E-Commerce Teaching Plan for B.Com Students
E-Commerce Teaching Plan for B.Com Students
TEACHING PLAN
Quiz
Assessment of student
8
domain knowledge
E-commerce means buying and selling of products or services over electronic
systems such as the internet and other computer networks.
OR
E-commerce means using the Internet and the web for business transactions and/or
9 Synopsis commercial transactions, which typically involve the exchange of value (e.g.,
money) across organizational or individual boundaries in return for products and
services
E-commerce benefits are classified into 3 types.
⮚ Benefits to organization.
⮚ Benefits to consumers.
⮚ Benefits to society.
Benefits to organization:
Following are the benefits of Ecommerce to organizations.
1. E-commerce expands the market place to national and international level.
2. E-commerce decreases the cost of creating, processing, distributing,
storing, and retrieving paper
based information.
3. Ability for creation highly specialized business.
4. E-commerce reduces the time between the outlay of capital and the
receipt of products and
services.
5. E-commerce initiates business processes reengineering projects.
Benefits to consumers:
The following are the benefits of E-commerce to consumer
1. E-commerce enables customer to shop or do other transactions 24hrs a
day, all year round from almost any location.
2. E-commerce provides customers with more choices they can select from
many vendors and from many products.
3. In some cases, especially with digitized products E-commerce allows
quick delivery.
4. Customer can retrieve relevant and detailed information in seconds, rather
than days or weeks.
5. E-Commerce facilitates competition, which results in substantial
discounts
6. E-Commerce allows consumers to interact with other customers and
exchange ideas as well as compare experiences.
Benefits to society:
The following are the benefits of E-Commerce to society:
1. E-Commerce enables more individuals to work at home and to do less
travelling for shopping resulting in less traffic on the roads and lower air
pollution.
2. E-Commerce enables people in rural areas to enjoy products and services
that are not available to them. This includes opportunities to learn
professions and earn college degrees.
3. E-Commerce facilitates delivery of public services such as health care
education and distribution of Government social services at a reduced cost
and improved quality.
Limitations of E-Commerce:
1. There is a lack of system security, reliability, standards and some
communication protocols.
2. There is insufficient telecommunication band width.
3. Software development tools are changing rapidly.
4. It is difficult to integrate the internet and software with some existing
application data bases.
5. Some electronic commerce software might not be fit without some
network or may be incompatible with some operating systems or other
components
TSWRDCW Nalgonda
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE COLLEGES
Name of the College TSWRDCW NALGONDA
TEACHING PLAN
Quiz
Assessment of student
8
domain knowledge
9 Synopsis
10 Example / Illustrations used Buying groceries in Grocery shop and online super markets.
11 Current trends/Latest
developments in that area*
12 Teaching Aids used Discussion
13 Suggested References Frontiers of Electronic Commerce: Ravi Kalakota
14 Student Activity or List out the differences between commerce and ecommerce
Assignment
15 Student preparation for Prepare ecommerce model for the upcoming class
upcoming class/Any other
Activity
TSWRDCW Nalgonda
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE COLLEGES
Name of the College TSWRDCW NALGONDA
TEACHING PLAN
3. CUSTOMER TO CUSTOMER :
In this transaction customer sells directly to other customers. Example:
selling residential properties, cars, etc. C2C business model helps
consumers to sell their assets like residential property, cars, motorcycles,
etc., or rent a room by publishing their information on the website. Website
may or may not charge the consumer for its services. Another consumer
may opt to buy the product of the first customer by viewing the
post/advertisement on the website.
4. CUSTOMER TO BUSINESS (C2B):
This category includes individuals who sell products or services to
organizations. A consumer approaches a website showing multiple business
organizations for a particular service. The consumer
places an estimate of amount he/she wants to spend for a particular service.
For example, the comparison of interest rates of personal loan/car loan
provided by various banks via websites. A business organization who
fulfills the consumer's requirement within the specified budget,
approaches the customer and provides its services.
5. Business - to - Government
B2G model is a variant of B2B model. Such websites are used by
governments to trade and exchange information with various business
organizations. Such websites are accredited by the government and provide
a medium to businesses to submit application forms to the government.
10 Example / Illustrations used
11 Current trends/Latest
developments in that area*
12 Teaching Aids used
13 Suggested References Frontiers of Electronic Commerce: Ravi Kalakota
14 Student Activity or Represent e commerce models using mind maps
Assignment
15 Student preparation for Recollect the applications of Ecommerce
upcoming class/Any other
Activity
TSWRDCW Nalgonda
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE COLLEGES
Name of the College TSWRDCW NALGONDA
TEACHING PLAN
Quiz
Assessment of student
8
domain knowledge
Globally E-Commerce is applied in the following fields.
1. E Marketing
2. E-Advertising
3. E-Banking
9 Synopsis 4. Mobile Commerce
5. E-Learning
6. E-Shopping
7. Online training
8. Search Engines
9. Entertainment
10 Example / Illustrations used Online purchase, ebooking of tickets
11 Current trends/Latest
developments in that area*
12 Teaching Aids used Group discussion
13 Suggested References Frontiers of Electronic Commerce: Ravi Kalakota
14 Student Activity or Represent applications of ecommerce using mind maps
Assignment
15 Student preparation for Revise Unit I
upcoming class/Any other
Activity
TSWRDCW Nalgonda
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE COLLEGES
Name of the College TSWRDCW NALGONDA
TEACHING PLAN
Quiz
Assessment of student
8
domain knowledge
A framework is used to define and create tools that integrate the information
in today’s closed system
and allow the development of E-commerce applications.
The e-commerce architecture consists of 6 layers of functionality services.
9 Synopsis They are:
1. Application Services
2. Brokerage Services
3. Interface Support Layer Service
4. Secure Messaging & Structured Document Interchange Service
5. Middleware Services
6. Distributed Object Service
1. Application Services:
The three distinct classes of E-commerce applications are:
a) Consumer to Business
b) Business to Business
c) Intra Organization
a) Consumer to Business:-
It is called as market place transaction. In market place transaction,
customer learns about product differently through Electronic publishing,
buy them differently using Electronic cash and secure payment.
b) Business to Business:-
It is called as market link transaction. Here business, govt. and other
organizations depend on computer to computer communication as a fast,
economical way to conduct business transactions.
c) Intra organizational transactions:-
It is called as market driven transaction. A company becomes market driven
by dispersing throughout the firm information about its customers and
competitors by spreading strategic and tactical decision making.
2. Information Brokerage and management:
This layer provides service integration through the idea of information
brokerages. Information brokerage is used to represent an intermediate
which provides service integration between customer and information
providers based on constraints such as low price, fast service, profit
maximization for a client.
3. Interface support service:
The interface and support services will provide interface for e-commerce
applications such as interactive catalogues and will support directory
services. Interactive catalogues are customized interface to consumer
applications such as home shopping.
4. Secure messaging & structure document interchange service:
Messaging is software that lies between the network infrastructure and
clients or e-commerce applications. Messaging services offer solutions for
communicating non formatted data such as letters, memos, reports etc., as
well as formatted data such as purchase order, shipping notices. Messaging
support both for synchronous (immediate) and asynchronous (delay)
messaging.
5. Middleware Services:
Middleware is a mediator between software programs that enable them to
talk with one another. It solves all the interface translation, transformation
and interpretation problems.
6. Distributed object management service:
Object orientation is used in network based applications due to following
reasons:
Objects are defined as combination of data and instructions acting on the
data. Objects are an evolution of more traditional programming concept of
functions and procedures. An example of object in e-commerce is a
document. A document carries data and instructions about the action to be
performed on the data.
10 Example / Illustrations used API gateways, API developer portals etc
11 Current trends/Latest
developments in that area*
12 Teaching Aids used PPT
13 Suggested References Frontiers of Electronic Commerce: Ravi Kalakota
14 Student Activity or Assignment on architecture of ecommerce
Assignment
15 Student preparation for
upcoming class/Any other
Activity
TSWRDCW Nalgonda
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE COLLEGES
Name of the College TSWRDCW NALGONDA
TEACHING PLAN
Quiz
Assessment of student
8
domain knowledge
TCP/IP:
TCP/IP stands for Transmission Control Protocol/Internet Protocol. TCP/IP
is the communicating protocol. It defines how the electronic devices should
be connected and how data should be transmitted between them.
