Forgot Password?
Mobile number is now mandatory for the security of your account.
We've sent you a verification code on your mobile number. Please enter it here to set a new password.
We've sent you a verification code on your mobile number or email address. Please enter it here to set a new password.
Payment Gateway,
SSL.
Types of Security Attacks.
: Built to Order Model of Supply Chain.
E-Commerce v/s E-Business
Discuss in detail the steps that a researcher needs to follow to formulate a good research report. Do the criteria become different for different kinds of report? Explain with examples.
Dichotomous questions vs multiple-choice questions
Structured vs unstructured questionnaires
b) Schedules and questionnaires
Open-ended and closed-ended questions
What is the observation method? What are the different types or observation methods available to the researcher? Elaborate with suitable examples.
Differentiate between a laboratory experiment and field experiment
Select a research problem, enlist the variables in the problem and formulate a theoretical framework to demonstrate the link between the variables under study.
A lot of business magazines conduct surveys, for examples the best management schools in the country, the top ten banks in the country; the best schools to study in etc. What do you think of these studies, would you call them racearch? Why / why not?
'Hypotheses are the guiding force in any research study' . Justify and explain.
Discuss the ethical issues raised by e-commerce.
Identify the industries who have taken the full benefit of e-commerce. -Justify your findings.
How is e-banking related to e-commerce and m-commerce?
How does spoofing threaten a Website's operations?
Identify the key security threats that arise during e-commerce transaction.
Compare and contrast online credit card payment and debit card payments.
Differentiate between:-
Static Website and Dynamic website
Public key and Private key
E-commerce and E-business
Create a form in HTML to take feedback of customer for the service of a restaurant.
How can the table be created in HTML? Explain with suitable example.
Explain the following tags of HTML:
(i) <a>--</a>
(ii) <h2>-</h2>
(iii) <dl> </dl>
Describe how internet and web features and services support e- commerce.
Discuss the e-transition challenges for an life insurance company.
What is e-business model? Explain with suitable examples B2B, B2C, B2G and C2C models.
Discuss the factors that contribute to e-commerce success.
The early years e-commerce can be considered both a success and a failure. Justify the statement
Congratulations! Your trial of
is now active.
Let's catch up on a Zoom call and I'll help you craft a killer career plan! Bring your own coffee.
Sourabh Bajaj