Saturday, January 3, 2026

E-COMMERCE AND DIGITAL MARKETING UNIT 2 (MN-1C)

DR. AJAY KUMAR PATHAK
 ASSISTANT PROFESSOR 


UNIT 2
 (MN-1C: E-COMMERCE AND DIGITAL MARKETING  ) READ ALL THE NOTES CHAPTER WISE OF DIGITAL EDUCATION FOR SEM 1 F.Y.U.G.P.

OPEN TO LEARN

Copyright © by Dr. Ajay kumar pathak

B. Sc IT SEMESTER 5 NOTES BASED ON NEP

SUBJECT : MN–1C  (Minor From Discipline–1

(To be selected by the students from)

MN-1C: E-COMMERCE AND DIGITAL MARKETING

NOTES OF THE E-COMMERCE AND DIGITAL MARKETING


 

MN-1C: E-Commerce and Digital Marketing

4 Credits

60 Class Hours

Semester V.

Course Objectives:

  1. ·         To understand the increasing significance of E-Commerce and its applications in Business.
  2. ·         To provide an insight into Digital Marketing activities on various Social Media platforms and its emerging significance in Business
  3. ·         To understand Latest Trends, Practices in E-Commerce and Digital Marketing,

COURSE CONTENTS:

 

 

Unit-1

(10 Classes)

An overview of E-Business, Models, Types

·        Conceptual Framework of E-Commerce, General Model of Business; Defining E-commerce, Characteristics, advantages and disadvantages, adoption and impact of E- Business., Electronic Data Interchange (EDI); Types of e-Transactions B2B, B2C, C2C, C2B etc., Electronic

Storefronts, E-Marketplace

 

 

Unit-2

(12 Classes)

E-Business Technology and E Security

·        Web Presence – domain registration, website development, developing static and dynamic webpages and hosting, registering the Website with Search Engines.

·        Web server hardware and software; Data centre services.

·        Security – service providers, digital certificates, encryption, SSL, Digital signatures.

 

 

Unit-3

(10 Classes)

Electronic Payment Systems:

·        Overview of electronic Payment Technology, Online payment mechanism; Electronic Payment systems, payment Gateway, EFT, NEFT, RTGS, SWIFT, NFC, Green Channel.

·        Legal issues: Laws for E-Commerce, Issues of Trademarks & Domain Names

 

 

 

Unit-4

(14 Classes)

Digital Marketing I

·        Introduction to Digital Marketing, Advantages and Limitations of Digital Marketing. Keyword research, Competitor analysis in digital marketing.

·        Various Activities of Digital Marketing: Search Engine Algorithm, Search Engine Optimization and stages, Search Engine Marketing, Content Marketing and Content Influencer Marketing, Remarketing, Campaign Marketing, E-mail Marketing, Display Advertising, Blog

Marketing, Viral Marketing, Podcasts and Vodcasts.

 

 

Unit-5

(14 Classes)

Digital Marketing II

·        The P.O.E.M. framework.

·        Digital Marketing on Various Social Media Platforms.

·        Online Advertisement, Online Marketing Research, Online PR.

·        Web Analytics.

·        Promoting Web Traffic.

·        Latest Developments and Strategies in Digital Marketing.




 ****  NOTES   *****

 

UNIT-2                :-    E-BUSINESS TECHNOLOGY AND E SECURITY

 

E-BUSINESS TECHNOLOGY:- E-Business Technology = Doing business activities with the help of digital technology.

E-Business Technology means, Using digital tools like computers, internet, apps, websites, software, and online payment systems to run a business.

E-business technology refers to the use of internet-based technologies like hardware, software, and networks to conduct and transform business processes electronically. This includes everything from online sales (e-commerce) to managing internal processes like payroll, collaborating with partners, and managing supply chains. Key technologies include databases, online payment systems, customer relationship management (CRM) systems, and enterprise resource planning (ERP) systems.

It helps a business do things like:

·         Selling products online

·         Advertising on social media

·         Accepting online payments

·         Talking to customers digitally

·         Managing stock, orders, and delivery using software

Core components and examples:-

1.       Hardware: The physical devices and infrastructure that support e-business.

          Example:- HDD, RAM, PEN DRIVE , PROCESSOR, CAMERA FOR EYES READER, THUMB READER , ETC

2.       Software: Applications and systems that manage various business functions electronically, such as:

·         Customer Relationship Management (CRM): Managing customer interactions.

·         Enterprise Resource Planning (ERP): Managing a company's core business processes.

·         Document Management Systems: Handling electronic documents.

·         Networks and Internet: The communication infrastructure that enables e-business, including the internet, extranets, and intranets.

·         Online Payment Systems: Facilitating secure electronic transactions.


(
   NOTE;- Before E-Business Technology  we had (Traditional Business)
·         Only people nearby could visit her shop
·         Customers pay only in cash
·         Maya writes all orders in a notebook
·         She sells very few sarees per day     )

WHAT PART IS E-BUSINESS TECHNOLOGY IN THIS EXAMPLE?

Activity

Technology Used

Why it is E-Business Technology

Showing sarees online

Facebook, Instagram

Digital marketing

Selling sarees

Website / Online store

Online selling

Receiving payments

UPI, Google Pay

Online payment technology

Delivering

Courier tracking system

Digital delivery service

Managing stock

Inventory software

Computer-based management


WEB PRESENCE:-  Web presence is the combination of all your online channels—website, social media, blogs, and listings—where people can find and interact with you.  OR Web presence refers to the visibility and accessibility of a business, individual, or organization on the internet. This is achieved through various digital channels and assets such as websites, social media profiles, online advertisements, and search engine results. A strong web presence is crucial for businesses in today’s digital world, as it enhances brand visibility, drives online engagement, and attracts potential customers. The purpose of having a solid web presence is to build credibility, reach more people, and connect with customers. It shows products, shares info, and engages instantly. It boosts branding, fosters customer relationships, and keeps businesses competitive by meeting digital trends.

 

IMPORTANCE OF WEB PRESENCE:- In today's digital age, a strong web presence is crucial for businesses to establish their brand identity, stay competitive, and adapt to changing online trends. It helps businesses connect with their target audience easily, enhances visibility on search engines, and fosters trust and loyalty among customers. Without an effective web presence, it becomes difficult for businesses to attract and retain customers in a crowded digital marketplace.

