Resources That will Make You Better at IT, Education and specifically in Digital Marketing.

Covered Education industry along with Information technology and Digital Marketing sector.

Pages

  • Home
  • E-Content Development
  • ITAB - IT Applications in Business
  • Operating Systems with Linux MCA- 105
  • Information System Management
  • PHD Course Work
  • AMITY University MP Gwalior Doctor of Philosophy (Engineering) - Part Time -JAN 2024

Computing Skills - Part - II



Explore Computing Skills 

Welcome to the first class of Computing Skills - Part - II 

So! what are we going to cover in Computing Skills - Part - II well!.  to answer your question let me show you a table first!

 Hopefully you must get an idea now! about the topics to be covered in the further classes.








Facilitator Guide 




Please Fill Out The Attendance Form




Let's start with the recap of computing skills - Part -1 that you must have done in previous semesters.

Recap of computing skills - Part - I






MS-Excel Practice Exercise


Create and share Google sheets for below work


Resources That will Make You Better at IT, Education and specifically in Digital Marketing.: .new shortcuts for G Suite (datagetdm.blogspot.com)

Try these shortcuts to create Google sheet 


Qs 1. What all are the features of MS-Excel that make it so popular?

Qs 2. What all we can do using MS-Excel

Qs 3. Define each component of this image.




Qs 4. Create this Google sheet 

Qs 5. Create Student Details sheet with below fields. 



Qs 6. Create pocket money calculator ?






Qs 7. Create a salary sheet for DPS school



        







Qs 8. Create a Marks workbook  containing  details of Student Marks with headings: Name, English, Hindi, Math's, Computer ,Science, Social Science, Total Marks and Percentage Marks. 

Add 10 records to the table. Calculate total marks & percentage using functions only.

Qs9. Create employee table(emp_id / emp_name / dept. / designation / basic sal and calculate gross and net salary of employees (10 records) as per payroll processing.

 Gross salary = basic salary + allowances
 Net salary = Gross salary – deductions

Allowances : DA 40% of basic salary  / HRA - 25%/ Travel -15% / Medical – 
                   10% of basic salary.
Deductions : Based on Leave count and Loan amount (take any 
                    assumption)


Qs 10. Make your worksheet to be password protected. 

Qs 11. Hide / unhide your Excel sheet.

Qs 12. Use Excel functions  a) Sum b) Product c) Month d) year e) day f) Minute g) Hour h) second.

Qs 13. Write the shortcut keys that you have used in Ms-Excel 

Qs 14 Calculate the percentage of marks 




Qs 15. Create a Datasheet in Excel for HDFC bank with 25 records (assume field names as per your choice)

Qs 16. Create a worksheet for City Hospital with 25 records (assume field names as per your choice)

QS 17. Apply below functionalities.

1)  Add / Remove filter from the sheet.
2) Remove all the duplicate values from your sheet. 
3) Arrange your data in ascending or descending order.

Qs 18. Create below sheet and apply relevant formula also.


Qs 19   You have a monthly income of Rs. 10000, your monthly outgoing are rent 5000, food 3000, electricity 600, phone 400 and cable TV 300 etc. Make out a clear worksheet with the monthly income. The monthly expanse listed and their total, the remainder (what is left over in the month) should be calculated and the amount left over day (assuming 30 days in a month)





Apply below listed operations on family budget sheet.

1)Apply filter

2) Create pie chart only

3) Protect sheet

4) Add suitable comment on savings

5)Ensure your sheet must be grammatically okay.

6)Reflect highly outgoing item of Feb month

7)Sort the outgoings in descending order

8)Create macro to calculate annual savings

9)Apply goal seek to monthly budget

10) Ensure your datasheet must not have duplicates

11)Calculate annual savings using consolidate feature only!


Qs 20 Create the worksheet by using the skills you have learn in Excel.




Instructions  :

  1. Save the file under the name stationary
  2. Calculate the cost value of the first article by using the formula Qty X price and then copy the formula to the other cells.

Calculate the total cost value spent by you as per the sheet. 

Qs 21 Learn Excel Error Values

Qs 22. Practice all these Worksheet Navigation Keys.


Qs 23. Working with Formulas




PNGRB  Outline of  Syllabus

Qs How to find the formula cell ?

Ans: select the sheet first and then press CTRL +G > special > formulas> ok

Qs How to calculate the Sum of negative and positive numbers in Excel?

Ans : use the formula Sumif for this. 

example : =SUMIF(D2:D11,">0",D2:D11) ==> for the sum of  positive numbers

                 =SUMIF(D2:D11,"<0",D2:D11)  ==> for the sum of negative numbers


Qs How to Merge Only Certain Parts of a Cell in Excel

Ans : =A1&" "&B1&" "&C1 Or can use Concatenate function OR use flash fills.


Format cells Shortcut keys




Qs What is circular sum in Excel
Ans . File > options > calculate options > manual or go to formulas tab and then calculate options > manual 

Qs  Use convert functions to change the data from one datatype to another datatype 

example hours to minutes and so on

QS What is the shortcute key for autosum

Ans . Alt + =


QS use sequnce funtion to automatically create a sequence upto 100

Ans =sequence(100)

try this one also =char(sequence(26,1,65) to generate a sequnce of  A to Z

Qs How to insert emojis in excel sheet ?

Ans : Simply press window icon along with dot from your keyboard black and white emojis will appear.








Qs Sho

                        














Components of your presentation must include:

1) Text [Follow less is more principle means put less content that conveys more 
     meaning] 
2) Relevant image [images should not be blurred]

3) Insert hyperlink

4) Add video to your power point 

5) Add sound effects

6) Insert infographics also

7) Goal of Presentation must be very clear

8) Know your target audience first.

9) insert notes also in each slide

10) Before thanks slides insert a source slide and put all used references here.

11) can add Disclaimer slide also at last also.

12) Maximum number of slides is 8-10 only so plan your presentation in advance first.

13) you can start your presentation with a relevant quote also.

14) Put relevant examples also (if required)

15) you can put story, process  and smart art also in your presentation.


Qs 1. Prepare dynamic Presentation out of this rough draft.

Instructions:

  1. Use your own creativity to make this presentation effective.
  2. Write your name after efforts by :
  3. Your presentation will be scaled  between 1-10 marks.
  4. Use selective color scheme.
  5. Use appropriate graphics to make your presentation eye catchy.
Slide -1 : 

Slide -2 : 


Slide -3 : 

Slide -4 :  

Slide -5 :  


Slide -6:  

Slide -7

Please follow below instructions

¡  Put  Your name, date, and slide number at the footer of each slide.

¡  Once you are done with your slides, view your Slide Show. Add Custom or Preset Animation and Sounds (go to Slide Show, Preset Animation or Custom Animation). 

¡Change the theme of your slides as per your content [Download templates from PowerPoint Templates for Presentations (slidemodel.com)] or

 [Eye Catching Color Free PowerPoint Template and Google Slides Theme (pptmon.com)] or 

[Eye catching powerpoint templates | Prezi] or

🖧[Free Creative Google Slide and PowerPoint templates (slidesgo.com)]

¡  Save your presentation twice: the first time as a PPT presentation and the second time as a Web Page.

¡  Create a Print Preview

¡  Show your presentation in PowerPoint and web page formats and the Print Preview to the instructor.

Components of a good Presentations

1) Know about your target audience first
2) Add text [follow less is more principles means put less words i.e., show bigger idea]


3) Insert relevant images. Giff can be a good choice.

4) Insert videos

5) To make your presentation effective add appropriate sound effects wherever required.

6) Choose relevant theme for your presentation. [Download from Download Free PowerPoint Templates - SlideModel.com] or [12,435+ Free PowerPoint Templates and Slides by FPPT.com (free-power-point-templates.com)]

7) Use Animation to create lasting effects.

8) Insert smart art or infographics also

9) Can Add Hyperlinks and table also.

10) Insert speaker notes also for the ready reference.

11) Take relevant & good examples also

12) Before the "Thanks " slide insert a source slide and put all the used source links.

13) Can add disclaimer slide also (if required)

14) Maximum number of a slides in a ppt 8-10.

15) Follow hub & spoke model for the content management.


Please note that your presentation should be free from any kind                      of grammatical or spelling errors.

Qs 2. Prepare presentation on Famous personalities of India [Choose any one topic]

 

¡  Narendra Modi

¡  Shahrukh Khan.

¡  Aamir Khan.

¡  Virat Kohli.

¡  Mary Kom.

¡  Mukesh Ambani.

¡  Arvind Kejriwal

¡  Kapil Sharma

¡  Baba Ramdev

¡  Sachin tendulakar or Virat Kohli

Qs 3. Explore your life goals and prepare an effective presentation for achieving the Goals of your life.

Formula to achieve your goal.


Dream + Action Steps + Target Date = Goal


CAREER: Where do you hope to be in your career development at the time of your graduation?

