Translate

Friday, 29 March 2013

Subjective Papers solved of Cs507



Define E_Learning?
Answer :
E-Learning
E-Learning is the online delivery of information for purposes of education, training,
knowledge management, or performance management. It is a web - enabled system
that makes knowledge accessible to those who need it, when they need it – anytime,
anywhere. E-learning is useful for facilitating learning at schools
What is E-GOVERNMENT?
Answer:
41.5 E Government
E-Government / electronic government / digital government, or online government.
The terms refer to government’s use of information and communication technology
(ICT) to exchange information and services with citizens, businesses, and other arms
of government. E-Government may be applied by legislature, judiciary, or
administration, in order to improve internal efficiency, the delivery of public services,
or processes of democratic governance. The primary delivery models are
1. Government-to-Citizen or Government-to-Customer (G2C)
2. Government-to-Business (G2B) and
3. Government-to-Government (G2G)
What are types of IDS and explain each briefly?
Answer:
Types of IDS includes:
Signature-based: These IDS systems protect against detected intrusion patterns.
The intrusive patterns they can identify are stored in the form of signatures.
Statistical-based: These systems need a comprehensive definition of the known
and expected behaviour of systems.
Neural networks: An IDS with this feature monitors the general patterns of activity
and traffic on the network and creates a database.

How many Components of an ID is described in your course?
Answer :
Components of an IDS
An IDS comprise of following components:
Sensors that are responsible for collecting data. The data can be in the form of
network packets, log files, system call, traces, etc.
Analyzers that receive input from sensors and determine intrusive activity
An administrative console – it contains intrusion definitions applied by the
analyzers.
A user interface

Differenciate Deny-all philosoph and Accept All Philosophy?
Answer:
To be effective, firewalls should allow individual on the corporate network to access
the Internet and at the same time, stop hackers or others on the Internet from
gaining access to the corporate network to cause damage. Generally, most
organizations can follow any of the two philosophies
• Deny-all philosophy -- which means that access to a given recourses will be denied
unless a user can provide a specific business reason or need for access to the
information
resource.
• Accept All Philosophy -- under which everyone is allowed access unless someone
can provide a reason for denying access.
Explain following statement means ???
‘’ Better people mean more secure networks ‘’
Answer:
The shortage of trustworthy people with IT security skills is a chronic problem that is
unlikely to ever disappear. Enough engineers and computer scientists should be
trained in computer security skills getting people with the right technical background
to do the work has been the biggest need of all.
What kind of thread impact results after the threat come to happen?
Answer:
Threat Impact
It is difficult to assess the impact of the attacks described above, but in generic
terms the following types of impact could occur:
Loss of income
Increased cost of recovery (correcting information and re-establishing services)
Increased cost of retrospectively securing systems
Loss of information (critical data, proprietary information, contracts)
Loss of trade secrets
Damage to reputation
Degraded performance in network systems
Legal and regulatory non-compliance
Failure to meet contractual commitments
Differenciate cold sites , hot sites and Warm sites ?
Answer:
Cold sites
If an organization can tolerate some downtime, cold sites backup might be
appropriate. A cold site has all the facilities needed to install a information system
raised floors, air conditioning, power, communication lines and so on. The cold site is
ready to receive equipment, but does not offer any components at the site in
advance of the need. Activation of site is may take several weeks depending on the
size of information
processing facility.
Hot sites
If fast recovery is critical, an organization might need hot-site backup. All hardware
and operations facilities will be available at the hot site. In some cases, software,
data, and supplies might also be stored there. Hot sites are expensive to maintain.
They usually are shared with other organizations that have same hot site
needs.
Warm sites
They are partially configured, usually with network connections and selected
peripheral equipment, such as disk drives, tape drives and controllers, but without
the main computer. Sometimes a warm site is equipped with a less powerful CPU,
than the one generally used. The assumption behind the warm site concept is that
the computer can usually be obtained quickly for emergency installation and since,
the computer is the most expensive unit, such a arrangement is less costly than a
hot site. After the installation of the needed components the site can be ready for
service within hours; however, the location and installation of the CPU and other
missing units could take several days or weeks
Give briefly the cycle phases of BCP?
Answer:
Phases of BCP
The BCP process can be divided into the following life cycle phases:
• Creation of a business continuity and disaster recovery policy
• Business impact analysis.
• Classification of operations and criticality analysis.
• Development of a business continuity plan and disaster recovery procedures.
• Training and awareness program.
• Testing and implementation of plan.
• Monitoring
What is focal point plz explain briefly?
Answer:
A corporate-level facilitator may serve as a focal point for assessments throughout
the company, including those pertaining to information security because of familiarity
with the tools and the reporting requirements. Each business unit in an organization
may have a designated individual responsible for the business unit's risk assessment
activities. The computer hardware and software company, may also create a team
for the purpose of improving the overall risk assessment process and reviewing
results of risk assessments in the hardware and software systems from the
perspective of offering a better, reliable and risk free product.
Differenciate between cryptography and Biometrics ?
Answer:
Cryptography
In literal terms, cryptography means science of coded writing. It is a security
safeguard to render information unintelligible if unauthorized individuals intercept the
transmission. When the information is to be used, it can be decoded. “The
conversion of data into a secret code for the secure transmission over a public
network is called cryptography.
Biometrics
Identification of an individual through unique physical characteristics is proving to be
quite safe and secure for allowing access. The study of personal characteristics has
been extensively used for identification purposes. Biometrics can be defined as study
of automated methods for uniquely recognizing humans based upon one or more
intrinsic physical or behavioral traits.

Write down few types of viruses with explaination?
Answer:
Types of Viruses
Although viruses are of many types, however broad categories have been identified
in accordance
with the damage they cause. Some of these categories have been stated below
• Boot Sector Viruses
• Overwriting viruses
• Dropper
• Trojans
Boot sector Virus
The boot sector is part of computer which helps it to start up. If the boot sector is
infected, the virus can be transferred to the operating system and application
software
Overwriting Viruses
As the name implies, it overwrites every program/software/file it infects with itself.
Hence the infected file no longer functions.
Dropper
A dropper is a program not a virus. It installs a virus on the PC while performing
another function
Trojan horse
A Trojan horse is a malicious program that is disguised as or embedded within
legitimate software. They may look useful or interesting (or at the very least
harmless) to an unsuspecting user, but are actually harmful when executed.
Examples are
• Logic bomb Trojan horses are triggered on certain event, e.g. when disc clean up
reaches a certain level of percentage
• Time bomb – Trojan horse is triggered on a certain date
Right the types of threats commonly undergone by E.Commerce?
Answer:
Types of Threats
• Physical threat This refers to the damage caused to the physical infrastructure of
the information
systems, e.g.
• Fire
• Water
• Energy Variations
• Structural damage
• Pollution
• Intrusion
• Logical This refers to damage caused to the software and data without physical
presence.
• Viruses and worms
• Logical intrusion
Define Internet briefly ?
Answer:
Internet
An interconnected system of networks that connects computers around the world via
the TCP/IP protocol. Companies contact Internet service providers for availability of
connection which allows them to be a part of internet. An intranet is a private
enterprise owned communication network that uses Internet Protocols,network
connectivity, and public telecommunication system to share organization's
information or operations with its employees, and to enable the employees to
communicate with each other.
Differenciate effectiveness and Efficiency?
Effectiveness
By effectiveness, it is meant that how effective is the manner in which the product or
service is offered to the customer? This may include packaging, advertising, creating
customer loyalty, timely availability in the market, understanding customer needs &
requirements related to the particular product or service being offered.
Efficiency
The concept relates to not only how efficiently a quality product is manufactured,
packed, stored and delivered to customers/points of sale but also how quickly are
customer complaints responded to, in what manner are they removed, what is the
cost of not doing so as to be compared to the cost of not doing so, and how it can be
made more efficient. Efficiency is not just about being efficient at the production
floor level but the decision making at management level also has to be efficient.
Customer might not be able to see all of the process but he can see the efficiency
coming out of it.
Defince Object and classes?
Answer:
Object:
“A concept, abstraction, or thing with crisp boundaries and meaning of the problem
at hand. Objects serve two purposes. They promote understanding of the real world
and provide a practical basis for computer implementation.”
Examples
Software objects are modeled after real-world objects in that they too have state and
behavior. We might want to represent real-world dogs as software objects in an
animation program or a real-world bicycle as software object in the program that
controls an electronic exercise bike
Classes
A class is defined as
“The purpose of a class is to specify a classification of objects and to specify the
features that characterize the structure and behavior of those objects.”
For example, computers are the domain/Class which can be divided into following
