Kasneb Ict
Kasneb Ict
E commerce .................................................................................................................................... 6
E-commerce infrastructure.......................................................................................................... 9
Hardware refers to the physical devices that are used to store, process, and output
information. Common examples of hardware include computers, printers, and scanners.
Software refers to the programs and applications that are used to control the hardware
and manage the data stored on it. Common examples of software include operating
systems, word processors, and spreadsheets.
Databases are used to store information in a structured way so that it can be easily
accessed and updated. Common examples of databases include customer records,
inventory records, and financial records.
Networks are used to connect computers and other devices so that they can
communicate with each other. Common examples of networks include the Internet,
intranets, and extranets.
People are the users of the information system. They use the hardware, software,
databases, and networks to input, process, output, and store information.
Transaction processing systems are the most basic type of information system. They
collect and store data about transactions, such as sales, purchases, and payments. The
data is then used to generate reports.
Management information systems provide managers with information about the
operation of the business. They typically include reports on sales, inventory, and
customer data.
Decision support systems help managers make decisions by providing them with
information about the potential consequences of their decisions.
Business intelligence systems provide managers with information about the competition,
the market, and the economy. They help managers make strategic decisions about
where to allocate resources.
An IS must be well-managed and maintained. The people who manage and maintain
the system must have the necessary skills and knowledge. The system must be
monitored and regularly tested to ensure that it is operating correctly.
They are interactive: Information systems are designed to be used by people. They
provide an interface that allows users to input data and receive information in a format
that is easy to understand and use.
Features of e-commerce
1. Speed and convenience: E-commerce is fast and convenient. Users can purchase
goods and services with a few clicks of a mouse, and transactions are typically
completed quickly and smoothly.
2. Global reach: E-commerce knows no borders. Users can buy and sell products and
services to people anywhere in the world.
3. 24/7 operation: E-commerce never sleeps. Users can shop or conduct business at
any time of day or night.
5. Lower costs: E-commerce can be less expensive for businesses and consumers
alike. businesses can save on overhead costs, such as rent and inventory, while
consumers can save on travel and time.
Models of e-commerce
There are four common models of e-commerce: business-to-consumer (B2C),
business-to-business (B2B), consumer-to-consumer (C2C), and consumer-to-business
(C2B).
B2C e-commerce refers to the sale of goods and services from businesses to
consumers through an online platform. This is the most common type of e-commerce,
and examples include online retail stores, travel websites, and digital content providers.
B2B e-commerce is the sale of goods and services between businesses through an
online platform. This type of e-commerce is often used for business-to-business
procurement, and examples include online marketplaces and business-to-business
portals.
C2C e-commerce platforms enable consumers to sell goods and services to other
consumers. A popular example of a C2C e-commerce platform is eBay, which allows
individuals to sell new and used items to other individuals.
Another major impact of the internet on businesses is the way it has changed the way
we communicate. Email, instant messaging, and video conferencing are now
commonplace, and have made it much easier for businesses to communicate with
clients, customers, and employees located all over the world.
The internet has also had an impact on the way businesses market themselves. Social
media, search engine optimization, and online advertising are all powerful tools that
businesses can use to reach their target audiences.
Finally, the internet has made it easier for businesses to transact with customers and
clients. Online payments, e-commerce, and paperless billing are all now standard for
many businesses.
Additionally, e-commerce platforms typically offer a variety of features that can help
businesses streamline their operations, such as inventory management, shipping
integration, and payment processing. By using e-commerce software, businesses can
reach a larger audience of potential customers, which can lead to increased sales and
profits.
E-commerce infrastructure and platform
E-commerce infrastructure
E-commerce infrastructure must be able to handle large amounts of traffic and data,
and must be secure to protect sensitive information.
E- commerce platform
An e-commerce platform is a software application that enables online transactions
between a merchant and a customer. This can include anything from a simple website
with a shopping cart to a more complex system that includes an inventory management
system, order management system, and a payment gateway.
Another thing to keep in mind is the level of customer support that is offered by the
platform. If you are not comfortable with technical jargon, you'll want to choose a
platform that offers 24/7 customer support.
Finally, you'll also want to consider the cost of the platform. Some platforms charge a
monthly fee, while others charge a percentage of each sale. Once you've considered all
of these factors, you'll be able to choose the best e-commerce platform for your
business.
E- commerce payment methods
There are many different ways to pay for goods and services online. The most common
method is via credit or debit card, but other options include e-wallets, mobile payments,
cryptocurrency, and bank transfers.
Credit and debit cards are the most popular form of online payment, as they are quick
and easy to use. However, they are not without their risks, as fraudsters can sometimes
access card details and use them to make unauthorized purchases.
E-wallets are another popular option for online payments. These allow users to store
their card details in a secure online account, and then make payments by entering their
username and password. E-wallets are often used for recurring payments, such as
subscription services.
Mobile payments are becoming increasingly popular, as they offer a convenient and
secure way to pay for goods and services using a smartphone. There are various
mobile payment apps available, such as Apple Pay, Android Pay, and Samsung Pay.
Another challenge is the issue of fraud. With so many transactions taking place online,
there is a greater risk of fraud. businesses must be diligent in order to protect
themselves and their customers.
Another challenge that businesses face is the issue of competition. With so many
businesses operating online, it can be difficult to stand out from the crowd. businesses
must find ways to differentiate themselves and attract customers.
Finally, businesses must also deal with the issue of returns and refunds. When products
are purchased online, customers often have the option to return them if they are not
satisfied. This can be a challenge for businesses, as they must process the return and
issue a refund.
Another challenge is getting customers to trust your business. When customers shop
online, they can’t see or touch the product they’re buying. This can make it difficult to
build trust with customers. businesses must find ways to overcome this, such as by
providing detailed product descriptions, offering customer support, and building a strong
reputation.
Finally, it is important to make sure that the website that you are using is secure. You
can tell if a website is secure if the URL begins with https://. This means that the site is
using a secure socket layer (SSL) to encrypt the information that is being sent.
Mobile computing
The term “mobile computing” covers a wide range of devices and activities. At its most
basic, mobile computing is the ability to use technology services or applications while in
transit and away from a fixed location. Mobile computing has evolved from connecting
laptops to wireless networks in coffee shops to a fully integrated ecosystem of devices,
apps, and services. It’s now possible to work, play, and stay connected virtually
anywhere.
The mobile computing revolution has been driven by three major forces. First, is the
increasing power and declining cost of mobile devices. Second is the ubiquity of
wireless networks. And third is the rise of cloud services, which allow users to access
data and applications from any device with an Internet connection.
Feature phones are more basic than smartphones, but they can still do many things,
such as make calls, send texts, and take and share photos.
Tablets are larger than smartphones and have a lot of the same features, but they are
better suited for tasks that require a larger screen, such as watching movies or playing
games.
Wearable devices are becoming more popular, and they include devices such as
smartwatches and fitness trackers. These devices can track your fitness activity,
monitor your heart rate, and even make calls and send texts.
Uses of mobile devices
One of the most popular uses for mobile devices is for making calls. This is because
they are portable and can be used anywhere. They can also be used for sending texts,
which is another popular use for them.
Another popular use for mobile devices is checking email. This is because they can be
used to access email accounts from anywhere. This is convenient for people who need
to stay in touch with their work or personal email accounts while they are on the go.
Browsing the internet is another common use for mobile devices. This is because they
can be used to access the internet from anywhere. This is convenient for people who
need to stay connected while they are on the go.
There are a number of other uses for mobile devices as well. They can be used for
playing games, listening to music, and a variety of other tasks.
mobile applications
A mobile application, also known as a mobile app or simply an app, is a computer
program or software application designed to run on a mobile device such as a phone,
tablet, or watch. Apps are generally designed to be small and fast so they can be
downloaded quickly and easily, and they are often designed to work with specific
hardware and software features of the device.
Most apps are designed to perform specific tasks or provide specific information, such
as a game, a newsfeed, a weather forecast, or a map. Many apps are also designed to
work with other apps, such as social networking apps that let you share information with
your friends, or payment apps that let you make purchases directly from your device.
In addition to the apps that come pre-installed on your device, you can usually
download more apps from an app store, such as the Apple App Store or the Google
Play store. These stores typically offer a wide variety of apps, including both free and
paid options.
Legal, ethical and social issues in information systems
Information systems ethical and social concerns
There are a number of ethical and social concerns that need to be considered when
implementing and using information systems. These include issues such as data
privacy, security, and ownership; as well as the potential for information systems to be
used for harmful purposes.
Data privacy is a major concern when it comes to information systems. This is because
data stored on these systems can often be accessed by unauthorized individuals. This
can lead to sensitive information being leaked or stolen, which can have a negative
impact on individuals, businesses, and governments.
Ownership is also a concern when it comes to information systems. This is because the
data stored on these systems is often owned by the businesses or organizations that
operate them. This can lead to problems if individuals or groups try to access this data
without permission.
Finally, information systems can also be used for harmful purposes. This includes things
like online harassment, cyberbullying, and identity theft. This can have a serious impact
on the safety and security
Moral dimensions of information systems include the ability to make decisions that are
fair and just, that take into account the rights of all stakeholders, and that are
transparent and accountable. The systems must also be responsive to the needs of the
people they serve, and be designed to promote the common good.
Moral dimension of information systems also refers to the ethical implications of using
and developing information systems. This includes considering the impact of information
systems on society and individuals, and ensuring that information systems are designed
and used ethically.
There are a number of ethical considerations that need to be taken into account when
designing and using information systems. These include issues such as data privacy,
data security, freedom of information, and intellectual property rights. Additionally, there
is a need to consider the social implications of information systems, such as how they
may impact on inequality, democracy, and human rights.
Information systems have the potential to cause great harm or good, depending on how
they are used. It is important to ensure that information systems are designed and used
in a way that minimises the risks of harm and maximises the potential for good. This
requires a careful consideration of the ethical implications of using and developing
information systems.
Data privacy laws govern how personal data can be collected, used, and disclosed.
These laws vary from country to country, so it is important to be aware of the specific
requirements in the jurisdictions where the information system will be used.
Data security is important to protect the confidentiality, integrity, and availability of data.
This includes ensuring that only authorized users can access the data, that the data is
not modified or deleted without authorization, and that the data is backed up in case of
system failure.
Intellectual property laws protect the creators of software, databases, and other
information systems from having their work copied or used without permission. These
laws also allow information system creators to license their work to others.
User agreements are contracts that set out the rights and responsibilities of users of an
information system. These agreements typically cover topics such as acceptable use,
data security, and intellectual property.
Presentation software
Features of a presentation program
Presentation programs typically offer a variety of features that make creating a
presentation easy and fun.
Some of the most common features include templates, themes, transitions, and
animations.
Templates provide a pre-designed layout for your presentation, making it easy to get
started.
Themes allow you to change the overall look and feel of your presentation,
while transitions and animations can add interest and movement to your slides.
1. Use a clear and easy-to-read font. Some good choices include Arial, Verdana, or
Helvetica.
2. Make sure your font size is large enough to be seen from a distance. A good rule of
thumb is to use at least 24 point font for body text and 36 point font for headings.
3. Use bullet points or short phrases rather than full sentences. This will help your
audience to follow along more easily.
4. Use proper grammar and punctuation. This may seem like a small detail, but it can
make a big difference in how your presentation is received.
5. Use contrasting colors for your text and background. This will help to ensure that your
audience can easily read your slides.
By following these tips, you can ensure that your text is both easy to read and visually
appealing.
Computerised accounting software
Capturing data
In computerised accounting software, data is captured by inputting transactions into the
system. This can be done manually, by importing data from another source, or through
integration with other software applications.
The data captured in the system will include information on the date, type and amount
of the transaction, as well as the parties involved. This data is then used to generate
financial reports, such as balance sheets and profit and loss statements.
The advantage of using computerised accounting software is that it can provide a more
accurate and up-to-date view of your financial position than manual accounting
methods. It can also save time and reduce the risk of errors.
Financial reports are another key feature of accounting software. These reports can
give businesses a clear picture of their financial health, and can help them make
informed decisions about their future.