E Commerce
E Commerce
Comm rce
National Vocational Certificate
Level-4 in Marketing and Advertising
(E-Commerce)
Teaching and Learning Material
Author:
Rabia Nawaz Khan, Instructor, TEVTA Punjab
Reviewed by:
Ahmad Mustafa, Chief Instructor, TEVTA Punjab
Sadiq Orakzai, Trainer, TEVTA KPK
Abdullah Soomro, Instructor, TEVTA Sindh
Printed by:
Crystal Printers, Islamabad
Ph: 051-2807225
July, 2016
This Teaching and Learning Material has been produced by the National Vocational & Technical Training
Commission (NAVTTC) with the technical assistance of TVET Reform Support Programme, which is funded by
the European Union, the Embassy of the Kingdom of the Netherlands, Federal Republic of Germany and the
Royal Norwegian Embassy. The Programme has been commissioned by the German Federal Ministry for
Economic Cooperation and Development (BMZ) and is being implemented by the Deutsche Gesellschaft für
Internationale Zusammenarbeit (GIZ) GmbH.
Foreword
The National Vocational & Technical Training Commission (NAVTTC) developed a National Skills Strategy (NSS)
after extensive research and consultation with experts and stakeholders including policy makers and
representatives from Industry, Academia and the Provincial Government departments dealing with technical and
vocational training. The strategy aims at establishing a regime that facilitates competency-based and demand-
driven training and assessment.
NAVTTC has developed competency-based training programs with the technical support of TVET Reform Support
Programme (TVET-RSP), which is funded by the European Union, the Kingdom of the Netherlands, the Federal
Republic of Germany and the Royal Norwegian Embassy. The Programme has been commissioned by the German
Federal Ministry for Economic Cooperation and Development (BMZ) and is being implemented by the Deutsche
Gesellschaft für Internationale Zusammenarbeit (GIZ) GmbH in close collaboration with NAVTTC. These vocational
training programs have been approved by the National Curriculum Review Committee (having representation from
all over the country from TEVTAs and industry) for implementation in Public and Private Training institutions.
The purpose of developing competency-based training programs is to equip the learners with modern skills and
knowledge for each of the trades to meet the requirements of local as well as international markets. These training
programs include competency standards, qualification, curriculum, assessment material and teaching & learning
material that will aid in implementation of competency-based and demand driven training in the country.
This Teaching and Learning Material is part of the competency based training program exclusively developed to
support the implementation of CBT curricula. This Material is intended for the use of learners undertaking training
in National Vocational Certificate Level-4 in Marketing and Advertising (E-Commerce) under the guidance of experts
and appropriate trainers. This Teaching and Learning Material has been designed in consultation with industry,
academia and researchers to ensure that the material is relevant and current.
On behalf of the Federal Government/NAVTTC, I wish to express my sincere appreciation and gratitude to all
subject matter experts, industry representatives and TVET-RSP experts who have diligently contributed in
producing this valuable Teaching and Learning Material.
Executive Director
National Vocational & Technical Training Commission
(NAVTTC)
Introduction
E-commerce or Electronic Commerce is an area of business or occupation in which buying and selling of goods
and services, or the transmitting of funds or data, through internet are carried out. E-commerce has gained
substantial importance in recent years and have opened opportune for learners to become entrepreneur by getting
knowledge and skills required.
The National Vocational & Technical Training Commission (NAVTTC) has developed a national qualification
entitled, “National Vocational Certificate Level-4 in Marketing and Advertising (E-Commerce)”. Relevant industry
and employers were consulted in the design and validation processes in order to come up with a national
qualification that fulfills the requirements of the sector in general and the occupation in particular.
This Teaching and Learning Material (TLM) is developed based on competency standards and curriculum of the E-
Commerce national qualification. It carries a learning volume of 80 credits and includes five learning modules which
are as under:
This TLM provides support for more effective training and productive learning. Each of the learning modules
contains learning outcomes and information regarding learning elements in the form of knowledge, skills and
attitudes. At the end of every learning module are Frequently Asked Questions (FAQs) and Test Yourself which will
help learners in self-assessment before proceeding to modular or final assessment.
Table of Contents
Module Learning Unit Title Page
Business Analysis 1
1 Concept and Terminologies 3
2 Market Intelligence 15
3 Requirement Analysis 19
4 Requirement Designing 21
1
5 Test Case Design 29
Summary of Module 34
Frequently Asked Questions (FAQs) 35
Test Yourself 36
Answer Key 38
Web Designing / Development 39
1 Software Language (Web Development) 41
2 Framework 53
3 Database 65
4 Security (HTTPS) 84
2
5 Payment Modes 91
Summary of Module 96
Frequently Asked Questions (FAQs) 97
Test Yourself 98
Answer Key 100
Quality Assurance 101
1 Validation and Verification 103
2 Testing 106
3 Summary of Module 129
Frequently Asked Questions (FAQs) 130
Test Yourself 131
Answer Key 132
E-Marketing 133
1 Search Engine Optimization (SEO) 135
2 Supply Chain Management (SCM) 150
3 Social Media Marketing 155
4
Summary of Module 162
Frequently Asked Questions (FAQs) 163
Test Yourself 165
Answer Key 167
Legal and Ethical Aspects 169
1 Ethics and Professional Conduct 171
2 Planning of Business Process Activities 176
3 Awareness to Rights 180
5
Summary of Module 183
Frequently Asked Questions (FAQs) 184
Test Yourself 186
Answer Key 188
Module 1: Business Analysis
Learning Outcomes
Overview
1. Evolution of E-Commerce
1995: Two of the biggest names in e-commerce are launched: Amazon.com and eBay.com.
1998: DSL, or Digital Subscriber Line, provides fast, always-on Internet service to subscribers across California. This prompts
people to spend more time, and money, online.
1999: Retail spending over the Internet reaches $20 billion, according to Business.com.
2000: The U.S government extended the moratorium on Internet taxes until at least 2005.
Do you know!
2005: First Internet Retail Conference and Exhibition. The final release of VirtueMart. Magento
E-Commerce
2006: Google debuts google checkout. solution was
launched by Varien
2010: Magento mobile is released allowing store owners to create native mobile storefront apps. in 2002.
E-commerce gets serious about social media and more personal conversations taking place
between business and consumer.
2013: US E-commerce and Online Retail holiday sales reach $46.5 billion, up 10 percent.
2014: Overstock.com processes over $1 million in Bitcoin sales. US E-Commerce and Online Retail sales projected to reach
$294 billion, an increase of 12 percent over 2013 and 9% of all retail sales.
E-tailing
Short for "electronic retailing. E-tailing is the selling of retail goods on the Internet. E-tailing began
to work for some major corporations and smaller entrepreneurs as early as 1997 when Dell
Computer reported multimillion dollar orders taken at its Web site. The success of Amazon.com
hastened the arrival of Barnes and Noble's e-tail site. Concerns about secure order-taking receded.
1997 was also the year in which Auto-by-Tel reported that they had sold their millionth car over the
Web, and Commerce Net/Nielsen Media reported that 10 million people had made purchases on
the Web.
As a place for direct retail shopping, with its 24-hour availability, a global reach, the
ability to interact and provide custom information and ordering, and multimedia
prospects, the Web is rapidly becoming a multibillion dollar source of revenue for the world's businesses.
The virtual store is an online store that displays merchandise and an order form. A live text chat may be offered,
in which the customer interacts in real time with a company representative.
EDI stands for Electronic Data Exchange. EDI is an electronic way of transferring business documents in an
organization internally between its various departments or externally with suppliers, customers or any
subsidiaries etc. In EDI, paper documents are replaced with electronic documents like word documents,
spreadsheets etc.
EDI Documents
1. Invoices
2. Purchase orders
3. Shipping Requests
4. Acknowledgement
Electronic funds transfer (EFT) is the electronic transfer of money from one bank account to another, either within
a single financial institution or across multiple institutions, through computer-based systems and without the direct
intervention of bank staff.
EFTs include direct-debit transactions, wire transfers, direct deposits, ATM withdrawals and online bill pay
services. For example, when you use your debit card to make a purchase at a store or online, the transaction is
processed using an EFT system. The transaction is very similar to an ATM withdrawal, with near-instantaneous
payment to the merchant and deduction from your checking account.
4. Categories of E-Commerce
Ecommerce can be broken into following four main categories. Do you know!
Business-to-Consumer (B2C) Thomson Holidays
submitted first ever
In a B2C, companies sell their online goods to consumers who are the end users of B2B electronic
their products or services. Usually, B2C E-commerce web shops have an open access transaction using
for any visitor, meaning that there is no need for a person to login in order to make any online technology in
product related enquiry. 1981.
Remember
Business-to-Business (B2B)
In a B2B, companies sell their online goods to other companies without being engaged in sales to consumers. In
most B2B E-commerce environments entering the web shop will require a log in. B2B web shop usually contains
customer-specific pricing, customer-specific assortments and customer-specific discounts.
Consumer-to-Business (C2B)
In a C2B, consumers usually post their products or services online on which companies can post their bids. A
consumer reviews the bids and selects the company that meets his price expectations.
Consumer-to-Consumer (C2C)
In a C2C, consumers sell their online goods to other consumers. A well-known example is eBay.
Government-to-Consumer (G2C)
The electronic commerce activities performed between the government and its citizens or consumers, including
paying taxes, registering vehicles, and providing information and services.
6. Ecommerce Issues
Currency Conversion
One of the major issues companies face when going global is how to deal with multiple Do you know!
currencies. Simply doing all transactions in rupees is the easiest solution for a Pakistani
merchant, but it’s also the one with the most potential to turn off new customers you’re Offering sales in
trying to attract. E-commerce companies are figuring out how to better serve their new home currencies is
customers by offering sales in their home currencies. complicated to set
up but likely to pay
When it comes to setting themselves up to sell in global markets, they basically need off in the long-term,
three things: since buyers who
are more
1. A multicurrency merchant account through a company that can process payments comfortable dealing
from providers in the countries where you’ll operate. with a familiar
currency are apt to
2. A payment processing gateway set up to handle credit cards from international return more often
providers. and spend more at
the site.
3. An online shopping cart that supports multiple currencies.
Copy Rights
The most exciting form of e-commerce is the sale of bits sold in packets representing works protected by
copyright: e-books, e-journals, music, films, photographs etc. The owner of the copyright protected material can
control who copies the work, how much will be charged for copies, and whether or not to allow the public to use
or make derivative works of the original. A copyright violation could cost thousands of dollars in legal fees, time,
forced subscription fees, and potential fines.
Product Delivery
For product delivery you can decide to outsource all of your shipping requirements including insurance, packaging
and scheduling. You can decide to take care of some shipping aspects in-house, you’ll need to outsource the
actual transportation of the goods. Offer your customers a well-known, reliable shipping company. Using a name-
brand shipping company gives customers confidence in your ability to deliver their merchandise on time and
undamaged — even if your business is relatively unknown.
It is the contract between the licensor and purchaser, establishing the purchaser's right to use the product. The
license may define ways under which the product can be used, in addition to the automatic rights of the buyer
including the freedom to use, archive and re-sale etc.
Taxation
E-commerce presents a major challenge for tax administrations, given the often multi-jurisdictional nature of the
transactions and the potential anonymity of the parties. For e-commerce conducted by Pakistani resident
companies with Pakistani individuals or businesses, the tax treatment is largely the same as physical business.
Linguistics
Linguistics play an important role for your ecommerce sites. When you are planning your SEO strategy and PPC
ad campaigns for users visiting your website, it is vital to ensure that they find an environment they can relate to
and which “speaks the same language” as them. This goal cannot be achieved if you rely on machine translations
and do not involve native speakers in the creation of your content. Think about finding a website that sells
something you really like, but their product pages, including the descriptions, are poorly worded with grammatical
errors – this would leave you suspicious and more likely to leave the site for an alternative provider.
The procedure of creating and using a PayPal account has the following steps:
PayPal
2. On the first page, fill in your country information and then choose whether you are registering a personal
account or an account for a business or nonprofit organization.
Remember
3. On Next Page fill in the required information and then carefully read over the policies hyperlinked near
the end of the page.
Do you know!
4. After reading policies, check the box to indicate you've read it and click the yellow button at the bottom of
the page that reads “Agree and Sign Up.”
5. Once your account has been created, you can log in using the information you provided. Click
“Upgrade.” Follow this link if you would like to purchase a Premium or Business account.
Remember
Some of PayPal's
services are
restricted until you
have verified your
account, so do it as
soon as possible.
6. Verify your account by a link on the main page that will allow you to do this. Your account can be verified
by linking it to another bank account, proving you are a real person.
Do you know!
Transferring fund
from your bank is
free, but each
transfer takes 3-5
days on average.
7. To add money Click “Add Money”. Choose how you would like to add money. You can transfer funds from
your bank. By providing bank information to PayPal, Complete the transaction. Follow the prompts on the
next screen after you choose your deposit method to complete it.
8. To withdraw money click the link on the main page that says “Withdraw” to begin. Choose your withdrawal
type. PayPal has a number of withdrawal options that vary in delivery medium and convenience. Choose
the one you prefer and click on the appropriate link. The options are:
Complete the transaction. Fill in any additional required information on the next page and submit your
request.
9. To send money, choose whether you are sending money as a Western Union-style wire transfer to a
friend or family member, or sending money to pay for goods or services. Once you have chosen the
appropriate option, read over the fees and complete the transaction.
To request money, choose whether to send an invoice or a simple request. Read over the fees involved
with receiving money from a request, and finish up.
10. PayPal offers a fairly broad range of other services, especially business (selling) services, that range from
custom website buttons to smartphone credit card swiping devices for physical storefronts.
Remember
There are five tabs across the top bar of the PayPal site. The tabs are: My Account, Send Money, Request
Money, Merchant Services, Products & Services.
Go to the My Account tab for these options: Overview, Add Money, Withdraw, History, Statements,
Resolution Center and Profile for you to review and edit.
Learner’s Activity
Creating and using eBay account.
Description: This activity consists of an interactive session in the class about using eBay (an E-
commerce Web Application).
Overview
Market intelligence is a concept that is related to a continuous process that allows data Remember
and information transformation to knowledge to be applied for market oriented
decisions. After completion of this learning unit, you will be able to understand trend Trend analysis
analysis, apply competitive intelligence and decision making techniques like what if requires time series
scenario. data, i.e. data that
are comparable over
time.
1. Market Intelligence
2. Trend Analysis
Trend Analysis is the practice of collecting information and attempting to spot a pattern,
or trend, in the information to identify product opportunities. Following figure shows
process of trend analysis.
In Trend analysis we
use demographic,
Step 2 : Imagining Future Scenarios
cultural and
technology trends.
Trends can be divided into three broad categories: Demographic, Cultural and Technological. List of trends are
compiled in this step. Trends can be found from Direct observation, Sitepal, Google Trends, trend watching web
site, New words, Trend Hunter.
You must think about the consequences if a trend or a combination of trends continue to spread. How will these
trends change what people buy or desire to buy and what will happen if the trends intensify.
Once the effects of the rapidly spreading trends are identified then the unmet needs can be identified.
The product or services currently available and the envisioned product or service are described. Currently
available products or services are described by the core benefit to the customer, how the product or service
works and the approximate cost. The imagined product or service is described by the core benefit to the customer.
3. Competitive Intelligence
1. What-If Analysis
In What-If Analysis, a specific type of Scenario Analysis, you ask a series of "what if" questions to predict potential
complications and the impact they'll have on company operations. Making Decisions by Exploring Scenarios.
As a risk management tool for decision-making, "What If" Analysis helps you Do you know!
brainstorm risks and then explore solutions.
Apple's iPhone and
2. Cost Benefit Analysis Samsung's Galaxy
Android phones
A process by which business decisions are analyzed. The benefits of a given situation come in different
or business-related action are summed and then the costs associated with taking that
models with different
action are subtracted.
storage, different
Market segmentation features and
different price.
Market segmentation is the process of dividing your target market into clearly defined
subgroups of consumers who have common wants, needs and priorities. When you identify these segments, you
can tailor your marketing strategies to meet these wants, needs and priorities in a cost-effective way.
Learner’s Activity
Segmenting a Market
Description: This activity consists of an interactive session in the class about how to
segment a market. The activity would work best in small groups and
reporting back to the overall class.
Overview
Requirements analysis is critical to the success of any project. After completion of this learning unit, you will be
able to create functional requirements, understand the purpose of requirement traceability matrix and create
Software Requirement Specification document.
