COURSE MATERIAL - MASTERMINDS For CA Track Material...COURSE MATERIAL Cell: 98851 25025 / 26 Visit...
Transcript of COURSE MATERIAL - MASTERMINDS For CA Track Material...COURSE MATERIAL Cell: 98851 25025 / 26 Visit...
Cell: 98851 25025 / 26
Visit us @ www.mastermindsindia.com Mail: [email protected]
Facebook Page: Masterminds For CA Youtube Channel: Masterminds For CA
CA - IPCC
COURSE MATERIAL
Quality Education
beyond your imagination...
BOOK NO. A9
FAST TRACK MATERIAL IN
INFORMATION TECHNOLOGY_35e
Page 1
Score at least 20 marks with this
material
2
INDEX FOR FAST TRACK MATERIAL IN INFORMATION TECHNOLOGY
Chapter Name Pages
Part A Flowcharts 4 – 31
Part B 2 Mark Questions / Definitions 33 – 52
Part C Differences 54 – 66
Cell: 98851 25025 / 26
Visit us @ www.mastermindsindia.com Mail: [email protected]
Facebook Page: Masterminds For CA Youtube Channel: Masterminds For CA
CA - IPCC
COURSE MATERIAL
Quality Education
beyond your imagination...
PART A – FLOWCHARTS
Page 3
IPCC |35e |Flow charts_ Information Technology 4
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
1. TELECOMMUNICATIONS & NETWORKS
1. What is computer network? Explain different types of network?
2. State the latest trends in telecommunication?
3. Write short notes on need and scope of computer networks?
How networks help business
Organizations can improve efficiency by sharing Information such as common files, databases and various application software’s
over a network
Advantages of computer network: � File sharing � Resource sharing like printers, hard disk etc � Remote access via Internet � Database sharing � Fault tolerance by having backups of data and servers i.e. unbroken service. � Internet access to the organization with security concerns � Can do the business across the world i.e., over coming geographical barriers � Can offer Any time any where services like ATM’s i.e., over coming time barriers � Reduce costs of communicating through video conferencing. � Boundary less collaboration with stakeholders like customers, supplies etc.,
COMPUTER NETWORK
Definition
Purpose
Collection of computers and terminal devices
connected together by a communication system
� Sharing of hardware devices � Information sharing � Electronic transfer of text (EDI) � Decentralization of various Data processing functions. � Communication between organizations � Collaborate more creatively
Most commonly found networks Examples:
LAN, MAN, WAN, VPN, INTRANET, EXTkRANET,
INTERNET
1. Terminals are Starting and Stopping points in any telecommunication environment. 2. Terminals may include dumb, intelligent, workstations and also printers, Telephone lines etc.
Trends In telecommunication
Industry trends: � Many service providers Like Airtel,
Vodafone � Many services available like
Whatsapp. � Growth of E-commerce, m-commerce � Telecom Industry is undergoing major
changes In all possible ways � Availability of more bandwidth and
more speeder transmission technologies like 3G,4G,5G
Technology trends:
• Change from Analog to Digital network technologies. Ex: ISDN
• Change In communication media i.e., faster communication media Like fiber optic cables, satellite communication
• New and more secure protocols, Network architectures are evolving like WAP etc.,
Business trends:
• Businesses want to cut costs • Online operational process • Looking to benefit from
E-commerce and m-commerce • They want to improve communication
and collaboration. • They are looking at improved
response times and less waiting times.
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
IPCC |35e |Flow charts_ Information Technology 5
4. Write short notes on telecommunication network model
5. Write short notes on network management and functions of network management?
6. Why users prefer Local Area Networks?
Why users Prefer LAN?
LAN offers many benefits like data sharing and resources sharing in addition it also offer the following benefits
Security
Expanded PC usage through inexpensive
workstations
Distributed processing
E-mail and message
broadcasting
Less maintenance and Low Software costs
Major Networking functions
Traffic management � Avoid congestion and � Optimize
telecommunications service levels
Security Provides authentication, encryption, auditing functions, enforces security in a network.
Network monitoring � Continuously monitors the
network � Trouble shooting and watching
the network for problems
Capacity Planning � Surveys network
resources � Planning scalability based
on users needs
Components of telecommunication network model
In a communication network there will be Sender, Receiver, and Communication channel
Terminals: Starting and Stopping points in telecommunication environment
Ex: video terminals, micro computers, telephones
Telecommunication processors: � Support data transmission and reception
between terminals. � They control and coordinate flow of data in
a network � Efficiency of network depends on them
Internetwork processors: Special purpose
communication processors
NIC: � Network Interface card � Connects computer to a
computer network � Improves network throughput � Perform many functions like
Identification, Buffering etc.
Modem:
� Digital signal to Analog signal-modulation
� Analog signal to Digital signal - Demodulation
� Must for Internet
Multiplexer: � Also called as MUX � Carries several terminal signals on a
single channel simultaneously. � Multiplexer merges transmission
signals. � De - multiplexer separates signals.
Switch: Make temporary
connections between
telecommunication circuits.
Hub: Used for
sharing of networks
resources like servers, printers
Repeater: It boosts (or) amplifies the
signal
Bridge: � Used to connect
various LANS � Magnifies data
transmission signal
Router: Used to inter -
connect networks based on different rules or protocols
Gateway: Used to connect
networks of different communication architectures
Communication control
software: Program that control and manage the functions.
IPCC |35e |Flow charts_ Information Technology 6
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
7. Write about different kinds of cables commonly used in LAN’s
8. Write about different types of telecommunication networks?
Different Types of Telecommunication networks
LAN Network with in a
building campus (or) short distance within 1km
Area of coverage Functional based Ownership based Media based
MAN Spans Across a city (or)
town up to 40km Eg.: cable network
WAN Spans across the globe
Eg.: Internet
Client - Server There will be two
classes of computers called servers & clients
Peer to Peer � No concept of client
or server � All are equal i.e.
peers
Public network � Any one can use it � Eg.: Internet
Private network � Used by a particular group
of People or a company � Eg.: LAN, MAN
Virtual Private network Uses a public network to connect a private network Eg.: work from home
Wired Media Cables
Wireless Satellite
communication, Radio waves etc.
Communication Media
Guided media / bound media Uses a cabling system that guides the data signal along a specific path.
Unguided media / Un bound media � Does not use cables
� Uses waves and air as medium
Twisted pair cables � It is an ordinary telephone wire
� Most widely used for both data and voice transmission
� Inexpensive & easy to install
� Used for short distance only.
Co- Axial cable � Consists of copper (or)
aluminum wire with high insulation
� Used for high speed, long distance transmission.
Eg.: cable T.V. wire.
Fiber optic cable � Consists one or more hair like
thin filaments of glass fiber
� Data transmission is very fast and secure, easy to install
� Very Expensive
Terrestrial microware � Uses atmosphere as the
medium � Disadvantage is that it cannot
bend over the curvature of earth
Communication satellites � A satellite is some solar-powered
electronic device that receives, amplifies and retransmits the signal
� Cost effective for large data transmission over long distances
Infrared waves � Used in industrial
scientific and medical applications
Eg.: Night vision devices.
Micro Waves � Radio waves with wave length of 1 meter to
1mm. � Used in RADAR’s, Navigation and
spectroscopy.
Radio Waves � Invisible waves & Electro Magnetic
Radiation. � Wave length 1 mm to 1,00,000 Kms � Used in WAN’s and wireless LAN’s.
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
IPCC |35e |Flow charts_ Information Technology 7
9. What is meant by network topology? What are different topologies or structures available?
10. Write about Digital Data transmission
11. Write about different modes of data communication
Various techniques of Data Transmission
Data Transmission
Parallel: � All bits of each byte are transmitted simultaneously. � Eg.: Parallel port used for printers � Data can be transmitted at very high speed. � Crosstalk may occur. � Expensive.
Serial: � Most commonly used method. � One bit at a time is transmitted along a single path � Eg.: Modem (or) mouse port. � Very cheap � Suited for long distances transfer data in series i.e.
slow transmission
Two basic ways of Serial Transmission
Synchronous Transmission: � Information is transmitted at the same rate. � Sender and receiver are paced by same clock i.e.,
same speed. � Synchronization bits are placed at beginning and
ending of Provides physical transmission of data In network
� Provides physical transmission of data In network
each block.
Asynchronous Transmission:
� Data (or) information is sent at irregular intervals.
Eg.: Typing from a keyboard.
� Every time sender sends synchronization bits to receiver.
Techniques of Data Transmission
Broadcast Networks: � Data transmitted by one node is received
by many (or) all In the network
Switched Networks: � There will be a source and destination. � Data is transmitted through switch nodes.
Network Topology / Network Structure
Geometrical arrangement of Computer resources and other devices in a network, it determines how one computer can communicate with other devices.
Bus topology: � Decentralized approach � A single wire connects number
of computers. � All communication travel along
a cable called bus. � Simple & easy to install. � Heavy traffic can slowdown
the network. � If there is problem with main
cable entire network goes down.
Ring topology: � Decentralized approach. � It offers high performance for
small networks. � Reliable and less costly. � Easy to expand. � More reliable. � Better than star topology. � Transmission links are
unidirectional � Relatively expensive and
difficult to install
Star topology: � Centralized approach. � Most commonly used. � Consists of one centralized
hub (or) Computer (or) Switch.
� Generally central computer acts as server.
� Easy to add and remove nodes.
� Easy to diagnose problems. � But more dependence on
Central device.
Mesh topology: � Nodes are randomly
connected using links.
� It is used in military networks
� More redundancy � Highly reliable. � More expensive. � More cable is needed
IPCC |35e |Flow charts_ Information Technology 8
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
12. Discuss various switching techniques used in a computer network?
13. What is a Protocol? Explain the aspects defined by protocols? Explain the functions of protocols.
Protocols
Syntax: Format of data being exchanged, is defined.
Semantics: Type and order of messages is defined
Timing: � Data rate selection. � Correct timing for data transfer.
Definition: � Protocols are set of rules for inter - computer communication
� Protocols are software / programs that allow heterogeneous computers to transmit data
Aspects defined by protocols
Functions of protocols � Breakdown data into packets
� Add destination address to packets
� Take data packets from cable
� Contact with NIC
� Traffic control
Data transferred from source to destination is routed through the switched nodes
Circuit Switching: � Simplest method
� Only two devices can communicate at a time once circuit is established.
� It is exclusively used by the parties for whom the circuit is established. It becomes unavailable to others till the call is terminated by either party
Message switching
� Intermediate nodes are used to carry the message.
� No dedicated circuit is necessary to carry the message
� This characteristic is often referred to as store and forward
Eg.: E-mail, SMS, Voice Mail
Packet switching
� Sophisticated technique
� Messages are broken up into small transmission units called packets.
Eg.: Downloading and uploading in internetwork
Switching Techniques
Transmission modes
Characterized according to the direction of exchange of data
Simplex: � Data transmission in one
direction only � A terminal connected to
simplex mode line that may send only or receive only
Eg.: Radio, Computer to Printer
Half Duplex:
Data moves in both directions but one side at a time Eg.: Walkie talkie
Full Duplex: � Simultaneously transmit and
receive data � Faster � Uses two separate circuits Eg.: Mobile phones
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
IPCC |35e |Flow charts_ Information Technology 9
14. Write short notes on Network Architecture?
15. Write about Open System Interconnection (OSI)
16. Write short notes on TCP/IP?
Layers1/Physical layer � Provides physical transmission of data In network
Layer 2/Network Interface � Supports Error free organization and transmission of data in
network
TRANSMISSION
CONTROL PROTOCOL / INTERNET PROTOCOL Layer3/ Internet protocol (IP)
� Provides routing by establishing connections among network links
Layer4/ Host to Host transport layer � Supports the organization and transfer of data.
Layer5/Application or process layer � Provides communication services � Establishes sessions Data transmission formats and codes.
Meaning � Protocol used in Internet is called TCP/IP � It consists of 5 layers which corresponds to 7 layers of OSI
model
Layer1/ Physical Layer � Hardware layer � Discusses about topology
Layer 2/Datalink layer � Specifies channel access control method and reliable data
transfer.
OSI MODEL designed by ISO
Layer 3/Network layer � It makes a choice of physical route of transmission of data � Routing of data in a network
Layer 4/Transport layer � Assembling and disassembling of packets � Multiplexing, encryption, error recovery etc are undertaken
Layer 5/Session layer � Establishes, maintains and terminate sessions � Authentication and identification of clients.
Layer6/ Presentation layer � Controls on screen display of data � Encryption, data compression can be done.
Layer 7/Application layer � It Provides File transfer, file sharing � Deadlock and Database concurrency controls can be done.
Network Architecture
Definition: � It is a layout of a network (full picture of the established network). � It discuss about hardware, software, connectivity, mode of transmission etc., � The goal is to promote an open, simple, flexible and efficient telecommunications environment
OSI Model
TCP/IP model
IPCC |35e |Flow charts_ Information Technology 10
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
17. Write about different models of networks and also describe about clients and servers?
18. Discuss Multi-Tier Architecture?
19. What is a security program? (or) Write about network risks, controls and security?
Network Security
Meaning: Provision made to protect network and network accessible resources from unauthorized access
Need:
� To safeguard assets
� To ensure and maintain data integrity
Types:
� Physical: To Protect physical assets like hardware, personnel, Hardcopy Documents etc.,
� Logical: software security restricting unauthorized access to data
Multi-tier Architecture
Single-tier systems
� Single computer having both Front end (GUI) and Back End (database)
� Used in small and micro business
� Requires only one computer
Two-tier systems
� Consists of client and serves
� Front End on client
� Back End on sever
� Used In medium & large businesses
� Very flexible and effective
Three- tier system � There will be 3 tiers namely � Presentation tier (front End) � Application tier (Business logic) � Data tier (back end) � It will be more complex � But very effective � Modern day businesses use this
model � More secure � Dynamic load balancing
n-tier Architecture
� Here ‘n’ refers to number of levels counting from client to server.
� Used in more complex environments.
� Very secure and effective.
Models of network
Client / Server model • Intelligently divides processing
work between clients and servers
• Servers handles global tasks
• Clients handles local tasks
• Very fast, secure, reliable, efficient model
Peer-to-Peer model • No separate server • Only sharing is possible • All are equal i.e. peers • Very simple and cost efficient. • Not suited for large networks • P2P can be adhoc-connection • Permanent infrastructure
Client: Service Requesters
Fat/thick Client • It does not
necessarily rely on server
• Eg.: PC
Thin client • More dependence on
server • Performs only
presentation services
Hybrid Client � Mixture of fat and thin
clients � Used in Imaging
consoles � Process locally, but
relies on server for storing persistent data
Dedicated Performs
one specific activity only
Non-dedicated Performs many
activities
Server: Service Providers
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
IPCC |35e |Flow charts_ Information Technology 11
20. Write about Centralized systems & Decentralized systems?
21. Explain the threats involved in system security?
22. Discuss the encryption model in computer network.
Encryption:
Process of Encoding messages.
Hardware Encryption:
� Use of specific hardware devices to encrypt the messages.
� Now a days these devices are available at reasonable cost.
� These are fixed to computers.
Software Encryption:
� Encryption done by software itself.
� Usually works in conjunction with applications.
Eg.: Mail sent using g-mail will be encrypted by g-mail application.
Types
Cryptography
Encryption Decryption
Threat: A possible danger that can disrupt operation functioning Integrity of a
network.
2. Structured threats: � Done by highly motivated
technical people � Malicious Intention � Specific targeting of a group
(or) Company � Technically competent hackers
causes these threats
1. Unstructured threats: � Inexperienced and enthusiastic people will do � Ex: port scanning tools, address sweeping tools � No malicious Intention � Many tools are available in Internet
3. External threats: � Done by people outside of organization � Usually works on trail and error basis � Tries to Intrude from Internet or dial up servers.
4. Internal threats:
� Done by people inside the organization having access to internal resources
� Usually these people are disgruntled employees either current or former
Centralized and decentralized systems
Centralized system: � Processing done at central location � Enhanced security � Ease of control � Ease of management � Reduced cost of ownership
Disadvantages: � If Central computer fails then entire system will go down. � All the time the Central server should be kept secure and
fast.
Decentralized system: � Each workstation is autonomous
� It enable file sharing to all in the Network
Disadvantages: � All computers have to be updated
individually, but in central system updating the central server is Enough
IPCC |35e |Flow charts_ Information Technology 12
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
23. Explain the vulnerabilities involved in system security?
24. Write short notes on network security?
25. Explain popular network security protocols?
Popular network security protocols
Network security protocols are designed to prevent any unauthorized application service or device from accessing network data.
SSH: � Secure shell is a program to
log on to another computer over network to execute commands in a remote machine.
