0% found this document useful (0 votes)
43 views79 pages

Aaaa Internet Services CH 2 Final 10d

The document discusses various internet and web services such as email, video conferencing, chatting, accessing information from websites and search engines, finding people online using directories, downloading and uploading files using FTP, and securing connections and file transfers using protocols like SSH, SCP, and Telnet. It provides information on how these services work, examples of popular websites and search engines, and tips for effective searching. The document is intended to educate students on the basic functions and uses of the internet and web.

Uploaded by

Shivanshi Pandey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views79 pages

Aaaa Internet Services CH 2 Final 10d

The document discusses various internet and web services such as email, video conferencing, chatting, accessing information from websites and search engines, finding people online using directories, downloading and uploading files using FTP, and securing connections and file transfers using protocols like SSH, SCP, and Telnet. It provides information on how these services work, examples of popular websites and search engines, and tips for effective searching. The document is intended to educate students on the basic functions and uses of the internet and web.

Uploaded by

Shivanshi Pandey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 79

INTERNET AND WEB SERVICES

INTERNET
SERVICES
1
A Slide show for students of class 10
Presentation by
Mrs. Rajiv Kathuria
& Debasmita Ghose
Class: 10 A (2010-2011)
Notre Dame Academy
Patna.

2
Do you know what people really do
on the internet?
They
E-mail
Video conference
Chat
Join News groups
Retrieve data files
&
Access all sorts of information.
3
INFORMATION RETRIEVAL

• A browser is a program that lets us visit different websites on

the net and display their offering on the computer.

• The browser fetches the ‘home page’ of the website visited by it.

This site address is specified in the address bar of the browser.

• Exploring the web is known as net surfing.

• Making a copy of the requested web page or file or document

on the local computer is called downloading. 4


SOME POPULAR WEBSITES
• www.bbc.co.uk/education/levels/24kw2hv
• www.codecademy.com
• thimble.mozilla.org/
• http://www.discovery.com
• htttp://www.nationalgeographic.com/kids
• www.netscape.com
• www.Britannica.com
• www.crayola.com
• www.funbrain.com
• www.discovery.com
• www.nationalgeographic.com/kids/
5
SEARCH ENGINES

A search engine is a program that searches


through a database of web pages for a
parti cular informati on.

Examples:
www.yahoo.com
www.google.com
6
FINDING INFORMATION USING A SEARCH
ENGINES
To search information on search engine

1.Go to home page of the search engine.

2.Type the information to search for.

3.Click on search button next to it.

With a few seconds the websites and links


to the desired information is displayed. 7
SOME SEARCH ENGINES
SEARCH ENGINE URL
Bing http://www.bing.com/
Google http://www.google.com/
Yahoo! search http://www.search.yahoo.com/
Ask http://www.ask.com/
AOL http://www.search.aol.com/
Wow http://www.wow.com/
All the Web http://www.alltheweb.com/
Yahoo! http://www.yahoo.com/

8
WORKING OF A SEARCH ENGINE
The search engine works with the help of three elements on
web after keywords to search are typed in…….

• SPIDERS/WEBCRAWLER/BOTS/AGENTS/ROBOTS – The search engines use


this software which comb the internet looking for documents and web
addresses according to the search keyword. They perform methodical
searches.
• Spiders and webcrawlers did methodical search while bots and spiders are
given direction by search engine to crawl from one server to another
compiling a huge list of URLs given by search engine.
• INDEXING SOFTWARE AND DATABASE – The inder exing software extracts
information from the documents and web addresses, prepares an index of it
and stores it in its database.

• SEARCH ALGORITHM – When a search keyword is


entered, the search engine software searches its
database where the indexing s/w stores it’s entries,
based on a search method called SEARCH
ALGORITHM .
9
WORKING DIAGRAM OF A SEARCH ENGINE

10
WORKING OF SEARCH ENGINES

11
SOME SEARCHING TIPS
1. Questi ons should not be asked.

2. Queries should be surrounded by quotes or some punctuati on


marks (; -) in order to show that the query is a single phrase.
e.g. foundati on; of ; informati on ; technology
e.g. foundati on- of - informati on - technology
3. Use Wildcard (*) for patt ern matching.
e.g. web* could fi nd results like webpage, web portal, website etc.

4. Lowercase should be used as lowercase words are not case


sensiti ve. E.g. searching program can match for program, Program,
PROgram, PROGRAM etc. while uppercase words are case
sensiti ve.

5. (+) sign should be used for words that must be included.


e.g. patna+ india

6. (-) sign should be used for words that should be excluded.


e.g. name countries + asia – china 12
FINDING PEOPLE ON NET
1. Search engines dedicated to find Popular online e-mail & phone
information about people and directories
places. ☻ www.addresses.com
e.g. person’s mail id, phone no. ☻www.addresssearch.com
street address . ☻www.peakyou.com
People Search utility of Yahoo ☻www.pipl.com
allows us to locate information in ☻www.123people.com
the following simple steps. ☻www.worldpages.com
a) Log on to people.yahoo.com .
b) On people search page type in first
name & last name of the person
whose e-mail id you wish to locate.
c) Click search button and the search
engine searches the information
and displays it on the screen.

13
FTPing
• FTP refers to File Transfer Protocol which defi nes the method for
transferring fi les from one computer to another over a network that
supports TCP/IP protocol(such as internet and intranet).

• FTP server and FTP client computers are involved in FTP transfer.
• A computer that stores fi les for transfer using FTP is called FTP
server or FTP site.It runs FTP server soft ware. It listens on the
network for connecti on requests from other computers.
• The FTP client computer runs FTP client soft ware and initi ates a
connecti on to the server. Once connected, the customer can do a
number of fi le manipulati ons like uploading, downloading, deleti ng,
renaming and editi ng of fi les.
• Virtually all computer platf orms support TCP/IP.
• Examples of FTP client and server soft wares are stated on page 36.
• Examples of some FTP addresses are given on page 37.

14
FTP server : Requirements for
DOWNLOADING and UPLOADING

1. To download a file one need not seek permission. The


user name for downloading is anonymous and the
password is user’s e-mail id.

2. To upload any file/s from user’s computer, the user needs


appropriate permission to the remote computer. One
needs to have a private account with valid LOGIN name
and PASSWORD.
3. Many UNIX servers use a directory called /incoming that is
intended to be a repository of files from people on the
outside. Anybody can dump any file/s into an /incoming
directory. 15
WORKING OF FTP
Install the required software for FTP access and then connect
your computer to FTP server using the following steps:

• Open Windows explorer or file explorer.

• In the address bar of explorer window, type in ftp:// followed by


address of the FTP server to which we wish to connect.

• Windows/file explorer now connects us to FTP server. If the


connection is established without any problem then we can see all
the folders in the server as if they were the files of our computer.

• We can now carry out the job of uploading and downloading a file
or files.
• WHAT DOES UPLOADING A FILE REQUIRE…….
A copy of the fi le to be uploaded in your
Computer.
AND DOWNLOADING will allow you to make a copy
of the web fi le in your computer.
REMOTE LOGIN AND FILE TRANSFER PROTOCOL
includes SFTP, SSH, SCP and TELNET

Telnet is a network protocol used to virtually access a computer and to provide


a two-way, collaborative and text-based communication channel between two
machines. It follows a user command Transmission Control Protocol/Internet
Protocol (TCP/IP) networking protocol for creating remote sessions.
HOW TELNET WORKS
1. The user connects to the server by using the Telnet protocoI(TCP/IP) over the
internet.
2. Once connection established, the client computer becomes the virtual
terminal allowing communication between client and server computers.
3. The user then executes commands on the server by using specific Telnet
commands into the Telnet prompt.
4. To end a session and log off, the user ends a Telnet command with Telnet.

17
TCP- Transmission Control Protocol

IP- Internet Protocol


18
SECURE SHELL
SSH, also known as Secure Shell or Secure Socket Shell, is a network
protocol that gives users, particularly system administrators, a secure way to
access a computer over an unsecured network. SSH also refers to the suite
of utilities that implement the SSH protocol.
SSH refers to the suite of utilities that implement the SSH protocol. Secure
Shell provides strong password authentication and public key authentication,
as well as encrypted data communications between two computers
connecting over an open network, such as the internet. (SIGNIFICANCE)

In addition to providing strong encryption, SSH is widely used by network


administrators to manage systems and applications remotely, enabling them
to log in to another computer over a network, execute commands and move
files from one computer to another.

