Вы находитесь на странице: 1из 10

ANS 2 Listing any 5 measures to prevent cyber crime

Nearly two thirds of web users across the world have been the victim of cybercrime. If
you are a Wi-Fi user, chances are you would have fallen or will fall prey to cybercrime at
some point. Although viruses can be easily eliminated with the help of an IT Support
company, it is far more important that you learn how to adopt security measures that will
prevent you from becoming victims of cybercrime.
Wi-Fi in a Nutshell
Wi-Fi wireless technology is one of the greatest technological advancements since the
Internet. It provides mobility to computers and it is used in the office, at home and in
public places. A Wi-Fi enabled device such as a computer or smart phone can connect
to the Internet when it is within range of a wireless network that is connected to the
Internet. It also allows communications directly from one computer to another with the
involvement of an access point. Unfortunately, several problems can arise when
computers transmit unsecured information to one another.

What is Cybercrime?
Cybercrime refers to illegal activities that take place online. These include fraud, spam,
drug trafficking, identity theft, sexual predators, computer viruses, cyber stalking,
spyware and phishing schemes. Although most people fall prey to these crimes at any
one point, you can avoid them by securing your computer.
Preventing Cybercrime
1. Wireless Equivalent Privacy (WEP)
Install WEP because it authenticates anyone who wants to access the wireless network
and encrypts all traffic. There are two versions of WEP, the stronger 128-bit and the
older and weaker 40-bit. The 128-bit version may be stronger but not all wireless
devices on the network might support it. Although WEP is not perfect and may be
defeated with advanced software, it can prevent unauthorised front door entry.
2. Choose a Strong WEP Password
Simply put, a weak password can easily compromise WEP security. Its easy to choose
a strong WEP password. All you have to do it avoid using sequences or repeated
characters, personal information such as birthdays and phone numbers as well as
dictionary words in any language. Use long passwords with combinations of upper and
lower case letters together with numbers and other characters instead.
3. Install Firewall
Firewall software prevents hackers from getting into your computer system so be sure
to always have this switched on. To access your firewall settings, go to Windows
Control Panel and click on Firewall.
4. Turn On Spam Blocker
Internet providers often offer a spam-blocking feature. Spam blockers prevent unwanted
messages such as fraudulent and phishing emails from getting into your inbox. Keep
the spam blocker on.
5. Turn Off Remote Administrator
Most wireless local area network routers come with a feature that allows the network
administrator to remotely configure the router. Keep this feature switched off unless
necessary because leaving it enabled could render the network vulnerable.
6. Use Virtual Private Network (VPN)
VPNs form a private network that uses a public network to connect remote site users to
one another. VPNs offer security as they use authenticated links to ensure that only
authorised users can connect to a network. In addition, they use encryption to make
sure that others cannot intercept and use the data that travels over the Internet.
7. Install Anti-virus Software
Make sure you have adequate anti-virus software for your computer. Some of these
software include McAfee, Norton and Stopzilla. Installing anti-virus software is only the
first step in protecting your computer. It is important to do a once a week scan and
regularly update the software.
8. Monitor your Childrens Online Activities
Children should only have access to a computer located in a central area of your home
so that you can keep an eye on their activities. Regularly check all browser and email
activity. It would also be a good idea to use parental control software that limits the
types of sites that they can gain access to.



