Important Questions From Cyberspace With Solution: Module 1 Cyber Space
Important Questions From Cyberspace With Solution: Module 1 Cyber Space
Important Questions From Cyberspace With Solution: Module 1 Cyber Space
DSCASC 1|Page
Protocol:
A protocol is a set of rules for formatting and processing data. Network Protocol
are like common language for Computer. The computer with they may use
different software and hardware; however, The use of protocols enables them to
communicate with each other regardless.
A protocol is a standard set of rules that allow electronic devices to communicate
with each other
In a human brain, there are countless neurons which create a spectrum of life.
Similarly, the cyberspace represents millions of computers creating a
spectrum of digital life. Therefore, cyberspace is a natural extension of the
physical world into an infinite world.
4) History of Internet?
Ans:
The concept of Internet was originated in 1969 and has undergone several
technological & Infrastructural changes
• The origin of Internet devised from the concept of Advanced Research Project
Agency Network (ARPANET).
• ARPANET was developed by United States Department of Defense.
DSCASC 2|Page
• Basic purpose of ARPANET was to provide communication among the
various bodies of government.
• Initially, there were only four nodes, formally called Hosts.
• In 1972, the ARPANET spread over the globe with 23 nodes located at
different countries and thus became known as Internet.
• With the invention of new technologies such as TCP/IP protocols, DNS
(Domain Name System), WWW, browsers, scripting languages etc., Internet
provides a medium to publish and access information over the web.
5) What is an Internet?
Ans:
• The Internet is a global collection of computer networks that are linked
together by devices called routers and use a common set of protocols for data
transmission known as TCP/IP
• The primary purpose of the Internet is to facilitate the sharing of information.
• There are many different tools used on the Internet to make the information
sharing possible. Eg: email, list servers, newsgroups, telnet, gopher, FTP, and
the World Wide Web
7) DSN? (Three)
Ans: The Domain Name System (DNS) is the phonebook of the Internet. Humans
access information online through domain names, like nytimes.com or espn.com.
Web browsers interact through Internet Protocol (IP) addresses. DNS translates
domain names to IP addresses so browsers can load Internet resources.
• DNS (Domain Name System) is a network protocol that we use to find the
IP addresses of hostnames
DSCASC 3|Page
• Computers use IP addresses but for us humans, it’s more convenient to use
domain names and hostnames instead of IP addresses.
• If you want, you could visit dayanandasagar.edu by going directly to IP
address 95.85.36.216, but typing in the domain name dayanandasagar.edu it
becomes easier.
• There are 13 root name servers that have information for the generic top
level domains like com, net, org, biz, edu or country specific domains like
uk, nl, de, be, au, ca, in, and many more
8) Protocol Suits?
Ans: The Internet protocol suite, commonly known as TCP/IP, is the set of
communications protocols used in the Internet and similar computer networks.
The current foundational protocols in the suite are the Transmission Control
Protocol (TCP) and the Internet Protocol (IP).
The Internet protocol suite is the conceptual model and set of communications
protocols used in the Internet and similar computer networks.
9) Layers of Internet/OSI?
Ans:
DSCASC 4|Page
10) Advantages & Disadvantages of Internet Community?
Ans: Advantages of internet communities:
• Offers instant information exchange, encourages real life community,
• Used in many activities from home such as, shopping, paying bills and
searching specific information.
• Users of online communities have access to thousands of specific discussions
groups for accessing information in categories such as politics, technical
assistance, social activities, health advices etc.,
• Economically virtual communities can be commercially successful making
money through memberships fees, subscriptions, usage fees and
advertisements.
• Transactions made online are very comfortable and easy provided the seller
has good reputation throughout the community.
Dis-advantages of internet communities:
• Instant communication means fast access, it also means that information is
posted without being reviewed for correctness.
• Difficult to choose reliable sources since there is no editor who reviews each
post and makes sure it is up to certain degree of quality.
• In theory online identities can be kept unidentified which enables people to
use virtual community for fantasy role playing through avatars which is illegal
DSCASC 5|Page
12) WWW Architecture?
Ans:
• URI : Uniform resource Identifier. (URL)
• UNICODE makes it possible to built web pages that can be read and write in
human languages.
• XML (Extensible Markup Language) helps to define common syntax in
semantic web. (Structured web)
• Resource Description Framework (RDF) framework helps in defining core
representation of data for web
• RDF Schema(Diagram/plan) (RDFS) allows more standardized description
of taxonomies and other framework
• Web Ontology Language (OWL)
• SWRL: Semantic Web Rule Language
• RIF : Rules interchange format
DSCASC 6|Page
5. Now the web browser receives the web page, It interprets it and display the
contents of web page in web browser’s window.
DSCASC 7|Page
HTML Tags
HTML tags are like keywords which defines that how web browser will format
and display the content. With the help of tags, a web browser can distinguish
between an HTML content and a simple content. HTML tags contain three main
parts: opening tag, content and closing tag. But some HTML tags are unclosed
tags.
When a web browser reads an HTML document, browser reads it from top to
bottom and left to right. HTML tags are used to create HTML documents and
render their properties. Each HTML tags have different properties.
DSCASC 8|Page
by the Web server, it is up to the owner of the web server to carefully manage
that resource and its associated URL.
DSCASC 9|Page
19) Web Server?
Ans: a program that uses HTTP for serving files that create web pages for users
in responses to their requests that are sent by http clients of their computer is
called web server
Let’s us take an example: if you are browsing or working with your compute and
your computer is connected to internet
A message pops up from your friend indicating that
https://www.linkedin.com/webnotes /blog is very good to read and is very
informative,
You literally copy that link into your browser and press enter, immediately your
system displays the information on the screen.
Now where is this blog--- it is in any of the servers in the world.
Different types of webservers
lighttpd
Sun Java System Web Server
Jigsaw Server
Apache
DSCASC 10 | P a g e
Functions:
Functions of browser are as follow:
- Web browser functions are to provide the resources or information to the user
when asked by them.
- It processes the user inputs in the form of URL like http://www.google.com in
the browser and allows the access to that page.
URL is used to identify the resources and fetch them from the server and displays
it to the client.
- It allows the user to interact with the web pages and dynamic content like
surveys, forms, etc.
- It also allows the user to navigate through the complete web page and see its
source code in the HTML format.
- It provides security to the data and the resources that are available on the web
that is by using the secure methods
• The Web browser requests the • The Web server accepts, approve
server for the web documents and and respond to the request made by
services. the web browser for a web document
or services.
• Doesn’t exist any processing model • There exist three types of processing
for the web browser. models for web server i.e Process-
based, Thread based and Hybrid.
DSCASC 11 | P a g e
• Web browser stores the cookies for • Web servers provide an area to store
different websites. and organize the pages of the website.
• The web browser is installed on the • The web server can be a remote
client computer. machine placed at the other side of
your network or even on the other
end of the globe, or it is your very
own personal computer at home.
Advantages Disadvantages
DSCASC 12 | P a g e
• You have access to paid • You have to wait to see results
advertising services
DSCASC 13 | P a g e
Use:
If you have a campaign running, you are probably able to access click data on
each specific ad. You may see data like this: Ad 1: 4,686 clicks Ad 2: 1,248 clicks
Ad 3: 984 clicks You can see that Ad 1 is the higher performing ad by clicks. You
may want to evaluate this ad and figure out why audiences tend to click on it
more. You may also want to review Ad 3 and try to determine why it is not
receiving as many clicks
DSCASC 14 | P a g e
1) Semantic layer: - It describes the business application that is driving EDI.
For a procurement application, this translates into requests for quotes, price
quotes, purchase orders, acknowledgements & involves.
The information seen at this layer must be translated from a company specific
from to a more generic form so that it can be send to various trading partners,
who could be using a variety of software applications at this end.
When a trading partner sends a document, the EDI translation software converts
the proprietary format into a standard mutually agreed on by the processing
system. When a company receiver the document, their EDI translation software
automatically changes the standard format into proprietary format of their
document processing software so that company can manipulate the information
in whatever way it chooses to.
2) EDI standards: - It specify business form structure and it also influence the
content at application layer.
3) EDI transport layer: - it corresponds closely with the non-electronic activity
of sending a business form from one company A to company B.
The business form could be sent via regular postal service, registered mail,
certified mail or private carrier such as united pariel service (UPS) or simply
faxed between the companies.
4) Physical layer: - Dial up lines
DSCASC 15 | P a g e
Class C
In a Class C network, the first two bits are set to 1, and the third bit is set to 0.
That makes the first 24 bits of the address the network address and the remainder
as the host address. Class C network addresses range from 192.0.0.0 to
223.255.255.0. There are over 2 million possible Class C networks.
Class D
Class D addresses are used for multicasting applications. Unlike the previous
classes, the Class D is not used for "normal" networking operations. Class D
addresses have their first three bits set to “1” and their fourth bit set to “0”. Class
D addresses are 32-bit network addresses, meaning that all the values within the
range of 224.0.0.0 – 239.255.255.255 are used to uniquely identify multicast
groups. There are no host addresses within the Class D address space, since all
the hosts within a group share the group’s IP address for receiver purposes.
Class E
Class E networks are defined by having the first four network address bits as 1.
That encompasses addresses from 240.0.0.0 to 255.255.255.255. While this class
is reserved, its usage was never defined. As a result, most network
implementations discard these addresses as illegal or undefined. The exception is
255.255.255.255, which is used as a broadcast address.
DSCASC 16 | P a g e
30) FTP? (One)
Ans: File Transfer Protocol (FTP) refers to a group of rules that govern how
computers transfer files between systems over the internet. Businesses use FTP
to send files between computers, and websites use FTP for the uploading and
downloading of files from their servers.
DSCASC 17 | P a g e
34) Electronic Record? (One)
Ans: An electronic record is information recorded by a computer that is produced
or. received in the initiation, conduct or completion of an agency or individual
activity. Examples of electronic records include: e-mail messages, word-
processed documents, electronic spreadsheets, digital images and databases.
Note:
• Cyberspace is a concept describing a widespread, interconnected
digital technology.
• of the global technology environment, it is commonly defined as
• standing for the global network of interdependent information technology
infrastructures,
• telecommunications networks and
• computer processing systems.
• Others consider cyberspace to be just a notional environment in which
communication over computer networks occurs.
• As a social experience,
• individuals can interact,
• exchange ideas,
• share information,
• provide social support,
• conduct business,
• direct actions,
• create artistic media,
• play games,
• engage in political discussion, and so on, using this global network.
• The word became popular in the 1990s when the uses of the Internet,
networking, and digital communication started growing.
DSCASC 18 | P a g e
DNS : DOMAIN NAME SYSTEM
Search engines: Bing, Google, yandex, CC Search, duckduckgo, startpage,
swisscows, Gibiru, one search, wiki and many more (17)
DSCASC 19 | P a g e
ARPANET:
ARPANET was created to make it easier for people to access computers,
improve computer equipment,
and to have a more effective communication method for the military.
ARPANET grew from a network of four computer sites to one
with 111 computers belonging to universities, research facilities and the military.
Over a period of time ARPANET started Using satellite links,
ARPANET connected computer systems in the continental United States to
computers in Hawaii and Europe.
Routers: They are responsible for receiving, analysing, and forwarding data
packets among the connected computer networks.
When a data packet arrives, the router inspects the destination address, consults
its routing tables to decide the optimal route and then transfers the packet along
this route.
List servers A list server (mailing list server) is a program that handles
subscription requests for a mailing list and distributes new messages, newsletters,
or other postings from the list's members to the entire list of subscribers as they
occur or are scheduled.
• Protocol suite: The Internet protocol suite is the conceptual model and set of
communications protocols used in the Internet and similar computer networks.
The Open Systems Interconnection (OSI) model describes seven layers that
computer systems use to communicate over a network.
The seven layers are
• Application layer - human interaction layer where applications can access
the network services
• Presentation layer- ensures that data is in the usable format and where the
data gets encrypted
DSCASC 20 | P a g e
• Session layer – maintains connection and is responsible for controlling ports
and sessions
• Transport layer- transmits data through transmission protocols including
TCP
• Network layer- Decides which physical path the data will take
• Data link layer- defines the format of data on the network
• Physical layer- transmits raw bit stream over the physical medium
DSCASC 21 | P a g e
• Dynamic content that is responsive to user input.
• Information flows between site owner and site users by means of
evaluation & online commenting.
• Web 3.0
• AI
• 3D Graphics
• Ubiquity : can access multiple application, every device is connected to
web.
