Você está na página 1de 67

CA - IPCC

COURSE MATERIAL
Quality Education
beyond your imagination...

BOOK NO. A9
FAST TRACK MATERIAL IN
INFORMATION TECHNOLOGY_35e

Score at least 20
marks with this
material

Cell: 98851 25025 / 26


Visit us @ www.mastermindsindia.com Mail: mastermindsinfo@ymail.com
Facebook Page: Masterminds For CA Youtube Channel: Masterminds For CA

Page 1
INDEX FOR FAST TRACK MATERIAL IN INFORMATION TECHNOLOGY

Chapter Name Pages

Part A Flowcharts 4 – 31

Part B 2 Mark Questions / Definitions 33 – 52

Part C Differences 54 – 66

2
CA - IPCC
COURSE MATERIAL
Quality Education
beyond your imagination...

PART A – FLOWCHARTS

Cell: 98851 25025 / 26


Visit us @ www.mastermindsindia.com Mail: mastermindsinfo@ymail.com
Facebook Page: Masterminds For CA Youtube Channel: Masterminds For CA

Page 3
MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

1. TELECOMMUNICATIONS & NETWORKS


1. What is computer network? Explain different types of network?

COMPUTER NETWORK

Definition Purpose

Most commonly found  Sharing of hardware devices


Collection of computers networks Examples:  Information sharing
and terminal devices LAN, MAN, WAN, VPN,  Electronic transfer of text (EDI)
connected together by a INTRANET, EXTkRANET,  Decentralization of various Data processing functions.
communication system INTERNET  Communication between organizations
 Collaborate more creatively

1. Terminals are Starting and Stopping points in any telecommunication environment.


2. Terminals may include dumb, intelligent, workstations and also printers, Telephone lines etc.

2. State the latest trends in telecommunication?

Trends In telecommunication

Industry trends: Technology trends: Business trends:


 Many service providers Like Airtel, • Change from Analog to Digital
Vodafone • Businesses want to cut costs
network technologies. Ex: ISDN • Online operational process
 Many services available like • Change In communication media • Looking to benefit from
Whatsapp. i.e., faster communication media
 Growth of E-commerce, m-commerce E-commerce and m-commerce
Like fiber optic cables, satellite • They want to improve communication
 Telecom Industry is undergoing major
communication and collaboration.
changes In all possible ways
• New and more secure protocols, • They are looking at improved
 Availability of more bandwidth and
Network architectures are evolving response times and less waiting
more speeder transmission
like WAP etc., times.
technologies like 3G,4G,5G

3. Write short notes on need and scope of computer networks?

How networks help business

Organizations can improve Advantages of computer network:


efficiency by sharing Information  File sharing
such as common files, databases  Resource sharing like printers, hard disk etc
and various application software’s  Remote access via Internet
over a network  Database sharing
 Fault tolerance by having backups of data and servers i.e. unbroken service.
 Internet access to the organization with security concerns
 Can do the business across the world i.e., over coming geographical barriers
 Can offer Any time any where services like ATM’s i.e., over coming time barriers
 Reduce costs of communicating through video conferencing.
 Boundary less collaboration with stakeholders like customers, supplies etc.,

IPCC |35e |Flow charts_ Information Technology 4


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com
4. Write short notes on telecommunication network model

Components of telecommunication network model

In a communication network there will be Sender, Receiver, and Communication channel

Terminals: Telecommunication processors:


Starting and Stopping points in  Support data transmission and reception
telecommunication environment Internetwork processors:
between terminals.
Special purpose
 They control and coordinate flow of data in
Ex: video terminals, micro communication processors
a network
computers, telephones
 Efficiency of network depends on them

NIC: Modem: Multiplexer: Communication


 Network Interface card  Also called as MUX control
 Digital signal to Analog
 Connects computer to a  Carries several terminal signals on a software:
signal-modulation
computer network single channel simultaneously. Program that
 Improves network throughput  Analog signal to Digital control and
signal - Demodulation  Multiplexer merges transmission
 Perform many functions like manage the
signals.
Identification, Buffering etc.  Must for Internet functions.
 De - multiplexer separates signals.

Hub:
Switch: Bridge:
Used for Repeater: Router: Gateway:
Make temporary  Used to connect
sharing of It boosts (or) Used to inter - Used to connect
connections various LANS
networks amplifies the connect networks networks of different
between  Magnifies data
resources like signal based on different communication
telecommunication transmission
servers, rules or protocols architectures
circuits. signal
printers

5. Write short notes on network management and functions of network management?

Major Networking functions

Traffic management Security Network monitoring Capacity Planning


 Avoid congestion and Provides authentication,  Continuously monitors the  Surveys network
 Optimize encryption, auditing network resources
telecommunications functions, enforces  Trouble shooting and watching  Planning scalability based
service levels security in a network. the network for problems on users needs

6. Why users prefer Local Area Networks?

Why users Prefer LAN?

LAN offers many benefits like data sharing and resources sharing in
addition it also offer the following benefits

Expanded PC usage E-mail and


Security through inexpensive Distributed message Less maintenance and Low
workstations processing broadcasting Software costs

IPCC | 35e |Flow charts_ Information Technology 5


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

7. Write about different kinds of cables commonly used in LAN’s

Communication Media

Guided media / bound media Unguided media / Un bound media


Uses a cabling system that guides the  Does not use cables
data signal along a specific path.  Uses waves and air as medium

Twisted pair cables Co- Axial cable Fiber optic cable


 It is an ordinary telephone wire  Consists of copper (or)  Consists one or more hair like
 Most widely used for both data aluminum wire with high thin filaments of glass fiber
and voice transmission insulation  Data transmission is very fast
 Used for high speed, long and secure, easy to install
 Inexpensive & easy to install
distance transmission.
 Used for short distance only.  Very Expensive
Eg.: cable T.V. wire.

Terrestrial microware Communication satellites Infrared waves


 Uses atmosphere as the  A satellite is some solar-powered  Used in industrial
medium electronic device that receives, scientific and medical
 Disadvantage is that it cannot amplifies and retransmits the signal applications
bend over the curvature of  Cost effective for large data Eg.: Night vision devices.
earth transmission over long distances

Micro Waves Radio Waves


 Radio waves with wave length of 1 meter to  Invisible waves & Electro Magnetic
1mm. Radiation.
 Used in RADAR’s, Navigation and  Wave length 1 mm to 1,00,000 Kms
spectroscopy.  Used in WAN’s and wireless LAN’s.

8. Write about different types of telecommunication networks?

Different Types of Telecommunication networks

Area of coverage Functional based Ownership based Media based

LAN Public network Wired Media


Network with in a  Any one can use it Cables
building campus (or) Client - Server
 Eg.: Internet
short distance within 1km There will be two
classes of computers Wireless
MAN called servers & clients Private network Satellite
Spans Across a city (or)  Used by a particular group communication,
town up to 40km of People or a company Radio waves etc.
Peer to Peer
Eg.: cable network  Eg.: LAN, MAN
 No concept of client
or server
WAN  All are equal i.e. Virtual Private network
Spans across the globe peers Uses a public network to
Eg.: Internet connect a private network
Eg.: work from home

IPCC |35e |Flow charts_ Information Technology 6


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com
9. What is meant by network topology? What are different topologies or structures available?

Network Topology / Network Structure

Geometrical arrangement of Computer resources and other devices in a network, it determines how one
computer can communicate with other devices.

Bus topology: Ring topology: Star topology: Mesh topology:


 Decentralized approach  Decentralized approach.  Centralized approach.  Nodes are randomly
 It offers high performance for  Most commonly used. connected using
 A single wire connects number
small networks.  Consists of one centralized links.
of computers.
hub (or) Computer (or)  It is used in military
 All communication travel along  Reliable and less costly.
Switch. networks
a cable called bus.  Easy to expand.  Generally central computer  More redundancy
 Simple & easy to install.  More reliable. acts as server.  Highly reliable.
 Heavy traffic can slowdown  Better than star topology.  Easy to add and remove  More expensive.
the network.  Transmission links are nodes.  More cable is needed
 If there is problem with main unidirectional  Easy to diagnose problems.
cable entire network goes  Relatively expensive and  But more dependence on
down. difficult to install Central device.

10. Write about Digital Data transmission

Data Transmission

Parallel: Serial:
 All bits of each byte are transmitted simultaneously.  Most commonly used method.
 Eg.: Parallel port used for printers  One bit at a time is transmitted along a single path
 Eg.: Modem (or) mouse port.
 Data can be transmitted at very high speed.
 Very cheap
 Crosstalk may occur.  Suited for long distances transfer data in series i.e.
 Expensive. slow transmission

Two basic ways of Serial Transmission

Synchronous Transmission: Asynchronous Transmission:


 Information is transmitted at the same rate.
 Data (or) information is sent at irregular
 Sender and receiver are paced by same clock i.e.,
same speed. intervals.
 Synchronization bits are placed at beginning and Eg.: Typing from a keyboard.
ending of Provides physical transmission of data
 Every time sender sends synchronization bits to
In network
 Provides physical transmission of data In network
receiver.
each block.

11. Write about different modes of data communication

Various techniques of Data Transmission


Techniques of Data Transmission

Broadcast Networks: Switched Networks:


 Data transmitted by one node is received  There will be a source and destination.
by many (or) all In the network  Data is transmitted through switch nodes.

IPCC |35e |Flow charts_ Information Technology 7


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

Transmission modes

Characterized according to the


direction of exchange of data

Simplex: Full Duplex:


 Data transmission in one Half Duplex:  Simultaneously transmit and
direction only receive data
 A terminal connected to
Data moves in both directions but  Faster
simplex mode line that may one side at a time  Uses two separate circuits
send only or receive only Eg.: Walkie talkie Eg.: Mobile phones
Eg.: Radio, Computer to Printer

12. Discuss various switching techniques used in a computer network?

Switching Techniques

Data transferred from source to destination is routed


through the switched nodes

Circuit Switching: Message switching


Packet switching
 Simplest method  Intermediate nodes are used to
carry the message.  Sophisticated technique
 Only two devices can communicate
at a time once circuit is established.  No dedicated circuit is necessary to  Messages are broken up into
 It is exclusively used by the parties carry the message small transmission units called
for whom the circuit is established. It  This characteristic is often referred packets.
becomes unavailable to others till to as store and forward
Eg.: Downloading and uploading in
the call is terminated by either party Eg.: E-mail, SMS, Voice Mail internetwork

What is a Protocol? Explain the aspects defined by protocols? Explain the functions of
13.
protocols.

Protocols

Definition:
 Protocols are set of rules for inter - computer communication
 Protocols are software / programs that allow heterogeneous computers to transmit data

Aspects defined by protocols Functions of protocols


 Breakdown data into packets
 Add destination address to packets
 Take data packets from cable
 Contact with NIC
 Traffic control

Syntax: Semantics: Timing:


Format of data being exchanged, is Type and order of messages is  Data rate selection.
defined. defined  Correct timing for data transfer.

IPCC |35e |Flow charts_ Information Technology 8


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com
14. Write short notes on Network Architecture?

Network Architecture

Definition:
 It is a layout of a network (full picture of the established network).
 It discuss about hardware, software, connectivity, mode of transmission etc.,
 The goal is to promote an open, simple, flexible and efficient telecommunications environment

OSI Model TCP/IP model

15. Write about Open System Interconnection (OSI)

Layer1/ Physical Layer


 Hardware layer
 Discusses about topology

Layer 2/Datalink layer


 Specifies channel access control method and reliable data
transfer.
Layer 3/Network layer
 It makes a choice of physical route of transmission of data
 Routing of data in a network

OSI MODEL designed Layer 4/Transport layer


by ISO  Assembling and disassembling of packets
 Multiplexing, encryption, error recovery etc are undertaken

Layer 5/Session layer


 Establishes, maintains and terminate sessions
 Authentication and identification of clients.

Layer6/ Presentation layer


 Controls on screen display of data
 Encryption, data compression can be done.

Layer 7/Application layer


 It Provides File transfer, file sharing
 Deadlock and Database concurrency controls can be done.

16. Write short notes on TCP/IP?

Meaning
 Protocol used in Internet is called TCP/IP
 It consists of 5 layers which corresponds to 7 layers of OSI
model

Layers1/Physical layer
 Provides physical transmission of data In network

Layer 2/Network Interface


 Supports Error free organization and transmission of data in
TRANSMISSION network
CONTROL PROTOCOL /
INTERNET PROTOCOL Layer3/ Internet protocol (IP)
 Provides routing by establishing connections among network
links

Layer4/ Host to Host transport layer


 Supports the organization and transfer of data.

Layer5/Application or process layer


 Provides communication services
 Establishes sessions
Data transmission formats and codes.
IPCC |35e |Flow charts_ Information Technology 9
MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

17. Write about different models of networks and also describe about clients and servers?

Models of network

Client / Server model Peer-to-Peer model


• Intelligently divides processing • No separate server
work between clients and servers • Only sharing is possible
• Servers handles global tasks • All are equal i.e. peers
• Very simple and cost efficient.
• Clients handles local tasks
• Not suited for large networks
• Very fast, secure, reliable, efficient • P2P can be adhoc-connection
model • Permanent infrastructure

Client: Service Requesters Server: Service Providers

Fat/thick Client Thin client Hybrid Client Dedicated


• More dependence on  Mixture of fat and thin Non-dedicated
• It does not Performs
server clients one specific Performs many
necessarily rely
• Performs only  Used in Imaging activity only activities
on server
• Eg.: PC presentation services consoles
 Process locally, but
relies on server for
storing persistent data

18. Discuss Multi-Tier Architecture?

Multi-tier Architecture

Single-tier systems Two-tier systems Three- tier system n-tier Architecture


 Single computer having  Consists of client and  There will be 3 tiers namely
 Presentation tier (front End)  Here ‘n’ refers to
both Front end (GUI) serves number of levels
and Back End  Application tier (Business logic)
 Front End on client  Data tier (back end) counting from client to
(database) server.
 Back End on sever  It will be more complex
 Used in small and micro  But very effective  Used in more complex
 Used In medium &
business large businesses  Modern day businesses use this environments.
 Requires only one  Very flexible and model  Very secure and
computer effective  More secure effective.
 Dynamic load balancing

19. What is a security program? (or) Write about network risks, controls and security?

Network Security

Meaning: Need: Types:


Provision made to protect network  To safeguard assets  Physical: To Protect physical assets like
and network accessible resources hardware, personnel, Hardcopy
 To ensure and maintain data
from unauthorized access Documents etc.,
integrity
 Logical: software security restricting
unauthorized access to data

IPCC |35e |Flow charts_ Information Technology 10


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com
20. Write about Centralized systems & Decentralized systems?

Centralized and decentralized systems

Centralized system: Decentralized system:


 Processing done at central location  Each workstation is autonomous
 Enhanced security
 It enable file sharing to all in the Network
 Ease of control
 Ease of management Disadvantages:
 Reduced cost of ownership  All computers have to be updated
individually, but in central system updating
Disadvantages:
the central server is Enough
 If Central computer fails then entire system will go down.
 All the time the Central server should be kept secure and
fast.

21. Explain the threats involved in system security?

1. Unstructured threats:
 Inexperienced and enthusiastic people will do
 Ex: port scanning tools, address sweeping tools
 No malicious Intention
 Many tools are available in Internet

4. Internal threats: 2. Structured threats:


 Done by people inside the  Done by highly motivated
organization having access to Threat: technical people
internal resources A possible danger that can disrupt  Malicious Intention
operation functioning Integrity of a  Specific targeting of a group
 Usually these people are
network. (or) Company
disgruntled employees either
 Technically competent hackers
current or former
causes these threats

3. External threats:
 Done by people outside of organization
 Usually works on trail and error basis
 Tries to Intrude from Internet or dial up servers.

22. Discuss the encryption model in computer network.

Cryptography

Encryption Decryption

Encryption:
Process of Encoding messages.
Types

Hardware Encryption: Software Encryption:


 Use of specific hardware devices to encrypt the  Encryption done by software itself.
messages.
 Usually works in conjunction with applications.
 Now a days these devices are available at
reasonable cost. Eg.: Mail sent using g-mail will be encrypted by
g-mail application.
 These are fixed to computers.

IPCC |35e |Flow charts_ Information Technology 11


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

23. Explain the vulnerabilities involved in system security?

Software bugs:
Bug (or) error in software is a serious vulnerability

Timing windows:
Exploiting temporary files, Overwriting important data
Vulnerability
It is an inherent weakness In secure default configuration
in design, configuration or Using well known and easily guessed passwords can cause Vulnerability.
implementation of a
network or system that Bad protocols:
renders susceptible to a Using inefficient non-standard protocols may cause vulnerability.
threat
Trusting untrustworthy information:
Bad routing algorithms can cause network to connect to untrustworthy servers.

End-users:
Generally users of computer system who are not professionals and are not
security conscious.

24. Write short notes on network security?

Privacy:
 There should be confidentiality.
 Achieved by cryptography and encryption techniques.