Public Key Authentication is a secure logging method using SSH. Instead of a


password, the procedure uses a cryptographic key pair for validation.
Although using a strong password helps prevent brute force attacks, public
key authentication provides cryptographic strength and automated
passwordless logins.
19
Secure Copy Protocol (SCP)
Secure Copy Protocol (SCP) is a means of securely
transferring computer files between a local host and
a remote host or between two remote hosts. It is
based on the Secure Shell (SSH) protocol. "SCP"
commonly refers to both the Secure Copy Protocol
and the program itself.

According to Open SSH developers in April 2019, SCP is


outdated, inflexible and not readily fixed; they recommend
the use of more modern protocols like SFTP for file transfer.

20
SFTP (Secure File Transfer Protocol) is the advanced version
of FTP(file transfer protocol) which ensures security while
transferring files between the organizations/computer. It is
also known as SSH(Secure Shell). It works on port no. 22 and
uses the client-server model.

Features of SFTP :
It encrypts the data.
It executes the command.
It secures and compresses the data for transmission.
It provides authentication to username and password.
It improves uploading and downloading files functionality.
It also provides authentication to the public key.

21
Web Services of Internet

Web services are the software based


services that take place when two electronic
devices connected via network,
communicate over WWW’s HTTP protocol.

22
• …….is a web service.

• Online textual talk is called Chatti ng.

• Chat room is a group of approachable chat users.

• We need to log on to www.chatweb.com and get ourselves

registered. The General Chat allows us to carry on text-phone.

• Sending message and discussion in a group i.e. chat room is also

possible through web chat.

23
COMMONLY USED TYPES OF CHAT
• IM- full form INSTANT MESSAGING Creates a private chat
connection with another individual in order to communicate
in real time over the internet.
• ICQ- I seek you…..offers chatting via ICQ software, is a
conferencing tool over internet…….to allow along with
chatting the job of e-mailing, perform file transfer, play
computer games etc.
• IRC- Internet Relay Chat is not owned by any company. IRC
has many networks that are completely separate from one
another. To use IRC, we need IRC client program installed
on our computer and connected to IRC server via this
program.
• Web based chat is like IRC but with a difference, where we
do not need to install any client program. Here Chatting can
be done on a specific website. Eg Yahoo Chat. 24
ELECTRONIC MAIL
• E-mail stands for Electronic Mail. It is the most widely
used tool to send messages electronically on a network.
• E-mails are sent and received by mail servers – i.e.
computers dedicated to processing and directi ng e-mails.

• Once a server receives a message , it directs it to the destination computer.


To send e-mails the procedure is reversed.
• This method of transfer of information is inexpensive and convenient that
has dramatically affected the scientific, business and personal 25
communications.
e-mail Primer
Before sending and receiving e-mails
we need to create an e-mail account.

E-mail account can be:

1.Web based that is free of cost.

2. On our ISP server, which is a paid


account..
26
ADVANTAGES AND LIMITS OF
E-MAIL
ADVANTAGES LIMITATIONS
• Low cost. • Impermanent.
• Quick. • Hasty medium than
• Reduces Waste. writing letters.
• Easy to use. • Hardware requirement.
• Easy to maintain records. • Hard to convey emotions.
• Patient unlike a phone call.

27
E- MAIL ADDRESS

• E-mail address take the form:

username@domainname

• The username is the user’s net name that cannot have blank

spaces.

• The domain / net server /e-mail server name that hosts the e-mail.

Eg: [email protected]
28
E-MAIL ACCOUNT
Can be provided by Internet service provider that is a paid
account.

• A web-based e-mail account is free while an


account on the ISP server is paid.
• Inbox is the folder which stores the received
29
mails.
CREATING a web based
e-mail ACCOUNT
STEP-1 Get connected to internet.
STEP-2 Log on to site.
e.g. http://www.gmail.com
STEP-3 A screen for signing up appears
where we sign up.
STEP-4 Fill up the member registration
form.
STEP-5 Click on I accept. Create my
account button.
Now your e-mail account is ready to be
used.
30
Most common e-mail clients software
used for sending and receiving e-mails in
linux are:
Mozilla Thunderbird- cross platform client
software by Mozilla foundation.

