NBU, B.Com Program: SEC2: E-Commerce Past Solved Paper 2023

 UNIVERSITY OF NORTH BENGAL

B.Com. Programme 4th Semester Examination, 2023

 

SEC2COMMERCE

E-COMMERCE

Time Allotted: 2                                                         Hours Full Marks: 60

 

The figures in the margin indicate full marks.

GROUPA


Answer any two questions from the following: 12 x 2 = 24

1. Define E-Commerce. Discuss the advantages and disadvantages of E-Commerce. (2+5+5)

Answer: Definition of E-Commerce: E-Commerce, or electronic commerce, refers to the buying and selling of goods and services over the internet or other electronic networks. It encompasses various online transactions such as online retailing, electronic payments, online auctions, and internet banking.

Advantages of E-Commerce:

    Global Reach: E-Commerce enables businesses to reach a global audience, breaking geographical barriers and expanding market reach. This global accessibility opens up new markets and customer segments, driving business growth and revenue diversification.

    Convenience: Customers can shop anytime, anywhere, from the comfort of their homes or on the go, leading to enhanced convenience and flexibility. This convenience factor increases customer satisfaction and loyalty, fostering repeat business and positive word-of-mouth referrals.

    Cost Savings: E-Commerce reduces the need for physical storefronts and staff, resulting in lower operational costs for businesses. By eliminating expenses associated with brick-and-mortar establishments such as rent, utilities, and staffing, businesses can achieve higher profit margins and reinvest savings into growth initiatives.

    Increased Sales: Online platforms provide businesses with opportunities to up-sell, cross-sell, and personalize product recommendations, leading to increased sales and revenue. By leveraging customer data and analytics, businesses can tailor marketing messages and promotions to individual preferences, driving higher conversion rates and order values.

    Accessibility: E-Commerce platforms are accessible 24/7, allowing customers to browse and make purchases at their convenience. This round the clock availability accommodates diverse customer schedules and time zones, ensuring that businesses can capture sales opportunities and generate revenue even during non-business hours.

Disadvantages of E-Commerce:

    Security Concerns: E-Commerce transactions may be vulnerable to cyber threats such as hacking, data breaches, and identity theft, raising concerns about data security and privacy. Despite advances in security technologies and protocols, online platforms remain susceptible to malicious attacks and vulnerabilities, necessitating continuous monitoring and risk mitigation efforts.

    Lack of Personal Interaction: Online transactions lack face-to-face interaction, which may lead to issues with customer service, product queries, and returns. While businesses can offer live chat support and virtual assistance, some customers prefer the personalized touch and assurance of in-person interactions, leading to potential dissatisfaction and lower trust levels.

    Dependency on Technology: E-Commerce relies heavily on technology infrastructure such as internet connectivity, servers, and software, making businesses susceptible to disruptions due to technical glitches or outages. Any downtime or performance issues with E-Commerce platforms can result in lost sales, frustrated customers, and damage to brand reputation, highlighting the importance of robust IT systems and contingency plans.

    Competition: The ease of entry into the E-Commerce market leads to intense competition, making it challenging for businesses to differentiate themselves and attract customers. With low barriers to entry and countless competitors vying for market share, businesses must invest in unique value propositions, brand differentiation, and customer experience enhancements to stand out amidst the crowded online landscape.

    Logistics and Delivery Issues: Timely delivery of products, managing inventory, and handling returns can pose logistical challenges for E-Commerce businesses, impacting customer satisfaction. While thirdparty logistics providers and order fulfillment services can streamline operations, businesses must navigate complexities such as shipping costs, transit times, and supply chain disruptions to meet customer expectations and minimize shipping-related issues.

 

2. What is E-Commerce security? Discuss the need and importance of E-Commerce security. (2+10)

Answer: Definition of E-Commerce Security: E-Commerce security refers to the measures and protocols implemented to protect online transactions, sensitive customer data, and digital assets from unauthorized access, fraud, and cyber threats. It encompasses a range of technologies, practices, and policies designed to safeguard the confidentiality, integrity, and availability of E-Commerce platforms and data.

Need and Importance of E-Commerce Security:

    Data Protection: E-Commerce security safeguards sensitive information such as credit card details, personal identifiers, and transaction records from being compromised or stolen. By encrypting data transmissions, implementing access controls, and adopting secure coding practices, businesses can prevent unauthorized access and data breaches, preserving customer trust and regulatory compliance.

    Trust and Credibility: Secure E-Commerce platforms build trust and confidence among customers, encouraging them to transact online without fear of data breaches or fraud. By displaying trust seals, security certifications, and privacy policies, businesses can reassure customers of their commitment to protecting sensitive information and maintaining high standards of security and privacy.

    Legal Compliance: E-Commerce security measures help businesses comply with data protection regulations such as GDPR, PCI DSS, and CCPA, avoiding potential legal consequences and penalties. By adhering to industry standards and regulatory requirements, businesses demonstrate accountability and responsibility in handling customer data, reducing the risk of regulatory fines, lawsuits, and reputational damage.

    Business Continuity: Effective E-Commerce security ensures uninterrupted operations and mitigates the risk of disruptions caused by cyberattacks, preserving business reputation and continuity. By implementing incident response plans, disaster recovery strategies, and proactive security measures, businesses can minimize downtime, financial losses, and reputational harm resulting from security incidents or data breaches.

    Customer Satisfaction: Protecting customer data and providing a secure online shopping experience enhances customer satisfaction, loyalty, and repeat business. By prioritizing security and privacy in E-Commerce operations, businesses can instill confidence in customers, encourage repeat purchases, and foster long-term relationships based on trust and reliability.

    Competitive Advantage: E-Commerce security can be a differentiator for businesses, providing a competitive edge by demonstrating commitment to customer privacy and security. By investing in robust security infrastructure, threat intelligence, and security awareness training, businesses can differentiate themselves from competitors, attract security-conscious customers, and gain a competitive advantage in the market.


3. Define Online Marketing. What is the role of E-commerce applications in various industries like banking and insurance? (2+10)

Answer: Definition of Online Marketing: Online marketing, also known as internet marketing or digital marketing, refers to the use of digital channels and platforms to promote products, services, or brands to target audiences. It encompasses a range of tactics such as search engine optimization (SEO), social media marketing, email marketing, content marketing, and online advertising to reach and engage potential customers online.

Role of E-commerce Applications in Various Industries:

Banking Industry: E-commerce applications play a pivotal role in the banking sector by facilitating online banking services, electronic fund transfers, mobile payments, and digital wallets. Banking institutions leverage E-commerce platforms to provide customers with secure, convenient, and accessible banking solutions, including account management, bill payments, loan applications, and investment transactions. E-commerce applications enable banks to streamline operations, reduce overhead costs, and expand their customer base by offering seamless digital experiences across multiple channels, fostering customer loyalty and satisfaction.

    Insurance Industry: In the insurance sector, E-commerce applications enable insurers to offer online policy sales, claims processing, policy management, and customer service interactions. Insurance companies leverage E-commerce platforms to digitize the insurance lifecycle, from quote generation and underwriting to policy issuance and renewal. E-commerce applications empower insurers to reach customers through digital channels, personalize insurance offerings based on individual needs and preferences, and enhance customer engagement through selfservice portals and interactive tools. By embracing E-commerce technology, insurance providers can improve operational efficiency, reduce administrative costs, and deliver value added services that meet the evolving demands of policyholders in a digital first era.

   E-commerce applications revolutionize traditional industries like banking and insurance by digitizing processes, enhancing customer experiences, and driving innovation in service delivery, positioning organizations for growth and competitiveness in the digital economy.


4. What are the various methods of E-Payment? Explain the risks involved in E-payment. (7+5)

Answer: Various Methods of E-Payment:

    Credit and Debit Cards: Credit and debit card payments involve the electronic transfer of funds from the cardholder's account to the merchant's account. Card payments are widely used for online transactions, offering convenience, security, and accessibility to both consumers and merchants.

    Mobile Wallets: Mobile wallets enable users to store payment card information securely on their smartphones and make purchases by scanning QR codes or tapping NFC enabled devices. Popular mobile wallet providers include Apple Pay, Google Pay, Samsung Pay, and PayPal.

    Bank Transfers: Bank transfers involve the direct transfer of funds from the payer's bank account to the payee's bank account using electronic banking channels such as internet banking, mobile banking, or Automated Clearing House (ACH) networks.

    Digital Payment Platforms: Digital payment platforms like PayPal, Venmo, and Square Cash facilitate peer to peer (P2P) payments, online invoicing, and payment processing for businesses. These platforms offer convenience, speed, and security for transferring funds between individuals and businesses.


   Risks Involved in E-payment:

    Security Threats: E-payment transactions are susceptible to security threats such as hacking, malware, phishing, and identity theft. Cybercriminals exploit vulnerabilities in E-commerce platforms, payment gateways, and insecure networks to steal sensitive financial information and conduct fraudulent transactions.

    Data Breaches: E-payment systems store vast amounts of sensitive customer data, including payment card details, personal identifiers, and transaction records. Data breaches can occur due to system vulnerabilities, insider threats, or external attacks, leading to unauthorized access, data theft, and financial losses for individuals and businesses.

    Fraudulent Activities: E-payment fraud encompasses various fraudulent activities such as unauthorized transactions, account takeover, card not present fraud, and chargebacks. Fraudsters use stolen payment credentials, counterfeit cards, or social engineering tactics to exploit weaknesses in E-commerce security controls and defraud consumers and merchants.

    Payment Disputes: Disputes may arise in E-payment transactions due to billing errors, delivery issues, or disputes over product quality or service. Resolving payment disputes can be complex and time consuming, involving mediation, arbitration, or legal proceedings to reconcile conflicting claims and recover disputed funds.

    Regulatory Compliance: E-payment systems must comply with regulatory requirements such as PCI DSS (Payment Card Industry Data Security Standard), GDPR (General Data Protection Regulation), and AML (AntiMoney Laundering) regulations. Noncompliance with regulatory standards can result in legal penalties, fines, and reputational damage for businesses, highlighting the importance of adherence to industry standards and best practices in E-payment security and compliance.

   Despite these risks, effective risk management strategies, robust security controls, and continuous monitoring can mitigate the vulnerabilities associated with E-payment systems, safeguarding transactions and protecting the integrity of digital commerce.


 GROUP-B

Answer any four questions from the following: 6 x 4 = 24


(a) Discuss the concept of Online Banking with examples. (6)

Answer: Online banking, also known as internet banking or e-banking, refers to the provision of banking services and transactions conducted over the internet through a bank's website or mobile application. It allows customers to perform various financial activities remotely, without visiting physical bank branches. Here are some examples illustrating the concept of online banking:

1. Account Management: Customers can view account balances, transaction history, and account statements online. They can monitor their finances, track expenses, and manage multiple accounts from a single platform.

2. Fund Transfers: Online banking enables customers to transfer funds between their own accounts or to third-party accounts domestically or internationally. They can initiate one-time transfers, schedule recurring payments, or set up standing instructions for regular transactions.

3. Bill Payments: Customers can pay bills electronically through online banking platforms. They can schedule bill payments for utilities, credit cards, loans, insurance premiums, and other expenses, saving time and eliminating the need for paper checks.

4. Mobile Deposits: Many banks offer mobile banking apps with features like remote check deposit, allowing customers to deposit checks by taking photos of them with their smartphones. This convenient feature accelerates the deposit process and reduces the need to visit bank branches.

5. Account Alerts: Online banking provides customizable account alerts and notifications to keep customers informed about account activity, including low balance alerts, deposit notifications, and transaction alerts for enhanced security and monitoring.

6. Loan Applications: Customers can apply for loans, mortgages, or credit products online through the bank's website or mobile app. They can submit loan applications, upload supporting documents, and track the status of their applications remotely.

Overall, online banking offers convenience, accessibility, and efficiency, empowering customers to manage their finances anytime, anywhere, and conduct a wide range of banking transactions seamlessly.


(b) Write a note on E-Payment gateways. (6)

Answer: E-Payment gateways play a crucial role in facilitating secure and seamless online transactions by acting as intermediaries between merchants, customers, and financial institutions. Here's a note on E-Payment gateways:

An E-Payment gateway is a software application that encrypts sensitive payment information, authorizes transactions, and facilitates the secure transmission of data between customers' web browsers and merchants' websites or online platforms. It serves as a virtual point-of-sale terminal, processing electronic payments in real-time and ensuring the integrity and confidentiality of financial transactions.

Key features and functions of E-Payment gateways include:

Encryption and Security: E-Payment gateways employ encryption protocols such as SSL (Secure Sockets Layer) or TLS (Transport Layer Security) to encrypt sensitive payment data, such as credit card numbers, during transmission over the internet. This ensures that payment information remains confidential and protected from unauthorized access or interception by cybercriminals.

Payment Authorization: E-Payment gateways verify the authenticity of payment transactions by performing real-time authorization checks with the relevant financial institutions, including banks and credit card networks. They validate the availability of funds, authenticate cardholder details, and approve or decline transactions based on predefined criteria and risk parameters.

Multiple Payment Options: E-Payment gateways support various payment methods, including credit cards, debit cards, digital wallets, bank transfers, and alternative payment solutions. They enable merchants to offer flexible payment options to customers and optimize checkout experiences for increased conversion rates and customer satisfaction.

Integration and Compatibility: E-Payment gateways integrate seamlessly with merchants' websites, e-commerce platforms, and mobile applications, allowing for easy setup and configuration. They are compatible with popular shopping carts, content management systems, and payment processing APIs, enabling merchants to accept payments efficiently across multiple channels and devices.

Transaction Reporting and Analytics: E-Payment gateways provide merchants with comprehensive reporting tools and analytics dashboards to track transaction activity, monitor sales performance, and analyze payment trends. They offer insights into customer behavior, transaction volumes, and revenue metrics, enabling merchants to make data-driven decisions and optimize their payment strategies.

Overall, E-Payment gateways play a critical role in enabling secure, reliable, and convenient online payments for merchants and customers, driving e-commerce growth and enhancing the digital shopping experience.


(c) Differentiate between World Wide Web (WWW) and Internet. (6)

Answer: The terms World Wide Web (WWW) and Internet are often used interchangeably, but they refer to distinct concepts with different functionalities and purposes. Here's a differentiation between the World Wide Web and the Internet:

World Wide Web (WWW):

The World Wide Web, commonly known as the Web, is an information system that operates over the Internet.

It consists of a vast collection of interconnected documents and resources, including web pages, websites, multimedia content, and hyperlinks.

The Web is accessed through web browsers such as Google Chrome, Mozilla Firefox, and Microsoft Edge, which interpret and display web content to users.

Users navigate the Web by entering Uniform Resource Locators (URLs) or hyperlinks into their browsers, allowing them to access specific web pages or resources hosted on web servers worldwide.

The Web facilitates communication, information sharing, collaboration, and entertainment through interactive websites, social media platforms, online forums, and multimedia content.

Internet:

The Internet is a global network of interconnected computer networks that spans the globe, facilitating the exchange of data and communication between devices and systems.

It serves as the underlying infrastructure that enables the transmission and routing of data packets between devices, using standardized protocols such as TCP/IP (Transmission Control Protocol/Internet Protocol).

The Internet encompasses various network technologies, including wired and wireless connections, fiber-optic cables, satellite links, and telecommunications infrastructure.

It supports a wide range of services and applications beyond the Web, including email, instant messaging, file sharing, online gaming, video streaming, and remote access to resources.

The Internet enables connectivity and interoperability between devices, systems, and networks worldwide, fostering innovation, economic growth, and global communication.

In summary, while the World Wide Web represents a subset of services and content accessible over the Internet, the Internet itself is the underlying network infrastructure that enables communication and data exchange between devices and systems globally.


(d) What is a digital signature? How does it work? (2+4)

Answer: Digital Signature Definition: A digital signature is a cryptographic technique used to verify the authenticity, integrity, and origin of digital documents or electronic messages. It provides a means of electronically signing documents or data to ensure that they have not been tampered with and can be trusted by recipients.

How Digital Signatures Work:

Key Generation: The process begins with the generation of a pair of cryptographic keys—a private key and a public key. The private key is kept secret by the signer and is used to create digital signatures, while the public key is shared publicly and is used to verify signatures.

Signing Process: To digitally sign a document or message, the signer uses their private key to apply a mathematical algorithm to the data, creating a unique digital signature. The signature is appended to the document or message, indicating the signer's identity and ensuring the integrity of the content.

Verification Process: To verify the digital signature, the recipient uses the signer's public key to decrypt and authenticate the signature. The recipient recalculates the hash value of the original document or message using the same cryptographic algorithm used by the signer. If the recalculated hash value matches the decrypted signature, the document is considered authentic and has considered authentic and has  integrity, meaning it has not been altered since it was signed by the sender. This process ensures that the recipient can trust the authenticity of the document and the identity of the signer.

Furthermore, digital signatures also provide non-repudiation, meaning the sender cannot deny having signed the document. Since the private key is unique to the signer and kept secret, only the signer could have produced the digital signature associated with their public key. Therefore, if the signature is successfully verified using the public key, it proves that the document was indeed signed by the claimed sender.

In summary, digital signatures play a crucial role in ensuring the authenticity, integrity, and non-repudiation of electronic documents and messages. By leveraging cryptographic techniques and key pairs, they provide a secure method for verifying the identity of senders and confirming the integrity of transmitted data.


(e) Discuss the merits and demerits of Credit Card. (6)

Answer: Merits of Credit Cards:

1. Convenience: Credit cards offer a convenient payment method, allowing users to make purchases without carrying cash. They can be used for both online and offline transactions, providing flexibility and ease of use.

2. Credit Facility: Credit cards provide users with access to a line of credit, allowing them to borrow money from the issuing bank up to a predetermined credit limit. This enables users to make purchases and pay for expenses even when they don't have sufficient funds at the time of the transaction.

3. Rewards and Benefits: Many credit cards offer rewards programs, cashback offers, discounts, and other benefits to cardholders for using their cards. These rewards may include travel miles, loyalty points, complimentary insurance coverage, and discounts on shopping, dining, or entertainment.

4. Security: Credit cards offer enhanced security features such as fraud protection, zero-liability policies, and dispute resolution mechanisms. Users are protected against unauthorized transactions, fraudulent activities, and identity theft, providing peace of mind when making purchases.

5. Builds Credit History: Responsible use of credit cards can help individuals build a positive credit history and improve their credit score. Timely payments, low credit utilization, and a long credit history can enhance creditworthiness and facilitate access to loans, mortgages, and other financial products.


Demerits of Credit Cards:

1. Interest Charges: Credit cards often impose high-interest rates on outstanding balances, especially for users who carry forward unpaid balances from month to month. Accumulating interest charges can lead to debt accumulation and financial strain if not managed responsibly.

2. Debt Trap: The ease of access to credit provided by credit cards can lead to overspending and debt accumulation. Users may be tempted to spend beyond their means, leading to a cycle of debt and financial stress if they struggle to repay the borrowed funds.

3. Fees and Charges: Credit cards may come with various fees and charges, including annual fees, late payment fees, cash advance fees, and foreign transaction fees. These fees can add up over time, reducing the overall value of using credit cards for transactions.

4. Risk of Fraud: Despite security measures, credit cards are susceptible to fraud, theft, and unauthorized use. Cardholders may fall victim to identity theft, card skimming, or phishing scams, resulting in financial losses and inconvenience.

5. Impact on Credit Score: Mismanagement of credit cards, such as late payments, exceeding credit limits, or defaulting on payments, can negatively impact an individual's credit score. A poor credit score can limit access to credit, increase borrowing costs, and affect financial stability in the long run.


In summary, while credit cards offer convenience, financial flexibility, and rewards, they also pose risks such as debt accumulation, high-interest charges, and susceptibility to fraud. Responsible use and careful management are essential to maximize the benefits of credit cards while mitigating potential drawbacks.


(f) Explain the functions of Automated Clearing House (ACH). (6)

Answer: The Automated Clearing House (ACH) is an electronic payment system that facilitates the transfer of funds between bank accounts within the same country. It serves as a centralized clearing and settlement platform for processing large volumes of credit and debit transactions efficiently. The functions of ACH include:

1. Direct Deposit: ACH enables direct deposit of funds into recipients' bank accounts, such as salaries, pensions, government benefits, and dividends. Employers, government agencies, and financial institutions use ACH to initiate electronic payments directly to recipients' accounts, eliminating the need for paper checks and manual processing.

2. Direct Payments: ACH supports direct debit transactions, allowing authorized entities to initiate electronic withdrawals from consumers' bank accounts for bill payments, loan repayments, subscriptions, and recurring expenses. Companies, utilities, and service providers leverage ACH to collect payments from customers securely and cost-effectively.

3. Bulk Transfers: ACH facilitates bulk transfers of funds between financial institutions, enabling banks to settle interbank transactions, clear checks, and process electronic funds transfers (EFTs) in batches. ACH operates on predefined settlement schedules, typically processing transactions in multiple batches throughout the day.

4. Batch Processing: ACH operates on a batch processing model, where transactions are accumulated, sorted, and processed in batches at scheduled intervals. Transactions within each batch are sorted based on criteria such as destination bank, transaction type, and processing priority, streamlining the clearing and settlement process.

5. Transaction Settlement: ACH acts as a central clearinghouse for reconciling and settling funds transferred between participating banks. It facilitates the exchange of transaction data, fund transfers, and settlement instructions among financial institutions, ensuring accurate and timely settlement of transactions.

6. Transaction Reporting: ACH provides reporting and reconciliation tools to participating banks and financial institutions, allowing them to track transaction activity, reconcile accounts, and monitor fund transfers in real-time. It generates transaction reports, settlement summaries, and audit trails to facilitate transparency and accountability.

Overall, the Automated Clearing House (ACH) plays a vital role in the electronic payment ecosystem by enabling efficient, secure, and cost-effective fund transfers between bank accounts, supporting various payment and settlement functions for businesses, consumers, and financial institutions.


GROUP-C

6. Answer any four questions from the following: 3×4 = 12


(a) Write a short note on Digital Wallets. 3

Answer: Digital wallets are virtual platforms that store payment information securely. They allow users to make online transactions conveniently, store multiple payment methods, and often offer features like loyalty programs and bill payments.


 (b) Mention any three reasons for transacting online. 3

Answer: Convenience, speed, and accessibility are three primary reasons for transacting online. Online transactions eliminate the need for physical presence, facilitate quick payments, and provide access to a wide range of products and services.


(c) What is Digital Signature Certificate? 3

Answer: A Digital Signature Certificate (DSC) is an electronic document that contains digital identification information used to authenticate the identity of the sender of an electronic message or document. It ensures the integrity and authenticity of online transactions.


(d) Distinguish between Hacking and Sniffing. 3

Answer: Hacking involves unauthorized access to computer systems or networks to exploit vulnerabilities for malicious purposes. Sniffing, on the other hand, refers to intercepting and capturing data packets transmitted over a network, often for unauthorized surveillance or data theft.


(e) What is Appellate Tribunal under IT Act, 2000? 3

Answer: The Appellate Tribunal under the Information Technology (IT) Act, 2000, is a quasi-judicial body established to hear appeals against orders issued by adjudicating officers under the Act. It provides a forum for resolving disputes related to electronic transactions and cybersecurity.


(f) Distinguish between NEFT and RTGS. 3

Answer: NEFT (National Electronic Funds Transfer) and RTGS (Real-Time Gross Settlement) are both electronic payment systems used for fund transfers between bank accounts. The main difference is in the settlement timing and transaction limits. NEFT operates in batches at set intervals, while RTGS offers immediate and real-time settlement for high-value transactions.



References:

1. Laudon, K. C., & Traver, C. G. (2019). E-commerce 2019: Business, technology, society. Pearson.

2. Turban, E., King, D., Lee, J., Liang, T. P., & Turban, D. (2019). Electronic commerce: A managerial and social networks perspective. Springer.

3. Kalakota, R., & Whinston, A. B. (1997). Electronic commerce: A manager's guide. Addison-Wesley.

4. Shaw, M. J., Subramaniam, C., Tan, G. W., & Welge, M. E. (2001). Knowledge management and data mining for marketing. Decision Support Systems, 31(1), 127-137.

5. Trepper, C., & Garstka, S. J. (1995). The digital economy: Promise and peril in the age of networked intelligence. McGraw-Hill.

6. Chaffey, D., Ellis-Chadwick, F., Johnston, K., & Mayer, R. (2019). Digital marketing. Pearson UK.

7. Li, X., Hess, T. J., & Valacich, J. S. (2008). Why do we trust new technology? A study of initial trust formation with organizational information systems. The DATA BASE for Advances in Information Systems, 39(4), 28-44.

8. "Automated Clearing House (ACH)." U.S. Department of the Treasury, Fiscal Service. Accessed June 2024. https://www.fiscal.treasury.gov/fsservices/gov/pmt/ach/ach_home.htm.


Comments

Popular posts from this blog

Chapter 3: Special Areas of Audit in India

Chapter 1: Introduction to Income Tax in India

NBU CBCS SEC (H) : E-Commerce Revised Syllabus