You are on page 1of 19

1.(a) Discuss the main features of different generations of computers.

Ans: GENERATIONS OF COMPUTERS

Computer generations classification is mainly based on the basic devices used. Also, the
considerations are the architecture, languages, modes of operation, etc. The function performed
by the computer and the speed of their operations have been changing since the old days to the
most modern computer. Based on the period of development and the features incorporated, the
computers are classified into different generations- First generation to Fifth generation. This is
called the computer generation.

The classification and time periods are given below:

1. First Generation Computer (1945-1955)


2. Second Generation Computer (1957-1963)
3. Third Generation Computer (1964-1971)
4. Fourth Generation Computer (1972 onward)
5. Fifth Generation Computer (Present and future)

Features of first generation computers:

 Technology used: vacuum tube


 Machines languages were used to instruct the computer.
 Magnetic core memory was used as primary memory.
 Electrostatic tubes, Parer tape, punch card, magnetic tape
 Punched card, printing devices were used for input/output operations and store the result.
 It occupies very large space, slow processing, inefficient and unreliable due to low
accuracy.
 Power consumption was very high and it generated much heat.
 It could only perform straight forward simple numerical calculation.
 Computer used to be much expensive.

Features of Second generation computers:

 Technology used: Transistor


 Operating speed was in terms of a microsecond.
 Assembly language and machines independent language such as COBOL (Common
Business Oriented Language) and FORTRAN (Formula Translation) were introduced the
size of the computer.
 Magnetic core memory was used as primary memory.
 Magnetic drum and magnetic tape were used as secondary memory.
 Power required to operate them was low.
 It could perform scientific calculation such as solving differential equations.
 Storage capacity and use of computers are increased.
Features of the third generation computers are:

 The technology used: IC (Integrated Circuit).


 Transistors were replaced by IC in their electronic circuitry.
 High-level languages like FORTAN , BASIC and other are used to develop programs.
 Semiconductor memory like RAM and ROM were used as primary memory.
 Monitor and keyboard were introduced for data input and output respectively.
 Multiprogramming facility was developed.
 The computer was used in census calculation, military, banks and industries.
 Size, cost, power requirement and heat generation decreased.
 Processing speed and storage capacity used of computer increased.

Features of the fourth generation computer are:

 Technology in use: VLSI is introduced and used Microprocessor-based technology.


 Problem-oriented fourth generation language (4GL) is used to develop the program.
 Semiconductor like RAM, ROM and cache memory is used as a primary memory.
 Magnetic disks like hard disk, optical disk (CD,DVD), Blue-ray disk, flashes memory
(memory chip, pen drive) are used as secondary memory.
 E-mail, Internet and mobile communication are developed.
 Advanced, user-friendly, web page software are developed.
 Size, cost, power requirement, heat generation decreased compared to the previous
generation.
 Operating speed, storage capacity ,use of computer increased compared to the previous
generation

Features of the fifth generation computers are:

 Technology to be used: These machines will incorporate Bio-chip and VVLSI (Very
Very Large Scale Integration) or Ultra-Large Scale Integration (ULSI)
 The computer will have Artificial Intelligence (AI).
 Natural language will be used to develop programs.
 The computer will have parallel processing in full fledge.
 The operating speed will be in terms of LIPS(Logical Inference per Second)
 These aim is to solve highly complex problems, which require great intelligence and
expertise when solved by people.
 Quantum computation, molecular and nanotechnology will be used completely.

(b) What are the main functions of RAM, BIOS and hard disk?

Ans:

RAM stands for Random Access Memory. RAM is a type of primary memory in computer and other
computing devices. RAM is made up of semiconductors, thus it is a type of semiconductor memory.
RAM allows the user/CPU to randomly access any part of the data regardless of its position. RAM is a
volatile memory which means the data in RAM is dependent on the power supply and as lost when
power is switched off.

There are many basic and main functions of random access memory, which are given below.

 Reading Files
 Temporary Storage
 Loading Applications

1.) Reading Files

This is also the work of RAM memory. Your computer hard disk stores large amounts of data.
And because of storing large amounts of data, the hard disk slowdown of your computer works.

Due to storing a large amount of data on a computer hard disk, if you have to retrieve a file, then
you have to search that file in your computer which takes a lot of time because all the data on the
hard disk is scattered.

2.) Temporary Storage

That program or files of the computer which have been used, then RAM saves the data in a
temporary way, which is the main function of the computer RAM.

RAM also stores the data that is used resentingly or the programs or files that are being used
repeatedly in your computer system.

3.) Loading Applications

Loading a software application is also the main function of RAM.

Any software or application opens in the computer using Ram itself.

A “BIOS” (Basic Input/output system) is software or firmware capable of starting your computer
system.

The BIOS Power on Self Test is started when the computer system is started, but to ensure that
all the hardware connected to the system is working properly

There are four main functions of BIOS are available in most computers

 POST: Checks your computer system’s processor memory, chipsets, videos, adapters,
disk controllers, disk drives, keyboards, and other hardware to check if they are working
properly.
 SETUP: enables configuring your computer system’s motherboard and chipset settings
System configuration and setup programs are typically a menu-based program that is
activated by pressing a Special Key during POST.

 BIOS: It is a collection of drivers that acts as a basic interface between your computer
system and the OS and your hardware when it boots.

 BOOTSTRAP LOADER: Hard disk is required to load the OS, hard disk drives read
the boot sector. It is a program that is stored in the ROM or EPROM of your computer
that when the computer is powered on. Is automated by the processor. Loading the OS
from a floppy disk or hard disk into the main memory (RAM) of the computer makes the
program work until the process is successfully completed in the boot memory (RAM),
then the main copy is made to the OS, then Till the user cannot use the computer.

A hard disk is also known as a hard drive or fixed disk. It is said to be rigid magnetic disc that
stores data. It is located within a drive unit. Hard disk is a non-volatile storage device that
contains platters and magnetic disks rotating at high speeds. Non-volatile means the data retains
when the computer shuts down.

It is installed internally in our computer systems. Hard disk is located within a drive unit on the
computer's motherboard and comprises one or more platters packed in an air-sealed casing

Function of Hard disk

The hard disk is a secondary storage device, which is designed to store data permanently. The
secondary storage devices include a large storage capacity as compared to the primary storage
devices. The data stored in a hard disk is retained when our computer system shuts down. The
data stored in the hard disk can be of many types such as the operating system, installed
software, documents, and other files of computer.

Every computer contains atleast one hard drive to store data and software. In Windows operating
system, the hard drive is known to be the C drive, and in MAC, it is simply called as the hard drive. The
desktop computers which have external hard drives are used for backup purposes or additional storage.

The main function of a Hard Disk is to store computer data forever. Therefore it is also called Permanent
Storage. This data can be of many types, such as your personal files, documents, software, operating
system etc. How much data can be stored in these hard disks, it depends on the storage capacity of the
Hard Disk. Today you will find such hard disks whose capacity to store data ranges from gigabytes to
terabytes

(c) Describe the features of any two widely used application packages.

Ans:
Features of a word processors

 A word wrap which automatically starts a new line if there is insufficient room at the
hand margin
 Availability of different fonts, character sizes and styles
 Text paragraph and page formatting eg text alignment, indenting, page number etc
 Search and replace command which allow replacement of every incidence of a certain
combination of characters with a set of characters
 Undo which allows action that have been performed to be reversed
 Printing of documents single or multiple choices
 Mail merging that is very essential while similar letters have to be sent
 Ability to create and import tables, text and graphics from other programs

A web browser is a software application that is used to access the world wide web(www) or as known by
everyone on the Internet. It is an interface between us and the information available on the web.

Features of a Web Browser

Some of the features of the web browser include-

1. Home button – Clicking the ‘Home’ button brings the user directly back to the home page of the
browser. We can set any webpage as the home page. Usually people prefer to have search
engines like – Google.com as their home page.

2. Address bar – The address bar is where the URL of the desired website is entered. This bar helps
us to navigate to the desired website of our choice.

3. Refresh button – The refresh button is to reload the page. In some cases, the page locally stores
and saves the information. This prevents users from seeing the updated information. Therefore,
the refresh button is helpful in such cases.

4. Bookmarks – This option is to save a particular website for reference later in the future. It is
used to mark pages that might be important or prove to be useful in the future.

5. Tabbed browsing – This feature helps to open new screens on the same browser for multiple
browsing at the same time.

2.(a) Describe standard number systems with examples.

Ans: Previous

(b)Convert the following numbers :-

(i) (746)8 to binary

(ii) (1011101)2 to octal


(iii) (A6B8) 16 to decimal

(c) Describe parity check.

Ans: Previous

3.(a) Discuss the benefits of database against flat file. Describe SMS banking and internet banking.

Ans:

A flat file/ flat form database is a system that stores data within a single table. It is known as a flatform
database due to it only containing a two dimensional structure (data fields and records).

This can reduce the risk of the data being loss as the database can be saved in a variety of different
forms.

This type of database makes it simple for the editor to update as the data is split into separate data
fields instead of multiple tables.

Advantages of DBMS over File system:

 Data redundancy and inconsistency: Redundancy is the concept of repetition of data


i.e. each data may have more than a single copy. The file system cannot control the
redundancy of data as each user defines and maintains the needed files for a specific
application to run. There may be a possibility that two users are maintaining the data of
the same file for different applications. Hence changes made by one user do not reflect in
files used by second users, which leads to inconsistency of data. Whereas DBMS controls
redundancy by maintaining a single repository of data that is defined once and is accessed
by many users. As there is no or less redundancy, data remains consistent.
 Data sharing: The file system does not allow sharing of data or sharing is too complex.
Whereas in DBMS, data can be shared easily due to a centralized system.
 Data concurrency: Concurrent access to data means more than one user is accessing the
same data at the same time. Anomalies occur when changes made by one user get lost
because of changes made by another user. The file system does not provide any
procedure to stop anomalies. Whereas DBMS provides a locking system to stop
anomalies to occur.
 Data searching: For every search operation performed on the file system, a different
application program has to be written. While DBMS provides inbuilt searching
operations. The user only has to write a small query to retrieve data from the database.
 Data integrity: There may be cases when some constraints need to be applied to the data
before inserting it into the database. The file system does not provide any procedure to
check these constraints automatically. Whereas DBMS maintains data integrity by
enforcing user-defined constraints on data by itself.
 System crashing: In some cases, systems might have crashed due to various reasons. It is
a bane in the case of file systems because once the system crashes, there will be no
recovery of the data that’s been lost. A DBMS will have the recovery manager which
retrieves the data making it another advantage over file systems.
 Data security: A file system provides a password mechanism to protect the database but
how long can the password be protected? No one can guarantee that. This doesn’t happen
in the case of DBMS. DBMS has specialized features that help provide shielding to its
data.
 Backup: It creates a backup subsystem to restore the data if required.
 Interfaces: It provides different multiple user interfaces like graphical user interface and
application program interface.
 Easy Maintenance: It is easily maintainable due to its centralized nature.

2nd part Previous

(b) Discuss about the functionalities of a modern core banking software. What do you understand by
ERP software?

Ans: Previous

4. (a) What is IT audit? Explain the necessity of IT audit in banks.

Ans: Previous

(b) What are the features of AML software? How can we manage the risks of internet banking?

Ans: 1st part Previous

we can manage the risks of internet banking by-

Identify, classify and assess risks that are relevant to the bank's operations and systems.

- Develop a documented plan containing policies, practices and procedures that address and control
these risks.

- Implement and regularly test the plan.

- Monitor risks and the effectiveness of the plan on an ongoing basis.

- Update the plan periodically to take account of changes in technology, legal requirements and business
environment including external and internal threats and security vulnerabilities.

The aim of this set of guidelines is to require banks to adopt risk management principles and security
practices which will assist them in:

- Establishing a sound and robust technology risk management framework. Strengthening system
security, reliability, availability and recoverability.

- Deploying strong cryptography and authentication mechanisms to protect customer data and
transactions.

- All banks providing internet banking must erect a sound and robust risk management process that will
enable them to identify, assess, measure and respond to technology risks in a proactive and effective
manner.

5. (a) Briefly discuss about electronic fund transfer system and its benefits. What is National Payment
Switch?

Ans: Previous

(b) Discuss about shared ATM network and e-payment gateway and use of those.

Ans: Previous

6. (a) Discuss about mobile banking and RTGS. Discuss about SWIFT and its use in banks.

