Download as pdf or txt
Download as pdf or txt
You are on page 1of 42

GOBIND KUMAR JHA 9874411552

Unit – 1
Information Technology and Business – An Overview

Distinguish between Data and Information:

The main difference between data and information may be pointed out in a tabular form:
Data Information
1. Data is collection of facts, figures, statistics or 1. Information is the organized, analyses or
statements connected in the subject matter. classified data.
2. Data are raw materials for producing 2. Information is final product from data.
information.
3. Data is the cause. 3. Information is the effect.
4. Data may be singular or plural. 4. Information is always in plural form.
5. It does not help in decision-making. 5. Decision can be taken on the basis of
information.
6. It is not able to provide any correct meaning 6. It provides a correct meaning.
before processing.
7. A set of words may be treated as data. 7. A sentence may be considered information.
8. It is fixed until processed. 8. It is semi-variable or variable.

Examples of Data and Information:

a) Pay – roll:
b) Invoice:
c) Marks of Candidates:

Computer Based Information Systems:

Information system can be manual or it can be operated by some machines like computers. When
information system is operated by any computer then it is called computer based information system.
The elements of computer based information systems are:
a) Hardware
b) Software
c) Database
d) People

1
GOBIND KUMAR JHA 9874411552
e) Procedure

Need of Information:

Information is needed:
 To gain knowledge about the surroundings and whatever is happening in the society and universe.
 To keep the system up to date.
 To know about the rules and regulations and bye laws of society, local government, provincial and
central government, associations, clients, etc. as ignorance is no bliss.

Business data processing:

Data Processing Definition:

A working definition of data processing usually includes all operations performed on data disclosure,
management, use and collection of data within a company. The strategic goal of data processing is to
convert raw data into meaningful information that improves a current situation or resolves an existing
problem. Data processing outputs often take various forms such as reports, diagrams and graphics that
make the data easier to understand and analyse.

Types of Data Processing:

There are three types of data processing are as follows:

a) Manual Data processing


b) Mechanical Data Processing
c) Electronic Data processing

Data Processing Cycle:

a) Input
b) Processing
c) Output
d) Interpretation
e) Feedback
f) Storage

Steps in Business Data Processing:

a) Editing
b) Coding
c) Data Entry
2
GOBIND KUMAR JHA 9874411552
d) Validation
e) Tabulation

Business Process Outsourcing (BPO):

BPO is a process in which one company hires another company to handle its own business activities.
Business process outsourcing (BPO) is the contracting of non-primary business activities and functions to a
third-party provider. BPO services include payroll, human resources (HR), accounting and customer/call
center relations.

Business process Outsourcing Services:

BPO services can be divided into back office outsourcing and front office outsourcing:

a) Back Office Outsourcing Services can include quality assurance, data entry, data management,
accounting support, payment processing and surveys.
b) Front Office Outsourcing Services can include fax, email, phone conversations and other forms of
communication with customers.
Companies will typically outsource BPO front office services in customer service/support, inbound and
outbound sales, market research, appointment scheduling and technical support.

BPO Solutions and Options:

BPO services can be contracted locally, in a nearly country, and an outside country.

a) Onshore Outsourcing: Onshore outsourcing (also called domestic outsourcing) is the obtaining of
services from someone outside a company but within the same country.
b) Nearshore Outsourcing: Nearshore outsourcing is the practice of getting work done or services
performed by people on neighboring countries rather than in your own country.
c) Offshore Outsourcing: Offshore outsourcing, a type of business process outsourcing, is the exporting
of IT related work from the United States and other developed countries to areas of the world where
there is both practical stability and lower labour costs or tax savings.

Business Process Outsourcing Benefits and Advantages:

a) Cost Reduction
b) Focus on your business
c) Improved productivity
d) Access to state of the art process and technology resources
e) Ability to reassign resources

3
GOBIND KUMAR JHA 9874411552

Knowledge Process Outsourcing (KPO):

Knowledge Process Outsourcing (KPO) is one-step extension of Business Process Outsourcing. Knowledge
Process may be defined as high added value process chain where the achievement of objective is highly
dependent on skills, domain knowledge and expertise of people out actually. Thus KPO involves transfer of
knowledge intensive business processes that require significant domain expertise to other geographical
locations. For global corporation looking to move their higher end research as market research, analytical
based services, IPR, legal services, pharmaceutical R & D, data mining services, etc.

Transaction Processing System (TPS):

A transaction process system (TPS) is an information processing system for business transactions involving
the collection, modification and retrieval of all transaction data. Characteristics of a TPS include
performance, reliability and consistency. TPS is also known as transaction processing or real time processing.

Management Information System (MIS):

MIS is the use of information technology, people, and business processes to record, store and process data
to produce information that decision makers can use to make day to day decisions.
MIS is the acronym for Management Information System. In a nutshell, MIS is a collection of systems,
hardware, procedures and people that all work together to process, store and produce information that is
useful to the organization.

Need of MIS:

a) Decision makers need information to make effective decisions


b) MIS systems facilitate communication within and outside the organization
c) Record keeping

Components of MIS:

 People – People who use the information system


 Data – The date that the information system records
 Business procedures – Procedures put in place on how to record, store and analyse data
 Hardware – These include servers, workstations, networking equipment, printers, etc.
 Software – These are programs used to handle the data. These include programs such as
spreadsheet programs, database software, etc.

4
GOBIND KUMAR JHA 9874411552
Decision Support Systems (DSS):

Decision support systems are used by top level managers to make semi-structured decisions. The output
from the Management Information System is used as input to the decision support system. DSS systems also
get data input from external sources such as current market forces, competition, etc.

Knowledge Management System (KMS):

Knowledge management systems refer to any kind of IT system that stores and retrieves knowledge,
improves collaboration, locates knowledge, captures and uses knowledge, or in some other way enhances
the KM process.

Purpose of KMS:

 Improved performance
 Competitive advantage
 Innovation
 Sharing of knowledge
 Integration
 Continuous improvement

Pyramid Diagram of Managerial Levels:

Understanding the various levels of an organization is essential to understand the information required by
the users who operate at their respective levels.
The following diagram illustrates the various levels of a typical organization:

5
GOBIND KUMAR JHA 9874411552
Operational Management Level:

The operational level is concerned with performing day to day business transactions of the organization.

Tactical Management Level:

This organization level is dominated by middle level managers, heads of departments, supervisors, etc. The
users at this level usually oversee the activities of the users at the operational management level.

Strategic Management Level:

This is the most senior level in an organization. The users at this level make unstructured decisions. Senior
level managers are concerned with the long-term planning of the organization. They use information from
tactical managers and external data to guide them when making unstructured decisions.

6
GOBIND KUMAR JHA 9874411552

MCQ Statement

1. Data can be defined as a representation of facts, concepts or instructions in a formalized manner, which
should be suitable for communication, interpretation or processing by human or electronic machine.
2. When data are processed, organized, structured or presented in a given context so as to make them
useful, they are called information.
3. Data themselves are fairly useless, but when these data are interpreted and processed to determine its
true meaning, they becomes useful and can be named as information.
4. Data is the raw material that can be processed by any computing machine. It can be represented in the
form of Numbers and words which can be stores in computer’s language.
5. Information is data that has been converted into a more useful or intelligible form. It is the set of data
that has been organized for direct utilization of mankind, as information helps human beings in their
decision making process.
6. Information is the processed data on which decisions and actions are based.
7. The elements of computer based information systems are database, hardware and software.
8. Pay slips, invoice, mar skeet, etc. are examples of information.
9. Database is an organized collection of facts and information, typically consisting of two or more related
data files.
10. Data processing usually includes all operations performed on data disclosures, management, use and
collection of data within a company.
11. Types of Data Processing are Manual Data Processing, Mechanical Data Processing, Electronic Data
Processing.
12. Manual Data processing is the “old-fashioned” way of doing it before the invention of calculator. Here
data processing is done “by hand”, the process is slow and all mistakes are due to “human error”.
13. Mechanical Data Processing results improved dramatically with the addition of typewriters and
calculators. However, speed and errors were still very much a function of “human operators”.
14. Electronic Data processing uses computers to facilitate processing requirements.
15. Input – Processing – Output – Interpretation is the correct sequence of data processing cycle.
16. Editing & Coding, Data Entry & Validation, Tabulation are steps in Business Data Processing.
17. Intra-organisational communication refers to internal memos, intranet, personal communication, and
team meetings.
18. The process of intra-personal communication involves the transmission of data/information/feelings
between the various senses or pathways.
19. Intra-organisational communication classifies communication that is internal within the organization; it
describes the use of company magazines or newsletters which are used as the communication channel.
20. Intranet communication is a form of communication channel using computer-based technology
harnessed by the organization to allow internal communication to take place – e.g., an internal email
network.
21. Inter-personal communication occurs between different companies, and would include official letters
and invoices, bills, proposals, etc.
22. Most of the organizations use Local Area Network (LAN) to establish intra-organisational communication.

7
GOBIND KUMAR JHA 9874411552
23. Most of the organizations use Wide Area Network (WAN) to establish inter-organisational
communication.
24. Inter-personal communication involves the exchange of message/information/data across
communication channel from one person to another or one group to another.
25. Inter-organisational communication describes communication between separate organizations.
26. Internet communication uses a computer-based system that is open to the users – e.g., World Wide
Web.
27. Business Process Outsourcing (BPO) is a process in which one company hires another company to handle
its own business activities.
28. BPO is the contracting of non-primary business activities and functions to a third-party provider.
29. BPO services includes Payroll, Account and customer/call center relations, Human resources.
30. BPO is also known as Information Technology Enabled Services (ITES).
31. Onshore outsourcing (also called domestic outsourcing) is the obtaining of services from someone
outside a company but within the same country.
32. Nearshore outsourcing is the practice of getting work done or services performed by people in
neighboring countries rather than in your own country.
33. Offshore outsourcing a type of business process outsourcing, is the exporting of IT related work from the
United States and other developed countries to areas of the world where there is both political and
lower labour costs or tax savings.
34. BPO offers cost reduction, focus on your business, improved productivity.
35. KPO is one-step extension of BPO.
36. KPO may be defined as high added value process chain where the achievement of objective is highly
dependent on skills, domain knowledge and expertise of people out actually.
37. KPO is the outsourcing of core, Information related business activities, meaning that knowledge and
information related work is carried out by workers in a different company or by a subsidiary of the same
organization.
38. KPO is the allocation of relatively high level tasks, to an outside organization or a different group in a
different geographic location.
39. Some challenges faced by KPO includes high initial investment, maintaining higher quality standard &
enhanced risk management, ensuring information security and confidentially of the client.
40. Transaction Processing System, Management Information System, Decision Support System &
Knowledge Management System are different types of Information system.
41. A Transaction Processing System (TPS) is an information processing system for business transactions
involving the collection, modification and retrieval of all transaction data.
42. Transaction Processing System is also known as transaction processing or real-time processing.
43. Payroll, inventory control, order entry, accounts payable, accounts receivable, etc. are examples of
Transaction Processing System.
44. Transaction Processing System are used to record day to day business transactions of the organization.
45. Point of Sale System, payroll systems, stock control systems, airline booking systems, etc. are examples
of Transaction Processing Outsourcing.
46. Management Information System is a collection of systems, hardware, procedure and people that all
work together to process, store and produce information that is useful to the organization.

8
GOBIND KUMAR JHA 9874411552
47. Decision makers need information to make effective decision, MIS systems facilitate communication
within and outside the organization, Record keeping are some of the justifications for having an MIS
system.
48. People, Data, Business Procedures, Hardware, Software, etc. are the major components of a typical
Management Information System.
49. Management Information System are used by tactical managers to monitor the organisation’s current
performance status.
50. Sales management systems, Budgeting systems, Human resource management system, etc. are
examples of Management Information System.
51. The output from a transaction processing system is used as input to a Management Information System.
52. Decision Support System are used by top level managers to make semi-structured decisions.
53. The output from the Management Information System is used as input to the Decision Support System.
54. Decision Support System is a computerized information system used to support decision making in an
organization or a business.
55. A decision support system can be used by operations management and planning levels in an organization
to compile information and data and synthesize it into actionable intelligence. This allows the end user
to make more informed decisions at a quicker pace.
56. Decision Support System are used by senior management to make non-routine decisions.
57. Financial planning systems, bank loan management systems, etc. are examples of Decision Support
System.
58. Knowledge Management System is a system for applying and using knowledge management principles.
59. Knowledge Management System refer to any king of IT system that stores and retrieves knowledge,
improves collaboration, locates knowledge sources, mines repositories for hidden knowledge, captures
and uses knowledge.
60. Knowledge Management System includes data-driven objectives around business productivity, a
competitive business model, business intelligence analysis and more.
61. A Knowledge Management System is an application designed to capture all the information within your
organization and make it easily available to your employees, anywhere, anytime.
62. Knowledge Management System comprises a range of practices used in an organization to identify,
create, represent, distribute and enable adoption to insight and experience.
63. Tangible benefits of using KMS includes improved performance, competitive advantage, innovation.
64. Purpose of KMS include improved performance, competitive advantage, innovation.
65. The Operational Management Level concerned with performing day to day business transaction of the
organization.
66. Examples of users at Operational Management Level of management include cashiers at a point of sale,
bank tellers, nurses in a hospital, customer care staff, etc.
67. Users at Operational Management Level user make structured decisions. This means that they have
defined rules that guides them while making decisions.
68. Tactical Management Level is dominated by middle level managers, heads of departments, supervisors,
etc. The users at this level usually oversee the activities of the users at the operational management
level.
69. Users of Tactical Management Level make semi-structured decisions.

