Documente Academic
Documente Profesional
Documente Cultură
Chapter 2
Q.1What is cloud computing Architectural considerations ?
• Front End
• Back End
• Mobile communication
• Mobile hard ware
• Mobile software
• Security
• Dangers of misrepresentation
• Power consumption
• Potential health hazards
• Application suite
• Enterprise software
• Enterprise infrastructure software
• Information worker software
• Content access software
• Educational software
• Media development software
• Development is costly
• Infection from malware
• Mainframe computers
• Oldest methods
• Pyramid fashion
• Higher level records and lower level record
• Family tree as parents
• Root record
• A parent record may have more than one child record linked to it
• Top down
• Rapid updating
• Lack of linkage
• Rigidity
• Hierarchical structure
• Upside down tree (interconnected network of records)
• Children are called members and parents are called owners
• Unlike hierarchical in network structure
• Network database are principally used on mainframe computers
• More flexible
• Predefined
• Limit to the number of connections
Q. 28 OOD of Advantages
• Costly
• Resistance to change
Q. 30 Advantage of a DBMS?
Q. 31 Disadvantages of DBMS?
• Cost
• Security
Q34 What are the reason for the all-pervasive use of IT for business?
A) Communication Capabilities
B) Data and Information Management
C) Automated Processes
Q35 What are the different security process and procedures for data and Information
Management?
• Authentications and passwords
• Encryption of data to prevent unauthorized use
• Tracking lost devices
Q42 What are the main functions of CPU is to execute programs stored in memory?
• Control Unit(CU)
• Arithmetic and Logic Unit(ALU)
• Registers
Q47 What are the phases of developing information system life cycle?
Phase 1 : System Investigation
• Feasibility Study
• Technical Feasibility
• Economic Feasibility
• Legal Feasibility
• Operational Feasibility
• Schedule Feasibility
Phase 2 : System Analysis
• Interviewing Staff
• Examine current business
• Sending out questionnaires
• Observation of current procedures
Phase 3 : System Designing
• Hardware Platform
• Software
• Outputs
• Inputs
• User Interface
• Modular design
• Test Plan
• Conversion Plan
• Documentation
Phase 4 : System Implementation
• Installation
• Conversion
1) Bluetooth
• A wireless technology having short distance coverage i.e. of 50 metres [164 feet].
• Used by both fixed as well as mobile devices.
• It creates PAN.
• Devices which utilizes Bluetooth includes a) Printer b) Keyboard c) mouse d) Laptop and
desktop e) Cell phone and headphones
2) Wi-Fi
• It uses radio waves to provide high internet and network connections .
• Range of Wi-Fi is limited. Range typically of 120 feet.
• Wi-Fi the registered trademark is owned by Wi-Fi Alliance.
• Wi-Fi Alliance defines Wi-Fi as: “Any WLAN product that is based on IEEE 802.11
standards”.
• It is less served as compared to wired connection.
• Wi-Fi network use radio waves technologies called 802.11 to provide secure,
reliable, fast wireless connectivity.
• Suitable for small business also
• It is less costly and flexible.
3) Laptop:-
• The name “laptop” is derived from the fact that it is small enough portable
computer which can sit on lap.
4) Notebook: -
• It is extremely light weight personal computer (weight < 3 kgs).
• It uses Flat panel technology to produce non bulky display screen.
• It is very similar to Laptop.
5) Tablet computer or tablet:
• It is small in size , one piece general – purpose computer.
• In this touch screen is used as input device.
• Can be operated using stylus or fingers.
• It is popular due to ease of use and portability.
• Some features are a) Input Method : input through touch interface on screen
b) Size: very small in size and weight is < 1 kg.
c) Battery life: low power consumption and high battery life.
d) Storage capacity: 16 to 64 gigabytes of storage.
e) Software: Android and Ios are most popular.
f) Wireless: It is portable and can utilize Bluetooth, Wi-Fi or
mobile connectivity.
g) Performance: processing power is less as compared to laptop
etc . Mainly suitable for emails, web browsing.
6) Smart Phone:
• Built on mobile Operating system with combined features of traditional PDA and cellular
phone.
•
• It allows user to store information, email and install programs along with a mobile phone.
• Features are -High resolution, touch screens , browsers
7. Touch pad:
• It is a pointing devices featuring a tactile sensor that can translate the motion and position
of a user’s finger to a relative position on screen.
• Touch pad are also found on PDA and some portable media players.
• Wireless touch pads are also available.
8. I Pad :
9. I Pod :
Features are:
Chapter-3
ANS:
ANS:
➢ File Sharing
➢ Resource Sharing
➢ Remote Access
➢ Shared Database
➢ Fault Tolerance
➢ Internet Access & Security
ANS:
➢ Terminals
➢ Telecommunications Processors
➢ Telecommunications Media
➢ Telecommunications Control Software
ANS:
ANS
➢ Co-axial Cables are used in computer networks are of two types thick
co-axial & thin co-axial cable.
➢ Co-axial cables can carry large volume of data.
➢ It allows high speed data transmission.
➢ It is used extensively in office buildings & other work site for local
area networks.
ANS:
ANS:
➢ Network Management
➢ Traffic Management
➢ Security
➢ Network Monitoring
➢ Capacity Planning
ANS:
➢ Local Area Network(LAN)
➢ Wide Area Network(WAN)
➢ Metropolitan Area Network(MAN)
ANS:
ANS:
➢ Security
➢ Expanded PC Usage
➢ Distributed Processing
➢ Electronic Mail & Message Broadcasting
➢ Data Management Benefits
➢ Software Cost & up-gradation
ANS:
A. Client-Server Networks:
➢ Client
• Fat Client
• Thin Client
• Hybrid Client
➢ Server
B. Peer to Peer Network:
C. Multi-Tire Architecture:
➢ Single Tire System / One-Tire Architecture
➢ Two- Tire System / Two-Tire Architecture
➢ N- Tire System / N-Tire Architecture
ANS:
ANS:
➢ Star Topology
➢ Bus Topology
➢ Ring Topology
➢ Mesh Topology
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
➢ In this topology, the network cable passes from one node to another
until all nodes are connected in the form of loop or ring.
➢ There is a direct point-to-point link between two neighboring nodes.
➢ There is no any master node for controlling other nodes.
ANS:
ANS:
➢ Serial Transmission
➢ Parallel Transmission
➢ Synchronous Transmission
➢ Asynchronous Transmission
➢ Transmission Modes
1) Simplex
2) Half-duplex
3) Full-duplex
➢ Transmission Techniques:
• Switching Technique
1) Circuit Switching
2) Pocket Switching
3) Message Switching
ANS:
1) Application Layer
2) Presentation layer
3) Session Layer
4) Transport Layer
5) Network Layer
6) Data Link Layer
7) Physical Layer
Q27 What are the eight steps involve in the following security programs?
ANS:
➢ Preparing project plan for enforcing security
➢ Asset identification
➢ Asset valuation
➢ Threat identification
➢ Threats probability of occurrence assessment
➢ Exposure analysis
➢ Controls adjustment
➢ Report generation outlining the levels of security to be provided for
individual systems, end user, etc.
ANS:
ANS:
ANS:
ANS:
• Workforce productivity
• Time
• Communication
• Web publishing
• Business operations and management
• Cost- effective
• Promote common corporate culture
• Enhance collaboration
• Cross-platform capability
ANS:
• Secured access
• Facilitate infra-office communication
• Facilitate information sharing
• Intranets also be set up to provide an electronic directory service
• Whiteboard, and electronic chat space
• Group ware offers
ANS:
• Extension of intranet
• Specific application
• Isolates business communication
• Privacy and security
ANS:
Q40.Rules of Extranet
ANS:
ANS:
ANS:
ANS:
• Integrity
• Non repudiation
• Authenticity
• Confidentiality
• Privacy availability
• Reliability
• Scalability
• Easy of use
• Payment methods
ANS:
• Four classes
o Business to business
o Business to consumer
o Consumer to business
o Consumer to consumer
o Business to employee
1. ATM
2. Pre-authorized transfer
3. PoS transaction
4. Telephone transfer
Please use these questions and answers along with book and class
notes…
CHAPTER 4 QUESTIONS
CHAPTER 5 QUESTIONS
1. Define business application and its types?
2. What is BPA? Explain reasons and objectives of BPA
3. Briefly explain steps involved in implementing BPA.
4. Explain any 6 applications that help to achieve BPA.
5. Define
• Data
• Information
• Manual info. Cycle
6. On what basis does one choose info. Delivery channel?
7. What are the objectives of control in BPA?
8. What are the major applications of the concept of virtualization?
9. Explain type so virtualization with appropriate examples.
10. Explain Grid computing.
11. Explain in detail benefits of grid computing.
12. What do you mean by resource in grid computation & explain few of them.
13. Write a short note on using grid with respect to user’s perspective and an administrative
prospective
14. Explain application of grid computing.
15. Discuss the constraints that need to be taken into consideration while developing a secured
grid architecture.
16. Define cloud computing.
17. Write characteristics of cloud computing
18. Differentiate between advantage and disadvantage of cloud computing.
19. Differentiate between input controls and output controls
20. What do you mean by database controls? Discuss in brief.
21. Discuss Boundary controls in detail.
22. How process controls are used to have consistency in the control process?
23. Discuss communication control in brief.
24. Differentiate between system development management controls and programming
management controls under managerial functions based controls
Note 1:- kindly use with the class notes and book.
Note 2:- in case you find any difficulty whatsapp on 8447269330 ,
plz whatsapp only no call