E-Commerce
Practice Questions
A complete chapter-wise question bank — click any question to reveal the answer.
Fundamentals of Electronic Commerce
Definition, types, benefits, driving forces, the internet & web, and the value chain in e-commerce.
Section A — Very Short Answer
2 Marks EachHint: E-Commerce refers only to buying and selling goods/services online (transactions), while E-Business is broader — it includes all business activities conducted via the internet, such as production, supply chain management, and internal operations, in addition to commerce. Example: Daraz (B2C) or Alibaba (B2B) style marketplaces.
Hint: E-Commerce is the process of buying, selling, or exchanging products, services, or information via computer networks. Example: purchasing a product from Daraz.com.np.
Hint: Reduced transaction costs, global market access, cost of communication, price transparency, and competitive pressure are key economic forces. Example: Daraz (B2C) or Alibaba (B2B) style marketplaces.
Hint: The Internet is the global network of networks (infrastructure). The WWW is a service that runs on the Internet — it is a system of interlinked hypertext documents accessed via browsers using HTTP. Example: accessing www.daraz.com.np through a web browser.
Hint: The Firm Value Chain is the set of activities a company performs to deliver a valuable product/service. In e-commerce, each activity (inbound logistics, operations, marketing, sales, after-sales) can be transformed to create more value using digital tools. Example: digitizing procurement and after-sales support.
Hint: Economic Force, Market Force, Technology Force, and Society Force. Example: Daraz (B2C) or Alibaba (B2B) style marketplaces.
Hint: HTML structures web pages, including product listings, forms, and links that enable browsing and purchasing. Example: a product page built with HTML forms for checkout.
Hint: HTTP is the web's request-response protocol; it lets browsers and servers exchange pages, forms, and transaction data. Example: a browser sending GET/POST requests during checkout.
Hint: Examples: B2B (business to business), B2C (business to consumer), C2C (consumer to consumer). Example: pirated product images or counterfeit listings.
Section B — Short Answer
7 Marks EachCoverage Points:
- B2B (Business to Business): transactions between businesses — e.g., wholesaler to retailer. Large volume, automated orders.
- B2C (Business to Consumer): business sells directly to end consumers — e.g., Amazon.
- C2C (Consumer to Consumer): e.g., eBay, OLX — peer-to-peer transactions.
- B2G (Business to Government): online procurement portals.
- G2C (Government to Citizen): e-governance services.
- Benefits: 24/7 availability, global reach, lower cost, personalization, faster transactions.
Hint: Write 3–5 well-labeled points with brief explanations; include at least one example. Example: Daraz (B2C) or Alibaba (B2B) style marketplaces.
Coverage Points:
- Economic: reduced costs, global competition, efficiency.
- Market: 24/7 access, wider audience, price comparison.
- Technology: broadband, mobile internet, payment gateways.
- Society: changing consumer habits, digital literacy, trust in online shopping.
Hint: Cover meaning, key points, and significance, and include examples where possible. Example: Daraz (B2C) or Alibaba (B2B) style marketplaces.
- Industry Value Chain: encompasses all stages from raw material to end consumer across multiple firms. E-commerce streamlines communication and reduces costs at each stage.
- Firm Value Chain (Porter's model): Primary activities (inbound logistics, operations, outbound logistics, marketing, service) and support activities (HR, IT, procurement). E-commerce automates and speeds up each activity.
Hint: Outline the steps or process in order and mention key tools or examples. Example: digitizing procurement and after-sales support.
Hint: Benefits include wider reach, lower costs, 24/7 sales, and digital marketing. Limitations include connectivity, payment options, logistics, trust, and skills gaps. Example: Daraz (B2C) or Alibaba (B2B) style marketplaces.
Section C — Long Answer
15 Marks EachStructure your answer in 4 parts:
- (1) Internet as a force (3 marks): global connectivity, low-cost infrastructure, enablement of new business models.
- (2) WWW role (3 marks): hypertext linking, browser access, multimedia content, HTTP protocol enabling request-response, HTML for structuring web content.
- (3) Industry value chain transformation (6 marks): e-procurement, online distribution, disintermediation, digital marketing, online customer support, supply chain integration. Provide examples.
- (4) Role of E-Commerce in value creation (3 marks): 24/7 availability, global reach, personalization, data analytics.
Hint: Explain the purpose, main functions, and impact in an e-commerce context. Example: a product page built with HTML forms for checkout.
Key Areas:
- Benefits: market expansion beyond geography, reduced overhead, 24/7 operations, customer data, personalization.
- Challenges in Nepal: internet penetration, payment gateway availability, logistics, trust.
- Success factors: secure payments, user-friendly design, reliable delivery, local SEO, social media marketing.
- Reference the Himalayan Crafts type of scenario.
Hint: Write 3–5 well-labeled points with brief explanations; include at least one example. Example: Daraz (B2C) or Alibaba (B2B) style marketplaces.
