Professional Documents
Culture Documents
1
OVERVIEW
Topics Covered:
1.1 Database management system
1.2 Data Independence
1.3 Data Abstraction
1.4 Data Models
1.5 DBMS Architecture
1.6 Users of DBMS
1.7 Overview of Conventional Data Models
4
An entity represents a real-world object or concept, such as
an employee or a project, that is described in the database. An
attribute represents some property of interest that further
describes an entity, such as the employees name or salary. A
relationship among two or more entities represents an interaction
among the entities, which is explained by the Entity-Relationship
modela popular high-level conceptual data model.
Representational or implementation data models are the
models used most frequently in traditional commercial DBMSs,
and they include the widely-used relational data model, as well as
the so-called legacy data modelsthe network and hierarchical
modelsthat have been widely used in the past.
We can regard object data models as a new family of higherlevel implementation data models that are closer to conceptual
data models.
Object data models are also frequently utilized as highlevel conceptual models, particularly in the software engineering
domain.
Physical data models describe how data is stored in the
computer by representing information such as record formats,
record orderings, and access paths. An access path is a structure
that makes the search for particular database records efficient.
5
The goal of the three-schema architecture, illustrated in
above Figure, is to separate the user applications and the physical
database. In this architecture, schemas can be defined at the
following three levels:
1. The internal level has an internal schema, which describes
the physical storage structure of the database. The internal
schema uses a physical data model and describes the complete
details of data storage and access paths for the database.
2. The conceptual level has a conceptual schema, which
describes the structure of the whole database for a community of
users. The conceptual schema hides the details of physical
storage structures and concentrates on describing entities, data
types, relationships, user operations, and constraints. A high-level
data model or an implementation data model can be used at this
level.
3. The external or view level includes a number of external
schemas or user views. Each external schema describes the part
of the database that a particular user group is interested in and
hides the rest of the database from that user group. A high-level
data model or an implementation data model can be used at this
level.
The three-schema architecture is a convenient tool for the
user to visualize the schema levels in a database system. In most
DBMSs that support user views, external schemas are specified in
the same data model that describes the conceptual-level
information. Some DBMSs allow different data models to be used
at the conceptual and external levels. Notice that the three
schemas are only descriptions of data; the only data that actually
exists is at the physical level. In a DBMS based on the threeschema architecture, each user group refers only to its own
external schema. Hence, the DBMS must transform a request
specified on an external schema into a request against the
conceptual schema, and then into a request on the internal
schema for processing over the stored database. If the request is
database retrieval, the data extracted from the stored database
must be reformatted to match the users external view. The
processes of transforming requests and results between levels are
called mappings. These mappings may be time-consuming, so
some DBMSsespecially those that are meant to support small
databasesdo not support external views. Even in such systems,
however, a certain amount of mapping is necessary to transform
requests between the conceptual and internal levels.
ENGINE
LEFT
DOOR
HANDLE
BODY
RIGHT
DOOR
WINDOW
CHASALS
ROOF
LOCK
10
2
ENTITY RELATIONSHIP MODEL
Topics Covered:
2.1 Entity
2.2 Attributes
2.3 Keys
2.4 Relation
2.5 Cardinality
2.6 Participation
2.7 Weak Entities
2.8 ER Diagram
2.9 Conceptual Design With ER Model
2.1 ENTITY
2.2 ATTRIBUTES
11
Composite Attributes
Attributes which have only one value for a entity are called
single valued attributes.
E.g. For a student entity, RollNo attribute has only one single
value.
12
2.3 KEYS
13
14
2.4 RELATION
15
2.5 CARDINALITY
Mapping cardinalities, or cardinality ratios, express the
number of entities to which another entity can be associated via a
relationship set.
For a relationship set R between entity sets A and B, the
mapping cardinality must be one of the following:
There are three types of relationships
1) One to one
2) One to many
3) Many to many
2.5.1 One to one:
An entity in A is associated with at most one entity in B, and
an entity in B is associated with at most one entity in A.
2.5.2 One to many:
An entity in A is associated with any number (zero or more)
of entities in B. An entity in B, however, can be associated with at
most one entity in A.
2.5.3 Many to one:
An entity in A is associated with at most one entity in B. An
entity in B, however, can be associated with any number (zero or
more) of entities in A.
2.5.4 Many to many:
An entity in A is associated with any number (zero or more)
of entities in B, and an entity in B is associated with any number
(zero or more) of entities in A.
16
2.6 PARTICIPATION
17
An entity set that has a primary key is termed a strong entity set.
The identifying entity set is said to own the weak entity set that it
identifies.
18
entities in the weak entity set that depend on one particular
strong entity.
In the case of the entity set payment, its primary key is {loannumber, payment-number}, where loan-number is the primary
key of the identifying entity set, namely loan, and paymentnumber distinguishes payment entities within the same loan.
It is also possible to have a weak entity set with more than one
identifying entity set.
The primary key of the weak entity set would consist of the
union of the primary keys of the identifying entity sets, plus the
discriminator of the weak entity set.
The weak entity set payment depends on the strong entity set
loan via the relationship set loan-payment.
The figure also illustrates the use of double lines to indicate total
participationthe participation of the (weak) entity set payment
in the relationship loan-payment is total, meaning that every
payment must be related via loan-payment to some loan.
19
2.8
ER DIAGRAM- SPECIALIZATION,
GENERALIZATION AND AG GREGATION
2.8.1 Specialization:
20
21
22
23
24
25
26
27
28
29
attributes with relationships rather than the appropriate entities.
In general, such mistakes lead to redundant storage of the
same information and can cause many problems.
30
31
32
Entity vs. attribute, entity vs. relationship, binary or nary relationship, whether or not to use ISA
hierarchies, and whether or not to use aggregation.
33
3
RELATIONAL MODEL
Topics covered
3.1 Introduction to Relational Model
3.2 Creating and modifying Relations using SQL
3.3 Integrity constraints over the Relation
3.4 Logical Database Design: ER to Relational
3.5 Relational Algebra
34
35
36
37
3.4
LOGICAL DATABASE
RELATIONAL
DESIGN:
ER
TO
The ER model is convenient for representing an initial, highlevel database design. Given an ER diagram describing a
databa'3e, a standard approach is taken to generating a relational
database schema that closely approximates the ER design. (The
translation is approximate to the extent that we cannot capture all
the constraints implicit in the ER design using SQL, unless we use
certain SQL constraints that are costly to check.) We now describe
how to translate an ER diagram into a collection of tables with
associated constraints, that is, a relational database schema.
3.4.1 Entity Sets to Tables
An entity set is mapped to a relation in a straightforward
way: Each attribute of the entity set becomes an attribute of the
table. Note that we know both the domain of each attribute and the
(primary) key of an entity set. Consider the Employees entity set
with attributes ssn, name, and lot shown in following Figure.
38
39
40
is
unary
operation
written
as
41
4
SQL
Topics covered
4.1 Data Definition Commands
4.2 Constraints
4.3 View
4.4 Data Manipulation Commands
4.5 Queries
4.6 Aggregate Queries
4.7 NULL values
4.8 Outer Joins
4.9 Nested Queries- Correlated Queries
4.10 Embedded SQL
4.11 Dynamic SQL
4.12 TRIGGERS
42
4.2 CONSTRAINTS
A SQL2 check constraint is a search condition, like the
search condition in a WHERE clause, that produces a true/false
value. When a check constraint is specified for a column, the
DBMS automatically checks the value of that column each time a
new row is inserted or a row is updated to insure that the search
condition is true. If not, the INSERT or UPDATE statement fails. A
column check constraint is specified as part of the column definition
within the CREATE TABLE statement.
43
44
45
46
row "at the top" or "at the bottom" or "between two rows" of the
table. After the INSERT statement, the new row is simply a part of
the table. A subsequent query against the SALESREPS table will
include the new row, but it may appear anywhere among the rows
of query results.
4.4.2 Delete Statement
The DELETE statement removes selected rows of data from
a single table. The FROM clause specifies the target table
containing the rows. The WHERE clause specifies which rows of
the table are to be deleted.
For example:
Remove Henry Jacobsen from the database.
DELETE FROM SALESREPS
WHERE NAME = 'Henry Jacobsen'
1 row deleted.
The WHERE clause in this example identifies a single row of
the SALESREPS table, which SQL removes from the table.
We can delete all the rows from a table.
For example:
DELETE FROM ORDERS
30 rows deleted.
4.4.3 Update Statement
The UPDATE statement modifies the values of one or more
columns in selected rows of a single table. The target table to be
updated is named in the statement, and you must have the required
permission to update the table as well as each of the individual
columns that will be modified. The WHERE clause selects the rows
of the table to be modified. The SET clause specifies which
columns are to be updated and calculates the new values for them.
For example:
Here is a simple UPDATE statement that changes the credit
limit and salesperson for a customer:
Raise the credit limit for Acme Manufacturing to $60,000 and
reassign them to Mary Jones (employee number 109).
UPDATE CUSTOMERS
SET CREDIT_LIMIT = 60000.00, CUST_REP = 109
WHERE COMPANY = 'Acme Mfg.'
1 row updated.
47
4.5 QUERIES
Select-From-Where Statements
The SELECT statement retrieves data from a database and returns
it to you in the form of query results.
The SELECT clause lists the data items to be retrieved by
the SELECT statement. The
items may be columns from the
database, or columns to be calculated by SQL as it performs the
query.
The FROM clause lists the tables that contain the data to be
retrieved by the query.
The WHERE clause tells SQL to include only certain rows of data
in the query results. A search condition is used to specify the
desired rows.
For Example:
SELECT NAME, HIRE_DATE
FROM SALESREPS
WHERE SALES > 500000.00
48
49
REP_OFFICE
---------13
11
21
11
12
50
Dan Roberts
Tom Snyder
Larry Fitch
Paul Cruz
Nancy Angelli
12
NULL
21
12
22
51
52
Betty
NULL
NULL
Chicago
NULL
NULL
Sam
Chicago
James
Dallas
George NULL
53
Sue Smith
Los Angeles
Larry Fitch Los Angeles
Nancy Angelli Denver
Note in this case (a left outer join), the "child" table
(SALESREPS, the table with the foreign key) is the major table in
the outer join, and the "parent" table (OFFICES) is the minor table.
The objective is to retain rows containing NULL foreign key values
(like Tom Snyder's) from the child table in the query results, so the
child table becomes the major table in the outer join. It doesn't
matter whether the query is actually expressed as a left outer join
(as it was previously) or as a right outer join like this:
List the salespeople and the cities where they work.
SELECT NAME, CITY
FROM SALESREPS, OFFICES
WHERE OFFICE =* REP_OFFICE
NAME
CITY
------------- --------Tom Snyder NULL
Mary Jones New York
Sam Clark
New York
Bob Smith
Chicago
Paul Cruz
Chicago
Dan Roberts Chicago
Bill Adams Atlanta
Sue Smith
Los Angeles
Larry Fitch Los Angeles
Nancy Angelli Denver
What matters is that the child table is the major table in the outer
join.
There are also useful joined queries where the parent is the
major table and the child table is the minor table. For example,
suppose the company in the sample database opens a new sales
office in Dallas, but initially the office has no salespeople assigned
to it. If you want to generate a report listing all of the offices and the
names of the salespeople who work there, you might want to
include a row representing the Dallas office. Here is the outer join
query that produces those results:
List the offices and the salespeople who work in each one.
SELECT CITY, NAME
FROM OFFICES, SALESREPS
WHERE OFFICE *= REP_OFFICE
54
CITY
----------New York
New York
Chicago
Chicago
Chicago
Atlanta
Los Angeles
Los Angeles
Denver
Dallas
NAME
---------Mary Jones
Sam Clark
Bob Smith
Paul Cruz
Dan Roberts
Bill Adams
Sue Smith
Larry Fitch
Nancy Angelli
NULL
55
SELECT SUM(QUOTA)
FROM SALESREPS
WHERE REP_OFFICE = 21
But how can you put the results of this query into the earlier
query in place of the question marks? It would seem reasonable to
start with the first query and replace the "???" with the second
query, as follows:
SELECT CITY
FROM OFFICES
WHERE TARGET > (SELECT SUM (QUOTA)
FROM SALESREPS
WHERE REP_OFFICE = OFFICE)
A few differences between a nested query or subquery and an
actual SELECT statement:
In the most common uses, a nested query or subquery must
produce a single column of data as its query results. This
means that a subquery almost always has a single select item in
its SELECT clause.
The ORDER BY clause cannot be specified in a nested query or
subquery. The subquery results are used internally by the main
query and are never visible to the user, so it makes little sense
to sort them anyway.
Column names appearing in a subquery may refer to columns of
tables in the main query.
In most implementations, a subquery cannot be the UNION of
several different SELECT statements; only a single SELECT is
allowed. (The SQL2 standard allows much more powerful query
expressions and relaxes this restriction
4.9.2 Correlated Queries:
In concept, SQL performs a subquery over and over again
once for each row of the main query. For many sub queries,
however, the subquery produces the same results for every row or
row group. Here is an example:
List the sales offices whose sales are below the average target.
SELECT CITY
FROM OFFICES
WHERE SALES < (SELECT AVG(TARGET)
FROM OFFICES)
CITY
------Denver
Atlanta
56
57
58
SELECT NAME
FROM SALESREPS MGRS
WHERE AGE > 40
AND MGRS.EMPL_NUM IN (SELECT MANAGER
FROM SALESREPS EMPS
WHERE EMPS.QUOTA > EMPS.SALES
AND EMPS.REP_OFFICE <>
MGRS.REP_OFFICE)
NAME
----------Sam Clark
Larry Fitch
The copy of the SALESREPS table used in the main query
now has the tag MGRS, and the copy in the subquery has the tag
EMPS. The subquery contains one additional search condition,
requiring that the employee's office number does not match that of
the manager. The qualified column name MGRS.OFFICE in the
subquery is an outer reference, and this subquery is a correlated
subquery.
59
60
routines are known only to the pre compiler and the DBMS; they
are not a public interface to the DBMS. The second file is a copy of
all the embedded SQL statements used in the program. This file is
sometimes called a database request module, or DBRM.
3. The source file output from the pre compiler is submitted to the
standard compiler for the host programming language (such as a C
or COBOL compiler). The compiler processes the source code and
produces object code as its output. Note that this step has nothing
in particular to do with the DBMS or with SQL.
4. The linker accepts the object modules generated by the
compiler, links them with
various library routines, and produces
an executable program. The library routines linked into the
executable program include the "private" DBMS routines described
in Step 2.
5. The database request module generated by the pre compiler is
submitted to a special BIND program. This program examines the
SQL statements, parses, validates, and optimizes them, and
produces an application plan for each statement. The result is a
combined application plan for the entire program, representing a
DBMS-executable version of its embedded SQL statements. The
BIND program stores the plan in the database, usually assigning it
the name of the application program that created it.
The program development steps in Figure correlate with the
DBMS statement processing steps in Figure. In particular, the pre
compiler usually handles statement parsing (the first step), and the
BIND utility handles verification, optimization, and plan generation
(the second, third, and fourth steps). Thus the first four steps of
Figure, all take place at compile time when you use embedded
SQL. Only the fifth step, the actual execution of the application
plan, remains to be done at run-time.
The embedded SQL development process turns the original
embedded SQL source program into two executable parts:
An executable program, stored in a file on the computer in the
same format as any executable program
An executable application plan, stored within the database in the
format expected by the DBMS the embedded SQL development
cycle may seem cumbersome, and it is more awkward than
developing a standard C or COBOL program. In most cases, all of
the steps in Figure are automated by a single command procedure,
so the individual steps are made invisible to the application
programmer. The process does have several major advantages
from a DBMS point of view:
61
62
4.12 TRIGGERS
The concept of a trigger is relatively straightforward. For any
event that causes a change in the contents of a table, a user can
specify an associated action that the DBMS should carry out. The
three events that can trigger an action are attempts to INSERT,
DELETE, or UPDATE rows of the table. The action triggered by an
event is specified by a sequence of SQL statements.
To understand how a trigger works, let's examine a concrete
example. When a new order is added to the ORDERS table, these
two changes to the database should also take place:
The SALES column for the salesperson who took the order
should be increased by the amount of the order.
The QTY_ON_HAND amount for the product being ordered
should be decreased by the quantity ordered.
This Transact-SQL statement defines a SQL Server trigger,
named NEWORDER that causes these database updates to
happen automatically:
CREATE TRIGGER NEWORDER
ON ORDERS
FOR INSERT
AS UPDATE SALESREPS
SET SALES = SALES + INSERTED.AMOUNT
FROM SALESREPS, INSERTED
WHERE SALESREPS.EMPL_NUM = INSERTED.REP
UPDATE PRODUCTS
63
SET QTY_ON_HAND = QTY_ON_HAND - INSERTED.QTY
FROM PRODUCTS, INSERTED
WHERE PRODUCTS.MFR_ID = INSERTED.MFR
AND PRODUCTS.PRODUCT_ID = INSERTED.PRODUCT
The first part of the trigger definition tells SQL Server that the
trigger is to be invoked whenever an INSERT statement is
attempted on the ORDERS table. The remainder of the definition
(after the keyword AS) defines the action of the trigger. In this case,
the action is a sequence of two UPDATE statements, one for the
SALESREPS table and one for the PRODUCTS table. The row
being inserted is referred to using the pseudo-table name inserted
within the UPDATE statements. As the example shows, SQL
Server extends the SQL language substantially to support triggers.
Other extensions not shown here include IF/THEN/ELSE tests,
looping, procedure calls, and even PRINT statements that display
user messages.
The trigger capability, while popular in many DBMS
products, is not a part of the ANSI/ISO SQL2 standard. As with
other SQL features whose popularity has preceded standardization,
this has led to a considerable divergence in trigger support across
various DBMS brands. Some of the differences between brands are
merely differences in syntax. Others reflect real differences in the
underlying capability.
DB2's trigger support provides an instructive example of the
differences. Here is the same trigger definition shown previously for
SQL Server, this time using the DB2 syntax:
CREATE TRIGGER NEWORDER
AFTER INSERT ON ORDERS
REFERENCING NEW AS NEW_ORD
FOR EACH ROW MODE DB2SQL
BEGIN ATOMIC
UPDATE SALESREPS
SET SALES = SALES + NEW_ORD.AMOUNT
WHERE SALESREPS.EMPL_NUM = NEW_ORD.REP;
UPDATE PRODUCTS
SET
QTY_ON_HAND
=
QTY_ON_HAND
NEW_ORD.QTY
WHERE PRODUCTS.MFR_ID = NEW_ORD.MFR
AND
PRODUCTS.PRODUCT_ID
=
NEW_ORD.PRODUCT;
END
The beginning of the trigger definition includes the same
elements as the SQL Server definition, but rearranges them. It
explicitly tells DB2 that the trigger is to be invoked AFTER a new
order is inserted into the database. DB2 also allows you to specify
64
65
66
5
DATABASE APPLICATION
DEVELOPMENT
Topics covered
5.1 Accessing Databases From Applications
5.2 Cursors
5.3 JDBC Driver Management
5.4 Executing SQL Statements
5.5 ResultSets
67
5.2 CURSORS
A major problem in embedding SQL statements in a host
language like C is that an impedance mismatch occurs because
SQL operates on set" of records, whereas languages like C do not
cleanly support a set-of-records abstraction. The solution is to
essentially provide a mechanism that allows us to retrieve rows one
at a time from a relation. This mechanism is called a cursor. We
can declare a cursor on any relation or on any SQL query (because
68
69
70
71
72
5.5 RESULTSETS
As discussed in the previous section, the statement
executeQuery returns a ResultSet object, which is similar to a
cursor. ResultSet cursors in JDBC 2.0 are very powerful; they allow
forward and reverse scrolling and in-place editing and insertions.
