Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

6 Introduction of Internet

Introduction
The Internet is the global system of interconnected computer networks that use the Internet
protocol (TCP/IP) to link devices worldwide. It is a network of networks that consists of private,
public, academic, wireless and optical networking technology.
Computer Networks
Network is a technique which is used to make personal computer to multi user behavior. through
the computers having single user multi tasking operating system or network operating system NOS.
1.Guided Media
Twisted pair Cable: A twisted pair consists of a pair of insulated conductors that are twisted
together. The advantages of a Twisted pair cable over the Two Wire Open lines are, it provide
better resistance from false noise signals.
Coaxial Cable: Coaxial cable is a round shape cable in which there is a main conductor wire.
called inner conductor which is covered with plastic insulation of a solid plastic, it foils above
it and it is wrapped in metal wire The outer conductor is called and the top is the plastic pipe
which provides protection to all of these. Coaxial cable is mostly used in cable TV.
Fiber-Optic Cable: This carries signals in the form of fluctuating light in a glass or plastic cable
An optical fiber cable consists of a glass or plastic core surrounded by a cladding of a similar
material but with a lower refractive index between the core and the cladding cause total inter
net reflection, Thus minimizing the loss of light from fiber.
2.Unguided Media
Wireless: Radio. Microwaves and satellite Channels use electromagnetic broadcast in open
space. The advantage of these channels lie in their capabilities to cover large geographical
areas. It is less expansive than the wired installation.
Network Based on Size: There are kind of networks divided on the basis of size like a network
within building is known as Local area network and the network which serves entire globe is
known as Wide Area Network.
üLAN-: (Local Area Network)
üWAN-: (Wide Area Network)
üMAN-: (Metropolitan Area Network)
LAN (Local Area Network)
LAN is used to interconnected computers in a single room, rooms with in a building or a
limited geographical area. In this network computers are connected with data communication
devices and every computer has a potential to communicate with other computer of the network.
ADVANTAGE OF LAN
üHigh degree of transmission rate.
üEasy physical connections of computer in a network.
üInexpensive medium of data transmission.
üAddition or deletion of new computers to the networks is easy.
DISADVANTAGE OF LAN
üIf the communication line fails than entire network system breaks down.
üLimited geographical area
Uses of LAN
üFile Transfer and access.
Page: 71 Created by- Anshuman Singh
üElectronic message handling.
üRemote data base access.
üPersonal computing.
üDigital voice transmission and storage.
WAN (Wide Area Network)
The WAN is used to describe a computer network spreading a regional, national & global area.
The WAN is spreading network in very large area such as an entire country or the entire world.
A WAN can contain multiple smaller networks such as LAN or MAN. The internet is a best
example of WAN.
The Wide Area Network can be in the following form..
Wireless Network: Wireless networks are an important technology through which we
access internet or local network computer or resources very easily. Now-a-days many
of school campus are setting wireless router like VLAN or bluetooth.
Public Network: Public networks are those networks which are installed and run by the
telecommunication authorities and are made available to any organization or individual
who subscribe. example- VANs/VADs, PSDN, ISDN, PSTN etc.
Private Network: The basic technique used in all forms of private WAN is to use private
Circuits to link the locations to be served by the network. Between these fixed points the
owner of the network has complete freedom to use the circuits in any way they want.
They can use the circuit to carry large quantities of data or for high speed transmission.
MAN (Metropolitan Area Network)
The MAN consists of a computer network or small region. A MAN is larger than a LAN. This is
typically limited to a single building or site. Depending on the configuration, this type of network
can cover an area form several KMs to 10 miles. Cable network is a best example of MAN.
Network Topology
The networks topologies are context of communication network refer to the way of computer or
work station in the network area linked together with physical arrangement. There are three types
of major network topologies.
·Star Topology
·Bus Topology
·Ring Topology
1.Star Topology
In Star Topology number of work stations is directly linked to a central node and any communication
between stations on a star lane must pass through a central node. There are by detection
communication between various nodes.
Advantage of Star Topology
·It offers flexibility adding or deleting number of work station to the network.
·Break down of any station or node it does not affect any other device of the network.
·Any communication must pass through the central node.
Disadvantage of star topology
·No communication between stations or nodes.
·The major disadvantage of star topology is that failure of central node disable communication
through out the whole network.
2.Bus Topology
In Bus Topology numbers of work stations are connected to a single communication line called
bus. In this type of network topology there is no central note as star lane.
Page: 72 Created by- Anshuman Singh
Advantage of bus topology
·It is quit easy to setup.
·It offers flexibility adding or deleting number of work stations.
·If one station of topology fails it does not affect the entire system.
DISADVANTAGE OF BUS TOPOLOGY
The major disadvantage of bus topology is that any break in bus or communication line then
entire network system breaks down.
3.Ring Topology
In ring topology each station is attached with near by station on a point to point basic so that
entire system is in form of ring. In this topology, data is transmitting in one direction only. The
ring work clock wise or anti clock wise direction.
Advantage of Ring Topology
·In this topology any style transmitted on the network must pass through the all land stations.
·The ring work clock wise or anti clock wise direction at a time.
Disadvantage of Ring Topology
·In ring topology network if any one network is fail then entire network system break down.
Internet Protocol
Network protocols made the modernization of the Internet Possible. Networks protocols are sets
of rules for exchanging information. This exchange usually occurs much like a dailog between two
computers. Some examples-
1.FTP (File Transfer Protocol): FTP is used to copy files from one host to another. FTP uses port
21 for the control connection and port 20 for the data connection.
2.Telnet: Telnet is a protocol used to log in to remote computer on the internet.
3.TCP/IP (Transmission Control Protocol/Internet Protocol): It organize the text or binary files
in menu structure.
4.HTTP (Hyper Text Transfer Protocol): HTTP is a communication protocol. Its defines mechanism
for communication between browser and the web server.
5.Mail (Simple Mail Transfer Protocol): Send electronic messages upto 64KB.
Internet
The Internet, sometimes called simply "the Net," is a worldwide system of computer networks. A
network of networks in which users at any one computer can, if they have permission, get
information from any other computer (and sometimes talk directly to users at other computers).
The U.S. Department of Defense laid the foundation of the Internet roughly 30 years ago with a
network called ARPANET. But the general public didn't use the Internet much until after the
development of the World Wide Web in the early 1990s.
