Вы находитесь на странице: 1из 26

Name: Puran Thapa Magar

Subject: E-Business
Roll no: 17530214
Class: BCA 7th Semester
Submitted to: Suraj Pandey Sir.

Q1 a. What is E-commerce? What are the advantages and


disadvantages of E-Commerce?
Answer: Electronic commerce, commonly known as E-commerce  is trading
in products or services using computer networks, such as the Internet. It means
buying and selling of goods, products or services over the internet. It is “any
transaction completed over a computer-mediated network that involves the
transfer of ownership or rights to use goods and services”.
The invention of faster internet connectivity and powerful online tools
has resulted in a new commerce arena. Ecommerce offered many advantages to
companies and customers but it also caused many problems.
Advantages:
 Provide flexibility to the customer to buy product 24*7:
It has more flexibility over the regular store because the services
are available 24*7 and though helps to serve you the services at
any time and anyplace.

 Speed up buying process and saves time:


It literally speeds up the buying process because when someone
thinks of buying one specific product from the physical store which
is very far and not easily available.

 Best quality of services in reasonable price:


It is one of the benefits which plays a very vital role over an E-
Commerce platform. In most of the case, physical retail stores have
to pay a lot to maintain their presence in the market by paying rent
or even if it’s own.
 Global market:
The network being inherently global, reaching customer is easy. It
is like the customer will have access to the online store from
anywhere in the world, which can globally be accessed.

 Avoids Human error:


Using E-commerce there is very few chance of human error
because every product is updated with details on the site, so that
makes easy for the customer to have more visibility over the
products.

Disadvantages:
i. Lack of personal touch:
E-business lacks the personal touch. One cannot touch or feel the
product. So it is difficult for the consumers to check the quality of
a product.

ii. Delivery time:


The delivery of the products takes time. In traditional business, you
get the product as soon as you buy it. But that doesn’t happen in
online business.

iii. Security issues:


There are a lot of people who scam through online business. Also,
it is easier for hackers to get your financial details. It has a few
security and integrity issues. This also causes distrust among
potential customers.

iv. Site crash:


E-commerce is fully dependent on internet connection. A major
disadvantage of e-commerce is putting a stop to buying capabilities
because of a site crash. Such a small word site crash but has the
ability to put a whole business down within a few seconds.
b. Which E-Commerce model bypasses distributors and make a
place for buyers and sellers come together? Explain in detail.
Answer: E-Commerce model which bypasses distributors and make a place
for buyers and sellers come together is E-commerce based on relationship of
Transaction parties.
E-commerce can be classified according to the Transaction parties are as:
i) Business to Business (B2B):
B2B is that E-business model in which a company conducts its
trading and other commercial activity through the internet and the
customer is another business itself. Website following the B2B
business model sells its product to an intermediate buyer who then
sells the product to the final customer.

Fig no 1: Business – to – Business

The major advantages of B2B are:


 Direct interaction with customers.
 Focused sales promotion.
 Building customer loyalty.
 Savings in distributions costs.

ii) Business to Consumers (B2C):


The term business-to-consumer (B2C) refers to the process of
selling products and services directly between a business and
consumers who are the end-users of its products or services. It may
include purchases such as airline tickets, entertainment venue
tickets, hotel rooms, and shares of stock.
Fig no 2: Business –to – Consumer

The major advantages of B2C are as:


 Inexpensive costs, big opportunities.
 Globalization.
 Reduced operational costs.
 Customer convenience.

iii) Consumer to Consumer (C2C):


Customer to customer (C2C) is a business model, whereby
customers can trade with each other, typically, in an online
environment. The goal of a C2C is to enable these relationships,
helping buyers and sellers locate each other.

Fig no 3: Consumer – to –Consumer

The major advantages of C2C are as:


 Sellers and buyers are reachable.
 Effortless and handy.
 Take less time.

iv) Consumer to Business (C2B):


C2B is the electronic commerce business model in which
consumers can offer products and services to companies, and the
companies pay the consumers. It is also called a reverse auction or
demand collection model, which enables the buyer to name their
own price, often binding, for a specific good or service generating
demand. For example ReverseAuction.com (travel, autos, and
consumer electronics) and priceline.com(travel, telephone,
mortgages).