Ans: Previous

(b) Discuss about e-commerce and its benefits.

Ans: Previous

7. (a) Discuss about how computer can help foreign exchange dealings. What is spyware?

Ans: 1st part Previous

Spyware is any software that installs itself on your computer and starts covertly monitoring your
online behavior without your knowledge or permission. Spyware is a kind of malware that
secretly gathers information about a person or organization and relays this data to other parties.
In some cases, these may be advertisers or marketing data firms, which is why spyware is
sometimes referred to as “adware.” It is installed without user consent by methods such as a
drive-by download, a trojan included with a legitimate program or a deceptive pop-up window.

Spyware uses your internet connection to relay personal information such as your name, address,
browsing habits, preferences, interests or downloads. Other forms of spyware hijack your
browser to point it to another website, cause your device to place calls or send texts
automatically, or serve annoying ads even when you are offline. Spyware that steals your
username, password or other credentials is referred to as a “keylogger” – an insidious
prerequisite for cyber crime.

Overview. Spyware is mostly classified into four types: adware, system monitors, tracking including
web tracking, and trojans; examples of other notorious types include digital rights management
capabilities that "phone home", keyloggers, rootkits, and web beacons.
The main types are:

 Keyloggers: This is one of the most dangerous types. A keylogger records the user's
keystrokes on their computer. ...
 Adware: This is the most common type. ...
 Infostealers: Just like the keylogger, this type operates without the user realizing that it is
collecting and sending information from the computer.

Where is spyware used?


The primary goal of spyware is usually to obtain credit card numbers, banking information
and passwords. But spyware can also be used to track a person's location, as is the case with
stalkerware.

(b) What benefits bank may gain by using Data warehouse, Data mining and Business Intelligence
software?

Ans:

A data warehouse, or “enterprise data warehouse” (EDW), is a central repository system in


which businesses store valuable information, such as customer and sales data, for analytics and
reporting purposes.

Used to develop insights and guide decision-making via business intelligence (BI), data
warehouses often contain a combination of both current and historical data that has been
extracted, transformed, and loaded (ETL) from several sources, including internal and external
databases.

Data warehousing can help businesses in the financial sector in several ways.

First, it can provide a complete picture of an organization's financial health. This information can
make more informed decisions about where to allocate resources.

Second, data warehousing can enable businesses to track crucial financial indicators over time.
Financial data quality is enhanced through data warehouses, which can extract accurate and
reliable information from numerous sources.

Third, data warehousing can help businesses in the financial sector comply with regulations.
Financial institutions are subject to several regulations, and data warehousing can help ensure
they have the necessary information to meet these requirements.
Data warehouses are used in the same way by most financial institutions. The following are some
ways the financial industry uses data warehousing:

Manage Customer Data

Data warehouses allow companies to gather and analyze client information to improve service
delivery and strengthen customer connections. Financial firms may collect every client
interaction with data warehouses, allowing you to examine what influences purchasing decisions
and other consumer behaviors. Data warehouses simplify this by allowing you to quickly record
and track large quantities of consumer and historical data from various sources.

Increase Insights

Data warehouses play a significant role in predictive and real-time analytics for many financial
institutions. They make it possible to store data centrally and access historical information
quickly so you can start discovering patterns. This helps you get ready for future events and
make better decisions overall. Additionally, data warehouses are great for storing critical
financial details like customer insights and fraud detection info.

Minimize Risks

Investors, competitors, and other entities pose particular risks to financial institutions.
Streamlining data analysis and managing risks through enhanced machine-learning algorithms is
crucial.

Data warehousing helps automate your risk management process using algorithms and machine
learning (among others).

A data warehouse's ability to quickly centralize data from multiple sources can speed up your
analytics, allowing you to derive powerful insights efficiently and make decisions promptly to
minimize risks.

Data Warehousing Benefits For Finance

Simplified and Streamlined Reporting

Improved Analytics and Decision-Making

Simplified Data Integration

Preserved Historical Data

Increased Productivity and Accuracy

Data mining is the process of analyzing enormous amounts of information and datasets, extracting (or
“mining”) useful intelligence to help organizations solve problems, predict trends, mitigate risks, and
find new opportunities. Data mining is like actual mining because, in both cases, the miners are sifting
through mountains of material to find valuable resources and elements.

