You are on page 1of 37

Prepared By:

Malik Usama

2016 It Paper
Question: what is a structure of engineering profession.?
Answer:
Profession. Structural engineers are responsible for engineering design
and structural analysis. ... Structural engineers often specialize in
particular types of structures, such as buildings, bridges, pipelines,
industrial, tunnels, vehicles, ships, aircraft and spacecraft.

Structural engineer: job description. Structural engineers design, plan and


oversee the construction of new buildings and bridges, or alterations and
extensions to existing properties or other structures. It can be very
satisfying to have the chance to see something you've had a part in
become a reality.
Structural engineering is the study of how to design structures and
non-structural elements that bear a load. Structural engineering seeks to
determine the stability and longevity of a load-bearing item, and design
building plans accordingly.

Any structure is essentially made up of only a small number of different types of elements:

 Columns
 Beams
 Plates
 Arches
 Shells
 Catenaries
Columns:
Columns are elements that carry only axial force (compression) or both
axial force and bending (which is technically called a beam-column but
practically, just a column). The design of a column must check the axial
capacity of the element, and the buckling capacity.
Prepared By:

Malik Usama

The buckling capacity is the capacity of the element to withstand the


propensity to buckle. Its capacity depends upon its geometry, material,
and the effective length of the column, which depends upon the
restraint conditions at the top and bottom of the column. The
effective length is {\displaystyle K*l}K*l where {\displaystyle l}l is
the real length of the column and K is the factor dependent on the
restraint condition.
Beams:
A beam may be defined as an element in which one dimension is much
greater than the other two and the applied loads are usually normal to the
main axis of the element. Beams and columns are called line elements and
are often represented by simple lines in structural modeling.
 cantilevered (supported at one end only with a fixed connection)
 simply supported (fixed against vertical translation at each end and
horizontal translation at one end only, and able to rotate at the supports)
 fixed (supported in all directions for translation and rotation at each
end)
 continuous (supported by three or more supports)
Trusses:
A truss is a structure comprising members and connection points or nodes.
When members are connected at nodes and forces are applied at nodes
members can act in tension or in compression. Members acting in
compression are referred to as compression members or struts while
members acting in tension are referred to as tension members or ties.
Plates:
Plates carry bending in two directions. A concrete flat slab is an example of
a plate. Plates are understood by using continuum mechanics, but due to
the complexity involved they are most often designed using a codified
empirical approach, or computer analysis.
Shells:
Shells derive their strength from their form, and carry forces in compression
in two directions. A dome is an example of a shell. They can be designed
Prepared By:

Malik Usama

by making a hanging-chain model, which will act as a catenary in pure


tension, and inverting the form to achieve pure compression.
Arches:
Arches carry forces in compression in one direction only, which is why it is appropriate to build
arches out of masonry. They are designed by ensuring that the line of thrust of the force
remains within the depth of the arch. It is mainly used to increase the bountifulness of
any structure
Catenaries:
Catenaries derive their strength from their form, and carry transverse forces in pure
tension by deflecting (just as a tightrope will sag when someone walks on it). They are
almost always cable or fabric structures. A fabric structure acts as a catenary in two
directions.

Question: Define Profession body and write down range of


Profession body?
Answer:
A Professional Body is an organization with individual
members practicing a profession or occupation in which
the organization maintains an oversight of the knowledge,
skills, conduct and practice of that profession or
occupation.
Functions of professional bodies
The overall functions of professional bodies vary widely according to how they are set
up and organized, but the following list is fairly comprehensive:

 set and assess professional examinations

 provide support for continuing professional development (CPD)

 publish professional journals or magazines

 provide networks for professionals to meet and discuss their field of expertise

 issue a code of conduct to guide professional behavior

 deal with complaints against professionals and implement disciplinary procedures

 represent their members in lobbying government about relevant legislation


Prepared By:

Malik Usama

 promote fairer access to the profession to people from all backgrounds

 provide careers support and opportunities for students, graduates and people already
working in the profession.
(Source: TotalProfessions.com, n.d.)

If you look at this list closely, you should be able to identify a number of areas where a
professional body might be useful to people who are not members of the profession but
are interested in finding out more. Understanding more about a particular profession –
how it is regulated, the qualifications required for entry and progression, the networks
that exist and the support provided – can be hugely valuable to anyone thinking about
entering that profession.

Visit the Law Society’s website , the independent professional body for solicitors, to
discover what is provided in addition to elements devoted to professional practice and
policy. What do you notice about the range of topics covered?

The range of topics is very extensive and include:

 events and training

 publications

 research and trends

 communities including women lawyers, ethnic minorities and lawyers with disabilities

 campaigns and consultations

 news including social media

 careers including how to become a solicitor

 for the public – advice including common legal issues and frequently asked questions.

Question No 3: What is a Form Business Organization. Explain


memorandum of association and article of association?
Answer:
There are 4 main types of business organization: sole
proprietorship, partnership, corporation, and Limited
Liability Company, or LLC. Below, we give an explanation
Prepared By:

Malik Usama

of each of these and how they are used in the scope


of business law.
Difference:
While the MOA describes the powers and objects of the
company, an AOA defines its rules. The MOA is
subordinate to the Companies Act, and the AOA is
subordinate to the memorandum. The memorandum
cannot be amended retrospectively while
an AOA may be changed.

