E- (ommexceC6. times) (20 Explain 63gani2athonal Application of c-comn (3)Explain. M-lommesce in detail with advant ages amd disavantaqes. (4)Explaio wwW agchitecture . Ho it support s E-Commeg ce.C2 imes) (5)0iscuss. advantaqes of E-Commerce s)Explaln e-comvn edce types cind explain ny tuo detail with praepe example Data Poga CHnPTER: 2
()uitea mote on Netwok Acces
Equipment. C2 fimes) C2) Weite mote n Vaious ECommere txansacien models. C4. tmes) C3)wite a note òn Cloba lobal Toformation Distriboth (4)Explain. C5)Explain Componeats abaut of B2c I way toansactions C4 times) with pooper eXample (2 times) Deta
CHAPTER: 3
(4)what - ls Electronic Cash ? How e-(ash System
toork Explan C2) Wite a note ElecironiC chegues & electroníc pusses. 3)Explain Hhe E-Cash. C2 times) CA)Debit and Csedit card Based Paynent C5)Short (6) Ce dit Note casd Secuzity Based Cn EPs web, short Note (4)short Not SSL (3) Explain E-cash with its p opeotíes ca)what secute, ERS nfoastructure Explain digital signatuze. (io)Explaio the wokinq of E-cheque. C)w9ite (12) what is note SsL on Explaio ErewalL its advantages. ((3)Short Notewor kinq of SsL. (uShort Note Elec iranic Payment System. Cis)what is irewall ? Explain npogtanceand advant ages of of i t . Short NDte E-Cashand E-cheque Cia)Fxplaio online paynent pookess usioq thíd paaty psoceSSors (8)wite note On Smart cand along ts Ho it diffess czedit advantages cazds (14)ite amte on S-HTTP. Also Compaxe it usith SSL CHAPIERry
C4) Discuss Email Spoclinq , E:mail spamnin
and E-mail Bombing with xamples C2 times C2)what do by Dos atack Cs ine LExplain C3) Explain along with its pes. C2 times modes of Cybea Caime. Manner commiing (4)what is Cuber cxime ? piscuss tehnical aspect ot Cybercaime (s) shbrt &te Ermail Fxauds.C2 tmes) c Eplain E-ml. attack io detail e4)efine Hack exs Explain types of hackess i0 detail. C2 time in c8) Explain temiolbqy wth proper example : Vius y Wom and
Short Note Ethial
Trojans Hacker CHAPIER 5 ()what is inyestnent Aand ? Discuss vavious types of investmcnt -rauds. C2) ite note toademaxk viokatioa C3)shrt Note yber Stack1ng Cu)short Note' Posnogaphy (5)whart violation ? Cxplaia SoftuaTe pisacy and cofyxight infainqement. C2 tme) (a) Explain vasious CTedit card and Dank 7elated Caímes C3 times) C1)Explaio cyber stal king in detail. 3times) (8)Defoe cyber Sme ningcyber cyber Squting and (yber terxoism Loith (9) Short Note TPR. C2tines itsexample Case sudy of sQL Tnjectisn . C1) Short Note i SQL Injectian.