In its most basic form, the ResultSet object allows us to read
one row of the output of the query at a time. Initially, the ResultSet
is positioned before the first row, and we have to retrieve the first
row with an explicit call to the next() method. The next method
returns false if there are no more rows in the query answer, and
73
74
6
OVERVIEW OF STORAGE AND INDEXING
Topics covered
6.1 Storage Hierarchies
6.2 Tree structured indexing and Hash Based indexing
75
76
77
78
The lowest level of the tree, called the leaf level, contains the
data entries; in our example, these are employee records. To
illustrate the ideas better, we have drawn the Figure as if there
were additional employee records, some with age less than 22 and
some with age greater than EiO. Additional records with age less
than 22 would appear in leaf pages to the left page L1 and records
with age greater than 50 would appear in leaf pages to the right of
page L3.
79
80
81
Differences
have
important
consequences
for
utility/performance of query processing
Several kinds of integrity constraints can be expressed in the
ER model: key constraints, participation constraints, and overlap
/covering constraints for ISA hierarchies. Some foreign key
constraints are also implicit in the definition of a relationship set.
82
7
QUERY EVALUATION OVERVIEW
Topics covered
7.1 Overview of Query optimization
7.2 Relational optimization
83
84
85
86
8
SCHEMA REFNEENT AND NORMAL
FORMS
Topics covered
8.1 Functional Dependencies
8.2 Second Normal Form
8.3 Third Normal Form
8.4 Fourth Normal Form
8.6 Fifth Normal Form
8.7 BCNF
8.8 Comparison of 3NF and BCNF
8.9 Lossless and dependency preserving decomposition
8.10 Closure of Dependencies
8.11 Minimal Closure (Cover)
87
Tr. ID Date
Amount
12890 14-Oct-2003 -87
12904 15-Oct-2003 -50
Wilkins
Tr. ID Date
Amount
12898 14-Oct-2003 -21
Stevens
Tr. ID Date
Amount
12907 15-Oct-2003 -18
14920 20-Nov-2003 -70
15003 27-Nov-2003 -60
88
1. Unpacking one or more customers' groups of transactions
allowing the individual transactions in a group to be
examined, and
2. Deriving a query result based on the results of the first stage
89
90
Employees' Skills
Employee Skill
Jones
Typing
Jones
Shorthand
Jones
Whittling
Light
Bravo
Cleaning
Ellis
Alchemy
Ellis
Flying
Light
Harrison
Cleaning
Current
Employee Work
Location
114 Main
Jones
Street
73
Bravo
Industrial
Way
73
Ellis
Industrial
Way
73
Harrison
Industrial Way
91
Tournament Winners
Tournament
Year Winner
Winner Date of Birth
Indiana Invitational 1998 Al Fredrickson 21 July 1975
Cleveland Open
1999 Bob Albertson 28 September 1968
Des Moines Masters 1999 Al Fredrickson 21 July 1975
Indiana Invitational 1999 Chip Masterson 14 March 1977
92
Tournament Winners
Tournament Year Winner
Indiana
1998 Al Fredrickson
Invitational
Cleveland
1999 Bob Albertson
Open
Des Moines
1999 Al Fredrickson
Masters
Indiana
Chip
1999
Invitational
Masterson
Date of Birth
Chip
Masterson
14 March 1977
28 September
1968
93
94
Varieties By Restaurant
Pizza
Restaurant
Variety
A1 Pizza
Thick Crust
Stuffed
A1 Pizza
Crust
Elite Pizza Thin Crust
Stuffed
Elite Pizza
Crust
Vincenzo's
Thick Crust
Pizza
Vincenzo's
Thin Crust
Pizza
Delivery Areas By
Restaurant
Delivery
Restaurant
Area
A1 Pizza
Springfield
A1 Pizza
Shelbyville
Capital
A1 Pizza
City
Capital
Elite Pizza
City
Vincenzo's
Springfield
Pizza
Vincenzo's
Shelbyville
Pizza
95
Brands
By
Travelling Salesman
Travelling
Brand
Salesman
Jack
Acme
Schneider
Willy
Robusto
Loman
Louis
Robusto
Ferguson
Louis
Acme
Ferguson
Louis
Nimbus
Ferguson
Product Types By
Brand
Product
Brand
Type
Vacuum
Acme
Cleaner
Acme Breadbox
Lava
Acme
Lamp
Pruning
Robusto
Shears
Vacuum
Robusto
Cleaner
Robusto Breadbox
Umbrella
Robusto
Stand
Robusto Telescope
Nimbus Tie Rack
96
8.6 BCNF
Boyce-Codd normal form (or BCNF or 3.5NF) is a normal
form used in database normalization. It is a slightly stronger version
of the third normal form (3NF). A table is in Boyce-Codd normal
form if and only if for every one of its non-trivial [dependencies] X
Y, X is a superkeythat is, X is either a candidate key or a
superset thereof.
Only in rare cases does a 3NF table not meet the
requirements of BCNF. A 3NF table which does not have multiple
overlapping candidate keys is guaranteed to be in BCNF.[4]
Depending on what its functional dependencies are, a 3NF table
with two or more overlapping candidate keys may or may not be in
BCNF.
An example of a 3NF table that does not meet BCNF is:
Today's Court Bookings
A booking is defined by its Court and the period for which the
Court is reserved
97
The candidate keys for the Rate Types table are {Rate Type}
and {Court, Member Flag}; the candidate keys for the Today's
Bookings table are {Court, Start Time} and {Court, End Time}. Both
tables are in BCNF. Having one Rate Type associated with two
different Courts is now impossible, so the anomaly affecting the
original table has been eliminated.
98
99
always holds.
100
101
102
9
TRANSACTION PROCESSING
Topics covered
9.1 Transaction Concurrency Control
9.2 Recovery of Transaction Failure
9.3 Serializability
9.4 LOG based recovery
9.5 Locking Techniques
9.6 Granularity in locks
9.7 Time Stamping techniques
9.8 Two phase locking system
9.9 Deadlock handling
103
104
105
9.3 SERIALIZABILITY
In concurrency control of databases, transaction processing
(transaction management), and various transactional applications,
both centralized and distributed, a transaction schedule is
serializable, has the Serializability property, if its outcome (the
resulting database state, the values of the database's data) is equal
to the outcome of its transactions executed serially, i.e.,
sequentially without overlapping in time. Transactions are normally
executed concurrently (they overlap), since this is the most efficient
way. Serializability is the major correctness criterion for concurrent
transactions' executions. It is considered the highest level of
isolation between transactions, and plays an essential role in
concurrency control. As such it is supported in all general purpose
database systems.
The rationale behind serializability is the following:
If each transaction is correct by itself, i.e., meets certain
integrity conditions, then a schedule that comprises any serial
execution of these transactions is correct (its transactions still meet
their conditions): "Serial" means that transactions do not overlap in
time and cannot interfere with each other, i.e., complete isolation
between each other exists. Any order of the transactions is
legitimate, if no dependencies among them exist, which is assumed
(see comment below). As a result, a schedule that comprises any
execution (not necessarily serial) that is equivalent (in its outcome)
to any serial execution of these transactions, is correct.
Schedules that are not serializable are likely to generate
erroneous outcomes. Well known examples are with transactions
that debit and credit accounts with money: If the related schedules
are not serializable, then the total sum of money may not be
preserved. Money could disappear, or be generated from nowhere.
This and violations of possibly needed other invariant preservations
are caused by one transaction writing, and "stepping on" and
erasing what has been written by another transaction before it has
become permanent in the database. It does not happen if
serializability is maintained.
106
107
also acquire a shared lock on the same data, allowing the other
transaction to also read the data.
An exclusive lock is used by the DBMS when a transaction wants
to update data in the database. When a transaction has an
exclusive lock on some data, other transactions cannot acquire any
type of lock (shared or exclusive) on the data.
The locking technique temporarily gives a transaction
exclusive access to a piece of a database, preventing other
transactions from modifying the locked data. Locking thus solves all
of the concurrent transaction problems. It prevents lost updates,
uncommitted data, and inconsistent data from corrupting the
database. However, locking introduces a new problemit may
cause a transaction to wait for a long time while the pieces of the
database that it wants to access are locked by other transactions.
9.5.2 Locking parameters
Typical parameters are as follows:
Lock size. Some DBMS products offer a choice of table-level,
page-level, row-level, and other lock sizes. Depending on the
specific application, a different size lock may be appropriate.
Number of locks. A DBMS typically allows each transaction to
have some finite number of locks. The database administrator can
often set this limit, raising it to permit more complex transactions or
lowering it to encourage earlier lock escalation.
Lock escalation. A DBMS will often automatically "escalate"
locks, replacing many small locks with a single larger lock (for
example, replacing many page-level locks with a table-level lock).
The database administrator may have some control over this
escalation process.
Lock timeout. Even when a transaction is not deadlocked with
another transaction, it may wait a very long time for the other
transaction to release its locks. Some DBMS brands implement a
timeout feature, where a SQL statement fails with a SQL error code
if it cannot obtain the locks it needs within a certain period of time.
The timeout period can usually be set by the database
administrator.
108
109
on variable-length pieces of the database (in other words,
rows) rather than fixed-size pages is a much more complex
task, so increased parallelism comes at the cost of more
sophisticated locking logic and increased overhead.
110
given by the timestamp. To prove this (see diagram) the hash of the
original data is calculated, the timestamp given by the TSA is
appended to it and the hash of the result of this concatenation is
calculated, call this hash A.
Then the digital signature of the TSA needs to be validated.
This can be done by checking that the signed hash provided by the
TSA was indeed signed with their private key by digital signature
verification. The hash A is compared with the hash B inside the
signed TSA message to confirm they are equal, proving that the
timestamp and message is unaltered and was issued by the TSA. If
not, then either the timestamp was altered or the timestamp was
not issued by the TSA.
111
112
already
holding
113
satisfy and, in any case, is an inefficient use of resources.
Another way is to require processes to release all their
resources before requesting all the resources they will need.
This too is often impractical. (Such algorithms, such as
serializing tokens, are known as the all-or-none algorithms.)
114
Wait/Die
O waits
Y dies
Wound/Wait
Y dies
Y waits
115
10
SECURITY AND AUTHORIZATION
Topics covered
10.1 GRANTING PRIVILEGES: [GRANT STATEMENT]
10.2 REVOKING PREVILEGES [REVOKE STATEMENT]
10.3 PASSING PRIVILEGES: - (Using Grant option)
Implementing a security scheme and enforcing security
restrictions are the responsibilities of the dbms software.
The actions that a user is allowed permitted to carry out for a
given database object (i.e. forms, application programs, tables or
entire database) are called privilege. Users may have permission to
insert and select a row in a certain table but may lack permission to
delete or update rows of that table.
To establish a security scheme on a database, you use the
SQL GRANT and REVOKE statements.
116
Goals of Lecture
Provide very brief overview of certain terms and
concepts that may be used throughout the day
Begin our ascent up the tower of Babel of Informatics
CPUs
Serves as the basic computation engine (brain) for
the machine
Intel and AMD make processors used in most
healthcare applications
Many machines now have multi-core, meaning a
single chip contains several individual CPUs
More cores != faster performance unless underlying
programs can work in parallel
GPU
Clinical Informatics Academy
Networking
Computers are now networked together to allow
sharing of resources (printers/disks/etc)
Wired vs wireless
Networks can span different scopes: home office
department University (intranet) the world
(Internet)
Amount of information that can be transmitted
(bandwidth) can vary dramatically
Slower/congested networks = longer times to load
files particularly noticeable when transferring
imaging data (e.g. radiology)
vs
vs
Operating Systems
Software framework that manages/controls basic
operations on a given CPU allowing communication
between users and underlying hardware
Examples: Windows 7, Mac OSX, Unix/Linux and
derivatives
Programs written for a given OS generally can only
be run on that platform
Linux/Unix is sometimes used for specific high-end
uses (like Radiology workstation)
DISK Storage
Serve as main storage for
files/programs/pictures/images/etc
Much slower than memory
New FLASH drives use non-volatile RAM similar to
whats used in a camera and can be used to store
frequently used data and allow quicker access than
conventional spinning disks
Network
General infrastructure that allows computers to
send information to and from each other
Can have different scopes/purposes
Bluetooth network: Short range communication
Intranet:
Firewalls
A firewall is a device or set of devices designed to
permit or deny network transmissions based upon a set
of rules and is frequently used to protect networks from
unauthorized access while permitting legitimate
communications to pass
Can be lax to very restrictive (block access to the entire
web)
Mandatory in clinical settings to protect patient data
Can allow access to certain resources
only at specific locations
Virtualization/Virtual Machines
Separates the applications/operating system from the
underlying hardware and creates a virtual copy
This virtual machine can be transferred to any
computer/hardware that can host the image in case of
hardware failure
Copies/snapshots can be made of the image to
facilitate backup/rollbacks/testing
Allows pooling of resources a single machine can
host several virtual hosts
Performance of a virtual machine is no longer
significantly slower than a real machine for many
applications
Relatively inexpensive machines can be used as a
thin client to access a VM
Examples:
Clinical Informatics Academy
Application at Emory
Emory uses a CITRIX based virtual desktop for
many/most clinical programs
This common framework greatly simplifies
administration/backup/security
Installation of programs is also simplified for IT as a
VM can be copied and deployed
Can access same files/applications from home (if in
the firewall), at Emory Clinic, at the Hospital, etc
Has many advantages in certain scenarios, although
can prevent challenges in research environments
Severely limits ability for clinicians/staff to
install/modify programs
The Cloud
With the rapid advancement of virtualization
technology and fast networks, no need to run virtual
machines locally
Many commodity calculations / services can be
outsourced to online service providers (Amazon S3,
Godaddy, Gmail, Dropbox, etc )
Specific machine/hardware an app runs on is
controlled dynamically and can be migrated
automatically in case of hardware failure at the
hosting provider**
Commodity model of software
+ hardware/pay as you go
Scripts/Programming
Script/Macro A program (set of commands) that
performs relatively simple action automatically
For example can open a list of files/documents,
looking for the word diabetes and hypertension
and generate co-occurrence statistics vs making a
medical student or resident scan through documents
manually
Or
85.114.135.121 - - [16/May/2011:08:44:09 -0400] "GET //admin/pma/scripts/setup.php HTTP/1.1" 404 312 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98)"
85.114.135.121 - - [16/May/2011:08:44:10 -0400] "GET //admin/phpmyadmin/scripts/setup.php HTTP/1.1" 404 319 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows
85.114.135.121 - - [16/May/2011:08:44:10 -0400] "GET //db/scripts/setup.php HTTP/1.1" 404 305 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98)"
85.114.135.121 - - [16/May/2011:08:44:10 -0400] "GET //dbadmin/scripts/setup.php HTTP/1.1" 404 310 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98)"
85.114.135.121 - - [16/May/2011:08:44:10 -0400] "GET //myadmin/scripts/setup.php HTTP/1.1" 404 310 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98)"
85.114.135.121 - - [16/May/2011:08:44:10 -0400] "GET //mysql/scripts/setup.php HTTP/1.1" 404 308 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98)"
85.114.135.121 - - [16/May/2011:08:44:11 -0400] "GET //mysqladmin/scripts/setup.php HTTP/1.1" 403 317 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98)"
85.114.135.121 - - [16/May/2011:08:44:11 -0400] "GET //typo3/phpmyadmin/scripts/setup.php HTTP/1.1" 404 319 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 9
85.114.135.121 - - [16/May/2011:08:44:11 -0400] "GET //phpadmin/scripts/setup.php HTTP/1.1" 404 311 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98)"
85.114.135.121 - - [16/May/2011:08:44:11 -0400] "GET //phpMyAdmin/scripts/setup.php HTTP/1.1" 403 317 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98)"
85.114.135.121 - - [16/May/2011:08:44:12 -0400] "GET //phpmyadmin/scripts/setup.php HTTP/1.1" 403 317 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98)"
85.114.135.121 - - [16/May/2011:08:44:12 -0400] "GET //phpmyadmin1/scripts/setup.php HTTP/1.1" 404 314 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98)"
85.114.135.121 - - [16/May/2011:08:44:12 -0400] "GET //phpmyadmin2/scripts/setup.php HTTP/1.1" 404 314 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98)"
85.114.135.121 - - [16/May/2011:08:44:12 -0400] "GET //pma/scripts/setup.php HTTP/1.1" 404 306 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98)"
85.114.135.121 - - [16/May/2011:08:44:12 -0400] "GET //web/phpMyAdmin/scripts/setup.php HTTP/1.1" 404 317 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98
85.114.135.121 - - [16/May/2011:08:44:13 -0400] "GET //xampp/phpmyadmin/scripts/setup.php HTTP/1.1" 404 319 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows
85.114.135.121 - - [16/May/2011:08:44:13 -0400] "GET //web/scripts/setup.php HTTP/1.1" 404 306 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98)"
85.114.135.121 - - [16/May/2011:08:44:13 -0400] "GET //php-my-admin/scripts/setup.php HTTP/1.1" 404 315 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98)"
85.114.135.121 - - [16/May/2011:08:44:13 -0400] "GET //websql/scripts/setup.php HTTP/1.1" 404 309 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98)"
85.114.135.121 - - [16/May/2011:08:44:13 -0400] "GET //phpmyadmin/scripts/setup.php HTTP/1.1" 403 317 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98)"
85.114.135.121 - - [16/May/2011:08:44:14 -0400] "GET //phpMyAdmin/scripts/setup.php HTTP/1.1" 403 317 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98)"
85.114.135.121 - - [16/May/2011:08:44:14 -0400] "GET //phpMyAdmin-2/scripts/setup.php HTTP/1.1" 404 315 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98)"
85.114.135.121 - - [16/May/2011:08:44:14 -0400] "GET //php-my-admin/scripts/setup.php HTTP/1.1" 404 315 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98)"
85.114.135.121 - - [16/May/2011:08:44:14 -0400] "GET //phpMyAdmin-2.2.3/scripts/setup.php HTTP/1.1" 404 319 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 9
Fusheng Wang
Center for Comprehensive Informatics
Emory University
Why Databases?
