Unit Test I
Unit Test I
Unit Test I
1. What is E-commerce?
Intranets and Extranets
An "intranet" is the generic term for a collection of private computer networks within an
organization. An "extranet" is a computer network that allows controlled access from the outside
for specific business or educational purposes. Intranets and extranets are communication tools
designed to enable easy information sharing within workgroups.
Internet
This is the world-wide network of computers accessible to anyone who knows their
Internet Protocol (IP) address - the IP address is a unique set of numbers (such as
209.33.27.100) that defines the computer's location. Most will have accessed a computer
using a name such ashttp://www.hcidata.com.
Intranet
This is a network that is not available to the world outside of the Intranet. If the Intranet
network is connected to the Internet, the Intranet will reside behind a firewall and, if it
allows access from the Internet, will be an Extranet. The firewall helps to control access
between the Intranet and Internet to permit access to the Intranet only to people who are
members of the same company or organisation.
Extranet
An Extranet is actually an Intranet that is partially accessible to authorised outsiders. The
actual server (the computer that serves up the web pages) will reside behind a firewall.
The firewall helps to control access between the Intranet and Internet permitting access to
the Intranet only to people who are suitably authorised.
There are two types of protocols they are Internet Protocol and Transmission Control
Protocol. In computers a protocol is basically a principle or standard which either controls
or permits the..
6. What is Cryptography?
Cryptography is the study and practice of encoding data using transformation techniques so that it can only be
decoded by specific users. In simpler words, it is a theory of secret writing. Practitioners of cryptography are
known as cryptographers.
8. What is web-server?
A Web server is a software program which serves web pages to web users (browsers). A web
server delivers requested web pages to users who enter the URL in a web browser. Every
computer on the Internet that contains a web site must have a web server program. The
computer in which a web server program runs is also usually called a “web server”. So, the term
“web server” is used to represent both the server program and the computer in which the server
program runs.
circuit boards
processors
keyboard
A piece of software is a computer program, for example:
an operating system
an editor
a compiler
a Fortran 90 program
The software allows the hardware to be used. Programs vary enormously in size and complexity.
Part - B
3. (a) Explain the various business models in details with suitable diagram ?
Electronic tendering system: (tendering, reverse auction) buyers request would be sellers to
submit bids for an item/service/project and the lowest bidder wins
Name-your-own price: a buyer sets the price he wants to pay for a product/service
Find the best price: a buyer submits its needs and an intermediate matches it against a database
of sellers, locates the lowest price and submit it to the buyer to accept or reject.
Affiliate marketing: marketing partner refers consumers to a selling company’s web site for a
commission (virtual commissioned sales force)
Business model is something that almost every business needs; it can be used to sell an idea, to
get the attention of clients or customers and to generally be a business. Even in the beginning,
when your business is new, still having a business model is a must. But what kind of business
model is right for your business? Well, that is just what this is about.
There are nine different Business Models to expand or create your business. You can choose
whichever suits you best.
1. Utility Business Model: The utility business model is for businesses that are on a pay as you
go type of plan, like the popular cell phone parents buy for their teenagers Go Phone. This
type of model explains how you will attract customers to use you service.
2. Community Business Model: The Community business model is a model that explains how a
business that uses a community to earn money works. For example an MLM uses this type of
business model to explain how you can earn residual income by having people below you
working for you.
3. Direct Manufacturer Model: The Direct Manufacturer model that shows how an independent
producer of a certain product can reach niche of prospects interested in the related product.
4. Brokerage Business Model: Brokerage Models should show how a broker plans to make the
most commissions/money conducting a certain type of business like consumer to consumer
relations.
5. Advertising Business Model: The Advertising model should demonstrate how a provider of a
website or store plans on generating revenues for both the store and the advertiser.
6. Merchant Business Model: Merchant models are models that show how a merchant is going to
reach sellers and buyers alike and make money while doing so.
7. Affiliate Business Model: An Affiliate model should show a potential affiliate how much
money they can potentially earn by advertising their product or services.
8. Infomediary Business Model: The Infomediary model should prove a given market to be
highly profitable.
9. Subscription Business Model: And last but not least is the Subscription model which should
show how a subscription based business plans on getting participants and also how much it plans
to make per month per subscriber.
