Assignment Question & Answer..




                                                      

    INDEX


Particulars                                                Page No.


1.    Question 1 .............................................................................3-10

2.  Question 2……………………………………………………11-12

3.  Question 3…………………………………………………….13-14

4. Question 4…………………………………………………….15 -18

5. Question  6……………………………………………………19-20

6. Question 7 ……………………………………………………21-23



  
Q. 1.   Look up two cars manufactures website on the internet. Configure the car of your choice and report your finding. Make sure to include payment option, shipping charges, financing and delivery schedule.

Ans.-  Here we take Ford motor and Maruti Suzuki. So before starting we should understand the company       background.

Ford Motors –

When I visited the Ford motor site than I saw this window for Configure the cars -

                      
About Ford motors –

                                       Ford started its innings with the Mahindra-Ford joint venture formed in 1994, which produced the Escort out of M&M Nashik plant.  After meeting initial success, sales of the Escort was finally replaced by the Ikon in 1999.

            The Ikon marked a new beginning for Ford in India.  It rolled out of the Marajmalaingar plant near Chennai and by now, the company had parted ways with M&M and was renamed Ford India Ltd in 1998.  The Ikon was the first model by a multinational to be developed specifically for India.  Though it was based on the Fiesta, it was a unique body style and was offered and was offered with an option of three engines, including a diesel.  The car was a big hit.  The Ikon underwent several face-lifts and price cuts to keep demand high.  However, fresher competition and a reputation for high-maintenance saw sales gradually decline.  After the arrival of the modern and highly-capable Fiesta, another made-for-India car, with state-of-the-art engines, the Ikon has been marginalized.  The Fiesta has picked up where the Ikon left and is selling well.
            Though the Ikon and Fiesta have been the mainstays of Ford’s production in India, the company has had limited success with other models.  The Mondeo, launched in 2001, was a very talented car by was simply not suited to Indian conditions and earned a reputation for being exorbitant to maintain.
            The Endeavour SUV was launched in early 2004 and has sold well for its niche.  The Endeavour has recently been upgraded in 2007 and this has boosted the appeal of the big SUV.  In 2004, Ford launched the Fusion, which has received a lukewarm response though the recent diesel variant has perked up sales.
                                              

Fusion:
              fusion-oyester


PRICE(lacs)
6.59


Engine:

Type
4 Cyl. In – Line, 16 – V DOHC
Construction
All Aluminium Alloy
Fuel System
SEFI
Displacement (cc)
1596
Compression Ratio
9.75:1
Max. Power (ps/rpm)
101 / 6500
Max. Torque (nm/pm)
146 / 3400
Emission Stage
Bharat Stage III
Kerb Weight (Kg)
1143
Transmission
Manual 5 Speed
MaxSpeed (Kmph)
174
Mileage
11.3







Endeavour:
endeavour-oyster


PRICE(lacs)
(4X2)                                             
16.16
(4X4) 
17.17


Engine:

Type
2.5 litre, 4 Cylinder in-line, Turbocharged & inter-cooled diesel
Displacement (cc)
2499
Max. Power (PS/rpm)
116/3500
Max. Torque (kgm/rpm)
28.5/2000
Ignition System
Compression
Valve System
SOHC, 12 Valves
Fuel System
Indirect Injection Mechanical Pump
Emission
Exhaust Gas Recirculation (EGR) Meeting Bharat Stage III Norms
Kerb Weight (Kg)
1933/1958
Transmission
Manual 5 Speed
MaxSpeed (Kmph)
142
Mileage
8.2





Fiesta:
fiesta
Engine
1.4 EXI
1.6 ZXI
1.6 SXI
1.4EXI (TDCi)
1.4 ZXI (TDCi)
1.4 SXI (TDCi)
Price(in lacs)
6.76
7.28
8.28
8.00
8.52
9.19
Type
4 Cylinder in-Line, 16 Valve DOHC
4 Cylinder in-Line, 8 Valve SOHC
Construction
All-aluminium Alloy
Fuel System
SEFI
High Pressure Common Rail
Displacement
cc
1388
1596
1596
1399
1399
1399
Compression Ratio
9.75:1
9.75:1
9.75:1
18:1
18:1
18:1
Max. Power Output
ps/rpm
82/6000
101/6500
101/6500
68/4000
68/4000
68/4000
Max. Torque
Nm/rpm
127/4000
146/3400
146/3400
160/2000
160/2000
160/2000
Emmision Compliance
Bharat Stage III
Transmission Type
5 Speed Manual
Kerb Weight (Kg)