Fig no 4: Consumer – to – Business

The major advantages of C2B are as:


 Decreases in the cost of technologies such as video cameras,
high-quality printers and Web development services.

v) Business to Government (B2G):


Business-to-government (B2G) is a business model that refers to
businesses selling products, services or information to governments
or government agencies. B2G networks or models provide a way
for businesses to bid on government projects or products that
governments might purchase or need for their organizations.

Fig no 5: Business – to - Government


Q2 a. Describe different types of broadband technologies?
Answer: The term broadband commonly refers to high-speed Internet access
that is always on and faster than the traditional dial-up access. Broadband
includes several high-speed transmission technologies such as:

1) Cable:

Cables are used to connect two or more devices, enabling the


transfer of electrical signals or power from one device to the other.
Cables consist of three major components: conductors, insulation,
protective jacket.

The cable connection is supplied by the regional cable television


company. With this types of service, the cable connections speed differs
based upon the quantity of consumers using services during a particular
time frame.

2) Fiber:

Fiber optic technology is fast becoming one of the newest and most
modern ways to go about sending and receiving data. The technology
works by converting electric signals into a form of light, which is then
sent through transparent tubing (fibers).

One of the major benefits of fiber optic broadband is that it can


reach speeds much higher than cable and DSL, making it perfect for
businesses that rely on fast Internet. The advantage of using fiber is
because of its high speed and security.

3) DSL:

DSL is a wireline transmission technology that transmits data faster


over traditional copper telephone lines already installed to homes and
businesses. DSL-based broadband provides transmission speeds ranging
from several hundred Kbps to millions of bits per second (Mbps). The
availability and speed of your DSL service may depend on the distance
from your home or business to the closest telephone company facility.

The following are types of DSL transmission technologies:

 Asymmetrical Digital Subscriber Line (ADSL): Used primarily by


residential customers, such as Internet surfers, who receive a lot of
data but do not send much. ADSL allows faster downstream data
transmission over the same line used to provide voice service, without
disrupting regular telephone calls on that line.
 Symmetrical Digital Subscriber Line (SDSL): Used typically by
businesses for services such as video conferencing, which need
significant bandwidth both upstream and down stream.

4) Satellite:

Satellite broadband is another form of wireless broadband, and is


also useful for serving remote or sparsely populated areas.
Downstream and upstream speeds for satellite broadband depend
on several factors, including the provider and service package
purchased, the consumer’s line of sight to the orbiting satellite, and
the weather. The speeds may be slower than DSL and cable
modem.

b. What are the aggregate metrics of E-Business sites?


Answer: E-business sites refers to the use of the Web, Internet, intranets,
extranets or some combination thereof to conduct business. It is simply the sale
and purchase of services and goods over an electronic medium, like the Internet.
A metric is any quantifiable, consistently defined measurement of website
performance.
The aggregate metrics of E-Business sites are as follows:
i) Sales Conversion rate:
To calculate your conversion rate, use the following formula:
(number of sale ÷ number of users)×100 %=Conversion Rate
So, if 1,000 people visited your store this week and only 10 people
made a purchase, your conversion rate for the week would be 1%.

We can improve conversion rate by:


 Speeding up your product pages.
 Upload high-quality images of your products.
 Optimize product listings using keywords

ii) Website Traffic:


Web traffic is the amount of data sent and received by visitors to a
website.
To grow our website traffic we can:
 Promote your offerings on social media.
 Optimize your site/store for search engines.
 Grow the number of people subscribing to your newsletter.

iii) Email opt-in Rate:


Even in today’s social media age, email marketing continues to be
one of the most important tools for ecommerce, particularly when
it comes to remarketing and generating repeat business.
You can track email opt-ins two ways:
 Use the built-in analytics in your email marketing tool.
 Set up a conversion goal in Google Analytics to track your
opt-in’s “Thank you!!!!” page.