Web presence is a critical aspect of digital marketing due to its significant impact on how businesses and brands reach and engage with their target audience in the modern digital era. A strong web presence allows companies to establish their brand identity, improve their visibility on search engines, foster brand credibility, and provide necessary information to potential customers. Additionally, with online platforms constantly changing, a strong web presence enables businesses to adapt to new trends, stay ahead of their competitors, and generate more leads and conversions. Ultimately, an effective web presence is essential to facilitate increased customer interaction, brand recognition, and long-term business growth.


EXAMPLES

a)      Local Grocery Store with a Website and WhatsApp Presence: Many Indian grocery stores now have simple websites showing their products and prices. They also use WhatsApp groups for orders and customer communication. This dual web presence makes it easy for customers in their area to find them online and place orders conveniently.

b)      Small Boutique on Instagram and Facebook: Numerous small fashion boutiques in India use Instagram and Facebook to showcase their collections, share customer reviews, and run ads. Their social media profiles act as a key part of their web presence, driving direct customer engagement and sales without a complex website.

c)      Home Tutor Advertising on Local Google Listings and YouTube: An Indian home tutor may have a Google Business profile showing their contact details and reviews, a basic website, and a YouTube channel with tutorial videos. This combination increases their visibility and credibility online, attracting more students.

DOMAIN REGISTRATION:- Domain registration is the process of reserving a unique name on the internet, like "ajay.com," for a set period, usually one year, through a domain registrar. This process secures your exclusive right to use that name for a website, custom email addresses, or other online services. It also makes your website easier for people to find, adds professional credibility, and prevents others from taking your chosen name, according to SiteGround, Markshield, and InMotion Hosting

A domain name registrar provides domain name registrations to the general public. A common misconception is that registrars sell domain names; these domain names are actually owned by registries and can only be leased by users.

A domain name is a string of text that maps to an alphanumeric IP address, used to access a website from client software. In plain English, a domain name is the text that a user types into a browser window to reach a particular website. For instance, the domain name for Google is ‘google.com’.

The actual address of a website is a complex numerical IP address (e.g. 192.0.2.2), but thanks to DNS (Domain Name System), users are able to enter human-friendly domain names and be routed to the websites they are looking for. This process is known as a DNS lookup.

WHAT IS A DOMAIN NAME REGISTRAR?:- A domain name registrar is a business that handles the reservation of domain names as well as the assignment of IP addresses for those domain names. Domain names are alphanumeric aliases used to access websites; for example, Cloudflare’s domain name is ‘cloudflare.com’ and the IP address would be something like 192.0.2.1 (just an example). Domain names make it easier to access websites without having to memorize and enter alphanumeric IP addresses.

WHAT IS A DOMAIN NAME? :-  A domain name uniquely identifies a website and can’t be the same with other websites. If you look in your browser’s address bar, you’ll see the domain name of the site you’re visiting, like www.hostpapa.com, for instance. While a domain name is associated with a website, they’re not the same thing. Every website also has an IP address, its official identifier on the Internet, but IP addresses are just a series of numbers. Accessing a website using its IP address instead of a readable domain name would be ineffective for internet users.

When your website is created, you, your web developer, or your web hosting company will associate the site’s IP address with the domain name you purchase. This isn’t a permanent decision – if you buy a different domain name in the future, it’s simple to redirect your website to the new domain.

TYPES OF DOMAINS:-

There are more than 362 million domain names registered worldwide, and growing.

Some of the most-used domain types today

1.         Generic Top-Level Domains (gTLDs) :- Top-level domains (TLDs) are the highest level in the hierarchical Domain Name System (DNS) of the internet. They are the domain name parts that appear immediately after the last dot, such as .com, .org, or .net. TLDs help categorize domain names by their purpose, owner, or geographic location. Understanding

Examples of TLDs :-  .com (Commercial)“,  .org (Organization),   .net (Network) ,  .info (Information)

2.         Sponsored Top-Level Domains (TLDs) sTLDs:-  are specialized TLDs sponsored by specific organizations or communities.

Examples of TLDs :- .edu (Education)“: Reserved for accredited educational institutions. ,   .gov (Government)“: Reserved for government entities.,     .mil (Military)“: Reserved for the U.S. military.

3.         Type 2: Country Code Top-Level Domains (ccTLDs):- Country Code Top-Level Domains add a geographical element to your domain name. Domain name examples include .us, .uk, and .ca. They represent the United States, the United Kingdom, and Canada, respectively. Choosing a ccTLD can have several advantages. It includes localized branding, increased trust among local audiences.

4.         Subdomains :- Subdomains are extensions of your main domain name. They can help organize different sections of your website. For example, “blog.example.com” or “shop.example.com.”

 

HOW TO REGISTER A DOMAIN NAME or PROCESS:-

Domain Registration Process

· 

        Determine, if desirous Department/Organisation qualifies to receive a domain name under GOV.IN by reviewing the guidelines.

·         Review the domain naming conventions and ensure that the desired domain name complies with the conventions.

·         Check availability for the desired domain name.

·         Register the Domain Name request using Online Registration Service.

· Follow the instruction for generating and signing Authorization(Annexure-I) and Forwarding(Annexure-II) Letter online for registration of the domain.

·         User may refer  Help Video for complete assistance.

Premium (paid) domain name example

FRUCY.com ,   EarnHost.com,  EarnBunny.com,  Fruuty.com,   CharmHost.com    etc.

 WHAT IS A WEBSITE DEVELOPMENT:- 

Ecommerce website development refers to the process of creating the technical structure of an online store. This involves setting up the frontend, which is what customers interact with when browsing products and making purchases, and the backend, which handles the data processing, order management, and integration with other systems like inventory or customer relationship management.

1.      Web Design: This is all about the visual layout, colors, fonts, and overall look and feel of the site. Good web design makes a website attractive and easy to use, enhancing the experience for visitors.

2.      Web Content: The heart of a website is its content—text, images, videos, and other information displayed on the pages. Content is what tells your story, conveys your message, and engages users.

3.      Programming: This is the technical part, using languages like HTML, CSS, and JavaScript to bring the website to life. Programming ensures the site functions correctly, enabling features like navigation menus, interactive forms, and more.

4.      Database Management: Behind the scenes, databases store and manage all the content and data on a website. For example, user information, product details, and blog posts are often stored in databases, making it easy to update and manage content.

TYPES OF WEBSITE DEVELOPMENT:-  Website development comes in different forms, each with a unique focus and role in building a fully functional site.

1.      Front-End Development: This is the part of website development that users interact with directly. Also called “client-side” development, it involves designing the layout, buttons, and navigation, along with all the elements users see and engage with. Using tools like HTML, CSS, and JavaScript, front-end developers create an attractive, intuitive experience.