 It helps companies gather reliable information


 It’s an efficient, cost-effective solution compared to other data applications
 It helps businesses make profitable production and operational adjustments
 Data mining uses both new and legacy systems
 It helps businesses make informed decisions
 It helps detect credit risks and fraud

Marketing: One of the most widely used areas of data mining for the banking industry is
marketing. The bank‟s marketing department can use data mining to analyse customer
databases. Data mining carry various analyses on collected data to determine the consumer
behavior with reference to product, price and distribution channel. The reaction of the customers
for the existing and new products can also be known based on which banks will try to promote
the product, improve quality of products and service and gain competitive advantage. Bank
analysts can also analyze the past trends, determine the present demand and forecast the
customer behavior of various products and services in order to grab more business
opportunities and anticipate behavior patterns.

Risk Management: Data mining is widely used for risk management in the banking industry.
Bank executives need to know whether the customers they are dealing with are reliable or not.
Offering new customers credit cards, extending existing customers lines of credit, and approving
loans can be risky decisions for banks if they do not know anything about their customers.

Fraud Detection: Another popular area where data mining can be used in the banking industry
is in fraud detection. Being able to detect fraudulent actions is an increasing concern for
many businesses; and with the help of data mining more fraudulent actions are being detected
and reported. Two different approaches have been developed by financial institutions to detect
fraud patterns. In the first approach, a bank taps the data warehouse of a third party and use
data mining programs to identify fraud patterns. The bank can then cross-reference those
patterns with its own database for signs of internal trouble. In the second approach, fraud
pattern identification is based strictly on the bank‟s own internal information.

Customer Relationship Management: Today customers have wide range of products and
services provided by different banks. Hence, banks have to cater the needs of the customer by
providing such products and services which they prefer. This will result in customer loyalty and
customer retention. Data mining techniques helps to analyze the customers who are loyal from
those who shift to other banks for better services. If the customer is shifting from his bank
to another, reasons for such shifting and the last transaction performed before shifting can be
known which will help the banks to perform better and retain its customers.

Benefits of Business Intelligence for the Banking Industry

 Risk Management. ...


 Improve Operational Efficiencies. ...
 Improve Customer Satisfaction. ...
 Customer Segmentation. ...
 Secure Existing Customers. ...
 Dashboards. ...
 Analytics. ...
 Accurate Reporting.

8.(a)Discuss about 'Agent banking' and 'booth banking'. How banks take care of security concerns of
using credit card?

Ans: 1st part Previous

Ensuring our online security has never been as crucial as it is today. While we have all faced digital
dangers in the past, the threats have reached entirely new heights due to the rapid development of
technology and our increasing online presence. We are no longer using the internet only to browse and
read websites and play games. Now, it has infiltrated almost every aspect of our professional and
personal lives, from working or studying to managing our finances or contacting our healthcare
providers. While we can face fraudulent actions in any of these areas of life, the financial one is in the
biggest danger.

(1) Limit Your Risk With One Account

Designate just one credit card for all your online purchases. This way, you keep yourself from
exposing multiple accounts to hackers and can easily check for suspicious charges. Some banks
even offer special cards for online usage. Get set up to receive text message or email alerts each
time a purchase is made on your account. Whenever possible, check out as a guest when making
a purchase instead of creating an account that stores your card information in a profile, too.

(2) Get Virtual Account Numbers

Check with your credit card company to see if it offers a virtual-number service. This feature
creates a temporary one-time card number for each purchase transaction you make online. Your
real card information isn't exposed during the checkout process, but the temporary number is still
linked to your account to register your purchase activity. If hackers obtain your data later on,
they won't have your real card number.

(3) Create Unique Passwords

Passwords for your online card and banking profiles should be unique and complex to prevent
hackers from accessing multiple accounts using the same login information. Generally, an
effective password is long, contains both upper- and lower-case letters, has numbers and uses
symbols (if permitted). Try using a phrase or an entire sentence to create complexity, replacing
words like "to" with the number 2 and "and" with ampersands. Use memorable phrases that you
won't forget — but that also don't contain any personal details — and don't write your passwords
down anywhere.
(4) Remember "S Is for Secure"

Always make sure your connection to a website is secure. When you see the lock symbol in your
Internet browser's URL field, and the address starts with "https" rather than "http", this indicates
that the transaction is encrypted. This isn’t 100 per cent safe, since cybercriminals can obtain
legitimate security certificates, but it does prevent opportunistic scams.

