Fundamentals of E-Comm Notes
Fundamentals of E-Comm Notes
Fundamentals of E-Comm Notes
6)
E-Commerce – Introduction
E-commerce means using the Internet and the web for business transactions and/or
commercial transactions, which typically involve the exchange of value (e.g., money) across
organizational or individual boundaries in return for products and services. Here we focus
on digitally enabled commercial transactions among organizations and individuals.
Meaning of E-Commerce
Early Development:
The history of E-commerce begins with the invention of the telephone at the end of last
century. EDI (Electronic Data Interchange) is widely viewed as the beginning of ecommerce
if we consider ecommerce as the networking of business communities and digitalization of
business information. Large organizations have been investing in development of EDI since
sixties. It has not gained reasonable acceptance until eighties. The meaning of electronic
commerce has changed over the last 30 years.
From the 1990s onwards, electronic commerce would additionally include enterprise
resource planning systems (ERP), data mining and data warehousing. An early online
information marketplace, including online consulting, was the American Information
Exchange, another pre-Internet online system introduced-in 1991. In 1990 Tim Berners-Lee
invented the World Wide Web and transformed an academic telecommunication network
into a worldwide everyman everyday communication system called
internet/www(dot)Commercial enterprise on the Internet was strictly prohibited until 1991.
Although the Internet became popular worldwide around 1994 when the first internet
online shopping started, it took about five years to introduce security protocols and DSL
allowing continual connection to the Internet. By the end of 2000, many European and
American business companies offered their services through the World Wide Web. Since
then, people began to associate a word “E-commerce” with the ability of purchasing various
goods through the Internet using secure protocols and electronic payment services.
1. Development of Business-Relationship:
The business development can be done through the e-commerce being the primary and the
basic object. As their direct contact in between the company and the consumer, their
business relationship will be enhanced. Hence the area of the market can be increased.
2. Better-Customer Service:
As it is done round the clock, the customer will always have online help regarding the
products. As all the information is furnished to the customer, it becomes easy to him to
choose the best product among all other alternatives. As even the service can also be done
through the net immediately, the customer service will be ballooned. By highlighting the
customer service, the companies are trying to subjugate a lion-share in the market.
3. Getting more Customers:
In these days it becomes the mandate of the companies to double its customers, and this
can be done by rendering the value-add service and maintaining the quality. Hence, it is also
one of the primary objectives of the companies which supply impetus for the robust growth
in sales and overall profit.
1. E-Commerce is Technology-Enabled:
Traditional commerce is taking place since times immemorial but E-commerce is result of
integration of digital technology with business processes and commercial transactions. The
technological foundations of E-commerce are internet, WWW and various protocols.
2. Technology Mediated:
In E-commerce buyers and sellers meet in cyber space rather than physical place. Hence E-
commerce does not involve face to face contact.
3. Universality:
Buying and selling take place through websites in E-Commerce. The websites can be
accessed from anywhere around the globe at any time therefore it possess the feature of
universality.
4. Intercommunication:
By using E- commerce we can perform business transactions like accounting and inventory
through computers at global level.
The study of following factors show the need for E-Commerce in modern business era:
1. Wider Audience- The internet provides businesses, access to millions and millions of
people. A 2010 survey by Internet World Stats showed there are 266,244,500 internet users
in North America. On the World Wide Web, companies move beyond geographic limits to
reach wider audience.
2. Cost Efficiency- At the beginning of the internet age in the 1990s, creating websites was a
costly undertaking. As the years passed, building websites became less and less expensive.
In fact, small businesses can now build their own sites.
Increased selection: Many stores offer a wider array of products online than they carry in
their brick-and-mortar counterparts. And many stores that solely exist online may offer
consumers exclusive inventory that is unavailable elsewhere
Affordability: As there is a lot of variety available, customer can choose the product
according to his/her budget.
Less Effort: The product can be easily ordered sitting at home meaning one has to put less
effort contrary of physical shopping where one has to travel or move in marketplace for
finally choosing the product.
Easy Return and Refund: If one faces some problem in product, he/she can easily return the
product and also can get the money back.
Feedback: One can also put their feedback regarding the service on the company’s website
through which customer gets better goods and services eventually
• But there are certain drawbacks that come with ecommerce sites, too. The
disadvantages include:
• Limited customer service: If you shop online for a computer, you cannot simply ask
an employee to demonstrate a particular model's features in person. And although
some websites let you chat online with a staff member; this is not a typical practice.
• Lack of instant gratification: When you buy an item online, you must wait for it to be
shipped to your home or office. However, e-tailers like Amazon make the waiting
game a little bit less painful by offering same-day delivery as a premium option for
select products.
• Inability to touch products: Online images do not necessarily convey the whole story
about an item, and so e-commerce purchases can be unsatisfying when the products
received do not match consumer expectations. Case in point: an item of clothing
may be made from shoddier fabric than its online image indicates.
