It Bcom
It Bcom
Objectives:
· To provide an in-depth knowledge on Information Technology in business.
· To enable the students to appreciate the utility of IT in industries.
UNIT – I
Introduction to Computers - Characteristics of Computers - Classification of Computers -
Uses of Computers - Components of a Computer - Input Devices - Output Devices.
UNIT – II
Computer Main Memory - Auxiliary Storage Devices - Computer Software - Classification of
Software - Operating Systems - Functions and Classifications –Programming Languages
UNIT – III
Data Processing –Database Management Systems - Components of a DBMS - Types of
DBMS -Functions of DBMS – Computer Networks – Types of Network - Network
Topology.
UNIT – IV
Internet Access - Internet Protocol - Internet Addressing – www - Internet Relay Chat-E-Mai
l-Mailing Basics – E-Mail Ethics - Introduction to Multimedia - Multimedia tools
.
UNIT – V
Electronic Commerce – Classification of E-Commerce - System Analysis and Design – Life
Cycle – Mobile Commerce - Business on the Internet.
55
Text Books :
Reference Books :
1
CORE XIV - INFORMATION TECHNOLOGY IN BUSINESS
UNIT – I
Introduction to Computers:
A computer is an electronic device, operating under the control of instructions stored
in its own memory that can accept data (input), process the data according to specified rules,
produce information (output), and store the information for future use.
Characteristics of Computers:
Speed, accuracy, diligence, storage capability and versatility are some of the key
characteristics of a computer. A brief overview of these characteristics are
• Speed: The computer can process data very fast, at the rate of millions of instructions per
second. Some calculations that would have taken hours and days to complete otherwise, can
be completed in a few seconds using the computer. For example, calculation and generation
of salary slips of thousands of employees of an organization, weather forecasting that requires
analysis of a large amount of data related to temperature, pressure and humidity of various
places, etc.
2
• Accuracy: Computer provides a high degree of accuracy. For example, the computer can
accurately give the result of division of any two numbers up to 10 decimal places.
• Diligence: When used for a longer period of time, the computer does not get tired or
fatigued. It can perform long and complex calculations with the same speed and accuracy
from the start till the end.
• Storage Capability: Large volumes of data and information can be stored in the computer
and also retrieved whenever required. A limited amount of data can be stored, temporarily, in
the primary memory. Secondary storage devices like floppy disk and compact disk can store
a large amount of data permanently.
• Versatility: Computer is versatile in nature. It can perform different types of tasks with the
same ease. At one moment you can use the computer to prepare a letter document and in the
next moment you may play music or print a document. Computers have several limitations
too. Computer can only perform tasks that it has been programmed to do.
Computer cannot do any work without instructions from the user. It executes instructions as
specified by the user and does not take its own decisions.
Classification of Computers:
Computers can be generally classified by size and power as follows, though there is
Considerable overlap:
• Personal computer: A small, single-user computer based on a microprocessor. In addition
to the microprocessor, a personal computer has a keyboard for entering data, a monitor for
displaying information, and a storage device for saving data.
• workstation : A powerful, single-user computer. A workstation is like a personal computer,
but it has a more powerful microprocessor and a higher-quality monitor.
• minicomputer : A multi-user computer capable of supporting from 10 to hundreds of users
simultaneously.
• mainframe : A powerful multi-user computer capable of supporting many hundreds or
thousands of users simultaneously.
• supercomputer : An extremely fast computer that can perform hundreds of millions of
instructions per second.
3
Uses of Computers:
Education : Getting the right kind of information is a major challenge as is getting
information to make sense. College students spend an average of 5-6 hours a week on
the internet.Research shows that computers can significantly enhance performance in
learning. Students exposed to the internet say they think the web has helped them improve the
quality of their academic research and of their written work. One revolution in education is
the advent of distance learning. This offers a variety of internet and video-based online
courses.
Computer technology is radically changing the tools of medicine. All medical information
can now be digitized. Software is now able to computer the risk of a disease. Mental health
researchers are using computers to screen troubled teenagers in need of psychotherapy. A
patient paralyzed by a stroke has received an implant that allows communication between his
brain and a computer; as a result, he can move a cursor across a screen by brainpower and
convey simple messages.
Science :
Scientists have long been users of it. A new adventure among scientists is the idea of a
“collaboratory”, an internet based collaborative laboratory, in which researchers all over the
world can work easily together even at a distance. An example is space physics where space
physicists are allowed to band together to measure the earth’s ionosphere from instruments
on four parts of the world.
Business :
Business clearly see the interest as a way to enhance productivity and competitiveness. Some
areas of business that are undergoing rapid changes are sales and marketing, retailing,
banking, stock trading, etc. Sales representatives not only need to be better educated and
more knowledgeable about their customer’s businesses, but also must be comfortable with
computer technology. The internet has become a popular marketing tool. The world of
cybercash has come to banking – not only smart cards but internet banking, electronic
deposit, bill paying, online stock and bond trading, etc.
4
Recreation and Entertainment:
Our entertainment and pleasure-time have also been affected by computerization. For
example:
• In movies, computer generated graphics give freedom to designers so that special effects
and even imaginary characters can play a part in making movies, videos, and commercials.
• In sports, computers compile statistics, sell tickets, create training programs and diets for
athletes, and suggest game plan strategies based on the competitor’s past performance.
• In restaurants, almost every one has eaten food where the clerk enters an order by indicating
choices on a rather unusual looking cash register; the device directly enters the actual data
into a computer, and calculates the cost and then prints a receipt.
Government:
Various departments of the Government use computer for their planning, control and law
enforcement activities. To name a few – Traffic, Tourism, Information & Broadcasting,
Education, Aviation and many others.
Components of a Computer:
Any kind of computers consists of HARDWARE AND SOFTWARE.
1.Hardware:
Computer hardware is the collection of physical elements that constitutes a computer system.
Computer hardware refers to the physical parts or components of a computer such as the
monitor, mouse, keyboard, computer data storage, hard drive disk (HDD), system unit
(graphic cards, sound cards, memory, motherboard and chips), etc. all of which are physical
objects that can be touched.
2.Software
Software is a generic term for organized collections of computer data and instructions, often
broken into two major categories: system software that provides the basic non-task-specific
functions of the computer, and application software which is used by users to accomplish
specific tasks.
Software Types
Input Devices:
Input device is any peripheral (piece of computer hardware equipment to provide data and
control signals to an information processing system such as a computer or other information
appliance.
Input device Translate data from form that humans understand to one that the computer can
work with. Most common are keyboard and mouse
Output Devices:
An output device is any piece of computer hardware equipment used to communicate the
results of data processing carried out by an information processing system (such as a
computer) which converts the electronically generated information into human-readable
form.