History of Internet
In 1969, the U.S. Defence Department funded a project to develop a network, which can it has
stand the bombing. Basically the idea was to develop a very secure network which can work
even after a nuclear attack. This project was known as ARPANET. The proposed network was not
supposed to have a central control – which would be an obvious target. Ten years of research
brought Local Area Ethernet Networks (LANs) and workstations were developed to get connected
to LAN. These workstations and LANs were then connected to the ARPANET. For next decade the
ARPANET grew and its decentralized features helped its rapid expansion. Computers connected
to ARPANET used to standard or rule to communicate with each other.This standard used by
ARPANET is known as NCP (National Control Protocol).
Page: 73 Created by- Anshuman Singh
Concept of Internet & WWW
What is the Internet?
The Internet is a global collection of computer networks that are linked together by devices called
routers and use a common set of protocols for data transmission known as TCP/IP. The primary
purpose of the internet is to facilitate the sharing of information. There are many different tools
used on the internet to make this possible. The most popular of all Internet tools is the WWW.
What is the WWW (World Wide Web)?
The WWW is a collection of internet sites that can be accessed by using a hypertext interface.
Hypertext documents on the web contain links to other documents located anywhere on the web.
The interesting thing about Hypertext links is that the links might take you to related material on
another computer located anywhere in the world, rather than just to a file on your local HDD.
Browser: A WWW or web browser is software on your computer that allows you to access the
World Wide Web. example include Google Chrome and Microsoft Internet Explorer. Please
Know that a browser can’t work its magic unless you are somehow connected to the internet.
Hypertext: Hypertext is text that contains electronic links to other text. In other words, If you
click on hypertext it will take you to other related material.
HTML: HTML is a set of commands used to create World Wide Web documents. The command
allow the document creator to define the parts of the document. For Example, you may have
text marked as headings, paragraphs, bulleted text, footers etc.
URL (Uniform Resource Locator): The URL identifies the host computer name, directory
path, and file name of the item. It also identifies the protocol used to locate the item such as
hypertext TCP/IP, telnet or news. For example, the URL for the main page of the Open website is-
http://www.google.com.
HTTP (Hypertext Transport Protocol): HTTP is the protocol used to transfer hypertext or hyper-
media documents.
Home Page: A home page is usually the starting point for locating information at a WWW site.
Client and Server: If a computer has a web browser installed, It is know as a client. A host
computer that is capable of providing information to others is called a server. A server requires
special software in order to provide web documents to others.
Application of Internet
Internet Services is referred as the facility you are availed through internet. There are many kind
of internet facility we are availed now-a-day. Take a look at below points.
Online Transaction: All the financial companies or banks have been online and making online
transactions from a far away branch to its head branch. All the share market companies are
trading online.
Searching: When we need any kind of information we do find it on a certain website or search
it through search engines, we can find any mathematical or scientific solution of a query.
Online Ticketing: We can book tickets of airlines, railways, buses, movies and so on. Only we
need to pay the amount of that through a payment gateway.
Online Application: Now-a-days an application for a post is applied through online mode. Most
of the Government web portal is asking online application.
E-Communication: There is number of facilities to communicate through online sending email,
chatting, sending free sms to cell phones, voice on internet protocol and so on.
Weather forecasting: Internet is used to broadcast the news and weather report.
E-Commarce: Through internet, we can buy and sell anything online. There is number of buy &
sell web portals. We can do advertisement of any brand or asset through various popular
advertising websites.
Page: 74 Created by- Anshuman Singh
Website Address and URL
WebAddress-
Web Address is unique address following by the domain name is used to access a certain website
to avail related information. The Domain has two parts, a host name and domain. For Example
google.com, here after dot(.) there 3 letters (com) of the address is addressing what kind of web
site. The letter addressing system is also called as the Dynamic Name Server(DNS).
Some lists of letter addressing systems are-
.com A commercial enterprises
.mil A military site
.org A organization site (nonprofits, etc.)
.int A organizations established by international treaty
.net A network
.biz A commercial and personal
.edu A educational site (universities, schools, etc.)
.info A commercial and personal
.gov A government organizations
.name A personal sites
.co.in A commercial enterprises in india
.co.uk A commercial enterprises in United Kingdoms
Uniform Resource Locator (URL)-
A URL stands for Uniform Resource Locator, previously Universal Resource Locator-A common
way to get to a Web sits is to enter the URL of its home page file in your web browser’s address
line.
Structure of a URL: Every HTTP URL consists of following, in the given order.
A colon, two slashes.
A host, normally given as a domain name but sometimes as a literal IP address.
optionally a port number
the full path of the resource.
http://www.google.com:7808/osmosetechnology/a=b&x=y
Protocol host port Resource path query

Absolute URL: The word absolute, in English, Means “not dependent on anything else”. It
also means “Free from Doubt”. An absolute URL is, thus, something that is independent or
free from any relationship. When you use an absolute URL, you point directly to a file.
In another way an absolute URL uses the following format:
scheme://server/path/resource
scheme: Specifies how the resource is to be accessed.
server: Specifies the name of the computer where the resource is located.
path: Specifies the sequence of directories leading to the target. If resource is omitted,
the target is the last directory inpath.
resource: If included, resource is the target, and is typically the name of a file. It may be
a simple file, or a structured document.
Introduction of IP Address
IP stands for internet protocol. It is a unique identifier that is assigned to a computer on the
Internet. It is a numerical address with four numbers separated with dots. The value of each
number is between 0 to 255. These numbers are called octets. Every computer on the internet
has a unique IP address. An example of IP address is:200.12.1.180
Page: 75 Created by- Anshuman Singh
ISP (Internet Service Provider)
Internet service providers are the companies who do provide the service to access the internet
on a node. The role of an internet service provider is to provide internet service to those who
need internet service. Internet service providers may offer dail-up or broadband service to
consumers. Dail-up connections require the use of a phone line and usually connections of 56KB
or less. Broadband connection can be ISDN, broadband wireless access, cable modem, DSL,
satellite or Ethrnet. All ISP’s have their own servers, and the users are connected to those servers.
There is number of ISP providers companies like- BSNL, Vodafone, Airtel, Idea, Reliance Jio etc.
Modes of Connection Internet
Internet become most important things for anyone, so that it is important to know the method,
how to connect your computer with internet. Internet access sold by internet service providers
delivering connectivity at a wide range of data transfer rates via various networking technologies.
Here we discuss about some internet access method as Hotspot, WiFi, LAN Cable, broadband,
USB tethering.
HotSpot: A hotSpot is a physical location of any device which uses internet and provides
internet access for other users. Through hotspot people may obtain internet access, using
Wi-Fi technology, via a wireless local area network(WLAN) by using a router connected to an
internet service provider.
