1.
Answer the followings
a. Compare & contrast: E-commerce and E-business. (8 Marks)
Basis E-Commerce E-Business
Definition Buying/selling of goods/services online. All electronically conducted business processes.
Broader—includes procurement, production,
Scope Limited to transactions (buy/sell)
CRM, SCM.
Includes website, payment gateways, Includes ERP systems, CRM tools, intranet,
Components
carts extranet
Interaction Business to customer and business to
Internal and external processes of an enterprise
Type business
Technology Use Focuses on front-end activities Involves both front-end and back-end systems
Infosys managing internal HR and supply chain
Example Amazon selling books online
digitally
Objective Online buying/selling Enhancing entire business efficiency through IT
b. Explain different types of E-commerce with examples. (7 Marks)
1. B2B (Business to Business): Electronic transactions between businesses.
o Example: Alibaba connects wholesalers with retailers.
2. B2C (Business to Consumer): Direct sale of products from businesses to customers.
o Example: Flipkart selling electronics to end users.
3. C2C (Consumer to Consumer): Transactions between consumers.
o Example: OLX and Quikr for second-hand product sale.
4. C2B (Consumer to Business): Individuals sell products/services to companies.
o Example: Freelancers offering services on Fiverr.
5. B2G (Business to Government): Businesses provide goods/services to government.
o Example: Tenders floated on government portals like GeM.
6. G2C (Government to Citizen): Government services provided online to citizens.
o Example: Online tax filing, voter registration.
2. Answer the followings
a. Explain basic network architecture of Internet. (10 Marks)
1. The Internet architecture is a layered model enabling scalable communication across interconnected
networks.
2. Layers of Internet Architecture:
o Application Layer: Interfaces with software (e.g., HTTP, FTP).
o Transport Layer: Ensures end-to-end communication (TCP/UDP).
o Internet Layer: Handles routing and addressing (IP Protocol).
o Network Access Layer: Manages physical data transmission (Ethernet/WiFi).
3. Client-Server Model: Users (clients) request services, which servers provide.
4. Routers and Switches: Connect different networks, forward data packets.
5. ISP Role: Provides access to users and companies.
6. IP Addressing & DNS: Used to identify and resolve domain names.
7. Firewall and Security Layers: Protect the network from threats.
b. Describe the Internet architecture with proper diagrams. (5 Marks)
(Diagram Not Drawn Here—You can include the OSI or TCP/IP layered model manually in your exam script)
• A layered architecture with 4 layers (Application, Transport, Internet, and Network Access).
• Diagram should show Client <-> ISP <-> Server, with router and firewall in between.
3. Answer the followings
a. Explain about the web system-based architecture in E-commerce. (5 Marks)
1. E-commerce web systems follow a multi-tier architecture:
o Presentation Tier (Front-End): Web browsers, HTML/CSS/JS interfaces.
o Application Tier (Logic Layer): Handles business logic using scripts (e.g., PHP, Python).
o Data Tier (Back-End): Databases like MySQL for product/user data.
2. Ensures separation of concerns and scalability.
3. Enables secure and dynamic content delivery.
b. Describe about the URL with proper example. (5 Marks)
1. URL (Uniform Resource Locator): Unique address used to locate resources on the web.
2. Format: protocol://domain/path?query
3. Example: https://www.amazon.in/electronics?ref=nav_logo
o Protocol: HTTPS
o Domain: amazon.in
o Path: /electronics
o Query: ref=nav_logo
4. Helps browser locate the correct web resource.
c. Define with examples: Cookies and HTTP. (5 Marks)
• Cookies: Small text files stored by the browser to track user sessions.
o Example: Storing login session ID or cart items.
• HTTP (HyperText Transfer Protocol): Protocol used for transmitting web data.
o Example: When a user visits http://example.com, HTTP is used to fetch that page.