� Provides authentication and secure communication
� Protects network from IP spoofing, DNS Spoofing etc.,
SFTP: � Stands for Secure File
Transfer Protocol � Encrypts commands and
data while transmitting. � Preventing passwords
and sensitive information from being transmitted.
HTTPS:
� Stands for Hyper Text Transfer Protocol Secure
� Uses public and secret keys to encrypt data flow between client and server
SSL:
� Stands for Secure Socket Layer
� Used for secure online credit card transactions using web mail etc
Examples
Network Security: Provisions made to protect the network from threats.
Authentication: Receiver is sure of the sender’s identity that an imposter has not sent the message.
Privacy: � There should be confidentiality. � Achieved by cryptography and encryption techniques.
Integrity: � Data must arrive at receiver end exactly as it was sent by sender. � No tampering should be done.
Non-Repudiation: Receiver must be able to prove that a received message came from a specific sender and sender must not be able to deny sending it.
Aspect 2 Aspect 4
Aspect 1
Aspect 3
Software bugs: Bug (or) error in software is a serious vulnerability
Timing windows: Exploiting temporary files, Overwriting important data
Vulnerability It is an inherent weakness in design, configuration or implementation of a network or system that renders susceptible to a threat
In secure default configuration Using well known and easily guessed passwords can cause Vulnerability.
Bad protocols: Using inefficient non-standard protocols may cause vulnerability.
Trusting untrustworthy information: Bad routing algorithms can cause network to connect to untrustworthy servers.
End-users: Generally users of computer system who are not professionals and are not security conscious.
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
IPCC |35e |Flow charts_ Information Technology 13
26. What are the functions of network management?
27. Discuss FCAPS model of network management?
28. Write short notes on different classes of E-Commerce?
Business-to-Government (B2G) e-Commerce: It also known as e-Government, refers to the use of information and communication technologies to build and strengthen relationships between government and employees, citizens, businesses, non-profit organizations, and other government agencies.
E- Commerce
Business-to-Employee (B2E) e-Commerce:B2E e-Commerce, from an intra-organizational perspective, has provided the means for a business to offer online products and services to its employees.
Business-to-Business (B2B) e-Commerce: a) The exchange of services, information and/or products from one business to another. b) Automated processes between trading partners.
Business-to-Consumer (B2C) e-Commerce: a) It is defined as the exchange of services, information and/or products from a business to a
consumer.
b) A virtual store available for consumers to purchase goods and services
Consumer-to-Business (C2B) e-Commerce: a) Consumers directly contact with business vendors by posting their project work online so that
the needy companies review it and contact the consumer directly with bid.
b) Consumer reviews all the bids and selects the company.
Consumer-to-Consumer (C2C) e-Commerce a) Internet-facilitated form of commerce that has existed in the form of barter, flea markets,
yard sales and the like.
b) A virtual environment in which consumers can sell to one another through a third-party
F Fault Management: � A fault is an event that has a negative significance. � Goal is to recognize isolate correct, and log faults in a network.
C Configuration Management: Tracking and management of Network and system configuration information.
A Accounting Management: Tracking network utilization information.
P Performance Management: Measures network performance such as throughput, response time packet loss rates, Error rate etc.
S Security Management: Managing network authentication, authorization, auditing of a usage from both Internal and External Users.
Functions of network management
Controlling Planning Allocating Deploying
Monitoring resources of a network
Frequency Allocation
Cryptographic distribution and Authorization
Route Analysis and Accounting mgmt.
Security Management
Fault Management
Configuration Management
IPCC |35e |Flow charts_ Information Technology 14
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
29. What tools are available to protect the information in network against intrusion or misuse?
30. Write about Intrusion Detection System (IDS)? Explain Primary IDS technologies?
31. Write short notes on E-Commerce?
32. Define the Electronic Funds Transfer. State some examples of EFT systems in operation?
E-Commerce is the process of doing business electronically
Benefits
� Reduce Inventories
� Reduction of selling costs
� Reduction of advertising costs
� Access to new markets.
� Buyers can access Info Easily.
� Reduction of overhead costs
Risks � Problem of Anonymity � Repudiation of contract � Lack of authenticity � Denial of service � Problem of piracy � Lack of audit trails � Attacks from hackers
Types
� Business-to Business (B2B) � Business -to- Consumer (B2C) � Consumer -to -Business (C2B) � Consumer- to -Consumer (C2C) � Business –to- Government (B2G) � Business- to- Employee (B2E)
Electronic Funds Transfer
ATMs � Specialized form of POS � used with debit or credit
cards with a PIN Number � ATM cards are used in
multipurpose manner to pay bills to withdraw cash etc.,
POS � Stands for point of sale
transactions � Using POS machines
money can be transmitted electronically
� No need to carry cash for purchasing.
Preauthorized Transfers � Automatically depositing
or withdrawing from an individuals account through a financial institution.
� Payment of bills automatically
Telephone transfer Transaction can be done through telephone instructions Eg.: order of payment of bills to bank by phone
Examples
IDS
Monitors network assets to detect anomalous behavior (or) misuse
2. Host based Intrusion detection � Monitors attacks on a given host � Used to combat Internal threats
1. Network Intrusion Detection � Analyzes Network traffic and searches for un
wanted (or) malicious Events on the wired b/w hosts � They are also called as “packet sniffers” � It Intercepts packets
3. Hybrid Intrusion Detection � Combination of both NID and HID � It offers central Intrusion detection Management
Tools to protect Information in network
Firewalls: � Forms barrier
between secure and an open environment
� Effective means of protecting firms Internal resources from unwanted intrusion.
Message authentication � Makes sure that
message is from authenticated sender
� Makes sure of no message tampering
Site Blocking: It is a tool to block certain websites which may contain objectionable material
Anti-malware: � These tools help
administrators to Identify and block malware
� Malware disturbs the performance of the network.
(NAC) Network Access Control: These products handle access authentication and authorization functions
IDS Intrusion Detection System monitors network assets to detect anomalous behavior (or) misuse.
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
IPCC |35e |Flow charts_ Information Technology 15
2. INFORMATION SYSTEMS & IT FUNDAMENTALS
1. Define Information System? Write about Information System Layers.
2. Define the term Application Software? Explain types and mention advantages and Disadvantages.
3. Write about System Software in detail. (Or) What is an OS? Explain functions or activities performed by OS?
Application Software Set of programs for performing useful tasks
Less threat from virus
The threat of virus infection to custom-made applications is very small,
Addressing user needs � Application software is
designed to suit the user needs � They are designed with a
specific purpose in mind.
Regular updates licensed Application software will have regular updates for various security reasons
Application Suite Eg.: MS-Office, Star Office
Enterprise Software Eg.: SAP
Enterprise Infrastructure Software Eg.: Email sever, security software , Antivirus software
Information Worker Software Eg.: MS-Excel, CAAT etc
Content Access Software Eg.: Media players, Adobe digital
Educational Software Eg.: Exam CDS, Test prep CD’s
Media Development Software Eg.: DTP software, Photoshop
Benefits
Types
Development is costly Infection from malware
Disadvantages
SYSTEM SOFTWARE / OPERATING SYSTEM
Definition
� Software designed to operate the computer hardware
� It provides a platform for running application software (App’s)
� Operating system is a system program which acts as an Interface between the user and the computer hardware.
Functions (or) activities of an OS
� Performing hardware functions � Memory management � Providing user interface � OS provides hardware
Independence � Memory management � Task management � Providing networking
capabilities File management
Information Systems
Definition
1. It is a set of interrelated components working together to collect, retrieve, process, store and disseminate (distribute) information for the purpose of achieving objectives such as planning, coordination, analysis and decision making.
2. Generally called as Management Information Systems (or) Computer Based Information Systems
Activities
� Collecting, storing and processing of data
� Generation of Information reports
� Dissemination of Information to right Users.
Layers
� Hardware
� Software
� Database
� Network
� People
� Reports
IPCC |35e |Flow charts_ Information Technology 16
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
4. Explain various data storage devices?
5. Define the terms Data, Database, Database Management System (DBMS).
6. What is BPM? Explain phases of BPM in detail.
Memory techniques/ Devices
Internal Memory • Registers
Primary Memory (Main Memory)
Secondary Memory (Auxiliary Memory)
RAM • Volatile in nature • Information can be read and write
ROM • Non-volatile in nature • Information cannot be modified
Static RAM
Dynamic RAM
PROM
EPROM
EEPROM
Magnetic tape drives
Magnetic disk drives (Ex: Hard
disk, Floppy disk)
Optical disk drives (Ex: CDs DVDs
etc.)
SPECIAL MEMORIES
Cache Memory � It is a type of static RAM � It is smaller, faster � It is expensive � It boosts processing power � Its location in motherboard gives it the advantage � It resides between main memory to CPU
Virtual Memory
� Imaginary memory supported by some operating systems
� Virtual memory is an allocation of hard disk space to help RAM
� We can use large softwares with less RAM using this technique
Business Process Management (BPM)
Definition It is methodology used by enterprises to improve end to end business processes in various stages
Phases An ERP application divides the BPM Process into 4 phases.
1. Analysis Phase 2. Design Phase 3. Implementation Phase 4. Run & Monitor Phase
DBMS
Data Collection of Raw facts, figures, observations.
Database Collection of related data
DBMS DBMS is a collection of programs that enable users to create and maintain data bases. � Or simply it is a software to maintain databases
Characters Collection of Bits i.e. 0’s and 1’s
Field Collection of characters
Record Collection of fields
File Collections of Records
Database Collection of Files
Terminology
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
IPCC |35e |Flow charts_ Information Technology 17
7. What is a Database model? Explain different types of Database models.
8. List out the advantages & disadvantages of a DBMS?
9. Explain what type of IT infrastructural is required for organization and discuss the risks and issues of IT?
DBMS
Advantages � Reduced Data Redundancy � Program and file consistency � Data sharing � Integrity can be maintained � User friendly � Improved security � Data independence � Faster application development
Disadvantages
Cost: Implementing a DBMS may be expensive, time consuming and requires more training to users
Security: It is difficult to keep unauthorized users away from accessing the database
Database Model
A Database model determines the logical structure of a data base i.e. how data is stored, organized and manipulated
Hierarchical Model: � Records are logically organized into
hierarchy of relationships � Records are arranged in inverted
tree pattern � Parent-child relationship between
records � Supports only one to one and one to
many relationships � Simple to understand � If parent node is deleted all Child
nodes get automatically deleted � Cannot support many-to-many
relationships
Network model � Modified version of hierarchical
model � Supports all types of relations
one to one, one to many, many to one, many to many
� Relatively efficient � More flexible � But difficult to operate � Less user friendly,
Relational model � Represents database as
collection of relations � Relational database contains
multiple tables � Easier to use � Highly flexible � Can handle queries in a more
efficient manner � Storage requirements are high � Requires more processing
capacity � Primary key plays important role.
Object oriented model
� Objects are predefined set of program code that is used to perform a specific task
� Based on concept of objects and their interactions � Used to store complex data such as Images, audio video
etc., � Ex: CAD tools, Expert systems, Image processing
systems, Multimedia system etc.,
Types
IT in Enterprises
Infrastructure required An Enterprise should posses the following Infrastructure � Database access and changes software � File replication and backup software � Systems and event log monitoring � Job scheduling software � Application Integration � Printing & file transfers
Risks and Issues of IT
» Greater need of controls
» Checks to see whether business objectives are met (or) not
» Technology risks
» In-depth knowledge in implementation and operation are required
Copyrights Reserved
To MASTER MINDS, Guntur
IPCC |35e |Flow charts_ Information Technology 18
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
10. Define the term “computing”. Explain five sub-disciplines of the computing?
11. Describe about Instruction set Architecture (ISA).
12. Explain different phases of SDLC?
Phase - III System Design: � Examines how will the Info.
System do, what it must do to obtain solution to the problem.
� Designing of Hardware, software, Inputs, outputs, etc.
Phase - IV System Implementation: � Examines how will the solution be
put into effect � Involves coding testing Installing
software
Phase - I System Investigation: � Examines what is problem
and is it worth solving � Feasibility study is done.
Phase - II System Analysis: � Examines what must the
Information system do to solve the problem.
� Gathering details. � Analyzing cost benefits.
Phase - V System-maintenance and Review � Examines the results of software � Developed and modifies the
system according to the changing needs
SDLC � System Development
life cycle � Provides sequence of
activities to build an Information system
Computing
Any goal oriented activity requiring, benefiting from or creating computers
Computer Science � Scientific and practical approach to
computation and its applications � It studies the Internal working of the
computers
Computer Engineering
Integrates several fields of Electronic Engineering and computer science required to develop hardware and software
Information System (IS)
The main aim is to support operations management and decision making in a business
Information technology (IT)
IT encompasses not only computers and computer networks but also other technologies like telephones and television
Sub Disciplines
Software Engineering
It provides a systemic disciplined, quantifiable approach to the development, design, operation and maintenance of software
CLASSIFICATION OF INSTRUCTION SETS
CISC � Stands for Complex Instruction Set
Computing � Ex .: Intel 386, 486, Pentium pro, PII, PIII
etc � They are complex as well as expensive to
produce. � Most PC’s use CISC processors � Variable length instructions i.e., each
instruction can use exactly the amount of space it requires
RISC � Stands for Reduced Instruction Set
Computing Ex: IBM RS6000, MC88100 processors � Consume less power offers high
performance � Less complex and less expensive � Workstations uses RISC processors � Fixed length instructions. i.e for each
instruction can occupies the same amount of space, hence memory space is wasted
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
IPCC |35e |Flow charts_ Information Technology 19
13. Write about Machine Cycle?
14. Write briefly about Mobile Computing?
15. Discuss about BPA?
Business Process Automation (BPA)
It involves removing the human Element from existing business by automating the repetitive or standardized process components
Steps
� Define why we plan BPA � Understand rules & regulations � Document the process � Define objectives to be achieved � Engage process consultant � Calculate ROI for project � Development of BPA � Test the BPA
Activities � Integration � Orchestration � Automation
Benefits of BPA � Reduction of human error � Easy transformation of data into
information � Improves performance and
process effectiveness � Making business more
responsive � Improves information sharing and
collaboration
Objectives � Confidentiality � Integrity � Availability � Timeliness
Mobile Computing
It Involves the use of portable computing devices i.e. laptops, PDA, mobile phones, smart phones in combination with mobile technologies
Mobile Communication � Infrastructure for seamless and
reliable communication � Includes devices such as protocols,
services, bandwidth and profiles
Mobile Hardware
� Include laptops, Tabs, Phones, PDA’s
� They operate on full duplex mode
Mobile Software � Programs that run on mobile
hardware � Main component or Engine of the
mobile device.
Business Applications � Increase workforce productivity � Offers any where any time access � Improved customer service, latest Innovations in service � Business process improvement � Innovative opportunities for improving quality and efficiency
Concerns/Problems
� Security concerns � Dangers of misrepresentation � Power consumption � Potential health hazards
1. Instruction Fetch Fetch an Instruction from the current Program
2. Instruction Decode Figures out what we actually need to do
4. Write Back Writes back the result and go for another Instruction
3. Execution Performs some operation
MACHINE CYCLE
IPCC |35e |Flow charts_ Information Technology 20
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
16. Explain major concepts in SDLC.
3. BUSINESS INFORMATION SYSTEMS
1. Explain about the information system
Information System
Information � Processing of data is known as
information � Information is used in
managerial decision making
System
System is a set of interrelated components working together to accomplish objectives
Information system It is a combination of people hardware, software, communication devices, and networks to process data and produce Information
Role In business � Helps in decision making � Helps to Execute Innovative
Ideas � Helps in solutions of complex
and critical problems � Help to take right decisions at
right time � To gain competitive advantage
Components
Feed Back
Processing Output Input
Storage
Major Concepts in SDLC
Feasibility study Process of Evaluation alternative systems through cost/benefit analysis
Technical Feasibility
Economic Feasibility
Legal Feasibility
Operational Feasibility
Schedule (or) Time Feasibility
Fact finding techniques
Interviewing Staff Examine Current Business
Sending out
Questionnaires
Conversion Methods
Direct change over
Parallel Conversion
Phased Conversion
Pilot Conversion
System Maintenance Types
Perfective Maintenance
Adaptive Maintenance
Corrective Maintenance
Observation of current proceedings
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
IPCC |35e |Flow charts_ Information Technology 21
2. Explain who uses information system?
3. Explain different types of information system?
4. Explain Transaction Processing cycle?
5. Explain TPS?
6. Explain SCM?
SCM
Definition � Stands for Supply Chain Management � Process of planning, implementing and
controlling the operations of the supply chain with purpose to satisfy customer requirements.
� SCM cover from point-of-origin to point-of-consumption
Characteristic features
� It integrates supply and demand management within & across companies
� SCM is a chain starts and ends with customers
Components:
� Procurement
� Operations
� Distribution
� Integration
Transaction Processing System (TPS)
Definition:
It is Information system that collects, stores, modifies and retrieves day to day transactions of an enterprise
Eg.: ATM; IRCTC, Accounting system
TPS Attributes: � Access control: Should restrict
un authorized access � Equivalence: Transaction
should be in same format every time
� High volume rapid processing of transactions
� It should be robust and trust worthy
TPS qualifiers: � Atomicity: transaction should take
place in entirety � Consistency: Should behave similarly
all the time � Isolation : only one transaction at a
time � Durability: Maintenance of logs
Once transactions are completed they cannot be undone.
1. Data Entry 4. Document & Report Generation
2. Transaction Processing » Batch » Online / Real time
3. Database Maintenance 5. Inquiry Processing
Who uses Information Systems?
Includes CEO’s, COO’s, Chair person etc., � System used: EIS
Includes Middle Managers like GM RM, ZM etc., � System used: MIS, DSS.
Includes operational managers, Supervisors responsible for day to day operations � System used: TPS
Strategic Level Management Level / Middle Level
Operational Level
Knowledge and Data workers, who are selected, recruited and trained in a specified manner: � System used: KWS, OAS
Knowledge level
Types of information system
TPS DSS EIS OAS KMS MIS
IPCC |35e |Flow charts_ Information Technology 22
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
7. Explain ERP?
8. Explain CRM?
9. Discuss about DSS?
10. Discuss about MIS & EIS?
CRM
Definition
� Stands for Customer Relationship Management
� It may be defined as process in which client relationships, customer loyalty and brand value are built through marketing strategies and activities.
Benefits � Generation of customer loyalty � Raising a market Intelligence Enterprise � Integrated relationship � Preserving Existing customers � Providing enhanced services � Developing connection and affiliation
with customers
Architecture of CRM
Operational: Automation is provided to the basic business processes Analytical: Analyzes customs behavior Collaborative: Ensures contacts with customers like Phone, Email, Fax, SMS etc
Enterprise Resource Planning (ERP)
Definition
� An ERP system fully Integrates Internal and External Management Information across Entire organization
� It covers functional areas of an Enterprise like procurement, Inventory, production, sales, Logistics, finance, A/c’s and HR
Advantages
� Powerful tool In hands of management
� It organizes and integrates operating processes
� Used for optimum utilization of resources
� ERP promises one database, one application, one user interface
� Provides competent and efficient administration
Stages of ERP � Inventory control � ABC Analysis � EOQ (Economic order quantity) � Just-in-time (JIT) � Material Requirement planning � Manufacturing Resource planning � Distribution Resource planning � Enterprise Resource planning � Money Resource planning � EIS web Enabled
MIS and EIS
MIS � Used to develop Info for Managerial use � It is an Integrated, user-machine system to provide
Information to support operation, management and decision making functions
� It provides timely accurate, and meaningful data � MIS solutions are accessible via web Browsers of Internet Examples � Logistics Management Application. � ERP Softwares
EIS � It is a kind of DSS that is designed to meet the special
needs of top revel managers � It uses graphic displays � It can access both Internal and External data sources � Another name Executive Support System (ESS) EIS components � Hardware � Software � User Interface � Telecommunication
Decision Support System (DSS)
Definition � It is a Computer Based
Information System that supports business or organizational decision making activities
� DSS covers wide variety of systems, tools & technologies
Benefits of DSS � Improved decision quality � Cost reduction � Increased productivity � Increased communication � Timesaving � Improved customer
satisfaction
Components
� Users
� Databases
� Planning languages
� Model base
Characteristics � DSS supports
management decision making
� DSS solve unstructured problems.
� Friendly computer Interface
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
IPCC |35e |Flow charts_ Information Technology 23
11. Explain Knowledge Management System?
12. Write about Core- Banking System (CBS)?
13. Explain HRMS, benefits and modules?
14. What are various Business intelligence tools?
Business Intelligence Tools
Definition
A type of software that is designed to retrieve analyze and report data
Key tools � Simple reporting and
querying � Business Analysis � Dash boards � Score cards � Data mining (or) Statistical Data Analysis
Knowledge Management Systems
KMS
� Stands for Knowledge Management System
� It provides both Evident and hidden knowledge for decision making
� It Enables Employees to have ready access to organizations documented base of facts etc
� It is an Information repository � It provide both Explicit and Tacit knowledge
Explicit knowledge Ex: online tutorials.
Tacit Knowledge Ex: Employee experience
KDD � Stands for Knowledge Discovery and Data mining � It clears with ways and means of capturing and making
obtainable knowledge of the Experts to others in electronic form
� It includes people from inside and outside of organization � Importance of knowledge � Altering business surroundings � Burgeon connections � Globalization � Modification in organizational composition
CORE Banking System (CBS)
Definition � CORE stands for ‘Centralized Online Real
time Environment’ � It is a set of basic software components that
manage the services provided by a bank to its customers through its branches
Elements of Core banking � Marking and servicing of loans � Opening new accounts � Processing payments and cheques � Calculating Interest CRM etc., � Managing customer Accounts
Examples � ATM’S � ONLINE Banking � 24x7 support � Internet Banking etc.,
HRMS
Definition � A Human Resource Management
System is a software application that unites many human Resource functions which benefits the management
� It is also called as HRIS i.e., Human Resource Information System
Benefits � Brings Industry best practices to HR functions � Utilizes HR potentials completely � Reduce HR administrative costs � Increases employee engagement and
satisfaction. � Enhances data integrity within the Enterprise � Enable to meet compliance and audit
requirement
Key Modules � Work force management � Time and attendance
management � Payroll management � Training management � Compensation management � Recruitment management � Personnel management � Organizational management � Employee self service � Analytics
IPCC |35e |Flow charts_ Information Technology 24
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
15. What is AIS? Explain key component of AIS?
16. Explain AI & Expert system?
17. Explain the importance of access and privilege controls?
AIS (Accounting Information System)
It is defined as a system of collection, storage and processing of financial and accounting data that is used by decision makers.
Components of AIS Basic functions of AIS • Collect and store data. • Record transactions. • Safeguarding organizational assets. People Procedure &
Instructions Data Software IT
Infrastructure Internal controls
Access and Privilege Controls
These controls help us to restrict whom and what accesses information resources
Functions � Identity Management � Authentication � Authorization � Accountability
Approaches to Access controls
� Role-based Access control: Controls designed based on user-role in the organization.
� Rules-based Access Control: It uses triggers to govern rules of business to Enforce controls.
Principle of least privilege It means that we should give only those privileges to a user account which are essential to that users work.
AI & Expert Systems
AI: � Stands for Artificial Intelligence � Distinct area of computer science focusing
on creating machines that imitate aspects of human behavior such as to reason, communicate, see and hear.
� AI is manmade and level of activity depends on the programming capability
Expert systems It is a computerized Information system that allows non-experts to make decisions comparable to that of an Expert
Applications of A.I
Decision Support
Information Retrieval
Virtual Reality
Robotics
Components : 1. User Interface 2. Inference Engine 3. Knowledge base 4. Knowledge acquisition
facility 5. Explanation facility 6. Database of facts
Advantages: � Cost Effective alterative to human
experts � Faster and do not get stressed out � Better quality and more consistent
decisions � Preserve the Expertise of an expert
leaving the organization
Limitations: � Costly and time consuming � Difficult to obtain knowledge from experts � Difficult to program commonsense of
human beings
Types of expert systems • Example – based • Rule based • Frame based
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
IPCC |35e |Flow charts_ Information Technology 25
18. Explain various payment mechanisms?
4. BUSINESS PROCESS AUTOMATION THROUGH APPLICATION SOFTWARE
1. Explain different types of Business Applications
2. What are the applications based on nature of processing
3. Differentiate between manual & computerized information processing cycle?
Manual Information Processing Cycle
Input Process Output
Applications based on nature of processing
Batch processing � In batch processing there is a time
delay in occurrence and recording of transaction Eg.: Credit card statements, Accounting, Stock Control statements
� Used by small business
Online processing
� Data is processed immediately while it is entered
� Immediate result Eg.: Cash Management Software
� Used by medium businesses
Real-time Processing
� Input is continuously and automatically acquired from sensors
Eg.: Pilot less air craft, Robots etc
� Used by large business
Types of Business Applications
Nature of Processing (The way an application
updates data)
Source of Application (Tells the source from where
the application has been bought)
Nature of Business (Emphasize on size and complexity of Business
Process)
Functions Covered / Nature of Application
(Based on business functions it covers)
Batch Processing
Online Processing
Real time Processing
Leased
Purchased application
In-house developed
Large Business
Medium Business
Small Business
Manufacturing Application
Cash Management
Accounting Application
Payment Mechanisms
Credit Card:
� It is a plastic card used for electronic payment over Internet.
Electronic Cheque:
� It has all the features of paper cheque
� It acts as a message to the senders bank to transfer funds
Electronic Purse: � Another way to make payments over
Internet � Very similar to prepaid card � Validation is done through PIN � No credit check or signature is needed
Smart Card:
Smart Cards have an Embedded Micro Chip Instead of a Magnetic Strip.
Contact cards Contactless cards Combi / Hybrid cards
Processing: � Authorization � Batching � Clearing � Funding
Feed Back
Computerized Information Processing Cycle
Processing Output Input
Storage
IPCC |35e |Flow charts_ Information Technology 26
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
4. Explain the Business applications based on nature of applications?
5. What are information system controls?
6. Explain Different types of Application Controls
Boundary controls: To restrict the actions under taken by users Techniques: � Cryptography � Passwords � PIN � ID Cards / Plastic Cards � Digital Signatures
Input controls: Ensures accuracy and completeness of data entered in to system
Techniques: � Source document controls � Data coding controls � Batch controls � Validation controls
Output controls: Ensures data redelivered trousers will be present ell for matted and delivered manner Eg.: Printing controls, Retention controls, Existence Recovery controls, Storage and Logging of sensitive and critical forms
Database controls: Ensures data integrity in a data base Eg.: Ensuring all records on files are processed � Multiple Transactions for a single record in
the correct order
Communication controls: Ensure proper transmission of data in network Eg.: Physical Component control, Line error control, Flow and Link controls etc.
Process controls: Performs validation checks to identify errors during processing Eg.: Edit checks, run to run totals checking, Field Initialization, Reasonableness verification, etc.
Application Controls
Information System Controls
Definition: Control is defined as polices procedures practices that are designed to provide reasonable assurance that business objectives are achieved and undesired Events are prevented or detected and corrected
Controls can be divided into two parts
Managerial Controls: � Top management controls � Information systems management controls � System development management controls � Programming management controls � Data Resource management controls � Quality Assurance controls � Security management controls � Operations management controls.
Application Controls: � Boundary controls � Input controls � Process controls � Output controls � Communication controls � Database controls
Business applications based on nature of Application
Office Management
Software, Eg.: MS Office
Compliance Applications Eg.: E-filing
software
Accounting Applications, Eg.:
Tally, Wings
Management Support Software, Eg.: MIS
CRM Software, Eg.: SAP-CRM
ERP software Eg.: SAP
Product Life Cycle
Management Software
Logistics Management
Software
Legal Management
Software
Industry specific software like
Tourism, Automobile,
Banking, Pharma software, Cinema Ticketing software
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
IPCC |35e |Flow charts_ Information Technology 27
7. Explain Different types of Managerial Controls
8. What are various Emerging technologies?
9. What are the applications based in source of applications?
Managerial Controls
� Top management controls & Information systems management controls
System development management controls
Programming management controls
Data Resource management controls
Functions performed by senior managers
1. Planning 2. Organizing 3. Leading 4. Controlling
» Concurrent Audit » Post – implementation Audit » General Audit
Functions Performed by Senior Auditors
1. Planning 2. Designing 3. Coding 4. Testing 5. Operation & Maintenance
Functions Performed by S/W Developers
1. Centralized data security
2. Appointing Senior Persons
3. Separating Duties 4. Maintaining Logs 5. Share data to right
persons
Functions Performed by Resource Managers
Security Management Controls
Functions performed by Security Administrators
Several Physical & logical securities measures applied
Quality Assurance management controls
Functions performed by Quality Controllers
Safety Critical systems to improve the quality of
output like software
Operations management controls
Functions performed by Operations manager
Responsible for daily running of H/ W & S/W
resources
Emerging Technologies
Network virtualization Allows a large physical network to be provisioned Into Multiple smaller logical network
Major Applications � Server consolidation � Disaster Recovery � Testing and training � Portable applications � Portable work spaces
Grid computing � It is a form of distributed computing � It is a computer network in which each
computer’s resources are shared with every other computer in a communication system
Need: � Civil Engineers need it � Insurance companies need it � Large-scale science & Engineering Applications
use it. � A cheaper alternative to supercomputer
Cloud computing
� A cloud is a collection of servers, applications, databases, documents, agreements, storage capacity etc., which allow organizations to share these resources from anywhere.
Types of Software Available
Custom-built Application: a) These applications can be
configured to meet a particular company’s requirements.
b) Example – In house developed Software such as Billing, Inventory, and Attendance etc.
Leased application:
a) Where user pays fixed rent for using the application for agreed terms.
b) For Example - Cloud Systems
Packaged Software: a) These are the standard
applications which are not free but are licensed. Customization to suit business requirements may or may not be allowed.
b) For Example -Tally, Oracle 9i.
IPCC |35e |Flow charts_ Information Technology 28
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
10. Explain cloud computing in detail?
5. BUSINESS PROCESS MANAGEMENT & IT
1. Explain typical life cycle of an accounting transaction?
LIFE CYCLE OF AN ACCOUNTING TRANSACTION
2. Explain typical life cycle of a sales transaction?
LIFE CYCLE OF SALES TRANSACTION
3. Explain typical life cycle of a Purchase transaction?
LIFE CYCLE OF PURCHASE TRANSACTION
Cloud Computing
Service Models: Cloud computing officers the following services to users � Software as service (Saas) � Platform as a service (Paas) � Infrastructure as a service (Iaas) � Network as a service (Nass) � Communication as a service (Caas)
Deployment Models: Clouds can be divided based on their deployment and usage � Public clouds � Private clouds � Community clouds � Hybrid clouds
Characteristics: � Elasticity and scalability � Pay per use � On demand � Resiliency � Work load movement � Multi Tenancy.
Advantages: � Cost Efficient. � Easy access to
Information. � Unlimited Storage. � Backup and recovery. � Integration. � Quick deployment
Disadvantages: � Technical Issues. � Security Issues. � Prone to Attacks.
Purchase requisition
Request for Quote
Quotation
Purchase Order Receipts Payments
Customer order
Recording Pick Release
Shipping
Invoice Receipt Reconciliation
Source Document
Journals Ledger Trial Balance
Adjustments Adjusted Trial Balance
Closing Entries
Financial Statements
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
IPCC |35e |Flow charts_ Information Technology 29
4. Explain about Data Flow diagram?
5. Write short notes on Decision tables?
6. Explain about E-R diagram?
Data flow Diagrams
Meaning
DFD is a graphical representation of the flow of data through an information system.
Types of DFD: Physical data flow and logical data flow
Major components � Entity � Process � Data Store � Data Flow
Symbols: � Process - (or) � Attribute – (or) � Entity –
� Data Flow -
Advantages: � It aids in describing boundaries of system. � Easy to recognize. � Easy to communicate. � Easy to understand. � Displays flow of data in a system.
Limitations: � Creates little confusion � Takes long time to create. � Physical considerations
are left out.
Decision Tables
Definition � Tabular representation of program logic � Displays all conditions and the
appropriate actions to be taken for set of conditions
Advantages � Easy to draw � Simplicity � Modularity � Non-technical � Compact
documentation
Limitations � All programmers may not be
familiar with Decision tables. � Sometimes flow charts may be
better � Many not give complete picture of
the situation. Model of Decision Table
Condition
stub(s) Condition Entries
Action stub(s) Action Entries
E-R Diagrams
Meaning An Entity-Relationship diagram is a data modeling technique that creates a graphical representation of the entities and relationships between them.
Types of Relationships � One to one (1:1) � One to many (1:N) � Many to one (M:1) � Many to many (M:N)
Symbols: � Entity - � Attribute – � Key attribute – � Relationship -
Advantages: � Simple and Easily understood � Helps in Physical database creation � Helps in database design. � Gives high level description of system.
Disadvantages: � Ambiguities. � Misinterpretations
xyz
IPCC |35e |Flow charts_ Information Technology 30
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
7. Write short notes on Decision trees?
MODEL OF DECISION TREE
8. Write about Six Sigma model?
9. Write about TQM model
10. Write about Business Process Re-engineering?
It is defined as the fundamental rethinking and radical redesign of processes to achieve dramatic improvement, in the terms of performance such as cost, quality, service and speed.
