Thursday 27 August 2015

MBA - SEMESTER - 4 - INFORMATION SYSTEM - SUMMER - 2015

PROGRAM  MBA
SUBJECT CODE & NAME MI0039 –  ECOMMERCE

1.  Explain the various areas wherein the E-commerce is finding place? Explanation of various areas wherein the Ecommerce is finding place



2.  a.  Explain the brokerage model and its advantages.
b.  Explain the various trends in E-commerce.


Ans- Brokerage model

The characteristics of a brokerage model are as follows:

  The brokerage model brings buyers and sellers to a common platform to carry out transactions.

  The broker in the brokerage model is responsible for mediating activities between the buyers and sellers.

  In  this  model,  the  modes  of  transactions  are  mainly  auctions  and exchanges between buyers and sellers.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3.  Explain the concept of E-CRM and discuss its benefits and limitations.

Ans- E-Customer Relationship Management (E-CRM)

CRM refers to marketing activities intended  at establishing, developing and  maintaining successful customer relationships. CRM  is transformed  into  ECRM  by  consolidating  existing  CRM  activities  with  prevalent  Web  technologies.  E-CRM  is  the  process  of  increasing  sales  to  the  existing  customer  and  promoting  continuous  relationships  through  the  use  of  technologies such as e-mail, chat rooms and social media marketing.  E-CRM  helps  organisations  in  understanding  customers’  needs  and  their  buying behaviour to leverage better and improved products  or services.  ECRM is  also                                                                               
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4.  Explain the impact of social network on business. Also discuss the revenue models for social  networking websites.

Ans- Impact of Social Networks on Business

Social  networking  can  be  used  to  expand  businesses,  as  they  provide  a  medium for direct interaction with customers,  which is cost-effective, has a  wider reach and is dynamic in nature. Some  ways in which social networks  have made an impact on business are described below:

  Apart  from  e-commerce  websites,  social  networks  are  proving  to  be  promising  shopping  sites.  To  access  customers,  it  is  important  to  understand  the  present  trend, select the appropriate platform and know  the  best  online  channel  for  reaching  those  potential  consumers.  Organisations                                                       
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5.  a.  Explain in brief the various measures of client computer security.
b.  Databases  forms  the  core  of  all  business  but it  is  also  exposed to  various  threats. Explain in brief the various measures for protecting database from database threat.

Ans-a. Managing Client Computer Security

All  the  computers  connected  to  the  Internet  can  be  categorised  into  two  types:  client  computers and server computers.  The computers  that provide  Web services to other  computers in a network are called server computers  and the ones receiving the services are referred to as client computers.

This can  be  understood  from  below Figure,  where  the  client  computers  receive  services from a server computer in the network:

Both  the  server  and  client  computers  are  susceptible  to  security  threats  such  as  malicious  codes,  DoS  attacks  or  theft,  all  of  which  need  to  be managed through appropriate measures. Client                                                                                          
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


B.Threats to database

Just like servers, databases are also exposed to security threats  that  need  to be checked in order to manage server computers.  Databases  are most  vulnerable to security threats among all business assets. The reason for this  is  that  databases  are  the  core  of  any  business,  containing  sensitive  and
confidential  data  related  to  processes,  customers,  inventory  and  finance.  The other reason is that until the late 1990s, there were no proper measures  for database security. When malicious individuals,  both outside and inside  the organisations,  gain access to sensitive data, they can  damage, destroy
or  misuse  the  information,  impacting  business  operations.  There  are  six  major solutions to                                                                                      
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6.  Explain  the  conflict  resolution  and  grievances  redress  mechanism  in  e-commerce.  Also  highlight government's role in e-commerce activities.

Ans- Conflict Resolution and Grievance Redressal

Effective  dispute  resolution  and  redressal  mechanisms  are  the  means  to  build customer trust in e-commerce. Lack of such mechanisms can  prevent customers  from  taking  full  advantage  of  e-commerce,  especially  those  involving  cross-border  transactions.  A  report  from  the  European  Commission  asserted  that  71  percent  of  customers  who  were  surveyed  believed that it is  more  difficult to solve issues or conflicts for cross-border  transactions compared to domestic transactions.  E-commerce depends on  repeat customers and referrals. Hence,  it is important for organisations  and
individuals  to  settle  their  disputes  quickly.  The  organisations  may  contemplate  on  developing  an  integrated  conflict  management  and  grievance  redressal  system  that  includes  both  grievance                                                                                             
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



 PROGRAM  MBA
SUBJECT CODE & NAME MI0041 –  JAVA AND WEB DESIGN

1.  a.  How is the heading created on a webpage? Explain with an example.
b.  Cast light on the various components of a webpage.