Aspect 1
Non-Repudiation: Authentication:
Receiver must be able to prove that Aspect 4 Network Security: Aspect 2
Receiver is sure of the sender’s
a received message came from a Provisions made to protect the
identity that an imposter has not
specific sender and sender must network from threats.
sent the message.
not be able to deny sending it.
Aspect 3

Integrity:
 Data must arrive at receiver end exactly as it was sent by sender.
 No tampering should be done.

25. Explain popular network security protocols?

Popular network security protocols

Network security protocols are designed to prevent any unauthorized


application service or device from accessing network data.
Examples

SSH: SFTP: HTTPS: SSL:


 Secure shell is a program to  Stands for Secure File
 Stands for Hyper Text  Stands for Secure
log on to another computer Transfer Protocol
Transfer Protocol Secure Socket Layer
over network to execute  Encrypts commands and
commands in a remote data while transmitting.  Uses public and secret  Used for secure online
machine.  Preventing passwords keys to encrypt data flow credit card transactions
 Provides authentication and and sensitive information between client and using web mail etc
secure communication from being transmitted. server
 Protects network from IP
spoofing, DNS Spoofing
etc.,

IPCC |35e |Flow charts_ Information Technology 12


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com
26. What are the functions of network management?

Functions of network
management

Fault Management Controlling Deploying Allocating Planning Frequency Allocation

Security Route Analysis and Cryptographic distribution Configuration Monitoring resources


Management Accounting mgmt. and Authorization Management of a network

27. Discuss FCAPS model of network management?

Fault Management:
F  A fault is an event that has a negative significance.
 Goal is to recognize isolate correct, and log faults in a network.

Configuration Management:
C Tracking and management of Network and system configuration
information.

Accounting Management:
A
Tracking network utilization information.

Performance Management:
P Measures network performance such as throughput, response time
packet loss rates, Error rate etc.

Security Management:
S
Managing network authentication, authorization, auditing of a usage
from both Internal and External Users.

28. Write short notes on different classes of E-Commerce?

Business-to-Business (B2B) e-Commerce:


a) The exchange of services, information and/or products from one business to another.
b) Automated processes between trading partners.

Business-to-Consumer (B2C) e-Commerce:


a) It is defined as the exchange of services, information and/or products from a business to a
consumer.
b) A virtual store available for consumers to purchase goods and services

Consumer-to-Business (C2B) e-Commerce:


a) Consumers directly contact with business vendors by posting their project work online so that
E- Commerce
the needy companies review it and contact the consumer directly with bid.
b) Consumer reviews all the bids and selects the company.

Consumer-to-Consumer (C2C) e-Commerce


a) Internet-facilitated form of commerce that has existed in the form of barter, flea markets,
yard sales and the like.
b) A virtual environment in which consumers can sell to one another through a third-party

Business-to-Government (B2G) e-Commerce: It also known as e-Government, refers to the


use of information and communication technologies to build and strengthen relationships
between government and employees, citizens, businesses, non-profit organizations, and other
government agencies.

Business-to-Employee (B2E) e-Commerce:B2E e-Commerce, from an intra-organizational


perspective, has provided the means for a business to offer online products and services to its
employees.

IPCC |35e |Flow charts_ Information Technology 13


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

29. What tools are available to protect the information in network against intrusion or misuse?

Tools to protect Information in network

Firewalls: Message authentication Site Blocking: Anti-malware:


 Forms barrier  Makes sure that It is a tool to block certain  These tools help
between secure and message is from websites which may administrators to Identify
an open environment authenticated sender contain objectionable and block malware
 Effective means of  Makes sure of no material  Malware disturbs the
protecting firms message tampering performance of the network.
Internal resources
from unwanted
intrusion. (NAC) Network Access Control: IDS
These products handle access authentication and Intrusion Detection System monitors
authorization functions network assets to detect anomalous
behavior (or) misuse.

30. Write about Intrusion Detection System (IDS)? Explain Primary IDS technologies?

1. Network Intrusion Detection


 Analyzes Network traffic and searches for un
wanted (or) malicious Events on the wired b/w hosts
 They are also called as “packet sniffers”
 It Intercepts packets
IDS
Monitors network assets 2. Host based Intrusion detection
to detect anomalous  Monitors attacks on a given host
behavior (or) misuse  Used to combat Internal threats

3. Hybrid Intrusion Detection


 Combination of both NID and HID
 It offers central Intrusion detection Management

31. Write short notes on E-Commerce?

E-Commerce is the process of doing business electronically

Benefits Risks Types


 Reduce Inventories  Problem of Anonymity  Business-to Business (B2B)
 Reduction of selling costs  Repudiation of contract  Business -to- Consumer (B2C)
  Lack of authenticity
Reduction of advertising costs  Consumer -to -Business (C2B)
 Denial of service
 Access to new markets.  Consumer- to -Consumer (C2C)
 Problem of piracy
 Buyers can access Info Easily.  Business –to- Government (B2G)
 Lack of audit trails
 Reduction of overhead costs  Business- to- Employee (B2E)
 Attacks from hackers

32. Define the Electronic Funds Transfer. State some examples of EFT systems in operation?

Electronic Funds Transfer


Examples

ATMs POS Preauthorized Transfers Telephone transfer


 Specialized form of POS  Stands for point of sale  Automatically depositing Transaction can be done
 used with debit or credit transactions or withdrawing from an through telephone
cards with a PIN Number  Using POS machines individuals account instructions
 ATM cards are used in money can be transmitted through a financial Eg.: order of payment of
multipurpose manner to electronically institution. bills to bank by phone
pay bills to withdraw  No need to carry cash for  Payment of bills
cash etc., purchasing. automatically

IPCC |35e |Flow charts_ Information Technology 14


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

2. INFORMATION SYSTEMS & IT FUNDAMENTALS


1. Define Information System? Write about Information System Layers.

Information Systems

Definition Activities Layers


1. It is a set of interrelated components working together  Collecting, storing and  Hardware
to collect, retrieve, process, store and disseminate processing of data  Software
(distribute) information for the purpose of achieving
 Generation of Information  Database
objectives such as planning, coordination, analysis
and decision making. reports  Network
2. Generally called as Management Information  Dissemination of Information  People
Systems (or) Computer Based Information Systems to right Users.  Reports

Define the term Application Software? Explain types and mention advantages and
2.
Disadvantages.

Application Software
Set of programs for performing useful tasks
Types

Application Suite Enterprise Software Enterprise Infrastructure Software Information Worker Software
Eg.: MS-Office, Star Office Eg.: SAP Eg.: Email sever, security Eg.: MS-Excel, CAAT etc
software , Antivirus software

Content Access Software Educational Software Media Development Software


Eg.: Media players, Adobe digital Eg.: Exam CDS, Test prep CD’s Eg.: DTP software, Photoshop

Benefits
Addressing user needs Less threat from virus Regular updates licensed
 Application software is Application software will
designed to suit the user needs The threat of virus infection to
have regular updates for
 They are designed with a
custom-made applications is
various security reasons
specific purpose in mind. very small,
Disadvantages

Development is costly Infection from malware

Write about System Software in detail. (Or) What is an OS? Explain functions or activities
3.
performed by OS?

SYSTEM SOFTWARE / OPERATING SYSTEM

Definition Functions (or) activities of an OS


 Software designed to operate the  Performing hardware functions
computer hardware  Memory management
 It provides a platform for running  Providing user interface
application software (App’s)  OS provides hardware
Independence
 Operating system is a system  Memory management
program which acts as an  Task management
Interface between the user and  Providing networking
the computer hardware. capabilities
File management

IPCC |35e |Flow charts_ Information Technology 15


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

4. Explain various data storage devices?

Memory techniques/ Devices

Internal Memory Primary Memory Secondary Memory


• Registers (Main Memory) (Auxiliary Memory)

Magnetic tape
drives
RAM ROM Magnetic disk
• Volatile in nature • Non-volatile in nature drives (Ex: Hard
• Information can be read and write • Information cannot be modified disk, Floppy disk)

Static RAM PROM Optical disk drives


(Ex: CDs DVDs
Dynamic RAM EPROM etc.)
EEPROM

SPECIAL MEMORIES

Cache Memory Virtual Memory


 It is a type of static RAM  Imaginary memory supported by some operating
 It is smaller, faster systems
 It is expensive  Virtual memory is an allocation of hard disk space to
 It boosts processing power help RAM
 Its location in motherboard gives it the advantage  We can use large softwares with less RAM using this
 It resides between main memory to CPU technique

5. Define the terms Data, Database, Database Management System (DBMS).

DBMS
DBMS is a collection of programs that
enable users to create and maintain
Data data bases.
Collection of Raw facts, Database  Or simply it is a software to maintain
figures, observations. Collection of related data databases

DBMS

Terminology

Characters Field Record File Database


Collection of Bits Collection of characters Collection of fields Collections of Records Collection of Files
i.e. 0’s and 1’s

6. What is BPM? Explain phases of BPM in detail.

Business Process Management (BPM)

Definition Phases
It is methodology used by enterprises to improve end An ERP application divides the BPM Process into 4 phases.
to end business processes in various stages

1. Analysis Phase 2. Design Phase 3. Implementation Phase 4. Run & Monitor Phase

IPCC |35e |Flow charts_ Information Technology 16


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com
7. What is a Database model? Explain different types of Database models.
Database Model

A Database model determines the logical structure of a data


base i.e. how data is stored, organized and manipulated
Types

Hierarchical Model: Network model Relational model


 Records are logically organized into  Modified version of hierarchical  Represents database as
hierarchy of relationships model collection of relations
 Records are arranged in inverted  Supports all types of relations  Relational database contains
tree pattern one to one, one to many, many multiple tables
 Parent-child relationship between to one, many to many  Easier to use
records  Relatively efficient  Highly flexible
 Supports only one to one and one to  More flexible  Can handle queries in a more
many relationships  But difficult to operate efficient manner
 Simple to understand  Less user friendly,  Storage requirements are high
 If parent node is deleted all Child  Requires more processing
nodes get automatically deleted capacity
 Cannot support many-to-many  Primary key plays important role.
relationships
Object oriented model
 Objects are predefined set of program code that is used
to perform a specific task
Copyrights Reserved  Based on concept of objects and their interactions

To MASTER MINDS , Guntur  Used to store complex data such as Images, audio video
etc.,
 Ex: CAD tools, Expert systems, Image processing
systems, Multimedia system etc.,

8. List out the advantages & disadvantages of a DBMS?

DBMS

Advantages
Disadvantages
 Reduced Data Redundancy
 Program and file consistency Cost: Implementing a DBMS may
 Data sharing be expensive, time consuming and
 Integrity can be maintained requires more training to users
 User friendly
 Improved security Security: It is difficult to keep
 Data independence unauthorized users away from
 Faster application development accessing the database

Explain what type of IT infrastructural is required for organization and discuss the risks
9.
and issues of IT?

IT in Enterprises

Infrastructure required Risks and Issues of IT


An Enterprise should posses the following Infrastructure

» Greater need of controls
Database access and changes software
 File replication and backup software
» Checks to see whether business objectives


are met (or) not
Systems and event log monitoring

» Technology risks
Job scheduling software
 Application Integration
» In-depth knowledge in implementation and


operation are required
Printing & file transfers

IPCC |35e |Flow charts_ Information Technology 17


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

10. Define the term “computing”. Explain five sub-disciplines of the computing?

Computing

Any goal oriented activity requiring, benefiting from or creating computers

Sub Disciplines

Computer Science Computer Engineering Information System (IS)


 Scientific and practical approach to
Integrates several fields of The main aim is to support
computation and its applications Electronic Engineering and
 It studies the Internal working of the operations management and
computer science required to decision making in a business
computers
develop hardware and software

Information technology (IT) Software Engineering


IT encompasses not only computers and computer It provides a systemic disciplined, quantifiable
networks but also other technologies like telephones approach to the development, design,
and television operation and maintenance of software

11. Describe about Instruction set Architecture (ISA).

CLASSIFICATION OF INSTRUCTION SETS

CISC RISC
 Stands for Complex Instruction Set  Stands for Reduced Instruction Set
Computing Computing
 Ex .: Intel 386, 486, Pentium pro, PII, PIII Ex: IBM RS6000, MC88100 processors
etc  Consume less power offers high
 They are complex as well as expensive to performance
produce.  Less complex and less expensive
 Most PC’s use CISC processors  Workstations uses RISC processors
 Variable length instructions i.e., each  Fixed length instructions. i.e for each
instruction can use exactly the amount of instruction can occupies the same amount
space it requires of space, hence memory space is wasted

12. Explain different phases of SDLC?

Phase - V Phase - I Phase - II


System-maintenance and Review System Investigation: System Analysis:
 Examines the results of software  Examines what is problem  Examines what must the
 Developed and modifies the and is it worth solving Information system do to solve the
system according to the changing  Feasibility study is done. problem.
needs  Gathering details.
 Analyzing cost benefits.
SDLC
 System Development
life cycle
 Provides sequence of Phase - III
Phase - IV activities to build an System Design:
System Implementation: Information system  Examines how will the Info.
 Examines how will the solution be System do, what it must do to
put into effect obtain solution to the problem.
 Involves coding testing Installing  Designing of Hardware, software,
software Inputs, outputs, etc.

IPCC |35e |Flow charts_ Information Technology 18


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com
13. Write about Machine Cycle?

1. Instruction Fetch
Fetch an Instruction from the
current Program

4. Write Back 2. Instruction Decode


Writes back the result and MACHINE CYCLE Figures out what we actually
go for another Instruction need to do

3. Execution
Performs some operation

14. Write briefly about Mobile Computing?

Mobile Computing

It Involves the use of portable computing devices i.e. laptops, PDA,


mobile phones, smart phones in combination with mobile technologies

Mobile Communication Mobile Hardware Mobile Software


 Infrastructure for seamless and  Include laptops, Tabs, Phones,  Programs that run on mobile
reliable communication PDA’s hardware
 Includes devices such as protocols,  Main component or Engine of the
services, bandwidth and profiles  They operate on full duplex mode
mobile device.

Business Applications Concerns/Problems


 Increase workforce productivity  Security concerns
 Offers any where any time access
 Dangers of misrepresentation
 Improved customer service, latest Innovations in service
 Power consumption
 Business process improvement
 Potential health hazards
 Innovative opportunities for improving quality and efficiency

15. Discuss about BPA?

Business Process Automation (BPA)

It involves removing the human Element from existing business by automating the
repetitive or standardized process components

Steps Objectives Activities Benefits of BPA


 Confidentiality  Integration  Reduction of human error
 Define why we plan BPA
 Integrity  Orchestration  Easy transformation of data into
 Understand rules & regulations
 Document the process  Availability  Automation information
 Define objectives to be achieved  Timeliness  Improves performance and
 Engage process consultant process effectiveness
 Calculate ROI for project  Making business more
 Development of BPA responsive
 Test the BPA  Improves information sharing and
collaboration

IPCC |35e |Flow charts_ Information Technology 19


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

16. Explain major concepts in SDLC.

Technical Feasibility

Economic Feasibility
Feasibility study
Process of Evaluation alternative systems
Legal Feasibility
through cost/benefit analysis
Operational Feasibility

Schedule (or) Time Feasibility

Interviewing Staff

Fact finding techniques Examine Current Business

Sending out
Major Concepts Questionnaires
in SDLC
Observation of current
proceedings

Direct change over

Parallel Conversion
Conversion Methods
Phased Conversion

Pilot Conversion

Perfective Maintenance

System Maintenance Adaptive Maintenance


Types
Corrective Maintenance

3. BUSINESS INFORMATION SYSTEMS


1. Explain about the information system

Information System

Information System Information system


 Processing of data is known as It is a combination of people
System is a set of interrelated
information components working together to hardware, software, communication
 Information is used in accomplish objectives devices, and networks to process
managerial decision making data and produce Information

Role In business Components


 Helps in decision making
 Helps to Execute Innovative
Ideas Storage
 Helps in solutions of complex
and critical problems Input Processing Output
 Help to take right decisions at
right time Feed Back
 To gain competitive advantage

IPCC |35e |Flow charts_ Information Technology 20


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com
2. Explain who uses information system?

Who uses Information Systems?

Strategic Level Management Level / Operational Level Knowledge level


Middle Level

Includes CEO’s, COO’s, Includes operational managers, Knowledge and Data workers, who
Chair person etc., Includes Middle Managers Supervisors responsible for day are selected, recruited and trained
 System used: EIS like GM RM, ZM etc., to day operations in a specified manner:
 System used: MIS, DSS.  System used: TPS  System used: KWS, OAS

3. Explain different types of information system?

Types of information system

TPS MIS DSS EIS OAS KMS

4. Explain Transaction Processing cycle?

2. Transaction Processing
4. Document &
1. Data Entry » Batch Report Generation
» Online / Real time

5. Inquiry Processing
3. Database Maintenance

5. Explain TPS?

Transaction Processing System (TPS)

TPS Attributes: TPS qualifiers:


Definition:  Access control: Should restrict  Atomicity: transaction should take
un authorized access place in entirety
It is Information system that  Equivalence: Transaction  Consistency: Should behave similarly
collects, stores, modifies and
should be in same format every all the time
retrieves day to day transactions
time  Isolation : only one transaction at a
of an enterprise
 High volume rapid processing of time
Eg.: ATM; IRCTC, Accounting transactions  Durability: Maintenance of logs
system  It should be robust and trust Once transactions are completed they
worthy cannot be undone.

6. Explain SCM?

SCM

Definition Characteristic features Components:


 Stands for Supply Chain Management  It integrates supply and demand  Procurement
 Process of planning, implementing and
management within & across
controlling the operations of the supply chain  Operations
companies
with purpose to satisfy customer requirements.  Distribution
 SCM cover from point-of-origin to point-of-  SCM is a chain starts and ends
consumption with customers  Integration

IPCC |35e |Flow charts_ Information Technology 21


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

7. Explain ERP?

Enterprise Resource Planning (ERP)

Advantages Stages of ERP


Definition  Powerful tool In hands of management  Inventory control
 An ERP system fully Integrates  It organizes and integrates operating  ABC Analysis
Internal and External processes  EOQ (Economic order quantity)
Management Information across  Used for optimum utilization of  Just-in-time (JIT)
Entire organization resources  Material Requirement planning
 Manufacturing Resource planning
 It covers functional areas of an  ERP promises one database, one
Enterprise like procurement, application, one user interface  Distribution Resource planning
Inventory, production, sales,  Enterprise Resource planning
 Provides competent and efficient
Logistics, finance, A/c’s and HR  Money Resource planning
administration
 EIS web Enabled

8. Explain CRM?

CRM

Definition Benefits Architecture of CRM


 Stands for Customer Relationship  Generation of customer loyalty
Operational: Automation is provided to
Management  Raising a market Intelligence Enterprise the basic business processes
 It may be defined as process in  Integrated relationship
Analytical: Analyzes customs behavior
which client relationships, customer  Preserving Existing customers
Collaborative: Ensures contacts with
loyalty and brand value are built  Providing enhanced services
customers like Phone, Email, Fax,
through marketing strategies and  Developing connection and affiliation SMS etc
activities. with customers

9. Discuss about DSS?

Decision Support System (DSS)

Definition Benefits of DSS Characteristics


 It is a Computer Based  Improved decision quality Components
 DSS supports
Information System that  Cost reduction  Users management decision
supports business or  Increased productivity
 making
organizational decision  Increased communication
Databases
 DSS solve unstructured
making activities  Timesaving  Planning languages problems.
 DSS covers wide variety of  Improved customer
systems, tools & technologies satisfaction  Model base
 Friendly
Interface
computer

10. Discuss about MIS & EIS?


MIS and EIS

MIS EIS
 Used to develop Info for Managerial use  It is a kind of DSS that is designed to meet the special
 It is an Integrated, user-machine system to provide needs of top revel managers
Information to support operation, management and decision  It uses graphic displays
making functions  It can access both Internal and External data sources
 Another name Executive Support System (ESS)
 It provides timely accurate, and meaningful data
EIS components
 MIS solutions are accessible via web Browsers of Internet  Hardware
Examples  Software
 Logistics Management Application.  User Interface
 ERP Softwares  Telecommunication
IPCC |35e |Flow charts_ Information Technology 22
MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com
11. Explain Knowledge Management System?

Knowledge Management Systems

KMS KDD
 Stands for Knowledge Management System  Stands for Knowledge Discovery and Data mining
 It clears with ways and means of capturing and making
 It provides both Evident and hidden knowledge for
decision making obtainable knowledge of the Experts to others in
electronic form
 It Enables Employees to have ready access to
 It includes people from inside and outside of organization
organizations documented base of facts etc
 Importance of knowledge
 It is an Information repository
Altering business surroundings
 It provide both Explicit and Tacit knowledge Burgeon connections
Explicit knowledge Ex: online tutorials. Globalization
Tacit Knowledge Ex: Employee experience Modification in organizational composition

12. Write about Core- Banking System (CBS)?

CORE Banking System (CBS)

Definition Elements of Core banking Examples


 CORE stands for ‘Centralized Online Real  Marking and servicing of loans  ATM’S
time Environment’  Opening new accounts
 ONLINE Banking
 Processing payments and cheques
 It is a set of basic software components that  24x7 support
 Calculating Interest CRM etc.,
manage the services provided by a bank to its
 Managing customer Accounts  Internet Banking etc.,
customers through its branches

13. Explain HRMS, benefits and modules?

HRMS

Definition Benefits Key Modules


 A Human Resource Management  Brings Industry best practices to HR functions  Work force management
System is a software application  Utilizes HR potentials completely  Time and attendance
that unites many human  Reduce HR administrative costs management
Resource functions which benefits  Increases employee engagement and  Payroll management
the management satisfaction.  Training management
 It is also called as HRIS i.e.,  Enhances data integrity within the Enterprise  Compensation management
Human Resource Information  Enable to meet compliance and audit  Recruitment management
System requirement  Personnel management
 Organizational management
 Employee self service
 Analytics

14. What are various Business intelligence tools?

Business Intelligence Tools

Definition Key tools


A type of software that is  Simple reporting and
designed to retrieve analyze querying
and report data  Business Analysis
 Dash boards
 Score cards
 Data mining (or) Statistical
Data Analysis

IPCC |35e |Flow charts_ Information Technology 23


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

15. What is AIS? Explain key component of AIS?

AIS (Accounting Information System)

It is defined as a system of collection, storage and processing of


financial and accounting data that is used by decision makers.

Basic functions of AIS Components of AIS


• Collect and store data.
• Record transactions.
• Safeguarding organizational
assets. People Procedure & Data Software IT Internal controls
Instructions Infrastructure

16. Explain AI & Expert system?

AI & Expert Systems

AI: Types of expert systems Expert systems


 Stands for Artificial Intelligence • Example – based It is a computerized Information system
 Distinct area of computer science focusing • Rule based that allows non-experts to make decisions
on creating machines that imitate aspects • Frame based comparable to that of an Expert
of human behavior such as to reason,
communicate, see and hear.
 AI is manmade and level of activity
depends on the programming capability Components : Advantages:
1. User Interface  Cost Effective alterative to human
2. Inference Engine experts
Applications of A.I 3. Knowledge base  Faster and do not get stressed out
4. Knowledge acquisition  Better quality and more consistent
Decision Support facility decisions
5. Explanation facility  Preserve the Expertise of an expert
Information Retrieval 6. Database of facts leaving the organization

Limitations:
Virtual Reality  Costly and time consuming
 Difficult to obtain knowledge from experts
Robotics  Difficult to program commonsense of
human beings

17. Explain the importance of access and privilege controls?

Access and Privilege Controls

These controls help us to restrict whom and what accesses information resources

Functions Principle of least privilege Approaches to Access controls


 Identity Management It means that we should give only  Role-based Access control: Controls designed
 Authentication those privileges to a user account based on user-role in the organization.
which are essential to that users  Rules-based Access Control: It uses triggers to
 Authorization
work. govern rules of business to Enforce controls.
 Accountability

IPCC |35e |Flow charts_ Information Technology 24


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com
18. Explain various payment mechanisms?

Payment Mechanisms

Credit Card: Electronic Cheque: Electronic Purse:


 It has all the features of paper  Another way to make payments over
 It is a plastic card
cheque Internet
used for electronic
 Very similar to prepaid card
payment over  It acts as a message to the  Validation is done through PIN
Internet. senders bank to transfer funds  No credit check or signature is needed

Processing:
Smart Card:
 Authorization
 Batching Smart Cards have an Embedded Micro Chip Instead of a Magnetic Strip.
 Clearing
 Funding

Contact cards Contactless cards Combi / Hybrid cards

4. BUSINESS PROCESS AUTOMATION THROUGH APPLICATION SOFTWARE


1. Explain different types of Business Applications
Types of Business Applications

Nature of Processing Source of Application Nature of Business Functions Covered /


(The way an application (Tells the source from where (Emphasize on size and Nature of Application
updates data) the application has been complexity of Business (Based on business functions
bought) Process) it covers)

Batch Processing In-house developed Small Business Accounting Application


Online Purchased Cash Management
Processing Medium Business
application
Manufacturing Application
Real time Large Business
Leased
Processing

2. What are the applications based on nature of processing

Applications based on nature of processing

Batch processing Online processing Real-time Processing


 In batch processing there is a time  Data is processed immediately while  Input is continuously and
delay in occurrence and recording of it is entered automatically acquired from sensors
transaction
 Immediate result Eg.: Pilot less air craft, Robots etc
Eg.: Credit card statements,
Eg.: Cash Management Software
Accounting, Stock Control statements  Used by large business
 Used by small business  Used by medium businesses

3. Differentiate between manual & computerized information processing cycle?


Manual Information Processing Cycle Computerized Information Processing Cycle

Storage
Input Process Output

Input Processing Output

Feed Back

IPCC |35e |Flow charts_ Information Technology 25


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

4. Explain the Business applications based on nature of applications?

Business applications based on nature of


Application

Accounting Office Compliance CRM Software, Manageme


Applications, Eg.: Management Applications Eg.: SAP-CRM nt Support
Tally, Wings Software, Eg.: Eg.: E-filing Software,
MS Office software Eg.: MIS

ERP software Product Life Logistics Legal Industry specific


Eg.: SAP Cycle Management Management software like
Management Software Software Tourism,
Software Automobile,
Banking, Pharma
software, Cinema
Ticketing software

5. What are information system controls?

Information System Controls

Definition: Controls can be divided into two parts


Control is defined as polices procedures
practices that are designed to provide
reasonable assurance that business
objectives are achieved and undesired Application Controls:
Managerial Controls:
Events are prevented or detected and  Boundary controls
 Top management controls
corrected  Input controls
 Information systems management controls
 System development management controls  Process controls
 Programming management controls  Output controls
 Data Resource management controls  Communication controls
 Quality Assurance controls  Database controls
 Security management controls
 Operations management controls.

6. Explain Different types of Application Controls

Application Controls

Boundary controls: Input controls: Output controls:


To restrict the actions under taken by Ensures accuracy and completeness Ensures data redelivered trousers will be
users of data entered in to system present ell for matted and delivered manner
Techniques: Techniques: Eg.: Printing controls, Retention controls,
 Cryptography Existence Recovery controls, Storage and
 Source document controls
 Passwords Logging of sensitive and critical forms
 Data coding controls
 PIN
 Batch controls
 ID Cards / Plastic Cards
 Validation controls
 Digital Signatures

Database controls: Communication controls: Process controls:


Ensures data integrity in a data base Ensure proper transmission of Performs validation checks to identify
Eg.: Ensuring all records on files are processed data in network errors during processing
 Multiple Transactions for a single record in Eg.: Physical Component Eg.: Edit checks, run to run totals
the correct order control, Line error control, Flow checking, Field Initialization,
and Link controls etc. Reasonableness verification, etc.

IPCC |35e |Flow charts_ Information Technology 26


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com
7. Explain Different types of Managerial Controls

Managerial Controls

 Top management System development Programming Data Resource


controls & Information management controls management controls management controls
systems management
controls Functions Functions Functions Performed
Performed by Performed by S/W by Resource Managers
Senior Auditors Developers
Functions 1.Centralized data
performed by » Concurrent Audit security
senior managers 1. Planning
» Post – implementation 2. Designing 2.Appointing Senior
Audit 3. Coding Persons
1. Planning » General Audit 3.Separating Duties
4. Testing
2. Organizing 4.Maintaining Logs
5. Operation &
3. Leading 5.Share data to right
Maintenance
4. Controlling persons

Security Management Controls Quality Assurance management controls Operations management controls

Functions performed by Functions performed by Functions performed by


Security Administrators Quality Controllers Operations manager
Safety Critical systems Responsible for daily
Several Physical &
to improve the quality of running of H/ W & S/W
logical securities
output like software resources
measures applied

8. What are various Emerging technologies?

Emerging Technologies

Network virtualization Grid computing


Allows a large physical network to  It is a form of distributed computing Cloud computing
be provisioned Into Multiple  It is a computer network in which each  A cloud is a collection of
smaller logical network computer’s resources are shared with every servers, applications,
other computer in a communication system databases, documents,
Major Applications
Need: agreements, storage
 Server consolidation
 Civil Engineers need it capacity etc., which
 Disaster Recovery  Insurance companies need it allow organizations to
 Testing and training  Large-scale science & Engineering Applications share these resources
 Portable applications use it. from anywhere.
 Portable work spaces  A cheaper alternative to supercomputer

9. What are the applications based in source of applications?

Types of Software Available

Custom-built Application: Packaged Software: Leased application:


a) These applications can be a) These are the standard
a) Where user pays fixed rent
configured to meet a particular applications which are not free
for using the application for
company’s requirements. but are licensed. Customization
agreed terms.
b) Example – In house developed to suit business requirements
Software such as Billing, may or may not be allowed. b) For Example - Cloud
Inventory, and Attendance etc. b) For Example -Tally, Oracle 9i. Systems

IPCC |35e |Flow charts_ Information Technology 27


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

10. Explain cloud computing in detail?

Cloud Computing

Service Models: Deployment Models: Characteristics:


Cloud computing officers the following Clouds can be divided based on  Elasticity and scalability
services to users their deployment and usage  Pay per use
 Software as service (Saas)  Public clouds  On demand
 Platform as a service (Paas)  Private clouds  Resiliency
 Infrastructure as a service (Iaas)  Community clouds  Work load movement
 Network as a service (Nass)  Hybrid clouds  Multi Tenancy.
 Communication as a service (Caas)

Advantages: Disadvantages:
 Cost Efficient.  Technical Issues.
 Easy access to  Security Issues.
Information.  Prone to Attacks.
 Unlimited Storage.
 Backup and recovery.
 Integration.
 Quick deployment

5. BUSINESS PROCESS MANAGEMENT & IT


1. Explain typical life cycle of an accounting transaction?

LIFE CYCLE OF AN ACCOUNTING TRANSACTION

Source Journals Ledger Trial Balance


Document

Financial Closing Adjusted


Statements Adjustments
Entries Trial Balance

2. Explain typical life cycle of a sales transaction?

LIFE CYCLE OF SALES TRANSACTION

Customer Recording Pick Shipping


order Release

Reconciliation Receipt Invoice

3. Explain typical life cycle of a Purchase transaction?

LIFE CYCLE OF PURCHASE TRANSACTION

Purchase Request Quotation


requisition for Quote

Purchase
Payments Receipts Order

IPCC |35e |Flow charts_ Information Technology 28


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com
4. Explain about Data Flow diagram?

Data flow Diagrams

Meaning Major components Symbols:


 Entity  Process - (or)
DFD is a graphical representation of the flow of
data through an information system.  Process
 Attribute – (or)
Types of DFD: Physical data flow and logical  Data Store
data flow  Data Flow  Entity –

 Data Flow -

Advantages: Limitations:
 It aids in describing boundaries of system.  Creates little confusion
 Easy to recognize.  Takes long time to create.
 Easy to communicate.  Physical considerations
 Easy to understand. are left out.
 Displays flow of data in a system.

5. Write short notes on Decision tables?

Decision Tables

Definition Advantages Limitations


 Tabular representation of program logic  Easy to draw  All programmers may not be
 Displays all conditions and the  Simplicity familiar with Decision tables.
appropriate actions to be taken for set of  Modularity  Sometimes flow charts may be
conditions  Non-technical better
Model of Decision Table  Compact  Many not give complete picture of
documentation the situation.
Condition Condition Entries
stub(s)
Action stub(s) Action Entries

6. Explain about E-R diagram?

E-R Diagrams

Meaning Types of Relationships Symbols:


An Entity-Relationship diagram is a data  One to one (1:1)  Entity -
modeling technique that creates a graphical  One to many (1:N)
representation of the entities and  Many to one (M:1)  Attribute –
relationships between them.  Many to many (M:N)
 Key attribute – xyz

 Relationship -

Advantages: Disadvantages:
 Simple and Easily understood  Ambiguities.
 Helps in Physical database creation  Misinterpretations
 Helps in database design.
 Gives high level description of system.

IPCC |35e |Flow charts_ Information Technology 29


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

7. Write short notes on Decision trees?

Decision Trees

Definition Advantages Limitations


It is a decision support tool that uses tree like  Simple to understand & interpret Becomes very complex if many
model of decisions and their possible  Possible scenarios can be added values are uncertain and/or if
consequences, including chance, event  Worst, best and expected values many outcomes are linked.
outcomes, resource costs and utility. can be determined

MODEL OF DECISION TREE

8. Write about Six Sigma model?

Six Sigma Model

Six Sigma Employs quality management and Phases:


statistical analysis of process outputs by  Define
removing defects and minimizing variability in  Measure
manufacturing and business processes
 Analyze
 Improve
 Control

9. Write about TQM model

TQM Model
(Incremental Approach)

It is a comprehensive and structured approach to Phases:


organizational management that seeks to (i) Plan
improve the quality of products and services (ii) Do
through ongoing refinements in response to
(iii) Check
continuous feedback.
(iv) Act

10. Write about Business Process Re-engineering?

BPR Model (Radical approach)

Phases:
It is defined as the fundamental rethinking and
radical redesign of processes to achieve dramatic i) Fundamental rethinking
improvement, in the terms of performance such as ii) Radical redesign
cost, quality, service and speed. iii) Dramatic achievement

IPCC | 35e |Flow charts_ Information Technology 30


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com
11. Write short note on Flowcharts.

Flowchart

Meaning Categories Symbols:


A flowchart is a diagram prepared by the  System outline  Start/End -
programmer of the sequence of steps charts
involved in solving a problem  System flowcharts  Input / Output -
 Run flowcharts
 Program flowcharts  Process -

 Decision box

Advantages: Limitations:
 Effective Analysis  When logic is complex flow chart becomes
 Improved Communication. more complex.
 Helps in Documentation.  For modifications complete redrawing is
 Helps in coding. necessary.
 Helps in tracing bugs / errors.  Reproduction in computers may be difficult.
 Quick grasp of relationships.

12. Write about BPM – Life cycle?

1. Analysis

BPM Life Cycle 2. Design


5. Optimize It establishes a sustainable process
management capability that Empowers
organization to Embrace and manage 3. Implementation
process changes successfully.

4. Run & Monitor

13. Explain the Benefits and Risks of IT in BPMS?

Benefits and Risks of IT in BPMS

Benefits: Risks:
 Automating repetitive business processes.  Technological problems.
 Operational savings.  Break down in gap analysis.
 Software can be made by loose coupling with  Failure to identify future business needs.
existing processes.  IT may be complicated or not flexible.
 Freeing up of employee time.  Deficient project management.
 Reduction in administration involved in  Limited options for customization.
compliance and ISO activities.  Inadequate assessment of need for change management.

Copyrights Reserved

To MASTER MINDS , Guntur

THE END

IPCC | 35e |Flow charts_ Information Technology 31


CA - IPCC
COURSE MATERIAL
Quality Education
beyond your imagination...

PART B - 2 MARK QUESTIONS / DEFINITIONS

Cell: 98851 25025 / 26


Visit us @ www.mastermindsindia.com Mail: mastermindsinfo@ymail.com
Facebook Page: Masterminds For CA Youtube Channel: Masterminds For CA

Page 32
MASTER MINDS No.1 for CA/CMA & MEC/CEC
1. TELECOMMUNICATIONS AND NETWORKS
‘A’ Category
1. Computer Network 2. 3 – tier C/S architecture (MAY15 – 2M)
It is a collection of computers and terminal devices a) Presentation Tier: Occupies the top level
connected together by a communication system. and displays information related to services
a) The set of computers may include large-scale available on a website.
computers, medium scale computers, mini b) Application Tier: Also called the middle tier. It
computers and micro computers. controls application functionality by performing
b) The set of terminals may include dumb detailed processing.
terminals, intelligent terminals and so on. c) Data Tier: Houses database servers where
information is stored and retrieved.
4. Telecommunication Control Software or
3. Protocol (SM, PM, RTP MAY-15)
Telecommunications Software (SM)
It is a formal set of rules for communicating, It consists of programs that control and manage
including rules for timing of message exchanges, the functions of telecommunication networks and
the types of electrical connections used by the include Telecommunication Monitors, Network
communications devices, error detection, and Operating Systems, Network Management
means of granting access to communication Components and Communication Packages
channels and so on.
5. Router (PM, RTP - NOV 14) 6. Modem (SM, PM, MTP - MAY 16)
a) Router is a communication processor that a) It is a device that converts a digital computer
interconnects networks based on different signal into an analog signal (i.e. it modulates
rules or protocols, so that a telecommunication the signal) and converts an analog signal into
message can be routed to its destination. a digital computer signal (i.e. it demodulates
b) Routers perform the "traffic directing" functions the signal) in a data communication system.
on the Internet b) Modems are generally classified by the
amount of data they can send in a given unit of
time, usually expressed in bits per second
7. Multiplexer
8. Bridge (PM)
(SM, PM, MTP-OCT 14, RTP-NOV 14)
a) It is a communications processor that allows a a) Bridge is a communication processor that
single communications channel to carry connects number of Local Area Networks
simultaneous data transmissions from many (LAN).
terminals. b) It magnifies the data transmission signal while
b) Typically, a multiplexer merges the passing data from one LAN to another.
transmissions of several terminals at one end
of a communications channel, while a similar
unit separates the individual transmissions at
the receiving end.
9. MAN 10. WAN (SM)
a) MAN is a digital communication system which a) WAN is a digital communication system which
interconnects different sites, computers and interconnects different sites, computers and
user terminals that are spread over a user terminals that are spread over a wide
metropolitan city. area (a state, a country or even world wide).
b) A Metropolitan Area Network is some where b) It is a commercial data network that provides
between a LAN and a WAN. data communication services for business and
c) Cable Television networks are best examples. government agencies.
11. VPN (SM, NOV 14 – 2M, MTP – MAY16) 12. LAN (SM)
a) It is a private network that uses a public A communications network that typically connects
network to connect remote sites or users computers, terminals, and other computerized
together in a secured manner through a devices within a limited physical area such as an
firewall and other security features. office, building, manufacturing plant, or other work
b) VPNs can be one of two types: Intranet-based site.
and extranet-based.
IPCC |35e |Fast Track Material in Information Technology 33
MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

13. Repeaters (PM, MTP-FEB 15) 14. HUB (PM)


a) Repeater is a communication processor that a) It is a port-switching communication
boosts or amplifies the signal before passing it processor. This allows for the sharing of the
to the next section of cable in a network. network resources such as servers, LAN
b) A telephone repeater is an amplifier in a workstations, printers, etc.
telephone line, an optical repeater is an b) It has multiple input/output ports.
optoelectronic circuit that amplifies the light c) A hub works at the physical layer of the OSI
beam in a optical fiber cable; and a radio model.
repeater is a radio receiver and transmitter
that retransmits a radio signal.
16. Business Values of Extranet
15. Switches (PM, RTP-MAY 15)
(MAY15 – 2M)
a) It is a communication processor that makes a) Extranet enables a company to offer new
connections between telecommunication kinds of interactive web enables service to
circuits in a network so that a their business partners.
telecommunication message can reach its b) Extranets enable and improve collaboration by
intended destination. a business with its customers and other
b) It is a temporary point to point connecting business partners.
device which can be able to transfer data from c) Extranet facilitates an online, interactive
source to intended destination. product development, marketing and customer
focused process that can bring better
designed products to market faster.
17. TCP/IP (RTP-NOV 14) 18. Network Interface Card (PM)
a) TCP / IP is a protocol used on the Internet. a) NIC is a computer hardware component that
TCP/IP creates a packet-switching network. connects a computer to a computer network.
b) TCP deals with exchange of sequential data. b) It has additional memory for buffering
IP handles packet switching and is used on incoming and outgoing data packets, thus
the Internet. improving the network throughput.
19. Extranet (SM) 20. Intranet (SM, RTP-MAY 15)
a) Extranets are network links that use Internet a) An Intranet is a network inside an organization
technologies to interconnect the Intranet of a that uses Internet technologies such as web
business with the Intranets of its customers, browsers and servers, TCP/IP network
suppliers, or other business partners. protocols.
b) It is part of company’s intranet that is extended b) Intranet can also be used to facilitate working
to users outside the company. groups, video conferencing and continuous
updating of company database.
c) Intranets is the main means of intra-office
communication.
21. Threat 22. Bandwidth (SM)
A threat is anything that can disrupt the operation, a) The capacity of a communications channel as
functioning, integrity or availability of a network or measured by the difference between the
system. Network security threats can be highest and lowest frequencies that can be
categorized into following four broad themes: transmitted by that channel.
a) Unstructured threats b) It refers to a channel’s information carrying
b) Structured threats capacity.
c) External threats c) It is usually measured in terms of bits per
d) Internal threats second (bps).

24. Cryptography
23. Vulnerability (MTP-FEB 15)
(MTP-SEP 14, RTP-MAY 15)
Vulnerability is an inherent weakness in the Cryptography is the practice and study of
design, configuration or implementation of a techniques for secure communication in the
network or system that renders it susceptible to a presence of third parties. It deals with encryption
threat. and decryption of data.
IPCC |35e |Fast Track Material in Information Technology 34
MASTER MINDS No.1 for CA/CMA & MEC/CEC
25. Firewalls (PM, RTP-NOV 14) 26. Electronic commerce (SM)
a) Firewall is a device that forms a barrier a) It is the process of doing business
(fence) between a secure and an open electronically.
environment. b) It involves automation of a variety of business-
b) It acts as a system or combination of systems to-business and business-to-customer
that enforces a boundary between more than transactions through reliable and secure
one networks. connections.
27. Network Server (SM) 28. Server (SM, PM)
a) A network server is a computer system, which
a) In client-server architecture, a server is a
is used as the central repository of data and
computer Program running to serve the
various programs that are shared by users in a
requests of other Programs, called the ‘clients’
network.
b) Typical computing servers are database
b) LANs use a powerful microcomputer with a large
servers, file servers, mail servers, print
disk capacity as a file server or network server.
servers, web servers, game servers, and
c) The server handles resource sharing and
application servers
telecommunications.
29. Hyper Text Transfer Protocol Secure 30. Intrusion Detection System
(MTP - FEB 15, OCT 14, MAY 16) (RTP-MAY 15)
a) HTTPS is a communications protocol for
secure communication over a computer a) An IDS is a device or software application that
network, with especially wide deployment on monitors network or system activities for
the Internet. malicious activities or policy violations and
b) The security of HTTPS uses long term public produces reports to a Management Station.
and secret keys to exchange a short term b) The goal of is to monitor network assets to
session key to encrypt the data flow between detect anomalous behavior and misuse.
client and server.
‘B’ Category
32. Communication Satellites
31. Telecommunications Processors (SM)
(SM, MTP-MAY 16)
a) A satellite is some solar-powered electronic
a) Telecommunications Processors support data
device that receives, amplifies, and
transmission and reception between terminals
retransmits signal.
and computers by providing a variety of control
b) They are used extensively for high-volume as
and support functions.
well as long-distance communication.
b) Multiplexers, concentrators, communications
c) It is cost-effective method for moving large
controllers, and cluster controllers are some of
quantities of data over long distances.
the examples.

33. Telecommunications Media (SM) 34. Simplex Connection: (MTP-SEP 14)


a) Telecommunications medium/media is a path a) A simplex connection is a connection in which
between the sender and the receiver that the data flows in only one direction, from the
carries the data in the form of signals. transmitter to the receiver.
b) They include, twisted- pair wire, coaxial b) This type of connection is useful if the data do
cables, fiber optic cables, terrestrial not need to flow in both directions (for
microwave, communications satellite, cellular, example, from your computer to the printer or
and infrared systems. from the mouse to your computer.).
35. Secure Shell (SSH) (MTP-MAY 16) 36. Scalability (SM)
a) Secure Shell is a program to log into another
a) Scalability is the ability of a system, network,
computer over a network, to execute
or process to handle a growing amount of
commands in a remote machine, and to move
work in a capable manner or its ability to be
files from one machine to another.
enlarged to accommodate that growth.
b) It provides strong authentication and secure
b) For example, it can refer to the capability of a
communications over insecure channels.
system to increase its total output under an
c) SSH protects a network from attacks such as
increased load when resources (typically
IP spoofing, IP source routing, and Domain
hardware) are added.
Name System (DNS) spoofs.

IPCC | 35e |Fast Track Material in Information Technology 35


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

37. Resilience (RTP-NOV 15) 38. Routing (SM)

a) It refers to the ability of a network to recover


from any kind of error like connection failure, a) Refers to the process of deciding on how to
loss of data etc. communicate the data from source to
b) Computer networking community defines destination, in a network.
Resiliency as the combination of b) Routing schemes differ in their delivery
trustworthiness (dependability, security, semantics: unicast, broadcast, multicast,
performability) and tolerance (survivability, anycast, geocast.
disruption tolerance, and traffic tolerance)

39. Serial Transmission 40. Parallel Transmission

a) In serial transmission bits of each byte are a) In this all the bits of each byte are transmitted
transmitted one after the other along a single simultaneously i.e. each bit will have a unique
path. Example –Serial port. channel dedicated to it.
b) It can occur in any of the two ways - b) Example – Parallel port being used for
Asynchronous & Synchronous transmission. printers.

41. Secure Socket Layer


42. Mobile Commerce (RTP-NOV 14)
(MTP SEP-15. MAY 16-2M)

a) It is essentially a protocol that provides a secure a) M-Commerce is about the explosion of


channel between two machines operating over applications and services that are becoming
the Internet or an internal network. accessible from Internet-enabled mobile
b) The SSL protocol is typically used when a web devices.
browser needs to securely connect to a web b) M-commerce is the buying and selling of
server over the inherently insecure Internet. goods and services through wireless handheld
c) In practice, SSL is used to secure online credit devices such as cellular telephone and
card transactions, system logins and any Personal Digital Assistants (PDAs).
sensitive information exchanged online, to
secure webmail and applications

‘C’ Category
43. Network Architecture (SM) 44. Network Operating System (SM)

a) An operating system oriented to computer


a) It refers to the layout of the network, consisting
networking, to allow shared file and printer
of the hardware, software, connectivity,
access among multiple computers in a
communication protocols and mode of
network, to enable the sharing of data, users,
transmission, such as wired or wireless.
groups, security, applications, and other
b) The diagram of the network architecture networking functions.
provides a full picture of the established
b) It is a program that is used to control
network with detailed view of all the resources
telecommunications and the use of and
accessible.
sharing of network resources.

45. Radio Waves (MTP-MAR 15) 46. Electronic Mail (e-mail) (SM)

a) Radio waves are an invisible form of


a) The computer-to-computer exchange of
electromagnetic radiation that varies in
messages in an electronic format through a
wavelength from around 1 millimeter to 1,00,
mail server.
000kms.
b) Examples are Gmail, Yahoomail, Rediffmail,
b) These are commonly used transmission media
Hotmail etc.
in Wireless Local Area Networks.

IPCC |35e |Fast Track Material in Information Technology 36


MASTER MINDS No.1 for CA/CMA & MEC/CEC
47. Cryptographic Controls
48. Micro Waves: (RTP- MAY 16)
(MTP – MAY 16, MAY16 – 2M)
a) Cryptographic Controls are designed to protect a) Microwaves are radio waves with wavelengths
the privacy of data and to prevent ranging from as long as one meter to as short
unauthorized modifications of data. as one millimeter, or equivalently, with
b) Cryptography achieves this goal by scrambling frequencies between 300 MHz (0.3 GHz) and
data into codes (cryptograms) so that it is 300 GHz.
Meaningless to anyone who does not possess b) These are used for communication, radar
the authentication to access the respective systems, radio astronomy, navigation and
system resource or file. spectroscopy.

2. INFORMATION SYSTEMS AND IT FUNDAMENTALS

‘A’ Category
1. Information System (RTP-MAY 15) 2. Random Access Memory (RAM) (SM)

a) It is a set of interrelated components working a) This is Read Write memory.


together to collect, retrieve, process, store and
b) Information can be read as well as modified
disseminate (distribute) information for the
(i.e. write).
purpose of achieving objectives such as
planning, coordination, analysis and decision c) This is a Volatile memory. Volatile in nature
making. means Information is lost as soon as power is
turned off.
b) Generally called as Management Information
System (MIS) or Computer Based Information d) Types of RAMs: Dynamic RAM and Static
System (CBIS). RAM

3. Read Only Memory (SM, RTP- MAY 16) 4. CPU (SM)

a) ROM is non-volatile in nature. a) The brain of a computer, is the actual


b) These are used to store small amount of hardware that interprets and executes the
information for quick reference by CPU. program instructions and coordinates how all
the other hardware devices work together.
c) Information can be read not modified.
b) It consists of three functional units: Control
d) Generally used by manufacturers to store data
unit, Arithmetic Logical unit and ‘Registers &
& Programs.
cache’.

5. Direct Memory Access (DMA) (PM) 6. Registers (SM)

a) It is a feature of modern computers that allows a) A processor often contains several kinds of
certain hardware subsystems within the registers, that can be classified according to
computer to access system memory their content or instructions that operate on
independently of the Central Processing Unit. them.
b) DMA can also be used for "memory to b) These are high speed memory units within
memory" copying or moving of data within CPU for storing small amount of data (mostly
memory. DMA can offload expensive memory 32 or 64 bits) temporarily while performing
operations. several Computations.

7. Non-Volatile Memory 8. Memory Controller (PM)

a) Some memory chips always retain the data a) It is a digital circuit which manages the flow of
they hold even when the computer is turned data going to and from the computer's main
off. memory.
b) This type of memory is called non-volatile. b) A memory controller can be a separate chip or
(e.g. ROM). integrated into another chip.

IPCC |35e |Fast Track Material in Information Technology 37


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

9. Application Software (MTP-SEP 14, MAY 16) 10. Volatile Memory


a) Computer software designed to help the user
to perform specific tasks.
b) Application software includes all those a) The memory which loses their contents when
computer software that cause a computer to the computer's power is turned off. E.g. RAM
perform useful tasks beyond the running of the b) It requires constant power to maintain the
computer itself. stored information. Volatile memory is typically
c) It is designed for specific computer application. used only for primary storage.
For example, a program that prepares payroll
for a business is an application program.
11. System Software (SM) 12. Computer Bus (PM, MTP-FEB 15)
a) Computer (system) software designed to
A communication system that transfers data
operate the computer hardware and to provide
between components inside a computer or
and maintain a platform for running application
between computers that covers all related
software.
hardware components (wire, optical fiber, etc.) and
b) System software is essential for the
software, including communication protocol.
development of application software.
a) Computer bus is also termed as System Bus.
c) The purpose of system software is to insulate
b) Computer Bus = Address bus + Data bus +
the application programmer as much as
Control bus
possible from the details of the computer.
13. Multiprocessing (PM) 14. Electronic Data Interchange (EDI) (SM)
a) Multiprocessing is the use of two or more a) The direct computer-to-computer exchange
Central Processing Units (CPUs) within a between two organizations of standard
single computer system to allocate tasks business transaction documents.
between them. b) EDI can be formally defined as the transfer of
b) In a multiprocessing system, all CPUs may structured data, by agreed message
be equal, or some may be reserved for special standards, from one computer system to
purposes. A combination of hardware and another without human intervention.
operating system software design
considerations determine the symmetry (or
lack thereof) in a given system.
15. Cache Memory (SM, RTP-NOV 14) 16. Client/Server Networks (SM)
a) A computing environment where end user
a) It is a memory that lies in the path between the workstations (clients) are connected to micro
processor and the RAM, which a computer or mini LAN (servers) or possibly to a
microprocessor can access more quickly than mainframe (super server).
it can access regular RAM.
b) Cache depends on locality of reference that b) Clients and servers exchange messages in
improves effective memory access time in a a request–response messaging pattern: The
computer. client sends a request, and the server returns
a response. This exchange of messages is an
example of inter-process communication.
17. Machine Cycle 18. Computer Networks (SM,RTP-MAY 15)
a) Machine cycle = Fetch + Decode + Execute + a) It is a collection of computers and other
Store hardware interconnected by Communication
b) Fetch and decode are done by Control Unit channel that allow sharing of resources and
(CU) whose job is to understand and explain information.
to Arithmetic Logic Unit (ALU). ALU is used to b) Each component, namely the computer or a
execute and results are stored in Register. hardware device in a computer network is
called a 'Node'.
c) Used to exchange of data among different
computers and also used to share the
resources.

IPCC |35e |Fast Track Material in Information Technology 38


MASTER MINDS No.1 for CA/CMA & MEC/CEC
19. Hardware Virtualization (PM) 20. Mobile Computing (SM)
a) Hardware Virtualization or Platform a) It is the use of portable computing devices
Virtualization refers to the creation of a virtual (such as laptop and handheld computers), in
machine that acts like a real computer with an conjunction (combination) with mobile
operating system. communications technologies, to enable users
b) Software executed on these virtual machines to access the Internet and data on their home
is separated from the underlying hardware or work computers, from anywhere in the
resources. world.
b) It is enabled by use of mobile devices such as
PDA, laptops, mobile phones, smart phones,
tablet PC and Palmtops on a wireless network.
21. Smart Phone (SM) 22. Touchpad (SM)
a) It is a pointing device featuring a tactile
a) A mobile phone built on a mobile operating
sensor, a specialized surface that can
system, with more advanced computing
translate the motion and position of a user's
capability connectivity than a feature phone.
fingers to a relative position on screen.
b) These handheld devices integrate mobile
b) It is a common feature of laptop computers,
phone capabilities with the more common
and also used as a substitute for a mouse
features of a handheld computer or PDA.
where desk space is limited.
c) Modern devices include high-resolution touch
c) These operate in one of several ways,
screens and web browsers for Internet
including capacitive sensing and conductance
browsing.
sensing.
23. LAPTOP (NOTEBOOK) (SM) 24. Tablet (SM)
a) A small, portable computer and small enough a) A tablet computer, or simply tablet is a one
that it can sit on a lap. piece general-purpose computer contained in
b) Notebook (Laptop) is an extremely lightweight a single panel. Its distinguishing characteristic
personal computer. is the use of a touch screen as the input
c) Use flat-panel technologies, to produce a device.
lightweight and non- bulky display screen b) Modern tablets are operated by fingers, and a
stylus is an option, whereas earlier tablets
required a stylus.
25. Servers (Based on client/server
26. Android (SM, MTP-MAR 15)
architecture) (SM)
a) A server is a computer (Hardware) or device a) It is a Linux-based operating system designed
on a network dedicated to serve the needs of primarily for touch screen mobile devices such
the users of other computers on a network. as s and tablet computers.
b) Server performs some computational task on b) It is open source software, which allows the
behalf of ‘clients’. The clients either run on the software to be freely modified and distributed
same computer, or they connect through the by device manufacturers, wireless carriers and
network. enthusiast developers.
27. I – Pad 28. I – Pod (MAY 16-2M)
a) It is a line of tablet computers designed and a) The iPod is a line of portable media players
marketed by Apple Inc., which runs designed and marketed by Apple Inc.
Apple's iOS. b) There are four current versions of the iPod: the
b) It has built-in Wi-Fi and cellular connectivity. ultra-compact iPod Shuffle, the compact iPod
c) It can shoot video, take photos, play music, Nano, the touch screen iPod Touch, and the
and perform Internet functions such as web- hard drive-based iPod Classic.
browsing and emailing. Other functions— c) iPods can serve as external data storage
games, reference, GPS navigation, social devices. Storage capacity varies by model,
networking, etc.—can be enabled by ranging from 2 GB to 160 GB.
downloading and installing apps.

IPCC |35e |Fast Track Material in Information Technology 39


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

29. System Development Life Cycle


30. Primary Memory: (RTP-MAY 15)
(SM, MAY 15-2M)

a) It is a conceptual model used in project a) These are devices in which any location can
management that describes the stages be accessed in any order (in contrast with
involved in an information system sequential order) directly by the CPU.
development project, from an initial feasibility b) These are primarily of Two types: Random
study through maintenance of the completed Access Memory (RAM) and Read Only
application. Memory (ROM).
b) Phases are
• System Investigation
• System Analysis Copyrights Reserved

• System Designing To MASTER MINDS , Guntur


• System Implementation
• System Maintenance and Review

31. Virtual Memory 32. Bluetooth


(SM, MTP-OCT 14, MAY 16, RTP- NOV 14) (SM, RTP-NOV 14,NOV 14 – 2M)

a) Bluetooth is a wireless technology standard for


a) Virtual Memory is in fact not a separate device
exchanging data over short distances up to 50
but an imaginary memory area supported by
meters (164 feet) from fixed and mobile
some operating systems (for example,
devices, creating Personal Area Networks
Windows) in conjunction with the hardware.
(PANs) with high levels of security.
b) Virtual memory combines computer’s RAM
b) It is a feature which is used every day through
with temporary space on the hard disk.
a number of compatible devices.

33. Operating System (SM, RTP-NOV 14) 34. WI-FI (SM, MTP-FEB 15)

a) OS is a set of computer Programs that a) Wi-Fi is a popular wireless networking


manages computer hardware resources and technology that uses radio waves to provide
acts as an interface with computer applications wireless high-speed Internet and network
Programs. connections and have limited range.
b) The operating system is a vital component of b) Wi-Fi networks use radio technologies called
the system software in a computer system. 802.11 to provide secure, reliable, fast
wireless connectivity.
c) A Wi-Fi network can be used to connect
electronic devices to each other, to the
Internet, and to wired networks (which use
Ethernet technology).

‘B’ Category
35. Instruction Set Architecture (ISA) 36. Micro architecture
(SM, MTP-SEP 14, RTP-MAY 15) (SM, MTP-OCT 14, MAY 16)

a) It, also known as Computer Organization. It is


a) It is the abstract model of a computing system
a lower level detailed description of the system
that is seen by a machine language
that is sufficient for completely describing the
programmer, including the instruction set,
operation of all parts of the computing system,
memory address modes, processor registers,
and how they are inter-connected and inter-
and address and data formats.
operate in order to implement the ISA.
b) The ISA basically deals with what the chip
b) It is a term used to describe the resources and
does. It's a sort of 'bridge' between software
methods used to achieve architecture
and hardware.
specification.

IPCC |35e |Fast Track Material in Information Technology 40


MASTER MINDS No.1 for CA/CMA & MEC/CEC
37. Mobile Software: (RTP-NOV 15) 38. Mobile Hardware: (RTP-MAY 15)

a) Mobile Software is the actual program that a) Mobile Hardware includes mobile devices or
runs on the mobile hardware. device components that receive or access the
b) It deals with the characteristics and service of mobility.
requirements of mobile applications and is the b) They would range from Portable laptops,
engine of that mobile device. Smart phones, Tablet PC’s to Personal Digital
c) In other terms, it is the operating system of Assistants (PDAs).
that appliance. c) These devices will have receptors that are
d) It is the essential component that makes the capable of sensing and receiving signals.
mobile device operates. d) These devices are configured to operate in full-
duplex, whereby they are capable of sending
and receiving signals at the same time.

39. Key benefits of BPA (MAY 15-2M) 40. Database model (SM)

a) Reducing the Impact of Human Error a) A database model is a type of data model that
b) Transforming Data into Information determines the logical structure of a database
and fundamentally determines in which
c) Improving performance and process
manner data can be stored, organized and
effectiveness
manipulated.
d) Making users more efficient and effective
b) Examples are
e) Making the business more responsive:
 Hierarchical Database Model,
f) Improving Collaboration and Information
Sharing
 Network Database Model,
 Relational Database Model, and
 Object oriented Database Model
41. Database Management Systems
42. Primary Key: (MTP – MAY 16)
(RTP – MAY 16)

a) (DBMS) are software that aid in organizing,


controlling and using the data needed by the a) A key that can be used to uniquely identify a
application program. row in a table is called a Primary Key.
b) They provide the facility to create and maintain b) Keys are commonly used to join or combine
a well-organized database. Applications data from two or more tables.
access the DBMS, which then accesses the
c) Keys are also critical in the creation of
data.
indexes, which facilitate fast retrieval of data
c) Commercially available Data Base from large tables.
Management Systems are Oracle, My SQL,
SQL Servers and DB2 etc.

‘C’ Category

43. Cathode-Ray Tube (CRT) 44. Liquid Crystal Display (LCDs)

a) A vacuum tube that uses an electron gun


a) A low-powered display technology used in
(cathode) to emit a beam of electrons that
laptop computers where rod-shape crystal
illuminate phosphors on a screen as the beam
molecules change their orientation when an
sweeps across the screen repeatedly. A
electrical current flows through them.
monitor is often called a CRT
b) LCDs are used in a wide range of applications
b) Here an Electron beam is controlled by
including computermonitors,televisions, instru
Horizontal and vertical plates/coils and are
ment panels, aircraft cockpit displays, clocks,
focussed on the screen (Phosphor coated
watches and calculators.
screen).
c) They consume very less power and are
c) The size of CRTs are huge and consume
portable to CRTs.
more power than LCDs & LEDs.

IPCC |35e |Fast Track Material in Information Technology 41


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

45. Laser Printer 46. Ink-jet Printer


a) A printer that makes images by forcing ink
a) A printer that forms images using an
droplets through nozzles.
electrostatic process, the same way a
b) Here there is no direct contact between the
photocopier works.
printer’s print head and paper.
b) Laser is the heart of these printers. A separate
c) These are generally used in Digital colour labs
CPU is built into the printer to interpret the
for printing Photographs and images on a
data and to control the Laser beam.
specialized paper.
c) Laser printers can print alphanumeric
d) Types of Inkjet Printers: Liquid Inkjets and
characters, high quality images, graphs, etc.
Solid Inkjets.
47. Plotter 48. Speakers
a) A graph plotter is a device capable of tracing a) Speakers are general audio output devices;
out graphs, designs and maps onto paper and contain small amplifiers to boost up the audio
even on plastic or metal plates. High degree of information.
accuracy can be achieved, even upto one b) Speakers are connected to the sound card on
thousandth of an inch. the motherboard.
b) It is more software dependent than any other c) Speakers contain a magnet which moves back
peripheral device and it needs much more and forth with the changing current, creating
instructions than a printer. vibrations called sound.

3. BUSINESS INFORMATION SYSTEMS


‘A’ Category
1. Knowledge Management System
2. System
(SM, MTP-FEB 15)
a) The system is a set of mutually related,
a) KMS refer to a system for managing knowledge
coordinated elements or components that
in organizations for supporting creation,
operate together to accomplish objectives by
capture, storage and dissemination of
taking inputs and producing outputs in an
information.
organized manner.
b) It enables employees to have ready access to b) A system contains several subsystems
with sub
the organizations documented base of facts,
goals, all contributing to meet the overall
sources of information and solutions.
system goal.
3. Tacit knowledge 4. Atomicity
a) Tacit knowledge, resides in a few often-in just
one person and hasn’t been captured by the a) Atomicity requires that each transaction is "all
organization or made available to others. or nothing": if one part of the transaction fails,
b) Tacit knowledge is unarticulated and the entire transaction fails, and the database
represented as intuition, perspective, beliefs, state is left unchanged.
and values that individuals form based on their b) An atomic system must guarantee atomicity in
experiences. each and every situation, including power
c) For example – hand-on skills, special know- failures, errors, and crashes.
how, employee experiences.
5. Online Analytical Processing (OLAP)
6. Analytical CRM (SM)
(SM, PM)
a) OLAP is a multi-dimensional analytical tool a) Analytical CRM comprises the analysis and
typically used in data mining, that gathers and systematic evaluation of customer data using
process vast amounts of information into useful business intelligence functions.
packets.
b) The aim is to filter out the key facts from
b) OLAP is part of the broader category of gathered information and gain customer
business intelligence, which also encompasses knowledge.
relational database, report writing and data
mining

IPCC |35e |Fast Track Material in Information Technology 42


MASTER MINDS No.1 for CA/CMA & MEC/CEC
7. Durability 8. Model base
a) It is the “brain” of the Decision Support System.
Durability means that once a transaction has been b) It processes data with the help of data provided
committed or saved, it will remain so, even in the by the user and the database.
event of power loss, crashes, or errors. c) The analysis provided by model base is the key
for user’s decision.
9. MS Office Applications: (MTP-SEP 14) 10. Nucleus FinnOne: (MAY 16-2M)

a) FinnOne is a web-based global banking product


a) These are various office automation systems designed to support banks and financial
made available by Microsoft Corporation which solution companies in dealing with assets,
include MS Word, MS Excel, MS PowerPoint, liabilities, core financial accounting and
MS Access, etc. customer service.
b) Each of these software help to achieve b) The solution is wholly focused on banking and
automation of various tasks in the office. financial services spanning across solutions in
c) It has features such as customized ribbon, back the areas of Retail & Corporate Banking, Cash
stage view, built-in graphics toolset, enhanced Management, Relationship Banking, Financial
security, etc. CRM, Credit Risk & Appraisal, EAI, Internet
Banking, FX, Basel II, Data warehousing and
Analytics.
11. Credit Cards 12. Smart Cards (MTP-OCT 14, MAY 16)
a) A credit card is a plastic card issued by a
a) Smart cards have an embedded microchip
financial institution that allows its user to borrow
instead of magnetic strip.
pre-approved funds at the point of sale in order
to complete a purchase. b) The chip contains all the information a magnetic
strip contains but offers the possibility of
b) Credit cards have a credit limit -- the user can
manipulating the data and executing
borrow during a given period.
applications on the card.
c) The credit limit is pre-determined by the card
c) Three types of smart cards are Contact cards,
issuer based on the cardholder's credit rating
Contact-less and Hybrid cards.
and credit history
13. Enterprise Resource Planning System (SM) 14. Supply Chain Management
a) An ERP system is a fully integrated business
a) SCM is the process of planning, implementing
management system, covering functional areas
and controlling the operations of the supply
of an enterprise like Procurement, Inventory,
chain with the purpose to satisfy customer
Production, Sales, Logistics, Finance, requirements in an efficient way.
Accounting and Human Resources.
b) It covers all movements and storage of raw
b) It organizes and integrates operation processes
materials, work-in-process, and finished goods
and information flows to make optimum use of from point-of-origin to point-of-consumption.
resources such as men, material, money and
c) It integrates supply and demand management,
machine, i.e. ERP is the way an Enterprise plans
the optimum use of its resources. within and across companies.
15. Artificial Intelligence
16. Knowledge base
(SM, RTP-NOV 14, MTP-MAR 15)
a) AI is the distinct area of computer science
a) This includes data, knowledge, relationships,
focusing on creating machines that tries to
rules of thumb (heuristics) and decision rules
imitate aspects of human behavior, such as to
used by experts to solve a particular type of
reason, communicate, see, and hear.
problem.
b) AI software can use its accumulated knowledge
b) A knowledge base in a computer is equal to the
to reason and in some instances learn from
knowledge of an expert or group of experts
experience and thereby modify its subsequent
developed through years of experience in their
behavior.
field.
c) Expert systems, Pattern recognition, Natural
c) The knowledge base encloses both realistic
language processing, and many other areas
and heuristic knowledge.
where AI can be applied.

IPCC |35e |Fast Track Material in Information Technology 43


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

17. Consistency 18. Isolation


Consistent state means that there is no violation of Transactions must appear to take place in isolation
any integrity constraints. If an integrity constraint or individual. Isolation requires that multiple
states that all transactions in a database must have transactions occurring at the same time not impact
a positive value, any transaction with a negative each other’s execution.
value would be refused.
19. Electronic purses 20. CRM (MTP-OCT 14)
a) Electronic purse is very similar to a pre-paid a) It includes the methodologies, technology and
card where funds can be directly deducted from capabilities that help an enterprise to manage
the Card to vendor’s POS terminal. customer relationships.
b) When the value on a card is spent, consumers b) Allows businesses to develop long-term
can load additional funds from their accounts to relationships with established and new
the card. customers, while helping to modernize
c) Validation is done through a PIN. corporate performance.
21. Extensible Business Reporting Language
22. Knowledge management (KM) (SM, PM)
(PM, MTP-FEB 15, MTP-MAY 16)
a) XBRL is freely available international
a) It is the process of capturing, developing,
standards-based business reporting language
sharing, and effectively using organizational
developed by accountants for financial
knowledge.
reporting.
b) XBRL is a standards-based way to
b) It refers to a multi-disciplined approach to
achieving organizational objectives by making
communicate and exchange business
the best use of knowledge.
information between business systems.
23. Explicit knowledge 24. Information (RTP-NOV 15)
a) Explicit knowledge is that which can be a) Processing of data is known as information
formalized easily and as a consequence is b) Data is a raw fact and can take the form of a
easily available across the organization. number or statement, such as a date or a
b) For example – Online tutorials, Policy and measurement, which has some meaning.
procedural manuals.
25. Special Purpose Planning languages 26. General Purpose Planning languages
(PM, MTP-MAY 16) (PM, MTP-MAY 16)
a) These allow users to perform many routine
a) These are more limited in what they can do, but tasks, retrieving various data from a database
they usually do certain jobs better than the or performing statistical analyses.
general purpose planning languages. b) These languages enable user to tackle abroad
b) Some of the statistical languages such as SAS range of budgeting, forecasting and other
and SPSS are examples. worksheet-oriented problems.
c) Examples are Electronic spreadsheets.
‘B’ Category
27. Business Information System 28. Transaction Processing System
(PM,RTP-NOV 14) (SM, MTP-OCT 14, MTP-MAY 16)
a) A TPS is a type of information system that
a) It is defined as system integrating business collects, stores, modifies and retrieves the day-
functions and information modules for to-day data transactions of an enterprise.
establishing effective communication channels
which are useful for making timely and accurate b) TPS systems are designed to process
decisions and in turn contribute to transactions instantaneously to ensure that
organizational productivity and competitiveness. customer data is available to the processes that
require it.
b) BIS may be defined as systems which integrate
information technology, people and business. c) TPS is also known as transaction processing or
real time processing.

IPCC |35e |Fast Track Material in Information Technology 44


MASTER MINDS No.1 for CA/CMA & MEC/CEC
29. Frame based Expert systems (SM) 30. Rule-based systems (SM)
a) Rule-based systems are created by storing data
Frame based systems organize all the information and decision rules as if-then rules. The system
(data, description, rules etc.) about a topic into asks the user questions and applied the if-then
logical units called frames, which are similar to rules to the answers to draw conclusions and
linked records in data files. Rules are then make recommendations
established about how to assemble or inter-relate b) Rule-based systems are appropriate when a
the frames to meet the user’s needs. history of cases is unavailable or when a body
of knowledge can be structured within a set of
general rules.
31. Oracle's FLEXCUBE (SM) 32. Oracle FLEXCUBE Benefits (SM)
a) Oracle FLEXCUBE helps banks transform their Oracle FLEXCUBE empowers universal banks with:
business model from disparate operations a) Superior Web experience through self-service
towards centralization of key functions, such as and assisted channels
accounting, customer information, and
management information. b) Improved bank staff productivity with intuitive,
b) The centralization of operations is further role-based dashboards
augmented by role based dashboards that c) Comprehensive transaction banking capabilities
guide business users to take action on critical and Straight-Through-Processing (STP)
tasks, track their pending activities, and get d) Improved risk management and reporting
insights into customer information and
interaction.
c) The application also provides comprehensive
product processing capabilities to cater to
various lines of business.
‘C’ Category
33. Business Process
34. Desktop Publishing (SM, RTP – MAY 16)
(SM, PM, MTP-MAR 15)
The Desktop Publishing systems are often
A Business Process is a collection of related, supported with laser printers, inkjet printers,
structured activities or tasks that produce a specific scanners and other such devices for producing
service or product (serve a particular goal) for a good quality documents. The desktop publishing
specific organization. systems help in quick production of multiple copies
of the document with quality printing.
35. Customer Relationship Management 36.Strategic-Level Systems: (RTP-NOV 15)
Systems (SM)
a) Information systems that track all the ways in a) These are the systems for strategic managers
which a company interacts with its customers to track and deal with strategic issues, assisting
and analyze these interactions to optimize in long-range planning.
revenue, profitability, customer satisfaction, and b) A principle area is tracking changes in the
customer retention. external conditions (market sector, employment
b) These are specialized applications catering to levels, share prices, etc.) and matching these
the need of organizations largely in FMCG with the internal conditions of the organization.
(Fast-Moving Consumer Goods) categories.
37.Old Pareto Rule “80/20 Rule - CRM
38. Human Resources Management System
(SM,MTP-SEP 15)
a) Old Pareto Rule "80/20 rule" emphasizes that
most organizations find that approximately 20% of
a) A software application that coalesce many
their customer base generates 80% of the profits.
human resources functions, together with
b) It is merely based on the philosophy that
benefits administration, payroll, recruiting and
indicates that old trustworthy customers are
training, and performance analysis and
most lucrative and helps in generating profits.
assessment into one parcel.
c) It is at the present imperative that businesses
b) HRMS refers to the systems and processes at
make out the noteworthy characteristics of this
the intersection between Human Resource
assemblage, keep hold of these exceedingly
Management and Information Technology.
desirable customers, and discover ways to
augment the size.

IPCC |35e |Fast Track Material in Information Technology 45


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

39. Infosys’ Finacle (SM) 40. Key Modules Of Finacle (SM)


a) Finacle core banking solution is a a) Enterprise customer information
comprehensive, agile, componentized yet b) Consumer banking
integrated business solution, addressing all the c) Corporate banking
core needs of banks, in easy-to-configure d) Trade finance
modules.
e) Customer analytics
b) With a 360 degree single source view into
customer accounts, banks can empower f) Wealth management
customers with relevant information an delight g) Islamic banking
them with the right offerings, presented at the h) Payments
right time through the right channel. i) Origination &
j) Dashboards
41. Example-based Expert system (SM)
a) In Example-based Expert system, developers
enter the case facts and results.
b) Through induction the ES converts the
examples to a decision tree that is used to
match the case at hand with those previously
entered in the knowledge base.

4. BUSINESS PROCESS AUTOMATION THROUGH APPLICATION SOFTWARE


‘A’ Category
1. Business Process Automation
2. TALLY
(SM, RTP-MAY 15, NOV 14-2M, MTP-MAY 16)

a) Removing the human element from existing a) It is an accounting application that helps entity
business processes by automating the to automate processes relating to accounting
repetitive or standardized process of transactions.
components. b) It also helps to achieve automation of few
b) The primary reasons for automation by processes in inventory management.
enterprises are: Cost Saving, remain c) It has features such as Remote Access
competitive, fast service to customers. Capabilities, Tax Audit and Statutory
c) Objectives are Confidentiality, Integrity, Compliance, Payroll, Excise for
Availability, Timeliness. Manufacturers, Multilingual Support, TDS,
VAT etc.

3. SAP R/3 4. Vehicle Tracking System

a) It is ERP software, which allows an entity to a) Applications allowing owner of goods to check
integrate its business processes. the temperature of cold stored goods while in
b) It has the features such as time management, transit.
reporting and analytics, budget monitoring, b) It has features such as GPS based location,
workflow approval, sales management, team GPRS connection based real-time online data-
management, leave management, travel logging and reporting, route accuracy on the
management, recruitment management and fly while device is moving, real-time vehicle
demand planning. tracking, SMS & e-mail notifications etc.
5. Information Worker Software 6. Enterprise Infrastructure Software
Addresses individual needs required to manage Provides capabilities required to support
and create information for individual projects within enterprise software systems. E.g.: email servers,
departments. E.g. Spreadsheets, CAAT Security software.
(Computer Assisted Audit Tools), etc.

IPCC |35e |Fast Track Material in Information Technology 46


MASTER MINDS No.1 for CA/CMA & MEC/CEC
7. File Management System 8. Educational Institute Management Systems
a) ICAI, itself is a good example of Educational
Institute Management Systems.
a) These allow office records to be kept in soft
b) A student based on his/her registration
copy and easy tracking of the same.
number can file many documents online
b) It has features such as web access, search,
including exam forms.
Microsoft office integration, records
c) It has features such as student’s registration,
management software, electronic forms (e-
student’s admission, fee collection, student’s
forms), calendar, etc.
attendance, result management and result
analysis.
9. Real-time Processing 10. Network Virtualization (RTP-MAY 15)
a) It is the process of combining hardware and
a) Real time processing is a subset of interactive
software network resources and network
or online processing. Input is continuously,
functionality into a single, software-based
automatically acquired from sensors.
administrative entity, a virtual network.
b) After the system is finished responding, it
b) Allows a large physical network to be
reads the next set of input data immediately to
provisioned into multiple smaller logical
process that.
networks.
c) This system doesn't need a user to control it, it
c) This behavior allows administrators to improve
works automatically.
network traffic control, enterprise and security.
11. Grid Computing 12. Online Processing
a) It is a computer network in which each a) Data is processed immediately while it is
computer's resources are shared with every entered, the user usually only has to wait a
other computer in the system. It is a special short time for a response. (Example: games,
kind of distributed computing. word processing, booking systems).
b) Processing power, memory and data storage b) Interactive or online processing requires a
are all community resources that authorized user to supply an input.
users can tap into and leverage for specific c) It enables the user to input data and get the
tasks. results of the processing of that data
c) This system can be as simple as a collection immediately.
of similar computers or as complex as inter-
networked systems.
13. Cloud Computing (SM, PM) 14. Input Controls
a) It is the delivery of computing as a service a) These are responsible for ensuring the
rather than a product, whereby shared accuracy and completeness of data and
resources, software, and information are instruction input into an application system.
provided to computers and other devices as a b) These are important since substantial time is
utility over a network (typically the Internet). spent on inputting data which involves human
b) Clouds can be classified as public, private or intervention and are therefore prone to errors
hybrid and fraud
c) The common cloud computing service models
are software as a Service (SaaS), Platform as
a Service (PaaS) and Infrastructure as a
service (IaaS).
15. ERP Software 16. Access Controls (MTP-SEPT 14)
a) Access controls are implemented with an
a) It is business management software that access control mechanism and links the
allows an organization to use a system of authentic users to the authorized resources
integrated applications to manage the they are permitted to access.
business. b) Cryptography, Passwords, Personal
b) used by entities to manage resources Identification Numbers (PIN) and Identification
optimally and to maximize the three Es i.e. Cards are some of the examples of access
Economy, Efficiency and Effectiveness controls.

IPCC |35e |Fast Track Material in Information Technology 47


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

17. Output Controls 18. Batch Processing


a) These ensure that the data delivered to users a) It is defined as a processing of large set of
will be presented, formatted and delivered in a data in a specific way, automatically, without
consistent and secured manner. needing any user intervention.
b) Whatever the type of output, it should be b) The data is first collected, and then batch-
ensured that the confidentiality and integrity of processed, so all the collected data is
the output is maintained and that the output is processed in one step.
consistent. c) Batched jobs can take a long time to process.
19. Middleware 20. Database Controls
Protecting the integrity of a database when
Middleware that allow computers that are
application software acts as an interface to interact
connected on networks to communicate with each
between the user and the database are called the
other.
update controls.
21. Software as a Service (SM, PM) 22. Virtualization (SM)
a) A software delivery method that provides
a) It is the process of creating logical computing
access to software and its functions remotely
resources from available physical resources.
as a Web-based service.
b) This is accomplished using virtualization
b) SaaS is a model of software deployment
software to create a layer of abstraction
where an application is hosted as a service
between workloads and the underlying
provided to customers across the Internet.
physical hardware.
c) By removing the need to install and run an
application on a user's own computer
‘B’ Category
23. Hardware virtualization (SM) 24. Downsizing (SM)
Hardware Virtualization or Platform Virtualization Moving to smaller computing platforms, such as
refers to the creation of a virtual machine that acts from mainframe systems to networks of personal
like a real computer with an operating system. computers and servers.
The basic idea of Hardware virtualization is to
consolidate many small physical servers into one
large physical server so that the processor can be
used more effectively.
26. Data Processing Controls:
25. Enterprise Software
(MTP-MAR 15)
a) Data processing controls perform validation
checks to identify errors during processing of
data.
b) They are required to ensure both the
Addresses an enterprise’s needs and data flow in
completeness and accuracy of the data being
a huge distributed environment. E.g. ERP
processed. Run-to-Run Totals,
Applications like SAP.
Reasonableness Verification, Edit Checks,
Field Initialization, Exception Reports and
Existence/Recovery Controls are some of the
examples of Data Processing Controls.
27. Business Application: (MTP-FEB 15) 28. Error Handling in CBIS: (RTP- MAY 16)
a) Business Application is defined as a computer
program used to fulfill a person’s need for This ensures that errors detected at any stage of
regular occupation or commercial activities like processing receive prompt corrective action and
keeping track of inventory levels, checking for are reported to the appropriate level of
bank account balances, and all other business management.
activities. Business.
b) Applications may be classified on the basis of
– Nature of processing, Source of application,
Nature of business and Functions covered
/nature of application.

IPCC |35e |Fast Track Material in Information Technology 48


MASTER MINDS No.1 for CA/CMA & MEC/CEC
30. Primary responsibilities of a Certificate
29. Digital Signatures (RTP- MAY 16)
Authority (MTP-MAY16)
Digital Signatures establish the authenticity of a) Positively identifying entities requesting
persons and prevent the denial of messages or certificates;
contracts when data is exchanged electronically. b) Issuing, removing, and archiving certificates;
c) Protecting the Certificate Authority server;
d) Maintaining a namespace of unique names for
certificate owners;
e) Serving signed certificates to those needing to
authenticate entities; and
f) Logging Activity
31. Business Intelligence
32. Storage Virtualization: (MAY16-2M)
(RTP-MAY 15, MTP- MAY 16)
a) BI is a set of theories, methodologies, a) Storage virtualization is the apparent pooling
architectures, and technologies that transform of data from multiple storage devices, even
raw data into meaningful and useful different types of storage devices, into what
information for business purposes. appears to be a single device that is managed
b) BI, in simple words, makes interpreting from a central console.
voluminous data friendly. b) Storage virtualization helps the storage
c) Making use of new opportunities and administrator perform the tasks of backup,
implementing an effective strategy can provide archiving, and recovery more easily -- and in
a competitive market advantage and long-term less time -- by disguising the actual complexity
stability. of a Storage Area Network

33. Network Virtualization: (SM, PM)


a) Network virtualization is a method of
combining the available resources in a
network by splitting up the available bandwidth
into channels, each of which is independent
from the others, and each of which can be
assigned (or reassigned) to a particular server
or device in real time.
b) This allows a large physical network to be
provisioned into multiple smaller logical
networks and conversely allows multiple
physical LANs to be combined into a larger
logical network.

‘C’ Category
34. Application Software Package (SM) 34. Virtual Organization (SM)
A set of prewritten, pre-coded application software Organization using networks to link people, assets
programs that are commercially available for sale and ideas to create and distribute products and
or lease. services without being limited to traditional
organizational boundaries or physical location.
35. Customization (SM)
Modification of a software package to meet an
organization's unique requirements without
destroying the package software's integrity.

