Important Questions From Cyberspace With Solution: Module 1 Cyber Space

Download as pdf or txt
Download as pdf or txt
You are on page 1of 73

Important Questions from Cyberspace with solution

Module 1 Cyber Space


1) Introduction to Cyber space?
Ans: About Cyberspace: -
• The term cyberspace was initially introduced by William Gibson in his 1984
book, “Necromancer”
• Since cyberspace is a virtual space, it has no boundaries, mass, or gravity.
It just interconnects computers.
• Cyberspace refers to the virtual computer world, and more specifically, is
an electronic medium used to form a global computer network to facilitate
online communication.
• It is a large computer network made up of many worldwide computer
networks that employ TCP/IP protocol to aid in communication and data
exchange activities.
• Cyberspace's core feature is an interactive and virtual environment for a
broad range of participants.
• Cyberspace allows users to share information, interact, swap ideas, play
games, engage in discussions or social forums, conduct business and create
(intuitive) spontaneous media, among many other activities.

2) What is TCP and IP? What is Protocol? (One)


Ans: TCP
• TCP stands for "Transmission Control Protocol". It provides end to end
transmission of data, i.e., from source to destination.
• It is a very complex protocol as it supports recovery of lost packets.
IP:
• IP- In order to communicate, we need our data to be encapsulated as Internet
Protocol (IP) packets.
• IP packets travel across number of hosts in a network through routing
(steering) to reach the destination.

DSCASC 1|Page
Protocol:
A protocol is a set of rules for formatting and processing data. Network Protocol
are like common language for Computer. The computer with they may use
different software and hardware; however, The use of protocols enables them to
communicate with each other regardless.
A protocol is a standard set of rules that allow electronic devices to communicate
with each other

3) Difference between Physical world Vs. Cybwrspace?


Ans:

Physical World Cyberspace

Static, well-defined, and Dynamic, undefined, and


incremental exponential

Is as vast as the human imagination


Has fixed shape or form
and has no fixed shape

In a human brain, there are countless neurons which create a spectrum of life.
Similarly, the cyberspace represents millions of computers creating a
spectrum of digital life. Therefore, cyberspace is a natural extension of the
physical world into an infinite world.

4) History of Internet?
Ans:
The concept of Internet was originated in 1969 and has undergone several
technological & Infrastructural changes
• The origin of Internet devised from the concept of Advanced Research Project
Agency Network (ARPANET).
• ARPANET was developed by United States Department of Defense.

DSCASC 2|Page
• Basic purpose of ARPANET was to provide communication among the
various bodies of government.
• Initially, there were only four nodes, formally called Hosts.
• In 1972, the ARPANET spread over the globe with 23 nodes located at
different countries and thus became known as Internet.
• With the invention of new technologies such as TCP/IP protocols, DNS
(Domain Name System), WWW, browsers, scripting languages etc., Internet
provides a medium to publish and access information over the web.

5) What is an Internet?
Ans:
• The Internet is a global collection of computer networks that are linked
together by devices called routers and use a common set of protocols for data
transmission known as TCP/IP
• The primary purpose of the Internet is to facilitate the sharing of information.
• There are many different tools used on the Internet to make the information
sharing possible. Eg: email, list servers, newsgroups, telnet, gopher, FTP, and
the World Wide Web

6) How does the router work? (Two)


Ans: Routers: They are responsible for receiving, analyzing, and forwarding data
packets among the connected computer networks.
When a data packet arrives, the router inspects the destination address, consults
its routing tables to decide the optimal route and then transfers the packet along
this route.

7) DSN? (Three)
Ans: The Domain Name System (DNS) is the phonebook of the Internet. Humans
access information online through domain names, like nytimes.com or espn.com.
Web browsers interact through Internet Protocol (IP) addresses. DNS translates
domain names to IP addresses so browsers can load Internet resources.
• DNS (Domain Name System) is a network protocol that we use to find the
IP addresses of hostnames

DSCASC 3|Page
• Computers use IP addresses but for us humans, it’s more convenient to use
domain names and hostnames instead of IP addresses.
• If you want, you could visit dayanandasagar.edu by going directly to IP
address 95.85.36.216, but typing in the domain name dayanandasagar.edu it
becomes easier.
• There are 13 root name servers that have information for the generic top
level domains like com, net, org, biz, edu or country specific domains like
uk, nl, de, be, au, ca, in, and many more

8) Protocol Suits?
Ans: The Internet protocol suite, commonly known as TCP/IP, is the set of
communications protocols used in the Internet and similar computer networks.
The current foundational protocols in the suite are the Transmission Control
Protocol (TCP) and the Internet Protocol (IP).
The Internet protocol suite is the conceptual model and set of communications
protocols used in the Internet and similar computer networks.

9) Layers of Internet/OSI?
Ans:

DSCASC 4|Page
10) Advantages & Disadvantages of Internet Community?
Ans: Advantages of internet communities:
• Offers instant information exchange, encourages real life community,
• Used in many activities from home such as, shopping, paying bills and
searching specific information.
• Users of online communities have access to thousands of specific discussions
groups for accessing information in categories such as politics, technical
assistance, social activities, health advices etc.,
• Economically virtual communities can be commercially successful making
money through memberships fees, subscriptions, usage fees and
advertisements.
• Transactions made online are very comfortable and easy provided the seller
has good reputation throughout the community.
Dis-advantages of internet communities:
• Instant communication means fast access, it also means that information is
posted without being reviewed for correctness.
• Difficult to choose reliable sources since there is no editor who reviews each
post and makes sure it is up to certain degree of quality.
• In theory online identities can be kept unidentified which enables people to
use virtual community for fantasy role playing through avatars which is illegal

11) What is WWW? (One)


Ans: WWW (World Wide Web)
• WWW stands for World Wide Web.
• A technical definition of the World Wide Web is − All the resources and users
on the Internet use Hypertext Transfer Protocol (HTTP).
• Web inventor Tim Berners-Lee helped and found, the World Wide Web
Consortium (W3C): (Association)
• The World Wide Web is the universe of network-accessible for information,
a personification of human knowledge.
• In simple terms, The World Wide Web is a way of exchanging information
between computers on the Internet,
• Information is tied together into a vast collection of interactive multimedia
resources.

DSCASC 5|Page
12) WWW Architecture?
Ans:
• URI : Uniform resource Identifier. (URL)
• UNICODE makes it possible to built web pages that can be read and write in
human languages.
• XML (Extensible Markup Language) helps to define common syntax in
semantic web. (Structured web)
• Resource Description Framework (RDF) framework helps in defining core
representation of data for web
• RDF Schema(Diagram/plan) (RDFS) allows more standardized description
of taxonomies and other framework
• Web Ontology Language (OWL)
• SWRL: Semantic Web Rule Language
• RIF : Rules interchange format

13) Cryptography? (One)


Ans: Cryptography is associated with the process of converting ordinary plain
text into unintelligible text and vice-versa. It is a method of storing and
transmitting data in a particular form so that only those for whom it is intended
can read and process it.

14) WWW Operations?


Ans:
1. User enters the URL (say, http://www.dscasc.com) of the web page in the
address bar of web browser.
2. Then browser requests the Domain Name Server for the IP address
corresponding to www.decasc.com.
3. After receiving IP address, browser sends the request for web page to the web
server using HTTP protocol which specifies the way the browser and web
server communicates.
4. Then web server receives request using HTTP protocol and checks its search
for the requested web page. If found it returns it back to the web browser and
close the HTTP connection.

DSCASC 6|Page
5. Now the web browser receives the web page, It interprets it and display the
contents of web page in web browser’s window.

15) HTML tags? (One)


Ans: HTML (Hyper Text Markup Language)
• HTML was created by Tim Berners-Lee in late 1991 but was published
in the year 1995
• HTML 4.01 was a major version of HTML and it was published in late
1999
• HTML 5.01 is the latest one which is the extension of the previous
version was published in 2012
The key advantages of HTML is to
• Create Web site,
• Become a web designer,
• Understand web,
• Learn other languages such as java script, php or angular
Applications of HTML:
• Web pages development
• Internet Navigation
• Responsive UI
• Offline support
• Game development- HTML5

DSCASC 7|Page
HTML Tags
HTML tags are like keywords which defines that how web browser will format
and display the content. With the help of tags, a web browser can distinguish
between an HTML content and a simple content. HTML tags contain three main
parts: opening tag, content and closing tag. But some HTML tags are unclosed
tags.
When a web browser reads an HTML document, browser reads it from top to
bottom and left to right. HTML tags are used to create HTML documents and
render their properties. Each HTML tags have different properties.

16) IP Address and Example?


Ans: An internet protocol (IP) address allows computers to send and receive
information.
• There are four types of IP addresses: public, private, static, and dynamic.
• An IP address allows information to be sent and received by the correct
parties, which means they can also be used to track down a user's physical
location.
• An IP address is a number identifying of a computer or another device on
the Internet.
• IP number. Internet address. Whatever you call it, it's your link to the
world.
• Without IP Addresses, the Internet Would Disappear.
• "It's a network address for your computer so the Internet knows where
to send you emails, data and pictures
Eg: of IP Address is 182.72.191.2

17) URL? (One)


Ans: URL stands for Uniform Resource Locator. A URL is nothing more than
the address of a given unique resource on the Web. In theory, each valid URL
points to a unique resource. Such resources can be an HTML page, a CSS
document, an image, etc. In practice, there are some exceptions, the most
common being a URL pointing to a resource that no longer exists or that has
moved. As the resource represented by the URL and the URL itself are handled

DSCASC 8|Page
by the Web server, it is up to the owner of the web server to carefully manage
that resource and its associated URL.

18) How dose Email works? (One)


Ans: Email – Electronic mail:
• Electronic mail or email is one of the key parts of e-revolution which is
specially designed for communication purpose.
• Once you have an email account, you can start sending electronic messages to
anyone if you have the recipient’s email address.
• The format of an email address is "username, @ symbol, domain name
(yahoo.com, gmail.com, etc.)".

