Solved Assignment

BCOS-184 Solved Assignment

E-COMMERCE

  • Course: E-COMMERCE
  • Programme: BCOMOL
  • Session / Term: December 2024 TEE - June 2025 TEE
  • Last updated: January 31, 2026

Q1 – How do newer technologies (mobility, cloud, AI and IoT) change e-commerce?

Core idea

In e-commerce, “emerging technologies” influence how customers shop (front-end experience) and how businesses run operations (back-end processes like data handling, service delivery and decision-making). These technologies make online business more responsive, scalable and data-driven.

Advertisements

Mobility

  • Shopping on-the-go: Mobile devices allow customers to browse, compare and buy from almost anywhere, which pushes businesses to design mobile-friendly experiences.
  • Design focus: E-commerce interfaces must work smoothly on handheld screens, with faster loading and easy navigation for mobile users.

Cloud computing

  • Scalable computing power: Cloud helps businesses store, manage and process large volumes of data without owning heavy infrastructure.
  • Service delivery models: Cloud-based services support flexible deployment and can help organizations run applications and services more efficiently.

Artificial Intelligence (AI)

  • Smarter decisions from data: AI supports advanced analytics, helping businesses detect patterns and make better decisions.
  • Better customer support and service: AI-enabled tools (like chat-based support) can improve service quality and speed, and can assist in handling routine customer interactions.
  • Fraud and compliance support: AI-driven mechanisms can help improve detection of suspicious transactions and strengthen trust in digital payments.

Internet of Things (IoT)

  • Continuous data capture: IoT devices collect and transmit real-time information through connected sensors and devices.
  • Operational impact: IoT can strengthen tracking and monitoring use-cases, but it also expands the security surface because many devices stay connected most of the time.

What this means for an e-commerce business

  • Customer expectations rise: Users expect speed, convenience, and quick support across devices.
  • Operations become data-centric: Cloud + AI + IoT increase the role of analytics and automation in daily business decisions.
  • Security becomes critical: More digital services and connected devices make cyber security a core requirement, not an optional add-on.

Q2 – What is a virtual currency, and why was cryptocurrency restricted by the RBI?

Meaning of virtual currency

A virtual currency is a digital form of currency that operates in electronic form and is typically unregulated. It is usually issued and controlled by its developers and is accepted among members of a virtual community. In practical terms, it can be used as a medium of exchange, a store of value, and a unit of account.

Key characteristics highlighted in the course

  • Not legal tender: Virtual currencies generally do not have legal-tender status in a country, meaning they are not officially recognized like a national currency.
  • Not used for government payments: They typically cannot be used to pay taxes or other mandatory public dues.
  • Exchangeability: Many virtual currencies can be exchanged for “fiat” currency (government-issued currency), which enables trading and speculation.
  • High volatility: Their prices can move sharply because trading is often driven largely by public sentiment rather than formal monetary control.

Why the RBI restricted cryptocurrency activity (course-based justification)

  • System-level risk from lack of regulation: The course emphasizes that virtual currencies are typically unregulated, which creates risk for users and financial systems.
  • Price instability: The material notes dramatic price movements driven mainly by sentiment, which increases consumer risk.
  • Restriction through the banking channel: The course explains that the Reserve Bank of India restricted activity by stating that regulated financial institutions (like banks) should not deal with entities involved in sale or purchase of virtual currencies, and banks were barred from providing services related to virtual currencies.
  • Trust and legitimacy issues: Since such currencies depend heavily on user trust inside the virtual ecosystem and are not backed as legal tender, regulators treat them as high-risk for mainstream financial intermediation.

Q3 – What is an operating system, and what are two commonly used operating systems?

Meaning of an operating system (OS)

An operating system is the interface between the computer user and computer hardware. It provides the base on which other programs run and performs essential tasks such as file management, memory management, process management, handling input/output, and controlling peripheral devices (like printers and drives).

Two commonly used operating systems discussed for servers

1) Windows

  • Owner/vendor: Developed and marketed by Microsoft.
  • Where it fits well: Commonly chosen when specific technologies and stacks are needed (for example, certain Microsoft-based web and database technologies).
  • Limitations noted: The material points out that Windows servers tend to face higher exposure to viruses/hacker attacks, can be more expensive, may use more server resources, and may crash more often compared to Linux-based hosting.

2) Linux/Unix

  • Stability and security: Described as a stable platform with high security and fewer virus-related threats.
  • Cost advantage: Linux is free and typically uses fewer server resources, which can make hosting cheaper.
  • Common tooling mentioned: Linux hosting commonly uses open-source database options such as MySQL, and distributions like Ubuntu or Fedora are referenced as common choices.

Q4 – What is cyber security, and why is it important in a digitally connected world?

Meaning of cyber security

Cyber security is the protection of computer systems from theft or damage to their hardware, software, or electronic data, and also protection from disruption or misdirection of the services they provide.

Main categories

  • Information security: Protects private information from unauthorized access and identity theft (examples include authentication and cryptography).
  • Network security: Protects the usability, integrity and safety of a network and blocks threats from entering or spreading (examples include antivirus/antispyware, firewalls, and VPNs).
  • Application security: Protects software applications from vulnerabilities that may arise during design, development, installation, upgrades, or maintenance.

Why it matters today

  • Personal impact: Attacks can lead to identity theft, extortion attempts, and loss of important data.
  • Society and infrastructure impact: People rely on critical infrastructure (such as hospitals, power systems and financial services), and securing such organizations helps society function smoothly.
  • Always-connected life + IoT expansion: With constant connectivity through phones, laptops, routers, smart TVs and IoT devices (bulbs, thermostats, etc.), security gaps can create new cyber problems if devices are not designed with security in mind.
  • Business reality: In e-commerce, systems store sensitive user and payment information, so cyber security directly supports trust and continuity of business operations.

Q5 – How do React Native, Ionic, Xamarin and Flutter differ as mobile development frameworks?

What they have in common

All four are used for cross-platform development (building apps that can run on more than one platform), but they differ in language, performance approach, UI strategy, testing method and code reusability.

Key differences (course-based comparison)

BasisReact NativeIonicXamarinFlutter
DeveloperFacebookDriftyMicrosoftGoogle
Primary languageJavaScriptTypeScriptC#Dart
Performance (as described)Close to nativeModerateModerateAmazing
Approx. code reusabilityAbout 90%About 98%About 98%About 50–90%
Testing approachMobile device or emulatorAny browserMobile device/emulator; test cloudMobile device or emulator
UI approachUses native UI controllersHTML/CSS-based UIUses native UI controllersUses proprietary widgets for UI

Practical selection guidance (from the unit’s discussion)

  • If an app needs many device-specific functions or very high performance, native-style approaches become more relevant.
  • If the app is reasonably simple and the goal is to save time and money, cross-platform approaches are often preferred.

Q6 – Explain the drop shipping model, and discuss how emerging technologies influence e-commerce implementation strategies.

Drop shipping model

Drop shipping is an implementation approach where the online seller does not keep products in stock or buy in bulk. Instead:

  • The customer places an order on the seller’s online store.
  • The seller forwards the order details to the supplier (manufacturer/wholesaler).
  • The supplier ships the product directly to the customer.

To the end customer, the order appears to come from the online seller (the seller’s identity is visible), even though the supplier fulfills it.

Who this model suits (as discussed)

  • Suppliers/retailers/manufacturers who have products but cannot invest heavily in creating and running a separate e-commerce portal.
  • Business entities that can build an online store and manage digital operations but do not want to manufacture products or maintain warehouses and factories.

Do emerging technologies affect implementation strategies? (Justification)

Yes. The course explicitly notes that implementation strategies evolve further due to emerging technology trends and widespread digitization. Practically, this changes both the front-end and back-end of implementation, for example:

  • Mobility: pushes strategies toward mobile-first storefronts and service delivery “anywhere,” which can change how customer acquisition and service workflows are designed.
  • Cloud computing: supports handling large operational data and scaling services, which influences how inventory-related workflows, order handling, and platform deployment are planned.
  • AI: enables advanced analytics and improved service tools, influencing how businesses implement personalization, support, and risk/fraud controls in their e-commerce operations.
  • IoT: expands real-time data capture and monitoring possibilities (useful for operations), while also increasing security requirements for connected devices and platforms.

Q7 – Differentiate traditional payment methods and electronic payment (e-payment).

Basic meaning of e-payment (as discussed)

An electronic payment is a non-cash payment method that does not involve a paper check. The course mentions examples such as credit/debit cards, internet banking, e-wallets, and electronic transfer systems.

Key differences

AspectTraditional paymentE-payment
Operating environmentRelatively closed environmentOperates on open internet-based platforms
Communication mediumTraditional communication mediaAdvanced communication (internet/extranet)
CirculationPhysical circulation (cash, bills, bank exchange)Digital circulation (information transmission and digital processing)
Infrastructure needWorks without network/software dependencyRequires network access and related software systems
Human interventionMore manual steps (withdrawal, transfer, deposit)More automated processing across the transaction flow

Real-world feel (how it plays out)

In a cash-based traditional payment, money moves physically and often needs multiple steps. In e-payment, the same value transfer is executed digitally, which supports faster transactions and enables buying and selling across territorial boundaries.

