10+2 Date Entry Ans

Embed Size (px)

Citation preview

  • 8/12/2019 10+2 Date Entry Ans

    1/13

    Question Paper March 2014

    Degree Bridge Course (Equivalent to 102 !td"#$

    !u%& Data Entr' (DBC D$)i*e+ hours Ma,i*u* +-0

    ." /nser the olloing question in one sentence each& 10 , 110

    1. Expand CPU. central processing unit2. What is Ram? RANDOM ACCESS MEMORY3. What is the functin f MAR? MARholds the memory location of data that needs to be

    accessed. When reading from memory,!. Name an" ne f the US# De$ise. SCAN%E&5. Expand SDRM. Synchronous dynamic random memory6. What is W'm? malwarecomputer program7. Expand SDRM. Synchronous dynamic random memory

    8. Expand US#. Universal Serial Bus(USB)

    9. What is cmpute' c(c) speed? , 1.50 GHz 1.! GHz*+. Exp(ain inst'uctin set.

    .." /nser an' ten o the olloing question in 2 to sentences each& 10 , 2 20

    **. W'ite at (east , t - cmpnents f the Mthe' #a'd.

    *2. W'ite the Name f the fi$e sus"stems t cnt'( the net/').

    i0 S&ORA1E MODUES ii0 3UNC&4ONAMODUES 5pe'at's0 iii0DA&APA&6S 5s/itches and /i'es0i$0 CON&RO PO4N&S $0 COND4&4ON PO4N&S

    *7. What is PC ca'd?

    A PC Card (previously known as a PCMCIA card is a credi! card"si#e $e$oryorI%&device !'a! i!sin!o a personal co$pu!er) usually a no!e*ook or lap!op co$pu!er. Pro*a*ly !'e $os! co$$on use oa PC Card is !'e !eleco$$unica!ions $ode$or no!e*ook co$pu!ers. +'ere are 16"*inary di,i!and3-"*i! (Cardus varie!ies o PC Cards. Ano!'er !ype o PC card is !'e/0 por!Card.

    *!. 6/ 8ice Mai( W')s.

    " call to any business or home used to mean one of three things ## an answer, a busy signal or

    endless, unanswered ringing. $ncreasingly, it now means an encounter with %oice mail. %oice

    messages ha%e become a routine part of e%eryone&s day, if not the most common electronic message

    system used. "t wor', on your cell phone and at home, almost e%eryone has at least one %oice mail

    account, and sometimes more than one.

    *,. 3e/ D'a/ac)s f E(ect'nic Mai(.

    The recipient needs access to the Internet to receive email.

    Virusesare easily spread via email attachments(most email providers scan emails for

    viruses on your behalf).

    Phishing- sending an email to a user falsely claiming to be a legitimate company to

    scam the user into providing information, such as personal information and bankaccount numbers on a bogus website. The details will then be used for identity theft.

    http://en.wikipedia.org/wiki/Central_processing_unithttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Computer_programhttp://searchmobilecomputing.techtarget.com/definition/memoryhttp://searchmobilecomputing.techtarget.com/definition/memoryhttp://searchcio-midmarket.techtarget.com/definition/input-outputhttp://searchcio-midmarket.techtarget.com/definition/input-outputhttp://searchmobilecomputing.techtarget.com/definition/modemhttp://searchcio-midmarket.techtarget.com/definition/bithttp://whatis.techtarget.com/definition/ZV-port-Zoomed-Video-porthttp://en.wikipedia.org/wiki/Central_processing_unithttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Computer_programhttp://searchmobilecomputing.techtarget.com/definition/memoryhttp://searchcio-midmarket.techtarget.com/definition/input-outputhttp://searchmobilecomputing.techtarget.com/definition/modemhttp://searchcio-midmarket.techtarget.com/definition/bithttp://whatis.techtarget.com/definition/ZV-port-Zoomed-Video-port
  • 8/12/2019 10+2 Date Entry Ans

    2/13

    No guarantee the mail will be read until the user logs on and checks their email.

    Spam- unsolicited email, ie unk mail.

    *-. 3u(( Dup(ex." duplexcommunication systemis a point#to#pointsystem composed of two connected parties orde%ices that can communicate with one another in both directions, simultaneously. "n eample ofa duple de%ice is a telephone. )he people at both ends of a telephone call can spea' at thesame time and simultaneously each be heard by the other at the same time. )he earphone

    reproduces the speech of the other person as the microphone transmits the speech of the localperson, because there is a two#way communication channel between them.*9. Exp(ain Se'ia( Data &'ansmissin.

