FIT Practical 30 to 50

LAB Programs form 31 to 50

31. Design a PowerPoint: 5 slides about Digital Business Trends with transitions and images.

Slide Structure:

Slide 1: Title Slide

- Title: "Digital Business Trends 2025"

- Subtitle: "Transforming the Future of Commerce"

- [Insert: Digital technology image]

- Transition: Fade

 

Slide 2: E-Commerce Growth

- Heading: "E-Commerce Revolution"

- Points:

  • Online shopping growth: 25% annually

  • Mobile commerce dominates

  • Social media integration

- [Insert: Shopping cart icon/image]

- Transition: Push

 

Slide 3: AI & Automation

- Heading: "AI in Business"

- Points:

  • Chatbots for customer service

  • Predictive analytics

  • Process automation

- [Insert: AI/Robot image]

- Transition: Wipe

 

Slide 4: Cloud Computing

- Heading: "Cloud Technology Adoption"

- Points:

  • Remote work enablement

  • Cost reduction

  • Scalability benefits

- [Insert: Cloud computing image]

- Transition: Dissolve

 

Slide 5: Conclusion

- Heading: "The Future is Digital"

- Summary: Digital transformation is essential for business survival

- [Insert: Futuristic business image]

- Transition: Zoom

32. Create a PowerPoint with 4 slides explaining ERP, CRM, DBMS, and their business benefits.

 

Slide 1: ERP (Enterprise Resource Planning)

- Definition: Integrated software for managing business processes

- Key Modules:

  • Finance & Accounting

  • Human Resources

  • Supply Chain Management

  • Manufacturing

- Business Benefits:

  • Centralized data management

  • Improved efficiency

  • Real-time reporting

  • Cost reduction

- Examples: SAP, Oracle ERP, Microsoft Dynamics

[Insert: ERP system diagram]

 

Slide 2: CRM (Customer Relationship Management)

- Definition: System to manage customer interactions and data

- Key Features:

  • Contact management

  • Sales tracking

  • Marketing automation

  • Customer support

- Business Benefits:

  • Better customer retention

  • Increased sales

  • Personalized marketing

  • Customer insights

- Examples: Salesforce, HubSpot, Zoho CRM

[Insert: CRM workflow image]

 

Slide 3: DBMS (Database Management System)

- Definition: Software for storing, retrieving, and managing data

- Types:

  • Relational DBMS (MySQL, Oracle)

  • NoSQL (MongoDB)

  • Cloud-based (AWS, Azure SQL)

- Business Benefits:

  • Data security

  • Easy data access

  • Data integrity

  • Reduced data redundancy

- Use Cases: Inventory management, customer database, financial records

[Insert: Database structure diagram]

 

Slide 4: Comparison & Integration

- How they work together:

  • ERP manages internal operations

  • CRM handles customer relationships

  • DBMS stores all data

- Combined Benefits:

  • Complete business automation

  • 360-degree view of operations

  • Data-driven decisions

[Insert: Integration flowchart]

33. List out the shortcut keys used in MS Excel.

Essential Excel Shortcuts:

Navigation:

- Ctrl + Home: Go to cell A1

- Ctrl + End: Go to last used cell

- Ctrl + Arrow Keys: Jump to edge of data region

- Page Up/Down: Move one screen up/down

 

Selection:

- Ctrl + A: Select all

- Ctrl + Shift + Arrow: Select till edge

- Shift + Space: Select entire row

- Ctrl + Space: Select entire column

 

Formatting:

- Ctrl + B: Bold

- Ctrl + I: Italic

- Ctrl + U: Underline

- Ctrl + 1: Format Cells dialog

- Alt + H + H: Fill color

 

Editing:

- Ctrl + C: Copy

- Ctrl + X: Cut

- Ctrl + V: Paste

- Ctrl + Z: Undo

- Ctrl + Y: Redo

- F2: Edit cell

- Delete: Clear content

 

Formulas & Functions:

- =: Start formula

- Ctrl + `: Show formulas

- Alt + =: AutoSum

- F4: Toggle absolute/relative reference

- Ctrl + Shift + Enter: Array formula

 

Worksheet Operations:

- Ctrl + N: New workbook

- Ctrl + O: Open

- Ctrl + S: Save

- Ctrl + P: Print

- Ctrl + F: Find

- Ctrl + H: Replace

- Ctrl + Page Up/Down: Switch worksheets

 

Data Operations:

- Ctrl + T: Create table

- Alt + D + S: Sort

- Ctrl + Shift + L: Apply filter

34. List out the shortcut keys used in MS Word.

Essential Word Shortcuts:

Basic Operations:

- Ctrl + N: New document

- Ctrl + O: Open

- Ctrl + S: Save

- Ctrl + P: Print

- Ctrl + W: Close document

- F12: Save As

 

Editing:

- Ctrl + C: Copy

- Ctrl + X: Cut

- Ctrl + V: Paste

- Ctrl + Z: Undo

- Ctrl + Y: Redo

- Ctrl + A: Select all

 

Formatting Text:

- Ctrl + B: Bold

- Ctrl + I: Italic

- Ctrl + U: Underline

- Ctrl + D: Font dialog

- Ctrl + Shift + >: Increase font size

- Ctrl + Shift + <: Decrease font size

- Ctrl + L: Left align

- Ctrl + E: Center align

- Ctrl + R: Right align

- Ctrl + J: Justify

 

Paragraph Formatting:

- Ctrl + 1: Single spacing

- Ctrl + 2: Double spacing

- Ctrl + 5: 1.5 line spacing

- Ctrl + M: Increase indent

- Ctrl + Shift + M: Decrease indent

 

Navigation:

- Ctrl + Home: Go to beginning

- Ctrl + End: Go to end

- Ctrl + Arrow: Move by word

- Ctrl + F: Find

- Ctrl + H: Replace

- Ctrl + G: Go To

 

Styles & Headings:

- Ctrl + Alt + 1: Heading 1

- Ctrl + Alt + 2: Heading 2

- Ctrl + Alt + 3: Heading 3

- Ctrl + Shift + N: Normal style

 

Other Useful:

- F7: Spelling & Grammar check

- Shift + F3: Change case

- Ctrl + K: Insert hyperlink

- Ctrl + Enter: Page break

35. Compare and contrast different network topologies (Star, Bus, Ring, Mesh).

Comparison Table:

 Topology

 Structure

 Advantages

 isadvantages

 Use Case

Star

 All devices connect to central hub/switch

 - Easy to install/manage - Failure of one device doesn't affect others - Easy troubleshooting

 - Hub failure affects entire network - More cable required - Higher cost

 Office networks, Home networks

Bus

 All devices on single cable (backbone)

 - Easy to install - Less cable required - Cost-effective

 - Cable failure affects all - Limited cable length - Performance degrades with more devices

 Small networks, Temporary setups

Ring

 Devices connected in circular chain

 - Equal data transmission - No collision - Predictable performance

 - One device failure affects network - Difficult to troubleshoot - Adding devices disrupts network

 Token Ring networks, MANs

Mesh

 Every device connects to every other device

 - Highly reliable - No single point of failure - Excellent fault tolerance

 - Very expensive - Complex installation - Requires many cables

 Critical systems, Wireless networks, Internet backbone

 

 

[Insert: Diagram showing all 4 topologies]

36. Prepare the list of networking devices and their functions.  

Networking Devices:

1. Router

   Function: Connects different networks and routes data packets

   Example: Wi-Fi router for home/office

   Purpose: Internet connectivity, inter-network communication

 

2. Switch

   Function: Connects devices within a LAN and forwards data to specific devices

   Example: Ethernet switch

   Purpose: Efficient data transmission in local network

 

3. Hub

   Function: Connects multiple devices (broadcasts to all)

   Example: Basic network hub

   Purpose: Simple network connectivity (outdated)

 

4. Modem

   Function: Converts digital signals to analog and vice versa

   Example: DSL modem, Cable modem

   Purpose: Internet service provider connection

 

5. Access Point (AP)

   Function: Provides wireless connectivity to wired network

   Example: Wi-Fi access point

   Purpose: Wireless network extension

 

6. Firewall

   Function: Security device that filters network traffic

   Example: Hardware/software firewall

   Purpose: Network security, blocking unauthorized access

 

7. Repeater

   Function: Amplifies/regenerates signals

   Example: Wi-Fi range extender

   Purpose: Extends network range

 

8. Bridge

   Function: Connects two LAN segments

   Example: Network bridge

   Purpose: Segment network, reduce traffic

 

9. Gateway

   Function: Protocol converter between different networks

   Example: Email gateway

   Purpose: Enable communication between different network types

 

10. NIC (Network Interface Card)

    Function: Enables device to connect to network

    Example: Ethernet card, Wi-Fi adapter

    Purpose: Physical network connection

37. Find IP address and DNS of your system (Hint: Command Prompt - ipconfig).

Process Steps:

1. Press Windows Key + R

2. Type "cmd" and press Enter

3. In Command Prompt, type: ipconfig /all

4. Press Enter

 

Sample Output:

Ethernet adapter Local Area Connection:

   Connection-specific DNS Suffix: localdomain

   IPv4 Address: 192.168.1.105

   Subnet Mask: 255.255.255.0

   Default Gateway: 192.168.1.1

   DNS Servers: 8.8.8.8, 8.8.4.4

 

Wireless LAN adapter Wi-Fi:

   Connection-specific DNS Suffix: 

   IPv4 Address: 192.168.0.12

   Subnet Mask: 255.255.255.0

   Default Gateway: 192.168.0.1

   DHCP Server: 192.168.0.1

   DNS Servers: 192.168.0.1

[Insert: Screenshot of ipconfig /all command output]

 

Key Information:

- IPv4 Address: Your computer's network address

- Subnet Mask: Network segment identifier

- Default Gateway: Router address

- DNS Servers: Domain name resolution servers

- Physical Address (MAC): Hardware identifier

 

38. Perform a Google search on "Digital Marketing Tools" and list the top 5 results.

 

Search Process:

1. Open web browser

2. Go to www.google.com

3. Type: "Digital Marketing Tools"

4. Press Enter

[Insert: Screenshot of Google search results]

 

Top 5 Results (Sample):  

1. HubSpot - All-in-One Marketing Platform

   URL: www.hubspot.com

   Description: Comprehensive marketing automation, CRM, email marketing, and analytics tools for businesses.