Data can be stored using multiple methods such as
text files, comma delimited data files, spreadsheets,
databases
Benefits of using a database:
A standard interface for accessing data
Multiple users could simultaneously insert, update and
delete data
Data could be changed without risk of losing data and its
consistency
Efficiently handle huge volumes of data
Tools for data backup, restore and recovery
Security
Reduce redundancy
Data independence
Data Model
Define how data is to be represented, structured
linked, and constrained
Independent of specific implementations and protocols
Relational model
describes data as a collection of relations
Focuses on providing better data independence
Implemented by most DBMS in the market
ER Model
Clinical Informatics Academy
1
Patient
ID
name
N
has
age
Observation
concept_code
name
value
unit
SQL (2)
Data Definition Language (DDL), defines properties
of data objects. e.g. creation of a table:
CREATE TABLE OBSERVATION_FACT (
EONCOUNTER_NO INTEGER NOT NULL,
PATIENT_ID
INTEGER,
AGE
INTEGER,
CONCEPT_CODE VARCHAR(50),
NAME
VARCHAR(50),
VALUE
VARCHAR(50),
PRIMARY KEY(ENCOUNTER_NO, CONCEPT_CODE) );
Access of Databases
Database
Server
JDBC
ODBC
OLEDB
Application/
Web Server
HTTP
HTTPS
Three-Tier
JDBC
ODBC
OLEDB
Two-Tier
Specialized DBMSs
Special data models/data types/queries:
XML DBMS: manage XML data directly in XML model
and query language
e.g.: DB2 pureXML, Oracle XML DB
XML Schema
UML Model
Data Analysis
Applications
(MATLAB, SAS)
Loading Manager
Image
Analysis
Algorithms
Data Mapping
Analytical
Workflow
ZIP
Quality Control
PAIS
Document
Generator
Database Schema
Parallel Database
Data Staging
Image
Viewer
Application
Server
caGrid
Service
Pathology
Image
Database
Image Data
Management
Questions?
Data Communication
& Networking Questions
By www.questionpaperz.in
Security / Encapsulation
Distributed database
Faster problem solving
Security through redundancy
Collaborative processing
10. What are the three criteria necessary for an effective and efficient network?
1. Performance
2. Reliability
3. Security
11. Name the factors that affect the performance of a network
-performance of a network depends on a number of factors,
1.
2.
3.
4.
Number of users
Type of transmission medium
Capabilities of the connected hardware
Efficiency of software.
Syntax: refers to the structure or format of the data, meaning the order in which they
are presented.
Semantics: refers to the meaning of each section of bits.
1. Timing: refers to two characteristics.
2. When data should be sent and
3. How fast they can be sent.
Mesh
Star
Tree
Bus
Ring
Simplex
Half duplex
Full duplex.
When two or more networks are connected they become an internetwork or internet.
The most notable internet is called the Internet.
Physical
Data Link
Network
Transport
Session
Presentation
Application.
Physical
Data link
Network layers.
Session
Presentation
Application.
33. What are the responsibilities of physical layer, data link layer, network layer,
transport layer, session layer, presentation layer, application layer.
a. Physical layer Responsible for transmitting individual bits from one node to the
next.
b. Data link layer Responsible for transmitting frames from one node to the next.
c. Network layer Responsible for the delivery of packets from the original source
to the final destination.
d. Transport layer Responsible for delivery of a message from one process to
another.
e. Session layer To establish, manage and terminate sessions.
45. What is the purpose of cladding in an optical fiber? Discuss its density relative to
the core.
A glass or plastic is surrounded by a cladding of less dense glass or plastic.
The difference in density of the two materials must be such that a beam of light
moving through the core is reflected off the cladding instead of being refracted into it.
46. Name the advantage of optical fiber over twisted pair and coaxial cable.
Higher bandwidth.
Less signal attenuation.
Immunity to electromagnetic interference.
Resistance to corrosive materials.
More immune to tapping.
Light weight.
63. How can the parity bit detect a damaged data unit?
In parity check, (a redundant bit) a parity bit is added to every data unit so that the total
number of 1s is even for even parity checking function (or odd for odd parity).
64. How can we use the Hamming code to correct a burst error?
By rearranging the order of bit transmission of the data units, the Hamming code can
correct burst errors.
65. Briefly discuss Stop and Wait method of flow control?
In Stop and Wait of flow control, the sender sends one frame and waits for an
acknowledgement before sending the next frame.
66. In the Hamming code for a data unit of m bits how do you compute the number of
redundant bits r needed?
In the Hamming code, for a data unit of m bits, use the formula 2r > = m + r + 1 to
determine r, the number of redundant bits needed.
67. What are three popular ARQ mechanisms?
-
Source Routing bridge - Source Routing bridge requires the entire routing table to be
included in the transmission and do not route packet intelligently.
95.
96.
97.
98.
99.
100. Identify the class and default subnet mask of the IP address 217.65.10.7.
It belongs to class C.
Default subnet mask 255.255.255.192
101. What are the fields present in IP address?
Netid and Hostid.
Netid portion of the ip address that identifies the network.
Hostid portion of the ip address that identifies the host or router on the networks.
102. What is flow control?
How to keep a fast sender from swamping a slow receiver with data is called flow
control.
2. The TCP sliding window operates at the byte level rather than the packet (or
segment) level. The left and right window edges are byte pointers.
3. Segment boundaries may change at any time. TCP is free to retransmit two adjacent
segments each containing 200 bytes of data as a single segment of 400 byte.
4. The size of the send and receive window change dynamically.
112. Explain how the TCP provides the reliability?
A number of mechanisms provide the reliability.
1. Checksum
2. Duplicate data detection
3. Retransmission
4. Sequencing
5. Timers
113. What is a datagram socket?
A structure designed to be used with connectionless protocols such as UDP.
114. What is congestion?
When load on network is greater than its capacity, there is congestion of data packets.
Congestion occurs because routers and switches have queues or buffers.
115. Define the term Jitter.
Jitter is the variation in delay for packets belonging to the same flow.
5) Any data or instruction entered into the memory of a computer is considered as storage
7) A series of instructions that tells a computer what to do and how to do it is called a program
8) Hardware is the part of a computer that one can touch and feel .
9) The role of a computer sales representative generally is to determine a buyers needs and match it to
the correct hardware and software.
10) Supercomputers refers to the fastest, biggest and most expensive computers
12) The rectangular area of the screen that displays a program, data, and or information is a window
14) Disk drive is the part of the computer helps to store information
18) A collection of related information sorted and dealt with as a unit is a file
22) Plotter, printer, monitor are the group consists of output devices
24) The most important or powerful computer in a typical network is network server
26) The ability to find an individual item in a file immediately direct access is used.
27) To make a notebook act as a desktop model, the notebook can be connected to a docking station
which is connected to a monitor and other devices
28) You can use the tab key to move a cursor across the screen, indent a paragraph.
30) Storage that retains its data after the power is turned off is referred to as non-volatile storage.
33) A syntax contains specific rules and words that express the logical steps of an algorithm.
35) Virtual memory is memory on the hard disk that the CPU uses as an extended RAM.
36) Computers use the binary number system to store data and perform calculations.
39) When sending an e-mail, the subject lines describe the contents of the message.
40) Tables, paragraphs and indexes work with when formatting text in word.
42) The operating system tells the computer how to use its components.
43) When cutting and pasting, the item cut is temporarily stored in clipboard.
44) The blinking symbol on the computer screen is called the cursor.
45) Magnetic tape is not practical for applications where data must be quickly recalled because tape is a
sequential because tape is a sequential access medium.
46) Rows and columns are used to organize data in a spread sheet.
47) When you are working on documentation on PC, the document temporarily stored in flash memory.
51) Computer connected to a LAN can share information and or share peripheral equipment
53) Utilities can handle most system functions that arent handled directly by the operating system
54) If you receive an e-mail from someone you dont know then you should delete it without opening it
57) A collection of programs that controls how your computer system runs and processes information is
called operating system.
62) To indent the first paragraph of your report, you should use tab key
64) A website address is a unique name that identifies a specific web site on the web
66) A set of computer programs used for a certain function such as word processing is the best
definition of a software package
68) A blinking symbol on the screen that shows where the next character will appear is a cursor
69) Highlight and delete is used to remove a paragraph from a report you had written
74) Microcomputer hardware consists of three basic categories of physical equipment system unit,
input/output, memory
76) A tool bar contains buttons and menus that provide quick access to commonly used commands
77) For creating a document, you use new command at file menu
79) A programming language contains specific rules and words that express the logical steps of an
algorithm
80) One advantage of dial-up internet access is it utilizes existing telephone security
82) Network components are connected to the same cable in the star topology
83) Two or more computers connected to each other for sharing information form a network
84) A compute checks the database of user name and passwords for a match before granting access
85) Computers that are portable and convenient for users who travel are known as laptops
88) Each cell in a Microsoft office excel document is referred to by its cell address, which is the cells row
and column labels
90) Office LANs that are spread geographically apart on a large scale can be connected using a corporate
WAN
91) Storage is the process of copying software programs from secondary storage media to the hard disk
92) The code for a web page is written using Hyper Text Markup Language
93) Small application programs that run on a Web page and may ensure a form is completed properly or
provide animation are known as flash
94) In a relational database, table is a data structure that organizes the information about a single topic
into rows and columns
97) Booting process checks to ensure the components of the computer are operating and connected
properly
99) Special effect used to introduce slides in a presentation are called animation
100) Computers send and receive data in the form of digital signals
101) Most World Wide Web pages contain HTML commands in the language
102) Icons are graphical objects used to represent commonly used application
104) In any window, the maximize button, the minimize button and the close buttons appear on the title
bar
107) Checking that a pin code number is valid before it is entered into the system is an example of data
validation
108) A compiler translates higher level programs into a machine language program, which is called
object code
109) The ability to find an individual item in a file immediately direct access
110) Computers connected to a LAN can share information and/or share peripheral equipment
112) The two major categories of software include system and application
113) Windows 95, Windows 98 and Windows NT are known as operating systems
115) A spread sheet that works like a calculator for keeping track of money and making budgets
116) To take information from one source and bring it to your computer is referred to as download
118) Network components are connected to the same cable in the bus topology
119) Two or more computers connected to each other for sharing information form a network
120) A computer checks the database of user names and passwords for a match before granting access.
123) Each cell in a Microsoft Office Excel document is referred to by its cell address, which is the cells
row and column labels
124) Download is the process of copying software programs from secondary storage media to the hard
disk
125) The code for a web page is written using Hypertext Markup Language
126) Small application programs that run on a web page and may ensure a form is completed properly
or provide animation are known as Flash
130) Control key is used in combination with another key to perform a specific task
131) Scanner will translate images of text, drawings and photos into digital form
133) Something which has easily understood instructions is said to be user friendly
135) For creating a document, you use new command at file menu
136) The programs and data kept in main memory while the processor is using them
139) A Website address is a unique name that identifies a specific website on the web
140) Answer sheets in bank POs/Clerks examinations are checked by using Optical Mark Reader
141) Electronic data exchange provides strategic and operational business opportunity
154) IP address can change even if the domain name remains same
156) With the help of Control + Del a letter can be erased in a word
182) Controlling is not required for high level language programs before it is executed
183) 3 out of three rollers are responsible for the movement of cursor on screen
187) A data communication system requires terminal device, communication channel, protocols
190) A five-digit card attribute used for postal ZIP codes it will be restored as a numeric data
193) The smallest space where information on a hard disk is kept in a cluster
202) Disk can be used to store sequential files and random files
204) When taking the output information is produced in hardcopy and/or softcopy form
206) The most powerful type of computer amongst the following is supercomputer
210) A processor is an electronic device that processes data, converting it into information
211) Control words are words that a programming language has set aside for its own use
212) Monitor and printer are the two types of output devices
214) An operating system is a program that makes the computer easier to use
215) Connections to the internet using a phone line and a modem are called dial-up connections
217) A flaw in a program that causes it to produce incorrect or inappropriate results is called a bug
218) A web site address is a unique name that identifies a specific web site on the web
220) To make the number pad act as directional arrows, you press the num lock key
223) A computer program is a set of keywords, symbols, and a system of rules for constructing
statements by which humans can communicate the instructions to be executed by a computer
228) The secret code that restricts entry to some programs is password
229) The basic goal of computer process is to convert data into information
232) The name that the user gives to a document is referred to as file name
234) E-mail is the transmission of messages and files via a computer network
235) The person who writes and tests computer programs is called a programmer
236) The information you put into the computer is called data
239) Hardware includes the computer and all the devices connected to it that are used to input and
output data
240) The most common method of entering text and numerical data into a computer system is through
the use of a keyboard
241) Mouse, keyboard, plotter are the group consist of only input devices
244) Vertical-market applications can handle most system functions that arent handled directly by the
operating system
249) If you receive an e-mail from someone you dont know, then delete it without opening it
251) A collection of programs that controls how you computer system runs and processes information is
called operating system
253) When cutting and pasting, the item cut is temporarily stored in clipboard
254) When you are working on a document on a PC, the document is temporarily stored in flash
memory
270) Bandwidth means channel capacity amount of data following via cables and measure of speed
273) Time Bomb are viruses that are triggered by the passage of time or on a certain data
275) Boot sector viruses are often transmitted by a floppy disk left in the floppy drive
276) Operating system controls the way in which the computer system functions and provides a medium
by which users can interact with the computer
277) Servers are computers that provide resources to other computers connected to a network
279) You must install router on a network if you want to share a broadband internet connection
281) Programs from the same developer, sold, bundled, together, that are provide better integration
and share common features, tool box and menus are known as software suits
282) A data ware house is one that organizes important subject areas
283) URL term identifies a specific computer on the web and the main page of the entire site
284) A proxy server is used to process client request for web pages
285) When data changes in multiple list and list are not updated, this causes data inconsistency
286) Granting an outside organization access to internet web pages is often implemented using a
extranet
287) The code that relational database management systems use to perform their database task is refer
to as SQL
289) A data base management system is a software system used to create, maintain and provide
controlled access to a database
290) The two broad categories of software are system and application
292) Data integrity means that the data contained in the database is accurate and reliable
293) A local area network is a private corporate network used exclusively by company categories
296) A characteristic of a file server is manages files operations and is shared on a network
299) The role of Blaze Pascal in the development of computer is addition and subtraction of numbers
302) The silicon based transistor started to made by Gordon Tin in 1954
309) With the help of Pal switch we can increase or decrease the speed of computers processing
318) We can format the hard disk with the help of Booting
320) The process of creating third file by mixing two files is called as mail merging
321) The figures and lines etc. made by computer is called as graphics
330) The first mechanical computer of Charles Babbage is known as punch card machine
334) Control panel is used for increasing and decreasing the speed of the cursor of mouse
335) The capacity of modern main frame digital computer is 10(to the power of -12) mbps
336) With the help of my computer we can know about the usage and availability of space in computer
337) We use both MS-Word and page maker for making resume
338) Earliest computers that would work with FORTRAN was second generation
339) Back Ups in database are maintained for to restore the lost data
354) Voicemail of GSM service provider has the personal security code for its subscribers
355) Senior manager decided about the division of work with respect to IT security
356) Encrypting file system of window XP professional operating system protects the data of a user,
even if the computer is shared between users
358) Controlling is NOT required for high level language program before it is executed
362) A switching mode power supply is used for converting raw input power to stabilize DC power
364) Validity routines control procedures can be used to ensure completeness of data
365) Less expensive than leased line networks is not a characteristic of virtual private networks (PVN)
368) Row-level security is the most basic part for database security
369) Voice recognition software can not be used for converting text into voice
370) The user account can only be created by the network administrator
372) Allocating adequate bandwidth would help her in speeding up the data transfer over net
381) A program that converts high level language to machine language is assembler
385) MP3 technology compresses a sound sequence to one-twelfth of its original size
387) If multiple programs can be executed at the same time, it is distributed operating system
388) If the operating system provides quick attention, it is real time operating system
391) COPY command in MS-DOS is used to copy one or more files in disk drive to another, copy from
one directory to another directory
394) The memory address sent from the CPU to the main memory over a set of wires is called address
bus
395) MODEM is an electronic device required the computer to connect to the INTERNET
400) The CPU in a computer comprises of Store, arithmetic and logical unit and control unit
402) UNIVA is the name of the computer which was first used for programming and playing of music
407) Disk and tape drives are commonly used as hard copy
408) When computer is connected to LAN and data is sent across it for storage/processing is online
processing
412) Holding of all data and instructions to be processed is one of the functions of storage unit
413) To select the entire row in Excel, click mouse at row heading
415) Normal view and outline view notes pane appears in power point
417) In word, Ctrl + Del combination of keys press to delete an entire word
420) In Excel, addressing mode(s) that can be used in a formula is/are only absolute and relative
421) Note page views can you use to show just the slide and its contents
423) The computer as a machine and all other physical equipment associated with it are termed as
hardware
424) Plotters are very useful in applications such as computer aided design
428) Data processing cycle consists of input cycle, output cycle and processing cycle
430) Radar chart is used to show a correlation between two data series
431) A computerized business information system includes hardware, software and data facts
433) A typical computerized business application system will have both master and transaction file
435) The purpose of the EXIT command is to get out of a condition loop
436) Employees details is a master file for the pay roll system
438) A processor needs software interrupt to obtain system services which need execution of privileged
instructions
439) A CPU has two modes- privileged and non-privileged. In order to change the mode from the
privileged to the non-privileged, a software interrupt is needed
441) The process of assigning load addressed to the various parts of the program and adjusting the code
and data in the program to reflect the assigned address is called relocation
445) Consider a machine with 64 MB physical memory and a 32-bit virtual address space. If the page size
is 4 KB, then size of the page table is 2 MB
446) Consider a virtual memory system with FIFO page replacement policy. For an arbitrary page access
pattern, increasing the number of page frames in main memory will always decrease the number of
page faults
447) Consider a scheme R(A, B, C, D) and functional dependencies A->B and C-> D. Then the
decomposition of R into R1 (AB) and R2 (CD) is dependency preserving and lossless join
450) Two friends suitably arrange 4 blocks of different colors to exchange coded information between
them. 4 bits of information is one exchanging each time
453) The 8085 microprocessor responds to the presence of an interrupt by checking the TRAP pin for
high status at the end of each instruction fetch
455) The number 1024 bytes is the complement representation of 1 Kilo byte
456) System design specifications do not include blueprint showing the layout of hardware
458) The results of arithmetic and logical operations are stored in an accumulator
459) The input device that is closely related to touch screen is the light pen
500) F2 keys of control center specified below displays data, toggles browse/edit
501) A compiler breaks the source code into a uniform stream of tokens by lexical analysis
502) The number of processes that may running at the same time in a large system can be thousands