Examples:

•       I will be starting my career in advertising with an entry-level copywriting position in a large advertising firm.

•       I will be continuing my education in a Ph.D. program in Biochemistry to eventually become a university professor. or I will be working as a pediatric nurse in an urban hospital somewhere in California. 

 ¡  Short-term goals are those specific activities and strategies that move us toward our long-term goals or “ideal future.”
¡  One convenient way of creating your list of goals is to brainstorm ideas in each of the following categories:

§   What you want to BE

§  What you want to LEARN

§  What you want to DO

§  What you want to HAVE

§   What you want to GIVE 

  
Qs 4. Prepare this Action plan based on your goals.





After completion of this topic , candidate will be familiar with the : Latest trends and technologies in upcoming fields in ICT. Will be able to understand need of Cyber Security and will be able to secure their PC and Mobile devices by using basic security features.  

 


What Is " Cyber Law" ?

"Cyber law is any law that applies to the internet and internet-related technologies & is one of the newest areas of the legal system."

  • Cyber law is any law that applies to the internet and internet-related technologies.
  • This is because internet technology develops at such a rapid pace. 
  • Cyber law provides legal protections to people using the internet. This includes both businesses and everyday citizens. 
  • Understanding cyber law is of the utmost importance to anyone who uses the internet. Cyber Law has also been referred to as the "law of the internet.
  • Cybercrime or a computer-oriented crime is a crime that includes a computer and a network. 
  • The computer may have been used in the execution of a crime or it may be the target. 
  • Cybercrime is the use of a computer as a weapon for committing crimes such as committing fraud, identity theft, or breaching privacy. 
  • Cybercrime, especially through the Internet, has grown in importance as the computer has become central to every field like commerce, entertainment, and government. 
  • Cybercrime may endanger a person or a nation’s security and financial health. 

Cybercrime encloses a wide range of activities, but these can generally be divided into two categories: Crimes that aim at computer networks or devices. These types of crimes involve different threats (like virus, bugs etc.) and denial-of-service (DoS) attacks.

Crimes that use computer networks to commit other criminal activities. These types of crimes include cyber stalking, financial fraud or identity theft.

Cybercrime and Cybersecurity

Areas that are related to cyber law include cybercrime and cybersecurity. With the right cybersecurity, businesses and people can protect themselves from cybercrime. Cybersecurity looks to address weaknesses in computers and networks. The International Cybersecurity Standard is known as ISO 27001.

Cybersecurity policy is focused on providing guidance to anyone that might be vulnerable to cybercrime. This includes businesses, individuals, and even the government. Many countries are looking for ways to promote cybersecurity and prevent cybercrime. For instance, the Indian government passed the Information Technology Act in 2000. The main goal of this law is to improve transmission of data over the internet while keeping it safe.

Information is another important way to improve cybersecurity. Businesses, for example, can improve cybersecurity by implementing the following practices:

  • Offering training programs to employees.
  • Hiring employees who are certified in cybersecurity.
  • Being aware of new security threats.
  • Cybercrimes can be committed against governments, property, and people.

Categories of Cyber Crime

Generally, there are three major categories of cybercrimes that you need to know about. These categories include:

  1. Crimes Against People. While these crimes occur online, they affect the lives of actual people. Some of these crimes include cyber harassment and stalking, distribution of child pornography, various types of spoofing, credit card fraud, human trafficking, identity theft, and online related libel or slander.
  2. Crimes Against Property. Some online crimes happen against property, such as a computer or server. These crimes include DDOS attacks, hacking, virus transmission, cyber and typo squatting, computer vandalism, copyright infringement, and IPR violations
  3. Crimes Against Government. When a cybercrime is committed against the government, it is considered an attack on that nation's sovereignty and an act of war. Cybercrimes against the government include hacking, accessing confidential information, cyber warfare, cyber terrorism, and pirated software.Most of these types of cybercrimes have been addressed by the IT ACT of 2000 and the IPC. Cybercrimes under the IT ACT include:
Sec. 65, Tampering with Computer Source Documents.
Sec. 66, Hacking Computer Systems and Data Alteration.
Sec. 67, Publishing Obscene Information.
Sec. 70, Unauthorized Access of Protected Systems.
Sec. 72, Breach of Confidentiality and Privacy.
Sec. 73, Publishing False Digital Signature Certificates.
Special Laws and Cybercrimes under the IPC include:

Sending Threating Messages by Email, Indian Penal Code (IPC) Sec. 503.
Sending Defamatory Messages by Email, Indian Penal Code (IPC) Sec. 499
Forgery of Electronic Records, Indian Penal Code (IPC) Sec. 463
Bogus Websites & Cyber Fraud, Indian Penal Code (IPC) Sec. 420
Email Spoofing, Indian Penal Code (IPC) Sec. 463
Web-Jacking, Indian Penal Code (IPC) Sec. 383
Email Abuse, Indian Penal Code (IPC) Sec. 500

 

There are also cybercrimes under the Special Acts, which include:

Online Sale of Arms Under Arms Act, 1959
Online Sale of Drugs Under Narcotic Drugs and Psychotropic Substances Act, 1985

 

Classification of Cyber Crime

 Cyber Terrorism – 

 

Cyber terrorism is the use of the computer and internet to perform violent acts that result in loss of life. This may include different type of activities either by software or hardware for threatening life of citizens.  In general, Cyber terrorism can be defined as an act of terrorism committed through the use of cyberspace or computer resources. 
 
Cyber Extortion – 

Cyber extortion occurs when a website, e-mail server or computer system is subjected to or threatened with repeated denial of service or other attacks by malicious hackers. These hackers demand huge money in return for assurance to stop the attacks and to offer protection. 
 
Cyber Warfare – 
Cyber warfare is the use or targeting in a battle space or warfare context of computers, online control systems and networks. It involves both offensive and defensive operations concerning to the threat of cyber attacks, espionage and sabotage. 
 
Internet Fraud –
Internet fraud is a type of fraud or deceit which makes use of the Internet and could include hiding of information or providing incorrect information for the purpose of deceiving victims for money or property. Internet fraud is not considered a single, distinctive crime but covers a range of illegal and illicit actions that are committed in cyberspace. 
 
Cyber Stalking – 
This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. In this case, these stalkers know their victims and instead of offline stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not having the desired effect, they begin offline stalking along with cyber stalking to make the victims’ lives more miserable.


For computer professionals and users, the general code of ethics is as follows.


A. Treat everyone fairly. Do not discriminate against anyone on grounds such as age, post, gender, etc. This is known as ‘Fair Treatment’.

B. Continuously strive to honour the rights to privacy of all individuals. Access private information of computer systems only when it is extremely necessary in the course of duty, with prior permission from the concerned authorities. Try to maintain and protect the privacy of any confidential information.Avoid using any confidential information for your personal interest. This is known as maintaining the privacy of the users and professionals.

C. Try to keep informing the users about computing matters which will affect their work conditions. Change in information such as acceptable use of resources, sharing of common resources, maintenance of security and any relevant legal obligations must be conveyed to the users from time to time. This is known as maintaining good communication with the users.

D. Try to ensure the integrity of the systems. Regularly perform the maintenance of hardware and software packages, analyze the system performance and prevent unauthorized use or access. This is known as maintaining good system integrity

E. Try to cooperate and support your colleagues. Acknowledge the community responsibility,which is very important for the integrity of the local, national and international network of computer users and computing resources. In other words, try to maintain healthy cooperation.

F. Be honest to yourself and to your customer. Take the help of your seniors whenever necessary. Try to avoid conflict of interest if there is any. Honesty is one of the most important quantities in business ethics.

G. Try to keep yourself updated with the latest trends and traditions that are taking place in the market about your business. For this, you may have to go through the training, study and information and experience sharing with your colleagues or seniors. If required, help others to improve their skills and performance. Be educated and educate others in your vicinity. 

H. Keep on collecting knowledge about the social and legal issues relating to computing environments. If required, communicate the changes to others and encourage them to adopt these new changes in the policies and laws for computer systems. This quality is known as social responsibility.

I. Be honest about the occurrences of the mistakes. Try to correct them in time. Never repeat the previous mistakes.Try to be consistent in maintaining good ethical standards and the best degree of professionalism while performing your duties. This is known as ethical responsibility

J. Allow individuals to inspect and correct personal information. Try to remove any wrong data associated with any individual. Be prompt in taking such decisions.