Your business should fall into one of these categories and making sure that your business model
meets the business world properly you should do some selective research on your specific
business model type
Protocols
A protocol is a set of rules for the exchange of data across communication lines.
• FTP (file transfer protocol) is a part of TCP/IP that allows files to be transferred between
computers connected using TCP/IP.
• It uses the client/server model.
• FTP permits files to be transferred in both directions, that is, from the client to the server
or from the server to the client.
• It can transfer files one at a time or many files simultaneously.
1. ASCII text: files containing only characters available through the keyboard and
containing no formatting information.
Example: Files created using Notepad
1. Binary data: files containing word processed documents, worksheets, graphics, etc.
Once you have logged into your account using FTP you can browse through the files located in
your account. You do this by double clicking on the folders that appear.
HTTP
• HTTP (hypertext transfer protocol) is the protocol responsible for transferring and
displaying Web pages.
• It has continued to evolve since being introduced.
• Like other Internet protocols, HTTP uses the client/ server model of computing. Thus, to
understand how HTTP works, we need to first discuss the client/server model.
Client/Server model
• In the client/server model there are two roles: the client and the server.
• The client process makes requests of the server. The client is only capable of sending a
request to the server and then waiting for the reply.
• The server satisfies the requests of the client. It usually has access to a resource, such as
data, that the client wants. When the resource that the client wants becomes available, it
sends a message to the client.
• This model simplifies communication.
Client/Server Model
• With HTTP the client is the user’s Web browser and the server is the Web server.
• To open a session, the browser sends a request to the server that holds the desired web
page.
• The server replies by sending back the page or an error message if the page could not be
found.
• After the client verifies that the response sent was correct, the TCP/IP connection is
closed and the HTTP session ends.
• Each new page that is desired will result in a new HTTP session and another TCP/IP
connection.
Mail protocols
• Electronic mail is managed and stored by programs and hardware collectively known as
mail servers.
• It is displayed and created using mail programs such as Eudora, Pine, Unix mail,
Outlook, Web interface mail programs.
• Protocols are necessary for the mail programs to construct requests to receive e-mail and
for the mail servers in downloading and/or deleting e-mail.
• The e-mail protocols we will discuss use the client/ server model.
SMTP
• SMTP (simple mail transfer protocol) is used by client mail programs to make requests
about mail delivery.
• A wide variety of mail programs such as Eudora, Unix mail, and PINE, use SMTP to
send mail to a mail server.
• The SMTP specifies the exact format of a mail message and describes how mail is to be
administered.
POP
• POP (post office protocol) is responsible for retrieving e-mail from a server.
• It requests that the mail server either retrieve mail from the mail server and then delete
it, retrieve mail from the server without deleting\ it, or simply ask whether new mail has
come but not retrieve it.
• When e-mail is read, POP specifies that it must be downloaded to your computer from
the server. Read e-mail is not kept on the server.
IMAP
IMAP (Internet Message Access Protocol) is a newer protocol that, like POP, can ask if there is
new mail, download e-mail, and delete e-mail.
Internet Addresses
Internet addresses are represented in several ways, but all the formats are translated to a 32-bit
number called an IP address; a function of Internet Protocol (IP) The increased demand for IP
addresses will soon make 32-bit addresses too small, and they will be replaced with 128-bit
addresses (IP v6.0) in the near future. How does increasing the number of bits in the address help
with increasing demand?
A URL deconstructed
http://www.daschmelzer.com/ect250/hw/h1/h1.htm
HTML
HTML – Hypertext Markup Language
One of the languages with the parent SGML – Standard Generalized Markup Language
HTML provides Web page designers with a fixed set of markup “tags” that are used to
format a Web page
HTML TOOLS
Definitions
Cryptography is the study and practice of encoding data using transformation techniques so that
it can only be decoded by specific users. In simpler words, it is a theory of secret writing.
Practitioners of cryptography are known as cryptographers.