    $n telecommunicationand computer science, serial communicationis the process of

    sending dataone bitat a time, se*uentially, o%er acommunication channelor computer bus. )his is in

    contrast to parallel communication, where se%eral bits are sent as a whole, on a lin' with se%eral

    parallel channels.

    +erial communication is used for all long#haul communication and most computer networ's, where

    the cost of cableand synchronizationdifficulties ma'e parallel communication impractical. +erial

    computer buses are becoming more common e%en at shorter distances, as impro%ed signal

    integrityand transmission speeds in newer serial technologies ha%e begun to outweigh the parallelbus&s ad%antage of simplicity (no need for serializer and deserializer, or +eres- and to outstrip its

    disad%antages (cloc' s'ew, interconnect density-. )he migration from /$to/$ pressis an

    eample.

    *:. E(a'ate n Data Definitin (an;ua;e.

    ata efinition anguage is used to modify the schema of the database. $t will ne%er impact the userrights for the database. 2therwise, it can erase records in some tables. $t describes three statements3/4"), ")4 and 42.

    *

  • 8/12/2019 10+2 Date Entry Ans

    3/13

    point ftp.example.comand www.example.comto the" recordexample.com, which in turn points to the $#

    address. )hen, if you e%er need to change the $#address, you only ha%e to change it in one place (" record-.

    /": records must always be pointed to another domain name, ne%er to an $#address.

    2*. What is the cmmn use f (in)in; data?

    Common Data Lin !CDL)is a secure ;.+. militarycommunications protocol. $t was established by

    the ;.+. epartment of efensein 1/ operates within the @ubandat data rates up to ?AB :bits. / allows forfulldupledata echange.

    )he 790C "uthorization "ct (ublic aw 10

  • 8/12/2019 10+2 Date Entry Ans

    4/13

    2ther such cables and ports, transmitting data one bit at a time, include +erial ")", +erial

    +/+$, thernet cableplugged into thernet ports, theisplay ata /hannelusing pre%iously reser%ed

    pins of the FG" connectoror the F$ portor the H:$port.

    Serial #uses

    :any communication systems were generally originally designed to connect two integrated circuits on

    the same printed circuit board,connected bysignal traceson that board (rather than eternal cables-.

    $ntegrated circuitsare more epensi%e when they ha%e more pins. )o reduce the number of pins in apac'age, many $/s use a serial bus to transfer data when speed is not important. +ome eamples of

    such low#cost serial buses include +$, $/, ;$2, and 1#Wire.

    Serial versus parallel

    )he communication lin's across which computersor parts of computerstal' to one another may

    be either serial or parallel. " parallel lin' transmits se%eral streams of data simultaneously along

    multiple channels (e.g., wires, printed circuit trac's, or optical fibres-8 a serial lin' transmits a single

    stream of data.

    "lthough a serial lin' may seem inferior to a parallel one, since it can transmit less data per cloc'

    cycle, it is often the case that serial lin's can be cloc'ed considerably faster than parallel lin's inorder to achie%e a higher data rate. " number of factors allow serial to be cloc'ed at a higher rate3

    /loc' s'ewbetween different channels is not an issue (for uncloc'ed asynchronous serial

    communicationlin's-.

    " serial connection re*uires fewer interconnecting cables (e.g., wiresfibres- and hence

    occupies less space. )he etra space allows for better isolation of the channel from its

    surroundings.

    /rosstal'is less of an issue, because there are fewer conductors in proimity.

    $n many cases, serial is a better option because it is cheaper to implement. :any $/sha%e serialinterfaces, as opposed to parallel ones, so that they ha%e fewer pins and are therefore less

    epensi%e.

    2!. Exp(ain Pa'a((e( Data &'ansmissin.

    $n telecommunicationand computer science, parallel communicationis a method of con%eying

    multiple binary digits (bits- simultaneously. $t contrasts with serial communication, which con%eys only

    a single bit at a time8 this distinction is one way of characterizing a communications lin'.

    )he basic difference between a parallel and a serial communication channelis the number of

    electrical conductors used at the physical layerto con%ey bits. arallel communication implies more

    than one such conductor. 7or eample, an I#bit parallel channel will con%ey eight bits (or a byte-

    simultaneously, whereas a serial channel would con%ey those same bits se*uentially, one at a time. $f

    both channels operated at the same cloc' speed, the parallel channel would be eight times faster. "

    parallel channel may ha%e additional conductors for other signals, such as a cloc' signal to pace the

    flow of data, a signal to control the direction of data flow, and handsha'ingsignals.

    Defore the de%elopment of high#speed serial technologies, the choice of parallel lin's o%er serial lin's

    was dri%en by these factors3

    http://en.wikipedia.org/wiki/Serial_ATAhttp://en.wikipedia.org/wiki/SCSI_connector#Serial_SCSIhttp://en.wikipedia.org/wiki/SCSI_connector#Serial_SCSIhttp://en.wikipedia.org/wiki/Ethernet_cablehttp://en.wikipedia.org/wiki/Ethernet_porthttp://en.wikipedia.org/wiki/Display_Data_Channelhttp://en.wikipedia.org/wiki/VGA_connectorhttp://en.wikipedia.org/wiki/VGA_connectorhttp://en.wikipedia.org/wiki/DVI_porthttp://en.wikipedia.org/wiki/HDMIhttp://en.wikipedia.org/wiki/Printed_circuit_boardhttp://en.wikipedia.org/wiki/Printed_circuit_boardhttp://en.wikipedia.org/wiki/Signal_tracehttp://en.wikipedia.org/wiki/Integrated_circuithttp://en.wikipedia.org/wiki/Serial_Peripheral_Interface_Bushttp://en.wikipedia.org/wiki/I%C2%B2Chttp://en.wikipedia.org/wiki/UNI/Ohttp://en.wikipedia.org/wiki/1-Wirehttp://en.wikipedia.org/wiki/Clock_skewhttp://en.wikipedia.org/wiki/Asynchronous_serial_communicationhttp://en.wikipedia.org/wiki/Asynchronous_serial_communicationhttp://en.wikipedia.org/wiki/Crosstalkhttp://en.wikipedia.org/wiki/Integrated_circuithttp://en.wikipedia.org/wiki/Telecommunicationhttp://en.wikipedia.org/wiki/Computer_sciencehttp://en.wikipedia.org/wiki/Bithttp://en.wikipedia.org/wiki/Serial_communicationhttp://en.wikipedia.org/wiki/Communication_channelhttp://en.wikipedia.org/wiki/Physical_layerhttp://en.wikipedia.org/wiki/Physical_layerhttp://en.wikipedia.org/wiki/Bytehttp://en.wikipedia.org/wiki/Clock_speedhttp://en.wikipedia.org/wiki/Handshakinghttp://en.wikipedia.org/wiki/Serial_ATAhttp://en.wikipedia.org/wiki/SCSI_connector#Serial_SCSIhttp://en.wikipedia.org/wiki/SCSI_connector#Serial_SCSIhttp://en.wikipedia.org/wiki/Ethernet_cablehttp://en.wikipedia.org/wiki/Ethernet_porthttp://en.wikipedia.org/wiki/Display_Data_Channelhttp://en.wikipedia.org/wiki/VGA_connectorhttp://en.wikipedia.org/wiki/DVI_porthttp://en.wikipedia.org/wiki/HDMIhttp://en.wikipedia.org/wiki/Printed_circuit_boardhttp://en.wikipedia.org/wiki/Signal_tracehttp://en.wikipedia.org/wiki/Integrated_circuithttp://en.wikipedia.org/wiki/Serial_Peripheral_Interface_Bushttp://en.wikipedia.org/wiki/I%C2%B2Chttp://en.wikipedia.org/wiki/UNI/Ohttp://en.wikipedia.org/wiki/1-Wirehttp://en.wikipedia.org/wiki/Clock_skewhttp://en.wikipedia.org/wiki/Asynchronous_serial_communicationhttp://en.wikipedia.org/wiki/Asynchronous_serial_communicationhttp://en.wikipedia.org/wiki/Crosstalkhttp://en.wikipedia.org/wiki/Integrated_circuithttp://en.wikipedia.org/wiki/Telecommunicationhttp://en.wikipedia.org/wiki/Computer_sciencehttp://en.wikipedia.org/wiki/Bithttp://en.wikipedia.org/wiki/Serial_communicationhttp://en.wikipedia.org/wiki/Communication_channelhttp://en.wikipedia.org/wiki/Physical_layerhttp://en.wikipedia.org/wiki/Bytehttp://en.wikipedia.org/wiki/Clock_speedhttp://en.wikipedia.org/wiki/Handshaking
  • 8/12/2019 10+2 Date Entry Ans

    5/13

    +peed3 +uperficially, the speed of a parallel data lin' is e*ual to the number of bits sent at one

    time times the bit rateof each indi%idual path8 doubling the number of bits sent at once doubles

    the data rate. $n practice, cloc' s'ewreduces the speed of e%ery lin' to the slowest of all of the

    lin's.

    /able length3 /rosstal'creates interference between the parallel lines, and the effect worsens

    with the length of the communication lin'. )his places an upper limit on the length of a parallel

    data connection that is usually shorter than a serial connection.

    /ompleity3 arallel data lin's are easily implemented in hardware, ma'ing them a logicalchoice. /reating a parallel portin a computer system is relati%ely simple, re*uiring only a latchto

    copy data onto a data bus. $n contrast, most serial communication must first be con%erted bac'

    into parallel form by a uni%ersal asynchronous recei%ertransmitter(;"4)- before they may be

    directly connected to a data bus.

    )he decreasing cost of integrated circuits, combined with greater consumer demand for speed and

    cable length, has led to parallel communication lin's becoming deprecated in fa%or of serial lin's8 for

    eample, $ 1?IBprinter ports %s. ;+D, arallel ")"%s. +erial ")", and +/+$%s. 7ireWire.

    2n the other hand, there has been a resurgence of parallel data lin's in 47communication. 4ather

    than transmitting one bit at a time (as in :orse codeand D+@-, well#'nown techni*ues suchas +:, ":, and :ultiple#input multiple#outputcommunication send a few bits in parallel. (ach

    such group of bits is called a 6symbol6-. +uch techni*ues can be etended to send an entire byte at

    once (?5C#J":-. :ore recently techni*ues such as 27:ha%e been used in"symmetric igital

    +ubscriber ineto transmit o%er ??B bits in parallel, and in FD#)to transmit o%er C0BI bits in

    parallel.

    2,. 8a'ius ad$anta;es f usin; D#MS.

    )here are many ways to store your data, so what are the ad%antages of using a atabase

    :anagement +ystem (D:+- li'e +par'leD o%er other storage typesK

    ata independence

    Application programs should be as independent as possible from details of data representation and storage. The

    DBMS can provide an abstract view of the data to insulate application code from such details.

    fficient data access

    A DBMS utilizes a variety of sophisticated techniques to store and retrieve data efficiently. This feature is

    especially important if the data is stored on eternal storage devices.

    ata integrity and security

    !f data is always accessed through the DBMS" the DBMS can enforce integrity constraints on the data. #or

    eample" before inserting salary information for an employee" the DBMS can chec$ that the department budget

    http://en.wikipedia.org/wiki/Bit_ratehttp://en.wikipedia.org/wiki/Clock_skewhttp://en.wikipedia.org/wiki/Crosstalk_(electronics)http://en.wikipedia.org/wiki/Parallel_porthttp://en.wikipedia.org/wiki/Latch_(electronic)http://en.wikipedia.org/wiki/Data_bushttp://en.wikipedia.org/wiki/Universal_asynchronous_receiver/transmitterhttp://en.wikipedia.org/wiki/Integrated_circuitshttp://en.wikipedia.org/wiki/IEEE_1284http://en.wikipedia.org/wiki/USBhttp://en.wikipedia.org/wiki/Parallel_ATAhttp://en.wikipedia.org/wiki/Serial_ATAhttp://en.wikipedia.org/wiki/SCSIhttp://en.wikipedia.org/wiki/FireWirehttp://en.wikipedia.org/wiki/Radio_frequencyhttp://en.wikipedia.org/wiki/Morse_codehttp://en.wikipedia.org/wiki/Morse_codehttp://en.wikipedia.org/wiki/BPSKhttp://en.wikipedia.org/wiki/Phase-shift_keyinghttp://en.wikipedia.org/wiki/Pulse-amplitude_modulationhttp://en.wikipedia.org/wiki/Multiple-input_multiple-outputhttp://en.wikipedia.org/wiki/Symbol_(data)http://en.wikipedia.org/wiki/256-QAMhttp://en.wikipedia.org/wiki/OFDMhttp://en.wikipedia.org/wiki/Asymmetric_Digital_Subscriber_Linehttp://en.wikipedia.org/wiki/Asymmetric_Digital_Subscriber_Linehttp://en.wikipedia.org/wiki/DVB-Thttp://en.wikipedia.org/wiki/Bit_ratehttp://en.wikipedia.org/wiki/Clock_skewhttp://en.wikipedia.org/wiki/Crosstalk_(electronics)http://en.wikipedia.org/wiki/Parallel_porthttp://en.wikipedia.org/wiki/Latch_(electronic)http://en.wikipedia.org/wiki/Data_bushttp://en.wikipedia.org/wiki/Universal_asynchronous_receiver/transmitterhttp://en.wikipedia.org/wiki/Integrated_circuitshttp://en.wikipedia.org/wiki/IEEE_1284http://en.wikipedia.org/wiki/USBhttp://en.wikipedia.org/wiki/Parallel_ATAhttp://en.wikipedia.org/wiki/Serial_ATAhttp://en.wikipedia.org/wiki/SCSIhttp://en.wikipedia.org/wiki/FireWirehttp://en.wikipedia.org/wiki/Radio_frequencyhttp://en.wikipedia.org/wiki/Morse_codehttp://en.wikipedia.org/wiki/BPSKhttp://en.wikipedia.org/wiki/Phase-shift_keyinghttp://en.wikipedia.org/wiki/Pulse-amplitude_modulationhttp://en.wikipedia.org/wiki/Multiple-input_multiple-outputhttp://en.wikipedia.org/wiki/Symbol_(data)http://en.wikipedia.org/wiki/256-QAMhttp://en.wikipedia.org/wiki/OFDMhttp://en.wikipedia.org/wiki/Asymmetric_Digital_Subscriber_Linehttp://en.wikipedia.org/wiki/Asymmetric_Digital_Subscriber_Linehttp://en.wikipedia.org/wiki/DVB-T
  • 8/12/2019 10+2 Date Entry Ans

    6/13

    is not eceeded. Also" the DBMS can enforce access controls that govern what data is visible to different classes

    of users.

    ata administration

    %hen several users share the data" centralizing the administration of data can offer significant improvements.

    &perienced professionals who understand the nature of the data being managed" and how different groups of

    users use it" can be responsible for organizing the data representation to minimize redundancy and for retuning

    the storage of the data to ma$e retrieval efficient.

    /oncurrent access and crash reco%ery

    A DBMS schedules concurrent accesses to the data in such a manner that users can thin$ of the data as being

    accessed by only one user at a time. #urther" the DBMS protects users from the effects of system failures.

    4educed application de%elopment time

    'learly" the DBMS supports many important functions that are common to many applications accessing data

    stored in the DBMS. This" in con(unction with the high)level interface to the data" facilitates quic$ development

    of applications. Such applications are also li$ely to be more robust than applications developed from scratch

    because many important tas$s are handled by the DBMS instead of being implemented by the application.

    2-. Exp(ain E(ect'nics Data P'cessin;.Electronic Data $rocessin%(ED$- can refer to the use of automated methods to processcommercial data. )ypically, this uses relati%ely simple, repetiti%e acti%ities to process large %olumes ofsimilar information. 7or eample3 stoc' updates applied to an in%entory, ban'ing transactions appliedto account and customer master files, boo'ing and tic'eting transactions to an airline&s reser%ationsystem, billing for utility ser%ices. )he modifier 6electronic6 or 6automatic6 was used with 6dataprocessing6 (-, especially ca. 1. arly commercial systems were installed eclusi%ely by large organizations. )hese could afford to

    in%est the time and capital necessary to purchase hardware, hire specialist staff to de%elop

    bespo'e softwareand wor' through the conse*uent (and often unepected- organizational and

    cultural changes.

    "t first, indi%idual organizations de%eloped their own software, including data management utilities,

    themsel%es. ifferent products might also ha%e &one#off& bespo'e software. )his fragmented approach

    http://en.wikipedia.org/wiki/Data_processinghttp://en.wikipedia.org/wiki/Data_processinghttp://en.wikipedia.org/wiki/United_Kingdomhttp://en.wikipedia.org/wiki/J._Lyons_and_Co.http://en.wikipedia.org/wiki/J._Lyons_and_Co.http://en.wikipedia.org/wiki/Electronic_data_processing#cite_note-3http://en.wikipedia.org/wiki/LEO_computerhttp://en.wikipedia.org/wiki/LEO_computerhttp://en.wikipedia.org/wiki/LEO_computerhttp://en.wikipedia.org/wiki/Electronic_data_processing#cite_note-4http://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Data_processinghttp://en.wikipedia.org/wiki/Data_processinghttp://en.wikipedia.org/wiki/United_Kingdomhttp://en.wikipedia.org/wiki/J._Lyons_and_Co.http://en.wikipedia.org/wiki/J._Lyons_and_Co.http://en.wikipedia.org/wiki/Electronic_data_processing#cite_note-3http://en.wikipedia.org/wiki/LEO_computerhttp://en.wikipedia.org/wiki/Electronic_data_processing#cite_note-4http://en.wikipedia.org/wiki/Software
  • 8/12/2019 10+2 Date Entry Ans

