Discuss in brief the history of e-commerce, Computer Engineering

Assignment Help:

Discuss in brief the history of E-Commerce.

History of E-commerce illustrated below:

E-commerce began before personal computers were prevalent and has grown into a multibillion dollar industry. By looking at the evolution of e-commerce, it will be easier to judge its trends for the future.

In 1984, Electronic data interchange or EDI was standardized via ASC X12. It guaranteed that companies would be capable to complete transactions along with one other reliably.

In 1992, CompuServe gives online retail products to its customers. It gives people the initial chance to buy things off their computer.

In 1994, Netscape arrived. Offering users a simple browser to surf the Internet and a secure online transaction technology termed as Secure Sockets Layer.

In 1995, two of the biggest names within e-commerce are launched as: Amazon.com and also eBay.com.

In 1998, Digital subscriber Line or DSL gives fast, always onto Internet service to subscribers across California. It prompts people to spend more Money, and time online.

In 1999, Retail spending over the Internet reaches as $20 billion, as per Business.com.

In 2000, U.S government extended the moratorium upon Internet taxes till at least 2005.


Related Discussions:- Discuss in brief the history of e-commerce

Explain criteria for selection of suitable intermediate code, Pass I of the...

Pass I of the assembler must also generate the intermediate code for the processed statements. Justify your answer. Criteria for selection of a suitable intermediate code form

What is the difference between a latch and a flip-flop, What is a flip-flop...

What is a flip-flop? What is the difference between a latch and a flip-flop? List out the application of flip-flop. Ans. Flip-Flop: It is a fundamental memory element utilize

Assembler directives, What are assembler directives? Ans: These are th...

What are assembler directives? Ans: These are the instructions that direct the program to be executed. They have no binary corresponding so they are called pseudo-opcodes. The

Use of overlapped register windows, Q. Use of Overlapped Register Windows? ...

Q. Use of Overlapped Register Windows? Register file comprises 138 registers. Let them be called by register number 0 - 137.  Diagram demonstrates the use of registers: when

Cache-only memory access model (coma), Cache-Only Memory Access Model (COMA...

Cache-Only Memory Access Model (COMA) As we have discussed previous, shared memory multiprocessor systems may use cache memories with each processor for deducting the execution

How debugger works internally, Whenever we compile with -g option, it will ...

Whenever we compile with -g option, it will make a symbol table, and according that table for every function and line it will call ptrace.

How is a property designated as read-only, How is a property designated as ...

How is a property designated as read-only?  In VB.NET: Public Read-Only Property Property Name As Return Type Get? Your Property execution goes in here End Get End Property.

Why smtp used as transfer protocol for web pages, Can SMTP be used as trans...

Can SMTP be used as transfer protocol for Web pages? Why? SMTP is an easy mail transfer protocol. This uses ASCII text for all communications. SMTP needs reliable delivery- the

Logical user-centered interactive design methodology, Question: Logical...

Question: Logical User-Centered Interactive Design Methodology is a methodology that identifies six clear stages to help in software development while keeping the user in mind.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd