eCommerce_eBusiness eBook - ACCA UK, Content Writing Flipbook PDF


25 downloads 123 Views 42MB Size

Recommend Stories


Get Instant Access to ebook Magia Con Velas PDF at Our Huge Library MAGIA CON VELAS PDF. ==> Download: MAGIA CON VELAS PDF
Get Instant Access to eBook Magia Con Velas PDF at Our Huge Library MAGIA CON VELAS PDF ==> Download: MAGIA CON VELAS PDF MAGIA CON VELAS PDF - Are y

Get Como Superar Conflictos De Pareja pdf ebook download free site
Get Como Superar Conflictos De Pareja pdf ebook download free site >-- Click Here to Download Como Superar Conflictos De Pareja Now --< >-- Click H

UK doctrina equivalentes
UK doctrina equivalentes HOUSE OF LORDS SESSION 2003-04 [2004] UKHL 46 on appeal from: [2002] EWCA Civ 1096 Kirin-Amgen Inc and others (Appellants) v

Story Transcript

Home to see table of contents. TABLE OF CONTENTS............................................................................. 1 INTENDED BENEFITS OF THE E-BOOK ...............................................3 AUTHOR’S PROFILE................................................................................6 IMPORTANT!............................................................................................7 USER GUIDE ..........................................................................................10 GLOSSARY OF EBUSINESS....................................................................11 USEFUL SOFTWARES & WEBSITES..................................................... 41 PART A: BEGINNERS ........................................................................55 Chapter 1: E-BUSINESS VS TRADITIONAL BUSINESS ..................56 Chapter 2: WAYS TO MAKE MONEY ONLINE.................................63 Chapter 3: CHOOSING MARKET NICHE & PRODUCT .................. 105 Chapter 4: CHOOSING EBUSINESS STRATEGIES........................109 Chapter 5: WEB PRESENCE.............................................................112 Chapter 6: LEARN WEB DESIGNING FOR SEO ...............................117 PART B: INTERMEDIATE ................................................................120 Chapter 7: PRODUCT DESIGN & MARKETING MIX........................121 Chapter 8: INTERNET MARKETING STRATEGIES ........................ 123 Chapter 9: PAYMENT PROCESSING ................................................128 Chapter 10: PERSUADING CUSTOMER............................................131 Chapter 11: RISK OF PIRACY & SECURITY...................................... 134 Chapter 12: MANAGING WEBSITE RISK......................................... 136


1 Chapter 13: MANAGING CREDIT CARD RISK................................. 138 Chapter 14: IDENTIFY, ASSESS, RESPOND TO RISKS ...................140 PART C: ADVANCED WEBMASTERS .............................................. 143 Chapter 15: MANAGING GROWING EBUSINESS ........................... 144 Chapter 16: MANAGING PERFORMANCE....................................... 149 Chapter 17: NON-FINANCIAL PERFORMANCE MANAGEMENT.. 152 Chapter 18: COST REDUCTIONS & VALUE ENHANCEMENT ...... 154 Chapter 19: RECRUITING & REWARDING ..................................... 157 RELATED PRODUCTS ......................................................................... 159 REPORT ABUSE ...................................................................................160 Step by Step Ecommerce / Ebusiness Implementation Guide Ebook to Make Money Online Special Offer Place a http://accasupport.com link at any ONE of your or other account to get any TWO chapters above of your choice for free not included in free version by emailing at [email protected] or [email protected] Email should contain web page URL where you have placed a link and name of any TWO chapters you want. http://accasupport.com


1 INTENDED BENEFITS OF THE E-BOOK Features & Benefits of Step by Step Ecommerce / Ebusiness Implementation Guide Ebook 2 Make Money Online 1) Step by Step Guidance: Ecommerce guide ebook is originally written into three parts (Beginners, Intermediate, Advanced Levels). It will provide you step by step guidance from getting started to expanding your ecommerce activities during your career. Step by step guidance will prevent you from getting overwhelmed by information overload, while at the same time provide you complete knowledge of various aspects of Ecommerce. Ecommerce guide ebook is designed to equip you with necessary knowledge to enable you take more considered decisions. It is applicable to every market niche, it does not dictates to act in a certain way rather it provides counselling to take your decisions more wisely according to the challenges involved in your market niche. You can use this ebook is an life time consultant for your ecommerce venture. 2) Value for Money Ecommerce guide ebook provides you value for money. It is written to ensure productive use of your money, time & efforts. Ecommerce guide ebook clarifies concepts and confusions that prevent a newbie from entering and becoming a successful ecommerce website owner. Searching information on internet only provides information on issues about which you have already some awareness. Therefore, those important aspects of Ecommerce may not come to your attention, which are necessary for successful ecommerce


