketing, your business can utilize
various tools, such as Google Analytics, Hootsuite, Doppler and Crazy Egg, for tracking
results of your advertising campaigns. Using these tools, not only can you measure and
track the effectiveness of your online marketing campaigns, but also illustrate its
progress in detailed graphics.

4. Demographic Targeting

Have you ever wondered why more than 90% of users who visit a website do not
necessarily get converted into customers? Mass marketing is the answer to this. Also,
Prepared by
Namra Tariq Goraya

the ongoing debate about using online marketing strategies optimally and the huge list
of online marketing advantages and disadvantages need to be looked into.

5. Global Marketing

The ability to market your products and services across countries is one of the biggest
advantages of global marketing for business. Within several months of following
aggressive SEO techniques, you can expect a huge number of hits your website,
secure millions of viewers and reach audiences from across the world.

6. Ability To Multitask

One of the core benefits of online marketing is its ability to handle millions of customers
at the same time. This is also the reason why it is important for you to optimize your
website to make it device-friendly. It must be built to ensure that is accessible through
any device, be it a notebook, smartphone, or a laptop. As long as a website’s
infrastructure is efficient, numerous transactions can take place seamlessly and
simultaneously.

7. 24/7 Marketing

Internet marketing reduces cost and runs around the clock. That means that your
marketing campaigns run for 24 hours a day, 7 days a week. Compared to traditional
marketing, internet marketing does not have any limitations in terms of opening or
closing hours. At the same time, you would not have to worry about overtime pay for
your staff.

8. Automated, Tech-Savvy Marketing

Another advantage of internet marketing is that marketing this way is easy with a one-
mouse-click automation. Compared to traditional offline marketing where marketers
delegate various tasks to the best hands and talents, internet marketing takes
advantage of a more tech-savvy method. For instance, you can use Customer.io to
automate your emails. Similarly, you can check out AdRoll for aggressively targeting
your existing customer base. Oracle Eloqua is yet another tool that is highly effective for
running automated yet personalized marketing campaigns.

9. Data Collection For Personalization

Transactions through the internet allow you to collect data. Whenever a customer
purchases a product through a company’s website, their data is captured. There are
various ways that you can collect customer data including customer profiles or through
their behaviour while on your website. Another way of collecting customer data is the
use of internet tools or with any tracking software. The information collected typically
Prepared by
Namra Tariq Goraya

includes age, gender, location, how they came to your site, what sites they visited after
they left, viewed products and the pages visited on your site.

10. Diversified Marketing And Advertising

When targeting your audience, diversification plays an important role in your marketing
and advertising campaigns. Diversification means that you can use a variety of tactics
and strategies in order to reach your prospects. With online marketing, diversification
becomes a lot easier. At the same time, it is possible for you to run varying marketing
techniques simultaneously to better implement your marketing campaign.

11. Easy Tweaking To Your Marketing And Advertising Campaigns

It is inevitable in marketing and advertising that something needs to be tweaked in order


to optimize your campaigns. Compared to traditional marketing, online advertising is
much easier to play around with. Whenever the campaign needs to be modified, online
marketing allows the modification to happen without having to worry about downtime,
service interruption or even halting the entire system.

This means that you can easily change the appearance of your online shopping mall –
your website – by changing a few lines in the cascading style sheet (CSS) that links to
the web page.

12. Instant Transaction Service

Executing transactions is easy and nearly instant online. You can do this through a
digital payment service so that there is no need for a cash transaction to go between the
marketer and the customer to buy and sell merchandise. This is all possible due to
payment processing solutions executed by third-party payment processing companies
such as PayPal.

13. Better Sales Relationships

In traditional marketing, merchants often give their business cards or pamphlets to their
customers after or during a sale. However, what happens is often on such occasions,
customers lose the cards or misplace them. The only time the buyer would remember
about the card was if they had the intention of visiting the seller again. In the end, most
customers do not remember the seller, forget the card; hence, this marketing method
does not work to convince buyers to return.

14. Time-Effective Marketing


Prepared by
Namra Tariq Goraya

Unlike traditional marketing, internet marketing is easy to start and quick to implement.
You can easily set up a marketing campaign at any time that is convenient for you. In
fact, you can set up email marketing for your business within a matter of hours. Also, in
the next few minutes, you can set up an autoresponder and create a marketing list for
your business.

