- What is information assurance and how is it provided?(Ans:Information assurance is defined a the set of measures applied to protect information systems and the information of an organization. It ensures availability, integrity, confidentiality and non repudiation of an organization's information and information system. IA infact the management of risk in relation of processing, transmitting or storing data or information, which means to protect information and information system from accessing, misusing, disclosing, disrupting, destructing and modifying in an unlawful manner.)
- Describe security risk analysis?(Ans: Risk analysis is a continuous process that require you to constantly monitor the measures employed to maintain security of your system at present. Process of security risk analysis involves the following three key elements: impact statement, effectiveness measure and recommended countermeasures. )
- How do you classify the information system in general? (Ans: there are three basic categories 1. operation support system(Transaction processing system, process control system, Enterprise collaboration System ), 2. knowledge based system (expert system, knowledge Management System), 3. management support system.(management information system, decision support system) ).
- What is the public key encryption ? Explain.(Ans: in public key encryption two keys are used to encrypt and decrypt data. the key used to encrypt the data is known as public key, and the key used to decrypt the data is known as the private key.you need to generate the public key and private key to use public key encryption. the public key is then made available to anybody who wants to send data. sender can use public key to encrypt data and send the encrypted data to destination. you need to use private key which remains hidden from sender to decrypt data.)
- What are the security threats? Discuss.(Ans: viruses(polymorphic, stealth, retroviruses, multipartite, armored, companion, phage, macro viruses), Trojan horses, Logic bombs, worms, spoofing(ip spoofing, content spoofing, caller id spoofing, email spoofing), Trapedoor, email viruses, Macro viruses, Malicious software, deniel of service attacks)
- How we can use firewall to make secure our application? (Ans: Packet filter, Application level gateway, circuit level gateway, proxy server)
- What is the process of developing secure information system?
- What do you understand by security structure and design?
- Describe the intellectual property issue (IPR).
- Write a short note on the copyright Act.
- What is the information security? Explain cyber crime and Cyber security in this reference.
- What is intellectual property? Explain with example.
- Elaborate the difference between security and threats and explain web security.
- Draw the digrametical approach to make difference between symmetric and asymmetric cryptography.
- How tunneling takes place in virtual private network (VPN)? Explain the advantage of VPN.
- How you can say that intrusion detection system is the backbone of information system? Justify along with its categories.
- Elaborate cyber crime play a vital role against person , property and government to protect all valuable information and rights.
- What are the different technologies used for the security of data and application? explain the vulnerabilities.
- Explain and diffrentiate between integrating security at the implementation phase and the development phase.
- What is the data security considerations? explain in this reference data back up security, data archival security and data disposal considerations.
- Explain in what situation semiconductor law comes in consideration and how it differs from patent law?
- What is the application security? define it in the case of vendor challenges and user challenges for application security.
- Explain the concept of cryptography by using the diagrammatic approach of it. define the transformation method of it.
- Elaborate the term access control. What is include in authorization process for (File, Program, data Rights) and explain the all type of controls.
- Explain the information system resource and activities and what may be the reason of failure of it.
BRAIN SHAPERS..
neurons gymnasium..
Wednesday, March 9, 2016
CYBER SECURITY - AUC- 002 (Questions with Answer) of AKTU
Monday, November 12, 2012
MCA OOS UNIT 4 & UNIT 5
Inheritance
C++ strongly supports the concepts of reusability.
Once a class has been written and tested, it can be adopted
b other programmers to suit their requirements.
This is basically done by creating new classes reusing the
properties of the existing once.
The mechanism of deriving a new class from an old one is called
inheritance.
The old class is referred as base class and the new one is
called the derived or subclass.
Hierarchical Inheritance |
Multilevel Inheritance |
Multiple Inheritance |
Hybrid Inheritance |
Single Inheritance |
A class can also inherit properties from more than one class
or from more than one level .
A derived class with only one base class is called single
inheritance and one with several base classes is called multiple inheritances.
The traits of one class may be inherited by more than one class.
This process is called as hierarchical inheritance.
The mechanism of deriving a class from another
derived class is known as multilevel inheritance.Syntax
class derived_ class-name : visibility-mode base class_name
{
---------------//
---------------//members of derived class
--------------//
} ;
Single Inheritance Example :Single Inheritance is method in which a derived class has only one base class.