Wi-Fi: Wi-fi is the popular name for a wireless local area network. Wi-fi stands for wireless
fidelity. It is a wireless internet connection which let a user to access the internet through
radio waves unlike wired connection. Wi-Fi data rates range from 6 to 600 MB/s. Wi-Fi service
range is fairly short, typically 20 to 250 m or from 65 to 820 feet.
Cable Internet access: Cable Internet or cable modem access provides Internet access via
hybrid fiber coaxial wiring originally developed to carry television signals. In a cable modem
termination system, all nodes for cable subscribers in a neighborhood connect to a cable
company’s central office.
Broadband: The term broadband includes a broad range of technologies, all of which provide
higher data rate access to the internet. This high-speed Internet connection is provided through
either cable or telephone companies. These technologies use wires or fiber optic cables in
contrast to wireless broadband.
USB tethering: Tethering is the sharing of a mobile device’s Internet connection with other
connected computers. You can share your phone’s mobile data with another device, like your
laptop, through tethering. There are three types of tethering, Wi-Fi tethering, Bluetooth
tethering, USB tethering.
Identifying and uses of IP/MAC/IMEI of various devices
How to find the IP Address-
Press the Windows Start key to open the Start screen.
Type CMD and press ENTER to launch the command prompt.
Type ipconfig/all at the command prompt to check the network card settings.
The IP address are listed under the appropriate adapter as Physical address and IPv4 Address.
You can copy the Physical Address and Ipv4 Address from the command prompt by right click
in the command prompt and clicking Mark.
Select the text you want to copy with the mouse and hit the Enter key to copy it. You should
now be able to paste the text elsewhere using the standard clipboard “paste” function.
Page: 76 Created by- Anshuman Singh
How to Identify IMEI number-
Every mobile phone has an International Mobile Equipment Identify (IMEI) number that identifies
your phone. If your phone is stolen, you can call your network provider and have them blacklist
the device using its IMEI number.
iOS user: Setting App - General - About.
Android Phone user: Setting - About Phones - Status.
Popular Web Browsers
A Web browser is a software application for accessing information on the World Wide Web. Each
individual web page, image, and video is identified by a distinct Uniform Resource Locator, enabling
browsers to retrieve these resources from a web server and display them on the user’s device.
Internet Explorer: Internet Explorer was a series of graphical web browsers developed by
Microsoft and included in the Microsoft Windows line of operating systems, starting in 1995.
Google Chrome: Google chrome is a cross-platform web browser developed by Google. It
was first released in 2008 for Microsoft Windows, and was later ported to linux, macOS, iOS
and Android.
Mozilla Firefox: Mozilla Firefox is a free and open-source web browser developed by the
Mozilla Foundation and its subsidiary, Mozilla Corporation.
Opera : Opera is a web browser for Microsoft Windows, Android, iOS, macOS, and Linux
operating system, developed by Opera Software.
Surfing The web
Alternatively referred too as Web surfing, surfing describes the act of browsing the Internet by
going from one web page to another web page using hyperlinks in an Internet browser. The term
“surfing” was first coined by Mark McChill. You can use a search engine, such as google, Yahoo etc.
Popular Search Engine
Search engine is designed to help you to find information stored on the web to your computer
system. The search engine allows you to make a query usually with a word or phrase and retrieves
a list of items that best match the criteria you have requested. The most common purpose search
engines are Yahoo, Altavista, Google, AOL, HotBot, Infoseek, Ask.com, Bing, Lycos etc.
Searching on Internet
Searching the internet keep some important points in your mind. Most of the information on the
Internet is not edited or reviewed and anyone with a computer and access to the Internet can
publish content. You don't always know where the information comes from.
Decide on your search topic: Its important to define your search topic as clearly and in a few
words. From the keywords you have written down, choose those you think best describe topic.

Page: 77 Created by- Anshuman Singh


E-mail, Social Networking &
7 E-Governance Services
Introduction
Communication has been the vital tool in our daily life routine Business, Education, Research and
many more. Email, Social Networking, chats, Blogs and many more are key tools used in commni-
cation. Without effective communication collaboration is not possible. You can collaborate with
your business partners through the internet. The unity of students has increased. Students from
all over the world are connected to each other through collaboration learning.
Objectives
The objective of this chapter to know about Basics of E-mail, what is an Electronic mail, Email
addressing, Configuring Email client, Using E-mails, Opening Email client, Mailbox, Creating and
Sending a new E-mail etc.
Structure of E-mail-
In a world where electronic mail has become an integral part of daily life, it is useful to gain under
standing of various parts of an email address.
The structure of email address: Every email address has three mail parts.
Account_name@domainname.com
F Domain name-
This part of the email address is the name of server that host your emails. It is not necessary
that the domain name would always be of a .com kind. It can be anything from the standard
list of domain extension (e.g., .org, .gov, .co.in etc).
A server could that be of a free web-based email service provider (Like Gmail, Hotmail, Yahoo!
mail etc) or server may belong to a specific organization.
F Account name (username)-
An email hosting server may host emails for one person or millions of persons. You can imagine
your account like a pigeon-hole or letter box whose key only you have. This key is password.
All the email account names on a server have to be unique so that the server can send emails
to various account without any confusion. There cannot be two accounts with the same name
on a server. Therefore, two ccc@gmail.com are not possible but ccc@gmail.com and
ccc@yahoo.com are possible. The account name refers to the user/owner of the email address.
F @Sign-
First thing first, in case of email address, this symbol is pronounced as at and not as “at the rate”
This symbol is used in an email address to separate account name from domain name There
must be one (and ONLY one) @ sign in an email address. If the address does not have this sign-
it is not a valid email address.
Email address are not case-sensitive. This means it does not matter whether you write address
in uppercase or lowercase or mixed case.
Note: Account name cannot be longer than 64 characters.
Using E-mails-
Electronic mail (email or e-mail) is a method of exchanging message (”mail”) between people using
electronic devices. Invented by Ray Tomlinson, email first entered limited use in the 1960s and by
the mid-1970s had taken the form now recognized as email. Today’s email systems are based on a
store-and-forward model. Email servers accept, forward, deliver, and store massages.
Here is the brief feature of email....
Page: 78 Created by- Anshuman Singh
It is a quick responded communication which let a user remain satisfied.
you can keep records of email sent or received in your email account.
It’s not some other communication device which you need to carry with you. Only you need to
login to your email account from anywhere across the globe.
All of the emails providing companies give you sufficient space to store your document.
F Opening email account-
Follow the steps below to create email account-
Step 1: Click on the SignUp Button.
Step 2: Enter all mandatory fields (First name, Last name, Gender etc).
Step 3: Type in your desired address out of our huge selection of 200 available domains.
Step 4: Choose a secure Password.
Step 5: Select your Security Question, Type in your answer.
Step 6: Verify your registration by typing the numbers in the captcha picture
Step 7: Click the “Accept” Button underneath.
Step 8: Verify your phone number. If you added a phone number as an account recovery
option, you can verify it now by doing the following:
Click SEND when prompted.
Open your phone’s text messages.
Open the message from Google and review the 6 digit number in the message.
Enter the 6 digit number in to the text box on the Gmail page.
Click VERIFY.
F Mailbox: Inbox and Outbox-
Mailbox is the container which contains all the email sent & received to a certain email account.
It has a lot of folders which differentiate the email sent, received, junk, spam or deleted.
Inbox
Inbox is the place where all the incoming emails are stored and can be accessed through. As
the name implies of inbox, this behaves like the same. It lists the email received into a relational
table sorted according to the date.
Outbox
Outbox is the place where all the sent data are stored until it is not fully sent. There is also a
section named Sent Mail which contains the list of fully delivered emails.
Draft
It is place where messages composed but not sent and even queued to be sent. In other words,
whatever messages we compose and save it is stored.
Junk
It is place where fake and spam kind of mail which contain virus, malware, spyware or do stealing
data kind of activity, is stored.
Sent Items
It is a place where all delivered mails are listed.
Deleted Items
It is the place in Mailbox where all the deleted emails are stored to which you can reuse, send,
forward or print, depends.
F Creating and Sending a new Email-
Steps have been described above in Creating Section:
Step 1: You can use the Gmail website to send email from a computer.
Step 2: Go to https://www.gmail.com/ in your computer’s web browser. This will open your
gmail inbox if you’re logged in; enter your email address and password when prompted.
Page: 79 Created by- Anshuman Singh
Step 3: Click + Compose. It’s in the upper-left side of your Gmail inbox. Doing so opens a “New
Message” window in the lower-right corner of the page.
Step 4: Enter the other person’s email address. Click the “To” or “Recipients” text box at the top
of the new Massage window, then type in the email address of the person to whom
you want to send your email.
Step 5: Instructions on how to use gmails new interface for composing messages.
Step 6: Add a subject. Click the “Subject” text field, then type in whatever you want the subject
of the email to be.
Step 7: Attach a file if you like. To add a file from your computer, click the “Attachments” icon at
the bottom of the window, then select the file you want to upload and click Open.
Step 8: Click Send. It’s a blue button in the bottom-right corner of the email window. Doing so
will send your email to be specified email address.
F Attaching files with email-
Attach a file
1. On your computer, go to Gmail.
2. Click Compose.
3. Click Attach.
4. Choose the files you want to upload.
5. Click Open
Tip: Add an image by dragging it directly into the compose window.
Remove an attachment: To the right of the attachment name, click Close.
Send attachments with confidential mode:
1. On your computer, go to Gmail.
2. Click Compose.
3. Click Attach.
4. Choose the files you want to upload.
5. In the bottom right of the window, click Turn on confidential mode.
6. Set an expiration date and passcode. These settings impact both the message text and any
attachments.
7. Click Save.
Tip: If you’ve already turned on confidential mode for an email, go to the bottom of the email,
and then click Edit.
Attachment size limit: You can send up to 25 MB in attachments. If you have more than one
attachment, they can’t add up to more than 25 MB. If your file is greater than 25 MB, Gmail
automatically adds a Google Drive link in the email instead of including it as an attachment.
F Email Signature-
An email signature is text, like your contact information or a favorite quote, that’s automatically
added at the end of Gmail messages as footer.
Add or change a signature: You can put up to 10,000 characters in your signature.
1. Open Gmail.
2. In the top right, click Settings
3. In the “Signature” section, add your signature text in the box. If you want, you can format
your message by adding an image or changing the text style.
4. At the bottom of the page, click save changes.
Add a signature if you’re using the “Send mail as” feature: If you use the Send mail as feature to
send from different addresses in your account, you can add a different signature for each
address.
To select an address, use the drop-down menu above the signature text box on the setting page.
Page: 80 Created by- Anshuman Singh
Social Networking & E-commerce-
F Social Networking-
A social network is a website that brings people together to talk, share ideas and interests, or
make new friends. This type of collaboration and sharing is known as social media.
Social Networking played vital role in e-commerce. This also affected how businesses conducted
their transactions and advertisements, and also their product. Its refers to grouping of individuals
and organizations together via some medium, in order to share thoughts, interests, and activities
such as Facebook, twitter, Linkedin, Google+, Hike, Line etc.
Why do people use social networks?
Social networks help to people keep connected with their friends and family and are an easy
way to find what everyone is up to each day in your social circle.
Examples of social networks-
F Facebook, Twitter, LinkedIn, Instagram-
Facebook:Facebook is a popular destination for users to set up personal space and connect
with friends, share pictures, share movies, talk about what you’re doing etc. By using face-
book you can stay in touch and get updates different activities.
You can create different types of Facebook pages given below-
Company, organization or institution and local business or place.
Brand or products, Artist, band or public figure.
Entertainment and community.
How to create account on Facebook-
Goto www.facebook.com/
Enter your name, email or mobile phone number, password, date of birth and gender.
Click Create an Account.
To Finish creating your account, you need to confirm your email or mobile phone number.
Note: You must be at least 13 years old to create a Facebook account.
Twitter: Twitter allows the user to send and reply messages. These type of massages are known
as tweets. It is a free social networking service that allows registered members to broadcast
short posts called tweets. twitter is an effective social media marketing tool for your business.
With over 500 millions users.
Steps given below will guide you to sign up twitter.
Goto www.twitter.com and sign up. Use your name, Your email, and a password.
Click Create my Account. Click “next”.
Twitter asks you to follow 3 people from a selection it gives you. You must follow 3 People.
Twitter will then asks you confirm your email.
Instagram: Instagram is a photo and video sharing social media site. It was designed for mobile
use with the intention that users would take photos on their mobile devices then upload the
images “instantly” through the Instagram app.
To create an instagram account from a computer follow the steps given below-
Go to www.instagram.com
Enter your email address, Create a username and password or click Log in with Facebook
to sign up with your facebook account.
If you register with an email, click Sign up. If your register with facebook, you will be prom-
pted to log into facebook account if you’re currently out.
F Instant Messaging(Whatsapp, Messenger, Telegram)-
Instant Messaging technology is a type of online chat that offers real-time text transmission
over the internet. Some IM applications can use push technology to provide real-time text, which
Page: 81 Created by- Anshuman Singh
transmits message character by character, as they are composed. More advanced IM can add file
transfer, clickable hyperlinks, voice over IP, or video chat. Lets us see some IM application.
WhatsApp: It is mobile based messaging app application that you can download to your smart-
phone and use to easily send text, video, and audio messages to other people mobile phones.
It plays an important role in impact on small to large scale companies. With the growing
digitization, Users are always looking out for richness in their living.
Messenger: It is mobile app that enables chat, voice and video communications between the
social media site’s web-based messaging and smart phones. Messenger is available for iOS, Android,
Windows 10 and Blackberry.
Telegram: It is a cloud-based instant messaging and voice over IP service developed by Telegram
Messanger LLP, London. Telegram was launched in 2013 by the Russian Entrepreneur Pavel Durov
and his brother Nikolai. Through this application, users can send messages, photos, video, stickers,
Audio and files of any type (upto 1.5 GB in size per file).
F Introduction to Blog-
Blogging is often described as an online dairy, but this a bit of an inadequate definition, as it’s
become much more than that. We prefer to describe it simply as an easy interface to publish
content on the web. Blogs can be use to publish news and reviews and to discuss products and
ideas. The internet contains blogs on almost every issue imaginable- in fact, it is estimated that
there are currently over 150 millions blogs floating on the internet.
Why should Affiliates Blogs?
Blogging is extremely simple: They are much easier to use and maintain than a website. At
their most basic, blogs don’t require any specialist knowledge whatsoever. You login to your
account, you can write, and you can click the ‘publish’ button.
Syndicate via RSS feed: RSS technology that enables people to receive constantly updated
information from multiple sources through one readers work by continually checking pre-
specified blogs to see if they have been updated.
Interaction with readers: Almost all blogs have a ‘comment’ function that can be enabled to
allow readers to reply to your post and share their thoughts.
How do I Blog?
You can either set up a stand-alone blog or a blog on your own domain. A stand-alone blog can
be set up in just a few minutes via a weblog hosting service. There are three weblog services
worth a mention. They are:
Blogger.com: Blogger is a free service and possibly the simplest to use. However, scalability
options are limited and we are not going to be speding time on this service in future lessons.
Typepad.com: Typepad claims to be the world’s most advanced weblog service-but its also
the most expensive, with subscription plans $4.95 to $89.95 per month.
Wordpress.com: Wordpress is also free but contains many state-of-the-art publishing
features. Wordpress is the service we recommend and will be our focus in subsequent lessons
on blogging.
F E-Commerce-
E-commerce(EC), an abbreviation for electronic commerce, is the buying and selling of goods and
services, or the transmitting of funds or data, over an electronic network, primarily the internet.
These business transactions occur either as business-to-business (B2B), Business-to-consumer
(B2C), consumer-to-consumer or consumer-to-business.
History of E-Commerce-
The beginnings of e-commerce can be traced to the 1960s, when businesses started using
Electronic Data Interchange (EDI) to share business documents with other companies. In 1979
Page: 82 Created by- Anshuman Singh
the American National standards institute developed ASC X12v as a universal standard for
businesses to share documents through electronic networks.
After the number of individual users sharing electronic documents with each other grew in
the 1980s , the rise of ebay and amazon in the 1990s revolutionized the e-commerce industry.
Types of Ecommerce Models: There are four type of ecommerce models that can describe
almost every transaction that takes place between consumers and businesses.
1.B2B(Business to Business):
Now a day B2B service is very important and useful for business class. B2B is a kind of
e-commerce in which companies doing business with each other for example manufacturers
selling the product to wholesalers and wholesalers selling to retailers.
2.B2C(Business to Consumer):
This is what most people think of when they hear “e-commerce”. B2C consists of businesses
selling to the general public through shopping cart software, without needing any human
interaction. An example of this would be Amazon.com
3.C2B(Consumer to Business):
In this system a consumer would post a project or a object with a set budget online, any
individual or companies bid on the project. The consumer reviews the bids and selects the
suitable company according to his requirement.
4.C2C(Consumer to Consumer):
This type of e-commerce is made up of online classifieds or forums where individuals can
buy and sell their goods, thanks to systems like Paypal. An example of this would be Olx.
E-commerce businesses may works some or all of the following:
Online shopping web sites for retail sales direct to consumers.
Providing or participating in online marketplaces, which process third party business-to-
consumer or consumer-to-consumer sales.
Business-to-business buying and selling.
Many large global organizations are reaping the benefits from employing an electronic
payment system.
Examples of E-commerce: E-commerce can take on a variety of forms involving different transa-
ctional relationships between businesses and consumers, as well as different objects being
exchanged as part of these transactions.
1.Retail: The sale of a product by a business directly to a customer without any intermediary.
2.Wholesale: The sale of products in bluk, often to a retailer that then sells them directly to
consumers.
3.Drop shipping: The sale of a product, which is manufactured and shipped to the consumer
by a third party.
4.Crowd-funding: The collection of money from consumers in advance of a product being
available in order to raise the startup capital necessary to bring it to market.
5.Subscription: The automatic recurring purchase of a product or service on a regular basis
until the subscriber chooses to cancel.
6.Physical Products: Any tangible goods that requires inventory to be replenished and orders
to be physically shipped to customers as sales are made.
7.Digital products: Downloadable digital goods, templates, and courses, or media that must
be purchased for consumption or licensed for use.
Overview of e-Governance Services-
This is one of most efficient and successful medium between Government and people. Every person
easily connect with government through e-governance and know about status of land, applications,
domicile certificate, income certificate, status of scholarship, status of government functionaries
working in his village/block/district, Government Orders etc.
Page: 83 Created by- Anshuman Singh
The primary delivery models of e-Government can be divided into......
1.Government-to-Citizen/Consumer (G2C): G2C model applies the strategy of customer Relation
ship Management with business concept. By managing their relationship with citizen,
government can provide the needed products and services fulfill the needs from citizen.
2.Government-to-Business (G2B): G2B model is online non-commercial interaction between
Government and people to provide business information and also advice about e-business.
3.Government-to-Government (G2G): G2G model is online non-commercial interaction between
Government Departments/Authorities and other Government/Departments.
4.Government-to-Employees (G2E): G2E model this is the best and effective way of online
interactions between government and employees.
IRCTC-
E-governance in railway ticket becomes very useful for general public. By using IRCTC web-portal
anyone can reserve his general, tatkal and unreserved tickets. Only we need to pay the amount
of that through a payment gatway.