DSCASC 9|Page
19) Web Server?
Ans: a program that uses HTTP for serving files that create web pages for users
in responses to their requests that are sent by http clients of their computer is
called web server
Let’s us take an example: if you are browsing or working with your compute and
your computer is connected to internet
A message pops up from your friend indicating that
https://www.linkedin.com/webnotes /blog is very good to read and is very
informative,
You literally copy that link into your browser and press enter, immediately your
system displays the information on the screen.
Now where is this blog--- it is in any of the servers in the world.
Different types of webservers
lighttpd
Sun Java System Web Server
Jigsaw Server
Apache

20) Web Browser? Functions, Examples? (One)


Ans: Web browsers
• The special software or application program with which you can access web
is called "Web Browser".
• A web search engine or Internet search engine is a software system that is
designed to carry out web search (Internet search),
• World Wide Web in a systematic way to search for a particular information
specified in a textual web search query. (firefox, safari, chrome, Internet
explorer,)

DSCASC 10 | P a g e
Functions:
Functions of browser are as follow:
- Web browser functions are to provide the resources or information to the user
when asked by them.
- It processes the user inputs in the form of URL like http://www.google.com in
the browser and allows the access to that page.
URL is used to identify the resources and fetch them from the server and displays
it to the client.
- It allows the user to interact with the web pages and dynamic content like
surveys, forms, etc.
- It also allows the user to navigate through the complete web page and see its
source code in the HTML format.
- It provides security to the data and the resources that are available on the web
that is by using the secure methods

21) Differentiate between web browser and web server? (Two)


Ans:

WEB BROWSERS WEB SERVERS

• Application program that displays a • Web server is a program or the


World wide web document. computer that provide services to
other programs called client.

• The Web browser requests the • The Web server accepts, approve
server for the web documents and and respond to the request made by
services. the web browser for a web document
or services.

• The web browser act as an interface • The web server is a software or a


between the server and the client and system which maintain the web
displays a web document to the applications, generate response and
client. accept clients data

• Doesn’t exist any processing model • There exist three types of processing
for the web browser. models for web server i.e Process-
based, Thread based and Hybrid.

DSCASC 11 | P a g e
• Web browser stores the cookies for • Web servers provide an area to store
different websites. and organize the pages of the website.

• The web browser is installed on the • The web server can be a remote
client computer. machine placed at the other side of
your network or even on the other
end of the globe, or it is your very
own personal computer at home.

22) What is social media?


Ans: Social media are interactive computer-mediated technologies that facilitate
the creation and sharing of information, ideas, career interests and other forms of
expression via virtual communities and networks.
• Facebook is a fantastic way to reach out to your audience on different levels.
By posting information, photos, videos and stories, the content you share can
Personalize your brand
Drive users to your blog
Generate more traffic directly to your website
Educate and create awareness about your industry
Promote the culture of your organization

23) Advantages and Disadvantages of social media? (One)


Ans:

Advantages Disadvantages

• You reach large audiences • You can receive negative


feedback

• You have a direct connection • You open up the potential for


with your audience embarrassment

• You can create organic • You must spend a lot of time on


content- valid ads. your campaigns

DSCASC 12 | P a g e
• You have access to paid • You have to wait to see results
advertising services

• You build your brand • Cyberbullying

• You drive traffic to your • Hacking of information


website

• You can evaluate your • Security issues


performance- marketing
campaign

• You can join social media • Health issues


networks for free

• You can create viral content • Glamorizes drugs and alcohol

24) Use of Hyper text links in Internet access? (One)


Ans: Hyperlinks between different parts of a document or between different
documents create a branching or network structure that can accommodate direct,
unmediated jumps to pieces of related information. The treelike structure of
hyperlinked information contrasts with the linear structure of a print encyclopedia
or dictionary, for example, whose contents can be physically accessed only by
means of a static, linear sequence of entries in alphabetical order. Hyperlinks are,
in a sense, cross-references that afford instant access to their target pieces of
information. Such links are most effective when used on a large array of
information that is organized into many smaller, related pieces and when the user
requires only a small portion of information at any one time. Hyperlinks have
been used most successfully by Web sites on the Internet.

25) What are ad-click? What is the use? (One)


Ans: Ad Click, Or Simply Clicks is a marketing metric that counts the number of
times users have clicked on a digital advertisement to reach an online property.

DSCASC 13 | P a g e
Use:
If you have a campaign running, you are probably able to access click data on
each specific ad. You may see data like this: Ad 1: 4,686 clicks Ad 2: 1,248 clicks
Ad 3: 984 clicks You can see that Ad 1 is the higher performing ad by clicks. You
may want to evaluate this ad and figure out why audiences tend to click on it
more. You may also want to review Ad 3 and try to determine why it is not
receiving as many clicks

26) Reasons for creating Facebook? (One)


Ans: Facebook, one of the most popular websites on the Internet. started small
and became enormous within just a few years. Mark Zuckerberg is the creator of
Facebook and he created it while attending Harvard University. He had a few
reasons for creating the platform that many people use to share information with
their friends and family.
• College Interaction.
• Share Information
• Business
• Privacy Concerns.

27) EDI and Its layers? (One)


Ans: Electronic Data Interchange.
EDI, which stands for electronic data interchange, is the intercompany
communication of business documents in a standard format. The simple
definition of EDI is a standard electronic format that replaces paper-based
documents such as purchase orders or invoices. By automating paper-based
transactions, organizations can save time and eliminate costly errors caused by
manual processing.
EDI architechture specifies 4 layers:-
1)Semantic (application layer)
2)Standard transaction layer
3)Packing (transport) layer
4)Physical n/w infrastructure layer.

DSCASC 14 | P a g e
1) Semantic layer: - It describes the business application that is driving EDI.
For a procurement application, this translates into requests for quotes, price
quotes, purchase orders, acknowledgements & involves.
The information seen at this layer must be translated from a company specific
from to a more generic form so that it can be send to various trading partners,
who could be using a variety of software applications at this end.
When a trading partner sends a document, the EDI translation software converts
the proprietary format into a standard mutually agreed on by the processing
system. When a company receiver the document, their EDI translation software
automatically changes the standard format into proprietary format of their
document processing software so that company can manipulate the information
in whatever way it chooses to.
2) EDI standards: - It specify business form structure and it also influence the
content at application layer.
3) EDI transport layer: - it corresponds closely with the non-electronic activity
of sending a business form from one company A to company B.
The business form could be sent via regular postal service, registered mail,
certified mail or private carrier such as united pariel service (UPS) or simply
faxed between the companies.
4) Physical layer: - Dial up lines

28) Various classes of IP address? (Two)


Ans: https://www.paessler.com/it-explained/ip-address
Class A
In a Class A network, the first eight bits, or the first dotted decimal, is the network
part of the address, with the remaining part of the address being the host part of
the address. There are 128 possible Class A networks.
Class B
In a Class B network, the first 16 bits are the network part of the address. All
Class B networks have their first bit set to 1 and the second bit set to 0. In dotted
decimal notation, that makes 128.0.0.0 to 191.255.0.0 as Class B networks. There
are 16,384 possible Class B networks.

DSCASC 15 | P a g e
Class C
In a Class C network, the first two bits are set to 1, and the third bit is set to 0.
That makes the first 24 bits of the address the network address and the remainder
as the host address. Class C network addresses range from 192.0.0.0 to
223.255.255.0. There are over 2 million possible Class C networks.
Class D
Class D addresses are used for multicasting applications. Unlike the previous
classes, the Class D is not used for "normal" networking operations. Class D
addresses have their first three bits set to “1” and their fourth bit set to “0”. Class
D addresses are 32-bit network addresses, meaning that all the values within the
range of 224.0.0.0 – 239.255.255.255 are used to uniquely identify multicast
groups. There are no host addresses within the Class D address space, since all
the hosts within a group share the group’s IP address for receiver purposes.
Class E
Class E networks are defined by having the first four network address bits as 1.
That encompasses addresses from 240.0.0.0 to 255.255.255.255. While this class
is reserved, its usage was never defined. As a result, most network
implementations discard these addresses as illegal or undefined. The exception is
255.255.255.255, which is used as a broadcast address.

29) CC and BCC necessary in Email? (One)


Ans: CC is the email shorthand for carbon copy, referring to how CC distributes
copies of your message to each recipient. Your email service provides three text
fields for you to add recipients: To, CC and BCC. You use the To field for
recipients directly involved in what the email discusses or who you expect to
reply to you. CC, however, enables you to share the same information quickly
with other colleagues while signaling that they don't have to take immediate
action. Email addresses listed as CC also receive replies to your original email.
BCC is shorthand for blind carbon copy. It performs the same copying function
as CC but with two key differences: Emails entered as BCC are invisible to other
recipients and don't receive future replies to the thread. BCC is therefore useful
when you want to protect the privacy of recipients who need to receive the same
email. It's also a considerate option for emails with long lists of recipients because
it removes the clutter that would occur with a CC list.

DSCASC 16 | P a g e
30) FTP? (One)
Ans: File Transfer Protocol (FTP) refers to a group of rules that govern how
computers transfer files between systems over the internet. Businesses use FTP
to send files between computers, and websites use FTP for the uploading and
downloading of files from their servers.

31) Search Engine? Components? (One)


Ans: A search engine is a software program that helps people find the information
they are looking for online using keywords or phrases. Search engines are able to
return results quickly—even with millions of websites online—by scanning the
Internet continuously and indexing every page they find.
A search engine is an information retrieval software program that discovers,
crawls, transforms and stores information for retrieval and presentation in
response to user queries.
A search engine normally consists of four components e.g. search interface,
crawler (also known as a spider or both), indexer, and database. The crawler
traverses a document collection, deconstructs document text, and assigns
surrogates for storage in the search engine index. Online search engines store
images, link data and metadata for the document as well.

32) Cyber Scaling? (Two)


Ans:
33) ERP? (One)
Ans: Enterprise resource planning (ERP) is a process used by companies to
manage and integrate the important parts of their businesses. Many ERP software
applications are important to companies because they help them implement
resource planning by integrating all of the processes needed to run their
companies with a single system. An ERP software system can also integrate
planning, purchasing inventory, sales, marketing, finance, human resources, and
more.

32) <OL> , <FONT> , <Img> ? (One)


Ans:

DSCASC 17 | P a g e
34) Electronic Record? (One)
Ans: An electronic record is information recorded by a computer that is produced
or. received in the initiation, conduct or completion of an agency or individual
activity. Examples of electronic records include: e-mail messages, word-
processed documents, electronic spreadsheets, digital images and databases.

Note:
• Cyberspace is a concept describing a widespread, interconnected
digital technology.
• of the global technology environment, it is commonly defined as
• standing for the global network of interdependent information technology
infrastructures,
• telecommunications networks and
• computer processing systems.
• Others consider cyberspace to be just a notional environment in which
communication over computer networks occurs.
• As a social experience,
• individuals can interact,
• exchange ideas,
• share information,
• provide social support,
• conduct business,
• direct actions,
• create artistic media,
• play games,
• engage in political discussion, and so on, using this global network.
• The word became popular in the 1990s when the uses of the Internet,
networking, and digital communication started growing.