Phases: i) Fundamental rethinking ii) Radical redesign iii) Dramatic achievement
BPR Model (Radical approach)
TQM Model (Incremental Approach)
It is a comprehensive and structured approach to organizational management that seeks to improve the quality of products and services through ongoing refinements in response to continuous feedback.
Phases: (i) Plan (ii) Do (iii) Check (iv) Act
Six Sigma Model
Six Sigma Employs quality management and statistical analysis of process outputs by removing defects and minimizing variability in manufacturing and business processes
Phases: � Define � Measure � Analyze � Improve � Control
Decision Trees
Definition It is a decision support tool that uses tree like model of decisions and their possible consequences, including chance, event outcomes, resource costs and utility.
Advantages � Simple to understand & interpret � Possible scenarios can be added � Worst, best and expected values
can be determined
Limitations Becomes very complex if many values are uncertain and/or if many outcomes are linked.
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
IPCC |35e |Flow charts_ Information Technology 31
11. Write short note on Flowcharts.
12. Write about BPM – Life cycle?
13. Explain the Benefits and Risks of IT in BPMS?
THE END
BPM Life Cycle
It establishes a sustainable process management capability that Empowers organization to Embrace and manage
process changes successfully.
1. Analysis
5. Optimize 2. Design
3. Implementation
4. Run & Monitor
Benefits and Risks of IT in BPMS
Benefits: � Automating repetitive business processes. � Operational savings. � Software can be made by loose coupling with
existing processes. � Freeing up of employee time. � Reduction in administration involved in
compliance and ISO activities.
Risks: � Technological problems. � Break down in gap analysis. � Failure to identify future business needs. � IT may be complicated or not flexible. � Deficient project management. � Limited options for customization. � Inadequate assessment of need for change management.
Flowchart
Meaning A flowchart is a diagram prepared by the programmer of the sequence of steps involved in solving a problem
Categories � System outline
charts � System flowcharts � Run flowcharts � Program flowcharts
Symbols: � Start/End - � Input / Output - � Process - � Decision box
Advantages: � Effective Analysis � Improved Communication. � Helps in Documentation. � Helps in coding. � Helps in tracing bugs / errors. � Quick grasp of relationships.
Limitations: � When logic is complex flow chart becomes
more complex. � For modifications complete redrawing is
necessary. � Reproduction in computers may be difficult.
Copyrights Reserved
To MASTER MINDS, Guntur
Cell: 98851 25025 / 26
Visit us @ www.mastermindsindia.com Mail: [email protected]
Facebook Page: Masterminds For CA Youtube Channel: Masterminds For CA
CA - IPCC
COURSE MATERIAL
Quality Education
beyond your imagination...
PART B - 2 MARK QUESTIONS / DEFINITIONS
Page 32
IPCC |35e |Fast Track Material in Information Technology 33
No.1 for CA/CMA & MEC/CEC MASTER MINDS
1. TELECOMMUNICATIONS AND NETWORKS
‘A’ Category
1. Computer Network 2. 3 – tier C/S architecture (MAY15 – 2M) It is a collection of computers and terminal devices connected together by a communication system. a) The set of computers may include large-scale
computers, medium scale computers, mini computers and micro computers.
b) The set of terminals may include dumb terminals, intelligent terminals and so on.
a) Presentation Tier: Occupies the top level and displays information related to services available on a website.
b) Application Tier: Also called the middle tier. It controls application functionality by performing detailed processing.
c) Data Tier: Houses database servers where information is stored and retrieved.
3. Protocol (SM, PM, RTP MAY-15) 4. Telecommunication Control Software or Telecommunications Software (SM)
It is a formal set of rules for communicating, including rules for timing of message exchanges, the types of electrical connections used by the communications devices, error detection, and means of granting access to communication channels and so on.
It consists of programs that control and manage the functions of telecommunication networks and include Telecommunication Monitors, Network Operating Systems, Network Management Components and Communication Packages
5. Router (PM, RTP - NOV 14) 6. Modem (SM, PM, MTP - MAY 16) a) Router is a communication processor that
interconnects networks based on different rules or protocols, so that a telecommunication message can be routed to its destination.
b) Routers perform the "traffic directing" functions on the Internet
a) It is a device that converts a digital computer signal into an analog signal (i.e. it modulates the signal) and converts an analog signal into a digital computer signal (i.e. it demodulates the signal) in a data communication system.
b) Modems are generally classified by the amount of data they can send in a given unit of time, usually expressed in bits per second
7. Multiplexer (SM, PM, MTP-OCT 14, RTP-NOV 14) 8. Bridge (PM)
a) It is a communications processor that allows a single communications channel to carry simultaneous data transmissions from many terminals.
b) Typically, a multiplexer merges the transmissions of several terminals at one end of a communications channel, while a similar unit separates the individual transmissions at the receiving end.
a) Bridge is a communication processor that connects number of Local Area Networks (LAN).
b) It magnifies the data transmission signal while passing data from one LAN to another.
9. MAN 10. WAN (SM) a) MAN is a digital communication system which
interconnects different sites, computers and user terminals that are spread over a metropolitan city.
b) A Metropolitan Area Network is some where between a LAN and a WAN.
c) Cable Television networks are best examples.
a) WAN is a digital communication system which interconnects different sites, computers and user terminals that are spread over a wide area (a state, a country or even world wide).
b) It is a commercial data network that provides data communication services for business and government agencies.
11. VPN (SM, NOV 14 – 2M, MTP – MAY16) 12. LAN (SM) a) It is a private network that uses a public
network to connect remote sites or users together in a secured manner through a firewall and other security features.
b) VPNs can be one of two types: Intranet-based and extranet-based.
A communications network that typically connects computers, terminals, and other computerized devices within a limited physical area such as an office, building, manufacturing plant, or other work site.
IPCC |35e |Fast Track Material in Information Technology 34
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
13. Repeaters (PM, MTP-FEB 15) 14. HUB (PM) a) Repeater is a communication processor that
boosts or amplifies the signal before passing it to the next section of cable in a network.
b) A telephone repeater is an amplifier in a telephone line, an optical repeater is an optoelectronic circuit that amplifies the light beam in a optical fiber cable; and a radio repeater is a radio receiver and transmitter that retransmits a radio signal.
a) It is a port-switching communication processor. This allows for the sharing of the network resources such as servers, LAN workstations, printers, etc.
b) It has multiple input/output ports. c) A hub works at the physical layer of the OSI
model.
15. Switches (PM, RTP-MAY 15) 16. Business Values of Extranet (MAY15 – 2M)
a) It is a communication processor that makes connections between telecommunication circuits in a network so that a telecommunication message can reach its intended destination.
b) It is a temporary point to point connecting device which can be able to transfer data from source to intended destination.
a) Extranet enables a company to offer new kinds of interactive web enables service to their business partners.
b) Extranets enable and improve collaboration by a business with its customers and other business partners.
c) Extranet facilitates an online, interactive product development, marketing and customer focused process that can bring better designed products to market faster.
17. TCP/IP (RTP-NOV 14) 18. Network Interface Card (PM) a) TCP / IP is a protocol used on the Internet.
TCP/IP creates a packet-switching network. b) TCP deals with exchange of sequential data.
IP handles packet switching and is used on the Internet.
a) NIC is a computer hardware component that connects a computer to a computer network.
b) It has additional memory for buffering incoming and outgoing data packets, thus improving the network throughput.
19. Extranet (SM) 20. Intranet (SM, RTP-MAY 15)
a) Extranets are network links that use Internet technologies to interconnect the Intranet of a business with the Intranets of its customers, suppliers, or other business partners.
b) It is part of company’s intranet that is extended to users outside the company.
a) An Intranet is a network inside an organization that uses Internet technologies such as web browsers and servers, TCP/IP network protocols.
b) Intranet can also be used to facilitate working groups, video conferencing and continuous updating of company database.
c) Intranets is the main means of intra-office communication.
21. Threat 22. Bandwidth (SM)
A threat is anything that can disrupt the operation, functioning, integrity or availability of a network or system. Network security threats can be categorized into following four broad themes: a) Unstructured threats b) Structured threats c) External threats d) Internal threats
a) The capacity of a communications channel as measured by the difference between the highest and lowest frequencies that can be transmitted by that channel.
b) It refers to a channel’s information carrying capacity.
c) It is usually measured in terms of bits per second (bps).
23. Vulnerability (MTP-FEB 15) 24. Cryptography
(MTP-SEP 14, RTP-MAY 15)
Vulnerability is an inherent weakness in the design, configuration or implementation of a network or system that renders it susceptible to a threat.
Cryptography is the practice and study of techniques for secure communication in the presence of third parties. It deals with encryption and decryption of data.
IPCC |35e |Fast Track Material in Information Technology 35
No.1 for CA/CMA & MEC/CEC MASTER MINDS
25. Firewalls (PM, RTP-NOV 14) 26. Electronic commerce (SM) a) Firewall is a device that forms a barrier
(fence) between a secure and an open environment.
b) It acts as a system or combination of systems that enforces a boundary between more than one networks.
a) It is the process of doing business electronically.
b) It involves automation of a variety of business-to-business and business-to-customer transactions through reliable and secure connections.
27. Network Server (SM) 28. Server (SM, PM) a) A network server is a computer system, which
is used as the central repository of data and various programs that are shared by users in a network.
b) LANs use a powerful microcomputer with a large disk capacity as a file server or network server.
c) The server handles resource sharing and telecommunications.
a) In client-server architecture, a server is a computer Program running to serve the requests of other Programs, called the ‘clients’
b) Typical computing servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers
29. Hyper Text Transfer Protocol Secure (MTP - FEB 15, OCT 14, MAY 16)
30. Intrusion Detection System (RTP-MAY 15)
a) HTTPS is a communications protocol for secure communication over a computer network, with especially wide deployment on the Internet.
b) The security of HTTPS uses long term public and secret keys to exchange a short term session key to encrypt the data flow between client and server.
a) An IDS is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a Management Station.
b) The goal of is to monitor network assets to detect anomalous behavior and misuse.
‘B’ Category
31. Telecommunications Processors (SM) 32. Communication Satellites (SM, MTP-MAY 16)
a) Telecommunications Processors support data transmission and reception between terminals and computers by providing a variety of control and support functions.
b) Multiplexers, concentrators, communications controllers, and cluster controllers are some of the examples.
a) A satellite is some solar-powered electronic device that receives, amplifies, and retransmits signal.
b) They are used extensively for high-volume as well as long-distance communication.
c) It is cost-effective method for moving large quantities of data over long distances.
33. Telecommunications Media (SM) 34. Simplex Connection: (MTP-SEP 14) a) Telecommunications medium/media is a path
between the sender and the receiver that carries the data in the form of signals.
b) They include, twisted- pair wire, coaxial cables, fiber optic cables, terrestrial microwave, communications satellite, cellular, and infrared systems.
a) A simplex connection is a connection in which the data flows in only one direction, from the transmitter to the receiver.
b) This type of connection is useful if the data do not need to flow in both directions (for example, from your computer to the printer or from the mouse to your computer.).
35. Secure Shell (SSH) (MTP-MAY 16) 36. Scalability (SM) a) Secure Shell is a program to log into another
computer over a network, to execute commands in a remote machine, and to move files from one machine to another.
b) It provides strong authentication and secure communications over insecure channels.
c) SSH protects a network from attacks such as IP spoofing, IP source routing, and Domain Name System (DNS) spoofs.
a) Scalability is the ability of a system, network, or process to handle a growing amount of work in a capable manner or its ability to be enlarged to accommodate that growth.
b) For example, it can refer to the capability of a system to increase its total output under an increased load when resources (typically hardware) are added.
IPCC |35e |Fast Track Material in Information Technology 36
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
37. Resilience (RTP-NOV 15) 38. Routing (SM)
a) It refers to the ability of a network to recover from any kind of error like connection failure, loss of data etc.
b) Computer networking community defines Resiliency as the combination of trustworthiness (dependability, security, performability) and tolerance (survivability, disruption tolerance, and traffic tolerance)
a) Refers to the process of deciding on how to communicate the data from source to destination, in a network.
b) Routing schemes differ in their delivery semantics: unicast, broadcast, multicast, anycast, geocast.
39. Serial Transmission 40. Parallel Transmission
a) In serial transmission bits of each byte are transmitted one after the other along a single path. Example –Serial port.
b) It can occur in any of the two ways - Asynchronous & Synchronous transmission.
a) In this all the bits of each byte are transmitted simultaneously i.e. each bit will have a unique channel dedicated to it.
b) Example – Parallel port being used for printers.
41. Secure Socket Layer (MTP SEP-15. MAY 16-2M)
42. Mobile Commerce (RTP-NOV 14)
a) It is essentially a protocol that provides a secure channel between two machines operating over the Internet or an internal network.
b) The SSL protocol is typically used when a web browser needs to securely connect to a web server over the inherently insecure Internet.
c) In practice, SSL is used to secure online credit card transactions, system logins and any sensitive information exchanged online, to secure webmail and applications
a) M-Commerce is about the explosion of applications and services that are becoming accessible from Internet-enabled mobile devices.
b) M-commerce is the buying and selling of goods and services through wireless handheld devices such as cellular telephone and Personal Digital Assistants (PDAs).
‘C’ Category
43. Network Architecture (SM) 44. Network Operating System (SM)
a) It refers to the layout of the network, consisting of the hardware, software, connectivity, communication protocols and mode of transmission, such as wired or wireless.
b) The diagram of the network architecture provides a full picture of the established network with detailed view of all the resources accessible.
a) An operating system oriented to computer networking, to allow shared file and printer access among multiple computers in a network, to enable the sharing of data, users, groups, security, applications, and other networking functions.
b) It is a program that is used to control telecommunications and the use of and sharing of network resources.
45. Radio Waves (MTP-MAR 15) 46. Electronic Mail (e-mail) (SM)
a) Radio waves are an invisible form of electromagnetic radiation that varies in wavelength from around 1 millimeter to 1,00, 000kms.
b) These are commonly used transmission media in Wireless Local Area Networks.
a) The computer-to-computer exchange of messages in an electronic format through a mail server.
b) Examples are Gmail, Yahoomail, Rediffmail, Hotmail etc.
IPCC |35e |Fast Track Material in Information Technology 37
No.1 for CA/CMA & MEC/CEC MASTER MINDS
47. Cryptographic Controls (MTP – MAY 16, MAY16 – 2M)
48. Micro Waves: (RTP- MAY 16)
a) Cryptographic Controls are designed to protect the privacy of data and to prevent unauthorized modifications of data.
b) Cryptography achieves this goal by scrambling data into codes (cryptograms) so that it is Meaningless to anyone who does not possess the authentication to access the respective system resource or file.
a) Microwaves are radio waves with wavelengths ranging from as long as one meter to as short as one millimeter, or equivalently, with frequencies between 300 MHz (0.3 GHz) and 300 GHz.
b) These are used for communication, radar systems, radio astronomy, navigation and spectroscopy.
2. INFORMATION SYSTEMS AND IT FUNDAMENTALS
‘A’ Category
1. Information System (RTP-MAY 15) 2. Random Access Memory (RAM) (SM)
a) It is a set of interrelated components working together to collect, retrieve, process, store and disseminate (distribute) information for the purpose of achieving objectives such as planning, coordination, analysis and decision making.
b) Generally called as Management Information System (MIS) or Computer Based Information System (CBIS).
a) This is Read Write memory. b) Information can be read as well as modified
(i.e. write). c) This is a Volatile memory. Volatile in nature
means Information is lost as soon as power is turned off.
d) Types of RAMs: Dynamic RAM and Static RAM
3. Read Only Memory (SM, RTP- MAY 16) 4. CPU (SM)
a) ROM is non-volatile in nature. b) These are used to store small amount of
information for quick reference by CPU. c) Information can be read not modified. d) Generally used by manufacturers to store data
& Programs.
a) The brain of a computer, is the actual hardware that interprets and executes the program instructions and coordinates how all the other hardware devices work together.
b) It consists of three functional units: Control unit, Arithmetic Logical unit and ‘Registers & cache’.
5. Direct Memory Access (DMA) (PM) 6. Registers (SM)
a) It is a feature of modern computers that allows certain hardware subsystems within the computer to access system memory independently of the Central Processing Unit.
b) DMA can also be used for "memory to memory" copying or moving of data within memory. DMA can offload expensive memory operations.
a) A processor often contains several kinds of registers, that can be classified according to their content or instructions that operate on them.
b) These are high speed memory units within CPU for storing small amount of data (mostly 32 or 64 bits) temporarily while performing several Computations.
7. Non-Volatile Memory 8. Memory Controller (PM)
a) Some memory chips always retain the data they hold even when the computer is turned off.
b) This type of memory is called non-volatile. (e.g. ROM).
a) It is a digital circuit which manages the flow of data going to and from the computer's main memory.
b) A memory controller can be a separate chip or integrated into another chip.
IPCC |35e |Fast Track Material in Information Technology 38
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
9. Application Software (MTP-SEP 14, MAY 16) 10. Volatile Memory
a) Computer software designed to help the user to perform specific tasks.
b) Application software includes all those computer software that cause a computer to perform useful tasks beyond the running of the computer itself.
c) It is designed for specific computer application. For example, a program that prepares payroll for a business is an application program.
a) The memory which loses their contents when the computer's power is turned off. E.g. RAM
b) It requires constant power to maintain the stored information. Volatile memory is typically used only for primary storage.
11. System Software (SM) 12. Computer Bus (PM, MTP-FEB 15)
a) Computer (system) software designed to operate the computer hardware and to provide and maintain a platform for running application software.
b) System software is essential for the development of application software.
c) The purpose of system software is to insulate the application programmer as much as possible from the details of the computer.
A communication system that transfers data between components inside a computer or between computers that covers all related hardware components (wire, optical fiber, etc.) and software, including communication protocol. a) Computer bus is also termed as System Bus. b) Computer Bus = Address bus + Data bus +
Control bus
13. Multiprocessing (PM) 14. Electronic Data Interchange (EDI) (SM)
a) Multiprocessing is the use of two or more Central Processing Units (CPUs) within a single computer system to allocate tasks between them.
b) In a multiprocessing system, all CPUs may be equal, or some may be reserved for special purposes. A combination of hardware and operating system software design considerations determine the symmetry (or lack thereof) in a given system.
a) The direct computer-to-computer exchange between two organizations of standard business transaction documents.
b) EDI can be formally defined as the transfer of structured data, by agreed message standards, from one computer system to another without human intervention.
15. Cache Memory (SM, RTP-NOV 14) 16. Client/Server Networks (SM)
a) It is a memory that lies in the path between the processor and the RAM, which a computer microprocessor can access more quickly than it can access regular RAM.
b) Cache depends on locality of reference that improves effective memory access time in a computer.
a) A computing environment where end user workstations (clients) are connected to micro or mini LAN (servers) or possibly to a mainframe (super server).
b) Clients and servers exchange messages in
a request–response messaging pattern: The client sends a request, and the server returns a response. This exchange of messages is an example of inter-process communication.
17. Machine Cycle 18. Computer Networks (SM,RTP-MAY 15)
a) Machine cycle = Fetch + Decode + Execute + Store
b) Fetch and decode are done by Control Unit (CU) whose job is to understand and explain to Arithmetic Logic Unit (ALU). ALU is used to execute and results are stored in Register.
a) It is a collection of computers and other hardware interconnected by Communication channel that allow sharing of resources and information.
b) Each component, namely the computer or a hardware device in a computer network is called a 'Node'.
c) Used to exchange of data among different computers and also used to share the resources.
IPCC |35e |Fast Track Material in Information Technology 39
No.1 for CA/CMA & MEC/CEC MASTER MINDS
19. Hardware Virtualization (PM) 20. Mobile Computing (SM)
a) Hardware Virtualization or Platform Virtualization refers to the creation of a virtual machine that acts like a real computer with an operating system.
b) Software executed on these virtual machines is separated from the underlying hardware resources.
a) It is the use of portable computing devices (such as laptop and handheld computers), in conjunction (combination) with mobile communications technologies, to enable users to access the Internet and data on their home or work computers, from anywhere in the world.
b) It is enabled by use of mobile devices such as PDA, laptops, mobile phones, smart phones, tablet PC and Palmtops on a wireless network.
21. Smart Phone (SM) 22. Touchpad (SM)
a) A mobile phone built on a mobile operating system, with more advanced computing capability connectivity than a feature phone.
b) These handheld devices integrate mobile phone capabilities with the more common features of a handheld computer or PDA.
c) Modern devices include high-resolution touch screens and web browsers for Internet browsing.
a) It is a pointing device featuring a tactile sensor, a specialized surface that can translate the motion and position of a user's fingers to a relative position on screen.
b) It is a common feature of laptop computers, and also used as a substitute for a mouse where desk space is limited.
c) These operate in one of several ways, including capacitive sensing and conductance sensing.
23. LAPTOP (NOTEBOOK) (SM) 24. Tablet (SM)
a) A small, portable computer and small enough that it can sit on a lap.
b) Notebook (Laptop) is an extremely lightweight personal computer.
c) Use flat-panel technologies, to produce a lightweight and non- bulky display screen
a) A tablet computer, or simply tablet is a one piece general-purpose computer contained in a single panel. Its distinguishing characteristic is the use of a touch screen as the input device.
b) Modern tablets are operated by fingers, and a stylus is an option, whereas earlier tablets required a stylus.
25. Servers (Based on client/server architecture) (SM) 26. Android (SM, MTP-MAR 15)
a) A server is a computer (Hardware) or device on a network dedicated to serve the needs of the users of other computers on a network.
b) Server performs some computational task on behalf of ‘clients’. The clients either run on the same computer, or they connect through the network.
a) It is a Linux-based operating system designed primarily for touch screen mobile devices such as s and tablet computers.
b) It is open source software, which allows the software to be freely modified and distributed by device manufacturers, wireless carriers and enthusiast developers.
27. I – Pad 28. I – Pod (MAY 16-2M)
a) It is a line of tablet computers designed and marketed by Apple Inc., which runs Apple's iOS.
b) It has built-in Wi-Fi and cellular connectivity. c) It can shoot video, take photos, play music,
and perform Internet functions such as web-browsing and emailing. Other functions—games, reference, GPS navigation, social networking, etc.—can be enabled by downloading and installing apps.
a) The iPod is a line of portable media players designed and marketed by Apple Inc.
b) There are four current versions of the iPod: the ultra-compact iPod Shuffle, the compact iPod Nano, the touch screen iPod Touch, and the hard drive-based iPod Classic.
c) iPods can serve as external data storage devices. Storage capacity varies by model, ranging from 2 GB to 160 GB.
IPCC |35e |Fast Track Material in Information Technology 40
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
29. System Development Life Cycle (SM, MAY 15-2M)
30. Primary Memory: (RTP-MAY 15)
a) It is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
b) Phases are
• System Investigation
• System Analysis
• System Designing
• System Implementation
• System Maintenance and Review
a) These are devices in which any location can be accessed in any order (in contrast with sequential order) directly by the CPU.
b) These are primarily of Two types: Random Access Memory (RAM) and Read Only Memory (ROM).
31. Virtual Memory (SM, MTP-OCT 14, MAY 16, RTP- NOV 14)
32. Bluetooth (SM, RTP-NOV 14,NOV 14 – 2M)
a) Virtual Memory is in fact not a separate device but an imaginary memory area supported by some operating systems (for example, Windows) in conjunction with the hardware.
b) Virtual memory combines computer’s RAM with temporary space on the hard disk.
a) Bluetooth is a wireless technology standard for exchanging data over short distances up to 50 meters (164 feet) from fixed and mobile devices, creating Personal Area Networks (PANs) with high levels of security.
b) It is a feature which is used every day through a number of compatible devices.
33. Operating System (SM, RTP-NOV 14) 34. WI-FI (SM, MTP-FEB 15)
a) OS is a set of computer Programs that manages computer hardware resources and acts as an interface with computer applications Programs.
b) The operating system is a vital component of the system software in a computer system.
a) Wi-Fi is a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections and have limited range.
b) Wi-Fi networks use radio technologies called 802.11 to provide secure, reliable, fast wireless connectivity.
c) A Wi-Fi network can be used to connect electronic devices to each other, to the Internet, and to wired networks (which use Ethernet technology).
‘B’ Category
35. Instruction Set Architecture (ISA) (SM, MTP-SEP 14, RTP-MAY 15)
36. Micro architecture (SM, MTP-OCT 14, MAY 16)
a) It is the abstract model of a computing system that is seen by a machine language programmer, including the instruction set, memory address modes, processor registers, and address and data formats.
b) The ISA basically deals with what the chip does. It's a sort of 'bridge' between software and hardware.
a) It, also known as Computer Organization. It is a lower level detailed description of the system that is sufficient for completely describing the operation of all parts of the computing system, and how they are inter-connected and inter-operate in order to implement the ISA.
b) It is a term used to describe the resources and methods used to achieve architecture specification.
Copyrights Reserved
To MASTER MINDS, Guntur
IPCC |35e |Fast Track Material in Information Technology 41
No.1 for CA/CMA & MEC/CEC MASTER MINDS
37. Mobile Software: (RTP-NOV 15) 38. Mobile Hardware: (RTP-MAY 15)
a) Mobile Software is the actual program that runs on the mobile hardware.
b) It deals with the characteristics and requirements of mobile applications and is the engine of that mobile device.
c) In other terms, it is the operating system of that appliance.
d) It is the essential component that makes the mobile device operates.
a) Mobile Hardware includes mobile devices or device components that receive or access the service of mobility.
b) They would range from Portable laptops, Smart phones, Tablet PC’s to Personal Digital Assistants (PDAs).
c) These devices will have receptors that are capable of sensing and receiving signals.
d) These devices are configured to operate in full- duplex, whereby they are capable of sending and receiving signals at the same time.
39. Key benefits of BPA (MAY 15-2M) 40. Database model (SM)
a) Reducing the Impact of Human Error b) Transforming Data into Information c) Improving performance and process
effectiveness d) Making users more efficient and effective e) Making the business more responsive: f) Improving Collaboration and Information
Sharing
a) A database model is a type of data model that determines the logical structure of a database and fundamentally determines in which manner data can be stored, organized and manipulated.
b) Examples are � Hierarchical Database Model, � Network Database Model, � Relational Database Model, and � Object oriented Database Model
41. Database Management Systems (RTP – MAY 16)
42. Primary Key: (MTP – MAY 16)
a) (DBMS) are software that aid in organizing, controlling and using the data needed by the application program.
b) They provide the facility to create and maintain a well-organized database. Applications access the DBMS, which then accesses the data.
c) Commercially available Data Base Management Systems are Oracle, My SQL, SQL Servers and DB2 etc.
a) A key that can be used to uniquely identify a
row in a table is called a Primary Key. b) Keys are commonly used to join or combine
data from two or more tables. c) Keys are also critical in the creation of
indexes, which facilitate fast retrieval of data from large tables.
‘C’ Category
43. Cathode-Ray Tube (CRT) 44. Liquid Crystal Display (LCDs)
a) A vacuum tube that uses an electron gun (cathode) to emit a beam of electrons that illuminate phosphors on a screen as the beam sweeps across the screen repeatedly. A monitor is often called a CRT
b) Here an Electron beam is controlled by Horizontal and vertical plates/coils and are focussed on the screen (Phosphor coated screen).
c) The size of CRTs are huge and consume more power than LCDs & LEDs.
a) A low-powered display technology used in laptop computers where rod-shape crystal molecules change their orientation when an electrical current flows through them.
b) LCDs are used in a wide range of applications including computermonitors,televisions, instrument panels, aircraft cockpit displays, clocks, watches and calculators.
c) They consume very less power and are portable to CRTs.
IPCC |35e |Fast Track Material in Information Technology 42
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
45. Laser Printer 46. Ink-jet Printer
a) A printer that forms images using an electrostatic process, the same way a photocopier works.
b) Laser is the heart of these printers. A separate CPU is built into the printer to interpret the data and to control the Laser beam.
c) Laser printers can print alphanumeric characters, high quality images, graphs, etc.
a) A printer that makes images by forcing ink droplets through nozzles.
b) Here there is no direct contact between the printer’s print head and paper.
c) These are generally used in Digital colour labs for printing Photographs and images on a specialized paper.
d) Types of Inkjet Printers: Liquid Inkjets and Solid Inkjets.
47. Plotter 48. Speakers
a) A graph plotter is a device capable of tracing out graphs, designs and maps onto paper and even on plastic or metal plates. High degree of accuracy can be achieved, even upto one thousandth of an inch.
b) It is more software dependent than any other peripheral device and it needs much more instructions than a printer.
a) Speakers are general audio output devices; contain small amplifiers to boost up the audio information.
b) Speakers are connected to the sound card on the motherboard.
c) Speakers contain a magnet which moves back and forth with the changing current, creating vibrations called sound.
3. BUSINESS INFORMATION SYSTEMS
‘A’ Category
1. Knowledge Management System (SM, MTP-FEB 15)
2. System
a) KMS refer to a system for managing knowledge in organizations for supporting creation, capture, storage and dissemination of information.
b) It enables employees to have ready access to the organizations documented base of facts, sources of information and solutions.
a) The system is a set of mutually related, coordinated elements or components that operate together to accomplish objectives by taking inputs and producing outputs in an organized manner.
b) A system contains several subsystems with sub goals, all contributing to meet the overall system goal.
3. Tacit knowledge 4. Atomicity
a) Tacit knowledge, resides in a few often-in just one person and hasn’t been captured by the organization or made available to others.
b) Tacit knowledge is unarticulated and represented as intuition, perspective, beliefs, and values that individuals form based on their experiences.
c) For example – hand-on skills, special know-how, employee experiences.
a) Atomicity requires that each transaction is "all or nothing": if one part of the transaction fails, the entire transaction fails, and the database state is left unchanged.
b) An atomic system must guarantee atomicity in each and every situation, including power failures, errors, and crashes.
5. Online Analytical Processing (OLAP) (SM, PM)
6. Analytical CRM (SM)
a) OLAP is a multi-dimensional analytical tool typically used in data mining, that gathers and process vast amounts of information into useful packets.
b) OLAP is part of the broader category of business intelligence, which also encompasses relational database, report writing and data mining
a) Analytical CRM comprises the analysis and systematic evaluation of customer data using business intelligence functions.
b) The aim is to filter out the key facts from gathered information and gain customer knowledge.
IPCC |35e |Fast Track Material in Information Technology 43
No.1 for CA/CMA & MEC/CEC MASTER MINDS
7. Durability 8. Model base
Durability means that once a transaction has been committed or saved, it will remain so, even in the event of power loss, crashes, or errors.
a) It is the “brain” of the Decision Support System. b) It processes data with the help of data provided
by the user and the database. c) The analysis provided by model base is the key
for user’s decision.
9. MS Office Applications: (MTP-SEP 14) 10. Nucleus FinnOne: (MAY 16-2M)
a) These are various office automation systems made available by Microsoft Corporation which include MS Word, MS Excel, MS PowerPoint, MS Access, etc.
b) Each of these software help to achieve automation of various tasks in the office.
c) It has features such as customized ribbon, back stage view, built-in graphics toolset, enhanced security, etc.
a) FinnOne is a web-based global banking product
designed to support banks and financial solution companies in dealing with assets, liabilities, core financial accounting and customer service.
b) The solution is wholly focused on banking and financial services spanning across solutions in the areas of Retail & Corporate Banking, Cash Management, Relationship Banking, Financial CRM, Credit Risk & Appraisal, EAI, Internet Banking, FX, Basel II, Data warehousing and Analytics.
11. Credit Cards 12. Smart Cards (MTP-OCT 14, MAY 16)
a) A credit card is a plastic card issued by a financial institution that allows its user to borrow pre-approved funds at the point of sale in order to complete a purchase.
b) Credit cards have a credit limit -- the user can borrow during a given period.
c) The credit limit is pre-determined by the card issuer based on the cardholder's credit rating and credit history
a) Smart cards have an embedded microchip instead of magnetic strip.
b) The chip contains all the information a magnetic strip contains but offers the possibility of manipulating the data and executing applications on the card.
c) Three types of smart cards are Contact cards, Contact-less and Hybrid cards.
13. Enterprise Resource Planning System (SM) 14. Supply Chain Management
a) An ERP system is a fully integrated business management system, covering functional areas of an enterprise like Procurement, Inventory, Production, Sales, Logistics, Finance, Accounting and Human Resources.
b) It organizes and integrates operation processes and information flows to make optimum use of resources such as men, material, money and machine, i.e. ERP is the way an Enterprise plans the optimum use of its resources.
a) SCM is the process of planning, implementing and controlling the operations of the supply chain with the purpose to satisfy customer requirements in an efficient way.
b) It covers all movements and storage of raw materials, work-in-process, and finished goods from point-of-origin to point-of-consumption.
c) It integrates supply and demand management, within and across companies.
15. Artificial Intelligence (SM, RTP-NOV 14, MTP-MAR 15)
16. Knowledge base
a) AI is the distinct area of computer science focusing on creating machines that tries to imitate aspects of human behavior, such as to reason, communicate, see, and hear.
b) AI software can use its accumulated knowledge to reason and in some instances learn from experience and thereby modify its subsequent behavior.
c) Expert systems, Pattern recognition, Natural language processing, and many other areas where AI can be applied.
a) This includes data, knowledge, relationships, rules of thumb (heuristics) and decision rules used by experts to solve a particular type of problem.
b) A knowledge base in a computer is equal to the knowledge of an expert or group of experts developed through years of experience in their field.
c) The knowledge base encloses both realistic and heuristic knowledge.