iv) Customer lifetime value:


Customer lifetime value (CLV) measures the total amount of what
you earn from an average customer over their lifetime.
For example, if a typical customer makes six transactions, each one
worth $30, throughout their life, your CLV would be $180. Note that
you still have to deduct your acquisition costs from this number,
which brings us to the next point.
To increase your CLV:
 we can work on improving your average order value.
 being loyalty among your existing customers so they become
repeat buyers.

v) Shopping card adornment rate:


This metric refers to the percentage of shoppers who add products
to their cart but ultimately leave your store without completing the
purchase.
These are window shoppers who are considering a purchase but
haven’t quite made up their mind just yet.
We can reduce shopping card adornment by:
 Simplify your checkout process so the customer can order
smoothly.
 Use remarketing to bring would-be customers back to your
store.
 Send cart abandonment emails: These prompt the shopper to
return and complete their purchase.

vi) Average order value:


Average order value refers to the average value of each purchase
made in your store. Tracking your average order value allows you
to set benchmarks and figure out how to get people to spend more
on every purchase they make.

We can drive our Average order value by:


 Upsell your customers complementary items that improve
the usability of their primary purchase.
 Offer products as a package so customers get a small
discount on each item as opposed to buying them separately.
 Offer free shipping on purchases above a certain threshold to
entice customers to maximize their spending.

Q3 a. What are the major factors in designing E-Payment system?


Answer: E-payment system is a way of making transactions or paying for
goods and services through an electronic medium without the use of check or
cash.
While designing the E-payment system there are many factors that needs to be
considered properly. They are as:
i) Security:
Online payment systems for the internet are an easy target for
stealing money and personal information. Customers have to
provide credit card and payment account details and other personal
information online.
there are still possibilities for fraudulent activities that might crack
the user authentication and validation thus leading to security risks.

ii) Operational risk:


May not be easily operational as e-payment systems limit on.
 The time over which a given electronic money is valid.
 The amount that can be stored on and transferred by e-
money, and
 The number of exchanges transactions can be made during a
given time.

iii) Lack of reliability:


Transactions may require hardware tools/interface such as smart
cards and the card reader, and many times dependency on such tools
may fail to serve which reduces reliability on such transactions.

iv) Physical risk:


There might be chance of loss of the cards may result in loss of
money.

v) Lack of trust:
E-Payments have a long history of fraud, misuse, and low
reliability which has always threatened users to practice internet-based
purchases.

vi) Lack of usability:


The e-payment system might require technical infrastructures and
authorization procedures which all users may not be aware of and thus
may result in less usage of it. Also, these systems may not be available
for rural areas.

vii) Issues with e-cash:


The main problem of e-cash is that it is not universally accepted
because it is necessary that the commercial establishment accept it as
payment method

b. Explain Symmetric key cryptosystem and asymmetric


cryptosystem?
Answer: Cryptosystem is a structure or system which converts plain text to
cipher text or cipher text to plain text by the application of encryption or
decryption algorithm.
Cryptosystems are used for sending messages in a secure manner over the
internet, such as credit card information and other private data.

Components of cryptosystems:

A basic cryptosystem includes the following components:

a. Plain text: This is the data that needs to be protected.


b. Encryption algorithm: This is the mathematical algorithm that takes
plaintext as the input and returns ciphertext. It also produces the unique
encryption key for that text.
c. Cipher text: This is the encrypted, or unreadable, version of the
plaintext.
d. Decryption algorithm: This is the mathematical algorithm that takes
ciphertext as the input and decodes it into plaintext. It also uses the
unique decryption key for that text.
e. Encryption key: This is the value known to the sender that is used to
compute the cipher text for the given plaintext.
f. Decryption key: This is the value known to the receiver that is used to
decode the given cipher text into plaintext.

There are 2 types of cryptosystem. They are:


i) Symmetric key cryptosystem:
Symmetric key cryptosystem is a type of encryption where only
one key (a secret key) is used to both encrypt and decrypt
electronic information. The entities communicating via symmetric
encryption must exchange the key so that it can be used in the
decryption process.