DSCASC 22 | P a g e
• Resource Description Framework (RDF) framework helps in defining core
representation of data for web. RDF represents data about resource in graph
form.
• Taxonomies
• RDF Schema (RDFS) allows more standardized description of taxonomies
and other ontological constructs.
• Ontologies
• Web Ontology Language (OWL) offers more constructs over RDFS. It comes
in following three versions:
• OWL Lite for taxonomies and simple constraints.
• OWL DL for full description logic support.
• OWL for more syntactic freedom of RDF
Rules
• RIF and SWRL offers rules beyond the constructs that are available from
RDFs and OWL. Simple Protocol and RDF Query Language (SPARQL) is
SQL like language used for querying RDF data and OWL Ontologies.
Proof
• All semantic and rules that are executed at layers below Proof and their result
will be used to prove deductions.
Cryptography
• Cryptography means such as digital signature for verification of the origin of
sources is used.
User Interface and Applications
• On the top of layer User interface and Applications layer is built for user
interaction
• Originally, HTML was developed with the intent of defining the structure of
documents like headings, paragraphs, lists, and so forth to facilitate the sharing
of scientific information between researchers.
• Currently HTML is being widely used to format web pages with the help of
different tags available in HTML language.
DSCASC 23 | P a g e
• Create Web site - You can create a website or customize an existing web
template if you know HTML well.
• Become a web designer - If you want to start a career as a professional web
designer, HTML and CSS designing is a must skill.
• Understand web - If you want to optimize your website, to boost its speed
and performance, it is good to know HTML to yield best results.
• Learn other languages - Once you understands the basic of HTML then
other related technologies like javascript, php, or angular are become easier
to understand.
• Responsive UI - HTML pages now-a-days works well on all platform,
mobile, tabs, desktop or laptops owing to responsive design strategy.
• Offline support HTML pages once loaded can be made available offline on
the machine without any need of internet.
• Game development- HTML5 has native support for rich experience and is
now useful in gaming developent arena as well.
Abu Bakr al-Baghdadi, a terrorist
Static
• means the IP address never changes as long as you stay with the same provider
or same server.
Dynamic
• means the IP address can change from time-to-time.
Public
• means the IP address can be visited from any computer in the world.
Private
• means the IP address can only be used by those on the same network.
Shared
• means other people use your IP address for their connection or websites.
Dedicated
• means no one else uses your IP address for their connection or websites.
DSCASC 24 | P a g e
Class identifies the range of your IP address and the default subnet mask.
• Public IP: A public IP address is an IP address that is used to access the
Internet
• Static IP: A static IP address is simply an address that doesn't change
Static IP addresses generally are used by servers or other important
equipment.
• Private IP : Private IP address is used with a local network and public IP
address is used outside the network.
• Public IP address is provided by ISP, Internet Service Provider. Is used to
communicate within the network
• Dynamic IP: Most IP addresses assigned today by Internet Service Providers
are dynamic IP addresses.
• It's more cost effective for the ISP and you.
When DNS was not into existence, one had to download a Host file containing
host names and their corresponding IP address. But with increase in number of
hosts of internet, the size of host file also increased. This resulted in increased
traffic on downloading this file. To solve this problem the DNS system was
introduced.
Domain Name System helps to resolve the host name to an address. It uses a
hierarchical naming scheme and distributed database of IP addresses and
associated names
What is a web server: a program that uses HTTP for serving files that create web
pages for users in responses to their requests that are sent by http clients of their
computer is called web server
Lets us take an example: if you are browsing or working with your compute and
your computer is connected to internet
A message pops up from your friend indicating that
https://www.linkedin.com/webnotes /blog is very good to read and is very
informative,
You literally copy that link into your browser and press enter, immediately your
system displays the information on the screen.
DSCASC 25 | P a g e
Now where is this blog--- it is in any of the servers in the world.
Different types of webservers
• lighttpd
• Sun Java System Web Server
• Jigsaw Server
• Apache
• Following is a list of the types of Facebook pages that you can create −
• Local business or place
• Company, organization or institution
• Brand or product
• Artist, band or public figure
• Entertainment
• Cause or community
• Facebook is a fantastic way to reach out to your audience on different levels.
By posting information, photos, videos and stories, the content you share can
−
• Personalize your brand
• Drive users to your blog
• Generate more traffic directly to your website
• Educate and create awareness about your industry
• Promote the culture of your organization
DSCASC 26 | P a g e
Module 2 – E-commerce
1) What is E commerce? (One)
Ans: e-commerce, the buying and selling of goods through human-computer
interaction over the Internet.
• e-Commerce is generally considered as Sales aspect of e Business.
• E-commerce can be defined as a modern business methodology that addresses
the needs of the organization, merchants and consumers.
• Business is done electronically and there is no need for physical currency or
goods to conduct business.
DSCASC 27 | P a g e
Peer to Peer (P2P)
Mobile Commerce
Business to Government (B2G)
Government to business (G2B)
Government to Citizen (G2C)
Government to Government (G2G)
Consumer to administrator (G2A)
Business to administrator (B2A)
4) Value Chain?
Ans: A value chain is a business model that describes the full range of
activities needed to create a product or service. ... The purpose of a value-
chain analysis is to increase production efficiency so that a company can
deliver maximum value for the least possible cost.
5) History of E-commerce?
Ans: E- commerce started 55 years ago and even this day it is still growing with
technology innovations.
History of how information technology has transformed internet business over
a period of time.
• Invention of telephone lead to the innovation of E commerce
• EDI was widely used as the beginning of e commerce.
• Examples file transfer, fax, video conferencing, workflow, or interactions,
workflow, interaction with a remote computer. Purchase orders,
invoices, inventory documents, payment documents etc
• EDI did not gain much importance until 80’s and also never reached
popularity of web based commerce due to various reason ns such as
• High cost of EDI restricted small and mid sized business
companies from participating in E Commerce
• Slow development hindered the growth of EDI
DSCASC 28 | P a g e
• The complexity involved in Developing EDI
6) Nature of E-commerce?
Ans: e-Commerce is a modern business methodology which helps companies
and consumers to have
• Better business facilities
• Do business with less cost.
• Improve the quality of goods and services
• Increase the speed of transactions.
• Covers online selling and transactions, web retailing
• Wholesaling, electronic banking, interactive marketing
• Multimedia advertising, product information, customer support
• Payment mechanism through bank
ALL THESE ARE DONE ON INTERNET ie on WWW.