IPCC |35e |Fast Track Material in Information Technology 49


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

5. BUSINESS PROCESS MANAGEMENT & IT


‘A’ Category
1. Process (RTP-NOV 14) 2. Process
(From Business perspective) (From General perspective)
Process is a coordinated and standardized flow of Process is defined as a sequence of events that
activities performed by people or machines, which uses inputs to produce outputs.
can traverse functional boundaries to achieve a
business objective and creates value for internal or
external customers.
3. Process management 4. Business Process
a) It is a system of interlinked processes which
a) It consists of a set of activities that are
involves intensive efforts to map, improve and
performed in co-ordination in an organizational
adhere to organizational processes.
and technical environment.
b) It also performs the activities of planning and
b) These activities jointly realize a business goal.
monitoring the performance of a process.
6. Total Quality Management
5. Radical Redesign (SM)
(MTP-SEP 14, MTP-MAR 15, RTP-MAY 15)
a) This means getting down to the fundamental –
a) It is the organization-wide effort to install and
where necessary throwing away the old, out of
make permanent a climate in which it
date rules – and recognizing that quality and
continuously improves its ability to deliver high-
innovation are more important to profit than
quality products and services to customer.
cost.
b) TQM is a comprehensive and structured
b) In a nutshell, a “clean slate approach” of BPR
approach to organizational management that
says that “Whatever you were doing in the past
seeks to improve the quality of products and
is all wrong”, do not get biased by it or
services through ongoing refinements in
reassemble, the new system is to be
response to continuous feedback.
redesigned afresh.
8. Accounting Information System
7. System flowchart (SM)
(MTP-MAR 15)
a) A tool for documenting a physical system in a) An Accounting Information System (AIS) is
which each component is represented by a defined as a system of collection, storage and
symbol that visually suggests its function. processing of financial and accounting data that
b) System flowcharts, showing controls at a is used by decision makers.
physical or resource level b) An accounting information system is generally a
computer-based method for tracking accounting
activity in conjunction with information
technology resources.
10. Entity-Relationship Diagrams
9. Business Process Reengineering (SM)
(RTP-NOV 15)

a) BPR is the fundamental rethinking and radical a) It is a data modeling technique that creates a
redesign of processes to achieve dramatic graphical representation of the entities, and the
improvement, in critical, contemporary relationships between entities, within an
measures of performance such as cost, quality, information system.
service and speed. b) Entity is defined as a distinguishable object that
b) Business Process Re-engineering is also exists in isolation and is described by a set of
known as Business Process Redesign, attributes.
Business Transformation, or Business Process c) Relationship is the association among several
Change Management. entities

IPCC |35e |Fast Track Material in Information Technology 50


MASTER MINDS No.1 for CA/CMA & MEC/CEC
11. Data Flow Diagrams 12. Flowchart
(RTP-MAY 15, MAY 16) (RTP-MAY 15)
a) A graphical representation of the flow of data a) It is diagram prepared by the programmer of the
through an information system. DFDs may be sequence of steps involved in solving a
partitioned into levels that represent increasing problem.
information flow and functional detail. b) It defines the strategy and thread of logic
b) Major components: Process, Entity, Dataflow followed in the program.
and Data store. c) It is like a blueprint, in that it shows the general
plan, architecture, and essential details of the
proposed structure.
13. Decision Trees 14. Decision Table
(MTP-OCT 14, MAY 16) (RTP-NOV 14,MTP-FEB 15)
a) It is a collection of a basis (condition) and a a) It is table which may accompany a flowchart
conclusion (action). defining the possible contingencies that may be
b) It is a decision support tool that uses a tree-like considered within the program and the
model of decisions and their possible appropriate course of action for each
consequences, including chance event contingency
outcomes, resource costs, and utility b) It is a tabular representation of program logic.
c) It is a one way to display an algorithm. c) Displays all conditions and the appropriate
actions to be taken for set of conditions.
15. Six Sigma
(MTP-OCT 14, MAY 16, RTP-NOV 14, 16. Business Process Management (SM)
MAY 16-2M)
a) Six Sigma is a set of strategies, techniques, a) BPM is the methodology used by enterprises to
and tools for process improvement. It seeks to improve end-to-end business processes in five
improve the quality of process outputs and stages namely: design, modeling, execution,
minimizing inconsistency in manufacturing and monitoring and optimization.
business processes. b) BPM is defined as: “The achievement of an
b) Objectives: reduce process cycle time, reduce organization’s objectives through the
pollution, reduce costs, increase customer improvement, management and control of
satisfaction, and increase profits. essential business processes”

‘B’ Category
17. Re-engineering (SM) 18. Value chain (MTP-FEB 15)
a) It is the fundamental rethinking and radical
redesign of business processes to achieve a) Value chain is defined as a chain of activities
dramatic improvements in critical, contemporary that a firm operating in a specific industry
measures of performance, such as cost, quality, performs in order to deliver a valuable product
service and speed. or service for the market.
b) Re-engineering emphasized a holistic focus on b) The idea of the Value Chain is based on the
business objectives and how processes related process view of organizations.
to them, encouraging full-scale recreation of
processes rather than iterative optimization of
sub-processes
19. Accounting (Or) Book keeping life cycle 20. Order to cash process flow (O2C)
a) It covers the business processes involved in a) It covers all the business processes relating to
recording and processing accounting events of fulfilling customer requests for goods or
a company. services.
b) It begins when a transaction or financial event b) It involves transactional flow of data from the
occurs and ends with its inclusion in the initial point of documenting a customer order to
financial statements. the final point of collecting the cash.

IPCC |35e |Fast Track Material in Information Technology 51


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

21. Procure to pay


22. Entity in DFD: (MTP-SEP 14,MAY 16 )
(purchase to pay or P2P) life cycle
a) An entity represents the source or destination of
a) It covers all the business processes relating to data and is often represented as rectangles (a
obtaining raw materials required for production diagonal line across the right-hand corner in
of a product or for providing a service. DFD.
b) It involves the transactional flow of data from b) Entities either provide data to the system
the point of placing an order with a vendor to (Source) or receive data from it (Sink).
the point of payment to the vendor. c) Entities are also referred to as agents,
terminators, or source/sink.
23. BPM lifecycle (SM) 24. Business Strategy:
a) It is a generic process optimization At the highest level, the strategy of the company is
methodology defined explicitly for business specified, which describes its long term concepts to
processes. develop a sustainable competitive advantage in the
b) It provides a high-level approach from a phased market.
perspective without prescribing specific
techniques such as those found in Six Sigma or
Lean.

Copyrights Reserved

To MASTER MINDS , Guntur

THE END

IPCC |35e |Fast Track Material in Information Technology 52


CA - IPCC
COURSE MATERIAL
Quality Education
beyond your imagination...

PART C – DIFFERENCES

Cell: 98851 25025 / 26


Visit us @ www.mastermindsindia.com Mail: mastermindsinfo@ymail.com
Facebook Page: Masterminds For CA Youtube Channel: Masterminds For CA

Page 53
MASTER MINDS No.1 for CA/CMA & MEC/CEC
1. TELECOMMUNICATIONS AND NETWORKS
1. Guided Vs. Unguided Media. (PM)

No Guided Media Unguided Media


1. Media that provide a conduit (channel) from Consists of a means for the data signals to travel
one device to another. but nothing to guide them along a specific path.
2. It uses a "cabling" system that guides the It passes through a vacuum; it is independent of a
data signals along a specific path. physical pathway.
3. Example – Coaxial Cable, Twisted Pair, Example – Infrared Waves, Micro Waves, Radio
Fiber Optic Cable. Waves etc.

Serial Transmission Vs. Parallel Transmission.


2.
(SM, PM, MTP-SEP 14, MTP- APR 14, RTP MAY-15)

No. Serial Transmission Parallel Transmission


1. The data bits are transmitted serially one after The data bits are transmitted simultaneously.
another.
2. Data is transmitted over a single wire and is Data is transmitted over eight different wires and
thus relatively slower. is thus relatively faster.
3. It is a cheaper mode of transferring data. It is relatively expensive mode of transferring
data.
4.

5. It is useful for long distance communications. Not suited for long distance communications.

Synchronous Transmission Vs. Asynchronous Transmission.


3.
(SM, PM, MTP-OCT 14, RTP- NOV 14)

No. Synchronous Transmission Asynchronous Transmission


1. Allows characters to be sent down the Each data word is accompanied with start and stop
line without Start-Stop bits (control bits.
characters).
2. The synchronous device is more It is relatively cheaper.
expensive.
3. Chances of data loss are relatively higher. More reliable as the start and stop bits ensure that
the sender and the receiver remain in step with one
another.
4. It is more efficient. It is relatively less efficient.

4. Differentiate Host Based & Network Intrusion Detection System. (PM)

Network Based Intrusion Detection


Host Based Intrusion Detection System
System
Deterrence Strong deterrence for insiders Strong deterrence for Outsiders
Detection Strong insider detection, weak outsider Strong outsider detection, weak insider
detection detection
IPCC |35e |Fast Track Material in Information Technology 54
MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

Attack Good at trending and detecting suspicious None


Anticipation behavior patterns
Damage Excellent for determining extent of Very weak damage
Assessment compromise Assessment capabilities
Response Weak real-time response, good for long term Strong response against
attacks outsider attacks
Scope Narrow in scope, monitors specific activities Broad in scope
Dependency Host dependent Host independent.

5. Client-Server architecture Vs Peer to Peer Architecture. (PM, RTP-NOV 14)

No Client / Server Peer- to- Peer


1. A client computer typically communicates with Every computer is equal and can communicate
servers, not with other clients. with any other computer on the network to which it
has been granted access rights.
2. A central server handles all security and file Each machine shares its own resources and
transactions. handles its own security.
3. It is more expensive as it requires a central file It is relatively less expensive as it does not
server, server software and client licenses. require a dedicated machine, server software or
special client licenses.
4. Backup is centralized on the server; managed Backup is decentralized; managed by users.
by network administrator. Backup devices and Backup devices and media are required at each
media required at server only. workstation.
5. The performance is relatively high as the server is The performance is relatively low.
dedicated and does not handle other tasks.
6. In case of failure of server, the whole network No single point failure affects the network.
fails.
7. C/S model relies on the power and stability of a P2P gives each workstation equivalent
single computer i.e., Server. capabilities and relies heavily on the power and
bandwidth of each individual computer.
8. Example – Email, network printing, and the Example – Napster, Gnutella, Freenet, Bit
World Wide Web. Torrent and Skype.

6. Star Network Vs. Ring Network. (RTP-NOV 14)

No. Star Network Ring Network


1. Here all nodes are connected to a central Here all nodes are connected in the form of a
computer/hub through dedicated cables. circular chain.
2. Communication takes place between the Communication takes place by each node to
nodes through the hub/computer only. receive and check for the message.
3. A broken connection between hub/central A broken connection between nodes leads to
computer and node does not affect the rest of failure of entire network.
the network.
4. Failure in the hub/central computer affects all Failure in one node does not affect the entire
nodes connected to that hub. system.
5. The signal becomes weak when it has to travel Repeaters are not needed. Every computer
long distances. To avoid it, repeaters are acts as a repeater.
required to be used.
6. It is very easy to add/remove a node from the It is difficult to add/remove a node from the
network. system.

IPCC |35e |Fast Track Material in Information Technology 55


MASTER MINDS No.1 for CA/CMA & MEC/CEC
7. Transport Layer Vs. Network Layer of OSI Model. (MTP FEB-15, MTP MAR-15)

Transport Layer:
• Transport Layer or Layer 4 ensures reliable and transparent transfer of data between user processes,
assembles and disassembles message packets and provides error recovery and flow control.
• Multiplexing and encryption are undertaken at this layer level. This means that the Layer can keep
track of the segments and retransmit those that fail.
Network Layer:
• The Network Layer or Layer 3 provides the functional and procedural means of transferring variable
length data sequences from a source to a destination via one or more networks, while maintaining the
quality of service requested by the Transport Layer.
• This Layer makes a choice of the physical route of transmission; creates a virtual circuit for upper
layers to make them independent of data transmission and switching; establishes, maintains,
terminates connections between the nodes and ensure proper routing of data.

8. Half Duplex Mode Vs. Full Duplex Mode. (RTP-NOV 15)

Half-Duplex Mode:
• In Half-Duplex mode, (sometimes called an alternating connection or semi-duplex) the data flows in
one direction or the other, but not both at the same time.
• This type of connection makes it possible to have bidirectional communications using the full capacity
of the line.
• For example: Walkie Talkie.
• In this, the entire capacity of a channel is taken over by whichever of the two devices is transmitting at
the time.
Full-Duplex Mode:
• In Full-Duplex mode, the data flow in both directions simultaneously.
• Each end of the line can thus transmit and receive at the same time, which means that the bandwidth
is divided in two for each direction of data transmission if the same transmission medium is used for
both directions of transmission.
• For example: Mobile Phones.
• In this, signals going in either direction share the capacity of the link wither by containing two separate
physical links (one for sending and the other for receiving) or by dividing the capacity of the channel
between signals travelling in opposite direction.

9. Circuit Switching Vs. Packet Switching. (RTP-NOV 15)

Circuit Switching:
• A Circuit Switching network is one that establishes a fixed bandwidth circuit (or channel) between
nodes and terminals before the users may communicate, as if the nodes were physically connected
with an electrical circuit.
• The route is dedicated and exclusive, and released only when the communication session terminates.
Circuit switching is what most of us encounter on our home phones. A single circuit is used for the
entire duration of the call.
• Applications which use circuit switching go through three phases: Establish a Circuit, Transfer of data
and Disconnect the Circuit.

IPCC |35e |Fast Track Material in Information Technology 56


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com
Packet Switching:
• It is a sophisticated means of maximizing transmission capacity of networks. Packet switching refers to
protocols in which messages are broken up into small transmission units called packets, before they
are sent.
• Each packet is transmitted individually across the net. The packets may even follow different routes to
the destination.
• Since there is no fixed path, different packets can follow different path and thus they may reach to
destination out of order.

10. Presentation Layer Vs. Session Layer of OSI Model. (RTP-NOV 15)

Presentation Layer:
• This layer at times referred as Syntax Layer also, is usually a part of an operating system, that
converts incoming and outgoing data from one presentation format to another (for example, from a text
stream into a popup window with the newly arrived text).
• The presentation service data units are then encapsulated into Session Protocol Data Units, and
moved down the stack. It further controls on screen display of data, transforms data to a standard
application interface.
• Encryption, data compression can also be undertaken at this layer level.
Session Layer:
• This layer sets up, coordinates, and terminates conversations, exchanges, and dialogs between the
applications at each end.
• It deals with session and connection coordination. It provides for full-duplex, half-duplex, or simplex
operation, and establishes check pointing, adjournment, termination, and restart procedures.
• The OSI model made this layer responsible for "graceful close" of sessions also.

11. Hardware Encryption Vs. Software Encryption (RTP-NOV 14)

Hardware Encryption:
• Hardware Encryption devices are available at a reasonable cost, and can support high speed traffic.
• If the Internet is being used to exchange information among branch offices or development
collaborators, for instance, use of such devices can ensure that all traffic between these offices is
secure.
Software Encryption:
• Software Encryption is typically employed in conjunction with specific applications.
• Certain electronic mail packages, for example, provide encryption and decryption for message
security.

12. Difference between Public Data Network and Private Data Network (RTP-MAY 15)

Public Data Network:


1. A Public Data Network is defined as a network shared and accessed by users not belonging to a
single organization.
2. It is a network established and operated by a telecommunications administration, or a recognized
private operating agency, for the specific purpose of providing data transmission services for the
public.
3. The Internet is an example of a Public Data Network.

IPCC |35e |Fast Track Material in Information Technology 57


MASTER MINDS No.1 for CA/CMA & MEC/CEC
Private Data Network:
1. Private Data Network provides businesses, government agencies and organizations of all sizes as a
dedicated network to continuously receive and transmit data critical to both the daily operations and
mission critical needs of an organization.
2. This is a network that is not available to the outside world.
3. The Intranet is an example of a Private Data Network.

13. Difference between Thick client and Thin Client (RTP - MAY 15)

Thick Client:
• A Thick client is a client that performs the bulk of any data processing operations itself, and does not
necessarily rely on the server.
• Unlike thin clients, thick clients do not rely on a central processing server because the processing is
done locally on the user system, and the server is accessed primarily for storage purposes.
• For that reason, thick clients often are not well-suited for public environments. To maintain a thick
client, IT needs to maintain all systems for software deployment and upgrades, rather than just
maintaining the applications on the server.
• For example – Personal Computer.
Thin Client:
• A Thin client uses the resources of the host computer.
• A thin client generally only presents processed data provided by an application server, which performs
the bulk of any required data processing.
• A thin client machine is going to communicate with a central processing server, meaning there is little
hardware and software installed on the user's machine.
• A device using web application (such as Office Web Apps) is a thin client.

14. Difference between Broadcast Networks and Switched Networks. (RTP - MAY 15)

Broadcast Networks:
• In Broadcast networks, data transmitted by one node is received by many, sometimes all, of the other
nodes.
• This refers to a method of transferring a message to all recipients simultaneously.
• For example – a corporation or other voluntary association, that provides live television or recorded
content such as movies, newscasts, sports, public affairs programming, and other television programs
for broadcast over a group of radio stations or television stations.
Switched Networks
• In switched-communication networks, the data transferred from source to destination is routed through
the switch nodes.
• The way in which the nodes switch data from one link to another, as it is transmitted from source to
destination node, is referred to as a switching technique.
• Three common switching techniques are Circuit Switching, Packet Switching, and Message Switching.

15. Difference between C2B and C2C e-Commerce (RTP - MAY 15)

Consumer-to-Business e-Commerce:
• In C2B e-Commerce model, consumers directly contact with business vendors by posting their project
work online so that the needy companies review it and contact the consumer directly with bid.

IPCC | 35e |Fast Track Material in Information Technology 58


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com
• The consumer reviews all the bids and selects the company for further processing. Some examples
are guru.com, rentacoder.com, getacoder.com, freelancer.com.

Consumer-to-Consumer e-Commerce:
• C2C e-Commerce is an Internet - facilitated form of commerce that has existed for the span of history
in the form of barter, flea markets, swap meets, yard sales and the like.
• C2C e-Commerce sites provide a virtual environment in which consumers can sell to one another
through a third-party intermediary.

