Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
what are the different between hypertext hypermediahypertext is fundamentally the same like regular text this can be stored read or searched and
what is a customer-to-business transactionc2b customer-to-businessthe most significant activity into e-commerce isnrsquot selling that is buying
discuss the customer-to-customer transactionsc2c customer-to-customerperson-to-person transactions are the oldest type of e-business they have been
define the meaning of business-to-businessb2b business-to-businessthe consensus is universal it is the priority it is where the money is itrsquos
explain about the term business-to-customerb2c business-to-customerelectronic commerce is usually understood mostly as selling goods or services to
what are the types of consumer oriented applications of e-commerce four types of consumer oriented applications within e-commerce are as given below1
what are the disadvantages of a smart carddisadvantages of smart cards are as follows a the value of money can be depleted and rechargedb customers
what are the advantages of a smart cardadvantages of smart card as given below a this provides convenience and assists for multiple currencies over
what are the risks by financial service providers perspective in electronic payment systemsthrough the financial service providers perspective bull
what are the risks by merchants perspective in electronic payment systemsthrough merchants perspectivebull copied or forged payment instrumentsbull
what are the risks by customers perspective in electronic payment systemsrisks within electronic payment systemsthrough the customers perspective are
define the architectural framework for electronic commercean application independent framework to categorize service interaction relies onto four
explain various threats posed through servers into a client server environmentserver destroyed within an accident power failures leaking pipes and
what is the most common biometricsthe most common biometrics is the given belowface geometry photo in this the computer takes the picture of your
how is a valid user identifier accomplisheda valid user identifier is accomplished within one or more of given waysbull provide some password which
define the password methods and biometric systems for implementing client server network securityin cyberspace buyers and sellers cannot notice each
what are the types where relationship exists in electronic market placein this two forms of relationships can exist they area customerseller linkage
what are the desirable features of an electronic market placefeatures of an electronic market place1 its electronic and business center is not a
explain the functioning of firewall using screening routerfirewall using screening routerthe risk of break-within is large along with this form of
what do you mean by electronic funds transferelectronic funds transfer itrsquos an electronic payment method which transfers the money value through
how do you get workflow automation into e-business environmentin order to run smoothly organizations frequently standardize processes across the
illustrates several names of popular internet browserspopular internet browsers areinternet explorer netscape navigator and mosaic google chrome and
what is the use of hypertext links in internet accessuse of hypertext links in internet accessfrom the userrsquos view point the web comprised a vast
what do you understand by wwwwww world wide webit is an architectural framework for accessing linked documents outspread over thousands of machines
what is the role of certifying authoritya certificate authority is a body that is either public or private that seeks to fill the requirement for