You are on page 1of 16

CHAPTER-5

FINDINGS AND
CONCLUSIONS
Chapter 7

CONCLUSION

Working on Yes & No project gave me a opportunity to apply my skills and


knowledge, which We had gained previously.

It gave us a opportunity to see working an organization.


It was an amazing experience with learning all the way, which help us to brush up our
knowledge.

IMPORTANT FINDING OF THE STUDY

 Most of the people are not satisfied with current taxation system.
 Most people agree that way of implementing GST is not good.
 People agree that people does not show honesty when it comes to pay taxes.
 Most people prefer to choose CA for paying taxes.
 People agree that government should change taxation system.
 Few people say that the government should increase services with increase of
taxes.
Suggestions and
Recommendations
Suggestions and recommendations

 During the budget season there are constant demands for raising of tax
deductions. Some of the tax deductions have remained unchanged for nearly two
decades. The government could consider adjusting these deductions to inflation
and removing the ones which are redundant. This can be done for individual
taxpayers. In the US personal tax deductions are inflation adjusted every year.
While corporate tax rates could be linked to encouraging investment and flow of
capital. Or tax free regime to encourage start-ups or specific sectors such as
fintech.

 The share of direct taxes in total collections has been seeing a downward trend.
Since direct taxes play an important role in ensuring equality, they should form a
larger portion of total tax collections. Indirect taxes are consumption based and
impact everyone equally, India must focus on raising the share of direct taxes like
the US and UK. This can be done with a play of tax rates (between direct and
indirect taxes) and widening of base.

 Government must continue its efforts to bring more people under the tax net. The
tax department has gone digital in a big way. E-verification and e-notices were
introduced in the recent past and this eases hardships taxpayers face during
filing. We hope this eco-system will continue to evolve.
BIBLOGRAPHY

BOOKS:-

Marketing research – G.C.Beri


Research Methodology – C.R.Kothari
Principal of Marketing – Philip Kotler.

WEB RESOURCES:-

http://www.yes.com/en_int
http://www.No.com/in/home/
https://www.google.co.in/?gfe_rd=cr&ei=d38dWPi8H_Dx8AeHiYHIAg&gws_rd=ssl#q=yes
https://www.google.co.in/?gfe_rd=cr&ei=d38dWPi8H_Dx8AeHiYHIAg&gws_rd=ssl#q=No
www.scribd.com
www.thestalwart.com
CHAPTER-6

ANNEXTURE
ANNEXURE

SECTION A PERSONAL INFORMATION

1. Name ______________________

2. Gender

○ Male ○ Female

3. Age

□ 10-20 □ 30-50

□ 20-30 □ 50 & Above

4. Marital Status

◊ Single ◊ Married

5. Educational Status

□ Matric □ 10+2

□ Graduation □ Post-Graduation

6. Occupation

◊ Self Employee ◊ Professional

◊ Student ◊ Others

7. Income Level

◌ < 10000 ◌ < 20000

◌ < 40000 ◌ > 40000

8. Residence

□ Urban □ Rural
9. Contact No: ________________

10. E mail id:


QUESTIONARE

1. Do people find taxation system complex?


 Yes
 No

2. Are tax rates much higher?


 Yes
 No

3. Do taxation system needs changes?


 Yes
 No

4. Do people pay taxes honestly?


 Yes
 No

5. People prefer to pay income tax?


 Via charted accountant
 Via agent
 Via online procedure

6. Will GST be proved beneficial the way it is implemented?


 Yes
 No
7. Should government change the taxation system and laws?
 Lumia price less then No Note
 Look
 Weight

8. Should tax rates be reduced?


 Yes
 No

9. Should government provide more services with increase taxes?


 Yes
 No

10.The tax system is all about balance between minimizing compliance


between costs and maximizing revenue?
 agree
 disagee
 neither agree nor disagree

11.Current taxation system for goods and services in our state made in tax
design and administration the system at both central and state level remains
complex?
 agree
 disagree
 neither agree nor disagee
http://www.garykessler.net/library/iit.html Research Assignment Page 764 32 127 10

