Name: Subhajit Ghosh
Roll Number: 2314107181
Program: Bachelor of Computer Application (BCA)
Course Code & Name: DCA3143 & E Commerce
Session: April 2025
SET-I
Q.No.1 - Ans:
The flow of diagram for the six stages of e-commerce development is depicted below.
Preparation
Research & Information Website
of Website Construction
Strategy Framework Designing
Outline
Migration &
Launching
1. Research & Strategy:
• Facilitating open and meaningful communication between users and professional
development organisations is the main objective of the e-commerce website.
• A thorough research process must be completed before any design or development can
start. Among these is market research, which aims to comprehend user behaviour,
preferences, and demands.
Analysing competitors: Finding the advantages and disadvantages of current platforms.
Interviewing stakeholders: Getting information from the business team and developers of
the e-commerce organisation.
Developing thorough profiles of target people is known as user personas.
Regular Collaboration: Regular and structured communication is essential to guarantee
alignment between the e-commerce development team and the website designer:
Agile sprints or weekly sync-ups; shared design systems and documentation.
Iterative design reviews and feedback loops. All forms of research and strategy that were
first developed prior to the creation of our e-commerce website.
2. Preparation of Website Outline:
• Since it establishes the framework for all subsequent design and development initiatives,
this phase is essential to the creation of an e-commerce website.
• Determine and evaluate the requirements of the end users as well as the e-commerce
company.
• Verify that the website satisfies user expectations and business objectives.
• Compile the client's specific requirements, including: Product classification, landing page
design, checkout and payment integration, user account features, content search
capabilities, and any other unique features unique to the client's business model.
• Review the initial output with stakeholders as soon as it is ready, such as wireframes or
mockups.
• Before going on to the next phase, get input and adjust.
3. Information framework:
• What kind of information will be displayed on the website, how it will be organised, and
how users will engage with it are all specified by the Information Framework.
• It serves as a guide for user experience and content organisation.
• The Essential Elements:
Content Definition:
1) Determine the kinds of data that are required:
Product specifics
Business data
User ratings; FAQs, News or blog posts, Contact and assistance details
2) Structural Outline: Create a hierarchical structure of the website:
1. Homepage → Categories → Product Pages → Checkout
2. About Us → Team → Careers
3. Help Center → FAQs → Contact Form
3) Information Storage & Presentation:
• Decide where and how the information will be stored.
• Define how it will be displayed to users:
1. Navigation menus
2. Search filters
3. Product cards and detail pages
4. Responsive design for mobile and desktop
4) Business-Specific Customization:
➢ Tailor the framework based on the type of e-commerce business:
1. B2B vs B2C
2. Digital products vs physical goods
3. Subscription-based vs one-time purchase models
5) User Experience (UX) Considerations:
➢ Ensure the information is:
1. Easy to find
2. Clearly categorized
3. Visually appealing
4. Accessible and inclusive
4. Website Designing:
This stage focuses on the visual identity, user interface (UI), and overall aesthetic of the e-
commerce website.
It plays a key role in attracting users, building trust, and enhancing the shopping experience.
Key Design Elements:
1. Color Scheme
• Choose a color palette that reflects the brand identity and appeals to the target
audience.
• Use contrasting colors for calls-to-action (CTAs) to improve visibility.
• Maintain consistency across all pages for a professional look.
2. Template & Layout Design
• Design a responsive template that works seamlessly on desktop, tablet, and
mobile.
• Ensure a clean and intuitive layout:
• Header with logo, navigation, and search
• Main content area with product listings or banners
• Footer with links, contact info, and policies
3. Product Presentation
• Use high-quality images with zoom and multiple views.
• Include clear product titles, pricing, and availability status.
• Highlight discounts, ratings, and badges (e.g., “Best Seller”).
4. Product Description Layout
• Organize descriptions into sections:
• Overview
• Features
• Specifications
• Customer reviews
• Use bullet points and icons for better readability.
5. Design Consistency
• Maintain a consistent font style, button design, and spacing.
• Follow UI/UX best practices to ensure accessibility and ease of use.
5. Construction:
This is the execution phase, where the actual building of the website begins.
Key Activities:
1. Coding & Development
• Frontend development (HTML, CSS, JavaScript, frameworks like React or
Angular)
• Backend development (server-side logic, databases, APIs)
• Integration of third-party services (payment gateways, shipping APIs,
analytics)
2. Testing During Development
• Unit testing: Testing individual components
• Integration testing: Ensuring modules work together
• User acceptance testing (UAT): Validating the site with real users
3. System Readiness
• Once all features are implemented and tested, the system is prepared for
deployment.
6. Migration & Launching:
This is the go-live phase, where the website becomes publicly accessible.