DSCASC 18 | P a g e
DNS : DOMAIN NAME SYSTEM
Search engines: Bing, Google, yandex, CC Search, duckduckgo, startpage,
swisscows, Gibiru, one search, wiki and many more (17)

Virtual Computer world:


we can also call it as computer simulated world.
Create personal avatar,
simultaneously and independently explore the virtual world,
participate in its activities and communicate with others.
TCP/IP: Transmission Control Protocol/Internet Protocol
Protocol: A protocol is a standard set of rules that allow electronic devices to
communicate with each other.
• Firstly, cyberspace is a digital medium and not a physical space.
• It is an interactive world and is not a copy of the physical world.
Physical world : the physical world is the only world there is, or the
only world that is real
It talks about bodies that exist,
the only things that exist are material things,
the. world contains nothing but physical entities.
You can see it, touch it, taste it, hear it, or smell it.
The physical world is all of the stuff around you
Exponential : increasing
• The Internet is a global network of billions of computers and other
electronic devices.
• With the Internet, it's possible to access almost any information,
communicate with anyone else in the world, and do much more.
• You can do all of this by connecting a computer to the Internet, which is
also called going online.

DSCASC 19 | P a g e
ARPANET:
ARPANET was created to make it easier for people to access computers,
improve computer equipment,
and to have a more effective communication method for the military.
ARPANET grew from a network of four computer sites to one
with 111 computers belonging to universities, research facilities and the military.
Over a period of time ARPANET started Using satellite links,
ARPANET connected computer systems in the continental United States to
computers in Hawaii and Europe.

Routers: They are responsible for receiving, analysing, and forwarding data
packets among the connected computer networks.
When a data packet arrives, the router inspects the destination address, consults
its routing tables to decide the optimal route and then transfers the packet along
this route.

List servers A list server (mailing list server) is a program that handles
subscription requests for a mailing list and distributes new messages, newsletters,
or other postings from the list's members to the entire list of subscribers as they
occur or are scheduled.

• Protocol suite: The Internet protocol suite is the conceptual model and set of
communications protocols used in the Internet and similar computer networks.
The Open Systems Interconnection (OSI) model describes seven layers that
computer systems use to communicate over a network.
The seven layers are
• Application layer - human interaction layer where applications can access
the network services
• Presentation layer- ensures that data is in the usable format and where the
data gets encrypted

DSCASC 20 | P a g e
• Session layer – maintains connection and is responsible for controlling ports
and sessions
• Transport layer- transmits data through transmission protocols including
TCP
• Network layer- Decides which physical path the data will take
• Data link layer- defines the format of data on the network
• Physical layer- transmits raw bit stream over the physical medium

The User Datagram Protocol, or UDP, is a communication protocol used across


the Internet for especially time-sensitive transmissions such as video playback

• The World Wide Web (WWW), commonly known as the Web, is


an information system
• where documents and other web resources are identified by Uniform Resource
Locators (URLs, such as https://example.com/)
• The resources of the Web are transferred via the Hypertext Transfer Protocol
(HTTP),
• accessed by users by a software application called a web browser,
• are published by a software application called a web server.
• Over all WWW is a collection of webpages found on this network of
computers. Your web browser uses the internet to access the web.
• WEB 1.0
• Static pages.
• Content is served from the server’s file-system.
• Pages built using Server Side Includes or Common Gateway Interface
(CGI).
• Frames and Tables used to position and align the elements on a page.
• Web 2.0
• Free sorting of information, permits users to retrieve and classify the
information collectively.

DSCASC 21 | P a g e
• Dynamic content that is responsive to user input.
• Information flows between site owner and site users by means of
evaluation & online commenting.
• Web 3.0
• AI
• 3D Graphics
• Ubiquity : can access multiple application, every device is connected to
web.

• URL is a reference (an address) to a resource on the Internet. Eg: URL


http://example.com
• RDF is designed to be read and understood by computers. RDF is not
designed for being displayed to people. RDF is written in XML.
• SPARQL: SPARQL (pronounced "sparkle
• SPARQL is an RDF query language, that is, a semantic query language for
databases, able to retrieve and manipulate data stored in Resource Description
• The Semantic Web Rule Language (SWRL) is an expressive OWL-based rule
language.
• SWRL allows users to write rules that can be expressed in terms of OWL
concepts to provide more powerful deductive reasoning capabilities than
OWL alone.
• Identifiers and Character Set
• Uniform Resource Identifier (URI) is used to uniquely identify resources on
the web and UNICODE makes it possible to built web pages that can be read
and write in human languages.
• Syntax
• XML (Extensible Markup Language) helps to define common syntax in
semantic web.
• Data Interchange

DSCASC 22 | P a g e
• Resource Description Framework (RDF) framework helps in defining core
representation of data for web. RDF represents data about resource in graph
form.
• Taxonomies
• RDF Schema (RDFS) allows more standardized description of taxonomies
and other ontological constructs.
• Ontologies
• Web Ontology Language (OWL) offers more constructs over RDFS. It comes
in following three versions:
• OWL Lite for taxonomies and simple constraints.
• OWL DL for full description logic support.
• OWL for more syntactic freedom of RDF
Rules
• RIF and SWRL offers rules beyond the constructs that are available from
RDFs and OWL. Simple Protocol and RDF Query Language (SPARQL) is
SQL like language used for querying RDF data and OWL Ontologies.
Proof
• All semantic and rules that are executed at layers below Proof and their result
will be used to prove deductions.
Cryptography
• Cryptography means such as digital signature for verification of the origin of
sources is used.
User Interface and Applications
• On the top of layer User interface and Applications layer is built for user
interaction

• Originally, HTML was developed with the intent of defining the structure of
documents like headings, paragraphs, lists, and so forth to facilitate the sharing
of scientific information between researchers.
• Currently HTML is being widely used to format web pages with the help of
different tags available in HTML language.

DSCASC 23 | P a g e
• Create Web site - You can create a website or customize an existing web
template if you know HTML well.
• Become a web designer - If you want to start a career as a professional web
designer, HTML and CSS designing is a must skill.
• Understand web - If you want to optimize your website, to boost its speed
and performance, it is good to know HTML to yield best results.
• Learn other languages - Once you understands the basic of HTML then
other related technologies like javascript, php, or angular are become easier
to understand.
• Responsive UI - HTML pages now-a-days works well on all platform,
mobile, tabs, desktop or laptops owing to responsive design strategy.
• Offline support HTML pages once loaded can be made available offline on
the machine without any need of internet.
• Game development- HTML5 has native support for rich experience and is
now useful in gaming developent arena as well.
Abu Bakr al-Baghdadi, a terrorist
Static
• means the IP address never changes as long as you stay with the same provider
or same server.
Dynamic
• means the IP address can change from time-to-time.
Public
• means the IP address can be visited from any computer in the world.
Private
• means the IP address can only be used by those on the same network.
Shared
• means other people use your IP address for their connection or websites.
Dedicated
• means no one else uses your IP address for their connection or websites.

DSCASC 24 | P a g e
Class identifies the range of your IP address and the default subnet mask.
• Public IP: A public IP address is an IP address that is used to access the
Internet
• Static IP: A static IP address is simply an address that doesn't change
Static IP addresses generally are used by servers or other important
equipment.
• Private IP : Private IP address is used with a local network and public IP
address is used outside the network.
• Public IP address is provided by ISP, Internet Service Provider. Is used to
communicate within the network
• Dynamic IP: Most IP addresses assigned today by Internet Service Providers
are dynamic IP addresses.
• It's more cost effective for the ISP and you.

When DNS was not into existence, one had to download a Host file containing
host names and their corresponding IP address. But with increase in number of
hosts of internet, the size of host file also increased. This resulted in increased
traffic on downloading this file. To solve this problem the DNS system was
introduced.
Domain Name System helps to resolve the host name to an address. It uses a
hierarchical naming scheme and distributed database of IP addresses and
associated names

What is a web server: a program that uses HTTP for serving files that create web
pages for users in responses to their requests that are sent by http clients of their
computer is called web server
Lets us take an example: if you are browsing or working with your compute and
your computer is connected to internet
A message pops up from your friend indicating that
https://www.linkedin.com/webnotes /blog is very good to read and is very
informative,
You literally copy that link into your browser and press enter, immediately your
system displays the information on the screen.

DSCASC 25 | P a g e
Now where is this blog--- it is in any of the servers in the world.
Different types of webservers
• lighttpd
• Sun Java System Web Server
• Jigsaw Server
• Apache

• Following is a list of the types of Facebook pages that you can create −
• Local business or place
• Company, organization or institution
• Brand or product
• Artist, band or public figure
• Entertainment
• Cause or community
• Facebook is a fantastic way to reach out to your audience on different levels.
By posting information, photos, videos and stories, the content you share can

• Personalize your brand
• Drive users to your blog
• Generate more traffic directly to your website
• Educate and create awareness about your industry
• Promote the culture of your organization

DSCASC 26 | P a g e
Module 2 – E-commerce
1) What is E commerce? (One)
Ans: e-commerce, the buying and selling of goods through human-computer
interaction over the Internet.
• e-Commerce is generally considered as Sales aspect of e Business.
• E-commerce can be defined as a modern business methodology that addresses
the needs of the organization, merchants and consumers.
• Business is done electronically and there is no need for physical currency or
goods to conduct business.

2) Difference between Ecommerce and traditional Commerce? Book Shop?


(One)
Ans:

Electronic commerce Traditional commerce

• Sale / purchase of books and • Sale / purchase of high fashion


CD’s clothing

• Online delivery of software • Sale purchase of perishable


food products

• Advertising and promotion of • Small denomination


travel services transactions

• Online tracking of shipments • Sales of expensive jewellery


and antiques

3) What are the business activities takes place in E-commerce?


Ans:
Business to Consumer (B2C)
Business to Business (B2B)
Consumer to Consumer (C2C)
Consumer to Business (C2B)

DSCASC 27 | P a g e
Peer to Peer (P2P)
Mobile Commerce
Business to Government (B2G)
Government to business (G2B)
Government to Citizen (G2C)
Government to Government (G2G)
Consumer to administrator (G2A)
Business to administrator (B2A)

4) Value Chain?
Ans: A value chain is a business model that describes the full range of
activities needed to create a product or service. ... The purpose of a value-
chain analysis is to increase production efficiency so that a company can
deliver maximum value for the least possible cost.

