Topic 3: The Online Environment 3.1 The Internet and The World Wide Web
Topic 3: The Online Environment 3.1 The Internet and The World Wide Web
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 1 of 42
Root name server - The root server is the first step in translating (resolving) human readable
host names into IP addresses. It can be thought of like an index in a library that points to
different racks of books - typically it serves as a reference to other more specific locations.
TLD name server - The top level domain server (TLD) can be thought of as a specific rack of
books in a library. This name server is the next step in the search for a specific IP address, and
it hosts the last portion of a hostname (In example.com, the TLD server is “com”).
Authoritative name server - This final name server can be thought of as a dictionary on a rack
of books, in which a specific name can be translated into its definition. The authoritative name
server is the last stop in the name server query. If the authoritative name server has access to
the requested record, it will return the IP address for the requested hostname back to the DNS
Recursor (the librarian) that made the initial request.
What's the difference between an authoritative DNS server and a recursive DNS resolver?
Both concepts refer to servers (groups of servers) that are integral to the DNS infrastructure,
but each performs a different role and lives in different locations inside the pipeline of a DNS
query. One way to think about the difference is the recursive resolver is at the beginning of the
DNS query and the authoritative nameserver is at the end.
Recursive DNS resolver
The recursive resolver is the computer that responds to a recursive request from a client and
takes the time to track down the DNS record. It does this by making a series of requests until
it reaches the authoritative DNS nameserver for the requested record (or times out or returns
an error if no record is found). Luckily, recursive DNS resolvers do not always need to make
multiple requests in order to track down the records needed to respond to a client; caching is a
data persistence process that helps short-circuit the necessary requests by serving the requested
resource record earlier in the DNS lookup.
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 2 of 42
Authoritative DNS server
Put simply, an authoritative DNS server is a server that actually holds, and is responsible for,
DNS resource records. This is the server at the bottom of the DNS lookup chain that will
respond with the queried resource record, ultimately allowing the web browser making the
request to reach the IP address needed to access a website or other web resources. An
authoritative nameserver can satisfy queries from its own data without needing to query another
source, as it is the final source of truth for certain DNS records.
It’s worth mentioning that in instances where the query is for a subdomain such as
foo.example.com or blog.cloudflare.com, an additional nameserver will be added to the
sequence after the authoritative nameserver, which is responsible for storing the
subdomain’s CNAME record.
There is a key difference between many DNS services and the one that Cloudflare provides.
Different DNS recursive resolvers such as Google DNS, OpenDNS, and providers like
Comcast all maintain data center installations of DNS recursive resolvers. These resolvers
allow for quick and easy queries through optimized clusters of DNS-optimized computer
systems, but they are fundamentally different than the nameservers hosted by Cloudflare.
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 3 of 42
Cloudflare maintains infrastructure-level nameservers that are integral to the functioning of the
Internet. One key example is the f-root server network which Cloudflare is partially responsible
for hosting. The F-root is one of the root level DNS nameserver infrastructure components
responsible for the billions of Internet requests per day. Our Anycast network puts us in a
unique position to handle large volumes of DNS traffic without service interruption.
What are the steps in a DNS lookup?
For most situations, DNS is concerned with a domain name being translated into the
appropriate IP address. To learn how this process works, it helps to follow the path of a DNS
lookup as it travels from a web browser, through the DNS lookup process, and back again.
Let's take a look at the steps.
Note: Often DNS lookup information will be cached either locally inside the querying
computer or remotely in the DNS infrastructure. There are typically 8 steps in a DNS lookup.
When DNS information is cached, steps are skipped from the DNS lookup process which
makes it quicker. The example below outlines all 8 steps when nothing is cached.
The 8 steps in a DNS lookup:
1. A user types ‘example.com’ into a web browser and the query travels into the Internet and is
received by a DNS recursive resolver.
2. The resolver then queries a DNS root nameserver (.).
3. The root server then responds to the resolver with the address of a Top Level Domain (TLD)
DNS server (such as .com or .net), which stores the information for its domains. When
searching for example.com, our request is pointed toward the .com TLD.
4. The resolver then makes a request to the .com TLD.
5. The TLD server then responds with the IP address of the domain’s nameserver, example.com.
6. Lastly, the recursive resolver sends a query to the domain’s nameserver.
7. The IP address for example.com is then returned to the resolver from the nameserver.
8. The DNS resolver then responds to the web browser with the IP address of the domain
requested initially.
Once the 8 steps of the DNS lookup have returned the IP address for example.com, the browser
is able to make the request for the web page:
9. The browser makes a HTTP request to the IP address.
10. The server at that IP returns the webpage to be rendered in the browser (step 10).
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 4 of 42
What is a DNS resolver?
The DNS resolver is the first stop in the DNS lookup, and it is responsible for dealing with the
client that made the initial request. The resolver starts the sequence of queries that ultimately
leads to a URL being translated into the necessary IP address.
Note: A typical uncached DNS lookup will involve both recursive and iterative queries.
It's important to differentiate between a recursive DNS query and a recursive DNS resolver.
The query refers to the request made to a DNS resolver requiring the resolution of the query.
A DNS recursive resolver is the computer that accepts a recursive query and processes the
response by making the necessary requests.
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 5 of 42
3 types of DNS queries:
1. Recursive query - In a recursive query, a DNS client requires that a DNS server (typically a
DNS recursive resolver) will respond to the client with either the requested resource record or
an error message if the resolver can't find the record.
2. Iterative query - in this situation the DNS client will allow a DNS server to return the best
answer it can. If the queried DNS server does not have a match for the query name, it will
return a referral to a DNS server authoritative for a lower level of the domain namespace. The
DNS client will then make a query to the referral address. This process continues with
additional DNS servers down the query chain until either an error or timeout occurs.
3. Non-recursive query - typically this will occur when a DNS resolver client queries a DNS
server for a record that it has access to either because it's authoritative for the record or the
record exists inside of its cache. Typically, a DNS server will cache DNS records to prevent
additional bandwidth consumption and load on upstream servers.
3.1.2 Understand the features, functions, impact, and potential of the world wide web.
The World Wide Web is a huge collection of hypertext documents and hypermedia. It has
facilitated easy access to information over the Internet. It was created by Tim Berners-Lee and
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 6 of 42
introduced to the world in 1991. It is a collection of interconnected documents and other
resources, linked by hyperlinks and URLs.
The network of web servers serves as the backbone of the World Wide Web. The Hypertext
Transfer Protocol (HTTP) is used to gain access to the web. A web browser makes a request
for a particular web page to the web server, which in turn responds with the requested web
page and its contents. It then displays the web page as rendered by HTML or other web
languages used by the page. Each resource on the web is identified by a globally unique
identifier (URI). Each web page has a unique address, with the help of which a browser
accesses it.
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 7 of 42
messages. In other words, it refers to a situation whereby communicators no longer have to
wait for a long period of time in order for their message to be replied to by the receiver of the
message. This therefore means that a person in one continent can easily communicate with
another in a totally different continent as though they were communicating face to face. This
has been made possible by services like chat, face book and emailing. Such connections make
it possible for people the world over to relate and form forums in which they can even hold
discussions on diversified issues which are happening way far away from where they are
located. With use of facilities like the web camera, it is even possible to see someone with
whom you are communicating on your computer while they are on the other side of the world.
This kind of communication is what has rapidly converted the world into a small village
whereas in years gone such was just a dream for many innovators. There is now improved rapid
communication in various sectors and this is supported by an old theory proposed by one
Marshall McLuhan. His theory, titled Technological determinism, put forth that the changes
that occur in the ways in which human beings communicate go a long way in determining the
course our existence takes. The proponent of the theory feels that culture is highly dependent
on the way in which we are able to communicate as human beings. This in other words is to
say that innovations in communication cause a cultural drift. Secondly, changes in
communication methods and modes shape human life. Media, as the greatest channel of
communication, is considered as anything that affects human ability to communicate.
Consequently, it goes without saying that innovations that affect media as a channel of
communication also affect human culture and communication. He looks at the transformation
of communication from mere word of mouth, to literate age that could read and write to print
media and eventually to the electronic age where society is at now.
Today, people tend to believe printed information or that which they can collect from the web
pages, more than they believe in information passed through the word of mouth. The theory
also proposes that for any information to be accepted or rejected, it must undergo a series of
stages which are awareness creation, persuasion or evaluation, decision making on whether to
accept the information and lastly confirmation. These processes take a shorter time depending
on the means of communication that are being used, meaning that word of mouth
communication would take a relatively longer period to pass through all these stages than
information posted through the web pages. This goes on to explain what happens to ideas
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 8 of 42
suggested to one community from another, and how their evaluation and final acceptance or
rejection ends up shaping the culture, values and beliefs of the recipient community. According
to McLuhan, individuality has been removed from culture and instead, what matters today to
society is the method of communication that is deemed important for communication as that
will be what society will flow with.
Impact of World Wide Web on Businesses
As explained above, the greatest impact of WWW is the speeding up of communication. How
then does this form of communication impart of businesses? The most important thing about
WWW is that it has enabled businesses and organizations to establish a presence. Businesses
that want to explore great heights and to establish themselves the world over can only ignore
the importance of the World Wide Web at their own peril. Creation of websites in which firms
can market themselves is dependent on the WWW linkage. With the creation of a website, a
company can rest assured that its services and functions can easily be read about any time of
day seven days a week. Another impact is that the World Wide Web has made it possible for
organizations working in the same line of industry to network, form partnerships and learn
from each other all through the web.
This is also true for netting of potential clients, suppliers, donors and other stakeholders. Use
of the World Wide Web has become a very easy way of passing business cards and maintaining
contacts with clients. Needless to say, a website can be used as an additional source of income.
This is possible by making your website an online sales point in the sense that visitors to the
website can order and purchase your services online and pay through their credit cards without
necessarily visiting your stores physically.
One more result that can be associated with instant communication as a result of the World
Wide Web is the fact that it I now possible to have employees placed outside the office area
and still have business going on as usual. This is because through the firma website,
information can be passed to and from the employees consistently and from anywhere.
Impact of World Wide Web on Social Networking
It is not a new thing for many people that with social networking websites and electronic mail
communication websites like twitter and yahoo mail respectively have played a great role in
bring people together in terms of spontaneous and rapid communication. It is possible to chat
with friends online and even date with the intentions of getting married, all by logging into
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 9 of 42
some special websites that offer such services. On this social networking websites not only
about making friends but also about keeping in touch with various other happenings around the
world. One can get the latest news, download the latest music and movies and younger people
and children can play online games or download them. In addition to socializing, it has now
become very possible to get political views and stay informed on the most current news around
the world, all by staying connected to the relevant websites. For example, a person in America
is now very able to track say for example the election results of a country in Asia as it happens,
all of which has been made possible by the World Wide Web.