Do’s and Don’ts for an ethical culture for computer professionals

Do’s:

a)The Internet is a huge source of authentic and accurate information. Make use of this 
facility to explore and enhance your knowledge.

b) Do use the Internet to communicate good and important messages.

c)Do use the internet to visit web sites which will enrich your knowledge.

d)In a computer network, talk to ‘strangers’ with utmost care.

e)Do respect the privacy of others while you are on the net.

f) ‘Download’ programs or software from the net with utmost care.

g)Always make use of a licensed antivirus program, properly installed on your computer.

h)Use the Internet to learn more and more about the world and the incidents happening in 
the world around you

Don’ts:

a) Don’t give your internet account password, computers / systems password to anyone. 
Passwords are meant to protect your computer and the data in your computer.

b) Don’t answer any messages which you feel are improper, threatening or which make 
you feel uncomfortable.

c) Don’t arrange to meet any unauthorized person with whom you had a meeting on the 
net.

d) Don’t give any personal information such as your family’s address, phone numbers, 
credit card numbers and calling card numbers to any unknown person on a computer 
network.

e) Don’t try to break into computers. It’s a crime. It’s an invasion of privacy. Computers 
often contain certain sensitive information. Don’t try to access it, if it is not related to 
you.

f) Don’t try to use any authentic software without the permission of the owner, i.e., don’t 
use any pirated software. Don’t download it from the net.

g) Don’t make duplication of any copyrighted material such as books or magazines 
without the permission of the author or publisher.

At the end of the explanation, have each participant state their learning from the session and 

what precaution do they promise to take with regard to cyber laws, morals and ethics. 

Challenges of Cyber Crime:

People are unaware of their cyber rights-
The Cybercrime usually happen with illiterate people around the world who are unaware about their cyber rights implemented by the government of that particular country.
 
Anonymity-

Those who Commit cyber crime are anonymous for us so we cannot do anything to that person.
 
Less numbers of case registered-

Every country in the world faces the challenge of cyber crime and the rate of cyber crime is increasing day by day because the people who even don’t register a case of cyber crime and this is major challenge for us as well as for authorities as well.
 
 Mostly committed by well educated people-

Committing a cyber crime is not a cup of tea for every individual. The person who commits cyber crime is a very technical person so he knows how to commit the crime and not get caught by the authorities. 
 
No harsh punishment-

In Cyber crime there is no harsh punishment in every cases. But there is harsh punishment in some cases like when somebody commits cyber terrorism in that case there is harsh punishment for that individual. But in other cases there is no harsh punishment so this factor also gives encouragement to that person who commits cyber crime.

 

Prevention of Cyber Crime: 

Below are some points by means of which we can prevent cyber crime: 

1. Use strong password – 

Maintain different password and username combinations for each account and resist the temptation to write them down. Weak passwords can be easily cracked using certain attacking methods like Brute force attack, Rainbow table attack etc, So make them complex. That means combination of letters, numbers and special characters.
 
2. Use trusted antivirus in devices –

Always use trustworthy and highly advanced antivirus software in mobile and personal computers. This leads to the prevention of different virus attack on devices. 
 
3. Keep social media private –
Always keep your social media accounts data privacy only to your friends. Also make sure only to make friends who are known to you. 
 
4. Keep your device software updated –

Whenever you get the updates of the system software update it at the same time because sometimes the previous version can be easily attacked. 
 5. Use secure network –

Public Wi-Fi are vulnerable. Avoid conducting financial or corporate transactions on these networks.
 
6. Never open attachments in spam emails –

A computer get infected by malware attacks and other forms of cybercrime is via email attachments in spam emails. Never open an attachment from a sender you do not know.

7. Software should be updated – 

Operating system should be updated regularly when it comes to internet security. This can become a potential threat when cybercriminals exploit flaws in the system.
Cyber Law Trends

Cyber law is increasing in importance every single year. This is because cybercrime is increasing. To fight these crimes, there have been recent trends in cyber law. These trends include the following:
  • New and more stringent regulations.
  • Reinforcing current laws.
  • Increased awareness of privacy issues.
  • Cloud computing.
  • How virtual currency might be vulnerable to crime.
  • Usage of data analytics.
Creating awareness of these issues will be a primary focus of governments and cyber law agencies in the very near future. India, for instance, funded cyber trend research projects in both 2013 and 2014. In addition, India holds an international conference related to cyber law every year since 2014. The goal of this conference is to promote awareness and international cooperation.

Cyber Law and Intellectual Property

An important part of cyber law is intellectual property. Intellectual property can include areas like inventions, literature, music, and businesses. It now includes digital items that are offered over the internet. IP rights related to cyber law generally fall into the following categories:

Copyright. This is the main form of IP cyber law. Copyrights provide protection to almost any piece of IP you can transmit over the internet. This can include books, music, movies, blogs, and much more.

Patents.

 

Patents are generally used to protect an invention. These are used on the internet for two main reasons. The first is for new software. The second is for new online business methods.

Trademarks/Service Marks. 

Trademarks and service marks are used the same online as they are in the real world. Trademarks will be used for websites. Service marks are used for websites that provide services.

Trade Secrets. 

Trade secret laws are used to protect multiple forms of IP. This includes formulas, patterns, and processes. Online businesses can use trade secret protections for many reasons. However, it does not prevent reverse engineering.

Domain Disputes. 

This is related to trademarks. Specifically, domain disputes are about who owns a web address. For instance, the person who runs a website may not be the person who owns it. Additionally, because domains are cheap, some people buy multiple domains hoping for a big payday.

Contracts. 

Most people don't think contracts apply online. This is not the case. For example, when you register for a website, you usually have to agree to terms of service. This is a contract.

Privacy. 

Online businesses are required to protect their customer's privacy. The specific law can depend on your industry. These laws become more important as more and more information is transmitted over the internet.

Employment. 

Some employee contract terms are linked to cyber law. This is especially true with non-disclosure and non-compete clauses. These two clauses are now often written to include the internet. It can also include how employees use their company email or other digital resources.

CYBER LAWS Session objectives

  1.  Countering cyber crimes
  2.  Software piracy
  3.  Code of ethics - Dos and Don’ts
 It should be realized that cyber crime is a problem which influences the entire world and not just a few 
countries. Efforts are being made internationally to form a global strategy to counter cyber crime.

 Copyright

Copyright is an intellectual property right attached to original works in which the right 
subsists with it. Copyright is a form of protection provided by the law to the authors of 
original works of authorship including literacy, dramatic, musical, and artistic and certain 
other intellectual works. This protection is available to both published and unpublished 
works. A copyright law is useful for authorship determination, duration of protection and 
requirements for transfers of rights to others.

 Security
Security is an organizational concern; a business needs safeguards that protect computer 
systems and data from damage or unlawful use.

 Privacy
Privacy is an individual concern; people need assurance that their personal information 
such as employment and credit history will be used properly. 

 Control
Controls are policies, procedures, tools and techniques designed to prevent errors in data, software and systems. Access privileges, input authorization, data validations, documentation, fire alarms, training, effective communications are certain controls.

 Digital Signature
A digital signature means authentication of any electronic record by a subscriber by 
means of an electronic method or procedure. To secure data on the internet, a digital 
signature is used. It is unique to the subscriber who is affixing it so that it can be used to 
identify such subscribers. It is linked to the electronic record to which it relates in such a 
manner that if the electronic record is altered, the digital signature would be invalidated. 
A digital signature uses an encryption tool to send the message that is unreadable, until 
the expected recipient uses their private key to decrypt the message.

 Public Key and Private Key
A public key means the key of a key pair used to verify a digital signature and listed in a 
digital signature certificate. A private key means the key of a key pair used to create a 
digital signature.

2) Cyber law
Cyber law refers to all the legal and regulatory aspects of the Internet and the World Wide 
Web. Cyber space is governed by a system of laws and regulations called cyber law. Cyber 
law is needed because today millions of people are using the internet all over the world. 
Due to global communication, the Internet is misused for criminal activities which require 
regulation. People with intelligence and bad intensions are misusing the Internet.

3) Software piracy
Software piracy is the unauthorized copying or distribution of copyrighted software. 
Software piracy can be done by copying, downloading, sharing, selling or installing 
multiple copies of software onto personal or work computers. If you make more copies of 
the software or install the software more times than the license permits, upload software 
code to a website so that others can download and use it, share software license codes or 
activation keys or in some cases, share your user ID and password for a web-based 
software application (‘cloud’ computing), you are pirating software and breaking the law.
Examples of software piracy include:

 Distributing software or mobile apps from the Internet in a manner that violates the 
license terms

 Buying a single copy of a software program and installing it on multiple devices
without authorization 

 Making and/or sharing copies of installation CDs

 Sharing the login credentials (without authorization) used to access a web-based 
software application (“Software as a Service”)

When you pay for software, you are typically purchasing a license to use it instead of 
purchasing the software program itself. Creating a successful software product and enhancing 
its features on an ongoing basis requires a significant investment of time and resources, 
whether the manufacturer is a large corporation or a start-up app developer. In the U.S., all 
software including open source code is considered copyrighted intellectual property (IP). 


Licensing models that developers choose to apply to their software can vary widely. Ultimately, 
these agreements and the copyright laws that protect software ensure that innovative 
companies can continue to create and release new and more useful software into the 
marketplace, which in turn benefits the artists, manufacturers, publishers, entrepreneurs and
others who depend on these products to run their businesses every day.
Ultimately, remember that the price you pay to obtain “traditionally” licensed software from a 
legitimate retailer covers your access to the software, product support, updates and security 
patches, while respecting the rights of the people who invest their time, effort and resources to 
bring these business-critical products to the market.

4) Code of Ethics 
Today, in computer and network systems, computer professionals and users have a 
responsibility to provide a standard of work and assure security, privacy and control in their 
product or services offered to the society. With such responsibilities, it requires that all 
computer users and system administrators must understand the norms (rules) and principles 
applied to the task.

A code of ethics supplies these norms and principles. It is a way of setting standards such as 
commitments, responsibilities and requirements of members within the computing 
environment.


Defamation. Slander and libel law has also needed updating because of the internet. Proving defamation was not altered substantially, but it now includes the internet.

Data Retention. Handling data is a primary concern in the internet age. An area where this has become a big issue is in terms of litigation. In lawsuits, it is now common to request electronic records and physical records. However, there are no current laws that require keeping electronic records forever. This is not true for physical records.

Jurisdiction. Jurisdiction is a key part of court cases. Cybercrime has complicated this issue. If a cybercriminal is located in Minnesota and their victim is located in North Carolina, which state has jurisdiction? Different states have different rules about this issue. Also, it can depend on in what court, federal or state, a case was filed.

Protecting IP can be difficult over the internet. An example of this would be the popularity of pirated movies and music. Each business that relies on the internet needs to develop strategies for protecting their IP. Governments can also take part in this process. In 1999, India did just this by updating their IP laws.

Cyber Security Strategies
Besides understanding cyber law, organizations must build cybersecurity strategies. Cybersecurity strategies must cover the following areas:

Ecosystem. A strong ecosystem helps prevent cybercrime. Your ecosystem includes three areas—automation, interoperability, and authentication. A strong system can prevent cyberattacks like malware, attrition, hacking, insider attacks, and equipment theft.

Framework. An assurance framework is a strategy for complying with security standards. This allows updates to infrastructure. It also allows governments and businesses to work together in what's known as "enabling and endorsing'.

Open Standards. Open standards lead to improved security against cybercrime. They allow business and individuals to easily use proper security. Open standards can also improve economic growth and new technology development.

Strengthening Regulation. This speaks directly to cyber law. Governments can work to improve this legal area. They can also found agencies to handle cyber law and cybercrime. Other parts of this strategy include promoting cybersecurity, proving education and training, working with private and public organizations, and implementing new security technology.

IT Mechanisms. There are many useful IT mechanisms/measures. Promoting these mechanisms is a great way to fight cybercrime. These measures include end-to-end, association-oriented, link-oriented, and data encryption.

E-Governance. E-governance is the ability to provide services over the internet. Unfortunately, e-governance is overlooked in many countries. Developing this technology is an important part of cyber law.

Infrastructure. Protecting infrastructure is one of the most important parts of cybersecurity. This includes the electrical grid and data transmission lines. Outdated infrastructure is vulnerable to cybercrime.

Mitigating Risk
The purpose of cyber law is to reduce risk. This can be done in several ways. Some of the most effective risk reduction strategies of cyber law include the following:

  • Cybersecurity Research and Development.
  • Threat Intelligence.
  • Improved Firewalls.
  • The Use of Protocols and Algorithms.
  • Authentication.
  • Focusing on Cloud and Mobile Security.
  • Cyber Forensics.
Another way cyber law can prevent cybercrime is by protecting the supply chain. Interruptions in the supply chain pose big security risks. This is especially true when equipment is allowed to be altered. Protecting the supply chain is key in preventing cybercrime.

Human resource departments can also reduce risk. There are three major ways to do this:

  • Realizing employees may be security risks.
  • Promoting ethical and realistic security mechanisms.
  • Recognizing employees that may be risks.
  • Promoting awareness.
Information sharing is also a key risk-reduction strategy. The best way to do this is with mandatory reporting. When a business is a victim of cybercrime, reporting it right away can reduce further threats. The U.S. promoted this with the Cybersecurity Information Sharing Act of 2014 (CISA).

Lastly, businesses can use a strong security framework. A good framework has three parts:

The Core.  These are activities that allow business to identify, protect, detect, respond, and recover from cyber threats.

Implementation Tiers. This describes how advanced a business's security system is. The tiers are Partial, Risk-Informed, Repeatable, and Adaptive. Businesses should strive for the Adaptive tier.

Framework Profile. This is a database where businesses record information about their strategies. This can include concerns and plans for new cybersecurity.

Network Security
Every network needs advanced security. This includes home networks. The most effective way to improve network security is by using the right technology. Network security technology includes the following:

Active Devices. Active devices help a network deal with too much traffic. They also prevent unauthorized traffic. These devices can include either software based or hardware based firewalls, antivirus devices or software, and content filtering devices.

Passive Devices. The most common preventive device is an intrusion detection device. These devices help to recognize unwanted internet traffic.

Preventative Devices. Many devices are focused on preventing network threats. These are called preventative devices. These devices can include network scanners and penetration testers.

Unified Threat Management. These are complete security devices. They can include content filtration, firewall technology, and web caching.

New Cyber Laws
Technology is constantly updating. This means that laws must also be constantly updated. Although U.S. law has remained the same for a long time, five laws were passed in 2014:

  • National Cybersecurity Protection Act (NCPA).
  • Cybersecurity Enhancement Act of 2014 (CEA).
  • Federal Information System Modernization Act of 2014 (FISMA 2014).
  • Cybersecurity Workforce Assessment Act (CWWA).
  • Border Patrol Agent Pay Reform Act (BPAPRA).
  • Most of these laws were meant to update existing legislation. FISMA 2014 updated the framework for security controls. NCPA was meant for information sharing between the private sector and the government.

The CEA was one of the most important bills. It may affect private organizations. This is because it promotes developing voluntary cybersecurity standards. This law strengthens the informal mission of the National Institute of Standards and Technology (NIST). The CEA also covers areas once covered by the Federal Financial Institutions Examination Council (FFIEC).

Both the NIST and FFIEC were informal standards. The CEA is a law and more binding. This is particularly useful for resolving disputes resulting from cybercrimes. Businesses need to understand the rules of the CEA.

Cyber Law Business Consideration
The main thing a business needs to understand is their website. A business's website is a large asset. It is also very vulnerable to cybercrime. There are a few issues a business must consider when it comes to their website:

  • Who will operate the website?
  • Will it be operated on site or off site?
  • What security measures will be employed?
  • How will email be used, and how will privacy be protected?
  • It's also important that businesses monitor their IP. A good way to do this is with customer review websites. These sites can both help you identify areas for improvement and can show you if your IP is being used without your permission.

When Customers Use Computers
An important part of complying with cyber law is protecting your customer's personal information. This is true even if your business doesn't have a website.

Many customers make use of online review sites to explain their satisfaction with a company. You can use these sites two ways. First, you can gauge customer satisfaction and identify areas where you can improve. Second, you can use them to see if other businesses are using your name or trademark or if someone is making untrue statements that could harm your business. Either of these issues is eligible for a lawsuit.

Before committing to a business, many customers check the Better Business Bureau (BBB). You should consider joining the BBB. Becoming a BBB member allows customers to trust your company and makes you eligible to use the BBB seal. Potential customers can also find information about your company on the BBB website. If a customer can't find your business on the BBB website, it may cause them to avoid working with your company.

It's also a good idea to make your business's privacy and security policies available to your customers. By allowing them to read these policies, you are proving your dedication to protecting their personal and financial information when they use your website.

Cyber Law Terms and Laws
There are three main terms that people need to know related to cyber law.:

Information Technology Law. These laws refer to digital information. It describes how this information is gathered, stored, and transmitted.
Cyber Law/Internet Law.  These laws cover usage of the internet. This is a newer legal area. Many laws can be undefined and vague.
Computer Law. This covers a large legal area. It includes both the internet and laws related to computer IP.

There have been many countries that have tried to fight cybercrime with cyber laws:

Computer Misuse Act 1990 (Great Britain). This law is mostly focused on data and computer systems. It includes three sections. Section 1 focuses on the unauthorized use of a computer (hacking). Section 2 covers situations where a Section 1 violation has occurred and further offenses are likely. Section 3 is for when a computer is altered illegally. This is usually due to a virus or denial of service act.

IT Act of 2000 (India).  This act is focused on information technology. This law both outlines offenses like hacking and trojan attacks, as well as possible solutions. One section outlines the use of digital signatures to improve cybersecurity. Some offenses can compound. This increases their potential punishment.

The Middle East and Asia. Countries across these regions use combinations of cyber laws. In certain countries, these laws are used to prevent citizens from accessing certain information.

Other laws related to cyber law that have been passed by countries around the world include electronic signature laws, information technology guidelines, and information technology laws.

Cyber law has also been used to create privacy. This is particularly true in the United States. U.S. laws that have been used to establish internet privacy include the following:

  • Warren and Brandeis.
  • Reasonable Expectation of Privacy Test.
  • Privacy Act of 1974.
  • Foreign Intelligence Surveillance Act of 1978.
  • Electronic Communication Privacy Act.
  • Driver's Privacy Protection Act.
  • Gramm-Leach-Bliley Act.
  • Homeland Security Act.
  • Intelligence Reform and Terrorism Prevention Act.
  • Writing and Enforcing Online Laws
  • The increased use of the internet has changed how older laws need to be enforced. A good example of this is copyright law and the ability for individuals to illegally download music, movies, books, and other forms of intellectual property.

The obstacle in enforcing these laws is that it is hard to trace illegal online activities to their source. Online criminals are often anonymous, and even if a crime can be traced, it is usually only linked to a computer and not a real-life person.

Another difficult is knowing what real world laws apply online. An example of this is internet transactions that take place in multiple countries. For instance, if someone in the USA sells an item to someone in the UK using a server that is located in Germany, the transaction may be regulated by the laws of all three countries.

Internet criminals have tried to take advantage of lax online law enforcement. For instance, over an eight-year period between 2000 and 2008, a company called HavenCo operated servers that were located on a navy platform. This platform had been declared a country and any servers running on the platform weren't subject to copyright laws.

The Digital Economy Act was written to address these issues, but ran into problems when it forced through British Parliament.

In addition to requiring methods for enforcing old laws, the internet also means that there is a need for new laws that cover new types of crimes like viruses and hacking.

A law meant to cover these sort of issues is the United Kingdom's Computer Misuse Act. The Computer Misuse Act criminalize any action that provides unauthorized access to a computer or damages the data that the computer contains.

However, every country has their own laws, which can complicate dealing with cybercrime. An example of this is Gary McKinnon. A British citizen, McKinnon hacked Unites States military computers. This opened the argument of whether he should face trial in his home country, the UK, or in the country where the crime was committed, the US.

Rights While Online

Another complicated issue in the internet age is how to handle personal rights. While online shopping has become common in the digital age, many shoppers aren't aware that they have the same right to return goods as they do when buying from a brick and mortar store. Also, most people don't understand the rules for how their personal information can and can't be used online.

There is so much confusion, in fact, that some users can be tricked by standard 'Terms of Use' agreement. GameStation, a popular online store, once added a line to their Terms and Conditions stating that users who accepted the agreement were required to give the store their 'immortal soul' as an April Fool's Day joke. None of the sites regular users noticed this addition.

Cyber Law FAQ
Are there Defined Cyber Laws?
Yes, although it is a new legal area. Governments are constantly working to craft new cyber laws. These new laws will address cybercrimes and protect individuals and organizations.

What Are Some Examples of Cybercrime?
There are many types of cybercrime. They can be against people, property, and the government. Cybercrimes can include things like harassment, stalking, and distributing illegal materials. Hacking and transmitting viruses are also cybercrimes. Vishing, which is a crime that involves VoIP systems, is another common cybercrime.

Can a Lawyer Help with Cyber Law?
Yes. The biggest benefit of having a lawyer is help complying with these laws. They can also help you plan strategies for protecting your digital IP. Hiring an attorney that understands cyber law is crucial when you're running a business over the internet.




  


MS Outlook is currently the most widespread e-mail client in corporate environments.  MS Outlook is a personal information manager which was introduced in 1997 by Microsoft. It was later included as a part of the MS Office  suite and is mainly an email client.


Let's start with Basics of outlook [PPT ]first Microsoft Outlook is the email client included with the Microsoft Office suite. 


 It is designed to operate as an independent personal information manager, as an Internet mail client, or in conjunction with the Microsoft Exchange Server for group scheduling, email, and task management. 


 Outlook allows you to send and receive email messages, manage your calendar, store names and numbers of your contacts, and track your tasks. However, even if you use Outlook every day, you might not know some of the cool things it can do to help you be more productive.


 One of the biggest advantages of using MS Outlook is that it can serve the purpose of both, a stand-alone application and also a multi-user software. It can be used by an individual as an email client-server and also by an organization which requires shared features like a mailbox, calendar, appointments, etc. Initially, the program was just added as a part of the Office suite which could be installed in a computer system. Later on, various other versions were released which made Outlook compatible with mobile phones, laptops and other android and Mac devices.

 

 

Now we have to enter into the Intermediate level of Outlook 

 

      Outlook 97 Released on January 16, 1997. It had replaced the existing Microsoft’s email clients including Exchange Client, Schedule+ etc.


     Outlook 98. Released on June 21, 1998. It was freely distributed with books and magazines to cope up with the latest Internet standard Involved usage of HTML mail


     Outlook 2002. Released on May 31, 2001 Introduced in Office XP      Brought in new features like coloured tables, hyperlinks, autocomplete and MSN messenger integration


    Outlook 2003. Released on June 27, 1999. Desktop alerts for emails were introduced. Filtering of mails to skip spam. Expandable distribution list. Unicode support


   Outlook 2007, Released on January 27, 2007. Feature to preview the attachments was introduced. Excel, Word, PowerPoint files were now supported by Outlook. Features like calendar sharing, export of PDF and XLS files, unified messaging support, etc. were also added to the application.


Outlook 2010. Released on July 15, 2010, Group messages could now be shared. The feature of social connector, where the files could be shared on social networking platforms was introduced

Outlook 2013, . Released on January 29, 2013. A reminder to ask the user to attach files with mail was introduced. People hub, Compression of Outlook data file. Improvement in start up performances

Outlook 2016. Released on September 22, 2015. Almost similar features, only cloud computing was added. 

Outlook 2019. Released on September 24, 2018. Filtering and sorting of mails became easier. Supported a focussed inbox. Multiple time zones could be added.

Apart from these, versions which incorporated mobile (android and mac) versions were also released. This move was extremely appreciated as for Organisations it acted as a benefit. They also came up with some commercial features which became more handy and easily accessible using the mobile phone version.

For those are not much familiar with Computer Knowledge and wish to learn more about the various programs, applications and terms related to Computer Awareness, refer to the links given below:

Functions of MS Outlook

This program of the MS Office suite allows you to send emails, arrange meetings, give appointments, etc. can be used by a single individual or a group of people. 

 

The major functions of MS Outlook have, however, been discussed in detail below:

It makes communication easy and sending emails is just a click away. Various attachments in different formats can be added to these mails

Since it is an organising and managing application, it provides features to set up appointments and meeting using calendar and setting up reminders for the same

What are the limitations of using MS Outlook?

Ans. Following are the limitations of using MS Outlook:

  • It is less flexible.
  • Information is saved on the Microsoft server.
  • There is a limitation to the number of emails that can be sent per day
  • Financial Management 
  • Cost issues





WELCOME TO MICROSOFT OUTLOOK



Enjoy this Video first
  • With Microsoft Outlook on your PC, Mac or mobile device, you can organize email, share your calendar, schedule meetings, and share files.
  • Outlook can be used as a standalone personal email software, and business customers can use Outlook as multiuser software.
  • MS Outlook is a personal information manager which was introduced in 1997 by Microsoft.
  • Microsoft Outlook is an application you pay for and install on your device.

What is Microsoft Outlook?
Microsoft Outlook is a personal information manager from Microsoft designed to help users focus on what’s important with a clear view of email, calendars, and contacts. Microsoft Outlook enables users to communicate more effectively by connecting efficiently with others. Available as a native mobile app for iOS, Android, and Windows devices, Microsoft Outlook gives users the flexibility to manage their inbox anytime, anywhere, via tablet and mobile devices.










Key benefits of using Microsoft Outlook
Manage calendars, share available meeting times, schedule meetings, and get reminders, all from a centralized platform.
Create groups to discuss, collaborate, and share files and notes with others.
Outlook provides keyword and people suggestions as users type, in order to surface recent search queries.
Shared calendars allow users to schedule meetings and respond to invitations easily.
Work with and share Office attachments from a computer or from the cloud.


Typical customers : 

Freelancers
Small businesses
Mid size businesses
Large enterprises
Platforms supported




E-mail Basics














About MS outlook  



Social media are interactive technologies that facilitate the creation and sharing of information, ideas, interests, and other forms of expression through virtual communities and networks. 




