0% found this document useful (0 votes)
131 views67 pages

IT - Ebook - Semester 2

Uploaded by

Sakib Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
131 views67 pages

IT - Ebook - Semester 2

Uploaded by

Sakib Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 67

FOR ADMISSION: WHATSAPP 6291137153

BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
Module 1: Theory [50 Marks]

0 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 1 – FUNDAMENTALS OF COMPUTER

Components of Computer Systems

Hardware Components:

1. Central Processing Unit (CPU):


- The CPU is often referred to as the brain of the computer. It performs the majority
of the processing tasks and controls the operations of other hardware components.
2. Memory (RAM):
- Random Access Memory (RAM) is where the computer temporarily stores data and
instructions while they are being processed. It allows the CPU to access data quickly.
3. Storage:
- There are various types of storage devices that hold data and programs long-term:
• Hard Disk Drive (HDD):
- A traditional storage device that uses spinning disks to read and write data.
• Solid-State Drive (SSD): A faster storage device that uses flash memory chips.
• Optical Drives: For reading and writing data on CDs, DVDs, or Blu-ray discs.
4. Motherboard:
- The motherboard is the main circuit board that connects and allows communication
between different hardware components such as the CPU, RAM, storage, & peripherals.
5. Power Supply:
- The power supply unit (PSU) provides power to all the components of the computer.
6. Graphics Processing Unit (GPU):
- The GPU, also known as a graphics card or video card, handles rendering images,
videos, and animations. It is essential for gaming and other graphic-intensive tasks.
7. Input Devices: These allow users to interact with the computer system. Examples incl:
• Keyboard: For typing and inputting commands.
• Mouse: For pointing, clicking, and navigating the user interface.
• Touchscreen: For direct interaction with the display

1 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 1 – FUNDAMENTALS OF COMPUTER
8. Output Devices: These allow the computer to communicate information to the user.
Examples include:
• Monitor/Display: For showing visual output such as text and graphics.
• Printers: For producing physical copies of documents or images.
9. Network Interface Card (NIC): This allows the computer to connect to networks,
including the internet, using either wired or wireless connections.
10. Sound Card: Handles audio output and input, enabling the computer to play sounds and
music, as well as allowing for microphone input.

Software Components

A computer system is made up of several software components that work together to


allow the computer to perform tasks and run applications. Here are the key software
components of a computer system explained in simple terms:

1. Operating System (OS):


• The operating system is the main software that manages the computer's hardware
and software resources.
• It provides an interface for users to interact with the computer. Common
operating systems include Windows, macOS, Linux, and Android.
2. Applications:
• Applications are programs that perform specific tasks for the user.
• Examples include web browsers (like Chrome or Firefox), word processors (like
Microsoft Word), and games.
• Users install and use applications to accomplish various tasks.
3. System Utilities:
• System utilities help maintain and manage the computer system.
• Examples include antivirus software, file backup tools, disk cleanup tools, and
system monitoring programs.
• These tools keep the computer running smoothly and securely.

2 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 1 – FUNDAMENTALS OF COMPUTER
4. Device Drivers:
• Device drivers are small software programs that allow the operating system to
communicate with hardware devices.
• For example, a printer driver allows the computer to send data to a printer.
• Drivers ensure hardware components like keyboards, mice, and printers work
properly with the computer.
5. Firmware:
• Firmware is low-level software that controls specific hardware devices.
• It's often stored on a chip within the device itself and provides instructions on how
the device should function.
• Examples include firmware for a computer's BIOS or the firmware in a
smartphone's camera.
6. Programming Languages and Development Tools:
• These are software components used by developers to create new applications.
• Common programming languages include Python, Java, and C++. Development
tools include code editors, compilers, and debuggers.
7. Middleware:
• Middleware acts as a bridge between different software applications or between an
application and the operating system.
• It can facilitate communication and data exchange between different parts of a
software System

3 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 1 – FUNDAMENTALS OF COMPUTER

Application of Computer

Computers have a wide range of applications across various fields and industries. Here are
some of the key applications of computers in short points:

1. Business:
• Accounting and financial management.
• Customer relationship management (CRM).
• Inventory and supply chain management.
• Data analysis and business intelligence.
2. Education:
• E-learning and online courses.
• Educational software and apps.
• Student record management.
• Research and data analysis.
3. Healthcare:
• Electronic medical records (EMR).
• Medical imaging and diagnostics.
• Telemedicine and telehealth services.
• Hospital and patient management systems.
4. Entertainment:
• Video streaming and gaming.
• Music production and editing.
• Animation and graphic design.
• Social media platforms.
5. Science and Engineering:
• Simulations and modeling.
• Data analysis and visualization.
• Research and development.
• Computer-aided design (CAD).

4 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 1 – FUNDAMENTALS OF COMPUTER
6. Government and Public Services:
• E-governance and digital services.
• Law enforcement and security systems.
• Tax collection and record-keeping.
• Public transportation and infrastructure management.
7. Finance and Banking:
• Online banking and transactions.
• Financial trading and risk management.
• Fraud detection and prevention.
• Algorithmic and high-frequency trading.
8. Communications:
• Email and instant messaging.
• Video conferencing and online meetings.
• Website and application hosting.
• Network management and maintenance.
9. Manufacturing:
• Automation and robotics.
• Quality control and inspection.
• Product design and development.
• Supply chain optimization.
10. Transportation:
• Navigation and GPS systems.
• Traffic management and control.
• Vehicle design and engineering.
• Autonomous vehicles

5 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 1 – FUNDAMENTALS OF COMPUTER

Advantages of Computer

Advantages of Computers:

1. Speed and Efficiency:


• Computers can process information quickly and perform complex calculations in a
fraction of a second.
• They increase productivity in tasks such as data entry, analysis, & communication.
2. Accuracy and Precision:
• Computers perform tasks with high accuracy and precision, reducing the risk of
human error.
3. Storage Capacity:
• Computers can store vast amounts of data and information in a compact form.
• Digital storage is easily accessible and retrievable.
4. Connectivity and Communication:
• Computers enable global communication through the internet, emails, and video
conferencing.
• Information sharing and collaboration are made easier.
5. Automation:
• Many tasks can be automated with computers, saving time and labor.
• Processes such as manufacturing, data processing, and even some decision-making
can be automated.
6. Access to Information:
• Computers provide access to a wealth of information online through search
engines and databases.
• They enable continuous learning and research.
7. Multitasking:
• Computers can handle multiple tasks simultaneously, allowing for efficient
workflow

6 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 1 – FUNDAMENTALS OF COMPUTER

Disadvantages of Computers

1. Security Risks:
• Computers can be vulnerable to hacking, malware, and data breaches.
• Protecting personal and sensitive data requires robust security measures.
2. Dependency and Addiction:
• Over-reliance on computers can lead to dependency and loss of traditional skills.
• Excessive use of computers, especially for gaming and social media, can lead to
addiction.
3. Health Issues:
• Prolonged use of computers can lead to eye strain, back pain, and other health
problems.
• Lack of physical activity due to sitting at a desk for long periods can also be a
concern,
4. Job Displacement:
• Automation and Al can lead to job displacement in some industries, affecting
employment.
• Workers may need to retrain and adapt to changing job markets.
5. Initial Costs and Maintenance:
• Setting up computer systems can be costly, especially for advanced hardware and
software.
• Ongoing maintenance, updates, and repairs can also add to expenses.
6. Privacy Concerns:
• Data collected & stored on computers can be misused, leading to privacy breaches.
• Tracking and surveillance by companies or governments may compromise user
privacy.
7. Learning Curve:
• Some computer technologies and software can be challenging to learn and use.
• Users may need training and support to utilize computers efficiently.

7 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 1 – FUNDAMENTALS OF COMPUTER
Software And Its Types

Software is a set of instructions, data, or programs that tell a computer how to perform
tasks. It includes everything from operating systems and applications to utilities and
device drivers. Software is intangible, unlike hardware, which refers to the physical
components of a computer. In simple terms, software makes the hardware functional by
providing it with the necessary instructions and capabilities.

Types of Software:

1. System Software - System software is a type of software that manages and controls
the hardware components of a computer, enabling the hardware and software to work
together efficiently. It serves as the foundation for other software, such as
applications, to run on a computer. Examples of system software include operating
systems (like Windows, macOS, and Linux), device drivers, and utilities. System
software provides essential services such as managing memory, processing power,
storage, and input/output devices, as well as providing a user interface for interaction
with the computer.
2. Application Software - Application software is a type of software that allows users to
perform specific tasks or activities on a computer. It is designed to meet the needs of
end users and can include programs such as word processors, spreadsheets, databases,
web browsers, email clients, graphic design software, games, and more. In simple
terms, application software enables users to accomplish various tasks on a computer,
from productivity and communication to entertainment and creative work.
3. Operating System -An operating system (OS) is software that manages a computer's
hardware and software resources and provides a user interface to interact with the
computer. It serves as the bridge between the user, applications, and hardware
components, enabling the computer to function efficiently. The operating system
handles tasks such as memory management, process scheduling, file management,
input/output control, & security. Examples include Windows, macOS, Linux, & Android.

8 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 1 – FUNDAMENTALS OF COMPUTER
4. Mobile Operating System - A mobile operating system (mobile OS) is the software
platform that manages the hardware and software resources of a mobile device, such
as a smartphone or tablet. It provides the interface for users to interact with the
device and run applications. The mobile OS handles tasks like managing memory,
storage, and power usage, as well as providing access to hardware features like
cameras, touchscreens, and sensors. Popular examples of mobile operating systems
include Android and IOS.
5. Free and Open Software- Free and open-source software (FOSS) refers to software
that is both freely available and whose source code is openly accessible to anyone.
Users are allowed to use, modify, and distribute the software and its source code
without restrictions. The goals of FOSS are to promote collaboration, transparency,
and community-driven development. Popular examples of free and open-source
software include the Linux operating system, the Mozilla Firefox web browser, and the
LibreOffice productivity suite.

9 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 2 – INTERNET SERVICES AND SECURITY MEASURES

Internet

The internet is a globally connected network system that uses TCP/IP to


transmit data via various types of media. The internet is a network of global
exchanges including private, public, business, academic and government networks -
connected by guided, wireless and fiber-optic technologies.
The terms internet and World Wide Web are often used interchangeably, but
they are not exactly the same thing; the internet refers to the global communication
system, including hardware and infrastructure, while the web is one of the services
communicated over the internet.
Internet has been perhaps the most outstanding innovation in the history of
mankind. It is the world's largest computer network, the network of networks. Today
internet a globe in a has brought single room. It is a wealth of knowledge and has great
potential and lot to offer.

Advantages of Internet

• Information, knowledge, and learning


• Connectivity, communication, and sharing
• Address, mapping, and contact information
• Banking, bills, and shopping
• Selling and making money
• Collaboration, work from home, and access to a global workforce
• Donations and funding
• Entertainment
• Cloud computing and cloud storage

Disadvantages on Internet

10 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 2 – INTERNET SERVICES AND SECURITY MEASURES

• Bullying, trolls, stalkers, and crime


• Exploitation and pornography and violent images
• Addiction, time waster, and causes distractions
• Never being able to disconnect
• Identity theft, hacking, viruses, and cheating
• Spam and advertising
• Affects focus and patience
• Depression, loneliness, and social isolation
• Health issues and obesity
• Buying things not needed

Packet Switching

Packet switching is a method of data transmission used in computer networks where data
is broken into smaller packets before being sent to its destination. Each packet contains a
portion of the data, along with the destination address and other control information.
These packets are then transmitted independently through the network and can take
different paths to reach the destination. Once all packets arrive, they are reassembled
into the original data.

Key characteristics of packet switching include:

1. Efficiency: By dividing data into packets, the network can more efficiently use
available bandwidth. Multiple packets from different sources can share the same
transmission medium.
2. Flexibility: Packets can take any available path to reach the destination. This allows
for dynamic routing around congestion or damaged parts of the network.
3. Reliability: If a packet is lost or corrupted during transmission, only that packet
needs to be retransmitted, not the entire data set.

11 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 2 – INTERNET SERVICES AND SECURITY MEASURES

4. Scalability: Packet switching can handle a large number of connections and is


suitable for large and complex networks like the internet.

TCP /IP

TCP/IP stands for Transmission Control Protocol/Internet Protocol. It's a set of rules
that dictate how data is transmitted over the internet and other networks. :

1. TCP (Transmission Control Protocol): Think of TCP as a reliable delivery service for
data. It ensures that data sent from one computer arrives at another computer
correctly and in the right order. If any data packets get lost or arrive damaged, TCP
will detect this and resend the necessary packets. It's like a mail carrier that makes
sure every letter in a series arrives at its destination, and if one gets lost, the mail
carrier will resend it.
2. IP (Internet Protocol): IP is responsible for addressing and routing the data packets
so they can travel across networks and reach the correct destination. Each device on a
network has a unique IP address, much like a postal address. IP makes sure that each
packet of data knows where to go. It’s like writing the correct address on a letter so it
reaches the right house.

Together, TCP/IP forms the foundation of the internet. When you send an email, browse a
website, or watch a video online, TCP/IP protocols are working behind the scenes to ensure
your data is delivered quickly, accurately, and reliably.

IP Address

An IP address is like a home address for your device on the internet. It’s a unique set of
numbers assigned to each device connected to a network, such as your computer, phone, or
tablet. This address allows devices to find and communicate with each other over the
internet.

12 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 2 – INTERNET SERVICES AND SECURITY MEASURES

Imagine you want to send a letter to a friend. You need to know their home address so the
postal service can deliver the letter to the right place. Similarly, when you want to visit a
website or send an email, your device uses IP addresses to find and connect to the other
device or server. Here’s a simple example of an IP address: 192.168.1.1

Meaning

An IP address, or Internet Protocol address, is a numerical label assigned to each device


connected to a computer network that uses the Internet Protocol for communication. It
serves two primary purposes: identifying the network interface of a device within a
network and providing the location of the device in the network.

Versions of Internet Protocol Address

There are two primary versions of the Internet Protocol (IP) address:

1. IPv4 (Internet Protocol version 4): This is the original version of the Internet
Protocol and is still widely used today. IPv4 addresses are 32-bit numbers, typically
expressed in decimal format with four numbers separated by periods (e.g.,
192.168.0.1). However, due to the increasing number of devices connecting to the
internet, the pool of available IPv4 addresses has been exhausted in many regions,
leading to the adoption of IPv6.
2. IPv6 (Internet Protocol version 6): IPv6 was developed to address the limitations of
IPv4 and provide a much larger pool of available addresses. IPv6 addresses are 128-
bit numbers, allowing for a significantly larger number of unique addresses
compared to IPv4. IPv6 addresses are typically expressed as a series of eight
groups of hexadecimal digits separated by colons (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334).

While IPv4 remains in widespread use, IPv6 adoption is steadily increasing to accommodate
the growing number of internet-connected devices and to support future internet growth.

13 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 2 – INTERNET SERVICES AND SECURITY MEASURES

Both IPv4 and IPv6 coexist on the internet, and many networks and devices support both
protocols simultaneously through a technology called dual-stack.

Types of Internet Service

There are several types of internet services available, each with its own characteristics,
advantages, and limitations. Here are some common types:

1. DSL (Digital Subscriber Line): DSL uses existing telephone lines to deliver internet
access. It offers higher speeds than dial-up connections and is widely available in
urban and suburban areas.
2. Cable Internet: Cable internet uses the same coaxial cables that deliver cable
television. It provides high-speed internet access and is often faster than DSL.
Cable internet is prevalent in urban and suburban areas.
3. Fiber Optic Internet: Fiber optic internet uses fiber-optic cables to transmit data
using light signals. It offers extremely high speeds and low latency, making it ideal
for bandwidth-intensive activities like streaming and gaming. However, fiber optic
infrastructure is still expanding and may not be available in all areas.
4. Satellite Internet: Satellite internet delivers internet access via satellites orbiting
the Earth. It is available in remote or rural areas where other types of internet
may not be accessible. While satellite internet provides coverage in areas with
limited infrastructure, it tends to have higher latency and slower speeds compared
to other types of internets.
5. Fixed Wireless Internet: Fixed wireless internet uses radio signals to provide
internet access to a specific location. It can be an alternative in rural or
underserved areas where wired connections are not available or practical.
6. Mobile Broadband: Mobile broadband utilizes cellular networks to provide internet
access to devices like smartphones, tablets, and mobile hotspots. It allows users to
access the internet on the go, but speeds and reliability may vary depending on
network coverage and congestion.

14 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 2 – INTERNET SERVICES AND SECURITY MEASURES
7. Dial-Up: Dial-up internet connects to the internet through a telephone line using a
modem. It offers slow speeds and is rarely used today due to the availability of
faster alternatives like DSL and cable internet.

World Wide Web

WWW stands for World Wide Web. It's a system of interconnected webpages and documents
that are accessed via the internet. The World Wide Web was created by British computer
scientist Tim Berners-Lee in 1989 and has since become the primary means of accessing
information on the internet.

The WWW uses hypertext, a system of linking documents together using hyperlinks, to
allow users to navigate between webpages. These webpages are hosted on web servers and
can contain text, images, videos, and other multimedia content.

When you type a website address (URL) into your web browser, such as www.example.com,
you're using the WWW to access that website's content. The WWW has revolutionized the
way people access & share information, enabling global communication and collaboration.

Uniform Resource Locator [URL]

URL stands for Uniform Resource Locator. It's a web address used to specify the location
of a resource on the internet. A URL indicates the protocol used to access the resource
(such as HTTP or HTTPS), the domain name or IP address where the resource is located,
and additional information such as the specific path to the resource on the server.

For example, in the URI. "https://www.example.com/page1.html":

- Protocol: "https://" specifies the protocol used to access the resource, which in this
case is Hypertext Transfer Protocol Secure (HTTPS).

15 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 2 – INTERNET SERVICES AND SECURITY MEASURES

"Domain Name": "www.example.com" is the domain name of the website where the resource
is hosted.

- "Path": "/page1.html" specifies the specific location of the resource on the server, in
this case, a webpage named "page1.html".

URLs are used by web browsers to retrieve webpages, images, videos, files, and other
resources from web servers across the internet. They provide a standardized way to
locate and access information on the World Wide Web.

Types of URL

There are two forms of URL as listed below:

• Absolute URL
• Relative URL

ABSOLUTE URL

Absolute URL is a complete address of a resource on the web. This completed address
comprises of protocol used, server name path name and file name.

For example, http://www.ajclasses.com/index.html. where:


http is the protocol.
ajclasses.com is the server name.
index.html is the file name.
The protocol part tells the web browser how to handle the file. Similarly, we have some
other protocols also that can be used to create URL are:

FTP
https
Gopher
mailto
news

16 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 2 – INTERNET SERVICES AND SECURITY MEASURES

RELATIVE URL

Relative URL is a partial address of a webpage. Unlike absolute URL, the protocol and
server part are omitted from relative URL.

Relative URLs are used for internal links i.e., to create links to file that are part of same
website as the Web Pages on which you are placing the link.

Domain Name System (DNS)

Concept of Domain Name System (DNS):

DNS Stands for "Domain Name System." Domain names serve as memorisable names for
websites and other services on the Internet. However, computers access Internet devices
by their IP addresses. DNS translates domain names into IP name. addresses, allowing you
to access an Internet location by its domain name.

Thanks to DNS, you can, Vis website by typing in the domain name rather than the IP
address. For example, to visit the information about Avishek Jha Classes, you can simply
type "www.ajclasses.com" in the address bar of your web browser rather than the IP
address (67.43.14.98). It also simplifies email addresses, since DNS translates the domain
name (following the "@" symbol) to the appropriate IP address.

To understand how DNS works, you can think of it like the contacts app on your
smartphone. When you call a friend, you simply select his or her name from a list. The
phone does not actually call the person by name, it calls the person's phone number. DNS
works the same way by associating a unique IP address with each domain name.

17 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 2 – INTERNET SERVICES AND SECURITY MEASURES

Web Browser

A web browser is a software application used to access and view content on the World Wide
Web. It allows users to navigate between webpages, interact with websites, and consume
various types of online content, including text, images, videos, and applications.

Popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge, Safari, and
Opera. Each browser may offer unique features and performance characteristics, but they
all serve the primary purpose of providing users with access to the vast array of content
available on the internet.

Internet of Things

The Internet of Things (IoT) refers to the network of physical objects or "things"
embedded with sensors, software, and other technologies that enable them to connect and
exchange data with other devices and systems over the internet.

In simpler terms, it's the idea of connecting everyday objects to the internet so they can
collect and share information, communicate with each other, and be remotely controlled
and monitored. These objects can include anything from household appliances, vehicles,
wearable devices, to industrial equipment and infrastructure.

The goal of IoT is to create smart, interconnected systems that can collect data, analyse
it, and take action based on that information, often without the need for human
intervention. This has the potential to improve efficiency, productivity, and convenience
in various aspects of our lives, from home automation to healthcare, agriculture,
transportation, and more.

18 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 2 – INTERNET SERVICES AND SECURITY MEASURES

Smart Device

A smart device refers to any electronic device that is connected to other devices or
networks via the internet and is capable of collecting, analysing, and sharing data, as well
as performing various functions based on that data. These devices often have built- in
sensors, processors, and communication hardware that enable them to interact with users
and other devices in intelligent ways.