5) History of E-commerce?
Ans: E- commerce started 55 years ago and even this day it is still growing with
technology innovations.
History of how information technology has transformed internet business over
a period of time.
• Invention of telephone lead to the innovation of E commerce
• EDI was widely used as the beginning of e commerce.
• Examples file transfer, fax, video conferencing, workflow, or interactions,
workflow, interaction with a remote computer. Purchase orders,
invoices, inventory documents, payment documents etc
• EDI did not gain much importance until 80’s and also never reached
popularity of web based commerce due to various reason ns such as
• High cost of EDI restricted small and mid sized business
companies from participating in E Commerce
• Slow development hindered the growth of EDI

DSCASC 28 | P a g e
• The complexity involved in Developing EDI

6) Nature of E-commerce?
Ans: e-Commerce is a modern business methodology which helps companies
and consumers to have
• Better business facilities
• Do business with less cost.
• Improve the quality of goods and services
• Increase the speed of transactions.
• Covers online selling and transactions, web retailing
• Wholesaling, electronic banking, interactive marketing
• Multimedia advertising, product information, customer support
• Payment mechanism through bank
ALL THESE ARE DONE ON INTERNET ie on WWW.

7) E-retailing?
Ans:
The Electronic Retailing also called as e-tailing or internet retailing, is the
process of selling the goods and services through electronic media, particularly
the internet. Simply, the sale of retail goods and services online is called as
electronic retailing.

8) Drivers 0f Ecommerce growth?


Ans:
• Digital convergence: The digital revolution has made it possible for almost all
digital devices to communicate with one another.
• Ubiquity: Today's E-Commerce is available to anyone, anywhere, in the
world, 24 hours a day, 7 days a week.

DSCASC 29 | P a g e
• Changes in organizations: previously the organizations was based on front line
workers, the current trend is towards partnering owners and managers across
departments
• Information Density: due to the speed in marketing technology, organizations
keep a close watch on operating costs and maximize profit margins,
shareholders and stakeholders share.
• E-Commerce addresses their concerns quickly, efficiently and at a low cost.
• Personalization/ Customization: Today's customers are collectively
demanding higher quality and better performance, customized way of
producing delivering of products,

9) Types of Ecommerce? (Three)*


Ans: There are various types of e-Commerce modules
• Business to Consumer (B2C)
• Business to Business (B2B)
• Consumer to Consumer (C2C)
• Consumer to Business (C2B)
• Peer to Peer (P2P)
• Mobile Commerce
• Business to Government (B2G)
• Government to business (G2B)
• Government to Citizen (G2C)
• Government to Government (G2G)
• Consumer to administrator (G2A)
• Business to administrator (B2A)

10) Why sellers adopt for E-commerce?


Ans:
• Big opportunities – can advertise their product world wide.

DSCASC 30 | P a g e
• Globalization: small companies can appear too big globally.
• Reduced Operational cost- cut down miscellaneous cost, (Paper, customer
support, advertisement, order processing etc)
• Customer Convenience – searchable content, shopping carts, interactive and
user friendly
• Knowledge Management- one can find out who visited and how to create
better value for customers through databases.

11) Major Models of Business to Business?


Ans: E Commerce is determined by seller, buyer or intermediate (Third Party)
who controls the market place, Based on these… 4 Market places have been
created they are
1. Seller controlled Market place –
• Very popular B2B Model for both customer and businessman.
• In this the seller who provide fragmented markets such as chemicals,
electronics and auto components come together to generate common
business place for buyers.
• The seller aggregate their market power, through simplifying the search
for alternative source.
• One popular application of this is e-procurement which traditionally
streamlines the traditional procurement process by using internet and web
technologies.
2. Buyer controlled Market place –
• This is used by large companies with buying power or a consortium of
several large companies.
• In this model a buyer or a group of buyers opens a electronic market place
and invites sellers to bid on the announced produces or RFQ’s (Request
for Quotations)
3. Third party Exchanges marketplace–
• Here the market is controlled by third party not by buyers or sellers.
• This offers suppliers a direct channel of Communication to buyers through
online storefronts.

DSCASC 31 | P a g e
• This includes features like product catalogue, RFI, rebates and
promotions, broker contacts, and product sample requests.
• These market places are usually active either in a vertical (not really niche)
or horizontal market (Niche)
4. Trading Partner agreements –
• The main object of this model is to automate the processes for negotiating
and enforcing contacts between participating business.
• This model is most expected to become more popular as XML or ebXML.
(electronic Business XML)
• The world wide market is attempting to standardize the exchange of e-
business data via XML such as
• Eg: electronic contracts and Trading partner agreements
• This model helps in customers delivering electronic documents with e
Signature via internet.
• Eg: Turkish govt gave digital signature as the same legal validity for hand
written signature.
• The main advantage of XML over HTML is that XML can assign data
type definition (make the document public or private through tags) to all
the data included in the page
• This helps in
• easing of data transfer and
• More readability since only suitable data are transferred from the search
criteria

12) Advantages and Disadvantages of Customer to Customer?


Ans: Advantages of C2C
• The main factor is reduction of cost. Sellers can post their goods on internet
cheaply compared to the higher rent space in a store.
• C2C helps in directly contacting sellers without the involvement of a middle
men

DSCASC 32 | P a g e
• Many small businesses can obtain a higher profitability over C2C comparing
to physical store,
• Reduction of overhead costs when conducting business
• Anyone can sell and advertise a product on internet enabling one to easily start
business.
• The most benefit for the customers is selling personal items
• Consumers can increase their market by advertising of product over the
internet as they can both reach national and international customers
• Transaction occurs in a faster rate with the use of online payment gateways.
Dis-Advantages of C2C
• One of the major factors is that it is not always the safest and reliable place to
conduct business.
• Sometimes buyers and sellers do not accommodate each other when
transaction information is needed. This leads to lawsuits for a consumer and
small business.
• Customers come across people with scam, fraud and ill- business intensions.
• Feedback when things go wrong on C2C communities, easily spread very fast
with their stories which effectively is Word – of – mouth advertising.

13) Advantages and Disadvantages of Pear to Pear?


Ans: Advantage of peer to peer network
• The main advantage of peer to peer network is that it is easier to set up
• The peer to peer network is less expensive.
• In peer-to-peer networks all nodes act as server as well as client therefore
there is no need of dedicated server.
• It is easier to set up and use one can spend less time in configuration and
implementation
• Any computer on the network can function as both a network server and a
user workstation.

DSCASC 33 | P a g e
Disadvantages of peer to peer network
• A computer can be accessed anytime.
• Network security has to be applied to each computer separately.
• Backup has to be performed on each computer separately.
• No centralized server is available to manage and control the access of data.
• Users have to use separate passwords on each computer in the network.
• As with most network systems, unsecured and unsigned codes may allow the
to files on a victim's computer to be affected with computer virus.

14) Emerging trends in E commerce?**


Ans: E commerce has given you access to immeasurable market..
The major 10 raising trends related to e-commerce are
1. Real time shopping experience at online Shopping: e-Commerce can offer you
real-time shopping experience, most online retailers have facilities to chat
online, get suggestions and answer all your queries.
• Online subscription allows you to touch and feel the product. Eg. Cool
winks, lens kart, stylemint etc,
2. Using mobile and android apps for transactions: GPS for proper
advertisement, apps for comparing prices, apps for payment, store coupon
codes,
• In Addition, all Apps starts working as webpages and websites.
3. Multi-channel: Consumers expect a very effortless transactions.
• They also expect that the product added to the cart will be available if one
calls the customer care or land up in store.
• This will encourage the IT directors to invest in commerce packages like
POS systems or CRM Systems and other various channels.
• Multichannel marketing combines the practices of inbound and outbound
marketing with the goal of reaching customers on the channel of their
choice.
• In this way, the buying process is more controlled by the customer than
the marketer.

DSCASC 34 | P a g e
4. Big Data: Big Data or Hadoop methodologies for handling large data.
• It helps retailers in decision making through synchronizing offline data
with online data.
• In a nutshell it allows retailers to understand the hidden consumer patterns.
5. Customization and personalization: in a extremely volatile market one must
be ready to take the challenge and change at all times.
• This helps the retailers in better personalization.
• Where as personalized recommendations will find more prominence in the
market.
6. Valuing customer engagements than conversion ratio : Currently & Slowly
conversion ratio is being replaced by customer engagements.
• With the Raise of e-commerce gathering of customer has become very
tough, hence retailers are engaged in retaining the existing customer
through linking up your site and interacting regularly.
7. Push Notification: Pull browsing has become the latest trend but slowly it is
being overtaken by push notification.
• This like messaging notification, basket notifications for selective items
on your home page are all currently catching up the momentum.
(CleverTap.com)
8. Social Network Sites: Social network sites are currently considered as the
current trend.
• Sites like Facebook, Twitter, and LinkedIn pushes the data about latest
discounts and offers to the respective members.
9. Mobile POS and Accessing Via Mobile: The idea of this is to make every
employee work and allow the customer transact without bringing him to the
billing counter.
• OS like Android 4.2 and above and iOS 6 -10 and above provides
feasibility with apps for customers to do endless jobs with different apps.
10.Retailers Support to Omni Channel Consumers: Mobile apps lets the user
compare prices and check reviews online, also allows you to share the product
details with your friends.
• Retailers integrate their channels into these through supporting consumers
based on their offering.

DSCASC 35 | P a g e
15) Advantages and Disadvantages of Ecommerce? (Three)*
Ans:

ADVANTAGES DISADVANTAGES

Avoiding crowds by shopping online in Communication infrastructure is


the comfort of your home or office expensive and not very reliable
particularly to individuals.
l Shopping at your time (internet stores Payment by plastic card requires faith
are open 24 hours a day, 7days a week in the system security
and 365 days per year) Credit and debit card info is not given
very easily to vendors
Lower startup and overhead expenses , EDI standards have to be in place
Global Exposure -unlimited marketing before B2B e-commerce can increase.
Reach, Automated order processing
There are thousands of such items and Many persons go shopping for social
tracking contacts, touch and feel and bargaining
and regulating supplies is a complex before buying items – de personalized
task.
Electronic funds transfer is fast and hackers can steal and misuse credit card
safe. numbers, purchase orders , invoices
etc.,
A large number of potential business Customers' privacy may be lost if
partners can be quickly found regular log is kept of their buying
habits.
Certain types of goods can be The web site of vendors should have
customized and sold directly by a the capability of being scaled up
manufacturer or assembler eliminating quickly when the number of users
middleman suddenly increases.
Companies can maintain on-line e- When a successful e-business is
catalogue of items and a price list launched, immediately there will be
which can be quickly updated. many copy cats who will attempt to
duplicate it.

