Wednesday, March 14, 2018

Getting Ready for your BCS Exam

Hello BCS busy heads ,

all I can say by now is

BCS is not Impossible , but you need to be patient , wise and tactful to choose the right questions

For IS Subject

Golden Rule #1

Time is Crucial . Section A – Never take more than 30 Mins for a Question

Section B – Take 10-12 Mins for a question.

Golden Rule #2

Section A – Use essay format answering style. Explain , use examples , try to write as much as possible , while supporting your answers with diagrams etc.

Section B – Do not try to explain . Remember = exactly 12 Mins per question . only write precise points. Even bullet points are OK. BUT remember not to write few words for a bullet point. write a meaningful sentence per bullet point.

Golden Rule #3

Choose Questions wisely. take about 5 minutes to slowly read each question , mark with a big Circle , the asnwers you are sure about . Small Circles for unsure but manageable answers . crosses for what you dont know . then have a look at questions you can score the most . !!!! Very Important !

Golden Rule #4

Spend the exact minutes by timing each question. Leave some extra space at the end of every answer . (it may be useful in Rule #5)

Golden Rule #5

Never attempt more than 2 questions (Section A) and More than 5 questions ( Section B) – Its a time waste to write more questions. Instead , if yo have spare time left , you better improve the answers you have already written (remember rule #4 , leave some space ).

Golden Rule #6

Start with the easiest question and  gradually go to the most difficult one. Never start with the most difficult one , it demotivates you and even looses marks from easiest questions.

Golden Rule #7

I suggest to first do Section B (exactly taking 1 hour) and then go to Section A (which requires little bit more thinking and more writing )

Golden Rule #8

Never doubt your abilities . You came all this way because you are capable ! Believe me ! Smile

Good Luck Everyone

Lesson to be done on 19th March

Hello Everyone ,

Here's what I am planning to do on our last class

1. Statistics Lesson – Note : https://www.dropbox.com/s/ihehfre2yks80wz/2%20statistics.pdf?dl=0

2. Data Warehouses  and Data Mining

3. September 2017 – A1 – DFD , ER Revision Question

So  Dont get abscent. Last class is very very important Smile

Internet of things IoT

What is IoT ?

term IoT encompasses everything connected to the internet, but it is increasingly being used to define objects that "talk" to each other. "Simply, the Internet of Things is made up of devices – from simple sensors to smartphones and wearables – connected together," By combining these connected devices with automated systems, it is possible to "gather information, analyse it and create an action" to help someone with a particular task, or learn from a process.

The IoT is a giant network of connected "things" (which also includes people).  The relationship will be between people-people, people-things, and things-things.

How has this happened ?

Broadband Internet is become more widely available, the cost of connecting is decreasing, more devices are being created with Wi-Fi capabilities and sensors built into them, technology costs are going down, and smartphone penetration is sky-rocketing.  All of these things are creating

Why do connected devices need to share data? Because….

  • it offers us opportunity to be more efficient in how we do things in our life
  • it Saves our time and money
  • it is environmentally friendly

For Example – from a personal life

Say for example you are on your way to a meeting; your car could have access to your calendar and already know the best route to take. If the traffic is heavy your car might send a text to the other party notifying them that you will be late. What if your alarm clock wakes up you at 6 a.m. and then notifies your coffee maker to start brewing coffee for you? What if your office equipment knew when it was running low on supplies and automatically re-ordered more?  What if the wearable device you used in the workplace could tell you when and where you were most active and productive and shared that information with other devices that you used while working?

For Example – From  Medicine

IoT devices can be used to enable remotely monitor patients health , ability to send emergency notifications to medical professionals. . These health monitoring devices can range from blood pressure and heart rate monitors to advanced devices capable of monitoring specialized implants, such as pacemakers, Fitbit electronic wristbands, or advanced hearing aids.

Some hospitals have begun implementing "smart beds" that can detect when they are occupied and when a patient is attempting to get up. It can also adjust itself to ensure appropriate pressure and support is applied to the patient without the manual interaction of nurses.(According to the latest research, US Department of Health plans to save up to USD 300 billion from the national budget due to medical innovations.)

Specialized sensors can also be equipped within living spaces to monitor the health and general well-being of senior citizens, while also ensuring that proper treatment is being administered and assisting people regain lost mobility via therapy as well.Other consumer devices to encourage healthy living, such as, connected scales or wearable heart monitors, are also a possibility with the IoT. More and more end-to-end health monitoring IoT platforms are coming up for antenatal and chronic patients, helping one manage health vitals and recurring medication requirements.