15. Continued Marketing Campaign

The lasting effects of any marketing campaign are one of the greatest advantages of
internet marketing for business. For example, content marketing efforts, such as
creating SEO-optimized blogs and websites or gaining the maximum referral traffic from
your content, have the capacity to remain functional and promote your products and
services years after you started your marketing campaign. Almost every online
marketing technique has viral and long-term effects that can continually improve your
site’s traffic.

2: Discuss online payment modes and their available shops in Pakistan, also discuss their pros
and cons?

Ans: Credit (and Debit) Cards

Credit cards are the most common payment method in the world right now.

The Pros

 Credit cards are the most common/preferred payment option. You’d be


hard-pressed to find someone without a credit – or at least a debit – card.
 Accepting credit cards encourages impulse buys. Credit cards are easy to
use and quick (at least from the customer’s perspective) to process. The entire
see it, want it, buy it cycle goes by relatively quickly for those favoring credit
purchases; which allows prospective customers more leeway when it comes to
buying on impulse.
 Credit cards can be used to make PayPal purchases. If you’re already using
PayPal, like most online freelancers, then you’re already accepting credit cards!
PayPal allows customers to input a credit card number in lieu of logging in if they
don’t have (or don’t want) a PayPal account.

The Cons

 Keeping track of all the laws and security precautions. There are several
laws that must be adhered to should you decide to accept credit cards. In order
to prevent security breaches and protect your clients, you’ll have to develop a
higher level of awareness. Not to mention, legally, you can’t hold onto a client’s
information past a certain point without getting into trouble.
Prepared by
Namra Tariq Goraya

 Processing fees. Both credit and debit cards require processing fees in order to
finally receive your payment. (You’ll also need to hand over additional funds in
order to purchase a pin pad if you decide to allow debit cards).

Mobile Payments

This payment option actually encompasses several smaller options. For the purpose of
this article, “Mobile Payments” will be classified simply as any payment you can make or
receive on your phone; whether it be through an SMS message, a QR code, NFC, or
anything else.

The Pros

 Nearly everyone has a phone. Like credit cards, it’s nearly impossible to find
someone without a phone. So, whether your client is sending you a payment
through their phone, or initiating a payment through your phone, you’ll be
covered.
 Payments are generally fast. So long as your phone is up to snuff, the rest of
the procedure goes quickly!

The Cons

 Certain mobile methods are prone to security leaks. Depending on which


mobile payment method you choose, you may have to worry more about
security.
 Not all readers are created equal. If you choose a mobile payment method that
involves using an app with an actual, tangible, card reader – like Square, Paypal
Here, or Inuit GoPayment – then you may have compatibility issues. Most mobile
credit card readers are iPhone compatible, but nothing else is guaranteed. Be
sure to do your research.
 An update can cramp your style. Whenever you depend on an app to help run
your business, you run the risk of said app “breaking” when an update is
released. If you upgrade the program you use and it’s no longer compatible with
the phone you’re using to accept payments on, you could be up a creek.

EasyPaisa
The easiest way for debit/credit holders in Pakistan to make payments online is
through easypaisa.  EasyPaisa allows any local or international Visa/Mastercard
Credit or Debit Cardholder to pay online for any purchase.
Prepared by
Namra Tariq Goraya

JazzCash
JazzCash offers a personalized visa debit card for its mobile account holders. Via
this card, the customers can easily conduct online transactions without any hassle.
The payment method is secure and convenient.

Banks
Different banks like MCB, UBL, offers visa debit/credit card to its customers which
can be used for making online payments in Pakistan.
Online Payment Services
There are many services available which offer customers one-time online payment
option. For instance, OKPay is a service which gives a temporary card number
which can be used for online payment. Similarly, US Unlocked in another service for
international shoppers. A virtual prepaid MasterCard is given that users can use
once or reload whenever they want to conduct an online transaction. Moneypolo is
yet another service which offers both physical and virtual prepaid cards to users for
online shopping. Ecopayz is a service that is for one-time online payments. Once
the payment is made the card is canceled automatically. So your card details are
never stolen or misused.
Best Payment Cards in Pakistan
MCB Lite
MCB Lite, a Prepaid Visa Card allows the cardholder to make any online domestic
and international payment. There is no monthly or signing up fees attached to the
card. Annually the payment of the card is Rs 300.
New account and card start at MCB Lite 0 which has a yearly limit of Rs 200,000 for
deposit and withdrawal. This can be upgraded to Lite 1 and Lite 2 for free. Though
we don’t know about the charges for foreign currency transaction.
Anybody can own an MCB Lite card but if you have an account in MCB the benefits
are more. MCB Lite is one of the best cards in Pakistan for payments because it
allows users to receive remittances directly into the mobile wallet. Thus it has its
own advantages.
UBL Wiz Card
Prepared by
Namra Tariq Goraya

UBL Wiz Card was the first prepaid card that launched in Pakistan. The cardholder
needs to activate it for free for internet usage. Then he/she can start an internet
session for PKR 100. When the session duration ends, it can not be used for
internet. It is better this card is used for rare online purchase and not for monthly
subscriptions.
UBL also offers a Wiz internet card which is just for internet usage but it is not as
good as MCB Lite. So those users who are just looking for a card solely for online
payment purposes can purchase this card. The annual limit of the card in Rs
100,000 for the non-biometric verified card and RS 500,000 for the verified ones.
Faysal Bank Mobit Virtual Card
Faysal Bank introduced the Mobit Virtual Card in partnership with MasterCard. The
card allows you to make online payments worldwide without any issues.  This
Virtual card works as a reloadable and/or a one-time usage stored-value, which can
be instantly generated by Faysal Bank through Mobit’s Internet Banking.
3:Customer loyalty is both an attitude and behavioral tendency to favour
one brand over all others.whether due to satisfaction with product or
services, its convenience or performance, or simply familiarity and comfort
with the brand . you are to elaborate 5 stage model of customer loyalty?
Ans: Five Stages of Customer Loyalty
Awareness (Customers recognized the name of the company or one of its
productsAdvertising a brand or a company name is a common way to achieve this
level of relationship)
Exploration (Potential customers learn more about the company or its productsA
large amount of information interchange can occur between a company and its
potential customers)
Familiarity (Customers having completed several transactions are aware of the
company’s policiesThey are also likely to shop and buy from competitors of the
company)
Commitment (Customers develop a fierce loyalty or strong preference for the
products or brandsAnd are often willing to tell others about how happy they are
with their interactions)
Separation (Customers might be severely disappointed by changes in the level of
service or product qualityCompany can evaluate the relationship and conclude that
customers are costing too much to maintainAn important goal of any marketing
Prepared by
Namra Tariq Goraya

strategy should be to move customers into the commitment stage as rapidly as


possible and keep them there as long as possible.
4: Spam is unsolicited commercial email, you are supposed to discuss the
different solution of UCE?
Ans: UCE (unsolicited commercial e-mail) is a legal term used to describe an
electronic promotional message sent to a consumer without the consumer's prior
request or consent. In the vernacular, this kind of e-mail message is called spam.
Different solution to avoid spam:
 Try to avoid opening spam emails and clicking on links in spam messages.
 Don’t buy anything from a spammer. Not only do you risk comprising your security
and infecting your computer with malware - viruses and so on - you also reward and
encourage the spammers.
 Don’t be tempted to reply. The mailbox is probably unread.
 Don’t threaten the spammer. Some mails will be seen and spammers have rights
too. Threatening messages could expose you to legal action.
 Avoid ‘unsubscribe’ options. Cynically, spammers often include an ‘unsubscribe’
link. Far from removing the menace, clicking it will confirm that your address is active
and probably attract even more spam.
 Use a disposable email address. You could use this account especially for buying
online or writing to newsgroups. If you find that you are getting a lot of spam at this
address, you can simply delete it and set up another.
 Be wary about giving out your main email address. If in doubt, it is a good idea to
use a disposable address (see above).
 Never reveal your email address on your website. If you have a website, putting
your email address on it will be easy fodder for a ‘spambot’ that is harvesting
addresses. You could use a web contact form instead.
 Munging. A simple but effective technique where you present your address in a way
that people can easily work out but which will fool spambots. They will look for a
pattern, such as a@b.com. Writing the address as ‘a at b dot com’ would probably
evade them.
 Spam filter: Many of the remaining messages can be blocked using a spam filter.
ISPs (internet service providers) are increasingly providing the service, as well as
some email programs. Be aware that some filters operate a ‘whitelisting’ system – in
other words, you have to actively mark an email address as ‘not spam’ or messages
will go straight into a folder entitled ‘Spam’ or ‘Junk’.