 

2. Google Analytics - Free Web Analytics Tool

   URL: analytics.google.com

   Description: Track website traffic, user behavior, and measure marketing campaign effectiveness.

 

3. Hootsuite - Social Media Management

   URL: www.hootsuite.com

   Description: Schedule posts, manage multiple social accounts, and analyze social media performance.

 

4. Canva - Graphic Design Platform

   URL: www.canva.com

   Description: Create professional graphics, social media posts, and marketing materials easily.

 

5. Mailchimp - Email Marketing Service

   URL: www.mailchimp.com

   Description: Email campaign creation, automation, and audience management tool.

39. Compare two e-commerce websites (Amazon vs Flipkart) with respect to features, delivery, and offers.

 Comparison Table:

 

Criteria

 Amazon

 Flipkart

User Interface

 Clean, organized categories, personalized recommendations

 Colorful, festive themes, regional language support  

Product Range

 Wider international brands, 30+ million products

 Strong in Indian brands, electronics focus

Pricing

 Competitive, dynamic pricing

 Aggressive discounts, festive sales

Delivery Options

 - Prime: 1-2 day delivery - Standard: 3-5 days - Same-day in select cities - Amazon Locker pickup

 - Flipkart Plus: Fast delivery - Standard: 3-7 days - Supermart: Grocery delivery - Scheduled delivery

Delivery Charges

 Free above 499, Prime members get free delivery

 Free above 500, Plus members get benefits

Payment Methods

 Credit/Debit cards, UPI, EMI, Pay on Delivery, Amazon Pay

 Credit/Debit cards, UPI, EMI, Cash on Delivery, PhonePe

Return Policy

 30-day return on most items, easy returns

 7-10 day return, quality check required

Customer Service

 24/7 chat/phone support, AI chatbot

 Email, phone support during business hours

Offers & Deals

 - Prime Day sale - Great Indian Festival - Lightning Deals - Subscribe & Save

 - Big Billion Days - Festive sales - Exchange offers - Bank discounts

Membership

 Amazon Prime (1499/year) - Free delivery, Prime Video, Music

 Flipkart Plus (Free) - Rewards, free delivery, priority support

Special Features

 - Alexa integration - Amazon Fresh (groceries) - Kindle books - AWS hosting

 - Flipkart Wholesale - Shopsy (budget shopping) - Cleartrip integration

 

[Insert: Comparison screenshots of both websites]

 

Conclusion:

- Amazon: Better for international products, faster delivery, premium experience

- Flipkart: Better for Indian sellers, competitive pricing, festive sales  

40. Analyse a company's social media account (Zomato on Instagram). Make a table: Content Type vs Engagement.

Zomato Instagram Analysis 

[Insert: Screenshots of Zomato Instagram posts]

 

Content Analysis Table:

Content Type

 Frequency

 Avg. Likes

 Avg. Comments

 Engagement Rate

 Strategy

Meme/Humor Posts

 40%

 50K-100K

 500-1000

 High (8-10%)

 Witty food-related memes, trending topics, relatable content  

Food Photography

 25%

 30K-60K

 300-600

 Medium (5-7%)

 High-quality images, restaurant partnerships, food styling

User-Generated Content

 15%

 40K-80K

 400-800

 High (7-9%)

 Customer reviews, tagged posts, food blogger collabs

Promotional Offers

 10%

 20K-40K

 200-400

 Medium (4-6%)

 Discount codes, special deals, festive offers

Behind-the-Scenes

 5%

 25K-50K

 300-500

 Medium (5-7%)

 Team culture, delivery partners, app features

Video Content (Reels)

 5%

 60K-120K

 600-1200

 Very High (10-15%)

 Trending audio, food challenges, quick recipes

 

Key Observations:

1. Content Strategy:

   - Humor-first approach (40% memes)

   - Conversational tone with followers

   - Quick response to comments

   - Trending topic integration  

2. Posting Pattern:

   - 2-3 posts per day

   - Peak posting: 12 PM - 2 PM and 7 PM - 9 PM

   - Consistent daily presence

 

3. Engagement Tactics:

   - Witty captions

   - Question stickers in stories

   - Poll features

   - Collaboration with food influencers

   - Use of trending hashtags

 

4. Unique Selling Points:

   - Brand personality: Sarcastic, relatable

   - Cultural relevance: Indian food context

   - Community building: Food lovers' community

 

5. Success Metrics:

   - Followers: 1.5M+

   - Average engagement: 6-8%

   - Story views: 100K-200K

   - Brand recall: High due to meme culture

 

Recommendation:

Zomato's social media strategy is highly effective due to its entertainment-first approach rather than pure promotion, making it one of India's most engaging brand accounts.