Q8 – Why are customer engagement and retention crucial for an e-commerce business?

Customer engagement (why it matters)

  • Builds trust: Engaging customers via social media channels can strengthen trust in the brand.
  • Meets how customers evaluate brands: Customers often examine brands for core benefits and the unique value proposition.
  • Supports purchase decisions: Customers look for offers/discounts (including seasonal offers), clear mechanisms for questions/clarifications, and interaction with customer support.

Customer retention (why it matters)

  • Experience is the retention engine: The course highlights that retaining customers requires continuous attention to features and functions that improve customer experience.
  • One-to-one experience is becoming realistic: With sophisticated e-commerce technologies, businesses can move toward customized services and products, which helps keep customers loyal.

How this looks in practice

  • A well-run store combines engagement (quick support, clear communication, promotional offers) with retention (better experience through personalization and service quality), so customers return instead of switching platforms.

Q9 – Differentiate: (a) digital signature vs electronic signature, and (b) IT Act 2000 vs IT (Amendment) Act 2008.

(a) Digital signature vs electronic signature

  • Legal definition focus: The IT Act 2008 defines electronic signature as authentication of an electronic record using techniques listed in the Second Schedule and it includes digital signature. Digital signature is defined (in the IT Act 2000 context) as authentication using an electronic method/procedure aligned to the Act’s provisions.
  • Technology approach: Electronic signatures are technology-neutral (no single technology is mandated), while digital signatures follow a technology-based approach (e.g., hash functions and public key cryptography).
  • Examples: Electronic signatures may include biometric methods, a typed name at the end of an email, or a digitized version of a conventional signature. Digital signatures use encryption/decryption style protection.
  • Strength/authenticity: Digital signatures are described as more authentic than electronic signatures.
  • Purpose: Electronic signatures are used mainly to verify a document; digital signatures are used to secure the document.
  • Validity: Digital signatures have a limited validity (maximum three years), while electronic signatures do not have such a validity limit in the same way.

(b) IT Act 2000 vs IT (Amendment) Act 2008

  • Core purpose (IT Act 2000): The Information Technology Act, 2000 provides legal recognition for electronic commerce transactions (electronic data interchange and electronic communication) and addresses e-commerce and cybercrimes. It came into force on 17-10-2000 and is grounded on the work of the United Nations Commission on International Trade Law
  • Why the amendment was needed: The course explains that growing digitization and e-commerce required stronger coverage for security and newer offence patterns, leading to amendments passed in 2008 (with assent in February 2009).
  • What the amendment added (IT Act 2008): It attempted to fill gaps and address security concerns, adding clarity through new definitions (such as electronic signature, communication device, cyber cafe, and cyber security), widening coverage of cyber offences, addressing privacy/data protection concerns, and also dealing with misuse of digital mediums in serious threats like terrorism.
  • Administration: The course notes that Indian Computer Emergency Response Team (CERT-In) is responsible for administration of the Act framework discussed.

Q10 – What are e-services, and what advantages do they offer?

Meaning of e-services

E-services (online services) refer to information and services delivered over the Internet. They allow users to communicate and access information, and they may be free or paid. Compared to traditional informational websites (which only provide descriptive content), e-services enable transactions and service delivery online. E-services can include e-commerce as well as non-commercial services delivered online.

Advantages of e-services

  • Wider reach: Access to a larger customer base and broader market reach (including global access 24/7).
  • Better communication: An alternative communication channel to customers and stakeholders.
  • Cost and time benefits: Cost savings, reduced delays, and in many cases faster delivery/service completion.
  • Process convenience: More flexibility and control (for example, completing forms electronically, saving progress, and returning later).
  • Business flexibility: Opportunities to manage business from anywhere and improved client service through flexibility.
  • Operational improvements: Enhances perceived company image, supports transparency, reduces paper waste, and can lower entry barriers to new markets and reduce customer acquisition cost.

Q11 – Explain the evolution of e-governance using Gartner’s model.

Model overview

The course refers to a four-phase evolution model presented in 2000 by the Gartner Group to describe how digital governance typically progresses from basic online presence to full transformation.