Fig no 1: Symmetric key cryptosystem


By using symmetric encryption algorithms, data is converted to a
form that cannot be understood by anyone who does not possess
the secret key to decrypt it. Once the intended recipient who
possesses the key has the message, the algorithm reverses its action
so that the message is returned to its original and understandable
form. The secret key that the sender and recipient both use could be
a specific password/code or it can be random string of letters or
numbers that have been generated by a secure random number
generator (RNG).

ii) Asymmetric key cryptosystem:


Asymmetric key cryptosystem is also known as public-key
cryptography, is a process that uses a pair of related keys -- one
public key and one private key -- to encrypt and decrypt a message
and protect it from unauthorized access or use.

Fig no 2: Asymmetric key cryptography

Every user in this system needs to have a pair of dissimilar keys,


private key and public key. These keys are mathematically related
− when one key is used for encryption, the other can decrypt the
ciphertext back to the original plaintext.
Q4 a. In order to bring true customer management across online
business, what criteria one needs to fulfill in E-CRM products.
Answer: E-CRM (Electronic customer relationship management) concerns
all forms of managing relationships with customers making use of information
technology (IT). E-CRM includes enterprises using IT to integrate internal
organization resources and external "marketing" strategies to understand and
fulfill their customer's needs.
Electronic customer relationship management is motivated by easy Internet
access through various platforms and devices such as laptops, mobile devices,
desktop PCs and TV sets.
To bring true customer management across online business, the following
criteria needs to be fulfill in E-CRM. They are :
i) Content:
Content allows us to connect with our customers. If we do a good
job connecting, it will increase engagement and relationship, which
will boost conversions and increase sales towards the customer.

ii) Storefront and merchandising services:


With large numbers of visitors failing to complete the transaction
at the checkout, it is needed to ensure that your storefront services
propel your customers to the cash point.
Merchandising helps you take control of how your brand is
perceived and how visitors shop, while also driving brand
engagement and awareness. Additionally, merchandising is a key part
of a comprehensive sales strategy, helping you drive more revenue.

iii) E-mail-management:
Email is important because it creates a fast, reliable form of
communication that is free and easily accessible. It helps customer
to send the notifications and keep in touch about the new products
and sales.

iv) Customer management:


E-CRM is about understanding who your customers are in every
business. It helps to target specific groups of customers, or even
potential customers, that you can improve your offering. This can,
ultimately, help to boost sales and growth, whilst driving customer
loyalty.
v) E-Marketing:
E-marketing allows you to boost your business website and online
sales, by making your business more visible and accessible to a wider
range of consumers who are already searching for products/services in
your industry.

vi) Assisted selling:


Through assisted selling, it can help business organizations to
facilitate customers in:
 Understanding their unique needs, spending thresholds, and
lifestyles
 Demonstrating deep, practical knowledge of the product and
its features
 Recommending the most suitable option
 Answering product questions
 Overcoming objections
 Suggesting relevant product add-ons or upgrades

Fig no 1: E-CRM towards customer

b. What are the benefits of E-supply chain management?


Answer: E-SCM may be described as the integrated approach for planning
and controlling the flow of materials from suppliers to end-users using Internet
technology. E-SCM refers to the complex network of relationships that
organizations maintain with trading partners to source, manufacture and deliver
products. It creates the organizational integration mechanisms on the internet
such as discussion groups, Web forums and video conferencing that makes the
e-chain processing more efficient.
E-SCM is the effective utilization of internet and business processes that help in
delivering goods, services and information from the supplier to the consumer in
an organized and efficient way.
The benefits of E-supply chain management are as:
i) Raise output:
E-SCM is designed in a way to improve communication,
collaboration and coordination with vendors, transportation and
shipping companies, Suppliers and raise bi-directional information
flow. The streamline & centralized distribution strategy of supply
chain management software make it more reliable for end users and
give more accurate output results.

ii) Reduce costs effects:


E-SCM can lower down the current overhead expenses of your
organization. For example:
Improves inventory management system. Facilitates successful
implementation of inventory system. Eliminates damage resources by
adjusting the storage space efficiently of finished goods. Make your
system more responsive, you can easily achieve your goals by
examining customer’s requirements.

iii) Raise your business profit:


The most stunning feature of E-SCM raises in your business profit
level.  Welcoming behaviour towards new innovative technologies
flourishes new ways of success for your organization.

iv) Boost co-operation level:


E-SCM makes higher cooperation level within the organizational
task. It gives you access to track what your supplier and
distributors are doing all the times and vice versa.

v) Lowers time in delay process:


Delays in supply of goods and services often leads to poor
relationships with stakeholders and loss of business. With the use
of E-SCM it reduce the risk of late delivery and make good
relations between customers and distributors.

Raise Output

Reduce cost effects


Lower delay time

E-SCM

Boost Co-operaion Business profit

Fig no 1: Benefits of E-SCM

Q5 a. What are the advantages and disadvantages of credit as


e-payment system? Also mention its security issues and
encryption.
Answer: E-Payment system are one of the most best system for performing
a financial transaction through internet. Due to its simplicity and flexibility in
making payment, a large number of people show their interest in it.
The E-payment modes available in Nepal are Khalti, E-sewa, Ipay,
Prabhupay.
Advantages:
i) Low Labour cost:
Since E-payment system are usually automatic, they have lower
labour costs than manual payment methods such as cheque, money
order.
ii) Faster transaction speed:
E-payment system quickly provide you faster transaction for our
works.
iii) Low risk of theft:
E-payment system directly go straight into your bank account so
they have low risk of theft from surroundings.
iv) Automatic:
It can be automatic which can be convenient for you and your
customer.
v) Convenience for Online sales:
It allows conveniently selling goods and services online.

Disadvantages:
i) Service fees:
Payment gateways and third party payment processors charge
services fees.

ii) Vulnerability to cyber crime:


Cyber criminals can disable online payment methods exploit them
to steal people's money or information.

iii) Inconvenient for offline sales:


These are inconvenient for offline transactions and require internet
connection.

iv) Technical problems:


E-payment system can go down due to some technical problems.

 Encryption in E-payment system is a security measure used to reduce the


likelihood of a credit or debit card information being stolen. It makes it
impossible to access the credit card information without the
corresponding encryption key that lets the merchant and financial
institution conduct their transactions.

 It drastically reduces the chances of private and valuable card information


being subject to theft, which include the card itself, the terminal where
the card is scanned, and the transmission of information between that
terminal and its system’s back end.
Today the security issues that threaten Electronic payment systems are changing
constantly, and often extremely quickly. The most common threats include
viruses, worms and Trojan horses.

Virus:
There are thousands of different types of computer viruses and internet
malicious programs. Malicious software can easily attack the mobile banking
payment system by taking up passwords on the web browser or any cached
information on operating system.

Worms:
Worms can be categorized as special viruses that spread using direct
Internet connections. They are standalone programs that do not require a host
program for activation and spread themselves independently from computer to
computer by exploiting security vulnerabilities or configuration errors in
operating systems or applications.

Trojan horse:
Trojan horse programs launched against client systems pose the greatest
threat to the e-Payment systems because they can bypass or subvert most of the
authentication and authorization mechanisms used in an electronic transaction.
The Trojan horses aim to spy on sensitive data (e.g. passwords, confidential
data, etc.) and send it back to their owners to gain access to third-party
computers and thus take control of them remotely.
Trojans are normally disguised as applications that are useful to users of
the computers they infect. These programs can be installed on a remote
computer by the simplest of means, for example an email attachment or when
users visit certain websites and download a so called "harmless" program.

b. Explain 7s framework for developing E-strategy?


Answer: E-Strategy is an iterative process to create and/or modify an
organization's business model for E-Business. It sets direction for the entire
organization and focuses on creating maximum value not on creating revenues
or reducing costs through the internet.
The 7s framework for developing E-strategy are as follows:
1. Strategy:
It is the plan devised to maintain and build competitive advantage over
the competition. It refers to the determination of a course of action to be
followed to achieve the desired goal, position or vision.