sub-classes:
• Laptop computer
• Desktop computer
• Palmtop
Why do we need object orientation ?
Answer:
Why need Object-Orientation?
There are certain positive points which are becoming stronger reasons for the
increased use of this
technique.
Object orientation helps in increasing abstraction and event-driven programming
• The widespread use of Graphical User Interface (GUI) encourages use of object
orientation.
• Software can be developed on modular basis
1. Easier to maintain
2. Easier to upgrade
3. Easier to test
4. Easier to develop incrementally
• Reusable Software The software developed using object oriented approach can be
easily reused due to independence/uniqueness of the objects i.e. an independent
accounting module built in object oriented environment can be made a part of a
complete ERP solution without developing it again from scratch for ERP
Differenciate Null and Derived?
Answer:
• Null : is a blank read as zero value. E.g. the various categories of graduation
degrees (B.A., B.Com., BSc, etc) will apply to graduates and not to non-graduates
and would be read as “Not Applicable”.
• Derived : is information provided on the basis of a unique attribute e.g. customer
ID, Employee ID, Student ID. Relevant dependant information can be
obtained/derived through the said
attribute.
What is ERD?
Answer:
Entity Relationship Diagram
"The entity-relationship diagram (ERD) is a data model or diagram for high-level
descriptions of conceptual data model, and it provides a graphical notation for
representing such data models in the form of entity-relationship diagrams."
E-R Diagram (E-R model) facilitates database design by allowing the specification of
an “enterprise schema” which represents the overall logical structure of a database.
The E-R Diagram (E-R model) is extremely useful in mapping the meanings and
interactions of real-world enterprises onto a conceptual
schema.
Differenciate flow chart and data flow diagram?
Answer:
Flow Chart
"A schematic representation of a sequence of operations as in a manufacturing
process or computer program.
Data Flow Diagram
"A data flow diagram (DFD) is a graphical representation of the "flow" of data
through an information system."
The purpose of data flow diagrams is to provide a linking bridge between users and
systems developers.
The data flow diagrams are:
• Graphical, eliminating thousands of words;
• Hierarchical, showing systems
They have less jargon, allowing user understanding and reviewing.
Data flow diagrams facilitate users to understand how the system operate. DFD’s
also help developers to better understand the system which helps in avoiding delays
in proper designing, development, etc. of projects. at any level of detail
Describe system design and its components ?
Answer:
System Design
System design includes the desired features and operations in detail, including
screen layouts, business rules, process diagrams other documentation. It involves
converting the informational, functional, and network requirements identified during
the initiation and planning phases into unified design specifications
Its components are:
• Formulation of strategic requirements
• Organizational & job design
• Elicitation of detailed requirements
• Design of the information flow
• Design of database
• Design of user interface
• Physical design
• Design of hardware & software platform
Differenciate between system analysis and system analyst?
Asnwer:
System analysis:
“A problem solving technique that decomposes a system into its component pieces
for the purpose of studying, how well those component parts work and interact to
accomplish their purpose.”
Systems Analyst
“These are knowledge workers who facilitate the development of information
systems and computer applications by bridging the communications gap that exists
between non-technical system users, and System designers and developers.”

No comments:

Post a Comment