Information Technology GKJ
Information Technology GKJ
ITFINAL
SUGGESTIONS
2023 SEMESTER-3
SUBSCRIBE
GOBIND KUMARVJHA
TALK TO US
+ +
+9198744 11552 /+91 89619 77752
NFORMATION,
(TECHNOLOGY)
CHARTERED ACcOUNTANT(FINALIST)
LLB.HONS
" M.COM FROM CU
" B.COM(GOENKAN)
" HS SCHOLAR 2011
" DOUBLE GRADUATE
ADVOCATE
O StrivingForlargest_gkj
GOBIND KUMAR JHA 9874411552
Unit – 1
Information Technology and Business – An Overview
The main difference between data and information may be pointed out in a tabular form:
Data Information
1. Data is collection of facts, figures, statistics or 1. Information is the organized, analyses or
statements connected in the subject matter. classified data.
2. Data are raw materials for producing 2. Information is final product from data.
information.
3. Data is the cause. 3. Information is the effect.
4. Data may be singular or plural. 4. Information is always in plural form.
5. It does not help in decision-making. 5. Decision can be taken on the basis of
information.
6. It is not able to provide any correct meaning 6. It provides a correct meaning.
before processing.
7. A set of words may be treated as data. 7. A sentence may be considered information.
8. It is fixed until processed. 8. It is semi-variable or variable.
a) Pay – roll:
b) Invoice:
c) Marks of Candidates:
Information system can be manual or it can be operated by some machines like computers. When
information system is operated by any computer then it is called computer based information system.
The elements of computer based information systems are:
a) Hardware
b) Software
c) Database
d) People
1
GOBIND KUMAR JHA 9874411552
e) Procedure
Need of Information:
Information is needed:
To gain knowledge about the surroundings and whatever is happening in the society and universe.
To keep the system up to date.
To know about the rules and regulations and bye laws of society, local government, provincial and
central government, associations, clients, etc. as ignorance is no bliss.
A working definition of data processing usually includes all operations performed on data disclosure,
management, use and collection of data within a company. The strategic goal of data processing is to
convert raw data into meaningful information that improves a current situation or resolves an existing
problem. Data processing outputs often take various forms such as reports, diagrams and graphics that
make the data easier to understand and analyse.
a) Input
b) Processing
c) Output
d) Interpretation
e) Feedback
f) Storage
a) Editing
b) Coding
c) Data Entry
2
GOBIND KUMAR JHA 9874411552
d) Validation
e) Tabulation
BPO is a process in which one company hires another company to handle its own business activities.
Business process outsourcing (BPO) is the contracting of non-primary business activities and functions to a
third-party provider. BPO services include payroll, human resources (HR), accounting and customer/call
center relations.
BPO services can be divided into back office outsourcing and front office outsourcing:
a) Back Office Outsourcing Services can include quality assurance, data entry, data management,
accounting support, payment processing and surveys.
b) Front Office Outsourcing Services can include fax, email, phone conversations and other forms of
communication with customers.
Companies will typically outsource BPO front office services in customer service/support, inbound and
outbound sales, market research, appointment scheduling and technical support.
BPO services can be contracted locally, in a nearly country, and an outside country.
a) Onshore Outsourcing: Onshore outsourcing (also called domestic outsourcing) is the obtaining of
services from someone outside a company but within the same country.
b) Nearshore Outsourcing: Nearshore outsourcing is the practice of getting work done or services
performed by people on neighboring countries rather than in your own country.
c) Offshore Outsourcing: Offshore outsourcing, a type of business process outsourcing, is the exporting
of IT related work from the United States and other developed countries to areas of the world where
there is both practical stability and lower labour costs or tax savings.
a) Cost Reduction
b) Focus on your business
c) Improved productivity
d) Access to state of the art process and technology resources
e) Ability to reassign resources
3
GOBIND KUMAR JHA 9874411552
Knowledge Process Outsourcing (KPO) is one-step extension of Business Process Outsourcing. Knowledge
Process may be defined as high added value process chain where the achievement of objective is highly
dependent on skills, domain knowledge and expertise of people out actually. Thus KPO involves transfer of
knowledge intensive business processes that require significant domain expertise to other geographical
locations. For global corporation looking to move their higher end research as market research, analytical
based services, IPR, legal services, pharmaceutical R & D, data mining services, etc.
