SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
2010 SECTION-B
1. DESCRIBE ONE BUSINESS MODEL, BASED ON METHOD OF REVENUE GENERATION, GIVING AN
EXAMPLE
BUSINESS MODELS IN E-COMMERCE
B TO B- BUSINESS TO BUSINESS
B TO C- BUSINESS TO CUSTOMER
C TO B- CUSTOMER TO BUSINESS
C TO C- CUSTOMER TO CUSTOMER
B TO G- BUSINESS TO CUSTOMER
BUSINESS TO BUSINESS MODEL:-
B2B direct supports commerce transactions involving products, services, or information
between two businesses or parties. Typical B2B direct transactions occur between buyers,
suppliers, manufacturers, resellers, distributors, and trading partners.
The following diagram demonstrates a typical B2B direct business.
In a typical B2B direct business, businesses purchase goods or services directly from another
business. The selling business can be a wholesaler, a distributor, a manufacturer, or a retailer
who sells to buyers from other businesses.
Organizations that are not traditionally considered businesses, such as governments, may
sometimes implement sites based on the B2B direct business model. This occurs in such cases
where governments provide goods and services directly to businesses.
EXAMPLE:-
A COMPANY “X” IS DEALING IN TYRES AND ANOTHER COMPANY “Y” IS A MANUFACTURER OF
BIKES FOR THE INDIAN MARKET. COMPANY “X” AND “Y” COMES IN AN AGREEMENT WHERE IN
COMPANY “X” SUPPLIES TYRES TO COMPANY “Y” AND COMPANY “Y” WILL USE “x” PRODUCT AND WILL
DELIVER THE PRODUCT TO THE CUSTOMER . SO THIS IS CALLED A B TO B MODEL.
2. DESCRIBE THE VAN USED BY THE INDIAN CUSTOMS AND EXCISE EDI SYSTEM
3. WHAT IS PUBLIC KEY CRYPTOGRAPHY? EXPLAIN
A cryptographic system that uses two keys -- a public key known to everyone and
a private or secret key known only to the recipient of the message.
Public key cryptography is becoming popular for transmitting information via the Internet. They
are extremely secure and relatively simple to use. The only difficulty with public-key systems is
that you need to know the recipient's public key to encrypt a message for him or her.
Also known as asymmetric-key encryption, public-key encryption uses two different keys at
once -- a combination of a private key and a public key. The private key is known only to
your computer, while the public key is given by your computer to any computer that wants to
communicate securely with it. To decode an encrypted message, a computer must use the
public key, provided by the originating computer, and its own private key. Although a message
sent from one computer to another won't be secure since the public key used for encryption is
published and available to anyone, anyone who picks it up can't read it without the private key.
The key pair is based on prime numbers (numbers that only have divisors of itself and one, such
as 2, 3, 5, 7, 11 and so on) of long length. This makes the system extremely secure, because
there is essentially an infinite number of prime numbers available, meaning there are nearly
infinite possibilities for keys. One very popular public-key encryption program is Pretty Good
Privacy (PGP), which allows you to encrypt almost anything.
4. WHAT ARE SEARCH ENGINES? HOW DO THEY WORK? WRITE IN BRIEF?
Search engines are programs that search documents for specified keywordsand returns a list of
the documents where the keywords were found. A search engine is really a general class of
programs.
Search Engines are the key to finding specific information on the vast expanse of the World
Wide Web. Without sophisticated search engines, it would be virtually impossible to locate
anything on the Web without knowing a specific URL.
There are basically three types of search engines:
Those that are powered by robots (called crawlers; ants or spiders)
Those that are powered by human submissions; and
Those that are a hybrid of the two.
Crawler-based search engines are those that use automated software agents (called crawlers)
that visit a Web site, read the information on the actual site, read the site's meta tags and also
follow the links that the site connects to performing indexing on all linked Web sites as well. The
crawler returns all that information back to a central depository, where the data is indexed. The
crawler will periodically return to the sites to check for any information that has changed. The
frequency with which this happens is determined by the administrators of the search engine.
Human-powered search engines rely on humans to submit information that is subsequently
indexed and catalogued. Only information that is submitted is put into the index
5. WHAT IS DATAMINING? WHAT ARE ITS TASKS?
Data mining is the exploration and analysis of large quantities of data in order to discover valid,
novel, potentially useful, and ultimately understandable patterns in data.
Task of data mining:-
Prediction Methods
Predict the value of a specific attribute (target/dependent variable)based on the value of other
attributes
o Classification
o Regression
Classification :-Typically used for predicting discrete target attributes (e.g.: Will this
online gamer purchase a virtual good?)
Regression :-Primarily used for predicting continuous target attributes (e.g.: What will
be the price of Facebook stock in 12 months from now?). The goal of these two
modeling tasks (enabled by machine learning algorithms) is to minimize the error
between the predicted value and the true value of the target attribute.
Description Methods
– Find human-interpretable patterns that describe the data
o Clustering
o Association Rule Discovery
Clustering :- Given a set of data points, each having a set of attributes, and a similarity
measure among them, find clusters such that
o Data points in one cluster are more similar to one another.
o Data points in separate clusters are less similar to one another.
Association rule discovery:-In data mining, association rule learning is a popular and
well researched method for discovering interesting relations between variables in large
databases. It is intended to identify strong rules discovered in databases using different
measures of interestingness.
For example, the rule found in the sales
data of a supermarket would indicate that if a customer buys onions and potatoes
together, he or she is likely to also buy hamburger meat