506) A frame can include text & graphics, tables & graphics, graphics
507) All the formatting data for the paragraph is stored in the paragraph mark
510) The addressing mode(s) that can be used in a formula is/are- absolute, relative and mixed
512) The part of a machine level instruction which tells the central processor what has to be done is an
operation code
514) In order to paste text form the clipboard in the document being edited, press the Ctrl-A key
515) A program that converts a high level language program to a set of instructions that can run on a
computer is called a compiler
519) A small computer program embedded within an HTML document when a user retrieves the web
page from a web server is called an applet
521) The central host computer or file server in a star network maintains control with its connecting
devices through polling
522) C++ does not check whether the index value is within scope
523) The browser uses uniform resource locator to connect to the location or address of internet
resources
524) In the centralized computing architecture, the entire file is downloaded from the host computer to
the users computer in response to a request for data
525) An expert system enables one or more users to move and react to what their senses perceive in a
computer simulated environment
528) A router is a device that sites between your internal network and the internet and limits access into
and out of your network based on your organizations access policy
529) In C++, private, protected, and public are reserved words and are called member access specifiers
530) The integration of all kinds of media such as audio, video, voice, graphics and text into one
coherent presentation combined is called multimedia
531) The derived class can redefine the public member functions of the base class
532) A technique for searching special databases, called data warehouses, looking for related
information and patterns is called data mining
533) Like the quick sort the merge sort uses the divide and conquer technique to sort a list
534) The use of expert systems technology can greatly reduce the number of calls routed to a customer
service department
535) Building a list in the backward manner, a new node is always inserted at the beginning of the list
537) Using the optimization analysis approach, the expert system starts with a conclusion and tries to
verify that the rules, facts, and conclusion all match. If not, the expert system chooses another
conclusion
539) Root is one of the items given below is not an item of the menu bar
543) A boot strap is a small utilization computer program to start up in inactive computer
546) IBM company for the first time launched pocket computers
548) Algorithms can handle most system functions that arent handled directly by the operating system
551) A collection of programs that controls how your computer system runs and processes information
is called operating system
552) When we are working on a document on a PC the document is temporarily stored in RAM
556) Computers connected to a LAN can share information and / or share equipment
557) Magnetic tape is not practical for applications where data must be quickly recalled because tape is
a sequential access medium
558) In Late 1988 computer viruses land in India for the first time
560) In computer technology a compiler means a program, which translates source program into object
program
564) Programs which protect a disk from catching an infection are called antidotes
565) The first movie with terrific computer animation and graphics was released in 1982 is Tron
567) The word size of a microprocessor refers to the amount of information that can be stored in the
byte
569) In the IBM PC-AT, the word AT stands for advanced terminology
570) Dedicated computer means which is assigned one and only one task
571) Real time programming type of computers programming is used for aero plane ticket reservation
system
572) RAM means memory which can be both read and written to
573) Laser printer uses light beam and electro statically sensitive black powder
574) The Santa Clara Valley, California is popularly known a Silicon Valley of America because many
silicon chip manufacturing firms are located there
576) International business machine was the first company in the world to build computer for sale
578) For communications, wide area networks use special purpose telephone wires and fiber optic
cables and microwaves
581) Throughput, turnaround time, response time are measures of system performance
582) OLTP architecture can handle a limited number of dimensions whereas OLAP architecture does not
have any limit on the number of dimensions
584) Kernel is the only art of an operating system that a user cannot replace or modify
585)
Symbol signifies a magnetic disk
591) The first private internet service provider in India was Satyam infoway
592) The maximum and minimum unsigned number which can be stored in a 8 bit word is 0 and 255
596) Storage capacity of a disk system depends upon number of recording surfaces and number of
sectors per track
597) Abstraction is associated with object oriented technology and database technology
598) The terms opcode and operand are associated with any high level language
600) The term CHIP, JEWELLARY means a processor with high capacity
603) Time sharing is a mechanism to provide spontaneous interactive use of a computer system by
many users in such a way that each user is given the impression that he/she has his/her own computer
604) The typical scheme of memory management used in IBMOS/360 mainframe system was that of
multiprogramming with variable number of memory partitions
605) The concepts used for realization of virtual memory are swapping, demand paging and In-line
secondary storage
608) The scope of an identifier refers to where in the program an identifier is accessible
611) A recursive function executes more efficiently than its iterative counterpart
612) The body of the recursive function contains a statement that causes the same function to execute
before completing the last call
613) Variables that are created during program execution are called dynamic variables
614) When destroying a list, we need a delete pointer to deallocate the memory
615) The first character in the ASCII character set is the null character, which is nonprintable
616) A variable for which memory is allocated at block entry and deallocated at block exit is called a
static variable
618) The ability to create new objects from existing objects is known as inheritance
619) Software tools that provide automated support for the systems development process are OLAP
tools
620) Applications/Web server tier processes HTTP protocol, scripting tasks, performs calculations, and
provides access to data
621) A language used to describe the syntax rules is known as meta language
623) The general syntax of the function prototype of a value returning function is function name
(parameter list)
624) Competitive intelligence is the process of gathering enough of the right information in a timely
manner and usable form and analyzing it so that it can have a positive impact
627) The term used as a measurement of a communication channels data capacity is bandwidth
628) In addition to the nature of the problem, the other key factor in determining the best solution
method is function
629) An E-R data model solves the problem of presenting huge information system data models is to
users and developers
631) The standard protocol (communication rules for exchange of data) of the internet is TCP/IP
632) For efficiency purposes, wherever possible, you should overload operators as member functions
634) As long as the tables in a relational database share at least one common data attribute, the tables
in a relational database can be normalized to provide useful information and reports
635) DBMS is a simple, fourth generation language used for data retrieval
636) An occurrence of an undesirable situation that can be detected during program execution is known
a exception
637) A photo of the company headquarters would be an example of the use of a static web page
641) Static random access memory does not fall under the category of secondary storage devices
642) Floppy disk is universal, portable and inexpensive but has its own limitation in terms of storage
capacity and speed
643) Some physical property of the microscopic area of the disk surface is changed for recording in
common for all types of disks
650) The input device that is most closely related to a touch screen is the light pen
652) The liquid crystal display works on the basis of the relation between polaristion and electric field
655) A compiler breaks the source code into a uniform stream of tokens by lexical analysis
662) The UNIX operating system (available commercially) has been written in C language
665) The UNIX operating system uses three files to do the task mentioned
670) FAST drivers scientific software packages was developed under contract with NASA
677) In opening menu of word star C OPTION should be selected for protecting a file
678) The most advanced form of ROM is electronically erasable programmable ROM
679) Secondary storage device is needed to store large volumes of data and programs that exceed the
capacity of the main memory
683) We can create a simple web page by using front page express
684) The first line/bar on the word window where the name of the document is displayed is called title
bar
686) The input device that is most likely to be used to play computer games is the joystick
687) Linking the program library with main program is not performed by a file utility program
690) The sector size of a floppy disk varies from 128 bytes to 1024 bytes
695) A CPU has a 16-bit program counter. This means that the CPU can address 64 K memory locations
698) In UNIX, open files are shared between the parent and the child
699) In spite of the extra power needed for refreshing. DRAMs are widely used in computers because of
its lower cost relatives to SRAMs
704) Personal computers currently sold in India have main memories at an entry level in the range of
megabytes
705) The unit in CPU or processor, which performs arithmetic and logical operations is ALU
708) A small amount of memory included in the processor for high speed access is called cache
713) The number of processes that may running at the same time in a large system can be thousands
717) While starting the Lotus 1-2-3, the current cell reference is shown at top left hand corner of the
screen
719) Excel office assistant can be made to appear by using F1 key and help menu
720) 9 per page is the max no of showing positioning of per page handouts
724) The most appropriate command to permanently remove all records from the current table is Zap
725) The efficient and well designed computerized payroll system would be on-line real time system
726) The scripts which are designed to receive value from Web users is CGI script
729) Token bus is the most popular LAN protocol for bus topology
731) A separate document form another program sent along with an E-mail message is known as E-mail
attachment
732) When you boot up a PC portions of the operating system are copied from disk into memory
737) Most of the commonly used personal computers/laptops do not have a command key known as
turnover
739) The quickest and easiest way in Word to locate a particular word or phrase in a document is to use
the find command
740) Computer sends and receives data in the form of digital signals
741) Icons are graphical objects used to represent commonly used application
742) Most World Wide Web pages contain HTML commands in the language
743) In any window, the maximize button, the minimize button and the close buttons appear on the title
bar
744) Checking that a pin code number is valid before it is entered into the system in an example of data
validation
745) Windows 95 and windows 98 and Windows NT are known as operating systems
747) A program that works like a calculator for keeping track of money and making budgets is
spreadsheet
748) To take information from one source and bring it to your computer is referred to as download
750) A toolbar contains buttons and menus that provide quick access to commonly used commands
752) Most of the commonly available personal computers/laptops have a keyboard popularly known as
QWERTY
753) Editing a document consists of reading through the document youve created thencorrecting
your errors
756) DOC is the default file extension for all word documents
758) Codes consisting of bars or lines of varying widths or lengths that are computer readable are known
as a bar code
759) Convenience, speed of delivery, generally and reliability are all considered as the advantages of email
761) The most important or powerful computer in a typical network is network server
762) To make a notebook act as a desktop model, the notebook can be connected to a docking station
which is connected to a monitor and other devices
763) Storage that retains its data after the power is turned off is referred to as non-volatile storage
764) Virtual memory is memory on the hard disk that the CPU uses as an extended RAM
765) To move to the beginning of a line of text, press the home key
766) When sending and e-mail, the subject line describes the contents of the message
769) One advantage of dial-up internet access is it utilizes existing telephone security
770) Network components are connected to the same cable in the star topology
771) Booting checks to ensure the components of the computer are operating and connected properly
772) Control key is used in combination with another key to perform a specific task
773) Scanner will translate images of text, drawings, and photos into digital form
775) The programs and data kept in main memory while the processor is using them
780) Data link layer of OSI reference model provides the service of error detection and control to the
highest layer
782) OMR is used to read choice filled up by the student in common entrance test
793) In a SONET system, an add/drop multipliers removes noise from a signal and can also add/remove
headers
794) The WWW standard allows grammars on many different computer platforms to show the
information on a server. Such programmers are called Web Browsers
798) The first generation computers had vacuum tubes and magnetic drum
800) Alta Vista has been created by research facility of Digital Electronic corporation of USA
801) We are shifting towards computerization because technologies help in meeting the business
objectives
804) Joy Stick is an input device that cannot be used to work in MS Office
805) Artificial intelligence can be used in every sphere of life because of its ability to think like human
beings
806) To avoid the wastage of memory, the instruction length should be of word size which is multiple of
character size
807) Electronic fund transfer is the exchange of money from one account to another
808) Format menu in MS Word can be use to change page size and typeface
810) DMA module can communicate with CPU through cycle stealing
811) A stored link to a web page, in order to have a quick and easy access to it later, is called bookmark
812) B2B type of commerce is characterized by low volume and high value transactions in banking
815) History list is the name of list that stores the URLs of web pages and links visited in past few days
817) MS Office 2000 included a full-fledged web designing software are called FrontPage 2000
821) Main frame is most reliable, robust and has a very high processing power.
822) Formatting of these toolbars allows changing of Fonts and their sizes
824) The program supplied by VSNL when you ask for internet connection for the e-mail access is pine
825) The convenient place to store contact information for quick, retrieval is address book
827) For electronic banking, we should ensure the existence and procedures with regard to
identification of customers who become members electronically
831) Two rollers are actually responsible for movement of the cursor in mouse
833) Tour the server room is to be done by the auditor while internet banking services audit
834) Documentation while developing a software for a Bank is required for auditing
841) To protect organization from virus or attacks all mails sent and received should be monitored, all
messages should be encrypted, E- mails should be used only for official purpose
843) A computer based information system is a system in which a computer is used to process data to
get information
844) The time between program input and outputs is called execution time
846) MIME is a compressor that packages different formats into SMTP compatible type
847) The earliest software was developed using the waterfall model
850) A disk where number of sectors are fixed is called hard sectored
852) Multiplexing combines signals from different sources into one and sends on a faster channel
853) Message switcher chooses correct data path for an incoming message and forwards it to relevant
line
854) Speech recognition use thermal sensors along with infrared rays for identification
855) Trojan horse are self replicating malicious code independent of the action of the user, but slow
down the processor on entering a network
856) Generation of PIN in bank ATM would require PIN entered is encrypted
859) A character that changes its value throughout the program is called variables
862) When an organization gives contract for development of a software, it has to give data to the
service provider. In such cases, the ownership of data should be with the client/organization that
outsource services
864) For optical fiber used in point to point transmission, the repeater spacing is 10-100 km
866) Task pre-emption, task priority and semaphores are not needed by server program from an
operation system
870) The UNIX, echi command is used to display the message or value of any variable on the screen
874) In a SONET system, an add/drop multipliers can remove signals from a path
877) Web site is a collection of HTML documents, graphic files, audio and video files
878) The first network that initiated the internet was ARPANET
880) The binary values are represented by two different frequencies in frequency shift keying
882) Switching is a method in which multiple communication devices are connected to one another
efficiently
886) The overhead using BRI is 10 percent of the total data rate
887) In programming languages the key word Void means it does not return any value when finished
888) The keyboard shortcut to restart your computer is Ctrl + Alt + Del
893) The instruction of a program which is currently being executed are stored in main memory
897) In HTML coding, the following attributes color, size, face used in font tag
899) Fiber optics cable supports data rate up to 100 mbps to 2 gbps
902) Sybase SQL server and Microsoft SQL server 7.0 is not an example of RDBMS
903) In programming language, Null point is used to tell end of linked list
904) A technique which collects all deleted space onto free storage list is called garbage collection
905) Node to node delivery of the data unit is the responsibility of the data link layer
906) Insulating material is the major factor that makes co axial cable less susceptible to noise than
twisted pair cable
907) A data communication system covering an area the size of a town or city is MAN
908) Virtual memory system allows the employment of the full address space
911) In HTML coding no shade attribute of HR tag suppresses the shading effect and fields a solid line
912) Internet domains are classified by their functions. In that regard .com represents commercial
914) The Nyquist theorem specifies the minimum sampling rate to be twice the bandwidth of a signal
916) In HTML loading, <BR> tag is used for displaying a new line
919) The script which is designed to receive value from the web users is java script
920) GET method and HEAD method is the C91 method of involving a C91 program
922) A toll used to find a synonym or antonym for a particular word is thesaurus
923) In C++ coding, Cout<<tent; is used to display character or strings or numeric screen
924) In this processing, a number of jobs are put together and executed as a group batch processing
928) If there are 5 routers and b networks in an internet work using link state routing, there will be 5
routing tables
929) A scripting language similar to HTML and which runs only on a browser is java script
930) By RAID technique, data is stored in several disk units by breaking them into smaller pieces and
storing each piece in separate disk
931) The most popular network protocol whose routing capabilities provide maximum flexibility in an
enterprise wide network is known as TCP/IP
932) New group that enable you to communicate with other Microsoft windows user about issues and
concerns with your computer
934) In an optical fiber, the inner core is less dense than the cladding
938) In HTML coding, <UL> (Unordered list) is used to give bullets in your document
940) A virtual circuit is the physical connection between an end point and a switch or between two
switches
941) Passing of the frame to next station can happen at a token ring station
944) In HTML coding <LI> tag is used for denoting items in a list of type <UL>
945) In MS-Word the keyboard shortcut F7 used for spelling and grammar check
948) In HTML coding, Dynamic web-pages are created in advance of the users request
952) Frame format of CSMA/CD and Ethernet protocol differ in the block error control
953) On an Ethernet LAN implementation with 10 base 5 the maximum number of segments can be five
954) Overflow condition in linked list may occur when attempting to create a node when linked list is
empty
955) Code segment register is where the microprocessor looks for instruction
956) Web-site is collection of web-pages and Home-page is the very first page that we see on opening of
a web-site
957) The subsystem of the kernel and hardware that cooperates to translate virtual to physical
addresses comprises memory management subsystem
960) If we want to convert the text which is in small letters to capital letters then select the required
text and press Shift +F3
961) Datagram packet switching uses the entire capacity of a dedicated link
962) In the datagram approach to packet switching, each packet of a message follows the same path
from sender to receiver
965) In a dedicated link, the only traffic is between the two connected devices
966) In a start topology, if there are n devices in network, each device has n-1
967) A unique number assigned to a process when the process first starts running PID
969) In MS-Word WYSIWYG stands for what you see is where you get
970) The primary purpose of shutdown procedure in UNIX system is that all active process may be
properly closed
971) In time- division circuit switching, delivery of data is delayed because data must be stored and
retrieved from RAM
972) Subnet usually comprises layers 1 & 2, layer 1 through 3 of OSI model
973) An image in a web-page can be aligned left and right using HTML coding
975) Packet filtering firewall and proxy firewall is not a type of firewall
977) The sharing of a medium and its path by two or more devices is called multiplexing
978) Sending messages, voice, and video and graphics files over digital communication link is done by
the method e-mail
979) In a computer network, a computer that can control a group of other computers for sharing
information as well as hardware utilities is known as server
982) Cat text>>output would append a file called test to the end of a file called output
983) In a network with 25 computers, mesh topology would require the more extensive cabling
985) The program which takes user input, interprets it and takes necessary action is shell
987) Menu bar is usually located below that title bar that provides categorized options
990) when the text automatically goes onto the next line this is called word wrap
991) WYSIWYG is short for what you see is what you get
993) To put text on the right of the page use the align right button
998) A numeric value can be treated as a label value if it precedes with apostrophe
999) Data can be arranged in a worksheet in an easy to understand manner using auto formatting,
applying styles, changing fonts
1001) Most manufacturers setup their BIOS to load into upper memory during the boot process
1002) Device drivers loaded in the config.sys file is loaded into the following memory area: Conventional
memory
1006) Static variables are local to the block in which they are declared.
