KEMBAR78
Pbs 3rd Semester | PDF | Cybercrime | Educational Technology
0% found this document useful (0 votes)
17 views2 pages

Pbs 3rd Semester

The document discusses the importance of emails in business communication, highlighting their role in professionalism, marketing, and collaboration. It also covers various technologies in e-learning, including computers, blogging, and video tools, emphasizing their advantages and disadvantages. Additionally, it touches on data analysis, online education, and the impact of artificial intelligence in e-business.

Uploaded by

Akhil V
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views2 pages

Pbs 3rd Semester

The document discusses the importance of emails in business communication, highlighting their role in professionalism, marketing, and collaboration. It also covers various technologies in e-learning, including computers, blogging, and video tools, emphasizing their advantages and disadvantages. Additionally, it touches on data analysis, online education, and the impact of artificial intelligence in e-business.

Uploaded by

Akhil V
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

MODULE 1 Importance of emails in business Digital age learner Major technologies in e-learning

Professionalism • E-mail is used for online communication in Digital age is a period in human history 1. Computers, tablets and mobile devices
Professionalism is the conduct, aims, or qualities business. • It can be used in all kinds of characterized by a shift from industrial Computers and tablets allow students and
that characterize or mark a profession or a businesses and professions.•Used to access any production to information and computerisation. teachers’ access to websites and other
professional person. kind of public application on the internet. • Used Digital learners are also called net generation. programs, such as Microsoft Word, PowerPoint,
Professional Characteristics to verify people when they subscribed to the Characteristics of digital learners Excel, PDF files, and images. These tools help
• Professional appearance • Reliable • Ethical news later or want to download eBooks. • E-mail 1. Busy 2. Impartial 3. Impatient 4. Technical learners to express their ideas.
behaviour • Professional Code of Ethics communication is used by businesses to 5. Social media users 2. Blogging
• Accountable • Professional language promote products and services. • E-mail is Knowledge resource on internet A blog is a discussion or informational site
• Separates personal and professional helpful to manage communication in the E-books published on the World Wide Web.
• Positive attitude • Emotional control business network. • Sharing and collaboration An eBook is an electronic version of a traditional 3. Webcams
• Effective time management • Focused • Poised can be done through email. • Notification and print book that can be read by using a personal A webcam is a video camera that feeds or
• Respectful of others • Strong communicator important updates are informed by business to computer or by using an e-book reader. streams its image in real time to or through
• Possesses soft skills its customers. • Emails are the prime operators Features of e-book computer network.
Traits and qualities of a good professional for online stores and internet marketing • Tangibility • Browsability • Searchability 4. Whiteboards
• Excellence • Organizational skills • Time companies. • E-mail marketing is one of the • Referencability • Hybridit A whiteboard is a name for any glossy, usually
management • Soft skills • Good communication popular digital marketing practices for business. Advantages of e-book white surface for non-permanent markings.
• Positive attitude • Focus and hard work • Private and recorded communication. 1. Low update cost 2. Multimedia format 3. S 5. Screen casting
• Ethical behaviour • Continuous learning Advantages of e-mail searchable 4. Convenience 5. Portability 6. Less A screencast is a digital recording of computer
• Seeks advice • Teaches new generation 1. Fast client communication 2. Availability and space 7. Print on demand 8. Interactivity 9. screen output, also known as a video screen
• Advancing in profession portability 3. Reduces shipping and mailing cost Personalization capture.
Professionalism in business Disadvantages of e-mail Disadvantages of e-book MODULE 3
1. Establishing proper boundaries 2. Encourages 1. Vulnerability to loss 2. Accessible to others 1. Not convenient to read 2. Piracy 3. Costly 4.
personal improvement 3. Promote and maintain 3. Difficult to interpret emotions Risky 5. Prefer printed text 6. Not compitable Features of New Generation Computers
accountability 4. Establishing respect E-mail Etiquette with computers • Speed of operation • Accuracy • Storage
5. conflict 6. Increased job satisfaction The Dos and Don’ts of Email Communication Audio in e-learning • Versatility • Automatic operation • Diligence
7. The sense of responsibility 8. Personal growth The Dos Anything related to sound in terms of receiving, • Complexity • Reliability
Professional skills • Double –check the recipient’s email addresses transmitting or reproducing or its specific Data analysis
• Communication skills • Decision making skills • Proofread the email before pressing the “Send” frequency. The process of evaluating data using analytical
• Problem solving skills • Leadership skills • button •Use small paragraphs instead of one How to use audio in e-learning or statistical tools to discover useful
Interpersonal skills • Time management skills large paragraph • Keep your sentences short and • Audio text speech redundancies. • Use high information.
• Organizational skills • Stress management to the point. • Request the recipient, if you may, quality audio. • Choose audio with right tone and Phases of data analysis
skills • Team work • Work ethic • Flexibility for an acknowledgement mail.• Include the pace. • Enhance the experience with suitable 1. Data requirement specification 2. Data
Communication original message thread when replying to background music. • Creative fun and creativity collection 3. Data processing 4. Data cleaning 5.
Communication means exchanging of messages • Protect yourself from viruses, with customize songs. • Use voice over actors. Data analysis 6. Communication
information by speaking, writing or using some spams and e-mails frauds • Scan attachments Video in e-learning Business data analysis
other medium. for viruses before sending and/or opening E-learning videos help educators take their Business data analysis is the process by which
Professionalism in Communication • Include a suitable opening and closing. courses to the next level. businesses use statistical methods and
Professional communication means written, oral, The Don’ts Benefits of using videos in e-learning technologies for analysing historical data in
visual and digital communication within a • Do not copy a message. • Do not use email to • More engaging • Easy understanding • Easy order to gain new insight and improve strategic
workplace. discuss confidential information. • Never storage • Good rapport • Encourage discussions decision-making.
Verbal communication respond if you are upset. • Do not attach • Better learning experiences • Reinforcing the Data analyst
It is a type of oral communication wherein the unnecessary files. • Do not forgot to attach information Data analysts are professionals who translate
messages is transmitted through the spoken documents. • Do not use abbreviation • Do not Video formats in online instructions numbers, statistics,
words. write in capitals.• Do not send emotional emails. • Web conferencing • YouTube • Webcams and figures, into understandable values.
Non-verbal communication • Never use sarcasm or rude jocks. E-content Big data analysis
It is a type of communication through facial Attributes of good documentation E-content refers to the content or information Big data analysis is a process of examine large
expressions, gestures etc. 1. Content listing 2. Stated purpose delivered over network based electronic devices. amount of data to
Written communication 3. Navigation tools 4. Accuracy 5. Accessibility Features of E-Content uncover hidden patterns.
It is any written message that two or more 6. Consistent 7. Concise 8. Clarity 9. Coherence • E-content is technologically friendly. • E-content Data mining
people exchange. It is typically more formal but MODULE 2 is having learner friendly for easy navigation. It is a process used by companies to turn raw
less efficient than oral communication. E-Learning • is learner centric, it is useful in self-instructional data into useful information.
Forms of written communication E-learning is a type of learning through internet. It model. • E-content is also teachers friendly, it is Data Modelling
1. Letters 2. Memos 3. Notice circular means that learning that is enabledelectronicaly. used in various teaching learning methods such It is a process of analysing the data objects and
4. Report 5. Minutes Advantages of e-learning as classroom, lecturing to a group, lab session. their relationship to the other objects.
Advantages of written communication 1. Convenience 2. Enhanced learning 3. Cost Forms of e-content Structured Data
• Permeant record • Authoritative document • effective 4. Flexible 5. Interaction 6. Minimized 1. Text 2. Pictures 3. Videos 4. Sound 5. It means searchable type of data and it is
Accuracy • Legal document • Long distance physical resources 7. Easy access to resources Animation 6. Simulation 7. Presentations quantitative and it is stored in data warehouse.
communication • Easy understanding • Suitable 8. Multimedia based resources Advantages of e-content Unstructured Data