5:What is encryption and decryption. discuss semantic and asymmetric


encryption?
And: Encryption is the process of transforming information so it is unintelligible to
anyone but the intended recipient. Decryption is the process of transforming encrypted
Prepared by
Namra Tariq Goraya

information so that it is intelligible again. A cryptographic algorithm, also called a


cipher, is a mathematical function used for encryption or decryption. In most cases,
two related functions are employed, one for encryption and the other for decryption.
Symmetric Encryption

Symmetric encryption is a conventional method of Encryption. It is also the simplest of


two techniques. Symmetric encryption is executed by means of only one secret key
known as ‘Symmetric Key’ that is possessed by both parties. This key is applied to
encode and decode the information. The sender uses this key before sending the
message and the receiver uses it to decipher the encoded message.
This is a pretty straightforward technique and as a result, it doesn’t take much time.
When it comes to transferring huge data, symmetrical keys are preferred. Caesar’s
Cipher happens to be a good example of symmetric encryption. Modern approaches of
symmetric encryption are executed using algorithms such as RC4, AES, DES, 3DES,
QUAD, Blowfish etc.
The most common form of symmetric encryption comes once an encrypted connection
has been negotiated between a client and a server with an SSL certificate installed.
Once the connection is negotiated, two 256-bit session keys are created and
exchanged so that encrypted communication can occur.
Asymmetric Encryption

Asymmetric Encryption is a relatively new and complex mode of Encryption. Complex


because it incorporates two cryptographic keys to implement data security. These keys
are called a Public Key and a Private Key. The Public key, as the name suggests, is
available to everyone who wishes to send a message. On the other hand, the private
key is kept at a secure place by the owner of the public key.
The public key encrypts the information to be sent. It uses a specific algorithm in doing
so. Whereas, the private key, which is in possession of the receiver, decrypts it. The
Same algorithm is behind both these processes.
The involvement of two keys makes Asymmetric Encryption a complex technique. Thus,
it proves to be massively beneficial in terms of data security. Diffie-Hellman and RSA
algorithm are the most widely used algorithms for Asymmetric Encryption.
Side-by-side comparison of symmetric encryption and asymmetric encryption

Comparison
Symmetric Encryption Asymmetric Encryption
Factor
Asymmetric Encryption consists of
Number of Symmetric encryption
two cryptographic keys. These
Cryptographic incorporates only one key for
keys are regarded as Public
Keys encryption as well as decryption.
Key and Private Key.
Symmetric encryption is a simple
technique compared to Contribution from separate keys for
Complexity asymmetric encryption as only encryption and decryption makes it
one key is employed to carry out a rather complex process.
both the operations.
Swiftness of Due to its simplistic nature, both Because of encryption and
Prepared by
Namra Tariq Goraya

decryption by two separate keys


the operations can be carried out
Execution and the process of comparing them
pretty quickly.
make it a tad slow procedure.
 RC4  RSA

 AES  Diffie-Hellman
Algorithms
Employed  DES  ECC

 3DES  El Gamal

 QUAD  DSA

6: We use a user friendly name to access a web page how a server translate
domain name into ip address to make it computer readable and be able to send
us back the required information?
Ans: The internet and the World Wide Web are wild frontiers that rely on computer
languages and codes to find and share data and information. One of the most
fundamental instruments of the internet is the Domain Name System, or DNS.
(Although many people think "DNS" stands for "Domain Name Server," it really stands
for "Domain Name System.") DNS is a protocol within the set of standards for how
computers exchange data on the internet and on many private networks, known as
the TCP/IP protocol suite. Its purpose is vital, as it helps convert easy-to-
understand domain names like "howstuffworks.com" into an Internet Protocol (IP)
address, such as 70.42.251.42 that computers use to identify each other on the
network. It is, in short, a system of matching names with numbers.