Today, people cannot imagine themselves without logging into websites to check the latest
mails, breaking news, weather reports and even to shop for holidays online, all because of the
WWW technology. The Web cannot be traced, it cannot be pinpointed, all because it is growing
by the day. Its growth and expansion is a gradual process that is ongoing, and which is not
likely to stop any time soon.
Negative impacts of World Wide Web
There is much that can be said about the impacts of World Wide Web, and especially about the
positive impacts, but we cannot just afford to overlook the negative impacts associated with
the same. One of the major negative impacts associated with World Wide Web is that some
people are now creating websites that contain misleading, addictive and false information,
which when it falls in the hands of unsuspecting information users, may end up damaging their
outlook in life .
Just to give an example, an article published online and written by one Allen Alberson says
that there are a number of websites that have been created with the intention of providing
suicidal persons with information on how to go about killing themselves. This website as
actually helped take away the lives of quite a number of youngsters who were feeling suicidal
at the time they took away their lives after reading trough these websites. More information
can be found here; http://www.helium.com/items/1223307-suicide-chat-rooms .
Much more can be said about the negative impacts of WWW but just to mention a few is that
the World Wide Web is addictive and many people find themselves spending much of their
time on social websites instead of doing other more constructive things. One more thing that is
happening is that more and more people now tend to make decisions based on technological
advance. In other words, decisions are based on the outcome of a result given by a computer,
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 10 of 42
more than common knowledge. For example, it is not uncommon to hear that an organization
is not giving a certain service to clients at a given time, simply because the systems are down.
One is left to wonder how clients used to be served before the innovation of websites and online
services.
Conclusion
From the findings above, it is evident that the World Wide Web has played a great role in
changing communication from analogue to digital and this has revolutionalized the world in so
may aspects. The network society, as it has popularly come to be known as, now need to take
control of the advancing technology so that it can be able to organize itself on the basis of what
people of various diversities share in common in a non-hierarchal manner. The World Wide
Web is an avenue through which the public and the private can be merged together for better
cohesion. Just to site an example, the revelation of the affair between the former US President
Bill Clinton with Monica Lewinsky came out in a big way to influence how he would perform
in politics after that. Since technology has no ethical or moral restraints, it has in itself become
all important for such happenings that would otherwise have remained unknown. It can thus be
said with such finality that such new communication technologies like the World Wide Web
will continue to make people feel more connected and to help them mainstream aspects of life
such as politics, socializing, commerce and well as entertainment.
3.1.3 Understand the difference between static and dynamic web page content and the
need to use the different types.
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 11 of 42
Dynamic Web Pages:
Dynamic Web Pages are written in languages such as CGI, AJAX, ASP, ASP.NET, etc. In
dynamic web pages, the Content of pages is different for different visitors. It takes more time
to load than the static web page. Dynamic web pages are used where the information is
changed frequently, for example, stock prices, weather information, etc.
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 12 of 42
Difference between Static and Dynamic Web Pages:
SL.NO Static Web Page Dynamic Web Page
In static web pages, Pages will remain In dynamic web pages, Content of pages are
1. same until someone changes it manually. different for different visitors.
In static web pages, Information are In dynamic web page, Information are change
3. change rarely. frequently.
Static Web Page takes less time for Dynamic web page takes more time for
4. loading than dynamic web page. loading.
Static web pages are written in languages Dynamic web pages are written in languages
6. such as: HTML, JavaScript, CSS, etc. such as: CGI, AJAX, ASP, ASP.NET, etc.
Static web pages does not contain any Dynamic web pages contains application
7. application program . program for different services.
Static web pages require less work and Dynamic web pages require comparatively
8. cost in designing them. more work and cost in designing them.
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 13 of 42
3.1.4 Understand the role of client-side and server-side scripting.
Difference Between Server-side Scripting and Client-side Scripting
The scripts can be written in two forms, at the server end (back end) or at the client end (server
end). The main difference between server-side scripting and client-side scripting is that the
server side scripting involves server for its processing. On the other hand, client-side scripting
requires browsers to run the scripts on the client machine but does not interact with the server
while processing the client-side scripts.
A script is generally a series of program or instruction, which has to be executed on other
program or application. As we know that the web works in a client-server environment. The
client-side script executes the code to the client side which is visible to the users while a server-
side script is executed in the server end which users cannot see.
Content: Server-side Scripting Vs Client-side Scripting
1. Comparison Chart
2. Definition
3. Key Differences
4. Conclusion
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 14 of 42
Comparison Chart
BASIS FOR
SERVER-SIDE SCRIPTING CLIENT-SIDE SCRIPTING
COMPARISON
Basic Works in the back end which could Works at the front end and script
not be visible at the client end. are visible among the users.
Languages involved PHP, ASP.net, Ruby on Rails, HTML, CSS, JavaScript, etc.
ColdFusion, Python, etcetera.
Affect Could effectively customize the web Can reduce the load to the
pages and provide dynamic websites. server.
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 16 of 42
CSS: CSS provides the way to design the graphic elements which help in making the
appearance of the web application more attractive.
JavaScript: It is also a client-side scripting language which essentially devised for the specific
purpose, but currently there are various JavaScript frameworks used as server-side scripting
technology.
Key Differences Between Server-side Scripting and Client-side Scripting
1. Server-side scripting is used at the backend, where the source code is not viewable or
hidden at the client side (browser). On the other hand, client-side scripting is used at the front
end which users can see from the browser.
2. When a server-side script is processed it communicates to the server. As against, client-
side scripting does not need any server interaction.
3. The client-side scripting language involves languages such as HTML, CSS and
JavaScript. In contrast, programming languages such as PHP, ASP.net, Ruby, ColdFusion,
Python, C#, Java, C++, etc.
4. Server-side scripting is useful in customizing the web pages and implement the
dynamic changes in the websites. Conversely, the client-side script can effectively minimize
the load to the server.
5. Server-side scripting is more secure than client-side scripting as the server side scripts
are usually hidden from the client end, while a client-side script is visible to the users.
Conclusion
Client-side scripting and server-side scripting works in a coordinated manner with each other.
However, both the scripting techniques are very different, where the client-side scripting
emphasize on making the interface of the web application or website more appealing and
functional. Conversely, server-side scripting emphasizes on the data accessing methods, error
handling and fast processing etcetera.
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 17 of 42
3.2 Operating online
3.2.1 Understand the impact and potential of working in online environments for individuals
and organizations.
Advantages of e-Commerce to Customers
Provide details of the virtual showcase on websites with online catalogs.
Reduced prices due to contests (coupons and offers).
Access and convenience 24 hours.
The global market for the purchase or sale of the product.
Provide secure business transactions
It is easier to compare prices with other premium brands
Do not stay online or be held forever
Many options and range (options and options)
Return products if it is of lower quality
Time savings and reviews of easy review.
Advantages of e-Commerce to Business
Increase in potential market share by increasing the customer base
Use of EDI, B2B data exchange
Low barriers to items
Provide safe business and instant transactions
Participate in retail for the launch of new products and services
24/7, 365 days of sales (buyer and seller)
Expanding the scope of the business
Main warehouse administration
Reduction of employee costs
Disadvantages of e-Commerce for Customers
Unable to personally examine the products
Privacy and security in online purchases
Fraud with credit cards
Delays in receiving products
Inability to identify fraud
Guarantee/guarantee
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 18 of 42
Quality
Hidden cost
Lack of personal interaction
Website fraud.
Disadvantages of e-Commerce to Business
Update hardware and software regularly
Website maintenance at a periodic interval
Additional costs and expertise for electronic commerce infrastructure
The readiness of the site
Training and maintenance Customer loyalty
Outstanding logistics needs
Security and credit card issues
Fraudulent orders
Sufficient internet services
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 19 of 42
3.2.2 Understand the security risks to personal data stored online and methods of
protection.
12 Data Protection Technologies and Practices to Protect Your Data
When it comes to protecting your data, there are many storage and management options you
can choose from. Solutions can help you restrict access, monitor activity, and respond to
threats. Here are some of the most commonly used practices and technologies:
1. Data discovery—a first step in data protection, this involves discovering which data
sets exist in the organization, which of them are business critical and which contains sensitive
data that might be subject to compliance regulations.
2. Data loss prevention (DLP)—a set of strategies and tools that you can use to prevent
data from being stolen, lost, or accidentally deleted. Data loss prevention solutions often
include several tools to protect against and recover from data loss.
3. Storage with built-in data protection—modern storage equipment provides built-in
disk clustering and redundancy. For example, Cloudian’s Hyperstore provides up to 14 nines
of durability, low cost enabling storage of large volumes of data, and fast access for minimal
RTO/RPO. Learn more in our guide to secure data storage.
4. Backup—creates copies of data and stores them separately, making it possible to
restore the data later in case of loss or modification. Backups are a critical strategy for ensuring
business continuity when original data is lost, destroyed, or damaged, either accidentally or
maliciously. Learn more in our guide to data availability.
5. Snapshots—a snapshot is similar to a backup, but it is a complete image of a protected
system, including data and system files. A snapshot can be used to restore an entire system to
a specific point in time.
6. Replication—a technique for copying data on an ongoing basis from a protected
system to another location. This provides a living, up-to-date copy of the data, allowing not
only recovery but also immediate failover to the copy if the primary system goes down.
7. Firewalls—utilities that enable you to monitor and filter network traffic. You can use
firewalls to ensure that only authorized users are allowed to access or transfer data.
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 20 of 42
8. Authentication and authorization—controls that help you verify credentials and
assure that user privileges are applied correctly. These measures are typically used as part of
an identity and access management (IAM) solution and in combination with role-based access
controls (RBAC).
9. Encryption—alters data content according to an algorithm that can only be reversed
with the right encryption key. Encryption protects your data from unauthorized access even if
data is stolen by making it unreadable. Learn more in guide to data encryption.
10. Endpoint protection—protects gateways to your network, including ports, routers, and
connected devices. Endpoint protection software typically enables you to monitor your network
perimeter and to filter traffic as needed.
11. Data erasure—limits liability by deleting data that is no longer needed. This can be
done after data is processed and analyzed or periodically when data is no longer relevant.
Erasing unnecessary data is a requirement of many compliance regulations, such as GDPR. For
more information about GDPR, check out our guide: GDPR Data Protection.
12. Disaster recovery—a set of practices and technologies that determine how an
organization deals with a disaster, such as a cyber-attack, natural disaster, or large-scale
equipment failure. The disaster recovery process typically involves setting up a remote disaster
recovery site with copies of protected systems, and switching operations to those systems in
case of disaster.
3.2.3 Understand what a digital footprint is and the positive and negative aspects of these.
A digital footprint is the trail of information we leave behind while using digital technology.
We create these footprints by using the Internet, social media, credit cards, loyalty cards, GPS
systems, etc. Third parties (like card issuers, advertisers, and law enforcement) can get access
to this data in order to piece together our identity and use it in some way.
It’s easy to look at the negative aspects of a digital footprint, but there are in fact some positives
as well.
More than ever, our lives are intertwined with digital technology and the best thing we can do
is to remain aware and educated. I did some research and below are some pros and cons that
result from third parties tracking our digital footprint . . .
Advantages:
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 21 of 42
Fraud or legal issues can more easily be detected
Personalization (like suggested products or related advertising) serves to add value to
our use of the Internet
Companies can more easily offer incentives based on interests and needs, sometimes
resulting in cost savings
Disadvantages:
Personal data can be used to generate revenue without our knowledge
It can be annoying and distracting to be constantly inundated with advertisements and
information
Purchase behavior data may be used as a basis to reduce credit limits or increase interest
rates
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 22 of 42
Branded Online Communities in Practice
Once community members log in for the first time (you can make a branded community easily
accessible from a website), they can participate in a variety of ways, like:
Ask another member a question about how they did something
Read top discussion posts from the week
Suggest an improvement to something you offer
Sign up to become a speaker at one of your events
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 23 of 42
tap into people’s unique perspectives and invite them to share their expertise and knowledge
with others, you inspire engagement and connections that are relevant and meaningful.
In the end, you’ll probably discover that people who feel like a critical part of the community
because of their distinctive contributions are also those people who remain most loyal and
lasting. This cycle of distinctiveness – tapping into the unique qualities of people and allowing
them to influence others – is just one way a community can enhance an organization’s ability
to communicate, grow and remain relevant.
3. Great Online Communities Grow from Shared Purpose
After looking at all these examples, we can look back at our original question: what makes a
community a community? Shared purpose, or people coming together to achieve a goal or solve
a problem. Golf players want to know which clubs to buy. Sephora consumers want the latest
beauty tips. Marketers want inspiration for new campaigns.
Your organization may have a larger goal for your community, like ticket deflection, member
retention, or increased revenue, but we always have to come back to the basics. We create
communities for people, people who want to connect and learn about something together.
How can you get back to or discover a shared purpose this year?
4. Great Online Communities are Thoughtfully Moderated
Making sure your online platforms feel safe and enjoyable for all your participants is essential
for the long-term health of your community.
That’s where community moderation becomes so important. And it’s another reason why
having dedicated community management is so important. A large part of becoming a good
online community moderator is knowing how to strike the balance between controlling
conversations to maintain order, contributing to keep conversations fresh, and giving members,
employees or customers enough freedom to feel like they can express themselves. You don’t
want mayhem, but you don’t want to discourage discussions before they even get going.
Members should genuinely feel like the online community is a place where they can express
their knowledge and opinions without being stifled, but having guidelines helps protect you
and the community.
8 BENEFITS OF BRANDED ONLINE COMMUNITIES
Benefits from a branded community trickle down to increase satisfaction, revenue, and help
grow entire organizations, including growing customer loyalty. With a community, you can:
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 24 of 42
Create real connections
Stand out from the competition with a better customer experience
Generate leads and acquire new members
Improve your products and programs by gathering and addressing feedback
Decrease support costs by crowdsourcing support
Increase revenue through in-community advertising and more
Drive referrals by giving your advocates a voice in the community
Grow your organization
3.3.2 Understand the impact of online communities on individuals and organizations.
Benefits of online and/or social communities for organizations
You can benefit from online communities in many ways. They provide insights in customers’
preferences and needs, can increase customer retention and loyalty, improve reputation and
thought leadership, decrease support costs, and allow more collaborative ways of working,
including crowdsourcing.
Customer support and social customer service
Online communities can get filled with members who are eager to help others. When customers
post questions about products or services, there is a good chance that another member of the
community will answer the question, and that answer will be there for anyone else who thinks
up the same question. This doesn’t mean a community for customer support should only be
run by customers themselves.
Self-supporting customer support communities require a high degree of community
maturation. You need to offer other ways of support as well and actively participate, certainly
in the early stages. Articles and forums help to educate customers as well, leading to fewer
issues. There is a strong link between online communities, social business and information
management. This, way an online community can lower support costs. Furthermore, it’s not
just about lowering costs. Probably even more important is growing customer loyalty by being
supportive. The first rule of community engagement is listening. When done in a customer
support, this is even more important.
Not responding via social channels such as communities can lead up to a 15 percent increase
in churn rate for existing customers according to Gartner. It’s probably the strongest reason
why we can’t ignore social customer service anymore. If customers expect response, and they
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 25 of 42
don’t get it the result will be a loss of business. Nothing is worth more than a satisfied customer.
Unfortunately, the importance of customer satisfaction and customer service is still overlooked
in social media marketing but also in virtually all marketing tactics and approaches.
Social collaboration
When people are brought together in a community to discuss new ideas or address problems,
unexpected solutions are often the result. This is one of the main reasons why internal
communities become more popular. However, public communities can also be used for
collaboration if they are properly designed for it and enable you to identify and involve the
members in a mutually relevant way. This can be used for co-creation or crowdsourcing efforts
whereby members are involved to strive towards a common goal with you and thus feel
involved.
An online community creates a space available around the clock for customers, suppliers,
employees, and partners to share ideas and collaborate. Online communities are not only
available more in terms of time, but also accommodate more people, leading to jumps in
innovation that meetings in person could never hope to match. Your personal communities can
be great ways to invite people to collaborate as well, especially if you have a strong, engaged
and focused community. It’s another reason why looking after your personal community is
important. Content marketing plays an important role here too.
Reputation
Another great thing about online customer and branded communities is that the community
members freely discuss the pros and cons of what we do, have to offer and share. If members
of the community are happy with what we do, it’s likely that they will share their praises with
the rest of the community and beyond. This reputation will spread outside the community as
well.
When participating in communities, being transparent and letting your audience know about
you is important. Typically, it’s easier to establish credibility when you show the face behind
your profile and activities instead of being elusive.
Providing solutions and being a trusted advisor
When customers have questions or concerns about services, they tend to search for the answers
on the Internet. Keywords from online customer communities or topic- and content-related
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 26 of 42
communities will show up in search results. For this reason, online communities can serve as
great places for customers to find answers to their research questions.
When we join relevant communities and actively participate, prospective customers can find
us. Members who appreciate the content and answers we provide will discover our solutions
and also start seeing us as trusted advisors. When we participate in our own branded and online
communities, this will strengthen reputation and retention. Trusted advisorship and reputation
also are called thought leadership and in a social media context increasingly “influencership”.
But there’s a difference.
Saving costs
In good customer communities, customers interact with one another and questions get
answered by other community members. Customer communities can lead to cheaper costs in
support but also in up-selling, generating new contacts, etc.
Gartner states that if organizations integrate communities into their customer support, it can
lead to cost reductions of up to 50 percent. An average of 75 percent of all customer interactions
threaten to undermine the customer’s attraction to specific brands in 2012, making it critical
for customer service organizations to figure out a way to come together and compose new
customer service processes. The cost savings will come through by the amount of calls to the
community; the cost will be less than 5 percent of the cost of a technical support agent. By
2014, organizations integrating communities into customer services will realize the cost
reduction, and the reduction will range from 10 to 50 percent.
Attention: it’s important to prioritize and respond in due time. There is a cost in being too late,
in an offline world as well.
Customer loyalty
The most powerful sales increases come from communities where customer retention/loyalty
is the goal and helping existing customers to succeed better the focus. The other way around,
as said, failing to use community efforts for essential yet crucial business functions such as
customer support, can lead to diminished loyalty.
According to Gartner, customer fallout will drive down customer satisfaction into 70 percent
of organizations if they fail to integrate communities into support. With that said, there will
also be unsuccessful community deployments. Unsuccessful deployments happen when an
organization believes that if it creates community self -help sites, customers will flock to it. It
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 27 of 42
is also believed that these deployments can operate purely by peer to peer communities with
no administration. This perception is incorrect, companies should provide moderation.
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 29 of 42
If you find a lot of your followers have similar problems, you may decide to begin a group
coaching format instead, where people can sign up for larger webinar-style classes. Group
coaching is a great way to generate more income at once, and you can even offer one-on-one
sessions at the same time.
Promote products as an affiliate
Affiliate marketing stands out as one of the simplest strategies for monetizing your online
presence. About 81% of brands use affiliate marketing to drive more sales to their store, which
makes it easy to find a company you can work with.
The key to making your fortune here is choosing the products that appeal most to your
community. Search for items that you know your followers will be interested in.
Basically, you should stick to products that are relevant to your niche and target audience as
this will help you appear more authentic compared to other advertisers online.
The great thing about affiliate marketing is that you can advertise several products at once.
Plus, you can add affiliate marketing as an extra avenue of profit to any other strategies you’re
using to monetize your online audience. Affiliate marketing works brilliantly alongside content
marketing, online courses, and more.
Advertising
Native advertising is another excellent solution for generating revenue from a community.
These days, companies of all sizes want to strengthen their connection with their audience by
advertising on various platforms.
If you already have a strong following for your website or magazine, then you can appeal to a
lot of brands in search of promotional reach.
There are various ways to advertise on your website and create cash as a result. For instance,
you can have the companies that want to work with you pay for you to place a banner ad inside
your community.
This is the most popular advertising option and Tribe allows you to easily display a banner at
the top of your community’s home page feed.
Another option could be to have sponsored content added to your site. For instance, if you run
a community that’s all about SEO, and a marketing agency wants to advertise on it, they could
write a blog post for your community with the top tips on what to look for in an SEO agency.
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 30 of 42
This sponsored post would link back to the other company’s website, and make the brand look
good to your customers.
Sell branded merchandise
If you gain a significant following online, then there’s a chance that your community will begin
to feel an emotional connection with you. This could mean that they’re keen to show their
support of your brand by purchasing products with your logo or colors on them.
If you’ve ever proudly worn a customized t-shirt with the name of a podcast company you love
on it, you’ll know how valuable branded merchandise can be.
Thanks to print-on-demand tools, you can allow your customers to choose from a range of
different branded products, from mugs and hoodies to pieces of home artwork.
Branded merchandise is excellent for making your followers feel like a more dedicated part of
the community.
For instance, the Couch Surfing store allows customers to show their appreciation of the brand
through t-shirts, journals, and more. The products they sell are all relevant to the company’s
focus on travel too, such as hoodies, and stickers that you can place on your car.
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 31 of 42
To receive donations, you need to have a deep emotional connection with your audience that
generates some intangible value.
For instance, you might be able to get donations if you convince your audience that your
content can help them to improve the amount they sell on their own websites.
You could also convince people to donate to your cause so that you can continue creating the
videos that they find entertaining.
It’s extremely easy to implement donation opportunities into your community, as all you need
to do is create a donation form using a form builder.
To make donations more likely, remember to thank your audience for what they give you. A
bonus sticker on their member profile that shows they’ve donated could be a great way to show
your appreciation.
Start monetizing your community
People will always be the most valuable asset a business can have. The more loyal followers
you gather for your organization or brand, the more you can leverage their dedication and
passion for your company.
Once you have a thriving community, there are dozens of great ways to monetize it, whether
you choose to sell courses and coaching, or you prefer to brand products and sell them online.
