Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1. What are the potential limitations of online market research? Can they
be overcome? How?
Limitation of conducting market research online has been
discussed n below:
1) Creditability of the data:
In spite of the growth of Internet users in 2010, Miniwatts Marketing Group
(2010) also shows that the world population has increased to 68.4 billion, so
the Internet penetration only takes up 28.4% of total population. It can be
noted that the Internet users can be small portion of actual customers for
companies. The data that marketers collect through online market research
does not embrace extensive range of customers.
2) Degree of customer cooperation:
Although marketers have diverse opportunities to conduct market research
online, they cannot assure the willingness of customers to participate in
research. Several concerns of customers toward online market research
consist of privacy and security because people are reluctant to reveal their
personal information
3) Limited sampling and respondent availability.
Certain populations are less likely to have internet access and to respond to
online questionnaires. It is also harder to draw probability samples based on
e-mail addresses or website visitations.
4) Possible cooperation problems.
Although online surveys in many fields can attain response rates equal to or
slightly higher than that of traditional modes, internet users today are
constantly bombarded by messages and can easily delete your advances.
5) No interviewer.
A lack of a trained interviewer to clarify and probe can possibly lead to less
reliable data.They can overcome the limitations of online marketing research
through the development of opportunities sectors. Those are given below:
Closer connection with customers
The Internet has differentiated the field of market research. Companies can
reach their customers fast and effortlessly through online market research
that is considered as an inexpensive way to gain information that firms
desire to direct their futures.
Business Internationalization
The Internet has offered a worldwide platform for people to use. Combined
with traditional market research techniques, online market research not only
authorizes companies to accumulate investigated marketing resources with
superior quality and quantity but also globalise the firms with world-wide
information
Diversity of research methods
There are more multiform methodologies of online research provided in
virtue of the development and popularity of the Internet. Most used methods
such as online surveys, online focus group bulletin, search log analysis, and
clickstream analysis are widely used by marketers as online research
methods (Krishnamurthy 2003). Marketers do not have to confine market
research to traditional manners; instead, a variety of choices provided
through the Internet can be selected as firms can identify the ones that are
suitable to apply.
Personalized Research
The online techniques have enriched the visual presentation of surveys,
including extensive stimuli potential of using colors, sounds, and graphics;
flexible forms of questionnaires, and greater delight in participation of
research
Cooperation with popular virtue communities
Many corporations already cooperated with famous websites and search
engines such as Yahoo and Google (www.google.com). Those online digital
companies assist several firms with their advertisements of online surveys
on the main Web pages or pop-ups.
2. What are the differences between e-commerce and e-business?
ECommerce
EBusiness
Ecommerce involves the mandatory use of E-business can involve the use of internet,
internet.
intranet or extranet.
Example- Buying of pen drive from
Amazon.com is considered Ecommerce.
3. What is EDI?
Electronic data interchange (EDI) is an electronic communication method
that provides standards for exchanging data via any electronic means. By
adhering to the same standard, two different companies or organizations,
even in two different countries, can electronically exchange documents (such
as purchase orders, invoices, shipping notices, and many others). EDI has
existed for more than 30 years, and there are many EDI standards.
Electronic Data Interchange (EDI) is the electronic interchange of
business information using a standardized format; a process which allows
one company to send information to another company electronically rather
than with paper. Business entities conducting business electronically are
called trading partners.
4. What is search engine? Write down the three name of search engine.
Search engines are programs that search documents for specified
keywords and returns a list of the documents where the keywords were
found. A search engine is really a general class of programs, however, the
term is often used to specifically describe systems like Google, Bing and
Yahoo! Search that enable users to search for documents on the World Wide
Web.
The Top Five List of Search Engines:
Search
Provider
Searches
(Millions)
2,317
Yahoo
908
MSN
592
Ask
232
Others
40
Total
4,354
5. What is EFT?
Electronic funds transfer (EFT) is the electronic transfer of money from
one bank account to another, either within a single financial institution or
across multiple institutions, through computer-based systems and without
the direct intervention of bank staff. EFTs are known by a number of names.
Electronic Funds Transfer (EFT) is a system of transferring money from
one bank account directly to another without any paper money changing
hands. One of the most widely-used EFT programs is Direct Deposit, in which
payroll is deposited straight into an employee's bank account, although EFT
refers to any transfer of funds initiated through an electronic terminal,
including credit card, ATM, Fed wire and point-of-sale (POS) transactions. It is
used for both credit transfers, such as payroll payments, and for debit
transfers, such as mortgage payments.
iv.
v.
It has some reasons to work as direct marketing tools that are presented
below:
10. Compare and contrast intranet, extranet and the Internet as a whole.
Intranet:
An intranet is a private computer network that uses Internet Protocol
technologies to securely share any part of an organization's information or
operational systems within that organization.
Extranet:
An extranet is a private network that uses Internet protocols, network
connectivity. An extranet can be viewed as part of a company's intranet that
is extended to users outside the company, usually via the Internet.
Internet:
The Internet is a global system of interconnected computer networks that
use the standard Internet Protocol Suite (TCP/IP) to serve billions of users
worldwide.
The main difference between the three is accessibility. The Internet is public
while the other two are highly restricted. Home users, if they use one at all,
would only use an intranet to share files between computers and typically
use the Internet when searching for and sharing information. Businesses and
organizations are the main users of both intranets and extranets in order to
restrict access to confidential data.
11. What are the three main factors to consider when choosing the
best hardware platform for your web-site?
When we are choosing the best hardware platform for web-site, we have to
consider some factors. There has too many factors but three of them are
presented below:
Pricing
Price is not the only principle. We all know that, most often than not, we get
what we pay for. If you go for the cheapest option, you cant expect it to
perform like the more expensive option. The truth of the matter is that
quality hardware costs money.
Payment Options
This wont be a large factor for everyone, but for some, payment options are
a cause for consideration. If it is important for you to be able to pay for your
web hosting services through something like an e-wallet as opposed to a
credit card.
Areas of Specialization
Not all hosting providers are the same, just as not all customers are the
same. A provider may offer services that are perfect for customers with small
blogs but inappropriate for a business, or vice versa. Before signing up, look
carefully at the providers specialty area. You should opt for a company that
understands your needs.
Another one is also too much important to consider before choosing a best
hardware platform for a web-site.
Specs and Limitations
What kind of content do you plan to have on your site? If you opt for the
cheapest hosting plan available and want to host videos and rich content,
you probably will not have access to the RAM and processing power that you
will need.
12. Other than search engines, what are some of the most use of
the Internet?
Other than a search engine, Internet is today one of the most important part
of our daily life. There are large numbers of things that can be done using
the internet and so it is very important. Some of the most uses of internet as
a search engine are presented below:
A. Communication.
At the moment the easiest thing that can be done using the internet is
that we can communicate with the people living far away from us with
extreme ease.
B. Research
Now the point that has been placed next is research. In order to do
research you need to go through hundreds of books as well as the
references and that was one of the most difficult jobs to do earlier.
C. Education
The next point that we have in this list is education. Yes you read it
right. Education is one of the best things that the internet can provide.
There are a number of books, reference books, online help centers,
experts views and other study oriented material on the internet that
can make the learning process very easier.
D. Financial Transaction
The next use mentioned here is financial transaction. Financial
transaction is the term which is used when there is exchange of money.
With the use of internet in the financial transaction, your work has
become a lot easier.
E. Real Time Updates
Real time updates have been placed at the number fifth position here.
This has been mentioned here in regards to the news and other
happenings that may be on-going in different parts of the world but
with the use of internet we come to know about it very easily and
without any difficulty.
F. Leisure
Leisure is the option that we have next in the list. Yes you heard it
right. Right from watching your favorite videos to listening songs,
watching movies, playing games, chatting with the loved ones has
been possible due to internet.
G. Online Booking
Do you remember the time when the only way to book the railway
tickets or bus tickets or plane tickets was to visit their centers at the
designated location? That time has completely changed and today
everything is available at the mouse click.
H. Blogging
There are many people who are very much interested in writing blogs
and for them internet is the best place. They can not only write blogs
as per their wish but can also publicize their work so that their work
reaches to most of the people and they get appreciated.
I. Shopping.
Yes you read it correctly. This very list starts with the point mentioned
as shopping at the tenth place. Shopping has now become one of the
most pleasing things to do using the internet. Whenever you find time,
just visit the concerned websites and order the items that you need
from there.
i.
ii.
iii.
iv.
i.
ii.
iii.
Data Modeling techniques are used for the Data Warehouse design.
Optimized for read operations.
High performance for analytical queries.
Is usually a Database.
Data mining
Data mining is a method for comparing large amounts of data for the
purpose of finding patterns.
Data mining is normally used for models and forecasting.
Data mining is the process of correlations, patterns by shifting through
large data repositories using pattern recognition techniques.
Ecommerce deals with various media: data, text, video, web pages, and
internet telephony.
When the proxy digital product, digital process, the kind of trade will
be purely electronic commerce.
For example, if you purchased software from Amazon, the type of ecommerce trade is purely because the company will send you the
software via the Internet or email.
Pure e-commerce is when everything happens on the internet.
For example: Buying music / movies on iTunes. In these case the
product and services are digital.
B. Partial e-commerce:
On the other hand, if one of the three factors has become digital and
more concrete, there will be a mix between traditional commerce and
electronic commerce. We call this mix: electronic commerce partial.
For example: if I bought a book from Amazon, the type of ecommerce trade is partial because the company will send you a book
on the mail.
Partial e-commerce is when a company will sell a good through the
internet but the fulfillment of the good will need to take place in the
"real" world.
For example: buying a book on Amazon, they will have to send it to
you physically.
For an effective shopping cart script you must have website wizards,
shopping features, payment options, shipping and tax configurations,
statistics and security.
5) E-commerce payments
To accept and handle payments through your e-commerce website you will
need an e-commerce payments system which will accept electronic
payments for online transactions. You can either open a merchant account
with your bank to receive online payments through credit or debit cards or
you can use a payments processing company, such as PayPal or World Pay,
to handle the payments for you.
6) Marketing your e-commerce website
Once youve created your e-commerce website and its up and running, you
will need to spread the word to attract customers. Make use of banner
ads, search engine optimization (SEO), pay per-click advertising (PPC) and
pop-ups to drive traffic to your site.
2. Start shopping
Find the products you want by browsing through categories, typing keywords
into the search bar or by viewing products on promotion and in your
favorites. Add the required quantity of each item into your shopping trolley,
and the trolley will total up the guide price.
3. Select your payment type
Select from online payment or pay at the door by credit or debit card. Online
payment will not be taken from your account until after you have received
your delivery.
4. Amend your order
Once you have placed your order, you can amend your order, adding or
deleting items up until 11pm on the night before your delivery.
5. Receive your shopping
Your delivery will be brought to you in a temperature controlled van, by a
Tesco employee. The bags will be carried into your preferred room in your
home if this is required and you can check every item to make sure your
order is complete and to ensure freshness. If items were not available, the
driver will bring substitutions which you can choose to keep or return. You
will only be charged for the items that you receive.
6. We take payment after delivery, based on the exact items
accepted
We recommend that you check your delivery against your order confirmation
email. If you chose to pay at the door by card, your driver will process this
based on the exact items that were delivered. Online payments will be taken
by the end of your delivery day, based on the exact items that were
delivered. Please read the information about guide price to understand why
there may be a slight difference between the guide price on your order
confirmation email and the final amount charged.
18. What are the instruments can use to pay online?
There has so many instruments to payment for online shopping or
transaction. Such as:
When users receive data from the Internet to their computer, the speed of
the transfer is called
the download speed. Download speed is normally
many times faster than upload speed.
4. Services
The services provided by an ISP can vary greatly, with service offerings
based on pricing tiers, speed or business needs. Some companys offer the
same services to all of their customers, while others specialize in online
access only or specialty services like cloud storage and security software.
5. Residential:
Most ISPs offer service to homeowners or renters.
6. Commercial:
In general, ISPs usually offer different packages to commercial customers
such as corporations or nonprofit organizations.
7. Small Business:
While many ISPs lump small business customers together with other
commercial customers, some offer distinctive packages at a lower price to
small businesses.
8. Bundling:
Internet service providers that also offer telephone or television services
often offer bundled packages of multiple services at a discounted rate.
9. Support
There are many reasons why customers may need support, including slow
speeds, pages that won't load and unusual charges on their bills.
10.
Installation process:
The installation process is usually quick and efficient; many ISPs provide this
at little or no cost with a qualified contract. Each connection type has a
different installation process. For example, dialup usually does not require
any installation of hardware or software.
11.
There are various ways to connect with each ISP support service, and some
are quicker and easier than others.
12.