Infrastructure for Electronic Commerce
Internet, Intranet, Extranet, IoT, TCP/IP, packet switching, client-server computing, and web technologies.
Section A — Very Short Answer
2 Marks EachAn Intranet is a private network accessible only within an organization. An Extranet extends the intranet to authorized external users such as suppliers and partners, using internet technologies with access controls.
Hint: Give a clear definition using syllabus language and add 2 key points plus one example. Example: DNS routing and live chat support on a typical e-commerce site.
Packet switching breaks data into small packets, routes them independently across the network, and reassembles them at the destination. It is efficient because bandwidth is shared and there is no dedicated circuit required.
Hint: State clear reasons and support each with a brief example. Example: DNS routing and live chat support on a typical e-commerce site.
Application Layer, Transport Layer (TCP), Internet Layer (IP), and Network Access (Link) Layer.
Hint: List the required items using syllabus terms and add a one-line description for each. Example: pirated product images or counterfeit listings.
IoT is the network of physical objects embedded with sensors and connectivity that allows them to exchange data. Example: smart inventory shelves in a warehouse that automatically order stock when levels are low.
Hint: Give a clear definition using syllabus language and add 2 key points plus one example. Example: DNS routing and live chat support on a typical e-commerce site.
HTML defines the structure and presentation of web pages. XML is a data-description language focused on storing and transporting data. XML tags are custom and user-defined; HTML tags are predefined.
Hint: State 2–4 clear differences in a table or bullet form and add a short example for each. Example: a product page built with HTML forms for checkout.
Hint: Hypertext uses linked text to move between pages, enabling catalog browsing, product detail jumps, and checkout flows. Example: clicking product category links to navigate pages.
Hint: Real-time chat helps answer questions, provide order updates, and support pre-sales or post-sales issues. Example: live chat support on an online store.
Hint: DNS maps domain names to IP addresses so browsers can locate the correct web server. Example: typing www.amazon.com and resolving to an IP address.
Section B — Short Answer
7 Marks EachDescribe the 4 TCP/IP layers, their functions, and how data is encapsulated. For Client-Server: client sends HTTP request → DNS resolves IP → TCP connection → server processes and sends response → browser renders HTML.
Hint: Outline the steps or process in order and mention key tools or examples. Example: pirated product images or counterfeit listings.
Internet for customer-facing operations (website, orders), Intranet for internal processes (HR, inventory, staff communication), Extranet for external partners (suppliers checking stock levels, B2B order portals).
Hint: Explain the purpose, main functions, and impact in an e-commerce context. Example: DNS routing and live chat support on a typical e-commerce site.
Hint: IoT connects devices and sensors, enabling inventory tracking, smart warehousing, real-time logistics, and personalized services. Example: real-time inventory sync between warehouse and website.
Section C — Long Answer
15 Marks Each- (a) ARPANET → NSFNet → Commercial Internet → Broadband era → Mobile era → IoT (3 marks)
- (b) Packet switching mechanics, TCP (connection, reliable delivery), IP (addressing, routing), 4-layer architecture with functions (4 marks)
- (c) Client role (browser, request), Server role (processing, database, response), HTTP (4 marks)
- (d) HTML structures pages, XML enables data exchange between systems, CSS for presentation (4 marks)
Hint: Explain the purpose, main functions, and impact in an e-commerce context. Example: a product page built with HTML forms for checkout.
Web Based Tools for E-Commerce
Web server hardware and software, Apache HTTP, IIS, performance evaluation, web browsers, and server features.
Section A — Very Short Answer
2 Marks EachApache HTTP Server (Apache Software Foundation — open source) and IIS — Internet Information Services (Microsoft — used with Windows servers).
Hint: List the required items using syllabus terms and add a one-line description for each. Example: Cloudflare CDN or shared vs dedicated hosting for online stores.
A web server receives HTTP requests from clients (browsers), processes them, retrieves content from the file system or database, and sends back HTTP responses with the requested web pages or data.
Hint: Give a clear definition using syllabus language and add 2 key points plus one example. Example: Cloudflare CDN or shared vs dedicated hosting for online stores.
CPU (processing power for requests), RAM (handling concurrent sessions), network bandwidth (data transfer speed), and disk speed (storage I/O) are all key. Choose any two.
Hint: List the required items using syllabus terms and add a one-line description for each. Example: metrics like conversion rate, CAC, CLV, AOV.
Web server performance evaluation measures how well a server handles requests under load. Metrics include: requests per second (throughput), response time/latency, uptime/availability, error rate, and concurrent user capacity.
Hint: List the required items using syllabus terms and add a one-line description for each. Example: metrics like conversion rate, CAC, CLV, AOV.
Hint: A CDN caches content on distributed servers to reduce latency, speed up pages, and improve availability. Example: Cloudflare/Akamai caching product images globally.
Hint: Shared hosting shares server resources with others; dedicated hosting provides exclusive resources and better performance/control. Example: many small sites sharing one server vs a dedicated server for large stores.