IPCC |35e |Fast Track Material in Information Technology 44
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
17. Consistency 18. Isolation
Consistent state means that there is no violation of any integrity constraints. If an integrity constraint states that all transactions in a database must have a positive value, any transaction with a negative value would be refused.
Transactions must appear to take place in isolation or individual. Isolation requires that multiple transactions occurring at the same time not impact each other’s execution.
19. Electronic purses 20. CRM (MTP-OCT 14)
a) Electronic purse is very similar to a pre-paid card where funds can be directly deducted from the Card to vendor’s POS terminal.
b) When the value on a card is spent, consumers can load additional funds from their accounts to the card.
c) Validation is done through a PIN.
a) It includes the methodologies, technology and capabilities that help an enterprise to manage customer relationships.
b) Allows businesses to develop long-term relationships with established and new customers, while helping to modernize corporate performance.
21. Extensible Business Reporting Language (PM, MTP-FEB 15, MTP-MAY 16)
22. Knowledge management (KM) (SM, PM)
a) XBRL is freely available international standards-based business reporting language developed by accountants for financial reporting.
b) XBRL is a standards-based way to communicate and exchange business information between business systems.
a) It is the process of capturing, developing, sharing, and effectively using organizational knowledge.
b) It refers to a multi-disciplined approach to achieving organizational objectives by making the best use of knowledge.
23. Explicit knowledge 24. Information (RTP-NOV 15)
a) Explicit knowledge is that which can be formalized easily and as a consequence is easily available across the organization.
b) For example – Online tutorials, Policy and procedural manuals.
a) Processing of data is known as information b) Data is a raw fact and can take the form of a
number or statement, such as a date or a measurement, which has some meaning.
25. Special Purpose Planning languages (PM, MTP-MAY 16)
26. General Purpose Planning languages (PM, MTP-MAY 16)
a) These are more limited in what they can do, but they usually do certain jobs better than the general purpose planning languages.
b) Some of the statistical languages such as SAS and SPSS are examples.
a) These allow users to perform many routine tasks, retrieving various data from a database or performing statistical analyses.
b) These languages enable user to tackle abroad range of budgeting, forecasting and other worksheet-oriented problems.
c) Examples are Electronic spreadsheets.
‘B’ Category
27. Business Information System (PM,RTP-NOV 14)
28. Transaction Processing System (SM, MTP-OCT 14, MTP-MAY 16)
a) It is defined as system integrating business functions and information modules for establishing effective communication channels which are useful for making timely and accurate decisions and in turn contribute to organizational productivity and competitiveness.
b) BIS may be defined as systems which integrate information technology, people and business.
a) A TPS is a type of information system that collects, stores, modifies and retrieves the day-to-day data transactions of an enterprise.
b) TPS systems are designed to process transactions instantaneously to ensure that customer data is available to the processes that require it.
c) TPS is also known as transaction processing or real time processing.
IPCC |35e |Fast Track Material in Information Technology 45
No.1 for CA/CMA & MEC/CEC MASTER MINDS
29. Frame based Expert systems (SM) 30. Rule-based systems (SM)
Frame based systems organize all the information (data, description, rules etc.) about a topic into logical units called frames, which are similar to linked records in data files. Rules are then established about how to assemble or inter-relate the frames to meet the user’s needs.
a) Rule-based systems are created by storing data and decision rules as if-then rules. The system asks the user questions and applied the if-then rules to the answers to draw conclusions and make recommendations
b) Rule-based systems are appropriate when a history of cases is unavailable or when a body of knowledge can be structured within a set of general rules.
31. Oracle's FLEXCUBE (SM) 32. Oracle FLEXCUBE Benefits (SM)
a) Oracle FLEXCUBE helps banks transform their business model from disparate operations towards centralization of key functions, such as accounting, customer information, and management information.
b) The centralization of operations is further augmented by role based dashboards that guide business users to take action on critical tasks, track their pending activities, and get insights into customer information and interaction.
c) The application also provides comprehensive product processing capabilities to cater to various lines of business.
Oracle FLEXCUBE empowers universal banks with:
a) Superior Web experience through self-service and assisted channels
b) Improved bank staff productivity with intuitive, role-based dashboards
c) Comprehensive transaction banking capabilities and Straight-Through-Processing (STP)
d) Improved risk management and reporting
‘C’ Category 33. Business Process
(SM, PM, MTP-MAR 15) 34. Desktop Publishing (SM, RTP – MAY 16)
A Business Process is a collection of related, structured activities or tasks that produce a specific service or product (serve a particular goal) for a specific organization.
The Desktop Publishing systems are often supported with laser printers, inkjet printers, scanners and other such devices for producing good quality documents. The desktop publishing systems help in quick production of multiple copies of the document with quality printing.
35. Customer Relationship Management Systems (SM)
36.Strategic-Level Systems: (RTP-NOV 15)
a) Information systems that track all the ways in which a company interacts with its customers and analyze these interactions to optimize revenue, profitability, customer satisfaction, and customer retention.
b) These are specialized applications catering to the need of organizations largely in FMCG (Fast-Moving Consumer Goods) categories.
a) These are the systems for strategic managers to track and deal with strategic issues, assisting in long-range planning.
b) A principle area is tracking changes in the external conditions (market sector, employment levels, share prices, etc.) and matching these with the internal conditions of the organization.
37.Old Pareto Rule “80/20 Rule - CRM (SM,MTP-SEP 15)
38. Human Resources Management System
a) Old Pareto Rule "80/20 rule" emphasizes that most organizations find that approximately 20% of their customer base generates 80% of the profits.
b) It is merely based on the philosophy that indicates that old trustworthy customers are most lucrative and helps in generating profits.
c) It is at the present imperative that businesses make out the noteworthy characteristics of this assemblage, keep hold of these exceedingly desirable customers, and discover ways to augment the size.
a) A software application that coalesce many human resources functions, together with benefits administration, payroll, recruiting and training, and performance analysis and assessment into one parcel.
b) HRMS refers to the systems and processes at the intersection between Human Resource Management and Information Technology.
IPCC |35e |Fast Track Material in Information Technology 46
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
39. Infosys’ Finacle (SM) 40. Key Modules Of Finacle (SM)
a) Finacle core banking solution is a comprehensive, agile, componentized yet integrated business solution, addressing all the core needs of banks, in easy-to-configure modules.
b) With a 360 degree single source view into customer accounts, banks can empower customers with relevant information an delight them with the right offerings, presented at the right time through the right channel.
a) Enterprise customer information b) Consumer banking c) Corporate banking d) Trade finance e) Customer analytics f) Wealth management g) Islamic banking h) Payments i) Origination & j) Dashboards
41. Example-based Expert system (SM)
a) In Example-based Expert system, developers enter the case facts and results.
b) Through induction the ES converts the examples to a decision tree that is used to match the case at hand with those previously entered in the knowledge base.
4. BUSINESS PROCESS AUTOMATION THROUGH APPLICATION SOFTWARE
‘A’ Category
1. Business Process Automation (SM, RTP-MAY 15, NOV 14-2M, MTP-MAY 16)
2. TALLY
a) Removing the human element from existing business processes by automating the repetitive or standardized process components.
b) The primary reasons for automation by enterprises are: Cost Saving, remain competitive, fast service to customers.
c) Objectives are Confidentiality, Integrity, Availability, Timeliness.
a) It is an accounting application that helps entity to automate processes relating to accounting of transactions.
b) It also helps to achieve automation of few processes in inventory management.
c) It has features such as Remote Access Capabilities, Tax Audit and Statutory Compliance, Payroll, Excise for Manufacturers, Multilingual Support, TDS, VAT etc.
3. SAP R/3 4. Vehicle Tracking System
a) It is ERP software, which allows an entity to integrate its business processes.
b) It has the features such as time management, reporting and analytics, budget monitoring, workflow approval, sales management, team management, leave management, travel management, recruitment management and demand planning.
a) Applications allowing owner of goods to check the temperature of cold stored goods while in transit.
b) It has features such as GPS based location, GPRS connection based real-time online data-logging and reporting, route accuracy on the fly while device is moving, real-time vehicle tracking, SMS & e-mail notifications etc.
5. Information Worker Software 6. Enterprise Infrastructure Software
Addresses individual needs required to manage and create information for individual projects within departments. E.g. Spreadsheets, CAAT (Computer Assisted Audit Tools), etc.
Provides capabilities required to support enterprise software systems. E.g.: email servers, Security software.
IPCC |35e |Fast Track Material in Information Technology 47
No.1 for CA/CMA & MEC/CEC MASTER MINDS
7. File Management System 8. Educational Institute Management Systems
a) These allow office records to be kept in soft copy and easy tracking of the same.
b) It has features such as web access, search, Microsoft office integration, records management software, electronic forms (e-forms), calendar, etc.
a) ICAI, itself is a good example of Educational Institute Management Systems.
b) A student based on his/her registration number can file many documents online including exam forms.
c) It has features such as student’s registration, student’s admission, fee collection, student’s attendance, result management and result analysis.
9. Real-time Processing 10. Network Virtualization (RTP-MAY 15)
a) Real time processing is a subset of interactive or online processing. Input is continuously, automatically acquired from sensors.
b) After the system is finished responding, it reads the next set of input data immediately to process that.
c) This system doesn't need a user to control it, it works automatically.
a) It is the process of combining hardware and software network resources and network functionality into a single, software-based administrative entity, a virtual network.
b) Allows a large physical network to be provisioned into multiple smaller logical networks.
c) This behavior allows administrators to improve network traffic control, enterprise and security.
11. Grid Computing 12. Online Processing
a) It is a computer network in which each computer's resources are shared with every other computer in the system. It is a special kind of distributed computing.
b) Processing power, memory and data storage are all community resources that authorized users can tap into and leverage for specific tasks.
c) This system can be as simple as a collection of similar computers or as complex as inter-networked systems.
a) Data is processed immediately while it is entered, the user usually only has to wait a short time for a response. (Example: games, word processing, booking systems).
b) Interactive or online processing requires a user to supply an input.
c) It enables the user to input data and get the results of the processing of that data immediately.
13. Cloud Computing (SM, PM) 14. Input Controls
a) It is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility over a network (typically the Internet).
b) Clouds can be classified as public, private or hybrid
c) The common cloud computing service models are software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a service (IaaS).
a) These are responsible for ensuring the accuracy and completeness of data and instruction input into an application system.
b) These are important since substantial time is spent on inputting data which involves human intervention and are therefore prone to errors and fraud
15. ERP Software 16. Access Controls (MTP-SEPT 14)
a) It is business management software that allows an organization to use a system of integrated applications to manage the business.
b) used by entities to manage resources optimally and to maximize the three Es i.e. Economy, Efficiency and Effectiveness
a) Access controls are implemented with an access control mechanism and links the authentic users to the authorized resources they are permitted to access.
b) Cryptography, Passwords, Personal Identification Numbers (PIN) and Identification Cards are some of the examples of access controls.
IPCC |35e |Fast Track Material in Information Technology 48
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
17. Output Controls 18. Batch Processing
a) These ensure that the data delivered to users will be presented, formatted and delivered in a consistent and secured manner.
b) Whatever the type of output, it should be ensured that the confidentiality and integrity of the output is maintained and that the output is consistent.
a) It is defined as a processing of large set of data in a specific way, automatically, without needing any user intervention.
b) The data is first collected, and then batch-processed, so all the collected data is processed in one step.
c) Batched jobs can take a long time to process.
19. Middleware 20. Database Controls
Middleware that allow computers that are connected on networks to communicate with each other.
Protecting the integrity of a database when application software acts as an interface to interact between the user and the database are called the update controls.
21. Software as a Service (SM, PM) 22. Virtualization (SM)
a) A software delivery method that provides access to software and its functions remotely as a Web-based service.
b) SaaS is a model of software deployment where an application is hosted as a service provided to customers across the Internet.
c) By removing the need to install and run an application on a user's own computer
a) It is the process of creating logical computing resources from available physical resources.
b) This is accomplished using virtualization software to create a layer of abstraction between workloads and the underlying physical hardware.
‘B’ Category
23. Hardware virtualization (SM) 24. Downsizing (SM) Hardware Virtualization or Platform Virtualization refers to the creation of a virtual machine that acts like a real computer with an operating system. The basic idea of Hardware virtualization is to consolidate many small physical servers into one large physical server so that the processor can be used more effectively.
Moving to smaller computing platforms, such as from mainframe systems to networks of personal computers and servers.
25. Enterprise Software 26. Data Processing Controls: (MTP-MAR 15)
Addresses an enterprise’s needs and data flow in a huge distributed environment. E.g. ERP Applications like SAP.
a) Data processing controls perform validation checks to identify errors during processing of data.
b) They are required to ensure both the completeness and accuracy of the data being processed. Run-to-Run Totals, Reasonableness Verification, Edit Checks, Field Initialization, Exception Reports and Existence/Recovery Controls are some of the examples of Data Processing Controls.
27. Business Application: (MTP-FEB 15) 28. Error Handling in CBIS: (RTP- MAY 16) a) Business Application is defined as a computer
program used to fulfill a person’s need for regular occupation or commercial activities like keeping track of inventory levels, checking for bank account balances, and all other business activities. Business.
b) Applications may be classified on the basis of – Nature of processing, Source of application, Nature of business and Functions covered /nature of application.
This ensures that errors detected at any stage of processing receive prompt corrective action and are reported to the appropriate level of management.
IPCC |35e |Fast Track Material in Information Technology 49
No.1 for CA/CMA & MEC/CEC MASTER MINDS
29. Digital Signatures (RTP- MAY 16) 30. Primary responsibilities of a Certificate Authority (MTP-MAY16)
Digital Signatures establish the authenticity of persons and prevent the denial of messages or contracts when data is exchanged electronically.
a) Positively identifying entities requesting certificates;
b) Issuing, removing, and archiving certificates; c) Protecting the Certificate Authority server; d) Maintaining a namespace of unique names for
certificate owners; e) Serving signed certificates to those needing to
authenticate entities; and f) Logging Activity
31. Business Intelligence (RTP-MAY 15, MTP- MAY 16)
32. Storage Virtualization: (MAY16-2M)
a) BI is a set of theories, methodologies, architectures, and technologies that transform raw data into meaningful and useful information for business purposes.
b) BI, in simple words, makes interpreting voluminous data friendly.
c) Making use of new opportunities and implementing an effective strategy can provide a competitive market advantage and long-term stability.
a) Storage virtualization is the apparent pooling of data from multiple storage devices, even different types of storage devices, into what appears to be a single device that is managed from a central console.
b) Storage virtualization helps the storage administrator perform the tasks of backup, archiving, and recovery more easily -- and in less time -- by disguising the actual complexity of a Storage Area Network
33. Network Virtualization: (SM, PM)
a) Network virtualization is a method of combining the available resources in a network by splitting up the available bandwidth into channels, each of which is independent from the others, and each of which can be assigned (or reassigned) to a particular server or device in real time.
b) This allows a large physical network to be provisioned into multiple smaller logical networks and conversely allows multiple physical LANs to be combined into a larger logical network.
‘C’ Category
34. Application Software Package (SM) 34. Virtual Organization (SM)
A set of prewritten, pre-coded application software programs that are commercially available for sale or lease.
Organization using networks to link people, assets and ideas to create and distribute products and services without being limited to traditional organizational boundaries or physical location.
35. Customization (SM)
Modification of a software package to meet an organization's unique requirements without destroying the package software's integrity.
IPCC |35e |Fast Track Material in Information Technology 50
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
5. BUSINESS PROCESS MANAGEMENT & IT
‘A’ Category
1. Process (RTP-NOV 14) 2. Process
(From Business perspective) Process is a coordinated and standardized flow of activities performed by people or machines, which can traverse functional boundaries to achieve a business objective and creates value for internal or external customers.
(From General perspective) Process is defined as a sequence of events that uses inputs to produce outputs.
3. Process management 4. Business Process
a) It is a system of interlinked processes which involves intensive efforts to map, improve and adhere to organizational processes.
b) It also performs the activities of planning and monitoring the performance of a process.
a) It consists of a set of activities that are performed in co-ordination in an organizational and technical environment.
b) These activities jointly realize a business goal.
5. Radical Redesign (SM) 6. Total Quality Management
(MTP-SEP 14, MTP-MAR 15, RTP-MAY 15)
a) This means getting down to the fundamental – where necessary throwing away the old, out of date rules – and recognizing that quality and innovation are more important to profit than cost.
b) In a nutshell, a “clean slate approach” of BPR says that “Whatever you were doing in the past is all wrong”, do not get biased by it or reassemble, the new system is to be redesigned afresh.
a) It is the organization-wide effort to install and make permanent a climate in which it continuously improves its ability to deliver high-quality products and services to customer.
b) TQM is a comprehensive and structured approach to organizational management that seeks to improve the quality of products and services through ongoing refinements in response to continuous feedback.
