Written
Question
1.
How are viruses and
antivirus activated in a system?
Virus
|
Antivirus
|
I.
Virus is a
malicious program, which has the ability to replicate and execute itself.
II.
It is
destructive in nature.
III.
It harms the
computer system in different ways.
IV.
Viruses are
usually created by hackers and some rogue individuals.
V.
Some type virus
name: Malware, Trojan
Worm, Ransomware, Spyware
Adware
System Attack virus: Boot sector, Multipartite, Spacefiller, Resident, Polymorphic,
File infector, Direct Action
Macro
|
I.
An antivirus
software is a computer program used to scan files. It detects, prevents,
identifies and eliminates computer viruses and other malicious software.
II.
It is
preventive in nature.
III.
It protects the
computer system from viruses and other malicious software.
IV.
Antivirus is
used to keep the system secure.
V.
Some type
antivirus name: Avast Antivirus, Norton Antivirus, Eset Antivirus,
TrendMicro Antivirus, Bitdefender
Antivirus
Avira Antivirus, Kaspersky Antivirus, AVG
Antivirus, Panda Security Antivirus.
|
2.
1.Marksit is created by applying the decision Table.
Conditions:
A+=80-100, A=70-79, B=60-69, C=50-59, D=40-49, F=0-39
Decision Table
|
Y
|
A+
|
|
|
|
|
|
|
|
|
|
|
80-100
|
|
|
Y
|
A
|
|
|
|
|
|
|
|
|
|
N
|
70-79
|
|
|
Y
|
B
|
|
|
|
|
|
|
|
|
|
N
|
60-69
|
|
|
Y
|
C
|
|
|
|
|
|
|
|
|
|
N
|
50-59
|
|
|
Y
|
D
|
|
|
|
|
|
|
|
|
|
N
|
40-49
|
|
|
|
|
|
|
|
|
|
|
|
|
|
N
|
0-39
|
Y
|
F
|
Interview Question
1.What is system?
A system is a group of interacting or interrelated elements that act according to a set of rules to form a unified whole. A system, surrounded and influenced by its environment, is described by its boundaries, structure and purpose and expressed in its functioning.
Types of Information
2.Types of Information
STRATEGIC : Needed for long range planning and directions. This is less structured.
TACTICAL : Needed to take short range decisions to improve profitability and performance.
OPERATIONAL : Needed for day to day operations of the organization.
STATUTORY : Needed by law to sent to government authorities.
3.Elements of a System
Outputs and Inputs
Processor
Control
Feedback
Environment
Boundaries and Interface
4.Nine Steps involved in Analysis and Design
Requirements Determinations
Requirements Specifications
Feasibility Analysis
Final Specifications
Hardware Study
System Design
System Implementation
System Evaluation
System Modification
5.Information Gathering Tools
Review of Literature, Procedures and Forms.
On Site Observation.
Interviews and Questionnaires.
6.DFD Rules
Each process should have at least one input and an output.
Each data store should have at least one data flow in and one data flow out.
Data stored in a system must go through ab process.
All processes in a DFD go to another process or a data store.
7.DFD 0
DFD Level 0 is also called a Context Diagram. It’s a basic overview of the whole system or process being analyzed or modeled.
It’s designed to be an at-a-glance view, showing the system as a single high-level process, with its relationship to external entities.
It should be easily understood by a wide audience, including stakeholders, business analysts, data analysts and developers.
8.DFD-1
DFD Level 1 provides a more detailed breakout of pieces of the Context Level Diagram.
You will highlight the main functions carried out by the system, as you break down the high-level process of the Context Diagram into its sub-processes.
9.Rules for System Testing
Testing should be based on the requirements of user.
Before writing testing scripts, understand the business logic should be understood thoroughly.
Test plan should be done as soon as possible.
Testing should be done by the third party.
It should be performed on static software.
Testing should be done for valid and invalid input conditions.
Testing should be reviewed and examined to reduce the costs.
Both static and dynamic testing should be conducted on the software.
Documentation of test cases and test results should be done.
10.Eight unique features of E-Commerce technology
Ubiquity: Internet/Web technology available everywhere: work, home, etc., and anytime
Global reach: The technology reaches across national boundaries, around Earth
Universal standards:One set of technology standards: Internet standards
Richness:Supports video, audio, and text messages
Interactivity: The technology works through interaction with the user
Information density: Vast increases in information density—the total amount and quality of information available to all market participants
Professionalization/Customization: Technology permits modification of messages, goods
Social technology: The technology promotes user content generation and social networking
11.Types of Electronic Commerce
Business-to-business (B2B)
Business-to-consumer (B2C)
Consumer-to-consumer (C2C)
Consumer-to-Business (C2B)
B2B (Business-To-Business) is a commercial activity (business) between two companies. So the clients of one enterprise are other companies.
B2C (Business-To-Consumer) is a commercial activity between companies and consumers. It can be a huge supermarket, online store, or even a small branch of a law firm (consulting individuals).
C2C (Consumer-To-Consumer) is a commercial activity between private individuals (consumers). This business model can be implemented directly, as well as through a third-party (mediator).
C2C (Consumer-To-Consumer) is a commercial activity between private individuals (consumers). This business model can be implemented directly, as well as through a third-party (mediator).
C2B (Consumer-To-Business) is a little unusual model of e-commerce. Consumers define (bid) prices on goods and services (offered by businesses) by themselves.