Postbox Express- provides more facilities than


THUNDERBIRD.

eM- client and server platform for messaging, VoIP , online


document offering in a rich browser based interface.

some more examples on page 40


31
STRUCTURE OF AN E-MAIL
MESSAGE
e-mail id of the recipient
e-mail ids of carbon
copies recipients title of the e-mail message

name of the file attached

text of the message


(message body) being
sent

PICTORIAL FORM
32
STRUCTURE OF AN E-MAIL
MESSAGE

 FROM
 TO
 CC
 BCC
 SUBJECT
 BODY
 ATTACHMENTS
 DATE
 MESSAGE ID is a unique id which is not shown….. used to
track replies to the e-mails

33
Viewing received e-mails

• You need to open the site that


hosts your e-mail account.
• Enter e-mail user name (your e-mail
id and correct password to log in.
• Check the received mails thru
INBOX of your account.
• Click on the subject detail of the
message received, to open it. 34
Replying & Forwarding e-mails.
REPLYING….TO becomes FROM and
FROM becomes TO

FORWARD button, Receiver


becomes the sender and manyw
receivers email are put in TO box

35
Sending e-mails

1. Log in to your email account.


2. Compose mail or new mail button.
3. Create mail content…..fill essential details like TO, CC,
Bcc, Subject, Attachments….etc.
4. Once done, click on send button.
36
E-MAIL FORMAT TYPES

PLAIN TEXT FORMAT (.txt) RICH TEXT FORMAT (.rtf )

• Cannot be read by every


• Can be read by anyone type of e-mail
regardless of the e-mail applicati ons.
applicati on they use.
• Many text formatti ng
• No text-formatti ng opti ons.
opti ons.
• Pictures or graphics can
• Can have pictures or be inserted.
graphics att ached, but
37
not inset.
Some Notes….
Difference between CC and BCC Difference between Junk mail and
Spam
• CC is Carbon Copy…. • Junk mail is unwanted
• Email address is visible to advertising or promotional
other receivers of the mail material received through
WHILE mail, from opt in services….eg.
• Bcc is Blind Carbon Copy…. from Business House.
• Email address is not visible • Send People Alota Mail is sent
to each other, in fact the in large number with an
recipients are not visible to expectation that a few would
each other. see it….where people do not
opt for the services.

38
EMOTICONS (SMILEYS)
Emoti cons or smileys are the symbols used to convey
emoti ons or to convey facial expressions.
:) A smile
;) A wink
:-< Really sad
>:-( Annoyed
:-0 Shouting
:-D Laughing
X-( Dead
0:-) An angel
<g> Grin
:-) Smiley with a nose
:( Frown
@>--,--’ a rose
1-1 asleep
:-> Devious smile
:-| Grim
:-p Stick out tongue
:-( Crying 39
Some protocols used in emails…..
Protocol means….

To deal with your mail you must


1. Use a mail client to access your mail
server.
2. Exchange of information between mail
server and mail client is possible through a
variety of protocols.
3. For accessing emails, the following
protocols can be used….
IMAP Protocol, POP3 Protocol, SMTP
Protocol, HTTP Protocol.
40
Full form: Internet Message Access Protocol.
Client/server protocol….. is a standard protocol for
accessing e-mail from local server.
Here the e-mail is received and held by the server till the
user accesses it, that is when requested by the user to
read the mail.
It works well with even slow data connections, since it
requires only a small data transfer.
Manipulation of mails on the server like deleting mails,
creating folders and storing mails in those folders are
allowed.

41
POST OFFICE PROTOCOL 3
POP3 provides simple, standardized way for
users to access mailboxes and
download messages in their computers.
Here all the messages get downloaded from the mail server to
the user’s local computer.
The user can choose to leave copies of his/her mails on the
server as well.
The advantage is that once the mails are
downloaded, the user can cut the internet
connection and read the mails and leisure
without incurring further communication
costs.
Disadvantage: bulk transfer of mails can
include spam and virus as attachments. 42
SMTP is used for only sending mails and not
receiving mails.
This protocol is used by Mail Transfer
Agent(MTA) to deliver the sent mail to the
recipient's mail server.
Depending upon the network/isp settings, user
may only be able to use the SMTP
under certain conditions.

43
Although this protocol is not dedicated to e-mail
communication, it can still be used for accessing
mailbox.
Also called web based protocol, can be used to
compose and retrieve mails from a web based e-
mail account.
Eg: gmail, yahoomail, hotmail.

44
Email etiquettes…..
Whether for business or personal mails, we
must follow the basics of email etiquettes.
1. Be concise and to the point.
2. Use proper spelling , grammar and
punctuations.
3. Use proper structure and layout.
4. Do not write in CAPITAL letters.
5. Add an email disclaimer.
6. Handle emoticons and abbreviations with
care……restrict to personal mails.
7. Write gender neutral mails.
45
Difference between Spam and
Junk mail.
Spam is irrelevant or inappropriate messages sent
on internet to a large number of people.
Send People Alotta Mail, was sent by spammers to
hundreds, thousands or even millions of people
with a hope that at least a few people will respond.
Spam filters save us from SPAM.