1 establishment and operation, e.g. the law of diminishing returns and how it can change decision on the level of quality and price of your product. To account for this limitation, publishers having websites or blog only publish information, which have existing demand regardless of the importance of published information for ecommerce. Therefore, information having high importance but low in demand remain unpublished. Therefore, it motivated me to write an ebook, which provides you both fair and all necessary information through step by step guidance without overwhelming you. Many publishers address merely technical aspects of ecommerce and fail to relate those technical aspects to financial profitability and growth. Most of the people want to setup ecommerce website to earn profit while few people want to earn experience and fame. Therefore, doing ecommerce without knowing the impact of your efforts on profitability is of little use. As a professional accountant & ecommerce website administrator. I applied my ecommerce and accounting skills & experience to write an step by step ecommerce guide ebook, which provides practical guidance to ecommerce website owners taking account of their primary objective i.e. profitability and long term growth. You have a opportunity to look inside an ebook before buying to ensure that this ebook is relevant to your needs. 3) Free Updates: Ecommerce is complex and dynamic in nature. New products and new ways of doing ecommerce are constantly emerging. Therefore, i update this ebook on continuous basis. As a part of good practice, i provide updated version of ecommerce guide ebook free of any additional cost. 4) No DRM Protection: Ecommerce guide Ebook PDF (Portable document format) can be viewed using free adobe reader. No DRM (Digital Rights Management) protection. http://accasupport.com


1 Therefore, you can use this ebook on multiple computers at the same time and allow your employees to access this ecommerce guide ebook to spread knowledge of ecommerce across the whole organization.


1 AUTHOR’S PROFILE Name: Murtaza Lanewala Career Status: Freelance writer & tutor for professional accountancy qualifications. Professional bodies include ACCA, CIMA and ICAEW. Author & CEO of accasupport.com E-mail: [email protected] or [email protected]


1 IMPORTANT! 1 Disclaimer This make money online ebook PDF is sold only through accasupport.com website. However, Clickbank.com is the credit card processing organization for collecting payments for this ebook. This study material is not available offline (shops, schools etc.) in any form such as DVDs, CDs, Printed books etc. Make money online ebooks purchased from unauthorized source can be out of date and incomplete. In addition, you will not be able to receive free updates given to the buyers of original material. Make Money Online ebook is subject to 1-year money back guarantee in case you do not earn any money online by reasonably reading and acting on recommendations. These money back guarantee is only available to first buyer of original ebook. 100% money back guarantee is only available for the customers who brought this ebook from accasupport.com or clickbank.com. Please visit! Website to read the conditions you need to meet to become eligible to 100% money back guarantee. Demo version of this ebook is available free of cost, please take care, not to pay for demo version of this e-book to authorized sellers. Readers of this material will be solely responsible for the consequences of any decisions made in real life. Author & accasupport.com are not responsible to the readers of this material under any circumstances. Recommendations made of any kind are intelligent guesses to the best of author’s knowledge. http://accasupport.com


1 Names of individuals, organizations, countries, religions etc are used for educational purpose only. It is not intended to abuse, discriminate and heart anyone's feelings and dignity. accasupport.com is not responsible for representations made by affiliate marketers. If you have any doubt regarding product, price, policies, terms of service etc, then you can contact to me (Murtaza Lanewala) an administrator of this website. However, failure to answer any inquiry will not amount to confirmation. In addition, accasupport.com is also not responsible for breach of privacy and terms of service by affiliate marketers in any case. accasupport.com is also not responsible for quality, pricing and delivery of ACCA study materials sold by partners. Partners will be sole responsible for any divergence from terms and conditions agreed. In addition, accasupport.com is not responsible for breach of privacy, refund policy and term of service by its partners in any case. In case of any difference between representations made in this ebook and accasupport.com website, representations made on accasupport.com website will prevail. 2 Copyright Notice This material is subject to copyright protection law. Infringement of copyright law results in criminal liability (fine or imprisonment or both). Copyright infringement is effectively theft of intellectual property; therefore, it is unethical from social viewpoint and sinful act from religious viewpoint as well. Copyright ©2012 Murtaza Lanewala. All rights reserved. http://accasupport.com


1 2.1 Do You can make a backup copy of this material. You can use parts of this material provided you quote the appropriate reference to the author and material. 2.2 Do Not You cannot publicly share this material in the form of hard copy or soft copy (physically and over the internet) for cash or for free. You cannot transform this material into other means of communication such as photocopy, video, audio etc. Unless needed for accessibility purpose or personal use. You cannot change the file format of this material or make it editable. You cannot resell this material unless you are selling the original copy purchased. You cannot use any part of this material in or with contents associated with violence, politics, religious and pornographic contents in any way. Be an Affiliate Be a Partner


Left Arrow Key. Highlighting Highlighting is used show the relationship between words and figures. Bookmarks Click bookmark icon in the side bar (see below) to jump to specific exam topic in the ebook. Screen Shot: If you not currently using adobe reader, then I recommend you to download adobe reader, to get most benefits from this ebook. Click http://get.adobe.com/reader/ to download.