(5) Use Known, Trusted Sites

Choose retailers that you're familiar with. If you aren't familiar with a site, do some research to
find out more about it. Also take note of the design; if it looks off or unprofessional, find your
product elsewhere. There are plenty of reputable ecommerce sites to choose from.

(6) Only Shop on Secure Network

For online shopping, only use secure, reputable websites and avoid shopping on public Wi-Fi.
Cyber criminals often spy on public Wi-Fi networks and intercept data that transferred across the
link. Public network can leave you vulnerable to these attacks enabling hackers to access your
confidential financial information, banking credentials, account passwords and other sensitive
data. Read more about Public Wi-Fi security.

(7) Use Security Software

Use security software that protects both your desktop and mobile devices. Many of us shop on
the small screen, and that can make us more vulnerable to hackers. Cover yourself with antivirus
software or a comprehensive Internet Security software that offers protection on all devices.

(8) Update to Stay Safe

Stay on top of updates for your operating system and other software. Often, these updates patch
security holes to keep you safer. When you get a notification that an update is available,
download it right away.

(b) Describe the stages of software development life-cycle.

Ans: Previous

9. (a) Describe OMR, OCR and MICR.

Ans: Previous
(b) Describe about cyber crime and cyber law in Bangladesh.

 Ans: Cyber Crime:

Generally Cyber crime, or computer related crime, is crime that involves a computer and a
network. The computer may have been used in the commission of a crime, or it may be the
target.

Bangladesh does not have any officially recognized national cybercrime policies/strategies.

However, the Government of Bangladesh framed the National Cybersecurity Strategy of


Bangladesh for protecting cyber world against security threats, risks and challenges to national
security. The Strategy addresses the country’s national security strategy. The purpose of this
document is to create a coherent vision for 2021 keeping Bangladesh secure and prosperous by
coordinating government, private sector, citizens and international cyberspace defense efforts.

There are some Cybercrime prevention agencies like The Bangladesh Telecommunication
Regulatory Commission (BTRC), Bangladesh Computer Security Incident Response Team
(bdCERT) have been set up for the purpose of curbing cybercrimes.

Bangladesh has also set up various specialized cybercrime police stations. Cyber incident
response unit and ‘a cybercrime investigation cell’ and ‘IT Crime Forensic Lab’ are set up by the
Bangladesh police to fight against cybercrime or crime related with computer and other IT
technology.

In the Digital Security Act 2018, a Digital Security Agency is established, in order to ensure the
fulfilling of the Act.

Cybercrime legislation
State of cybercrime legislation

Substantive law

Procedural law

Safeguards

 Types of Cyber Crimes:

Cyber crimes can be divided into 3 categories:

1. Cyber crimes against Persons.

2. Cyber crimes against Property.


3. Cyber crimes against Government.

 Problem Areas:

1. Telecommunications

2. Electronic vandalism, terrorism and extortion

3. Stealing telecommunications services

4. Telecommunications piracy

5. Pornography and other offensive material

6. Telemarketing fraud

7. Electronic fund transfer crime

 Cyber Laws in Bangladesh

Information and Communication Technology Act 2006: To prevent Cyber Crimes


Bangladesh Government firstly enacted Information and Communication Technology Act 2006
(ICT Act). Government has enacted the said Act to provide legal recognition and security of
Information and Communication Technology. Government has also amended the Act several
Times.

Information Technology(Certifying Authorities) Rules, 2010: This Rule provides guidelines,


advice and information about the factors which the Controller of Certifying Authorities (CCA)
will take into account in its operation and the functioning of the Certifying Authorities.

Digital Security Act 2018: On 2018 Government has passed this Act to ensure digital security
and prevent crimes committed on digital platforms.

Digital Security Rules 2020: According to Section 60 of the Digital Security Act 2018
Government published the Digital Security Rules 2020.

(c) Describe any procedure for data encryption and decryption.

