Professional Documents
Culture Documents
Past Paper Long of PP of Bsit
Past Paper Long of PP of Bsit
Malik Usama
2016 It Paper
Question: what is a structure of engineering profession.?
Answer:
Profession. Structural engineers are responsible for engineering design
and structural analysis. ... Structural engineers often specialize in
particular types of structures, such as buildings, bridges, pipelines,
industrial, tunnels, vehicles, ships, aircraft and spacecraft.
Any structure is essentially made up of only a small number of different types of elements:
Columns
Beams
Plates
Arches
Shells
Catenaries
Columns:
Columns are elements that carry only axial force (compression) or both
axial force and bending (which is technically called a beam-column but
practically, just a column). The design of a column must check the axial
capacity of the element, and the buckling capacity.
Prepared By:
Malik Usama
Malik Usama
provide networks for professionals to meet and discuss their field of expertise
Malik Usama
provide careers support and opportunities for students, graduates and people already
working in the profession.
(Source: TotalProfessions.com, n.d.)
If you look at this list closely, you should be able to identify a number of areas where a
professional body might be useful to people who are not members of the profession but
are interested in finding out more. Understanding more about a particular profession –
how it is regulated, the qualifications required for entry and progression, the networks
that exist and the support provided – can be hugely valuable to anyone thinking about
entering that profession.
Visit the Law Society’s website , the independent professional body for solicitors, to
discover what is provided in addition to elements devoted to professional practice and
policy. What do you notice about the range of topics covered?
publications
communities including women lawyers, ethnic minorities and lawyers with disabilities
for the public – advice including common legal issues and frequently asked questions.
Malik Usama
While the memorandum of association works as a charter that defines the scope and
limitations of the company, an article of association functions as a legal document that
lays down rules regarding the management of the company. The Memorandum helps to
define the relationship that the company has with its members and the rights those
members have.
What is a Memorandum
As per Section 2(56) of the Companies Act,2013 a ‗memorandum‘ refers to the original
memorandum of association that a company registered or an altered one that follows
the rules laid down in the Companies Act.
Clauses in MOA
Section 4 of the Companies Act,2013 states that an MOA should contain the following
clauses and details.
Name Clause
This clause contains the company‘s name ending with a ―Limited‖ if it is a public
company and with ―Private Limited‖ in the case that it is a private limited company.
Prepared By:
Malik Usama
Situation Clause
This dictates in which State and registered office the company is to be situated and
defines the geographical constraints of the company.
Object Clause
This clause gives an idea about the objects that the company deals in and may be
altered as the company expands to include and incorporate more objects.
Liability Clause
This mentions the liability of the company‘s members whether it be limited, unlimited,
or state-owned.
1. When shares limit the company, its liability refers to the unpaid amount
corresponding to the shares they hold
2. If a company limited by guarantee, then the liability is the amount each member
promises to contribute—
o This could include assets of the company if the company shuts down
while he or she remains a member or within one year after they retire.
o They are liable to pay off debts and liabilities of the company which was
undertaken when they were a member of the company.
o They are also responsible for the costs and charges incurred due to the
winding-up and even for distributing the contributions as per the
regulations.
Prepared By:
Malik Usama
Capital Clause
It defines the amount of capital invested, the number of shares registered and how the
shares have been divided. If it is a One Person Company, then the founder becomes a
member of the company.
Name in MOA
Any word that might make it sound like it has any connection to the Central
Government or patronage of any State Government.
Any word as described in the Companies (Incorporation) Rules, 2014 unless they
have sought approval from the Central Government prior to the registration.
What is an Article?
As per Section 2(5) of the Companies Act,2013 an ―article‖ refers to the original article
of association of a company or a version that has been altered so as to comply to the
laws stipulated in the Act. Section 5 of the Companies Act,2013 defines the article of
association as the document that contains the rules and regulations regarding the
management of the company.
Malik Usama
The article contains rules for entrenchment that allow only specific clauses to be altered
and these rules can only be made by:
Types of Articles
While both serve as charter documents for a company, an MOA contains the essential
details about the company while an AOA includes rules and regulations designed by the
company. The MOA works as the Constitution on which the company is built, and the
AOA takes the shape of by-laws that help in the functioning of the company. Both
require registration, with the office of Registrar of companies (ROC) before the company
is registered.
Primary Differences
While the MOA describes the powers and objects of the company, an AOA
defines its rules.
