FIT Practical 30 to 50
LAB Programs form 31 to 50
31. Design a PowerPoint: 5 slides about Digital Business Trends with
transitions and images.
Slide Structure:
Slide 1: Title Slide
- Title: "Digital Business Trends 2025"
- Subtitle: "Transforming the Future of Commerce"
- [Insert: Digital technology image]
- Transition: Fade
Slide 2: E-Commerce Growth
- Heading: "E-Commerce Revolution"
- Points:
• Online shopping growth:
25% annually
• Mobile commerce
dominates
• Social media integration
- [Insert: Shopping cart icon/image]
- Transition: Push
Slide 3: AI & Automation
- Heading: "AI in Business"
- Points:
• Chatbots for customer
service
• Predictive analytics
• Process automation
- [Insert: AI/Robot image]
- Transition: Wipe
Slide 4: Cloud Computing
- Heading: "Cloud Technology Adoption"
- Points:
• Remote work enablement
• Cost reduction
• Scalability benefits
- [Insert: Cloud computing image]
- Transition: Dissolve
Slide 5: Conclusion
- Heading: "The Future is Digital"
- Summary: Digital transformation is essential for business
survival
- [Insert: Futuristic business image]
- Transition: Zoom
32. Create a PowerPoint with 4 slides explaining ERP, CRM, DBMS, and
their business benefits.
Slide 1: ERP (Enterprise Resource Planning)
- Definition: Integrated software for managing business processes
- Key Modules:
• Finance & Accounting
• Human Resources
• Supply Chain Management
• Manufacturing
- Business Benefits:
• Centralized data
management
• Improved efficiency
• Real-time reporting
• Cost reduction
- Examples: SAP, Oracle ERP, Microsoft Dynamics
[Insert: ERP system diagram]
Slide 2: CRM (Customer Relationship Management)
- Definition: System to manage customer interactions and data
- Key Features:
• Contact management
• Sales tracking
• Marketing automation
• Customer support
- Business Benefits:
• Better customer
retention
• Increased sales
• Personalized marketing
• Customer insights
- Examples: Salesforce, HubSpot, Zoho CRM
[Insert: CRM workflow image]
Slide 3: DBMS (Database Management System)
- Definition: Software for storing, retrieving, and managing data
- Types:
• Relational DBMS (MySQL,
Oracle)
• NoSQL (MongoDB)
• Cloud-based (AWS, Azure
SQL)
- Business Benefits:
• Data security
• Easy data access
• Data integrity
• Reduced data redundancy
- Use Cases: Inventory management, customer database, financial
records
[Insert: Database structure diagram]
Slide 4: Comparison & Integration
- How they work together:
• ERP manages internal
operations
• CRM handles customer
relationships
• DBMS stores all data
- Combined Benefits:
• Complete business
automation
• 360-degree view of
operations
• Data-driven decisions
[Insert: Integration flowchart]
33. List out the shortcut keys used in MS Excel.
Essential Excel Shortcuts:
Navigation:
- Ctrl + Home: Go to cell A1
- Ctrl + End: Go to last used cell
- Ctrl + Arrow Keys: Jump to edge of data region
- Page Up/Down: Move one screen up/down
Selection:
- Ctrl + A: Select all
- Ctrl + Shift + Arrow: Select till edge
- Shift + Space: Select entire row
- Ctrl + Space: Select entire column
Formatting:
- Ctrl + B: Bold
- Ctrl + I: Italic
- Ctrl + U: Underline
- Ctrl + 1: Format Cells dialog
- Alt + H + H: Fill color
Editing:
- Ctrl + C: Copy
- Ctrl + X: Cut
- Ctrl + V: Paste
- Ctrl + Z: Undo
- Ctrl + Y: Redo
- F2: Edit cell
- Delete: Clear content
Formulas & Functions:
- =: Start formula
- Ctrl + `: Show formulas
- Alt + =: AutoSum
- F4: Toggle absolute/relative reference
- Ctrl + Shift + Enter: Array formula
Worksheet Operations:
- Ctrl + N: New workbook
- Ctrl + O: Open
- Ctrl + S: Save
- Ctrl + P: Print
- Ctrl + F: Find
- Ctrl + H: Replace
- Ctrl + Page Up/Down: Switch worksheets
Data Operations:
