Professional Documents
Culture Documents
Header fields
The message header should include at least the following fields:
● From: The e-mail address, and optionally the name of the author(s). In many e-mail
clients not changeable except through changing account settings.
● To: The e-mail address(es), and optionally name(s) of the message's recipient(s).
Indicates primary recipients (multiple allowed), for secondary recipients see Cc: and Bcc:
below.
● Subject: A brief summary of the topic of the message.
● Date: The local time and date when the message was written.
● Message-ID: Also an automatically generated field; used to prevent multiple delivery
and for reference in In-Reply-To: (see below).
Lesson 2 – 3
Data transmission - the transfer of data from one digital device to another. This is
simply when data is sent over a communication medium.
The medium is:
● One computer to another
● Communication devices such as smart phones
● Electronic devices such as a Bluetooth devices
Types of Transmission
1. Simplex Transmission - This is a one-way transmission
2. Half Duplex Transmission - Communication can occur in both directions but only on
direction at a time
3. Full Duplex Transmission- Communication can occur in both directions at the same
time.
Examples of Communication Systems
- E-mail
- Voice Mail
- Fax
- Smart Phone
- Instant Messaging
- Telecommuting
- Video-conferencing
- E-Commerce
- The Internet
- The Web
Computer networks commonly help endpoint users share resources and communicate.
The use of computer networks can overcome geographic barriers and enable the sharing
of
information. Computer networks enable the usage and sharing of any number of
applications
and services, including emails, video, audio and plenty of other types of data, over the
internet.
2. Ring Topology
Ring topology is a network configuration where device connections create a circular
data path. In this, each device is connected to with its exactly two neighboring devices,
like points on a circle which forms like a ring structure.
Advantages:
● There is no need of server to control the connectivity among the nodes in the
topology.
● Easy to manage.
● Speed to transfer the data is very high in this type of topology.
Disadvantages:
● If one workstation shuts down, it affects whole network or if a node goes down entire
network goes down.
● In order for all the computer to communicate with each other, all computer must be
turned on.
3. Bus Topology
With a bus topology, all devices are connected to a single cable, often called the
backbone. There are terminators at each end of the bus that stops the signal and keeps
it from traveling backwards
Advantages:
● Requires less cable length than a star topology.
● It works very efficient well when there is a small network.
● It is easy to connect or remove devices in this network without affecting any other
device.
Disadvantages:
● Terminators are required at both ends of the backbone cable.
● Difficult to identify the problem if the entire network shuts down.
● A major flaw in the bus topology is that it can’t handle a large amount of data.
Final Lesson
1. Electronic Payment System
E-payment means making payment through electronic media by using credit or debit
cards for the products bought electronically. In e-payment system there is no physical
delivery of cash or cheque.
E-payment systems are widely used in air ticketing, insurance, banking, retail, health
care, online markets and even government institutions.
E-money or E-cash
It is an electronic medium for making payments and is the trend today. It is the creation
of electronic money or tokens, usually by a bank, which buyers and sellers trade for goods
and services.
E-cash includes debit cards, credit cards, automated clearing house
E-Payment Media
1. Credit Card
- Credit cards are the most widely used and convenient method of making online payment.
- By using these cards, customers can purchase goods and services either offline or
online without making immediate payment.
- Payment to the sellers will be made by the customer’s bank.
- Credit card is a financial instrument which can be used more than once to borrow money
or buy goods and services on credit.
- It is a small plastic card bearing the name and the number of the holder.
- It also contains the validity period and other important particulars. The name of the bank
etc.
2. Debit Card
- Debit cards are issued by bank to their customers who have maintained an account in
the bank with sufficient credit balance.
- Each time the customer makes a purchase, an amount equal to the purchase is debited
in his account
- When using a debit card, customers are drawing money from their account
3. Electronic Cheque
- electronic cheques are very similar to ordinary paper cheques except that they are
initiated electronically.
- Digital signatures used for signing and endorsing electronic cheques.
4. E-Wallet
- This is another e-payment system which operates like a carrier e-cash and information
in the same way a real world wallet functions such as carrying real cash.
- The aim is to give customers a single, simple and secure way of carrying currency
electronically.
