You are on page 1of 70

“Performance Evaluation of ” (With Special Reference to Davangere City)

CHAPTER-1

INTRODUCTION

1.1 INTRODUCTION

Globally, the usage of smartphone is rising rapidly information and


communication Technology has changed the climate of banking sector, ICT provides
access to information through integration of hardware and software in
telecommunication. With the help of ICT, banking started searching for innovative
alternate banking system to save time and money Their tireless and ceaseless efforts
resulted in the transformation of traditional banking into electronic banking with the
help of electronic banking traders started searching for innovative mobile apps for
alternative payment system to encourage cashless transactions and to save time Paytm
is an Indian mobile first financial services company that offers Payments.

Paytm means “Pay through mobile” it is one of the largest is one of the fastest
growing Indian-E-Commerce shopping websites launched in 2010 The name of the
company who launched the Paytm is one 97 communication. Initially it is focused on
mobile and DTH recharging, the company headquartered in Noida, India it gradually
provided recharging and bill payment of various portals including electricity bills, gas
well as telephone bills.

In 2014 Paytm has started the business same like as the facilities are getting
from the other E-Commerce company such as Flipkart, Amazon, and SnapdealToday
it is India’s most popular online destination for prepaid mobile and DTH recharges
and shopping and it’s Android and 150 apps have been ranked among the most
popular apps in only 3 years since the founding the company created ausers base of 25
million wallet users and 10 million app downloads.

Paytm works with the all mobile operators in all states in India for prepaid
mobile DTH and datacard recharges and postpaid mobile, landline, and data card bill
payments, it has partnered with multiple national banks for credit card debit card, and
net banking payments paytm also works with various billers for utility bill payments,

A.R.G. Arts and Commerce, P.G. Centre, Davangere 1


“Performance Evaluation of ” (With Special Reference to Davangere City)

In 2015 paytm received a license from RBI for starting India’s first payments, Banks,
The Bank Intends to use the paytm’s.

The development and the ascent of versatile innovation all through the world
among individuals has extended to a great extent in light of the prepaid model because
of this all classes of society approaches the budgetary administrations and have turned
out to be exceptionally comfortable with the versatile cash framework, for the been
opened for the middleclass and the poor people using the new innovation, with the
presentation of advanced wallets in mid-90’s spearheaded by Davangere with the
vision fundamental the necessities of the clients a simple to utilize interface, capacity
to safely execute in the virtual and certifiable in came application-based wallets.

Which is nowadays available in each shop in rural and urban areas Debit cards
are also available for paytm online payments are accepted and the option for payment
comes with no maintenance charge but there is a commission cut on each transaction
Initially paytm had only recharge services and paytm was only for recharge but now
thing have changed using paytm we can even pay educational fees and bills, for both
buyers and sellers paytm is still serving as alternative means of cash transaction and
offers a convenient safe and secure use on mobile applications for both consumers
and marketers achievement of an innovation is the point at which a customer
acknowledges an item and administration over a market depends on another heap of
advantage traded at a price or a value paytm gained attention importance in to day to
day life.

There are number of facilitators which are leading to the growth of digital
payment and transition from cash economy to less cash economy, Thesefacilitator
include penetration of internet connectivity on smart phones, non- banking financial
institution facilitating digital payment, one touch payment rise of financial technology
sector and push by government either by giving incentives or tax breaks, these all
factor are creating positive atmosphere for growth of digital payment in India.

Customer satisfaction a business term is a measure of how products and


services supplied by a company meet or surpass by a customer expectation, It is seen
as a key performance indicator within business and is part of the four of a balanced
scorecard increasing competition is forcing businesses to pay much more attention to

A.R.G. Arts and Commerce, P.G. Centre, Davangere 2


“Performance Evaluation of ” (With Special Reference to Davangere City)

satisfying customers, Ina competitive market place where businesses compete for
customers customer satisfaction is seen as a key differentiator and increasingly has
become a key element of business strategy organizations need to retain existing
customers while targeting non-customers.

Digital payment system is a sample of EDI, E-Commerce payment systems


have become popular use of the internet based shopping It include security measures
by use of fraud on the signature strip with information on file with card holder’s
issuing bank, Digital payment system has a certificate from an authorized certification
authority that provides public key infrastructure (PKI) for securing credit and Debit
transactions, Nowadays, credit cards play a major role become popular method of
making online payment but it is expensive.

An electronic payment typically involves the following phases registration,


Invoicing payment selection and processing, payment authorization and confirmation,
Digital payment system includes 3 common electronic payment instruments namely
cash, cheque, and card, The purpose of an electronic payment is to transfer value from
payer to payee. In today’s world we need an e-payment system that only provide
secure payment bur should also have effort to use mobile devices as “electronic
wallet” to store payment details and account information.

1.2 REVIEW OF LITERATURE

1)S, NAZIMSHA. DR, M, RAJESWARI

A study on paytm services in promoting cashless economy after


demonetization in India and an outline on It’s support towards making India digital

Strategy structure which was offered by our India government are towards
innovation are make in India startup India and skill India And paytm was one among
such innovation which came as an alternative to the cash transactions demonetization
as given paytm an elevate in the India’s money exchange economy constrained
individuals and specifically the little venders to look for alternatives the shoppers
started utilizing computerized instalment modes and paytm currently enrolled as a
safe versatile wallet and is slowly expanding It’s relationship with more providers.
It’s a change over to a digital model according to the market place. After

A.R.G. Arts and Commerce, P.G. Centre, Davangere 3


“Performance Evaluation of ” (With Special Reference to Davangere City)

demonetizing the 500 and 1000 rs notes paytm understood that it can successful only
by offering services towards cashless economy paytm is successful technological
innovationwhich as created a balance between cast and efficiency. The main aim is to
study the importance given to paytm by people in there daily routine life and success
of paytm in motivating the cashless economy. The aim is also to study the flexible
services offered by paytm promoting cashless economy and also supporting digital
India.

2)MR. M. M. SAMUDRE. MR.V.R. GRAMOPADHYE. 2018

Customer satisfaction towards paytm in sanglimirajkupwadmuncifal


corporation.

Digital India’s drive towards a cashless economy has modernized the launch
of unified payment Interface (UPI) applications since It’slaunch in Jan 2016 the usage
of smart phones as virtual debit cards has double to send or receive money instantly
the current study has been conducted in order to meticulously evaluate and examine
the level of customer satisfaction towards paytm UPI app, the purpose of this study is
also to observe and analyze the purpose of using paytm as one of the UPI
applications, reasons for choosing and to find out the problems encountered by the
customers, the primary data for this study was compiled through well-structured
questionnaire filled in on a one-to-one basis by 150 customers of sanglimirajkupwad
corporation, the study result clearly in dicates that the majority of the users of paytm
UIP application were in the high level of satisfaction Hence the study highlights the
important point the paytm UIP application must consider in order to increase the
number of users and to improve their service quality.

3)DR, M, SENTHIL.

A Study on customer satisfaction towards paytm users in Dharmapuri district.

The present area is entering into a new pace in payment system by using
digital wallets filled with coupons and offers in this today’s busiest world people
don’t have their time to sit and relax then how can do their personal works like to
recharge their phones to pay electricity bill insurance or to shop etc, so to make
people stress free new application in their mobile phones in higher percentage and

A.R.G. Arts and Commerce, P.G. Centre, Davangere 4


“Performance Evaluation of ” (With Special Reference to Davangere City)

made help them to do their works easier the present research paper is focusing on the
impact of these new digital payment systems on customers and problems encountered
if any.

4)DR,T,VENKATESAN.

Usage of paytm-A study,

Smartphones have brought out a huge change in the lives of people, people
enjoy great comfort with the advancement in science and technology people in the
present day find thing much easier and perceive things based on technology
smartphones play a vital rale in this regard offering users a great platform for
communication and access to a wide range of applications, paytm is the Indian mobile
first financial services company that offers payments, banking, lending, and
insurances to consumers and merchants through it’s mobile app the total number
paytm users crossed more than 280 million users till 2017 the aim of this research
paper is to analyse the usage of paytm by users in Madurai city.

5)RAJESH KRISHNA BALAN, NARAYAN RAMASUBBU,

GIRI KUMAR TAYI Studied in their paper “Digital Wallet: Requirement and
challenges” 2006 that the prerequisites and difficulties of sending money across the
country using computerized wallet arrangement in Singapore. Advance, they
examined why Singapore is prepared for a computerized wallet and recognize the key
difficulties in building and sending a computerized wallet and at that point the
exchange was on the difficulties confronted when utilized with digital wallet frame
work in real money exchange and more detail and end the paper with their proposed
arrangement.

6)SHWETU KUMAR, VIJAY YADAV, ATIQU-UR-RAHMAN, ADITIBANSA

(2014), Did a study on “paytm”. They examined on paytm achievement,


particularlyin designing, working and development on organizing a store,
webprogression, online gadget and also depicted about electronic portion system.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 5


“Performance Evaluation of ” (With Special Reference to Davangere City)

7)PROF TRILOK NATH SHUKAL

(2016) In his paper “mobile wallet: present and the future” has discussed about
mobile wallet, working, types, and it’s advantages and disadvantages. He concluded
that mobile wallets will be used to engage with the customer by the marketers and
digital businesses. Irrespective of the market status of these mobile wallets, marketers
should take advantage of the emerging opportunities.

8)DR. KARMINDERGHUMAN AND CS SHRUTI SRIVASTAVA,

(2015) asked questions for clarification about paytm in their article named
“Recharging: The right way ?- A case study on e-payment giants:
Freecharge&paytm.” One among the questions is that do the customers prefer a one
stop shop for everything on a single platform like paytm or specialist websites like
freecharge that are specialists in that domain and a strong and unique positioning.

9)DR. A. ARUN KUMAR.

The Indian economy is an economy which was traditionally based on cash


transactions. however, after the midnight of November 8, 2016, India moved towards
cashless transactions. The present study deals with Indian consumer’s perception
towards mobile wallet app paytm. For this common people from India belonging to
major cities were requested to participate in this study. The field work of the study
was conduted during January to February, 2018. The paytm app has both pros and
cons among common respondents.one group of consumers opined that the paytm app
is both easy to and wallet free.