1. Functional Requirements
Functional requirements specify the business requirements of the project in detail. Usually business requirements
are specified in terms of the actions that user performs on the software system. This is known as the use case
model. But not all requirements need to be specified as use cases. Functional requirements should contain a
combination of use cases and plain textual description of system features. System features are specified at a
higher level and use cases attempt to translate into user actions.
Again there is no fixed format for use case description, but it usually contains the following information,
Use case diagram – For a small systems, a single diagram can be used to depict all the use cases in the system.
List of actors and their details – This identifies the various types of users interacting with the software system.
Use case description – Purpose of the use case and how and when it is invoked by the user. This should also
include an identifier for easy reference.
Preconditions – List of system states/conditions that must be true for the successful execution of the use case.
This section is optional and could be easily incorporated into the basic steps section.
Basic steps – These indicates the various fine grained steps required for the execution of the use case.
Alternate steps – These indicate alternate events of the use case being described.
Business validations/rules – These indicates various types of input validations or business rules required in the
use case being described.
Post conditions – Indicates the results of the use case. Please note that this section is optional and could be
incorporated into the basic steps section.
To ensure that all the business requirements are addressed in the final software product, a traceability matrix
document is used.
Traceability matrix tracks each requirement through various phases of software development (detailed design,
unit test plans, system testing plans, user acceptance test plans and code components). This requires that every
requirement in the SRS should be identifiable by a unique number or tag.
For software projects where majority of features are available as user interfaces, it is better to complement this
section with screen prototypes. These user interfaces can change during detailed design, but having a draft
version of user interface in the requirements document helps a lot in communicating business requirements.
However some customers insist on having finalized user interfaces in the requirements specification document.
1. Create an SRS outline .Use a template (available on web) to create an outline for you
SRS doc. Modify it to suit your organization’s needs. SRS outlines vary, depending on
the organization and their processes. Here is an example of a simple SRS outline:
1. Purpose
2. Scope
3. System Overview
4. References
5. Definitions
6. Use Cases
SRS
7. Functional requirements
It is a description of
a software system to 8. Non-functional requirements
be developed, laying
out functional and
non-functional
Once outlined, the SRS is ready to be written. Here are some tips to writing an SRS:
requirements, and
may include a set of
use cases that
describe interactions
the users will have
with the software.
2. The writer should have superior communication skills. Technical writers can be involved because they
know how to gather and process the right information; they also know how to convey customer
requirements
3. Make things visual as a picture can save 1000 words. Include graphics such as tables and charts to
communicate your ideas better.
4. Don’t over-document. Avoid including things that may not need to be documented. SRS documents may
get a bit long, so avoid packing in unnecessary information.
5. Keep an online version of the SRS and keep updating. As your tasks progress and if your staff and
process changes, the SRS will need to be updated. For this reason, keeping a virtual version will help
keep the whole team on the same page every time a change is made.
Overview
On completion of this learning unit, you will be able to design requirements using Data Remember
Flow Diagrams, Entity Relationship Diagram, Object Modeling Technique and Unified
Modeling Language. There is a prominent
difference between
DFD and Flowchart.
The flowchart
depicts flow of
control in program
modules.
1. Techniques of Designing
Data flow diagram is graphical representation of flow of data in an information system. Data flow diagrams
Data Flow Diagrams are either Logical or Physical. can be used in both
Analysis and Design
DFD Components phases.
DFD can represent Source, destination, storage and flow of data using the following set of components -
Levels of DFD
Level 0 - Highest abstraction level DFD is known as Level 0 DFD, which depicts the entire information system
as one diagram concealing all the underlying details. Level 0 DFDs are also known as context level DFDs.
Level 1 - The Level 0 DFD is broken down into more specific, Level 1 DFD. Level 1 DFD depicts basic modules
in the system and flow of data among various modules. Level 1 DFD also mentions basic processes and sources
of information.
Level 2 - At this level, DFD shows how data flows inside the modules mentioned in Level 1.
Entity
It is an object that is involved in the enterprise and that be distinguished from other objects. Entities are
represented by means of rectangles. Rectangles are named with the entity set they represent.
Do you know!
It was developed
around 1991 by
Rumbaugh as a
method to develop
object-oriented
systems and to
support object-
oriented
programming.
Attributes
Attributes are the properties of entities. Attributes are represented by means of ellipses. Every ellipse represents
one attribute and is directly connected to its entity (rectangle).
Composite attributes are further divided in a tree like structure. Every node is then connected to its attribute.
That is, composite attributes are represented by ellipses that are connected with an ellipse. Multivalued attributes
are depicted by double ellipse. Derived attributes are depicted by dashed ellipse.
The object-modeling technique (OMT) is an object modeling approach for software modeling and designing. OMT
is a predecessor of the UML. Many OMT modeling elements are common to UML.
Stages:
1. Analysis
2. System Design
3. Object Design
4. Implementation
Models
1. Functional Model
2. Dynamic Model
3. Object Model
Do you know! Unified Modeling Language, a standard language for designing and documenting a
system in an object-oriented manner. It has different diagrams which can be used in
UML was created design document to express design of software architecture.
and developed by
Grady Booch, Ivar 1. Use case diagram
Jacobson and
It describes a set of actions (use cases) that some system or systems (subject) should
James Rumbaugh at
or can perform in collaboration with one or more external users of the system (actors)
Rational Software
to provide some observable and valuable results to the actors or other stakeholders of
during 1994–95 the system(s).
2. Class diagram
Shows structure of the designed system, subsystem or component as related classes and interfaces, with their
features, constraints and relationships - associations, generalizations, dependencies, etc.
Elements: class, interface, feature, constraint, association, generalization, dependency.
3. Activity diagram
Shows sequence and conditions for coordinating lower-level behaviors, rather than which classifiers own those
behaviors. These are commonly called control flow and object flow models.
4. Sequence diagram
Sequence diagram shows interaction between objects over a specific period time.
5. Component diagram
It shows components and dependencies between them. This type of diagrams is used for Component-Based
Development (CBD), to describe systems with Service-Oriented Architecture (SOA).
6. State diagram
Used for modeling discrete behavior through finite state transitions. In addition to expressing the behavior of a
part of the system, state machines can also be used to express the usage protocol of part of a system.
7. Deployment diagram
It shows architecture of the system as deployment (distribution) of software artifacts to deployment targets.
5. UML Tools
A UML tool or UML modeling tool is a software application that supports some or all of the notation and semantics
associated with the Unified Modeling Language (UML). Sparx Enterprise Architect, EDraw, Argu UML,etc are
some of UML tools.
Create a project with name enroll.zargo and change the Explorer perspective from Package-centric to Diagram-
centric (see diagram above).
In the Explorer (top-left), by double-clicking on "use case diagram", you will bring up the editor pane for your use
case diagram. Notice that you now have a different toolbar displayed. In the name field of the Properties tab in
the Details pane (bottom-right), you can rename the diagram to "enrollment use cases".
3. Add Actors
Add three actors to your diagram by double-clicking on in the toolbar (this is a shortcut that will allow you to
add multiple actors without having to go back to the toolbar). Name the actors, from top to bottom, Administrator,
Faculty and Student.
Add two new use cases using on the toolbar, and name them "Close a Course" and "Open a Course".
5. Adding Associations
6. Finish
This is how the final Use Case diagram of the "Enroll.zargo" example.
Overview
Test case design is very important step as they are used to validate that the requirements have been met. After
completion of this learning unit, you will be able to understand use case analysis, creation of test cases from use
case, designing conditions from operator, specialized testing circumstances and different automated testing tools
like UFT, Bugzilla and Issue Tracker.
2. Identify actors:
iii. The same actor may participate in multiple use cases, as initiator in some and not in others.
Use simple matrix that can be implemented in a spreadsheet, database or test management tool.
Number the scenarios and define the combinations of basic and alternative flows that leads to them.
For each test case identify the conditions that will cause it to execute a specific events.
Use matrix with columns for the conditions and for each condition state whether it is
Design real input data values that will make such conditions to be valid or invalid and hence the
scenarios to happen.
You may want to look at the use case constructs and branches.
Condition testing is a test case design method that exercises the logical conditions contained in a program
module. A simple condition is a Boolean variable or a relational expression, possible preceded with Not (!)
operator .A relational expression takes the form
E1 < relational –operator > E2
Where E1 and E2 are arithmetic expressions and <relational –operator> is one of the following ==, !=, ||, && etc.
Comparison and Logical operators are used to test for true or false.
Comparison Operators
Comparison operators are used in logical statements to determine equality or difference between variables or
values.
Given that x = 5, the table below explains the comparison operators:
x == 8 false
== equal to
x == 5 true
Comparison operators can be used in conditional statements to compare values and take action depending on
the result:
Logical Operators
Logical operators are used to determine the logic between variables or values.
Given that x = 6 and y = 3, the table below explains the logical operators:
|| or (x == 5 || y == 5) is false
Stress
In this testing circumstances the robustness of software if determined by testing beyond the limits of normal
operation. Stress testing is particularly important for "mission critical" software, but is used for all types of
software. Stress tests commonly put a greater emphasis on robustness, availability, and error handling under a
heavy load, than on what would be considered correct behavior under normal circumstances.
Load-Balancing
Load balancing ensures high system availability through the distribution of workload across multiple components.
Using multiple components with load balancing, instead of a single component, may increase reliability through
redundancy.
Page-level security allows you to set different levels of access for different people on different pages. For
example, you could allow one group to see one set of pages, allow others to edit another set of pages, and then
keep yet another set of pages private only to yourself.
5. Testing Tools
UFT formerly known as QuickTest Professional (QTP), is an automated functional testing tool that helps testers
to perform automated regression testing in order to identify any gaps, errors/defects in contrary to the
actual/desired results of the application under test.
Bugzilla
Bugzilla is an open source web-based general-purpose bugtracker and testing tool. It has been adopted by a
variety of organizations for use as a bug tracking system for both free and open-source software and proprietary
projects and products.
Issue Tracker
Issue Tracker, formerly IssueZilla, is the software used for tracking bugs and feature requests for OpenOffice.org
or issues from another type. It was forked long ago by CollabNet from Mozilla's Bugzilla.
Summary of Module
E-commerce describes the process of buying, selling, transferring, or exchanging of products, services,
and/or information via computer networks, including the Internet. Electronic commerce draws on
technologies such as E-tailing, Electronic Funds Transfer and Electronic Data Interchange Ecommerce
can be broken into four main categories: Business to Business, Business to Consumer, Consumer to
business, and Consumer to consumer
Market Intelligence to identify the opportunities for a product/service can be achieved through Trend
Analysis, Competitive Intelligence and Decision Making for Market Segmentation.
In requirement analysis functional requirements and Requirement traceability matrix are created for
determining the needs or conditions to meet for a new or altered product or project.
Data Flow Diagram, Entity Relationship Diagram, Object Modeling Technique and Unified Modeling
language are different techniques of designing.
Test cases are designed from use cases as they are necessary to verify successful and acceptable
implementation of the product requirements.
Answer Short for "electronic retailing. E-tailing is the selling of retail goods on the Internet.
Using EFT reduces paper processing and the errors associated with such processing, reduces
Answer costs related to check processing and postage and allows for faster response times to inquiries
regarding the status of tax payments.
It's easy to get a PayPal account. From the PayPal account registration page, select Personal
Answer or Business Account, then choose the country you live in. Next, on the PayPal Account Sign Up
page, enter your information, then click Sign Up.
Unified Modeling Language, a standard language for designing and documenting a system in an
Answer object-oriented manner. It has nine diagrams which can be used in design document to express
design of software architecture.
Unified Functional Testing is an automated functional testing tool that helps testers to perform
Answer
automated regression testing in order to identify any gaps, errors/defects
Test Yourself!
Please mark the correct one from the given options. You can check your answer with the Answer Key at the
end of this module.
a. Amazon.com b. e-bay.com
c. dell.com d. lastminute.com)
It describes the behavior in many Use It doesn’t describe the behavior in a single
a. b.
Cases. Use Case.
Consider a directed line (----->) from the relationship set advisor to both entity sets
8.
instructor and student. This indicates _________ relationship.
________help you to design a series of test cases that have a high likelihood of finding
9.
errors.
Answer Key
MCQ Number Correct Answer
1 d
2 a
3 a
4 b
5 d
6 d
7 d
8 b
9 b
10 b
Learning Outcomes
Overview
Web design and development is a broad term for the work involved in developing and Remember
designing a web site. After completion of this learning unit you will be able to
understand: coding standards, object oriented programming concepts in web Many programmers
development, unit testing, coding terminologies, coding techniques, development of have a nasty habit of
sitemap technique to apply logical conditions, and integrate traceability options. overly abbreviating
everything. This
should be
discouraged.
1. Coding Standards
Conventions
Do you know!
Indenting: lowerCamelCase is
lowercase lettering
Indent your code. Use an indent of 4 spaces, with no tabs. on initial words and
capitalization on
Case subsequent words.
UpperCamelCase is
Use "lowerCamelCase" style to name functions, methods, and variables. capitalization on all
words
Variables
Case should never be used to differentiate between variable names. Every variable name in the current scope
should be absolutely unique. Variable names should describe the content that they (will) contain, using either
complete words or understandable abbreviations. You can use underscore, hyphen sign in variable.
Functions
No underscores except in the event handlers. Try to avoid abbreviations. PHP functions Remember
are equivalent to a spoken language's verbs. Function names, therefore, should be
action oriented. They should also be defined in the present tense. Function name We are using PHP
should look like what it does. as web
programming
• Use "UpperCamelCase" style to name classes language for
• Define constants with uppercase letters and underscores reference here.
Constants:
SCREAMING_CAPS
Ex: define ("GLOBAL_CONSTANT","1");
Function Declarations/Definition
Function declarations are the step where you define your function. Its parenthesis for argument can be empty or
with argument.
With argument:
Without argument:
Function Calls
After function declaration next step is to call the function to get the result whenever you need. Blow is the example
how to call the function
foo( );
Always use <?php ?> to define PHP code, not the <? ?> shorthand.
Control Structures
Allman/BSD Style • Place a single space between the control keyword (if, for, while, switch, etc.)
and opening parenthesis to distinguish control statements from function calls
In Allman styles • Always use curly braces { }—even when technically optional (i.e., avoid PHP's
sometimes known alternative syntax for control structures, except the ternary operator noted below)
as BSD style,
braces appear alone • Include break; statement after all switch case statements
and surrounding the • Use the Allman/BSD style for indentation and layout
indented code.
• Always use elseif (one word) in place of else if (two words)
Example:
Ternary Operators
TODO
Anytime you need to make comments regarding future modifications or requirement put a //TODO: comments.
These will show up in PHPEclipse and give us an idea of things left unfinished (but functional). Example:
CODE CLEANUP
Where you see standard rules broken -> MARK CODE WITH A TODO
PHP Comments
Use C-style (/* */) comments for multi-line statements and C++ comments (//) for single line statements
HTTP Methods
Always prefer to use HTTP POST method rather than using GET method.
HTML
When you writing html code you should follow the following standards.
<section>
<p>This is a paragraph.</p>
<p>This is a paragraph.</p>
</section>
Object-oriented programming (OOP) is a programming language model organized around objects rather than
"actions" and data rather than logic. In object oriented programming programmer has been viewed as a logical
procedure that takes input data, processes it, and produces output data.
Ease of maintenance
Reuse of code
Easily modified, extended, and improved
Better tools to solve problems
Easier for others to work with your code
1. Abstraction
Through the process of abstraction, a programmer hides all but the relevant data about an object in order to
reduce complexity and increase efficiency.
2. Encapsulation
Encapsulation is the packing of data and functions into a single component. The features of encapsulation are
supported using classes in most object-oriented programming languages, although other alternatives also exist.
3. Polymorphism
A big advantage of polymorphism is the reusability and extensibility of higher level abstractions. The higher the
abstraction that can be reused, the more reliable and less expensive the end result of the project.
In object-oriented programming (OOP), inheritance is when an object or class is based If no unit testing was
on another object (prototypal inheritance) or class (class-based inheritance), using the done before
same implementation (inheriting from an object or class) specifying implementation to integration, trying to
maintain the same behavior (realizing an interface. hunt down the
problem is
immensely more
complicated.
3. Unit Testing
In unit testing you can divide your code should be in the form of different units and you can test each unit
individually. The primary goal of unit testing is to take the smallest piece of testable software in the application,
separate it from the remainder of the code, and determine whether it behaves exactly as you expect.
