The Institute of Chartered Accountant of India: Information Technology Training Programme
The Institute of Chartered Accountant of India: Information Technology Training Programme
The Institute of Chartered Accountant of India: Information Technology Training Programme
PERSONEL DETAIL, SAURABH SAMELE CRO-0316709 Batch No: 101 Roll No: 12 Batch: Morning (10 to 2)
PERSONEL DETAIL, SAURABH SAMELE CRO-0316709 Batch No: 101 Roll No: 12 Batch: Morning (10 to 2)
In the choice of this project and its successful culmination, I gratefully acknowledge the invaluable note of concern to our Faculty and specially Thankful to Sir Anoj kumar who besides helping me in theoretical and practical aspects in the ITT Program, also encouraged and guided me along each step throughout this Project. The Project on WEB TECHNOLOGY & DIGITAL SIGNATURE has truly been a great learning experience to me.
Web Technologies are playing the leading role in the World Wide Web includes many latest evolutions in it like Web Services, Web 2.0, Tableless Design, HTML, XHTML, XML, CSS 2.0 etc. Web technology aims to enhance creativity, secure information sharing, collaboration and functionality of the web. Web Technologies have been developing since last 15-20 years and are still . Web 2.0,Web 3.0 are the main revolutionary Technologies of it.
Since WEB is a WIDE concept. So, we ought to be acquainted with basic Components that comprises WEB.
Information including access to the Internet has become the basis for personal, economic, and political advancement. Whether you want to find the latest financial news, browse, through library catalogs, exchange information with colleagues, or join in a lively political debate, the Internet is the tool that will take you beyond telephone, faxes, and isolated computers to a burgeoning networked information frontier. Internet is also defined as Information Superhighway.
The Internet, sometimes called simply the Net , is a worldwide system of computer networks- a network of networks in which users at any one computer can, if they have permission , get information from any other computer.
Dial up
o The computer can be connected to the Net by dial up access i.e., by means of a modem. o The connection is done using PPP(Point to Point Protocol) or SLIP(Serial Line Internet Protocol).
THE OTHER WAYS OF CONNECTING TO THE NET ARE BULLETIN BORDS, MAIL CALL AND WIRELESS SYSTEM.
COMPUTER HARDWARE: Computer hardware is needed for internet connection. TELEPHONE CONNECTION:
A live telephone connection is also needed for internet connection.
WEB BROWSER:
A web browser is a software application which enables a user to display and interact with text , image , games , videos , music , games and other information typically located on a Web page at a website on the World Wide Web or a local area network. Currently available web browsers are Internet Explorer, Mozilla Firefox, Safari, Netscape, Opera etc.
GRAPHICAL:
Text, images, audio, and video are retrievable through a graphical software program such as Internet Explorer, Firefox, Netscape, Mozilla and Opera.
TEXT:
Text browser provides access to the web in text-only mode. Example of text based web browser is LYNX.
MODEM: A device that connects your computer to the Internet, when you are not connected via a LAN (local area network). Most people connect to a modem when using a home computer. SERVICE PROVIDER: Internet service provider is a business or organization that provides consumers or business access to the Internet and related services.
a) b) c) d) e) f) g) h)
DISADVANTAGES
THEFT OF PERSONAL INFORMATION. SPAMMING. VIRUS THREAT. PORNOGRAPHY.
WORLD WIDE WEB(WWW): WWW is a system of distributed servers that handle hypermedia document. Hypermedia authors use Hypertext Markup Language(HTML) to create hypermedia documents. HTML is a method of presenting information in which selected words or phrases in the text are hyperlinks to other, related information. E-MAIL SERVICES: Electronic mail on the Internet provides quick, cost-effective transfer of message to others E-mail users worldwide.
TYPES OF E-MAILs SERVERS:
GOPHER
1) It is a system that pre-dates the world wide web for organizing and displaying files on Internet servers. 2) A Gopher server presents its contents as a hierarchically structured list of files. 3) Gopher is a distributed documents search and retrieval network protocol designed for the Internet. 4) Its goal is to function as a improved form of Anonymous FTP, enhanced with hyper linking features similar to that of the World Wide Web. 5) Gopher combines document hierarchies with collections of services, including WAIS, the Archie & Veronica search engines, gateways to other information systems such as ftp and Usenet.
TELNET
a. Telnet(Telecommunication network) is a network protocol used on the Internet or a local area network(LAN). b. Telnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. c. Telnet is a user command and an underlying TCP/IP protocol for accessing remote computers. d. A Telnet command request looks like this (the computer name is made-up): telnet the.libraryat.whtais.edu Telnet is most likely to be used by program developers and anyone who has a need to use specific applications or data located at a particular host computer.