UNIT I COMPLETED
6
UNIT – II
Computer Main Memory:
A memory is just like a human brain. It is used to store data and instructions.
Computer memory is the storage space in computer where data is to be processed and
instructions required for processing are stored. The memory is divided into large number of
small parts called cells. Each location or cell has a unique address which varies from zero to
memory size minus one.
For example if computer has 64k words, then this memory unit has 64 * 1024=65536
memory locations. The address of these locations varies from 0 to 65535.
Memory is primarily of three types
Cache Memory
Primary Memory/Main Memory
Secondary Memory
1.Cache Memory
Cache memory is a very high speed semiconductor memory which can speed up CPU.
It acts as a buffer between the CPU and main memory. It is used to hold those parts of data
and program which are most frequently used by CPU. The parts of data and programs are
transferred from disk to cache memory by operating system, from where CPU can access
them.
Advantages
The advantages of cache memory are as follows:
Cache memory is faster than main memory.
It consumes less access time as compared to main memory.
It stores the program that can be executed within a short period of time.
It stores data for temporary use.
Disadvantages
The disadvantages of cache memory are as follows:
Cache memory has limited capacity.
It is very expensive.
7
generally made up of semiconductor device. These memories are not as fast as registers. The
data and instruction
required to be processed reside in main memory. It is divided into two subcategories RAM
and
ROM.
Characteristics of Main Memory
These are semiconductor memories
It is known as main memory.
Usually volatile memory.
Data is lost in case power is switched off.
It is working memory of the computer.
Faster than secondary memories.
A computer cannot run without primary memory.
3.Secondary Memory
This type of memory is also known as external memory or non-volatile. It is slower
than main memory. These are used for storing data/Information permanently. CPU directly
does not access these memories instead they are accessed via input-output routines. Contents
of secondary
memories are first transferred to main memory, and then CPU can access it. For example :
disk,
CD-ROM, DVD etc.
Characteristic of Secondary Memory
These are magnetic and optical memories
It is known as backup memory.
It is non-volatile memory.
Data is permanently stored even if power is switched off.
It is used for storage of data in a computer.
Computer may run without secondary memory.
Slower than primary memories.
Stores data and programs permanently :its retained after the power is turned off
8
1. Hard drive (HD):
A hard disk is part of a unit, often called a "disk drive," "hard drive," or "hard disk
drive," that store and provides relatively quick access to large amounts of data on an
electromagnetically charged surface or set of surfaces.
2. Optical Disk:
An optical disc drive (ODD) is a disk drive that uses laser light as part of the process
of reading or writing data to or from optical discs. Some drives can only read from discs, but
recent drives are commonly both readers and recorders, also called burners or writers.
Compact discs, DVDs, and Blu-ray discs are common types of optical media which can be
read and recorded by such drives.
Optical drive is the generic name; drives are usually described as "CD" "DVD", or
"Bluray", followed by "drive", "writer", etc. There are three main types of optical media: CD,
DVD, and Blu-ray disc. CDs can store up to 700 megabytes (MB) of data and DVDs can
store up to 8.4 GB of data. Blu-ray discs, which are the newest type of optical media, can
store up to 50 GB of data. This storage capacity is a clear advantage over the floppy disk
storage media (a magnetic media), which only has a capacity of 1.44 MB.
3. Flash Disk
A storage module made of flash memory chips. A Flash disks have no mechanical
platters or access arms, but the term "disk" is used because the data are accessed as if they
were on a hard drive. The disk storage structure is emulated.
Computer Software:
Software is a generic term for organized collections of computer data and instructions,
often broken into two major categories: system software that provides the basic non-task-
specific functions of the computer, and application software which is used by users to
accomplish specific tasks.
Software Types
A. System software is responsible for controlling, integrating, and managing the
individual hardware components of a computer system so that other software and the
users of the system see it as a functional unit without having to be concerned with the
low-level details such as transferring data from memory to disk, or rendering text onto
a display. Generally, system software consists of an operating system and some
9
fundamental utilities such as disk formatters, file managers, display managers, text
editors, user authentication (login) and management tools, and networking and device
control software.
Here is a list of some of the most prominent features of a system software :
Fast in speed
Difficult to design
Difficult to understand
Less interactive
Smaller in size
Difficult to manipulate
B. Application software is used to accomplish specific tasks other than just running the
computer system. Application software may consist of a single program, such as an
image viewer; a small collection of programs (often called a software package) that
work closely together to accomplish a task, such as a spreadsheet or text processing
system; a larger collection (often called a software suite) of related but independent
programs and packages that have a common user interface or shared data format, such
as Microsoft Office, which consists of closely integrated word processor, spreadsheet,
database, etc.; or a software system, such as a database management system, which is
a collection of fundamental programs that may provide some service to a variety of
other independent applications.
Easy to design
More interactive
Slow in speed
Easy to understand
10
Easy to manipulate and use
Classification of Software:
The following diagram shows the way we classify software.
System Software
Application Software
11
1.System Software
We use the term System Software for software which is primarily used to operate the
hardware.
1.1Operating Systems
The operating system is the software that allows you to operate the hardware. The programs
that we want to execute, the applications that we want to use all require a platform on which
to execute. That platform is provided by the operating system.
One role of the operating system is to provide a virtual machine. This refers to the way that,
by clicking on icons and menus, or by typing in commands at a prompt, we get to interact
with the computer hardware without having to understand its complexity. By hiding the true
complexity of the system from the user, the operating system makes it easier for ordinary
people to make computers perform useful tasks.
1.2Utility Programs
Some utility programs are bundled in with operating system software these days. Others you
buy or source in some other way.
Utility programs tend to perform specific tasks related to the management of hardware.
Examples of utility programs include compression programs, formatters, defragmenters and
other disk management tools.
1.3Library Programs
Some library programs are provided within operating systems like Windows or along with
development tools like Visual Studio. For example, it is possible to download and use a
library of routines that can be used with Windows Media Player. This includes things like
making playlists, functions and procedures for accessing and manipulating the music library
(which is a binary file) and playback routines.
12
Using library programs saves time when programming. It also allows the programmer to
interact with proprietary software without having access to its source code.
1.4Language Translators
Whatever language or type of language we use to write our programs, they need to be in
machine code in order to be executed by the computer. There are 3 main categories of
translator used,
Assembler
An assembler is a program that translates the mnemonic codes used in assembly language
into the bit patterns that represent machine operations. Assembly language has a one-to-one
equivalence with machine code, each assembly statement can be converted into a single
machine operation.