ANS 3 (a)Kurt Lewin's Change Model
Kurt Lewin developed a change model involving three steps: unfreezing, changing
and refreezing. The model represents a very simple and practical model for
understanding the change process. For Lewin, the process of change entails creating
the perception that a change is needed, then moving toward the new, desired level of
behavior and finally, solidifying that new behavior as the norm. The model is still widely
used and serves as the basis for many modern change models.
Unfreezing
Before you can cook a meal that has been frozen, you need to defrost or thaw it out.
The same can be said of change. Before a change can be implemented, it must go
through the initial step of unfreezing. Because many people will naturally resist change,
the goal during the unfreezing stage is to create an awareness of how the status quo, or
current level of acceptability, is hindering the organization in some way. Old behaviors,
ways of thinking, processes, people and organizational structures must all be carefully
examined to show employees how necessary a change is for the organization to create
or maintain a competitive advantage in the marketplace. Communication is especially
important during the unfreezing stage so that employees can become informed about
the imminent change, the logic behind it and how it will benefit each employee. The idea
is that the more we know about a change and the more we feel it is necessary and
urgent, the more motivated we are to accept the change.
Changing
Now that the people are 'unfrozen' they can begin to move. Lewin recognized that
change is a process where the organization must transition or move into this new state
of being. This changing step, also referred to as 'transitioning' or 'moving,' is marked by
the implementation of the change. This is when the change becomes real. It's also,
consequently, the time that most people struggle with the new reality. It is a time
marked with uncertainty and fear, making it the hardest step to overcome. During the
changing step people begin to learn the new behaviors, processes and ways of thinking.
The more prepared they are for this step, the easier it is to complete. For this reason,
education, communication, support and time are critical for employees as they become
familiar with the change. Again, change is a process that must be carefully planned and
executed. Throughout this process, employees should be reminded of the reasons for
the change and how it will benefit them once fully implemented.
Refreezing
Lewin called the final stage of his change model freezing, but many refer to it as
refreezing to symbolize the act of reinforcing stabilizing and solidifying the new state
after the change. The changes made to organizational processes, goals, structure,
offerings or people are accepted and refrozen as the new norm or status quo. Lewin
found the refreezing step to be especially important to ensure that people do not revert
back to their old ways of thinking or doing prior to the implementation of the change.
Efforts must be made to guarantee the change is not lost; rather it needs to be
cemented into the organization's culture and maintained as the acceptable way of
thinking or doing. Positive rewards and acknowledgment of individualized efforts are
often used to reinforce the new state because it is believed that positively reinforced
behavior will likely be repeated.
Some argue that the refreezing step is outdated in contemporary business due to the
continuous need for change. They find it unnecessary to spend time freezing a new
state when chances are it will need to be reevaluated and possibly changed again in the
immediate future. However - as I previously mentioned - without the refreezing step,
there is a high chance that people will revert back to the old way of doing things. Taking
one step forward and two steps back can be a common theme when organizations
overlook the refreezing step in anticipation of future change.
Apply Lewin's Three Steps
To better understand Lewin's change model, let's take a look at the following example.
Kiddie Chiropractic has decided to switch from using hand-written medical records to
electronic ones. All of the staff at Kiddie have always relied on hand-written medical
records when performing their jobs and have expressed concerns about switching to the
new electronic format. However, Kiddie management believes that making the switch to
electronic records will increase efficiency and reduce the amount of time that it takes to
record patient information.
First, Kiddie management will have to spend time unfreezing the employees' belief that
the old way of recording patient records is adequate. The management team will need
to communicate the perceived benefits of the new electronic method, making sure to
demonstrate how the pros outweigh the cons. The staff will need to understand how
much more efficient the new method of electronic recording will be in comparison to the
old hand-written process.
Next, Kidde management will need to transition into the changing stage by
implementing the new electronic recording system. This will mark a time of uncertainly
in the Kiddie staff, making it necessary for the management team to offer training and
support as the employees become familiar with the new electronic system.




ANS.4
A process-data diagram is a digram that describes processes and data that act as output of
these processes. On the left side the meta process model can be viewed and on the right side
the meta concept model can be viewed
Sequential activities are activities that need to be carried out in a pre-defined order. The
activities are connected with an arrow, implying that they have to be followed in that
sequence. Both activities and sub-activities can be modeled in a sequential way. In
Figure 1 an activity diagram is illustrated with one activity and two sequential sub-
activities. A special kind of sequential activities are the start and stop states, which are
also illustrated in Figure 1.
In Figure 2 an example from practice is illustrated. The example is taken from the
requirements capturing workflow in UML-based Web Engineering. The main activity,
user & domain modeling, consists of three activities that need to be carried out in a
predefined order





Unordered activities
Unordered activities are used when sub-activities of an activity do not have a pre-
defined sequence in which they need to be carried out. Only sub-activities can be
unordered. Unordered activities are represented as sub-activities without transitions
within an activity, as is represented in Figure 3.
Sometimes an activity consists of both sequential and unordered sub-activities. The
solution to this modeling issue is to divide the main activity in different parts. In Figure 4
an example is illustrated, which clarifies the necessity to be able to model unordered
activities. The example is taken from the requirements analysis workflow of the Unified
Process. The main activity, describe candidate requirements, is divided into two parts.
The first part is a sequential activity. The second part consists of four activities that do
not need any sequence in order to be carried out correctly.
ACTIVITY

SUB ACTIVITY 1
SUB ACTIVITY 2
Concurrent activities
Activities can occur concurrently. This is handled with forking and joining. By drawing
the activities parallel in the diagram, connected with a synchronization bar, one can fork
several activities. Later on these concurrent activities can join again by using the same
synchronization bar. Both activities and sub-activities can occur concurrently. In the
example of Figure 5, Activity 2 and Activity 3 are concurrent activities.
In Figure 6, a fragment of a requirements capturing process is depicted. Two activities,
defining the actors and defining the use cases, are carried out concurrently. The reason
for carrying out these activities concurrently is that defining the actors influences the use
cases greatly, and vice versa.