The DNS concept is like a phone book for the internet. Without this kind of wayfinding
system, you'd have to resort to much more complicated and esoteric means to sift
through the virtual open plains and dense cities of data strewn across the global internet
... and you can bet that it wouldn't be nearly as much fun, especially since there are now
hundreds of millions of domain names

Computers and other network devices on the internet use an IP address to route your
request to the site you're trying to reach. This is similar to dialing a phone number to
connect to the person you're trying to call. Thanks to DNS, though, you don't have to
keep your own address book of IP addresses. Instead, you just connect through
Prepared by
Namra Tariq Goraya

a domain name server, also called a DNS server or name server, which manages a
massive database that maps domain names to IP addresses.

Whether you're accessing a website or sending e-mail, your computer uses a DNS


server to look up the domain name you're trying to access. The proper term for this
process is DNS name resolution, and you would say that the DNS server resolves the
domain name to the IP address.

Without DNS servers, the internet would shut down very quickly. But how does your
computer know what DNS server to use? Typically, when you connect to your home
network, internet service provider (ISP) or WiFi network, the modem or router that
assigns your computer's network address also sends some important network
configuration information to your computer or mobile device. That configuration includes
one or more DNS servers that the device should use when translating DNS names to IP
address.

BSIT 2017:

1:Discuss the features of online book shop?


Ans:
Prepared by
Namra Tariq Goraya

2: Explain the ways and means of protecting online website operations from
hackers?
Ans: 1. Choose a secure ecommerce platform. 
2. Use a secure connection for online checkout--and make sure you are PCI compliant. 
3. Don't store sensitive data. 
4. Employ an address and card verification system. 
5. Require strong passwords. 
6. Set up system alerts for suspicious activity.
7. Layer your security.
8. Provide security training to employees.
9. Use tracking numbers for all orders.
10. Monitor your site regularly--and make sure whoever is hosting it is, too. 11. Perform
regular PCI scans. 

12. Patch your systems.

13. Make sure you have a DDoS protection and mitigation service. 

3:Write a note on different type of payment method?


Ans: Payment method
The customer should then be able to select their payment method, from the methods we
have installed and configured within our framework. Generally, such methods could
include:
An offline payment method, such as a check in the post, payment on delivery, or
payment through a telephone hotline for processing orders
An off-site online payment method, such as standard PayPal payments, where the
customer is redirected to another website to make the payment, before being returned
to the store
An on-site online payment method, such as PayPal payments pro, where card details
are taken securely on the site, and then passed to a payment processing API that
processes the card details

Offline payment method


The offline payment method allows customers without credit or debit cards, or those
who have them but don't wish to use them, to order online.
Advantages :
Enables more people to make a purchase

No transaction costs (aside from any costs


incurred from our business bank)

Disadvantages :
Payment isn't instant
Prepared by
Namra Tariq Goraya

If using a check, we need to wait


for it to clear before dispatching

If using payment on delivery, we


need to dispatch before receiving
payment, and it may have been a
fraudulent order.

Off-site payment method


The off-site payment method is the simplest way to allow online payments.
Advantages :
Low barrier for entry

Sometimes, depending on the exact payment


gateway, we can facilitate recurring billing

Disadvantages:
Takes the customer off-site

Some off-site payment gateways


have stigma associated with them

On-site payment method


The on-site payment method is the most professional way to allow online payments.
Advantages :
Keeps the customer on- site

Generally, recurring billing can be


done with this method

Disadvantages:
If we store the payment details,
there are a number of security
considerations, and PCI-DSS
audit may be required

Requires an SSL certificate to be


installed on the server, which in
turn requires some additional
development, and a static IP
address for the website.

MSCIT 2016:
Prepared by
Namra Tariq Goraya

1:Write a detailed note on connection class. What is its importance in Ecommerce?


Ans: Connection Class

The Connection class contains methods that control the connection to a database.

The Connection class defines the following methods.

