PROGRAM MBA
SUBJECT CODE & NAME MI0039 – ECOMMERCE
1. Explain the various areas
wherein the E-commerce is finding place? Explanation of various areas wherein
the Ecommerce is finding place
2. a. Explain the brokerage model and its
advantages.
b. Explain the various trends in
E-commerce.
Ans- Brokerage model
The characteristics of
a brokerage model are as follows:
The brokerage model brings buyers and sellers
to a common platform to carry out transactions.
The broker in the brokerage model is
responsible for mediating activities between the buyers and sellers.
In
this model, the
modes of transactions
are mainly auctions
and exchanges between buyers and sellers.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
3. Explain the concept of E-CRM
and discuss its benefits and limitations.
Ans- E-Customer Relationship Management (E-CRM)
CRM
refers to marketing activities intended
at establishing, developing and maintaining
successful customer relationships. CRM
is transformed into ECRM
by consolidating existing
CRM activities with
prevalent Web technologies.
E-CRM is the
process of increasing
sales to the
existing customer and
promoting continuous relationships
through the use of
technologies such as e-mail, chat rooms
and social media marketing. E-CRM helps
organisations in understanding
customers’ needs and
their buying behaviour to
leverage better and improved products or
services. ECRM is also
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
4. Explain the impact of social
network on business. Also discuss the revenue models for social networking websites.
Ans- Impact of Social Networks on Business
Social networking
can be used
to expand businesses,
as they provide
a medium for direct interaction
with customers, which is cost-effective,
has a wider reach and is dynamic in
nature. Some ways in which social
networks have made an impact on business
are described below:
Apart from
e-commerce websites, social
networks are proving to be promising
shopping sites. To
access customers, it
is important to understand the
present trend, select the
appropriate platform and know the best
online channel for
reaching those potential
consumers. Organisations
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
5. a. Explain in brief the various measures of
client computer security.
b. Databases forms the core
of all business
but it is also
exposed to various threats. Explain in brief the various
measures for protecting database from database threat.
Ans-a. Managing Client Computer Security
All the
computers connected to the Internet
can be categorised
into two types:
client computers and server
computers. The computers that provide Web services to other computers in a network are called server
computers and the ones receiving the
services are referred to as client computers.
This can be
understood from below Figure,
where the client
computers receive services from a server computer in the
network:
Both the
server and client
computers are susceptible
to security threats such
as malicious codes,
DoS attacks or
theft, all of
which need to be managed
through appropriate measures. Client
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
B.Threats to database
Just
like servers, databases are also exposed to security threats that
need to be checked in order to
manage server computers. Databases are most vulnerable to security threats among all
business assets. The reason for this is that
databases are the
core of any
business, containing sensitive
and
confidential data
related to processes,
customers, inventory and
finance. The other reason is that
until the late 1990s, there were no proper measures for database security. When malicious
individuals, both outside and inside the organisations, gain access to sensitive data, they can damage, destroy
or misuse
the information, impacting
business operations. There
are six major solutions to
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
6. Explain the
conflict resolution and
grievances redress mechanism
in e-commerce. Also highlight
government's role in e-commerce activities.
Ans- Conflict Resolution and Grievance Redressal
Effective dispute
resolution and redressal
mechanisms are the
means to build customer trust in e-commerce. Lack of
such mechanisms can prevent customers from
taking full advantage
of e-commerce, especially
those involving cross-border
transactions. A report
from the European Commission
asserted that 71
percent of customers
who were surveyed believed that it is more
difficult to solve issues or conflicts for cross-border transactions compared to domestic
transactions. E-commerce depends on repeat customers and referrals. Hence, it is important for organisations and
individuals to
settle their disputes
quickly. The organisations
may contemplate on
developing an integrated
conflict management and grievance redressal
system that includes
both grievance
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
SUBJECT CODE & NAME MI0041 – JAVA AND WEB DESIGN
1. a. How is the heading created on a webpage?
Explain with an example.
b. Cast light on the various
components of a webpage.
Ans-a. Creating Headings on a Web Page
Headings help
to define the
format and structure
of a document
and highlight important
topics. HTML has
special pre-formatted tags
to create headings on a web page. The headings in HTML
appear bold by default and their size
depends on their level. HTML has the following six heading tags:
<h1>, <h2>,
<h3>, <h4>, <h5>, and <h6>. The heading tags come in
pairs, with an
opening tag and
a closing tag.
Any text inside
these tags is displayed
differently depending on the heading number
or level. The text in the heading tags start with a new line. Below Figure
displays the different levels of
HTML headings:
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
2. What do you understand by
Literals? Put down Integer literals and Floating-point literals in detail.
Ans- Literals
A literal
is a constant
value that does
not have an
identifier. Literals are commonly used
to initialize variables.
It can be
any number, character, string, or boolean value. The source code
representations of the values of primitive
data types in a Java program are known as primitive literals.
These primitive literals can be an integer number,
floating-point number, a boolean value,
or a character that you use in your program. The following example shows some primitive literals: 24 //an int literal 124.543 // a double literal true // a boolean literal ‘v’ // a char literal In the preceding example,
24 is an integer value, 124.543 is a floating-point number, true is the boolean literal, and v is
a character value.
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
3. How is file read by using
Buffered Output Stream?
Ans- Reading a File
Using BufferedOutputStream
Normally, whenever we
write data into a file using FileOutputStream as: fout.write(ch); Here, we call the write() method on ‘fout’ which is
FileOutputStream object, to write a
character (ch) into the file. Here, the
FileOutputStream is invoked to write the
character into the file. Let us
estimate how much
time it takes
to read 100
characters from the keyboard
and write all of them into a file. Let us assume we read data from the keyboard into memory using DataInputStream
and it takes 1 second to
read 1
character into memory. Let us assume that this character is written into
the file by
FileOutputStream by spending
another 1 second.
So, for reading
and writing a
single character, 2
seconds are required.
Thus, to read and write 100 characters, it takes 200
seconds. This is wasting a
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
4. Elaborate on the try and catch
Blocks, its processes and codes.
Ans- The try and catch Blocks
The try
block in a Java program is used to enclose a statement that may lead to
an exception. A try
block must be followed by a catch
block. The catch
block acts as
an exception handler
and contains the
object of the specified exception
class, which handles
the raised exception.
The code written in the catch block is executed when
the exception handler is invoked by the
Java runtime system. The flowchart shown in
below figure displays the process
of handling exceptions by using the try-catch block:
Figure: Process Flow Structure of
the try–catch block
When a program is
executed, its methods are
checked for exceptions. In
case an
exception is encountered,
the corresponding exception
handler techniques are searched.
If no exception handling technique is found, the program terminates abruptly. However, if an
exception
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
5. Write notes on:
a. The java.sql Package
b. The javax.sql Package
Ans-a. The java.sql Package
The java.sql package is
also known as the JDBC core API. This package includes the interfaces and classes
to perform JDBC core operations,
such as creating and
executing SQL queries. The
java.sql package consists of the
interfaces and classes that need to be implemented in an application to access
a database. The
developer uses these
operations to access
the database in
an application. The
classes in the
java.sql package can be
classified into the following categories
based on different operations:
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
The javax.sql Package
The javax.sql package
is also called a JDBC extension API, and provides classes and interfaces to access server-side
data sources and process Java programs.
The JDBC extension package supplements the java.sql package, and provides the following support:
DataSource
Connection and statement pooling
Distributed transaction
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
6. Create Simple JSP Pages with
proper java application.
Ans- Creating Simple JSP Pages
In this
section, we are
creating a simple
web application with
two JSP pages. As we have not yet discussed the various constructs used
in JSP, such as scriptlets and
directives, we create simple JSP pages to give you an
idea of how
they can be
designed, used, and
accessed by a web application.
Now, let's create
a SimpleApp web application containing two JSP pages.
Create a SimpleApp folder in
the unit14 directory.
The first JSP page we will create
is user.jsp, which provides an HTML form
with two input fields to enter
the name and city of a user. Listing
14.1 provides the
CONTACT
US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT
NUMBER : +91 - 8285115522
No comments:
Post a Comment