 

41. Run a speed test (speedtest.net) and record Download/Upload speed.  

Process Steps:

1. Open web browser

2. Go to www.speedtest.net

3. Click "Go" button to start test

4. Wait for test to complete (30-60 seconds)

5. Record results

[Insert: Screenshot of Speedtest.net results]

 

Sample Output:  

Test Results:

- Download Speed: 85.42 Mbps

- Upload Speed: 42.18 Mbps

- Ping: 12 ms

- Server: Airtel Broadband (Hyderabad)

- ISP: Airtel

- Test Date: 02-Nov-2025, 6:00 AM

 

Interpretation:

- Download Speed: Good for HD streaming, large file downloads

- Upload Speed: Adequate for video calls, file uploads

- Ping (Latency): Excellent for gaming and real-time applications

 

Speed Requirements:

- Basic browsing: 5-10 Mbps

- HD video streaming: 25 Mbps

- 4K streaming: 50+ Mbps

- Video conferencing: 10-20 Mbps

- Online gaming: 25+ Mbps with low ping

42. Share a file via Bluetooth or LAN cable and document the steps.

 Method 1: Bluetooth File Sharing

 Steps:

1. Enable Bluetooth on both devices

2. Pair devices:

   - Settings → Bluetooth → Add device

   - Select target device

   - Confirm pairing code

3. Right-click file to share

4. Select "Send to" → "Bluetooth device"

5. Choose recipient device

6. Click "Send"

7. Accept file on receiving device

8. File transfer complete

 

[Insert: Screenshots of Bluetooth pairing and file transfer]

 

Method 2: LAN Cable File Sharing

 Steps:

1. Connect both computers with LAN cable

2. On Computer 1:

   - Right-click folder → Properties

   - Sharing tab → "Advanced Sharing"

   - Check "Share this folder"

   - Set permissions → OK

3. On Computer 2:

   - Open File Explorer

   - Type in address bar: \\Computer1Name\SharedFolder

   - Access shared files

   - Copy files as needed

 

[Insert: Screenshots of network sharing setup]

 

Advantages:

- Bluetooth: Wireless, convenient for small files

- LAN: Faster (100 Mbps - 1 Gbps), secure, better for large files

 

43. Create a Google Drive/Dropbox account, upload and share a file with a peer.

 Google Drive Process:

1. Create Account:

   - Go to drive.google.com

   - Click "Go to Google Drive"

   - Sign in with Gmail (or create new account)

   - Accept terms and conditions

 

2. Upload File:

   - Click "+ New" button

   - Select "File upload"

   - Choose file from computer

   - Wait for upload to complete

   - File appears in "My Drive"

 

[Insert: Screenshot of file upload]

 

3. Share File:

   - Right-click on uploaded file

   - Click "Share"

   - Enter peer's email address

   - Set permission level:

     * Viewer: Can only view

     * Commenter: Can view and comment

     * Editor: Can edit the file

   - Click "Send"

   - Peer receives email notification

 

[Insert: Screenshot of sharing settings]

 

4. Alternative Sharing Method:

   - Right-click file → "Get link"

   - Change to "Anyone with the link"

   - Copy link

   - Share link via email/chat

 

[Insert: Screenshot of link sharing]  

Benefits:

- 15 GB free storage

- Access from any device

- Real-time collaboration

- Automatic backup

- Version history  

44. Prepare a table with SaaS, PaaS, and IaaS examples and their business use.

 Cloud Service Models Comparison:

Service Model

Full Form

Examples

Business Use / Purpose

SaaS

Software as a Service

Google Workspace (Docs, Sheets), Microsoft 365, Zoom, Salesforce, Canva

Provides ready-to-use software applications over the internet. Businesses use them for productivity, collaboration, communication, and CRM without managing infrastructure or installation.

PaaS

Platform as a Service

Google App Engine, Microsoft Azure App Service, AWS Elastic Beanstalk, Heroku

Provides a development platform and tools for building, testing, and deploying applications. Businesses use it to develop custom software without managing servers or databases.

IaaS

Infrastructure as a Service

Amazon Web Services (AWS EC2), Microsoft Azure, Google Cloud Compute Engine, IBM Cloud

Offers virtualized computing resources such as servers, storage, and networking. Businesses use it to host applications, manage large-scale data, and run virtual machines while controlling the infrastructure.