MaxSpeed (Kmph)
170/178
Mileage
14.75/13.6




Ikon:

ikon-red
PRICE(lacs)
5.50


Engine:

Type
4 Cylinder, 8-V SOHC, Rocam Petrol
Fuel system
SEFI
Displacement (cc)
1299
Max. Power (ps/rpm)
70/5500
Max. Torque (Nm/rpm)
105/2500
Transmission Type
5 Speed Manual
Kerb Weight (Kg)
978
MaxSpeed (Kmph)
148
Mileage
10.8












 MARUTHI:
           
            It began with the promise of being the ‘People’s Car’.  The car never went into production and the company went belly-up in 1977.  Six years later, it rose like a phoenix from the ashes and changed the Indian automotive sector forever.  The company – Maruthi Udyog Limited.  The story of Maruthi dates back to the 1970’s.  Indira Gandhi was the prime minister of India.  Her son, Sanjay Gandhi, envisioned the manufactured of an indigenous cost-effective, low-maintenance compact car for the Indian middle-class. The Cabinet passed a unanimous resolution for the development and production of a ‘People’s Car’.  The name of the car was chosen as ‘Maruti’.

The Car that changed India:
            The Maruthi 800 was essentially a Suzuki SS80, which was called the Fronte in Japan and Alto in most of the other markets.  The 796cc, in-line, three-cylinder power plant produced 39.5bhp at 5500rpm.
            Maruthi marked the beginning of a revolution in the Indian automobile industry.  The Maruthi 800, with its compact size, nimble handling and perky engine, offered the Indian motorist a cheaper, friendlier alternative.  On 14th December 1983, Harpal Singh became Maruthi’s first customer as he received the keys of his Maruthi 800 car from Prime Minister Indira Gandhi.  The car cost Rs.48,000.  The new Maruthi, launched in June 1986, cost approximately Rs 15,000 more than the outgoing model.

The new Maruthi:
            In 2005, Maruthi launched the Swift, for the first time in its 20-year history.  The Swift signaled the importance of the Indian market in the world.  A team of engineers from Maruthi worked on the design of the Swift in Hamamatsu, Suzuki’s headquarters in Japan. 

                  



Product-   
                      Model                                                  Year of launching
Maruthi 800                                                                               1983
Maruthi Omni                                                                            1984
Maruthi Gypsy                                                                           1985
Maruthi 1000                                                                             1990
Maruthi Zen                                                                               1993
Maruthi Esteem                                                                          1994
Maruthi Baleno                                                                          1999
Maruthi Wagon R                                                                      1999
Maruthi Alto                                                                              2000
Maruthi Versa                                                                            2001
Maruthi Swift                                                                            2005
Maruthi Zen Estilo                                                                     2006
Maruthi SX4                                                                              2007
Maruthi Suzuki Grand Vitara                                                    2007













Q. 2 Evaluate four high volume items that are sold on the internet . what makes e-marketing so successful.

Ans .    In the world of affiliate marketing, Amazon’s Associates program was one of the first major online affiliate programs, but it has not been incredibly popular with most affiliate marketers because of their low commissions of 4% to 10% on the sale of their physical products.
If you are an Internet entrepreneur, most likely one of your biggest goals is to find ways to create passive income streams for yourself so that you can work less, earn more and enjoy your life. Well, if you’re interested in creating passive income, then don’t give up on Amazon just yet. I want to show you why Amazon might be the best, and most dependable source of online passive income.
  • Amazon has a huge selection of high ticket items. Rather than devoting so much effort to get a high volume of commissions on lower priced items, why not put that effort into going after high-ticket items? Amazon.com sells well over 10,000 items with a ticket price in excess of $10,000 or more.
  • There is a lot less pre-selling when you are marketing popular products that people are already searching for information about online. When you are going after buyer long tail keywords that contain the actual product name it’s easier to attract targeted traffic for those keywords.
  • You earn a commission on the whole order that a buyer makes when they click on your link to amazon.com.
  • Amazon has is a strong, trusted brand with a stellar reputation. People do not hesitate to buy from Amazon, which makes the conversion process so much simpler.
To get started generating passive income with the Amazon associates program you must apply to the program and get your website approved. You’ll be setting up highly targeted, nich websites after doing extensive keyword research. You can either come up with a domain name and purchase it, or try to find and invest in an aged, possibly with a page rank domain name.

