20 Apr 2015

Network Security Question Bank

Network Security Question Bank

Network Security Question Bank For MCA, BCA, PGDCA Students

 

Unit-1

Answer the following questions in brief

1)    List few examples of software attack
2)    What are the essential ingredients of a symmetric cipher.
3)    Why is the middle portion of 3DES a decryption rather than an encryption.
4)    What is the difference between block cipher and stream cipher?
5)    What is digital signature?
6)    Differentiate symmetric and asymmetric cipher
7)    What is Replay attack?
8)    What do you understand by cryptanalysis?
9)    What is the use of traffic padding?

Answer the following questions in detail

1)    What is the OSI security architecture?
2)    List and briefly define categories of passive and active security attacks?
3)    Explain the network security model
4)    Describe in brief, the basic steps performed in DES? Comment on the strength of the DES
         scheme.
5)    Compare DES, 3DES, and AES.
6)    What is the difference between authentication & non-repudiation?
7)    What is a replay attack? Explain with an example. Discuss its consequences.   
8)    List out and explain steps followed in symmetric encryption
9)    What is the transport layer security?
10)  What is the difference between link and end-to-end encryption?

Unit II

Answer the following questions in brief

1)    List three approaches to message authentication.
2)    How is MAC different from HMAC?
3)    List and briefly define three uses of a public-key cryptosystem
4)    What is a digital signature?
5)    What is a public-key certificate?
6)    Explain different Crypto algorithms where public-key cryptosystems are used.
7)    What is the role of session key in public key schemes?
8)    List the properties a digital signature should possess?
9)    Mention the scenario where kerberos scheme is preferred
10)  What are the technical deficiencies in the kerberos version 4 protocol?
11)  What is the difference between a session key and master key.
12)  In the context of Kerberos, what is a realm?
13)  Why session keys are required? What are the advantages?
14)  List different authentication procedures in X.509 certificate.
15)  What are the different management functions of PKIX?
16)  How is an X.509 certificate revoked?

  Answer the following in detail

1)   What are the principal differences between version 4 and version 5 of Kerberos ?
2)   Write a note on: Kerberos authentication service
3)   Explain key generation, encryption, and decryption in the RSA algorithm. Perform  encryption and decryption using the following parameters: p=7, q=11, e=17 and M=8?
4)   List different ticket flags of Kerberos version 5.
5)   Discuss basic requirements for Kerberos services.
6)   What are the requirements for a Hash function?
7)   State some typical situations where public key techniques can be used effectively.
8)   Compare the distinct features of SHA-1 and MD-5 algorithms.
9)   State the advantages of using Cipher Block Chaining (CBC) mode over Electronic Code Book (ECB) mode.
10) Explain the Diffe-Hellman algorithm for establishing a shared secret over an unprotected communication channel. Provide an example to illustrate the working of this algorithm.
11) Explain the steps involve in overall processing of a message to produce a message digest in Secure Hash Algorithm with appropriate diagrams.
12) Explain key generation, encryption, and decryption in the RSA algorithm. Perform encryption and decryption using the following parameters: p=7, q=11, e=17 and M=8?
13) How are public-key certificates generated in X.509 authentication service? What do you understand by forward and reverse certificates in X.509?
14) What is public key infrastructure? Briefly explain the purposes and functions of a public key infrastructure (PKI) in cryptography.

Unit III and Unit IV

Answer the following questions in brief


1)   What are the five principal services provided by PGP?
2)   Why does PGP generate signature before applying compression?
3)   What is Radix-64 conversion? How is it used for an e-mail application?
4)   Why is the segmentation and reassembly function in PGP needed?
5)   List different MIME content types
6)   What is S/MIME?
7)   What is a key ring in PGP?
8)   What is a clear signed message in S/MIME?
9)   How routers benefit from IPsec? Explain one benefit.
10) Differentiate between transport and tunnel mode in IPsec
11) What services are provided by IPSec.
12) What protocols comprise SSL.
13) What services are provided by the SSL Record Protocols.
14) What is a fingerprint in PGP system?
15) At which layer of OSI model the SSL (or TLS) protocol works?
16) What is the need of acquirer in SET?
17) Write the principle on which the Intrusion detection is based.
18) What is a honey pot?
19) Key legitimacy field (w.r.t. PGP)

Answer the following in detail

1)    How is Authentication achieved in Pretty Good Privacy?
2)    Compare and contrast S-MIME and PGP protocols.
3)    What is a Secure Electronic Transaction (SET) and why is it failed to win market share as a credit card approved standard?
4)     Compare and contrast between SSL and SET?
5)     Discuss the various components of IPSec architecture. What is anti replay mechanism in context of IPSec?
6)    What is S/MIME and how does it works? Briefly explain.
7)    What are the advantages of SET protocol?
8)    Discuss five benefits of IPSec as a security protocol.
9)    What is IPSec and what are the two modes of IPSec operation? What types of security services are provided by IPSec?
10)    How PGP constructs a secure mail? Write the steps involved in the process.
11)    How enveloped data is constructed in S/MIME. Write all steps for the same
12)    Show what ISAKMP proposal, transfer and notification payloads are used for
13)    Draw ESP format for IPsec and show the need of fields SPI, sequence number, payload data, padding, pad length, next header and authentication
data field.
14)     What does the ChagneCipherSpec protocol do?
15)     What is the need of pseudo random function used in TLS?
16)      Differentiate between profile based and threshold detection methods of
statistical anomaly detection

Unit V

Answer the following questions in brief

1)    What is default discard policy in firewalls
2)    What is dual home bastion in firewall configuration?
3)    Write two rules needed for multilevel trusted systems
4)    What is a protection profile in common criteria for Information security
evaluation?
5)    Stateful firewall
6)    Between default discard and default accept policy in packet filtering firewalls, which one is better and why?

 Answer the following in detail

1)    Write down at least 7 characteristics of a bastion host and explain their
need with an example.
2)    What is the difference between a packet-filtering router and a stateful inspection firewall?
3)    Discuss different types of Firewalls
4)    Discus the techniques used by firewalls to control access and enforce a
security policy.
5)    Discuss the common criteria for Information Technology Security Evaluation
6)    Mention and briefly explain the different parameters/fields based upon which packet filtering is normally done.

3 Mar 2015

How to Make your site Responsive on all screens


ittechnocrates - How To Make Website Reponsive on all Screens



 Hello There!

CSS stands for Cascading Style Sheet. It makes all the designing of your website. You have just to do is to make your webpage design responsive to all screen through these .css files. When I am developing a site, I thought may it be responsive for all screens? does my visitor can see it in his/her tab or mobile? So I gone through some sites and find some effective methods for solving the responsiveness problems of any site.

The Screen option:-

 You can provide the screen option in the starting of any HTML landing page. This screen option let you specify which screen you have and according to your selection it will give you the webpage.
This will cause you multiple CSS files which have the designing of separate screen in separate file.

Pros and cons:

  (1) Fix Screen size and nothing complex for pixels. Each screen have its own css.
  (2) Have to make separate Screen CSS for Each screen.

The Media Queries:-

You can develop any website's design with CSS. Media queries are the best fit method for this. This will make one style sheet which helps you to create design for diffrent screens in one file... No need to make different different files for each screen. they adjust classes as they have to through viewport. you just have to specify link tag that contains attributes like "viewport=1366px" and "media=all".

pros and cons:
(1) Best Effective and convincing method. Just define the screen you want in media query.
(2) More Complex if two or more CSS are conflicting with each other.

20 Feb 2015

How to Upgrade From Windows 7,8 to Windows 10

http://www.itdesc.in/2015/02/how-to-upgrade-windows.html

 How to Upgrade to Windows 10?

In this post I would like to describe how to upgrade your windows 8 system to windows 10.
This will require some steps to upgrade. The upgrade or we can say upgrade procedure will require following requirements.

They are as under:

Requirements for Upgrade Process:

(1) You will need a licensed version of windows 7,8.
(2) Access privileges of computer as an administrator.
(3) A Stable Internet Connection with high data transfer capacity.
(4) At least 4GB ram for 64bit PC and 2GB for 32bit PC.
(5) Some time to spare for windows update process.

  Steps for Upgrade/Update Procedure:

for Windows 7 Users:

  1. Click on Windows Button which is at left Bottom side at your screen with windows logo.
  2. Go to Control Panel Option and click on it.
  3. Find the Windows Update option and click on it.
  4. Click on button which shows "Check available Update."
  5. Now find All updates of Windows 10.(generally shows "windows 10" in messages.
  6. select all the process which are found and click on update.
  7. Wait for update/upgrade procedure to complete.
  8. After complete the update, you will asked to restart, So Restart the pc and Have fun with Windows 10.

for windows 8 Users:

  1. Press windows key + x, Then press P (shortcut to Control Panel) or search for Control Panel.
  2. Find the Windows Update option and click on it.
  3. Click on button which shows "Check available Update."
  4. Now find All updates of Windows 10.(generally shows "windows 10" in messages.
  5. select all the process which are found and click on update.
  6. Wait for update/upgrade procedure to complete.
  7. After complete the update, you will asked to restart, So Restart the pc and Have fun with Windows 10.
 Don't forget to Like, share and Comment if you like the Post.


 

1 Jan 2015

Memory Overload Error in Bluestacks? Find Solution Here


ittechnocrates.blogspot.com-Memory Overload Error in Bluestacks? Find Solution Here.


  •  Do your Bluestacks saying your memory is Full?
  •  Do Your Whatsapp in Bluestacks can't Download any content?
  • What is There in Blue Stacks loses your mind?

Here is The Solution of it:

Steps:
1.    Download APK file from Here.. Click To Download.

2.    Install the File and open it in bluestack after installation.

3.    Move Down.

4.    Then click on Whatsapp Folder.

5.    Click on Each folder and decide what to store and what not.
ittechnocrates.blogspot.com-Blue Stacks Error Solving Steps
6.    If you want to move it from blustack to pc then cut or copy it and move to a new folder.
ittechnocrates.blogspot.com-Blue Stacks Error Solving Steps

7.    Then cut this folder and move it to the windows folder which is located besides whatsapp folder
ittechnocrates.blogspot.com-Blue Stacks Error Solving Steps