Junk mail is unwanted or unsolicited advertising or


promotional material received through e-mail with
opt in service.
46
Some Acronyms used in e-mails & Chatting

AAMOF as a matter of fact DL download


BBS Bulletin Board System UL upload
BRB Be right back FTF face to face
CUL see you later lCU see you
FAQ frequently asked questions OIC oh, I see
FYI for your information IAC in any case
HHOJ ha ha only joking IOW in other words
HHOS ha ha only serious IMO in my opinion
IAE in any event LSR later
LOL laughing out loud IOW in other words
LTNS long time no see TIA thanks in advance
ASL age/sex/location WB welcome back.
BBL be better later BTW by the way
LTNT long time no type

47
VIDEO CONFERENCING
Two way videophone conversati on among multi ple
parti cipants is called video conferencing.

SYSTEM REQUIREMENTS
 multi media PC
 video compression hardware
 camera
 access to internet over ordinary telephone line
 videophone

Some video conferencing soft wares are: ooVoo,


Adobe acrobat connect, AT&T Connect, Skype.

48
Areas of VIDEO CONFERENCING applications
• Business and Business Learning.
• Distance Learning.
• Telecommunication with clients and Media.
• Legal environment.
• Telemedicine.

• ADVANTAGES: Saves travel cost and time, Connects people across


the globe…hold meetings, can see people when we talk.. Hence
understand their body language, Can view documents on the screen
at the same time work on ideas and knowledge, Keep within touch
With friends and family.
DISADVANTAGES: Additional cost of hardware and software,
reliable and fast link needed for video conferencing, slight delay in
between responses, if the hardware malfunctions for any one
participants then the conference is interrupted, people of different time
zones connect at same time, full view not possible of the participant or
his/her surroundings.
49
E-LEARNING
E- learning refers to learning that takes place in an
electronically sti mulated environment.

Benefi ts of E-learning
• Reduced overall cost/less expensive
• self-paced & self directed
• fast
• consistent
• Flexible i.e. any locati on and
any ti me
• updated easily and quickly
• increased retenti on
• easily managed
50
Application areas of e-learning
In Formal Set-up
1. e-learning courseware
2. e-classroom
3. Assessments
4. e-simulation
Application in
Non- formal Setup…
1. Games based behavioral development..
2. Learning support.
3. Social/ Collaborate learning.
4. MOOC( Massive Open Online Course.)
Some e-learning software…..moodle, olat, eFront. 51
E-BANKING
• Availing the banking services through electronic measures via internet
is called e-banking .This umbrellas PC banking, online banking, virtual
banking, phone banking etc.
• PC banking is a form of online banking that enables customers to
execute bank transactions from a PC via a modem. eg. BOI
• Internet banking (online banking) uses internet as a delivery channel
to conduct banking activity. eg ICICI, HSBC

ADVANTAGES
 round the clock services
 worldwide connectivity
 easy access to transactions
 direct customer control of funds
52
E-SHOPPING
• The process of shopping done over the internet is
e-shopping or online shopping.
• Both products and services can be purchased
through online shopping.
• Sites available for e-shopping:
amazon.in, fl ipcart, snapdeal,

myntra.,jabong etc.

53
PROS AND CONS OF E-
SHOPPING
ADVANTAGES DISADVANTAGES
• Convenient • Physical contact with the
• Accessible in every part of products not possible
the world • Delivery on the same date
not possible
• Security in terms of credit
card information( can be
compromised )
• No quality checks
• Imperfect measurements

54
Threats and Security concerns….. e-shopping
THREATS SECURITY CONCERNS:
The cyber criminal……..
• Gaining access to sensitive • Tricks the shopper to give sensitive
data like user-id, passwords, information & then misuse the
card numbers. information to his benefits.
• Use virus to corrupt system. • Snoops the shopper’s computer,
• Spamming. who is unaware of security
• Misuse the information about features of one’s system for online
shopping.
your shopping habits thru
shopping history. • Sniffs the data exchange and hence
collects sensitive information for
• Get access to your location
his benefit.
details.
• Guesses passwords manually or in
automated form.
• Phishing….. 55
E-RESERVATION
Making reservati ons of ti ckets or hotel rooms or tourist
packages etc through internet is called e-Reservati on.

