[go: up one dir, main page]

0% found this document useful (0 votes)
16 views4 pages

IT430 Assignment Solution Spring 2024

This document outlines the instructions and objectives for an IT430 E-Commerce assignment due on June 24, 2024, which includes analyzing e-commerce models and implementing cryptography methods. It provides specific scenarios for students to identify e-commerce models and details a cryptography task involving substitution and transposition techniques. Students must submit their assignments in .doc or .docx format and adhere to submission guidelines to receive marks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views4 pages

IT430 Assignment Solution Spring 2024

This document outlines the instructions and objectives for an IT430 E-Commerce assignment due on June 24, 2024, which includes analyzing e-commerce models and implementing cryptography methods. It provides specific scenarios for students to identify e-commerce models and details a cryptography task involving substitution and transposition techniques. Students must submit their assignments in .doc or .docx format and adhere to submission guidelines to receive marks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Assignment No.

02 Total Marks: 20
SEMESTER Spring 2024 Due Date: 24-06-2024
IT430 E-Commerce

Instructions

Please read the following instructions carefully before solving & submitting assignment:

It should be clear that your assignment will not get marks if:

o The assignment is submitted after due date.


o The submitted assignment is other than .doc or .docx file.
o The submitted assignment does NOT open or file is corrupted.
o Strict action will be taken if submitted solution is copied.

Uploading instructions

o For clarity and simplicity, you are required to Upload/Submit only .doc or .docx file.

Objective

The objective of this assignment is:


 Analyze and compare the E-commerce Models on the basis of different scenarios.
 Classify and implement the methods of cryptography.

After completing the assignment, the student will get the understanding of E-commerce Models
in the real-world example and able to implement the cryptography techniques.
For any query about the assignment, contact at it430@vu.edu.pk
Question 1:

Scenario

E-business models are essential frameworks that define how companies leverage the internet to
conduct their operations, serve customers, and generate revenue. They vary based on the nature
of transactions, the parties involved, and the strategies employed to reach target markets. The
following table presents different scenarios that depict various e-business models in action.

Given the scenarios in the Table 1 below, identify which e-commerce model each scenario
represents.

Table 1: E-Business Models with Scenarios

Scenario E-commerce Model


1. Ahmed wants to purchase a rare book. He visits an
online bookstore, finds the book he wants, reads
some reviews, and buys it directly from the website.
The bookstore handles the transaction and shipping
directly to Ahmed.
2. ABC Corporation, a large manufacturer of
automotive parts, sources components from multiple
suppliers online. They have established partnerships
with various suppliers who provide them with the
necessary parts to maintain their production
schedules.
3. Zara, a consumer, has an antique piece of furniture
she wants to sell. She lists it on an online
marketplace where other users can bid on the item.
John, another consumer, wins the auction and
purchases the antique directly from Zara.
4. The federal government is seeking a company to
develop a new public health website. They award the
contract to Digital Solutions Ltd., which specializes
in government projects. Digital Solutions Ltd.
develops and maintains the website as per the
government’s requirements.
5. Faiza, an independent artist, creates a profile on an
online platform dedicated to handcrafted goods. She
uploads images of his art pieces along with detailed
descriptions. Customers can browse her portfolio and
purchase her artworks directly through the platform.

Answer:
Scenario E-commerce Model
1. Ahmed wants to purchase a rare book. He visits an
online bookstore, finds the book he wants, reads
some reviews, and buys it directly from the website. Storefront Model
The bookstore handles the transaction and shipping
directly to Ahmed.
2. ABC Corporation, a large manufacturer of
automotive parts, sources components from multiple
suppliers online. They have established partnerships
Online Automotive Sites
with various suppliers who provide them with the
necessary parts to maintain their production
schedules.
3. Zara, a consumer, has an antique piece of furniture
she wants to sell. She lists it on an online
marketplace where other users can bid on the item. Auction Model
John, another consumer, wins the auction and
purchases the antique directly from Zara.
4. The federal government is seeking a company to
develop a new public health website. They award the
contract to Digital Solutions Ltd., which specializes
Online Service Provider
in government projects. Digital Solutions Ltd.
develops and maintains the website as per the
government’s requirements.
5. Faiza, an independent artist, creates a profile on an
online platform dedicated to handcrafted goods. She
uploads images of his art pieces along with detailed Online Art Dealer
descriptions. Customers can browse her portfolio and
purchase her artworks directly through the platform.

Question 2): As an intelligence officer, you are tasked with cryptograph the following message
using two cryptography techniques:

1. Substitution Apply the substitution method where:


o Replace every occurrence of the letter 'a' with 'z' if 'a' appears before the letter’t’,
otherwise replace it with 'w'.

2. Transposition Use the transposition technique with a 4 x 10 table to encrypt the


substituted message.

The Message to be encrypted is: “Plan ahead for the upcoming event with
caution”

You might also like