Potential Problems of IoT

IoT also opens up companies all over the world to more security threats.

we have the issue of privacy and data sharing.

massive amounts of data that all of these devices are going to produce. Companies need to figure out a way to store, track, analyze and make sense of the vast amounts of data that will be generated.

Connected objects need to be able to speak to each other to transfer data and share what they are recording. If they all run on different standards, they struggle to communicate and share.

Try  Paper -  March 2017 B8

Internet of Things (IOT) sensors can be used as a source for gathering data.
a) Define what is meant by Internet of Things (4 marks)
b) Using either a medical or commercial example, describe the type of sensors that could be used and the type of data that could be collected. (8 marks)


Sources

https://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-internet-things-that-anyone-can-understand/#70f471d31d09

http://www.wired.co.uk/article/internet-of-things-what-is-explained-iot

https://en.wikipedia.org/wiki/Internet_of_things

Sunday, March 11, 2018

Software Maintenance


What are the different types of maintenance ?

  • Preventive or scheduled maintenance, where equipment or facilities are inspected, maintained and protected before break down or other problems occur.
  • Corrective maintenance where equipment is repaired or replaced after wear, malfunction or break down.
  • Predictive maintenance, which uses sensor data to monitor a system, then continuously evaluates it against historical trends to predict failure before it occurs.[10]

What are Bugs, Versions, Patch , Releases

a) A legacy system is a computer system that a company no longer wishes to support. It still works but not bugs or updates will be issued. It is possible that a third party may maintain the software but it has deemed to have reached the and of its life.

b) A bug is an error in the software. It could be terminal (cause the application etc to fail) or may cause an error too occur in an action (for example an error in a calculation) Normally a compiler or development environment will remove syntax errors A bug may also be implemented due to a faulty design.

c) Version control is related to documentation and software A library is established with previous versions Use to ensure that different version of documents and software can be maintained

d) A patch is used to fix an error in a piece of software Patch Tuesday is a traditional day when patches are released. A reported patch may show a flaw in a piece of software that could be used for an attack. Patch management is an important part of any company

Extra Notes - Cloud Computing

Image result for cloud computing

What is cloud computing : it is a service provided with virtualization. Virtualization refers to using virtual electronic services by an organization to remove ocation dependency , enabling users to connect , interact via networks .

he group of networked elements providing services need not be individually addressed or managed by users; instead, the entire provider-managed suite of hardware and software can be thought of as an amorphous cloud.(Wikipedia)

a) Infrastructure as a service - Provides virtualisation for a business A third party provider host virtually all the resources required by a company – that is software, hardware, server’s storage and other elements of infrastructure The third party will handle all maintenance, back up recovery etc. Effectively a small company can outsource its entire computing provision to a cloud provider Some discussion on advantages about not needing expensive people, machines etc or discussion about over reliance on third party etc

b) Platform as a service - Provides an environment that allows developers to build applications and services Might be a point and click development environment where key components have already been built (almost off the shelf) These services are managed by the cloud provider. Usually a subscription service Advantage – company does not have to purchase an infrastructure, using existing pre-build apps should increase security. Disadvantages – reliance on third party code, reliance on cloud provider etc

c) Software as a service - Removes the need for an internal data centre A third party hosts the data, and performs all the associated backup and recovery. May be a pay as you go style contract Allows the ability to upscale or downscale depending on requirements Does not required expensive on expensive highly trained individuals But does rely on the third party provider

Extra - Mobile "backend" as a service (MBaaS)

backend as a service (BaaS), web app and mobile app developers are provided with a way to link their applications to cloud storage and cloud computing services with application programming interfaces (APIs) exposed to their applications and custom software development kits (SDKs). Services include user management, push notifications, integration with social networking services[78] and more. (Wikipedia)

Threats to Data and Systems

Possible threats

  1. Computer viruses – these are computer programs that intend to alter its normal process
  2. Spyware – Programs that download to a computer and spy the information , messages , confidential codes such as passwords.
  3. Hacking - External parties getting access to internal network
  4. Cracking - Breaking in to password protected files / encrypted file
  5. Sniffing – listening to confidential conversations on the web
  6. Spoofing – illegal user joining a conversation using a false identity