#include <iostream.h> class Value { protected: int val; public: void set_values (int a) { val=a;} }; class Cube: public Value { public: int cube() { return (val*val*val); } }; int main () { Cube cub; cub.set_values (5); //object of cube class inherit the
function of Value class cout << "The Cube of 5 is::" << cub.cube() << endl; return 0; }
Multiple Inheritance Example: Multiple Inheritance is a method by which a class is derived from more than one base class.
#include <iostream.h>
using namespace std;
class Square
{
protected:
int l;
public:
void set_values (int x)
{ l=x;}
};
class CShow
{
public:
void show(int i);
};
void CShow::show (int i)
{
cout << "The area of the square is::" << i << endl;
}
class Area: public Square, public CShow
{
public:
int area()
{ return (l *l); }
};
int main ()
{
Area r;
r.set_values (5);
r.show(r.area());
return 0;
}
Hierarchical Inheritance Example: Hierarchical Inheritance is a method of inheritance where one or more derived classes is derived from common base class.
#include <iostream.h>
class Side
{
protected:
int l;
public:
void set_values (int x)
{ l=x;}
};
class Square: public Side
{
public:
int sq()
{ return (l *l); }
};
class Cube:public Side
{
public:
int cub()
{ return (l *l*l); }
};
int main ()
{
Square s;
s.set_values (10);
cout << "The square value is::" << s.sq() << endl;
Cube c;
c.set_values (20);
cout << "The cube value is::" << c.cub() << endl;
return 0;
}
Multilevel Inheritance Example: Multilevel Inheritance is a method where a derived class is derived from another derived class.
#include <iostream.h>
class mm
{
protected:
int rollno;
public:
void get_num(int a)
{ rollno = a; }
void put_num()
{ cout << "Roll Number Is:\n"<< rollno << "\n"; }
};
class marks : public mm
{
protected:
int sub1;
int sub2;
public:
void get_marks(int x,int y)
{
sub1 = x;
sub2 = y;
}
void put_marks(void)
{
cout << "Subject 1:" << sub1 << "\n";
cout << "Subject 2:" << sub2 << "\n";
}
};
class res : public marks
{
protected:
float tot;
public:
void disp(void)
{
tot = sub1+sub2;
put_num();
put_marks();
cout << "Total:"<< tot;
}
};
int main()
{
res std1;
std1.get_num(5);
std1.get_marks(10,20);
std1.disp();
return 0;
}
Hybrid Inheritance Example: Hybrid Inheritance is a method where one or more types of inheritance are combined together and used.#include <iostream.h> class mm { protected: int rollno; public: void get_num(int a) { rollno = a; } void put_num() { cout << "Roll Number Is:"<< rollno << "\n"; } }; class marks : public mm { protected: int sub1; int sub2; public: void get_marks(int x,int y) { sub1 = x; sub2 = y; } void put_marks(void) { cout << "Subject 1:" << sub1 << "\n"; cout << "Subject 2:" << sub2 << "\n"; } }; class extra { protected: float e; public: void get_extra(float s) {e=s;} void put_extra(void) { cout << "Extra Score::" << e << "\n";} }; class res : public marks, public extra{ protected: float tot; public: void disp(void) { tot = sub1+sub2+e; put_num(); put_marks(); put_extra(); cout << "Total:"<< tot; } }; int main() { res std1; std1.get_num(10); std1.get_marks(10,20); std1.get_extra(33.12); std1.disp(); return 0; }
When a base class is privately inherited by a derived class, public members of the base class become private members of the derived class and therefore the public member of the base class can only be accessed by the member functions of the derived class. They are inaccessible to the object of the derived class.A public member of a class can be accessed by its own objects using dot operator.
The result is that no member of the base class is accessible to the object of the derived class.
Visibility of Inherited members:
Tuesday, December 13, 2011
MCA-512 (UNIT V) - Dot Net Framework and C# (Assembly)
Assembly an
Introduction
An assembly is a small logical collection of classes that
contains the metadata of an application and components and resources that
enable you to create an application. An assembly is one of the main components
of the .NET framework and it is developed during the Runtime. An assembly
provides the CLR with the metadata, which describes types, members, and
references in your code. The runtime uses the metadata to locate and load
classes, lay out instances in memory, generate native code, and enforce security.
