Professional Documents
Culture Documents
Information Technology
Information Technology
INFORMATION TECHNOLOGY
CA - IPC
Telecommunication Network
A Telecommunication Network is a collection of
Terminal nodes
Meaning Links and any intermediate nodes
Which are connected, so as to enable telecommunication between the
terminals
It allows departments to share hardware devices,
It allows information to be shared,
Purpose
It allows electronic transfer of text,
It facilitates communication between organizations.
Telecommunication networks which can be classified on the basis of different factors
like
Classification based on Area of Coverage
LAN, WAN, MAN
Types
Functional Based Classification
Client-Server, Peer-to-Peer
Ownership-based Classification
Public Network, Private Network, Virtual Private Network
A MODEM is a device that
converts a digital computer signal into an analog telephone signal
Modem (i.e. it modulates the signal) &
converts an analog telephone signal into a digital computer signal
(i.e. it demodulates the signal) in a data communication system
A multiplexer is a communication processor
that allows a single communication channel to carry simultaneous data
Multiplexer transmissions from many terminals
Multiplexer
(N14RTP, N14 merges the transmission of several terminals at one end of a
MTP2 –1M) communication channel
While a similar unit separates the individual transmissions at the
receiving end.
Internetwork Processors Telecommunications networks are interconnected by special- purpose
(N14RTP, M15 MTP2 - 5M) communications processors called internetwork processors
Switch is a communication processor
Switch
that makes connections between telecommunication circuits in a
(N15 – 1M,
network
M15RTP)
so that a telecommunication message can reach its intended destination
Router Router is a communication processor
N15 – 1M, N15 that interconnects networks based on different rules or protocols,
RTP) so that a telecommunication message can be routed to its destination
Hub is a port switching communication processor
Hub This allows for the sharing of the network resources such as servers, LAN
workstations, printers, etc.
Bridge is a communication processor
That connects number of Local Area Networks (LAN).
Bridge
It magnifies the data transmission signal while passing data from one
LAN to another
Repeater Repeater is a communication processor
(N15 RTP, M15 That boosts or amplifies the signal before passing it to the next section
MTP1 – 1M) of cable in a network.
Gateway is a communication processor
Gateway
That connects networks and use different communication architectures.
Write short notes on network management and functions of network management?
PM ( Exercise )
Telecommunications software packages provide a variety of
NETWORK
communication support services.
MANAGEMENT
Which helps to manage the network effectively
Manages network resources and traffic
Traffic
to avoid congestion and optimize telecommunications
management
service levels to users
Provides
authentication,
Security
Encryption, and auditing functions, &
Enforces security policies
Troubleshoot and watch over the network
Network
informing network administrators of potential
monitoring
problems before they occur
MAJOR NETWORK Surveys network resources and traffic patterns &
Capacity
MANAGEMENT users‘ needs to determine how best to accommodate
planning
FUNCTIONS the needs of the network as it grows and changes
This measures and makes network performance data
available
So that performance can be maintained and acceptable
Performance
thresholds
Management
The network performance addresses the
Throughput
(M15 MTP2 -
Network response times
1M)
Packet loss rates
link utilization
percentage utilization
Wired & wireless This concept is applicable to wired and wireless networks.
Only military installations,
Application
which need high degree of redundancy, may have such networks,
Gives the greatest amount of redundancy. Even if one node fails,
network traffic
ADVANTAGES Can be redirected to another node.
PM Network problems are easier to diagnose
Highly reliable
More Cabling is needed
High Cost of installation and maintenance
DISADVANTAGES
Adding or replacing a node will disturb the entire network
PM
Several users can use the central unit at the same time
ADVANTAGES It is easy to add new nodes and remove existing nodes
PM A node failure does not bring down the entire network
It is easier to diagnose network problems through a central hub.
The whole network is affected if the main unit ―goes down,‖ &
All communications stop.
If it fails, there is no backup processing and communications
DISADVANTAGES
capability &
PM
The local computers will be cut off from the corporate
headquarters and from each other.
Considered less reliable than a ring network
Diagram
Figure A
B
Simplex: A to B only
Figure A B
Half Duplex: A to B or B to A
A
Figure B
Full-Duplex: A to B and B to A
Similar questions :
1) Half Duplex Mode Vs. Full Duplex Mode. (RTP-NOV 15)
Discuss various switching techniques used in a computer network?
(PM, M 04 - 5M, N 11 - 4M, M15 RTP)
Based on the techniques used to transfer data, communication networks can be categorized into
Broadcast networks
switched-communication
In Broadcast networks
Data transmitted by one node is received by many,
Sometimes all, of the other nodes
This refers to a method of transferring a message to all recipients
simultaneously
For example – a corporation or other voluntary association that
provides
Broadcast networks
Live television or recorded content
Such as
Movies,
Newscasts,
sports,
Public affairs programming, &
Other television programs
for broadcast over a group of radio stations or television stations
In switched communication networks, however, the data transferred
from source to destination is routed through the switch nodes.
The way in which the nodes switch data from one link to another, as
it is transmitted from source to destination node, is referred to as a
Switched Networks switching technique.
Three common switching techniques are
Circuit Switching,
Packet Switching, &
Message Switching
Discuss the common Switching techniques used in computer networking
PM
The common switching techniques used in computer networking are
Circuit switching,
Packet Switching &
Message Switching
Dedicated When two nodes communicate with each other over a
communication dedicated communication path,
path it is called Circuit Switching
An important property of circuit switching is the need to
End – to – end set up an end-to-end path
path before any data can be sent which can either be
Circuit Switching
permanent or temporary
Applications which use circuit switching go through
three phases
Establish a Circuit
Uses 3 phases
Transfer of data
Disconnect the Circuit.
Message No physical path In message switching,
switching/Store-and- in advance No physical path is established between sender
Forward and receiver in advance.
Data is The whole message is treated as a data unit and is
(M 11 - 2M) transferred in transferred in its entirety
totality Which contains the entire data being delivered from the
source to destination node
A switch working on message switching
First receives &
first receives the whole message &
buffers it until
Buffers it until there are resources available to
next hop
transfer it to the next hop.
If the next hop is not having enough resource to
Not having
accommodate large size message,
enough resource
the message is stored and switch waits
E-mail and voice mail are examples of message
Example
switching systems.
Smaller The entire message is broken down into smaller
transmission transmission units called packets.
units
Information is The switching information is added in the header of each
added in the packet and transmitted independently
header or packet
Easier for inter - It is easier for intermediate networking devices to store
mediate device to smaller size packets &
Packet Switching
sore small they do not take much resources either on carrier path or
pockets in the switches‘ internal memory
(N 02 - 1M)
In packet switched network
first packet of a multi-packet message may
How message is
be forwarded before the second one has fully
transferred
arrived
Thus reducing delay and improving throughput.
Since, there is no fixed bath, different packets can follow
Different paths different path &
thus they may reach to destination out of order
Similar questions :
1) Circuit Switching Vs. Packet Switching. (RTP-NOV 15)
2) Difference between Broadcast Networks and Switched Networks. (RTP - MAY 15)
Communication Protocols
(M15 RTP)
Software for data Protocols are software that performs a variety of actions necessary
transmission for data transmission between computers.
Protocols are a set of rules for inter-computer communication that
Set of rules have been agreed upon and implemented by many vendors, users
and standard bodies.
Communicate Protocols allow heterogeneous computers to talk to each other
this layer.
It also referred as Syntax Layer,
It is the part of operating system that
Layer 6
Converts incoming and outgoing data from one presentation
or
format to another.
Presentation
controls onscreen display of data
Layer
transforms data to a standard application interface;
Encryption and data compression are undertaken at this layer
This layer sets up, coordinates, and terminates conversations;
Layer 5 Exchanges and dialogs between the applications at each end.
Or It deals with session and connection coordination and provides for full-
Session duplex, half-duplex, or simplex operation
Layer establishes check pointing, adjournment, termination, and restart
procedures
This layer ensures
Layer 4 ensures reliable and transparent transfer of data between user
Or processes
Transport assembles and disassembles message packets &
Layer provides error recovery and flow control.
Multiplexing and encryption are undertaken at this layer
Layer 3 This layer makes a choice of the physical route of transmission of data.
Or Network It establishes, maintains, terminates, connections between the nodes and
Layer ensures proper routing of data.
(N09 - 1M)
Layer 2 The Data Link Layer responds to service requests from the Network Layer
Or and issues service requests to the Physical Layer
Data Link It specifies channel access control method and ensures reliable transfer of
Layer data through the transmission medium
Layer 1 The Physical Layer is a hardware layer which specifies mechanical
Or features as well as electromagnetic features of the connection between the
Physical devices.
Layer Establishment and termination of a connection to a communications
medium can be undertaken at this layer
(N15 MTP2 – Modulation or conversion of digital data are major tasks
2M, M16 -
2M)
Similar questions :
1) Transport Layer Vs. Network Layer of OSI Model. (MTP FEB-15, MTP MAR-15)
2) Presentation Layer Vs. Session Layer of OSI Model. (RTP-NOV 15)
server
More time for Simultaneous access to data and services by the user takes little more time
Simultaneous for server to process the task
access
App.server1 App.server2
Database
Server
With this separation more clients are able to have access to a wide
variety of server applications.
Dynamic load If bottlenecks in terms of performance occur,
balancing the server process can be moved to other servers at runtime.
Change It is easy and faster to exchange a component on the server than to furnish
management numerous PCs with new program versions
It creates an increased need for
Network traffic management,
increased need
Server load balancing, &
Disadvantages
Fault tolerance.
Immature Current tools are relatively immature and are more complex.
&
Complex
Inadequate Maintenance tools are currently inadequate for maintaining server libraries
Maintenance
tools
In a client-server architecture
in which
logically presentation,
separated application processing, &
data management functions
n-tier Architecture
are logically separated.
or
By segregating an application into tiers,
3 tire Architecture Modifying or
developers acquire the option of modifying or adding a specific
adding a
layer,
(M16 MTP2 - 2M) specific layer
instead of reworking on entire application.
An application that uses middleware to service data requests
Example
between a user and a database employs multi-tier architecture.
Multi tire is a The most widespread use of multi-tier architecture is the three-
three tire tier architecture.
Write short notes on public and private networks?
Or
Ownership Based Classification of networks
Share & access A public data network is a network shared and accessed by all
by all users users across the world.
Public Data
It is a network established and operated by a
Network
Established & telecommunications administration
operated by for the specific purpose of providing data transmission
(N14 MTP1 - 1M)
services for the public.
Example Internet
Private Network is used by
Particular organization,
Used by
Private Data Particular campus or
Network Particular enterprise only.
not available This is a network that is not available to the outside world.
Example Intranet.
Virtual private
See below
networks
Similar questions :
1) Difference between Public Data Network and Private Data Network (RTP-MAY 15)
Multiple types All of the work associated with the business runs at the central
of workload computing location.
If failure of The central computer performs the computing function.
central If the central computer fails to works, then the entire system will
computer go down.
Disadvantages of
Central computing relies heavily on the quality of administration
centralized
Relies heavily and resources provided to its users
systems
by central Empowerment of the central computer should be adequate by all
computer means,
Else the usage suffers greatly
Decentralized computing is the collection of resources, both
hardware and software, to
Collection of
Each individual workstation, or
resources
Office location
which are capable of running independently of each other
Decentralized Decentralized systems enable file sharing &
systems all computers can share peripherals such as
Printers
File sharing Scanners &
Modems
allowing all the computers in the network to connect to
the internet.
Advantages of Utilizes the A decentralized system utilizes the potential of desktop systems
decentralized potential of to maximize the potential performance of the business
systems desktop systems applications.
Disadvantages of All computers have to be updated individually with new software,
Update
decentralized Unlike a centralized computer system.
individually
systems
security is two-fold
providing network
to
Timing Windows Gain access to the file,
Overwrite important data &
use the same file as a gateway for advancing further into the system.
Insecure default They occur when vendors use known default passwords to make it as easy
configurations as possible for consumers to set up new systems.
Use of such devices can ensure that all traffic between these offices
is secure.
Software encryption is typically employed in conjunction with
Software specific applications.
Encryption Certain electronic mail packages provide encryption and decryption
for message security.
Similar question :
1) Hardware Encryption Vs. Software Encryption (RTP-NOV 14)
protocols include
network security
Write about Intrusion Detection System (IDS)? Explain Primary IDS technologies?
(M15RTP)
An Intrusion Detection System is a device or software application
That monitors network or system activities for
Malicious activities
Intrusion Detection
Policy violations
System (IDS)
The goal is to
Monitor the network assets,
To detect anomalous behavior and misuse.
NID System is placed on a network to analyze traffic
TECHNOLOGIE
PRIMARY IDS
Path of a packet The path a packet takes through Internet depends on the peering choices of the ISPS
Business Intranets are being used as the platform for developing and
Operations and deploying critical business applications to support business
Management operations and managerial decision making across the enterprise.
Deploy in "Internet
time" extranet quickly and leverage their existing infrastructure to do so.
EXTRANET
Protect the interest An extranet must ensure that what is supposed to be private stays
of the data owner private.
Partners should never be required to change their security policies,
Serve the partner as
networks, applications and firewalls for the "good" of the extranet
a customer
community.
Drive information to An extranet must provide a central means to measure progress,
the decision-maker performance and popularity.
What do you understand by the term „e-Commerce”? Discuss its benefits and risks involved
( PM )
Doing business E-Commerce is the process of doing business electronically
electronically
Enhance the It refers to the use of technology to enhance the processing of commercial
process of transactions between a company, its customers and its business partners.
transactions
Automation of It involves the automation of a variety of business -to-business and business-to-
transactions consumer transactions through reliable and secure connections
Reduced advertising costs
Reduced inventories
Reduced delivery cost, especially for goods that can also be delivered
electronically
Reduced time to complete business transactions, from delivery to payment
Reduced overhead costs
Benefits Reduced use of ecologically damaging materials
Equal access to markets
(PM, N 02, 06, M Buyers can get the required goods at less cost
08 - 5M, M16 ) It is not necessary to re-enter data
Sellers can participate in on-line bidding. Thus selling costs can be reduced
Creation of new markets as it is easy and cheap to reach potential customers
Easy entry into new markets, especially geographically remote markets, for
companies of all sizes and locations
Better quality and improved variety of goods can be acquired by consumers
Ability to undertake more global programs
There is need to identify and authenticate users in the virtual global
Problem of market
anonymity Where anyone can sell to or buy from anyone, anything from anywhere
Repudiation of There is possibility that the electronic transaction in the form of contract,
contract sale order or purchase by the trading partner or customer may be denied.
transactions
Data Loss or theft The data transmitted over the Internet may be lost, duplicated, tampered
or duplication with or replayed.
Attack from Web servers used for e-Commerce may be vulnerable to hackers
hackers
Service to customers may be denied due to non-availability of system as
Denial of Service
it may be affected by viruses, e-mail bombs and floods.
Non-recognition E-Commerce transactions, as electronic records and digital signatures
of electronic may not be recognized as evidence in courts of law
transactions
Lack of audit Audit trails in e-Commerce system may be lacking and the logs may be
trails incomplete, too voluminous or easily tampered with
Intellectual property may not be adequately protected when such
Problem of piracy
property is transacted through e-Commerce.
Similar questions :
1) Difference between C2B and C2C e-Commerce (RTP - MAY 15)
Define the Electronic Funds Transfer. State some examples of EFT systems in operation?
(J 09 - 5M) , ( PM Exercise )
EFT EFT stands for "Electronic Funds Transfer".
Receive direct It represents the ways the business can receive direct deposit of all payments
deposit From financial institutions to the company‘s bank account.
Once signs up Once the user signs up, money come to him directly and sooner than ever before
EFT is fast and safe. It means the money will come to the user’s bank account
fast and safe
quicker
Some examples of EFT are
AUTOMATED TELLER MACHINES (ATMS)
EXAMPLES POINT – OF – SALE (POS) TRANSACTIONS
PREAUTHORIZED TRANSFERS
TELEPHONE TRANSFERS
Atms are specialized form of Point of Sale Terminals
Point of Sale That are designed for unattended use by a customer of a
AUTOMATED TELLER
Money is taken out of the consumer‘s account and put into the
Debit of money
merchant‘s account electronically
This is a method of automatically depositing to or withdrawing
Automatic deposit or funds from an individual‘s account,
PREAUTHORIZED
withdraw When the account holder authorizes the bank or a third party
(such as employer) to do so.
