Professional Documents
Culture Documents
PART-A
1. Define E-Commerce.
E-commerce (electronic commerce or EC) is buying and selling of goods and services,
or the transmitting of funds or data, over an electronic network, primarily the internet. These
business transactions occur either as business-to-business, business-to-consumer, consumer-to-
consumer or consumer-to-business.
Here are a few examples of e-commerce:
PART C
1. Draw and explain the electronic commerce framework in detail.
Definition of e commerce framework:
• A framework can be defined as a structure for supporting or attaching something else,
particularly a support that is used as the foundation for something being created.
• Hence, an e-commerce framework comprises the set of infrastructure required for
carrying out the e-commerce business. This set of infrastructure typically includes the
network requirements and the different software applications that are for e-commerce.
Technical Standard:
Technical Standard relate to seamless integration across the transportation network.
They also provide standards for accessing information on any type of device like laser disc, PCs,
Portable hand held devices.
E-Marketing:
E-Marketing (Electronic Marketing) are also known as Internet Marketing, Web
Marketing, Digital Marketing, or Online Marketing. E-marketing is the process of marketing a
product or service using the Internet. It not only includes marketing on the Internet, but also
includes marketing done via e-mail and wireless media. It uses a range of technologies to help
connect businesses to their customers.
E-Advertising:
It is also known as online advertising. It is a form of promotion that uses Internet and
World Wide Web to deliver marketing messages to attract customers.
Online advertisements are purchased through one of the following common vehicles:
➢ Cost per Thousand (CPM): Advertisers pay when their messages are exposed to specific
audiences.
➢ Cost per Click (CPC): Advertisers pay every time a user clicks on their ads.
➢ Cost per Action (CPA): Advertisers only pay when a specific action (generally a
purchase) is performed.
E-Banking:
Online banking offers several main benefits to depositors. It provides a real-time view of
finances and eliminates the need for numerous visits to a bank teller. Banks that offer online
banking are sometimes called "brick-to-click." Many of these banks still provide branch services
but support online options.
Mobile commerce:
E shopping:
Online trading:
• An online trading community provides participants with a structured method for trading,
bantering (exchanging goods with goods) or selling goods and services.
• These communities often have forums and chat rooms, designed to facilitate
communication between the members.
• A formal trading community consists of a website or network of websites that facilitates
and tracks the made transactions.
Entertainment:
• The conventional media that have been used for entertainment are-
o Books/magazines
o Radio
o Television
o Video games
• The internet as an entertainment media is not an elastic by itself but rather a unique
interactions of all the above media.
• Computer based systems have been used as an entertainment medium in the form of
video games, CD, ROMs, etc.
Website following B2B business model sells its product to an intermediate buyer who
then sells the product to the final customer. As an example, a wholesaler places an order from
a company's website and after receiving the consignment, sells the end product to final
customer who comes to buy the product at wholesaler's retail outlet.
Business - to - Consumer(B2C)
Website following B2C business model sells its product directly to a customer. A
customer can view products shown on the website of business organization. The customer can
choose a product and order the same. Website will send a notification to the business
organization via email and organization will dispatch the product/goods to the customer.
Consumer - to - Consumer (C2C)
Website following C2C business model helps consumer to sell their assets like
residential property, cars, motorcycles etc. or rent a room by publishing their information on
the website. Website may or may not charge the consumer for its services. Another consumer
may opt to buy the product of the first customer by viewing the post/advertisement on the
website.
B2G model is a variant of B2B model. Such websites are used by government to trade
and exchange information with various business organizations. Such websites are accredited
by the government and provide a medium to businesses to submit application forms to the
government.
Government uses G2C model website to approach citizen in general. Such websites support
auctions of vehicles, machinery or any other material. Such website also provides services like
registration for birth, marriage or death certificates.
UNIT-2
PART-A
A network interface card (NIC) is a circuit board or card that is installed in a computer
so that it can be connected to a network.
A network interface card provides the computer with a dedicated, full-time connection
to a network. Personal computers and workstations on a local area network (LAN) typically contain a
network interface card specifically designed for the LAN transmission technology. NICs may be used
for both wired and wireless connections.
Telecom
based access
Cable TV
Consumer based access
Telecom Networks
access
Satellite Networks
equipment
Internet
Wireless
based access
Internet,
Intranet,
Extranet based
access
• Networking Hardware:
o Routers
o Switches
o LAN cards
o Wireless routers
o Cables
• Networking Software:
o Network operations and management
o Operating systems
o Firewall
o Network security applications
• Network Services:
o T-1 Line
o DSL
o Satellite
o Wireless protocols
o IP addressing
6. List out the public policy issues shaping the I-way.
1. LAN
➢ A Local Area Network (LAN) is a network that is restricted to smaller physical
areas e.g. a local office, school, or house. Approximately all current LANs
whether wired or wireless are based on Ethernet.
2. MAN
➢ A Metropolitan Area Network (MAN) is a network that connects two or more
computers, communicating devices or networks in a single network that has
geographic area larger than that covered by even a large ‘Local Area Network’
but smaller than the region covered by a ‘Wide Area Network’.
3. WAN
➢ Wide Area Network is a computer network that covers relatively larger
geographical area such as a state, province or country. It provides a solution to
companies or organizations operating from distant geographical locations who
want to communicate with each other for sharing and managing central data or
for general communication.
PART B
PART C
• The global information distribution networks consist of the infrastructure crises crossing
the countries and continents. They include the long distance telephone lines, satellite
networks, and the internet.
Long Distance Network
Long distance telephone connectivity is provided through cable (co-axial or
fiber) by the interexchange carriers. Long distance cellular networks are using the wireless
technologies to connect the consumers worldwide.
Satellite Networks
Satellite networks play a vital role in the communication industry. They have
advantages over the terrestrial networks in that:
➢ They are accessible from any point on the globe
➢ They can provide broad band digital services to many points without the cost
of acquiring wire/cable installation
➢ They can add receiving and sending sites without significant additional costs.
• Communications satellites form a crucial part of the global communication
infrastructures, providing a wide range of services including broadcast video and
overseas telephone links.
Local-On-Ramps
This comprises much equipment to run internet.
1. Set-top boxes
➢ These are known as receiver, converters and decoders. Set-top boxes generally are
digital devices that communicate using computer language.
➢ Digital Media Adapters, Digital Media Receivers, Windows Media Extender and
most video games consoles are also examples of set-top boxes.
Types of Set-top Boxes
❖ Broadcast TV set-top boxes
❖ A more primitive set-top box with no back channel
❖ Enhanced TV set-top boxes
❖ Advanced set-top boxes
❖ Hybrid digital cable box
2. Computer-Based Telephony
Computer telephony (CT) adds a new dimension to business communications whare the
telephone intelligent devices and internet with other devices and applications on Local Area
Network (LAN), Wide Area Network (WAN).
3. Hubs, Wiring, Clusters, Routers and Digital Switches
A network hub or concentrator is a device for connecting multiple twisted pair or fiber
optics. Hubs work at the physical layer of the OSI.
Network hubs are also responsible for operating LAN computers through other LAN
computers. Switches have the same function as that of hub.
Routers are Internet-working devices that intelligently connect the LAN and WAN of
various providers. A router is located at the gateway where it directs the flow and determines
the route of packets as they travel from one to another network.
4. Wired Internet Connection
Wired Internet Connection or fiber optic communication is a method of transmitting
information from one place to another by sending light through an optic fiber.The process of
communicating using fiber-optics involves the following basic steps:
❖ Creating the optical signal using a transmitter relying the signal along the fiber.
❖ Ensuring that the signal does not become too distorted or weak.
❖ Receiving the optical signal and converting it into an electrical signal.
5. Network Interface Card (NIC)
A network interface card (NIC) is a circuit board or card that is installed in a computer
so that it can be connected to a network.
A network interface card provides the computer with a dedicated, full-time connection
to a network. Personal computers and workstations on a local area network (LAN) typically
contain a network interface card specifically designed for the LAN transmission technology.
NICs may be used for both wired and wireless connections.
Global Information Distribution Networks providing the infrastructure for connecting across
the countries and continents. They included such networks as the long distance telephone lines,
the satellite networks and the internet.
The global information distribution networks consist of the infrastructure crises crossing the
countries and continents. They include the long distance telephone lines, satellite networks, and
the internet.
Long Distance Network
Long distance telephone connectivity is provided through cable (co-axial or
fiber) by the interexchange carriers. Long distance cellular networks are using the wireless
technologies to connect the consumers worldwide.
Satellite Networks
Satellite networks play a vital role in the communication industry. They have
advantages over the terrestrial networks in that:
➢ They are accessible from any point on the globe
➢ They can provide broad band digital services to many points without the cost
of acquiring wire/cable installation
3. Gateways
➢ It is a node in a network that serves as an entrance to another net web page. In
homes, the gateway is the ISP that connects the user and firewall.
➢ The gateway is also associated with both a router which use headers and
forwarding tables to determine where packets are sent and a switch which
provides the actual path for the packet in an out of the gateway.
UNIT-3
PART-A
1. Define Network Security and Draw the Model for Network Security.
A network security system typically relies on layers of protection and consists of
multiple components including networking monitoring and security software in addition to
hardware and appliances. All components work together to increase the overall security of the
computer network.
Digital signatures
PGP supports message authentication and integrity checking. The latter is used to detect
whether a message has been altered since it was completed (the message integrity property) and
the former to determine whether it was actually sent by the person or entity claimed to be the
sender (a digital signature). Because the content is encrypted, any changes in the message will
result in failure of the decryption with the appropriate key. The sender uses PGP to create a
digital signature for the message with either the RSA or DSA algorithms. To do so, PGP
computes a hash (also called a message digest) from the plaintext and then creates the digital
signature from that hash using the sender's private key.
PART C
A system can act as Server and Client simultaneously. That is, one process is acting as
Server and another is acting as a client. This may also happen that both client and server
processes reside on the same machine.
The OSI model takes the task of internetworking and divides that up into what is referred to as
a vertical stack that consists of the following 7 layers:
1. Physical Layer: This layer conveys the bit stream through the network at the electrical,
optical or radio level. It provides the hardware means of sending and receiving data on a carrier
network.
2. Data Link Layer: This layer sets up links across the physical network, putting packets
into network frames. This layer has two sub-layers, the Logical Link Control Layer and the Media
Access Control Layer. Ethernet is the main data link layer in use.
3. Network Layer: This layer handles the addressing and routing of the data (sending it in
the right direction to the right destination on outgoing transmissions and receiving incoming
transmissions at the packet level). IP is the network layer for the Internet.
4. Transport Layer: This layer manages packetization of data, then the delivery of the
packets, including checking for errors in the data once it arrives. On the Internet, TCP and UDP
provide these services for most applications as well.
5. Session Layer: This layer sets up, coordinates and terminates conversations. Services
include authentication and reconnection after an interruption. On the Internet, Transmission
Control Protocol (TCP) and User Datagram Protocol (UDP) provide these services for most
applications.
6. Presentation Layer: This layer is usually part of an operating system (OS) and converts
incoming and outgoing data from one presentation format to another (for example, from clear
text to encrypted text at one end and back to clear text at the other).
7. Application Layer: This is the layer at which communication partners are identified,
network capacity is assessed and that creates a thing to send or opens the thing received.
Network-Level Firewalls
It can be used as packet filter. These firewalls examine only the headers of each packet
of information passing to or from the Internet. The firewall accepts or rejects packets based on
the packet’s sender, receiver, and port. For example, the firewall might allow e-mail and Web
packets to and from any computer on the intranet, but allow telnet (remote login) packets to and
from only selected computers.
Packet filter firewall maintains a filtering table that decides which packets are to be
forwarded or discarded. A packet filter firewall filters at the network or transport layer.
Application-Level Firewalls
These firewalls handle packets for each Internet service separately, usually by running a
program called a proxy server, which accepts e-mail, Web, chat, newsgroup, and other packets
from computers on the intranet, strips off the information that identifies the source of the packet,
and passes it along to the Internet.
When the replies return, the proxy server passes the replies back to the computer that
sent the original message. A proxy server can also log all the packets that pass by, so that you
have a record of who has access to your intranet from the Internet, and vice versa.
➢ Digital signatures allow us to verify the author, date and time of signatures, authenticate
the message contents. It also includes authentication function for additional capabilities.
Digital signatures are easily transportable, cannot be imitated by someone else, and can
be automatically time-stamped. The ability to ensure that the original signed message
arrived means that the sender cannot easily repudiate it later.
➢ A digital signature should not only be tied to the signing user, but also to the
message.
➢ When the recipient receives the message they run the message through the same hash
algorithm and generate the message digest number. They then decrypt the signature
using the senders public key and providing the two numbers match they know the
message is from who it says its from and that is has not been modified.
PART-B
Business Business
Applications Applications
Internet format Internet format
conversion conversion
EDI translator EDI translator
EDI envelope for EDI envelope for
documents documents
messaging messaging
Modem Modem
Basic services:
It is related to personal finance i.e. checking savings account statement around
the clock, banking with ATM’s (Automated Teller Machines). Bill payment, balancing
cheque book status of payment or stock payment requested etc.
Intermediate services:
It includes a broader array of financial management services which include non-
banking activities. Also bank activities such as household banking, tax return
preparations etc.