It contains a manifest for executing a Microsoft
Intermediate Language-based code (MSIL) at the CLR.Before the advent of the
.NET platform, the business logic was implemented in the COM component. The
main problem with COM is that it is tightly coupled with the operating system.
When you deploy a COM component on a system, it copies the related .dll or .exe
file to a specific location and makes an entry for the file in the registry. In
COM, every component is uniquely identified in the registry through a Globally
Unique Identifier (GUID).
DLL-hell Problem
COM-based systems are prone to the classic dll-hell problem.
You cannot modify a component after it is deployed without affecting existing
clients. COM provides a mechanism to register and access multiple versions of a
component in the registry, but the operating system does not provide a
mechanism to prevent an earlier version of a .dll from accidentally overwriting
a newer version.
Needs for Assemblies
The assembly handles the operating system dependency and DLL-hell problems because it is a self-describing unit. You can maintain two versions of the same assembly on the same system.
The assembly handles the operating system dependency and DLL-hell problems because it is a self-describing unit. You can maintain two versions of the same assembly on the same system.
COM-based systems are prone to the classic dll-hell problem.
You cannot modify a component after it is deployed without affecting existing
clients. COM provides a mechanism to register and access multiple versions of a
component in the registry, but the operating system does not provide a
mechanism to prevent an earlier version of a .dll from accidentally overwriting
a newer version.The assembly handles the operating system dependency and
DLL-hell problems because it is a self-describing unit. You can maintain two
versions of the same assembly on the same system.
When Microsoft developed the .NET platform, the operating
system dependency and the dll-hell problems were a major focus and it wanted to
remove the coupling between the platform and the registry. The metadata of an
application resides in the application itself and provides multiple versions of
applications on the same system because each version maintains its own
metadata.
- Easy Deployment: Allows you to deploy a .NET component on
a client computer with a simple Xcopy command.
- Side-by-side Execution: Allows other applications to use
assemblies in addition to the primary application.
- Operating System Independence: Allow you to port
assemblies to any operating system that supports a .NET common runtime
environment.
Structure of an
Assembly
A .NET assembly consists of assembly metadata and the
assembly manifest contains the type information, resources, and the MSIL code
to implement type metadata in an assembly. The manifest is an important
component of an assembly. The assembly manifest contains the following:
- Identity Information: Identifies the
assembly uniquely by the combination of four properties:
assembly name, assembly version, culture, and strong name.
- File List Information: Includes
types and declarations defined in another file. Every assembly is made up of
one or more files. The manifest maintains a list of files that make up the
assembly. The manifest maps the file containing the types and declarations to
the file containing the declaration and implementation of an application.
- Identity Information: Identifies the
assembly uniquely by the combination of four properties:
assembly name, assembly version, culture, and strong name.
- File List Information: Includes
types and declarations defined in another file. Every assembly is made up of
one or more files. The manifest maintains a list of files that make up the
assembly. The manifest maps the file containing the types and declarations to
the file containing the declaration and implementation of an application.
- Referenced Assembly Information: Includes
the information of references to other assemblies. In application development,
you can develop various components that are spread across various assemblies.
- Exported Type References: Includes
information about the functions and types that are exported and available to
other assemblies. The components of other assemblies may refer to the methods
and properties in the current assembly.
- Type Metadata: Provides the
description of each class type. The manifest includes the name of each class
type exported from the assembly and the information about the file containing
its metadata.
- Resources: Includes resources such as bitmaps that you can integrate into a manifest. The assembly's resource section contains information on the resources the application uses.
- Resources: Includes resources such as bitmaps that you can integrate into a manifest. The assembly's resource section contains information on the resources the application uses.
- MSIL Code: Contains the
compiled code in the MSIL format. The manifest is the system information about
the assembly. The .NET platform compiles code written in a CLS-compliant
language to an Intermediate Language (IL). The MSIL compiler compiles the
source code to an IL form. When the .Net-based code is executed, the
just-in-time compiler of the .NET runtime compiles the IL code to the
executable form. The runtime loads the compiled code segment in memory and
executes it. As a result, the system stores the complete compiled code as part
of the assembly in IL format and recompiles and executes it. This happens only
once between the loading and unloading of the .NET runtime.