Hint: Load balancing distributes traffic across servers to handle high demand and improve uptime. Example: distributing traffic across multiple web servers during sales.
Section B — Short Answer
7 Marks EachHardware: CPU, RAM, storage, NIC. Software: OS compatibility (Apache: Linux/Unix/Windows; IIS: Windows only), scripting support (Apache: PHP/Python; IIS: ASP.NET), licensing (Apache: free open-source; IIS: Windows license), market share, module system.
Hint: State 2–4 clear differences in a table or bullet form and add a short example for each. Example: a browser sending GET/POST requests during checkout.
Throughput, scalability (horizontal/vertical), load balancing, CDN use, caching strategies, database query optimization, concurrent connection handling, uptime/redundancy, response time under load, auto-scaling capabilities.
Hint: Explain the main concept and include brief supporting points and an example. Example: metrics like conversion rate, CAC, CLV, AOV.
Hint: Browsers render pages and run client code. Cookies store sessions and carts, JavaScript enables dynamic UI, and caching speeds loads but must avoid stale data. Example: pirated product images or counterfeit listings.
Section C — Long Answer
15 Marks Each- (a) Server architecture: multi-tier (web, app, DB), load balancers, CDN (3 marks)
- (b) Apache vs IIS: platform, license, modules, performance (3 marks)
- (c) Browser as client: rendering engine, JavaScript, cookies, caching (3 marks)
- (d) Hosting services: shared, VPS, dedicated, cloud — pros/cons vs in-house (3 marks)
- (e) Web services: SOAP, REST APIs, XML/JSON data exchange, interoperability (3 marks)
Hint: Explain the purpose, main functions, and impact in an e-commerce context. Example: a browser sending GET/POST requests during checkout.
Electronic Commerce Software
Basic and advanced functions of EC software, web services, packages, and hosting solutions for various company sizes.
Section A — Very Short Answer
2 Marks EachProduct catalog display, shopping cart management, order processing, payment gateway integration, user authentication, inventory tracking.
Hint: List the required items using syllabus terms and add a one-line description for each. Example: Shopify (SaaS) and payment/shipping APIs.
A web service is a software system designed to support machine-to-machine interaction over a network using standard protocols (SOAP/REST). Example: an e-commerce site calling a payment gateway API to process a credit card.
Hint: Give a clear definition using syllabus language and add 2 key points plus one example. Example: Shopify (SaaS) and payment/shipping APIs.
Personalization/recommendation engine, CRM integration, multi-currency/language support, advanced analytics, affiliate marketing management, ERP integration.
Hint: List the required items using syllabus terms and add a one-line description for each. Example: Shopify (SaaS) and payment/shipping APIs.
Hint: SOAP is a strict XML-based protocol, while REST is a lightweight architectural style using HTTP methods and often JSON. Example: SOAP XML messages for order processing.
Hint: SaaS e-commerce is software delivered via the cloud on subscription. Example: Shopify.
Hint: A shopping cart lets users manage items and checkout. Features include add/remove items, quantity updates, totals, and checkout flow. Example: adding/removing items, totals, and checkout.
Section B — Short Answer
7 Marks EachSmall: catalog, cart, basic payments, simple inventory, email notifications. Mid-size: adds CRM, reporting, multi-payment, promotions engine. High-level: ERP integration, AI recommendations, omnichannel, fraud detection, global multi-currency, API ecosystem, real-time analytics.
Hint: Give a clear definition using syllabus language and add 2 key points plus one example. Example: Shopify (SaaS) and payment/shipping APIs.
Packages: fast deployment, lower initial cost, community support, limited customization. Custom: fully tailored, expensive, longer development, unique competitive advantage. Consider scalability, vendor lock-in, maintenance.
Hint: State 2–4 clear differences in a table or bullet form and add a short example for each. Example: Shopify (SaaS) and payment/shipping APIs.
Hint: APIs connect services like payment gateways, shipping/logistics, inventory/ERP, analytics, or CRM systems. Example: payment gateway APIs like eSewa, Khalti, or Stripe.
Section C — Long Answer
15 Marks Each- (a) Catalog, cart, payment, inventory, order management + later CRM, analytics (4 marks)
- (b) Start packaged (Shopify/WooCommerce) for speed — justify with cost and time (3 marks)
- (c) Payment API, SMS/email API, shipping API integration (4 marks)
- (d) Shared hosting → VPS → Cloud as they grow. Third-party hosting vs in-house (4 marks)
Hint: Explain the purpose, main functions, and impact in an e-commerce context. Example: payment gateway APIs like eSewa, Khalti, or Stripe.
Security Threats to E-Commerce
Malicious code, phishing, hacking, cyber vandalism, credit card fraud, spoofing, DoS/DDoS, sniffing, and CERT.
Section A — Very Short Answer
2 Marks EachPhishing is a fraudulent attempt to obtain sensitive information (usernames, passwords, credit card details) by disguising as a trustworthy entity in electronic communications — typically through deceptive emails or fake websites.
