CIW 1D0-525 Short notes: Exam Passing Tips

E-Commerce Site Development

  • MIME stands for Multipurpose Internet Mail Extensions. It is a standard for multi-part, multimedia electronic mail messages and World Wide Web hypertext documents on the Internet.
  • The number of hits per page will help you rank the Web pages in your site according to their popularity. The number of hits per page denotes the number of clicks on that particular page. The more the number of hits, the more popular is the page.
  • Electronic commerce (E-Commerce) includes the buying and selling of goods and services, and the transfer of funds, through digital communications.
  • E-Commerce increases efficiency, opens new markets, and can be used to communicate directly with the customer.
  • A Web site that is created should be efficient and easy to use. This is the main idea behind usability.
  • AutoComplete is a feature of a browser in which the user is provided with the options he has previously used.
  • The integration that can be used to manage data, security, etc., for the sales of goods and services conducted through the Internet is known as e-commerce.
  • The advantages of e-commerce are new markets, reduction in overhead and paperwork.
  • File Transfer Protocol (FTP) is an Internet service that helps in transferring files from one computer to another using the Internet.
  • Text hyperlink is the most appropriate and simplest way for creating links. In a text hyperlink, a piece of text is linked to other Web pages.
  • FTP is the primary TCP/IP protocol used to transfer text and binary files over the Internet.
  • TCP/IP is the primary protocol of the Internet.
  • SMTP uses port 25 by default.
  • <meta> tags are used to convey hidden information about a document, such as keywords, description, etc., to the server and the client.
  • The Common Gateway Interface (CGI) specification is used for creating executable programs that run on a Web server.
  • Push technology automatically transfers updated data to a Web client at a specified time. The update is initiated by the information server instead of clients having to request for it.
  • Point-to-Point Protocol (PPP) is a remote access protocol that supports encryption.
  • Index server is used to enable Web searching on corporate intranets and Internet sites. Once installed, it automatically builds an index of a Web server that can be easily searched from any Web site.
  • The planning phase is essential to the success of a Web development project. During the planning phase, the developer identifies the project goals, performs feasibility study, and determines the content to be presented.
  • The WIDTH attribute of the <table> tag is used to set the width of a table. Width can be specified in pixels and percentage.
  • The ALIGN attribute aligns the table within the text flow. By default alignment is set to left.
  • The BORDER attribute of the <table> tag is used to set the width of the table border.
  • <td> is a tag used to specify cells in a table.
  • B2C and B2B are types of e-commerce.
  • B2C stands for business-to-consumer. B2C involves transactions conducted between businesses and consumers over the Internet. For example, placing an order for a book or home appliance by a consumer to a business over the Internet.
  • B2B stands for business-to-business. B2B involves transactions conducted between businesses on the Internet. It is used to exchange products, services, or information between businesses. B2B is also known as e-biz.
  • Java Database Connectivity (JDBC) is a common base application programming interface (API), developed by Sun Microsystems Inc., for accessing data from a database.
  • JavaScript and Perl can be used to create and store cookies on client computers.
  • A cookie is a small bit of text that accompanies requests and pages as they move between Web servers and browsers. It contains information that is read by a Web application, whenever a user visits a site.
  • VPN stands for virtual private network. It allows users to use the Internet as a secure pipeline to their corporate Local Area Networks (LANs).
  • The World Wide Web Consortium (W3C) is an international industry consortium that develops common standards for the World Wide Web to promote its evolution and interoperability.
  • Following types of servers are dedicated to provide resources to other hosts on the network:
    • Mail servers
    • Print servers
    • Web servers
  • Payment gateway is one of the most important considerations while designing the payment part of the site. Payment modes can hamper or increase your site’s usability.
  • Shipping and handling are directly related to the potential customer
  • Online catalog is an important consideration in the designing stage of an e-commerce site. As users are going to interact mostly to this part of the site, the Webmaster needs to take great care of it.