TRANSFERS
.
Define Information System? Write about Information System components
(N14RTP)
It is a set of interrelated components working together to
collect,
retrieve,
process,
store, &
Information System disseminate (distribute) information
for the purpose of achieving objectives such as
planning,
coordination,
analysis &
decision making
Information System is generally called as
Also known as Management Information System (MIS) or
Computer Based Information System (CBIS).
Hardware Devices which store software, database of processed data
Software Programs that process data to generate reports
Components
Define the term Application Software? Explain types and mention advantages &disadvantages.
(N15- 4M, N14 MTP1&2-2M, M15 MTP2-4M, N15 MTP1-4M, M16 MTP1-2M)
Application This includes all those computer software that cause a computer to perform useful tasks
software beyond the running of the computer itself.
Has multiple applications bundled together
Application suite Related functions, features and user interfaces interact with each other.
E.g. Ms office 2010 which has msword, ms excel, ms access, etc.
Addresses an enterprise‘s needs and data flow in a huge distributed
Enterprise
Types of application software
environment
Software
E.g. ERP Applications like SAP
Enterprise Provides capabilities required to support enterprise software systems
Infrastructure E.g. Email servers, Security software.
Software
Information Addresses individual needs required to manage and create information for
Worker individual projects within departments.
Software E.g. Spreadsheets, CAAT (Computer Assisted Audit Tools) etc
Used to access contents and addresses a desire for published digital content
Content Access
and entertainment
Software
E.g. Media Players, Adobe Digital etc.
Educational Holds contents adopted for use by students
Software E.g. Examination Test cds.
Media Addresses individual needs to generate and print electronic media for others to
Development consume.
Software E.g. Desktop Publishing, Video Editing etc
He main advantage of application software is that it meets the exact needs
Addressing
of the user.
( PM Exercise )
User needs
Since it is designed specifically with one purpose/specific purpose
Advantages
Write about System Software in detail. (Or) What is an OS? Explain functions or activities performed by
OS?
(PM, N14RTP, M15RTP, N15RTP)
System software is computer software that is designed to operate the computer
hardware
System software
To give and maintain a platform for running application software
Example - operating system
OS is a set of computer programs that manages computer hardware
Computer
resources &
programs
Acts as an interface with computer applications programs
The operating system is a vital component of the system software in a
computer system.
Convenient
Operating Application programs usually require an operating system to function
environment
System ( OS ) that provides a convenient environment to users for executing their
programs.
Extended Computer hardware with operating system can thus be viewed as an
machine extended machine which is more powerful and easy to use.
Some prominent Operating systems used nowadays are Windows 7,
Examples
Windows 8, Linux, UNIX, etc.
File OS keeps a track of where each file is stored and
management Who can access it and it also provides the file retrieval.
Activities are executed by Operating
resources.
Management
This facilitates a user to work with more than one application at a time
Operating systems can provide systems with features & capabilities to help
Networking connect computer networks
Capability Like Linux & Windows 8 give us an excellent capability to connect to
internet.
Logical access OS provide logical security by establishing a procedure for identification
security & authentication using a User ID and Password.
An important function of any operating system is to provide user interface
DOS has a Command based User Interface (UI) i.e. Text commands
User were given to computer to execute any command,
Interfaces Where as
Windows has Graphic User Interface (GUI) which uses icons &
menus
Application programs to perform tasks must obtain input from keyboards,
Performing
retrieve data from disk & display output on monitors
hardware
Achieving all this is facilitated by operating system that acts as an
functions
intermediary between the application program and the hardware.
Hardware Every computer could have different specifications and configurations of
Independence hardware
Operating system provides Application Program Interfaces (API) which can
be used by application developers to create application software
Thus obviating the need to understand the inner workings of OS and hardware
Thus, OS gives us hardware independence.
Mouse
Pointing devices
Input devices Scanners & Bar codes
MICR readers
Webcams
Microphone
Touch Screen
Computers provide output to decision makers at all levels of an enterprise to solve business
problems
The desired output may be text, graphics or video information
Output devices can be used to view the output in
Hard copy form &
Soft copy form
Several output devices
A vacuum tube that uses an electron gun ( cathode ) to emit a beam of
Cathode – Ray Tube electrons
Output Devices
( CRT) That illuminate phosphors on a screen as the beam sweeps across the
screen repeatedly
Liquid Crystal A low – powered display technology used in laptop computers
Display Where rod-shape crystal molecules change their orientation when an
( LCDs ) electrical current flows through them
A printer that forms images using an electrostatic process , the same way
Laser printer
a photocopier works
Ink – jet Printer A printer that makes images by forcing ink droplets through nozzles
A printer that uses computer – directed pens for creating
High – quality images,
Plotter
Blueprints
Schematics
Speakers Gives an audio output
What is CPU or microprocessor? What are the three functional units of a Central Processing Unit (CPU)?
(PM)
The central processing unit (cpu or microprocessor) is the actual hardware that
Actual
Interprets and executes the program (software) instructions &
hardware
Coordinates how all the other hardware devices work together
Flake of silicon The CPU is built on a small flake of silicon and can contain million of transistors
Brain of the The processor or cpu is like the brain of the computer
computer
Execute The main function of cpu is to execute programs stored in memory
programs
Control unit,
Control Unit Controls the flow of data and instruction to and from memory,
(CU) Interprets the instruction &
Controls which tasks to execute and when
CPU consists of three functional units
sequential order)
These are primarily of two types
This is Read Write memory.
Random Access Information can be read as well as modified (i.e. Write).
Primary
Memory (RAM) Volatile in nature means Information is lost as soon as power is
Memory
turned off
This is non-volatile in nature (content remains even in absence
(M15RTP)
of power).
Read Only Usually, these are used to store small amount of information for
Memory (ROM) quick reference by CPU.
Information cannot be modified
Generally used by manufacturers to store data &Programs
Primary memory storage capacity is
Limited,
Expensive &
Volatile
Secondary Hence, it is necessary to have secondary or permanent or auxiliary storage to hold
Memory data and Programs permanently.
Some of the commonly used secondary storage devices are
Magnetic tape drives,
Magnetic disk drives (Hard disks, floppy disks, etc.),
Optical disk drives (cds, dvds, Blue ray disks etc.)
Huge speed There is a huge speed difference between Registers and
difference Primary Memory
Bridge the speed Cache memory can be used in order to bridge the speed
Differences differences between Registers and Primary memory
Diagram
Several parents In network database structure each node may have several parents
Multiple It is built on the concept of multiple branches (lower -level structures)
branches Emanating from one or more nodes (higher-level structures) &
That branch may be connected to multiple nodes
In this model, all types of relationships are allowed, without any restriction
One-to-one,
All types of One-to-many,
relationships Many-to-one &
Many-to-many.
relationships are permitted
Represent The network model is able to represent redundancy in data more efficiently than in
redundancy the hierarchical model
Entered and These structures can be entered and traversed more flexibly
traversed
Diagram
DBMS also reduce the dependence of users on computer experts to meet their
User-friendly
data needs.
Improved Security constraints can be defined. Through the use of passwords,
security DBMS can be used to restrict data access to only those who should see it.
A database system keeps data separate from the application that uses the data.
Data
Thus, changes can be made to data definitions without making changes to
independence
every application program that uses the data
Faster The data is already available in databases
application Application developer has to think of only the logic required to retrieve the
development data in the way a user needs.
Implementing a DBMS system can be
Expensive,
Disadvantages
Oriented
When connection is established we send the message or the
Networks Share
information &
information
Then we release the connection.
In connectionless networks,
Connectionl Without
The data is transferred in one direction from source to
ess Checking
destination without checking that destination is still there or
Networks destination
not, or if it is prepared to accept the message.
Complete Data which is being exchanged in fact has a complete
contact contact information of recipient and at each intermediate
information destination,
It refers to the process of deciding on how to communicate the data from
Routing
Issues a computer network
Resilience It refers to the ability of a network to recover from any kind of error like
(N15 RTP) connection failure, loss of data etc
Contention It refers to the situation that arises when there is a conflict for some common
(M15 MTP2 resource.