Total Plagiarism Threshold(%): 31%

Master Document Text


Cryptography: Securing the Information Age Agenda Definitions Why cryptography is important? Types of
Secret Writing Available different techniques Secret key cryptography Public key cryptography Hash
function Why three encryption techniques Significance of key length Public Key Certificates and
Certificate Authorities
Cryptography Cryptography is usually referred to as "the study of secret", while nowadays is most
attached to the
definition of encryption. Encryption is the process of converting plain text "unhidden" to a cryptic text
"hidden" to secure it against data thieves
This process has another part where cryptic text needs to be decrypted on the other end to be
understood. Fig.1 shows the simple flow of commonly
used encryption algorithms. C ryptographic system is "a set of cryptographic algorithms together with the
key management processes that support use
of the algorithms in some application context." This definition defines the whole mechanism that provides
the necessary level of security comprised
of network protocols and data encryption algorithms.The first documented use of cryptography in writing
dates back to circa 1900 B.C. when an
Egyptian scribe used non-standard hieroglyphs in an inscription. Some experts argue that cryptography
appeared spontaneously sometime after writing
was invented, with applications ranging from diplomatic missives to war-time battle plans. It is no surprise,
then, that new forms of cryptography
came soon after the widespread development of computer communications. In data and
telecommunications, cryptography is necessary when communicating
over any untrusted medium, which includes just about any network, particularly the Internet. Within the
context of
communication, there are some specific security requirements, including: Authentication : The process of
proving one's identity. (The primary
of host-to-host authentication on the Internet today are name-based or address-based, both of which are
notoriously weak.) Privacy/confidentiality
Ensuring that no one can read the message except the intended receiver. Integrity : Assuring the receiver
that the received message
altered in any way from the original. Non-repudiation : A mechanism to prove that the sender really sent
this message. Cryptography, then,
protects data from theft or alteration, but can also be used for user authentication. There are, in general,
three types of cryptographic schemes
typically used to accomplish these goals: secret key (or symmetric) cryptography, public-key (or
asymmetric) cryptography, and hash functions, each
of which is described below. In all cases, the initial unencrypted data is referred to as plaintext . It is
encrypted into
in turn (usually) be decrypted into usable plaintext. Cryptography provides information Security for
Defending against external/internal hackers
Defending against industrial espionage Securing E-commerce Securing bank accounts/electronic
transfers Securing intellectual property Avoiding
liability Threats to Information Security Pervasiveness of email/networks Online storage of sensitive
information Insecure technologies (e.g
wireless) Trend towards paperless society Weak legal protection of email privacy Types of Secret Writing
Steganography Steganography comes from the
Greek word meaning covered writing. Dictionary.com defines steganography as the hiding of a message
within another so that the presence of the hidden
message is indiscernible . The key concept behind steganography is that the message to be transmitted
is not detectable to the casual eye.
people who the are not intended to be the recipients of the message should not even suspect that a
hidden message exists. The
steganography and cryptography is that in cryptography, one can tell that a message has been
encrypted, but he cannot decode the message without
knowing the proper key. In steganography, the message itself may not be difficult to decode, but most
people would not detect the presence of the
message. When combined, steganography and cryptography can provide two levels of security.
Computer programs exist which encrypt a
cryptography, and hide the encryption within an image using steganography. ÿ The three types of
algorithms: Secret Key Cryptography (SKC) :
single key for both encryption and decryption Public Key Cryptography (PKC): Uses one key for
encryption and another for decryption
Uses a mathematical transformation to irreversibly "encrypt" information Secret Key Cryptography With
secret key cryptography , a single key
for both encryption and de cryption.T he sender uses the key (or some set of rules) to encrypt the
plaintext and sends the ciphertext
receiver. The receiver applies the same key (or ruleset ) to decrypt the message and recover the
plaintext. Because a single key is used
functions, secret key cryptography is also called symmetricencryption . m = K S (K S (m)) With this form
of cryptography, it is
key must be known to both the sender and the receiver; that, in fact, is the secret. The biggest difficulty
with this approach, of course, is the
distribution of the key. Secret key cryptography schemes are generally categorized as being either stream
ciphers or
ciphers operate on a single bit (byte or computer word) at a time and implement some form of feedback
mechanism so that the key is constantly
changing. A block cipher is so-called because the scheme encrypts one block of data at a time using the
same key on each block. In general, the same
plaintext block will always encrypt to the same ciphertext when using the same key in a block cipher
whereas the same plaintext will
different ciphertext in a stream cipher. Stream ciphers come in several flavors but two are worth
mentioning here.
ciphers calculate each bit in the keystream as a function of the previous n bits in the keystream
the decryption process can stay synchronized with the encryption process merely by knowing how far into
the n -bit keystream it is.
error propagation; a garbled bit in transmission will result in n garbled bits at the receiving side.
Synchronous stream
keystream in a fashion independent of the message stream but by using the same keystream generation
function at sender and
ciphers do not propagate transmission errors, they are, by their nature, periodic so that the keystream will
