ADL 75 E Commerce V5

Contact for best and lowest cost solution or email

ADL 75 E Commerce V5

Assignment A

Answer all questions.

1. With the help of any example web-site, explain the perspectives of the buyers and sellers in a B2B E-Commerce type. Also, mention the benefits over the traditional commerce. List the disadvantages, if any.
2. What do you understand by a digital signature? Explain it’s application and verification diagrammatically.
3. What is the purpose of the domain name system (DNS)?
4. What is the most valuable function of the proxy server?
5. Explain the following tags:
a) <frame>
b) <link>
c) <style>
d) <code>
e) <div>
And Write an HTML code for the following output in the browser.


Assignment B
Answer all questions.

1. List and explain the various business processes?
2. What is one of the benefits of layering to a complex system?
3. Explain the features of a good corporate website. How does help the organization to enhance its business activities?
4. Read the case study given below and answer the questions given at the end.

Case Study
ABC Ltd is a manufacturer of mobile handsets. It has its manufacturing plant in Bangalore and its offices and retail outlets in different cities in India and abroad. The organization wants to have information systems connecting all the above facilities and also providing access to its suppliers as well as customers.
(a) Discuss various issues in developing information systems and fulfilling information needs at different levels in the organization.
(b) Explain different security threats in the context of e-commerce for the above company.


Assignment C
Marks 10
Answer all questions.
Tick mark (√) the most appropriate answer.

1. Software, music, digitized images, electronic games, pornography can be revenue sources for the B2C e-commerce —

a. Selling services
b. Doing customization
c. Selling digital products
d. Selling physical products

2. For selling physical products on the Internet, what is the key to profitability?

a. Hook
b. Cost Control
c. Brand Recognition
d. Customization

3. Which of the following is the least attractive product to sell online?

a. Downloadable music
b. Software
c. A pda
d. Electronic stock trading

4. Digital products are particularly appealing for a company’s bottom-line because of–

a. The freedom from the law of diminishing returns
b. The integration of the value chain
c. The increasing brand recognition
d. The changes they bring to the industry

5. In the e-mail address,, what is the top-level domain?

a. gsm
b. uci
c. edu
d. none of these
6. It is particularly difficult to maintain the competition advantage based on ________.

a. Quality
b. Efficiency
c. Price
d. Internal Cost Reduction
e. Brand

7. Business Plans are important when trying to find capital to start up your new business. Important elements of a business plan include–

a. Sales and marketing
b. Human resources handbook
c. Business description
d. a and c above

8. On which forms of e-commerce does Dell Computer Corporation rely in conducting its business?

a. B2E
b. B2C
c. B2B
d. None of the above
e. All of the above

9. These are all uses of plug-ins except–
I. Air fresheners
II. Speed up data transmission
III. Enhance browser capability
IV. To view different file types

a. I and II
b. III and IV
c. I
d. I and IV
10. What is the ‘last mile’ in the last mile problem? The link between your–

a. Computer and telephone
b. Home and telephone provider’s local office
c. Office and server
d. Home and internet service provider

11. Just after your customers have accepted your revolutionary new e-commerce idea, which of the following is not expected to immediately happen?

a. Competitor catch-up moves
b. Commoditization
c. First-mover expansion
d. None of the above

12. B2B & B2C IT initiatives can use the–
a. Same E-Commerce platforms
b. Not use same IT platform
c. Can not say
d. All are true

13. Which is/are types of e – commerce?

a. B2B
b. B2C
c. C2C
d. All the above

14. Where do CGI (Common Gateway Interface) application programs or scripts run?

a. On the client through a web browser
b. On the client through temporary stored files
c. On the web server
d. Where the user installs them
e. None of the above

15. What are the 3 types of web information system logic?

a. Presentation, business, information/data
b. Presentation, information/data, active server pages
c. Business, information/data, client/server
D. None

16. Which of the following items is used to protect your computer from unwanted intruders?

a. A cookie.
b. A browser.
c. A firewall.
d. A server.