10)M. RAJESWARI MANNU

Strategy structure which was offered by our Indian Government are towards
innovation are make in India, Startup India and skill India. And paytm was one among
such innovation which came as an alternative to the cash transaction. Demonetization
has given paytm an elevate in the India’s money exchange economy and constrained
individuals, and specifically the little vendors to look for alternatives. The shoppers
started utilizing computerized installment modes and paytm is currently enrolled as a
safe versatile wallet and is slowly expanding its relationship with more providers. It is

A.R.G. Arts and Commerce, P.G. Centre, Davangere 6


“Performance Evaluation of ” (With Special Reference to Davangere City)

a changeover to a digital model according to the marketplace. In India paytm is


constantly growing to be the top platform for mobile, e wallet and commerce. After
demonetizing the 500 and 1000 rupees notes paytm understood that it can successful
only by offering services towards cashless economy. Paytm is a successful
technological innovation which has created a balance between cost and efficiency.
The main aim is to study the importance given to paytm by people in their daily
routine life and success of paytm in motivating the cashless economy. The aim is also
to study the flexible services offered by paytm promoting the cashless economy and
also supporting the digital India.

1.3 OBJECTIVES OF THE STUDY.

Following are the major objectives of the study

To Identify the customer preference among paytm users in Davangere city.

To measure the customer satisfaction level of paytm services.

To explore the way to improve the awareness about paytm in Davangere city.

To determine the major problems faced by the paytm users.

To study the acceptance level of paytm in Davangere as an alternative to the


cash transactions.

1.4 SCOPE OF THE STUDY.

This research focuses on paytm service users Davangere in general the scope
of the research will describe the relationship between paytm services on safety and
security transaction speed convenience recharge ticket booking shopping booking
hotels insurance premium and transfer of funds which can directly influence on the
customer satisfaction level and intention to use in further moreover the respondent of
this research will randomly select from business people and educational group in
Davangere city who are normally use the paytm services in Davangere city.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 7


“Performance Evaluation of ” (With Special Reference to Davangere City)

1.5 NEED FOR THE STUDY.

Demonetization drive paved way for unified payment interface (UIP) app
through which was promptly promoted by the government,

However, the issue of ease of use transaction delay security and privacy issues
cropped up currently paytm holds 38% market share in UIP apps despite the issues the
researchers were interested to know the level of satisfaction derived while using
promoting the paytm app and why it’s still the unique choice among it’s rivals.

1.6 RESEARCH METHODOLOGY.

Data collection is a step in the preparation of project this project is to attempt


to understand the concept of paytm.

To complete the project the information is to be collected in the following manners

 PRIMARY SOURCES.

 SECONDARY SOURCES.

PRIMARY SOURCES

A Primary sources is an eyewitness account of an project the sources data will


be collected by a person who experienced it is the source which is unpublished data it
is the first hand data which can be collected by the investigator.

The methods used to collect data information through filing questionnaires

 By direct observation

 By interviews

 By survey

 Data collected by interacting with the paytm workers and also by the
customers of the paytm,

A.R.G. Arts and Commerce, P.G. Centre, Davangere 8


“Performance Evaluation of ” (With Special Reference to Davangere City)

SECONDARY SOURCES

 Secondary sources provide secondary hand information that has been


already analyzed rewarded or interpreted,

 The data information which have been previously published already


written documents reports.

 The secondary sources can be collected by the

 Newspapers and other periodicals

 Reports from the sector

 Literature Reviews

 Magazine and Journals

 Websites

 Articles

Collecting secondary sources involves less cost less time and less effort the
data which is collected by some one else,

Sample Size Samples were collected buyers of online shopping in which the
total sample size of Respondents are 50.

Convenience sampling technique is used to obtain the necessary information


through well structured questionnaire. Statistical tools like rank analysis and scale are
used in analysing the data.

1.7 LIMITATIONS OF THE STUDY

Following are the certain limitations of the study

 The study focuses only Davangere city. The result may or may not be
applicable to other areas.

 The samples were restricted only with 50 samples due to time constraint.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 9


“Performance Evaluation of ” (With Special Reference to Davangere City)

 The bias in samples could not be controlled because of their buys schedule in
there Respondents.

 The study is based on the availability of facts and figures.

1.8 CHAPTER SCHEME

Chapter 1- Introduction.

Here in the first chapter we will discuss the Introduction of this study and also
will discuss the following literature review, objectives of the study, needs of the
study, scope of the study Plan for research methodology, Limitations and chapter
scheme.

Chapter 2- Company profile.

In the second chapter we will discuss the Company profile, company logo,
history of paytm, the Funding of paytm, mission and vision of paytm, objectives of
the company, types of paytm account, How to open new paytm account,
Achievements of company, Advantages and Disadvantages of paytm.

Chapter 3 – Working and technologies of paytm.

The third chapter we have discuss about supply chain management


Introduction, meaning, Definition, objective, functions, and supply chain management
of paytm, web technology of paytm In, and Web based tool of paytm.

Chapter 4 – Data analyses and interpretation.

This Chapter presents the analysing of the study gender wise classification of
the respondents, age group of the respondents, Educational status of the respondents.

Chapter 5 – Finding and suggestions conclusion.

Here in the last chapter we will discuss the finding and the suggestions and
conclusion to the study.

Annexure – Questionnaire, Bibliography.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 10


“Performance Evaluation of ” (With Special Reference to Davangere City)

CHAPTER 2

COMPANY PROFILE

2.1 COMPANY PROFILE

2.2 COMPANY LOGO

2.3 HISTORY OF PAYTM

Paytm was founded in August 2010 with an initial investment of $2 million


by It’s founder vijayshekharsharma in NOIDA a region adjacent to India’s capital
new Delhi It started off as a prepaid mobile and DTH recharge platform and later
added data card postpaid mobile and landline payments in 2013.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 11


“Performance Evaluation of ” (With Special Reference to Davangere City)

By January 2014 the company launched the paytm wallet and the Indian
Railways and uber added It as a payment option It launched into E- Commerce with
online deals and bus ticketing in 2015 it unveiled more use- cases like education fees
metro recharges, electricity, gas, and water bill payments, it also started powering the
payment gateway for Indian Railways.

In 2016 paytm launched movies events and amusement parks ticketing as well
as flight ticket bookings and paytmQ,R, later that year it launched rail booking and
gift cards.

Paytm’s registered user base grew from 11.8 million in August 2014 to 104
million in August 2015 it’s travel business crossed $500 million in annualized GMV
run rate while booking 2 million tickets per month.

In 2017 paytm became Indian’s first payment app to cross over 100 million
app downloads the year It launched paytm gold online it also launched the paytm
payments bank and Inbox a messaging platform with in chat payments directly into
their bank accounts at 0% charge, it also launched the paytm for business app
allowing merchants to track their payments and day-to day settlements instantly. This
led its merchant base to grow to more than 7 million by march 2018.

The company launched two new wealth management products- paytm gold
savings plan and gold gifting to simplify long-term savings. It launched into gaming
and investments, partnering with AGTech to launch a mobile games platform
gamepind, and setting up paytm money with an investment of rs 9 crores to bring
investment and wealth management products for the Indians.

FUNDING

In 2007 paytm’s parent one 97 communication ltd government its first


institutional investor, venture capital firm SAIF partners

In march 2015 paytm received it’s funding from Chinese E- Commerce


company Alibaba group based in Hangzhou, china, after ant affiliate took 25% stake
in one 97 as part of a strategic agreement soon after it received backing from rattan
Tata, the MD of Tata sons.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 12


“Performance Evaluation of ” (With Special Reference to Davangere City)

It subsequently launched a paytm for business app in 10 regional languages of


India allowing these merchants to track their payments and day-to-day settlements
conveniently in August 2015 the reserve bank of India granted in- principle approval
for payments bank to paytm in 2017 the company launched the paytm payments bank
with the aim to bring banking and financial services access to half – a –billion un –
served and under – served Indians.

The same year paytm launched an app for Canadian mobile phone cable
internet electricity and water bill payments in 2018 it set up paytm money to build
investment and wealth management offerings for its users this business was expected
to bring direct mutual funds and money market funds to the Indian masses in august
2016 paytm raised funding from mountain capital one of Taiwan based media tek’s
investment funds at a valuation of over $5 billion.

In may 2017 paytm received Its biggest round of funding by a single investor
– Softbank which also has a large stake in Alibaba thus bringing the company’s
valuation to an estimated $10 billion in august 2018 Berkhire Hathaway invested
$356 million for 3% 4% stake in paytm although Berkshire Hathaway confirmed that
warren Buffett was not involved in the transaction.

2.4 VISSION & MISSION OF THE COMPANY.

MISSION.

“TO BE MOST TRUSTED MOBILE COMMERCE BRAND IN THE


CONTRY”

VISION.

“PROVIDE MEANINGFUL ACCESS FOR MOBIL ECO SYSTEM”

2.5 OBJECTIVES OF THE COMPANY

To create entrepreneurial spirit.

To know how a company earns the profits.

To study business model for revenue plan

A.R.G. Arts and Commerce, P.G. Centre, Davangere 13


“Performance Evaluation of ” (With Special Reference to Davangere City)

To know why entrepreneurship is to be encouraged in today’s society.

To know how marketing is done for promotion.

To create paytm awareness in and around college campuses.

To promote cashless payment solutions.

2.6 TYPES OF PAYTM ACCOUNT

Based on how much money you are going to put in paytm wallet there are two
types of accounts in paytm.

BASIC ACCOUNT

PRIME ACCOUNT

BASIC ACCOUNT:

Basic account means customer paytm wallet issued by accepting minimum


customer details such as customer name, Email address, mobile number, which permit
payment and using Indian money for payment as per RBI.

PRIME ACCOUNT:

Prime account means customer paytm wallet which is KYC compliant and
which allows person to-person transfer and payment to all identified merchants as per
RBI.

2.7 HOW TO OPEN NEW PAYTM ACCOUNT ?

You can download the paytm app on your smartphone (Google playstore,
apple itune windows) or go to its website paytm.com.

Click on sign up.

Enter your mobile number, email id and desired password (you can change the
password and other details) and click on continue.

Paytm will send a OTP or Conformation code to your mobile number.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 14


“Performance Evaluation of ” (With Special Reference to Davangere City)

Enter that to confirm your mobile number and after you do so, you will see
your paytm account profile page. You can enter your name and other details there for
completing your full profile.

For verifying your email id on paytm you have to check your account page.

2.7.1 HOW CAN I RECHARGE MOBILE ON PAYTM ?

 For recharge, follow these steps:

 Enter the mobile number.