While the memorandum of association works as a charter that defines the scope and
limitations of the company, an article of association functions as a legal document that
lays down rules regarding the management of the company. The Memorandum helps to
define the relationship that the company has with its members and the rights those
members have.
What is a Memorandum

As per Section 2(56) of the Companies Act,2013 a ‗memorandum‘ refers to the original
memorandum of association that a company registered or an altered one that follows
the rules laid down in the Companies Act.

Clauses in MOA

Section 4 of the Companies Act,2013 states that an MOA should contain the following
clauses and details.

 Name Clause

This clause contains the company‘s name ending with a ―Limited‖ if it is a public
company and with ―Private Limited‖ in the case that it is a private limited company.
Prepared By:

Malik Usama

 Situation Clause

This dictates in which State and registered office the company is to be situated and
defines the geographical constraints of the company.

 Object Clause

This clause gives an idea about the objects that the company deals in and may be
altered as the company expands to include and incorporate more objects.

 Liability Clause

This mentions the liability of the company‘s members whether it be limited, unlimited,
or state-owned.

1. When shares limit the company, its liability refers to the unpaid amount
corresponding to the shares they hold

2. If a company limited by guarantee, then the liability is the amount each member
promises to contribute—

o This could include assets of the company if the company shuts down
while he or she remains a member or within one year after they retire.

o They are liable to pay off debts and liabilities of the company which was
undertaken when they were a member of the company.

o They are also responsible for the costs and charges incurred due to the
winding-up and even for distributing the contributions as per the
regulations.
Prepared By:

Malik Usama

 Capital Clause

It defines the amount of capital invested, the number of shares registered and how the
shares have been divided. If it is a One Person Company, then the founder becomes a
member of the company.

Name in MOA

The name in the memorandum needs to follow the below-mentioned rules.

1. Cannot be identical or resemble an existing company‘s brand name closely.

2. Cannot be one that is being used by another company.

3. Cannot be one that is offensive under any law.

4. Cannot be a name that is undesirable as per the Central Government‘s decree.

5. A company may not be registered with a name which contains—

 Any word that might make it sound like it has any connection to the Central
Government or patronage of any State Government.

 Any word as described in the Companies (Incorporation) Rules, 2014 unless they
have sought approval from the Central Government prior to the registration.

What is an Article?

As per Section 2(5) of the Companies Act,2013 an ―article‖ refers to the original article
of association of a company or a version that has been altered so as to comply to the
laws stipulated in the Act. Section 5 of the Companies Act,2013 defines the article of
association as the document that contains the rules and regulations regarding the
management of the company.

Provisions for Retrenchment


Prepared By:

Malik Usama

The article contains rules for entrenchment that allow only specific clauses to be altered
and these rules can only be made by:

 Private Company – When it is formed or by an amendment which is agreed on by


all its members

 Public company – By special resolution

Types of Articles

1. Table F If shares limit a company

2. Table G If a company is limited by guarantee

3. Table H If guarantee and shares limit a company

4. Table I If it is an unlimited company having share capital

5. Table J If it is an unlimited company not having share capital

While both serve as charter documents for a company, an MOA contains the essential
details about the company while an AOA includes rules and regulations designed by the
company. The MOA works as the Constitution on which the company is built, and the
AOA takes the shape of by-laws that help in the functioning of the company. Both
require registration, with the office of Registrar of companies (ROC) before the company
is registered.

Primary Differences

 While the MOA describes the powers and objects of the company, an AOA
defines its rules.

 The MOA is subordinate to the Companies Act, and the AOA is subordinate to the
memorandum.
Prepared By:

Malik Usama

 The memorandum cannot be amended retrospectively while an AOA may be


changed.

 The memorandum includes six clauses while an article may be drafted as per the
company‘s need.

 The MOA is mandatory for all companies while a public share company can use
Table A in place of an AOA.

 An alteration may be made in an MOA only after passing Special Resolution in


Annual General Meeting after obtaining prior approval from the Central
Government while changes in an AOA may be made by passing Special
Resolution (SR) at Annual General Meeting (AGM).

Question: What is an intellectual Property and


explain copyrights and patents and trademarks?
Answer:
Intellectual property rights are the rights given to persons over the creations
of their minds. They usually give the creator an exclusive right over the use
of his/her creation for a certain period of time.
Prepared By:

Malik Usama

Copyright laws apply to the intellectual property for the duration


of the artist's life plus 70 years. Trademark laws last forever
provided that the mark in question is actively in use by the source
in commerce. Patents are limited duration intellectual property
rights which last a maximum of 20 years.
What is a copyright?
Prepared By:

Malik Usama

Copyrights were created to protect ownership of artistic works, including artsy, literary,
musical and theatrical creations. Intellectual goods protected by copyrights include
poetry, music, songs, motion pictures, novels, architecture, paintings and even
computer software and digital creations.

Ideas cannot be copyrighted, however, a tangible form of the idea can be. In artistic
works, copyright generally lasts for the duration of the author’s life in addition to 70
years following their death.

By copyrighting creative intellectual property, artists are afforded a public notice and
legal evidence of ownership. Infringement of copyright gives the rights to the true owner
of the intellectual property to sue the suspect in court.
The exclusive rights offered to copyrighted property includes rights to reproduce or copy
the works, rights to distribute or broadcast the works to the public, and the rights to lend
or rent the work. The owner of the copyright determines whether anyone can use their
work in any capacity.