7) E-retailing?
Ans:
The Electronic Retailing also called as e-tailing or internet retailing, is the
process of selling the goods and services through electronic media, particularly
the internet. Simply, the sale of retail goods and services online is called as
electronic retailing.
DSCASC 29 | P a g e
• Changes in organizations: previously the organizations was based on front line
workers, the current trend is towards partnering owners and managers across
departments
• Information Density: due to the speed in marketing technology, organizations
keep a close watch on operating costs and maximize profit margins,
shareholders and stakeholders share.
• E-Commerce addresses their concerns quickly, efficiently and at a low cost.
• Personalization/ Customization: Today's customers are collectively
demanding higher quality and better performance, customized way of
producing delivering of products,
DSCASC 30 | P a g e
• Globalization: small companies can appear too big globally.
• Reduced Operational cost- cut down miscellaneous cost, (Paper, customer
support, advertisement, order processing etc)
• Customer Convenience – searchable content, shopping carts, interactive and
user friendly
• Knowledge Management- one can find out who visited and how to create
better value for customers through databases.
DSCASC 31 | P a g e
• This includes features like product catalogue, RFI, rebates and
promotions, broker contacts, and product sample requests.
• These market places are usually active either in a vertical (not really niche)
or horizontal market (Niche)
4. Trading Partner agreements –
• The main object of this model is to automate the processes for negotiating
and enforcing contacts between participating business.
• This model is most expected to become more popular as XML or ebXML.
(electronic Business XML)
• The world wide market is attempting to standardize the exchange of e-
business data via XML such as
• Eg: electronic contracts and Trading partner agreements
• This model helps in customers delivering electronic documents with e
Signature via internet.
• Eg: Turkish govt gave digital signature as the same legal validity for hand
written signature.
• The main advantage of XML over HTML is that XML can assign data
type definition (make the document public or private through tags) to all
the data included in the page
• This helps in
• easing of data transfer and
• More readability since only suitable data are transferred from the search
criteria
DSCASC 32 | P a g e
• Many small businesses can obtain a higher profitability over C2C comparing
to physical store,
• Reduction of overhead costs when conducting business
• Anyone can sell and advertise a product on internet enabling one to easily start
business.
• The most benefit for the customers is selling personal items
• Consumers can increase their market by advertising of product over the
internet as they can both reach national and international customers
• Transaction occurs in a faster rate with the use of online payment gateways.
Dis-Advantages of C2C
• One of the major factors is that it is not always the safest and reliable place to
conduct business.
• Sometimes buyers and sellers do not accommodate each other when
transaction information is needed. This leads to lawsuits for a consumer and
small business.
• Customers come across people with scam, fraud and ill- business intensions.
• Feedback when things go wrong on C2C communities, easily spread very fast
with their stories which effectively is Word – of – mouth advertising.
DSCASC 33 | P a g e
Disadvantages of peer to peer network
• A computer can be accessed anytime.
• Network security has to be applied to each computer separately.
• Backup has to be performed on each computer separately.
• No centralized server is available to manage and control the access of data.
• Users have to use separate passwords on each computer in the network.
• As with most network systems, unsecured and unsigned codes may allow the
to files on a victim's computer to be affected with computer virus.
DSCASC 34 | P a g e
4. Big Data: Big Data or Hadoop methodologies for handling large data.
• It helps retailers in decision making through synchronizing offline data
with online data.
• In a nutshell it allows retailers to understand the hidden consumer patterns.
5. Customization and personalization: in a extremely volatile market one must
be ready to take the challenge and change at all times.
• This helps the retailers in better personalization.
• Where as personalized recommendations will find more prominence in the
market.
6. Valuing customer engagements than conversion ratio : Currently & Slowly
conversion ratio is being replaced by customer engagements.
• With the Raise of e-commerce gathering of customer has become very
tough, hence retailers are engaged in retaining the existing customer
through linking up your site and interacting regularly.
7. Push Notification: Pull browsing has become the latest trend but slowly it is
being overtaken by push notification.
• This like messaging notification, basket notifications for selective items
on your home page are all currently catching up the momentum.
(CleverTap.com)
8. Social Network Sites: Social network sites are currently considered as the
current trend.
• Sites like Facebook, Twitter, and LinkedIn pushes the data about latest
discounts and offers to the respective members.
9. Mobile POS and Accessing Via Mobile: The idea of this is to make every
employee work and allow the customer transact without bringing him to the
billing counter.
• OS like Android 4.2 and above and iOS 6 -10 and above provides
feasibility with apps for customers to do endless jobs with different apps.
10.Retailers Support to Omni Channel Consumers: Mobile apps lets the user
compare prices and check reviews online, also allows you to share the product
details with your friends.
• Retailers integrate their channels into these through supporting consumers
based on their offering.
DSCASC 35 | P a g e
15) Advantages and Disadvantages of Ecommerce? (Three)*
Ans:
ADVANTAGES DISADVANTAGES
DSCASC 36 | P a g e
16) JIT delivery in B2B importance? (One)
Ans: Just-in-Time delivery (also known as JIT delivery) is an important inventory
management process and lean manufacturing technique in supply chain
management. It’s also known as the Toyota Production System (TPS).
JIT delivery involves ordering and receiving inventory for production or sales only as
needed, reducing warehousing costs because inventory is constantly on the move.
This process significantly improves efficiency in manufacturing, while presenting
numerous cost-saving opportunities.
DSCASC 37 | P a g e
IMAP is the current standard for syncing your emails and lets you see all your
Fast mail folders on your email client. You can quickly view subjects and
message bodies of emails. IMAP also lets you sync folders between your home
computer, your phone, and Fast mail on the web, so that you see the same folders
and messages wherever and however you access your email.
DSCASC 38 | P a g e
20) Certifying Authority? (One)
Ans: A certificate authority (CA), also sometimes referred to as a certification
authority, is a company or organization that acts to validate the identities of
entities (such as websites, email addresses, companies, or individual persons) and
bind them to cryptographic keys through the issuance of electronic documents
known as digital certificates. A digital certificate provides:
• Authentication, by serving as a credential to validate the identity of the
entity that it is issued to.
• Encryption, for secure communication over insecure networks such as the
Internet.
• Integrity of documents signed with the certificate so that they cannot be
altered by a third party in transit.