- Ctrl + T: Create table
- Alt + D + S: Sort
- Ctrl + Shift + L: Apply filter
34. List out the shortcut keys used in MS Word.
Essential Word Shortcuts:
Basic Operations:
- Ctrl + N: New document
- Ctrl + O: Open
- Ctrl + S: Save
- Ctrl + P: Print
- Ctrl + W: Close document
- F12: Save As
Editing:
- Ctrl + C: Copy
- Ctrl + X: Cut
- Ctrl + V: Paste
- Ctrl + Z: Undo
- Ctrl + Y: Redo
- Ctrl + A: Select all
Formatting Text:
- Ctrl + B: Bold
- Ctrl + I: Italic
- Ctrl + U: Underline
- Ctrl + D: Font dialog
- Ctrl + Shift + >: Increase font size
- Ctrl + Shift + <: Decrease font size
- Ctrl + L: Left align
- Ctrl + E: Center align
- Ctrl + R: Right align
- Ctrl + J: Justify
Paragraph Formatting:
- Ctrl + 1: Single spacing
- Ctrl + 2: Double spacing
- Ctrl + 5: 1.5 line spacing
- Ctrl + M: Increase indent
- Ctrl + Shift + M: Decrease indent
Navigation:
- Ctrl + Home: Go to beginning
- Ctrl + End: Go to end
- Ctrl + Arrow: Move by word
- Ctrl + F: Find
- Ctrl + H: Replace
- Ctrl + G: Go To
Styles & Headings:
- Ctrl + Alt + 1: Heading 1
- Ctrl + Alt + 2: Heading 2
- Ctrl + Alt + 3: Heading 3
- Ctrl + Shift + N: Normal style
Other Useful:
- F7: Spelling & Grammar check
- Shift + F3: Change case
- Ctrl + K: Insert hyperlink
- Ctrl + Enter: Page break
35. Compare and contrast different network topologies (Star, Bus,
Ring, Mesh).
Comparison Table:
|
Topology |
Structure |
Advantages |
isadvantages |
Use Case |
|
Star |
All devices connect to central hub/switch |
- Easy to install/manage - Failure of one
device doesn't affect others - Easy troubleshooting |
- Hub failure affects entire network - More
cable required - Higher cost |
Office networks, Home networks |
|
Bus |
All devices on single
cable (backbone) |
- Easy to install - Less
cable required - Cost-effective |
- Cable failure affects
all - Limited cable length - Performance degrades with more devices |
Small networks, Temporary
setups |
|
Ring |
Devices connected in circular chain |
- Equal data transmission - No collision -
Predictable performance |
- One device failure affects network -
Difficult to troubleshoot - Adding devices disrupts network |
Token Ring networks, MANs |
|
Mesh |
Every device connects to
every other device |
- Highly reliable - No
single point of failure - Excellent fault tolerance |
- Very expensive -
Complex installation - Requires many cables |
Critical systems,
Wireless networks, Internet backbone |
[Insert: Diagram showing all 4 topologies]
36. Prepare the list of networking devices and their functions.
Networking Devices:
1. Router
Function: Connects
different networks and routes data packets
Example: Wi-Fi router for
home/office
Purpose: Internet
connectivity, inter-network communication
2. Switch
Function: Connects
devices within a LAN and forwards data to specific devices
Example: Ethernet switch
Purpose: Efficient data
transmission in local network
3. Hub
Function: Connects
multiple devices (broadcasts to all)
Example: Basic network
hub
Purpose: Simple network
connectivity (outdated)
4. Modem
Function: Converts
digital signals to analog and vice versa
Example: DSL modem, Cable
modem
Purpose: Internet service
provider connection
5. Access Point (AP)
Function: Provides
wireless connectivity to wired network
Example: Wi-Fi access
point
Purpose: Wireless network
extension
6. Firewall
Function: Security device
that filters network traffic
Example:
Hardware/software firewall
Purpose: Network
security, blocking unauthorized access
7. Repeater
Function:
Amplifies/regenerates signals
Example: Wi-Fi range
extender
Purpose: Extends network
range
8. Bridge
Function: Connects two
LAN segments
Example: Network bridge
Purpose: Segment network,
reduce traffic
9. Gateway
Function: Protocol
converter between different networks
Example: Email gateway
Purpose: Enable
communication between different network types
10. NIC (Network Interface Card)
Function: Enables device
to connect to network
Example: Ethernet card,
Wi-Fi adapter
Purpose: Physical
network connection
37. Find IP address and DNS of your system (Hint: Command Prompt
- ipconfig).
Process Steps:
1. Press Windows Key + R
2. Type "cmd" and press Enter
3. In Command Prompt, type: ipconfig /all
4. Press Enter
Sample Output:
Ethernet adapter Local Area Connection:
Connection-specific DNS
Suffix: localdomain
IPv4 Address:
192.168.1.105
Subnet Mask:
255.255.255.0
Default Gateway:
192.168.1.1
DNS Servers: 8.8.8.8,
8.8.4.4
Wireless LAN adapter Wi-Fi:
Connection-specific DNS
Suffix:
IPv4 Address:
192.168.0.12
Subnet Mask:
255.255.255.0
Default Gateway:
192.168.0.1
DHCP Server: 192.168.0.1
DNS Servers: 192.168.0.1
[Insert: Screenshot of ipconfig /all command output]
Key Information:
- IPv4 Address: Your computer's network address
- Subnet Mask: Network segment identifier
- Default Gateway: Router address
- DNS Servers: Domain name resolution servers
- Physical Address (MAC): Hardware identifier
38. Perform a Google search on "Digital Marketing
Tools" and list the top 5 results.