How to Create account on IRCTC-
We will see now to create an account on IRCTC that is necessary too access the website.
Step 1: First, click here to go to IRCTC official home page (www.irctc.co.in).
Step 2: Click on Register link, now you will be redirected to the IRCTC Registration form.
Step 3: Follow below steps.
Enter the username- The username should be between 4 to 10 character.
Choose the security Question and its answer.
Fill your Name, Gender, Marital status, Occupation and DOB.
Carefully fill up a valid Email-ID and mobile number as your login password.
Enter your full address including the pin number.
Enter the text from the Image> click on the submit button.
Verify the account. Soon Login details, Including Username and password, will be
sent to your email id.
Check the mobile number and enter the verification code.
After receiving the code, click on the submit.
You have the successfully completed the IRCTC Registration Process.
Now you can use your account details to book IRCTC Tickets online or cancel IRCTC
Tickets. Also, check IRCTC train schedule and check PNR status.
Passport-
A Passport is an essential travel document for those who are traveling aboard for education,
tourism, medical attendance, business purposes and family visits. Passport seva enables simple
efficient and transparent processes for delivery of passport and related services. Applying for a
passport is quite a long procedure all you need to a little patience. below are the steps to apply
for a passport in India.
Step 1: First of all apply for the passport online, here you have to register on the official website
(www.passportindia.gov.in) after the process of r egistration, you get a registration ID
and a password.
Step 2: Choose the type of passport you want to apply for.
Step 3: Now fill in the all the required details.
Step 4: Now make the payment online through the debit/credit cards or net banking.
Step 5: After the successful payment, you will receive a receipt that contains a file number.
Step 6: After a few days, a police verification request is initiated. you will have to visit the near
mentioned police station. the police will verify all your personal details.
Page: 84 Created by- Anshuman Singh
Step 7: Then, within few weeks, the police will submit a clear report saying that your passport
verification is complete.
Step 8: Then the passport will get despatched through speed post with the tracking number.
Step 9: Finally, you receive your passport .
UMANG App-
Unified Mobile Application for new-age Governance (UMANG) provides a single platform for all
Indian Citizens to access pan e-Gov services ranging from Central to Local Government Bodies and
other citizen centric services. UMANG is a Digital India initiative of Ministry of electronics and
Information Technology.
Key features:
UMANG provides seamless integration with popular customer centric services like Adhaar.
It provides a unified approach where you can install one application to avail multiple
government services.
UMANG can be accessed on multiple channels like mobile application, web, IVR and SMS
which can be accessed through smartphones, feature phones, tablets and Desktops.
UMANG supports 12 major Indian languages in additions to english.
Digital Locker -
DigiLocker is a service launched by Government of India in February 2015 to provide a secure
dedicated personal electronic space for storing the documents of resident Indian citizens. The
storage space (1GB) is linked to the Aadhaar number of the user.
Key features:
Provide secure access to Government issued Documents.
Eliminates the use of physical documents and enables sharing of verified electronic
documents across government agencies.
A dedicated personal storage space in the cloud to citizens linked to citizens Aadhaar card.
Reduce the administrative overhead of government departments and agencies created
due to paper work.
Easy for citizens to receive services by saving time and effort as their documents will now
be available anytime, anywhere and can be shared electronically.
To sign-up for your digital Locker, one needs an Adhaar card & a Mobile number that is
linked to that Aadhaar card Number.

Page: 85 Created by- Anshuman Singh


Digital Financial Tools
8 And Applications
Introduction
The invention of computers and smart phones has created a huge impact on financial services. Today
using computers and mobile phones, a person can access his/her bank account, verify account details
transfer funds, deposit cash, renew deposit, pay bills, book tickets, etc. Digital services help to save
time by providing services in a single touch.
There are three key components of any such digital financial services:
1.Digital Transactional Platform:
It enables a customer to use a device to make or receive payments and transfer and to store
value electronically with a bank or any such nonbank institutes which permitted to store
electronic values.
2.Retail Agent:
Retail use a digital device connected to communications infrastructure to transmit and receive
transaction details. Its enables customers to convert cash into electronically stored value and
to transform stored value back into cash.
3.Devices:
The customer’s device can be digital like mobile phones that is a means of transmitting data
and information or an instrument like payment card machines that connects to a digital device
like POS terminal.
Why is bank needed?
Bank is an official financial institution that accepts money from public and lands money to public.
Secure Money:
Bank helps to save our money very securely.
Loading all your cash at home isn’t safe.
You can lose your money in situations like fire, flood or earthquake.
In order to avoid the scenarios given above, we need a bank.
Earn Interest: Banks provide us with interest if we save money through RD and FD.
Get Loan: Bank will provide several kinds of loans.
Types of Loans:
Home Loan: Home loan is the money lent to by banks to buy properties at a certain rate
of interest to be paid every month as EMI.
Personal Loan: Banks provide you with personal loans for marriage, emergency periods.
Jewel Loan: Banks provide you with jewel loan where you pledge your jewelry to get loan.
Digital Financial Tools
Customers want to know where they are and what’s happening with their property. They want
Immediate access to information, at any time. The development of Digital Financial Tools which
on one hand represent value to use to us. In this case no need for the customer to go any bank.
Take a look at below topicsl.
1.Understanding OTP (One Time Password):
OTP stands for One Time Password, also known as One Time Pin. It is a Password that is valid
for only one login session or transaction, on a computer system or other digital devices. With
the increase in cyber security threats, it has become more and more necessary to upgrade,
the security standards of your web applications. When an unauthenticated user attempts to
access a system or perform a transaction on a device, an authentication manager on the
network server generates a number or shared secret, using one-time-password algorithms.
Page: 86 Created by- Anshuman Singh
2.QR Code(Quick Response):
A barcode is a machine-readable optical label that contains information about the item to
which it is attached. First designed in 1994 for the automotive industry in Japan. In practice,
QR codes often contain data for a locator, identifier, or tracker that points to a website or
application. A QR code uses four standardized encoding modes(numeric, alphanumeric,
byte/binary) to store data efficiently; extensions may also be used.
3.UPI(Unified Payment Interface):
Unified payment interface is a system that powers multiple bank accounts into a single mobile
application, merging several banking features, seamless fund routing & merchant payments
into one hood. It also caters to the “peer to peer” collect request which can be scheduled and
paid as per requirement and convenience. NPCI conducted a pilot project launch with 21
member banks. The pilot project launch was on 11th April 2016 by Dr. Raghuram G Rajan,
Governor, RBI at Mumbai.
