course material - masterminds for ca track material...course material cell: 98851 25025 / 26 visit...

67

Upload: ngohanh

Post on 03-Apr-2018

228 views

Category:

Documents


1 download

TRANSCRIPT

Cell: 98851 25025 / 26

Visit us @ www.mastermindsindia.com Mail: [email protected]

Facebook Page: Masterminds For CA Youtube Channel: Masterminds For CA

CA - IPCC

COURSE MATERIAL

Quality Education

beyond your imagination...

BOOK NO. A9

FAST TRACK MATERIAL IN

INFORMATION TECHNOLOGY_35e

Page 1

Score at least 20 marks with this

material

2

INDEX FOR FAST TRACK MATERIAL IN INFORMATION TECHNOLOGY

Chapter Name Pages

Part A Flowcharts 4 – 31

Part B 2 Mark Questions / Definitions 33 – 52

Part C Differences 54 – 66

Cell: 98851 25025 / 26

Visit us @ www.mastermindsindia.com Mail: [email protected]

Facebook Page: Masterminds For CA Youtube Channel: Masterminds For CA

CA - IPCC

COURSE MATERIAL

Quality Education

beyond your imagination...

PART A – FLOWCHARTS

Page 3

IPCC |35e |Flow charts_ Information Technology 4

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

1. TELECOMMUNICATIONS & NETWORKS

1. What is computer network? Explain different types of network?

2. State the latest trends in telecommunication?

3. Write short notes on need and scope of computer networks?

How networks help business

Organizations can improve efficiency by sharing Information such as common files, databases and various application software’s

over a network

Advantages of computer network: � File sharing � Resource sharing like printers, hard disk etc � Remote access via Internet � Database sharing � Fault tolerance by having backups of data and servers i.e. unbroken service. � Internet access to the organization with security concerns � Can do the business across the world i.e., over coming geographical barriers � Can offer Any time any where services like ATM’s i.e., over coming time barriers � Reduce costs of communicating through video conferencing. � Boundary less collaboration with stakeholders like customers, supplies etc.,

COMPUTER NETWORK

Definition

Purpose

Collection of computers and terminal devices

connected together by a communication system

� Sharing of hardware devices � Information sharing � Electronic transfer of text (EDI) � Decentralization of various Data processing functions. � Communication between organizations � Collaborate more creatively

Most commonly found networks Examples:

LAN, MAN, WAN, VPN, INTRANET, EXTkRANET,

INTERNET

1. Terminals are Starting and Stopping points in any telecommunication environment. 2. Terminals may include dumb, intelligent, workstations and also printers, Telephone lines etc.

Trends In telecommunication

Industry trends: � Many service providers Like Airtel,

Vodafone � Many services available like

Whatsapp. � Growth of E-commerce, m-commerce � Telecom Industry is undergoing major

changes In all possible ways � Availability of more bandwidth and

more speeder transmission technologies like 3G,4G,5G

Technology trends:

• Change from Analog to Digital network technologies. Ex: ISDN

• Change In communication media i.e., faster communication media Like fiber optic cables, satellite communication

• New and more secure protocols, Network architectures are evolving like WAP etc.,

Business trends:

• Businesses want to cut costs • Online operational process • Looking to benefit from

E-commerce and m-commerce • They want to improve communication

and collaboration. • They are looking at improved

response times and less waiting times.

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

IPCC |35e |Flow charts_ Information Technology 5

4. Write short notes on telecommunication network model

5. Write short notes on network management and functions of network management?

6. Why users prefer Local Area Networks?

Why users Prefer LAN?

LAN offers many benefits like data sharing and resources sharing in addition it also offer the following benefits

Security

Expanded PC usage through inexpensive

workstations

Distributed processing

E-mail and message

broadcasting

Less maintenance and Low Software costs

Major Networking functions

Traffic management � Avoid congestion and � Optimize

telecommunications service levels

Security Provides authentication, encryption, auditing functions, enforces security in a network.

Network monitoring � Continuously monitors the

network � Trouble shooting and watching

the network for problems

Capacity Planning � Surveys network

resources � Planning scalability based

on users needs

Components of telecommunication network model

In a communication network there will be Sender, Receiver, and Communication channel

Terminals: Starting and Stopping points in telecommunication environment

Ex: video terminals, micro computers, telephones

Telecommunication processors: � Support data transmission and reception

between terminals. � They control and coordinate flow of data in

a network � Efficiency of network depends on them

Internetwork processors: Special purpose

communication processors

NIC: � Network Interface card � Connects computer to a

computer network � Improves network throughput � Perform many functions like

Identification, Buffering etc.

Modem:

� Digital signal to Analog signal-modulation

� Analog signal to Digital signal - Demodulation

� Must for Internet

Multiplexer: � Also called as MUX � Carries several terminal signals on a

single channel simultaneously. � Multiplexer merges transmission

signals. � De - multiplexer separates signals.

Switch: Make temporary

connections between

telecommunication circuits.

Hub: Used for

sharing of networks

resources like servers, printers

Repeater: It boosts (or) amplifies the

signal

Bridge: � Used to connect

various LANS � Magnifies data

transmission signal

Router: Used to inter -

connect networks based on different rules or protocols

Gateway: Used to connect

networks of different communication architectures

Communication control

software: Program that control and manage the functions.

IPCC |35e |Flow charts_ Information Technology 6

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

7. Write about different kinds of cables commonly used in LAN’s

8. Write about different types of telecommunication networks?

Different Types of Telecommunication networks

LAN Network with in a

building campus (or) short distance within 1km

Area of coverage Functional based Ownership based Media based

MAN Spans Across a city (or)

town up to 40km Eg.: cable network

WAN Spans across the globe

Eg.: Internet

Client - Server There will be two

classes of computers called servers & clients

Peer to Peer � No concept of client

or server � All are equal i.e.

peers

Public network � Any one can use it � Eg.: Internet

Private network � Used by a particular group

of People or a company � Eg.: LAN, MAN

Virtual Private network Uses a public network to connect a private network Eg.: work from home

Wired Media Cables

Wireless Satellite

communication, Radio waves etc.

Communication Media

Guided media / bound media Uses a cabling system that guides the data signal along a specific path.

Unguided media / Un bound media � Does not use cables

� Uses waves and air as medium

Twisted pair cables � It is an ordinary telephone wire

� Most widely used for both data and voice transmission

� Inexpensive & easy to install

� Used for short distance only.

Co- Axial cable � Consists of copper (or)

aluminum wire with high insulation

� Used for high speed, long distance transmission.

Eg.: cable T.V. wire.

Fiber optic cable � Consists one or more hair like

thin filaments of glass fiber

� Data transmission is very fast and secure, easy to install

� Very Expensive

Terrestrial microware � Uses atmosphere as the

medium � Disadvantage is that it cannot

bend over the curvature of earth

Communication satellites � A satellite is some solar-powered

electronic device that receives, amplifies and retransmits the signal

� Cost effective for large data transmission over long distances

Infrared waves � Used in industrial

scientific and medical applications

Eg.: Night vision devices.

Micro Waves � Radio waves with wave length of 1 meter to

1mm. � Used in RADAR’s, Navigation and

spectroscopy.

Radio Waves � Invisible waves & Electro Magnetic

Radiation. � Wave length 1 mm to 1,00,000 Kms � Used in WAN’s and wireless LAN’s.

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

IPCC |35e |Flow charts_ Information Technology 7

9. What is meant by network topology? What are different topologies or structures available?

10. Write about Digital Data transmission

11. Write about different modes of data communication

Various techniques of Data Transmission

Data Transmission

Parallel: � All bits of each byte are transmitted simultaneously. � Eg.: Parallel port used for printers � Data can be transmitted at very high speed. � Crosstalk may occur. � Expensive.

Serial: � Most commonly used method. � One bit at a time is transmitted along a single path � Eg.: Modem (or) mouse port. � Very cheap � Suited for long distances transfer data in series i.e.

slow transmission

Two basic ways of Serial Transmission

Synchronous Transmission: � Information is transmitted at the same rate. � Sender and receiver are paced by same clock i.e.,

same speed. � Synchronization bits are placed at beginning and

ending of Provides physical transmission of data In network

� Provides physical transmission of data In network

each block.

Asynchronous Transmission:

� Data (or) information is sent at irregular intervals.

Eg.: Typing from a keyboard.

� Every time sender sends synchronization bits to receiver.

Techniques of Data Transmission

Broadcast Networks: � Data transmitted by one node is received

by many (or) all In the network

Switched Networks: � There will be a source and destination. � Data is transmitted through switch nodes.

Network Topology / Network Structure

Geometrical arrangement of Computer resources and other devices in a network, it determines how one computer can communicate with other devices.

Bus topology: � Decentralized approach � A single wire connects number

of computers. � All communication travel along

a cable called bus. � Simple & easy to install. � Heavy traffic can slowdown

the network. � If there is problem with main

cable entire network goes down.

Ring topology: � Decentralized approach. � It offers high performance for

small networks. � Reliable and less costly. � Easy to expand. � More reliable. � Better than star topology. � Transmission links are

unidirectional � Relatively expensive and

difficult to install

Star topology: � Centralized approach. � Most commonly used. � Consists of one centralized

hub (or) Computer (or) Switch.

� Generally central computer acts as server.

� Easy to add and remove nodes.

� Easy to diagnose problems. � But more dependence on

Central device.

Mesh topology: � Nodes are randomly

connected using links.

� It is used in military networks

� More redundancy � Highly reliable. � More expensive. � More cable is needed

IPCC |35e |Flow charts_ Information Technology 8

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

12. Discuss various switching techniques used in a computer network?

13. What is a Protocol? Explain the aspects defined by protocols? Explain the functions of protocols.

Protocols

Syntax: Format of data being exchanged, is defined.

Semantics: Type and order of messages is defined

Timing: � Data rate selection. � Correct timing for data transfer.

Definition: � Protocols are set of rules for inter - computer communication

� Protocols are software / programs that allow heterogeneous computers to transmit data

Aspects defined by protocols

Functions of protocols � Breakdown data into packets

� Add destination address to packets

� Take data packets from cable

� Contact with NIC

� Traffic control

Data transferred from source to destination is routed through the switched nodes

Circuit Switching: � Simplest method

� Only two devices can communicate at a time once circuit is established.

� It is exclusively used by the parties for whom the circuit is established. It becomes unavailable to others till the call is terminated by either party

Message switching

� Intermediate nodes are used to carry the message.

� No dedicated circuit is necessary to carry the message

� This characteristic is often referred to as store and forward

Eg.: E-mail, SMS, Voice Mail

Packet switching

� Sophisticated technique

� Messages are broken up into small transmission units called packets.

Eg.: Downloading and uploading in internetwork

Switching Techniques

Transmission modes

Characterized according to the direction of exchange of data

Simplex: � Data transmission in one

direction only � A terminal connected to

simplex mode line that may send only or receive only

Eg.: Radio, Computer to Printer

Half Duplex:

Data moves in both directions but one side at a time Eg.: Walkie talkie

Full Duplex: � Simultaneously transmit and

receive data � Faster � Uses two separate circuits Eg.: Mobile phones

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

IPCC |35e |Flow charts_ Information Technology 9

14. Write short notes on Network Architecture?

15. Write about Open System Interconnection (OSI)

16. Write short notes on TCP/IP?

Layers1/Physical layer � Provides physical transmission of data In network

Layer 2/Network Interface � Supports Error free organization and transmission of data in

network

TRANSMISSION

CONTROL PROTOCOL / INTERNET PROTOCOL Layer3/ Internet protocol (IP)

� Provides routing by establishing connections among network links

Layer4/ Host to Host transport layer � Supports the organization and transfer of data.

Layer5/Application or process layer � Provides communication services � Establishes sessions Data transmission formats and codes.

Meaning � Protocol used in Internet is called TCP/IP � It consists of 5 layers which corresponds to 7 layers of OSI

model

Layer1/ Physical Layer � Hardware layer � Discusses about topology

Layer 2/Datalink layer � Specifies channel access control method and reliable data

transfer.

OSI MODEL designed by ISO

Layer 3/Network layer � It makes a choice of physical route of transmission of data � Routing of data in a network

Layer 4/Transport layer � Assembling and disassembling of packets � Multiplexing, encryption, error recovery etc are undertaken

Layer 5/Session layer � Establishes, maintains and terminate sessions � Authentication and identification of clients.

Layer6/ Presentation layer � Controls on screen display of data � Encryption, data compression can be done.

Layer 7/Application layer � It Provides File transfer, file sharing � Deadlock and Database concurrency controls can be done.

Network Architecture

Definition: � It is a layout of a network (full picture of the established network). � It discuss about hardware, software, connectivity, mode of transmission etc., � The goal is to promote an open, simple, flexible and efficient telecommunications environment

OSI Model

TCP/IP model

IPCC |35e |Flow charts_ Information Technology 10

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

17. Write about different models of networks and also describe about clients and servers?

18. Discuss Multi-Tier Architecture?

19. What is a security program? (or) Write about network risks, controls and security?

Network Security

Meaning: Provision made to protect network and network accessible resources from unauthorized access

Need:

� To safeguard assets

� To ensure and maintain data integrity

Types:

� Physical: To Protect physical assets like hardware, personnel, Hardcopy Documents etc.,

� Logical: software security restricting unauthorized access to data

Multi-tier Architecture

Single-tier systems

� Single computer having both Front end (GUI) and Back End (database)

� Used in small and micro business

� Requires only one computer

Two-tier systems

� Consists of client and serves

� Front End on client

� Back End on sever

� Used In medium & large businesses

� Very flexible and effective

Three- tier system � There will be 3 tiers namely � Presentation tier (front End) � Application tier (Business logic) � Data tier (back end) � It will be more complex � But very effective � Modern day businesses use this

model � More secure � Dynamic load balancing

n-tier Architecture

� Here ‘n’ refers to number of levels counting from client to server.

� Used in more complex environments.

� Very secure and effective.

Models of network

Client / Server model • Intelligently divides processing

work between clients and servers

• Servers handles global tasks

• Clients handles local tasks

• Very fast, secure, reliable, efficient model

Peer-to-Peer model • No separate server • Only sharing is possible • All are equal i.e. peers • Very simple and cost efficient. • Not suited for large networks • P2P can be adhoc-connection • Permanent infrastructure

Client: Service Requesters

Fat/thick Client • It does not

necessarily rely on server

• Eg.: PC

Thin client • More dependence on

server • Performs only

presentation services

Hybrid Client � Mixture of fat and thin

clients � Used in Imaging

consoles � Process locally, but

relies on server for storing persistent data

Dedicated Performs

one specific activity only

Non-dedicated Performs many

activities

Server: Service Providers

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

IPCC |35e |Flow charts_ Information Technology 11

20. Write about Centralized systems & Decentralized systems?

21. Explain the threats involved in system security?

22. Discuss the encryption model in computer network.

Encryption:

Process of Encoding messages.

Hardware Encryption:

� Use of specific hardware devices to encrypt the messages.

� Now a days these devices are available at reasonable cost.

� These are fixed to computers.

Software Encryption:

� Encryption done by software itself.

� Usually works in conjunction with applications.

Eg.: Mail sent using g-mail will be encrypted by g-mail application.

Types

Cryptography

Encryption Decryption

Threat: A possible danger that can disrupt operation functioning Integrity of a

network.

2. Structured threats: � Done by highly motivated

technical people � Malicious Intention � Specific targeting of a group

(or) Company � Technically competent hackers

causes these threats

1. Unstructured threats: � Inexperienced and enthusiastic people will do � Ex: port scanning tools, address sweeping tools � No malicious Intention � Many tools are available in Internet

3. External threats: � Done by people outside of organization � Usually works on trail and error basis � Tries to Intrude from Internet or dial up servers.

4. Internal threats:

� Done by people inside the organization having access to internal resources

� Usually these people are disgruntled employees either current or former

Centralized and decentralized systems

Centralized system: � Processing done at central location � Enhanced security � Ease of control � Ease of management � Reduced cost of ownership

Disadvantages: � If Central computer fails then entire system will go down. � All the time the Central server should be kept secure and

fast.

Decentralized system: � Each workstation is autonomous

� It enable file sharing to all in the Network

Disadvantages: � All computers have to be updated

individually, but in central system updating the central server is Enough

IPCC |35e |Flow charts_ Information Technology 12

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

23. Explain the vulnerabilities involved in system security?

24. Write short notes on network security?

25. Explain popular network security protocols?

Popular network security protocols

Network security protocols are designed to prevent any unauthorized application service or device from accessing network data.

SSH: � Secure shell is a program to

log on to another computer over network to execute commands in a remote machine.

� Provides authentication and secure communication

� Protects network from IP spoofing, DNS Spoofing etc.,

SFTP: � Stands for Secure File

Transfer Protocol � Encrypts commands and

data while transmitting. � Preventing passwords

and sensitive information from being transmitted.