  • A Cascading Style Sheet (CSS) is a separate text file that keeps track of design and formatting information, such as colors, fonts, font sizes, and margins, used in Web pages.
  • NAME, HTTP-EQUIV, and CONTENT are attributes of the <meta> tag.
  • Frames are extensions of the HTML 3.2 standard introduced by Netscape. Elements such as navigation links and title graphic, can be placed in static individual frames.
  • The <frame> tag defines the contents that will appear in each frame. It is used within the <frameset> tag. Frames allow users to display multiple HTML files at a time.
  • A Web server is a computer where the Web pages of a Web site are saved, processes the requests of a Web browser, and has a domain name and an IP address.
  • The Web pages can be created dynamically using other languages besides HTML, such as Java servlets, JavaScript, VBScript, etc.
  • Inventory refers to the stock of a specific product kept by a seller. The product is produced on the basis of the demand of the purchaser or customer.
  • Portal storefronts can be used as entry-level solutions for small businesses.
  • The Internet was first used in the late 1960s. It began in the form of ARPANET, which was created by the Advanced Research Projects Agency (ARPA) of the Department of Defense (DOD) in USA. The ARPANET consisted of research universities and military contractors with computers linked by telephone lines.
  • The Internet can be used to perform e-business transactions successfully. E-business transactions include buying and selling of goods and services, customer and technical support, bank transactions, etc.
  • Visual Basic is a language that is used to create Windows applications.
  • Banners can be used for giving ads on a portal or a Web site.
  • In entry-level e-commerce, a merchant will not consider an unlimited budget, the reason being that he is still a new entrant into e-commerce. An unlimited budget may prove to be a loss for the merchant.
  • The Web server that is to be set up should have a high quality and of reasonable cost. The Web server should be stable and its performance should be good.
  • The performance can only be checked through the software that is installed on the Web server.
  • Uptime is the length of time a Web server has been running since it was last rebooted.
  • Hypertext Transfer Protocol (HTTP) is a client/server TCP/IP protocol used on the World Wide Web (WWW) to display Hypertext Markup Language (HTML) pages.
  • The default port for HTTP is 80.
  • Affiliate programs are services in which a link or button is provided on a merchant’s Web site.
  • A template is a pre-defined structure that can be used for creating Web pages easily.
  • Letters are postal mails and cannot be used for e-commerce because letters cannot be sent electronically. E-mails can be used instead of letters for e-commerce.
  • Public key encryption is the other name for asymmetric encryption.
  • The <meta> tag provides information that can be used in programs such as search engines.
  • The content inventory includes information to be given on the site and site functionality.
  • The Web server is a central location where data related to a Web site is saved. A centralized database is easy to maintain. The storing and retrieving of data through the centralized database is also very easy.
  • Redundant links are useful, as they can connect the Web pages with one another.
  • The submit button sends the data to the server’s URL, which is provided in the action attribute of the <form> tag.
  • An image map is a single image that is divided into multiple sections, and each section is linked to a Web page.
  • The Favorites feature is available on Microsoft’s Internet Explorer and the Bookmark feature is available on Netscape Navigator.
  • Inventory does not depend on cash reserves. It depends on the demand of a product, and the cost and time required for manufacturing the product.
  • The merchant account is used for credit card processing. A merchant is a person or organization that sells goods or services to the cardholder.
  • Electronic Funds Transfer (EFT) is a method of automating the payment process. EFT allows businesses to conduct financial transactions electronically.
  • The Originator is an individual, organization, or any other entity that initiates entries into the Automated Clearing House (ACH) Network.
  • Receiver is an individual, organization, or any other entity that has authorized an Originator to initiate a credit or debit entry to a transaction account held at a Receiving Depository Financial Institution (RDFI).
  • Receiving Depository Financial Institution (RDFI) is any financial institution qualified to receive ACH entries that agrees to abide by the NACHA Operating Rules and Guidelines.
  • A payment gateway is required to process online credit card payments. It is a mechanism to process credit card transactions for validation and to transfer funds.