Available technologies
The benefits of cryptography are well recognized. Encryption can protect communications and
stored information from unauthorized access and disclosure. Other cryptographic techniques,
including methods of authentication and digital signatures, can protect against spoofing and
message forgeries. Practically everyone agrees that cryptography is an essential information
security tool, and that it should be readily available to users. I take this as a starting assumption
and, in this respect, have no disagreement with the crypto anarchists
• Data secrecy
• Data integrity
• Authentication of message originator
• Electronic certification and digital signature
• Non-repudiation
The drawbacks of cryptography are frequently overlooked as well. The widespread availability
of unbreakable encryption coupled with anonymous services could lead to a situation where
practically all communications are immune from lawful interception (wiretaps) and documents
from lawful search and seizure, and where all electronic transactions are beyond the reach of any
government regulation or oversight. The consequences of this to public safety and social and
economic stability could be devastating.
Future of cryptography
Quantum cryptanalysis
• A quantum computer can perform practically unlimited number of simultaneous
computations
• Factoring large integers is a natural application for a quantum computer (necessary to
break RSA)
• Quantum cryptanalysis would render ALL modern cryptosystems instantly obsolete
• 2004 – 10-qubit special purpose quantum computer available
• 2006 – factoring attacks on RSA algorithm
• 2010 through 2012 – intelligence agencies will have quantum computers
• 2015 – large enterprises will have quantum computers
Quantum encryption
– No need for a quantum computer
– A key cannot be intercepted without altering its content
– It is theoretically unbreakable
– Central problem is transmitting a quantum message over a significant distance
Houston resources
University of Houston
− Crypto courses
− Ernst Leiss
Rice University: Computer Science Dept
− Crypto research and offers crypto training
− Dan Wallach (security of WAP, WEP, etc.)
Companies
− EDS
− RSA Security
− Schlumberger
− SANS Institute
From the above definition, you must have landed up in confusion “Web server is a hardware or a
software”
Mostly, Web server refers to the software program, which serves the clients request. But as we
mentioned earlier in this chapter, the computer in which the web server program is also called
‘web server”.
When you try to access a web site, you don’t really need to know where the web server is
located. The web server may be located in another city or country, but all you need to do is, type
the URL of the web site you want to access in a web browser. The web browser will send this
information to the internet and find the web server. Once the web server is located, it will request
the specific web page from the web server program running in the server. Web server program
will process your request and send the resulting web page to your browser. It is the responsibility
of your browser to format and display the webpage to you.
Typically, there is only one web server required for a web site. But large web sites like Yahoo,
Google, MSN etc will have millions of visitors every minute. One computer cannot process such
huge numbers of requests. So, they will have hundreds of servers deployed in different parts of
the world so that can provide a faster response.
A web server can host hundreds of web sites. Most of the small web sites in the internet are
hosted on shared web servers. There are several web hosting companies who offer shared web
hosting. If you buy a shared web hosting from a web hosting company, they will host your web
site in their web server along with several other web sites for a Fee. Examples of web server
applications 1. IIS, 2. Apache
(b) What are the hardware and software used for E-Commerce?
circuit boards
processors
keyboard
an operating system
an editor
a compiler
a Fortran 90 program
The software allows the hardware to be used. Programs vary enormously in size and complexity.
Module Objectives
Describe the appropriate use of operating systems, software applications, and networking
components.
Compare and contrast the use of various input, processing, output, and primary/secondary
storage devices.
Explain the differences between analog and digital technology systems and give
examples of each type of system.
Delineate and make necessary adjustments regarding compatibility issues and cross-
platform connectivity.
Types of Devices
Computer Hardware
Output Devices
Memory (RAM)
Storage Devices
Input Devices
Output Devices
Central Processing Unit - also called “The Chip”, a CPU, a processor or a
microprocessor
Memory (RAM)
Storage Devices
Input Devices
Output Devices
Central Processing Unit - also called “The Chip”, a CPU, a processor or a
microprocessor
Memory (RAM)
Storage Devices
Input Devices
Output Devices
CPU Types
Storage Technology
Electronic devices that store, retrieve, and save instructions and data.
Today’s microcomputers or PCs include several types of storage devices.
Capacity and speed are important considerations when selecting a new storage device
for a PC.
Magnetic storage devices store data by magnetizing particles on a disk or tape. They
have a limited life-span of 1 to 5 years, depending on the device.
Optical storage devices store data as light and dark spots on the disk surface. They have
an unlimited life-span.
CD-ROM Drives
Typically installed on all new computer systems. (Were add-on device until the
mid 1990’s).
Capacity is 600 to 750 megabytes
(MB or millions of bytes).
