Memory Techniques: CHP 1: Automated Business Process

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

MEMORY TECHNIQUES

CHP 1: AUTOMATED BUSINESS PROCESS


SR.NO CONCEPTS MEMORY TECHNIQUES EXPLAINATION

1 Categories of OSM (Awesome) O = Operational


Business Process S = Supporting
M = Management

2 Objectives of CIAT C = Confidentiality


BPA/ Factors I = Integrity
affecting BPA A = Availability
T = Timeliness

3 Benefits of BPA Q Time-Time pe tum Q = Quality & Consistency


meri Visibility, Efficiency aur Cost ko T = Time- Saving
badhati ho, isliye tum Reliable ho. T = Reduced turnaround Time
V = Visibility
E = Improved Efficiency
C = Reduced Cost
R = Governance & Reliability

4 Risks & Controls Master UR Unauthorised IPCC PLR M = Master


U = Update
R = Recorded (Not Recorded)
U = Unauthorised
I = Invalid
P = Period
C = Calculation
C = Change
P = Process
L = Law
R = Record (Wrongly
Recorded)

5 Technological Risk OM CA Vendor ko SOD kyuki uski O-Obsolescence of technology


body me Intentional threats hai M-Multiplicity Of Systems
isliye vo Social Governance ko C-Controls
Continuously Fail kr rha h A-Alignment
SOD-Segregation Of Duties
Vendor-(v), (vi)
Intentional-(ix)
Threats-(viii)
Social –(x)
Governance-(xi)
Continuously-(xii)
Fail-(xiii)
6 Applying IT PASTA MCCD me BIS rupees me P-Information security Policy
controls- A-Administration, Access and
(a) Information Authentication
technology S- Seperation of key IT functions
general controls T-User Training
A-Management of Systems
Acquisition
M-Monitoring of Applications
C- Change Management
C-Confidentiality of data files
D-Proper Development
B-Backup, recovery and Business
continuity
I-Incident response
S-Service level agreements
7 Limitations of Employee ka Management krne me
Internal Control Unusual Cost lgti h
system
CHP 2: FINANCIAL AND ACCOUNTING & SYSTEMS
SR.NO CONCEPTS MEMORY TECHNIQUES EXPLAINATION

1 Advantages of ERP Q ILS college mai PC CS mai Q= Reduced Quality cost


Systems DT aur FR paadh rahi thi I = Information integration
L = Reduction of Lead time
S = Ontime Shipment
P = Better analysis & Planning
capabilities
C = Reduction in Cycle time
C = Better Customer satisfaction
S = Improved Supplier performance
D = Improved information accuracy &
Decision-making capability
T = Use of latest Technology
F = Increased Flexibility
R = Improved Resource utilization

2 Type of Access CAVP C = Create


(RBAC) A = Alter
V = View
P = Print
3 Customer CRRMM C = Better internal Communication
Relationship R = Improved customer Relations
Management (CRM) R = Increase customer Revenues
M= Optimize Marketing
M= Maximize up-selling & cross-selling
4 Types of information STAR S = Structured
in an MIS Report T = Timely
A = Accurate
R = Relevant
5 Important features DSLR D = Clear Definitions
of XBRL S = Strong Software support
L = Multi-Lingual support
R = Testable business Rules
6 Benefits of Business Optimize Decision making 1)Optimizing internal business
Intelligence will give an Advantage of processes
Efficiency & Revenue 2)Accelerating & improving Decision
making
3)Gaining competitive Advantage over
business rivals
4)Increasing operational Efficiency
5)Driving new Revenues
CHP 3: INFORMATION SYSTEM & ITS COMPONENTS
SR.NO CONCEPTS MEMORY TECHNIQUES EXPLAINATION

1 Benefits Of MODI Distribute nature of Information


Networking Computational power
Communication User communication
System Resource sharing
Reliability
2 Value Of RTO R - Restructuring
Networking business relationship
T - Time compression O -
Overcoming geographic
dispersion

3 Controls For Lock Log Pim Others Lock = Lock on Others


Physical Log = Logging on Facilities
Exposures Pim = Physical
Identification Mgmt

4 Technical Worm Ne Ghode Pe Bithakr Worm = Worm


Exposures Round Round Karke Round = Round Down
Christmas Data Christmas = Christmas Card
Ke Upar Bomb Fek Ke Data = Data Diddling
Darwaje Ko Bomb = Bomb
Spoof Salami Di Darwaja = Door
Spoof = Spoofing
Salami = Salami Technique
5 User Access U = User Registration
Management URUP R = Review of User Access
U = User Password
P = Privilege Management
6 Disadvantages CM C = Development Is Costly
Of Application M = Infection from Malware
Software

7 Benefits Of UUV U = User Needs


Application U = Update
Software V = Less Threats from Virus

8 Objectives Of EEIS E= Efficiency


Information E = Effectiveness
System I = Integrity
Auditing S= Safeguarding

9 Audit Trail DRP D=Detecting unauthorized access


Objectives R= Reconstructing events
P = Personal accountability

10 Advantages of In ICU Independent, Shared Reductant, I = Integrity can be maintained


DBMS Fast Security is required C= Program & file Consistency
U = User friendly
Independent = Achieving
program / data independently
Shared = Permitting data
sharing
Reductant = Minimizing data
Redundancy
Fast = Faster application
development
Security = Improved Security

11 Disadvantages of CS C = Cost
DBMS S = Security

12 Asynchronus Piggy ne Data ko Wire se Piggy=Piggybacking


Attack Lapeta aur Sas maar gayi Data = Data leakage
Wire = Wire tapping
Sas = Subversive attack

13 Value / Impacts of GRT G = Overcoming Geographical


Network dispersion
R = Restructuring business
Relationship
T = Time compression

14 Some Logical attack 33SP Firewall


1) Network Encryption
Access control Call back device
Enforced path
Segregation of network
Network connection /Routing
Security
Policy

15 Application Access CLAIM C = Clock synchronization


control L = Event logging
A = Information Access
restriction
I = System Isolation
M = Monitor System

16 OS Access control 3 3 3 Time, Access, PUT Terminal Time out


Limitation of time connection
Duress alarm
Terminal log-in procedure
Access token
Access control
Discretionary Access
Password mgmt
User ID
System Utility
Terminal Identification
17 Application control S= Source Data
1 Input Control D= Data Coding
Ba = Batch
SDBaVa
Va = Validation
18 2)Database/
Storage

Major Update
All Sequence Suspense All = All record is processed
Control

19 Major Report SSR Sequence = Sequence check between


Control trns and master file Suspense =
Maintain Suspense a/c

S = Print Suspense a/c


S = Standing Data
R = Recovery Data

20 3)Output Control Pool mai 2 Log aur 2 Printer aye aur Pool = Spooling
control nhi kar paye Log = Logging of Output program
Log = Logging of sensitive form
Printer = Control over printer
Printer = Report distribution
Control = Retention control

21 Managerial
Control

1)Operating
Computer Computer = Computer
Control Network – Capacity-Help–Outsource-File Operation
- Prod
Network = Network Operation
Data Doc
Data = Data Preparation
Capacity = Capacity Planning
Help = Help desk
Outsource = Mgmt of Outsource
Operation
File = File Library
Doc = Documentation
Prod = Production control
CHP 4: COMMERCE, M- COMMERCE & EMERGING TECHNOLOGIES
SR.NO CONCEPTS MEMORY TECHNIQUES EXPLAINATION