ANS 5
(A) an information system on the Internet which allows documents to be connected to other
documents by hypertext links, enabling the user to search for information by moving from
one document to another. n the May 1970 issue of POPULER SCIENCE magazineATTHUR
C. CLARCK predicted that satellites would someday "bring the accumulated knowledge of
the world to your fingertips" using a console that would combine the functionality of the
photocopier, telephone, television and a small computer, allowing data transfer and
onferencing around the globe
On March 12, 1989, TIM BERNERS LEEwrote a proposal that referenced ENQUIRE , a
database and software project he had built in 1980, and described a more elaborate
information management system
With help from ROBERT CAILLIAU he published a more formal proposal (on 12
November 1990) to build a "Hypertext project" called "WorldWideWeb" (one word, also
"W3") as a "web" of "hypertext documents" to be viewed by BROWSERS " using a
CLIENT SERVER ARCHITECTURE This proposal estimated that a read-only web would
be developed within three months and that it would take six months to achieve "the
creation of new links and new material by readers, [so that] authorship becomes
universal" as well as "the automatic notification of a reader when new material of interest
to him/her has become available." While the read-only goal was met, accessible
authorship of web content took longer to mature, with the WIKI concept, WEB DAV.
B Voice over IP
is a methodology and group of technologies for the delivery of VOICE
CUMMUNICATIONS and MULTIMIEDIA sessions over INTERNET PROTOCOL (IP)
networks, such as the Internet. Other terms commonly associated with VoIP are
IP telephony, Internet telephony, voice over broadband (VoBB), broadband
telephony, IP communications, and broadband phone service.
The term Internet telephony specifically refers to the provisioning of
communications services (voice, FAX SMS, voice-messaging) over the public
INTERNET rather than via the PUBLIC SWICHED TELEPHONE NETWORK
(PSTN). The steps and principles involved in originating VoIP telephone calls are
similar to traditional digital TELEPHONY and involve signaling, channel setup,
digitization of the analog voice signals, and encoding. Instead of being
transmitted over a circuit-switched network, however, the digital information is
packetized, and transmission occurs as INTERNET PROTOCOL (IP) packets
over a PACKET-SWITCHED NETWORK Such transmission entails careful
considerations about resource management different from TIME DIVISION
MULTYPLEXING (TDM) networks.
Early providers of voice-over-IP services offered business models and technical
solutions that mirrored the architecture of the legacy telephone network. Second-
generation providers, such as SKYPE, have built closed networks for private user
bases, offering the benefit of free calls and convenience while potentially
charging for access to other communication networks, such as the PSTN. This
has limited the freedom of users to mix-and-match third-party hardware and
software. Third-generation providers, such as GOOGLE TALK have adopted
]
the
concept of FEDERATED VOIP which is a departure from the architecture of
the legacy networks. These solutions typically allow dynamic interconnection
between users on any two domains on the Internet when a user wishes to place
a call.
VoIP systems employ session control and signaling protocols to control the
signaling, set-up, and tear-down of calls. They transport audio streams over IP
networks using special media delivery protocols that encode voice, audio, video
with AUDIO CODECS and video codecs as DIGITAL AUDIO by STREAMING
AUDIO Various codecs exist that optimize the media stream based on
application requirements and network bandwidth; some implementations rely on
NARROW BAND and COMPRESSED SPEECH while others support HIGH
FIDILITY stereo codecs. Some popular codecs include LAW and A-LAW
versions ofG.711G.722, which is a high-fidelity codec marketed as HD Voice
byPOLYCOM , a popular open source voice codec known as Ilbc a codec that
only uses 8 kbit/s each way calledg7.29 , and many others.
c Intranet
An intranet is a private network that is contained within an enterprise. It may consist of
many interlinked local area networks and also use leased lines in thewide area network
. Typically, an intranet includes connections through one or more gateway computers to
the outside Internet. The main purpose of an intranet is to share company information
and computing resources among employees. An intranet can also be used to facilitate
working in groups and for teleconferences.
An intranet uses TCP/IP/HTTP and other Internet protocols and in general looks like a
private version of the Internet. With TUNNELING companies can send private
messages through the public network, using the public network with special
encryption/decryption and other security safeguards to connect one part of their intranet
to another.
Typically, larger enterprises allow users within their intranet to access the public Internet
through FIREWALL servers that have the ability to screen messages in both directions
so that company security is maintained. When part of an intranet is made accessible to
customers, partners, suppliers, or others outside the company, that part becomes part
of an EXTRANET.
D EXTRANET A company LAN, or local area network, can house a private Internet-like
environment called an intranet. The INTERNET is basically a set of HTML pages
relating to internal company business, for employee's eyes only, and is not available to
the Internet. If access to or from the Internet is provided, it will be through a firewall
gateway that will require a USERNAME and password. In this case the intranet
becomes an extranet. In short, an extranet is the extension of an intranet to include
public access.
An extranet can allow public access to employees, customers, clients or partners. It
uses Internet protocols so users can navigate with a browser, but resides on the
company's private server rather than on a public Internet server. Access to it from the
Internet can be controlled through various architectures that are password or username
specific. In other words, areas of the extranet will be available according to password
credentials. This limits users to pages relevant to the business they might be
conducting, while keeping other areas private and secure.
One very valuable application for an extranet is CUTOMER SERVICE Online patches,
upgrades, downloads, knowledge bases, and an interactive Help Desk are just a few
examples of ways to serve a client base using an extranet. Chat boards where
customers help each other with company products can also build customer confidence
and brand loyalty, while saving valuable human resources. Such boards are also a rich
source for potential future product and support development.
ANS 6
B Applications of cognitive science
purpose of this course to develop an understanding of how basic cognitive science becomes an
applicationor tries to. It is an excellent complement to Human Factors. The course will sample
applications stemming from basic research in perception, learning, memory, and cognitive
neuroscience, in collaboration with other disciplines. Examples are virtual reality environments,
computer-generated navigation systems, cognitive tutors, decision aids, guidelines for
eyewitness interrogation, neuro-marketing, and speech recognition and synthesis. No
background in psychology is required, as the general topics will be covered along with the
applications. The goals are for students to acquire fundamental knowledge of cognitive science
and to learn how basic research is applied. As the course progresses, the class arrives at a
shared understanding of how promising and relevant research becomes an application, as well
as what stands in the way.
C Applications of robotics
1 Robotic handling operations (38%)
Material handling is the most popular application with 38% of operational stock of
industrial robots worldwide. This includes MACHINE TENDING palatalizing and various
operations for metal machining and plastic moulding.

