E-Commerce Model Solution 2025 |SG|

TRIBHUVAN UNIVERSITY FACULTY OF MANAGEMENT

Office of the Dean

Model Question By Sorry Gurudev

BBA/ 6ᵗʰ Semester/ IT204: E-Commerce

Note: These are not full answer but hint to write answers. All points are written and you

can explain in your own words

Brief answer questions: (1x10 = 10)

Attempt all questions.

1. List unique features of e-commerce.

 Global reach, 24/7 availability, personalization, interactivity, scalability.

2. What is e-commerce business model?

 A framework that outlines how a company generates revenue through online transactions (e.g.,

B2C, B2B).

3. What is firm value chain?

A set of activities a firm performs to deliver a valuable product or service, from inbound logistics

to sales and support.

4. List some benefits of using mobile applications for e-commerce.

 Convenience, faster transactions, push notifications, personalized offers.

5. List different dimensions of e-commerce security.

 Integrity, confidentiality, authenticity, availability, non-repudiation.

6. Define search engine marketing.

 A digital marketing strategy that promotes websites by increasing their visibility on search engine

results pages through paid ads.

7. What is location-based marketing?

 Marketing that targets consumers based on their geographic location using mobile devices.

8. What is reverse auction?

 A procurement method where sellers bid to offer the lowest price to a buyer.

9. What is collaborative commerce?

 Businesses working together online to improve efficiency, share resources, or develop products.

10. What is affinity community?

 A group of people connected online by shared interests or preferences, often targeted for

marketing.

Group "B"

Short Answer Questions

Attempt any five questions. (5 × 3 = 15)

11. What are the benefits of using e-commerce to businesses?

Reduced operational costs by eliminating physical stores.

 Wider market reach, accessing global customers.

 Improved customer insights through data analytic.


12. How e-commerce influences industry structure?

Reduces entry barriers, allowing new competitors.

 Shifts power to buyers with more choices and price transparency.

 Disintermediation removes middlemen, altering traditional supply chains.


13. What different services are provided by the Internet?

 Email communication

 web browsing

 file sharing (FTP)

 online streaming

 cloud storage.


14. Explain social marketing in brief.

 Social marketing uses social media platforms to promote products/services, engage customers, and build brand loyalty through targeted content and interactions.


15. How supply chain helps in B2B e-commerce?

 Streamlines procurement and inventory management.

 Enhances coordination between businesses for faster delivery.

 Reduces costs through automated order processing.


16. What do you mean by B2B e-commerce marketplace?

 An online platform where businesses buy and sell goods/services to other businesses (e.g., Alibaba), facilitating bulk transactions and supplier connections.


Long Answer Questions (Group C: 3 × 5 = 15)

Attempt any three.

17. Explain different types of e-commerce with example.

 B2C (Business-to-Consumer): Businesses sell to individual consumers (e.g., Daraz selling books).

 B2B (Business-to-Business): Transactions between businesses (e.g., a manufacturer buying raw materials from a supplier via Alibaba).

 C2C (Consumer-to-Consumer): Consumers sell to other consumers (e.g., eBay auctions, Hamrobazar).

 C2B (Consumer-to-Business): Consumers offer products/services to businesses (e.g., a freelancer on Upwork).


18. Explain any two e-commerce payment systems in brief.

 Credit/Debit Card Payments: Widely used, processed via gateways like Stripe or PayPal, offering convenience but

requiring security (e.g., Nabil Bank Visa Card, NIMB Credit Card).

 Digital Wallets: Store payment info for quick transactions (e.g., Esewa, Khalti), enhancing speed and security with

encryption.


19. What is email marketing? Why is email marketing considered most efficient digital marketing channel?

 Email marketing involves sending targeted emails to promote products, share updates, or build relationships.

 It’s efficient due to low cost, high ROI (direct customer reach), personalization options, and measurable results (openrates, clicks).


20. Explain different types of portals with suitable example.

 B2C Portals: Businesses sell directly to consumers (e.g., Amazon, Daraz). Offer convenience, diverse products, and

secure payments.

 B2B Portals: Businesses trade with other businesses (e.g., Alibaba, ThomasNet). Focus on bulk orders and supply chain

efficiency.

 C2C Portals: Consumers sell to other consumers (e.g., eBay, Craigslist). Popular for second-hand goods and auctions.

 C2B Portals: Consumers offer services to businesses (e.g., Upwork, Fiverr). Common in freelancing and gig work.

 Hybrid Portals: Combine B2C, B2B, C2C models (e.g., Amazon, eBay). Serve multiple transaction types.

 P2P Portals: Peers share resources (e.g., Airbnb, Uber). Enable asset rentals in the sharing economy.

 Niche Portals: Target specific markets (e.g., Etsy for crafts, Chewy for pets). Cater to specialized interests.


Comprehensive Questions (Group D: 2 × 10 = 20)

Attempt all.

21. Explain different B2C business models with suitable example of each.

 E-tailer: Online retail stores selling directly to consumers (e.g., Daraz – books, electronics).

 Content Provider: Offers digital content for a fee or ads (e.g., Netflix – streaming movies).

 Community Provider: Builds platforms for user interaction (e.g., Facebook Marketplace – buying/selling).

 Subscription Model: Charges recurring fees for access (e.g., Spotify – music streaming).

 Transaction Broker: Facilitates transactions for a fee (e.g., Expedia – travel bookings).


22. What are different technological solutions to e-commerce threats?

 Encryption: Secures data transmission (e.g., SSL/TLS for website security).

 Firewalls: Block unauthorized access to systems.

 Two-Factor Authentication (2FA): Adds a verification layer (e.g., OTP with passwords).

 Intrusion Detection Systems (IDS): Monitor and alert on suspicious activities.

 Regular Software Updates: Patch vulnerabilities to prevent exploits.

1 Comments

Do Leave Your Comments

Post a Comment

Do Leave Your Comments

Previous Post Next Post