Ans-a. Creating Headings on a Web Page

Headings  help  to  define  the  format  and  structure  of  a  document  and  highlight  important  topics.  HTML  has  special  pre-formatted  tags  to  create  headings on a web page. The headings in HTML appear bold by default and  their size depends on their level. HTML has the following six heading tags:
<h1>, <h2>, <h3>, <h4>, <h5>, and <h6>. The heading tags come in pairs,  with  an  opening  tag  and  a  closing  tag.  Any  text  inside  these  tags  is  displayed differently depending on the heading number  or level. The  text in  the heading tags start with a new line. Below Figure displays the different levels of
HTML headings:

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


2.  What do you understand by Literals? Put down Integer literals and Floating-point literals in  detail.

Ans- Literals

A  literal  is  a  constant  value  that  does  not  have  an  identifier.  Literals  are  commonly  used  to  initialize  variables.  It  can  be  any  number,  character,  string, or boolean value. The source code representations of the values of  primitive data types in a Java program are known as primitive literals.

These  primitive literals can be an integer number, floating-point number, a boolean  value, or a character that you use in your program. The following example  shows some primitive literals: 24    //an int literal 124.543  // a double literal true    // a boolean literal ‘v’   // a char literal In the preceding example, 24 is an integer value, 124.543 is a floating-point  number, true is the boolean literal, and v is a character value.

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


3.  How is file read by using Buffered Output Stream?

Ans- Reading a File Using BufferedOutputStream

Normally, whenever we write data into a file using FileOutputStream as: fout.write(ch);  Here, we call the  write() method on ‘fout’ which is FileOutputStream object,  to write a character  (ch) into the file. Here, the FileOutputStream is invoked  to write the character into the file.  Let  us  estimate  how  much  time  it  takes  to  read  100  characters  from  the  keyboard and write all of them into a file. Let us assume we read data from  the keyboard into memory using DataInputStream and it takes 1 second to
read 1 character into memory. Let us assume that this character is written  into  the  file  by  FileOutputStream  by  spending  another  1  second.  So,  for  reading  and  writing  a  single  character,  2  seconds  are  required.  Thus,  to  read and write 100 characters, it takes 200 seconds. This is wasting a                                                   
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


4.  Elaborate on the try and catch Blocks, its processes and codes.

Ans- The try and catch Blocks

The  try  block in a Java program is used to enclose a statement that may  lead  to an exception.  A  try  block  must  be followed by a  catch  block.  The  catch  block  acts  as  an  exception  handler  and  contains  the  object  of  the  specified  exception  class,  which  handles  the  raised  exception.  The  code  written in the catch block is executed when the exception handler is invoked  by the Java runtime system. The flowchart shown in  below figure displays the  process of handling exceptions by using the try-catch block:

            Figure: Process Flow Structure of the try–catch block
When a program  is  executed,  its  methods are  checked for  exceptions.  In
case  an  exception  is  encountered,  the  corresponding  exception  handler  techniques are searched. If no exception handling technique is found, the  program terminates abruptly. However, if an exception                                                                                    
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


5.  Write notes on:
a.  The java.sql Package
b.  The javax.sql Package

Ans-a. The java.sql Package

The java.sql package is also known as the JDBC core API. This package  includes the interfaces and  classes  to perform JDBC core operations,  such  as  creating and  executing  SQL queries.  The  java.sql package consists of  the interfaces and classes that need to be implemented in an application to  access  a  database.  The  developer  uses  these  operations  to  access  the  database  in  an  application.  The  classes  in  the  java.sql  package  can  be  classified into the following categories based on different operations:

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


The javax.sql  Package
The javax.sql package is also called  a  JDBC extension API, and provides  classes and interfaces to access server-side data sources and process Java  programs. The JDBC extension package supplements the java.sql package,  and provides the following support:

  DataSource

  Connection and statement pooling

  Distributed transaction

                                                                                     
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM


6.  Create Simple JSP Pages with proper java application.

Ans- Creating Simple JSP Pages

In  this  section,  we  are  creating  a  simple  web  application  with  two  JSP  pages. As we have  not yet discussed the various constructs used in JSP,  such as scriptlets and directives, we create simple JSP pages to give you  an  idea  of  how  they  can  be  designed,  used,  and  accessed  by  a  web  application.  Now,   let's   create   a  SimpleApp  web application containing two JSP  pages.    Create    a  SimpleApp folder  in  the  unit14  directory.  The first  JSP page we will create is user.jsp, which provides an HTML form  with two  input fields to enter the name and city of a user. Listing  14.1  provides the                                                                                  
CONTACT US FOR READY MADE SOLVED ASSIGNMENTS
CONTACT NUMBER : +91 - 8285115522
EMAIL ID : SMUDOC@GMAIL.COM



No comments:

Post a Comment