Security Threats in the E-Commerce Environment
1. Spam E-mails
The spammers usually hack individual or organizational email accounts that you know to
send spam emails to make you believe the spam email is legitimate.
The emails are linked to infected and phishing sites that compromise the computer’s
security and compromise the store.
4. Phishing
Phishing is one of the main ways that hackers use to compromise eCommerce stores.
This type of social engineering entails stealing login and password details by sending out
spam emails under the disguise of a well-known person or organization.
They can even create a phishing profile that resembles the login page of your payment
processor or e-commerce site and send you a message to log in to fix an error. Once
you fall for this and try to log in, they capture your login details and use them to log into
the real e-commerce or payment processor sites.
5. Identity Fraud
Identity fraud involves the unauthorized use of another person’s personal data, such as
social security, driver’s license, and/or credit card numbers, as well as user names and
password, for illegal financial benefit. Criminals can use such data to obtain loans,
purchase merchandise, or obtain other services, such as mobile phone or other utility
services.
Cybercriminals employ many of the techniques described previously, such as spyware,
phishing, data breaches, and credit card theft, for the purpose of identity fraud.
2021 has seen most businesses transition from offline to online operation modes, which
translates to increased safety issues.
An online business is only as safe as its cybersecurity strategy is. Invest in robust and
premium cyber security assistance that fits your needs and budget.
2. Social Media and Electronic Platform for Administrative
Professionals
Social Media as Means of Information Dissemination
In this age of the internet, knowledge can be shared instantly and people are able to
access information quicker and easier than ever before. Social Media is the most
effective tool for sharing and marketing.
Scientists and researchers need to use this tool to their advantage in order to promote
their work and share information with the world. But to promote any kind of item
including academic research, a knowledge of social media and its impact is required.
Understanding this and using it to your advantage will help you share your work with not
only the science community but also the world
Blogging and vlogging have become a new way for scientists to share their work with the
general public. Science news media is a growing industry, with magazines, websites, TV
shows and documentaries. Scientists need to take advantage of these platforms in order
to share their work with more of the world.
Using Twitter
It is a microblogging system that enables real-time interaction between posters and
followers. The advantage to using twitter is the ability to post links to other websites and
tag certain themes to attract readers to your posts. For example, if you post a link to your
recently published paper, you can write a short blurb giving readers information
about the topic, and then you can tag (#hastag) #science, #research, #biology.
Basically, by tagging certain keywords, interested people are more likely going to see
your post.
Using Instagram
Instagram is similar to Twitter, in that it is another microblogging platform, but it largely
focuses on pictures and short video content. It has been flooded with content creators
and influencers that post gorgeous photos and attempt to sell followers products they are
paid to promote.
Using Facebook
The main advantage to Facebook is the ability to create groups and pages. By doing this,
you can create a sort of community of people to collaborate on projects, discuss news,
and learn together.
Using LinkedIn
LinkedIn is now a social networking platform that enables users to connect with other
professionals and share information that they find interesting and relevant.
The advantage of using LinkedIn for knowledge dissemination is that the people who are
likely to engage with your work and posts are those with the goal of professionalism.
The disadvantage is that it is not a very wide-reaching platform, in that you are not going
to reach a diverse group of readers.
Identifying your target audience can help you develop and understand the languages
being used by them. This will open up your business for well-aligned content production
and creation, an understanding of the timing of the actions and also the identification of
changes and improvements to apply to your products or services.
1. Start with what you know already
Basics like demographics (age, income, education levels, family status, etc.) come in
handy and can help you begin to shape how you identify your audience. Collect data
about the age, education level, income, and so on about your target prospects. You can
be specific on what you want to collect data about. You might be surprised how
demographic data can help drive purchase decisions
2. Research
You are learning from your customer base. You can even carry out primary research if
you want to pick valuable data straight from the mouths of your customers.
These websites are geared around more actionable information and may contain “how
to’s”, tips and tricks, fix and repair, guidance, support information, directions, instructions,
etc.
These websites are designed to be easy to navigate and frequently updated in order to
keep users coming back for more information. They can be made more engaging by using
dynamic content, such as videos, podcasts, slideshows, etc.
Social networks can be used for both personal and commercial purposes. Businesses
use social networks to build direct connections with their customers which allows them to
get feedback on their products and services and allows them to learn more about what
their customers really need and want.