Key Activities:
1. Hosting & Domain Setup
• Deploy the website to a web server or cloud platform (e.g., AWS, Azure, or
shared hosting)
• Configure the domain name and ensure SSL certificates are in place for
security
2. URL Accessibility
• The website is now accessible via a public URL
• The organization can begin selling products online
3. Cross-Device Compatibility
• Ensure the website is:
• Responsive (works on mobile, tablet, desktop)
• Browser-compatible (Chrome, Firefox, Safari, etc.)
• Performance-optimized (fast loading, minimal downtime)
4. Post-Launch Monitoring
• Monitor traffic, user behaviour, and performance
• Fix any bugs or issues that arise after launch
Q.No.2: Ans:
Reference Model or OSI Model:
• Layering is used in network architecture to help define roles and responsibilities clearly.
The International Standards Organisation created the OSI (Open Systems Interconnections)
model, which is the most widely used model. It has seven levels, as shown below.
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data link Layer
Physical Layer
1. Layer 1 – Physical Layer: It deals with electrical problems like establishing voltage
levels, creating end-to-end routes, and guaranteeing that energy travels in the proper
directions.
2. Layer 2 – Data link layer: It is focused on information transmission via a link or
channel. The primary duties of the layer are error detection, sequencing, information
transmission recognition, and other related operations.
3. Layer 3 – Network layer: It makes it possible to use multiple links at once to
improve information transfer. The layer deals with host-to-network interfaces,
information flow, routing, and other problems.
4. Layer 4 – Transport layer: It deals with the problems of network addressing, virtual
circuit creation, and network entry and exit procedures.
5. Layer 5 – Session Layer: It focusses on creating connections between processes
across many endpoints. The layer makes it possible for communications to start, stop,
be administered, and be monitored.
6. Layer 6 – Presentation Layer: The presentation of user inputs and outputs is
handled by this layer. It allows users to access the data in a standardised format.
7. Layer 7 – Application Layer: It makes it easier for many application processes to
coordinate in order to process information as needed to meet user needs.
Q.No.3 - Ans:
Data Warehouse:
• One essential element of business intelligence is a data warehouse, which is a
centralised store for information from multiple organisational sources.
• Structured data is gathered, cleansed, and stored from various operating systems to
facilitate effective reporting and querying.
• Technically speaking, a DW is a relational database that is intended to store and
retrieve data for analysis. DWs hold both current and historical data that are utilised
for analytical reports for business customers.
• A solution for extraction, loading, and transformation (ELT) that gets the data ready
for analysis.
• Client analysis tools for data visualisation and presentation to business needs;
statistical analysis, reporting, and data presentation to business users.
• Additional, more complex analytical applications that use data science and artificial
intelligence (AI) algorithms to produce actionable information, or graph and spatial
features that allow for a wider variety of data analysis.
• A data warehouse is a system that helps businesses make better decisions by
combining data from various sources and organising it under a unified architecture. It
streamlines data management, reporting, and storage, increasing the effectiveness of
analysis.
• Data warehouse architecture efficiently manages and stores data by using a structured
framework.
There are two typical methods. Both a top-down and bottom-up approach
• A data warehouse architecture is made up of a number of essential parts that
cooperate to manage, store, and analyse data.
External Sources:
Data is sourced from outside sources. These sources offer a range of data kinds, including
semi-structured data (XML, JSON), unstructured data (emails, photos), and structured data
(databases, spreadsheets).
Staging Area:
Before entering the data warehouse, raw data from outside sources is verified and prepared in
the staging area, a temporary location. The consistency and usability of the data are
guaranteed by this procedure. Tools called ETL (Extract, Transform, Load) are used to
manage this preparation efficiently.
Extract (E): extracts raw information from other sources.
Transform (T): transforms raw information into a consistent, standard format.
Load (L): loads the converted data for additional processing into the data warehouse.
Data Warehouse:
The data warehouse serves as the main location where cleaned and arranged data is kept.
Both raw data and metadata are included. Advanced analysis, reporting, and decision-making
are all based on the data warehouse.
Benefits of Data Warehouse:
• Subject-oriented: They are able to assess information pertaining to a specific topic or
functional domain (like sales). Better decision-making and strategic planning are
made possible by data warehouses, which facilitate sophisticated queries and analysis.
• Integrated: Data warehouses establish uniformity across various data kinds from
various sources.
• Non-Volatile: Data is stable and unchangeable once it is in the data warehouse. They
are scalable as data quantities increase and can manage high data volumes.
• Time-Variant: Analysis of data warehouses examines changes over time.
• Easier Maintenance: Maintenance is made easier by centralising data management.
The time and effort needed for maintenance is decreased since updates or
modifications made to the data warehouse automatically spread to all linked data.
• Better Scalability: Because of the method's great scalability, businesses may easily
incorporate additional data as their requirements change or expand. This is especially
advantageous for companies who are struggling.