9
GOBIND KUMAR JHA 9874411552
70. Strategic Management Level is the most senior level in an organization. The users make unstructured
decisions.

10
GOBIND KUMAR JHA 9874411552

Unit – 2
Data Organisation and Data Base Management System
[10 Marks]

Data Organisation:

Data organization, in broad terms, refers to the method of classifying and organizing data sets to make them
more useful. Some IT experts apply this primary to physical records, although some types of data
organization can also be applied to digital records.

Hierarchy of Data: Character, field, record, file and database:

Data are the principal resources of an organization. Data stored in computer systems form a hierarchy
extending from a single bit to a database, the major record-keeping entity of a firm. Each higher rung of this
hierarchy is organized from the components below it.
Data are logically organized into:
1. Bits (characters)
2. Fields
3. Records
4. Files
5. Databases

1. Bit (Character) – a bit is the smallest unit of data representation (value of a bit may be a 0 or 1). Eight
bits make a byte which can represent a character or a special symbol in a character code.
2. Field – a field consists of a grouping of characters. A data field represents an attribute (a characteristic
or quality) of some entity (object, person, place or event).
3. Record – a record represents a collection of attributes that describe a real-world entity. A record
consists of fields, with each field describing an attribute of the entity.
4. File – a group of related records. Files are frequently classified by the application for which they are
primarily used (employee file). A primary key in a file is the field (or fields) whose value identifies a
record among others in a data file.
5. Database – is an integrated collection of logically related records or files. A database consolidates
records previously stored in separate files into a common pool of data records that provides data for
many applications. The data is managed by systems software called database management systems
(DBMS). The data stored in a database is independent of the application programs using it and of the
types of secondary storage devices on which it is stored.

11
GOBIND KUMAR JHA 9874411552
Types of data processing systems:

a) Serial,
b) Batch,
c) Real-time,
d) Online,
e) Centralized,
f) Distributed

Serial Processing:

The Serial Processing Operating Systems are those which performs all the instructions into a Sequence
Manner or the instructions those are given by the user will be executed by the FIFO Manner means First In
First Out.

Batch Processing:

The Batch Processing is same as the Serial Processing Technique. But in the Batch Processing similar types of
jobs are firstly prepared and they are stores on the Card and that card will be submit to the system for the
processing.

Real Time Processing:

As the name suggests this method is used for carrying out real-time processing. This is required where the
results are displayed immediately or in lowest time possible.

Online Processing:

This processing method is a part of automatic processing method. This method at times known as direct or
random access processing. Under this method the job received by the system is processed at same time of
receiving. This can be considered and often mixed with real-time processing. This system features random
and rapid input of transaction and user defied/demanded direct access to data bases/content when needed.

Centralized Processing:

Centralized Processing performed in one computer or in a cluster of coupled computers in a single location.
Access to the computer is via “dumb terminals,” which send only input and receive output or “smart
terminals,” which ass screen formatting. All data processing is performed in a central computer.

12
GOBIND KUMAR JHA 9874411552
Distributed Processing:

Distributed means data is stored and processed on Multiple Locations. When a data is stored on to the
Multiple Computers, those are places in different locations. Distributed means in the network, network
collections of computers are connected with each other.

File Organisations:

Data files are organized so as to facilitate access to records and to ensure their efficient storage. A trade off
between these two requirements generally exists. If rapid access is required, more storage is required to
make it possible.
Access to a record for reading it is the essential operation on data. There are two types of access:

1. Sequential access – is performed when records are accessed in the order they are stored. Sequential
access is the main access mode only in batch systems, where files are used and updated at regular
intervals.
2. Direct access – online processing requires direct access, whereby a record can be accessed without
accessing the records between it and the beginning of the file. The primary key serves to identify the
needed record.

There are four methods of file organization:


1. Sequential organization
2. Indexed-sequential organization
3. Direct organization
4. Relative organization

Indexed-sequential file organization:

This is an advanced sequential file organization method. Here records are stored in order to primary key in
the file. Using the primary key, the records are sorted. For each primary key, an index value is generated and
mapped with the record.

Direct file organization:

Direct file organization provides the fastest direct access to records. When using direct access methods,
records do not have to be arranged in any particular sequence on storage media. Characteristics of the
direct access method include:
a) Computers must keep track of the storage location of each record using a variety of direct
organization methods so that data can be retrieved when needed.
b) New transactions data do not have to be sorted.

13
GOBIND KUMAR JHA 9874411552
c) Processing that requires immediate responses or updating is easily performed.

Relative file organization:

A relative file consists of records by their relative address, following are the key attributes of relative file
organization: -
 Records can be read in sequential order just like in sequential and indexed file organization.
 Records can be accessed using relative key. Relative key represents the record’s location relative to
the address of the start of the file.
 Records can be inserted using relative key. Relative address is calculated using relative key.
 Relative file provides the fastest access to the records.
 The main disadvantage of this file system is that if some intermediate records are missing, they will
also occupy space.

Concept of Data, Database System:

What is Data:

By data, we mean known facts that can be recorded and that have implicit meaning. Consider the names,
telephone numbers, addresses of the people you know. We may record this data in an indexed address book
or diskette using a personal computer and software such as FoxPro, Excel and Access, etc.

What is Database:

It is fair to say that databases will play a critical role in almost all areas where computers are used including
business, engineering, law, education and library science, etc. The term database is a collection of related
data with an implicit meaning.

Concept of DBMS: Definition, Importance:-

What is DMBS (Database Management System):

A DBMS is a collection of programs that enables users to create and maintain a database. A DBMS is hence a
general purpose software that facilitates the process of defining, constructing and manipulating databases
for various applications.

Advantages of DBMS:

a) It represents complex relationships among different data items.


b) Keeps a tight control on data redundancy.

14
GOBIND KUMAR JHA 9874411552
c) Enforces user defined rules to ensure the integrity of data in a table form.
d) Maintains data dictionary for all storage of information pertaining to data fields and data
manipulation.
e) Ensures that data can be shares across all applications.
f) Enforces data access authorization.