DSCASC 39 | P a g e
23) Key Dimensions of Ecommerce security? (One)
Ans:
DSCASC 40 | P a g e
most consumer interactions with banks. This led to many banks providing the
same services – checking, savings, loans, credit cards, and bill pay – without
having physical locations. Banks like Ally are leaders in the online-only banking
revolution.
2. PayPal and other 3rd party intermediaries
PayPal was developed as a safer way to pay merchants, vendors, and individuals
– instead of giving a company or person your credit card information or banking
information, you could use PayPal as the go-between. PayPal was touting itself
as a secure and encrypted platform for handling payment long before most other
financial organizations had thought to elevate the security. PayPal also quickly
became a viable payment option in e-commerce settings, replacing the need for
entering credit card numbers or bank account numbers by substituting it with one
account login.
3. Online loan and mortgage vendors
Banks aren’t the only financial organizations that are growing their online
presence or streamline the process to be completed online. Companies like
Rocket Mortgage offer customers a way to apply for a mortgage or refinance loan
completely online, while companies like LendingTree help both individuals and
businesses apply for and secure personal loans without ever needing to meet in
person with a loan advisor.
4. Investment companies
Investing has moved to online sites and mobile apps. Banks aren’t the only places
that can help you save money, and financial advisors offices aren’t the only places
to create investment plans. Online only brokers now exist as a way to meet the
online and e-commerce niche of customers looking to simplify and modernize
their investment and savings experiences.
5. Data mining for better products and marketing
One way that online shopping has changed banking is through banks and finance
organizations now having more access to customer behavior and transaction
information. This has led to data analytics being used to discover customer
interests and to develop the kinds of products that help customers have a better
financial experience.
6. Changing in-store payment options
Banks and mobile companies alike have taken to developing technology that
makes it easier to use digital options, like a mobile device, to safely transmit
DSCASC 41 | P a g e
payment data to facilitate payment for in-person transactions at places like the
grocery store and coffee shop. Apple Pay and Google Wallet have made
consumer payment options safer and easier in a digital age.
The future of e-commerce in banking
Overall, the banking and e-commerce experience has been largely dependent on
each other. E-commerce necessitated banking and finance changes and these
changes helped to further the capabilities of e-commerce, eventually leading to
the success in mobile driving more of the success of e-commerce and online
shopping.
Changing technology has created customer experiences that have gone on to
change customer expectations. Businesses can’t afford to not pay attention to the
relationships between commerce, consumers, and technology. Finance
organizations have had to adapt quickly and significantly to be able to keep pace
with the way that technology creates changing customer landscapes, and in some
cases have had to not only change their business model but they’re product
offering.
Understanding the role of e-commerce in banking is one way to better understand
how all businesses can meet the future. Are you taking new and upcoming
technology into consideration? Are you working to be innovative or are you
having a hard time keeping up with customer interests and expectations? Can you
develop a product or service that helps to enhance other experiences that
customers value? Finding ways to add value and convenience to your customer’s
lives is one of the most important ways to stay competitive in any industry in the
age of e-commerce and digital
DSCASC 42 | P a g e
• To enhance the portfolio of citizen centric services.
DSCASC 43 | P a g e
Solution: Partner with companies that help you target your customers. Digital
marketing is preferred over traditional marketing because they can target your
ideal customer. While this might not happen overnight, with A/B testing,
finetuning and analysis – your products could be showing up to potential
customers on different social media platforms.
4. Customer Experience
Customer experience or user experience is key to a successful eCommerce
website. Shoppers expect a similar if not same experience as one they would get
in a brick and mortar store. The flow of the website, the segmentation of the
website and the retail personalization of products based on the shopper’s
preferences are imperative.
Solution: There are several ways to improve the user experience. The most
important would be to have a clean and simple website so that shoppers can
navigate through easily. The next point would be to have clear CTAs (call to
action) so that the shopper knows exactly what to do. Here is a post that shows
you 10 ways to improve user experience.
5. Customer Loyalty
Here are two facts that show the importance of customer loyalty: (a) It can cost
up to 5 times more to acquire a new customer than retaining an existing one and
(b) the success rate of selling to a current customer is 60-70% compared to only
5-20% success rate of selling to a new customer.
The above two facts are testament to how important customer retention or loyalty
is. Once a customer makes a purchase or utilizes a service from a retailer, they
have to make sure that they keep this customer for life. But how is this possible?
Solution: These are a few different methods that can be used to retain customers.
The first would be to have excellent customer service – a customer is happy to
have purchased a great product, but they are ecstatic when the customer service
is on point. The next step is to keep in touch with the customer via a method that
they like – be it an email, SMS or blog posts – be sure to find out what works best
for your customer. The last point would be to let them know about new products,
sales promotions and special coupon codes for being such loyal customers.
6. Converting Shoppers into Paying Customers
One of the biggest ecommerce challenges is to convert visitors into paying
customers. An eCommerce website might have a lot of traffic, a lot of clicks and
impressions but they aren’t making the sales they anticipated. What can they do
to get more sales?
DSCASC 44 | P a g e
Solution: The first and foremost would be to understand why your shoppers aren’t
converting – are you targeting the right audience? Is your mobile website working
seamlessly? Do your online platforms face technical challenges all the time? Does
your customer base trust you? Do you personalize your website for your
customers? Always think from a shopper’s perspective and see if you are doing
everything possible to make them paying customers.
7. Competition & Competitor Analysis
Have you heard of a Jam Experiment? Well it has quite a controversial
conclusion, which is – the less you offer customers the more likely they are to
actually purchase something. A lot of people these days are fatigued by all the
options that are out there. A simple search for something like headphones will
give you thousands of options – how does one make a choice?
From a retailer’s standpoint, how do they stand out from the crowd? How do they
bring shoppers to their website, instead of buying a similar product from their
competitors?
Solution: Always do a thorough analysis of your competitors. Find out what
products they are selling, how they are generating leads and how they keep in
touch with their customers. The next step would be to make sure you stand out –
be it the colors you use, the topnotch functionality of your website or amazing
user experience. And finally, offer services or products that are unique and
relevant to your customer base.
8. Price & Shipping
We have all heard of customers that prefer to purchase products from places that
have free shipping. eCommerce giants like Amazon provide such attractive
shipping deals that customers seldom want to look at other places. How does one
bring down costs for shipping?
