mb0047

Upload: imraan-khan

Post on 02-Mar-2016

61 views

Category:

Documents


0 download

DESCRIPTION

go

TRANSCRIPT

ANS 2 Listing any 5 measures to prevent cyber crimeNearly two thirds of web users across the world have been the victim of cybercrime. If you are a Wi-Fi user, chances are you would have fallen or will fall prey to cybercrime at some point. Although viruses can be easily eliminated with the help of an IT Support company, it is far more important that you learn how to adopt security measures that will prevent you from becoming victims of cybercrime.Wi-Fi in a Nutshell Wi-Fi wireless technology is one of the greatest technological advancements since the Internet. It provides mobility to computers and it is used in the office, at home and in public places. A Wi-Fi enabled device such as a computer or smart phone can connect to the Internet when it is within range of a wireless network that is connected to the Internet. It also allows communications directly from one computer to another with the involvement of an access point. Unfortunately, several problems can arise when computers transmit unsecured information to one another.

What is Cybercrime? Cybercrime refers to illegal activities that take place online. These include fraud, spam, drug trafficking, identity theft, sexual predators, computer viruses, cyber stalking, spyware and phishing schemes. Although most people fall prey to these crimes at any one point, you can avoid them by securing your computer.Preventing Cybercrime 1. Wireless Equivalent Privacy (WEP) Install WEP because it authenticates anyone who wants to access the wireless network and encrypts all traffic. There are two versions of WEP, the stronger 128-bit and the older and weaker 40-bit. The 128-bit version may be stronger but not all wireless devices on the network might support it. Although WEP is not perfect and may be defeated with advanced software, it can prevent unauthorised front door entry.2. Choose a Strong WEP Password Simply put, a weak password can easily compromise WEP security. Its easy to choose a strong WEP password. All you have to do it avoid using sequences or repeated characters, personal information such as birthdays and phone numbers as well as dictionary words in any language. Use long passwords with combinations of upper and lower case letters together with numbers and other characters instead.3. Install Firewall Firewall software prevents hackers from getting into your computer system so be sure to always have this switched on. To access your firewall settings, go to Windows Control Panel and click on Firewall.4. Turn On Spam Blocker Internet providers often offer a spam-blocking feature. Spam blockers prevent unwanted messages such as fraudulent and phishing emails from getting into your inbox. Keep the spam blocker on.5. Turn Off Remote Administrator Most wireless local area network routers come with a feature that allows the network administrator to remotely configure the router. Keep this feature switched off unless necessary because leaving it enabled could render the network vulnerable.6. Use Virtual Private Network (VPN) VPNs form a private network that uses a public network to connect remote site users to one another. VPNs offer security as they use authenticated links to ensure that only authorised users can connect to a network. In addition, they use encryption to make sure that others cannot intercept and use the data that travels over the Internet.7. Install Anti-virus Software Make sure you have adequate anti-virus software for your computer. Some of these software include McAfee, Norton and Stopzilla. Installing anti-virus software is only the first step in protecting your computer. It is important to do a once a week scan and regularly update the software.8. Monitor your Childrens Online Activities Children should only have access to a computer located in a central area of your home so that you can keep an eye on their activities. Regularly check all browser and email activity. It would also be a good idea to use parental control software that limits the types of sites that they can gain access to.

ANS 3 (a)Kurt Lewin's Change ModelKurt Lewin developed a change model involving three steps: unfreezing, changing and refreezing. The model represents a very simple and practical model for understanding the change process. For Lewin, the process of change entails creating the perception that a change is needed, then moving toward the new, desired level of behavior and finally, solidifying that new behavior as the norm. The model is still widely used and serves as the basis for many modern change models. UnfreezingBefore you can cook a meal that has been frozen, you need to defrost or thaw it out. The same can be said of change. Before a change can be implemented, it must go through the initial step of unfreezing. Because many people will naturally resist change, the goal during the unfreezing stage is to create an awareness of how the status quo, or current level of acceptability, is hindering the organization in some way. Old behaviors, ways of thinking, processes, people and organizational structures must all be carefully examined to show employees how necessary a change is for the organization to create or maintain a competitive advantage in the marketplace. Communication is especially important during the unfreezing stage so that employees can become informed about the imminent change, the logic behind it and how it will benefit each employee. The idea is that the more we know about a change and the more we feel it is necessary and urgent, the more motivated we are to accept the change. ChangingNow that the people are 'unfrozen' they can begin to move. Lewin recognized that change is a process where the organization must transition or move into this new state of being. This changing step, also referred to as 'transitioning' or 'moving,' is marked by the implementation of the change. This is when the change becomes real. It's also, consequently, the time that most people struggle with the new reality. It is a time marked with uncertainty and fear, making it the hardest step to overcome. During the changing step people begin to learn the new behaviors, processes and ways of thinking. The more prepared they are for this step, the easier it is to complete. For this reason, education, communication, support and time are critical for employees as they become familiar with the change. Again, change is a process that must be carefully planned and executed. Throughout this process, employees should be reminded of the reasons for the change and how it will benefit them once fully implemented. RefreezingLewin called the final stage of his change model freezing, but many refer to it as refreezing to symbolize the act of reinforcing stabilizing and solidifying the new state after the change. The changes made to organizational processes, goals, structure, offerings or people are accepted and refrozen as the new norm or status quo. Lewin found the refreezing step to be especially important to ensure that people do not revert back to their old ways of thinking or doing prior to the implementation of the change. Efforts must be made to guarantee the change is not lost; rather it needs to be cemented into the organization's culture and maintained as the acceptable way of thinking or doing. Positive rewards and acknowledgment of individualized efforts are often used to reinforce the new state because it is believed that positively reinforced behavior will likely be repeated. Some argue that the refreezing step is outdated in contemporary business due to the continuous need for change. They find it unnecessary to spend time freezing a new state when chances are it will need to be reevaluated and possibly changed again in the immediate future. However - as I previously mentioned - without the refreezing step, there is a high chance that people will revert back to the old way of doing things. Taking one step forward and two steps back can be a common theme when organizations overlook the refreezing step in anticipation of future change. Apply Lewin's Three StepsTo better understand Lewin's change model, let's take a look at the following example. Kiddie Chiropractic has decided to switch from using hand-written medical records to electronic ones. All of the staff at Kiddie have always relied on hand-written medical records when performing their jobs and have expressed concerns about switching to the new electronic format. However, Kiddie management believes that making the switch to electronic records will increase efficiency and reduce the amount of time that it takes to record patient information. First, Kiddie management will have to spend time unfreezing the employees' belief that the old way of recording patient records is adequate. The management team will need to communicate the perceived benefits of the new electronic method, making sure to demonstrate how the pros outweigh the cons. The staff will need to understand how much more efficient the new method of electronic recording will be in comparison to the old hand-written process. Next, Kidde management will need to transition into the changing stage by implementing the new electronic recording system. This will mark a time of uncertainly in the Kiddie staff, making it necessary for the management team to offer training and support as the employees become familiar with the new electronic system.

ANS.4A process-data diagram is a digram that describes processes and data that act as output of these processes. On the left side the meta process model can be viewed and on the right side the meta concept model can be viewedSequential activities are activities that need to be carried out in a pre-defined order. The activities are connected with an arrow, implying that they have to be followed in that sequence. Both activities and sub-activities can be modeled in a sequential way. In Figure 1 an activity diagram is illustrated with one activity and two sequential sub-activities. A special kind of sequential activities are the start and stop states, which are also illustrated in Figure 1.In Figure 2 an example from practice is illustrated. The example is taken from the requirements capturing workflow in UML-based Web Engineering. The main activity, user & domain modeling, consists of three activities that need to be carried out in a predefined order

ACTIVITY

SUB ACTIVITY 2SUB ACTIVITY 1

Unordered activitiesUnordered activities are used when sub-activities of an activity do not have a pre-defined sequence in which they need to be carried out. Only sub-activities can be unordered. Unordered activities are represented as sub-activities without transitions within an activity, as is represented in Figure 3.Sometimes an activity consists of both sequential and unordered sub-activities. The solution to this modeling issue is to divide the main activity in different parts. In Figure 4 an example is illustrated, which clarifies the necessity to be able to model unordered activities. The example is taken from the requirements analysis workflow of the Unified Process. The main activity, describe candidate requirements, is divided into two parts. The first part is a sequential activity. The second part consists of four activities that do not need any sequence in order to be carried out correctly.Concurrent activitiesActivities can occur concurrently. This is handled with forking and joining. By drawing the activities parallel in the diagram, connected with a synchronization bar, one can fork several activities. Later on these concurrent activities can join again by using the same synchronization bar. Both activities and sub-activities can occur concurrently. In the example of Figure 5, Activity 2 and Activity 3 are concurrent activities.In Figure 6, a fragment of a requirements capturing process is depicted. Two activities, defining the actors and defining the use cases, are carried out concurrently. The reason for carrying out these activities concurrently is that defining the actors influences the use cases greatly, and vice versa.

ANS 5(A) an information system on the Internet which allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another. n the May 1970 issue of POPULER SCIENCE magazineATTHUR C. CLARCK predicted that satellites would someday "bring the accumulated knowledge of the world to your fingertips" using a console that would combine the functionality of the photocopier, telephone, television and a small computer, allowing data transfer and onferencing around the globeOn March 12, 1989, TIM BERNERS LEEwrote a proposal that referenced ENQUIRE , a database and software project he had built in 1980, and described a more elaborate information management system With help from ROBERT CAILLIAU he published a more formal proposal (on 12 November 1990) to build a "Hypertext project" called "WorldWideWeb" (one word, also "W3") as a "web" of "hypertext documents" to be viewed by BROWSERS " using a CLIENT SERVER ARCHITECTURE This proposal estimated that a read-only web would be developed within three months and that it would take six months to achieve "the creation of new links and new material by readers, [so that] authorship becomes universal" as well as "the automatic notification of a reader when new material of interest to him/her has become available." While the read-only goal was met, accessible authorship of web content took longer to mature, with the WIKI concept, WEB DAV.B Voice over IP is a methodology and group of technologies for the delivery of VOICE CUMMUNICATIONS and MULTIMIEDIA sessions over INTERNET PROTOCOL (IP)networks, such as the Internet. Other terms commonly associated with VoIP are IP telephony, Internet telephony, voice over broadband (VoBB), broadband telephony, IP communications, and broadband phone service.The term Internet telephony specifically refers to the provisioning of communications services (voice, FAX SMS, voice-messaging) over the public INTERNET rather than via the PUBLIC SWICHED TELEPHONE NETWORK (PSTN). The steps and principles involved in originating VoIP telephone calls are similar to traditional digital TELEPHONY and involve signaling, channel setup, digitization of the analog voice signals, and encoding. Instead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs as INTERNET PROTOCOL (IP) packets over a PACKET-SWITCHED NETWORK Such transmission entails careful considerations about resource management different from TIME DIVISION MULTYPLEXING (TDM) networks.Early providers of voice-over-IP services offered business models and technical solutions that mirrored the architecture of the legacy telephone network. Second-generation providers, such as SKYPE, have built closed networks for private user bases, offering the benefit of free calls and convenience while potentially charging for access to other communication networks, such as the PSTN. This has limited the freedom of users to mix-and-match third-party hardware and software. Third-generation providers, such as GOOGLE TALK have adopted] the concept of FEDERATED VOIP which is a departure from the architecture of the legacy networks. These solutions typically allow dynamic interconnection between users on any two domains on the Internet when a user wishes to place a call.VoIP systems employ session control and signaling protocols to control the signaling, set-up, and tear-down of calls. They transport audio streams over IP networks using special media delivery protocols that encode voice, audio, video with AUDIO CODECS and video codecs as DIGITAL AUDIO by STREAMING AUDIO Various codecs exist that optimize the media stream based on application requirements and network bandwidth; some implementations rely on NARROW BAND and COMPRESSED SPEECH while others support HIGH FIDILITY stereo codecs. Some popular codecs include LAW and A-LAW versions ofG.711G.722, which is a high-fidelity codec marketed as HD Voice byPOLYCOM , a popular open source voice codec known as Ilbc a codec that only uses 8kbit/s each way calledg7.29 , and many others.c Intranet An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in thewide area network . Typically, an intranet includes connections through one or more gateway computers to the outside Internet. The main purpose of an intranet is to share company information and computing resources among employees. An intranet can also be used to facilitate working in groups and for teleconferences.An intranet uses TCP/IP/HTTP and other Internet protocols and in general looks like a private version of the Internet. With TUNNELING companies can send private messages through the public network, using the public network with special encryption/decryption and other security safeguards to connect one part of their intranet to another.Typically, larger enterprises allow users within their intranet to access the public Internet through FIREWALL servers that have the ability to screen messages in both directions so that company security is maintained. When part of an intranet is made accessible to customers, partners, suppliers, or others outside the company, that part becomes part of an EXTRANET.D EXTRANET A company LAN, or local area network, can house a private Internet-like environment called an intranet. The INTERNET is basically a set of HTML pages relating to internal company business, for employee's eyes only, and is not available to the Internet. If access to or from the Internet is provided, it will be through a firewall gateway that will require a USERNAME and password. In this case the intranet becomes an extranet. In short, an