4. Answer the followings
a. Explain about various Internet marketing techniques in E-commerce. (8 Marks)
1. Search Engine Optimization (SEO): Improving website ranking in search engines.
2. Email Marketing: Sending promotional content via email.
3. Content Marketing: Using blogs, videos to attract customers.
4. Social Media Marketing: Platforms like Facebook, Instagram for brand promotion.
5. Pay-Per-Click (PPC): Paid ads via Google Ads.
6. Affiliate Marketing: Third-party promoting products for commission.
7. Influencer Marketing: Using known personalities to market products.
8. Remarketing: Targeting users who previously visited the site.
b. Describe with an example: the e-cycle Internet marketing in E-commerce. (7 Marks)
1. E-Cycle refers to stages of digital marketing from attracting to retaining a customer.
2. Steps:
o Awareness → Interest → Desire → Action → Retention
3. Example:
o A user sees an ad (awareness), browses the site (interest), sees offers (desire), makes a
purchase (action), gets emails later (retention).
4. Continuous loop to ensure repeated engagement.
5. Answer the followings
a. List out the basic structure of a HTML webpage with an example. (10 Marks)
<!DOCTYPE html>
<html>
<head>
<title>My Webpage</title>
</head>
<body>
<h1>Welcome to E-commerce</h1>
<p>This is a demo page.</p>
</body>
</html>
1. <!DOCTYPE html>: Declares HTML5.
2. <html>: Root of HTML document.
3. <head>: Metadata and title.
4. <body>: Visible content of webpage.
b. Categorize various text formatting in HTML with examples. (5 Marks)
1. Bold Text: <b>text</b> or <strong>text</strong>
2. Italic Text: <i>text</i> or <em>text</em>
3. Underline Text: <u>text</u>
4. Subscript & Superscript: <sub>text</sub>, <sup>text</sup>
5. Font Size and Style (HTML5 CSS): <p style="font-size:20px; font-family:Arial;">Text</p>
6. Answer the followings
a. List out the various cyber threats with examples. (8 Marks)
1. Phishing: Fraudulent emails/websites that trick users into revealing confidential information.
Example: Fake bank login page.
2. Malware: Malicious software like viruses, trojans. Example: Ransomware like WannaCry.
3. Denial of Service (DoS): Overloading a server to make it unavailable. Example: Attacking e-commerce
site to stop transactions.
4. Man-in-the-Middle Attack: Intercepting data between sender and receiver. Example: Capturing login
credentials.
5. SQL Injection: Inserting malicious SQL code into forms to extract data. Example: Attacking login
forms.
6. Spyware: Software that secretly gathers user information. Example: Tracking browsing activity.
7. Identity Theft: Stealing someone's identity to make financial transactions. Example: Using stolen
Aadhaar or PAN.
8. Social Engineering: Manipulating people into giving access. Example: Pretending to be tech support.
b. Compare & contrast between frauds and scams. (7 Marks)
Basis Frauds Scams
Intentional deception for personal or Deceptive scheme to cheat people, often
Definition
financial gain. publicly.
Basis Frauds Scams
Often systematic and planned within Often one-time trick played by external
Nature
organizations. individuals.
Employee manipulates accounts for
Example Fake online shopping sites duping users.
personal gain.
Target Individuals, businesses, institutions. Mostly individuals.
Intent Conceal truth or misrepresent facts. Trick victim through attractive but fake offers.
Legal Strict legal action, often with forensic Harder to trace, may require cyber police
Implication auditing. intervention.
Detected via audits, patterns, internal Detected after user reports or mass
Detection
checks. complaints.
7. Answer the followings
a. List out the features of payment methods on the Internet. (5 Marks)
1. Security: Must ensure secure transactions through encryption.
2. Convenience: Should be user-friendly and fast.
3. Multiple Modes: Support for credit/debit cards, wallets, UPI, etc.
4. Authentication: Two-factor or biometric verification.
5. Real-time Processing: Instant confirmation and settlement.
b. Briefly explain: 4C payment methods. (5 Marks)
1. Convenience: Payment should be easy and accessible 24/7.
2. Confidence: Users must trust the system’s security.
3. Cost: Transaction cost should be low.
4. Control: Users should have control over transactions, like limits or approvals.
c. Write a short note on Electronic money. (5 Marks)
Electronic money refers to digital alternatives of cash used in online transactions. It is stored in cards, apps,
or web wallets. Example: Paytm balance, Amazon Pay. E-money enables quick, secure, and traceable
transactions without the need for physical currency. It is regulated by central authorities and banks.