Search Process:
1. Open web browser
2. Go to www.google.com
3. Type: "Digital Marketing Tools"
4. Press Enter
[Insert: Screenshot of Google search results]
Top 5 Results (Sample):
1. HubSpot - All-in-One Marketing Platform
URL: www.hubspot.com
Description:
Comprehensive marketing automation, CRM, email marketing, and analytics tools
for businesses.
2. Google Analytics - Free Web Analytics Tool
URL: analytics.google.com
Description: Track
website traffic, user behavior, and measure marketing campaign effectiveness.
3. Hootsuite - Social Media Management
URL: www.hootsuite.com
Description: Schedule
posts, manage multiple social accounts, and analyze social media performance.
4. Canva - Graphic Design Platform
URL: www.canva.com
Description: Create
professional graphics, social media posts, and marketing materials easily.
5. Mailchimp - Email Marketing Service
URL: www.mailchimp.com
Description: Email
campaign creation, automation, and audience management tool.
39. Compare two e-commerce websites (Amazon vs Flipkart) with
respect to features, delivery, and offers.
Comparison Table:
|
Criteria |
Amazon |
Flipkart |
|
User Interface |
Clean, organized categories, personalized
recommendations |
Colorful, festive themes, regional language
support |
|
Product Range |
Wider international
brands, 30+ million products |
Strong in Indian brands,
electronics focus |
|
Pricing |
Competitive, dynamic pricing |
Aggressive discounts, festive sales |
|
Delivery Options |
- Prime: 1-2 day delivery
- Standard: 3-5 days - Same-day in select cities - Amazon Locker pickup |
- Flipkart Plus: Fast
delivery - Standard: 3-7 days - Supermart: Grocery delivery - Scheduled
delivery |
|
Delivery Charges |
Free above ₹499, Prime members get free
delivery |
Free above ₹500, Plus members get benefits
|
|
Payment Methods |
Credit/Debit cards, UPI,
EMI, Pay on Delivery, Amazon Pay |
Credit/Debit cards, UPI,
EMI, Cash on Delivery, PhonePe |
|
Return Policy |
30-day return on most items, easy returns |
7-10 day return, quality check required |
|
Customer Service |
24/7 chat/phone support,
AI chatbot |
Email, phone support
during business hours |
|
Offers & Deals |
- Prime Day sale - Great Indian Festival -
Lightning Deals - Subscribe & Save |
- Big Billion Days - Festive sales -
Exchange offers - Bank discounts |
|
Membership |
Amazon Prime (₹1499/year) - Free
delivery, Prime Video, Music |
Flipkart Plus (Free) -
Rewards, free delivery, priority support |
|
Special Features |
- Alexa integration - Amazon Fresh
(groceries) - Kindle books - AWS hosting |
- Flipkart Wholesale - Shopsy (budget
shopping) - Cleartrip integration |
[Insert: Comparison screenshots of both websites]
Conclusion:
- Amazon: Better for international products, faster delivery,
premium experience
- Flipkart: Better for Indian sellers, competitive pricing,
festive sales
40. Analyse a company's social media account (Zomato on
Instagram). Make a table: Content Type vs Engagement.
Zomato Instagram Analysis
[Insert: Screenshots of Zomato Instagram posts]
Content Analysis Table:
|
Content Type |
Frequency |
Avg. Likes |
Avg. Comments |
Engagement Rate |
Strategy |
|
Meme/Humor Posts |
40% |
50K-100K |
500-1000 |
High (8-10%) |
Witty food-related memes, trending topics,
relatable content |
|
Food Photography |
25% |
30K-60K |
300-600 |
Medium (5-7%) |
High-quality images,
restaurant partnerships, food styling |
|
User-Generated Content |
15% |
40K-80K |
400-800 |
High (7-9%) |
Customer reviews, tagged posts, food blogger
collabs |
|
Promotional Offers |
10% |
20K-40K |
200-400 |
Medium (4-6%) |
Discount codes, special
deals, festive offers |
|
Behind-the-Scenes |
5% |
25K-50K |
300-500 |
Medium (5-7%) |
Team culture, delivery partners, app
features |
|
Video Content (Reels) |
5% |
60K-120K |
600-1200 |
Very High (10-15%) |
Trending audio, food
challenges, quick recipes |
Key Observations:
1. Content Strategy:
- Humor-first approach
(40% memes)
- Conversational tone
with followers
- Quick response to
comments
- Trending topic
integration
2. Posting Pattern:
- 2-3 posts per day
- Peak posting: 12 PM - 2
PM and 7 PM - 9 PM
- Consistent daily
presence
3. Engagement Tactics:
- Witty captions
- Question stickers in
stories
- Poll features
- Collaboration with food
influencers
- Use of trending
hashtags
4. Unique Selling Points:
- Brand personality:
Sarcastic, relatable
- Cultural relevance:
Indian food context
- Community building:
Food lovers' community
5. Success Metrics:
- Followers: 1.5M+
- Average engagement:
6-8%
- Story views: 100K-200K
- Brand recall: High due
to meme culture
Recommendation:
Zomato's social media strategy is highly effective due to its
entertainment-first approach rather than pure promotion, making it one of
India's most engaging brand accounts.
