Mba 1st Sem Itm Questions And Answers.docx

  • Uploaded by: Srikar Sharma
  • 0
  • 0
  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Mba 1st Sem Itm Questions And Answers.docx as PDF for free.

More details

  • Words: 10,817
  • Pages: 35
1. According to functionality, Type of computers are classified as : Analog Computer An analog computer (spelt analogue in British English) is a form of computer that uses continuous physical phenomena such as electrical, mechanical, or hydraulic quantities to model the problem being solved. Digital Computer A computer that performs calculations and logical operations with quantities represented as digits, usually in the binary number system Hybrid Computer (Analog + Digital) A combination of computers those are capable of inputting and outputting in both digital and analog signals. A hybrid computer system setup offers a cost effective method of performing complex simulations. On the basis of Size: Type of Computer Super Computer The fastest and most powerful type of computer Supercomputers are very expensive and are employed for specialized applications that require immense amounts of mathematical calculations. For example, weather forecasting requires a supercomputer. Other uses of supercomputers include animated graphics, fluid dynamic calculations, nuclear energy research, and petroleum exploration. The chief difference between a supercomputer and a mainframe is that a supercomputer channels all its power into executing a few programs as fast as possible, whereas a mainframe uses its power to execute many programs concurrently. Mainframe Computer A very large and expensive computer capable of supporting hundreds, or even thousands, of users simultaneously. In the hierarchy that starts with a simple microprocessor (in watches, for example) at the bottom and moves to supercomputers at the top, mainframes are just below supercomputers. In some ways, mainframes are more powerful than supercomputers because they support more simultaneous programs. But supercomputers can execute a single program faster than a mainframe. Mini Computer A midsized computer. In size and power, minicomputers lie between workstations and mainframes. In the past decade, the distinction between large minicomputers and small mainframes has blurred, however, as has the distinction between small minicomputers and workstations. But in

general, a minicomputer is a multiprocessing system capable of supporting from 4 to about 200 users simultaneously. Micro Computer or Personal Computer • Desktop Computer: a personal or micro-mini computer sufficient to fit on a desk. • Laptop Computer: a portable computer complete with an integrated screen and keyboard. It is generally smaller in size than a desktop computer and larger than a notebook computer. • Palmtop Computer/Digital Diary /Notebook /PDAs: a hand-sized computer. Palmtops have no keyboard but the screen serves both as an input and output device. Workstations A terminal or desktop computer in a network. In this context, workstation is just a generic term for a user's machine (client machine) in contrast to a "server" or "mainframe."

2. The Internet is a worldwide system of interconnected computer networks that use the TCP/IP set of network protocols to reach billions of users. The Internet began as a U.S Department of Defense network to link scientists and university professors around the world. A network of networks, today, the Internet serves as a global data communications system that links millions of private, public, academic and business networks via an international telecommunications backbone that consists of various electronic and optical networking technologies. Decentralized by design, no one owns the Internet and it has no central governing authority. As a creation of the Defense Department for sharing research data, this lack of centralization was intentional to make it less vulnerable to wartime or terrorist attacks. The terms "Internet" and "World Wide Web" are often used interchangeably; however, the Internet and World Wide Web are not one and the same. The Internet is a vast hardware and software infrastructure that enables computer interconnectivity. The Web, on the other hand, is a massive hypermedia database - a myriad collection of documents and other resources interconnected by hyperlinks. Imagine the World Wide Web as the platform which allows one to navigate the Internet with the use of a browser such as Google Chrome or Mozilla Firefox.

Follow the Internet Timeline below to see how the Internet has evolved over the years and take a glance at what lies ahead in the future as the Internet continues to change the world we live in. The influence of the Internet on society is almost impossible to summarize properly because it is so all-encompassing. Though much of the world, unfortunately, still does not have Internet access, the influence that it has had on the lives of people living in developed countries with readily available Internet access is great and affects just about every aspect of life. To look at it in the most general of terms, the Internet has definitely made many aspects of modern life much more convenient. From paying bills and buying clothes to researching and learning new things, from keeping in contact with people to meeting new people, all of these things have become much more convenient thanks to the Internet. Things that seemed like science fiction only a couple of decades ago such as paying your bills from your mobile phone or accessing your music library anywhere are commonplace today thanks to the Internet. The concept of cloud computing and having all of your files with you at all times, even when you are miles away from your computer, is another aspect of the Internet that gives people great convenience and mobility that were unimaginable before it. For example, opening up and working on a Microsoft Word file located on your home computer can be done from anywhere, as long as you have Internet access, thanks to programs like Dropbox and Google Drive or a remote desktop access program or application. Communication has also been made easier with the Internet opening up easier ways to not only keep in touch with the people you know, but to meet new people and network as well. The Internet and programs like Skype have made the international phone industry almost obsolete by providing everyone with Internet access the ability to talk to people all around the world for free instead of paying to talk via landlines. Social networking sites such as Facebook, Twitter, YouTube and LinkedIn have also contributed to a social revolution that allows people to share their lives and everyday actions and thoughts with millions. The Internet has also turned into big business and has created a completely new marketplace that did not exist before it. There are many people today that make a living off the Internet, and some of the biggest corporations in the world like Google, Yahoo and EBay have the Internet to thank for their success. Business practices have also changed drastically thanks to the Internet. Offshoring and outsourcing have become industry standards thanks to the Internet allowing people to work together from different parts of the world remotely without having to be in the same office or even city to cooperate effectively. All this only scratches the surface when talking about the Internet’s impact on the world today, and to say that it has greatly influenced changes in modern society would still be an understatement.