 Select your current operator (if it’s showing your previous operator).

 Enter recharge value.

 Enter your paytm password (or create a password if visiting for the first time).

 Select your paytm method (credit card, debit card, internet banking).

2.7.2 HOW TO TRANSFER MONEY FROM PAYTM ACCOUNT BACK TO


YOUR BANK ACCOUNT:

You can transfer paytm cash to any bank account. Enter your bank details and
the amount to be transferred. However, the following T&Cs apply here:

 A maximum amount of Rs 5000 can be transferred per transaction

 4% of the transferred amount would be charged as convenience fee

 Min balance of rs 2000 in the users wallet is required

 The user’s account needs to be registered on paytm for minimum 45 days

2.7.3 TO TRANSFER MONEY FROM PAYTM APP TO BANK ACCOUNT:

 Open the paytm app and tap on the pay or send

 Enter the details asked - IFSC code, account number, etc

 Enter the amount and tap send

 Money will be transferred to the mentioned bank account

A.R.G. Arts and Commerce, P.G. Centre, Davangere 15


“Performance Evaluation of ” (With Special Reference to Davangere City)

2.8 ACHIEVEMENTS OF PAYTM COMPANY.

Paytm Tow words that come to almost every Indian’s mind while shopping,
post demonetization, are “PAYTM KARO” paytm has brought a paradigm shift in the
retail industry by completely transforming the payment methodology. Initially, this
online wallet cum E-Commerce website was used to make payments for limited
utilities like mobile and DTH recharge and shopping bills. Over the years, this portal
has expanded its scope and has brought about anything and everything under the
ambit of its operations. Customers now can recharge their metro card, pay bills for
utilities like electricity and water, transfer funds to other bank accounts, book
flight/train/bus tickets, make hotel reservations, etc. now the latest paytm success
story is everexpanding with the addition of e-retail and m-commerce stores.

This gives the option to small vendors to list their products on the website and
allows them to expand their customer base.

2.8.1 ABOUT

The prodigy of India’s leading ecommerce website development company


one97 communication, paytm was launched in August 2010 by Vijay
shekharsharma. Started as an online mobile recharge and bill payment platform,
paytm now enables its users to make almost every kind of transaction on a click of a
button. In just a span of 8 years, paytm has over 250 million registered users and
counting.

Major investors in paytm include Alipay, Alibaba groups, SAIF partners,


silicon valley bank, and sapphire venture. Numerous revenue sources of paytmincude
interest from the escrow account maintained in a nationalized bank, advertisements on
the website, commission from utility bill payments and other recharges, and
commission on funds transfers from e-wallets to bank accounts.

2.8.2 REVOLUTION AND GROWTH

Paytm is a reserve bank India (RBI)-approved e-wallet, i.e., the user’s money
is secured under the escrow account with a nationalized bank, The security feature
and easy user interface make paytm the most favored digital payment platform in

A.R.G. Arts and Commerce, P.G. Centre, Davangere 16


“Performance Evaluation of ” (With Special Reference to Davangere City)

India. Paytm uses verisign – certified SSL (secure sockets layer) 128 – bit encryption
technology. This ensures that the online information of the user,i.e., the passwords
and other financial details, is safe thus providing greater protection to usere.

This online payment system is not only secure but also robust. One of paytm
success story is it can handle around 5000 transactions per second. A high capacity of
transactions has been made possible by the implementation of a very simple yet
effective and safe payment method. Users can simply pay by either scanning a QR
code of the shop or by entering the mobile number of the recipient. The paytm wallet
also has an option where a user can either safely park his or her money in the
application and pay from the money in the wallet or pay directly from the bank via the
application. The combination of secure transaction and high capacity has made paytm
one of the most favored payment applications. More and more number of people are
now using paytm to pay for their daily utilities and other expenses.

The popularity of paytm was boosted by the government’s decision of


demonetization. Demonetization forced people to switch to either plastic money or a
digital payment method. This helped paytm to further consolidate their position in the
domain of e- payment application. Recent surveys show that paytm has surpassed
similar payment applications such as mobikwik, freecharge, and other ecommerce app
developers in terms of both the number of users and the revenue generated.

2.8.3 EXPANSION PLANS

Last year paytm’s market share among the e-payment companies was 26%
paytm is now planning to explore new avenues. By 2020, paytm plans to tap the loan
market and disburse small loans to 500 million people.

The paytm payment bank was launched a chat app with more sophisticated
features. Paytm acquired shifu and near. In to improve and strengthen its offline and
online platform and enhance customer experience.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 17


“Performance Evaluation of ” (With Special Reference to Davangere City)

2.9 ADVANTAGE AND DISADVANTAGE OF COMPANY

ADVANTAGE OF COMPANY

Zero maintenance charges.

No fees for transaction.


Phone number is account number.
Only one IFSC code as of now.
DISADVANTAGES OF COMPANY

Only one branch through India.

No physical ATM card.

Unable to deposit cash.

No checkbook and DD as of now.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 18


“Performance Evaluation of ” (With Special Reference to Davangere City)

CHAPTER – 3

WORKING AND TECHNOLOGIES OF PAYTM

3.1 INTRODUCTION SUPPLY CHAIN MANAGEMENT:

In commerce supply chain management of the flow of goods and services,


involves the movement and storage of raw materials, of work-in-process inventory,
and of finished goods from point of origin to point of consumption.

Interconnected or interlinked networks, channels and node businesses combine


in the provision of products and services required by end customers in a supply chain.
Supply-chain management has has been defined as the “design, planning, execution,
control, and monitoring of supply-chain activities with the objective of creating net
value, building a competitive infrastructure, leveraging worldwide logistics,
synchronizing supply with demand and measuring performance globally.

SCM practice draws heavily from the areas of industrial engineering, systems
engineering, operations management, logistics, procurement, information technology,
and marketing and strives for an integrated approach,

Marketing channels play an important role in supply-chain management.


Current research in supply-chain management is concerned with topics related to
sustainability and risk management, among others. Some suggest that the “people
dimension” of SCM, ethical issues, internal integration, transparency/visibility, and
human capital/ talent management are topics that have, so, far, been underrepresented
on the research agenda.

In the study of supply-chain management, the concept of centroids has become


an important economic consideration. Is a location that has a high proportion of its
manufacturing, generally within 500 mi (805 km). in the us, two major supply chain
centroids have been defined, one near Dayton, ohio, and a second near riverside,
California.

The centroid near Dayton is particularly important because it is closest to the


population center of the US and Canada. Dayton is within 500 miles of 60% of the US
population and manufacturing capacity, as well as 60% of canada’s population. The

A.R.G. Arts and Commerce, P.G. Centre, Davangere 19


“Performance Evaluation of ” (With Special Reference to Davangere City)

region includes the interchange between 1-70 and 1-75, one of the busiest in the
nation, with 154,000 vehicles passing through per day, 30-35% of which are trucks
hauling goods. In addition, the 1-75 corridor is home to the busiest north-south rail
route east of the Mississippi river.

3.1.2 MEANING OF SUPPLY CHAIN MANAGEMENT:

A supply chain is a network of supplier, manufacturing, assembly, distribution


and logistics facilities that perform the function of these material into intermediate
and finished products, and the distribution of these products to customers.

Supply chain management is management of a network of interconnected


business involved in the ultimate provision of product and services packages required
by end customers. SCM deals with planning, execution, control and monitoring of
supply chain activities with the objectives of creating the value.

The supply chain encompasses all activities involved in the transformation of


goods from the raw material stage to the final stage, when the goods and services
reach the end customer.

Supply chain management involves planning, design and control of flow of


material, information and finance along the supply chain to deliver superior value to
the end customer in an effective and efficient manner.

3.1.3 DEFINITION OF SUPPLY CHAIN MANAGEMENT:

According to Christopher “supply chain management of upstream and


downstream relationship with suppliers and customers to deliver superior customer
value at less cost to the supply chain as a whole.

According to Professor Douglas M lambert.

“Supply chain management as the integration of business process from the end
user through original supplier who provide products, services and information that
adds value for the customers.”

A.R.G. Arts and Commerce, P.G. Centre, Davangere 20


“Performance Evaluation of ” (With Special Reference to Davangere City)

3.1.4 OBJECTIVE OF SUPPLY CHAIN:

1) To maximize overall value generated

2) To look for sources of revenue and cost

3) Improving the visibility of the demand

4) Improving the quality

5) Minimizing the time

6) Reduces the transportation cost

7) Reduces warehousing cost

8) Expanding width / depth of distribution

9) Product life cycle support

10) Service orientation

3.1.4 FUNCTIONS OF SUPPLY CHAIN MANAGEMENT:

Operational level

Daily production and distribution planning, including all nodes in the supply
chain.

Production scheduling for each manufacturing facility in the supply chain


(minute by minute).

Demand planning and forecasting, coordinating the demand forecast of all


customers and sharing the forecast with all suppliers.

Sourcing planning, including current inventory and forecast demand, in


collaboration with all suppliers.

Inbound operations, including transportation from suppliersand receiving


inventory.

Production operations, including the consumption of materials and flow of


finished goods.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 21


“Performance Evaluation of ” (With Special Reference to Davangere City)

Outbound operations, including all fulfillment activities, warehousing and


transportation to customers.

Order promising, accounting for all constraints in the supply chain, including all
suppliers, manufacturing facilities, distribution centers, and other customers.

From production level to supply level accounting all transit damage cases and
arrange to settlement at customer level by maintaining company loss through
insurance company.

3.2 SUPPLY CHAIN MANAGEMENT OF PAYTM:

It is the management of flow of goods and services to the customer. Supply


chain management has been defined as the “design, planning, execution, control, and
monitoring of supply chain activities with the objective of creating net value, building
a competitive infrastructure, leveraging worldwide logistics, synchronizing supply
with demand and measuring performance globally.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 22


“Performance Evaluation of ” (With Special Reference to Davangere City)

3.3 WEB TECHONOLOGY OF PAYTM

 SERVER SIDE PROGRAMMING LANGUAGE

Javascript. Server –side scripting is a technique used in web development


which involves employing scripts on a web server which produce a response
customized for each user’s (client’s) request to the website. The alternative is for the
web server itself to deliver a static web page. Scripts can be written in any of a
number of server-side scripting languages that are available (see below). Server-side
scripting where embedded scripts, such as javascript, are run client-side in a web
browser, but both techniques are often used together.