extranet is the extension of an intranet to include public access.An extranet can allow public access to employees, customers, clients or partners. It uses Internet protocols so users can navigate with a browser, but resides on the company's private server rather than on a public Internet server. Access to it from the Internet can be controlled through various architectures that are password or username specific. In other words, areas of the extranet will be available according to password credentials. This limits users to pages relevant to the business they might be conducting, while keeping other areas private and secure.One very valuable application for an extranet is CUTOMER SERVICE Online patches, upgrades, downloads, knowledge bases, and an interactive Help Desk are just a few examples of ways to serve a client base using an extranet. Chat boards where customers help each other with company products can also build customer confidence and brand loyalty, while saving valuable human resources. Such boards are also a rich source for potential future product and support development. ANS 6 B Applications of cognitive science purpose of this course to develop an understanding of how basic cognitive science becomes an applicationor tries to. It is an excellent complement to Human Factors. The course will sample applications stemming from basic research in perception, learning, memory, and cognitive neuroscience, in collaboration with other disciplines. Examples are virtual reality environments, computer-generated navigation systems, cognitive tutors, decision aids, guidelines for eyewitness interrogation, neuro-marketing, and speech recognition and synthesis. No background in psychology is required, as the general topics will be covered along with the applications. The goals are for students to acquire fundamental knowledge of cognitive science and to learn how basic research is applied. As the course progresses, the class arrives at a shared understanding of how promising and relevant research becomes an application, as well as what stands in the way.C Applications of robotics1 Robotic handling operations (38%)Material handling is the most popular application with 38% of operational stock of industrial robots worldwide. This includes MACHINE TENDING palatalizing and various operations for metal machining and plastic moulding.2 Robotic Welding (29%)This segment mostly includes spot welding and arc welding which is mainly used by the automotive industry. Spot welding is still more popular than arc welding but not for long; as arc welding is becoming very popular in the metal industry.3 Robotic Assembly (10%)Assembly operations include: fixing, press-fitting, inserting, disassembling, etc. This category of robotic applications seems to have decreased over the last few years, even while other robotic applications have increased.4 Robotic Dispensing (4%)Here we are talking about painting, gluing, applying adhesive sealing, spraying, etc. Only 4% of the opreational robots are doing dispensing.5 Robotic Processing (2%)Processing is not a big segment of industrial robots (only 2%) and this is probably because a lot of automated machines are available on the market to do specifically these applications. The main application areas are mechanical, laser and water jet cutting.D Applications of natural interface In COMPUTING , a natural user interface, or NUI, or Natural Interface is the common parlance used by designers and developers of human-machine interfaces to refer to a USER INTERFACE that is effectively invisible, and remains invisible as the user continuously learns increasingly complex interactions. The word natural is used because most computer interfaces use artificial control devices whose operation has to be learned.A NUI relies on a user being able to quickly transition from novice to expert. While the interface requires learning, that learning is eased through design which gives the user the feeling that they are instantly and continuously successful. Thus, natural refers to a goal in the user experience that the interaction comes naturally, while interacting with the technology, rather than that the interface itself is natural. This is contrasted with the idea of anINTUTIVE INTERFACE , referring to one that can be used without previous learning.Several design strategies have been proposed which have met this goal to varying degrees of success. One strategy is the use of a "reality user interface" ("RUI"),also known as reality-based interfaces (RBI) methods. One example of an RUI strategy is to use a wearable computer to render real-world objects "clickable", i.e. so that the wearer can click on any everyday object so as to make it function as a hyperlink, thus merging cyberspace and the real world. Because the term "natural" is evocative of the "natural world", RBI are often confused for NUI, when in fact they are merely one means of achieving it.One example of a strategy for designing a NUI not based in RBI is the strict limiting of functionality and customization, so that users have very little to learn in the operation of a device. Provided that the default capabilities match the users goals, the interface is effortless to use. This is an overarching design strategy in Apples iOS . Because this design is coincident with a direct-touch display, non-designers commonly misattribute the effortlessness of interacting with the device to that multi-touch display, and not to the design of the software where it actually resides.