Reliability
Reliability refers to both the signal, which is sometimes lost and has to
reconnect, and the speed, which varies greatly depending on usage. ISPs
that use dedicated lines, such as copper cables, fiber optics and DSL, are
very rarely completely unavailable.
13.
Connection quality:
A good Internet connection has strong signal strength, and outages are rare.
14.
Data caps:
Some ISPs cap data at a certain level each billing cycle; others allow
unlimited data usage.
15.
Availability
Not all Internet service providers are available in all areas of the country.
Customers should check with a provider to determine if coverage is an option
at their home or business address. Even within the same city, there are
different providers and package options according to zip codes.
16.
Coverage area:
Most areas have a limited number of ISPs available; some areas may only
have one or two.
Extra features
Often an ISP offers extra features for an additional cost; sometimes these
features are included free with any Internet plan.
17.
Anti-virus software:
Many providers offer services to help build and maintain personal or business
websites.
19.
Email address:
One or more email addresses are often included with the Internet service.
20.
Wi-Fi access:
Some ISPs offer unlimited Wi-Fi access through various hot spots across the
United States.
Mountain
of
reasons
that
are
working
for
it. Since
the
as
Ecommerce generated.
Hence because
of these
very new needs like online conversions and transactions, the online
businesses
have
importance
of A Shopping
Cart
for their Online Stores. In an Online survey, some individuals were asked
why they preferred Shopping Online. It highlighted the following reasons:
Time Saving
73 %
More Variety
67 %
Easy to Compare
59 %
Prices
No Crowd
58 %
Lower Prices
55 %
Spend Less on
Gas
40 %
Less Taxes
30%
The shopping cart software can organize the information for all successful
transactions .This further ensures that the Transaction run smoothly. It
enables the employer to deliver what the customers orders.
(2) SEO Friendly Carts:
Search engine optimization (SEO) is a crucial aspect of any online business
site. A good shopping cart can ensure maximum SEO-Juice follows into the
site, by automatically creating keyword-rich URLs for its products or
services.
(3) Business Performance Check:
A good-quality shopping cart offers rich features Like Product Catalog
Management and a a over-all simplified business management by producing
a wide set of reports to Monitor Regular Sales and provide Opportunities for
Customer Service.
(4) Discounting & Coupons:A good Shopping cart is enabled with
functionalities such as Back-End Marketing, Creating Wish-lists, Discount /
Sale coupons, Inventory Tracking, Up-selling,etc. Hence the Shopping carts
act as a Profit Medium between the payment processors and websites.
Broad Questions.
1. What is cooperative and competitive strategy?
A cooperative strategy in which firms combine some of their resources
and capabilities to create a competitive advantage. Involve firms with
some degree of exchange and sharing of resources and capabilities to codevelop, sell, and service goods or services.
Product number
Thumbnail
Stock levels
Description
While a CMS does have the capability to be a viable candidate for this
type of data model, it is more attuned to a rich and immersive content
model. A rich and immersive content model could include things like:
Multiple media channels i.e. ad servers, video providers
4. Silos or APIs?
Many web applications are self-serving, and by self-serving I mean they have
a single goal to achieve and a single endpoint. Think of the classic
ecommerce site: you manage and publish your product database, you
manage online transactions and you report on the results. Mobile devices
and responsive web design also fall into this self-serving category, as they
too share a single goal.
Travel companies that repurpose content to support mobile applications for
inspirational search experiences
Publishing houses with print operations that repurpose content or product
data for offline publications
Organizations that publish online newsletters that combine product
information with specialized content, personalized content.
5. Describe the classification of e-commerce by the nature of
transactions.
E-commerce is the process of buying and selling of various products and
services by businesses through the Internet.
Classification of E-commerce by the nature of transactions:
Business to Consumer (B2C): B2C stands for Business to Consumer
as the name suggests, it is the model taking businesses and
consumers interaction. Online business sells to individuals. The basic
concept of this model is to sell the product online to the consumers.
Business to Business (B2B): B2B stands for Business to Business. It
consists of largest form of Ecommerce. This model defines that Buyer
and seller are two different entities. It is similar to manufacturer issuing
goods to the retailer or wholesaler.
Consumer to Consumer (C2C): C2C stands for Consumer to
Consumer. It helps the online dealing of goods or services among
people. Though there is no major parties needed but the parties will
not fulfill the transactions without the program which is supplied by the
online market dealer.
