Skip to main content

Posts

Showing posts from November, 2012

Healthcare Systems Article Category

Medical Factors Which make it The most effective  just by Sejal Kakadiya  Medicine and health agencies with now consentrate on top quality, charge together with great satisfaction health of their solutions. These are typically that support beams which a lot of these agencies redefine the direction they trade. The following really results in thrilled clients.  How come Serious Treatment Direction Can be a Trend Inside Medicine and health Sector  just by Steven Orange  A whole lot of North american healthcare systems' options are generally about that direction together with procedure with serious circumstances. Direction with serious health conditions which include diabetes, excessive circulation demand, cardiovascular disease, together with hypothyroidism can be a vital component of easiest treatment healthcare provider's succeed. Inside standard product, that general practitioner spots someone on an automobile accident with treatment, inspects that condition ...

Secure Socket Layer (SSL)

Secure Socket Layer ( SSL ) is a security protocol that was developed by Netscape Communications Corporation , along with RSA Data Security, Inc. The Primary goal of the SSL protocol is to provide a private channel between communicating applications, which ensures privacy of data, authentication of the partners, and integrity. The Secure Socket Layer (SSL) technology was used for the websites or web applications which need more security.  SSL handshake protocol with two way authentication with certificates. (Photo credit: Wikipedia )   Secure Socket Layer (SSL) is composed of two layers: At the lower layer, a protocol for transferring data using a variety of predefined cipher and authentication combinations, called the SSL Record Protocol. On the upper layer, a protocol for initial authentication and transfer of encryption keys, called the SSL Handshake Protocol. An SSL session is initiated as follows: On the client (browser), the user requests a document with a special UR...

Internet Security & IP Security (IPSec)

English: Encapsulating one IP packet in another IP packet (Photo credit: Wikipedia ) Internet Security is the securing web server and client (browser) from the possible attacks over the Wide Area Networks or Internet. Internet security is a type of Computer Security or the network Security. It includes mainly specific security protocols like IPSec (Internet Security Protocol), SSL ( Secure Socket Layer ) or TSL (Transport Layer Security). Internet Security also describes about PGP ( Pretty Good Privacy ) which is designed to create authenticated and confidential e-mails. It also discuss about Firewalls and Antivirus Programs. # IP Security (IPSec) IP Security (IPSec) is collection of protocols designed by Internet Engineering Task Force (IETF) to provide security for a packet at the network level. It helps to create authenticated and confidential packets for the IP layer. IPSec operates in one of the following two modes. i) Transport Mode In this mode, IPSec protects what is delive...

Solved MCQ of System Analysis and Design Set-3

  Q.1 A ……………… system in no more than idea. A) Conceptual B) Logical C) Physical D) None Q.2 Design Phase consists of ……………………. 1.        Identity the functions to be performed 2.        Design the input/output and file design 3.        Defining basic parameters for system design A) 1 & 2 B) 2 & 3 C) 1 & 3 D) 1, 2 & 3 Q.3 A context diagram A) Describes the context of a system B) is a DFD which gives an overview of the system C) is a detailed description of a system D) is not used in drawing a detailed DFD Q. 4 HIPO stand for A) Hierarchy input process output B) Hierarchy input plus output C) Hierarchy plus input process output D) Hierarchy input output Process Q.5 Statement of scope and objectives, opportunities and performance criteria …………. A) Problem definition B) System analysis C) System Design D) Documentation Q.6 Information can be categorized into ……………. 1.   ...

Solved MCQ of System Analysis and Design Set-2

Q.1 ………… is a sort of blueprint of the system Development Effort. A) MDP B) DMP C) MPD D) DPM Q. 2 Data store in a DFD represents. A) a sequential file B) a disk store C) a repository of data D) a random access memory Q.3 …………… system consists of programs, data files and documentation A) Conceptual B) Logical C) Physical D) None of the above Q.4 …………… is a good example of deterministic system. A) Life cycle B) Computer Program C) Software Program D) None of the above Q.5 The main ingredient of the report documenting the ……………… is the cost benefit analysis. A) System Analysis B) Feasibility Study C) System Analyst D) System Design Q.6  A data flow can A) Only a data store B) Only leave a data store C) Enter or leave a data Store D) Either enter or leave a data store but not both Q.7  Changing the relationship with and services provided to customers in such a way that they will not think of changing suppliers is called …………. A) Lock in customers B) Lock out customers C) Lock in ...

Solved MCQ of System Analysis and Design Set-1

Q. 1 …………………………. is an important factor of management information system. A) System B) Data C) Process D) All Q.2   Which are the following is / are the level(s) of documentation? A) Documentation for management B) Documentation for user C) Documentation for data processing department D) All of the above Q.3 ………………………….. level supply information to strategic tier for the use of top management. A) Operational B) Environmental C) Competitive D) Tactical Q.4   In a DFD external entities are represented by a A) Rectangle B) Ellipse C) Diamond shaped box D) Circle Q.5   …………… can be defined as data that has been processed into a form that is meaningful to the recipient and is of real or perceive value in current or prospective decisions. A) System B) Information C) Technology D) Service Q.6 Use the new system as the same time as the old system to compare the results. This is known as …… A) Procedure Writing B) Simultaneous processing C) Parallel Operation D) File Conversion Q....

Relational Database Management System (RDBMS)

      A relational database management system (RDBMS) is a database management system (DBMS) that is based on relational model. It is the information that is stored database is related to import and export information each other. It acts as an interface between the user and the data. It ensures that the data is kept in a compact and consistent format, and allow the user to ask a wide range of questions about the data. A DBMS can be described by the view of the data it presents to the user.   Key terms used in RDBMS Query: A query is a small command or program given to a database system instructing it how to manipulate some data from a database. Example: SELECT * FROM tbl_std; Relation: A relational database consists of a set of two-dimensional tables termed relations. All the data in the database is contained entirely within such tables. Each relation in the database has a unique name so that it can be identified. Example: An example of relation is sho...