1 GLOSSARY OF EBUSINESS 0 TO 9 1 301 Temporary Redirect 301 Temporary redirect is used to tell web browser and search engine about the new web address of particular webpage. Temporary redirect does not update bookmark or favorites information stored by web browser on visitor’s computer. 301 Temporary Redirect is located on domain tab on the web hosting control panel. If it is available, then you can manually perform 301 Temporary Redirect using .htaccess file. 2 302 Permanent Redirect 302 Permanent Redirect does the same as 301 Temporary Redirect. However 302 Permanent Redirect updates bookmark or favorites information stored by web browser on visitor’s computer. 302 Permanent Redirect is located on domain tab on the web hosting control panel. If it is available, then you can manually perform 302 Permanent Redirect using .htaccess file. 3 400 Bad Request 400 bad request error can arise due excessively long web address or error in the visitor’s computer. 400 bad requests from little percentage of visitors may mean error in the visitors’ computer. However, 400 error on same webpage by each visitor http://accasupport.com http://accasupport.com


1 may mean error in the web page file name, link point towards your webpage, customer typing wrong address, web server etc. 4 403 Forbidden 403 forbidden error arises due to visitor trying to access restricted or password protected directory. Large number of 403 errors from one IP address is an indication that hacker may be trying to gain unauthorized access. If you are digital products seller, then it would an indication of trying to hack your products to avoid payment. 5 404 Broken Link or Page Not Found 404 broken link error arises due to hyperlink is not correctly coded such as missing http or https, quotation marks, not closing HTML tag, incorrect file path etc. 404 broken link error also arises due to webpage no longer exists or move to different location without setting redirect by the webmaster. In addition, visitors typing incorrect URL in their web browsers. 6 408 Timeout 408 error arises when webserver is responding too slowly. It is corrected only by web hosting provider. However, you may create custom 408 error page using same content and formatting as your home page. In that case, you should add noindex meta tag to avoid duplicate content issue. http://accasupport.com http://accasupport.com http://accasupport.com


1 7 500 Internal Server Error or Server Misconfiguration 500 internal server error is beyond your control. It can only be corrected by web hosting provider. 8 644 Permission Only owner can change, delete and run while others can only access the file. This permission is useful non-execute files. Public can always read the file unless permission is set to zero for reading. 9 755 Permission Only owner can have do anything and other shared web hosting accounts can read and run but cannot change and delete files. It is the default permission set on directories and files. A 10 Absolute Link Absolute link includes the full path of webpage. http://accasupport.com/m/index.htm It is the only way to place external links. Absolute link in your webpages allows you to protect your search engine ranking when copycats copy your webpage or part of its contents. It will communicate search engine about the original source of the content. http://accasupport.com http://accasupport.com http://accasupport.com


1 11 Algorithm Formula used by search engines to rank webpages. It is the basic of artificial intelligence. 12 ALT Text Alt text stands for alternative text. Alternative text is useful for targeting customer with visual impairment and using screen readers. Alternative text also useful to communicate search engine about the information inside an image and Search Engine Optimization (SEO). 13 Anchor Text Anchor text is referred as Title by most WYSIWYG editors. Anchor or Title is text used to describe the hyperlink to other webpage. Anchor text should contain descriptive text relevant to contents of linked webpage for effective Search Engine Optimization (SEO) 14 Anti-Spy & Anti-Virus Anti-spy and anti-virus software are used for reducing threat of information being accessed, modified, deleted and copied in unauthorized manner. 15 API API stands for Application Programming interface. API provides details necessary for creating add-ons or plug-in to use with software and web applications. API is relevant for developers and large ebusinesses want to customize standard software or web application to suit their needs. http://accasupport.com http://accasupport.com http://accasupport.com


1 http://accasupport.com http://accasupport.com http://accasupport.com API guidance can be found from vendors official website. 16 Auto Responder Auto is automatic email sender, which is used to send standard emails at pre-defined intervals to maintain relationship with customers. B 17 Back Link Hyperlink from different top-level domain name point towards your domain name. 18 Bank Transfer Local money transfer from one bank account to other bank account instantly. Other bank account does not need to have with the same bank. 19 Blog Web 2.0 feature used for two-way communication. 20 Bookmarks Bookmarks are hyperlink to text or image in the same webpage. In PDF files bookmarks are hyperlink to text at particular location. Bookmarks are also used by web browsers to enable you to revisit webpage without remembering and typing webpage address.


1 http://accasupport.com http://accasupport.com http://accasupport.com http://accasupport.com http://accasupport.com http://accasupport.com 21 Bounce Rate Number of visitors left the top-level domain name from landing webpage. 22 Broadband Internet High-speed internet connection having at least 1mbps (Mega Byte Per Second) downloading speed. C 23 CGI CGI stands for Common Gateway Interface. It is a programming language used for performing advanced task related web hosting. CGI is used to create scripts to automate tasks of repeated nature. CGI is mostly used by web hosting provider to exercise control over web hosting accounts. It can also increase in functionality of website. 24 Client Software Client software can be any application such as email, blogging, FTP (file transfer protocol) software installed on local computer and used to communicate with webserver server. Client software enables you to manage more than one accounts using single platform. Client software allows you to increase efficiency of tasks by providing additional functionality not provided by remote computer applications.