Solution: While all eCommerce sites cannot completely get rid of shipping costs,
always look to find options that work for your customer base. Would a
subscription reduce the cost of shipping? Would a certain time of the month give
them lower shipping costs? Or is there a carrier that is reliable but offers a cheaper
rate? Be sure to do your research and find the best possible solution for your
shoppers.
9. Product Return & Refund Policies
According to ComScore, more than 60% of online shoppers say that they look at
a retailer’s return policy before making a purchase. When an eCommerce site
says “no returns or refunds” it makes a shopper nervous and less likely to trust
DSCASC 45 | P a g e
the retailer. When shopping online, customers want the flexibility of making a
mistake that doesn’t cost them.
Solution: Customer satisfaction is the most important factor for any retailer.
Therefore having a flexible return and refund policy not only helps with customer
satisfaction with it also helps with customers making purchases without being
nervous.
10. Choosing the Right Technology/Partners To Fix Your eCommerce
Challenges
Choosing the right technology or partner will make or break your business. A
retailer’s growth might be stunted because their technology is limiting them or
because they have hired the wrong agency to help them manage their projects.
There are a lot of aspects that need to be in place for a successful retail business,
but a good technology foundation is crucial.
Solution: Partner with Vue.ai, a unified Visual A.I. platform that is redesigning
the future of retail commerce to fix all your eCommerce challenges. Using image
recognition and data science, Vue helps retailers generate product, and customer
intelligence, and combine these with market insights, to power growth.
Nothing has propelled eCommerce like the conditions of 2020. While there have
been a lot of exciting and positive changes, there are still online businesses that
struggle with the challenges that eCommerce brings. The above mentioned
solutions are fixes that can help any eCommerce business move closer to their
ideal customers and targeted sales.
Notes:
Business to Consumer (B2C)
Business to Business (B2B)
Consumer to Consumer (C2C)
DSCASC 47 | P a g e
Consumer to Business (C2B)
Peer to Peer (P2P)
Mobile Commerce
Business to Government (B2G)
Government to business (G2B)
Government to Citizen (G2C)
Government to Government (G2G)
Consumer to administrator (G2A)
Business to administrator (B2A)
A value chain is a business model that describes the full range of activities needed
to create a product or service. ... The purpose of a value-chain analysis is to
increase production efficiency so that a company can deliver maximum value for
the least possible cost.
Communication :
It is the ability to deliver products, services, information, or payments via
networks like the internet.
DSCASC 48 | P a g e
That is providing capability of buying and selling product, services and
information on the internet via other online services.
Business
E-Commerce means activities that support commerce electronically by
networked connections. For Example business processes like manufacturing and
inventory etc.
Service:
A tool that addresses the desire of government, firms, consumers and
management to cut service cost while improving the quality of the customer
service and increasing the speed of service delivery.
Commercial
E commerce is an electronic environment that allows sellers to buy and sell
products, services, and information on the internet.
The Products may be physical like Cars, Computers, Books or services like news
or consulting.
Bitnet's NJE (Network Job Entry) network protocols, called RSCS, (Remote
spooling communication subsystem)
were used for the huge IBM internal network known as VNET(an international
computer networking system deployed in the mid-1970s)
DSCASC 49 | P a g e
Selling can be centered around the Global client
Pre-deals, subcontracts, and supply
Financing and protection
Commercial exchanges, requesting, conveyance installment
Product administration and support
Cooperative item improvement
Distributive co-employable working
Use of open and private administrations
Business to organization (client)
Transport and coordinations
Public acquisition
Automatic exchanging of computerized merchandise
Accounting
Catalog Inflexibility : can update e catalog any time like adding new products, or
adjusting prices, direct link capabilities to content information
DSCASC 50 | P a g e
C2B is when consumers have products or services of value that can be consumed
by businesses.
In this model, it's not consumers investing money in something, but the
organization.
But what about that blog post you wrote for the free sample you received?
The focus group you participated in for that new soda?
Now you're seeing the possibilities.
C2B provides businesses with something they need or want from consumers,
whether it's a press release written by an expert or valuable feedback on a new
product.
A customer goes through the onsite process, adds a queen mattress to their cart,
but leaves without purchasing.
The first email they receive contains the “$100 off” incentive but is ignored.
Simultaneously, they’re served a series of ads for the same queen mattress and
“$100 off” coupon on Facebook, Pinterest, Instagram, and YouTube, staggered
over a week to ensure they aren’t bothersome.
Literally they come out with king mattress with $150 Discount..
At this point of time you make a idea of purchasing it.
DSCASC 52 | P a g e
Module 3- E-Governance
1) What is E-governance? (One)
Ans: E-Government can be defined as the use of information and
communications technologies by governmental organizations / institutions.
• This helps to enhance the range, quality of information & services provided
to the citizen in an cost effective and convenient manner.
• This allows the government processes more transparent and accountable
and strengthening democracy.
Definition:
• E-governance is the use of information technologies (WWW, the internet,
and mobile computing)
• E governance has the ability to transform relations with citizens, businesses,
and other arms of government .
These technologies can serve better delivery of government services to
citizens through eliminating corruption, increased transparency, greater
convenience
2) Components of E-Governance?
Ans: Technological Component with Electronic “e” dimension:
• This relates to educating people who are in the administrative structure or
outside its periphery
• Relates to the use of electronic means to develop better connectivity within
and with the system.
It requires use of computers
• in developing the data-base,
• in networking to facilitate the communication,
• in creating e- knowledge to workers so as to increase their
potentiality.
• This focuses on “e” of electronic knowledge and its proper
utilization.
DSCASC 53 | P a g e
Social Component :
• The fundamental duty of any government is to educe a society which is
based on the principles of equality and justice.
• To bring awareness to the society about their haves and haves-not.
• This leads to the commitment towards providing a respectful essence of
life to its people without any discrimination of caste or race which must be
set up.
• When this is possible then people will be aware of their rights & duties on
the one hand, and know about the governmental policies made for them on
related issues.
• This helped in attaining the “e” of equal opportunities (egalitarian) society
with thrust on equality
Cultural Component :
• This begins with beginning of the era of knowledge explosion
• There is a need to re- positioning of some of the value patterns without
eroding the fundamental structure of any social system. (family, religion,
Education etc)
• The need to create value patterns beneficial for e- governance to operate
focusing on work philosophy began to evolve.
• With this the ethical framework became the key factor by discarding
obsolete set of values
• Thus “e” of ethical framework became the focal point in constructing a
morality-based system.