A transaction process system (TPS) is an information processing system for business transactions involving
the collection, modification and retrieval of all transaction data. Characteristics of a TPS include
performance, reliability and consistency. TPS is also known as transaction processing or real time processing.
MIS is the use of information technology, people, and business processes to record, store and process data
to produce information that decision makers can use to make day to day decisions.
MIS is the acronym for Management Information System. In a nutshell, MIS is a collection of systems,
hardware, procedures and people that all work together to process, store and produce information that is
useful to the organization.
Need of MIS:
Components of MIS:
4
GOBIND KUMAR JHA 9874411552
Decision Support Systems (DSS):
Decision support systems are used by top level managers to make semi-structured decisions. The output
from the Management Information System is used as input to the decision support system. DSS systems also
get data input from external sources such as current market forces, competition, etc.
Knowledge management systems refer to any kind of IT system that stores and retrieves knowledge,
improves collaboration, locates knowledge, captures and uses knowledge, or in some other way enhances
the KM process.
Purpose of KMS:
Improved performance
Competitive advantage
Innovation
Sharing of knowledge
Integration
Continuous improvement
Understanding the various levels of an organization is essential to understand the information required by
the users who operate at their respective levels.
The following diagram illustrates the various levels of a typical organization:
5
GOBIND KUMAR JHA 9874411552
Operational Management Level:
The operational level is concerned with performing day to day business transactions of the organization.
This organization level is dominated by middle level managers, heads of departments, supervisors, etc. The
users at this level usually oversee the activities of the users at the operational management level.
This is the most senior level in an organization. The users at this level make unstructured decisions. Senior
level managers are concerned with the long-term planning of the organization. They use information from
tactical managers and external data to guide them when making unstructured decisions.
6
GOBIND KUMAR JHA 9874411552
Unit – 2
Data Organisation and Data Base Management System
[10 Marks]
Data Organisation:
Data organization, in broad terms, refers to the method of classifying and organizing data sets to make them
more useful. Some IT experts apply this primary to physical records, although some types of data
organization can also be applied to digital records.
Data are the principal resources of an organization. Data stored in computer systems form a hierarchy
extending from a single bit to a database, the major record-keeping entity of a firm. Each higher rung of this
hierarchy is organized from the components below it.
Data are logically organized into:
1. Bits (characters)
2. Fields
3. Records
4. Files
5. Databases
1. Bit (Character) – a bit is the smallest unit of data representation (value of a bit may be a 0 or 1). Eight
bits make a byte which can represent a character or a special symbol in a character code.
2. Field – a field consists of a grouping of characters. A data field represents an attribute (a characteristic
or quality) of some entity (object, person, place or event).
3. Record – a record represents a collection of attributes that describe a real-world entity. A record
consists of fields, with each field describing an attribute of the entity.
4. File – a group of related records. Files are frequently classified by the application for which they are
primarily used (employee file). A primary key in a file is the field (or fields) whose value identifies a
record among others in a data file.
5. Database – is an integrated collection of logically related records or files. A database consolidates
records previously stored in separate files into a common pool of data records that provides data for
many applications. The data is managed by systems software called database management systems
(DBMS). The data stored in a database is independent of the application programs using it and of the
types of secondary storage devices on which it is stored.
11
GOBIND KUMAR JHA 9874411552
Types of data processing systems:
a) Serial,
b) Batch,
c) Real-time,
d) Online,
e) Centralized,
f) Distributed
Serial Processing:
The Serial Processing Operating Systems are those which performs all the instructions into a Sequence
Manner or the instructions those are given by the user will be executed by the FIFO Manner means First In
First Out.
Batch Processing:
The Batch Processing is same as the Serial Processing Technique. But in the Batch Processing similar types of
jobs are firstly prepared and they are stores on the Card and that card will be submit to the system for the
processing.