1 Components of Ecommerce U and We U- User


are Very Important Person who are W- Web portal
using V- ecommerce Vendors
Technology I- Internet
P- Payment gateway
T- Technology infrastructure
2 Advantages of Three tier CCD C- Clear separation
C- Change management
D- Dynamic load balancing
3 Disadvantages of Three Tier TIM T- Traffic management
I- Immature and complex M-
Maintenance tools are
currently inadequate
4 Advantages of digital Competitive environment me aage Competitive advantage to
payments jane ke liye business
RREAD Krna jaruri hai Environment friendly
R- Written Record
R- Less Risk
E- Easy and convenient
A- Pay and send money from
Anywhere
D- Discount from taxes
5 Drawbacks of digital CID-NOT C- Increased business Costs
payments I- Necessity of Internet access
D- Disputed transactions N-
Difficult for Nontechnical
person
O- Overspending
T- Risk of data Theft
6 Types of Virtualizations HSN H- Hardware
S- Software
N- Network

7 Private, Public, Hybrid and Humari SAS kaisi ho, CA CS jaisi ho S- Scalability
community: characteristics, A- Availability
limitations S- Security
And advantages C- Costs
A- Administration
C- Control
S- SLA
8 Benefits of Grid computing U R Parallel and U- Underutilized resources
Virtual Resource that is why I rely on R- Resources balancing
your Management Parallel- Parallel CPU capacity
Virtual- Virtual resource and
Virtual organizations
Resource -Access to additional
Resources
Management- Management
9 Characteristics of Cloud If I Increase the Network rent and Workload-
computing Scalable Workload of Silent Workload movement
Tenant Silent- Resiliency
they will Pay OnDemand Tenant- Multi Tenancy
Pay- Pay per use
Demand- On Demand
Scalable – Elasticity & Scalability
Network – Wide range of Network
access capacities
10 Advantages of Cloud A) Backup Load can be Backup- Backup and recovery
computing Easily Accessible because of Load- Load balancing Easily
Flexibility and Maintenance - Easy access to
B) Globally, there is Streamlined information
Capital spending on Flexibility - Improved Flexibility
Economies that’s why it is Maintenance - Minimize
Easy Accessed and maintenance
Monitored Globally- Globalize workforce
Streamlined - Streamline
business processes
Capital - Reduce Capital costs
Spending- Reduce spending on
technology infrastructure
Economies- Archive Economies
of scale
Accessed - Pervasive
accessibility
Monitored - Monitor projects
effectively
11 Drawbacks of Cloud IISCA I- Internet connection
computing S- Security
C- Control A-
Application
I – Interoperability
12 Components of mobile HSC H- Hardware
computing S- Software
C- Communication

13 Application area of Sev Puri Daal Taadka Sev – Server consolidation


virtualization Puri – Portable Application
Portable Workspace
Daal- Disaster recovery
Taadka – Testing & training
14 Components of Mobile HSC H- Mobile Hardware
Computing S – Mobile Software
C – Mobile Communication
15 Benefits of Mobile HUL ke Customer ko HUL – Remote access to work
Computing COVID ho gaya order details
Customer – Improve services
offered to its customer
COVID -Work from anywhere
-Reduce travelling time
-Work Efficiently
-Mgmt Effectiveness
17 Risks of IOT TERM T- Technology risk
E- Environmental risk
R- Risk for user of products
(security, privacy and
intentional obsolescence)
M- Risk to product
Manufacturer
18 Risks of Artificial SSD S - Security
intelligence S - Human Skills D
- Data
19 Limitations of mobile HI SP HI H- Human interface
computing I- Insufficient bandwidth
S-Security standards
P- Power consumption
H- Health hazards
I-Transmission Interference
20 Best practices of Green PPPER P-Developing suitable Plan
computing P-Reduce Paper consumption
P- Environmentally sound
Purchases
E-Conserve Energy
R-Recycle
21 Advantages of BYOD Happy Employees can Reduce Cost Happy Employees -
Increase efficiency by Happy employees Reduce
Adopting New Technology - Reduce support
requirements
Cost- Lower IT budgets
Efficiency - Increased
employment efficiency
Adopting new technology -
Early adoption of new
technology
22 Threats of BYOD INDIA I- Implementation risk
N- Network risk
D- Device risk
A- Application risk

You might also like