COURSE MATERIAL
Quality Education
beyond your imagination...
BOOK NO. A9
FAST TRACK MATERIAL IN
INFORMATION TECHNOLOGY_35e
Score at least 20
marks with this
material
Mail: mastermindsinfo@ymail.com
Youtube Channel: Masterminds For CA
Page 1
Pages
Part A
Flowcharts
4 31
Part B
33 52
Part C
Differences
54 66
CA - IPCC
COURSE MATERIAL
Quality Education
beyond your imagination...
PART A FLOWCHARTS
Mail: mastermindsinfo@ymail.com
Youtube Channel: Masterminds For CA
Page 3
MASTER MINDS
98851 25025 / 26
www.mastermindsindia.com
Purpose
Definition
Collection of computers
and terminal devices
connected together by a
communication system
1.
2.
2.
Industry trends:
Many service providers Like Airtel,
Vodafone
Many
services
available
like
Whatsapp.
Growth of E-commerce, m-commerce
Telecom Industry is undergoing major
changes In all possible ways
Availability of more bandwidth and
more
speeder
transmission
technologies like 3G,4G,5G
3.
Technology trends:
Business trends:
MASTER MINDS
4.
98851 25025 / 26
www.mastermindsindia.com
Terminals:
Starting and Stopping points in
telecommunication environment
Ex: video terminals, micro
computers, telephones
NIC:
Network Interface card
Connects computer to a
computer network
Improves network throughput
Perform many functions like
Identification, Buffering etc.
Switch:
Make temporary
connections
between
telecommunication
circuits.
5.
Telecommunication processors:
Support data transmission and reception
between terminals.
They control and coordinate flow of data in
a network
Efficiency of network depends on them
Internetwork processors:
Special purpose
communication processors
Modem:
Multiplexer:
signal-modulation
signal - Demodulation
signals.
Hub:
Used for
sharing of
networks
resources like
servers,
printers
Repeater:
It boosts (or)
amplifies the
signal
Bridge:
Used to connect
various LANS
data
transmission
signal
Magnifies
Router:
Used to inter connect networks
based on different
rules or protocols
Communication
control
software:
Program that
control and
manage the
functions.
Gateway:
Used to connect
networks of different
communication
architectures
Traffic management
Avoid congestion and
Optimize
telecommunications
service levels
6.
Security
Provides authentication,
encryption, auditing
functions, enforces
security in a network.
Network monitoring
Continuously monitors the
network
Trouble shooting and watching
the network for problems
Capacity Planning
Surveys network
resources
Planning scalability based
on users needs
LAN offers many benefits like data sharing and resources sharing in
addition it also offer the following benefits
Security
IPCC
35e
Expanded PC usage
through inexpensive
workstations
Distributed
processing
E-mail and
message
broadcasting
MASTER MINDS
7.
98851 25025 / 26
www.mastermindsindia.com
Terrestrial microware
Uses atmosphere as the
medium
Disadvantage is that it cannot
bend over the curvature of
earth
Communication satellites
A satellite is some solar-powered
electronic device that receives,
amplifies and retransmits the signal
Cost effective for large data
transmission over long distances
Micro Waves
Radio waves with wave length of 1 meter to
1mm.
Used in RADARs, Navigation and
spectroscopy.
8.
Infrared waves
Used in industrial
scientific and medical
applications
Eg.: Night vision devices.
Radio Waves
Invisible waves & Electro Magnetic
Radiation.
Wave length 1 mm to 1,00,000 Kms
Used in WANs and wireless LANs.
Area of coverage
LAN
Network with in a
building campus (or)
short distance within 1km
MAN
Spans Across a city (or)
town up to 40km
Eg.: cable network
WAN
Spans across the globe
Eg.: Internet
Functional based
Client - Server
There will be two
classes of computers
called servers & clients
Peer to Peer
No concept of client
or server
are equal
peers
All
i.e.
Ownership based
Public network
Any one can use it
Eg.: Internet
Private network
Used by a particular group
of People or a company
Eg.: LAN, MAN
Media based
Wired Media
Cables
Wireless
Satellite
communication,
Radio waves etc.
MASTER MINDS
9.
98851 25025 / 26
www.mastermindsindia.com
What is meant by network topology? What are different topologies or structures available?
Network Topology / Network Structure
Geometrical arrangement of Computer resources and other devices in a network, it determines how one
computer can communicate with other devices.
Bus topology:
Decentralized approach
A single wire connects number
of computers.
All communication travel along
a cable called bus.
Simple & easy to install.
Heavy traffic can slowdown
the network.
If there is problem with main
cable entire network goes
down.
10.
Ring topology:
Decentralized approach.
It offers high performance for
small networks.
Reliable and less costly.
Easy to expand.
More reliable.
Better than star topology.
Transmission links are
unidirectional
Relatively expensive and
difficult to install
Star topology:
Centralized approach.
Most commonly used.
Consists of one centralized
hub (or) Computer (or)
Switch.
Generally central computer
acts as server.
Easy to add and remove
nodes.
Easy to diagnose problems.
But more dependence on
Central device.
Mesh topology:
Nodes are randomly
connected using
links.
It is used in military
networks
More redundancy
Highly reliable.
More expensive.
More cable is needed
Parallel:
All bits of each byte are transmitted simultaneously.
Eg.: Parallel port used for printers
Data can be transmitted at very high speed.
Crosstalk may occur.
Expensive.
Serial:
Most commonly used method.
One bit at a time is transmitted along a single path
Eg.: Modem (or) mouse port.
Very cheap
Suited for long distances transfer data in series i.e.
slow transmission
Synchronous Transmission:
Asynchronous Transmission:
same speed.
Synchronization bits are placed at beginning and
intervals.
Eg.: Typing from a keyboard.
Every time sender sends synchronization bits to
receiver.
each block.
11.
Broadcast Networks:
Data transmitted by one node is received
by many (or) all In the network
Switched Networks:
There will be a source and destination.
Data is transmitted through switch nodes.
MASTER MINDS
98851 25025 / 26
www.mastermindsindia.com
Transmission modes
Simplex:
Data transmission in one
direction only
A terminal connected to
simplex mode line that may
send only or receive only
Eg.: Radio, Computer to Printer
12.
Full Duplex:
Simultaneously transmit and
receive data
Faster
Uses two separate circuits
Eg.: Mobile phones
Half Duplex:
Data moves in both directions but
one side at a time
Eg.: Walkie talkie
Circuit Switching:
Simplest method
Only two devices can communicate
at a time once circuit is established.
It is exclusively used by the parties
for whom the circuit is established. It
becomes unavailable to others till
the call is terminated by either party
13.
Message switching
Intermediate nodes are used to
carry the message.
No dedicated circuit is necessary to
carry the message
This characteristic is often referred
to as store and forward
Eg.: E-mail, SMS, Voice Mail
Packet switching
Sophisticated technique
Messages are broken up into
What is a Protocol? Explain the aspects defined by protocols? Explain the functions of
protocols.
Protocols
Definition:
Protocols are set of rules for inter - computer communication
Protocols are software / programs that allow heterogeneous computers to transmit data
Functions of protocols
Breakdown data into packets
Add destination address to packets
Take data packets from cable
Contact with NIC
Traffic control
Syntax:
Format of data being exchanged, is
defined.
Semantics:
Type and order of messages is
defined
Timing:
Data rate selection.
Correct timing for data transfer.
MASTER MINDS
14.
98851 25025 / 26
www.mastermindsindia.com
TCP/IP model
OSI Model
15.
16.
TRANSMISSION
CONTROL PROTOCOL /
INTERNET PROTOCOL
MASTER MINDS
17.
98851 25025 / 26
www.mastermindsindia.com
Write about different models of networks and also describe about clients and servers?
Models of network
Peer-to-Peer model
No separate server
Only sharing is possible
All are equal i.e. peers
Very simple and cost efficient.