3. E-commerce is the activity of buying or selling of products on online services or over the Internet. Electronic commerce draws on technologies such as mobile commerce, electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Click and Mortar Click-and-mortar is a form of electronic commerce in which customers shop over the Internet on electronic retailers' websites, but are also able to physically visit the retailer's brick-and-mortar store. Click-and-mortar shopping provides customers with the efficiency of online transactions, as well as the face-to-face interaction of retail stores. Click-and-mortar is also known as DOTBAM, or dot-com brick-and-mortar. BREAKING DOWN 'Click and Mortar' The click-and-mortar business model is being followed by an increasing number of big-brand retail stores, such as Walmart, Best Buy and Nordstrom. The merging of online and offline channels, in what's called an omni channel strategy, provides customers with an enhanced shopping experience with more choices, greater flexibility, more convenience and more services. Retailers benefit from improved customer relations and more transactions. Due to their ability to spend millions of dollars on click ads with search engines, the retailers' promotions tend to show up higher in product search results online. Brick and Mortar

Brick and mortar (also bricks and mortar or B&M) refers to a physical presence of an organization or business in a building or other structure. The term brickand-mortar business is often used to refer to a company that possesses or leases retail shops, factory production facilities, or warehouses for its operations.[1] More specifically, in the jargon of e-commerce businesses in the 2000s, brick-and-mortar businesses are companies that have a physical presence (e.g., a retail shop in a building) and offer face-to-face customer experiences.

4. RDBMS: A relational database refers to a database that stores data in a structured format, using rows and columns. This makes it easy to locate and access specific values within the database. It is "relational" because the values within each tableare related to each other. Tables may also be related to other tables. The relational structure makes it possible to run queries across multiple tables at once. While a relational database describes the type of database an RDMBS manages, the RDBMS refers to the database program itself. It is the software that executes queries on the data, including adding, updating, and searching for values. An RDBMS may also provide a visual representation of the data. For example, it may display data in a tables like a spreadsheet, allowing you to view and even edit individual values in the table. Some RDMBS programs allow you to create forms that can streamline entering, editing, and deleting data. Most well known DBMS applications fall into the RDBMS category. Examples include Oracle Database, MySQL, Microsoft SQL Server, and IBM DB2. Some of these programs support non-relational databases, but they are primarily used for relational database management. Three – tier Architecture A three-tier architecture is a client-server architecture in which the functional process logic, data access, computer data storage and user interface are developed and maintained as independent modules on separate platforms. Three-tier architecture is a software design pattern and a well-established software architecture. Three-tier architecture allows any one of the three tiers to be upgraded or replaced independently. The user interface is implemented on a desktop PC and uses a standard graphical user interface with different modules running on the application server. The relational database management system on the database server contains the computer data storage logic. The middle tiers are usually multitier. The three tiers in a three-tier architecture are: Presentation Tier: Occupies the top level and displays information related to services available on a website. This tier communicates with other tiers by sending results to the browser and other tiers in the network.

Application Tier: Also called the middle tier, logic tier, business logic or logic tier, this tier is pulled from the presentation tier. It controls application functionality by performing detailed processing. Data Tier: Houses database servers where information is stored and retrieved. Data in this tier is kept independent of application servers or business logic.

5.

6. Trojan Horse: A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. The term comes from the a Greek story of the Trojan War, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy. Trojan horses are broken down in classification based on how they breach systems and the damage they cause. The seven main types of Trojan horses are: Phishing : Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy

entity in an electronic communication. Typically carried out by email spoofing or instant messaging, it often directs users to enter personal information at a fake website, the look and feel of which are identical to the legitimate site. Phishing is an example of social engineering techniques being used to deceive users. Users are often lured by communications purporting to be from trusted parties such as social web sites, auction sites, banks, online payment processors or IT administrators. DCN A dynamic circuit network (DCN) is an advanced computer networking technology that combines traditional packetswitched communication based on the Internet Protocol, as used in the Internet, with circuit-switched technologies that are characteristic of traditional telephone network systems. This combination allows userinitiated ad hoc dedicated allocation of network bandwidth for high-demand, real-time applications and network services, delivered over an optical fiber infrastructure.

7. Electronic governance or e-governance is the application of information and communication technology (ICT) for delivering government services, exchange of information, communication transactions, integration of various standalone systems and services between government-to-citizen (G2C), government-to-business (G2B), government-to-government (G2G), government-to-employees (G2E) as well as back-office processes and interactions within the entire government framework.[1] Through egovernance, government services are made available to citizens in a convenient, efficient, and transparent manner. The three main target groups that can be distinguished in governance concepts are government, citizens, and businesses/interest groups. In e-governance, there are no distinct boundaries. E-governance, expands to electronic governance, is the integration of Information and Communication Technology (ICT)in all the processes, with the aim of enhancing government ability to address the needs of the general public. The basic purpose of e-governance is to simplify processes for all, i.e. government, citizens, businesses, etc. at National, State and local levels.

Benefits of E-governance Reduced corruption High transparency Increased convenience Growth in GDP Direct participation of constituents Reduction in overall cost. Expanded reach of government Through e-governance, the government plans to raise the coverage and quality of information and services provided to the general public, by the use of ICT in an easy, economical and effective manner. The process is extremely complicated which requires, the proper arrangement of hardware, software, networking and indeed re-engineering of all the processes to facilitate better delivery of services. Types of Interactions in E-Governance G2G (Government to Government): When the exchange of information and services is within the periphery of the government, is termed as G2G interaction. This can be both horizontal, i.e. among various government entities and vertical, i.e. between national, state and local government entities and within different levels of the entity. G2C (Government to Citizen): The interaction amidst the government and general public is G2C interaction. Here an interface is set up between government and citizens, which enables citizens to get access to wide variety of public services. The citizens has the freedom to share their views and grievances on government policies anytime, anywhere. G2B (Government to Business): In this case, the e-governance helps the business class to interact with the government seamlessly. It aims at eliminating red-tapism, saving time, cost and establish transparency in the business environment, while interacting with government. G2E (Government to Employees): The government of any country is the biggest employer and so it also deals with employees on a regular basis, as other employers do. ICT helps in making the interaction between government and employees fast and efficient, along with raising their level of satisfaction by providing perquisites and add-on benefits. E-governance can only be possible if the government is ready for it. It is not a one day task, and so the government has to make plans and implement them before switching to it. Some of the measures include Investment in telecommunication infrastructure, budget resources, ensure security, monitor assessment, internet connectivity speed, promote awareness among public regarding the importance, support from all government departments and so forth