Copyright is represented by the © symbol, or the word "Copyright" itself. In other cases,
it can also be communicated by the abbreviation "Copr.", and/or the copyrighted work’s
year of first publication, and/or the name, designation or credentials of the copyright
owner.

Copyright protection is granted automatically to artistic works from the moment they are
set in material or tangible form. There is no legal registration process required for
establishment of copyright.

However, it is still advised that authors maintain a set of records and evidence of their
intellectual property. This evidence is used to show in court during infringement claims
to prove that the work was in your possession at any given time.
Copyright protection depends on national legislation and thereby differs in each country.
At the time of the copyright owner’s death, the copyright can be left to whomever they
wish.

What is a patent?
Prepared By:

Malik Usama

Patents are intellectual property rights granted to inventions. Materials which are
patentable include industrial processes, machines, chemical compositions, and
manufactured commodities and artifacts.

Patents belong to the inventor, or otherwise, to the individual or organization, he gives


the rights to. Patent owners may license it, enabling others to make use of their
invention, or they may sell it.

Patentable inventions are required to meet certain conditions. They must be uniquely
new and not published by anyone else previously. Therefore, if you want to register a
pattern you must not publicize your invention beforehand.

Furthermore, in order to be patentable, the invention must be usable by any kind of


industry. Therefore, the invention must be a product, an apparatus or a manufacturing
process, rather than a scientific theory, a work of art, or a mathematical design.

Patents can be categorized as design patents, and utility and plant patents. Design
patents protection lasts 15 years starting from application issuance. Conversely, utility
and plant patents last maximum 20 years following a filing of the patent application.
There is a possibility of extending or adjusting patent terms.

A patent protects an invention from others who may use it without permission of the
inventor. This includes rights to prevent the use, sale, offer for sale, and import of said
invention. The patentee (owner of the patent) has the right to take legal action against
those using the invention without his permission.

To obtain a patent, aspirants must apply to the intellectual property office, which
decides whether the invention is patentable or not. However, inventors do not need a
patent to make use of their own invention, provided that no one else has acquired
patent rights to it.

It is advised to secure a patent as otherwise, it is nearly impossible to prevent others


from copying or making use of your invention.

What is a trademark?
Prepared By:

Malik Usama

A trademark can be defined as a word, symbol, design, and/or phrase which is used to
identify and differentiate the source of goods from other similar parties. A somewhat
similar right is the service mark, which affords the same protection rights to services
rather than goods.

Businesses make use of certain names, symbols, words, and designs when trading
goods or services to distinguish themselves as the source of certain goods, products
and services. The term “trademark” is frequently used to refer to service marks as well
as trademarks.

Some examples of intellectual property requiring a trademark are brand names, brand
logos, and their slogans. These examples can all be categorized under the term “mark”.

When using your mark, you can use a designation with it to represent the trademark.
This designation is the ™ symbol after the mark if the trademark is registered. If not,
owners may use the abbreviations TM for goods and SM for services.

Question: write a detail note on IEEE code of ethics?


Answer:
The IEEE Code of Conduct (PDF, 57 KB) describes IEEE members' and
staff's commitment to the highest standards of integrity, responsible
behavior, and ethical and professional conduct.
The five fundamental principles
 1) Integrity. A professional accountant should be straightforward and honest in all
professional and business relationships.
 2) Objectivity. ...
 3) Professional competence and due care. ...
 4) Confidentiality. ...
 5) Professional behavior
Prepared By:

Malik Usama

Code of Ethics for Engineers. Engineering is an important and


learned profession. ... Accordingly, the services provided
by engineers require honesty, impartiality, fairness, and equity,
and must be dedicated to the protection of the public health,
safety, and welfare.

Ethics codes can be distinguished according to two principle categories:


the group enacting the code, and the functions of the code within that
group. Codes provide a positive stimulus for ethical conduct and helpful
guidance and advice concerning the main obligations of the members of
the group to which it applies.
Prepared By:

Malik Usama

The ethical principles that nurses must adhere to are


the principles of justice, beneficence, nonmaleficence,
accountability, fidelity, autonomy, and veracity. Justice is fairness.

Question: what activities are considered as criminal


offense according to computer misuse act?
Answer:
Computer Misuse Act 1990
The Computer Misuse Act 1990 creates three distinct criminal
offenses

Unauthorized access to computers, including the illicit copying of
software held in any computer. This carries a penalty of up to six
months’ imprisonment or up to a £5000 fine and will be dealt with
by a magistrate. This covers hobby hacking and,
potentially, penetration testing

Unauthorized access with intent to commit or facilitate
commission of further offenses (such as fraud or theft), which
covers more serious cases of hacking with a criminal intent. This
has a penalty of up to five years’ imprisonment and an unlimited
fine. Because it is a serious offense, it will be a trial by jury (12
jolly good people).

Unauthorized modification of computer material, which includes
the intentional and unauthorized destruction of software or data;
the circulation of “infected” materials online (“viruses”); and the
unauthorized addition of a password to a data file (“crypto
viruses”). This offense also carries a penalty of up to five years’
Prepared By:

Malik Usama

imprisonment and an unlimited fine. It is also a serious offense,


so it too will be a trial by jury.
This act has been the chief means of dealing with unauthorized
computer access such as hacking. However, the law has been heavily
criticized. I remember one of my old bosses giving lectures and stating
that “You practically had to be standing over the offender’s shoulder
while he was doing it to get a conviction.”
This comment does hold an element of truth, but the difficulty in
gaining convictions is more down to the poor state of monitoring,
evidence handling, and awareness in the industry, because there
certainly have been convictions.
However, there is a need to show that the person committing the
unauthorized access was aware that he or she was not authorized to
access the service. Therefore, to cover the internal threat, this means
you must define authorized and unauthorized activity in your
acceptable use policy (AUP). Otherwise, there is a risk
that disgruntled employees viewing confidential data outside their
normal job access requirements could claim they were unaware of any
misuse. (Review Chapter 2 for a description and content of an AUP.)

Question: What types of Spoofing and Hacking?


Answer:
Some common types of spoofing attacks include ARP spoofing,
DNS spoofing and IP address spoofing. These types of
spoofing attacks are typically used to attack networks, spread
malware and to access confidential information and data.

Spoofing Attack?
A spoofing attack is when an attacker or malicious program successfully acts on another
person‘s (or program‘s) behalf by impersonating data.
Prepared By:

Malik Usama

Types of Spoofing Attacks


1. ARP Spoofing Attack
The Address Resolution Protocol (ARP) is a protocol used to translate IP
addresses into Media Access Control (MAC) addresses in order to be
properly transmitted. In short, the protocol maps an IP address to a
physical machine address.

This type of spoofing attack occurs when a malicious attacker links the
hacker‘s MAC address with the IP address of a company‘s network. This
allows the attacker to intercept data intended for the company computer.
ARP spoofing attacks can lead to data theft and deletion, compromised
accounts and other malicious consequences. ARP can also be used for
DoS, hijacking and other types of attacks.

2. DNS Spoofing Attack


The Domain Name System (DNS) is responsible for associating domain
names to the correct IP addresses. When a user types in a domain name,
the DNS system corresponds that name to an IP address, allowing the
visitor to connect to the correct server. For a DNS spoofing attack to be
successful, a malicious attacker reroutes the DNS translation so that it
points to a different server which is typically infected with malware and
can be used to help spread viruses and worms. The DNS server spoofing
attack is also sometimes referred to as DNS cache poisoning, due to
the lasting effect when a server caches the malicious DNS responses and
serving them up each time the same request is sent to that server.

3. IP Spoofing Attack
The most commonly-used spoofing attack is the IP spoofing attack. This
type of spoofing attack is successful when a malicious attacker copies a
legitimate IP address in order to send out IP packets using a trusted IP
address. Replicating the IP address forces systems to believe the source is
trustworthy, opening any victims up to different types of attacks using the
‗trusted‘ IP packets.
Prepared By:

Malik Usama

The most popular type of IP spoofing attack is a Denial of Service attack,


or DoS, which overwhelm and shut down the targeted servers. One
outcome attackers can achieve using IP spoofing attacks is the ability to
perform DoS attacks, using multiple compromised computers to send out
spoofed IP packets of data to a specific server. If too many data packets
reach the server, the server will be unable to handle all of the requests,
causing the server to overload. If trust relationships are being used on a
server, IP spoofing can be used to bypass authentication methods that
depend on IP address verification.

How to avoid spoofing attacks


There are several methods that should be implemented in order to properly avoid
spoofing attacks, including:

 Packet filtering should be implemented so that all packets are filtered and
scanned for inconsistencies. As a result, packets with inconsistencies are
blocked, which can effectively prevent spoofing attacks from being
successful.

 Using secure encryption protocols such as Secure Shell (SSHs), Transport


Layer Security (TLS), and HTTP Secure (HTTPS) help avoid many types of
spoofing attacks, as the protocols encrypt the data, therefore making
verification and must be verified in order to be spoofed.

 Avoid all types of trust relationships, as trust relationships only use IP


address verification, opening users up to easy spoofing attacks.

 Use spoofing-detection programs, which inspect and certify data before


transmitting it to avoid attacks, especially ARP spoofing attacks.

Question: Ownership of rights ii) identity iii) penalty clause iv)


Arbitration
Answer:
Ownership is the state or fact of exclusive rights and control over
property, which may be an object, land or real estate, or intellectual
Prepared By:

Malik Usama

property. Ownership involves multiple rights, collectively referred to as


title, which may be separated and held by different parties.

The Identity and Access Management Engineer is responsible for providing


day-to-day engineering and administration of Identity Management services
as well as… Experience with Software Requirements Development.
Penalty clauses in a service contract not only act as deterrents but also
help in ensuring vendor accountability. These clauses help in pulling up the
vendors in case of service failures through a scheme of penalties.

Settlement of a dispute (whether of fact, law, or procedure) between parties


to a contract by a neutral third party (the arbitrator) without resorting to
court action. Arbitration is usually voluntary but sometimes it is required by
law.