8.    Paste that folder in public documents.
     
ittechnocrates.blogspot.com-Blue Stacks Error Solving Steps

9.    It will shown here.
ittechnocrates.blogspot.com-Blue Stacks Error Solving Steps


16 Dec 2014

Definitions list for ASP.NET

Definition list of ASP.NET | ittechnocrates.blogspot.in
  • A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice
  • A Modified Model for Private Data Security Facing E-commerce
  • A Simple Model for Chunk-Scheduling Strategies in P2P Streaming
  • Airline Catering Services
  • An Improved Ant Colony Optimization Cluster Algorithm Based on Swarm Intelligence
  • Assembly Dissection Tool
  • ATM reporting system
  • Automatic Menu Generator
  • Bandwidth Economizer
  • Blood Bank Management
  • Business Development System
  • Call Center Management System
  • Coding Documents using Alternative Techniques
  • Configurable Composition and Adaptive Provisioning of Web Services
  • Continuous Neighbor Discovery in Asynchronous
  • Control in Wireless Sensor Networks
  • Cricket Club Association
  • Crime investigator
  • Customer Portfolio Management
  • Data integrity proofs in cloud storage
  • Data Mart
  • Database Maintenance for Xport Doc
  • Defect Tracking System
  • E Bug Tracke
  • E HealthCare
  • E Magazines
  • E Real Estate
  • E Shop
  • Education Management System
  • e-Magazine System
  • Email Reader
  • Encryption and decryption using sentinel
  • Energy-Constrained Asynchronous Sensor Networks
  • Energy-Efficient Protocol for Cooperative Networks
  • ERFX
  • E-Shopping
  • Exploiting Dynamic Resource Allocation for Efficient
  • FDAC: Toward Fine-Grained Distributed Data Access
  • File Splitter
  • Franchisee Management System
  • Help Desk Technology
  • ILMS (Integrated Library Management System)
  • Image Compression Decompression System
  • Image Gallery
  • Image Processing
  • Image Water Marking
  • Insurance Agent
  • Inventory Control System
  • Inventory management system
  • IT asset management
  • ITracker (Patient Information System)
  • Jamming-Aware Traffic Allocation for Multiple-Path
  • Lan Search
  • Leisure (Hotel Management System)
  • Live Streaming with Receiver-based Peer-division Multiplexin
  • Load Balance with Imperfect Information in
  • Load Balancing System
  • Movie Application
  • My Blogger
  • Network Coding-Based Protection of Many-to-One Wireless Flows
  • On the Integration of Unicast and Multicast Cell Scheduling in Buffered Crossbar Switches
  • On the Security of Route Discovery in MANETs
  • Online Forums
  • Online Marketing
  • Online Membership process
  • Online Sales & Inventory Management System
  • Online trading transaction
  • Optimal Anycast Technique for Delay-Sensitive
  • Parallel Data Processing in the Cloud
  • Patient Management System
  • Payroll Management System
  • Personal Productivity Management
  • Placement Activity System
  • Point of Sale
  • Portfolio Manager for Equity Trading
  • PP Messaging
  • Project Out sourcing in an organization
  • Protecting system from hacking
  • Real Estate commission generation
  • Real Estate Management System
  • Retailer Network Administrator
  • Routing Using Portfolio Selection
  • Search Engine Optimization
  • Secure Division
  • secure e-commerce
  • Sensor Networks
  • Server Dashboard
  • Site-Based Partitioning and Repartitioning
  • Software Tracking
  • Speech synthesis
  • SPMT
  • Structured Peer-to-Peer Systems
  • System Information
  • Tax Information System
  • Tech Skills (An Online Examination System)
  • Techniques for Parallel PageRank Computation
  • Telecom connections Management System
  • Teleserve
  • Text To Speech Converter And Speech To Text Converter
  • The Design of a Generic Intrusion-Tolerant
  • Time Capturing And Invoicing System
  • Training Tracking System
  • Ultra Apps Portal
  • Uncompressed multimedia
  • Using N-Tier Architecture Multiuser Contact System
  • W3 Status Analyzer
  • Web Based Meeting Scheduler
  • Web Based Purchase Requisitions
  • Web Portal
  • Website for MLM
  • Your Jobs
  • AD Agency
  • Agriculture Assist
  • Air Force Security Using Thumb Checker
  • Alumni Manager
  • Asian Packers and Movers
  • Attendance Management System
  • Back to My Village
  • Biased Random Walks in Uniform Wireless Networks
  • Bishop Cotton School
  • Blood Donation Agent System
  • BoobTubeFlourish
  • BPO Solutions
  • Bulga Bag Planner
  • Call Center Executer
  • Campaign Information System
  • Campus Selection System
  • Career Path
  • Cargo Logistics
  • Cargo Manager
  • Cell Breathing Technique
  • Civil Registry
  • Client Server Based Live Meeting
  • Cool Cab Services
  • Corporate Recruitment System(CRS)
  • Course Finder And Allocation Management Tool
  • Crime Logger
  • Customer Query Track
  • Cyber Automobile Shop
  • Cyber Bidding Gateway
  • Cyber Hotelier
  • Cyber JobMela
  • Data Grid Management Systems
  • Diagnostic Center
  • Diamond Web-Hosting
  • Digital Signature
  • Distance Learning Portal
  • Distributed Computing For E-Learing
  • Document Manager
  • Drive 2 Destiny
  • E Commerce Website
  • E2M Conference
  • Easy Leave
  • E-Bidding
  • E-Buy
  • Education Loan Portal
  • e-FASHION
  • E-Gift Shoppe
  • Electronic Cash Controller
  • Energy Maps for Mobile Wireless Networks
  • Enterprise Security Services
  • E-Post Office
  • E-Pricing
  • Exam Experts
  • Examination Branch System
  • Factory Statistics System
  • Finger print based employee attendance system
  • Flaw Tracking System
  • Fleet Manager
  • Franchise Management System
  • Good Welfare Services
  • Health Maintenance System
  • HRMS Portal
  • Immigration Clearance System
  • Information Content-Based Sensor Selection
  • Information Portal
  • Insurance Broker System
  • Integrated Project Management And Controlling System
  • International Street Racing Community Club Management System
  • Inventory Chain
  • ISO Quality Controller
  • Jobbing Portcullis
  • Learning Made Easy
  • Live Meting
  • Mail Client
  • Mailing Portal
  • Millennium Planning
  • Mining Industry information System
  • Mitigation of Control Channel Jamming
  • Mobile Advertisement System
  • Movement-Assisted Connectivity Restoration
  • Movie World
  • Multi Banking System
  • New Hospital Management System
  • New Library Management System
  • News Paper Proclamation Monitoring System
  • Notepad Editor System
  • Online Banking
  • Online Crime Report
  • Online Examination Portal
  • Online Fast Food
  • Online file sharing portal
  • Online Issue Management
  • Online Patient Management System
  • Online Personal Assistant
  • Online Project Controller
  • Online Shopping Cart
  • Online Shopping Portal
  • Online Support Help Desk
  • Online Tax Information System
  • Online Voting System
  • Photo Competition Website with Voting
  • Planning of Wireless Sensor Networks
  • Predicting Missing Items in Shopping Carts
  • Project Controller
  • Project Scheduler
  • Project Tracking
  • Promotional Portal
  • Random Cast
  • Reality Shows Organization
  • Record Tracker
  • Repository and Search Engine of a College
  • Reservation System
  • Resource Allocation in OFDMA
  • ROAD TRANSPORT Authority
  • Route Stability in MANETs
  • Secure and Policy-Compliant Source Routing
  • Smart Network Profile Manager
  • SMS Based Student Intimation
  • Social Networking With Advertisement
  • Software Project Defect Tracking System
  • Software Project Management
  • Software Project Quality Controller
  • Speech comparison using neural networks
  • Speed Cash Maintenance
  • SQL-Tuner
  • Student Records System
  • Techno Task Manager
  • Tele Serve
  • Thresholds for Virus spread on networks
  • Traveler Information System
  • Unicode OCR System
  • Universal Rental System
  • URl Tracker (Vb.net)
  • Vehicle Service
  • Vehicle Showroom Management System
  • Virtual Class Room
  • Visual Learner Memory Game
  • Ware House Management System
  • Warehouse management system
  • Web Alerts
  • Web Based Profiling System
  • Work Flow Management System
  • World Recipe
  • Zeppelin Reservation

20 Jul 2014

Definition List for PHP Project



The following are some definitions for Project which can be developed using php as Front End and MySQL database as Back End. This can be useful to each and every student who is learning in M.C.A, Or M.Sc(IT), C.E(IT), etc...

The Main Purpose of this definitions are to create a project in php and submit it to respected universities as a project or a subject assignment.

Definition List for Core Php:-

  1. Video streaming Website.
  2. Blood Bank Store Finder.
  3. Real Estate Management System(Selling, Purchasing and Description)
  4. Inventory Management System
  5. Hospital management System
  6. Retail Management System
  7. Online Education System
  8. VOIP Based Predictive Dialer
  9. Light & Sound Control System
  10. College Management System
  11. Hotel Management System
  12. Tour & Travel SoftwareMCA Project Topic List
  13. HR Payroll Management System
  14. Time Table Management System
  15. Attendance Management System
  16. Restaurant Billing System
  17. Shopping Mall Billing System
  18. E-Shop Portal
  19. Student Database Management System
  20. Online Job Portal
  21. Library Management System
  22. Fee Management System
  23. Car Parking Management System
  24. Matrimonial Web Portal
  25. Export/Import ERP Solution
  26. Income Tax Software
  27. Customer Enquiry Management System

Definition List for CMS:-

 You can make Any type of  Website that mentioned above in WordPress, Joomla, Drupal, with Technical skills in adding Custom page and using Custom (developer Created) Plugin and Admin Panel Access.

Definition List for OpenCart:-

Any type of  Commercial Website that have online Marketing(selling Product) and Customers review for purchase the product from that site.
The site can be very for based on product. such as,

  • Mobile Store
  • Automotive Store
  • Online Price Comparision
  • Book Store
  • Cloth Store  etc....

For More Information about how to make Project in php Just Simply
Click Here.

13 Jul 2014

Wireless Mediums for Data Transfer and Communication

Introduction

Wireless communication is among technology’s biggest contributions to mankind. Wireless communication involves the transmission of information over a distance without help of wires, cables or any other forms of electrical conductors. The transmitted distance can be anywhere between a few meters (for example, a television’s remote control) and thousands of kilometers (for example, radio communication)some of the devices used for wireless communication are cordless telephones, mobiles, GPS units, wireless computer parts, and satellite television.


