Unit 2: Foundations of Ownership, Security Related Concepts in Blockchain Foundations of Ownership In traditional systems, ownership is often documented and verified by centralized authorities (e.g., land registries, banks). In blockchain, ownership is established and proven through cryptographic methods, primarily using public-key cryptography . Public and Private Keys: Each user on a blockchain network has a unique pair of cryptographic keys: a public key and a private key. The public key acts as an address, similar to an account number, visible to everyone. It's used to receive assets or data. The private key is a secret code that grants control over the assets associated with the public key. Only the person possessing the private key can authorize transactions from that address. Digital Signatures: To prove ownership or authorize a transaction, a user digitally "signs" a message or transa...
notes: download syllabus : download unit 1: download unit 2: download unit 3: unit 4: unit 5: SEM-II COURSE 4: E-COMMERCE AND WEB APPLICATION DEVELOPMENT Theory Credits: 3 3 hrs/week UNIT-I Introduction to E-Commerce: Definition, scope, and evolution, Benefits and limitations Types of E-Commerce: B2B, B2C, C2C, C2B, G2C models E-Commerce Business Models: Revenue models (advertising, subscription, etc.) Infrastructure for E-Commerce : Internet, intranet, Extranet Payment gateways and digital wallets Legal and Ethical Issues: Cyber laws and data privacy,Intellectual property, taxation, and security. Case study : Study of successful e-businesses UNIT-II Technology in E-Commerce: Essentials of web design for business - Content management systems (WordPress, Shopify, BootStrap) Online Marketing & SEO: Digital marketing channels, Search engine optimization basics. Digital Payment Systems: Credit/Debit Cards, Net Banking, Mobile Wallets, UPI, Electronic...
Unit 1: Foundations of Software Systems and Blockchain 1. Layers of a Software System Software systems are typically organized into layers to separate responsibilities, improve maintainability, and allow independent scaling. Common layers include: Presentation Layer: Handles user interface (UI) and user interaction (e.g., web pages, mobile app screens). Application/Business Logic Layer: Contains the core business rules and orchestrates data flow, processing user requests (the "brains" of the application). Data Access Layer (DAL): Provides an interface for the application to interact with data storage, abstracting database complexities. Data Layer: The actual persistent storage for data (e.g., databases, file systems). This layered approach promotes modularity and makes systems easier to develop, test, and update. 2. Integrity Integrity in software systems ensures that data is accurate, consistent, and trustworth...
The Internet offers a wide range of services that cater to communication, information sharing, entertainment, and business operations. Below are some of the key services provided by the Internet: 1. World Wide Web (WWW) The World Wide Web is a vast collection of interlinked documents, websites, and multimedia content accessible through web browsers like Chrome, Firefox, and Safari. Uses: Accessing websites, reading articles, watching videos, conducting research, and browsing online content. Protocols: Primarily uses HTTP (Hypertext Transfer Protocol) and HTTPS (for secure communication). 2. Email (Electronic Mail) Email allows users to send and receive messages electronically over the Internet. Uses: Communication between individuals or organizations, file sharing, and business correspondence. Protocols: SMTP (Simple Mail Transfer Protocol), IMAP (Internet Message Access Protocol), and POP3 (Post Office Protocol). 3. File Transfer (FTP) The File Transfer Protocol (FTP) allows users to ...
ppt unit 1-1 download unit 1-2 download unit 2-1 download unit 2-2 download Migrating from Traditional Channels to Digital Channels Migrating from traditional to digital channels can be a significant undertaking for businesses, but it can also lead to significant benefits, such as increased reach, improved customer engagement, and better data-driven decision-making. Here's a breakdown of the process: 1. Define Your Goals and Objectives: What are you hoping to achieve with your digital presence? What specific metrics will you use to measure success? Who is your target audience, and what are their digital habits? 2. Assess Your Current Situation: What are your strengths and weaknesses in terms of digital marketing? What resources do you have available (budget, personnel, technology)? What are the potential risks and challenges of migrating to digital? 3. Choose the Right Digital Channels: Social Media: Which platforms are your target audience most active on? S...
Unit-V: Image Manipulations, Audio and Video & Introduction to JavaScript I. Image Manipulations, Audio and Video This section focuses on integrating and controlling various media types within web pages, enhancing both aesthetics and functionality. A. Image Positioning and Display 1. Position an Image: CSS position property: · static (default): Renders elements in normal document flow. · relative : Positions an element relative to its normal position. Use top , bottom , left , right for offset. Doesn't affect other elements' positions. · absolute : Positions an element relative to its nearest positioned ancestor (not static). Removed from normal flow. · fixed : Positions an element relative to the viewport . Stays in place ev...
Unit-III: Cascading Style Sheets (CSS) 1. CSS Overview · What is CSS? CSS (Cascading Style Sheets) is a language used for describing the presentation of a document written in a markup language like HTML. It dictates how HTML elements are to be displayed on screen, paper, or in other media. · Separation of Concerns: CSS promotes the separation of document content (HTML) from document presentation (CSS). This makes websites easier to maintain, more flexible, and more accessible. · How it Works: Browsers apply CSS rules to render HTML elements according to the specified styles. 2. CSS Rules A CSS Rule (or Rule Set ) consists of two main parts: · Selector: Points to the HTML element(s) you want to style. · Declaratio...
Unit-II: HTML Coding Standards & Elements 1. Coding Standards & Block Elements HTML Coding Conventions: · Lowercase Tags and Attributes: Always use lowercase for HTML tag and attribute names (e.g., <p> , <a> , href ). · Quoted Attribute Values: Enclose all attribute values in double quotes (e.g., <img src="image.jpg"> ). · Meaningful Indentation: Use consistent indentation (e.g., 2 or 4 spaces) to improve readability and show the hierarchical structure of the document. · Semantic HTML: Use HTML elements according to their meaning, not just their default styling (e.g., <h1> for a main heading, <p> for a paragraph). · Comments: Use comments (``) to explain complex or non-obviou...
Information and Communication Technology Information and Communication Technology (ICT) refers to the use of technology for managing and processing information and communication. It encompasses a broad range of tools, systems, and services, including hardware, software, networks, and devices that allow for the collection, storage, transmission, and manipulation of data. Key components of ICT include: 1. Computers and Hardware: Physical devices like computers, servers, routers, and mobile devices. 2. Software: Applications and systems that enable the processing of data and information (e.g., operating systems, databases, office productivity tools, and specialized applications). 3. Networks: Communication systems like the internet, intranets, and other wired or wireless networks that connect users and systems. 4. Telecommunication: Technologies for transmitting information, including telephones, video conferencing, and satellite communications. 5. Data Storage: Methods for storing large...
Comments
Post a Comment