Showing posts with label bca. Show all posts
Showing posts with label bca. Show all posts

Monday 1 February 2016

Q.1 Explain any 10 online payment systems and services.

Ans. : 10 Online payment systems and services are given below :

1. Google Wallet
This is essentially Google’s version of PayPal, complete with money transfers and a Google
Wallet Card! Since we’re all addicted to the Big G, it shouldn’t be all that difficult to spend
and receive money. Google also announced last month that it will be releasing a physical
card connected to users’ accounts so they can utilize Google Wallet at retail businesses. For
convenience, and the number of users, Google Wallet tops our list of the top 10 online
payment solutions.

2. PayPal
Obviously PayPal would be included in this list – it’s only one of the world’s most widely
used payment acquirers processing some 8 million payments every day. As of this writing,
PayPal has over 137 million active accounts in 193 markets and 26 currencies around the
world, which makes it easy to transfer and request payments. Other PayPal perks include
accepting checks through a smartphone’s camera, a card swiper, and allowing customers to
make a purchase without leaving your site.

3. Dwolla
Dwolla is a more recent competitor to PayPal with some outstanding benefits. For example,
you can transfer funds through email, phone, Facebook, LinkedIn, or Twitter. But, what
makes Dwolla so appealing is the fact that there are no fees for transactions less than $10
and $0.25 per transaction for transactions over $10.

4. Amazon Payments
Amazon Payments is a safe, easy and convenient method for users to receive money by
using Amazon’s API. Users can also send money via ACH (Automated Clearing House). Since
almost everyone has an Amazon account, all your important information has already been
stored.

5. Authorize.Net
It’s been stated that Authorize.Net is the most widely used payment gateway on the
internet – probably because it’s been around since 1996. Currently, there are over 375,000
merchants handling more than $88 billion in annual transactions safely through credit cards
and e-checks. Something’s going right over there.

6. ACH Payments
ACH Payments has several key features that make it one of the top payment systems
around. Pros include: being able to make global payments, as well as serving as a payment
gateway, merchant account, credit card processor, and mobile payment processor. It can
also handle ACH payments and can be used as a payroll system.

7. WePay
What makes WePay standout isn’t the fact that it’s a payment processor allowing internet
merchants to accept credit cards and bank account payments online, it’s the fact it’s
incredibly simple. In fact, you can begin accepting payments in under a minute. The only
drawback is that it’s only available for U.S. citizens.

8. Stripe
If you’re a developer, you should already be using Stripe. Developers use Stripe to integrate
a payment system into their projects through Stripe’s robust API. This prevents the need for
a merchant account, and also allows you to build your own payment forms that can bypass
PCI requirements.

9. WooCommerce
WooCommerce allows WordPress users to create their very own e-commerce shop. There
are several neat features that make this payment processor worth your time. Besides being
vendor and customer friendly, you can run coupon campaigns, manage your store’s daily
activities, learn about shipping and tax rules, and view your store’s overall performance.

10. 2CheckOut
2CheckOut is a payment processor which is a combination of a merchant account and
payment gateway that doesn’t require PayPal or a Merchant account. Simply register and
verify your account and you can start accepting credit card payments, and even PayPal
payments. The company also offers international payments, shopping cart stores, and a
recurring billing feature.


Q.2. How can e-commerce portals make shopping secure.

Ans. : E-commerce portals make shopping secure many ways and some ways are given
below :
  • Choose a secure ecommerce platform. "Put your ecommerce site on a platform that uses a sophisticated object-orientated programming language," says Shawn Hess, software development manager, VoIP Supply.
  • "We've used plenty of different open source ecommerce platforms in the past and the one we're using now is by far the most secure," Hess says. "Our administration panel is inaccessible to attackers because it's only available on our internal network and completely removed from our public facing servers. Additionally, it has a secondary authentication that authenticates users with our internal Windows network."
  • Use a secure connection for online checkout--and make sure you are PCI compliant. "Use strong SSL [Secure Sockets Layer] authentication for Web and data protection," says Rick Andrews, technical director, Trust Services, Symantec.
  • "It can be a leap of faith for customers to trust that your ecommerce site is safe, particularly when Web-based attacks increased 30 percent last year. So it's important to use SSL certificates "to authenticate the identity of your business and encrypt the data in transit," Andrews says. "This protects your company and your customers from getting their financial or important information stolen." Even better: "Integrate the stronger EV SSL [Extended Validation Secure Sockets Layer], URL green bar and SSL security seal so customers know that your website is safe."
  • "SSL certificates are a must for transactions," Hess agrees. "To validate our credit cards we use a payment gateway that uses live address verification services right on our checkout," he says. "This prevents fraudulent purchases by comparing the address entered online to the address they have on file with their credit card company."
  • Don't store sensitive data. "There is no reason to store thousands of records on your customers, especially credit card numbers, expiration dates and CVV2 [card verification value] codes," says Chris Pogue, director of Digital Forensics and Incident Response at Trustwave.
  • "In fact, it is strictly forbidden by the PCI Standards," Pogue says. He recommends purging old records from your database and keeping a minimal amount of data, just enough for charge-backs and refunds. "The risk of a breach outweighs the convenience for your customers at checkout," he says. "If you have nothing to steal, you won't be robbed."
  • Employ an address and card verification system. "Enable an address verification system (AVS) and require the card verification value (CVV) for credit card transactions to reduce fraudulent charges," says Colin O'Dell, lead Magento developer for Unleashed Technologies.
  • Require strong passwords. "While it is the responsibility of the retailer to keep customer information safe on the back-end, you can help customers help themselves by requiring a minimum number of characters and the use of symbols or numbers," says Sarah Grayson, senior marketing manager for the Web Security Group at McAfee. "Longer, more complex logins will make it harder for criminals to breach your site from the front-end," she says.
  • Set up system alerts for suspicious activity. "Set an alert notice for multiple and suspicious transactions coming through from the same IP address," advises Deric Loh, managing director at digital agency Vault Labs. Similarly, set up system alerts for "multiple orders placed by the same person using different credit cards, phone numbers that are from markedly different areas than the billing address and orders where the recipient name is different than the card holder name."
  • Layer your security. "One of the best ways to keep your business safe from cybercriminals is layering your security," says Grayson. "Start with firewalls, an essential aspect in stopping attackers before they can breach your network and gain access to your critical information." Next, she says, "add extra layers of security to the website and applications such as contact forms, login boxes and search queries." These measures "will ensure that your ecommerce environment is protected from application-level attacks like SQL (Structured Query Language) injections and crosssite scripting (XSS)."
  • Provide security training to employees. Employees "need to know they should never email or text sensitive data or reveal private customer information in chat sessions as none of these communication methods is secure," says Jayne Friedland Holland, chief security officer and associate general counsel at technology firm NIC Inc..
  • "Employees also need to be educated on the laws and policies that affect customer data and be trained on the actions required to keep it safe," Holland says. Finally, "use strict written protocols and policies to reinforce and encourage employees to adhere to mandated security practices."
  • Use tracking numbers for all orders. "To combat chargeback fraud, have tracking numbers for every order you send out," advises Jon West, CEO, AddShoppers, a social commerce platform for retailers. "This is especially important for retailers who drop ship."
  • Monitor your site regularly--and make sure whoever is hosting it is, too. "Always have a real-time analytics tool," says Punit Shah, director of Marketing at online jeweler My Trio Rings. "It's the real-world equivalent of installing security cameras in your shop. Tools like Woopra or Clicky allow you to observe how visitors are navigating and interacting with your website in real time, allowing you to detect fraudulent or suspicious behavior," he says. "With tools like these we even receive alerts on our phones when there is suspicious activity, allowing us to act quickly and prevent suspicious behavior from causing harm." Also, make sure whoever is hosting your ecommerce site "regularly monitors their servers for malware, viruses and other harmful software," says Ian Rogers, SEO and Web developer, Mvestor Media, an SEO and website design company. "Ask your current or potential Web host if they have a plan that includes at least daily scanning, detection and removal of malware and viruses on the website.".
  • Perform regular PCI scans. "Perform regular quarterly PCI scans through services like Trustwave to lessen the risk that your ecommerce platform is vulnerable to hacking attempts," advises West. "If you're using third-party downloaded software like Magento or PrestaShop, stay on top of new versions with security enhancements," he says. "A few hours of development time today can potentially save your entire business in the future."
  • Patch your systems. "Patch everything immediately--literally the day they release a new version," says Kyle Adams, chief software architect for Junos WebApp Secure at Juniper Networks. "That includes the Web server itself, as well as other third-party code like Java, Python, Perl, WordPress and Joomla, which are favorite targets for attackers." "Breached sites are constantly found running a three-year-old version of PHP or ColdFusion from 2007," says Pogue. So it's critical you install patches on all software: "Your Web apps, Xcart, OSCommerce, ZenCart and any of the others all need to be patched regularly."
  • Make sure you have a DDoS protection and mitigation service. "With DDoS [Distributed Denial of Service] attacks increasing in frequency, sophistication and range of targets, ecommerce sites should turn to cloud-based DDoS protection and managed DNS services to provide transactional capacity to handle proactive mitigation and eliminate the need for significant investments in equipment, infrastructure and expertise," says Sean Leach, vice president of Technology, VeriSign. "The cloud approach will help [ecommerce businesses] trim operational costs while hardening their defenses to thwart even the largest and most complex attacks," he argues. "In addition, a managed, cloud-based DNS hosting service can help deliver 100 percent DNS resolution, improving the availability of Internet-based systems that support online transactions and communications."
  • Consider a fraud management service. "Fraud does happen. And for merchants, the best resolution is to make sure you are not holding the bag when it does," says Bob Egner, vice president of Product Management at EPiServer, a .NET content management and ecommerce product company. "Most credit card companies offer fraud management and chargeback management services. This is a practical approach to take because most security experts know there is no such thing as 100 percent safe."
  • Make sure you or whoever is hosting your site is backing it up--and has a disaster recovery plan. "Results from a recent study by Carbonite revealed businesses have big gaps in their data backup plans--putting them at risk for losing valuable information in the instance of power outage, hard drive failure or even a virus," says David Friend, CEO of Carbonite. So to make sure your site is properly protected, back it up regularly--or make sure your hosting service is doing so. 