The key to your success will be thinking about how you can successfully generate profit from
your followers, without damaging the relationship you’ve built. Basically, you need to balance
your brand reputation with your need to make an income.
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 32 of 42
users run out of storage, they need to transfer files to an external storage device. Traditionally,
organizations built and maintained storage area networks (SANs) to archive data and files.
SANs are expensive to maintain, however, because as stored data grows, companies have to
invest in adding servers and infrastructure to accommodate increased demand.
Cloud storage services provide elasticity, which means you can scale capacity as your data
volumes increase or dial down capacity if necessary. By storing data in a cloud, your
organization save by paying for storage technology and capacity as a service, rather than
investing in the capital costs of building and maintaining in-house storage networks. You pay
for only exactly the capacity you use. While your costs might increase over time to account for
higher data volumes, you don’t have to overprovision storage networks in anticipation of
increased data volume.
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 33 of 42
of virtual servers to increase capacity. You can choose to take full control of an on-premise
private cloud or engage a cloud storage provider to build a dedicated private cloud that you
can access with a private connection. Organizations that might prefer private cloud storage
include banks or retail companies due to the private nature of the data they process and store.
Hybrid cloud storage: This model combines elements of private and public clouds,
giving organizations a choice of which data to store in which cloud. For instance, highly
regulated data subject to strict archiving and replication requirements is usually more suited
to a private cloud environment, whereas less sensitive data (such as email that doesn’t contain
business secrets) can be stored in the public cloud. Some organizations use hybrid clouds to
supplement their internal storage networks with public cloud storage.
Advantages
Off-site management: Your cloud provider assumes responsibility for maintaining
and protecting the stored data. This frees your staff from tasks associated with storage, such
as procurement, installation, administration, and maintenance. As such, your staff can focus
on other priorities.
Quick implementation: Using a cloud service accelerates the process of setting up and
adding to your storage capabilities. With cloud storage, you can provision the service and
start using it within hours or days, depending on how much capacity is involved.
Cost-effective: As mentioned, you pay for the capacity you use. This allows your
organization to treat cloud storage costs as an ongoing operating expense instead of a capital
expense with the associated upfront investments and tax implications.
Scalability: Growth constraints are one of the most severe limitations of on-premise
storage. With cloud storage, you can scale up as much as you need. Capacity is virtually
unlimited.
Business continuity: Storing data offsite supports business continuity in the event that
a natural disaster or terrorist attack cuts access to your premises.
Disadvantages
Security: Security concerns are common with cloud-based services. Cloud storage
providers try to secure their infrastructure with up-to-date technologies and practices, but
occasional breaches have occurred, creating discomfort with users.
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 34 of 42
Administrative control: Being able to view your data, access it, and move it at will is
another common concern with cloud resources. Offloading maintenance and management to
a third party offers advantages but also can limit your control over your data.
Latency: Delays in data transmission to and from the cloud can occur as a result of
traffic congestion, especially when you use shared public internet connections. However,
companies can minimize latency by increasing connection bandwidth.
Regulatory compliance: Certain industries, such as healthcare and finance, have to
comply with strict data privacy and archival regulations, which may prevent companies from
using cloud storage for certain types of files, such as medical and investment records. If you
can, choose a cloud storage provider that supports compliance with any industry regulations
impacting your business.
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 35 of 42
databases, servers and computers. The back end functions as a repository, storing data that is
accessed by the front end.
Communications between the front and back ends are managed by a central server. The central
server relies on protocols to facilitate the exchange of data. The central server uses both
software and middleware to manage connectivity between different client devices and cloud
servers. Typically, there is a dedicated server for each individual application or workload.
Cloud computing relies heavily on virtualization and automation technologies. Virtualization
enables the easy abstraction and provisioning of services and underlying cloud systems into
logical entities that users can request and utilize. Automation and
accompanying orchestration capabilities provide users with a high degree of self-service to
provision resources, connect services and deploy workloads without direct intervention from
the cloud provider's IT staff.
Types of cloud computing services
Cloud computing can be separated into three general service delivery categories or forms of
cloud computing:
1. IaaS. IaaS providers, such as Amazon Web Services (AWS), supply a virtual
server instance and storage, as well as application programming interfaces (APIs) that let users
migrate workloads to a virtual machine (VM). Users have an allocated storage capacity and
can start, stop, access and configure the VM and storage as desired. IaaS providers offer small,
medium, large, extra-large, and memory- or compute-optimized instances, in addition to
enabling customization of instances, for various workload needs. The IaaS cloud model is
closest to a remote data center for business users.
2. PaaS. In the PaaS model, cloud providers host development tools on their
infrastructures. Users access these tools over the internet using APIs, web portals or gateway
software. PaaS is used for general software development, and many PaaS providers host the
software after it's developed. Common PaaS products include Salesforce's Lightning Platform,
AWS Elastic Beanstalk and Google App Engine.
3. SaaS. SaaS is a distribution model that delivers software applications over the internet;
these applications are often called web services. Users can access SaaS applications and
services from any location using a computer or mobile device that has internet access. In the
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 36 of 42
SaaS model, users gain access to application software and databases. One common example of
a SaaS application is Microsoft 365 for productivity and email services.
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 37 of 42
workload bursts or spikes in demand. The goal of a hybrid cloud is to create a unified,
automated, scalable environment that takes advantage of all that a public cloud infrastructure
can provide, while still maintaining control over mission-critical data.