Hint: Give a clear definition using syllabus language and add 2 key points plus one example. Example: Phishing emails or malware targeting online stores.
A DoS attack floods a server with requests from a single source to make it unavailable. A DDoS (Distributed DoS) uses multiple compromised systems (a botnet) to attack simultaneously, making it much harder to block.
Hint: Outline the steps or process in order and mention key tools or examples. Example: Phishing emails or malware targeting online stores.
Spoofing: impersonating a trusted IP address, email, or website to deceive users. Pharming: redirecting website traffic to a fraudulent site by corrupting DNS records, even if the user types the correct URL.
Hint: Give a clear definition using syllabus language and add 2 key points plus one example. Example: Phishing emails or malware targeting online stores.
CERT stands for Computer Emergency Response Team. It responds to computer security incidents, provides advisory notices about vulnerabilities, and coordinates responses to major attacks.
Hint: Give a clear definition using syllabus language and add 2 key points plus one example. Example: Phishing emails or malware targeting online stores.
Sniffing (packet sniffing) is the use of software to intercept and log network traffic. Attackers can capture unencrypted login credentials, credit card numbers, or other sensitive data transmitted over the network.
Hint: Cover meaning, key points, and significance, and include examples where possible. Example: Phishing emails or malware targeting online stores.
Hint: Malicious code (malware) includes viruses, worms, trojans, ransomware, or spyware. Example: viruses, worms, or Trojans in e-commerce systems.
Hint: Cyber vandalism involves defacing sites, disrupting services, or damaging data to cause harm. Example: defacing an online store homepage.
Hint: Fraud uses stolen card data via phishing or skimming, and can involve carding or replay attacks. Example: phishing or card skimming during payments.
Hint: Identity fraud is impersonation or account takeover using stolen personal information. Example: account takeover using stolen credentials.
Section B — Short Answer
7 Marks EachMechanism: botnet floods server → exhausts bandwidth/CPU/memory → legitimate users can't access. Business impact: loss of sales, reputation damage, customer trust. Mitigations: DDoS protection services (Cloudflare), rate limiting, traffic analysis, load balancers, blackholing.
Hint: Cover meaning, key points, and significance, and include examples where possible. Example: Phishing emails or malware targeting online stores.
Client: malware, phishing, browser exploit, cookie theft. Channel: sniffing, man-in-the-middle, session hijacking. Server: DoS/DDoS, SQL injection, unauthorized access, web defacement, data breaches.
Hint: Explain the main concept and include brief supporting points and an example. Example: Phishing emails or malware targeting online stores.
Hint: Copyrights, trademarks, and trade secrets are at risk due to piracy, counterfeit goods, brand misuse, and content scraping. Example: pirated product images or counterfeit listings.
Section C — Long Answer
15 Marks Each- (a) Each threat type — how they work and real examples (6 marks)
- (b) Domain name disputes, copyright violations, content scraping (3 marks)
- (c) Classification: physical security, network security, application security, data security (3 marks)
- (d) Security policy elements: acceptable use, incident response, access controls, regular audits (3 marks)
Hint: Explain the purpose, main functions, and impact in an e-commerce context. Example: viruses, worms, or Trojans in e-commerce systems.
Implementing Security for E-Commerce
Intellectual property protection, digital watermarks, transaction integrity, access control, firewalls, and server protection.
Section A — Very Short Answer
2 Marks EachA digital watermark is a hidden, invisible code embedded into a digital image, audio, or video file to identify its owner. It is used to detect unauthorized copying and prove ownership in copyright disputes.
Hint: State clear reasons and support each with a brief example. Example: HTTPS/TLS on checkout with OTP-based MFA.
Authentication verifies the identity of a user (who are you?). Access Control determines what resources and actions an authenticated user is permitted to use (what can you do?).
Hint: State 2–4 clear differences in a table or bullet form and add a short example for each. Example: HTTPS/TLS on checkout with OTP-based MFA.
Software metering, digital watermarks, digital envelopes, encryption, copyright registration, DRM (Digital Rights Management).
Hint: List the required items using syllabus terms and add a one-line description for each. Example: HTTPS/TLS on checkout with OTP-based MFA.
A firewall is a network security system that monitors and controls incoming/outgoing traffic based on predefined rules. It creates a barrier between the trusted internal network and untrusted external networks, blocking unauthorized access.
Hint: Give a clear definition using syllabus language and add 2 key points plus one example. Example: HTTPS/TLS on checkout with OTP-based MFA.
Hint: SSL/TLS encrypts data in transit (HTTPS), protecting confidentiality and integrity during transactions. Example: HTTPS lock icon on a checkout page.
Hint: MFA requires two or more factors, reducing account takeover and fraud. Example: OTP via SMS/email or authenticator app.
Hint: A DMZ is a network segment between the internet and internal systems that hosts public-facing services. Example: public web server isolated from internal databases.
Hint: Copyright protects creative works; trademarks protect brand identity. Both reduce misuse and counterfeits online. Example: licensed product photos and content.