- 1M, For example, network contention (conflict) could arise when two or more
M16RTP) computer systems try to communicate at the same time.
Fixed hardware The computer is based on a fixed hardware platform capable of executing a fixed
platform repertoire of instructions
Cpu, the centre piece of the computer‘s architecture,
Is in charge of executing the instructions of the currently loaded program.
These instructions tell the cpu to carry out
Cpu
Various calculations,
To read and write values from and into the memory, &
To conditionally jump to execute other instructions in the program.
Computer architecture includes at least three main subcategories
Instruction Set Architecture,
Sub categories
Micro-Architecture &
System Design
(CISC) Examples
Pentium, Pentium Pro, Pentium
II, Pentium III processors etc
(N15 MTP1 - 2
variable CISC chips have a large, variable length and complex instructions
length and But at the same time, they are complex as well as expensive to
complex produce
instructions
Where it is Now-a-days, most of the personal computers use CISC processors
used
To execute each instruction, if there is separate electronic
separate
circuitry in the control unit,
Reduced electronic
which produces all the necessary signals,
Instruction Set circuitry
this design approach is called RISC design
Computer
Examples of RISC processors
(RISC):
Examples IBM RS6000,
MC88100 processors etc
faster, less RISC processors are faster, less complex and less expensive than
complex CISC
and less These consume less power and have high performance.
expensive
Where it is Now-a-days, most of the workstation computers use RISC
used processors
Micro Architecture
(N14 RTP, N14 MTP2-1M, M16 RTP, M16 MTP1-1M)
It is a lower level detailed description of the system
Describe the
That is sufficient for completely describing the operation of all parts of the
operation all
computing system, &
parts
How they are inter-connected and inter-operate in order to implement the ISA
It can be seen as The micro architecture can be seen as how the ISA does and what it does
Logical The micro architecture essentially forms a specification for the logical
implementation implementation
System Design
It includes all of the other hardware components within a computing system such as
System interconnects- Computer bus is a communication system that
Computer buses and Transfers data between components inside a computer, or
switches Between computers that covers all related hardware components (wire,
optical fibre, etc.) & software, including communication protocol
(M15 MTP1-1M)
The memory controller is a digital circuit which
Memory controllers
Manages the flow of data going to and from the main memory &
and hierarchies
Can be a separate chip or integrated into another chip
CPU off-load DMA is a feature of modern computers
mechanisms-Direct That allows certain hardware subsystems within the computer to access system
Memory Access memory independently of the central processing unit (CPU).
(DMA)
Multiprocessing is the use of two or more Central
Multiprocessing Processing Units (CPUS) within a single computer system
Issues- to allocate tasks between them.
Multi-processing, Hardware It refers to the creation of a virtual machine that acts like a
virtualization, Virtualization real computer with an operating system
software features etc. or Software executed on these virtual machines is separated
Platform from the underlying hardware resources.
Virtualization
What is Information System Life Cycle? Explain different phases of System development life cycle.
(PM, M15 - 2M, N14RTP, N14 MTP2 - 4M, M16 MTP1 - 4M)
Information system life cycle is also known as software/system development life cycle
Also known as
(SDLC).
Sequence of It provides a sequence of activities for system designers and developers to build an
activities information system.
It consists of a set of phases in which each phase of the sdlc uses the results of the
Set of phases
previous one
There are various phases for developing an information system are given as follows
Phase 1: system investigation
Phases for
Phase 2: system analysis
developing
Phase 3: system designing
( PM )
Phase 4: system implementation
Phase 5: system maintenance and review
Phase 1 System Investigation (M16 MTP2 - 2M)
This phase examines that
What it examines
‗What is the problem and is it worth solving‘?
A feasibility study is done under the dimensions
Technical feasibility
Feasibility study
Economic feasibility
Legal feasibility
( TELOS )
Operational feasibility
Schedule feasibility or time feasibility
Phase 2 System Analysis
This phase examines that
What it examines
‗What must the Information System do to solve the problem‘?
System analyst would be gathering details about the current system
It involves
Interviewing st
Gathering details
Examine current business
Sending out questionnaires
Observation of current procedures
Phase 3 System Designing (N15RTP)
This phase examines that
What is examine ‗How will the Information System do what it must do to obtain the
solution to the problem‘?
This phase specifies the technical aspects of a proposed system in
terms of
Hardware platform
Technical aspects
Software
Outputs
Inputs
User interface
Modular design
Test plan
Conversion plan
Documentation
Phase 4 System Implementation
This phase examines that
What it examines
‗How will the solution be put into effect‘?
This phase involves
Coding and testing of the system;
What it involves Acquisition of hardware and software; &
Either installation of the new system or conversion of the old
system to the new one
Phase 5 System Maintenance and Review
What it evaluate This phase evaluates results of solution and modifies the system to
meet the changing needs
Post Post implementation review would be done
implementation To address Programming amendments;
review Adjustment of clerical procedures;
Modification of Reports, &
Request for new programs.
Direct
In Conversion, there are
different objectives
Adaptive All systems will need to adapt to changing needs within a company
Maintenance
Problems frequently surface after a system has been in use for a short
Corrective time,
Maintenance However thoroughly it was tested.
Any errors must be corrected
What are the three critical pillars of Business Process Automation (BPA)?
( PM )
Business Process Automation rests on the following three critical pillars
Not only to read BPA allows applications and operating systems
data But also Not only to read data that the systems produce,
Integration
Pass & modify But also to pass data between the component applications of the
data business process and to modify the data as necessary.
The process of orchestration enables the ability to bring tasks
Ability to bring
that exist across multiple computers and different business
Orchestration tasks under one
departments or branches
umbrella
Under one umbrella that is the business process itself
Rule-based Orchestration and integration unite with automation to deliver
Automation the capability to provide a rule-based process of automatic
process of
automatic execution
execution That can span multiple systems and enable a more effective,
nimble and efficient business process
typing, scanning).
Generic System
Processing is the action of manipulating the input into a more useful from.
Processing
(calculating, reporting)
Storage Storage is the means of holding information for later usage
Output is the information flowing out of a system (printing reports, displaying
Output
results)
Feedback Feedback is the method that controls the operation
Define the following
( PM )
A business process is a collection of related, structured activities or tasks
Business process That produce a specific service or product (serve a particular goal) for a specific
organization.
Knowledge management encompasses both the content and the process of
Knowledge
creating the content.
management
It refers both to what is known and how it came to be known
Extensible Business XBRL is freely available international standards-based business reporting
Reporting language
Language (XBRL) Developed by accountants for financial reporting
Online analytical OLAP is a multi-dimensional analytical tool typically used in data mining,
processing (OLAP) That gathers and process vast amounts of information into useful packets
Equivalence
To ensure that full effectiveness is achieved.
High Volume TPS is designed to process large volumes of transactions in an instantaneous
Rapid manner.
Processing
A TPS is designed to be robust and trustworthy.
Trustworthiness The system is capable to process transactions very rapidly at the same time it
preserves the integrity of data
What is meant by Decision Support System? What are the Benefits of DSS.
(PM, N15 - 2M, N14 MTP1 - 1M)
Computer-based A decision support system (DSS) is a computer-based information system
information system That supports organizational decision-making activities
DSS serve the management, operations and planning levels of an organization
(usually mid and higher management) &
Serve & help
Help to make decisions, which may be rapidly changing and not easily
specified in advance
Computerized, DSS can be either fully computerized, human or a combination of both.
Or
Human
A properly designed DSS may be defined as an interactive software-based
system
Intended to help decision makers compile useful information from
DSS can be define
Raw data, documents,
as
Personal knowledge, and/or
Business models
To identify and solve problems and make decisions
DSS are there to facilitate a manager in making operational decisions,
What it facilitate
But the ultimate burden of responsibility lies with the manger
Types of Two types of planning languages that are commonly used in DSS are
programming General-purpose Planning Languages &
language Special-purpose Planning Languages
General-purpose planning languages that allow users to
perform many routine tasks,
For example;
Routine tasks
Retrieving various data from a database or performing
General-purpose statistical analyses
planning languages The languages in most electronic spreadsheets
These languages enable user to tackle abroad range of
Budgeting,
Uses
Forecasting, &
Worksheet-oriented problems
Special-purpose planning languages are more limited in what
Better than
they can do,
the general-
Special-purpose But they usually do certain jobs better than the general-
purpose
planning languages purpose planning languages.