Compiler
A compiler turns the source code that you write in a high-level language into object code
(machine code) that can be executed by the computer.
The compiler is a more complex beast than the assembler. It may require several machine
operations to represent a single high-level language statement. As a result, compiling may
well be a lengthy process with very large programs.
Interpreter
Interpreters translate the source code at run-time. The interpreter translates statements one-at-
a-time as the program is executed.
Interpreters are often used to execute high-level language programs whilst they are being
developed since this can be quicker than compiling the entire program. The program would
be compiled when it is complete and ready to be released.
Interpreters are also used with high-level scripting languages like PHP, Javascript and many
more. These instructions are not compiled and have to be interpreted either by the browser (in
the case of Javascript) or by interpreters on the server (in the case of PHP).
Some programming languages make use of both compilers and interpreters. If you were to
write a Java program in a text editor, when you came to compile it with the Java compiler,
you would actually be creating something called bytecode. Bytecode can be thought of as an
intermediate stage between source code and object code. When a computer executes a Java
program, library programs on that machine interpret the bytecode. This allows Java to be
13
platform-independent - a user needs the correct run-time libraries for Java on their machine in
order to execute the programs.
2.Application Software
Application software tends be used for the tasks that have some relationship to the world
outside of the computer. For example, you might use a word processor to write a letter or an
essay. Although you use the computer to perform the task, the task itself might reasonably be
considered to be a non-computer task.
2.1General-Purpose Software
Software is general-purpose if it can be used for lots of different tasks. You can use a word
processor to write letters, memos, essays, instructions, notes, faxes, invoices and lots more.
These days we tend to use integrate suites of office software where a range of general-
purpose software is provided, usually with the facility to combine elements from each
application in a single file.
2.2Special-Purpose Software
This software performs a single specific task. This task might be complex like payroll
calculation, stock control etc. but will be based on a single task.
As with many abstract concepts, you can stretch these definitions until they blur a little.
These days, web browsers can contain a lot of features. They are still primarily focused on a
single task, rendering web pages and so the web browser is special-purpose. Being able to
access an application using a browser does not change the main purpose of the browser
software itself.
2.3Bespoke Software
Bespoke software is written for a single client. Large organisations have a need for well-
developed applications suited to their specific needs. Such software is often expensive to
develop since the development costs are not shared among a large number of people
purchasing the software.
14
Operating Systems:
16
defines a particular output for a particular input. Hence, f: A → B is a function such that for a ∈
A there is a unique element b ∈ B such that (a, b) ∈ f
Types of Functions
We have already learned about some types of functions like Identity, Polynomial, Rational,
Modulus, Signum, Greatest Integer functions. In this section, we will learn about other types of
function.
It is a function which maps two or more elements of A to the same element of set B. Two or
more elements of A have the same image in B.
17
Onto Function
If there exists a function for which every element of set B there is (are) pre-image(s) in set A, it
is Onto Function. Onto is also referred as Surjective Function.
A function, f is One – One and Onto or Bijective if the function f is both One to One and Onto
function. In other words, the function f associates each element of A with a distinct element of B
and every element of B has a pre-image in A.
Programming Languages:
1.Computer Program
•A program is a set of instructions following the rules of the chosen language.
18
•It contains a list of ingredients (called variables) and a list of directions (called statements)
that tell the computer what to do with the variables.
2.Programming Language
•A vocabulary and set of grammatical rules (syntax) for instructing a computer to perform
specific tasks.
•The term programming language usually refers to high-level languages, such as BASIC, C,
C++, COBOL, FORTRAN, Ada, and Pascal.
•You eventually need to convert your program into machine language so that computer can
understand it.
19
•Machinelanguagesaretheonlylanguagesunderstoodbycomputers.
•Whileeasilyunderstoodbycomputers,machinelanguagesarealmostimpossibleforhumanstouseb
ecausetheyconsistentirelyofnumbers
3.2Assembly Language
•A program written in assembly language consists of a series of instructions mnemonics that
correspond to a stream of executable instructions, when translated by an assembler, that can
be loaded into memory and executed.
•Assembly languages use keywords and symbols, much like English, to form a programming
language but at the same time introduce a new problem.
•The problem is that the computer doesn't understand the assembly code, so we need a way to
convert it to machine code, which the computer does understand.
•Assembly language programs are translated into machine language by a program called an
assembler
•Some programming languages use a compilerto perform this translation and others use an
interpreter.
UNIT II COMPLETED
20
UNIT – III
Data Processing:
Data processing occurs when data is collected and translated into usable information.
Usually performed by a data scientist or team of data scientists, it is important for data
processing to be done correctly as not to negatively affect the end product, or data output.
Data processing starts with data in its raw form and converts it into a more readable
format (graphs, documents, etc.), giving it the form and context necessary to be interpreted by
computers and utilized by employees throughout an organization.
1. Data collection
Collecting data is the first step in data processing. Data is pulled from available sources,
including data lakes and data warehouses. It is important that the data sources available are
trustworthy and well-built so the data collected (and later used as information) is of the
highest possible quality.
2. Data preparation
Once the data is collected, it then enters the data preparation stage. Data preparation, often
referred to as “pre-processing” is the stage at which raw data is cleaned up and organized for
the following stage of data processing. During preparation, raw data is diligently checked for
any errors. The purpose of this step is to eliminate bad data (redundant, incomplete, or
incorrect data) and begin to create high-quality data for the best business intelligence.
3. Data input
The clean data is then entered into its destination (perhaps a CRM like Salesforce or a data
warehouse like Redshift), and translated into a language that it can understand. Data input is
the first stage in which raw data begins to take the form of usable information.
4. Processing
During this stage, the data inputted to the computer in the previous stage is actually processed
for interpretation. Processing is done using machine learning algorithms, though the process
21
itself may vary slightly depending on the source of data being processed (data lakes, social
networks, connected devices etc.) and its intended use (examining advertising patterns,
medical diagnosis from connected devices, determining customer needs, etc.).
5. Data output/interpretation
The output/interpretation stage is the stage at which data is finally usable to non-data
scientists. It is translated, readable, and often in the form of graphs, videos, images, plain text,
etc.). Members of the company or institution can now begin to self-serve the data for their
own data analytics projects.
6. Data storage
The final stage of data processing is storage. After all of the data is processed, it is then stored
for future use. While some information may be put to use immediately, much of it will serve
a purpose later on. Plus, properly stored data is a necessity for compliance with data
protection legislation like GDPR. When data is properly stored, it can be quickly and easily
accessed by members of the organization when needed.