2015 it Paper
Question: Explain the three types of Consequentialism theory?
Answer:

Consequentialism is the class of normative ethical


theories holding that the consequences of one's conduct are the
ultimate basis for any judgment about the rightness or wrongness
of that conduct. Thus, from a consequentialist standpoint, a
morally right act (or omission from acting) is one that will produce
a good outcome, or consequence.
Consequentialism is primarily non-prescriptive, meaning the moral
worth of an action is determined by its potential consequence, not
by whether it follows a set of written edicts or laws. One example
would entail lying under the threat of government punishment to
Prepared By:

Malik Usama

save an innocent person's life, even though it is illegal to lie under


oath.
State consequentialism:
State consequentialism, also known as mohist consequentialism,[4] is an
ethical theory which evaluates the moral worth of an action based on how
much it contributes to the welfare of a state.[4] According to the Stanford
Encyclopedia of Philosophy, Mohist consequentialism, dating back to the
5th century BCE, is the "world's earliest form of consequentialism, a
remarkably sophisticated version based on a plurality of intrinsic goods
taken as constitutive of human welfare".[
Utilitarianism:
Nature has placed mankind under the governance of two sovereign masters, pain and
pleasure. It is for them alone to point out what we ought to do, as well as to determine
what we shall do. On the one hand the standard of right and wrong, on the other the
chain of causes and effects, are fastened to their throne. They govern us in all we do, in
all we say, in all we think...
Ethical egoism:
Ethical egoism can be understood as a consequentialist theory according
to which the consequences for the individual agent are taken to matter
more than any other result. Thus, egoism will prescribe actions that may be
beneficial, detrimental, or neutral to the welfare of others. Some, like Henry
Sidgwick, argue that a certain degree of egoism promotes the general
welfare of society for two reasons: because individuals know how to please
.themselves best, and because if everyone were an austere altruist then
general welfare would inevitably decrease.

Question: What are intellectual property rights. What is difference


between primary infringement a Secondary infringement?
Answer:

Intellectual property rights are the rights given to persons over the creations
of their minds. They usually give the creator an exclusive right over the use
of his/her creation for a certain period of time.
Prepared By:

Malik Usama

A primary infringement involves a direct infringement by the


defendant. Secondary infringement happens if someone facilitates another
person or group in infringing on a copyright

Primary infringement
Acts of primary infringement will not require knowledge or intention to infringe on
the part of the „infringer‟ – the violation of the restricted rights are strict liability
“offences”.
An act of primary infringement is undertaken if an individual engages in any of the
following acts which contravene the restricted rights of the owner of the copyrighted
work:
 Duplicating the work
 Issue duplicates of the work
 Rent or loan the work to the public
 Perform, display or play the work in public
 Communicate the work to the public
 Make an adaptation of the work
Infringement occurs when either the whole or a substantial part of the author of the
work‟s restricted rights are used by another person without authorization. This use can
be direct or indirect on the part of the infringer. A direct infringement would be, for
example, duplicating the architectural drawings of the owner. An indirect
infringement could take place in the event the infringer went to the house that had
been built utilizing the architectural drawings of the owner of the copyright and
subsequently made a copy of the floor plan and dimensions of the house.
It can also be a breach of copyright to authorize any other individual to do any of the
above acts which impinge upon the restricted rights of the owner of the copyrighted
work.
Prepared By:

Malik Usama

Secondary infringement
Secondary infringement must involve some knowledge by the infringer of the
copyrighted work. It is usually it is retailers or publishers who are „secondary
infringers‟. Examples of secondary infringement include:
 Importing infringing copy
 Possession of or dealings with infringing copy
 Providing the opportunity for making infringing copies
Knowledge may be established on both an objective and a subjective basis.
Objectively, a Defendant is held to have knowledge of infringement if a reasonable
man would arrive at the relevant belief of infringement on the particular facts.

Question: What do people hack? Write a note on types of


hacking?
Answer:
Hackers use their technical skills to access computer systems or networks.
Although they share a common aim -- to find bugs, vulnerabilities and
weaknesses -- they do not necessarily use their skills for the same
reasons. While some hackers target systems for malicious or criminal
purposes, others may not aim to do any harm or may even hack systems
for positive reasons.
Hackers can be classified into different categories such as white hat, black hat, and
grey hat, based on their intent of hacking a system. These different terms come from
old Spaghetti Westerns, where the bad guy wears a black cowboy hat and the good
guy wears a white hat.

White Hat Hackers


White Hat hackers are also known as Ethical Hackers. They never intent to harm a
system, rather they try to find out weaknesses in a computer or a network system as a
part of penetration testing and vulnerability assessments.
Prepared By:

Malik Usama

Ethical hacking is not illegal and it is one of the demanding jobs available in the IT
industry. There are numerous companies that hire ethical hackers for penetration
testing and vulnerability assessments.

Black Hat Hackers


Black Hat hackers, also known as crackers, are those who hack in order to gain
unauthorized access to a system and harm its operations or steal sensitive information.

Black Hat hacking is always illegal because of its bad intent which includes stealing
corporate data, violating privacy, damaging the system, blocking network
communication, etc.

Grey Hat Hackers


Grey hat hackers are a blend of both black hat and white hat hackers. They act without
malicious intent but for their fun, they exploit a security weakness in a computer system
or network without the owner’s permission or knowledge.

Their intent is to bring the weakness to the attention of the owners and getting
appreciation or a little bounty from the owners.

Miscellaneous Hackers
Apart from the above well-known classes of hackers, we have the following categories
of hackers based on what they hack and how they do it −

Red Hat Hackers


Red hat hackers are again a blend of both black hat and white hat hackers. They are
usually on the level of hacking government agencies, top-secret information hubs, and
generally anything that falls under the category of sensitive information.

Blue Hat Hackers


A blue hat hacker is someone outside computer security consulting firms who is used
to bug-test a system prior to its launch. They look for loopholes that can be exploited
and try to close these gaps. Microsoft also uses the term BlueHat to represent a series
of security briefing events.

Elite Hackers
Prepared By:

Malik Usama

This is a social status among hackers, which is used to describe the most skilled.
Newly discovered exploits will circulate among these hackers.