Server-side scripting is often used to provide a customized interface for the


user. These scripts may assemble client characteristics for use in customizing the
response based on those characteristics, the user’s requirements, access rights, etc.
server-side scripting also enables the website owner to hide the source code that
generates the interface, whereas with client-side scripting, the user has access to all
the code received by the client. A down-side to the use of server-side scripting is that
the client needs to make further requests over the network to the server in order to
show new information to the user via the web browser. These requests can slow down
the experience for the user, place more load on the server, and prevent use of the
application when the user is disconnected from the server.

When the server server data in a commonly used manner, for example
according to the HTTP or FTP protocols, users may have their choice of a number of
client programs (most modern web browsers can request and receive data using both
of those protocols). In the case of more specialized applications, programmers may
write their own server client, and communications protocol, that can only be used
with one another.

Programs that run on a user’s local computer without ever sending or


receiving data over a network are not considered clients, and so the operations of such
programs would not be considered client-side operations.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 23


“Performance Evaluation of ” (With Special Reference to Davangere City)

 CLIENT SIDE PROGRAMMING LANGUAGE

Javascript. Typically, a client is a computer application, such as a web


browser, that runs on a user’s local computer, smartphone, or other device, and
connects to a server as necessary. Operations may be performed client-side because
they require access to information or functionality that is available on the client but
not on the server, because the user needs to observe the operations or provide input, or
because the server lacks the processing power to perform the operations in a timely
manner for all of the clints it server. Additionally, if operations can be performed by
the client, without sending data over the network, they may take less time, use less
bandwidth, and incur a lesser security risk.

When the server serves data in a commonly used manner, for example
according to standard protocois such as HTTP or FTP, users may have their choice of
a number of client programs (e.g. most modern web browsers can request and receive
data using both HTTP and FTP). In the case of more specialized applications,
programmers may write their own server, client, and communications protocol which
can only be used with one another.

Programs that run on a user’s local computer without ever sending or


receiving data over a network are not considered clients, and so the operations of such
programs would not be termed client-side operations. In a computer security context,
client-side vulnerabilities or attacks refer to those that occur on the client/user’s
computer system, rather than on the server side, or in between the two. As an
example, if a server contained an encrypted file or message which could only be
decrypted using a key housed on the user’s computer system, a client-side attack
would normally be an attacker’s only opportunity to gain access to the decrypted
contents. For instance, the attacker might cause malware to be installed on the client
system which allowed the attacker to view the user’s screen, record the user’s
keystrokes, steal copies of the user’s encryption keys, etc, alternatively, an attacker
might emloy cross-site scripting vulnerabilities in order to execute malicious code on
the client’s system without needing to install any permanently resident malware.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 24


“Performance Evaluation of ” (With Special Reference to Davangere City)

 MARKUP LANGUAGE

HTML. In computer text processing, a markup language is a system for


annotating a document in a way that is syntactically distinguishable from the text. The
idea and terminology evolved from the “marking up” of paper manuscripts, i.e. the
revision instructions by editors, traditionally written with a red or blue pencil on
authors manuscripts. In digital media this “blue pencil instruction text was replaced
by tags which indicate what the parts of the document are, rather than details of how
they might be shown on some display. This lets authors avoid formatting every
instance of the same kind of thing redundantly (and possibly inconsistently). It also
avoids the specification of fonts and dimensions, which may not apply to many users
(such as those with varying-size displays, impaired vision, screen-reading software,
and so on).

Early markup system typically included typesetting instructions, as Troff, Tex


and latex do while scribe and most modern markup systems name components, and
later processes use those names to apply formatting or other processing, as in XML.

Some markup languages, such as the widely used HTML, have pre-defined
presentation semantics-meaning that their specification prescribes generally how to
present the structured data on particular media. Others, such as XML and its
predecessor SGML, permit but do not impose such prescriptions, and permit users to
define any custom document components they wish.

Hyper Text markup language (HTML), one of the document formats of the
worldwide web, is an application of SGML and XML.other applications such as
DocBook, open e book, JATS and others, are heavily used in the communication of
work between authors, editors, and printers.

 CHARACTER ENCOUDING

UTF-8: UTF-8(8-bit Unicode Transformation format) is a variable-length


character encoding for Unicode, which is backward compatible with ASCIL.
Character encoding is used to represent a repertoire of characters by some kind of
encoding system. Depending on the abstraction level and context, corresponding code
points and the resulting code space may be regarded as bit patterns, octets, natural

A.R.G. Arts and Commerce, P.G. Centre, Davangere 25


“Performance Evaluation of ” (With Special Reference to Davangere City)

numbers, electrical pulses, etc. A character encoding is used in computation, data


storage, and transmission of textual data. “character set”, “character map”, “codeset”
and “code page” are related, but not identical, terms.

Early character codes associated with the optical or electrical telegraph could
only represent a subset of the characters used in written languages, sometimes
restricted to upper case letters, numerals and some punctuation only. The low cost of
digital representation of data in modern computer systems allows more elaborate
character codes (such as Unicode) which represent most of the character used in many
written languages. Character encoding using internationally accepted standards
permits worldwide interchange of text in electronic form.

 EXTERNAL CSS

External cascading style sheet define style rule in a separate CSS file.

This is the most powerful of all the css attachment methods, as it allows a
single style sheet to control the rendering of multiple documents. This results in a
time-savings for other, a savings of space for the web server, and less download time
for the users. In addition, method can be used in both HTML and XML.

An External style sheet is a file containing only css syntax (no document
content or elements) and should carry a MIME type of “text/css.” The style
information is not explicitly tide directly to the document’s elements, so selectors
syntax is used to specify what styles attach to which portions of the document tree.
The full range of css syntax is allowed in this method.

HTML INCLUSION METHOD

In HTM, an external style sheet is specified using the LINK [Index DOT
Html] element within the HEAD element block to specify the URL location of the
external style sheet. URL values may be relative or absolute.

Syntax:

<link REL = “STYLESHEET” TYPE = “text/css” HREF= “[style sheet url]”>

[see complex HTML example using External style sheets]

A.R.G. Arts and Commerce, P.G. Centre, Davangere 26


“Performance Evaluation of ” (With Special Reference to Davangere City)

XML INCLUSION METHOD

A style sheet processing instruction (PI) is including in the prologue of an


XML document including the URL of the external style sheet.

Syntax:

<?XML- stylesheet HREF= “ [style sheet URL]”

Type = “text/css”?>.

 INLINE CSS

Inline cascading style sheet define style rules directly within an (x) HTML
element using the style attribute.

Inline style are css styles that are applied to one element using the style
attribute before closing the opening tag. Inline styling is useful for applying a unique
style to a single HTML element. Inline styles are easy and quick to add.

HOW INLINE CSS WORKS:

Basically, before closing any opening tag of an element you add the following:

Syntax:

<Tag name style= “property: value”>

Where property and value refer to the same terms used in CSS.

When more than one style property has to be applied you just add a semicolon like so:

<Tag name style= “Property1: value1:

Now lets see a real example. Add a line of text in your html document:

<h1> example for Inline CSS </h1>

Now add some CSS styling using the style attribute:

<h1 style = “text- decoration: underline.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 27


“Performance Evaluation of ” (With Special Reference to Davangere City)

Disadvantages of inline CSS:

We cannot use quotations within Inline CSS. If you use quotations the browser
will interpret this as an end of your style value.

These style cannot be reused anywhere else. These style are tough to be edited
because they are not stored in a single place.

What is inline CSS?

 Inline CSS refers to CSS found in an HTML file

 It is found in the head of a document between style tags

 Inlining CSS simply means putting your CSS into your HTML file instead of
an external CSS file.

Why use it ?

Inlined CSS reduces the amount of files the browser has to download prior to
displaying your web page. If you are using an external CSS file, the browsing must
first load your HTML file, then downloading two. When done right it is an important
part of an optimized CSS delivery. Solution.

 SESSION COOKIES

Session cooking are temporary cookies, which are deleted when the user
closes the browser.

Session cookie. Also called a transient cookie, a cookie that is erased when the
user closes the web browser, they typically will store information in the form of a
session identification that does not personally identify the user.

What is a cookie?

A cookie is a small piece of text stored on a user’s computer by their browser.


Common uses for cookies are authentication, storing of site preferences, shopping cart
items, and server session identification.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 28


“Performance Evaluation of ” (With Special Reference to Davangere City)

Each time the user’s web browser interacts with a web server it will pass the
cookie information to the server. Only the cookies stored by the browser that relate to
the domain in the requested URL will be sent to the server. This means that cookies
that relate to www.example. Com will not be sent to www.exampledomain.com.

In essence, a cookie is a great way of linking one page to the next for a user’s
interaction with a web site or web application.

What is a session?

A session can be defined as a server –side storage of information that is


desired to persist throughout the user’s interaction with the web site or web
application.

Instead of strong large and constantly changing information via cookies in the
user’s browser, only a unique identifier is stored on the client side (“called a session
id”). The session id is passed to the web server every time the browser makes an
HTTP request (ie a page link or AJAX request). The web application pairs this
session id with it’s internal database and retrieves the stored variables for use the by
the requested page.

Setting and reading cookies

Using the [cookie-set] method we can set cookies to store information for use
in later pages. The following code shows how easy it is to store a user’s details such
as their name and email address which they may have later pages to per – populate
forms with this information.

Cookie-set ‘user details’=’ john doe / john. Doe @example. Com

-domain=’example.com,

-expires=’1440’

-path=’/’

In this example the cookie named “user details” contains the users name and
email address delimited by a “pipe” character. This can be read and interpreted, then
output in the following code.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 29


“Performance Evaluation of ” (With Special Reference to Davangere City)

Local (user details =

Decode- ur1 (cookie (‘user details’)) split(‘/’))

If (#user details size ){

‘user name =’+# user details get (1)

‘<br />’

‘Email address= ‘ +#user details get (2)

Using sessions

To store information that is not appropriate to store client-side, we use


sessions. Lasso has built in session handling and deals with the setting and retrieval of
the cookie itself. It will automatically set and retrieve the session id, which is the only
thing stored clinet-side.

To set up a new session, we first start the session, then add to it the variables
we would like to store in it. Those variables are stored within lasso’s session database.

