0% found this document useful (0 votes)
12 views

NOTES3

Uploaded by

harish srinivas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

NOTES3

Uploaded by

harish srinivas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

What is DBMS used for?

Answer: DBMS, commonly known as Database Management System, is an application


system whose main purpose revolves around the data. This is a system that allows its user to
store the data, define it, retrieve it and update the information about the data inside the
database.
What is meant by a Database?
Answer: In simple terms, Database is a collection of data in some organized way to facilitate
its user’s to easily access, manage and upload the data.
Why is the use of DBMS recommended? Explain by listing some of its major
advantages.
Answer: Some of the major advantages of DBMS are as follows:
 Controlled Redundancy: DBMS supports a mechanism to control the redundancy of
data inside the database by integrating all the data into a single database and as data is
stored at only one place, the duplicity of data does not happen.
 Data Sharing: Sharing of data among multiple users simultaneously can also be done
in DBMS as the same database will be shared among all the users and by different
application programs.
 Backup and Recovery Facility: DBMS minimizes the pain of creating the backup of
data again and again by providing a feature of ‘backup and recovery’ which
automatically creates the data backup and restores the data whenever required.
 Enforcement of Integrity Constraints: Integrity Constraints are very important to be
enforced on the data so that the refined data after putting some constraints are stored
in the database and this is followed by DBMS.
 Independence of data: It simply means that you can change the structure of the data
without affecting the structure of any of the application programs.
What are the different types of languages that are available in the DBMS?
Answer: Basically, there are 3 types of languages in the DBMS as mentioned below:
 DDL: DDL is Data Definition Language which is used to define the database and
schema structure by using some set of SQL Queries
like CREATE, ALTER, TRUNCATE, DROP and RENAME.
 DCL: DCL is Data Control Language which is used to control the access of the
users inside the database by using some set of SQL Queries
like GRANT and REVOKE.
 DML: DML is Data Manipulation Language which is used to do some
manipulations in the database like Insertion, Deletion, etc. by using some set of SQL
Queries like SELECT, INSERT, DELETE and UPDATE.
Explain the concept of ACID properties in DBMS?
Answer: ACID properties is the combination of Atomicity, Consistency, Isolation, and
Durability properties. These properties are very helpful in allowing a safe and secure way of
sharing the data among multiple users.
 Atomicity: This is based on the concept of “either all or nothing” which basically
means that if any update occurs inside the database then that update should either be
available to all the others beyond user and application program or it should not be
available to anyone beyond the user and application program.
 Consistency: This ensures that the consistency is maintained in the database before or
after any transaction that takes place inside the database.
 Isolation: As the name itself suggests, this property states that each transaction that
occurs is in isolation with others i.e. a transaction which has started but not yet
completed should be in isolation with others so that the other transaction does not get
impacted with this transaction.
 Durability: This property states that the data should always be in a durable state i.e.
any data which is in the committed state should be available in the same state even if
any failure or restart occurs in the system.

Explain different models in DBMS.


A Database model defines the logical design and structure of a database and defines
how data will be stored, accessed and updated in a database management system. While
the Relational Model is the most widely used database model, there are other models
too:

 Hierarchical Model
 Network Model
 Entity-relationship Model
 Relational Model

Hierarchical Model
This database model organises data into a tree-like-structure, with a single root, to
which all the other data is linked. The heirarchy starts from the Root data, and expands
like a tree, adding child nodes to the parent nodes.
In this model, a child node will only have a single parent node.
This model efficiently describes many real-world relationships like index of a book,
recipes etc.
In hierarchical model, data is organised into tree-like structure with one one-to-many
relationship between two different types of data, for example, one department can have
many courses, many professors and of-course many students.
Network Model
This is an extension of the Hierarchical model. In this model data is organised more like
a graph, and are allowed to have more than one parent node.
In this database model data is more related as more relationships are established in this
database model. Also, as the data is more related, hence accessing the data is also easier
and fast. This database model was used to map many-to-many data relationships.
This was the most widely used database model, before Relational Model was
introduced.