Section B — Short Answer
7 Marks EachCopyright: automatic protection of original creative works; registration strengthens legal standing; DMCA takedown notices. Digital Watermarks: embed invisible ownership data in images; detectable even after editing; provides forensic proof of origin.
Hint: Cover meaning, key points, and significance, and include examples where possible. Example: pirated product images or counterfeit listings.
Firewall types (packet filtering, stateful, application-layer). Access Control: role-based access, least privilege principle. Authentication: passwords, multi-factor authentication (MFA), SSL/TLS certificates, OAuth. Together they form defence in depth.
Hint: Cover meaning, key points, and significance, and include examples where possible. Example: HTTPS/TLS on checkout with OTP-based MFA.
Hint: Integrity is ensured with TLS encryption, hashing, digital signatures, tokenization, and secure payment gateways. Example: hashes and digital signatures protecting payment data.
Section C — Long Answer
15 Marks Each- (a) IP laws: copyright (automatic), patent (inventions), trademark (brand identity) (3 marks)
- (b) Software metering (license control), watermarks (ownership proof), digital envelopes (encrypted packaging of content) (3 marks)
- (c) Transaction integrity: SSL/TLS, digital signatures, HTTPS, message authentication codes (4 marks)
- (d) CIA triad: access control lists, MFA, hardened OS (patch management), firewall configuration, DMZ setup (5 marks)
Hint: Cover meaning, key points, and significance, and include examples where possible. Example: licensed product photos and content.
Electronic Payment System
ATM, debit/credit cards, prepaid & smart cards, mobile payments, e-wallets, EFT, and cryptocurrency.
Section A — Very Short Answer
2 Marks EachSpeed of transactions, global reach, reduced handling of physical cash, automatic record keeping, 24/7 availability, lower transaction costs compared to traditional banking.
Hint: Write 3–5 well-labeled points with brief explanations; include at least one example. Example: eSewa/Khalti wallets or EMV smart cards.
A chip card contains an embedded microprocessor that generates a unique transaction code each time (dynamic data). Magnetic stripe stores static data that can be easily copied (skimmed). Chip cards are resistant to cloning.
Hint: Outline the steps or process in order and mention key tools or examples. Example: pirated product images or counterfeit listings.
Cryptocurrency is a decentralized digital currency that uses cryptography for security, operating on a blockchain ledger without a central authority. Bitcoin is the most widely known example.
Hint: List the required items using syllabus terms and add a one-line description for each. Example: eSewa/Khalti wallets or EMV smart cards.
Debit card is linked directly to a bank account and deducts funds in real time. A prepaid card has a pre-loaded fixed amount and is not linked to a bank account — useful for online purchases without credit.
Hint: State 2–4 clear differences in a table or bullet form and add a short example for each. Example: eSewa/Khalti wallets or EMV smart cards.
Hint: A digital wallet stores value and enables payments. Examples include eSewa and Khalti. Example: eSewa or Khalti in Nepal.
Hint: EFT transfers money through banking networks; card payments use card networks with authorization and settlement. Example: bank transfer via online banking.
Hint: A smart card has an embedded chip and is more secure than magnetic-stripe cards. Example: EMV chip-based debit/credit cards.
Hint: Blockchain is a distributed ledger that records and verifies cryptocurrency transactions across a network. Example: Bitcoin transactions recorded on a ledger.
Section B — Short Answer
7 Marks EachTable comparison (security, data storage, skimming resistance, global acceptance). Crypto: decentralized, blockchain, anonymity, volatility, acceptance challenges, lower fees for international transactions.
Hint: State 2–4 clear differences in a table or bullet form and add a short example for each. Example: pirated product images or counterfeit listings.
EFT: direct bank-to-bank transfer, SWIFT for international, ACH for domestic. Mobile payments: NFC (tap-to-pay), QR code payments, wallet apps (eSewa, Khalti in Nepal, Google Pay). Impact: speed, convenience, financial inclusion, reduced cash dependency.
Hint: Cover meaning, key points, and significance, and include examples where possible. Example: bank transfer via online banking.
Hint: Challenges include fraud, phishing, malware, and MITM attacks. Protections include encryption, tokenization, 2FA, PCI DSS, and fraud monitoring. Example: eSewa/Khalti wallets or EMV smart cards.
Section C — Long Answer
15 Marks EachAllocate ~2.5 marks per section. Ensure you cover the mechanism of each payment type (how it works), its security features, its adoption in e-commerce, and its limitations. Cryptocurrency section should address blockchain, decentralization, and volatility.
Hint: Write 3–5 well-labeled points with brief explanations; include at least one example. Example: pirated product images or counterfeit listings.
Strategy for Marketing, Sales and Promotion
E-Commerce marketing strategy, web essence, segmentation, reaching customers, branding, and business models.
Section A — Very Short Answer
2 Marks EachBrand name/logo, consistent color scheme, tagline, brand voice/tone, unique value proposition, brand story, customer experience consistency.