for long messages • Develops confidence • Disadvantages of e-learning • Hyper linking • Non linier • Use of multimedia It means unsearchable type of data. It is
Goodwill and image building • Less possibility of 1. Isolation 2. Less effective 3. Health related • Data density qualitative and it is stored in data lakes.
distortion • Delegation of authority concern 4. Greater chance of malpractices 5. Not Online libraries Difference between Structured data and
Limitations of written communication suitable for all disciplines 6. Negative effect on Online library simply refers to online data base of unstructured Data
• Time consuming • Expensive • No secrecy • No communication 7. Lack of interaction digital objects. It includes images, audio, video, Structured Data Unstructured Data
instant feedback • Less flexible • Less personal 8. Privacy and plagiarism documents etc. It is also known as digital library,
It is a searchable It is a native
touch • Unsuitable for illiterate people Principles of successful e-learning internet library, digital collection etc.
type of data. format.
Digital communication • Match to curriculum • Inclusions • Learner Advantages of Online Libraries
It is quantitative. It is qualitative.
It refers to use of digital devices to send engagement • Innovative approach 1. Wide variety of content. 2. Latest and update.
It is stored in data It is stored in data
information electronically. • Effective learning • Formative assessment 3. 24 hour services. 4. Multiple and simultaneous
warehouse. lakes.
Factors of effective verbal communication skills • Summative assessment • Coherence, access. 5. Library management automation. 6.
It is easy to search It requires more
1. Wide reading 2. Preparation consistency and transparency • Ease of use Real time interactions. 7. Save knowledge for
and analyse. work to process
3. Listen carefully 4. Body language 5. Think in •Cost effectiveness. future generations. 8. Allow readers to access
and understand.
terms of listeners perspective 6. Speak with Online education material on demand.
MOOC It is predefined It is in variety of
confidence 7. Develop skill Online education is a form of education which is
A massive open online course (MOOC) is an format. formats.
7Cs of communication delivered and administered using the internet.
online course with the option of free and open Data Quality
1. Clarity 2. Correctness 3. Conciseness 4. Features of online education
registration, a publicly-shared curriculum, and The term data quality refers to trustworthiness
Courtesy 5. Concreteness 6. Consideration 7. 1. Focus has shifted from teaching to learning.
open-ended outcomes. of data being used.
Completeness 2. It is student centred. 3. It is active. 4. It should
Features of MOOC Components of data quality
Objectives of making a professional be interactive. 5. It should be collaborative.
• Educator involvement • Engagement 1. Accuracy 2. Completeness 3. Consistency 4.
presentation 6. It is depend upon development of learning
• Re- watchable • Scale • Assessable Timeliness. 5. Validity 6. Uniqueness
• Conveying good news • Conveying bad news environment.
• Customized learning experience Artificial Intelligence
• Proposing • Persuading • Informing •Brand Advantages of online education
Categories of MOOC Artificial intelligence is the simulation of human
building •Updating • Introducing • Instructing • Greater flexibility • 24 hours access • Unlimited
• Technical showcase • Gateway skill intelligence process by machines, especially
• Motivating • Damage control virtual resources • Updated content • Reduction
• showcase • Research showcase computer systems.
Different Presentation Postures of cost • Adaption to learning pace
Types of MOOC Role of Artificial Intelligence in e-business
1. Facial expressions 2. Eye contact 3. Posture Disadvantages of online education
1. OBC- Open Boundary Course 2. SPOC- Small • To increase sales. • To detect fraud.
4. Gestures 5. Position and movement • Online student’s feedback is limited. •It causes
Private Online Course 3. MOC- Massive Online • To improve customer experience. • To
Email social isolation. •Lack of communication skills.
Course automate work processes. • To provide
Emails are a form of computer –mediated • It is limited to certain disciplines. • It lacks face
Limitations of MOOC predictive analysis. • Financial services can
Communication in the form of mails that are to face communication. • It require strong
• Forms of certification • Digital and critical benefit from AI-based process automation and
sent over internet, to one –or-many recipients. motivation and self-management skills. • Lack of
literacy • Connectivity Language • Digital and fraud detection. • Logistics companies can use
accreditation and quality assurance. • It is
critical literacy • Copyright AI for better inventory and delivery management.
inaccessible to illiterate people.