Database: It is a collection of interrelated data. These can be stored in the form of tables. A
database can be of any size and varying complexity. A database may be generated and
manipulated manually or it may be computerized.
Example: Customer database consists the fields as cname, cno, and ccityCnameCnoCcity
Advantages:
22
3.Data can be shared. Department of IT, SVECW 2
Advantages of DBMS:
1.Data Independence.
4.Data administration.
Components of a DBMS:
The database management system can be divided into five major components, they are:
1. Hardware
2. Software
3. Data
4. Procedures
23
5. Database Access Language
Let's have a simple diagram to see how they all fit together to form a database management
system.
When we say Hardware, we mean computer, hard disks, I/O channels for data, and any other
physical component involved before any data is successfully stored into the memory.
When we run Oracle or MySQL on our personal computer, then our computer's Hard Disk,
our Keyboard using which we type in all the commands, our computer's RAM, ROM all
become a part of the DBMS hardware.
This is the main component, as this is the program which controls everything. The DBMS
software is more like a wrapper around the physical database, which provides us with an
easy-to-use interface to store, access and update data.
The DBMS software is capable of understanding the Database Access Language and intrepret
it into actual database commands to execute them on the DB.
Data is that resource, for which DBMS was designed. The motive behind the creation of
DBMS was to store and utilise data.
In a typical Database, the user saved Data is present and meta data is stored.
Metadata is data about the data. This is information stored by the DBMS to better
understand the data stored in it.
For example: When I store my Name in a database, the DBMS will store when the name
was stored in the database, what is the size of the name, is it stored as related data to some
other data, or is it independent, all this information is metadata.
Procedures refer to general instructions to use a database management system. This includes
procedures to setup and install a DBMS, To login and logout of DBMS software, to manage
databases, to take backups, generating reports etc.
24
DBMS Components: Database Access Language
A user can write commands in the Database Access Language and submit it to the DBMS for
execution, which is then translated and executed by the DBMS.
User can create new databases, tables, insert data, fetch stored data, update data and delete
the data using the access language.
Types of DBMS:
Different types of Database Management Systems based in data models are as follows:
A DBMS is said to be hierarchical if the relationships among data in the database are
established in such a way that one data item is present as the subordinate of another one or a
sub unit. Here subordinate means that items have "parent-child" relationships among them.
These are good for storing data with items describing attributes, features and so on. For e.g., a
book with information on chapters and verses.
Network DBMS
A DBMS is said to be a Network DBMS if the relationships among data in the database are
of type many-to-many. The relationships among many-to-many appears in the form of a
network. Thus the structure of a network database is extremely complicated because of these
many-to-many relationships in which one record can be used as a key of the entire database.
These have mainly been replaced by Relational database management systems in today's
modern computing.
25
Object-oriented DBMS
OODBMS represent significant advance over other DBMS. While other DBMS are designed
to handle structred data, an OODBMS is designed to store data from variety of media
sources, such as photographs and text, and produce work, as output, in a multimedia format.
Relational DBMS
A DBMS is said to be a Relational DBMS or RDBMS if the database relationships are treated
in the form of a table. The data can be related to other data in the same table or other tables
which has to be correctly managed by joining one or more tables. Data in this type of model
is stored is fixed predefined structures and are usually manipulated using Structured Query
Language (SQL).
Functions of DBMS:
DBMS performs several important functions that guarantee the integrity and
consistency of the data in the database.
Functions of DBMS
Data Dictionary Management is the one of the most important function of database
management system.
DBMS stores definitions of the data elements and their relationships (metadata) in a data
dictionary.
26
So, all programs that access the data in the database work through the DBMS.
The DBMS uses the data dictionary to look up the required data component structures and
relationships which relieves you from coding such complex relationships in each program.
Additionally, any changes made in a database structure are automatically recorded in the data
dictionary, thereby freeing you from having to modify all of the programs that access the
changed structure.
In other words, the DBMS system provides data abstraction, and it removes structural and
data dependence from the system.
One of the DBMS functionality is creating and managing the complex structures required for
data storage, thus relieving you from the difficult task of defining and programming the
physical data characteristics.
A modern DBMS system provides storage not only for the data, but also for related data
entry forms or screen definitions, report definitions, data validation rules, procedural code,
structures to handle video and picture formats, and so on.
Data storage management is also important for database performance tuning. Performance
tuning relates to the activities that make the database perform more efficiently in terms of
storage and access speed. So, the data storage management is another important function of
Database ManagementSystem.
3. Data transformation and presentation
The DBMS transforms entered data in to required data structures. The DBMS relieves you of
the chore of making a distinction between the logical data format and the physical data
format. That is, the DBMS formats the physically retrieved data to make it conform to the
user’s logical expectations.
For example, imagine an enterprise database used by a multinational company. An end user
in England would expect to enter data such as July 11, 2009, as “11/07/2009.” In contrast, the
same date would be entered in the United States as “07/11/2009.” Regardless of the data
presentation format, the DBMS system must manage the date in the proper format for each
country.
27
4.SecurityManagement
Security Management is another important function of Database Management
System(DBMS). The DBMS creates a security system that enforces user security and data
privacy. Security rules determine which users can access the database, which data items each
user can access, and which data operations (read, add, delete, or modify) the user can
perform. This is especially important in multiuser database systems.
5.MultiUserAccessControl
Multiuser access control is another important DBMS Function. To provide data integrity and
data consistency, the DBMS uses sophisticated algorithms to ensure that multiple users can
access the database concurrently without compromising the integrity of the database.
6.BackupandRecoveryManagement
The DBMS provides backup and data recovery to ensure data safety and integrity.
Current DBMS systems provide special utilities that allow the DBA to perform routine and
special backup and restore procedures. Recovery management deals with the recovery of the
database after a failure, such as a bad sector in the disk or a power failure. Such capability is.
critical to preserving the database’s integrity.
The DBMS promotes and enforces integrity rules, thus minimizing data redundancy and
maximizing data consistency.
The data relationships stored in the data dictionary are used to enforce data integrity.
Ensuring data integrity is important DBMS functionality in transaction-oriented database
systems.
Structured Query Language (SQL) is the defacto query language and data access standard
supported by the majority of DBMS vendors.
9. Database Communication Interfaces
Current-generation DBMS's accept end-user requests via multiple, different network
28
environments. For example, the DBMS might provide access to the database via the Internet
through the use of Web browsers such as Mozilla Firefox or Microsoft Internet Explorer.
- End users can generate answers to queries by filling in screen forms through their preferred
Web browser.
- The DBMS can connect to third-party systems to distribute information via e-mail or other
productivity applications.
Computer Networks:
Open system:
A system which is connected to the network and is ready for communication.
