Om ND Is
Om ND Is
Transmission 2011-June 5(b) (1) B2C (2) EPROM (3) MODEM (4) RISC (5) GUI 2011-June 5(c) (i) (ii) (iii) (iv) (v)
stands for Business to Customer stands for Erasable Programmable Read Only Memory stands for Modulator Demodulator stands for Reduced Instruction Set Computing stands for Graphical User Interface False True False False True
2011-June 6(a) Organisation of a file is done with respect to the mode of access to a file is required during processing. Following are the types of File Organisation : 1. Sequential File 2. Random ( Direct) File 3. Indexed Sequential File Method ( ISAM) 1. Advantage of sequential file : i) Organisation of records is continuous and simple. ii) All machines and software have the provision to support sequential file. iii) Easy and economic to create file iv) Maintenance of back up is simple. v) Easy to reconstruct vi) Loading a record requires only the record key. vii) Errors in files remain localized Disadvantage of sequential file : i) Transactions have to be batched and sorted over a period for updating the files. ii) As the updating is periodic, the files can never be maintained up to the minute and result, the response to any inquiry will not be up to the minute. iii) Whole file is to be processed even when activity rate is low. iv) Same data field is stored in different data files creating data redundancy. v) File handling involves intricacy in logic. 2. Advantage of Random file :
Direct files are more flexible. The record can be arranged both sequentially and nonsequentially. ii) Easy and fast access to the desired record makes processing efficient. iii) The transactions do not require any sorting of file. iv) File handing in data processing is simple. v) Updation of records is simpler. vi) Most suitable for interactive and online applications. Disadvantage of Random file : i) Expensive hardware and software resources are required. ii) System design around it is complex and costly. iii) Data may be accidentally erased or overwritten unless special precautions are required. iv) Storage space requirement is high. v) File updation (Addition and deletion of records) is comparatively more difficult. vi) Backup must be made with special security measures. 3. Advantage of ISAM(Indexed Sequential File Method) file : i) Combines the best features of sequential filing and the direct access by means of the Index. ii) Permits the efficient and economical use of sequential processing techniques when the activity rate is high. iii) File access is moderately fast. iv) File handling in data process is simple. Disadvantages of ISAM file i) Extra processing time is required to process the indexes. ii) Extra storage, known as overflow, is required to store insertion. iii) Expensive hardware and software provision are required. iv) Slow retrieval of records compared to random access as searching of index requires time. 2011-June 6(b) A data base is defined as an integrated collection of data and information which is utilized by several information sub systems of an organisation. Database is used by an organisation to store its data from different operational areas so that they can be shared by each operation collectively. Use of database has become very popular over the conventional file system for two reasons integrated information and its security features. Characteristics of data base. Please refer 2008 - Dec [b]
i)
2011-June 6(c)Answer (i) Different models of DBMS : 1. Hierarchical database 2. Network database 3. Relational database ii). Hierarchical Database:
The basic concept in the hierarchical database is that the data is arranged according to the pattern generally followed in the construction of an organisation chart, namely the inverted tree. The top record in the structure is termed as the root (or master) record. Main features of hierarchical database structure are: i) Simplicity. This is because the parent-child (or superior-subordinate) concept is readily understood by most person. ii) The structure can satisfy conceptual needs of users in most cases. iii) A record becomes a child when it corresponds to its higher level record. iv) The same record may be a parent record in relation to its lower level (child record). v) A child has one parent but a parent may have many child. vi) Between two consecutive levels of records, the relation is unique. vii) It cannot represent many to many relationship. 2011-June 7(a) answer Field Number Employee Number Employee Name Designation Date of birth Date of joining Section Code Qualification Training Codes Scale of Pay Total Size Record Length=106 Total Length of 2000 records Add. 15% for Fresh recruitment Add. 10 % for contingency factor (2000106) (1.15 212000) (1.10 292560) =212000 =243800 =292560 =321816 Maximum Field Size 6 35 10 6 6 3 20 10 10 106
Add. 20% for overhead to minimize collision (1.2 243800) Hence, total file space requirement= 321816
2011-June 7(b) System Development Life Cycle- System Development Life Cycle is a passed approach to analyses and design to ensure that systems are best developed. In fact system development involves seven stages as described below. 1. Identifying problem, opportunities and objectives 2. Determining information requirements 3. Analyzing system needs 4. Designing recommended system 5. Developing and documenting software