The most common approach to unit testing requires drivers and stubs to be written. The driver simulates a calling
unit and the stub simulates a called unit. Even though the drivers and stubs cost time and money, unit testing
provides some undeniable advantages.
4. Coding Terminologies
Comment
In web designing and development a comment is a bit of information contained in a site’s html or xhtml files that
is ignored by the browser. Comments are used to identify different parts of the file and as reference notes as well
as ease in user readability.
Doctype
The doctype declaration specifies which version of html is used in a document. It has a direct effect on whether
your html will validate.
Element
In xml, an element is the central building block of any document. Individual elements can contain text, other
elements, or both.
Em
Em is a unit of measurement for sizing fonts and other elements within a web page relative to the item’s parent
element.
Remember
EX
Ex is a measurement for font height or size relative to the height of a lowercase “x” in that font family.
Font Family
The font family tag generally lists multiple fonts to be used, and usually ends with the generic font category (such
as “serif” or “sans-serif’).
Front-end
The front-end is basically the opposite of the back-end. It’s all the components of a website that a visitor to the
site can see (pages, images, content, etc)
Hexadecimal
Also referred to a “hex” numbers, they are a base-16 numbering system used to define colors online.
Htaccess
The .htaccess file is the default directory-level configuration file on apache servers.
Html tag
Also referred to as an html element, an html tag is the bit of code that describes how that particular piece of the
web page it’s on is formatted.
Iframe
Short for inline frame. An iframe is used to display one or more web pages within another normal web page
Image map
An image map is used in xhtml to allow different parts of an image to become different clickable elements (and
can also allow some portions of the image to have no clickable element).
Inheritance
In css, elements that don’t have a pre-defined style will take on the style of their parent element within the
document tree.
Inline style
Elements with css written directly around the element it affects, instead of in a separate style sheet or header
style.
Liquid/Responsive layout
Layout that is based on percentages of the browser window’s size and adjustable on any screen type exp laptop,
tablet, mobile, handhelds etc.
Markup
This refers to the coding applied to a text document to change it into an html, xml, or other markup language
document.
Meta data
Meta data is the data contained in the header that offers information about the web page that a visitor is currently
on. The information contained in the meta data isn’t viewable on the web page (except in the source code). Meta
data is contained within meta tags.
Meta tag
An html tag used to include meta data within the header of your web page.
Nesting
Nesting refers to putting one html element within another element.
Permalink
A link that is the permanent web address of a given blog post.
Plug-in
A bit of third party code that extends the capabilities of a website.
Property
This is what defines how a style should appear on a given web page.
Pseudo-element
It is an element used to add a special effect to certain selectors.
Script
Generally refers to a portion of code on an html page that makes the page more dynamic and interactive.
Selector
In css, the selector is the item a style will be applied to.
Semantic markup
In semantic markup, content is written within xhtml tags that offer context to what the content contains.
Server-side
Server-side refers to scripts run on a web server and the code compile on server, as opposed to in a user’s
browser.
5. Coding Techniques
1. No matter how much SPACE’s you use for an indent use it consistently throughout the source code.
2. Indent code to better convey the logical structure of your code. Without indenting, code becomes difficult to
follow.
3. Establish a maximum line length for comments and code to avoid having to scroll the window of the text
4. Use SPACE after each “comma” in lists, such as array values and arguments, also before and after the
“equal” of an assignment
5. Use empty lines to provide organizational clues to source code, blocks (“paragraphs”-like structure) help the
reader in comprehending the logical segmenting.
6. When a line is broken across several lines, make it obvious that the line is incomplete using indentation.
9. Use freely available program that help to indent, format, and beautify your source code automatically and
consistently.
10. Break large, complex sections of code into smaller, comprehensible modules
(subroutine/functions/methods). A good rule is that modules do not exceed the size of the text editor window.
11. Arrange and separate your source code logically between files.
12. Choose and stick to a style for naming various elements of the code, this is one of the most influential aids
to understand the logical flow. A name should tell what rather than how, avoid names that expose underlying
implementation.
13. Ideally you would like to be able to read the code as prose.
14. In Object-Oriented languages, it is redundant to include the class name in the name of a member field or
function.
15. Even for short-lived variable, use a meaningful name. Use single-letter variable (i, j) for short-loop indexes
only.
Sitemap
A sitemap is a dedicated page that lists and links to all the other pages on your website, often providing metadata
about each URL. There are two types of them:
1. HTML Sitemap
An HTML site map to allow human visitors to easily navigate on your website.
2. XML Sitemap
An XML sitemap that can be submitted to Google, Bing, Yahoo and other search engines to help them crawl your
website better.
Development of Sitemap
Sitemap can be developed using different tools. Here is the method to create sitemap using free online sitemap
generator.
Step by step creating sitemap
1. Open https://www.xml-sitemaps.com/
2. Enter your full website URL and some optional parameters in the form below.
3. Press 'Start' button and wait until the site is completely crawled.
4. You will be redirected to the generated sitemap details page, including number of pages, broken links list,
XML file content and link to a sitemap file. Download the sitemap file using that link and put it into the domain
root folder of your site.
5. Go to your Google Webmaster account and add your sitemap URL.
Learner’s Activity
Developing a front end webpage.
Description: This activity consists of an interactive session in the class about developing
front end of an ecommerce web application using HTML, JavaScript and
JQuery.
Purpose: To be able to develop front end web page of an ecommerce web application.
Presentation:
1- Divide the class into groups of five.
2- Brief the groups about the activity that each group will create front
end of an ecommerce web application using HTML, JavaScript and
JQuery.
Overview
Framework is one of the tools to help you develop better and faster. On completion of Remember
this learning unit you will be able to understand software development using
frameworks, different open source frameworks (like Spring MVC, JSF, Struts etc.), and The software
developing software applications using libraries. frameworks
significantly reduce
the amount of time,
effort, and resources
required to develop
and maintain
applications.
1. Frameworks
A framework is a platform for developing software applications. It provides a foundation Do you know!
on which software developers can build programs for a specific platform. For example,
a framework may include predefined classes and functions that can be used to process Struts was originally
input, manage hardware devices, and interact with system software. This simplifies the developed by Craig
development process since programmers don't need to reinvent the wheel each time McClanahan and
they develop a new application. donated to the
Apache Foundation
in May 2000.
Popular Frameworks
1. Spring MVC
The Spring web MVC framework provides model-view-controller architecture and ready components that
can be used to develop flexible and loosely coupled web applications. For Further Information Official
page of spring MVC is: http://projects.spring.io/spring-framework/
2. JSF
JavaServer Faces (JSF) is a MVC web framework that simplifies the construction of user interfaces (UI)
for server-based applications by using reusable UI components in a page. For Further Information Official
page of JSf is: https://javaserverfaces.java.net/
3. Struts
Apache Struts 1 is a discontinued open-source web application framework for developing Java EE web
applications. It uses and extends the Java Servlet API to encourage developers to adopt a model–view–
controller (MVC) architecture. For Further Information Official page of struts is: https://struts.apache.org/
4. CodeIgenator
CodeIgniter is an open source rapid development web application framework, for use
CMS in building dynamic web sites with PHP. For Further Information Official page of
CodeIgenator is: http://www.codeigniter.com/
A content
management 5. Zend
system (CMS) is a
computer application Zend Framework (ZF) is an open source, object-oriented web application
that allows framework implemented in PHP 5 and licensed under the New BSD License. For
publishing, editing Further Information Official page of zend is: http://framework.zend.com/
and modifying
content, organizing, 6. Entity Framework
deleting as well as
maintenance from a Entity Framework (EF) is an open source object-relational mapping (ORM) framework.
central interface. It is an enhancement to ADO.NET that gives developers an automated mechanism for
accessing & storing the data in the database.
E-commerce Framework is a software technology solution that allows you to build storefronts. There are many
E-commerce frameworks available in the market that can be used as an E-commerce platform for your business.
In order to determine which one is best for your online business, it is essential to understand their characteristics
and functionality. Well-known ecommerce frameworks are
Drupal Ecommerce
Drupal Commerce is the best way to manage or configure your ecommerce website according to your needs. It
has very rigid development standards, and comes with features designed for maximum flexibility. Out of its many
features, Drupal Commerce comes with the advantage of creating different custom attributes, VAT (value added
tax) support, tax calculation and even discount pricing rules. You even get dynamic product displays and order
management means and methods for smooth running of your website.
WordPress Ecommerce
WordPress is one of the pioneers in php CMS in the field of building websites/web application from scratch, and
with exciting features. It packs a punch in terms of useful features for CMS systems. Of the many WordPress
Ecommerce features is the fact that not only can store owners use the readymade ecommerce templates, but
can also explore design differentiation with CSS and HTML. These packs come with video tutorials for easy
setups, and there are integrations with popular payment gateways such as Stripe, Gold Cart, and the best part
is, you can integrate automatic pricing modules and offer complicated discounts and refunds to frequent
shoppers. There are some top plug-in in WordPress are Wo-commerce, wp-ecommerce etc.
VirtueMart
It is a free, open-source ecommerce plug-in. It works in tandem with the renowned Joomla CMS. VirtueMart is a
complex ecommerce plugin which is not for the average business as it works on an entirely different platform.
But, left in the hands of an experienced web developer or programmer, installing, implementing and maintaining
the platform successfully can provide some very long term benefits.
Magento
Magento is an open source ecommerce framework that one can use to fuel the growth of online stores and
content shops offering downloadable content, for free! Developers have the flexibility to alter the core codes as
well as add features and even improve functionality by installing extensions through the “Magento Connect”
platform. Magento is ideal for those looking to optimize back-end workflows of their businesses.
3. Framework Libraries
A library generally consists of pre-written code, classes, procedures, scripts, configuration data and more.
Typically, a developer might manually add a software library to a program to achieve more functionality or to
automate a process without writing code for it. For example, when developing a mathematical program or
application, a developer may add a mathematics software library to the program to eliminate the need for writing
complex functions. All of the available functions within a software library can just be called/used within the
program body without defining them explicitly. Similarly, a compiler might automatically add a related software
library to a program on run time.
Following are the basic steps to start a new online store with Magento and start selling your products.
1. Installation
Download and Install latest Magento. Once you have completed the Magento installation, you can
proceed with the configuration of your web site.
https://www.magentocommerce.com/download
Select the product's settings (Attribute Set and Product Type) and click Continue.
On the next page you will have to fill in the product options (Name, SKU (Stock Keeping Unit),
Weight, Status (Enabled/Disabled), Tax Class, etc). You can also add custom attributes to the
product using the Create New Attribute button.
When ready, click Save and Continue Edit to go to the next step. Here you will have to fill in the
price for your product. You can also add additional price options such as Tier Price and Special
Price.
Click Save and Continue Edit to go to the next screen where you will be asked to enter some
description for your product.
Click Save and Continue Edit and the product will be saved. You can further customize the product from
the Product Information menu on the left. In order for the product to show up on your front page, make
sure you set it as In Stock from the Inventory option in the left menu.
Adding Images to Your Products
Adding an image to a product in Magento is simple. All you need to do is select the product which you
want to add an image to from the product list available
1. In the Magento admin area Catalog => Manage Products
2. Once the product selected, click the Images option available in the Product Information menu
3. On the left Click Browse Files and locate the file on your computer which you want to use as a
product image.
4. Then click Upload Files to upload the image to your shop. Finally, label your image and choose
where it should appear using the radio buttons
5. On the right. Click Save to save your product's image.
2. Once you are ready with the attribute, click on the [Save Attribute] button. Then you can click on
the [Save] button in order to store your product information. Finally, you need to assign the new
product to a chosen category:
3. Now go to your Magento admin area => Catalog => Tags => Pending Tags to view all your
pending tags. In our case, there will be only one pending tag for the word "Great":
4. Click it and you will be taken to a page where you can change the status of the tag. It will appear
as "Pending", so let’s change it to "Approved" and click Save Tag.
Now that the tag has been approved, all other customers will see it on the product page.
Go to your Magento admin area => Catalog => Manage Products and click the product the tags of which
you want to check. Then from the left menu click Product Tags and you will see all the tags for that
product.
Configure Magento Payment Methods
3.
Magento provides different payment methods in order to allow you to accept payments using different
payment processors like Paypal, Authorize.net and many more. The clients can also pay through regular
credit cards like Visa, Master Card, American Express, Discover, Switch/Solo, check/money orders and
other payment solutions.
To configure you payment methods in Magento, first you need to login to your Admin area. Then, go
to System => Configuration => Sales ->Payment Methods.
Here we will enable the credit card payment method. This method can be configured through the Saved
CC section:
Enable the method, enter its title, set the new order status, pick the supported credit cards, decide whether
the credit card verification is required, and define from which countries to accept payments and the range
of the accepted payments.
In the Sort order field you should enter the position of this payment method compared to the other
payment methods offered to the customers. That's it, you have just enabled this payment method for your
customers.
Configure Magento Shipping Methods
4.
To configure your Magento Shipping methods, you need to login to your admin area and go to System
=> Configuration => Sales =>Shipping Methods.
Before enabling the shipping method you should configure the shipping settings from System =>
Configuration => Sales => Shipping Settings.
Expand the Origin section. Enter the address from which the shipping will be initiated. Usually this is the
address of the warehouse where the products are stored.
Then expand the Options section. If enabled, the option Allow Shipping to Multiple Addresses allows
goods from a single order to be shipped to different addresses. It is useful when a customer orders many
products of a single kind, like post cards or pens for example and wants them to be delivered to multiple
addresses. You can define the maximum number of allowed shipping addresses in the Maximum Qty
Allowed for Shipping to Multiple Addresses field.
For example, to enable the USPS shipping module, you can go to System => Configuration => Sales
=> Shipping Methods and navigate to the USPS section:
Enable the shipping method; enter the Gateway URL and the UserID. The next options allow you to
describe the packages which you need to be delivered (size, weight and more).
Then you can define the handling fee. It can be fixed or calculated on the percent basis. After this you
can pick the allowed delivery methods. Also, you can configure a free shipping method and define whether
there is a minimum purchase sum for it.
At the end you can define the countries for which the shipping is supported and the default error message
in case the service is refused. In the Sort order field you should enter the position of this shipping method
compared to the other shipping methods offered to the customers.
Creating and Managing Pages in Magneto
5.
In order to manage your web site pages you need to navigate to the CMS section in the Magento admin
area. Click on the Manage Pages link in order to proceed with the pages modification.
You can edit a page by clicking on it. The Edit Page will open the window below:
You can modify this page to your preference. Static blocks are another useful option. For example, you
can edit the footer block which contains the links located at the bottom of your main page:
Do you know!
Learner’s Activity
Ecommerce Web Application Development using Drupal/Joomla/WordPress
Description: This activity consists of an interactive session in the class about developing
ecommerce enabled web application using Drupal/Joomla/WordPress.
2- Brief the groups about the activity that each group will an ecommerce web
application using Drupal/Joomla/WordPress.
Overview
For all database designs, there are a set of standard rules and best practices to follow, Remember
all of which can help a database stay organized and help to team up with the respective
site in a smart and efficient way. On completion of this learning unit you will be able to Database Design is
understand entity classes, relationships between entities, Entity relationship diagram, most Critical
database keys, query designing and database tools. database life cycle
phase. It makes
sure final product
meets requirements.
Focus on data
requirements.
1. Entity Classes
An entity class is something that can be identified and the users want to track. Entity
Do you know!
class is a collection of entities described by the entity format in that class. Entity
instance is the representation of a particular entity. There are usually many instances A general notational
of an entity in an entity class. convention is to
CAPITALIZE the
Consider an entity class STUDENT and an entity instance would be a particular student entity class’s name.
in the entity class, for example, Sara might be an entity instance.
2. Database Designing
The process of producing a detailed data model of a database containing all the needed
Database
logical and physical design choices and physical storage parameters needed to
generate a design of a database. A database is a
collection of
Phases information that is
organized so that it
1. Create conceptual design can easily be
accessed, managed,
Data modeling creates abstract data structure to represent real-world items. High level and updated.
of abstraction. It has four steps
This phase translates conceptual design into internal model and m aps objects in model to specific DBMS
constructs. Design components are Tables, Indexes, Views, Transactions and Access authorities.
Selection of data storage and access characteristics is very technical and more important in older hierarchical
and network models. It becomes more complex for distributed systems. Designers favor software that hides
physical details.
Top-down
a) Identify data sets
b) Define data elements
Bottom-up
Centralized design
Decentralized design
3. Relationships
Relationship is a connection between one or more entities/tables. Relationship is handy feature of database. By
using relationship you can easily retrieve data from one or more than one table.