1 http://accasupport.com http://accasupport.com http://accasupport.com Client software such as blogging software, WYSIWYG web editors provide opportunity to create and edit files without internet access. Client software allows you to perform tasks using mobile devices such as cell phones and tablets, which cannot be adequately, performed using applications provided by remote computer. 25 Compressed File See Zipped File 26 Content Management System Used to manage large number of content subject to frequent modification. 27 Copywriting Copywriting is the art of creating articles for marketing purpose. 28 Crawler/Spider Crawler is software used to read webpages. 29 CSS CSS stands for Cascade Style Sheet. It is used for format HTML contents. 30 CTR CTR stands for Click Through Rate. It represents the total number of clicks out of total number of visitors. It is often expressed in percentage terms.


1 http://accasupport.com http://accasupport.com http://accasupport.com 31 Customer Relationship Management (CRM) Software used to manage relationship with existing and potential customers with the help of knowledge, support tickets, live chat etc. D 32 Database Database is the collection of data in the form of tables containing fields and rows. Each field keep different type of data and rows keeps information for various users related to each field in their respective cells. Database is used by interactive scripts such as CRM, Forums, Blogs etc. You do not to manage database. However, you should be able to make backups of database to prevent loss of important customer information. 33 Dedicated Server Web server reserved for hosting domain names owned by only one client. 34 Deep Link Deep link is the link to particular webpage down the linking structure of website rather than link to home page of the website. Deep link is more useful for Search Engine Optimization (SEO). Search engines provide higher importance to links pointed towards webpage containing Link Title. 35 Directory Directory is equivalent to folders in web hosting terminology.


1 36 DNS DNS stands for Domain Name System. It is the opposite process of domain name mapping. DNS involves tracing domain name to IP address to retrieve required information store on web server computer. IP address is the unique numerical address used to identify computer over the internet. 37 Domain Mapping Using Fully Qualified Domain Name as replacement of IP address to enable visitors to easily remember your computer containing needed information. 38 Domain Name Domain is user-friendly address consisting of text, numbers and symbols used to identify particular computer on internet. Domain Name consists of: Sub domain name (www). Top-level domain name (accasupport). Dot. Extension (com). WWW stands for World Wide Web. It is add to top-level domain name by default. Visitors do not need to type www. www represent the primary web directory named public_html. You cannot use any other sub domain name for primary directory. However, you may consider using different sub domain for any subdirectory inside primary directory to replace www.


1 http://accasupport.com http://accasupport.com http://accasupport.com 39 Downloading Receiving data from web server. 40 DRM DRM stands for Digital Rights Management. It allows you to enforce your copyrights by providing encryption (password protection), disable content copying, screen capturing, annotations, editing, signing, printing, pages views etc. E 41 Email Server Email server is webserver used to send and receive emails. Email server IP address can be alpha-numeric or numeric. Later is the same IP address used for domain name mapping. 42 Encryption Encryption involves scrambling information to make it unreadable by human beings. Encrypted information requires public key (password) and private key to decrypt. Private key is stored on device required to decrypt information. If hacker gets your password, even then he/she will not be able to decrypt information without private key. Similarly, if hacker gets access to your device, then he/she will be able to decrypt information without password. Please! Note that not every password requiring software or online account uses encryption. Therefore, please make strong password and keep it confidential. Please! Do not disclose it to the account provider too.


1 http://accasupport.com http://accasupport.com http://accasupport.com http://accasupport.com Encryption effectiveness is expressed in bits such as 64 bit, 128 bit, 256 bit etc. Higher number of bits represents more complex and secure encryption. Encryption is most secure and frequently used way for transferring data such as credit card information, emails, Office files (DOC, PPT, PDF etc). Storage devices, such as data traveller (flash drive) and external hard drive with encryption facility. Encryption is scrambling information into format which cannot be processed by computers. Password is required to assemble the encrypted information; therefore, it can be processed by computers. Example: The e-book you are reading currently is encrypted. F 43 Forums Web 2.0 feature used for two-way communication. It allows visitors to raise and resolve issues. Forums allow greater interaction to customers than blogs. Forums are also known as bulletin board, new groups, discussion broad. 44 Freeware Freeware is free to use software or donation based software. Freeware is subject to copyright restriction as paid software unless the publisher expressly waives his/her rights.


1 Freeware should not be redistributed without express permission of publisher. Freeware has no clear definition. Therefore, it is bears the risk of copyright infringement and legal action. 45 FQDN Fully Qualified Domain Name. Just another way of expression top-level domain name. 46 FTP VS SFTP FTP stands for File Transfer Protocol. File Transfer Protocol is used transfer HTML and other documents such as PDF, DOC, PPT, TXT, XML, GIF, JPG, PNG etc. FTP is used to transfer large size and number of files to remote locations FTP is also used for web hosting purpose using FTP client software. SFTP stands for Secured File Transfer Protocol. Equivalent acronyms are SSH File Transfer Protocol, Secret File Transfer Protocol. SFTP is used to communicate web browser that the connection is secured. However, it may not be secured in actual. Therefore, do not trust secured connections unless it is accompanied with valid digital certificate from trustworthy source. 47 FTP Server FTP is webserver used to send and receive files. FTP server IP address can be alpha-numeric or numeric. Later is the same IP address used for domain name mapping.