Types of Wireless Communication:-

1. Infrared (IR) wireless communication - Is a wireless transmission media that sends signals using infrared light waves. Infrared transmission requires a line of sight transmission, that is the sender and receiver must be aligned so that nothing obstructs the path of infrared light wave. IR wireless is used for short and medium-range communications and security control.  For IR communication to work, the systems mostly operate in line-of-sight mode which means that there must be no obstruction between the transmitter (source) and receiver (destination).
 2. Broadcast Radio - Basically an audio broadcasting service, radio broadcasts sound through the air as radio waves. It uses a transmitter to transmit radio waves to a receiving antenna. To broadcast common programming, stations are linked to the radio networks. The broadcast occurs either in syndication or simulcast (simultaneous broadcast) or both. Radio broadcasting can also be done via cable FM, the internet and satellites. A radio broadcast sends data over long distances (across countries) at up to 2 megabits per second (AM/FM Radio).
 3. Microwave Radio - Microwave transmission involves the transfer of voice and data through the atmosphere as super high-frequency radio waves called microwaves. Microwave transmission is mainly used to transmit messages between ground-based stations and satellite communications systems. Microwave transmission mainly uses radio waves whose wavelengths are conveniently measured in small units such as centimeters. Microwaves belong to the radio spectrum ranges of roughly 1.0 gigahertz (GHz) to 30 GHz.
 4. Communications Satellites - A communication satellite is an artificial satellite used specifically as a communication transmitter/receiver in orbit. It behaves like a radio relay station above the earth to receive, amplify, and redirect analog and digital signals carried on a specific radio frequency. Data is passed through a satellite using a transponder which is a signal path. Most satellites have between 24 to 72 transponders, with a single transponder capable of transmitting and receiving 155 million bits of information per second. This huge capability makes communication satellites an ideal medium for transmitting and receiving all kinds of content, including audios and videos.
 Applications of Wireless Communication:- 

  • Television Remote Control – Modern televisions use wireless remote control. Currently radio waves are also used.
  • Wi-Fi – This is a wireless local area network that establishes internet connection with the portable computers.
  • Cellular Telephone – Radio waves are used to facilitate the operator to make phone calls from any place on the earth. CDMA, GSM, and 3G are examples of the advancement made by wireless communication in the domain.
  • Computer Interface Devices– Computer hardware manufacturers had realized that having so many wires to communicate between devices would confuse the consumer. So they switched to wireless technology to facilitate their consumers, thus making it easy to mediate between a computer and other peripherals including mouse and keyboard. Earlier, such units required bulky, highly limited transceivers but recent generations of computer peripherals use compact and high-quality wireless devices such as Bluetooth for communication.
Content BY : www.engineersgarage.com

3 Jul 2014

Frameworks in PHP



  •     A Framework is the structure that you can choose to build your program or project in php.
  •     It allows you to connect ti naby diffrent API's as well as determine the structure of your own application.
  •     A php framework is a collection of classes which helps you to develop a web application. 
  •     It acts like a library of functions to help the developer for easy references and program developing.
  •     There are various type of Frameworks are available in Php. They are listed as under.


  1.     Aiki Framework
  2.     Apigility
  3.     Ayoola Framework
  4.     CakePHP
  5.     Drupal
  6.     Epesi
  7.     Fat-Free Framework
  8.     FuelPHP
  9.     Hammerkit
  10.     Hazaar MVC
  11.     Horde (software)
  12.     ImpressPages
  13.     Jamroom
  14.     Joomla
  15.     Laravel (framework)
  16.     Lithium (PHP framework)
  17.     Nette Framework
  18.     PHPixie
  19.     PRADO (framework)
  20.     ProcessWire
  21.     Seagull PHP Framework
  22.     Solodev
  23.     Symfony
  24.     TYPO3
  25.     TYPO3 Flow
  26.     XOOPS
  27.     Yii
  28.     Zend Framework
  29.     Zikula
 For More details on Php Frameworks....
click on this link....
http://en.wikipedia.org/wiki/Category:PHP_frameworks

    20 Jun 2014

    CMS

    What is CMS?


    • CMS means content management system.
    • It allows a computer program that allows publishing, editing, and modifying content as well as maintainence from an interface.
    • CMSs are often used to run website containing blogs, news and shopping.
    • There are three types of CMSs are available.

    1. Web Content Management System.
    2. Component Content Management System.
    3. Enterprise Content Management System.

    Web Content Management System


    • A Web CMS is bundled or stand-alone application to create manage, store and deploy content  on webpages.
    • Web Content includes text, Graphics, Video audio and codes.

    Component Content Management System


    • A Component CMS or CCMS are specialises in the creation of documents from component parts.
    • These component can be reused within another document or across multiple documents. 
    • This insures that content is consistent across entire documentation Set.