56
Benefits & Application areas of
e-reservation
Benefits Application areas
• Safety. • Travel tickets.
• Ease. • Hotel Rooms.
• Available anywhere. • Sports matches.
• Fast. • Movies and
Theater.
• Events.
57
E-reservation process
Requirements: Steps:
• Log on to the site that provides e-
• Access to internet. booking.
• Online payment facility in • Provide details…. Date/time/seating
form of debit card, credit type etc.
card or net banking. • Make choice from the ones given by
the website.
• Confirm by submitting
details….these details get recorded
in several computer databases and
reservation is confirmed.
• Make payment and get the e-ticket
on screen or a print out.
58
Live and Non-Live Reservations
LIVE e-RESERVATION NON-LIVE e-reservation
• Reservations are confirmed • Cannot be confirmed
on the spot….. instantly.
As all the reservations are • The website is the liaise(link)
streamlined to that of the between the user and the
actual place. reservation place. Hence the
• At the same time more confirmation is nor=t done
information is provided by instantly, but it takes time
the website, concerning and the user is informed
location, operating hours later.
etc.

59
• An e-group refers to an online community where
people discuss on topics of common interests.

• A message posted on an e-group is called a post.

• All the posts are listed together on a discussion


board which are viewable to all members of the
group.

• An e-group is another name for online clubbing.

• 100MB space is off ered by Google for fi les to be


uploaded by each group member. 60
Benefits of e-Groups
• Helps the member keep in touch with other
members of e-group.
• Each group has it’s own e-mail address, message
box,calender, photo albums etc. for exchanging
information, sharing and planning on a private e-
group.
• Is a great venue to make new friends as e-groups
can be public. One can opt to make a fan club too.
• One can build a community without any technical
hassle as the process to create and maintain the
group is very simple. 61
SOCIAL NETWORKING
Social Networking is the grouping of individuals into specific
groups via online means through social sites.
These include blogs, microblogs, forums, message
boards,wikis,chat-rooms etc.

ADVANTAGES
 New friends can be made
Diversity in a group

DANGERS
Data theft
Viruses
Online predators
62
Social Networking
Merits:
1. Easier to connect with people from all across the world.
2. Easy to hold discussions and collect opinions.
3. Interactive involvement with other people, from any corner
of the earth.
4. Brings more awareness amongst members.
Demerits:
5. Misuse of information posted by innocent users.
6. No credibility of information.
7. Fake profiles.
8. Bulling and trolling(create discord over
internet).
9. Peer pressure and irresponsible
behavior.
10. Attention seeking disorders and
63
addiction.
64
E-Governance is Technology driven Governance for delivering Government
Services, Exchange of Information Communication Transactions and Integration of
various Systems & Services between Government & Citizens 24X 7.

The diversity of e-government services has given rise to different types


of e-government, which can be classified into four main categories:
government-to-citizen (G2C), government-to-business (G2B),
government-to-government (G2G), and government-to-employee (G2E).

OBJECTIVE
Better service delivery to citizens.
Ushering in transparency and accountability.
Empowering people through information.
Improve efficiency within Government i.e between centre-state or inter-states.
Improve interface with business and industry. 65
MAJOR E-GOVERNANCE PROJECTS IN
INDIA

66
Advantages of e-governance

Speed: Technology makes communication swifter. Internet, smartphones have


enables instant transmission of high volumes of data all over the world.

Saving Costs: A lot of Government expenditure goes towards the cost of buying
stationery for official purposes. Letters and written records consume a lot of
stationery. However, replacing them with smartphones and the internet can
saves crores of money in expenses every year.

Transparency: The use of e-governance helps make all functions of the


business transparent. All Governmental information can be uploaded onto the
internet. The citizens access specifically access whichever information they
want, whenever they want it, at their convenience.
However, for this to work the Government has to ensure that all data as to be
made public and uploaded to the Government information forums on the
internet.

Accountability: Transparency directly links to accountability. Once the funcons


of the government are available, we can hold them accountable for their actions.

Check on Corruption: to a great extent.


67
Disadvantages of e-commerce

Loss of Interpersonal Communication: The main disadvantage of e-governance is


the loss of interpersonal communication. Interpersonal communication is an aspect of
communication that many people consider vital.