The MOA is subordinate to the Companies Act, and the AOA is subordinate to the
memorandum.
Prepared By:
Malik Usama
The memorandum includes six clauses while an article may be drafted as per the
company‘s need.
The MOA is mandatory for all companies while a public share company can use
Table A in place of an AOA.
Malik Usama
Malik Usama
Copyrights were created to protect ownership of artistic works, including artsy, literary,
musical and theatrical creations. Intellectual goods protected by copyrights include
poetry, music, songs, motion pictures, novels, architecture, paintings and even
computer software and digital creations.
Ideas cannot be copyrighted, however, a tangible form of the idea can be. In artistic
works, copyright generally lasts for the duration of the author’s life in addition to 70
years following their death.
By copyrighting creative intellectual property, artists are afforded a public notice and
legal evidence of ownership. Infringement of copyright gives the rights to the true owner
of the intellectual property to sue the suspect in court.
The exclusive rights offered to copyrighted property includes rights to reproduce or copy
the works, rights to distribute or broadcast the works to the public, and the rights to lend
or rent the work. The owner of the copyright determines whether anyone can use their
work in any capacity.
Copyright is represented by the © symbol, or the word "Copyright" itself. In other cases,
it can also be communicated by the abbreviation "Copr.", and/or the copyrighted work’s
year of first publication, and/or the name, designation or credentials of the copyright
owner.
Copyright protection is granted automatically to artistic works from the moment they are
set in material or tangible form. There is no legal registration process required for
establishment of copyright.
However, it is still advised that authors maintain a set of records and evidence of their
intellectual property. This evidence is used to show in court during infringement claims
to prove that the work was in your possession at any given time.
Copyright protection depends on national legislation and thereby differs in each country.
At the time of the copyright owner’s death, the copyright can be left to whomever they
wish.
What is a patent?
Prepared By:
Malik Usama
Patents are intellectual property rights granted to inventions. Materials which are
patentable include industrial processes, machines, chemical compositions, and
manufactured commodities and artifacts.
Patentable inventions are required to meet certain conditions. They must be uniquely
new and not published by anyone else previously. Therefore, if you want to register a
pattern you must not publicize your invention beforehand.
Patents can be categorized as design patents, and utility and plant patents. Design
patents protection lasts 15 years starting from application issuance. Conversely, utility
and plant patents last maximum 20 years following a filing of the patent application.
There is a possibility of extending or adjusting patent terms.
A patent protects an invention from others who may use it without permission of the
inventor. This includes rights to prevent the use, sale, offer for sale, and import of said
invention. The patentee (owner of the patent) has the right to take legal action against
those using the invention without his permission.
To obtain a patent, aspirants must apply to the intellectual property office, which
decides whether the invention is patentable or not. However, inventors do not need a
patent to make use of their own invention, provided that no one else has acquired
patent rights to it.
What is a trademark?
Prepared By:
Malik Usama
A trademark can be defined as a word, symbol, design, and/or phrase which is used to
identify and differentiate the source of goods from other similar parties. A somewhat
similar right is the service mark, which affords the same protection rights to services
rather than goods.
Businesses make use of certain names, symbols, words, and designs when trading
goods or services to distinguish themselves as the source of certain goods, products
and services. The term “trademark” is frequently used to refer to service marks as well
as trademarks.
Some examples of intellectual property requiring a trademark are brand names, brand
logos, and their slogans. These examples can all be categorized under the term “mark”.
When using your mark, you can use a designation with it to represent the trademark.
This designation is the ™ symbol after the mark if the trademark is registered. If not,
owners may use the abbreviations TM for goods and SM for services.
Malik Usama
Malik Usama
Malik Usama
Spoofing Attack?
A spoofing attack is when an attacker or malicious program successfully acts on another
person‘s (or program‘s) behalf by impersonating data.
Prepared By:
Malik Usama
This type of spoofing attack occurs when a malicious attacker links the
hacker‘s MAC address with the IP address of a company‘s network. This
allows the attacker to intercept data intended for the company computer.
ARP spoofing attacks can lead to data theft and deletion, compromised
accounts and other malicious consequences. ARP can also be used for
DoS, hijacking and other types of attacks.
3. IP Spoofing Attack
The most commonly-used spoofing attack is the IP spoofing attack. This
type of spoofing attack is successful when a malicious attacker copies a
legitimate IP address in order to send out IP packets using a trusted IP
address. Replicating the IP address forces systems to believe the source is
trustworthy, opening any victims up to different types of attacks using the
‗trusted‘ IP packets.