    Enterprise Content Management System

    • An ECMS organises documents, Contacts, and records related to process of a commercial organisation.
    • It structures enterprise's information content and file formats, manages locations,
    • streamlines, access by bottlenecks and optimises security and intigrity.

    WEB CMS(In Details)


    • There are various types of cms are available for web cms.
    • They are based on three tier architechture of MVC( Model View Control).
    • The Control is called Admin Panel, View is called as Home page, and model is stored in Database or file system.


    Popular WEB CMS:-

    1. OpenCart
    2. WordPress
    3. Druple
    4. Magento
    5. Joomla
    6. Php-Fusion
    7. Php-Nuke
    8. PhpBB
    9. Blogger 
    For More information on CMS..
    Click the Following Link..
    http://en.wikipedia.org/wiki/List_of_content_management_systems

    1 Jun 2014

    Cloud Computing Questions...

    1. Explain cloud deployment model in details.
    2. Explain Reference Model in Detail.
    3. Explain No-Up Front Commitment.
    4. Explain Utility oriented computing.
    5. Explain Hardware Architecture for parallel processing.
      Explain Distributed object Framework (DOF) in details.
      Explain Peer to Peer in Details.
    6. Explain Service Oriented Architecture (SOA).
    7. Explain Managed Execution.
    8. Explain Hyper Visior in details.
    9. Explain Virtualisation.
    10. Explain Pricing Model.
    11. Explain Annotations any Three in Details.
    12. Explain RetryFailed Activity.
    13. Explain AWS flow Framework for Java in Details.
    14. Explain Amazone SWF timeout types for work flow and activities.
    15. Explain How can webmaster can improve the performence of their web server using CDN? Mention at least Three free CDN.
    16. Explain Which type of Feature are expected for a virtual market place / Cloud Fedaration.
    17. Explain Describe reference model for a cloud fedaration.
    18. Explain Worker and Decider.
    19. What is Hadoop? explain in Details.
    20. Explain Google App engine. Why it is needed for application developement.
    21. Explain Microsoft Azure.
    22. Why Amazone called best from all hosting servers?
    23. Write three examples of SaaS, PaaS, and IaaS as you know and explain any one service.
    24. Write Methods to Communicate via internet.
    25. How Cloud architecture is useful to a user or a Developer?
    26. What is a "Secret Key" in Amazone? How you can use it?
    27. Write at least difference between Saas, PaaS and Iaas.
    28. Explain Properties of Cloud Computing.
    29. Explain Features and Advantages of Cloud Computing.
    30. What is The Diffrence between Cloud Computing and Distributed Computing?

    30 May 2014

    MIS Questions

    1. What is the need of Computer Based Information System? Explain the qualities of information system in detail with example.
    2. Explain the methods for selecting the best alternative in decision making. Justify the suitability of the methods.
    3. Write down short note on ‘Impact of IT on privacy and society’.
    4. Discuss System Controls. Also explain Types of Systems in detail
    5. Discuss technical solutions for privacy protection.
    6. Explain different parameters which have an impact on information quality. Give examples. Discuss the methods of determining the information requirements.
    7. Discuss the methods of Data and Information collection.
    8. Explain generalized model of the system with concept of filter and boundary. Explain with example.
    9. Explain Knowledge Management System Architecture in detail. Briefly explain tools for Knowledge Management.
    10. Explain DSS Models in brief. Discuss examples of any one model in detail.
    11. Discuss types of Decision Support System. Also discuss facts about DSS.
    12. Distinguish between the manufacturing sector and service sector in terms of character, focus and deliverables.
    13. How would you control quality of service through MIS support? Explain with example of any one service industry.
    14. Identify the master data in the following applications- Personal, Finance, Production and Marketing.
    15. Explain how systems are vulnerable by the use of internet and Wi-Fi.
    16. Write a short note on disaster recovery planning and business continuity planning.
    17. Define information and Management Information system. Why there is need to computer based information system? 
    18. What are Rational decisions? What are the problems in making rational decisions? What kind of rational decisions are involved in inventory management system?
    19. What do you mean by good information? How it affects decision making process for manager? Classify information as given by John Dearden.
    20. In how many types classes of information system can be divided? Explain any two class of system in depth.
    21. Why planning is important? How many types of planning are there? Which type of objectives can be fulfilled though proper planning? How quality of MIS can be improved through proper planning?
    22. What are the differences between DSS and GDSS?
    23. Write short note on Development and implementation of MIS.
    24. What do you mean by Knowledge based Expert systems (KBES)? In how many ways Knowledge can be represented in KBES?
    25. What are the critical factors contributing to success and failures of MIS?
    26. Explain model of information processing system.
    27. Write a brief note explaining application of MIS in production management system
    28. Describe service process cycle and analysis. Design customer service framework for food and hospitality in Airways.
    29. What is service? What are the principle behind good service? Write a brief note on service management system.
    30. Explain input transaction, applications ,queries decision analysis control types of reports ,decision analysis and action update in Marketing applications of MIS with example.
    31. Define system vulnerability. How vulnerabilities has been increased due to network of computers? Explain computer crimes. 
    32. Explain following: (i) Wireless security challenges  (ii) MIS Audit
    33. Write a brief note on Technologies and tools for protecting information resources
    34. Explain following: 
      (i)Viruses , Worms and Trojan horses
      (ii)Firewall and encryption
    Referenced From:-
    GTU Papers.