Entity-relationship Model
In this database model, relationships are created by dividing object of interest into
entity and its characteristics into attributes.
Different entities are related using relationships.
E-R Models are defined to represent the relationships into pictorial form to make it
easier for different stakeholders to understand.
This model is good to design a database, which can then be turned into tables in
relational model(explained below).
Let's take an example, If we have to design a School Database, then Student will be
an entity with attributes name, age, address etc. As Address is generally complex, it can
be another entity with attributes street name, pincode, city etc, and there will be a
relationship between them.
Relational Model
In this model, data is organised in two-dimensional tables and the relationship is maintained by
storing a common field.
This model was introduced by E.F Codd in 1970, and since then it has been the most widely
used database model, infact, we can say the only database model used around the world.
The basic structure of data in the relational model is tables. All the information related to a
particular type is stored in rows of that table.
Hence, tables are also known as relations in relational model.
In the coming tutorials we will learn how to design tables, normalize them to reduce data
redundancy and how to use Structured Query language to access data from tables.
Important benefits of CRM for e-commerce
The world of business has become a competitive environment that involves new and detailed
solutions to meet the changing needs of customers and to overcome cultural differences.
Typically, e-commerce is considered to be completed / purchasing activities through
electronic software. Yet everything is more complex.
Nowadays, nearly 90% of buyers search for the desired product or service online. It is
difficult to handle and analyze a large amount of data from these processes. As a result,
managing a website on a daily basis becomes a major challenge. But the development of
technology provides business owners with the ability to use CRM for ecommerce and to
facilitate everyday tasks as well as to provide unmatched purchasing experience.CRM for E-
commerce brings changes to e-commerce landscape
Uses email communication to establish and enhance relationships with online retailing
prospects and customers. We can see e-commerce as a customer-oriented strategy which
implements various tools to handle many processes. But the key to efficient website
management is knowing your customers and complying with their expectations for product
quality and speed of service.
Integration of a CRM software in the operation of customer relationships will improve your
store’s performance. The insights of customers’ information and its analysis are powerful
benefits for traffic improvement, optimizing conversion levels and allocating necessary and
relevant data to increase your sales. In addition, knowing your target audience and identifying
your best-performing products will increase the response to marketing campaigns.
With CRM, you will take advantage of the Bird-Eye view of all business processes on a
single dashboard. So, the CRM will help you cut costs, as well as increase the burden and
heavy-manual day-to-day tasks with automation.
5 Benefits you can distribute CRM to E-commerce

Implementing the capabilities of CRM technology in your e-commerce platform will increase
visibility in sales processes, correlated records and documents will be added, and more
personal shopping experience will be established. With the CRM for e-commerce you will
receive such benefits:
Awareness about your web customer needs

Due to CRM software, you may have a deeper understanding of customer needs. You have
access, collection and access to user activities and personal details in the company. The
history of communication and purchase with up-to-date records will serve marketing and
support managers, as well as increase the efficiency of sales rep performance. In addition, the
use of social media enables you to track the current interests of your buyers.
Workflow automation

The first sales managers used to focus on the transaction and used to spend a lot of time
tracking the activities of the buyer and sending follow-ups. With CRM, you can automate
follow-up and sending emails. In addition to the various materials, you can set the deadline.
For example, the customer has bought a laptop and your sales representative can plan a
newsletter for this customer, in which he will have various accessories for the purchase.
Another example is setting an alert about customers who leave the site without any action.
You can send discount coupons or special offers to them.
Effective Business Data Management

There is no need to spend time searching on essential contacts or documents. CRM enables a
comprehensive data system and data connection between different types of records.
Detailed reporting and forecast
Measuring the effectiveness of processes in the company has a significant impact on further
objectives and budget planning. The CRM software enables you with a set of customizable
reporting options that show successful and ineffective actions. These records give land for
ROI and revenue levels, as well as an emphasis on areas that require improvement.
Improve customer loyalty

Additional features of the CRM will help you provide safe hosting to your buyers, which are
extremely important and important. You will be able to detect and remove fraudulent
transactions, as well as an easy checkout process. As a rule, customers have a general urgent
question – ‘Where is my order?’ Your customers will be pleased with the smooth order
situation and will see a comprehensive history. In addition, you can send and send special
offers to your lost customers who leave your store at a storefront.
Online retail is a competitive area and buyers demand for quality service and personalization
spar business owners to seek innovations and effective solutions. With CRM integration, your
employees will give your customers an unmatched experience of excellent service and
relevant offers that encourage them to return frequently.

What is Viral Marketing? Advantages and Examples


Every day we hear all about viral marketing, a new viral video and content that spreads at
the speed of light. But what exactly is it? And how did it get to be viral? Is it due to a viral
product or viral advertising, viral campaigns or simply luck, that randomly makes
something such a big hit…
Viral content usually has a well-designed viral strategy behind it, but virality is, in part,
also due to luck, creativity and preparation. To break down this concept a little better, I am
going to explain the definition of this concept, how a viral campaign works, the
advantages of viral marketing, and show you some of my favorite examples.

Viral Marketing: what is it?

Viral Marketing is that which is able to generate interest and the potential sale of a brand
or product through messages that spread like a virus, in other words, quickly, and from
person to person. The idea is for it to be the users themselves that choose to share the
content.

Due to their speed and ease to share, social networks are the natural habitat of this kind of
marketing. The most widespread example in recent times is the creation of emotional,
surprising, funny or unique videos on YouTube, which are then shared on Facebook,
Twitter and other channels.