Hint: List the required items using syllabus terms and add a one-line description for each. Example: SEO for product pages or dynamic pricing in airlines.
Keep It Simple (Stupid) — the principle that most systems work best if kept simple rather than made complex. For e-commerce: simple navigation, clear checkout, minimal clutter, quick load times improve conversion rates.
Hint: State clear reasons and support each with a brief example. Example: SEO for product pages or dynamic pricing in airlines.
Online segmentation divides the market into groups with similar needs/behaviors. Bases: demographic (age, income), geographic, psychographic (lifestyle, values), behavioral (purchase history, browsing), or technographic (device used).
Hint: Give a clear definition using syllabus language and add 2 key points plus one example. Example: SEO for product pages or dynamic pricing in airlines.
Hint: SEO improves search visibility to drive organic traffic, conversions, and brand discovery. Example: optimizing product pages for search keywords.
Hint: Dynamic pricing changes prices based on demand or competition. Example: airline or marketplace pricing.
Hint: Affiliates promote products for commission, expanding reach and lowering acquisition cost. Example: commission-based referrals from bloggers.
Hint: A buyer persona is a target-customer profile that guides messaging, offers, and channel strategy. Example: "budget-conscious student in Kathmandu".
Section B — Short Answer
7 Marks EachSteps: market research, segmentation, target selection, positioning, creating buyer personas. Web Essence = the unique combination of site content, visual design, interactivity, and functionality that defines the brand online. Key elements: KIS(S), good content, clear CTA, fast load.
Hint: Outline the steps or process in order and mention key tools or examples. Example: SEO for product pages or dynamic pricing in airlines.
Segmentation: groups with similar needs. Online Promotion: SEO, SEM/PPC, social media marketing, email campaigns, affiliate marketing, influencer marketing. Pricing: dynamic pricing, penetration pricing, price comparison tools, digital information products pricing.
Hint: Cover meaning, key points, and significance, and include examples where possible. Example: SEO for product pages or dynamic pricing in airlines.
Hint: Leverage existing trust with consistent branding, omni-channel experience, and strong service quality online. Example: a well-known physical store launching an online shop.
Section C — Long Answer
15 Marks Each- (a) Segmentation: cultural product enthusiasts, international tourists, gift buyers, corporate buyers (3 marks)
- (b) Site design: KIS(S), product photography, cultural storytelling, mobile-first (4 marks)
- (c) Promotion: social media (Instagram/Pinterest), email newsletters, travel bloggers, SEO (4 marks)
- (d) Brand: unique domain name, consistent visual identity, brand story, leveraging cultural heritage (4 marks)
Hint: Explain the main concept and include brief supporting points and an example. Example: pirated product images or counterfeit listings.
Strategy for Purchasing and Support
Purchasing logistics, Electronic Data Interchange (EDI), Supply Chain Management, and logistic support activities.
Section A — Very Short Answer
2 Marks EachEDI = Electronic Data Interchange. It is the computer-to-computer exchange of standard business documents (purchase orders, invoices, shipping notices) between trading partners in a standardized electronic format, replacing paper-based processes.
Hint: Give a clear definition using syllabus language and add 2 key points plus one example. Example: standardized purchase orders between retailer and supplier.
SCM is the management of the flow of goods, data, finances, and information from the raw material supplier through to the final consumer. E-commerce SCM uses digital tools for real-time visibility, automated ordering, and collaboration with partners.
Hint: Give a clear definition using syllabus language and add 2 key points plus one example. Example: real-time inventory sync between warehouse and website.
Warehousing, order picking and packing, last-mile delivery, returns management (reverse logistics), real-time shipment tracking, customs clearance for international orders.
Hint: List the required items using syllabus terms and add a one-line description for each. Example: Returns handling (reverse logistics) and last-mile delivery.
Hint: It is the final leg to the customer, often costly due to traffic, address complexity, and time constraints. Example: home delivery in Kathmandu traffic.
Hint: Reverse logistics covers returns, exchanges, repairs, and disposal. Example: handling returns and refunds.
Hint: EDI defines standardized electronic document formats; partners must align to exchange data reliably. Example: standardized purchase orders between retailer and supplier.
Section B — Short Answer
7 Marks EachEDI: automates purchase orders, invoices, shipping notices — reduces errors, speeds processing, standardizes communication. SCM: real-time inventory visibility, demand forecasting, supplier collaboration, reduced lead times, cost reduction through efficiency.
Hint: Explain the main concept and include brief supporting points and an example. Example: pirated product images or counterfeit listings.
Purchasing logistics covers procurement, supplier management, and goods receipt. Cost savings: bulk purchasing discounts, automated reordering (avoiding stockouts/overstock), efficient supplier evaluation, faster payment cycles.
Hint: Outline the steps or process in order and mention key tools or examples. Example: Returns handling (reverse logistics) and last-mile delivery.
Hint: Real-time visibility reduces stockouts and overstock, speeds fulfillment, and improves order accuracy. Example: real-time inventory sync between warehouse and website.