Examples of smart devices include smartphones, smart TVs, smart speakers, smart
thermostats, smart watches, smart home security systems, and many others

The primary goal of smart devices is to enhance convenience, efficiency, and connectivity
by integrating technology into everyday objects and activities, ultimately improving the
user experience and providing new capabilities that were not possible with traditional,
non-connected devices.

RFID AND ITS USE CASES

RFID (Radio Frequency Identification) is a technology that uses radio waves to wirelessly
identify and track objects or people. Here's an overview of the concept of RFID and its use:

Concept of RFID:

1. Tags: RFID systems consist of small electronic devices called tags. These tags contain
a unique identifier and an antenna. Tags can be passive (no internal power source),
active (powered by a battery), or semi-passive (battery-powered but rely on the
reader's signal for communication).
2. Readers: RFID readers emit radio waves and receive signals from RFID tags. Readers
can be fixed or handheld & have antennas to communicate with tags within their range.
3. Communication: When a tag enters the reader's range, it detects the reader's signal &
responds by transmitting its unique identifier. The reader captures this information &

19 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 2 – INTERNET SERVICES AND SECURITY MEASURES
can collect data associated with the tag, such as product details, location, or sensor
readings.
4. Data Exchange: RFID systems enable data exchange between tags and readers in real-
time, providing visibility into the movement, location, and status of tagged objects.

Use Cases of RFID:

1. Inventory Management: RFID tags are used in retail stores, warehouses, and supply
chains to track and manage inventory. They provide real-time visibility into stock
levels, reduce out-of-stock situations, and improve inventory accuracy.
2. Asset Tracking: RFID tags are used to track assets such as equipment, tools,
vehicles, and IT assets in industries like construction, healthcare, manufacturing,
and logistics. They help organizations monitor the location, condition, and
maintenance history of their assets.
3. Access Control and Security: RFID tags are used in access control systems to grant
or restrict access to buildings, rooms, or areas. They are also used in electronic
key cards, vehicle immobilizers, and passport chips for security purposes.
4. Supply Chain Management: RFID tags are used in supply chain management to track
the movement of goods from manufacturing facilities to distribution centres,
warehouses, and retail stores. They improve supply chain visibility, reduce theft,
and prevent counterfeit products.
5. Healthcare: RFID tags are used in hospitals and healthcare facilities to track
medical equipment, patient records, medication, and blood products. They help
improve patient safety, reduce medical errors, and enhance inventory
management.
6. Animal Tracking: RFID tags are used in agriculture and wildlife management to
track and identify animals for research, breeding programs, and disease control.
7. Smart Packaging: RFID tags are used in smart packaging solutions to provide
product authentication, traceability, and anti-counterfeiting measures. They enable
consumers to verify product authenticity and access product information.

20 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 2 – INTERNET SERVICES AND SECURITY MEASURES
Overall, RFID technology offers a versatile and efficient solution for identifying,
tracking. and managing objects or people in various industries and applications.

Wireless Sensors Networks

WSN stands for Wireless Sensor Network. It's a network of small, low-power devices
equipped with sensors that communicate wirelessly to collect and transmit data about
their environment. These sensors can measure various parameters such as temperature,
humidity, light, motion, sound, and pollution levels.

Applications

Here are some easy points highlighting the applications of Wireless Sensor Networks
(WSNs):

1. Environmental Monitoring:
- WSNs are used to monitor environmental parameters such as temperature, humidity,
air quality, and pollution levels.
- They help in detecting natural disasters like forest fires, floods, and earthquakes by
providing real-time data from remote locations.
2. Precision Agriculture:
- WSNs assist farmers in monitoring soil moisture levels, temperature, and humidity in
agricultural fields.
- They enable precision irrigation and fertilization, optimizing resource usage and
improving crop yield.
3. Smart Cities:
- WSNs are deployed in urban areas for various applications, including traffic
management, parking systems, waste management, and air quality monitoring.
- They help in improving the efficiency of city services and enhancing the quality of life
for residents.
4. Healthcare Monitoring:

21 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 2 – INTERNET SERVICES AND SECURITY MEASURES
- WSNs are used for remote patient monitoring, tracking vital signs such as heart rate,
blood pressure, and glucose levels.
- They enable healthcare providers to monitor patients' health status in real-time and
provide timely interventions when necessary.
5. Industrial Automation:
- WSNs are deployed in industrial environments for monitoring and controlling
manufacturing processes, equipment condition, and inventory management.
- They help in optimizing production processes, reducing downtime, and improving
operational efficiency.
6. Structural Health Monitoring:
- WSNs are used to monitor the health and integrity of civil structures such as bridges,
dams, and buildings.
- They detect structural abnormalities, cracks, and vibrations, helping in early detection
of potential failures and ensuring structural safety.
7. Wildlife Tracking:
- WSNs are deployed in wildlife conservation efforts for tracking the movement and
behaviour of animals.
- They help researchers study animal habitats, migration patterns, and population
dynamics, aiding in wildlife conservation and management.

Information Rights

"Information rights" typically refer to the legal rights individuals or entities have
regarding the information that pertains to them. These rights govern how information is
collected, stored, processed, and shared by organizations or individuals that possess it.

Here are some common information rights:

1. Right to Privacy: This is the right of individuals to control the collection, use, and
dissemination of their personal information. It includes the right to know what

22 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 2 – INTERNET SERVICES AND SECURITY MEASURES
information is being collected, how it's being used, and the ability to consent to or
opt out of certain uses.
2. Right to Access: This is the right of individuals to access and review the
information that organizations hold about them. Individuals may request copies of
their personal data and information about how it's being processed.
3. Right to Rectification: This is the right of individuals to correct inaccurate or
incomplete information held by organizations about them. Individuals can request
that their information be updated or corrected if it's incorrect.
4. Right to Erasure (Right to be Forgotten): This is the right of individuals to request
the deletion or removal of their personal information from an organization's
records. It applies in situations where the information is no longer necessary for
the purpose for which it was collected or processed.
5. Right to Data Portability: This is the right of individuals to obtain and reuse their
personal data for their own purposes across different services. It allows individuals
to move, copy, or transfer their personal information from one organization to
another in a commonly used format.
6. Right to Restriction of Processing: This is the right of individuals to limit the
processing of their personal data under certain circumstances. It allows individuals
to request that their data not be processed for certain purposes or that its
processing be temporarily suspended.
7. Right to Object: This is the right of individuals to object to the processing of their
personal data in certain situations, such as for direct marketing purposes or where
the processing is based on legitimate interests.

Privacy and Freedom in Information

Privacy and freedom of information are fundamental principles that play crucial roles in
shaping a healthy and democratic information society. Here's a breakdown of each concept
and their significance:

23 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 2 – INTERNET SERVICES AND SECURITY MEASURES
1. Privacy:
- Definition: Privacy refers to the right of individuals to control their personal
information and make decisions about how it is collected, used, and shared.
- Importance: Privacy is essential for safeguarding individual autonomy, dignity and
personal freedoms. It enables individuals to maintain boundaries, protect sensitive
information, and prevent unwarranted intrusion into their lives.
- Implications for Information Society: In an information society, where vast amounts
of personal data are collected and processed, privacy is critical for ensuring trust,
transparency, and accountability in the handling of information. Strong privacy
protections are necessary to prevent abuses of power, discrimination, and breaches of
confidentiality.
2. Freedom of Information:
- Definition: Freedom of information refers to the right of individuals to access
information held by public authorities and to exercise their right to know about
matters of public interest.
- Importance: Freedom of information is essential for fostering transparency,
accountability, and democratic governance. It enables citizens to make informed
decisions, hold governments and institutions accountable, and participate in public
discourse,
- Implications for Information Society: In an information society, where access to
information is facilitated by digital technologies, freedom of information becomes
even more crucial. It ensures that individuals have access to government data,
scientific research, cultural heritage, and other forms of knowledge, promoting
innovation, education, and civic engagement.

Privacy and freedom of information are not inherently contradictory but rather
complementary principles that support the development of an inclusive and democratic
information society. Balancing these rights requires careful consideration of ethical,
legal, and technical frameworks that protect individual privacy while upholding
transparency and accountability in the digital age.

24 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 2 – INTERNET SERVICES AND SECURITY MEASURES

Cyber Security and its Principles

Cybersecurity is like a digital shield that protects our online world from hackers, viruses,
and other threats. It's all about keeping our computers, devices, and information safe
from bad actors who try to steal, damage, or disrupt our online activities. Here are some
simple principles of cybersecurity:

1. Keep Your Devices Safe: Just like you lock your front door to keep intruders out, make
sure your devices have strong passwords or passcodes to keep hackers from getting in.
Also, keep your software updated because updates often fix security holes that hackers
can exploit.
2. Be Careful with Links and Attachments: Just like you wouldn't open a mysterious
package from a stranger, be cautious about clicking on links or opening attachments
in emails or messages from people you don't know. They could be phishing attempts
trying to trick you into giving away your personal information.
3. Use Secure Connections: When you're online, make sure you're using secure Wi-Fi
networks, especially when doing things like banking or shopping. Look for "https://" in
the website address and the padlock icon in the browser to ensure your connection is
encrypted and secure.
4. Protect Your Personal Information: Just like you wouldn't give out your home address
to a stranger, be careful about sharing personal information online. Only give out
your information on websites you trust, and be cautious about what you share on social
media.
5. Backup Your Data: Just like you make copies of important documents, regularly back
up your digital data-like photos, documents, and files-so you don't lose them if
something goes wrong, like a cyberattack or hardware failure.
6. Stay Informed and Be Vigilant: Just like you keep an eye out for suspicious activity in
your neighbourhood, stay informed about the latest cybersecurity threats & be vigilant
for signs of trouble, like unusual emails or unexpected charges on your accounts.

25 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 2 – INTERNET SERVICES AND SECURITY MEASURES
By following these simple principles, you can help keep yourself and your digital world
safe from cyber threats.

Computer Malwares

Computer malware refers to malicious software designed to infiltrate, damage, or disrupt


computer systems, networks, and devices. Malware is created by cybercriminals with the
intent of stealing sensitive information, gaining unauthorized access to systems, or
causing harm to users and organizations.

There are various types of malwares, including viruses, worms, Trojans, ransomware,
spyware, adware, and rootkits, each with its own method of infection and malicious
behaviour. Malware can spread through email attachments, infected websites, removable
media, or software vulnerabilities.

Once installed on a system, malware can perform a range of harmful activities, such as
stealing personal information, encrypting files for ransom, disrupting system
operations, or turning infected devices into bots for carrying out large- scale attacks.