2.      Back-End Development: Often described as the “server-side” of development, back-end work happens behind the scenes. It involves setting up and managing the server, databases, and the logic that powers the website. This setup may depend on your hosting model—understanding the pros and cons of on premise vs cloud infrastructure can influence cost, scalability, and maintenance requirements. Back-end development is responsible for making sure the site functions smoothly, handling tasks like processing user logins, storing data, and connecting the front end with the database.

3.      Full-Stack Development: Full-stack developers have skills in both front-end and back-end development. They can handle everything needed to build a complete website, from how it looks to how it operates. This makes full-stack developers versatile and highly valuable in website development.

DEVELOPING STATIC AND DYNAMIC WEBPAGES AND HOSTING:-

STATIC WEBPAGES are simple pages where the content is fixed unless you manually change the code.  Developing a static web page involves creating a website where the content delivered to the user is exactly as stored on the server, without server-side processing. This typically involves using HTML, CSS, and optionally JavaScript.

Explanations :-      Built with HTML and CSS (and maybe a little JavaScript).  Every user sees the same content until you edit the file.  Good for simple sites like portfolios, info pages, and small company sites.



STEPS: DEVELOP A STATIC WEBPAGE

STEP 1 :-         Plan the page

·         Decide purpose: e.g., “personal portfolio” or “product landing page”.

·         Decide sections: header, hero/banner, about, services, contact, footer.

STEP 2:-          Set up your folder

·         Create a folder, for example: my-static-site.

·         Inside it, create:

ü  index.html

ü  style.css

ü  (optional) script.js

ü  an images/ folder for images.

STEP 3:-    Create basic HTML structure in index.html

·         Add:

ü  Doctype

ü  html, head, body tags

ü  Link to CSS file

ü  Optional script link at end of body.

STEP 4:-    Add content sections (still in index.html)

·         Header with site title and menu.

·         Main content:

ü  A hero section with a big title and button.

ü  About section.

ü  Services or projects section.

ü  Contact section (even a simple email link).

·         Footer with copyright line.

STEP 5:-    Style with CSS (style.css)

·         Set base styles: font, background color, text color.

·         Style header: background color, horizontal menu.

·         Style hero: center text, big heading, button styles.

·         Use margins, padding, and layout (flexbox) for sections.

·         Add basic responsiveness (e.g., make layout stack on small screens).

STEP 6 :-   (Optional) Add small interactions with JavaScript

·         Simple actions like:

ü  Scroll to section when clicking a button.

ü  Show/hide a mobile menu on small screens.

STEP 7:-    Test locally

·         Open index.html with your browser.

·         Make edits, reload, fix any layout or spelling issues.


DYNAMIC WEBPAGES can change content automatically based on user input, databases, or logic on the server or in JavaScript. Developing dynamic web pages involves creating web content that changes based on user interactions, data from databases, or other external factors. This is in contrast to static web pages, which display the same content to all users.

 

STEPS: DEVELOP A DYNAMIC WEBPAGE (SIMPLE EXAMPLE PATTERN)

Simple pattern using a dynamic backend (the concept is similar whatever language you pick):-

STEP 1:     Choose a stack

·         Example beginner-friendly stacks:

ü  Node.js + Express (JavaScript)

ü  PHP + MySQL

ü  Python (Flask or Django) + database

STEP 2 :-   Plan the dynamic behavior

·         Decide what must change automatically, for example:

ü  A page that shows a list of messages submitted by users.

ü  A page that greets the user by name based on a query parameter.

·         Decide what data source:

ü  For learning, you can use an in-memory array or JSON file.

ü  In real apps, you use databases (MySQL, PostgreSQL, MongoDB, etc.).

STEP 3:-    Set up project

·         Install runtime (e.g., Node.js).

·         Create a project folder (my-dynamic-site).

·         Initialize project (for Node: npm init -y).

·         Install web framework (for Node: npm install express).

STEP 4:- Create server file

·         Create server.js (or app.js).

·         Import framework.

·         Create an app object.

·         Define routes:

ü  GET / → returns HTML that might contain dynamic content.

ü  GET /hello?name=Dr. Ajay → reads name from query and prints “Hello, Dr. Ajay”.

·         Start the server (e.g., app.listen(3000)).

STEP 5:-    Connect templates (optional but standard)

·         Use a template engine (like EJS (Embedded JavaScript and is a templating engine used to generate dynamic HTML.),  or Handlebars (The handlebar is a physical component for steering, while Handlebars the library uses expressions within text to dynamically generate HTML or other text formats.)) or render HTML yourself.

·         Pass data from your server code into the template:

ü  Example data: an array of “projects” or “messages”.

·         Template loops over the data and prints it as HTML.

STEP 6:-    (Optional) Use a database

·         Choose a database (e.g., SQLite for simple, MySQL/PostgreSQL (PostgreSQL is a powerful, open-source, object-relational database management system ) for more).

·         Create a table (e.g., messages, users, products).

·         In your route handlers:

ü  Read from database and pass data to template.

ü  Insert new records when clicking a form “submit”.

STEP 7:-    Test locally

·         Run server (e.g., node server.js).

·         Open http://localhost:3000 in browser.

·         Try sending requests (click links, submit forms) and see content change.


HOSTING is the process of putting your website files on an online server so that anyone can open them through a domain name. Web hosting is a service that stores a website's files (like code, images, and text) on a server and makes them accessible to anyone on the internet. A web hosting provider maintains these servers, ensuring the website remains online 24/7 by handling the infrastructure, security, and internet connection. Essentially, it's like renting space on the internet to publish your website. 

 

STEPS: HOST A WEBSITE (STATIC OR DYNAMIC)

STEP 1:-          Choose hosting type

·         For static websites:

ü  Services like Netlify, GitHub Pages, Vercel, traditional shared hosting.

STEP 1 :-         For dynamic websites

 

·         Shared hosting that supports your language (e.g., PHP hosting).

·         Cloud platforms (e.g., VPS (Virtual Private Server), PaaS (Platform as a Service) like Render, Railway, etc.).

STEP 2:-    Prepare your files

·         Static:

ü  Ensure index.html is in the root with style.css, script.js, images, etc.

·         Dynamic:

ü  Include all code files (server file, package files, templates, etc.).

ü  Ensure configuration uses environment variables for ports, database URLs, etc.

STEP 3:-    Create an account and new site on your hosting

·         Sign up on the hosting platform.

·         Create a new “site” or “project”.

·         For static platforms:

ü  Either upload files or connect to a Git repository.

·         For dynamic platforms:

ü  Configure “build” and “start” commands if required.

STEP 4:-    Upload or deploy your code

·         Option A: Upload via web interface.

ü  Zip your project (for static only HTML/CSS/JS) and upload.

·         Option B: Use Git deployment.

ü  Push code to GitHub/GitLab/Bitbucket.

ü  Link hosting provider to the repository and enable auto deploy.

·         Option C: Use FTP (traditional hosting).

ü  Use an FTP client.

ü  Connect using host, username, password from hosting control panel.

ü  Upload your files to the public_html or www directory.

STEP 5:-    Configure domain

·         Register a domain from a registrar (if you do not have one).

·         On your hosting provider:

ü  Add the domain to your site/project.

·         On your domain registrar:

ü  Point DNS (Domain Name System) to your hosting (update nameservers or A/CNAME (Canonical Name) records).

·         Wait for DNS propagation (often a few minutes to a few hours).

STEP 6:-    Enable HTTPS

·         Use the hosting provider’s option to issue a free SSL certificate (often Let’s Encrypt).

·         Make sure your site is accessible via https://yourdomain.com.

STEP 7:-    Test the live site

·         Open your domain in a browser.

·         Click through pages, test forms, confirm everything works.

·         Fix any path issues (e.g., wrong links, hard-coded localhost URLs).

SIMPLE COMPLETE EXAMPLE: STATIC + VERY SMALL DYNAMIC BEHAVIOR

( PROGRAME CODE ) :-

Below is a simple example of:

·         A static page (HTML + CSS + a tiny bit of JS).

·         A very simple “dynamic” behavior on the client side (no backend): the page receives the user by name after form submission and shows the current time.



 

PROGRAME 1:-         index.html

xml

<!DOCTYPE html>

<html lang="en">

<head>

  <meta charset="UTF-8">

  <title>Simple Webpage Example</title>

  <link rel="stylesheet" href="style.css">

</head>

<body>

  <header class="site-header">

    <h1>My Simple Website</h1>

    <nav>

      <a href="#home">Home</a>

      <a href="#about">About</a>

      <a href="#contact">Contact</a>

    </nav>

  </header>

   <main>

    <!-- Hero / Home section -->

    <section id="home" class="hero">

      <h2>Welcome to my page</h2>

      <p>This is a basic example of a static webpage with a small dynamic feature.</p>

      <button id="scroll-about-btn">Learn more</button>

    </section>

     <!-- About section -->

    <section id="about" class="section">

      <h2>About</h2>

      <p>

        This page is built using HTML for structure, CSS for styling, and JavaScript for simple interactivity.

      </p>

      <p>

        Enter your name below to see a personalized greeting.

      </p>

      <form id="greet-form">

        <label for="name-input">Your name:</label>

        <input type="text" id="name-input" placeholder="Type your name here">

        <button type="submit">Greet me</button>

      </form>

      <p id="greeting-output" class="greeting-output"></p>

    </section>

 

    <!-- Contact section -->

    <section id="contact" class="section">

      <h2>Contact</h2>

      <p>You can email me at: <a href="mailto:you@example.com">you@example.com</a></p>

      <p id="time-output"></p>

    </section>

  </main>

   <footer class="site-footer">

    <p>&copy; 2025 My Simple Website</p>

  </footer>

   <script src="script.js"></script>

</body>

</html>

PROGRAME 2 :-       style.css

css

/* Reset some default spacing */

* {

  box-sizing: border-box;

  margin: 0;

  padding: 0;

}

 

body {

  font-family: Arial, sans-serif;

  line-height: 1.6;

  background-color: #f5f5f5;

  color: #333;

}

 

/* Header and navigation */

.site-header {

  background-color: #2c3e50;

  color: #fff;

  padding: 15px 20px;

  display: flex;

  justify-content: space-between;

  align-items: center;

}

 

.site-header h1 {

  font-size: 1.4rem;

}

 

.site-header nav a {

  color: #ecf0f1;

  margin-left: 15px;

  text-decoration: none;

  font-size: 0.95rem;

}

 

.site-header nav a:hover {

  text-decoration: underline;

}

 

/* Hero section */

.hero {

  background-color: #3498db;

  color: #fff;

  text-align: center;

  padding: 60px 20px;

}


.hero h2 {

  font-size: 2rem;

  margin-bottom: 10px;

}

 

.hero p {

  font-size: 1rem;

  margin-bottom: 20px;

}

 

.hero button {

  background-color: #2c3e50;

  color: #fff;

  border: none;

  padding: 10px 20px;

  border-radius: 4px;

  cursor: pointer;

}

 .hero button:hover {

  background-color: #1a242f;

}

 

 

/* Generic section styling */

.section {

  padding: 40px 20px;

  max-width: 800px;

  margin: 0 auto;

  background-color: #fff;

  margin-top: 20px;

  border-radius: 6px;

  box-shadow: 0 2px 4px rgba(0, 0, 0, 0.1);

}

 

.section h2 {

  margin-bottom: 15px;

}

 

.section p {

  margin-bottom: 10px;

}

 

/* Greeting output styling */

.greeting-output {

  margin-top: 10px;

  font-weight: bold;

  color: #27ae60;

}

 

/* Footer */

.site-footer {

  text-align: center;

  padding: 15px;

  margin-top: 30px;

  background-color: #2c3e50;

  color: #ecf0f1;

  font-size: 0.9rem;

}

 

/* Responsive tweaks */

@media (max-width: 600px) {

  .site-header {

    flex-direction: column;

    align-items: flex-start;

  }

 

  .site-header nav {

    margin-top: 10px;

  }

}

PROGRAME 3:- script.js

Javascript

// Smooth scroll to About section when button clicked

const scrollButton = document.getElementById('scroll-about-btn');

const aboutSection = document.getElementById('about');

 

scrollButton.addEventListener('click', () => {

  aboutSection.scrollIntoView({ behavior: 'smooth' });

});

 

// Simple greeting form logic

const greetForm = document.getElementById('greet-form');

const nameInput = document.getElementById('name-input');

const greetingOutput = document.getElementById('greeting-output');

 

greetForm.addEventListener('submit', (event) => {

  event.preventDefault(); // prevent page refresh

  const name = nameInput.value.trim();

 

  if (name) {

    greetingOutput.textContent = `Hello, ${name}! Welcome to this simple website.`;

  } else {

    greetingOutput.textContent = 'Please enter your name first.';

  }

});

 

// Show current time in Contact section

const timeOutput = document.getElementById('time-output');

 

function updateTime() {

  const now = new Date();

  timeOutput.textContent = `Current time: ${now.toLocaleString()}`;

}

 

// update immediately and then every 30 seconds

updateTime();

setInterval(updateTime, 30000);

REGISTERING THE WEBSITE WITH SEARCH ENGINES:-

Registering your website on search engines means submitting your site so search engines like Google and Bing can find, and show your website in their search results.

