|
||||||||
Frequently Asked Questions(FAQ) | ||||||||
What is Computer virus? | ||||||||
A computer virus is a computer program that can copy itself and infect a
computer without permission or knowledge of the user. The original may
modify the copies or the copies may modify themselves, as occurs in a
metamorphic virus. A virus can only spread from one computer to another
when its host is taken to the uninfected computer, for instance by a user
sending it over a network or carrying it on a removable medium such as a
floppy disk, CD, or USB drive. Additionally, viruses can spread to other
computers by infecting files on a network file system or a file system
that is accessed by another computer. Viruses are sometimes confused with
computer worms and Trojan horses. A worm, however, can spread itself to
other computers without needing to be transferred as part of a host. A
Trojan horse is a file that appears harmless until executed. In contrast
to viruses, Trojan horses do not insert their code into other computer
files. Many personal computers are now connected to the Internet and to
local-area networks, facilitating their spread. Today's viruses may also
take advantage of network services such as the World Wide Web, e-mail, and
file sharing systems to spread, blurring the line between viruses and
worms. Furthermore, some sources use an alternative terminology in which a
virus is any form of self-replicating malware. |
||||||||
What is Global Positioning System? | ||||||||
The Global Positioning System (GPS), is currently the only fully
functional Global Navigation Satellite System (GNSS). More than two dozen
GPS satellites are in medium Earth orbit, transmitting signals allowing
GPS receivers to determine the receiver's location, speed and direction. Since the first experimental satellite was launched in 1978, GPS has become an indispensable aid to navigation around the world, and an important tool for map-making and land surveying. GPS also provides a precise time reference used in many applications including scientific study of earthquakes, and synchronization of telecommunications networks. Developed by the United States Department of Defense, it is officially named NAVSTAR GPS (NAVigation Satellite Timing And Ranging Global Positioning System). The satellite constellation is managed by the United States Air Force 50th Space Wing. The cost of maintaining the system is approximately US$750 million per year,[1] including the replacement of aging satellites, and research and development. Despite this fact, GPS is free for civilian use as a public good. |
||||||||
Online shopping is the process consumers go through to
purchase products or services over the Internet. An online shop, e-shop,
internet shop, webshop or online store evokes the physical analogy of
buying products or services at a bricks-and-mortar retailer or in a
shopping mall. It is an electronic commerce application used for
business-to-business electronic commerce (B2B) or business-to-consumer
electronic commerce (B2C). Online shopping is popular mainly because of
its speed and ease of use. Some issues of concern can include fluctuating
exchange rates for foreign currencies, local and international laws and
delivery methods. An advantage of shopping online is being able to use the power of the internet to seek out the lowest prices or the best deals available for items or services. For example if one is buying a digital camera he/she should enter "digital camera" into a search engine or a price search engine. Most price comparison services have the advantage of store ratings and reviews. Getting the lowest price is important but it is more important to make sure the merchant or store the customer is purchasing from is reputable. There are some online stores that display ridiculously low prices, but when you call them you may find out that the item you're seeking is out of stock. This is called the "bait and switch" technique. The best way to avoid backorder disappointment is to contact the online store by phone and verify that the product you're seeking is in stock. If you're told that there's only one left, then place your order by phone. The differences between the online prices and local store prices also rely on the shipping cost and tax. A wise customer would consider the final prices instead of just product prices. |
||||||||
What is Online Shopping? | ||||||||
Online shopping is the process consumers go through to
purchase products or services over the Internet. An online shop, e-shop,
internet shop, webshop or online store evokes the physical analogy of
buying products or services at a bricks-and-mortar retailer or in a
shopping mall. It is an electronic commerce application used for
business-to-business electronic commerce (B2B) or business-to-consumer
electronic commerce (B2C). Online shopping is popular mainly because of
its speed and ease of use. Some issues of concern can include fluctuating
exchange rates for foreign currencies, local and international laws and
delivery methods. An advantage of shopping online is being able to use the power of the internet to seek out the lowest prices or the best deals available for items or services. For example if one is buying a digital camera he/she should enter "digital camera" into a search engine or a price search engine. Most price comparison services have the advantage of store ratings and reviews. Getting the lowest price is important but it is more important to make sure the merchant or store the customer is purchasing from is reputable. There are some online stores that display ridiculously low prices, but when you call them you may find out that the item you're seeking is out of stock. This is called the "bait and switch" technique. The best way to avoid backorder disappointment is to contact the online store by phone and verify that the product you're seeking is in stock. If you're told that there's only one left, then place your order by phone. The differences between the online prices and local store prices also rely on the shipping cost and tax. A wise customer would consider the final prices instead of just product prices. |
||||||||
What is computer hacking? | ||||||||
A hacker is often someone who likes to create and modify
computer software or computer hardware, including computer programming,
administration, and security-related items. A hacker is also someone who