HTTPS:

� Stands for Hyper Text Transfer Protocol Secure

� Uses public and secret keys to encrypt data flow between client and server

SSL:

� Stands for Secure Socket Layer

� Used for secure online credit card transactions using web mail etc

Examples

Network Security: Provisions made to protect the network from threats.

Authentication: Receiver is sure of the sender’s identity that an imposter has not sent the message.

Privacy: � There should be confidentiality. � Achieved by cryptography and encryption techniques.

Integrity: � Data must arrive at receiver end exactly as it was sent by sender. � No tampering should be done.

Non-Repudiation: Receiver must be able to prove that a received message came from a specific sender and sender must not be able to deny sending it.

Aspect 2 Aspect 4

Aspect 1

Aspect 3

Software bugs: Bug (or) error in software is a serious vulnerability

Timing windows: Exploiting temporary files, Overwriting important data

Vulnerability It is an inherent weakness in design, configuration or implementation of a network or system that renders susceptible to a threat

In secure default configuration Using well known and easily guessed passwords can cause Vulnerability.

Bad protocols: Using inefficient non-standard protocols may cause vulnerability.

Trusting untrustworthy information: Bad routing algorithms can cause network to connect to untrustworthy servers.

End-users: Generally users of computer system who are not professionals and are not security conscious.

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

IPCC |35e |Flow charts_ Information Technology 13

26. What are the functions of network management?

27. Discuss FCAPS model of network management?

28. Write short notes on different classes of E-Commerce?

Business-to-Government (B2G) e-Commerce: It also known as e-Government, refers to the use of information and communication technologies to build and strengthen relationships between government and employees, citizens, businesses, non-profit organizations, and other government agencies.

E- Commerce

Business-to-Employee (B2E) e-Commerce:B2E e-Commerce, from an intra-organizational perspective, has provided the means for a business to offer online products and services to its employees.

Business-to-Business (B2B) e-Commerce: a) The exchange of services, information and/or products from one business to another. b) Automated processes between trading partners.

Business-to-Consumer (B2C) e-Commerce: a) It is defined as the exchange of services, information and/or products from a business to a

consumer.

b) A virtual store available for consumers to purchase goods and services

Consumer-to-Business (C2B) e-Commerce: a) Consumers directly contact with business vendors by posting their project work online so that

the needy companies review it and contact the consumer directly with bid.

b) Consumer reviews all the bids and selects the company.

Consumer-to-Consumer (C2C) e-Commerce a) Internet-facilitated form of commerce that has existed in the form of barter, flea markets,

yard sales and the like.

b) A virtual environment in which consumers can sell to one another through a third-party

F Fault Management: � A fault is an event that has a negative significance. � Goal is to recognize isolate correct, and log faults in a network.

C Configuration Management: Tracking and management of Network and system configuration information.

A Accounting Management: Tracking network utilization information.

P Performance Management: Measures network performance such as throughput, response time packet loss rates, Error rate etc.

S Security Management: Managing network authentication, authorization, auditing of a usage from both Internal and External Users.

Functions of network management

Controlling Planning Allocating Deploying

Monitoring resources of a network

Frequency Allocation

Cryptographic distribution and Authorization

Route Analysis and Accounting mgmt.

Security Management

Fault Management

Configuration Management

IPCC |35e |Flow charts_ Information Technology 14

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

29. What tools are available to protect the information in network against intrusion or misuse?

30. Write about Intrusion Detection System (IDS)? Explain Primary IDS technologies?

31. Write short notes on E-Commerce?

32. Define the Electronic Funds Transfer. State some examples of EFT systems in operation?

E-Commerce is the process of doing business electronically

Benefits

� Reduce Inventories

� Reduction of selling costs

� Reduction of advertising costs

� Access to new markets.

� Buyers can access Info Easily.

� Reduction of overhead costs

Risks � Problem of Anonymity � Repudiation of contract � Lack of authenticity � Denial of service � Problem of piracy � Lack of audit trails � Attacks from hackers

Types

� Business-to Business (B2B) � Business -to- Consumer (B2C) � Consumer -to -Business (C2B) � Consumer- to -Consumer (C2C) � Business –to- Government (B2G) � Business- to- Employee (B2E)

Electronic Funds Transfer

ATMs � Specialized form of POS � used with debit or credit

cards with a PIN Number � ATM cards are used in

multipurpose manner to pay bills to withdraw cash etc.,

POS � Stands for point of sale

transactions � Using POS machines

money can be transmitted electronically

� No need to carry cash for purchasing.

Preauthorized Transfers � Automatically depositing

or withdrawing from an individuals account through a financial institution.

� Payment of bills automatically

Telephone transfer Transaction can be done through telephone instructions Eg.: order of payment of bills to bank by phone

Examples

IDS

Monitors network assets to detect anomalous behavior (or) misuse

2. Host based Intrusion detection � Monitors attacks on a given host � Used to combat Internal threats

1. Network Intrusion Detection � Analyzes Network traffic and searches for un

wanted (or) malicious Events on the wired b/w hosts � They are also called as “packet sniffers” � It Intercepts packets

3. Hybrid Intrusion Detection � Combination of both NID and HID � It offers central Intrusion detection Management

Tools to protect Information in network

Firewalls: � Forms barrier

between secure and an open environment

� Effective means of protecting firms Internal resources from unwanted intrusion.

Message authentication � Makes sure that

message is from authenticated sender

� Makes sure of no message tampering

Site Blocking: It is a tool to block certain websites which may contain objectionable material

Anti-malware: � These tools help

administrators to Identify and block malware

� Malware disturbs the performance of the network.

(NAC) Network Access Control: These products handle access authentication and authorization functions

IDS Intrusion Detection System monitors network assets to detect anomalous behavior (or) misuse.

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

IPCC |35e |Flow charts_ Information Technology 15

2. INFORMATION SYSTEMS & IT FUNDAMENTALS

1. Define Information System? Write about Information System Layers.

2. Define the term Application Software? Explain types and mention advantages and Disadvantages.

3. Write about System Software in detail. (Or) What is an OS? Explain functions or activities performed by OS?

Application Software Set of programs for performing useful tasks

Less threat from virus

The threat of virus infection to custom-made applications is very small,

Addressing user needs � Application software is

designed to suit the user needs � They are designed with a

specific purpose in mind.

Regular updates licensed Application software will have regular updates for various security reasons

Application Suite Eg.: MS-Office, Star Office

Enterprise Software Eg.: SAP

Enterprise Infrastructure Software Eg.: Email sever, security software , Antivirus software

Information Worker Software Eg.: MS-Excel, CAAT etc

Content Access Software Eg.: Media players, Adobe digital

Educational Software Eg.: Exam CDS, Test prep CD’s

Media Development Software Eg.: DTP software, Photoshop

Benefits

Types

Development is costly Infection from malware

Disadvantages

SYSTEM SOFTWARE / OPERATING SYSTEM

Definition

� Software designed to operate the computer hardware

� It provides a platform for running application software (App’s)

� Operating system is a system program which acts as an Interface between the user and the computer hardware.

Functions (or) activities of an OS

� Performing hardware functions � Memory management � Providing user interface � OS provides hardware

Independence � Memory management � Task management � Providing networking

capabilities File management

Information Systems

Definition

1. It is a set of interrelated components working together to collect, retrieve, process, store and disseminate (distribute) information for the purpose of achieving objectives such as planning, coordination, analysis and decision making.

2. Generally called as Management Information Systems (or) Computer Based Information Systems

Activities

� Collecting, storing and processing of data

� Generation of Information reports

� Dissemination of Information to right Users.

Layers

� Hardware

� Software

� Database

� Network

� People

� Reports

IPCC |35e |Flow charts_ Information Technology 16

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

4. Explain various data storage devices?

5. Define the terms Data, Database, Database Management System (DBMS).

6. What is BPM? Explain phases of BPM in detail.

Memory techniques/ Devices

Internal Memory • Registers

Primary Memory (Main Memory)

Secondary Memory (Auxiliary Memory)

RAM • Volatile in nature • Information can be read and write

ROM • Non-volatile in nature • Information cannot be modified

Static RAM

Dynamic RAM

PROM

EPROM

EEPROM

Magnetic tape drives

Magnetic disk drives (Ex: Hard

disk, Floppy disk)

Optical disk drives (Ex: CDs DVDs

etc.)

SPECIAL MEMORIES

Cache Memory � It is a type of static RAM � It is smaller, faster � It is expensive � It boosts processing power � Its location in motherboard gives it the advantage � It resides between main memory to CPU

Virtual Memory

� Imaginary memory supported by some operating systems

� Virtual memory is an allocation of hard disk space to help RAM

� We can use large softwares with less RAM using this technique

Business Process Management (BPM)

Definition It is methodology used by enterprises to improve end to end business processes in various stages

Phases An ERP application divides the BPM Process into 4 phases.

1. Analysis Phase 2. Design Phase 3. Implementation Phase 4. Run & Monitor Phase

DBMS

Data Collection of Raw facts, figures, observations.

Database Collection of related data

DBMS DBMS is a collection of programs that enable users to create and maintain data bases. � Or simply it is a software to maintain databases

Characters Collection of Bits i.e. 0’s and 1’s

Field Collection of characters

Record Collection of fields

File Collections of Records

Database Collection of Files

Terminology

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

IPCC |35e |Flow charts_ Information Technology 17

7. What is a Database model? Explain different types of Database models.

8. List out the advantages & disadvantages of a DBMS?

9. Explain what type of IT infrastructural is required for organization and discuss the risks and issues of IT?

DBMS

Advantages � Reduced Data Redundancy � Program and file consistency � Data sharing � Integrity can be maintained � User friendly � Improved security � Data independence � Faster application development

Disadvantages

Cost: Implementing a DBMS may be expensive, time consuming and requires more training to users

Security: It is difficult to keep unauthorized users away from accessing the database

Database Model

A Database model determines the logical structure of a data base i.e. how data is stored, organized and manipulated

Hierarchical Model: � Records are logically organized into

hierarchy of relationships � Records are arranged in inverted

tree pattern � Parent-child relationship between

records � Supports only one to one and one to

many relationships � Simple to understand � If parent node is deleted all Child

nodes get automatically deleted � Cannot support many-to-many

relationships

Network model � Modified version of hierarchical

model � Supports all types of relations

one to one, one to many, many to one, many to many

� Relatively efficient � More flexible � But difficult to operate � Less user friendly,

Relational model � Represents database as

collection of relations � Relational database contains

multiple tables � Easier to use � Highly flexible � Can handle queries in a more

efficient manner � Storage requirements are high � Requires more processing

capacity � Primary key plays important role.

Object oriented model

� Objects are predefined set of program code that is used to perform a specific task

� Based on concept of objects and their interactions � Used to store complex data such as Images, audio video

etc., � Ex: CAD tools, Expert systems, Image processing

systems, Multimedia system etc.,

Types

IT in Enterprises

Infrastructure required An Enterprise should posses the following Infrastructure � Database access and changes software � File replication and backup software � Systems and event log monitoring � Job scheduling software � Application Integration � Printing & file transfers

Risks and Issues of IT

» Greater need of controls

» Checks to see whether business objectives are met (or) not

» Technology risks

» In-depth knowledge in implementation and operation are required

Copyrights Reserved

To MASTER MINDS, Guntur

IPCC |35e |Flow charts_ Information Technology 18

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

10. Define the term “computing”. Explain five sub-disciplines of the computing?

11. Describe about Instruction set Architecture (ISA).

12. Explain different phases of SDLC?

Phase - III System Design: � Examines how will the Info.

System do, what it must do to obtain solution to the problem.

� Designing of Hardware, software, Inputs, outputs, etc.

Phase - IV System Implementation: � Examines how will the solution be

put into effect � Involves coding testing Installing

software

Phase - I System Investigation: � Examines what is problem

and is it worth solving � Feasibility study is done.

Phase - II System Analysis: � Examines what must the

Information system do to solve the problem.

� Gathering details. � Analyzing cost benefits.

Phase - V System-maintenance and Review � Examines the results of software � Developed and modifies the

system according to the changing needs

SDLC � System Development

life cycle � Provides sequence of

activities to build an Information system

Computing

Any goal oriented activity requiring, benefiting from or creating computers

Computer Science � Scientific and practical approach to

computation and its applications � It studies the Internal working of the

computers

Computer Engineering

Integrates several fields of Electronic Engineering and computer science required to develop hardware and software

Information System (IS)

The main aim is to support operations management and decision making in a business

Information technology (IT)

IT encompasses not only computers and computer networks but also other technologies like telephones and television

Sub Disciplines

Software Engineering

It provides a systemic disciplined, quantifiable approach to the development, design, operation and maintenance of software

CLASSIFICATION OF INSTRUCTION SETS

CISC � Stands for Complex Instruction Set

Computing � Ex .: Intel 386, 486, Pentium pro, PII, PIII

etc � They are complex as well as expensive to

produce. � Most PC’s use CISC processors � Variable length instructions i.e., each

instruction can use exactly the amount of space it requires

RISC � Stands for Reduced Instruction Set

Computing Ex: IBM RS6000, MC88100 processors � Consume less power offers high

performance � Less complex and less expensive � Workstations uses RISC processors � Fixed length instructions. i.e for each

instruction can occupies the same amount of space, hence memory space is wasted

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

IPCC |35e |Flow charts_ Information Technology 19

13. Write about Machine Cycle?

14. Write briefly about Mobile Computing?

15. Discuss about BPA?

Business Process Automation (BPA)

It involves removing the human Element from existing business by automating the repetitive or standardized process components

Steps

� Define why we plan BPA � Understand rules & regulations � Document the process � Define objectives to be achieved � Engage process consultant � Calculate ROI for project � Development of BPA � Test the BPA

Activities � Integration � Orchestration � Automation

Benefits of BPA � Reduction of human error � Easy transformation of data into

information � Improves performance and

process effectiveness � Making business more

responsive � Improves information sharing and

collaboration

Objectives � Confidentiality � Integrity � Availability � Timeliness

Mobile Computing

It Involves the use of portable computing devices i.e. laptops, PDA, mobile phones, smart phones in combination with mobile technologies

Mobile Communication � Infrastructure for seamless and

reliable communication � Includes devices such as protocols,

services, bandwidth and profiles

Mobile Hardware

� Include laptops, Tabs, Phones, PDA’s

� They operate on full duplex mode

Mobile Software � Programs that run on mobile

hardware � Main component or Engine of the

mobile device.

Business Applications � Increase workforce productivity � Offers any where any time access � Improved customer service, latest Innovations in service � Business process improvement � Innovative opportunities for improving quality and efficiency

Concerns/Problems

� Security concerns � Dangers of misrepresentation � Power consumption � Potential health hazards

1. Instruction Fetch Fetch an Instruction from the current Program

2. Instruction Decode Figures out what we actually need to do

4. Write Back Writes back the result and go for another Instruction

3. Execution Performs some operation

MACHINE CYCLE

IPCC |35e |Flow charts_ Information Technology 20

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

16. Explain major concepts in SDLC.

3. BUSINESS INFORMATION SYSTEMS

1. Explain about the information system

Information System

Information � Processing of data is known as

information � Information is used in

managerial decision making

System

System is a set of interrelated components working together to accomplish objectives

Information system It is a combination of people hardware, software, communication devices, and networks to process data and produce Information

Role In business � Helps in decision making � Helps to Execute Innovative

Ideas � Helps in solutions of complex

and critical problems � Help to take right decisions at

right time � To gain competitive advantage

Components

Feed Back

Processing Output Input

Storage

Major Concepts in SDLC

Feasibility study Process of Evaluation alternative systems through cost/benefit analysis

Technical Feasibility

Economic Feasibility

Legal Feasibility

Operational Feasibility

Schedule (or) Time Feasibility

Fact finding techniques

Interviewing Staff Examine Current Business

Sending out

Questionnaires

Conversion Methods

Direct change over

Parallel Conversion

Phased Conversion

Pilot Conversion

System Maintenance Types

Perfective Maintenance

Adaptive Maintenance

Corrective Maintenance

Observation of current proceedings

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

IPCC |35e |Flow charts_ Information Technology 21

2. Explain who uses information system?

3. Explain different types of information system?

4. Explain Transaction Processing cycle?

5. Explain TPS?

6. Explain SCM?

SCM

Definition � Stands for Supply Chain Management � Process of planning, implementing and

controlling the operations of the supply chain with purpose to satisfy customer requirements.

� SCM cover from point-of-origin to point-of-consumption

Characteristic features

� It integrates supply and demand management within & across companies

� SCM is a chain starts and ends with customers

Components:

� Procurement

� Operations

� Distribution

� Integration

Transaction Processing System (TPS)

Definition:

It is Information system that collects, stores, modifies and retrieves day to day transactions of an enterprise

Eg.: ATM; IRCTC, Accounting system

TPS Attributes: � Access control: Should restrict

un authorized access � Equivalence: Transaction

should be in same format every time

� High volume rapid processing of transactions

� It should be robust and trust worthy

TPS qualifiers: � Atomicity: transaction should take

place in entirety � Consistency: Should behave similarly

all the time � Isolation : only one transaction at a

time � Durability: Maintenance of logs

Once transactions are completed they cannot be undone.

1. Data Entry 4. Document & Report Generation

2. Transaction Processing » Batch » Online / Real time

3. Database Maintenance 5. Inquiry Processing

Who uses Information Systems?

Includes CEO’s, COO’s, Chair person etc., � System used: EIS

Includes Middle Managers like GM RM, ZM etc., � System used: MIS, DSS.

Includes operational managers, Supervisors responsible for day to day operations � System used: TPS

Strategic Level Management Level / Middle Level

Operational Level

Knowledge and Data workers, who are selected, recruited and trained in a specified manner: � System used: KWS, OAS

Knowledge level

Types of information system

TPS DSS EIS OAS KMS MIS

IPCC |35e |Flow charts_ Information Technology 22

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

7. Explain ERP?

8. Explain CRM?

9. Discuss about DSS?

10. Discuss about MIS & EIS?

CRM

Definition

� Stands for Customer Relationship Management

� It may be defined as process in which client relationships, customer loyalty and brand value are built through marketing strategies and activities.

Benefits � Generation of customer loyalty � Raising a market Intelligence Enterprise � Integrated relationship � Preserving Existing customers � Providing enhanced services � Developing connection and affiliation

with customers

Architecture of CRM

Operational: Automation is provided to the basic business processes Analytical: Analyzes customs behavior Collaborative: Ensures contacts with customers like Phone, Email, Fax, SMS etc

Enterprise Resource Planning (ERP)

Definition

� An ERP system fully Integrates Internal and External Management Information across Entire organization

� It covers functional areas of an Enterprise like procurement, Inventory, production, sales, Logistics, finance, A/c’s and HR

Advantages

� Powerful tool In hands of management

� It organizes and integrates operating processes

� Used for optimum utilization of resources

� ERP promises one database, one application, one user interface

� Provides competent and efficient administration

Stages of ERP � Inventory control � ABC Analysis � EOQ (Economic order quantity) � Just-in-time (JIT) � Material Requirement planning � Manufacturing Resource planning � Distribution Resource planning � Enterprise Resource planning � Money Resource planning � EIS web Enabled

MIS and EIS

MIS � Used to develop Info for Managerial use � It is an Integrated, user-machine system to provide

Information to support operation, management and decision making functions

� It provides timely accurate, and meaningful data � MIS solutions are accessible via web Browsers of Internet Examples � Logistics Management Application. � ERP Softwares

EIS � It is a kind of DSS that is designed to meet the special

needs of top revel managers � It uses graphic displays � It can access both Internal and External data sources � Another name Executive Support System (ESS) EIS components � Hardware � Software � User Interface � Telecommunication

Decision Support System (DSS)

Definition � It is a Computer Based

Information System that supports business or organizational decision making activities

� DSS covers wide variety of systems, tools & technologies

Benefits of DSS � Improved decision quality � Cost reduction � Increased productivity � Increased communication � Timesaving � Improved customer

satisfaction

Components

� Users

� Databases

� Planning languages

� Model base

Characteristics � DSS supports

management decision making

� DSS solve unstructured problems.

� Friendly computer Interface

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

IPCC |35e |Flow charts_ Information Technology 23

11. Explain Knowledge Management System?

12. Write about Core- Banking System (CBS)?

13. Explain HRMS, benefits and modules?

14. What are various Business intelligence tools?

Business Intelligence Tools

Definition

A type of software that is designed to retrieve analyze and report data

Key tools � Simple reporting and

querying � Business Analysis � Dash boards � Score cards � Data mining (or) Statistical Data Analysis

Knowledge Management Systems

KMS

� Stands for Knowledge Management System

� It provides both Evident and hidden knowledge for decision making

� It Enables Employees to have ready access to organizations documented base of facts etc

� It is an Information repository � It provide both Explicit and Tacit knowledge

Explicit knowledge Ex: online tutorials.

Tacit Knowledge Ex: Employee experience

KDD � Stands for Knowledge Discovery and Data mining � It clears with ways and means of capturing and making

obtainable knowledge of the Experts to others in electronic form

� It includes people from inside and outside of organization � Importance of knowledge � Altering business surroundings � Burgeon connections � Globalization � Modification in organizational composition

CORE Banking System (CBS)

Definition � CORE stands for ‘Centralized Online Real

time Environment’ � It is a set of basic software components that

manage the services provided by a bank to its customers through its branches

Elements of Core banking � Marking and servicing of loans � Opening new accounts � Processing payments and cheques � Calculating Interest CRM etc., � Managing customer Accounts

Examples � ATM’S � ONLINE Banking � 24x7 support � Internet Banking etc.,

HRMS

Definition � A Human Resource Management

System is a software application that unites many human Resource functions which benefits the management

� It is also called as HRIS i.e., Human Resource Information System

Benefits � Brings Industry best practices to HR functions � Utilizes HR potentials completely � Reduce HR administrative costs � Increases employee engagement and

satisfaction. � Enhances data integrity within the Enterprise � Enable to meet compliance and audit

requirement

Key Modules � Work force management � Time and attendance

management � Payroll management � Training management � Compensation management � Recruitment management � Personnel management � Organizational management � Employee self service � Analytics

IPCC |35e |Flow charts_ Information Technology 24

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

15. What is AIS? Explain key component of AIS?

16. Explain AI & Expert system?

17. Explain the importance of access and privilege controls?

AIS (Accounting Information System)

It is defined as a system of collection, storage and processing of financial and accounting data that is used by decision makers.

Components of AIS Basic functions of AIS • Collect and store data. • Record transactions. • Safeguarding organizational assets. People Procedure &

Instructions Data Software IT

Infrastructure Internal controls

Access and Privilege Controls

These controls help us to restrict whom and what accesses information resources

Functions � Identity Management � Authentication � Authorization � Accountability

Approaches to Access controls

� Role-based Access control: Controls designed based on user-role in the organization.

� Rules-based Access Control: It uses triggers to govern rules of business to Enforce controls.

Principle of least privilege It means that we should give only those privileges to a user account which are essential to that users work.

AI & Expert Systems

AI: � Stands for Artificial Intelligence � Distinct area of computer science focusing

on creating machines that imitate aspects of human behavior such as to reason, communicate, see and hear.

� AI is manmade and level of activity depends on the programming capability

Expert systems It is a computerized Information system that allows non-experts to make decisions comparable to that of an Expert

Applications of A.I

Decision Support

Information Retrieval

Virtual Reality

Robotics

Components : 1. User Interface 2. Inference Engine 3. Knowledge base 4. Knowledge acquisition

facility 5. Explanation facility 6. Database of facts

Advantages: � Cost Effective alterative to human

experts � Faster and do not get stressed out � Better quality and more consistent

decisions � Preserve the Expertise of an expert

leaving the organization

Limitations: � Costly and time consuming � Difficult to obtain knowledge from experts � Difficult to program commonsense of

human beings

Types of expert systems • Example – based • Rule based • Frame based

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

IPCC |35e |Flow charts_ Information Technology 25

18. Explain various payment mechanisms?

4. BUSINESS PROCESS AUTOMATION THROUGH APPLICATION SOFTWARE

1. Explain different types of Business Applications

2. What are the applications based on nature of processing

3. Differentiate between manual & computerized information processing cycle?

Manual Information Processing Cycle

Input Process Output

Applications based on nature of processing

Batch processing � In batch processing there is a time

delay in occurrence and recording of transaction Eg.: Credit card statements, Accounting, Stock Control statements

� Used by small business

Online processing

� Data is processed immediately while it is entered

� Immediate result Eg.: Cash Management Software

� Used by medium businesses

Real-time Processing

� Input is continuously and automatically acquired from sensors

Eg.: Pilot less air craft, Robots etc

� Used by large business

Types of Business Applications

Nature of Processing (The way an application

updates data)

Source of Application (Tells the source from where

the application has been bought)

Nature of Business (Emphasize on size and complexity of Business

Process)

Functions Covered / Nature of Application

(Based on business functions it covers)

Batch Processing

Online Processing

Real time Processing

Leased

Purchased application

In-house developed

Large Business

Medium Business

Small Business

Manufacturing Application

Cash Management

Accounting Application

Payment Mechanisms

Credit Card:

� It is a plastic card used for electronic payment over Internet.

Electronic Cheque:

� It has all the features of paper cheque

� It acts as a message to the senders bank to transfer funds

Electronic Purse: � Another way to make payments over

Internet � Very similar to prepaid card � Validation is done through PIN � No credit check or signature is needed

Smart Card:

Smart Cards have an Embedded Micro Chip Instead of a Magnetic Strip.

Contact cards Contactless cards Combi / Hybrid cards

Processing: � Authorization � Batching � Clearing � Funding

Feed Back

Computerized Information Processing Cycle

Processing Output Input

Storage

IPCC |35e |Flow charts_ Information Technology 26

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

4. Explain the Business applications based on nature of applications?

5. What are information system controls?

6. Explain Different types of Application Controls

Boundary controls: To restrict the actions under taken by users Techniques: � Cryptography � Passwords � PIN � ID Cards / Plastic Cards � Digital Signatures

Input controls: Ensures accuracy and completeness of data entered in to system

Techniques: � Source document controls � Data coding controls � Batch controls � Validation controls

Output controls: Ensures data redelivered trousers will be present ell for matted and delivered manner Eg.: Printing controls, Retention controls, Existence Recovery controls, Storage and Logging of sensitive and critical forms

Database controls: Ensures data integrity in a data base Eg.: Ensuring all records on files are processed � Multiple Transactions for a single record in

the correct order

Communication controls: Ensure proper transmission of data in network Eg.: Physical Component control, Line error control, Flow and Link controls etc.

Process controls: Performs validation checks to identify errors during processing Eg.: Edit checks, run to run totals checking, Field Initialization, Reasonableness verification, etc.

Application Controls

Information System Controls

Definition: Control is defined as polices procedures practices that are designed to provide reasonable assurance that business objectives are achieved and undesired Events are prevented or detected and corrected

Controls can be divided into two parts

Managerial Controls: � Top management controls � Information systems management controls � System development management controls � Programming management controls � Data Resource management controls � Quality Assurance controls � Security management controls � Operations management controls.

Application Controls: � Boundary controls � Input controls � Process controls � Output controls � Communication controls � Database controls

Business applications based on nature of Application

Office Management

Software, Eg.: MS Office

Compliance Applications Eg.: E-filing

software

Accounting Applications, Eg.:

Tally, Wings

Management Support Software, Eg.: MIS

CRM Software, Eg.: SAP-CRM

ERP software Eg.: SAP

Product Life Cycle

Management Software

Logistics Management

Software

Legal Management

Software

Industry specific software like

Tourism, Automobile,

Banking, Pharma software, Cinema Ticketing software

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

IPCC |35e |Flow charts_ Information Technology 27

7. Explain Different types of Managerial Controls

8. What are various Emerging technologies?

9. What are the applications based in source of applications?

Managerial Controls

� Top management controls & Information systems management controls

System development management controls

Programming management controls

Data Resource management controls

Functions performed by senior managers

1. Planning 2. Organizing 3. Leading 4. Controlling

» Concurrent Audit » Post – implementation Audit » General Audit

Functions Performed by Senior Auditors

1. Planning 2. Designing 3. Coding 4. Testing 5. Operation & Maintenance

Functions Performed by S/W Developers

1. Centralized data security

2. Appointing Senior Persons

3. Separating Duties 4. Maintaining Logs 5. Share data to right

persons

Functions Performed by Resource Managers

Security Management Controls

Functions performed by Security Administrators

Several Physical & logical securities measures applied

Quality Assurance management controls

Functions performed by Quality Controllers

Safety Critical systems to improve the quality of

output like software

Operations management controls

Functions performed by Operations manager

Responsible for daily running of H/ W & S/W

resources

Emerging Technologies

Network virtualization Allows a large physical network to be provisioned Into Multiple smaller logical network

Major Applications � Server consolidation � Disaster Recovery � Testing and training � Portable applications � Portable work spaces

Grid computing � It is a form of distributed computing � It is a computer network in which each

computer’s resources are shared with every other computer in a communication system

Need: � Civil Engineers need it � Insurance companies need it � Large-scale science & Engineering Applications

use it. � A cheaper alternative to supercomputer

Cloud computing

� A cloud is a collection of servers, applications, databases, documents, agreements, storage capacity etc., which allow organizations to share these resources from anywhere.

Types of Software Available

Custom-built Application: a) These applications can be

configured to meet a particular company’s requirements.

b) Example – In house developed Software such as Billing, Inventory, and Attendance etc.

Leased application:

a) Where user pays fixed rent for using the application for agreed terms.

b) For Example - Cloud Systems

Packaged Software: a) These are the standard

applications which are not free but are licensed. Customization to suit business requirements may or may not be allowed.

b) For Example -Tally, Oracle 9i.

IPCC |35e |Flow charts_ Information Technology 28

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

10. Explain cloud computing in detail?

5. BUSINESS PROCESS MANAGEMENT & IT

1. Explain typical life cycle of an accounting transaction?

LIFE CYCLE OF AN ACCOUNTING TRANSACTION

2. Explain typical life cycle of a sales transaction?

LIFE CYCLE OF SALES TRANSACTION

3. Explain typical life cycle of a Purchase transaction?

LIFE CYCLE OF PURCHASE TRANSACTION

Cloud Computing

Service Models: Cloud computing officers the following services to users � Software as service (Saas) � Platform as a service (Paas) � Infrastructure as a service (Iaas) � Network as a service (Nass) � Communication as a service (Caas)

Deployment Models: Clouds can be divided based on their deployment and usage � Public clouds � Private clouds � Community clouds � Hybrid clouds

Characteristics: � Elasticity and scalability � Pay per use � On demand � Resiliency � Work load movement � Multi Tenancy.

Advantages: � Cost Efficient. � Easy access to

Information. � Unlimited Storage. � Backup and recovery. � Integration. � Quick deployment

Disadvantages: � Technical Issues. � Security Issues. � Prone to Attacks.

Purchase requisition

Request for Quote

Quotation

Purchase Order Receipts Payments

Customer order

Recording Pick Release

Shipping

Invoice Receipt Reconciliation

Source Document

Journals Ledger Trial Balance

Adjustments Adjusted Trial Balance

Closing Entries

Financial Statements

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

IPCC |35e |Flow charts_ Information Technology 29

4. Explain about Data Flow diagram?

5. Write short notes on Decision tables?

6. Explain about E-R diagram?

Data flow Diagrams

Meaning

DFD is a graphical representation of the flow of data through an information system.

Types of DFD: Physical data flow and logical data flow

Major components � Entity � Process � Data Store � Data Flow

Symbols: � Process - (or) � Attribute – (or) � Entity –

� Data Flow -

Advantages: � It aids in describing boundaries of system. � Easy to recognize. � Easy to communicate. � Easy to understand. � Displays flow of data in a system.

Limitations: � Creates little confusion � Takes long time to create. � Physical considerations

are left out.

Decision Tables

Definition � Tabular representation of program logic � Displays all conditions and the

appropriate actions to be taken for set of conditions

Advantages � Easy to draw � Simplicity � Modularity � Non-technical � Compact

documentation

Limitations � All programmers may not be

familiar with Decision tables. � Sometimes flow charts may be

better � Many not give complete picture of

the situation. Model of Decision Table

Condition

stub(s) Condition Entries

Action stub(s) Action Entries

E-R Diagrams

Meaning An Entity-Relationship diagram is a data modeling technique that creates a graphical representation of the entities and relationships between them.

Types of Relationships � One to one (1:1) � One to many (1:N) � Many to one (M:1) � Many to many (M:N)

Symbols: � Entity - � Attribute – � Key attribute – � Relationship -

Advantages: � Simple and Easily understood � Helps in Physical database creation � Helps in database design. � Gives high level description of system.

Disadvantages: � Ambiguities. � Misinterpretations

xyz

IPCC |35e |Flow charts_ Information Technology 30

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

7. Write short notes on Decision trees?

MODEL OF DECISION TREE

8. Write about Six Sigma model?

9. Write about TQM model

10. Write about Business Process Re-engineering?

It is defined as the fundamental rethinking and radical redesign of processes to achieve dramatic improvement, in the terms of performance such as cost, quality, service and speed.