ʀᴀsʜɪᴅ_ᴠᴇɴɢᴀʀᴀ | ʀᴀsʜɪᴅ_ᴠᴇɴɢᴀʀᴀ | ʀᴀsʜɪᴅ_ᴠᴇɴɢᴀʀᴀ | ʀᴀsʜɪᴅ_ᴠᴇɴɢᴀʀᴀ | ʀᴀsʜɪᴅ_ᴠᴇɴɢᴀʀᴀ | ʀᴀsʜɪᴅ_ᴠᴇɴɢᴀʀᴀ | ʀᴀsʜɪᴅ_ᴠᴇɴɢᴀʀᴀ


Intelligent agent Cyber Ethics E-Governance Online Advertising
Intelligent agent is a software program that It is a philosophic study of ethics pertaining to E-Governance is defined as the usage of Online advertising simply refers to the
supports a user with the accomplishment of computers. information and communication technology by advertising through electronic devices or internet
some task or activity by collecting information Major issues that led to the concept of cyber the government to provide government services. Types of Online Advertising
automatically over the internet and ethics Stages of e-governance 1. Native Advertising: This term is associated
communicating data with other agents • Copyrighting or Downloading • Crime and 1. Computerisation 2. Networking with more unconventional online advertising. In
depending on the algorithm of the program. Punishment • Internet Hacking •Cyberbullying 3. Website 4. Online interactivity other words, it uses a strategy which shies away
Features of intelligent agent Cyber crime Types of Government Interaction in e- from banner formats or sponsored content in an
• Mobility • Goal oriented • Independent Cybercrime is criminal activity that either targets governance attempt to win a user’s trust by offering them
•Intelligent • Reduces net traffic • Multiple tasks or uses a computer, a computer network or a • G2G: Government to Government solutions to their problems.
Advantages of intelligent agent networked device. • G2B: Government to Business 2. SEM (Search Engine Marketing): With this type
1. Easy shopping 2. Identification of stores and Types of Cyber Crimes • G2C: Government to Citizen of campaign, the goal is to achieve increased
brands 3. Make comparisons 4. Reduce costs 5. • Email and internet fraud. • Identity fraud • Theft • G2E: Government to Employee. brand awareness in a very short amount
Act as representatives of sellers 6. Building of financial or card payment data. • Theft and Benefits of e-governance of time.
relationships sale of corporate data. • Cyber extortion 1. Time saving 2. Cost reduction 3. Transparency 3. Display Advertising: Among the more ‘visual
Limitations of intelligent agent (demanding money to prevent a threatened 4.Accountability 5. Improved efficiency 6. ‘online advertising formats are display ads. They
1. Stealing data and illegal access 2. Free use of attack). • Cyberespionage (where hackers Expanded reach of governance 7. Access to are called this because they, generally, contain
resources 3. Unauthorised program execution 4. access government or company data). information and quality services for citizens. images or videos and are published on places
Data alteration 5. Deceitful agent behaviour Examples of cybercrime Disadvantages of e-governance within any given website.
MODULE 4 1. Malware attacks 1. Lack of equality in access to the internet 4. Mobile Advertising: It means advertising
IT and society A malware attack is where a computer system or 2. Lack of trust and cybercrime 3. High through mobile platforms.
Information technology is the use of any network is infected with a computer virus or 4. False sense of transparency and 5. Social Ads: Social media is an incredibly
computers, storage, networking and other other type of malware. accountability 5. Costly infrastructure important part our everyday lives; it is made up
physical devices, infrastructure and processes 2. Phishing MODULE 5 of channels through when people connect
to create, process, store, secure and exchange It is a fraudulent practice of sending emails multiple times a day and where they frequently
all forms of electronic data. Typically, IT used in purporting to be from reputable companies. Digital marketing communicate, share and give opinions. Creating
the context of business operations as opposed 3. Distributed DoS attacks Digital marketing is the component of marketing ad campaigns on these platforms, therefore, is
to technology used for personal or entertainment Distributed DoS attacks (DDoS) are a type of that uses internet and online based digital necessary for generating brand awareness and
purpose. The commercial use of IT cybercrime attack that cybercriminals use to technologies for marketing. for acquiring potential new clients.