E-governance has a great role to play, that improves and supports all tasks performed by the government department andagencies, because it simplifies the task on the one hand and increases the quality of work on the other. Issues / Challenges of E-governance in india 1. Different Language: India is a country where people with different cultures and different religions live. People belonging to different states speak different languages. Therefore, it becomes a challenge for the government to write e-Governance applications which are to be implemented for the whole nation in more than one language so that these may be acceptable to the users of a particular language. 2. Low Literacy: Literacy can be defined as the ability to read and write with understanding in any language. A person who can merely read but cannot write cannot be considered as literate. Any formal education or minimum educational standard is not necessary to be considered literate. Literacy level of India is very low which is a huge obstacle in implementation of e-Governance projects. Illiterate people are not able to access the e-Governance applications; hence the projects do not get much success. 3. Low IT Literacy: Much of the Indian people are not literate and those who are literate, they do not have much knowledge about Information Technology (IT). Most of the people in India are not aware about the usage of Information Technology. So, in India, having such low level of IT literacy, how can e-Governance projects be implemented successfully? We can say that IT illiteracy is a major obstacle in implementation of eGovernance in India. So, first of all Indian people must be made aware about the usage of Information Technology. 4. Recognition of applications: Recognition of the eGovernance facilities by the citizens is another huge challenge. It is a challenge to have all the citizens well aware of the facilities offered by the e-government and have them to trust in it, so that citizens should be ready to accept these facilities. 5. User friendliness of government websites: Users of e-Governance applications are often non-expert users who may not be able to use the applications in a right manner. Such users need guidance to find the right way to perform their transactions. Therefore, government websites must be user friendly so that more and more people can use them easily. Hence, these websites can be more effective. If government websites will be designed in an easier format only then these will be more usable for the users who are not expert users of IT. 6. Services are not accessible easily: The concept of e-Governance is claiming for increased efficiency and effectiveness of the government, but these goals will be achieved only if the service will be available to the 100% of the citizens. So, every service should be accessible by anybody

from anywhere and anytime. Even if the users of Internet are growing but still there is a major part of Indian population which is not able to access e-Governance activities for variety of reasons, e.g. some people may have limited access to Information and Communication Technologies and devices. Therefore, government has to provide internet access through public terminals as a part of their universal access efforts. 7. Confidence on technologies provided by government: The implementation of public administration functions via e-Government requires that the user must be confident and comfortable while using the technology. He must also trust that technology that he/she is interacting with. Even the government should provide the measures so that the users can trust the technology provided to them. The government has to make a balance between ensuring that a system prevents fraudulent transactions and the burden that extensive checks can take place on people who are honest. 8. Separation: The separation that exists between the individuals, communities and businesses that have access to Information Technology and those that do not have such access. Economic poverty is closely related to the limited information technology resources. People who are living below poverty line cannot afford a computer and internet connection for themselves to take the benefits of the eGovernment and other on-line services. Economic poverty is not the only cause of this separation; it may also be caused by the lack of awareness among the people. In India even some of the economically stable people do not know about the scope and services of eGovernance. Indian government has to take some actions to narrower this separation to effectively implement the e-Governance projects. ix) 9. Struggle to Change: The struggle to change phenomenon can explain much of the hesitation that occurs on the part of the constituents in moving from a paper-based to a web-based system to interact with government. 10. Population: Population of India is probably the biggest challenge in implementing eGovernance projects. As population is considered to be an asset to the country but it also offers some other challenges e.g. establishing person identities. There is no unique identity of individuals in India although Indian government is making efforts for providing unique identity to its citizens. Apart from this, measuring the population, keeping the database of all Indian nationals and keeping this database updated and then providing the egovernance services to the whole population are major challenges. 11. Cost: In developing countries like India, cost is one of the most important obstacles in the path of implementation of e-Governance where major part of the population is living below poverty line. Even the politicians do not have interest in implementing e-Governance. A huge amount of

money is involved in implementation, operational and evolutionary maintenance tasks. These costs must be low enough so that to guarantee a good cost/benefit ratio. 12. Applications must be transferrable from one platform to another: egovernance applications must be independent from hardware or software platforms. Therefore, these applications can be used at any platform irrespective of the hardware or software and from one platform to the other platform. 13. Scope of applications: The very first step in creating a good application is to define its scope very well and everything else comes later. The applications which are provided by e-Government, their scope must be known in advance for the accurate implementation of eGovernance projects. 14. Tried and tested technologies: Technology tends to get out of date very fast. Our government may not be in position to buy new servers every year. So, it is better and safer to use technologies and products which are tried and tested for longer periods of times than using the latest ones 15. Geographical problems: Corporate networks reside on reliable and controlled networks. Government networks have to go into all areas which are even unfriendly to live. It is, however, costly to wire up all the villages in the country. So, e-Governance systems must have to use the wireless networks like existing cellular networks to reach the applications into remote areas irrespective of the geographical issues.

8. An e-commerce payment system facilitates the acceptance of electronic payment for online transactions. Also known as a sample of Electronic Data Interchange (EDI), e-commerce payment systems have become increasingly popular due to the widespread use of the internet-based shopping and banking. Over the years, credit cards have become one of the most common forms of payment for e-commerce transactions. In North America almost 90% of online retail transactions were made with this payment type.[1] Turban et al. goes on to explain that it would be difficult for an online retailer to operate without supporting credit and debit cards due to their widespread use. Increased security measures include use of the card verification number (CVN) which detects fraud by comparing the verification number printed on the signature strip on the back of the card with the information on file with the cardholder's issuing bank.[2] Also online merchants have to comply with stringent rules

stipulated by the credit and debit card issuers (Visa and MasterCard)[3] this means that merchants must have security protocol and procedures in place to ensure transactions are more secure. This can also include having a certificate from an authorized certification authority (CA) who provides PKI (Public-Key infrastructure) for securing credit and debit card transactions. Despite widespread use in North America, there are still a large number of countries such as China and India that have some problems to overcome in regard to credit card security. In the meantime, the use of smartcards has become extremely popular. A smartcard is similar to a credit card; however it contains an embedded 8-bit microprocessor and uses electronic cash which transfers from the consumers’ card to the sellers’ device. A popular smartcard initiative is the VISA Smartcard[4]. Using the VISA smartcard you can transfer electronic cash to your card from your bank account, and you can then use your card at various retailers and on the internet E-commerce sites use electronic payment, where electronic payment refers to paperless monetary transactions. Electronic payment has revolutionized the business processing by reducing the paperwork, transaction costs, and labor cost. Being user friendly and less timeconsuming than manual processing, it helps business organization to expand its market reach/expansion. Listed below are some of the modes of electronic payments − Credit Card Debit Card Smart Card E-Money Electronic Fund Transfer (EFT) Credit Card Payment using credit card is one of most common mode of electronic payment. Credit card is small plastic card with a unique number attached with an account. It has also a magnetic strip embedded in it which is used to read credit card via card readers. When a customer purchases a product via credit card, credit card issuer bank pays on behalf of the customer and customer has a certain time period after which he/she can pay the credit card bill. It is usually credit card monthly payment cycle. Following are the actors in the credit card system. The card holder − Customer The merchant − seller of product who can accept credit card payments. The card issuer bank − card holder's bank