• Security: Security continues to be a problem for online businesses. Customers have
to feel confident about the integrity of the payment process before they commit to
the purchase. Banks such as ICICI Bank, HDFC Bank, State Bank of India have added
secure payment gateways to process online banking transactions quickly and safely.
• 2. System and Data Integrity: Data protection and the integrity of the system that
handles the data are serious concerns. Computer viruses are rampant, with new
viruses discovered every day. Viruses cause unnecessary delays, file backups, storage
problems, and other similar difficulties. The danger of hackers accessing files and
corrupting accounts adds more stress to an already complex operation.
• Products-People Won’t Buy Online:
• Imagine a website called furniture, com or living.com, where venture capitalists are
investing millions in selling home furnishings online. In the case of a sofa, you would
want to sit on it, feel the texture of the fabric etc. Beside the sofa test, online
furniture stores face costly returns which makes the product harder to sell online.
•
• BASIC REQUIREMENT OF ECOMMERCE
• 2. Flexible Return Policy
• Fact: “42% of online shoppers have returned an item they bought online and also
63% of online shoppers said that they would not purchase if they couldn’t find the
return policy.”
• There’s no way to avoid returning the product. After all, people can’t see, touch, or
try the products before they buy them—they’re making their decision based on your
product’s photography, description and reviews.
• Sometimes the product won’t work out as expected, and there is always the
possibility of a manufacturing defect or damage during the delivery process.
• Requirement: There should be an easy way for the customers to return or exchange
an item they are not happy with.
• Mobile-Friendly Website
• The increasing mobile phone usage has had a massive impact on the growth of
ecommerce as it allows consumers to instantly make purchases wherever they may
be.
• Requirement: Ecommerce stores that are not optimized for mobile devices forces
your customers to zoom in and out to because of improper visualization while
navigating to another page. So, it is highly recommended to optimize your site for
mobile phones, tablets, etc.
• Fact: “38% of people will leave a website if they find the layout unattractive or too
difficult to use.”
• Requirement: Themes must support the website owners to edit the content of the
products and manage the portfolios. It should include blog posts to promote the
product. Also, it should reflect the product niche or business vertical.
• Nowadays, customers want to know and interact with the brand at multiple
touchpoints. They also want to know the story behind the creation of the brand.
• Requirements: Blogging and product description help buyers learn about products
and platforms in a detailed manner. So, it's necessary for you to provide a highly
clear and relevant content about the product.
• Most of the customer expects no shipping charge or less shipping charges and expect
trusted delivery services.
• People are most likely to shop online during their lunch hour. According to Infinite
Analytics, an analytics company, 11 a.m. to 2 p.m. is the time when e-commerce
websites witness the most traffic. The research also revealed that after 2 p.m., as
evening approaches, the traffic starts to peter out. The least traffic is during the
morning hours.
• According to Ernst & Young, Cash on Delivery (COD), is one of the key growth drivers
of e-commerce and accounts for 50% to 80% of online transactions in India. COD is a
risk-free transaction for a customer who is still testing online shopping.
• It’s all about discounts
• Everyone loves a good deal. Discounts are one of the major factors that attract
people to shop online. In fact, a recent study conducted by YourStory in
collaboration with Kalaari Capital, revealed that 32% of Indian shoppers viewed a
product catalogue online at least once a day. The study also indicated that there is a
pattern where customers are making many impulsive and unplanned purchases
based on what they like while browsing. The same study found that 74% of shoppers
preferred shopping online because of discounts!
• COD is a risk-free transaction for a customer who is still testing online shopping.
• Women in India are becoming financially and economically more powerful and their
purchasing power has increased. According to Ernst & Young’s recent article, Gender
Inclusiveness: Women’s Growing Role in the Buying Decision, urban, earning women
already form an important consumer segment and a significant market for the e-
tailing industry in India.
• Today, Indian women are increasingly influencing buying decisions and contributing
to the economic prosperity by becoming a fast-growing consumer market.
Concept of Internet
The Internet is “the global system of interconnected computer networks that use the
Internet protocol suite (TCP/IP) to link devices worldwide.” It has changed the way we
do our daily chores. The usual tasks that we perform like sending an email, looking up
train schedules, social networking, paying a utility bill is possible due to the Internet. The
structure of internet has become quite complex and it cannot be represented as it is
changing instantaneously. Every now and then some resources are being added while
some are being removed. Internet comprises of various networks that include public,
private, government, business, and academic sectors linked together using different
electronic technologies. It interconnects global networks with local and vice-versa. The
resources of Internet range in both information (including digital documents like image,
video, text etc.) and services (including information sharing, email, video conferencing
g) domains. Though the terms Internet and World Wide Web are used interchangeably
in lay man terms they are not the same. It is common practice to say "going on the
Internet" whenever we open any web page on a browser. However, the World Wide
Web or the Web is one of the most popular Internet services available. The Web is a
collection of interconnected documents (web pages) and other web resources, linked by
hyperlinks and URLs. It uses HTTP as an underlying protocol for information transfer
which is one of the several other protocols available in networking theory.