As the name suggests this method is used for carrying out real-time processing. This is required where the
results are displayed immediately or in lowest time possible.
Online Processing:
This processing method is a part of automatic processing method. This method at times known as direct or
random access processing. Under this method the job received by the system is processed at same time of
receiving. This can be considered and often mixed with real-time processing. This system features random
and rapid input of transaction and user defied/demanded direct access to data bases/content when needed.
Centralized Processing:
Centralized Processing performed in one computer or in a cluster of coupled computers in a single location.
Access to the computer is via “dumb terminals,” which send only input and receive output or “smart
terminals,” which ass screen formatting. All data processing is performed in a central computer.
12
GOBIND KUMAR JHA 9874411552
Distributed Processing:
Distributed means data is stored and processed on Multiple Locations. When a data is stored on to the
Multiple Computers, those are places in different locations. Distributed means in the network, network
collections of computers are connected with each other.
File Organisations:
Data files are organized so as to facilitate access to records and to ensure their efficient storage. A trade off
between these two requirements generally exists. If rapid access is required, more storage is required to
make it possible.
Access to a record for reading it is the essential operation on data. There are two types of access:
1. Sequential access – is performed when records are accessed in the order they are stored. Sequential
access is the main access mode only in batch systems, where files are used and updated at regular
intervals.
2. Direct access – online processing requires direct access, whereby a record can be accessed without
accessing the records between it and the beginning of the file. The primary key serves to identify the
needed record.
This is an advanced sequential file organization method. Here records are stored in order to primary key in
the file. Using the primary key, the records are sorted. For each primary key, an index value is generated and
mapped with the record.
Direct file organization provides the fastest direct access to records. When using direct access methods,
records do not have to be arranged in any particular sequence on storage media. Characteristics of the
direct access method include:
a) Computers must keep track of the storage location of each record using a variety of direct
organization methods so that data can be retrieved when needed.
b) New transactions data do not have to be sorted.
13
GOBIND KUMAR JHA 9874411552
c) Processing that requires immediate responses or updating is easily performed.
A relative file consists of records by their relative address, following are the key attributes of relative file
organization: -
Records can be read in sequential order just like in sequential and indexed file organization.
Records can be accessed using relative key. Relative key represents the record’s location relative to
the address of the start of the file.
Records can be inserted using relative key. Relative address is calculated using relative key.
Relative file provides the fastest access to the records.
The main disadvantage of this file system is that if some intermediate records are missing, they will
also occupy space.
What is Data:
By data, we mean known facts that can be recorded and that have implicit meaning. Consider the names,
telephone numbers, addresses of the people you know. We may record this data in an indexed address book
or diskette using a personal computer and software such as FoxPro, Excel and Access, etc.
What is Database:
It is fair to say that databases will play a critical role in almost all areas where computers are used including
business, engineering, law, education and library science, etc. The term database is a collection of related
data with an implicit meaning.
A DBMS is a collection of programs that enables users to create and maintain a database. A DBMS is hence a
general purpose software that facilitates the process of defining, constructing and manipulating databases
for various applications.
Advantages of DBMS:
14
GOBIND KUMAR JHA 9874411552
c) Enforces user defined rules to ensure the integrity of data in a table form.
d) Maintains data dictionary for all storage of information pertaining to data fields and data
manipulation.
e) Ensures that data can be shares across all applications.
f) Enforces data access authorization.
Entity:
An entity is a thing or object in the real world that is distinguishable from all other objects. It is an object of
interest to an organization. Example –
Each person in an enterprise
Each student in the institute
Loan in bank, etc.
Attribute:
A characteristic or trait of an entity type that describes the entity, for example, the Person entity type has
the Date of Birth attribute.
An attribute values describing an entity will constitute a significant portion of the data stored in the
database.
A key is a single attribute or combination of two or more attributes of an entity set that is used to identify
one or more instance of the set.
Primary Key:
The attribute of entity set which identifies and distinguishes instances of entity set is called primary key. If
we add additional attributes to a primary key, the resulting combination would still uniquely identify an
instance of the entity set. Primary keys are used to identify tables. There is only one primary key per table.