  • There are three types of transactions during a digital cash procedure. The types of transactions are as follows:
    • Withdrawal
    • Payment
    • Deposit
  • The following are entities that are involved in digital cash system:
    • Bank or financial network
    • Payer or a consumer
    • Payee or shop
  • Digital cash is anonymous, portable, and transferable.
  • EBPP stands for Electronic Bill Presentment and Payment. It is a process through which companies create bills for their customers and receive payments from them electronically over the Internet.
  • Customers may use EFT to electronically transfer the amount to their suppliers, instead of issuing checks on the arrival of goods.
  • The Automated Clearing House (ACH) is a highly reliable and efficient nationwide batch-oriented electronic funds transfer system.
  • NetCash is not an online payment system.
  • Digital cash does not contain the identity of its purchaser, as user information is not required with digital cash.
  • Digital cash is a system to pay for a transaction by transmitting a unique number in place of credit card information.
  • Payment gateway is a mechanism to validate the processing of a credit card transaction and to transfer funds.
  • E-mail is not a model of payment supported by e-commerce.
  • The payment models used in e-commerce are credit cards, cash, and checks.
  • A payment gateway is not a credit card processor. It is a link to a credit card processor and is used to authorize or deny credit card payments.
  • A credit card is a plastic card with a magnetic strip. It is issued by a bank to an individual and can be used to perform bank transactions on the Internet.
  • PDN stands for Private Digital Network. It is a computer network that is used to transfer information of a credit card securely.
  • A Web form can be used as an entry point in a knowledge base.
  • A knowledge base can be made successful by maintaining the knowledge base, updating the knowledge base, and informing users about new topics that are inserted in the knowledge base.

E-Commerce Technology and Security

  • Open Buying on the Internet (OBI) is a standard process that identifies how a company makes purchases through the Internet from a selling company.
  • B2B is a type of e-commerce where a transaction is performed between two companies or businesses.
  • Microsoft Internet Information Server (IIS) is a Web and application server for the Internet and private intranets.
  • The time the Web server takes to provide results in the users’ Web browsers should be considered for monitoring the Web server’s performance.
  • Log files are those files that are maintained by the Web server. These files record the information about a Web site, such as the number of visitors, number of hits, click patterns, etc. Log Analysis software is used to determine the information of the log files.
  • The Not Found error is displayed if the page for which the user has requested does not exist on the Web server. Its status code is 404.
  • The browser name is not included in the header information sent by a Web server.
  • PWS stands for Personal Web Server. It can be installed on a Windows 98 computer. It is compatible with IIS and can be used for serving a small Web site or an intranet. It can also be used for testing purposes.
  • Encryption is the process of converting text to a format, which cannot be read by humans.
  • Authentication is a process in which a user has to be authenticated before using the resources of a Web server.
  • In order to protect the files related to a Web site from being tampered, following should be applied:
    • A directory and its files can be encrypted to prevent the use of data and its modification.
    • A virtual directory can be created and mapped with the physical directory. Hence, unauthorized users will not be able to locate the actual directory.
    • A directory can be authenticated so that unauthorized users are unable to access it.
    • The visitors of a Web site can access a physical directory through a virtual directory.
  • Click-through rate is the total number of users visiting a Web site by clicking the banner advertisement.
  • Web caching is a method for minimizing performance bottlenecks and reducing network traffic by serving locally cached Web content.
  • Bottlenecks are usually found in network connection, slow hard disks, and lack of memory for static HTML pages. Bottleneck in ASP application performance is connection management.
  • A hit counter is a simple counter that displays the number of visitors to a page. Hit counters are generally found at the bottom of HTML pages.
  • A newsgroup can provide correct information related to a company. A newsgroup is a public bulletin board where Internet users can communicate easily and post, read, and reply to incoming messages.
  • Electronic commerce, popularly known as e-commerce, refers to the method of conducting business communication and transactions over networks and through computers.
  • Click pattern is a route through which a user has visited and surfed a Web site.
  • A site can be considered as a dead site for the following reasons:
    • If the copyright dates are not updated as per the current year,the site can be considered as a dead site.
    • A link that does not open to another page is known as a broken link. If a Web site contains such links, it can be considered as a dead site.
    • If a Web site is based on old technologies, it can be considered as a dead site.
  • Throughput is the amount of data that is served to the users in a given period of time.
  • A Web server cannot update the technology of a Web site by itself. The technology used in a Web page can only be updated by the owner of the Web site.
  • Throughput is related to the performance of a Web server.
  • Responsiveness refers to the speed of a Web site. This speed is measured by the period of time a Web page takes to load onto a user’s Web browser.
  • Bottleneck is a situation caused by excessive demand on scarce system resources.
  • Clustering is a way of grouping multiple Web servers to handle heavy traffic.
  • A site map is a Web page that contains a hierarchical list of links of all the major sections of a Web site.
  • Load time refers to the length of time taken by a Web page to load completely on a Web browser. It can be used to check and improve the performance of a Web site.
  • Symmetric encryption is a type of encryption that uses a single key to encrypt and decrypt data. Symmetric encryption algorithms are faster than public key encryption.
  • The Web browser’s Security setting controls the way in which a Web browser receives information and downloads content from Web sites.
  • Asymmetric encryption is a type of encryption that uses two keys – a public key and a private key pair for data encryption.
  • Secure Sockets Layer (SSL) is a protocol developed by Netscape for transmitting private documents via the Internet. Secure Sockets Layer (SSL) uses a combination of public key and symmetric encryption to provide communication privacy, authentication, and message integrity.
  • The International Data Encryption Algorithm (IDEA) is a block cipher that operates on 64-bit blocks using a 128-bit key.
  • Encryption is a method of securing data while it travels over the Internet. The encryption software encodes information from plain text to encrypted text, using specific algorithms with a string of numbers known as a key.
  • The name of the key is not a factor on which encryption strength is based.
  • The cryptographic technique prevents attacks against the communication between two parties. It encrypts the messages sent and received between two entities.
  • Symmetric encryption is the simplest encryption method that can be implemented in this situation.
  • PGP is an asymmetric method of encrypting data for security.
  • The acronym PGP stands for Pretty Good Privacy (PGP). It is an encryption method that uses public-key encryption to encrypt and digitally sign e-mail messages during communication between e-mail clients.
  • Standard Internet e-mail is usually sent as plaintext over networks. This is not secure, as intruders can monitor mail servers and network traffic to obtain sensitive information.
  • The Diffie-Hellman encryption was developed by Diffie and Hellman in 1976 and published in the paper named “”New Directions in Cryptography.”” It is a key agreement protocol (also called exponential key agreement) that allows two users to exchange a secret key over an insecure medium (such as the Internet) without any prior secrets.
  • Encryption ensures the integrity of a message sent through e-mail.
  • Authentication is a process that authorizes a message, authorizes the sender of a message, and authorizes the receiver of a message.
  • The other name of encrypted text is ciphertext. Text can be encrypted using different types of encryption schemes.
  • DES stands for Data Encryption Standard. It is an algorithm that is used to encrypt and decrypt text.
  • A digital certificate is used with public key encryption.
  • A certification authority certificate is owned by a trusted certificate provider. It is also known as a master certificate.
  • All types of encryption can be broken.
  • AVS stands for Advanced Verification Service. It is used to compare the billing address of the transaction with the billing address of the credit card.
  • A block cipher converts a block of plaintext to a block of ciphertext.
  • Industrial Property Law includes industrial design, invention, trademark, etc.
  • Secure Sockets Layer (SSL) can be used to secure a Web server. Server certificates are necessary in order to use SSL.
  • A message digest is a method of applying one-way encryption to provide authentication.
  • X.509v3 is the standard established to define the content and format of a digital certificate.
  • Firewall is a security facility used to protect the network of an organization from external attacks by intruders.
  • Boot sector, network files, and system files are vulnerable to virus attacks.
  • Certificate server is a standards-based, highly customizable server program for managing the creation, issuance, and renewal of digital certificates.
  • Encrypted text is referred to as ciphertext while original text is referred to as plaintext.
  • Digital signature is a personal authentication method based on encryption and authorization code.
  • Authentication is a process of verifying the identity of a person, network host, or system process. The authentication process compares the provided credentials with the credentials stored in the database of an authentication server.
  • Secure Electronic Transaction (SET) is a standard protocol for secure electronic transactions, such as credit card payments, over the Internet. SET uses 56-bit Data Encryption Standard (DES) encryption and requires digital signatures to verify the identity of all parties involved in a transaction.
  • SYN attack refers to a condition in which a hacker sends a bunch of packets that leave TCP ports half open.
  • VeriSign is a certification authority that issues digital certificates. A user can request VeriSign to verify the validity of the certificate.
  • PING is a utility that sends Internet Control Message Protocol (ICMP) request packets to a specified destination host.
  • Packet filtering is a method that allows or restricts the flow of specific types of packets to provide security.
  • Certificate-based authentication is the most secure method of authentication. It provides stronger key for encryption as compared to Digest authentication and sends encrypted passwords across the network. This prevents unauthorized users from intercepting the passwords.
  • NTLM version 2 uses 128-bit encryption. It is the most secure form of challenge/response authentication.
  • A denial-of-service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network.
  • Anonymous authentication is generally used for public Internet Web sites. Using this method, a user can establish a connection with a Web server without providing username and password.
  • Secure Sockets Layer (SSL) session keys are available in 40-bit and 128-bit lengths.
  • In a brute force attack, unauthorized users attempt to log on to a network or a computer by using multiple possible user names and passwords.
  • Hypertext Transfer Protocol Secure (HTTPS) is a protocol used in the Universal Resource Locater (URL) address line to connect to a secure site.
  • Secure Shell (SSH) is a protocol that provides strong authentication and secure communications over unsecured channels.
  • Public Key Infrastructure (PKI) provides security through data encryption and digital signature.
  • A certificate is a digital representation of information that identifies authorized users on the Internet and intranets.
  • Blocking all the packets, unless they are explicitly permitted, is the most secure policy for a firewall.
  • Secure Shell (SSH) is a protocol. It uses public key encryption as the main method for user authentication.
  • Certification authority (CA) is an entity in a network, which manages security credentials and public keys for message encryption.
  • Certificate Authority is a trusted third-party organization that issues digital certificates to create digital signatures and public key pairs.
  • In Digest authentication, passwords are sent across a network as a hash value, rather than as clear text.
  • Digest authentication is a more secure authentication method as compared to Basic authentication.
  • The encryption frameworks and digital signatures have been developed to address security issues in the e-commerce system.
  • Method=post is the preferred method for sending lengthy form data. When a form is submitted through POST, the user does not see the form data that was sent.
  • Hypertext Transfer Protocol Secure (HTTPS) is used to access a secure Web server on the Internet. In case of a SSL connection between a Web browser and a Web server, you must enter HTTPS instead of HTTP as the protocol type in the URL.
  • Caching Servers decrease the download time of the Web pages that are frequently visited by users.
  • Caching Servers store the Web pages previously retrieved by users in their memory and serve them directly to users who later request for the same data.
  • Using the SSL protocol, clients and servers can communicate in a way that prevents eavesdropping and tampering.
  • Use SSL and encrypted authentication to secure the Web server in order to allow only authenticated users to access it.
  • SSL allows the server to authenticate itself to the client by using public-key techniques. It then allows the client and server to cooperate in creating symmetric keys that are used for encryption, decryption, and tamper detection during the SSL session that follows.
  • In the SSL model of security, the client always authenticates the server, and the server has the option to authenticate the client. In normal circumstances, Web servers do not authenticate the client during the handshake process.
  • The maximum session-key strength supported by IIS server is 128-bit. You can configure the Web server to require a 128-bit minimum session-key strength, rather than the default 40-bit key strength, for all SSL secure communication sessions.