Four phases

  • Phase 1: Information — Government publishes information about public services through websites/portals for citizens, businesses and other stakeholders. It increases transparency by making roles, responsibilities and service information visible online.
  • Phase 2: Interaction — Digital interfaces allow interaction (one-way or two-way). Examples include downloading forms, submitting queries, emailing agencies, and checking status, though some steps may still require physical visits (like submitting supporting documents).
  • Phase 3: Transaction — Complete service transactions involving money become possible online (e.g., paying utility bills, online banking payments, filing taxes, visa/passport services, renewals/extensions of licenses).
  • Phase 4: Transformation — Back-end government departments become digitally interconnected so that services can be delivered end-to-end through a single virtual counter on a website/app. The course notes that this stage requires major functional change and encourages use of emerging technologies like AI/ML and IoT.

Q12 – What key ingredients are needed to build an effective website?

Website development ingredients

  • 1) Clean navigation: Helps users move across pages quickly and find what they need without confusion.
  • 2) Beautiful typography: Good font choices plus proper sizing, spacing, and readability improve understanding and visual appeal.
  • 3) White space: Proper spacing prevents clutter and strengthens the impact of content.
  • 4) Logical layout: Information should be arranged in a way that makes sense and guides users through the site while allowing easy skipping.
  • 5) Design with a purpose: Each element should contribute meaningfully; unnecessary design reduces clarity.
  • 6) Speed: Pages should load quickly and processes (like orders) should run fast because delays can drive users away.
  • 7) Detail: Provide sufficient and accessible details (product/service info, customer service info, contact details) to answer user questions.
  • 8) Multiple feedback channels: Offer multiple ways for users to contact (phone, email, live chat, discussion boards, social media tools), so support is easy and timely.

Q13 – What are cybercrimes, and what types are commonly seen today?

Meaning of cybercrime

Cybercrime refers to criminal activity or data theft carried out using the Internet.

Types of cybercrimes discussed in the course

  • Identity theft: Unauthorized acquisition of personal/financial information online to harm the user (e.g., stealing money, using credit cards in the victim’s name, or creating false credentials).
  • Phishing and spear phishing: Creating fake websites or sending messages/emails that look legitimate to trick users into sharing personal or financial data; spear phishing is a more targeted approach and may use text or social media.
  • Evil twins: Fake Wi-Fi networks that look like trusted public networks (airports/hotels/malls) and capture passwords or card details when users connect.
  • Pharming: Redirecting a user to a fake page even when the correct URL is entered (described as “phishing without a lure”).
  • Spoofing: Hackers pretend to be someone known/trusted or share deceptive links to capture sensitive information and divert business.
  • Sniffing: Monitoring and capturing network data packets using sniffers; used legitimately by administrators for monitoring, but harmful if used maliciously.
  • Denial-of-service (DoS/DDoS): Flooding a service/server with requests so it stops responding to genuine users; this can shut down e-commerce websites and make them inaccessible.
  • Pay-per-click fraud: Fraudulent clicking on online ads without purchase intent, often to increase a competitor’s advertising cost burden.

Q14 – Briefly describe e-tailing trends in India.

Overall growth direction

E-tailing in India has grown significantly and continues to expand its reach, mainly supported by wider internet access and the increased availability of smartphones. Along with this, e-banking facilities and digital wallets have made online purchasing easier, which has further accelerated e-tailing growth.

How e-retailers are shaping the market

  • Omni-channel strategy: Businesses are adopting omni-channel methods to connect customer experiences across multiple touchpoints.
  • Celebrity endorsement: Brand visibility and influence are strengthened through celebrity-led promotion.
  • Social media marketing: Social platforms are used actively for product promotion and customer engagement.
  • Digital influencers: Influencer-based promotion is used to improve discovery and trust among online buyers.

Retail industry trend (India)

The retail mix indicates a shift over time: the share of traditional retail reduces while organized retail and e-commerce show growth. In the presented trend comparison, e-commerce increases from 3% (2017) to 7% (2021), while organized retail rises from 9% (2017) to 18% (2021).

Major “game changer” factors mentioned for India

  • Internet penetration
  • Usage of mobile
  • Advent of social commerce
  • Adoption of technology
  • Omni-channel approaches
  • Digital wallets

Product-category trend (e-retail market by value)

The e-tailing market value is stated as being dominated by electronics and apparel. The category-wise distribution presented is:

  • Electronics: 49%
  • Apparel: 29%
  • Home & furnishing: 9%
  • Baby, beauty & personal care: 8%
  • Books: 3%
  • Others: 2%

Examples of key e-tailers listed

Snapdeal

Amazon

Flipkart


These solutions have been prepared and corrected by subject experts using the prescribed IGNOU study material for this course code to support your practice and revision in the IGNOU answer format.

Use them for learning support only, and always verify the final answers and guidelines with the official IGNOU study material and the latest updates from IGNOU’s official sources.