Peer to Peer (P2P): is a discipline that deal itself which assists
people to instantly shares related computer files and computer sources
without having to interact with central web server.
6. Define protocol with example(s).
Protocol is a system of rules that allow two or more entities of
a communications system to transmit information via any kind of variation of
a physical quantity. These are the rules or standard that defines
the syntax, semantics and synchronization of communication and
possible error recovery methods. Protocols may be implemented
by hardware, software, or a combination of both
ASP
JSP
Full Form
Java
Server Pages
Language
Server Side
Scripting Language
Server
IIS
(Internet Information Server)
Apache
Tomcat
Family
.Net
Java
Database
MS SQL or
you can connect it through
ADO (ActiveX data object) to
any database.
You can
connect it to any data base
with the help of drivers
(library).
Programming
and Scripting
Language
Visual
Basic language
Java
Owners
Microsoft
Oracle
Launched in
2002 by
Microsoft
1999 by
Sun Microsystems
Components
COM
component
Java Beans
and extensible JSP tags
Compatible with
database
Yes
(using
COM)
Yes
(using
JDBC)
Integrate
with
Data Source
ODBC
compliant database
ODBC
JDBC compliant database
Extensive
Support
Yes
Yes
Platforms
Microsoft
Windows
Run
in
Platform
or
independent.
Maintenance
Difficult
Easy
Security
Low
High
Tool
and
Any
platform
Security against
system crashes
No
Yes
Memory
Protection
No
Yes
Customizable
Tags
No
Yes
Cost
High
Free
Leak
10.
Identify different security requirements for safe epayments.
E-commerce security is the protection of e-commerce assets from
unauthorized access, use, alteration, or destruction.
A medium of payment between remote buyers and sellers in cyberspace:
electronic cash, software wallets, smart cards, credit/debit cards.
SECURITY REQUIREMENTS
12. Describe the pros and cons of secret key encryption and public
key encryption and their complementary use.
Pros and Cons of Public-key Systems.
Public-key systems have a clear advantage over symmetric algorithms: there
is no need to agree on a common key for both the sender and the receiver.
As seen in the previous example, if someone wants to receive an encrypted
message, the sender only needs to know the receiver's public key (which the
receiver will provide; publishing the public key in no way compromises the
secure transmission). Another important advantage is that, unlike symmetric
algorithms, public-key systems can guarantee integrity and authentication,
not only privacy. The basic communication seen above only guarantees
privacy. We will shortly see how integrity and authentication fit into publickey systems.
The main disadvantage of using public-key systems is that they are not as
fast as symmetric algorithms. Public key algorithms are powerful but this, in
turn, adds a computation cost. The amount of Computation needed in public
key algorithms is typically several orders of magnitude more than the
amount of computation needed for symmetric key algorithms.
Private Key (secret key),
In cryptography, a private or secret key is an
encryption/decryption key known only to the party or parties that exchange
secret messages. In traditional secret key cryptography, a key would be
shared by the communicators so that each could encrypt and decrypt
messages. The risk in this system is that if either party loses the key or it is
stolen, the system is broken. A more recent alternative is to use a
combination of public and private keys. In this system, a public key is used
together with a private key. See public key infrastructure (PKI) for more
information.
Step #1 Keep platforms and scripts up-to-date: One of the best things you
can do to protect your website is to make sure any platforms or scripts
youve installed are up-to-date. Because many of these tools are created as
open-source software programs, their code is easily available both to goodintentioned developers and malicious hackers.
Step #2 Install security plug-in, when possible: To enhance the security of
your website once your platform and scripts are up-to-date, look into security
plug-in that actively prevent against hacking attempts.
Step #3 Lock down your directory and file permissions: All websites can be
boiled down to a series of files and folders that are stored on your web
hosting account. Besides containing all of the scripts and data needed to
make your website work, each of these files and folders is assigned a set of
permissions that controls who can read, write, and execute any given file or
folder, relative to the user they are or the group to which they belong.
15. Outside firewall, what are the major technologies used to ensure
Internet security?
Internet security is a branch of computer security specifically related to
the Internet, often involving browser security but also network security on a
more general level as it applies to other applications or operating systems on
a whole. Its objective is to establish rules and measures to use against
attacks over the Internet.
1)
2)
3)
4)
5)
6)
7)
8)