41. Run a speed test (speedtest.net) and record Download/Upload
speed.
Process Steps:
1. Open web browser
2. Go to www.speedtest.net
3. Click "Go" button to start test
4. Wait for test to complete (30-60 seconds)
5. Record results
[Insert: Screenshot of Speedtest.net results]
Sample Output:
Test Results:
- Download Speed: 85.42 Mbps
- Upload Speed: 42.18 Mbps
- Ping: 12 ms
- Server: Airtel Broadband (Hyderabad)
- ISP: Airtel
- Test Date: 02-Nov-2025, 6:00 AM
Interpretation:
- Download Speed: Good for HD streaming, large file downloads
- Upload Speed: Adequate for video calls, file uploads
- Ping (Latency): Excellent for gaming and real-time applications
Speed Requirements:
- Basic browsing: 5-10 Mbps
- HD video streaming: 25 Mbps
- 4K streaming: 50+ Mbps
- Video conferencing: 10-20 Mbps
- Online gaming: 25+ Mbps with low ping
42. Share a file via Bluetooth or LAN cable and document the
steps.
Method 1: Bluetooth File
Sharing
Steps:
1. Enable Bluetooth on both devices
2. Pair devices:
- Settings → Bluetooth →
Add device
- Select target device
- Confirm pairing code
3. Right-click file to share
4. Select "Send to" → "Bluetooth device"
5. Choose recipient device
6. Click "Send"
7. Accept file on receiving device
8. File transfer complete
[Insert: Screenshots of Bluetooth pairing and file transfer]
Method 2: LAN Cable File Sharing
Steps:
1. Connect both computers with LAN cable
2. On Computer 1:
- Right-click folder →
Properties
- Sharing tab →
"Advanced Sharing"
- Check "Share this
folder"
- Set permissions → OK
3. On Computer 2:
- Open File Explorer
- Type in address bar:
\\Computer1Name\SharedFolder
- Access shared files
- Copy files as needed
[Insert: Screenshots of network sharing setup]
Advantages:
- Bluetooth: Wireless, convenient for small files
- LAN: Faster (100 Mbps - 1 Gbps), secure, better for large files
43. Create a Google Drive/Dropbox account, upload and share a
file with a peer.
Google Drive Process:
1. Create Account:
- Go to drive.google.com
- Click "Go to
Google Drive"
- Sign in with Gmail (or
create new account)
- Accept terms and
conditions
2. Upload File:
- Click "+ New"
button
- Select "File
upload"
- Choose file from
computer
- Wait for upload to
complete
- File appears in
"My Drive"
[Insert: Screenshot of file upload]
3. Share File:
- Right-click on uploaded
file
- Click "Share"
- Enter peer's email
address
- Set permission level:
* Viewer: Can only view
* Commenter: Can view
and comment
* Editor: Can edit the
file
- Click "Send"
- Peer receives email
notification
[Insert: Screenshot of sharing settings]
4. Alternative Sharing Method:
- Right-click file →
"Get link"
- Change to "Anyone
with the link"
- Copy link
- Share link via
email/chat
[Insert: Screenshot of link sharing]
Benefits:
- 15 GB free storage
- Access from any device
- Real-time collaboration
- Automatic backup
- Version history
44. Prepare a table with SaaS, PaaS, and IaaS examples and their
business use.
Cloud Service Models
Comparison:
|
Service Model |
Full Form |
Examples |
Business Use / Purpose |
|
SaaS |
Software as a Service |
Google Workspace (Docs,
Sheets), Microsoft 365, Zoom, Salesforce, Canva |
Provides ready-to-use software
applications over the internet. Businesses use them for productivity,
collaboration, communication, and CRM without managing infrastructure or
installation. |
|
PaaS |
Platform as a Service |
Google App Engine, Microsoft Azure App Service, AWS Elastic
Beanstalk, Heroku |
Provides a development platform and tools for building, testing,
and deploying applications. Businesses use it to develop custom software
without managing servers or databases. |
|
IaaS |
Infrastructure as a Service |
Amazon Web Services (AWS EC2),
Microsoft Azure, Google Cloud Compute Engine, IBM Cloud |
Offers virtualized computing
resources such as servers, storage, and networking. Businesses use it to host
applications, manage large-scale data, and run virtual machines while
controlling the infrastructure. |
Key Differences:
Control Level:
- SaaS: Least control (only application settings)
- PaaS: Medium control (development platform)
- IaaS: Maximum control (infrastructure configuration)
Management:
- SaaS: Provider manages everything
- PaaS: Provider manages platform, you manage apps
- IaaS: Provider manages hardware, you manage OS & apps
Cost:
- SaaS: Per user/month subscription
- PaaS: Pay per development hours
- IaaS: Pay per resource usage (CPU, storage, bandwidth)
45. Compare Public, Private,
and Hybrid clouds with examples in a table.
Cloud Deployment Models
Comparison:
|
Cloud Type |
Description |
Examples |
Business Use / Purpose |
Key Advantages |
|
Public Cloud |
Cloud services are delivered
over the internet and shared across multiple organizations. The
infrastructure is owned and managed by a third-party provider. |
Amazon Web Services (AWS),
Microsoft Azure, Google Cloud Platform |
Used by startups and small to
medium businesses for hosting applications, websites, or backups without
heavy infrastructure investment. |
Cost-effective, scalable, easy
to deploy, no maintenance burden. |
|
Private Cloud |
Cloud infrastructure is dedicated to a single organization,
either hosted on-premises or by a third party. |
VMware Cloud, OpenStack, IBM Cloud Private |
Used by large enterprises or government organizations that
require high security and control over data and infrastructure. |
High security, full control, customization, compliance-friendly. |
|
Hybrid Cloud |
Combination of public and
private clouds working together, allowing data and applications to move
between them. |
Microsoft Azure Hybrid, AWS
Outposts, Google Anthos |
Used by organizations needing
flexibility—keeping sensitive data on a private cloud while using public
cloud for scalability and cost efficiency. |
Flexibility, optimized costs,
improved scalability, better data management. |
Use Case Examples:
1. Public Cloud:
- E-commerce website
hosting
- Email services (Gmail)
- Social media platforms
- Online storage
(Dropbox)
2. Private Cloud:
- Bank transaction
systems
- Hospital patient
records
- Government classified
data
- Corporate financial
systems
3. Hybrid Cloud:
- Retail: Store customer
data privately, run website publicly
- Manufacturing: Core
operations private, analytics public
- Education: Student
records private, e-learning platform public
- Media: Content
production private, distribution public
Decision Factors:
Choose Public Cloud if:
- Budget is limited
- Quick deployment needed
- Scalability is priority
- Non-sensitive data
Choose Private Cloud if:
- Handling sensitive/regulated data
- Need complete control
- High security requirements
- Compliance mandates
Choose Hybrid Cloud if:
- Want both security and flexibility
- Gradual cloud migration
- Variable workloads
- Cost optimization needed
46. Create a strong password and test it on an online strength
checker like "How Secure is My Password".
Strong Password Creation Rules:
1. Length: Minimum 12 characters (longer is better)
2. Mix characters:
- Uppercase letters (A-Z)
- Lowercase letters (a-z)
- Numbers (0-9)
- Special characters
(!@#$%^&*)
3. Avoid:
- Dictionary words
- Personal information
(name, birthdate)
- Common patterns
(123456, qwerty)
- Repeated characters
(aaa, 111)
Example Strong Passwords:
- Weak: password123 (Time to crack: Instant)
- Medium: Pass@123word (Time to crack: 3 days)
- Strong: P@ssw0rd#2025!Secure (Time to crack: 34 thousand years)
- Very Strong: mK9$pL#7qR*3vN@2wX (Time to crack: 6 million years)
Testing Process:
1. Go to www.howsecureismypassword.net or similar site
2. Enter password (Note: Use cautiously, preferably create test
password)
3. View results showing time to crack
4. Improve based on suggestions
[Insert: Screenshots of password strength tests]
Password Management Tips:
- Use different passwords for different accounts
- Use a password manager (LastPass, 1Password, Bitwarden)
- Enable two-factor authentication (2FA)
- Change passwords every 6 months
- Never share passwords
- Don't write passwords on paper
47. Enable Two-Factor Authentication (2FA) for a Gmail account
and show the authentication process.
Process Steps:
1. Enable 2FA:
- Go to
myaccount.google.com
- Click
"Security" in left menu
- Scroll to "2-Step
Verification"
- Click "Get
Started"
- Sign in again to
confirm
- Enter phone number
- Choose verification
method (Text/Call)
- Enter verification code
received
- Click "Turn
On"
[Insert: Screenshots of 2FA setup process]
2. Authentication Methods:
Method 1: SMS/Voice Call
- Google sends code to registered phone
- Enter 6-digit code
- Access granted
Method 2: Google Authenticator App
- Download Google Authenticator app
- Scan QR code from Google
- App generates 6-digit code every 30 seconds
- Enter code to login
Method 3: Backup Codes
- Google provides 10 one-time codes
- Save securely
- Use when phone is unavailable
3. Login Process with 2FA:
Step 1: Enter email and
password (Something you know)
Step 2: Enter code from
phone/app (Something you have)
Step 3: Access granted ✓
[Insert: Screenshots showing 2FA login flow]
Benefits of 2FA:
- 99.9% protection against account hacking
- Security even if password is compromised
- Alerts you to unauthorized access attempts
- Required for sensitive accounts (banking, email)
48. Create a Word document
listing 10 safe browsing tips.
10 SAFE BROWSING TIPS FOR
SECURE INTERNET USE
1. Use HTTPS Websites
- Always check for
padlock icon in address bar
- Look for
"https://" before the URL
- Avoid entering
sensitive data on "http://" sites
- HTTPS encrypts your
data during transmission
2. Keep Software Updated
- Update browser
regularly (Chrome, Firefox, Edge)
- Enable automatic
updates for OS
- Install security
patches promptly
- Outdated software has
security vulnerabilities
3. Use Strong, Unique Passwords
- Different password for
each website
- Minimum 12 characters
with mix of types
- Use password manager
for storage
- Never save passwords in
browser on public computers
4. Beware of Phishing Emails
- Don't click suspicious
links in emails
- Verify sender's email
address
- Check for
spelling/grammar errors
- Don't download
unexpected attachments
- Banks never ask for
passwords via email
5. Use Antivirus Software
- Install reputable
antivirus (Windows Defender, Avast, Norton)
- Keep virus definitions
updated
- Run regular system
scans
- Enable real-time
protection
6. Avoid Public Wi-Fi for Sensitive Transactions
- Public Wi-Fi is
unsecured
- Use VPN if necessary
- Avoid banking/shopping
on public networks
- Turn off file sharing
on public networks
7. Verify Website Authenticity
- Check domain name
carefully (amazon.com vs amaz0n.com)
- Look for trust badges
- Read reviews before
purchasing
- Use official apps
instead of browser for banking
8. Clear Browser Data Regularly
- Clear cache and cookies
periodically
- Use private/incognito
mode for sensitive browsing
- Log out of accounts
after use
- Clear browsing history
on shared computers
9. Be Cautious with Downloads
- Download only from
official sources
- Scan downloads with
antivirus before opening
- Avoid cracked/pirated
software
- Check file extensions
(.exe files can be dangerous)
10. Enable Two-Factor Authentication (2FA)
- Add extra security
layer to accounts
- Use authenticator apps
(Google Authenticator)
- Enable for email,
banking, social media
- Protects even if
password is stolen
Remember: Think Before You
Click!
49. Create a PowerPoint/report on cyber threats (Malware,
Phishing, DoS) with business examples.
PowerPoint Presentation
Structure:
Slide 1: Title Slide
- Title: "Cyber Threats in Digital Business"
- Subtitle: "Understanding Malware, Phishing, and DoS
Attacks"
- Date: November 2025
[Insert: Cybersecurity shield image]
Slide 2: Introduction to Cyber Threats
- Definition: Malicious activities targeting digital systems
- Global cost: $10.5 trillion annually by 2025
- Impact: Data breaches, financial loss, reputation damage
- Importance: Critical for business survival
[Insert: Cyber threat statistics graph]
Slide 3: MALWARE (Malicious Software)
Definition: Software designed to damage or gain unauthorized
access to systems
Types:
1. Virus: Attaches to files, spreads when shared
2. Trojan: Disguises as legitimate software
3. Ransomware: Encrypts files, demands payment
4. Spyware: Secretly monitors user activity
5. Worm: Self-replicates across networks
Real Business Example:
- WannaCry Ransomware (2017)
- Affected: 230,000+ computers in 150 countries
- Victims: NHS (UK), FedEx, Nissan, Renault
- Impact: $4 billion in losses
- Method: Encrypted files, demanded Bitcoin payment
Prevention:
- Install antivirus software
- Regular updates
- Don't open suspicious attachments
- Backup data regularly
[Insert: Malware types infographic]
Slide 4: PHISHING
Definition: Fraudulent attempts to obtain sensitive information
through deceptive emails/websites
Types:
1. Email Phishing: Fake emails from trusted sources
2. Spear Phishing: Targeted attacks on specific individuals
3. Whaling: Attacks on executives/high-profile targets
4. Smishing: Phishing via SMS
5. Vishing: Voice call phishing
Real Business Example:
- Google & Facebook Phishing Scam (2013-2015)
- Attacker: Evaldas Rimasauskas
- Method: Posed as legitimate vendor (Quanta Computer)
- Sent fake invoices
- Amount stolen: $100 million from both companies
- Result: Criminal prosecution, funds partially recovered
Warning Signs:
- Urgent action required
- Suspicious sender email
- Grammar/spelling errors
- Requests for sensitive data
- Mismatched URLs
Prevention:
- Verify sender identity
- Don't click suspicious links
- Check URL before login
- Use email filters
- Employee training
Slide 5: DoS & DDoS (Denial of Service)
Definition: Attacks that overwhelm systems with traffic, making
them unavailable to users
Types:
1. DoS: Single source attack
2. DDoS: Distributed attack from multiple sources (botnet)
3. Application Layer: Targets web applications
4. Protocol Attack: Exploits protocol weaknesses