Political Component :
• The political system is essential aspect of governance.
• It holds responsibility of explaining various operative frameworks by
enacting laws.
• This helps to maintain & sustain the cohesive force that is required by
society to integrate its people and accept them to follow a uniform policy
to fulfill their targets.
• This refers to the importance of “e” of enactment of laws to stop society
from disintegration.
DSCASC 54 | P a g e
Psychological Component:
• Developing required psychological environment so as to facilitate
formation and inculcation of right type of attitudes in the people
• Apart form this;
• readiness to connect to people,
• to listen to their queries,
• to look for solutions,
• to improve communicative skills, behavioral modifications
etc.
• Relates to “e” of extension of self so as to have constructive, collaborative,
social relationships.
Service Component:
• The ultimate function of any government is to serve.
• This develops a constant pressure on the government to respond to public
demands
• This leads the government to maintain impartiality, integrity and
transparency in its functioning.
• This explains “e” of empowerment of people in any system.
3) Objectives of E-Governance?
DSCASC 55 | P a g e
Ans:
4) Types of Interactions in E-Governance?
Ans:
DSCASC 56 | P a g e
5) Interventional Strategies of E-Governance? (One)
Ans:
Transitive Counseling:
• In order to reduce the resistance, people need to be prepared for coming
out of transitional phase.
• Thus proper counseling is required regarding changes in attitudes,
reorienting mind sets etc. at various levels of governmental functioning.
Electronic Accessibility:
• There is a need to equip people with necessary knowledge regarding use of
electronic multi media by imparting it through various Institutions.
Institutional Networking:
• Various agencies needed at different levels of governmental functionaries
must be brought within the purview of constitutional framework.
DSCASC 57 | P a g e
7) E-Governance Challenges Specific to India?
Ans:
• Lack of Integrated Services: Most of the e-Governance Services being
offered by state or central governments are not integrated.
• Lack of Communication between different Departments. the
information that resides with one department has no or very little meaning
to some other department of Government.
• Lack of Key Persons: e-Governance projects lack key persons, not only
from technological aspect, but from other aspects as well.
• Population: This is probably the biggest challenge. Apart from being an
asset to the country it offers some unique issues, an important one being
establishing identity.
• Establishing Person Identities. There is no unique identity of a person in
India. Apart from this, measuring the population, keeping the database of
all Indian nationals (& keeping it updated) are some other related
challenges.
• Different Languages: A challenge due to the diversity of the country.
• It enforces need to do governance (upto certain level), in local
languages.
• Ensuring e-Governance in local language is a big task to achieve.
8) Challenges Internationally?
Ans: E-governance is facing numerous challenges world over.
• These challenges are arising from administrative, legal, institutional and
technological factors.
• The challenge includes security drawbacks such as
• Spoofing: Spoofing is the act of disguising a communication from
an unknown source as being from a known, trusted source.
• Tampering: the purpose of altering, damaging, or misusing,
unknowingly modifying some official records
• Repudiation: happens when an application or system does not
adopt controls to properly track and log users' actions
DSCASC 58 | P a g e
• Disclosure: is aimed at acquiring system specific information about
a web site including software distribution, version numbers, and
patch levels, patch files etc.
• elevation of privilege: For example, an attacker with a privilege set
of "read only" permissions somehow elevates the set to include "read
and write.“ uses it for modifying the data.
• Denial of service and other cyber crimes.
• Other sets of problems include implementation parts such as
funding, management of change, privacy, authentication, delivery of
services, standardization, technology issues and use of local
languages.
DSCASC 59 | P a g e
• Promotion of a democratic society
• Public services
• Efficient, cost-effective and responsive governance
• Convenient services to citizens and businesses
• Greater citizen access to public information
• Accountability in delivery of services to citizens
• Management
• Simplicity, efficiency and accountability
• Managing voluminous information and data effectively
• Information services
• Swift and secure communication
DSCASC 60 | P a g e
digital locker provides access to authentic virtual documents. It is a digital
document wallet where you can store your documents such as driving licence,
PAN card, Voter ID, policy documents, etc. You can upload the documents and
keep these safe when you sign up for a Digi Locker account
It opens avenues for direct participation of individuals in governance processes and brings in greater
objectivity and transparency in decision-making processes through ICT. Fundamentally, ICT has the
potential to bring in every individual in a digital network and enable interactive (two-way) flows of
information among them. Under this model, the various services offered by the Government become
directly available to its citizens in an interactive manner. It does so by opening up an interactive
Government to Consumer to Government (G2C2G) channel in various aspects of governance, such as
election of government officials (e-ballots) ; redressing online of specific grievances; sharing of
concerns & providing expertise; opinion polls on various issues; etc.
DSCASC 61 | P a g e
Notes:
E governance is the use of technological communications devices, such as
computers and the Internet, to provide public services to citizens and other
persons in a country or region.
• We will be learning about why e governance
• Components of e governance – technological, social, cultural. & political,
psychological, service
• Objectives of e governance,
• types of e governance
• The four stages of e governance is presence, interaction, transaction, and
transformation.
• E governance initiatives till date
• Best practices of e governance
• Success and failures in e governance
• Types of e governance
• Government-to-Citizen(G2C) The Government-to-citizen refers to the
government services that are accessed by the familiar people. ...
• Government-to-business (G2B) ...
• Government-to-Government (G2G) ...
• Government-to-Employee (G2E)
Examples of e-governance include
• Digital India initiative,
• National Portal of India,
• Prime Minister of India portal,
• Aadhar,
• filing and payment of taxes online,
• digital land management systems,
• Common Entrance Test etc.
DSCASC 62 | P a g e
• Educe - Bring forth
• Fundamental rights such as : the right to equality,
• right to freedom,
• right against exploitation,
• right to freedom of religion,
• cultural and educational rights,
• right to property and
• right to constitutional remedies
Morality based study is Morality is the system through which we determine right
and wrong conduct -- i.e., the guide to good or right conduct. Ethics is the
philosophical study of Morality.
DSCASC 63 | P a g e
Module 4- IT Act 2000/2008
1) Need of IT act a) National reasons b) International reasons?
Ans: National Reasons:
• Increasing use of ICTs in conducting business transactions
• Business entering into contracts, because it was easier, faster and cheaper to
store,
• Transactions and communication through electronic media eliminated the
traditional paper documents.
