Professional Documents
Culture Documents
Advantages of Ecommerce
Disadvantages of Ecommerce
Any one, good or bad, can easily start a business. And there are many bad sites which eat up
customers’ money.
There is no guarantee of product quality.
Mechanical failures can cause unpredictable effects on the total processes.
As there is minimum chance of direct customer to company interactions, customer loyalty is always on
a check.
There are many hackers who look for opportunities, and thus an ecommerce site, service, payment
gateways, all are always prone to attack.
Q) What is security of business transaction(SBT)/ Secure electronic transation(SET)? Discuss its future
prospects?
Security is an essential part of any transaction that takes place over the internet. Customer will loose
his/her faith in e-business if its security is compromised. Following are the essential requirments for safe e-
payments/transactions −
E-Commerce or Electronics Commerce business models can generally categorized in following categories.
Website following B2B business model sells its product to an intermediate buyer who then sells the product to
the final customer. As an example, a wholesaler places an order from a company's website and after receiving
the consignment, sells the end product to final customer who comes to buy the product at wholesaler's retail
outlet.
Business - to - Consumer(B2C)
Website following B2C business model sells its product directly to a customer. A customer can view products
shown on the website of business organization. The customer can choose a product and order the same. Website
will send a notification to the business organization via email and organization will dispatch the product/goods
to the customer.
Website following C2C business model helps consumer to sell their assets like residential property, cars,
motorcycles etc. or rent a room by publishing their information on the website. Website may or may not charge
the consumer for its services. Another consumer may opt to buy the product of the first customer by viewing the
post/advertisement on the website.
Consumer - to - Business (C2B)
In this model, a consumer approaches website showing multiple business organizations for a particular service.
Consumer places an estimate of amount he/she wants to spend for a particular service. For example, comparison
of interest rates of personal loan/ car loan provided by various banks via website. Business organization who
fulfills the consumer's requirement within specified budget approaches the customer and provides its services.
B2G model is a variant of B2B model. Such websites are used by government to trade and exchange
information with various business organizations. Such websites are accredited by the government and provide a
medium to businesses to submit application forms to the government.
Government uses B2G model website to approach business organizations. Such websites support auctions,
tenders and application submission functionalities.
Government uses G2C model website to approach citizen in general. Such websites support auctions of
vehicles, machinery or any other material. Such website also provides services like registration for birth,
marriage or death certificates. Main objectives of G2C website are to reduce average time for fulfilling people
requests for various government services.
Q) What is EDP(Electronic data processing)/ EDI? Write its advantage and disadvantage?
Electronic Data Processing (EDP) refers to the use of automated measures using simple, repetitive
actions - and computer technology - to organise and store documents and sometimes to transfer them from
paper to a digital format.
Advantages of EDI
1. Speedy transmission: It requires only few seconds to communicate through electronic media because it
supports quick transmission.
2. Wide coverage: World has become a global village and communication around the globe requires a second
only.
3. Low cost: Electronic communication saves time and money. For example Text sms is cheaper than traditional
letter.
Disadvantages of EDI
1. Volume of data: The volume of telecommunication information is increasing in such a fast rate that business
people are unable to absorb it within relevant time limit.
3. Legal status: Data or information, if faxed, may be distorted and will cause zero value in the eye of law.
4. Undelivered data: Data may not be retrieved due to system error or fault with the technology . Hence
required service will be delayed
5. Dependency: Technology is changing everyday and therefore poor countries face problem as they cannot
afford new or advanced technology. Therefore poor countries need to be dependent towards developed countries
for sharing global network
Cybercriminals may use computer technology to access personal information, business trade secrets, or
use the Internet for exploitive or malicious purposes. Criminals can also use computers for communication and
document or data storage. Criminals who perform these illegal activities are often referred to as hackers.
Soft lifting: Borrowing and installing a copy of a software application from a colleague.
Client-server overuse: Installing more copies of the software than you have licenses for.
Hard-disk loading: Installing and selling unauthorized copies of software on refurbished or new
computers.
Counterfeiting: Duplicating and selling copyrighted programs.
Online piracy: Typically involves downloading illegal software from peer-to-peer network, Internet
auction or blog.
Internet security refers to securing communication over the internet. It includes specific security protocols such
as:
It consists of a set of protocols designed by Internet Engineering Task Force (IETF). It provides security at
network level and helps to create authenticated and confidential packets for IP layer.
Privacy
Integrity
Authentication
Q) Write short notes on VPN?
A virtual private network (VPN) is a network that is constructed using public wires — usually
the Internet — to connect to a private network, such as a company's internal network. There are a
number of systems that enable you to create networks using the Internet as the medium for transporting
data. It secures the private network as these systems use encryption and other security mechanisms to
ensure that only authorized users can access the network and that the data cannot be intercepted.
