You are on page 1of 2

Reg. No.

Question Paper Code: X11192

B.E./B.Tech. DEGREE EXAMINATIONS NOV/ DEC 2020 AND APRIL / MAY 2021

Seventh/ Eighth Semester

Information Technology

IT8005 - Electronics Commerce

(Regulations 2017)
Time : 3 Hours Answer ALL Questions Max. Marks: 100

PART-A (10 x 2 = 20 Marks)

1. What are the three basic building blocks of the Internet?


2. Compare online and traditional transactions in terms of richness.
3. A website is only as valuable from a business perspective as the number of people who
visit. The first stop for most customers looking for a product or service is to start with a
search engine, and follow the listings on the page. List some basic ideas that will work
well for search engine optimization.
4. Illustrate the wide variety of application servers available in the marketplace.
5. List the two major methods that firewalls use to validate traffic.
6. Illustrate the multi-layered nature of e-commerce security.
7. What are the five main elements of a comprehensive multi-channel marketing plan?
8. Outline the diagram for a traditional demand curve and interpret the same.
9. What is a business model? How does it differ from a business plan?
10. Interpret the difficulty in categorizing e-commerce business models?

Part – B ( 5 x 13 = 65 marks)

11. a) (i) What is e-commerce? How does it differ from e-business? Where does it (6)
intersect with e-business?
(ii) Spell about the different steps involved in the development of an e-commerce
web site? (7)
OR
b) What do you understand by WWW? What is the use of hypertext links, images, (13)
tables and forms in HTML? Explain the same with syntax and examples.

1
12. a) Illustrate the five major steps involved in the systems development life cycle for an (13)
e-commerce site and explain the same in detail.
OR
b) Illustrate a simple two-tier and a more complex multi-tier e-commerce site
(13)
architecture and explain the same in detail.

13. a) (i) Summarize the six dimensions to e-commerce security from both the merchants (6)
and customer’s perspectives.
(7)
(ii) Outline the five steps involved in building an e-commerce security plan.
OR
b) Illustrate about a typical e-commerce transaction associated with a consumer using a (13)
credit card to purchase a product. Extend about the three vulnerable points that
happens in such an e-commerce transaction.

14. a) (i) Recall and spell the key elements of a mobile marketing campaign.
(6)
(ii) Why is location-based marketing so attractive to marketers? List out the points. (7)
OR
b) Spell about the unique features of e-commerce technology and their potential (13)
ethical, social and / or political implications in detail.

15. a) (i) Summarize the key components of e-commerce business models.


(6)
(ii) Infer about the key business concepts and strategies applicable to e-commerce. (7)
OR
b) Demonstrate the major B2B and B2C business models in detail.
(13)

PART C (1 X 15 = 15)

16. a) Assume an e-commerce company for which a website exists in the real-world. (15)
Based on the assumption and the information about the assumed website, identify its
customer value proposition, its revenue model, the marketspace it operates in along
with the market strategy that appears to be in detail.
OR
b) Examine the experience of shopping online versus shopping in a traditional (15)
environment. Assume that you have to purchase a digital camera for your purpose.
Shop for the same in both the ways i.e., traditional manner and shopping on the web
or via a mobile app. Compare and contrast your experiences. What were the
advantages and disadvantages of each? Which will you prefer and what is the
reason?
----------------------

You might also like