How this work:

Lines 2-6: Initialilzing the session. This needs to happen on every page you
wish the session information to be readable and writable. Here we start a session
named ‘my session name’ with an idle expiry of 1440 minutes (1 day)and set to track
via cookie.

Lines 9-14: The “if” conditional here checks to see if the session-result shows
a new session and adds nevaiables to the session if it is new.

Lines 16-19:Each line in this section is checking if a variable has been


defined, and if not then the variable is defined and declared with a default type and
value.

The variables added to the session can now be used just like any other variable
in the page. These variables are are both readable and writiable. This means that when
the value is changed, it will be stored in the session with the new value.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 30


“Performance Evaluation of ” (With Special Reference to Davangere City)

On subsequent pages if the session is initialized, you will be able to continue


reading and modifying these variables.

TROUBLESHOOTING

If you’re having problems with sessions, there are a few things to check.

Check the time on the server and the client pc

If the clock on the server and /or the client pc is incorrect, the session may
expire prematurely. For example if your session idle expiry time is short (ie 15
minutes) and the clocks differ by greater than that amount, the session will expire
before it can be used on the next page.

Ensure the client browser is accepting cookies

Browsers allow users to decide to not allow cookies to be set. If a user has
blocked cookies you will have to use links to persist sessions. See the session
documentation for more information.

 EXTERNAL CSS

External cascading style sheets define style rules in a separate CSS file.

An external style sheet is a file containing only CSS syntax (no document
content or elements) and should carry a MIME type of “text /CS.” The style
information is not explicitly tide directly to the document’s elements, so selector
syntax is used to specify what styles attach to which portions of the document tree.

What is it?

This CSS specification mechanism is the farthest removed of the allowed


methods from the portion of the document tree it controls. This method allows a style
sheet external to the document to be “attached” to the current document.

This is the most powerful of all the CSS attachment methods, as it allows a
single style sheet to control the rendering of multiple documents. This results in a
time- savings for the author, a savings of space for the web server, and less download
time for the user. In addition, this method can be used in both HTML and XML.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 31


“Performance Evaluation of ” (With Special Reference to Davangere City)

An external style sheet is a file containing only CSS syntax (no document
content or elements) and should carry a MIME type of “text/css.” The style
information is not explicitly tied directly to the document’s elements, so selector
syntax is used to specify what styles attach to which portions of the document tree.
The full range of CSS syntax is allowed in this method.

HTML INCLUSION METHOD

In HTML, an external style sheet is specified using the link [index dot HTML]
element within the HEAD element block to specify the URL location of the external
style sheet. URL values may be relative or absolute.

Syntax:

<link REL= “STYLESHEET” TYPE = “text/css” HREF= “[style sheet URL]”>

[see complex HTML example using external style sheets]

XML INCLUSION METHOD

A style sheet processing instruction (pi) is included in the prologue of an XML


document indicating the URL of the external style sheet.

 EMBEDDED CSS

Embedded cascading style sheet define style rules in a separate CSS file.

A linked style sheet is a text file with the extension.css. for example the style
sheet for this course is called tutorial. CSS, and is “linked” to from all the course’s
various web pages. Linked style sheets are more flexible than embedded style sheets
but we shall use an embedded style sheets as our first example.

As the name implies this particular type of style sheet is part of the web page
and its definition appears in the head of the web page using the following tag
elements.

<style type = “text/css “> is the beginning element and

</style > is the end element.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 32


“Performance Evaluation of ” (With Special Reference to Davangere City)

Defining the style rules

Style sheet rules are made up to of the selectors (basically the HTML tags to
which the style will be applied) the declarations (the various properties, e.g. font
selection) and values. A style sheet rule is of the general form:

Selector {property1: value1; property2: value2}

For example, suppose we want a black page with white text then a style sheet
rule would be:

Body is the selector, background and color are properties and black and white
are value, note: the selector (body in this example )is used without the angel brackets
and the property list is separated by semicolons.

 INLINECSS

Inline cascading style sheets define style rules directly within an (x) HTML
element using the style attribute. Inline CSS refers to CSS found in an HTML file. It
is found in the head of a document between style tags. Inlining CSS simply means
putting your CSS into your HTML file instead of an external CSS file. Inline CSS
refers to CSS found in an HTML file.it is found in the head of a document between
style tags.Inlining CSS simply means putting your CSS into your HTML file instead
of an external CSS file.

Inlined CSS reduces the amount of files the browser has to download prior to
displaying your web page. If you are using an external CSS file, the browser must
first load your HTML file, then download your CSS file. After you inline your CSS
the browser only has to download your HTML file. Downloading two. When done
right it is an important part of an optimized CSS delivery. Solution.

 SESSION COOKIES

Session cooking are temporary cookies, which are deleted when the user
closes the browser.

A session cookie contains information that is stored in a temporary memory


location and then subsequently deleted after the session is completed or the web

A.R.G. Arts and Commerce, P.G. Centre, Davangere 33


“Performance Evaluation of ” (With Special Reference to Davangere City)

browser after the session is completed or the web browser is closed. This cookie
stores information that the user has inputted and tracks the movements of the user
within websites. A session cookie is also known as transient cookie.

Techopedia explains session cookie: when this cookie is created by an


application, a date is not set, unlike a persistent cookie which will have an expiration
date attached to it. Because a session cookie is temporal, it does not accumulate
information from the user’s PC or the user’s identity. The information it stores is in
the form of a session identification that will not, in any case, relate personally to the
user.

 HTTPONLY COOKIES

Http only cooking are used only in the HTTP protocol and not in client side
scripts, which may increase security.

Well, there is a way to protect cookies from most malicious javascript:


HTTPONLY COOKIES. When you tag a cookie with the HTTPONLY FLAG, it tells
the browser that this particular cookie should only be access the cookie from clint
script is strictly forbidden. Httponly is a flag added to cookies that tell the browser not
to display the cookie throught client-side scripts (document. Cookie and others) when
you set a cookie with the HTTPONLY flag, it information the browser that this
special cookie should only be accessed by the server. secure cookies are a type of
HTTP cookie that have secure attribute set, which limits the scope of the cookie to
“secure” channels

 NON-HTTPONLY COOKIES

Non-Http only cookies are used in the HTTP protocol and also in client side
scripts, which may be a security threat.

If you browser supports HTTPONLY, and you enable it for a cookie, a client-
side script should not be able to read or write to that cookie, but the browser can still
send its value to the server can still send its value to the server. However, some
browsers only prevent client side read access, but do not prevent write access.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 34


“Performance Evaluation of ” (With Special Reference to Davangere City)

 SECURE COOKIES

Secure cooking are used only via an encrypted connections, which may
increase security.

Secure cookies are a type of HTTP COOKIE that have secure attribute set,
which limits the scope of the cookie to “secure” channels when a cookie has the
secure attribute, the user agent will include the cookie in an HTTP request only if the
request is transmitted over a secure channel. Although seemingly useful for protecting
cookies from active network attackers, the secure attribute protects only the cookie’s
confidentiality. An active network attackers, the secure attribute protects only the
cookie’s confidentiality. An active network attacker can overwrite secure cookies
from an insecure channel, disrupting their integrity. This issue is officially referred to
as weak integrity. However, some browsers, including chrome 52 and higher and
firefox 52 and higher, forego this specification in favor of better security and forbid
insecure sites from setting cookies with the secure directive.

Even with, secure, sensitive information should never be stored in cookies, as


they are inherently insecure and this flag can’t offer real protection. Secure attribute is
not the only protection mechanism for cookies, there are also HTTPONLY and
SAMESITE attributes. The httponly attribute restricts the cookie from being accessed
by, for instance, javascript, while the samesite attribute only allows the cookie to be
sent to the application if the request originated from the same domain.

 HTTP STIRCT TRANSPORT SECURTIY

HTTP strict Transport security (HSTS) define a mechanism enabling web sites
to declare themselves.

HTTP STRICT TRANSPORT SECURITY is a web server directive that


informs user agents and web browsers how to handle its connection through a
response header sent at the very beginning and back to the browser. This sets the
strict- transport- security policy field parameter. imagine, if you will, that you are at
your favorite restaurant or just getting back to your hotel room from that conference
and you want to use their free wi-fi. Have you ever noticed that their wi-fi passwords
are printed on paper and never changed?

A.R.G. Arts and Commerce, P.G. Centre, Davangere 35


“Performance Evaluation of ” (With Special Reference to Davangere City)

A malevolent hacker has booked a room at this same hotel. They are
eavesdropping on all of the connections going over this insecure, wireless network.
Within the hacker’s sheaf of evil-doings is something called a ‘ packet sniffer’. A
packet sniffer is network utility that analyses and may inject tasks into the data-stream
travelling over the targeted network.

This hacker could capture your network traffic over HTTP for any website that
relies on 301 redirects alone for switching from HTTP to HTTPS. This method
presents a window of opportunity for the hacker to strip down your SSL encryption
and steal valuable data or even worse, present a fake login portal page. This is why
your website must employ HTTP strict transport security over just HTTPS. Obtaining
an SSL certificate will never be enough.

 SSL CERTIFICATE AUTHORITY

Geo Trust is a SSL certificate authority owned by Symantec, this includes SSL
certificates issues by the certification branch of Equifax, which was acquired by geo
Trust.

The digital certificate certifies the ownership of a public key by the named
subject of the certificate. This allows others to rely upon signatures or assertions made
by the private key that corresponds to the public key that is certified. in this model of
trust relationships, a CA is a trusted third party that is trusted by both the subject of
the certificate and the party relying upon the certificate.

In the context of a website, when we use the term digital certificate we often
refer to SSL certificates. The CA is the authority responsible for issuing SSL
certificates publicly trusted by web browsers.Any one can issue SSL certificates, but
those certificates would not be trusted automatically by web browsers. Certificates
such as these are called self-signed. The CA has the responsibility to validate the
entity behind an SSL certificate request and, upon successful validation, the ability to
issue publicly trusted SSL certificates that will be accepted by web browsers.
Essentially, the browser vendors rely on CAs to validate the entity behind a web site.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 36


“Performance Evaluation of ” (With Special Reference to Davangere City)

 WEB SERVER

NGINX – Nginx (pronounced as “engine x”) is a lightweight open source web


server.

NODEJS- Node.js is a server-side java script environment for writing network


programs such as web servers.