Some statistical languages, such as SAS and SPSS, are
Examples
examples of special purpose planning languages.
Improved decision quality
Cost reduction
Increased productivity
Benefits of DSS
Improved communication
Time saving
Improved customer satisfaction
What do you understand by the term “Executive Information System (EIS)”. Discuss its components, in
detail.
(PM, M15RTP, M16 MTP2 - 4M)
An executive information system (EIS) is the nature of information system
Information
It is used by executives to access and administer the data they entail ,to make
system
informed business decisions
The EIS in itself is not an instrument, but rather, an infrastructure within a
Infrastructure
company
It may be defined as just not as a piece of hardware or software,
But an infrastructure that supplies to a firm's executives
How it can define
The up-to-the-minute operational data,
Gathered and sifted from various databases
Internal and EIS links data from various sources both internal and external to provide the
external amount and kind of information executives find useful
These systems are designed
For top management;
Easy to use;
How they help
Present information in condensed view
Access organization‘s databases &
Data external to the organization
The typical information mix presented to the executive may include
Financial information
Work in process,
Data given to Inventory figures,
executives include Sales figures,
Market trends,
Industry statistics, &
Market price of the firm's shares.
It Includes
Input data-entry devices,
Hardware CPU,
Data Storage files &
Output Devices
It include
Text base software,
Database, &
Graphic types
Such as
Software
Time series charts,
Scatter diagrams,
Components
Electronic Use of a computer network that allows users to send, store and retrieve
Mail messages using terminals and storage devices.
Requires computers with an ability
To store audio messages digitally &
(M15 MTP2 - 4M)
Voice Mail
Convert them back upon retrieval
Video Use of television equipment to link geographically dispersed conference
Conferencing participants
Uses special equipment that can
FAX Read a document at one end of a communication channel &
Make a copy at the other end.
Uses Optical Character Recognition (OCR) to convert data on paper to a
Imaging
digital format for storage in a secondary storage device.
Desktop Uses a computer to prepare output that is very close in quality to that
Publishing produced by a typesetter.
&
Make available
Articulated, and Explicit knowledge is articulated, and represented as spoken words,
represented written material and compiled data
This type of knowledge is codified, easy to document, transfer and
Codified
reproduce
Examples Online tutorials, Policy and procedural manuals
Hasn‟t been Tacit knowledge, is resides in a few often-in just one person &
Tacit knowledge
1) Inventory control
2) ABC Analysis
3) Economic Order Quantity ( EOQ)
4) Just In Time ( JIT)
5) Material Requirement Planning ( MRP – 1 )
6) Manufacturing Resource Planning ( MRP – II)
7) Distribution Resource Planning
8) Enterprise Resource Planning
9) Money Resource Planning (MRP – III)
10) EIS – Web Enabled
Just-In-Time (JIT)
(PM )
JIT is a philosophy of continuous improvement in which non-value-adding activities
(or wastes) are identified and removed for the purposes of
Reducing cost
Non-value- Improving quality
adding activities Improving performance
Improving delivery
Adding flexibility
Increase innovativeness
Competitive When the jit principles are implemented successfully, significant competitive
advantages advantages are realized.
JIT principles can be applied to all parts of an organization:
Order taking,
Applicability of Purchasing, operations,
JIT Sales,
Distribution,
Accounting, etc.
Operational
service, etc.
CRM
Explain Human Resource Management Systems? Explain key integration points and benefits
(N15 MTP1 - 2M, M16 MTP1 - 4M)
A human resources management system (HRMS) is a software application
It coalesce many human resources functions, together with benefits of
Software Administration,
application Payroll,
Recruiting and training, &
Performance analysis and assessment into one parcel
HRMS or Human Resources Information System (HRIS) refers to the systems and
In other words processes at the intersection between Human Resource Management (HRM) and
Information Technology
HRMS uniquely provides indigenous integrations from hr management to other
Key integration
core talent management processes in order to support a holistic, end-to-end cloud
points
talent management strategy.
Bringing industry best practices to the HR functions
HRMS lets you asses and utilize the human resource potential completely.
The solution increases the operational efficiency and productivity of the HR
department
Benefits Reduces HR administrative costs
Increases employee engagement and satisfaction.
Improves leadership development and succession
Enhances data integrity within the enterprise
Enable to meet compliance and audit requirement
Business analysts,
People
Managers,
Chief financial officers &
Auditors etc
From different departments within a company to work together
Procedure These include both manual and automated methods for collecting, storing,
And retrieving and processing data
Instructions
It refers to the information relevant to the organization's business practices
That may include
Sales orders,
Customer billing statements,
Sales analysis reports,
Data
General ledger,
Inventory data,
Payroll information,
Tax information etc.
This data can be used to prepare accounting statements and reports
These are the computer programs that provide quality, reliability and security
Software To the company's financial data that may be stored, retrieved, processed and
analyzed.
This include hardware such as
Personal computers,
Servers,
Information Printers,
Technology Surge protectors,
Infrastructure Routers,
Storage media, &
Possibly a backup power supply
Used to operate the system
Internal Internal controls also protect against computer viruses, hackers and other
Controls internal and external threats to network security.
Define the term Artificial Intelligence? Write some commercial applications of AI?
(PM, N14- RTP, M15 MTP2-1M, M16 RTP)
Artificial intelligence (AI) is the vicinity of computer science focusing on creating
Vicinity of
machines
computer science
That can fit into place on behaviors that humans regard as intelligent
It is a research field that studies how to comprehend the intelligent human
Research field
behaviors on a computer.
The decisive objective of ai is to make a computer that can discover, sketch, and
Decisive objective
crack problems in parallel.
The subject of artificial intelligence spans a wide horizon dealing with various
kinds of
Subject of
Knowledge representation schemes,
artificial
Different techniques of intelligent search,
intelligence
Various methods for resolving uncertainty of data and knowledge,
Different schemes for automated machine learning and many others
Some of the purposes on which AI may be applied.
Expert systems,
Purpose of AI
Pattern Recognition,
Natural language processing, and many others
Intelligent work environment that will help you capture the ―why‖ as well as
the ―what‖ of engineered design and decision making
Decision
Intelligent human–computer interface (HCI) systems that can understand
Support
spoken language and gestures, and facilitate problem solving by supporting
organization wide collaborations to solve particular problems
Natural language technology to retrieve any sort of online information
Commercial Applications of AI
system used to match the case at hand with those previously entered in the
knowledge base.
Rule-based systems are created by storing data and decision rules as if-then
Rule-based rules
systems The system asks the user questions and applied the if-then rules to the
answers to draw conclusions and make recommendations.
Frame based systems organize all the information (data, description, rules
Frame based
etc.) About a topic into logical units called frames,
systems
Which are similar to linked records in data files
Rules are then established about how to assemble or inter-relate the frames to
(M16 - 2M)
meet the user‘s needs
What do you understand by the term “Business Intelligence”? Discuss some of the business intelligence
tools.
( PM Exercise )
Business Intelligence (BI), in simple words, refers to the process of
Collecting and refining information from many sources,
Meaning of
Analyzing and presenting the information in useful ways
Business
So that users can make better business decisions.
Intelligence
BI enables managers to see things with more clarity, and empowers them to peek into
the possible future.
Business Intelligence tools are a type of software that is designed to
Software
retrieve, analyze and report data
Business
Software Business Intelligence tools are software programs and features that are
Intelligence
programs used to complete detailed data analysis
tools
and
features
This involves using the data warehouse to get response to the query
Simple “Tell me what happened.”
Reporting The objective of a BI implementation is to turn operational data into
and meaningful knowledge.
Querying There are used to arrange information into a readable format and
distribute it to the people who need it
This involves using the data to get response to the query
―Tell me what happened and why.‖
Business analysis refers to presenting visualizing data in a multidimensional
Business
manner.
Analysis
ETL (Extract, Transform, and Load) tools
[BA]:
Bring in data from outside sources,
Transform it to meet business specified operational needs, &
Then load the results into the company database.
This involves using the information gathered from the data warehouse and
making it available to users as snapshots of many different things with the
Dashboards objective of getting response to the query
―Tell me a lot of things, but without too much effort‖.
(N14 MTP1 - Dashboards are flexible tools that can be bent into as many different shapes
Business Intelligence tools
Receive only Subjects receive only the rights and permissions assigned to those roles.
the rights and When an employee changes jobs, all previous access is removed, &
permissions The rights and permissions of the new role are assigned.
Static RBAC enforces static constraints based on a user‘s role.
constraints
Well suited for It is the best system for an organization that has high turnover
Governed by RAC takes into account the data affected, the identity attempting to perform a
business rules. task, and other triggers governed by business rules
Rules-based Access
Control (RAC)
Uses specific RAC uses specific rules that indicate what can and cannot happen between a
rules subject and an object.
A manager, for example, has the ability to approve his/her employees‘ hours
Example
worked
Dynamic Note that this is dynamic and occurs at the time a transaction is attempted.
RBAC This also sometimes called dynamic RBAC.
Gives the This is a fundamental principle of information security,
rights only Which refers to give only those privileges to a user account,
which are which are essential to that user's work
essential to
work
The principle of least privilege is widely recognized as an
Important
Principle of least important design consideration in enhancing the protection of data
design
privilege and functionality from any kind of compromises towards security.
consideration
Write about credit card. What are the steps involved in credit card transaction?
(PM, N14 MTP1 - 4M, M16 RTP)
In a credit card transaction, the consumer presents preliminary proof of his
Preliminary proof
ability to pay by presenting his credit card number to the merchant.
Verification of The merchant can verify this with the bank and create a purchase slip for the
credentials & consumer to endorse
Create a purchase slip
The merchant then uses this purchase slip to collect funds from the bank, &
On the next
Collect the funds
Billing cycle, the consumer receives a statement from the bank with a record of
the transaction.
This is the first step in processing a credit card.
Stage 1
After a merchant swipes the card, the data is submitted to merchant‘s bank,
Authorization
Four stages of processing Credit Card transactions
Define smart cards. Write about different types of smart cards available.
(PM, N15 RTP, N14 MTP2 - 1M, M15 MTP1 - 3M, M16 MTP1 - 1M)
Smart cards have an embedded microchip instead of magnetic strip
The chip contains all the information a magnetic strip contains
Smart cards
But offers the possibility of manipulating the data and executing applications on the
card.
Smart cards that need to insert into a reader in order to work,
Such as
Contact Cards
Types of smart cards
Confidentiality
Same;
BPA
False sense Automating poor processes will not gain better business practices.
of security
Explain How to go about BPA?
(or)
Discuss the steps involved in implementation of BPA?
(N14RTP, N15 MTP1 - 4M)
Define why we plan to The answer to this question will provide justification for
Step 1
implement a BPA implementing B.P.A
Understand the rules / It need to comply with applicable laws and regulations
Step 2 regulation under which for the organization
enterprise needs to comply with
Document the process, we wish All the documents that are currently being used need to
Step 3
to automate be documented.
Define the objectives/goals to be This enable the developers & users to understand the
Step 4 achieved by implementing BPA reasons for going B.P.A
The goal should be precise & clear
Engage the business process The entity need to appoint an expert who can implement
Step 5
consultant it for the entity
Calculate the ROI for project The answer to this question can be used for convincing
Step 6
the top management to say ― yes‖ to the B.P.A
Developing the BPA Once the top management grant their approval , then
Step 7
develop & implement B.P.A
Testing the BPA Before making the process live B.P.A solutions should
Step 8
be fully tested
Define the term Control? What are the major Control Objectives in Business Process Automation (BPA)?
(PM, N15 - 4M, N14RTP, N14 MTP1 - 4M)
Control is defined as
Policies,
Procedures,
Definition of Practices &
control Organization structure
That are designed to provide reasonable assurance that
Business objectives are achieved &
Undesired events are prevented or detected and corrected
Controls can be divided into two types
a) Managerial Controls :
The controls at this level provide a stable infrastructure in which IS can be
built, operated, and maintained on a day-to-day basis
Two types of
controls
b) Application Controls :
Application controls are the controls on the sequence of processing events
These controls cover all phases of data right from data origination to its final
disposal.
Ensures that all transactions are approved by responsible personnel
Authorization In accordance with their specific or general authority before the transaction is
recorded
Ensures that no valid transactions have been omitted from the accounting
Completeness
records.
Ensures that all valid transactions are accurate, consistent with the originating
Accuracy
transaction data, and information is recorded in a timely manner.
Major control objectives
Ensures that all recorded transactions fairly represent the economic events
that
Actually occurred,
Validity
Lawful in nature, &
Have been executed in accordance with management's general
authorization
Physical Ensures that access to physical assets and information systems are controlled
Safeguards and and properly restricted to authorized personnel
Security
Ensures that errors detected at any stage of processing receive prompts
Error Handling
corrective actions and are reported to the appropriate level of management
Ensures that duties are assigned to individuals in a manner that ensures that
Segregation of
no one individual can control both the recording function and processing a
Duties
transaction
Edit checks similar to the data validation controls can also be used at the
Edit Checks
processing stage to verify accuracy and completeness of data
It will ensure that data of previous transaction should not be mixed up with
Field Initialization next transaction
setting all values to zero before inserting the field or record.
Exception reports are generated to identify errors in data processed.
Exception Reports
Flow Controls In which the sender transmits a frame of data only when the receiver is
ready to accept the frame.
This involves two common protocols
Link Controls HDLC (Higher Level Data Control) &
SDLC (Synchronous Data Link Control)
A communication network topology specifies
The location of nodes within a network,
Topological The ways in which these nodes will be linked, &
Controls The data transmission capabilities of the links between the nodes.
Some of the four basic topologies include Bus, Ring, Star and Tree
Topology.
These techniques fall into two classes
Polling methods &
Contention methods
Polling methods :
Channel Access
Polling techniques establish an order in which a node can gain
Controls
access to channel capacity;
Contention methods :
Nodes in a network must compete with each other to gain access
to a channel.
Internetworking is the process of connecting two or more communication
Internetworking
networks together to allow the users of one network to communicate with
Controls
the users of other networks.
What do you mean by the term Virtualization? Explain Major applications of Virtualization?
(M15 – 2M, N15RTP, M15 MTP1 - 5M)
Creating logical It is the process of creating logical computing resources from available physical
computing resources resources
In computing,
Virtualization means to create a virtual version of a device or resource,
Such as
Virtual version A server,
Storage device,
Network or even an operating system
where the framework divides the resource into one or more execution
environments.
Technology to provide Virtualization refers to technologies designed to provide a layer of abstraction
a layer of abstraction between computer hardware systems and the software running on them.
The core concept of virtualization lies in partitioning,
Which divides a single physical server into multiple logical servers.
Core concept
Once the physical server is divided, each logical server can run an operating
system and applications independently.
Virtual machines are used to consolidate many physical servers into fewer
servers,
Which in turn host virtual machines
Server Consolidation
Each physical server is reflected as a virtual machine "guest" residing on a
virtual machine host system.
This is also known as ―Physical-to-Virtual‖ or 'P2V' transformation
Virtual machines can be used as "hot standby" environments for physical
Major applications
production servers,
Disaster Recovery i.e. Changes "backup-and-restore" philosophy, by providing backup
images that can "boot" into live virtual machines, capable of taking over
workload for a production server experiencing an outage.
Hardware virtualization can give root access to a virtual machine
Testing and Training This can be very useful such as in kernel development or operating system
environment.
Portable Portable applications are needed when running an application from a
Applications removable drive, without installing it on the system's main disk drive.
Recent technologies have used virtualization to create portable workspaces
Portable Workspaces
on devices like ipods and USB memory sticks
experiments
grid computing
Insurance An insurance company mines data from partner hospitals for fraud
company detection
Application An application service provider offloads excess load to a compute
service provider cycle provider
An enterprise configures internal & external resources to support e-
In an enterprise
business
Large-scale science and engineering are done through the
Interaction of people,
Science and Heterogeneous computing resources,
engineering Information systems and instruments,
All of which are geographically and organizationally
distributed.
What are the reasons of using Grid Computing? (or) Briefly explain grid computing benefits?
(M15 MTP1 - 3M, M16 MTP2 - 4M)
Grid computing provides a framework for exploiting these underutilized
Making use of
resources &
Underutilized
Thus has the possibility of substantially increasing the efficiency of resource
Resources
usage
This feature of grid computing handles occasional peak loads of activity in
Resource balancing
parts of a larger organization
A cpu-intensive grid application can be thought of as many smaller subjobs,
Parallel cpu capacity
each executing on a different machine in the grid
The users of the grid can be organized dynamically into a number of virtual
Virtual resources and
organizations, each with different policy requirements.
virtual organizations
These virtual organizations can share their resources, collectively as a larger
for collaboration
grid
In addition to CPU and storage resources,
Access to additional
A grid can provide access to other resources such as bandwidth to perform a
resources
complex task
The machines also use duplicate processors in such a way that when they fail,
Reliability
one can be replaced without turning the other off.
The goal to virtualize the resources on the grid and more uniformly handle
Management heterogeneous systems create new opportunities to better manage a larger, more
distributed IT infrastructure.
Discuss the constraints that need to be taken into consideration while developing a secured Grid
Architecture?
(PM, M16 - 4M, M16 MTP1 - 2M)
A user should authenticate once and they should be able to acquire resources,
Single Sign-on use them, and release them and to communicate internally without any further
authentication.
Protection of User passwords, private keys, etc. should be protected
Credentials
Interoperability with Access to local resources should have local security policy at a local level
local security solutions
The code should be exportable
Exportability i.e. they cannot use a large amount of encryption at a time.
There should be a minimum communication at a time
In a communication there are number of processes which coordinate their
Support for secure
activities.
group communication
This coordination must be secure and for this there is no such security policy
Support for multiple There should be a security policy which should provide security to multiple
implementations sources based on public and private key cryptography.
What is meant by Cloud Computing?
(N14 – 4M, M14RTP, N15RTP)
A cloud is a collection of
Servers,
Applications,
Databases,
Collection Documents,
Agreements,
Spreadsheets,
Storage capacity etc
Which allows organizations to share these resources from anywhere.
Cloud Computing is the use of various services, such as
Software development platforms,
Servers,
Use of services
Storage, &
Software,
Over the Internet, often referred to as the "cloud."
The best example of cloud computing is Google Apps
Examples Where any application can be accessed using a browser and it can be deployed on
thousands of computer through the Internet.
The common cloud computing service models are
Cloud computing Software as a service (saas),
service models Platform as a service (paas) &
Infrastructure as a service (iaas).
In cloud computing,
The back end is cloud itself which may encompass
Back end
Various computer machines,
Data storage systems and servers.
Groups of these clouds make a whole cloud computing system.
There are some set of rules, generally called as Protocols which are followed
Protocols
by this server.
Middleware that allow computers that are connected on networks to
Middleware
communicate with each other.
Storage
Backup and Since all the data is stored in the cloud, backing up and restoring is
Recovery relatively much easier than storing the same on a physical device.
Automatic In the cloud, software integration is usually something that occurs
Software automatically
Integration
Quick The entire system can be fully functional in a matter of a few minutes.
Deployment
Technical Issues This technology is always prone to outages and other technical issues
Disadvantages
Differentiate between manual information processing cycle and computerized information processing
cycle?
(PM, M16 MTP1 - 4M)
Manual Information Processing Cycle Computerized Information Processing Cycle
Systems where the level of manual Systems where computers are used at every
intervention is very high. stage of transaction processing &
For example human intervention is minimal.
Evaluation of exam papers,
Teaching &
operations in operation theatres
Include following components: Include following components:
Input: Put details in register. Input: Entering data into the computer;
Process
From a business perspective, a process is a
Coordinated and standardized flow of activities
(N14 RTP,
Performed by people or machines,
M15 MTP1 -
Which can traverse functional or departmental boundaries
1M )
To achieve a business objective &
Creates value for internal or external customers.
BPM is defined as
―The achievement of an organization‘s objectives through the improvement,
Business management and control of essential business processes‖.
Process
Management
BPM = process and organization (including people) as well as Technology
Trial Balance
prepared
Adjustments Appropriate adjustment entries are passed
Adjusted Trial The trial balance is finalized post adjustments
balance
Closing entries Appropriate entries are passed to transfer accounts to financial statements
Financial The accounts are organized into the financial statements
statement
Pick release The items are moved from the warehouse to the staging area
Shipping The items are loaded onto the carrier for transport to the customer
Invoice Invoice of the transaction is generated and sent to the customer
Receipt Money is received from the customer against the invoices
Reconciliation The bank reconciliation of all the receipts is performed
It involves activities of selling goods or services and collecting payment for sales
Revenue cycle
Source document Function
Sales order Record customer order
Delivery ticket Record delivery to customer
Remittance advice Receive cash
Deposit slip Record amounts deposited
Support adjustments to customer
Credit memo
accounts
It includes transactions surrounding the recognition of expenditures
Involving accounts like
Purchases,
Accounts payable,
Cash disbursements,
Inventory &
General ledger.
Expenditure
cycle
It involves activities of buying and paying for goods or services used by the
organization.
(M16RTP)
Source document Function
Purchase requisition Request that purchasing department order
goods
Purchase order Request goods from vendors
Receiving report Record receipt of merchandise.
Check Pay for items.
It involves activities of hiring and paying employees
This consists of following basic steps with alerts, controls and feedback at each step:
Involves the activities like
Capturing the data,
Implementing control procedures,
Data input
Recording in journals,
Data
Posting to ledgers &
processing
Preparation of reports.
cycle
Involves organizing the data in master file or reference file of an
Data storage
automated system for easy and efficient access.
(N15RTP,
Data Involves addition, deletion and updating of the data in the
M16 RTP)
processing transaction file, master file or reference file
Involves generation of documents and managerial reports in
Information printable or electronic form for addressing queries,
output To control operational activities and help the management in
decision making.
What is meant by Accounting Information System? Explain the Basic Functions of AIS?
(M15 MTP2 - 1M)
Accounting An accounting information system is defined as a system of collection, storage
information and processing of financial and accounting data that is used by decision makers.
system
Collect and store data about organization‘s business activities and
Basic Functions of an Accounting Information System
Explain Classification of Business Processes and mention different levels in business process
management.
(M15 MTP2 - 3M, N15 MTP1 - 4M)
Business processes are pervasive in any organization and represent all
Business processes
activities that an organization undertakes.
Business processes are broadly classified into two categories
2 categories Organizational Business Processes
Operational‘ Business Processes
Here, the strategy of the company is specified,
Business strategy Which describes its long term concepts to develop a sustainable
competitive advantage in the market.
Here, the business strategy is broken down to operational goals.
Goals
These goals can be organized, and can be divided into a set of sub-goals.
Levels of business process
Using statistical methods and graphical displays, possible causes of process output
variations are identified.
Analyze
These possible causes are analyzed statistically to determine root cause of
variation.
Solution alternatives are generated to fix the root cause.
The most appropriate solution is identified using solution prioritization matrix and
validated using pilot testing.
Improve
Cost and benefit analysis is performed to validate the financial benefit of the
solution.
Implementation plan is drafted and executed.
Process is standardized and documented.
Before and after analysis is performed on the new process to validate expected
Control
results, monitoring system is implemented to ensure process is performing as
designed.
Write about Total Quality Management? (or) Write about PDCA cycle?
(M15 - RTP, N14 MTP1-1M, M15 MTP2 - 2M, M16 MTP2 - 2M)
High-quality It is the organization-wide effort to install and make permanent a climate
products and In which it continuously improves its ability to deliver high-quality products
services and services to customers.
Total quality management (TQM) is a comprehensive and structured approach
to
Comprehensive and
Organizational management
structured approach
That seeks to improve the quality of products and services through ongoing
refinements in response to continuous feedback
TQM can be applied to any type of organization;
Including
Apply to any type of Schools,
org. Highway maintenance,
Hotel management, &
Churches.
In the planning phase,
Plan People define the problem to be addressed, collect relevant data, and ascertain
TQM processes are divided into four sequential
Check
People confirm the results through before-and-after data comparison;
categories
open a savings account, most probably he must visit three different desks in order to be serviced.
When BPR is applied to an organization, the customer communicates with only one person, called
"case manager", for all three inquiries.
Under BPR, while the loan application team processes the loan application, the case manager
"triggers" the account team to open a savings account and the ATM team to supply the customer
with an ATM card.