Word Press blogs are quick and easy to set up and they make it so much simpler to gain good search engine rankings. The most important aspect of this whole operation is your content. You will be developing keyword rich content because the Amazon associates program works best with content rich blogs.
Finally, you’ll have to invest the time to build up traffic using on-site SEO techniques, building quality back links and using social bookmarking.

But once you have put in the time and effort to create your first niche affiliate blog, the next ones are so much easier as you will have overcome the initial learning curve. There are also lots of programs available that will walk you through step-by-step how to set up niche affiliate blogs, and some will even show you how to set up an automated blog network that cuts down on most of the manual work of setting up and maintaining a blog network.
So, the Amazon associates program just might be the best source of passive online income, but you’ll never know unless you take some action today and set up your blog


E bay ===
1.       
o    ay is the most popular e-commerce destination on the Internet, with over 100,000,000 items for sale or auction at any given time. The online company is dedicated to eliminating the need for a middleman in trade, but also strives to provide a safe and secure Internet experience. Users from all corners of the globe are connected in a continually broadening marketplace through the membership of eBay.

Types

o    As a matter of course, eBay allows "almost anything on earth" to be traded, bought or sold through its channels. The various categories of items you can shop for on eBay include art, antiques, computers, jewelry, clothing, housewares, exercise equipment, cars, concert tickets, electronics and much more. Over 6.4 million items are listed on eBay every day.

Trends

o    EBay allows its members and visitors to search for the items they most desire before ever committing to a transaction. The most popular items being searched and sold on eBay are mostly tech products, such as the number one item, Nintendo's Wii game console, with over 2 million units sold. Microsoft's XBox 360 was the second most popular item sold on eBay with almost 1.3 million units sold. Rounding out the top five were NIntendo's Wii Fit interactive game console, the iPod Touch by Apple and Sony's Playstation Portable, also known as the PSP. Games for the Playstation, Wii and XBox also made the top 10 items sold, the most popular of which is the latest version of Guitar Hero, a video game that comes with a controller in the shape of a Gibson guitar. Three advanced pocket personal computers made the list, two by Blackberry--the Pearl and the Curve--and one by Apple, the iPhone 3G, each selling an average of 200,000 units.



Q.3 Contract your Internet service provider in your area And determine the procedure and cost of linking a company’s intranet of internet.

Ans. -   When I meet to Internet Service Provider that according to him there is a procedure in which company establish intranet in organization.
These processes are –
A company intranet can be an excellent way to disseminate information to employees, as well as to foster the sharing of important data between departments. The key to a successful intranet is to give every employee a compelling reason to use it. Two NTCA members share their successes in getting their employees to regularly use their intranets.
Some of the benefits of an intranet are that it is cost-effective, efficient and gives employees continuous access to the most updated company information, according to Katy Pond, Web resource coordinator for ENMR Plateau Telecommunications. "[The intranet] changes constantly. It ensures employees have access to the most current information," he said.

Step by step processes are—

Plan the Installation
  • You can run ISA Server Standard Edition on a stand-alone computer, on a computer that is a member of a Microsoft Windows NT domain, or on a computer that is a member of an Active Directory domain.
  • For maximum security, run ISA Server on a stand-alone computer.
  • The configuration of the network adapters involves setting up the external interface to the Internet and then setting up the internal interface to your Windows-based network.
  • Your ISP should provide a static IP address, subnet mask, default gateway, and Domain Name System (DNS) server or servers. Enter this information in the TCP/IP settings of the adapter that is connected to your ISP. Some ISPs prefer to assign this information with Dynamic Host Configuration Protocol (DHCP), which is fine.
You will need a permanent address and appropriate subnet mask for your internal network on the internal adapter (do not use DHCP on this interface). Always leave this default gateway blank. The ISA Server computer needs only one default gateway: the one that is configured on the external interface or interfaces. Configuring a default gateway on the internal adapter causes ISA to malfunction.
Install Microsoft Internet Security and Acceleration Server
Use the ISA Server Setup Wizard
  1. In Windows Explorer, double-click to open your CD-ROM drive.

