Anda di halaman 1dari 67

CA - IPCC

COURSE MATERIAL
Quality Education
beyond your imagination...
BOOK NO. A9
FAST TRACK MATERIAL IN
INFORMATION TECHNOLOGY_35e
Score at least 20
marks with this
material

Cell: 98851 25025 / 26


Visit us @ www.mastermindsindia.com
Facebook Page: Masterminds For CA

Mail: mastermindsinfo@ymail.com
Youtube Channel: Masterminds For CA

Page 1

INDEX FOR FAST TRACK MATERIAL IN INFORMATION TECHNOLOGY


Chapter Name

Pages

Part A

Flowcharts

4 31

Part B

2 Mark Questions / Definitions

33 52

Part C

Differences

54 66

CA - IPCC
COURSE MATERIAL
Quality Education
beyond your imagination...

PART A FLOWCHARTS

Cell: 98851 25025 / 26


Visit us @ www.mastermindsindia.com
Facebook Page: Masterminds For CA

Mail: mastermindsinfo@ymail.com
Youtube Channel: Masterminds For CA

Page 3

MASTER MINDS

98851 25025 / 26

www.mastermindsindia.com

1. TELECOMMUNICATIONS & NETWORKS


1.

What is computer network? Explain different types of network?


COMPUTER NETWORK

Purpose

Definition

Collection of computers
and terminal devices
connected together by a
communication system

1.
2.

Most commonly found


networks Examples:
LAN, MAN, WAN, VPN,
INTRANET, EXTkRANET,
INTERNET








Sharing of hardware devices


Information sharing
Electronic transfer of text (EDI)
Decentralization of various Data processing functions.
Communication between organizations
Collaborate more creatively

Terminals are Starting and Stopping points in any telecommunication environment.


Terminals may include dumb, intelligent, workstations and also printers, Telephone lines etc.

2.

State the latest trends in telecommunication?


Trends In telecommunication

Industry trends:
 Many service providers Like Airtel,
Vodafone
 Many
services
available
like
Whatsapp.
 Growth of E-commerce, m-commerce
 Telecom Industry is undergoing major
changes In all possible ways
 Availability of more bandwidth and
more
speeder
transmission
technologies like 3G,4G,5G

3.

Technology trends:

Business trends:

Change from Analog to Digital


network technologies. Ex: ISDN
Change In communication media
i.e., faster communication media
Like fiber optic cables, satellite
communication
New and more secure protocols,
Network architectures are evolving
like WAP etc.,

Businesses want to cut costs


Online operational process
Looking
to
benefit
from
E-commerce and m-commerce
They want to improve communication
and collaboration.
They are looking at improved
response times and less waiting
times.

Write short notes on need and scope of computer networks?


How networks help business

Organizations can improve


efficiency by sharing Information
such as common files, databases
and various application softwares
over a network

Advantages of computer network:


 File sharing
 Resource sharing like printers, hard disk etc
 Remote access via Internet
 Database sharing
 Fault tolerance by having backups of data and servers i.e. unbroken service.
 Internet access to the organization with security concerns
 Can do the business across the world i.e., over coming geographical barriers
 Can offer Any time any where services like ATMs i.e., over coming time barriers
 Reduce costs of communicating through video conferencing.
 Boundary less collaboration with stakeholders like customers, supplies etc.,

IPCC |35e |Flow charts_ Information Technology

MASTER MINDS
4.

98851 25025 / 26

www.mastermindsindia.com

Write short notes on telecommunication network model


Components of telecommunication network model

In a communication network there will be Sender, Receiver, and Communication channel

Terminals:
Starting and Stopping points in
telecommunication environment
Ex: video terminals, micro
computers, telephones

NIC:
 Network Interface card
 Connects computer to a
computer network
 Improves network throughput
 Perform many functions like
Identification, Buffering etc.

Switch:
Make temporary
connections
between
telecommunication
circuits.

5.

Telecommunication processors:
 Support data transmission and reception
between terminals.
 They control and coordinate flow of data in
a network
 Efficiency of network depends on them

Internetwork processors:
Special purpose
communication processors

Modem:

Multiplexer:

 Digital signal to Analog

 Also called as MUX


 Carries several terminal signals on a

signal-modulation

single channel simultaneously.

 Analog signal to Digital

 Multiplexer merges transmission

signal - Demodulation

signals.

 Must for Internet

Hub:
Used for
sharing of
networks
resources like
servers,
printers

Repeater:
It boosts (or)
amplifies the
signal

 De - multiplexer separates signals.

Bridge:
 Used to connect

various LANS
data
transmission
signal

 Magnifies

Router:
Used to inter connect networks
based on different
rules or protocols

Communication
control
software:
Program that
control and
manage the
functions.

Gateway:
Used to connect
networks of different
communication
architectures

Write short notes on network management and functions of network management?


Major Networking functions

Traffic management
 Avoid congestion and
 Optimize

telecommunications
service levels

6.

Security
Provides authentication,
encryption, auditing
functions, enforces
security in a network.

Network monitoring
 Continuously monitors the
network
 Trouble shooting and watching
the network for problems

Capacity Planning
 Surveys network
resources
 Planning scalability based
on users needs

Why users prefer Local Area Networks?


Why users Prefer LAN?

LAN offers many benefits like data sharing and resources sharing in
addition it also offer the following benefits

Security

IPCC

35e

Expanded PC usage
through inexpensive
workstations

Distributed
processing

E-mail and
message
broadcasting

|Flow charts_ Information Technology

Less maintenance and Low


Software costs

MASTER MINDS
7.

98851 25025 / 26

www.mastermindsindia.com

Write about different kinds of cables commonly used in LANs


Communication Media

Guided media / bound media


Uses a cabling system that guides the
data signal along a specific path.

Twisted pair cables


 It is an ordinary telephone wire
 Most widely used for both data

and voice transmission


 Inexpensive & easy to install
 Used for short distance only.

Terrestrial microware
 Uses atmosphere as the
medium
 Disadvantage is that it cannot
bend over the curvature of
earth

Unguided media / Un bound media


 Does not use cables
 Uses waves and air as medium

Co- Axial cable


 Consists of copper (or)
aluminum wire with high
insulation
 Used for high speed, long
distance transmission.
Eg.: cable T.V. wire.

Communication satellites
 A satellite is some solar-powered
electronic device that receives,
amplifies and retransmits the signal
 Cost effective for large data
transmission over long distances

Micro Waves
 Radio waves with wave length of 1 meter to
1mm.
 Used in RADARs, Navigation and
spectroscopy.

8.

Fiber optic cable


 Consists one or more hair like
thin filaments of glass fiber
 Data transmission is very fast
and secure, easy to install
 Very Expensive

Infrared waves
 Used in industrial
scientific and medical
applications
Eg.: Night vision devices.

Radio Waves
 Invisible waves & Electro Magnetic
Radiation.
 Wave length 1 mm to 1,00,000 Kms
 Used in WANs and wireless LANs.

Write about different types of telecommunication networks?


Different Types of Telecommunication networks

Area of coverage
LAN
Network with in a
building campus (or)
short distance within 1km
MAN
Spans Across a city (or)
town up to 40km
Eg.: cable network
WAN
Spans across the globe
Eg.: Internet

Functional based

Client - Server
There will be two
classes of computers
called servers & clients
Peer to Peer
 No concept of client

or server
are equal
peers

 All

i.e.

Ownership based
Public network
 Any one can use it
 Eg.: Internet
Private network
 Used by a particular group
of People or a company
 Eg.: LAN, MAN

Media based
Wired Media
Cables
Wireless
Satellite
communication,
Radio waves etc.

Virtual Private network


Uses a public network to
connect a private network
Eg.: work from home

IPCC |35e |Flow charts_ Information Technology

MASTER MINDS
9.

98851 25025 / 26

www.mastermindsindia.com

What is meant by network topology? What are different topologies or structures available?
Network Topology / Network Structure

Geometrical arrangement of Computer resources and other devices in a network, it determines how one
computer can communicate with other devices.

Bus topology:
 Decentralized approach
 A single wire connects number
of computers.
 All communication travel along
a cable called bus.
 Simple & easy to install.
 Heavy traffic can slowdown
the network.
 If there is problem with main
cable entire network goes
down.

10.

Ring topology:
 Decentralized approach.
 It offers high performance for
small networks.
 Reliable and less costly.
 Easy to expand.
 More reliable.
 Better than star topology.
 Transmission links are
unidirectional
 Relatively expensive and
difficult to install

Star topology:
 Centralized approach.
 Most commonly used.
 Consists of one centralized
hub (or) Computer (or)
Switch.
 Generally central computer
acts as server.
 Easy to add and remove
nodes.
 Easy to diagnose problems.
 But more dependence on
Central device.

Mesh topology:
 Nodes are randomly
connected using
links.
 It is used in military
networks
 More redundancy
 Highly reliable.
 More expensive.
 More cable is needed

Write about Digital Data transmission


Data Transmission

Parallel:
 All bits of each byte are transmitted simultaneously.
 Eg.: Parallel port used for printers
 Data can be transmitted at very high speed.
 Crosstalk may occur.
 Expensive.

Serial:
 Most commonly used method.
 One bit at a time is transmitted along a single path
 Eg.: Modem (or) mouse port.
 Very cheap
 Suited for long distances transfer data in series i.e.
slow transmission

Two basic ways of Serial Transmission

Synchronous Transmission:

Asynchronous Transmission:

 Information is transmitted at the same rate.


 Sender and receiver are paced by same clock i.e.,

 Data (or) information is sent at irregular

same speed.
 Synchronization bits are placed at beginning and

ending of Provides physical transmission of data


In network
 Provides physical transmission of data In network

intervals.
Eg.: Typing from a keyboard.
 Every time sender sends synchronization bits to

receiver.

each block.

11.

Write about different modes of data communication


Various techniques of Data Transmission
Techniques of Data Transmission

Broadcast Networks:
 Data transmitted by one node is received
by many (or) all In the network

Switched Networks:
 There will be a source and destination.
 Data is transmitted through switch nodes.

IPCC |35e |Flow charts_ Information Technology

MASTER MINDS

98851 25025 / 26

www.mastermindsindia.com

Transmission modes

Characterized according to the


direction of exchange of data

Simplex:
 Data transmission in one
direction only
 A terminal connected to
simplex mode line that may
send only or receive only
Eg.: Radio, Computer to Printer

12.

Full Duplex:
 Simultaneously transmit and
receive data
 Faster
 Uses two separate circuits
Eg.: Mobile phones

Half Duplex:
Data moves in both directions but
one side at a time
Eg.: Walkie talkie

Discuss various switching techniques used in a computer network?


Switching Techniques
Data transferred from source to destination is routed
through the switched nodes

Circuit Switching:
 Simplest method
 Only two devices can communicate
at a time once circuit is established.
 It is exclusively used by the parties
for whom the circuit is established. It
becomes unavailable to others till
the call is terminated by either party

13.

Message switching
 Intermediate nodes are used to
carry the message.
 No dedicated circuit is necessary to
carry the message
 This characteristic is often referred
to as store and forward
Eg.: E-mail, SMS, Voice Mail

Packet switching
 Sophisticated technique
 Messages are broken up into

small transmission units called


packets.
Eg.: Downloading and uploading in
internetwork

What is a Protocol? Explain the aspects defined by protocols? Explain the functions of
protocols.
Protocols

Definition:
 Protocols are set of rules for inter - computer communication
 Protocols are software / programs that allow heterogeneous computers to transmit data

Functions of protocols
 Breakdown data into packets
 Add destination address to packets
 Take data packets from cable
 Contact with NIC
 Traffic control

Aspects defined by protocols

Syntax:
Format of data being exchanged, is
defined.

Semantics:
Type and order of messages is
defined

IPCC |35e |Flow charts_ Information Technology

Timing:
 Data rate selection.
 Correct timing for data transfer.

MASTER MINDS
14.

98851 25025 / 26

www.mastermindsindia.com

Write short notes on Network Architecture?


Network Architecture
Definition:
 It is a layout of a network (full picture of the established network).
 It discuss about hardware, software, connectivity, mode of transmission etc.,
 The goal is to promote an open, simple, flexible and efficient telecommunications environment

TCP/IP model

OSI Model

15.

Write about Open System Interconnection (OSI)


Layer1/ Physical Layer
 Hardware layer
 Discusses about topology
Layer 2/Datalink layer
 Specifies channel access control method and reliable data
transfer.
Layer 3/Network layer
 It makes a choice of physical route of transmission of data
 Routing of data in a network

OSI MODEL designed


by ISO

Layer 4/Transport layer


 Assembling and disassembling of packets
 Multiplexing, encryption, error recovery etc are undertaken
Layer 5/Session layer
 Establishes, maintains and terminate sessions
 Authentication and identification of clients.
Layer6/ Presentation layer
 Controls on screen display of data
 Encryption, data compression can be done.
Layer 7/Application layer
 It Provides File transfer, file sharing
 Deadlock and Database concurrency controls can be done.

16.

Write short notes on TCP/IP?


Meaning
 Protocol used in Internet is called TCP/IP
 It consists of 5 layers which corresponds to 7 layers of OSI
model
Layers1/Physical layer
 Provides physical transmission of data In network

TRANSMISSION
CONTROL PROTOCOL /
INTERNET PROTOCOL

Layer 2/Network Interface


 Supports Error free organization and transmission of data in
network
Layer3/ Internet protocol (IP)
 Provides routing by establishing connections among network
links
Layer4/ Host to Host transport layer
 Supports the organization and transfer of data.
Layer5/Application or process layer
 Provides communication services
 Establishes sessions
Data transmission formats and codes.

IPCC |35e |Flow charts_ Information Technology

MASTER MINDS
17.

98851 25025 / 26

www.mastermindsindia.com

Write about different models of networks and also describe about clients and servers?
Models of network

Peer-to-Peer model
No separate server
Only sharing is possible
All are equal i.e. peers
Very simple and cost efficient.
Not suited for large networks
P2P can be adhoc-connection
Permanent infrastructure

Client / Server model


Intelligently divides processing
work between clients and servers
Servers handles global tasks
Clients handles local tasks
Very fast, secure, reliable, efficient
model

Client: Service Requesters

Hybrid Client
 Mixture of fat and thin
clients
 Used in Imaging
consoles
 Process locally, but
relies on server for
storing persistent data

Thin client
More dependence on
server
Performs only
presentation services

Fat/thick Client
It does not
necessarily rely
on server
Eg.: PC

18.

Server: Service Providers

Dedicated
Performs
one specific
activity only

Non-dedicated
Performs many
activities

Discuss Multi-Tier Architecture?


Multi-tier Architecture

Single-tier systems

Two-tier systems

 Single computer having

 Consists of client and

both Front end (GUI)


and
Back
End
(database)

serves
Front End on client
Back End on sever
Used In medium &
large businesses
Very
flexible
and
effective

 Used in small and micro

business
 Requires

computer

19.

only

one






Three- tier system


 There will be 3 tiers namely
 Presentation tier (front End)
 Application tier (Business logic)
 Data tier (back end)
 It will be more complex
 But very effective
 Modern day businesses use this
model
 More secure
 Dynamic load balancing

n-tier Architecture
 Here

n refers to
number
of
levels
counting from client to
server.

 Used in more complex

environments.
secure
effective.

 Very

and

What is a security program? (or) Write about network risks, controls and security?
Network Security

Meaning:
Provision made to protect network
and network accessible resources
from unauthorized access

Need:
 To safeguard assets
 To ensure and maintain data
integrity

IPCC |35e |Flow charts_ Information Technology

Types:
 Physical: To Protect physical assets like
hardware, personnel, Hardcopy
Documents etc.,
 Logical: software security restricting
unauthorized access to data

10

MASTER MINDS
20.

98851 25025 / 26

www.mastermindsindia.com

Write about Centralized systems & Decentralized systems?


Centralized and decentralized systems

Decentralized system:
 Each workstation is autonomous

Centralized system:
 Processing done at central location
 Enhanced security
 Ease of control
 Ease of management
 Reduced cost of ownership

 It enable file sharing to all in the Network

Disadvantages:
 All computers have to be updated
individually, but in central system updating
the central server is Enough

Disadvantages:
 If Central computer fails then entire system will go down.
 All the time the Central server should be kept secure and
fast.

21.

Explain the threats involved in system security?


1. Unstructured threats:
 Inexperienced and enthusiastic people will do
 Ex: port scanning tools, address sweeping tools
 No malicious Intention
 Many tools are available in Internet

4. Internal threats:
 Done by people inside the
organization having access to
internal resources
 Usually these people are
disgruntled employees either
current or former

Threat:
A possible danger that can disrupt
operation functioning Integrity of a
network.

2. Structured threats:
 Done by highly motivated
technical people
 Malicious Intention
 Specific targeting of a group
(or) Company
 Technically competent hackers
causes these threats

3. External threats:
 Done by people outside of organization
 Usually works on trail and error basis
 Tries to Intrude from Internet or dial up servers.

22.

Discuss the encryption model in computer network.


Cryptography

Decryption

Encryption

Encryption:
Process of Encoding messages.
Types

Hardware Encryption:
 Use of specific hardware devices to encrypt the
messages.
 Now a days these devices are available at
reasonable cost.
 These are fixed to computers.

Software Encryption:
 Encryption done by software itself.
 Usually works in conjunction with applications.

Eg.: Mail sent using g-mail will be encrypted by


g-mail application.

IPCC |35e |Flow charts_ Information Technology

11

MASTER MINDS
23.

98851 25025 / 26

www.mastermindsindia.com

Explain the vulnerabilities involved in system security?


Software bugs:
Bug (or) error in software is a serious vulnerability

Vulnerability
It is an inherent weakness
in design, configuration or
implementation
of
a
network or system that
renders susceptible to a
threat

Timing windows:
Exploiting temporary files, Overwriting important data
In secure default configuration
Using well known and easily guessed passwords can cause Vulnerability.
Bad protocols:
Using inefficient non-standard protocols may cause vulnerability.
Trusting untrustworthy information:
Bad routing algorithms can cause network to connect to untrustworthy servers.
End-users:
Generally users of computer system who are not professionals and are not
security conscious.

24.

Write short notes on network security?


Privacy:
 There should be confidentiality.
 Achieved by cryptography and encryption techniques.

Aspect 1
Non-Repudiation:
Aspect 2
Network Security:
Receiver must be able to prove that Aspect 4
Provisions made to protect the
a received message came from a
network from threats.
specific sender and sender must
not be able to deny sending it.
Aspect 3

Authentication:
Receiver is sure of the senders
identity that an imposter has not
sent the message.

Integrity:
 Data must arrive at receiver end exactly as it was sent by sender.
 No tampering should be done.

25.

Explain popular network security protocols?


Popular network security protocols

Network security protocols are designed to prevent any unauthorized


application service or device from accessing network data.
Examples

SSH:
 Secure shell is a program to

log on to another computer


over network to execute
commands in a remote
machine.
 Provides authentication and
secure communication
 Protects network from IP
spoofing, DNS Spoofing
etc.,

IPCC

SFTP:
 Stands for Secure File
Transfer Protocol
 Encrypts commands and
data while transmitting.
 Preventing passwords
and sensitive information
from being transmitted.

HTTPS:

SSL:

 Stands for Hyper Text

 Stands for Secure

Transfer Protocol Secure


 Uses public and secret

keys to encrypt data flow


between client and
server

|35e |Flow charts_ Information Technology

Socket Layer
 Used for secure online

credit card transactions


using web mail etc

12

MASTER MINDS
26.

98851 25025 / 26

www.mastermindsindia.com

What are the functions of network management?


Functions of network
management

Fault Management

Security
Management

27.

Controlling

Route Analysis and


Accounting mgmt.

Allocating

Planning

Cryptographic distribution
and Authorization

Frequency Allocation

Configuration
Management

Monitoring resources
of a network

Discuss FCAPS model of network management?

Fault Management:
 A fault is an event that has a negative significance.
 Goal is to recognize isolate correct, and log faults in a network.

Configuration Management:
Tracking and management of Network and system configuration
information.

Accounting Management:
Tracking network utilization information.

Performance Management:
Measures network performance such as throughput, response time
packet loss rates, Error rate etc.

28.

Deploying

Security Management:
Managing network authentication, authorization, auditing of a usage
from both Internal and External Users.

Write short notes on different classes of E-Commerce?


Business-to-Business (B2B) e-Commerce:
a) The exchange of services, information and/or products from one business to another.
b) Automated processes between trading partners.
Business-to-Consumer (B2C) e-Commerce:
a) It is defined as the exchange of services, information and/or products from a business to a
consumer.
b) A virtual store available for consumers to purchase goods and services

E- Commerce

Consumer-to-Business (C2B) e-Commerce:


a) Consumers directly contact with business vendors by posting their project work online so that
the needy companies review it and contact the consumer directly with bid.
b) Consumer reviews all the bids and selects the company.
Consumer-to-Consumer (C2C) e-Commerce
a) Internet-facilitated form of commerce that has existed in the form of barter, flea markets,
yard sales and the like.
b) A virtual environment in which consumers can sell to one another through a third-party
Business-to-Government (B2G) e-Commerce: It also known as e-Government, refers to the
use of information and communication technologies to build and strengthen relationships
between government and employees, citizens, businesses, non-profit organizations, and other
government agencies.
Business-to-Employee (B2E) e-Commerce:B2E e-Commerce, from an intra-organizational
perspective, has provided the means for a business to offer online products and services to its
employees.

IPCC |35e |Flow charts_ Information Technology

13

MASTER MINDS
29.

98851 25025 / 26

www.mastermindsindia.com

What tools are available to protect the information in network against intrusion or misuse?
Tools to protect Information in network

Firewalls:
 Forms
barrier
between secure and
an open environment
 Effective means of
protecting
firms
Internal
resources
from
unwanted
intrusion.

30.

Message authentication
 Makes
sure
that
message
is
from
authenticated sender
 Makes
sure of no
message tampering

Site Blocking:
It is a tool to block certain
websites
which
may
contain
objectionable
material

(NAC) Network Access Control:


These products handle access authentication and
authorization functions

Anti-malware:
 These
tools
help
administrators to Identify
and block malware
 Malware
disturbs
the
performance of the network.

IDS
Intrusion Detection System monitors
network assets to detect anomalous
behavior (or) misuse.

Write about Intrusion Detection System (IDS)? Explain Primary IDS technologies?
1. Network Intrusion Detection
 Analyzes Network traffic and searches for un
wanted (or) malicious Events on the wired b/w hosts
 They are also called as packet sniffers
 It Intercepts packets

IDS
Monitors network assets
to detect anomalous
behavior (or) misuse

2. Host based Intrusion detection


 Monitors attacks on a given host
 Used to combat Internal threats
3. Hybrid Intrusion Detection
 Combination of both NID and HID
 It offers central Intrusion detection Management

31.

Write short notes on E-Commerce?


E-Commerce is the process of doing business electronically

32.

Benefits

Risks

Types























Reduce Inventories
Reduction of selling costs
Reduction of advertising costs
Access to new markets.
Buyers can access Info Easily.
Reduction of overhead costs

Problem of Anonymity
Repudiation of contract
Lack of authenticity
Denial of service
Problem of piracy
Lack of audit trails
Attacks from hackers

Business-to Business (B2B)


Business -to- Consumer (B2C)
Consumer -to -Business (C2B)
Consumer- to -Consumer (C2C)
Business to- Government (B2G)
Business- to- Employee (B2E)

Define the Electronic Funds Transfer. State some examples of EFT systems in operation?
Electronic Funds Transfer
Examples
ATMs

POS

Preauthorized Transfers

 Specialized form of POS


 used with debit or credit

 Stands for point of sale

 Automatically depositing

transactions
POS
machines
money can be transmitted
electronically
 No need to carry cash for
purchasing.

or withdrawing from an
individuals
account
through
a
financial
institution.
 Payment
of
bills
automatically

cards with a PIN Number


 ATM cards are used in
multipurpose manner to
pay bills to withdraw
cash etc.,

IPCC

 Using

|35e |Flow charts_ Information Technology

Telephone transfer
Transaction can be done
through
telephone
instructions
Eg.: order of payment of
bills to bank by phone

14

MASTER MINDS

98851 25025 / 26

www.mastermindsindia.com

2. INFORMATION SYSTEMS & IT FUNDAMENTALS


1.

Define Information System? Write about Information System Layers.


Information Systems

Definition
1. It is a set of interrelated components working together
to collect, retrieve, process, store and disseminate
(distribute) information for the purpose of achieving
objectives such as planning, coordination, analysis
and decision making.
2. Generally called as Management Information
Systems (or) Computer Based Information Systems

2.

Activities
 Collecting,

storing
processing of data

 Generation

of

and

Information

reports
 Dissemination of Information

to right Users.

Layers
 Hardware
 Software
 Database
 Network
 People
 Reports

Define the term Application Software? Explain types and mention advantages and
Disadvantages.
Application Software
Set of programs for performing useful tasks
Types

Application Suite
Eg.: MS-Office, Star Office

Enterprise Software

Eg.: SAP

Content Access Software


Eg.: Media players, Adobe digital

Enterprise Infrastructure Software


Eg.: Email sever, security
software , Antivirus software

Educational Software
Eg.: Exam CDS, Test prep CDs

Information Worker Software


Eg.: MS-Excel, CAAT etc

Media Development Software


Eg.: DTP software, Photoshop
Benefits

Addressing user needs


 Application
software
is
designed to suit the user needs
 They are designed with a
specific purpose in mind.

Regular updates licensed


Application software will
have regular updates for
various security reasons

Less threat from virus


The threat of virus infection to
custom-made applications is
very small,

Disadvantages
Development is costly

3.

Infection from malware

Write about System Software in detail. (Or) What is an OS? Explain functions or activities
performed by OS?
SYSTEM SOFTWARE / OPERATING SYSTEM

Definition

Functions (or) activities of an OS

 Software designed to operate the






computer hardware
 It provides a platform for running

application software (Apps)


 Operating system is a system

program which acts as an


Interface between the user and
the computer hardware.





IPCC |35e |Flow charts_ Information Technology

Performing hardware functions


Memory management
Providing user interface
OS provides hardware
Independence
Memory management
Task management
Providing networking
capabilities
File management

15

MASTER MINDS
4.

98851 25025 / 26

www.mastermindsindia.com

Explain various data storage devices?


Memory techniques/ Devices

Internal Memory
Registers

Secondary Memory
(Auxiliary Memory)

Primary Memory
(Main Memory)

Magnetic tape
drives
ROM
Non-volatile in nature
Information cannot be modified

RAM
Volatile in nature
Information can be read and write
Static RAM

PROM

Dynamic RAM

EPROM

Magnetic disk
drives (Ex: Hard
disk, Floppy disk)
Optical disk drives
(Ex: CDs DVDs
etc.)

EEPROM

SPECIAL MEMORIES

Cache Memory
 It is a type of static RAM
 It is smaller, faster
 It is expensive
 It boosts processing power
 Its location in motherboard gives it the advantage
 It resides between main memory to CPU

5.

Virtual Memory
 Imaginary memory supported by some operating
systems
 Virtual memory is an allocation of hard disk space to
help RAM
 We can use large softwares with less RAM using this
technique

Define the terms Data, Database, Database Management System (DBMS).

Data
Collection of Raw facts,
figures, observations.

Database
Collection of related data

DBMS
DBMS is a collection of programs that
enable users to create and maintain
data bases.
 Or simply it is a software to maintain
databases

DBMS
Terminology

Characters
Collection of Bits
i.e. 0s and 1s

6.

Field
Collection of characters

Record
Collection of fields

File
Collections of Records

Database
Collection of Files

What is BPM? Explain phases of BPM in detail.


Business Process Management (BPM)

Definition
It is methodology used by enterprises to improve end
to end business processes in various stages

1. Analysis Phase

Phases
An ERP application divides the BPM Process into 4 phases.

2. Design Phase

3. Implementation Phase

IPCC |35e |Flow charts_ Information Technology

4. Run & Monitor Phase

16

MASTER MINDS
7.

98851 25025 / 26

www.mastermindsindia.com

What is a Database model? Explain different types of Database models.


Database Model

A Database model determines the logical structure of a data


base i.e. how data is stored, organized and manipulated
Types

Hierarchical Model:

Network model

Relational model

 Records are logically organized into

 Modified version of hierarchical

 Represents database as








hierarchy of relationships
Records are arranged in inverted
tree pattern
Parent-child relationship between
records
Supports only one to one and one to
many relationships
Simple to understand
If parent node is deleted all Child
nodes get automatically deleted
Cannot support many-to-many
relationships






model
Supports all types of relations
one to one, one to many, many
to one, many to many
Relatively efficient
More flexible
But difficult to operate
Less user friendly,

collection of relations
 Relational database contains

multiple tables
 Easier to use
 Highly flexible
 Can handle queries in a more

efficient manner
 Storage requirements are high
 Requires more processing

capacity
 Primary key plays important role.

Object oriented model


 Objects are predefined set of program code that is used

to perform a specific task


 Based on concept of objects and their interactions
 Used to store complex data such as Images, audio video

Copyrights Reserved

To

MASTER MINDS , Guntur

etc.,
 Ex: CAD tools, Expert systems, Image processing

systems, Multimedia system etc.,

8.

List out the advantages & disadvantages of a DBMS?


DBMS










9.

Advantages
Reduced Data Redundancy
Program and file consistency
Data sharing
Integrity can be maintained
User friendly
Improved security
Data independence
Faster application development

Disadvantages
Cost: Implementing a DBMS may
be expensive, time consuming and
requires more training to users
Security: It is difficult to keep
unauthorized users away from
accessing the database

Explain what type of IT infrastructural is required for organization and discuss the risks
and issues of IT?
IT in Enterprises

Infrastructure required
An Enterprise should posses the following Infrastructure
Database access and changes software
File replication and backup software
Systems and event log monitoring
Job scheduling software
Application Integration
Printing & file transfers








Risks and Issues of IT


Greater need of controls
Checks to see whether business objectives
are met (or) not
Technology risks
In-depth knowledge in implementation and
operation are required

IPCC |35e |Flow charts_ Information Technology

17

MASTER MINDS
10.

98851 25025 / 26

www.mastermindsindia.com

Define the term computing. Explain five sub-disciplines of the computing?


Computing
Any goal oriented activity requiring, benefiting from or creating computers
Sub Disciplines

Computer Science
 Scientific and practical approach to
computation and its applications
 It studies the Internal working of the
computers

11.

Computer Engineering

Information System (IS)

Integrates
several
fields
of
Electronic
Engineering
and
computer science required to
develop hardware and software

The main aim is to support


operations
management
and
decision making in a business

Information technology (IT)

Software Engineering

IT encompasses not only computers and computer


networks but also other technologies like telephones
and television

It provides a systemic disciplined, quantifiable


approach to the development, design,
operation and maintenance of software

Describe about Instruction set Architecture (ISA).


CLASSIFICATION OF INSTRUCTION SETS

CISC
 Stands for Complex Instruction Set
Computing
 Ex .: Intel 386, 486, Pentium pro, PII, PIII
etc
 They are complex as well as expensive to
produce.
 Most PCs use CISC processors
 Variable length instructions i.e., each
instruction can use exactly the amount of
space it requires

12.

RISC
 Stands for Reduced Instruction Set
Computing
Ex: IBM RS6000, MC88100 processors
 Consume less power offers high
performance
 Less complex and less expensive
 Workstations uses RISC processors
 Fixed length instructions. i.e for each
instruction can occupies the same amount
of space, hence memory space is wasted

Explain different phases of SDLC?


Phase - V
System-maintenance and Review
 Examines the results of software
 Developed and modifies the
system according to the changing
needs

Phase - I
System Investigation:
 Examines what is problem
and is it worth solving
 Feasibility study is done.
SDLC
Development
life cycle
 Provides sequence of
activities to build an
Information system

Phase - II
System Analysis:
 Examines
what
must
the
Information system do to solve the
problem.
 Gathering details.
 Analyzing cost benefits.

 System

Phase - IV
System Implementation:
 Examines how will the solution be
put into effect
 Involves coding testing Installing
software

IPCC |35e |Flow charts_ Information Technology

Phase - III
System Design:
 Examines how will the Info.
System do, what it must do to
obtain solution to the problem.
 Designing of Hardware, software,
Inputs, outputs, etc.

18

MASTER MINDS
13.

98851 25025 / 26

www.mastermindsindia.com

Write about Machine Cycle?


1. Instruction Fetch
Fetch an Instruction from the
current Program
4. Write Back
Writes back the result and
go for another Instruction

2. Instruction Decode
Figures out what we actually
need to do

MACHINE CYCLE

3. Execution
Performs some operation

14.

Write briefly about Mobile Computing?


Mobile Computing

It Involves the use of portable computing devices i.e. laptops, PDA,


mobile phones, smart phones in combination with mobile technologies

Mobile Communication
 Infrastructure for seamless and
reliable communication
 Includes devices such as protocols,
services, bandwidth and profiles

Mobile Hardware
 Include laptops, Tabs, Phones,

PDAs
 They operate on full duplex mode

Business Applications
 Increase workforce productivity
 Offers any where any time access
 Improved customer service, latest Innovations in service
 Business process improvement
 Innovative opportunities for improving quality and efficiency

15.

Mobile Software
 Programs that run on mobile
hardware
 Main component or Engine of the
mobile device.

Concerns/Problems
 Security concerns
 Dangers of misrepresentation
 Power consumption
 Potential health hazards

Discuss about BPA?


Business Process Automation (BPA)

It involves removing the human Element from existing business by automating the
repetitive or standardized process components

Steps









Define why we plan BPA


Understand rules & regulations
Document the process
Define objectives to be achieved
Engage process consultant
Calculate ROI for project
Development of BPA
Test the BPA

Objectives
 Confidentiality
 Integrity
 Availability
 Timeliness

Activities
 Integration
 Orchestration


Automation

IPCC |35e |Flow charts_ Information Technology

Benefits of BPA
 Reduction of human error
 Easy transformation of data into
information
 Improves performance and
process effectiveness
 Making business more
responsive
 Improves information sharing and
collaboration

19

MASTER MINDS
16.

98851 25025 / 26

www.mastermindsindia.com

Explain major concepts in SDLC.


Technical Feasibility
Economic Feasibility

Feasibility study
Process of Evaluation alternative systems
through cost/benefit analysis

Legal Feasibility
Operational Feasibility
Schedule (or) Time Feasibility

Interviewing Staff
Fact finding techniques

Examine Current Business


Sending out
Questionnaires

Major Concepts
in SDLC

Observation of current
proceedings
Direct change over
Parallel Conversion
Conversion Methods
Phased Conversion
Pilot Conversion
Perfective Maintenance
System Maintenance
Types

Adaptive Maintenance
Corrective Maintenance

3. BUSINESS INFORMATION SYSTEMS


1.

Explain about the information system


Information System

Information
 Processing of data is known as
information
 Information
is
used
in
managerial decision making

System
System is a set of interrelated
components working together to
accomplish objectives

Role In business
 Helps in decision making
 Helps to Execute Innovative
Ideas
 Helps in solutions of complex
and critical problems
 Help to take right decisions at
right time
 To gain competitive advantage

IPCC |35e |Flow charts_ Information Technology

Information system
It is a combination of people
hardware, software, communication
devices, and networks to process
data and produce Information
Components

Storage

Input

Processing

Output

Feed Back

20

MASTER MINDS
2.

98851 25025 / 26

www.mastermindsindia.com

Explain who uses information system?


Who uses Information Systems?

Strategic Level
Includes CEOs, COOs,
Chair person etc.,
 System used: EIS

3.

Operational Level

Management Level /
Middle Level

Includes Middle Managers


like GM RM, ZM etc.,
 System used: MIS, DSS.

Knowledge level

Includes operational managers,


Supervisors responsible for day
to day operations
 System used: TPS

Knowledge and Data workers, who


are selected, recruited and trained
in a specified manner:
 System used: KWS, OAS

Explain different types of information system?


Types of information system

TPS

4.

MIS

DSS

EIS

OAS

KMS

Explain Transaction Processing cycle?

1. Data Entry

2. Transaction Processing
Batch
Online / Real time

4. Document &
Report Generation

5. Inquiry Processing
3. Database Maintenance

5.

Explain TPS?
Transaction Processing System (TPS)

Definition:
It is Information system that
collects, stores, modifies and
retrieves day to day transactions
of an enterprise
Eg.: ATM; IRCTC, Accounting
system

6.

TPS Attributes:
 Access control: Should restrict
un authorized access
 Equivalence: Transaction
should be in same format every
time
 High volume rapid processing of
transactions
 It should be robust and trust
worthy

TPS qualifiers:
 Atomicity: transaction should take
place in entirety
 Consistency: Should behave similarly
all the time
 Isolation : only one transaction at a
time
 Durability: Maintenance of logs
Once transactions are completed they
cannot be undone.

Explain SCM?
SCM

Definition
 Stands for Supply Chain Management
 Process of planning, implementing and
controlling the operations of the supply chain
with purpose to satisfy customer requirements.
 SCM cover from point-of-origin to point-ofconsumption

Characteristic features

Components:

 It integrates supply and demand

 Procurement

management within & across


companies
 SCM is a chain starts and ends

with customers

IPCC |35e |Flow charts_ Information Technology

 Operations
 Distribution
 Integration

21

MASTER MINDS
7.

98851 25025 / 26

www.mastermindsindia.com

Explain ERP?
Enterprise Resource Planning (ERP)

Definition

Advantages
 Powerful tool In hands of management

 An ERP system fully Integrates

 It organizes and integrates operating

Internal
and
External
Management Information across
Entire organization

processes
 Used

for
resources

 It covers functional areas of an

utilization

 ERP promises one database,

Enterprise
like
procurement,
Inventory,
production,
sales,
Logistics, finance, A/cs and HR

8.

optimum

of
one

application, one user interface


 Provides

competent
administration

and

efficient

Stages of ERP
 Inventory control
 ABC Analysis
 EOQ (Economic order quantity)
 Just-in-time (JIT)
 Material Requirement planning
 Manufacturing Resource planning
 Distribution Resource planning
 Enterprise Resource planning
 Money Resource planning
 EIS web Enabled

Explain CRM?
CRM

Definition
 Stands for Customer Relationship

Management
 It may be defined as process in

which client relationships, customer


loyalty and brand value are built
through marketing strategies and
activities.

9.

Benefits
 Generation of customer loyalty
 Raising a market Intelligence Enterprise
 Integrated relationship
 Preserving Existing customers
 Providing enhanced services
 Developing connection and affiliation
with customers

Architecture of CRM
Operational: Automation is provided to
the basic business processes
Analytical: Analyzes customs behavior
Collaborative: Ensures contacts with
customers like Phone, Email, Fax,
SMS etc

Discuss about DSS?


Decision Support System (DSS)

Definition




10.

It is a Computer Based
Information
System
that
supports
business
or
organizational
decision
making activities
DSS covers wide variety of
systems, tools & technologies

Benefits of DSS








Components

Improved decision quality


Cost reduction
Increased productivity
Increased communication
Timesaving
Improved customer
satisfaction






Users
Databases
Planning languages
Model base

Characteristics
 DSS
supports
management decision
making
 DSS solve unstructured
problems.
 Friendly
computer
Interface

Discuss about MIS & EIS?


MIS and EIS

MIS

EIS

 Used to develop Info for Managerial use

 It is a kind of DSS that is designed to meet the special

 It is an Integrated, user-machine system to provide

Information to support operation, management and decision


making functions
 It provides timely accurate, and meaningful data
 MIS solutions are accessible via web Browsers of Internet
Examples
 Logistics Management Application.
 ERP Softwares

needs of top revel managers


 It uses graphic displays
 It can access both Internal and External data sources
 Another name Executive Support System (ESS)

EIS components
 Hardware
 Software
 User Interface
 Telecommunication

IPCC |35e |Flow charts_ Information Technology

22

MASTER MINDS
11.

98851 25025 / 26

www.mastermindsindia.com

Explain Knowledge Management System?


Knowledge Management Systems

KMS
 Stands for Knowledge Management System
 It provides both Evident and hidden knowledge for

decision making
 It Enables Employees to have ready access to
organizations documented base of facts etc
 It is an Information repository
 It provide both Explicit and Tacit knowledge
Explicit knowledge Ex: online tutorials.
Tacit Knowledge Ex: Employee experience

12.

KDD
 Stands for Knowledge Discovery and Data mining
 It clears with ways and means of capturing and making
obtainable knowledge of the Experts to others in
electronic form
 It includes people from inside and outside of organization
 Importance of knowledge
Altering business surroundings
Burgeon connections
Globalization
Modification in organizational composition

Write about Core- Banking System (CBS)?


CORE Banking System (CBS)

Definition
 CORE stands for Centralized Online Real
time Environment
 It is a set of basic software components that
manage the services provided by a bank to its
customers through its branches

13.

Elements of Core banking


 Marking and servicing of loans
 Opening new accounts
 Processing payments and cheques
 Calculating Interest CRM etc.,
 Managing customer Accounts

Examples
 ATMS
 ONLINE Banking
 24x7 support
 Internet Banking etc.,

Explain HRMS, benefits and modules?


HRMS

Definition
 A Human Resource Management
System is a software application
that
unites
many
human
Resource functions which benefits
the management
 It is also called as HRIS i.e.,
Human Resource Information
System

14.

Benefits
 Brings Industry best practices to HR functions
 Utilizes HR potentials completely
 Reduce HR administrative costs
 Increases employee engagement and
satisfaction.
 Enhances data integrity within the Enterprise
 Enable to meet compliance and audit
requirement

Key Modules
 Work force management
 Time and attendance
management
 Payroll management
 Training management
 Compensation management
 Recruitment management
 Personnel management
 Organizational management
 Employee self service
 Analytics

What are various Business intelligence tools?


Business Intelligence Tools

Definition
A type of software that is
designed to retrieve analyze
and report data

Key tools
 Simple reporting and
querying
 Business Analysis
 Dash boards
 Score cards
 Data mining (or) Statistical
Data Analysis

IPCC |35e |Flow charts_ Information Technology

23

MASTER MINDS
15.

98851 25025 / 26

www.mastermindsindia.com

What is AIS? Explain key component of AIS?


AIS (Accounting Information System)
It is defined as a system of collection, storage and processing of
financial and accounting data that is used by decision makers.

Basic functions of AIS


Collect and store data.
Record transactions.
Safeguarding organizational
assets.

16.

Components of AIS

People

Procedure &
Instructions

Software

Data

IT
Infrastructure

Internal controls

Explain AI & Expert system?


AI & Expert Systems

AI:
 Stands for Artificial Intelligence
 Distinct area of computer science focusing
on creating machines that imitate aspects
of human behavior such as to reason,
communicate, see and hear.
 AI is manmade and level of activity
depends on the programming capability
Applications of A.I
Decision Support
Information Retrieval

Types of expert systems


Example based
Rule based
Frame based

Components :
1. User Interface
2. Inference Engine
3. Knowledge base
4. Knowledge acquisition
facility
5. Explanation facility
6. Database of facts

Advantages:

Cost Effective alterative to human
experts

Faster and do not get stressed out

Better quality and more consistent
decisions

Preserve the Expertise of an expert
leaving the organization

Limitations:

Costly and time consuming

Difficult to obtain knowledge from experts

Difficult to program commonsense of
human beings

Virtual Reality
Robotics

17.

Expert systems
It is a computerized Information system
that allows non-experts to make decisions
comparable to that of an Expert

Explain the importance of access and privilege controls?


Access and Privilege Controls

These controls help us to restrict whom and what accesses information resources

Functions
 Identity Management
 Authentication
 Authorization
 Accountability

Principle of least privilege


It means that we should give only
those privileges to a user account
which are essential to that users
work.

Approaches to Access controls


 Role-based Access control: Controls designed
based on user-role in the organization.
 Rules-based Access Control: It uses triggers to
govern rules of business to Enforce controls.

IPCC |35e |Flow charts_ Information Technology

24

MASTER MINDS
18.

98851 25025 / 26

www.mastermindsindia.com

Explain various payment mechanisms?


Payment Mechanisms

Credit Card:

Electronic Cheque:

 It is a plastic card

 It has all the features of paper

used for electronic


payment over
Internet.

Processing:
 Authorization
 Batching
 Clearing
 Funding

Electronic Purse:
 Another way to make payments over
Internet
 Very similar to prepaid card
 Validation is done through PIN
 No credit check or signature is needed

cheque
 It acts as a message to the

senders bank to transfer funds

Smart Card:
Smart Cards have an Embedded Micro Chip Instead of a Magnetic Strip.

Contact cards

Contactless cards

Combi / Hybrid cards

4. BUSINESS PROCESS AUTOMATION THROUGH APPLICATION SOFTWARE


1.

Explain different types of Business Applications


Types of Business Applications

Nature of Processing

Source of Application

Nature of Business

(The way an application


updates data)

(Tells the source from where


the application has been
bought)

(Emphasize on size and


complexity of Business
Process)

Batch Processing

In-house developed

Online
Processing

Purchased
application

Real time
Processing

2.

Functions Covered /
Nature of Application
(Based on business functions
it covers)

Accounting Application

Small Business

Cash Management

Medium Business

Manufacturing Application

Large Business

Leased

What are the applications based on nature of processing


Applications based on nature of processing

Batch processing
 In batch processing there is a time
delay in occurrence and recording of
transaction
Eg.:
Credit
card
statements,
Accounting, Stock Control statements
 Used by small business

3.

Real-time Processing

 Data is processed immediately while

 Input

it is entered
 Immediate result
Eg.: Cash Management Software
 Used by medium businesses

is
continuously
and
automatically acquired from sensors
Eg.: Pilot less air craft, Robots etc

 Used by large business

Differentiate between manual & computerized information processing cycle?

Manual Information Processing Cycle


Input

Online processing

Process

Computerized Information Processing Cycle


Storage

Output
Input

Processing

Output

Feed Back

IPCC |35e |Flow charts_ Information Technology

25

MASTER MINDS
4.

98851 25025 / 26

www.mastermindsindia.com

Explain the Business applications based on nature of applications?


Business applications based on nature of
Application

Accounting
Applications, Eg.:
Tally, Wings

5.

Office
Management
Software, Eg.:
MS Office

Compliance
Applications
Eg.: E-filing
software

CRM Software,
Eg.: SAP-CRM

Manageme
nt Support
Software,
Eg.: MIS

ERP software
Eg.: SAP

Product Life
Cycle
Management
Software

Logistics
Management
Software

Legal
Management
Software

Industry specific
software like
Tourism,
Automobile,
Banking, Pharma
software, Cinema
Ticketing software

What are information system controls?


Information System Controls

Definition:
Controls can be divided into two parts
Control is defined as polices procedures
practices that are designed to provide
reasonable assurance that business
objectives are achieved and undesired
Application Controls:
Managerial Controls:
Events are prevented or detected and
 Boundary controls
 Top management controls
corrected
 Input controls
 Information systems management controls
 Process controls
 System development management controls
 Output controls
 Programming management controls
 Communication controls
 Data Resource management controls
 Database controls
 Quality Assurance controls
 Security management controls
 Operations management controls.

6.

Explain Different types of Application Controls


Application Controls

Boundary controls:
To restrict the actions under taken by
users
Techniques:
 Cryptography
 Passwords
 PIN
 ID Cards / Plastic Cards
 Digital Signatures

Input controls:
Ensures accuracy and completeness
of data entered in to system
Techniques:
 Source document controls
 Data coding controls
 Batch controls
 Validation controls

Database controls:
Ensures data integrity in a data base
Eg.: Ensuring all records on files are processed
 Multiple Transactions for a single record in
the correct order

Output controls:
Ensures data redelivered trousers will be
present ell for matted and delivered manner
Eg.: Printing controls, Retention controls,
Existence Recovery controls, Storage and
Logging of sensitive and critical forms

Communication controls:
Ensure proper transmission of
data in network
Eg.: Physical Component
control, Line error control, Flow
and Link controls etc.

IPCC |35e |Flow charts_ Information Technology

Process controls:
Performs validation checks to identify
errors during processing
Eg.: Edit checks, run to run totals
checking,
Field
Initialization,
Reasonableness verification, etc.

26

MASTER MINDS
7.

98851 25025 / 26

www.mastermindsindia.com

Explain Different types of Managerial Controls


Managerial Controls

Top management
controls & Information
systems management
controls

System development
management controls

Functions
performed by
senior managers
1.
2.
3.
4.

Planning
Organizing
Leading
Controlling

Data Resource
management controls

Functions
Performed by
Senior Auditors

Functions
Performed by S/W
Developers

Concurrent Audit
Post implementation
Audit
General Audit

1. Planning
2. Designing
3. Coding
4. Testing
5. Operation &
Maintenance

Security Management Controls

Several Physical &


logical securities
measures applied

Functions Performed
by Resource Managers
1.Centralized data
security
2.Appointing Senior
Persons
3.Separating Duties
4.Maintaining Logs
5.Share data to right
persons

Quality Assurance management controls

Functions performed by
Security Administrators

8.

Programming
management controls

Operations management controls

Functions performed by
Quality Controllers

Functions performed by
Operations manager

Safety Critical systems


to improve the quality of
output like software

Responsible for daily


running of H/ W & S/W
resources

What are various Emerging technologies?


Emerging Technologies

Network virtualization
Allows a large physical network to
be provisioned Into Multiple
smaller logical network
Major Applications
 Server consolidation
 Disaster Recovery
 Testing and training
 Portable applications
 Portable work spaces

9.

Grid computing
 It is a form of distributed computing
 It is a computer network in which each
computers resources are shared with every
other computer in a communication system
Need:
 Civil Engineers need it
 Insurance companies need it
 Large-scale science & Engineering Applications
use it.
 A cheaper alternative to supercomputer

Cloud computing
 A cloud is a collection of

servers,
applications,
databases, documents,
agreements,
storage
capacity
etc.,
which
allow organizations to
share these resources
from anywhere.

What are the applications based in source of applications?


Types of Software Available

a)

b)

IPCC

Custom-built Application:
These applications can be
configured to meet a particular
companys requirements.
Example In house developed
Software such as Billing,
Inventory, and Attendance etc.

a)

b)

Packaged Software:
These
are
the
standard
applications which are not free
but are licensed. Customization
to suit business requirements
may or may not be allowed.
For Example -Tally, Oracle 9i.

|35e |Flow charts_ Information Technology

Leased application:
a)

Where user pays fixed rent


for using the application for
agreed terms.

b)

For Example
Systems

Cloud

27

MASTER MINDS
10.

98851 25025 / 26

www.mastermindsindia.com

Explain cloud computing in detail?


Cloud Computing

Service Models:
Cloud computing officers the following
services to users
 Software as service (Saas)
 Platform as a service (Paas)
 Infrastructure as a service (Iaas)
 Network as a service (Nass)
 Communication as a service (Caas)

Deployment Models:
Clouds can be divided based on
their deployment and usage
 Public clouds
 Private clouds
 Community clouds
 Hybrid clouds

Characteristics:
 Elasticity and scalability
 Pay per use
 On demand
 Resiliency
 Work load movement
 Multi Tenancy.

Advantages:
 Cost Efficient.
 Easy access to
Information.
 Unlimited Storage.
 Backup and recovery.
 Integration.
 Quick deployment

Disadvantages:
 Technical Issues.
 Security Issues.
 Prone to Attacks.

5. BUSINESS PROCESS MANAGEMENT & IT


1.

Explain typical life cycle of an accounting transaction?


LIFE CYCLE OF AN ACCOUNTING TRANSACTION
Source
Document

Journals

Financial
Statements

2.

Closing
Entries

Trial Balance

Ledger

Adjusted
Trial Balance

Adjustments

Explain typical life cycle of a sales transaction?


LIFE CYCLE OF SALES TRANSACTION
Customer
order

Recording

Reconciliation

3.

Shipping

Pick
Release

Invoice

Receipt

Explain typical life cycle of a Purchase transaction?


LIFE CYCLE OF PURCHASE TRANSACTION
Purchase
requisition

Payments

Request
for Quote

Quotation

Receipts

IPCC |35e |Flow charts_ Information Technology

Purchase
Order

28

MASTER MINDS
4.

98851 25025 / 26

www.mastermindsindia.com

Explain about Data Flow diagram?


Data flow Diagrams

Meaning
DFD is a graphical representation of the flow of
data through an information system.
Types of DFD: Physical data flow and logical
data flow

Major components
 Entity
 Process
 Data Store
 Data Flow

Symbols:
 Process  Attribute

(or)

 Entity

 Data Flow

Advantages:
 It aids in describing boundaries of system.
 Easy to recognize.
 Easy to communicate.
 Easy to understand.
 Displays flow of data in a system.

5.

(or)

Limitations:
 Creates little confusion
 Takes long time to create.
 Physical considerations
are left out.

Write short notes on Decision tables?


Decision Tables

Definition
 Tabular representation of program logic
 Displays all conditions and the
appropriate actions to be taken for set of
conditions
Model of Decision Table
Condition
stub(s)
Action stub(s)

6.

Advantages
 Easy to draw
 Simplicity
 Modularity
 Non-technical
 Compact
documentation

Limitations
 All programmers may not be
familiar with Decision tables.
 Sometimes flow charts may be
better
 Many not give complete picture of
the situation.

Condition Entries
Action Entries

Explain about E-R diagram?


E-R Diagrams

Meaning
An Entity-Relationship diagram is a data
modeling technique that creates a graphical
representation
of
the
entities
and
relationships between them.

Types of Relationships
 One to one (1:1)
 One to many (1:N)
 Many to one (M:1)
 Many to many (M:N)

Symbols:
 Entity  Attribute
 Key attribute

xyz

 Relationship -

Advantages:
 Simple and Easily understood
 Helps in Physical database creation
 Helps in database design.
 Gives high level description of system.

IPCC |35e |Flow charts_ Information Technology

Disadvantages:
 Ambiguities.
 Misinterpretations

29

MASTER MINDS
7.

98851 25025 / 26

www.mastermindsindia.com

Write short notes on Decision trees?


Decision Trees

Definition
It is a decision support tool that uses tree like
model of decisions and their possible
consequences, including chance, event
outcomes, resource costs and utility.

Advantages
 Simple to understand & interpret
 Possible scenarios can be added
 Worst, best and expected values
can be determined

Limitations
Becomes very complex if many
values are uncertain and/or if
many outcomes are linked.

MODEL OF DECISION TREE

8.

Write about Six Sigma model?


Six Sigma Model

Six Sigma Employs quality management and


statistical analysis of process outputs by
removing defects and minimizing variability in
manufacturing and business processes

9.

Phases:
 Define
 Measure
 Analyze
 Improve
 Control

Write about TQM model


TQM Model
(Incremental Approach)

It is a comprehensive and structured approach to


organizational management that seeks to
improve the quality of products and services
through ongoing refinements in response to
continuous feedback.

10.

Phases:
(i) Plan
(ii) Do
(iii) Check
(iv) Act

Write about Business Process Re-engineering?


BPR Model (Radical approach)

It is defined as the fundamental rethinking and


radical redesign of processes to achieve dramatic
improvement, in the terms of performance such as
cost, quality, service and speed.

IPCC

35e

|Flow charts_ Information Technology

Phases:
i) Fundamental rethinking
ii) Radical redesign
iii) Dramatic achievement

30

MASTER MINDS
11.

98851 25025 / 26

www.mastermindsindia.com

Write short note on Flowcharts.


Flowchart

Meaning
A flowchart is a diagram prepared by the
programmer of the sequence of steps
involved in solving a problem

Categories
 System outline
charts
 System flowcharts
 Run flowcharts
 Program flowcharts

Symbols:
 Start/End  Input / Output  Process  Decision box

Limitations:
 When logic is complex flow chart becomes
more complex.
 For modifications complete redrawing is
necessary.
 Reproduction in computers may be difficult.

Advantages:
 Effective Analysis
 Improved Communication.
 Helps in Documentation.
 Helps in coding.
 Helps in tracing bugs / errors.
 Quick grasp of relationships.

12.

Write about BPM Life cycle?


1. Analysis

5. Optimize

BPM Life Cycle


It establishes a sustainable process
management capability that Empowers
organization to Embrace and manage
process changes successfully.

2. Design
3. Implementation

4. Run & Monitor

13.

Explain the Benefits and Risks of IT in BPMS?


Benefits and Risks of IT in BPMS

Benefits:
 Automating repetitive business processes.
 Operational savings.
 Software can be made by loose coupling with
existing processes.
 Freeing up of employee time.
 Reduction
in
administration
involved
in
compliance and ISO activities.

Risks:
 Technological problems.
 Break down in gap analysis.
 Failure to identify future business needs.
 IT may be complicated or not flexible.
 Deficient project management.
 Limited options for customization.
 Inadequate assessment of need for change management.

Copyrights Reserved

To

MASTER MINDS , Guntur

THE END

IPCC

35e

|Flow charts_ Information Technology

31

CA - IPCC
COURSE MATERIAL
Quality Education
beyond your imagination...

PART B - 2 MARK QUESTIONS / DEFINITIONS

Cell: 98851 25025 / 26


Visit us @ www.mastermindsindia.com
Facebook Page: Masterminds For CA

Mail: mastermindsinfo@ymail.com
Youtube Channel: Masterminds For CA

Page 32

No.1 for CA/CMA & MEC/CEC

MASTER MINDS

1. TELECOMMUNICATIONS AND NETWORKS


A Category
1. Computer Network
It is a collection of computers and terminal devices
connected together by a communication system.
a) The set of computers may include large-scale
computers, medium scale computers, mini
computers and micro computers.
b) The set of terminals may include dumb
terminals, intelligent terminals and so on.
3. Protocol (SM, PM, RTP MAY-15)
It is a formal set of rules for communicating,
including rules for timing of message exchanges,
the types of electrical connections used by the
communications devices, error detection, and
means of granting access to communication
channels and so on.
5. Router (PM, RTP - NOV 14)
a) Router is a communication processor that
interconnects networks based on different
rules or protocols, so that a telecommunication
message can be routed to its destination.
b) Routers perform the "traffic directing" functions
on the Internet

a)

b)

a)

b)
c)
a)

b)

7. Multiplexer
(SM, PM, MTP-OCT 14, RTP-NOV 14)
It is a communications processor that allows a
single communications channel to carry
simultaneous data transmissions from many
terminals.
Typically,
a
multiplexer
merges
the
transmissions of several terminals at one end
of a communications channel, while a similar
unit separates the individual transmissions at
the receiving end.
9. MAN
MAN is a digital communication system which
interconnects different sites, computers and
user terminals that are spread over a
metropolitan city.
A Metropolitan Area Network is some where
between a LAN and a WAN.
Cable Television networks are best examples.
11. VPN (SM, NOV 14 2M, MTP MAY16)
It is a private network that uses a public
network to connect remote sites or users
together in a secured manner through a
firewall and other security features.
VPNs can be one of two types: Intranet-based
and extranet-based.

2. 3 tier C/S architecture (MAY15 2M)


a) Presentation Tier: Occupies the top level
and displays information related to services
available on a website.
b) Application Tier: Also called the middle tier. It
controls application functionality by performing
detailed processing.
c) Data Tier: Houses database servers where
information is stored and retrieved.
4. Telecommunication Control Software or
Telecommunications Software (SM)
It consists of programs that control and manage
the functions of telecommunication networks and
include Telecommunication Monitors, Network
Operating Systems, Network Management
Components and Communication Packages
6. Modem (SM, PM, MTP - MAY 16)
a) It is a device that converts a digital computer
signal into an analog signal (i.e. it modulates
the signal) and converts an analog signal into
a digital computer signal (i.e. it demodulates
the signal) in a data communication system.
b) Modems are generally classified by the
amount of data they can send in a given unit of
time, usually expressed in bits per second
8. Bridge (PM)
a) Bridge is a communication processor that
connects number of Local Area Networks
(LAN).
b) It magnifies the data transmission signal while
passing data from one LAN to another.

10. WAN (SM)


a) WAN is a digital communication system which
interconnects different sites, computers and
user terminals that are spread over a wide
area (a state, a country or even world wide).
b) It is a commercial data network that provides
data communication services for business and
government agencies.
12. LAN (SM)
A communications network that typically connects
computers, terminals, and other computerized
devices within a limited physical area such as an
office, building, manufacturing plant, or other work
site.

IPCC |35e |Fast Track Material in Information Technology

33

MASTER MINDS

98851 25025 / 26

13. Repeaters (PM, MTP-FEB 15)


a) Repeater is a communication processor that
boosts or amplifies the signal before passing it
to the next section of cable in a network.
b) A telephone repeater is an amplifier in a
telephone line, an optical repeater is an
optoelectronic circuit that amplifies the light
beam in a optical fiber cable; and a radio
repeater is a radio receiver and transmitter
that retransmits a radio signal.

14. HUB (PM)


a) It is
a port-switching
communication
processor. This allows for the sharing of the
network resources such as servers, LAN
workstations, printers, etc.
b) It has multiple input/output ports.
c) A hub works at the physical layer of the OSI
model.

15. Switches (PM, RTP-MAY 15)


a) It is a communication processor that makes
connections
between
telecommunication
circuits
in
a
network
so
that
a
telecommunication message can reach its
intended destination.
b) It is a temporary point to point connecting
device which can be able to transfer data from
source to intended destination.

17. TCP/IP (RTP-NOV 14)


a) TCP / IP is a protocol used on the Internet.
TCP/IP creates a packet-switching network.
b) TCP deals with exchange of sequential data.
IP handles packet switching and is used on
the Internet.

www.mastermindsindia.com

a)

b)

c)

a)
b)

16. Business Values of Extranet


(MAY15 2M)
Extranet enables a company to offer new
kinds of interactive web enables service to
their business partners.
Extranets enable and improve collaboration by
a business with its customers and other
business partners.
Extranet facilitates an online, interactive
product development, marketing and customer
focused process that can bring better
designed products to market faster.
18. Network Interface Card (PM)
NIC is a computer hardware component that
connects a computer to a computer network.
It has additional memory for buffering
incoming and outgoing data packets, thus
improving the network throughput.

19. Extranet (SM)

20. Intranet (SM, RTP-MAY 15)

a) Extranets are network links that use Internet


technologies to interconnect the Intranet of a
business with the Intranets of its customers,
suppliers, or other business partners.
b) It is part of companys intranet that is extended
to users outside the company.

a) An Intranet is a network inside an organization


that uses Internet technologies such as web
browsers and servers, TCP/IP network
protocols.
b) Intranet can also be used to facilitate working
groups, video conferencing and continuous
updating of company database.
c) Intranets is the main means of intra-office
communication.

21. Threat

22. Bandwidth (SM)

A threat is anything that can disrupt the operation,


functioning, integrity or availability of a network or
system. Network security threats can be
categorized into following four broad themes:
a) Unstructured threats
b) Structured threats
c) External threats
d) Internal threats

a) The capacity of a communications channel as


measured by the difference between the
highest and lowest frequencies that can be
transmitted by that channel.
b) It refers to a channels information carrying
capacity.
c) It is usually measured in terms of bits per
second (bps).

23. Vulnerability (MTP-FEB 15)

24. Cryptography
(MTP-SEP 14, RTP-MAY 15)

Vulnerability is an inherent weakness in the


design, configuration or implementation of a
network or system that renders it susceptible to a
threat.

Cryptography is the practice and study of


techniques for secure communication in the
presence of third parties. It deals with encryption
and decryption of data.

IPCC |35e |Fast Track Material in Information Technology

34

No.1 for CA/CMA & MEC/CEC

MASTER MINDS
a)

b)

a)

b)
c)

a)

b)

25. Firewalls (PM, RTP-NOV 14)


Firewall is a device that forms a barrier
(fence) between a secure and an open
environment.
It acts as a system or combination of systems
that enforces a boundary between more than
one networks.
27. Network Server (SM)
A network server is a computer system, which
is used as the central repository of data and
various programs that are shared by users in a
network.
LANs use a powerful microcomputer with a large
disk capacity as a file server or network server.
The server handles resource sharing and
telecommunications.
29. Hyper Text Transfer Protocol Secure
(MTP - FEB 15, OCT 14, MAY 16)
HTTPS is a communications protocol for
secure communication over a computer
network, with especially wide deployment on
the Internet.
The security of HTTPS uses long term public
and secret keys to exchange a short term
session key to encrypt the data flow between
client and server.

26. Electronic commerce (SM)


a) It is the process of doing business
electronically.
b) It involves automation of a variety of businessto-business
and
business-to-customer
transactions through reliable and secure
connections.
28. Server (SM, PM)
a) In client-server architecture, a server is a
computer Program running to serve the
requests of other Programs, called the clients
b) Typical computing servers are database
servers, file servers, mail servers, print
servers, web servers, game servers, and
application servers
30. Intrusion Detection System
(RTP-MAY 15)
a) An IDS is a device or software application that
monitors network or system activities for
malicious activities or policy violations and
produces reports to a Management Station.
b) The goal of is to monitor network assets to
detect anomalous behavior and misuse.

B Category
31. Telecommunications Processors (SM)
a) Telecommunications Processors support data
transmission and reception between terminals
and computers by providing a variety of control
and support functions.
b) Multiplexers, concentrators, communications
controllers, and cluster controllers are some of
the examples.

a)
b)

a)

b)
c)

33. Telecommunications Media (SM)


Telecommunications medium/media is a path
between the sender and the receiver that
carries the data in the form of signals.
They include, twisted- pair wire, coaxial
cables,
fiber
optic
cables,
terrestrial
microwave, communications satellite, cellular,
and infrared systems.
35. Secure Shell (SSH) (MTP-MAY 16)
Secure Shell is a program to log into another
computer over a network, to execute
commands in a remote machine, and to move
files from one machine to another.
It provides strong authentication and secure
communications over insecure channels.
SSH protects a network from attacks such as
IP spoofing, IP source routing, and Domain
Name System (DNS) spoofs.

IPCC

35e

32. Communication Satellites


(SM, MTP-MAY 16)
a) A satellite is some solar-powered electronic
device
that
receives,
amplifies,
and
retransmits signal.
b) They are used extensively for high-volume as
well as long-distance communication.
c) It is cost-effective method for moving large
quantities of data over long distances.
34. Simplex Connection: (MTP-SEP 14)
a) A simplex connection is a connection in which
the data flows in only one direction, from the
transmitter to the receiver.
b) This type of connection is useful if the data do
not need to flow in both directions (for
example, from your computer to the printer or
from the mouse to your computer.).
36. Scalability (SM)
a) Scalability is the ability of a system, network,
or process to handle a growing amount of
work in a capable manner or its ability to be
enlarged to accommodate that growth.
b) For example, it can refer to the capability of a
system to increase its total output under an
increased load when resources (typically
hardware) are added.

|Fast Track Material in Information Technology

35

MASTER MINDS

98851 25025 / 26

37. Resilience (RTP-NOV 15)

www.mastermindsindia.com
38. Routing (SM)

a) It refers to the ability of a network to recover


from any kind of error like connection failure,
loss of data etc.
b) Computer networking community defines
Resiliency
as
the
combination
of
trustworthiness
(dependability,
security,
performability) and tolerance (survivability,
disruption tolerance, and traffic tolerance)

a) Refers to the process of deciding on how to


communicate the data from source to
destination, in a network.
b) Routing schemes differ in their delivery
semantics: unicast, broadcast, multicast,
anycast, geocast.

39. Serial Transmission

40. Parallel Transmission

a) In serial transmission bits of each byte are


transmitted one after the other along a single
path. Example Serial port.
b) It can occur in any of the two ways Asynchronous & Synchronous transmission.

a) In this all the bits of each byte are transmitted


simultaneously i.e. each bit will have a unique
channel dedicated to it.
b) Example Parallel port being used for
printers.

41. Secure Socket Layer


(MTP SEP-15. MAY 16-2M)

42. Mobile Commerce (RTP-NOV 14)

a) It is essentially a protocol that provides a secure

channel between two machines operating over


the Internet or an internal network.
b) The SSL protocol is typically used when a web
browser needs to securely connect to a web
server over the inherently insecure Internet.
c) In practice, SSL is used to secure online credit
card transactions, system logins and any
sensitive information exchanged online, to
secure webmail and applications

a) M-Commerce

is about the explosion of


applications and services that are becoming
accessible from Internet-enabled mobile
devices.
b) M-commerce is the buying and selling of
goods and services through wireless handheld
devices such as cellular telephone and
Personal Digital Assistants (PDAs).

C Category
43. Network Architecture (SM)

44. Network Operating System (SM)

a) It refers to the layout of the network, consisting


of the hardware, software, connectivity,
communication protocols and mode of
transmission, such as wired or wireless.
b) The diagram of the network architecture
provides a full picture of the established
network with detailed view of all the resources
accessible.

a) An operating system oriented to computer


networking, to allow shared file and printer
access among multiple computers in a
network, to enable the sharing of data, users,
groups, security, applications, and other
networking functions.
b) It is a program that is used to control
telecommunications and the use of and
sharing of network resources.

45. Radio Waves (MTP-MAR 15)

46. Electronic Mail (e-mail) (SM)

a) Radio waves are an invisible form of


electromagnetic radiation that varies in
wavelength from around 1 millimeter to 1,00,
000kms.
b) These are commonly used transmission media
in Wireless Local Area Networks.

a) The computer-to-computer exchange of


messages in an electronic format through a
mail server.
b) Examples are Gmail, Yahoomail, Rediffmail,
Hotmail etc.

IPCC |35e |Fast Track Material in Information Technology

36

No.1 for CA/CMA & MEC/CEC

MASTER MINDS
47. Cryptographic Controls
(MTP MAY 16, MAY16 2M)

48. Micro Waves: (RTP- MAY 16)

a) Cryptographic Controls are designed to protect


the privacy of data and to prevent
unauthorized modifications of data.
b) Cryptography achieves this goal by scrambling
data into codes (cryptograms) so that it is
Meaningless to anyone who does not possess
the authentication to access the respective
system resource or file.

a) Microwaves are radio waves with wavelengths


ranging from as long as one meter to as short
as one millimeter, or equivalently, with
frequencies between 300 MHz (0.3 GHz) and
300 GHz.
b) These are used for communication, radar
systems, radio astronomy, navigation and
spectroscopy.

2. INFORMATION SYSTEMS AND IT FUNDAMENTALS


A Category
1. Information System (RTP-MAY 15)

2. Random Access Memory (RAM) (SM)

a) It is a set of interrelated components working


together to collect, retrieve, process, store and
disseminate (distribute) information for the
purpose of achieving objectives such as
planning, coordination, analysis and decision
making.
b) Generally called as Management Information
System (MIS) or Computer Based Information
System (CBIS).

a) This is Read Write memory.


b) Information can be read as well as modified
(i.e. write).
c) This is a Volatile memory. Volatile in nature
means Information is lost as soon as power is
turned off.
d) Types of RAMs: Dynamic RAM and Static
RAM

3. Read Only Memory (SM, RTP- MAY 16)

4. CPU (SM)

a) ROM is non-volatile in nature.


b) These are used to store small amount of
information for quick reference by CPU.
c) Information can be read not modified.
d) Generally used by manufacturers to store data
& Programs.

a) The brain of a computer, is the actual


hardware that interprets and executes the
program instructions and coordinates how all
the other hardware devices work together.
b) It consists of three functional units: Control
unit, Arithmetic Logical unit and Registers &
cache.

5. Direct Memory Access (DMA) (PM)

6. Registers (SM)

a) It is a feature of modern computers that allows


certain hardware subsystems within the
computer to access system memory
independently of the Central Processing Unit.
b) DMA can also be used for "memory to
memory" copying or moving of data within
memory. DMA can offload expensive memory
operations.

a) A processor often contains several kinds of


registers, that can be classified according to
their content or instructions that operate on
them.
b) These are high speed memory units within
CPU for storing small amount of data (mostly
32 or 64 bits) temporarily while performing
several Computations.

7. Non-Volatile Memory

8. Memory Controller (PM)

a) Some memory chips always retain the data


they hold even when the computer is turned
off.
b) This type of memory is called non-volatile.
(e.g. ROM).

a) It is a digital circuit which manages the flow of


data going to and from the computer's main
memory.
b) A memory controller can be a separate chip or
integrated into another chip.

IPCC |35e |Fast Track Material in Information Technology

37

MASTER MINDS

98851 25025 / 26

www.mastermindsindia.com

9. Application Software (MTP-SEP 14, MAY 16)

10. Volatile Memory

a) Computer software designed to help the user


to perform specific tasks.
b) Application software includes all those
computer software that cause a computer to
perform useful tasks beyond the running of the
computer itself.
c) It is designed for specific computer application.
For example, a program that prepares payroll
for a business is an application program.

a) The memory which loses their contents when


the computer's power is turned off. E.g. RAM
b) It requires constant power to maintain the
stored information. Volatile memory is typically
used only for primary storage.

11. System Software (SM)

12. Computer Bus (PM, MTP-FEB 15)

a) Computer (system) software designed to


operate the computer hardware and to provide
and maintain a platform for running application
software.
b) System software is essential for the
development of application software.
c) The purpose of system software is to insulate
the application programmer as much as
possible from the details of the computer.

A communication system that transfers data


between components inside a computer or
between computers that covers all related
hardware components (wire, optical fiber, etc.) and
software, including communication protocol.
a) Computer bus is also termed as System Bus.
b) Computer Bus = Address bus + Data bus +
Control bus

13. Multiprocessing (PM)

14. Electronic Data Interchange (EDI) (SM)

a) Multiprocessing is the use of two or more


Central Processing Units (CPUs) within a
single computer system to allocate tasks
between them.
b) In a multiprocessing system, all CPUs may
be equal, or some may be reserved for special
purposes. A combination of hardware and
operating
system
software
design
considerations determine the symmetry (or
lack thereof) in a given system.

a) The direct computer-to-computer exchange


between two organizations of standard
business transaction documents.
b) EDI can be formally defined as the transfer of
structured data, by agreed message
standards, from one computer system to
another without human intervention.

15. Cache Memory (SM, RTP-NOV 14)

16. Client/Server Networks (SM)

a) It is a memory that lies in the path between the


processor and the RAM, which a computer
microprocessor can access more quickly than
it can access regular RAM.
b) Cache depends on locality of reference that
improves effective memory access time in a
computer.

a) A computing environment where end user


workstations (clients) are connected to micro
or mini LAN (servers) or possibly to a
mainframe (super server).
b) Clients and servers exchange messages in
a requestresponse messaging pattern: The
client sends a request, and the server returns
a response. This exchange of messages is an
example of inter-process communication.

17. Machine Cycle

18. Computer Networks (SM,RTP-MAY 15)

a) Machine cycle = Fetch + Decode + Execute +


Store
b) Fetch and decode are done by Control Unit
(CU) whose job is to understand and explain
to Arithmetic Logic Unit (ALU). ALU is used to
execute and results are stored in Register.

a) It is a collection of computers and other


hardware interconnected by Communication
channel that allow sharing of resources and
information.
b) Each component, namely the computer or a
hardware device in a computer network is
called a 'Node'.
c) Used to exchange of data among different
computers and also used to share the
resources.

IPCC |35e |Fast Track Material in Information Technology

38

No.1 for CA/CMA & MEC/CEC

MASTER MINDS
19. Hardware Virtualization (PM)

20. Mobile Computing (SM)

a) Hardware
Virtualization
or
Platform
Virtualization refers to the creation of a virtual
machine that acts like a real computer with an
operating system.
b) Software executed on these virtual machines
is separated from the underlying hardware
resources.

a) It is the use of portable computing devices


(such as laptop and handheld computers), in
conjunction
(combination)
with
mobile
communications technologies, to enable users
to access the Internet and data on their home
or work computers, from anywhere in the
world.
b) It is enabled by use of mobile devices such as
PDA, laptops, mobile phones, smart phones,
tablet PC and Palmtops on a wireless network.

21. Smart Phone (SM)

22. Touchpad (SM)

a) A mobile phone built on a mobile operating


system, with more advanced computing
capability connectivity than a feature phone.
b) These handheld devices integrate mobile
phone capabilities with the more common
features of a handheld computer or PDA.
c) Modern devices include high-resolution touch
screens and web browsers for Internet
browsing.

a) It is a pointing device featuring a tactile


sensor, a specialized surface that can
translate the motion and position of a user's
fingers to a relative position on screen.
b) It is a common feature of laptop computers,
and also used as a substitute for a mouse
where desk space is limited.
c) These operate in one of several ways,
including capacitive sensing and conductance
sensing.

23. LAPTOP (NOTEBOOK) (SM)

24. Tablet (SM)

a) A small, portable computer and small enough


that it can sit on a lap.
b) Notebook (Laptop) is an extremely lightweight
personal computer.
c) Use flat-panel technologies, to produce a
lightweight and non- bulky display screen

a) A tablet computer, or simply tablet is a one


piece general-purpose computer contained in
a single panel. Its distinguishing characteristic
is the use of a touch screen as the input
device.
b) Modern tablets are operated by fingers, and a
stylus is an option, whereas earlier tablets
required a stylus.

25. Servers (Based on client/server


architecture) (SM)

26. Android (SM, MTP-MAR 15)

a) A server is a computer (Hardware) or device


on a network dedicated to serve the needs of
the users of other computers on a network.
b) Server performs some computational task on
behalf of clients. The clients either run on the
same computer, or they connect through the
network.

a) It is a Linux-based operating system designed


primarily for touch screen mobile devices such
as s and tablet computers.
b) It is open source software, which allows the
software to be freely modified and distributed
by device manufacturers, wireless carriers and
enthusiast developers.

27. I Pad

28. I Pod (MAY 16-2M)

a) It is a line of tablet computers designed and


which
runs
marketed
by Apple
Inc.,
Apple's iOS.
b) It has built-in Wi-Fi and cellular connectivity.
c) It can shoot video, take photos, play music,
and perform Internet functions such as webbrowsing and emailing. Other functions
games, reference, GPS navigation, social
networking, etc.can be enabled by
downloading and installing apps.

a) The iPod is a line of portable media players


designed and marketed by Apple Inc.
b) There are four current versions of the iPod: the
ultra-compact iPod Shuffle, the compact iPod
Nano, the touch screen iPod Touch, and the
hard drive-based iPod Classic.
c) iPods can serve as external data storage
devices. Storage capacity varies by model,
ranging from 2 GB to 160 GB.

IPCC |35e |Fast Track Material in Information Technology

39

MASTER MINDS

98851 25025 / 26

29. System Development Life Cycle


(SM, MAY 15-2M)

30. Primary Memory: (RTP-MAY 15)

a) It is a conceptual model used in project


management that describes the stages
involved
in
an
information
system
development project, from an initial feasibility
study through maintenance of the completed
application.
b) Phases are
System Investigation
System Analysis
System Designing

www.mastermindsindia.com

a) These are devices in which any location can


be accessed in any order (in contrast with
sequential order) directly by the CPU.
b) These are primarily of Two types: Random
Access Memory (RAM) and Read Only
Memory (ROM).

Copyrights Reserved

To

MASTER MINDS , Guntur

System Implementation
System Maintenance and Review

31. Virtual Memory


(SM, MTP-OCT 14, MAY 16, RTP- NOV 14)

32. Bluetooth
(SM, RTP-NOV 14,NOV 14 2M)

a) Virtual Memory is in fact not a separate device


but an imaginary memory area supported by
some operating systems (for example,
Windows) in conjunction with the hardware.
b) Virtual memory combines computers RAM
with temporary space on the hard disk.

a) Bluetooth is a wireless technology standard for


exchanging data over short distances up to 50
meters (164 feet) from fixed and mobile
devices, creating Personal Area Networks
(PANs) with high levels of security.
b) It is a feature which is used every day through
a number of compatible devices.

33. Operating System (SM, RTP-NOV 14)

34. WI-FI (SM, MTP-FEB 15)

a) OS is a set of computer Programs that


manages computer hardware resources and
acts as an interface with computer applications
Programs.
b) The operating system is a vital component of
the system software in a computer system.

a) Wi-Fi is a popular wireless networking


technology that uses radio waves to provide
wireless high-speed Internet and network
connections and have limited range.
b) Wi-Fi networks use radio technologies called
802.11 to provide secure, reliable, fast
wireless connectivity.
c) A Wi-Fi network can be used to connect
electronic devices to each other, to the
Internet, and to wired networks (which use
Ethernet technology).

B Category
35. Instruction Set Architecture (ISA)
(SM, MTP-SEP 14, RTP-MAY 15)

36. Micro architecture


(SM, MTP-OCT 14, MAY 16)

a) It is the abstract model of a computing system


that is seen by a machine language
programmer, including the instruction set,
memory address modes, processor registers,
and address and data formats.
b) The ISA basically deals with what the chip
does. It's a sort of 'bridge' between software
and hardware.

a) It, also known as Computer Organization. It is


a lower level detailed description of the system
that is sufficient for completely describing the
operation of all parts of the computing system,
and how they are inter-connected and interoperate in order to implement the ISA.
b) It is a term used to describe the resources and
methods used to achieve architecture
specification.

IPCC |35e |Fast Track Material in Information Technology

40

No.1 for CA/CMA & MEC/CEC

MASTER MINDS
37. Mobile Software: (RTP-NOV 15)

38. Mobile Hardware: (RTP-MAY 15)

a) Mobile Software is the actual program that


runs on the mobile hardware.
b) It deals with the characteristics and
requirements of mobile applications and is the
engine of that mobile device.
c) In other terms, it is the operating system of
that appliance.
d) It is the essential component that makes the
mobile device operates.

a) Mobile Hardware includes mobile devices or


device components that receive or access the
service of mobility.
b) They would range from Portable laptops,
Smart phones, Tablet PCs to Personal Digital
Assistants (PDAs).
c) These devices will have receptors that are
capable of sensing and receiving signals.
d) These devices are configured to operate in fullduplex, whereby they are capable of sending
and receiving signals at the same time.

39. Key benefits of BPA

(MAY 15-2M)

a) Reducing the Impact of Human Error


b) Transforming Data into Information
c) Improving
performance
and
process
effectiveness
d) Making users more efficient and effective
e) Making the business more responsive:
f) Improving Collaboration and Information
Sharing

40. Database model (SM)


a) A database model is a type of data model that
determines the logical structure of a database
and fundamentally determines in which
manner data can be stored, organized and
manipulated.
b) Examples are
 Hierarchical Database Model,
 Network Database Model,
 Relational Database Model, and
 Object oriented Database Model

41. Database Management Systems


(RTP MAY 16)

42. Primary Key: (MTP MAY 16)

a) (DBMS) are software that aid in organizing,


controlling and using the data needed by the
application program.
b) They provide the facility to create and maintain
a well-organized database. Applications
access the DBMS, which then accesses the
data.
c) Commercially
available
Data
Base
Management Systems are Oracle, My SQL,
SQL Servers and DB2 etc.

a) A key that can be used to uniquely identify a


row in a table is called a Primary Key.
b) Keys are commonly used to join or combine
data from two or more tables.
c) Keys are also critical in the creation of
indexes, which facilitate fast retrieval of data
from large tables.

C Category
43. Cathode-Ray Tube (CRT)

44. Liquid Crystal Display (LCDs)

a) A vacuum tube that uses an electron gun


(cathode) to emit a beam of electrons that
illuminate phosphors on a screen as the beam
sweeps across the screen repeatedly. A
monitor is often called a CRT
b) Here an Electron beam is controlled by
Horizontal and vertical plates/coils and are
focussed on the screen (Phosphor coated
screen).
c) The size of CRTs are huge and consume
more power than LCDs & LEDs.

a) A low-powered display technology used in


laptop computers where rod-shape crystal
molecules change their orientation when an
electrical current flows through them.
b) LCDs are used in a wide range of applications
including computermonitors,televisions, instru
ment panels, aircraft cockpit displays, clocks,
watches and calculators.
c) They consume very less power and are
portable to CRTs.

IPCC |35e |Fast Track Material in Information Technology

41

MASTER MINDS

98851 25025 / 26

www.mastermindsindia.com

45. Laser Printer

46. Ink-jet Printer

a) A printer that forms images using an


electrostatic process, the same way a
photocopier works.
b) Laser is the heart of these printers. A separate
CPU is built into the printer to interpret the
data and to control the Laser beam.
c) Laser printers can print alphanumeric
characters, high quality images, graphs, etc.

a) A printer that makes images by forcing ink


droplets through nozzles.
b) Here there is no direct contact between the
printers print head and paper.
c) These are generally used in Digital colour labs
for printing Photographs and images on a
specialized paper.
d) Types of Inkjet Printers: Liquid Inkjets and
Solid Inkjets.

47. Plotter

48. Speakers

a) A graph plotter is a device capable of tracing


out graphs, designs and maps onto paper and
even on plastic or metal plates. High degree of
accuracy can be achieved, even upto one
thousandth of an inch.
b) It is more software dependent than any other
peripheral device and it needs much more
instructions than a printer.

a) Speakers are general audio output devices;


contain small amplifiers to boost up the audio
information.
b) Speakers are connected to the sound card on
the motherboard.
c) Speakers contain a magnet which moves back
and forth with the changing current, creating
vibrations called sound.

3. BUSINESS INFORMATION SYSTEMS


A Category
1. Knowledge Management System
(SM, MTP-FEB 15)

2. System

a) The system is a set of mutually related,


a) KMS refer to a system for managing knowledge
coordinated elements or components that
in organizations for supporting creation,
operate together to accomplish objectives by
capture, storage and dissemination of
taking inputs and producing outputs in an
information.
organized manner.
b) It enables employees to have ready access to b) A system contains several subsystems
with sub
the organizations documented base of facts,
goals, all contributing to meet the overall
sources of information and solutions.
system goal.
3. Tacit knowledge
4. Atomicity

a) Tacit knowledge, resides in a few often-in just


one person and hasnt been captured by the a) Atomicity requires that each transaction is "all
organization or made available to others.
or nothing": if one part of the transaction fails,
the entire transaction fails, and the database
b) Tacit knowledge is unarticulated and
state is left unchanged.
represented as intuition, perspective, beliefs,
and values that individuals form based on their b) An atomic system must guarantee atomicity in
experiences.
each and every situation, including power
failures, errors, and crashes.
c) For example hand-on skills, special knowhow, employee experiences.
5. Online Analytical Processing (OLAP)
6. Analytical CRM (SM)
(SM, PM)
a) OLAP is a multi-dimensional analytical tool a) Analytical CRM comprises the analysis and
typically used in data mining, that gathers and
systematic evaluation of customer data using
process vast amounts of information into useful
business intelligence functions.
packets.
b) The aim is to filter out the key facts from
b) OLAP is part of the broader category of
gathered information and gain customer
business intelligence, which also encompasses
knowledge.
relational database, report writing and data
mining

IPCC |35e |Fast Track Material in Information Technology

42

No.1 for CA/CMA & MEC/CEC

MASTER MINDS
7. Durability

8. Model base
a) It is the brain of the Decision Support System.
Durability means that once a transaction has been b) It processes data with the help of data provided
committed or saved, it will remain so, even in the
by the user and the database.
event of power loss, crashes, or errors.
c) The analysis provided by model base is the key
for users decision.
9. MS Office Applications: (MTP-SEP 14)
10. Nucleus FinnOne: (MAY 16-2M)
a) FinnOne is a web-based global banking product
a) These are various office automation systems
designed to support banks and financial
made available by Microsoft Corporation which
solution companies in dealing with assets,
include MS Word, MS Excel, MS PowerPoint,
liabilities, core financial accounting and
MS Access, etc.
customer service.
b) Each of these software help to achieve b) The solution is wholly focused on banking and
automation of various tasks in the office.
financial services spanning across solutions in
c) It has features such as customized ribbon, back
the areas of Retail & Corporate Banking, Cash
stage view, built-in graphics toolset, enhanced
Management, Relationship Banking, Financial
security, etc.
CRM, Credit Risk & Appraisal, EAI, Internet
Banking, FX, Basel II, Data warehousing and
Analytics.
11. Credit Cards
12. Smart Cards (MTP-OCT 14, MAY 16)
a) A credit card is a plastic card issued by a
a) Smart cards have an embedded microchip
financial institution that allows its user to borrow
instead of magnetic strip.
pre-approved funds at the point of sale in order
b)
The chip contains all the information a magnetic
to complete a purchase.
strip contains but offers the possibility of
b) Credit cards have a credit limit -- the user can
manipulating
the
data
and
executing
borrow during a given period.
applications on the card.
c) The credit limit is pre-determined by the card
c) Three types of smart cards are Contact cards,
issuer based on the cardholder's credit rating
Contact-less and Hybrid cards.
and credit history
13. Enterprise Resource Planning System (SM)
14. Supply Chain Management
a) An ERP system is a fully integrated business
a) SCM is the process of planning, implementing
management system, covering functional areas
and controlling the operations of the supply
of an enterprise like Procurement, Inventory,
chain with the purpose to satisfy customer
Production,
Sales,
Logistics,
Finance,
requirements in an efficient way.
Accounting and Human Resources.
b) It covers all movements and storage of raw
b) It organizes and integrates operation processes
materials, work-in-process, and finished goods
and information flows to make optimum use of
from point-of-origin to point-of-consumption.
resources such as men, material, money and
c) It integrates supply and demand management,
machine, i.e. ERP is the way an Enterprise plans
within and across companies.
the optimum use of its resources.
15. Artificial Intelligence
16. Knowledge base
(SM, RTP-NOV 14, MTP-MAR 15)
a) AI is the distinct area of computer science
a) This includes data, knowledge, relationships,
focusing on creating machines that tries to
rules of thumb (heuristics) and decision rules
imitate aspects of human behavior, such as to
used by experts to solve a particular type of
reason, communicate, see, and hear.
problem.
b) AI software can use its accumulated knowledge
b) A knowledge base in a computer is equal to the
to reason and in some instances learn from
knowledge of an expert or group of experts
experience and thereby modify its subsequent
developed through years of experience in their
behavior.
field.
c) Expert systems, Pattern recognition, Natural
c) The knowledge base encloses both realistic
language processing, and many other areas
and heuristic knowledge.
where AI can be applied.

IPCC |35e |Fast Track Material in Information Technology

43

MASTER MINDS

98851 25025 / 26

www.mastermindsindia.com

17. Consistency

18. Isolation

Consistent state means that there is no violation of


any integrity constraints. If an integrity constraint
states that all transactions in a database must have
a positive value, any transaction with a negative
value would be refused.

Transactions must appear to take place in isolation


or individual. Isolation requires that multiple
transactions occurring at the same time not impact
each others execution.

19. Electronic purses

20. CRM (MTP-OCT 14)

a) Electronic purse is very similar to a pre-paid a) It includes the methodologies, technology and
card where funds can be directly deducted from
capabilities that help an enterprise to manage
the Card to vendors POS terminal.
customer relationships.
b) When the value on a card is spent, consumers b) Allows businesses to develop long-term
can load additional funds from their accounts to
relationships with established and new
the card.
customers, while helping to modernize
corporate performance.
c) Validation is done through a PIN.
21. Extensible Business Reporting Language
(PM, MTP-FEB 15, MTP-MAY 16)

22. Knowledge management (KM) (SM, PM)

a) XBRL
is
freely
available
international
a) It is the process of capturing, developing,
standards-based business reporting language
sharing, and effectively using organizational
developed by accountants for financial
knowledge.
reporting.
b) It refers to a multi-disciplined approach to
b) XBRL is a standards-based way to
achieving organizational objectives by making
communicate
and
exchange
business
the best use of knowledge.
information between business systems.
23. Explicit knowledge

24. Information (RTP-NOV 15)

a) Explicit knowledge is that which can be a) Processing of data is known as information


formalized easily and as a consequence is b) Data is a raw fact and can take the form of a
easily available across the organization.
number or statement, such as a date or a
b) For example Online tutorials, Policy and
measurement, which has some meaning.
procedural manuals.
25. Special Purpose Planning languages
(PM, MTP-MAY 16)

26. General Purpose Planning languages


(PM, MTP-MAY 16)

a) These allow users to perform many routine


tasks, retrieving various data from a database
a) These are more limited in what they can do, but
or performing statistical analyses.
they usually do certain jobs better than the
general purpose planning languages.
b) These languages enable user to tackle abroad
range of budgeting, forecasting and other
b) Some of the statistical languages such as SAS
worksheet-oriented problems.
and SPSS are examples.
c) Examples are Electronic spreadsheets.

B Category
27. Business Information System
(PM,RTP-NOV 14)

28. Transaction Processing System


(SM, MTP-OCT 14, MTP-MAY 16)

a) A TPS is a type of information system that


a) It is defined as system integrating business
collects, stores, modifies and retrieves the dayfunctions and information modules for
to-day data transactions of an enterprise.
establishing effective communication channels
which are useful for making timely and accurate b) TPS systems are designed to process
transactions instantaneously to ensure that
decisions
and
in
turn
contribute
to
customer data is available to the processes that
organizational productivity and competitiveness.
require it.
b) BIS may be defined as systems which integrate
c) TPS is also known as transaction processing or
information technology, people and business.
real time processing.

IPCC |35e |Fast Track Material in Information Technology

44

No.1 for CA/CMA & MEC/CEC

MASTER MINDS
29. Frame based Expert systems (SM)

30. Rule-based systems (SM)

a) Rule-based systems are created by storing data


Frame based systems organize all the information
and decision rules as if-then rules. The system
(data, description, rules etc.) about a topic into
asks the user questions and applied the if-then
rules to the answers to draw conclusions and
logical units called frames, which are similar to
linked records in data files. Rules are then
make recommendations
established about how to assemble or inter-relate b) Rule-based systems are appropriate when a
the frames to meet the users needs.
history of cases is unavailable or when a body
of knowledge can be structured within a set of
general rules.
31. Oracle's FLEXCUBE (SM)
32. Oracle FLEXCUBE Benefits (SM)
a) Oracle FLEXCUBE helps banks transform their Oracle FLEXCUBE empowers universal banks with:
business model from disparate operations a) Superior Web experience through self-service
towards centralization of key functions, such as
and assisted channels
accounting,
customer
information,
and
b) Improved bank staff productivity with intuitive,
management information.
role-based dashboards
b) The centralization of operations is further
augmented by role based dashboards that c) Comprehensive transaction banking capabilities
and Straight-Through-Processing (STP)
guide business users to take action on critical
tasks, track their pending activities, and get d) Improved risk management and reporting
insights into customer information and
interaction.
c) The application also provides comprehensive
product processing capabilities to cater to
various lines of business.

C Category
33. Business Process
(SM, PM, MTP-MAR 15)
A Business Process is a collection of related,
structured activities or tasks that produce a specific
service or product (serve a particular goal) for a
specific organization.

a)

b)

a)

b)

c)

35. Customer Relationship Management


Systems (SM)
Information systems that track all the ways in
which a company interacts with its customers
and analyze these interactions to optimize
revenue, profitability, customer satisfaction, and
customer retention.
These are specialized applications catering to
the need of organizations largely in FMCG
(Fast-Moving Consumer Goods) categories.
37.Old Pareto Rule 80/20 Rule - CRM
(SM,MTP-SEP 15)
Old Pareto Rule "80/20 rule" emphasizes that
most organizations find that approximately 20% of
their customer base generates 80% of the profits.
It is merely based on the philosophy that
indicates that old trustworthy customers are
most lucrative and helps in generating profits.
It is at the present imperative that businesses
make out the noteworthy characteristics of this
assemblage, keep hold of these exceedingly
desirable customers, and discover ways to
augment the size.

34. Desktop Publishing (SM, RTP MAY 16)


The Desktop Publishing systems are often
supported with laser printers, inkjet printers,
scanners and other such devices for producing
good quality documents. The desktop publishing
systems help in quick production of multiple copies
of the document with quality printing.
36.Strategic-Level Systems: (RTP-NOV 15)
a) These are the systems for strategic managers
to track and deal with strategic issues, assisting
in long-range planning.
b) A principle area is tracking changes in the
external conditions (market sector, employment
levels, share prices, etc.) and matching these
with the internal conditions of the organization.
38. Human Resources Management System

a) A software application that coalesce many


human resources functions, together with
benefits administration, payroll, recruiting and
training, and performance analysis and
assessment into one parcel.
b) HRMS refers to the systems and processes at
the intersection between Human Resource
Management and Information Technology.

IPCC |35e |Fast Track Material in Information Technology

45

MASTER MINDS

98851 25025 / 26

www.mastermindsindia.com

39. Infosys Finacle (SM)

40. Key Modules Of Finacle (SM)

a) Finacle
core
banking
solution
is
a
comprehensive, agile, componentized yet
integrated business solution, addressing all the
core needs of banks, in easy-to-configure
modules.
b) With a 360 degree single source view into
customer accounts, banks can empower
customers with relevant information an delight
them with the right offerings, presented at the
right time through the right channel.

a)
b)
c)
d)
e)
f)
g)
h)
i)
j)

Enterprise customer information


Consumer banking
Corporate banking
Trade finance
Customer analytics
Wealth management
Islamic banking
Payments
Origination &
Dashboards

41. Example-based Expert system (SM)


a) In Example-based Expert system, developers
enter the case facts and results.
b) Through induction the ES converts the
examples to a decision tree that is used to
match the case at hand with those previously
entered in the knowledge base.

4. BUSINESS PROCESS AUTOMATION THROUGH APPLICATION SOFTWARE


A Category
1. Business Process Automation
(SM, RTP-MAY 15, NOV 14-2M, MTP-MAY 16)

2. TALLY

a) Removing the human element from existing


business processes by automating the
repetitive
or
standardized
process
components.
b) The primary reasons for automation by
enterprises are: Cost Saving, remain
competitive, fast service to customers.
c) Objectives are Confidentiality, Integrity,
Availability, Timeliness.

a) It is an accounting application that helps entity


to automate processes relating to accounting
of transactions.
b) It also helps to achieve automation of few
processes in inventory management.
c) It has features such as Remote Access
Capabilities, Tax Audit and Statutory
Compliance,
Payroll,
Excise
for
Manufacturers, Multilingual Support, TDS,
VAT etc.

3. SAP R/3

4. Vehicle Tracking System

a) It is ERP software, which allows an entity to


integrate its business processes.
b) It has the features such as time management,
reporting and analytics, budget monitoring,
workflow approval, sales management, team
management, leave management, travel
management, recruitment management and
demand planning.

a) Applications allowing owner of goods to check


the temperature of cold stored goods while in
transit.
b) It has features such as GPS based location,
GPRS connection based real-time online datalogging and reporting, route accuracy on the
fly while device is moving, real-time vehicle
tracking, SMS & e-mail notifications etc.

5. Information Worker Software

6. Enterprise Infrastructure Software

Addresses individual needs required to manage


and create information for individual projects within
departments.
E.g.
Spreadsheets,
CAAT
(Computer Assisted Audit Tools), etc.

Provides capabilities required to support


enterprise software systems. E.g.: email servers,
Security software.

IPCC |35e |Fast Track Material in Information Technology

46

MASTER MINDS

No.1 for CA/CMA & MEC/CEC

7. File Management System

8. Educational Institute Management Systems

a) These allow office records to be kept in soft


copy and easy tracking of the same.
b) It has features such as web access, search,
Microsoft
office
integration,
records
management software, electronic forms (eforms), calendar, etc.

a) ICAI, itself is a good example of Educational


Institute Management Systems.
b) A student based on his/her registration
number can file many documents online
including exam forms.
c) It has features such as students registration,
students admission, fee collection, students
attendance, result management and result
analysis.

9. Real-time Processing

10. Network Virtualization (RTP-MAY 15)

a) Real time processing is a subset of interactive


or online processing. Input is continuously,
automatically acquired from sensors.
b) After the system is finished responding, it
reads the next set of input data immediately to
process that.
c) This system doesn't need a user to control it, it
works automatically.

a) It is the process of combining hardware and


software network resources and network
functionality into a single, software-based
administrative entity, a virtual network.
b) Allows a large physical network to be
provisioned into multiple smaller logical
networks.
c) This behavior allows administrators to improve
network traffic control, enterprise and security.

11. Grid Computing

12. Online Processing

a) It is a computer network in which each


computer's resources are shared with every
other computer in the system. It is a special
kind of distributed computing.
b) Processing power, memory and data storage
are all community resources that authorized
users can tap into and leverage for specific
tasks.
c) This system can be as simple as a collection
of similar computers or as complex as internetworked systems.

a) Data is processed immediately while it is


entered, the user usually only has to wait a
short time for a response. (Example: games,
word processing, booking systems).
b) Interactive or online processing requires a
user to supply an input.
c) It enables the user to input data and get the
results of the processing of that data
immediately.

13. Cloud Computing (SM, PM)

14. Input Controls

a) It is the delivery of computing as a service


rather than a product, whereby shared
resources, software, and information are
provided to computers and other devices as a
utility over a network (typically the Internet).
b) Clouds can be classified as public, private or
hybrid
c) The common cloud computing service models
are software as a Service (SaaS), Platform as
a Service (PaaS) and Infrastructure as a
service (IaaS).

a) These are responsible for ensuring the


accuracy and completeness of data and
instruction input into an application system.
b) These are important since substantial time is
spent on inputting data which involves human
intervention and are therefore prone to errors
and fraud

15. ERP Software

16. Access Controls (MTP-SEPT 14)

a) It is business management software that


allows an organization to use a system of
integrated applications to manage the
business.
b) used by entities to manage resources
optimally and to maximize the three Es i.e.
Economy, Efficiency and Effectiveness

a) Access controls are implemented with an


access control mechanism and links the
authentic users to the authorized resources
they are permitted to access.
b) Cryptography,
Passwords,
Personal
Identification Numbers (PIN) and Identification
Cards are some of the examples of access
controls.

IPCC |35e |Fast Track Material in Information Technology

47

MASTER MINDS

98851 25025 / 26

www.mastermindsindia.com

17. Output Controls

18. Batch Processing

a) These ensure that the data delivered to users


will be presented, formatted and delivered in a
consistent and secured manner.
b) Whatever the type of output, it should be
ensured that the confidentiality and integrity of
the output is maintained and that the output is
consistent.

a) It is defined as a processing of large set of

data in a specific way, automatically, without


needing any user intervention.
b) The data is first collected, and then batchprocessed, so all the collected data is
processed in one step.
c) Batched jobs can take a long time to process.

19. Middleware

20. Database Controls

Middleware that allow computers that are


connected on networks to communicate with each
other.

Protecting the integrity of a database when


application software acts as an interface to interact
between the user and the database are called the
update controls.

21. Software as a Service (SM, PM)

22. Virtualization (SM)

a) A software delivery method that provides


access to software and its functions remotely
as a Web-based service.
b) SaaS is a model of software deployment
where an application is hosted as a service
provided to customers across the Internet.
c) By removing the need to install and run an
application on a user's own computer

a) It is the process of creating logical computing


resources from available physical resources.
b) This is accomplished using virtualization
software to create a layer of abstraction
between workloads and the underlying
physical hardware.

B Category
23. Hardware virtualization (SM)
Hardware Virtualization or Platform Virtualization
refers to the creation of a virtual machine that acts
like a real computer with an operating system.
The basic idea of Hardware virtualization is to
consolidate many small physical servers into one
large physical server so that the processor can be
used more effectively.
25. Enterprise Software

Addresses an enterprises needs and data flow in


a huge distributed environment. E.g. ERP
Applications like SAP.

27. Business Application: (MTP-FEB 15)


a) Business Application is defined as a computer
program used to fulfill a persons need for
regular occupation or commercial activities like
keeping track of inventory levels, checking for
bank account balances, and all other business
activities. Business.
b) Applications may be classified on the basis of
Nature of processing, Source of application,
Nature of business and Functions covered
/nature of application.

24. Downsizing (SM)


Moving to smaller computing platforms, such as
from mainframe systems to networks of personal
computers and servers.

26. Data Processing Controls:


(MTP-MAR 15)
a) Data processing controls perform validation
checks to identify errors during processing of
data.
b) They are required to ensure both the
completeness and accuracy of the data being
processed.
Run-to-Run
Totals,
Reasonableness Verification, Edit Checks,
Field Initialization, Exception Reports and
Existence/Recovery Controls are some of the
examples of Data Processing Controls.
28. Error Handling in CBIS: (RTP- MAY 16)
This ensures that errors detected at any stage of
processing receive prompt corrective action and
are reported to the appropriate level of
management.

IPCC |35e |Fast Track Material in Information Technology

48

No.1 for CA/CMA & MEC/CEC

MASTER MINDS

30. Primary responsibilities of a Certificate


Authority (MTP-MAY16)

29. Digital Signatures (RTP- MAY 16)


Digital Signatures establish the authenticity of
persons and prevent the denial of messages or
contracts when data is exchanged electronically.

a) Positively identifying entities requesting


certificates;
b) Issuing, removing, and archiving certificates;
c) Protecting the Certificate Authority server;
d) Maintaining a namespace of unique names for
certificate owners;
e) Serving signed certificates to those needing to
authenticate entities; and
f) Logging Activity

31. Business Intelligence


(RTP-MAY 15, MTP- MAY 16)

32. Storage Virtualization: (MAY16-2M)

a) BI is a set of theories, methodologies,


architectures, and technologies that transform
raw data into meaningful and useful
information for business purposes.
b) BI, in simple words, makes interpreting
voluminous data friendly.
c) Making use of new opportunities and
implementing an effective strategy can provide
a competitive market advantage and long-term
stability.

a)

Storage virtualization is the apparent pooling


of data from multiple storage devices, even
different types of storage devices, into what
appears to be a single device that is managed
from a central console.
b) Storage virtualization helps the storage
administrator perform the tasks of backup,
archiving, and recovery more easily -- and in
less time -- by disguising the actual complexity
of a Storage Area Network

33. Network Virtualization: (SM, PM)


a) Network virtualization is a method of
combining the available resources in a
network by splitting up the available bandwidth
into channels, each of which is independent
from the others, and each of which can be
assigned (or reassigned) to a particular server
or device in real time.
b) This allows a large physical network to be
provisioned into multiple smaller logical
networks and conversely allows multiple
physical LANs to be combined into a larger
logical network.

C Category
34. Application Software Package (SM)

34. Virtual Organization (SM)

A set of prewritten, pre-coded application software


programs that are commercially available for sale
or lease.

Organization using networks to link people, assets


and ideas to create and distribute products and
services without being limited to traditional
organizational boundaries or physical location.

35. Customization (SM)


Modification of a software package to meet an
organization's unique requirements without
destroying the package software's integrity.

IPCC |35e |Fast Track Material in Information Technology

49

MASTER MINDS

98851 25025 / 26

www.mastermindsindia.com

5. BUSINESS PROCESS MANAGEMENT & IT


A Category
1. Process (RTP-NOV 14)

2. Process

(From General perspective)


(From Business perspective)
Process is a coordinated and standardized flow of Process is defined as a sequence of events that
activities performed by people or machines, which uses inputs to produce outputs.
can traverse functional boundaries to achieve a
business objective and creates value for internal or
external customers.
3. Process management

4. Business Process

a) It is a system of interlinked processes which


a) It consists of a set of activities that are
involves intensive efforts to map, improve and
performed in co-ordination in an organizational
adhere to organizational processes.
and technical environment.
b) It also performs the activities of planning and
b) These activities jointly realize a business goal.
monitoring the performance of a process.
5. Radical Redesign (SM)

6. Total Quality Management


(MTP-SEP 14, MTP-MAR 15, RTP-MAY 15)

a) This means getting down to the fundamental


a) It is the organization-wide effort to install and
where necessary throwing away the old, out of
make permanent a climate in which it
date rules and recognizing that quality and
continuously improves its ability to deliver highinnovation are more important to profit than
quality products and services to customer.
cost.
b) TQM is a comprehensive and structured
b) In a nutshell, a clean slate approach of BPR
approach to organizational management that
says that Whatever you were doing in the past
seeks to improve the quality of products and
is all wrong, do not get biased by it or
services through ongoing refinements in
reassemble, the new system is to be
response to continuous feedback.
redesigned afresh.
7. System flowchart (SM)

a) A tool for documenting a physical system in a)


which each component is represented by a
symbol that visually suggests its function.
b) System flowcharts, showing controls at a
b)
physical or resource level

9. Business Process Reengineering (SM)

8. Accounting Information System


(MTP-MAR 15)
An Accounting Information System (AIS) is
defined as a system of collection, storage and
processing of financial and accounting data that
is used by decision makers.
An accounting information system is generally a
computer-based method for tracking accounting
activity in conjunction with information
technology resources.
10. Entity-Relationship Diagrams
(RTP-NOV 15)

a) BPR is the fundamental rethinking and radical a) It is a data modeling technique that creates a
graphical representation of the entities, and the
redesign of processes to achieve dramatic
relationships between entities, within an
improvement,
in
critical,
contemporary
information system.
measures of performance such as cost, quality,
service and speed.
b) Entity is defined as a distinguishable object that
exists in isolation and is described by a set of
b) Business Process Re-engineering is also
attributes.
known as Business Process Redesign,
Business Transformation, or Business Process c) Relationship is the association among several
Change Management.
entities

IPCC |35e |Fast Track Material in Information Technology

50

No.1 for CA/CMA & MEC/CEC

MASTER MINDS
11. Data Flow Diagrams
(RTP-MAY 15, MAY 16)

12. Flowchart
(RTP-MAY 15)

a) A graphical representation of the flow of data a) It is diagram prepared by the programmer of the
through an information system. DFDs may be
sequence of steps involved in solving a
partitioned into levels that represent increasing
problem.
information flow and functional detail.
b) It defines the strategy and thread of logic
b) Major components: Process, Entity, Dataflow
followed in the program.
and Data store.
c) It is like a blueprint, in that it shows the general
plan, architecture, and essential details of the
proposed structure.
13. Decision Trees
(MTP-OCT 14, MAY 16)

14. Decision Table


(RTP-NOV 14,MTP-FEB 15)

a) It is a collection of a basis (condition) and a a) It is table which may accompany a flowchart


conclusion (action).
defining the possible contingencies that may be
considered within the program and the
b) It is a decision support tool that uses a tree-like
appropriate course of action for each
model of decisions and their possible
contingency
consequences,
including
chance
event
b) It is a tabular representation of program logic.
outcomes, resource costs, and utility
c) Displays all conditions and the appropriate
c) It is a one way to display an algorithm.
actions to be taken for set of conditions.
15. Six Sigma
(MTP-OCT 14, MAY 16, RTP-NOV 14,
MAY 16-2M)

16. Business Process Management (SM)

a) Six Sigma is a set of strategies, techniques, a) BPM is the methodology used by enterprises to
and tools for process improvement. It seeks to
improve end-to-end business processes in five
improve the quality of process outputs and
stages namely: design, modeling, execution,
minimizing inconsistency in manufacturing and
monitoring and optimization.
business processes.
b) BPM is defined as: The achievement of an
b) Objectives: reduce process cycle time, reduce
organizations
objectives
through
the
pollution, reduce costs, increase customer
improvement, management and control of
satisfaction, and increase profits.
essential business processes

B Category
17. Re-engineering (SM)

18. Value chain (MTP-FEB 15)

a) It is the fundamental rethinking and radical


redesign of business processes to achieve a) Value chain is defined as a chain of activities
dramatic improvements in critical, contemporary
that a firm operating in a specific industry
measures of performance, such as cost, quality,
performs in order to deliver a valuable product
service and speed.
or service for the market.
b) Re-engineering emphasized a holistic focus on b) The idea of the Value Chain is based on the
business objectives and how processes related
process view of organizations.
to them, encouraging full-scale recreation of
processes rather than iterative optimization of
sub-processes
19. Accounting (Or) Book keeping life cycle

20. Order to cash process flow (O2C)

a) It covers the business processes involved in a) It covers all the business processes relating to
recording and processing accounting events of
fulfilling customer requests for goods or
a company.
services.
b) It begins when a transaction or financial event b) It involves transactional flow of data from the
occurs and ends with its inclusion in the
initial point of documenting a customer order to
financial statements.
the final point of collecting the cash.

IPCC |35e |Fast Track Material in Information Technology

51

MASTER MINDS

98851 25025 / 26

21. Procure to pay


(purchase to pay or P2P) life cycle

www.mastermindsindia.com
22. Entity in DFD: (MTP-SEP 14,MAY 16 )

a) An entity represents the source or destination of


a) It covers all the business processes relating to
data and is often represented as rectangles (a
obtaining raw materials required for production
diagonal line across the right-hand corner in
of a product or for providing a service.
DFD.
b) It involves the transactional flow of data from b) Entities either provide data to the system
the point of placing an order with a vendor to
(Source) or receive data from it (Sink).
the point of payment to the vendor.
c) Entities are also referred to as agents,
terminators, or source/sink.
23. BPM lifecycle (SM)
24. Business Strategy:
a) It is a generic process optimization At the highest level, the strategy of the company is
methodology defined explicitly for business specified, which describes its long term concepts to
processes.
develop a sustainable competitive advantage in the
b) It provides a high-level approach from a phased market.
perspective
without
prescribing
specific
techniques such as those found in Six Sigma or
Lean.

Copyrights Reserved

To

MASTER MINDS , Guntur

THE END

IPCC |35e |Fast Track Material in Information Technology

52

CA - IPCC
COURSE MATERIAL
Quality Education
beyond your imagination...

PART C DIFFERENCES

Cell: 98851 25025 / 26


Visit us @ www.mastermindsindia.com
Facebook Page: Masterminds For CA

Mail: mastermindsinfo@ymail.com
Youtube Channel: Masterminds For CA

Page 53

No.1 for CA/CMA & MEC/CEC

MASTER MINDS

1. TELECOMMUNICATIONS AND NETWORKS


1.

Guided Vs. Unguided Media.

No

(PM)

Guided Media

Unguided Media

1.

Media that provide a conduit (channel) from Consists of a means for the data signals to travel
one device to another.
but nothing to guide them along a specific path.

2.

It uses a "cabling" system that guides the It passes through a vacuum; it is independent of a
data signals along a specific path.
physical pathway.

3.

Example Coaxial Cable, Twisted Pair, Example Infrared Waves, Micro Waves, Radio
Fiber Optic Cable.
Waves etc.

2.

No.
1.
2.
3.

Serial Transmission Vs. Parallel Transmission.


(SM, PM, MTP-SEP 14, MTP- APR 14, RTP MAY-15)
Serial Transmission
The data bits are transmitted serially one after
another.
Data is transmitted over a single wire and is
thus relatively slower.
It is a cheaper mode of transferring data.

Parallel Transmission
The data bits are transmitted simultaneously.

It is useful for long distance communications.

Not suited for long distance communications.

Data is transmitted over eight different wires and


is thus relatively faster.
It is relatively expensive mode of transferring
data.

4.

5.

3.

No.
1.

2.
3.

4.
4.

Synchronous Transmission Vs. Asynchronous Transmission.


(SM, PM, MTP-OCT 14, RTP- NOV 14)
Synchronous Transmission
Asynchronous Transmission
Allows characters to be sent down the Each data word is accompanied with start and stop
line without Start-Stop bits (control bits.
characters).
The synchronous device is more It is relatively cheaper.
expensive.
Chances of data loss are relatively higher. More reliable as the start and stop bits ensure that
the sender and the receiver remain in step with one
another.
It is more efficient.
It is relatively less efficient.
Differentiate Host Based & Network Intrusion Detection System.

(PM)

Network Based Intrusion Detection


System
Strong deterrence for insiders
Strong deterrence for Outsiders
Strong insider detection, weak outsider Strong outsider detection, weak insider
detection
detection
Host Based Intrusion Detection System

Deterrence
Detection

IPCC |35e |Fast Track Material in Information Technology

54

MASTER MINDS
Attack
Anticipation
Damage
Assessment
Response
Scope
Dependency
5.
No

98851 25025 / 26

www.mastermindsindia.com

Good at trending and detecting suspicious


behavior patterns
Excellent for determining extent of
compromise
Weak real-time response, good for long term
attacks
Narrow in scope, monitors specific activities
Host dependent

None
Very weak damage
Assessment capabilities
Strong response against
outsider attacks
Broad in scope
Host independent.

Client-Server architecture Vs Peer to Peer Architecture.


Client / Server

(PM, RTP-NOV 14)


Peer- to- Peer

1.

A client computer typically communicates with Every computer is equal and can communicate
servers, not with other clients.
with any other computer on the network to which it
has been granted access rights.

2.

A central server handles all security and file Each machine shares its own resources and
transactions.
handles its own security.

3.

It is more expensive as it requires a central file It is relatively less expensive as it does not
server, server software and client licenses.
require a dedicated machine, server software or
special client licenses.

4.

Backup is centralized on the server; managed Backup is decentralized; managed by users.


by network administrator. Backup devices and Backup devices and media are required at each
media required at server only.
workstation.

5.

The performance is relatively high as the server is The performance is relatively low.
dedicated and does not handle other tasks.

6.

In case of failure of server, the whole network No single point failure affects the network.
fails.

7.

C/S model relies on the power and stability of a P2P gives each workstation equivalent
single computer i.e., Server.
capabilities and relies heavily on the power and
bandwidth of each individual computer.

8.

Example Email, network printing, and the Example Napster, Gnutella, Freenet, Bit
World Wide Web.
Torrent and Skype.

6.

Star Network Vs. Ring Network.

No.
1.

Star Network
Here all nodes are connected to a central
computer/hub through dedicated cables.
Communication takes place between the
nodes through the hub/computer only.
A broken connection between hub/central
computer and node does not affect the rest of
the network.
Failure in the hub/central computer affects all
nodes connected to that hub.
The signal becomes weak when it has to travel
long distances. To avoid it, repeaters are
required to be used.
It is very easy to add/remove a node from the
network.

2.
3.

4.
5.

6.

(RTP-NOV 14)
Ring Network
Here all nodes are connected in the form of a
circular chain.
Communication takes place by each node to
receive and check for the message.
A broken connection between nodes leads to
failure of entire network.
Failure in one node does not affect the entire
system.
Repeaters are not needed. Every computer
acts as a repeater.
It is difficult to add/remove a node from the
system.

IPCC |35e |Fast Track Material in Information Technology

55

MASTER MINDS
7.

No.1 for CA/CMA & MEC/CEC

Transport Layer Vs. Network Layer of OSI Model.

(MTP FEB-15, MTP MAR-15)

Transport Layer:

Transport Layer or Layer 4 ensures reliable and transparent transfer of data between user processes,
assembles and disassembles message packets and provides error recovery and flow control.

Multiplexing and encryption are undertaken at this layer level. This means that the Layer can keep
track of the segments and retransmit those that fail.

Network Layer:

The Network Layer or Layer 3 provides the functional and procedural means of transferring variable
length data sequences from a source to a destination via one or more networks, while maintaining the
quality of service requested by the Transport Layer.

This Layer makes a choice of the physical route of transmission; creates a virtual circuit for upper
layers to make them independent of data transmission and switching; establishes, maintains,
terminates connections between the nodes and ensure proper routing of data.
8.

Half Duplex Mode Vs. Full Duplex Mode.

(RTP-NOV 15)

Half-Duplex Mode:

In Half-Duplex mode, (sometimes called an alternating connection or semi-duplex) the data flows in
one direction or the other, but not both at the same time.

This type of connection makes it possible to have bidirectional communications using the full capacity
of the line.

For example: Walkie Talkie.

In this, the entire capacity of a channel is taken over by whichever of the two devices is transmitting at
the time.

Full-Duplex Mode:

In Full-Duplex mode, the data flow in both directions simultaneously.

Each end of the line can thus transmit and receive at the same time, which means that the bandwidth
is divided in two for each direction of data transmission if the same transmission medium is used for
both directions of transmission.

For example: Mobile Phones.

In this, signals going in either direction share the capacity of the link wither by containing two separate
physical links (one for sending and the other for receiving) or by dividing the capacity of the channel
between signals travelling in opposite direction.
9.

Circuit Switching Vs. Packet Switching.

(RTP-NOV 15)

Circuit Switching:

A Circuit Switching network is one that establishes a fixed bandwidth circuit (or channel) between
nodes and terminals before the users may communicate, as if the nodes were physically connected
with an electrical circuit.

The route is dedicated and exclusive, and released only when the communication session terminates.
Circuit switching is what most of us encounter on our home phones. A single circuit is used for the
entire duration of the call.

Applications which use circuit switching go through three phases: Establish a Circuit, Transfer of data
and Disconnect the Circuit.

IPCC |35e |Fast Track Material in Information Technology

56

MASTER MINDS

98851 25025 / 26

www.mastermindsindia.com

Packet Switching:

It is a sophisticated means of maximizing transmission capacity of networks. Packet switching refers to


protocols in which messages are broken up into small transmission units called packets, before they
are sent.

Each packet is transmitted individually across the net. The packets may even follow different routes to
the destination.

Since there is no fixed path, different packets can follow different path and thus they may reach to
destination out of order.
10.

Presentation Layer Vs. Session Layer of OSI Model.

(RTP-NOV 15)

Presentation Layer:

This layer at times referred as Syntax Layer also, is usually a part of an operating system, that
converts incoming and outgoing data from one presentation format to another (for example, from a text
stream into a popup window with the newly arrived text).

The presentation service data units are then encapsulated into Session Protocol Data Units, and
moved down the stack. It further controls on screen display of data, transforms data to a standard
application interface.

Encryption, data compression can also be undertaken at this layer level.

Session Layer:

This layer sets up, coordinates, and terminates conversations, exchanges, and dialogs between the
applications at each end.

It deals with session and connection coordination. It provides for full-duplex, half-duplex, or simplex
operation, and establishes check pointing, adjournment, termination, and restart procedures.

The OSI model made this layer responsible for "graceful close" of sessions also.
11.

Hardware Encryption Vs. Software Encryption

(RTP-NOV 14)

Hardware Encryption:

Hardware Encryption devices are available at a reasonable cost, and can support high speed traffic.

If the Internet is being used to exchange information among branch offices or development
collaborators, for instance, use of such devices can ensure that all traffic between these offices is
secure.

Software Encryption:

Software Encryption is typically employed in conjunction with specific applications.

Certain electronic mail packages, for example, provide encryption and decryption for message
security.
12.

Difference between Public Data Network and Private Data Network

(RTP-MAY 15)

Public Data Network:


1. A Public Data Network is defined as a network shared and accessed by users not belonging to a
single organization.
2.

It is a network established and operated by a telecommunications administration, or a recognized


private operating agency, for the specific purpose of providing data transmission services for the
public.

3. The Internet is an example of a Public Data Network.

IPCC |35e |Fast Track Material in Information Technology

57

MASTER MINDS

No.1 for CA/CMA & MEC/CEC

Private Data Network:


1. Private Data Network provides businesses, government agencies and organizations of all sizes as a
dedicated network to continuously receive and transmit data critical to both the daily operations and
mission critical needs of an organization.
2. This is a network that is not available to the outside world.
3. The Intranet is an example of a Private Data Network.
13.

Difference between Thick client and Thin Client

(RTP - MAY 15)

Thick Client:

A Thick client is a client that performs the bulk of any data processing operations itself, and does not
necessarily rely on the server.

Unlike thin clients, thick clients do not rely on a central processing server because the processing is
done locally on the user system, and the server is accessed primarily for storage purposes.

For that reason, thick clients often are not well-suited for public environments. To maintain a thick
client, IT needs to maintain all systems for software deployment and upgrades, rather than just
maintaining the applications on the server.

For example Personal Computer.

Thin Client:

A Thin client uses the resources of the host computer.

A thin client generally only presents processed data provided by an application server, which performs
the bulk of any required data processing.

A thin client machine is going to communicate with a central processing server, meaning there is little
hardware and software installed on the user's machine.

A device using web application (such as Office Web Apps) is a thin client.
14.

Difference between Broadcast Networks and Switched Networks.

(RTP - MAY 15)

Broadcast Networks:

In Broadcast networks, data transmitted by one node is received by many, sometimes all, of the other
nodes.

This refers to a method of transferring a message to all recipients simultaneously.

For example a corporation or other voluntary association, that provides live television or recorded
content such as movies, newscasts, sports, public affairs programming, and other television programs
for broadcast over a group of radio stations or television stations.

Switched Networks

In switched-communication networks, the data transferred from source to destination is routed through
the switch nodes.

The way in which the nodes switch data from one link to another, as it is transmitted from source to
destination node, is referred to as a switching technique.

Three common switching techniques are Circuit Switching, Packet Switching, and Message Switching.
15.

Difference between C2B and C2C e-Commerce

(RTP - MAY 15)

Consumer-to-Business e-Commerce:

In C2B e-Commerce model, consumers directly contact with business vendors by posting their project
work online so that the needy companies review it and contact the consumer directly with bid.
IPCC

35e

|Fast Track Material in Information Technology

58

MASTER MINDS

98851 25025 / 26

www.mastermindsindia.com

The consumer reviews all the bids and selects the company for further processing. Some examples
are guru.com, rentacoder.com, getacoder.com, freelancer.com.