However virality can be a double-edged sword. It's important to remember that in this type
of campaign, a large part of the control falls into the hands of the users, and there is a risk
that the message can be misinterpreted or parodied. On the other hand, a successful viral
campaign can work miracles for your brand’s results.

How a viral campaign works

In theory, a viral marketing campaign is very simple to carry out: create a video or
another type of content which is attractive to your target, put it on the internet and promote
it. Form there on, all you can do is wait for the fuse to light and for users to start sharing
like crazy.

In some cases, virality happens by accident. For example, when a video is uploaded by a
private user that all of a sudden becomes popular and begins to circulate all around the
Internet.

As for the dispersion strategy for brand videos, there are two types: the shown or the
concealed. In the former, the user is aware from the first moment that they are viewing
advertising or branded content, while in the latter the participation of the brand is hidden
and is only revealed later.

If you apply concealed marketing techniques, it is important to be very careful so the user
does not feel tricked, cheated or deceived, as the viral campaign could then turn against
you.
No matter what strategy we choose, remember to never ever become "spammy", or go
overboard while sharing the content. Instead of repeating message over and over again, the
best strategy is to find the perfect place and time and let the “viral fuse” light itself.

Advantages of viral marketing

 Low cost. What characterizes viral campaigns is that the users do a significant part of
the work for the brand, which drastically cuts down the costs of dispersion. It is
unnecessary to buy advertising or media space.

 Potential of great reach. A viral video on the Internet has the ability to reach a huge
international audience without having to invest a ton of money or make any extra effort.
Due to this, a small company or even a private individual can go extremely viral.

 It is not invasive. In viral marketing, the social media user is the one making the
decision to participate and share content, so it lessens the possibility of the brand
coming across as invasive. Like this, the perception of the brand and the interaction are
significantly better, compared to more classical forms of advertising.

 It helps build up your brand. If we really hit the bull’s-eye in terms of creativity, we
are creating content so incredible that users themselves decide to share it and, hence
create a personal connection

What is Permission Marketing?


Permission marketing is a term that refers to consumers opting to receive marketing offers
and announcements from a brand. The concept was coined by marketing expert Seth Godin
and is broken down into two schools: express-permission marketing and implied-permission
marketing.

In his book, Permission Marketing: Turning Strangers into Friends, and Friends into
Customers, Godin explains that consumers should have the power to choose how they’re
marketed to. When consumers agree to receive marketing emails, marketers are better able to
understand and cater to their interests.

If you sign up for Starbucks Rewards, it’s likely because you love their drinks and think the
incentive of earning points for each vanilla latte you buy is a pretty good deal.

You might also enter your email address to access an analytics report and check a box giving
the company permission to send you other relevant content offers. These instances involve
the customer providing information in exchange for something of interest -- the basis of
permission marketing. In short, it’s a way to niche market to customers on their terms.

There are two types of permission marketing: express and implied.

 Express-permission marketing - The consumer provides their email to receive marketing


messages. For example, they might sign up for a newsletter. Express marketing is common
when creating new business relationships.
 Implied-permission marketing - The business has an existing relationship with the consumer.
This might include someone who’s a current customer or frequent website visitor.

Whichever form of email marketing is being used, both hand the reins to the customer, giving
them control over when the relationship starts and stops.

Permission-based marketing is a way for businesses to offer incentives that align with
customer interest.

What are the benefits of permission marketing?

What gives permission marketing the edge over traditional marketing like TV, billboard, and radio
ads?

Higher engagement and conversion rates

The biggest advantage that permission marketing has over traditional marketing forms is that it has
higher engagement rates. This is due to the fact that your target audience is already interested in what
you have to offer.

Every marketer knows that an engaged audience is easy to turn into a paying customer. Due to the
fact that engagement is high, conversion rates are also higher in permission marketing than other
forms of marketing.

Lower operation costs

Permission marketing is targeted at only those who are interested in receiving your promotional
material. It also employs low-cost online tools like email to disseminate the marketing material,
making permission marketing a very inexpensive method of marketing.

Long-term relationships
Repeat customers make up the bigger chunk of every business. Permission-based marketing gives
you an opportunity to build long-term relationships with your customers, turning them into repeat
customers.

What is affiliate marketing?


Affiliate marketing is an online sales tactic that lets a product owner increase sales by
allowing others targeting the same audience—“affiliates”—to earn a commission by
recommending the product to others. At the same time, it makes it possible for affiliates
to earn money on product sales without creating products of their own.

Simply put, affiliate marketing involves referring a product or service by sharing it on a


blog, social media platforms, or website. The affiliate earns a commission each time
someone makes a purchase through the unique link associated with their
recommendation. Done well, this performance-based opportunity can become an
important part of your business by netting you a healthy income.