1007) During the normal PC boot process, ROM BIOS is active first
1008) During boot-up, the memory test checks and verifies that contiguous memory is installed
1010) If you get frequent general protection faults, this could indicate poor quality of memory chips
1011) You are looking at a memory module thought to be a DIMM module. 168 pins would be on a
DIMM module
1012) The system BIOS and ROM chips are called firmware
1020) The elements of computer processing system are hardware, data, users and procedures
1022) Library management software is for documenting the changes that are made to program and
controlling the version numbers of the programs
1023) Steganography is hiding the data but not necessarily making it invisible and not easily detectable
1027) For security we should consider local data reduction, event correction low resource utilization
1031) Gateways to allow a network to use the resources of another main frame is a component of
internet
1034) Mainframes network where a huge compute does all computing and front end PCs are dumb
terminals
1035) A modem that cannot be moved from its position is called fixed modem
1036) A device that receives data from slow speed devices, and transmits it to different locations is
called remote concentrator
1037) Organization would prefer in house development of software to ensure that the development
adhere to defined quality
1039) Network that uses two OSI protocol layers as against three used in X.25 is a frame relay
1041) System flowcharts show relationship that link the input processing and output of the system
1043) Platform in computer world means computer hardware and operating systems
1044) A character that retains its value during program execution is constants
1046) OMR is used to read choice filled up by a student in common entrance tests
1047) The term remote with respect to network means machine located far off
1048) In two-tier client server architecture the client is usually fat client
1049) The senior management provides the go-ahead approval for the development of projects
1052) The normal way to undo a command by pressing the following key combinations together CTRL-Z
1054) In datagram packet switching all the datagrams of a message follow the same channel of a path
1056) Presentation layer of the OSI reference model is concerned with the syntax of data exchanged
between application entities
1057) Edge-triggered D flip flop memory elements uses an PC circuit at its input
1058) Programs that extend the capabilities of a server are C41 scripts
1059) The primary goal of ISDN is the integration of voice services and non-voice services
1061) The optical links between any two SONET devices is called a section
1062) A user can get files from another compute on the internet by using FTP
1063) The key fields which are tested by a packet filtering firewall are source IP address , TCP/UDP
source port, destination IP address
1066) In MS-Word, mail merge can be defined writing a letter once and dispatching it to a number of
recipients
1067) Coaxial cables are good for digital transmission and long distance transmission
1070) The exact format of frame in case of synchronous transmission depends on whether transmission
scheme is either character oriented or bit oriented
1072) EX-OR gates recognizes only words that have an odd number of 1
1076) The protocol for sharing hypertext information on the world wide web is HTTP
1078) The mode of data transmission of unshielded twisted pair cable is full duplex
1083) The physical layer is concerned with transmission of bits over the physical medium
1085) The bar-code (rectangular pattern of lines of varying width and spaces) used for automatic
product identification by computer
1089) Program of a computer presented as a sequence of instructions in the form of binary numbers is
called machine language
1090) Possible problems with java scrip can be security or limited graphics and multimedia capabilities
1091) For locating any document on the WWW. There is a unique address known as URL
1092) Design view would use to define a table and specify fields
1093) Traversal process is faster for threaded trees compared with their unthreaded counterparts
1096) A generic team that refers to the combination of all commercial transactions executed over
electronic media for the exchange of product and services
1097) In DOS, the command used to create a new file is called copy con
1098) Backup helps you to create a copy of the information on your hard disk and saves original data in
case data on your computer got damaged or corrupted due to malfunctioning of hard-disk
1099) LAN is usually privately owned and links the devices in a single office, building or campus
1100) In justified type of alignment, text gets aligned along both left and right margins
1101) The internal programming language for a particular chip is called machine language
1102) The inner core of an optical fiber is glass and plastic in composition
1103) When a small amount of trivalent impurity is added to a pure-semiconductor it is called P-type
semiconductor
1105) In DOS, Deltree command is used to delete all the files as well as sub-directories of a directory
1108) Table, form, queries, reports, macros, modules are objects in an access database
1111) When we run a program in HTML coding, notepad is used as backend and internet-explorer works
as front end
1112) If the M bit in X.25 standard is set to 1, it means that thee is more than one packet
1116) Search engine will search its database to find items whose tent contains all or at least one of the
words given to it
1119) A simple protocol used for fetching an e-mail from a mailbox is POP 3
1120) For a small web site, one needs to buy space from the ISP
1121) An operating system that acts as an intermediary between user and computer hardware
1122) Attair, the worlds first personal computer, was introduced in the year 1979
1123) Half duplex data flows in both directions, but any one direction at the time
1126) The main job of one of the following is to allocate CPU to processes scheduler
1128) Before printing a document you should always use print preview
1132) Formula bar in an Excel window allows entering values and formulas
1133) Direct memory access is a technique for transferring data from main memory to a device without
passing it through the CPU
1134) 5 30-bit SIMMS are required to populate a bank on a 486 system that has a 32-bit data bus
1135) SRAM uses a clock to synchronize a memory chips input and output signal
1136) Cycle-stealing type of DMA transfer will operate when a CPU is operating
1137) A series 100 POST error code indicates a problem with the system board
1138) You have an old PC that you decide to upgrade with a 1 gig IDE hard drive. You find that you cant
configure CMOS to see the entire hard drive. The best you can do is 540 meg. Then use a device driver
that makes the bios see the drive as
1139) When SHADOWING is enabled in computers BIOS Instructions stored in various ROM chips are
copied into
1141) Checking the hard disk while running Windows 3.1, you discover a very large file called
396SPART.PAR. That file is windows permanent swap file
1142) CMOS contains the computer BIOS and maintains its data with the use of a battery for periods
when the system is powered down
1147) Focus on manual records is not necessary for computerization system in a bank
1148) Permanent establishment, residence-based, Income based classification are the approaches used
to tax online transactions
1153) Computer program looking normal but containing harmful code is infected by Trojan horse
1155) Most dangerous risk in leaking of information is ignorance about the existence of risk
1156) IMAP (Internet message access protocol) takes care of E-mail at client side
1157) The CPU has control unit, arithmetic-logic unit and primary storage
1167) Front end processor relieves the host computer from tedious jobs and does them itself
1171) All decisions for LAN are taken by the IT steering committee
1177) Personnel security does not fall under the category of operations to be performed during
development of software
1182) Close option in File pull-down menu is used to close a file in MSWord
1184) When entering in a lot of text in capitals you should use the caps lock key
1186) Contents, objects, Scenarios of a worksheet can be protected from accidental modification
1187) Device drivers that are loaded in windows 3.X are loaded into the sytem.ini file
1188) 30 pin SIMMs, 72 pin SIMMs, 168 pin DIMMs types of RAM sockets can be seen on mother
boards
1189) The Power on self test determines the amount of memory present, the date/time, and which
communications ports and display adapters are installed in a microcomputer
1190) Virtual memory refers to using a file on the hard disk to simulate RAM
1192) A population application of computer networking is the WWW of newsgroup called Netnews
1194) Set date will you give in UNIX to display system time
1195) Circuit switched network networks requires that all channels in a message transmission path be of
the same speed
1196) The Vi program available under UNIX can be created to open a virtual terminal
1199) Digitizers can be converted from dumb to smart through the addition of a microprocessor
1202) Use net discussion groups have their own system of organization to help you find things just as
internet excel
1205) In ISDN teleservices, the network can change or process the contents of data
1207) A microprocessor is a processor with a reduced instruction set and power requirement
1208) The term server refers to any device that offers a service to network users
1214) Netscape navigator and other browsers such as the internet explorer are available free on the
internet
1217) Data lines which provide path for moving data between system modules are known as data bus
1218) Bubble sort technique does not use divide and conquer methodology
1219) The OSI model shows how the network functions of computer to be organized
1221) A protocol that permits the transfer of files between computer on the network is FIP
1222) A data structure, in which an element is added and removed only from one end is known as stack
1223) In linked list, the successive elements must occupy contiguous space in memory
1224) In OSI model reference, layer 2 lies in between the physical layer and the network layer
1225) In synchronous TDM, for n signal sources, each frame contains at least n slots
1227) In linked list, a node contains at least node number, data field
1229) Device drivers controls the interaction between the hardware devices and operating systems
1230) The shortest path in routing can refer to the least expensive path
1231) An ordinary pen which is used to indicate locations on the computer screen by sensing the ray of
light being emitted by the screen, is called light pen
1232) Netiquettes are some rules and regulations that have to be followed by users
1233) Gateway uses the greatest number of layers in the OSI model
1234) A set of standards by which servers communicate with external programs is called common
gateway interface
1236) API allows a client/server relationship to be developed between an existing host application and a
PC client
1237) Semi-insulator is a substance which has resistivity in between conductors and insulators
1238) Multi vibrator is a two stage amplifier with output of one feedback to the input of the other
1241) A set of devices or combination of hardware and software that protects the systems on one side
from system on the other side is firewall
1243) When bandwidth of medium exceeds the required bandwidth of signals to be transmitted we use
frequency division multiplexing
1245) In Dos, the Label command is used to display the label of disk
1247) In Word, Ctrl + Del combination of keys is pressed to delete an entire word
1248) Plotters are very useful in applications such as computer aided design
1251) Overtime analysis is useful for formulating personnel policies and derived form the payroll system
1254) Floppy Disk is universal portable and inexpensive but has its own limitation in terms of storage
capacity and speed
1255) Personal computers currently sold in India have main memories at an entry level in the range of
megabytes
1260) Mother board holds the ROM, CPU, RAM and expansion cards
1264) E-mail is transaction of letters, messages and memos over communications network
1268) Magnetic tape is not practical for applications where data must be quickly recalled because tape is
a sequential access medium
1269) User id, URI and time stamp is not used by organization when a user visits its site
1272) Encrypting file system features of windows XP professional operating system protects the data of
a user, even if the computer is shared between users
1273) Loading is not required for high level language program before it is executed
1275) Devices such as magnetic disks, hard disks, and compact disks, which are used to store
information, are secondary storage devices
1276) Various input and output devices have a standard way of connecting to the CPU and Memory.
These are called interface standards
1277) The place where the standard interfaces are provided to connect to the CPU and Memory is
known as Port
1281) Mouse has a use in graphical user interface and applications as input device
1282) Drum plotter, flat bed plotter, graphic display device is an output device
1283) The time taken to write a word in a memory is known as write name
1285) A memory cell, which does not loose the bit stored in it when no power is supplied to the cell, is
known as non-volatile cell
1286) Magnetic surface recoding devices used in computers such as hard disks, floppy disks, CD-ROMs
are called secondary / auxiliary storage devices
1288) Assembler is a translator which translates assembly language program into a machine language
program
1289) Interpreter is a translator which translates high level language program into a machine language
program
1292) High level languages are developed to allow application programs, which are machine
independent
1294) Mark I was the first computer that used mechanical switches
1295) First generation computers relied on machine language to perform operations, and they only
solve one problem at a time
1299) Second generation computers moved from cryptic binary machine language to symbolic, or
assembly languages which allowed programmers to specify instructions in words
1300) Most electronic devices today use some form of integrated circuits placed on printed circuit
boards thin pieces of bakelite or fiberglass that have electrical connections etched onto them is called
mother board
1301) The operating system, which allowed the device to run many different applications at one time
with a central program that monitored the memory was introduced in third generation computers
1302) In third generation computers, users interacted through keyboards and monitors
1303) The fourth generation computers saw the development of GUIs, the mouse and handheld devices
1304) First computers that stored instructions in memory are second generation computers
1307) Integrated Circuits (IC) are introduced and the replacement of transistors started in third
generation computers
1310) In assembly language mnemonics are used to code operations, alphanumeric symbols are used for
address, language lies between high-level language and machine language
1311) The computers secondary memory is characterized by low cost per bit stored
1312) Acknowledgement from a computer that a packet of data has been received and verified is known
as ACK
1313) Acoustic coupler is a communications device which allows an ordinary telephone to be used with
a computer device for data transmission
1315) A high level programming language named after Ada Augusta, coworker with Charles Babbage is
Ada
1316) Adder is a logic circuit capable of forming the sum of two or more quantities
1318) A local storage register in the CPU which contains the address of the next instruction to be
executed is referred as address register
1319) A sequence of precise and unambiguous instructions for solving a problem in a finite number of
operations is referred as algorithm
1327) A computer system runs millions of cycles per second so that speed is measured in MHz
1328) Heat sink is the metal device that draws heat away from an electronic device
1337) The data in 8 bit bus is sent along 8 wires simultaneously in parallel
1338) The bus is simple series of connection that carry common signals
1339) Mainly memories are divided into two types they are logical memories and physical memories
1340) System based on the new Pentium II processor have the extended memory limit of 4G
1343) Bus has both the common meaning and computer meaning
1349) The mouse device drivers, if loaded in the config.sys file, its typically called mouse.sys
1352) The most important aspect of job scheduling is the ability to multiprogramming
1354) A data communication system requires terminal device, communication channel, protocols
1355) The start button appears at the lower left of the screen
1371) By connecting a MIDI cable to the joystick port you can connect your PC to a MIDI device
1373) Video cards, video and graphics card are example of video & audio
1376) The CPU is the next most important file server after the hard disk
1377) It is best to use the game adaptor interface on the sound card and disable any other on system
1382) The servers network adapter card is its link to all the work stations on LAN
1383) Magnetic drives such as floppy and hard disk drives operate by electro magnetism
1384) Clock timing is used to determine that start and end of each bit cell
1386) Latency is the average time that it takes for a sector to be a available after the heads
1389) PC Technical is written in assembly language and has direct access to the systems hardware for
testing
1390) Check it pro deluxe gives detailed information about the system hardware
1394) +12 V signal for disk drive is used for power supply
1405) When a process exists, he operating system must free the disk space used by its memory image
1406) Buffering attempts to keep both CPU and I/O device busy all the time
1408) The most important aspect of job scheduling is the ability to multiprogramming
1412) In the two-level directory structure, each user has its own user file directory
1414) A process that does not determinate while the operating system is functionary is called dynamic
1415) The three main types of computer programming languages are machine language, assembly
language, high level language
1417) An input device is an electromechanical device that generates data for a computer to read
1418) The first implementation of UNIX was developed at Bell Telephone Laboratories in the early 1970
1427) A floppy disk is a thin plastic disc coated with magnetic oxide
1429) Universal building blocks of a computer system are NAND & NOR
1433) Count command is used to count the specified records in a file with or without condition
1438) IBM PC and DOS has BIOS support for 3 LPT ports
1441) If the data transfer rate is 150 k/sec then it is called single speed
1450) Direct memory access channels are used by medium speed communication devices
1451) The 486 Sx chip is twice as fast as a 386 Dx with same clock speed
1456) The function of +12V power supple is to run disk drive motors and also cooling fans
1458) Parallel interface is not the interfaces that can be used to connect the mouse to the computer
1459) The mouse interrupts usually occurs if the system uses a mouse port
1460) The video adapter BIOS handles communication between the Video Chipset & Video Ram
1461) Pentium pro CPUs have full of 323, they can track of 44 G of memory in address lines
1462) The processor bus is the communications path way between CPU and immediate support chip
1465) Horizontal scan refers to the speed at which the electron beam across the screen
1467) When transition changes from negative to positive the head would detect positive voltage spike
1468) Animation means to make still picture, move and talk like in cartoon pictures
1469) Analogues: The use of a system in which the data is of a continuously variable physical quantity
such as voltage or angular person
1472) Active X is a model for writing programs. Active X technology is used to make interactive Web
pages that look and behave like computer programs, rather than static pages. With Active X, users can
ask or answer questions, use push buttons, and interact in other ways with the web page
1473) Batch processing is a technique in which a number of similar items or transactions are processed
in groups or batches during a machine run
1474) BIS: Bureau of Indian Standards. It is a national organization of India to define standards
1475) Browser is a link between the computer and the internet. Its actually a program that provides a
way to look in the hand interact with all information on the internet. A browser is a client program that
uses the Hypertext Transfer Protocol (http) to make requests of Web servers throughout the Internet on
behalf of the browser user.
1476) CIO (Chief information officer) : The senior executive in a company responsible for information
management and for delivering IT services
1477) Client/server architecture: A type of network in which computer processing is distributed among
many individual PCs and a more powerful, central computer clients can share files and retrieve data
stored on the server
1479) Computer-Aided design: Refers to any computer-enabled method of design also called computerassisted design.
1480) Commuter: A group of electronic device used for performing multipurpose tasks
1481) Channel: It consists of controller card, interface cable and power supply
1482) CORBA: CORBA is the acronym for Common Object Request Broker Architecture
1485) Computer Crime: The act of stealing, cheating or otherwise defrauding an organization with the
use of a computer
1487) Cryptography: Method used to protect privacy and security on the internet
1488) DBMS: An acronym for the database management system. A program that maintains and controls
the access to collection of related information in electronic files
1489) Data: Facts coded and structured for subsequent processing, generally using a computer system
1490) Digital signature: Encrypted signature used for providing security for the messages/data
transferred through the internet
1492) Data transmission: The movement of data from one location of storage to another. If the locations
are geographically far away, generally done via satellites.
1493) Disk Mirroring: The data is written on two or more hard disks simultaneously over the same
channel
1494) Disk Duple Xing: The data is written on two or more hard disks simultaneously over the different
channel
1495) Dumb Terminals: Hardware configuration consisting of a keyboard and monitor that is capable of
sending and receiving information but has no memory or processing capabilities.
1496) Download: Process of transferring a file system from one system to another
1498) Enterprise, resource planning: An integrated system of operation application combining logistics,
production, contract and order management, sales forecasting and financial and HR management
1499) Electronic data interchange (EDI) : Electronic transmission or documents through point to point
connections using a set of standard forms, message and data elements, this can be via leased lines
private networks or the internet
1500) Data processing: It is a method concerning with the systematic recording, arranging, filing,
processing and dissemination of facts of business
Pallab Dasgupta
Professor, Dept. of Computer Sc. & Engg.,
Indian Institute of Technology Kharagpur
Some Terminologies
Algorithm / Flowchart
A stepstep-by
by--step procedure for solving a particular problem.
Independent of the programming language.
Program
A translation of the algorithm/flowchart into a form that can be
processed by a computer.
Typically written in a highhigh-level language like C, C++, Java, etc.
Contd.
Memory map
Address 0
Address 1
Address 2
Address 3
Address 4
Address 5
Address 6
Address N-1
Every variable is
mapped to a particular
memory address
Variables in Memory
Instruction executed
T
i
m
e
Variable X
X = 10
10
X = 20
20
X=X+1
21
X=X*5
105
T
i
m
e
X = 20
20
Y = 15
20
15
X=Y+3
18
15
Y=X/6
18
Data Types
Three common data types used:
Integer :: can store only whole numbers
Examples: 25, -56, 1, 0
Floating
Floating--point :: can store numbers with fractional values.
Examples: 3.14159, 5.0, -12345.345
Float ::
32 bits
64 bits
Char ::
8 bits (ASCII code)
16 bits (UNICODE, used in Java)
Problem solving
Step 1:
Clearly specify the problem to be solved.
Step 2:
Draw flowchart or write algorithm.
Step 3:
Convert flowchart (algorithm) into program code.
Step 4:
Compile the program into object code.
Step 5:
Execute the program.
Computation
Input / Output
Decision Box
Start / Stop
Dept. of CSE, IIT KGP
Contd.
Flow of
control
Connector
START
READ A, B, C
S=A+B+C
OUTPUT S
STOP
Dept. of CSE, IIT KGP
READ X, Y
YES
IS
X>Y?
NO
OUTPUT X
OUTPUT Y
STOP
STOP
READ X, Y, Z
YES
IS
X > Y?
Max = X
YES
OUTPUT Max
STOP
Dept. of CSE, IIT KGP
NO
Max = Y
IS
Max > Z?
NO
OUTPUT Z
STOP
NO
IS
COUNT > N?
YES
OUTPUT SUM
STOP
Example 5: SUM = 12 + 22 + 32 + N2
START
READ N
SUM = 0
COUNT = 1
SUM = SUM + COUNT COUNT
COUNT = COUNT + 1
NO
IS
COUNT > N?
YES
OUTPUT SUM
STOP
NO
IS
COUNT > N?
YES
OUTPUT SUM
STOP
NO
IS
COUNT > N?
YES
OUTPUT PROD
STOP
NO
IS
COUNT > N?
YES
OUTPUT SUM
STOP
NO
IS
TERM < 0.0001?
YES
OUTPUT SUM
STOP
ax2 + bx + c = 0
TRY YOURSELF
Ex
A
B
C
D
P
F
READ MARKS
MARKS 90?
YES
OUTPUT Ex
STOP
NO
MARKS 80?
YES
OUTPUT A
STOP
NO
MARKS 70?
YES
OUTPUT B
STOP
NO
NO
MARKS 60?
YES
MARKS 50?
YES
NO
MARKS 35?
NO
YES
OUTPUT C
OUTPUT D
OUTPUT P
OUTPUT F
STOP
STOP
STOP
STOP
NetworkSecurity:History,Importance,andFuture
UniversityofFloridaDepartmentofElectricalandComputerEngineering
BhavyaDaya
ABSTRACT
ofintellectualpropertythatcanbeeasilyacquired
throughtheinternet.
1. Historyofsecurityinnetworks
2. Internet architecture and vulnerable
securityaspectsoftheInternet
3. Types of internet attacks and security
methods
4. Securityfornetworkswithinternetaccess
5. Current development in network security
hardwareandsoftware
Theentirefieldofnetworksecurityisvastandinan
evolutionary stage. The range of study
encompasses a brief history dating back to
internetsbeginningsandthecurrentdevelopment
in network security. In order to understand the
research being performed today, background
knowledgeoftheinternet,itsvulnerabilities,attack
methods through the internet, and security
technology is important and therefore they are
reviewed.
