Commerce ePathshala NOTES
(IGNOU)
Important Questions & Answers
IGNOU
: BCOM
BCOS
184 :
E - COMMERCE
Q – What is E-Commerce ?
State It’s Advantages & Disadvantages.
Ans.
As
is obvious, the term e-commerce is
an abbreviated term for ‘electronic commerce’, which refers to the process of
undertaking business transactions over internet. Almost anything - ranging from
basic items such as breads or soaps, to high end expensive products such as
computers or cars and even highly specialised services such as sale of
second-hand products to purchase of property, are all available on the related
e-commerce web-portals.
Depending on the products and services available,
e-commerce web-portals could be understood to be ‘Generic’ and ‘Specific’.
Examples of generic ecommerce portals are ‘Flipkart’, ‘Amazon’, where one could
buy any product, ranging from furniture to flowers. On the other hand ‘Big
Basket’ could be termed as a specific e-commerce web portal as the customer can
order for only grocery related products on this web portal.
ADVANTAGES
AND DISADVANTAGES OF E-COMMERCE
There are no doubts in the minds of the stakeholders of
e-Commerce about its ability to make businesses more profitable due to its
capacity to sell goods, services online. At the same time, there are multiple
factors to keep in mind too.
1.
Accelerated
buying process for saving time: One of the problems
conventional stores face is the delay in buying by a consumer during the
problem of accessing a physical store which may or may not be available.
E-Commerce overcomes this hurdle by aiding the consumer avail the specific
product at their own pace and with ease. It helps the consumer choose from a
wide range of products by making available goods from other chained stores as
well, widening the net of available goods as well fast forward the process to
process payments.
2.
Personalised
store as per Consumer preference: A major asset of
conducting online business is the enhanced shopping experience. As each user is
introduced to a different first page based on their location and advanced
search for conducting a purchase. The consumer's history of purchases also
reflects in the personalized experience of online commerce. This allows
consumers to avail special services like benefits and discounts due to their
loyalty, order history and so on, hence fulfilling customer expectations.
3.
Reduce
recurring cost while hiring virtual support resources:
One of the key factors that aids in reducing cost when it comes to e-commerce
is the outsourcing of tasks to even different countries or employees for use to
many other e-commerce businesses. This makes the presence of a company possible
in multiple locations possible at a fraction of the cost of physical presence.
4.
Customers
retargeting is easier: Retargeting a customer is a key part
of retaining a customer base. Below are some of the techniques which can be
used to retarget customers:-
· It
is a good strategy to share a coupon when customers leave the checkout page.
· By
sending emails which are pitching upsell and cross-sell.
· By
redirecting the consumer to the desired web page or targeted advertisement
based on Consumer data.
5.
Easier
to encourage an impulse buy: Impulse buying is an
important tool in the arsenal of the sellers where it works as a path for
consumers to act as per their choices towards particular products. It plays on
the psychological behaviour of humans where some of us have personality traits
that encourage impulse buying. It is often because of the urge to feel good,
and at the same time the attempt at deriving emotional value from certain
products makes them feel good; or things that have an emotional value.
6.
Reviews
Available: The review system allows the consumer to make
decisions as well as pass judgement on a wide range of variables. The presence
of positive comments or a higher rating of one's business not only adds value,
it also builds trust of the consumer on the product as well as the business.
This not only projects the business as transparent, it helps the consumer to
voice their opinion about their choices in products.
7.
Detailed
information available for the consumer: The availability of
detailed information is one of the key strengths of e-commerce. All consumers
are always seeking detailed insights into the product they are interested in as
it aids them in making an informed decision. The availability of information
allows the consumer to gauge the relevance and value of the product or service
according to their needs. It is the detailed description of the product that
helps the consumer to make a confident choice according to their requirements.
8.
Quality
service at reasonably low operation cost: Operational costs
are a major expenditure when it comes to asserting the physical presence of any
businesses. Usually for a business to maintain a physical presence, they have
to pay a lot of money in the form of rent, salaries for employees, maintenance
and other expenses. E-Commerce plays an important role in reducing the cost of
operations significantly by eliminating a significant part of that expense as
the business does not have to rely on a physical presence to provide quality
service.
9.
Quick
and affordable marketing: E-commerce provides a cost effective
way to businesses for marketing anything effectively. This is in contrast to
the expensive and time consuming processes used in physical marketing
practices.
10. E-Commerce has flexibility with 24/7
service capability: Flexibility in terms of both accessibility
and affordability are major areas where Ecommerce is powerful than conventional
stores and retail spaces as it allows the service to consumer 24/7. It is not
only the capability of providing a shopping option round the clock, E-Commerce
also helps consumers with chat support, provide recommendations and identify
products being sought by the consumer at any time and place.
Disadvantages
of E-Commerce
The various disadvantages of E-Commerce are discussed
below:
1.
Lack of personal touch: One of the thing that play a huge
role in consumer satisfaction is the ability to personally view and touch any
product. It is an important factor when it comes to customer satisfaction as
even the best detailed, expressed and explained products can fail to convince
and attract the consumer.
2.
Unsure about the quality: When it comes to purchasing products
online, it is difficult for the consumer to determine its quality. It is also
common knowledge that there has been malpractice when it comes to fake reviews
to artificially boost sales and of a low quality or faulty product.
3.
Late Delivery: One of the assurances of businesses
practicing ECommerce is the delivery time of the product. There are a whole
range of issues that can arise when it comes to the delivery of the purchased
product; hence businesses avoid giving exact delivery dates and try providing
windows for the same. Many times, this results in the consumer waiting for the
product for more than the assured period of time.
4.
Difficulty in purchasing some products: Some precious products
such as gold and customised products like made-to-order furniture (because of
measurement issues) are difficult to be purchased online. Trust is an important
factor when it comes to these products, and the lack of ability to verify them
physically could serve as a hindrance in purchasing such products online.
5.
Site crash issues: There is still some uncertainty when it
comes to the functioning of servers and the availability of round the clock and
quality internet service. This can create a lot of hindrance from sales
perspective, and can result in loss of consumers as they might have to wait for
an unspecified period of time to proceed with transactions.
6.
Cybercrime and Data privacy issues: Last but not the least,
ecommerce is prone to cyber security threats as well as data breaches typical
to the cyber world. E-commerce web portals than any other online information,
as these sites/portals store users’ data including financial and other personal
details of the buyers and the sellers. Hence there is a constant challenge of
securing this data from a wide range of security challenges including malware,
hacking, ransom ware as well as misuse of personal sensitive information /
preferences for targeted marketing / campaigning etc.
Q – State the Types of
E-Commerce.
Ans.
TYPES OF E-COMMERCE
Many different models of electronic transactions exist
in the world of e commerce today. Generally, these are classified as B2B
(Business-to Business), B2C (Business-to-Consumer), C2C (Consumer to consumer),
C2B (Consumer-to-Business), B2G (Business-to-Government/Administration), C2A
(Consumer to Administration), P2P ( Peer 2 Peer), Direct to consumer (D2C)
1.
B2B:
Business-to-Business Model of E-Commerce
In business-to-business (B2B) type of
e-commerce system, companies that are
involved in the supply chain, such as a manufacturer selling a product to a
wholesaler, the wholesaler selling the product to a retailer, all come together
to conduct business with each other using a common portal. In such an instance,
the manufacturer could have a website / web portal that could also be used by
the wholesaler to place orders for the product; this order could then be
processed and sent to the wholesaler. The Wholesaler could further use the same
portal to advertise the product or take orders from a retailer for the same.
2.
B2C:
Business-to-Consumer Model of E-Commerce
This model of e-commerce is understood
to be the process where a company or business sells their goods, services and
products directly to the buyer using Internet. The buyer has the liberty of
browsing through the Internet to filter, check and view products and then order
them. After receiving an order, the company proceeds to process and send the
order directly to the buyer.
Popular examples of B2C are ‘Amazon’,
and ‘Flipkart’. It is important to note that majority of the e-commerce
companies do not manufacture products or produce these services, but rather
list them on their website/ web portal for payments.
3.
C2C:
Consumer-to-Consumer Model of E-Commerce
This form of e-commerce is understood
to be a model where consumers sell goods, services and products to another
consumer using web technologies and the internet. This model comprises the
selling of a wide range of products including movable assets and properties.
Companies such as ‘Quicker’, ‘OLX’ and
so on are some examples of this model of C2C e-commerce.
4.
C2B:
Consumer-to-Business Model of E-Commerce
Unlike ‘B2C’ model, it is a type of
commerce where consumers themselves provide goods, services and products to an
organization (or business) as illustrated below.
There is another version of this
model; in this version, the consumer create and utilize their own social media
profiles (blogs etc.) to link back to the product sold on the company's
ecommerce website / web portal, thereby consumers facilitates the sale of
company’s products and are usually rewarded by these companies for doing so.
5.
B2G:
Business-to-Government Model of E-Commerce
Business-to-government, also known as
business-to-administration, refers to trade between the business sector as a
supplier and a government body as a customer. This kind of e-commerce refers to
the situation where businesses conduct commerce with the government; it is
essentially a part of the ‘B2B’ model.
The business network provides a platform
to businesses to bid on government opportunities such as auctions, tenders and
application submission and so on for various services etc. These activities are
increasingly being conducted through the internet using real time bidding. “
Government e-MarketPlace - GEM” portal by Government of India, is an example of
the same
6.
C2A:
Consumer-to-Administration Model of E-Commerce
The model refers to the e-commerce
process followed by the consumers when interacting directly with the government
agencies. This may be in the form of payments, information access requests or
feedback to various agencies among other things. Consumer to
government/administration model for e-commerce is the ideal answer for
establishing communication between the consumers and the government.
Examples of ‘C2A’ models include
e-government applications such as payment of utility bills including
electricity and water, tax payments, health insurance payments made using web
and mobile applications.
7.
P2P:
Peer-to-Peer Model of E-Commerce
P2P model is essentially a networked
model of commerce without any intermediary. It is therefore a distributed
platform enabling different individuals to partake in transactions with each
other without an in-between third party. This model of network arrangement is
different from the client server model where communication takes place from the
central server.
These services may be operated as free
non-profit services or generate revenue by advertising to users or by selling
users data. Some examples of ‘P2P’ services are open-source software, online
marketplaces, crypto currency and Block-chain, ridesharing and so on.
8.
D2C:
Direct-to-Consumer Model of E-Commerce
Direct-to-consumer refers to selling
products in a straight line to customers, bypassing any third-party retailers,
wholesalers, or any other middlemen.
Direct-to-consumer companies are
transforming how people shop. In the progression, these brands, spanning
everything from detergent to sneakers, are radically changing consumer
preferences and expectations. In addition to establish a direct relationship
with customers, these brands are building a community of ambassadors on social
media.
D2C brands are usually sold online
only and specialize in a specific product category: Casper, Warby Parker,
Everlane, Harry’s, Outdoor Voices, AWAY, and Dollar Shave Club.
Q – State the Key Elements of
a Business Model.
Ans.
KEY ELEMENTS OF A BUSINESS MODEL
To ensure that all these basic questions are adequately
addressed, following are some simple steps to create a strong business model.
1.
Identify your specific audience: Targeting a wide audience
won’t allow a business to identify the right customers, who truly need and want
the product or service. Instead, when creating a business model, narrow down
the audience (expected buyers) number to two or three and do detailed study of
the buyer personas. Outline each persona’s demographics, common challenges and the
solutions of the company that it will offer.
2.
Establish business processes: Before the business can
go live, make a clear understanding of the activities required to make the
business model work. It is important to determine the key business activities
to establish a proper business process. The first step is to identify the core
aspects of the business’s offering.
3.
Record key business resources: What does a company need
to carry out during daily processes, find new customers and reach business goals?
Document essential business resources to ensure the business model is
adequately prepared to sustain the needs of the business. Common example that a
business may need includes a website, capital for the business to start
running, warehouses, intellectual property and the customer lists.
4.
Develop a strong, preferably a unique value proposition:
For standing among other competitors a company needs to provide some additional
value proposition to the customers in the form of an innovative service, or a
revolutionary product. Value proposition is about giving the value to the
business and how it stands out from other businesses in the market. Once the
business has got a few value propositions, then it is important to link each of
them to a service or product delivery system to determine how the business
would remain valuable to the customers over time.
5.
Determine key business partners: No business can function
properly (let alone reach established goals) without key partners that donate
to the business’s ability to serve customers. While building a business model
it is significant to choose the key partners like for example suppliers,
strategic alliances, or advertising partners.
Keeping these five elements in mind, will lead to the
creation of a solid business model capable of fuelling the success of a new
business entity.
Q – State the impact of a
pandemic on E-commerce businesses.
Ans. IMPACT OF COVID ON e-COMMERCE
The corona virus pandemic has considerably changed the
shopping behaviour of consumers for two valid reasons- firstly the shopping
sprees got reduced due to lockdowns and secondly the downward spiral of economy
curtailed the expenditures.
However, in this transition, online stores became more
popular. Even those who had not gone online to shop now realised that they
could buy essential commodities from the safe confines of their homes. These
FTUs (First Time Users) on e-commerce sites also suddenly became aware of
massive discounts/ bargain deals available online, which probably would have
never come their notice earlier. As a result, quite a lot of consumers have
switched from shops, supermarkets, and shopping malls to online portals for the
purchase of products, ranging from basic commodities to branded goods, even
when the covid-imposed lockdowns have been lifted.
However, this is just the tip of the ice-berg- COVID
and Digitilisation have more to unfold in e-commerce sector than what we can
see now. Only future would tell.
Q – What are e-Commerce
revenue models? Explain their various types.
Ans.
E-COMMERCE REVENUE MODELS
E-commerce not only involves doing business over the
internet, it is also about designing new profitable business models. After we have
understood some of the important implementation strategies for e-commerce
businesses, we would move on to understand possible modes of income generation
in ecommerce implementation. This is best explained by the revenue model
defining the e-commerce implementation.
1. Advertising Revenue Model:
Revenue in e-commerce businesses could be primarily generated by hosting
advertisements of other products/ services on online stores; this is the most
basic model of revenue generation referred as Advertising Revenue Model.
This model provides content and
services like email, chat, etc. mixed with advertising messages in the form of
banner ads. The advertising model only works when the volume of viewer traffic
is large or high. The banner ads may be the major or sole source of revenue for
the broadcaster.
2. 2. Affiliate Revenue Model:
It is a very popular variation to the
advertising revenue model that is based on pay-for-performance Concept.
In this concept the sellers put advertisement of their products as ‘links’ on
websites of their partners, also called affiliates. Payments are made to the
sellers when the links are clicked, and orders are placed and in return the
partners/ affiliates get some part of the revenue.
3. Transaction Fee Revenue Model:
There are certain e-commerce sites, such as OLX, e-bay who charge a transaction
fee from its users. This transaction could be either fixed or could be in terms
of percentages of the volume of transactions undertaken.
4. Sales Revenue Model:
Sale of products/ services itself generates revenues for the sellers (who could
be a retailer or wholesaler) who sell their products online.
Q – State the Essential
Technology Features Required in E-Commerce.
Ans.
ESSENTIAL TECHNOLOGY FEATURES REQUIRED IN E-COMMERCE
Essential features of technology required while
designing e-Commerce are explained as follows:
1.
Ubiquity: E-commerce is ubiquitous i.e. it can be accessed from
everywhere and at anytime. It is not restricted to any physical space and makes
it possible to shop anytime, anywhere using any electronic device
(laptop/desktop/mobile phone/tablet) having internet connectivity.
2.
Global Reach: The technology has eliminated the national
boundaries. In e-commerce businesses, potential market size is almost equivalent
to the global population.
3.
Universal Standards: Another obvious unusual feature of
e-commerce technologies is there is one set of technical standards of the
internet that is universal standards. The Internet is shared at the global
level by all nations, it enables any computer to link with any other computer
regardless of the technology platform used by each one of them. Using the
universal standards files can be easily exchanged with any remote device across
globe.
4.
Richness: Advertising and branding are an important part of
commerce. E-commerce can deliver video, audio, animation, billboards, signs and
etc like traditional commerce. Information and the contents are rich can be
delivered without sacrificing the reach.
5.
Interactivity: E-commerce technologies allow for
interactivity, meaning they enable two-way communication between the merchant
and the consumer.
6.
Information Density: Ecommerce technology reduces the
information collection, storage, communication, and processing cost. At the same
time, it has increased the accuracy of quality information, making information
more useful and important than ever.
7.
Personalization: E-commerce technology allows for
personalization. On the basis of name, interests, and past purchase behavior
products can be customized and personalized, further, this collected
information could be used for sending marketing and promotional messages to the
targeted customers.
Q – State the Advantages of
employing digital technologies in Governance.
Ans.
1. Fast and convenient service to citizens: Citizens can have
easy and quick access to the related information regarding to all the public
services by applying for any service online on web portal/ apps developed by
the government. Further he/she can get documents easily in electronic form or
hard copy as per the requirement, so there is no more waiting in the long
queues. In other words, citizens can take advantage of many other online
services just on a click of mouse and the public services are available to them
at their doorsteps by minimising their transaction costs and travelling costs.
2.
Reduction in delays, red tapism, and corruption:
Implementation of e-government ande-governance lowers several other related
bureaucratic problems such as long processes, personal grudges of the delivery
officers and so on. With implementation of digital technologies, there is
improvement in transparency in public processes and clear accountability of the
government functionary in charge of that process. It not just fastens the
processes but also reduces corruption that could come up in manual processes.
3.
Effective utilization of resources: Resource utilization is
optimised through effective implementation of digital technologies in public
domain due to the speed and efficiency provided by digital technologies. This
kind of utilization is not possible with manual paperwork and manual processes,
otherwise used in government organisations.
4.
Enhanced citizen participation: In a democratic system,
citizen participation is one of the key components of decision-making process.
The use of Internet based technologies raises the possibility for largescale
citizen participation in policy making process of government, despite the
distances and diversity of the population.
5.
Integration of public services of offered by different departments:
By using digital technologies, different departments and different functions
could be connected. This integration of public services offered by state and
central government provides ease of access of public services to the citizens.
Indeed, the growth of e-governance and e-government has
been one of the most striking and noticeable developments in governance and it
would be interesting to understand how different public organisations or even a
country evolves from the most basic stage of employing digital technologies in
governance to the higher stages. This is explained in the next section by
referring to the Gartner’s evolution model of e-government.
Q – State the Merits of
e-Payment System.
Ans.
MERITS OF E-PAYMENT SYSTEM
E-payment systems are made to facilitate the acceptance
of electronic payments for online transactions. With the growing popularity of
online shopping, e-payment systems became a must for online consumers — to make
shopping and banking more convenient. It comes with many benefits, such as:
· Reaching
more clients from all over the
world, this result in more sales.
· More effective and efficient
transactions — It’s because transactions are made in
seconds (with one-click), without wasting customer’s time. It comes with speed
and simplicity.
· Convenience.
Customers can pay for items on an e-commerce website at anytime and anywhere.
They just need an internet connected device. As simple as that!
· Lower transaction cost
and decreased technology costs.
· Expenses control for customers,
as they can always check their virtual account where they can find the
transaction history.
· Today
it’s easy to add payments to a website,
so even a non-technical person may implement it in minutes and start processing
online payments.
· Payment
gateways and payment providers offer highly effective security and anti-fraud tools to make transactions
reliable.
Q – State the Types of Payment Methods. Explain.
Ans.
TYPES OF PAYMENT METHODS
There are various types of payment gateways consumers
are using. It can be possible in brick-and-mortar which we usually call
physical stores and shopping online which we call click-and-mortar stores. In
physical stores, payment gateways consist of the point of sale (POS) terminals
used to accept payments by card or by phone. In online stores, payment gateways
are the “checkout” portals used to enter credit card information or credentials
for services such as Google Pay, Amazon Pay, Facebook Pay and WhatsApp Pay.
Using multiple gateways make great business sense when you considering the
flexibility it gives to your team. There are various kinds of Epayment present
in a market, some are mentioned below:
· Automated
clearing house.
· Wire
transfers.
· Item
processing.
· Remote
deposit capture.
· FedLine
Access Solutions.
· Automated
Teller Machines.
· Card
Services (ATM, credit, debit, prepaid)
· Mobile
payments
· Crypto
currency
On the other hand
E-payment methods could be further classified into two areas, credit payment
systems and cash payment systems which we usually called Pre Paid & Post
Paid E-Payment System.
Prepaid refers to the
scheme in which you buy credit in advance before availing services. Post-paid
is defined as a scheme in which the customers are billed at the end of the
month for the services availed by them. Examples include plastic card, on-line
transactions, concerned bank, performed by phones or by filling form on the
website, Cyber Cash, encrypted payment, Internet Cheques, cheques for deposit,
Process them internally, and clear and settle between banks, cheques
handwriting signatures.
Credit
Cards
Credit card is a plastic card which is issued by a
bank. It is issued to customers of high credit ranking, the necessary
information is stored in magnetic form on the card. A card holder can purchase
the item from the shop or the showrooms and need not pay cash. He has to flash
the card in machine at the place where he is making purchases. Banks issue
credit card to the customers up to a certain limit. The customers can purchase
goods/services from the authorized showrooms without carrying physical cash
with them. The bills are presented by the showroom to the authorized branch.
This bill is presented by the paying branch to the issuing branch.
Cyber
Cash
Unlike Credit card, Cyber Cash is not directly involved
in handling funds. In Cyber cash system, after deciding what is to be purchased
the customer makes payment to the merchant through credit card without
disclosing the credit card number to him. The credit card number is sent to the
merchant in encrypted form. The merchant forward the encrypted payment with his
private key to the bank's Cyber Cash gateway server. The bank's Cyber Cash
gateway server decrypts the information, processes the transaction and forward
it to the merchant's bank.
Internet
Cheques
A cheque is a signed paper document that orders the
signer's bank to pay an amount of money to a person specified on the cheque or
bearer from the signer's account on or after a specified date. Cheques pass
directly from the payer to the payee, so that the timing or the purpose of the
payment is clear to the payee. The payee can deposit the cheque in an account
of his choice or cash it. Banks operate extensive facilities to accept cheques
for deposit Process them internally and clear and settle between banks.
Smart
card
It is a plastic card with a microprocessor that can be
loaded with funds to make transactions; also known as a chip card.
E-wallet
It is clear that mobile wallets are slowly making a
mark as a form of payment method, but cash still remains to be an imperative
necessity for consumers.
Q – Comment on the Following
a)ACH b)RTGS c)IMPS
d)UPI
Ans.
a) AUTOMATED CLEARING HOUSE
Automated Clearing House (ACH) is a computer-based
electronic network that coordinates electronic payments and automated money
transfers i.e processes transactions, usually domestic low value payments,
between participating financial institutions. ACH is a way to move money
between banks without using paper checks, wire transfers, credit card networks,
or cash. ACH and EFT payments are similar in that they are both forms of
electronic payments. However, EFT refers to all digital payments, whereas an
ACH is a specific type of EFT. An ACH payment occurs when money moves from one
bank to another bank. This money moves electronically, through the Automated
Clearing House Network. In India National Automated Clearing House, or NACH,
introduced by National Payments Corporation of India, is a centralized clearing
service that aims at providing interbank high volume, low value transactions
that are repetitive and periodic in nature. Most people already use ACH
payments, although they might not be familiar with the technical jargon. When
employers pay wages through direct deposit or consumers pay bills
electronically out of checking accounts, the ACH network is often responsible
for those payments. These computerized payments have benefits for both
merchants and consumers as explained below:
1. Lower costs: ACH payments use fewer resources than
traditional paper checks. There’s no need for paper, ink, fuel to transport
checks, time and labor to handle and deposit checks, and so on.
2. Recordkeeping Convenience: Electronic transactions
make it easy to keep track of income and expenses. With every transaction,
banks create an electronic record. Accounting and personal financial management
tools can also access that transaction history.
3. Convenience: ACH is more convenient and easier to
use as compared to the other methods of payment.
4. Customer’s preference: ACH is preferred because of
security, reduced human error and increase time savings, Faster processing
time.
b)
RTGS (Real Time Gross Settlement)
Money can be transferred from one bank to another on a
real-time basis using Real Time Gross Settlement or RTGS method. There is no
maximum transfer limit, but the minimum is Rs. 2 lakhs. The transactions are
processed throughout the RTGS business hours. Usually, the amount is remitted
within 30-minutes. To be able to transfer money through RTGS, it is required
for the sender and the receiver bank branch to be RTGS enabled. It costs a
little more than NEFT. But still, it will not cost you more than Rs. 30 for
transactions up to Rs. 5 lakhs. The fee varies from one bank to another.
Various requirements for conducting a RTGS are:
· Amount
to be sent
· Account
number of the remitter or sender
· Name
of the recipient or beneficiary
· Account
number of the beneficiary
· Beneficiary’s
bank and branch name
· IFSC
code of the receiving branch
· Sender
to receiver information, if any
c)
IMPS (Immediate Payment Service)
An IMPS sends instant payments. The money is
transferred instantaneously through mobile phones using this interbank electronic
fund transfer service. You can make the transactions 24x7x365 across banks
including all weekends and bank holidays. The money can be transferred using
phones, ATMs, Mobile Money Identifier (MMID) and internet banking. The idea is
simple to allow users to make payments with the mobile number of the
beneficiary. Various requirements for conducting IMPS are:
· MMID
of the Recipient
· 7
Digit MMID Number
· MMID
of the receiver
· Name
of the beneficiary
· Beneficiary’s
mobile number
· Account
Number of the recipient
· IFSC
Codes of the beneficiary bank
d)
UPI
Unified Payments Interface is an instant real-time
payment system developed by National Payments Corporation of India facilitating
inter-bank transactions. The interface is regulated by the Reserve Bank of
India and works by instantly transferring funds between two bank accounts on a
mobile platform.
Unified Payments Interface is a real time payment
system that allows sending or requesting money from one bank account to
another. Any UPI client app may be used and multiple bank accounts may be
linked to single app. Money can be sent or requested with the following
methods:
· Virtual
Payment Address (VPA) or UPI ID: Send or request money from/to bank account
mapped using VPA.
· Mobile
number: Send or request money from/to the bank account mapped using mobile
number.
· Account
number & IFSC: Send money to the bank account.
· Aadhar:
Send money to the bank account mapped using Aadhar number.
· QR
code: Send money by QR code which has enclosed VPA, Account number and IFSC or
Mobile number.
Q – State the differences
between HTTP and HTTPs.
Ans.
Following are the difference between HTTP and HTTPS.
HTTP |
HTTPS |
The full form of HTTP is Hypertext
Transfer Protocol. |
The full form of HTTPS is Hypertext
Transfer Protocol Secure. |
An HTTP URL begins with http:// |
An HTTPS URL begins with https:// |
It uses port number 80. |
It sends the data over port number
443. |
HTTP is an application layer
protocol. |
HTTPS is a transport layer protocol. |
Less secure and vulnerable to
hacking attacks. |
It is highly secure. |
It does not contain an SSL
certificate. |
HTTPS contains an SSL certificate. |
HTTP websites do not use data
encryption. |
HTTPS websites use data encryption. |
It is fast. |
It is slower than HTTP. |
HTTP does not help in improving
search rankings. |
HTTPS provides SEO advantages as
Google gives the preferences to websites that use HTTPS. |
Q – What is web hosting? What
are the various types of web hosting?
Ans.
WEBSITE HOSTING
A web hosting service is a type of Internet hosting
service that allows individuals and organizations to make their website
accessible via World Wide Web. Web hosts are companies that rent out their
services and technologies to host websites on the internet.
A space on a web server is allocated to store the files
by the hosting provider. Web hosting makes the files available for viewing
online. Web hosting provides services and infrastructure to develop, store, and
deploy globally available websites and web apps in the cloud so startups can
focus on applications and users.
Types
of Website Hosting
Various types of web hosting services are explained in
detail below:
1. Shared hosting:
Shared hosting is perfect for entry-level website hosting. With a shared hosting
plan, all domains share the same server resources, such as RAM (Random Access
Memory) and CPU (Central Processing Unit). However, because all resources are
shared, the costs of shared hosting plans are relatively low, making them an
excellent option for website owners in their beginning stages. Although shared
hosting provides website owners with a more simplistic approach to the web.
This means that surges in usage can ultimately affect the website’s user
experience.
2. Virtual private server (VPS) hosting: A
VPS hosting plan is the ultimate middle ground between a shared server and a
dedicated server. It is ideal for website owners, who need more control, but do
not necessarily need a dedicated server. VPS hosting is unique because each
website is hosted within its own space on the server, though it still shares a
physical server with other users. VPS hosting provides website owners with more
customization and storage space.
3. Dedicated server hosting:
Dedicated hosting gives website owners the most control over the server on
which their website is hosted. Dedicated servers’ cost is one of the most
expensive web hosting options. They are mostly used by website owners with high
levels of website traffic, and those who are in need of complete control of their
servers. In addition, a high level of technical expertise is required for the
installation and ongoing management of the server.
4. Cloud hosting:
Cloud hosting is the current buzzword of the technology industry. In Web
hosting, it means many computers working together, running applications using
combined computing resources. This allows users to employ as many resources as
they need without having to build and maintain their own computing
infrastructure. The resources that are being used are spread across several
servers, reducing the chance of any downtime due to a server malfunction.
5. Managed hosting:
The user gets his or her own Web server but is not allowed full control over it
(user is denied root access for Linux/administrator access for Windows); however,
they are allowed to manage their data via FTP or other remote management tools.
The user is disallowed full control so that the provider can guarantee quality
of service by not allowing the user to modify the server or potentially create
configuration problems.
6. Co-location web hosting service:
Co-location web hosting service is similar to the dedicated web hosting
service, but the user owns the co-server; the hosting company provides physical
space that the server takes up and takes care of the server. This is the most
powerful and expensive type of web hosting service. In most cases, the
co-location provider may provide little to no support directly for their
client's machine, providing only the electrical, Internet access, and storage
facilities for the server.
7. Clustered hosting:
Cluster hosting allows multiple servers hosting the same content for better
resource utilization. Clustered servers are a perfect solution for
high-availability dedicated hosting, or creating a scalable web hosting
solution. A cluster may separate web serving from database hosting capability.
Usually, web hosts use clustered hosting for their shared hosting plans, as
there are multiple benefits to the mass managing of clients.
8. Grid hosting:
Grid hosting is a service that provides grid computing Capabilities to its
clients This form of distributed hosting is adopted when a server cluster acts
like a grid and is composed of multiple nodes. Much like cluster hosting, grid
hosting makes it less likely that a spike in resource needs will take site
offline.
Q – What are the Strategies
for developing e-commerce websites?
Ans.
STRATEGIES FOR DEVELOPING ECOMMERCE WEBSITES
The commerce industry is growing with rapid speed as
growth rate is continuously increasing. The process of e-commerce website
development project are categories into seven major steps which are as follows:
1.
Identify the product/service, and the customer:
The first step for ecommerce website development is to identify the
products/services which the company wants to sell in the market to the target
population. As it is essential to identify which products are to be sold and to
whom.
2.
Know your e-commerce customer: KYeC is vital for any
business to understand who their customer is for success in the long run. So,
they can allure them in the best possible way. One way to obtain this is by
evaluating the customers of the competitors.
3. Choose the right e-commerce website
development platform: Appropriate e-commerce platform is a software suite
that aids build the e-commerce store where marketers make their products
available, and customers can process transactions. Choosing the right
e-commerce platform is vital to any online business as it is the very
foundation of the business.
4.
Choose the right e-commerce website hosting platform:
Business success and failure choice of server and hosting are a crucial factor.
It determines the website’s accessibility and performance efficiency. Costs
cutting are an important factor while deciding about website hosting and
support; outsourcing can be exercised.
5.
Choose the right e-commerce development partner:
Choosing for e-commerce technology development partners or e-commerce vendors
can be very difficult. The market is very crowded with service providers and
with each one claiming to offer the services which suit best to company needs.
6.
E-commerce website testing: After completion of the website
development, the next crucial step is e-commerce website testing. Testing
checks usability, customer convenience, checks for bugs, and is important to
providing a good shopping experience. Testing is usually implemented in various
browsers, across platforms, and across devices. Websites can be tested
manually, or automatically, or a combination of the two followed by feedback.
7.
Effective marketing: E- marketing plays a crucial role at this
stage, it is important to advertise it to people. For advertising the website,
marketers need to have a promotional plan drafted out including all means of
advertising. In a crowded market of business owners competing for customers’
attention, it is hard to get new customers or sustain existing ones without
proper marketing.
Q – What are utility
programs? What are the different types of utility programs?
Ans.
Utility
program is a system application that executes a specific task, generally
pertaining to optimal maintenance or operation of the system resources.
Operating systems such as Windows, macOS and Linux come with their own set of
utility programs to maintain and execute different utility functions such as
formatting, compressing, scanning, exploring and much more. Utility programs
also assist with the management of computer functions, resources and files. one
can ensure complete password protection and keep systems virus free using
different utility programs.
Types
of Utility Programs
Various functions are executed by a utility program to
make the system’s operations smoother and more efficient. Overall, utility
programs can be broadly categorized into four parts:
1. System Utilities: Some of the system utility
programs are memory manager, antivirus and firewall, registry checker and
cleaner, package installer and explorer. Also, with the help of such system
utility programs, users can execute functions that are crucial for smooth
running of an operating system.
2. File Management Utilities: File management utilities
include tools such as data archives, software backup tools, file compression
tools and managers. With the help of these, users can manage their data in the
form of files and folders. These utilities help users to sort out, store and
categories files according to the requirement.
3. Storage Device Management Utilities: Storage device
management utility programs provide solutions for enhancing disk capacity, such
as disk clean-up, partition management, formatting, disk space allocation,
defragmentation, etc. With the help of this utility program, users can
compartmentalize systems and external drives for efficient management of
programs and files that are stored within.
4. Miscellaneous Utilities: Apart from these three
utility program categories, there are various other programs that help in
managing business operations. Some of these programs include data generators,
HTML checkers and hex editors, to name a few.
Q – What is an operating
system? Explain the two most commonly used operating systems.
Ans.
OPERATING SYSTEM
In our preceding course BCOS-183 we had elaborately
defined the term Operating system. An Operating System (OS) is an interface
between computer user and computer hardware. The foundational software on a
server is the operating system. Commonly speaking, it is the basis on which
everything else you use runs. Without an operating system, the server is just a
collection of electronics that does not identify how to communicate with the
rest of the humankind. An operating system is software which performs all the
basic tasks like file management, memory management, process management,
handling input and output, and controlling peripheral devices such as disk
drives and printers. A web Server software must match with Operating System.
Windows
Microsoft Windows, commonly referred to as Windows, is
a group of several proprietary graphical operating system families, all of
which are developed and marketed by Microsoft. Each family caters to a certain
sector of the computing industry. If you use The Official Microsoft ASP.NET
Site, MS SQL or Access databases you need Windows hosting because those
technologies are not available on other platforms. The support for traditional
Asp is better on Windows and ColdFusion hosting is most common on Windows
servers, even though ColdFusion runs just as nice on Linux. On the downside,
Windows servers are more exposed to viruses and hacker attacks. Windows hosting
is also more expensive, and Windows servers tend to crash a bit more often.
Windows also takes more server resources than Linux, resulting in fewer hosting
accounts on each server and higher prices.
Linux
With Linux, one get a stable server platform with high
security and no threatening viruses. Linux is free, and does not take as much
server resources as Windows, so Linux hosting is cheaper.
It provides a good selection of scripting languages
(most are also supported by Windows servers). The most common database solution
for Linux is MySQL, which also is open source and works great. PostGreSQL is on
its way to Windows, but not quite there yet. And with the great selection of
free online resources, Linux hosting is the best choice for most self-taught
webmasters and businesses too. Ubuntu or Fedora was the most common choice.
Q – What is a mail server?
What are different types of E-mail servers?
Ans. A mail server (sometimes
also referred to an e-mail server) is a server that handles and delivers e-mail
over a network, usually over the Internet. A mail server can receive e-mails
from client computers and deliver them to other mail servers. A mail server can
also deliver e-mails to client computers.
Types
of E-mail Server
When we use the term email server in the sense of
services or we can separate email servers into 2 main categories: outgoing
email servers and incoming email servers.
1.
SMTP: Outgoing email servers are called
SMTP servers. for Simple Mail Transfer Protocol. guidelines that allow software
to transmit an electronic mail over the internet. It is a program used for
sending messages to other computer users based on e-mail addresses.
2.
POP3: Incoming email servers are known
by the acronyms POP3 (Post Office Protocol). In computing, the Post Office
Protocol is an application-layer Internet standard protocol used by email
clients to retrieve e-mail from a mail server. POP version 3 is the version in
common use.
3.
3. IMAP (Internet Message Access
Protocol): IMAP (Internet Message Access Protocol) is a standard email protocol
that stores email messages on a mail server, but allows the end user to view
and manipulate the messages as though they were stored locally on the end
user's computing device(s).
In general, IMAP is more
complex and flexible than POP3. With IMAP, messages are stored on the server
itself. While with POP3, messages are usually kept on the device, that is, on
your computer or cell phone.
Q – Why is Cyber security
Important?
Ans.
In today’s attached world, one and all benefits from advanced cyber defense
programs. At an individual level, a cyber-security attack can upshot in
everything from identity theft, to extortion attempts, to the loss of important
data like family photos. Each person relies on critical infrastructure like
power plants, hospitals, and financial service companies. Securing these and
other organizations is essential for keeping our society functioning. On the
other hand educating the public on the significance of cyber security, and
build up open source tools which will make the Internet safer for everyone.
Q – What do you understand by
Cyber Threats? Explain It’s Various Types.
Ans.
Cyber Threats For a cyber-security expert, the Oxford
Dictionary definition of cyber threat is a little lacking it’s given as the
"the possibility of a malicious attempt to damage or disrupt a computer
network or system." This definition is incomplete without including the
attempt to access files and infiltrate or steal data. In this definition, the
threat is defined as a possibility. However, in the cyber security community,
the threat is more closely identified with the actor or adversary attempting to
gain access to a system. Or a threat might be identified by the damage being
done, what is being stolen or the Tactics, Techniques and Procedures (TTP) being
used.
Type
of Cyber Threats
In our modern technology-driven age, keeping our
personal information private is becoming more difficult. The truth is, highly
classified details are becoming more available to public databases, because we
are more interconnected than ever. Our data is available for almost anyone to
shift through due to this interconnectivity. This creates a negative stigma
that the use of technology is dangerous because practically anyone can access
one’s private information for a price. Technology continues to promise to ease
our daily lives; however, there are dangers of using technology. One of the
main dangers of using technology is the threat of cybercrimes.
1.
Computer Viruses: A computer virus is a program written to
alter the way a computer operates, without the permission or knowledge of the
user. A virus replicates and executes itself, usually doing damage to the
computer in the process. It is perhaps the most well-known computer security
threat. Carefully evaluating free software downloads from peerto-peer file
sharing sites, and emails from unknown senders are crucial to avoiding viruses.
Most web browsers today have security settings which can be ramped up for
optimum defense against online threats. But, single most-effective way
offending off viruses is up-to-date antivirus software from a reputable
provider.
2.
Spyware Threats: A serious computer security threat,
spyware is any program that monitors your online activities or installs
programs without the consent for profit or to capture personal information.
While many users won't want to hear it, reading terms and conditions is a good
way to build an understanding of how your activity is tracked online. And of
course, if a company don't recognize is advertising for a deal that seems too
good to be true, be sure that we have an internet security solution in place
and click with caution.
3.
Hackers and Predators: Hackers and predators are programmers
who victimize others for their own gain by breaking into computer systems to
steal, change, or destroy information as a form of cyber-terrorism. These
online predators can compromise credit card information, lock you out of your
data, and steal your identity. As we may have guessed, online security tools
with identity theft protection are one of the most effective ways to protect
yourself from this brand of cybercriminal.
4.
Phishing: Phishing attacks are some of the most successful
methods for cybercriminals looking to pull off a data breach. Masquerading as a
trustworthy person or business, phishes attempt to steal sensitive financial or
personal information through fraudulent email or instant messages. Antivirus
solutions with identity theft protection can be used to recognize phishing
threats in fractions of a second.
Q – What are the various Security Barriers faced
by the companies? How MSSPs can help solve them ?
Ans.
SECURITY BARRIERS
While there are hard costs associated with security
incidents in terms of lost data or ransom paid, executive leadership also needs
to be prepared for other business impacts such as brand erosion, loss of
customer goodwill, shareholder disappointment and earnings volatility, all of
which can incur costs months and even years after an initial security incident.
Everyone knows that they need to secure their networks and systems, but
enterprises which are lacking IT resources, dwindling budgets and the sheer
volume of risk to manage; handling security nowadays has become a seemingly
insurmountable task. Consequently, more and more businesses are looking towards
Managed Security Service Providers (MSSP) for help. Here are three common
security challenges companies face and how MSSPs can help solve them.
1. Specialized talent shortage:
There is a shortage of qualified IT security staff, making it difficult for
management to attract and recruit qualified personnel. Escalating salary
requirements further complicate the situation. Consequently, many companies
skip some of the security management basics simply because they don’t have the
time or staff required to implement these practices, making them prime hacking
targets. An MSSP (Managed Security Service Provider) can operate in a variety
of capacities and fill in whatever security gap a company may have. This
includes not only devising a security and compliance strategy for networks and
devices but taking over daily security management. By partnering with an MSSP,
not only do you have access to a dedicated and specialized workforce, but you
also benefit from a team of experts that understands the dynamic security
landscape and the latest threats. Just as you would depend on a CPA (Certified
Public Accountant) to manage your tax filing because of their knowledge of tax
law, an MSSP can provide a level of security expertise that is hard to obtain
on your own.
2.
Prioritizing
risk: There’s no such thing as perfect protection, rather,
it’s a matter of appropriately managing risk and making a conscious decision
about what to do, and perhaps more importantly, what not to do. For example,
while you may be dedicated to building a digital fortress with multiple levels
of security, the sheer volume and variety of threats make it difficult to
assess your current vulnerabilities and to plan an appropriate course of
action. An MSSP can identify your security vulnerabilities and compliance
requirements and help you implement a plan that’s unique to your organization
and business situation. From there, you have two options. Your IT team can
execute the security plan or you can leverage the MSSP to manage your
day-to-day security needs. For example, at Century Link, we help our customers
efficiently manage risk by creating a customized security plan, including
threat intelligence, detection and response for a myriad of security concerns.
3.
Managing
security expenses: While buyers are spending more than ever
on security-related hardware and software, many companies are still exposed and
inadequately prepared for a security incident. Simultaneously, buyers are also
under pressure from management to reduce spending and provide more predictable
operating expenses. But, there is good news. Effective preventive measures
aren’t necessarily cost prohibitive. An MSSP can help you spend your security
dollars smarter by focusing your spending on the priorities that will have the
most impact on your security and compliance posture. With a managed security
approach, you transfer the cost of ownership, thereby reducing the need for
capital investments. You’ll gain a predictable OpEx model that is easier to
forecast and budget, especially important when IT budgets are expected to
remain flat.
Q – Differentiate between the
following:
i)
Digital Signature and Electronic Signature
Ans. i) E-SIGNATURE AND DIGITAL SIGNATURE
The IT Act of India discusses two types of signatures:
• Electronic
Signature, and
• Digital Signature.
Important
points for comparison have been summarised below:
· Section
2(1) (ta) of the IT Act 2008 defines Electronic Signature as: “electronic
signature means authentication of any electronic record by a subscriber by
means of the electronic technique specified in the Second Schedule and includes
digital signature”. The section 2(1) (p) of the IT Act 2000 talks about Digital
Signatures and defines it as “digital signature means authentication of any
electronic record by a subscriber by means of an electronic method or procedure
in accordance with the provisions of section 3” of the Information Technology
Act.
· Electronic
Signatures are technologically neutral and the act does not specify any
particular technology for the purpose of creation of electronic signature while
digital signature follows specific technologybased approach. For example, usage
of hash functions, use of public key cryptography system, etc.
· Electronic
Signature can be biometric, name typed at the end of a mail, digitalized
version of conventional signature. Digital signature uses two-way protection
system with encryption and decryption.
· Digital
Signatures are more authentic than electronic signatures.
· Electronic
signatures are used for the purpose of verification of document while Digital
Signatures are used for securing the document.
· Digital
Signatures have limited validity of maximum three years, while electronic
signatures have no such limits on validity.
Q – What is E-tailing?
Explain its advantages & Disadvantages for retailers.
Ans. E-TAILING
Retail is the process of selling consumer goods or
services to customers through multiple channels of distribution to earn a
profit. Retailers satisfy demand identified through a supply chain. The term
"retailer" is typically applied where a service provider fills the
small orders of many individuals, who are end-users, rather than large orders
of a small number of wholesales, corporate or government clientele. Thus, Retail
is the sale of goods on a physical location where the seller and the buyer meet
in person. Whereas etail is the sale of goods on the internet where the
transaction happens in a digital environment. Various popular players of
E-tailing are Amazon, Flipkart, Zomato, Swiggy, MakemyTrip etc, and for
retailers are Walmart, Mcdonalds, Big Bazaar etc.
Advantages of E-tailing for retailers:
1. Location utility: Location is utmost important for
the conventional retailing process to provide convenience utility to its
consumers. However, in e-tailing location is not important. Retailers and
customers need internet for e-tailing and transaction can happen from anywhere
from within the country or overseas.
2. Less expensive: As compare to organised retailing,
e-tailing is less expensive as it saves wages of salesmen and premises cost and
maintenance. These expenditures are low as compare to internet cost.
3. High Reach: Integration with customers is high in
e-tailing as customers can be local, national and international. Through
internet, e-tailers can reach to large audience.
4. 24*7 businesses: The time utility for customers is
high in e-tailing as customers can buy the products and services from anywhere
and anytime.
5. Feedback: It’s easy to manage customer relationship
management in etailing on the basis of feedback of consumers.
Disadvantages
of E-tailing for retailers
1. Lack to infrastructure: The issues of accessibility
and connectivity of internet causes problems in functioning of e-tailing
activities. Also, the initial investment cost is very high in e-tailing.
2. Lack of technological expertise: To start an online
retailing project it is important to have technological expertise and not all
retailers have it.
3. Complex logistic management: Intrinsic and extrinsic
challenges increase the complexities in e-tailing logistics. Like cash on
delivery increases the operational cycle, managing high rates of returns, poor
logistic management in rural areas and problems in cross-nation shipments.
4. Customers’ expectations: In terms of flexibility in
delivery, detailed product descriptions, cost and security of delivery, flexible
payment options sets high expectations of customers.
5. Lack of personal touch: The lack of face-to-face
interaction, persuasion and handling the customers’ query is a major
disadvantage in e-tailing.
6. High competition: E-tailers have to compete with
other e-tailers as well as the organised and unorganised retailers in the
market that increase the competitions for them.
Q – What do you mean by
E-Services? State the It’s Benefits.
Ans.
E-service is also known as an online service refers to any
information and service provided over the Internet. These services not only
allow subscribers to communicate with each other, but they also provide
unlimited access to information. These services may be free or paid. Thus,
E-Service comprises of the online services available on the Internet, whereby a
suitable transaction of buying and selling is achievable, as opposed to the
long-established websites, whereby only explanatory information are available,
and no online transaction is made possible. Thus, e-service may also include
e-Commerce, although it may also include non-commercial services (online).
BENEFITS
OF E-SERVICES
There are assured benefits of using online services and
these services which can give organisation an edge in making available numerous
benefits both tangible and intangible in nature.