7. System flowchart (SM) 8. Accounting Information System
(MTP-MAR 15)
a) A tool for documenting a physical system in which each component is represented by a symbol that visually suggests its function.
b) System flowcharts, showing controls at a physical or resource level
a) An Accounting Information System (AIS) is defined as a system of collection, storage and processing of financial and accounting data that is used by decision makers.
b) An accounting information system is generally a computer-based method for tracking accounting activity in conjunction with information technology resources.
9. Business Process Reengineering (SM) 10. Entity-Relationship Diagrams
(RTP-NOV 15)
a) BPR is the fundamental rethinking and radical redesign of processes to achieve dramatic improvement, in critical, contemporary measures of performance such as cost, quality, service and speed.
b) Business Process Re-engineering is also known as Business Process Redesign, Business Transformation, or Business Process Change Management.
a) It is a data modeling technique that creates a graphical representation of the entities, and the relationships between entities, within an information system.
b) Entity is defined as a distinguishable object that exists in isolation and is described by a set of attributes.
c) Relationship is the association among several entities
IPCC |35e |Fast Track Material in Information Technology 51
No.1 for CA/CMA & MEC/CEC MASTER MINDS
11. Data Flow Diagrams (RTP-MAY 15, MAY 16)
12. Flowchart (RTP-MAY 15)
a) A graphical representation of the flow of data through an information system. DFDs may be partitioned into levels that represent increasing information flow and functional detail.
b) Major components: Process, Entity, Dataflow and Data store.
a) It is diagram prepared by the programmer of the sequence of steps involved in solving a problem.
b) It defines the strategy and thread of logic followed in the program.
c) It is like a blueprint, in that it shows the general plan, architecture, and essential details of the proposed structure.
13. Decision Trees (MTP-OCT 14, MAY 16)
14. Decision Table (RTP-NOV 14,MTP-FEB 15)
a) It is a collection of a basis (condition) and a conclusion (action).
b) It is a decision support tool that uses a tree-like model of decisions and their possible consequences, including chance event outcomes, resource costs, and utility
c) It is a one way to display an algorithm.
a) It is table which may accompany a flowchart defining the possible contingencies that may be considered within the program and the appropriate course of action for each contingency
b) It is a tabular representation of program logic. c) Displays all conditions and the appropriate
actions to be taken for set of conditions.
15. Six Sigma (MTP-OCT 14, MAY 16, RTP-NOV 14,
MAY 16-2M) 16. Business Process Management (SM)
a) Six Sigma is a set of strategies, techniques, and tools for process improvement. It seeks to improve the quality of process outputs and minimizing inconsistency in manufacturing and business processes.
b) Objectives: reduce process cycle time, reduce pollution, reduce costs, increase customer satisfaction, and increase profits.
a) BPM is the methodology used by enterprises to improve end-to-end business processes in five stages namely: design, modeling, execution, monitoring and optimization.
b) BPM is defined as: “The achievement of an organization’s objectives through the improvement, management and control of essential business processes”
‘B’ Category
17. Re-engineering (SM) 18. Value chain (MTP-FEB 15)
a) It is the fundamental rethinking and radical redesign of business processes to achieve dramatic improvements in critical, contemporary measures of performance, such as cost, quality, service and speed.
b) Re-engineering emphasized a holistic focus on business objectives and how processes related to them, encouraging full-scale recreation of processes rather than iterative optimization of sub-processes
a) Value chain is defined as a chain of activities that a firm operating in a specific industry performs in order to deliver a valuable product or service for the market.
b) The idea of the Value Chain is based on the process view of organizations.
19. Accounting (Or) Book keeping life cycle 20. Order to cash process flow (O2C)
a) It covers the business processes involved in recording and processing accounting events of a company.
b) It begins when a transaction or financial event occurs and ends with its inclusion in the financial statements.
a) It covers all the business processes relating to fulfilling customer requests for goods or services.
b) It involves transactional flow of data from the initial point of documenting a customer order to the final point of collecting the cash.
IPCC |35e |Fast Track Material in Information Technology 52
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
21. Procure to pay (purchase to pay or P2P) life cycle 22. Entity in DFD: (MTP-SEP 14,MAY 16 )
a) It covers all the business processes relating to obtaining raw materials required for production of a product or for providing a service.
b) It involves the transactional flow of data from the point of placing an order with a vendor to the point of payment to the vendor.
a) An entity represents the source or destination of data and is often represented as rectangles (a diagonal line across the right-hand corner in DFD.
b) Entities either provide data to the system (Source) or receive data from it (Sink).
c) Entities are also referred to as agents, terminators, or source/sink.
23. BPM lifecycle (SM) 24. Business Strategy: a) It is a generic process optimization
methodology defined explicitly for business processes.
b) It provides a high-level approach from a phased perspective without prescribing specific techniques such as those found in Six Sigma or Lean.
At the highest level, the strategy of the company is specified, which describes its long term concepts to develop a sustainable competitive advantage in the market.
THE END
Copyrights Reserved
To MASTER MINDS, Guntur
Cell: 98851 25025 / 26
Visit us @ www.mastermindsindia.com Mail: [email protected]
Facebook Page: Masterminds For CA Youtube Channel: Masterminds For CA
CA - IPCC
COURSE MATERIAL
Quality Education
beyond your imagination...
PART C – DIFFERENCES
Page 53
IPCC |35e |Fast Track Material in Information Technology 54
No.1 for CA/CMA & MEC/CEC MASTER MINDS
1. TELECOMMUNICATIONS AND NETWORKS
1. Guided Vs. Unguided Media. (PM)
No Guided Media Unguided Media
1. Media that provide a conduit (channel) from one device to another.
Consists of a means for the data signals to travel but nothing to guide them along a specific path.
2. It uses a "cabling" system that guides the data signals along a specific path.
It passes through a vacuum; it is independent of a physical pathway.
3. Example – Coaxial Cable, Twisted Pair, Fiber Optic Cable.
Example – Infrared Waves, Micro Waves, Radio Waves etc.
2. Serial Transmission Vs. Parallel Transmission. (SM, PM, MTP-SEP 14, MTP- APR 14, RTP MAY-15)
No. Serial Transmission Parallel Transmission
1. The data bits are transmitted serially one after another.
The data bits are transmitted simultaneously.
2. Data is transmitted over a single wire and is thus relatively slower.
Data is transmitted over eight different wires and is thus relatively faster.
3. It is a cheaper mode of transferring data. It is relatively expensive mode of transferring data.
4.
5. It is useful for long distance communications. Not suited for long distance communications.
3. Synchronous Transmission Vs. Asynchronous Transmission. (SM, PM, MTP-OCT 14, RTP- NOV 14)
No. Synchronous Transmission Asynchronous Transmission 1. Allows characters to be sent down the
line without Start-Stop bits (control characters).
Each data word is accompanied with start and stop bits.
2. The synchronous device is more expensive.
It is relatively cheaper.
3. Chances of data loss are relatively higher. More reliable as the start and stop bits ensure that the sender and the receiver remain in step with one another.
4. It is more efficient. It is relatively less efficient.
4. Differentiate Host Based & Network Intrusion Detection System. (PM)
Host Based Intrusion Detection System Network Based Intrusion Detection System
Deterrence Strong deterrence for insiders Strong deterrence for Outsiders Detection Strong insider detection, weak outsider
detection Strong outsider detection, weak insider detection
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
IPCC |35e |Fast Track Material in Information Technology 55
Attack Anticipation
Good at trending and detecting suspicious behavior patterns
None
Damage Assessment
Excellent for determining extent of compromise
Very weak damage Assessment capabilities
Response Weak real-time response, good for long term attacks
Strong response against outsider attacks
Scope Narrow in scope, monitors specific activities Broad in scope Dependency Host dependent Host independent.
5. Client-Server architecture Vs Peer to Peer Architecture. (PM, RTP-NOV 14)
No Client / Server Peer- to- Peer
1. A client computer typically communicates with servers, not with other clients.
Every computer is equal and can communicate with any other computer on the network to which it has been granted access rights.
2. A central server handles all security and file transactions.
Each machine shares its own resources and handles its own security.
3. It is more expensive as it requires a central file server, server software and client licenses.
It is relatively less expensive as it does not require a dedicated machine, server software or special client licenses.
4. Backup is centralized on the server; managed by network administrator. Backup devices and media required at server only.
Backup is decentralized; managed by users. Backup devices and media are required at each workstation.
5. The performance is relatively high as the server is dedicated and does not handle other tasks.
The performance is relatively low.
6. In case of failure of server, the whole network fails.
No single point failure affects the network.
7. C/S model relies on the power and stability of a single computer i.e., Server.
P2P gives each workstation equivalent capabilities and relies heavily on the power and bandwidth of each individual computer.
8. Example – Email, network printing, and the World Wide Web.
Example – Napster, Gnutella, Freenet, Bit Torrent and Skype.
6. Star Network Vs. Ring Network. (RTP-NOV 14)
No. Star Network Ring Network 1. Here all nodes are connected to a central
computer/hub through dedicated cables. Here all nodes are connected in the form of a circular chain.
2. Communication takes place between the nodes through the hub/computer only.
Communication takes place by each node to receive and check for the message.
3. A broken connection between hub/central computer and node does not affect the rest of the network.
A broken connection between nodes leads to failure of entire network.
4. Failure in the hub/central computer affects all nodes connected to that hub.
Failure in one node does not affect the entire system.
5. The signal becomes weak when it has to travel long distances. To avoid it, repeaters are required to be used.
Repeaters are not needed. Every computer acts as a repeater.
6. It is very easy to add/remove a node from the network.
It is difficult to add/remove a node from the system.
IPCC |35e |Fast Track Material in Information Technology 56
No.1 for CA/CMA & MEC/CEC MASTER MINDS
7. Transport Layer Vs. Network Layer of OSI Model. (MTP FEB-15, MTP MAR-15)
Transport Layer:
• Transport Layer or Layer 4 ensures reliable and transparent transfer of data between user processes, assembles and disassembles message packets and provides error recovery and flow control.
• Multiplexing and encryption are undertaken at this layer level. This means that the Layer can keep track of the segments and retransmit those that fail.
Network Layer:
• The Network Layer or Layer 3 provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks, while maintaining the quality of service requested by the Transport Layer.
• This Layer makes a choice of the physical route of transmission; creates a virtual circuit for upper layers to make them independent of data transmission and switching; establishes, maintains, terminates connections between the nodes and ensure proper routing of data.
8. Half Duplex Mode Vs. Full Duplex Mode. (RTP-NOV 15)
Half-Duplex Mode:
• In Half-Duplex mode, (sometimes called an alternating connection or semi-duplex) the data flows in one direction or the other, but not both at the same time.
• This type of connection makes it possible to have bidirectional communications using the full capacity of the line.
• For example: Walkie Talkie.
• In this, the entire capacity of a channel is taken over by whichever of the two devices is transmitting at the time.
Full-Duplex Mode:
• In Full-Duplex mode, the data flow in both directions simultaneously.
• Each end of the line can thus transmit and receive at the same time, which means that the bandwidth is divided in two for each direction of data transmission if the same transmission medium is used for both directions of transmission.
• For example: Mobile Phones.
• In this, signals going in either direction share the capacity of the link wither by containing two separate physical links (one for sending and the other for receiving) or by dividing the capacity of the channel between signals travelling in opposite direction.
9. Circuit Switching Vs. Packet Switching. (RTP-NOV 15)
Circuit Switching:
• A Circuit Switching network is one that establishes a fixed bandwidth circuit (or channel) between nodes and terminals before the users may communicate, as if the nodes were physically connected with an electrical circuit.
• The route is dedicated and exclusive, and released only when the communication session terminates. Circuit switching is what most of us encounter on our home phones. A single circuit is used for the entire duration of the call.
• Applications which use circuit switching go through three phases: Establish a Circuit, Transfer of data and Disconnect the Circuit.
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
IPCC |35e |Fast Track Material in Information Technology 57
Packet Switching:
• It is a sophisticated means of maximizing transmission capacity of networks. Packet switching refers to protocols in which messages are broken up into small transmission units called packets, before they are sent.
• Each packet is transmitted individually across the net. The packets may even follow different routes to the destination.
• Since there is no fixed path, different packets can follow different path and thus they may reach to destination out of order.
10. Presentation Layer Vs. Session Layer of OSI Model. (RTP-NOV 15)
Presentation Layer:
• This layer at times referred as Syntax Layer also, is usually a part of an operating system, that converts incoming and outgoing data from one presentation format to another (for example, from a text stream into a popup window with the newly arrived text).
• The presentation service data units are then encapsulated into Session Protocol Data Units, and moved down the stack. It further controls on screen display of data, transforms data to a standard application interface.
• Encryption, data compression can also be undertaken at this layer level.
Session Layer:
• This layer sets up, coordinates, and terminates conversations, exchanges, and dialogs between the applications at each end.
• It deals with session and connection coordination. It provides for full-duplex, half-duplex, or simplex operation, and establishes check pointing, adjournment, termination, and restart procedures.
• The OSI model made this layer responsible for "graceful close" of sessions also.
11. Hardware Encryption Vs. Software Encryption (RTP-NOV 14)
Hardware Encryption:
• Hardware Encryption devices are available at a reasonable cost, and can support high speed traffic.
• If the Internet is being used to exchange information among branch offices or development collaborators, for instance, use of such devices can ensure that all traffic between these offices is secure.
Software Encryption:
• Software Encryption is typically employed in conjunction with specific applications.
• Certain electronic mail packages, for example, provide encryption and decryption for message security.
12. Difference between Public Data Network and Private Data Network (RTP-MAY 15)
Public Data Network:
1. A Public Data Network is defined as a network shared and accessed by users not belonging to a single organization.
2. It is a network established and operated by a telecommunications administration, or a recognized private operating agency, for the specific purpose of providing data transmission services for the public.
3. The Internet is an example of a Public Data Network.
IPCC |35e |Fast Track Material in Information Technology 58
No.1 for CA/CMA & MEC/CEC MASTER MINDS
Private Data Network:
1. Private Data Network provides businesses, government agencies and organizations of all sizes as a dedicated network to continuously receive and transmit data critical to both the daily operations and mission critical needs of an organization.
2. This is a network that is not available to the outside world.
3. The Intranet is an example of a Private Data Network.
13. Difference between Thick client and Thin Client (RTP - MAY 15)
Thick Client:
• A Thick client is a client that performs the bulk of any data processing operations itself, and does not necessarily rely on the server.
• Unlike thin clients, thick clients do not rely on a central processing server because the processing is done locally on the user system, and the server is accessed primarily for storage purposes.
• For that reason, thick clients often are not well-suited for public environments. To maintain a thick client, IT needs to maintain all systems for software deployment and upgrades, rather than just maintaining the applications on the server.
• For example – Personal Computer.
Thin Client:
• A Thin client uses the resources of the host computer.
• A thin client generally only presents processed data provided by an application server, which performs the bulk of any required data processing.
• A thin client machine is going to communicate with a central processing server, meaning there is little hardware and software installed on the user's machine.
• A device using web application (such as Office Web Apps) is a thin client.
14. Difference between Broadcast Networks and Switched Networks. (RTP - MAY 15)
Broadcast Networks:
• In Broadcast networks, data transmitted by one node is received by many, sometimes all, of the other nodes.
• This refers to a method of transferring a message to all recipients simultaneously.
• For example – a corporation or other voluntary association, that provides live television or recorded content such as movies, newscasts, sports, public affairs programming, and other television programs for broadcast over a group of radio stations or television stations.
Switched Networks
• In switched-communication networks, the data transferred from source to destination is routed through the switch nodes.
• The way in which the nodes switch data from one link to another, as it is transmitted from source to destination node, is referred to as a switching technique.
• Three common switching techniques are Circuit Switching, Packet Switching, and Message Switching.
15. Difference between C2B and C2C e-Commerce (RTP - MAY 15)
Consumer-to-Business e-Commerce:
• In C2B e-Commerce model, consumers directly contact with business vendors by posting their project work online so that the needy companies review it and contact the consumer directly with bid.
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
IPCC |35e |Fast Track Material in Information Technology 59
• The consumer reviews all the bids and selects the company for further processing. Some examples are guru.com, rentacoder.com, getacoder.com, freelancer.com.
Consumer-to-Consumer e-Commerce:
• C2C e-Commerce is an Internet - facilitated form of commerce that has existed for the span of history in the form of barter, flea markets, swap meets, yard sales and the like.
• C2C e-Commerce sites provide a virtual environment in which consumers can sell to one another through a third-party intermediary.