Here are the simple steps to register your website on the main search engines.

STEPS TO REGISTER A WEBSITE ON SEARCH ENGINES:-

STEP 1:-    Create and Prepare Your Website

·         Make sure your website is live and accessible on the internet with a domain name.

·         Have an XML sitemap file ready (usually at yourwebsite.com/sitemap.xml). This file tells search engines about all the important pages on your site.

STEP 2:-          Set up Google Search Console and Verify Ownership

·         Go to Google Search Console (search.google.com/search-console).

·         Add your website by entering your domain name.

·         Verify that you own the site. The easiest way is by adding a TXT record to your domain’s DNS (Domain Name System) settings (your domain provider dashboard).

·         Verification proves you control the site, so Google trusts you to submit important info.

STEP 3:-          Submit Your Sitemap in Google Search Console

·         Once verified, look for the “Sitemaps” section in the sidebar.

·         Paste your sitemap URL (e.g., yourwebsite.com/sitemap.xml) and submit it.

·         This tells Google which pages should be crawled and indexed faster.

STEP 4:          Use URL Inspection Tool for Important Pages

·         In Search Console, use the URL Inspection tool to submit any new or important pages individually for faster indexing.

·         Paste the URL and click “Request Indexing”.

STEP 5:-        Set up Bing Webmaster Tools and Verify Site

·         Go to Bing Webmaster Tools (bing.com/webmasters).

·         Sign in and add your website.

·         Verify ownership, similarly by adding a DNS (Domain Name System) record or uploading a file to your site.

STEP 6:-        Submit Sitemap to Bing

·         In Bing Webmaster Tools, go to the “Sitemaps” section.

·         Submit the sitemap URL as you did in Google Search Console.

·         This submission also automatically covers Yahoo search since Bing powers Yahoo’s search results.

STEP 7:-        No Manual Submission Needed for DuckDuckGo

·         DuckDuckGo automatically finds your site through Bing, so submitting on Bing covers this.

STEP 8:-        Optional: Submit to Other Search Engines like Yandex or Baidu

·         For Russia/Kazakhstan/Others: use Yandex Webmaster tools and submit sitemap similarly.

·         For China audiences: use Baidu Webmaster with some language adjustments.

STEP 9:- Maintain and Update

·         Whenever you add new pages or significant updates, resubmit your sitemap or URLs for re-indexing.

·         Regularly check your Webmaster tools for crawl errors or issues.

Each step involves setting up free Webmaster or Search Console tools provided by search engines to help you control indexing and site visibility better. This process speeds up how quickly your site appears in search results and helps track website performance.

WEB SERVER HARDWARE:-   (    A server is any computer used to present (or “serve”) files or make programs available to other computers associated with it through a network (such as a LAN or a WAN). In computing, a server is a piece of computer hardware or software (computer program) that endows with functionality for other programs or devices, called "clients".       )    

A server is a computer system that provides data, information, and other resources to other computer systems or devices on a network. Server hardware is a physical component of the server system that facilitates this data processing, management, and storage.

Server hardware comprises a server system, including the computer chassis, power supply, motherboard, processor, memory, storage devices, and network interface cards. It is designed to provide high processing power, reliability, and security levels to support critical business applications, services, and processes. Server hardware differs from regular computer hardware because it is optimized to simultaneously support multiple users, applications, and processes.

A server system typically has higher processing power, larger memory capacity, and storage devices to accommodate the demands of multiple users accessing the system concurrently.

TYPES OF SERVER HARDWARE:-

1.         Rack-mounted servers:- These servers are mounted on racks, providing a space-saving solution for data centers or server rooms. They typically come in different sizes and can accommodate different hardware configurations. Rack-mounted servers can be a good option if you are a business owner starting your business.

2.         Blade servers:- These are high-density servers that are designed to fit in a rack enclosure. Blade servers are ideal for organizations requiring high computing power and flexibility in their server systems.

They typically have a smaller form factor, low power consumption, and are hot-swappable. These benefits have made blade servers quite popular among business owners out there in the world.

3.         Tower servers:- These are standalone servers designed to be installed on a desk or a floor. Tower servers are ideal for small to medium-sized businesses that require a server system for their day-to-day operations. They are usually less expensive than rack-mounted or blade servers and offer scalability and reliability.

4.         Micro servers:- These small form factor servers are designed for low power consumption and are ideal for small business applications. They are typically less expensive than other types of servers and offer a low-cost solution for businesses that require a server system but have limited resources.

5.         Mainframe servers:- These large and powerful servers are designed to support multiple users and applications concurrently. They are typically used by large organizations or government agencies requiring high computing power, reliability, and security.

  WEB SERVER SOFTWARE:-        A web server software that uses HTTP (Hypertext Transfer Protocol) and other protocols to respond to client requests made over the World Wide Web. A web server software, dedicated to running this software, which can fulfill client requests on the World Wide Web. Web servers can repeatedly be found embedded in devices such as printers, routers, webcams and serving only a local network. On the software side, a web server includes several parts that control how web user’s access hosted files. At a minimum, this is an HTTP server. An HTTP server is software that understands URLs (web addresses) and HTTP (the protocol your browser uses to view web pages). An HTTP server can be accessed through the domain names of the websites it stores, and it delivers the content of these hosted websites to the end user's device.

The web server may then be used as a part of a system for monitoring or administering the device in question. This typically means that no other software has to be installed on the client computer since only a web browser is obligatory (which now is incorporated with most operating systems). These web pages are more often than not static content that includes HTML documents, images, style sheets, tests etc. Apart from HTTP, a web server also supports SMTP (Simple Mail transfer Protocol) and FTP (File Transfer Protocol) protocol for emailing and for file transfer and storage.

FEATURES OF WEB SERVER SOFTWARE:-

1.      Client Request Processing: A Web server processes client requests that are sent using HTTP protocol, both for static and dynamic pages

2.      IP-Sharing or Virtual Server: A Web server can work as many virtual Web servers, serving many businesses with individual domain names but all domains directing to the same IP address of the computer.

3.      Logical File: A Web server can have a logical file name corresponding to a physical file. The physical file may be in the same computer or in another computer, and also the logical name and the physical name do not have to be the same. The Web server translates a logical URL into a physical file address.

4.      Security: Web servers are located publicly on the Internet or privately in an organizational intranet, usually behind the firewalls. The public documents are configured to be viewed by anonymous users. For extranet users, the files and folders are configured for validation of username and password. Access controls provide or deny access to files based on the username or by extranet company URL. Web servers allow processing digital certificates and private/public key pairs and also support Secure Socket Layer (SSL)

5.      Site Management: Web server provides tools to manage multiple Web sites, file security, virtual file, and log file analysis Administration of a Web server can be performed from a remote computer in the network Administrators can grant or deny Web access to individual computers, groups of computers, or entire domains. Administrators can stop and restart all Web services without stopping and restarting the computer Site management also include authoring tools such as Microsoft Front page 2000.

6.      Application Development: Application development includes Web editors and extensions to produce Web pages – either static or dynamic. These include HTML editors such as FrontPage for static Web pages for dynamic Web pages, there are protocols such as Common Gateway Interface (CGI), Application programming Interface (API), and Active Server Pages (ASP) that are used by programs such as Java, C++, and VBScript to develop dynamic Web pages.


DATA CENTRE SERVICES.:- Data center services encompass all of the services and facility-related components or activities that support the implementation, maintenance, operation, and enhancement of a data center, which is an environment that provides processing, storage, networking, management and the distribution of data within an enterprise. Generally, data center services fall into two categories: services provided to a data center or services provided from a data center. While many data center services can be primarily software oriented, others are still relatively physical, where comprehensive systems may involve a mix of hardware, software and human resources. Many of these services may apply to the physical structures involved in the data center, such as setting up adequate environmental and security equipment, as well as handling needs for utilities such as power and broadband. Both consumer and business applications are contributing to the growing dominance of datacenter services and cloud services in India. This has given rise to many companies offering Data Center Services in India and cloud service providers in India. We at IDBI (Industrial Development Bank of India ) Intech, have been providing IT enabled Services which includes managing of IT Infrastructure and Data Centre. We manage 3-Tier Data Centre, Disaster Recovery site and Near DR site for IDBI Bank. We also provide end to end solution for the procurement and management of the entire IT Infrastructure.


FIGURE OF DATA CENTER

FIGURE OF DATA CENTER

DATA CENTER CONSIDERATIONS INCLUDE:

1.      Redundancy/backup:-        the level of redundancy varies widely based on the quality of a data center; in high tier data centers, multiple redundancies in power and backup servers are built into the infrastructure.

2.      Efficiency:-           the amount of electricity used at a large data center rivals that of a small town. Whenever possible, data centers attempt to cut down on costs by optimizing cooling processes and using energy-efficient hardware.

3.      Security:-   proper physical security, both in terms of electronic surveillance, access controls, and on-site security guards reduce the risk associated with bad actors attempting to gain site access.

4.      Environmental controls/factors:-               maintaining the right environmental conditions is necessary for the proper functioning of electronic hardware. Keeping both temperature and humidity within acceptable parameters requires the proper balance of air conditioning, humidity control, and airflow regulation. In areas that are vulnerable to earthquakes, properly secured servers are also a necessary concern.

5.      Maintenance and monitoring:-                  on-site or on-call network engineers are needed in order stay on top of server crashes and other hardware failures. Proper response helps to ensure server uptime and eliminate reductions in quality of service.

6.      Bandwidth:-          a data center is incomplete without the bandwidth necessary to handle all the requisite network traffic. Bandwidth considerations are a central component in data center infrastructure, with external network connections and internal data center topology both designed around sufficient network capacity.


WHAT ARE THE MAIN COMPONENTS OF DATA CENTRE ARCHITECTURE?

Data centre design has six main components: computing, storage, networks, power infrastructure, cooling systems, and security systems. These are the foundation of flawless data centre operation and are integral to its design and functionality.

1.      Computing:-          Computing resources are responsible for processing and executing tasks and applications within data centres. These are usually high-performance servers and other computing assets necessary to meet the data centre's processing requirements.

2.      Storage:-                The storage component encompasses both the hardware and infrastructure, which stores and manages data within the data centre. This component consists of storage area networks (SAN), network-attached storage (NAS), and other solutions that serve as high-capacity, reliable, and scalable data storage equipment.

3.      Networks:-                        The network elements focus on the networking capabilities of the data centre. Networking consists of switches, routers, firewalls, and all other hardware elements that ensure connectivity, security, and efficient transfer of data within the data centre.

4.      Power infrastructure:-                   Power infrastructure consists of Uninterruptible Power Supply (UPS) systems, backup generators, and power distribution units (PDUs) provide a stable and reliable power supply.

5.      Cooling systems:-              Cooling systems include Computer Room Air Conditioning (CRAC) units, liquid cooling systems, and hot/cold aisle containment to maintain optimal temperature and humidity levels.

6.      Security systems:-             Physical and network security measures to protect data and infrastructure from unauthorised access and cyber threats.

TYPES OF DATA CENTERS:-

Data centers are housed in secured environments with controlled access. The six common data center types are:

1.      Enterprise data centers.

2.      Managed service(s) data centers.

3.      Colocation data centers.

4.      Cloud data centers.

5.      Hyperscale data centers.

6.      Edge data centers.

1.         Enterprise data center:-           An enterprise data center is typically owned by a single organization or enterprise with predictable usage and limited scalability requirements. These data centers may be located on-premise or off-site and can also operate as private cloud data centers.

Managed internally, enterprise data centers are generally used to handle the organization’s internal data and IT workloads. They are best suited for organizations with sufficient resources and expertise to build, operate, and maintain their own facilities.

2.         Managed services data center:-           A managed service data center is usually located off-site and operated by a Managed Service Provider (MSP). While the maintenance and operational responsibilities are outsourced to the MSP, a single organization may still own the rights to use the facility. These data centers are designed for predictable usage, making them less scalable than other models. Managed services data centers are ideal for organizations with large-scale computing needs but lacking the internal expertise and resources to independently operate and maintain a facility.

3.         Colocation data center:-         In a collocated data center, several organizations share the physical space while managing their own computing infrastructure. The building infrastructure, including cooling, HVAC (Heating, Ventilation, and Air Conditioning ), and power, is operated by a third-party MSP or vendor. Colocation data centers offer higher scalability, attracting a diverse customer base with varying usage demands. This model is particularly suitable for organizations that have the expertise to manage limited data center operations but lack the capital expenditures (CapEx) and resources to build and operate an entire facility.

4.         Cloud data center:-     A cloud data center is a collection of distributed facilities designed to provide global cloud-based services. These services are offered on-demand and on a subscription basis, commonly as:

a)      Software as a Service (SaaS).

b)      Infrastructure as a Service (IaaS).

c)      Platform as a Service (PaaS).

5.         Hyperscale data centers:-        Hyperscale data centers are the largest players in the industry, operated by technology like AWS (Amazon Web Services ), Microsoft Azure, and Google Cloud. These facilities offer a variety of cloud services with unparalleled scalability. Globally distributed and fully automated, hyperscale data centers are managed by large technology enterprises that have the resources, expertise, and CapEx to build and maintain extensive networks of data centers worldwide. This model is ideal for tech companies aiming to compete in the cloud computing space.

6.         Edge data center:-       Lastly, edge data centers are located close to end-users, such as individual consumers of telecommunications services. These facilities are often managed and operated by ISPs and telcos. Edge data centers are used for applications requiring real-time processing, IoT, and low-latency workloads. This model is particularly well-suited for organizations providing Internet-based services where user experience and networking performance are critical to business success.

 

E  SECURITY:-         eCommerce security is the guideline that ensures safe transactions through the internet. It consists of protocols that safeguard people who engage in online selling and buying goods and services. You need to gain your customers’ trust by putting in place eCommerce security basics.

Such basics include:

1)      Privacy

2)      Integrity

3)      Authentication

4)      Non-repudiation

5)      Encryption

6)      Auditability

1.         Privacy:- Privacy includes preventing any activity that will lead to the sharing of customers’ data with unauthorized third parties. Apart from the online seller that a customer has chosen, no one else should access their personal information and account details. A breach of confidentiality occurs when sellers let others have access to such information. An online business should put in place at least a necessary minimum of anti-virus, firewall, encryption, and other data protection. It will go a long way in protecting credit card and bank details of clients.

2.         Integrity:- Integrity is another crucial concept of eCommerce Security. It means ensuring that any information that customers have shared online remains unaltered. The principle states that the online business is utilizing the customers’ information as given, without changing anything. Altering any part of the data causes the buyer to lose confidence in the security and integrity of the online enterprise.

3.         Authentication:-  The principle of authentication in eCommerce security requires that both the seller and the buyer should be real. They should be who they say they are. The business should prove that it is real, deals with genuine items or services, and delivers what it promises. The clients should also give their proof of identity to make the seller feel secure about the online transactions. It is possible to ensure authentication and identification. If you are unable to do so, hiring an expert will help a lot. Among the standard solutions include client login information and credit card PINs.

4.         Non-repudiation:-  Repudiation means denial (rejection) . Therefore, non-repudiation is a legal principle that instructs players not to deny their actions in a transaction. The business and the buyer should follow through on the transaction part that they initiated. eCommerce can feel less safe since it occurs in cyberspace with no live video. Non-repudiation gives eCommerce security another layer. It confirms that the communication that occurred between the two players indeed reached the recipients. Therefore, a party in that particular transaction cannot deny a signature, email, or purchase.

5.         Encryption:-    Information should be encrypted and decrypted only by an authorized user.

6.         Auditability:-  Data should be recorded in such a way that it can be audited for integrity requirements.

 

E-COMMERCE SECURITY THREATS AND ISSUES:-

1.         Financial Fraud:-         Cybercriminals often target payment transactions, attempting to tap funds from unsuspecting users. These threats range from credit card fraud to identity theft. The 2 most common types of financial fraud carried out by fraudsters include credit card fraud and refund fraud.

2.         Credit Card Fraud:- This fraud is carried out through a stolen credit card or through identity theft which enables the fraudster to create a credit card with that identity. Carding, a practice where small transactions are made to test the validity of stolen credit card details, is another common threat. Transactions with stolen credit cards can be limited by installing address verification systems. These systems check and verify between the billing addresses provided by the customer to you and the bank.

3.         Refund Fraud:- Another trick up a fraudster’s cover is to file requests for refunds or returns for non-existent orders or after using the products.

4.         Phishing:- Phishing attacks involve deceptive emails or websites that appear genuine but are designed to trick users into revealing their personal and financial information. Customers can receive messages or emails from hackers pretending to be your e-commerce business.

5.         DDoS Attacks:- Distributed Denial of Service (DDoS) attacks flood a website with crushing traffic rendering it inaccessible to genuine users. E-commerce businesses are attractive targets.

6.         Spamming:- Spam emails, comments, and messages can confusion & disrupt the experience of your e-commerce platform. They can also have malware or phishing links. They can also leave these links in their comments on blog posts and contact forms. Clicking such a link directs your customers to malicious sites. Spamming not only affects your website’s security but also reduces its speed and performance drastically.

7.         Bots:- Bots can be programmed to perform tasks like scraping data (e.g., to collect Amazon product details), automating purchases, or launching attacks. Malicious bots can cause confusion on e-commerce sites by scraping them for inventory and price information. Hackers can then use the data to lower or modify the prices on their websites in an attempt to lower your sales and revenue.

8.         Brute Force Attacks:- Physical force attacks involve repeated, automated login attempts to gain unauthorized access to user accounts. Attackers can use brute force to attack your administrator panel, crack your password, and compromise your account to steal information. Automated tools help in trying out thousands of combinations in an attempt to obtain your site’s passwords. It’s wise to use strong, complex passwords and change them every few months.

9.         Vulnerability Exploitation:- Vulnerabilities that exist in your e-commerce website can be exploited by hackers using SQL injections or cross-site scripting (XSS). SQL injections affect your database by corrupting it using codes that are put into query boxes on your site.

10.       Malware:- Malicious software like spyware, viruses, trojans, and ransomware is installed on your IT and computer systems without your knowledge. Customers, admin, and other user devices may have trojan horses that can easily swipe away any sensitive information from it and in the process affect your e-commerce site as well.

 

SECURITY SERVICE PROVIDERS IN E COMMERCE:-

Security service providers in e-commerce are specialized companies or platforms that offer cybersecurity solutions tailored to protect online businesses from various digital threats. These providers ensure the safety of online transactions, customer data, and the overall integrity of e-commerce websites by implementing security measures like firewalls, encryption, authentication protocols, and threat detection systems.

Security service providers focus on safeguarding e-commerce websites and platforms from cyber attacks such as data breaches, fraud, Distributed Denial of Service (DDoS) attacks, and malware infections. They help maintain customer trust by protecting sensitive information like payment details and personal data.

Examples of these services include Web Application Firewalls (WAF), Secure Socket Layer (SSL) certificates, two-factor authentication (2FA), bot management, and vulnerability scanning.