Weitere ähnliche Inhalte

Was ist angesagt?

Finding data: advanced search operators
Finding data: advanced search operatorsFinding data: advanced search operators
Finding data: advanced search operatorsPaul Bradshaw
 
Data Mining of Informational Stream in Social Networks
Data Mining of Informational Stream in Social Networks   Data Mining of Informational Stream in Social Networks
Data Mining of Informational Stream in Social Networks Bohdan Pavlyshenko
 
A Survey Of Collaborative Filtering Techniques
A Survey Of Collaborative Filtering TechniquesA Survey Of Collaborative Filtering Techniques
A Survey Of Collaborative Filtering Techniquestengyue5i5j
 
Compare & Contrast Using The Web To Discover Comparable Cases For News Stories
Compare & Contrast Using The Web To Discover Comparable Cases For News StoriesCompare & Contrast Using The Web To Discover Comparable Cases For News Stories
Compare & Contrast Using The Web To Discover Comparable Cases For News StoriesJason Yang
 
Paper id 24201441
Paper id 24201441Paper id 24201441
Paper id 24201441IJRAT
 
Bayesian networks for data integration in the absence of foreign keys
Bayesian networks for data integration in the absence of foreign keysBayesian networks for data integration in the absence of foreign keys
Bayesian networks for data integration in the absence of foreign keysShakas Technologies
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionAjitkaur saini
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGijcsit
 
Social Media Mining: An Introduction
Social Media Mining: An IntroductionSocial Media Mining: An Introduction
Social Media Mining: An IntroductionAli Abbasi
 
working of search engine & SEO
working of search engine & SEOworking of search engine & SEO
working of search engine & SEODeepak Singh
 
Analyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-TweetsAnalyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-TweetsRESHAN FARAZ
 
Are Positive or Negative Tweets More "Retweetable" in Brazilian Politics?
Are Positive or Negative Tweets More "Retweetable" in Brazilian Politics?Are Positive or Negative Tweets More "Retweetable" in Brazilian Politics?
Are Positive or Negative Tweets More "Retweetable" in Brazilian Politics?Molly Gibbons (she/her)
 
DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELEVANT COMMENTS ON...
DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELEVANT COMMENTS ON...DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELEVANT COMMENTS ON...
DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELEVANT COMMENTS ON...Prasanth Jayakumar
 
Twitter sentiment analysis project report
Twitter sentiment analysis project reportTwitter sentiment analysis project report
Twitter sentiment analysis project reportBharat Khanna
 
21CT Torch Fraud Detection Analytics Screenshot Gallery
21CT Torch Fraud Detection Analytics Screenshot Gallery21CT Torch Fraud Detection Analytics Screenshot Gallery
21CT Torch Fraud Detection Analytics Screenshot Gallery21CT Inc.
 
