Workshop on IT Tools B.com Notes (Unit1, Unit2, Unit3, Unit4)
Workshop on IT Tools B.com Notes (Unit1, Unit2, Unit3, Unit4)
Unit –II
MS-Word: History, Creating, Saving, Opening, Importing, Exporting and Inserting
document, Formatting pages, Alignment, Paragraphs and Sections, creating lists and
numberings Formatting Commands: Headings, Styles, Fonts and Size editing,
Viewing Text, Finding and Replacing text, Headers and Footers, Inserting page
breaks, Page numbers, mail merge. MS-PowerPoint: History, Creating, Saving,
Opening, existing presentation, Creating and Saving a Presentation using Auto
Content Wizard, Design Template, Blank Presentation the Slide Sorter View, Slide
Show, Inserting pictures and graphics and Printing Slides.
Unit III
MS-Excel: Introduction, Components of Excel History, Creating, Saving, Opening,
Spreadsheet, Formatting numbers and Text, Graph and Chart Formatting Commands,
Menu Bar, Toolbars, Producing Charges, Protecting Cell Macro and Printing
Operation, Spell Checking, Cell Editing, Calculation of various Financial and
Statistical Functions using Formulas.
Unit IV
Introduction to E- commerce : Meaning and concept – E- commerce v/s Traditional
Commerce- E- Business, features & benefits of E- Commerce – Impacts, Challenges &
Limitations of E-Commerce , Website – components of website – Concept &
Designing website for E- Commerce – Corporate Website – Portal – Search Engine –
Internet Advertising – Emergence of the internet as a competitive advertising media,
Electronic Payment system, Security Issues in E-Commerce.
Unit-1
Meaning of Computer
Features of Computer
The characteristics of the computer system are as follows −
Speed
A computer works with much higher speed and accuracy compared to
humans while performing mathematical calculations. Computers can
process millions (1,000,000) of instructions per second. The time taken
by computers for their operations is microseconds and nanoseconds.
Accuracy
Computers perform calculations with 100% accuracy. Errors may occur
due to data inconsistency or inaccuracy.
Diligence
A computer can perform millions of tasks or calculations with the same
consistency and accuracy. It doesn’t feel any fatigue or lack of
concentration. Its memory also makes it superior to that of human
beings.
Versatility
Versatility refers to the capability of a computer to perform different
kinds of works with same accuracy and efficiency.
Reliability
A computer is reliable as it gives consistent result for similar set of data
i.e., if we give same set of input any number of times, we will get the
same result.
Automation
Computer performs all the tasks automatically i.e. it performs tasks
without manual intervention.
Memory
A computer has built-in memory called primary memory where it stores
data. Secondary storage are removable devices such as CDs, pen drives,
etc., which are also used to store data.
Advantages of
computer Multitasking
Multitasking is one of the major advantage of computer. Person can
perform multiple task, multiple operation, calculate numerical problems
within few seconds. Computer can perform trillion of instructions per
second.
Speed
Now computer is not just a calculating device. Now a day’s computer
has very important role in human life. One of the main advantages of
computer is its incredible speed, which helps human to complete their
task in few seconds. All the operations can be performed very fast just
because of its speed else wise it takes a long time to perform the task.
Cost/ Stores huge amount of data
It is a low cost solution. Person can save huge data within a low budget.
Centralized database of storing information is the major advantage that
can reduce cost.
Accuracy
One of the root advantage of computer is that can perform not only
calculations but also with accuracy.
Data Security
Protecting digital data is known as data security. Computer provide
security from destructive forces and from unwanted action from
unauthorized users like cyberattack or access attack.
Disadvantage of Computer
As we know advantage comes with disadvantage.
Virus and hacking attacks
Virus is a worm and hacking is simply an unauthorized access over
computer for some illicit purpose. Virus is being transferred from email
attachment, viewing an infected website advertisement, through
removable device like USB etc. once virus is transferred in host
computer it can infect file, overwrite the file etc.
For example: Huge portion of internet was going down including
Twitter, Netflix, Reddit and CNN in October 2016 because the largest
DDoS attack was launched on service provider DYN using IoT Botnet.
Online Cyber Crimes
Online cyber-crime means computer and network may have used in
order to commit crime. Cyberstalking and Identity theft are the points
which comes under online cyber-crimes. For example: one may get the
access of the access to your shopping account like amazon account now
that person will be able to know your personal details like debit card or
credit card number which can be than misused.
Mainly past generation was not used of the computer or they have the
knowledge of computer they faced a big problem when computer came
in field. As we have seen in banking sector senior bank employees faced
this problem when computer came to the banking sector.
Memory Unit
This is unit in which data and instructions given to computer as well as
results given by computer are stored. Unit of memory is "Byte".
Classification of Computer
1 PC It is a single
(Personal user computer
Computer) system having
or Micro- a moderately
powerful
Sr.No. Type Specifications
Computers microprocessor.
It is termed as a
computer that
is equipped
microprocessor
as its CPU.
2 Workstation It is also a
single user
computer
system, similar
to the personal
computer,
however, has a
more powerful
microprocessor.
3 Mini- It is a multi-
Computer user computer
system, capable
of supporting
hundreds of
users
simultaneously.
simultaneously.
Software
technology is
different from
minicomputer.
5 Super- It is an
Computer extremely fast
computer,
which can
execute
hundreds of
millions of
instructions per
second.
PC (Personal Computer)
Mainframe
The mainframe is very large in size and is an expensive computer
capable of supporting hundreds or even thousands of users
simultaneously. Mainframe executes many programs concurrently and
supports much simultaneous execution of programs.
Supercomputer
Supercomputers are one of the fastest computers currently available.
Supercomputers are very expensive and are employed for specialized
applications that require an immense amount of mathematical
calculations (number-crunching).
For example, weather forecasting, scientific simulations,
(animated)graphics, fluid dynamic calculations, nuclear energy research,
electronic design, and analysis of geological data (e.g. in petrochemical
prospecting).
What is Memory?
Memory is very much like our brain as it is used to store data and
instructions. Computer memory is the storage space where data is to be
processed, and instructions needed for processing are stored. The
memory is divided into a large number of smaller portions called the cell.
Every cell/ location has a unique address and a size.
Primary Memory
Secondary Memory
All secondary storage devices which are capable of storing high volume
data is referred to secondary memory. It's slower than primary memory.
However, it can save a substantial amount of data, in the range of
gigabytes to terabytes. This memory is also called backup storage or
mass storage media.
Floppy disks
Hard disks
Flash/SSD
Solid State Drive provides a persistent flash memory. It's very
fast compared to Hard Drives. Frequently found in Mobile
phones, its rapidly being adopted in PC/Laptop/Mac.
Optical drives:
This secondary storage device is from which data is read and written
with the help of lasers. Optical disks can hold data up to 185TB.
Examples
CD
DVD
USB drives:
It is one of the most popular types of secondary storage device available
in the market. USB drives are removable, rewritable and are physically
very small. The capacity of USB drives is also increasing significantly
as today 1TB pen drive is also available in the market.
Input devices
Keyboard
Keyboard is the most common and very popular input device which
helps to input data to the computer. The layout of the keyboard is like
that of traditional typewriter, although there are some additional keys
provided for performing additional functions.
Mouse
Mouse is the most popular pointing device. It is a very famous cursor-
control device having a small palm size box with a round ball at its base,
which senses the movement of the mouse and sends corresponding
signals to the CPU when the mouse buttons are pressed.
Joystick
Joystick is also a pointing device, which is used to move the cursor
position on a monitor screen. It is a stick having a spherical ball at its
both lower and upper ends. The lower spherical ball moves in a socket.
The joystick can be moved in all four directions.
Light Pen
Light pen is a pointing device similar to a pen. It is used to select a
displayed menu item or to show objects on the monitor screen. It
consists of a photocell and an optical system placed in a small tube.
Track Ball
Track ball is an input device that is mostly used in notebook or laptop
computer, instead of a mouse. This is a ball which is half inserted and
by moving fingers on the ball, the pointer can be moved.
Scanner
Scanner is an input device, which works more like a photocopy
machine. It is used when some information is available on paper and it
is to be transferred to the hard disk of the computer for further
manipulation.
Microphone
Microphone is an input device to input sound that is then stored in a
digital form.
Output Devices
Monitors
Monitors, commonly called as Visual Display Unit (VDU), are the
main output device of a computer. It forms images from tiny dots,
called pixels that are arranged in a rectangular form. The sharpness of
the image depends upon the number of pixels.
There are two kinds of viewing screen used for monitors.
Large in Size
High power consumption
Impact Printers
Non-Impact Printers
Impact Printers
Impact printers print the characters by striking them on the ribbon,
which is then pressed on the paper.
Characteristics of Impact Printers are the following −
Advantages
Inexpensive
Widely Used
Other language characters can be printed
Disadvantages
Slow Speed
Poor Quality
Daisy Wheel
Head is lying on a wheel and pins corresponding to characters are like
petals of Daisy (flower) which is why it is called Daisy Wheel Printer.
These printers are generally used for word-processing in offices that
require a few letters to be sent here and there with very nice quality.
Advantages
These are non-impact page printers. They use laser lights to produce the
dots needed to form the characters to be printed on a page.
Advantages
Very high speed
Very high quality output
Good graphics quality
Supports many fonts and different character size
Disadvantages
Expensive
Cannot be used to produce multiple copies of a document in a
single printing
Operating system
Definition
An operating system is a program that acts as an interface between the
user and the computer hardware and controls the execution of all
kinds of programs.
Memory Management
Processor Management
Device Management
File Management
Security
Job accounting
Memory Management
Memory management refers to management of Primary Memory or
Main Memory. Main memory is a large array of words or bytes where
each word or byte has its own address.
Main memory provides a fast storage that can be accessed directly by
the CPU. For a program to be executed, it must in the main memory.
An Operating System does the following activities for memory
management −
Keeps tracks of primary memory, i.e., what part of it are in use by
whom, what part are not in use.
In multiprogramming, the OS decides which process will get
memory when and how much.
Allocates the memory when a process requests it to do so.
De-allocates the memory when a process no longer needs it or has
been terminated.
Processor Management
In multiprogramming environment, the OS decides which process gets
the processor when and for how much time. This function is
called process scheduling. An Operating System does the following
activities for processor management −
Keeps tracks of processor and status(0) of process. The program
responsible for this task is known as traffic controller.
Allocates the processor (CPU) to a process.
De-allocates processor when a process is no longer required.
Device Management
An Operating System manages device communication via their
respective drivers. It does the following activities for device
management −
Keeps tracks of all devices. Program responsible for this task is
known as the I/O controller.
Decides which process gets the device when and for how much
time(mouse, keyboard,printer).
Allocates the device in the efficient way.
De-allocates devices.
File Management
A file system is normally organized into directories for easy navigation
and usage. These directories may contain files and other directions.
An Operating System does the following activities for file management
−
Keeps track of information, location, uses, status etc. The
collective facilities are often known as file system.
Decides who gets the resources.
Allocates the resources.
De-allocates the resources.
Other Important Activities
Following are some of the important activities that an Operating System
performs −
Security − By means of password and similar other techniques, it
prevents unauthorized access to programs and data.
Control over system performance − Recording delays between
request for a service and response from the system.
Job accounting − Keeping track of time and resources used by
various jobs and users.
Error detecting aids − Production of dumps, traces, error
messages, and other debugging and error detecting aids.
What is Software
Software is a set of programs, which is designed to perform a well-
defined function. A program is a sequence of instructions written to
solve a particular problem.
There are two types of software −
System Software
Application Software
System Software
The system software is a collection of programs designed to operate,
control, and extend the processing capabilities of the computer itself.
System software is generally prepared by the computer manufacturers.
These software products comprise of programs written in low-level
languages, which interact with the hardware at a very basic level.
System software serves as the interface between the hardware and the
end users.
Some examples of system software are Operating System, Compilers,
Interpreter, Assemblers, etc.
Payroll Software
Student Record Software
Inventory Management Software
Income Tax Software
Railways Reservation Software
Microsoft Office Suite Software
Microsoft Word
Microsoft Excel
Microsoft PowerPoint
Select the folder under which the new folder should reside.
For example, if you want to place a subfolder within My
Documents, go to this folder.
Select File from the menu bar.
Select New, then click on Folder. A blank folder icon will be
created in the selected location.
Type the new folder name.
Press the Enter key.
Files and folders can be copied from one folder to another folder or
even from one disk drive to another drive. To copy a file from one
folder to another folder:
Microsoft Word offers a local version of the software that you can
access on your computer and a version you can access through your
web browser. In the past, Word was only available as a program you
install locally on your computer.
5. Built-in Collaboration
1. File tab. From then menu on the left, select Options. (Rather
confusingly it looks like the Info tab is selected.
2. Home Tab
3. Insert Tab
This tab contains all the commands for inserting items into your
documents such as Cover Page, Tables, Header & Footer etc.
Tables
When a table is selected you will see additional contextual tabs Tables > Table Tools Design
Illustrations
4. Mail merge
This tab contains everything needed to complete a successful mail merge.
Create
Start Mail Merge - Drop-Down. The drop-down contains the commands: Letters, E-mail
Messages, Envelopes, Labels, Directory, Normal Word Document and Step-by-Step Mail
Merge Wizard. Creates a from letter which you intend to email or print multiple times sending
each copy to a different recipient. Displays the "New Address List" dialog box.
Select Recipients - Drop-Down. The 3 options are from step 3 of the wizard. The drop-down
contains the commands: Type New List, Use Existing List and Select from Outlook Contacts.
Type New List displays the "New Address List" dialog box. You will have to save this list as a
Microsoft Office Address List (.mdb).
Edit Recipient List - Displays the "Mail Merge Recipients" dialog box allowing you to change
or filter the list of recipients.
These commands are only available when you are in a mail merge document.
Highlight Merge Fields - Highlights all the fields in the active document that have been
inserted. This makes is easy to see what will be replaced.
Address Block - Displays the "Insert Address Block" dialog box. This allows you to customise
how the address will be inserted.
Greeting Line - Displays the "Insert Greeting Line" dialog box. Lets you add a greeting line to
your document.
Insert Merge Field - Button with Drop-Down. The button displays the "Insert Merge Field"
dialog box. The drop-down allows you to quickly insert a merge field just by clicking on it in
the list and contains the commands: Title, First_Name, Last_Name, Company_Name,
Address_Line_a, Address_Line_2, City, State, Zip_Code, Country_or_Region, Home_Phone,
Work_Phone, Email_Address.
Rules - Drop-Down. Lets you add decision making rules to the mail merge. The drop-down
contains the commands: Ask, Fill-in, If-Then-Else, Merge Record, Merge Sequence, Next
Record, Next Record If, Set Bookmark, Skip Record If.
Match Fields - Displays the "Match Fields" dialog box allowing you to match the required
fields with the recipients list.
Update Labels - Only enabled when creating labels. Updates all the labels in the document to
be consistent with the first label.
Apply image size and quality settings for an open document or for all new documents.
6. Chart
Allow custom formatting and labels to stay with data points, even if the chart changes.
8. Display
Choose a measurement format, show scrolling bars, and select the number of documents shown
in the Recent Documents list.
9. Print
Optimize the appearance of the hard-copy version of the document or change your printer paper
size.
10. Save
Save backup copies, automatically save changes to templates, or allow backup saves.
PowerPoint
PowerPoint is a complete presentation graphics package. It gives you everything you
need to produce a professional-looking presentation. PowerPoint offers word
processing, outlining, drawing, graphing, and presentation management tools- all
designed to be easy to use and learn.
Features of PowerPoint
1) Adding Smart Art
Don’t confuse SmartArt with the similarly named WordArt. Where WordArt just
allows you to display text using a wide variety of different formats and effects,
SmartArt is a comprehensive and flexible business diagram tool that greatly
improves upon the ‘Diagram Gallery’ feature found in previous versions of Office.
SmartArt can be used to create professional diagrams that include pictures and
text or combinations of the two. An obvious use of SmartArt would be to create
an organisation chart but it can be used for many different kinds of diagrams and
even to provide some variety to slides using text bullet points.
2) Inserting Shapes
If you need to include some sort of diagram in your presentation, then the quickest
and easiest way is probably to use SmartArt. However, it is important to be able to
include shapes independently of SmartArt and worth being familiar with the
various Drawing Tool format options.
Not only will they be useful if you do need to manually draw a diagram (and
SmartArt doesn’t suit all diagrams), but they can also be applied to objects on a
slide that you might not immediately think of as shapes. For example the box that
contains your slide title or your content. This can be anything from text to a video,
or even the individual shapes in a SmartArt diagram.
As you can see, the gallery of available shapes is very extensive. Once you have
selected your chosen shape, you can just click in your slide to insert a default
version of the shape or, to set a particular size and position, click and drag with
the mouse to create the shape and size you want.
3) Inserting an Image
Here are two content type icons which appear in new content Placeholders for
inserting pictures. You can Insert Picture from File or Insert Clip Art.
Alternatively, the Illustrations group of the Insert ribbon tab includes the same
two tools. In addition, PowerPoint 2010 has a new ‘Screenshot’ option that allows
you to capture an entire window or part of a window for inclusion on a slide. You
can also copy any image and just paste it directly to a slide.
Insert Picture from File allows you to browse to an image file saved somewhere
on your system whereas Clip Art is held in an indexed gallery of different media
types. Clip Art is not limited to pictures: ‘The Results should be:’ box lets you
choose between: ‘All media file types’ and one or more of the following different
types:
Illustrations
Photographs
Video
Audio
Once you have found the image you want to use, click on it to insert it into the
current slide. You can now re-size and move the image accordingly with further
editting options available when you right click the desired image.
4) Slide Transitions
Properly used, slide transitions can be make your presentations clearer and more
interesting and, where appropriate, more fun. Badly used, the effect of slide
transitions can be closer to irritating or even nauseating. Simple animation effects
are often used to add interest to bullet point text. Much more extreme animation
effects are available but, in most cases, should be used sparingly if at all.
In PowerPoint 2010 & 2013 there is also a separate Transitions ribbon tab that
includes a gallery of different transition effects. These can be applied to selected
slides or all slides. If you want to apply different transition effects to different
groups of slides, then you might want to choose ‘Slide Sorter’ view from the
Presentation Views group of the View ribbon.
5) Adding Animations
Whereas the transition effects are limited to a single event per slide, animations
can be applied to every object on a slide – including titles and other text boxes.
Many objects can even have animation applied to different components, for
example each shape in a SmartArt graphic, each paragraph in a text box and each
column in a chart. Animations can be applied to three separate ‘events’ for each
object:
PPT Options
1. Editing options
When selecting, automatically select entire word Select this check box to select
the entire word when you click a word, or clear this check box to select an
individual letter in a word when you click a word.
Use smart cut and paste Select this check box if you want PowerPoint to
adjust the spacing of words and objects that you paste into your presentation.
Smart cut and paste ensures that pasted content does not run up against other
words or objects that appear before or after the content that you paste.
Options that you set in this section are only applicable to the presentation file that
you have open at the time.
4. Chart options
Properties follow chart data point for all new presentations Select this
check box to have custom formatting and chart data labels follow data points as
they move or change in the chart. This setting applies to all presentations created
hereafter.
5. Display
Select this check box to show the keyboard shortcuts in all ScreenTips, or clear
this check box to hide the keyboard shortcuts in all ScreenTips.
(PowerPoint 2013 and newer versions) To turn off using presenter view, clear
this check box. By default, PowerPoint uses presenter view for slide shows.
Select an option from the list to specify that all presentations open in a
specific view each time that you start PowerPoint.
9. Slide Show
Show menu on right mouse click Select this check box to show a shortcut
menu when you right-click a slide in Slide Show view, or clear this check box to
prevent the shortcut menu from showing.
10. Print
Print in background Select this check box to work in PowerPoint while you print your
presentation (printing can slow the response time in PowerPoint), or clear this check box to turn
off background printing when you want rapid response time while you work in PowerPoint.
Unit-III
Microsoft Excel
Workbooks/Sheets
A workbook is the name given to an Excel document and has the file extension (".xlsx").
A workbook contains one or more worksheets and there are 3 worksheets in the default
workbook.
There are tabs at the bottom of the workbook to enable you to select which worksheet is
currently displayed.
Features of Microsoft Excel
MS Excel allows us to keep the header and footer in our spreadsheet document.
MS Excel allows us to find the needed data (text and numbers) in the workbook and also
replace the existing data with a new one.
3. Password Protection
It allows the user to protect their workbooks by using a password from unauthorized access to
their information.
4. Data Filtering
Filtering is a quick and easy way to find and work with a subset of data in a range. A filtered
range displays only the rows that meet the criteria you specify for a column. MS Excel provides
two commands for filtering ranges:
5. Data Sorting
Data sorting is the process of arranging data in some logical order. MS Excel allows us to sort
data either in ascending or descending order.
6. Built-in formulae
MS Excel has got many built-in formulae for sum, average, minimum, etc. We can use those
formulae as per our needs.
MS Excel allows us to create different charts such as bar graph, pie- charts, line graphs,
etc. This helps us to analyze and compare data very easily.
MS Excel automatically edits the result if any changes are made in any of the cells.
9. Formula Auditing
Using formula auditing we can graphically display or trace the relationships between cells and
formulas with blue arrows.
Excel Components
When you start Excel an empty workbook is automatically opened for you.
You can easily create a new workbook by selecting (File > New) and clicking on
Blank workbook in the New Workbook task pane.
You can also use the shortcut key (Ctrl + N).
Deleting
Opening
You can open a workbook by selecting (File > Open) or by using the shortcut key (Ctrl + O).
Alternatively you can use the button on the Standard toolbar.
When you display the (File > Open) dialog box, a default folder location is used. This can be
changed from (Tools > Options)(General tab, Default File Location).
If you save all your workbooks in the same folder it is definitely worth changing your default
folder.
You can also double click an Excel file from within Windows Explorer. Excel files have the file
extension (".xls"). If Excel is not currently open then it will open automatically.
You can also open a file using the Recently Used Menu. This is located at the bottom of your
File menu (see below).
By default your last 4 Excel workbooks that have been opened using the (File > Open) dialog
box will be listed here. You can select one of these to quickly re-open the workbook.
You can change the number of files listed here by selecting (Tools > Options)(General
tab, Recently used file list). This can be a number between 1 and 9.
If you attempt to open an Excel workbook that is already open you will be asked if you want to
open a read-only copy.
Dialog Box
It is possible to open more than one file by holding down the Ctrl key and selecting the files
with your mouse.
Look in - Displays the folder where the workbook will be saved. To change to a different disk
drive or folder, open the Look in drop-down list and click the letter of the disk drive or name of
the folder. F4 or (Alt + I). Pressing F5 will refresh the list of files.
File name - The name of the file you want to open.
Files of type - Provides a list of all the different formats you can open using Excel. The default
is "All Microsoft Excel files". You can find a list of all the File Extensions page.
Open - Opens the workbook that is currently selected.
Cancel - Closes the dialog box.
Closing
Closing your workbooks when you have finished with them can be done in several ways.
The easiest way is to select (File > Close) or by using the shortcut key (Ctrl + W).
You can also close the active workbook by clicking on the icon on the left of the Menu Bar.
An alternative way to close the active workbook is to press the black cross on the control menu
in the top right hand corner of the Menu Bar.
Formatting
Applying formatting to your worksheets will make them easier to read and
interpret your data.
You can apply formatting to cells very quickly by selecting the cells or range of
cells and choosing the appropriate commands.
Formatting toolbar
Allows you to alter the appearance and alignment of the data on a worksheet.
Number: - We use this option to change the number formatting into General,
Percentage, Currency, Date, Time, Fraction etc. We can increase and decrease the
decimal and convert the number into accounting number.
Function Library: -In Excel, we have 461 functions and they are available in the
formulas tab under the function library group. And there is no need to learn every
formula for we can find formulas category wise such as:- Financial, Logical, Text,
Date & Time, Lookup & Reference, Math & Trig, many more.
Macros: -With this option, we can record the macro and then we can view the
macro.
File
In this tab, we can use the object relate options such as we can change the fill
color, outline color, outline width, shape style, and we can insert more objects,
even.
Insert
If we insert the chart, then 2 contextual tabs will be activated: - 1st Design and
2nd Format.
Format Tab: - We use this tab to format the chart as an object. In order to insert
the new shape, we can change chart’s shape-style, Fill-color, Shape-outline,
shape-effects, etc.
1. Select a cell.
2. Type the equal sign =.
1. When a formula is entered into a cell, it also appears in the Formula bar.
2. To see a formula, select a cell, and it will appear in the formula bar.
Meaning
Ecommerce, also known as electronic commerce or internet commerce,
refers to the buying and selling of goods or services using the internet,
and the transfer of money and data to execute these transactions.
Ecommerce is often used to refer to the sale of physical products online,
but it can also describe any kind of commercial transaction that is
facilitated through the internet.
Usage It is used to save valuable time It is ancient and still in usage where
and money. the digital network is not reachable.
Features of E-commerce
1. User-Friendly
As a matter of fact, studies show that 76% of consumers say the most
important characteristic of a website is ease of use.
2. Mobile-Friendly Website
Gone are the days of posting one photo with a few bullet points and a
price tag.
Shoppers want to see multiple angles and people using the product in
different environments. They want to be able to zoom in and get a feel
for the product.
Technical considerations for images are crucial. Images that don’t load
or take too long to load will see a consumer drop-off rate of 39%,
according to Adobe
4. User-Generated Reviews
And 57% of consumers will only use a business if it has 4 or more stars.
You might think that having negative reviews is a sale killer. The
opposite is actually true.
Having negative reviews can often be positive. It’s shown that products
without negative reviews are seen as censored and, in turn, shoppers
will assume the positive reviews are fake.
5. Special Offers
6. Wish Lists
Oh, how I love wish lists. One for fashion, one for books to read, one
for holiday gift ideas.
7. Related Items
Simply seeing the phrase, “you might like this” causes a serotonin
release signaling curiosity and excitement.
Fine Watch Bank (disclosure: they were a client) sells expertly crafted
high-end watches.
The company’s buyers need confirmation of watch authenticity and
detailed product information to feel comfortable when making a
purchase.
9. Security Features
Challenges/Limitations of E-commerce
1. Cyber security: Businesses that focus their attention in the e-
commerce space need policies and procedures to create a solid
cybersecurity framework for the organization. In the case of a
cyberattack, a small business cannot afford to have downtime in
operations and sales.
2. Competition
3. Order fulfillment
Not everything has to fall on the back of the small business owner. You
could be inundated with more orders than you are prepared to handle on
your own.
4. Customer experience
How are you supposed to get quality traffic to your site and turn
visitors into customers if people can't find your site to begin with? It's a
big issue for e-commerce businesses, and one that could make or break
a business.
6. Return/refund policy
"If you want your brand to stand tall, then customer satisfaction should
be the first priority, and whatever you're selling should be the same as
what's advertised
8. Technical Issues
Running an e-commerce store makes you reliant on both soft- and
hardware. In addition to actions that can be planned, such as
migrations and upgrades, you may face sudden server issues,
problems with security, various downtimes and more.
9. Shipping Issues
Shipping is one of the biggest headaches for every e-commerce
business owner. In contrast to traditional retail where the customer
contacts the seller directly, e-commerce means you need to arrange the
shipment of products.
What is Website ?
Website Components
Think of your web host as similar to a landlord who rents you space
for a physical store. They provide and maintain the server space where
your site files “live” and make it possible for visitors to come by and
explore your site.
Your content management system works behind the scenes to help you
organize and maintain parts of your website like your site pages
and meta data, and it makes it easier for visitors to find their way
around your site.
3. SEO Basics
4. Analytics Tools
You’ll want to know how people are finding your site, which pages
they spend the most time on, and how well different elements of your
site convert. Google Analytics is the most popular and easy to use
resource, it doesn’t cost anything, and it integrates easily with
WordPress and some website builder tools.
5. Inventory Management
When you’re selling products on your site, you’ll want to make sure
you keep track of what you have in stock, what’s sold, and what’s on
order.
A home page that lets you know what the site’s for, an about
us section that shows there are real people behind the site, and contact
information so readers or customers can reach you if they have
questions or feedback.
7. Media
It’s a rare site that can build an audience on words alone. Our eyes are
naturally drawn to images, especially if they move and make noise, and
images are a must if you’re selling merchandise online. People will also
want to see a photo of you in your about us section.
If your site includes a shop, you’ll want a reliable, easy to use shopping
cart and payment tools like PayPal or Square that are popular with most
online shoppers.