Topics to be covered in Social Media computing skills

Social Media Marketing is also one of the most important aspects or sub-topics of digital marketing.
Businesses can utilize all of the major social media platforms (Facebook, Twitter, Instagram, Youtube) to connect with the audience and convince them to a call to action.
The majority of traffic is supposedly coming from social media, hence maintaining a good social media strategy is important.
Social Media Marketing covers all these aspects and trains you to optimize your social media platforms for better traffic and revenue generation.
The major sub-topics covered under the Social Media Marketing are:
Definition of Social Media Marketing & social media
Blogging
Blogging Article Marketing
Guest Blogging
Social Networking
Video Creation & Sharing
Use of Different Social Media Platforms
Content Creation
Content Strategy
Content Marketing Tools
Social media is basically the most important component of Digital Marketing. Let's first understand first that what exactly is Digital Marketing.

Digital marketing is the act of promoting products and services through digital channels, such as social media, SEO, email, and mobile apps. Any form of marketing that involves electronic devices is considered digital marketing.

It can be done online and offline.

Digital marketing definition

Digital marketing, or online marketing, refers to marketing activities targeting consumers using digital channels. The digital marketing definition includes all online marketing tactics implemented through digital channels to achieve business and marketing goals. There are many digital marketing channels, including:

Social media marketing: Social media marketing helps companies increase brand awareness, engage with customers, and direct traffic to the company website. 

Content marketing: Content marketing helps attract, nurture, inform, and entertain potential customers to earn their trust and loyalty.

Search engine optimization: Search engine optimization (SEO) increases a website's visibility in search results, bringing in more traffic and conversions.
Email marketing: Email marketing is one of the best ways to attract and nurture new and existing customers.

Video marketing: YouTube alone reaches more U.S. adults aged 18-49 than any cable network. Video marketing is an increasingly popular digital marketing channel to provide content that engages customers and ranks high on search engine pages.

Mobile marketing: Mobile marketing includes mobile banner ads, SMS messaging, push notifications, in-app ads, QR codes, and more. 
Influencer marketing: Influencer marketing entails sponsoring influencers to promote a brand and increase the reach of your product message.

Partnerships and affiliate marketing: In partnerships and affiliate marketing, you come to an agreement with a software or service provider and share/earn commission for selling and attracting new customers. 
Search engine marketing: Search engine marketing, e.g., Google pay-per-click ads, is an online advertising model used to drive traffic to websites and sales pages. 
One big advantage of digital marketing over traditional marketing is the ability to gather and analyze data in real-time. This ensures digital marketing teams can make data-driven decisions to achieve their business and marketing goals.

Digital marketing benefits
Digital marketing should be an integral part of any business marketing strategy for many reasons. Benefits include:

  • It scales easily.
  • It is cost-effective. 
  • It provides a direct line to engage with your customers.
  • Results can be quickly and transparently measured and analyzed.
  • It provides an avenue for you to learn from your customers, market, and other industry players.                                                                          Digital marketing examples:

1) Uber
The ride-sharing app Uber has disrupted the taxi services industry since it launched its first ride in 2010. Uber uses Facebook, Instagram, and Twitter as its main digital marketing channels, using social media to engage with customers and propagate positive, inclusive messaging about connectivity and social awareness. By connecting its messaging to cultural issues, customers feel a greater sense of connection to the brand.
2) Netflix
The online movie streaming app Netflix has expanded into 190 countries worldwide. Netflix uses Facebook, Twitter, Pinterest, YouTube, and Instagram and actively engages with customers across its social media channels. The phrase "Netflix and chill" has become a popular part of global pop culture. The brand creates relatable, culturally relevant, and entertaining social content, sometimes crowdsourcing product improvement decisions from customers using polls. 


B2B digital marketing

B2B digital marketing's primary goal is to drive high-quality leads to B2B sales teams, ensuring higher conversion rates. B2B buying cycles are often lengthy since the products/services are more complex, expensive, and require the involvement of more people.

For example, the same product may be sold across different industries or verticals, and every account will have different stakeholders who often engage on multiple channels. The amount of coordination needed among lines of businesses is high.

Channels commonly used by B2B digital marketing teams are business-focused, such as email, webcasts, video, LinkedIn, and Twitter.

B2C digital marketing

B2C digital marketing's primary goal is to get potential customers and customers to discover and engage with your brand by increasing your website's traffic and increasing your content's visibility. B2C digital marketing teams should choose consumer-focused channels, where B2C buyers are more likely to discover and engage with your brand.

The walls between B2C and B2B are breaking down. The delightful experiences people have had with B2C are making them expect more of the same from B2B, but really, you are always marketing to people, regardless of whether it is B2B or B2C. You could say that it is now B2ME.

Digital marketing: B2B vs B2C

The ultimate goal of digital marketing is to drive a customer or buyer towards a purchase. Digital marketing lets both B2B and B2C marketing teams engage with a broader audience than possible through more traditional marketing tactics. They can also target more relevant potential customers, boosting Marketing ROI.

Social media marketing
Social media is a great way to reach a specific, targeted audience and connect directly with customers, potential customers, and partners. Which social media platform(s) you use depends on who you want to target.

 Facebook is still the largest social media platform worldwide. Twitter is still popular with B2B buyers. Instagram and TikTok are incredibly popular with millennial and Gen Z consumers, and LinkedIn is a great place to connect with B2B buyers in the early stages of the buying cycle.

Every social media platform features different types of content, but all are very video/image focused. So, as you create content, always keep in mind how you want to distribute it through social media, and then adjust accordingly.

Digital marketing vs. digital media
Digital marketing is a set of activities or tactics. Digital media refers to a set of forms, formats, and platforms that include:
  • Emails
  • SMS 
  • In-app/push notifications
  • Social media (Instagram, TikTok, LinkedIn, Facebook, Snapchat, Twitter, Pinterest)
  • Audio (Spotify, Pandora, Apple Music)
  • Digital advertising (banner ads, pop-up ads)
  • Video (YouTube, Netflix, Hulu)                                                                    Digital marketers use digital media to connect with customers. so, digital marketing is the strategy and digital media is the means.
What is Blogging?

Blogging is a process to write a Blog.

A person who writes a blog or a weblog is a blogger. Blogging is the act of posting content on a blog.

The main purpose of blog is to convey messages about events, announcements,  needs, review etc. Blogs are usually managed using  a web browser and this requires active internet connection.

Blog 

A blog is a  website or a web page,in which an individual records opinion links to other sites on regular basis. A blog content is written frequently and added in a chronological order. 

It is written online and visible to\everyone. A typical blog combines text,images and links to other blogs, web pages and other media related to its topic.In education, blogs can be used as instructional resources. 

These blogs are referred to as edublogs. The entries of blog are  also known as posts.A person who writes a blog or a weblog is known as blogger. Blogging is the act of posting content on a blog.

There are some popular websites which offer blog service as follows 

  • Joomla 
  •  WordPress.com 
  •  Drupal ! Blogger 
  •  Tumblr ! Weebly 
  • Blogger.com

Video marketing

Video is one of the most powerful digital marketing channels available. People love video. They watch videos for fun and research, and they share videos. In fact, YouTube reported more than two billion monthly logged-in viewers. Both B2B buyers and B2C consumers make buying decisions thanks to video.

Video marketing builds brand awareness, boosts digital traffic, and increases conversion rates. 

Sharing video is the key to getting more eyes on your content. That’s why you’ll want to leverage third-party sites, such as YouTube, and promote videos on your website and social media channels. Encourage others to share your videos.

Keep your videos short and to the point. Attention spans are short, so the key is to provide great content in an engaging manner.




Content marketing. This digital marketing strategy tries to reach customers through content. Content refers to something an organization produces and publishes on a website with the intent to promote it through other marketing types, such as social media or email.

Content marketing involves the publishing and distribution of text, video or audio materials to customers online. Blogs, videos, images and podcasts are common ways for businesses to engage in content marketing. So Content marketing helps attract, nurture, inform, and entertain potential customers to earn their trust and loyalty.

Examples of marketing content and tactics include the following:

  • Blog posts
  • photos
  • infographics
  • videos
  • podcasts
  • presentations
  • e-books
  • white papers
  • e-newsletters
  • webinars
  • search engine optimization or SEO
  • social media marketing

Conclusion:

Digital marketing is all about using digital platforms to reach customers. Below are some digital marketing basics to keep in mind.

Begin with research: Start with research to understand your customers and learn about their behaviors and where they hang out online. 

Be intentional: Begin on a select few platforms where your customers are most active. Invest your time and resources on the platforms that bring the most gain instead of spreading your resources thin. 

Provide value through content: Use the 80/20 rule to create and share content. 80% of your efforts should be focused on providing value to your customers, and 20% focused on sharing information about your business and products. 

Review performance: Monitor marketing campaign performance across your various marketing channels using digital marketing analytics software. 

Stay nimble: Update your marketing technology and techniques often, and use marketing templates to plan, manage, and execute marketing projects. 

Be consistent: Maintain consistency in your brand messaging and design to make it easy for customers to recognize your brand over time. 
Using the digital marketing examples and tips shared above, you're well on your way to creating successful digital marketing plans and campaigns that bring your organization closer to achieving its goals.