INTRODUCTION
1. NetworkSecurity
Systemandnetworktechnologyisakeytechnology
forawidevarietyofapplications.Securityiscrucial
Toconsumeresourcesuselessly
To interfere with any system resources
intendedfunction
To gain system knowledge that can be
exploitedinlaterattacks
1. Accessauthorizedusersareprovidedthe
means to communicate to and from a
particularnetwork
2. ConfidentialityInformationinthenetwork
remainsprivate
3. Authentication Ensure the users of the
networkarewhotheysaytheyare
2
countermeasurestrategies[2].
Datasecurityistheaspectofsecuritythatallowsa
When transferring ciphertext over a network, it is from a variety of companies [3]. Since then,
helpfultohaveasecurenetwork.Thiswillallowfor informationsecuritycameintothespotlight.
the ciphertext to be protected, so that it is less
likely for many people to even attempt to break Public networks are being relied upon to deliver
the code. A secure network will also prevent financial and personal information. Due to the
someone from inserting unauthorized messages evolution of information that is made available
into the network. Therefore, hard ciphers are through the internet, information security is also
requiredtoevolve.DuetoKevinMitnicksoffense,
neededaswellasattackhardnetworks[2].
companies are emphasizing security for the
Internetprotocolsinthepastwerenotdeveloped
to secure themselves. Within the TCP/IP
communication stack, security protocols are not
implemented. This leaves the internet open to
attacks. Modern developments in the internet
architecture have made communication more
secure.
Figure1:BasedontheOSImodel,datasecurityandnetwork
securityhaveadifferentsecurityfunction[2].
1. BriefHistoryofInternet
2. SecurityTimeline
TheARPANETisasuccessfromtheverybeginning.
Although originally designed to allow scientists to
share data and access remote computers, email
quicklybecomesthemostpopularapplication.The
ARPANETbecomesahighspeeddigitalpost office
aspeopleuseittocollaborateonresearchprojects
and discuss topics of various interests. The
InterNetworking Working Group becomes the first
of several standardssetting entities to govern the
growing network [10]. Vinton Cerf is elected the
first chairman of the INWG, and later becomes
knownasa"FatheroftheInternet."[10]
INTERNETARCHITECTUREAND
VULNERABLESECURITYASPECTS
FearofsecuritybreachesontheInternetiscausing
organizationstouseprotectedprivatenetworksor
intranets [4]. The Internet Engineering Task Force
(IETF) has introduced security mechanisms at
various layers of the Internet Protocol Suite [4].
These security mechanisms allow for the logical
protectionofdataunitsthataretransferredacross
thenetwork.
Figure2:IPseccontainsagatewayandatunnelinordertosecurecommunications.[17]
1. IPv4andIPv6Architectures
Theinternetprotocolsdesignissovastandcannot
becoveredfully.Themainpartsofthearchitecture
relatingtosecurityarediscussedindetail.
1.1IPv4Architecture
1. AddressSpace
2. Routing
3. Configuration
4. Security
5. QualityofService
TheIPv4architecturehasanaddressthatis32bits
wide [6]. This limits the maximum number of
computers that can be connected to the internet.
The32bitaddressprovidesforamaximumoftwo
billionscomputerstobeconnectedtotheinternet.
The problem of exceeding that number was not
foreseenwhentheprotocolwascreated.Thesmall
addressspaceoftheIPv4facilitatesmaliciouscode
distribution[5].
Routingisaproblemforthisprotocolbecausethe
routingtablesareconstantlyincreasinginsize.The
maximum theoretical size of the global routing
tables was 2.1 million entries [6]. Methods have
been adopted to reduce the number of entries in
theroutingtable.Thisishelpfulforashortperiod
of time, but drastic change needs to be made to
addressthisproblem.
TheTCP/IPbasednetworkingofIPv4requiresthat
theusersuppliessomedatainordertoconfigurea
network. Some of the information required is the
IPaddress,routinggatewayaddress,subnetmask,
and DNS server. The simplicity of configuring the
network is not evident in the IPv4 protocol. The
user can request appropriate network
configuration from a central server [6]. This eases
1.2IPv6Architecture
1. Routingandaddressing
2. Multiprotocolarchitecture
3. Securityarchitecture
4. Trafficcontrol
TheIPv6protocolsaddressspacewasextendedby
supporting 128 bit addresses. With 128 bit
addresses, the protocol can support up to
3.4 10 ^38machines.Theaddressbitsareused
lessefficientlyinthisprotocolbecauseitsimplifies
addressingconfiguration.
6
Table1:AttackMethodsandSecurityTechnology[8]
ThesecurityarchitectureoftheIPv6protocolisof
great interest. IPsec is embedded within the IPv6
protocol. IPsec functionality is the same for IPv4
andIPv6.TheonlydifferenceisthatIPv6canutilize
thesecuritymechanismalongtheentireroute[6].
ThequalityofserviceproblemishandledwithIPv6.
Theinternetprotocolallowsforspecialhandlingof
certainpacketswithahigherqualityofservice.
2.1 CommonInternetAttackMethods
2. AttacksthroughtheCurrentInternet
ProtocolIPv4
personaldata,suchascreditcardnumbers,online
banking credentials, and other sensitive
Interception of communications by an information.
unauthorizedpartyiscalledeavesdropping.Passive
eavesdropping is when the person only secretly 2.1.6 IPSpoofingAttacks
listens to the networked messages. On the other
hand, active eavesdropping is when the intruder Spoofing means to have the address of the
listens and inserts something into the computermirrortheaddressofatrustedcomputer
communication stream. This can lead to the in order to gain access to other computers. The
messages being distorted. Sensitive information identity of the intruder is hidden by different
canbestolenthisway[8].
means making detection and prevention difficult.
2.1.1 Eavesdropping
2.1.7 DenialofService
2.2.1 Cryptographicsystems
2.1.4 Trojans
Trojansappeartobebenignprogramstotheuser,
but will actually have some malicious purpose.
Trojansusuallycarrysomepayloadsuchasavirus
[8].
2.2.2 Firewall
2.1.5 Phishing
Thenewinternetprotocoldoesnotprotectagainst
misconfigured
servers,
poorly
designed
applications,orpoorlyprotectedsites.
Thepossiblesecurityproblemsemergeduetothe
following[5]:
1. Headermanipulationissues
2. Floodingissues
3. Mobilityissues
HeadermanipulationissuesariseduetotheIPsecs
embedded functionality [7]. Extension headers
detersomecommonsourcesofattacksbecauseof
header manipulation. The problem is that
extension headers need to be processed by all
stacks, and this can lead to a long chain of
extension headers. The large number of extension
headers can overwhelm a certain node and is a
formofattackifitisdeliberate.Spoofingcontinues
tobeasecuritythreatonIPv6protocol.
Atypeofattackcalledportscanningoccurswhena
whole section of a network is scanned to find
potential targets with open services [5]. The
addressspaceoftheIPv6protocolislargebutthe
protocol is still not invulnerable to this type of
attack.
Mobilityisanewfeaturethatisincorporatedinto
the internet protocol IPv6. The feature requires
special security measures. Network administrators
need to be aware of these security needs when
usingIPv6smobilityfeature.
2.2.3 IntrusionDetectionSystems
AnIntrusionDetectionSystem(IDS)isanadditional
protection measure that helps ward off computer
intrusions. IDS systems can be software and
hardware devices used to detect an attack. IDS
products are used to monitor connection in
determining whether attacks are been launched.
Some IDS systems just monitor and alert of an
attack,whereasotherstrytoblocktheattack.
2.2.4 AntiMalwareSoftwareandscanners
Viruses,wormsandTrojanhorsesareallexamples
ofmalicioussoftware,orMalwareforshort.Special
socalled antiMalware tools are used to detect
themandcureaninfectedsystem.
2.2.5 SecureSocketLayer(SSL)
TheSecureSocketLayer(SSL)isasuiteofprotocols
that is a standard way to achieve a good level of
securitybetweenawebbrowserandawebsite.SSL
is designed to create a secure channel, or tunnel,
between a web browser and the web server, so
thatanyinformationexchangedisprotectedwithin
thesecuredtunnel.SSLprovidesauthenticationof
clients to server through the use of certificates.
Clientspresentacertificatetotheservertoprove
theiridentity.
SECURITYINDIFFERENTNETWORKS
3. SecurityIssuesofIPProtocolIPv6
Thebusinessestodayusecombinationsoffirewalls,
encryption, and authentication mechanisms to
create intranets that are connected to the
internetbutprotectedfromitatthesametime.
Fromasecuritypointofview,IPv6isaconsiderable
advancement over the IPv4 internet protocol.
Despite the IPv6s great security mechanisms, it
still continues to be vulnerable to threats. Some
9
Itwasmentionedthatiftheintranetwantedaccess
to the internet, virtual private networks are often
used.Intranetsthatexistacrossmultiplelocations
generallyrunoverseparateleasedlinesoranewer
approach of VPN can be utilized. VPN is a private
network that uses a public network (usually the
Internet)toconnectremotesitesoruserstogether.
Insteadofusingadedicated,realworldconnection
such as leased line, a VPN uses "virtual"
connections routed through the Internet from the
company's private network to the remote site or
employee.Figure3isagraphicalrepresentationof
anorganizationandVPNnetwork.
Figure3:AtypicalVPNmighthaveamainLANatthecorporate
headquartersofacompany,otherLANsatremoteofficesor
facilitiesandindividualusersconnectingfromoutinthefield.[14]
CURRENTDEVELOPMENTSINNETWORK
SECURITY
1. HardwareDevelopments
10
ThemainuseofBiometricnetworksecuritywillbe
to replace the current password system.
Maintainingpasswordsecuritycanbeamajortask
for even a small organization. Passwords have to
be changed every few months and people forget
their password or lock themselves out of the
system by incorrectly entering their password
repeatedly.Veryoftenpeoplewritetheirpassword
down and keep it near their computer. This is of
course completely undermines any effort at
network security. Biometrics can replace this
security identification method. The use of
biometric identification stops this problem and
while it may be expensive to set up at first, these
devicessaveonadministrationanduserassistance
costs.
provideundeniableproofofausersidentity.Smart
cardscanbeusedforeverythingfromlogginginto
the network to providing secure Web
communicationsandsecureemailtransactions.
Buttheinterestingthingiswhathappenswhenthe
userinputsthePIN.ThePINisverifiedfrominside
the smart card. Because the PIN is never
transmittedacrossthenetwork,theresabsolutely
no danger of it being intercepted. The main
benefit, though, is that the PIN is useless without
the smart card, and the smart card is useless
withoutthePIN.
2. SoftwareDevelopments
11
ofwherethesecuritysoftwareisheadingbasedon
emphasisbeingplacednow.
Asthesecurityhardwaretransitionstobiometrics,
the software also needs to be able to use the
information appropriately. Current research is
beingperformedonsecuritysoftwareusingneural
networks. The objective of the research is to use
neuralnetworksforthefacialrecognitionsoftware.
Manysmallandcomplexdevicescanbeconnected
to the internet. Most of the current security
algorithmsarecomputationalintensiveandrequire
substantial processing power. This power,
however, is not available in small devices like
sensors. Therefore, there is a need for designing
lightweight security algorithms. Research in this
areaiscurrentlybeingperformed.
FUTURETRENDSINSECURITY
CONCLUSION
Originallyitwasassumedthatwiththeimportance
of the network security field, new approaches to
security, both hardware and software, would be
activelyresearched.Itwasasurprisetoseemostof
the development taking place in the same
technologies being currently used. The embedded
security of the new internet protocol IPv6 may
provide many benefits to internet users. Although
some security issues were observed, the IPv6
internet protocol seems to evade many of the
currentpopularattacks.CombineduseofIPv6and
securitytoolssuchasfirewalls,intrusiondetection,
andauthenticationmechanismswillproveeffective
in guarding intellectual property for the near
future. The network security field may have to
evolvemorerapidlytodealwiththethreatsfurther
inthefuture.
REFERENCES
[1]Dowd,P.W.;McHenry,J.T.,"Networksecurity:it's
timetotakeitseriously,"Computer,vol.31,no.9,pp.24
28,Sep1998
[2]Kartalopoulos,S.V.,"DifferentiatingDataSecurity
andNetworkSecurity,"Communications,2008.ICC'08.
IEEEInternationalConferenceon,pp.14691473,1923
May2008
[3]SecurityOverview,
www.redhat.com/docs/manuals/enterprise/RHEL4
Manual/securityguide/chsgsov.html.
[4]Molva,R.,InstitutEurecom,InternetSecurity
Architecture,inComputerNetworks&ISDNSystems
Journal,vol.31,pp.787804,April1999
12
[5]Sotillo,S.,EastCarolinaUniversity,IPv6security
issues,August2006,
www.infosecwriters.com/text_resources/pdf/IPv6_SSot
illo.pdf.
[6]AndressJ.,IPv6:thenextinternetprotocol,April
2005,www.usenix.com/publications/login/2005
04/pdfs/andress0504.pdf.
[7]WarfieldM.,SecurityImplicationsofIPv6,Internet
SecuritySystemsWhitePaper,
documents.iss.net/whitepapers/IPv6.pdf
[8]Adeyinka,O.,"InternetAttackMethodsandInternet
SecurityTechnology,"Modeling&Simulation,2008.
AICMS08.SecondAsiaInternationalConferenceon,
vol.,no.,pp.7782,1315May2008
[9]Marin,G.A.,"Networksecuritybasics,"Security&
Privacy,IEEE,vol.3,no.6,pp.6872,Nov.Dec.2005
[10]InternetHistoryTimeline,
www3.baylor.edu/~Sharon_P_Johnson/etg/inthistory.h
tm.
[11]Landwehr,C.E.;Goldschlag,D.M.,"Securityissues
innetworkswithInternetaccess,"Proceedingsofthe
IEEE,vol.85,no.12,pp.20342051,Dec1997
[12]"Intranet."Wikipedia,TheFreeEncyclopedia.23
Jun2008,10:43UTC.WikimediaFoundation,Inc.2Jul
2008
<http://en.wikipedia.org/w/index.php?title=Intranet&ol
did=221174244>.
[13]"Virtualprivatenetwork."Wikipedia,TheFree
Encyclopedia.30Jun2008,19:32UTC.Wikimedia
Foundation,Inc.2Jul2008
<http://en.wikipedia.org/w/index.php?title=Virtual_priv
ate_network&oldid=222715612>.
[14]Tyson,J.,HowVirtualprivatenetworkswork,
http://www.howstuffworks.com/vpn.htm.
[15]AlSalqan,Y.Y.,"FuturetrendsinInternetsecurity,"
DistributedComputingSystems,1997.,Proceedingsof
theSixthIEEEComputerSocietyWorkshoponFuture
Trendsof,vol.,no.,pp.216217,2931Oct1997
[16]Curtin,M.IntroductiontoNetworkSecurity,
http://www.interhack.net/pubs/networksecurity.
[17]ImprovingSecurity,
http://www.cert.org/tech_tips,2006.
[18]Serpanos,D.N.;Voyiatzis,A.G.,"Securenetwork
design:Alayeredapproach,"AutonomousDecentralized
System,2002.The2ndInternationalWorkshopon,vol.,
no.,pp.95100,67Nov.2002
[19]Ohta,T.;Chikaraishi,T.,"Networksecuritymodel,"
Networks,1993.InternationalConferenceon
InformationEngineering'93.'Communicationsand
NetworksfortheYear2000',ProceedingsofIEEE
SingaporeInternationalConferenceon,vol.2,no.,
pp.507511vol.2,611Sep1993
13
The Internet
CGI
Web services
Tara Murphy
The Internet
CGI
Web services
Tara Murphy
The Internet
CGI
Web services
350
300
250
200
150
100
50
Au
g-
Au 81
g
Au -82
g
Au -83
g
Au -84
g
Au -85
g
Au -86
g
Au -87
g
Au -88
g
Au -89
g
Au -90
g
Au -91
g
Au -92
g
Au -93
g
Au -94
g
Au -95
g
Au -96
g
Au -97
g
Au -98
g
Au -99
g
Au -00
g
Au -01
g
Au -02
g
Au -03
g
Au -04
g05
Date
The Internet
CGI
Web services
Tara Murphy
The Internet
CGI
Web services
Tara Murphy
The Internet
CGI
Web services
Tara Murphy
The Internet
CGI
Web services
Web Server
HTTP/1.1 200 OK
Tara Murphy
The Internet
CGI
Web services
Tara Murphy
The Internet
CGI
Web services
10
Tara Murphy
The Internet
CGI
Web services
11
Server
Client
CGI Script
Browser
Query
Tara Murphy
The Internet
CGI
Web services
12
components
In other words, if an application can be accessed over a
Tara Murphy
The Internet
CGI
Web services
13
Tara Murphy
The Internet
CGI
Web services
14
HTML
Client/
Server
Server
Web Service
Browser
CGI
Query
Tara Murphy
Client
Query
The Internet
CGI
Web services
15
HTML
Client/
Server
Server
Web Service
Client
Browser
CGI
Query
Query
Result
Query
Server
Web Service
Tara Murphy
The Internet
CGI
Web services
16
Tara Murphy
The Internet
CGI
Web services
17
on the WWW
It tells the browser how to interpret and display the document
Different browsers interpret things differently (!)
There are two main standards: HTML 4(5) and XHTML 1.0
These are developed by W3C
using
Tara Murphy
The Internet
CGI
Web services
18
Hello world!
1
2
3
4
5
6
7
8
9
10
Tara Murphy
The Internet
CGI
Web services
19
Hello world!
Tara Murphy
The Internet
CGI
Web services
20
Tara Murphy
The Internet
CGI
Web services
21
Tara Murphy
Description
Starts and ends a HTML document
Text that appears in the title bar
Information about the document
The main part of the document
A paragraph
A horizontal line
A line break
A link
An image
Comments that are not displayed
The Internet
CGI
Web services
22
Tara Murphy
Description
A section in the document
An inline section in a document
An unordered list (bullet points)
An ordered list
A list item
Encloses a table
A row in a table
A cell within a row
Enclosed text that stays in its raw format
The Internet
CGI
Web services
23
documents
The two major browsers (Internet Explorer and Netscape)
Tara Murphy
The Internet
CGI
Web services
24
HTML tags
1
2
3
The Internet
CGI
Web services
25
2
1
2
3
4
5
Tara Murphy
<head>
<link href="css/mystyle.css" rel="stylesheet"
type="text/css" />
</head>
<body>
<p>Hello, World!</p>
</body>
The Internet
CGI
Web services
26
Tara Murphy
The Internet
CGI
Web services
27
References
http://www.computerhistory.org
http://www.anu.edu.au/people/Roger.Clarke/II/
OzIHist.html
HTML: http://www.w3.org/MarkUp/
HTML: http://www.w3schools.com/html/
XHTML: http://www.w3.org/MarkUp/2004/xhtml-faq
XHTML:
http://www.w3schools.com/xhtml/xhtml html.asp
CSS: http://www.w3.org/Style/CSS/
CSS: http://www.csszengarden.com/
Tara Murphy
NetworkSecurity:History,Importance,andFuture
UniversityofFloridaDepartmentofElectricalandComputerEngineering
BhavyaDaya
ABSTRACT
ofintellectualpropertythatcanbeeasilyacquired
throughtheinternet.