1. One-To-One Relationships
In one-to-one relationship there is one record/row for a table/entity in another table/entity is called One-To-One
Relationships.
Example: An instance, an I.T. Company is constructed with many Building and Workstations. Most of the
workstations are allotted to Employees and some workstations are empty that reserved for new Employees.
2. One-To-Many Relationships
In one-to-many relationship the record/row of one table/entity there is one or more than one record in other
table/entity is called One-To-Many Relationship.
Example: An instance, an I.T. Company is formed with many Technical and Non-Technical Departments.
Technical Department is developed and maintaining Projects and Non-Technical Departments is maintaining
Administration, HR and Marketing Activities.
3. Many-To-Many Relationships
In many-to-many relationship the record/row of one table/entity there is one or more than one record in another
table and vice versa. The many–to-many relationship can’t directly create with two tables. To solve this problem
you must create third table which is called junction table see example below
Example: An instance, an I.T. Company is formed with many Departments with many Employees. Each Employee
is assigned in one or many Projects with many Tasks.
Employee Project
Employee/project
An entity-relationship diagram, or ERD, is a chart that visually represents the relationship between database
entities to develop a system you must identify the business entities involved and their relationships. To do that,
you draw an entity-relationship (E-R) diagram by following the rules and examples given below.
1. Definitions
Entity: Something about which data is collected, stored and maintained. Entity can be a person, object, event etc.
Entity Type: A class of entities that have the same set of attributes. For example in book class the books of
computer science called entity type.
2. Symbols
3. Examples
A Customer has a one-to-many relationship with a Purchase Order because a customer can place many orders,
but a given purchase order can be placed by only one customer. The relationship is optional because zero
customers might place a given order (it might be placed by someone not previously defined as a customer).
A Purchase Order has a many-to-many relationship with a Stock Item because a purchase order can refer to
many stock items, and a stock item can be referred to by many purchase orders. However, you do not know
which purchase orders refer to which stock items.
Therefore, you introduce the notion of a Line Item. A Purchase Order has a one-to-many relationship with a Line
Item because a purchase order can list many line items, but a given line item can be listed by only one purchase
order.
A LineItem has a many-to-one relationship with a StockItem because a line item can refer to only one stock
item, but a given stock item can be referred to by many line items. The relationship is optional because zero line
items might refer to a given stock item.
5. Normalization / De-Normalization
Normalization
Remember Normalization is the process of removing redundant/duplicate data from tables in order
to improve storage efficiency, data integrity, and scalability.
Normalization can
actually slow Normalization generally involves splitting existing tables into multiple ones, which must
performance with its be re-joined or linked each time a query is issued.
frequently occurring
table join operations. The following are the three most common normal forms in the normalization process:
The objective of the first normal form is to divide the base data into logical units called tables. When each table
has been designed, a primary key is assigned to most or all tables.
Normal Form
It is an integral
concept involved in
the process of
database
normalization.
Normal form is a
way of measuring
the levels, or depth,
to which a database
has been
normalized.
To achieve the first normal form, data had to be broken into logical units of related information, each having a
primary key and ensuring that there are no repeated groups in any of the tables. Instead of one large table,
there are now smaller, more manageable tables
Do you know! The objective of the second normal form is to take data that is only partially dependent
on the primary key and enters that data into another table.
A database's level of
normalization is
determined by the
normal form.
According to the figure, the second normal form is derived from the first normal form by further breaking two
tables down into more specific units.
The third normal form's objective is to remove data in a table that is not dependent on complete primary key
means depend on a part of the key.
Remember
A de-normalized
database is not the
same as a database
that has not been
normalized.
De-normalization
De-normalization is the process of taking a normalized database and modifying table structures to allow controlled
redundancy for increased database performance. Attempting to improve performance is the only reason to ever
de-normalize a database. De-normalization may involve recombining separate tables or creating duplicate data
within tables to reduce the number of tables that need to be joined to retrieve the requested data.
6. Keys
Keys are a key part of a relational database and a vital part of the structure of a table. They ensure each record
within a table can be uniquely identified by one or a combination of fields within the table. They help enforce
integrity and help identify the relationship between tables. There are three main types of keys, primary keys,
foreign keys and composite key.
Primary Key
A table typically has a column or combination of columns that contain values that uniquely identify each row in
the table. This column, or columns, is called the primary key. Primary keys must contain UNIQUE values. A
primary key column cannot contain NULL values. The value of primary key can’t be duplicate. Record can’t be
inserting without the value of primary key.
Foreign Key
A foreign key is generally a primary key from one table that appears as a field in another table where the first
table has a relationship to the second.
Composite Key
A composite key consists of more than one field to uniquely identify a record.
7. Query Designing
The Structured Query Language (SQL) is the set of instructions used to interact with a relational database. The
most important is SELECT statement.
Remember
A SELECT statement retrieves information from the database. Using a SELECT statement, you can do the
following:
Selection: You can use the selection capability in SQL to choose the rows in a table that you want returned by
a query. You can use various criteria to selectively restrict the rows that you see.
Projection: You can use the projection capability in SQL to choose the columns in a table that you want returned
by your query. You can choose as few or as many columns of the table as you require.
Join: You can use the join capability in SQL to bring together data that is stored in different tables by creating a
link through a column that both the tables share.
SELECT Statement
SELECT columns
FROM table
WHERE condition
GROUP BY columns
HAVING condition
ORDER BY column [ASC | DESC]
LIMIT offset,count;
To select the "CustomerName" and "City" columns from the "Customers" table:
Find the age, race, height and weight for any observations with weight greater than 80kg and height less than
150cm:
Find all information about observations where age is from 17 to 18 and weight is from 180 to 185:
An SQL JOIN clause is used to combine rows from two or more tables, based on a common field between
them.We have a table called suppliers with two fields (supplier_id and supplier_name). It contains the following
data:
SupplierId SupplierName
10000 IBM
10002 Microsoft
10003 NVIDIA
We have another table called orders with three fields (order_id, supplier_id, and order_date). It contains the
following data:
INNER JOIN: Returns all rows when there is at least one match in BOTH tables.
LEFT JOIN: Return all rows from the left table, and the matched rows from the right table
RIGHT JOIN: Return all rows from the right table, and the matched rows from the left table.
FULL JOIN: Return all rows when there is a match in ONE of the tables.
Oracle
The system is built around a relational database framework in which data objects may be directly accessed by
users (or an application front end) through structured query language (SQL). Oracle is fully scalable relational
database architecture and is often used by global enterprises, which manage and process data across wide and
local area networks. The Oracle database has its own network component to allow communications across
networks.
Microsoft Access
Access is used for both small and large database deployments. This is partly due to its
easy-to-use graphical interface, as well as its interoperability with other applications and
platforms such as Microsoft’s own SQL Server database engine and Visual Basic for
Applications (VBA).
MySQL
The world's second most widely used relational database management system
(RDBMS) and most widely used open-source RDBMS
MySQL is very popular for Web-hosting applications because of its plethora of Web-
optimized features like HTML data types, and because it's available for free. It is part of
the Linux, Apache, MySQL, PHP (LAMP) architecture, a combination of platforms that
is frequently used to deliver and support advanced Web applications. MySQL runs the
back-end databases of some famous websites, including Wikipedia, Google and
Facebook - a testament to its stability and robustness despite its decentralized, free-
for-all philosophy.
PostgreSQL
2. In order to create a new database you need to enter the desired name for the database in the New Database
field and click on the Create Database button as shown below:
A confirmation screen will be displayed, informing that the database has been successfully created:
3. You can click on the Go Back button to return to the database management screen. Enter the username.
4. You will be redirected to a screen where you will be prompted to choose the desired privileges. It is advisable
to select All Privileges and click on the Make Changes button:
XAMP installation is
required to create
database in MySQL
at local computer.
PHPMyAdmin
PHPMyAdmin is a
free software tool
written in PHP,
intended to handle
the administration of
MySQL over the
Web.
2. Following screen will open. Give name to your database and then click create database.
3. On next screen you will see a confirmation message that database has been created.
Learner’s Activity
Draw an ER Diagram
Description: This activity consists of an interactive session in the class about Draw an ER diagram
for the following situations.
Presentation:
1- Divide the class into groups of two.
2- Brief the groups about the activity that each group will draw an ER Diagram
for above mentioned situation.
Overview
HTTPS is a protocol for secure communication over a computer network. The main
motivation for HTTPS is authentication of the visited website and to protect the privacy
and integrity of the exchanged data. On completion of this learning unit, you will be able
to understand secure socket layer, implementation of web services for SET, Public key
encryption, firewall integration, deploying security Linux and usage of anti-hacking
tools.
SSL is the standard for encrypted and authenticated communications between clients
and servers on the Internet. Virtually all online purchases and browser-based financial
transactions that occur on the Internet are secured by SSL.
However, SSL is not just limited to securing e-commerce transactions; the following are a few other examples of
SSL use:
1. Financial institutions implement SSL to secure the transmission of PIN numbers and other confidential
account information.
3. Organizations who have established Business-to-Business (B2B) extranets implement SSL to secure
transactions between the company and its partners, suppliers, and customers.
4. Private organizations implement SSL in their intranets to confidentially transfer information to and from
employees.
Do you know! Secure Electronic Transaction (SET) was a communications protocol standard for
securing credit card transactions over insecure networks, specifically, the Internet. SET
SET was developed was not itself a payment system, but rather a set of security protocols and formats that
by the SET enabled users to employ the existing credit card payment infrastructure on an open
Consortium, network in a secure fashion.
established in 1996
by VISA and To meet the business requirements, SET incorporates the following features:
MasterCard
1. Confidentiality of information
2. Integrity of data
4. Merchant authentication
1. Merchant
2. Cardholder/acquirer
3. Card issuer
4. Payment gateway
6. Dual signature: A guaranteed SET data integrity innovation that links two different recipient messages
Public key cryptography is a cryptographic technique that enables users to securely communicate on an insecure
public network, and reliably verify the identity of a user via digital signatures.
A public key infrastructure (PKI) is a system for the creation, storage, and distribution of digital certificates which
are used to verify that a particular public key belongs to a certain entity. The PKI creates digital certificates which
map public keys to entities, securely stores these certificates in a central repository and revokes them if needed.
1. A certificate authority (CA) that both issues and verifies the digital certificates
2. A registration authority which verifies the identity of users requesting information from the CA
5. A certificate policy
The Advanced Encryption Standard (AES) is a symmetric-key block cipher algorithm and U.S. government
standard for secure and classified data encryption and decryption. The AES has following features:
2. 128-bit group encryption with 128, 192 and 256-bit key lengths
5. Worldwide access
6. No royalties
Blowfish Cipher
A symmetric encryption algorithm designed by Bruce Schneier in 1993 as an alternative to existing encryption
algorithms, such as DES. Blowfish is a 64-bit block cipher (i.e., a cryptographic key and algorithm are applied to
a block of data rather than single bits) that uses a key length that can vary between 32 and 448 bits. Blowfish is
available for free use by any, and the technology is unpatented and free of license.
Packet Filtering
Proxy Servers
Security-Enhanced Linux
3. Access is only allowed if a SELinux policy rule exists that specifically allows it.
5. SELinux policy is not set at user discretion but rather is administratively-defined and enforced system-wide.
SELinux Modes
1. Disabled - SELinux enforcement entirely turned off and also the creation of proper labels on the files no
longer takes place.
2. Permissive - The kernel will also continue to create properly labeled files, watch all system access checks,
and report Access Violations in the form of Access Vector Cache (AVC) messages but will allow the access.
3. Enforcing - This tells the system to run with SELinux labeling files with proper contexts, watching all system
access checks, stopping all "Denied" access, and logging all AVC violations.
Setting Up SELinux
1. How do you go about enabling SELinux? If this is a fresh install, you’ll be presented with an option to enable
it on the first boot after installation and “Bob’s your uncle.”
2. More than likely, the system you wish to bring SELinux up on has been running for some time. The first step
is to determine the state of SELinux on the system.
3. Edit the file /etc/selinux/config. Change the lines to look like this:
SELINUX=permissive
SELINUXTYPE=targeted
4. You could go for whole enchilada and go straight from disabled mode to enforcing mode. I do not
recommend this unless you enjoy hordes of enraged users darkening your doorway.
5. If the system has been running in disabled mode, newly created file system objects will not be labeled with
a security context.
6. Anti-hacking Tools
Intrusion Detection
An intrusion detection system (IDS) is a device or software application that monitors network or system activities
for malicious activities or policy violations and produces reports to a management station. IDS come in a variety
of “flavors” and approach the goal of detecting suspicious traffic in different ways
Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging
information about them, and reporting attempts. Organizations use IDPSes for other purposes, such as
identifying problems with security policies, documenting existing threats and deterring individuals from violating
security policies.
Denial of Service
A denial-of-service attack is an attempt to make a machine or network resource unavailable to its intended users.
This could be CPU resources, but often involves efforts to temporarily or indefinitely interrupt or suspend services
of a host connected to the Internet. Defensive responses to denial-of-service attacks typically involve the use of
a combination of attack detection, traffic classification and response tools, aiming to block traffic that they identify
Blackholing and as illegitimate and allow traffic that they identify as legitimate. Tools include firewalls,
Intrusion-prevention systems, DoS Defense System and Blackholing and Sinkholing
Sinkholing
etc.
In blackholing, all
Worms Attack
the traffic to the
attacked DNS or IP
address is sent to a Worms spread by exploiting vulnerabilities in operating systems. Vendors with security
"black hole". problems supply regular security updates and if these are installed to a machine then
In Sinkholing the majority of worms are unable to spread to it. If vulnerability is disclosed before the
routes traffic to a security patch released by the vendor, a zero-day attack is possible.
valid IP address
which analyzes Users need to be suspicious of opening unexpected email and should not run attached
traffic and rejects files or programs, or visit web sites that are linked to such emails. However, as with the
bad packets. ILOVEYOU worm, and with the increased growth and efficiency of phishing attacks, it
remains possible to trick the end-user into running malicious code.
Anti-virus and anti-spyware software are helpful, but must be kept up-to-date with new pattern files at least every
few days. The use of a firewall is also recommended.
1. There are no guarantees with UDP. A packet may not be delivered, or delivered twice, or delivered out of
order; you get no indication of this unless the listening program at the other end decides to say something.
TCP is really working in the same environment; you get roughly the same services from IP and UDP.
3. Routers are quite careless with UDP. They never retransmit it if it collides, and it seems to be the first thing
dropped when a router is short on memory. UDP suffers from worse packet loss than TCP.
1. The operating system may be buggy, and you can't escape it. It may be inefficient, and you have to put up
with it. It may be optimized for conditions other than the ones you are facing, and you may not be able to
retune it.
2. TCP makes it very difficult to try harder you can set a few socket options, but beyond that you have to tolerate
the built in flow control.
3. TCP may have lots of features you don't need. It may waste bandwidth, time, or effort on ensuring things that
are irrelevant to the task at hand.
5. Routers on the internet today are out of memory. They can't pay much attention to TCP flying by, and try to
help it. Design assumptions of TCP break down in this environment.
6. TCP has relatively poor throughput on a loss, high bandwidth, and high latency link, such as a satellite
connection or an overfull t1.
8. TCP cannot conclude a transmission without all data in motion being explicitly hacked.
Overview
1. Payment Modes
Credit Card
Do you know!
Credit card is plastic smart card issued by a bank to customer with a defined credit limit
that the customer can use to purchase goods and services. Customer is also allowed The concept of
a defined number of days to pay the amount back to the bank and after that a fixed using a card for
interest is charged. There are 7 major credit card issuing authorities worldwide -Master purchases was
cards, Visa Cards, American Express cards, Diner's Club cards, Discovery cards, JCB described in 1887 by
cards, Delta cards. Edward Bellamy in
his utopian novel
How Credit Card Works Looking Backward.
1. The customer wants to make the purchase. He/she can use a credit card to pay for the item in the store,
through an online payment gateway, by phone or by mail.
2. The credit card is swiped through a secure credit card terminal, or the card and transaction information is
entered in. For e-commerce transactions, the cardholder keys in the payment option.
3. The credit card data is transmitted for approval as the terminal, POS system or secure payment gateway is
connected to the processing network.
4. Once the data is transmitted, the credit card issuer can approve or decline the transaction. This is based on
the validity of the card, the transaction, as well as the cardholder’s available funds.