Candidate Keys:
Candidate keys are those keys which is candidate for primary key of a table. In simple words we can
understand that such type of keys which full fill all the requirements of primary key which is not null and
have unique records is a candidate for primary key. So thus type of key is known as candidate key. Every
table must have at least one candidate key but at the same time can have several.
15
GOBIND KUMAR JHA 9874411552
Foreign Keys:
Foreign keys are those keys which is used to define relationship between two tables. When we want to
implement relationship between two tables then we use concept of foreign key. It is also known as
referential integrity.
Alternate Key:
If any table have more than one candidate key, then after choosing primary key from those candidate key,
rest of candidate keys are known as an alternate key of that table.
Referential Integrity:
Referential integrity refers to the accuracy and consistency of data within a relationship.
In relationships, data is linked between two or more tables.
Table:
In relational database model, a table is a collection of data elements organized in terms of rows and
columns. A table is also considered as a convenient representation of relations. But a table can have
duplicate row of data while a true relation cannot have duplicate data. Table is the most suitable form of
data storage.
Data Dictionary:
A data dictionary is a collection of description of the data objects or items in a data model for the benefit of
programmers and others who need to refer to them.
Data Mining:
Data mining (also called data or knowledge discovery) is the process of analysing data from different
perspective and summarizing it into useful information which can be used to increase revenue, cut costs or
both.
Data Warehousing:
When companies centralize their data into one database or program, it is called data warehousing. With a
data warehouse, an organization may spin off segments of the data for specific users to analyse and utilize.
16
GOBIND KUMAR JHA 9874411552
Benefits of Data Warehousing:
a) Marketing/retail
b) Finance/banking
c) Manufacturing
d) Governments
a) Privacy issues
b) Security issues
c) Misuse of information/inaccurate information
Big data analysis is the process of examining large and varied data sets i.e., big data – to uncover hidden
patterns, unknown correlations, market trends, customer preferences and other useful information that can
help organizations make more informed business decisions.
17
GOBIND KUMAR JHA 9874411552
Unit – 3
Internet and Its Applications [8 Marks]
Meaning of Internet:
The internet is a globally connected network system that uses TCP/IP to transmit data via various types of
media. The internet is a network of global exchanges – including private, public, business, academic and
government networks – connected by guided, wireless and fiber-optic technologies.
The terms internet and World Wide Web are often used interchangeably, but they are not exactly the same
thing; the internet refers to the global communication system, including hardware and infrastructure, while
the web is one of the services communicated over the internet.
Creator of Internet:
The internet began in 1969 as a research project funded by the Department of Defense with a goal of
creating a means of communication beside telephone lines. The first network was called ARPANET
(Advanced Research Project Agency NETwork).
Advantages of Internet:
Disadvantages of Internet:
An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a
computer network that uses the Internet Protocol for communication. An IP address serves two principal
functions: host or network interface identification and location addressing.
Uses of IP address:
An IP address provides an identity to a networked device. Similar to a home or business address supplying
that specific physical location with an identifiable address, devices on a network are differentiated from one
another through IP addresses.
IPv4 is the forth revision of the Internet Protocol used to identify devices on a network through an
addressing system. The internet protocol is designed for use in interconnected systems of packet-switched
computer communication networks.
A new internet addressing system internet protocol version 6 is being deployed to fulfill the need for more
internet addresses.
IPv6 is also called IPng (Internet Protocol next generation) and it is the newest version of the internet
protocol reviewed in the IETF standards committees to replace the current version of IPv4.
An IP address is binary numbers but can be stored as text for human readers. For example, a 32 bit numeric
address is written in decimal as four numbers separated by periods. Each number can be zero to 255. For
example, 1.160.10.240 could be an IP address.
22
GOBIND KUMAR JHA 9874411552
Uniform Resource Locator (URL):
A uniform resource locator colloquially termed a web address, is a address, is a reference to a web resource
that specifies its location on a computer network and a mechanism for retrieving it. A URL is a specific type
of uniform resource identifier, although many people use the two terms interchangeable.