eventually repeat. Block
operate in one of several modes; the following four are the most important: Electronic Codebook (ECB)
mode is the simplest,
application: the secret key is used to encrypt the plaintext block to form a ciphertext block. Two identical
plaintext blocks, then,
generate the same ciphertext block. Although this is the most common mode of block ciphers, it is
susceptible to a variety of brute-force
Cipher Block Chaining (CBC) mode adds a feedback mechanism to the encryption scheme. In CBC, the
plaintext is exclusively- ORed
previous ciphertext block prior to encryption. In this mode, two identical blocks of plaintext never encrypt
to the same
Feedback (CFB) mode is a block cipher implementation as a self-synchronizing stream cipher. CFB mode
allows data to be encrypted in units
than the block size, which might be useful in some applications such as encrypting interactive terminal
input. If we were using 1-byte CFB mode, for
example, each incoming character is placed into a shift register the same size as the block, encrypted,
and the block transmitted. At the receiving
side, the ciphertext is decrypted and the extra bits in the block (i.e., everything above and beyond the one
byte) are discarded.
OFB) mode is a block cipher implementation conceptually similar to a synchronous stream cipher. OFB
prevents the same plaintext
generating the same ciphertext block by using an internal feedback mechanism that is independent of
both the plaintext and
Secret key cryptography algorithms that are in use today include: DES : (Data Encryption Standard), was
the first encryption standard
recommended by NIST (National Institute of Standards and Technology). It is based on the IBM proposed
algorithm called Lucifer. DES became a standard
in 1974. Since that time, many attacks and methods recorded that exploit the weaknesses of DES, which
made it an insecure block cipher. 3DES:
enhancement of DES, the3DES (Triple DES) encryption standard was proposed. In this standard the
encryption method is similar to the one in original
DES but applied 3 times to increase the encryption level. But it is a known fact that 3DES is slower than
other block cipher methods.
Advanced Encryption Standard) , is the new encryption standard recommended by NIST to replace DES.
Rijndael (pronounced Rain
selected in 1997 after a competition to select the best encryption standard. Brute force attack is the only
effective attack known against it,
which the attacker tries to test all the characters combinations to unlock the encryption. Both AES and
DES are block ciphers. Blowfish: It is
of the most common public domain encryption algorithms provided by Bruce Schneier - one of the world's
leading cryptologists, and the
Counterpane Systems, a consulting firm specializing in cryptography and computer security. Blowfish is a
variable length key, 64-bit block cipher
The Blowfish algorithm was first introduced in 1993.This algorithm can be optimized in hardware
applications though it's mostly used in software
applications.Twofish : A 128-bit block cipher using 128-, 192-, or 256-bit keys. Designed to be highly
secure and highly
large microprocessors, 8-bit smart card microprocessors, and dedicated hardware. Designed by a team
led by Bruce Schneier and was one of
algorithms in the AES process. Public-Key Cryptography Public-key cryptography has been said to be the
most significant new development in
cryptography in the last 300-400 years. Modern PKC was first described publicly by Stanford University
professor Martin Hellman and graduate
Whitfield Diffie in 1976. Their paper described a two-key crypto system in which two parties could engage
in a secure communication over
secure communications channel without having to share a secret key. Bob's public key Bob's private key
PKC depends upon
called one-way functions , or mathematical functions that are easy to compute whereas their inverse
function is relatively difficult to compute.
me give you two simple examples: Multiplication vs. factorization : Suppose I tell you that I have two
prime numbers, 3 and 7, and
calculate the product; it should take almost no time to calculate that value, which is 21. Now suppose,
instead, that I tell you that I have a
and I need you tell me which pair of prime numbers I multiplied together to obtain that number. You will
eventually come up with the solution but
whereas calculating the product took milliseconds, factoring will take longer. The problem becomes much
harder if I start with primes that
digits or so, because the product will have ~800 digits. Exponentiation vs. logarithms : Suppose I tell you
that I want to take
th power; again, it is relatively easy to calculate 3 6 ÿ=ÿ729. But if I tell you that I have the number 729
and want you to tell me the
that I used, x and y so that log x ÿ729ÿ=ÿy, it will take you longer to find the two values. While the
examples above are
represent two of the functional pairs that are used with PKC; namely, the ease of multiplication and
exponentiation versus the relative difficulty of
factoring and calculating logarithms, respectively. The mathematical "trick" in PKC is to find a trap door in
the one-way function so that
inverse calculation becomes easy given knowledge of some item of information. Generic PKC employs
two keys that are mathematically related although
knowledge of one key does not allow someone to easily determine the other key. One key is used to
encrypt the plaintext and the other key is used to
decrypt the ciphertext . The important point here is that it does not matter which key is applied first , but
that both keys
process to work. Because a pair of keys are required, this approach is also called asymmetric
cryptography . In PKC, one of
the public key and may be advertised as widely as the owner wants. The other key is designated the
private key and is
party. It is straight forward to send messages under this scheme. Suppose Ram wants to send Bobby a
message.
using Bobby 's public key; Bobby decrypts the ciphertext using his private key. This method could be also
used to prove
for example, could encrypt some plaintext with her private key; when Bobby decrypts using Ram 's public
key, he knows that
and Ram cannot deny having sent the message ( non-repudiation ). Public key cryptography algorithms
that

