You are on page 1of 3

(Approved by AICTE and Affiliated to Anna University, Chennai)

27, Thayanur, Trichy – 620009

DEPARTMENT OF MBA
INTERNAL ASSESSMENT - II
BA4030– e-BUSINESS MANAGEMENT
ANSWER KEY

PART A

1. Web 2.0:
Web 2.0 are websites and applications that make use of user-generated
content for end users. Web 2.0 is characterized by greater user interactivity
and collaboration, more pervasive network connectivity and enhanced
communication channels.

2. Difference between e-business and ecommerce.

3. Difference between Intranet & Internet.

The Internet is a public network that is not owned by any particular


organization or group. Intranets are private networks that are owned and
managed by the organization that uses them

4. Electronic Publishing Technology:


Electronic publishing has been broadly defined as non-print material that
is produced digitally. Electronic publishing is an encompassing term for a
variety of digitally produced materials (Jones & Cook, 2000) such as
(Approved by AICTE and Affiliated to Anna University, Chennai)
27, Thayanur, Trichy – 620009
bulletin boards, newsgroups, mailing lists, CD-ROM based media, and
websites.

5. E-tailing:
E-retail, also known as e-tail, internet retail or online retail, stands for
electronic retail. In e-retail, a business or individual sells retail products
and services through online stores. An e-retail company can be a purely
digital presence, meaning there is no physical store for a customer to enter.

6. Virtual Communities:
A Virtual Community is a network which work within a social network of
individual by any specific media and which have no limit about
geographical area as well as political restriction.

7. E-cash is helpful for business:


With digital cash, merchants can receive payment almost immediately
after a transaction is completed, which can help to speed up the fulfillment
of orders and reduce the risk of fraud or chargebacks.

8. Cryptography:
A method of storing and transmitting data in a particular form so that only
those for whom it is intended can read and process it. Cryptography not
only protects data from theft or alteration, but can also be used for user
authentication.

9. Advantages of consumer protection act:


The Consumer Protection Act offers several advantages to consumers,
including protection from dangerous goods and services that could
endanger their safety or property. Additionally, the act ensures that
consumers receive prompt, simple, and inexpensive relief when necessary.

10. Encryption Policy:


Encryption is a technique for hiding data. The encrypted data can be read
only by those users for whom it is intended. Nowadays various encryption
techniques are available. One of the available techniques commonly used
for encryption is Public Key.

PART B

11 a). How to design, develop and manage e-business?


(Approved by AICTE and Affiliated to Anna University, Chennai)
27, Thayanur, Trichy – 620009

You might also like