Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

ASSIGNMENT

ON
MANAGEMENT INFORMATION
SYSTEM

SUBMITTED BY

NEENA N TOMY
B2370
MBA B
1)List the popular RDBMS used in Google cloud?
Different storage and database solutions requires different
applications and workloads. By providing a unified offering across
the availability spectrum, which includes from live data tapped by
today’s most demanding applications, Google Cloud redefines what
the industry can expect from the online storage.
The various RDBMS used in Google are listed below :
 AWS Aurora. © AWS. Aurora is Amazon Web Service's (AWS) own
relational database, which is built to be used in the cloud. ...
 AWS RDS. © AWS. ...
 Snowflake Computing. © Snowflake Computing. ...
 Oracle Database Cloud Service. © Oracle. ...
 Microsoft SQL Server. © Microsoft. ...
 MySQL. © MySQL. ...
 MariaDB. © MariaDB. ...
 PostgreSQL. © PostgreSQL.

1) Explain the term “Dark web”?


The dark web is the World Wide Web content that exists on darknets,
overlay networks that uses the internet but require specific software,
configurations, or authorization to access. Dark web is also referred to
as the deep web. The dark web is not only used by the people who are
having a criminal background, but also created and used by the people
who require privacy for legal reasons, such as exchange of business
information. In this situation the information may be exchanged
through an encrypted peer to peer network connection or by an
overlay network connection such as Tor. The law enforcement
agencies in six countries plus Europol has led to the shut down of two
of the largest dark webs in July 2017.
3)What is NIXI what is its role in Indian ICT infrastructure?
National Internet Exchange of India is a government non- profit
company which was established in 2003 to provide neutral internet
exchange point services. To become the meeting point of the internet
service providers in India, it was established under section 8 of the
Companies Act 2013, with the Internet Service Providers
Association of India. Rather than using the servers in the United
States or elsewhere, it focuses mainly in handing over of domestic
internet traffic between the peering ISP members. This enables more
efficient use of international bandwidth and saves foreign exchange.
By avoiding multiple international hopes and thus by lowering
delays, it improves the quality of services for the customers of
member ISPs. Since December 2012, NIXI also manages the
National Internet Registry of the country delegation Internet Protocol
addresses (IPv4 and IPv6) and Autonomous System numbers to its
Affiliates.

2) What is Bitcoin?
Bitcoin is a form of electronic cash or cryptocurrency. It can be sent
from user to user on the peer-to-peer bitcoin network without the need
for the intermediaries. It is a decentralised digital currency. The
transactions are verified by the network nodes through cryptography
and recorded in a public distributed ledger called a blockchain.
Bitcoin can be exchanged for other currencies, products and services.
Due to its high electricity consumption, price volatility it has been
criticized for its use in illegal transactions. Although several
regulatory agencies have issued investor alerts about bitcoin, it is used
as an investment. The bitcoin transactions are been recorded by the
bitcoin blockchain which is a public ledger. A fourth like scripting
language is used to record the transactions. The transactions usually
consist of one or more inputs or one or more outputs. The bitcoins are
registered to the bitcoin addresses.
5)What is CERT -in? What is its role in cyber security?
CERT- in is the national nodal agency for responding to the computer
security incidents as and when they occur. In the recent Information
Technology Amendment Act 2008, CERT- in has been designated to
perform the following functions in the area of cyber security:
 Collection, analysis, dissemination of information on cyber
incidents.
 Forecast and alerts of cyber security incidents.
 Emergency measures for handling cyber security incidents.
 Coordination of cyber incident response activities.
 Issue guidelines, advisories, vulnerability notes, and
whitepapers relating to information security practises,
procedures, prevention, response and reporting of cyber
incidents.
 Surge in crypto mining activities through Mikrotik router.

You might also like