16. Ring Network Vs Mesh Network.
No. Mesh Network Ring Network
1. In this structure, there is a random connection of nodes using communication links.
In this topology, the network cable passes form one node to another until all nodes are connected in the form of loop or ring.
2. A mesh network may be fully connected or connected with only partial links
There is direct point to point link between 2 neighboring nodes and these links are unidirectional.
3. The reliability is very high as there are always alternate paths available if direct link between two nodes is down.
Ring network can span longer distances than other types of network
4. Network problems are easier to diagnose
Adding or removing computers can disrupt the network.
5. Cost of installation and maintenance is high.
They offer high performance for a small number of workstation or for larger networks where each workstation has similar work load.
17. Internet Vs. Intranet.
No. Internet Intranet
1. It is a global network of computer networks that are formed by various educational, commercial, Government, non-profit and military organizations.
It is a type of information system that facilitates communication within the organization.
2. This is not being developed and controlled by a single person or organization.
It is developed and controlled by private individuals and organizations.
3. It is a public network. So, anybody can log into the network and perform any action at his choice.
It is a private network and access to private individuals is restricted by passwords.
4. Thousands of databases exist which can be accessed and used by private individuals.
Only authorized persons are allowed to access the data available in organization’s databases.
5. An internet can be defined as a network of networks.
An intranet can be a LAN or WAN that belongs exclusively to a corporation.
6. Any node can transmit a message to any other node, along with communication channels, via the intermediate nodes. Internet uses provides Communication, Data Retrieval, Data publishing, etc.
Several applications of Intranet include: a. Supplier management b. Inventory management c. Distribution management d. Channel management
7. Acts as an information service to retrieve the information worldwide.
Acts as an information service within the organization.
IPCC |35e |Fast Track Material in Information Technology 60
No.1 for CA/CMA & MEC/CEC MASTER MINDS
2. INFORMATION SYSTEMS AND ITS FUNDAMENTALS
1. RAM Vs. ROM. (PM, RTP - NOV 15)
No. RAM ROM 1. RAM is a volatile memory and when the
computer is turned off, RAM loses its data. When the computer is turned on again, operating system and other files are once again loaded into RAM usually from the hard disk.
Unlike RAM, ROM is non-volatile. The contents of ROM remain even after the computer is switched off.
2. This is Read/Write memory wherein information can be read as well as modified.
ROM used to be read-only; however, the new versions of ROM allow limited rewriting making it possible to upgrade firmware such as the BIOS.
2. Hierarchical Database Model Vs. Network Database Model. (PM, MTP - FEB 15)
No. Hierarchical Database Model Network Database Model 1. The hierarchical model permits a record to
be a member of only one set at one time. Unlike the hierarchical mode, the network model permits a record to be a member of more than one set at one time.
2. The hierarchical data structure implements one-to-one and one-to-many relationships.
The network model allows us to represent one-to-one, one-to-many and many-to-many relationships.
3. Each parent record may have one or more child records, but no child record may have more than one parent record.
Each parent record may have one or more child records, and even a child record may have more than one parent record.
4. The hierarchical model does not represent redundancy in data efficiently.
The network model is able to represent redundancy in data more efficiently than in the hierarchical model.
5. The hierarchical data structures require specific entrance points to find records in a hierarchy.
The network data structures can be entered and traversed more flexibly.
3. CISC Vs. RISC. (PM,RTP - NOV 14) Complex Instruction Set Computer (CISC):
a) If the control unit contains a number of micro-electronic circuitry to generate a set of control signals and each micro- circuitry is activated by a micro-code, this design approach is called CISC design.
b) Examples of CISC processors are: Intel 386, 486, Pentium, Pentium Pro, Pentium II, Pentium III processors etc.
c) CISC chips have a large, variable length and complex instructions and generally make use of complex addressing modes.
d) But at the same time, they are complex as well as expensive to produce.
e) Now-a-days, most of the personal computers use CISC processors. Reduced Instruction Set Computer (RISC):
a) To execute each instruction, if there is separate electronic circuitry in the control unit, which produces all the necessary signals, this approach of the design of the control section of the processor is called RISC design. It is also called hard-wired approach.
b) Examples of RISC processors: IBM RS6000, MC88100 processors etc. RISC processors use a small and limited number of instructions and mostly use hardwired control unit.
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
IPCC |35e |Fast Track Material in Information Technology 61
c) These consume less power and have high performance.
d) However, RISC processors are faster, less complex and less expensive than CISC processors because of their simpler design.
e) Now-a-days, most of the workstation computers use RISC processors.
4. Primary Storage Vs. Secondary Storage.
No. Primary Storage Secondary storage
1. Added to the system as a part and parcel of the circuitry.
Added to the system as a supplementary to primary storage.
2. It is electronic in nature and is usually supplied in the form of chips.
Magnetic or optical in nature and supplied in the form of tapes and disks.
3. Provides Random access to data. Provides Sequential / direct access to data.
4. Volatile i.e. its contents are lost when power is lost.
Non-volatile i.e. it does not lose its contents even when the power is lost.
5. Low capacity. High capacity.
6. Fast access to data. Slow access to data.
7. High cost. Low cost.
8. Generally a computer consists of few MB’s of memory.
Generally a computer consists of few GB’s to TB’s of memory.
5. Difference between Hardware Resources and Software Resources (RTP - MAY 15)
Hardware Resources:
• These refer to Machines - computers, video monitors, magnetic disk drives, printers, optical scanners and Media - floppy disks, magnetic tape, optical disks, plastic cards, paper forms.
Software Resources:
• These refer to Programs - operating system programs, spreadsheet programs, word processing programs, payroll programs and Procedures - data entry procedures, error correction procedures, paycheck distribution procedures.
6. Connection Oriented Network Vs. Connection less Network. (RTP - MAY 16)
Connection Oriented Networks:
In connection oriented service, a connection is first established and then data is exchanged like it happens in case of telephone networks.
When connection is established we send the message or the information and then we release the connection.
Connectionless Networks:
In connectionless networks, the data is transferred in one direction from source to destination without checking that destination is still there or not, or if it is prepared to accept the message.
Data which is being exchanged in fact has a complete contact information of recipient and at each intermediate destination, it is decided how to proceed further like it happens in case of postal networks. Example of Connectionless service is UDP (User Datagram Protocol).
IPCC |35e |Fast Track Material in Information Technology 62
No.1 for CA/CMA & MEC/CEC MASTER MINDS
3. BUSINESS INFORMATION SYSTEMS
1. Data Vs. Information. (PM)
No. Data Information
1. Data is raw and unorganized fact that needs to be processed.
When data is processed, organized, structured or presented in a given context so as to make it useful, it is called Information.
2. Data in itself is meaningless and is the lowest level of knowledge.
Information is the second level of knowledge.
3. Observations and recordings are done to obtain data.
Analysis of data is done to obtain information.
2. Role-based Access Control Vs. Rules-based Access Control. (PM, RTP - MAY 15)
Role-based Access Control (RBAC):
a) RBAC largely eliminates discretion when providing access to objects. Instead, administrators or automated systems place subjects into roles.
b) Subjects receive only the rights and permissions assigned to those roles.
c) RBAC uses a centrally administered set of controls to determine how subjects and objects interact. When an employee changes jobs, all previous access is removed, and the rights and permissions of the new role are assigned.
d) RBAC enforces static constraints based on a user’s role. It is the best system for an organization that has high turnover.
Rules-based Access Control (RAC):
a) RAC takes into account the data affected, the identity attempting to perform a task, and other triggers governed by business rules.
b) RAC uses specific rules that indicate what can and cannot happen between a subject and an object. A manager, for example, has the ability to approve his/her employees’ hours worked.
c) However, when s/he attempts to approve his/her own hours, a rule built into the application compares the employee record and the user, sees they are the same, and temporarily removes approval privilege. It is not necessarily identity based.
3. Explicit knowledge Vs. Tacit knowledge. (PM, MTP-MAR 15, RTP-NOV 14, MAY15 - 4M)
Explicit knowledge:
a) Explicit knowledge is that knowledge which can be formalized easily and as a consequence is easily available across the organization.
b) Explicit knowledge is articulated, and represented as spoken words, written material and compiled data.
c) This type of knowledge is codified, easy to document, transfer and reproduce.
d) For example - Online tutorials, Policy and procedural manuals.
Tacit knowledge:
a) Tacit knowledge, on the other hand, resides in a few often-in just one person and hasn’t been captured by the organization or made available to others.
b) Tacit knowledge is unarticulated and represented as intuition, perspective, beliefs, and values that individuals form based on their experiences.
c) It is personal, experimental and context specific. It is difficult to document and communicate the tacit knowledge.
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
IPCC |35e |Fast Track Material in Information Technology 63
d) For example - hand-on skills, special know-how, and employee’s experiences.
4. Information Vs. Knowledge. (PM, RTP - NOV 14)
No. Information Knowledge
1. Information is piecemeal, fragmented and particular.
Knowledge is structured, coherent, and often universal.
2. Information is timely, transitory, and may even be short-lived.
Knowledge is of enduring significance.
3. Information is a flow of messages. Knowledge is a stock, largely resulting from the flow, in the sense that the “input” of information may affect the stock of knowledge by adding to it, restructuring it, or changing it in any way.
4. Information is acquired by being told.
Knowledge can be acquired by thinking. Thus, new knowledge can be acquired without new information being received.
5. Difference between Strategic-Level Systems and Operational-Level Systems (RTP - MAY 15)
Strategic-Level Systems:
• These systems are strategic managers to track and deal with strategic issues that assist in long-range planning.
• A principle area is tracking changes in the external conditions (market sector, employment levels, share prices, etc.) and matching these with the internal conditions of the organization.
Operational-Level Systems:
• Support operational managers tracking elementary activities. These can include tracking customer orders, invoice tracking, etc.
• Operational-level systems ensure that business procedures are followed.
4. BUSINESS PROCESS AUTOMATION THROUGH APPLICATION SOFTWARE
Cloud Computing:
a) Suited for any size of data storage
b) Suited for both standard or day to day and computational intensive tasks.
c) Very high uptime availability
d) Provide sharing of infrastructure and thus help to reduce cost.
Grid Computing:
a) Suited for big size of data storage
b) Suited for computational intensive tasks only.
c) Very high uptime availability
d) Provide sharing of infrastructure and thus help to reduce cost.
1. Cloud Computing Vs. Grid Computing. (SM, PM)
Copyrights Reserved
To MASTER MINDS, Guntur
IPCC |35e |Fast Track Material in Information Technology 64
No.1 for CA/CMA & MEC/CEC MASTER MINDS
2. Manual Information Processing Cycle Vs. Computerized Information Processing Cycle. (PM, MTP-OCT 14, MAY 16, RTP-NOV 14)
No. Manual Information Processing Cycle
Computerized Information Processing Cycle
1.
Systems where the level of manual intervention is very high. For example- Evaluation of exam papers, teaching and operations in operation theatres.
Systems where computers are used at every stage of transaction processing and human intervention is minimal.
2.
Include following components: a) Input: Put details in register. b) Process: Summarize the information; and c) Output: Present information to
management in the form reports.
Include following components: a) Input: Entering data into the computer; b) Process: Performing operations on the
data; c) Storage: Saving data, programs, or output
for future use; and d) Output: Presenting the results.
3.
3. Infrastructure as a Service Vs Software as a Service (RTP-NOV 14, RTP-NOV 15)
Infrastructure as a Service (IaaS):
• IaaS delivers computer infrastructure on an outsourced basis to support enterprise operations.
• Typically, IaaS provides hardware, storage, servers and data centre space or network components; it may also include software.
Software as a Service (SaaS):
• SaaS features a complete application offered as a service on-demand.
• A service provider hosts the application at its data centre over the Internet and customer accesses it via a standard Web browser.
• For example - Google Apps.
4. Differentiate Online Processing and Real Time Processing. (MTP-MAR 15)
Online Processing:
• Data is processed immediately while it is entered, the user usually only has to wait a short time for a response. (Example: games, word processing, booking systems).
• Interactive or online processing requires a user to supply an input.
• Interactive or online processing enables the user to input data and get the results of the processing of that data immediately.
Real-time Processing:
• Real time processing is a subset of interactive or online processing.
• Input is continuously, automatically acquired from sensors, for example, which is processed immediately in order to respond to the input in as little time as possible.
• After the system is finished responding, it reads the next set of input data immediately to process that.
• Whenever there is a rapid reaction required due to some sort of change, real time processing can take action without the need of a user.
• Real time processing is used in warning systems on aircraft, alarm systems in hazardous zones, burglar alarms etc.
Input Process Output
98851 25025 / 26 www.mastermindsindia.com MASTER MINDS
IPCC |35e |Fast Track Material in Information Technology 65
5. Concurrent Audit Vs. General Audit. (RTP-NOV 15)
Concurrent Audit:
• In this, Auditors are members of the system development team.
• They assist the team in improving the quality of systems development for the specific system they are building and implementing.
General Audit:
• In this, Auditors evaluate systems development controls overall.
• They seek to determine whether they can reduce the extent of substantive testing needed to form an audit opinion about management’s assertions relating to the financial statements in systems effectiveness and efficiency.
6. Quality Assurance Management Vs. Security Management Controls. (RTP-NOV 15)
Quality Assurance Management Controls:
• Organizations are increasingly producing safety-critical systems and users are becoming more demanding in terms of the quality of the software they employ to undertake their work.
• Organizations are undertaking more ambitious information systems projects that require more stringent quality requirements and are becoming more concerned about their liabilities if they produce and sell defective software.
Security Management Controls:
• Information security administrators are responsible for ensuring that information systems assets are secure.
• Assets are secure when the expected losses that will occur over some time are at an acceptable level.
7. Software as a Service (SaaS) Vs. Platform as a Service (PaaS) (RTP-MAY 15)
Software as a Service (SaaS):
• Software as a Service (SaaS) features a complete application offered as a service on-demand.
• A service provider hosts the application at its data centre over the Internet and customer accesses it via a standard Web browser.
• For example - Google Apps.
Platform as a Service (PaaS):
• Platform as a Service (PaaS) delivery model allows a customer to rent virtualized servers and associated services used to run existing applications, or to design, develop, test, deploy and host applications.
• The consumer may create software using tools and/or libraries from the provider. The consumer may also control software deployment and configuration settings.
• The provider provides the networks, servers, storage, and other services.
• For example, AppScale allows a user to deploy some applications written for Google App Engine to their own servers.
8. Private Cloud Vs. Hybrid Cloud in Cloud Computing (RTP-MAY 15)
Private Cloud:
• This cloud computing environment resides within the boundaries of an organization and is used exclusively for the organization’s benefits.
• These are also called internal clouds.
IPCC |35e |Fast Track Material in Information Technology 66
No.1 for CA/CMA & MEC/CEC MASTER MINDS
• They are built primarily by IT departments within enterprises who seek to optimize utilization of infrastructure resources within the enterprise by provisioning the infrastructure with applications using the concepts of grid and virtualization.
• The benefit of a Private Cloud is that it enables an enterprise to manage the infrastructure and have more control.
Hybrid Cloud:
• It is maintained by both internal and external providers.
• It is a composition of two or more clouds (Private, Community or Public). They have to maintain their unique identity, but are bound together by standardized data and application portability.
• With a hybrid cloud, organizations might run non-core applications in a public cloud, while maintaining core applications and sensitive data in-house in a private cloud.
5. BUSINESS PROCESS MANAGEMENT & IT
1. Functional Organization Vs. Process Organization. (SM)
Functional Organization Process Organization Work Unit Department Team Key Figure Functional Executive Process Owner
Benefits
a) Focus on functional excellence. b) Easier to implement. c) Clear management direction
a) Responsive to market requirements. b) Improved communication and
collaboration c) Performance measurements associated
with process goals.
Weaknesses
a) Barrier to communication between different functions.
b) Poor hand over between functions that affect customer service.
c) Lack of end-to-end focus to optimize organizational performance.
a) Duplication of functional expertise. b) Inconsistency of functional performance
between processes. c) Increased operational complexity.
Strategic Value
Supports cost leadership strategy. Supports differentiation strategy.
2. Flowchart Vs. Data Flow Diagram. (SM,PM, NOV 14 - 2M)
Flow chart Data Flow Diagram
Presents steps to complete a process. Presents the flow of data.
Do not have any input from or output to an external source.
It describes the path of data from an external source to internal source or vice versa.
The timing and sequence of the process is aptly shown by a flow chart.
Whether processing of data is taking place in a particular order or several processes are taking place simultaneously is described by a DFD.
shows how to make a system function. Defines the functionality of a system.
Used in designing a process. Used to describe the path of data that will complete that process.
Types of Flow charts - System, Data, Document and Program.
Types of DFD–physical data flow and logical dataflow.
THE END