5. If the transaction is approved, the processor and the merchant receive an authorization response.
6. The merchant completes the transaction.
7. The merchant completes the credit card payment process at the end of the day with a batch closure. This
closes out the transactions that have been processed on that day. The processor’s acquiring bank then
collects the funds from the credit card issuers.
8. The processor’s acquiring bank then deposits the funds into the merchant’s business account. This typically
takes up to 48 hours.
9. When bank made payment to merchant on behalf of customer (credit card user) then customer will have to
pay this respective credit card payment to respective bank within specific period. Period vary on bank to bank
basis. In case of failure of payment on time the customer is levied with surcharge/interest by bank.
Debit Card
Debit card is again a plastic smart card which is directly linked to card holder's bank account. This card acts like
a cheque with the money withdrawn from the existing account balance. Maestro & Visa Electron are 2 major
service providers that power the debit card and help banks to offer banking services through debit card
internationally.
1. PIN-only cards
2. Dual-use cards
Debit cards give you a fast, easy and secure way to make a purchase or withdraw cash. When you use your
debit card to buy something or withdraw money from an ATM, the transaction usually takes three important
Remember When shopping online, your customers want to know that they are safe. They want to
know that the transactions they make with your Web site are secure, and that they are
Having a merchant not likely to have information stolen by a third party. One of the most trusted names in
account or payment payment gateway security is VeriSign. VeriSign helps protect payment gateways
gateway to process through encryption. It is true that VeriSign used to have its own payment gateway, but
and protect online it was acquired by PayPal. But, even though VeriSign no longer offers a payment
credit card gateway, it does help keep all sorts of Web site payment gateways secure.
payments is
essential to any VeriSign security certificates
online business.
VeriSign uses an encryption method call Secure Socket Layer (SSL) to encode
messages. When you enter your information for a transaction, it is scrambled so that
third parties who might intercept it can’t read it. The seller’s Web site has the proper
key to decode the message and get the information. SSL encryption is also used by
payment gateways to encode it when it is being sent to banks for authorization.
You usually have to pay for your own security certificate. However, in some cases it is
Do you know!
possible to sign on to the certificate offered by your ecommerce Web host. This is
usually cheaper, but it means that you cannot take the certificate with you when you In 2010, VeriSign
change Web hosts. If you want your own validation, you will have to pay more for your sold its
own certificate. Verisign offers various solutions for website and server security. authentication
business unit which
In any case, it is important to have some sort of a security certificate for your business included SSL
Web site. Most online shoppers will check to see if you are adequately protected. The certificate, PKI,
VeriSign name is one that can be trusted, and customers will have peace of mind when VeriSign Trust Seal,
they shop on your site if you have validation prominently displayed. However, it is up and VeriSign Identity
to you to do your research and decide what level of security and validation you want, Protection services
as well as whether you want your own certificate or whether you share with your to Symantec for
ecommerce Web host. $1.28 billion.
UnionPay is a domestic bank card organization. It is also the interbank network linking the ATMs of all banks
throughout mainland China and widely accepted by the ATMs in Hong Kong and Macau. It is also an EFTPOS
(Electronic Funds Transfer at Point of Sale) network.
Visa
Visa Inc. is an American multinational financial services corporation. It facilitates electronic funds transfers
throughout the world, most commonly through Visa-branded credit cards and debit cards. Visa does not issue
cards, extend credit or set rates and fees for consumers; rather, Visa provides financial institutions with Visa-
branded payment products that they then use to offer credit, debit, prepaid and cash-access programs to their
customers.
MasterCard
MasterCard Incorporated is an American multinational financial services corporation. Throughout the world, its
principal business is to process payments between the banks of merchants and the card issuing banks or credit
unions of the purchasers who use the "MasterCard" brand debit and credit cards to make purchases.
OrixCorporation
Orix Corporation is a financial services group. Orix offers leasing, lending, rentals, life insurance, real estate
financing and development, venture capital, investment and retail banking, commodities funds and securities
brokering.
1-Link
1LINK (Guarantee) Limited is a consortium of major banks that own and operate the largest representative
interbank network in Pakistan. The 1LINK brand has grown as their number of member banks increases.1LINK
(Guarantee) Limited is a registered company, incorporated under the company law by Security and Exchange
Commission of Pakistan (SECP).
MNet
MNET Services Private Limited is a Pakistani operator of inter-bank connectivity platform for online financial
transaction processing and offers a managed services portfolio that includes card personalization &
management, mobile payment services and ATM & POS controller hosting.
4. Payment Protocol
Automated Clearing House
Automated Clearing House (ACH) is an electronic network for financial transactions in the United States. ACH
processes large volumes of credit and debit transactions in batches. ACH credit transfers include direct deposit,
payroll and vendor payments. ACH direct debit transfers include consumer payments on insurance premiums,
mortgage loans, and other kinds of bills. Businesses increasingly use ACH online to have customers pay, rather
than via credit or debit cards.
NACHA includes Members in the process of establishing Rules for the ACH Network, working collaboratively to
create a clear picture of participant roles and responsibilities in the following ACH transaction process.
2. Instead of using paper checks, ACH entries are entered and transmitted electronically, making transactions
quicker, safer and easier.
3. The Originating Depository Financial institution (ODFI) enters the ACH entry at the request of the Originator.
4. The ODFI aggregates payments from customers and transmits them in batches at regular, predetermined
intervals to an ACH Operator.
5. ACH Operators (two central clearing facilities: The Federal Reserve or The Clearing House) receive batches
of ACH entries from the ODFI.
6. The ACH transactions are sorted and made available by the ACH Operator to the Receiving Depository
Financial Institution (RDFI).
7. The Receiver’s account is debited or credited by the RDFI, according to the type of ACH entry. Individuals,
businesses and other entities can all be Receivers.
8. Each ACH credit transaction settles in one to two business days, and each debit transaction settles in just
one business day, as per the Rules.
PayPal
PayPal is an option that can be used to take financial transactions over the Web. PayPal allows for secure
payments plus accepts credit cards, debit cards, and bank account payments for a fee.
It's easy to start accepting payments online by integrating PayPal into your website.
Summary of Module
Fundamental coding standards, coding terminologies and coding techniques are followed for improving
the quality of source code. They are hallmarks of a professional web developer.
Unit testing takes the smallest piece of testable software and determine whether it behaves exactly as
you expect. OOP has many benefits like ease of maintenance, reuse of code etc.
Frameworks are used to develop software applications. Spring MVC, JSF, Struts, Codelgenator, zend
and entity framework are examples of open source frameworks.
Entity Relationship Diagram is a graphical representation of entities and their relationships. Normalization
is a process of reducing redundancies of data in a database. Denormalization is the process of attempting
to optimize the read performance of a database by adding redundant data or by grouping data.
Queries are used to retrieve information from a database. Oracle, MS Access, My SQL, MS SQL and
Postgress are different tools to design databases.
Security is achieved using secure Socket Layer a server side security technique, implementing web
services for SET, designing public Key encryption, integrating firewall and using Anti-hacking tools
Credit Card and Debit card are renowned payment modes. Verisign is used to integrate web services.
Union Pay, VISA, MasterCard, 1Link, MNnet and Phoenix are financial networks working internationally.
ORIX ACH and PayPal are integrated into websites for payment processing.
Answer Polymorphism is the ability to assign different meaning or usage to an object based on context.
SSL is the standard for encrypted and authenticated communications between clients and
Answer servers on the Internet. Virtually all online purchases and browser-based financial transactions
that occur on the Internet are secured by SSL.
1. PIN-only cards
2. Dual-use cards
Answer
3. Electronic Benefits Transfer cards
4. Prepaid cards
Test Yourself!
Please mark the correct one from the given options. You can check your answer with the Answer Key at the end of
this module.
a. Inheritance b. Polymorphism
c. Customer d. Developers
5. A ________specifies the actions needed to remove the drawbacks in the current design of
database.
6. Chose the statements which correctly specify a rule to write a SQL statement
a. Seller b. Buyer
a. 1995 b. 1996
c. 1997 d. 1999
9. Most of the electronic payment systems on internet use __________to ensure confidentiality
and security of the payment information.
10. The one that you get from bank when you open your checking account is __________.
Answer Key
MCQ Number Correct Answer
1 b
2 d
3 b
4 c
5 d
6 c
7 d
8 c
9 b
10 a
Learning Outcomes
Overview
Verification and validation assure that a software system meets the user's needs. On completion of this learning
unit, you will be able to understand gap analysis with followed industrial standards, quality assurance audit and
quality control with reference to requirements.
1. Gap Analysis
While a gap analysis can be either concrete or conceptual, gap analysis templates often have in common the
following fundamental components:
Current state
A gap analysis template starts with a column that is labeled as Current State, which lists the processes and
functionalities which needs to be tested.
Required state
The gap analysis report should also contains a column labeled as Required State, which outlines the target
condition we needs to be achieved.
Gap description
This column should first check whether a gap exists between a company's current and required state. If so, the
gap description should then outline what constitutes the gap and the factors that contribute to it.
This final column of a gap analysis report should list all the possible solutions that can be implemented to fill the
gap between the current and required states.
Do you know! Quality assurance audit is method to improve the software. Its goal is to assess
technical quality, form and function with the aim of improving aspects such as ease-of
The first CMMI use, reliability, security and performance.
model was
developed at the Software Quality Assurance
Software
Engineering Institute
SQA generally works on one or more industry standards that help in building software
(SEI) at Carnegie
Mellon University. quality guidelines and implementation strategies
Software Quality
Control is commonly
referred to as
Testing.
The Institute of Electrical and Electronic Engineers (IEEE) is a global association and
organization of professionals working toward the development, implementation and
maintenance of technology-centered products and services.
3. Quality Control
Software Quality Control is the set of procedures used by organizations to ensure that Remember
a software product will meet its quality goals at the best value to the customer, and to
continually improve the organization’s ability to produce software products in the future. In software
engineering a
Software quality control refers to specified functional requirements as well as non- functional
functional requirements such as supportability, performance and usability. It also refers requirement defines
to the ability for software to perform well in unforeseeable scenarios and to keep a a function of a
relatively low defect rate. These specified procedures and outlined requirements leads system and its
to the idea of Verification and Validation and software testing. components. A
function is described
as a set of inputs,
the behavior, and
outputs.
Overview
A non-functional Testing can either be done manually or using an automated testing tool.
requirement 1. Manual - This testing is performed without taking help of automated testing
specifies criteria that tools. Executes the tests cases and reports the result to the manager.
can be used to
judge the operation 2. Automated - This testing is a testing procedure done with aid of automated
of a system, rather testing tools. The limitations with manual testing can be overcome using automated
than specific test tools.
behaviors.
A test needs to check if a webpage can be opened in Internet Explorer. This can be
easily done with manual testing. But to check if the web-server can take the load of 1 million users, it is quite
impossible to test manually.
Testing Approaches
1. Black-Box testing
When functionality is being tested without taking the actual implementation in concern it is known as black-box
testing (as shown below in figure) e.g. using Apache JMeter.
Black-Box
2. White-Box testing
White-box testing (as shown below in figure) is a method of testing software that tests internal structures or
workings of an application, as opposed to its functionality (i.e. black-box testing). e.g. Firebug and Inspect
Element not only functionality is tested but the way it is implemented is also analyzed.
Do you know!
White-Box
Testing Levels
Testing itself may be defined at various levels of Software Development Life Cycle (SDLC). The testing process
runs parallel to software development. Before jumping on the next stage, a stage is tested, validated and verified.
A. Unit Testing
While coding, the programmer performs some tests on that unit of program to know if it is error free.
Testing is performed under white-box testing approach. Unit testing helps developers decide that
individual units of the program are working as per requirement and are error free.
B. Integration Testing
Even if the units of software are working fine individually, there is a need to find out if the units if
integrated together would also work without errors carried out by testing team.
C. System Testing
The software is compiled as product and then it is tested as a whole. This can be accomplished using
one or more of the following tests:
1. Functionality Testing - Tests all functionalities of the software against the requirement.
2. Performance Testing - This test proves how efficient the software is. It tests the effectiveness and
average time taken by the software to do desired task.
3. Security & Portability - These tests are done when the software is meant to work on various platforms
and accessed by number of persons.
D. Acceptance Testing
When the software is ready to hand over to the customer it has to go through last phase of testing where
it is tested for user-interaction and response. This is important because even if the software matches all
user requirements and if user does not like the way it appears or works, it may be rejected.
1. Alpha Testing - Development team tries to find out how user would react to some action in software
and how the system should respond to inputs.
2. Beta Testing - After the software is tested internally, it is handed over to the users to use it under
their production environment only for testing purpose. This is not as yet the delivered product.
E. Regression Testing
Whenever a software product is updated with new code, feature or functionality, it is tested thoroughly
to detect if there is any negative impact of the added code. This is known as regression testing.
Test Case
A set of conditions or variables under which a tester will determine whether a system under test satisfies
requirements or works correctly, as shown in figure.
Test Script
E-Tester
E-Tester is a unit-testing framework for Eiffel. It consists of three groups, which, when added to your system,
will allow for easy development of test suites.
Unit Testing is an important part of Software Development. In fact, proponents of Test Driven Development
(TDD) argue that unit testing should drive the development and even the design of the software. E-Tester
provides a strong full-featured unit-testing framework.
A. Installation on E-Tester
1. Download E-Tester from here http://sourceforge.net/projects/etester/files/
2. Download GUI frontend (JRE required) from here http://sourceforge.net/projects/etester/files/
3. Save the E-Tester library into a local directory.
4. Unzip etester2.1.zip (should create a folder named etester2-dev)
5. Add the etester2-dev cluster to your eiffel system. In EiffelStudio, simply create a project and add the
cluster by going to Project => Project Settings and selecting the Clusters tab. Enter the location of
etester2-dev and name the cluster
B. How to use
After installing E-Tester and E-Tester-GUI, you may begin developing your unit tests as a single class see
example below
Output of E-Tester
E-Tester-GUI displays the output as shown below
PASSED (2 out of 2)
Violation 1 1
Boolean 1 1
All Casses 2 2
Test1 Array_test
Firebug
Firebug is an extension for the Mozilla Firefox browser that allows you to debug and inspect HTML, CSS, the
Document Object Model (DOM) and JavaScript. It is useful for inspect the behavior of HTML/CSS, debug
JavaScript detect performance of website, and track cookies and sessions.
A. Installation on Firefox
1. Open Mozilla Firefox browser and click on the Open Menu, as shown in figure
Error
Open Menu
Add-ons icon
3. Type Firebug into the text area and press Enter, as shown figure.
Search Bar
Install Button
Firebug Button
3. In the current webpage, right click on an element (an image, text, background, etc), and in the dropdown
menu click on Inspect Element with Firebug, as shown in figure.
Inspect Element
Framework
Panels
Panels
Buttons
A. Firebug Options
By using Firebug icon we can view more options like; Text size, Visible plane, etc. as shown in figure.
Firebug Options
B. Inspect Element
The Inspector button allows to select an element on a website for HTML investigation. When checked, it is
possible analyze the html contents in the page simply hovering the elements under inspection with the mouse. It
will be displayed a blue rectangle border around the page elements. The element is also highlighted in blue in
the section Html View; it is possible to modify html contents just clicking on the element, as shown in figure.
C. Go Back / Forward
Go Back / Forward buttons switch to the previous/next panel or location list item of the navigation
history, as shown in figure.
Go Back / Forward
1. Open Firefox and go to your web page (i.e. http://www.navttc.org/introduction.aspx, go to the footer of this
page).
2. Launch Firebug.
3. Press the Inspect Element icon, as shown in figure.
4. Place the cursor on the object to be analyzed (i.e. Home) and click the left button on the mouse to select it
[1]. You’ll see the element code [2] in the HTMLarea, as shown in figure.
Element Selection
5. In this example, you can’t see the image because the file “home30x30.png” was not found. This is a kind of
bug that you can easily find using the Firebug add-on, as shown in figure.
Bug Identification
6. You can check bugs also by clicking on Net button in Panel, as shown in figure.
Bugs Detail
JMeter
1. Apache project that can be used as a load testing tool for analyzing and measuring the performance of a
variety of services, with a focus on web applications.
Java Virtual Machine Sun JDK 5, 6, 7. Sun JDK 5, 6, 7 and Open JDK 6 JDK6
Java Installed
If Java run-time environment is not installed successfully, you will see the output as figure below, as
shown in figure.
You can get the latest version of Java SE Development Kit in the site:
http://www.oracle.com/technetwork/java/javase/downloads/index.html, using this site download and
install the latest version of Java SE Development Kit. After installation, just check java is installed
successfully or not using command “Java – Version” in the command prompt, as shown in figure.
Download Java
Download JMeter
JMeter Folder
C. Start JMeter
Click on the jmeter.bat file inside /bin folder, as shown in figure
JMeter Dashboard
Test Plan
A test plan is composed of a sequence of test components that determine how the load test will be
simulated. We will explain the how some of these components can be used as we add them into our test
plan.
Http Request
2. Ramp-Up Period (in seconds): The duration of time that JMeter will distribute the start of the threads
over. Set this, i.e. 10.
3. Loop Count: The number of times to execute the test. Leave this set to i.e.1.
In HTTP Request Defaults, under the Web Server section, fill in the Server Name or IP field with the name or IP
address of the web server you want to test. Setting the server here makes it the default server for the rest of the
items in this thread group, as shown in figure.
In HTTP Request, under the HTTP Request section, fill in the Path with the item that you want each thread (user)
to request. We will set this to /, so each thread will access the homepage of our server. Note that you do not need
to specify the server in this item because it was already specified in the HTTP Request Defaults item.
Note: If you want to add more HTTP Requests as part of your test, repeat this step. Every thread will perform all
of the requests in this test plan.
You may also type in a value for Filename to output the results to a CSV file.
4. You should see the test results in the table as the test is run, as shown in figure.
1. Latency:
The number of milliseconds that elapsed between when JMeter sent the request and when an initial response
was received
2. Sample Time:
The number of milliseconds that the server took to fully serve the request (response + latency)
According to the table that was generated, the range of Sample Time was 128-164 ms. This is a reasonable
response time for a basic homepage (which was about 55 KB). If your web application server is not struggling for
resources, as demonstrated in the example, your Sample Time will be influenced primarily by geographical
distance (which generally increases latency) and the size of the requested item (which increases transfer time).
Your personal results will vary from the example.
The last phase of the software testing process. During UAT, actual software users test the software to make sure
it can handle required tasks in real-world scenarios, according to specifications. The generic sequential test life
cycle is shown in figure.
Error Log
A document dynamic in nature which contains the current status of all the errors or bugs uncovered during testing
of a software application this comprehensive report must have but not limited to following fields,
1. Test case ID
2. Description
3. Result(s)
4. How to reproduce (sequential steps)
5. Severity level(s) as (Catastrophic, Critical, High, Medium, Low)
6. Test Type as (GUI, Functional, Database, Services, etc.)
7. Priority to Fix
8. Assigned to
9. Executed by
10. Date and Time
11. Status such as (open, closed, pending, rejected,Re-open,etc.)
12. Remarks
13. Attached file, if applicable
Computer systems are used in many critical applications where a failure can have Quality: is
serious concerns (loss of lives or property). The ultimate goal is the ability to conformance to
quantitatively evaluate and trade off multiple software quality attributes to arrive at a requirements.
better overall system. Effectiveness is the
successful delivery
A. Maintainability of producing desired
results.
Suitability for debugging (correction of errors) and for modification and extension of Efficiency ensures
functionality. The maintainability of a software system depends on; the achievement of
maximum
productivity with
minimum waste.
1. Readability
Programming style
Consistency in coding
2. Extensibility
Extensibility allows required modifications at the appropriate locations to be made without undesirable side
effects. Extensibility of a software system depends on its:
3. Testability
Suitability for allowing the programmer to follow program execution (runtime behavior under given conditions)
and for debugging. The testability of a software system depends on its:
Modularity well-structured programs prove more suitable for systematic, stepwise testing than solid,
unstructured programs.
B. Integrity
This concept refers to the protection of the software application and similar files including data. Generally it is
being applied as password protection, user rights, etc.
C. Robustness
Robustness reduces the impact of operational mistakes, invalid input data, and hardware errors.
A software system is robust if the consequences of an error in its operation, in the input, or in the hardware, in
relation to a given application, are inversely proportional to the probability of the occurrence of this error in the
given application.
Frequent errors (e.g. wrong commands, typing errors) must be handled with particular care.
Less frequent errors (e.g. power failure) can be handled more laxly, but still must not lead to irreversible
consequences.
D. Responsiveness
An approach to web page creation that makes use of flexible layouts, flexible images and cascading style sheet
media queries. The goal of responsive design is to build web pages that detect the visitor’s screen size and
orientation and change the layout accordingly. This can be achieved using specialized utilities including twitter
bootstrap.
Procedure of Testing
Learner’s Activities
Description This activity consists of a training session to disable cache in Firebug utility.
Time 30 minutes
Description This activity consists of a training session to check load management with any number
of users for any live web page having user activity.
Time 40 minutes
1. Install JMeter.
2. Open through Batch file.
3. Create Project.
4. Configure number of users.
5. Set the connections to thread, IP and ports
6. Save it.
Summary of Module
Gap analysis checks the gap between current state and required state of a software application. Quality
assurance audit is method to improve the software by comparing to CMMI/ISO/SPICE/IEEE. Quality control
is used to find the defects with reference to requirements.
Quality is the conformance to requirements. Software Testing is the evaluation of software against
requirements gathered from users and system specifications. Software testing techniques are automated;
black, white-box; unit, integration, system; alpha, beta; and regression.
User Acceptance Test (UAT) actually test the software to make sure it can handle required tasks in real-
world scenarios, according to specifications, carried out by customer organization. Error Log is a tabular
form test results.
Maintainability, Security and Robustness are general non-functional software requirements to maintain
quality. Test Case is set of conditions or variables under which a tester will determine whether a system
under test satisfies requirements or works correctly. Test Environment means an infrastructure where fresh
system software applications are installed with minimum requirements. Test team analyzes the customer
requirements to write test cases and then execute them on every build handed over to them.
Testing the end to end functionality of the system as a whole is defined as a functional system
Answer
testing.
Answer Independent testers are unbiased and identify different defects at the same time.
FAQ 7: In web development which tool is good to analyze and measuring the performance.
Answer Apache project tool is good to analyze and measuring the performance.
After the software has changed or when the environment has changed Regression testing
Answer
should be performed.
Re-testing ensures the original fault has been removed; regression testing looks for
Answer
unexpected side effects.
Black box testing is the software testing method which is used to test the software without
Answer
knowing the internal structure of code or program.
Test Yourself!
Please mark the correct one from the given options. You can check your answer with the Answer Key at the end
of this module.
a. ISO b. ANSI
a. Alpha b. Beta
a. White-box b. Regression
c. Re-Testing d. Load
a. Security b. Functionality
c. Stress d. GUI
7. What is Quality?
c. Checking d. Standards
Answer Key
MCQ Number Correct Answer
1 a
2 b
3 d
4 b
5 a
6 c
7 b
Module 4: E-Marketing
Learning Outcomes
Overview
SEO stands for Search Engine Optimization. It is used to optimize a website for search Crawling
engines. After completion of this learning unit, you will be able to understand SEO
Methods like Getting Indexed, Preventing Crawling, and Increasing Prominence, Process of fetching
demonstrate techniques of SEO such as implement Black Hat and White hat, Employ all the web pages
SEO Keywords and Use SEO tools like Fire bug 2.0 and Inspect Element. linked to a website.
This task is
performed by
software called
crawler or spider.
1. SEO Methods
Getting Indexed
Search engines use crawlers to find pages for their algorithmic search results. Pages
Do you know!
that are linked from other search engine indexed pages do not need to be submitted
because they are found automatically. Two major directories, the Yahoo Directory and
In March 2007,
DMOZ both require manual submission and human editorial review. Google offers
Google warned web-
Google Webmaster Tools, for which an XML Sitemap feed can be created and
masters that they
submitted for free to ensure that all pages are found, especially pages that are not
should prevent
discoverable by automatically following links.
indexing of internal
search results
Search engine crawlers may look at a number of different factors when crawling a site. because those
Not every page is indexed by the search engines. Distance of pages from the root pages are
directory of a site may also be a factor in whether or not pages get crawled. considered search
spam.
Preventing Crawling
To avoid undesirable content in the search indexes, webmasters can instruct spiders
not to crawl certain files or directories through the standard robots.txt file in the root Remember
directory of the domain. Additionally, a page can be explicitly excluded from a search
Robot.txt is file
engine's database by using a metatag specific to robots.
which gives
instructions on what
When a search engine visits a site, the robots.txt located in the root directory is the firstnot to spider within
file crawled. The robots.txt file is then parsed, and will instruct the robot as to which your Web site.
pages are not to be crawled. As a search engine crawler may keep a cached copy of
this file, it may on occasion crawl pages a webmaster does not wish crawled. Pages typically prevented from
being crawled include login specific pages such as shopping carts and user-specific content such as search
results from internal searches.
Increasing Prominence
A variety of methods can increase the prominence of a webpage within the search results.
Cross linking between pages of the same website to provide more links to important pages may improve
its visibility.
Do you know! Writing content that includes frequently searched keyword phrase, so as to be
relevant to a wide variety of search queries will tend to increase traffic.
Search engines may
penalize sites they Updating content so as to keep search engines crawling back frequently can
discover using black give additional weight to a site.
hat methods, either
by reducing their Adding relevant keywords to a web page's metadata, including the title tag and
rankings or Meta description, will tend to improve the relevancy of a site's search listings,
eliminating their thus increasing traffic.
listings from their
databases
URL normalization of web pages accessible via multiple URLs, using the
altogether.
canonical link element or via 301 redirects can help make sure links to different
versions of the URL all count towards the page's link popularity score.
2. SEO Techniques
1. White Hat SEO - Techniques that search engines recommend as part of a good design.
2. Black Hat SEO - Techniques that search engines do not approve and attempt to minimize the effect.
These techniques are also known as spamdexing.
Some examples of White Hat SEO techniques include using keywords and keyword analysis, back linking, link
building to improve link popularity, and writing content for human readers.
An SEO tactic, is considered as Black Hat or Spamdexing if it has the following features:
i. Attempting ranking improvements that are disapproved by the search engines and involve deception.
ii. Redirecting users from a page that is built for search engines to one that is more human friendly.
iii. Redirecting users to a page that was different from the page the search engine ranked.
iv. Serving one version of a page to search engine spiders/bots and another version to human visitors. This
is called Cloaking SEO tactic.
v. Using hidden or invisible text or with the page background color, using a tiny font size or hiding them
within the HTML code such as "no frame" sections.
vi. Repeating keywords in the metatags, and using keywords that are unrelated to the website content.
This is called metatag stuffing.
vii. Calculated placement of keywords within a page to raise the keyword count, Remember
variety, and density of the page. This is called keyword stuffing.
Always follow a
viii. Creating low-quality web pages that contain very little content but are instead White Hat SEO
stuffed with very similar keywords and phrases. These pages are tactic and do not try
called Doorway or Gateway Pages. to fool your site
visitors. Be honest
ix. Mirror websites by hosting multiple websites - all with conceptually similar and you will
content but using different URLs. definitely get
something more.
x. Creating a rogue copy of a popular website which shows contents similar to
the original to a web crawler, but redirects web surfers to unrelated or malicious websites. This is
called page hijacking.
Always stay away from any of the above Black Hat tactics to improve the rank of your site. Search engines are
smart enough to identify all the above properties of your site and ultimately you are not going to get anything.
Grey Hat
Another category sometimes used is grey hat SEO. This is in between black hat and white hat approaches where
the methods employed avoid the site being penalized however do not act in producing the best content for users,
rather entirely focused on improving search engine rankings.
3. SEO Keywords
A keyword, in the context of search engine optimization, is a particular word or phrase that describes the contents
of a Web page. Keywords are intended to act as shortcuts that sum up an entire page. Keywords form part of a
Web page’s metadata and help search engines match a page to with an appropriate search query.
For example, car is a keyword. It seems simple enough: just figure out a couple of great keywords and go!
Unfortunately, there’s more to picking keywords than that. Say you’ve got a Web site that specializes in selling
custom-made classic automobiles. But the site isn’t receiving the traffic (number of visitors) it should. Here’s a
tip: Think about what kind of keywords you used in your Web site. You might be using general words like
[automobiles] and [vehicles], but how many people actually type in a search query of [classic automobiles]? Nine
times out of ten people are going to be looking for [classic cars]. Little distinctions like this can make a big
difference in the traffic you’re receiving.
Targeting users in different languages and countries is always challenging for web content strategists and web
content authors whenever they create multilingual content for global campaigns. In most cases, the content is
translated from a source language into other languages. It is not as common that content would be created
natively in each target language. For multilingual content to have the desired results including:
2) users acting on it
You will always need to consider the find ability and usefulness of the content in the new language in order for it
to be effective.
1. Firebug 2.0
Firebug is one of the most important SEO plugins for Firefox. It’s an invaluable part of search marketer’s
toolkit.
2. Inspect Element
Inspect element is a developer tool that allows you to see the HTML, CSS, and JavaScript that is currently
on a webpage.
On nearly any webpage you right click and select “inspect element”. This pull ups the developers console where
you see the HTML and CSS of the webpage. You can also access other developer tools like a mobile device
emulator and a list of the network’s GET and POST requests.
I. Elements
II. Network
Shows all the GET and POST requests that are made while the developers console is open. You can also
identify the requests that are taking the longest to process.
III. Sources
Allows you to see the JavaScript files (and other files) associated with the page. This
Do you know! is most used for debugging as a web page is being developed, but can be helpful for
coding your own JavaScript in Qualtrics as well.
Qualtrics is a private
research software
The timeline shows you where time is invested when a web page is loaded/ refreshed.
company based in
It logs GETs, PUTs, calculations, parsing JavaScript, etc.
Provo, Utah.
IV. Profiles
Also helps see where time is being spent on a page. You can record time spent by function, by JavaScript
Object, and by script
V. Resources
Let’s you inspect the resources that are loaded onto a page. (i.e. cookies)
Audits: Analyzes a page as it is loading and then gives suggestions to decrease the load time
VI. Console
This is a JavaScript console where you can try out code as if you were coding it for the webpage. You can
use it to log information about your debugging, to test out code snippets, etc.
The procedure of using Google webmaster an automated SEO tool has the following steps:
1. Sign in to GWMT using your Gmail account. From there, you’ll enter the URL of your website. You’ll also
need to verify that you’re the owner of the site.
2. Once you’ve set up and verified your account, you’ll be able to access the GWMT from one dashboard.
Following are the tabs on the left.
Site Messages
Search appearance
a) Structured data
When you do a search, you’re presented with a list of relative links. Each link has a brief description under
it, which helps users decide which link is best suited for their needs. For example, when you Google “Best
Italian restaurant in Miami,” you get these results with snippets under each link.
You can control what those snippets say about your business creating structured data, which is what
Google uses to create your snippet.
b) Data highlighter
A tool to teach Google what’s important on your site. Highlight certain types of data and categorize it. For
instance, if a local hotel highlights text about its upcoming concert series and categorizes it under “event,”
Google will showcase it in a search like this:
There are several kinds of data that you can highlight including: articles, events, local businesses,
restaurants, products, software applications, movies, TV episodes and books.
Like the structured data tool, you’re telling Google what information should show up when your site is
searched.
c) HTML Improvements
If there is something you can do to make your user’s experience better, Google will let you know in the
HTML improvement section. Here’s a look at what might appear:
You might see suggestions like “duplicate meta descriptions.” You’d fill out this field to describe a particular
entry. For example, when you write a blog post, you’d put a brief description of the post in the Meta
description field. You don’t want duplicates, so Google will warn you about something like that in the HTML
improvement section.
You’ll also see title tag suggestions. These titles are what show up as links in the search. For example,
when you search “Vertical Response,” the purple text is the title tag and clickable link. These suggestions
will help you fine tune your titles so searchers know what your site is all about.
d) Site links
You know those additional links that show up under the search results? They’re called site links. For
instance, when you search “Vertical Response” you not only get the link to the main page, you also get a
series of other links, like the “Log In” and “Pricing” links that you see below. These are site links.
Right now, Google selects these links for you, but through this tab on GWMT, you can demote a link if you
don’t want it to appear in your search results. Just put in the URL of that particular page and click “demote.”
Search Traffic
a) Search queries
This is probably the most beneficial tab on the GWMT. Here you’ll find out how people get to your website.
Impression
Clicks
You’ll see a list of search terms that led people to your site, which is a valuable tool. You assume you know
which words people are using to find your site, but this list can reveal terms that you weren’t even thinking
of.
Business owners can use this information to add products, remove under-performing products, and create
relevant blog content that uses these keywords.”