Types of Assemblies
There are two types of assemblies, single-file and
multi-file assemblies. In the .NET platform there is no difference between the
two. Based on the structure, constraints, and requirements of the development
team, you can choose either type of assembly.
Single-File Assembly
Multi-File Assembly
Single-File Assembly
Multi-File Assembly
Single-File Assembly-A
single-file assembly stores the manifest, type metadata, IL, and resources in a
single file. You can use this approach for simple applications when you need to
develop an assembly for a small-scale deployment.
Multi-File Assembly: For
example, you can have different modules related to the system administration
functionality, developed over a period of time. Using the multi-file assembly
feature of .NET, you can group all administration functionality modules into an
assembly to facilitate component versioning and maintenance.
Scope of Assemblies
Assemblies can either contain a private or a public scope,
based on the level of access required by the clients who access it. The
manifest contains information regarding the scope of an assembly.
•
Private
Assembly
•
Shared
Assembly
Private Assembly- Assemblies
are private in scope if only one application can access them. Private
assemblies are only available to clients in the same directory structure as the
assembly. As a result, the .NET assembly resides in the same directory
structure as the client executable. You can use a private assembly when it is
specific to a client application and no other client application refers to it.
Shared Assembly-When
an assembly such as a system assembly contains features shared by various
applications, standard deployment techniques discourage the use of private
assemblies. As a result, you need to maintain a copy of the assembly for each
client application. You can also register the assembly in the Global Assembly
Cache (GAC), so that all client applications refer to one copy of the assembly.
This type of assembly is called a shared assembly. The side-by-side execution
feature of the .NET platform enables you to register multiple versions of the
same assembly in GAC.
Global Assembly
Cache(GAC): GAC is a repository of assemblies used by multiple applications
on a system. When you install the .NET runtime on a system, it creates a cache,
which can be used to store assemblies.
Advantages
The advantages of storing an assembly as a shared assembly in GAC are:
- Multiple Applications: Allows you to access an assembly from one location, GAC. If multiple applications use the same assembly, instead of keeping a copy of the assembly in each application folder, you can store a shared assembly in GAC.
The advantages of storing an assembly as a shared assembly in GAC are:
- Multiple Applications: Allows you to access an assembly from one location, GAC. If multiple applications use the same assembly, instead of keeping a copy of the assembly in each application folder, you can store a shared assembly in GAC.
- Automatic Search Location: Enables the client application to easily access an assembly stored in
GAC. When the runtime searches for an assembly, GAC is the default location it
searches.
Security: Ensures that only the system
administrator can modify permissions of the folder. The GAC is always installed
in the system folder. It inherits the permissions and Access Control Lists
(ACLs) present in the system folder. As a result, you can protect GAC from
unauthorized modifications.
- Side-by-side Versioning: Enables you to
maintain multiple versions of the same application on a system. Private
assemblies enable you to maintain a copy of the assembly in every client
application folder. When a new version of an assembly is released, instead of
updating the assemblies in all client applications, you can maintain multiple
versions of the assembly in a central location, GAC. Client applications can
refer to various versions of assemblies in GAC.
Disadvantage of
Storing an Assembly in GAC
In a private assembly, you can use a simple Xcopy operation
for deployment, which you cannot use for GAC-based assemblies. The assembly has
to be physically registered in the GAC of client computers. For example,
assemblies stored in the GAC should have the same assembly name and file name,
which means that you should save assembly name abc as abc.exe or abc.dll.
Tuesday, November 22, 2011
Best Answers of a interview question, "What is your weakness?"
What is your weakness is a simple question but has a lot of significance. This question has to be answered well and by this the employer guages your temperament. So, prepare well to make it your strength during the interview.
few example of such type of Questions:-
"I Believe people blindly at first sight."
"Can't tolerate the disturbance during work time."
"I do not feel comfortable until i finish my work."
"very friendly in behavior."
"It is very much difficult for me to say 'NO' to someone."
"I am an analyzer. Sometimes in leisure time i start doing analysis on people's sayings."
"My weakness is doing mistake once and my strength is I will never do done mistake again"
i can not trust the person with-in shortly.
few example of such type of Questions:-
"My weakness is I get irritated when my group member refuse to bear their
responsibility."