The acquirer bank − the merchant's bank The card brand − for example , visa or Mastercard. Credit Card Payment Proces Step

Description

Step 1

Bank issues and activates a credit card to the customer on his/her request.

Step 2

The customer presents the credit card information to the merchant site or to the merchant from whom he/she wants to purchase a product/service.

Step 3

Merchant validates the customer's identity by asking for approval from the card brand company.

Step 4

Card brand company authenticates the credit card and pays the transaction by credit. Merchant keeps the sales slip.

Step 5

Merchant submits the sales slip to acquirer banks and gets the service charges paid to him/her.

Step 6

Acquirer bank requests the card brand company to clear the credit amount and gets the payment.

Step 6

Now the card brand company asks to clear the amount from the issuer bank and the amount gets transferred to the card brand company.

Debit Card Debit card, like credit card, is a small plastic card with a unique number mapped with the bank account number. It is required to have a bank account before getting a debit card from the bank. The major difference between a debit card and a credit card is that in case of payment through debit card, the amount gets deducted from the card's bank account immediately and there should be sufficient balance in the bank account for the transaction to get completed; whereas in case of a credit card transaction, there is no such compulsion.

Debit cards free the customer to carry cash and cheques. Even merchants accept a debit card readily. Having a restriction on the amount that can be withdrawn in a day using a debit card helps the customer to keep a check on his/her spending. Smart Card Smart card is again similar to a credit card or a debit card in appearance, but it has a small microprocessor chip embedded in it. It has the capacity to store a customer’s work-related and/or personal information. Smart cards are also used to store money and the amount gets deducted after every transaction. Smart cards can only be accessed using a PIN that every customer is assigned with. Smart cards are secure, as they store information in encrypted format and are less expensive/provides faster processing. Mondex and Visa Cash cards are examples of smart cards. E-Money E-Money transactions refer to situation where payment is done over the network and the amount gets transferred from one financial body to another financial body without any involvement of a middleman. E-money transactions are faster, convenient, and saves a lot of time. Online payments done via credit cards, debit cards, or smart cards are examples of emoney transactions. Another popular example is e-cash. In case of e-cash, both customer and merchant have to sign up with the bank or company issuing e-cash. Electronic Fund Transfer It is a very popular electronic payment method to transfer money from one bank account to another bank account. Accounts can be in the same bank or different banks. Fund transfer can be done using ATM (Automated Teller Machine) or using a computer. Nowadays, internet-based EFT is getting popular. In this case, a customer uses the website provided by the bank, logs in to the bank's website and registers another bank account. He/she then places a request to transfer certain amount to that account. Customer's bank transfers the amount to other account if it is in the same bank, otherwise the transfer request is forwarded to an ACH (Automated Clearing House) to transfer the amount to other account and the amount is deducted from the customer's account. Once the amount is transferred to other account, the customer is notified of the fund transfer by the bank.

9. Classification of Networks (LAN,MAN,WAN) Another important criterion for classifying networks is their scale (physical size). As shown in Figure there are:    

Personal Area Network (PAN) Local Area Network (LAN) Metropolitan Area Network (MAN) Wide Area Networks (WAN)

Personal Area Network (PAN): The interconnection of devices within the range of an individual person, typically within a range of 10 meters. For example, a wireless network connecting a computer with its keyboard, mouse or printer is a PAN. Also, a PDA that controls the user’s hearing aid or pacemaker fits in this category. Another example of PAN is a Bluetooth. Typically, this kind of network could also be interconnected without wires to the Internet or other networks. Local Area Network (LAN): Privately-owned networks covering a small geographic area, like a home, office, building or group of buildings (e.g. campus). They are widely used to connect computers in company offices and factories to share resources (e.g., printers) and exchange information. LANs are restricted in size, which means that the worst-case transmission time is bounded and known in advance. Knowing this bound makes it possible to use certain kinds of designs that would not otherwise be possible. It also simplifies network management. Traditional LANs run at speeds of 10 Mbps to 100 Mbps, have low delay (microseconds or nanoseconds), and make very few errors. Newer LANs operate at up to 10 Gbps. Early LAN (Local Area Network) networks were formed using coaxial cable, coax is an electric cable and it is used to carry radio signals. LAN (Local Area Network) setup is developed by connecting two or more than two computers with each other using a physical connection in order to share files and data overtime. Metropolitan Area Network (MAN): Covers a larger geographical area than is a LAN, ranging from several blocks of buildings to entire cities. MANs can also depend on communications channels of moderate-to-high data rates. A MAN might be owned and operated by a single organization, but it usually will be used by many individuals and organizations. MANs might also be owned and operated as public utilities. They will often provide means for internetworking of LANs. Metropolitan Area Networks can span up to 50km, devices used are modem and wire/cable.

Most widely used technologies to develop a MAN (Metropolitan Area Network) network are FDDI (fiber distribution data interface), ATM (Asynchronous Transfer Mode) and SMDS (switched multi megabit data service).ATM (Asynchronous Transfer Mode) is the most frequently used of all. ATM (Asynchronous Transfer Mode) is a digital data transfer technology. It was developed in 1980 to improve the transportation of real time data over a single network. ATM (Asynchronous Transfer Mode) works just like cell relay system, where data is separated in the form of fixed equal sized packets and is transferred overtime. The purpose of ATM (Asynchronous Transfer Mode) was to access clear audio and video results during a video conferencing. Wide Area Networks (WAN): Computer network that covers a large geographical area, often a country or continent. (Any network 1 whose communications links cross metropolitan, regional, national boundaries). Less formally, a network that uses routers and public communications links. Routers will be discussed later. WAN (Wide Area Network) networks are established often by seeking help from telecomm departments who provide the] facility of leased lines. Router is connected to the LAN at one side and a hub is attached at the other end.

10. DBMS stands for database management system; in other words, a system that manages databases. Examples of DBMSes are Oracle and SQL Server. These are systems that can be used to manage transactional databases, such as HR systems, banking systems and so on. These are typically optimized for performing transactions.

Railway Reservation System Database is required to keep record of ticket booking, train’s departure and arrival status. Also if trains get late then people get to know it through database update. Library Management System There are thousands of books in the library so it is very difficult to keep record of all the books in a copy or register. So DBMS used to maintain all the information relate to book issue dates, name of the book, author and availability of the book. Banking We make thousands of transactions through banks daily and we can do this without going to the bank. So how banking has become so easy that by sitting at home we can send or get money through banks. That is all possible just because of DBMS that manages all the bank transactions. Universities and colleges Examinations are done online today and universities and colleges maintain all these records through DBMS. Student’s registrations details, results, courses and grades all the information are stored in database. Credit card transactions For purchase of credit cards and all the other transactions are made possible only by DBMS. A credit card holder knows the importance of their information that all are secured through DBMS. Social Media Sites We all are on social media websites to share our views and connect with our friends. Daily millions of users signed up for these social media accounts like facebook, twitter, pinterest and Google plus. But how all the information of users are stored and how we become able to connect to other people, yes this all because DBMS.

Telecommunications Any telecommunication company cannot even think about their business without DBMS. DBMS is must for these companies to store the call details and monthly post paid bills. Finance Those days have gone far when information related to money was stored in registers and files. Today the time has totally changed because there are lots f thing to do with finance like storing sales, holding information and finance statement management etc. Military Military keeps records of millions of soldiers and it has millions of files that should be keep secured and safe. As DBMS provides a big security assurance to the military information so it is widely used in militaries. One can easily search for all the information about anyone within seconds with the help of DBMS. Online Shopping Online shopping has become a big trend of these days. No one wants to go to shops and waste his time. Everyone wants to shop from home. So all these products are added and sold only with the help of DBMS. Purchase information, invoice bills and payment, all of these are done with the help of DBMS. Human Resource Management Big firms have many workers working under them. Human resource management department keeps records of each employee’s salary, tax and work through DBMS. Manufacturing Manufacturing companies make products and sales them on the daily basis. To keep records of all the details about the products like quantity, bills, purchase, supply chain management, DBMS is used. Airline Reservation system Same as railway reservation system, airline also needs DBMS to keep records of flights arrival, departure and delay status. So in short, one can say the DBMS is used everywhere around us and we cannot rely without DBMS.

11.

12. Electronic governance or e-governance is the application of information and communication technology (ICT) for delivering government services, exchange of information, communication transactions, integration of various standalone systems and services between government-to-citizen (G2C), government-to-business (G2B), government-to-government (G2G), government-to-employees (G2E) as well as back-office processes and interactions within the entire government framework. Through e-governance, government services are made available to citizens in a convenient, efficient, and transparent manner. The three main target groups that can be distinguished in governance concepts are government, citizens, and businesses/interest groups. In e-governance, there are no distinct boundaries.

13. Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. The information or data may take any form, e.g. electronic or physical. Information security's primary focus is the balanced protection of the confidentiality, integrity and availability of data (also known as the CIA triad) while maintaining a focus on efficient policy implementation, all without hampering organization productivity. This is largely achieved through a multi-step risk management process that identifies assets, threat sources, vulnerabilities, potential impacts, and

possible controls, followed by assessment of the effectiveness of the risk management plan. To standardize this discipline, academics and professionals collaborate and seek to set basic guidance, policies, and industry standards on password, antivirus software, firewall, encryption software, legal liability and user/administrator training standards. This standardization may be further driven by a wide variety of laws and regulations that affect how data is accessed, processed, stored, and transferred. However, the implementation of any standards and guidance within an entity may have limited effect if a culture of continual improvement isn't adopted. The following products should be part of every IT organization’s network security toolset: 1. INTRUSION DETECTION AND PREVENTION SYSTEMS IDS and IPS tools help IT staff identify and protect their wired and wireless networks against several security threat types. These technologies, like several other categories of network security tools, are being deployed with greater frequency as networks grow in size and complexity. Annual IPS revenues are expected to more than double between 2012 and 2017 (from $1.21 billion to $2.44 billion) according to estimates from the research and analysis firm Frost & Sullivan. Both IDS and IPS solutions detect threat activity in the form of malware, spyware, viruses, worms and other attack types, as well as threats posed by policy violations. IDS tools passively monitor and detect suspicious activity; IPS tools perform active, in-line monitoring and can prevent attacks by known and unknown sources. Both tool types can identify and classify attack types. 2. ANTI-MALWARE Anti-malware network tools help administrators identify, block and remove malware. They enable the IT department to tailor its anti-malware policies to identify known and unknown malware sources, for example, or surveil specific users and groups. Malware is always on the lookout for network vulnerabilities — in security defenses, operating systems, browsers, applications and popular targets such as Adobe Flash, Acrobat and Reader — that they can exploit to fully access a victim’s network. Best practices call for a multipronged defense that might also include IP blacklisting, data loss prevention (DLP) tools, anti-virus and antispyware software, web browsing policies, egress filtering, and outboundtraffic proxies. 3. MOBILE DEVICE MANAGEMENT MDM software bolsters network security through remote monitoring and control of security configurations, policy enforcement and patch pushes to

mobile devices. Further, these systems can remotely lock lost, stolen or compromised mobile devices and, if needed, wipe all stored data. 4. NETWORK ACCESS CONTROL NAC products enforce security policy by granting only security policy– compliant devices access to network assets. They handle access authentication and authorization functions and can even control the data that specific users access, based on their ability to recognize users, their devices and their network roles. 5. NEXT-GENERATION FIREWALLS This technology expands on traditional stateful inspection to provide nextgeneration network security services, including application visibility and control and web security essentials. Next-generation firewalls also improve on standard firewall capabilities through application-awareness features. 6. AUTHENTICATION AND AUTHORIZATION Traditional directory-based services, such as Active Directory, authenticate users and grant access based on authorization rules. Newer identity-based security technologies manage authentication and authorization through such methods as digital certificates and public key infrastructure solutions. Additional security is provided by the SNMP protocol itself. The most recent version, SNMPv3, provides authentication, authorization and encryption capabilities lacking in the previous two versions.