Entity:

An entity is a thing or object in the real world that is distinguishable from all other objects. It is an object of
interest to an organization. Example –
Each person in an enterprise
Each student in the institute
Loan in bank, etc.

Attribute:

A characteristic or trait of an entity type that describes the entity, for example, the Person entity type has
the Date of Birth attribute.
An attribute values describing an entity will constitute a significant portion of the data stored in the
database.

Keys – Primary, Foreign and Candidate:

A key is a single attribute or combination of two or more attributes of an entity set that is used to identify
one or more instance of the set.

Primary Key:

The attribute of entity set which identifies and distinguishes instances of entity set is called primary key. If
we add additional attributes to a primary key, the resulting combination would still uniquely identify an
instance of the entity set. Primary keys are used to identify tables. There is only one primary key per table.

Candidate Keys:

Candidate keys are those keys which is candidate for primary key of a table. In simple words we can
understand that such type of keys which full fill all the requirements of primary key which is not null and
have unique records is a candidate for primary key. So thus type of key is known as candidate key. Every
table must have at least one candidate key but at the same time can have several.

15
GOBIND KUMAR JHA 9874411552
Foreign Keys:

Foreign keys are those keys which is used to define relationship between two tables. When we want to
implement relationship between two tables then we use concept of foreign key. It is also known as
referential integrity.

Alternate Key:

If any table have more than one candidate key, then after choosing primary key from those candidate key,
rest of candidate keys are known as an alternate key of that table.

Referential Integrity:

Referential integrity refers to the accuracy and consistency of data within a relationship.
In relationships, data is linked between two or more tables.

Table:

In relational database model, a table is a collection of data elements organized in terms of rows and
columns. A table is also considered as a convenient representation of relations. But a table can have
duplicate row of data while a true relation cannot have duplicate data. Table is the most suitable form of
data storage.

Data Dictionary:

A data dictionary is a collection of description of the data objects or items in a data model for the benefit of
programmers and others who need to refer to them.

Data Mining:

Data mining (also called data or knowledge discovery) is the process of analysing data from different
perspective and summarizing it into useful information which can be used to increase revenue, cut costs or
both.

Data Warehousing:

When companies centralize their data into one database or program, it is called data warehousing. With a
data warehouse, an organization may spin off segments of the data for specific users to analyse and utilize.

16
GOBIND KUMAR JHA 9874411552
Benefits of Data Warehousing:

a) Potential high returns on investment


b) Competitive advantage
c) Increased productivity of corporate decision-makers
d) More cost-effective decision making
e) Better enterprise intelligence

Problems of Data Warehousing:

a) Underestimation of resources of data loading


b) Hidden problems with source systems
c) Required data not captured
d) Increased end-user demands
e) High demand for resources
f) Data homogenization
g) Data ownership
h) High maintenance
i) Long-duration projects
j) Complexity of integration

Advantages of Data Mining:

a) Marketing/retail
b) Finance/banking
c) Manufacturing
d) Governments

Disadvantages of Data Mining:

a) Privacy issues
b) Security issues
c) Misuse of information/inaccurate information

Big data analysis – Concept:

Big data analysis is the process of examining large and varied data sets i.e., big data – to uncover hidden
patterns, unknown correlations, market trends, customer preferences and other useful information that can
help organizations make more informed business decisions.

17
GOBIND KUMAR JHA 9874411552

MCQ statement

1. Data organization in broad terms, refers to the method of classifying and organizing data sets to make
them more useful.
2. Bits is the smallest unit of data representation (value of it may be a 0 or 1).
3. Eight bits make a byte (character).
4. Fields consists of a grouping of characters.
5. Records represents a collection of attributes that describe a real world entity. A record consists of fields,
with each field describing an attribute of the entity.
6. Files is a group of related records and are frequently classified by the application for which they are
primarily used.
7. Database is an integrated collection of logically related records or files.
8. A database consolidates records previously stored in separate files into a common pool of data records
that provides data for many applications.
9. The data is managed by systems software called Database Management Systems.
10. Data processing can be understood as the conversion of raw data to meaningful information through a
process.
11. The Serial Processing Operating Systems are those which performs all the instructions into a Sequence
Manner or the Instructions those are given by the user will be executed by using the FIFO Manner means
First In First Out.
12. In the batch processing operating systems, similar types of jobs are firstly prepared and they are stored
on the card and that card will be submit to the system for the processing.
13. Real time processing operating systems are required where the results are displayed immediately or in
lowest time possible.
14. Banking system, tickets booking for flights, trains, movie tickets, rental agencies, etc. are example of real
time processing.
15. Online processing method is a part of automatic processing method. This method at times known as
direct or random access processing. Under this method the job received by the system is processed at
same time of receiving.
16. Centralized processing performed in one computer or in a cluster computers in a single location.
17. Under distributed processing operating system data is stored and processed on multiple locations.
18. Sequential organization, indexed-sequential organization, direct organization, relative organization are
the four methods of file organization.
19. Sequential organization consists of records that are stored and accessed in sequential order.
20. Records can be read in sequential order, records are written in sequential order, it is not possible to
delete, shorten or lengthen a record are the key attributes of sequential file organization.
21. Under sequential organization a new record is always inserted at the end of the file.
22. Under indexed-sequential organization records are stored in order to primary key in the file. Using the
primary key, the records are sorted. Direct access is also possible.
23. Records can be read in sequential, records can be accessed randomly if the primary key is known, sorted
index is maintained in this file system are the key attributes of sequential file organization.
18
GOBIND KUMAR JHA 9874411552
24. Under direct organization filing method, records do not have to be arranged in any particular sequence
on storage media.
25. Under relative organization file organization, a relative file consists of records ordered by their relative
address.
26. Records can be read in sequential order, records can be assessed using relative key, records can be
inserted using relative key are the key attributes of relative file organization.
27. Database is collection of interrelated data, set of programs to access the data, DBMS contains
information about a particular enterprise.
28. A DBMS (Database Management System) is a collection of programs that enables users to create and
maintain a database.
29. A DBMS is hence a general purpose software system that facilitates the process of defining, constructing
and manipulating databases for various applications.
30. The DBMS interfaces with application programs so that the data contained in the database can be used
by multiple applications and users.
31. The DBMS allows these users to access and manipulate the data contained in the database in a
convenient and effective manner.
32. The DBMS exerts centralized control of the database, prevents unauthorized users from accessing the
data and ensures privacy of data.
33. The advantages of DBMS are: it represents complex relationships among different data items, keeps a
tight control on data redundancy, enforces user defined rules to ensure the integrity of data in a table
form.
34. An entity is a thing or object in the real world that is distinguishable from all other objects. It is an object
of interest to an organization.
35. An entity set is a set of entities of the same type that share the same properties or attributes.
36. An attribute values describing an entity will constitute a significant portion of the data stored in the
database.
37. Characteristic or trait of an entity type that describes the entity is called attribute.
38. In a database management system, an attribute refers to a database component, such as a table. It also
may refer to a database field.
39. A key is a single attribute or combination of two or more attributes of an entity set that is used to
identify one or more instances of the set.
40. The attribute of entity set which identifies and distinguishes instances of entity set is called primary key.
41. Candidate key fulfill all the requirements of primary key which is not null and have unique records.
42. Foreign key are those keys which is used to define relationship between two tables.
43. Foreign key is also known as referential integrity.
44. If any table have more than one candidate key, then after choosing primary key from those candidate
key, rest of candidate keys are known as an _______ of that table.
45. Referential integrity refers to the accuracy and consistency of data within a relationship.
46. In relational database model, a table is a collection of data elements organized in terms of rows and
columns.
47. A view is a subset of a database that is generated from a query and stored as a permanent object.
48. View represent a subset of the data contained in a table.

19
GOBIND KUMAR JHA 9874411552
49. A data dictionary is a collection of descriptions of the data objects or items in a data model from the
benefit of programmers and others who need to refer to them.
50. A data dictionary is a data structure that stores data about data.

20
GOBIND KUMAR JHA 9874411552

Unit – 3
Internet and Its Applications [8 Marks]

Meaning of Internet:

The internet is a globally connected network system that uses TCP/IP to transmit data via various types of
media. The internet is a network of global exchanges – including private, public, business, academic and
government networks – connected by guided, wireless and fiber-optic technologies.
The terms internet and World Wide Web are often used interchangeably, but they are not exactly the same
thing; the internet refers to the global communication system, including hardware and infrastructure, while
the web is one of the services communicated over the internet.

Creator of Internet:

The internet began in 1969 as a research project funded by the Department of Defense with a goal of
creating a means of communication beside telephone lines. The first network was called ARPANET
(Advanced Research Project Agency NETwork).

Advantages of Internet:

a) Information, knowledge and learning.


b) Connectivity, communication and sharing
c) Address, mapping and contact information
d) Banking, bills and shopping
e) Selling and making money
f) Collaboration, work from home and access to a global workforce
g) Donations and funding
h) Entertainment
i) Cloud computing and cloud storage

Disadvantages of Internet:

a) Bullying, trolls, stalkers and crime


b) Exploitation and pornography and violent images
c) Addiction, time waster and causes distractions
d) Never being able to disconnect
e) Identity theft, hacking, viruses and cheating
21
GOBIND KUMAR JHA 9874411552
f) Spam and advertising
g) Affects focus and patience
h) Depression, loneliness and social isolation
i) Health issues and obesity
j) Buying things not needed

Internet Protocol address (IP address):

An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a
computer network that uses the Internet Protocol for communication. An IP address serves two principal
functions: host or network interface identification and location addressing.

Uses of IP address:

An IP address provides an identity to a networked device. Similar to a home or business address supplying
that specific physical location with an identifiable address, devices on a network are differentiated from one
another through IP addresses.

Internet Protocol Version 4:

IPv4 is the forth revision of the Internet Protocol used to identify devices on a network through an
addressing system. The internet protocol is designed for use in interconnected systems of packet-switched
computer communication networks.

Internet Protocol Version 6:

A new internet addressing system internet protocol version 6 is being deployed to fulfill the need for more
internet addresses.
IPv6 is also called IPng (Internet Protocol next generation) and it is the newest version of the internet
protocol reviewed in the IETF standards committees to replace the current version of IPv4.

Difference between IPv4 and IPv6:

An IP address is binary numbers but can be stored as text for human readers. For example, a 32 bit numeric
address is written in decimal as four numbers separated by periods. Each number can be zero to 255. For
example, 1.160.10.240 could be an IP address.

22
GOBIND KUMAR JHA 9874411552
Uniform Resource Locator (URL):

A uniform resource locator colloquially termed a web address, is a address, is a reference to a web resource
that specifies its location on a computer network and a mechanism for retrieving it. A URL is a specific type
of uniform resource identifier, although many people use the two terms interchangeable.

URL Types:

There are two forms of URL as listed below:


a) Absolute URL;
b) Relative URL.

a) Absolute URL:

Absolute URL is a complete address of a resource on the web. This completed address comprises of
protocol used, server name, path name and file name. For example –
FTP
https
Gopher
mailto
news

b) Relative URL:

Relative URL is a partial address of a webpage. Unlike absolute URL, the protocol and server part are
omitted from relative URL.

Domain Name System (DNS):

DNS stands for “Domain Name System”. Domain names serve as memorisable names for websites and other
services on the internet. However, computers access internet devices by their IP addresses. DNS translates
domain names into IP addresses, allowing you to access an internet location by its domain name.

Internet Protocol (IP):

When computers communicate with each other, there needs to be a common set of rules and instructions
that each computer follows. A specific set of communication rules is called a protocol. Because of the many
ways computers can communicate with each other, there are many different protocols – too many for the
average person to remember.

23
GOBIND KUMAR JHA 9874411552
File Transfer Protocol (FTP):

File Transfer Protocol is a client/server protocol used for transferring files to or exchanging files with a host
computer. It may be authenticated with user names and passwords. Anonymous FTP allows users to access
files, programs and other data from the internet without the need for a user ID or password.

Telnet (TN):

Telnet is a user command and an underlying TCP/IP protocol for accessing remote computers. Through
Telnet, an administrator or another user can access someone else’s computer remotely. On the web, HTTP
and FTP protocols allow you to request specific files from remote computers, but not to actually be logged
on as a user of that computer.

Hyper Text Markup Language (HTML):

 HTML is the standard markup language for creating Web pages.


 HTML stands for Hyper Text Markup Language.
 HTML describes the structure of Web pages using markup.
 HTML elements are the building blocks of HTML pages
 HTML elements are represented by tags
 HTML tags label pieces of content such as “heading”, “paragraph”, “table” and so on.
 Browsers do not display the HTML tags, but use them to render the content of the oage.

Dynamic Hyper Text Markup Language (DHTML):

DHTML is a combination of web development technologies used to create dynamically changing websites.
Web pages may include animation, dynamic menus and text effects.

Extensible Markup Language (XML):

XML is used to describe data. The XML standard is a flexible way to create information formats and
electronically share structured data via the public internet, as well as via corporate networks.

Ethical Hacking:

Ethical hacking and ethical hacker are terms used to describe m=hacking performed by a company or
individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass
system security and search for any weak points that could be exploited by malicious hackers.