Section C — Long Answer
15 Marks Each- EDI with rural suppliers: standardize ordering, automate reordering, reduce miscommunication (4 marks)
- SCM system: end-to-end visibility from raw materials to international delivery (4 marks)
- Logistics with DHL: EDI integration for shipping labels, customs documents, tracking (4 marks)
- Overall impact on efficiency, costs, customer satisfaction (3 marks)
Hint: Write 3–5 well-labeled points with brief explanations; include at least one example. Example: pirated product images or counterfeit listings.
Strategy for Web Auction
Virtual communities, web portals, auction basics, web auction strategy, and virtual community strategy.
Section A — Very Short Answer
2 Marks EachA virtual community is a group of people with shared interests who interact primarily through the internet. Example: an eBay community of vintage collectible sellers and buyers.
Hint: Give a clear definition using syllabus language and add 2 key points plus one example. Example: An eBay-style auction with reserve price and sniping.
A web portal is a gateway website that provides access to multiple services, resources, and aggregated content from different sources in one unified interface (e.g., Yahoo, MSN). A regular website typically focuses on a single organization's content.
Hint: Outline the steps or process in order and mention key tools or examples. Example: An eBay-style auction with reserve price and sniping.
English Auction: open ascending-price auction where bidders publicly bid up from a starting price; highest bidder wins. Dutch Auction: starts at a high price that drops until someone accepts it — used for perishable goods or large quantities.
Hint: Give a clear definition using syllabus language and add 2 key points plus one example. Example: open ascending bids like eBay.
Hint: A reserve price is a minimum acceptable price that protects the seller from underpricing. Example: seller sets a minimum bid in an auction.
Hint: Bid sniping is last-second bidding; it is often allowed but debated as unfair by some. Example: pirated product images or counterfeit listings.
Hint: Bidders submit one confidential bid; used in procurement or contract tenders. Example: government tenders or procurement.
Section B — Short Answer
7 Marks EachVirtual communities create engaged audiences and trust. Web portals aggregate demand. Auction strategy: attract sellers with easy listing tools, attract buyers with wide selection, use reputation systems (ratings), ensure secure payment escrow, provide dispute resolution. Advantages: price discovery, global reach, unique items.
Hint: Write 3–5 well-labeled points with brief explanations; include at least one example. Example: An eBay-style auction with reserve price and sniping.
Seller ratings, buyer feedback, escrow services, identity verification, dispute resolution policies, money-back guarantee, fraud detection, secure payment systems. Trust creates repeat use and community loyalty.
Hint: Explain the purpose, main functions, and impact in an e-commerce context. Example: An eBay-style auction with reserve price and sniping.
Hint: English is ascending and transparent, Dutch is descending and fast, and sealed-bid suits procurement or competitive bidding. Example: government tenders or procurement.
Section C — Long Answer
15 Marks Each~3 marks per section. Include eBay-style examples. Community strategy: forums, seller ratings, loyalty programs. Portal strategy: SEO, partnerships. Auction mechanics: English, Dutch, sealed-bid, reserve prices, sniping. Security: escrow, buyer protection, identity verification.
Hint: Explain the purpose, main functions, and impact in an e-commerce context. Example: seller sets a minimum bid in an auction.
Environment of Electronic Commerce
International legal, ethical, and tax issues, the global nature of e-commerce, and regulatory challenges.
Section A — Very Short Answer
2 Marks EachConsumer privacy violations, digital divide/access inequality, deceptive advertising, exploitation of labor in developing countries, environmental impact of logistics, data sovereignty, cultural imperialism through digital content.
Hint: List the required items using syllabus terms and add a one-line description for each. Example: GDPR compliance and VAT on digital services.
Complexity arises from: different tax rates across jurisdictions, lack of global standard, difficulty determining the "location" of digital transactions, tax avoidance by multinational digital companies, digital goods vs physical goods taxation difference.
Hint: State clear reasons and support each with a brief example. Example: GDPR compliance and VAT on digital services.
Jurisdiction is the question of which country's laws apply when a transaction occurs between a seller in one country and a buyer in another. Example: a US company selling to an EU customer — does GDPR (EU law) apply?
Hint: Give a clear definition using syllabus language and add 2 key points plus one example. Example: GDPR compliance and VAT on digital services.
Hint: GDPR is an EU data protection law that governs consent, data handling, and user rights. Example: EU customer data consent and deletion rights.
Hint: The digital divide is the gap in access to technology and skills, affecting global reach and inclusion. Example: rural areas with limited internet access.
Hint: VAT on digital services adds tax obligations across borders and complicates pricing and compliance. Example: VAT on digital services for cross-border sales.
Section B — Short Answer
7 Marks EachContract law (online agreements), consumer protection laws, intellectual property laws (across borders), data privacy regulations (GDPR, CCPA), jurisdiction challenges, electronic signature validity, content regulations, anti-spam laws.
Hint: Cover meaning, key points, and significance, and include examples where possible. Example: GDPR compliance and VAT on digital services.