Not suited for large networks
P2P can be adhoc-connection
Permanent infrastructure
Hybrid Client
Mixture of fat and thin
clients
Used in Imaging
consoles
Process locally, but
relies on server for
storing persistent data
Thin client
More dependence on
server
Performs only
presentation services
Fat/thick Client
It does not
necessarily rely
on server
Eg.: PC
18.
Dedicated
Performs
one specific
activity only
Non-dedicated
Performs many
activities
Single-tier systems
Two-tier systems
serves
Front End on client
Back End on sever
Used In medium &
large businesses
Very
flexible
and
effective
business
Requires
computer
19.
only
one
n-tier Architecture
Here
n refers to
number
of
levels
counting from client to
server.
environments.
secure
effective.
Very
and
What is a security program? (or) Write about network risks, controls and security?
Network Security
Meaning:
Provision made to protect network
and network accessible resources
from unauthorized access
Need:
To safeguard assets
To ensure and maintain data
integrity
Types:
Physical: To Protect physical assets like
hardware, personnel, Hardcopy
Documents etc.,
Logical: software security restricting
unauthorized access to data
10
MASTER MINDS
20.
98851 25025 / 26
www.mastermindsindia.com
Decentralized system:
Each workstation is autonomous
Centralized system:
Processing done at central location
Enhanced security
Ease of control
Ease of management
Reduced cost of ownership
Disadvantages:
All computers have to be updated
individually, but in central system updating
the central server is Enough
Disadvantages:
If Central computer fails then entire system will go down.
All the time the Central server should be kept secure and
fast.
21.
4. Internal threats:
Done by people inside the
organization having access to
internal resources
Usually these people are
disgruntled employees either
current or former
Threat:
A possible danger that can disrupt
operation functioning Integrity of a
network.
2. Structured threats:
Done by highly motivated
technical people
Malicious Intention
Specific targeting of a group
(or) Company
Technically competent hackers
causes these threats
3. External threats:
Done by people outside of organization
Usually works on trail and error basis
Tries to Intrude from Internet or dial up servers.
22.
Decryption
Encryption
Encryption:
Process of Encoding messages.
Types
Hardware Encryption:
Use of specific hardware devices to encrypt the
messages.
Now a days these devices are available at
reasonable cost.
These are fixed to computers.
Software Encryption:
Encryption done by software itself.
Usually works in conjunction with applications.
11
MASTER MINDS
23.
98851 25025 / 26
www.mastermindsindia.com
Vulnerability
It is an inherent weakness
in design, configuration or
implementation
of
a
network or system that
renders susceptible to a
threat
Timing windows:
Exploiting temporary files, Overwriting important data
In secure default configuration
Using well known and easily guessed passwords can cause Vulnerability.
Bad protocols:
Using inefficient non-standard protocols may cause vulnerability.
Trusting untrustworthy information:
Bad routing algorithms can cause network to connect to untrustworthy servers.
End-users:
Generally users of computer system who are not professionals and are not
security conscious.
24.
Aspect 1
Non-Repudiation:
Aspect 2
Network Security:
Receiver must be able to prove that Aspect 4
Provisions made to protect the
a received message came from a
network from threats.
specific sender and sender must
not be able to deny sending it.
Aspect 3
Authentication:
Receiver is sure of the senders
identity that an imposter has not
sent the message.
Integrity:
Data must arrive at receiver end exactly as it was sent by sender.
No tampering should be done.
25.
SSH:
Secure shell is a program to
IPCC
SFTP:
Stands for Secure File
Transfer Protocol
Encrypts commands and
data while transmitting.
Preventing passwords
and sensitive information
from being transmitted.
HTTPS:
SSL:
Socket Layer
Used for secure online
12
MASTER MINDS
26.
98851 25025 / 26
www.mastermindsindia.com
Fault Management
Security
Management
27.
Controlling
Allocating
Planning
Cryptographic distribution
and Authorization
Frequency Allocation
Configuration
Management
Monitoring resources
of a network
Fault Management:
A fault is an event that has a negative significance.
Goal is to recognize isolate correct, and log faults in a network.
Configuration Management:
Tracking and management of Network and system configuration
information.
Accounting Management:
Tracking network utilization information.
Performance Management:
Measures network performance such as throughput, response time
packet loss rates, Error rate etc.
28.
Deploying
Security Management:
Managing network authentication, authorization, auditing of a usage
from both Internal and External Users.
E- Commerce
13
MASTER MINDS
29.
98851 25025 / 26
www.mastermindsindia.com
What tools are available to protect the information in network against intrusion or misuse?
Tools to protect Information in network
Firewalls:
Forms
barrier
between secure and
an open environment
Effective means of
protecting
firms
Internal
resources
from
unwanted
intrusion.
30.
Message authentication
Makes
sure
that
message
is
from
authenticated sender
Makes
sure of no
message tampering
Site Blocking:
It is a tool to block certain
websites
which
may
contain
objectionable
material
Anti-malware:
These
tools
help
administrators to Identify
and block malware
Malware
disturbs
the
performance of the network.
IDS
Intrusion Detection System monitors
network assets to detect anomalous
behavior (or) misuse.
Write about Intrusion Detection System (IDS)? Explain Primary IDS technologies?
1. Network Intrusion Detection
Analyzes Network traffic and searches for un
wanted (or) malicious Events on the wired b/w hosts
They are also called as packet sniffers
It Intercepts packets
IDS
Monitors network assets
to detect anomalous
behavior (or) misuse
31.
32.
Benefits
Risks
Types
Reduce Inventories
Reduction of selling costs
Reduction of advertising costs
Access to new markets.
Buyers can access Info Easily.
Reduction of overhead costs
Problem of Anonymity
Repudiation of contract
Lack of authenticity
Denial of service
Problem of piracy
Lack of audit trails
Attacks from hackers
Define the Electronic Funds Transfer. State some examples of EFT systems in operation?
Electronic Funds Transfer
Examples
ATMs
POS
Preauthorized Transfers
Automatically depositing
transactions
POS
machines
money can be transmitted
electronically
No need to carry cash for
purchasing.
or withdrawing from an
individuals
account
through
a
financial
institution.
Payment
of
bills
automatically
IPCC
Using
Telephone transfer
Transaction can be done
through
telephone
instructions
Eg.: order of payment of
bills to bank by phone
14
MASTER MINDS
98851 25025 / 26
www.mastermindsindia.com
Definition
1. It is a set of interrelated components working together
to collect, retrieve, process, store and disseminate
(distribute) information for the purpose of achieving
objectives such as planning, coordination, analysis
and decision making.
2. Generally called as Management Information
Systems (or) Computer Based Information Systems
2.
Activities
Collecting,
storing
processing of data
Generation
of
and
Information
reports
Dissemination of Information
to right Users.
Layers
Hardware
Software
Database
Network
People
Reports
Define the term Application Software? Explain types and mention advantages and
Disadvantages.
Application Software
Set of programs for performing useful tasks
Types
Application Suite
Eg.: MS-Office, Star Office
Enterprise Software
Eg.: SAP
Educational Software
Eg.: Exam CDS, Test prep CDs
Disadvantages
Development is costly
3.
Write about System Software in detail. (Or) What is an OS? Explain functions or activities
performed by OS?
SYSTEM SOFTWARE / OPERATING SYSTEM
Definition
computer hardware
It provides a platform for running
15
MASTER MINDS
4.
98851 25025 / 26
www.mastermindsindia.com
Internal Memory
Registers
Secondary Memory
(Auxiliary Memory)
Primary Memory
(Main Memory)
Magnetic tape
drives
ROM
Non-volatile in nature
Information cannot be modified
RAM
Volatile in nature
Information can be read and write
Static RAM
PROM
Dynamic RAM
EPROM
Magnetic disk
drives (Ex: Hard
disk, Floppy disk)
Optical disk drives
(Ex: CDs DVDs
etc.)
EEPROM
SPECIAL MEMORIES
Cache Memory
It is a type of static RAM
It is smaller, faster
It is expensive
It boosts processing power
Its location in motherboard gives it the advantage
It resides between main memory to CPU
5.
Virtual Memory
Imaginary memory supported by some operating
systems
Virtual memory is an allocation of hard disk space to
help RAM
We can use large softwares with less RAM using this
technique
Data
Collection of Raw facts,
figures, observations.
Database
Collection of related data
DBMS
DBMS is a collection of programs that
enable users to create and maintain
data bases.
Or simply it is a software to maintain
databases
DBMS
Terminology
Characters
Collection of Bits
i.e. 0s and 1s
6.
Field
Collection of characters
Record
Collection of fields
File
Collections of Records
Database
Collection of Files
Definition
It is methodology used by enterprises to improve end
to end business processes in various stages
1. Analysis Phase
Phases
An ERP application divides the BPM Process into 4 phases.
2. Design Phase
3. Implementation Phase
16
MASTER MINDS
7.
98851 25025 / 26
www.mastermindsindia.com
Hierarchical Model:
Network model
Relational model
Represents database as
hierarchy of relationships
Records are arranged in inverted
tree pattern
Parent-child relationship between
records
Supports only one to one and one to
many relationships
Simple to understand
If parent node is deleted all Child
nodes get automatically deleted
Cannot support many-to-many
relationships
model
Supports all types of relations
one to one, one to many, many
to one, many to many
Relatively efficient
More flexible
But difficult to operate
Less user friendly,
collection of relations
Relational database contains
multiple tables
Easier to use
Highly flexible
Can handle queries in a more
efficient manner
Storage requirements are high
Requires more processing
capacity
Primary key plays important role.
Copyrights Reserved
To
etc.,
Ex: CAD tools, Expert systems, Image processing
8.
9.
Advantages
Reduced Data Redundancy
Program and file consistency
Data sharing
Integrity can be maintained
User friendly
Improved security
Data independence
Faster application development
Disadvantages
Cost: Implementing a DBMS may
be expensive, time consuming and
requires more training to users
Security: It is difficult to keep
unauthorized users away from
accessing the database
Explain what type of IT infrastructural is required for organization and discuss the risks
and issues of IT?
IT in Enterprises
Infrastructure required
An Enterprise should posses the following Infrastructure
Database access and changes software
File replication and backup software
Systems and event log monitoring
Job scheduling software
Application Integration
Printing & file transfers
17
MASTER MINDS
10.
98851 25025 / 26
www.mastermindsindia.com
Computer Science
Scientific and practical approach to
computation and its applications
It studies the Internal working of the
computers
11.
Computer Engineering
Integrates
several
fields
of
Electronic
Engineering
and
computer science required to
develop hardware and software
Software Engineering
CISC
Stands for Complex Instruction Set
Computing
Ex .: Intel 386, 486, Pentium pro, PII, PIII
etc
They are complex as well as expensive to
produce.
Most PCs use CISC processors
Variable length instructions i.e., each
instruction can use exactly the amount of
space it requires
12.
RISC
Stands for Reduced Instruction Set
Computing
Ex: IBM RS6000, MC88100 processors
Consume less power offers high
performance
Less complex and less expensive
Workstations uses RISC processors
Fixed length instructions. i.e for each
instruction can occupies the same amount
of space, hence memory space is wasted
Phase - I
System Investigation:
Examines what is problem
and is it worth solving
Feasibility study is done.
SDLC
Development
life cycle
Provides sequence of
activities to build an
Information system
Phase - II
System Analysis:
Examines
what
must
the
Information system do to solve the
problem.
Gathering details.
Analyzing cost benefits.
System
Phase - IV
System Implementation:
Examines how will the solution be
put into effect
Involves coding testing Installing
software
Phase - III
System Design:
Examines how will the Info.
System do, what it must do to
obtain solution to the problem.
Designing of Hardware, software,
Inputs, outputs, etc.
18
MASTER MINDS
13.
98851 25025 / 26
www.mastermindsindia.com
2. Instruction Decode
Figures out what we actually
need to do
MACHINE CYCLE
3. Execution
Performs some operation
14.
Mobile Communication
Infrastructure for seamless and
reliable communication
Includes devices such as protocols,
services, bandwidth and profiles
Mobile Hardware
Include laptops, Tabs, Phones,
PDAs
They operate on full duplex mode
Business Applications
Increase workforce productivity
Offers any where any time access
Improved customer service, latest Innovations in service
Business process improvement
Innovative opportunities for improving quality and efficiency
15.
Mobile Software
Programs that run on mobile
hardware
Main component or Engine of the
mobile device.
Concerns/Problems
Security concerns
Dangers of misrepresentation
Power consumption
Potential health hazards
It involves removing the human Element from existing business by automating the
repetitive or standardized process components
Steps
Objectives
Confidentiality
Integrity
Availability
Timeliness
Activities
Integration
Orchestration
Automation
Benefits of BPA
Reduction of human error
Easy transformation of data into
information
Improves performance and
process effectiveness
Making business more
responsive
Improves information sharing and
collaboration
19
MASTER MINDS
16.
98851 25025 / 26
www.mastermindsindia.com
Feasibility study
Process of Evaluation alternative systems
through cost/benefit analysis
Legal Feasibility
Operational Feasibility
Schedule (or) Time Feasibility
Interviewing Staff
Fact finding techniques
Major Concepts
in SDLC
Observation of current
proceedings
Direct change over
Parallel Conversion
Conversion Methods
Phased Conversion
Pilot Conversion
Perfective Maintenance
System Maintenance
Types
Adaptive Maintenance
Corrective Maintenance
Information
Processing of data is known as
information
Information
is
used
in
managerial decision making
System
System is a set of interrelated
components working together to
accomplish objectives
Role In business
Helps in decision making
Helps to Execute Innovative
Ideas
Helps in solutions of complex
and critical problems
Help to take right decisions at
right time
To gain competitive advantage
Information system
It is a combination of people
hardware, software, communication
devices, and networks to process
data and produce Information
Components
Storage
Input
Processing
Output
Feed Back
20
MASTER MINDS
2.
98851 25025 / 26
www.mastermindsindia.com
Strategic Level
Includes CEOs, COOs,
Chair person etc.,
System used: EIS
3.
Operational Level
Management Level /
Middle Level
Knowledge level
TPS
4.
MIS
DSS
EIS
OAS
KMS
1. Data Entry
2. Transaction Processing
Batch
Online / Real time
4. Document &
Report Generation
5. Inquiry Processing
3. Database Maintenance
5.
Explain TPS?
Transaction Processing System (TPS)
Definition:
It is Information system that
collects, stores, modifies and
retrieves day to day transactions
of an enterprise
Eg.: ATM; IRCTC, Accounting
system
6.
TPS Attributes:
Access control: Should restrict
un authorized access
Equivalence: Transaction
should be in same format every
time
High volume rapid processing of
transactions
It should be robust and trust
worthy
TPS qualifiers:
Atomicity: transaction should take
place in entirety
Consistency: Should behave similarly
all the time
Isolation : only one transaction at a
time
Durability: Maintenance of logs
Once transactions are completed they
cannot be undone.
Explain SCM?
SCM
Definition
Stands for Supply Chain Management
Process of planning, implementing and
controlling the operations of the supply chain
with purpose to satisfy customer requirements.
SCM cover from point-of-origin to point-ofconsumption
Characteristic features
Components:
Procurement
with customers
Operations
Distribution
Integration
21
MASTER MINDS
7.
98851 25025 / 26
www.mastermindsindia.com
Explain ERP?
Enterprise Resource Planning (ERP)
Definition
Advantages
Powerful tool In hands of management
Internal
and
External
Management Information across
Entire organization
processes
Used
for
resources
utilization
Enterprise
like
procurement,
Inventory,
production,
sales,
Logistics, finance, A/cs and HR
8.
optimum
of
one
competent
administration
and
efficient
Stages of ERP
Inventory control
ABC Analysis
EOQ (Economic order quantity)
Just-in-time (JIT)
Material Requirement planning
Manufacturing Resource planning
Distribution Resource planning
Enterprise Resource planning
Money Resource planning
EIS web Enabled
Explain CRM?