A Primer on Text Mining for Business
A Primer on Text Mining for BusinessA Primer on Text Mining for Business
A Primer on Text Mining for BusinessClement Levallois
 

Was ist angesagt? (20)

Finding data: advanced search operators
Finding data: advanced search operatorsFinding data: advanced search operators
Finding data: advanced search operators
 
Data Mining of Informational Stream in Social Networks
Data Mining of Informational Stream in Social Networks   Data Mining of Informational Stream in Social Networks
Data Mining of Informational Stream in Social Networks
 
A Survey Of Collaborative Filtering Techniques
A Survey Of Collaborative Filtering TechniquesA Survey Of Collaborative Filtering Techniques
A Survey Of Collaborative Filtering Techniques
 
Compare & Contrast Using The Web To Discover Comparable Cases For News Stories
Compare & Contrast Using The Web To Discover Comparable Cases For News StoriesCompare & Contrast Using The Web To Discover Comparable Cases For News Stories
Compare & Contrast Using The Web To Discover Comparable Cases For News Stories
 
Paper id 24201441
Paper id 24201441Paper id 24201441
Paper id 24201441
 
Bayesian networks for data integration in the absence of foreign keys
Bayesian networks for data integration in the absence of foreign keysBayesian networks for data integration in the absence of foreign keys
Bayesian networks for data integration in the absence of foreign keys
 
What is big data?
What is big data?What is big data?
What is big data?
 
What is "data"?
What is "data"?What is "data"?
What is "data"?
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
 
Social Media Mining: An Introduction
Social Media Mining: An IntroductionSocial Media Mining: An Introduction
Social Media Mining: An Introduction
 
working of search engine & SEO
working of search engine & SEOworking of search engine & SEO
working of search engine & SEO
 
Analyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-TweetsAnalyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-Tweets
 
Are Positive or Negative Tweets More "Retweetable" in Brazilian Politics?
Are Positive or Negative Tweets More "Retweetable" in Brazilian Politics?Are Positive or Negative Tweets More "Retweetable" in Brazilian Politics?
Are Positive or Negative Tweets More "Retweetable" in Brazilian Politics?
 
Exploration of gaps in Bitly's spam detection and relevant countermeasures
Exploration of gaps in Bitly's spam detection and relevant countermeasuresExploration of gaps in Bitly's spam detection and relevant countermeasures
Exploration of gaps in Bitly's spam detection and relevant countermeasures
 
DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELEVANT COMMENTS ON...
DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELEVANT COMMENTS ON...DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELEVANT COMMENTS ON...
DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELEVANT COMMENTS ON...
 
Data and personalization
Data and personalizationData and personalization
Data and personalization
 
Twitter sentiment analysis project report
Twitter sentiment analysis project reportTwitter sentiment analysis project report
Twitter sentiment analysis project report
 
21CT Torch Fraud Detection Analytics Screenshot Gallery
21CT Torch Fraud Detection Analytics Screenshot Gallery21CT Torch Fraud Detection Analytics Screenshot Gallery
21CT Torch Fraud Detection Analytics Screenshot Gallery
 
A Primer on Text Mining for Business
A Primer on Text Mining for BusinessA Primer on Text Mining for Business
A Primer on Text Mining for Business
 

Andere mochten auch

Marknadsföring på sociala medier
Marknadsföring på sociala medierMarknadsföring på sociala medier
Marknadsföring på sociala medierWSI WebAnalys
 
Sdfsdf[1][1]
Sdfsdf[1][1]Sdfsdf[1][1]
Sdfsdf[1][1]jeesuncha
 
Uden læserinddragelse dør du
Uden læserinddragelse dør duUden læserinddragelse dør du
Uden læserinddragelse dør duJon Lund
 
Poesía científica. Natalie Giles
Poesía científica. Natalie GilesPoesía científica. Natalie Giles
Poesía científica. Natalie GilesROSAYL
 