Features:
Immediate money transfer through mobile device round the clock 24x7 and 365 days.
Single mobile application for accessing different bank accounts.
Virtual address of the customer for pull & Push provide for incremental security with the
customer not required to enter the details such as Card no, Account number, IFSC etc.
Bill Sharing with Friends.
Merchant Payment with Single Application or In-app Payments.
Utility Bill Payments, Over the counter Payments, Borcode (scan and pay) based payment.
Donations, Collections, Disbursements Scalable.
Participants in UPI:
The participants of UPI are payer PSP, Payee PSP, Remitter Bank, Beneficiary Bank, NCPI Bank
Account holders, Merchants etc.
Registration in UPI enabled application:
User downloads the UPI application from the App Store/Banks website.
User creates his/her profile by entering details like name, virtual id, password etc.
User goes to “add/link/manage bank account” option and links the bank and account no.
with the virtual id.
4.AEPS(Aadhaar Enabled Payment System):
AEPS is a new payment service developed by the National Payments Corporation of India to
banks, financial institutions using ‘Aadhaar’. This system is a bank led model which allows online
financial transaction at Point of Sale/Mirco ATM through the Business Correspondent/Bank mitra
of any bank using Aadhaar authentication.
Facilities:
Cash Deposit & Withdrawal
Balance Enquiry & Mini Statement
Aadhaar to Aadhaar Fund Transfer
Steps to use Aadhaar Enabled Payment System:
Step 1: Go to Micro-ATM
Step 2: Select option like- Cash withdraw/Deposit Cash/Pay/Check Balance.
Step 3: Enter Pin Number and Enter Location Code.
Step 4: Enter your Aadhaar Card number and scan your finger print.
Step 5: see “Transaction Successful” message and then Collect Receipt.
Page: 87 Created by- Anshuman Singh
5.USSD(Unstructured Supplementary Services Data):
This payment service *99# works on USSD channel. This service allows mobile banking trans-
actions using basic feature mobile phone, there is no need to have mobile internet data facility
for using USSD based mobile banking. *99# service is currently offered by 51 leading banks &
all GSM service providers and can be accessed in 12 different languages including Hindi, English
as on 30.11.2016.
How to get it:
Provide KYC information to open a new account.
Mobile no. should be linked with bank a/c.
Register for USSD/Mobile Banking.
Get MMID (Mobile Money Identifier)
Get MPIN (Mobile PIN)
Services Offered:
Balance enquiry and Mini Statement
Funds transfer-MMID, A/c no., Aadhaar
Know MMID.
Change M-PIN and Generate OTP.
Fund Transfer between 5,000/day and 50,000/annual
6.Credit Cards:
A credit card is a card issued by a financial institution and it enables the cardholder to borrow
funds from that institution. Cardholders agree to pay the money back, with interest & terms.
Credit cards are issued in four categories:
A.Standard Cards: Simply extend a line of credit to their users.
B.Rewards Cards: This card Offer cash back, travel points, or other benefits to customers.
C.Secured Credit Cards: This type of card require an initial cash deposit.
C.Charge Cards: Charge card have no preset spending limit, but often do not allow unpaid
carry over from month to month.
Advantages:
Purchasing Power: Credit Cards enable users to make big ticket purchase they might not
otherwise be able to afford.
Convenience: Credit cards reduce the need to carry cash. Most retailers accept credit cards
and they are pretty much required for online purchases.
Traceability: The electronic record keeping that comes with credit cards makes it easy to
track your spending and identify fraud.
Disadvantages:
Overspending: Credit cards can make life easier, but they can also make overspending easier
as well. With a credit card, you’re spending money you don't necessarily have yet.
Interest and Fees: Using credit is essentially borrowing and you are not borrowing for free.
you also to pay debt with interest and fees.
Mounting Debt: If you carry a balance on your credit card from month to month, it can be
very easy for changes and interest to rack up. Many people don't expect credit cards to be
gateways to extra debt.
7.Debit Cards:
A Debit card is a payment card is a payment card that makes payment by deducting money
directly from a consumer’s checking account. Debit cards offer the convenience of credit cards
and many of the same consumer protections when issued by major payment processors like
visa or MasterCard. There are two types of debit cards do not require the savings account.
Page: 88 Created by- Anshuman Singh
A.Standard Debit Cards: Draw on your bank account.
B.Electronic Benefits Transfer Cards: This cards are issued by state and federal agencies
to allow qualifying users to use their benefits to make purchases.
C.Prepaid Debit Cards: Prepaid card give without access to a bank account a way to make
electronic purchases up to the amount that was pre-loaded on the card.
Advantages:
Easy to obtain: Once you open an account most institutions will issue you a debit card.
Convenience: Purchase can be made using a chip-enabled terminal or by swiping the cards
rather than filling out a paper cheque.
Safety: You don't have to carry cash or a cheque book.
Readily accepted: When out of country, debit cards are usually widely accepted (make sure
to tell your bank you are leaving your country).
Disadvantages:
Book balancing: Balancing your account may be difficult unless you record every debit card
transaction.
Less protection: Most financial institutions will try and protect their customer from debit
card fraud.
Fees: Using your debit card for ATM transactions may be costly if the ATM is not affiliated
with your institution.
8.eWallet:
A eWallet, sometimes called a Digital wallet is a secure place that contains one or more currency
purses. Your shoppers can fund a eWallet in several different ways. Once funded, shoppers can
use eWallet online to buy goods or services.
Paytm: Paytm is by far the most popular e-Wallet in India. Reserve Bank of India approved
and authorized, this is one of the most versatile mobile wallets present in India. Paytm is
today a $4 billion company. It can be done simply by scanning a QR code or also by using
an OTP which is generated right within the app. Paytm has grown so much that RBI has
actually given Paytm a license to set up a payments bank.
Mobikwik: Mobikwik has been another important app in the e-wallet industries. It also
offers a host of payment options and has partnered with many popular brands in market such
as Domino’s Pizza, Big Bazar, pizza hut, bookmyshow and many more. This e-wallet too has
Reserve Bank of India authorization and license, making more trusted eWallet.
HDFC PayZapp: If we look at the app itself, we mean, how well the app has been built, it
is pretty solid and fewer bugs compared to some other apps in market. However, when we
come to the services offered, HDFC PayZapp is not that great. It allows basic things like bill
payment, mobile recharges, DTH recharges etc.
9.PoS (Point of Sale):
The point of sale (PoS) is the time and place where a retail transaction is completed. It is the point
at which a customer makes a payment to the merchant in exchange for goods or after provision of
a service. At the point of sale, the merchant would prepare an invoice for the customer. Usually the
receipt is printed, but It is increasingly being dispensed electronically.