5. Volumetric: Floods bandwidth
Real Business Example:
- Dyn DNS DDoS Attack (2016)
- Target: Dyn (DNS provider)
- Impact: Twitter, Netflix, Reddit, GitHub, Spotify down
- Duration: Several hours
- Method: Mirai botnet (100,000+ IoT devices)
- Affected: East Coast USA users
- Business Impact: Millions in lost revenue, damaged trust
Prevention:
- Use CDN (Content Delivery Network)
- Implement rate limiting
- DDoS protection services (Cloudflare, AWS Shield)
- Network monitoring
- Incident response plan
Slide 6: Impact on Businesses
Financial Impact:
- Direct costs: Recovery, ransom, legal fees
- Indirect costs: Downtime, lost customers, reputation
- Average data breach cost: $4.45 million (2023)
Operational Impact:
- System downtime
- Lost productivity
- Service disruption
- Supply chain interruption
Reputational Impact:
- Customer trust erosion
- Brand damage
- Stock price decline
- Legal liability
[Insert: Impact breakdown pie chart]
Slide 7: Protection Strategies
1. Technical Controls:
- Firewalls and IDS/IPS
- Antivirus/Anti-malware
- Encryption
- Multi-factor
authentication
- Regular backups
2. Administrative Controls:
- Security policies
- Access control
- Incident response plan
- Regular audits
3. Human Element:
- Employee training
- Security awareness
programs
- Phishing simulations
- Report suspicious
activity
[Insert: Security layers pyramid]
Slide 8: Conclusion & Recommendations
Key Takeaways:
- Cyber threats are evolving constantly
- No business is too small to be targeted
- Prevention is cheaper than recovery
- Human error is the weakest link
- Continuous vigilance is essential
Action Items:
1. Implement comprehensive security policy
2. Train employees regularly
3. Keep systems updated
4. Use strong authentication
5. Have incident response plan
6. Cyber insurance consideration
References:
- Cybersecurity & Infrastructure Security Agency (CISA)
- Verizon Data Breach Investigations Report 2023
- IBM Cost of Data Breach Report 2023
50. Prepare a short report in Word summarising cyber laws in
India (IT Act, DPDPA 2023) and their importance for digital businesses.
CYBER LAWS IN INDIA: A
COMPREHENSIVE GUIDE FOR DIGITAL BUSINESSES
1. INTRODUCTION
With India's digital economy growing rapidly,
cybersecurity and data protection have become critical. The government has
enacted comprehensive laws to regulate digital activities, protect user data,
and punish cybercrimes. This report covers the two main frameworks:
- Information Technology Act, 2000 (IT Act)
- Digital Personal Data Protection Act, 2023 (DPDPA)
2. INFORMATION TECHNOLOGY ACT, 2000 (IT ACT)
Overview:
- India's primary law for electronic governance and cybercrime
- Enacted: May 17, 2000 (Amended in 2008)
- Objective: Legal recognition of electronic transactions and
cybercrime prevention
Key Provisions:
A. Electronic Records & Digital Signatures (Sections 3-4):
- Legal validity to
electronic documents
- Digital signatures
equal to handwritten signatures
- Importance: Enables
e-contracts, e-commerce, online agreements
B. Cyber Crimes & Penalties (Sections 43, 66-67):
- Section 43:
Unauthorized access to computer systems - Compensation up to ₹1 crore
- Section 66:
Computer-related offenses - Imprisonment up to 3 years or fine up to ₹5 lakh
- Section 66A: Sending
offensive messages (Struck down by Supreme Court in 2015)
- Section 66B:
Dishonestly receiving stolen computer resource
- Section 66C: Identity
theft - Imprisonment up to 3 years and fine up to ₹1 lakh
- Section 66D: Cheating
using computer resources
- Section 66E: Privacy
violation (publishing private images) - Imprisonment up to 3 years or fine up
to ₹2 lakh
- Section 66F: Cyber
terrorism - Life imprisonment
- Section 67: Publishing
obscene information - Imprisonment up to 3 years and fine up to ₹5 lakh
C. Data Protection (Section 43A):
- Companies must
implement reasonable security practices
- Liability for
negligence in protecting sensitive personal data
- Compensation for
affected individuals
D. Intermediary Liability (Section 79):
- Internet service
providers and platforms not liable for third-party content
- Must follow due
diligence requirements
- Remove illegal content
within 36 hours of notice
E. Cyber Appellate Tribunal:
- Established for appeals
against Controller or Adjudicating Officer orders
3. DIGITAL PERSONAL DATA PROTECTION ACT, 2023 (DPDPA)
Overview:
- Passed: August 11, 2023
- Effective: Rules being drafted (expected 2024-2025)
- Objective: Protect individual's digital personal data
- Scope: Applies to data processed digitally and offline data
digitized later
Key Provisions:
A. Rights of Data Principals (Individuals):
1. Right to Access: Know
what data is being processed
2. Right to Correction:
Correct inaccurate data
3. Right to Erasure:
Request data deletion
4. Right to Grievance
Redressal: Complain to Data Protection Board
5. Right to Nominate:
Appoint nominee to exercise rights after death
B. Obligations of Data Fiduciaries (Businesses):
1. Obtain valid consent
before processing data
2. Use data only for
specified purpose
3. Implement reasonable
security safeguards
4. Notify Data Protection
Board of data breaches
5. Appoint Data
Protection Officer (for significant data fiduciaries)
6. Complete data
protection impact assessment
7. Maintain records of
data processing
C. Children's Data Protection:
- Special protection for
children under 18
- Verifiable parental
consent required
- No targeted advertising
to children
- No behavioral
monitoring
D. Cross-Border Data Transfer:
- Data can be transferred
to certain countries (whitelist to be notified)
- Government may restrict
transfers for sovereignty and security
E. Data Protection Board of India:
- Independent regulatory
body
- Powers to investigate
violations
- Impose penalties
F. Penalties for Non-Compliance:
- Up to ₹250 crore for
serious violations
- Penalties based on
severity of breach
- Government can block
non-compliant entities
4. COMPARISON: IT ACT vs DPDPA 2023
|
Aspect |
IT Act 2000 |
DPDPA 2023 |
|
Focus |
Cybercrime & e-governance |
Data privacy & protection |
|
Scope |
Electronic transactions,
cybercrimes |
Personal data processing |
|
Penalties |
Up to ₹5 lakh + imprisonment |
Up to ₹250 crore |
|
User Rights |
Limited |
Comprehensive (access,
erasure, correction) |
|
Consent |
Not explicitly required |
Mandatory and explicit |
|
Data Breach Notification |
No specific provision |
Mandatory within
specified time |
5. IMPORTANCE FOR DIGITAL BUSINESSES
A. Legal Compliance:
- Avoid heavy penalties
and legal action
- Mandatory for
e-commerce, fintech, healthcare, education platforms
- Non-compliance can lead
to business shutdown
B. Customer Trust:
- Transparent data
practices build customer confidence
- Privacy protection as
competitive advantage
- Reduces customer churn
C. Data Security:
- Forces implementation
of robust security measures
- Prevents data breaches
and financial losses
- Protects business
reputation
D. Business Operations:
- Clear guidelines for
data collection and processing
- Streamlines privacy
policies
- Enables international
business (adequacy certifications)
E. Risk Management:
- Reduces legal and
financial risks
- Insurance requirements
- Investor confidence
6. COMPLIANCE CHECKLIST FOR DIGITAL BUSINESSES
☐ Conduct data audit (identify what data is collected)
☐ Implement consent management system
☐ Update privacy policy (clear, accessible language)
☐ Appoint Data Protection Officer
☐ Implement security safeguards (encryption, access controls)
☐ Establish data breach response plan
☐ Create user rights management system (access, deletion requests)
☐ Review third-party vendors for compliance
☐ Conduct employee training on data protection
☐ Set up grievance redressal mechanism
☐ Maintain data processing records
☐ Regular compliance audits
7. PENALTIES - RECENT CASES
1. WhatsApp (2021):
- Issue: Privacy policy
violation
- Penalty: ₹550 crore
(proposed by CCI)
- Lesson: User consent is
critical
2. Paytm (2022):
- Issue: Data security
lapses
- Action: RBI
restrictions on onboarding new customers
- Lesson: Security
infrastructure is mandatory
3. CERT-In Directives (2022):
- Requirement: Report
cyber incidents within 6 hours
- Applies to: All service
providers, intermediaries, data centers
- Lesson: Incident
reporting is non-negotiable
8. CONCLUSION
Key Takeaways:
- Cyber laws are evolving rapidly in India
- Both IT Act and DPDPA are crucial for digital businesses
- Compliance is not optional - it's a business necessity
- User privacy is a fundamental right
- Proactive compliance prevents costly penalties
Recommendations for Digital Businesses:
1. Stay updated with law amendments and rules
2. Invest in cybersecurity infrastructure
3. Make privacy a core business value
4. Conduct regular compliance audits
5. Seek legal counsel for complex situations
6. Train employees on data protection
7. Be transparent with users about data practices
Future Outlook:
- India moving towards stricter data protection regime
- Alignment with global standards (GDPR-like framework)
- Increased enforcement and penalties expected
- Digital businesses must prioritize compliance
"Data protection is not just a legal requirement; it's a business imperative in the digital age."
Exllent
ReplyDelete