modifies electronics, for example, ham radio transceivers, printers or
even home sprinkler systems to get extra functionality or performance. The
term usually bears strong connotations, but may be either favorable or
denigrating depending on cultural context (see the hacker definition
controversy). In computer programming, a hacker is a software designer and programmer who builds elegant, beautiful programs and systems. A hacker can also be a programmer who hacks or reaches a goal by employing a series of modifications to exploit or extend existing code or resources. For some, "hacker" has a negative connotation and refers to a person who "hacks" or uses kludges to accomplish programming tasks that are ugly, inelegant, and inefficient. This pejorative form of the noun "hack" is even used among users of the positive sense of "hacker" (some argue that it should not be due to this pejorative meaning, but others argue that some kludges can, for all their ugliness and imperfection, still have "hack value"). In computer security, a hacker is a person who specializes in work with the security mechanisms for computer and network systems. While including those who endeavor to strengthen such mechanisms, it is more often used by the mass media and popular culture to refer to those who seek access despite them. In other technical fields, hacker is extended to mean a person who makes things work beyond perceived limits through their own technical skill, such as a hardware hacker, or reality hacker. Hackers are often seen as harmful people when in fact they can and do help solve technical problems. In hacker culture, a hacker is a person who has attained a certain social status and is recognized among members of the culture for commitment to the culture's values and a certain amount of technical knowledge. |
||||||||
What is email? | ||||||||
Electronic mail (abbreviated "e-mail" or, often, "email")
is a store and forward method of composing, sending, storing, and
receiving messages over electronic communication systems. The term
"e-mail" (as a noun or verb) applies both to the Internet e-mail system
based on the Simple Mail Transfer Protocol (SMTP) and to intranet systems
allowing users within one organization to e-mail each other. Often these
workgroup collaboration organizations may use the Internet protocols for
internal e-mail service.
The message header consists of fields, usually including
at least the following: Each header field has a name and a value. RFC 2822 specifies the precise syntax. Informally, the field name starts in the first character of a line, followed by a ":", followed by the value which is continued on non-null subsequent lines that have a space or tab as their first character. Field names and values are restricted to 7-bit ASCII characters. Non-ASCII values may be represented using MIME encoded words. Note that the "To" field in the header is not
necessarily related to the addresses to which the message is delivered.
The actual delivery list is supplied in the SMTP protocol, not extracted
from the header content. The "To" field is similar to the greeting at the
top of a conventional letter which is delivered according to the address
on the outer envelope. Also note that the "From" field does not have to be
the real sender of the e-mail message. It is very easy to fake the "From"
field and let a message seem to be from any mail address. It is possible
to digitally sign e-mail, which is much harder to fake. Some Internet
service providers do not relay e-mail claiming to come from a domain not
hosted by them, but very few (if any) check to make sure that the person
or even e-mail address named in the "From" field is the one associated
with the connection. Some internet service providers apply e-mail
authentication systems to e-mail being sent through their MTA to allow
other MTAs to detect forged spam that might apparently appear to be from
them. Cc: carbon copy Many e-mail clients present "Bcc" (Blind carbon copy, recipients not visible in the "To" field) as a header field. Different protocols are used to deal with the "Bcc" field; at time the entire field is removed, and at times the field remains but the addresses therein are removed. Addresses added as "Bcc" are only added to the SMTP delivery list, and do not get included in the message data. There are differing impressions on the RFC 2822 Protocol pertaining to this subject. |
||||||||
What is e-commerce? | ||||||||
Electronic Commerce is exactly analogous to a marketplace
on the Internet. Electronic Commerce (also referred to as EC, e-commerce
eCommerce or ecommerce) consists primarily of the distributing, buying,
selling, marketing and servicing of products or services over electronic
systems such as the Internet and other computer networks. The information
technology industry might see it as an electronic business application
aimed at commercial transactions; in this context, it can involve
electronic funds transfer, supply chain management, e-marketing, online
marketing, online transaction processing, electronic data interchange
(EDI), automated inventory management systems, and automated data
collection systems. Electronic commerce typically uses electronic
communications technology of the World Wide Web, at some point in the
transaction's lifecycle, although of course electronic commerce frequently
depends on computer technologies other than the World Wide Web, such as
databases, and e-mail, and on other non-computer technologies, such as
transportation for physical goods sold via e-commerce.
E-Commerce according to Person Halls book E-Commerce started in 1994 with the first banner ad being placed on a website. According to the October 2006 Forrester Research report entitled, "US eCommerce: Five-Year Forecast And Data Overview, "Nontravel online retail revenues will top the quarter-trillion-dollar mark by 2011. The diver of this growth? A segment of the most active Web shopping households that is roughly 8 million strong. This group of consumers is extremely comfortable with technology and values convenience above all else in the online retail experience. As retailers begin to wade through their copious data warehouses and understand the who, what, when, where, why, and how of this segment, they will benefit from targeting these customers." |
||||||||
|
||||||||