    NOTE: The ISA Server Setup Wizard starts automatically unless the auto-insert notification feature is turned off. If the wizard does not start automatically, navigate to the root directory of the CD-ROM, and then double-click the ISAAutorun.exe file to run it. Click Install ISA Server to start the process.
  2. At the Welcome screen, click Continue. Type the product identification number in the appropriate box. You can locate this number on the back of the CD-ROM case.
  3. Read the license agreement, and then click I Agree.
  4. Click Typical installation for the installation type. This installs ISA services and the administrative tools.
  5. Click Firewall mode. ISA stops relevant services on the computer.
  6. Configure the local address table (LAT) for ISA. Configuring the LAT requires careful consideration. You are presented with two choices: Either construct the LAT or use the Installer Wizard. Base your selection on the following conditions:
    • If you know the subnet (or subnets) that your internal network uses, type it here.

      CAUTION: Do not click the Construct Table button! If you do, the LAT information that you entered will be overwritten.
    • If you do not know your local subnets, click the Construct Table button. The ISA Setup Wizard will determine the local subnets based on the computer's routing table.
      • Click to select the Add the following private ranges check box if it is not already selected.
      • Click to select the Add address ranges based on the Windows Server 2003 routing table if it is not already selected.
      • Click to clear check box that contains the subnet that corresponds to the server's external (Internet) interface.
Configure the Post-Installation State of ISA
To configure the following two components of an access policy so that your clients can access the Internet, note the following:
  • You have to configure at least one site and content rule, in which you specify where users can go and what kinds of content they can retrieve.
  • You have to configure at least one protocol rule, which specifies the kinds of traffic that is permitted through ISA Server.
After installation, ISA creates a default site and content rule that permits all clients access to all content on all sites all the time. However, this is not enough for users to start surfing the Internet: You still have not defined a protocol rule. Without this, no traffic is permitted through ISA.

These costs are incurred in company’s intranet to internet.





Q.4 Evaluate the Following sites:

a.     www.statefarm.com
b.     www.wachovia.com
c.      www.feedex.com

·        Evaluate each site in terms of colors scheme and the profile of organization as perceived by the visitor.
·        Does each site follow use of the proper color for psychological effect or impact?
·        Is there is relationship between colors and how conservative an organization is?

Ans.-
           I want to answer this question on the basis of -



 

b.    www.feedex.com






Q. 5 Access www.ibm.com and valuate the service offered. For the first time business on the internet which service would you recommend the new e merchant the new e-merchant consider?

Ans –
              When I visited ibm.com then I saw this window



Services-


IBM services span the Telecom, Banking, Insurance, Distribution, Channel and Industrial sectors. Our expertise lies in the field of Customer Relationship Management (CRM) services like Customer Service, Collections and Customer Tech. Support.
Besides this, IBM also specializes in Finance & Accounting (F&A), Analytics Services, Managed Tech. Support and Industry-specific back-office solutions. More than 75 clients around the world use our asset-based solutions through our delivery centers.


IT services
Other services
Business consulting
Top of Form

IBM Global Process Services – BPO Landscape
Bottom of Form
Top of Form


Bottom of Form
Q. 6  Assume you have been asked to served as a consultant for a local grocer interested in launching an online business on the internet .Develop a security plan  than can be incorporated as part of technical infrastructure.

Ans.-
          For opening a new grocery store online there is a need of a good and effective security plan this plane 
A computer network assessment will help us begin a security plan to mitigate the largest risks to your business.  A security plan needs to be developed by an employee or a contractor that has a basic understanding of  security.
A comprehensive cyber security plan needs to focus on three key areas:
  • Prevention.  Solutions, policies and procedures need to be identified to reduce the risk of attacks. 
  • Resolution.  In the event of a computer security breach, plans and procedures need to be in place to determine the resources that will be used to remedy a threat.
  • Restitution.  Companies need to be prepared to address the repercussions of a security threat with their employees and customers to ensure that any loss of trust or business is minimal and short-lived.

Now, the crux of the matter in security. There are still many computer users who are afraid to shop online and are afraid to give their credit card numbers online. Well, I have some good news for you.