encompasses both computer technology and bring down a system or network. 4Ps of digital marketing 6. Retargeting and Remarketing: Reminding
telecommunication. Cyber Law 1. Product 2. Price 3. Place 4. Promotion repeat customers/users who have shown
Social and ethical issues of IT Cyber Law is any law that applies to the internet Features of digital marketing interest in your company is a solid strategy for
• Privacy and freedom. • Internet and privacy. and internet related technologies. Cyber law is • Branding • Completeness • Functionality making conversions. Remarketing works to
•Information system and intellectual property. • the one of the newest area of the legal system. • Interactivity •Virility • Relevant advertising make banner appear on whichever website those
Accountability, liability and control. • The quality Cyber law has also been referred to as the law of • Measuring output who have previously visited the website are
of time. • Health problems. • Computer crime. • internet. Advantages of digital marketing actively visiting.
Computer abuse. • Security of information. Objectives of Information Technology Act 1. Global reach 2. Lower cost 3. Track able, 7. E-mail marketing: This format of marketing
•System quality and related issues. • To provide legal recognition for all e- measurable results 4. Personalization 5. isn’t anything new but it has resurfaced with a
Digital Divide transactions • To give legal recognition to digital Openness 6. Social currency 7. Improved renewed potency.
The digital divide refers to the gap between signatures. • To give legal recognition to keeping conversion rates Advantages of online advertising
those who benefits from the digital age and accounting books in electronic form by bankers Disadvantage of digital Marketing • Global accessibility • Rich content
those who don’t. as well as other organizations • Protection of 1. Skills and training 2. Time consuming 3. High • Affordability • Speed •Quick updating •Provides
Factors that contribute to the digital divide online privacy and stopping cybercrimes. • To competition 4. Complaints and feedback 5. brand relevant information •Easy collection of
1. Gender 2. Age 3. Family structure 4. Physical give legal sanction for electronic transfer of fund Security and privacy issues data •Better customer relation • Greater flexibility
disability. 5. Physical access. 6. Lack of IT skill between banks.• Facilitate the electronic filing of Trends in digital marketing Disadvantages of online advertising
and support 7. Motivation. 8. Relevant content. documents •Facilitate electronic storage of data. • Video search • Smarter chat • Micro moments •Not suitable for traditional advertising
Effects of digital Divide Cyber Addiction • Augmented and virtual reality marketing •Unsolicited in nature • Less dependable
1. Economic inequality. 2. Effect on education. It is a growing problem. It means excessive • Content personalization • Browser push •Blocking of ads •Ad on traditional lines •Mistrust
3. Democracy. 4. Economic growth. 5. Social computer use. Its also known as internet notification • Rich lead profiling • Live videos • Misdirection • Not suitable for all products and
mobility. addiction. • Engagement based e-mail marketing services •Emergence of contextual mobile
Digital Native Health Issues of Cyber addiction Types of digital marketing advertisement
A person born or brought up in the age of digital • Physical Problems • Repetitive Strain Injury: 1. Content marketing 2. Search engine PPC (Pay per click) advertising
technology. • Computer Vision Syndrome: • Radiation optimization3. Social media marketing 4. Pay per PPC is an online advertising model in which
Cyber space • Sleeping Disorders and Decrease inProductivity click advertisement 5. E-mail marketing advertisers pay each time a user clicks on one of
It refers to a concept describing a widespread • Loss of Attention and Stress • Computers and 6. Instant messaging marketing 7. Affiliate their online ads.
interconnected digital technology. Printers Problems Due To Inactivity. marketing Types of social media
Opportunities and threats of IT and Industry • Psychological Problems • Fear of technology Business models in digital marketing • Social networking • Blogs and microblogging