A web server is a program that uses HTTP (Hypertext transfer protocol) to


server the files that from web pages to users, in response to their requests, which are
forwarded by their computers ‘HTTP clients. Dedicated computers and appliances
may be referred to as web servers as well. The process is an example of the client/
server model. All computers that host web sites must have web server programs.
Leading web servers include apache microsoft’s internet information sever and nginx
from NGNIX. Other web servers include novell’snetware server, google web server
and IBM’s family of domino servers.

 TOP LEVEL DOMAIN

COM- Commercial entities.

A top-level domain is one of the domains at the highest level in the


hierarchical domain name system of the internet. The top-level domain names are
installed in the root zone of the name space. For all domains in lower levels, it is the
last part of the domain name, that is the last label of a fully qualified domain name.
for example.com, the top-level domain is com. Responsibility for management of
most top-level domains is delegated to specific organizations by the internet
corporation for assigned names and numbers which operates the internet assigned
numbers authority and is in change of maintaining the DNS root zone.

Originally, the top-level domain space was organized into three main groups:
countries, categories, and multiorganization. An additional temporary group consisted
of only the initial DNS domain, arpa and was intended for transitional purposes
toward the stabilization of the domain name system.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 37


“Performance Evaluation of ” (With Special Reference to Davangere City)

3.4 WEB BASED TOOLS OF PAYTM

The basic requirement for a merchant to have a web presence or have an electronic
commerce site, is

 A connection to the Internet, and

 A web server in the company network.

 A CONNECTION TO THE INTERNET:

A computer or other device accessing the internet would either be connected


directly to a modem that communicates with an internet service provider or the
modem’s internet connection would be shared via a local area network which
provides access in a limited area such as a home, school, computer, laboratory, using
the internet, computers connect to each other. They transmit data and communicate
with each other, primarily using the TCP/IP (Transmission control protocol/internet
protocol). Think of TCP/IP as a book of rules, a step-by-step guide that each computer
uses to know how to talk to another computer. This book of rules dictates what each
computer must do to transmit data, when to transmit data, how to transmit that data. It
also states how to receive data in the same manner. If the rules are not followed, the
computer will not be able to connect to another computer, nor send and receive data
between other computers.

To connect to the internet and other computers on a network, a computer must


have a NIC (network interface card) installed. A network cable plugged into a cable
modem, DSL modem, router, or switch can allow a computer to the access the
internet and connect to other computers.

 A WEB SERVER IN THE COMPANY NETWORK:

A web server is a program that uses HTTP (Hypertext transfer protocol) to


serve the files that form web pages to users, in response to their requests, which are
forwarded by their computers HTTP clients the process is an example of the
client/server model.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 38


“Performance Evaluation of ” (With Special Reference to Davangere City)

A web server is a system that delivers content or services to end users over the
internet. A web server consists of a physical server, server operating system (os) and
software used to facilitate HTTP communication. A web server is also known as an
internet server.

The most simple definition is that a web server runs a website by returning
HTML files over an HTTP connection. This definition may have been true in the
early days of the internet, but the line has blurred between websites, web applications
and web services, etc. for example, a server that device an XML document to another
device can be a web server. A better definition might be that a web server is any
internet server that responds to HTTP requests to deliver content and services.

Depending on context, the term can refer to the hardware or web server
software on the server. For example, saying that you have” 10 web servers at the web
farm” is just as a accurate as, “The iis web server is on the machine that has 32 GB of
RMA.”

The two main ingredients in a web server are its hardware and software.

3.4.1 WEB SERVER HARDWARE:

A merchant should think carefully when making a decision on the web server
computer. The decision depends on factors such as

Operating system of the network. UNIX operating system is found to be more


rugged than that of windows, but UNIX is more complex to manage than
windows.

Hardware requirement of the web server software. A PC with a midrange CPU,


small hard drive, and 32 megabytes of memory will perform poorly when
compared with a high-end workstation or a powerful UNIX- based computer.

Expected traffic or the number of transaction per unit time, Running a large
enterprise class application server (such as an ERP system) on a personal
computer is not feasible.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 39


“Performance Evaluation of ” (With Special Reference to Davangere City)

Other software running on the same computer. For example, running a web
server and a database server can significantly slow down the performance of a
computer.

Scalability of the hardware – meaning upgrade of components such memory, disk


space, disk mirroring, or even connect additional web servers if necessary.

3.4.2 BENCHMARKING WEB SERVER HARDWARE AND SOFTWARE:

A benchmark test considers several factors such as:

The computer hardware.

The web server software.

Network connection: A web server on a T3 connection can deliver web page to


clients much faster than it could on a TI connection.

Throughput: it is the number of TIP requests that a particular hardware and


software combination can process in a unit of time.

Response Time: it is the amount of time that a server requires to process one
request.

Type of web page: A server that delivers mostly static web pages will perform
better than the same server that delivers dynamic web pages. A dynamic page is a
web page whose content is shaped by a program in response to user request (such
as a database query), versus a static page, which is just a plain HTML page.

3.4.3 WEB SERVER SOFTWARE FEATURE SETS

All web server software feature sets

 Core capabilities

 Site management

 Application construction, and

 Electronic commerce

A.R.G. Arts and Commerce, P.G. Centre, Davangere 40


“Performance Evaluation of ” (With Special Reference to Davangere City)

CORE CAPABLITIES:

 IP- Sharing or virtual

 Logical file

 Security

 FTP

 Site Analysis

 Searching

SITE MANAGEMENT

 A web server provides tools to manage multiple web sites, file security, virtual
file, and log file analysis.

 Administration of a web server can be performed from a remote computer in


the network.

APPLICATION DEVELOPMET

Application development includes web editors and extensions to produce web


pages- either static or dynamic. These include HTML editors such as FrontPage for
static web pages. For dynamic web pages, there are protocols such as common gate
way interface (CGI) and application programming interface (APL) that are used by
programs such as java and C++to develop dynamic web pages.

Application development is the process of creating a computer programs or a


set of programs to perform the different tasks that a business requires. From
calculating monthly expenses to scheduling sales reports, applications help businesses
automate processes and increase efficiency. Every app building process follows the
same steps: gathering requirements, designing prototypes, testing, implementation,
and integration.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 41


“Performance Evaluation of ” (With Special Reference to Davangere City)

Custom application development:

When off–the-shelf software doesn’t meet specific requirements, the best


option is to go custom. Hire developers to build apps for you, or build on your own
with do-it-yourself tools.

Rapid application development:

The rapid application development model follows an incremental approach.


You can simultaneously develop the individual modules of the application to enable
faster delivery of the final product.

Low-code application development:

Low-code platforms include intuitive visual interfaces that make it easy to


build and launch apps, even for non-programmers. You can drag and drop snippets of
code and modify them, based on business logic, to design automated workflows.

Mobile application development:

Mobile application development is the process of creating apps that run on any
mobile platform: Android and ios. With everything you need right at your fingertips,
you can track inventory or make instant updates from your phone.

Database application development:

Database applications are designed to collect, organize, and manage


information efficiently. They’re used to sort data by criteria, perform calculations,
create reports, and share information with team members.

Enterprise application development:

Enterprise applications are a type of software development to cater to large-


scale organizations. They support enterprise-grade features, like massive data storage
and automation of complex business processes.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 42


“Performance Evaluation of ” (With Special Reference to Davangere City)

What is application development.

How many times have you heard it? There’s an app for that. Helpful
suggestion offered by a friend who has just heard you complain about some mundane
task you’d rather not have to spend your precious free time on in order to get it off of
your to-do list.

An app is the common slang term for a software application or software


program that can be run on a computer device to accomplish a task easier and more
efficiently than we could do it ourselves as mere mortals. If you have a smartphone
or computer tablet, you probably have used some game apps, news apps or even map
apps to help you find the local coffee shop. Application development is the name of
the profession that employs people who design, develop, and deploy these computer
applications.

Application developers have a computer programming background. As you


might imagine, the reason it’s called application development instead of just computer
programming is because there are many more steps involved before and after the
actual writing of the computer program. All of those steps are very typical and are
collectively called a systems development lifecycle.

System development lifecycle:

The steps include in a system lifecycle for developing a computer application are:

Planning: Identifying a need, consideration of solution options, and possibly


considering the features of competing application.

Analysis: Documenting the functional requirement for the app and anticipating
potential problems that may be encountered.

Design: Defining how the app will work and what features and components it will
have.

Construction: This is where the actual programming occurs using the requirements
and design as a guidline.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 43


“Performance Evaluation of ” (With Special Reference to Davangere City)

Testing: Try out the app looking for errors and confirming that documented
requirements are met.

Implementation: making the app looking for errors and confirming that documented
requirements are met.

Support: monitor users experience. Sometimes recommendations for revisions arise.


If those recommendations are pursued, they will go through the lifecycle also.

Although the steps that should be taken in application design are always the
same, the methods used to execute them can be different. The three most common
types of application development methodologies are: waterfall development, agile
development and rapid application development.

ELECTRONIC COMMERCE:

Some web servers provide advanced services that support online selling and
buying (such as shopping cart and catalog services). An electronic commerce software
can provide templates and other tools to quickly develop an E-commerce site. This
might include templates for product browsing shopping carts, and credit card
processing.

While most people think of ecommerce as business to consumer (B2C), there


are many other types of ecommerce. These include online auction sites, internet
banking, online ticketing and reservations, internet banking, online ticketing and
reservations, and business to business (B2B) transactions. Recently, the growth of
ecommerce has expanded to sales using mobile devices, which is commonly known
as ‘M-commerce’ and is simply a subset ecommerce.