How does affiliate marketing work?


To participate in an affiliate marketing program, you’ll need to take these five simple
steps:

1. Find and join an affiliate program

2. Choose which offers to promote

3. Obtain a unique affiliate link for each offer

4. Share those links on your blog, social media platforms, or website

5. Collect a commission anytime someone uses your links to make a purchase

Commission rates vary dramatically, depending on the company and the offer. On the
low end, you’ll earn about 5% of the sale but, with some arrangements, you can earn as
much as 50%, usually when promoting a class or event. There are also affiliate
marketing programs that provide a flat rate per sale instead of a percentage.

Benefits of the affiliate marketing model


Affiliate marketing offers several benefits to affiliates (i.e., you), one of which is its ease.
Your side of the equation simply involves handling the “marketing” side of building and
selling a product—educating customers. You don’t have to worry about the harder tasks,
like developing, supporting, or fulfilling the offer.

Affiliate marketing is low risk. Since there’s no cost to join affiliate programs, you can
start making money with an established affiliate product or service without any upfront
investment. Affiliate marketing also can generate relatively passive income through
commission—the ideal money-making scenario. Though initially you’ll have to invest
time creating traffic sources, your affiliate links can continue to deliver a steady
paycheck.

Finally, successful affiliate marketing offers the potential to significantly scale your
earnings without hiring extra help. You can introduce new products to your current
audience and build campaigns for additional products while your existing work continues
to generate revenue in the background.

Before you get too excited, know that great affiliate marketing is built on trust. While
seemingly there are an endless number of products or services to promote, it’s best to
only highlight those you personally use or would recommend. Even when a product
interests you or fits within an existing hobby, becoming a great marketer for that product
takes a lot of work.

Meaning and Scope of information


Technology Act
MDUTHEINTACTONE7 MAY 2019 2 COMMENTS

The Information Technology Act, 2000 or ITA, 2000 or IT Act, was notified on October 17, 2000. It
is the law that deals with cybercrime and electronic commerce in India. In this article, we will look at
the objectives and features of the Information Technology Act, 2000.

Information Technology Act, 2000

In 1996, the United Nations Commission on International Trade Law (UNCITRAL) adopted
the model law on electronic commerce (e-commerce) to bring uniformity in the law in
different countries.
Further, the General Assembly of the United Nations recommended that all countries must
consider this model law before making changes to their own laws. India became the 12th
country to enable cyber law after it passed the Information Technology Act, 2000.

While the first draft was created by the Ministry of Commerce, Government of India as the
ECommerce Act, 1998, it was redrafted as the ‘Information Technology Bill, 1999’, and
passed in May 2000.

Objectives of the Act

The Information Technology Act, 2000 provides legal recognition to the transaction done via
an electronic exchange of data and other electronic means of communication or electronic
commerce transactions.

This also involves the use of alternatives to a paper-based method of communication and
information storage to facilitate the electronic filing of documents with the Government
agencies.

Further, this act amended the Indian Penal Code 1860, the Indian Evidence Act 1872, the
Bankers’ Books Evidence Act 1891, and the Reserve Bank of India Act 1934. The objectives
of the Act are as follows:

 Grant legal recognition to all transactions done via an electronic exchange of data or other
electronic means of communication or e-commerce, in place of the earlier paper-based
method of communication.
 Give legal recognition to digital signatures for the authentication of any information or
matters requiring legal authentication

 Facilitate the electronic filing of documents with Government agencies and also departments

 Facilitate the electronic storage of data


 Give legal sanction and also facilitate the electronic transfer of funds between banks and
financial institutions
 Grant legal recognition to bankers under the Evidence Act, 1891 and the Reserve Bank of
India Act, 1934, for keeping the books of accounts in electronic form.

Features of the Information Technology Act, 2000


1. All electronic contracts made through secure electronic channels are legally valid.
2. Legal recognition for digital signatures.
3. Security measures for electronic records and also digital signatures are in place
4. A procedure for the appointment of adjudicating officers for holding inquiries under the Act
is finalized
5. Provision for establishing a Cyber Regulatory Appellant Tribunal under the Act. Further, this
tribunal will handle all appeals made against the order of the Controller or Adjudicating
Officer.
6. An appeal against the order of the Cyber Appellant Tribunal is possible only in the High
Court
7. Digital Signatures will use an asymmetric cryptosystem and also a hash function
8. Provision for the appointment of the Controller of Certifying Authorities (CCA) to license
and regulate the working of Certifying Authorities. The Controller to act as a repository of all
digital signatures.
9. The Act applies to offenses or contraventions committed outside India
10. Senior police officers and other officers can enter any public place and search and arrest
without warrant
11. Provisions for the constitution of a Cyber Regulations Advisory Committee to advise the
Central Government and Controller.

You might also like