DSCASC 36 | P a g e
16) JIT delivery in B2B importance? (One)
Ans: Just-in-Time delivery (also known as JIT delivery) is an important inventory
management process and lean manufacturing technique in supply chain
management. It’s also known as the Toyota Production System (TPS).

JIT delivery involves ordering and receiving inventory for production or sales only as
needed, reducing warehousing costs because inventory is constantly on the move.
This process significantly improves efficiency in manufacturing, while presenting
numerous cost-saving opportunities.

This infographic outlines the benefits of JIT


delivery, including:
• Prevents waste
• Improves production efficiency
• Reduces inventory carrying costs
• Requires accuracy in demand forecasts
• Allows short production runs
• Minimizes costs for warehousing as well as raw materials
• Frees up cash flow

17) Phishing Attack? (one)*


Ans: Phishing attacks are the practice of sending fraudulent communications that
appear to come from a reputable source. It is usually done through email. The
goal is to steal sensitive data like credit card and login information, or to install
malware on the victim’s machine. Phishing is a common type of cyber attack that
everyone should learn about in order to protect themselves.

18) Difference between POP and IMAP? (One)


Ans: POP is a very old way of receiving mail in an email client. It only lets you
download your Inbox on your computer, and not any other folders. When an email
is downloaded using POP, it is usually then deleted from Fast mail.

DSCASC 37 | P a g e
IMAP is the current standard for syncing your emails and lets you see all your
Fast mail folders on your email client. You can quickly view subjects and
message bodies of emails. IMAP also lets you sync folders between your home
computer, your phone, and Fast mail on the web, so that you see the same folders
and messages wherever and however you access your email.

19) Digital Marketing? (Two)


Ans: Any marketing that uses electronic devices to convey promotional
messaging and measure its impact. In practice, digital marketing typically refers
to marketing campaigns that appear on a computer, phone, tablet, or other device.
It can take many forms, including online video, display ads, and social media
posts. Digital marketing is often compared to “traditional marketing” such as
magazine ads, billboards, and direct mail. Oddly, television is usually lumped in
with traditional marketing.

DSCASC 38 | P a g e
20) Certifying Authority? (One)
Ans: A certificate authority (CA), also sometimes referred to as a certification
authority, is a company or organization that acts to validate the identities of
entities (such as websites, email addresses, companies, or individual persons) and
bind them to cryptographic keys through the issuance of electronic documents
known as digital certificates. A digital certificate provides:
• Authentication, by serving as a credential to validate the identity of the
entity that it is issued to.
• Encryption, for secure communication over insecure networks such as the
Internet.
• Integrity of documents signed with the certificate so that they cannot be
altered by a third party in transit.

21) Electronic Fund transfer? (One)


Ans: Electronic funds transfer (EFT) is the electronic transfer of money from one
bank account to another, either within a single financial institution or across
multiple institutions, via computer-based systems, without the direct intervention
of bank staff.

22) Options available for Payment in Ecommerce? (one)


Ans: Types of Payment Methods for ECommerce
Credit/Debit card payments
Prepaid card payments
Bank transfers
E-Wallets
Cash
Mobile payments
Cryptocurrencies

DSCASC 39 | P a g e
23) Key Dimensions of Ecommerce security? (One)
Ans:

24) Impact of Ecommerce in Banking? (Two)


Ans: It didn’t take long for the internet to lend itself to be a viable avenue for
businesses to conduct shopping and commerce. The widespread consumer
adoption of the internet began in the early 1990s, and electronic commerce was
right on its tail. It’s not a stretch to say that the internet revolutionized the
shopping experience in nearly every way and has been continuing to grow and
change over the last 30 years.
So how have banks and finance organizations adapted? Banks are responsible for
processing payment for e-commerce goods and services, which means that banks
have gone from brick-and-mortar institutions to digital financial landscapes. Here
are the biggest ways that the banking sector has been impacted by e-commerce.
Changes from e-commerce in banking
1. Online-only banks
Banks were once institutions that helped manage customer money, exchange
checks for cash, and provide other financial services. E-commerce led to the rise
of electronic banking in a big way. Customers very quickly wanted the
convenience that online shopping offered in all of their affairs and digital
banking, with options like online accounts, account money transfers, and
eventually online bill pay and mobile check deposits became a normal part of

DSCASC 40 | P a g e
most consumer interactions with banks. This led to many banks providing the
same services – checking, savings, loans, credit cards, and bill pay – without
having physical locations. Banks like Ally are leaders in the online-only banking
revolution.
2. PayPal and other 3rd party intermediaries
PayPal was developed as a safer way to pay merchants, vendors, and individuals
– instead of giving a company or person your credit card information or banking
information, you could use PayPal as the go-between. PayPal was touting itself
as a secure and encrypted platform for handling payment long before most other
financial organizations had thought to elevate the security. PayPal also quickly
became a viable payment option in e-commerce settings, replacing the need for
entering credit card numbers or bank account numbers by substituting it with one
account login.
3. Online loan and mortgage vendors
Banks aren’t the only financial organizations that are growing their online
presence or streamline the process to be completed online. Companies like
Rocket Mortgage offer customers a way to apply for a mortgage or refinance loan
completely online, while companies like LendingTree help both individuals and
businesses apply for and secure personal loans without ever needing to meet in
person with a loan advisor.
4. Investment companies
Investing has moved to online sites and mobile apps. Banks aren’t the only places
that can help you save money, and financial advisors offices aren’t the only places
to create investment plans. Online only brokers now exist as a way to meet the
online and e-commerce niche of customers looking to simplify and modernize
their investment and savings experiences.
5. Data mining for better products and marketing
One way that online shopping has changed banking is through banks and finance
organizations now having more access to customer behavior and transaction
information. This has led to data analytics being used to discover customer
interests and to develop the kinds of products that help customers have a better
financial experience.
6. Changing in-store payment options
Banks and mobile companies alike have taken to developing technology that
makes it easier to use digital options, like a mobile device, to safely transmit

DSCASC 41 | P a g e
payment data to facilitate payment for in-person transactions at places like the
grocery store and coffee shop. Apple Pay and Google Wallet have made
consumer payment options safer and easier in a digital age.
The future of e-commerce in banking
Overall, the banking and e-commerce experience has been largely dependent on
each other. E-commerce necessitated banking and finance changes and these
changes helped to further the capabilities of e-commerce, eventually leading to
the success in mobile driving more of the success of e-commerce and online
shopping.
Changing technology has created customer experiences that have gone on to
change customer expectations. Businesses can’t afford to not pay attention to the
relationships between commerce, consumers, and technology. Finance
organizations have had to adapt quickly and significantly to be able to keep pace
with the way that technology creates changing customer landscapes, and in some
cases have had to not only change their business model but they’re product
offering.
Understanding the role of e-commerce in banking is one way to better understand
how all businesses can meet the future. Are you taking new and upcoming
technology into consideration? Are you working to be innovative or are you
having a hard time keeping up with customer interests and expectations? Can you
develop a product or service that helps to enhance other experiences that
customers value? Finding ways to add value and convenience to your customer’s
lives is one of the most important ways to stay competitive in any industry in the
age of e-commerce and digital

25) E-Kranti? (One)


Ans: E-KRANTI is a national e-governance plan to accelerate e-governance across
India.

Its vision is to: "Ensure government-wide transformation by delivering all government


services electronically to citizens via integrated, interoperable systems through
multiple modes."

The objectives of 'e-Kranti' are as follows:

• To redefine NeGP with transformational and outcome oriented e-Governance


initiatives.

DSCASC 42 | P a g e
• To enhance the portfolio of citizen centric services.

• To ensure optimum usage of core Information & Communication Technology (ICT).

• To promote rapid replication and integration of eGov applications.

• To leverage emerging technologies.

• To make use of more agile implementation models.

26) Issues in Implementing Ecommerce? (One)


Ans: 10 Biggest Ecommerce Challenges in 2021 & Solutions to solve them
1. Cyber & Data Security
When it comes to eCommerce, one of the biggest challenges faced is security
breaches. There is a lot of information/data that is involved while dealing with
eCommerce and a technical issue with data can cause severe damage to the
retailer’s daily operations as well as brand image.
Solution: Be vigilant and always back up your data. Post that, you can install
security plugins onto your website to prevent it from getting hacked. There are
several plugins out there, pick one that works best for your eCommerce website.
2. Online Identity Verification
When a shopper visits an eCommerce site, how would the retailer know if the
person is who they say they are? Is the shopper entering accurate information? Is
the shopper genuinely interested in the eCommerce products?
If you do not have the accurate details or information, how do you proceed? Well,
it does become tricky. The solution would be to invest in online identity
verification.
Solution: There are different ways to incorporate online identity verification.
Some examples include biometrics, AI, single sign on, one time password, two-
factor authentication and so on.
3. Attracting the Perfect Customer
Shoppers have a myriad of options to choose from these days. If they are looking
to buy a handbag, they do some thorough research before finalizing on one. If
shoppers have several options, how do you make sure they pick you? How do
you go about finding that perfect customer that wants your product, at your rate
and to the places you can ship?

