Search Assignments and Papers Here ...

Google
 
For ICFAI Objective Questions check out http://www.quizmantra.com

Saturday, April 24, 2010

Information Technology & Systems (MB231) : July 2006

1
Question Paper

Information Technology & Systems (MB231) : July 2006
Section A : Basic Concepts (30 Marks)
· This section consists of questions with serial number 1 - 30.
· Answer all questions.
· Each question carries one mark.
1. Mr. Suresh is writing a spreadsheet program in which he has to use a group of commands at different
parts of the program. So which of the following can be used to replace group of commands to decrease
the length of the program?
(a) Keyword (b) Function (c) Constant (d) Procedure (e) Macro.
< Answer >
2. Mr. Srinivas, working as a junior programmer at Converges Inc. wants to write program logic for an
application using imitation code. Which of the following tools is helpful for him?
(a) Flowchart (b) Decision Table (c) Pseudocode
(d) Compiler (e) Interpreter.
< Answer >
3. Genesis inc. uses OSI Network Architecture for communication with other systems. So which of the
following layers of this model is responsible for detecting and correcting errors in the transmission of
data?
(a) Transport Layer (b) Network Layer
(c) Data Link Layer (d) Session Layer
(e) Application Layer.
< Answer >
4. Mr. Malya is working in Dishnet Servics Inc., a leading Internet Service Provider in India. If Malya
wants to know when his friends or coworkers are online, which of the following Internet services can
help him?
(a) File Transfer Protocol (b) Internet Telephony
(c) Internet Fax (d) Internet Paging
(e) Usenet.
< Answer >
5. Mr.Gopal, working on a ‘C’program in which he has to test more than one condition to arrive at the
right decision. So which of the following operators will be helpful for him?
(a) Increment operators (b) Decrement operators
(c) Arithmetic operators (d) Logical operators
(e) Assignment operators.
< Answer >
6. In a ‘C’ program, Mr. Balu defined three variables that represent the existing data types. So which of
the following features in ‘C’language was used by him?
(a) Type definition (b) Size of
(c) Cast of (d) Round of
(e) Assignment operators.
< Answer >
7. The Manager at Food world asked his subordinate to present him a report that lists all those items where
actual expenditures exceeded budget targets by at least 10 percent. The report refers to
(a) External Report (b) Exception Report
(c) Summary Report (d) Periodic Scheduled Report
(e) Push Report.
< Answer >
8. Mr.Suresh, writing a ‘C’ program, wants to print the student name, enrollment number and marks of 10
students. So, which of the following is used to group these data items of different data type that share a
common name?
(a) Float (b) Structure (c) Array (d) Int (e) Long.
< Answer >
9. Which of the following commands is used to list the files by displaying the number of blocks used by a
file in UNIX operating system?
(a) ls –x (b) ls –l (c) ls –a (d) ls –t (e) ls –s.
< Answer >
2
10. Which of the following commands is used to list files by sorting in reversed order in UNIX operating
system?
(a) ls –r (b) ls –R (c) ls –a (d) ls –t (e) ls –s.
< Answer >
11. Which of the following commands is used to prepare a file for printing by adding suitable headers,
footers and formatted text in UNIX operating system?
(a) head (b) pr (c) tar (d) grep (e) mail.
< Answer >
12. The “ % ” symbol used in the statement of “C” program is a
(a) Decision character (b) Conversion character
(c) Data type character (d) Printable character
(e) New line character.
< Answer >
13. In a TCP/IP reference model, which layer is responsible for holding the whole architecture together?
(a) Application Layer (b) Transport Layer
(c) Internet Layer (d) Host-to-network Layer
(e) Data Link Layer.
< Answer >
14. Which of the following is false about a Linked List in C?
(a) Linked List is a list whose order is given by links from one item to the next
(b) Each structure of a Linked List is called a node
(c) Each node in a Linked List consists of two fields, one containing the item (value) and the other
containing the address of the next item
(d) The link is in the form of a pointer to another structure of the same type
(e) A Linked List is a collection of structures ordered by their physical placement in the memory.
< Answer >
15. Which of the following (in communication network context) refers to the way in which the end points or
stations of a network are linked together?
(a) Data flow machine (b) Topology
(c) Multi computer (d) Scalability
(e) Resource sharing.