URL Types:
a) Absolute URL:
Absolute URL is a complete address of a resource on the web. This completed address comprises of
protocol used, server name, path name and file name. For example –
FTP
https
Gopher
mailto
news
b) Relative URL:
Relative URL is a partial address of a webpage. Unlike absolute URL, the protocol and server part are
omitted from relative URL.
DNS stands for “Domain Name System”. Domain names serve as memorisable names for websites and other
services on the internet. However, computers access internet devices by their IP addresses. DNS translates
domain names into IP addresses, allowing you to access an internet location by its domain name.
When computers communicate with each other, there needs to be a common set of rules and instructions
that each computer follows. A specific set of communication rules is called a protocol. Because of the many
ways computers can communicate with each other, there are many different protocols – too many for the
average person to remember.
23
GOBIND KUMAR JHA 9874411552
File Transfer Protocol (FTP):
File Transfer Protocol is a client/server protocol used for transferring files to or exchanging files with a host
computer. It may be authenticated with user names and passwords. Anonymous FTP allows users to access
files, programs and other data from the internet without the need for a user ID or password.
Telnet (TN):
Telnet is a user command and an underlying TCP/IP protocol for accessing remote computers. Through
Telnet, an administrator or another user can access someone else’s computer remotely. On the web, HTTP
and FTP protocols allow you to request specific files from remote computers, but not to actually be logged
on as a user of that computer.
DHTML is a combination of web development technologies used to create dynamically changing websites.
Web pages may include animation, dynamic menus and text effects.
XML is used to describe data. The XML standard is a flexible way to create information formats and
electronically share structured data via the public internet, as well as via corporate networks.
Ethical Hacking:
Ethical hacking and ethical hacker are terms used to describe m=hacking performed by a company or
individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass
system security and search for any weak points that could be exploited by malicious hackers.
24
GOBIND KUMAR JHA 9874411552
Cloud Computing:
Cloud computing is the use of various services, such as software development platforms, servers, storage
and software, over the internet, often referred to as the “cloud”.
Mobile Computing:
Mobile computing refers to the interaction between a human and a computer that takes place during
transportation. This is done through mobile devices such as phones and handhelds. Mobile computing
involves communication, hardware and software that are all mobile.
Mobile Hardware:
Mobile hardware includes mobile devices or device components that receive or access the service of
mobility. They would range from portable laptops, smartphones, tablet, pc’s, Personal Digital Assistants.
The internet of things is a computing concept that describes the idea of everyday physical objects being
connected to the internet and being able to identify themselves to other devices.
a) Privacy: The internet contains wealth of data and it is always a serious subject of concern for privacy
issues in social networking sites.
b) Free speech: Here everyone has the right to freedom of opinion and expression.
c) Data Leakage: Data security and protection is expensive and difficult.
d) Identity Theft: Identity theft is one from many examples of ethical issues in social networking.
25
GOBIND KUMAR JHA 9874411552
Unit – 4
Security and Encryption [8 Marks]
a) Confidentiality:
b) Integrity:
c) Availability:
d) Authenticity:
e) Non-Repudiability:
f) Encryption:
g) Auditability:
a) Encryption:
b) Digital Signature:
c) Security Certificates:
28
GOBIND KUMAR JHA 9874411552
Encryption:
Encryption is the process of using an algorithm to transform information to make it unreadable for
unauthorized users. This cryptographic method protects sensitive data such as credit card numbers by
encoding and transforming information into unreadable cipher text. This encoded data may only be
decrypted or made readable with a key. Symmetric key and asymmetric key are the two primary types of
encryption. Encryption is essential for ensured and trusted delivery of sensitive information.
Need of Encryption:
In computing, encryption is the method by which plaintext or any other type of data is converted from a
readable form to an encoded version that can only be decoded by another entity if they have access to a
decryption key. Encryption is one of the most important methods for providing data security, especially for
end-to-end protection of data transmitted across networks.
a) Integrity:
b) Non-repudiation:
c) Authenticity:
d) Confidentiality:
e) Privacy:
f) Availability:
29
GOBIND KUMAR JHA 9874411552
E-Commerce Security:
E-commerce security refers to the principles which guide safe electronic transactions, allowing the buying
and selling of goods and services though the internet, but with protocols in place to provide safety for those
involved. Successful business online depends on the customers’ trust that a company has E-Commerce
security basics in place.