DSCASC 43 | P a g e
Solution: Partner with companies that help you target your customers. Digital
marketing is preferred over traditional marketing because they can target your
ideal customer. While this might not happen overnight, with A/B testing,
finetuning and analysis – your products could be showing up to potential
customers on different social media platforms.
4. Customer Experience
Customer experience or user experience is key to a successful eCommerce
website. Shoppers expect a similar if not same experience as one they would get
in a brick and mortar store. The flow of the website, the segmentation of the
website and the retail personalization of products based on the shopper’s
preferences are imperative.
Solution: There are several ways to improve the user experience. The most
important would be to have a clean and simple website so that shoppers can
navigate through easily. The next point would be to have clear CTAs (call to
action) so that the shopper knows exactly what to do. Here is a post that shows
you 10 ways to improve user experience.
5. Customer Loyalty
Here are two facts that show the importance of customer loyalty: (a) It can cost
up to 5 times more to acquire a new customer than retaining an existing one and
(b) the success rate of selling to a current customer is 60-70% compared to only
5-20% success rate of selling to a new customer.
The above two facts are testament to how important customer retention or loyalty
is. Once a customer makes a purchase or utilizes a service from a retailer, they
have to make sure that they keep this customer for life. But how is this possible?
Solution: These are a few different methods that can be used to retain customers.
The first would be to have excellent customer service – a customer is happy to
have purchased a great product, but they are ecstatic when the customer service
is on point. The next step is to keep in touch with the customer via a method that
they like – be it an email, SMS or blog posts – be sure to find out what works best
for your customer. The last point would be to let them know about new products,
sales promotions and special coupon codes for being such loyal customers.
6. Converting Shoppers into Paying Customers
One of the biggest ecommerce challenges is to convert visitors into paying
customers. An eCommerce website might have a lot of traffic, a lot of clicks and
impressions but they aren’t making the sales they anticipated. What can they do
to get more sales?
DSCASC 44 | P a g e
Solution: The first and foremost would be to understand why your shoppers aren’t
converting – are you targeting the right audience? Is your mobile website working
seamlessly? Do your online platforms face technical challenges all the time? Does
your customer base trust you? Do you personalize your website for your
customers? Always think from a shopper’s perspective and see if you are doing
everything possible to make them paying customers.
7. Competition & Competitor Analysis
Have you heard of a Jam Experiment? Well it has quite a controversial
conclusion, which is – the less you offer customers the more likely they are to
actually purchase something. A lot of people these days are fatigued by all the
options that are out there. A simple search for something like headphones will
give you thousands of options – how does one make a choice?
From a retailer’s standpoint, how do they stand out from the crowd? How do they
bring shoppers to their website, instead of buying a similar product from their
competitors?
Solution: Always do a thorough analysis of your competitors. Find out what
products they are selling, how they are generating leads and how they keep in
touch with their customers. The next step would be to make sure you stand out –
be it the colors you use, the topnotch functionality of your website or amazing
user experience. And finally, offer services or products that are unique and
relevant to your customer base.
8. Price & Shipping
We have all heard of customers that prefer to purchase products from places that
have free shipping. eCommerce giants like Amazon provide such attractive
shipping deals that customers seldom want to look at other places. How does one
bring down costs for shipping?
Solution: While all eCommerce sites cannot completely get rid of shipping costs,
always look to find options that work for your customer base. Would a
subscription reduce the cost of shipping? Would a certain time of the month give
them lower shipping costs? Or is there a carrier that is reliable but offers a cheaper
rate? Be sure to do your research and find the best possible solution for your
shoppers.
9. Product Return & Refund Policies
According to ComScore, more than 60% of online shoppers say that they look at
a retailer’s return policy before making a purchase. When an eCommerce site
says “no returns or refunds” it makes a shopper nervous and less likely to trust
DSCASC 45 | P a g e
the retailer. When shopping online, customers want the flexibility of making a
mistake that doesn’t cost them.
Solution: Customer satisfaction is the most important factor for any retailer.
Therefore having a flexible return and refund policy not only helps with customer
satisfaction with it also helps with customers making purchases without being
nervous.
10. Choosing the Right Technology/Partners To Fix Your eCommerce
Challenges
Choosing the right technology or partner will make or break your business. A
retailer’s growth might be stunted because their technology is limiting them or
because they have hired the wrong agency to help them manage their projects.
There are a lot of aspects that need to be in place for a successful retail business,
but a good technology foundation is crucial.
Solution: Partner with Vue.ai, a unified Visual A.I. platform that is redesigning
the future of retail commerce to fix all your eCommerce challenges. Using image
recognition and data science, Vue helps retailers generate product, and customer
intelligence, and combine these with market insights, to power growth.
Nothing has propelled eCommerce like the conditions of 2020. While there have
been a lot of exciting and positive changes, there are still online businesses that
struggle with the challenges that eCommerce brings. The above mentioned
solutions are fixes that can help any eCommerce business move closer to their
ideal customers and targeted sales.

27) Driving force behind Ecommerce?


Ans: Economic forces that drives e-commerce
1. E-commerce enables businesses to interact with suppliers, customers and with
players in the distribution channel at a lower cost.
2. The cost of installing and maintaining a website is much cheaper than owning
a physical store. This motivates the growth of e-commerce.
3. E-commerce generates greater profits due to less human intervention, lower
overhead cost, few clerical errors and more efficiency.
4. The cost of advertising is cheaper and provides access to global market at low
cost. This is something which encourages people engaged in business to promote
their business through electronic medium.
DSCASC 46 | P a g e
5. Reduction in communication cost and technological infrastructure expense
drive business towards e-business.
6. Increase in competition and the rise in consumer power, ‘globalization wave’
have forced the business organizations to penetrate into internet world
Technological forces that drives electronic commerce
1. Technological advances have made business communication faster, easier,
economical and efficient. It has enabled the business to switch over from the local
market to the global market.
2. The growing popularity of cyber cafes has created a big role in attracting
internet population towards e-commerce.
3. Technological changes have given confidence to consumers to make electronic
payments in settlement of financial obligations.

Market forces that drives electronic commerce


1. Business organizations are able to reach international markets by using
electronic medium for enhanced customer support and service.
2. E-commerce enables customers to make product comparison, place orders,
track orders and make payments at ease. Due to convenience, customers prefer to
purchase their desired goods or services over internet in the online marketplace.
3. E-commerce also allows the customers to choose and order products according
to their personal and unique specifications. It paves way for mass customization.
4. The growing internet population stimulates business to switch over from an
additional business to e-business.
5. The great variety of commodities available online and reliable payment
methods are regarded as contributors to the increase of e-business.
6. Consumers often prefer shopping on the internet due to convenience and the
changes in consumer behavior pulls consumer towards e-commerce.

Notes:
Business to Consumer (B2C)
Business to Business (B2B)
Consumer to Consumer (C2C)

DSCASC 47 | P a g e
Consumer to Business (C2B)
Peer to Peer (P2P)
Mobile Commerce
Business to Government (B2G)
Government to business (G2B)
Government to Citizen (G2C)
Government to Government (G2G)
Consumer to administrator (G2A)
Business to administrator (B2A)

E commerce draws on technologies such as


Mobile commerce
Electronic funds transfer
Supply chain management
Internet marketing
Onine transactions processing
EDI
Inventory management systems
Automated data collections systems
All the above is used on the concept called WWW

A value chain is a business model that describes the full range of activities needed
to create a product or service. ... The purpose of a value-chain analysis is to
increase production efficiency so that a company can deliver maximum value for
the least possible cost.

Communication :
It is the ability to deliver products, services, information, or payments via
networks like the internet.
DSCASC 48 | P a g e
That is providing capability of buying and selling product, services and
information on the internet via other online services.

Business
E-Commerce means activities that support commerce electronically by
networked connections. For Example business processes like manufacturing and
inventory etc.

Service:
A tool that addresses the desire of government, firms, consumers and
management to cut service cost while improving the quality of the customer
service and increasing the speed of service delivery.

Commercial
E commerce is an electronic environment that allows sellers to buy and sell
products, services, and information on the internet.
The Products may be physical like Cars, Computers, Books or services like news
or consulting.

Electronic Data Interchange, ANSI - American National Standards Institute

Bitnet's NJE (Network Job Entry) network protocols, called RSCS, (Remote
spooling communication subsystem)

were used for the huge IBM internal network known as VNET(an international
computer networking system deployed in the mid-1970s)

USENET : s a worldwide distributed discussion system available on computers.


Users read and post messages (called articles or posts, and collectively termed
news) to one or more categories, known as newsgroups. Usenet resembles a
bulletin board system (BBS)

DSCASC 49 | P a g e
Selling can be centered around the Global client
Pre-deals, subcontracts, and supply
Financing and protection
Commercial exchanges, requesting, conveyance installment
Product administration and support
Cooperative item improvement
Distributive co-employable working
Use of open and private administrations
Business to organization (client)
Transport and coordinations
Public acquisition
Automatic exchanging of computerized merchandise
Accounting

The Electronic Retailing also called as e-tailing or internet retailing, is the


process of selling the goods and services through electronic media, particularly
the internet. Simply, the sale of retail goods and services online is called as
electronic retailing.

Interactive Marketing: is a one-to-one marketing practice that centers on


individual customer and prospects’ actions
involves marketing initiatives that are triggered by customers’ behaviors and
preferences; for this reason, it is a major shift from traditional campaign-based
marketing efforts.

Catalog Inflexibility : can update e catalog any time like adding new products, or
adjusting prices, direct link capabilities to content information

DSCASC 50 | P a g e
C2B is when consumers have products or services of value that can be consumed
by businesses.
In this model, it's not consumers investing money in something, but the
organization.
But what about that blog post you wrote for the free sample you received?
The focus group you participated in for that new soda?
Now you're seeing the possibilities.

C2B provides businesses with something they need or want from consumers,
whether it's a press release written by an expert or valuable feedback on a new
product.

A chatbot is a software application used to conduct an on-line chat conversation


via text or text-to-speech, in lieu of providing direct contact with a live human
agent.

POS – Point of sale


CRM- Customer Relationship Management

Multichannel is a practice of interacting with customers using a combination of


indirect and direct communication channels – websites, retail stores, mail order
catalogs, direct mail, email, mobile, etc.
example Apple excels in creating a seamless experience for its customers
across multiple channels.
Hadoop is a tool or a opensource handling voluminous data which has a java
framework

personalization is a tailored experience based on a consumer's previous behaviors

Customization, on the other hand, is the action of modifying something to suit a


particular individual or task.
DSCASC 51 | P a g e
Hadoop is a tool or a open source handling voluminous data which has a java
framework

Omnichannel retail (meaning “all” channels)


evolves around the customer
creates a single customer experience across your brand by combining sales and
marketing that accounts for the spillover between channels

A customer goes through the onsite process, adds a queen mattress to their cart,
but leaves without purchasing.

The first email they receive contains the “$100 off” incentive but is ignored.

Simultaneously, they’re served a series of ads for the same queen mattress and
“$100 off” coupon on Facebook, Pinterest, Instagram, and YouTube, staggered
over a week to ensure they aren’t bothersome.
Literally they come out with king mattress with $150 Discount..
At this point of time you make a idea of purchasing it.

DSCASC 52 | P a g e
Module 3- E-Governance
1) What is E-governance? (One)
Ans: E-Government can be defined as the use of information and
communications technologies by governmental organizations / institutions.
• This helps to enhance the range, quality of information & services provided
to the citizen in an cost effective and convenient manner.
• This allows the government processes more transparent and accountable
and strengthening democracy.
Definition:
• E-governance is the use of information technologies (WWW, the internet,
and mobile computing)
• E governance has the ability to transform relations with citizens, businesses,
and other arms of government .
These technologies can serve better delivery of government services to
citizens through eliminating corruption, increased transparency, greater
convenience

2) Components of E-Governance?
Ans: Technological Component with Electronic “e” dimension:
• This relates to educating people who are in the administrative structure or
outside its periphery
• Relates to the use of electronic means to develop better connectivity within
and with the system.
It requires use of computers
• in developing the data-base,
• in networking to facilitate the communication,
• in creating e- knowledge to workers so as to increase their
potentiality.
• This focuses on “e” of electronic knowledge and its proper
utilization.