2. Structure:
It is the way the organization is structured and who reports to whom. It
defines the inter-relationship of processes and human capital to fulfill the
enterprise’s strategic objectives.

3. Systems:
These are the organization’s information systems and infrastructure
through which the organization communicates to its environment. Organization
should create flexible systems infrastructure and consider the following three
major dimensions;
a. Enterprise Resource Planning (ERP):
ERP is business process management software that allows an
organization to use a system of integrated applications to manage the
business and automate much back office functions related to technology,
services and human resources.
b. Data Warehouses:
Data Warehouse are central repositories of integrated data from
one or more disparate sources and Data Warehousing is the basis of a
knowledge a repository that, when used effectively, enables cost
reduction strategies to be identified, added-value services to be achieved
at a manageable cost, and the delivery of improved data effectiveness
within the organization.
c. Knowledge Management (KM):
KM is the process of capturing, developing, sharing, and
effectively using organizational knowledge. It refers to a multi-
disciplinary approach to achieving organizational objectives by making
the best use of knowledge.
4. Staff:
It is the human resources management which includes the employees and
their general capabilities. As organizations become more knowledge-based,
more value is created for an organization’s intellectual assets. At recent times,
outsourcing has also been a trend in many organizations for HRM.

5. Style:
It is the style of leadership adopted. It can be defined as a characterization
of how key managers behave in achieving the organizational goals, and also the
cultural style of the organization.

6. Skills:
It is the actual skills and competencies of the employees working for the
company. If can refer to both the technical skills and relationship management
skills.

7. Shared Values:
Shared values can be defined as the significant meanings or concepts that
an organization utilizes to drive towards a common goal through common
objectives and a common value set. To acquire shared values, it is required to
provide flexibility in the process, induce lower transaction costs and achieve
mass customization for the customers.

Fig no 1: 7S framework of E-strategy


Q6 a. How public key is used in digital signature verification?
Answer: A public key is a key that can be used for verifying digital
signatures generated using a corresponding private key.
Digital signatures are kind of like electronic versions of your handwritten
signatures. They allow people to check the authenticity and integrity of data, as
well as preventing the signatory from being able to repudiate (deny) their
involvement.
There are a range of different mechanisms that can be used for digital
signatures, and they each have slight variations in how they are structured.
In general, these algorithms need to be composed of three sub-algorithms:
i) A key generation algorithm:
Digital signature are electronic signatures, which assures that the
message was sent by a particular sender. While performing digital
transactions authenticity and integrity should be assured, this
algorithm generates a random key pair for a user. The numbers
involved in the key pair need to abide by certain parameters to be
considered secure.

ii) An algorithm for signing data:


To create a digital signature, signing algorithms like email
programs create a one-way hash of the electronic data which is to
be signed. The signing algorithm then encrypts the hash value
using the private key (signature key).
The reason for encrypting the hash instead of the entire
message or document is that a hash function converts any arbitrary
input into a much shorter fixed length value. This saves time as
now instead of signing a long message a shorter hash value has to
be signed and moreover hashing is much faster than signing.

iii) An algorithm for verifying the signature:


Verifier receives Digital Signature along with the data. It then uses
Verification algorithm to process on the digital signature and the
public key (verification key) and generates some value. It also
applies the same hash function on the received data and generates a
hash value.
Then the hash value and the output of the verification
algorithm are compared. If they both are equal, then the digital
signature is valid else it is invalid.

Fig no 1: Process of digital signature verification

b. What is Marketing Strategies? Explain different types of


marketing strategies.

Answer: Marketing strategy is a long-term, forward-looking approach and


an overall game plan of any organization or any business with the fundamental
goal of achieving a sustainable competitive advantage by understanding the
needs and want of customers.