Why has ecommerce seen explosive growth over the past decade? As the
internet becomes ingrained in our daily lives, acceptance of ecommerce continues to
grow, and businesses are taking advantage of this. In the early 2000’s many people
were skeptical about handing over their card details to an online retailer. Whereas,
ecommerce transactions are now second nature. SSL certificates, encryption and
reliable external payment systems such as paypal, world pay, and skrill have helped
improve people’s confidence in e commerce.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 44


“Performance Evaluation of ” (With Special Reference to Davangere City)

CHAPTER - 4

DATA ANALYSIS AND INTERPRETATION

ANALYSIS AND INTERPRETATION:

The process by which sense and meaning are made of the data gathered in
qualitative research, and by which the emergent knowledge is applied to clients’
problems. This data often takes the form of records of group discussions and
interviews, but is not limited to this. Through processes of revisiting and immersion in
the data, and through complex activities of structuring, re-framing or otherwise
exploring it, the researcher looks for patterns and insights relevant to the research
issues and these to address the client’s brief.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 45


“Performance Evaluation of ” (With Special Reference to Davangere City)

1.Classification of the respondents on the basis of age group


TableNo-4.1

Sl
Age No of respondent Percentage
No
1 18 years 2 4%
2 18-30 years 32 64%
3 30-40 years 15 30%
4 above 40 years 1 2%
Total 50 100%
Source: Field Survey
Analysis:
From the above table, It is clear that out of 50 Respondents,4% of the
Respondents below age of 18 years, 64% of the Respondents are in between the age
of 18-30 years,30% of the Respondents are in between the age of 30-40 years and 2%
of the Respondents are above the age of 40 years.
1.Classification of the respondents on the basis of age group
Graph No-4.1

Interpretation:
From the above analysis I conclude that majority of respondents are belongs to
age group 18-30years.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 46


“Performance Evaluation of ” (With Special Reference to Davangere City)

2. Classification of the respondents on the basis of gender.


Table No-4.2
Sl No Gender No of Respondents Percentage
1 Male 30 60%
2 Female 20 40%
Total 50 100%
Source: Field Survey
Analysis:
From the above table, we came to know that, among the 50 Respondents
surveyed, 60% are male and 40% are Female Respondents.

2.Classification of the respondents on the basis of Gender


Graph No-4.2

Interpretation:
From the above analysis I conclude that majority of respondents are male.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 47


“Performance Evaluation of ” (With Special Reference to Davangere City)

3. Classification of the respondents on the basis of educational Level.


Table No-4.3

Sl no Education Level No of Respondents Percentage


1 PUC 3 6%
2 Degree 9 18%
3 Postgraduate 31 62%
4 others 7 14%
total 50 100%
Source: Field Survey
Analysis:
From the above table, It is clear that out of 50 Respondents, 6% of the
Respondents are PUC, 18% of the Respondents are Degree, 62%of the Respondents
are postgraduate, 14% of the Respondents are others.

3. Classification of the respondents on the basis of educational Level.


Graph No-4.3

Interpretation:
From the above analysis I conclude that majority of respondent are post
graduate.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 48


“Performance Evaluation of ” (With Special Reference to Davangere City)

4. classification of the respondents on the basis of occupation.


Table No-4.4

No of
Sl no Occupation Percentage
Respondents
1 Student 25 50%
2 Employee 11 22%
3 Business men 12 24%
4 others 2 4%
Total 50 100%
Source: Field Survey

Analysis:
From the above Table, It is clear that out of 50 Respondents, 50% of the
respondents belong to student, 22% of the respondents belong to employee, 24% of
the respondents belong to businessman and 4% of the respondents belong to other
occupation.

4. Classification of the respondents on the basis of occupation.


Graph No-4.4

Interpretation:
From the above analysis I conclude that majority of respondents are students.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 49


“Performance Evaluation of ” (With Special Reference to Davangere City)

5. Classification of the respondents on the basis of monthly income.


Table No- 5.5

No of
Sl No Monthly Income Percentage
Respondents
1 5000-10000 1 2%
2 10000-25000 5 10%
3 25000-50000 2 4%
4 Above 50000 42 84%
Total 50 100%
Source: Field Survey
Analysis:
From the above Table It is clear that, out of 50 Respondents, 2% of the
respondents have monthly income of 5,000-10,000, 10% of the respondents have
monthly income of 10,000-25,000, 4% of the respondents have monthly income of
25,000-50,000 and 4% of the respondents have to above 50,000.
5. Classification of the respondents on the basis of Monthly Income.
Graph No-4.5

84%
90%
80%
70%
5000-10000
60%
50% 10000-25000
40% 25000-50000
30% Above 50000
20% 10%
2% 4%
10%
0%
5000-10000 10000-25000 25000-50000 Above 50000

Interpretation:
From the above analysis I conclude that majority of respondents have monthly
income of above 50,000.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 50


“Performance Evaluation of ” (With Special Reference to Davangere City)

6. Classification of the respondents on the basis of aware of paytm.


Table No-4.6

Sl No Aware of paytm No of Respondents Percentage


1 Yes 50 100%
2 No 0 0
Total 50 100%
Source: Field Survey

Analysis:
From the above Table, It is clear that, out of 50 Respondents, 100% of the
Respondents are aware of Paytm.

6. Classification of the respondents on the basis of the aware of paytm.


Graph No-4.6

100%
100%

80%

60% Yes
No
40%

20%
0
0%
Yes No

Interpretation:
From the above analysis I conclude that majority of respondents are aware of
paytm.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 51


“Performance Evaluation of ” (With Special Reference to Davangere City)

7. Classification of the respondents on the basis of source of Information about


paytm.
Table No-4.7

Sl No Sources No of Respondents Percentage


1 Social Media 8 16%
2 Friends 38 76%
3 Magazine 1 2%
4 Television 3 6%
Total 50 100%
Source: Field Survey

Analysis:
From the above Table, It is clear that, out of 50 Respoundents,16% of the
respondents get information from social media, 76% of the respondents get
information from friends, 2% of the respondents get information from magazine, 6%
of the respondents get information from television.

7. Classification of the respondents on the basis of Source of Information


about paytm.
Graph No- 4.7

Interpretation:
From the above analysis I conclude that majority of respondents get
information from Friends

A.R.G. Arts and Commerce, P.G. Centre, Davangere 52


“Performance Evaluation of ” (With Special Reference to Davangere City)

8. Classification of the respondents on the basis of prefer paytm modes of


paytment.

Table No- 4.8

No of
Sl No Prefer Paytm Percentage
Respondent
1 Time Saving 30 60%
2 Ease of use 10 20%
3 Security 10 20%
Total 50 100%
Source: Field Survey
Analysis:
From the above table, It is clear that, out of 50 Respondents, 60% of the
respondents Prefer Paytm Payment because for Time Savings, 20% of the
respondents Prefer Paytm Payment use Ease of use, 20% of the respondents Prefer
Paytm Payment use security.

8. Classification of the respondents on the basis of prefer paytm modes of


payment.
Graph No- 4.8

Interpretation:
From the above analysis I conclude that majority of respondents Prefer paytm
are Time saving.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 53


“Performance Evaluation of ” (With Special Reference to Davangere City)

9. Classification of the respondents on the basis of use paytm.


Table No-4.9

No of
Sl No Use of Paytm Percentage
Respondents
1 Daily 2 4%
2 Weekly 10 20%
3 Monthly 38 76%
Total 50 100%
Source: Field Survey

Analysis :
From the above Table, It is clear that, out of 50 Respondents,4% of the
respondents paytm use daily, 20% of the respondents Paytm use weekly, 76% of the
respondents paytm use monthly.

9. Classification of the respondents on the basis of use paytm.


Graph No- 4.9

Interpretation:

From the above analysis I conclude that majority of respondents use of Paytm
monthly.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 54


“Performance Evaluation of ” (With Special Reference to Davangere City)

10. Classification of the respondents on the basis of device payment while paytm.
Table No- 4.10
No of
Sl no Device Payment Percentag
Respondents
1 Smart phone 30 60%
2 Computer 15 30%
3 Both 5 10%
Total 50 100%
Source: Field Survey

Analysis:
From the above table, It is clear that, out of 50 Respondents, 60% of the
respondents use Smart Phone, 30% of the respondents use Computer, 10% of the
respondents use both from payment.

10. Classification of the respondents on the basis of device payment while paytm.
Graph No- 4.10

Interpretation:

From the above analysis I conclude that majority of respondents use Smart
Phone from payment.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 55


“Performance Evaluation of ” (With Special Reference to Davangere City)

11. Classification of the respondents on the basis of paytm from financial transactions.
Table No-4.11

No of
Sl No Financial Transactions Percentage
Respondents
1 Yes 48 96%
2 No 2 4%
Total 50 100%
Source: Field Survey
Analysis:
From the above Table, It is clear that, out of 50 Respondents,96% of the
respondents use paytm of Financial Transactions and 4% of the respondents are not
using paytm Financial Transaction.

11. Classification of the respondents on the basis of paytm from financial


transactions.

Graph No-4.11

Interpretation:
From the above analysis I conclude that majority of respondents are use paytm
for Financial Transactions.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 56


“Performance Evaluation of ” (With Special Reference to Davangere City)

12. Classification of the respondents on the basis of purpose of using paytm.


Table No- 4.12
Sl No Purpose of using No of Respondents Percentage
1 Money Transfer 23 46%
2 Recharge 20 40%
Utility and Bill
3 payment 5 10%
4 All of the above 2 4%
Total 50 100%
Source: Field Survey
Analysis:
From the above Table, It is clear that, out of 50 Respondents,46% of the
respondents for using Paytm from Money Transfer, 40% of the respondents using
Paytm for Recharge, 10% of the respondents using for Paytm are utility and
billpayment, 4% of the respondents are using paytm are All of the above.

12. Classification of the respondents on the basis of purpose of using paytm.


Graph No-4.12

Interpretation:
From the above analysis I conclude that majority of respondents are using
paytm for Money Transfer.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 57


“Performance Evaluation of ” (With Special Reference to Davangere City)

13. Classification of the respondents on the basis of motivated factors to use


paytm.
Table No- 4.13
No of
Sl No Use of Paytm Percentage
Respondents
1 Available discount 10 20%
2 Premium offers 5 10%
3 Cash back 35 70%
Total 50 100%
Source: Field Survey
Analysis:
From the above Table, It is clear that, out of 50 Respondents,20% of the
respondents use paytm becasue Available Discount, 10% of the respondents use
paytm Premium Offers, 70% of the respondents use paytm Cash Back.

13. Classification of the respondents on the basis of motivated factors to use


paytm

Graph No-4.13

Interpretation:
From the above analysis I conclude that majority of respondents using paytm
from Cash Back.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 58


“Performance Evaluation of ” (With Special Reference to Davangere City)

14. Classification of the respondents on the basis of money transaction in paytm


till now.

Table No-4.14

Sl No Money Transaction of Paytm No of Respondents Percentage


1 Less Then5000 32 64%
2 5000-10000 15 30%
3 more then 10000 3 6%
Total 50 100%
Source: Field Survey
Analysis:
From the above Table, It is clear that, out of 50 Respondents, 64% of the
respondents Money Transaction of Paytm are Less than 5000, 30% of the respondents
Money Transaction of Paytm are 5000-1000, 6% of the respondents Money
Transaction of Paytm are more thane.