< Answer >
16. In which of the following contexts does the subnet make the most sense, where it refers to the collection
of Routers and communication lines owned by the network operator?
(a) PBX (b) MAN (c) LAN (d) WAN (e) PABX.
< Answer >
17. In videoconferencing, which of the following signals from a video camera can be digitized and
compressed?
(a) Catalog (b) Analog (c) Digital
(d) Synchronous (e) Asynchronous.
< Answer >
18. Which of the following is/are the areas where telecommunications can be applicable?
I. Enterprise Collaboration Systems.
II. Electronic Commerce Systems.
III. Internal Business Systems.
(a) Only (I) above (b) Only (II) above
(c) Only (III) above (d) Both (I) and (II) above
(e) All (I), (II) and (III) above.
< Answer >
19. In which of the following switching alternatives, the message is subdivided into fixed or variable groups
called packets?
(a) Circuit switching (b) Message switching
(c) Packet switching (d) Group switching
(e) Asynchronous switching.
< Answer >
20. Which of the following commands in Novell Netware Operating System recover the deleted files that
have not been purged?
(a) NCOPY (b) REMOVE (c) SALVAGE (d) REVOKE (e) FLAG.
< Answer >
3
21. Which of the following commands in Novell Netware Operating System stops the receiving of
messages sent by another user?
(a) CAPTURE (b) REMOVE (c) LIST (d) CASTOFF (e) FLAG.
< Answer >
22. Which of the following commands in Novell Netware Operating System closes a spooled file and sends
the data to the printer?
(a) CASTOFF (b) ENDCAP (c) CHKVOL (d) LOGOUT (e) FLAG.
< Answer >
23. Which of the following Analytical models is reverse of “what-if analysis model” supported by Decision
Supporting System?
(a) Sensitivity Analysis (b) Goal Seeking Analysis
(c) Optimization Analysis (d) Value Analysis
(e) Time-Series Analysis.
< Answer >
24. In C program, which of the following is/are true?
I. The variable always begins with a letter.
II. The length of the variables should not be more than eight characters.
III. Variables are case sensitive.
(a) Only (I) above (b) Only (II) above
(c) Only (III) above (d) Both (I) and (II) above
(e) All (I), (II) and (III) above.
< Answer >
25. Mr. Teja, writing a ‘C’ program to check whether a given character is alphabet or not. Which of the
following files he must include in the program?
I. ctype.h.
II. math.h.
III string.h.
(a) Only (I) above (b) Only (II) above
(c) Both (I) and (II) above (d) Both (I) and (III) above
(e) All (I), (II) and (III) above.
< Answer >
26. Which of the following statements is/are false about increment and decrement operators in ‘C’
language?
I. Prefix operator first assigns the value to the variable on the left and then increments the operand.
II. Postfix operator first adds one to the operand and then assigns the result to the variable on the left.
III. Both increment and decrement operators are unary operators.
(a) Only (I) above (b) Only (II) above
(c) Both (I) and (II) above (d) Both (I) and (III) above
(e) All (I), (II) and (III) above.
< Answer >
27. In C language, the syntax of printf statement consists of
I. Characters that will be printed on the screen.
II. Formal specifications that define the output format for display of each item.
III. Variables whose values are formatted and printed.
(a) Only (I) above (b) Only (II) above
(c) Both (I) and (II) above (d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
< Answer >
28. Murali wants to write a C program for evaluating the square root of a series of numbers. If the series
contains any negative numbers, the process of evaluation of square root should be bypassed for such
numbers because the square root of a negative number is not defined. So which of the following
statements he must use for bypassing the negative numbers in the program?
(a) break (b) continue (c) exit (d) stop (e) stat.
< Answer >
4
29. In C language, which of the following variables scope is local to the function?
I. Automatic variable.
II. Static variable.
III. Register variable.
(a) Only (I) above (b) Only (II) above
(c) Both (I) and (II) above (d) Both (I) and (III) above
(e) All (I), (II) and (III) above.
< Answer >
30. In a C program, Mr.Ravi initialized the automatic variable in the loop of the program. The total
execution time taken for that loop is 50msec. Which of the following variable he must use in the loop in
order to reduce the execution time?
(a) Static variable (b) Register variable
(c) External variable (d) Boolean variable
(e) Character variable.
< Answer >
END OF SECTION A
Section B : Caselets (50 Marks)
· This section consists of questions with serial number 1 – 8.
· Answer all questions.
· Marks are indicated against each question.
· Detailed explanations should form part of your answer.
· Do not spend more than 110 - 120 minutes on Section B.
Caselet 1
Read the caselet carefully and answer the following questions:
1. Why are companies moving to hybrid object/relational data warehouses?
(4 marks) < Answer >
2. What do you think is the strategic business value of a data warehouse to Kingfisher Airlines?
(4 marks) < Answer >
3. What business benefits does Kingfisher Airlines hope to gain from their new hybrid
object/relational warehouse?
(5 marks) < Answer >
Hybrid object and relational databases are finding their way into the data-warehousing world. Companies are
beginning to use data objects to embed sophisticated data cleansing, modeling, calculating and forecasting routines
in a relational data warehouse.
Hybrid Database Management Systems (HDBMS) were developed as a way to add unstructured data, such as text or
video, into a database. Informix Software markets object extensions called DataBlades to its Database Management
System. Oracle Corporation’s object extensions are called Cartridges, and IBM’s DB/2 Universal Database supports
multimedia extensions.
Because relational structures handle only simple calculations, such as addition or subtraction, users typically move
data from the warehouse to a separate server or desktop application to perform complex functions. But doing
sophisticated analysis within the framework of a relational database has performance and other advantages, even if it
isn’t right for everyone and tends to be priority, consultants say.
Hybrid Database Management Systems and datawarehouses appealed to Sabre Technology Solutions because they
combine the scalability of relational, databases with the flexibility of object code, explained Brad Jensen, a vice
president at the Sabre Group division that develops information systems for the travel industry.
Sabre built a 400 gigabyte summary-data relational warehouse for Kingfisher Airlines in 2005 for several types of
5
analysis, such as passenger demand, fares, and routes. However, Kingfisher Airlines later decided to improve the
results of analysis, Jensen said. Sabre is now working on that project.
The first phase of the new 3-terabyte to 5-terabyte warehouse is scheduled to debut in June. It will use Informix’s
Dynamic Server with DataBlades running a parallel environment. An important part of the strategy is the ability to
reuse object code, Jensen said. Sabre’s building customized DataBlades using a software development tool kit from
Informix, which contains objects for security and integrity, for example.
The strategy also will ensure that everyone at Kingfisher Airlines uses the same calculations. “Kingfisher Airlines
wants to standardize calculation methods and variable names”, Jensen said. For example, many departments have
been using different ways to define such common variables as market and fleet. Departments also may calculate
formulas, such as the percentage of local passengers on a flight, differently.
Jensen declined to reveal investment or return on investment figures. However, Jensen in convinced of the business
value of hybrid databases. “We have seen the power of object extensions to add strategic business functionality”, he
said.
Caselet 2
Read the caselet carefully and answer the following questions:
4. What are the business benefits of Gliders’ switch to a virtual private network?
(6 marks) < Answer >
5. What can be done to overcome several limitations of virtual private networks?
(7 marks) < Answer >
6. Does it make business sense for any company to use the Internet as their private
telecommunications network? Why or why not?
(8 marks) < Answer >
Sandal, shoe and boot maker Gliders Outdoor Corporation recently switched to an Internet networking technology
called virtual private networks to interconnect their global company.
Virtual private networks (VPNs) use the power of the Internet instead of using private telecommunications lines or
other network links. A virtual private network is a secure and encrypted connection between two points across the
Internet. It transfers information by encrypting and encapsulating telecommunications traffic into packets and
sending the packets over the Internet. Most VPNs are built and run by Internet service providers. Companies that go
with a VPN from an Internet service provider essentially outsource their networks to save money on having to
acquire and manage their own Wide Area Network equipment and bandwidth requirements.
Gliders is a $100 million company whose 20 person office in Hoek Van Holland, the Netherlands, collaborates on
product development with its staff in Goleta, California. The VPN cost roughly $31,000 to implement and saves
Gliders $10,000 per month compared with leasing their previous high-speed network connections.