OR
A VPN is designed to provides a secure, encrypted tunnel in which to transmit the data
between the remote user and the company network. The information transmitted between the two
locations via the encrypted tunnel cannot be read by anyone else because the system contains several
elements to secure both the company's private network and the outside network through which the
remote user connects through.
Q) Write short notes on digital signature?
Digital signatures are the public-key primitives of message authentication. In the physical world, it is common
to use handwritten signatures on handwritten or typed messages. They are used to bind signatory to the message.
Message authentication − When the verifier validates the digital signature using public key of a
sender, he is assured that signature has been created only by sender who possess the corresponding
secret private key and no one else.
Data Integrity − In case an attacker has access to the data and modifies it, the digital signature
verification at receiver end fails. The hash of modified data and the output provided by the verification
algorithm will not match. Hence, receiver can safely deny the message assuming that data integrity has
been breached.
Non-repudiation − Since it is assumed that only the signer has the knowledge of the signature key, he
can only create unique signature on a given data. Thus the receiver can present data and the digital
signature to a third party as evidence if any dispute arises in the future.
Q) What is GIS? Write down its features and component ?
A geographic information system (GIS) is a computer system for capturing, storing, checking,
and displaying data related to positions on Earth’s surface. GIS can show many different kinds of data
on one map. This enables people to more easily see, analyze, and understand patterns and relationships.
With GIS technology, people can compare the locations of different things in order to discover
how they relate to each other. For example, using GIS, the same map could include sites that produce
pollution, such as gas stations, and sites that are sensitive to pollution, such as wetlands. Such a map
would help people determine which wetlands are most at risk.
GIS can use any information that includes location. The location can be expressed in many
different ways, such as latitude and longitude, address, or ZIP code. The system can include data about
people, such as population, income, or education level. It can include information about the land, such
as the location of streams, different kinds of vegetation, and different kinds of soil.
Short for electronic mail, e-mail or email is information stored on a computer that is exchanged between two
users over telecommunications. It is a message that may contain text, files, images, or other attachments sent
through a network to a specified individual or group of individuals.
Advantages Disadvantages
Emails are usually received fairly quickly, most of Some people change their email addresses
the time a couple of seconds after they are sent fairly often as they switch ISPs or jobs
There are three types of name servers: Primary, Secondary, and Master.
A primary server has the original copy of a zone file. Any changes made to the zone file are made to
the file on the primary server. When a primary server receives a query about a host name in its own zone, it
retrieves the host resolution locally from its own zone files.
A secondary server gets a copy of zone files from another server. This secondary zone file is a read-
only copy of the file; any changes made to the zone are made at the originating zone file. Then the changes are
copied down to the secondary server through replication. When zone files are copied from another server it is
called a zone transfer.
The server from which a secondary server receives a zone transfer is called the Master Name Server.
The TCP/IP address of the Master Name Server is configured at the secondary server. The master server can be
a primary or a secondary server. If the master is a primary, then the zone transfer comes directly from the
source. If the master name server is a secondary server, the file received from the master server via a zone
transfer is a copy of the read-only zone file.
Q) Write short notes on DNS?
A DNS Server has information about the domain name space that it has already obtained either from a
local copy of a zone file or by making a query of another DNS Server.
There are three types of name servers: Primary, Secondary, and Master.
A primary server has the original copy of a zone file. Any changes made to the zone file are made to
the file on the primary server. When a primary server receives a query about a host name in its own zone, it
retrieves the host resolution locally from its own zone files.
A secondary server gets a copy of zone files from another server. This secondary zone file is a read-
only copy of the file; any changes made to the zone are made at the originating zone file. Then the changes are
copied down to the secondary server through replication. When zone files are copied from another server it is
called a zone transfer.
The server from which a secondary server receives a zone transfer is called the Master Name Server.
The TCP/IP address of the Master Name Server is configured at the secondary server. The master server can be
a primary or a secondary server. If the master is a primary, then the zone transfer comes directly from the
source. If the master name server is a secondary server, the file received from the master server via a zone
transfer is a copy of the read-only zone file.
Q) What is ARP? Also discuss network identifiers?
Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address)
to a physical machine address that is recognized in the local network.
Network identity (network ID) is a portion of the TCP/IP address that is used to identify individuals or
devices on a network such as a local area network or the Internet. Network ID is designed to ensure the security
of a network and related resources.
Network IDs are critical to the management and tracking of user resources, including data,
applications, devices and equipment.
A network ID is also known as network identification or NetID.
Q) What is gateway?
A gateway is a network node connecting two networks that use different protocols.
Gateways can take several forms -- including routers or computers -- and can perform a variety of
tasks. These range from simply passing traffic on to the next hop on its path to offering complex traffic filtering,
proxies or protocol translations at various network layers.
Q) What is domain name and how is it different from an IP address?