Closed system:
A system which is not connected to the network and can’t be communicated with.
Computer Network:
It is the interconnection of multiple devices, generally termed as Hosts connected using
multiple paths for the purpose of sending/receiving data or media.
There are also multiple devices or mediums which helps in the communication between two
different devices which are known as Network devices.
Ex: Router, Switch, Hub, Bridge.
Types of Network:
29
The Network allows computers to connect and communicate with different computers via
any medium. LAN, MAN and WAN are the three major types of the network designed to
operate over the area they cover. There are some similarities and dissimilarities between
them. One of the major differences is the geographical area they cover, i.e. LAN covers the
smallest area; MAN covers an area larger than LAN and WAN comprises the largest of all.
There are other types of Computer Networks also, like :
PAN (Personal Area Network)
SAN (Storage Area Network)
EPN (Enterprise Private Network)
VPN (Virtual Private Network)
Local Area Network (LAN) :
LAN or Local Area Network connects network devices in such a way that personal computer
and workstations can share data, tools and programs. The group of computers and devices are
connected together by a switch, or stack of switches, using a private addressing scheme as
defined by the TCP/IP protocol. Private addresses are unique in relation to other computers
on the local network. Routers are found at the boundary of a LAN, connecting them to the
larger WAN.
Data transmits at a very fast rate as the number of computers linked are limited. By
definition, the connections must be high speed and relatively inexpensive hardware (Such as
hubs, network adapters and Ethernet cables). LANs cover smaller geographical area (Size is
limited to a few kilometers) and are privately owned. One can use it for an office building,
home, hospital, schools, etc. LAN is easy to design and maintain. A Communication medium
used for LAN has twisted pair cables and coaxial cables. It covers a short distance, and so the
error and noise are minimized.
WAN’s data rate is slow about a 10th LAN’s speed, since it involves increased
distance and increased number of servers and terminals etc. Speeds of WAN ranges from few
kilobits per second (Kbps) to megabits per second (Mbps). Propagation delay is one of the
biggest problems faced here. Devices used for transmission of data through WAN are: Optic
wires, Microwaves and Satellites. Example of a Switched WAN is the asynchronous transfer
mode (ATM) network and Point-to-Point WAN is dial-up line that connects a home computer
to the Internet.
Network Topology:
The arrangement of a network which comprises of nodes and connecting lines via sender and
receiver is referred as network topology. The various network topologies are :
a) Mesh Topology :
In mesh topology, every device is connected to another device via particular channel.
31
Advantages of this topology :
It is robust.
Fault is diagnosed easily. Data is reliable because data is transferred among the devices
through dedicated channels or links.
Provides security and privacy.
Problems with this topology :
Installation and configuration is difficult.
Cost of cables are high as bulk wiring is required, hence suitable for less number of
devices.
Cost of maintenance is high.
b) Star Topology :
In star topology, all the devices are connected to a single hub through a cable. This hub is the
central node and all others nodes are connected to the central node. The hub can be passive in
nature i.e. not intelligent hub such as broadcasting devices, at the same time the hub can be
intelligent known as active hubs. Active hubs have repeaters in them.
32
Advantages of this topology :
If N devices are connected to each other in star topology, then the number of cables
required to connect them is N. So, it is easy to set up.
Each device require only 1 port i.e. to connect to the hub.
Problems with this topology :
If the concentrator (hub) on which the whole topology relies fails, the whole system will
crash down.
Cost of installation is high.
Performance is based on the single concentrator i.e. hub.
c) Bus Topology :
Bus topology is a network type in which every computer and network device is connected to
single cable. It transmits the data from one end to another in single direction. No bi-
directional feature is in bus topology.
33
d) Ring Topology :
In this topology, it forms a ring connecting a devices with its exactly two neighbouring
devices.
1. One station is known as monitor station which takes all the responsibility to perform
the operations.
2. To transmit the data, station has to hold the token. After the transmission is done, the
token is to be released for other stations to use.
3. When no station is transmitting the data, then the token will circulate in the ring.
There are two types of token release techniques : Early token release releases the token just
after the transmitting the data and Delay token release releases the token after the
acknowledgement is received from the receiver.
34
e) Hybrid Topology :
This topology is a collection of two or more topologies which are described above. This is a
scalable topology which can be expanded easily. It is reliable one but at the same it is a costly
topology.
35
UNIT – IV
Internet Access:
Internet access is the ability of individuals and organizations to connect to
the Internet using computer terminals, computers, and other devices; and to access services
such as email and the World Wide Web. Internet access is sold by Internet service
providers (ISPs) delivering connectivity at a wide range of data transfer rates via various
networking technologies. Many organizations, including a growing number of municipal
entities, also provide cost-free wireless access.
Availability of Internet access was once limited, but has grown rapidly. In 1995,
only 0.04 percent of the world's population had access, with well over half of those living in
the United States,[1] and consumer use was through dial-up. By the first decade of the 21st
century, many consumers in developed nations used faster broadband technology, and by
2014, 41 percent of the world's population had access, broadband was almost ubiquitous
worldwide, and global average connection speeds exceeded one megabit per second.
The Internet developed from the ARPANET, which was funded by the US
government to support projects within the government and at universities and research
laboratories in the US – but grew over time to include most of the world's large universities
and the research arms of many technology companies. [4][5][6] Use by a wider audience only
came in 1995 when restrictions on the use of the Internet to carry commercial traffic were
lifted.[7]
These dial-up connections did not support end-to-end use of the Internet protocols and
only provided terminal to host connections. The introduction of network access
servers supporting the Serial Line Internet Protocol (SLIP) and later the point-to-point
protocol (PPP) extended the Internet protocols and made the full range of Internet services
available to dial-up users; although slower, due to the lower data rates available using dial-up.
36
Broadband Internet access, often shortened to just broadband, is simply defined as
"Internet access that is always on, and faster than the traditional dial-up access" [8][9] and so
covers a wide range of technologies. Broadband connections are typically made using a
computer's built in Ethernet networking capabilities, or by using a NIC expansion card.
Most broadband services provide a continuous "always on" connection; there is no dial-in
process required, and it does not interfere with voice use of phone lines. [10] Broadband
provides improved access to Internet services such as:
Internet Protocol:
Transmission Control Protocol (TCP)
TCP is a connection oriented protocol and offers end-to-end packet delivery. It acts as
back bone for connection.It exhibits the following key features:
Transmission Control Protocol TCP corresponds to the Transport Layer of OSI
Model.
TCP is a reliable and connection oriented protocol.
TCP offers:
Stream Data Transfer.
Reliability.
Efficient Flow Control
Full-duplex operation.