Well Known Cyber Attacks

Here are explanations of some well-known cyberattacks:

1. Phishing: Phishing is a type of cyberattack where attackers disguise themselves as


trustworthy entities, often via email or instant messaging, to trick individuals into
providing sensitive information such as passwords, credit card numbers, or other
personal data. These attacks often rely on social engineering tactics to manipulate
users into clicking on malicious links or downloading harmful attachments.
2. Spoofing: Spoofing is like wearing a disguise. Instead of showing who they really are,
hackers pretend to be someone or something trusted, like a website or a person you

26 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 2 – INTERNET SERVICES AND SECURITY MEASURES
know. They might fake emails, phone numbers, or even computer addresses to trick
you into giving them your personal info or doing something you shouldn't.
3. Malware: Malware, short for malicious software, encompasses a wide range of harmful
software designed to infiltrate, damage, or gain unauthorized access to computer
systems or networks. Examples include viruses, worms, Trojans, ransomware, spyware,
and adware. Malware can be delivered through phishing emails, infected websites, or
compromised software.
4. Denial of Service (DoS) and Distributed Denial of Service (DDoS): DoS attacks aim to
disrupt the normal functioning of a target system or network by overwhelming it with
a flood of traffic, thereby making it unavailable to legitimate users. DDoS attacks
involve multiple compromised systems (often a botnet) coordinating to launch a
synchronized attack on the target, amplifying the impact.
5. Man-in-the-Middle (MitM): In a Man-in-the-Middle attack, an attacker intercepts and
possibly alters communication between two parties without their knowledge. This can
occur in various forms, such as in Wi-Fi eavesdropping, where an attacker intercepts
data transmitted over a Wi-Fi network, or in HTTPS spoofing, where the attacker
positions themselves between the user and a secure website to intercept sensitive
information.
6. SQL Injection: SQL injection is a type of code injection attack where malicious SQL
queries are inserted into input fields of a web application, exploiting vulnerabilities in
the application's database layer. Successful SQL injection attacks can allow attackers
to bypass authentication, retrieve sensitive data, modify database contents, or even
execute arbitrary commands on the underlying server.

These are just a few examples of common cyberattacks, but there are many others, each
with its own methods and goals. Staying informed about these threats and practicing good
cybersecurity hygiene is essential for protecting against them.

Prevention Measures to Mitigate Cyber Attacks

27 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 2 – INTERNET SERVICES AND SECURITY MEASURES
Certainly! Here's how preventive measures like CAPTCHA codes and strong passwords can
be used to mitigate cyberattacks:

1. CAPTCHA Codes:
- Phishing Prevention: CAPTCHA codes can be implemented on login pages or forms to
differentiate between human users and automated bots. This helps prevent automated
bots from submitting phishing forms or attempting brute-force attacks.
- Account Registration: CAPTCHA codes can be used during account registration
processes to ensure that only real users are creating accounts, reducing the likelihood
of fake accounts used for malicious purposes.
- Comment Spam Prevention: Websites often use CAPTCHA codes to prevent automated
bots from posting spam comments on blogs or forums, reducing the risk of spreading
malware or phishing links.
2. Strong Passwords:
- Credential Protection: Encourage users to create strong, unique passwords for their
accounts to prevent unauthorized access. Strong passwords are typically long,
complex, and include a combination of letters, numbers, and special characters.
- Password Policies: Enforce password policies that require regular password updates,
prohibit the reuse of old passwords, and set minimum length and complexity
requirements.
3. Two-Factor Authentication
- Additional Layer of Security: Require users to provide a second form of authentication,
such as a one-time code generated by a mobile app or sent via SMS, in addition to their
password. This significantly enhances account security, even if the password is
compromised.
- Phishing Protection: 2FA helps protect against phishing attacks by requiring
attackers to bypass not only the password but also the second authentication factor,
which is more difficult to obtain.

28 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 2 – INTERNET SERVICES AND SECURITY MEASURES
- Account Recovery: In the event of a forgotten password or account compromise, 2FA
can serve as an additional verification step during the account recovery process,
preventing unauthorized access.
4. Password Managers:
- Secure Storage: Encourage users to use password managers to securely store and
manage their passwords. Password managers generate strong, unique passwords for
each account and store them encrypted in a vault, reducing the risk of password reuse
and simplifying password management.
- Autofill Functionality: Password managers offer autofill functionality, which
automatically fills in login credentials for users, reducing the likelihood of phishing
attacks targeting users to enter their passwords on fake login pages.

Blockchain Technique

Blockchain is like a digital ledger or record-keeping system that stores information in


blocks that are linked together in a chain. Each block contains data, like transactions or
records, and is secured using cryptography. Once a block is added to the chain, it's
difficult to change because altering it would require changing all the blocks that come
after it, which is practically impossible. This makes blockchain a secure and transparent
way to record and verify transactions without needing a central authority, like a bank or
government, to oversee it.

Use of Blockchain technique for security measures

1. Data Integrity:
- Blockchain ensures data cannot be easily changed or tampered with, providing a
reliable way to verify that information is accurate and hasn't been altered.
2. Decentralization:
- By distributing data across many computers (nodes) in a network, blockchain
eliminates the risk of a single point of failure, making it harder for hackers to attack.

29 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 2 – INTERNET SERVICES AND SECURITY MEASURES
3. Transparency:
- All transactions recorded on a blockchain are visible to all participants, enhancing
transparency and making it easier to detect fraudulent activities.
4. Encryption:
- Blockchain uses advanced cryptographic techniques to secure data, ensuring that only
authorized parties can access or interpret the stored information.
5. Immutable Records:
- Once information is added to the blockchain, it cannot be deleted or altered, providing
a permanent and unchangeable record of all transactions.
6. Smart Contracts:
- Blockchain can execute smart contracts, which are self-executing contracts with the
terms directly written into code. They automatically enforce and verify the terms of
an agreement, reducing the need for intermediaries and increasing security.
7. Identity Verification:
- Blockchain can securely manage digital identities, making it easier to authenticate
users and prevent identity theft.
8. Supply Chain Security:
- By recording each step of a product's journey on a blockchain, companies can track
goods from origin to delivery, ensuring product authenticity and reducing fraud.
9. Secure Voting Systems:
- Blockchain can be used to create secure, transparent voting systems where votes are
recorded on the blockchain, ensuring that they cannot be tampered with and that the
voting process is transparent and verifiable.
10. Financial Transactions:
- Blockchain provides a secure and efficient way to conduct financial transactions,
reducing the risk of fraud and ensuring the integrity of transaction records.

30 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 3 – CURRENT COMPUTING PARADIGM
Cloud Computing

Cloud computing is a technology that allows users to access and store data, applications,
and services over the internet instead of relying on local servers or personal computers.
It offers flexibility, scalability, and cost savings by enabling on-demand access to
computing resources, such as storage, processing power, and software, from anywhere
with an internet connection. This means that businesses and individuals can use cloud
services to manage their IT needs more efficiently, without the need for significant
upfront investments in hardware and infrastructure.

Merits:

• Cost-Efficiency: Reduces the need for physical hardware and maintenance.


• Scalability: Easily scales resources up or down based on demand.
• Accessibility: Enables access to services and data from anywhere with internet.
• Reliability: Offers high availability and disaster recovery options.

Demerits:

• Security Concerns: Potential vulnerability to data breaches and cyberattacks.


• Dependence on Internet: Requires a stable internet connection to access services.
• Limited Control: Less control over infrastructure and underlying systems.
• Potential Downtime: Service outages can disrupt access to resources.

Types Of Cloud

1. Public Cloud:
• Definition: Services are delivered over the internet by third-party providers.
Resources are shared among multiple organizations (tenants).
• Examples: Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform
(GCP).

31 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 3 – CURRENT COMPUTING PARADIGM
• Advantages: Cost-effective, no maintenance, scalable, and highly available.
• Disadvantages: Less control over security and customization, potential privacy
concerns.
2. Private Cloud:
• Definition: Cloud infrastructure is used exclusively by a single organization. It can
be hosted on-premises or by a third-party provider.
• Examples: VMware, OpenStack.
• Advantages: Greater control, enhanced security, and customization tailored to
specific needs.
• Disadvantages: More expensive, requires maintenance, and limited scalability
compared to public cloud.
3. Hybrid Cloud:
• Definition: A combination of public and private clouds, allowing data and
applications to be shared between them. This model provides greater flexibility.
• Examples: IBM Hybrid Cloud, Microsoft Azure (with on-premises solutions).
• Advantages: Flexibility, optimized costs, and balanced security and scalability.
• Disadvantages: Complexity in management, potential for compatibility issues, and
requires robust networking.
4. Community Cloud:
• Definition: A cloud infrastructure shared by several organizations with common
concerns (e.g., security, compliance, or mission). It can be managed by the
organizations or a third party.
• Examples: Government agencies or educational institutions sharing resources.
• Advantages: Cost savings, shared infrastructure, and collaboration.
• Disadvantages: Limited control compared to private cloud, potential for conflicting
interests among users.

32 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 3 – CURRENT COMPUTING PARADIGM
Service Oriented Approach

A Service-Oriented Approach is a way of designing and developing software where the


focus is on creating reusable, self-contained services that can be easily integrated and
used by different applications. Each service performs a specific function and
communicates with other services through well-defined interfaces, often over a network.
This approach allows for greater flexibility, as services can be independently developed,
updated, or replaced without affecting the entire system. It's like building with LEGO
blocks-each block (service) can be used in multiple ways to create different structures
(applications), making it easier to adapt to changing needs.

Virtualization

Virtualization is technology that you can use to create virtual representations of servers,
storage, networks, and other physical machines. Virtual software mimics the functions of
physical hardware to run multiple virtual machines simultaneously on a single physical
machine. Businesses use virtualization to use their hardware resources efficiently and get
greater returns from their investment. It also powers cloud computing services that help
organizations manage infrastructure more efficiently.

By using virtualization, you can interact with any hardware resource with greater
flexibility. Physical servers consume electricity, take up storage space, and need
maintenance. You are often limited by physical proximity and network design if you want
to access them. Virtualization removes all these limitations by abstracting physical
hardware functionality into software. You can manage, maintain, and use your hardware
infrastructure like an application on the web.

33 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 3 – CURRENT COMPUTING PARADIGM
Types of Virtualizations

1. Hardware Virtualization:

Definition: Involves abstracting the physical hardware of a computer into multiple virtual
machines (VMs) that can run different operating systems and applications independently.

Examples: Hypervisors like VMware ESXi, Microsoft Hyper-V, and Oracle VM VirtualBox.

Benefits: Maximizes hardware utilization, isolates applications, and supports running


multiple OSes on a single physical server.

2. Server Virtualization:

Definition: A type of hardware virtualization where multiple virtual servers are created on
a single physical server. Each virtual server operates as if it were a standalone server.

Examples: VMware vSphere, Microsoft Hyper-V, and Citrix XenServer.

Benefits: Reduces hardware costs, simplifies management, and improves resource


allocation and scalability.

3. Operating System (OS) Virtualization:


• Definition: Also known as containerization, this type involves running multiple
isolated user-space instances (containers) on a single OS kernel. Each container
shares the same OS but operates independently.
• Examples: Docker, LXC (Linux Containers), and Kubernetes (for orchestration).
• Benefits: Lightweight, fast deployment, efficient use of resources, and simplified
application management.
4. Storage Virtualization:
• Definition: Combines physical storage from multiple devices into a single, unified
storage resource that can be managed centrally. It abstracts and pools storage
resources to improve utilization and flexibility.

34 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 3 – CURRENT COMPUTING PARADIGM
• Examples: SAN (Storage Area Network) virtualization, NAS (Network-Attached
Storage) virtualization.
• Benefits: Simplifies storage management, improves storage utilization, and
provides easier scalability and backup solutions.

Business Model

The Cloud Business Model encompasses various service types that cater to different
needs and levels of control. The three primary models are Infrastructure as a Service
(IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).

Infrastructure as a Service (IaaS) provides virtualized computing resources over the


internet. Users can rent virtual machines, storage, and networking infrastructure from
cloud providers rather than investing in physical hardware. This model offers the highest
level of control over the operating systems and applications running on the
infrastructure. Examples include Amazon Web Services (AWS) EC2, Microsoft Azure
Virtual Machines, and Google Cloud Compute Engine.

Platform as a Service (PaaS) delivers a platform that allows developers to build, deploy,
and manage applications without dealing with the underlying infrastructure. It provides a
development environment and tools, which abstract the complexity of hardware and
operating systems, enabling faster development cycles and streamlined application
management. Examples include Google App Engine, Microsoft Azure App Services, and
Heroku.

Software as a Service (SaaS) offers fully functional applications over the internet,
eliminating the need for users to install, manage, or maintain the software on their local
devices. Users access the software through a web browser, with all underlying
infrastructure, platforms, and software managed by the provider. This model is ideal for
end-users looking for ready-to-use applications with minimal setup. Examples include
Google Workspace (formerly G Suite), Microsoft Office 365, and Salesforce.

35 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 3 – CURRENT COMPUTING PARADIGM
Use Cases of Cloud Computing

Cloud computing has a wide range of use cases due to its flexibility and scalability. Here
are some key examples:

• Data Storage and Backup: Cloud services provide scalable storage solutions for
data, enabling automatic backups and easy access from anywhere. This is ideal for
both individual users and businesses needing reliable data protection.
• Web Hosting: Cloud platforms offer scalable and cost-effective web hosting
solutions, accommodating varying traffic levels and ensuring high availability and
performance for websites and applications.
• Application Development and Testing: Developers use cloud environments to build,
test, and deploy applications quickly, leveraging scalable resources and tools
without investing in physical hardware.
• Big Data Analytics: Cloud computing enables processing and analysing large
datasets with powerful computing resources, helping organizations gain insights
and make data-driven decisions.
• Disaster Recovery: Cloud-based disaster recovery solutions provide quick and cost-
effective backup and restoration services, ensuring business continuity in case of
data loss or system failures.
• Collaborative Tools: Cloud applications like Google Workspace and Microsoft Office
365 facilitate real-time collaboration and document sharing among teams,
enhancing productivity and communication.
• Machine Learning and AI: Cloud platforms offer scalable infrastructure and tools
for developing and deploying machine learning models and artificial intelligence
applications, supporting complex computations and large-scale data processing.

36 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 3 – CURRENT COMPUTING PARADIGM
Green Computing

Green Computing is the practice of designing, using, and disposing of technology in an


environmentally friendly way. It aims to reduce the negative impact of computing on the
environment by improving energy efficiency, minimizing waste, and promoting the use of
sustainable resources. This can involve using energy-efficient hardware, optimizing
software to reduce power consumption, and recycling old electronic devices. The goal is to
make computing more eco-friendly, helping to conserve resources and reduce pollution
while still delivering the benefits of technology.

Benefits of Green Computing:

• Reduced Energy Consumption: Energy-efficient hardware and optimized software


lead to lower power usage, cutting down on electricity costs.
• Lower Carbon Footprint: By reducing energy consumption, green computing helps
decrease greenhouse gas emissions and overall environmental impact.
• Cost Savings: Efficient technology reduces operational costs and extends the
lifespan of equipment, leading to long-term savings.
• Extended Hardware Life: Energy-efficient devices and better management
practices extend the life of hardware, reducing the frequency of replacements.
• Enhanced Corporate Image: Adopting green computing practices can improve a
company's reputation and appeal to environmentally conscious customers.
• Compliance and Incentives: Aligning with environmental regulations and standards
can help avoid penalties and may provide access to government incentives or
subsidies.
• Waste Reduction: Promotes recycling and proper disposal of electronic waste,
reducing landfill usage and environmental pollution.

37 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 3 – CURRENT COMPUTING PARADIGM
Edge Computing

Edge Computing refers to processing data closer to where it is generated rather than
sending it to a central data center or cloud for processing. Imagine you have a smart
device, like a security camera or a sensor, that collects data. Instead of sending all that
data to a distant server, edge computing processes it right at or near the device itself.
This reduces delays, speeds up response times, and helps handle large amounts of data
more efficiently. Essentially, it's about moving the computing power closer to where the
data is created to improve performance and reduce reliance on distant servers.

Benefits of Edge Computing

• Faster Response Times: By processing data closer to where it's generated, edge
computing reduces delays, leading to quicker responses and actions.
• Reduced Bandwidth Use: Less data needs to be sent over the internet, saving
bandwidth and lowering data transfer costs.
• Improved Reliability: Since data is processed locally, services can continue to
function even if the connection to central servers is lost.
• Enhanced Security: Keeping sensitive data closer to the source reduces the risk of
it being intercepted during transmission.
• Lower Latency: Quick data processing near the source means less lag, which is
crucial for real-time applications like video streaming or autonomous vehicles.

Quantum Computing

Quantum Computing is a type of computing that leverages the principles of quantum


mechanics to process information in ways that traditional computers cannot. Unlike
classical computers, which use bits as the smallest unit of data (0 or 1), quantum
computers use quantum bits or qubits. Qubits can represent and process multiple states
simultaneously due to properties like superposition and entanglement.

38 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 3 – CURRENT COMPUTING PARADIGM
This allows quantum computers to solve certain complex problems much more quickly
than classical computers.

Benefits of Quantum Computing:

• Super-Fast Calculations: Quantum computers can solve complex problems much


faster than traditional computers by processing many possibilities at once.
• Better Problem-Solving: They can tackle problems in areas like cryptography,
drug discovery, and materials science more effectively, potentially leading to
major breakthroughs.
• Enhanced Simulations: Quantum computing can simulate complex systems, like
chemical reactions or physical phenomena, more accurately, which helps in
research and development.
• Improved Optimization: They can optimize complex systems, like supply chains or
financial portfolios, more efficiently, leading to better solutions and cost savings.
• Advanced AI and Machine Learning: Quantum computing has the potential to
significantly enhance artificial intelligence and machine learning, enabling more
powerful and smarter systems.

Big Data

Big Data refers to extremely large and complex datasets that are too vast to be
processed and analysed using traditional data management tools. These datasets can
come from various sources, such as social media, sensors, transactions, and more. Big
Data is characterized by its high volume (amount of data), velocity (speed at which data is
generated and processed), and variety (different types of data). The goal of managing Big
Data is to extract meaningful insights and patterns from these massive amounts of
information. This can help organizations make better decisions, improve operations, and
create new opportunities.

39 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF)
UNIT 3 – CURRENT COMPUTING PARADIGM
Challenge of Big Data

Challenges of Big Data:

• Data Management: Storing, organizing, and retrieving large volumes of data can be
complex and require sophisticated systems.
• Data Integration: Combining data from various sources and formats can be
challenging, often requiring specialized tools and techniques.
• Scalability: As data grows, systems need to scale efficiently to handle increasing
amounts of information without performance issues.
• Data Quality: Ensuring accuracy, consistency, and reliability of data is critical, as
poor data quality can lead to incorrect insights and decisions.
• Security and Privacy: Protecting sensitive data from breaches and ensuring
compliance with privacy regulations is crucial and often difficult.
• Complexity: Analysing and interpreting vast amounts of data requires advanced
algorithms and tools, which can be technically demanding.
• Cost: Managing and analysing Big Data can be expensive due to the need for
specialized hardware, software, and skilled personnel.

How to Overcome these Challenges

Overcoming Big Data Challenges:

• Use Scalable Tools: Employ technologies like Hadoop and Spark for efficient data
storage and processing.
• Implement Data Integration Solutions: Utilize data integration tools and platforms
to combine and harmonize data from various sources.
• Adopt Cloud Services: Leverage cloud platforms for scalable storage and
processing power.
• Ensure Data Quality: Implement robust data governance practices and quality
control measures.

40 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 3 – CURRENT COMPUTING PARADIGM
• Strengthen Security: Apply encryption, access controls, and regular security
audits to protect data.
• Utilize Advanced Analytics: Use machine learning and Al to handle complex data
analysis and derive insights.
• Manage Costs Efficiently: Optimize resource usage and explore cost-effective
cloud solutions and open-source tools.

41 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 4 – business data handling

Transaction Processing System

A Transaction Processing System (TPS) is a sophisticated information system that


enables firms to manage real-time transactions. It captures, processes, and stores every
transaction within an organization, ensuring data integrity and providing rapid responses.
TPS can handle batch processing or real-time processing, offering reliability, efficiency,
and accurate transaction processing. It is pivotal for managing business transactions
securely and maintaining seamless operation

Types of Transaction Processing Systems

1. Batch Processing: In batch processing, transactions are gathered and processed


together at scheduled intervals, notably in groups or batches. This method involves
accumulating transactions over some time and then processing them collectively as a
single unit.
2. Real-Time Processing: Real-time processing involves the immediate processing of
each transaction as it happens, without any delay. This means that transactions are
processed instantly, and the results are available immediately. Real-time processing
is essential for applications where immediate feedback is pivotal, such as online
banking, e commerce platforms, and inventory management systems.

42 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 4 – business data handling

Characteristics of Transaction Processing System

• Speed: TPS processes transactions very quickly, often in real-time, so you don't have
to wait long for things like payments or orders to go through.
• Accuracy: It ensures that every transaction is recorded correctly, minimizing errors
in data like prices, quantities, or payment details.
• Reliability: TPS is designed to work consistently without crashing or losing data, even
if many transactions are happening at the same time.
• Security: It keeps transaction data safe from unauthorized access, protecting
sensitive information like credit card numbers or personal details.
• Consistency: The system makes sure that all related parts of a transaction (like
payment and inventory updates) are completed correctly, so there's no confusion.
• Backup and Recovery: TPS can recover quickly from issues like power failures or
system crashes, ensuring that no transaction data is lost.

Analytical Processing Concepts

Online Analytical Processing (OLAP) is a powerful technology used for complex data
analysis. It allows users to interactively explore and analyze large volumes of data from
multiple perspectives, typically in a multidimensional format. OLAP systems are built on
a multidimensional database structure, which organizes data into cubes, enabling users to
drill down into detailed data or roll up to more aggregated views. This multidimensional
approach is highly efficient for querying and is used in various applications like business
intelligence, reporting, and decision support. By providing rapid access to aggregated
data, OLAP systems facilitate trend analysis, financial reporting, and forecasting, making
them crucial for strategic planning and data-driven decision-making in organizations.

43 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 4 – business data handling

Types/Techniques of Online Analytical Processing (OLAP)

MOLAP

Multidimensional online analytical processing (MOLAP) involves creating a data cube that
represents multidimensional data from a data warehouse. The MOLAP system stores
precalculated data in the hypercube. Data engineers use MOLAP because this type of OLAP
technology provides fast analysis.

ROLAP

Instead of using a data cube, relational online analytical processing (ROLAP) allows data
engineers to perform multidimensional data analysis on a relational database. In other
words, data engineers use SQL queries to search for and retrieve specific information
based on the required dimensions. ROLAP is suitable for analyzing extensive and detailed
data. However, ROLAP has slow query performance compared to MOLAP.

HOLAP

Hybrid online analytical processing (HOLAP) combines MOLAP and ROLAP to provide the
best of both architectures. HOLAP allows data engineers to quickly retrieve analytical
results from a data cube and extract detailed information from relational databases

44 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 4 – business data handling

Distinguish Between OLTP [Online Transaction


Processing) and OLAP [Online Analytical Processing]

Parameters OLTP OLAP


It is a system for processing large volumes it is a system for the multidimensional
Purpose
of real-time transactional data. analysis of consolidated business data
It is used to make business decisions
It is used for adding, deleting, or updating
Usage through queries and complex analyses of
databases to keep the data up-to-date.
large amounts of data.
The system is focused on data analysis
The system is more focused on transactional
Focus and not on maintaining day-to-day
data maintenance and less on data analysis.
transactions.
OLAP has multiple data sources, which
OLTP sources data from traditional database
Data Source include real-time and historical
management systems.
databases, including OLTP.
The data consists of a large number of short The system processes large volumes of
Data Type
transactions. data from multiple sources.
Depending on the query, processing time
Very low processing time at the scale of a
Processing Time is not as fast as OLTP systems and may
few milliseconds.
range from a few seconds to hours.
Query Related to adding, deleting, and updating data. Related to data analysis.
OLTP systems are available round-the-clock OLAP systems don't need to be updated so
Availability and updated frequently to maintain data frequently since their functions are
integrity. analytic in nature.
Normalization Data tables are normalized. Data tables are not normalized.
Backup Requires constant backup and recovery. Can be backed up less frequently.
Accommodates multiple users but doesn't
User volume Supports large user volume simultaneously.
have a large user volume like OLTP.
Operations Allows both read and write operations. Usually supports read-only operations.
Processes analytical queries consistently
Process Processes day-to-day data quickly.
and at a fast pace.

45 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 4 – business data handling

Data Mining

Data mining is the process of sorting through large data sets to identify patterns and
relationships that can help solve business problems through data analysis. Data mining
techniques and tools help enterprises to predict future trends and make more informed
business decisions.

Data mining is a key part of data analytics and one of the core disciplines in data science,
which uses advanced analytics techniques to find useful information in data sets.

Text Mining

Text mining is the process of analysing large amounts of text to extract useful
information, patterns, or insights. It involves turning unstructured text, like emails,
social media posts, or documents, into structured data that can be analysed. Techniques
used in text mining include identifying keywords, detecting sentiment (whether the text is
positive or negative), and grouping similar texts together. This helps businesses and
researchers understand trends, customer opinions, or important topics within large text
datasets.

Web Mining

Web mining is the process of discovering useful information and patterns from data
collected from the web. This includes analysing the content of websites, user behaviour,
and the structure of links between pages. For example, web mining can help businesses
understand how users navigate their websites, what content is most popular, and how
different web pages are connected. This information is valuable for improving website
design, targeting advertisements, and enhancing the user experience. Essentially, web
mining turns the vast amount of data available on the web into actionable insights.

46 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 4 – business data handling

Artificial Intelligence

Artificial Intelligence (AI) refers to the simulation of human intelligence in machines


programmed to think and learn. It encompasses various technologies, including machine
learning, natural language processing, and computer vision. AI can perform tasks such as
recognizing speech, making decisions, and solving problems. Its applications range from
virtual assistants and recommendation systems to autonomous vehicles and medical
diagnostics. The goal of AI is to create systems that can function intelligently and
adaptively in complex environments.

Importance Of Artificial Intelligence

• Automation: AI can automate repetitive tasks, freeing up time for people to focus on
more creative and complex work. This increases productivity and efficiency in various
industries.
• Decision-Making: AI can analyze vast amounts of data quickly, helping businesses and
organizations make better and faster decisions. It can identify patterns and trends
that humans might miss, leading to more informed choices.
• Personalization: AI allows for highly personalized experiences, such as tailored
recommendations on streaming services or customized online shopping experiences.
This improves customer satisfaction and engagement.
• Innovation: AI drives innovation by enabling new technologies and solutions, from self-
driving cars to advanced medical diagnostics. It opens up possibilities for
breakthroughs in areas like healthcare, education, and environmental conservation.
• Problem-Solving: AI can tackle complex problems that are difficult for humans to
solve, such as climate modelling, drug discovery, and disaster response. Its ability to
process and analyse data at scale is crucial in addressing global challenges.
• Accessibility: AI can make technology more accessible to people with disabilities by
providing tools like speech recognition, text-to-speech, and image recognition,
enhancing their ability to interact with the digital world.

47 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 4 – business data handling
• Economic Growth: AI has the potential to boost economic growth by creating new jobs,
industries, and markets. It also helps companies reduce costs and improve efficiency,
leading to better products and services.

Evolution of AI

• Early Days: AI began in the 1950s with researchers trying to create machines that
could perform tasks that required human intelligence, like playing chess or solving
problems. These early systems were very basic and relied on simple rules and logic.
• Symbolic AI: In the 1960s and 70s, researchers developed "symbolic AI," where
machines used symbols and rules to represent knowledge and make decisions. This
approach worked well for certain problems but struggled with more complex tasks.
• Machine Learning: In the 1980s and 90s, AI began to shift towards "machine learning,"
where systems learn from data rather than just following programmed rules. This was
a big breakthrough, allowing AI to improve its performance over time based on
experience.
• Deep Learning: In the 2000s, deep learning emerged as a key technique. It involves
using neural networks with many layers (hence "deep") to analyze large amounts of
data. This method has enabled impressive advancements in image and speech
recognition, language translation, and more.
• Modern AI: Today, AI is all around us—from virtual assistants like Siri and Alexa to
recommendation systems on Netflix and social media. It continues to evolve rapidly,
with advancements in areas like natural language processing, robotics, and ethical AI.

Data Handling

Data handling is all about organizing, managing, and using data effectively. Think of it as
sorting through a huge pile of information to make it useful. This includes tasks like
collecting data from different sources, cleaning it to remove errors or inconsistencies,
and storing it in a way that makes it easy to access and analyze. Good data handling

48 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 4 – business data handling
ensures that information is accurate, secure, and ready to be used for making decisions,
finding trends, or solving problems. In simple terms, it’s about keeping data in order so it
can be easily understood and put to good use.

Business Data Handling Through use cases

Data handling is crucial in various real-life applications, including business operations,


healthcare, finance, education, etc.

1. Data Handling in Business Operations


- Data handling is essential in business operations to make informed decisions, solve
problems, and understand trends. For instance, a company may collect sales,
inventory, and customer feedback data to analyse trends and make informed decisions
about production and marketing strategies
2. Data Handling in Healthcare:
- Data handling is crucial for monitoring and improving patient health outcomes in
healthcare. For instance, healthcare professionals may collect data on patient
symptoms, medical history, and test results to diagnose and treat medical conditions.
They may also use data to monitor patient health trends and identify potential health
risk.
3. Data Handling in Finance:
- Data handling is essential in finance for making informed investment, lending, and
risk management decisions. For instance, financial analysts may collect data on
market trends, economic indicators, and financial statements to make informed
decisions about investments and lending. They may also use data to monitor financial
trends and identify potential risks.
4. Data Handling in Education:
- Data handling is essential in education for making informed decisions about teaching
methods, curriculum, and student performance. For example, teachers may collect
student performance, attendance, and engagement data to identify potential learning
gaps and adjust teaching methods accordingly.

49 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 4 – business data handling
5. Data Handling in Research: Data handling is essential in research for making informed
decisions about research design, data collection, and analysis. For instance,
researchers may collect data on various variables to test hypotheses and make
informed decisions about research findings. They may also use data to identify trends
and make informed decisions about future research.

Basic Concept of an Expert System in context of Business


data management

Expert System: An expert system is Al software that uses knowledge stored in a


knowledge base to solve problems that would usually require a human expert thus
preserving a human expert's knowledge in its knowledge base. They can advise users as
well as provide explanations to them about how they reached a particular conclusion or
advice. Characteristics of an Expert System:

(i) Human experts are perishable, but an expert system is permanent.


(ii) It helps to distribute the expertise of a human.
(iii) One expert system may contain knowledge from more than one human
expert thus making the solutions more efficient.
(iv) It decreases the cost of consulting an expert for various domains such as
medical diagnosis.
(v) They use a knowledge base and inference engine
(vi) Expert systems can solve complex problems by deducing new facts through
existing facts of knowledge, represented mostly as if-then rules rather than
through conventional procedural code.
(vii) Expert systems were among the first truly successful forms of artificial
intelligence (AI) software.
Components of an Expert System:

• Knowledge Base- The knowledge base represents facts and rules. It consists of
knowledge in a particular domain as well as rules to solve a problem, procedures and
intrinsic data relevant to the domain

50 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 4 – business data handling
• Inference Engine
- The function of the inference engine is to fetch the relevant knowledge from the
knowledge base, interpret it and to find a solution relevant to the user's problem
• Knowledge Acquisition and Learning Module
- The function of this component is to allow the expert system to acquire more and
more knowledge from various sources and store it in the knowledge base.
• User Interface- This module makes it possible for a non-expert user to interact with
the expert system and find a solution to the problem.
• Explanation Module - This module helps the expert system to give the user an
explanation about how the expert system reached a particular conclusion.

Machine Learning

Machine Learning is a field of artificial intelligence where computers learn from data and
improve their performance over time without being explicitly programmed for each
specific task. Instead of following fixed instructions, machine learning algorithms use
patterns and information from past data to make predictions or decisions. For example, a
machine learning model might analyse thousands of emails to learn how to identify spam.
As it processes more data, it becomes better at distinguishing between spam and
legitimate messages. Essentially, machine learning allows systems to adapt and refine
their behaviour based on experience, leading to smarter and more efficient applications.

Types of Machine Learning

the main types of machine learning:

1. Supervised Learning: The model is trained on labelled data, where the input comes with
the correct output. It learns to predict outcomes based on this data. Examples include
classification (e.g., spam detection) and regression (e.g., predicting house prices).

51 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 4 – business data handling
2. Unsupervised Learning: The model works with unlabelled data and tries to find patterns
or groupings on its own. Examples include clustering (e.g., customer segmentation)
and dimensionality reduction (e.g., simplifying data for visualization).

3. Semi-Supervised Learning: This combines a small amount of labelled data with a large
amount of unlabelled data during training. It leverages the labelled data to improve
learning from the unlabelled data.

4. Reinforcement Learning: The model learns by interacting with an environment and


receiving feedback in the form of rewards or penalties. It aims to maximize
cumulative rewards by making sequences of decisions. Examples, game-playing AI and
robotics.

Difference between Supervised and Unsupervised Learning

Supervised Learning Unsupervised Learning


It's a learning setup commonly used in It's a learning setup commonly used
machine learning where human in machine learning where human
Definition supervision is involved as they label supervision is minimal, as the model
the data and provide target output to finds the patterns in the data without
the algorithm to map the input to it any supervision
Input Data Data has labels Data doesn't have labels
Data The data has x features and Y variable, Patterns are found in the x features
Usage and the model finds Y = f(x) of the data as no Y variable is present
When to Know the expected outcome and what is Don't know the expected outcome and
use being looked for what is being looked for
Nature of
Clustering, Dimensionality Reduction,
Problems/ Regression and Classification
and Association
Types
Predict outcomes for new data based Get hidden patterns and useful
Goal
on training data insights from large datasets
Output Predicted labels Clusters or association rules

52 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 4 – business data handling

Application of Machine Learning in Banking and Finance

Machine learning is used in banking and finance in several impactful ways:

1. Fraud Detection: ML algorithms analyze transaction patterns to identify unusual


activity that might indicate fraud, helping to catch fraudulent transactions quickly.

2. Credit Scoring: ML models assess a borrower’s creditworthiness by analyzing


various data points, improving the accuracy of credit scores and lending decisions.

3. Algorithmic Trading: ML algorithms analyze market data to make trading decisions


at high speed, aiming to optimize investment returns.

4. Customer Service: Chatbots and virtual assistants use ML to understand and


respond to customer inquiries, providing quicker and more personalized support.

5. Risk Management: ML models predict potential risks and financial downturns by


analysing historical data and market trends, helping banks and financial
institutions manage their risk exposure effectively.

ERP And Why It is Importance for business

ERP stands for “Enterprise Resource Planning”. It’s a type of software used by businesses
to manage and integrate their core processes. Think of it like a central system that helps
a company coordinate everything from accounting and inventory to human resources and
customer service. Instead of using separate programs for each function, ERP combines
them into one system, making it easier to track and manage different aspects of the
business efficiently.
ERP is important for businesses for several reasons:

1. Efficiency: It streamlines and automates business processes, reducing the need for
manual work and minimizing errors. This helps the company operate more smoothly
and quickly.

53 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 4 – business data handling
2. Centralized Data: ERP systems bring together data from different departments into
one central location. This makes it easier to access and analyze information,
improving decision-making.

3. Improved Reporting: With integrated data, ERP systems provide better insights and
reporting, helping businesses track performance, compliance, and financial status
more accurately.

4. Enhanced Collaboration: By connecting various functions like sales, finance, and


supply chain, ERP systems improve communication and coordination between different
departments.

5. Scalability: As a business grows, ERP systems can adapt and scale to handle increased
complexity and volume, supporting long-term growth and expansion.

6. Customer Satisfaction: With better data and processes, businesses can respond more
effectively to customer needs, manage orders more efficiently, and provide better
service.

Intelligent Agents

Intelligent agents are systems or software that can perform tasks and make decisions on
their own by analyzing data and learning from it. They act independently to achieve
specific goals or solve problems, often adapting their behaviour based on what they learn.
Examples include virtual assistants like Siri or Alexa, which respond to voice commands
and help with various tasks.
Features

• Autonomy: Operate independently.


• Learning: Adapt based on experience.
• Decision-Making: Make choices to achieve goals.
• Adaptability: Adjust behaviour as needed.

54 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 4 – business data handling

Application of Intelligent Agents

• Customer Support: Virtual assistants and chatbots, like those used on websites or in
customer service centers, handle routine inquiries, provide information, and assist
with troubleshooting. They can operate 24/7, offering immediate responses and
freeing up human agents for more complex tasks.
• Personal Assistants: Apps like Siri, Google Assistant, and Alexa use intelligent agents
to help with daily tasks such as setting reminders, sending messages, providing
weather updates, or playing music. They learn user preferences over time to offer
more personalized assistance.
• Healthcare: Intelligent agents assist in diagnosing conditions, managing patient
records, and providing recommendations for treatments. They analyze medical data
and support healthcare professionals in making more informed decisions.
• Finance: In banking and investment, intelligent agents can analyze market trends,
manage investment portfolios, and detect fraudulent activities. They help in making
real-time trading decisions and optimizing financial strategies.
• Smart Homes: Intelligent agents in smart home systems control lighting, heating, and
appliances based on user preferences and behaviours. They contribute to energy
efficiency and convenience by automating home management.
• Autonomous Vehicles: In self-driving cars, intelligent agents process data from
sensors and cameras to navigate roads, avoid obstacles, and make driving decisions.
They enhance safety and improve the driving experience.
• E-commerce: Intelligent agents recommend products based on browsing history and
previous purchases. They enhance the shopping experience by personalizing
recommendations and optimizing search results.

55 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 5 – IT ACT 2000 AND CYBER CRIMES

Information Technology Act 2000

The IT Act 2000, or the Information Technology Act 2000, is an Indian law that provides a
legal framework for electronic transactions and cyber activities. It was introduced to
regulate activities like online business, electronic communication, and digital signatures.
The act also addresses issues related to cybercrimes, such as hacking, identity theft, and
online fraud, by setting penalties and legal standards for such offenses. Essentially, it
aims to make digital transactions secure and trustworthy, while also protecting
individuals and businesses from cyber threats.
The Original Act Contained 94 Section Divided into 13 Chapters and 4 Schedules

The Information Technology Act, 2000 came into effect on October 17, 2000. This act was
India’s first legislation to address legal aspects of the internet, electronic commerce, and
cybercrime. It provided legal recognition for electronic transactions and digital
signatures, paving the way for e-governance and online business in India.

• IT Act, 2000 shall extend to the whole of India. it applies also to any offence or
contravention hereunder committed outside India by any person.
• IT Act, 2000 signed by President K. R. Narayanan on 9 May, 2000
• IT Act, 2000 came into effect from 17th October, 2000

Objectives of Information Technology Act 2000

The objectives of the IT Act, 2000 were:

1. Legal Recognition of Electronic Transactions: To provide a legal framework for


electronic records and digital signatures.

2. Facilitate E-Governance: To promote and facilitate electronic governance by


ensuring legal recognition of electronic records and transactions.

3. Promote E-Commerce: To support the growth of e-commerce by establishing a


secure and legal framework for online transactions.

56 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 5 – IT ACT 2000 AND CYBER CRIMES
4. Cybercrime and Security: To address cybercrimes and enhance cybersecurity by
defining offenses and penalties related to computer systems and data.

5. Regulate Certifying Authorities: To regulate and accredit certifying authorities


that issue digital signatures.

6. Establish a Cyber Appellate Tribunal: To create a mechanism for resolving disputes


and appeals related to cyber laws and regulations.

Features of IT ACT,2000

key features of the IT Act, 2000, explained in simple terms:

1. Legal Recognition of Digital Signatures: Digital signatures are legally recognized,


making electronic documents valid and enforceable like paper documents.

2. Electronic Contracts: The act allows contracts to be formed electronically,


enabling online business transactions.

3. Offenses and Penalties: It defines cybercrimes like hacking, data theft, and
spreading viruses, with specified penalties for these offenses.

4. Regulation of Cyber Activities: The act sets rules for how companies and individuals
should manage and protect digital information.

5. Certifying Authorities: It establishes authorities that verify digital signatures,


ensuring the security and authenticity of online communications.
6. E-Governance: The act supports the use of electronic records and digital
signatures in government processes, promoting e-governance.

57 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 5 – IT ACT 2000 AND CYBER CRIMES

Definitions of Different Terms

"Certifying Authority" means a person who has been granted a licence to issue a Digital
Signature Certificate under section 24,

"Computer" means any electronic, magnetic, optical or other high-speed data processing
device or system which performs logical, arithmetic, and memory functions by
manipulations of electronic, magnetic or optical impulses, and includes all input, output,
processing, storage, computer software, or communication facilities which are connected
or related to the computer in a computer system or computer network,

"Computer Network" means the interconnection of one or more Computers or Computer


systems or Communication device through-

(i) the use of satellite, microwave, terrestrial line, wire, wireless or other communication
media; and
(ii) terminals or a complex consisting of two or more interconnected computers or
communication device whether or not the interconnection is continuously maintained,

"Computer System" means a device or collection of devices, including input and output
support devices and excluding calculators which are not programmable and capable of
being used in conjunction with external files, which contain computer programmes,
electronic instructions, input data, and output data, that performs logic, arithmetic, data
storage and retrieval, communication control and other functions,

"Controller" means the Controller of Certifying Authorities appointed under sub- section
(7) of section 17;

"Cyber Security" means protecting information, equipment, devices, computer, computer


resource, communication device and information stored therein from unauthorized
access, use, disclosure, disruption, modification or destruction.

"Data" means a representation of information, knowledge, facts, concepts or instructions


which are being prepared or have been prepared in a formalized manner, and is intended
to be processed, is being processed or has been processed in a computer system or

58 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 5 – IT ACT 2000 AND CYBER CRIMES
computer network., and may be in any form (including computer printouts magnetic or
optical storage media, punched cards, punched tapes) or stored internally in the memory
of the computer,

"Digital Signature" means authentication of any electronic record by a subscriber by


means of an electronic method or procedure in accordance with the provisions of section3

"Digital Signature Certificate" means a Digital Signature Certificate issued under sub-
section (4) of section 35.

