Assignment Answer Bank - WRITE ANSWER OF THE QUESTION ASSIGNED TO YOU

Assignment

Written Question

1. How are viruses and antivirus activated in a system?

Virus

Antivirus

I.   Virus is a malicious program, which has the ability to replicate and execute itself.

 II.   It is destructive in nature.

III.   It harms the computer system in different ways.

IV.   Viruses are usually created by hackers and some rogue individuals.

V.   Some type virus name: Malware, Trojan

Worm, Ransomware, Spyware

Adware

System Attack virus: Boot sector, Multipartite, Spacefiller, Resident, Polymorphic, File infector, Direct Action

Macro

 I.      An antivirus software is a computer program used to scan files. It detects, prevents, identifies and eliminates computer viruses and other malicious software.

 II.   It is preventive in nature.

III.   It protects the computer system from viruses and other malicious software.

IV.   Antivirus is used to keep the system secure.

 V.                Some type antivirus name: Avast Antivirus, Norton Antivirus, Eset Antivirus,

TrendMicro Antivirus, Bitdefender Antivirus

Avira Antivirus, Kaspersky Antivirus, AVG Antivirus, Panda Security Antivirus.


2. 1.Marksit is created by applying the decision Table.

Conditions: A+=80-100, A=70-79, B=60-69, C=50-59, D=40-49, F=0-39

 Decision Table

 

Y

A+

 

 

 

 

 

 

 

 

 

 

80-100

 

 

Y

A

 

 

 

 

 

 

 

 

 

N

70-79

 

 

Y

B

 

 

 

 

 

 

 

 

 

N

60-69

 

 

Y

C

 

 

 

 

 

 

 

 

 

N

50-59

 

 

Y

D

 

 

 

 

 

 

 

 

 

N

40-49

 

 

 

 

 

 

 

 

 

 

 

 

 

N

0-39

 Y

F













Interview Question
1.What is system?
A system is a group of interacting or interrelated elements that act according to a set of rules to form a unified whole. A system, surrounded and influenced by its environment, is described by its boundaries, structure and purpose and expressed in its functioning. 

Types of Information

2.Types of Information

STRATEGIC : Needed for long range planning and directions. This is less structured.

TACTICAL : Needed to take short range decisions to improve profitability and performance.

OPERATIONAL : Needed for day to day operations of the organization.

STATUTORY : Needed by law to sent to government authorities.

3.Elements of a System

Outputs and Inputs

Processor

Control

Feedback

Environment

Boundaries and Interface

4.Nine Steps involved in Analysis and Design

Requirements Determinations

Requirements Specifications

Feasibility Analysis

Final Specifications

Hardware Study

System Design

System Implementation

System Evaluation

System Modification

5.Information Gathering Tools

Review of Literature, Procedures and Forms.

On Site Observation.

Interviews and Questionnaires.

6.DFD Rules

Each process should have at least one input and an output.

Each data store should have at least one data flow in and one data flow out.

Data stored in a system must go through ab process.

All processes in a DFD go to another process or a data store.

7.DFD 0

DFD Level 0 is also called a Context Diagram. It’s a basic overview of the whole system or process being analyzed or modeled.

It’s designed to be an at-a-glance view, showing the system as a single high-level process, with its relationship to external entities.

It should be easily understood by a wide audience, including stakeholders, business analysts, data analysts and developers.

8.DFD-1

DFD Level 1 provides a more detailed breakout of pieces of the Context Level Diagram.

You will highlight the main functions carried out by the system, as you break down the high-level process of the Context Diagram into its sub-processes.

9.Rules for System Testing

Testing should be based on the requirements of user.

Before writing testing scripts, understand the business logic should be understood thoroughly.

Test plan should be done as soon as possible.

Testing should be done by the third party.

It should be performed on static software.

Testing should be done for valid and invalid input conditions.

Testing should be reviewed and examined to reduce the costs.

Both static and dynamic testing should be conducted on the software.

Documentation of test cases and test results should be done.

10.Eight unique features of E-Commerce technology

Ubiquity: Internet/Web technology available everywhere: work, home, etc., and anytime

Global reach: The technology reaches across national boundaries, around Earth

Universal standards:One set of technology standards: Internet standards

Richness:Supports video, audio, and text messages

Interactivity: The technology works through interaction with the user

Information density: Vast increases in information density—the total amount and quality of information available to all market participants

Professionalization/Customization: Technology permits modification of messages, goods

Social technology: The technology promotes user content generation and social networking

11.Types of Electronic Commerce

Business-to-business (B2B)

Business-to-consumer (B2C)

Consumer-to-consumer (C2C)

Consumer-to-Business (C2B)

B2B (Business-To-Business) is a commercial activity (business) between two companies. So the clients of one enterprise are other companies.

B2C (Business-To-Consumer) is a commercial activity between companies and consumers. It can be a huge supermarket, online store, or even a small branch of a law firm (consulting individuals).

C2C (Consumer-To-Consumer) is a commercial activity between private individuals (consumers). This business model can be implemented directly, as well as through a third-party (mediator).

C2C (Consumer-To-Consumer) is a commercial activity between private individuals (consumers). This business model can be implemented directly, as well as through a third-party (mediator).

C2B (Consumer-To-Business) is a little unusual model of e-commerce. Consumers define (bid) prices on goods and services (offered by businesses) by themselves.