  • The verification of a client can be done externally from the SSL session to reserve precious processing resources for encrypted transactions.
  • By default, HTTP uses Transmission Control Protocol port 80, while HTTPS uses port 443.
  • Digital signature is a personal authentication method based on encryption and authorization code. It is used for signing electronic documents.
  • A message digest is a number, which is created algorithmically from a file and represents that file uniquely.
  • Digital certificate should be used to verify the identity of a potential customer.
  • PPTP and HTTPs are the protocols can be used for establishing a secure connection over the Internet.
  • Server optimization is a goal to optimize the performance and resource utilization of the server.
  • The process of limiting access to the resources of a Web site is called access control.
  • A certificate is a digital representation of information that identifies authorized users on the Internet and intranets.
  • Access control can be performed in the following ways:
  • Registering the user in order to access the resources of the Web site. This can be confirmed by the user name and password.
  • Limiting the time during which resources of the Web site can be used. For example, the Web site can be viewed between certain hours of a day.
  • A Certification Authority can issue certificates to other Certification Authorities, must be trusted by all parties involved in a transaction, and can issue a certificate to many users.
  • Packet sniffing is a process of monitoring data packets that travel across a network.
  • Virtual Private Network uses encrypted data streams over public networks, can exist between firewalls, and can exist between a client computer and a firewall.
  • The Digital Millennium Copyright Act protects an ISP against a copyright infringement regarding the contents of a Web site that is being hosted by the ISP.
  • SSL uses symmetric and asymmetric encryptions.
  • The security system used by a Web server are authentication, data integrity, access control, etc.

E-Commerce Business, Marketing, and Legal Issues

  • Layer 2 Tunneling Protocol (L2TP) is a more secure version of Point-to-Point Tunneling Protocol (PPTP). It provides tunneling, address assignment, and authentication.
  • According to the Digital Millennium Copyright Act (DCMA), selling code-cracking devices or software on an e-commerce site is not permitted.
  • The Digital Millennium Copyright Act (DMCA) protects ISPs from copyright infringement liability for simply transmitting copyright material over the Internet.
  • The credit card issuing company has violated the Privacy law. According to the Internet Privacy law, a company cannot provide their customer’s financial and personal details to other companies.
  • If an ISP notices that his customer’s Web site has constituted a copyright infringement, the ISP will remove the copyrighted content from the Web site.
  • According to the Digital Millennium Copyright Act (DMCA), it is not illegal for a site to provide free downloads of shareware.
  • An intellectual property is a creative idea and expression that possesses commercial value and receives the legal protection of a property right.
  • The customer’s privacy and safety are the most important things to consider while designing an e-commerce site.
  • When a copyrighted article is published by its owner, republishing the article by another person constitutes a copyright violation.
  • The Paris Convention governs the management of intellectual property.
  • Digital Millennium Copyright Act was passed by Congress and then signed by the President. Title II, the Online Copyright Infringement Limitation Act, sets clear guidelines through which an ISP will not be held for copyright infringement by following specific guidelines dictated by the new law.
  • A new section 43(d) of the Trademark Act (Lanham Act) states that anyone who in bad faith registers, traffics in, or uses a domain name that infringes or dilutes another’s trademark has committed trademark infringement.
  • A copyright is a form of intellectual property, which secures to its holder the exclusive right to produce copies of his or her works of original expression, such as a literary work, movie, musical work or sound recording, painting, photograph, computer program, or industrial design, for a defined, yet extendable, period of time.
  • List server is an SMTP server that forwards e-mails it receives to all the members in the list of e-mail recipients forming a discussion group.
  • A crawler is a software component of a search engine. It explores the Internet for Web sites, makes copies of the Web pages found, and stores these pages in the search engine’s index.
  • Knowledge Query and Manipulation Language (KQML) is a language and protocol for knowledge management such as exchanging information and knowledge. It is used as a language for an application program to interact with an intelligent system.