Key Differences:

Control Level:

- SaaS: Least control (only application settings)

- PaaS: Medium control (development platform)

- IaaS: Maximum control (infrastructure configuration)

 

Management:

- SaaS: Provider manages everything

- PaaS: Provider manages platform, you manage apps

- IaaS: Provider manages hardware, you manage OS & apps

 

Cost:

- SaaS: Per user/month subscription

- PaaS: Pay per development hours

- IaaS: Pay per resource usage (CPU, storage, bandwidth)

 45. Compare Public, Private, and Hybrid clouds with examples in a table.

 Cloud Deployment Models Comparison:

Cloud Type

Description

Examples

Business Use / Purpose

Key Advantages

Public Cloud

Cloud services are delivered over the internet and shared across multiple organizations. The infrastructure is owned and managed by a third-party provider.

Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform

Used by startups and small to medium businesses for hosting applications, websites, or backups without heavy infrastructure investment.

Cost-effective, scalable, easy to deploy, no maintenance burden.

Private Cloud

Cloud infrastructure is dedicated to a single organization, either hosted on-premises or by a third party.

VMware Cloud, OpenStack, IBM Cloud Private

Used by large enterprises or government organizations that require high security and control over data and infrastructure.

High security, full control, customization, compliance-friendly.

Hybrid Cloud

Combination of public and private clouds working together, allowing data and applications to move between them.

Microsoft Azure Hybrid, AWS Outposts, Google Anthos

Used by organizations needing flexibility—keeping sensitive data on a private cloud while using public cloud for scalability and cost efficiency.

Flexibility, optimized costs, improved scalability, better data management.

 

[Insert: Diagram showing Public, Private, and Hybrid cloud architectures]

 Use Case Examples:

1. Public Cloud:

   - E-commerce website hosting

   - Email services (Gmail)

   - Social media platforms

   - Online storage (Dropbox)

 

2. Private Cloud:

   - Bank transaction systems

   - Hospital patient records

   - Government classified data

   - Corporate financial systems

 

3. Hybrid Cloud:

   - Retail: Store customer data privately, run website publicly

   - Manufacturing: Core operations private, analytics public

   - Education: Student records private, e-learning platform public

   - Media: Content production private, distribution public

 

Decision Factors:

Choose Public Cloud if:

- Budget is limited

- Quick deployment needed

- Scalability is priority

- Non-sensitive data

 

Choose Private Cloud if:

- Handling sensitive/regulated data

- Need complete control

- High security requirements

- Compliance mandates

 

Choose Hybrid Cloud if:

- Want both security and flexibility

- Gradual cloud migration

- Variable workloads

- Cost optimization needed

 

46. Create a strong password and test it on an online strength checker like "How Secure is My Password".

Strong Password Creation Rules:

1. Length: Minimum 12 characters (longer is better)

2. Mix characters:

   - Uppercase letters (A-Z)

   - Lowercase letters (a-z)

   - Numbers (0-9)

   - Special characters (!@#$%^&*)

3. Avoid:

   - Dictionary words

   - Personal information (name, birthdate)

   - Common patterns (123456, qwerty)

   - Repeated characters (aaa, 111)

 

Example Strong Passwords:

- Weak: password123 (Time to crack: Instant)

- Medium: Pass@123word (Time to crack: 3 days)

- Strong: P@ssw0rd#2025!Secure (Time to crack: 34 thousand years)

- Very Strong: mK9$pL#7qR*3vN@2wX (Time to crack: 6 million years)

 

Testing Process:

1. Go to www.howsecureismypassword.net or similar site

2. Enter password (Note: Use cautiously, preferably create test password)

3. View results showing time to crack

4. Improve based on suggestions

 

[Insert: Screenshots of password strength tests]

 

Password Management Tips:

- Use different passwords for different accounts

- Use a password manager (LastPass, 1Password, Bitwarden)

- Enable two-factor authentication (2FA)

- Change passwords every 6 months

- Never share passwords

- Don't write passwords on paper

 

47. Enable Two-Factor Authentication (2FA) for a Gmail account and show the authentication process.

Process Steps:

1. Enable 2FA:

   - Go to myaccount.google.com

   - Click "Security" in left menu

   - Scroll to "2-Step Verification"

   - Click "Get Started"

   - Sign in again to confirm

   - Enter phone number

   - Choose verification method (Text/Call)

   - Enter verification code received

   - Click "Turn On"

 

[Insert: Screenshots of 2FA setup process]

 

2. Authentication Methods:

Method 1: SMS/Voice Call

- Google sends code to registered phone

- Enter 6-digit code

- Access granted

 

Method 2: Google Authenticator App

- Download Google Authenticator app

- Scan QR code from Google

- App generates 6-digit code every 30 seconds

- Enter code to login

 

Method 3: Backup Codes

- Google provides 10 one-time codes

- Save securely

- Use when phone is unavailable

 

3. Login Process with 2FA:

   Step 1: Enter email and password (Something you know)

   Step 2: Enter code from phone/app (Something you have)

   Step 3: Access granted ✓

 

[Insert: Screenshots showing 2FA login flow]

 

Benefits of 2FA:

- 99.9% protection against account hacking

- Security even if password is compromised

- Alerts you to unauthorized access attempts

- Required for sensitive accounts (banking, email)

 48. Create a Word document listing 10 safe browsing tips.

 10 SAFE BROWSING TIPS FOR SECURE INTERNET USE

1. Use HTTPS Websites

   - Always check for padlock icon in address bar

   - Look for "https://" before the URL

   - Avoid entering sensitive data on "http://" sites

   - HTTPS encrypts your data during transmission

 

2. Keep Software Updated

   - Update browser regularly (Chrome, Firefox, Edge)

   - Enable automatic updates for OS

   - Install security patches promptly

   - Outdated software has security vulnerabilities

 

3. Use Strong, Unique Passwords

   - Different password for each website

   - Minimum 12 characters with mix of types

   - Use password manager for storage

   - Never save passwords in browser on public computers

 

4. Beware of Phishing Emails

   - Don't click suspicious links in emails

   - Verify sender's email address

   - Check for spelling/grammar errors

   - Don't download unexpected attachments

   - Banks never ask for passwords via email

 

5. Use Antivirus Software

   - Install reputable antivirus (Windows Defender, Avast, Norton)

   - Keep virus definitions updated

   - Run regular system scans

   - Enable real-time protection

 

6. Avoid Public Wi-Fi for Sensitive Transactions

   - Public Wi-Fi is unsecured

   - Use VPN if necessary

   - Avoid banking/shopping on public networks

   - Turn off file sharing on public networks

 

7. Verify Website Authenticity

   - Check domain name carefully (amazon.com vs amaz0n.com)

   - Look for trust badges

   - Read reviews before purchasing

   - Use official apps instead of browser for banking

 

8. Clear Browser Data Regularly

   - Clear cache and cookies periodically

   - Use private/incognito mode for sensitive browsing

   - Log out of accounts after use

   - Clear browsing history on shared computers

 

9. Be Cautious with Downloads

   - Download only from official sources

   - Scan downloads with antivirus before opening

   - Avoid cracked/pirated software

   - Check file extensions (.exe files can be dangerous)

 

10. Enable Two-Factor Authentication (2FA)

    - Add extra security layer to accounts

    - Use authenticator apps (Google Authenticator)

    - Enable for email, banking, social media

    - Protects even if password is stolen

 

Remember: Think Before You Click!

49. Create a PowerPoint/report on cyber threats (Malware, Phishing, DoS) with business examples.

 PowerPoint Presentation Structure:

 

Slide 1: Title Slide

- Title: "Cyber Threats in Digital Business"

- Subtitle: "Understanding Malware, Phishing, and DoS Attacks"

- Date: November 2025

[Insert: Cybersecurity shield image]

 

Slide 2: Introduction to Cyber Threats

- Definition: Malicious activities targeting digital systems

- Global cost: $10.5 trillion annually by 2025

- Impact: Data breaches, financial loss, reputation damage

- Importance: Critical for business survival

[Insert: Cyber threat statistics graph]

 

Slide 3: MALWARE (Malicious Software)

 

Definition: Software designed to damage or gain unauthorized access to systems

 

Types:

1. Virus: Attaches to files, spreads when shared

2. Trojan: Disguises as legitimate software

3. Ransomware: Encrypts files, demands payment

4. Spyware: Secretly monitors user activity

5. Worm: Self-replicates across networks

 

Real Business Example:

- WannaCry Ransomware (2017)

- Affected: 230,000+ computers in 150 countries

- Victims: NHS (UK), FedEx, Nissan, Renault

- Impact: $4 billion in losses

- Method: Encrypted files, demanded Bitcoin payment

 

Prevention:

- Install antivirus software

- Regular updates

- Don't open suspicious attachments

- Backup data regularly

 

[Insert: Malware types infographic]

 

Slide 4: PHISHING

Definition: Fraudulent attempts to obtain sensitive information through deceptive emails/websites

Types:

1. Email Phishing: Fake emails from trusted sources

2. Spear Phishing: Targeted attacks on specific individuals

3. Whaling: Attacks on executives/high-profile targets

4. Smishing: Phishing via SMS

5. Vishing: Voice call phishing

 

Real Business Example:

- Google & Facebook Phishing Scam (2013-2015)

- Attacker: Evaldas Rimasauskas

- Method: Posed as legitimate vendor (Quanta Computer)

- Sent fake invoices

- Amount stolen: $100 million from both companies

- Result: Criminal prosecution, funds partially recovered

 

Warning Signs:

- Urgent action required

- Suspicious sender email

- Grammar/spelling errors

- Requests for sensitive data

- Mismatched URLs

 

Prevention:

- Verify sender identity

- Don't click suspicious links

- Check URL before login

- Use email filters

- Employee training  

 

Slide 5: DoS & DDoS (Denial of Service)  

Definition: Attacks that overwhelm systems with traffic, making them unavailable to users

 

Types:

1. DoS: Single source attack

2. DDoS: Distributed attack from multiple sources (botnet)

3. Application Layer: Targets web applications

4. Protocol Attack: Exploits protocol weaknesses

5. Volumetric: Floods bandwidth

 

Real Business Example:

- Dyn DNS DDoS Attack (2016)

- Target: Dyn (DNS provider)

- Impact: Twitter, Netflix, Reddit, GitHub, Spotify down

- Duration: Several hours

- Method: Mirai botnet (100,000+ IoT devices)

- Affected: East Coast USA users

- Business Impact: Millions in lost revenue, damaged trust

 

Prevention:

- Use CDN (Content Delivery Network)

- Implement rate limiting

- DDoS protection services (Cloudflare, AWS Shield)

- Network monitoring

- Incident response plan

   

 

Slide 6: Impact on Businesses

Financial Impact:

- Direct costs: Recovery, ransom, legal fees

- Indirect costs: Downtime, lost customers, reputation

- Average data breach cost: $4.45 million (2023)

 

Operational Impact:

- System downtime

- Lost productivity

- Service disruption

- Supply chain interruption

 

Reputational Impact:

- Customer trust erosion

- Brand damage

- Stock price decline

- Legal liability

 

[Insert: Impact breakdown pie chart]

 

Slide 7: Protection Strategies

1. Technical Controls:

   - Firewalls and IDS/IPS

   - Antivirus/Anti-malware

   - Encryption

   - Multi-factor authentication

   - Regular backups

 

2. Administrative Controls:

   - Security policies

   - Access control

   - Incident response plan

   - Regular audits

 

3. Human Element:

   - Employee training

   - Security awareness programs

   - Phishing simulations

   - Report suspicious activity

 

[Insert: Security layers pyramid]

 

Slide 8: Conclusion & Recommendations

 

Key Takeaways:

- Cyber threats are evolving constantly

- No business is too small to be targeted

- Prevention is cheaper than recovery

- Human error is the weakest link

- Continuous vigilance is essential

 Action Items:

1. Implement comprehensive security policy

2. Train employees regularly

3. Keep systems updated

4. Use strong authentication

5. Have incident response plan

6. Cyber insurance consideration

 

References:

- Cybersecurity & Infrastructure Security Agency (CISA)

- Verizon Data Breach Investigations Report 2023

- IBM Cost of Data Breach Report 2023

 

50. Prepare a short report in Word summarising cyber laws in India (IT Act, DPDPA 2023) and their importance for digital businesses.

 CYBER LAWS IN INDIA: A COMPREHENSIVE GUIDE FOR DIGITAL BUSINESSES

 1. INTRODUCTION

 With India's digital economy growing rapidly, cybersecurity and data protection have become critical. The government has enacted comprehensive laws to regulate digital activities, protect user data, and punish cybercrimes. This report covers the two main frameworks:

- Information Technology Act, 2000 (IT Act)

- Digital Personal Data Protection Act, 2023 (DPDPA)

 

2. INFORMATION TECHNOLOGY ACT, 2000 (IT ACT)

 

Overview:

- India's primary law for electronic governance and cybercrime

- Enacted: May 17, 2000 (Amended in 2008)

- Objective: Legal recognition of electronic transactions and cybercrime prevention

 

Key Provisions:

A. Electronic Records & Digital Signatures (Sections 3-4):

   - Legal validity to electronic documents

   - Digital signatures equal to handwritten signatures

   - Importance: Enables e-contracts, e-commerce, online agreements

 

B. Cyber Crimes & Penalties (Sections 43, 66-67):

   - Section 43: Unauthorized access to computer systems - Compensation up to ₹1 crore

   - Section 66: Computer-related offenses - Imprisonment up to 3 years or fine up to ₹5 lakh

   - Section 66A: Sending offensive messages (Struck down by Supreme Court in 2015)

   - Section 66B: Dishonestly receiving stolen computer resource

   - Section 66C: Identity theft - Imprisonment up to 3 years and fine up to ₹1 lakh

   - Section 66D: Cheating using computer resources

   - Section 66E: Privacy violation (publishing private images) - Imprisonment up to 3 years or fine up to ₹2 lakh

   - Section 66F: Cyber terrorism - Life imprisonment

   - Section 67: Publishing obscene information - Imprisonment up to 3 years and fine up to ₹5 lakh

 

C. Data Protection (Section 43A):

   - Companies must implement reasonable security practices

   - Liability for negligence in protecting sensitive personal data

   - Compensation for affected individuals

 

D. Intermediary Liability (Section 79):

   - Internet service providers and platforms not liable for third-party content

   - Must follow due diligence requirements

   - Remove illegal content within 36 hours of notice

 

E. Cyber Appellate Tribunal:

   - Established for appeals against Controller or Adjudicating Officer orders

 

3. DIGITAL PERSONAL DATA PROTECTION ACT, 2023 (DPDPA)

Overview:

- Passed: August 11, 2023

- Effective: Rules being drafted (expected 2024-2025)