First of all, if you plan on doing a lot of shopping online, but don't want to over-extend yourself - get a debit card from your bank. Ask them for one. That way you will only buy what you have money in the bank to cover. Once you get used to shopping online, it is very easy to over-extend yourself if you have a credit card with a large credit line. Almost all online stores now accept debit cards and it really is the best way to shop.

Make sure the debit card you get is a "major" card like Visa or MasterCard. When you shop, pick out the major or national chain stores to shop in. They are all safe to deal with. Once you get used to the idea, you will find that shopping online with a credit card is much safer than shopping in a store in person. When you put your credit card number in an online store, for instance like Sears, it is mmediately encrypted AND IT DOES NOT GO TO SEARS AT ALL. It goes directly (encrypted) into Visa or MasterCard who in turn checks it's validity and then let's Sears know that it is valid. It all takes only a few seconds before anyone has a chance to see it. (This is why I said DO NOT LET THE STORES STORE YOUR CREDIT CARDS!) Now, the only way a hacker can get your card is by hacking into Visa or MasterCard and, in that case, this would include the card you use at in-store shopping anyway, as well as online shopping. I think that would take some doing. Even if a hacker could do it, with the millions upon millions of cards they have, the odds of yours being chosen would be like trying to win the lottery, pretty slim.

Now compare online shopping to shopping at the store in person. The sales clerk not only sees your card, but has a copy of the number in the sales receipt which is stored there by her cash register for any clerk to see until the receipts are sent to the office. And then, how many people in the office see your receipt with your credit card number on it? Several handlers probably, the computer operator who posts your sales transaction, the accountant who handles the books, etc. Now what seems safer to you?

2. Now The Last Piece of Information To Complete Your Security-Safe Passwords

The tendency is to find a really neat password and use it for everything, mainly because it's easier to remember. No. No. No. If someone cracks your password, they can get into everything. You need to have unique passwords, especially if you bank online, have a stock plan or retirement plans online or some program that is really sensitive. I have a couple of doozies for my bank account and my PayPal account. I can never remember them and look them up each time I use them. It must be unique and should be at least 8 digits long, preferably 12 with both letters and numbers. No problem with trying to remember them anymore because of the "neat little trick" I showed you using the Rolodex. Keep the Rolodex right by your computer and it just takes a second to flip to the one you're looking for. You can go really wild now with your creativity, because you are no longer going to be using the same password. You're going to make up new ones everytime you join something on the Internet. Nothing will protect you more than this. This is the way to create passwords.

Right now, on my desk, is a gas bill, 3 cookies and a calendar. Okay, how about gas3calendar. There's 12 letters. Lets make it more secure. My gas bill is $20.93. Not usually that low. How about 293gas3calen. Now there's a 12 digit password that would be hard to crack. There is nothing in there that relates to you, your dog, your birthdate (I don't think), your house number, your zip code. Now that's a perfect password. You could even go further and add 4 numbers to the end of it and make it a 16 digit password. Most passwords are case sensitive and you could capitalize a letter, for instance you could make that last one 293gAs3caLen. Let me give you one more example. On my rug, I have a paisley pattern and I would guess it repeats itself about 100 plus times. Each pattern has 5 loops on it. How about 100plus5paisley. That has 15 letters in it. Or 100plUs5paIsleY. Another very difficult one for someone to crack. On my kitchen counter I have 3 eggs sitting waiting to be scrambled and a picture of my daughter with her 2 children. She's got a bright pink blouse on. You could make several passwords from that. egGs33pinK242524. 3 eggs, 3 children, (33) pink blouse and their ages all "scrambled" up. I don't know about you, but I've never heard of pink eggs before. I doubt too many other people have either, except maybe Dr. Seuss. Be very careful when you print the password into your Rolodex between the small letters and the capital letters. I think you've got the idea
.








Q. 7  Look up the website of Cyber Cash ( www.cybercash.com)  and write a report about the company : Its electronic pay system , basic infrastructure, price and so on.

Ans.
  

