The Institute of Chartered Accountant of India: Information Technology Training Programme

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 50

The Institute of Chartered Accountant of India

(A statutory Body Established under an Act of NOIDA BRANCH OF ICAI Parliament)

INFORMATION TECHNOLOGY TRAINING PROGRAMME

PERSONEL DETAIL, SAURABH SAMELE CRO-0316709 Batch No: 101 Roll No: 12 Batch: Morning (10 to 2)

PERSONEL DETAIL, SAURABH SAMELE CRO-0316709 Batch No: 101 Roll No: 12 Batch: Morning (10 to 2)

In the choice of this project and its successful culmination, I gratefully acknowledge the invaluable note of concern to our Faculty and specially Thankful to Sir Anoj kumar who besides helping me in theoretical and practical aspects in the ITT Program, also encouraged and guided me along each step throughout this Project. The Project on WEB TECHNOLOGY & DIGITAL SIGNATURE has truly been a great learning experience to me.

Web Technologies are playing the leading role in the World Wide Web includes many latest evolutions in it like Web Services, Web 2.0, Tableless Design, HTML, XHTML, XML, CSS 2.0 etc. Web technology aims to enhance creativity, secure information sharing, collaboration and functionality of the web. Web Technologies have been developing since last 15-20 years and are still . Web 2.0,Web 3.0 are the main revolutionary Technologies of it.

Since WEB is a WIDE concept. So, we ought to be acquainted with basic Components that comprises WEB.

Information including access to the Internet has become the basis for personal, economic, and political advancement. Whether you want to find the latest financial news, browse, through library catalogs, exchange information with colleagues, or join in a lively political debate, the Internet is the tool that will take you beyond telephone, faxes, and isolated computers to a burgeoning networked information frontier. Internet is also defined as Information Superhighway.

The Internet, sometimes called simply the Net , is a worldwide system of computer networks- a network of networks in which users at any one computer can, if they have permission , get information from any other computer.

INTERNET CONNECTION REQUIREMENT

There are basically two ways of getting connected to the Internet.


Dedicated Access
o In case of dedicated access we can access the internet directly. o The computer remains connected to the Internet throughout the day.

Dial up
o The computer can be connected to the Net by dial up access i.e., by means of a modem. o The connection is done using PPP(Point to Point Protocol) or SLIP(Serial Line Internet Protocol).

THE OTHER WAYS OF CONNECTING TO THE NET ARE BULLETIN BORDS, MAIL CALL AND WIRELESS SYSTEM.

COMPUTER HARDWARE: Computer hardware is needed for internet connection. TELEPHONE CONNECTION:
A live telephone connection is also needed for internet connection.

WEB BROWSER:
A web browser is a software application which enables a user to display and interact with text , image , games , videos , music , games and other information typically located on a Web page at a website on the World Wide Web or a local area network. Currently available web browsers are Internet Explorer, Mozilla Firefox, Safari, Netscape, Opera etc.

GRAPHICAL:
Text, images, audio, and video are retrievable through a graphical software program such as Internet Explorer, Firefox, Netscape, Mozilla and Opera.

TEXT:
Text browser provides access to the web in text-only mode. Example of text based web browser is LYNX.

MODEM: A device that connects your computer to the Internet, when you are not connected via a LAN (local area network). Most people connect to a modem when using a home computer. SERVICE PROVIDER: Internet service provider is a business or organization that provides consumers or business access to the Internet and related services.

Some of the Internet service providers are listed below:


VSNL BSNL Sify Reliance Data Infosys HCL Infinet

USE OF INTERNET GENERAL USE


a) Access to vast resource of information. b) Global File Sharing. c) Remote Access. d) VOIP(Voice Over Internet Protocol).

a) b) c) d) e) f) g) h)

SECTOR WISE USE OF INTERNET


Home user. Educational Institute. Government Organization. Commercial Concern. Health Organization. Industry. E-commerce. E-mail etc.

Advantages & Disadvantages Of Internet


ADVANTAGES
COMMUNICATION. INFORMATION. ENTERTAINMENT. SERVICES. E-COMMERCE

DISADVANTAGES
THEFT OF PERSONAL INFORMATION. SPAMMING. VIRUS THREAT. PORNOGRAPHY.

WORLD WIDE WEB(WWW): WWW is a system of distributed servers that handle hypermedia document. Hypermedia authors use Hypertext Markup Language(HTML) to create hypermedia documents. HTML is a method of presenting information in which selected words or phrases in the text are hyperlinks to other, related information. E-MAIL SERVICES: Electronic mail on the Internet provides quick, cost-effective transfer of message to others E-mail users worldwide.
TYPES OF E-MAILs SERVERS:

SMTP POPs IMAP LDAP

GOPHER
1) It is a system that pre-dates the world wide web for organizing and displaying files on Internet servers. 2) A Gopher server presents its contents as a hierarchically structured list of files. 3) Gopher is a distributed documents search and retrieval network protocol designed for the Internet. 4) Its goal is to function as a improved form of Anonymous FTP, enhanced with hyper linking features similar to that of the World Wide Web. 5) Gopher combines document hierarchies with collections of services, including WAIS, the Archie & Veronica search engines, gateways to other information systems such as ftp and Usenet.

FILE TRANSFER PROTOCOL{FTP}:


FTP is a network protocol used to transfer data from one computer to another through a network such as the Internet. FTP is a file transfer protocol for exchanging and manipulating files over a TCP computer network. The typical information needed to connect to an FTP site is: i. The server address or hostname. This is the network address of the computer you wish to connect to, such as ftp.microsoft.com. ii. The username and password. These are the credentials you use to access the specific files on the computer you wish to connect to. The objectives of FTP, as outlined by its RFC, are: i. To promote sharing of files(computer programs and/or data). ii. To encourage indirect or implicit use of remote computers. iii. To shield a user from variations in files storage systems among different hosts. iv. To transfer data reliably, and efficiently. An FTP address looks a lot like an HTTP, or Website, address except it uses the prefix ftp:// instead of http://.

TELNET
a. Telnet(Telecommunication network) is a network protocol used on the Internet or a local area network(LAN). b. Telnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. c. Telnet is a user command and an underlying TCP/IP protocol for accessing remote computers. d. A Telnet command request looks like this (the computer name is made-up): telnet the.libraryat.whtais.edu Telnet is most likely to be used by program developers and anyone who has a need to use specific applications or data located at a particular host computer.

INTERNET RELAY CHAT(IRC)


Internet Relay Chat (IRC) is a service through which participants can communication to each other on hundreds of channels. To access IRC, you must use an IRC software program. A variation of chat is the phenomenon of instant messaging. With instant messaging, a user on the web can contact another user currently logged in and type a conversation. Most famous is AMERICA ONLINES INSTANT MESSANGER.

ADVANCED FEATURES OF IRC:

1. As far as service are concerned, network-operated bots have been introduced to facilitate registration of nicknames and channels along with sending messages for offline users with network operator function. 2. Extra modes have been implemented i.e., the original IRC system used a set of standard user and channel modes, new servers add many new modes for such features as removing color codes from text, or obscuring a users host mask to protect from denial of service attacks. 3. Proxy detection is in place wherein most modern servers support detection of users attempting to connect through an insecure proxy server, which can then be denied a connection. 4. There is introduction of additional commands in form of shorthand

USENET NEWSGROUP:
I. Usenet News is a global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. II. Usenet itself is a set of machines that exchange messages, or articles, from Usenet discussion forums, called newsgroups. III. The major difference between Usenet News and e-mail discussion groups is the fact that Usenet messages are stored on central computers, and users must connect to these computers to read or download the messages posted to these groups. IV. Newsgroups servers are hosted by various organization and institutions. V. Most of the Internet service providers host their own news servers, or rent access to one , for their subscribers. VI. Every host of a news server maintains agreements with other news servers to regularly synchronize. VII. Newsgroups are often arranged into hierarchies, theoretically making it simpler to find related groups.

