Vb Flashcards

(27 cards)

1
Q

What features and functionalities should be included in Shopmax’s e-commerce website?

A

Features and functionalities should include:
* User-friendly interface
* Product search and filtering options
* Shopping cart and checkout process
* Customer account management
* Order tracking
* Customer reviews and feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Suggest four online payment options for Shopmax’s e-commerce website.

A

Four online payment options include:
* Credit/Debit card payments
* Mobile payment solutions
* Bank transfers
* E-wallet services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can the security of customer transactions be ensured on Shopmax’s e-commerce website?

A

Security can be ensured through:
* Implementation of SSL certificates
* Use of secure payment gateways
* Regular security audits
* Educating customers on safe online practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What strategies can Shopmax implement to promote its e-commerce website?

A

Strategies to promote the website include:
* Social media marketing
* Search engine optimization (SEO)
* Email marketing campaigns
* Collaborations with influencers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the role of digital certificates in e-commerce transactions?

A

Digital certificates establish trust and authenticity by:
* Validating the identity of the parties involved
* Enabling secure data transmission
* Ensuring data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Suggest two e-commerce security protocols for Shopmax’s site.

A

Two security protocols include:
* HTTPS (HTTP Secure)
* TLS (Transport Layer Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the benefits of e-commerce for the merchant?

A

Benefits for the merchant include:
* Expanded market reach
* Lower operational costs
* Increased sales opportunities
* 24/7 availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the disadvantages of e-commerce for the consumer?

A

Disadvantages for the consumer include:
* Lack of physical inspection of products
* Potential for fraud
* Delivery delays
* Privacy concerns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the social issues in the e-commerce environment?

A

Social issues include:
* Digital divide
* Job displacement
* Consumer privacy concerns
* Impact on local businesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identify the type of e-commerce for Mukwala’s scenario.

A

Mukwala’s scenario is B2B (Business to Business) because he sells directly to hospitals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identify the type of e-commerce for Ngozi’s scenario.

A

Ngozi’s scenario is B2B (Business to Business) as she sells to businesses and organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identify the type of e-commerce for Kwame’s scenario.

A

Kwame’s scenario is B2C (Business to Consumer) because he sells directly to restaurants and hotels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Identify the type of e-commerce for Lilian’s scenario.

A

Lilian’s scenario is B2C (Business to Consumer) as she offers services to individual clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identify the type of e-commerce for Omar’s scenario.

A

Omar’s scenario is B2B (Business to Business) as he sells to retailers and other businesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Identify the type of e-commerce for Jane’s scenario.

A

Jane’s scenario is B2C (Business to Consumer) as she sells vintage clothing to individual consumers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identify the type of e-commerce for Amara’s scenario.

A

Amara’s scenario is B2C (Business to Consumer) as she sells artwork directly to consumers.

17
Q

Identify the type of e-commerce for TechSupplies’ scenario.

A

TechSupplies’ scenario is B2B (Business to Business) as they sell to government agencies.

18
Q

Identify the type of e-commerce for GlobalConsult’s scenario.

A

GlobalConsult’s scenario is B2B (Business to Business) as they provide services to government entities.

19
Q

Identify the type of e-commerce for the Ministry of Education’s scenario.

A

The Ministry of Education’s scenario is G2G (Government to Government) as it facilitates procurement between government entities.

20
Q

Differentiate between asymmetric cryptography and symmetric cryptography.

A

Asymmetric cryptography uses two keys (public and private) while symmetric cryptography uses a single key for both encryption and decryption.

21
Q

Differentiate between cipher text and message digest.

A

Cipher text is the encrypted output of plaintext, while message digest is a fixed-size hash representation of data.

22
Q

Differentiate between e-commerce and e-business.

A

E-commerce refers specifically to online transactions, whereas e-business encompasses all aspects of running a business online.

23
Q

Differentiate between digital certificates and digital signatures.

A

Digital certificates authenticate identities, while digital signatures verify the authenticity and integrity of a message.

24
Q

What are the security requirements for safe e-commerce transactions?

A

Security requirements include:
* Confidentiality
* Integrity
* Authentication
* Non-repudiation

25
Discuss the ability of encryption to fulfill e-commerce security requirements.
Encryption provides confidentiality by converting data into a secure format that can only be accessed by authorized parties.
26
Discuss the ability of hashing to fulfill e-commerce security requirements.
Hashing ensures data integrity by producing a unique fixed-size output that represents original data, making it easy to detect changes.
27
Discuss the ability of digital signatures to fulfill e-commerce security requirements.
Digital signatures provide authentication and non-repudiation, ensuring that the sender cannot deny sending the message and the recipient can verify its origin.