ITT
ITT
ITT
Data Mining is the process of analyzing data to find previously unknown trends, patterns, and associations (knowledge) to
make decisions.
Steps:
Data
Database
Data Processing
Data warehouse
Information
Data mining
Patterns
Business Decision
Business knowledge.
67. Explain how does computer network increase the value of business?
i) An increase in the efficiency of operations;
ii) Improvements in the effectiveness of management; and
iii) Innovations in the marketplace.
68. What is computer network?
Computer Network is a collection of computers and other hardware interconnected by communication
channels that allow sharing of resources and information.
Where at least one process in one device can send/receive data to/from at least one process residing in a
remote device, then the two devices are said to be in a network. A network is a group of devices
connected to each other.
69. Short note on network and communication system.
These consist of both physical devices and software, links the various pieces of hardware and transfers the
data from one physical location to another.
Computers and communications equipment can be connected in networks for sharing voice, data, images,
sound and video. A network links two or more computers to share data or resources such as a printer.
70. What does enterprise need to do to manage its information in an appropriate and desired manner?
Every enterprise needs to manage its information in an appropriate and desired manner. The enterprise must do the
following for this:
Knowing its information needs;
Acquiring that information;
Organizing that information in a meaningful way;
Assuring information quality; and
Providing software tools so that users in the enterprise can access information they require.
71. What is node?
Each component, namely the computer in a computer network is called a ‘Node’
72. Explain types of networks.
Networks could be of two types:
Connection Oriented networks:
Connectionless Networks:
73. What are the basic issues handled and addressed by networks?
Routing
Bandwidth
Resilience
Contention
74. Explain following:
Routing: It refers to the process of deciding on how to communicate the data from source to destination in a
network.
Bandwidth: It refers to the amount of data which can be sent across a network in given time.
Resilience: It refers to the ability of a network to recover from any kind of error like connection failure, loss of
data etc.
Contention: It refers to the situation that arises when there is a conflict for some common resource in a network.
For example, network contention could arise when two or more computer systems try to communicate at the same
time.
75. What are the important benefits of computer network?
Distributed nature of information
Resource Sharing
Computational Power
Reliability
User communication
76. What are the impacts of telecommunications?
Telecommunications may provide these values through the following impacts:
a) Time compression
b) Overcoming geographical dispersion
c) Restructuring business relationships
77. Explain about packet.
The fundamental unit of data transmitted over the Internet.
78. Explain about repeater.
A repeater regenerates the signal over the same network before the signal becomes too weak or corrupted to extend
the length to which the signal can be transmitted over the same network.
79. Explain about hub
A simple network device that connects other devices to the network and sends packets to all the devices connected to
it.
80. What is bridge?
Bridge is a communications processor that connects two Local Area Networks (LAN5) working on the same protocol.
81. What is switch?
A network device that connects multiple devices together and filters packets based on their destination within the
connected devices.
82. What is MAC Address?
These are most often assigned by the manufacturer of a Network Interface Controller (NIC) and are stored in its
hardware, such as the card’s read-only memory or some other firmware mechanism.
83. What is router?
A device that receives and analyses packets and then routes them towards their destination. In some cases, a router
will send a packet to another router; in other cases, it will send it directly to its destination.
84. Detailed Short not on network topology. What are the types of network topology?
The term ‘Topology’ defines the physical or logical arrangement of links in a network. It is the geometric
representation of the relationship of all the links and linking devices (usually called Nodes) to each other.
Common topologies are
- Star Network
- Bus Network
- Ring Network
- Mesh Network
85. Explain following:
Star Network that involves a central unit with number of terminals tied into it;
Bus Network in which a single length of wire, cable, or optical fiber (called bus) connects several computers;
Ring Network much like a bus network, except the length of wire, cable, or optical fiber connects to form a loop;
and
Mesh Network in which each node is connected by a dedicated point to point link to every node.
86. Short note on transmission mode. What are the types of transmission mode.
It is used to define the direction of signal flow between two linked devices.
There are three types of transmission modes characterized as per the direction of the exchanges:
- Simplex (wherein the data flows in only one direction- unidirectional),
- Half-Duplex (where in the data flows in one direction or the other, but not both at the same time) and
- Duplex (in which the data flows in both directions simultaneously).
87. What is protocol?
In computer networking, a protocol is the set of rules that allow two (or more) devices to exchange information back
and forth across the network.
88. Short note on IP Address.
Every device that communicates on the Internet, whether it be a personal computer, a tablet, a smart phone, or anything
else, is assigned a unique identifying number called an IP (Internet Protocol) address.
Information security administrators are responsible for ensuring that information systems assets categorized under
Personnel, Hardware, Facilities, Documentation, Supplies Data, Application Software and System Software are secure.
Assets are secure when the expected losses that will occur over some time, are at an acceptable level
Audit
181. What are the factors on which organization chart is based upon?
Short and long term objectives
Market conditions
Regulation
Available talent
182. Short note on following regarding organization charts
Short and long term objectives
Roles and responsibilities
Job titles and job descriptions
Title involved in executive management, software development, data management, system management, systems
management, general operations, security operations and service desk teams.
183. Short note on segregation of duties and controls.
The concept of Segregation of Duties (SOD), also known as separation of duties, ensures that single individuals do
not possess excess privileges that could result in unauthorized activities such as fraud or the manipulation or exposure
of sensitive data.