Multiplexing.
TCP offers connection oriented end-to-end packet delivery.
TCP ensures reliability by sequencing bytes with a forwarding acknowledgement
number that indicates to the destination the next byte the source expect to receive.
It retransmits the bytes not acknowledged with in specified time period.
37
Internet Protocol (IP)
Internet Protocol is connectionless and unreliable protocol. It ensures no guarantee
of
successfully transmission of data.
In order to make it reliable, it must be paired with reliable protocol such as TCP at the
transport layer.
Internet protocol transmits the data in form of a datagram as shown in the following diagram:
Points to remember:
The length of datagram is variable.
The Datagram is divided into two parts: header and data.
The length of header is 20 to 60 bytes.
The header contains information for routing and delivery of the packet.
38
Points to remember:
UDP is used by the application that typically transmit small amount of data at one
time.
UDP provides protocol port used i.e. UDP message contains both source and
destination port number, that makes it possible for UDP software at the destination to
deliver the message to correct application program.
File Transfer Protocol (FTP)
FTP is used to copy files from one host to another. FTP offers the mechanism for the
same in following manner:
FTP creates two processes such as Control Process and Data Transfer Process at both
ends.i.e. at client as well as at server.
FTP establishes two different connections: one is for data transfer and other is for
control
information.
Control connection is made between control processes while Data Connection is
made
Between FTP uses port 21 for the control connection and Port 20 for the data
connection.
39
Hyper Text Transfer Protocol(HTTP)
HTTP is a communication protocol. It defines mechanism for communication
between browser and the web server. It is also called request and response protocol because
the communication between browser and server takes place in request and response pairs.
HTTP Request
HTTP request comprises of lines which contains:
Request line
Header Fields
Message body
Key Points
The first line i.e. the Request line specifies the request method i.e. Get or Post.
The second line specifies the header which indicates the domain name of the server
from where index.htm is retrieved.
HTTP Response
Like HTTP request, HTTP response also has certain structure. HTTP response contains:
Status line
Headers
Message body
Internet Addressing:
A way to locate people, computers, and Internet resources. It can be
In general, Internet addressing is a systematic way to identify people, computers and Internet
resources. On the Internet, the term "address" is used loosely. Address can mean many
different things from an electronic mail address to a URL.
1.IP Address
An IP address is a unique number that identifies computers on the Internet; every
computer directly connected to the Internet has one. Every client, server and network device
must have a unique IP address for each network connection (network interface).
40
IP addresses are conceptually similar to phone numbers, except they are used in LANs
(Local Area Network), WANs (Wide Area Network), and the Internet. Because the numbers
are not easy for humans to remember, the Domain Name System provides a service
analogous to an address book lookup called "domain name resolution" or "name resolution".
Special DNS servers on the internet are dedicated to performing the translation from a
domain name to an IP address.
Within an isolated network, you can assign IP addresses at random as long as each one is
unique. However, connecting a private network to the Internet requires using registered IP
addresses (called Internet addresses) to avoid duplicates.
The four numbers in an IP address are used in different ways to identify a particular
network and a host on that network. Four regional Internet registries -- ARIN, RIPE NCC,
LACNIC and APNIC -- assign Internet addresses from the following three classes.
1.1Format.
41
Example IP Address
Each of the four numbers uses eight bits of storage, and so can represent any of the
256 numbers between zero (binary 00000000) and 255 (binary 11111111). Therefore, there
are more than 4 billion possible different IP addresses in all:
Each device in an IP network is either assigned a permanent address (static IP) by the
network administrator or is assigned a temporary address (dynamic IP). Depending on one's
Internet connection the IP address can be the same every time one connects (called a static IP
address), or different every time one connects, (called a dynamic IP address).
In order to use a dynamic IP address, there must exist a server, which can provide the
address. IP addresses are usually given out through a server service called DHCP or the
Dynamic Host Configuration Protocol. If a static address is used, it must be manually
programmed into parameters of the device's network interface.
Routers, firewalls and proxy servers use static addresses. Client machines may use
static or dynamic IP addresses.In routers and operating systems, the default configuration for
clients is dynamic IP .
1.3Dotted Decimals
IP addresses are written in "dotted decimal" notation, which is four sets of numbers separated
by periods; for example, 204.171.64.2. If you knew the IP address of a Web site, you could
enter the dotted decimal number into your browser instead of the domain name .The
traditional IP address uses a 32-bit number that defines both the network and the host
42
computer. The network class determines how many of the 32 bits are used for the network
address, leaving the remaining bits for use as the host number. The host number can be
further divided between subnetworks and hosts
Class A, B and C
Although the computer identifies the class by the first three bits of the address (A=0; B=10;
C=110), people identify the class by the first number in the address (see range below). This
class-based system has also been greatly expanded, eliminating the huge disparity in the
number of hosts that each class can accommodate
An IP address is first divided between networks and hosts. The host bits are further divided
between subnets and hosts.
1.4Domain Name
Most computers on the Internet have a unique domain name.
Special computers, called domain name servers, look up the domain name and match
it to the corresponding IP address so that data can be properly routed to its destination
on the Internet.
An example domain name is: healthyway.com
Domain names are easier for most people to relate to than a numeric IP address.
43
"abc123" is the name of the person receiving or sending the message; this is referred
to as the username.
"columbia" is part of the domain name of the organization.
"edu" is also part of the domain name and indicates that "columbia" is an educational
institution.
For example, within CompuServe an e-mail address consists only of two numbers separated
by a comma: 36547,891.
To convert this to an address that can be used on the Internet, the comma is
changed to a period and the number serves as the username.
3.URLs
URL stands for Uniform Resource Locator. URLs are used to identify specific sites and
files available on the World Wide Web.
Two examples:
http://www.healthyway.com/exercise/mtbike.html
gopher://gopher.state.edu/
3.1URLs
Similar to an e-mail address, a URL is read like a sentence. For example the URL
44
http://www.healthyway.com is read as "http colon forward slash forward slash www dot
healthyway dot com".
www:
Stands for "World Wide Web." It is important to know that this is not a synonym for
the Internet. The World Wide Web, or just "the Web," as ordinary people call it, is a subset of
the Internet. The Web consists of pages that can be accessed using a Web browser. The
Internet is the actual network of networks where all the information resides.
Things like Telnet, FTP, Internet gaming, Internet Relay Chat (IRC), and e-mail are
all part of the Internet, but are not part of the World Wide Web. The Hyper-Text Transfer
Protocol (HTTP) is the method used to transfer Web pages to your computer. With hypertext,
a word or phrase can contain a link to another Web site. All Web pages are written in the
hyper-text markup language (HTML), which works in conjunction with HTTP.