Threat:
A threat, in the context of computer security, refers to anything that has the potential to cause serious harm
to a computer system. A threat is something that may or may not happen, but has the potential to cause
serious damage. Threats can lead to attacks on computer systems, networks and more.
Malicious code is the term used to describe any code in any part of a software system or script that is
intended to cause undesired effects, security breaches or damage to a system. Malicious code describes a
broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses,
backdoors, and malicious active content.
Virus:
A computer virus is a type of malicious software that, when executed, replicates itself by modifying other
computer programs and inserting its own code.
Types of viruses:
a) File infectors:
b) Macro viruses:
c) Overwrite viruses:
d) Polymorphic viruses:
30
GOBIND KUMAR JHA 9874411552
e) Resident viruses:
f) Rootkit viruses:
Hacking:
Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a
wide range of topics. The first known event of hacking had taken place in 1960 at MIT and at the same time,
the term “hacker” was originated.
Hacking is the act of finding the possible entry points that exist in a computer system or a computer network
and finally entering into them. Hacking is usually done to gain unauthorized access to a computer system or
a computer network, either to harm the systems or to steal sensitive information available on the computer.
Types of hacking:
a) Website Hacking:
b) Network Hacking:
c) Email Hacking:
d) Ethical Hacking:
e) Password Hacking:
f) Computer Hacking:
31
GOBIND KUMAR JHA 9874411552
Trojan Horse:
In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious. Unexpected
changes to computer settings and unusual activity, even when the computer should be idle, are strong
indications that a Trojan is residing on a computer.
Worm:
A worm is a type of malicious software that replicates while moving across computers, leaving copies of
itself in the memory of each computer in its path.
Spyware:
Spyware is software is installed on a computing device without the end user’s knowledge. Such software is
controversial because even though it is sometimes installed for relatively innocuous reason, it can violate
the end user’s privacy and has the potential to be abused.
Ransomware:
Ransomware is a type of malware program that infects, locks or takes control of a system and demands
ransom to undo it. Ransomware attacks and infects a computer with the intention of extorting money from
its owner. Ransomware may also be referred to as a crypto-virus, crypto-Trojan or crypto-worm.
Spoofing:
Spoofing, in general, is a fraudulent or malicious practice in which communication is sent from an unknown
source disguised as a source known to the receiver. Spoofing is most prevalent in communication
mechanism that lack a high level of security.
Spoofing Attack:
A spoofing attack is when a malicious party impersonates another device or user on a network in order to
launch attacks against network hosts, steal data, spread malware or bypass access controls. There are
several different types of spoofing attacks that malicious parties can use to accomplish this. Some of the
most common methods include IP address spoofing attacks, ARP spoofing attacks and DNS server spoofing
attacks.
32
GOBIND KUMAR JHA 9874411552
Sniffing:
A packet sniffer is a utility that has been used since the original release of Ethernet. Packet sniffing allows
individuals to capture data as it is transmitted over a network. This technique is used by network
professionals to diagnose network issues, and by malicious users to capture unencrypted data, like
passwords and usernames. If this information is captured in transmit, a user can gain access to a system or
network.
Phishing:
Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or
other communication channels. The attacker uses phishing emails to distribute malicious links or
attachments that can perform a variety of functions, including the extraction of login credentials or account
information from victims.
Spamming:
Email spam, also known as junk email, is a type of electronic spam where unsolicited messages are sent by
email.
Many email spam messages are commercial in nature but may also contain disguised links that appear to be
for familiar websites but in fact lead to phishing web sites or sites that are hosting malware. Spam email may
also include malware as scripts or other executable file attachments (Trojan).
A spammer typically sends an email to millions of email addresses, with the expectation that only a small
number will respond or interact with the message.