Advanced services:
It includes stock and mutual funds brokerage or trading services such as currency
trading and credit card or debit card management.
Home shopping:
One of the examples often sighted about e-commerce is home shopping which is widely
used and had generated substantial revenue for many companies racing to develop on-line malls.
The malls will enable a customer to enter an online store look at products, try on computerized
clothes, see a reflection in a digital mirror and purchase with overnight delivery against credit
card billing. The exact operating method of these services has yet to be determined, but the
retailers are well aware of the potential opened up by the ability to transmit huge amounts of
digital information into home and to provide interactive control to the shopper.
1. Television based shopping: TV shopping has evolved over years to provide a wide variety
of goods ranging from clothing, small electronic house ware, jewellery and computing.
2. Catalog based shopping: The online catalog business consists of brochures, CD ROM
catalogs and online interactive catalogs. Most online catalogs are some form of electronic
brochure. Electronic brochures are multimedia replacement for direct mail, paper & brochures
used in the business to business marketing. Basically electronic catalog contains highly
interactive programs using still images, graphics, animation, sound, text & data. One of the
disadvantages of this catalog is its prohibitive cost.
3. Home Entertainment: It is another application area of E-commerce, the most important
services provided under. These are movies on demand, interactive games. The online gaming
industry in turn parallels the TV industry where the customer is primarily interested in good
quality programming & is not faithful to any one network. In the entire home entertainment area,
the key element is the notion of customer control under programming entertainment on demand
as expected to give each viewer total control over what, when and where to watch. In addition
to game technology we also witness the emerging services of entertainment support function
such as on screen catalogues, TV guide that inform users what is on TV.
Middleware services
The enormous growth of networks, client server technology and all other forms of communicating
between/among unlike platforms is the reason for the invention of middleware services. The middleware
services are used to integrate the diversified software programs and make them talk to one another.
Network Infrastructure
We know that the effective and efficient linkage between the customer and the supplier is a
precondition for e-commerce. For this a network infrastructure is required.
• WWW or World Wide Web is used for people around the world and it would easily link to other
pieces of information, so that only the most important data would quickly found by a user.
• WWW is a global web in which millions of users are communicating with each other with the
help of computers.
• It is a wide-area hypermedia Information retrieval initiative aiming to give universal access to a
large universe of documents. It is an Internet based computer network that allows users on one
computer to access information stored on another through the world wide network.
UNIT-5
PART A -4 MARKS
1. Define supply chain management.
Supply chain consists of all parties involved, directly or indirectly in fulfilling a customer
request.
Supply Chain Management spans all movement and storage of raw materials, work-in-process
inventory, and finished goods from point-of-origin to point-of-consumption.
Supply Chain Management can also refer to supply chain management software which is tools
or modules used in executing supply chain transactions, managing supplier relationships and
controlling associated business processes.
2. Define Global Marketing.
Definition:
The Oxford University Press defines global marketing as “marketing” on a worldwide scale
reconciling or taking commercial advantage of global operational differences, similarities and
opportunities in order to meet global objectives.”
Global marketing:
When a company becomes a global marketer, it views the world as one market and creates
products that will only require weeks to fit into any regional marketplace. Marketing decisions
are made by consulting with marketers in all the countries that will be affected. The goal is to
sell the same thing the same way everywhere. The Four elements of global marketing of
marketing:
Four Elements of Global marketing
1. Product
2. Prize
3. Placement
4. Promotion
3. What is Horizontal Organization?
A horizontal market is a market which meets a given need of a wide variety of industries,
rather than a specific one.
Examples:
•
In technology, horizontal markets consist of customers that share a common need that
exists in many or all industries.
• For example, customers that need to purchase computer security services or software
exist in such varied industries as finance, healthcare, government, etc.
• Horizontal marketing participants often attempt to meet enough of the different needs
of vertical markets to gain a presence in the vertical market.
1. Document digital library: The term document is used to donate all non data records i.e. books,
reports, e-files, videos and audios.
2. Data warehouses: It is a central repository for combining and storing vast amount of data from
different sources. Sources are mainframe database, text reports etc.
PART-B
Ad hoc documents: Letters, finance reports, manuals are called ad hoc documents, which are
prepared by managers &professionals.
Process-specific documents: invoices and purchase orders which are created, constructed and
distributed by support personnel. These are form based.
Knowledge-oriented documents: these are technical documents, catalogs of product
information, and design documents.
➢ TIFF (tag image file format): format for interchange of bit-mapped images.