 Plagiarism Detection Software


 Plagiarism Test
 Plagiarism Detector
 Detect Plagiarism

 Essay Checker | Free Check for Plagiarism


 Lesson plans
 Avoid Plagiarism
 Plagiarism Check

 Plagiarism Prevention
 Turnitin| Check for Plagiarism Free
 Editing Services
 Coursework writing

Viper Report
[+] Read more..

Viper scans your work against over 10 billion web pages and work previously submitted to our firm. Once
the scan is completed, the report delivers content that may match these other sources, including links to
the sites that contain the same content.

What Do the Results Mean?


If the report sends back positive matches to content found elsewhere, there is no need to panic and
assume you have plagiarised your work. Instead, review the report carefully and consider the following:

 Is the material an entire quote, a sentence, or a fragment of 4-5 words often found together?
Viper will show a match where there is a string of five or more words that are the same as your
work. Even if this is not actually plagiarism, it is important that Viper does not ignore these
fragments as they draw your attention to any sentences where the writer has 'rephrased' parts of
the original material without referencing the source.

 If it was intended to be a quote that you were going to attribute to the source, did you remember
to properly reference it? Sometimes, Viper will identify matching material that is available on
websites, but the reference might have been found within another source. Just because the work
has content that matches a particular website does not mean that every possible source where it
appears has to be referenced. Just make sure that at least one reference covers that content.

 Did you actually use a footnote and it was just simply not picked up by Viper? This review is just a
means of double-checking that all references have been included.

 Could Viper have just picked up a phrase that you used more than once in your document? This
may be a way to ensure that your writing is tight rather than repetitive or relies on overly used
phrases.
 Did you use too many direct quotes? Viper checks for direct quotes and delivers an overall
percentage of words it views as direct quotes. Clearly, this should not be too high as work that
relies too heavily on other material is not 'original'.

A Guide on Viper Results


This guide explains how Viper can identify matching content when it scans your work:

Overall plagiarism rating 6% or less :


The results are that it is highly unlikely that this document contains plagiarised material. A careful check
will only be necessary if this is a lengthy document. For example, a 6% result within a 15,000 word essay
would be of concern because it could mean that direct quotes are too lengthy or there are too many
places where a reference was not listed.

Overall plagiarism rating 6% - 12% :


The results are that there is a low risk that the document contains any plagiarised material. Most of the
matching content will probably be fragments. Review your report for any sections that may not have been
referenced properly.

Overall plagiarism rating 13% - 20% :


The results are that there is a medium risk that the document contains any plagiarised material. There
may be sections that match websites so it is important to check that proper credit was attributed to the
other sources. The scan may not have detected quotation marks or footnotes that were used. For
example, if an opening quotation mark was included but there was not a closing quotation mark, then this
could explain the higher result.

Overall plagiarism rating 21%+ :


The results are that there is a high risk that the document contains plagiarised material. If the overall
rating is this high, you need to check your report very carefully. It may be that there are a lot of matching
fragments and the software has not identified all direct quotes , but it is critical that you go through the
entire document and address every phrase or fragment that the scan has flagged to reduce this
percentage.
[-] hide

You might also like