CRM
Definition
Stands for Customer Relationship
Management
It may be defined as process in
9.
Benefits
Generation of customer loyalty
Raising a market Intelligence Enterprise
Integrated relationship
Preserving Existing customers
Providing enhanced services
Developing connection and affiliation
with customers
Architecture of CRM
Operational: Automation is provided to
the basic business processes
Analytical: Analyzes customs behavior
Collaborative: Ensures contacts with
customers like Phone, Email, Fax,
SMS etc
Definition
10.
It is a Computer Based
Information
System
that
supports
business
or
organizational
decision
making activities
DSS covers wide variety of
systems, tools & technologies
Benefits of DSS
Components
Users
Databases
Planning languages
Model base
Characteristics
DSS
supports
management decision
making
DSS solve unstructured
problems.
Friendly
computer
Interface
MIS
EIS
EIS components
Hardware
Software
User Interface
Telecommunication
22
MASTER MINDS
11.
98851 25025 / 26
www.mastermindsindia.com
KMS
Stands for Knowledge Management System
It provides both Evident and hidden knowledge for
decision making
It Enables Employees to have ready access to
organizations documented base of facts etc
It is an Information repository
It provide both Explicit and Tacit knowledge
Explicit knowledge Ex: online tutorials.
Tacit Knowledge Ex: Employee experience
12.
KDD
Stands for Knowledge Discovery and Data mining
It clears with ways and means of capturing and making
obtainable knowledge of the Experts to others in
electronic form
It includes people from inside and outside of organization
Importance of knowledge
Altering business surroundings
Burgeon connections
Globalization
Modification in organizational composition
Definition
CORE stands for Centralized Online Real
time Environment
It is a set of basic software components that
manage the services provided by a bank to its
customers through its branches
13.
Examples
ATMS
ONLINE Banking
24x7 support
Internet Banking etc.,
Definition
A Human Resource Management
System is a software application
that
unites
many
human
Resource functions which benefits
the management
It is also called as HRIS i.e.,
Human Resource Information
System
14.
Benefits
Brings Industry best practices to HR functions
Utilizes HR potentials completely
Reduce HR administrative costs
Increases employee engagement and
satisfaction.
Enhances data integrity within the Enterprise
Enable to meet compliance and audit
requirement
Key Modules
Work force management
Time and attendance
management
Payroll management
Training management
Compensation management
Recruitment management
Personnel management
Organizational management
Employee self service
Analytics
Definition
A type of software that is
designed to retrieve analyze
and report data
Key tools
Simple reporting and
querying
Business Analysis
Dash boards
Score cards
Data mining (or) Statistical
Data Analysis
23
MASTER MINDS
15.
98851 25025 / 26
www.mastermindsindia.com
16.
Components of AIS
People
Procedure &
Instructions
Software
Data
IT
Infrastructure
Internal controls
AI:
Stands for Artificial Intelligence
Distinct area of computer science focusing
on creating machines that imitate aspects
of human behavior such as to reason,
communicate, see and hear.
AI is manmade and level of activity
depends on the programming capability
Applications of A.I
Decision Support
Information Retrieval
Components :
1. User Interface
2. Inference Engine
3. Knowledge base
4. Knowledge acquisition
facility
5. Explanation facility
6. Database of facts
Advantages:
Cost Effective alterative to human
experts
Faster and do not get stressed out
Better quality and more consistent
decisions
Preserve the Expertise of an expert
leaving the organization
Limitations:
Costly and time consuming
Difficult to obtain knowledge from experts
Difficult to program commonsense of
human beings
Virtual Reality
Robotics
17.
Expert systems
It is a computerized Information system
that allows non-experts to make decisions
comparable to that of an Expert
These controls help us to restrict whom and what accesses information resources
Functions
Identity Management
Authentication
Authorization
Accountability
24
MASTER MINDS
18.
98851 25025 / 26
www.mastermindsindia.com
Credit Card:
Electronic Cheque:
It is a plastic card
Processing:
Authorization
Batching
Clearing
Funding
Electronic Purse:
Another way to make payments over
Internet
Very similar to prepaid card
Validation is done through PIN
No credit check or signature is needed
cheque
It acts as a message to the
Smart Card:
Smart Cards have an Embedded Micro Chip Instead of a Magnetic Strip.
Contact cards
Contactless cards
Nature of Processing
Source of Application
Nature of Business
Batch Processing
In-house developed
Online
Processing
Purchased
application
Real time
Processing
2.
Functions Covered /
Nature of Application
(Based on business functions
it covers)
Accounting Application
Small Business
Cash Management
Medium Business
Manufacturing Application
Large Business
Leased
Batch processing
In batch processing there is a time
delay in occurrence and recording of
transaction
Eg.:
Credit
card
statements,
Accounting, Stock Control statements
Used by small business
3.
Real-time Processing
Input
it is entered
Immediate result
Eg.: Cash Management Software
Used by medium businesses
is
continuously
and
automatically acquired from sensors
Eg.: Pilot less air craft, Robots etc
Online processing
Process
Output
Input
Processing
Output
Feed Back
25
MASTER MINDS
4.
98851 25025 / 26
www.mastermindsindia.com
Accounting
Applications, Eg.:
Tally, Wings
5.
Office
Management
Software, Eg.:
MS Office
Compliance
Applications
Eg.: E-filing
software
CRM Software,
Eg.: SAP-CRM
Manageme
nt Support
Software,
Eg.: MIS
ERP software
Eg.: SAP
Product Life
Cycle
Management
Software
Logistics
Management
Software
Legal
Management
Software
Industry specific
software like
Tourism,
Automobile,
Banking, Pharma
software, Cinema
Ticketing software
Definition:
Controls can be divided into two parts
Control is defined as polices procedures
practices that are designed to provide
reasonable assurance that business
objectives are achieved and undesired
Application Controls:
Managerial Controls:
Events are prevented or detected and
Boundary controls
Top management controls
corrected
Input controls
Information systems management controls
Process controls
System development management controls
Output controls
Programming management controls
Communication controls
Data Resource management controls
Database controls
Quality Assurance controls
Security management controls
Operations management controls.
6.
Boundary controls:
To restrict the actions under taken by
users
Techniques:
Cryptography
Passwords
PIN
ID Cards / Plastic Cards
Digital Signatures
Input controls:
Ensures accuracy and completeness
of data entered in to system
Techniques:
Source document controls
Data coding controls
Batch controls
Validation controls
Database controls:
Ensures data integrity in a data base
Eg.: Ensuring all records on files are processed
Multiple Transactions for a single record in
the correct order
Output controls:
Ensures data redelivered trousers will be
present ell for matted and delivered manner
Eg.: Printing controls, Retention controls,
Existence Recovery controls, Storage and
Logging of sensitive and critical forms
Communication controls:
Ensure proper transmission of
data in network
Eg.: Physical Component
control, Line error control, Flow
and Link controls etc.
Process controls:
Performs validation checks to identify
errors during processing
Eg.: Edit checks, run to run totals
checking,
Field
Initialization,
Reasonableness verification, etc.
26
MASTER MINDS
7.
98851 25025 / 26
www.mastermindsindia.com
Top management
controls & Information
systems management
controls
System development
management controls
Functions
performed by
senior managers
1.
2.
3.
4.
Planning
Organizing
Leading
Controlling
Data Resource
management controls
Functions
Performed by
Senior Auditors
Functions
Performed by S/W
Developers
Concurrent Audit
Post implementation
Audit
General Audit
1. Planning
2. Designing
3. Coding
4. Testing
5. Operation &
Maintenance
Functions Performed
by Resource Managers
1.Centralized data
security
2.Appointing Senior
Persons
3.Separating Duties
4.Maintaining Logs
5.Share data to right
persons
Functions performed by
Security Administrators
8.
Programming
management controls
Functions performed by
Quality Controllers
Functions performed by
Operations manager
Network virtualization
Allows a large physical network to
be provisioned Into Multiple
smaller logical network
Major Applications
Server consolidation
Disaster Recovery
Testing and training
Portable applications
Portable work spaces
9.
Grid computing
It is a form of distributed computing
It is a computer network in which each
computers resources are shared with every
other computer in a communication system
Need:
Civil Engineers need it
Insurance companies need it
Large-scale science & Engineering Applications
use it.
A cheaper alternative to supercomputer
Cloud computing
A cloud is a collection of
servers,
applications,
databases, documents,
agreements,
storage
capacity
etc.,
which
allow organizations to
share these resources
from anywhere.
a)
b)
IPCC
Custom-built Application:
These applications can be
configured to meet a particular
companys requirements.
Example In house developed
Software such as Billing,
Inventory, and Attendance etc.
a)
b)
Packaged Software:
These
are
the
standard
applications which are not free
but are licensed. Customization
to suit business requirements
may or may not be allowed.
For Example -Tally, Oracle 9i.
Leased application:
a)
b)
For Example
Systems
Cloud
27
MASTER MINDS
10.
98851 25025 / 26
www.mastermindsindia.com
Service Models:
Cloud computing officers the following
services to users
Software as service (Saas)
Platform as a service (Paas)
Infrastructure as a service (Iaas)
Network as a service (Nass)
Communication as a service (Caas)
Deployment Models:
Clouds can be divided based on
their deployment and usage
Public clouds
Private clouds
Community clouds
Hybrid clouds
Characteristics:
Elasticity and scalability
Pay per use
On demand
Resiliency
Work load movement
Multi Tenancy.
Advantages:
Cost Efficient.
Easy access to
Information.
Unlimited Storage.
Backup and recovery.
Integration.
Quick deployment
Disadvantages:
Technical Issues.
Security Issues.
Prone to Attacks.
Journals
Financial
Statements
2.
Closing
Entries
Trial Balance
Ledger
Adjusted
Trial Balance
Adjustments
Recording
Reconciliation
3.
Shipping
Pick
Release
Invoice
Receipt
Payments
Request
for Quote
Quotation
Receipts
Purchase
Order
28
MASTER MINDS
4.
98851 25025 / 26
www.mastermindsindia.com
Meaning
DFD is a graphical representation of the flow of
data through an information system.
Types of DFD: Physical data flow and logical
data flow
Major components
Entity
Process
Data Store
Data Flow
Symbols:
Process Attribute
(or)
Entity
Data Flow
Advantages:
It aids in describing boundaries of system.
Easy to recognize.
Easy to communicate.
Easy to understand.
Displays flow of data in a system.
5.
(or)
Limitations:
Creates little confusion
Takes long time to create.
Physical considerations
are left out.
Definition
Tabular representation of program logic
Displays all conditions and the
appropriate actions to be taken for set of
conditions
Model of Decision Table
Condition
stub(s)
Action stub(s)
6.
Advantages
Easy to draw
Simplicity
Modularity
Non-technical
Compact
documentation
Limitations
All programmers may not be
familiar with Decision tables.
Sometimes flow charts may be
better
Many not give complete picture of
the situation.
Condition Entries
Action Entries
Meaning
An Entity-Relationship diagram is a data
modeling technique that creates a graphical
representation
of
the
entities
and
relationships between them.
Types of Relationships
One to one (1:1)
One to many (1:N)
Many to one (M:1)
Many to many (M:N)
Symbols:
Entity Attribute
Key attribute
xyz
Relationship -
Advantages:
Simple and Easily understood
Helps in Physical database creation
Helps in database design.
Gives high level description of system.
Disadvantages:
Ambiguities.
Misinterpretations
29
MASTER MINDS
7.
98851 25025 / 26
www.mastermindsindia.com
Definition
It is a decision support tool that uses tree like
model of decisions and their possible
consequences, including chance, event
outcomes, resource costs and utility.
Advantages
Simple to understand & interpret
Possible scenarios can be added
Worst, best and expected values
can be determined
Limitations
Becomes very complex if many
values are uncertain and/or if
many outcomes are linked.
8.
9.
Phases:
Define
Measure
Analyze
Improve
Control
10.
Phases:
(i) Plan
(ii) Do
(iii) Check
(iv) Act
IPCC
35e
Phases:
i) Fundamental rethinking
ii) Radical redesign
iii) Dramatic achievement
30
MASTER MINDS
11.
98851 25025 / 26
www.mastermindsindia.com
Meaning
A flowchart is a diagram prepared by the
programmer of the sequence of steps
involved in solving a problem
Categories
System outline
charts
System flowcharts
Run flowcharts
Program flowcharts
Symbols:
Start/End Input / Output Process Decision box
Limitations:
When logic is complex flow chart becomes
more complex.
For modifications complete redrawing is
necessary.
Reproduction in computers may be difficult.
Advantages:
Effective Analysis
Improved Communication.
Helps in Documentation.
Helps in coding.
Helps in tracing bugs / errors.
Quick grasp of relationships.
12.
5. Optimize
2. Design
3. Implementation
13.
Benefits:
Automating repetitive business processes.
Operational savings.
Software can be made by loose coupling with
existing processes.
Freeing up of employee time.
Reduction
in
administration
involved
in
compliance and ISO activities.
Risks:
Technological problems.
Break down in gap analysis.
Failure to identify future business needs.
IT may be complicated or not flexible.
Deficient project management.
Limited options for customization.
Inadequate assessment of need for change management.
Copyrights Reserved
To
THE END
IPCC
35e
31
CA - IPCC
COURSE MATERIAL
Quality Education
beyond your imagination...
Mail: mastermindsinfo@ymail.com
Youtube Channel: Masterminds For CA
Page 32
MASTER MINDS
a)
b)
a)
b)
c)
a)
b)
7. Multiplexer
(SM, PM, MTP-OCT 14, RTP-NOV 14)
It is a communications processor that allows a
single communications channel to carry
simultaneous data transmissions from many
terminals.
Typically,
a
multiplexer
merges
the
transmissions of several terminals at one end
of a communications channel, while a similar
unit separates the individual transmissions at
the receiving end.
9. MAN
MAN is a digital communication system which
interconnects different sites, computers and
user terminals that are spread over a
metropolitan city.
A Metropolitan Area Network is some where
between a LAN and a WAN.
Cable Television networks are best examples.
11. VPN (SM, NOV 14 2M, MTP MAY16)
It is a private network that uses a public
network to connect remote sites or users
together in a secured manner through a
firewall and other security features.
VPNs can be one of two types: Intranet-based
and extranet-based.
33
MASTER MINDS
98851 25025 / 26
www.mastermindsindia.com
a)
b)
c)
a)
b)
21. Threat
24. Cryptography
(MTP-SEP 14, RTP-MAY 15)
34
MASTER MINDS
a)
b)
a)
b)
c)
a)
b)
B Category
31. Telecommunications Processors (SM)
a) Telecommunications Processors support data
transmission and reception between terminals
and computers by providing a variety of control
and support functions.
b) Multiplexers, concentrators, communications
controllers, and cluster controllers are some of
the examples.
a)
b)
a)
b)
c)
IPCC
35e
35
MASTER MINDS
98851 25025 / 26
www.mastermindsindia.com
38. Routing (SM)
a) M-Commerce
C Category
43. Network Architecture (SM)
36
MASTER MINDS
47. Cryptographic Controls
(MTP MAY 16, MAY16 2M)
4. CPU (SM)
6. Registers (SM)
7. Non-Volatile Memory
37
MASTER MINDS
98851 25025 / 26
www.mastermindsindia.com
38
MASTER MINDS
19. Hardware Virtualization (PM)
a) Hardware
Virtualization
or
Platform
Virtualization refers to the creation of a virtual
machine that acts like a real computer with an
operating system.
b) Software executed on these virtual machines
is separated from the underlying hardware
resources.
27. I Pad
39
MASTER MINDS
98851 25025 / 26
www.mastermindsindia.com
Copyrights Reserved
To
System Implementation
System Maintenance and Review
32. Bluetooth
(SM, RTP-NOV 14,NOV 14 2M)
B Category
35. Instruction Set Architecture (ISA)
(SM, MTP-SEP 14, RTP-MAY 15)
40
MASTER MINDS
37. Mobile Software: (RTP-NOV 15)
(MAY 15-2M)
C Category
43. Cathode-Ray Tube (CRT)
41
MASTER MINDS
98851 25025 / 26
www.mastermindsindia.com
47. Plotter
48. Speakers
2. System
42
MASTER MINDS
7. Durability
8. Model base
a) It is the brain of the Decision Support System.
Durability means that once a transaction has been b) It processes data with the help of data provided
committed or saved, it will remain so, even in the
by the user and the database.
event of power loss, crashes, or errors.
c) The analysis provided by model base is the key
for users decision.
9. MS Office Applications: (MTP-SEP 14)
10. Nucleus FinnOne: (MAY 16-2M)
a) FinnOne is a web-based global banking product
a) These are various office automation systems
designed to support banks and financial
made available by Microsoft Corporation which
solution companies in dealing with assets,
include MS Word, MS Excel, MS PowerPoint,
liabilities, core financial accounting and
MS Access, etc.
customer service.
b) Each of these software help to achieve b) The solution is wholly focused on banking and
automation of various tasks in the office.
financial services spanning across solutions in
c) It has features such as customized ribbon, back
the areas of Retail & Corporate Banking, Cash
stage view, built-in graphics toolset, enhanced
Management, Relationship Banking, Financial
security, etc.
CRM, Credit Risk & Appraisal, EAI, Internet
Banking, FX, Basel II, Data warehousing and
Analytics.
11. Credit Cards
12. Smart Cards (MTP-OCT 14, MAY 16)
a) A credit card is a plastic card issued by a
a) Smart cards have an embedded microchip
financial institution that allows its user to borrow
instead of magnetic strip.
pre-approved funds at the point of sale in order
b)
The chip contains all the information a magnetic
to complete a purchase.
strip contains but offers the possibility of
b) Credit cards have a credit limit -- the user can
manipulating
the
data
and
executing
borrow during a given period.
applications on the card.
c) The credit limit is pre-determined by the card
c) Three types of smart cards are Contact cards,
issuer based on the cardholder's credit rating
Contact-less and Hybrid cards.
and credit history
13. Enterprise Resource Planning System (SM)
14. Supply Chain Management
a) An ERP system is a fully integrated business
a) SCM is the process of planning, implementing
management system, covering functional areas
and controlling the operations of the supply
of an enterprise like Procurement, Inventory,
chain with the purpose to satisfy customer
Production,
Sales,
Logistics,
Finance,
requirements in an efficient way.
Accounting and Human Resources.
b) It covers all movements and storage of raw
b) It organizes and integrates operation processes
materials, work-in-process, and finished goods
and information flows to make optimum use of
from point-of-origin to point-of-consumption.
resources such as men, material, money and
c) It integrates supply and demand management,
machine, i.e. ERP is the way an Enterprise plans
within and across companies.
the optimum use of its resources.
15. Artificial Intelligence
16. Knowledge base
(SM, RTP-NOV 14, MTP-MAR 15)
a) AI is the distinct area of computer science
a) This includes data, knowledge, relationships,
focusing on creating machines that tries to
rules of thumb (heuristics) and decision rules
imitate aspects of human behavior, such as to
used by experts to solve a particular type of
reason, communicate, see, and hear.
problem.
b) AI software can use its accumulated knowledge
b) A knowledge base in a computer is equal to the
to reason and in some instances learn from
knowledge of an expert or group of experts
experience and thereby modify its subsequent
developed through years of experience in their
behavior.
field.
c) Expert systems, Pattern recognition, Natural
c) The knowledge base encloses both realistic
language processing, and many other areas
and heuristic knowledge.
where AI can be applied.
43
MASTER MINDS
98851 25025 / 26
www.mastermindsindia.com
17. Consistency
18. Isolation
a) Electronic purse is very similar to a pre-paid a) It includes the methodologies, technology and
card where funds can be directly deducted from
capabilities that help an enterprise to manage
the Card to vendors POS terminal.
customer relationships.
b) When the value on a card is spent, consumers b) Allows businesses to develop long-term
can load additional funds from their accounts to
relationships with established and new
the card.
customers, while helping to modernize
corporate performance.
c) Validation is done through a PIN.
21. Extensible Business Reporting Language
(PM, MTP-FEB 15, MTP-MAY 16)
a) XBRL
is
freely
available
international
a) It is the process of capturing, developing,
standards-based business reporting language
sharing, and effectively using organizational
developed by accountants for financial
knowledge.
reporting.
b) It refers to a multi-disciplined approach to
b) XBRL is a standards-based way to
achieving organizational objectives by making
communicate
and
exchange
business
the best use of knowledge.
information between business systems.
23. Explicit knowledge
B Category
27. Business Information System
(PM,RTP-NOV 14)
44
MASTER MINDS
29. Frame based Expert systems (SM)
C Category
33. Business Process
(SM, PM, MTP-MAR 15)
A Business Process is a collection of related,
structured activities or tasks that produce a specific
service or product (serve a particular goal) for a
specific organization.
a)
b)
a)
b)
c)
45
MASTER MINDS
98851 25025 / 26
www.mastermindsindia.com
a) Finacle
core
banking
solution
is
a
comprehensive, agile, componentized yet
integrated business solution, addressing all the
core needs of banks, in easy-to-configure
modules.
b) With a 360 degree single source view into
customer accounts, banks can empower
customers with relevant information an delight
them with the right offerings, presented at the
right time through the right channel.
a)
b)
c)
d)
e)
f)
g)
h)
i)
j)
2. TALLY
3. SAP R/3
46
MASTER MINDS
9. Real-time Processing
47
MASTER MINDS
98851 25025 / 26
www.mastermindsindia.com
19. Middleware
B Category
23. Hardware virtualization (SM)
Hardware Virtualization or Platform Virtualization
refers to the creation of a virtual machine that acts
like a real computer with an operating system.
The basic idea of Hardware virtualization is to
consolidate many small physical servers into one
large physical server so that the processor can be
used more effectively.
25. Enterprise Software
48
MASTER MINDS
a)
C Category
34. Application Software Package (SM)
49
MASTER MINDS
98851 25025 / 26
www.mastermindsindia.com
2. Process
4. Business Process
a) BPR is the fundamental rethinking and radical a) It is a data modeling technique that creates a
graphical representation of the entities, and the
redesign of processes to achieve dramatic
relationships between entities, within an
improvement,
in
critical,
contemporary
information system.
measures of performance such as cost, quality,
service and speed.
b) Entity is defined as a distinguishable object that
exists in isolation and is described by a set of
b) Business Process Re-engineering is also
attributes.
known as Business Process Redesign,
Business Transformation, or Business Process c) Relationship is the association among several
Change Management.
entities
50
MASTER MINDS
11. Data Flow Diagrams
(RTP-MAY 15, MAY 16)
12. Flowchart
(RTP-MAY 15)
a) A graphical representation of the flow of data a) It is diagram prepared by the programmer of the
through an information system. DFDs may be
sequence of steps involved in solving a
partitioned into levels that represent increasing
problem.
information flow and functional detail.
b) It defines the strategy and thread of logic
b) Major components: Process, Entity, Dataflow
followed in the program.
and Data store.
c) It is like a blueprint, in that it shows the general
plan, architecture, and essential details of the
proposed structure.
13. Decision Trees
(MTP-OCT 14, MAY 16)
a) Six Sigma is a set of strategies, techniques, a) BPM is the methodology used by enterprises to
and tools for process improvement. It seeks to
improve end-to-end business processes in five
improve the quality of process outputs and
stages namely: design, modeling, execution,
minimizing inconsistency in manufacturing and
monitoring and optimization.
business processes.
b) BPM is defined as: The achievement of an
b) Objectives: reduce process cycle time, reduce
organizations
objectives
through
the
pollution, reduce costs, increase customer
improvement, management and control of
satisfaction, and increase profits.
essential business processes
B Category
17. Re-engineering (SM)
a) It covers the business processes involved in a) It covers all the business processes relating to
recording and processing accounting events of
fulfilling customer requests for goods or
a company.
services.
b) It begins when a transaction or financial event b) It involves transactional flow of data from the
occurs and ends with its inclusion in the
initial point of documenting a customer order to
financial statements.
the final point of collecting the cash.
