tags 7. Mobile Commerce: Benefit and security issues. Different e-commerce applications , mobile shopping. 8. Tags Hyper Links: Creating links between pages, Linking to other sites Email links 9. Images: How to add images to pages, alignment, formatting, choosing the right format. 10. Lists: Numbered lists, Bullet lists, Definition lists 11. Tables: Create table row and columns, Use the four key elements for creating tables, Represent complex data using tables, Add captions to tables Project Assignment. E-commerce security: security scams, improving security, types of online threats and attacks, Firewalls, VPNs and intrusion detection systems.
The objective of this course is to provide the students with good understanding of principles on internet service design, and usage of internet and email along with web page des1gnmg and Implementation of a complete web site.
Course Learning Outcomes
• The outcome is becoming aware of the possible dangers to an information system and business data. It is the first step to arming yourself effectively against virtual threats, such as viruses, hackers etc. ..... • Viruses have been known to shut down business operations around the globe in seconds but the student can avoid this kind of problem with a little knowledge and foresight. • Encrypting electronic message is another way of protecting sensitive information. After taking this module, the student will become aware of the tools available that are necessary for any business that uses computer regularly to store or transmit information. . ' • The student will also become more comfortable in using the latest specialization features that the Internet has to offer in term of security and data protection.