EXAMPLES OF SECURITY SERVICE PROVIDERS

 

1)      Cloudflare: Offers a Web Application Firewall that protects e-commerce sites from malicious bots, DDoS (Distributed Denial of Service) attacks, and provides threat intelligence and analytics.

2)      Duo Security: Provides two-factor authentication services to add an extra layer of security in user identification and access management.

3)      Sucuri: Specializes in website security including malware scanning, removal, DDoS protection, and compliance assistance.

4)      Atlant Security: A global cybersecurity firm providing security audits, virtual Chief Information Security Officer (CISO) services, and infrastructure hardening to support e-commerce brands.

5)      Sophos and Imperva: Offer network security solutions that protect data and online transactions for e-commerce platforms.

 

DIGITAL CERTIFICATES OR  IDENTITY CERTIFICATES OR PUBLIC KEY CERTIFICATES :- A digital certificate is a form of electronic credential that can prove the authenticity of a user, device, server, or website. It uses PKI (public key infrastructure) to help exchange communications and data securely over the internet. This form of authentication is a type of cryptography that requires the use of public and private keys to validate users.

Public key certificates are issued by trusted third parties, a CA (certificate authorities), who signs the certificate, thus verifying the identity of the device or user that is requesting access. To ensure validity, the public key will be matched with a corresponding private key that only the recipient has knowledge of. Digital certificates have a specific key pair opens in a new tab that they are associated with: one public and one private.

A digital certificate contains the following identifiable information:-

1)      User’s name

2)      Company or department of user

3)      IP (internet protocol) address or serial number of device

4)      Copy of the public key from a certificate holder

5)      Duration of time the certificate is valid for

6)      Domain certificate is authorized to represent


BENEFITS OF DIGITAL CERTIFICATION:-      

1)      Security:-               Digital certificates can keep internal and external communications confidential and protect the integrity of the data. It can also provide access control, ensuring only the intended recipient receives and can access the data. 

2)      Authentication:-    With a digital certificate, users can be sure that the entity or person they are communicating with is who they say they are and makes sure that communications reach only the intended recipient. 

3)      Scalability:-           Digital certificates can be used across a variety of platforms for individuals and large and small businesses. They can be issued, renewed, and revoked in a matter of seconds. They can be used to secure a range of user devices and be managed through one centralized system. 

4)      Reliability:-           A digital certificate can only be issued by a publicly trusted and carefully examined CA (certificate authorities), meaning that they cannot be easily tricked or faked. 

5)      Public trust:-          The use of a digital certificate proves authenticity of a website, documents, or emails. It can assure users and clients that the company or individual is genuine and respects privacy and values security.

TYPES OF DIGITAL CERTIFICATES IN CRYPTOGRAPHY:-

1.         TLS/SSL certificate:- A TLS/SSL (Transport Layer Security / secure socket layer) ,  certificate sits on a server— such as an application, mail, or web server—to ensure communication with its clients is private and encrypted. The certificate provides authentication for the server to send and receive encrypted messages to clients. The existence of a TLS/SSL certificate is signified by the Hypertext Transfer Protocol Secure (HTTPS) designation at the start of a Uniform Resource Locator (URL) or web address.

 It comes in three forms:-

a)      Domain validated:- A domain validated certificate is a quick validation method that is acceptable for any website. It is cheap to obtain and can be issued in a matter of minutes.

b)      Organization validated:- This provides light business authentication and is ideal for organizations selling products online through e-commerce.

c)      Extended validation:- This offers full business authentication, which is required by larger organizations or any business dealing with highly sensitive information. It is typically used by businesses in the financial industry and offers the highest level of authentication, security, and trust.

2.         Code signing certificate:- A code signing certificate is used to confirm the authenticity of software or files downloaded through the internet. The developer or publisher signs the software to confirm that it is genuine to users that download it. This is useful for software providers that make their programs available on third-party sites to prove that files have not been tampered with.

3.         Client certificate:- A client certificate is a digital ID that identifies an individual user to another user or machine, or one machine to another. A common example of this is email, where a sender signs a communication digitally and its signature is verified by the recipient. Client certificates can also be used to help users access protected databases.

 ENCRYPTION:- Encryption is the process of transforming readable plain text into unreadable ciphertext to mask sensitive information from unauthorized users. Organizations regularly use encryption in data security to protect sensitive data from unauthorized access and data breaches. Encryption is used to protect data from being stolen, changed, or compromised and works by scrambling data into a secret code that can only be unlocked with a unique digital key.  Encrypted data can be protected while at rest on computers or in transit between them, or while being processed, regardless of whether those computers are located on-premises or are

remote cloud servers. Google Cloud offers a variety of ways to encrypt data and protect an organization’s cryptographic keys. Learn more about key management, confidential computing, and Google Cloud’s security offerings.

WHY IS ENCRYPTION IMPORTANT OR OBJECTIVES OF ENCRYPTION? :-

1)      Confidentiality. Encodes the data to prevent it from being understood if it is intercepted.

2)      Authentication. Verifies the origin of the data that has been encrypted.

3)      Integrity. Validates that the data has not been altered since it was encrypted.

4)      Nonrepudiation. Prevents senders from denying they sent the encrypted data.

 

DIGITAL SIGNATURES :- A digital signature is a virtual stamp that proves who sent a digital message or file and that it hasn’t been tampered with. It verifies the sender’s identity and the integrity of the digital document, making it legally binding. It works like a pair of keys. Both the sender (the person or company who creates and sends the contract) and the receiver (the one who must sign the document) each have a pair of keys.

1)      Private key: Used to create the digital signature (and kept only by you).

2)      Public key: Used by others to verify the digital signature. You share it with anyone who needs to verify your signature. If you use an e-signing platform like Ajay, your public key cryptography can be automatically made available to the other party through the platform.

The sender uses their private key to create a digital signature, which is a unique code linked to that document. This code serves as a personal seal, proving the document is genuinely from the sender. The receiver uses the sender’s public key to verify the signature. If the code matches, it confirms that the document and signature are authentic and unchanged.  This is crucial for online data security and trust because it ensures that information comes from the right source and hasn’t been altered after signing.


 

 THE HAPPY END OF THE UNIT 2










No comments:

Post a Comment

PLEASE DO LEAVE YOUR COMMENTS

UNIT 5 SOFTWARE TESTING (UNIT NAME) :- TEST AUTOMATION TOOLS AND EMERGING TRENDS

  DR. AJAY KUMAR PATHAK  ASSISTANT PROFESSOR READ  ALL THE NOTES CHAPTER WISE   MINOR PAPER   SUBJECT NAME:-   MN–2C (Th):- SOFTWARE TESTING...