1. As far as service are concerned, network-operated bots have been introduced to facilitate registration of nicknames and channels along with sending messages for offline users with network operator function. 2. Extra modes have been implemented i.e., the original IRC system used a set of standard user and channel modes, new servers add many new modes for such features as removing color codes from text, or obscuring a users host mask to protect from denial of service attacks. 3. Proxy detection is in place wherein most modern servers support detection of users attempting to connect through an insecure proxy server, which can then be denied a connection. 4. There is introduction of additional commands in form of shorthand
USENET NEWSGROUP:
I. Usenet News is a global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. II. Usenet itself is a set of machines that exchange messages, or articles, from Usenet discussion forums, called newsgroups. III. The major difference between Usenet News and e-mail discussion groups is the fact that Usenet messages are stored on central computers, and users must connect to these computers to read or download the messages posted to these groups. IV. Newsgroups servers are hosted by various organization and institutions. V. Most of the Internet service providers host their own news servers, or rent access to one , for their subscribers. VI. Every host of a news server maintains agreements with other news servers to regularly synchronize. VII. Newsgroups are often arranged into hierarchies, theoretically making it simpler to find related groups.
Analog/Dial-up Connection ISDN connection B-ISDN Connection DSL Connection ADSL Connection SDSL Connection VDSL Connection Cable Connection T-1 Lines Connection Bonded T-1 Connection T-3 Lines Connection Satellite Connection
The world wide web is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. The initial purpose of the Web was to use networked hypertext to facilitate communication among its members, who were located in several countries. In addition to hypertext, the Web began to incorporate graphics , video, and sound. Almost every protocol type available on the Internet is accessible on the Web. Internet protocol s are sets of rules that allows for inter machine communication on the Internet. FOLLOWING IS A SAMPLE OF MAJOR PROTOCOLS ACCESSIBLE ON THE WEB E-mail (Simple Mail Transport Protocol or SMTP) Usenet( Network News Transfer Protocol or NNTP) HTTP(Hypertext Transfer Protocol)
Hypertext is a document containing words that connect to other documents . These words are called links and are selected by the users. A single hypertext document can contain links to many documents. Producing hypertext for the Web is accomplished by creating documents with a language called Hypertext Markup language, or HTML. Hypermedia is a term used for hypertext which is not constrained to be text. For example, it can include graphics, video and sound.
A web page is a resource of information that is suitable for the World Wide Web and can be accessed through a web browser. This information is usually in HTML or XHTML format, and may provide navigation to other web pages via hypertext links. Web Pages may consist of files of static text stored within the web servers file system(static web pages), or the web server may construct the(X)HTML for each web page when it is requested by a browser(dynamic web pages).
WEB SITE: A website is a collection of web pages, images, videos or other digital assets that is hosted on one or more web servers, usually accessible via the Internet. BOOKMARKS: Internet bookmarks are stored Web page location(URLs) that can be retrieved. The primary purpose of any bookmark is to easily catalogue and access web pages that a user has visited and chosen to save. WEB DIRECTORY: A web directory specializes in linking to other web sites. In this process the web directory categorizes those links. The categorization is usually based on the whole web site rather one page or a set of keywords, and sites are often limited to inclusion in only a few categories.
UNIFORM RESOURCE LOCATORS(URLS) The URL specifies the internet address of a file stored on a host computer connected to the Internet. Web browser use the URL to retrieve the file from the host computer and the specific directory in which it resides. The format of the URL is as follows: Protocol://host/path/filename
How Information is Transmitted Sub directory
File name
SEARCH ENGINE: A Web search engine is a search engine designed to search for information on the World Wide Web. Some search engines also mine data available in news books , databases , or open directories. Unlike Web directories, which are maintained by human editors, search engines operate algorithmically or are a mixture of algorithmic and human input. HOW DOES SEARCH ENGINE WORKS? A search engine works , in the following order: Web Crawling. Indexing. Searching.
DEFINITION:
From a communication perspective, e-commerce is the delivery of information, products, services, or payments via telephone lines, networks or any other means. From a business perspective, e-commerce is the application of technology towards the automation of business transactions and workflows. From a service perspective, e-commerce is a tool that addresses the desire of firms, consumers, and management to cut the service costs while improving the quality of goods and increasing the speed of service delivery. From a online perspective, e-commerce provides the capability of buying and selling the products and information on the Internet and other online services.
An Electronic Fund Transfer(EFT) system involves the electronic movement of funds and fund information between financial institutions. There are two major worldwide EFT networks: 1. The Clearing House Interbank Payments System(CHIPs). 2. Fed Wire (the oldest EFT in US). Insurance brokers can send EDI message to the computers of various insurance companies and get details on specific policies.
A VAN is a communication networks that typically exchanges EDI messages among trading partners.
It also provides other services, including holding messages in electronic mailboxes, interfacing with other VANs, and supporting many telecommunication modes and transfer protocols.
A VANs electronic mailbox is a software feature into which a user deposits EDI transactions and then retrieve those messages when convenient.