6. Testing and maintaining the system 7. Implementing and evaluating the system 2011-June 7(C) Designing New Source Documents: While designing source documents, the following points should be considered Documents should be simple to understand Each document should have clear title. Each type of document should have a serial number. Different types of documents should be given different colour codes. Items of data should be put in the order of logically sequence. Layout of documents should be in standard size. One source document should be used once only to feed data. 2011-June 7(d) (A) (v) (B) (iv) (C) (i) (D) (iii) (E) (ii) (F) (vii) (G) (viii) (H) (vi) 2011-June 8(a) Reasons for Outsourcing Information System Function: Outsourcing means using hardware, software and personnel resources from an outside company for information system. Outsourcing in todays economic environment is considered as an important means of improving an organisations competitiveness and profitability. By outsourcing an organisation can pay more attention to its core competitiveness and take advantage of other organizations core competencies. Any organizational function may be a point of consideration for outsourcing e.g. legal services, security, any manufacturing process, supply of components for the products, and even the information system itself. The reasons for outsourcing of information system function are: 1. Exercising greater control over the information system function if it is outsourced e.g. vendors being more responsive to user needs; sharing economies of scale achieved by the vendor and restricted consumption of information system resources which are no longer free. 2. Innovative approach because of access to new technology and expertise expected from the vendor. 2011-June 8(b) Steps Involved in Data Warehousing Data Warehousing is an integration of multiple, large databases and other information sources into a single repository or access point. This is suitable for direct querying, analyses, or processing. The need for data warehousing has come from increased competition and demand for more and accurate information for precise decision making. Data warehousing can translate the
data in common format and store them scientifically for faster access. Combining the related data is the crux in the approach of data warehousing. Thus, database design has a definite key role in making the storage efficient. Providing sensible information is only possible through analysis of related data. Steps involved: Development of hardware and software infrastructure Building sound corporate database Establishment of communication network Managing smooth data flow from multiple operational points Building proper check and security measures from misuse 2011-June 8(c) Hyper Text Transfer Protocol (HTTP)- HTTP an acronym the Internet protocol responsible for transferring and displaying Web pages. The HTTP has been designed especially for www at CERN. As HTTP is an Internet protocol for a specific application, it rides at the top of the stack of protocols that make up the Internet. Hypertext is a text that is specially coded using a standard coding system called Hypertext Markup Language (HTML). These links can be through text or graphics. HTTP works on client/server principle. The user tries to link the server where the resource resides. This is why the address on world wide web begins with http://. These addresses are called Uniform Resource Locators (URLs). Hyper Text Markup Language ( HTML)- A powerful language designed to transmit documents that can contain different media format in the same document, such as text, graphics, sound, video, and hypertext links to other documents and resources. The some related texts and graphics taken together to form a page. Pages created with the help of HTML were static in nature in the sense that no information from server could be incorporated in the pages. HTTp files are meant to be viewed using a WWW client program, such as Netscape Navigator, Internet Explorer or Mosaic. The scripting language used to create Web documents. HTTML commands specify the layout of a document as it appears on Web client. 2011-June 8(d) Role of Security Administrator: The threats of damage or loss of hardware, data and software by frauds have evolved a new responsibility in information system environment, that is to ensure the safety to information system. His responsibilities are: Framing information system security policy. Devising measures to ensure safeguard from possible threats. Train the staff for effective action. Implementation of security system. Monitor the security measures. Developing action plan for emergency recovery. 2011-June 8(e) Secure Electronic Transaction (SET) Master Card and Visa International have been developed. SET protocols which are : Merchant will have no access to credit card information SET requires authentication of trade parties prior to commencement of processing System adopted by SET :
Encryption of both information with secret keys : i) Financial information : Credit card information which is a private matter between card holder and card issuing agency ii) Non-financial information : Details of goods purchased, mailing instructions, cost etc. which are private information between trading parties. 2011-June 8(f) On-line Analytical Processing (OLAP) OLAP software does the analysis of large amounts of data stored in relational databases, data warehouses, and multidimensional databases by users using special interactive techniques and tools. The OLAP technology is being used in applications such as sales and marketing analyses, financial reporting and consolidation; and planning and budgeting. OLAP uses a multidimensional view of aggregate data to provide quick access to strategic information for further analyses. The real test of an OLAP system is inefficient use of data from databases and computational capability of data to develop model establishing the relationship of various parameters. In fact, it provides the services of just-in-time information. OLAP has the ability to answer who and what? questions as well as questions like what if? And why? OLAP has following advantage: OLAP has ability to provide managers with the information they need to make effective decisions about an organizations strategic directions. It provides information as needed. OLAP applications increase the productivity of business managers, developers, and whole organisation. Developers can deliver applications to business to business users faster. 2011-June 8(g) Please refer 2006 - June [4] (b)(ii page -320 2011-June 8(h) Please refer 2008 - Dec [6] (d)(ii) page no. 272