9 Synopsis Several protocols operate at TCP/IP standard. They are:
1) TCP (Transmission control Protocol):
TCP deals with communication between application software and network
software. TCP is responsible for breaking down data into IP packets before
they are sent and assembling the packets when they arrive.
2) UDP (User Datagram Protocol):
It defines simple communication between applications.
3) IP (Internet Protocol):
It deals with communication between computers. IP is responsible for
sending packets to the correct destination.
4) ICMP (Internet Control Message Protocol):
It is used for errors and statistics.
5) DHCP (Dynamic Host Configuration Protocol):
It is used for dynamic addressing. TCP/IP provides end-to-end connectivity
by specifying how data should be formatted, addressed,
transmitted, routed and received at the destination.
10 Example / Illustrations used Sms services
11 Current trends/Latest
developments in that area*
12 Teaching Aids used Discussion
13 Suggested References Frontiers of Electronic Commerce: Ravi Kalakota
14 Student Activity or List out the TCP/IP protocol functions
Assignment
15 Student preparation for Revise TCP/IP protocol concepts
upcoming class/Any other
Activity
TSWRDCW Nalgonda
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE COLLEGES
Name of the College TSWRDCW NALGONDA
TEACHING PLAN
Quiz
Assessment of student
8
domain knowledge
HTTP stands for Hyper Text Transfer Protocol. It is a simple request response
protocol which is the basis of WWW. HTTP transfers information efficiently
between client and server. The data transferred may be plain text, hypertext, images
or anything else. It is an internet protocol. HTTP request from a client starts with
9 Synopsis an object request method and the URL of that object. The most common methods
are GET and POST.
11 Current trends/Latest
developments in that area*
12 Teaching Aids used Lecture
13 Suggested References Frontiers of Electronic Commerce: Ravi Kalakota
14 Student Activity or List out the differences between HTTP and HTTPS
Assignment
15 Student preparation for Recollect the process of sending a letter through postal sevice.
upcoming class/Any other
Activity
TSWRDCW Nalgonda
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE COLLEGES
Name of the College TSWRDCW NALGONDA
TEACHING PLAN
Quiz
Assessment of student
8
domain knowledge
SMTP Protocol:
SMTP (Simple Mail Transfer Protocol) is used by Mail Transfer Agent
(MTA) to deliver your email to recipient’s mail server. The SMTP protocol
can only be used to send emails not to receive them.
9 Synopsis SMTP includes three standards:
⮚ A standard for exchange of mail between two computers
(STD10/RFC821).
⮚ A standard for the format of mail messages (STD11).
⮚ A standard for routing of mail messages (DNS-MX).
How SMTP works:
SMTP is based on end-to-end delivery. An SMTP client contacts the
destination host’s SMTP server directly to deliver the mail. It keeps the mail
item until it has been successfully copied to the
recipient’s SMTP.
Mail Exchange:
In an SMTP design, based on user mail request, the sender SMTP
establishes a two-way communication with a receiver SMTP. The sender
SMTP will generate commands that are replied to the receiver SMTP.
⮚ SMTP is very popular and supported by many platforms.
⮚ SMTP has low implementation and administration costs.
⮚ SMTP has a simple addressing scheme
10 Example / Illustrations used Sending email
11 Current trends/Latest
developments in that area*
12 Teaching Aids used PPT
13 Suggested References Frontiers of Electronic Commerce: Ravi Kalakota
14 Student Activity or Assignment on SMTP and SSL protocols
Assignment
15 Student preparation for Working of locker facility in banks
upcoming class/Any other
Activity
TSWRDCW Nalgonda
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE COLLEGES
Name of the College TSWRDCW NALGONDA
TEACHING PLAN
Quiz
Assessment of student
8
domain knowledge
Encryption is the transformation of data into a form that is unreadable by
anyone who don’t have the secret key. The data in unreadable form is called
“cipher text”. In order to read and understand the message, the encrypted
message must be transformed back into its original state (clear text). The
9 Synopsis process of restoring cipher text to clear text is called decryption.
There are two types of cryptographic mechanisms:
1) Symmetric Cryptography: Entities share a common secret key.
2) Asymmetric Cryptography: Each communicating entity has a unique pair
(a public key& a private key).