14. Classification of the respondents on the basis of money transaction in paytm


till now..
Graph No-4.14

Interpretation:
From the above analysis I conclude that majority of respondents Money
Transaction of paytm are less than 5000.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 59


“Performance Evaluation of ” (With Special Reference to Davangere City)

15. classification of the respondents on the basis satisfied by paytm service.


Table No-4.15
Sl No Paytm Service No of Respondents Percentage
1 Very Satisfied 23 46%
2 Satisfied 25 50%
3 Neutral 2 4%
4 Un satisfied 0 0%
Total 50 100%
Source: Field Survey
Analysis:
From the above Table, It is clear that, out of 50 Respondents, 46% of the
respondents said that Paytm Service are very satisfied, 50% of the respondents said
that Paytm Service are satisfied, 4% of the respondents said that Paytm Service are
neutral, 0% of the respondents said that Paytm Service are unsatisfied.

15. classification of the respondents on the basis satisfied by paytm


service.
Graph No-4.15

Interpretation:
From the above analysis I conclude that majority of respondents have
satisfied with paytm.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 60


“Performance Evaluation of ” (With Special Reference to Davangere City)

16. Classification of the respondents on the basis of obstacles face while using
paytm.
Table No-4.16
No of
Sl No Obstacles you face paytm Percentage
Respondents
1 Security of mobile Payment 20 40%
2 Too Time consumption to set up 22 44%
3 Involves danger of losing money 5 10%
Cannot be used for International
3 3 6%
Transaction
Total 50 100%
Source: Field Survey
Analysis:
From the above table, It is clear that, out of 50 respondents, 40% of the
respondents facing security problems , , 44% of the respondents facing Time problem,
10% of the respondent opinion that Paytm Involves danger of losing money, 6% of
the respondents opinion that Paytm Cannot be used for international transaction.
16. Classification of the respondents on the basis of obstacles face while using
paytm.

Graph No- 4.16

Interpretation:
From the above analysis I conclude that majority of respondents obstacles face
the time problem.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 61


“Performance Evaluation of ” (With Special Reference to Davangere City)

17. Classification of the respondent on the basis of continue using paytm.


Table No-4.17

Continue Using No of
Sl No Percentage
Paytm Respondents
1 Very likely 27 54%
2 likely 22 44%
3 Natural 1 2%
4 unlikely 0 0%
Total 50 100%
Source: Field Survey
Analysis:
From the above Table, it is clear that, out of 50 respondents, 54% of the
respondents very likely to Continue using Paytm, 44% of the respondents Continue
using Paytm are likely, 2% of the respondents Continue using Paytm are neutral, 0%
of the respondents Continue using Paytm are unlikely.
17. Classification of the respondent on the basis of continue using paytm.
Graph No- 4.17

Interpretation:
From the above analysis I conclude that majority of respondents Continue
using Paytm are Very likely.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 62


“Performance Evaluation of ” (With Special Reference to Davangere City)

18. Classification of the respondents on the basis of transactions secured.


Table No-4.18
No of
Sl No Transactions secured Percentage
Respondents
1 Strongly agree 48 96%
2 Strongly disagree 2 4%
Total 50 100%
Source: Field Survey
Analysis:
From the above Table, It is clear that, out of 50 Respondents, 96% of the
respondents agree with Transactions secured paytm, 4% of the respondent
Transactions secured Paytm are Strongly disagree.

18. Classification of the respondents on the basis of transactions secured.


Graph No-4.18

Interpretation:
From the above analysis I conclude that majority of respondents
Transactions secured Paytm are Strongly agree.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 63


“Performance Evaluation of ” (With Special Reference to Davangere City)

CHAPTER – 5

FINDINGS, SUGGESTION AND CONCLUSION

5.1 FINDINGS

Out of 50 Respondents majority of the Respondents belongs to the age group


between 18 to 30 Years (66%).

Most of them are male Respondents (60%).

Out of 50 Respondents (62%), most of Respondents got pass graduation


education qualification and only 6% of Respondents got pass PUC education.

Most of the Respondents (50%) are students out of 50 Respondents.

Most of the Respondents (84%) has monthly income above Rs. 50,000 and
only 2% of Respondents have monthly income Rs.5000-10000.

Out of 50 Respondents, (100%) of the Respondents have aware about Paytm.

Most of the Respondents, (76%) get information from Friends out of 50


Respondents.

Most of the Respondents, (60%) are Time Savings out of 50 Respondents.

Most of the Respondents, (76%) are monthly use paytm out of 50


Respondents.

Most of the Respondents, (60%) are use Smartphone from Payment out of 50
Respondents.

Out of 50 Respondents, (96%) of the Respondents are use paytm for Financial
Transactions.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 64


“Performance Evaluation of ” (With Special Reference to Davangere City)

Out of 50 Respondents, (46%) of the Respondents are using paytm for money
Transfer.

Out of 50 Respondents, (70%) of the Respondents using paytm for cashback.

Most of the Respondents, (64%) are money transaction of paytm less then
5000 out of 50 Respondents.

Majority of the Respondents are Paytm Service is Very Satisfied, out of 50


Respondents.

Out of 50 Respondents, (44%) of the respondents obstacles face the time


problem.

Majority of the Respondents are Continue Using Paytm is Very likely, out of
50 Respondents.

Majority of the Respondents are Transactions secured, to the paytm strongly


agree, out of 50 Respondents.

5.2 SUGGESTIONS

Company should provide information to paytm about safe mode of payment.

Company should provide the complementary as sample that will increase


customer satisfaction level and Good Images.

From the Researcher suggested that the Respondents are satisfied by paytm
service.

But level of satisfaction is low in the following areas shopping, ticket booking,
transaction speed,

Service charges, mini statement and minimum of Rs 2000 per day.

The Researcher would like to request the Paytm to probe in to the suggestions
mentioned and take actions, if necessary for the benefit of paytm services.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 65


“Performance Evaluation of ” (With Special Reference to Davangere City)

Following implication should be followed

 Premium offers.

 More than money Transaction.

 Focus on customer Satisfaction.

5.3 CONCLUSION

Paytm saves customer’s time on going to separate website for


separate payments.

Most importantly it’s very easy to use. in a nutshell, it is one useful


app that can really

Come in handy for customers and is definitely worth a try. Paytm


for android is available for free on google play store.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 66


“Performance Evaluation of ” (With Special Reference to Davangere City)

QUESTIONNAIRE
Dear Sir/Madam,

I am Chethana.L.P. studying in First year M com. In A R G COLLEGE OF


ARTS AND COMMERCE P G CENTRE, Davangere. As a part of academic
program I am pursuing a project work on the topic entitled “PERFORMANCE
EVALUATION OF PAYTM” [with special reference to Davangere city]. I
request you to spare few minutes to answer the following questions.

1. Name:

2. Age:
A.18 years ( ) B.18-30years ( )
C.30-40years ( ) D. Above 40years ( )

3. Gender:

A. Male ( ) B. Female ( )

4. Qualification:

A. P U C ( ) B. Degree ( )

C. Post graduate ( )

D. Engineering ( ) E. Others ( )

5. Occupation:

A. Student ( ) B. Employ ( ) C. Business men ( ) D. Others ( )

6. Monthly Income:

A.5000-10000 ( ) B. 10000-25000 ( )

C. 25000-5000 ( ) D. Above 50000 ( )

7. Are you aware about paytm?

A. yes ( ) B. No ( )

8. Where did you get information about paytm?

A. Social media ( ) B. Friends ( )

C. Magazine ( ) D. Television ( )

A.R.G. Arts and Commerce, P.G. Centre, Davangere 67


“Performance Evaluation of ” (With Special Reference to Davangere City)

9. Why do you prefer paytm over other modes of payment?

A. Time Saving ( ) B. Ease of use ( ) C. Security ( )

10. How often do you use paytm?

A. Daily ( ) B. Weekly ( ) C. Monthly ( )

11. Which device do you use for making the payment while paytm?

A. Smart phone ( ) B. Computer ( ) C. Both ( )

12. Do you use paytm for financial transactions.?

A. Yes ( ) B. No ( )

13. What your purpose of using paytm.?

A. Money Transfer ( )

B. Recharge ( )

C. Utility and Bill payment ( )

D. All of the above ( )

14. What do you keep in mind when you use paytm?

A. Available discount ( )

B. Premium offers ( )

C. Cash back ( )

15. How much money have you transaction in paytm till now?

A. Less than 5000 ( ) B. 5000-10000 ( ) C. More than 10000 ( )

16. How do you rate the paytm service that you have used?

A. Very satisfied ( ) B. Satisfied ( )

C. Neutral ( ) D. Unsatisfied ( )

17. What are the obstacles you face while using paytm?

A. Security of mobile Payment ( )

B. Too Time consumption to set up ( )

C. Involves danger of losing money ( )

D. Cannot be used for International Transaction ( )

A.R.G. Arts and Commerce, P.G. Centre, Davangere 68


“Performance Evaluation of ” (With Special Reference to Davangere City)

18. Would you want to continue using paytm?

A. Very likely ( )

B. Likely ( )

C. Neutral ( )

D. Unlikely ( )

E. Very likely ( )

19. Do you believe your transactions are secured?

A. Strongly agree ( ) B. Strongly disagree ( )

20.What is your suggestion?

Place:

Date: Signature:

Thank you.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 69


“Performance Evaluation of ” (With Special Reference to Davangere City)

BIBLIOGRAPHY
JOURNALS:

Bamasak o (2011) exploring consumers acceptance of mobile payments-an

empirical study. International journal of information technology,

communications and convergence.

Majid Taghiloo, mohammad Ali Agheli, and Mohammad Raza Razaeinezhad,

Mobile based secure digital wallet for peer to peer payment system

international journal of ubicomp.

Mitesh Pravinchandra mandaliya, mobile commerce the new era of shopping

international journal of innovations in engineering and technology volume 4

issue 4 december 2014.

Pankaj Yadav adoption of mobile commerce in Himachal Pradesh

international journal of research in commerce IT and Management vol 5 2015.

WEB SITES:

http://Paytm.com >about –us>our –policies.

http://en.m.wikipedia.org> wiki>paytm.

www. Pdf paytm.

Slideshare.net paytm.

A.R.G. Arts and Commerce, P.G. Centre, Davangere 70

You might also like