DSCASC 53 | P a g e
Social Component :
• The fundamental duty of any government is to educe a society which is
based on the principles of equality and justice.
• To bring awareness to the society about their haves and haves-not.
• This leads to the commitment towards providing a respectful essence of
life to its people without any discrimination of caste or race which must be
set up.
• When this is possible then people will be aware of their rights & duties on
the one hand, and know about the governmental policies made for them on
related issues.
• This helped in attaining the “e” of equal opportunities (egalitarian) society
with thrust on equality
Cultural Component :
• This begins with beginning of the era of knowledge explosion
• There is a need to re- positioning of some of the value patterns without
eroding the fundamental structure of any social system. (family, religion,
Education etc)
• The need to create value patterns beneficial for e- governance to operate
focusing on work philosophy began to evolve.
• With this the ethical framework became the key factor by discarding
obsolete set of values
• Thus “e” of ethical framework became the focal point in constructing a
morality-based system.
Political Component :
• The political system is essential aspect of governance.
• It holds responsibility of explaining various operative frameworks by
enacting laws.
• This helps to maintain & sustain the cohesive force that is required by
society to integrate its people and accept them to follow a uniform policy
to fulfill their targets.
• This refers to the importance of “e” of enactment of laws to stop society
from disintegration.

DSCASC 54 | P a g e
Psychological Component:
• Developing required psychological environment so as to facilitate
formation and inculcation of right type of attitudes in the people
• Apart form this;
• readiness to connect to people,
• to listen to their queries,
• to look for solutions,
• to improve communicative skills, behavioral modifications
etc.
• Relates to “e” of extension of self so as to have constructive, collaborative,
social relationships.
Service Component:
• The ultimate function of any government is to serve.
• This develops a constant pressure on the government to respond to public
demands
• This leads the government to maintain impartiality, integrity and
transparency in its functioning.
• This explains “e” of empowerment of people in any system.

3) Objectives of E-Governance?

DSCASC 55 | P a g e
Ans:
4) Types of Interactions in E-Governance?
Ans:

DSCASC 56 | P a g e
5) Interventional Strategies of E-Governance? (One)
Ans:
Transitive Counseling:
• In order to reduce the resistance, people need to be prepared for coming
out of transitional phase.
• Thus proper counseling is required regarding changes in attitudes,
reorienting mind sets etc. at various levels of governmental functioning.
Electronic Accessibility:
• There is a need to equip people with necessary knowledge regarding use of
electronic multi media by imparting it through various Institutions.
Institutional Networking:
• Various agencies needed at different levels of governmental functionaries
must be brought within the purview of constitutional framework.

6) Benefits and barriers of E-Governance? (two)


Ans:

DSCASC 57 | P a g e
7) E-Governance Challenges Specific to India?
Ans:
• Lack of Integrated Services: Most of the e-Governance Services being
offered by state or central governments are not integrated.
• Lack of Communication between different Departments. the
information that resides with one department has no or very little meaning
to some other department of Government.
• Lack of Key Persons: e-Governance projects lack key persons, not only
from technological aspect, but from other aspects as well.
• Population: This is probably the biggest challenge. Apart from being an
asset to the country it offers some unique issues, an important one being
establishing identity.
• Establishing Person Identities. There is no unique identity of a person in
India. Apart from this, measuring the population, keeping the database of
all Indian nationals (& keeping it updated) are some other related
challenges.
• Different Languages: A challenge due to the diversity of the country.
• It enforces need to do governance (upto certain level), in local
languages.
• Ensuring e-Governance in local language is a big task to achieve.

8) Challenges Internationally?
Ans: E-governance is facing numerous challenges world over.
• These challenges are arising from administrative, legal, institutional and
technological factors.
• The challenge includes security drawbacks such as
• Spoofing: Spoofing is the act of disguising a communication from
an unknown source as being from a known, trusted source.
• Tampering: the purpose of altering, damaging, or misusing,
unknowingly modifying some official records
• Repudiation: happens when an application or system does not
adopt controls to properly track and log users' actions

DSCASC 58 | P a g e
• Disclosure: is aimed at acquiring system specific information about
a web site including software distribution, version numbers, and
patch levels, patch files etc.
• elevation of privilege: For example, an attacker with a privilege set
of "read only" permissions somehow elevates the set to include "read
and write.“ uses it for modifying the data.
• Denial of service and other cyber crimes.
• Other sets of problems include implementation parts such as
funding, management of change, privacy, authentication, delivery of
services, standardization, technology issues and use of local
languages.

9) E-Governance Relevance to India?


Ans: The Government of India, in various forums, has indicated its commitment
to provide efficient and transparent government to all strata of society.
• The Government of India aspires to provide:
• Governance that is easily understood by the citizens
• Governance that is accountable to the citizens
• open to democratic involvement and inspection
• Citizen-centric governance that will cover all of its services
• Respect everyone as individuals by providing personalized services.
• An effective government that delivers maximum value for
taxpayers’

10) E-Governance Initiatives? (One)


Ans: Government of India views e-Governance as a vehicle to initiate and sustain
reforms by focusing on three broad areas
• Governance
• Transparency
• People’s participation

DSCASC 59 | P a g e
• Promotion of a democratic society
• Public services
• Efficient, cost-effective and responsive governance
• Convenient services to citizens and businesses
• Greater citizen access to public information
• Accountability in delivery of services to citizens
• Management
• Simplicity, efficiency and accountability
• Managing voluminous information and data effectively
• Information services
• Swift and secure communication

11) E-Governance best practices? (One)


Ans:
• Fast & easy services
• Increased accountability
• Increased transparency
• Reduced corruption
• Increased efficiency due to connectivity
• Tickets & fines
• E-polling tax filing
• E-voting
• Vehicle registration
• Transaction
12) Digi Locker? (One)
Ans: Digi Locker is a secure cloud-based platform for storage, sharing and
verification of documents & certificates Sign up Now! Digital India Corporation
(DIC)

DSCASC 60 | P a g e
digital locker provides access to authentic virtual documents. It is a digital
document wallet where you can store your documents such as driving licence,
PAN card, Voter ID, policy documents, etc. You can upload the documents and
keep these safe when you sign up for a Digi Locker account

13) Broadcasting and Interactive services model in E-Governance? (One)


Ans: The Broadcasting Model
The model is based on dissemination/broadcasting of useful governance information, which is in the
public domain into the wider public domain with ICT and convergent media. The strength of the model
rests upon the fact that a more informed citizenry is better able to judge the functioning of existing
governance mechanisms and make an informed opinion about them. Consequently, they become
more empowered to exercise their rights and responsibilities. Widespread application of this model
corrects = information failure situations ′ by providing people with the relevant information relating
to the governance sphere to make informed opinion and impact governance processes.

The Interactive-Service Model

It opens avenues for direct participation of individuals in governance processes and brings in greater
objectivity and transparency in decision-making processes through ICT. Fundamentally, ICT has the
potential to bring in every individual in a digital network and enable interactive (two-way) flows of
information among them. Under this model, the various services offered by the Government become
directly available to its citizens in an interactive manner. It does so by opening up an interactive
Government to Consumer to Government (G2C2G) channel in various aspects of governance, such as
election of government officials (e-ballots) ; redressing online of specific grievances; sharing of
concerns & providing expertise; opinion polls on various issues; etc.

14) Stage of E-Governance? (Two)


Ans: 5 Stages of E-Governance Model:
Stage – 1 (Emerging): An online presence is established through official
website. Information is basic, static and limited.
Stage – 2 (Enhanced): Government sites increase content, become more
dynamic. The content is updated more frequently.
Stage – 3 (Interactive): Users can interact with department through a set of
forms, and email.
Stage – 4 (Transactional): Users can actually avail government services by
making payment on website.
Stage – 5 (Seamless): There is full integration of e -services across
administrative and departmental boundaries.

DSCASC 61 | P a g e
Notes:
E governance is the use of technological communications devices, such as
computers and the Internet, to provide public services to citizens and other
persons in a country or region.
• We will be learning about why e governance
• Components of e governance – technological, social, cultural. & political,
psychological, service
• Objectives of e governance,
• types of e governance
• The four stages of e governance is presence, interaction, transaction, and
transformation.
• E governance initiatives till date
• Best practices of e governance
• Success and failures in e governance
• Types of e governance
• Government-to-Citizen(G2C) The Government-to-citizen refers to the
government services that are accessed by the familiar people. ...
• Government-to-business (G2B) ...
• Government-to-Government (G2G) ...
• Government-to-Employee (G2E)
Examples of e-governance include
• Digital India initiative,
• National Portal of India,
• Prime Minister of India portal,
• Aadhar,
• filing and payment of taxes online,
• digital land management systems,
• Common Entrance Test etc.

DSCASC 62 | P a g e
• Educe - Bring forth
• Fundamental rights such as : the right to equality,
• right to freedom,
• right against exploitation,
• right to freedom of religion,
• cultural and educational rights,
• right to property and
• right to constitutional remedies
Morality based study is Morality is the system through which we determine right
and wrong conduct -- i.e., the guide to good or right conduct. Ethics is the
philosophical study of Morality.

DSCASC 63 | P a g e
Module 4- IT Act 2000/2008
1) Need of IT act a) National reasons b) International reasons?
Ans: National Reasons:
• Increasing use of ICTs in conducting business transactions
• Business entering into contracts, because it was easier, faster and cheaper to
store,
• Transactions and communication through electronic media eliminated the
traditional paper documents.
• Business people were aware of these advantages but were reluctant to interact
electronically because there was no legal protection under the existing laws.
International Reasons:
• International trade through electronic means was growing tremendously and
many countries had switched over from traditional paper based commerce to
e-commerce.
• The United Nations Commission on International Trade Law (UNCITRAL)
had adopted a Model Law on Electronic Commerce in 1996, so as to bring
uniformity in laws governing e-commerce across the globe.
• India, being a signatory to UNCITRAL, had to revise its national laws as per
the said model law. Therefore, India also enacted the IT Act, 2000.
• Because the World Trade Organization (WTO) was also likely to conduct its
transactions only in electronic medium in future.

2) Advantages and Disadvantages of IT act 2000?