2 Robotic Welding (29%)
This segment mostly includes spot welding and arc welding which is mainly used by the
automotive industry. Spot welding is still more popular than arc welding but not for long;
as arc welding is becoming very popular in the metal industry.

3 Robotic Assembly (10%)
Assembly operations include: fixing, press-fitting, inserting, disassembling, etc. This
category of robotic applications seems to have decreased over the last few years, even
while other robotic applications have increased.

4 Robotic Dispensing (4%)
Here we are talking about painting, gluing, applying adhesive sealing, spraying,
etc. Only 4% of the opreational robots are doing dispensing.

5 Robotic Processing (2%)
Processing is not a big segment of industrial robots (only 2%) and this is probably
because a lot of automated machines are available on the market to do specifically
these applications. The main application areas are mechanical, laser and water jet
cutting.
D Applications of natural interface In COMPUTING , a natural user interface, or NUI,
or Natural Interface is the common parlance used by designers and developers of
human-machine interfaces to refer to a USER INTERFACE that is effectively invisible,
and remains invisible as the user continuously learns increasingly complex interactions.
The word natural is used because most computer interfaces use artificial control
devices whose operation has to be learned.
A NUI relies on a user being able to quickly transition from novice to expert. While the
interface requires learning, that learning is eased through design which gives the user
the feeling that they are instantly and continuously successful. Thus, natural refers to a
goal in the user experience that the interaction comes naturally, while interacting with
the technology, rather than that the interface itself is natural. This is contrasted with the
idea of anINTUTIVE INTERFACE , referring to one that can be used without previous
learning.
Several design strategies have been proposed which have met this goal to varying
degrees of success. One strategy is the use of a "reality user interface" ("RUI"),also
known as reality-based interfaces (RBI) methods. One example of an RUI strategy is
to use a wearable computer to render real-world objects "clickable", i.e. so that the
wearer can click on any everyday object so as to make it function as a hyperlink, thus
merging cyberspace and the real world. Because the term "natural" is evocative of the
"natural world", RBI are often confused for NUI, when in fact they are merely one means
of achieving it.
One example of a strategy for designing a NUI not based in RBI is the strict limiting of
functionality and customization, so that users have very little to learn in the operation of
a device. Provided that the default capabilities match the users goals, the interface is
effortless to use. This is an overarching design strategy in Apples iOS . Because this
design is coincident with a direct-touch display, non-designers commonly misattribute
the effortlessness of interacting with the device to that multi-touch display, and not to
the design of the software where it actually resides.

Вам также может понравиться