Most mass-produced commercial software is packaged on a CD.
Used more often now for backup storage as CD-RW (read/write) technology has
become less expensive.
Data is read from CD by a laser.
Optical storage device.
Input is all information put into a computer. Input can be supplied from a variety
of sources:
A person
A storage device on computer
Another computer
A peripheral device
Another piece of equipment, such as a musical instrument or thermometer
Input devices gather and translate data into a form the computer understands.
Primary input device:
Keyboard - Most common input device; used to type in commands and data.
Mouse or trackball enhances user’s ability to input commands, manipulate text, images.
Joystick useful in education as an adaptive or assistive input device.
Scanners are peripheral input devices which allow users to import:
Text
Graphics
Images
Specialized software aids in translating information into a format the computer
can understand and manipulate.
Digital Cameras are peripheral input devices that allow users to create pictures and/or movies in
a digital format.
Some require specialized
software to import images
into the computer.
Some record digital images directly to a disk that can be read by the computer.
Monitors are the most commonly used output device.
Most monitors use a bitmap display.
Allows user to resize the display.
Divides the screen into a matrix of tiny square “dots” called pixels.
The more “dots” a screen can display, the higher the resolution of the monitor.
Monitors are connected to a computer system via a port integrated on the video
adapter or graphics card.
Graphics cards convert digital data output from software to analog data for
display on monitors.
Typically have additional memory chips on card, 4MB to 64MB.
Printers
Dot matrix
Seldom used in a classroom.
Still frequently used in business.
Bubble or ink jet
Laser
Networks
A collection of computers and other devices that communicate to share data, hardware,
and software.
A stand-alone computer is called a workstation on a network.
A workstation provides access to:
Your computer’s local resources
Network resources
A server is a computer connected to a network that distributes and stores resources for
other network users.
With proper licensing, many network users can use the same applications and data files
simultaneously and share other resources, such as storage space or a printer.
Local Area Network (LAN)
a network located in a limited area.
LANs are found in most businesses.
Many campuses use LANs.
A network interface card (NIC)
a key hardware component.
Connects a workstation to the network.
A circuit board that sends data between the workstation and the network.
Wide Area Network (WAN)
a network that covers a large geographical area. TENET is a classic example.
All types of networks require special networking hardware and networking software to
allow different computers to communicate with each other.
The Internet - largest of all networks.
Communication standards called protocols allow for global exchange of information.
Transmission Control Protocol (TCP)
Internet Protocol (IP)
Intranets are LANs or WANs that use these communication standards or TCP/IP.
Special hardware (modem) and software (browser) are required.
Software
Instructions and associated data, stored in electronic format, that direct the computer to
accomplish a task.
System software helps the computer carry out its basic operating tasks.
Operating systems
Utilities
System Software
An Operating System (OS) is the master controller within a computer.
EX: Windows, MacOS, DOS, UNIX, Linux
An operating system interacts with:
All hardware installed in or connected to a computer system.
All software installed or running from a storage device on a computer system.
Microsoft Windows
Most popular operating system.
Supports a vast array of application software and peripheral devices.
MacOS
For Macintosh computers.
Proprietary system.
Does not have same functionality and support for software and peripheral devices.
Network operating system (NOS)
Manages network resources.
Maintains security.
Tracks user accounts.
Handles communication between workstations and servers.
Popular network operating systems
Windows NT, Novell Netware, UNIX
Utilities
Utilities augment functionality of operating systems. Utilities includes device drivers and
Troubleshooting capabilities.
Utilities provide file management capabilities such as copying, moving or renaming a
file.
Norton Utilities includes an undelete function that can recover deleted files.
Symantec and McAfee Virus checkers add protection for all system and data files.
Application Software
Accomplishes specific tasks for users.
Enables a computer to become a multi-purpose machine.
Produce worksheets and reports.
Automate record keeping like attendance and grades.
Create flow charts and graphic organizers.
Communicate worldwide.
Productivity Software
Spreadsheets
Databases
Presentation Software
Document Preparation
Word Processing
Desktop Publishing
Project Management Software
Graphics Creation and Manipulation
Animation and 3D Graphics
Video Editing
Internet Connectivity
Website Creation and Management
Groupware
Financial Management
Educational Games and Tutorials
Programming Languages Basic building blocks of any software.