Evolution of Internet
The Defence Department of US, in 1969, funded a research project for developing a
robust network that should be resilient to even bombing. The main objective was to
develop a network that should be secure and robust enough to withstand even a nuclear
attack. This project was named as the ARPANET. The idea was to have a distributed
network in order to avoid attacks on the central authority. This led to the development
of Local Area Network (Local Area Network) and workstations equipped with the ability
to connect to the Ethernet. These local area networks were eventually connected to the
ARPANET. The distributed aspect of the ARPANET catalysed the rapid evolution of the
ARPANET over the next decade. Initially, ARPANET used National Control Protocol (NCP)
as the standard set of rules defining the communication between the computers
connected to ARPANET. However, owing to the rapid development of the information
technology, NCP was replaced by the Transmission Control Protocol/Internet Protocol
(TCP/IP). The TCP protocol fragments the messages into packet streams at the source
and performs reassembly of these packets at the destination. The transmission of these
packets from source to destination is handled by the IP. The IP protocol takes care of the
addressing conventions and ensures the delivery of the packet at the destination across
multiple nodes or even multiple networks. The agile nature of the TCP/IP protocol in
handling the communication across multiple heterogeneous networks attracted the
other networks to connect to the ARPANET and employ TCP/IP as their underlying
communication protocol. Eventually, the ARPANET developed into a large network of
networks and is now called as ‘Internet’.
3 Basic Concept
The Internet is a global collection of computer networks that are linked together by
devices called routers and use a common set of protocols for data transmission known
as TCP/IP (transmission control protocol / Internet protocol). The primary purpose of the
Internet is to facilitate the sharing of information. There are many different tools used
on the Internet to make this possible. Some of the more common tools include email,
list servers, newsgroups, telnet, gopher, FTP, and the World Wide Web. Probably the
most popular of all Internet tools is the World Wide Web.
Characteristics of Internet
Easy to Use
The software that is used to access the Internet or web browser is designed in such a way
that is very simple and can be easily learned and used. Also, it is easy to develop.
Flexibility
Flexibility in terms of transfer of data. Basically, the internet network carries information in
digital form in a majority of cases instead of voice information in analog form.
Accessibility
Internet service is a worldwide service and access to all. People located in remote or
anywhere interior can also use the Internet. Therefore, information through the internet
flows across the networks in a standardised manner.
Limitations of Internet
If any person is spending much time on the Internet connected devices, he can be addicted
to the Internet. An Internet addictive person can lead to spending his precious time on the
Internet, rather than doing something productive.
A person who uses the Internet very frequently can face abusive or trolls' people. Another
issue cyberbullying is also increasing rapidly over the years. Sometimes, you can be tracked
on the Internet by hackers or unauthorize persons; they can be harmful to you by stealing
your personal information.
Spam and advertising
The Internet is the best place to advertise any service or product as compared to traditional
advertising methods (for example, TV, newspaper, and radio). But you might see more spam
in your inbox than junk mail in real life because digital advertising can be sent on a massive
scale.
The Internet is the best creation to offer connectivity and enable people to work from
anywhere. Therefore, anyone can expect you to be available any time to work, even if you
are not available to work there. For instance, you have received an important work-related
e-mail while you may be at home and then without getting paid, end up working on the
content of that e-mail.
There are various malicious users and computer hackers that can steal your personal
information and hack accounts, which can be used for identity theft and can be harmful to
you personally. As the Internet connects all computers to each other, so hackers can quickly
identify what computers are vulnerable to attack by scanning millions of computers.
Additionally, the Internet also enables students to find others to do their homework and
offers ways to cheat on their studies.
The sites have an instant gratification effect that we use on the Internet every day. On-
demand, they also offer a large amount of menu of things to experience and think at any
moment. Getting information this way can affects your interactions and make you more
impatient and less focused on your activities. To solve this problem, try to focus on more
productive real-life activities like exercise or cleaning, and balance this natural effect with
time away from social media.
HTTP
HTTP is the short form for Hypertext Transfer Protocol. An example of the standard URL is
http://www.google.com. The prefix http in the URL designates the protocol being used for
communication. The HTTP protocol is used to access hypertext documents on the World
Wide Web.
URL
URL refers to Uniform Resource Locator. URLs are used as the address of the documents
available on the World Wide Web. A URL is the fundamental identifier of any resource
available on the web e. g., hypertext pages, images, and sound files. The standard format of
a URL has
been specified as –
protocol://hostname/
other_information
A protocol is, basically, a specification of the flow of information in a network. The
protocol required for accessing the resources available on the web is called Hyper Text
Transfer Protocol (HTTP). Other protocols supported by the web browsers include
telnet, FTP, Gopher, etc. The name of the protocol is followed by a colon, two forward
slashes, and then the hostname. The hostname refers to the computer having the
requested resource. Hostname is followed by a single forward slash and links to
subdirectories or any particular file. The path to the directory holding the requested file
or resource may contain single forward slashes.
Website
Website refers to a collection of web pages usually written in markup language. For
example: www.google.com refers to the website of Google having ‘com’ as the domain
name. Websites can be understood as a location on the World Wide Web that holds the
resources which people can request when required. The first or the initial page of any
website is known as the home page of that particular website.
WWW stands for World Wide Web. A technical definition of the World Wide Web is −
All the resources and users on the Internet that are using the Hypertext Transfer
Protocol HTTP. The World Wide Web is the universe of network-accessible information,
an embodiment of human knowledge. The World Wide Web is a way of exchanging
information between computers on the Internet, tying them together into a vast
collection of interactive multimedia resources. It is a hypertext interface to internet
information resources. Internet and Web is not the same thing: Web uses internet to
pass over the information.
What is Email?
Known as Email (Electronic Mail), it is the most popular communication system on the
Internet. Email is a system that allows us to send messages from local computers to remote
computers, be it on a home network or a worldwide network such as the Internet.
Advantages of Email
The main advantages of email are:
Immediacy
It allows you to send a message to anyone in the world in a matter of seconds.
Asynchronous
You can send the email and let the person read it whenever they want.
Free
Today, there are thousands of free email providers
Send documents
You can send messages and attach personal documents, photos, videos, and much more.
Disadvantages
Disk storage
Some free providers impose stringent limits on their users, especially regarding the disk
quota they assign to the box.
Single box
Free providers also generally only allow you to create one package unless you have a paid
provider.
Spam
Since its inception, a big problem with email is a large amount of junk mail (spam) that you
will receive daily or weekly.
Send messages
Receive messages
Create, modify and delete folders
Manage spam (junk mail)
Create forwarders and autoresponders
Send attachments
Create contacts and use them to send emails
Forward, Reply, and Delete messages
Change identities, ideal for users who use the same computer
Prioritize sent emails (high, medium, or low)
Create mailing lists to send group mailings
Send a single copy or blind copy to multiple senders
Calendar: ideal for organizing your most important affairs
Golden rules when Sending an Email
Comparable to everything on the Internet and in real life, here are all the time rules and tips
to follow while sending or replying to an email:
Try to be as brief as you can. Nobody likes to read a bible. That’s what voice or audio
messages are.
Try not to abbreviate words. Write to them correctly.
Please correct your spelling before submitting it.
Please choose the subject of the email as a summary of it
Do not use capital letters, except to start a sentence. Take to mean as a shout or
loud voice.
Types of Email Accounts
Simply put, the email can be personal or corporate, or professional. Let’s see what it’s
about:
Personal Mail
It is usually the most common type of email, the one you use for your business. It serves to
send mail to friends and acquaintances, such as family, or even use it to register on social
networks, web and mobile applications, or actively subscribe to different newsletters on
topics of interest to you.
Corporate Mail
The corporate email remains often used for your work, both your own company and one for
the third company you work. The email you will want to use to contact your clients, business
contacts, and others. You will send estimates and receive formal communications regarding
the company you represent.
Collaborative tools are situated generally integrated into corporate emails, such as Google’s
Gsuite, which includes access to Google Docs, Sheets, and others, commonly used by work
teams.
Gmail
Google’s popular email service is today, and for years, the most widely used free email
service in the world. It also has a variant called G-Suite, which is the paid version of Google’s
mail suite and office applications, which is what we mentioned above, a perfect integration
for companies and work teams.
It also stands out for having one of the best spam filters globally, something many other
providers often fail. He is always receiving updates and new news from his development
team, who seek to make your life easier every day. The downside of the paid version is that
they charge almost $ 5 per box, which becomes very expensive if you have many
compartments, considering that there are similar services for much less.
Outlook
The outlook is one of the first mail services in the world. It became popular thanks to the
famous Outlook Express that stood installed on all computers with Microsoft Windows. But
the forerunner of this favorite email service is Hotmail, where almost everyone has or had
an email until Gmail’s appearance.
For nearly a decade, Microsoft bought Hotmail and merged it into what we know today as
Microsoft Outlook. Microsoft’s free email service and the gateway to corporate customers
who later decide to subscribe to Microsoft 365 email are the paid version. It costs like G-
Suite about $ 5 per month.
Yahoo!
The email from Yahoo! Mail was another top-rated service during the 90s and 2000s. It was
a pioneer on the Internet, which could not keep up with the changes, and which today is a
shadow of what it used to be. Even so, they continue to offer free service as always, and of
high quality.
FTP may be used by a busines or individual to transfer files from one computer system to
another or by websites to upload or download files from their servers.
Telnet
is an application protocol used on the Internet or local area network to provide a
bidirectional interactive text-oriented communication facility using a
virtual terminal connection. User data is interspersed in-band with Telnet control
information in an 8-bit byte oriented data connection over the Transmission Control
Protocol (TCP).
Telnet was developed in 1969 beginning with RFC 15, extended in RFC 855, and
standardized as Internet Engineering Task Force (IETF) Internet Standard STD 8, one of the
first Internet standards. The name stands for "teletype network".
Intranet:
Intranet is owned by a single organization and is a tool for sharing information throughout
the organization. It is the type of Internet that is used privately. Since, intranet is a private
network so no one can use the intranet whose have not valid username and password. In
intranet, there are a limited number of connected devices as compared to internet.
Intranet is highly secure and has a small number of visitors. It is used in order to get
employee information, telephone directory etc.
Extranet:
Extranet is owned by either a single or a many organization. It is managed on a contractual
basis between organizations and is a tool for sharing information between the internal
members and external members. Like intranet, it is also a private network so only those
who have a valid username and password can use the extranet. Extranet is used to check
status, access data, send mail, place order etc.
Let’s see the difference between Extranet and Intranet which are given below:-
S.N
O Intranet Extranet
It’s restricted area is upto an It’s restricted area is upto an organization and
11. organization. some of its stakeholders.
If any person is spending much time on the Internet connected devices, he can be addicted
to the Internet. An Internet addictive person can lead to spending his precious time on the
Internet, rather than doing something productive. Thus, anyone who is addicted to surf the
Internet can hamper workplace productivity as well.
A person who uses the Internet very frequently can face abusive or trolls' people. Another
issue cyberbullying is also increasing rapidly over the years. Sometimes, you can be tracked
on the Internet by hackers or unauthorize persons; they can be harmful to you by stealing
your personal information.
If you are spending your more time on the Internet, so it will be easier for hackers to find
your personal information through various means. To run business without as much fear of
being caught, the web deep, and the hidden places on the internet can also be a place for
criminals. Additionally, there are several people that provide criminals more ways to solicit
their goods.
The Internet is the best place to advertise any service or product as compared to traditional
advertising methods (for example, TV, newspaper, and radio). But you might see more spam
in your inbox than junk mail in real life because digital advertising can be sent on a massive
scale.
In modern times, there is a huge amount of content available on the Internet. Also, there
are various resources that contain a large amount of data, such as Wikipedia, and some sites
are also available that have less desirable content. Accordingly, users can see pornographic
or violent images that they may not want to see while using sites.
The Internet is the best creation to offer connectivity and enable people to work from
anywhere. Therefore, anyone can expect you to be available any time to work, even if you
are not available to work there. For instance, you have received an important work-related
e-mail while you may be at home and then without getting paid, end up working on the
content of that e-mail.
The sites have an instant gratification effect that we use on the Internet every day. On-
demand, they also offer a large amount of menu of things to experience and think at any
moment. Getting information this way can affects your interactions and make you more
impatient and less focused on your activities. To solve this problem, try to focus on more
productive real-life activities like exercise or cleaning, and balance this natural effect with
time away from social media.
If you are surfing the Internet frequently, playing games and spending too much time on the
computer, it can also lead to obesity and an unhealthy lifestyle. Also, a person who spends
too much time on the computer can face a problem like carpal tunnel syndrome as a
computer requires a lot of repetitive movement.
You are required to move your body parts to operate the computer, for example, typing and
moving hand to the mouse are repetitive actions that can cause injuries. Understanding
computer ergonomics, keeping the proper posture, and taking breaks can all help delay or
prevent these injuries.
The following are the methods of connecting a computer to the Internet using software and
hardware peripherals.
Three
Hardware Requirement:
• To connect the Internet, any one of the following is mandatory.
• NIC- Network Interface Card(wired/ wireless) facility is the most important hardware
required to connect Internet. For example, the Laptop can be connected Internet through
the wired/wireless.
• Wi-Fi router or Hotspot is used to connect the Internet using wireless network
• Internet Connectivity such as Dial-up connection, ISDN, DSL, Cable TV, wired and wireless
(Cellular) Network.
Software Requirement
• The operating system should support TCP (Transfer Control Protocol) / IP (Internet
Protocol), SMTP (Simple Mail Transfer Protocol), FTP (File Transfer Protocol), HTTP (Hyper
Text Transfer Protocol) and HTTPS (Hyper Text Transfer Protocol Secured) protocols.
• Browsers and other Internet clients access to the web applications such as Outlook, Gmail,
WhatsApp, Facebook, Twitter and etc.
Connection Types:
Dial-up Connection :
A dial-up connection is established when two or more data communication devices use
a Public Switched Telephone Network (PSTN) to connect to an Internet Service Provider
(ISP) from computers. Many remote locations depend on Internet dial-up connections
because broadband and cable are rare in remote areas with low population. Internet Service
Providers often provide dial-up connections, a feasible alternative for budget-conscious
subscribers.
ISDN
DSL:
Digital Subscriber Line (DSL) is a high-speed Internet service for homes and businesses that
competes with cable and other forms of broadband Internet. DSL provides high-speed
networking over ordinary Telephone lines using broadband modem technology. The
technology behind DSL enables Internet and telephone service to work over the same
phone line without requiring customers to disconnect either their Voice or Internet
connections.
The cable TV network can be used for connecting a computer or a local network to the
Internet, competing directly with DSL (Digital Subscriber Line) technology.
This type of network is classified as HFC (Hybrid Fiber-Coaxial), as it uses both fibre optics
and coaxial cables. The connection between the cable TV company to the distribution points
(Optical nodes) is made using fiber optics, with distances up to 25 miles (40 km). Each
optical node is typically serves between 500 and 2,000 clients (customers).
search engine is a software program that helps people find the information they are looking
for online using keywords or phrases.
Search engines are able to return results quickly—even with millions of websites online—by
scanning the Internet continuously and indexing every page they find.
When a user enters a search term, the search engine looks at the website page titles,
contents and keywords it has indexed and uses algorithms (step-by-step operations) to
produce a list of sites—with the most relevant websites at the top of the list.
Companies use search engine optimization (SEO) to help search engines recognize their
websites as highly relevant to particular searches. Popular search engines include Google,
Bing and Yahoo.
hey search the World Wide Web in a systematic way for particular information specified in a
textual web search query. The search results are generally presented in a line of results,
often referred to as search engine results pages (SERPs). The information may be a mix of
links to web pages, images, videos, infographics, articles, research papers, and other types
of files. Some search engines also mine data available in databases or open directories.
Unlike web directories, which are maintained only by human editors, search engines also
maintain real-time information by running an algorithm on a web crawler. Internet content
that is not capable of being searched by a web search engine is generally described as
the deep web.
A credit card is a thin rectangular piece of plastic or metal issued by a bank or financial
services company, that allows cardholders to borrow funds with which to pay for goods
and services with merchants that accept cards for payment. Credit cards impose the
condition that cardholders pay back the borrowed money, plus any applicable interest, as
well as any additional agreed-upon charges, either in full by the billing date or over time.
An example of a credit card is the Chase Sapphire Reserve. (You can read our Chase
Sapphire Reserve credit card review to get a good sense of all the various attributes of a
credit card).
In addition to the standard credit line, the credit card issuer may also grant a separate
cash line of credit (LOC) to cardholders, enabling them to borrow money in the form of
cash advances that can be accessed through bank tellers, ATMs or credit card convenience
checks. Such cash advances typically have different terms, such as no grace period and
higher interest rates, compared to those transactions that access the main credit
line. Issuers customarily pre-set borrowing limits, based on an individual's credit rating. A
vast majority of businesses let the customer make purchases with credit cards, which
remain one of today's most popular payment methodologies for buying consumer goods
and services.
The benefits of credit cards are innumerable, and some prime ones are:
1. Buy on credit:
What makes a credit card attractive is the credit limit allowed to the cardholder. You can
buy anything within that limit and pay later. Your monthly budget will not affect, even if you
buy items of high value on credit. One among the most important benefits of credit card is
you can convert the total amount of your purchases into low-cost EMIs to enable you to
repay it easily over a period of time. This has helped revolutionize the shopping experience.
You can travel anywhere, without carrying much money if you have this card. Being the
most accepted method of payment, you can use a credit card to pay anything.
There are a few credit cards that allow you to withdraw money up to a certain limit in case
of emergency, with no interest charged up to 45 to 50 days. You can make use of it in times
of financial emergency.
These cards come with reward points when you use them. For instance, IDFC FIRST
Bank credit cards offer unlimited and never-expiring reward points, which are easily
redeemable.
5. Insurance coverage:
You get personal accident coverage, as well as comprehensive travel insurance coverage
and this is one of the significant benefits of credit cards, which make them attractive.
The uses of credit cards in travel make them important. When it comes to IDFC FIRST Bank
credit cards, they give you a unique experience through complimentary lounge access at the
airports and railway stations in India and priority check-in. Other than these, you can also
enjoy discounts on food in more than 280 restaurants.
The advantages of credit cards extend to discounts on some of your favourite entertainment
and dining outlets, travel and shopping apps, etc. You can also enjoy fuel surcharge waivers
at petrol pumps across the country. To check the host of offers, click -
8. Improve your credit score:
The benefits of credit cards do not limit to shopping on credit; instead, it helps improve your
credit score. If you know how to use a credit card and how to make use of the credit period,
and repay the amount used on time, you can boost your CIBIL score. This will help you
obtain loans, without any difficulty in future.
9. Offers safety:
You don’t have to carry much money if you have a credit card.
The statements you get every month from net banking helps you check your expenses and
plan the repayment without any delay.
KEY TAKEAWAYS
Debit cards eliminate the need to carry cash or physical checks to make purchases,
and they can also be used at ATMs to withdraw cash.
Debit cards usually have daily purchase limits, meaning it may not be possible to
make an especially large purchase with a debit card.
Debit card purchases can usually be made with or without a personal identification
number (PIN).
You may be charged an ATM transaction fee if you use your debit card to withdraw
cash from an ATM that's not affiliated with the bank that issued your card.
Some debit cards offer reward programs, similar to credit card reward programs,
such as 1% back on all purchases.
How a Debit Card Works
A debit card is usually a rectangular piece of plastic, resembling any charge card. It is linked
to the user's checking account at a bank or credit union. The amount of money that can be
spent with it is tied to the account size (the amount of funds in the account).
In a sense, debit cards work as a cross between ATM cards and credit cards. You can use
them to get cash from a bank's automated teller machine, as with the former; or you can
make purchases with them, like the latter. In fact, many financial institutions are replacing
their plain vanilla, single-purpose ATM cards with debit cards that are issued by major card-
payment processors such as Visa or Mastercard. Such debit cards come automatically with
your checking account.
Whether being used to obtain cash or to buy something, the debit card functions in the
same way: It draws the funds immediately from the affiliated account. So, your spending is
limited to what’s available in your checking account, and the exact amount of money you
have to spend will fluctuate from day to day, along with your account balance.
The chip on a smart card can be either a microcontroller or an embedded memory chip.
Smart cards are designed to be tamper-resistant and use encryption to provide protection
for in-memory information. Cards with microcontroller chips can perform on-card
processing functions and manipulate information in the chip's memory.
Smart cards are used for a variety of applications but are most commonly used as credit
cards and other payment cards. The payment card industry's support of smart cards for the
Europay, Mastercard and Visa (EMV) card standard has driven the distribution of smart
cards. Smart cards capable of short-range wireless connectivity can be used for contactless
payment systems. They can also be used as tokens for multifactor authentication (MFA).
International standards and specifications cover smart card technology. Some of those
standards and specs are industry-specific applications. In the United States, smart card
technology conforms to international standards -- International Organization for
Standardization/International Electrotechnical Commission 7816 and ISO/IEC 14443 --
backed by the Secure Technology Alliance.
The first mass use of smart cards was Télécarte, a telephone card for payment in French pay
phones, launched in 1983. Smart cards are now ubiquitous and have largely
replaced magnetic stripe -- also known as mag stripe -- card technology, which only has a
capacity of 300 bytes of nonrewriteable memory and no processing capability.
Smart cards communicate with readers via direct physical contact or using RFID or another
short-range wireless connectivity standard. The chip or processor on the card contains data
that the card reader accesses. The processor on the card contains a basic operating system
(OS) that lets the card hold, transmit and protect the data.
credit cards;
Smart cards, such as debit cards, are often used with a personal identification number (PIN).
Organizations also use them for security purposes, as MFA tokens and for
authenticating single sign-on (SSO) users and enabling passwordless authentication.
Contact smart cards are the most common type of smart card. They are inserted
into a smart card reader that has a direct connection to a conductive contact
plate on the surface of the card. Commands, data and card status are
transmitted over these physical contact points.
Hybrid smart cards contain more than one smart card technology. For example,
a hybrid smart card might have an embedded processor chip that is accessed
through a contact reader and an RFID chip for proximity connection. The
different chips may be used for different applications linked to a single smart
card -- for example, when a proximity chip is used for physical access control to
restricted areas and a contact chip is used for SSO authentication.
Memory smart cards only contain memory chips and can only store, read and
write data to the chip. The data on these cards can be overwritten or modified,
but the card itself is not programmable. So, data can't be processed or modified
programmatically. These cards can be read-only and used to store data such as a
PIN, password or public key. They can also be read-write and used to write or
update user data. Memory smart cards can be configured to be rechargeable or
disposable, in which case the data they contain can only be used once or for a
limited time before being updated or discarded.
Smart cards can also be categorized by their application, such as credit card, debit card,
entitlement or other payment card, authentication token and so on.
Multiple uses. Multiservice smart card systems let users access more than one
service with one smart card.
Smart credit cards became common as banks embraced the EMV standard.
Compatibility. Not all smart card readers are compatible with all types of smart
cards. Some readers use nonstandard protocols for data storage and card
interface, and some smart cards and readers use proprietary software that is
incompatible with other readers.
Security vulnerabilities. Smart cards are secure for many applications, but they
are still vulnerable to certain types of attack. For example, attacks that can
recover information from the chip can target smart card technology. Differential
power analysis (DPA) can be used to deduce the on-chip private key used by
public key algorithms, such as the Rivest-Shamir-Adleman (RSA) algorithm. Some
implementations of symmetric ciphers are vulnerable to timing attacks or DPA.
Smart cards may also be physically disassembled in order to gain access to the
onboard microchip.
Examples of smart cards
Examples of smart card applications include the following:
Payment cards, including debit and credit cards issued by commercial credit card
companies and banks, are used for financial transactions.
Transit cards let local and regional transit systems process payments, as well as
give riders points on their purchases.
Smart health cards help medical facilities securely store patient medical records.
SIM cards, used inside of digital cameras and smartphones, store media and
other data.
E-banking
Definition: E-banking is a blanket term used to indicate a process through which a customer
is allowed to carry out, personal or commercial banking transactions using electronic and
telecommunication network.
E-banking
Definition: E-banking is a blanket term used to indicate a process through which a customer
is allowed to carry out, personal or commercial banking transactions using electronic and
telecommunication network.
It is a product offered by banks which facilitates online banking, with the help of which the
customer can have access to the bank account in just one click.
E-banking covers facilities such as – fund transfer, checking account statements, utility bill
payments, opening of bank account, locating nearest ATM, obtain information on financial
products and services, applying for loans, etc. using a personal computer, smartphone,
laptop or personal digital assistant.
E-banking Services
In simple words, e-banking refers to a banking arrangement, with which the customer can
perform various transactions over the internet, which is end-to-end encrypted, i.e. it is
completely safe and secure.
E-banking promotes paperless/cashless transactions. It comes with a number of rights,
responsibilities and fees as well. The range of services covered under E-banking are:
1. Internet Banking: A banking facility provided to the customers through which the
customers are able to perform a number of monetary and non-monetary
transactions, using the internet, through the bank’s website or application.
2. Mobile Banking: Almost all the banks have designed their mobile applications with
which you can perform transactions at your fingertips. For this, four things are
required – a smartphone, internet, mobile application, and mobile banking service
enabled in your bank account.
3. ATM: Automated Teller Machine, popularly known as ATM is one of the most
common and initial service, provided under e-banking. It is not just a machine with
which you can withdraw cash as and when required, but it also allows you to check
your account status, transfer fund, deposit fund, changes mobile number, change
Debit Card PIN, i.e. Personal Identification Number.
4. Debit Card: Debit cards are used in our day to day life so as to perform end number
of transactions. Debit cards are linked to the customer’s bank account and so the
customer only needs to swipe the card, in order to make payment at Point of Sale
(POS) outlets, online shopping, ATM withdrawal. In this way, the amount is deducted
from the customer’s account directly.
5. Credit Card: Just like a debit card, a credit card is also a payment card which the
banks issue to the customers on their request, after checking their credit score and
history. It enables the cardholder to borrow funds upto the pre-approved limit and
make payment. The limit is granted by the banks which issue the card. The
cardholder promises to repay the amount within a stipulated time, with some
charges, for the use of credit card.
6. Point of Sale (POS): Points of sale system refers to the point, in terms of date, time
and place (retail outlet) where the customer makes a payment, using a plastic card,
for the purchase made or services received.
It is a secure, fast and convenient electronic banking facility that allows its customers to
undertake online banking services.
Many business documents can be exchanged using EDI, but the two most common are
purchase orders and invoices. At a minimum, EDI replaces the mail preparation and handling
associated with traditional business communication. However, the real power of EDI is that
it standardizes the information communicated in business documents, which makes possible
a "paperless" exchange.
The traditional invoice illustrates what this can mean. Most companies create invoices using
a computer system, print a paper copy of the invoice and mail it to the customer. Upon
receipt, the customer frequently marks up the invoice and enters it into its own computer
system. The entire process is nothing more than the transfer of information from the seller's
computer to the customer's computer. EDI makes it possible to minimize or even eliminate
the manual steps involved in this transfer.
The process improvements that EDI offers are significant and can be dramatic. For example,
consider the difference between the traditional paper purchase order and its electronic
counterpart:
A Traditional Document Exchange of a An EDI Document Exchange of a
Purchase Order Purchase Order
This process normally takes between three and This process normally occurs overnight and
five days. can take less than an hour.
Benefits include:
Minimal paper usage
EDI reduces associated expenses of storage, printing, postage, mailing and recycling
There are too many standard bodies developing standard documents formats for EDI. For
example, one company may be following the x12 standard format, while it’s trading partner
follows EDIFACT standard format.
2. Changing standards:-
Each year, most standards bodies revisions to the standards. This poses a problem for EDI
users. One organization may be using one version of the standard while it’s trading partners
might still be using older versions.
EDI is expensive and requires a heavy investment to launch and maintain the technology.
Small companies might find it difficult to invest in EDI because of the expenses to be
incurred in implementing and maintaining it.
Some large companies tend to stop doing business with companies who don’t comply with
EDI. For example, WalMart is doing business with only those companies that use EDI. The
result of this is a limited group of people you can do business with.
5. Rigid requirements:-
Responsibilities may have to be changed during the introduction of the EDI system. Unless
this system and the links with the other systems are managed well, it is not possible for the
data processing department to be involved in production and purchasing decisions.
EDI requires expensive VAN (Value Added Network) networking to operate at peak
efficiency. Only high-volume, large trading partners can afford this investment.
Components of EDI
Standard Document Format: A SDF agreed by both the parties which do not require
complicated hardware pr software to access the information. Both parties communicate
directly through a web application.
Translator and a mapper: A translator is used to convert the raw data into meaning
information according to the specifications provided by the mapper. A mapper is used to
create conversion specification and then gives instructions to the translator on how to
convert the data
Communication Software: It is used to transmit the data and covert business documents
into a specific format. It followed a standard communication protocol which is incorporated
in the software
Communication Network: It provides a direct link between trading partners who a willing to
exchange the documents through the EDI