Phases: i) Fundamental rethinking ii) Radical redesign iii) Dramatic achievement

BPR Model (Radical approach)

TQM Model (Incremental Approach)

It is a comprehensive and structured approach to organizational management that seeks to improve the quality of products and services through ongoing refinements in response to continuous feedback.

Phases: (i) Plan (ii) Do (iii) Check (iv) Act

Six Sigma Model

Six Sigma Employs quality management and statistical analysis of process outputs by removing defects and minimizing variability in manufacturing and business processes

Phases: � Define � Measure � Analyze � Improve � Control

Decision Trees

Definition It is a decision support tool that uses tree like model of decisions and their possible consequences, including chance, event outcomes, resource costs and utility.

Advantages � Simple to understand & interpret � Possible scenarios can be added � Worst, best and expected values

can be determined

Limitations Becomes very complex if many values are uncertain and/or if many outcomes are linked.

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

IPCC |35e |Flow charts_ Information Technology 31

11. Write short note on Flowcharts.

12. Write about BPM – Life cycle?

13. Explain the Benefits and Risks of IT in BPMS?

THE END

BPM Life Cycle

It establishes a sustainable process management capability that Empowers organization to Embrace and manage

process changes successfully.

1. Analysis

5. Optimize 2. Design

3. Implementation

4. Run & Monitor

Benefits and Risks of IT in BPMS

Benefits: � Automating repetitive business processes. � Operational savings. � Software can be made by loose coupling with

existing processes. � Freeing up of employee time. � Reduction in administration involved in

compliance and ISO activities.

Risks: � Technological problems. � Break down in gap analysis. � Failure to identify future business needs. � IT may be complicated or not flexible. � Deficient project management. � Limited options for customization. � Inadequate assessment of need for change management.

Flowchart

Meaning A flowchart is a diagram prepared by the programmer of the sequence of steps involved in solving a problem

Categories � System outline

charts � System flowcharts � Run flowcharts � Program flowcharts

Symbols: � Start/End - � Input / Output - � Process - � Decision box

Advantages: � Effective Analysis � Improved Communication. � Helps in Documentation. � Helps in coding. � Helps in tracing bugs / errors. � Quick grasp of relationships.

Limitations: � When logic is complex flow chart becomes

more complex. � For modifications complete redrawing is

necessary. � Reproduction in computers may be difficult.

Copyrights Reserved

To MASTER MINDS, Guntur

Cell: 98851 25025 / 26

Visit us @ www.mastermindsindia.com Mail: [email protected]

Facebook Page: Masterminds For CA Youtube Channel: Masterminds For CA

CA - IPCC

COURSE MATERIAL

Quality Education

beyond your imagination...

PART B - 2 MARK QUESTIONS / DEFINITIONS

Page 32

IPCC |35e |Fast Track Material in Information Technology 33

No.1 for CA/CMA & MEC/CEC MASTER MINDS

1. TELECOMMUNICATIONS AND NETWORKS

‘A’ Category

1. Computer Network 2. 3 – tier C/S architecture (MAY15 – 2M) It is a collection of computers and terminal devices connected together by a communication system. a) The set of computers may include large-scale

computers, medium scale computers, mini computers and micro computers.

b) The set of terminals may include dumb terminals, intelligent terminals and so on.

a) Presentation Tier: Occupies the top level and displays information related to services available on a website.

b) Application Tier: Also called the middle tier. It controls application functionality by performing detailed processing.

c) Data Tier: Houses database servers where information is stored and retrieved.

3. Protocol (SM, PM, RTP MAY-15) 4. Telecommunication Control Software or Telecommunications Software (SM)

It is a formal set of rules for communicating, including rules for timing of message exchanges, the types of electrical connections used by the communications devices, error detection, and means of granting access to communication channels and so on.

It consists of programs that control and manage the functions of telecommunication networks and include Telecommunication Monitors, Network Operating Systems, Network Management Components and Communication Packages

5. Router (PM, RTP - NOV 14) 6. Modem (SM, PM, MTP - MAY 16) a) Router is a communication processor that

interconnects networks based on different rules or protocols, so that a telecommunication message can be routed to its destination.

b) Routers perform the "traffic directing" functions on the Internet

a) It is a device that converts a digital computer signal into an analog signal (i.e. it modulates the signal) and converts an analog signal into a digital computer signal (i.e. it demodulates the signal) in a data communication system.

b) Modems are generally classified by the amount of data they can send in a given unit of time, usually expressed in bits per second

7. Multiplexer (SM, PM, MTP-OCT 14, RTP-NOV 14) 8. Bridge (PM)

a) It is a communications processor that allows a single communications channel to carry simultaneous data transmissions from many terminals.

b) Typically, a multiplexer merges the transmissions of several terminals at one end of a communications channel, while a similar unit separates the individual transmissions at the receiving end.

a) Bridge is a communication processor that connects number of Local Area Networks (LAN).

b) It magnifies the data transmission signal while passing data from one LAN to another.

9. MAN 10. WAN (SM) a) MAN is a digital communication system which

interconnects different sites, computers and user terminals that are spread over a metropolitan city.

b) A Metropolitan Area Network is some where between a LAN and a WAN.

c) Cable Television networks are best examples.

a) WAN is a digital communication system which interconnects different sites, computers and user terminals that are spread over a wide area (a state, a country or even world wide).

b) It is a commercial data network that provides data communication services for business and government agencies.

11. VPN (SM, NOV 14 – 2M, MTP – MAY16) 12. LAN (SM) a) It is a private network that uses a public

network to connect remote sites or users together in a secured manner through a firewall and other security features.

b) VPNs can be one of two types: Intranet-based and extranet-based.

A communications network that typically connects computers, terminals, and other computerized devices within a limited physical area such as an office, building, manufacturing plant, or other work site.

IPCC |35e |Fast Track Material in Information Technology 34

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

13. Repeaters (PM, MTP-FEB 15) 14. HUB (PM) a) Repeater is a communication processor that

boosts or amplifies the signal before passing it to the next section of cable in a network.

b) A telephone repeater is an amplifier in a telephone line, an optical repeater is an optoelectronic circuit that amplifies the light beam in a optical fiber cable; and a radio repeater is a radio receiver and transmitter that retransmits a radio signal.

a) It is a port-switching communication processor. This allows for the sharing of the network resources such as servers, LAN workstations, printers, etc.

b) It has multiple input/output ports. c) A hub works at the physical layer of the OSI

model.

15. Switches (PM, RTP-MAY 15) 16. Business Values of Extranet (MAY15 – 2M)

a) It is a communication processor that makes connections between telecommunication circuits in a network so that a telecommunication message can reach its intended destination.

b) It is a temporary point to point connecting device which can be able to transfer data from source to intended destination.

a) Extranet enables a company to offer new kinds of interactive web enables service to their business partners.

b) Extranets enable and improve collaboration by a business with its customers and other business partners.

c) Extranet facilitates an online, interactive product development, marketing and customer focused process that can bring better designed products to market faster.

17. TCP/IP (RTP-NOV 14) 18. Network Interface Card (PM) a) TCP / IP is a protocol used on the Internet.

TCP/IP creates a packet-switching network. b) TCP deals with exchange of sequential data.

IP handles packet switching and is used on the Internet.

a) NIC is a computer hardware component that connects a computer to a computer network.

b) It has additional memory for buffering incoming and outgoing data packets, thus improving the network throughput.

19. Extranet (SM) 20. Intranet (SM, RTP-MAY 15)

a) Extranets are network links that use Internet technologies to interconnect the Intranet of a business with the Intranets of its customers, suppliers, or other business partners.

b) It is part of company’s intranet that is extended to users outside the company.

a) An Intranet is a network inside an organization that uses Internet technologies such as web browsers and servers, TCP/IP network protocols.

b) Intranet can also be used to facilitate working groups, video conferencing and continuous updating of company database.

c) Intranets is the main means of intra-office communication.

21. Threat 22. Bandwidth (SM)

A threat is anything that can disrupt the operation, functioning, integrity or availability of a network or system. Network security threats can be categorized into following four broad themes: a) Unstructured threats b) Structured threats c) External threats d) Internal threats

a) The capacity of a communications channel as measured by the difference between the highest and lowest frequencies that can be transmitted by that channel.

b) It refers to a channel’s information carrying capacity.

c) It is usually measured in terms of bits per second (bps).

23. Vulnerability (MTP-FEB 15) 24. Cryptography

(MTP-SEP 14, RTP-MAY 15)

Vulnerability is an inherent weakness in the design, configuration or implementation of a network or system that renders it susceptible to a threat.

Cryptography is the practice and study of techniques for secure communication in the presence of third parties. It deals with encryption and decryption of data.

IPCC |35e |Fast Track Material in Information Technology 35

No.1 for CA/CMA & MEC/CEC MASTER MINDS

25. Firewalls (PM, RTP-NOV 14) 26. Electronic commerce (SM) a) Firewall is a device that forms a barrier

(fence) between a secure and an open environment.

b) It acts as a system or combination of systems that enforces a boundary between more than one networks.

a) It is the process of doing business electronically.

b) It involves automation of a variety of business-to-business and business-to-customer transactions through reliable and secure connections.

27. Network Server (SM) 28. Server (SM, PM) a) A network server is a computer system, which

is used as the central repository of data and various programs that are shared by users in a network.

b) LANs use a powerful microcomputer with a large disk capacity as a file server or network server.

c) The server handles resource sharing and telecommunications.

a) In client-server architecture, a server is a computer Program running to serve the requests of other Programs, called the ‘clients’

b) Typical computing servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers

29. Hyper Text Transfer Protocol Secure (MTP - FEB 15, OCT 14, MAY 16)

30. Intrusion Detection System (RTP-MAY 15)

a) HTTPS is a communications protocol for secure communication over a computer network, with especially wide deployment on the Internet.

b) The security of HTTPS uses long term public and secret keys to exchange a short term session key to encrypt the data flow between client and server.

a) An IDS is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a Management Station.

b) The goal of is to monitor network assets to detect anomalous behavior and misuse.

‘B’ Category

31. Telecommunications Processors (SM) 32. Communication Satellites (SM, MTP-MAY 16)

a) Telecommunications Processors support data transmission and reception between terminals and computers by providing a variety of control and support functions.

b) Multiplexers, concentrators, communications controllers, and cluster controllers are some of the examples.

a) A satellite is some solar-powered electronic device that receives, amplifies, and retransmits signal.

b) They are used extensively for high-volume as well as long-distance communication.

c) It is cost-effective method for moving large quantities of data over long distances.

33. Telecommunications Media (SM) 34. Simplex Connection: (MTP-SEP 14) a) Telecommunications medium/media is a path

between the sender and the receiver that carries the data in the form of signals.

b) They include, twisted- pair wire, coaxial cables, fiber optic cables, terrestrial microwave, communications satellite, cellular, and infrared systems.

a) A simplex connection is a connection in which the data flows in only one direction, from the transmitter to the receiver.

b) This type of connection is useful if the data do not need to flow in both directions (for example, from your computer to the printer or from the mouse to your computer.).

35. Secure Shell (SSH) (MTP-MAY 16) 36. Scalability (SM) a) Secure Shell is a program to log into another

computer over a network, to execute commands in a remote machine, and to move files from one machine to another.

b) It provides strong authentication and secure communications over insecure channels.

c) SSH protects a network from attacks such as IP spoofing, IP source routing, and Domain Name System (DNS) spoofs.

a) Scalability is the ability of a system, network, or process to handle a growing amount of work in a capable manner or its ability to be enlarged to accommodate that growth.

b) For example, it can refer to the capability of a system to increase its total output under an increased load when resources (typically hardware) are added.

IPCC |35e |Fast Track Material in Information Technology 36

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

37. Resilience (RTP-NOV 15) 38. Routing (SM)

a) It refers to the ability of a network to recover from any kind of error like connection failure, loss of data etc.

b) Computer networking community defines Resiliency as the combination of trustworthiness (dependability, security, performability) and tolerance (survivability, disruption tolerance, and traffic tolerance)

a) Refers to the process of deciding on how to communicate the data from source to destination, in a network.

b) Routing schemes differ in their delivery semantics: unicast, broadcast, multicast, anycast, geocast.

39. Serial Transmission 40. Parallel Transmission

a) In serial transmission bits of each byte are transmitted one after the other along a single path. Example –Serial port.

b) It can occur in any of the two ways - Asynchronous & Synchronous transmission.

a) In this all the bits of each byte are transmitted simultaneously i.e. each bit will have a unique channel dedicated to it.

b) Example – Parallel port being used for printers.

41. Secure Socket Layer (MTP SEP-15. MAY 16-2M)

42. Mobile Commerce (RTP-NOV 14)

a) It is essentially a protocol that provides a secure channel between two machines operating over the Internet or an internal network.

b) The SSL protocol is typically used when a web browser needs to securely connect to a web server over the inherently insecure Internet.

c) In practice, SSL is used to secure online credit card transactions, system logins and any sensitive information exchanged online, to secure webmail and applications

a) M-Commerce is about the explosion of applications and services that are becoming accessible from Internet-enabled mobile devices.

b) M-commerce is the buying and selling of goods and services through wireless handheld devices such as cellular telephone and Personal Digital Assistants (PDAs).

‘C’ Category

43. Network Architecture (SM) 44. Network Operating System (SM)

a) It refers to the layout of the network, consisting of the hardware, software, connectivity, communication protocols and mode of transmission, such as wired or wireless.

b) The diagram of the network architecture provides a full picture of the established network with detailed view of all the resources accessible.

a) An operating system oriented to computer networking, to allow shared file and printer access among multiple computers in a network, to enable the sharing of data, users, groups, security, applications, and other networking functions.

b) It is a program that is used to control telecommunications and the use of and sharing of network resources.

45. Radio Waves (MTP-MAR 15) 46. Electronic Mail (e-mail) (SM)

a) Radio waves are an invisible form of electromagnetic radiation that varies in wavelength from around 1 millimeter to 1,00, 000kms.

b) These are commonly used transmission media in Wireless Local Area Networks.

a) The computer-to-computer exchange of messages in an electronic format through a mail server.

b) Examples are Gmail, Yahoomail, Rediffmail, Hotmail etc.

IPCC |35e |Fast Track Material in Information Technology 37

No.1 for CA/CMA & MEC/CEC MASTER MINDS

47. Cryptographic Controls (MTP – MAY 16, MAY16 – 2M)

48. Micro Waves: (RTP- MAY 16)

a) Cryptographic Controls are designed to protect the privacy of data and to prevent unauthorized modifications of data.

b) Cryptography achieves this goal by scrambling data into codes (cryptograms) so that it is Meaningless to anyone who does not possess the authentication to access the respective system resource or file.

a) Microwaves are radio waves with wavelengths ranging from as long as one meter to as short as one millimeter, or equivalently, with frequencies between 300 MHz (0.3 GHz) and 300 GHz.

b) These are used for communication, radar systems, radio astronomy, navigation and spectroscopy.

2. INFORMATION SYSTEMS AND IT FUNDAMENTALS

‘A’ Category

1. Information System (RTP-MAY 15) 2. Random Access Memory (RAM) (SM)

a) It is a set of interrelated components working together to collect, retrieve, process, store and disseminate (distribute) information for the purpose of achieving objectives such as planning, coordination, analysis and decision making.

b) Generally called as Management Information System (MIS) or Computer Based Information System (CBIS).

a) This is Read Write memory. b) Information can be read as well as modified

(i.e. write). c) This is a Volatile memory. Volatile in nature

means Information is lost as soon as power is turned off.

d) Types of RAMs: Dynamic RAM and Static RAM

3. Read Only Memory (SM, RTP- MAY 16) 4. CPU (SM)

a) ROM is non-volatile in nature. b) These are used to store small amount of

information for quick reference by CPU. c) Information can be read not modified. d) Generally used by manufacturers to store data

& Programs.

a) The brain of a computer, is the actual hardware that interprets and executes the program instructions and coordinates how all the other hardware devices work together.

b) It consists of three functional units: Control unit, Arithmetic Logical unit and ‘Registers & cache’.

5. Direct Memory Access (DMA) (PM) 6. Registers (SM)

a) It is a feature of modern computers that allows certain hardware subsystems within the computer to access system memory independently of the Central Processing Unit.

b) DMA can also be used for "memory to memory" copying or moving of data within memory. DMA can offload expensive memory operations.

a) A processor often contains several kinds of registers, that can be classified according to their content or instructions that operate on them.

b) These are high speed memory units within CPU for storing small amount of data (mostly 32 or 64 bits) temporarily while performing several Computations.

7. Non-Volatile Memory 8. Memory Controller (PM)

a) Some memory chips always retain the data they hold even when the computer is turned off.

b) This type of memory is called non-volatile. (e.g. ROM).

a) It is a digital circuit which manages the flow of data going to and from the computer's main memory.

b) A memory controller can be a separate chip or integrated into another chip.

IPCC |35e |Fast Track Material in Information Technology 38

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

9. Application Software (MTP-SEP 14, MAY 16) 10. Volatile Memory

a) Computer software designed to help the user to perform specific tasks.

b) Application software includes all those computer software that cause a computer to perform useful tasks beyond the running of the computer itself.

c) It is designed for specific computer application. For example, a program that prepares payroll for a business is an application program.

a) The memory which loses their contents when the computer's power is turned off. E.g. RAM

b) It requires constant power to maintain the stored information. Volatile memory is typically used only for primary storage.

11. System Software (SM) 12. Computer Bus (PM, MTP-FEB 15)

a) Computer (system) software designed to operate the computer hardware and to provide and maintain a platform for running application software.

b) System software is essential for the development of application software.

c) The purpose of system software is to insulate the application programmer as much as possible from the details of the computer.

A communication system that transfers data between components inside a computer or between computers that covers all related hardware components (wire, optical fiber, etc.) and software, including communication protocol. a) Computer bus is also termed as System Bus. b) Computer Bus = Address bus + Data bus +

Control bus

13. Multiprocessing (PM) 14. Electronic Data Interchange (EDI) (SM)

a) Multiprocessing is the use of two or more Central Processing Units (CPUs) within a single computer system to allocate tasks between them.

b) In a multiprocessing system, all CPUs may be equal, or some may be reserved for special purposes. A combination of hardware and operating system software design considerations determine the symmetry (or lack thereof) in a given system.

a) The direct computer-to-computer exchange between two organizations of standard business transaction documents.

b) EDI can be formally defined as the transfer of structured data, by agreed message standards, from one computer system to another without human intervention.

15. Cache Memory (SM, RTP-NOV 14) 16. Client/Server Networks (SM)

a) It is a memory that lies in the path between the processor and the RAM, which a computer microprocessor can access more quickly than it can access regular RAM.

b) Cache depends on locality of reference that improves effective memory access time in a computer.

a) A computing environment where end user workstations (clients) are connected to micro or mini LAN (servers) or possibly to a mainframe (super server).

b) Clients and servers exchange messages in

a request–response messaging pattern: The client sends a request, and the server returns a response. This exchange of messages is an example of inter-process communication.

17. Machine Cycle 18. Computer Networks (SM,RTP-MAY 15)

a) Machine cycle = Fetch + Decode + Execute + Store

b) Fetch and decode are done by Control Unit (CU) whose job is to understand and explain to Arithmetic Logic Unit (ALU). ALU is used to execute and results are stored in Register.

a) It is a collection of computers and other hardware interconnected by Communication channel that allow sharing of resources and information.

b) Each component, namely the computer or a hardware device in a computer network is called a 'Node'.

c) Used to exchange of data among different computers and also used to share the resources.

IPCC |35e |Fast Track Material in Information Technology 39

No.1 for CA/CMA & MEC/CEC MASTER MINDS

19. Hardware Virtualization (PM) 20. Mobile Computing (SM)

a) Hardware Virtualization or Platform Virtualization refers to the creation of a virtual machine that acts like a real computer with an operating system.

b) Software executed on these virtual machines is separated from the underlying hardware resources.

a) It is the use of portable computing devices (such as laptop and handheld computers), in conjunction (combination) with mobile communications technologies, to enable users to access the Internet and data on their home or work computers, from anywhere in the world.

b) It is enabled by use of mobile devices such as PDA, laptops, mobile phones, smart phones, tablet PC and Palmtops on a wireless network.

21. Smart Phone (SM) 22. Touchpad (SM)

a) A mobile phone built on a mobile operating system, with more advanced computing capability connectivity than a feature phone.

b) These handheld devices integrate mobile phone capabilities with the more common features of a handheld computer or PDA.

c) Modern devices include high-resolution touch screens and web browsers for Internet browsing.

a) It is a pointing device featuring a tactile sensor, a specialized surface that can translate the motion and position of a user's fingers to a relative position on screen.

b) It is a common feature of laptop computers, and also used as a substitute for a mouse where desk space is limited.

c) These operate in one of several ways, including capacitive sensing and conductance sensing.

23. LAPTOP (NOTEBOOK) (SM) 24. Tablet (SM)

a) A small, portable computer and small enough that it can sit on a lap.

b) Notebook (Laptop) is an extremely lightweight personal computer.

c) Use flat-panel technologies, to produce a lightweight and non- bulky display screen

a) A tablet computer, or simply tablet is a one piece general-purpose computer contained in a single panel. Its distinguishing characteristic is the use of a touch screen as the input device.

b) Modern tablets are operated by fingers, and a stylus is an option, whereas earlier tablets required a stylus.

25. Servers (Based on client/server architecture) (SM) 26. Android (SM, MTP-MAR 15)

a) A server is a computer (Hardware) or device on a network dedicated to serve the needs of the users of other computers on a network.

b) Server performs some computational task on behalf of ‘clients’. The clients either run on the same computer, or they connect through the network.

a) It is a Linux-based operating system designed primarily for touch screen mobile devices such as s and tablet computers.

b) It is open source software, which allows the software to be freely modified and distributed by device manufacturers, wireless carriers and enthusiast developers.

27. I – Pad 28. I – Pod (MAY 16-2M)

a) It is a line of tablet computers designed and marketed by Apple Inc., which runs Apple's iOS.

b) It has built-in Wi-Fi and cellular connectivity. c) It can shoot video, take photos, play music,

and perform Internet functions such as web-browsing and emailing. Other functions—games, reference, GPS navigation, social networking, etc.—can be enabled by downloading and installing apps.

a) The iPod is a line of portable media players designed and marketed by Apple Inc.

b) There are four current versions of the iPod: the ultra-compact iPod Shuffle, the compact iPod Nano, the touch screen iPod Touch, and the hard drive-based iPod Classic.

c) iPods can serve as external data storage devices. Storage capacity varies by model, ranging from 2 GB to 160 GB.

IPCC |35e |Fast Track Material in Information Technology 40

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

29. System Development Life Cycle (SM, MAY 15-2M)

30. Primary Memory: (RTP-MAY 15)

a) It is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.

b) Phases are

• System Investigation

• System Analysis

• System Designing

• System Implementation

• System Maintenance and Review

a) These are devices in which any location can be accessed in any order (in contrast with sequential order) directly by the CPU.

b) These are primarily of Two types: Random Access Memory (RAM) and Read Only Memory (ROM).

31. Virtual Memory (SM, MTP-OCT 14, MAY 16, RTP- NOV 14)

32. Bluetooth (SM, RTP-NOV 14,NOV 14 – 2M)

a) Virtual Memory is in fact not a separate device but an imaginary memory area supported by some operating systems (for example, Windows) in conjunction with the hardware.

b) Virtual memory combines computer’s RAM with temporary space on the hard disk.

a) Bluetooth is a wireless technology standard for exchanging data over short distances up to 50 meters (164 feet) from fixed and mobile devices, creating Personal Area Networks (PANs) with high levels of security.

b) It is a feature which is used every day through a number of compatible devices.

33. Operating System (SM, RTP-NOV 14) 34. WI-FI (SM, MTP-FEB 15)

a) OS is a set of computer Programs that manages computer hardware resources and acts as an interface with computer applications Programs.

b) The operating system is a vital component of the system software in a computer system.

a) Wi-Fi is a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections and have limited range.

b) Wi-Fi networks use radio technologies called 802.11 to provide secure, reliable, fast wireless connectivity.

c) A Wi-Fi network can be used to connect electronic devices to each other, to the Internet, and to wired networks (which use Ethernet technology).

‘B’ Category

35. Instruction Set Architecture (ISA) (SM, MTP-SEP 14, RTP-MAY 15)

36. Micro architecture (SM, MTP-OCT 14, MAY 16)

a) It is the abstract model of a computing system that is seen by a machine language programmer, including the instruction set, memory address modes, processor registers, and address and data formats.

b) The ISA basically deals with what the chip does. It's a sort of 'bridge' between software and hardware.

a) It, also known as Computer Organization. It is a lower level detailed description of the system that is sufficient for completely describing the operation of all parts of the computing system, and how they are inter-connected and inter-operate in order to implement the ISA.

b) It is a term used to describe the resources and methods used to achieve architecture specification.

Copyrights Reserved

To MASTER MINDS, Guntur

IPCC |35e |Fast Track Material in Information Technology 41

No.1 for CA/CMA & MEC/CEC MASTER MINDS

37. Mobile Software: (RTP-NOV 15) 38. Mobile Hardware: (RTP-MAY 15)

a) Mobile Software is the actual program that runs on the mobile hardware.

b) It deals with the characteristics and requirements of mobile applications and is the engine of that mobile device.

c) In other terms, it is the operating system of that appliance.

d) It is the essential component that makes the mobile device operates.

a) Mobile Hardware includes mobile devices or device components that receive or access the service of mobility.

b) They would range from Portable laptops, Smart phones, Tablet PC’s to Personal Digital Assistants (PDAs).

c) These devices will have receptors that are capable of sensing and receiving signals.

d) These devices are configured to operate in full- duplex, whereby they are capable of sending and receiving signals at the same time.

39. Key benefits of BPA (MAY 15-2M) 40. Database model (SM)

a) Reducing the Impact of Human Error b) Transforming Data into Information c) Improving performance and process

effectiveness d) Making users more efficient and effective e) Making the business more responsive: f) Improving Collaboration and Information

Sharing

a) A database model is a type of data model that determines the logical structure of a database and fundamentally determines in which manner data can be stored, organized and manipulated.

b) Examples are � Hierarchical Database Model, � Network Database Model, � Relational Database Model, and � Object oriented Database Model

41. Database Management Systems (RTP – MAY 16)

42. Primary Key: (MTP – MAY 16)

a) (DBMS) are software that aid in organizing, controlling and using the data needed by the application program.

b) They provide the facility to create and maintain a well-organized database. Applications access the DBMS, which then accesses the data.

c) Commercially available Data Base Management Systems are Oracle, My SQL, SQL Servers and DB2 etc.

a) A key that can be used to uniquely identify a

row in a table is called a Primary Key. b) Keys are commonly used to join or combine

data from two or more tables. c) Keys are also critical in the creation of

indexes, which facilitate fast retrieval of data from large tables.

‘C’ Category

43. Cathode-Ray Tube (CRT) 44. Liquid Crystal Display (LCDs)

a) A vacuum tube that uses an electron gun (cathode) to emit a beam of electrons that illuminate phosphors on a screen as the beam sweeps across the screen repeatedly. A monitor is often called a CRT

b) Here an Electron beam is controlled by Horizontal and vertical plates/coils and are focussed on the screen (Phosphor coated screen).

c) The size of CRTs are huge and consume more power than LCDs & LEDs.

a) A low-powered display technology used in laptop computers where rod-shape crystal molecules change their orientation when an electrical current flows through them.

b) LCDs are used in a wide range of applications including computermonitors,televisions, instrument panels, aircraft cockpit displays, clocks, watches and calculators.

c) They consume very less power and are portable to CRTs.

IPCC |35e |Fast Track Material in Information Technology 42

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

45. Laser Printer 46. Ink-jet Printer

a) A printer that forms images using an electrostatic process, the same way a photocopier works.

b) Laser is the heart of these printers. A separate CPU is built into the printer to interpret the data and to control the Laser beam.

c) Laser printers can print alphanumeric characters, high quality images, graphs, etc.

a) A printer that makes images by forcing ink droplets through nozzles.

b) Here there is no direct contact between the printer’s print head and paper.

c) These are generally used in Digital colour labs for printing Photographs and images on a specialized paper.

d) Types of Inkjet Printers: Liquid Inkjets and Solid Inkjets.

47. Plotter 48. Speakers

a) A graph plotter is a device capable of tracing out graphs, designs and maps onto paper and even on plastic or metal plates. High degree of accuracy can be achieved, even upto one thousandth of an inch.

b) It is more software dependent than any other peripheral device and it needs much more instructions than a printer.

a) Speakers are general audio output devices; contain small amplifiers to boost up the audio information.

b) Speakers are connected to the sound card on the motherboard.

c) Speakers contain a magnet which moves back and forth with the changing current, creating vibrations called sound.

3. BUSINESS INFORMATION SYSTEMS

‘A’ Category

1. Knowledge Management System (SM, MTP-FEB 15)

2. System

a) KMS refer to a system for managing knowledge in organizations for supporting creation, capture, storage and dissemination of information.

b) It enables employees to have ready access to the organizations documented base of facts, sources of information and solutions.

a) The system is a set of mutually related, coordinated elements or components that operate together to accomplish objectives by taking inputs and producing outputs in an organized manner.

b) A system contains several subsystems with sub goals, all contributing to meet the overall system goal.

3. Tacit knowledge 4. Atomicity

a) Tacit knowledge, resides in a few often-in just one person and hasn’t been captured by the organization or made available to others.

b) Tacit knowledge is unarticulated and represented as intuition, perspective, beliefs, and values that individuals form based on their experiences.

c) For example – hand-on skills, special know-how, employee experiences.

a) Atomicity requires that each transaction is "all or nothing": if one part of the transaction fails, the entire transaction fails, and the database state is left unchanged.

b) An atomic system must guarantee atomicity in each and every situation, including power failures, errors, and crashes.

5. Online Analytical Processing (OLAP) (SM, PM)

6. Analytical CRM (SM)

a) OLAP is a multi-dimensional analytical tool typically used in data mining, that gathers and process vast amounts of information into useful packets.

b) OLAP is part of the broader category of business intelligence, which also encompasses relational database, report writing and data mining

a) Analytical CRM comprises the analysis and systematic evaluation of customer data using business intelligence functions.

b) The aim is to filter out the key facts from gathered information and gain customer knowledge.

IPCC |35e |Fast Track Material in Information Technology 43

No.1 for CA/CMA & MEC/CEC MASTER MINDS

7. Durability 8. Model base

Durability means that once a transaction has been committed or saved, it will remain so, even in the event of power loss, crashes, or errors.

a) It is the “brain” of the Decision Support System. b) It processes data with the help of data provided

by the user and the database. c) The analysis provided by model base is the key

for user’s decision.

9. MS Office Applications: (MTP-SEP 14) 10. Nucleus FinnOne: (MAY 16-2M)

a) These are various office automation systems made available by Microsoft Corporation which include MS Word, MS Excel, MS PowerPoint, MS Access, etc.

b) Each of these software help to achieve automation of various tasks in the office.

c) It has features such as customized ribbon, back stage view, built-in graphics toolset, enhanced security, etc.

a) FinnOne is a web-based global banking product

designed to support banks and financial solution companies in dealing with assets, liabilities, core financial accounting and customer service.

b) The solution is wholly focused on banking and financial services spanning across solutions in the areas of Retail & Corporate Banking, Cash Management, Relationship Banking, Financial CRM, Credit Risk & Appraisal, EAI, Internet Banking, FX, Basel II, Data warehousing and Analytics.

11. Credit Cards 12. Smart Cards (MTP-OCT 14, MAY 16)

a) A credit card is a plastic card issued by a financial institution that allows its user to borrow pre-approved funds at the point of sale in order to complete a purchase.

b) Credit cards have a credit limit -- the user can borrow during a given period.

c) The credit limit is pre-determined by the card issuer based on the cardholder's credit rating and credit history

a) Smart cards have an embedded microchip instead of magnetic strip.

b) The chip contains all the information a magnetic strip contains but offers the possibility of manipulating the data and executing applications on the card.

c) Three types of smart cards are Contact cards, Contact-less and Hybrid cards.

13. Enterprise Resource Planning System (SM) 14. Supply Chain Management

a) An ERP system is a fully integrated business management system, covering functional areas of an enterprise like Procurement, Inventory, Production, Sales, Logistics, Finance, Accounting and Human Resources.

b) It organizes and integrates operation processes and information flows to make optimum use of resources such as men, material, money and machine, i.e. ERP is the way an Enterprise plans the optimum use of its resources.

a) SCM is the process of planning, implementing and controlling the operations of the supply chain with the purpose to satisfy customer requirements in an efficient way.

b) It covers all movements and storage of raw materials, work-in-process, and finished goods from point-of-origin to point-of-consumption.

c) It integrates supply and demand management, within and across companies.

15. Artificial Intelligence (SM, RTP-NOV 14, MTP-MAR 15)

16. Knowledge base

a) AI is the distinct area of computer science focusing on creating machines that tries to imitate aspects of human behavior, such as to reason, communicate, see, and hear.

b) AI software can use its accumulated knowledge to reason and in some instances learn from experience and thereby modify its subsequent behavior.

c) Expert systems, Pattern recognition, Natural language processing, and many other areas where AI can be applied.

a) This includes data, knowledge, relationships, rules of thumb (heuristics) and decision rules used by experts to solve a particular type of problem.

b) A knowledge base in a computer is equal to the knowledge of an expert or group of experts developed through years of experience in their field.

c) The knowledge base encloses both realistic and heuristic knowledge.

IPCC |35e |Fast Track Material in Information Technology 44

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

17. Consistency 18. Isolation

Consistent state means that there is no violation of any integrity constraints. If an integrity constraint states that all transactions in a database must have a positive value, any transaction with a negative value would be refused.

Transactions must appear to take place in isolation or individual. Isolation requires that multiple transactions occurring at the same time not impact each other’s execution.

19. Electronic purses 20. CRM (MTP-OCT 14)

a) Electronic purse is very similar to a pre-paid card where funds can be directly deducted from the Card to vendor’s POS terminal.

b) When the value on a card is spent, consumers can load additional funds from their accounts to the card.

c) Validation is done through a PIN.

a) It includes the methodologies, technology and capabilities that help an enterprise to manage customer relationships.

b) Allows businesses to develop long-term relationships with established and new customers, while helping to modernize corporate performance.

21. Extensible Business Reporting Language (PM, MTP-FEB 15, MTP-MAY 16)

22. Knowledge management (KM) (SM, PM)

a) XBRL is freely available international standards-based business reporting language developed by accountants for financial reporting.

b) XBRL is a standards-based way to communicate and exchange business information between business systems.

a) It is the process of capturing, developing, sharing, and effectively using organizational knowledge.

b) It refers to a multi-disciplined approach to achieving organizational objectives by making the best use of knowledge.

23. Explicit knowledge 24. Information (RTP-NOV 15)

a) Explicit knowledge is that which can be formalized easily and as a consequence is easily available across the organization.

b) For example – Online tutorials, Policy and procedural manuals.

a) Processing of data is known as information b) Data is a raw fact and can take the form of a

number or statement, such as a date or a measurement, which has some meaning.

25. Special Purpose Planning languages (PM, MTP-MAY 16)

26. General Purpose Planning languages (PM, MTP-MAY 16)

a) These are more limited in what they can do, but they usually do certain jobs better than the general purpose planning languages.

b) Some of the statistical languages such as SAS and SPSS are examples.

a) These allow users to perform many routine tasks, retrieving various data from a database or performing statistical analyses.

b) These languages enable user to tackle abroad range of budgeting, forecasting and other worksheet-oriented problems.

c) Examples are Electronic spreadsheets.

‘B’ Category

27. Business Information System (PM,RTP-NOV 14)

28. Transaction Processing System (SM, MTP-OCT 14, MTP-MAY 16)

a) It is defined as system integrating business functions and information modules for establishing effective communication channels which are useful for making timely and accurate decisions and in turn contribute to organizational productivity and competitiveness.

b) BIS may be defined as systems which integrate information technology, people and business.

a) A TPS is a type of information system that collects, stores, modifies and retrieves the day-to-day data transactions of an enterprise.

b) TPS systems are designed to process transactions instantaneously to ensure that customer data is available to the processes that require it.

c) TPS is also known as transaction processing or real time processing.

IPCC |35e |Fast Track Material in Information Technology 45

No.1 for CA/CMA & MEC/CEC MASTER MINDS

29. Frame based Expert systems (SM) 30. Rule-based systems (SM)

Frame based systems organize all the information (data, description, rules etc.) about a topic into logical units called frames, which are similar to linked records in data files. Rules are then established about how to assemble or inter-relate the frames to meet the user’s needs.

a) Rule-based systems are created by storing data and decision rules as if-then rules. The system asks the user questions and applied the if-then rules to the answers to draw conclusions and make recommendations

b) Rule-based systems are appropriate when a history of cases is unavailable or when a body of knowledge can be structured within a set of general rules.

31. Oracle's FLEXCUBE (SM) 32. Oracle FLEXCUBE Benefits (SM)

a) Oracle FLEXCUBE helps banks transform their business model from disparate operations towards centralization of key functions, such as accounting, customer information, and management information.

b) The centralization of operations is further augmented by role based dashboards that guide business users to take action on critical tasks, track their pending activities, and get insights into customer information and interaction.

c) The application also provides comprehensive product processing capabilities to cater to various lines of business.

Oracle FLEXCUBE empowers universal banks with:

a) Superior Web experience through self-service and assisted channels

b) Improved bank staff productivity with intuitive, role-based dashboards

c) Comprehensive transaction banking capabilities and Straight-Through-Processing (STP)

d) Improved risk management and reporting

‘C’ Category 33. Business Process

(SM, PM, MTP-MAR 15) 34. Desktop Publishing (SM, RTP – MAY 16)

A Business Process is a collection of related, structured activities or tasks that produce a specific service or product (serve a particular goal) for a specific organization.

The Desktop Publishing systems are often supported with laser printers, inkjet printers, scanners and other such devices for producing good quality documents. The desktop publishing systems help in quick production of multiple copies of the document with quality printing.

35. Customer Relationship Management Systems (SM)

36.Strategic-Level Systems: (RTP-NOV 15)

a) Information systems that track all the ways in which a company interacts with its customers and analyze these interactions to optimize revenue, profitability, customer satisfaction, and customer retention.

b) These are specialized applications catering to the need of organizations largely in FMCG (Fast-Moving Consumer Goods) categories.

a) These are the systems for strategic managers to track and deal with strategic issues, assisting in long-range planning.

b) A principle area is tracking changes in the external conditions (market sector, employment levels, share prices, etc.) and matching these with the internal conditions of the organization.

37.Old Pareto Rule “80/20 Rule - CRM (SM,MTP-SEP 15)

38. Human Resources Management System

a) Old Pareto Rule "80/20 rule" emphasizes that most organizations find that approximately 20% of their customer base generates 80% of the profits.

b) It is merely based on the philosophy that indicates that old trustworthy customers are most lucrative and helps in generating profits.

c) It is at the present imperative that businesses make out the noteworthy characteristics of this assemblage, keep hold of these exceedingly desirable customers, and discover ways to augment the size.

a) A software application that coalesce many human resources functions, together with benefits administration, payroll, recruiting and training, and performance analysis and assessment into one parcel.

b) HRMS refers to the systems and processes at the intersection between Human Resource Management and Information Technology.

IPCC |35e |Fast Track Material in Information Technology 46

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

39. Infosys’ Finacle (SM) 40. Key Modules Of Finacle (SM)

a) Finacle core banking solution is a comprehensive, agile, componentized yet integrated business solution, addressing all the core needs of banks, in easy-to-configure modules.

b) With a 360 degree single source view into customer accounts, banks can empower customers with relevant information an delight them with the right offerings, presented at the right time through the right channel.

a) Enterprise customer information b) Consumer banking c) Corporate banking d) Trade finance e) Customer analytics f) Wealth management g) Islamic banking h) Payments i) Origination & j) Dashboards

41. Example-based Expert system (SM)

a) In Example-based Expert system, developers enter the case facts and results.

b) Through induction the ES converts the examples to a decision tree that is used to match the case at hand with those previously entered in the knowledge base.

4. BUSINESS PROCESS AUTOMATION THROUGH APPLICATION SOFTWARE

‘A’ Category

1. Business Process Automation (SM, RTP-MAY 15, NOV 14-2M, MTP-MAY 16)

2. TALLY

a) Removing the human element from existing business processes by automating the repetitive or standardized process components.

b) The primary reasons for automation by enterprises are: Cost Saving, remain competitive, fast service to customers.

c) Objectives are Confidentiality, Integrity, Availability, Timeliness.

a) It is an accounting application that helps entity to automate processes relating to accounting of transactions.

b) It also helps to achieve automation of few processes in inventory management.

c) It has features such as Remote Access Capabilities, Tax Audit and Statutory Compliance, Payroll, Excise for Manufacturers, Multilingual Support, TDS, VAT etc.

3. SAP R/3 4. Vehicle Tracking System

a) It is ERP software, which allows an entity to integrate its business processes.

b) It has the features such as time management, reporting and analytics, budget monitoring, workflow approval, sales management, team management, leave management, travel management, recruitment management and demand planning.

a) Applications allowing owner of goods to check the temperature of cold stored goods while in transit.

b) It has features such as GPS based location, GPRS connection based real-time online data-logging and reporting, route accuracy on the fly while device is moving, real-time vehicle tracking, SMS & e-mail notifications etc.

5. Information Worker Software 6. Enterprise Infrastructure Software

Addresses individual needs required to manage and create information for individual projects within departments. E.g. Spreadsheets, CAAT (Computer Assisted Audit Tools), etc.

Provides capabilities required to support enterprise software systems. E.g.: email servers, Security software.

IPCC |35e |Fast Track Material in Information Technology 47

No.1 for CA/CMA & MEC/CEC MASTER MINDS

7. File Management System 8. Educational Institute Management Systems

a) These allow office records to be kept in soft copy and easy tracking of the same.

b) It has features such as web access, search, Microsoft office integration, records management software, electronic forms (e-forms), calendar, etc.

a) ICAI, itself is a good example of Educational Institute Management Systems.

b) A student based on his/her registration number can file many documents online including exam forms.

c) It has features such as student’s registration, student’s admission, fee collection, student’s attendance, result management and result analysis.

9. Real-time Processing 10. Network Virtualization (RTP-MAY 15)

a) Real time processing is a subset of interactive or online processing. Input is continuously, automatically acquired from sensors.

b) After the system is finished responding, it reads the next set of input data immediately to process that.

c) This system doesn't need a user to control it, it works automatically.

a) It is the process of combining hardware and software network resources and network functionality into a single, software-based administrative entity, a virtual network.

b) Allows a large physical network to be provisioned into multiple smaller logical networks.

c) This behavior allows administrators to improve network traffic control, enterprise and security.

11. Grid Computing 12. Online Processing

a) It is a computer network in which each computer's resources are shared with every other computer in the system. It is a special kind of distributed computing.

b) Processing power, memory and data storage are all community resources that authorized users can tap into and leverage for specific tasks.

c) This system can be as simple as a collection of similar computers or as complex as inter-networked systems.

a) Data is processed immediately while it is entered, the user usually only has to wait a short time for a response. (Example: games, word processing, booking systems).

b) Interactive or online processing requires a user to supply an input.

c) It enables the user to input data and get the results of the processing of that data immediately.

13. Cloud Computing (SM, PM) 14. Input Controls

a) It is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility over a network (typically the Internet).

b) Clouds can be classified as public, private or hybrid

c) The common cloud computing service models are software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a service (IaaS).

a) These are responsible for ensuring the accuracy and completeness of data and instruction input into an application system.

b) These are important since substantial time is spent on inputting data which involves human intervention and are therefore prone to errors and fraud

15. ERP Software 16. Access Controls (MTP-SEPT 14)

a) It is business management software that allows an organization to use a system of integrated applications to manage the business.

b) used by entities to manage resources optimally and to maximize the three Es i.e. Economy, Efficiency and Effectiveness

a) Access controls are implemented with an access control mechanism and links the authentic users to the authorized resources they are permitted to access.

b) Cryptography, Passwords, Personal Identification Numbers (PIN) and Identification Cards are some of the examples of access controls.

IPCC |35e |Fast Track Material in Information Technology 48

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

17. Output Controls 18. Batch Processing

a) These ensure that the data delivered to users will be presented, formatted and delivered in a consistent and secured manner.

b) Whatever the type of output, it should be ensured that the confidentiality and integrity of the output is maintained and that the output is consistent.

a) It is defined as a processing of large set of data in a specific way, automatically, without needing any user intervention.

b) The data is first collected, and then batch-processed, so all the collected data is processed in one step.

c) Batched jobs can take a long time to process.

19. Middleware 20. Database Controls

Middleware that allow computers that are connected on networks to communicate with each other.

Protecting the integrity of a database when application software acts as an interface to interact between the user and the database are called the update controls.

21. Software as a Service (SM, PM) 22. Virtualization (SM)

a) A software delivery method that provides access to software and its functions remotely as a Web-based service.

b) SaaS is a model of software deployment where an application is hosted as a service provided to customers across the Internet.

c) By removing the need to install and run an application on a user's own computer

a) It is the process of creating logical computing resources from available physical resources.

b) This is accomplished using virtualization software to create a layer of abstraction between workloads and the underlying physical hardware.

‘B’ Category

23. Hardware virtualization (SM) 24. Downsizing (SM) Hardware Virtualization or Platform Virtualization refers to the creation of a virtual machine that acts like a real computer with an operating system. The basic idea of Hardware virtualization is to consolidate many small physical servers into one large physical server so that the processor can be used more effectively.

Moving to smaller computing platforms, such as from mainframe systems to networks of personal computers and servers.

25. Enterprise Software 26. Data Processing Controls: (MTP-MAR 15)

Addresses an enterprise’s needs and data flow in a huge distributed environment. E.g. ERP Applications like SAP.

a) Data processing controls perform validation checks to identify errors during processing of data.

b) They are required to ensure both the completeness and accuracy of the data being processed. Run-to-Run Totals, Reasonableness Verification, Edit Checks, Field Initialization, Exception Reports and Existence/Recovery Controls are some of the examples of Data Processing Controls.

27. Business Application: (MTP-FEB 15) 28. Error Handling in CBIS: (RTP- MAY 16) a) Business Application is defined as a computer

program used to fulfill a person’s need for regular occupation or commercial activities like keeping track of inventory levels, checking for bank account balances, and all other business activities. Business.

b) Applications may be classified on the basis of – Nature of processing, Source of application, Nature of business and Functions covered /nature of application.

This ensures that errors detected at any stage of processing receive prompt corrective action and are reported to the appropriate level of management.

IPCC |35e |Fast Track Material in Information Technology 49

No.1 for CA/CMA & MEC/CEC MASTER MINDS

29. Digital Signatures (RTP- MAY 16) 30. Primary responsibilities of a Certificate Authority (MTP-MAY16)

Digital Signatures establish the authenticity of persons and prevent the denial of messages or contracts when data is exchanged electronically.

a) Positively identifying entities requesting certificates;

b) Issuing, removing, and archiving certificates; c) Protecting the Certificate Authority server; d) Maintaining a namespace of unique names for

certificate owners; e) Serving signed certificates to those needing to

authenticate entities; and f) Logging Activity

31. Business Intelligence (RTP-MAY 15, MTP- MAY 16)

32. Storage Virtualization: (MAY16-2M)

a) BI is a set of theories, methodologies, architectures, and technologies that transform raw data into meaningful and useful information for business purposes.

b) BI, in simple words, makes interpreting voluminous data friendly.

c) Making use of new opportunities and implementing an effective strategy can provide a competitive market advantage and long-term stability.

a) Storage virtualization is the apparent pooling of data from multiple storage devices, even different types of storage devices, into what appears to be a single device that is managed from a central console.

b) Storage virtualization helps the storage administrator perform the tasks of backup, archiving, and recovery more easily -- and in less time -- by disguising the actual complexity of a Storage Area Network

33. Network Virtualization: (SM, PM)

a) Network virtualization is a method of combining the available resources in a network by splitting up the available bandwidth into channels, each of which is independent from the others, and each of which can be assigned (or reassigned) to a particular server or device in real time.

b) This allows a large physical network to be provisioned into multiple smaller logical networks and conversely allows multiple physical LANs to be combined into a larger logical network.

‘C’ Category

34. Application Software Package (SM) 34. Virtual Organization (SM)

A set of prewritten, pre-coded application software programs that are commercially available for sale or lease.

Organization using networks to link people, assets and ideas to create and distribute products and services without being limited to traditional organizational boundaries or physical location.

35. Customization (SM)

Modification of a software package to meet an organization's unique requirements without destroying the package software's integrity.

IPCC |35e |Fast Track Material in Information Technology 50

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

5. BUSINESS PROCESS MANAGEMENT & IT

‘A’ Category

1. Process (RTP-NOV 14) 2. Process

(From Business perspective) Process is a coordinated and standardized flow of activities performed by people or machines, which can traverse functional boundaries to achieve a business objective and creates value for internal or external customers.

(From General perspective) Process is defined as a sequence of events that uses inputs to produce outputs.

3. Process management 4. Business Process

a) It is a system of interlinked processes which involves intensive efforts to map, improve and adhere to organizational processes.

b) It also performs the activities of planning and monitoring the performance of a process.

a) It consists of a set of activities that are performed in co-ordination in an organizational and technical environment.

b) These activities jointly realize a business goal.

5. Radical Redesign (SM) 6. Total Quality Management

(MTP-SEP 14, MTP-MAR 15, RTP-MAY 15)

a) This means getting down to the fundamental – where necessary throwing away the old, out of date rules – and recognizing that quality and innovation are more important to profit than cost.

b) In a nutshell, a “clean slate approach” of BPR says that “Whatever you were doing in the past is all wrong”, do not get biased by it or reassemble, the new system is to be redesigned afresh.

a) It is the organization-wide effort to install and make permanent a climate in which it continuously improves its ability to deliver high-quality products and services to customer.

b) TQM is a comprehensive and structured approach to organizational management that seeks to improve the quality of products and services through ongoing refinements in response to continuous feedback.