45
operators or automated bots may kick people out of the channel and even ban users who post
offensive remarks or spam the channel with repeated messages.
While IRC was designed as a public chat service, it supports other features such as
private messaging and file transfers. For example, you can use an IRC command (which
typically begins with a forward slash "/") to request a private chat session with another user.
Then you can use another IRC command to send the user a file from your local system.
E-Mail:
Email, short for "electronic mail," is one of the most widely used features of
the Internet, along with the web. It allows you to send and receive messages to and from
anyone with an email address, anywhere in the world.
Email uses multiple protocols within the TCP/IP suite. For example, SMTP is used to
send messages, while the POP or IMAP protocols are used to retrieve messages from a
mail server. When you configure an email account, you must define your email
address, password, and the mail servers used to send and receive messages.
Fortunately, most webmail services configure your account automatically, so you only
need to enter your email address and password. However, if you use an email client like
Microsoft Outlook or Apple Mail, you may need to manually configure each account.
Besides the email address and password, you may also have to enter the incoming and
outgoing mail servers and enter the correct port numbers for each one.
The original email standard only supported plain text messages. Eventually, email
evolved to support rich text with custom formatting. Today, email supports HTML, which
allows emails to be formatted the same way as websites. HTML email messages can include
images, links, and CSS layouts. You can also send files or "email attachments" along with
messages.
Most mail servers allow you to send multiple attachments with each message, but
they limit the total size. In the early days of email, attachments were typically limited to
one megabyte, but now many mail servers support email attachments that are 20 megabytes
in size or more.
1.Advantage of E-Mail
Cheapest and fastest way to communication.
Irrespective of location.
Exchange endless amount of data/information.
46
Global communication is easier and instant.
24 hours service.
2.Disadvantage of E-Mail
Unsecured communication.
Privacy problem.
Network conjunction.
Power problem.
Mailing Basics:
Any system for sending and receiving messages over a network that called Electronic
Mail which can be included attachments such as pictures or sound files.
E-Mail originated in the early 1970s by ARPANET and now it is primary method of
communication.
Email is the process of sending and receiving messages electronically over the internet.
2.3Hardware
Pentium-4
Modem
Cables
2.4Software
• Operating system
•Web browser
2.5Basic knowledge of e-mail operation
Using Internet
Knowledge of MS-office
Typing
Basic knowledge about E-mail sending, receiving, attachment etc.
3.Basic component of E-Mail
Compose mail/Write new mail
Inbox
Draft
48
Trash
Address book/Contact
Spam
Setting
E-Mail Ethics:
Email etiquette refers to the principles of behavior that one should use when writing
or answering email messages. It is also known as the code of conduct for email
communication. Email etiquette depends upon to whom we are writing- Friends &
Relatives, Partners, Customers, Superior or Subordinates.
Introduction to Multimedia
Multi
Many, Multiple,
Media
Tools that is used to represent or do a certain things, delivery medium,
a form of mass communication – newspaper, magazine / tv.
Distribution tool & information presentation – text, graphic, voice,
images, music and etc.
Multimedia is a combination of text, graphic, sound, animation, and video that is
delivered interactively to the user by electronic or digitally manipulated.
49
Multimedia is a media that uses multiple form of information content and information
processing.
Elements of Multimedia: Text, Graphics, Video, Animation, Audio.
GRAPHIC
TEXT
MULTIME
VIDEO
AUDIO
ANIMATION
Multimedia tools.
o Text,
o Graphics,
o Video,
o Animation,
o Audio.
1.Text:
A broad term for something that contains words to express something.
Text is the most basic element of multimedia.
A good choice of words could help convey the intended message to the users
(keywords).
Used in contents, menus, navigational buttons.
Example
50
2.Graphics:
Two-dimensional figure or illustration
Could be produced manually (by drawing, painting, carving, etc.) or by computer
graphics technology.
Used in multimedia to show more clearly what a particular information is all about
(diagrams, picture).
Example:
3.Audio:
Produced by vibration, as perceived by the sense of hearing.
In multimedia, audio could come in the form of speech, sound effects and also music
score.
Example:
51
4.Animation:
The illusion of motion created by the consecutive display of images of static elements.
In multimedia, animation is used to further enhance / enriched the experience of the
user to further understand the information conveyed to them.
Example:
5.Video:
Is the technology of capturing, recording, processing, transmitting, and reconstructing
moving pictures.
Video is more towards photo realistic image sequence / live recording as in
comparison to animation.
52
Video also takes a lot of storage space. So plan carefully before you are going to use
it.
UNIT IV COMPLETED
53
UNIT – V
Electronic Commerce:
E-commerce (EC), an abbreviation for electronic commerce, is the buying and selling
of goods and services, or the transmitting of funds or data, over an electronic network,
primarily the internet. These business transactions occur either as business-to-business (B2B),
business-to-consumer (B2C), consumer-to-consumer or consumer-to-business. The terms e-
commerce and e-business are often used interchangeably. The term e-tail is also sometimes
used in reference to the transactional processes for online shopping.
History of e-commerce
The beginnings of e-commerce can be traced to the 1960s, when businesses started
using Electronic Data Interchange (EDI) to share business documents with other companies.
In 1979, the American National Standards Institute developed ASC X12 as a universal
standard for businesses to share documents through electronic networks.
After the number of individual users sharing electronic documents with each other
grew in the 1980s, the rise of eBay and Amazon in the 1990s revolutionized the e-commerce
industry. Consumers can now purchase endless amounts of items online, from e-tailers,
typical brick-and-mortar stores with e-commerce capabilities and one another.
Classification of E-Commerce:
1.Business-to-business (B2B):
In 2017, Forrester Research predicted that the B2B e-commerce market will top $1.1
trillion in the U.S. by 2021, accounting for 13% of all B2B sales in the nation.
54
2.Business-to-consumer (B2C):
Today, there are innumerable virtual stores and malls on the internet selling all types
of consumer goods. The most recognized example of these sites is Amazon, which dominates
the B2C market.
3.Consumer-to-consumer (C2C):
Online auctions and classified advertisements are two examples of C2C platforms,
with eBay and Craigslist being two of the most popular of these platforms. Because eBay is a
business, this form of e-commerce could also be called C2B2C -- consumer-to-business-to-
consumer.
4. Consumer-to-business(C2B)
5.Business-to-administration (B2A):
55
Businesses can supply these electronically. B2A services have grown considerably in
recent years as investments have been made in e-government capabilities.