- Objective: Protect individual's digital personal data

- Scope: Applies to data processed digitally and offline data digitized later

 

Key Provisions:

A. Rights of Data Principals (Individuals):

   1. Right to Access: Know what data is being processed

   2. Right to Correction: Correct inaccurate data

   3. Right to Erasure: Request data deletion

   4. Right to Grievance Redressal: Complain to Data Protection Board

   5. Right to Nominate: Appoint nominee to exercise rights after death

 

B. Obligations of Data Fiduciaries (Businesses):

   1. Obtain valid consent before processing data

   2. Use data only for specified purpose

   3. Implement reasonable security safeguards

   4. Notify Data Protection Board of data breaches

   5. Appoint Data Protection Officer (for significant data fiduciaries)

   6. Complete data protection impact assessment

   7. Maintain records of data processing

 

C. Children's Data Protection:

   - Special protection for children under 18

   - Verifiable parental consent required

   - No targeted advertising to children

   - No behavioral monitoring

 

D. Cross-Border Data Transfer:

   - Data can be transferred to certain countries (whitelist to be notified)

   - Government may restrict transfers for sovereignty and security

 

E. Data Protection Board of India:

   - Independent regulatory body

   - Powers to investigate violations

   - Impose penalties

 

F. Penalties for Non-Compliance:

   - Up to ₹250 crore for serious violations

   - Penalties based on severity of breach

   - Government can block non-compliant entities

 

4. COMPARISON: IT ACT vs DPDPA 2023

Aspect

 IT Act 2000

 DPDPA 2023

Focus

 Cybercrime & e-governance

 Data privacy & protection

Scope

 Electronic transactions, cybercrimes

 Personal data processing

Penalties

 Up to 5 lakh + imprisonment

 Up to 250 crore

User Rights

 Limited

 Comprehensive (access, erasure, correction)

Consent

 Not explicitly required

 Mandatory and explicit

Data Breach Notification

 No specific provision

 Mandatory within specified time

 

 

5. IMPORTANCE FOR DIGITAL BUSINESSES 

A. Legal Compliance:

   - Avoid heavy penalties and legal action

   - Mandatory for e-commerce, fintech, healthcare, education platforms

   - Non-compliance can lead to business shutdown

 

B. Customer Trust:

   - Transparent data practices build customer confidence

   - Privacy protection as competitive advantage

   - Reduces customer churn

 

C. Data Security:

   - Forces implementation of robust security measures

   - Prevents data breaches and financial losses

   - Protects business reputation

 

D. Business Operations:

   - Clear guidelines for data collection and processing

   - Streamlines privacy policies

   - Enables international business (adequacy certifications)

 

E. Risk Management:

   - Reduces legal and financial risks

   - Insurance requirements

   - Investor confidence

 

6. COMPLIANCE CHECKLIST FOR DIGITAL BUSINESSES

☐ Conduct data audit (identify what data is collected)
☐ Implement consent management system
☐ Update privacy policy (clear, accessible language)
☐ Appoint Data Protection Officer
☐ Implement security safeguards (encryption, access controls)
☐ Establish data breach response plan
☐ Create user rights management system (access, deletion requests)
☐ Review third-party vendors for compliance
☐ Conduct employee training on data protection
☐ Set up grievance redressal mechanism
☐ Maintain data processing records
☐ Regular compliance audits

 

7. PENALTIES - RECENT CASES

1. WhatsApp (2021):

   - Issue: Privacy policy violation

   - Penalty: ₹550 crore (proposed by CCI)

   - Lesson: User consent is critical

 

2. Paytm (2022):

   - Issue: Data security lapses

   - Action: RBI restrictions on onboarding new customers

   - Lesson: Security infrastructure is mandatory

 

3. CERT-In Directives (2022):

   - Requirement: Report cyber incidents within 6 hours

   - Applies to: All service providers, intermediaries, data centers

   - Lesson: Incident reporting is non-negotiable

 

8. CONCLUSION

Key Takeaways:

- Cyber laws are evolving rapidly in India

- Both IT Act and DPDPA are crucial for digital businesses

- Compliance is not optional - it's a business necessity

- User privacy is a fundamental right

- Proactive compliance prevents costly penalties


Recommendations for Digital Businesses:

1. Stay updated with law amendments and rules

2. Invest in cybersecurity infrastructure

3. Make privacy a core business value

4. Conduct regular compliance audits

5. Seek legal counsel for complex situations

6. Train employees on data protection

7. Be transparent with users about data practices

 

Future Outlook:

- India moving towards stricter data protection regime

- Alignment with global standards (GDPR-like framework)

- Increased enforcement and penalties expected

- Digital businesses must prioritize compliance

 

"Data protection is not just a legal requirement; it's a business imperative in the digital age."

 

Instagram Follow @pgpsir

Comments

Post a Comment

Popular posts from this blog

Welcome to PGP Digitals!

Digital Marketing