"Electronic Gazette" means official Gazette published in the electronic form;

"Electronic Record" means data, record or data generated, image or sound stored, received
or sent in an electronic form or micro film or computer-generated micro fiche;

"originator" means a person who sends, generates, stores or transmits any electronic
message or causes any electronic message to be sent, generated, stored or transmitted
to any other person but does not include an intermediary,
"subscriber" means a person in whose name the Digital Signature Certificate is issued,

"Private key" means the key of a key pair used to create a digital signature,

"Public key" means the key of a key pair used to verify a digital signature and listed in the
Digital Signature Certificate,

Digital Signature

A digital signature is like an electronic version of your handwritten signature. It’s used to
prove that a document or message was created and sent by you and that it hasn’t been
changed along the way.

Just like your physical signature on a paper, a digital signature ensures that the document
is valid and trustworthy, but it's done in a secure, digital way using special codes. This
helps in verifying the identity of the person sending or approving a document online.

59 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 5 – IT ACT 2000 AND CYBER CRIMES

E-Governance

E-Governance means using technology, especially the internet, to improve the way
governments work and provide services to people. Instead of doing things on paper or in
person, like applying for a driver's license or paying taxes, people can do these tasks
online. E-Governance makes government processes faster, more efficient, and more
accessible to everyone, allowing citizens to interact with the government from the
comfort of their homes. It also helps in making government operations more transparent
and reduces the chances of corruption.

Benefits
• Convenience: You can access government services anytime and anywhere, without
needing to visit offices.
• Faster Services: Online processes are quicker, reducing waiting times for things
like licenses, certificates, or tax payments.
• Transparency: E-governance makes government activities more open, so it's easier
to see how decisions are made and money is spent.
• Cost-Effective: It reduces the need for paperwork and physical visits, saving
money for both the government and citizens.
• Reduced Corruption: Since processes are automated and recorded, there are fewer
opportunities for corrupt practices.
• Better Communication: It allows citizens to easily give feedback or raise concerns
with the government.

60 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 5 – IT ACT 2000 AND CYBER CRIMES
Attribution, Acknowledgement & Dispatch of Electronic records

Explanation of Attribution, Acknowledgement, and Dispatch of Electronic Records under


the IT Act, 2000:

1. Attribution of Electronic Records:

• This refers to how an electronic record (like an email or online form) is linked to a
specific person. According to the IT Act, an electronic record is considered to be
attributed to a person if it was sent by that person, or by someone authorized by
them, or if the person’s system automatically sent it.
2. Acknowledgement of Receipt:

• When one party sends an electronic record, the recipient can acknowledge receiving
it. This can be done through an automated reply, a manual confirmation, or any
other agreed-upon method. The acknowledgement is important to confirm that the
record was received by the intended person.

3. Dispatch of Electronic Records:

• This refers to when and where an electronic record is considered "sent." According
to the IT Act, an electronic record is dispatched when it leaves the sender’s system.
The place of dispatch is considered to be where the sender has their business or
residence, and the time of dispatch is when the record leaves their system.

Regulation of Certifying Authority as per IT Act 2020

Functions of CCA (Secs, 18-25)

Sections 18 to 25 of Chapter VI of the Act provide for the Controller of Certifying


Authorities (CCA) to licence and regulate the working of Certifying Authorities (CAs).

(a) To act as regulator of certifying authorities (Sec, 18):

61 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 5 – IT ACT 2000 AND CYBER CRIMES
The main functions of the controller are to regulate the working of certifying authorities.
He performs the following functions in this regard

(i) To exercise supervision over the activities of CAS,


(ii) To certify public keys of CAs,
(iii) To lay down the standards to be maintained by CAs,
(iv) To specify the qualifications and experience for employee of CAs,
(v) To specify the conditions for conducting business by CAs:
(vi) To specify the terms and manner for maintenance of accounts by Саs
(vii) To specify the terms and conditions for appointment of auditors and their
remuneration
(viii) To facilitate the establishment of any electronic system as well as regulation of
such system,
(ix) To specify the manner of conducting dealings by CAs with the subscribers,
(x) To resolve any conflict of interest between CAs and the subscribers,
(xi) To lay down the duties of CAS,
(xii) To maintain database for every CA containing their disclosure record as well as such
particulars as may be specified by regulations, which shall be accessible to public
(b) To recognise the foreign certifying authority (Sec. 19). The controller, with the prior
permission of the Central Government and by notification in the Official Gazette,
may recognise any foreign certifying authority for the purpose of this Act.
(c) To grant licence to CAs to issue electronic signature certificate (Sec. 21), The
provided he applies controller can grant a licence to any person to issue electronic
signature certificate and fulfils such requirements with respect to qualification,
expertise, manpower, financial resources and other infrastructure facilities which are
necessary for the issue of Electronic Signature Certificate
(d) To suspend licence (Sec. 25), The controller may suspend licence if he is satisfied
after making an enquiry that CA has
(i) made a statement which is incorrect or false in material particulars in or relation to
the application for the issue or renewal of licence.
(ii) failed to comply with terms and conditions necessary for granting of licence.
(iii) failed to maintain standards specified in Sec 30

62 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 5 – IT ACT 2000 AND CYBER CRIMES
(iv) contravened any provisions of the Act, rule, regulation or order made thereunder

Digital Signatures Certificate

A Digital Signature Certificate (DSC) is an electronic form of a signature used to validate


the identity of the signer in digital transactions. It ensures the authenticity, integrity,
and security of online documents or messages by encrypting them. DSCs are commonly
used in online transactions, filing tax returns, signing documents, and other secure
communications.

Duties of Subscribers

Under the Information Technology Act, 2020, the duties of subscribers (individuals or
entities who hold digital signatures) include:

1. Protection of Private Key: Subscribers must securely manage and protect their
private keys, which are used to create digital signatures. They should ensure that
the key is not compromised.

2. Immediate Notification: If the private key is compromised, lost, or the security is


suspected to be breached, subscribers must immediately notify the certifying
authority.

3. Accuracy of Information: Subscribers are responsible for providing accurate


information when applying for a digital signature certificate.

4. Use of Certificate: Subscribers should only use the digital signature certificate for
the purpose for which it was issued.

Penalties and Adjudication

Penalties Under the IT Act, 2000:

63 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 5 – IT ACT 2000 AND CYBER CRIMES
1. Unauthorized Access (Section 43):

o Any person who, without permission, accesses a computer system, downloads,


copies, or extracts data, introduces viruses, or disrupts the normal
functioning of a computer or network is liable to pay damages by way of
compensation to the affected party. The compensation can go up to ₹1 crore.

2. Tampering with Computer Source Documents (Section 65):

o Tampering with or altering computer source code with intent to cause damage
or conceal information can lead to imprisonment up to 3 years, or a fine up to
₹2 lakh, or both.
3. Hacking (Section 66):

o Acts of hacking, which involve destroying, deleting, or altering information


with malicious intent, can result in imprisonment up to 3 years, a fine up to
₹5 lakh, or both.
4. Publishing Obscene Information (Section 67):

o Publishing or transmitting obscene material in electronic form can lead to


imprisonment up to 3 years and a fine up to ₹5 lakh for the first conviction.
Subsequent convictions may result in imprisonment up to 5 years and a fine
up to ₹10 lakh.
Adjudication Under the IT Act, 2000:
1. Adjudicating Officer:

o The IT Act empowers adjudicating officers to handle cases where the claim
for injury or damage does not exceed ₹5 crore. These officers are typically
appointed at the state or central level, and they have the authority to
investigate and adjudicate cases related to cybercrimes.
2. Process of Adjudication:

o The process begins with a complaint filed by the affected party. The
adjudicating officer conducts an inquiry, allows both parties to present their

64 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 5 – IT ACT 2000 AND CYBER CRIMES
case, and then decides on the matter. The officer has the power to order the
payment of compensation or impose fines.
3. Appeal to Cyber Appellate Tribunal:

o If any party is dissatisfied with the decision of the adjudicating officer, they
can appeal to the Cyber Appellate Tribunal, whose decision can further be
appealed in a High Court.

These provisions ensure that there is a structured approach to dealing with cybercrimes
and that penalties are imposed to deter such activities.

Appellate Tribunal

Establishment of Cyber Appellate Tribunal.

The Central Government shall, by notification, establish one or more appellate tribunals
to be known as the Cyber Regulations Appellate Tribunal.
Composition of Cyber Appellate Tribunal.

The Cyber Appellate Tribunal shall consist of a Chairperson and such number of other
Members, as the Central Government may, by notification in the Official Gazette, appoint
Qualifications for appointment as Chairperson and Members of CAT

A person shall not be qualified for appointment as a Chairperson of the Cyber Appellate
Tribunal unless he is, or has been, or is qualified to be, a Judge of a High Court,

The Members of the Cyber Appellate Tribunal, except the Judicial Member to be appointed
under sub-section (3), shall be appointed by the Central Government from amongst
persons, having special knowledge of and professional experience in, information
technology, telecommunication, industry, management or consumer affairs.

The Judicial Members of the Cyber Appellate Tribunal shall be appointed by the Central
Government from amongst persons who is or has been a member of Indian Legal Service.

65 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH
FOR ADMISSION: WHATSAPP 6291137153
BCOM SEMESTER 2
[CCF] NEW SYLLABUS INFORMATION TECHNOLOGY & ITS APPLICATIONS IN BUSINESS
(CCF) UNIT 5 – IT ACT 2000 AND CYBER CRIMES
Term of office

The Chairperson or Member of the Cyber Appellate Tribunal shall hold office for a term
of five years from the date on which he enters upon his office or until he attains the age
of sixty-five years, whichever is earlier.
Appeal to Cyber Appellate Tribunal,

Any person aggrieved by an order by the controller or an adjudicating officer may appeal
to the Cyber Appellate Tribunal, within 45 days from the date of passing the order.
Procedure and Powers of the Cyber Appellate Tribunal

(a) summoning and enforcing the attendance of any person and examining him on oath;
(b) requiring the discovery and production of documents or other electronic records;
(c) receiving evidence on affidavits,
(d) issuing commissions for the examination of witnesses or documents,
(e) reviewing its decisions;
(f) dismissing an application for default or deciding it ex parte
(g) any other matter which may be prescribed

Offences and Cybercrime

Offences under the IT Act, 2000:


The IT Act, 2000 outlines various cyber offenses including unauthorized access to
computer systems, data theft, tampering with computer source code, and publishing or
transmitting obscene material electronically. Penalties for these offenses can range
from fines to imprisonment, depending on the severity and nature of the crime.

Cybercrimes:
Cybercrimes encompass a wide range of illegal activities conducted through digital
means, including hacking, identity theft, phishing, malware distribution, and online fraud.
These crimes target individuals, organizations, or governments, exploiting digital
platforms and technologies to commit fraud, theft, or disruption.

66 SUBSCRIBE OUR YT CHANNEL


AVISHEK JHA CLASSES
ADMISSION GOING ON BCOM SEMESTER 2 PRO BATCH

You might also like