7. System flowchart (SM) 8. Accounting Information System

(MTP-MAR 15)

a) A tool for documenting a physical system in which each component is represented by a symbol that visually suggests its function.

b) System flowcharts, showing controls at a physical or resource level

a) An Accounting Information System (AIS) is defined as a system of collection, storage and processing of financial and accounting data that is used by decision makers.

b) An accounting information system is generally a computer-based method for tracking accounting activity in conjunction with information technology resources.

9. Business Process Reengineering (SM) 10. Entity-Relationship Diagrams

(RTP-NOV 15)

a) BPR is the fundamental rethinking and radical redesign of processes to achieve dramatic improvement, in critical, contemporary measures of performance such as cost, quality, service and speed.

b) Business Process Re-engineering is also known as Business Process Redesign, Business Transformation, or Business Process Change Management.

a) It is a data modeling technique that creates a graphical representation of the entities, and the relationships between entities, within an information system.

b) Entity is defined as a distinguishable object that exists in isolation and is described by a set of attributes.

c) Relationship is the association among several entities

IPCC |35e |Fast Track Material in Information Technology 51

No.1 for CA/CMA & MEC/CEC MASTER MINDS

11. Data Flow Diagrams (RTP-MAY 15, MAY 16)

12. Flowchart (RTP-MAY 15)

a) A graphical representation of the flow of data through an information system. DFDs may be partitioned into levels that represent increasing information flow and functional detail.

b) Major components: Process, Entity, Dataflow and Data store.

a) It is diagram prepared by the programmer of the sequence of steps involved in solving a problem.

b) It defines the strategy and thread of logic followed in the program.

c) It is like a blueprint, in that it shows the general plan, architecture, and essential details of the proposed structure.

13. Decision Trees (MTP-OCT 14, MAY 16)

14. Decision Table (RTP-NOV 14,MTP-FEB 15)

a) It is a collection of a basis (condition) and a conclusion (action).

b) It is a decision support tool that uses a tree-like model of decisions and their possible consequences, including chance event outcomes, resource costs, and utility

c) It is a one way to display an algorithm.

a) It is table which may accompany a flowchart defining the possible contingencies that may be considered within the program and the appropriate course of action for each contingency

b) It is a tabular representation of program logic. c) Displays all conditions and the appropriate

actions to be taken for set of conditions.

15. Six Sigma (MTP-OCT 14, MAY 16, RTP-NOV 14,

MAY 16-2M) 16. Business Process Management (SM)

a) Six Sigma is a set of strategies, techniques, and tools for process improvement. It seeks to improve the quality of process outputs and minimizing inconsistency in manufacturing and business processes.

b) Objectives: reduce process cycle time, reduce pollution, reduce costs, increase customer satisfaction, and increase profits.

a) BPM is the methodology used by enterprises to improve end-to-end business processes in five stages namely: design, modeling, execution, monitoring and optimization.

b) BPM is defined as: “The achievement of an organization’s objectives through the improvement, management and control of essential business processes”

‘B’ Category

17. Re-engineering (SM) 18. Value chain (MTP-FEB 15)

a) It is the fundamental rethinking and radical redesign of business processes to achieve dramatic improvements in critical, contemporary measures of performance, such as cost, quality, service and speed.

b) Re-engineering emphasized a holistic focus on business objectives and how processes related to them, encouraging full-scale recreation of processes rather than iterative optimization of sub-processes

a) Value chain is defined as a chain of activities that a firm operating in a specific industry performs in order to deliver a valuable product or service for the market.

b) The idea of the Value Chain is based on the process view of organizations.

19. Accounting (Or) Book keeping life cycle 20. Order to cash process flow (O2C)

a) It covers the business processes involved in recording and processing accounting events of a company.

b) It begins when a transaction or financial event occurs and ends with its inclusion in the financial statements.

a) It covers all the business processes relating to fulfilling customer requests for goods or services.

b) It involves transactional flow of data from the initial point of documenting a customer order to the final point of collecting the cash.

IPCC |35e |Fast Track Material in Information Technology 52

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

21. Procure to pay (purchase to pay or P2P) life cycle 22. Entity in DFD: (MTP-SEP 14,MAY 16 )

a) It covers all the business processes relating to obtaining raw materials required for production of a product or for providing a service.

b) It involves the transactional flow of data from the point of placing an order with a vendor to the point of payment to the vendor.

a) An entity represents the source or destination of data and is often represented as rectangles (a diagonal line across the right-hand corner in DFD.

b) Entities either provide data to the system (Source) or receive data from it (Sink).

c) Entities are also referred to as agents, terminators, or source/sink.

23. BPM lifecycle (SM) 24. Business Strategy: a) It is a generic process optimization

methodology defined explicitly for business processes.

b) It provides a high-level approach from a phased perspective without prescribing specific techniques such as those found in Six Sigma or Lean.

At the highest level, the strategy of the company is specified, which describes its long term concepts to develop a sustainable competitive advantage in the market.

THE END

Copyrights Reserved

To MASTER MINDS, Guntur

Cell: 98851 25025 / 26

Visit us @ www.mastermindsindia.com Mail: [email protected]

Facebook Page: Masterminds For CA Youtube Channel: Masterminds For CA

CA - IPCC

COURSE MATERIAL

Quality Education

beyond your imagination...

PART C – DIFFERENCES

Page 53

IPCC |35e |Fast Track Material in Information Technology 54

No.1 for CA/CMA & MEC/CEC MASTER MINDS

1. TELECOMMUNICATIONS AND NETWORKS

1. Guided Vs. Unguided Media. (PM)

No Guided Media Unguided Media

1. Media that provide a conduit (channel) from one device to another.

Consists of a means for the data signals to travel but nothing to guide them along a specific path.

2. It uses a "cabling" system that guides the data signals along a specific path.

It passes through a vacuum; it is independent of a physical pathway.

3. Example – Coaxial Cable, Twisted Pair, Fiber Optic Cable.

Example – Infrared Waves, Micro Waves, Radio Waves etc.

2. Serial Transmission Vs. Parallel Transmission. (SM, PM, MTP-SEP 14, MTP- APR 14, RTP MAY-15)

No. Serial Transmission Parallel Transmission

1. The data bits are transmitted serially one after another.

The data bits are transmitted simultaneously.

2. Data is transmitted over a single wire and is thus relatively slower.

Data is transmitted over eight different wires and is thus relatively faster.

3. It is a cheaper mode of transferring data. It is relatively expensive mode of transferring data.

4.

5. It is useful for long distance communications. Not suited for long distance communications.

3. Synchronous Transmission Vs. Asynchronous Transmission. (SM, PM, MTP-OCT 14, RTP- NOV 14)

No. Synchronous Transmission Asynchronous Transmission 1. Allows characters to be sent down the

line without Start-Stop bits (control characters).

Each data word is accompanied with start and stop bits.

2. The synchronous device is more expensive.

It is relatively cheaper.

3. Chances of data loss are relatively higher. More reliable as the start and stop bits ensure that the sender and the receiver remain in step with one another.

4. It is more efficient. It is relatively less efficient.

4. Differentiate Host Based & Network Intrusion Detection System. (PM)

Host Based Intrusion Detection System Network Based Intrusion Detection System

Deterrence Strong deterrence for insiders Strong deterrence for Outsiders Detection Strong insider detection, weak outsider

detection Strong outsider detection, weak insider detection

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

IPCC |35e |Fast Track Material in Information Technology 55

Attack Anticipation

Good at trending and detecting suspicious behavior patterns

None

Damage Assessment

Excellent for determining extent of compromise

Very weak damage Assessment capabilities

Response Weak real-time response, good for long term attacks

Strong response against outsider attacks

Scope Narrow in scope, monitors specific activities Broad in scope Dependency Host dependent Host independent.

5. Client-Server architecture Vs Peer to Peer Architecture. (PM, RTP-NOV 14)

No Client / Server Peer- to- Peer

1. A client computer typically communicates with servers, not with other clients.

Every computer is equal and can communicate with any other computer on the network to which it has been granted access rights.

2. A central server handles all security and file transactions.

Each machine shares its own resources and handles its own security.

3. It is more expensive as it requires a central file server, server software and client licenses.

It is relatively less expensive as it does not require a dedicated machine, server software or special client licenses.

4. Backup is centralized on the server; managed by network administrator. Backup devices and media required at server only.

Backup is decentralized; managed by users. Backup devices and media are required at each workstation.

5. The performance is relatively high as the server is dedicated and does not handle other tasks.

The performance is relatively low.

6. In case of failure of server, the whole network fails.

No single point failure affects the network.

7. C/S model relies on the power and stability of a single computer i.e., Server.

P2P gives each workstation equivalent capabilities and relies heavily on the power and bandwidth of each individual computer.

8. Example – Email, network printing, and the World Wide Web.

Example – Napster, Gnutella, Freenet, Bit Torrent and Skype.

6. Star Network Vs. Ring Network. (RTP-NOV 14)

No. Star Network Ring Network 1. Here all nodes are connected to a central

computer/hub through dedicated cables. Here all nodes are connected in the form of a circular chain.

2. Communication takes place between the nodes through the hub/computer only.

Communication takes place by each node to receive and check for the message.

3. A broken connection between hub/central computer and node does not affect the rest of the network.

A broken connection between nodes leads to failure of entire network.

4. Failure in the hub/central computer affects all nodes connected to that hub.

Failure in one node does not affect the entire system.

5. The signal becomes weak when it has to travel long distances. To avoid it, repeaters are required to be used.

Repeaters are not needed. Every computer acts as a repeater.

6. It is very easy to add/remove a node from the network.

It is difficult to add/remove a node from the system.

IPCC |35e |Fast Track Material in Information Technology 56

No.1 for CA/CMA & MEC/CEC MASTER MINDS

7. Transport Layer Vs. Network Layer of OSI Model. (MTP FEB-15, MTP MAR-15)

Transport Layer:

• Transport Layer or Layer 4 ensures reliable and transparent transfer of data between user processes, assembles and disassembles message packets and provides error recovery and flow control.

• Multiplexing and encryption are undertaken at this layer level. This means that the Layer can keep track of the segments and retransmit those that fail.

Network Layer:

• The Network Layer or Layer 3 provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks, while maintaining the quality of service requested by the Transport Layer.

• This Layer makes a choice of the physical route of transmission; creates a virtual circuit for upper layers to make them independent of data transmission and switching; establishes, maintains, terminates connections between the nodes and ensure proper routing of data.

8. Half Duplex Mode Vs. Full Duplex Mode. (RTP-NOV 15)

Half-Duplex Mode:

• In Half-Duplex mode, (sometimes called an alternating connection or semi-duplex) the data flows in one direction or the other, but not both at the same time.

• This type of connection makes it possible to have bidirectional communications using the full capacity of the line.

• For example: Walkie Talkie.

• In this, the entire capacity of a channel is taken over by whichever of the two devices is transmitting at the time.

Full-Duplex Mode:

• In Full-Duplex mode, the data flow in both directions simultaneously.

• Each end of the line can thus transmit and receive at the same time, which means that the bandwidth is divided in two for each direction of data transmission if the same transmission medium is used for both directions of transmission.

• For example: Mobile Phones.

• In this, signals going in either direction share the capacity of the link wither by containing two separate physical links (one for sending and the other for receiving) or by dividing the capacity of the channel between signals travelling in opposite direction.

9. Circuit Switching Vs. Packet Switching. (RTP-NOV 15)

Circuit Switching:

• A Circuit Switching network is one that establishes a fixed bandwidth circuit (or channel) between nodes and terminals before the users may communicate, as if the nodes were physically connected with an electrical circuit.

• The route is dedicated and exclusive, and released only when the communication session terminates. Circuit switching is what most of us encounter on our home phones. A single circuit is used for the entire duration of the call.

• Applications which use circuit switching go through three phases: Establish a Circuit, Transfer of data and Disconnect the Circuit.

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

IPCC |35e |Fast Track Material in Information Technology 57

Packet Switching:

• It is a sophisticated means of maximizing transmission capacity of networks. Packet switching refers to protocols in which messages are broken up into small transmission units called packets, before they are sent.

• Each packet is transmitted individually across the net. The packets may even follow different routes to the destination.

• Since there is no fixed path, different packets can follow different path and thus they may reach to destination out of order.

10. Presentation Layer Vs. Session Layer of OSI Model. (RTP-NOV 15)

Presentation Layer:

• This layer at times referred as Syntax Layer also, is usually a part of an operating system, that converts incoming and outgoing data from one presentation format to another (for example, from a text stream into a popup window with the newly arrived text).

• The presentation service data units are then encapsulated into Session Protocol Data Units, and moved down the stack. It further controls on screen display of data, transforms data to a standard application interface.

• Encryption, data compression can also be undertaken at this layer level.

Session Layer:

• This layer sets up, coordinates, and terminates conversations, exchanges, and dialogs between the applications at each end.

• It deals with session and connection coordination. It provides for full-duplex, half-duplex, or simplex operation, and establishes check pointing, adjournment, termination, and restart procedures.

• The OSI model made this layer responsible for "graceful close" of sessions also.

11. Hardware Encryption Vs. Software Encryption (RTP-NOV 14)

Hardware Encryption:

• Hardware Encryption devices are available at a reasonable cost, and can support high speed traffic.

• If the Internet is being used to exchange information among branch offices or development collaborators, for instance, use of such devices can ensure that all traffic between these offices is secure.

Software Encryption:

• Software Encryption is typically employed in conjunction with specific applications.

• Certain electronic mail packages, for example, provide encryption and decryption for message security.

12. Difference between Public Data Network and Private Data Network (RTP-MAY 15)

Public Data Network:

1. A Public Data Network is defined as a network shared and accessed by users not belonging to a single organization.

2. It is a network established and operated by a telecommunications administration, or a recognized private operating agency, for the specific purpose of providing data transmission services for the public.

3. The Internet is an example of a Public Data Network.

IPCC |35e |Fast Track Material in Information Technology 58

No.1 for CA/CMA & MEC/CEC MASTER MINDS

Private Data Network:

1. Private Data Network provides businesses, government agencies and organizations of all sizes as a dedicated network to continuously receive and transmit data critical to both the daily operations and mission critical needs of an organization.

2. This is a network that is not available to the outside world.

3. The Intranet is an example of a Private Data Network.

13. Difference between Thick client and Thin Client (RTP - MAY 15)

Thick Client:

• A Thick client is a client that performs the bulk of any data processing operations itself, and does not necessarily rely on the server.

• Unlike thin clients, thick clients do not rely on a central processing server because the processing is done locally on the user system, and the server is accessed primarily for storage purposes.

• For that reason, thick clients often are not well-suited for public environments. To maintain a thick client, IT needs to maintain all systems for software deployment and upgrades, rather than just maintaining the applications on the server.

• For example – Personal Computer.

Thin Client:

• A Thin client uses the resources of the host computer.

• A thin client generally only presents processed data provided by an application server, which performs the bulk of any required data processing.

• A thin client machine is going to communicate with a central processing server, meaning there is little hardware and software installed on the user's machine.

• A device using web application (such as Office Web Apps) is a thin client.

14. Difference between Broadcast Networks and Switched Networks. (RTP - MAY 15)

Broadcast Networks:

• In Broadcast networks, data transmitted by one node is received by many, sometimes all, of the other nodes.

• This refers to a method of transferring a message to all recipients simultaneously.

• For example – a corporation or other voluntary association, that provides live television or recorded content such as movies, newscasts, sports, public affairs programming, and other television programs for broadcast over a group of radio stations or television stations.

Switched Networks

• In switched-communication networks, the data transferred from source to destination is routed through the switch nodes.

• The way in which the nodes switch data from one link to another, as it is transmitted from source to destination node, is referred to as a switching technique.

• Three common switching techniques are Circuit Switching, Packet Switching, and Message Switching.

15. Difference between C2B and C2C e-Commerce (RTP - MAY 15)

Consumer-to-Business e-Commerce:

• In C2B e-Commerce model, consumers directly contact with business vendors by posting their project work online so that the needy companies review it and contact the consumer directly with bid.

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

IPCC |35e |Fast Track Material in Information Technology 59

• The consumer reviews all the bids and selects the company for further processing. Some examples are guru.com, rentacoder.com, getacoder.com, freelancer.com.

Consumer-to-Consumer e-Commerce:

• C2C e-Commerce is an Internet - facilitated form of commerce that has existed for the span of history in the form of barter, flea markets, swap meets, yard sales and the like.

• C2C e-Commerce sites provide a virtual environment in which consumers can sell to one another through a third-party intermediary.

16. Ring Network Vs Mesh Network.

No. Mesh Network Ring Network

1. In this structure, there is a random connection of nodes using communication links.

In this topology, the network cable passes form one node to another until all nodes are connected in the form of loop or ring.

2. A mesh network may be fully connected or connected with only partial links

There is direct point to point link between 2 neighboring nodes and these links are unidirectional.

3. The reliability is very high as there are always alternate paths available if direct link between two nodes is down.

Ring network can span longer distances than other types of network

4. Network problems are easier to diagnose

Adding or removing computers can disrupt the network.

5. Cost of installation and maintenance is high.

They offer high performance for a small number of workstation or for larger networks where each workstation has similar work load.

17. Internet Vs. Intranet.

No. Internet Intranet

1. It is a global network of computer networks that are formed by various educational, commercial, Government, non-profit and military organizations.

It is a type of information system that facilitates communication within the organization.

2. This is not being developed and controlled by a single person or organization.

It is developed and controlled by private individuals and organizations.

3. It is a public network. So, anybody can log into the network and perform any action at his choice.

It is a private network and access to private individuals is restricted by passwords.

4. Thousands of databases exist which can be accessed and used by private individuals.

Only authorized persons are allowed to access the data available in organization’s databases.

5. An internet can be defined as a network of networks.

An intranet can be a LAN or WAN that belongs exclusively to a corporation.

6. Any node can transmit a message to any other node, along with communication channels, via the intermediate nodes. Internet uses provides Communication, Data Retrieval, Data publishing, etc.

Several applications of Intranet include: a. Supplier management b. Inventory management c. Distribution management d. Channel management

7. Acts as an information service to retrieve the information worldwide.

Acts as an information service within the organization.

IPCC |35e |Fast Track Material in Information Technology 60

No.1 for CA/CMA & MEC/CEC MASTER MINDS

2. INFORMATION SYSTEMS AND ITS FUNDAMENTALS

1. RAM Vs. ROM. (PM, RTP - NOV 15)

No. RAM ROM 1. RAM is a volatile memory and when the

computer is turned off, RAM loses its data. When the computer is turned on again, operating system and other files are once again loaded into RAM usually from the hard disk.

Unlike RAM, ROM is non-volatile. The contents of ROM remain even after the computer is switched off.

2. This is Read/Write memory wherein information can be read as well as modified.

ROM used to be read-only; however, the new versions of ROM allow limited rewriting making it possible to upgrade firmware such as the BIOS.

2. Hierarchical Database Model Vs. Network Database Model. (PM, MTP - FEB 15)

No. Hierarchical Database Model Network Database Model 1. The hierarchical model permits a record to

be a member of only one set at one time. Unlike the hierarchical mode, the network model permits a record to be a member of more than one set at one time.

2. The hierarchical data structure implements one-to-one and one-to-many relationships.

The network model allows us to represent one-to-one, one-to-many and many-to-many relationships.

3. Each parent record may have one or more child records, but no child record may have more than one parent record.

Each parent record may have one or more child records, and even a child record may have more than one parent record.

4. The hierarchical model does not represent redundancy in data efficiently.

The network model is able to represent redundancy in data more efficiently than in the hierarchical model.

5. The hierarchical data structures require specific entrance points to find records in a hierarchy.

The network data structures can be entered and traversed more flexibly.

3. CISC Vs. RISC. (PM,RTP - NOV 14) Complex Instruction Set Computer (CISC):

a) If the control unit contains a number of micro-electronic circuitry to generate a set of control signals and each micro- circuitry is activated by a micro-code, this design approach is called CISC design.

b) Examples of CISC processors are: Intel 386, 486, Pentium, Pentium Pro, Pentium II, Pentium III processors etc.

c) CISC chips have a large, variable length and complex instructions and generally make use of complex addressing modes.

d) But at the same time, they are complex as well as expensive to produce.

e) Now-a-days, most of the personal computers use CISC processors. Reduced Instruction Set Computer (RISC):

a) To execute each instruction, if there is separate electronic circuitry in the control unit, which produces all the necessary signals, this approach of the design of the control section of the processor is called RISC design. It is also called hard-wired approach.

b) Examples of RISC processors: IBM RS6000, MC88100 processors etc. RISC processors use a small and limited number of instructions and mostly use hardwired control unit.

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

IPCC |35e |Fast Track Material in Information Technology 61

c) These consume less power and have high performance.

d) However, RISC processors are faster, less complex and less expensive than CISC processors because of their simpler design.

e) Now-a-days, most of the workstation computers use RISC processors.

4. Primary Storage Vs. Secondary Storage.

No. Primary Storage Secondary storage

1. Added to the system as a part and parcel of the circuitry.

Added to the system as a supplementary to primary storage.

2. It is electronic in nature and is usually supplied in the form of chips.

Magnetic or optical in nature and supplied in the form of tapes and disks.

3. Provides Random access to data. Provides Sequential / direct access to data.

4. Volatile i.e. its contents are lost when power is lost.

Non-volatile i.e. it does not lose its contents even when the power is lost.

5. Low capacity. High capacity.

6. Fast access to data. Slow access to data.

7. High cost. Low cost.

8. Generally a computer consists of few MB’s of memory.

Generally a computer consists of few GB’s to TB’s of memory.

5. Difference between Hardware Resources and Software Resources (RTP - MAY 15)

Hardware Resources:

• These refer to Machines - computers, video monitors, magnetic disk drives, printers, optical scanners and Media - floppy disks, magnetic tape, optical disks, plastic cards, paper forms.

Software Resources:

• These refer to Programs - operating system programs, spreadsheet programs, word processing programs, payroll programs and Procedures - data entry procedures, error correction procedures, paycheck distribution procedures.

6. Connection Oriented Network Vs. Connection less Network. (RTP - MAY 16)

Connection Oriented Networks:

In connection oriented service, a connection is first established and then data is exchanged like it happens in case of telephone networks.

When connection is established we send the message or the information and then we release the connection.

Connectionless Networks:

In connectionless networks, the data is transferred in one direction from source to destination without checking that destination is still there or not, or if it is prepared to accept the message.

Data which is being exchanged in fact has a complete contact information of recipient and at each intermediate destination, it is decided how to proceed further like it happens in case of postal networks. Example of Connectionless service is UDP (User Datagram Protocol).

IPCC |35e |Fast Track Material in Information Technology 62

No.1 for CA/CMA & MEC/CEC MASTER MINDS

3. BUSINESS INFORMATION SYSTEMS

1. Data Vs. Information. (PM)

No. Data Information

1. Data is raw and unorganized fact that needs to be processed.

When data is processed, organized, structured or presented in a given context so as to make it useful, it is called Information.

2. Data in itself is meaningless and is the lowest level of knowledge.

Information is the second level of knowledge.

3. Observations and recordings are done to obtain data.

Analysis of data is done to obtain information.

2. Role-based Access Control Vs. Rules-based Access Control. (PM, RTP - MAY 15)

Role-based Access Control (RBAC):

a) RBAC largely eliminates discretion when providing access to objects. Instead, administrators or automated systems place subjects into roles.

b) Subjects receive only the rights and permissions assigned to those roles.

c) RBAC uses a centrally administered set of controls to determine how subjects and objects interact. When an employee changes jobs, all previous access is removed, and the rights and permissions of the new role are assigned.

d) RBAC enforces static constraints based on a user’s role. It is the best system for an organization that has high turnover.

Rules-based Access Control (RAC):

a) RAC takes into account the data affected, the identity attempting to perform a task, and other triggers governed by business rules.

b) RAC uses specific rules that indicate what can and cannot happen between a subject and an object. A manager, for example, has the ability to approve his/her employees’ hours worked.

c) However, when s/he attempts to approve his/her own hours, a rule built into the application compares the employee record and the user, sees they are the same, and temporarily removes approval privilege. It is not necessarily identity based.

3. Explicit knowledge Vs. Tacit knowledge. (PM, MTP-MAR 15, RTP-NOV 14, MAY15 - 4M)

Explicit knowledge:

a) Explicit knowledge is that knowledge which can be formalized easily and as a consequence is easily available across the organization.

b) Explicit knowledge is articulated, and represented as spoken words, written material and compiled data.

c) This type of knowledge is codified, easy to document, transfer and reproduce.

d) For example - Online tutorials, Policy and procedural manuals.

Tacit knowledge:

a) Tacit knowledge, on the other hand, resides in a few often-in just one person and hasn’t been captured by the organization or made available to others.

b) Tacit knowledge is unarticulated and represented as intuition, perspective, beliefs, and values that individuals form based on their experiences.

c) It is personal, experimental and context specific. It is difficult to document and communicate the tacit knowledge.

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

IPCC |35e |Fast Track Material in Information Technology 63

d) For example - hand-on skills, special know-how, and employee’s experiences.

4. Information Vs. Knowledge. (PM, RTP - NOV 14)

No. Information Knowledge

1. Information is piecemeal, fragmented and particular.

Knowledge is structured, coherent, and often universal.

2. Information is timely, transitory, and may even be short-lived.

Knowledge is of enduring significance.

3. Information is a flow of messages. Knowledge is a stock, largely resulting from the flow, in the sense that the “input” of information may affect the stock of knowledge by adding to it, restructuring it, or changing it in any way.

4. Information is acquired by being told.

Knowledge can be acquired by thinking. Thus, new knowledge can be acquired without new information being received.

5. Difference between Strategic-Level Systems and Operational-Level Systems (RTP - MAY 15)

Strategic-Level Systems:

• These systems are strategic managers to track and deal with strategic issues that assist in long-range planning.

• A principle area is tracking changes in the external conditions (market sector, employment levels, share prices, etc.) and matching these with the internal conditions of the organization.

Operational-Level Systems:

• Support operational managers tracking elementary activities. These can include tracking customer orders, invoice tracking, etc.

• Operational-level systems ensure that business procedures are followed.

4. BUSINESS PROCESS AUTOMATION THROUGH APPLICATION SOFTWARE

Cloud Computing:

a) Suited for any size of data storage

b) Suited for both standard or day to day and computational intensive tasks.

c) Very high uptime availability

d) Provide sharing of infrastructure and thus help to reduce cost.

Grid Computing:

a) Suited for big size of data storage

b) Suited for computational intensive tasks only.

c) Very high uptime availability

d) Provide sharing of infrastructure and thus help to reduce cost.

1. Cloud Computing Vs. Grid Computing. (SM, PM)

Copyrights Reserved

To MASTER MINDS, Guntur

IPCC |35e |Fast Track Material in Information Technology 64

No.1 for CA/CMA & MEC/CEC MASTER MINDS

2. Manual Information Processing Cycle Vs. Computerized Information Processing Cycle. (PM, MTP-OCT 14, MAY 16, RTP-NOV 14)

No. Manual Information Processing Cycle

Computerized Information Processing Cycle

1.

Systems where the level of manual intervention is very high. For example- Evaluation of exam papers, teaching and operations in operation theatres.

Systems where computers are used at every stage of transaction processing and human intervention is minimal.

2.

Include following components: a) Input: Put details in register. b) Process: Summarize the information; and c) Output: Present information to

management in the form reports.

Include following components: a) Input: Entering data into the computer; b) Process: Performing operations on the

data; c) Storage: Saving data, programs, or output

for future use; and d) Output: Presenting the results.

3.

3. Infrastructure as a Service Vs Software as a Service (RTP-NOV 14, RTP-NOV 15)

Infrastructure as a Service (IaaS):

• IaaS delivers computer infrastructure on an outsourced basis to support enterprise operations.

• Typically, IaaS provides hardware, storage, servers and data centre space or network components; it may also include software.

Software as a Service (SaaS):

• SaaS features a complete application offered as a service on-demand.

• A service provider hosts the application at its data centre over the Internet and customer accesses it via a standard Web browser.

• For example - Google Apps.

4. Differentiate Online Processing and Real Time Processing. (MTP-MAR 15)

Online Processing:

• Data is processed immediately while it is entered, the user usually only has to wait a short time for a response. (Example: games, word processing, booking systems).

• Interactive or online processing requires a user to supply an input.

• Interactive or online processing enables the user to input data and get the results of the processing of that data immediately.

Real-time Processing:

• Real time processing is a subset of interactive or online processing.

• Input is continuously, automatically acquired from sensors, for example, which is processed immediately in order to respond to the input in as little time as possible.

• After the system is finished responding, it reads the next set of input data immediately to process that.

• Whenever there is a rapid reaction required due to some sort of change, real time processing can take action without the need of a user.

• Real time processing is used in warning systems on aircraft, alarm systems in hazardous zones, burglar alarms etc.

Input Process Output

98851 25025 / 26 www.mastermindsindia.com MASTER MINDS

IPCC |35e |Fast Track Material in Information Technology 65

5. Concurrent Audit Vs. General Audit. (RTP-NOV 15)

Concurrent Audit:

• In this, Auditors are members of the system development team.

• They assist the team in improving the quality of systems development for the specific system they are building and implementing.

General Audit:

• In this, Auditors evaluate systems development controls overall.

• They seek to determine whether they can reduce the extent of substantive testing needed to form an audit opinion about management’s assertions relating to the financial statements in systems effectiveness and efficiency.

6. Quality Assurance Management Vs. Security Management Controls. (RTP-NOV 15)

Quality Assurance Management Controls:

• Organizations are increasingly producing safety-critical systems and users are becoming more demanding in terms of the quality of the software they employ to undertake their work.

• Organizations are undertaking more ambitious information systems projects that require more stringent quality requirements and are becoming more concerned about their liabilities if they produce and sell defective software.

Security Management Controls:

• Information security administrators are responsible for ensuring that information systems assets are secure.

• Assets are secure when the expected losses that will occur over some time are at an acceptable level.

7. Software as a Service (SaaS) Vs. Platform as a Service (PaaS) (RTP-MAY 15)

Software as a Service (SaaS):

• Software as a Service (SaaS) features a complete application offered as a service on-demand.

• A service provider hosts the application at its data centre over the Internet and customer accesses it via a standard Web browser.

• For example - Google Apps.

Platform as a Service (PaaS):

• Platform as a Service (PaaS) delivery model allows a customer to rent virtualized servers and associated services used to run existing applications, or to design, develop, test, deploy and host applications.

• The consumer may create software using tools and/or libraries from the provider. The consumer may also control software deployment and configuration settings.

• The provider provides the networks, servers, storage, and other services.

• For example, AppScale allows a user to deploy some applications written for Google App Engine to their own servers.

8. Private Cloud Vs. Hybrid Cloud in Cloud Computing (RTP-MAY 15)

Private Cloud:

• This cloud computing environment resides within the boundaries of an organization and is used exclusively for the organization’s benefits.

• These are also called internal clouds.

IPCC |35e |Fast Track Material in Information Technology 66

No.1 for CA/CMA & MEC/CEC MASTER MINDS

• They are built primarily by IT departments within enterprises who seek to optimize utilization of infrastructure resources within the enterprise by provisioning the infrastructure with applications using the concepts of grid and virtualization.

• The benefit of a Private Cloud is that it enables an enterprise to manage the infrastructure and have more control.

Hybrid Cloud:

• It is maintained by both internal and external providers.

• It is a composition of two or more clouds (Private, Community or Public). They have to maintain their unique identity, but are bound together by standardized data and application portability.

• With a hybrid cloud, organizations might run non-core applications in a public cloud, while maintaining core applications and sensitive data in-house in a private cloud.

5. BUSINESS PROCESS MANAGEMENT & IT

1. Functional Organization Vs. Process Organization. (SM)

Functional Organization Process Organization Work Unit Department Team Key Figure Functional Executive Process Owner

Benefits

a) Focus on functional excellence. b) Easier to implement. c) Clear management direction

a) Responsive to market requirements. b) Improved communication and

collaboration c) Performance measurements associated

with process goals.

Weaknesses

a) Barrier to communication between different functions.

b) Poor hand over between functions that affect customer service.

c) Lack of end-to-end focus to optimize organizational performance.

a) Duplication of functional expertise. b) Inconsistency of functional performance

between processes. c) Increased operational complexity.

Strategic Value

Supports cost leadership strategy. Supports differentiation strategy.

2. Flowchart Vs. Data Flow Diagram. (SM,PM, NOV 14 - 2M)

Flow chart Data Flow Diagram

Presents steps to complete a process. Presents the flow of data.

Do not have any input from or output to an external source.

It describes the path of data from an external source to internal source or vice versa.

The timing and sequence of the process is aptly shown by a flow chart.

Whether processing of data is taking place in a particular order or several processes are taking place simultaneously is described by a DFD.

shows how to make a system function. Defines the functionality of a system.

Used in designing a process. Used to describe the path of data that will complete that process.

Types of Flow charts - System, Data, Document and Program.

Types of DFD–physical data flow and logical dataflow.

THE END