Analog/Dial-up Connection ISDN connection B-ISDN Connection DSL Connection ADSL Connection SDSL Connection VDSL Connection Cable Connection T-1 Lines Connection Bonded T-1 Connection T-3 Lines Connection Satellite Connection

The world wide web is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. The initial purpose of the Web was to use networked hypertext to facilitate communication among its members, who were located in several countries. In addition to hypertext, the Web began to incorporate graphics , video, and sound. Almost every protocol type available on the Internet is accessible on the Web. Internet protocol s are sets of rules that allows for inter machine communication on the Internet. FOLLOWING IS A SAMPLE OF MAJOR PROTOCOLS ACCESSIBLE ON THE WEB E-mail (Simple Mail Transport Protocol or SMTP) Usenet( Network News Transfer Protocol or NNTP) HTTP(Hypertext Transfer Protocol)

Hypertext is a document containing words that connect to other documents . These words are called links and are selected by the users. A single hypertext document can contain links to many documents. Producing hypertext for the Web is accomplished by creating documents with a language called Hypertext Markup language, or HTML. Hypermedia is a term used for hypertext which is not constrained to be text. For example, it can include graphics, video and sound.

A web page is a resource of information that is suitable for the World Wide Web and can be accessed through a web browser. This information is usually in HTML or XHTML format, and may provide navigation to other web pages via hypertext links. Web Pages may consist of files of static text stored within the web servers file system(static web pages), or the web server may construct the(X)HTML for each web page when it is requested by a browser(dynamic web pages).

WEB SITE: A website is a collection of web pages, images, videos or other digital assets that is hosted on one or more web servers, usually accessible via the Internet. BOOKMARKS: Internet bookmarks are stored Web page location(URLs) that can be retrieved. The primary purpose of any bookmark is to easily catalogue and access web pages that a user has visited and chosen to save. WEB DIRECTORY: A web directory specializes in linking to other web sites. In this process the web directory categorizes those links. The categorization is usually based on the whole web site rather one page or a set of keywords, and sites are often limited to inclusion in only a few categories.

UNIFORM RESOURCE LOCATORS(URLS) The URL specifies the internet address of a file stored on a host computer connected to the Internet. Web browser use the URL to retrieve the file from the host computer and the specific directory in which it resides. The format of the URL is as follows: Protocol://host/path/filename
How Information is Transmitted Sub directory

http://www.cdc.gov/nip/child.htm Name of host computer

File name

SEARCH ENGINE: A Web search engine is a search engine designed to search for information on the World Wide Web. Some search engines also mine data available in news books , databases , or open directories. Unlike Web directories, which are maintained by human editors, search engines operate algorithmically or are a mixture of algorithmic and human input. HOW DOES SEARCH ENGINE WORKS? A search engine works , in the following order: Web Crawling. Indexing. Searching.

DEFINITION:
From a communication perspective, e-commerce is the delivery of information, products, services, or payments via telephone lines, networks or any other means. From a business perspective, e-commerce is the application of technology towards the automation of business transactions and workflows. From a service perspective, e-commerce is a tool that addresses the desire of firms, consumers, and management to cut the service costs while improving the quality of goods and increasing the speed of service delivery. From a online perspective, e-commerce provides the capability of buying and selling the products and information on the Internet and other online services.

ELECTRONIC DATA INTERCHANGE (EDI):


In a business organization where hundreds and thousands of standard forms, are received and responded to, knows how difficult it is to manage this task. The solution to this problem comes in the form of Electronic Data Interchange(EDI). EDI is defined as The transfer of structured data for processing from computer using agreed formats and protocols. THE TWO KEY ASPECTS OF EDI : 1.The information transmitted is directly used by the recipient computer without the need for human being. 2.It is rarely mentioned but often assumed that EDI refers to interchange between businesses.

An Electronic Fund Transfer(EFT) system involves the electronic movement of funds and fund information between financial institutions. There are two major worldwide EFT networks: 1. The Clearing House Interbank Payments System(CHIPs). 2. Fed Wire (the oldest EFT in US). Insurance brokers can send EDI message to the computers of various insurance companies and get details on specific policies.

A VAN is a communication networks that typically exchanges EDI messages among trading partners.

It also provides other services, including holding messages in electronic mailboxes, interfacing with other VANs, and supporting many telecommunication modes and transfer protocols.

A VANs electronic mailbox is a software feature into which a user deposits EDI transactions and then retrieve those messages when convenient.

Business can exchange data either by connecting to each other directly or by hooking into a VAN.

Traditionally, by acting as middlemen between companies, VANs have allowed companies to automatically and securely exchange purchased orders, invoices, and payments.

E-MARKET PLACE:
A market brings together buyers and sellers to facilitate a mutually satisfying transaction. The online markets that satisfy all the stated points fit to be e-markets: Critical mass of buyers and sellers. Interactivity. Negotiation and Bargaining. New products and services. Seamless Interface. Damage control.

ADVERTISING AND ONLINE MARKETING:


In a typical E Market place, online marketing is the process of reaching the target segments through paperless communication. This can be done by: Banner Ads and Banner Advertising Exchange Sites. Newsletters. Hyper Links and Logos. Chain letters. Search Listing.

PURCHASE ONLINE:
A typical online purchase process will include: 1.Product to sell over the web. 2.Marketing process to invite customers to the E Market. 3.Website for: i. Displaying product and Its information. ii.Accept orders using online registration forms. iii.Facilitate the Cash Transaction using Cash Transaction. iv.Confirm Orders. v.Accept Returns. vi.Personalization & Online Support. vii.Infrastructure. viii.Connectivity. ix.Security. x.Store Data for further processing. xi.Internetworking with. xii.Warehouse and Logistic. xiii.Third Party Payment Processors and Financial Institutions.

Electronic payment systems:


In everyday life, you pay for goods and services in a number of different ways by cash, check , credit cards, or debit cards. Business can often conduct transactions among themselves electronically, but they usually use private networks. Now with the increasing commercialization of the Internet, and the popularity of the Web, Consumers and Businesses are both looking for ways to conduct business over the Internet.

Types of Electronic Payments:


1. 2. 3. 4. 5. 6. 7.

Credit Cards Transaction using Third Party Verification Secured Electronic Transaction(SET) Joint Electronic Transaction Electronic Cheques Smart Cards Electronic Purses

FRAMEWORK FOR E-COMMERCE MARKET PLACE:


ELECTRONIC COMMERCE APPLICATION Supply chain management Video on-demand Remote banking Procurement and purchasing On-line marketing and advertising HomeCOMMON BUSINESS SERVICE shopping
INFRASTRUCTURE, (SECURITY/AUTHENTICATION, ELECTRONIC PAYMENT DIRECTORIES/ CATALOGS). THE MESSAGE AND INFORMATION DISTRIBUTION INFRASTUCTURE. MULTIMEDIA CONTEXT AND NETWORKS PUBLISHING INFRASTRUCTURE. THE INFORMATION SUPERHIGHWAYS INFRASTUCTURE (TELECOM, CABLE TV, WIRELESS, INTERNET.

PUBLIC POLICY LEGAL & PRIVACY ISSUES

TECHNICA L STANDAR DS FOR ELECTONI C DOCUMEN TS, MULTIMED IA AND NETWORK PROTOCOL S

After being acquainted with basic components. lets go through the Revolution of WEB 2.0

Wide Spread of Web 2.0


Web 2.0 is the business revolution in the computer industry caused by the move to the Internet as a platform, and an attempt to understand the rules for success on that new platform. Web 2.0 concepts have led to the development and evolution of web culture communities and hosted services, such as social-networking sites, video sharing sites, wikis, blogs, and folksonomies. Web 2.0 sites often feature a rich, user friendly interface based on Ajax, Open Laszlo, Flex or similar rich media.

Social Networking Websites:

Web 2.0s latest technology amendments

Social networks connect people at low cost. This can be beneficial for entrepreneurs and small businesses looking to expand their contact base. The social network sites focuses on building online communities of people who share interests and/or activities.

Video Sharing Websites:


Video sharing refers to websites or software where users can distribute their video clips. Some services may charge, but the bulk of them offer free services.

Wikis:
A wiki is a collection of web pages designed to enable anyone who accesses it to contribute or modify content, using a simplified mark up language.

Importance of Blogs in Web 2.0


A Blog is a contraction of the term Web Log. A blog can also be understood as the Web personal Diary. There are many different types of blogs, differing not only in the type of content, but also in the way that content is delivered or written: Personal Blogs Technology Blogs Corporate Blogs News Blogs Healthcare Blogs Fashion Blogs Blogging is the latest innovation to take the web by storm. According to blog tracking firm Technorati, there are currently 14 million blogs with 80,000 more being added every day.