The search queries page will also show you a graph of impressions and clicks.
To keep these stats high, one of the best ways is to keep your site updated regularly with high quality
content.
Click Through Rate This section tells you who links to your site and how. It’s organized in basic
categories like “Who links the most” and “Your most linked content.” The more quality
The click through rate sites that link to yours, the better your Google ranking. If you’re providing quality
is the percentage of content, other sites will link to your content naturally.
impressions that
resulted in a click to
your site.
c) Internal links
To improve navigation on your site, you’ll want to provide internal links. For instance, on this Vertical
Response page “Check it out” and “Apply now” are two internal links that take customers to another spot
within the website.
Remember
Internal links make it easier for people to surf your site and tell Google the importance of a page.
Manual Actions
This tab is another way for Google to communicate with you. If there are any actions that you need to
worry about, Google will let you know.
Google Index
a) Index status
This tab shows you the total number of URLs that Google has recognized and will appear in search results.
Google finds these URLs with a ton of computers that “crawl” through the Internet to look for new and
updated pages online. Once a new page or an update is found, the Googlebot scans it for important
information and indexes it so it can be found during a search.
The index tab shows you the number of URLs the bot found. It tells you Google can find and index your
site. A steady increase in the number of URLs is proof that Google can find your site and catalog the
content on it. Here’s a good example.
Remember
b) Content Keywords
This is a list of the most significant keywords that are used throughout your site.
The keywords are listed in order of usage, with the most used keywords at the top. You can click on each
word and see where it appears on your site. This information, along with the search queries information,
can tell you how Google interprets your business site.
c) Remove URLs
If Google has indexed a part of your website that contains confidential information, you can send a request
to have that URL removed. This should only be used for emergency cases, like exposed confidential data.
Crawl
a) Crawl errors
As the Googlebot crawls through your site, it will list any errors it finds with your site. Here’s a look at a
typical list of crawl errors.
Do you know!
b) Crawl stats
This shows you how often Google is crawling your site. You’ll want to check this graph from time to time
to make sure that Google is scanning through your content.
c) Fetch as Google
This handy tool lets you see a webpage the way Google does. Just enter a URL and hit “Fetch.”
Remember
This option is particularly helpful if you’re trying to troubleshoot issues with your page.
d) Blocked URLs
If you have content on your site that you’ve blocked from Google on purpose, you’ll see a list of those links
here.
e) Sitemaps
f) URL parameters
g) Malware
If your site has fallen victim to hackers, Google will let you know. You can also request a malware review
from Google to make sure all infected areas are clear.
h) Security issues
This tab is another way for Google to get in touch with you should there be any security concerns. It’s just
another inbox-like feature that you should monitor.
Additional Tools
You’ll find some helpful resources in this section. Here are the most important and easy-to-use tools.
Remember
Google Places
You can add location of your business with this. A map with a pin showing your location will appear in
search results.
When you Google “new shoes,” a list of relevant links come up along with several pictures of products.
With this you can improve the chances of your products showing up in these product listing ads. You’ll be
able to enter information about your product and improve your search ability.
Use the Page Speed Insights tab to see just how fast your page loads on both a desktop computer and a
mobile device. Check out the report below.
You’ll get a rating. In this case, the desktop rating is 81/100. To improve the speed, it gives you a list of
things you can change to make your page load faster.
Labs
Author stats
It shows you what articles are getting read so you can adjust your topics accordingly.
Instant preview
It also tells you if there are any errors as the bot works to preview the page.
Learner’s Activity
Description: This activity consists of an interactive session in the class about importance of applying white
hat SEO technique to make it search engine friendly.
Time 30 Minutes.
Guideline:
Presentation:
1- Divide the class into groups of five
2- Brief the groups about the activity that each group will apply any white hat SEO
technique.
Overview
Procurement In this learning unit, you will be introduced to supply chain management concepts and
principles. Also, some techniques and methods involved in supply chain management
It is the purchase of will be discussed. After completion of this learning unit, you will be able to demonstrate
goods and services method of procuring goods including request for proposal, tendering, biding,
at the best possible comparative statement and award of contract. In addition, you will also be able to
price to meet a demonstrate the techniques of inventory control and reverse supply chain
purchaser's demand management.
in terms of quantity,
quality, dimensions
and site.
1. Procurement Cycle
The Procurement cycle is the cyclical process of key steps which is used to procure goods or services. It starts
from identification of a need through to the process of selecting the supplier, managing their performance and
reviewing lessons learnt. A typical procurement cycle has been shown in the following illustration:
Comparison of Bids
Request for
Proposal (RFP) Award of Contract
It is an early stage in
a procurement
process issuing an
invitation for Maintenance
suppliers, often
through a bidding
process, to submit a
proposal on a
specific commodity
or service.
After receiving tenders and bids, a comparative statement of potential suppliers/bidders Do you know!
is prepared. The comparative statement includes information about competing
organizations on aspects such as technical, operational, financial and past experience The agreed terms
in the relevant field. It helps business owners and managers in short listing the best and conditions help
supplier against the RFP. This document shows the quoted prices comparison, to minimize
provided by the bidders to compete. contractual risks and
exposure when
doing business.
4. Award of Contract
Once the supplier has been selected, a contract is typically developed which allows both parties to fully
understand their obligations and key success criteria as a part of the agreement. Once the contract and terms
are agreed then the communication and implementation process can begin with clear timescales and parameters
set out on both sides, including relevant stakeholder groups to manage the implementation effectively.
Remember
Just-in-time
Just-In-Time (JIT) is a very simple idea but one that is essential in modern supply chain management. JIT sets
out to cut costs by reducing the amount of goods and materials a firm holds in stock. JIT involves:
The principle that underpins JIT is that production should be ‘pulled through’ rather than ‘pushed through’. This
means that production should be for specific customer orders, so that the production cycle starts only once a
customer has placed an order with the producer. Stocks are delivered when they are needed. Consequently, this
approach requires much more frequent delivery of stocks.
At the time of placing orders the customer is provided with a token/ ticket automatically
generated. This token/ ticket is used to track & trace the status of the parcel/ order.
Outsourcing This includes not just the outsourcing of the procurement of materials and components,
but also the outsourcing of services that traditionally have been provided in house. The
A practice used by logic of this trend is that the company will increasingly focus on those activities in the
different companies value chain in which it has a distinctive advantage and outsource everything else. This
to reduce costs by movement has been particularly evident in logistics, where the provision of transport,
transferring portions warehousing, and inventory control is increasingly subcontracted to specialists or
of work to outside logistics partners. Also, managing and controlling this network of partners and suppliers
suppliers rather than requires a blend of central and local involvement: strategic decisions are taken
completing it centrally, while the monitoring and control of supplier performance and day-to-day
internally. liaison with logistics partners are best managed locally.
Reverse logistics is the process of managing the return of goods. It is also referred to as "aftermarket customer
services". Any time money is taken from a company's warranty reserve or service logistics budget, one can speak
of a reverse logistics operation.
Remember
Reverse logistics is
more than just the
reverse version of
your forward supply
chain.
Reverse logistics is also the process of managing the return of goods from store, which the returned goods are
sent back to warehouse and after that either warehouse scrap the goods or send them back to supplier for
replacement depending on the warranty of the merchandise.
Electronic Data Interchange (EDI) is the computer-to-computer exchange of business documents in a standard
electronic format between business partners.
By moving from a paper-based exchange of business document to one that is electronic, businesses enjoy major
benefits such as reduced cost, increased processing speed, reduced errors and improved relationships with
business partners.
Methods
EDI replaces postal mail, fax and email. While email is also an electronic approach, the documents
exchanged via email must still be handled by people rather than computers. Having people involved slows
down the processing of the documents and also introduces errors. Instead, EDI documents can flow straight
through to the appropriate application on the receiver’s computer (e.g., the Order Management System) and
processing can begin immediately. A typical manual process looks like this, with lots of paper and people
involvement:
The EDI process looks like this …..No paper ………No people involved.
2. Value-added networks
To address the limitations in peer-to-peer adoption of EDI, VANs (value-added networks) were established. A
VAN acts as a regional post office. It receives transactions, observes the 'from' and the 'to' information, and routes
the transaction to the final recipient. VANs may provide a number of additional services, e.g. retransmitting
documents, providing third party audit information, acting as a gateway for different transmission methods, and
handling telecommunications support. Because of these and other services VANs provide, businesses frequently
use a VAN even when both trading partners are using Internet-based protocols.
telecommunication companies;
3. Internet
As more organizations connected to the Internet, eventually most or all EDI was pushed onto it. Initially, this was
through ad-hoc conventions, such as unencrypted FTP of ASCII text files to a certain folder on a certain host,
permitted only from certain IP addresses.
Formats
Overview
Social media marketing refers to the process of gaining traffic or attention through social Social Media
media sites. On completion of this learning unit, you will be able to understand brand
page creation on social networking sites like Facebook, integrating banner ads, These are websites
regularly updating blogs, and direct marketing techniques like email and SMS and applications that
marketing. enable users to create
and share content or
to participate in social
networking.
Social media marketing (SMM) is a form of Internet marketing that utilizes social
Remember
networking websites as a marketing tool. The goal of SMM is to produce content that
users will share with their social network to help a company increase brand exposure Federal Trade
and broaden customer reach. Commission (FTC)
has its rules to
include SMM.
SMM became more common with the increased popularity of websites such as Twitter, Facebook, Myspace,
LinkedIn and YouTube. According to marketing aspects OLX, E-Bay, Amazon etc. are more popular.
1. Facebook
Facebook is undoubtedly the most popular social media platform available with many advantages associated
with it. It is primarily a social networking site, it lets you invite and connect with friends, send messages and
pictures, like and comment or share them. However it can be used as a handy tool for promoting and advertising
a business. We can use Facebook to promote a brand, market a company, or create awareness about a service
or a product.
Do you know!
Facebook was
founded by Harvard
student Mark
Zuckerberg on
February 4, 2004.
2. Twitter
Twitter marketing is a powerful tool for companies of every size and structure to reach out to new customers,
promote their brand, and connect with the rest of the companies. Users can find out if customers are talking about
them, and the business can accordingly respond. Tweets create another instance for the business that shows up
in the search engine results. Twitter serves as a solid foundation for your business to branch out into other social
sites.
Tweet
3. LinkedIn
LinkedIn is a professional networking platform and it has all the features of a great
Do you know!
marketing opportunity provider. Here you interact with people who mean business. To
On March 21, 2006, market through LinkedIn, you need to do the following.
Jack Dorsey sent
the first ever tweet − Build a robust business page that displays your products and services in a
"just setting up my compelling format.
tweets".
Invite clients and vendors to follow and recommend your page.
Launch a group that is related to your business. It can attract significant traffic.
LinkedIn is a powerful social media tool. You just need to follow its policies and best practices.
4. Google +
1. Go to facebook.com/pages/create
Do you know!
3. Select a more specific category from the dropdown menu and fill out the required information
4. Click Get Started and follow the on-screen instructions
5. To understand the Admin Panel, in the top navigation, click "Settings." Sections would appear. Focus on three
core :
Page Info: This is where you can add additional details about your business.
Notifications: This section allows you to customize when and how you'd like to receive Page alerts.
Page Roles: Whether or not you'll be the main manager of the Page, there may be others at your
organization that needs access to your Facebook Page. Here, you can invite other colleagues a public
relations manager, a support, a designer.
6. Populate page with content. Basic content needed to get your Page kicking includes.
Posts: Facebook currently provides posting options for Plain text status, Photo with caption, Link with
caption, Video with caption, Event page and Location check-in
Do you know! Cover Photo: This is the large, horizontal image that spans the top of your
Facebook Page.
Some popular free
7. After adding content on the Page, users can be invited to like it.
banner design sites
are Make Your 8. Measure Your Growth by simply clicking the "Insights" option in the top navigation to
Banner.com ABC see the Overview, Likes, Reach, Visits.
Banners Atomic
You have a Facebook business page. Now go post interesting content and amass a
Arts.
loyal base of Fans!
Banner ads is an image placed at the top or bottom of a web page of any website, to catch the viewer's eye and
possibly prompt them to click on it. The purpose of banner advertising is to promote a brand and/or to get visitors
from the host website to go to the advertiser's website.
The host is paid for the banner advertisement through one of three methods: Remember
Cost per impression (payment for every website visitor who sees the ad) Research suggests
Cost per click (payment for every website visitor who clicks on the ad and visits that people read
the advertiser's website) only 16% of the
words on the verage
Cost per action (payment for every website visitor who clicks on the ad. goes to web page.
the advertiser's website and completes a task such as filling out a form or
making a purchase).
Blogging can help you to market you brand/product/service widely and effectively. The
more people visiting your blog, the more sales you can make. You need to update your Blog
blog regularly to keep your readers coming back
It is short for ‘Web
log’. A regularly
1. Understand you customer updated web page,
typically run by an
Clearly defining customer will give you the information you need to transform product- individual or small
centric descriptions into customer-centric descriptions. Visualizing your buyer will group that is written
empower you to make your descriptions more vivid, personal, and persuasive. in a formal or
conversational style.
List all of your features and specs, and then translate them into benefits. A feature is a fact about your product,
while a benefit is an explanation of what that feature does for your reader. A benefit can be phrased as a positive
(e.g., improves productivity) or as a problem that’s avoided or reduced (e.g., decreases stress).
A skilled blogger knows how to write blog posts with SEO in mind in order to get your blog noticed by search
engines such as Google. SEO is critical to driving traffic to your blog.
Remember
Learner’s Activity
Description: This activity consists of an interactive session in the class about direct marketing technique
like email marketing.
Time 30 Minutes.
Guideline:
Presentation:
1- Divide the class into groups of five.
2- Brief the groups about the activity that each group will create an email marketing plan
for some class event.
Summary of Module
E-marketing means using digital technologies to help selling your goods or services. These technologies
are a valuable complement to traditional marketing methods whatever the size of your company or your
business model.
SEO methods (getting indexed, Preventing Crawling and Increasing prominence) are used for
optimization purposes.
Techniques such as (white hat, Black hat and Grey hat) are employed to get high ranking for your
ecommerce site.
Keywords play an important role in SEO campaigns because they guide search engine users to your
website.
Supply chain management covers the application of procurement, purchasing and supply, logistics,
transport, and operations management.
Brand pages are created on social networking sites, banner ads are integrated, blogs are updated and
direct marketing techniques are used for social media marketing.
There are many reasons that you, as a web page designer or owner, want to have good Search
Engine Optimization results. The main reason is to get people to come to your web page (good
web traffic). If you have a counter (and I will put a link here on the page to get one) you can see
Answer
how many people come to your page each day. If you check other popular sites, you may be
able to see that they get a LOT of people there each day. The more people that come to your
page, the more successful your site will be.
Good Search Engine Optimization will help you get better ratings. One reasons for that is that
sites that rate high on search engines get more clicks because people see them sooner. Also, if
Answer people like your page, they will link to it -- either on their page or on their "favorites" section of
their browser. You don't have to fix everything at once, but if you work at it, you will improve your
page.
FAQ 4: In supply chain management how to track and trace the product delivery to customer
At the time of placing orders the customer is provided with a token/ ticket automatically
Answer
generated. This token/ ticket is used to track & trace the status of the parcel/ order.
FAQ 5: What are the methods of EDI
It is possible to retain a high ranking, as long as you are aware of the factors that affect your
ranking. If you know what search engines are looking for, it is easier to determine a plan of action.
In particular, quality content is a very important factor in ranking. Google ranks content by what
it thinks will be the most useful to searchers. Another thing that you should do is focus on local
Answer listings. These listings will help to strengthen your overall presence online.
In a nutshell, the best way to rank right now is focus on your patients and what will be the most
useful to them. Your patients need to know where to find you, what services you offer, and how
those services are beneficial.
Google uses an algorithm to determine which results show up in search results. The algorithm
is a set of programs and formulas that look for clues in the index to find content relevant to your
search query. Currently, there are more than 200 of these signals, or clues, that the algorithm
Answer
looks for to determine what results to show. So, every time you search for something on Google,
the algorithm looks for these 200 clues to provide you with results. Amazingly enough, the
algorithm can do all of that within 1/8 of a second!
Answer Not engaging in White Hat SEO can get your site banned from Google and other search engines!
Test Yourself!
Please mark the correct one from the given options. You can check your answer with the Answer Key at the
end of this module.
