Xii Computer Application - Full Book
Xii Computer Application - Full Book
13. How can you place text from other software like MS-Word?
1. Choose File > Place. The Place dialog box will appear
2.Click on Open in the Place dialog box. The pointer changes to the loaded text icon
3 Click in the page to place the text. The text will be placed in the page
14. Write steps to split the text block
1. Place the cursor on the bottom handle, click and drag upwards. When you release the bottom
handle will contain a red triangle.
2. Click once on this, and the cursor changes to a loaded text icon.
3. Click where ever you want the text to be placed.
15. Steps to re join the splitted text block
Then place the cursor on the bottom handle (red colour triangle) of the first text block, and click
and drag the bottom handle down up to next text block which has to be joined. Now both splatted
block will be joined.
5 mark
16.Write steps to draw star using polygon
1. Click on the Polygon tool from the toolbox.
2. The cursor changes to a crosshair.
3. Click and drag anywhere on the screen. As you drag, a Polygon appears.
4. Release the mouse button when the Polygon is of the desired size.
5. Choose Element > Polygon Settings in the menu bar. Now Polygon Settings dialogue box
appears.
6. Type 5 in the Number of sides text box.
7. Type 50% in Star inset textbox.
8. Click OK
17 Write about tools of page maker
2. Draw a frame with one of PageMaker’s Frame tools (Rectangle frame tool or Ellipse Frame Tool or
Polygon frame Tool). Make sure the object remains selected.
3. Click on File > Place. The Place dialog box will appears.
4. Locate the document that contains the text you want to place, select it.
5. Click on Open.
6. Click inside the frame to place the text in it. The text will be placed in the frame.
20. Mention three tools in PageMaker and write their keyboard shortcuts
Chapter 3
Introduction to Database Management System
1. Define Data Model and list the types of data model used.
The database technology came into existence in terms of models with relational and object-relational
behavior. Types of data model
a Hierarchical Database Mode b. Network Database model c.Relational model d. Object-oriented database
model
DDL COMMANDS
a) create - To create table and database
Eg. create table student(name varchar (30) , adno int);
b) Alter - To modify the structure of table (add new column to table or modify the data type
of a column)
Eg. Alter table student add age int;
DML Commands
a) Insert - To add a new row (record) to table
Eg. Insert into student values („tamilselvan‟, 1234, 17);
TCL (Transaction control language command) Commit - is used to make the transaction permanent
SQL MYSQL
SQL - It (Structured query Language) is a It is one of the RDBMS
programming language designed mainly for
managing data in RDBMS
SQL it is subset of MYSQL It is superset of SQK
Relationship tells how two entities are related in ER model. It tells how two tables are related by having
foreign key of one table refers to primary key of another table.
High performance
Robust transaction and support
Easy management
Less cost
8. What is database
A database is a place where we store, retrieve and manage data
9. What is DBMS
DBMS stands for Database Management system
A database management system (DBMS) is system software for creating and manage
database
11. Give example for RDBMS software
a) Oracle b) Mysql c) SQL Server d) MS Access
12. Define primary key - A field in table which is used to uniquely identify a record is called
Primary key. Eg. Account number in bank , Admission number in school etc.
12. What is SQL
It (Structured query Language) is a programming language designed mainly for managing data in
RDBMS.(Insert , delete, update and select data in databaser)
3 MARK
* In earlier days they have used punched card technology to store the data
* Data in file system were accessed using indexed, random and sequential methods.
2. Discuss cardinality in RDBMS
* it is classified as
5 Mark
1. Write in detail about cardinality
In the above example a person can drive only one vehicle, so their relation between driver and
vehicle is one to one
One to many
In above example a customer can place any number of order, so the relation between customer and
order is one to many
Many to Many
In above example a student an choose any number of course and a course can be chosen by any
number of student , so the relation between student and course is many to many.
DDL COMMANDS
c) create - To create table and database
Eg. create table student(name varchar (30) , adno int);
d) Alter - To modify the structure of table (add new column to table or modify the data type
of a column)
Eg. Alter table student add age int;
DML Commands
c) Insert - To add a new row (record) to table
Eg. Insert into student values („tamilselvan‟, 1234, 17);
Types of Entity
a) Strong entity - Strong entity does not depend on other entity. It will have primary key
b) A weak entity - Weak entity is dependent on other entities and it doesn’t have any
primary key.
c) Entity Instance - Instances are the values for the entity
Relation -
Relationship tells how two entities are related in ER model. It tells how two tables are related by having
foreign key of one table refers to primary key of another table.
Web Sever which is installed on server executes the PHP code and generate HTML code.
This HTML code is sends back to the user machine to view the output through browser like
Google chrome, Internet explorer etc .
php statements
?>
Eg
<?php
echo “ HELLO WORLD”;
?>
12. Write about client server architecture
It is a architecture which introduces application sharing mechanism between two different
systems over the network.
Client - Client is the machine which request for data stored on server
Server - Server is the machine which serves the data requested by server
5 mark
13. Write rules for naming variable
1. Variable name must always begin with a $ symbol.
2. Variable name can never start with a number.
3. Variable names are case-sensitive
14. Write about operators of PHP (5 mark)
Operators of PHP are
1. Arithmetic operators,
2. Assignment operators,
3. Comparison operators,
4. Increment/Decrement operators,
5. Logical operators,
6. String operators
Arithmetic operators
+ Addition $c = $a + $b
- Subtraction $c = $a - $b
* Multiplication $c = $a * $b
/ Division $c = $a / $b
% Modulus $c = $a % $b
Assignment operators
= $a = 10 Assigns 10 to $a
+= $a += 10 Adds 10 to a
-= $a -= 10 Subtracts 10 to a
*= $a *= 10 Multiply 10 to a n
/= $a /= 10 Divids 10 by a
%= $a %= 10 Finds remainder after dividing
by 10
Comparison Operators
== Equal to If ($a==10)
>= Greater than or equal to If ($a>=10)
<= Less then or equal to If ($a<=10)
<> Not equal to If ($a<>10)
=== Identical If ($a===10)
!== Not identical
> Greater than If($a >10)
< Less then If ($a <10)
Logical Operator
String Operator
The PHP code executes on Webserver which is installed in the server machine and it is
generates HTML code which is sent to the user. The user receives HTML code and sees the
Website contents using Internet browser in client machine.
15. In how many ways you can embed PHP code in an HTML page?
Default syntax
a) <?php
Php code
?>
Eg.
<?php
echo “Hello world”;
?>
Short Open Tags
b) <?
Php code
?>
Eg.
<?
echo “Hello world”;
?>
c) HTML Script embed Tags
<script language=”php”>
php code;
</script>
Eg.
Chapter 5
b) Pre defined function (or) Built in function - The function which are already available
in PHP scripting language is called as pre-define function.
Syntax
function function_name (parameters )
{
Body of function
}
Eg.
<?php
function add($a ,$b)
{
Echo “result =” . $a+ $b;
}
add(10,20);
?>
50 30 90 77
0 1 2 3
In example index of first element is 0 , second element is 1 and so on
<?php
$mark = array(50,60,89);
echo $mark[0]. “<br>”;
echo $mark[1]. “<br>”;
echo $mark[2]. “<br>”;
?>
output
50
60
89
6. Write about associative array
Associative arrays are a key-value pair data structure ie. the key and the value are stored
together to access each element.
Syntax
Eg.
<?php
?>
Output
State =tamilnadu
Country=India
Age=17
<?php
$stud=array (
array(“coimbatire”,”tamilnadu”);
array(“Banglore”,”karnataka”);
array(“cochin”,”kerala”);
);
echo $stud[0]0];
echo $stud[0][1];
?>
Output
Coimbatore
Tamilnadu
Chapter 6
PHP Conditional Statements
1. Write about conditional statements
Conditional statements allow you Perform different actions based on the results of test
Condition.
2. List the conditional statements
1)if Statement
2) if...else Statement
3) if...elseif....else Statement
4) switch Statement
5 mark
1. Explain if statement
It is a control statement which helps to select between two alternatives.
Types of If statement
a. Simple if statement
b. If .. else statement
c. If .. elseif … else statement
Simple if statement
Syntax
If (condition / expression)
{
action block
}
Working
If the condition is true then action block will be executed else the statement following if
will be executed.
Eg.
<?php
$a=2 ;
$b=1;
If( $a >$b)
{
echo “ A is big”;
}
?>
Output
A is big
If ...else statement
Syntax
If (condition / expression)
{
action block1
}
else
{
action block2
}
Working
If the condition is true then action block1 will be executed else action block2 will be
executed
<?php
$a=2 ;
$b=3;
If( $a >$b)
{
echo “ A is big”;
}
else
{
echo “ B is big”;
}
?>
Output
B is big
Working
If the condition is true then action block1 will be executed. If conditon2 is true then action
block 2 will be executed else action block 3 will be executed
Example
<?php
$a=2 ;
$b=2;
If( $a >$b)
{
echo “ A is big”;
}
else if($a==$b)
{
echo “ Both are equal”;
}
else
{
echo “ B is big”;
}
?>
Output
Both are equal
2. Explain Switch case
It is a multiple branching statement where based on a condition, the control is
transferred to one of the many possible points.
Syntax
switch(expression)
{
Case 1:
action block 1;
break;
Case 2:
action block 2;
break;
Case 3:
action block 3;
break;
default :
action block 4;
}
Working
First expression in switch will be compared with case 1 value if matches then action
block 1 will be executed, if not then expression will be compared with case 2 if matches
then action block 2 will be executed and so on. If none of the condition matches then
default part will be executed ie. action block 4 will be executed.
Break statement
We include break statement in action block to exit from switch case statement.
Example
<?php
$a = 2;
swithc($a)
{
case 1:
echo “one”;
break;
case 2:
echo “two”;
break;
case 3:
echo “three”;
break;
default :
echo “Enter less than 4”;
}
?>
Output
Two.
Chapter 7
Looping Structure
Looping Structure
1. What is loop?
Loop is a control statement which is used to execute a block of statements for specific
number of times
Loop
Loop executes a set of instructions repeatedly for a certain number of times
For Loop
It is a entry controlled loop and it used when an action block is to be
repeated for a predefined number of times.
Syntes
for(initial value ; condition ; increment )
{
action block
}
Working
1. The control variable is initialized the first time when the control entries the loop
for the first time.
2. Test condition is evaluated. The body of the loop is executed only when the
condition is ture. Hence for( ; ; ) is called entry control loop
3. On repetition of the loop, the control variable is incremented and the test
conditon will be evaluated befor the body of the loop is executed.
4. The loop is terminated when the conditon evaluates to false.
Example
<php
Output
1
2
3
While loop
While loop is called as Entry check loop ie. first condition is checked if true then body of
loop is executed. The body of loop will be executed until the condition is true.
Syntax
While (condition)
{
Body of loop
}
<?php
while($i<=3)
{
echo “<br>” . $i;
$i++;
}
}
Working of example
1. First the control variable is initialized to 1
2. Then condition in while is checked, since True,
body of loop is executed. So 1 is printed and i value is incremented
3. Step 3 is repeated until condition in while loop is true.
Output
1
2
3
do
{
Body of loop
}
While (condition);
Example
<?php
$i=0;
do
{
echo “<br>” . $i;
$i++;
}
while($i<=5);
?>
Output
1
2
3
4
5
Working of example
1. First the body of the loop will be executed, so 1 is printed and i value will be
incremented.
2. Then condition in do while is checked, since True,
Again body of loop is executed again
3. Step 1 and step 2 is repeated until condition in do while loop is true.
while(condition);
For each loop is used in PHP and is mainly used for looping through the values of an array.
Syntax
code to be executed;
}
Example
<?php
$state = array(“Tamilnadu”, “Andhra”, “Karnataka”, “Kerala”);
foreach ($state as $i)
{
echo “<br>” . $i;
}
?>
Output
Tamilnadu
Andhra
Karnataka
Kerala
Chapterr 8
POST Method - The input data sent to the server with POST method is stored in the
request body of the client’s HTTP request. Input data will not be visible when clicking the
submit button.
GET Method:- The input data sent to the server with GET method via URL address is known
as query string. All input data are visible by user after they click the submit button.
Example:
<?php
?>
5 Mark
12. Explain form controls
1) Text inputs - Text box is used to collect text or numeric data from the user
Syntax
<input type = text name=”name for control” >
2) Buttons - Used to submit the form to the server
Syntax
<input type =button name=”name for control” >
3) Checkbox - Used to selecting one or more Option from multiple choice
Syntax
<input type =checkbox name=”name for control” >
4) Radio box - Used to selecting one Option from multiple choice
Syntax
<input type =radio name=”name for control” >
5) File Select - Used to upload or select file from client machine
Syntax
<input type =file name=”name for control” >
6) Form Tag - Form tag is used to hold all the above controls to collect data from the user
in client machine. It has two parameters
a) Method = Get/Post which sends the user data from client machine to server
b) Action = This parameter tells to which PHP file in server the data has to be sent.
Syntax
Opening the file in server and processing it for different task like writing into the file or
reading from the file or Updating the file is called file handling.
File Handling operations
1)PHP Open a File, 2) PHP Read a File 3) PHP Close a File 4) PHP Write a File 5) PHP
Appending a File and 6) PHP uploading a File.
fclose($fileobject)
Chapter 9
CONNECTING PHP AND MYSQL
1. Write a note on MYSQLi.
MYSQLi is extension in PHP scripting language which gives access to the MYSQL database.
2. What is MYSQL function
PHP offers many functions to connect to MYSQL database and execute queries. Such
functions are called MYSQL functions
3. What is connection string?
Mysqli_connect function uses 4 variables like $sefvarname, $username, $password and
$DBname to connect to MYSQL database server. They are called as connection string
5 mark
(a) server name (b) user name (c) password (d) database name
Syntax
<?
if ($conn)
?>
b) Mysqli_query() function
This function helps to execute SQL query statements in PHP scripting language
Sytax
Eg.
<?
?>
c) mysqli_close()
mysqli_close() function is used to close the connection between PHP script and MYSQL
database server.
Syntax
mysqli_close(“connection object”);
Eg.
<?
mysqli_close($cn);
?>
Chapter 10
1.What is network?
Set of computer connect together for the purpose of sharing resource is called a computer
network.
2. What is node?
When group of people of different opinion come together online, many discussions arise
which lead to personal attacks called “flame wars.
5 mark
Resource sharing - Resource sharing means sharing the hardware like printer, fax
machine, scanner amount group of group of users using network.
Information sharing : Using computer network any software applications, data stored
in server can be shared by many people in live. Eg. 11th results.
2. Write about benefits of social networks
Group information sharing - We can share text, audio , video , animation other
members in the group. We can convey our daily wishes to other group members. We
can also have healthy group discussion and group chatting which makes to keep in
touch with other group members.
Fostering diversity of thought - Each individual can post his opinion about any issues in
social media. They are free to post their critics. Many debate or discussion goes in
online regarding political issues. All these helps to build a knowledge society.
Relationship building - Social media builds the relationship among the individuals
even though they are physically far away. They connects the peoples of different
communities.
Content contribution - Individuals can easily show case their talents in social media
which will create an opportunity for the growth of individuals.
Chapter 11
Network Examples and Protocols
1. What is protocol?
Networks protocols is a set of rules that determine how data is transmitted
between device in the same network
2. Expand
a) TCP/IP - Transmission control protocol / Internet protocol
b) HTTP - Hypertext transfer protocol
c) HTTPS - Hypertext transfer protocol secure
d) FTP - File transfer protocol
e) SMTP - Simple mail transfer protocol
f) UDP - User datagram protocol
g) DNS - Domain name system
h) OSI - Open system interconnection
i) WIFI - Wireless fidelity
j) RFID - Radio frequency Identification
k) www - World wide web
3. What are the benefits of mobile network
a. Mobile network provides wireless voice and data communication.
b. Mobile network use both packet switching and circuit switching network for
both voice and data communication.
c. Application of mobile network is mobile, laptop, table etc.
4. What are benefits of WIFI
wire
5 mark
INTRANET - It is private network which is used to share the company data between
employees.
It consist of inter linked local area network
Eg. Sharing of company rules and regulations, All banks are INTRANET.
EXTRANET - It is a private network uses internet technology and public telephone system
to
share business information with customers, suppliers, vendors etc.
Eg. Customers communication, Bank sectors where customers can do online
banking
2. Discuss OSI Model and its layer (important)
OSI (Open system interconnection) sets the standards for inter computer
communication.
It has 7 layers.
OSI Layers
a) Physical Layer - It is the first layer which defines the electrical and physical
specification for device.
b) Data Link Layer - It is the second layer which guarantees the data transmitted are
error free.
It has special protocol like 802.3 for wired network and 802.11 for wifi
c) Network Layer - It is the 3rd layer which determines the path to send the data packets.
At this layer rout of data packets are identified using IP ADDRESS.
d) Transport layer - It is the 4th layer which guarantees the sending of data is successful.
d) Session layer - While accessing another computer , this layer establish session (timing)
for communication. It controls dialogues between theses computers.
e) Presentation layer - It is the 6th layer which prepare data for Application layer.
Encryption and decryption take place in this layer.
f) Application layer - It is the 7th layer which act as user interface platform through
software program.
3. Discuss TCP/IP model
* TCP/IP is a set of protocol which governs communication of computers in Internet.
* It has 4 layers namely
c) a) Network Interface layer - It is the first layer which comprises of physical and data
link layer. It defines the electrical and physical specification for device. It guarantees
the data transmitted are error free
b) Network Layer - It is the 1st layer which determines the path to send the data packets.
At this layer rout of data packets are identified using IP ADDRESS.
c) Transport layer - It is the 3rd layer which guarantees the sending of data is successful.
d)Application layer - It is the 4th layer which act as user interface platform through
software
program.
Chapter 12
Absolute URL - It gives complete address of webpage. Absolute contains all the four
necessary and fundamental parts of URL.
Relative URl - It gives partial address of webpage. Relative URL contains only folder
name and the file name or just the file name
10. Domain Name Meaning com Commercial Organisation edu Educational Institutions gov
Government (US) mil Military groups org Non profit Organization net Networking
organization
11. Write any 4 top level domain
Domain Name Meaning
Com - Commercial Organisation
edu - Educational Institutions
gov- Government (US) mil Military groups
org - Non profit Organization
net - Networking organization
12. Differentiate ipv 4 and ipv6
Ipv 4 Ipv 6
IPv4 address is a 32-bit unique IPv4 address is a 128-bit unique address
address
Number of address that can be Number of address that can be formed is 2128
32
formed is 2
Eg. 128.143.137.144 Eg.
2001:0000:32313:DFE1:0063:0000:0000:FEFB
13. Differentiate domain name and url
Domain Name URL
A symbolic name associated with an IP It is web address of particular page in internet
address
Eg. Cms.tn.gov.in Eg. http://cms.gov.in/sites/press/maps.jpg
Domain name has not types There are two types of URL
Relative URL
Absolute URl
14. Write about the components of DNS
Domain Name System an Internet service that translates domain name into IP address.
The Components of DNS are
a) Namespace b) Name server c) Zone
Name Space
The domain names must be very unique and appropriate. The names should be
selected from a names pace. The name space can be organized in two ways
a) Flat Name space - Flat name space is where the name is assigned to the IP address.
They do not have any specific structure. But flat name space cannot be used for
larger systems.
b) Hierarchical Name space - Hierarchical name space is where the name is made up
of several parts. The first part may represent the nature of organization, the second
part may represent the name of organization, and third part may represent the
department of the organization and so on
Name server - Name Servers are programs that run on a physical system and store all
the zone data. It provides to clients when queried by them
Zone - Zone is the contiguous part up to which the server has access. The domain
assigned for the server does not divide into further sub domains then zone is same as
domain
Step 1: When the user enters the URL in the browser, the system first checks its DNS
cache for the corresponding IP address. If the IP address is found in the cache then the
information is retrieved from cache.
Step 2 : If not, then the system needs to perform DNS query i.e., the system needs to
query the resolver about the IP address from Internet Service Provider (ISP). Each
resolver has its own cache and if it is found in that then that information is retrieved.
Step 3: If not, then the query is passed to next domain server i.e., TLD (Top Level
Domain) which reviews the request and direct the query to name servers associated
with that specific domain. Until the query is solved it is passed to next level domains. At
last the mapping and the record are returned to the resolver who checks whether the
returned value is a record or an error. Then the resolver returns the record back to the
computer browser which is then viewed by the user.
Chapter 15
E-Commerce
1. Define E-commerce
E-Commerce can be described as the process of buying or selling products, services or information
via Internet.
E-Business E-Commerce
Here all the business activities are carried out Here only commercial transaction takes place
using computers and Network through internet
E-Business is super set of E-Commerce E-Commerce is a subset of E-Business
E-Business stands for Electronic Business E-Commerce stands for Electronic Commerce
3. Differentiate tangible goods and electronic goods with example of your own
DOTCOM BUBBLE
The Dotcom Bubble was a historic excessive growth of economy that occurred roughly between
1995 and 2000. During this period Internet was used extreme. In this period US stock market
raised from 1000 points to 5000 points
DOTCOM BURST
The Nasdaq-Composite US stock market index, fell from 5046.86 points to 1114.11 points. This is
known as the Dotcom Crash or Dotcom Burst. This began on March 11, 2000 and lasted until
October 9, 2002. During this crash many online shoping companies failed and closed.
Eg. For example, a cycle company may buy tyres from another company for their cycles.
Name-your-price sites are just like normal retail sites. In contrast, the buyer negotiates with the
retailer for a particular product or service. https://in.hotels.com/
5 mark question
Wave 1: The Dotcom companies of first wave are mostly American companies. Thereby their
websites were only in English. The Internet was slow and security was very poor during first wave.
First wave companies enjoyed more profit because customers have no other option.
Wave 2: The second wave is considered as the global wave, with sellers doing business in many
countries and in many languages. Language translation and currency conversion were focused in
the second wave websites. The second wave companies used their own internal funds and
gradually expanded their E-Commerce opportunities. As a result E-Commerce growth was slow
and steady. The rapid development of network technologies and interactive web (web 2.0, a
period of social media) offered the consumers more choices of buying.
Wave 3: The third wave is brought on by the mobile technologies. During this wave customers can
buy and sell the product any where and at any time. More companies has come to the market and
more consumers started to buy online which has increase the global economy.
2. List all the E-Commerce business models and explain any four briefly.
Eg. For example, a cycle company may buy tyres from another company for their cycles.
commercial transactions take place between business firms and their consumers. It is the direct
trade between companies selling books online
Business to Government
Consumer to Business
Here transaction is originated by the consumers. The consumers will fix a requirement or specific
price for a service or Product.
Eg. Travel website where consumer choose the place to visit and data of travel
Here commercial transactions take place between different consumers directly using Internet
Eg. OLX where consumers can sell or buy the product from other consumer
Here an individual consumer interacts with the Government through online to get the service.
Eg. Applying for birth , community certificate online.
Here Government provides platform for its citizens to avail its services and information through
the Internet.
Affiliate site
Affiliate site is a form of third party marketing in which the site owner gets paid based on the
performance. The affiliate site may be a shopping directories that contain a link to a normal
retailing site and are paid commission when a customer makes a purchase through it.
Auction Site
Auction site is a kind of website, that auctions items on the Internet and levies some commission from the
sales. e.g. https://www.ebay.com/
Banner Advertisement
Banner advertisement site displays advertisements of other companies in its websites and thereby earns
revenue.
Bulk Buying
Bulk-buying sites collect a number of users together where every one wants to buy similar items - the site
negotiates a discount with the supplier and takes commission. e.g. https://www.alibaba.com/
Refer book
Electronic Payment Systems
Chapter 16
5 marks
ECS
Electronic Clearing Service can be defined as repeated transfer of funds from one bank account to
another bank accounts using computer and Internet technology.
The payer instructs the bank to debit from his bank account and credit it in another bank account
on the specific date.
Advantage is that payer need not remember the dates of payment and do the transaction
manually.
It helps to provide paper less service
RTGS
Real Time Gross Settlement system (RTGS) is a payment system particularly used for transferring
huge amount money from one bank account to another bank account instantly.
Here payer initiates the transaction of money from his account to another.
Ones paid the amount cannot be reversed
Mobile banking
Mobile banking allows customers to do his financial transaction through his mobile. These
transactions include balance checking, account transfers, payments, purchases, etc.
Advantage
1. Transactions can be done at anytime and anywhere.
2. Apart from transaction customers can view the account balance, account statement etc
3. Customer need not go to bank
● WAP technology.
3.What is credit card? Explain the key players of a credit card payment
Credit card is an electronic payment system normally used for retail transactions. A credit card enables the
bearer (card holder) to buy goods from merchant now and pay later.
Card holder bank will pay the amount to merchant behalf of card holder, so after a period of time card
holder can repay to his bank. If he fails to pay within time then he has to pay along with the interest.
A) Bearer: He is the card holder who can buy the goods now and pay later using the card.
B) Merchant : Shop keeper who sells the goods and receive the payment through credit card
C) Issuer : Bearer’s bank, that issue the credit card and pay to merchant behalf of bearer
D) Acquirer: Merchant’s bank that is responsible for receiving payment on behalf of merchant
E) Credit Card Network: It acts as the intermediate between the issuer and acquirer banks. They
help for safe transfer of money between banks. Eg. Visa, MasterCard, Rupay
E-Commerce Security Systems
Chapter 17
The leakage of trade secrets in E-Commerce is called as Information leakage. It takes place in two aspect
a) the content of the transaction between the vendor and customer is stolen by the third party;
(b) the documents provided by the merchant to the customer or vice versa are illegally used by the other.
Some fake websites try to take advantage of users’ common typographical errors in typing a website
address and direct users to a different website.
Such people try to take advantage of some popular websites to generate accidental traffic for their
websites. e.g. www.goggle.com, www.faceblook.com
A digital signature is a mechanism that is used to verify that a particular digital document, message or
transaction is authentic.
It provides the receiver the guarantee that the message was actually generated by the sender.
A digital certificate (also known as public key certificate) is an electronic document used to prove the
ownership of a public key.
This certificate includes the information about the sender’s identity, digital signature and a public key
The digital certificate are being issued by a licensed Certifying Authority (CA). NIC, Safescript, TCS, MTNL, e-
Mudhra are some of the authorized Certifying Authorities under Government of India.
Information leakage, Tampering, Payment frauds, Malicious code threats , Distributed Denial of Service
(DDoS) Attacks, Cyber Squatting, Typopiracy.
Book
5 mark
Book
Asymmetric or Public key encryption - Asymmetric encryption also called as RSA (Rivest-Shamir-Adleman)
algorithm. Unlike a symmetric encryption, the communicating parties need not know other’s privatekey in
asymmetric encryption. Each user generates their own key pair, which consists of a private key and a public
key. A public-key encryption method is a method of converting a plaintext with a public key into a
ciphertext from which the plaintext can be retrieved with a private key.