    7/13

    led to duplicated effort and the production of management information needed manual effort. =citation

    needed>

    High hardware costs and relati%ely slow processing speeds forced de%elopers to use resources

    &efficiently&. ata storageformats were hea%ily compacted, for eample. " common eample is the

    remo%al of the century from dates, which e%entually led to the &millennium bug&.

    ata input re*uired intermediate processing %ia punched paper tape or punched cardand separate

    input to a repetiti%e, labor intensi%e tas', remo%ed from user control and error#prone. $n%alid or

    incorrect data needed correction and resubmission with conse*uences for data and accountreconciliation.

    29. Wh" C (an;ua;e is is ppu(a'.2:. Exp(ain #asic input and utput functins.

    ." /nser an' to o the olloing question in 0 to 40 sentences each& 2 , 1020

    2

  • 8/12/2019 10+2 Date Entry Ans

    8/13

    Figure 1. The Systems Failure Analysis Process. This approach assures root causeidentification and effective corrective action implementation.

    7igure 1 shows our recommended systems failure analysis approach. +ystems failure analysis beginswith a clear understanding of the failure (i.e., a definition of the problem-. 2nce this has beenaccomplished, all potential failure causes are identified using fault tree analysis. )he process thanobMecti%ely e%aluates each of the potential failure causes using se%eral techni*ues, including 6what&sdifferent6 analysis, pedigree analysis, failed hardware analysis, and designed eperiments. )hesetechni*ues help in con%erging on the causes of failure among many identified potential causes. 2nce

    the failure causes ha%e been identified, the approach outlined herein de%elops a range of correcti%eactions and then selects and trac's optimum correcti%e action implementation.

    &ault "ree Analysis' (dentiyin% All $otential &ailure Causes

    When confronted with a systems failure, there is often a natural tendency to begin disassemblinghardware to search for the cause. )his is a poor approach. 7ailed hardware can re%eal %aluableinformation and safeguards are necessary to pre%ent losing that information from careless teardownprocedures. 2ne must 'now what to loo' for prior to disassembling failed hardware. )his is wherefault tree analysis enters the picture.

    7ault tree analysis is a graphical techni*ue that identifies all potential failure causes. )he approachwas de%eloped in the early 1

  • 8/12/2019 10+2 Date Entry Ans

    9/13

    We&ll eamine a simple eample to see how this is done, but first, let&s consider fault tree analysissymbology. 7igure ? shows the symbols used by the fault tree. )here are two categories ofsymbols3 e%ents and gates. et&s first consider the four different symbols for e%ents. )he rectangle iscalled a command e%ent, and it represents a condition that is induced by the e%ents immediately belowit (we&ll see how shortly-. )he circle represents a basic failure e%ent (these are typically componentfailures, such as a resistor failing open, or a structural member crac'ing-. )he house represents anormally occurring e%ent (for eample, if electrical power is normally present on a power line, the housewould be used to represent this e%ent-. )he last e%ent symbol is the diamond (it loo's li'e a rectangle

    with the corners remo%ed-, which can represent either a human error or an unde%eloped e%ent. "human error might be a pilot&s failure to etend the landing gear when landing an aircraft, a technician&sfailure to properly adMust a %ariable resistor, or a crew member inad%ertently depressing a self#destructbutton on a missile control console. "n unde%eloped e%ent is one that re*uires no furtherde%elopment. ;sually command e%ents considered etremely unli'ely are designated as unde%elopede%ents to show that they ha%e been considered and eliminated as a possible failure causes. 7ault treee%ents are lin'ed by gates to show the relationships between the e%ents. )here are two types ofgates3 6and6 gates, and 6or6 gates. )he 6and6 gate signifies that all e%ents beneath it must occursimultaneously to result in the e%ent abo%e it. )he 6or6 gate means that if any of the e%ents beneath itoccur, the e%ent abo%e it will result.

    Figure 2. Fault Tree Symbology. Different symbols represent events and logic gates.