I.P. Address is the Internet protocol address of a Machine which can help locate the exact location of
the machine may if be Personal Computer,Printers, Laptop or Mobiles Phones using different networks to log
on.
Domain Name e.g. www.example.com is registered name and once registered can not be allotted to
another person. It may be country specific like www.example.in for India and www.example.au for australia
Q) Explain the use of search engine. Give some example of search engine.
Search engines are programs that search documents for specified keywords and returns a list of the
documents where the keywords were found.
A search engine is really a general class of programs, however, the term is often used to specifically
describe systems like Google, Bing and Yahoo! Search that enable users to search for documents on the World
Wide Web.
1) PC-to-PC telephony
2) PC to Phone, and
3)Phone to Phone.
PC-to-PC Calling
PC-to-PC telephony makes you to call another person who is online at the same time you are, using the same
telephony client. To use your PC to talk to another person through his PC, you'll need compatible software, a
microphone and speakers and Internet access.
PC-to-Phone Calling
PC-to-phone telephony allows you to make calls from your computer to regular telephones. The technology is
similar to PC-to-PC calling.. To use PC-to-Phone services, you need to have the same equipment used for PC-
to-PC calling; a microphone and speakers, and Internet access.
Phone-to-Phone Calling
A relatively new type of Internet telephony service, which is quickly gaining in popularity with consumers and
business. Phone-to-phone telephony also allow telephone calls to be placed over the Internet, but it different
from the other types of Internet telephony. Phone-to-phone telephony does not require users to have special
software, or even a computer to use it. Phone-to-phone uses traditional telephones on both ends.
To make phone-to-phone telephony calls, you need to have an Internet Telephony Service Provider (ITSP). The
ITSP will have gateways in different areas around the world. When you place a call, that call is routed over the
Internet to a gateway located the closest to the receiving party. The gateway will then send the call over the
PSTN to the receiving party's regular telephone. Because much of the transmission for the call takes place over
the Internet, Phone-to-phone telephony is cheaper than using a regular telephone service provider. Your ITSP
will be the one who handles your subscription and billing
Internet Chat
Internet chatting involves real-time instant text messaging between two or more users in chat rooms. They are
many different types of Internet chats all with different purposes
Benefits
Internet chat rooms allow you to communicate with different kinds of people from all over the world. They
allow you to meet different kinds of people who share similar interests, goals, hobbies and desires. Internet chats
can also be a great learning center ( e.g. chatting forums) where people can ask questions and receive answers
on products and services, computer troubleshooting and more.
Types
Singles chat rooms are probably the most common chats on the internet. They managed and run by dating
websites. Video/Webcam chats are also common forms of chatting because they allow you to view your contact
as you chat. While video chatting is the most interactive form of chatting, they are also the most dangerous.
Other Internet chats include business chat rooms which allow speedy exchange of trade stock tips and business
related information. Christian chat rooms are other popular chats which users turn to for fellowship and good
conversation.
Features
Internet chats not only allow you to send and receive instant messages, they also allow you to share pictures, and
files. Some Internet chat rooms include emoticons which are smiley faces used to describe what your present
emotion is. Some Internet chats include sound effects which range from serious to silly and allow you to. Other
chat rooms allow you to change color combinations to create a theme or background that works for you as you
are chatting.
Advantages:
Disadvantages:
1) There is a lot of wrong information on the internet. Anyone can post anything, and much of it is garbage. .
2) Some people are getting addicted to the internet and thus causing problems with their interactions of friends
and loved ones. .
3) Internet has a lot of "cheater" sites
4) Hackers can create viruses that can get into your personal computer and ruin valuable data.
5) Hackers can use the internet for identity theft. .
Q) What is Internet protocol? Discuss about types of Internet protocol?
IP address a unique string of numbers separated by full stops that identifies each computer using the
Internet Protocol to communicate over a network.
In order to provide computer to computer communication via Internet, we need a global addressing
scheme. Such an addressing is provided by Internet Protocol (IP) at the network layer.
It is a 32-bit address This is called an IP address or logical address. Which is made up of the network
ID, plus a unique host ID. These numbers are assigned by ISP (Internet Service Provider), and IP address can be
used to identify the country or region from which a computer is connecting to the WEB. The IP address can
either be Static or dynamic.
In static address is to be given manually. But in dynamic a DHCP server is to be configured to give ip
address to the connected hosts automatically. This address is used to uniquely identify each Network host over
the network.
Q) Categories of IP?
IP address is divided into 5 category usually called classes. This allocation has come to be called class
full addressing.
Following are the classes of ip:-
.
IP address format
The 32-bit IP address is grouped eight bits at a time, separated by dots and represented in decimal
format. This is known as dotted decimal notation as shown in fig.
• Each bit in the octet has a binary weight (128,64,32, 16,8,4,2, 1).
• The minimum value for an octet is 0, and the maximum value for an octet is 255.