“We need a network that would serve as the foundation for our international expansion”. says Steve Miley, MIS
director at Gliders. “It will be critical because our offices will use it to make sure projects are done on time”.
Employees at the two sites use the VPN to update the status of product development projects through Lotus Notes
groupware databases. The VPN supports Notes’ ability to replicate databases of project information at each work
site, which is crucial to groupware support of project team collaboration.
VPN performance “is slow but workable for interactive Notes database access,” Miley says. And as the quality of
Internet service improves, VPN performance can only improve, he adds.
Security, a reported shortcoming of virtual private networks, is improved with NetFortress software from Fortress
Technologies. It automatically changes encryption keys every 24 hours. “We feel very secure with their products on
our network,” he says.
Offices for production management in Hong Kong, Mexico and Macao will be added to the VPN this year, Miley
says. Those sites currently use expensive international telephone calls to access servers in Goleta. Desktop
videoconferencing over the VPN, to cut international travel costs, is also planned. Gliders doesn’t mind being among
the first to implement a virtual private network. “VPNs are here to say,” Miley says. “And we’re on the leading edge,
not the bleeding edge.
6
Caselet 3
Read the caselet carefully and answer the following questions:
7. Describe the essential hardware and software necessary to establish the Decision Support System
(DSS), explaining why each part is relevant in meeting the aims of Vison Operations.
(8 marks) < Answer >
8. Explain how the new Decision Support System (DSS) may enable Vison Operations to improve
staff retention.
(8 marks) < Answer >
In the welfare department, Vison Operations employs 30 staff that visit individuals to assess their welfare
requirements. This job means visiting individuals, who are normally low-paid of facing difficult family
circumstances, to find out whether they should receive financial assistance (sometimes termed ‘benefits’) from Vison
Operations.
The area covered by Vison Operations has a very low population density. Staff may have to travel many kilometers
between each appointment and may not return to their central office for days at a time. Rules, which determine
whether people are entitled to financial assistance, are complicated, with over 6,500 separate rules and 170 different
forms to complete. These rules change frequently: three rules changing each week is not uncommon. Consistent
application of rules is difficult because of benefit fraud, human error, constant changing of rules and time delays
inherent in the system itself. Staff retention is low because of poor morale.
The existing IT system is a mainframe located at the headquarters of Vison Operations. The mainframe contains a
database, which shows, which benefits are due to which individuals. A list of the benefits is printed out weekly, and
benefits are paid out according to the information on this list. The database is accessed and updated from ten
terminals located in the computer room itself. Staff normally updated the database when they return from their visits
to individuals requiring benefits.
Vison Operations has decided to establish a Decision Support System to assist its staff in the application of benefit
rules to the situation of individuals. Vison Operations requires that staff should have access to the Decision Support
System at any time during their working day.
END OF SECTION B
Section C : Applied Theory (20 Marks)
· This section consists of questions with serial number 9 - 10.
· Answer all questions.
· Marks are indicated against each question.
· Do not spend more than 25 -30 minutes on section C.
9 UNIX file system is a storehouse of information consisting of sequence of characters. Explain the
internal structure of the UNIX file system.
(10 marks) < Answer >
10 Novell Netware is a 32-bit Network Operating System that provides services to client
workstations and Client-Server Operating Systems. Briefly explain the features and services
provided by Netware.
(10 marks) < Answer >
END OF SECTION C
END OF QUESTION PAPER
7
Suggested Answers
Information Technology & Systems (MB231) : July 2006
1. Answer : (e)
Reason : In a spreadsheet program, a macro can be used to execute a set of operations that
accomplishes a specific task. So option (e) is the correct answer.
< TOP >
2. Answer : (c)
Reason : Pseudocode is the program design tool that makes use of "imitation code" for writing the logic
of a program. So option (c) is the correct answer.
< TOP >
3. Answer : (c)
Reason : Data Link Layer of OSI Reference Model is responsible for establishing an error-free
communications path between computers over the physical channel. It performs checksum
Cyclic Redundancy Check (CRC) to detect and correct errors in the transmission of data. So
option (c) is the correct answer.
< TOP >
4. Answer : (d)
Reason : Internet Paging, also known as “Buddy List” software, runs on the background of the user's
computer, letting him/her know when his friends or coworkers (only those who are registered)
are online.
Hence, from above discussion, we can infer that option (d) is correct.
Option (a) is incorrect. File Transfer Protocol is an Internet Standard developed to exchange
files. So, it is not applicable here.
Option (b) is incorrect. Internet Telephony is the mechanism of carrying out telephonic
conversations over the Internet. So, it is not applicable here.
Option (c) is incorrect. Internet Fax is the mechanism of sending faxes through computers
connected over the Internet. So, it is not applicable here.
Option (e) is incorrect. Usenet is a system where messages about any subject can be posted
and other people on the Internet can reply to them. So, it is not applicable here.
< TOP >
5. Answer : (d)
Reason : Option (d) is the correct answer. Logical operators are used to test more than one condition
and make a decision.
< TOP >
6. Answer : (a)
Reason : The type definition feature in ‘C’ language allows users to define an identifier that would
represent an existing data type. So option (a) is the answer.
< TOP >
7. Answer : (b)
Reason : Exception Report is generated only in exceptional situations. It lis ts items that fall outside the
prescribed limits. e.g., a report that lists all those items where actual expenditures exceeded
budget targets by at least 10 percent. So option (b) is the correct answer.
Option (a) is incorrect. External Report is prepared primarily for readers outside the company.
e.g., drafts of income statements and balance sheets. So, it is not applicable here.
Option (c) is incorrect. Summary Report summarizes detailed information into convenient,
compact formats. So, it is not applicable here.
Option (d) is incorrect. Periodic Scheduled Report uses a pre-specified format, designed to
provide managers with information on a regular basis. So, it is not applicable here.
Option (e) is incorrect. Push Report is pushed to a manager’s workstation through Intranet in
the form of a web cast. So, it is not applicable here.
< TOP >
8. Answer : (b)
Reason : Structure is used to group data items that are related to each other and of different data types
under a common name. So option (b) is the correct answer.
< TOP >
9. Answer : (e) < TOP >
8
Reason : The ‘ls -s’ command is used to list the files by displaying the number of blocks used by a file
in an UNIX operating system. So option (e) is the answer.
10. Answer : (a)
Reason : The ‘ls -r’ command is used to list files by sorting in reversed order in UNIX operating
system. So option (a) is the answer.
< TOP >
11. Answer : (b)
Reason : The ‘pr’ command is used to prepare a file for printing by adding suitable headers, footers and
formatted text in UNIX operating system. So option (b) is the answer.
< TOP >
12. Answer : (b)
Reason : ‘ %’ symbol is a conversion character used in the statement of a “C” program. So option (b) is
the correct answer.
< TOP >
13. Answer : (c)
Reason : In TCP/IP reference model, the Internet layer is the key layer that holds the whole architecture
together. So option (c) is the answer.
< TOP >
14. Answer : (e)
Reason : Except (e) all the given statements are true. A Linked List in C is a collection of structures
ordered not by their physical placement in the memory (like an array) but by logical links that
are stored as part of the data in the structure itself. So option (e) is the answer.
< TOP >
15. Answer : (b)
Reason : Topology (in communication network context) refers to the way in which the end points or
stations of a network are linked together. So option (b) is the answer.
(a) These are highly parallel computers with many functional units all working on the same
program.
(c) Multicomputers communicated by sending messages over very short, very fast buses.
(d) This is the ability to increase system performance gradually as the work load grows by
adding more processors.
(e) Management uses resource sharing to make all programs, equipment, and data available
to anyone on the network without regard to physical location of the resource and the
user.
< TOP >
16. Answer : (d)
Reason : A wide area network would cover a large geographic area, generally a country or a continent.
It consists of a collection of systems intended for running user programs. These systems are
called hosts and they are connected by a communication subnet.
A collection of interconnected networks is called an internet work or just an internet. A
common form of an internet is a collection of LANs connected by a WAN.
(b) A Metropolitan Area Network is a bigger version of a LAN and normally uses similar
technology. It may cover a group of nearby corporate offices or city and could be either
private or public. This standard that has been adopted and implemented for MAN is
called Distributed Query Dual Bus.
(c) LANs are privately owned networks with in a single building or campus of up to a few
kilometers in size.
(d) Subnet makes the most sense in the context of a WAN where it refers to the collection of
routers and commu nication lines owned by the network operator.
(a) and (e) are a telephone line multiplexer, connecting a large number of in-house
telephone lines or extensions to a smaller number of external lines that lead to the
service provider’s telephone.
< TOP >
17. Answer : (b)
Reason : In videoconferencing, analog signals from a video camera can be digitized and compressed.
So option (b) is the answer.
< TOP >
18. Answer : (e)
Reason : The areas where telecommunications can be applicable are Enterprise Collaboration Systems,
Electronic Commerce Systems and Internal Business Systems. So option (e) is the answer.
< TOP >
9
19. Answer : (c)
Reason : In Packet switching, the message is subdivided into fixed or variable groups called packets.
So option (c) is the answer.
< TOP >
20. Answer : (c)
Reason : The SALVAGE command in Novell Netware Operating System recover the deleted files that
have not been purged. So option (c) is the answer.
< TOP >
21. Answer : (d)
Reason : The CASTOFF command in Novell Netware Operating System stops the receiving of
messages sent by another user. So option (d) is the correct answer.
< TOP >
22. Answer : (b)
Reason : The ‘ENDCAP’ command in Novell Netware Operating System closes a spooled file and
sends the data to the printer. So option (b) is the answer.
< TOP >
23. Answer : (b)
Reason : (d) Value analysis is not relevant to the answer.
(a) Sensitivity analysis is used to observe how repeated changes in a single variable affect
other variables.
(b) Goal-seeking analysis is the reverse of what-if-analysis where repeated changes are
made to selected variables until a chosen variable reaches a target value.
(c) Optimization analysis is used for finding an optimum value for selected variables, given
certain constraints.
(e) Time -series analysis is not related to analytical modeling.
So option (b) is the answer.
< TOP >
24. Answer : (e)
Reason : All the statements are true. i.e variables are case sensitive and they always begins with a letter
and the length of the variables should not be more than eight characters. So option (e) is the
answer.
< TOP >
25. Answer : (a)
Reason : Whenever we use character functions in the program we must include ctype.h file in the
program. So only statement (III) is true. Hence option (a) is the answer.
< TOP >
26. Answer : (c)
Reason : Prefix operator first adds 1 to the operand and assigns the result to the variable on the left.
Postfix operator, on the other hand first assigns the value to the variable on the left and then
increments the operand. Both increment and decrement operators are unary operators used in
C language. So option (c) is the answer.
< TOP >
27. Answer : (e)
Reason : The syntax of printf statement is (printf(“control string”,arg1,arg2,---argn).
The control string comprises:
Characters that will be printed on the screen and formal specifications that define the output
format for display of each item. The control string indicates the number of arguments and
their types. The arguments arg1,arg2,…arg n are the variables whose values are formatted and
printed according to the specifications of the control string. So option (e) is the answer.
< TOP >
28. Answer : (b)
Reason : Whenever we want to bypass some statements in C program, we must use continue statement
in the program. So option (b) is answer.
< TOP >
29. Answer : (e)
Reason : The scope of the automatic variable, static variable, register variable are local to the function .
So option (e) is answer.
< TOP >
30. Answer : (b)
Reason : As a register access is faster than a memory access, if we keep register variable in the loop,
then every time the variables are stored in registers. As register access is faster than memory,
we can reduce the execution time. So option (b) is the answer.
< TOP >
10
Section B : Caselets
1. The companies are moving to hybrid object data warehouses because they handle simple calculations, such as
addition or subtraction, users typically move data from the warehouse to a separate server to perform complex
functions. They also combine the scalability of relational database with the flexibility of object code. It also
performs several types of analysis such as passenger demand, fares and routes.
< TOP >
2. The strategic business value of a data warehouse to Kingfisher Airlines is that it has an ability to reuse the object
code. The strategy also ensures that every one at Kingfisher Airlines uses the same calculations, which can
standardize the calculation methods and variable names. They have seen the power of object extensions to add
strategic business functionality.
< TOP >
3. The benefits of having a hybrid object warehouse are
· Data objects are used to embed sophisticated data cleaning, modeling, calculating and forecasting routines.
· Performance is high.
· Companies can out down the costs.
· Data can be distributed among various departments.
< TOP >
4. The benefits of Gliders switch to a virtual private network (VPN) are:
a. VPNs satisfy the organizational need for connecting distant employees securely to the corporate databases.
b. VPNs are cost effective when compared to other alternatives.
c. VPNs enable any network resource in the branch office to securely connect to any network resource in the
corporate office.
d. VPN ensures that the data travels safely over the internet.
e. VPN ensures that the data is not tampered while in transit.
< TOP >
5. The only task of a VPN is to provide security for the information to travel between the networks. The security
factors to be considered are authentication of the sender and receiver, integrity or data, encryption of the data and
reliability of delivery. The Internet is used by VPNs for the flow of information by:
a. The client computer connects to the internet through an ISP.
b. The client software recognizes the host address and negotiates a VPN session.
c. The IP packets are encrypted and tunneled through the internet.
d. The VPN server then decrypts the packets.
e. Finally the encrypted data flows to the specified resource.
< TOP >
6. The practical perspective of Gliders to VPN’s is
a. Remote access is becoming a necessity for most of the organizations.
b. VPNs enable corporates to satisfy this need in a cost-effective manner.
c. VPN is not only cost-effective, but also easier to install and maintain.
· VPNs establish secure connections by tunneling their way through the internet.
· VPNs can be implemented through either the hardware or the software.
· Encryption technologies are used to ensure privacy of the data.
< TOP >
7. Hardware requirements for the staff at the Vison Operations will include the following:
· Portable computer with large hard disk, RAM memory etc. This will be needed to store the DSS and provide
processing power necessary to access database and perform the necessary searches for benefit information.
· Modem and/or network connection to attach to central database. These will be needed to ensure that staff
receives daily updates of changes in rules and regulations relating to benefit provision. This hardware will
also provide the ability to transfer completed cases back to central location for printing out and to provide a
backup provision.
11
· Central computer system and file server. This will be situated at the headquarters of the Country Council. It
is needed to store the central database for updating prior to sending to portable computers.
SOFTWARE
· Decision-support system on computers. This must be capable of holding and processing the 6,500 rules and
170 forms required by the benefits systems and provide a user friendly interface required to access and use
the system.
· Report-generating software, or some means of transferring the finished output from the DSS to the modem
for onward transmission to central computer system.
· Copy of DSS on the central computer for initial updating of the DSS prior to downloading to the individual
portable computers.
· Communication software to enable the DSS on the mainframe to transfer updates to the individual portable
computers.
< TOP >
8. The new DSS will help Vison Operations to increase its staff retention rate by
· Making it easier for staff to access the information that they require. There are fewer rules and regulations
for the staff to remember, because all this information is on their portable computers with a system to aid
access to that information. Staff can therefore focus on the problems of individuals rather than have to spend
hours learning rules new rules.
· Fewer errors will be made, both rule-selection and in form-completion. As noted above, staff have more time
to concentrate on this activity, and the computer system itself will start to guide staff to the questions that
they need to ask and the rules that are applicable to each given situation.
· All documentation is on the computers there is not the requirement to carry around a paper copy of the rules
or the forms to be completed. Staff will therefore find that they have less to carry around. Similarly, they
will not find themselves in a situation where they have do not have a copy of a required form or regulation.
All the documentation that they find the job less stressful because they have to remember to take their
computer, rather than lots of individual forms and other documents.
Staff will be able to apply the rules to individuals consistently, leaving less room for human judgment. Many
people prefer to ‘blame the computer’ for bad news, and staff may find this a useful tactic when asked to provide
benefits that are not due. Again, this tactic should decrease the amount of stress that staff may find when working.
< TOP >
Section C: Applied Theory
9. In UNIX, every file has a table introduced with it, which is stored in special areas of the disk. This table is called
the identification node. The I-node describes a file uniquely, every disk, in the UNIX system has at least one file
system each with its own root. Every file system consists of a sequence of blocks, each block consisting of 512
bytes. Some of these blocks are not allotted to the user and are reserved exclusively for the user of the kernel.
The file system breaks the disk into four segments.
Boot block
It is the first block, numbered zero, which is normally assigned by the file system and set aside for the booting
procedure.
Super block
It is the second block, numbered 1, which is used to control the allocation of disk blocks. The super block
contains details of the active file system. The block contains the size and status of the file system, the details of
free blocks, and I-nodes. However, it do not contain a complete list of all the free blocks and I-nodes but only as
much as is required to meet current needs.