    )he best approach for de%eloping the fault tree is to assemble a team consisting of personnel with agood understanding of how the system is supposed to operate and associated support functions. )heteam should typically include an engineer, a *uality engineer, a manufacturing engineer, an assemblytechnician, and perhaps others, depending on the nature of the failure.

    et&s now eamine how all of the abo%e comes together to generate a fault tree analysis. We&llconsider a simple systems failure analysis. +uppose we ha%e a system with a light bulb that screwsinto a soc'et, and the light bulb illuminates when someone turns a switch on. 7igure ! shows aschematic for this system. 2ne day, we flip the switch and the light bulb does not come on.

  • 8/12/2019 10+2 Date Entry Ans

    10/13

    Figure 3. ight !ulb "iring Schematic. This is the system for #hich #e$ll prepare a fault treeanalysis.

    )he first step to define the problem. )he problem here is that the light bulb does not illuminate. )hisbecomes the top undesired e%ent in the fault tree for this system failure, and 7igure B shows it in acommand e%ent (the rectangle symbol-. )op undesired e%ents are always shown in a command e%entsymbol, as they will be commanded to occur by e%ents in the tree below.

    Figure %. &ndicator ight Fault Tree Analysis. This simple fault tree develops potential causesfor an indicator light system failing to illuminate.

  • 8/12/2019 10+2 Date Entry Ans

    11/13

    )he net step is to loo' for the immediately adMacent causes that can induce the top undesirede%ent. )his is a critically important concept. " common shortcoming is to Mump around in the system,and start listing things li'e a power loss in the building, a failed switch, and perhaps other e%ents, butthe fault tree re*uires discipline. 2ne has to loo' for the internal or immediately adMacent causes. "napproach for doing this is to imagine yourself as the light bulb, screwed into the soc'et, and as' 6whatcan happen in me or right net to me to pre%ent me from illuminatingK6 $f one considers only theseconditions, the answers are3

    "n open light bulb filament /ontaminated terminals in the soc'et

    " bulb that&s not fully screwed into the soc'et

    o electrical energy from the soc'et

    We show these e%ents immediately below the top undesired e%ent and determine which symbol isappropriate for each. )he open filament is a basic component failure, so it goes in a circlesymbol. /ontaminated terminals in the soc'et could be caused by a %ariety of conditions, but for thepurposes of this analysis we won&t fully de%elop these, and we&ll put contaminated terminals in an

    unde%eloped e%ent symbol (the diamond-. ot fully screwing the bulb into the soc'et is a human error,so it goes into a human error symbol (also a diamond-. 7inally, no energy from the soc'et is acondition that will be commanded to occur if other e%ents occur elsewhere in the system. )his e%entbecomes a command e%ent, and it goes into a rectangle.

    7+. Exp(ain aut Cmpute' Secu'it".

    Computer security(also 'nown as cy#ersecurityor (" security- is information securityas applied

    tocomputersand computer networ's.

    )he field co%ers all the processes and mechanisms by which computer#based e*uipment, information

    and ser%ices are protected from unintended or unauthorized access, change or destruction.

    /omputer security also includes protection from unplanned e%ents and natural disasters.

    +ecurity by design, or alternately secure by design, means that the software has been designed from

    the ground up to be secure. $n this case, security is considered as a main feature.

    +ome of the techni*ues in this approach include3

    )he principle of least pri%ilege, where each part of the system has only the pri%ileges that are

    needed for its function. )hat way e%en if an attac'ergains access to that part, they ha%e only

    limited access to the whole system.

    "utomated theorem pro%ing to pro%e the correctness of crucial software subsystems.

    /ode re%iews and unit testingare approaches to ma'e modules more secure where formal

    correctness proofs are not possible.

    efense in depth, where the design is such that more than one subsystem needs to be

    %iolated to compromise the integrity of the system and the information it holds.