14. Cloud computing is shared pools of configurable computer system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over the Internet. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a public utility. Third-party clouds enable organizations to focus on their core businesses instead of expending resources on computer infrastructure and maintenance. Advocates note that cloud computing allows companies to avoid or minimize up-front IT infrastructure costs. Proponents also claim that cloud computing allows enterprises to get their applications up and running faster, with improved manageability and less maintenance, and that it enables IT teams to more rapidly adjust resources to meet fluctuating and unpredictable demand. Cloud providers typically use a "pay-as-you-go" model, which can lead to unexpected operating expenses if administrators are not familiarized with cloud-pricing models.

The availability of high-capacity networks, low-cost computers and storage devices as well as the widespread adoption of hardware virtualization, serviceoriented architecture, and autonomic and utility computing has led to growth in cloud computing.

15. E-Commerce advantages can be broadly classified in three major categories − 

Advantages to Organizations



Advantages to Consumers



Advantages to Society

Advantages to Organizations 

Using e-commerce, organizations can expand their market to national and international markets with minimum capital investment. An organization can easily locate more customers, best suppliers, and suitable business partners across the globe.



E-commerce helps organizations to reduce the cost to create process, distribute, retrieve and manage the paper based information by digitizing the information.



E-commerce improves the brand image of the company.



E-commerce helps organization to provide better customer services.



E-commerce helps to simplify the business processes and makes them faster and efficient.



E-commerce reduces the paper work.



E-commerce increases the productivity of organizations. It supports "pull" type supply management. In "pull" type supply management, a business process starts when a request comes from a customer and it uses just-in-time manufacturing way.

Advantages to Customers 

It provides 24x7 support. Customers can enquire about a product or service and place orders anytime, anywhere from any location.



E-commerce application provides users with more options and quicker delivery of products.



E-commerce application provides users with more options to compare and select the cheaper and better options.



A customer can put review comments about a product and can see what others are buying, or see the review comments of other customers before making a final purchase.



E-commerce provides options of virtual auctions.



It provides readily available information. A customer can see the relevant detailed information within seconds, rather than waiting for days or weeks.



E-Commerce increases the competition among organizations and as a result, organizations provides substantial discounts to customers.

Advantages to Society 

Customers need not travel to shop a product, thus less traffic on road and low air pollution.



E-commerce helps in reducing the cost of products, so less affluent people can also afford the products.



E-commerce has enabled rural areas to access services and products, which are otherwise not available to them.



E-commerce helps the government to deliver public services such as healthcare, education, social services at a reduced cost and in an improved manner.

The disadvantages of e-commerce can be broadly classified into two major categories 

Technical disadvantages



Non-Technical disadvantages

Technical Disadvantages 

There can be lack of system security, reliability or standards owing to poor implementation of e-commerce.



The software development industry is still evolving and keeps changing rapidly.



In many countries, network bandwidth might cause an issue.



Special types of web servers or other software might be required by the vendor, setting the e-commerce environment apart from network servers.



Sometimes, it becomes difficult to integrate an e-commerce software or website with existing applications or databases.



There could be software/hardware compatibility issues, as some e-commerce software may be incompatible with some operating system or any other component.

Non-Technical Disadvantages 

Initial cost − The cost of creating/building an e-commerce application in-house may be very high. There could be delays in launching an e-Commerce application due to mistakes, and lack of experience.



User resistance − Users may not trust the site being an unknown faceless seller. Such mistrust makes it difficult to convince traditional users to switch from physical stores to online/virtual stores.



Security/ Privacy − It is difficult to ensure the security or privacy on online transactions.



Lack of touch or feel of products during online shopping is a drawback.



E-commerce applications are still evolving and changing rapidly.



Internet access is still not cheaper and is inconvenient to use for many potential customers, for example, those living in remote villages.

16. Working out what rugged handheld pda’s have what kind of connection to the mobile network can be fought with unknowns so this article clears up everything you need to know, in layman’s terms what all the different types of mobile network you chips you can opt for. We blogged about the difference between GPRS, 3G and HSDPA some time ago now and it turned out to be a really popular blog so I wanted to drag the advice into 2013, by adding a little bit about 4G too. Mobile data can be explained easily using the “2G, 3G & 4G” terms but you’ll see a lot more than this on the spec sheets so below is a quick overview of some of the most important things you need to know about GPRS.

3G in a nutshell Just to quickly explain 3G comes in 3 broad types: 2G – This used General Packet Radio Service (GPRS) and was the first kind of mobile data technology we had. 3G – Superseded GPRS and was a more robust and faster technology 4G – Recently launched, is new technology designed for 100MB per second with models to support data consumption in the year 2013 and beyond. Your rugged handheld or smartphone will support some or all of these and we go into detail below.

Before we grew legs and left the ponds! Way back it all started with 2G! As mobile phones became ever more popular we all started to think of ways we could use our phones like we used our computers, so 2G was born. 2G was pure GPRS, the first of its kind and it was slow. When launched you were lucky to get the theoretical 40Kbps and I never heard of anyone getting close to the 170Kbps that the last versions of 2G theoretically gave. You couldn’t take calls and sync data at the same time and you’ll probably not find 2G on anything these days.

Enter 2.5G 2.5G is commonly referred to as “Edge” or Enhanced GPRS, depending on where you’re from or how you talk! The “E” is key though as this is what you’ll see on your smartphone mobile data icon if you’re in a 2.5G zone. Edge brought along the ability to take calls whilst syncing data in the background and with better encoding methods it also brought 3-fold improvements in speed with theoretical speeds of 400Kbps. Even today Edge is still available as an option in many rugged handheld PDA’s because it’s robust, it uses less power than 3G, its cheaper to spec and many applications still only require GPRS speeds. Indeed in the UK, you will also still regularly find you’re in a 2.5G zone anyway so that’s all you’ll get in terms of speed anyway! However edge was really a stop gap technology as we all knew 3G was coming.

