Developer Data Modeling Mistakes: From Postgres to NoSQL
E commerce 2008 section-b
1. 2008 SECTION-B
1. DISCUSS THE ADVANTAGE OF E-BUSINESS OVER TRADITIONAL BUSINESS
With the help of E-Business one can develop a more cost-effective Communication and
Marketing Strategy - The most obvious advantage of "upgrading" to e-business is that it gives you
a vital web presence.
You can reach New Markets World Wide - The internet offers exciting ways of reaching new
markets that could only be dreamed of in the past.
You can cut Advertising and Marketing Costs - Online advertising is not only more efficient, but it
is often less expensive than traditional advertising. After sales training expenses can also be
reduced by utilizing online seminars, training videos and tutorials.
You can streamline the Ordering Process by taking orders online - Implementing an online
ordering system allows you to eliminate manual paper work or telephone order taking.
You don’t have to hire a fancy looking shop
You don’t have to hire salesmen
You may take orders at midnight
Another great advantage of an e-business over traditional business is that it can easily find and
market to a specific niche or segment, which results in a higher conversion of sales. Traditional
businesses are forced to choose correct locations to attract their desired customer base.
The most significant difference is that e-businesses cost very little upfront when compared to
traditional businesses. Starting a business on the Internet does not have the burden of a physical
storefront and any expenses that accompany it.
2. LIST THE COMPUTER CRIMES. DISCUSS ANY TWO OF THEM
Computer crime has been defined broadly as a criminal act that has been committed using a computer as
the principal tool.
Some of the computer crimes are:-
Hacking
Identity theft
Internet gambling
Child pornography
2. Hacking:-
The word "hacking" has two definitions. The first definition refers to the hobby/profession of working with
computers. The second definition refers to breaking into computer systems. While the first definition is older and
is still used by many computer enthusiasts (who refer to cyber-criminals as "crackers"), the second definition is
much more commonly used. In particular, the web pages here refer to "hackers" simply because our web-server
logs show that everyone who reaches these pages are using the second definition as part of their search criteria.
Identity theft:-
The concept is simple: someone gains access to your personal information and uses it for their own
benefit. This could range from a black-hat hacker stealing your online banking account login and
password to getting access to your social security number and using it to pretend to be you. Such people
can make themselves a lot of money with your personal information, and screw you over in the process
Internet gambling:-
It offers all forms of gambling to every online household 24 hours a day. Via the Internet, betters can indulge in
casino-style gambling, such as blackjack, poker, slot machines and roulette. They can bet on sports, horse or dog
races, lotteries, bingo, tournaments, election results, sweepstakes and more. Many observers believe that online
trading in the stock market, especially so-called “day trading,” is nothing more than gambling on stock market
performance.
Child pornography:-
It’s tragic, but the Internet is often used to exploit children. What’s perhaps even sicker is that people
make money doing this.
3. EXPLAIN THE MALICIOUS CODE AND ITS TYPE
Malicious code is the term used to describe any code in any part of a software system or script that is intended to
cause undesired effects, security breaches or damage to a system. Malicious code describes a broad category of
system security terms that includes attack scripts, viruses, worms, Trojan horses, spyware, adware, backdoors,
and malicious active content.
Types of malicious code:-
Viruses: A computer virus is a program or piece of code that is loaded onto your computer without your
knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are
man-made.
Adware, or advertising-supported software, is any software package which automatically
renders advertisements in order to generate revenue for its author. The advertisements may be in
the user interface of the software or on a screen presented to the user during the installation
process.
3. Spyware is a type of malicious program installed on computers that collects information about
users without their knowledge. The presence of spyware is typically hidden from the user and can
be difficult to detect.
Worms: A computer worm is a standalone malware computer program that replicates itself in
order to spread to other computers
Trojan Horses: hide malicious intent inside a host program that appears to do something useful
Attack scripts: programs written by experts to exploit security weaknesses, usually across the network
Java attack applets: programs embedded in Web pages that gain foothold through a browser
ActiveX controls: program components that allow malicious code fragment to control applications or the
OS
4. WHAT IS DIGITAL SIGNATURE? HOW IT IS OBTAINED?
A digital signature is an electronic, encrypted, stamp of authentication on digital information
such as e-mail messages, macros, or electronic documents. A signature confirms that the
information originated from the signer and has not been altered.
HOW IT IS OBTAINED?
5. WHAT IS FIREWALL? EXPLAIN
A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in
both hardware and software, or a combination of both. Firewalls are frequently used to prevent
unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All
messages entering or leaving the intranet pass through the firewall, which examines each message and blocks
those that do not meet the specified security criteria.
A firewall can either be software-based or hardware-based and is used to keep a network secure. Its
primary objective is to control the incoming and outgoing network traffic by analyzing the data packets
and determining whether it should be allowed through or not, based on a predetermined rule set. A
network's firewall builds a bridge between an internal network that is assumed to be secure and trusted,
and another network, usually an external (inter)network, such as the Internet, that is not assumed to be
secure and trusted
4. There are a number of firewall screening methods. A simple one is to screen requests to make
sure they come from acceptable (previously identified) domain name and Internet
Protocol addresses. For mobile users, firewalls allow remote access in to the private network by
the use of secure logon procedures and authentication certificates.
A number of companies make firewall products. Features include logging and reporting,
automatic alarms at given thresholds of attack, and a graphical user interface for controlling the
firewall.
Computer security borrows this term from firefighting, where it originated. In firefighting, a
firewall is a barrier established to prevent the spread of fire.