Escolar Documentos
Profissional Documentos
Cultura Documentos
COURSE MATERIAL
Quality Education
beyond your imagination...
BOOK NO. A9
FAST TRACK MATERIAL IN
INFORMATION TECHNOLOGY_35e
Score at least 20
marks with this
material
Page 1
INDEX FOR FAST TRACK MATERIAL IN INFORMATION TECHNOLOGY
Part A Flowcharts 4 – 31
Part C Differences 54 – 66
2
CA - IPCC
COURSE MATERIAL
Quality Education
beyond your imagination...
PART A – FLOWCHARTS
Page 3
MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com
COMPUTER NETWORK
Definition Purpose
Trends In telecommunication
Hub:
Switch: Bridge:
Used for Repeater: Router: Gateway:
Make temporary Used to connect
sharing of It boosts (or) Used to inter - Used to connect
connections various LANS
networks amplifies the connect networks networks of different
between Magnifies data
resources like signal based on different communication
telecommunication transmission
servers, rules or protocols architectures
circuits. signal
printers
LAN offers many benefits like data sharing and resources sharing in
addition it also offer the following benefits
Communication Media
Geometrical arrangement of Computer resources and other devices in a network, it determines how one
computer can communicate with other devices.
Data Transmission
Parallel: Serial:
All bits of each byte are transmitted simultaneously. Most commonly used method.
Eg.: Parallel port used for printers One bit at a time is transmitted along a single path
Eg.: Modem (or) mouse port.
Data can be transmitted at very high speed.
Very cheap
Crosstalk may occur. Suited for long distances transfer data in series i.e.
Expensive. slow transmission
Transmission modes
Switching Techniques
What is a Protocol? Explain the aspects defined by protocols? Explain the functions of
13.
protocols.
Protocols
Definition:
Protocols are set of rules for inter - computer communication
Protocols are software / programs that allow heterogeneous computers to transmit data
Network Architecture
Definition:
It is a layout of a network (full picture of the established network).
It discuss about hardware, software, connectivity, mode of transmission etc.,
The goal is to promote an open, simple, flexible and efficient telecommunications environment
Meaning
Protocol used in Internet is called TCP/IP
It consists of 5 layers which corresponds to 7 layers of OSI
model
Layers1/Physical layer
Provides physical transmission of data In network
17. Write about different models of networks and also describe about clients and servers?
Models of network
Multi-tier Architecture
19. What is a security program? (or) Write about network risks, controls and security?
Network Security
1. Unstructured threats:
Inexperienced and enthusiastic people will do
Ex: port scanning tools, address sweeping tools
No malicious Intention
Many tools are available in Internet
3. External threats:
Done by people outside of organization
Usually works on trail and error basis
Tries to Intrude from Internet or dial up servers.
Cryptography
Encryption Decryption
Encryption:
Process of Encoding messages.
Types
Software bugs:
Bug (or) error in software is a serious vulnerability
Timing windows:
Exploiting temporary files, Overwriting important data
Vulnerability
It is an inherent weakness In secure default configuration
in design, configuration or Using well known and easily guessed passwords can cause Vulnerability.
implementation of a
network or system that Bad protocols:
renders susceptible to a Using inefficient non-standard protocols may cause vulnerability.
threat
Trusting untrustworthy information:
Bad routing algorithms can cause network to connect to untrustworthy servers.
End-users:
Generally users of computer system who are not professionals and are not
security conscious.
Privacy:
There should be confidentiality.
Achieved by cryptography and encryption techniques.
Aspect 1
Non-Repudiation: Authentication:
Receiver must be able to prove that Aspect 4 Network Security: Aspect 2
Receiver is sure of the sender’s
a received message came from a Provisions made to protect the
identity that an imposter has not
specific sender and sender must network from threats.
sent the message.
not be able to deny sending it.
Aspect 3
Integrity:
Data must arrive at receiver end exactly as it was sent by sender.
No tampering should be done.
Functions of network
management
Fault Management:
F A fault is an event that has a negative significance.
Goal is to recognize isolate correct, and log faults in a network.
Configuration Management:
C Tracking and management of Network and system configuration
information.
Accounting Management:
A
Tracking network utilization information.
Performance Management:
P Measures network performance such as throughput, response time
packet loss rates, Error rate etc.