➢ ITU-TSS (international telecommunication union-telecommunication standardization
sector) Group IV T.6 facsimile: this standard is used for compression and exchange of
bit-mapped files.
Structured Documents
➢ A structured document provides clear description of document content.
➢ Structured documents apply data-base structuring capabilities to individual documents
and document collections.
Active Documents
Active document represents what is known as document oriented computing.
PART-C
1. Compare and contrast push based supply chain vs. pull based supply
Chain.
The major differences between push and pull view in supply chain are as follows:
• In the push system, the implementation begins in anticipation of customer order whereas
in the pull system, the implementation starts as a result of customer’s order.
• In the push system, there is an uncertainty in demand whereas in pull system, the demand
remains certain.
• The push system is a speculative process whereas the pull system is a reactive process.
• The level of complexity is high in the push system whereas it is low in the pull system.
• The push based system concentrates on resources allocation whereas the pull system
stresses on responsiveness.
• The push system has a long lead time whereas the pull system has a short lead time.
• The push system assists in supply chain planning whereas the pull system facilitates in
order completion.
To conclude, the push based supply chain integrations works with an objective of
minimizing the cost whereas the pull based supply chain integration works with an objective to
maximize the services it provides.
Push & Pull System
Mostly we find a supply chain as merger of both push and pull systems, where the
medium between the stages of the push-based and the pull-based systems is referred as the push–
pull boundary.
The terms push and pull were framed in logistics and supply chain management, but
these terms are broadly used in the field of marketing as well as in the hotel distribution business.
To present an example, Wal-Mart implements the push vs. pull strategy. A push and pull system
in business represents the shipment of a product or information between two subjects. Generally,
the consumers use pull system in the markets for the goods or information they demand for their
requirements whereas the merchants or suppliers use the push system towards the consumers.
In supply chains, all the levels or stages function actively for the push and the pull system. The
production in push system depends on the demand predicted and production in pull system
depends on absolute or consumed demand.
The medium between these two levels is referred as the push–pull boundary or decoupling point.
Generally, this strategy is recommended for products where uncertainty in demand is high.
Further, economies of scale play a crucial role in minimizing production and/or delivery costs.
For example, the furniture industries use the push and pull strategy. Here the production unit
uses the pull-based strategy because it is impossible to make production decisions on the basis
on long term prediction. Meanwhile, the distribution unit needs to enjoy the benefits of economy
of scale so that the shipment cost can be reduced; thus it uses a push-based strategy.
Document Imaging
➢ Document imaging emulates microfiche and microfilm.
➢ An imaging system passes appear document through a scanner that renders it digital and
then stores the digital data as a bit-mapped image of document.
➢ The problem with the imaging approach is that the output contains only images not text.
The following imaging standards are prominently used:
➢ TIFF (tag image file format): format for interchange of bit-mapped images.
➢ ITU-TSS (international telecommunication union-telecommunication standardization
sector) Group IV T.6 facsimile: this standard is used for compression and exchange of bit-
mapped files.
Structured Documents
➢ A structured document provides clear description of document content.
➢ Structured documents apply data-base structuring capabilities to individual documents and
document collections.
Standard for structured documents are:
➢ SGML (Standard Generalization Mark-up Language):
➢ It is an ISO standard for interchange & multi formatting description of text document in
terms of logical structure.
Standards of Hypermedia:
➢ HyTime: it adds time based relationships like synchronization, it is extension of SGML.
➢ HTML: developed by WWW to support distributed hypermedia.
➢ MHEG(multimedia /hypermedia encoding/exporting Group):standard for presenting
objects in multimedia
Active documents
➢ Active document represents what is known as document oriented computing.
➢ Active document provide an interactive interface between documents.
➢ Active documents are especially powerful because they combine composition of
information with the distributed nature of information.
➢ Ex: spreadsheet, word-processing..etc.
Types:
1. Private commerce
2. Public commerce
In a general sense, the term Information System (IS) refers to a system of people, data records
and activities that process the data and information in an organization, and it includes the
organization's manual and automated processes.
In a narrow sense, the term information system (or computer-based information system) refers
to the specific application software that is used to store data records in a computer system and
automates some of the information-processing activities of the organization.
These forces are commanding a rethinking of the importance of the networks-computers and
communications and their role in the better utilization of corporate information in operational
and analytical decision making.
Information architecture (IA) is the art of expressing a model or concept of information used
in activities that require explicit details of complex systems.
Among these activities are library systems, content Management Systems, web development,
user interactions, data base development, programming, technical writing, enterprise
architecture, and critical system software design.