9. Search engine
Features /Advantages
Cost
The low costs of electronic communication reduce the cost of displaying
online advertisements compared to offline ads. Online advertising, and
in particular social media, provides a low-cost means for advertisers to
engage with large established communities.Advertising online offers
better returns than in other media.
Measurability
Online advertisers can collect data on their ads' effectiveness, such as
the size of the potential audience or actual audience response, how a
visitor reached their advertisement, whether the advertisement resulted
in a sale, and whether an ad actually loaded within a visitor's view. This
helps online advertisers improve their ad campaigns over time.
Formatting
Advertisers have a wide variety of ways of presenting their promotional
messages, including the ability to convey images, video, audio, and
links. Unlike many offline ads, online ads also can be interactive. For
example, some ads let users input queries or let users follow the
advertiser on social media.Online ads can even incorporate games.
Targeting
Publishers can offer advertisers the ability to reach customizable and
narrow market segments for targeted advertising. Online advertising
may use geo-targeting to display relevant advertisements to the user's
geography. Advertisers can customize each individual ad to a
particular user based on the user's previous preferences.Advertisers can
also track whether a visitor has already seen a particular ad in order to
reduce unwanted repetitious exposures and provide adequate time gaps
between exposures.
Coverage
Online advertising can reach nearly every global market, and online
advertising influences offline sales.
Speed
Once ad design is complete, online ads can be deployed immediately.
The delivery of online ads does not need to be linked to the publisher's
publication schedule.
Access to Data
With the help of online analytics tools, you can decipher which
strategies are working for you and which are not. You can analyze
customer data such as keyword data and can further make the required
changes.
Credit Card
Debit Card
Smart Card
E-Money
UPI
Credit Card
Debit card
Debit card, like credit card, is a small plastic card with a unique
number mapped with the bank account number. It is required to have a
bank account before getting a debit card from the bank. The major
difference between a debit card and a credit card is that in case of
payment through debit card, the amount gets deducted from the card’s
bank account immediately and there should be sufficient balance in the
bank account for the transaction to get completed; whereas in case of a
credit card transaction, there is no such compulsion.
Smart Card
Paytm
UPI
Google Checkout
Google Checkout is Google’s answer to PayPal. Google Checkout
allows users to pay for goods and services through an account
connected to their Google profile. The major benefit that Google
Checkout has over the competition is that millions of Internet users use
Google for other services, making a purchase through Checkout a
simpler process.
Paypal
PayPal is the world’s most widely used payment acquirer, processing
over $4 billion in payments in 2011. PayPal payments are made using a
user’s existing account or with a credit card. Money can be sent directly
to an email address.
Authorize .net
Authorize.Net is the Internet’s most widely used payment gateway. With
a user base of over 300,000 merchants, Authorize.Net has been the go-to
method for e-commerce sites that need a gateway to accepting payments.
Security is an essential part of any transaction that takes place over the
internet. Customers will lose his/her faith in e-business if its security is
compromised. Following are the essential requirements for safe e-
payments/transactions –
Man-in-the-middle Attacks
As hackers are becoming smarter with technology, they are devising
ways of listening to the communications made by users of an e-
commerce website. Through an approach known as a man-in-the-middle
attack, these hackers maliciously trick users into connecting to a public
wireless network. They gain access to people’s devices once they are on
public wireless networks. Hackers get to see a people’s browsing history,
credit card numbers, passwords and usernames if the websites they are
visiting lack strong encryptions.
Bad Bots
Bots, either good or bad, are all over the worldwide web. Search engines
such as Bing and Google use good bots for indexing search results. On
the other hand, there are hackers that use malicious bots for gathering
data such as product data, inventories and pricing data. These bots are
also capable of accessing the database of an e-commerce site and listing
the logins of user accounts.
Malware
In information technology, malware simply refers to malicious software
programs. Attackers usually inject web pages or files with these
malicious programs to help them in gaining access to online retails
stores. Through means such as SQL injection, they can easily insert the
malware into a website’s database allowing it to compromise the data
stored in the database.
Phishing Scams
E-commerce sites are also prone to phishing scams sent by known or
unknown people in form of emails. These scams focus on targeting
important user data like credit card numbers and login credentials. An
attacker may use a scheme known as social engineering to lure online
shoppers to give out their personal information.
https://bettersolutions.com/word/ribbon/insert-tab.htm