I-node block
It is the third block, numbered 2 onwards, upto a number determined during the creation of a file system, and
contains most information pertaining to files every file in the file system will have an entry in their block, referred
to as the I-node,. Every 1node is identified by a unique number, which refers the position of the I-node in the Ilist,
which is the complete list of I -nodes. When the user changes the contents of a file, the I-node also gets
updated.
Data Blocks
The final segment, called Data blocks contains a long chain of blocks of storing the contents of files. The UNIX
file system stores data in physical blocks of 512 bytes. The data blocks commence from the point the I-node
blocks terminate. A UNIX file is sequentially organized set of blocks scattered throughout the disk.
12
< TOP >
10. NetWare is a 32-bit network operating system that runs on processors of Intel 80386 and above. The operating
system provides services to client workstations, and to client-server operating systems. The client programs runs
in workstations and requests services from servers. The server manages communications on the network by
controlling access to network hardware and software. A redirector at the client workstation determines whether
requests made by a user are for the local operating system or should be redirected to a server on the network. The
network support software interfaces with the network hardware and communication system, which in turn,
receives and sends messages across the network.
NetWare provides different types of services. The core services called the Netware Core Protocol (NCP) include
file access, file locking, resource tracking and allocating, event notification, and other services to workstations
that request them. Netware is an ideal platform for server applications as it is modular and expandable. Additional
core services can be installed by loading netware loadable modules (NLM). These services could be name space
support, Internetworking, host connectivity, messaging services, communication services, etc.
The most significant feature of NetWare 4.1 is Netware Directory Services (NDS), which provides both users and
network administrators with a single, integrated view of an entire network and the servers connected to it. NDS
supports a network of servers where users can log in once and access the resources of any server depending on
their access rights.
System Administration Features
A network administrator manages a server on the network, wherever it is located from a single network
management station. A management utility called Netware Administrator runs under Microsoft Windows and
provides a graphic view of the network. All regular administrative tasks can be performed by the Netware
Administrator. The administrator consolidates many of the stand-alone commands and text -based utilities. A
text -based version of Netware Administrator is also available for managers who prefer not to use Windows.
Netware also includes a Simple Network Management Protocol (SNMP) compliant management system with
information about resources on the network.
Security Features
The security features of Netware are critical for large corporate network environment. Netware 4 has a five-layer
security model:
1. Login, User and Password Authentication
2. Login Restrictions
3. NDS Security
4. File System Access Rights
5. Directory/File Attributes
Login/Password Security: Users should type the LOGIN command to gain access to the file system. They
should enter their user name and then a password, this is done from SYS: LOGIN. No access is allowed without
the password. After they are logged in, users can access computers in an inter-network based on the access rights
that have been assigned to them by the network administrator.
Login restrictions: In Netware, each user has an account that is managed by a network administrator.
Restrictions can be imposed on the accounts to control when users can log in, the workstation at which they can
log in and the time their accounts expire. It is also possible to force users to change their passwords on a regular
basis and use a unique password that is not similar to the one recently used.
NDS Security: Once the user has been authenticated and the proper login restriction placed, the next security
feature is the NDS security. NDS contains an ACL (Access Control List), which is a property determining who
can access what objects and what they can do with the objects.
· File System Access Rights – There are 8 file system access rights
· Write – Open and change the contents of files and directions
· Read – Open and Read contents or run applications
· Modify – Change name or attributes of a file or directory
· File Scan – See files and directories
· Access Control – Change the trustee assignments
· Create – Create new files and sub-directories
· Erase – Delete a directory, file or sub-directory
· Supervisor – Grants all rights to a directory and its files and subdirectories.
Directory/File Attributes: Can be modified using the FLAG command or the NWADMIN/NETADMIN utility.
13
When a user logs onto the network, the directory server requires that the user’s workstation authenticate that it
knows the user’s password. A special key encryption technique is used to verify the user and ensure that a user’s
password passes over the network wire in an encrypted format. This ensures that the password is not captured
and used for an unauthorized login.
< TOP >
< TOP OF THE DOCUMENT >

0 Comments:

 

Interview Preparation | Placement Papers