SET-II
Q.No.1 - Ans:
E-Commerce security to be managed:
Vulnerabilities relating to the alteration, destruction, or disclosure of information are reduced
or eliminated with the use of security management.
Managing Client Computer Security:
• Client and server computers are the two primary categories of computers with internet
connections.
• Client computers are the ones on the receiving end of a network, while server
computers are the ones providing web services.
• Malicious programs, Denial-of-Service attacks, and theft pose several risks to both the
server and the client.
• As a result, strategies for ensuring client and server security must be developed.
• The following crucial elements are used in client-server security:
Antivirus software: It is employed to prevent, detect, and get rid of malware, which includes
viruses and worms. Among the fundamental tasks carried out by antivirus software are:
o Looking for malware in certain files or directories.
o Setting up automated system checks to find any malware.
o Starting a scan of any data storage devices, including flash drives, pen drives,
compact discs, and floppy discs, at any moment.
o Eliminating the malicious code that was found.
o Notifying the user of a malicious file or website.
Anti-spyware software: Without their knowledge or consent, spyware gathers information
about a person or organisation. Without the customer's permission, this information might be
shared with other organisations. Spyware is prevented with anti-spyware software.
Network virus defence:
• A network virus is a type of malicious software that propagates throughout a network
and can be very harmful because it can infect every client machine on the network
and stop the network as a whole.
• Firewalls are the primary defence against network viruses.
• A firewall can be installed on computer hardware, software, or both to prevent
unwanted access to or from a private network.
• Before any messages can enter or leave a computer, they must all go via the firewall.
• All communications in transmission are inspected by a firewall, which stops those
that don't fit the specified security requirements.
Outbreak defence:
• In the event of a worldwide network epidemic, outbreak defence refers to a set of
services designed to protect networks. It fixes client machines that were infected with
malware or viruses during the outbreak. As a client-server security method, outbreak
defence makes use of the server's vulnerability pattern, which is a file containing a
database for every vulnerability.
• A vulnerability is a defect that gives an attacker the ability to target the system's
security and turn off its defences.
• The vulnerability pattern gives the scan engine instructions on how to look for known
vulnerabilities so that appropriate defences can be installed in their place.
Managing Server Computers Security:
• Strengthening the security system and protecting all services is crucial for the system
administrator since a system used as a server on a public network is a prime target for
assaults.
• A secure server protects against unauthorised changes by supporting the main security
protocols used to encrypt and decrypt messages.
• E-commerce entails conducting sales and purchases. A secure server will therefore
guarantee that a user's payment or private data is encrypted into a code that is both
secret and challenging to decipher. For example,
TCP wrappers are made to support every server that they are in charge of. They can be set up
to let a server to receive requests from internal clients, support logging, and return messages
to connections.
A cryptographic technique called Secure Sockets Layer (SSL) was developed to protect data
transmitted over the Internet. It converts the networked data into an unintelligible encrypted
language and decrypts it upon delivery.
Firewalls:
• Using a firewall is a good way to control server computer security.
According to computer jargon, a firewall is a piece of hardware or software that
guards against hackers, viruses, or worms getting into a computer via the Internet. It
shields a home or business network from potentially harmful websites and hacking
attempts.
• A company that has an intranet to provide its workers greater access to the Internet
sets up a firewall to prevent unauthorised users from accessing confidential
information.
• In close collaboration with a router, a firewall inspects every network packet to
control which ones are sent to their intended location.
• It is typically installed on a particular computer to prevent incoming requests from
gaining direct access to resources on a private network.
Applying Security Standards – PCI-DSS:
• An electronic payment system has emerged as a result of the Internet. Users must
share sensitive information, including accounts, card information, and personal
details, over the network when they conduct online fund transfers and pay for goods
and services. This exposes users to online threats. The electronic payment system
must adhere to specific security standards that are based on the accessibility, integrity,
and confidentiality of the data that is exchanged.
• The PCI DSS (Payment Card Industry Data Security Standards) specifies the security
requirements for electronic payments.The Payment Card Industry Security Standards
Council, which was established by participating payment companies Visa
International, Master Card, American Express, Diners Club, and JCB International, is
responsible for developing PCI DSS.
• The goal of PCI DSS is to create a global standard to address vulnerabilities and risks
associated with handling credit or debit card data across all industries. It is a global
forum for the development, storage, distribution, and application of security standards
for account data protection.
• A payment gateway must adhere to PCI DSS guidelines, which state that card
information and transaction data received at the gateway may not be shared or used
for any other reason.
• A basic awareness of the risks to e-commerce servers and databases is necessary for
managing server computer security.
• Managing server security issues requires implementing firewalls to shield systems
from unauthorised threats and adhering to security standards.