8. Answer the followings
a. Briefly describe about the SET protocol for credit card payment. (10 Marks)
Secure Electronic Transaction (SET) is a protocol developed by Visa and MasterCard to provide secure credit
card transactions over the Internet. It ensures confidentiality of information through encryption, integrity via
digital signatures, and authentication using certificates. SET involves cardholder, merchant, payment
gateway, and certification authority. Unlike SSL, the card number is not sent to the merchant, thus reducing
the risk of fraud.
b. Compare & contrast between ACID test and ICES test. (5 Marks)
Basis ACID Test (Database) ICES Test (E-commerce Transactions)
Full Form Atomicity, Consistency, Isolation, Durability Integrity, Confidentiality, Efficiency, Security
Purpose Ensures database transactions are reliable Ensures secure and trustworthy online transactions
Focus Data integrity during transactions Transaction security and user trust
Usage Area Databases and storage systems Online payments and communications
Example Bank money transfer database update Online credit card processing
9. Explain the different electronic payment media with examples. (15 Marks)
1. Credit Cards: Widely used for online payments. Example: VISA, MasterCard.
2. Debit Cards: Linked directly to bank account. Example: RuPay, Maestro.
3. E-Wallets: Store digital money for quick payments. Example: Paytm, Google Pay.
4. Net Banking: Direct payment via online bank interface. Example: SBI net banking.
5. UPI (Unified Payments Interface): Real-time bank transfers using mobile apps. Example: PhonePe,
BHIM.
6. Mobile Banking: Bank apps to make transactions. Example: HDFC Mobile App.
7. Cryptocurrency: Decentralized payment system using blockchain. Example: Bitcoin, Ethereum.
8. NEFT/RTGS/IMPS: Bank-to-bank electronic fund transfer systems.
9. Smart Cards: Embedded chip-based cards for secure payments.
10. Point of Sale (POS): Used in shops for card-based payments.
11. SMS Payments: Payments initiated through mobile SMS.
12. QR Code Payments: Scan-based payment system. Example: BharatQR, Paytm.
13. Prepaid Cards: Cards loaded with a specific amount. Example: Gift cards.
14. Direct Carrier Billing: Payment added to mobile phone bill.
15. Buy Now Pay Later (BNPL): Allows deferred payments. Example: Simpl, LazyPay.
10. Answer the followings
a. Describe with proper diagram: B2B building blocks. (10 Marks)
(Diagram not shown here—can be drawn manually with 4 key layers:)
1. Content Layer: Product catalogs, price lists.
2. Messaging Layer: Protocols like EDI, XML for communication.
3. Process Layer: Business rules and workflows.
4. Transport Layer: Internet, VPN, email used for data transfer.
These layers together enable smooth B2B interactions between supplier and buyer.
b. How are the B2B blocks relate to supply chain management? (5 Marks)
B2B blocks automate and integrate supply chain processes like procurement, inventory management, and
logistics. Messaging ensures timely communication. Content helps in faster product discovery. Transport
allows secure and quick data transfer. Overall, it enhances supply chain efficiency and coordination.
11. Summarize the primary B2B models with their basic functions. (15 Marks)
1. Supplier-Oriented Marketplace: Single supplier sells to many buyers. Example: Dell’s B2B portal.
o Function: Centralized catalog and custom pricing.
2. Buyer-Oriented Marketplace: Single buyer interacts with multiple suppliers. Example: Government e-
Marketplace.
o Function: Competitive bidding, procurement.
3. Intermediary-Oriented Marketplace: Third party hosts buyers and sellers. Example: Alibaba.
o Function: Connects businesses, ensures secure transactions.
4. Vertical Marketplace: Industry-specific B2B portals. Example: ChemConnect for chemical industry.
o Function: Specialized product listings, compliance support.
