Ict Last Part
Ict Last Part
Ict Last Part
technologies
The networking infrastructure for a large company includes the traditional telephone
system, mobile cellular communication, wireless local area networks,
videoconferencing systems, a corporate Web site, intranets, extranets, and an array of
local and wide area networks, including the Internet.
Q. Define Communication & Telecommunication. [CMA S(am April-2019,
2020]
Communication is simply the act of transferring information from one place, person or
group to another.
Telecommunication is the transmission of information by various types of technologies
over wire, radio, optical, or other electromagnetic systems.
Q. Define various types of networks & key digital networking technologies?
[CMA S(am M ay-2023]
There are several different types of computer networks. Computer networks can be
characterized by their size as well as their purpose.
o Some of the different networks based on size are:
Personal area network, or PAN
Local area network, or LAN
Metropolitan area network, or MAN
Wide area network, or WAN o Some of the different
networks based on their main purpose are:
Sorage area network, or SAN
Elterprise private network, or
9N
Virtual private network, or VPN
Key digital networking technologies: Contemporary digital networks and the Internet
are based on three key technologies: client/server computing, the use of packet
switching, and the development of widely used communications standards (the most
important of which is Transmission Control Protocol/lnternet Protocol, or TCP/IP) for
linking disparate networks and computers
• Internet Technology
Internet Technologies is a technical field that covers the necessary skills to develop
applications on the Internet or Internet based systems, harnessing e-commerce, cloud,
mobile, and Web based technologies.
Q. How do the Internet and Internet technology work, and how do they support
communication and e-business?
The Internet is a worldwide network of networks that uses the client/server model of
computing and the TCP/IP network reference model. â'ery computer on the Internet is
assigned a unique numeric IP address. The domain name system (DNS) converts IP
addresses to more user-friendly domain names. Worldwide Internet policies are
established by organizations and government bodies, such as the Internet Architecture
Board (IAB) and the World Wide Web Consortium (W3C). Major Internet services
include e-mail, newsgroups, chatting, instant messaging, Telnet, file transfer protocol
(FTP), and the Web. Web pages are based on Hypertext Markup Language (HTML)
and can display text, graphics, video, and audio. Web site directories, search engines,
and RSS (Really Smple S'ndication) technology help users locate the information they
need on the Web. RSS, blogs, social networking, and wikis are features of Web 2.0.
firms are also starting to realize economies by using Voice-over Internet Protocol
(VOIP) technology for voice transmission and by using virtual private networks (VPNs)
as low-cost alternatives to private WANs.
Q.Why are radio frequency identification (RAD) and wireless sensor networks
valuable for busi ness?
RFD systems provide a powerful technology for tracking the movement of goods by
using tiny tags with embedded data about an item and its location. RFD readers read the
radio signals transmitted by these tags and pass the data over a network to a computer
for processing. Wireless sensor networks (WSNs) are networks of interconnected
wireless sensing and transmitting devices that are embedded into the physical
environment to provide measurements of many points over large spaces.
The principal technologies and standards for wireless networking, communications, and
Internet access are Snartphones, 3G, 4G networks, Bluetooth, PANS, Wi-Fl, Hotspots
and WiMax,. ach varies in capability and is suited for certain type of applications.
Smartphones Combine the functionality of a cellphone with that of a mobile laptop computer
with Wi-F capability
3G networks Transmission speeds ranging from 144Kbps for mobile users in , say, a car to
more than 2 Mbps for stationary users, offer fair transmission speeds for email,
browsing the web, and online shopping but are too slow for videos
4G networks Much higher speeds, more than enough capacity for watching high definition
video on your 100 megabits/second downloading and 50 megabits
upload speed
Q. What are the major capabilities of database management (DBMS), and why is
a relational DBMS so powerful?
The principal capabilities of a DBMS include a data definition capability, a data
dictionary capability, and a data manipulation language. The data definition capability
specifies the structure and content of the database. The data dictionary is an automated
or manual file that stores information about the data in the database, including names,
definitions, formats, and descriptions of data elements. The data manipulation language,
such as Sructured Query Language (SQL), is a specialized language for accessing and
manipulating the data in the database. The relational database is the primary method for
organizing and maintaining data today in information systems because it is so flexible
and accessible. It organizes data in twodimensional tables called relations, with rows
and columns. Relational database tables can be combined easily to deliver data required
by users, provided that any two or more tables share a common data element.
Q. What are the principal tools and technologies for accessing information from
databases to improve business performance and deci§on making? [CMA Sam
June-2020]
Powerful tools are available to analyze and access the information in databases. A data
warehouse consolidates current and historical data from many different operational
systems in a central database designed for reporting and analysis. Data warehouses
support multidimensional data analysis, also known as online analytical procesng
(OLAP). OLAP represents relationships among data as a multidimensional
which can be visualized as cubes of data and cubes within cubes of data, enabling more
sophisticated data analysis. Data mining analyzes large pools of data, including the
contents of data warehouses, to find patterns and rules that can be used to predict future
behaviour and guide decision making. Text mining tools help businesses analyze large,
data sets consisting of text. Web mining tools focus on analysis of useful
patterns and information from the World Wide Web, examining the structures of Web
sites and activities of site users as well as the contents of Web pages. Conventional
databases can be linked via middleware to the Web or a Web interface to facilitate user
access to an organization's internal data.
Q. Define Data Warehouse and Data Mining? [CMA Sem June-2018, Jan-2022,
June2020,2021, January-2023]
Data Warehouse:
A data warehouse isa central repository of information that can be analyzed to make
more informed decisions. Data flows into a data warehouse from transactional systems,
relational databases, and other sources, typically on a regular cadence.
Visualization
BusinessIntelligence
Data Mininq:
Data mining is the process of analyzing a large batch of information to discern trends
and patterns. Data mining can be used by corporations for everything from learning
about what customers are interested in or want to buy to fraud detection and spam
filtering.
DATA MINING
Data sets Pre—processing Classification Database Statistics Analytics
Evaluation
Relational Database Management ¥em (RDBM S) [CMA Exam January-2023]
A relational database management system is a program that allows you to
create, update, and administer a relational database. Most relational database
management systems use the SQL (Sructured Query Language) language to access the
database. Key to consider when a relational database:
Initial Setup
Data security
Data model
Data accuracy/ reliability
Benefits of relational databases:
M anageability: For starters, an RDB is easy to manipulate.
Flexibility: If you need to update your data, you only have to do it once —
no more having to change multiple files one at a time.
Non-relational databaæs
Non-relational databases (often called NoSQL databases) are different from traditional
relational databases in that they their data in a non-tabular form. Instead, non-relational
databases might be based on data structures like documents.
• Radiation Softwarefailure
Deni
al of
servic
e
attack
s
Software controls Monitor the use of system software and prevent unauthorized access and use of
software programs, system software, and computer programs
Hardware Ensure that computer hardware is physically secure and check for equipment
controls malfunction
Data security E-lsure that valuable business data files maintained internally or by an external
controls hosting service are not subject to unauthorized access, change, or destruction
while they are in use or in storage
Security After you've identified the main risks to your systems, your company will need
to develop a security policy for proteding the company's assets. A security policy
consists of statements ranking information risks, identifying acceptable security goals,
and identifying the mechanisms for achieving these goals.
1) Mail Fraud
2) Debit and Cedit œrd Fraud
3) Account Takeover Fraud
4) Solen Tax Fraud
5) Voter Fraud
6) Fraud
Authentication The ability to know that a person is who he or she claims to be. Stablished
through passwords