Privacy: transparent data collection, opt-in consent. Digital divide: accessible design, mobile-first for developing markets. Fair trade: fair supplier pricing, ethical sourcing. Cultural sensitivity: localization, avoiding cultural appropriation. Environmental: sustainable packaging, carbon offsets.
Hint: Write 3–5 well-labeled points with brief explanations; include at least one example. Example: rural areas with limited internet access.
Hint: Challenges include jurisdiction, refunds, and fraud. Protections include consumer laws, platform policies, and payment chargebacks. Example: return rights and dispute resolution for cross-border purchases.
Section C — Long Answer
15 Marks Each- (a) Borderless nature: 24/7 global access creates regulatory grey areas (3 marks)
- (b) Jurisdiction, choice of law, online contract validity, IP enforcement across borders (4 marks)
- (c) Privacy (GDPR), digital divide, consumer deception, environmental ethics (4 marks)
- (d) VAT/GST on digital services, OECD BEPS initiative, withholding taxes, digital service taxes (4 marks)
Hint: Write 3–5 well-labeled points with brief explanations; include at least one example. Example: pirated product images or counterfeit listings.
Business Plan for Implementing E-Commerce
Planning, controlling, implementing, and evaluating an e-commerce initiative.
Section A — Very Short Answer
2 Marks EachThe first phase is Planning. It addresses: What is the business opportunity? Who are the target customers? What will be sold? What technology platform is needed? What is the budget? What is the competitive landscape?
Hint: Give a clear definition using syllabus language and add 2 key points plus one example. Example: KPIs like conversion rate and ROI after launch.
Controlling is the process of monitoring the e-commerce initiative's performance against plans, setting performance standards (KPIs), measuring actual results, identifying deviations, and taking corrective actions.
Hint: Give a clear definition using syllabus language and add 2 key points plus one example. Example: KPIs like conversion rate and ROI after launch.
Conversion rate (visitors who purchase), average order value, bounce rate, cart abandonment rate, customer acquisition cost, customer lifetime value, website traffic, return on ad spend (ROAS).
Hint: List the required items using syllabus terms and add a one-line description for each. Example: metrics like conversion rate, CAC, CLV, AOV.
Hint: SWOT assesses strengths, weaknesses, opportunities, and threats early in planning and feasibility. Example: strengths/weaknesses/opportunities/threats for an online shop.
Hint: ROI compares expected gains to costs to judge profitability. Example: comparing profit gains vs setup costs.
Hint: Evaluation measures results and informs improvements before scaling. Example: KPIs like conversion rate and ROI after launch.
Section B — Short Answer
7 Marks EachPlanning (strategic goals, budgets, tech selection) → Implementing (development, launch, staffing) → Controlling (monitoring KPIs, setting benchmarks) → Evaluating (ROI analysis, customer feedback, performance review) → feeds back into Planning for next cycle. It is a continuous management loop.
Hint: Outline the steps or process in order and mention key tools or examples. Example: KPIs like conversion rate and ROI after launch.
Technical: website development/platform selection, payment gateway integration, security setup, hosting, testing. Organizational: staff training, defining roles, customer service processes, logistics partnerships, marketing launch, change management.
Hint: Cover meaning, key points, and significance, and include examples where possible. Example: KPIs like conversion rate and ROI after launch.
Hint: Use dashboards and analytics tools to track KPIs like conversion rate, CAC, CLV, AOV, and churn. Example: metrics like conversion rate, CAC, CLV, AOV.
Section C — Long Answer
15 Marks Each- Planning (2 marks): business model, target market, financial projections, tech platform selection, SWOT analysis.
- Implementing (2 marks): website build, payment integration, logistics setup, staff training, marketing launch.
- Controlling (2 marks): KPI monitoring, analytics dashboards, A/B testing, budget controls.
- Evaluating (2 marks): ROI, customer satisfaction, traffic/conversion analysis, lessons learned.
- Legal integration (3 marks): compliance checks for each market (GDPR, consumer law, IP registration).
- Ethical and tax integration (4 marks): transparent privacy policy, VAT registration in key markets, ethical supply chain, cultural localization.
Hint: Write 3–5 well-labeled points with brief explanations; include at least one example. Example: KPIs like conversion rate and ROI after launch.
Bonus — Case Study (Exam Style)
15 MarksA: Hosting benefits: no hardware cost, expert management, scalability, SLAs. Shopping cart functions: product catalog, cart management, payment processing, order management, inventory tracking.
B: Cyber-attack = DDoS (Distributed Denial of Service). IP protection: Copyright registration + DMCA notices; Digital Watermarks embedded in images.
C: Credit cards/e-wallets: international buyers can't use cash-on-delivery; enables global transactions, fraud protection. EDI: automated orders/invoices with suppliers + DHL; SCM: real-time visibility of stock, shipping, demand forecasting.
Hint: List the required items using syllabus terms and add a one-line description for each. Example: a browser sending GET/POST requests during checkout.