Script Kiddie
A script kiddie is a non-expert who breaks into computer systems by using
pre-packaged automated tools written by others, usually with little understanding of the
underlying concept, hence the term Kiddie.

Neophyte
A neophyte, "n00b", or "newbie" or "Green Hat Hacker" is someone who is new to
hacking or phreaking and has almost no knowledge or experience of the workings of
technology and hacking.

Hacktivist
A hacktivist is a hacker who utilizes technology to announce a social, ideological,
religious, or political message. In general, most hacktivism involves website
defacement or denial of-service attacks.

Question: Write a detail note on IEEE/ACM Software Engineering code of ethics?

Answer:

Software Engineering Code of Ethics and Professional Practice as


recommended by the ACM/IEEE-CS Joint Task Force on Software
Engineering Ethics and Professional Practices and jointly approved by the
ACM and the IEEE-CS as the standard for teaching and practicing software
engineering.
1. PUBLIC – Software engineers shall act consistently with the public interest.

2. CLIENT AND EMPLOYER – Software engineers shall act in a manner that is in the
best interests of their client and employer consistent with the public interest.

3. PRODUCT – Software engineers shall ensure that their products and related
modifications meet the highest professional standards possible.

4. JUDGMENT – Software engineers shall maintain integrity and independence in their


professional judgment.
Prepared By:

Malik Usama

5. MANAGEMENT – Software engineering managers and leaders shall subscribe to and


promote an ethical approach to the management of software development and
maintenance.

6. PROFESSION – Software engineers shall advance the integrity and reputation of the
profession consistent with the public interest.

7. COLLEAGUES – Software engineers shall be fair to and supportive of their


colleagues.

8. SELF – Software engineers shall participate in lifelong learning regarding the practice
of their profession and shall promote an ethical approach to the practice of the
profession.

Question: Termination of contract ii) Obligation of contract iii)


Confidentially iv) Penalty Clause

Answer:

Termination of contract is an act that may occur wherein


a contract can be legally terminated before the contractual duties
have been fulfilled. Parties may choose to terminate contracts for
a variety of reasons, but not all terminations of contracts will
allow them to escape liability.
Obligation of contracts is the legal duty of the contractors to fulfill the
promise stated in the contract. The reasonable capacity of a man to do, or
to refrain from doing something is considered before questioning
the obligation of contracts.

Confidentiality is that practice which helps to keep secret all information


deemed desirable to keep secret. The maintenance of secrecy refers to
the unrevealing of any data concerning the company's business or
technical processes that are not already in public knowledge.

Penalty. Related Content. A clause which operates on breach of contract


(such as a liquidated damages clause) which cannot be justified by some
Prepared By:

Malik Usama

consideration, such as the desire to compensate or to protect a legitimate


interest of the innocent party.

‫ کا پیپر‬It 2017
Question: What is a Cashflow statement? Discuss it use and importance for a
business?
Answer:
In financial accounting, a cash flow statement, also known as
statement of cash flows, is a financial statement that shows how
changes in balance sheet accounts and income affect cash and
cash equivalents, and breaks the analysis down to operating,
investing, and financing activities.
OR
Additions to property, plant, equipment, capitalized software
expense, cash paid in mergers and acquisitions, purchase of marketable
securities, and proceeds from the sale of assets are all examples of entries
that should be included in the cash flow from investing activities section.
Importance:
Cash is also important because it later becomes the payment for things that make
your business run: expenses like stock or raw materials, employees, rent and other
operating expenses. Naturally, positive cash flow is preferred. Positive cash flow means
your business is running smoothly.
Use:
The cash flow statement is the financial statement that presents the cash inflows and
outflows of a business during a given period of time. ... The income statement will
record sales and profits but it's the cash flow statement that will alert you if those sales
aren't generating enough cash to cover expenses.
Prepared By:

Malik Usama

Question: Income and Profit ii) Fixed Assets and Current Assets
iii)Tangible Assets and Intangible Assets
:‫جواب‬
Income is the top-line revenue. This number is calculated by tallying every penny that
came into the company during a given period. Income is commonly referred to as
“Gross Revenue.” On the other hand, profit is the amount that is left over after the
expenses have been paid.

Profit Formula
The formula for profit is:

Total Sales - Total Expenses = Profit

Here is some information about Company XYZ for last year:

Using the profit formula and the information above, we can calculate that Company XYZ's profit
was:

$2,000,000 - $1,000,000 - $50,000 - $95,000 = $855,000


Prepared By:

Malik Usama

ii)Fixed Assets and Current Assets:


Current assets are short-term assets that are typically used up in less than one
year. Current assets are used in the day-to-day operations of a business to keep it
running. Fixed assets are long-term, physical assets such as plant and
equipment. Fixed assets have a useful life of more than one year.

Examples
An example of a company's fixed asset would be a company that produces and
sells toys. The company purchases a new office building for $5 million along with
machinery and equipment that costs a total of $500,000. The company projects
using the building, machinery, and equipment for the next five years. These
assets are considered fixed tangible assets because they have physical form, will
have a useful life of more than one year, and will be used to generate revenue for
the company.

iii) Tangible Assets and intangible Assets:

‫تعر یف‬
Assets are everything a company
owns. Tangible assets are physical; they include cash, inventory, vehicles, equipment,
buildings and investments. Intangible assets do not exist in physical form and include
things like accounts receivable, pre-paid expenses, and patents and goodwill.