We can easily list a number of benefits e-services can
provide to vendors and consumers and could be fruitful in both the aspects such
as;
•
Accessing a greater customer base
•
Accessing a greater customer base.
•
Alternative communication channel to
customers
•
Alternative communication channel to
customers
•
Broadening market reach
•
Broadening market reach.
•
Cost savings.
•
Enhancing perceived company image
•
Enhancing transparency
•
E-services can provide flexibility to Save
your changes and return later to complete your submission.
•
Faster delivery of products.
•
Gaining competitive advantages
•
Global access, 24 hours a day, 7 days a
week.
•
Improved client service through greater
flexibility.
•
Increased professionalism.
•
Increasing services to customers
•
Less paper waste.
•
Lowering of entry barrier to new markets
and cost of acquiring new customers
•
Lowering of entry barrier to new markets
and cost of acquiring new customers.
Q – State the Technologies
used by FINTECH Companies.
Ans. Technologies Used By FinTech
Within the financial services industry, some of the
used technologies include artificial intelligence (AI), big data, robotic
process automation (RPA), and block-chain. A brief about all of these
technologies in FinTech is explained below:
1. Artificial Intelligence:
Artificial Intelligence is a general term for many different technologies. In
terms of the "FinTech" industry, AI is used in various forms. AI
algorithms can be used to predict changes in the stock market and give insight
into the economy.
2. Chatbots: A
chatbot is a software application used to conduct an on-line chat conversation
via text or text-to-speech, in place of providing direct contact with a live
human agent. A chatbot is a type of software that can automate conversations
and interact with people through messaging platforms. Chatbots are another
AI-driven tool that banks and FinTech industries are using these days to help
with customer service.
3. Big Data:
Big Data is another technology that financial institutions can utilize. In the
finance sector, big data can be used to predict client investments and market
changes and create new strategies and portfolios.
4. Robotic Process Automation:
Robotic Process Automation is an artificial intelligence technology that
focuses on automating specific repetitive tasks. In terms of FinTech, RPA is
used to perform manual tasks that often are repetitive and completed daily.RPA
helps to process financial information such as accounts payable and receivable
more efficiently than the manual process and often more accurately. RPA can be
used to increase the productivity of the financial company.
5. Block-chain:
Blockchain is another financial technology that is being used in the industry.
Out of all the "FinTech" technologies, block-chain was developed for
the purposes of finance.The main feature of Blockchain in financial services is
decentralization where it is not required to trust a third party to execute
transactions. Though block-chain is still an emerging technology, many
companies recognize the impact that it will have and are investing accordingly.
In a nutshell, FinTech is the root of innovation operating at the intersection
of financial services and technology.
6. Other
forms of FinTech technologies act to supplement and enhance existing financial
services. These include services such as transferring funds between banks by
companies such as Plaid (company) and augmenting payroll services for consumers
by companies such as Clair.
Q – Describe the various
steps of an App development process.
Ans. STEPS FOR APP DEVELOPMENT
Development of an app is a comprehensive task involving
various steps, a brief of all the important steps which needs to be followed
while developing any app is described below:
1. Defining Mobile App Objectives
To clearly set and define the
objectives for which App is being made is an important part of the App making
process. Following points are important to consider before App designing is
defined –
· What
is the main purpose of making App?
· What
are the main features of App that will be useful for customers? .
· How
this App will be useful in solving problems of the customers?
Predefined App features
are very useful in assessing the total development budget of the App. However,
research indicates that app design should prioritize user involvement over
proprietary offerings when it comes to prioritizing features.
2.
Preliminary
Design
Deciding about preliminary design is
the first step of an app development, it is important to take time to design an
app's fundamental structure. Before the next step, it is always advisable to
spend enough time to design the App preliminary. The concept building for
production of clear understanding of each and every small element of the app is
important. This phase does not take much time for simple app design, but will
take time in case of complex applications design.
3.
Market
Research
There might be several innovative apps
to start various business projects, but before you move into design and
development, it is always better to do research work in terms of market
requirement. A small research project with the following questions can support
the project much before planning and development work begins –
· What
are marketing plans for this App?
· Who
are target audience for this App?
· How
do you want your customers to use your app?
· Which
software platform and framework will be used to make it?
· Which
mobile app development language will be used?
4. Market Analysis
A market analysis is a quantitative
and qualitative assessment of a market. It looks into the size of the market
both in volume and in value, the various customer segments and buying patterns,
the competition, and the economic environment in terms of barriers to entry and
regulation. The market for mobile apps is growing rapidly like never before.
Due to the pandemic, the number of apps downloaded has increased a lot.
5. Collection of Users Feedback
After the App is ready, share it with
friends and relatives and co-workers to get their feedback and modify the App
accordingly. Following questions may be asked during this feedback –
· Is
this app useful?
· Will
this app be used?
· What
is the tentative cost of this App?
· Is
there anything which can be added to it to make it more useful?
6. Financial and Technical Feasibility
It is always necessary to check the
financial and technical viability of the entire plan before developing app. It
is required to verify whether this software can be developed and whether
existing technology funding is available to develop this application.
Financial Feasibility:
Financial analysis is an essential activity in order to achieve financial
viability. It is important to understand App's fixed cost, to estimate profit
from consumers. The financial plan should also cover publicity, advertisement
and web hosting expenses. Rental fee for App Store should be included as well.
A balanced financial plan must be established in advance.
Technical Feasibility:
Technical feasibility means checking the possibility if App can be developed by
using the latest technology or not. It is important to check if organization is
capable enough to use the latest technology or not. After the financial
evaluations, there may be some technical questions to answer as well.
7. Testing of App Prototype
This is an important stage in the
lifecycle of app development. After completing the App with exciting graphics
and text, it is important for the app to be thoroughly tested and corrected under
a range of real-world scenarios. Link to your original records of design and
planning and check all functions.
8. Launching the App
The process of releasing an app in the
market is extremely critical, as it is largely dependent on the success of this
application. For branding and marketing the App, it is always advisable to hire
a good marketing agency who will make efforts to launch the App in a very
professional manner. Marketing is also one of the most critical activities to
get involved at an early stage in the process. The Digital Marketing Team
supports keyword analysis, important for SEO and App Store Optimism (ASO), both
crucial to discovery. The next step is the submission of the mobile app for
sale in different markets. Before starting this phase, high-quality screenshots
of the application and promotional video and/or demo must be ready for better
results.
9. Official Release
Up until this point, App's official
release date should be the climax of app marketing efforts. Influential
bloggers and journalists could write some papers and articles to apprise the
people who showed interest in the App before the launch. There could also be a
promotional e-mail drive to attract downloads and raise momentum. If the app is
published, try keeping user of the app committed by announcing a special deal
or promotion using push notifications so that users open the app.
Build a simple collaborative feedback channel and
respond to users' comments and concerns. Updating your customers quickly will
work wonderful. Make sure you evaluate and track those KPIs that identify your
marketing goals effectively.
No comments:
Post a Comment