1 http://accasupport.com http://accasupport.com http://accasupport.com G 48 Gadget/Widget Gadget or Widget is script used to provide additional functionality to blog. 49 GIF GIF is useful for making simple animation such as banners. GIF is compatible with almost all browsers and does not require any software. GIF is used for creating animated ad banners. GIF is also used for creating computer-generated graphics. 50 GPL License GPL stands for General Public License. GPL license is used for communicate the rights of author and users. GPL license allows you as user to copy, modify and distribute freely to other public. However, you cannot charge any money from the recipient. GPL license allows you as author to retain copyrights relating to authorship and ownership of work. GPL license allows you to use your work for viral marketing purpose while retaining the reseller rights. Using applications under GPL license can be dangerous as it may be modification to accommodate spyware, virus etc. It is strongly recommended that please! Download any application only from official source.


1 http://accasupport.com http://accasupport.com http://accasupport.com H 51 Hot Link Protection Hot link protection allows you to restrict direct access to files with specified extensions such as BMP, JPG, GIF, PNG, PDF, DOC, PPT, TXT etc. External websites may link to your images to display it on their own webpages while using your bandwidth. In addition, they allow downloading your files without visiting your website. You can place watermarks on images and PDF files, which contain your domain name as text to make visitor know the original source of contents. 52 .htaccess file .htaccess file is used to redirect (temporary or permanent) web browsers to different webpage than requested. .htacess file is used to block or unblock IP address or range of IP address of accessing your website. .htaccess is used to create sub domain and identify it to relevant directory. .htaccess is used control permissions. .htaccess file is automatically created and updated, when you perform above task using web hosting control panel. Please note that .htaccess file can be opened with notepad but it must not have TXT extension associated with notepad files.


1 http://accasupport.com http://accasupport.com http://accasupport.com 53 HTML HTML stands for Hyper Text Markup Language. HTML is the basic of World Wide Web. 54 HTTP Vs HTTPS HTTP stands for Hyper Text Transfer Protocol. It is used to communicate with web browser. HTTPS stands for Hyper Text Transfer Protocol Secured. It is used to communicate with web browser that data being transfer is secured. Therefore, do not trust secured connections unless it is accompanied with valid digital certificate from trustworthy source. HTTPS is used to carry out credit card processing. It is also used to transfer confidential information such as contact form details. It is necessary to define the protocol before hyperlinks. 55 Hyperlink Hyperlink is link to other webpages on the internet. I 56 Inbound Link Hyperlink to webpage published under same top-level domain name.


1 http://accasupport.com http://accasupport.com http://accasupport.com http://accasupport.com http://accasupport.com 57 Internet Merchant Account Internet merchant account is special account opened to receive payments via credit card over the internet. 58 IP address Numerical address used to identify computer connected to internet or network. 59 IP Deny Manager IP deny manager can be used block or unblock particular IP address or range of IP address from accessing your website. IP deny manager is located on security tab on web hosting control panel. However, if IP deny manager is not present, then you can manually edit .htaccess file. J 60 JavaScript JavaScript is client side scripting language. It runs on customer web browsers. JavaScript is considered faster than PHP as it does not require requesting information from webserver more than one. It save bandwidth and load on webserver because of not webserver does not have to run script each time customer visits particular webpage. JavaScript is used to add interactive features to webpages. It is commonly used for creating dynamic webpages, FAQs page, Contact


1 http://accasupport.com form, Signup form etc. Contents can be quickly expanded and collapse without requesting information to webserver. JavaScript is exploited by hackers as script runs on customer computer. Many customers turn off JavaScript for security reasons. JavaScript may not be compatible with various web browsers and mobile devices. JavaScript is embedded inside the head and body tag of HTML document. 61 JPG VS BMP JPG and BMP are raster images useful for reducing webpage size and loading time. Raster images get blurred on zooming. JPG is higher quality than BMP and usually preferred to BMP. K 62 Keywords Keywords are words or phrases typed by customers for searching information over the web. Customers in different geographical location use different keywords to search same information. Keywords used for SEO must be relevant to particular geographical location. Keywords should be used in the pattern when writing articles for SEO purpose in which the customers type keyword to search information.


1 Frequency, location, order and closeness of keywords are considered by search engines for ranking webpages. Using keywords too frequently or unnecessarily may result in penalty from search engines. L 63 Landing Page Landing page is first page customer visits. Landing page can be different from Home page. 64 Linux Open source (free) operating system uses command line interface. M 65 Market Niche Market niche is the industry in the business operates. Sub Market Niche is the specific segment of the industry. Example: Micro finance and investment banking is the submarket niche of banking industry.


1 http://accasupport.com http://accasupport.com http://accasupport.com 66 Meta Tags Meta tags are used to communicate with search engine. They are invisible from customers. Contents of Meta Description tag can be display in search engine results. 67 Modem Modem converts analogue signals into digital data. Computers can only process data in digital form. 68 Multiple Domain Hosting Web hosting account configured to host more than one domain name in a single account. 69 My PHP Admin My PHP Admin is used to manage (create, edit, remove, backup and restore) My SQL database. 70 My SQL My SQL is command line database management system. My SQL has several versions. You need to check compatibility of your database with My SQL version provided by web hosting provider in case of transfer to different web hosting provider.


1 N 71 Name Servers Name servers are the part of Domain Name System (DNS). Name Servers are alpha-numeric address similar to website domain name. It stores information relating to domain name and provides the numerical IP address of webserver hosting domain name to web browsers. You will be provided the Name Servers address by your web hosting provider, which you should write in name servers field in domain name control panel. Domain name control panel requires similar skills as web hosting control panel. You should have at least to Name Servers addresses, as it is compulsorily required by most domain name control panels. As an ebusiness owner, you have nothing to do with name servers. You may ask your web-hosting provider to do it for you. 72 Niche & Sub Niche Niche is the group of products sharing similar characteristics such as benefits, customers, industry etc. Sub niche is sub-group of products sharing similar characteristics such as benefits, customers, quality, quantity, price, speed etc. Small business should aim to identify sub-niche rather than competing in every sub-niche of the market.


1 http://accasupport.com http://accasupport.com http://accasupport.com O 73 Open Source Software Open source software is free to use software. Open source can redistributed freely. It can be used as free resource and marketing tool to attract customers to your website. 74 Outbound Link Hyperlink to webpage published under different top-level domain name. P 75 Page Rank Importance to webpage assigned by search engines. 76 Parked Domains Parked domain is the use of another domain name for the same webpages as your existing domain name. Parked domain can be used to make any sub-directory as your primary public_html directory. Parked domains help increased search engine visibility and avoid losing visitors due to confusion with similar domain names. http://www.accabook.com http://www.accabooks.com


1 http://accasupport.com http://accasupport.com http://accasupport.com However, parked domain leads to duplicate content issue and penalty from search engines if not used wisely. 77 Payment Gateway Payment gateway is service enables to charge credit card over the internet. Usually, payment gateway and internet merchant account is provided by same vendor. 78 PHP PHP is open source scripting language. It is server side scripting language. Therefore, it is compatible with every web browser, as it does not require interpretation by web browsers. PHP is used to add interactive features and bring life to webpages. PHP scripts make use of My SQL database to store customer information. 79 Pitch Page Pitch page is also called sales page. Pitch page is the page used to persuade customer and where buy now link is placed. 80 PLR Articles PLR stands for Private Label Rights. These articles can be used free with some restrictions under copyright law. The main attraction of PLR article is that you can use your own name as an author of the article.


1 http://accasupport.com http://accasupport.com http://accasupport.com PLR article are not for resale. However, you can use it inside free ebook or website without any reference to author. PLR are used by large number of webmasters, as it is free. Therefore, it does not provide your visitors with unique contents. A knowledge, which is possessed by everyone, means it is possessed by no one. You may be penalized by search engines for publishing duplicate contents. Therefore, must rewrite those articles and customize by adding images, videos etc. You may consider using article rewriters, which replace words with their synonyms. It is only useful for topics over which you have little or no knowledge. 81 PNG PNG is vector image useful for present high quality graphics. It does not get blur on zooming. PNG image has higher file size and more loading time. PNG image works well with both externally captured and computer generated graphics. 82 PPC PPC stands for Pay Per Click. It is the form of advertising in which advertisers only need to pay when visitors click link pointed to their domain name. Publishers will only get commission when advertisers are required to pay.


1 http://accasupport.com http://accasupport.com http://accasupport.com Q Sorry! No data available. R 83 Read, Write, Execute Read means accessing particular file. Write means modifying or deleting particular file by other web hosting accounts sharing the hard disk space in same webserver computer. Execute means running particular file. Execution is relevant for software and scripts such as audio & video files. Read = 4 Write = 2 Execute = 1 84 Relative Link Relative link does not include full path of webpage http://accasupport.com/m/index.htm It is written as follows: http://../m/index.htm Double dot represents previous directory. Double dot can be used for each previous directory. It enables you to save time in writing full path and remember full path.


1 http://accasupport.com http://accasupport.com http://accasupport.com 85 Reseller Hosting Web hosting account, which is not administered by web hosting provider. 86 Robot Robot is software used to automate tasks. JPG is used for scanned or camera images. S 87 SCAM Fraud. 88 Search Engine Website allowing visitors to search relevant information across the web. 89 Scripts Scripts are set of instructions made using web designing language intended to perform particular task. 90 SEO Search engine optimization. It means optimizing your domain name to rank well on search engines. 91 Shareware Shareware is the software given for demo or trial free. It is usually time limited after which user must purchase license to continue using that


1 http://accasupport.com http://accasupport.com http://accasupport.com software. However, it may be available for infinite duration with reduced functionality than full or paid version. Shareware is not available for copy, modification and distribution (sharing). Shareware is rather misleading name. 92 Shared Web Hosting Webserver used for hosting domain names owned by one than more client. 93 Shopping Cart/E-Commerce Software Shopping cart software is also known as ecommerce software. It is designed to establish product, prices and pages Testimonials, FAQs, Contact, About pages. Shopping cart software enables you to customize your credit card processing. Most credit card processing providers such as 2checkout.com allows using your own shopping cart software. 94 SMO SMO stands for Social Media Optimization. Social media optimization is useful for quick traffic and search engine optimization (SEO). 95 SPAM Sending unsolicited email messages without express permission of recipient.