A denial of service is any type of attack where the attackers (hackers) attempt to prevent legitimate users
from accessing the service. In a DoS attack, the attacker usually sends excessive messages asking the
network or server to authenticate requests that have invalid return addresses. The network or server will
not be able to find the return address of the attacker when sending the authentication approval, causing the
server to wait before closing the connection. When the server closes the connection, the attacker sends
more authentication messages with invalid return addresses. Hence, the process of authentication and
server wait will begin again, keeping the network or server busy.
a) Ineffective services
b) Inaccessible services
c) Interruption of network traffic
33
GOBIND KUMAR JHA 9874411552
d) Connection interference
An information technology solution is a set of related software program and/or services that are sold as a
single package. IT vendors, service providers and value-added resellers market their software suites and
service bundle under the label solution to promote the idea that purchasing the product will help the
customer successfully solve a problem or deal with a complicated situation.
Confidentiality:
Confidentiality, in the context of computer systems, allows authorized users to access sensitive and
protected data. Specific mechanisms ensure confidentiality and safeguard data from harmful intruders.
Confidentiality is roughly equivalent to privacy.
Encryption:
Encryption refers to converting the message into a code so that unauthorized person may not understand it.
Decryption:
Decryption is the process of converting encrypted data back into its original form, so that it can be
understood.
Firewall:
A firewall is a system designed to prevent unauthorized access to or from a private network. You can
implement a firewall in either hardware or software form, or a combination of both. Firewalls prevent
unauthorized internet users from accessing private networks connected to the internet, especially intranets.
All messages entering or leaving the intranet (i.e., the local network to which you are connected) must pass
through the firewall, which examines each message and blocks those that do not meet the specified security
criteria.
Ina computer networks, a DMZ, also sometimes known as a perimeter network or a screened sub network, is
a physical or logical subnet that separates an internal local areas network (LAN) from other untrusted
34
GOBIND KUMAR JHA 9874411552
networks, usually the internet. External-facing servers, resources and services are located in the DMZ. So,
they are accessible from the internet, but the rest of the internal LAN remains unreachable. This provides an
additional layer of security to the LAN as it restricts the ability of hackers to directly access internal servers
and data via the internet.
SSL stands for Secure Sockets Layer and, in short, it’s the standard technology for keeping an internet
connection secure and safeguarding any sensitive data that is being sent between two systems, preventing
criminals from reading and modifying any information transferred, including potential personal details. The
two systems can be a server and a client (for example, a shopping website and browser) or server to server
(for example, an application with personal identifiable information or with payroll information).
HTTPs:
HTTPs (Hyper Text Transfer Protocol Secure) appears in the URL when a website is secured by an SSL
certificate. The details of the certificate, including the issuing authority and the corporate name of the
website owner, can be viewed by clicking on the lock symbol on the browser bar.
The purpose of a website audit is to aid webmasters or owners in the understanding of the functional areas
and components of a website’s performance on the internet. This audit is very important to your online
campaign.
35
GOBINd kumar JHA 9874411552
The bill was passed in the budget session of 2000 and signed by President K. R. Narayanan on 9 May 2000. The bill was
finalised by group of officials headed by then Minister of Information Technology Pramod Mahajan.
Summary:
The original Act contained 94 sections, divided in 13 chapters and 4 schedules. The laws apply to the Whole of India.
Persons of other nationalities can also be indicted under the law, if the crime involves a Computer or network located in
India. It is the primary law in India dealing with cybercrime and electronic commerce.
Date enacted 9th June, 2000
Date assented to 9th June, 2000
Date signed 9th May, 2000
Date commenced 17th October, 2000
Electronic Governance:
1. Data is: (Processed and structured facts and fig Militarised ures/Raw and structured facts and figures/Raw and
unstructured facts and figures/Defined and unstructured facts and figures).
2. 'Field' in relation to DBMS means: (Entity/Records/Column/All of these).
3. The first network that established the concept of the Internet was: (WWW/TELNET/NSF-NET/ARPANET).
4. . DMZ stands for: (DE-Materialised Zone/De- Militarised Zone/De-Military Zone/De-Mutual Zone).
5. The objective(s) of the Information Technology Act, 2000 is/are: (To stop cybercrime/To provide the facility of
filing documents online/Both (A) and (B)/None of these).