The different types of marketing-strategies are as follows:


i) Permission marketing strategies:
Many businesses would like to send e-mail messages to their
customers and potential customers to announce new products, new
product features, or sales on existing products, which consequently
may have to face legal action or considered as spam.
So instead of interrupting the customer with unrequested
information, permission marketing aims to sell goods and services
only when the prospect gives consent in advance to receive the
marketing information.

ii) Brand-leveraging strategies:


A brand leveraging strategy uses the power of an existing brand
name to support a company’s entry into a new, but related, product
category. Brand leveraging is an important form of new product
introduction as it provides consumers with a sense of familiarity by
carrying positive brand characteristics and attitudes into a new
product category.
Example:
Amazon.com expanded from its original book business into CDs,
videos, and auction features useful to the existing customers.

iii) Affiliate marketing strategies:


In affiliate marketing, one firm’s (the affiliate firm’s) website
includes descriptions, reviews, ratings, and other information about a
product that is linked to another firm’s website that offers the item for
sale. The affiliate site receives a commission for every visitor who
follows a link from the affiliate’s site to the seller’s site.
When visitors click a link on the affiliate’s web page, a donation is
made by a sponsoring company. The page that loads after the visitor
clicks the donation link carries advertising for the sponsoring
companies.

iv) Viral-marketing strategies:


Now another marketing strategy, viral marketing relies on existing
customers to tell other persons, the company’s prospective customers,
about the products or services they have enjoyed using.
Just as affiliate marketing uses websites to spread the word about a
company, viral marketing approaches individual customers to do the
same thing. The number of customers increases much as a virus
multiplies, and thus the name.
v) Social-media marketing:
Social media marketing is the process of gaining website traffic or
attention through social media sites. Social media marketing programs
usually centre on efforts to create content that attracts attention and
encourages readers to share it across their social networks.

vi) Content-marketing strategies:


Content marketing is a strategic marketing approach focused on
creating and distributing valuable, relevant, and consistent content to
attract and retain a clearly-defined audience and, ultimately, to drive
profitable customer action.
Its purpose is to attract and retain customers by
consistently creating and updating relevant and valuable content to
change or enhance consumer behaviour. This information can be
presented in a variety of formats, including news, video, white
papers, e-books, info graphics, case studies, how-to guides, question
and answer articles, photos, etc.

Q7 Short notes (Any two)


a. Software Agents
Answer: A software agent is a persistent, goal-oriented computer program
that reacts to its environment and runs without continuous direct supervision to
perform some function for an end user or another program.

Types of Software agents:


i) Collaborative agents:
A collaborative agent is a software program that helps users solve
problem, especially in complex or unfamiliar domains by
correcting errors, suggesting what to do next, and taking care of
low level details.
ii) Interface agents:
Interface agents are computer programs that employ machine
learning techniques in order to provide assistance to a user dealing
with a particular application. These agents take sufficient amount
of time to understand and learn human behavior before they are
onto work.

iii) Mobile agents:


A mobile agent is an executing program that can migrate during
execution from one machine to another in a heterogeneous
network. Mobile agents are used to solve many problem of network
computing with minimum bandwidth and connectivity.

iv) Informative/Internet agents:


The intelligent part of software which can automatically search for
information on the website is termed as information agents.
Information system can be considered as knowledge base system.

v) Reactive agents:
These agents are responsible for stimulating the response to the
present state of the environment in which they are embedded.
These agents interact with other agents in a very simple and basic
way.

b. Sell side vs Buy side


Answer:
Buy side: It is the side of financial market that buys and invests large portions
of securities for the purpose of money or fund management.
Sell side: It is the other side of financial market, which deals with the creation,
promotion, and selling of traded securities to the public.
Buy side Sell side
Definition: It is associated with the entities It is associated with entities
that are involved in making the which facilitate decision
investments. making of buy side entities.
Institutional Hedge funds, Assets managers, Investment banking, stock
Involved: institutional investors, retail brokers, commercial banking,
investing. market makers.
Goals: Buy side firms are with capital Sell side firms are firms
looking to buy assets or looking
opportunities. to pitch and sell assets or
opportunities.
Lifestyle: Comparatively easier because Sell side firms particularly
they are on side of table with investment banks have to
money. always answer to client and
thus
works longer hrs.

Вам также может понравиться