1 http://accasupport.com http://accasupport.com http://accasupport.com 96 Sub Domain Sub domain is a sub-directory inside main directory usually named as public_html. Sub domain is used for branding purpose and it is optional. You may use sub-directory as follows. http://accasupport.com/sub-directory/ Sub domain is written at the left hand side of top-level domain name. http://sub-directory-as-subdomain.accasupport.com 97 Submission Requesting search engines, directories to include your domain name in their index or list of contents. 98 SWIFT Transfer/Bank Wire Transfer International money transfer from one bank account to other bank account instantly. Other bank account does not need to have with the same bank. SWIFT transfers are subject to higher service charges, then bank transfer, demand draft, Direct Deposit etc. T 99 Tags Tags are often referred as Keywords in many web applications. Tags are words or phrases displayed on social bookmarking websites when an individual bookmarks your web page.


1 http://accasupport.com http://accasupport.com http://accasupport.com Tags also help other web surfers to find your website using social bookmarking website. Tags are used by gadgets to display links to webpages related to current webpage. In HTML Tags are used for providing structure to HTML document. It reduces the chances to error. It is flexible as all previous directories automatically updated when you move content from one directory to other. It is not suitable for placing external links. 100 Template Template is pre-formatted document or file, in which you later add content of your choice. Template is used for performing repetitive tasks without performing it repeatedly. 101 TLS TLS stands for Transport Layer Security. TLS is the method of encryption for transferring data to remote locations in a secure way. TLS is available in FTP and Email Clients as an optional feature. U 102 Uploading Sending data to web server.


1 http://accasupport.com http://accasupport.com http://accasupport.com 103 URL URL stands for Universal Resource Locator. URL is the technical name of the web address used to reach a particular webpage or file over the internet. V 104 View Source View source is feature provided by popular web browsers. It allows you to inspect the coding of competitors webpages. W 105 Web Hosting Managing website, blog, forums etc to communicate other over the internet. 106 Webmaster Webmaster administrator is also known as webmaster. 107 Web Server Software Server software enables two or more computers communicate with each other. It helps controlling permissions and restrictions of each work station (computer) connected to network. Interest is the largest of all networks. All the networks ultimately connect to internet. Computer on which server software installed is referred to as webserver.


1 http://accasupport.com http://accasupport.com http://accasupport.com 108 Web Traffic Visitors to the website are also known as web traffic. 109 WYSIWYG WYSIWYG stands for What You See Is What You Get. You do not need to know web-designing language. HTML coding is performed in background automatically as you use WYSIWYG graphical foreground. WYSIWYG operating systems such as Windows and Mac is known as GUI (Graphical User Interface) software. X 110 XML XML stands for Extended Markup Language. It is used for communicated with search engines such as making sitemaps. Y Sorry! No data available. Z 111 Zipped File Compressed file uses to transfer data over the internet. Zipped file reduces document size and allows speedy transfer and bandwidth saving. Zipped file is also used to transfer several files or documents as one downloaded file. It will saving in time and bandwidth by avoid moving back and forth repeatedly.


1 http://accasupport.com http://accasupport.com http://accasupport.com USEFUL SOFTWARES & WEBSITES A AdSense – contextual ad program by Google Adbrite – sell text ads Amazon Associates – popular affiliate program aStore – add an Amazon Store to your Blog AdGenta – text ads by Qumana (see ‘Q’) AdRotator – WP ad rotating plugin Akismet – Comment Spam Fighting Tool Adhearus – pay per click advertising AdWords – the advertisers side of AdSense – many bloggers use it to promote their blogs AzoogleAds – advertising system Audio Blogger – adds audio to your blog B Build A Niche Store- add an eBay store to your site Bidvertiser – bid based advertising Blog Ads – blog advertising network Blog Jet - blog editing tool Blog Desk - blog editing tool


1 http://accasupport.com http://accasupport.com http://accasupport.com Bloglines – Web based RSS feed reader BlogPulse – blog search tool BlogPolls – tool for putting polls on your blog Blog Poll – another blog poll tool Backpackit – useful organizational tool Blogger.com – blog platform Bloggers for Hire – bloggers looking for work and potential employers looking for bloggers BlogSitter.net – service for find guest bloggers while you take a holiday BlogBurst – syndicates bloggers content for mainstream medium BlogFlux – blog services portal BlogRolling – a blogroll management tool Blogbeat – blog metrics tool Blogger Jobs – a blog following the advertising of blog jobs C Chitika eMiniMalls – advertising program CrispAds – blog advertising network Creative Commons – copyright licenses Copyscape – tool for checking for content theft/plagiarism Clicksor – advertising program Clickbank – library of many affiliate products