51
MASTER MINDS
98851 25025 / 26
www.mastermindsindia.com
22. Entity in DFD: (MTP-SEP 14,MAY 16 )
Copyrights Reserved
To
THE END
52
CA - IPCC
COURSE MATERIAL
Quality Education
beyond your imagination...
PART C DIFFERENCES
Mail: mastermindsinfo@ymail.com
Youtube Channel: Masterminds For CA
Page 53
MASTER MINDS
No
(PM)
Guided Media
Unguided Media
1.
Media that provide a conduit (channel) from Consists of a means for the data signals to travel
one device to another.
but nothing to guide them along a specific path.
2.
It uses a "cabling" system that guides the It passes through a vacuum; it is independent of a
data signals along a specific path.
physical pathway.
3.
Example Coaxial Cable, Twisted Pair, Example Infrared Waves, Micro Waves, Radio
Fiber Optic Cable.
Waves etc.
2.
No.
1.
2.
3.
Parallel Transmission
The data bits are transmitted simultaneously.
4.
5.
3.
No.
1.
2.
3.
4.
4.
(PM)
Deterrence
Detection
54
MASTER MINDS
Attack
Anticipation
Damage
Assessment
Response
Scope
Dependency
5.
No
98851 25025 / 26
www.mastermindsindia.com
None
Very weak damage
Assessment capabilities
Strong response against
outsider attacks
Broad in scope
Host independent.
1.
A client computer typically communicates with Every computer is equal and can communicate
servers, not with other clients.
with any other computer on the network to which it
has been granted access rights.
2.
A central server handles all security and file Each machine shares its own resources and
transactions.
handles its own security.
3.
It is more expensive as it requires a central file It is relatively less expensive as it does not
server, server software and client licenses.
require a dedicated machine, server software or
special client licenses.
4.
5.
The performance is relatively high as the server is The performance is relatively low.
dedicated and does not handle other tasks.
6.
In case of failure of server, the whole network No single point failure affects the network.
fails.
7.
C/S model relies on the power and stability of a P2P gives each workstation equivalent
single computer i.e., Server.
capabilities and relies heavily on the power and
bandwidth of each individual computer.
8.
Example Email, network printing, and the Example Napster, Gnutella, Freenet, Bit
World Wide Web.
Torrent and Skype.
6.
No.
1.
Star Network
Here all nodes are connected to a central
computer/hub through dedicated cables.
Communication takes place between the
nodes through the hub/computer only.
A broken connection between hub/central
computer and node does not affect the rest of
the network.
Failure in the hub/central computer affects all
nodes connected to that hub.
The signal becomes weak when it has to travel
long distances. To avoid it, repeaters are
required to be used.
It is very easy to add/remove a node from the
network.
2.
3.
4.
5.
6.
(RTP-NOV 14)
Ring Network
Here all nodes are connected in the form of a
circular chain.
Communication takes place by each node to
receive and check for the message.
A broken connection between nodes leads to
failure of entire network.
Failure in one node does not affect the entire
system.
Repeaters are not needed. Every computer
acts as a repeater.
It is difficult to add/remove a node from the
system.
55
MASTER MINDS
7.
Transport Layer:
Transport Layer or Layer 4 ensures reliable and transparent transfer of data between user processes,
assembles and disassembles message packets and provides error recovery and flow control.
Multiplexing and encryption are undertaken at this layer level. This means that the Layer can keep
track of the segments and retransmit those that fail.
Network Layer:
The Network Layer or Layer 3 provides the functional and procedural means of transferring variable
length data sequences from a source to a destination via one or more networks, while maintaining the
quality of service requested by the Transport Layer.
This Layer makes a choice of the physical route of transmission; creates a virtual circuit for upper
layers to make them independent of data transmission and switching; establishes, maintains,
terminates connections between the nodes and ensure proper routing of data.
8.
(RTP-NOV 15)
Half-Duplex Mode:
In Half-Duplex mode, (sometimes called an alternating connection or semi-duplex) the data flows in
one direction or the other, but not both at the same time.
This type of connection makes it possible to have bidirectional communications using the full capacity
of the line.
In this, the entire capacity of a channel is taken over by whichever of the two devices is transmitting at
the time.
Full-Duplex Mode:
Each end of the line can thus transmit and receive at the same time, which means that the bandwidth
is divided in two for each direction of data transmission if the same transmission medium is used for
both directions of transmission.
In this, signals going in either direction share the capacity of the link wither by containing two separate
physical links (one for sending and the other for receiving) or by dividing the capacity of the channel
between signals travelling in opposite direction.
9.
(RTP-NOV 15)
Circuit Switching:
A Circuit Switching network is one that establishes a fixed bandwidth circuit (or channel) between
nodes and terminals before the users may communicate, as if the nodes were physically connected
with an electrical circuit.
The route is dedicated and exclusive, and released only when the communication session terminates.
Circuit switching is what most of us encounter on our home phones. A single circuit is used for the
entire duration of the call.
Applications which use circuit switching go through three phases: Establish a Circuit, Transfer of data
and Disconnect the Circuit.
56
MASTER MINDS
98851 25025 / 26
www.mastermindsindia.com
Packet Switching:
Each packet is transmitted individually across the net. The packets may even follow different routes to
the destination.
Since there is no fixed path, different packets can follow different path and thus they may reach to
destination out of order.
10.
(RTP-NOV 15)
Presentation Layer:
This layer at times referred as Syntax Layer also, is usually a part of an operating system, that
converts incoming and outgoing data from one presentation format to another (for example, from a text
stream into a popup window with the newly arrived text).
The presentation service data units are then encapsulated into Session Protocol Data Units, and
moved down the stack. It further controls on screen display of data, transforms data to a standard
application interface.
Session Layer:
This layer sets up, coordinates, and terminates conversations, exchanges, and dialogs between the
applications at each end.
It deals with session and connection coordination. It provides for full-duplex, half-duplex, or simplex
operation, and establishes check pointing, adjournment, termination, and restart procedures.
The OSI model made this layer responsible for "graceful close" of sessions also.
11.
(RTP-NOV 14)
Hardware Encryption:
Hardware Encryption devices are available at a reasonable cost, and can support high speed traffic.
If the Internet is being used to exchange information among branch offices or development
collaborators, for instance, use of such devices can ensure that all traffic between these offices is
secure.
Software Encryption:
Certain electronic mail packages, for example, provide encryption and decryption for message
security.
12.
(RTP-MAY 15)
57
MASTER MINDS
Thick Client:
A Thick client is a client that performs the bulk of any data processing operations itself, and does not
necessarily rely on the server.
Unlike thin clients, thick clients do not rely on a central processing server because the processing is
done locally on the user system, and the server is accessed primarily for storage purposes.
For that reason, thick clients often are not well-suited for public environments. To maintain a thick
client, IT needs to maintain all systems for software deployment and upgrades, rather than just
maintaining the applications on the server.
Thin Client:
A thin client generally only presents processed data provided by an application server, which performs
the bulk of any required data processing.
A thin client machine is going to communicate with a central processing server, meaning there is little
hardware and software installed on the user's machine.
A device using web application (such as Office Web Apps) is a thin client.
14.
Broadcast Networks:
In Broadcast networks, data transmitted by one node is received by many, sometimes all, of the other
nodes.
For example a corporation or other voluntary association, that provides live television or recorded
content such as movies, newscasts, sports, public affairs programming, and other television programs
for broadcast over a group of radio stations or television stations.
Switched Networks
In switched-communication networks, the data transferred from source to destination is routed through
the switch nodes.
The way in which the nodes switch data from one link to another, as it is transmitted from source to
destination node, is referred to as a switching technique.