‫مثا ل‬
Prepared By:

Malik Usama

Question: Explain the Software Services


Contract in Computing Services?
Answer:
‫اپنےپا س سے بھی لکھ سکتےہیں۔‬
1. SOFTWARE AND SERVICES
1. The Software is a submission and evaluation management system.

2. Subject to the terms and conditions of this Agreement, we grant you a


non-exclusive, transferable, revocable right to access and use the Software during
the applicable Term in accordance with this Agreement.

3. The Software is provided to the Client via an individually assigned URL.

4. The Client will only be able to access the Software by completing an online
subscription or logging in to an Account we create for you.

5. The services provided by the Company include Account creation, training and
support (―Services‖) as set out on the Site or in the Quote.
Prepared By:

Malik Usama

2. ONLINE SUBSCRIPTION AND ACCOUNT


1. When you subscribe online or sign into your Account, the Software will request
that you provide personal information for subscription purposes. This personal
information that we collect, and how we deal with it, is set out in the Privacy Policy
available on our Site.

2. Information that is created when you subscribe, such as log in details and
passwords (―Client Information‖) is stored on servers in Ireland and Germany
however some Data may pass through or be stored on servers outside of Ireland or
Germany. We will take industry best-practice steps to ensure that Client
Information is kept secure and confidential.

3. You will be required to pay a fee for your subscription to the Software
(―Subscription Fee‖) as set out on our Site or in our Quote. You will not be given an
Account to access and use the Software until payment is made.

4. Upon subscription, the Client obtains a valid Account to use the Software for the
Term of this Agreement.

3. PAYMENT – for subscription payment types


1. You agree to pay the Subscription Fee required to enable you to access and use
the Software.

2. You will be required to make payment by way of bank transfer or credit card. If you
subscribe online you must provide your credit card details when completing your
online subscription.

3. If you pay by credit card acknowledge and agree that:

1. if we are unable to take payment from your credit card, we will attempt to
contact you via email as soon as we become aware of the payment failure.
Until payment is confirmed, your Account will be locked and you will not be
able to access or use the Software.

TERM AND TERMINATION


1. This Agreement will automatically renew at the end of the Term for successive equal
Terms, unless terminated in accordance with this clause 5.
Prepared By:

Malik Usama

2. To terminate an Account, the Client must advise us in writing at least 30 days before the
end of the Term. The Client‘s Account will be terminated at the end of the Term, and
automatic payments will cease at the end of the Term.

Question: What is a difference between primary infringement and


secondary infringement?
Answer:

Primary infringement
Acts of primary infringement will not require knowledge or intention to infringe on
the part of the „infringer‟ – the violation of the restricted rights are strict liability
“offences”.
An act of primary infringement is undertaken if an individual engages in any of the
following acts which contravene the restricted rights of the owner of the copyrighted
work:
 Duplicating the work
 Issue duplicates of the work
 Rent or loan the work to the public
 Perform, display or play the work in public
 Communicate the work to the public
 Make an adaptation of the work
Infringement occurs when either the whole or a substantial part of the author of the
work‟s restricted rights are used by another person without authorisation. This use can
be direct or indirect on the part of the infringer. A direct infringement would be, for
example, duplicating the architectural drawings of the owner. An indirect
infringement could take place in the event the infringer went to the house that had
been built utilizing the architectural drawings of the owner of the copyright and
subsequently made a copy of the floor plan and dimensions of the house.
It can also be a breach of copyright to authorize any other individual to do any of the
above acts which impinge upon the restricted rights of the owner of the copyrighted
work.
Prepared By:

Malik Usama

Secondary infringement
Secondary infringement must involve some knowledge by the infringer of the
copyrighted work. It is usually it is retailers or publishers who are „secondary
infringers‟. Examples of secondary infringement include:
 Importing infringing copy
 Possession of or dealings with infringing copy
 Providing the opportunity for making infringing copies
Knowledge may be established on both an objective and a subjective basis.
Objectively, a Defendant is held to have knowledge of infringement if a reasonable
man would arrive at the relevant belief of infringement on the particular facts.

Question: Five Reason why a manger should delegate Authority?


Answer:

Develop your skills as a manager


By delegating, you give yourself more time to work on your skills and capacities. This
will help you achieve your goals in less time and set up higher goals to reach. You will
become more efficient as the stress will be less, which means that your vision will be
wider.

Increasing communication
Hierarchy between you and your team will diminish by delegating. They will notice that
you brought them to your level, which will make communication easier for you and
them. In addition, explaining tasks and sharing ideas together will lessen the distance
between the team‘s workers. You will all be one unit doing its best for the benefit of all!

Collective success
In delegation, when reaching goals, the success will be the one of the whole team and
not an individual. A collective success will make the person feel as an entity with the
Prepared By:

Malik Usama

company, and it will empower the team to look forward to another success and another
challenge to break!

Collective success
In delegation, when reaching goals, the success will be the one of the whole team and
not an individual. A collective success will make the person feel as an entity with the
company, and it will empower the team to look forward to another success and another
challenge to break!

Preserving good skilled people in your team


Effective delegation empowers subordinates to make decisions and to feel their
importance. They will be motivated to aim for higher achievements within the same
company. They will also feel satisfied and content, which will increase their loyalty and
lower the risk that they will start looking for jobs outside the company.

Delegate to Save time


Actually, time is one of the most valuable resources a company has in today‘s world.
Effective delegation allows you the ability to maximize this that your company strives for
– as they say, ‗Time is Money‘! As it decreases delays in achieving tasks, and it also
decreases delays on those who are waiting on you, as a manager, you are able to take
more actions or make more decisions.

Question: MBO in Whole Organization:


Answer:
The Basics of Management by Objectives
Management by objectives (MBO) is the establishment of a
management information system to compare actual performance and
achievements to the defined objectives. Practitioners claim that the major
benefits of MBO are that it improves employee motivation and commitment and
allows for better communication between management and employees.
However, a cited weakness of MBO is that it unduly emphasizes the setting of
goals to attain objectives, rather than working on a systematic plan to do so
Prepared By:

Malik Usama

Management by Objectives in Practice


Management by objectives outlines five steps that organizations should use to
put the management technique into practice.
1. The first step is to either determine or revise organizational objectives for
the entire company. This broad overview should be derived from the firm's
mission and vision.
2. The second step is to translate the organizational objectives to employees.
Drucker used the acronym SMART (specific, measurable, acceptable,
realistic, time-bound) to express the concept.
3. Step three is stimulating the participation of employees in setting individual
objectives. After the organization's objectives are shared with employees,
from the top to the bottom, employees should be encouraged to help set
their own objectives to achieve these larger organizational objectives. This
gives employees greater motivation since they have greater
empowerment.
4. Step four involves monitoring the progress of employees. In step two, a
key component of the objectives was that they are measurable in order for
employees and managers to determine how well they are met.
5. The fifth step is to evaluate and reward employee progress. This step
includes honest feedback on what was achieved and not achieved for each
employee.
Question: What is the professional Conduct? The BCS code Divided into Four
Section?
Answer:
Professional conduct involves ethics, morals, and standards of
behavior. Being a professional, it is necessary for the person to
maintain his/her ethical behavior and to have good professional
conduct.
The BCS Code of Conduct
The Public Interest

1. Members shall in their professional practice safeguard public health and safety and have
regard to protection of the environment.
Prepared By:

Malik Usama

2. Members shall have due regard to the legitimate rights of third parties.

3. Members shall ensure that within their chosen fields they have knowledge and
understanding of relevant legislation, regulations and standards and that they comply
with such requirements.

4. Members shall in their professional practice have regard to basic human rights and shall
avoid any actions that adversely affect such rights.

Duty to Employers and Clients

5. Members shall carry out work with due care and diligence in accordance with the
requirements of the employer or client and shall, if their professional judgement is
overruled, indicate the likely consequences.

6. Members shall endeavour to complete work undertaken on time and to budget and shall
advise their employer or client as soon as practicable if any overrun is foreseen.

7. Members shall not offer or provide, or receive in return, inducement for the introduction
of business from a client unless there is full prior disclosure of the facts to the client.

8. Members shall not disclose or authorise, to be disclosed, or use for personal gain or to
benefit a third party, confidential information acquired in the course of professional
practice, except with prior written permission of the employer or client, or at the
direction of a court of law.

9. Members should seek to avoid being put in a position where they may become privy to
or party to activities or information concerning activities which would conflict with their
responsibilities in 1-4 above.

10. Members shall not misrepresent or withhold information on the capabilities of products,
systems or services with which they are concerned or take advantage of the lack of
knowledge or inexperience of others.

11. Members shall not, except where specifically so instructed, handle client's monies or
place contracts or orders in connection with work on which they are engaged where
acting as an independent consultant.

12. Members shall not purport to exercise independent judgement on behalf of a client on
any product or service in which they knowingly have any interest, financial or otherwise.

Duty to the Profession

13. Members shall uphold the reputation of the Profession and shall seek to improve
professional standard through participation in their development, use and enforcement,
and shall avoid any action, which will adversely affect the good standing of the
Profession.
Prepared By:

Malik Usama

14. Members shall in their professional practice seek to advance public knowledge and
understanding of computing and information systems and technology and to counter
false or misleading statements, which are detrimental to the Profession.

15. Members shall encourage and support fellow members in their professional development
and, where possible, provide opportunities for the professional development of new
entrants to the Profession.

16. Members shall act with integrity towards fellow members and to members of other
professions with whom they are concerned in a professional capacity and shall avoid
engaging in any activity, which is incompatible with professional status.

17. Members shall not make any public statements in their professional capacity unless
properly qualified and, where appropriate, authorised to do so, and shall have due
regard to the likely consequences of any statement on others.

Professional Competence and Integrity

18. Members shall seek to upgrade their professional knowledge and skill and shall maintain
awareness of technological developments, procedures and standards which are relevant
to their field, and shall encourage their subordinates to do likewise.

19. Members shall seek to conform to recognised good practice including quality standards,
which are in their judgement relevant, and shall encourage their subordinates to do
likewise.

20. Members shall only offer to do work or provide a service, which is within their
professional competence and shall not claim to any level of competence, which they do
not possess, and any professional opinion, which they are asked to give, shall be
objective and reliable.

21. Members shall accept professional responsibility for their work and for the work of their
subordinates and associates under their direction, and shall not terminate any
assignment except for good reason and on reasonable notice.

22. Members shall avoid any situation that may give rise to a conflict of interest between
themselves and their client and shall make full and immediate disclosure to the client if
any conflict should occur.

‫ختم شدھ‬

‫کامیا بی اپ کے قد موں میں‬


Prepared By:

Malik Usama

You might also like