Prepared By:
Malik Usama
Packet filtering should be implemented so that all packets are filtered and
scanned for inconsistencies. As a result, packets with inconsistencies are
blocked, which can effectively prevent spoofing attacks from being
successful.
Malik Usama
2015 it Paper
Question: Explain the three types of Consequentialism theory?
Answer:
Malik Usama
Intellectual property rights are the rights given to persons over the creations
of their minds. They usually give the creator an exclusive right over the use
of his/her creation for a certain period of time.
Prepared By:
Malik Usama
Primary infringement
Acts of primary infringement will not require knowledge or intention to infringe on
the part of the „infringer‟ – the violation of the restricted rights are strict liability
“offences”.
An act of primary infringement is undertaken if an individual engages in any of the
following acts which contravene the restricted rights of the owner of the copyrighted
work:
Duplicating the work
Issue duplicates of the work
Rent or loan the work to the public
Perform, display or play the work in public
Communicate the work to the public
Make an adaptation of the work
Infringement occurs when either the whole or a substantial part of the author of the
work‟s restricted rights are used by another person without authorization. This use can
be direct or indirect on the part of the infringer. A direct infringement would be, for
example, duplicating the architectural drawings of the owner. An indirect
infringement could take place in the event the infringer went to the house that had
been built utilizing the architectural drawings of the owner of the copyright and
subsequently made a copy of the floor plan and dimensions of the house.
It can also be a breach of copyright to authorize any other individual to do any of the
above acts which impinge upon the restricted rights of the owner of the copyrighted
work.
Prepared By:
Malik Usama
Secondary infringement
Secondary infringement must involve some knowledge by the infringer of the
copyrighted work. It is usually it is retailers or publishers who are „secondary
infringers‟. Examples of secondary infringement include:
Importing infringing copy
Possession of or dealings with infringing copy
Providing the opportunity for making infringing copies
Knowledge may be established on both an objective and a subjective basis.
Objectively, a Defendant is held to have knowledge of infringement if a reasonable
man would arrive at the relevant belief of infringement on the particular facts.
Malik Usama
Ethical hacking is not illegal and it is one of the demanding jobs available in the IT
industry. There are numerous companies that hire ethical hackers for penetration
testing and vulnerability assessments.
Black Hat hacking is always illegal because of its bad intent which includes stealing
corporate data, violating privacy, damaging the system, blocking network
communication, etc.
Their intent is to bring the weakness to the attention of the owners and getting
appreciation or a little bounty from the owners.
Miscellaneous Hackers
Apart from the above well-known classes of hackers, we have the following categories
of hackers based on what they hack and how they do it −
Elite Hackers
Prepared By:
Malik Usama
This is a social status among hackers, which is used to describe the most skilled.
Newly discovered exploits will circulate among these hackers.
Script Kiddie
A script kiddie is a non-expert who breaks into computer systems by using
pre-packaged automated tools written by others, usually with little understanding of the
underlying concept, hence the term Kiddie.
Neophyte
A neophyte, "n00b", or "newbie" or "Green Hat Hacker" is someone who is new to
hacking or phreaking and has almost no knowledge or experience of the workings of
technology and hacking.
Hacktivist
A hacktivist is a hacker who utilizes technology to announce a social, ideological,
religious, or political message. In general, most hacktivism involves website
defacement or denial of-service attacks.
Answer:
2. CLIENT AND EMPLOYER – Software engineers shall act in a manner that is in the
best interests of their client and employer consistent with the public interest.
3. PRODUCT – Software engineers shall ensure that their products and related
modifications meet the highest professional standards possible.
Malik Usama
6. PROFESSION – Software engineers shall advance the integrity and reputation of the
profession consistent with the public interest.
8. SELF – Software engineers shall participate in lifelong learning regarding the practice
of their profession and shall promote an ethical approach to the practice of the
profession.
Answer:
Malik Usama
کا پیپرIt 2017
Question: What is a Cashflow statement? Discuss it use and importance for a
business?
Answer:
In financial accounting, a cash flow statement, also known as
statement of cash flows, is a financial statement that shows how
changes in balance sheet accounts and income affect cash and
cash equivalents, and breaks the analysis down to operating,
investing, and financing activities.