5. Horizontal Marketplace: General-purpose across industries. Example: Amazon Business.
o Function: Broad range of products for different sectors.
12. Explain the different issues of e-core values with examples. (15 Marks)
1. Trust: Essential in online dealings. Example: SSL certificates build trust.
2. Security: Protecting data and transactions. Example: Use of encryption.
3. Privacy: User data must be protected. Example: GDPR compliance.
4. Transparency: Clear pricing and policies. Example: Return policy display.
5. Accessibility: Websites must be accessible to all, including disabled. Example: WCAG compliant sites.
6. Efficiency: Fast loading, responsive sites. Example: Amazon’s optimized platform.
7. Ethics: Fair practices in marketing and sales. Example: No misleading ads.
8. Customer Centricity: User-friendly navigation, support. Example: 24x7 support on Flipkart.
9. Responsiveness: Quick handling of queries/complaints. Example: Chatbots and helplines.
10. Innovation: Continuous improvement. Example: AI-based recommendations on shopping sites.
5 marks
Niche prottekta 5 marks-er question-er jonne point-wise professionally answer deya holo (MAKAUT-er level
e):
1. Define E-commerce with a proper example.
1. E-commerce (Electronic Commerce) refers to buying and selling of goods and services using the
internet.
2. It includes transactions like online shopping, internet banking, digital payments, and online auctions.
3. E-commerce platforms enable customers to place orders, make payments, and receive products or
services digitally.
4. It uses technologies such as mobile commerce, electronic funds transfer, supply chain management,
and internet marketing.
5. Example: Amazon.com is a popular e-commerce site where users can purchase electronics, clothing,
and books online.
2. Briefly describe the advantages of e-commerce.
1. Convenience: Customers can shop 24×7 from anywhere with internet access.
2. Wider Reach: Businesses can access global markets without physical stores.
3. Cost Reduction: Reduces operational costs like rent and inventory through automation.
4. Product Variety: Offers more product choices and personalized recommendations.
5. Customer Insights: Businesses can analyze user behavior and improve marketing strategies.
3. Briefly explain the disadvantages of e-commerce.
1. Security Issues: Risk of data theft, hacking, and payment fraud.
2. Lack of Personal Touch: Absence of face-to-face interaction may affect customer trust.
3. Delivery Delays: Logistics problems can delay product delivery.
4. Technology Dependency: Internet or server failure can disrupt business.
5. Limited Experience: Customers cannot physically examine the product before buying.
4. Explain about Porter’s value chain model.
1. Porter’s Value Chain Model describes how businesses create value through primary and support
activities.
2. Primary activities include inbound logistics, operations, outbound logistics, marketing & sales, and
services.
3. Support activities include firm infrastructure, human resource management, technology
development, and procurement.
4. Each activity adds value to the product/service and helps gain competitive advantage.
5. The model helps identify cost advantages and value creation opportunities for improving efficiency.
5. Define different types of e-commerce with examples.
1. B2B (Business to Business): Transactions between businesses. Example: Alibaba selling bulk items to
retailers.
2. B2C (Business to Consumer): Business sells directly to end consumers. Example: Flipkart or Amazon.
3. C2C (Consumer to Consumer): Consumers sell to other consumers. Example: OLX or eBay.
4. C2B (Consumer to Business): Individuals sell products or services to businesses. Example: Freelancers
offering services on Fiverr.
5. B2G (Business to Government): Businesses provide goods/services to government. Example: IT firms
providing software to government portals.
Niche tomake 5 marks-er uttor point-wise, clear language-e likhe dichhi. Sob question-er answer MAKAUT
standard onujayi toiri kora.
6. Define the Internet. Compare Internet with Intranet.
1. The Internet is a global network of interconnected computers that allows the sharing of information
and communication using standard protocols.
2. It is publicly accessible and enables services like websites, emails, social media, etc.
3. Internet vs. Intranet Comparison:
• Accessibility: Internet is public; Intranet is private (within an organization).
• Security: Internet is less secure; Intranet is secure and restricted.