For symmetric and asymmetric encryption, the relative strength of
cryptography is most commonly measured by length of the key in bits. Any
key less than 64 bits is not secure. In Symmetric key systems, both sender
and receiver must have access to the same key. The shared
key is used for both encrypting and decrypting the message as shown below:
TSWRDCW Nalgonda
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE COLLEGES
Name of the College TSWRDCW NALGONDA
TEACHING PLAN
The public key can be shared without compromising the security of the
private one. All asymmetric key pairs are unique, so a message encrypted
with a public key can only be read by the person who has the
corresponding private key. The keys in the pair have much longer than
those used in symmetric cryptography. So, it is hard to decipher the
private key from its public counterpart. Many of us, heard about RSA,
which is the most common algorithm for asymmetric encryption in use
today.
Public-key encryption is slower than secret-key encryption. In secret key
encryption, a single shared key is used to encrypt and decrypt the message,
while in public-key encryption, different two keys are used, both related to
each other by a complex mathematical process. Therefore, we can say that
encryption and decryption take more time in public-key encryption.
Applications of public key
The applications of public key are -
o Public key cryptography can be used to encrypt Emails to keep their
content confidential.
o Asymmetric cryptography or public-key cryptography is also used
in Secure socket layer (SSL) protocol to make secure connections to
websites.
o Public key is also used in Blockchain and cryptography technology.
For example, a pair of keys is generated, while setting up a new
cryptocurrency wallet.
o It can be used to create a digital signature in the Operating System
software such as Ubuntu, Red Hat Linux packages distribution, etc.
Private Key :
In private key, the same key (or secret key) is used by both the parties, i.e.,
the sender and receiver, for Encryption/Decryption technique.
The sender uses the secret key and encryption algorithm for encryption,
whereas for decryption, the receiver uses this key and decryption
algorithm. In Secret Key Encryption/Decryption technique, the algorithm
used for encryption is the inverse of the algorithm used for decryption. It
means that if the combination of addition and multiplication is used in the
encryption algorithm, then the decryption algorithm will use the
combination of subtraction and division.
11 Current trends/Latest
developments in that area*
12 Teaching Aids used Lecture
13 Suggested References Frontiers of Electronic Commerce: Ravi Kalakota
14 Student Activity or List out the differences between public key and private key
Assignment
15 Student preparation for Revise public key and private concepts
upcoming class/Any other
Activity
TSWRDCW Nalgonda
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE COLLEGES
Name of the College TSWRDCW NALGONDA
TEACHING PLAN
Quiz
Assessment of student
8
domain knowledge
Digital signatures are created and verified by using public key
cryptography, also known as asymmetric cryptography. By the use of a
public key algorithm, such as RSA, one can generate two keys that are
mathematically linked- one is a private key, and another is a public key.
9 Synopsis
The user who is creating the digital signature uses their own private key
to encrypt the signature-related document. There is only one way to
decrypt that document is with the use of signer's public key.
This technology requires all the parties to trust that the individual who
creates the signature has been able to keep their private key secret. If
someone has access the signer's private key, there is a possibility that they
could create fraudulent signatures in the name of the private key holder.
10 Example / Illustrations used Wet signature scanned by an electronic device and then inserted into a
document. Another example of a simple digital signature is the email
signature that we often add at the end of the email
11 Current trends/Latest
developments in that area*
12 Teaching Aids used PPT
13 Suggested References Frontiers of Electronic Commerce: Ravi Kalakota
14 Student Activity or Assignment on Digital signatures
Assignment
15 Student preparation for Revise digital signature concept
upcoming class/Any other
Activity
TSWRDCW Nalgonda
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE COLLEGES
Name of the College TSWRDCW NALGONDA
TEACHING PLAN
Quiz
Assessment of student
8
domain knowledge
Digital certificates provide the stamp of genuineness by binding the public
key with the entity (server or client) that owns it, provided the entity
possesses the corresponding private key. Digital certificates are issued by a
Certificate Authority (CA).
9 Synopsis
A digital certificate contains the name of the certificate holder, a serial
number, expiration dates, a copy of the certificate holder’s public key (used
for encrypting messages and digital signatures) and the digital signature of
the certificate-issuing authority (CA) so that a recipient can verify that the
certificate is real.
11 Current trends/Latest
developments in that area*
12 Teaching Aids used PPT
13 Suggested References Frontiers of Electronic Commerce: Ravi Kalakota
14 Student Activity or Assignment on digital signatures concept
Assignment
15 Student preparation for Recollect mercantile concepts
upcoming class/Any other
Activity
TSWRDCW Nalgonda
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE COLLEGES
Name of the College TSWRDCW NALGONDA
TEACHING PLAN
PURCHASE CONSUMMATION:-
• After identifying the products to be purchased, the buyer and seller must
interact to carryout mercantile transaction.
• A mercantile transaction is defined as the exchange of information
between buyer and seller followed by the payment.
• Depending on the payment model mutually agreed on, they may interact
by E-Cash, or transferring authorization for credit billing authorization
(Visa, Master Cards).
• Mercantile process using digital cash or E-Cash.
• Mercantile process using credit cards.
• Basic mercantile process model for any transaction online business.
POST PURCHASE INTERACTION:-.
This includes customer service and support to address customer complaints,
product returns and product defects.
- Inventory Issues:
To serve a customer properly, a company should inform a customer right
from when an item is ordered to it is sold out, otherwise the company will
have a disappointed customer.
- Customer Service Issues:
Customers often have questions about the product such as color, size,
shipment and other things in mind can be resolved only by talking to an
order entry operator.
11 Current trends/Latest
developments in that area*
12 Teaching Aids used PPT
13 Suggested References Frontiers of Electronic Commerce: Ravi Kalakota
14 Student Activity or Assignment on Mercantile process
Assignment
15 Student preparation for Recollect the Electronic Payments procedure
upcoming class/Any other
Activity
TSWRDCW Nalgonda
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE COLLEGES
Name of the College TSWRDCW NALGONDA
TEACHING PLAN
Advantages:
1. Privacy.
2. Integrity.
3. Compatibility.
4. Good transaction efficiency.
5. Acceptability.
6. Convenience.
7. Mobility.
8. Low financial risk.
9. Anonymity
There are three major risks in the operation of the payment system, they are
1) Fraud or mistake.
2) Privacy issues.
3) Credit Risk.
11 Current trends/Latest
developments in that area*
12 Teaching Aids used PPT
13 Suggested References Frontiers of Electronic Commerce: Ravi Kalakota
14 Student Activity or List out the examples of E payments.
Assignment
15 Student preparation for Revise E payments concepts
upcoming class/Any other
Activity
TSWRDCW Nalgonda
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE COLLEGES
Name of the College TSWRDCW NALGONDA
TEACHING PLAN
Quiz
Assessment of student
8
domain knowledge
EDI refers to the exchange of electronic business documents i.e. purchasing
orders, invoices, etc. between applications. The exchange involves no paper,
no human intervention and takes place in a matter of seconds. EDI
documents are formatted using published standards. EDI requires a network
9 Synopsis connection between the two companies exchanging business documents.
EDI has provided great value to trading partners especially those in certain
“EDI – ENABLED” industries such as retail, automotive, and petroleum.
The advent of the internet has created a common information and
communications platform upon which business can be conducted. Internet
provides the communications. Capabilities of EDI over a Value-Added
network are at a much lower price.
Advantages of EDI:
• Electronic form of data: It is easy to transfer or share electronic form of
data.
• Reduction in data entry errors: There is less chance of errors in system
generated documents.
• Reduction in paper work: A lot of paper documents are replaced with
electronic documents.
• Lower costs: With faster processing of orders and time saving, EDI lowers
the costs in it.
1. NON-EDI SYSTEMS:-
EDI today is most widely used in large business and by smaller companies
trading with larger businesses. The entire non- EDI process requires the use
of multiple clerks by both the customer and vendor to complete the
transaction. The typical clerks involved in the buying cycle are Inventory
control, purchasing, receiving, accounts payable, etc..
Partial EDI Systems:- In partially Integrated system, the process begins the same
as in a non– EDI system. Example for Partially Integrated EDI Systems.
11 Current trends/Latest
developments in that area*
12 Teaching Aids used PPT
13 Suggested References Frontiers of Electronic Commerce: Ravi Kalakota
14 Student Activity or Differentiate EDI Systems
Assignment
15 Student preparation for Revise EDI systems
upcoming class/Any other
Activity
TSWRDCW Nalgonda
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE COLLEGES
Name of the College TSWRDCW NALGONDA
TEACHING PLAN
Quiz
Assessment of student
8
domain knowledge
ISSUES OF EDI: LEGAL, SECURITY AND PRIVACY ISSUES:
In EDI, trading is done between countries and corporations. So, the legal,
security and privacy issues become very important concerns.
Legal Issues:-
9 Synopsis Companies that deal with EDI should take the services of a lawyer during
the design of EDI applications so that evidentiary/admissibility safeguards
are implemented.
The United Nation’s Contract Law defines 3 types of communications:
1) Instantaneous Communication:-
If the parties are face to face or use an instantaneous communication
medium such as telephone.
2) Delayed communication via Postal service:-
The mailbox rule provides that an acceptance communicated via postal
service mail is effectively communicated when dispatched or physically
deposited in a postal service mail box.
3) Delayed communication via Non Postal service:-
11 Current trends/Latest
developments in that area*
12 Teaching Aids used PPT
13 Suggested References Frontiers of Electronic Commerce: Ravi Kalakota
14 Student Activity or Assignment on EDI issues
Assignment
15 Student preparation for Revise the EDI issues
upcoming class/Any other
Activity
TSWRDCW Nalgonda
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE COLLEGES
Name of the College TSWRDCW NALGONDA
TEACHING PLAN
Quiz
Assessment of student
8
domain knowledge
The following are the differences between E commerce and EDI:
9 Synopsis
11 Current trends/Latest
developments in that area*
12 Teaching Aids used Discussion
13 Suggested References Frontiers of Electronic Commerce: Ravi Kalakota
14 Student Activity or Represent the differences between Ecommerce and EDI using mind maps
Assignment
15 Student preparation for Refer Software Implementation of EDI
upcoming class/Any other
Activity
TSWRDCW Nalgonda
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE COLLEGES
Name of the College TSWRDCW NALGONDA
TEACHING PLAN
Quiz
Assessment of student
8
domain knowledge
The following are the steps in implementing EDI:
1. Develop the structure of EDI organization.
2. Undertake in Depth analysis
3. Develop a business focused EDI solution
9 Synopsis 4. Select EDI Network provider
5. Integrate EDI with the business
6. Integrate data across the business
7. Undertake Data Mapping
8. Test the entire system
9. Roll out EDI to business partners
11 Current trends/Latest
developments in that area*
12 Teaching Aids used PPT
13 Suggested References Frontiers of Electronic Commerce: Ravi Kalakota
14 Student Activity or Assignment on EDI Software Implementation
Assignment
15 Student preparation for Refer the basics of marketing
upcoming class/Any other
Activity
TSWRDCW Nalgonda
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE COLLEGES
Name of the College TSWRDCW NALGONDA
TEACHING PLAN
Disadvantages of E-Marketing:
• Lack of personal approach.
• Dependence on technology.
• Security, Privacy issues.
• Maintenance Costs.
• Worldwide Competition.
10 Example / Illustrations used
11 Current trends/Latest
developments in that area*
12 Teaching Aids used Discussion
13 Suggested References Frontiers of Electronic Commerce: Ravi Kalakota
14 Student Activity or Represent benefits and limitations of E Marketing using mindmaps
Assignment
15 Student preparation for Recall marketing techniques
upcoming class/Any other
Activity
TSWRDCW Nalgonda
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE COLLEGES
Name of the College TSWRDCW NALGONDA
TEACHING PLAN
Quiz
Assessment of student
8
domain knowledge
E-MARKETING TECHNIQUES:
Internet marketing techniques are of 2 types:
1) Passive Techniques.
2) Aggressive Techniques.
9 Synopsis 1) Passive Techniques:
Passive techniques are considered to be those methods that require the user
to ‘pull’ the information from the website.
2) Aggressive Techniques:
Aggressive techniques are considered to be those techniques in which the
website “pushes” the information on to the customer regardless of whether
the consumers is interested or not.
Some of the marketing techniques:
• Solicited, targeted e-mail.
• Interactive sites.