Security Management:
S
Managing network authentication, authorization, auditing of a usage
from both Internal and External Users.
29. What tools are available to protect the information in network against intrusion or misuse?
30. Write about Intrusion Detection System (IDS)? Explain Primary IDS technologies?
32. Define the Electronic Funds Transfer. State some examples of EFT systems in operation?
Information Systems
Define the term Application Software? Explain types and mention advantages and
2.
Disadvantages.
Application Software
Set of programs for performing useful tasks
Types
Application Suite Enterprise Software Enterprise Infrastructure Software Information Worker Software
Eg.: MS-Office, Star Office Eg.: SAP Eg.: Email sever, security Eg.: MS-Excel, CAAT etc
software , Antivirus software
Benefits
Addressing user needs Less threat from virus Regular updates licensed
Application software is Application software will
designed to suit the user needs The threat of virus infection to
have regular updates for
They are designed with a
custom-made applications is
various security reasons
specific purpose in mind. very small,
Disadvantages
Write about System Software in detail. (Or) What is an OS? Explain functions or activities
3.
performed by OS?
Magnetic tape
drives
RAM ROM Magnetic disk
• Volatile in nature • Non-volatile in nature drives (Ex: Hard
• Information can be read and write • Information cannot be modified disk, Floppy disk)
SPECIAL MEMORIES
DBMS
DBMS is a collection of programs that
enable users to create and maintain
Data data bases.
Collection of Raw facts, Database Or simply it is a software to maintain
figures, observations. Collection of related data databases
DBMS
Terminology
Definition Phases
It is methodology used by enterprises to improve end An ERP application divides the BPM Process into 4 phases.
to end business processes in various stages
1. Analysis Phase 2. Design Phase 3. Implementation Phase 4. Run & Monitor Phase
To MASTER MINDS , Guntur Used to store complex data such as Images, audio video
etc.,
Ex: CAD tools, Expert systems, Image processing
systems, Multimedia system etc.,
DBMS
Advantages
Disadvantages
Reduced Data Redundancy
Program and file consistency Cost: Implementing a DBMS may
Data sharing be expensive, time consuming and
Integrity can be maintained requires more training to users
User friendly
Improved security Security: It is difficult to keep
Data independence unauthorized users away from
Faster application development accessing the database
Explain what type of IT infrastructural is required for organization and discuss the risks
9.
and issues of IT?
IT in Enterprises
are met (or) not
Systems and event log monitoring
» Technology risks
Job scheduling software
Application Integration
» In-depth knowledge in implementation and
operation are required
Printing & file transfers
10. Define the term “computing”. Explain five sub-disciplines of the computing?
Computing
Sub Disciplines
CISC RISC
Stands for Complex Instruction Set Stands for Reduced Instruction Set
Computing Computing
Ex .: Intel 386, 486, Pentium pro, PII, PIII Ex: IBM RS6000, MC88100 processors
etc Consume less power offers high
They are complex as well as expensive to performance
produce. Less complex and less expensive
Most PC’s use CISC processors Workstations uses RISC processors
Variable length instructions i.e., each Fixed length instructions. i.e for each
instruction can use exactly the amount of instruction can occupies the same amount
space it requires of space, hence memory space is wasted
1. Instruction Fetch
Fetch an Instruction from the
current Program
3. Execution
Performs some operation
Mobile Computing
It involves removing the human Element from existing business by automating the
repetitive or standardized process components
Technical Feasibility
Economic Feasibility
Feasibility study
Process of Evaluation alternative systems
Legal Feasibility
through cost/benefit analysis
Operational Feasibility
Interviewing Staff
Sending out
Major Concepts Questionnaires
in SDLC
Observation of current
proceedings
Parallel Conversion
Conversion Methods
Phased Conversion
Pilot Conversion
Perfective Maintenance
Information System
Includes CEO’s, COO’s, Includes operational managers, Knowledge and Data workers, who
Chair person etc., Includes Middle Managers Supervisors responsible for day are selected, recruited and trained
System used: EIS like GM RM, ZM etc., to day operations in a specified manner:
System used: MIS, DSS. System used: TPS System used: KWS, OAS
2. Transaction Processing
4. Document &
1. Data Entry » Batch Report Generation
» Online / Real time
5. Inquiry Processing
3. Database Maintenance
5. Explain TPS?
6. Explain SCM?
SCM
7. Explain ERP?
8. Explain CRM?
CRM
MIS EIS
Used to develop Info for Managerial use It is a kind of DSS that is designed to meet the special
It is an Integrated, user-machine system to provide needs of top revel managers
Information to support operation, management and decision It uses graphic displays
making functions It can access both Internal and External data sources
Another name Executive Support System (ESS)
It provides timely accurate, and meaningful data
EIS components
MIS solutions are accessible via web Browsers of Internet Hardware
Examples Software
Logistics Management Application. User Interface
ERP Softwares Telecommunication
IPCC |35e |Flow charts_ Information Technology 22
MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com
11. Explain Knowledge Management System?
KMS KDD
Stands for Knowledge Management System Stands for Knowledge Discovery and Data mining
It clears with ways and means of capturing and making
It provides both Evident and hidden knowledge for
decision making obtainable knowledge of the Experts to others in
electronic form
It Enables Employees to have ready access to
It includes people from inside and outside of organization
organizations documented base of facts etc
Importance of knowledge
It is an Information repository
Altering business surroundings
It provide both Explicit and Tacit knowledge Burgeon connections
Explicit knowledge Ex: online tutorials. Globalization
Tacit Knowledge Ex: Employee experience Modification in organizational composition
HRMS
Limitations:
Virtual Reality Costly and time consuming
Difficult to obtain knowledge from experts
Robotics Difficult to program commonsense of
human beings
These controls help us to restrict whom and what accesses information resources
Payment Mechanisms
Processing:
Smart Card:
Authorization
Batching Smart Cards have an Embedded Micro Chip Instead of a Magnetic Strip.
Clearing
Funding
Storage
Input Process Output
Feed Back
Application Controls
Managerial Controls
Security Management Controls Quality Assurance management controls Operations management controls
Emerging Technologies
Cloud Computing
Advantages: Disadvantages:
Cost Efficient. Technical Issues.
Easy access to Security Issues.
Information. Prone to Attacks.
Unlimited Storage.
Backup and recovery.
Integration.
Quick deployment
Purchase
Payments Receipts Order
Data Flow -
Advantages: Limitations:
It aids in describing boundaries of system. Creates little confusion
Easy to recognize. Takes long time to create.
Easy to communicate. Physical considerations
Easy to understand. are left out.
Displays flow of data in a system.
Decision Tables
E-R Diagrams
Relationship -
Advantages: Disadvantages:
Simple and Easily understood Ambiguities.
Helps in Physical database creation Misinterpretations
Helps in database design.
Gives high level description of system.
Decision Trees
TQM Model
(Incremental Approach)
Phases:
It is defined as the fundamental rethinking and
radical redesign of processes to achieve dramatic i) Fundamental rethinking
improvement, in the terms of performance such as ii) Radical redesign
cost, quality, service and speed. iii) Dramatic achievement
Flowchart
Decision box
Advantages: Limitations:
Effective Analysis When logic is complex flow chart becomes
Improved Communication. more complex.
Helps in Documentation. For modifications complete redrawing is
Helps in coding. necessary.
Helps in tracing bugs / errors. Reproduction in computers may be difficult.
Quick grasp of relationships.
1. Analysis
Benefits: Risks:
Automating repetitive business processes. Technological problems.
Operational savings. Break down in gap analysis.
Software can be made by loose coupling with Failure to identify future business needs.
existing processes. IT may be complicated or not flexible.
Freeing up of employee time. Deficient project management.
Reduction in administration involved in Limited options for customization.
compliance and ISO activities. Inadequate assessment of need for change management.
Copyrights Reserved
THE END
Page 32
MASTER MINDS No.1 for CA/CMA & MEC/CEC
1. TELECOMMUNICATIONS AND NETWORKS
‘A’ Category
1. Computer Network 2. 3 – tier C/S architecture (MAY15 – 2M)
It is a collection of computers and terminal devices a) Presentation Tier: Occupies the top level
connected together by a communication system. and displays information related to services
a) The set of computers may include large-scale available on a website.
computers, medium scale computers, mini b) Application Tier: Also called the middle tier. It
computers and micro computers. controls application functionality by performing
b) The set of terminals may include dumb detailed processing.
terminals, intelligent terminals and so on. c) Data Tier: Houses database servers where
information is stored and retrieved.
4. Telecommunication Control Software or
3. Protocol (SM, PM, RTP MAY-15)
Telecommunications Software (SM)
It is a formal set of rules for communicating, It consists of programs that control and manage
including rules for timing of message exchanges, the functions of telecommunication networks and
the types of electrical connections used by the include Telecommunication Monitors, Network
communications devices, error detection, and Operating Systems, Network Management
means of granting access to communication Components and Communication Packages
channels and so on.
5. Router (PM, RTP - NOV 14) 6. Modem (SM, PM, MTP - MAY 16)
a) Router is a communication processor that a) It is a device that converts a digital computer
interconnects networks based on different signal into an analog signal (i.e. it modulates
rules or protocols, so that a telecommunication the signal) and converts an analog signal into
message can be routed to its destination. a digital computer signal (i.e. it demodulates
b) Routers perform the "traffic directing" functions the signal) in a data communication system.
on the Internet b) Modems are generally classified by the
amount of data they can send in a given unit of
time, usually expressed in bits per second
7. Multiplexer
8. Bridge (PM)
(SM, PM, MTP-OCT 14, RTP-NOV 14)
a) It is a communications processor that allows a a) Bridge is a communication processor that
single communications channel to carry connects number of Local Area Networks
simultaneous data transmissions from many (LAN).
terminals. b) It magnifies the data transmission signal while
b) Typically, a multiplexer merges the passing data from one LAN to another.
transmissions of several terminals at one end
of a communications channel, while a similar
unit separates the individual transmissions at
the receiving end.
9. MAN 10. WAN (SM)
a) MAN is a digital communication system which a) WAN is a digital communication system which
interconnects different sites, computers and interconnects different sites, computers and
user terminals that are spread over a user terminals that are spread over a wide
metropolitan city. area (a state, a country or even world wide).
b) A Metropolitan Area Network is some where b) It is a commercial data network that provides
between a LAN and a WAN. data communication services for business and
c) Cable Television networks are best examples. government agencies.
11. VPN (SM, NOV 14 – 2M, MTP – MAY16) 12. LAN (SM)
a) It is a private network that uses a public A communications network that typically connects
network to connect remote sites or users computers, terminals, and other computerized
together in a secured manner through a devices within a limited physical area such as an
firewall and other security features. office, building, manufacturing plant, or other work
b) VPNs can be one of two types: Intranet-based site.
and extranet-based.
IPCC |35e |Fast Track Material in Information Technology 33
MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com
24. Cryptography
23. Vulnerability (MTP-FEB 15)
(MTP-SEP 14, RTP-MAY 15)
Vulnerability is an inherent weakness in the Cryptography is the practice and study of
design, configuration or implementation of a techniques for secure communication in the
network or system that renders it susceptible to a presence of third parties. It deals with encryption
threat. and decryption of data.
IPCC |35e |Fast Track Material in Information Technology 34
MASTER MINDS No.1 for CA/CMA & MEC/CEC
25. Firewalls (PM, RTP-NOV 14) 26. Electronic commerce (SM)
a) Firewall is a device that forms a barrier a) It is the process of doing business
(fence) between a secure and an open electronically.
environment. b) It involves automation of a variety of business-
b) It acts as a system or combination of systems to-business and business-to-customer
that enforces a boundary between more than transactions through reliable and secure
one networks. connections.
27. Network Server (SM) 28. Server (SM, PM)
a) A network server is a computer system, which
a) In client-server architecture, a server is a
is used as the central repository of data and
computer Program running to serve the
various programs that are shared by users in a
requests of other Programs, called the ‘clients’
network.
b) Typical computing servers are database
b) LANs use a powerful microcomputer with a large
servers, file servers, mail servers, print
disk capacity as a file server or network server.
servers, web servers, game servers, and
c) The server handles resource sharing and
application servers
telecommunications.
29. Hyper Text Transfer Protocol Secure 30. Intrusion Detection System
(MTP - FEB 15, OCT 14, MAY 16) (RTP-MAY 15)
a) HTTPS is a communications protocol for
secure communication over a computer a) An IDS is a device or software application that
network, with especially wide deployment on monitors network or system activities for
the Internet. malicious activities or policy violations and
b) The security of HTTPS uses long term public produces reports to a Management Station.
and secret keys to exchange a short term b) The goal of is to monitor network assets to
session key to encrypt the data flow between detect anomalous behavior and misuse.
client and server.