6.Consumer-to-administration (C2A):
systems analysis
systems design
1.Systems analysis:
System analysis is conducted for the cause of studying a system or its elements in
order to identify its objectives. it is a trouble solving technique that improves the system and
ensures that all the components of the system work effectively to accomplish their purpose.
56
2.Systems design:
Systems
Processes
Technology
what is a system?
The word system is derived from Greek word Systema, which means an prepared relationship
between any set of components to achieve some common reason or objective.
3.Elements of a system:
57
3.1Outputs and Inputs
The main aim of a device is to produce an output that is useful for its user.
Inputs are the information that enters into the system for processing.
Output is the outcome of processing.
3.2Processor(s)
The processor is the element of a system that involves the actual transformation of input into
output.
It is the operational element of a system. Processors may modify the input either totally or
partially, depending at the output specification.
As the output specifications change, so does the processing. In some cases, input is also
modified to enable the processor for handling the transformation.
3.3Control
3.4Feedback
3.5Environment
58
3.6Boundaries and Interface
A system should be described through its boundaries. boundaries are the limits that
identify its components, processes, and interrelationship when it interfaces with any other
system.
Every system has boundaries that determine its sphere of impact and control.
The knowledge of the boundaries of a given system is critical in determining the nature of
its interface with other systems for successful design.
Life Cycle:
SDLC is a process followed for a software project, within a software organization. It
consists of a detailed plan describing how to develop, maintain, replace and alter or enhance
specific software. The life cycle defines a methodology for improving the quality of software
and the overall development process.
The following figure is a graphical representation of the various stages of a typical
SDLC.
59
department, market surveys and domain experts in the industry. This information is then used
to plan the basic project approach and to conduct product feasibility study in the economical,
operational and technical areas.
Planning for the quality assurance requirements and identification of the risks
associated with the project is also done in the planning stage. The outcome of the technical
feasibility study is to define the various technical approaches that can be followed to
implement the project successfully with minimum risks.
Stage 2: Defining Requirements
Once the requirement analysis is done the next step is to clearly define and document
the product requirements and get them approved from the customer or the market analysts.
This is done through an SRS (Software Requirement Specification) document which
consists of all the product requirements to be designed and developed during the project life
cycle.
Stage 3: Designing the Product Architecture
SRS(Software Requirement Specification) is the reference for product architects to
come out with the best architecture for the product to be developed. Based on the
requirements specified in SRS, usually more than one design approach for the product
architecture is proposed and documented in a DDS - Design Document Specification.
This DDS(Design Document Specification) is reviewed by all the important
stakeholders and based on various parameters as risk assessment, product robustness, design
modularity, budget and time constraints, the best design approach is selected for the product.
A design approach clearly defines all the architectural modules of the product along
with its communication and data flow representation with the external and third party
modules (if any). The internal design of all the modules of the proposed architecture should
be clearly defined with the minutest of the details in DDS.
Stage 4: Building or Developing the Product
In this stage of SDLC the actual development starts and the product is built. The
programming code is generated as per DDS during this stage. If the design is performed in a
detailed and organized manner, code generation can be accomplished without much hassle.
Developers must follow the coding guidelines defined by their organization and
programming tools like compilers, interpreters, debuggers, etc. are used to generate the code.
Different high level programming languages such as C, C++, Pascal, Java and PHP are used
for coding. The programming language is chosen with respect to the type of software being
developed.
60
Stage 5: Testing the Product
This stage is usually a subset of all the stages as in the modern SDLC models, the
testing activities are mostly involved in all the stages of SDLC. However, this stage refers to
the testing only stage of the product where product defects are reported, tracked, fixed and
retested, until the product reaches the quality standards defined in the SRS.
Stage 6: Deployment in the Market and Maintenance
Once the product is tested and ready to be deployed it is released formally in the
appropriate market. Sometimes product deployment happens in stages as per the business
strategy of that organization. The product may first be released in a limited segment and
tested in the real business environment (UAT- User acceptance testing).
Then based on the feedback, the product may be released as it is or with suggested
enhancements in the targeting market segment. After the product is released in the market, its
maintenance is done for the existing customer base.
Mobile Commerce:
M-commerce (mobile commerce) is the buying and selling of goods and services
through wireless handheld devices such as smartphones and tablets. As a form of e-
commerce, m-commerce enables users to access online shopping platforms without needing
to use a desktop computer. Examples of m-commerce include in-app purchasing, mobile
banking, virtual marketplace apps like the Amazon mobile app or a digital wallet such as
Apple Pay, Android Pay and Samsung Pay.
Over time, content delivery over wireless devices has become faster, more secure and
scalable. As of 2017 the use of m-commerce accounted for 34.5% of e-commerce sales.
Financial services, which includes mobile banking (when customers use their handheld
devices to access their accounts and pay their bills) as well as brokerage services, in
which stock quotes can be displayed and trading conducted from the same handheld
device.
Telecommunications, in which service changes, bill payment and account reviews can all
be performed from the same handheld device.
Service and retail, as consumers are given the ability to place and pay for orders on-the-
fly.
Information services, which include the delivery of financial news, sports figures and
traffic updates to a single mobile device.
1.Types of m-commerce
61
M-commerce can be categorized by function as either mobile shopping, mobile
banking or mobile payments. Mobile shopping allows for a customer to purchase a product
from a mobile device, using an application such as Amazon, or over a web app. A
subcategory of mobile shopping is app commerce, which is a transaction that takes place over
a native app. Mobile banking includes any handheld technology that enables customers to
conduct fanatical transactions.
This is typically done through a secure, dedicated app provided by the banking
institution. Mobile payments enable users to buy products in-person using a mobile device.
Digital wallets, such as Apple Pay, allow a customer to buy a product without needing to
swipe a card or pay with physical cash.
A poorly executed mobile experience can deter customers from making purchases.
Mobile payment options are not available in every geographic location and may not
support every type of digital wallet.
Businesses must know and comply with tax laws and regulations of all countries they ship to
(some businesses will avoid this by only allowing purchases and shipping from their country
of origin).
E-business can comprise a range of functions and services, ranging from the
development of intranets and extranets to e-services, the provision of services and tasks over
the internet by application service providers. Today, as major corporations continuously
rethink their businesses in terms of the internet -- specifically, its availability, wide reach and
ever-changing capabilities -- they are conducting e-business to buy parts and supplies from
other companies, collaborate on sales promotions and conduct joint research.
E-commerce and e-business are similar, with e-commerce referring to buying and
selling products online. However, e-business defines a wider range of business processes by
including aspects such as supply chain management (SCM), electronic order processing and
customer relationship management (CRM) designed to help the company operate more
effectively and efficiently.
63
UNIT V COMPLETED
64