B2C E-Commerce Refers

Running head: WEB COMMERCE 1

WEB COMMERCE 6

 

Web Commerce

Students Name

Institution

Web Commerce

Question 1

E-commerce refers to any transaction initiated and completed over the Internet, and it entails the transfer of rights and ownership to use products. The transactions do not necessarily have a price and include free download items. In general, E-commerce entails transactions carried out on the Intranet, Internet, World Wide Web, Extranet, and even email. E-business, on the other hand, refers to e-commerce transactions and those that are run traditionally. E-business is wider than E-commerce because it comprises the transactions involved in E-commerce.

Read more about Research Paper Writing Help for Any Student. Feel free to order your paper from Essays-Services and forget about your worries.

E-commerce falls under two main groups, which are online shopping and online purchasing. Under online purchasing, companies give information to customers on how to place orders, request quotes and prices of the products, and submit purchase orders. Online shopping, on the other hand, enables companies to provide information about their products so that customers can make an informed decision on whether or not to buy the products.

E-business, which incorporates the whole business cycle, requires a strategy. The strategy involves four different directions of planning. There is vertical planning, which coordinates the front- and back-end systems of a website; horizontal planning, which harmonizes e-commerce with supply chain management, customer relationships, and resource planning; lateral planning, which helps organizations to manage business suppliers, customers, and suppliers; and the downward planning, which integrates new technologies and innovations and business processes.

Question 2

B2B e-commerce refers to business transactions between companies. It deals with associations between and among companies. This type of e-commerce comprises about 80%, and experts predict that this type of e-commerce will continue to experience a more rapid growth than other types of e-commerce. An example of B2B e-commerce is Dell buying microprocessors from Intel. Intel and Dell are big companies and transactions between them qualify as B2B e-commerce. This type of e-commerce has two main components: e-markets and e-infrastructure. E-markets include websites that allow the interaction between buyers and sellers and completion of transactions. E-infrastructure, on the other hand, consists of logistics, auction solution software, application service providers, and outsourcing of functions like web hosting.

B2C e-commerce refers to any transactions between businesses and customers. This entails the customer collecting information about a product, purchasing, and receiving it over an electronic network. This is the earliest and second largest form of e-commerce, and it originates from online retailing from companies like Drugstore.com and Amazon.com. An example of a B2C e-commerce includes Dell selling a laptop to an individual. Dell in this case is the manufacturer of the laptop and the customer is the end user.

Question 3

Client server technology refers to a network of distributed or shared computing whereby tasks and computing abilities are divided between the servers and the users or clients. The server has the responsibility of processing and storing data that are common to all the users in the company, and any user is able to access the data.

IP Multitask refers to a technology that conserves bandwidth and reduces traffic by delivering a single stream of data to several recipients simultaneously. There are three different types of IP addresses. The first type is the unicast where IP addresses transmit data to a single destination node. Examples of a unicast are http, telnet or pop3, where one sender transmits information to one receiver. The second type is the broadcast, where an address transmits data to all nodes in a sub-network, for instance, all hosts in a Local Area Network. The last type is the multicast, where an address delivers messages to a number of destination nodes, which do not have to be in the same sub-network. An example of a multicast is a video transmission network, where one computer transmits videos to several other computers. Through a multicast, the other computers are able to receive and transmit data at the same time.

Question 4

The single tier architecture refers to the architecture where the application logic, the database logic, and the presentation logic run off from one server. This is the simplest form of architecture, and it is very insecure. Clients are able to access files directly and they can, therefore, move, edit or even delete the files. However, it does not allow different users to access the files at the same time, and one can only edit a file while the other person has read-only access to it. This architecture is very cheap, though.

Under the multi-tiered architecture, all the mentioned logics run from different servers. The multi-tiered architecture can either be 2-tier, 3-tier to N-tier. In the 2-tier architecture, presentation and application logics run from the same server, while the database runs from a different server. In the 3-tier architecture, the presentation, application, and the database logics run from their own servers.

While developing a web-based application, the best choice would be the multi-tiered architecture. This is because it is exceptionally secure since the three logics run from different servers. The database gains protection from the middle layer, making it difficult for clients to manipulate data. The multi-tiered architecture is exceptionally fast and can allow more than fifty users at a time. This means that different clients are able to access the servers at the same time. The only drawback of this tier is that it is very costly to install.

Question 5

The first step towards securing a network is establishing a corporate policy. The policy stipulates what the company needs to protect itself against and measures to take when dealing with internal threats and external attacks. The second step entails the collection of baseline information, which involves analyzing the normal system events. This will assist in monitoring any intrusion. It is important to review these events every six months. The third step is monitoring the intrusions. The installation of new programs that will enable 24-hour monitoring of the traffic is crucial. Encrypting data is another step that will ensure security of the network. Under this, data that is not in use will go through encryption, which will require decryption for someone to use. Locking the networks is another effective way of ensuring that the network is secure. There will be a need to minimize the use of Wi-Fi connections. When there is a need to use them, they have to be fully locked and subjected to encryption. The last step is the installation of antivirus and anti-malware programs.

Question 6

The best choice for making an online payment is by credit card. A credit card has many benefits over other forms of payments due to its convenience and immediacy. Credit cards do not have a daily limit like debit cards, which enables one to purchase items that cost above the daily debit card limits. Payments by credit cards are traceable, meaning that one can track the expenses through the credit card account. If someone else uses the card fraudulently, it is possible to report this to the bank, which will in turn halt the payment for services or products incurred by someone else. Moreover, one can install anti-viruses to protect the details from hackers and other online users.

It is also possible to create a temporary card to make specific payments online. This is aimed at protecting a cardholder from exposing their personal details to strangers. In addition, most credit cards have automatic security. This protects cardholders should the product warranties exceed the producers warranty.

Related essays