24
GOBIND KUMAR JHA 9874411552
Cloud Computing:

Cloud computing is the use of various services, such as software development platforms, servers, storage
and software, over the internet, often referred to as the “cloud”.

Mobile Computing:

Mobile computing refers to the interaction between a human and a computer that takes place during
transportation. This is done through mobile devices such as phones and handhelds. Mobile computing
involves communication, hardware and software that are all mobile.

Mobile Hardware:

Mobile hardware includes mobile devices or device components that receive or access the service of
mobility. They would range from portable laptops, smartphones, tablet, pc’s, Personal Digital Assistants.

Internet of Things (IoT):

The internet of things is a computing concept that describes the idea of everyday physical objects being
connected to the internet and being able to identify themselves to other devices.

Ethical Issues in Social Networking:

a) Privacy: The internet contains wealth of data and it is always a serious subject of concern for privacy
issues in social networking sites.
b) Free speech: Here everyone has the right to freedom of opinion and expression.
c) Data Leakage: Data security and protection is expensive and difficult.
d) Identity Theft: Identity theft is one from many examples of ethical issues in social networking.

25
GOBIND KUMAR JHA 9874411552

MCQ Statement

1. The internet is a globally connected network system that uses TCP/IP to transmit data via various types
of media.
2. The internet is a worldwide system of connected networks. Each network consists of millions of
computers, servers, routers, and printers.
3. The first network was called internet.
4. An Internet Protocol Address (IP address) is a numerical label assigned to each device connected to a
computer network that uses the Internet Protocol for communication.
5. Internet Protocol address is a unique address that identifies a device on the Internet or a local network.
It allows a system to be recognized by other systems connected via the Internet protocol.
6. An IP address provides an identity to a networked device.
7. IPv4 is the fourth revision of internet protocol used to identify devices on a network through an
addressing system.
8. IPv4 uses a 32-bit address scheme allowing for a total of 232 addresses.
9. An IPv4 address consist of four sets of numbers from 0 to 255, separated by three dots.
10. A new internet addressing system internet protocol versions 6 is being deployed to fulfill the need for
more internet addresses.
11. IPv6 is the successor to internet protocol version 4.
12. A URL colloquially termed a web address, is a reference to a web resource that specifies its location on a
computer network and a mechanism for retrieving it.
13. A URL indicates the location of a resource as well as the protocol used to access it.
14. URL is also known as a Universal Resource Locator or web address.
15. Domain Name serve as memorisable names for websites and other services on the internet.
16. Domain Name System translates domain names into IP addresses, allowing you to access an Internet
location by its domain name.
17. You can visit a website by typing in the domain name rather than the IP address.
18. TCP/IP is the foundation of the internet.
19. TCP/IP is the language a computer uses to access the internet.
20. TCP/IP is not a single networking protocol – it is a suite of protocols named after the two most important
protocols or layers within it.
21. User Datagram Protocol (UDP) is part of the Internet Protocol suite used by programs running on
different computers on a network.
22. User Datagram Protocol is used to send short messages called datagrams but overall, it is an unrealizable
connectionless protocol.
23. Mobile Computing refers to the interaction between a human and a computer that takes place during
transportation.
24. The main concept of mobile computing involves mobile communication, mobile hardware, mobile
software.

26
GOBIND KUMAR JHA 9874411552
25. Mobile hardware includes mobile devices or device components that receive or access the service of
mobility.
26. Portable laptops, smartphones, tablet Pc’s, Personal Digital Assistants etc are examples of mobile
hardware.
27. Mobile software is the actual program that runs on the mobile hardware.
28. The Internet of Things refers to a network comprised of physical objects capable of gathering and sharing
electronic information.
29. Ethical issues in social networking are privacy, data leakage, identity theft.

27
GOBIND KUMAR JHA 9874411552

Unit – 4
Security and Encryption [8 Marks]

E-Commerce – Security Systems:

a) Confidentiality:

b) Integrity:

c) Availability:

d) Authenticity:

e) Non-Repudiability:

f) Encryption:

g) Auditability:

Measures to ensure security:

a) Encryption:

b) Digital Signature:

c) Security Certificates:

28
GOBIND KUMAR JHA 9874411552
Encryption:

Encryption is the process of using an algorithm to transform information to make it unreadable for
unauthorized users. This cryptographic method protects sensitive data such as credit card numbers by
encoding and transforming information into unreadable cipher text. This encoded data may only be
decrypted or made readable with a key. Symmetric key and asymmetric key are the two primary types of
encryption. Encryption is essential for ensured and trusted delivery of sensitive information.

Need of Encryption:

In computing, encryption is the method by which plaintext or any other type of data is converted from a
readable form to an encoded version that can only be decoded by another entity if they have access to a
decryption key. Encryption is one of the most important methods for providing data security, especially for
end-to-end protection of data transmitted across networks.

Dimensions of E-Commerce Security:

a) Integrity:

b) Non-repudiation:

c) Authenticity:

d) Confidentiality:

e) Privacy:

f) Availability:

29
GOBIND KUMAR JHA 9874411552
E-Commerce Security:

E-commerce security refers to the principles which guide safe electronic transactions, allowing the buying
and selling of goods and services though the internet, but with protocols in place to provide safety for those
involved. Successful business online depends on the customers’ trust that a company has E-Commerce
security basics in place.

Threat:

A threat, in the context of computer security, refers to anything that has the potential to cause serious harm
to a computer system. A threat is something that may or may not happen, but has the potential to cause
serious damage. Threats can lead to attacks on computer systems, networks and more.

Malicious Codes (Virus, Trojan Horse, Worm, Spyware, Ransomware):

Malicious code is the term used to describe any code in any part of a software system or script that is
intended to cause undesired effects, security breaches or damage to a system. Malicious code describes a
broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses,
backdoors, and malicious active content.

Virus:

A computer virus is a type of malicious software that, when executed, replicates itself by modifying other
computer programs and inserting its own code.

Types of viruses:

a) File infectors:

b) Macro viruses:

c) Overwrite viruses:

d) Polymorphic viruses:

30
GOBIND KUMAR JHA 9874411552
e) Resident viruses:

f) Rootkit viruses:

g) System or boot-record infectors:

Hacking:

Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a
wide range of topics. The first known event of hacking had taken place in 1960 at MIT and at the same time,
the term “hacker” was originated.
Hacking is the act of finding the possible entry points that exist in a computer system or a computer network
and finally entering into them. Hacking is usually done to gain unauthorized access to a computer system or
a computer network, either to harm the systems or to steal sensitive information available on the computer.

Types of hacking:

a) Website Hacking:

b) Network Hacking:

c) Email Hacking:

d) Ethical Hacking:

e) Password Hacking:

f) Computer Hacking:

31
GOBIND KUMAR JHA 9874411552
Trojan Horse:

In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious. Unexpected
changes to computer settings and unusual activity, even when the computer should be idle, are strong
indications that a Trojan is residing on a computer.

Worm:

A worm is a type of malicious software that replicates while moving across computers, leaving copies of
itself in the memory of each computer in its path.

Spyware:

Spyware is software is installed on a computing device without the end user’s knowledge. Such software is
controversial because even though it is sometimes installed for relatively innocuous reason, it can violate
the end user’s privacy and has the potential to be abused.

Ransomware:

Ransomware is a type of malware program that infects, locks or takes control of a system and demands
ransom to undo it. Ransomware attacks and infects a computer with the intention of extorting money from
its owner. Ransomware may also be referred to as a crypto-virus, crypto-Trojan or crypto-worm.

Spoofing:

Spoofing, in general, is a fraudulent or malicious practice in which communication is sent from an unknown
source disguised as a source known to the receiver. Spoofing is most prevalent in communication
mechanism that lack a high level of security.

Spoofing Attack:

A spoofing attack is when a malicious party impersonates another device or user on a network in order to
launch attacks against network hosts, steal data, spread malware or bypass access controls. There are
several different types of spoofing attacks that malicious parties can use to accomplish this. Some of the
most common methods include IP address spoofing attacks, ARP spoofing attacks and DNS server spoofing
attacks.

32
GOBIND KUMAR JHA 9874411552
Sniffing:

A packet sniffer is a utility that has been used since the original release of Ethernet. Packet sniffing allows
individuals to capture data as it is transmitted over a network. This technique is used by network
professionals to diagnose network issues, and by malicious users to capture unencrypted data, like
passwords and usernames. If this information is captured in transmit, a user can gain access to a system or
network.

Phishing:

Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or
other communication channels. The attacker uses phishing emails to distribute malicious links or
attachments that can perform a variety of functions, including the extraction of login credentials or account
information from victims.

Spamming:

Email spam, also known as junk email, is a type of electronic spam where unsolicited messages are sent by
email.
Many email spam messages are commercial in nature but may also contain disguised links that appear to be
for familiar websites but in fact lead to phishing web sites or sites that are hosting malware. Spam email may
also include malware as scripts or other executable file attachments (Trojan).
A spammer typically sends an email to millions of email addresses, with the expectation that only a small
number will respond or interact with the message.

Denial of Service Attack:

A denial of service is any type of attack where the attackers (hackers) attempt to prevent legitimate users
from accessing the service. In a DoS attack, the attacker usually sends excessive messages asking the
network or server to authenticate requests that have invalid return addresses. The network or server will
not be able to find the return address of the attacker when sending the authentication approval, causing the
server to wait before closing the connection. When the server closes the connection, the attacker sends
more authentication messages with invalid return addresses. Hence, the process of authentication and
server wait will begin again, keeping the network or server busy.

Problems of DoS attacks:

a) Ineffective services
b) Inaccessible services
c) Interruption of network traffic

33
GOBIND KUMAR JHA 9874411552
d) Connection interference

Information Technology Solutions:

An information technology solution is a set of related software program and/or services that are sold as a
single package. IT vendors, service providers and value-added resellers market their software suites and
service bundle under the label solution to promote the idea that purchasing the product will help the
customer successfully solve a problem or deal with a complicated situation.

Confidentiality:

Confidentiality, in the context of computer systems, allows authorized users to access sensitive and
protected data. Specific mechanisms ensure confidentiality and safeguard data from harmful intruders.
Confidentiality is roughly equivalent to privacy.

Encryption:

Encryption refers to converting the message into a code so that unauthorized person may not understand it.

Decryption:

Decryption is the process of converting encrypted data back into its original form, so that it can be
understood.

Firewall:

A firewall is a system designed to prevent unauthorized access to or from a private network. You can
implement a firewall in either hardware or software form, or a combination of both. Firewalls prevent
unauthorized internet users from accessing private networks connected to the internet, especially intranets.
All messages entering or leaving the intranet (i.e., the local network to which you are connected) must pass
through the firewall, which examines each message and blocks those that do not meet the specified security
criteria.

Demilitarized Zone (DMZ):

Ina computer networks, a DMZ, also sometimes known as a perimeter network or a screened sub network, is
a physical or logical subnet that separates an internal local areas network (LAN) from other untrusted

34
GOBIND KUMAR JHA 9874411552
networks, usually the internet. External-facing servers, resources and services are located in the DMZ. So,
they are accessible from the internet, but the rest of the internal LAN remains unreachable. This provides an
additional layer of security to the LAN as it restricts the ability of hackers to directly access internal servers
and data via the internet.

Secure Sockets Layer (SSL):

SSL stands for Secure Sockets Layer and, in short, it’s the standard technology for keeping an internet
connection secure and safeguarding any sensitive data that is being sent between two systems, preventing
criminals from reading and modifying any information transferred, including potential personal details. The
two systems can be a server and a client (for example, a shopping website and browser) or server to server
(for example, an application with personal identifiable information or with payroll information).

HTTPs:

HTTPs (Hyper Text Transfer Protocol Secure) appears in the URL when a website is secured by an SSL
certificate. The details of the certificate, including the issuing authority and the corporate name of the
website owner, can be viewed by clicking on the lock symbol on the browser bar.

Purpose of a website audit:

The purpose of a website audit is to aid webmasters or owners in the understanding of the functional areas
and components of a website’s performance on the internet. This audit is very important to your online
campaign.

35
GOBIND KUMAR JHA 9874411552

MCQ Statement

1. Confidentiality & authenticity, integrity & non-repudiability, availability & auditability are the essential
requirements for safe e-payments/transactions.
2. Major security measures are encryption, digital signature and security certificates.
3. A digital signature is an e-signature authenticated through encryption and password.
4. Security certificates is a unique digital id used to verify the identity of an individual websites or user.
5. Encryption is the process of using an algorithm to transform information to make it unreadable for
unauthorized users.
6. Encryption is the process of encoding data, making it unintelligible and scrambled.
7. Encryption is the method by which plaintext or any other type of data is converted from a readable form
to an encoded version that can only be decoded by another entity if they have access to a decryption
key.
8. E-commerce security refers to the principles which guide safe electronic transactions.
9. The key dimensions of e-commerce security are confidentiality & authenticity, Integrity & non-
repudiability, Availability & auditability.
10. A security threat in the context of computer security, refers to anything that has the potential to cause
serious harm to a computer system.
11. A security threat is something that may or may not happen, but has the potential to cause serious
damage. It can lead to attacks on computer systems, networks and more.
12. A computer virus is malicious code that replicates by copying itself to another program, computer boot
sector or document and changes how a computer works.
13. A Trojan horse is a program that appears harmless, but is, in fact, malicious.
14. Trojan horse is not able to replicate itself, nor can it propagate without an end user’s assistance.
15. A denial of service attack is any type of attack where the attackers attempt to prevent legitimate users
from accessing the service.

