Monday, August 13, 2018

Give four different types of business activity and demonstrate how to solve the problems in internet use [M1]

1) Non-deliver of email


I am going to demonstrate on different problems faced by users in business in which I will first start with “non-deliver of emails”. As you can see, I just sent an email but I receive an email from “mail delivery system” instead. So basically, when you receive the notification of “mail delivery system” it means that your receiving email is either wrong or there are some features not included in your email.

The causes may vary to different factors, but what to prevent it from happening?

1. Double check either the email address that you want to send to is correct or not
2. Make sure not to miss any important features like the subject, etc.
3. Make sure you have a good connection service


If you don’t receive the mail delivery system email, that means that you have sent to the correct email. 

2) Too many hits on search engine




Next, too many hits on search engine. At times, this can be frustrating and time-consuming to some business users when they are planning to use the internet for some purposes especially when doing business research. in this case, I am going to find an article about entrepreneurship program in Brunei.

In order to lessen the amount of hits on search engine, there are few steps that business users need to follow:

1. Make sure to use unique, specific terms to reduce the number of pages shown
2. Use quotation mark for exact phrase
3. Don’t use common words and punctuation
4. Use capitalization
5. Drop the suffixes. it is usually best to enter the base word so that you won’t receive any irrelevant pages. For instance, putting the word "business" instead of "businesses".

By doing so, users can immediately find their targeted pages instead of wasting more time scrolling through the webpage. Most importantly, users can start their business research effectively.

3) Email spams




Many email spam messages are commercial in nature but may also contain disguised links that appear to be for familiar websites but in fact lead to phishing web sites or sites that are hosting malware.


Chances are that most of us reading this email can easily identify a spam message in our inbox and ignore it. However, not everybody is as experienced in the methods of marketing and the risks associated with spam. There are individuals in the world who will respond to spam messages, giving the malicious spammers who sent them exactly the risky financial or personal information that those spammers want. The result can be profit for the spammers and even financial loss for the recipients.

Actions taken to reduce risks of email spams:

1. Maximize filter use. Gmail includes tools for filtering email and blocking spam as well
2. Never respond to email spams
3. Block and report spam. If your email provider offers these services, take advantage of them. You may think that deleting a spam message is enough, but all that does is remove one message from your inbox. When you block messages from a certain sender, that sender cannot use that same email address to send you more messages.

4) Error messages




An error message is a message displayed to the user by an operating system or application when an unexpected condition happens. In most cases, error messages are displayed with the help of dialog boxes by the operating system or application. Error messages are required when user intervention is needed or to pass important warnings.

The solution to reduce risks are as following:

1. Re-check the word spelling before entering to the search box
2. Assure that connection service is stable
3. Make sure not to miss any features like http:// or www as it will make a difference
4. Do not use any shortform


Describe the actions taken to reduce risks to security whilst using the internet for different types of business activities. [P4]


Using or setting up password

Utilizing a VPN which is also defined as "virtual private system".  It is only an extravagant method of saying "ensure my profile is secured and protected when I'm on the web." With free wi-fi in coffeehouses and airplane terminals, an even more increasing number of programmers are utilizing basic "man in the middle" attacks to trap individuals into signing onto their phony systems. From that point, it's simple for them to take your data especially personal ones. Utilizing VPN service protects you from these hackers when out and about, masking your online presence.

Next, savvy password practices. It means that your online passwords ought to never be as simple as "password”, "abc123”, “123456” or anything that can be simply speculated and predicted. In the event that you utilize one specific password key for all your online accounts, once a hacker successfully breaks in one of your accounts, he could without much of a stretch bring down the rest of your accounts. That implies to your email, online banking details and everything. However, you can reduce the risks by utilizing distinctive passwords for various accounts and services and changing them on regular basis, let say monthly. It may appear as a problem, however it’s a way better issue than having your personal online banking details ruptured.

Another action that should be taken is to utilize anchored sites. Most internet browsers, for example, Google Chrome will demonstrate a green symbol in the URL address bar at whatever point you are on a site that is anchored. Another pointer of security is if the site address begins with "https" versus "http." That little expansion of the "s" implies the site you are on is secured and safe to surf through. In some cases where you are doing online shopping on the web or doing anything that expects you to give touchy information, ensure the site address begins with https.

Next, users should not forget to use anti-malware programming. Nearly everybody knows about antivirus programming. Numerous anti-malware programme incorporates the capacity to examine and anticipate malware, but not every each of them. In order to stay protected, user need to supplement their current antivirus programme with a standard anti-malware software, for example, Malwarebytes and make sure to dependably stay update with the latest version of security software.

Checking before downloading emails

Firstly, if you get a phishing email message, never respond to it and try not to open junk mail by by any chance. Basically, phishing is a sort of online identity fraud that utilizes email and fake sites that are intended to take your own information or data, for example, credit card numbers, passwords, account information or other important data. To shield yourself from phishing tricks sent through email, if an email looks suspicious, don't put yourself in danger to your own data by reacting to it. Next, try to erase junk email messages without opening them. Now and then notwithstanding opening spam can alert spammers or put an unprotected PC in danger. It is vital to ignore an email except if you're sure that the message originates from a reliable source and make sure to make full use of the junk mail tools in your email program.

Approach links in email messages in alert. Links in phishing email messages frequently take you to imposter locales that urge you to transmit personal information or money-related data to swindlers. User must abstain from clicking a connection in an email message except if you are certain of the reliable target address, URL, or from a substantial sender. Most email programs demonstrate you the actual target address of a connection when you drift the mouse over the connection inside the message. Before you click a link, make a point to peruse the objective address. On the off chance that the email message seems to originate from your bank, yet the objective address is only an aimless arrangement of numbers, don't tap into the link as it may be a scam. Additionally, ensure that the spelling of words in the connection matches what you anticipate. Spammers and tricksters frequently utilize URLs with grammatical errors and transposed letters in them that are barely noticeable.

Next step is do not confide in the sender data in an email message. Regardless of whether the email message seems to originate from a specific sender that you know and trust, utilize similar precautions that you would use with some other email message. Users should also be extra cautious with spoofing activity. It is the action where the sender address and different parts of the email header are changed to seem like the email started or was sent from an alternate source. This is a typical routine with regards to spammers and is one of the hardest to tackle as there might be legitimate reasons to spoof an address.

Backing up data

First, continuously back up your information. Counteractive action is the best assurance. Make an organized reinforcement methodology and always back up your data. Your backup plan ought to incorporate the diverse levels of information you keep up in your organization and the calendar for their back-ups. A few information is critical to the point that it might require you to back it up weekly. Likewise, make sure you intermittently test your reinforcements to ensure that your information is being backed up appropriately.

Secondly, enhance your backups. You generally need in excess of one backup system. The general rule is 3-2-1. You will need to have 3 backups of anything that is imperative. They ought to be backed up in no less than two different formats, for example, in the cloud and on a hard drive. Also, there should dependably be an off-site backup if there is harm to your physical device.

Thirdly, encrypt sensitive data. Information isn't generally encoded even when it's on a backup tape. It’s best to put on some investments into a backup system or services that naturally encrypts all backups to guarantee that regardless of who gets their hands on your information, they can't get to it.
Furthermore, users must also avoid malware. One of the greatest dangers to your data file is pernicious program, usually known as malware. Viruses, Trojans and worms are all waiting to pounce and can be subtly installed on your PC in various ways. These damaging programs make an expansive number of undesirable and destructive sections in your registry, regularly causing system crashes including numerous machines. This is the reason why you have to ensure your PC with dependable security system. A quality anti-malware program is an absolute necessity nowadays, alongside firewall components. Also, you can utilize a registry clearing device to clear out the majority of the document remainders deserted from uncomplete installations.

There are number of standard items promptly accessible on the web to keep all your files and information. Security programs like McAfee and Symantec offer a portion of the best system to ensure you against the normal risk of malware. There are additionally many cleaning utilities particularly intended for your Windows registry.


Taking precautions

It is best to keep personal information professional and limited. Potential managers or clients don't have to know your own relationship status or your place of residence. They do need to think about your aptitude and professional background and how to connect with you. You wouldn't hand simply individual data out to outsiders exclusively especially to a huge number of individuals on the web.

Moreover, keep your privacy settings on. Advertisers love to thoroughly understand you, thus do hackers and scammers. Both can take in a considerable measure from your surfing and activity in social media. Just like what it seems, you can take part in the responsibility of your data. Both internet browsers and mobile operating systems have settings accessible to secure your protection on the web. Significant sites like Facebook likewise have protection upgrading settings accessible.

Next action that needs to be taken is to practice safe browsing. You must avoid visiting unsafe neighborhoods on the web. Cybercriminals utilize offensive substance as a clickbait. Both scammers and hackers are smart enough to know that users nowadays are always enticed by questionable substance and may let their watch down while scanning for it. The internet's demimonde is loaded up with entanglements that are hard to see, where one indiscreet snap could uncover individual information or taint your personal device with malware.

Another step is to ensure your internet connection is secure. When you go online in an open place, for instance, using an open Wi-Fi connection, it is proven that you have no immediate control over its security. Corporate cyber security specialists stress over "endpoints” in which the spots where a private system associates with the outside world. Your helpless endpoint is your local internet connection. Additionally, you also need to ensure that your gadget is secure and if all else fails, sit tight for a superior time (i.e., until you're ready to interface with a safe Wi-Fi arrange) before giving data, for instance, your bank account number.

Last but not least, be careful of what you download. The main objective of cyber criminals is to deceive you into downloading malware programs or applications that convey malware or to steal your personal data. This malware can be veiled as an application: anything from a prevalent diversion to something that checks activity. It is advised not to download applications that look suspicious or originate from a web page you don't trust.

Sunday, June 3, 2018

By using the business of your choice, describe the use of internet for different types of business activities. [P3]

Scenario: I am conducting a charity event and I want to ask for a sponsorship in term of cash.



Cosmopolitan College of Commerce & Technology,
Unit 5 & 6 Jaya Setia Square,
Simpang 13 Kampong Jaya Setia,
Jalan Berakas Bandar Seri Begawan,
BB2713, Brunei Darussalam.

D’Sunlit Sdn Bhd,
Lot 71 Beribi Light Industrial Estate, Phase II,
Gadong BE1118, Bandar Seri Begawan

Dear sir/madam,

I am a student from Cosmopolitan College of Commerce & Technology and I am writing this letter on behalf of my team. Every year, my team and I are conducting a fundraising charity event. In a matter of fact, we have been handling other events as well for numerous times and succeeded. A year ago, we organized a 3 day’s charity event dated from 16th to 18th August 2017 and the venue was located at the Musical theater, International Convention Centre (ICC). As of this year, we are planning to conduct the event in the same place since it is very well-known and was able to attract a certain demographics. Our aim behind organizing this event is to achieve a certain amount of money for autism awareness in which it will go directly to SMARTER Brunei. The charity event we are about to host is a non-profit event, hence, we need your esteemed support in terms of cash in order to start operating.

We hereby request you to be part of our sponsors of the event and support our objectives. As a sponsor, your business will be placed at strategic positions at the venue and there will also be verbal announcements and promotions of your products.

Thank you for your consideration and we hope that we can count on you for the support of our event. We will shortly get in touch with you regarding the discussion as soon as we get a positive response from one of your representatives. If you have any queries in the meantime, feel free to contact me at +673 7123447 (Amal) or email nurul.amal911@gmail.com

Sincerely,
Amalina Zainudin.

By using contrasting businesses, describe examples of how the internet is used. [P2]

Bank Islam Brunei Darussalam (BIBD)







Bank Islam Brunei Darussalam Berhad (BIBD) was first started in 2005 and is a full-service Islamic financial institution. As Brunei’s flagship Islamic bank and largest financial services provider, with around 900 employees and B$ 9.5 billion worth of assets under management, BIBD proudly serve more than 200,000 customers today. Their central goal is to be the first choice for employees, customers and stakeholders.

The bank company use internet more often than any other companies would. BIBD use internet to communicate with their customers regarding any questions, inquiries or complaints and to hire new workers by requiring them to send their curriculum vitae and any other relate documents to the bank’s email and will be later checked by the authorities. Not only that, the company also run an app so that customers can easily retrieve data from the app and do an online banking anywhere possible as long as there is an internet connection for them to open the app. Telephone is frequently used in the company too, especially when customers have some direct questions regarding their service or asking BIBD to activate their accounts

BIBD also fully utilize the internet for business research.  Research on aspects related the business, such as its target customer, marketplace trends, production processes, and financial practices, can help you predict trends, project sales, spot opportunities, and avoid potential problems. By understanding the nature of different types of business research will help BIBD to use data to maximize its sales and profits and help them determine what potential customers want, which can guide the company towards the development of better products and services. The greatest purpose of business research is the bank knows what their competition is doing so they can always track them and upgrade their business more.

As of procument, buyers can either go to nearby the bank’s branches and have their transactions done using the machines they provided such as ATM, go to their office and the workers will help with the transactions on the counter, using their BIBD app or for customers who wish to get some transactions done can also use their website easily and efficiently. Besides, BIBD bank also use internet to share their promotion to people using social media and they have a specific fan page in Facebook to share their newest service or occasional deals to their customers. Not only that, BIBD will also use email to update people with frequent updates on the recent activities of the company.

Jollibee Foods Corporation







Jollibee Food Corporation is the biggest fast food chain and was established by Ton Tan Caktiong in 1975 in the Philippines which now have more than 1,100 operating branches globally. Jollibee is famous with its choices of appetizing menu such as Jollibee spaghetti, its Yumburger, delightful Chickenjoy and twirl vanilla.

Firstly, the company uses internet for their daily communication internally or externally. The company operated every day so they have many ways of using the internet as part of their communication. For instance, the company use telephone when receiving customers order who wish their orders to be delivered directly to their doorstep or for the workers to report to the manager if there is any issues or problems. Secondly, Jollibee uses email to communicate with the head departments formally and everything inside the email will be kept private and easily retrieved later on. Moreover, if there is any individual that is interested to work under the company, they will send their curriculum vitae to the company’s official email address.

The company also use internet to do business research so that they can continue maintaining or upgrading the status of their business in terms of sales, services, quality of products and more. The specific department of Jollibee will do business research of what the majority of the products are best-selling or if their prices is affordable enough for the people of the country or even do some research on how to attracts customers by a proper marketing and techniques.

Apart from that, Jollibee also use internet for procuments that has enabled Jollibee to realize the potential of electronic data interchange (EDI), namely with regard to process transactions, such as purchase orders and invoices, completely electronically. It offers any organization with a desktop computer the capability to send and receive electronic documents more quickly and at a fraction of the cost of processing paper documents. Furthermore, many factors contribute to the globalization and perhaps none more than the Internet. With the click of a mouse you have access to information - a collaborative environment around the globe. For procurement, this means Web-enabling the procurement process from market information through to execution of the order.

Jollibee Company also utilize internet for the purpose of sharing their promotion via social media such as Facebook and Instagram as social media is very common nowadays and have a wide range of audiences. Moreover, the company also use email address to update their customers if there is any new promotions or deals.

Mumtaz Collections





Mumtaz collection was first established back in 2010 and they offer a diversity of products line and successfully attract an assortment of different customers make it one of the leading local brands specialized in Muslima wear and fashion in Brunei Darussalam. Their central goal is to empower women to achieve modesty, fashionable and lovely look in less than 15 seconds. Since it started, they have sold 15,000 pieces of its main product which is Aisyah shawl, making it their most prominent and hot selling item.

The company utilize internet to communicate with customers via social media such as Facebook, Instagram or Whatsapp since part of their business is online based and they have their own online platform website to sell their wide range of products and is accessible to the public. Initially, customers can purchase their products and share their feedbacks or issue any reports to the local company in both social media and their official website as long as they have a good internet connection. For customers who could not make it to their shop, online shopping is the great and fastest way to have the items they wished for.

Mumtaz Collections also us internet for a beneficial use of business research. They often do research about the material of their Muslima apparels so that it is suitable for everyone. For instance, they made a breastfeeding-friendly dress, or even a 10 second instant so that it will attract people’s attention especially on a certain demographic. Not only that, the company also do business research on the prices, material quality, range of colors and sizes and also some research about promotional tools so that they can maintain the good image of the business.

Next, Mumtaz is aware of how the Internet is changing the speed and scale of the way that buyers and sellers interact, and perform basic purchasing transactions. The Internet is changing dramatically the markets themselves with all of some following major effects such as global reach etc. The efficiency and effectiveness of procument have been realized by the company and they are pushing hard to establish electronic systems for their procurement operations and they are under a great incentive to establish electronic interfaces for the procurement systems of their important customers. In this scenario, the supplier can establish one interface in order to accomplish business with several customers through the same interface and process.

Furthermore, the organization use internet to publicize their products as well as the promotions that they have offered not only to their existing customers but also the new ones. Mumtaz will update their promotion from time to time by email or social media especially on the new arrivals or limited products that is usually first come first serve basis.

Describe the internet and the worldwide web are and how they operate [P1]

World Wide Web

It is a data framework on the internet which enables files to be connected with different files by hypertext links, allowing the user to search for data by going from one archive and onto the next. The Hyper-Text Transfer Protocol (HTTP) is the strategy used to exchange web pages to your PC. With hypertext, a word or sentence is connected to another web webpage. All web pages are composed in the hyper-content markup dialect (HTML), which works in conjunction with HTTP.

Internet

People often mistaken World Wide Web (WWW) with the term internet which is actually two different things, internet is a global computer network providing a vast range of information and communication provision, which includes networks is interrelated using systemize communication protocols. The internet is a connecting network system across-the-board that uses TCP/IP to transmit data via various types of media.

How does the internet works?

It is important to know that every device connected with the internet has an exceptional IP address. On the off chance that the user connects with the internet through an Internet Service Provider (ISP), users are normally doled out an impermanent IP address for the term of their dial-in session. When a user needs to communicate something specific or recover data from another PC, the TCP/IP conventions are what make the transmission conceivable. For example, you open your web program and associate with our web webpage. When this is being done, your PC sends an electronic request over your internet association with your internet service provider (ISP).
The ISP routes the request to a server further up the chain on the internet. Eventually, the request will hit a domain name server (DNS). This server will look for a match for the domain name you've written in (such as www.malfz.blogspot.com). If it finds a match, it will direct your request to the proper server's IP address. However, if there is no match discovered, it will send the request further to a server that has more information data.

Types of connections

• Dial up which connects to phone line. Dial-up access is cheap but slow. A modem (internal or external) connects to the Internet after the computer dials a phone number.  This analog signal is converted to digital via the modem and sent over a land-line serviced by a public telephone network.
• DSL stands for Digital Subscriber Line.  It is an internet connection that is always “on”. This uses 2 lines so your phone is not tied up when your computer is connected.  There is also no need to dial a phone number to connect.
• Cable (broadband internet connections) which plugs into phone line and for TV connections. Cable provides an internet connection through a cable modem and operates over cable TV lines.  There are different speeds depending on if you are uploading data transmissions or downloading.
• Wireless or Wi-Fi, as the name suggests, does not use telephone lines or cables to connect to the internet. Instead, it uses radio frequency.  Wireless is also an always on connection and it can be accessed from just about anywhere.
• Cellular, commonly 3G & 4G is wireless types connection uses by smartphones. Cellular technology provides wireless Internet access through cell phones.  The speeds vary depending on the provider, but the most common are 3G and 4G speeds. 

How do we get internet?

The most important equipment needed to set up an internet are routers, servers, cable, modem, computer etc. and each of it have different purposes in setting up the internet. Firstly, computer works as an electronic device that manipulates information. Secondly, cables are wires covered in plastic or rubber covering that allows the transmission of power or data between devices. Moreover, server is a computer program or device that provide functionality for other program or devices. Next is router. It is a hardware device which allows several computers and other devices connected to a single connection and last but not least, modem is a device used in the field communication to modulate and demodulate signals so as to be transmitted over communication channel.



                                                    Figure 1: shows how to set up internet