3G Arrives! Soon after 2002 and those rather exciting and hugely expensive 3G license auctions, 3G was released and it not only gave us more reliable faster data rates, initially up to about 384kbps but because it was based on a far better and newer technology that allowed truly synchronous voice and data usage as well as supporting far higher future speeds. With 3G, the web and data tasks that we take for granted today, suddenly became truly usable and an explosion of mobile data usage followed driving improved speeds almost every year 3G existed.

3G Technologies you’ll see – HSDPA, 3.5G, 3.75, 4G and beyond Even today in 2013 3G is still the most prevalent mobile data technology. Most of the smartphones we use are running on 3G so lets talk about the types of 3G you’ll find on the spec sheets of rugged PDA’s or smartphones here: o o

o o o

3G – Was the first type of 3G to hit the market. 3.5G (HSDPA) – is still the standard for many Rugged Handhelds. Running initially at 1.3mbps networks have been slowly upgraded across the UK to run at speeds of up to 7.2mbps. 3.75G (HSPA/HSUPA) – Improved speeds to 14MBps. 3.8G (HSPA) – 22MBps 3.9G (HSPA+) – Theoretically designed to support 80MBps + speeds. Now which one your device runs needs a quick check of the spec sheet. However be aware that in the UK, despite the chips in your smartphone being capable of 22MBps, the networks have all largely not been upgraded since the 3.5G updates so we’re all running at theoretical speeds of about 7.2MBPs.

Mobile data needs explode – Enter 4G in 2012 4G was launched which is again a brand new mobile data technology and designed to support our mobile data consumption habits into the future! GPRS largely supported a bunch of early adopter users that were happy checking emails on the move with businesses happy to sync small amounts of application updates every few hours. 3G supported the smartphone user explosion, allowing us to share photos, browse maps and browse or use the internet pretty freely but it still thought of mobile data as something we wanted to download. Today however we are all constantly creating data and we need a more robust, faster and secure technology to allow us to do this. 4G supports 100MBps+ and is designed to support all manner of streaming and heavy data use so not only is watching BBC iPlayer on the move a formality but taking video, editing and then sharing online is also something we will be able to do with 4G. In fact 4G theoretically now surpasses the fixed fibre option broadband services we buy so we’re now in an age where our smartphones and rugged PDA’s have a faster connection to the internet than our businesses and homes do. Wow how Star Trek is that!!

17. What does Database Management System (DBMS) mean? A database management system (DBMS) is a software package designed to define, manipulate, retrieve and manage data in a database. A DBMS generally manipulates the data itself, the data format, field names, record structure and file structure. It also defines rules to validate and manipulate this data. A DBMS relieves users of framing programs for data maintenance. Fourth-generation query languages, such as SQL, are used along with the DBMS package to interact with a database. Some other DBMS examples include:     

MySQL SQL Server Oracle dBASE FoxPro

A database management system receives instruction from a database administrator (DBA) and accordingly instructs the system to make the necessary changes. These commands can be to load, retrieve or modify existing data from the system. A DBMS always provides data independence. Any change in storage mechanism and formats are performed without modifying the entire application. There are four main types of database organization: 







Relational Database: Data is organized as logically independent tables. Relationships among tables are shown through shared data. The data in one table may reference similar data in other tables, which maintains the integrity of the links among them. This feature is referred to as referential integrity – an important concept in a relational database system. Operations such as "select" and "join" can be performed on these tables. This is the most widely used system of database organization. Flat Database: Data is organized in a single kind of record with a fixed number of fields. This database type encounters more errors due to the repetitive nature of data. Object-Oriented Database: Data is organized with similarity to objectoriented programming concepts. An object consists of data and methods, while classes group objects having similar data and methods. Hierarchical Database: Data is organized with hierarchical relationships. It becomes a complex network if the one-to-many relationship is violated.

What is Data warehouse? A data warehouse is a technique for collecting and managing data from varied sources to provide meaningful business insights. It is a blend of technologies and components which allows the strategic use of data. Data Warehouse is electronic storage of a large amount of information by a business which is designed for query and analysis instead of transaction processing. It is a process of transforming data into information and making it available to users for analysis. What Is Data Mining? Data mining is looking for hidden, valid, and potentially useful patterns in huge data sets. Data Mining is all about discovering unsuspected/ previously unknown relationships amongst the data. It is a multi-disciplinary skill that uses machine learning, statistics, AI and database technology. The insights extracted via Data mining can be used for marketing, fraud detection, and scientific discovery, etc Data Mining Vs Data Warehouse: Key Differences Data Mining

Data Warehouse

Data mining is the process of analyzing unknown patterns of data.

A data warehouse is database system which is designed for analytical instead of transactional work.

Data mining is a method of comparing large amounts of data to finding right patterns.

Data warehousing is a method of centralizing data from different sources into one common repository.

Data mining is usually done by business users with the assistance of engineers.

Data warehousing is a process which needs to occur before any data mining can take place.

Data mining is the considered as a process of extracting data from large data sets.

On the other hand, Data warehousing is the process of pooling all relevant data together.

One of the most important benefits of data mining techniques is the detection and identification of errors in the system.

One of the pros of Data Warehouse is its ability to update consistently. That's why it is ideal for the business owner who wants the best and latest features.

Data mining helps to create suggestive patterns of important factors. Like the buying habits of customers, products, sales. So that, companies can make the necessary adjustments in operation and production.

Data Warehouse adds an extra value to operational business systems like CRM systems when the warehouse is integrated.

The Data mining techniques are never 100% accurate and may cause serious consequences in certain conditions.

In the data warehouse, there is great chance that the data which was required for analysis by the organization may not be integrated into the warehouse. It can easily lead to loss of information.

The information gathered based on Data Mining by organizations can be misused against a group of people.

Data warehouses are created for a huge IT project. Therefore, it involves high maintenance system which can impact the revenue of medium to small-scale organizations.

After successful initial queries, users may ask more complicated queries which would increase the workload.

Data Warehouse is complicated to implement and maintain.

Organisations can benefit from this analytical tool by equipping pertinent and usable knowledge-based information.