Phishing:
• Hackers, insiders, or con artists have recently defrauded and conned numerous banks.
Phishing is one of the most common types of these fraudulent actions.
• By impersonating mailers from banks or other financial institutions, scammers get
bank customers' email addresses and send them emails requesting their credit card or
account information.Phishing emails typically include subjects like "official
information," "urgent information for all credit card holders," and similar phrases.
• A fake website that mimics the websites of banks or other financial organisations is
linked in the emails.
• After being directed to the website, a customer is prompted to input account, credit
card, or personal information.
• A significant surge in these kinds of operations occurred in 2003–2004, when
scammers pretended to be mailers from ICICI Bank, PayPal, or eBay and sent emails
to consumers requesting their credit card information.
Q.No.2 - Ans:
Mobile Apps in E Commerce:
• Due to their widespread use and user-friendliness, mobile apps are now crucial to e-
commerce.
• Because of the explosive growth of mobile devices such as smartphones, iPhones,
PDAs (personal digital assistants), and handheld computers, mobile apps are seen as
the engine of the future generation.
• Numerous technologies, including mobile scan, infrared, SMS, contactless chip, and
interactive voice response, are made possible by mobile apps.
• Because mobile devices are readily available and simple to use, their use has grown
globally.
• The introduction of mobile applications has made information more accessible.
• They have also given firms a lot of chances to expand.
• Mobile apps enable users to access shopping sites.
• By eliminating the need for customers to physically visit shops or stores, mobile apps
have assisted businesses in growing their clientele.
• They have assisted customers in obtaining all the information they need regarding the
range of goods and costs.
• The suppliers benefit from them when it comes to marketing and promoting new
items.
• One of the key benefits of using mobile applications for shopping is that they are
always open and don't require employees to maintain the stores or safeguard the
merchandise.
• E-commerce websites are available for purchase day or night without requiring a
physical visit to any business.
• The following are additional significant benefits of utilising mobile apps in e-
commerce:
o Offers convenience and a broad reach
o Enhances brand awareness
o Localisation of goods and services is guaranteed
o A personal touch is established with an enhanced customer
experience
o A devoted customer base is grown
o Skilled consumers are not needed
o Market communication is improved
o Ubiquity and conversion rate are increased
o It is simple to use with immediate connectivity.
Q.No.3 - Ans:
Various tasks which E Commerce applications perform:
• E-commerce websites are online marketplaces designed to make it easier to buy and
sell products and services online by providing efficient means of transferring money
and information.
• Several tools and software are used in the building of e-commerce websites in order to
make them visually appealing and easy for online customers to use.
• Every transaction on an e-commerce website, including product identification,
marketing, product purchasing, payment processing, and shipment, takes place online.
• As a result, it becomes crucial for a website to include all of these elements in order to
meet client needs and to make it easier for customers to shop and navigate their
websites.
• To guarantee that customers make several purchases, e-commerce websites ought to
offer a distinctive graphical user interface.
• To make it easy for customers to find and access the products, the products must be
presented in an intuitive way.
• A virtual shopping cart is available for customers to choose the products they wish to
purchase from the stores and pay for them online.
• E-commerce websites allow businesses to grow internationally by enabling clients to
shop online from anywhere in the world.
• By providing a wide range of goods and services online, the websites offer a virtual
shopping experience. E-commerce transactions were previously conducted by phone
calls and emails, but as trends have changed, e-commerce websites are now capable
of effectively meeting the demands and specifications of clients online.
• The following are the primary goals of creating an intelligent website:
o Simple access and unambiguous communication
o Strategically controlling expenses when selling online
o Building stronger business ties; giving clients a distinctive experience;
gaining their trust and enhancing their loyalty; boosting service efficiency;
determining the appropriate target market; creating a mobile-responsive e-
commerce website; and increasing sales.
• In order to connect corporate organisations with international markets, designing e-
commerce websites necessitates the use of cutting-edge technologies for creating
human machine interfaces (HMIs) with fast communication links.
• Network infrastructure, including hardware and software, is needed for the process of
building and managing the website, as well as for the site's user experience, audience
demographic, and other aspects.
• A committed group of knowledgeable experts creates websites and their content,
ensuring that they are functional enough to be displayed through a visual interface.
• Prior to creating the website, organisations need to take into account the following
factors:
o To survey and analyse the market.
o Recognise the kind of audience you want to reach.
o Examine and investigate the competitive market and its norms.
o Determine the elements needed to market the products in international
markets.
o Offered clients a safe and secure online payment option.
o Hire qualified experts to create the website.
The goal of many e-commerce portals is to draw in website visitors and convert them into
potential clients. The website's design features aim to make the purchasing and shopping
process as quick, simple, and stress-free as possible. If the internet store is not optimised for
sales, one will lose out on key customers.