Digital marketing KPIs

Digital marketing key performance indicators (KPIs) are used to measure marketing campaign performance. Digital marketers can use a number of KPIs to track results. As you work through your strategy, determining which specific digital marketing KPIs to use makes it easier to determine targets and goals and to measure campaign performance, including the following data:

Returning visitors to website. Indicates engagement because visitors are coming back to your website/landing page to consume more content or take a specific action.
First visit. Understand how people are finding your website and how engaged they are once they do.
Web traffic sources. Shows how people are finding your website/landing page.

Total visits. The number of single browsing sessions by individual visitors to your         site.
Total unique visits. The number of people who have visited your website/landing page.

Click-through rate (CTR). The percentage of people who clicked on a CTA or link.

Average time on page. The average amount of time all users spend on a single page.

Marketing ROI (return on investment). How much revenue a marketing campaign is earning compared to the cost of running that campaign.

Which type of digital marketing is best?

Digital marketing works for every business and all industries, but there is no one-size-fits-all approach. Different companies need to use different digital tactics to achieve their goals. The best tactics depend on several factors, such as your marketing team's size, budget, target audience, and business goals.

Small-to-medium businesses (SMBs) may develop organic SEO strategies, social media strategies, email marketing campaigns, and blogging calendars since these tactics require little to no investment.

Larger companies usually expand into paid programs to deliver on broader business goals. These tactics could include syndicating digital assets, producing webinars/webcasts, focusing on account-based marketing (ABM), and investing in paid media or PPC marketing.


Future of digital marketing 

It all started with mobile, which has impacted digital marketing in a huge way. Consumer behavior has changed with the times. Customers now expect more from their brands, and micromoments count. What is a micromoment? It involves a consumer interacting with a brand at the touch of a button and in real time. The challenge for digital marketers now lies in intersecting people at micromoments with relevant marketing messaging that adds to their lives rather than disrupting them.

Customers now expect a unique, connected, and seamless experience across all channels and instant gratification. You only have a micromoment to capture their attention and hold it with a strong message and a delightful, engaging experience. If you don’t, they will move on to the next offer. This has made the old methods of marketing obsolete.

Modern marketers must adopt a mobile-first approach with their global audiences. You must keep in in mind that customers:

Desire to all be treated uniquely.

Are in charge. They decide when, where, and how they’ll interact with your brand. They want a frictionless experience and to be able to start a conversation on any channel, which can carry seamlessly onto another channel if they choose.
Wish to be served in the least amount of time possible but with the most convenience.
The walls between B2C and B2B are breaking down. The delightful experiences people have had with B2C are making them expect more of the same from B2B, but really, you are always marketing to people, regardless of whether it is B2B or B2C. You could say that it is now B2ME.
This might be the future, but the future is now. It is happening right in front of everyone’s eyes. You cannot afford to be left behind. In fact, you best get ahead of the curve.

But what actions can a smart, savvy digital marketer take?

Adopt a data-first mindset. Having more data fluidity and making better use of the data you have will allow you to better understand customers and anticipate their needs and not waste even an iota of their time.

Push automation and intelligence to the max. You’ll need marketing automation to capture a huge amount of data and serve customers in real time.

You must treat every customer uniquely, differently, and appropriately. You need to take the intelligence you derive from micromoments and stitch them together for a fuller picture of your customer. That’s how you create a more connected experience.

Embrace omnichannel fluidity. You have to be ready to engage with customers across any channel and in real time and keep up with them if they go from channel to channel.

Content is the KING of each digital marketing effort or social media activity.


About Teleconferencing

Definition: A two-way telecommunications service that allows live video images and speech of participants in a conference to be transmitted between two or more locations. Videoconferencing services generally require digital transmission.









What Is Teleconferencing?
  • Teleconferencing is a generic term used to describe electronic communication between two or more individuals. Traditionally, teleconferencing involved a conference between two or more people, held over the telephone. The individuals typically used a speaker telephone on both ends, allowing for synchronous communication.
  • Now!. A teleconference is a live audio or audiovisual meetings with two or more participants. With the ability to teleconference, remote teams in an organization can collaborate and communicate, even when geographically dispersed. The process involves technology more sophisticated than a simple two-way phone connection.
  • Web conferencing

    Web conferencing is a broader term that encapsulates all types of audio and video interaction that happens over the internet. Audio conferencing, video conferencing, screen sharing, and webinars are all generally referred to as web conferencing.

    When to use web conferencing:

    • 1. Business-wide meetings
    • 2. Online events
    • 3. Training sessions



Video conferencing

Video conferencing refers to when two or more people connect over the internet and interact with live video and audio. Though this is a type of web conferencing, video conferencing usually refers to remote collaboration within a small group using real-time audio and video feed.

When to use video conferencing:

  • 1. Remote team meetings
  • 2. Personal video calls
  • 3. Feedback sessions





Key Questions on  Web Conference Tools

Q #1) What is Web Conferencing Software?

Answer: It is a platform that allows individuals to conduct meetings online, via video or audio. They are also known for their video conferencing capabilities.

Such tools are also ideal for triggering remote sessions for file sharing, VoIP, screen sharing, and instant messaging. This is a major reason these tools have become so integral to the functioning of businesses that harbor remote workforces.


Q #2) What is the most used web conferencing software?

Answer: The web conferencing software market today has become really crowded. As such, it can become really challenging to find web conferencing software that best caters to your specific requirements.


In hindsight, we would say that tools like Zoom and Skype are some of the most popular web conferencing software we have today. Their popularity, however, in no way serves as a testament to their competency.

Q #3) What is an example of a web conferencing tool?

Answer: As mentioned earlier, there are multiple web conferencing tools out there. The most prominent of the bunch are the ones recommended below:


  1. Zoho Meeting
  2. Zoom
  3. Whereby
  4. Livestorm
  5. Google Meet
Q #4) What are the types of web conferencing tools?

Answer: There are three major types of web conferencing tools.


They are as follows:

  • Web meeting
  • Webinar
  • Webcast

Q #5) What are the advantages of web conferencing?

Answer: Web conferencing has completely changed the world as we know it. That mostly has to do with the following benefits it offers:

  • Saves time in meetings.
  • No commute is necessary, thus reducing travel costs.
  • Remotely sharing resources like PDFs, presentations, and spreadsheets.
  • Increases work productivity.
  • Make meetings more engaging with the use of graphics.

Some popular known impressive tools for web conferencing:
  1. Zoho Meeting (Recommended)
  2. Livestorm
  3. Zoom
  4. Whereby
  5. Livestorm
  6. Google Hangouts
  7. Dialpad Meetings
  8. Slack
  9. Skype
  10. Google Meet
  11. Microsoft Teams
  12. TrueConf Online
  13. Lifesize
  14. FreeConference
  15. Facebook Live








IT system behind teleconferencing

  1. Personal computer
  2. Telephone lines or satellite hook-up
  3. Monitor
  4. Microphone
  5. Webcam
  6. Speakers
Effect of Teleconferencing on Business
  • Let all branches know what is going on.
  • Easy communication over long distance
  • Saves time, money, and energy.
  • Reduces face to face interactions.
Types of Teleconferencing

Teleconferences once described long-distance meetings held via speakerphone. While many customer support teams still rely on phone calls to assist clients, they have also begun to transition to other web-based teleconferencing services, such as:
1. Audio Conferencing
An audio conference only allows users to communicate by voice. Customer support teams can use the three-way calling feature on their mobile devices for audio conferences or leverage the more sophisticated features found on an audio conferencing platform. 

2. Video Teleconferencing
Video conference platforms have become increasingly popular as companies transition to remote, distributed teams. The internet platforms allow customer support or information technology teams to communicate with clients via synchronous audio and video. 

3. Electronic Whiteboards
While typically used to enhance distance learning, electronic whiteboards leverage visual data, audio, and video to create a low-cost online learning hub. 

4. Computer Teleconferencing 
Unlike audio or video teleconferencing, computer teleconferencing relies on written communication between two or more computers.

Why Is Teleconferencing Important for Customer Service?


Teleconferencing essential for customer service for various reasons, including: 

1. Cost-Effective Communication 
According to a study conducted by cloud-based web conference platform Lyte Spark, businesses located in the United Kingdom could save thousands each year by opting for online meeting services. 
Similarly, teleconferencing reduces customer service expenses by allowing support teams to provide real-time assistance from a remote location. Businesses can then minimize infrastructural expenditures and focus on product development, research, and efficient human resource utilization. 

2. Easy Scheduling
Many teleconferencing platforms include simplified scheduling tools, which allow clients to schedule convenient phone or computer-based customer service appointments. Clients can then sign on at a time that suits their schedules. At the same time, customer support teams can more effectively reduce wait times and improve customer satisfaction. 