    efault secure settings, and design to 6fail secure6 rather than 6fail insecure6 (see fail#safefor

    the e*ui%alent in safety engineering-. $deally, a secure system should re*uire a deliberate,

    http://en.wikipedia.org/wiki/Information_securityhttp://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Natural_disasterhttp://en.wikipedia.org/wiki/Secure_by_designhttp://en.wikipedia.org/wiki/Principle_of_least_privilegehttp://en.wikipedia.org/wiki/Hacker_(computer_security)http://en.wikipedia.org/wiki/Automated_theorem_provinghttp://en.wikipedia.org/wiki/Code_reviewhttp://en.wikipedia.org/wiki/Unit_testinghttp://en.wikipedia.org/wiki/Defense_in_depth_(computing)http://en.wikipedia.org/wiki/Fail-safehttp://en.wikipedia.org/wiki/Safety_engineeringhttp://en.wikipedia.org/wiki/Information_securityhttp://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Natural_disasterhttp://en.wikipedia.org/wiki/Secure_by_designhttp://en.wikipedia.org/wiki/Principle_of_least_privilegehttp://en.wikipedia.org/wiki/Hacker_(computer_security)http://en.wikipedia.org/wiki/Automated_theorem_provinghttp://en.wikipedia.org/wiki/Code_reviewhttp://en.wikipedia.org/wiki/Unit_testinghttp://en.wikipedia.org/wiki/Defense_in_depth_(computing)http://en.wikipedia.org/wiki/Fail-safehttp://en.wikipedia.org/wiki/Safety_engineering
  • 8/12/2019 10+2 Date Entry Ans

    12/13

    conscious, 'nowledgeable and free decision on the part of legitimate authorities in order to ma'e

    it insecure.

    "udit trails trac'ing system acti%ity, so that when a security breach occurs, the mechanism and

    etent of the breach can be determined. +toring audit trails remotely, where they can only be

    appended to, can 'eep intruders from co%ering their trac's.

    7ull disclosure to ensure that when bugs are found the 6window of %ulnerability6 is 'ept as

    short as possible.

    +ecurity "rchitecture can be defined as the design artifactsthat describe how the security controls(security countermeasures- are positioned, and how they relate to the o%erall informationtechnology architecture. )hese controls ser%e to maintain the system&s *ualityattributes3 confidentiality,

    2ne use of the term 6computer security6 refers to technology that is used to implement

    secure operating systems. :uch of this technology is based on science de%eloped in the 1

  • 8/12/2019 10+2 Date Entry Ans

    13/13

    +ecure operating systems designed to meet medium robustness le%els of security functionality and

    assurance ha%e seen wider use within both go%ernment and commercial mar'ets. :edium robust

    systems may pro%ide the same security functions as high assurance secure operating systems but do

    so at a lower assurance le%el (such as /ommon /riteria le%els "B or "5-. ower le%els mean

    we can be less certain that the security functions are implemented flawlessly, and therefore less

    dependable. )hese systems are found in use on web ser%ers, guards, database ser%ers, and

    management hosts and are used not only to protect the data stored on these systems but also to

    pro%ide a high le%el of protection for networ' connections and routing ser%ices.

    $f the operating en%ironment is not based on a secure operating system capable of maintaining a

    domain for its own eecution, and capable of protecting application code from malicious sub%ersion,

    and capable of protecting the system from sub%erted code, then high degrees of security are

    understandably not possible. While such secure operating systems are possible and ha%e been

    implemented, most commercial systems fall in a &low security& category because they rely on features

    not supported by secure operating systems (li'e portability, and others-. $n low security operating

    en%ironments, applications must be relied on to participate in their own protection. )here are &best

    effort& secure coding practices that can be followed to ma'e an application more resistant to malicious

    sub%ersion.

    $n commercial en%ironments, the maMority of software sub%ersion %ulnerabilitiesresult from a few'nown 'inds of coding defects. /ommon software defects include buffer o%erflows, format string

    %ulnerabilities, integer o%erflow, and codecommand inMection. )hese defects can be used to cause

    the target system to eecute putati%e data. Howe%er, the 6data6 contain eecutable instructions,

    allowing the attac'er to gain control of the processo

    http://en.wikipedia.org/wiki/Vulnerability_(computing)http://en.wikipedia.org/wiki/Buffer_overflowshttp://en.wikipedia.org/wiki/Format_string_vulnerabilitieshttp://en.wikipedia.org/wiki/Format_string_vulnerabilitieshttp://en.wikipedia.org/wiki/Integer_overflowhttp://en.wikipedia.org/wiki/Code_injectionhttp://en.wikipedia.org/wiki/Vulnerability_(computing)http://en.wikipedia.org/wiki/Buffer_overflowshttp://en.wikipedia.org/wiki/Format_string_vulnerabilitieshttp://en.wikipedia.org/wiki/Format_string_vulnerabilitieshttp://en.wikipedia.org/wiki/Integer_overflowhttp://en.wikipedia.org/wiki/Code_injection