‘B’ Category
32. Communication Satellites
31. Telecommunications Processors (SM)
(SM, MTP-MAY 16)
a) A satellite is some solar-powered electronic
a) Telecommunications Processors support data
device that receives, amplifies, and
transmission and reception between terminals
retransmits signal.
and computers by providing a variety of control
b) They are used extensively for high-volume as
and support functions.
well as long-distance communication.
b) Multiplexers, concentrators, communications
c) It is cost-effective method for moving large
controllers, and cluster controllers are some of
quantities of data over long distances.
the examples.
a) In serial transmission bits of each byte are a) In this all the bits of each byte are transmitted
transmitted one after the other along a single simultaneously i.e. each bit will have a unique
path. Example –Serial port. channel dedicated to it.
b) It can occur in any of the two ways - b) Example – Parallel port being used for
Asynchronous & Synchronous transmission. printers.
‘C’ Category
43. Network Architecture (SM) 44. Network Operating System (SM)
45. Radio Waves (MTP-MAR 15) 46. Electronic Mail (e-mail) (SM)
‘A’ Category
1. Information System (RTP-MAY 15) 2. Random Access Memory (RAM) (SM)
a) It is a feature of modern computers that allows a) A processor often contains several kinds of
certain hardware subsystems within the registers, that can be classified according to
computer to access system memory their content or instructions that operate on
independently of the Central Processing Unit. them.
b) DMA can also be used for "memory to b) These are high speed memory units within
memory" copying or moving of data within CPU for storing small amount of data (mostly
memory. DMA can offload expensive memory 32 or 64 bits) temporarily while performing
operations. several Computations.
a) Some memory chips always retain the data a) It is a digital circuit which manages the flow of
they hold even when the computer is turned data going to and from the computer's main
off. memory.
b) This type of memory is called non-volatile. b) A memory controller can be a separate chip or
(e.g. ROM). integrated into another chip.
a) It is a conceptual model used in project a) These are devices in which any location can
management that describes the stages be accessed in any order (in contrast with
involved in an information system sequential order) directly by the CPU.
development project, from an initial feasibility b) These are primarily of Two types: Random
study through maintenance of the completed Access Memory (RAM) and Read Only
application. Memory (ROM).
b) Phases are
• System Investigation
• System Analysis Copyrights Reserved
33. Operating System (SM, RTP-NOV 14) 34. WI-FI (SM, MTP-FEB 15)
‘B’ Category
35. Instruction Set Architecture (ISA) 36. Micro architecture
(SM, MTP-SEP 14, RTP-MAY 15) (SM, MTP-OCT 14, MAY 16)
a) Mobile Software is the actual program that a) Mobile Hardware includes mobile devices or
runs on the mobile hardware. device components that receive or access the
b) It deals with the characteristics and service of mobility.
requirements of mobile applications and is the b) They would range from Portable laptops,
engine of that mobile device. Smart phones, Tablet PC’s to Personal Digital
c) In other terms, it is the operating system of Assistants (PDAs).
that appliance. c) These devices will have receptors that are
d) It is the essential component that makes the capable of sensing and receiving signals.
mobile device operates. d) These devices are configured to operate in full-
duplex, whereby they are capable of sending
and receiving signals at the same time.
39. Key benefits of BPA (MAY 15-2M) 40. Database model (SM)
a) Reducing the Impact of Human Error a) A database model is a type of data model that
b) Transforming Data into Information determines the logical structure of a database
and fundamentally determines in which
c) Improving performance and process
manner data can be stored, organized and
effectiveness
manipulated.
d) Making users more efficient and effective
b) Examples are
e) Making the business more responsive:
Hierarchical Database Model,
f) Improving Collaboration and Information
Sharing
Network Database Model,
Relational Database Model, and
Object oriented Database Model
41. Database Management Systems
42. Primary Key: (MTP – MAY 16)
(RTP – MAY 16)
‘C’ Category
a) Removing the human element from existing a) It is an accounting application that helps entity
business processes by automating the to automate processes relating to accounting
repetitive or standardized process of transactions.
components. b) It also helps to achieve automation of few
b) The primary reasons for automation by processes in inventory management.
enterprises are: Cost Saving, remain c) It has features such as Remote Access
competitive, fast service to customers. Capabilities, Tax Audit and Statutory
c) Objectives are Confidentiality, Integrity, Compliance, Payroll, Excise for
Availability, Timeliness. Manufacturers, Multilingual Support, TDS,
VAT etc.
a) It is ERP software, which allows an entity to a) Applications allowing owner of goods to check
integrate its business processes. the temperature of cold stored goods while in
b) It has the features such as time management, transit.
reporting and analytics, budget monitoring, b) It has features such as GPS based location,
workflow approval, sales management, team GPRS connection based real-time online data-
management, leave management, travel logging and reporting, route accuracy on the
management, recruitment management and fly while device is moving, real-time vehicle
demand planning. tracking, SMS & e-mail notifications etc.
5. Information Worker Software 6. Enterprise Infrastructure Software
Addresses individual needs required to manage Provides capabilities required to support
and create information for individual projects within enterprise software systems. E.g.: email servers,
departments. E.g. Spreadsheets, CAAT Security software.
(Computer Assisted Audit Tools), etc.
‘C’ Category
34. Application Software Package (SM) 34. Virtual Organization (SM)
A set of prewritten, pre-coded application software Organization using networks to link people, assets
programs that are commercially available for sale and ideas to create and distribute products and
or lease. services without being limited to traditional
organizational boundaries or physical location.
35. Customization (SM)
Modification of a software package to meet an
organization's unique requirements without
destroying the package software's integrity.
a) BPR is the fundamental rethinking and radical a) It is a data modeling technique that creates a
redesign of processes to achieve dramatic graphical representation of the entities, and the
improvement, in critical, contemporary relationships between entities, within an
measures of performance such as cost, quality, information system.
service and speed. b) Entity is defined as a distinguishable object that
b) Business Process Re-engineering is also exists in isolation and is described by a set of
known as Business Process Redesign, attributes.
Business Transformation, or Business Process c) Relationship is the association among several
Change Management. entities
‘B’ Category
17. Re-engineering (SM) 18. Value chain (MTP-FEB 15)
a) It is the fundamental rethinking and radical
redesign of business processes to achieve a) Value chain is defined as a chain of activities
dramatic improvements in critical, contemporary that a firm operating in a specific industry
measures of performance, such as cost, quality, performs in order to deliver a valuable product
service and speed. or service for the market.
b) Re-engineering emphasized a holistic focus on b) The idea of the Value Chain is based on the
business objectives and how processes related process view of organizations.
to them, encouraging full-scale recreation of
processes rather than iterative optimization of
sub-processes
19. Accounting (Or) Book keeping life cycle 20. Order to cash process flow (O2C)
a) It covers the business processes involved in a) It covers all the business processes relating to
recording and processing accounting events of fulfilling customer requests for goods or
a company. services.
b) It begins when a transaction or financial event b) It involves transactional flow of data from the
occurs and ends with its inclusion in the initial point of documenting a customer order to
financial statements. the final point of collecting the cash.
Copyrights Reserved
THE END
PART C – DIFFERENCES
Page 53
MASTER MINDS No.1 for CA/CMA & MEC/CEC
1. TELECOMMUNICATIONS AND NETWORKS
1. Guided Vs. Unguided Media. (PM)
5. It is useful for long distance communications. Not suited for long distance communications.
Transport Layer:
• Transport Layer or Layer 4 ensures reliable and transparent transfer of data between user processes,
assembles and disassembles message packets and provides error recovery and flow control.
• Multiplexing and encryption are undertaken at this layer level. This means that the Layer can keep
track of the segments and retransmit those that fail.
Network Layer:
• The Network Layer or Layer 3 provides the functional and procedural means of transferring variable
length data sequences from a source to a destination via one or more networks, while maintaining the
quality of service requested by the Transport Layer.
• This Layer makes a choice of the physical route of transmission; creates a virtual circuit for upper
layers to make them independent of data transmission and switching; establishes, maintains,
terminates connections between the nodes and ensure proper routing of data.
Half-Duplex Mode:
• In Half-Duplex mode, (sometimes called an alternating connection or semi-duplex) the data flows in
one direction or the other, but not both at the same time.
• This type of connection makes it possible to have bidirectional communications using the full capacity
of the line.
• For example: Walkie Talkie.
• In this, the entire capacity of a channel is taken over by whichever of the two devices is transmitting at
the time.
Full-Duplex Mode:
• In Full-Duplex mode, the data flow in both directions simultaneously.
• Each end of the line can thus transmit and receive at the same time, which means that the bandwidth
is divided in two for each direction of data transmission if the same transmission medium is used for
both directions of transmission.
• For example: Mobile Phones.
• In this, signals going in either direction share the capacity of the link wither by containing two separate
physical links (one for sending and the other for receiving) or by dividing the capacity of the channel
between signals travelling in opposite direction.
Circuit Switching:
• A Circuit Switching network is one that establishes a fixed bandwidth circuit (or channel) between
nodes and terminals before the users may communicate, as if the nodes were physically connected
with an electrical circuit.
• The route is dedicated and exclusive, and released only when the communication session terminates.
Circuit switching is what most of us encounter on our home phones. A single circuit is used for the
entire duration of the call.
• Applications which use circuit switching go through three phases: Establish a Circuit, Transfer of data
and Disconnect the Circuit.
10. Presentation Layer Vs. Session Layer of OSI Model. (RTP-NOV 15)
Presentation Layer:
• This layer at times referred as Syntax Layer also, is usually a part of an operating system, that
converts incoming and outgoing data from one presentation format to another (for example, from a text
stream into a popup window with the newly arrived text).
• The presentation service data units are then encapsulated into Session Protocol Data Units, and
moved down the stack. It further controls on screen display of data, transforms data to a standard
application interface.
• Encryption, data compression can also be undertaken at this layer level.
Session Layer:
• This layer sets up, coordinates, and terminates conversations, exchanges, and dialogs between the
applications at each end.
• It deals with session and connection coordination. It provides for full-duplex, half-duplex, or simplex
operation, and establishes check pointing, adjournment, termination, and restart procedures.
• The OSI model made this layer responsible for "graceful close" of sessions also.
Hardware Encryption:
• Hardware Encryption devices are available at a reasonable cost, and can support high speed traffic.
• If the Internet is being used to exchange information among branch offices or development
collaborators, for instance, use of such devices can ensure that all traffic between these offices is
secure.
Software Encryption:
• Software Encryption is typically employed in conjunction with specific applications.
• Certain electronic mail packages, for example, provide encryption and decryption for message
security.
12. Difference between Public Data Network and Private Data Network (RTP-MAY 15)
13. Difference between Thick client and Thin Client (RTP - MAY 15)
Thick Client:
• A Thick client is a client that performs the bulk of any data processing operations itself, and does not
necessarily rely on the server.
• Unlike thin clients, thick clients do not rely on a central processing server because the processing is
done locally on the user system, and the server is accessed primarily for storage purposes.
• For that reason, thick clients often are not well-suited for public environments. To maintain a thick
client, IT needs to maintain all systems for software deployment and upgrades, rather than just
maintaining the applications on the server.
• For example – Personal Computer.
Thin Client:
• A Thin client uses the resources of the host computer.
• A thin client generally only presents processed data provided by an application server, which performs
the bulk of any required data processing.
• A thin client machine is going to communicate with a central processing server, meaning there is little
hardware and software installed on the user's machine.
• A device using web application (such as Office Web Apps) is a thin client.
14. Difference between Broadcast Networks and Switched Networks. (RTP - MAY 15)
Broadcast Networks:
• In Broadcast networks, data transmitted by one node is received by many, sometimes all, of the other
nodes.
• This refers to a method of transferring a message to all recipients simultaneously.
• For example – a corporation or other voluntary association, that provides live television or recorded
content such as movies, newscasts, sports, public affairs programming, and other television programs
for broadcast over a group of radio stations or television stations.
Switched Networks
• In switched-communication networks, the data transferred from source to destination is routed through
the switch nodes.
• The way in which the nodes switch data from one link to another, as it is transmitted from source to
destination node, is referred to as a switching technique.
• Three common switching techniques are Circuit Switching, Packet Switching, and Message Switching.
15. Difference between C2B and C2C e-Commerce (RTP - MAY 15)
Consumer-to-Business e-Commerce:
• In C2B e-Commerce model, consumers directly contact with business vendors by posting their project
work online so that the needy companies review it and contact the consumer directly with bid.
Consumer-to-Consumer e-Commerce:
• C2C e-Commerce is an Internet - facilitated form of commerce that has existed for the span of history
in the form of barter, flea markets, swap meets, yard sales and the like.