17.,,,; are the examples of what?
a. Intermediary Services websites
b. Physical Communities
c. B2C websites
d. Virtual Communities

18. Which is more significant for web based advertisers?

a. Impressions
b. Page Views
c. Click Thoughts
d. Hits

19. What is the most significant part of e-commerce?

a. B2B
b. B2E
c. B2C
d. C2C

20. Much of’s initial success can be attributed to which of the following?

a. Low prices
b. Brand recognition
c. Fast web connections
d. Customer service

21. Security-and-risk services include–
a. Firewalls & policies for remote access
b. Encryption and use of passwords
c. Disaster planning and recovery
d. All of the above
e. a & b only

22. E-commerce increases competition by, erasing geographical boundaries, empowering customers and suppliers, commoditizing new products, etc. How do companies usually solve this problem?

a. By competing on price
b. By selling only through traditional channels
c. By lowering costs
d. By creating attractive websites

23. Why can’t new connection infrastructure like DSL, Cable Modem, and fiber optics solve the last mile problem?

a. Availability
b. Cost
c. Distance
d. All of the Above

24. What’s the real potential of e-commerce?

a. Making a profit
b. Generating Revenue
c. Improving efficiency
d. Buying and selling on the internet and WWW

25. Which of the following is an example of the supply chain of commerce?

a. A company turns blocks of wood into pencils.
b. A department supplies processed data to another department within a company.
c. A consumer purchases canned vegetables at the store.
d. None of the above

26. An application layer protocol, such as FTP or HTTP–

a. Is transparent to the end user.
B. Is not transparent to the end user.
C. Are not application layers protocols
D. None of these

27. Two computers can communicate using different communication protocols by using–

a. Router
b. Bridge
c. Hub
d. Switch

28. In which of the models, the application logic is partitioned among the clients and multiple specialized servers?

1. Two tier
2. Three tier
3. N tier

a. 1
b. 2
c. 2 & 3
d. 3

29. What e-commerce category is the largest in terms of revenue?

a. Business to Business (B2B)
b. Intra-Business (B2E)
c. Business to Consumer (B2C)
d. Consumer to Consumer (C2C)

30. Which of the following B2C companies is the best example of achieving its financial success through controlling its cost?

a. Yahoo
b. Amazon
c. E-Bay
d. Google
e. None of the above

31. The primary focus of most B2C applications is generating ____.

a. Revenue
b. Product
c. Service
d. Web Site

32. The differences between B2B and B2C exchanges include–
I. Size of customer set
II. Transaction volume
III. Form of payment
IV. Level of customization on products/services

a. I and II
b. I, II, and III
c. II and III
d. All of the above

33. What do you think cookies do?

a. They are threat to privacy
b. The help the user not to repeat some input info
c. They personalize user’s webpage
d. b and c
e. All of the above

34. What type of application has the potential to change a market or even create a new market?

a. Software application
b. Intelligent application
c. Killer application
d. Business application

35. Based on the study, in the supply side initiatives, which of the following clusters was the only one found to be critical enterprise-wide?

a. IT management
b. Communications
c. Data management
d. IT-architecture-and-standards
36. Why did the e-commerce boom, as evidenced by soaring stock prices of Internet businesses such as and eToys went bust in 2000?

a. Websites started by techies who lack business knowledge
b. Lack of good business model
c. Investors’ and entrepreneurs’ greed and ignorance
d. All of the above

37. A system with universally accepted standards for storing, retrieving, formatting, and displaying information in a networked environment best defines–
a. A web site.
B. A web location.
C. The World Wide Web.
D. An intranet.
38. Which of the following is a function of a proxy server?
a. Maintaining a log of transactions
b. Caching pages to reduce page load times
c. Performing virus checks
d. Forwarding transactions from a user to the appropriate server
e. All of the above

39. Which of the following statements about E-Commerce and E-Business is true?

a. E-Commerce involves buying and selling over the internet while E-Business does not.
b. E-Commerce is B2C (business to consumer) while E-Business is B2B (business to business).
c. E-Business is a broader term that encompasses E-Commerce (buying and selling) as well as doing other forms of business over the internet.
d. None of the above.

40. B2B involves small, focused customers

a. customization of products and services
b. All of above Set with large transaction volume per customer
c. Periodic consolidated payments
d. Significant



Contact for best and lowest cost solution or email


Comments are closed.