Method Returns Description

close():Object Object Releases the database and


JDBC resources for
a Connection object.

createStatement():Object Object Creates


a Statement object for
sending SQL statements to
the database.

prepareCall(string):PreparedStatement PreparedStatem Creates


ent a CallableStatemento
bject for calling database
stored procedures.

prepareStatement(string):PreparedStat PreparedStatem Creates


ement ent a PreparedStatemento
bject for sending
parameterized SQL
statements to the database.

It's tough to run a Website these days without a database.

In the old, old days of the Web, sites were just a static index.html page that had text and
copy, and perhaps had a few image source reference links to display images.  If you were
"fancy" maybe you'd reference a CSS stylesheet.

Fast forward to today: all modern eCommerce systems have products, customers and
orders saved in the database. 

When you want to load the home page of a site, it uses many, many database calls to
grab the content, build the navigation, etc. 

2:Write a comprehensive note on juniper theatricals?


Prepared by
Namra Tariq Goraya

Ans: Juniper Theatricals


Juniper Theatricals is a fictional Brick 'N Mortar novelty and theatrical supplies store.
They have some customers who place orders over the telephone, or over fax, and have a
loyal local base of customers too. When building our framework, we are going to use it
as a web presence for this fictional store. Some specific requirements of the store
include, in addition to previously discussed features:
Customizable products: Apparel.
Custom products: User-defined images and text on apparel, perhaps the
ability to list these for sale as well.
Virtual purchases: Electronic tickets to events.
Because the store has no web presence, the framework needs to work for their entire
website, integrating e-commerce functionality where appropriate.

Juniper Theatricals want to have a lot of products on their online store, and as a result
they fear that some products may get lost within the website, or not be as obvious to
their customers. To help prevent this problem, we will integrate product searching to
make products easy to find, and we will add filters to product lists
allowing customers to see products that match what they are looking for (for example,
ones within their price range). As some products could still be lost, they want to be able
to recommend related products to customers when they view particular products. If a
customer wants a product, and it happens to be out of stock, then they want to prevent
the customer from purchasing it elsewhere; so we will look at stock notifications too.

The importance of user experience


Our customers' experience on the stores powered by our framework is very important. A good
user experience will leave them feeling wanted and valued, whereas a poor user experience will
leave them feeling unwanted, unvalued, and may leave a bad taste in their mouths.
 Search

The ability for customers to be able to search, find, and filter products is vital, as if they cannot
find what they are looking for they will be frustrated by our site and go somewhere where they
can find what they are looking for much more easily.
There are two methods that can make it much easier for customers to find what they are
looking for:
Keyword search: This method allows customers to search the product catalog based on a series
of keywords.
Filtering: This method allows customers to filter down lists of products based on attributes,
refining larger lists of products into ones that better match their requirements.
 Finding products

The simplest way for us to implement a search feature is to search the product name and
product description fields. To make the results more relevant, we can place different priorities
on where matches were found.
We need the following thing in our framework:
Prepared by
Namra Tariq Goraya

Search box: We need a search box for our customers to type in words or phrases.
Search feature in the controller: We need to add some code to search the products database
for matching products.
Search results: Finally, we need to display the matching products to the customer.
 Providing wish lists
Wish lists allow customers to maintain a list of products that they would like to purchase at
some point, or that they would like others to purchase for them as a gift.
o Creating the structure

To effectively maintain wish lists for customers, we need to keep a record of:
The product the customer desires
The quantity of the product
If they are a logged-in customer, their user ID
If they are not a logged-in customer, some way to identify their wish-list products for the
duration of their visit to the site
The date they added the products to their wish list
The priority of the product in their wish lists; that is, if they really want the product, or if it is
something they wouldn't mind having
 Recommendations

Sometimes, we may find that certain products go hand in hand, or that customers interested in
certain products also find another group of products interesting or relevant. If we can suggest
some relevant products to our customers, we increase the chances of them making a new
purchase or adding something else to their shopping basket.
There are two methods of recommendation that we should look into:
 Displaying related products on a products page
 E-mailing customers who have made certain purchases to inform them of some other
products they may be interested in
o Related products