Consumer-to-Consumer e-Commerce:

C2C e-Commerce is an Internet - facilitated form of commerce that has existed for the span of history
in the form of barter, flea markets, swap meets, yard sales and the like.

C2C e-Commerce sites provide a virtual environment in which consumers can sell to one another
through a third-party intermediary.
16.

Ring Network Vs Mesh Network.

No.

Mesh Network

Ring Network

1.

In this structure, there is a random


connection
of
nodes
using
communication links.

In this topology, the network cable passes form one


node to another until all nodes are connected in the form
of loop or ring.

2.

A mesh network may be fully connected


or connected with only partial links

There is direct point to point link between 2


neighboring nodes and these links are unidirectional.

3.

The reliability is very high as there are


always alternate paths available if direct
link between two nodes is down.

Ring network can span longer distances than other


types of network

4.

Network problems
diagnose

to

Adding or removing computers can disrupt the


network.

5.

Cost of installation and maintenance is


high.

They offer high performance for a small number of


workstation or for larger networks where each
workstation has similar work load.

17.

Internet Vs. Intranet.

are

easier

No.

Internet

Intranet

1.

It is a global network of computer networks that


are formed by various educational, commercial,
Government,
non-profit
and
military
organizations.

It is a type of information system that


facilitates
communication
within
the
organization.

2.

This is not being developed and controlled by a


single person or organization.

It is developed and controlled by private


individuals and organizations.

3.

It is a public network. So, anybody can log into


the network and perform any action at his
choice.

It is a private network and access to private


individuals is restricted by passwords.

4.

Thousands of databases exist which can be


accessed and used by private individuals.

Only authorized persons are allowed to


access the data available in organizations
databases.

5.

An internet can be defined as a network of


networks.

An intranet can be a LAN or WAN that


belongs exclusively to a corporation.

6.

Any node can transmit a message to any other


node, along with communication channels, via the
intermediate nodes. Internet uses provides
Communication, Data Retrieval, Data publishing,
etc.

Several applications of Intranet include:


a. Supplier management
b. Inventory management
c. Distribution management
d. Channel management

7.

Acts as an information service to retrieve the


information worldwide.

Acts as an information service within the


organization.

IPCC |35e |Fast Track Material in Information Technology

59

No.1 for CA/CMA & MEC/CEC

MASTER MINDS

2. INFORMATION SYSTEMS AND ITS FUNDAMENTALS


1.
No.
1.

2.

RAM Vs. ROM.

(PM, RTP - NOV 15)

RAM
RAM is a volatile memory and when the
computer is turned off, RAM loses its data.
When the computer is turned on again,
operating system and other files are once again
loaded into RAM usually from the hard disk.
This is Read/Write memory wherein information
can be read as well as modified.

ROM
Unlike RAM, ROM is non-volatile. The
contents of ROM remain even after the
computer is switched off.

ROM used to be read-only; however, the


new versions of ROM allow limited rewriting
making it possible to upgrade firmware such
as the BIOS.

2.

Hierarchical Database Model Vs. Network Database Model.

No.
1.

Hierarchical Database Model


The hierarchical model permits a record to
be a member of only one set at one time.

2.

The hierarchical data structure implements


one-to-one and one-to-many relationships.

3.

Each parent record may have one or more


child records, but no child record may have
more than one parent record.
The hierarchical model does not represent
redundancy in data efficiently.

4.

5.

3.

The hierarchical data structures require


specific entrance points to find records in a
hierarchy.

(PM, MTP - FEB 15)

Network Database Model


Unlike the hierarchical mode, the network model
permits a record to be a member of more than
one set at one time.
The network model allows us to represent oneto-one,
one-to-many
and
many-to-many
relationships.
Each parent record may have one or more child
records, and even a child record may have more
than one parent record.
The network model is able to represent
redundancy in data more efficiently than in the
hierarchical model.
The network data structures can be entered and
traversed more flexibly.

CISC Vs. RISC.

(PM,RTP - NOV 14)

Complex Instruction Set Computer (CISC):


a) If the control unit contains a number of micro-electronic circuitry to generate a set of control signals
and each micro- circuitry is activated by a micro-code, this design approach is called CISC design.
b) Examples of CISC processors are: Intel 386, 486, Pentium, Pentium Pro, Pentium II, Pentium III
processors etc.
c) CISC chips have a large, variable length and complex instructions and generally make use of complex
addressing modes.
d) But at the same time, they are complex as well as expensive to produce.
e) Now-a-days, most of the personal computers use CISC processors.
Reduced Instruction Set Computer (RISC):
a) To execute each instruction, if there is separate electronic circuitry in the control unit, which produces
all the necessary signals, this approach of the design of the control section of the processor is called
RISC design. It is also called hard-wired approach.
b) Examples of RISC processors: IBM RS6000, MC88100 processors etc. RISC processors use a small
and limited number of instructions and mostly use hardwired control unit.

IPCC |35e |Fast Track Material in Information Technology

60

MASTER MINDS

98851 25025 / 26

www.mastermindsindia.com

c) These consume less power and have high performance.


d) However, RISC processors are faster, less complex and less expensive than CISC processors
because of their simpler design.
e) Now-a-days, most of the workstation computers use RISC processors.
4.

Primary Storage Vs. Secondary Storage.

No.

Primary Storage

Secondary storage

1.

Added to the system as a part and parcel of the


circuitry.

Added to the system as a supplementary to


primary storage.

2.

It is electronic in nature and is usually supplied


in the form of chips.

Magnetic or optical in nature and supplied in


the form of tapes and disks.

3.

Provides Random access to data.

Provides Sequential / direct access to data.

4.

Volatile i.e. its contents are lost when power is


lost.

Non-volatile i.e. it does not lose its contents


even when the power is lost.

5.

Low capacity.

High capacity.

6.

Fast access to data.

Slow access to data.

7.

High cost.

Low cost.

8.

Generally a computer consists of few MBs of


memory.

Generally a computer consists of few GBs to


TBs of memory.

5.

Difference between Hardware Resources and Software Resources

(RTP - MAY 15)

Hardware Resources:

These refer to Machines - computers, video monitors, magnetic disk drives, printers, optical scanners
and Media - floppy disks, magnetic tape, optical disks, plastic cards, paper forms.

Software Resources:

These refer to Programs - operating system programs, spreadsheet programs, word processing
programs, payroll programs and Procedures - data entry procedures, error correction procedures,
paycheck distribution procedures.
6.

Connection Oriented Network Vs. Connection less Network.

(RTP - MAY 16)

Connection Oriented Networks:


In connection oriented service, a connection is first established and then data is exchanged like it happens
in case of telephone networks.
When connection is established we send the message or the information and then we release the
connection.
Connectionless Networks:
In connectionless networks, the data is transferred in one direction from source to destination without
checking that destination is still there or not, or if it is prepared to accept the message.
Data which is being exchanged in fact has a complete contact information of recipient and at each
intermediate destination, it is decided how to proceed further like it happens in case of postal networks.
Example of Connectionless service is UDP (User Datagram Protocol).

IPCC |35e |Fast Track Material in Information Technology

61

No.1 for CA/CMA & MEC/CEC

MASTER MINDS

3. BUSINESS INFORMATION SYSTEMS


1.

Data Vs. Information.

No.

(PM)

Data

Information

1.

Data is raw and unorganized fact that When data is processed, organized, structured or
needs to be processed.
presented in a given context so as to make it useful, it
is called Information.

2.

Data in itself is meaningless and is the Information is the second level of knowledge.
lowest level of knowledge.

3.

Observations and recordings are done to


obtain data.

2.

Analysis of data is done to obtain information.

Role-based Access Control Vs. Rules-based Access Control.

(PM, RTP - MAY 15)

Role-based Access Control (RBAC):


a) RBAC largely eliminates discretion when providing access to objects. Instead, administrators or
automated systems place subjects into roles.
b) Subjects receive only the rights and permissions assigned to those roles.
c) RBAC uses a centrally administered set of controls to determine how subjects and objects interact.
When an employee changes jobs, all previous access is removed, and the rights and permissions of
the new role are assigned.
d) RBAC enforces static constraints based on a users role. It is the best system for an organization that
has high turnover.
Rules-based Access Control (RAC):
a) RAC takes into account the data affected, the identity attempting to perform a task, and other triggers
governed by business rules.
b) RAC uses specific rules that indicate what can and cannot happen between a subject and an object. A
manager, for example, has the ability to approve his/her employees hours worked.
c) However, when s/he attempts to approve his/her own hours, a rule built into the application compares
the employee record and the user, sees they are the same, and temporarily removes approval
privilege. It is not necessarily identity based.
3.

Explicit knowledge Vs. Tacit knowledge.

(PM, MTP-MAR 15, RTP-NOV 14, MAY15 - 4M)

Explicit knowledge:
a) Explicit knowledge is that knowledge which can be formalized easily and as a consequence is easily
available across the organization.
b) Explicit knowledge is articulated, and represented as spoken words, written material and compiled data.
c) This type of knowledge is codified, easy to document, transfer and reproduce.
d) For example - Online tutorials, Policy and procedural manuals.
Tacit knowledge:
a) Tacit knowledge, on the other hand, resides in a few often-in just one person and hasnt been
captured by the organization or made available to others.
b) Tacit knowledge is unarticulated and represented as intuition, perspective, beliefs, and values that
individuals form based on their experiences.
c) It is personal, experimental and context specific. It is difficult to document and communicate the tacit
knowledge.

IPCC |35e |Fast Track Material in Information Technology

62

MASTER MINDS

98851 25025 / 26

www.mastermindsindia.com

d) For example - hand-on skills, special know-how, and employees experiences.


4.

Information Vs. Knowledge.

(PM, RTP - NOV 14)

No.

Information

Knowledge

1.

Information
is
piecemeal,
fragmented and particular.

Knowledge is structured, coherent, and often universal.

2.

Information is timely, transitory, and


may even be short-lived.

Knowledge is of enduring significance.

3.

Information is a flow of messages.

Knowledge is a stock, largely resulting from the flow, in


the sense that the input of information may affect the
stock of knowledge by adding to it, restructuring it, or
changing it in any way.

4.

Information is acquired by being


told.

Knowledge can be acquired by thinking. Thus, new


knowledge can be acquired without new information being
received.

Difference between Strategic-Level Systems and Operational-Level Systems


(RTP - MAY 15)

5.

Strategic-Level Systems:

These systems are strategic managers to track and deal with strategic issues that assist in long-range
planning.

A principle area is tracking changes in the external conditions (market sector, employment levels,
share prices, etc.) and matching these with the internal conditions of the organization.

Operational-Level Systems:

Support operational managers tracking elementary activities. These can include tracking customer
orders, invoice tracking, etc.

Operational-level systems ensure that business procedures are followed.

4. BUSINESS PROCESS AUTOMATION THROUGH APPLICATION SOFTWARE


1.

Cloud Computing Vs. Grid Computing.

(SM, PM)

Cloud Computing:
a) Suited for any size of data storage
b) Suited for both standard or day to day and computational intensive tasks.
c) Very high uptime availability
d) Provide sharing of infrastructure and thus help to reduce cost.
Copyrights Reserved

Grid Computing:

To

MASTER MINDS , Guntur

a) Suited for big size of data storage


b) Suited for computational intensive tasks only.
c) Very high uptime availability
d) Provide sharing of infrastructure and thus help to reduce cost.
IPCC

|35e |Fast Track Material in Information Technology

63

No.1 for CA/CMA & MEC/CEC

MASTER MINDS

Manual Information Processing Cycle Vs. Computerized Information Processing Cycle.


(PM, MTP-OCT 14, MAY 16, RTP-NOV 14)

2.

No.

1.

2.

3.

3.

Manual Information
Processing Cycle
Systems where the level of manual
intervention is very high. For exampleEvaluation of exam papers, teaching and
operations in operation theatres.
Include following components:
a) Input: Put details in register.
b) Process: Summarize the information; and
c) Output:
Present
information
to
management in the form reports.

Input

Process

Computerized Information
Processing Cycle
Systems where computers are used at every
stage of transaction processing and human
intervention is minimal.
Include following components:
a) Input: Entering data into the computer;
b) Process: Performing operations on the
data;
c) Storage: Saving data, programs, or output
for future use; and
d) Output: Presenting the results.

Output

Infrastructure as a Service Vs Software as a Service

(RTP-NOV 14, RTP-NOV 15)

Infrastructure as a Service (IaaS):

IaaS delivers computer infrastructure on an outsourced basis to support enterprise operations.

Typically, IaaS provides hardware, storage, servers and data centre space or network components; it
may also include software.

Software as a Service (SaaS):

SaaS features a complete application offered as a service on-demand.

A service provider hosts the application at its data centre over the Internet and customer accesses it
via a standard Web browser.

For example - Google Apps.


4.

Differentiate Online Processing and Real Time Processing.

(MTP-MAR 15)

Online Processing:

Data is processed immediately while it is entered, the user usually only has to wait a short time for a
response. (Example: games, word processing, booking systems).

Interactive or online processing requires a user to supply an input.

Interactive or online processing enables the user to input data and get the results of the processing of
that data immediately.

Real-time Processing:

Real time processing is a subset of interactive or online processing.

Input is continuously, automatically acquired from sensors, for example, which is processed
immediately in order to respond to the input in as little time as possible.

After the system is finished responding, it reads the next set of input data immediately to process that.

Whenever there is a rapid reaction required due to some sort of change, real time processing can take
action without the need of a user.

Real time processing is used in warning systems on aircraft, alarm systems in hazardous zones,
burglar alarms etc.

IPCC |35e |Fast Track Material in Information Technology

64

MASTER MINDS
5.

98851 25025 / 26

www.mastermindsindia.com

Concurrent Audit Vs. General Audit.

(RTP-NOV 15)

Concurrent Audit:

In this, Auditors are members of the system development team.

They assist the team in improving the quality of systems development for the specific system they are
building and implementing.

General Audit:

In this, Auditors evaluate systems development controls overall.

They seek to determine whether they can reduce the extent of substantive testing needed to form an
audit opinion about managements assertions relating to the financial statements in systems
effectiveness and efficiency.
6.

Quality Assurance Management Vs. Security Management Controls.

(RTP-NOV 15)

Quality Assurance Management Controls:

Organizations are increasingly producing safety-critical systems and users are becoming more
demanding in terms of the quality of the software they employ to undertake their work.

Organizations are undertaking more ambitious information systems projects that require more
stringent quality requirements and are becoming more concerned about their liabilities if they produce
and sell defective software.

Security Management Controls:

Information security administrators are responsible for ensuring that information systems assets are
secure.

Assets are secure when the expected losses that will occur over some time are at an acceptable level.
7.

Software as a Service (SaaS) Vs. Platform as a Service (PaaS)

(RTP-MAY 15)

Software as a Service (SaaS):

Software as a Service (SaaS) features a complete application offered as a service on-demand.

A service provider hosts the application at its data centre over the Internet and customer accesses it
via a standard Web browser.

For example - Google Apps.

Platform as a Service (PaaS):

Platform as a Service (PaaS) delivery model allows a customer to rent virtualized servers and
associated services used to run existing applications, or to design, develop, test, deploy and host
applications.

The consumer may create software using tools and/or libraries from the provider. The consumer may
also control software deployment and configuration settings.

The provider provides the networks, servers, storage, and other services.

For example, AppScale allows a user to deploy some applications written for Google App Engine to
their own servers.
8.

Private Cloud Vs. Hybrid Cloud in Cloud Computing

(RTP-MAY 15)

Private Cloud:

This cloud computing environment resides within the boundaries of an organization and is used
exclusively for the organizations benefits.

These are also called internal clouds.

IPCC |35e |Fast Track Material in Information Technology

65

No.1 for CA/CMA & MEC/CEC

MASTER MINDS

They are built primarily by IT departments within enterprises who seek to optimize utilization of
infrastructure resources within the enterprise by provisioning the infrastructure with applications using
the concepts of grid and virtualization.

The benefit of a Private Cloud is that it enables an enterprise to manage the infrastructure and have
more control.

Hybrid Cloud:

It is maintained by both internal and external providers.

It is a composition of two or more clouds (Private, Community or Public). They have to maintain their
unique identity, but are bound together by standardized data and application portability.

With a hybrid cloud, organizations might run non-core applications in a public cloud, while maintaining
core applications and sensitive data in-house in a private cloud.

5. BUSINESS PROCESS MANAGEMENT & IT


1.

Functional Organization Vs. Process Organization.

Work Unit
Key Figure

Benefits

Weaknesses

Strategic
Value
2.

(SM)

Functional Organization
Department
Functional Executive
a) Focus on functional excellence.
b) Easier to implement.
c) Clear management direction

Process Organization
Team
Process Owner
a) Responsive to market requirements.
b) Improved
communication
and
collaboration
c) Performance measurements associated
with process goals.

a) Barrier to communication between


different functions.
b) Poor hand over between functions that
affect customer service.
c) Lack of end-to-end focus to optimize
organizational performance.
Supports cost leadership strategy.

a) Duplication of functional expertise.


b) Inconsistency of functional performance
between processes.
c) Increased operational complexity.
Supports differentiation strategy.

Flowchart Vs. Data Flow Diagram.

(SM,PM, NOV 14 - 2M)

Flow chart

Data Flow Diagram

Presents steps to complete a process.

Presents the flow of data.

Do not have any input from or output to an


external source.

It describes the path of data from an external


source to internal source or vice versa.

The timing and sequence of the process is aptly


shown by a flow chart.

Whether processing of data is taking place in a


particular order or several processes are taking
place simultaneously is described by a DFD.

shows how to make a system function.

Defines the functionality of a system.

Used in designing a process.

Used to describe the path of data that will


complete that process.

Types of Flow charts - System, Data, Document


and Program.

Types of DFDphysical data flow and logical


dataflow.

THE END

IPCC |35e |Fast Track Material in Information Technology

66

Anda mungkin juga menyukai