  • KQML is both a message format and a message-handling protocol to support run-time knowledge sharing among agents.
  • Search engine can be used to index and facilitate searches on Web pages and news group articles.
  • CPM refers to the cost per thousand impressions. It is a method to price banner advertisements.
  • A search engine is a program that searches for keywords in a document, database, or a Web page on the World Wide Web (WWW).
  • The following are essential in order to attract visitors to a Web site:
    • The Web site’s rank should be high in search engines.
    • The Web site should have a number of links on other Web sites.
  • A spider is used by search engines to index WWW documents. It is a software component of a search engine. It explores the Internet for Web sites, makes copies of the Web pages found, and stores these pages in the search engine’s index. A spider is also known as a Web crawler.
  • The click-through ratio is used to describe the ratio of clicks to impressions on an advertisement. It helps Webmasters to know the ratio of people visiting the sites advertised through the banner on his site in relation to the number of times the banner is shown.
  • An online product catalog contains the information of the products sold in the site, their prices, images, rates and other related information. This catalog is important for every e-commerce site, as it helps the buyer to purchase products.
  • A trademark is a mark that is used by a company to distinguish its products from those of other companies.
  • FAQs are answers to most of the questions that are very often asked by the customers.
  • Target marketing is a process of determining the areas where the online promotion is viewed by the audience and make marketing strategies accordingly.
  • Tangible goods are physical goods that can be touched by a user.
  • Polls are a kind of survey. They can be used to ask a customer about the quality of a product or to know about the defects or weaknesses of a product, and so on, in order to improve the product.
  • A portal is a Web site that is used by users as an entry to the Internet. It functions as a central location for browsing the Internet and provides services such as search engines, e-mails, chat rooms, weather information, etc.
  • A spider is a program that is used to fetch the Web pages in a search engine.
  • Banners are media that advertise products or services by placing them as hyperlinks on Web pages.
  • A banner is an image advertisement on a Web page that is linked to the Web page of the advertiser’s Web site.
  • Publisher sites are those sites that sell advertisements and solely depend upon advertisements for revenue.
  • CPC stands for cost per click. It is an Internet formula that is used to price banner ads. The payment is made to the publishers by their advertisers on the basis of the number of clicks on a specific banner ad.
  • The URL of a Web site is a mandatory requirement for registering a site in a search engine.
  • The size of banner ads is measured in pixels.
  • Log analysis can be used to track the effectiveness of his banner.
  • Opt-in is a technique of collecting an email list of the users by providing a form for users to subscribe on a Web site.
  • Log Analysis software is used to determine the information of the log files.
  • A catalog is a compilation of product details. It contains a list of products or services and can be used to put on a Web page all the information that is necessary for the products or services offered by a company. A customer can access all the information about a product in the catalog.
  • An FAQ should include shipping rates, changing or canceling an order, etc.
  • A page view refers to the number of times a Web page is accessed by a user.
  • A page view refers to only the number of times a Web page is accessed, whereas a hit refers to the number of times a Web page is accessed with all its objects and contents.
  • A portal provides the facilities of a search engine, e-mail, shopping mail service, etc.
  • E-mail marketing can be performed through opt-in technique.
  • A robots file is used to prevent certain files and directories from being indexed by a spider program. The name of a robots file is robots.txt.
  • IITF stands for Information Infrastructure Task Force. It consists of high-level representatives of the Federal agencies that play a major role in the development and application of information technologies.
  • A message board is a page on a Web site that is used to publish legal notices.
  • Personalized pages are the best way to show information that is based on the customers’ last visits or purchases. By doing so, the customers will feel comfortable with the site.
  • Communication refers to the process of sending and receiving information between two or more users.
  • Chat services, voice connections and co-browsing can be used as e-services.
  • Voice connection is also known as telephony. In this process, a user can talk to other users through the Internet.
  • Co-browsing is a type of e-service in which a customer support representative is allowed to control the customer’s browser.
  • A message board is also known as a forum. It is a facility on the Internet that can be used for holding discussions.