3. Enhanced Integration
Both audio and video teleconferencing platforms often include integration features, such as calendar tools, screen sharing, and file-viewing modes. Customer support teams can then use the integrative tools to streamline service appointments, access customer data, and retrieve business information during support calls. 

4. Improved Collaboration
Unlike traditional two-way telephone conversations, web-based meeting platforms make collaboration a breeze. With this in mind, customer service teams can loop in information technology (IT) support, product experts, or management without leaving the video or audio conference. 

5. Advanced Security
Customer support teams can provide clients with one-time, personalized access codes that prevent unwanted viewers from joining their teleconference or accessing confidential data. 

Through teleconferencing, institutions are able to serve all clients equitably.
Use a telecommunications channel
Link people at multiple locations
Interactive to provide two-way communications
Dynamic to require users’ active participation

Benefits of using teleconferencing

1.Move Information – Not People
Electronic delivery is more efficient than physically moving people to a site, whether it is a faculty member or administrator.

2.Save Time
Content presented by one or many sources is received in many places simultaneously and instantly. Travel is reduced resulting in more productive time. Communication is improved and meetings are more efficient. It adds a competitive edge that face-to-face meetings do not.

3.Lower Costs
Costs (travel, meals, lodging) are reduced by keeping employees in the office, speeding up product development cycles, improving performance through frequent meetings with timely information.
4.Accessible

Through any origination site in the world. Larger Audiences: More people can attend. The larger the audience, the lower the cost per person.

5.Larger Audiences
More people can attend. The larger the audience, the lower cost per person.

6.Adaptable
Useful for business, associations, hospitals, and institutions to discuss, inform, train, educate or present.

7.Flexible
With a remote receive or transmit truck, a transmit or receive site can be located anywhere.

8.Security
Signals can be encrypted (scrambled) when it is necessary. Encryption prevents outside viewers.

9.Unity
Provides a shared sense of identity. People feel more a part of the group…more often. Individuals or groups at multiple locations can be linked frequently.

10.Timely
For time-critical information, sites can be linked quickly. An audio or point-to-point teleconference can be convened in three minutes.

11.Interactive
Dynamic; requires the user’s active participation. It enhances personal communication. When used well for learning, the interactivity will enhance the learning and the teaching experience.

Disadvantages of using teleconferencing

As you work your way up the corporate ladder, you might increasingly be asked to participate in meetings, and many of these may be conducted via the telephone. If you start your own business, travel expenses might make in-person meetings cost-prohibitive and teleconferencing a more viable option.

Body language, facial expressions and work samples you use to shine when communicating face to face won’t help you during teleconferences, so weigh the pros and cons of in-person meetings vs. teleconferencing, especially if you are selling a product, service or yourself.

1.Lack of Body Language
Teleconferencing doesn’t let you read other participants’ body language, which can give you clues as to whether you need to change your direction during a meeting. For example, if the person you’re meeting with crosses his arms, it might be a sign of defensiveness and that you are not connecting. Seeing this, you would be able to soften your message. Someone slouching or tapping their fingers can signal they are losing interest, letting you know to change the subject or finish your point. In a teleconferencing situation, you do not get these cues to make changes in your presentation.

2.Lack of Eye Contact
Eye contact is another key benefit you lose when teleconferencing (https://www.starlink.com/). Someone who looks down at the floor might be lying, giving you a clue not to take him at his word if you are interviewing him for a job or involved in a sales call. If someone’s eyes dart around the room, they might be bored. If you or your meeting partners absolutely can’t make an in-person meeting, ask about videoconferencing capabilities. Using the video cameras on our computers and the availability of low-cost and free video services such as Skype, it might be just as easy to organize a video meeting.

3.Interruptions
People who teleconference do so using landlines, cell phones and voiceover Internet protocol, or VOIP, phones. Plan on interruptions during telephone meetings when calls are dropped and Internet connections go dead. Many people attend teleconferences while driving, talking on cell phones that can create static or other noise as the user moves in and out of dead zones. Some people take advantage of teleconferences to stay at home that day, leading to crying babies, barking dogs or people at the door disrupting your call.

4.No Visual Presentation
The ability to share graphs, charts, photos, reports, drawings, videos, product samples and other visual messages is important to make a sale, whether you’re trying to get a customer to buy, co-workers to understand a new procedure or your boss to agree with a pitch you’re making. When organizing or attending a teleconference that would benefit from visuals, upload documents or videos to a company or personal website or email information to attendees before the meeting starts.

Disadvantages of teleconferencing staffing necessary learning time to adapt to technology technology may be expensive diminishes personal touch hearing issues No Visual Presentation Interruptions Lack of Eye contact Lack of body Language .


Sources : 

https://en.wikipedia.org/wiki/Teleconference
(https://www.zdnet.com/article/businesses-could-save-over-33000-per-year-by-video-conferencing-according-to-new-report/#:~:text=new%20report%20%7C%20ZDNet-,Businesses%20could%20save%20over%20%2433000%20per%20year%20by%20video%20conferencing,instead%20according%20to%20new%20research.)
(https://byjus.com/govt-exams/microsoft-office/)
(https://en.wikipedia.org/wiki/Telecommunications) 
What is Digital Marketing? Definition & Examples | Wrike Guide
What is digital marketing? | Oracle India
What is digital marketing? Everything you need to know | Definition from TechTarget
Free Digital Marketing Plan Template 2023 (smartinsights.com)
What Is Digital Marketing? (neilpatel.com)
The Who, What, Why, & How of Digital Marketing (hubspot.com)
What is Digital Marketing? (ama.org)






Share to FacebookShare to Pinterest

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

If you have any query or doubt, please let me know. I will try my level best to resolve the same at earliest.

Home
Subscribe to: Posts (Atom)

Resources That will Make You Better at IT, Education and specifically in Digital Marketing.: Build career in Medical coding in 2021

Resources That will Make You Better at IT, Education and specifically in Digital Marketing.: Build career in Medical coding in 2021 :  As He...

  • Resources That will Make You Better at IT, Education and specifically in Digital Marketing.: Build career in Medical coding in 2021
    Resources That will Make You Better at IT, Education and specifically in Digital Marketing.: Build career in Medical coding in 2021 :  As He...
  • Build career in Medical coding in 2021
     As HealthCare is an ever evolving sector in terms of innovation so IT aspirants can go for their career in Medical Coding this year. Nowada...
  • Digital Asset Management
    IT resources like file, folder, device, bandwidh or even information in either form (soft or hard) must be managed as an ASSET for future re...

Pages

  • Home
  • Operating Systems with Linux MCA- 105
  • Information System Management
  • PHD Course Work
  • Digital Marketing IPU

Followers

Search This Blog

QR Code

QR Code
Scan Here

Empower with DataGet

Contact Form

Name

Email *

Message *

tec

  • About us
  • Key Links
  • Timer
  • TISS Syllabus
  • Computing skills - Part - I
  • Computing Skills - Part - II
  • Digital Literacy - GE 5.1
  • IGNOU PGDIS MSEI-26
  • Online MCA - MCS-213 Software Engineering
  • Apply Digital Marketing on Educational system
  • Lab C-Language
  • Information Systems for Managers -MMPC8
  • System Analysis and Desigining -MCS-014
  • Object Oriented Software Engineering - MCA-104
  • Shake hand with us to apply Digital marketing on Education Sector
  • Marketing Analytics - TISS PGDM Sem-2
  • Fundamentals of e-commerce PGDCA - 203
  • Counseling Sheet
  • Training - Digital Marketing
  • JAVA Programming
  • Python Programming
  • Visual Basic 6.0
  • C-Language Programming
  • MYSQL
  • O-Level - NIELIT - National Institute of Electronics & Information Technology
  • MANGALAYATAN UNIVERSITY
  • IIT Bombay Courses
  • PNGRB- Petroleum and Natural Gas Regulatory Board पेट्रोलियम एवं प्राकृतिक गैस विनियामक बोर्ड
  • Cloud Computing and Virtualization
  • Excel VBA -Visual Basic for Application
  • IOT - Internet of Things
  • Machine Learning
  • Data Science Course
  • Tecnia

Google Meet Link:

https://meet.google.com/rfn-gzou-dvj

Email at : dataget00@gmail.com

For any issue, challenges or questions.

ZOOM Meeting Link

https://us04web.zoom.us/j/79933173975?pwd=RXMmmSbD0gCd4GAhpQBCbTMfnHKjiP.1

Empower with DataGet

We at DataGet believe in empowering the world with the power of Data.

Followers

Pages

  • Home
  • AMITY University MP Gwalior Doctor of Philosophy (Engineering) - Part Time -JAN 2024
  • PHD Course Work

Pages

  • Home
  • Free Online Platform to upskill yourself
Copyright ©2020 Data Get. All Rights Reserved. Watermark theme. Powered by Blogger.