• Banner advertising.
• Off-line advertising.
• Unsolicited targeted e-mail.
• Spam Mail.
• E-mail, Chain letters.
11 Current trends/Latest
developments in that area*
12 Teaching Aids used Discussion
13 Suggested References Frontiers of Electronic Commerce: Ravi Kalakota
14 Student Activity or Represent E marketing techniques using mind maps
Assignment
15 Student preparation for Refer Five “P”s of E-Commerce.
upcoming class/Any other
Activity
TSWRDCW Nalgonda
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE COLLEGES
Name of the College TSWRDCW NALGONDA
TEACHING PLAN
Quiz
Assessment of student
8
domain knowledge
The Five “P”s Applied To Internet Marketing:
A customer oriented value chain that places the customer as the center of
attention, with information flows passing from a business to its customer for
all facts of its operations except for own procurement where the firm
9 Synopsis interfaces with its suppliers.
The five “P” s of marketing are:
1) Product
2) Pricing
3) Place & Distribution
4) Promotion
5) Personalization
1. Product:
Product is a good or service that a business offers to its customers without
a perfect product to offer, a business cannot survive. The produce
component in the marketing is related to the production section of the
consumers –oriented value chain.
2. Pricing:
The pricing of a “good” refers to the processes involved in determining the
amount to change for a specific physical good or service pricing models are
typically used to determine a firms price. Because of the development of
search engines customers are easily able to compare prices of many goods
offered for sale on the internet. On-line quotation is a popular method for
selling items on the internet an interesting method of pricing goods on the
internet is through offers made by consumers.
3. Place (Distribution):
Place is frequently referred to as out bound logistics or Distribution. The
Distribution task entails moving the product from the producer to the
customer. The product may travel directly from the products to the customer
or it may be channeled intermediaries such as whole sales or retailers. E-
commerce involving the sale of physical goods can be very useful in
exchanging information between business and delivery companies. The
physical internet itself us also a delivery channel
for digital products like software data or multimedia fill.
4. Promotion:
The sales and marketing function under the traditional marketing category
called promotion. The successful promotion of a product requires that at a
minimum a positive message be received by potential customers.
This message can be communicated many ways.
1) Paid advertising channels.
2) New stories and press releases.
3) Word of mouth.
4) Consumers personal experiences.
5) Packaging.
Another aspect of promotion is the sharing of information with customers.
5. Personalization:
The internet is leading marketers to a fundamental paradigm shift from mass
marketing to personalized marketing. Data bases and telecommunications
technology make it very easy and cost – efficient to mass marketing
personalized services.Personalization on the internet refers to the ability of
customers to receive personalized information.
10 Example / Illustrations used sales advertisements or coupons or visit a website.
11 Current trends/Latest
developments in that area*
12 Teaching Aids used PPT
13 Suggested References Frontiers of Electronic Commerce: Ravi Kalakota
14 Student Activity or Assignment on 5 Ps.
Assignment
15 Student preparation for Revision
upcoming class/Any other
Activity
TSWRDCW Nalgonda
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE COLLEGES
Name of the College, Nalgonda
SEMESTER PLAN
BA(ComputerApplications)
Names of the Course
Computer Applications
Subject
Relational Database Management Systems(RDBMS)
Paper Name
Paper Code
The student will be able to understand
❖ The Database system and applications
❖ The Purpose of the database system
❖ The Characteristics and advantages and disadvantages of a
Database.
❖ The Physical & Logical Architecture of Database.
❖ The Database language languages
❖ About the Data Dictionary and the Database schema
❖ The Relational databases, the importance of Relational Keys &
constraints.
❖ The role of the database administrator
❖ Normalization and the different types of normal forms.
❖ Organizing the Files by using different methods.
❖ Transactions and its properties, concurrency control techniques.