OR
Additions to property, plant, equipment, capitalized software
expense, cash paid in mergers and acquisitions, purchase of marketable
securities, and proceeds from the sale of assets are all examples of entries
that should be included in the cash flow from investing activities section.
Importance:
Cash is also important because it later becomes the payment for things that make
your business run: expenses like stock or raw materials, employees, rent and other
operating expenses. Naturally, positive cash flow is preferred. Positive cash flow means
your business is running smoothly.
Use:
The cash flow statement is the financial statement that presents the cash inflows and
outflows of a business during a given period of time. ... The income statement will
record sales and profits but it's the cash flow statement that will alert you if those sales
aren't generating enough cash to cover expenses.
Prepared By:
Malik Usama
Question: Income and Profit ii) Fixed Assets and Current Assets
iii)Tangible Assets and Intangible Assets
:جواب
Income is the top-line revenue. This number is calculated by tallying every penny that
came into the company during a given period. Income is commonly referred to as
“Gross Revenue.” On the other hand, profit is the amount that is left over after the
expenses have been paid.
Profit Formula
The formula for profit is:
Using the profit formula and the information above, we can calculate that Company XYZ's profit
was:
Malik Usama
Examples
An example of a company's fixed asset would be a company that produces and
sells toys. The company purchases a new office building for $5 million along with
machinery and equipment that costs a total of $500,000. The company projects
using the building, machinery, and equipment for the next five years. These
assets are considered fixed tangible assets because they have physical form, will
have a useful life of more than one year, and will be used to generate revenue for
the company.
تعر یف
Assets are everything a company
owns. Tangible assets are physical; they include cash, inventory, vehicles, equipment,
buildings and investments. Intangible assets do not exist in physical form and include
things like accounts receivable, pre-paid expenses, and patents and goodwill.
مثا ل
Prepared By:
Malik Usama
4. The Client will only be able to access the Software by completing an online
subscription or logging in to an Account we create for you.
5. The services provided by the Company include Account creation, training and
support (―Services‖) as set out on the Site or in the Quote.
Prepared By:
Malik Usama
2. Information that is created when you subscribe, such as log in details and
passwords (―Client Information‖) is stored on servers in Ireland and Germany
however some Data may pass through or be stored on servers outside of Ireland or
Germany. We will take industry best-practice steps to ensure that Client
Information is kept secure and confidential.
3. You will be required to pay a fee for your subscription to the Software
(―Subscription Fee‖) as set out on our Site or in our Quote. You will not be given an
Account to access and use the Software until payment is made.
4. Upon subscription, the Client obtains a valid Account to use the Software for the
Term of this Agreement.
2. You will be required to make payment by way of bank transfer or credit card. If you
subscribe online you must provide your credit card details when completing your
online subscription.
1. if we are unable to take payment from your credit card, we will attempt to
contact you via email as soon as we become aware of the payment failure.
Until payment is confirmed, your Account will be locked and you will not be
able to access or use the Software.
Malik Usama
2. To terminate an Account, the Client must advise us in writing at least 30 days before the
end of the Term. The Client‘s Account will be terminated at the end of the Term, and
automatic payments will cease at the end of the Term.
Primary infringement
Acts of primary infringement will not require knowledge or intention to infringe on
the part of the „infringer‟ – the violation of the restricted rights are strict liability
“offences”.
An act of primary infringement is undertaken if an individual engages in any of the
following acts which contravene the restricted rights of the owner of the copyrighted
work:
Duplicating the work
Issue duplicates of the work
Rent or loan the work to the public
Perform, display or play the work in public
Communicate the work to the public
Make an adaptation of the work
Infringement occurs when either the whole or a substantial part of the author of the
work‟s restricted rights are used by another person without authorisation. This use can
be direct or indirect on the part of the infringer. A direct infringement would be, for
example, duplicating the architectural drawings of the owner. An indirect
infringement could take place in the event the infringer went to the house that had
been built utilizing the architectural drawings of the owner of the copyright and
subsequently made a copy of the floor plan and dimensions of the house.
It can also be a breach of copyright to authorize any other individual to do any of the
above acts which impinge upon the restricted rights of the owner of the copyrighted
work.
Prepared By:
Malik Usama
Secondary infringement
Secondary infringement must involve some knowledge by the infringer of the
copyrighted work. It is usually it is retailers or publishers who are „secondary
infringers‟. Examples of secondary infringement include:
Importing infringing copy
Possession of or dealings with infringing copy
Providing the opportunity for making infringing copies
Knowledge may be established on both an objective and a subjective basis.
Objectively, a Defendant is held to have knowledge of infringement if a reasonable
man would arrive at the relevant belief of infringement on the particular facts.
Increasing communication
Hierarchy between you and your team will diminish by delegating. They will notice that
you brought them to your level, which will make communication easier for you and
them. In addition, explaining tasks and sharing ideas together will lessen the distance
between the team‘s workers. You will all be one unit doing its best for the benefit of all!
Collective success
In delegation, when reaching goals, the success will be the one of the whole team and
not an individual. A collective success will make the person feel as an entity with the
Prepared By:
Malik Usama
company, and it will empower the team to look forward to another success and another
challenge to break!
Collective success
In delegation, when reaching goals, the success will be the one of the whole team and
not an individual. A collective success will make the person feel as an entity with the
company, and it will empower the team to look forward to another success and another
challenge to break!
Malik Usama
1. Members shall in their professional practice safeguard public health and safety and have
regard to protection of the environment.
Prepared By:
Malik Usama
2. Members shall have due regard to the legitimate rights of third parties.
3. Members shall ensure that within their chosen fields they have knowledge and
understanding of relevant legislation, regulations and standards and that they comply
with such requirements.
4. Members shall in their professional practice have regard to basic human rights and shall
avoid any actions that adversely affect such rights.
5. Members shall carry out work with due care and diligence in accordance with the
requirements of the employer or client and shall, if their professional judgement is
overruled, indicate the likely consequences.
6. Members shall endeavour to complete work undertaken on time and to budget and shall
advise their employer or client as soon as practicable if any overrun is foreseen.
7. Members shall not offer or provide, or receive in return, inducement for the introduction
of business from a client unless there is full prior disclosure of the facts to the client.
8. Members shall not disclose or authorise, to be disclosed, or use for personal gain or to
benefit a third party, confidential information acquired in the course of professional
practice, except with prior written permission of the employer or client, or at the
direction of a court of law.
9. Members should seek to avoid being put in a position where they may become privy to
or party to activities or information concerning activities which would conflict with their
responsibilities in 1-4 above.
10. Members shall not misrepresent or withhold information on the capabilities of products,
systems or services with which they are concerned or take advantage of the lack of
knowledge or inexperience of others.
11. Members shall not, except where specifically so instructed, handle client's monies or
place contracts or orders in connection with work on which they are engaged where
acting as an independent consultant.
12. Members shall not purport to exercise independent judgement on behalf of a client on
any product or service in which they knowingly have any interest, financial or otherwise.
13. Members shall uphold the reputation of the Profession and shall seek to improve
professional standard through participation in their development, use and enforcement,
and shall avoid any action, which will adversely affect the good standing of the
Profession.
Prepared By:
Malik Usama
14. Members shall in their professional practice seek to advance public knowledge and
understanding of computing and information systems and technology and to counter
false or misleading statements, which are detrimental to the Profession.
15. Members shall encourage and support fellow members in their professional development
and, where possible, provide opportunities for the professional development of new
entrants to the Profession.
16. Members shall act with integrity towards fellow members and to members of other
professions with whom they are concerned in a professional capacity and shall avoid
engaging in any activity, which is incompatible with professional status.
17. Members shall not make any public statements in their professional capacity unless
properly qualified and, where appropriate, authorised to do so, and shall have due
regard to the likely consequences of any statement on others.
18. Members shall seek to upgrade their professional knowledge and skill and shall maintain
awareness of technological developments, procedures and standards which are relevant
to their field, and shall encourage their subordinates to do likewise.
19. Members shall seek to conform to recognised good practice including quality standards,
which are in their judgement relevant, and shall encourage their subordinates to do
likewise.
20. Members shall only offer to do work or provide a service, which is within their
professional competence and shall not claim to any level of competence, which they do
not possess, and any professional opinion, which they are asked to give, shall be
objective and reliable.
21. Members shall accept professional responsibility for their work and for the work of their
subordinates and associates under their direction, and shall not terminate any
assignment except for good reason and on reasonable notice.
22. Members shall avoid any situation that may give rise to a conflict of interest between
themselves and their client and shall make full and immediate disclosure to the client if
any conflict should occur.
ختم شدھ
Malik Usama