• Business people were aware of these advantages but were reluctant to interact
electronically because there was no legal protection under the existing laws.
International Reasons:
• International trade through electronic means was growing tremendously and
many countries had switched over from traditional paper based commerce to
e-commerce.
• The United Nations Commission on International Trade Law (UNCITRAL)
had adopted a Model Law on Electronic Commerce in 1996, so as to bring
uniformity in laws governing e-commerce across the globe.
• India, being a signatory to UNCITRAL, had to revise its national laws as per
the said model law. Therefore, India also enacted the IT Act, 2000.
• Because the World Trade Organization (WTO) was also likely to conduct its
transactions only in electronic medium in future.
DSCASC 64 | P a g e
3) Objectives of IT act 2000?
Ans: To provide legal recognition to the transaction done via electronic exchange
of data and other electronic means of communication or E- commerce
transactions
• Involves in the use of alternatives to a paper-based method of
communication and information storage to facilitate the electronic filing of
documents with the Government agencies.
• Give legal recognition to digital signatures for the authentication of any
information or matters requiring legal authentication
• Facilitate the electronic filing of documents with Government agencies and
also departments
• Facilitate the electronic storage of data
• Give legal sanction and also facilitate the electronic transfer of funds
between banks and financial institutions
• Grant legal recognition to bankers under the Evidence Act, 1891 and the
Reserve Bank of India Act, 1934, for keeping the books of accounts in
electronic form.
DSCASC 65 | P a g e
• Provision for establishing a Cyber Regulatory Appellant Tribunal under the
Act to handle all appeals made against the order of the Controller or
Adjudicating Officer.
• An appeal against the order of the Cyber Appellant Tribunal is possible only
in the High Court
• Senior police officers and other officers can enter any public place and search
and arrest without warrant
• Provisions for the constitution of a Cyber Regulations Advisory Committee to
advise the Central Government and Controller.
DSCASC 66 | P a g e
6) Intermediaries’ accountability in IT act 2000?
Ans: Dealing with any specific electronic records,
Such as a person who on behalf of another person accepts, stores or transmits that
record or provides any service with respect to that record which includes
• Telecom service providers
• Network service providers
• Internet service providers
• Web-hosting service providers
• Search engines
• Online payment sites
• Online auction sites
• Online market places and cyber cafes
DSCASC 67 | P a g e
66 Computer Related Offences Imprisonment up to 3 years or fine up
to Rs 5 lakhs
DSCASC 68 | P a g e
9) Digital Signatures? (Two)
Ans: A digital signature is a mathematical technique used to validate the
authenticity and integrity of a message, software or digital document. It's the
digital equivalent of a handwritten signature or stamped seal, but it offers far more
inherent security. A digital signature is intended to solve the problem of
tampering and impersonation in digital communications.
Digital signatures can provide evidence of origin, identity and status of electronic
documents, transactions or digital messages. Signers can also use them to
acknowledge informed consent.
DSCASC 69 | P a g e
10) Cyber Appellate Tribunal? (Two)
Ans: Cyber Appellate Tribunal was established under the Information
Technology Act, 2000.
• The first Cyber Appellate Tribunal in India was formed by the Central
Government.
• This was in accordance with the provisions described under Section
48(1) of the Information Technology Act, 2000.
Constitution: A Cyber Appellate Tribunal shall consist of one person only
(hereinafter referred to as the Presiding Officer of the Cyber Appellate
Tribunal), appointed by the Central Government.
• He shall be appointed based on the qualification, that he/she possess as
an High court judge and experienced for 3 years.
Staff of the Cyber Appellate Tribunal:
• The Central Government shall provide the Cyber Appellate Tribunal
with such officer and employees as that Government may think fit.
• The officers and employees of the Cyber Appellate Tribunal shall
discharge their functions under general superintendence of the
Presiding Officer
• The salaries, allowances and other conditions of service of the officers and
employees of the Cyber Appellate Tribunal shall be such as may be
prescribed by the Central Government.
JURISDICTION : is Appeal to Cyber Appellate Tribunal :
• As provided in sub-section (2), any person distressed by an order made
by Controller or an adjudicating officer under this Act may prefer an
appeal to a Cyber Appellate Tribunal jurisdiction in the matter.
• No appeal shall lie to the Cyber Appellate Tribunal from an order made
by an adjudicating officer with the consent of the parties.
• Every appeal under sub-section (1) shall be filed within a period of forty-
five days from the date on which a copy of the order made by the
Controller
PROCEDURES AND POWERS:
• The Cyber Appellate Tribunal shall not be bound by the procedure laid
down by the Code of Civil Procedure,
DSCASC 70 | P a g e
• Shall be guided by the principles of natural justice and, subject to the
other provisions of this Act and of any rules.
• Cyber Appellate Tribunal shall have powers to regulate its own procedure
including the place at which it shall have its sittings.
• The powers are as follows:
• summoning and enforcing the attendance of any person and
examining him;
• requiring the discovery and production of documents or other
electronic records;
• receiving evidence on affidavits;
• issuing commissions for the examination of witnesses or documents;
• reviewing its decisions;
• dismissing an application for default or deciding it further;
• any other matter which may be prescribed.
DSCASC 71 | P a g e
For example, video presentation platforms, such as Zoom, Skype, Google
Hangouts, or Web video conferencing such as Cisco Webex, have allowed
instruction to be delivered across great distances. No longer is it necessary for a
faculty member to be in the same room as the students. These technologies have
given rise to the flipped classroom model and changed the way knowledge is
conveyed to students. Faculty today must be more technologically savvy than any
generation previously as the students not only prefer communication through
these mediums, they expect it. The adoption of social media in everyday life is
one of the driving forces behind these changing expectations and how social
media is changing education. Today’s students want to connect with other people
in higher numbers than us old educators may think. There is a complete industry
of applications that are designed to help people increase their social media
following.
The impact of these technologies on education can be considered positive but also
has some negative consequences. It’s not clear what the positive effects of social
media on students or negative effects will have on long term development, but
there are some downsides.
Students & Educators, save up to 90% off Popular Magazines like Sports
Illustrated, The New Yorker, Cosmopolitan and more! Click here to save.
DSCASC 72 | P a g e
Section 66D – Punishment for cheating by personation by using computer resource
Section 66E – Punishment for violation for privacy
Section 66F – Punishment for cyber terrorism
DSCASC 73 | P a g e