1. Historyofsecurityinnetworks
2. Internet architecture and vulnerable
securityaspectsoftheInternet
3. Types of internet attacks and security
methods
4. Securityfornetworkswithinternetaccess
5. Current development in network security
hardwareandsoftware
Theentirefieldofnetworksecurityisvastandinan
evolutionary stage. The range of study
encompasses a brief history dating back to
internetsbeginningsandthecurrentdevelopment
in network security. In order to understand the
research being performed today, background
knowledgeoftheinternet,itsvulnerabilities,attack
methods through the internet, and security
technology is important and therefore they are
reviewed.
INTRODUCTION
1. NetworkSecurity
Systemandnetworktechnologyisakeytechnology
forawidevarietyofapplications.Securityiscrucial
Toconsumeresourcesuselessly
To interfere with any system resources
intendedfunction
To gain system knowledge that can be
exploitedinlaterattacks
1. Accessauthorizedusersareprovidedthe
means to communicate to and from a
particularnetwork
2. ConfidentialityInformationinthenetwork
remainsprivate
3. Authentication Ensure the users of the
networkarewhotheysaytheyare
2
countermeasurestrategies[2].
Datasecurityistheaspectofsecuritythatallowsa
When transferring ciphertext over a network, it is from a variety of companies [3]. Since then,
helpfultohaveasecurenetwork.Thiswillallowfor informationsecuritycameintothespotlight.
the ciphertext to be protected, so that it is less
likely for many people to even attempt to break Public networks are being relied upon to deliver
the code. A secure network will also prevent financial and personal information. Due to the
someone from inserting unauthorized messages evolution of information that is made available
into the network. Therefore, hard ciphers are through the internet, information security is also
requiredtoevolve.DuetoKevinMitnicksoffense,
neededaswellasattackhardnetworks[2].
companies are emphasizing security for the
Internetprotocolsinthepastwerenotdeveloped
to secure themselves. Within the TCP/IP
communication stack, security protocols are not
implemented. This leaves the internet open to
attacks. Modern developments in the internet
architecture have made communication more
secure.
Figure1:BasedontheOSImodel,datasecurityandnetwork
securityhaveadifferentsecurityfunction[2].
1. BriefHistoryofInternet
2. SecurityTimeline
TheARPANETisasuccessfromtheverybeginning.
Although originally designed to allow scientists to
share data and access remote computers, email
quicklybecomesthemostpopularapplication.The
ARPANETbecomesahighspeeddigitalpost office
aspeopleuseittocollaborateonresearchprojects
and discuss topics of various interests. The
InterNetworking Working Group becomes the first
of several standardssetting entities to govern the
growing network [10]. Vinton Cerf is elected the
first chairman of the INWG, and later becomes
knownasa"FatheroftheInternet."[10]
INTERNETARCHITECTUREAND
VULNERABLESECURITYASPECTS
FearofsecuritybreachesontheInternetiscausing
organizationstouseprotectedprivatenetworksor
intranets [4]. The Internet Engineering Task Force
(IETF) has introduced security mechanisms at
various layers of the Internet Protocol Suite [4].
These security mechanisms allow for the logical
protectionofdataunitsthataretransferredacross
thenetwork.
Figure2:IPseccontainsagatewayandatunnelinordertosecurecommunications.[17]
1. IPv4andIPv6Architectures
Theinternetprotocolsdesignissovastandcannot
becoveredfully.Themainpartsofthearchitecture
relatingtosecurityarediscussedindetail.
1.1IPv4Architecture
1. AddressSpace
2. Routing
3. Configuration
4. Security
5. QualityofService
TheIPv4architecturehasanaddressthatis32bits
wide [6]. This limits the maximum number of
computers that can be connected to the internet.
The32bitaddressprovidesforamaximumoftwo
billionscomputerstobeconnectedtotheinternet.
The problem of exceeding that number was not
foreseenwhentheprotocolwascreated.Thesmall
addressspaceoftheIPv4facilitatesmaliciouscode
distribution[5].
Routingisaproblemforthisprotocolbecausethe
routingtablesareconstantlyincreasinginsize.The
maximum theoretical size of the global routing
tables was 2.1 million entries [6]. Methods have
been adopted to reduce the number of entries in
theroutingtable.Thisishelpfulforashortperiod
of time, but drastic change needs to be made to
addressthisproblem.
TheTCP/IPbasednetworkingofIPv4requiresthat
theusersuppliessomedatainordertoconfigurea
network. Some of the information required is the
IPaddress,routinggatewayaddress,subnetmask,
and DNS server. The simplicity of configuring the
network is not evident in the IPv4 protocol. The
user can request appropriate network
configuration from a central server [6]. This eases
1.2IPv6Architecture
1. Routingandaddressing
2. Multiprotocolarchitecture
3. Securityarchitecture
4. Trafficcontrol
TheIPv6protocolsaddressspacewasextendedby
supporting 128 bit addresses. With 128 bit
addresses, the protocol can support up to
3.4 10 ^38machines.Theaddressbitsareused
lessefficientlyinthisprotocolbecauseitsimplifies
addressingconfiguration.
6
Table1:AttackMethodsandSecurityTechnology[8]
ThesecurityarchitectureoftheIPv6protocolisof
great interest. IPsec is embedded within the IPv6
protocol. IPsec functionality is the same for IPv4
andIPv6.TheonlydifferenceisthatIPv6canutilize
thesecuritymechanismalongtheentireroute[6].
ThequalityofserviceproblemishandledwithIPv6.
Theinternetprotocolallowsforspecialhandlingof
certainpacketswithahigherqualityofservice.
2.1 CommonInternetAttackMethods
2. AttacksthroughtheCurrentInternet
ProtocolIPv4
personaldata,suchascreditcardnumbers,online
banking credentials, and other sensitive
Interception of communications by an information.
unauthorizedpartyiscalledeavesdropping.Passive
eavesdropping is when the person only secretly 2.1.6 IPSpoofingAttacks
listens to the networked messages. On the other
hand, active eavesdropping is when the intruder Spoofing means to have the address of the
listens and inserts something into the computermirrortheaddressofatrustedcomputer
communication stream. This can lead to the in order to gain access to other computers. The
messages being distorted. Sensitive information identity of the intruder is hidden by different
canbestolenthisway[8].
means making detection and prevention difficult.
2.1.1 Eavesdropping
2.1.7 DenialofService
2.2.1 Cryptographicsystems
2.1.4 Trojans
Trojansappeartobebenignprogramstotheuser,
but will actually have some malicious purpose.
Trojansusuallycarrysomepayloadsuchasavirus
[8].
2.2.2 Firewall
2.1.5 Phishing
Thenewinternetprotocoldoesnotprotectagainst
misconfigured
servers,
poorly
designed
applications,orpoorlyprotectedsites.
Thepossiblesecurityproblemsemergeduetothe
following[5]:
1. Headermanipulationissues
2. Floodingissues
3. Mobilityissues
HeadermanipulationissuesariseduetotheIPsecs
embedded functionality [7]. Extension headers
detersomecommonsourcesofattacksbecauseof
header manipulation. The problem is that
extension headers need to be processed by all
stacks, and this can lead to a long chain of
extension headers. The large number of extension
headers can overwhelm a certain node and is a
formofattackifitisdeliberate.Spoofingcontinues
tobeasecuritythreatonIPv6protocol.
Atypeofattackcalledportscanningoccurswhena
whole section of a network is scanned to find
potential targets with open services [5]. The
addressspaceoftheIPv6protocolislargebutthe
protocol is still not invulnerable to this type of
attack.
Mobilityisanewfeaturethatisincorporatedinto
the internet protocol IPv6. The feature requires
special security measures. Network administrators
need to be aware of these security needs when
usingIPv6smobilityfeature.
2.2.3 IntrusionDetectionSystems
AnIntrusionDetectionSystem(IDS)isanadditional
protection measure that helps ward off computer
intrusions. IDS systems can be software and
hardware devices used to detect an attack. IDS
products are used to monitor connection in
determining whether attacks are been launched.
Some IDS systems just monitor and alert of an
attack,whereasotherstrytoblocktheattack.
2.2.4 AntiMalwareSoftwareandscanners
Viruses,wormsandTrojanhorsesareallexamples
ofmalicioussoftware,orMalwareforshort.Special
socalled antiMalware tools are used to detect
themandcureaninfectedsystem.
2.2.5 SecureSocketLayer(SSL)
TheSecureSocketLayer(SSL)isasuiteofprotocols
that is a standard way to achieve a good level of
securitybetweenawebbrowserandawebsite.SSL
is designed to create a secure channel, or tunnel,
between a web browser and the web server, so
thatanyinformationexchangedisprotectedwithin
thesecuredtunnel.SSLprovidesauthenticationof
clients to server through the use of certificates.
Clientspresentacertificatetotheservertoprove
theiridentity.
SECURITYINDIFFERENTNETWORKS
3. SecurityIssuesofIPProtocolIPv6
Thebusinessestodayusecombinationsoffirewalls,
encryption, and authentication mechanisms to
create intranets that are connected to the
internetbutprotectedfromitatthesametime.
Fromasecuritypointofview,IPv6isaconsiderable
advancement over the IPv4 internet protocol.
Despite the IPv6s great security mechanisms, it
still continues to be vulnerable to threats. Some
9
Itwasmentionedthatiftheintranetwantedaccess
to the internet, virtual private networks are often
used.Intranetsthatexistacrossmultiplelocations
generallyrunoverseparateleasedlinesoranewer
approach of VPN can be utilized. VPN is a private
network that uses a public network (usually the
Internet)toconnectremotesitesoruserstogether.
Insteadofusingadedicated,realworldconnection
such as leased line, a VPN uses "virtual"
connections routed through the Internet from the
company's private network to the remote site or
employee.Figure3isagraphicalrepresentationof
anorganizationandVPNnetwork.
Figure3:AtypicalVPNmighthaveamainLANatthecorporate
headquartersofacompany,otherLANsatremoteofficesor
facilitiesandindividualusersconnectingfromoutinthefield.[14]
CURRENTDEVELOPMENTSINNETWORK
SECURITY
1. HardwareDevelopments
10
ThemainuseofBiometricnetworksecuritywillbe
to replace the current password system.
Maintainingpasswordsecuritycanbeamajortask
for even a small organization. Passwords have to
be changed every few months and people forget
their password or lock themselves out of the
system by incorrectly entering their password
repeatedly.Veryoftenpeoplewritetheirpassword
down and keep it near their computer. This is of
course completely undermines any effort at
network security. Biometrics can replace this
security identification method. The use of
biometric identification stops this problem and
while it may be expensive to set up at first, these
devicessaveonadministrationanduserassistance
costs.
provideundeniableproofofausersidentity.Smart
cardscanbeusedforeverythingfromlogginginto
the network to providing secure Web
communicationsandsecureemailtransactions.
Buttheinterestingthingiswhathappenswhenthe
userinputsthePIN.ThePINisverifiedfrominside
the smart card. Because the PIN is never
transmittedacrossthenetwork,theresabsolutely
no danger of it being intercepted. The main
benefit, though, is that the PIN is useless without
the smart card, and the smart card is useless
withoutthePIN.
2. SoftwareDevelopments
11
ofwherethesecuritysoftwareisheadingbasedon
emphasisbeingplacednow.
Asthesecurityhardwaretransitionstobiometrics,
the software also needs to be able to use the
information appropriately. Current research is
beingperformedonsecuritysoftwareusingneural
networks. The objective of the research is to use
neuralnetworksforthefacialrecognitionsoftware.
Manysmallandcomplexdevicescanbeconnected
to the internet. Most of the current security
algorithmsarecomputationalintensiveandrequire
substantial processing power. This power,
however, is not available in small devices like
sensors. Therefore, there is a need for designing
lightweight security algorithms. Research in this
areaiscurrentlybeingperformed.
FUTURETRENDSINSECURITY
CONCLUSION
Originallyitwasassumedthatwiththeimportance
of the network security field, new approaches to
security, both hardware and software, would be
activelyresearched.Itwasasurprisetoseemostof
the development taking place in the same
technologies being currently used. The embedded
security of the new internet protocol IPv6 may
provide many benefits to internet users. Although
some security issues were observed, the IPv6
internet protocol seems to evade many of the
currentpopularattacks.CombineduseofIPv6and
securitytoolssuchasfirewalls,intrusiondetection,
andauthenticationmechanismswillproveeffective
in guarding intellectual property for the near
future. The network security field may have to
evolvemorerapidlytodealwiththethreatsfurther
inthefuture.
REFERENCES
[1]Dowd,P.W.;McHenry,J.T.,"Networksecurity:it's
timetotakeitseriously,"Computer,vol.31,no.9,pp.24
28,Sep1998
[2]Kartalopoulos,S.V.,"DifferentiatingDataSecurity
andNetworkSecurity,"Communications,2008.ICC'08.
IEEEInternationalConferenceon,pp.14691473,1923
May2008
[3]SecurityOverview,
www.redhat.com/docs/manuals/enterprise/RHEL4
Manual/securityguide/chsgsov.html.
[4]Molva,R.,InstitutEurecom,InternetSecurity
Architecture,inComputerNetworks&ISDNSystems
Journal,vol.31,pp.787804,April1999
12
[5]Sotillo,S.,EastCarolinaUniversity,IPv6security
issues,August2006,
www.infosecwriters.com/text_resources/pdf/IPv6_SSot
illo.pdf.
[6]AndressJ.,IPv6:thenextinternetprotocol,April
2005,www.usenix.com/publications/login/2005
04/pdfs/andress0504.pdf.
[7]WarfieldM.,SecurityImplicationsofIPv6,Internet
SecuritySystemsWhitePaper,
documents.iss.net/whitepapers/IPv6.pdf
[8]Adeyinka,O.,"InternetAttackMethodsandInternet
SecurityTechnology,"Modeling&Simulation,2008.
AICMS08.SecondAsiaInternationalConferenceon,
vol.,no.,pp.7782,1315May2008
[9]Marin,G.A.,"Networksecuritybasics,"Security&
Privacy,IEEE,vol.3,no.6,pp.6872,Nov.Dec.2005
[10]InternetHistoryTimeline,
www3.baylor.edu/~Sharon_P_Johnson/etg/inthistory.h
tm.
[11]Landwehr,C.E.;Goldschlag,D.M.,"Securityissues
innetworkswithInternetaccess,"Proceedingsofthe
IEEE,vol.85,no.12,pp.20342051,Dec1997
[12]"Intranet."Wikipedia,TheFreeEncyclopedia.23
Jun2008,10:43UTC.WikimediaFoundation,Inc.2Jul
2008
<http://en.wikipedia.org/w/index.php?title=Intranet&ol
did=221174244>.
[13]"Virtualprivatenetwork."Wikipedia,TheFree
Encyclopedia.30Jun2008,19:32UTC.Wikimedia
Foundation,Inc.2Jul2008
<http://en.wikipedia.org/w/index.php?title=Virtual_priv
ate_network&oldid=222715612>.
[14]Tyson,J.,HowVirtualprivatenetworkswork,
http://www.howstuffworks.com/vpn.htm.
[15]AlSalqan,Y.Y.,"FuturetrendsinInternetsecurity,"
DistributedComputingSystems,1997.,Proceedingsof
theSixthIEEEComputerSocietyWorkshoponFuture
Trendsof,vol.,no.,pp.216217,2931Oct1997
[16]Curtin,M.IntroductiontoNetworkSecurity,
http://www.interhack.net/pubs/networksecurity.
[17]ImprovingSecurity,
http://www.cert.org/tech_tips,2006.
[18]Serpanos,D.N.;Voyiatzis,A.G.,"Securenetwork
design:Alayeredapproach,"AutonomousDecentralized
System,2002.The2ndInternationalWorkshopon,vol.,
no.,pp.95100,67Nov.2002
[19]Ohta,T.;Chikaraishi,T.,"Networksecuritymodel,"
Networks,1993.InternationalConferenceon
InformationEngineering'93.'Communicationsand
NetworksfortheYear2000',ProceedingsofIEEE
SingaporeInternationalConferenceon,vol.2,no.,
pp.507511vol.2,611Sep1993
13
5. What should come in place of the question mark (?) in the following question?
6573 (70% of 30) (0.2)2 = ?
a. 7825
b. 62.6
c. 1565
d. 12.52
e. None of these
6. What should come in place of the question mark (?) in the following question?
? 26 65 = 50% of 2,210
a. 424
b. 478
c. 456
d. 442
e. None of these
7. What should come in place of the question mark (?) in the following question
(7921) 51 + 50% of 748 = (?)3
a. 16
b. 19
c. 15
d. 21
e. None of these
2 +21
10. What approximate value will come in place of the question mark (?) in the following questions? (You
are not expected to calculate the exact value.)
79.99% of 1599 16.01% of 1399 =?
a. 856
b. 976
c. 1056
d. 1256
e. 1176
11. What is the remainder when 587 is divided by 625?
a. 11
b. 120
c. 0
d. 125
e. None of these
12. Present age of Sudha and Neeta are in the ratio of 6 : 7 respectively. Five years ago their ages were in
the ratio of 5 : 6 respectively. What is the Sudha's present age?
a. 22
b. 41
c. 14
d. 32
e. None of these
13. The average of the sum of three consecutive even numbers and three consecutive odd numbers is 21.
If the highest even number is 16, what is the lowest odd number?
a. 5
b. 7
c. 9
d. 11
e. Data Incorrect
14. What should come in place of the question mark (?) in the following number series?
7
17
54
?
1098
6591
a. 204
b. 212
c. 223
d. 219
e. None of these
3|Page
15. What should come in place of question mark (?) in the following number series?
10
17
48
165 688 3275 ?
a. 27584
b. 25670
c. 21369
d. 20892
e. None of these
16. What will come in place of the question mark (?) in the following number series?
7
11
27
63
?
a. 96
b. 111
c. 99
d. 127
e. None of these
17. In the following number series only one number is wrong. Find out the wrong number.
19
68
102 129 145 154
a. 154
b. 129
c. 145
d. 102
e. None of these
18. Find the next term in the given series in each of the questions below.
336, 210, 120, ?,
24, 6,
0
a. 40
b. 50
c. 60
d. 70
e. None of these
19. A horse worth Rs. 15000 is sold by A to B at 10% profit. B sells the horse back to A at 5% loss. Then, in
the entire transaction.
a. A loses Rs. 825
b. A gains Rs. 825
c. A loses Rs. 425
d. A gains Rs. 425
e. None of these
4|Page
20. If a team of 4 persons is to be selected from 8 males and 8 females, then in how many ways can
selections be made to include at least 1 female.
a. 3500
b. 1875
c. 1750
d. Cannot be determined
e. None of these
Directions: Study the following graph carefully and answer the questions given below it.