36
GOBIND KUMAR JHA 9874411552

Unit – 5
IT Act, 2000 and Cyber Crimes [6 Marks]

37
GOBIND KUMAR JHA 9874411552

38
GOBIND KUMAR JHA 9874411552

39
GOBIND KUMAR JHA 9874411552

MCQ Statement

1. Information Technology Act, 2000 was passed in the budget session of 2000 and signed by President K.R.
Narayanan on 9 May, 2000.
2. Information Technology Act, 2000 was enacted from 9 June, 2000.
3. Information Technology Act, 2000 was commence from 17 October, 2000.
4. “Information Technology Act, 2000” laws apply to the Whole of India.
5. Information Technology Act, 2000 is the primary law in India dealing with cybercrime and electronic
commerce.
6. Information Technology Act, 2000 is an act to provide legal recognition for transactions carried out by
means of electronic data interchange and other means of electronic communication, commonly referred
to as “electronic commerce”.
7. Access with its grammatical variations and cognate expressions means gaining entry into, instructing or
communicating with the logical, arithmetic, or memory function resources of a computer, computer
system or computer network.
8. Addressee means a person who is intended by the originator to receive the electronic record but does
not include any intermediary.
9. Affixing digital signature with its grammatical variations and cognate expression means adoption of any
methodology or procedure by a person for the purpose of authenticating an electronic record by means
of digital signature.
10. Asymmetric crypto system means a system of a secure key pair consisting of a private key for creating a
digital signature and a public key to verify the digital signature.
11. Computer resource means computer, computer system, computer network, data, computer data base or
software.
12. Digital signature means authentication of any electronic record by a subscriber by means of an electronic
method or procedure in accordance with the provisions of section 3.
13. Electronic Gazatte means the Official Gazatte published in the electronic form.
14. Information includes data, text, images, sound, voice, codes, computer programmes, software and
databases or micro film or computer generated micro fiche.
15. Intermediary with respect to any particular electronic message means any person who on behalf of
another person receives, stores or transmits that message or provides any service with respect to that
message.
16. Private key means the key of a key pair used to create a digital signature.
17. Public key means the key of a key pair used to verify a digital signature and listed in the Digital Signature
Certificate.
18. Secure system means computer hardware, software, and procedure that are reasonably secure from
unauthorized access and misuse.
19. Subscriber means a person in whose name the Digital Signature Certificate is issued.
20. Controller means the Controller of Certifying Authorities appointed under sub section (I) of section.

40
GOBINd kumar JHA 9874411552

B. Com. (Semester – III)


IT Unit – V
IT Act, 2000 and Cyber Crimes
Background:

The bill was passed in the budget session of 2000 and signed by President K. R. Narayanan on 9 May 2000. The bill was
finalised by group of officials headed by then Minister of Information Technology Pramod Mahajan.

Summary:

The original Act contained 94 sections, divided in 13 chapters and 4 schedules. The laws apply to the Whole of India.
Persons of other nationalities can also be indicted under the law, if the crime involves a Computer or network located in
India. It is the primary law in India dealing with cybercrime and electronic commerce.
Date enacted 9th June, 2000
Date assented to 9th June, 2000
Date signed 9th May, 2000
Date commenced 17th October, 2000

Electronic Governance:

Section 4: Legal recognition of electronic records


Section 5: Legal recognition of digital signatures
Section 6: Use of electronic records and digital signatures in Government and it’s agencies
Section 7: Retention of electronic records
Section 8: Publication of rule, regulation, etc in Electronic Gazette
Section 9: Right to insist document in electronic form
Section 10: Power to make rules by Central Government in respect of digital signature
Section 11: Attribution of electronic records
Section 12: Acknowledgment of receipt
Section 13: Time and place of dispatch and receipt of electronic record
Section 17: Appointment of Controller and other officers
Section 18: Functions of Controller
Section 19: Recognition of foreign certifying authorities
Section 20: Controller to act as repository
Section 21: Licence to issue Digital Signature Certificate
Section 22: Application for licence
Section 23: Renewal of licence
Section 24: Procedure for grant or rejection of licence
Section 25: Suspension of licence
Section 26: Notice of suspension or revocation of licence
Section 32: Display of licence
Section 35: Certifying Authority to issue Digital Signature Certificate
Section 36: Representations upon issuance of Digital Signature Certificate
Section 37: Suspension of Digital Signature Certificate
Section 38: Revocation of Digital Signature Certificate
Section 39: Notice of suspension or revocation
Section 40: Generating key pair
Section 41: Acceptance of Digital Signature Certificate
Section 42: Control of private key
Section 43: Penalty for damage to computer, computer system, etc
Section 44: Penalty for failure to furnish information return, etc
Section 45: Residuary penalty
Section 46: Power to adjudicate
Section 47: Factors to be taken into account by the adjudicating officer
Section 48: Establishment of Cyber Appellate Tribunal
Section 49: Composition of Cyber Appellate Tribunal
Section 50: Qualifications for appointment as Presiding Officer of the Cyber Appellate Tribunal
Section 51: Term of office
Section 52: Salary, allowances and other terms and conditions of service of Presiding Officer
Section 53: Filling up of vacancies
Section 54: Resignation and removal
Section 55: Orders constituting Appellate Tribunal to be final and not to invalidate its Proceedings
Section 56: Staff of the Cyber Appellate Tribunal
Section 57: Appeal to Cyber Appellate Tribunal
Section 58: Procedure and powers of the Cyber Appellate Tribunal
Section 59: Right to legal representation
Section 60: Limitation
Section 61: Civil court not to have jurisdiction
Section 62: Appeal to High Court
Section 63: Compounding of contraventions
Section 64: Recovery of penalty
Section 65: Tampering with computer source documents
Section 66: Hacking with computer system
Section 67: Publishing of information which is obscene in electronic form
Section 70: Protected system
Section 71: Penalty for misrepresentation
Section 72: Penalty for breach of confidentiality and privacy
Section 73: Penalty for publishing Digital Signature Certificate false in certain particulars
Section 74: Publication for fraudulent purpose
Section 75: Act to apply for offence or contravention committed outside India
Section 76: Confiscation
Section 77.: Penalties or confiscation not to interfere with other punishments
Section 78: Power to investigate offences

You might also like