    23 May 2014

    WTAD Exam oriented Questions...

    Some Questions that can make you pass in Exams of Web Technology and Design....


    1. Provide difference between GenericServlet and HttpServlet.
    2. Explain DatabaseMetaData.
    3. Describe the usage of PreparedStatement and CallableStatement in JDBC.
    4. Define servlet. Discuss servlet life cycle with example.
    5. Write a code to read a HttpHeader in servlet.
    6. Write a short note on RequestDispatcher.
    7. Explain Javascript function with example.
    8. Define Servlet Filter with proper code.
    9. What is Session? Explain different ways of session tracking mechanism.
    10. Discuss javascript events with proper example.
    11. Differentiate Servlet from Java Server Pages.
    12. Define JSP Directive. Discuss any five attribute of page directive.
    13. Discuss Deployment Descriptor with its element and role.
    14. Define Custom Tag. Provide difference between TagSupport and BodyTagSupport.  
    15. What is JSP predefined variables? Explain any five.
    16. Define Expression Language. Discuss its implicit objects.
    17. State the role of MVC architecture in Web based application environment.
    18. Define JSTL. State types of JSTL and discuss
      1. c:forTokens,
      2. c:redirect,
      3. c:catch,
      4. c:import
      5. c:param
    19. Briefly discuss the following HTTP 1.1 request headers
      1. Accept
      2. Accept-Charset
      3. Host
      4. Accept-Language
      5. Authorization
      6. Cookie
      7. User-Agent
    20. Explain the following methods of HttpServletResponse with examples.
      1. setContentType()  
      2. setStatus()
      3. sendError()
      4. sendRedirect()
      5. setContentLength()
      6. encodeURL()
      7. isCommited()
    21. Write the advantages of JavaScript. Explain any three methods of Date and String objects of JavaScript.
    22. Explain JSP expressions, scriptlets and declarations with example.
    23. Explain JSP page directive's import, session, buffer and errorPage attributes with example.
    24. Explain c:out and c:choose JSTL tags with its required attributes giving example.
    25. Explain the mechanism of accessing Bean Properties and accessing Collections using JSP Expression Language with example.
    26. What are Beans? Explain the required steps for implementing MVC with RequestDispatcher with example code.
    27. Explain the process for querying databases using JDBC Driver.
    28. What is ServletContextListener?
    29. Explain the process of initialization of Commonly used data by ServletContextListener interface.
    30. List the Tag Library Components? Explain each of them in brief to create the custom JSP Tags.
    31. How do you implement BASIC authentication, Explain in brief. Write the advantages of BASIC authentication.
    32. Explain at-least seven new features of Servlet 3.0 specification.
    33. Explain JSTL tags.
    34. Explain Request Headers and Methods of Request Header.
    35. Explain Response Headers and Methods of Response Header.
    36. Define Cookies. How will you handle cookies in Servlet? Explain with suitable example.
    37. What are the major differences between doGet( ) and doPost( )?
    38. Write and Explain Methods to create JDBC Connection with Example.
    39. What is Programming Security? Explain Directive Security.
    40. List out various methods of PreparedStatement and explain with suitable example.
    Reference from:-
    GTU Examination Papers.

    Comments

    © 2013-2016 ITTechnocrates. All rights resevered. Developed by Bhavya Mehta