"I get fed up when anyone discourage me."
"I Believe people blindly at first sight."
"Can't tolerate the disturbance during work time."
"I do not feel comfortable until i finish my work."
"very friendly in behavior."
"It is very much difficult for me to say 'NO' to someone."
"I am an analyzer. Sometimes in leisure time i start doing analysis on people's sayings."
"My weakness is doing mistake once and my strength is I will never do done mistake again"
i can not trust the person with-in shortly.
Labels:
B.Tech,
Career,
Computer Science,
HR Interview,
Information Technology,
interview tips,
IT,
MCA
Wednesday, June 29, 2011
TOP MCA/ENGINEERING COLLEGE IN NCR/GHAZIABAD
Ajay Kumar Garg Engineering College, Ghaziabad-120 –Reputed college in engineering with excelent academic environment.in top 10 from many years.it offers M. Tech course also.
Hi-Tech Institute of Engineering & Technology, Ghaziabad- 60 - Reputed college with excelent academic environment ............................provides technical certfication with degree………………Nice placement..(100 % in MCA )
ABES Engineering College, Ghaziabad-60- it’s a reputed engineering college with many awards in university level ……for their excelent performance.
Institute of Management Studies, Ghaziabad-120- a well known name in institutations…many campus …excelent infrastructure..
MASTER OF COMPUTER APPLICATION (MCA)/CAREER AFTER B.Sc./BCA/GRADUATION/CAREER IN IT INDUSTRY
The Master of Computer Applications (MCA) is a postgraduate degree in computer application streams awarded in India since 1982. Full time MCA programmes normally take three academic years. The primary emphasis in MCA curriculum is on the development of diverse types of application software rather than designing computer hardware and systems software, which is generally within the domain of engineering majors. More than one thousand institutions provide MCA courses in India with an annual intake of more than 55000 students.
Entrance into an MCA programme requires a bachelors degree from any field of computer science such as a BCA (Bachelor in Computer Application). The course of study covers a variety of topics in the computer programming and designing fields, and can prepare people for a wide variety of computer science related professions
Structure of the Curriculum
There are two streams in computer education. One of them is the Engineering stream leading to the B.E./B.Tech degree and the other an application stream leading to the MCA degree.
In the B.E./ B.Tech course the primary emphasis is on designing computer hardware and systems software. Designing embedded systems, designing peripherals and interfacing them to a computer and use of computers in signal processing would be some of the other areas of interest to B.E. students.
The primary emphasis in MCA on the other hand, is on designing information systems for various organizations such as banks, insurance companies, hotels, hospitals etc. Development of application software in diverse areas where computers are used will be the main function of MCA graduates. Thus in the MCA curriculum hardware, system software and embedded system design are not emphasised. The major thrust is on giving the students a sound background in computing, business functioning and mathematics relevant to information technology. Thus the curriculum has these three streams of courses each semester running concurrently. In computing, students learn best by doing. A strong laboratory component is a part of the curriculum. The laboratories, besides supplementing the theory course should also expose the student to the use of the latest software tools.
Every MCA student is required to spend one semester in an industry developing a software system.It is suggested that the student periodically report back to the college and present a seminar on the work being done by him.
MCA Course Pre-requisites and Period
MCA is a three year (6 semester) course. The students entering MCA must have a B.C.A./B.Sc./ B.Com/B.A. degree with Mathematics as one of the subjects at 10+2 level or at graduation. Of the 6 semesters one semester is to be spent in an industry developing a software system.
The MCA programme is planned to have 5 theory subject plus two laboratories each semester. The curriculum has a strong core covering information technology, business management and mathematics.
Thursday, June 9, 2011
CAREER AFTER B.Sc./BCA/BBA
If you have strong will then you can achieve your dream that you see in your open eyes. Don’t hesitate don’t shy to say “yes i can”. For your bright future and stable career nothing is important besides your strong will and a proper guidance.
Lots of full time and part time professional courses are available in various institutes. It is must to you search your soul that what you like or what is your nature. Don’t do that which is trend of mass. Do conversation with yourself and find a real option for you.
For career guidance mail at bhaskersharma@india.com
Subscribe to:
Posts (Atom)