• Users: Internet is used by general public; Intranet is used by company employees.
• Purpose: Internet provides general information; Intranet focuses on internal communication and
documentation.
• Example: Internet – Google; Intranet – a school or company portal.
7. Write down the various hardwares and softwares used in Internet.
1. Hardware:
• Servers – host websites and databases.
• Routers – direct data packets between networks.
• Modems – convert digital signals to analog and vice versa.
• Cables (fiber optics, Ethernet) – physical medium for data transfer.
• Switches – manage traffic inside local networks.
2. Software:
• Web Browsers (Chrome, Firefox) – access web content.
• Web Servers (Apache, Nginx) – deliver web pages.
• Email Clients (Outlook, Thunderbird) – send/receive emails.
• FTP software – file transfer over internet.
• Antivirus/firewall – ensure online security.
8. Compare & contrast between Intranet and Extranets.
1. Intranet: Internal private network used within an organization.
2. Extranet: Extended intranet that allows controlled access to outsiders (vendors, clients).
3. Comparison:
• Access: Intranet for employees only; Extranet for business partners.
• Security: Intranet is more secure as it’s fully internal; Extranet needs extra security layers.
• Purpose: Intranet is used for internal communication; Extranet is used for collaboration with
external parties.
• Example: Intranet – employee HR portal; Extranet – vendor access to product stock.
9. Briefly write about ISP with an example.
1. ISP (Internet Service Provider) is a company that provides internet access to users.
2. It offers services such as broadband, leased lines, email, and web hosting.
3. ISPs connect users to the internet through different technologies like DSL, fiber optics, and wireless.
4. ISPs also assign IP addresses and manage domain names for customers.
5. Example: Jio, Airtel, BSNL, ACT are common ISPs in India.
10. How to choose an ISP to register any website?
1. Check if the ISP offers domain name registration and web hosting services.
2. Ensure the ISP has reliable uptime and good server performance.
3. Confirm bandwidth and storage availability as per website needs.
4. Look for security features like SSL support and backup services.
5. Choose an ISP with customer support and affordable pricing plans.
11. How to register a domain name for hosting a website?
1. Choose a unique domain name relevant to your business or purpose.
2. Visit a domain registrar (e.g., GoDaddy, Namecheap).
3. Search for domain availability using domain extensions (.com, .in, etc.).
4. Register and purchase the domain by creating an account and making payment.
5. Link the domain to a web hosting provider for hosting the website files.
12. Write a short note on: Web Promotion.
1. Web Promotion refers to strategies used to increase visibility and traffic to a website.
2. Techniques include Search Engine Optimization (SEO), social media marketing, email marketing, and
paid ads (PPC).
3. Helps in attracting potential customers and improving brand recognition.
4. Requires use of content marketing, link building, and performance tracking.
5. Effective promotion increases ranking in search engines and boosts conversions.
13. Write a short note on: Mobile Agents.
1. Mobile agents are software programs that can move across network nodes to perform tasks.
2. They operate independently and can migrate between systems for task execution.
3. Useful in distributed computing, network management, and e-commerce applications.
4. Improve efficiency by reducing network load and response time.
5. Security and trustworthiness are key issues in mobile agent deployment.
14. Explain the process of tracking a customer.
1. Customer tracking involves monitoring user behavior on a website to understand preferences.
2. Cookies store user data like visited pages and login info.
3. Web analytics tools (e.g., Google Analytics) collect data on page views, clicks, bounce rate, etc.
4. User behavior is used to personalize experiences and marketing strategies.
5. Data is analyzed to improve service, target ads, and retain customers.
15. Describe the customer service with a suitable example.
1. Customer service is the assistance and support provided before, during, and after product purchase.
2. Includes answering queries, handling complaints, and providing technical support.
3. It builds customer loyalty and improves brand reputation.
4. Services may be provided via phone, chat, email, or self-help portals.
5. Example: Amazon’s 24×7 customer care resolves refund, return, or delivery issues promptly.
6. Define: CRM and E-value with examples.
1. CRM (Customer Relationship Management): CRM refers to strategies, technologies, and practices
used by companies to manage customer data and interactions.