6. URL stands for: (Uniform Resource Locator/Universal Resource Locator/Universal Resource Land/Unity
resource Locator).
7. In ________________________ data processing system data is processed in chronological order.
(Centralised/Online/Batch/Serial)
8. DSS stands for: (Digital Support System/Decision Support System/Delivery Support System/Distribution
Support System).
9. How many schedules are there in the IT Act, 2000? (2/3/4/5)
10. An attempt to make a computer resource unavailable to its intended users is called ________. (Denial-of-service
attack/Virus attack/Worm attack/Hacking)
11. Encryption is
(i) the process of converting ciphertext back to plaintext
(ii) the process of conversion of information into something which appears to be meaningless
(iii) used to save data on the cloud
(iv) to make it as difficult as possible to decrypt the generated ciphertext without using the key
{(i) and (iv)/(ii) and (iv)/(ii) and (iii)/(i) and (iii)}
12. Identify the incorrect statement
(i) Worm is a malicious code that requires the host program to perform its operations.
(ii) Worm replicates itself using a network medium
(iii) Worm allows computers to run smoothly
(iv) Worm can mail its own copy to other computer systems through e-mail facilities.
{(i) and (ii)/(ii) and (iii)/(iii)and (iv)/(i) and (iii)}
13. Identify the statement in which one is correct. (Ethical hackers can't identify the vulnerabilities with the
ports/Ethical hackers neither break the password protection, firewalls nor decode the encrypted data/Ethical
hackers use the same tools and techniques that the criminal hackers use/Ethical hackers never use social
engineering techniques to get access to vital information)
14. 14. "Internet of Things" has been introduced by: (Stave jobs/Stephen William Hawking/Bill Gates/Kevin
Ashton).
15. Match the following:
(P) Data warehousing (i) Data investigation
(Q) Data mining (ii) Data integration
(R) Big Data Analysis (iii) Knowledge discovery of data
{(P) - (ii), (Q) - (iii), (R) - (i)/(P) - (i), (Q) - (iii), (R) - (ii)/(P) - (ii), (Q) - (i), (R) - (iii)/None of the above}
16. Identify the correct statement. (A foreign key is a key which is obtained from a foreign country/Foreign key is a
key which is unique for each record/Foreign key is the attribute which has the potential to become a primary key
of the records of an entity/Foreign key is a particular attribute of a table which is the primary key of another
table)
17. _____________ are documents that when filled in create ______________________. (Table, Record/Forms,
Record/Forms, Information/Data, Information)
18. KMS refers to: (generation of reports for the top management level based on organizational knowledge/collection
and analysis of organizational information for formulating strategic decisions by the top-level
management/Storage, retrieval, and best use of organizational data/Process of capturing, developing, sharing,
and effective use of organizational knowledge)
19. E-Governance is the application of_______ for providing various _______ services to citizens, business-houses,
government bodies etc. (IT, government/ICT, government/ICT, transport/IT, transport)
20. The key features of knowledge process outsourcing (KPO) are: (provides easy access to the most skilled labours
of the world/The company can access to the technological advancement of the country to which the work is out-
sourced/Both (a) and (b)/None of the above).
21. BPO service which is outsourced within the same country is called ________. (onsourcing/outsourcing/onshore
outsourcing/offshore outsourcing)
22. The data dictionary is primarily maintained within an organization by the: (Data Base Management
System/Database Administration System/Data Base Administrator/Database manager).
23. Identify the incorrect statement: (XML is used to share information in a consistent way/XML does not support
the use of nested tags/XML is defined as a set of rules for encoding documents which is readable by the human
being as well as machine/XML describes elements of data).
24. HTTPs provide: (Authentication/Confidentiality/Security/All of these).
25. Any person aggrieved by an order by the controller or an adjudicating officer may appeal to the __________.
within _________ days from the date of passing the order. (Certifying authority, 45/high Court, 45/Cyber
Appellate Tribunal, 30/Cyber Appellate Tribunal, 45)
GOBIND AR JHA
rajpchouhnst