E Commerce Predictions
E Commerce Predictions
Define E-commerce and list two of its encoding it to prevent unauthorized access,
benefits. (2 marks) ensuring confidentiality and integrity.
E-commerce is the buying and selling of goods
and services over the internet. 10. Differentiate between Internet and
Benefits: Intranet. (2 marks)
Internet is a global, public network connecting
Global market reach. millions of devices.
24/7 availability. Intranet is a private network within an
organization, accessible only to authorized users.
2. Differentiate between E-commerce and E-
business. (2 marks) 11. What is Telnet? (2 marks)
E-commerce involves online commercial Telnet is a protocol that allows remote access to a
transactions (e.g., buying/selling). computer or server over the internet or a network
E-business includes all online business activities, for command-line operations.
including transactions, CRM, and supply chain
management. 12. What is FTP? (2 marks)
File Transfer Protocol (FTP) is a standard protocol
3. What is an E-hub? (2 marks) used to transfer files between a client and a server
An E-hub is an online platform that connects over a network.
buyers, sellers, and suppliers to facilitate
transactions and streamline supply chain 13. Define electronic market. (2 marks)
processes. An electronic market is an online platform where
buyers and sellers conduct transactions, often
4. Define tunneling. (2 marks) facilitated by e-commerce technologies.
Tunneling is the process of encapsulating data
packets within another protocol to securely 14. What is a smart card? (2 marks)
transmit them over a network, often used in A smart card is a plastic card embedded with a
VPNs. microchip that stores data and enables secure
transactions or identification.
5. What is Network Address Translation
(NAT)? (2 marks) 15. What is authentication? (2 marks)
NAT is a technique that translates private IP Authentication is the process of verifying the
addresses to public IP addresses, enabling devices identity of a user or system to ensure authorized
on a local network to access the internet using a access.
single public IP.
16. What is WWW? (2 marks)
6. Define client. Name its types. (2 marks) The World Wide Web (WWW) is a system of
A client is a device or program that requests interlinked hypertext documents and resources
services from a server. accessed via the internet using browsers.
Types: Thin client, Thick client.
17. Define client-server security. (2 marks)
7. What is a trade cycle? (2 marks) Client-server security involves protecting data and
A trade cycle is the sequence of stages in a communications between a client and server using
commercial transaction, including search, measures like encryption and authentication.
negotiation, execution, and after-sales service.
18. Write any two examples of e-waste. (2
8. Define EDI. (2 marks) marks)
Electronic Data Interchange (EDI) is the
electronic exchange of standardized business Old mobile phones.
documents (e.g., invoices, purchase orders) Discarded computers.
between organizations.
19. What is Internet Banking? (2 marks)
9. What is cryptography? (2 marks) Internet Banking is the provision of banking
Cryptography is the practice of securing data by services (e.g., fund transfers, bill payments)
through a secure online platform.
20. What is a digital certificate? (2 marks) negotiated pricing, supporting supply
A digital certificate is an electronic document that chain efficiency.
verifies the identity of a user or entity using a C2C (Consumer-to-Consumer):
public key and a digital signature. Consumers sell to other consumers via
online platforms. Example: eBay enables
21. Why is a password used in a system? (2 users to auction used goods. C2C
marks) platforms charge fees and rely on user
A password is used to authenticate a user’s ratings for trust, fostering peer-to-peer
identity and protect a system from unauthorized marketplaces.
access. C2B (Consumer-to-Business): Consumers
offer products or services to businesses.
22. How does a computer virus spread? (2 Example: Upwork allows freelancers to
marks) bid for company projects. This model
A computer virus spreads through infected files, empowers individuals to monetize skills
email attachments, malicious downloads, or and provides businesses with flexible
removable media like USB drives. talent.
B2G (Business-to-Government):
23. List two types of electronic payment Businesses sell to government entities
methods. (2 marks) through e-procurement systems. Example:
Suppliers bidding on government tenders
Credit/Debit cards. via online portals. B2G involves strict
Digital wallets. compliance and large-scale contracts.
Each model leverages digital platforms to
24. What is the use of SSL in E-commerce? (2 streamline transactions, catering to diverse
marks) market needs.
Secure Sockets Layer (SSL) encrypts data
between a user’s browser and a website, ensuring 27. Compare traditional commerce with E-
secure transactions and data privacy. commerce. (5 marks)