SGQ e a ISO 15100
SGQ e a ISO 15100SGQ e a ISO 15100
SGQ e a ISO 15100clagarinhos
 
Iaetsd modelling & simulation of solar pv array field
Iaetsd modelling & simulation of solar pv array fieldIaetsd modelling & simulation of solar pv array field
Iaetsd modelling & simulation of solar pv array fieldIaetsd Iaetsd
 
Iaetsd green building
Iaetsd green buildingIaetsd green building
Iaetsd green buildingIaetsd Iaetsd
 
Reportaje qp encuesta periodismo udp feedback
Reportaje qp encuesta periodismo udp feedbackReportaje qp encuesta periodismo udp feedback
Reportaje qp encuesta periodismo udp feedbackJuan Pardo
 
10 11-13 7th grade
10 11-13 7th grade10 11-13 7th grade
10 11-13 7th gradeLiz Slavens
 
Iaetsd rtos based electronics industrial
Iaetsd rtos based electronics industrialIaetsd rtos based electronics industrial
Iaetsd rtos based electronics industrialIaetsd Iaetsd
 
Iaetsd smart vehicle tracking system using gsm, gps and rc5
Iaetsd smart vehicle tracking system using gsm, gps and rc5Iaetsd smart vehicle tracking system using gsm, gps and rc5
Iaetsd smart vehicle tracking system using gsm, gps and rc5Iaetsd Iaetsd
 
Iaetsd exploding space travel
Iaetsd exploding space travelIaetsd exploding space travel
Iaetsd exploding space travelIaetsd Iaetsd
 

Andere mochten auch (20)

E learning
E learningE learning
E learning
 
Marknadsföring på sociala medier
Marknadsföring på sociala medierMarknadsföring på sociala medier
Marknadsföring på sociala medier
 
Sdfsdf[1][1]
Sdfsdf[1][1]Sdfsdf[1][1]
Sdfsdf[1][1]
 
Uden læserinddragelse dør du
Uden læserinddragelse dør duUden læserinddragelse dør du
Uden læserinddragelse dør du
 
linda boye
linda boyelinda boye
linda boye
 
Poesía científica. Natalie Giles
Poesía científica. Natalie GilesPoesía científica. Natalie Giles
Poesía científica. Natalie Giles
 
SGQ e a ISO 15100
SGQ e a ISO 15100SGQ e a ISO 15100
SGQ e a ISO 15100
 
Ollos de aula. Nº 18 (Decembro 2014)
Ollos de aula. Nº 18 (Decembro 2014)Ollos de aula. Nº 18 (Decembro 2014)
Ollos de aula. Nº 18 (Decembro 2014)
 
Fachtagung Intranet - Die intranet must haves
Fachtagung Intranet - Die intranet must havesFachtagung Intranet - Die intranet must haves
Fachtagung Intranet - Die intranet must haves
 
Iaetsd modelling & simulation of solar pv array field
Iaetsd modelling & simulation of solar pv array fieldIaetsd modelling & simulation of solar pv array field
Iaetsd modelling & simulation of solar pv array field
 
Module 3 (ism)
Module 3 (ism)Module 3 (ism)
Module 3 (ism)
 
Iaetsd green building
Iaetsd green buildingIaetsd green building
Iaetsd green building
 
Reportaje qp encuesta periodismo udp feedback
Reportaje qp encuesta periodismo udp feedbackReportaje qp encuesta periodismo udp feedback
Reportaje qp encuesta periodismo udp feedback
 
Spelling Code in a Box - SSP Spelling Cloud Keyring
Spelling Code in a Box - SSP Spelling Cloud KeyringSpelling Code in a Box - SSP Spelling Cloud Keyring
Spelling Code in a Box - SSP Spelling Cloud Keyring
 
10 11-13 7th grade
10 11-13 7th grade10 11-13 7th grade
10 11-13 7th grade
 
Iaetsd rtos based electronics industrial
Iaetsd rtos based electronics industrialIaetsd rtos based electronics industrial
Iaetsd rtos based electronics industrial
 
Iaetsd smart vehicle tracking system using gsm, gps and rc5
Iaetsd smart vehicle tracking system using gsm, gps and rc5Iaetsd smart vehicle tracking system using gsm, gps and rc5
Iaetsd smart vehicle tracking system using gsm, gps and rc5
 
Slope
SlopeSlope
Slope
 
Iaetsd exploding space travel
Iaetsd exploding space travelIaetsd exploding space travel
Iaetsd exploding space travel
 
Nagatho
NagathoNagatho
Nagatho
 

Ähnlich wie E commerce 2010 section- b

Using data mining in e commerce
Using data mining in e commerceUsing data mining in e commerce
Using data mining in e commerceshahabhossen
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)paperpublications3
 
Identical Users in Different Social Media Provides Uniform Network Structure ...
Identical Users in Different Social Media Provides Uniform Network Structure ...Identical Users in Different Social Media Provides Uniform Network Structure ...
Identical Users in Different Social Media Provides Uniform Network Structure ...IJMTST Journal
 
Classification with R
Classification with RClassification with R
Classification with RNajima Begum
 
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT Tools
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT ToolsIntroduction to the Responsible Use of Social Media Monitoring and SOCMINT Tools
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT ToolsMike Kujawski
 
A Practical Approach To Data Mining Presentation
A Practical Approach To Data Mining PresentationA Practical Approach To Data Mining Presentation
A Practical Approach To Data Mining Presentationmillerca2
 
Knime social media_white_paper
Knime social media_white_paperKnime social media_white_paper
Knime social media_white_paperFiras Husseini
 
Odam an optimized distributed association rule mining algorithm (synopsis)
Odam an optimized distributed association rule mining algorithm (synopsis)Odam an optimized distributed association rule mining algorithm (synopsis)
Odam an optimized distributed association rule mining algorithm (synopsis)Mumbai Academisc
 
SEC 572 Inspiring Innovation / tutorialrank.com
SEC 572 Inspiring Innovation / tutorialrank.comSEC 572 Inspiring Innovation / tutorialrank.com
SEC 572 Inspiring Innovation / tutorialrank.comBromleyz38
 
Intelligent Systems in Business
Intelligent Systems in BusinessIntelligent Systems in Business
Intelligent Systems in BusinessMari Caruccia
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Editor IJAIEM
 
Sec 572 Education Specialist-snaptutorial.com
Sec 572 Education Specialist-snaptutorial.comSec 572 Education Specialist-snaptutorial.com
Sec 572 Education Specialist-snaptutorial.comrobertlesew79
 
Sec 572 Education Organization / snaptutorial.com
Sec 572  Education Organization / snaptutorial.comSec 572  Education Organization / snaptutorial.com
Sec 572 Education Organization / snaptutorial.comBaileya109
 
Mla Format For Essays Telegraph. Online assignment writing service.
Mla Format For Essays  Telegraph. Online assignment writing service.Mla Format For Essays  Telegraph. Online assignment writing service.
Mla Format For Essays Telegraph. Online assignment writing service.Ashley Smith
 
PPT 3 Web Analytics (1).pptx
PPT 3 Web Analytics (1).pptxPPT 3 Web Analytics (1).pptx
PPT 3 Web Analytics (1).pptxDevChaudhari15
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET Journal
 
Detecting Phishing using Machine Learning
Detecting Phishing using Machine LearningDetecting Phishing using Machine Learning
Detecting Phishing using Machine Learningijtsrd
 
Sec 572 Enhance teaching / snaptutorial.com
Sec 572  Enhance teaching / snaptutorial.comSec 572  Enhance teaching / snaptutorial.com
Sec 572 Enhance teaching / snaptutorial.comHarrisGeorg69
 

Ähnlich wie E commerce 2010 section- b (20)

Using data mining in e commerce
Using data mining in e commerceUsing data mining in e commerce
Using data mining in e commerce
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
 
Identical Users in Different Social Media Provides Uniform Network Structure ...
Identical Users in Different Social Media Provides Uniform Network Structure ...Identical Users in Different Social Media Provides Uniform Network Structure ...
Identical Users in Different Social Media Provides Uniform Network Structure ...
 
Classification with R
Classification with RClassification with R
Classification with R
 
Social Data Mining
Social Data MiningSocial Data Mining
Social Data Mining
 
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT Tools
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT ToolsIntroduction to the Responsible Use of Social Media Monitoring and SOCMINT Tools
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT Tools
 
A Practical Approach To Data Mining Presentation
A Practical Approach To Data Mining PresentationA Practical Approach To Data Mining Presentation
A Practical Approach To Data Mining Presentation
 
Knime social media_white_paper
Knime social media_white_paperKnime social media_white_paper
Knime social media_white_paper
 
Odam an optimized distributed association rule mining algorithm (synopsis)
Odam an optimized distributed association rule mining algorithm (synopsis)Odam an optimized distributed association rule mining algorithm (synopsis)
Odam an optimized distributed association rule mining algorithm (synopsis)
 
SEC 572 Inspiring Innovation / tutorialrank.com
SEC 572 Inspiring Innovation / tutorialrank.comSEC 572 Inspiring Innovation / tutorialrank.com
SEC 572 Inspiring Innovation / tutorialrank.com
 
Intelligent Systems in Business
Intelligent Systems in BusinessIntelligent Systems in Business
Intelligent Systems in Business
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
 
Sec 572 Education Specialist-snaptutorial.com
Sec 572 Education Specialist-snaptutorial.comSec 572 Education Specialist-snaptutorial.com
Sec 572 Education Specialist-snaptutorial.com
 
Sec 572 Education Organization / snaptutorial.com
Sec 572  Education Organization / snaptutorial.comSec 572  Education Organization / snaptutorial.com
Sec 572 Education Organization / snaptutorial.com
 
Mla Format For Essays Telegraph. Online assignment writing service.
Mla Format For Essays  Telegraph. Online assignment writing service.Mla Format For Essays  Telegraph. Online assignment writing service.
Mla Format For Essays Telegraph. Online assignment writing service.
 
Seo report
Seo reportSeo report
Seo report
 
PPT 3 Web Analytics (1).pptx
PPT 3 Web Analytics (1).pptxPPT 3 Web Analytics (1).pptx
PPT 3 Web Analytics (1).pptx
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
 
Detecting Phishing using Machine Learning
Detecting Phishing using Machine LearningDetecting Phishing using Machine Learning
Detecting Phishing using Machine Learning
 
Sec 572 Enhance teaching / snaptutorial.com
Sec 572  Enhance teaching / snaptutorial.comSec 572  Enhance teaching / snaptutorial.com
Sec 572 Enhance teaching / snaptutorial.com
 

Mehr von StudsPlanet.com

Hardware enhanced association rule mining
Hardware enhanced association rule miningHardware enhanced association rule mining
Hardware enhanced association rule miningStudsPlanet.com
 
Hardware enhanced association rule mining
Hardware enhanced association rule miningHardware enhanced association rule mining
Hardware enhanced association rule miningStudsPlanet.com
 
Face recognition using laplacianfaces
Face recognition using laplacianfaces Face recognition using laplacianfaces
Face recognition using laplacianfaces StudsPlanet.com
 
Face recognition using laplacianfaces
Face recognition using laplacianfaces Face recognition using laplacianfaces
Face recognition using laplacianfaces StudsPlanet.com
 
Worldwide market and trends for electronic manufacturing services
Worldwide market and trends for electronic manufacturing servicesWorldwide market and trends for electronic manufacturing services
Worldwide market and trends for electronic manufacturing servicesStudsPlanet.com
 
World electronic industry 2008
World electronic industry 2008World electronic industry 2008
World electronic industry 2008StudsPlanet.com
 
Trompenaars cultural dimensions
Trompenaars cultural dimensionsTrompenaars cultural dimensions
Trompenaars cultural dimensionsStudsPlanet.com
 
The building of the toyota car factory
The building of the toyota car factoryThe building of the toyota car factory
The building of the toyota car factoryStudsPlanet.com
 
The International legal environment of business
The International legal environment of businessThe International legal environment of business
The International legal environment of businessStudsPlanet.com
 
Roles of strategic leaders
Roles  of  strategic  leadersRoles  of  strategic  leaders
Roles of strategic leadersStudsPlanet.com
 
Resolution of intl commr disputes
Resolution of intl commr disputesResolution of intl commr disputes
Resolution of intl commr disputesStudsPlanet.com
 
Presentation on india's ftp
Presentation on india's ftpPresentation on india's ftp
Presentation on india's ftpStudsPlanet.com
 

Mehr von StudsPlanet.com (20)

Hardware enhanced association rule mining
Hardware enhanced association rule miningHardware enhanced association rule mining
Hardware enhanced association rule mining
 
Hardware enhanced association rule mining
Hardware enhanced association rule miningHardware enhanced association rule mining
Hardware enhanced association rule mining
 
Face recognition using laplacianfaces
Face recognition using laplacianfaces Face recognition using laplacianfaces
Face recognition using laplacianfaces
 
Face recognition using laplacianfaces
Face recognition using laplacianfaces Face recognition using laplacianfaces
Face recognition using laplacianfaces
 
Worldwide market and trends for electronic manufacturing services
Worldwide market and trends for electronic manufacturing servicesWorldwide market and trends for electronic manufacturing services
Worldwide market and trends for electronic manufacturing services
 
World electronic industry 2008
World electronic industry 2008World electronic industry 2008
World electronic industry 2008
 
Weberian model
Weberian modelWeberian model
Weberian model
 
Value orientation model
Value orientation modelValue orientation model
Value orientation model
 
Value orientation model
Value orientation modelValue orientation model
Value orientation model
 
Uk intellectual model
Uk intellectual modelUk intellectual model
Uk intellectual model
 
Trompenaars cultural dimensions
Trompenaars cultural dimensionsTrompenaars cultural dimensions
Trompenaars cultural dimensions
 
The building of the toyota car factory
The building of the toyota car factoryThe building of the toyota car factory
The building of the toyota car factory
 
The International legal environment of business
The International legal environment of businessThe International legal environment of business
The International legal environment of business
 
Textile Industry
Textile IndustryTextile Industry
Textile Industry
 
Sales
SalesSales
Sales
 
Roles of strategic leaders
Roles  of  strategic  leadersRoles  of  strategic  leaders
Roles of strategic leaders
 
Role of ecgc
Role of ecgcRole of ecgc
Role of ecgc
 
Resolution of intl commr disputes
Resolution of intl commr disputesResolution of intl commr disputes
Resolution of intl commr disputes
 
Presentation on india's ftp
Presentation on india's ftpPresentation on india's ftp
Presentation on india's ftp
 
Players in ib
Players in ibPlayers in ib
Players in ib
 

Kürzlich hochgeladen

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 

Kürzlich hochgeladen (20)

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 

E commerce 2010 section- b

  • 1. 2010 SECTION-B 1. DESCRIBE ONE BUSINESS MODEL, BASED ON METHOD OF REVENUE GENERATION, GIVING AN EXAMPLE BUSINESS MODELS IN E-COMMERCE B TO B- BUSINESS TO BUSINESS B TO C- BUSINESS TO CUSTOMER C TO B- CUSTOMER TO BUSINESS C TO C- CUSTOMER TO CUSTOMER B TO G- BUSINESS TO CUSTOMER BUSINESS TO BUSINESS MODEL:- B2B direct supports commerce transactions involving products, services, or information between two businesses or parties. Typical B2B direct transactions occur between buyers, suppliers, manufacturers, resellers, distributors, and trading partners. The following diagram demonstrates a typical B2B direct business. In a typical B2B direct business, businesses purchase goods or services directly from another business. The selling business can be a wholesaler, a distributor, a manufacturer, or a retailer who sells to buyers from other businesses. Organizations that are not traditionally considered businesses, such as governments, may sometimes implement sites based on the B2B direct business model. This occurs in such cases where governments provide goods and services directly to businesses. EXAMPLE:- A COMPANY “X” IS DEALING IN TYRES AND ANOTHER COMPANY “Y” IS A MANUFACTURER OF BIKES FOR THE INDIAN MARKET. COMPANY “X” AND “Y” COMES IN AN AGREEMENT WHERE IN COMPANY “X” SUPPLIES TYRES TO COMPANY “Y” AND COMPANY “Y” WILL USE “x” PRODUCT AND WILL DELIVER THE PRODUCT TO THE CUSTOMER . SO THIS IS CALLED A B TO B MODEL.
  • 2. 2. DESCRIBE THE VAN USED BY THE INDIAN CUSTOMS AND EXCISE EDI SYSTEM 3. WHAT IS PUBLIC KEY CRYPTOGRAPHY? EXPLAIN A cryptographic system that uses two keys -- a public key known to everyone and a private or secret key known only to the recipient of the message. Public key cryptography is becoming popular for transmitting information via the Internet. They are extremely secure and relatively simple to use. The only difficulty with public-key systems is that you need to know the recipient's public key to encrypt a message for him or her. Also known as asymmetric-key encryption, public-key encryption uses two different keys at once -- a combination of a private key and a public key. The private key is known only to your computer, while the public key is given by your computer to any computer that wants to communicate securely with it. To decode an encrypted message, a computer must use the public key, provided by the originating computer, and its own private key. Although a message sent from one computer to another won't be secure since the public key used for encryption is published and available to anyone, anyone who picks it up can't read it without the private key. The key pair is based on prime numbers (numbers that only have divisors of itself and one, such as 2, 3, 5, 7, 11 and so on) of long length. This makes the system extremely secure, because there is essentially an infinite number of prime numbers available, meaning there are nearly infinite possibilities for keys. One very popular public-key encryption program is Pretty Good Privacy (PGP), which allows you to encrypt almost anything. 4. WHAT ARE SEARCH ENGINES? HOW DO THEY WORK? WRITE IN BRIEF? Search engines are programs that search documents for specified keywordsand returns a list of the documents where the keywords were found. A search engine is really a general class of programs. Search Engines are the key to finding specific information on the vast expanse of the World Wide Web. Without sophisticated search engines, it would be virtually impossible to locate anything on the Web without knowing a specific URL. There are basically three types of search engines: Those that are powered by robots (called crawlers; ants or spiders) Those that are powered by human submissions; and Those that are a hybrid of the two.
  • 3. Crawler-based search engines are those that use automated software agents (called crawlers) that visit a Web site, read the information on the actual site, read the site's meta tags and also follow the links that the site connects to performing indexing on all linked Web sites as well. The crawler returns all that information back to a central depository, where the data is indexed. The crawler will periodically return to the sites to check for any information that has changed. The frequency with which this happens is determined by the administrators of the search engine. Human-powered search engines rely on humans to submit information that is subsequently indexed and catalogued. Only information that is submitted is put into the index 5. WHAT IS DATAMINING? WHAT ARE ITS TASKS? Data mining is the exploration and analysis of large quantities of data in order to discover valid, novel, potentially useful, and ultimately understandable patterns in data. Task of data mining:- Prediction Methods Predict the value of a specific attribute (target/dependent variable)based on the value of other attributes o Classification o Regression Classification :-Typically used for predicting discrete target attributes (e.g.: Will this online gamer purchase a virtual good?) Regression :-Primarily used for predicting continuous target attributes (e.g.: What will be the price of Facebook stock in 12 months from now?). The goal of these two modeling tasks (enabled by machine learning algorithms) is to minimize the error between the predicted value and the true value of the target attribute. Description Methods – Find human-interpretable patterns that describe the data o Clustering o Association Rule Discovery Clustering :- Given a set of data points, each having a set of attributes, and a similarity measure among them, find clusters such that o Data points in one cluster are more similar to one another. o Data points in separate clusters are less similar to one another.
  • 4. Association rule discovery:-In data mining, association rule learning is a popular and well researched method for discovering interesting relations between variables in large databases. It is intended to identify strong rules discovered in databases using different measures of interestingness. For example, the rule found in the sales data of a supermarket would indicate that if a customer buys onions and potatoes together, he or she is likely to also buy hamburger meat