• Infrastructure outsourcing •Hardware support • Computer anxiety 1. B2B •Visual media sharing • Professional networking
• IT consulting • Business process outsourcing Information overload 2. B2C • Reviews and ratings • Forums • Content •Social
•Infrastructure and network integration services It means excess of information available to a 3. C2C publishing • Social advertising
•Application case and offshore related services person aiming to complete a task or make a 4. B2E Need for social media ads
IT Industry – New Threats decision. 5. B2G • Customers are on social media • Consumer
1. Hardware and software failure 2. Malware 3. Causes of information overload 1) Business to Business (B2B) receptiveness • Increased brand recognition
Viruses 4. Spam, Scams and phishing 5. Human • People • Technology • Organisation Business-to-business – “B2B” – refers to •Increased inbound traffic • Cost effective •
error • Processes and tasks • Information and commerce between two businesses rather than Competition is on social media •Higher
Identity Theft attributes to commerce between a business and an conversion rate • Helps to reach specific
It refers to all types of crimes in which someone Solution to information overload individual consumer. audience • Helps to target ideal customers
wrongfully obtains and uses another person’s • Filtering • Multi-tasking • Escaping • Prioritising 2) Business to Customer (B2C) Types of social media ads
personal data in some way that involves fraud or • Delegating • Refusing • Altering • Shifting B2C is an acronym for "business-to-consumer." • Facebook ads •Twitter ads • Snapchat ads
deception. Green Computing B2C business is one that sells products or • YouTube ads • Pinterest ads • Linkiden ads
Spam It is the environmentally responsible and eco- services directly to the consumer.
Spam refers to irrelevant or unsolicited friendly use of computer and their resources. 3) Customer to Customer (C2C)
messages sent over internet. Components of green computing C2C, customer to customer, or consumer to
Methods to avoid spam • Green use • Green disposal • Green design consumer, is a business model that facilitates
1. Blacklist 2. Filtering system 3. Legal • Green manufacturing the transaction of products or services between
approaches 4. Separate email accounts 5. Install Benefits of green computing customers. Consumer to consumer, or C2C, is
a firewall 6. Caution when filling out online forms 1. Environmental sustainability 2. Better resource the business model that facilitates commerce
Cookies utilisation 3. Cost saving 4. Improve social and between private individuals.
It is a small piece of data that server send to the corporate image 4) Business to Employees (B2E)
users web browser E-Waste An approach in which the focus of business is
Adware It is the electronic product that are unwanted, not the employee, rather than the consumer or other
It is form of spyware that collects information working, and nearing or at the end of their useful businesses. The B2E approach grew out of the
about the user in order to display advertisement life. ongoing shortage of information technology (IT)
based on information collects from users Impact of e-waste workers.
browsing pattern. • Air pollution •Waste management problem 5) Business to Government (B2G)
Spyware • Toxicity and radio-active nature e-waste is A business model that refers to businesses
It is a type of malware that collect information harmful • public spending on healthcare • Ozone selling products, services or information to
from computing system without users consent. depletion • Opportunities for recycling industries governments or government agencies. B2G
Malware and employment loss networks or models provide a way for
It is a software designed to cause damage to a Management of e-waste businesses to bid on government projects or
single computer, server or computer network. • Inventory management • Production process products that governments might purchase or
Phishing modification • Recovery and reuse • Volume need for their organizations.
It is a fraudulent practice of sending emails reduction • Sustainable product design
purporting to be from reputable companies.
ʀᴀsʜɪᴅ_ᴠᴇɴɢᴀʀᴀ | ʀᴀsʜɪᴅ_ᴠᴇɴɢᴀʀᴀ | ʀᴀsʜɪᴅ_ᴠᴇɴɢᴀʀᴀ | ʀᴀsʜɪᴅ_ᴠᴇɴɢᴀʀᴀ | ʀᴀsʜɪᴅ_ᴠᴇɴɢᴀʀᴀ | ʀᴀsʜɪᴅ_ᴠᴇɴɢᴀʀᴀ | ʀᴀsʜɪᴅ_ᴠᴇɴɢᴀʀᴀ

You might also like