assignmentssolution@gmail.com

Get Assignments and Projects prepared by experts at a very nominal fee.

More than 8 years in assisting assignments and projects/dissertation/thesis of MBA,BBA,BCA,MCA,PhD and others-

Contact us at : Email : assignmentssolution@gmail.com

Help for : SMU, IIBM,IMT, NMIMS, NIBM ,KSBM, KAIZAN, ISBM, SYMBIOSIS, NIMS, IGNOU, XAVIER, XIBMS, ISM, PSBM, NSBM, NIRM, ISBM, ISMRC, ICMIND, UPES and many others.

Help in : Assignments, projects, M.Phil,Ph.D disseration & thesis,case studies

Courses,MBA,BBA,PhD,MPhil,EMBA,MIB,DMS,MMS,BMS,GDS etc

Contact us at : Email : assignmentssolution@gmail.com



Monday 12 September 2016

AIMA Assignments: contact us for answers at assignmentssolution@gmail.com

    IS01

    Introduction to Information Technology

(For CNM Cases)
    Assignment – I
    Assignment Code: 2016IS01A1              Last Date of Submission: 30th April 2016
              Maximum Marks: 100
Attempt all the questions. All the questions are compulsory and carry equal marks.
    Section-A
1.    What are Software Technology Parks (STPs)? What is their role? Discuss

2.    Write an explanatory note on Computer Memory

3.    What are the different communication channels generally used in networking? Explain each in     detail. Differentiate between synchronous and asynchronous communication.   

4.    Describe the following terms:
    i.          Types of Data Processing
    ii.         e-Commerce Framework
    iii.    Buses and Registers
    iv.      System Softwares
    Section-B

Case Study: Database Technology Used to Improve Airport Security
The Transportation Security Administration is evaluating various approaches to harness database technology in its efforts to improve airport security.  Unfortunately, any such system may require airlines to invest in additional information systems technology – at a time when they are suffering from a lack of revenue one major airline has already declared a bankruptcy.

One idea is to develop a database system that links every airline reservation system in the country with a number of private and government databases.  Data mining and predictive analysis would be used to sort through personal travel histories, the backgrounds of passengers aboard particular flights, and a wealth of other data to assign numerical threat ratings to individuals.  Warnings would be sent electronically to workers at airport screening locations to inspect individuals with high threat ratings more closely.

Another approach would allow prescreened “trusted travelers” to pass through airport security checkpoints quickly, avoiding long lines and congestion,  This system would devote more time and resources to screening other travelers whose level of risk is higher or unknown.  Those who apply for the “trusted traveler” program would have to pass a background check using data from a number of state and federal databases.  Once at the airport, “trusted traveler” passengers would be identified, perhaps by scanning their fingerprints or retinas or requiring some form of identification card.  (The federal government is considering developing a security ID card for airline passengers that would rely on biometric identification and be linked to government database).  The system would also cross-check the passenger’s identification with the FBI’s watch list database and a federal passenger profiling system known as Computer Assisted Passenger Screening.  Provided everything was clear, they could then proceed to his or her airplane using expedited security check in procedures.

5.     Case Questions:

a.    Which approach is best in terms of improving airport security: assigning a threat rating to individuals or prescreening individuals to identify “trusted travelers”?  Why do you think this approach is best?

b.    Identify specific data that could be used to assign numeric threat ratings to individuals.  Describe how the system would work.


















   

No comments:

Post a Comment