E-commerce Fundamentals: Key Concepts and Technologies

Posted by Anonymous and classified in Language

Written on in English with a size of 9.06 KB

What is E-commerce?

E-commerce is the process of buying and selling products or services online. It allows people to shop using websites or apps, enabling purchases anytime and from anywhere. This method saves time, provides more choices, and is widely adopted by businesses today.

Define EDI

EDI (Electronic Data Interchange) is the electronic exchange of business documents between companies. It replaces paper-based methods, facilitating the quick and secure transmission of invoices, purchase orders, and more. EDI reduces errors and speeds up business processes.

What is a Digital Signature?

A digital signature is an electronic form of a signature used to verify the sender's identity and ensure document integrity. It is widely used in secure communication, online banking, and legal documents.

What is HTML?

HTML (HyperText Markup Language) is the primary language for creating websites. It structures content using tags like <html>, <head>, <body>, and others. Web browsers interpret HTML to display text, images, links, and videos on websites.

What is WML?

WML (Wireless Markup Language) is similar to HTML but designed for small-screen mobile devices. It was used for developing WAP (Wireless Application Protocol) websites, allowing mobile phones to access simple text-based content.

What is Cryptography?

Cryptography is a method of securing data by converting it into a secret code. Only individuals with the correct key can decipher the message. It is crucial for online communication, ensuring privacy and protection against hacking.

Define Internet

The internet is a global network of computers that facilitates information sharing and connectivity. It provides access to websites, email, videos, and online services, playing a major role in communication, education, and business.

What is a Web Browser?

A web browser is software used to access and view websites. Popular examples include Google Chrome, Mozilla Firefox, and Safari. Browsers help users read and display web pages and interpret HTML files.

What is B2B?

B2B (Business to Business) is an e-commerce type where one business sells products or services to another. An example is a company selling office supplies to other businesses, often involving large orders and long-term relationships.

Role of a Firewall

A firewall is a security tool that controls incoming and outgoing network data. It blocks unauthorized access and protects systems from hackers and viruses, used in both personal and business networks.

Section B: Short Answers

Types of E-commerce

Main e-commerce models include B2B (Business to Business), B2C (Business to Customer), C2C (Customer to Customer), and C2B (Customer to Business). B2B involves sales between businesses, like a wholesaler and retailer. B2C is direct selling to consumers, seen on sites like Amazon. C2C allows customers to sell to each other via platforms like OLX or eBay. C2B involves individuals offering services to companies, such as freelancers or influencers. These models efficiently serve diverse buyer and seller needs online.

Features of E-commerce

E-commerce offers 24/7 service, allowing shopping at any time. It is cost-effective, reducing store maintenance expenses. Customers can easily compare products and prices, benefiting from wide choices and quick delivery. Secure online payments via cards, UPI, and wallets are standard. Sellers can reach a global market and gather customer feedback for improvements.

Limitations of E-commerce

E-commerce has limitations, including exclusion of those without internet access. Some customers have trust and privacy concerns. The inability to physically inspect products before purchase can lead to dissatisfaction. Technical issues may delay transactions, and deliveries can experience delays. Risks like fraud, hacking, and fake websites are potential drawbacks in online business.

Electronic Payment Systems

Common e-payment systems include credit and debit cards, net banking for direct account payments, and UPI for fast mobile transactions. Mobile wallets like Paytm or Google Pay store digital money for instant payments. Other methods include prepaid cards and electronic cheques, all designed for secure online transactions.

Short Notes

  • HTTP: HTTP (HyperText Transfer Protocol) defines rules for web data transfer, enabling browsers to fetch and display websites.
  • VPN: A VPN (Virtual Private Network) provides a secure internet connection, masking your identity and protecting data.
  • Digital Cash: Digital cash is online money used for electronic purchases, serving as a digital alternative to physical currency.

Section C: Long Answers

E-commerce: Advantages and Disadvantages

E-commerce, the buying and selling of goods and services online, offers convenience, speed, and accessibility for consumers and businesses. Key advantages include 24/7 availability, reduced operational costs, access to a global audience, and faster transactions. Customers benefit from detailed product information and user reviews, allowing informed decisions. However, disadvantages exist. Customers cannot physically inspect products before buying, potentially leading to dissatisfaction. Risks such as fraud, online scams, and data theft are prevalent. Technical difficulties and internet connectivity issues can disrupt transactions. Furthermore, delivery times and return processes may cause delays or inconvenience. Despite these challenges, e-commerce continues its rapid growth, significantly impacting the global economy.

E-commerce Business Models

The four primary e-commerce business models are B2B, B2C, C2C, and C2B. B2B (Business to Business) involves online transactions between businesses, such as a manufacturer selling to a wholesaler. B2C (Business to Customer), the most prevalent model, sees businesses selling directly to consumers via websites or apps, exemplified by Amazon and Flipkart. C2C (Customer to Customer) facilitates individuals selling to each other through platforms like OLX and eBay, which act as intermediaries. C2B (Customer to Business) is where individuals offer products or services to companies, like freelance designers or photographers. Each model caters to specific needs, target audiences, and offers distinct benefits, streamlining online commerce across various industries.

HTML: Structure and Features

HTML (HyperText Markup Language) is the standard language for creating web pages, dictating how browsers display content like text, images, and videos. It utilizes elements called tags, with <html> as the root, <head> for metadata, and <body> for main content. Headings use tags like <h1> to <h6>, paragraphs use <p>, links use <a>, and images use <img>. HTML is user-friendly, flexible, and universally supported by browsers. It integrates seamlessly with CSS for styling and JavaScript for interactivity. A key feature is its platform independence, ensuring compatibility across computers, mobiles, and tablets, making it fundamental to web development.

XML: Structure and Features

XML (eXtensible Markup Language) is designed for storing and sharing data in a human-readable format. Unlike HTML, XML allows custom tags, such as <product> or <price>, enabling it to carry data effectively. It is both machine-readable and human-readable. XML's structure is straightforward, beginning with a root tag and containing nested tags, where every opening tag must have a corresponding closing tag. It is extensively used for data sharing between systems, particularly in web services and APIs, facilitating data transfer between platforms like websites and mobile apps. XML's key features include simplicity, flexibility, self-descriptiveness, and platform independence. It also supports data validation through DTD or XML Schema, making it ideal for database storage and inter-application data exchange.

Network Security Techniques

Network security protects computer networks and data from unauthorized access, misuse, or theft, ensuring data safety and restricted access to authorized users. Key techniques include firewalls, which act as barriers against harmful traffic; encryption, which converts data into a secret code for secure transmission; and antivirus software, which detects and removes malware. Strong passwords and two-factor authentication prevent unauthorized logins. VPNs (Virtual Private Networks) create secure internet connections, especially for remote access. Access control systems limit user access to specific data or network segments. Regular software updates and security patches are also vital. Robust network security is essential for businesses, governments, and individuals to safeguard their digital information.

Related entries: