Searching for "L"

Q:

Explain in brief B2B, B2C, C2B and C2C.

Answer

- B2B (Business-to-Business)   :


In B2B, companies transact with each other. This includes the companies selling their product to wholesalers, distributors, etc


- B2C (Business-to-Consumer) :


This is usually when average businesses transact with the customer. This is done through the shopping cart softwares and the amount involved in the transactions is usually low.


- C2B (Consumer-to-Business) :


In this, a consumer places the product on the net. The companies willing to buy this product bid for it. The comsumer can then decide, depending upon the bid, which company to sell it to. 


- C2C (Consumer-to-Consumer):


These kind of transactions are usually done at an individual level. Payments can be done with the help of online systems like PayPal.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

Q:

List the major benefits of E-commerce.

Answer

The major benefits of Ecommerce are:


- Secure       : More secure than a cheque.


- Fast           : The transactions take not more than a few seconds


- Always on  : The purchases can be made 24/7


- Convenient:  Ease of purchasing


-Reduced cost price : Reduction of Marketing and Advertising Costs

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

Q:

What are the ways in which attackers can infiltrate the system?

Answer

- Web servers can be infiltrated using the command shell by an attacker to read the HTML files that is getting transferred. 


- If the set-uid scripts are not proper and bad then the infiltration can happen by the attacker. 


- The processes are not given proper permissions so that the password can be changed by using the “passwd” command to change the password of the system.


- This also authenticates the user for accessing the system and the files on it containing the data. 


- The program that is used in the operating system doesn’t follow the principle of least privilege and lead to security issues.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

Q:

Write a program to fix the error being produced by the Infinite file?

Answer

- The infinite file error can be solved when the data will be read continuously from the file. 


- The error can be solved by using the keys that provide only the resources that are required. 


- The following program is as follows:


osw.write ("HTTP/1.0 200 OK\n\n"); 


while (c != -1) { 


sb.append((char)c); 


c = fr.read(); 



osw.write (sb.toString()); 


- This converts the requested file in such a way that if the file exists it shows the messages as ok otherwise it shows an error.


- Limited file access is to be given to the file to remove the error from the infinite file type.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

Q:

What is the use of Infinite file in Web security?

Answer

- Infinite file consists of random bits of code that is stored in /dev/random file used to generate the cryptographic keys. 


- Infinite file consists of the source of infinite data that can be used to provide the response in easy manner. 


- Web server consists of the file that is received by the server in this format GET //dev/random HTTP/1.0. 


- Web server provides the continuous data that can be read from /dev/random/ before the web server can run out of the memory. 


- The server crashes out in case it runs out of the memory due to the infinite file type and it is very essential in case of the web security.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

Q:

What is the Fail-safe approach?

Answer

- Fail-safe approach defines the level that divides the security such that it is safe even in case the system is failed.


- The fail safe approach doesn’t allow an attacker to take the advantage by breaking in the system and crashes out.


- This approach allows the web server to perform the routines even if the system runs out of the memory in case of any attack. 


- The system in attacks doesn’t skip the access to the control check or it doesn’t skip serving any document requested. 


- Fail safe approach can force the web server to run of the memory and have a DoS attack.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

Q:

What are the principles in providing the security for the computer programs?

Answer

- The principle of least privilege is used to provide more security to the computer programs. 


- The principle allows the designing of the program such that any unauthorized access is not allowed and only the person who owns the program will be able to access it. 


- The services provided should be able to access only those products that need the services. 


- Web servers that are involved in responding the queries of the web users provide only accessing to the HTML files that will serve the purpose of the programs. 


- Computer programs should be made such that it provides secure features of logging into the program with proper authentication.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

Q:

What are the different web browser tools available to accelerate the speed of the web page?

Answer

- Web accelerators are used to increase the loading of the web page faster and by providing extra features of caching, etc. 


- There are tools that are provided like internet accelerator of browser accelerator that provides security from the spyware and adware programs. 


- The security from the programs are required as they are harmful for the computer and the tools uses the strategies of pre-caching in which the data is automatically cached and when the website is opened again then the fetching is being done from the place where the content is saved. 


- Registry tweaks are used to improve the performance offering the risk management techniques for downloading the resources.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology