Beruflich Dokumente
Kultur Dokumente
1) a. listing the opportunities and explaining :1. Tourism and Travel Sector: This sector has updated its system with
ecommerce services.
2. Banking Sector: Most banks have changed their working style by
making
their services available online through their respective websites.
3. Health Care Sector: This sector is large and uses a major part of
government expenses.
4. Stock Sector: In the stock exchange sector, e-commerce services
provide demat account facilities for customers who can do an overall
analysis of the status of the stock areas and do their respective transactions.
5. Financial Sector: In India, the financial sector has adopted ecommerce services and the users make maximum use of the same.
b. listing the main advantages :1. All-time processing: Customers can use the marketplace at all times
with the use of e-commerce services.
2. Better service: Customers are fully satisfied and receive better service.
3. No mediators: Customers can directly contact the suppliers and
remove all mediators.
4. Data on consumer performance: Using the e-commerce services,
onecan understand consumer behaviour, for example, websites, products,
schemes and modes of payment which are preferred by the customer.
5. Time saving: Customers can save time because they can purchase
anything through the merchant websites.
listing the disadvantages:1. Lack of customer awareness: People who have no knowledge about
electronic communication like the Internet, and computers find it difficult
to transact electronically.
2. Not for small business: Small businessmen do not want to take any
extra burden because they have no knowledge of e-commerce functions.
3. Does not support all types of businesses: Some types of businesses
are not fit for e-commerce services.
4. Legal formalities: Before implementing e-commerce services in the
business, it is necessary to complete certain legal formalities like
authorization and authentication.
Form tag is an important element for doing online business. Forms are
necessaryfor gathering user information, conducting surveys, or even
providing interactive services. Forms are supported by both client and
server for successful implementation. A number of features are available for
building forms, includingtext boxes, check boxes, radio buttons, submit
buttons and text area. A user can enter text, selects items from a list, check
boxes, and then submit the information to the server.
3) It allows you to edit the website yourself through a
Content Management System
(CMS). What is the need for an intelligent website?
As per the recent statistics, over 60% of the new websites are built using
Content Management System (CMS). It is rapidly gaining popularity among
the website owners and developers since it's very user-friendly and easy-tomaintain.
Regardless of the size of your business and the niche it caters to, creating
and managing your website has to be less time-consuming. CMS allows you
the ability to quickly and easily update your website and its content
yourself. Using the powerful Content Management System tools such as
WordPress, Joomla and Drupal, we, at e-Intelligence, enable you to
manage, market and measure your business on the web, more effectively
and effortlessly.
Work with the Award-winning CMS Website Designing Agency
The main reason why we stand taller than the rest of the agencies, is that
we never compromise on quality and user experience. Right from
conceptualization of your website to its delivery and maintenance,
perfection is our motto. When developing your dynamic seo-friendly CMS
website, our team works closely with your team to identify and thoroughly
understand your requirements. This helps us in creating a sharp, subtle and
professional website design, which can easily adapt to the future growth
requirements of your business. Its our job to make your website look
impressive, regardless of what device your visitors are viewing it on.
In this scheme, both the sender and the recipient possess the same key to
encrypt and decrypt the data.
Data Encryption Standard
Data Encryption Standard (DES) is an example of secret key cryptography.
It was developed by IBM. DES is block cipher-based scheme which encrypts
a 64-bit data block using a 56-bit key.
Drawbacks of secret key cryptography
If there are n correspondents, you have to keep track of n different
secret keys. If the same key is used by more than one correspondent,
the common key holders can read each others mail.
2. Triple Encryption
As discussed, the DES is a block cipher and employs shared secret
encryption.But, nowadays DES is considered unsafe for various
applications primarily due to the 56-bit key size which is too small.
3. Public key cryptography
This scheme operates on a double key, called pair key, one of which is used
to encrypt the message and the other is used to decrypt it.
Encryption and Decryption
Data encrypted with a public key can only be decrypted with a private
key.
Data encrypted with a private key can only be decrypted with a public
key.
Advantages of public key cryptography
Message confidentiality can be proved: The sender uses the
recipients public key to encrypt a message, so that only the private key
holder can decrypt the message, and no one else.
Authenticity of the message originator can be proved: The
receiver uses his private key to encrypt a message, to which only the sender
has access.
Easy to distribute public key: The public key of the pair can be easily
distributed.
Hash function:
Hash function is a formula that converts a message of a given length into a
string of digits called a message digest. A mathematical transformation is
used
by the hash function to encrypt information such that it is irreversible. The
encrypted ciphertext message cannot be decrypted back to plaintext.
(a) The sender generates a message.
(b) A Message Digest of the message is created using the hash function.
(c) The sender attaches the digital signature to the end of the message.
(d) The sender encrypts both message and signature with the receivers
public
key.
5) Explain the different categories of electronic
payment system in detail:Electronic Token-based Payment System
electronictoken (e-token) in the form of electronic cash/cheque has been
developed. It is
recognized as equivalent to cash and is backed by banks.
Types of electronic tokens: There are three types of e-tokens.
(a) Type 1- In this type of electronic business deal, the cash transaction is
completed with the exchange of electronic currency
(b) Type 2 Debit or prepaid: In this type of transaction, users have to pay
in
advance for any product or services.
(c) Type 3Credit or Postpaid: In this type of transaction, a central server
verifies the customer and checks with the bank whether funds are sufficient
before any interchanges are made.
1. Electronic Cash
Electronic cash (e-cash) is a form of electronic payment system based on
encryption. This means it is a secure payment system. Before a product is
bought or services availed cash has to be obtained from a currency server.
How to purchase e-cash
The buying of e-cash from an online currency server (or bank) involves two
steps:
(a) Establishing an account
(b) Keeping an adequate amount of money in the bank to back the
purchases
Currently, in most e-cash trials, all customers must have an account with
a central online bank. Transactions must be available to access and pay for
foreign services or national services.
The customer applies for the amount and denomination of e-cash that
he/she needs. This amount is debited from the customers account.
To digitally sign the note for the given amount, the bank uses its private
key and sends the note back to the customer.
For encoding a message into a cipher text, a locking key is used.
While the key that encodes is kept private, the key that decodes is
made public.
3. Smart Cards
Smart cards, containing microprocessors, are able to hold more
informationthan cards based on the traditional magnetic strips. They help
the cardholder to perform operations, especially of financial nature. Most of
these methods areknown as stored value cards or electronic purse system.
There are two types of smart cards, (a) relationship-based smart credit
card and (b) electronic purses.
(a) Relationship-based smart credit card
As you must be aware, smart credit card is based on some kind of
relationshipbetween a cardholder and an organization, such as between
Delhi Metro andits commuters or between the users of toll bridges or
highways, and the companythat has built them.
Relationship-based smart credit card offers consumers the following
options:
On a smart credit card a customer can access many accounts, such as
credit, debit, investments or stored value for e-cash.
There are multifarious uses of smart credit card, such as payment of
bills,
access to cash, or funds transfer for selected accounts, etc.
Smart credit cards provide access to ATMs, a screen phone, a PC, or
interactive TVs anywhere and at all times.
(b) Electronic purse and debit cards
E-purse is a wallet-size smart card with programmable microchips that
store monetary value in the form of money. After the purse is loaded with
money at an ATM or through the use of aninexpensive special telephone, it
can be used to pay for candy, for instance, in a vending machine equipped
with a card reader.
Credit Card-based Payment Systems
So far, we have seen the problems associated with e-cash and electronic
cheques. The credit card payment system on the Internet provides one
possible time-tested alternative.
The credit card provider makes the payment.
We can divide the credit card system into three basic categories:
(a) Payment made by simply furnishing the details of the credit card
(b) Payment made by providing the encrypted details of the credit card
(c) Payment made on the basis of verification by a third party
(a) Payment using plain credit card details
In plain credit card payments, unencrypted information is exchanged
throughthe Internet or telephone lines. However, this system provides a
low-level security as any snooper can read a credit card number, and
programs can be created to scan the Internet traffic for credit card numbers
and send the numbers.
(b) Payment using encrypted credit card details
In this type of credit card system, the credit card data is encrypted and fed
into a browser or any other e-commerce devices and safely sent through the
network from the buyers to the sellers.
(c) Payment using third party verification
This credit card system uses a third party for security. An organization that
gathers and allows payments from one client to another is known as third
party. Working of encrypted credit card system
A consumer presents his credit card information along with his
authentication signature (or PIN number) to a merchant server.
The customers identity as the proprietor of the credit card account is
authenticated by the merchant server.
6) Being a regular user ofthe various services without probably
knowing the technical aspects explain those services in details
with an example.
Local Area Network (LAN):- A LAN covers only a limited
geographically area rangingfrom 0 to 2 Km, such as organizations, home,
buildings. In a local area network,nodes are connected in a network and
operating systems are installed on them.
In this type of networking, generally, Cat 5 cable (8 wires) is used, meaning
the connection is done through wire. However, there is another option of
connecting LAN, which is WLAN, where connection is possible without
wires. LAN storesthe system and application software that can be shared by
the computers to other computers and peripherals. Most LANs connect
nodes and computers.
Metropolitan Area Network (MAN): Metropolitan Area Network or
MAN occupies a larger area compared to LAN, such as a town or
auniversity/organization premises (which is spread between 05 km to 20
km). It incorporates a number of LANs to form a network. This bulky
network comprises of an optical fibre setup.