Data warehouse stores a large amount of historical data which helps users to analyze different time periods and trends for making future predictions.

Organisations need to spend lots of their resources for training and Implementation purpose. Moreover, data mining tools work in different manners due to different algorithms employed in their design.

In Data warehouse, data is pooled from multiple sources. The data needs to be cleaned and transformed. This could be a challenge.

The data mining methods are cost-effective and efficient compares to other statistical data applications.

Data warehouse's responsibility is to simplify every type of business data. Most of the work that will be done on user's part is inputting the raw data.

Another critical benefit of data mining techniques is the identification of errors which can lead to losses. Generated data could be used to detect a drop-in sale.

Data warehouse allows users to access critical data from the number of sources in a single place. Therefore, it saves user's time of retrieving data from multiple sources.

Data mining helps to generate actionable strategies built on data insights.

Once you input any information into Data warehouse system, you will unlikely to lose track of this data again. You need to conduct a quick search, helps you to find the right statistic information

A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document. The digital equivalent of a handwritten signature or stamped seal, a digital signature offers far more inherent security, and it is intended to solve the problem of tampering and impersonation in digital communications.

Digital signatures can provide the added assurances of evidence of origin, identity and status of an electronic document, transaction or message and can acknowledge informed consent by the signer.

In many countries, including the United States, digital signatures are considered legally binding in the same way as traditional document signatures. The United States Government Publishing Office publishes electronic versions of the budget, public and private laws, and congressional bills with digital signatures. How digital signatures work Digital signatures are based on public key cryptography, also known as asymmetric cryptography. Using a public key algorithm, such as RSA, one can generate two keys that are mathematically linked: one private and one public. Digital signatures work because public key cryptography depends on two mutually authenticating cryptographic keys. The individual who is creating the digital signature uses their own private key to encrypt signature-related data; the only way to decrypt that data is with the signer's public key. This is how digital signatures are authenticated. Digital signature technology requires all the parties to trust that the individual creating the signature has been able to keep their own private key secret. If someone else has access to the signer's private key, that party could create fraudulent digital signatures in the name of the private key holder. How to create a digital signature To create a digital signature, signing software -- such as an email program -- creates a one-way hash of the electronic data to be signed. The private key is then used to encrypt the hash. The encrypted hash -- along with other information, such as the hashing algorithm -- is the digital signature. The reason for encrypting the hash instead of the entire message or document is that a hash function can convert an arbitrary input into a fixed length value, which is usually much shorter. This saves time as hashing is much faster than signing. The value of a hash is unique to the hashed data. Any change in the data, even a change in a single character, will result in a different value. This attribute enables

others to validate the integrity of the data by using the signer's public key to decrypt the hash. If the decrypted hash matches a second computed hash of the same data, it proves that the data hasn't changed since it was signed. If the two hashes don't match, the data has either been tampered with in some way -- integrity -- or the signature was created with a private key that doesn't correspond to the public key presented by the signer -- authentication. A digital signature can be used with any kind of message -- whether it is encrypted or not -- simply so the receiver can be sure of the sender's identity and that the message arrived intact. Digital signatures make it difficult for the signer to deny having signed something -- assuming their private key has not been compromised -- as the digital signature is unique to both the document and the signer and it binds them together. This property is called nonrepudiation. Digital signatures are not to be confused with digital certificates. A digital certificate, an electronic document that contains the digital signature of the issuing certificate authority, binds together a public key with an identity and can be used to verify that a public key belongs to a particular person or entity. Most modern email programs support the use of digital signatures and digital certificates, making it easy to sign any outgoing emails and validate digitally signed incoming messages. Digital signatures are also used extensively to provide proof of authenticity, data integrity and nonrepudiation of communications and transactions conducted over the internet. Improtance of Digital Signature 1. Strengthen security

When it comes to keeping confidential information secure, an electronic signature is one of the most important things you can have. In the online age, there are countless hackers and malicious schemes that exist solely to steal your data and, while they’re at it, maybe your identity as well. With a digital signature, however, you can sign

documents online without having to worry. Digital encryption and audit trails keep your signature secure, protecting your organization against fraud and keeping your information away from prying eyes and hands that could do untold harm to a business if given the opportunity

2. Cut costs

Paper and printing can get expensive. Reducing paper waste has been known to save government organizations money in the past. For instance, according to the National Resources Defense Council, the EPA Region 10 offices in the Northwestern U.S. implemented paper-saving techniques that led to $49,000 in annual savings. Maintaining a printer fleet is expensive – especially when clerks and admins are printing thousands of paper documents every day. With a digital signature, however, sending paper documents is unnecessary. Not only will printing costs go down – so too will the expenses related to the actual procurement and processing of confidential files. According to the National Center for State Courts, electronic filing can reduce the costs associated with distributing paper files. Electronic filing with digital signatures, therefore, can save court and law organizations money. It also helps cut down on environmental waste, because you’re not using snail mail to send documents. 3. Improve digital workflow and save time

It can sometimes take months from the time a document is requested until it is received. One of the biggest benefits of having an electronic signature is that it can save time. According to the U.S. Patent and Trademark Office, filing online with a digital signature can save considerable time when it comes to processingand organizing important documents. In addition, e-filing can be done at any time via the Internet – doing away with the long lines associated with going down to the courthouse to request or submit documents.

“In essence, digital signatures allow you to replace the approval process on paper, slow and expensive, with a fully digital system, faster and cheaper,” Pierluigi Paganini wrote for Security Affairs. Electronic signatures also make it easier to organize those confidential documents, because there aren’t any physical papers to sift through. Instead, an electronic document management system can be utilized. Demand Media’s Chris MacKechnie noted that electronic document management systems can be accessed by any authorized employee on the organization’s network. In this way, law firms and courts can increase employee productivity and save time that would normally be spent trying to locate physical files.

Digital signatures save organizations time and money.

4. Increase storage space The lack of physical files doesn’t just save time. With electronic documentation, files are stored in virtual servers connected to the IT network, meaning there is no need for paper files anymore. In other words, offices can save storage space by moving to digital paperwork and signatures, as well. This translates to more space for other things and easy access to the files once they’ve been moved to the digital realm.

Related Documents


More Documents from ""