• C2C e-Commerce sites provide a virtual environment in which consumers can sell to one another
through a third-party intermediary.
2. Hierarchical Database Model Vs. Network Database Model. (PM, MTP - FEB 15)
5. Difference between Hardware Resources and Software Resources (RTP - MAY 15)
Hardware Resources:
• These refer to Machines - computers, video monitors, magnetic disk drives, printers, optical scanners
and Media - floppy disks, magnetic tape, optical disks, plastic cards, paper forms.
Software Resources:
• These refer to Programs - operating system programs, spreadsheet programs, word processing
programs, payroll programs and Procedures - data entry procedures, error correction procedures,
paycheck distribution procedures.
6. Connection Oriented Network Vs. Connection less Network. (RTP - MAY 16)
2. Role-based Access Control Vs. Rules-based Access Control. (PM, RTP - MAY 15)
3. Explicit knowledge Vs. Tacit knowledge. (PM, MTP-MAR 15, RTP-NOV 14, MAY15 - 4M)
Explicit knowledge:
a) Explicit knowledge is that knowledge which can be formalized easily and as a consequence is easily
available across the organization.
b) Explicit knowledge is articulated, and represented as spoken words, written material and compiled data.
c) This type of knowledge is codified, easy to document, transfer and reproduce.
d) For example - Online tutorials, Policy and procedural manuals.
Tacit knowledge:
a) Tacit knowledge, on the other hand, resides in a few often-in just one person and hasn’t been
captured by the organization or made available to others.
b) Tacit knowledge is unarticulated and represented as intuition, perspective, beliefs, and values that
individuals form based on their experiences.
c) It is personal, experimental and context specific. It is difficult to document and communicate the tacit
knowledge.
Strategic-Level Systems:
• These systems are strategic managers to track and deal with strategic issues that assist in long-range
planning.
• A principle area is tracking changes in the external conditions (market sector, employment levels,
share prices, etc.) and matching these with the internal conditions of the organization.
Operational-Level Systems:
• Support operational managers tracking elementary activities. These can include tracking customer
orders, invoice tracking, etc.
• Operational-level systems ensure that business procedures are followed.
Cloud Computing:
a) Suited for any size of data storage
b) Suited for both standard or day to day and computational intensive tasks.
c) Very high uptime availability
d) Provide sharing of infrastructure and thus help to reduce cost.
Copyrights Reserved
Grid Computing: To MASTER MINDS , Guntur
a) Suited for big size of data storage
b) Suited for computational intensive tasks only.
c) Very high uptime availability
d) Provide sharing of infrastructure and thus help to reduce cost.
IPCC |35e |Fast Track Material in Information Technology 63
MASTER MINDS No.1 for CA/CMA & MEC/CEC
Manual Information Processing Cycle Vs. Computerized Information Processing Cycle.
2.
(PM, MTP-OCT 14, MAY 16, RTP-NOV 14)
Online Processing:
• Data is processed immediately while it is entered, the user usually only has to wait a short time for a
response. (Example: games, word processing, booking systems).
• Interactive or online processing requires a user to supply an input.
• Interactive or online processing enables the user to input data and get the results of the processing of
that data immediately.
Real-time Processing:
• Real time processing is a subset of interactive or online processing.
• Input is continuously, automatically acquired from sensors, for example, which is processed
immediately in order to respond to the input in as little time as possible.
• After the system is finished responding, it reads the next set of input data immediately to process that.
• Whenever there is a rapid reaction required due to some sort of change, real time processing can take
action without the need of a user.
• Real time processing is used in warning systems on aircraft, alarm systems in hazardous zones,
burglar alarms etc.
IPCC |35e |Fast Track Material in Information Technology 64
MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com
Concurrent Audit:
• In this, Auditors are members of the system development team.
• They assist the team in improving the quality of systems development for the specific system they are
building and implementing.
General Audit:
• In this, Auditors evaluate systems development controls overall.
• They seek to determine whether they can reduce the extent of substantive testing needed to form an
audit opinion about management’s assertions relating to the financial statements in systems
effectiveness and efficiency.
Private Cloud:
• This cloud computing environment resides within the boundaries of an organization and is used
exclusively for the organization’s benefits.
• These are also called internal clouds.
THE END
IPCC |35e |Fast Track Material in Information Technology 66