2. It helps businesses improve customer service, retain customers, and drive sales growth.
3. CRM systems collect and analyze customer information to personalize services.
4. Example: Salesforce CRM is used to manage client communication, sales tracking, and support
services.
5. E-value: E-value refers to the perceived value a customer gets from an online product or service.
6. It includes website design, ease of navigation, product quality, customer support, etc.
7. Example: A well-designed e-commerce website with fast delivery and 24×7 support provides high E-
value to users.
17. Write a short note on: HTML links.
1. HTML links (also known as hyperlinks) allow users to navigate from one page to another.
2. Created using the <a> (anchor) tag with the href attribute.
3. Links can be internal (within same website) or external (to another site).
4. Users can also link to email addresses and downloadable files.
5. Example: <a href="https://www.example.com">Visit Example</a> creates a clickable link.
18. Write a short note on: HTML images.
1. HTML uses the <img> tag to display images on a webpage.
2. The src attribute specifies the image file path, and alt gives alternative text.
3. Images can be from local files or web URLs.
4. Image size can be controlled using width and height attributes.
5. Example: <img src="photo.jpg" alt="Profile Photo" width="200"> shows an image with width 200px.
19. Write a short note on: HTML tables.
1. HTML tables organize data in rows and columns.
2. Main tags include <table>, <tr> (table row), <td> (table data), and <th> (table header).
3. Tables are used to display structured data such as pricing, schedules, etc.
4. Attributes like border, cellpadding, and colspan help format the table.
5. Example:
<table border="1">
<tr><th>Name</th><th>Age</th></tr>
<tr><td>Akash</td><td>22</td></tr>
</table>
20. Write a short note on: HTML frames.
1. HTML frames divide the browser window into multiple sections, each displaying a separate HTML
document.
2. Created using <frameset> and <frame> tags (deprecated in HTML5).
3. Used in earlier websites for menus, headers, and content areas loaded independently.
4. Not supported in modern browsers due to usability and security issues.
5. Example:
<frameset cols="30%,70%">
<frame src="menu.html">
<frame src="content.html">
</frameset>
21. Write a short note on: HTML forms.
1. HTML forms collect user input and send it to the server for processing.
2. Created using <form> tag, with attributes like action (target URL) and method (GET/POST).
3. Common form elements include <input>, <textarea>, <select>, and <button>.
4. Forms are used for login, registration, feedback, and search features.
5. Example:
<form action="submit.php" method="post">
Name: <input type="text" name="username">
<input type="submit" value="Submit">
</form>
22. Write down with example: Cyberspace.
1. Cyberspace refers to the virtual environment of digital networks where communication and data
exchange occur.
2. It includes internet, intranet, websites, emails, social media, cloud platforms, etc.
3. It is a non-physical domain but enables real-time global interaction.
4. Used in e-commerce, education, banking, entertainment, and governance.
5. Example: Social networking on Facebook or online shopping on Amazon are activities within
cyberspace.
23. Describe with an example: Private key encryption.
1. Private key encryption (symmetric encryption) uses a single key for both encryption and decryption.
2. The sender and receiver must share the same secret key securely.
3. It is fast but less secure due to key distribution issues.
4. Common algorithms: AES, DES.
5. Example: A file encrypted with a password (the private key) can only be opened with that same
password.
24. Explain with an example: Public key encryption.
1. Public key encryption (asymmetric encryption) uses two keys: public (shared openly) and private
(kept secret).
2. The sender encrypts data using the receiver’s public key; only the receiver can decrypt it with their
private key.
3. Ensures data confidentiality and secure communication.
4. Used in email security, digital signatures, and SSL.
5. Example: Sending an encrypted email using someone’s public key ensures only they can read it with
their private key.
25. Write down the verification process of a digital signature.
1. The sender creates a hash of the message and encrypts it using their private key — this is the digital
signature.