The simplest way to inform customers of related products from within the product view is to
maintain a relationship of related products within the database and within the products model,
so we could cache the result of a subset of these related products.
o E-mail recommendations
Search customers with previous purchases that match a subset of the product catalog
Select products that are related to the subset we defined earlier and we think those
customers would be interested in.
Generate an e-mail based on those products, a set template, and other content we may
wish to supply.
Send the e-mail to all of the customers found in step 1.
Stock Checking and alerts
Prepared by
Namra Tariq Goraya

If we have a product that is out of stock, we need to make it possible for our customers to sign
up to be alerted when they are back in stock. If we don't do this, then they will be left with the
option of either going elsewhere, or regularly returning to our store to check on the stock levels
for that particular product.
Detecting stock levels

With customizable products, stock levels won't be completely accurate. Some products may not
require stock levels, such as gift vouchers and other non-tangible products. To account for this,
we could either add a new field to our database to indicate to the framework that a products
stock level isn't required for that particular product, or we could use an extreme or impossible
value for the stock level, for example -1 to indicate this.
Customer’s Feed Back

Customer feedback comes into following way.


Product ratings

Product ratings are quite simple to add to our framework: we simply need to record a series of
ratings between one and five, and display the average of these on the product view. We can
enhance the view by making the rating system a clickable image, where the customer can click
on the number of stars they wish to give the product and their rating is saved.
Saving a rating
When a rating is made, we need to check to see if the current user has already rated that
content element; if they have, then we must update that rating. For users who are not logged
in, we should use their session name and IP address to lookup a potential rating from the past
30 days; if a rating is found, that should be updated.
Processing reviews/comments

With a database in place for our product reviews (or page comments), we need to provide a
form for our customers to enter their review, and then process this submission and save it in
the database.

3: Give suggestion to improve security of ecommerce site?

Ans: 1. Make the Switch to HTTPS

HTTPS is becoming the standard in online security, and sites that are still using the old
HTTP protocol could end up seeing negative consequences.

2. Pick the Right eCommerce Platform

The vast majority of eCommerce shops are run on a platform such as Magento and
Shopify, and security is a big reason for this. The top factors that merchants consider
when picking an eCommerce platform include convenience, a robust functionality, and
the fact that these platforms are much more secure.
Prepared by
Namra Tariq Goraya

3. Arm Yourself with Security Plug-Ins (and Keep Them Updated!)

Plug-ins are a gift to eCommerce merchants everywhere who are running their sites on
platforms that allow for them.

4. Keep Your Admin Panel Air-Tight

There are multiple angles hackers can use to get to your site, but perhaps the least
difficult is by accessing your Admin Panel. All it takes is one weak password for hackers
to start playing around your admin panel and find the information that they’re looking for
—and even lock you out of your own site.
This tip is so easy to act on. You could do it by the time you finish reading these next
few lines.
 Change your Admin Username

 Make sure your password is secure

 Change your Admin Path

5. Help Your Customers Protect Themselves

6. Always Back Up Your Data

7. Don’t Store Credit Card Numbers: A single credit card hack could completely
diminish the confidence your customers have in shopping with you.
Additionally, if your systems are compromised, you could be exposed to several heavy
fines that could very well force you into debt and close your shop completely.
You can avoid this by:

1. NEVER storing credit card numbers.


2. Utilizing a payment gateway provider that keeps payments off your site. Services
such as PayPal make it easy to get started with a tight budget.

Shoot for Payment Card Industry Data Security Standard accreditation (PCI DSS). In


order to get this accreditation, your site must be compliant by completing an audit of
your cardholder data environment to the set standard. A few of these standards include:

 Build and maintain a secure IT network.


 Protect cardholder data.
 Maintain a vulnerability management program.
 Implement strong access control measures.
 Regularly monitor and test networks.
Prepared by
Namra Tariq Goraya

 Maintain an information security policy.

8. Proactively Monitor Your Site

9. Use Multi-Layered Security

 Start with a firewall.

 Enhance your Content Delivery Network (CDN).


10. Don’t Neglect Your Personal Security.

4:Write a detail note on checkout process steps involved in it?

Ans: The checkout process

The checkout process is the process that a customer must go through when checking
out the items in the cart. This is what the user sees at the frontend. You can change
how the process looks like by configuring the Checkout widget widget and its widget
template.

The following flowchart describes the checkout process from your customer’s
perspective:

NOTE: Customers can go back to previous steps, if required.