Ans:

DSCASC 64 | P a g e
3) Objectives of IT act 2000?
Ans: To provide legal recognition to the transaction done via electronic exchange
of data and other electronic means of communication or E- commerce
transactions
• Involves in the use of alternatives to a paper-based method of
communication and information storage to facilitate the electronic filing of
documents with the Government agencies.
• Give legal recognition to digital signatures for the authentication of any
information or matters requiring legal authentication
• Facilitate the electronic filing of documents with Government agencies and
also departments
• Facilitate the electronic storage of data
• Give legal sanction and also facilitate the electronic transfer of funds
between banks and financial institutions
• Grant legal recognition to bankers under the Evidence Act, 1891 and the
Reserve Bank of India Act, 1934, for keeping the books of accounts in
electronic form.

4) Silent Features of IT act? (One)


Ans:
• Digital signature has been replaced with electronic signature to make it a more
technology neutral act.
• It elaborates on offenses, penalties, and breaches.
• It outlines the Justice Dispensation Systems for cyber-crimes.
• All electronic contracts made through secure electronic channels are legally
valid.
• Legal recognition for digital signatures.
• Security measures for electronic records and also digital signatures are in place
• A procedure for the appointment of adjudicating officers for holding inquiries
under the Act is finalized.

DSCASC 65 | P a g e
• Provision for establishing a Cyber Regulatory Appellant Tribunal under the
Act to handle all appeals made against the order of the Controller or
Adjudicating Officer.
• An appeal against the order of the Cyber Appellant Tribunal is possible only
in the High Court
• Senior police officers and other officers can enter any public place and search
and arrest without warrant
• Provisions for the constitution of a Cyber Regulations Advisory Committee to
advise the Central Government and Controller.

5) Amendments brought in IT act 2000? (One)


Ans: The first schedule contains the amendments in the Penal Code.
• It has widened the scope of the term “document” to bring within its
domain electronic documents.
• The second schedule deals with amendments to the India Evidence Act.
• It pertains to the inclusion of electronic document in the definition of
evidence.
• The third schedule amends the Banker’s Books Evidence Act. (include
ledgers, day-books, cash-books, account-books and all other records used in
the ordinary business of the bank,)
• This amendment brings about change in the definition of “Banker’s-
book”. It includes printouts of data stored in a floppy, disc, tape or any
other form of electromagnetic data storage device.
• Similar change has been brought about in the expression “Certified-
copy” to include such printouts within its purview.
• The fourth schedule amends the Reserve Bank of India Act.
• It pertains to the regulation of fund transfer through electronic means
between the banks or between the banks and other financial institution.

DSCASC 66 | P a g e
6) Intermediaries’ accountability in IT act 2000?
Ans: Dealing with any specific electronic records,
Such as a person who on behalf of another person accepts, stores or transmits that
record or provides any service with respect to that record which includes
• Telecom service providers
• Network service providers
• Internet service providers
• Web-hosting service providers
• Search engines
• Online payment sites
• Online auction sites
• Online market places and cyber cafes

7) Highlights of the Amended Act?


Ans: The newly amended act Come with following highlights −
• It stresses on privacy issues and highlights information security.
• It elaborates Digital Signature.
• It clarifies balanced security practices for corporate.
• It focuses on the role of Intermediaries.
• New faces of Cyber Crime were added.

8) Offence and Punishments? (One)


Ans:
Section Offence Punishment

65 Tampering with Computer Imprisonment up to 3 years or fine up


Source Code to Rs 2 lakhs

DSCASC 67 | P a g e
66 Computer Related Offences Imprisonment up to 3 years or fine up
to Rs 5 lakhs

66-A Sending offensive messages Imprisonment up to 3 years and fine


through Communication
service, etc...

66-B Dishonestly receiving stolen Imprisonment up to 3 years and/or fine


computer resource or up to Rs. 1 lakh
communication device

66-C Identity Theft Imprisonment of either description up


to 3 years and/or fine up to Rs. 1 lakh

66-D Cheating by Personation by Imprisonment of either description up


using computer resource to 3 years and /or fine up to Rs. 1 lakh

66-E Violation of Privacy Imprisonment up to 3 years and /or fine


up to Rs. 2 lakh

66-F Cyber Terrorism Imprisonment extend to imprisonment


for Life

DSCASC 68 | P a g e
9) Digital Signatures? (Two)
Ans: A digital signature is a mathematical technique used to validate the
authenticity and integrity of a message, software or digital document. It's the
digital equivalent of a handwritten signature or stamped seal, but it offers far more
inherent security. A digital signature is intended to solve the problem of
tampering and impersonation in digital communications.
Digital signatures can provide evidence of origin, identity and status of electronic
documents, transactions or digital messages. Signers can also use them to
acknowledge informed consent.

DSCASC 69 | P a g e
10) Cyber Appellate Tribunal? (Two)
Ans: Cyber Appellate Tribunal was established under the Information
Technology Act, 2000.
• The first Cyber Appellate Tribunal in India was formed by the Central
Government.
• This was in accordance with the provisions described under Section
48(1) of the Information Technology Act, 2000.
Constitution: A Cyber Appellate Tribunal shall consist of one person only
(hereinafter referred to as the Presiding Officer of the Cyber Appellate
Tribunal), appointed by the Central Government.
• He shall be appointed based on the qualification, that he/she possess as
an High court judge and experienced for 3 years.
Staff of the Cyber Appellate Tribunal:
• The Central Government shall provide the Cyber Appellate Tribunal
with such officer and employees as that Government may think fit.
• The officers and employees of the Cyber Appellate Tribunal shall
discharge their functions under general superintendence of the
Presiding Officer
• The salaries, allowances and other conditions of service of the officers and
employees of the Cyber Appellate Tribunal shall be such as may be
prescribed by the Central Government.
JURISDICTION : is Appeal to Cyber Appellate Tribunal :
• As provided in sub-section (2), any person distressed by an order made
by Controller or an adjudicating officer under this Act may prefer an
appeal to a Cyber Appellate Tribunal jurisdiction in the matter.
• No appeal shall lie to the Cyber Appellate Tribunal from an order made
by an adjudicating officer with the consent of the parties.
• Every appeal under sub-section (1) shall be filed within a period of forty-
five days from the date on which a copy of the order made by the
Controller
PROCEDURES AND POWERS:
• The Cyber Appellate Tribunal shall not be bound by the procedure laid
down by the Code of Civil Procedure,

DSCASC 70 | P a g e
• Shall be guided by the principles of natural justice and, subject to the
other provisions of this Act and of any rules.
• Cyber Appellate Tribunal shall have powers to regulate its own procedure
including the place at which it shall have its sittings.
• The powers are as follows:
• summoning and enforcing the attendance of any person and
examining him;
• requiring the discovery and production of documents or other
electronic records;
• receiving evidence on affidavits;
• issuing commissions for the examination of witnesses or documents;
• reviewing its decisions;
• dismissing an application for default or deciding it further;
• any other matter which may be prescribed.

11) Impact of Social Media on Education? (One)


Ans: In today’s world of connected learning, the impact of social media on
education is becoming a driving factor. The world is getting smaller, and through
the use of technology such as social media, the way we deliver instruction is
changing. Social media and education can complement one another if utilized
effectively. The technology referred to here really transpires just social media
technologies such as Facebook, Twitter, and Snapchat. The technologies that
allow these platforms to function are also one of the driving forces behind the
impact of this technology on education. There are positive and adverse effects of
social networking to students to students, and the jury is still out concerning the
long-term effects of social media exposure may have. Social media and education
are not historically allies and many educators see social media as a determent to
real learning. This is changing as the cloud-based nature of social media for
collaborating on projects is growing into a pertinent and useful technology.
Facebook has the ability to create rooms and video chat with invitees. This is
great for student projects which rely upon successful collaboration as the global
pandemic shut down many face to face interactions.

DSCASC 71 | P a g e
For example, video presentation platforms, such as Zoom, Skype, Google
Hangouts, or Web video conferencing such as Cisco Webex, have allowed
instruction to be delivered across great distances. No longer is it necessary for a
faculty member to be in the same room as the students. These technologies have
given rise to the flipped classroom model and changed the way knowledge is
conveyed to students. Faculty today must be more technologically savvy than any
generation previously as the students not only prefer communication through
these mediums, they expect it. The adoption of social media in everyday life is
one of the driving forces behind these changing expectations and how social
media is changing education. Today’s students want to connect with other people
in higher numbers than us old educators may think. There is a complete industry
of applications that are designed to help people increase their social media
following.
The impact of these technologies on education can be considered positive but also
has some negative consequences. It’s not clear what the positive effects of social
media on students or negative effects will have on long term development, but
there are some downsides.
Students & Educators, save up to 90% off Popular Magazines like Sports
Illustrated, The New Yorker, Cosmopolitan and more! Click here to save.

12) Explain section 43 and Section 66 of IT act? (One)


Ans:
Section 43 of the IT Act, imposes a penalty of INR 10 million inter alia, for downloading data
without consent. The same penalty would be imposed upon a person who, inter alia, introduces
or causes to be introduced any computer contaminant or computer virus into any computer,
computer system or computer network.
Section 65 of the IT Act lays down that whoever knowingly or intentionally conceals, destroys,
or alters any computer source code used for a computer, computer programme, computer
system or computer network, when the computer source code is required to be kept or
maintained by law for the time being in force, shall be punishable with imprisonment up to
three years, or with fine which may extend up to INR 200,000, or with both.
Section 66 – Computer Related Offences
Section 66A – Punishment for sending offensive messages through communication service,
etc.
Section 66B – Punishment for dishonestly receiving stolen computer resource or
communication device.
Section 66C – Punishment for identity theft

DSCASC 72 | P a g e
Section 66D – Punishment for cheating by personation by using computer resource
Section 66E – Punishment for violation for privacy
Section 66F – Punishment for cyber terrorism

13) Cyber terrorisms and Cyber trafficking? (One)


Ans:
Cyberterrorism can be also defined as the intentional use of computers, networks,
and public internet to cause destruction and harm for personal objectives.
Experienced cyberterrorists, who are very skilled in terms of hacking can cause
massive damage to government systems and might leave a country in fear of
further attacks. The objectives of such terrorists may be political or ideological
since this can be considered a form of terror.
Cyber-trafficking refers to the use of cyber-space for: • the recruitment of victims;
• advertisement of victims,
• advertisement of victims' services or victims' organs; and for
• attracting clients.

14) Computer network means in IT Act 2020? (One)


Ans: computer network" means the inter-connection of one or more computers
or computer systems or communication device through-
(i) the use of satellite, microwave, terrestrial line, wire, wireless or other
communication media; and
(ii) terminals or a complex consisting of two or more inter-connected
computers or communication device whether or not the inter-connection is
continuously maintained

-All the best

DSCASC 73 | P a g e

You might also like