Total number of candidates appeared and qualified from various cities in an exam
Apperead
Qualified
Number of Candidates
3500
3000
2500
2000
1500
1000
500
0
A
Cities
21. The average number of candidates qualified in the examination from cities C and D together are what
percent of the average number of candidates appeared in the examination from the same cities? (
Rounded off to two digits after decimal)
a. 58.62
b. 73.91
c. 62.58
d. 58.96
e. None of these
22. What is the respective ratio of the number of students appeared to the number of candidates
qualified in the exam from City C?
a. 12 : 7
b. 6 : 5
c. 13 : 9
5|Page
d. 9 : 13
e. None of these
23. What is the respective ratio of the number of candidates qualified in the examination from city A and
the number of candidates qualified in the examination from city B?
a. 8 : 3
b. 7 : 5
c. 7 : 3
d. 9 : 5
e. None of these
24. The number of candidates appeared in the exam from City D are approximately what percent of the
total number of candidates appeared for the exam from all the Cities together?
a. 12
b. 24
c. 29
d. 18
e. 8
25. What is the difference between the average number of candidates appeared in the exam from all
given cities and the average number of candidates qualified from all the given cities?
a. 950
b. 1100
c. 990
d. 1020
e. None of these
26. The profit earned when an article is sold for Rs. 800 is 20 times the loss incurred when it is sold for Rs.
275. At what price should the article be sold if it is desired to make a profit of 25%.
a. Rs. 325
b. Rs. 350
c. Rs. 375
d. Rs. 400
e. Rs. 425
27. Aisha and Palak can do a piece of work in 25 and 20 days respectively. They began the work together
but Palak left after some days and Aisha completed the rest of the work in 16 days. After how many
days did Palak leave?
a. 7 days
b. 4 days
c. 9 days
d. 12 days
6|Page
e. None of these
28. The length of a room is 1.5 times its breadth. The cost of carpeting it at Rs. 150 per sq. meter is Rs.
14400 and the cost of white-washing the four walls at Rs. 5 per sq. meter is Rs. 625. Find the length
of the room.
a. 16 m
b. 12 m
c. 14 m
d. 10 m
e. None of these
29. A lion sees a deer. It estimate that the deer is 40 leaps away. The deer sees the lion and starts running,
with the lion in hot pursuit. If in every minute, the lion makes 6 leaps and the deer makes 8 leaps and
one leap of the lion is equal to 2 leaps of the deer. Find the time in which the deer is caught by the
lion (assume an open field with no trees)
a. 12 minutes
b. 15 minutes
c. 12.5 minutes
d. 20 minutes
e. None of these
30. A shopkeeper sold 12 cameras at a profit of 20% and 8 cameras at a profit of 10%. If he had sold all
the 20 cameras at a profit of 15%, then his profit would have been reduced by Rs. 36. What is the cost
price of each camera?
a. Rs 180
b. Rs 370
c. Rs 160
d. Rs 245
e. None of these
Directions: Study the pie chart carefully to answer the following questions:
7|Page
Dancing,
24 %
Craft , 25 %
Drawing , 14 %
Singing,
21 %
Swimming,
16 %
Dancing,
20 %
Singing,
28 %
Craft ,
22 %
Drawing ,
16 %
Swimming,
14 %
31. What is the approximate percentage of boys qualified for the first round in the Inter-school
competition?
a. 34
8|Page
b.
c.
d.
e.
56
28
50
42
32. How many boys did qualify the first round in Singing and Craft together?
a. 505
b. 610
c. 885
d. 720
e. None of these
33. What is the total number of girls who qualify the first round in Swimming and Drawing together?
a. 480
b. 525
c. 505
d. 495
e. None of these
34. Number of girls who qualified for the first round in Dancing is what percent of total number of
students, qualified for the first round in the Inter-school competition?
a. 12.35
b. 14.12
c. 11.67
d. 10.08
e. None of these
35. What is the respective ratio of number of girls qualified the first round in Swimming to the number of
boys qualified the first round in Swimming?
a. 47 : 49
b. 23 : 29
c. 29 : 23
d. 49 : 47
e. None of these
Reasoning Ability
36-40. Directions: Study the following information carefully and answer the given questions.
In a certain code language ja hu fi means Box is empty, ka hu ni ma means Box full of chocolates, fi
ni na mi means He is eating chocolates, ka ba na fi ma means He is full of enthusiasm.
9|Page
L is the father of Q.
41. Who is the uncle of O?
a. R
b. L
c. G
d. Q
e. N
42. Who is the father of N?
a. G
b. R
c. Q
d. N
e. Cannot be determined
43. How many male members are there in the family?
a. 2
b. 3
c. 4
d. 1
e. Cannot be determined
44-45. Directions: Study the following information carefully and answer the questions given below.
There are five students by name Pushkar, Ashu, Pranshu, Chetna and Sakshi each securing different
marks in a subject. Ashu secured more marks than only Pranshu. Sakshi and Chetna secured less marks
than only Pushkar.
44. Who among them secured third least marks?
a. Pushkar
b. Chetna
c. Ashu
d. Cannot be determined
e. None of these
45. If Pushkar secured 80 marks and Chetna secured 65 marks then what is the possibility of Sakshis
marks?
a. 78
b. 63
c. 60
11 | P a g e
d. Cannot be determined
e. None of these
46. Directions: In the question, relationship between different elements is shown in the statements.
The statements are followed by four conclusions. Give answer.
Statements:
H = P, Y M, M W, P < Y
Conclusions:
I. W > Y
II. M < P
III. M H
a. None is true
b. Only I is true
c. Only II is true
d. Only III is true
e. Only I and II is true
47. Directions: In the question, relationship between different elements is shown in the statements.
The statements are followed by two conclusions.
Statements:
E C = B; D = C M > N
Conclusions:
I) D = B
II) N E
III) N > E
a. Only (I)
b. Only (I) and either (II) or (III)
c. Both (I) and (III)
d. Both (I) and (II)
e. None of these
48. Directions: In this question, the relationship between different elements is shown in the
statements. These statements are followed by three conclusions. Mark your answer from the given
options.
Statements:
L M > K, Z = K < P
Conclusions:
I. Z L
II. M = P
III. Z < M
12 | P a g e
a.
b.
c.
d.
e.
Only I is true
Only II is true
Only III is true
Both I and III are true
None of these
49. Directions: In the question, relationship between different elements is shown in the statements.
The statements are followed by two conclusions.
Statements:
B J; K < L > M; J < K; G H > B
Conclusions:
I. L > J
II. J < M
a. Only conclusion I is true.
b. Only conclusion II is true.
c. Either conclusion I or II is true.
d. Neither conclusion I nor II is true.
e. Both the conclusion I and II are true.
50. Directions: In the question, relationship between different statements is shown in the statements.
These statements are followed by conclusions.
Statements:
P> U V >R; X < Y = R> Z
Conclusions:
I. Z > U
II. R < P
a. Only conclusion I follows.
b. Only conclusion II follows.
c. Either conclusion I or conclusion II follows.
d. Neither conclusion I nor conclusion II follows.
e. Both conclusion I and II follow.
51. Directions: In the following question, three statements are given followed by four conclusions I, II,
III and IV. You have to consider the given statements to be true even, if they seem to be at variance
with commonly known facts. Read all the conclusions and decide which of the following logically
follows from the given statements disregarding the commonly known facts.
Statements:
All forests are towns.
All towns are villages.
13 | P a g e
a.
b.
c.
d.
e.
60. Who among the following sits between B and owner of Apple?
a. A
b. E
c. G
d. D
e. H
61-65. Directions: Study the following information carefully and answer the questions given below.
Ten persons A, B, C, D, E, F, G, H, J and K are sitting in two rows with five persons in each row. The
persons in row one are facing south and the persons in row two are facing north. Each person in row
one faces a person from the other row. All of them have a mobile of different companies, viz M1, M2,
M3, M4, M5, M6, M7, M8, M9 and M10, but not necessarily in the same order.
The persons who like M5 and M6 sit opposite each other. F sits opposite A, who likes M1. The one who
likes M2 sits opposite the one who likes M8. K is not facing north but sits third to the left of G, who likes
M2. There is only one person between B and C. E sits at one of the ends of the row and likes M6. The
one who likes M8 is on the immediate right of D, who does not like M10.
The persons who like M3 and M4 respectively are not facing north. C likes M7. The one who likes M4 sits
opposite the one who is second to the right of B. J does not like M10. E sits opposite the one who sits
second to the left of the one who likes M3.
61. Four of the following five are alike in a certain way and hence form a group. Which is the one that
does not belong to that group?
a. H, G
b. E, C
c. D, B
d. K, J
e. J, C
62. Which of the following statements is/are true?
a. H have M10 and sits at one of the ends of the row.
b. F is the immediate neighbour of G and the person who have M5.
c. The one who have M7 sits on the immediate left of the one who have M6.
d. Only a) and c) are true
17 | P a g e
b.
c.
d.
e.
67. Which of the following combinations is definitely false regarding their schedule?
a. G3-C2-R1
b. G4-C7-R2
c. G1-C4-R4
d. G7-C6-R3
e. None of these
68. Who sings R6 song?
a. G7
b. G4
c. G2
d. Either G2 or G7
e. None of these
69. If G7 is related to C2, G5 is related to C3, which of the following is G4 related to?
a. C5
b. C6
c. C4
d. C7
e. None of these
70. Which of the following combinations is true?
a. G1s performance was held on the fifth day of the week.
b. G5 likes C6 color.
c. G4 sings R1 song.
d. G5s performance was scheduled before G3 but after G6.
e. None of these.
English Language
71-80. Directions: Read the passage given below and then answer the questions given below the
passage. Some words may be highlighted for your attention. Pay careful attention.
19 | P a g e
India is right now in the midst of an inflationary episode that has gone on for 17 months. It began in
December 2009, when the WPI inflation climbed to 7.15%, it continued to rise, peaked in April 2010, at
just short of 11%. Thereafter, it has been on a broadly downward trajectory. What has caused some
concern once again is that there was a small pick-up in inflation in December 2011 and also because the
downward trajectory has been disappointingly slow. Before this 17-month run, we had one year of
negligible inflation; but just prior to that there was another rally from March 2008 to December 2008,
when WPI inflation hovered in and around 10%. Before these two rallies in quick succession, India had
very little inflation for a dozen years. There were occasional months when inflation would exceed 8% and
not a single month when it was in double digits during these twelve years of relative price stability.
For reasons of completeness it may be mentioned that independent Indias highest inflation occurred in
September 1974, when inflation reached 33.3%. Arguably our worst inflationary episode was from
November 1973 to December 1974, when inflation never dropped below 20% and was above 30% for four
consecutive months starting June 1974.
What is good performance and what is bad depends on the yardstick. Even during the dozen years of price
stability we had more inflation than in virtually any industrialized country in recent times, but in
comparison to most emerging market economies and developing nations in the world, Indias
performance was creditable.
One reason for the concern with the past 17 months inflation-run is the fact that since the mid nineteen
nineties and all the way till 2006 we had price stability. This concern has led to the talk of runaway inflation
and hyperinflation. It is however important to get the perspective right. We are nowhere near
hyperinflationusually described as inflation over 50% per month (Cagan, 1956). The worlds biggest
inflations occurred in Europe, once around 1923 and again around 1946. The record is held by Hungary
from August 1945 to July 1946. During these twelve months, prices rose by 3.8 1027 . That is, what cost
1 pengo on August 1st, 1945, would cost 38000 (a total of 26 such zeroes) pengos on 31 July 1946. In
August 1946 the pengo was replaced with the forint in an effort to shed the trillions of zeroes that were
needed to express prices in pengos.
Comparable inflations have occurred in Russia from December 1921 to January 1924, in Greece in 1943,
in Zimbabwe in 2008, in Germany in 1923 and in many other instances. The German hyperinflation of
1923 may well be the most analyzed and diagnosed inflation. It played havoc with the economy, created
political tensions which contributed to the rise of Nazism, and also caused psychological disturbances.
Doctors in Germany in 1923 identified a mental illness called cipher stroke which many people were
afflicted with during the height of the hyperinflation. It referred to a neurotic urge to keep writing zeroes
and also to a propensity to meaninglessly add zeroes when responding to routine questions, such as to
say two trillion when asked how many children the person has (Ahamed, 2009).
Not quite as large as these European inflations but nevertheless staggeringly big ones occurred till two or
20 | P a g e
three decades ago in many Latin American countries (see Garcia, Guillen and Kehoe, 2010). These being
closer to our times and having an economy which is progressing gradually, may have greater relevance to
us. One country that has coped with mega inflations, many times larger than what we have in India, and
seems to have at last stabilized, and is now among the forerunners of well-run economies among
emerging market economies, is Brazil.
71. When did the current inflationary period start in India and for how long has it existed?
a. December 2010; 17 months
b. December 2009; 17 months
c. December 2010; 18 months
d. December 2009; 18 months
e. January 2009; 17 months
72. Choose the correct meaning of the word trajectory as used in the passage?
a. Station
b. Crossroad
c. Road
d. Course
e. Immobility
73. Which year did independent India achieve the highest inflation and at what rate?
a. September 1974; 33.6%
b. August 1984; 33.6%
c. August 1974; 33.3%
d. September 1984; 36.3%
e. September 1974; 33.3%
74. Choose the correct meaning of the word succession as used in the passage.
a. Accession
b. Promotion
c. Sequence
d. Elevation
e. Advancement
75. What was identified as a psychological disease due to inflation and in which year?
a. Cipher stroke in 1923
b. Schizophrenia in 1923
c. Oedipus complex in 1823
21 | P a g e
d. Dementia in 1900
e. Kleptomania in 1920
76. Choose the correct meaning of the word yardstick as used in the passage.
a. Paradigm
b. Hypothesis
c. Umbrage
d. Offensive
e. Standard
77. Why are the inflations in Latin American countries more relevant to the Indian economy than those
in Europe?
a. Latin American countries and India share similar economic conditions and the reason behind
inflation in Latin American countries are similar to that in India.
b. India and Latin American countries share similar economic patterns and Latin American
countries have faced the inflations in recent times closer to the time period when India faced
inflation.
c. Both India and Latin American countries are developing economies and the inflation periods
faced by them are closer in time than those faced by the developed European countries.
d. Inflations in Latin American countries are not at all relevant to those in India.
e. India being more developed economy wise than most Latin American countries do not have any
inflation issues.
78. Choose the correct meaning of the word afflicted as underlined in the paragraph in context to the
whole from the given options.
a. Troubled
b. Burdened
c. Patient
d. Abandoned
e. Enduring
79. Which one of the following statements is true in the context of the passage?
a. The inflation rate in India was around 10% in April 2010 and then started going down.
b. India is isolated from the world economy.
c. India was under a deflationary stage prior to 2010 but the rate has gone up since then.
d. The Indian economy is highly stabilized and hyperinflation is not present.
22 | P a g e
e. After April 2010, the Indian economy started facing hyperinflation as inflation rates continued to
increase.
80. What is the major theme discussed in the passage?
a. Various forms of inflation.
b. Comparison of inflation rates in India at present with that of the past.
c. Comparison of inflation rates in India with that of other emerging countries.
d. Concerns about inflation in the Indian economy.
e. Both 1 and 4.
81-85. Directions: Rearrange the following six sentences A, B. C, D, E and F in a proper sequence to
form a meaningful paragraph and then answer the questions given below.
A. The bank said in a statement that customers can log into its website and avail personal loans in a
minute.
B. This facility neither requires the customer to visit the branch nor does he have to put his manual
signature on any document.
C. Upon the acceptance of the offer by the customer, the loan money is credited to his account
immediately.
D. Moreover, the facility can be accessed round the clock.
E. The first phase of the launch will see this product being rolled out to our existing select customers
pan India.
F. Digital personal loans comes as third in the series of BYOM (Be Your Own Master) digital retail loans
the bank has rolled out, previous offerings being digital car loans and loan against term deposit.
81. Which of the following should be the THIRD sentence after rearrangement?
a. B
b. F
c. C
d. E
e. A
82. Which of the following should be the FIRST sentence after rearrangement?
a. F
b. B
c. C
d. A
e. E
83. Which of the following should be the FIFTH sentence after rearrangement?
a. A
23 | P a g e
b.
c.
d.
e.
B
C
F
E
84. Which of the following should be the FOURTH sentence after rearrangement?
a. A
b. B
c. C
d. D
e. E
85. Which of the following should be the SECOND sentence after rearrangement?
a. A
b. B
c. C
d. D
e. F
86-90. Directions: Below, a passage is given with five blanks labelled (A)-(E). Below the passage, five
options are given for each blank. Choose the word that fits each blank most appropriately in the
context of the passage, and mark the corresponding answer.
Gita Press, and the monthly magazine it published, Kalyan, were ___(A)___ in the mid-1920. Most
such ___(B)___ of that era are now___(C)___ ,except these two. As of early 2014, the press had sold 72
million copies of Tulsidas Ramcharitmanas and other works, and 94.8 million copies of ___(D)___ on
the ideal Hindu woman and child. As of today, Kalyan has a circulation of over 2, 00,000 and its
English ___(E)___ Kalyan-Kalpataru, over 1,00,000.
86. Which of the following words most appropriately fits the blank labelled (A)?
a. Founded
b. Invented
c. Generated
d. Foreseen
e. Consecrated
87. Which of the following words most appropriately fits the blank labelled (B)?
a. Investments
b. Experiments
c. Propositions
d. Ventures
24 | P a g e
e. Deals
88. Which of the following words most appropriately fits the blank labelled (C)?
a. Inanimate
b. Defunct
c. Departed
d. Exterminated
e. Existing
89. Which of the following words most appropriately fits the blank labelled (D)?
a. Leaflet
b. Thesauruses
c. Telegrams
d. Monographs
e. Musings
90. Which of the following words most appropriately fits the blank labelled (E)?
a. Contemporary
b. Replica
c. Transcript
d. Message
e. Counterpart
91-95. Read each sentence to find out whether there is any error in it. The error, if any, will be in one
part of the sentence. The number of that part is the answer. If there is no error, the answer is (e).
Ignore errors of punctuation, if any.
91. My sister-in-law (a)/ along with her daughter (b)/ were present (c)/ at the party. (d)/ No Error (e)
92. The teacher said that each students (a)/ would receive a failing grade (b)/ unless they (c)/ owned up
to the prank. (d)/ No Error (e)
93. The greatest love songs (a)/ are not written (b)/ from the brain (c)/ and from the heart. (d)/ No Error
(e)
94. English is (a)/ the toughest and the (b)/ easier language to (c)/ learn in the world. (d)/ No Error (e)
95. Audrey was the (a)/epitome of all things (b)/ beautiful and familiar, (c)/ because distant. (d)/ No
Error (e)
25 | P a g e
96-100. Each of the questions below has two blanks, each blank indicating that something has been
omitted. Choose the set of words for each blank which best fit the meaning of the sentence as a
whole.
96. The house was found in ______ and he was believed to be absconding with a ______ of valuable
jewellery.
a. woods, truck
b. shambles, load
c. unlocked state, load
d. disarray, haul
e. untouched, bundle
97. ______ and ______ should not be tolerated in our country which speaks of Ahimsa as its principle
of life.
a. Politicking, elections
b. Dishonour, efficiency
c. Lethargy, procrastination
d. Nepotism, selfishness
e. Hatred, violence
98. An efficient management will decide not only the _________ for equipment but also its ______ for
deciding priorities.
a. technology, methodology
b. cost, value
c. usefulness, utility
d. need, urgency
e. requirement, necessities
99. Now that the mammoth is extinct, the elephant is the _________ and the _______ of all animals
living.
a. Largest, Weakest
b. Largest, Lightest
c. Largest, Strongest
d. Largest, Smallest
e. Largest, Delicacy
100. There is no _____ to ______.
a. way, hell
b. shame, people
26 | P a g e
c. tragedy, stories
d. shortcut, success
e. number, venue
27 | P a g e