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 38 of 42
Characteristics and advantages of cloud computing
Cloud computing has been around for several decades now, and today's cloud computing
infrastructure demonstrates an array of characteristics that have brought meaningful benefits
for businesses of all sizes. Some of the main characteristics of cloud computing are the
following:
Self-service provisioning. End users can spin up compute resources for almost any
type of workload on demand. An end user can provision computing capabilities, such as server
time and network storage, eliminating the traditional need for IT administrators to provision
and manage compute resources.
Elasticity. Companies can freely scale up as computing needs increase and scale down
again as demands decrease. This eliminates the need for massive investments in local
infrastructure, which might or might not remain active.
Pay per use. Compute resources are measured at a granular level, enabling users to pay
only for the resources and workloads they use.
Workload resilience. CSPs often implement redundant resources to ensure resilient
storage and to keep users' important workloads running -- often across multiple global regions.
Migration flexibility. Organizations can move certain workloads to or from the cloud
-- or to different cloud platforms -- as desired or automatically for better cost savings or to use
new services as they emerge.
Broad network access. A user can access cloud data or upload data to the cloud from
anywhere with an internet connection using any device.
Multi-tenancy and resource pooling. Multi-tenancy lets numerous customers share
the same physical infrastructures or the same applications yet still retain privacy and security
over their own data. With resource pooling, cloud providers service numerous customers from
the same physical resources. The resource pools of the cloud providers should be large and
flexible enough so they can service the requirements of multiple customers.
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 39 of 42
An overview of cloud features and characteristics
These characteristics support a variety of important benefits for modern business, including the
following:
Cost management. Using cloud infrastructure can reduce capital costs, as
organizations don't have to spend massive amounts of money buying and maintaining
equipment. This reduces their capital expenditure costs -- as they don't have to invest in
hardware, facilities, utilities or building large data centers to accommodate their growing
businesses. Additionally, companies don't need large IT teams to handle cloud data center
operations because they can rely on the expertise of their cloud providers' teams. Cloud
computing also cuts costs related to downtime. Since downtime rarely happens in cloud
computing, companies don't have to spend time and money to fix any issues that might be
related to downtime.
Data and workload mobility. Storing information in the cloud means that users can
access it from anywhere with any device with just an internet connection. That means users
don't have to carry around USB drives, an external hard drive or multiple CDs to access their
data. Users can access corporate data via smartphones and other mobile devices, enabling
remote employees to stay up to date with co-workers and customers. End users can easily
process, store, retrieve and recover resources in the cloud. In addition, cloud vendors provide
all the upgrades and updates automatically, saving time and effort.
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 40 of 42
Business continuity and disaster recovery (BCDR). All organizations worry about
data loss. Storing data in the cloud guarantees that users can always access their data even if
their devices, e.g., laptops or smartphones, are inoperable. With cloud-based services,
organizations can quickly recover their data in the event of emergencies, such as natural
disasters or power outages. This benefits BCDR and helps ensure that workloads and data are
available even if the business suffers damage or disruption.
Disadvantages of cloud computing
Despite the clear upsides to relying on cloud services, cloud computing carries its own
challenges for IT professionals:
Cloud security. Security is often considered the greatest challenge facing cloud
computing. When relying on the cloud, organizations risk data breaches, hacking of APIs and
interfaces, compromised credentials and authentication issues. Furthermore, there is a lack of
transparency regarding how and where sensitive information entrusted to the cloud provider is
handled. Security demands careful attention to cloud configurations and business policy and
practice.
Cost unpredictability. Pay-as-you-go subscription plans for cloud use, along with
scaling resources to accommodate fluctuating workload demands, can make it tough to define
and predict final costs. Cloud costs are also frequently interdependent, with one cloud service
often utilizing one or more other cloud services -- all of which appear in the recurring monthly
bill. This can create additional unplanned cloud costs.
Lack of capability and expertise. With cloud-supporting technologies rapidly
advancing, organizations are struggling to keep up with the growing demand for tools and
employees with the proper skill sets and knowledge needed to architect, deploy, and manage
workloads and data in a cloud.
IT governance. The emphasis on do-it-yourself capability in cloud computing can
make IT governance difficult, as there is no control over provisioning, deprovisioning and
management of infrastructure operations. This can make it challenging to properly
manage risks and security, IT compliance and data quality.
Compliance with industry laws. When transferring data from on-premises local
storage into cloud storage, it can be difficult to manage compliance with industry regulations
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 41 of 42
through a third party. It's important to know where data and workloads are actually hosted in
order to maintain regulatory compliance and proper business governance.
Management of multiple clouds. Every cloud is different, so multi-cloud
deployments can disjoint efforts to address more general cloud computing challenges.
Cloud performance. Performance -- such as latency -- is largely beyond the control of
the organization contracting cloud services with a provider. Network and provider outages can
interfere with productivity and disrupt business processes if organizations are not prepared with
contingency plans.
Building a private cloud. Architecting, building and managing private clouds --
whether for its own purpose or for a hybrid cloud goal -- can be a daunting task for IT
departments and staff.
Cloud migration. The process of moving applications and other data to a cloud
infrastructure often causes complications. Migration projects frequently take longer than
anticipated and go over budget. The issue of workload and data repatriation -- moving from the
cloud back to a local data center -- is often overlooked until unforeseen cost or performance
problems arise.
Vendor lock-in. Often, switching between cloud providers can cause significant issues.
This includes technical incompatibilities, legal and regulatory limitations and substantial costs
incurred from sizable data migrations.
MD AHSAN HABIB
SENIOR ICT TEACHER
BIT
PHONE: 01712214476 Page 42 of 42