Hardware Components of a PoS System:
Moniter/Tablet
Barcode scanner
credit card reader
Receipt printer
Cash Drawer
Page: 89 Created by- Anshuman Singh
Internet Banking
In internet banking system the bank has a centralized database that is web-enabled. All the service
that the bank has permitted on the internet are displayed in menu. The network which connects the
various locations and gives connectivity to the central office with in the organization is called intranet
SBI Yono and SWIFT is a live example of internet application.
Internet Banking in India:
The RBI constituted a working group on internet Banking. The group divided the internet
banking products in India into 3 types based on the levels of access granted. they are-
1.Information Only System: General purpose information like interest rates, branch location,
and their features, loan and deposit calculations are provided in the banks website. There
exist downloading various types of application forms.
2.Electronic Information Transfer System: The system provides customers specific information
in the form of account balances, transaction details and statements of accounts.
3.Fully Electronic Transactional System: This system allows bi-directional capabilities. This
system requires high degree of security and control. In this environment, web server and app
system are linked over secure infrastructure.
Automated Teller Machine (ATM):
ATM is designed to perform the most important function of bank. It is operated by plastic card.
It is replacing cheque, personal attendance of the customer. ATMs used as spring board for
electronic Fund Transfer.
Smart Card:
Banks are adding chips to their current magnetic strip cards to enhance security and offer new
service, called Smart Cards. These cards are highly secure, more reliable and perform multiple
functions. They hold a large amount of personal information, from medical and health history
to personal banking and personal preferences.
You can avail the following services through Internet Banking:
Bill Payment Service: You can facilitate payment of electricity and telephone bills, mobile
phones, and insurance premium bills as each bank has tie-ups with various utility companies.
Generally the bank does not charge customers for online bill payment.
Fund Transfer: Customer can send money anywhere in India. Once you login to your account
you need to mention the payee’s account number & IFSC code.
Credit Card Customers: With Internet banking, customers can not only pay their credit cards
bills online but also get a loan on their cards.
Investing through Internet banking: You can now open an FD online through funds transfer.
Now investors with interlinked demat account and bank account can esaily trade in the stock
market. Amount will be debited form their bank account and share will be credited in their
demat account.
Shopping: You can shop online and the payment is also made conveniently through your bank
account.
Security Precautions: Customers should never share personal information like PIN number
Passwords etc with anyone, including employees of the bank.
National Electronic Fund Transfer (NEFT)
NEFT is one of the most prominent electronic funds transfer system in India. Started in Nov-2005,
NEFT is a facility provided to bank customers to enable them to transfer funds easily and securely
on a one-to-one basis. This is available in 30,000 bank branches all over the country.
The list of bank-wise branches which are participating in NEFT is provided in the website of RBI at-
http://www.rbi.org.in/scripts/neft.aspx.
Page: 90 Created by- Anshuman Singh
Who can transfer funds using NEFT?
Individuals, firms or corporate maintaining accounts with a bank branch can transfer funds using
NEFT. Who do not have a bank account can also deposit cash at the NEFT-enabled branches with
instructions to funds using NEFT.
Who can receive funds through the NEFT system?
Individuals, firms or corporate maintaining accounts with a bank branch can receive funds through
the NEFT system. It is, therefore, necessary for the beneficiary to have an account with the NEFT
enabled destination bank branch in the country.
Is there any limit on the amount that could be transferred using NEFT?
No. There is no limit- either minimum or maximum- on the amount of funds that could be transfer
using NEFT.
What are the benefits of using NEFT?
The remitter need not send the physical cheque or demand Draft to the beneficiary.
The beneficiary need not visit his/her bank for depositing the paper.
Cost effective
Credit confirmation of the remittances sent by SMS or email.
Near real time transfer of the funds to the beneficiary account is a secure manner.
What is IFSC?
IFSC or Indian Financial System Code is an alpha-numeric code that uniquely indentifies a bank-
branch participating in the NEFT System. This is an 11 digit code with the first 4 alpha characters
representing the bank, and the last 6 characters representing the branch. The 5th character is 0.
Real Time Gross Settlement (RTGS)
‘RTGS’ stands for real Time Gross settlement, which can be explained as a system where there is
continuous and real-time settlement of fund-transfers, individually on a transaction by transaction
basis. Considering that the funds settlement. takes place in the books of the Reserve Bank of India,
the payments are final and irrevocable. RTGS is not a 24x7 system. The RTGS service window for
customer transactions is available to banks from 8am to 4:30pm on a working day.
What are the benefits of using RTGS?
It is a safe and secure system for funds transfer.
The system is available on all days when most bank branches are functioning.
There is real time transfer of funds to the beneficiary account.
The remitter need not use a physical cheque or a demand draft.
The transaction charges have been capped by RBI.
Is there any minimum/maximum amount stipulation for RTGS transactions?
The RTGS system is primarily meant for large value transactions. The minimum amount to be
remitted through RTGS is 2,00,000/- with no upper or maximum ceiling.
What about processing charges/service charges for RTGS transactions?
Inward transactions-free, no charge to be levied.
Outward transaction- 2,00,000/- to 5,00,000 - not exceeding 30/-
Above 5,00,000/- not exceeding 55/-
Immediate Payment Service (IMPS)
IMPS is an innovative real time payment service that is available round the clock. This service is
offered by NPCI that empowers customers to transfer money instantly through banks across India.
What are the benefits of using RTGS?
Instant
Available 24x7(functional even on holiday).
Page: 91 Created by- Anshuman Singh
Safe and secure, easily accessible and cost effective.
Channel Independent can be initiated from Mobile/Internet/ATM channels.
Debit & Credit confirmation by SMS.
How do I get IMPS enabled?
Sender: The customer has to do the Mobile Banking Registration If he/she wants to initiate the
transaction through mobile channel.
Receiver: Collect his/her MMID from bank and share with sender or alternatively share his/her
account number & IFSC code or or Aadhaar number for receiving money.
How do I transfer funds using IMPS?
Mobile phones
Smartphone- Bank App/SMS/WAP/USSD
Basic phone-SMS/USSD
Internet- Bank’s Internet banking facility
ATM-by Using ATM Card at Banks ATM
The sender enters receivers details like:
MMID &Mobile no. or Account number & IFSC or Aadhaar number.
Amount to be transferred
Remarks/Payment Reference number
Sender’s M-PIN
Both sender & receiver get SMS confirmation.

Page: 92 Created by- Anshuman Singh

You might also like