1. SEO is to improve the volume and _________ to a website from search engines.
2. _______ is the process of fetching all the web pages linked to a website.
c. Indexing d. Crawling
a. Crawler b. Spider
c. A term used to describe people who are d. The description given to the practice of
bad at SEO. developing the content of your website so
that the search engines like it.
6. Why might deciding on your website's keyword yourself not be a good idea?
a. You're not an expert on SEO b. You know nothing about your products
c. You don’t know what keywords searchers d. You are too busy doing other things
might use
a. Buying links from link farms b. Having the same page twice in html, once
in pdf.
c. Using hidden text that users don’t see but d. Stuffing the metatags with keywords
spiders can read
a. The Alexa technology for ranking pages. b. The way Yahoo! measures how popular a
given page is based on the number and
quality of sites that link to it.
c. The search relevancy of a page d. The way Google measures how popular a
compared to the other pages in the given page is based on the number and
search engine quality of sites that link to it.
a. The physical material moves in the b. Flow of cash backwards through the chain
direction of the end of chain
Answer Key
MCQ Number Correct Answer
1 c
2 d
3 d
4 b
5 b
6 c
7 a
8 d
9 a
10 d
Learning Outcomes
Overview
Code of Ethics and Professional Conduct describes the expectations that we have of ourselves and our fellow
workers in the workplace. It expresses the ideals to which we aspire as well as the behaviors that are mandatory
in our professional roles. On completion of this learning module you will be able to understand the concepts of
responsibility, respect, fairness and honesty at workplace.
1. Responsibility
Description of Responsibility
Remember
Responsibility is our duty to take ownership for the decisions we make or fail to make,
the actions we take or fail to take, and the consequences that result.
In case of a
contracting
arrangement, only
bid on work that
Responsibility: Aspirational Standards organization is
qualified to perform
As professionals in the workplace: and assign only
qualified individuals
1. We make decisions and take actions based on the best interests of society, to perform the work.
public safety, and the environment.
2. We accept only those assignments that are consistent with our background, experience, skills, and
qualifications.
4. When we make errors or omissions, we take ownership and make corrections promptly. When we
discover errors or omissions caused by others, we communicate them to the appropriate body as soon
they are discovered. We accept accountability for any issues resulting from our errors or omissions and
any resulting consequences.
As professionals in the workplace, we require the following of ourselves and our fellow workers:
1. We inform ourselves and uphold the policies, rules, regulations and laws that govern our work,
professional, and volunteer activities.
2. We report unethical or illegal conduct to appropriate management and, if necessary, to those affected by
the conduct.
Ethics Complaints
1. We bring violations of this Code to the attention of the appropriate body for resolution.
3. We pursue disciplinary action against an individual who retaliates against a person raising ethics
concerns.
2. Respect
Description of Respect
It is our duty to show a high regard for ourselves, others, and the resources entrusted to us. Resources entrusted
to us may include people, money, reputation, company profile, tangible assets (equipment’s), the safety of others,
and natural or environmental resources. An environment of respect engenders trust, confidence, and
performance excellence by fostering mutual cooperation—an environment where diverse perspectives and views
are encouraged and valued.
1. We inform ourselves about the norms and customs of others and avoid engaging in behaviors they might
consider disrespectful.
As professionals in the workplace, we require the following of ourselves and our fellow workers:
Conduct that results 2. We do not exercise the power of our expertise or position to influence the
in physical harm or decisions or actions of others in order to benefit personally at their expense.
creates intense
feelings of fear, 3. We do not act in an abusive manner toward others.
humiliation,
manipulation, or 4. We respect the property rights of others.
exploitation in
another person.
3. Fairness
Description of Fairness
Fairness is our duty to make decisions and act impartially and objectively. Our conduct must be free from
competing self-interest, prejudice, and favouritism.
2. We constantly re-examine our impartiality and objectivity, taking corrective action as appropriate.
3. We provide equal access to information to those who are authorized to have that information.
As professionals in the workplace, we require the following of ourselves and our fellow
workers: Remember
A conflict of interest
Conflict of Interest Situations
occurs when we are
in a position to
1. We proactively and fully disclose any real or potential conflicts of interest to the
influence decisions
appropriate stakeholders.
on behalf of one
party when such
2. When we realize that we have a real or potential conflict of interest, we refrain
decisions or
from engaging in the decision making process or otherwise attempting to
outcomes could
influence outcomes, unless or until: we have made full disclosure to the affect other parties
affected stakeholders; we have an approved mitigation plan; and we have
with which we have
obtained the consent of the stakeholders to proceed. competing loyalties.
Favouritism and Discrimination
1. We do not hire or fire, reward or punish, or award or deny contracts based on personal considerations,
including but not limited to, favouritism, nepotism, or bribery.
2. We do not discriminate against others based on, but not limited to, gender, race, age, religion, disability,
nationality, or sexual orientation.
3. We apply the rules of the organization (employer, Project Management Institute, or other group) without
favouritism or prejudice.
4. Honesty
Description of Honesty
Honesty is our duty to understand the truth and act in a truthful manner both in our communications and in our
conduct.
As professionals in the workplace, we require the following of ourselves and our fellow workers:
1. We do not engage in or condone behavior that is designed to deceive others, including but not limited to,
making misleading or false statements, stating half-truths, providing information out of context or
withholding information that, if known, would render our statements as misleading or incomplete.
2. We do not engage in dishonest behavior with the intention of personal gain or at the expense of another.
Learner’s Activity
Role play on responsibility in workplace
Description: This activity consists of role play in the class about duty to take Ownership
for the decisions/actions s/he makes or fails to make and their
consequences in workplace.
Presentation: 1- Call two volunteers from the class one who will act as employer and
other as employee.
2- Brief them about role play that employee will confess about a
decision who he made and resulted in a loss to company and he
has planned to make it right.
3- Learners will perform the role play.
4- Discussion will be made what learners learnt from this role play.
Overview
Planning activities play an important part in business process. On completion of this learning unit, you will be
able to understand how you can provide assistance to an in-line manager, identify tasks, schedule them, define
milestones and learn optimal utilization of resources.
We can create a resource availability output for managers which describes the time frame in which resources
(both human and material) are available. This helps managers estimate the types of resources they might need
for project. For example if they are working on a project that requires the use of specialized equipment during
one of the project phases and the resource availability document shows that this equipment is not available until
sometime after the time frame in which they need it, they know they will need to either make schedule adjustments
or find another supplier who can provide the equipment when they need it. The same is true for human resources.
A common need among businesses is the ability to describe their processes in a way that their stakeholders will
quickly understand. The primary tool for describing business processes is the business process documentation.
Since no standard exists, a business process documentation can be developed that meets the needs of each
particular organization.
Virtually all companies possess service standards and measures that are company defined. We should provide
assistance to manger to validate the applicable company defined standards that are established to reach internal
company goals for productivity, efficiency, cost, or technical quality.
2. Define Activities
Defining activities by applying specific life cycle methodologies like requirement gathering, designing solutions,
testing and documentations etc.
Requirements gathering is an essential part of any life cycle methodology. During requirement
Understanding fully what a project will deliver is critical to its success. Requirement gathering, don't
gathering processes are the stakeholder meetings or interviews. assume you know
what the customer
Design solution wants, ask.
The design stage takes as its initial input the requirements identified in the approved requirements document and
gathered during the first phase. For each requirement, a set of one or more design elements will be produced.
Prototype
A prototype which is a draft version of a product that allows you to explore your ideas and shows the intention
behind a feature or the overall design concept can be created before investing time and money into development.
A prototype can be anything from paper drawings to something that allows click-through of a few pieces of content
to a fully functioning site.
Testing
Testing provides information about the product, and it is the first feedback to the Do you know!
developers. Testing helps people (the developers, the testers, the managers, the
customers) understand what the product does and how well it does it. Project
documentation is
Documentations used to define the
way we manage
projects and the
Every step in the project is documented for future reference and for the improvement
governance
of the system in the development process. The design documentation may include
surrounding them.
writing the application programming interface (API)
The aim of effective project management is to bring the project to completion on time and on schedule. Estimating
project duration is a key function of scheduling. Individual activities make up the schedule, and the estimates of
their duration determine the project timetable. The accuracy of the overall schedule depends on the accuracy of
these estimates. While project managers can't know the actual time it will take to complete an activity, there are
six methods they can use to obtain reliable estimates.
1. Work Breakdown
A work breakdown technique to reduce the activity to smaller tasks and estimate the duration of tasks that
individual workers perform more accurately than the whole activity.
2. Historical
An effective way of estimating activity duration is to use historical data. If data on the duration of the same
activities is available, project managers take the average duration of the historical records and use that in the
project schedule.
3. Analogy
4. Expert Judgment
Expert judgment means using specialists who have a reputation for knowledge of the particular field and
experience in estimating activity duration within it.
5. Effort
A project manager who knows what resources are necessary for an activity may calculate the effort the activity
requires and arrive at a duration. He adds the amount of time it takes to obtain materials to the labor time it takes
to complete the tasks.
6. Units
Calculation based on units of activity is a method available to both the largest and smallest businesses. Typical
units are numbers of products or size of the product. Project managers can calculate how much time it took to
produce a certain number or a certain size and adjust for the number or size they want to produce.
Dividing complex projects to simpler and manageable tasks is the process identified as Work Breakdown
Structure (WBS).
Usually, the project managers use this method for simplifying the project execution. In WBS, much larger tasks
are broken down to manageable chunks of work. These chunks can be easily supervised and estimated. E.g.
testing a product may have components like interface, performance, and test cases.
WBS is not restricted to a specific field when it comes to application. This methodology can be used for any type
of project management.
Resource leveling is a "technique in which start and finish dates are adjusted based on resource constraints with
the goal of balancing demand for resources with the available supply".
When performing project planning activities, the manager will attempt to schedule certain tasks simultaneously.
When more resources such as machines or people are needed than are available, or perhaps a specific person
is needed in both tasks, the tasks will have to be rescheduled concurrently or even sequentially to manage the
constraint. Project planning resource leveling is the process of resolving these conflicts. It can also be used to
balance the workload of primary resources over the course of the project[s], usually at the expense of one of the
traditional triple constraints (time, cost, scope).
Overview
Raising awareness to workplace rights is very important. On completion of this learning unit, you will be able
understand the importance of informing ourselves and upholding workplace policies, rules/regulations, reporting
an illegal conduct at workplace, and protecting proprietary or confidential information,
Whistleblower Company policies are written statements of the company’s standards and objectives
and include all areas of employment, including recruitment, compensation, termination,
A whistleblower is a benefits, employee relations and leaves of absence. They contain rules on how
person who raises a employees must perform their jobs and interact with each other. Managers, employees
concern about a and the HR department all have roles in ensuring that these policies are effectively
wrongdoing in their implemented.
workplace
We should inform ourselves and uphold these policies, rules, regulations and laws that
govern our work, professional, and volunteer activities. These rules, regulation and policies protect business and
workers and if correctly implemented and executed, create and maintain a better work environment for all.
Do you know! It is the responsibility of the employee to report unethical or illegal conduct to
appropriate management and if necessary to those affected by the conduct. If he sees
It is unlawful to any illegal behavior including but not limited to theft, fraud, corruption, embezzlement
terminate any or bribery. Furthermore someone taking or abusing the property of others including
employee who intellectual property.
reports, complains
about, or opposes As professionals and representatives of our profession, we do not condone or assist
illegal or fraudulent others in engaging in illegal behavior. We report any illegal or unethical conduct.
conduct by an Reporting is not easy and we recognize that it may have negative consequences. Since
employer or co- recent corporate scandals, many organizations have adopted policies to protect
workers. employees who reveal the truth about illegal or unethical activities. Some governments
have also adopted legislation to protect employees who come forward with the truth.
Violation of A right that is had by a person or by a company to have exclusive rights to use its own
intellectual property plans, ideas, or other intangible assets without the worry of competition, at least for a
rights, called specific period of time. These rights can include copyrights, patents, trademarks, and
"infringement" with trade secrets. These rights may be enforced by a court via a lawsuit. The reasoning for
respect to patents, intellectual property is to encourage innovation without the fear that a competitor will
copyright, and steal the idea and / or take the credit for it.
trademarks, and
"misappropriation" Patents
with respect to trade
secrets, may be a A patent is a form of right granted by the government to an inventor, giving the owner
breach of civil law or the right to exclude others from making, using, selling, offering to sell, and importing an
criminal law. invention for a limited period of time, in exchange for the public disclosure of the
invention. An invention is a solution to a specific technological problem, which may be
a product or a process and generally has to fulfil three main requirements: it has to be new, not obvious and there
needs to be an industrial applicability.
Do you know!
Trademark
The term of the
A trademark is a recognizable sign, design or expression which distinguishes products patent, which is the
or services of a particular trader from the similar products or services of other traders. maximum period
during which it can
Trade secrets be maintained in
force, is 20 years
A trade secret is a formula, practice, process, design, instrument, pattern, or from the earliest
compilation of information which is not generally known or reasonably ascertainable, filing date of the
by which a business can obtain an economic advantage over competitors or customers. application on which
the patent was
granted.
2. Copy Rights
Copyright is a form of intellectual property. Legal monopoly that protects published or unpublished original work
(for the duration of its author's life plus 50 years) from unauthorized duplication without due credit and
compensation. Copyright covers not only books but also advertisements, articles, graphic designs, labels, letters
(including emails), lyrics, maps, musical compositions, product designs, etc. According to the major international
intellectual-property protection treaties (Berne Convention, Universal Copyright Convention, and WIPO Copyright
Treaty) five rights are associated with a copyright:
The Data Protection Act controls how your personal information is used by organizations, businesses or the
government. Everyone responsible for using data has to follow strict rules called ‘Data Protection Principles’.
They must make sure the information is:
There is stronger legal protection for more sensitive information, such as:
Ethnic background.
Political opinions.
Religious beliefs.
Health.
Sexual health.
Criminal records.
Summary of Module
Code of Ethics and Professional Conduct includes both aspirational standards and mandatory standards
for the values which are defined as most important like responsibility, respect, fairness, and honesty
against the applicable territorial laws.
A worker can assist a manger in routine workplace activities like coordinating meeting, defining activities
by applying life cycle methodologies, estimating time for activities, achieving work breakdowns and
performing resource leveling.
It is necessary to inform ourselves and uphold the policies, rules and regulations that govern workplace.
An employee should report illegal conduct or illegitimate action to appropriate management. Protect
proprietary confidential information.
Conduct that results in physical harm or creates intense feelings of fear, humiliation,
Answer
manipulation, or exploitation in another person.
A prototype which is a draft version of a product that allows you to explore your ideas and show
Answer the intention behind a feature or the overall design concept can be created before investing time
and money into development.
Legal monopoly that protects published or unpublished original work (for the duration of its
Answer
author's life plus 50 years) from unauthorized duplication without due credit and compensation.
Answer A whistleblower is a person who raises a concern about a wrongdoing in their workplace
Violation of intellectual property rights, called "infringement" with respect to patents, copyright,
Answer
and trademarks, and "misappropriation" with respect to trade secrets.
A patent is a form of right granted by the government to an inventor, giving the owner the right
Answer to exclude others from making, using, selling, offering to sell, and importing an invention for a
limited period of time, in exchange for the public disclosure of the invention.
The general answer is that if something is protected by a copyright or a patent it is generally not
protectable by trademark law. However, this is not always the case. Sometimes there is overlap
Answer between trademarks, copyrights, and patents. But, as a general rule trademarks are source
identifiers that protect goods and services, while copyrights protect works of authorship and
patents protect inventions.
Copyright protects original works of authorship, while a patent protects inventions or discoveries.
Ideas and discoveries are not protected by the copyright law, although the way in which they are
Answer
expressed may be. A trademark protects words, phrases, symbols, or designs identifying the
source of the goods or services of one party and distinguishing them from those of others.
Employees, applicants for employment, students, patients, vendors, contractors, and the general
Answer
public can blow the whistle.
Test Yourself!
Please mark the correct one from the given options. You can check your answer with the Answer Key at the end
of this module.
a. 35 years b. 25 years
c. 20 years(Missed) d. Unlimited
a. Making a product for your own personal b. Making different products to the invention
use. in order to research their technical
effectiveness.
a. Permits patients to access their personal b. Provides patients with a right to access
data that has been processed by a data their personal health records.
controller
c. Provides that personal data must be d. All of the options are correct
processed fairly and lawfully
Answer Key
MCQ Number Correct Answer
1 b
2 d
3 d
4 c
5 a
6 d
7 c
8 b
9 a
10 d