2. The receiver decrypts the signature using the sender’s public key to get the hash.
3. The receiver also computes the hash of the received message.
4. If both hashes match, the signature is verified and message integrity is confirmed.
5. This ensures message authenticity and that it was not tampered with.
26. Write down the validation procedure of a digital certificate.
1. Digital certificates are issued by a Certificate Authority (CA) to validate the identity of a website or
user.
2. The browser checks the certificate’s validity period and the issuing CA’s signature.
3. It ensures that the certificate is not expired, revoked, or tampered.
4. The public key and domain details are verified.
5. If trusted, a secure connection (HTTPS) is established between browser and website.
27. How to secure the Internet through VPN, SSL, and Firewalls.
1. VPN (Virtual Private Network): Encrypts internet traffic and hides IP address, protecting user privacy
over public networks.
2. SSL (Secure Socket Layer): Provides encryption for secure data transfer between browser and server;
used in HTTPS.
3. Firewalls: Act as barriers between internal networks and external threats by monitoring and
controlling incoming/outgoing traffic.
4. Together, these tools protect data confidentiality, prevent unauthorized access, and ensure secure
online communication.
5. Common use: Securing e-commerce sites, emails, and remote access to company systems.
28. List out the benefits and opportunities in B2B model.
1. Reduced operational costs due to automation of processes.
2. Faster transactions through electronic data exchange.
3. Wider market access and long-term supplier relationships.
4. Streamlined inventory and supply chain management.
5. Opportunities for bulk buying, better pricing, and improved vendor collaboration.
29. Compare & contrast: Traditional retailing and E-retailing.
1. Traditional Retailing: Physical store setup, limited to local market, higher overhead cost, in-person
customer service.
2. E-Retailing: Online store setup, global reach, lower maintenance cost, 24×7 availability, digital
payment options.
3. E-retailing provides convenience, whereas traditional offers touch-and-feel product inspection.
4. Traditional requires more staff; e-retail uses technology for automation.
5. Example: Big Bazaar (traditional) vs. Amazon (e-retail).
30. Summarize the models used for e-retailing.
1. Inventory-based Model: Seller owns inventory and fulfills orders (e.g., Amazon).
2. Marketplace Model: Platform connects buyers and third-party sellers (e.g., Flipkart).
3. Dropshipping Model: Seller lists products, but third-party ships directly to customers.
4. Subscription Model: Customers pay periodically for access to products/services (e.g., Netflix).
5. Hybrid Model: Combination of inventory and marketplace models.
31. How does an EDI act as a B2B tool?
1. EDI (Electronic Data Interchange) allows exchange of standardized business documents between
companies electronically.
2. Replaces paper-based systems with automated, secure, and quick data transmission.
3. Used for purchase orders, invoices, shipping notices, etc.
4. Increases efficiency, reduces errors, and speeds up B2B transactions.
5. Example: A manufacturer automatically sends invoice data to a retailer using EDI systems.
32. Write down the benefits and basic success factors of e-retailing.
1. Benefits:
• Global reach with minimal cost.
• Personalized shopping experience.
• 24×7 service and convenience.
2. Success Factors:
• User-friendly website design.
• Reliable delivery and return policy.
• Strong backend logistics and customer support.
• Secure payment systems.
• Efficient inventory management.
33. Briefly explain about supplementary distribution channel.
1. Supplementary distribution channels are additional methods to deliver products or services apart
from primary channels.
2. They include online portals, affiliate networks, mobile apps, and third-party platforms.
3. Help reach wider audiences and increase sales.
4. Often used for promotional or support products.
5. Example: A company selling books through its website and also via Amazon as a supplementary
channel.
34. Compare between e-broker and e-services with examples.
1. E-Broker: Acts as an online intermediary between buyers and sellers, providing services like stock
trading, insurance, real estate, etc.
• Example: Zerodha, PolicyBazaar.
2. E-Services: Directly provide services through digital platforms like consultancy, education, health, etc.
• Example: Coursera for e-learning, Practo for online doctor consultations.
3. E-brokers earn commission; e-services charge for service usage.
4. E-brokers deal in transactions; e-services focus on service delivery.
5. Both are essential parts of e-commerce ecosystems.