16. Ring Network Vs Mesh Network.

No. Mesh Network Ring Network


1. In this structure, there is a random In this topology, the network cable passes form one
connection of nodes using node to another until all nodes are connected in the form
communication links. of loop or ring.
2. A mesh network may be fully connected There is direct point to point link between 2
or connected with only partial links neighboring nodes and these links are unidirectional.
3. The reliability is very high as there are Ring network can span longer distances than other
always alternate paths available if direct types of network
link between two nodes is down.
4. Network problems are easier to Adding or removing computers can disrupt the
diagnose network.
5. Cost of installation and maintenance is They offer high performance for a small number of
high. workstation or for larger networks where each
workstation has similar work load.

17. Internet Vs. Intranet.

No. Internet Intranet


1. It is a global network of computer networks that It is a type of information system that
are formed by various educational, commercial, facilitates communication within the
Government, non-profit and military organization.
organizations.
2. This is not being developed and controlled by a It is developed and controlled by private
single person or organization. individuals and organizations.
3. It is a public network. So, anybody can log into It is a private network and access to private
the network and perform any action at his individuals is restricted by passwords.
choice.
4. Thousands of databases exist which can be Only authorized persons are allowed to
accessed and used by private individuals. access the data available in organization’s
databases.
5. An internet can be defined as a network of An intranet can be a LAN or WAN that
networks. belongs exclusively to a corporation.
6. Any node can transmit a message to any other Several applications of Intranet include:
node, along with communication channels, via the a. Supplier management
intermediate nodes. Internet uses provides b. Inventory management
Communication, Data Retrieval, Data publishing, c. Distribution management
etc. d. Channel management
7. Acts as an information service to retrieve the Acts as an information service within the
information worldwide. organization.
IPCC |35e |Fast Track Material in Information Technology 59
MASTER MINDS No.1 for CA/CMA & MEC/CEC
2. INFORMATION SYSTEMS AND ITS FUNDAMENTALS
1. RAM Vs. ROM. (PM, RTP - NOV 15)

No. RAM ROM


1. RAM is a volatile memory and when the Unlike RAM, ROM is non-volatile. The
computer is turned off, RAM loses its data. contents of ROM remain even after the
When the computer is turned on again, computer is switched off.
operating system and other files are once again
loaded into RAM usually from the hard disk.
2. This is Read/Write memory wherein information ROM used to be read-only; however, the
can be read as well as modified. new versions of ROM allow limited rewriting
making it possible to upgrade firmware such
as the BIOS.

2. Hierarchical Database Model Vs. Network Database Model. (PM, MTP - FEB 15)

No. Hierarchical Database Model Network Database Model


1. The hierarchical model permits a record to Unlike the hierarchical mode, the network model
be a member of only one set at one time. permits a record to be a member of more than
one set at one time.
2. The hierarchical data structure implements The network model allows us to represent one-
one-to-one and one-to-many relationships. to-one, one-to-many and many-to-many
relationships.
3. Each parent record may have one or more Each parent record may have one or more child
child records, but no child record may have records, and even a child record may have more
more than one parent record. than one parent record.
4. The hierarchical model does not represent The network model is able to represent
redundancy in data efficiently. redundancy in data more efficiently than in the
hierarchical model.
5. The hierarchical data structures require The network data structures can be entered and
specific entrance points to find records in a traversed more flexibly.
hierarchy.

3. CISC Vs. RISC. (PM,RTP - NOV 14)

Complex Instruction Set Computer (CISC):


a) If the control unit contains a number of micro-electronic circuitry to generate a set of control signals
and each micro- circuitry is activated by a micro-code, this design approach is called CISC design.
b) Examples of CISC processors are: Intel 386, 486, Pentium, Pentium Pro, Pentium II, Pentium III
processors etc.
c) CISC chips have a large, variable length and complex instructions and generally make use of complex
addressing modes.
d) But at the same time, they are complex as well as expensive to produce.
e) Now-a-days, most of the personal computers use CISC processors.

Reduced Instruction Set Computer (RISC):


a) To execute each instruction, if there is separate electronic circuitry in the control unit, which produces
all the necessary signals, this approach of the design of the control section of the processor is called
RISC design. It is also called hard-wired approach.
b) Examples of RISC processors: IBM RS6000, MC88100 processors etc. RISC processors use a small
and limited number of instructions and mostly use hardwired control unit.
IPCC |35e |Fast Track Material in Information Technology 60
MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com
c) These consume less power and have high performance.
d) However, RISC processors are faster, less complex and less expensive than CISC processors
because of their simpler design.
e) Now-a-days, most of the workstation computers use RISC processors.

4. Primary Storage Vs. Secondary Storage.

No. Primary Storage Secondary storage


1. Added to the system as a part and parcel of the Added to the system as a supplementary to
circuitry. primary storage.
2. It is electronic in nature and is usually supplied Magnetic or optical in nature and supplied in
in the form of chips. the form of tapes and disks.
3. Provides Random access to data. Provides Sequential / direct access to data.
4. Volatile i.e. its contents are lost when power is Non-volatile i.e. it does not lose its contents
lost. even when the power is lost.
5. Low capacity. High capacity.
6. Fast access to data. Slow access to data.
7. High cost. Low cost.
8. Generally a computer consists of few MB’s of Generally a computer consists of few GB’s to
memory. TB’s of memory.

5. Difference between Hardware Resources and Software Resources (RTP - MAY 15)

Hardware Resources:
• These refer to Machines - computers, video monitors, magnetic disk drives, printers, optical scanners
and Media - floppy disks, magnetic tape, optical disks, plastic cards, paper forms.

Software Resources:
• These refer to Programs - operating system programs, spreadsheet programs, word processing
programs, payroll programs and Procedures - data entry procedures, error correction procedures,
paycheck distribution procedures.

6. Connection Oriented Network Vs. Connection less Network. (RTP - MAY 16)

Connection Oriented Networks:


In connection oriented service, a connection is first established and then data is exchanged like it happens
in case of telephone networks.
When connection is established we send the message or the information and then we release the
connection.
Connectionless Networks:
In connectionless networks, the data is transferred in one direction from source to destination without
checking that destination is still there or not, or if it is prepared to accept the message.
Data which is being exchanged in fact has a complete contact information of recipient and at each
intermediate destination, it is decided how to proceed further like it happens in case of postal networks.
Example of Connectionless service is UDP (User Datagram Protocol).
IPCC |35e |Fast Track Material in Information Technology 61
MASTER MINDS No.1 for CA/CMA & MEC/CEC
3. BUSINESS INFORMATION SYSTEMS
1. Data Vs. Information. (PM)

No. Data Information


1. Data is raw and unorganized fact that When data is processed, organized, structured or
needs to be processed. presented in a given context so as to make it useful, it
is called Information.
2. Data in itself is meaningless and is the Information is the second level of knowledge.
lowest level of knowledge.
3. Observations and recordings are done to Analysis of data is done to obtain information.
obtain data.

2. Role-based Access Control Vs. Rules-based Access Control. (PM, RTP - MAY 15)

Role-based Access Control (RBAC):


a) RBAC largely eliminates discretion when providing access to objects. Instead, administrators or
automated systems place subjects into roles.
b) Subjects receive only the rights and permissions assigned to those roles.
c) RBAC uses a centrally administered set of controls to determine how subjects and objects interact.
When an employee changes jobs, all previous access is removed, and the rights and permissions of
the new role are assigned.
d) RBAC enforces static constraints based on a user’s role. It is the best system for an organization that
has high turnover.
Rules-based Access Control (RAC):
a) RAC takes into account the data affected, the identity attempting to perform a task, and other triggers
governed by business rules.
b) RAC uses specific rules that indicate what can and cannot happen between a subject and an object. A
manager, for example, has the ability to approve his/her employees’ hours worked.
c) However, when s/he attempts to approve his/her own hours, a rule built into the application compares
the employee record and the user, sees they are the same, and temporarily removes approval
privilege. It is not necessarily identity based.

3. Explicit knowledge Vs. Tacit knowledge. (PM, MTP-MAR 15, RTP-NOV 14, MAY15 - 4M)

Explicit knowledge:
a) Explicit knowledge is that knowledge which can be formalized easily and as a consequence is easily
available across the organization.
b) Explicit knowledge is articulated, and represented as spoken words, written material and compiled data.
c) This type of knowledge is codified, easy to document, transfer and reproduce.
d) For example - Online tutorials, Policy and procedural manuals.
Tacit knowledge:
a) Tacit knowledge, on the other hand, resides in a few often-in just one person and hasn’t been
captured by the organization or made available to others.
b) Tacit knowledge is unarticulated and represented as intuition, perspective, beliefs, and values that
individuals form based on their experiences.
c) It is personal, experimental and context specific. It is difficult to document and communicate the tacit
knowledge.

IPCC |35e |Fast Track Material in Information Technology 62


MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com
d) For example - hand-on skills, special know-how, and employee’s experiences.

4. Information Vs. Knowledge. (PM, RTP - NOV 14)

No. Information Knowledge


1. Information is piecemeal, Knowledge is structured, coherent, and often universal.
fragmented and particular.
2. Information is timely, transitory, and Knowledge is of enduring significance.
may even be short-lived.
3. Information is a flow of messages. Knowledge is a stock, largely resulting from the flow, in
the sense that the “input” of information may affect the
stock of knowledge by adding to it, restructuring it, or
changing it in any way.
4. Information is acquired by being Knowledge can be acquired by thinking. Thus, new
told. knowledge can be acquired without new information being
received.

Difference between Strategic-Level Systems and Operational-Level Systems


5.
(RTP - MAY 15)

Strategic-Level Systems:
• These systems are strategic managers to track and deal with strategic issues that assist in long-range
planning.
• A principle area is tracking changes in the external conditions (market sector, employment levels,
share prices, etc.) and matching these with the internal conditions of the organization.
Operational-Level Systems:
• Support operational managers tracking elementary activities. These can include tracking customer
orders, invoice tracking, etc.
• Operational-level systems ensure that business procedures are followed.

4. BUSINESS PROCESS AUTOMATION THROUGH APPLICATION SOFTWARE

1. Cloud Computing Vs. Grid Computing. (SM, PM)

Cloud Computing:
a) Suited for any size of data storage
b) Suited for both standard or day to day and computational intensive tasks.
c) Very high uptime availability
d) Provide sharing of infrastructure and thus help to reduce cost.
Copyrights Reserved
Grid Computing: To MASTER MINDS , Guntur
a) Suited for big size of data storage
b) Suited for computational intensive tasks only.
c) Very high uptime availability
d) Provide sharing of infrastructure and thus help to reduce cost.
IPCC |35e |Fast Track Material in Information Technology 63
MASTER MINDS No.1 for CA/CMA & MEC/CEC
Manual Information Processing Cycle Vs. Computerized Information Processing Cycle.
2.
(PM, MTP-OCT 14, MAY 16, RTP-NOV 14)

Manual Information Computerized Information


No.
Processing Cycle Processing Cycle
Systems where the level of manual Systems where computers are used at every
intervention is very high. For example- stage of transaction processing and human
1.
Evaluation of exam papers, teaching and intervention is minimal.
operations in operation theatres.
Include following components: Include following components:
a) Input: Put details in register. a) Input: Entering data into the computer;
b) Process: Summarize the information; and b) Process: Performing operations on the
2. c) Output: Present information to data;
management in the form reports. c) Storage: Saving data, programs, or output
for future use; and
d) Output: Presenting the results.

Input Process Output


3.

3. Infrastructure as a Service Vs Software as a Service (RTP-NOV 14, RTP-NOV 15)

Infrastructure as a Service (IaaS):


• IaaS delivers computer infrastructure on an outsourced basis to support enterprise operations.
• Typically, IaaS provides hardware, storage, servers and data centre space or network components; it
may also include software.
Software as a Service (SaaS):
• SaaS features a complete application offered as a service on-demand.
• A service provider hosts the application at its data centre over the Internet and customer accesses it
via a standard Web browser.
• For example - Google Apps.

4. Differentiate Online Processing and Real Time Processing. (MTP-MAR 15)

Online Processing:
• Data is processed immediately while it is entered, the user usually only has to wait a short time for a
response. (Example: games, word processing, booking systems).
• Interactive or online processing requires a user to supply an input.
• Interactive or online processing enables the user to input data and get the results of the processing of
that data immediately.
Real-time Processing:
• Real time processing is a subset of interactive or online processing.
• Input is continuously, automatically acquired from sensors, for example, which is processed
immediately in order to respond to the input in as little time as possible.
• After the system is finished responding, it reads the next set of input data immediately to process that.
• Whenever there is a rapid reaction required due to some sort of change, real time processing can take
action without the need of a user.
• Real time processing is used in warning systems on aircraft, alarm systems in hazardous zones,
burglar alarms etc.
IPCC |35e |Fast Track Material in Information Technology 64
MASTER MINDS 98851 25025 / 26 www.mastermindsindia.com

5. Concurrent Audit Vs. General Audit. (RTP-NOV 15)

Concurrent Audit:
• In this, Auditors are members of the system development team.
• They assist the team in improving the quality of systems development for the specific system they are
building and implementing.
General Audit:
• In this, Auditors evaluate systems development controls overall.
• They seek to determine whether they can reduce the extent of substantive testing needed to form an
audit opinion about management’s assertions relating to the financial statements in systems
effectiveness and efficiency.

6. Quality Assurance Management Vs. Security Management Controls. (RTP-NOV 15)

Quality Assurance Management Controls:


• Organizations are increasingly producing safety-critical systems and users are becoming more
demanding in terms of the quality of the software they employ to undertake their work.
• Organizations are undertaking more ambitious information systems projects that require more
stringent quality requirements and are becoming more concerned about their liabilities if they produce
and sell defective software.

Security Management Controls:


• Information security administrators are responsible for ensuring that information systems assets are
secure.
• Assets are secure when the expected losses that will occur over some time are at an acceptable level.

7. Software as a Service (SaaS) Vs. Platform as a Service (PaaS) (RTP-MAY 15)

Software as a Service (SaaS):


• Software as a Service (SaaS) features a complete application offered as a service on-demand.
• A service provider hosts the application at its data centre over the Internet and customer accesses it
via a standard Web browser.
• For example - Google Apps.
Platform as a Service (PaaS):
• Platform as a Service (PaaS) delivery model allows a customer to rent virtualized servers and
associated services used to run existing applications, or to design, develop, test, deploy and host
applications.
• The consumer may create software using tools and/or libraries from the provider. The consumer may
also control software deployment and configuration settings.
• The provider provides the networks, servers, storage, and other services.
• For example, AppScale allows a user to deploy some applications written for Google App Engine to
their own servers.

8. Private Cloud Vs. Hybrid Cloud in Cloud Computing (RTP-MAY 15)

Private Cloud:
• This cloud computing environment resides within the boundaries of an organization and is used
exclusively for the organization’s benefits.
• These are also called internal clouds.

IPCC |35e |Fast Track Material in Information Technology 65


MASTER MINDS No.1 for CA/CMA & MEC/CEC
• They are built primarily by IT departments within enterprises who seek to optimize utilization of
infrastructure resources within the enterprise by provisioning the infrastructure with applications using
the concepts of grid and virtualization.
• The benefit of a Private Cloud is that it enables an enterprise to manage the infrastructure and have
more control.
Hybrid Cloud:
• It is maintained by both internal and external providers.
• It is a composition of two or more clouds (Private, Community or Public). They have to maintain their
unique identity, but are bound together by standardized data and application portability.
• With a hybrid cloud, organizations might run non-core applications in a public cloud, while maintaining
core applications and sensitive data in-house in a private cloud.

5. BUSINESS PROCESS MANAGEMENT & IT


1. Functional Organization Vs. Process Organization. (SM)

Functional Organization Process Organization


Work Unit Department Team
Key Figure Functional Executive Process Owner
a) Focus on functional excellence. a) Responsive to market requirements.
b) Easier to implement. b) Improved communication and
Benefits c) Clear management direction collaboration
c) Performance measurements associated
with process goals.
a) Barrier to communication between a) Duplication of functional expertise.
different functions. b) Inconsistency of functional performance
Weaknesses b) Poor hand over between functions that between processes.
affect customer service. c) Increased operational complexity.
c) Lack of end-to-end focus to optimize
organizational performance.
Strategic Supports cost leadership strategy. Supports differentiation strategy.
Value

2. Flowchart Vs. Data Flow Diagram. (SM,PM, NOV 14 - 2M)

Flow chart Data Flow Diagram


Presents steps to complete a process. Presents the flow of data.
Do not have any input from or output to an It describes the path of data from an external
external source. source to internal source or vice versa.
The timing and sequence of the process is aptly Whether processing of data is taking place in a
shown by a flow chart. particular order or several processes are taking
place simultaneously is described by a DFD.
shows how to make a system function. Defines the functionality of a system.
Used in designing a process. Used to describe the path of data that will
complete that process.
Types of Flow charts - System, Data, Document Types of DFD–physical data flow and logical
and Program. dataflow.

THE END
IPCC |35e |Fast Track Material in Information Technology 66

Você também pode gostar