Three common switching techniques are Circuit Switching, Packet Switching, and Message Switching.
15.
Consumer-to-Business e-Commerce:
In C2B e-Commerce model, consumers directly contact with business vendors by posting their project
work online so that the needy companies review it and contact the consumer directly with bid.
IPCC
35e
58
MASTER MINDS
98851 25025 / 26
www.mastermindsindia.com
The consumer reviews all the bids and selects the company for further processing. Some examples
are guru.com, rentacoder.com, getacoder.com, freelancer.com.
Consumer-to-Consumer e-Commerce:
C2C e-Commerce is an Internet - facilitated form of commerce that has existed for the span of history
in the form of barter, flea markets, swap meets, yard sales and the like.
C2C e-Commerce sites provide a virtual environment in which consumers can sell to one another
through a third-party intermediary.
16.
No.
Mesh Network
Ring Network
1.
2.
3.
4.
Network problems
diagnose
to
5.
17.
are
easier
No.
Internet
Intranet
1.
2.
3.
4.
5.
6.
7.
59
MASTER MINDS
2.
RAM
RAM is a volatile memory and when the
computer is turned off, RAM loses its data.
When the computer is turned on again,
operating system and other files are once again
loaded into RAM usually from the hard disk.
This is Read/Write memory wherein information
can be read as well as modified.
ROM
Unlike RAM, ROM is non-volatile. The
contents of ROM remain even after the
computer is switched off.
2.
No.
1.
2.
3.
4.
5.
3.
60
MASTER MINDS
98851 25025 / 26
www.mastermindsindia.com
No.
Primary Storage
Secondary storage
1.
2.
3.
4.
5.
Low capacity.
High capacity.
6.
7.
High cost.
Low cost.
8.
5.
Hardware Resources:
These refer to Machines - computers, video monitors, magnetic disk drives, printers, optical scanners
and Media - floppy disks, magnetic tape, optical disks, plastic cards, paper forms.
Software Resources:
These refer to Programs - operating system programs, spreadsheet programs, word processing
programs, payroll programs and Procedures - data entry procedures, error correction procedures,
paycheck distribution procedures.
6.
61
MASTER MINDS
No.
(PM)
Data
Information
1.
Data is raw and unorganized fact that When data is processed, organized, structured or
needs to be processed.
presented in a given context so as to make it useful, it
is called Information.
2.
Data in itself is meaningless and is the Information is the second level of knowledge.
lowest level of knowledge.
3.
2.
Explicit knowledge:
a) Explicit knowledge is that knowledge which can be formalized easily and as a consequence is easily
available across the organization.
b) Explicit knowledge is articulated, and represented as spoken words, written material and compiled data.
c) This type of knowledge is codified, easy to document, transfer and reproduce.
d) For example - Online tutorials, Policy and procedural manuals.
Tacit knowledge:
a) Tacit knowledge, on the other hand, resides in a few often-in just one person and hasnt been
captured by the organization or made available to others.
b) Tacit knowledge is unarticulated and represented as intuition, perspective, beliefs, and values that
individuals form based on their experiences.
c) It is personal, experimental and context specific. It is difficult to document and communicate the tacit
knowledge.
62
MASTER MINDS
98851 25025 / 26
www.mastermindsindia.com
No.
Information
Knowledge
1.
Information
is
piecemeal,
fragmented and particular.
2.
3.
4.
5.
Strategic-Level Systems:
These systems are strategic managers to track and deal with strategic issues that assist in long-range
planning.
A principle area is tracking changes in the external conditions (market sector, employment levels,
share prices, etc.) and matching these with the internal conditions of the organization.
Operational-Level Systems:
Support operational managers tracking elementary activities. These can include tracking customer
orders, invoice tracking, etc.
(SM, PM)
Cloud Computing:
a) Suited for any size of data storage
b) Suited for both standard or day to day and computational intensive tasks.
c) Very high uptime availability
d) Provide sharing of infrastructure and thus help to reduce cost.
Copyrights Reserved
Grid Computing:
To
63
MASTER MINDS
2.
No.
1.
2.
3.
3.
Manual Information
Processing Cycle
Systems where the level of manual
intervention is very high. For exampleEvaluation of exam papers, teaching and
operations in operation theatres.
Include following components:
a) Input: Put details in register.
b) Process: Summarize the information; and
c) Output:
Present
information
to
management in the form reports.
Input
Process
Computerized Information
Processing Cycle
Systems where computers are used at every
stage of transaction processing and human
intervention is minimal.
Include following components:
a) Input: Entering data into the computer;
b) Process: Performing operations on the
data;
c) Storage: Saving data, programs, or output
for future use; and
d) Output: Presenting the results.
Output
Typically, IaaS provides hardware, storage, servers and data centre space or network components; it
may also include software.
A service provider hosts the application at its data centre over the Internet and customer accesses it
via a standard Web browser.
(MTP-MAR 15)
Online Processing:
Data is processed immediately while it is entered, the user usually only has to wait a short time for a
response. (Example: games, word processing, booking systems).
Interactive or online processing enables the user to input data and get the results of the processing of
that data immediately.
Real-time Processing:
Input is continuously, automatically acquired from sensors, for example, which is processed
immediately in order to respond to the input in as little time as possible.
After the system is finished responding, it reads the next set of input data immediately to process that.
Whenever there is a rapid reaction required due to some sort of change, real time processing can take
action without the need of a user.
Real time processing is used in warning systems on aircraft, alarm systems in hazardous zones,
burglar alarms etc.
64
MASTER MINDS
5.
98851 25025 / 26
www.mastermindsindia.com
(RTP-NOV 15)
Concurrent Audit:
They assist the team in improving the quality of systems development for the specific system they are
building and implementing.
General Audit:
They seek to determine whether they can reduce the extent of substantive testing needed to form an
audit opinion about managements assertions relating to the financial statements in systems
effectiveness and efficiency.
6.
(RTP-NOV 15)
Organizations are increasingly producing safety-critical systems and users are becoming more
demanding in terms of the quality of the software they employ to undertake their work.
Organizations are undertaking more ambitious information systems projects that require more
stringent quality requirements and are becoming more concerned about their liabilities if they produce
and sell defective software.
Information security administrators are responsible for ensuring that information systems assets are
secure.
Assets are secure when the expected losses that will occur over some time are at an acceptable level.
7.
(RTP-MAY 15)
A service provider hosts the application at its data centre over the Internet and customer accesses it
via a standard Web browser.
Platform as a Service (PaaS) delivery model allows a customer to rent virtualized servers and
associated services used to run existing applications, or to design, develop, test, deploy and host
applications.
The consumer may create software using tools and/or libraries from the provider. The consumer may
also control software deployment and configuration settings.
The provider provides the networks, servers, storage, and other services.
For example, AppScale allows a user to deploy some applications written for Google App Engine to
their own servers.
8.
(RTP-MAY 15)
Private Cloud:
This cloud computing environment resides within the boundaries of an organization and is used
exclusively for the organizations benefits.
65
MASTER MINDS
They are built primarily by IT departments within enterprises who seek to optimize utilization of
infrastructure resources within the enterprise by provisioning the infrastructure with applications using
the concepts of grid and virtualization.
The benefit of a Private Cloud is that it enables an enterprise to manage the infrastructure and have
more control.
Hybrid Cloud:
It is a composition of two or more clouds (Private, Community or Public). They have to maintain their
unique identity, but are bound together by standardized data and application portability.
With a hybrid cloud, organizations might run non-core applications in a public cloud, while maintaining
core applications and sensitive data in-house in a private cloud.
Work Unit
Key Figure
Benefits
Weaknesses
Strategic
Value
2.
(SM)
Functional Organization
Department
Functional Executive
a) Focus on functional excellence.
b) Easier to implement.
c) Clear management direction
Process Organization
Team
Process Owner
a) Responsive to market requirements.
b) Improved
communication
and
collaboration
c) Performance measurements associated
with process goals.
Flow chart
THE END
66