And 30 percent of all 50 million internet users are blog readers. The blogs are providing the useful information for the users but the blog authors were earning a lot for providing that information for the users. The main source of revenue for the blog authors is from Google Adsense and from other affiliate sources like Widget Bucks etc.. and the also from Sponsorers. In short, a lot of people are reading and writing blogs. Some of the popular blogs like: John Chows blog (earnings $34,350.93/month) (China) Labnols blog (earnings $20,000.84/month) (India) Shoemoneys blog (earnings $132,994.97/month) (US) Gadgetcages blog (earnings $15,000$/month) (India)

Features of Web 2.0


Web 2.0 websites typically include some of the following features/techniques. 1. Searching. 2. Linking. 3. Authoring. 4. Taging. 5. Signals. 6. Higher Education. 7. Also for Government Officials. Rules to be followed in creating a Website:
1. 2. 3.

The Content of your site must be interesting and worthwhile. The site must be easy to navigate. Optimize Your Graphics.

Criticism of Web 2.0


Argument that Web 2.0 is not a new version of Web technology, it is simply inherited the concepts of Web 1.0 which are displayed by modifying them. Many of the ideas of Web 2.0 had already been featured in implementations on networked systems well before the term "Web 2.0" emerged. Web 2.0 sites with information-storage, creation, and dissemination challenges and capabilities that go beyond what the public formerly expected in the environment of the so-called "Web 1.0".

End of Great Era


At the mid 90s the users while browsing of the websites (or) sending the mails, has to follow a massive process in Web 1.0. But after the evolution of Web 2.0 in 2004 the browsing, Sending mails, Sharing ideas, videos and pictures, Searching, Navigation and other Web applications have became user friendly and also even much faster than ever. New startups cant stand out from the crowd, and existing web 2.0 startups are running out of money and folding. Web 3.0 is one of the terms used to describe the evolutionary stage of the Web that follows Web 2.0. Web 3.0 is highly speculative. 1. Web 1.0 was dial-up 50K average bandwidth 2. Web 2.0 is an average 1 megabit of bandwidth 3. Web 3.0 will be 10 megabits of bandwidth all the time, which will be the full video Web, and that will feel like Web 3.0 As the Technology is growing day by day, it is not surprising

Conclusion
According to Best, the characteristics of Web 2.0 are: rich user experience, user participation, dynamic content, metadata, web standards and scalability, openness, freedom and collective intelligence by way of user participation. Many latest Technologies like Blogs, Tutorial Websites, Social Network websites, Search Engines, Other Desktop applications like Download toolbars, Google Tools etc came into existence which are having great impact on Mans Web Daily needs. But because of the recent global economical meltdown the Era of Web 2.0 has ended in 2008 giving rise to New Era Web 3.0 which is going to deliver a new generation of business applications that will see business computing.

Adigital signatureordigital signature schemeis a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, and that it was not altered in transit. Digital signatures are commonly used for software distribution, financial transactions, and in other cases

Digital signatures are often used to implementelectronic signature, a broader term that refers to any electronic data that carries the intent of a signature, but not all electronic signatures use digital signatures. Digital signatures employ a type ofasymmetric cryptography. For messages sent through a nonsecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. Digital signatures can also providenon-repudiation, meaning that the signer cannot successfully claim they did not sign a message, while also claiming their private key remains secret; further, some non-repudiation schemes offer a time stamp for the digital signature, so that even if the private key is exposed, the signature is valid nonetheless.

Putting the private key on a smart card All public key / private key cryptosystems depend entirely on keeping the private key secret. A private key can be stored on a user's computer, and protected by a local password, but this has two disadvantages: the user can only sign documents on that particular computer the security of the private key depends entirely on the security of the computer Using smart card readers with a separate keyboard Other smart card designs Using digital signatures only with trusted applications

As organizations move away from paper documents with ink signatures or authenticity stamps, digital signatures can provide added assurances of the evidence to provenance, identity, and status of an electronic document as well as acknowledging informed consent and approval by a signatory. The United States Government Printing Office (GPO) publishes electronic versions of the budget, public and private laws, and congressional bills with digital signatures. Universities including Penn State,University Of Chicago, and

An ink signature can be easily replicated from one document to another by copying the image manually or digitally. Digital signatures cryptographically bind an electronic identity to an electronic document and the digital signature cannot be copied to another document. Paper contracts often have the ink signature block on the last page, and the previous pages may be replaced after a signature is applied. Digital signatures can be applied to an entire document, such that the digital signature on the last page will indicate tampering if any data on any of the pages have been altered.

You might also like