Business can exchange data either by connecting to each other directly or by hooking into a VAN.
Traditionally, by acting as middlemen between companies, VANs have allowed companies to automatically and securely exchange purchased orders, invoices, and payments.
E-MARKET PLACE:
A market brings together buyers and sellers to facilitate a mutually satisfying transaction. The online markets that satisfy all the stated points fit to be e-markets: Critical mass of buyers and sellers. Interactivity. Negotiation and Bargaining. New products and services. Seamless Interface. Damage control.
PURCHASE ONLINE:
A typical online purchase process will include: 1.Product to sell over the web. 2.Marketing process to invite customers to the E Market. 3.Website for: i. Displaying product and Its information. ii.Accept orders using online registration forms. iii.Facilitate the Cash Transaction using Cash Transaction. iv.Confirm Orders. v.Accept Returns. vi.Personalization & Online Support. vii.Infrastructure. viii.Connectivity. ix.Security. x.Store Data for further processing. xi.Internetworking with. xii.Warehouse and Logistic. xiii.Third Party Payment Processors and Financial Institutions.
Credit Cards Transaction using Third Party Verification Secured Electronic Transaction(SET) Joint Electronic Transaction Electronic Cheques Smart Cards Electronic Purses
TECHNICA L STANDAR DS FOR ELECTONI C DOCUMEN TS, MULTIMED IA AND NETWORK PROTOCOL S
After being acquainted with basic components. lets go through the Revolution of WEB 2.0
Social networks connect people at low cost. This can be beneficial for entrepreneurs and small businesses looking to expand their contact base. The social network sites focuses on building online communities of people who share interests and/or activities.
Wikis:
A wiki is a collection of web pages designed to enable anyone who accesses it to contribute or modify content, using a simplified mark up language.
And 30 percent of all 50 million internet users are blog readers. The blogs are providing the useful information for the users but the blog authors were earning a lot for providing that information for the users. The main source of revenue for the blog authors is from Google Adsense and from other affiliate sources like Widget Bucks etc.. and the also from Sponsorers. In short, a lot of people are reading and writing blogs. Some of the popular blogs like: John Chows blog (earnings $34,350.93/month) (China) Labnols blog (earnings $20,000.84/month) (India) Shoemoneys blog (earnings $132,994.97/month) (US) Gadgetcages blog (earnings $15,000$/month) (India)
The Content of your site must be interesting and worthwhile. The site must be easy to navigate. Optimize Your Graphics.
Conclusion
According to Best, the characteristics of Web 2.0 are: rich user experience, user participation, dynamic content, metadata, web standards and scalability, openness, freedom and collective intelligence by way of user participation. Many latest Technologies like Blogs, Tutorial Websites, Social Network websites, Search Engines, Other Desktop applications like Download toolbars, Google Tools etc came into existence which are having great impact on Mans Web Daily needs. But because of the recent global economical meltdown the Era of Web 2.0 has ended in 2008 giving rise to New Era Web 3.0 which is going to deliver a new generation of business applications that will see business computing.
Adigital signatureordigital signature schemeis a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, and that it was not altered in transit. Digital signatures are commonly used for software distribution, financial transactions, and in other cases
Digital signatures are often used to implementelectronic signature, a broader term that refers to any electronic data that carries the intent of a signature, but not all electronic signatures use digital signatures. Digital signatures employ a type ofasymmetric cryptography. For messages sent through a nonsecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. Digital signatures can also providenon-repudiation, meaning that the signer cannot successfully claim they did not sign a message, while also claiming their private key remains secret; further, some non-repudiation schemes offer a time stamp for the digital signature, so that even if the private key is exposed, the signature is valid nonetheless.
Putting the private key on a smart card All public key / private key cryptosystems depend entirely on keeping the private key secret. A private key can be stored on a user's computer, and protected by a local password, but this has two disadvantages: the user can only sign documents on that particular computer the security of the private key depends entirely on the security of the computer Using smart card readers with a separate keyboard Other smart card designs Using digital signatures only with trusted applications
As organizations move away from paper documents with ink signatures or authenticity stamps, digital signatures can provide added assurances of the evidence to provenance, identity, and status of an electronic document as well as acknowledging informed consent and approval by a signatory. The United States Government Printing Office (GPO) publishes electronic versions of the budget, public and private laws, and congressional bills with digital signatures. Universities including Penn State,University Of Chicago, and
An ink signature can be easily replicated from one document to another by copying the image manually or digitally. Digital signatures cryptographically bind an electronic identity to an electronic document and the digital signature cannot be copied to another document. Paper contracts often have the ink signature block on the last page, and the previous pages may be replaced after a signature is applied. Digital signatures can be applied to an entire document, such that the digital signature on the last page will indicate tampering if any data on any of the pages have been altered.