Bbit 436:Ecommerce Question Paper
Bbit 436:Ecommerce
Course:Business Information Technology
Institution: Kenya Methodist University question papers
Exam Year:2013
KENYA METHODIST UNIVERSITY
END OF 3''RD ''TRIMESTER 2013 (PT) EXAMINATION
FACULTY : COMPUTING & INFORMATICS
DEPARTMENT : COMPUTER SCIENCE AND BUSINESS INFORMATION
UNIT CODE : BBIT 436/CISY 428
UNIT TITLE : E-COMMERCE
TIME : 2 HOURS
Instructions:
SECTION A: Compulsory
Question One
Explain the following online payment terms
Electronic card.
(2mks)
Store-value cards.
(2mks)
Outline any one barrier to international e-commerce.
(1mk)
Describe a front-end application.
(3mks)
An electronic card is a card containing an embedded microchip that enables predefined operations or the addition, deletion or manipulation of information on the card. Outline the four parties involved in e-payments.
(4mks)
Threats and attacks on e-commerce security can be classified into two, nontechnical and technical attacks, briefly discuss each.
(4mks)
Describe any two methods that can be used to conduct B2B online marketing.
(4mks)
Using four reasons justify why its difficult to stop e-commerce crimes.
(4mks)
Describe any three ways in which e-marketplace helps enterprises to do business.
(6mks)
SECTION B: Answer any two questions.
Question One
Using Kenya as an example, discuss any five non technical limitations and factors affecting the adoption of e-commerce
(10mks)
Discuss five effects of e-commerce on business processes and organizations.
(10mks)
Question Three
It can be argued that e-commerce benefits both organization and customers in relation to that discuss.
Any three benefits to organization.
(6mks)
Any two benefits to consumers.
(4mks)
Explain five attacks and threats that are likely to be carried out against an e-commerce plat form and their solutions.
(10mks)
Question Four
Evans and schmalensee 200s suggest that in determining whether a particular method of e-payment achieves critical mass, a number of factors come into play. Describe any five such factors.
(10mks)
Experts say e-commerce is actually safer than opening a store that could be looted or buried, the difficulty is in getting customers to believe that e-commerce is softer for them. Briefly describe three methods that can be applied in e-commerce security.
(6mks)
Briefly describe the four main types of intellectual property in electronic commerce.
(4mks)
More Question Papers