Wednesday 30 September 2015

ANSWER-1:-

1(a)(i):
In computing, a fixed-point number representation is a real data type for a number that has a fixed number of digits after (and sometimes also before) the radix point (after the decimal point '.' in English decimal notation). Fixed-point number representation can be compared to the more complicated (and more computationally demanding) floating-point number representation.

Fixed-point numbers are useful for representing fractional values, usually in base 2 or base 10, when the executing processor has no floating point unit (FPU) or if fixed-point provides improved performance or accuracy for the application at hand. Most low-cost embedded microprocessors and microcontrollers do not have an FPU.

1(a)(ii):
Roundoff error occurs because of the computing device's inability to deal with certain numbers. Such numbers need to be rounded off to some near approximation which is dependent on the word size used to represent numbers of the device.

1(a)(iii):
Floating-point number representations allow for the existence of two zeros, often denoted by −0 (negative zero) and +0 (positive zero), regarded as equal by the numerical comparison operations but with possible different behaviors in particular operations.





1(c):
Appox true value is :

3.1415926535897932384626433832795

this is called the level of accuracy or to how many significant digits places

pi appox equal 22/7 or 355/113

Depending on the Level of Accuracy desired

here some other value appox value for it

31 ^ (1/3)

54648/17395 accurate to 7 decimal places

(2143/22)^.25 or (97 9/22)^ (1/4) accurate to 9 decimal places

833009/ 265155 = pi to 10 decimal places

52163/16604 pi is accurate to the true value to six or seven decimal places

144029661/45846065

69305155/22060516

5419351/1725033


52,163/16,604 = 3.1415923873765357745121657431944

312689/99532

312689/99532

3 + 4/28 - 1/(790 + 5/6) appox PI

























Saturday 5 September 2015

Some of the projects that the aspirants can do in their final year BCA course are discussed below.

  • Library Management System
  • Zigbee based home automation system
  • Human Resource Management System
  • Hospital Management System
  • Institute (educational) Management System
  • School Management System
  • Customer Relationship Management System
  • Financial Account Management System
  • Clinical Laboratory Management System
  • Ticket Reservation System
  • Online recruitment system
  • Import Export Schemes Management System
  • Purchase Management Inventory System
  • Interactive classroom
  • Automation of Marketing Operations
  • E-bazaar
  • Online Book Shop
  • Digital parking system
  • Online Trading of Wedding Decorative Items (Website)
  • Speed cash system
  • j-Mail++  Webmail Service
  • i-Button based Banking System
  • Online activity monitor
  • Distance learning system
  • Policy based management using asp.net
  • Computerization of crime records
  • Information management
  • Barcode label design software
  • Agent based testing for web applications
  • Pervasive Computing
  • Corporate banking
  • Matrimonial Website
  • Job Portal
  • Online Courier Management System’ using VB, ASP & ORACLE
  • Courier management service
  • Controlling a PC using a mobile phone
  • Retail Store Chain Management System
  • GCET - Online Searching System
  • Online Payroll and Attendance management System
  • Bug Tracking System
  • Mobile Billing & Customer Care System
  • Super Market Management System
  • Hotel Management System using VB6, ASP & ORACLE
  • Ticket Booking System’ for Multiplex
  • Multilevel Marketing using VB6, ASP, MS Sql Server 7.0, Crystal Report
  • Classified website
  • Content Management System
  • Fingerprint based attendance system
  • Software for designing of printed circuit boards for electronic devices
  • Interest calculation for a retail bank
  • OPEN SOURCE PROJECT MANAGEMENT TOOL
  • ONLINE POLLING SYSTEM
  • ONLINE NEWS SYSTEM
  • COLLEGE MANAGEMENT SYSTEM
  • OFFICE ADMINISTRATION SYSTEM
  • EMPLOYEE PAYROLL SYSTEM
  • ONLINE AIR TICKET RESERVATION SYSTEM
  • ONLINE SALES AND INVENTORY MANAGEMENT SYSTEM
  • HR MANAGEMENT WITH PAYROLL MANAGEMENT SYSTEM
  • ONLINE WEB BUILDER
  • SOCIAL NETWORKING SCRIPT
  • BOUTIQUE MANAGEMENT SYSTEM
  • E- SHOPPING
  • ONLINE SALES AND INVENTORY MANAGEMENT SYSTEM
  • TRANSPORT AUTOMATION SYSTEM
  • ONLINE VECHILE SHOWROOM
  • OFFICE MANAGEMENT SYSTEM
  • JEWELRY SHOP MANAGEMENT SYSTEM
  • MOBILE STORE MANAGEMENT SYSTEM
  • SHOE SHOP MANAGEMENT
  • ONLINE JOB SITE
  • ELECTRONIC SHOP
  • ONLINE BANKING
  • LIBRARY MANAGEMENT SYSTEM
  • VEHICLE BOOKING SYSTEM
  • MARUTHI VECHILE SHOWROOM MANAGEMENT SYSTEM
  • OFFICE AUTOMATION SYSTEM
  • EMPLOYEE SALARY MANAGEMENT SYSTEM
  • ONLINE COLLEGE MANAGEMENT SYSTEM
  • AIRLINE RESERVATION SOFTWARE
  • MOBILE STORE MANAGEMENT
  • Class Scheduling and Time Tabling System
  • Library management system project in JAVA
  • Inventory management System
  • Online Mobile Shopping
  • Employee Management System
  • ASP.NET Social Networking
  • Boutique Management System
  • Online Voting System
  • Video Streaming in PHP
  • Hospital Management System
  • ASP.NET Online Advertising
  • Point of Sales and Inventory System
  • Online Hotel reservation system
  • Best business opportunity for college students.
  • Study of Financial Performance Based On Ratios
  • Shopping Website with Payment Gateway
  • Human Resource Management System
  • JAVA based Hospital Management System
  • Matrimonial Website Script
  • College Management System
  • PHP Online Recruitment Site
  • Library management system project in JAVA
  • Social Networking project synopsis
  • Online Examination System Project
  • Online Job Site Report
  • Sales and Inventory management system
  • Classroom Management Software
  • PHP Shop-Script
  • Barcode Enabled Attendance Record System Project Report
  • Gas Agency Management System
  • Sugar CRM customer relationship management Script
  • Sales and Inventory Management System
  • Audio and video conferencing System
  • Online Courier Management System
  • Enquiry form script
  • Stores Management System
  • Hotel Reservation System
  • Jewellery management system
  • Hand Written Pattern Recognition System
  • Online Web File Management System

Thursday 3 September 2015

1. Write a TCP client and TCP server program in C language on UNIX operating system. The
client program begins by sending a request, after accepting the client request; server program
sends back a confirmation and its clock time to the client. Client program displays the server
clock time on its screen. The maximum concurrent clients this server can handle are four.
Display necessary messages, wherever necessary.
(20 marks)
Ans:
Header file Explanation 
#include <stdio.h> /* printf() and fprintf() */
#include <sys/types.h /* Socket data types */
#include <sys/socket.h> /* socket(), connect(), send(), recv() */
#include <netinet/in.h> /* IP Socket data types */
#include <arpa/inet.h> /* sockaddr_in, inet_addr() */
#include <stdlib.h> /* atoi() */
#include <string.h> /* memset() */

#include <unistd.h> /* close() */

TCP Client Program 
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif

#include <stdio.h>
#include <stdlib.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>

#include <unistd.h>
int main(int argc, char *argv[])
{
 printf("This is the client program\n");

 int sockfd;
 int len, rc ;
 struct sockaddr_in address;
 int result;
 char ch = 'A';

 //Create socket for client.
 sockfd = socket(PF_INET, SOCK_STREAM, 0);
 if (sockfd == -1) {
 perror("Socket create failed.\n") ;
 return -1 ;
 }

 //Name the socket as agreed with server.
 address.sin_family = AF_INET;
 address.sin_addr.s_addr = inet_addr("127.0.0.1");
 address.sin_port = htons(7734);
 len = sizeof(address);

 result = connect(sockfd, (struct sockaddr *)&address, len);
 if(result == -1)
 {
 perror("Error has occurred");
 exit(-1);
 }

 while ( ch < 'Y') {

 //Read and write via sockfd
 rc = write(sockfd, &ch, 1);
 printf("write rc = &#37;d\n", rc ) ;
if (rc == -1) break ;

 read(sockfd, &ch, 1);
 printf("Char from server = %c\n", ch);
 //if (ch == 'A') sleep(5) ; // pause 5 seconds
 }
 close(sockfd);

 exit(0);
}

TCP Server Program
#include <config.h>
 #include <stdio.h>
#include <stdlib.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <unistd.h>

/// SERVER

int main(int argc, char *argv[])
{ //Declaring process variables.
 int server_sockfd, client_sockfd;
 int server_len ;
 int rc ;
 unsigned client_len;
 struct sockaddr_in server_address;
 struct sockaddr_in client_address;

 //Remove any old socket and create an unnamed socket for the server.
 server_sockfd = socket(AF_INET, SOCK_STREAM, 0);
 server_address.sin_family = AF_INET;
 server_address.sin_addr.s_addr = htons(INADDR_ANY);
 server_address.sin_port = htons(7734) ;
 server_len = sizeof(server_address);

 rc = bind(server_sockfd, (struct sockaddr *) &server_address, server_len);
 printf("RC from bind = %d\n", rc ) ;

 //Create a connection queue and wait for clients
 rc = listen(server_sockfd, 5);
 printf("RC from listen = %d\n", rc ) ;

 client_len = sizeof(client_address);
 client_sockfd = accept(server_sockfd, (struct sockaddr *) &client_address, &client_len);
 printf("after accept()... client_sockfd = %d\n", client_sockfd) ;

 while(1)
 {
 char ch;
 printf("server waiting\n");

 //Accept a connection
 //client_len = sizeof(client_address);
 //client_sockfd = accept(server_sockfd, (struct sockaddr *) &client_address, &client_len);
 //printf("after accept()... client_sockfd = %d\n", client_sockfd) ;
 //Read write to client on client_sockfd

 rc = read(client_sockfd, &ch, 1);
 printf("RC from read = %d\n", rc ) ;
 if (ch=='X') break ;
 ch++;
 write(client_sockfd, &ch, 1);
 }

 printf("server exiting\n");

 //close(client_sockfd);
 close(client_sockfd);
 return 0;