1 http://accasupport.com http://accasupport.com http://accasupport.com Commission Junction – collection of many affiliate programs Casale Media – advertising solution D Del.icio.us – social bookmarking Digg – social bookmarking Drupal – blog platform DomainsBot – a tool for finding domain names Digital Point – useful forum for webmasters E Ecto – blog editing tool Expression Engine – blog platform Endo – News aggregator for Mac Users Ether – lets readers book a consulting call with you from your sidebar F Feedburner – RSS feed management tool – also provides Feed Advertising Feedster – RSS search Tool FeedDemon – RSS reader from NewsGator FeedBlitz – email blog and RSS subscription service Flickr – photo sharing and hosting


1 Flock – a browser with in built blogging Furl – social bookmarking Free Blog Polls FilmLoop – free photocasting network Feedpass – RSS management – integrates with AdSense Favicon Maker – make Favicons from photos G Google Analytics - Metrics Tool Gabbly – add chat to your blog Google Reader – RSS reader Gnoos – Australian made blog search tool Google News – tracking news – many use it as a source of content Google Blog Search – Google’s…. blog search Google Sitemaps – get indexed in Google H Haloscan – a free commenting system for blogs (a little dated but I was a tad desperate for a ‘H’ I IntelliTXT - In text advertising Ice Rocket - blog search engine


1 http://accasupport.com http://accasupport.com http://accasupport.com J Jar (as in Tip Jar) – many bloggers ask their readers for donations/tips – but few make much from them K Kanoodle – Advertising program Kontera – In text advertising Keyword and Backlink Tracker - Search Engine ranking tool L LiveJournal – Blog Platform Linkshare – Affiliate Program M Mars Edit - Blog Editing Tool Memeorandum – Tracking and Aggregating news from blogs MyBlogLog – Metrics Tool Mint – Blog Metrics Tool MovableType – Popular blog platform MeCommerce – Sidebar shop – in beta MSN Adcenter – Coming Soon – Contextual ads N


1 http://accasupport.com http://accasupport.com http://accasupport.com NewsGator – RSS News Readers Nichebot – keyword research tool Nameboy – domain name generator Nucleus CMS – open source blog platform Netvibes – RSS News Aggregator Netscape Beta – Social Bookmarking Tool O Only Wire – social bookmarking service Overture Keyword Tool – keyword research tool P Performancing – great blog, firefox blog editor and metrics tools Pheedo – RSS advertising Post2Blog – Blog Editing tool – blog using Word, IE or Firefox Pingoat – Pinging Tool Pingomatic – Pinging Tool pMachine – Blog Platform Paypal – Payment tool – used by many affiliate programs and ad systems to pay publishers PPCalc – Paypal Fee Calculator PubSub – service that notifies you of new content


1 http://accasupport.com http://accasupport.com http://accasupport.com Photobucket – image and video hosting Q Qumana – Blog Editing Tool R Rojo – RSS feed reader RocketPost – Blog posting tool Right Media – advertising Rmail – subscribe from any RSS feed to email S Sitemeter – a free website stats tool used by many bloggers Six Figure Blogging – learn to make money blogging (one of my blogging resources) Shoplinc – add a Chitika store to your blog Scoopt Words - service to sell bloggers content to mainstream media editors Sitening – Search Engine ranking tracker Sparklines – sidebar widgets/graphs Skype – VOIP tool for networking, podcast interviews etc Spam Karma – WP comment spam tool Sitepoint – Forums for webmasters


1 http://accasupport.com http://accasupport.com http://accasupport.com Slide – photo hosting, slideshows etc SoloSub – RSS feed management tool Squidoo – good alternative place to put content, make money and promote your blog Snap – a preview tool to give your readers a preview of external links on your blog T Text Link Ads - text link advertising system Technorati – Blog Search engine Topix – News service – used by many bloggers to find stories TagCloud - tool for making tag clouds TinyURL – make long URLs tiny ones TypePad – Hosted Blogging Platform Tribal Fusion – Impression Based Ads 3bubbles – live chat on a blog U Unobtrusive Sidenotes - a way of putting sidenotes in your posts V ValueClick – Impression Based Ad Program (was FastClick) Vizu – blog polls tool


1 http://accasupport.com http://accasupport.com http://accasupport.com Vox – a new blogging/social bookmarking platform from Six Apart (in beta) W WordPress – Blog Platform – very popular w.bloggar – blog editing tool Webpad – web based text editor Weblogs.com – recently updated blogs – aggregator WebmasterWorld – forums for webmasters X Xanga – Weblog Community Y YPN – Contextual Advertising Service Yutter – RSS/Blog Subscription Service YouTube – Video Hosting/Sharing Yutter – RSS/Blog Subscription Service Yahoo News – Tracking News from around the Web Z Zookoda – RSS to Email and Newsletter tool Zoudry – blog editor


etc). Later will be required if organization is considering the use of bespoke (tailor made) software. 1.4 Design Requirements Design requirements can be user ability to user software package such as accessibility, screen tips and help menu to assist users using the software. Software should have an ability to be customized to each user requirement without any technical assistance. 1.5 Supplier Stability Requirements Supplier stability can be assessed using financial and non-financial measures. Financial position can be assessed in term of profitability,


Get in touch

Social

© Copyright 2013 - 2024 MYDOKUMENT.COM - All rights reserved.