High Setup Cost and Technical Difficulties: Technology has its disadvantages as
well. Specifically, the setup cost is very high and the machines have to be regularly
maintained. Often, computers and internet can also break down and put a dent in
governmental work and services. Incompatable

Illiteracy: A large number of people in India are tech-illiterate and do not know how to
operate computers and smart phones. E-governance is very difficult for them to
access and understand.

Cybercrime/Leakage of Personal Information: There is always the risk of private


data of citizens stored in government serves being stolen. Cybercrime is a serious
issue, a breach of data can make the public lose confidence in the Government’s
ability to govern the people.

Some services still manual.


68
Features available on Social
Networking Sites.

1. User profiles.
2. Blog engine.
3. Photo albums.
4. Groups.
5. Discussion boards.
6. Media galleries.
7. Activity streams.
8. Messaging.
9. Walls.
10. Comments.
11. Tags
69
Mobile technology is technology that goes where the user
goes. It consists of portable two-way communications
devices, computing devices and the networking technology
that connects them. Currently, mobile technology is typified
by internet-enabled devices like smartphones, tablets and
watches.
Followings are the few famous mobile technologies:
SMS.
MMS
3G.
4G.

70
Ethics in Social Networking
1. Right perspective – Carefully upload the contents, pictures and videos
etc. as it involves others privacy.
2. Utilitarian Perspective – Keep away from unethical and illegal
activities like hacking and posting of threatening messages.
3. Fairness Perspective - treat all users equal. No discrimination….
4. Common Good Perspective – work to promote common good of
users and for betterment of the society.
Service Providers
Friendship SN- www.hi5.com
Business SN - www.linkedin.com
Hobbies SN - www.flicker.com
Informational SN - www.investopedia.com
Educational SN - www.goiit.com
News SN - www.nowpublic.com 71
THANK YOU

72
Web2.0 describes
World Wide Web sites
that use technology
beyond the static pages
of earlier Web sites.

Although Web 2.0 suggests a new version of the World Wide Web, it
does not refer to an update to any technical specification, but rather
to cumulative changes in the way Web pages are made and used.

A Web 2.0 site may allow users to interact and collaborate with each
other in a social media dialogue as creators of
user-generated content in a virtual community, in contrast to Web
sites where people are limited to the passive viewing of content.

Examples of Web 2.0 include social networking sites, blogs, wikis,


folksonomies, video sharing sites etc.
73
• Downloading refers to the transfer from FTP
server on to the user ’s computer.
• Uploading refers to the transfer of files from the
computer to the FTP server.
• FTP is based on the client-server model of
communication between the computers.
• A client-server session establishes two
connections:
1. Control Channel- remains open for the
entire session.
2. Data Channel- Opens and closes to
transfer data such as folder listings and files from
and to the server, as requested by the client.
• Some freely available FTP software
for Linux are – gFTP, FileZilla,
konqueror, kasablanca,
ftpcube.

74
BLOGS
• Blog is a contracti on of ‘web log’.

• A blog is an online journal where entries are


posted and its updati on is called Blogging which is
done by the blogger.

• The two features of blog are – archives and


comments.

• Archives make available the older posts of the


blog.

• Comments allow the reader to post their


feedback for the blog content. 75
NEWSGROUPS
• A news group or a forum is an online community
bulleti n board, where users can post messages,
respond to posted messages or just read them.
• Groups of related messages are known as threads.
• The online worldwide conversati on is called usenet.
• E.g. of newsgroups are
Ndtv.com
Alt.tennis
Comp.language used is c++

76
Using a Newsgroup
1. Search for news group site. Put up your Query of
interest.

2. Select the club based on Query.

3. Select “JOIN THIS CLUB” link and follow the


instructions given by the club site.

4. After you become the member of the newsgroup you


can post your messages by clicking at “Post” . Type
in your opinion or message in the box provided and
then clicking at “Post message”.

5. A message can be read by clicking on its title.One


can reply a message by clicking on “Reply” button. 77
Connecting Your PC to Internet
1.Subscribe to your ISP.

2. To set up the internet connection on your


computer :
a) Follow the provider’s instructions
in installing the network equipment
provided by the internet service provider.
b) Now set up (install) the software in
your computer so that the computer can get
connected.
78
Mobile technology is technology that goes where the user goes. It
consists of portable two-way communications devices, computing
devices and the networking technology that connects them.
Currently, mobile technology is typified by internet-enabled devices
like smartphones, tablets and watches.

79

You might also like