2.
(a) Write the step by step procedure to configure a remote server and transfer a Directory to
Remote Server in Linux.
(10 marks)
Ans: 
A remote server is a server on another computer (remote host).
To configure access to the server in this set-up, you need to specify the following:
  • Connection settings: server host, port, and user credentials.
  • The server configuration root folder and the URL address to access it.
  • Correspondence between the project root folder, the folder on the server to copy the data from the project root folder to, and the URL address to access the copied data on the server. This correspondence is called mapping. 
Creating a Server Configuration: Specifying Its Name and Type
A. Open the Deployment dialog box. Do one of the following:
  • Open the Settings dialog box by choosing File | Settings or pressing Ctrl+Alt+S and click Deployment under Build, Execution, Deployment.
  • Choose Tools | Deployment | Configuration on the main menu.
B. In the left-hand pane, that shows a list of all the existing server configurations, click the Add
toolbar button . The Add Server dialog box opens.

C. Specify the server configuration name in the Name text box. From the Type drop-down list,
choose the server configuration type depending on the protocol you are going to use to
exchange the data with the server.
  • FTP: choose this option to have PhpStorm access the server via the FTP file transfer protocol.
  • SFTP: choose this option to have PhpStorm access the server via the SFTP file transfer protocol.
  • FTPS: choose this option to have PhpStorm access the server via the FTP file transfer protocol over SSL (the FTPS extension).
  • When editing the server configuration name in the Name text box, use the Up and Down keys on your keyboard to change the preselected server access to type in the Protocol drop-down list.
D. Click OK. The Add Server dialog box closes and you return to the Connection tab of the
Deployment dialog box.
  • Click the Use as Default toolbar button. 
Ftp server is used to transfer files between server and clients. All major operating system supports
ftp. ftp is the most used protocol over internet to transfer files. Like most Internet operations, FTP
works on a client/ server model. FTP client programs can enable users to transfer files to and from a
remote system running an FTP server program.
Configuring the ftp Server
The vsftpd RPM package is required to configure a Red Hat Enterprise Linux system as an ftp server.
If it is not already installed, install it with rpm commands as described in our pervious article. After it
is installed, start the service as root with the command service vsftpd start . The system is now an ftp
server and can accept connections. To configure the server to automatically start the service at boot
time, execute the command chkconfig vsftpd on as root. To stop the server, execute the command
service vsftpd stop. To verify that the server is running, use the command service vsftpd status. 



(b) Write a step by step procedure to create and configure samba Server in Linux. Also,
transfer files from client side.
Ans:
Installing Samba 
1. Use yum to install the Samba package:
  • yum -y install samba
Creating Samba Test Directory and Files
For this part of the procedure, you'll use the su - (switch user) command to work as root. Although it’s
not best practice to do this regularly, there are times where it's much more practical to work directly as
root instead of trying to use sudo to do everything. This is one of those times.
You're going to create a new directory containing three empty files which you'll share using Samba.

2. While logged on as root, create the new directory /smbdemo with the following command:
 mkdir /smbdemo

3. Change the permissions on the new directory to 770 with the following command: 
chmod 770 /smbdemo

4. Navigate to the new directory with the following command:
 cd /smbdemo

5. Add three empty files to the directory with the following command:
 touch file1 file2 file3

Adding the Samba User
You must add users to the Samba database in order for them to have access to their home directory
and other Samba shares.

6. Use the following command to add a new Samba user (the new Samba user must be an existing
Linux user or the command will fail):
 smbpasswd -a <username>
 For example, to add the user don, use the command smbpasswd -a don.

Creating the Samba Group

7. Perform the following steps to create a smbusers group, change ownership of the /smbdemo
directory, and add a user to the smbusers group:
 groupadd smbusers
 chown :smbusers /smbdemo
 usermod -G smbusers don

Configuring Samba
Samba configuration is done in the file /etc/samba/smb.conf. There are two parts to
/etc/samba/smb.conf: 
  • Global Settings: This is where you configure the server. You’ll find things like authentication method, listening ports, interfaces, workgroup names, server names, log file settings, and similar parameters.
  • Share Definitions: This is where you configure each of the shares for the users. By default, there’s a printer share already configured.
Configuring smb.conf

8. In the Global Settings section, at line 74, change the workgroup name to your workgroup name.