When a customer wants to check out the items in the shopping cart, the following
process must be completed:

1. The checkout process starts when the customer clicks Checkout button in


the Shopping Cart or the Shopping Cart Summary, or the Buy Now button.
2. If you do not allow anonymous shopping, a user who is not logged in will be taken
to the specified login page.
.
3. The Shipping address fields appear.
If the user is a returning customer the shipping address will appear prefilled with
Prepared by
Namra Tariq Goraya

the information that was last specified by the user.

NOTE: The country selected by default is the country that you configure in
the Administration: Store settings.

4. If the billing address differs from the shipping one, the user must deselect
the Billing address is the same as the shipping address checkbox.
The Billing address fields appear.
5. Clicking Continue takes the user to the next step of choosing a shipping method.
All  Shipping methods that you have defined for the customer’s location appear in a
radio button group.

The widget also displays the Order summary.


Displays the current order, the  Taxes and tax classes and the  Discounts and
Coupons that apply to the subtotal.

6. Clicking Continue takes the user to the next step of choosing how to pay for the
items.
All  Payments methods that you have defined appear in a radio button group.<

If the user chooses to pay with a credit card, the following fields must be
completed:

 The card type


 Card number
The system automatically validated the card number
 The Cardholder name
 The Expiration date
 The Security code
 NOTE: Payment options are not displayed when the order’s total is zero. In this
case, the Payment step only notifies the user that the order is Free.
7. If a coupon code for a discount has not been applied through the shopping
cart, Have a coupon code? field appears after the payment details. The user can use
the field to apply a  Discounts and Coupons to the subtotal.
8. Clicking Continue takes the user to the next step of previewing the order details, the
shipping and payment methods.
9. The user must confirm by clicking Place this order button.
The order is confirmed, the confirmation page is displayed to the user, and an email
is send by the store to the customer.

5: Describe the detail singleton design pattern and write down its pros and cons?
Prepared by
Namra Tariq Goraya

Ans:

Singleton Design Pattern
The Singleton pattern encapsulates a shared resource within a
single unique class instance. This instance arbitrates access to the
resource and storage-related state information. A class method
provides the reference to this instance, so there is no need to pass
the reference around. Any object that has access to the Singleton’s
class header can use the Singleton.

This design pattern defines the structure of a class that can have
only one instance. A Singleton encapsulates a unique
resource and makes it readily available throughout the
application. The resource might be hardware, a network service,
a persistent store, or anything else that can be modeled as a
unique object or service.
Prepared by
Namra Tariq Goraya

Implementation
Implementation of the Singleton pattern often typically creates a
single object using the factory method, and this instance/object is
called a shared instance in most cases. Since the access to the
instance is passed on through a class method, the need to create
an object is eliminated. Let’s look at the Singleton implementation
in code.

Singleton design pattern — Pros and cons


Singletons are not the answer to every problem. Like any tool,
they can be short in supply or can be overused.

Some developers are critical of Singletons for various reasons. We


will examine this critique and discuss ways to address them
briefly. The criticisms, for the most part, fall into two categories:

 Singletons hinder unit testing: A Singleton might cause


issues for writing testable code if the object and the methods
associated with it are so tightly coupled that it becomes
impossible to test without writing a fully-functional class
dedicated to the Singleton.
 Singletons create hidden dependencies: As the Singleton
is readily available throughout the code base, it can be
overused. Moreover, since its reference is not completely
transparent while passing to different methods, it becomes
difficult to track.
6: Why do people subscribe on ecommerce site? what is the role in
promoting ecommerce site?

Ans:

#1: Low Financial Cost


Prepared by
Namra Tariq Goraya

#2: 24/7 Potential Income

 #3: Sell Internationally

 #3: Sell Internationally

 #5: Personalized Online Experience

#6: Affordable employees

 #7: Easier to Encourage Impulse Buy

#8: Easy to Retarget or Remarket to Customer

 #9: Customers Get a Less Invasive Experience

#10: Gain Access to Customer Data Easily

#11: Able to Process a High Number of Orders

#12: Can Scale Business Quickly.


Prepared by
Namra Tariq Goraya

You might also like