Payment system, Price and basic infrastructure-

CyberCash has been servicing credit card transactions over the Internet since April 1995. It has strong ties to the current credit card processing infrastructure, through Bill Melton, a founder of Verifone, as one of its fathers. The use of their payment system has grown tremendously over a year. CyberCash claims that they process thousands of transactions a day, they can send payment transactions to 80% of the banks in America, and to have distributed over 400,000 copies of CyberCash Wallet software to buyers who use their system.
It is important to note that CyberCash is not a credit card processing company. Unlike First Virtual, they do not transfer funds into the merchant's account. CyberCash sells safe passage over the Internet for credit card transaction data. They take the data that is sent to them from the merchant, and pass it to the merchant's acquiring bank for processing. Except for dealing with the merchant through CyberCash's server, the acquiring bank processes the credit card transaction as they would process transactions received through a point of sale (POS) terminal in a retail store.
The CyberCash payment system is centered around the CyberCash Wallet software program, which buyers use when making a purchase. This program must be downloaded and installed on the buyer's machine before they can make a purchase. This program handles passing payment information, encrypted, between the buyer and the merchant.
Once a potential buyer has obtained the CyberCash Wallet and installed it, there are still a few steps to take before it can be used. First, a buyer needs to create a persona or wallet ID which is a string of characters which identify the wallet, and a password. These are then registered with CyberCash. Buyers are allowed to create more than one wallet ID, each with its own password. Secondly, they must bind at least one credit card to the wallet. Binding a credit card entails entering pertinent credit card processing information such as credit card number, expiration date, shipping address and phone number. This information is then registered with CyberCash. Buyers can bind multiple credit cards to the wallet. Once the wallet ID is established, and at least one card has been bound, the buyer is ready to start purchasing.
To be able to accept payment using the CyberCash system, merchants must do two things. First, the merchants must install the CyberCash Internet Payment Software (SMPS). This software allows the merchant to interface with both the CyberCash buyer, or Wallet software, and CyberCash's servers. Secondly, the merchant must establish a merchant account with an acquiring bank that supports Internet transactions using CyberCash's Secure Internet Payment System. CyberCash can only communicate with banks they have an agreement with. The requirements for accepting payments through CyberCash are provided in detail in CyberCash's How to become a CyberCash Merchant document.

Steps to a credit card purchase using CyberCash's payment system:

  1. The buyer indicates that they want to purchase an item from the merchant's WWW site by clicking on the CyberCash pay button.

  2. The merchant's SMPS software sends an invoice to the buyer's CyberCash Wallet software.
    • The CyberCash Wallet is registered as a helper application to the buyer's WWW browser. It is invoked by the browser whenever it downloads a file with the MIME content encoding of application/x-cybercash.

  3. The buyer selects a credit card from the ones bound to their wallet and clicks OK
  4. The Buyer's CyberCash Wallet then digitally signs and encrypts the invoice and credit card information with the key assigned to that Wallet-ID. The encrypted packet is then sent to the Merchant's SMPS software.
  5. The merchant software adds information to the payment packet requesting that either the credit card payment be authorized or authorized and captured.
    • Under normal credit card operating procedures, i.e.. a merchant using a POS terminal, the merchant only receives authorization when the sale actually happens, and then that night sends all the credit card payments to the acquiring bank to be captured.
    • CyberCash is working on allowing batch capture processing and may have it in place by the time you read this.
  6. The merchant's SMPS software digitally signs and encrypts the payment packet with their CyberCash key. The packet is then sent to the CyberCash server.
    • The merchant never sees the customers credit card number.
    • The payment packet is encrypted twice before arriving at CyberCash's server, once by the buyer's software and once by the merchant's.
  7. CyberCash's server moves the packet to a machine that resides behind their firewall and off the Internet. CyberCash then decrypts the message and checks to make sure that the merchant has not tampered with the original invoice agreed upon by the buyer.
  8. The credit card information, with the merchant's request (authorize or authorize and capture), is encrypted using hardware that banks use for encrypting financial data. This information is sent over dedicated lines to the merchant's acquiring bank.
  9. The merchant's acquiring bank then processes the merchant's request as it would any other credit card transaction. It forwards the request through the card associations network to the card issuing bank.
    • Discover and American Express cards are not associated with an issuing bank. Authorizations and captures are performed through the card company itself for these particular cards.
  10. The card-issuing bank sends an approval or denial code back to the acquiring bank. The acquiring bank then sends this code to CyberCash. .