The customer leaves the bank having a response for his loan application, a new savings account
and an ATM card, and all these without having to move around the desks for signatures and
documents
All the customer's requests were satisfied at the same time in parallel motion
It means to achieve 80% or 90% reduction (in say, delivery time, work in
Dramatic progress or rejection rate) & and not just 5%, 10% reduction
achievement This is possible only by making major improvements and breakthroughs, and
important key words in BPR
Describe the Key factors to consider in implementing BPM? (N14-4M, N15 MTP2-5M)
What is Value Chain Automation? List out Six business functions of the value chain?
(N14 RTP, N14 MTP2 - 4M, M15 MTP1 - 1M, M16 MTP1 - 3M)
Value chain refers to separate activities which are necessary to strengthen an
Separate activities organization's strategies and are linked together both inside and outside the
organization.
It is defined as a chain of activities that a firm operating in a specific industry
It define as
performs in order to deliver a valuable product or service for the market.
Process view of The idea of the value chain is based on the process view of organizations
organizations
Primary and Value chain of a manufacturing organization comprises of Primary and
Supportive ac Supportive activities
The primary ones are inclusive of
Inbound logistics,
Primary activities Operations,
includes Outbound logistics,
Marketing and sales, &
Services.
The supportive activities relate to
Supportive Procurement,
activities related Human resource management,
to Technology development
Infrastructure
Six business functions of the value chain are as follows
Research and development
Design of products, services, or processes
Six business
Production
functions
Marketing and sales
Distribution
Customer service
Value Chain Analysis is a useful tool for working out how we can create the
Value to customer
greatest possible value for our customers
Explain the Impact of IT on BPM?
(or)
Explain about BPM Systems or suites (BPMS)?
process centric IT BPM Systems or suites (BPMS) are a new class of software that allows
solutions enterprises to set up process centric IT solutions
Process-centric‟ ‗Process-centric‘ means BPM solutions are able to integrate people, systems
means and data
Organizations that utilize BPM systems to accomplish IT enabled business process change, gain
from the following capabilities
Closer business involvement in designing IT enabled business
Benefits from using BPM
Closer business
involvement processes,
integrate people Ability to integrate people and systems that participate in business
and systems processes,
simulate business Ability to simulate business processes to design the most optimal
processes processes for implementation
monitor, control, Ability to monitor, control, and improve business processes in real time
and improve
Change in business Ability to effect change on existing business processes in real time
process without an elaborate process conversion effort.
Training users
instructions that help to train users better.
Designing new Documentation helps to system designers to develop new systems. Well-
systems written documentation plays key roles in reducing errors.
Controlling system Good documentation helps system designers to develop modular,
development and reusable code that further avoids writing duplicate programs.
maintenance costs
Standardized tools such as
Standardizing E-R Diagrams,
communications with System Flowcharts, &
others DFDS
Are useful to communicate with one another about systems.
Auditing Information Documentation helps auditors determine the strengths and weaknesses of
Systems a system‘s controls.
Documenting business Documentation helps managers better understand how their businesses
processes controls are involved or missing, and how to improve them.
Some of the popular pictorial representation or techniques which may be
adopted for mapping business processes used are.
Popular pictorial Entity Relationship Diagrams
representation or Data Flow Diagrams
techniques Flowcharts
Decision Tables
Decision Trees
(RTP-N15)
Write about Data Flow Diagrams and Describe the components of DFD?
(M15 RTP, N15 MTP2-2M, M16 RTP, M16- 4M)
Graphical Data flow diagram (DFD) is a graphical representation of the flow of data
representation through an information system
It shows the technical or business processes with the help of
Technical or business The external data stored,
processes The data flowing from a process to another, &
Produce results.
These are partitioned into levels that represent
Partitioned into levels Increasing information flow &
Functional detail.
It provides a mechanism for functional modeling as well as information flow
Mechanism
modeling.
A logical DFD focuses on the business and how the
Logical data business operates.
flow It describes the business events that take place and the
Diagram data required and produced by each event.
Two types of DFDS
The logical model reflects the business.
Physical data A physical dfd shows how the system will be
flow implemented.
Diagram The physical model depicts the system.
An entity is the source or destination of data
The source in a DFD represents these entities that are outside the context of
Entity
the system.
Entities either provide
(N14 MTP1 -
Data to the system (referred to as a source) or
1M, M16 MTP2 -
Receive data from it (referred to as a sink).
1M)
Entities are often represented as rectangles
Entities are also referred to as agents, terminators, or source/sink.
The process is the manipulation or work that
Transforms data,
Performing computations,
Making decisions (logic flow), or
Directing data flows based on business rules.
Process
In other words, a process receives input and generates some output.
Processes can be drawn as circles or a segmented rectangle on a DFD, &
Major components of DFD
Includes a
Process name &
Process number
A data store is where a process stores data between processes for later
retrieval by that same process or another one.
Data store
Files and tables are considered data stores
Data stores are usually drawn as a rectangle with the right hand side missing
(N14 RTP)
and labeled by the name of the data storage area it represents, though different
notations do exist.
Data flow is the movement of data between
The entity,
Data flow
The process &
The data store
(N14 RTP, N15
Data flow represents the interface between the components of the DFD.
MTP2-2M)
Data flow is represented by an arrow, where the arrow is annotated with the
data name.
Symbols used in
DFD
What are the advantages and limitations of Data flow diagrams?
(M15RTP)
It aids in describing the boundaries of the system
It is beneficial for communicating existing system knowledge to the users.
Easy to recognize
Advantages Provide a detailed representation of system components
It is used as the part of system documentation file.
Easier to understand by technical and nontechnical audiences
It supports the logic behind the data flow within the system.
It make the programmers little confusing concerning the system.
Takes long time to create, so the analyst may not receive support from management
Limitations
to complete it.
Physical considerations are left out.
2. Input / Output
6. Decision Box
FLOWCHART
SYMBOLS
3. Process
7. Print
4. Connectors
8. Display
This flowchart traces the physical flow of documents through an
Document organization
Flowchart I.e. The flow of documents from the departments, groups, or individuals
who first created them to their final destinations.
Types of flow charts
This typically depicts the electronic flow of data and processing steps in an
Information System.
System Where
Flowchart While Document Flowcharts focus on tangible documents,
System flowchart concentrates on the computerized data flows of
Information systems.
It is most detailed and is concerned with the logical/arithmetic operations on
Program
data within the CPU and the flow of data betwee the CPU on the one hand
Flowchart
and the input/output peripherals on the other.
Reproduction
cannot be typed.
Link between Sometimes it becomes difficult to establish the linkage between various
conditions and conditions and the actions.
actions
No One single problem can be solved in multiple ways. Hence no
standardization standardization
Diagram
Four parts
Condition stub Condition entries
Action stub Action entries
Condition stub Lists the comparisons or conditions
Lists in its various columns the possible permutations of answer to the questions
Condition entries
in the conditions stub.
Action stub Lists the actions to be taken along the various program branches
Lists in its columns corresponding to the condition entries the actions contingent
Action entries
upon the set of answers to questions of that column.
Explain the advantages and limitations of Decision tables?
( PM Exercise )
Easy to Draw Decision Tables are easy to draw and modify as compared to flowcharts.
Compact The documentation in the form of decision tables is compact since one
Documentation decision table may replace few pages of a flowchart
It is easier to follow a particular path in one column of a decision table than it
Simplicity
Is to go through several pages of the flowcharts
Advantages
Not so better as Flowcharts can better represent a simple logic of the system rather than a
flowcharts decision table.
Do not express The decision tables do not express the total sequence of the events needed to
the total solve the problem
sequence
Flow chart presents steps to complete a DFD presents the flow of data
process
Flow charts do not have any input from DFD describes the path of data from an external
or output to an external source. source to internal source or vice versa.
The timing and sequence of the process is Whether processing of data is taking place in a
aptly shown by a flow chart. particular order or several processes are taking
place simultaneously is described by a DFD.
Flow chart shows how to make a system DFD define the functionality of a system.
function.
Flow chart is used in designing a process DFD are used to describe the path of data that will
complete that process
Types of Flow charts - System, Data, Types of DFD–physical data flow and logical
Document and Program. dataflow.