Professional Documents
Culture Documents
Assignment ON: Management Information System
Assignment ON: Management Information System
ON
MANAGEMENT INFORMATION
SYSTEM
SUBMITTED BY
NEENA N TOMY
B2370
MBA B
1)List the popular RDBMS used in Google cloud?
Different storage and database solutions requires different
applications and workloads. By providing a unified offering across
the availability spectrum, which includes from live data tapped by
today’s most demanding applications, Google Cloud redefines what
the industry can expect from the online storage.
The various RDBMS used in Google are listed below :
AWS Aurora. © AWS. Aurora is Amazon Web Service's (AWS) own
relational database, which is built to be used in the cloud. ...
AWS RDS. © AWS. ...
Snowflake Computing. © Snowflake Computing. ...
Oracle Database Cloud Service. © Oracle. ...
Microsoft SQL Server. © Microsoft. ...
MySQL. © MySQL. ...
MariaDB. © MariaDB. ...
PostgreSQL. © PostgreSQL.
2) What is Bitcoin?
Bitcoin is a form of electronic cash or cryptocurrency. It can be sent
from user to user on the peer-to-peer bitcoin network without the need
for the intermediaries. It is a decentralised digital currency. The
transactions are verified by the network nodes through cryptography
and recorded in a public distributed ledger called a blockchain.
Bitcoin can be exchanged for other currencies, products and services.
Due to its high electricity consumption, price volatility it has been
criticized for its use in illegal transactions. Although several
regulatory agencies have issued investor alerts about bitcoin, it is used
as an investment. The bitcoin transactions are been recorded by the
bitcoin blockchain which is a public ledger. A fourth like scripting
language is used to record the transactions. The transactions usually
consist of one or more inputs or one or more outputs. The bitcoins are
registered to the bitcoin addresses.
5)What is CERT -in? What is its role in cyber security?
CERT- in is the national nodal agency for responding to the computer
security incidents as and when they occur. In the recent Information
Technology Amendment Act 2008, CERT- in has been designated to
perform the following functions in the area of cyber security:
Collection, analysis, dissemination of information on cyber
incidents.
Forecast and alerts of cyber security incidents.
Emergency measures for handling cyber security incidents.
Coordination of cyber incident response activities.
Issue guidelines, advisories, vulnerability notes, and
whitepapers relating to information security practises,
procedures, prevention, response and reporting of cyber
incidents.
Surge in crypto mining activities through Mikrotik router.