Learning Outcomes
G.Swathi
Faculty Name
1
Teaching Pedagogy, Teaching Aids, No. of
Unit Topics
Curricular, Extra-curricular Activities etc., Hours
Unit -1 Database Management System - File Lecture method, PPT, questionnaire. 4
BASI based system - Advantages ofDBMS
C over file based system -
CONC Database Approach - Logical DBMS Lecture method, PPT, questionnaire 4
EPTS Architecture - Three level architecture
of DBMS or logical DBMS
architecture - Need for three level
architecture - Physical DBMS
Architecture -
- Database Administrator (DBA) Lecture method, PPT, questionnaire 2
Functions & Role -
2
SEMESTER PLAN
3
4
SEMESTER PLAN
5
SEMESTER PLAN
6
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE COLLEGES
Name of the College TSWRDCW NALGONDA
SEMESTER PLAN
21
Unit-2 Conditional statements: Introduction - Lecture Method,Laboratory Method Black 5
If statements - If-else statements – Board, PPT, Questionnaire, DEV C++IDE
WOR nested if-else
KING
WIT break statement-continue statement-go Demonstration,Laboratory method, Black 3
H to statement- Board, PPT, Questionnaire, Brainstorming,
CON DEV C++ IDE
TRO Switch statements. Demonstration,Laboratory method, Black 3
L Board, PPT, Questionnaire, Brainstorming,
STAT
DEV C++ IDE
EME
Looping statements: Demonstration,Laboratory method, Black 5
NTS,
IntroductionWhile statements – Board, PPT, Questionnaire, Brainstorming,
LOO
Do-while statements - For DEV C++ IDE
PS
Statements-nested loop statements.
16
15
Pointers: Features of pointers- Demonstration,Laboratory method, Black
Declaration of Pointers-arithmetic Board, PPT, Questionnaire, Brainstorming, 3
Unit -4 operations with pointers DEV C++ IDE
Structures: Features of Structures - Demonstration,Laboratory method, Black
POINTER Declaring and initialization of Board, PPT, Questionnaire, Brainstorming, 4
S, Structures –Structure within DEV C++ IDE
StructureArray of Structures-
STRUCT
Enumerated data Demonstration,Laboratory method, Black
URES
type-Unions-Definition and advantages Board, PPT, Questionnaire, Brainstorming, 3
AND of Unions comparison between
UNIONS Structure & Unions. DEV C++ IDE
10
TOTAL
12
Total Classes 74
TELANGANA SOCIAL WELFARE RESIDENTIAL DEGREE
COLLEGE FOR WOMEN, NALGONDA
SEMESTER PLAN - I SEM
AY-
Name of the course BSC(MPC/Cs)
Subject PHYSICS
Paper Name Mechanics and oscillations -Isem
Paper code
Learning outcomes Student will understand
*law’s of motion ,variable mass
system rocket and multi stage rocket
*consolation of energy and
momentum
*collision’s, impacts imparameter
*define scalar and vector fields and
stoke’s ,gauss theorems
*central forces, kepler’s law’s
Multi-stage Lecture 02
rocket,conservation of method,blackboard,q
energy and momentum uestionnaire
Unit-4 oscillations
Title
Introduction of Lecture 01
oscillations. method,group
discussion,black
board
Introduction Black 01
Kinetic interpretation of temp board,
average ,RMS,MP velocitys lecture
method
Maxwell’s law of distribution real Black 01
mean free path board,
lecture
method,
group
discussion
Transport phenomina Black 01
,viscocity,thermalenergy,diffusion board,
lecture
method
Common thermal dynamic II law Black 01
of thermodynamics board,
lecture
method
Entropy Black 01
Change in entropy in reverse board,
proceses lecture
method
Change in entropy in irreverse Black 01
process board,
Entropy and second law lecture
method
Principle of increase of entropy Black 01
board,
lecture
method
Introduction Black 01
Thermodynamic potentials board,
lecture
method
Problems& ST Black
board,
lecture
method
Seminar Black 01
board,
lecture
method
Introduction Black 01
board,
lecture
method
Some useful definations Black 01
board,
lecture
method
Untit-1 Electrostatics
Title
Concept of electric Piece of chalk, black board, 01
field lines and electric lecture method
flux
Ballistic Lecture 02
galvanometer,torque method,Assignmet,chalk piece
on a current loop in a
uniform magnetic field
Modification of Lecture 01
ampere’s law method,Duster,blackboard,chal
k
Nortnstheorems Board,duster,chalk 01
,reciprocity theorem
Maximum power Lecture method,chalk,duster 01
transfer theorem
Particle Group 01
detectors:GM discussion,quizze,questionnaire
counter