Ans:

Encryption is the process of translating plain text data (plaintext) into something that appears to be
random and meaningless (ciphertext). Decryption is the process of converting ciphertext back to
plaintext.
The Procedure of the Encryption Process

Data, Encryption engine, and key management are the three main components of the encryption
process. The data to be secured is encrypted using an encryption algorithm. The sender decides
on the type of algorithm to be used and the variable to be used as a key. Then this encrypted data
can be decrypted only using a proper key shared by the sender.

Encryption-Process

The encryption algorithms are of two types – symmetrical and asymmetrical. Symmetric Cypers
are popularly known as the secret key encryption. This algorithm uses a single key. Here, the key
is shared by the sender to the authorized recipients. Advanced Encryption Standard is the widely
used symmetric algorithm.

The asymmetric encryption algorithm is also known as private key encryption. This algorithm
uses two different keys – a private key, public key. These keys are logically linked. Here, prime
numbers are used to make the key. This makes the reverse engineering of encryption more
difficult. Rivest – Shamir – Adleman is the popularly used asymmetric encryption algorithm.

Decryption is the process of transforming data that has been rendered unreadable through encryption
back to its unencrypted form. In decryption, the system extracts and converts the garbled data and
transforms it to texts and images that are easily understandable not only by the reader but also by the
system. Decryption may be accomplished manually or automatically. It may also be performed with a set
of keys or passwords.

Decryption is a process that transforms encrypted information into its original format.

The process of encryption transforms information from its original format — called plaintext —
into an unreadable format — called ciphertext — while it is being shared or transmitted.
To do this, parties to a private conversation use an encryption scheme, called an algorithm, and
the keys to encrypt and decrypt messages. (Encrypted messages are called ciphertext, as
algorithms are also called ciphers.)

Message recipients decrypt the information back into its original, readable format. Future
messages when passed through the system are encrypted, and vice versa.

10. Write short notes on any four of the following:

(a) E-governance

Ans: Previous

(b) Bangladesh Automated Clearing House

Ans: Previous

(c) Digital Signature

Ans: Previous

(d) Private Cloud

Ans:

A Private Cloud is a model of cloud computing where the infrastructure is dedicated to a single user
organization. A private cloud can be hosted either at an organization’s own data center, at a third party
colocation facility, or via a private cloud provider who offers private cloud hosting services and may or
may not also offer traditional public shared multi-tenant cloud infrastructure.

Why use Private Clouds?

Private Clouds offer the same control and security as traditional on-premises infrastructure. Here
are some reasons why organizations opt for private cloud computing:

 Security: Private cloud security is enhanced since traffic to a private cloud is typically limited to
the organization’s own transactions. Public cloud providers must handle traffic from millions of
users and transactions simultaneously, thus opening a greater chance for malicious traffic. Since
private clouds consist of dedicated physical infrastructure, the organization has better control
over the server, network, and application security.
 Predictable performance: Because the hardware is dedicated rather than multi-tenant,
workload performance is predictable and unaffected by other organizations sharing
infrastructure or bandwidth.

 Long-term savings: While it can be expensive to set up the infrastructure to support a private
cloud, it can pay off in the long term. If an organization already has the hardware and network
required for hosting, a private cloud can be much more cost-effective over time compared to
paying monthly fees to use someone else’s servers on the public cloud.

 Predictable costs: Public cloud costs can be very unpredictable based on usage, storage charges,
and data egress charges. Private cloud costs are the same each month, regardless of the
workloads, an organization is running or how much data is moved.

 Regulatory governance: Regulations such as the EU’s GDPR may dictate where data resides and
where computing occurs. In those regions where public cloud providers cannot offer service, a
private cloud may be required. Additionally, organizations with sensitive data such as financial
or legal firms may opt for private cloud storage to ensure they have complete control over
personally identifiable or sensitive information.

What are the 2 types of private cloud?

 Types of Private Cloud. Depending on who manages the private cloud environment and
where the cloud solution is hosted, a private cloud can be classified into four major types
– virtual private cloud, managed private cloud, hosted private cloud, and on-premise
private cloud.

What is a good example of a private cloud?


 HP Data Centers, Microsoft, Elastra-private cloud, and Ubuntu are the example of a
private cloud.

(e) Phishing

Ans: Previous

(f) Disaster Recovery Site

Ans: Previous

You might also like