Unit 3: E-commerce Infrastructure

Short Answer Questions (2-3 marks each)

  1. Define the Internet and explain how it differs from the World Wide Web.

  2. What is TCP/IP? List its four layers.

  3. Explain the difference between IPv4 and IPv6 addresses.

  4. What is a Domain Name System (DNS)? Why is it important?

  5. Define bandwidth and latency. How do they affect e-commerce performance?

  6. What is HTTP/HTTPS? Why is HTTPS important for e-commerce?

  7. List three types of internet connection technologies available in Nepal.

  8. Explain the concept of cloud computing and its benefits for e-commerce.

Long Answer Questions (5-8 marks each)

  1. Describe the key features of the Internet that make it suitable for e-commerce. (8 marks)
    • Hint: Discuss ubiquity, global reach, universal standards, richness, interactivity, information density, personalization, social technology.
  2. Explain how a web browser requests and displays a webpage. Include the role of HTTP, DNS, and web servers. (6 marks)

  3. Compare and contrast native mobile apps with mobile web apps for e-commerce. Discuss advantages and disadvantages of each. (6 marks)

  4. Discuss the importance of mobile optimization for e-commerce websites. What strategies should businesses use? (5 marks)

Case Study Question (10 marks)

  1. Case Study: eSewa and Khalti Mobile-First Strategy

    eSewa and Khalti are Nepal’s leading digital payment platforms. Both started with mobile apps as their primary platform.

    a) Why do you think they chose a mobile-first approach for Nepal? (3 marks) b) What infrastructure challenges might they have faced? (3 marks) c) How did cloud computing enable their rapid growth? (4 marks)


Unit 4: E-commerce Security and Payment Systems

Short Answer Questions (2-3 marks each)

  1. What are the six dimensions of e-commerce security?

  2. Define encryption. What is the difference between symmetric and asymmetric encryption?

  3. What is SSL/TLS? How does it protect e-commerce transactions?

  4. What is a digital certificate? Who issues them?

  5. List five common security threats in e-commerce.

  6. What is PCI-DSS? Why is compliance important for e-commerce?

  7. Explain the concept of two-factor authentication (2FA).

  8. What is a digital wallet? Give examples used in Nepal.

Long Answer Questions (5-8 marks each)

  1. Describe the major security threats facing e-commerce websites today. For each threat, suggest appropriate countermeasures. (8 marks)
    • Consider: Malware, phishing, DDoS attacks, SQL injection, data breaches.
  2. Explain how SSL/TLS creates a secure connection between a browser and a web server. Include the role of digital certificates. (6 marks)

  3. Compare different types of electronic payment systems: credit cards, digital wallets, and cryptocurrency. Discuss their advantages and disadvantages for e-commerce in Nepal. (6 marks)

  4. Discuss the management policies and procedures an e-commerce business should implement to ensure security. (5 marks)

Case Study Question (10 marks)

  1. Case Study: Payment Gateway Security in Nepal

    A new e-commerce startup in Kathmandu wants to integrate online payment. They are considering using eSewa, Khalti, or direct bank integration.

    a) What security considerations should they evaluate when choosing a payment gateway? (4 marks) b) What is PCI-DSS and why should they care about it? (3 marks) c) What fraud prevention measures should they implement? (3 marks)


Answer Guidelines

Unit 3 Key Points

  • Internet features: Ubiquity, global reach, universal standards, richness, interactivity, information density, personalization, social technology
  • TCP/IP layers: Application, Transport, Internet, Network Access
  • Cloud benefits: Scalability, cost-effectiveness, reliability, global reach

Unit 4 Key Points

  • Six dimensions: Integrity, nonrepudiation, authenticity, confidentiality, privacy, availability
  • Common threats: Malware, phishing, DDoS, SQL injection, insider threats, data breaches
  • Security measures: Encryption, firewalls, IDS/IPS, access controls, security policies, employee training