Posts

Showing posts with the label 2076 Past Question

Why are cyber laws needed?

  WHY IS CYBERLAW REQUIRED? or, why do we need Cyber Law?  As of early 2021, the number of people that use the internet is over 4.66 Billion. With that number increasing by 7% annually. This also means every day can account for almost 8,75,000 new users. Given this swift increase in the use of Cyberspace, implementation and the usage of strict cyber rules helps establish a safe and secure environment for the users.  Living in a rapidly progressing world, the one thing to keep pace with it is the Internet. Although it initially started off as an information tool, today it helps with communication and commerce. Being highly sophisticated and developing every single day, the usage of cyberspaces has become common, hence the increase in cybercrimes is inevitable.                          Maintaining order during online activities. If somebody is found breaking rules or Cyber laws, the victim person/firm can take action against that person.                          OR, Why are cyber laws n

What is E-Governance? Discuss critical flow model and comparative analysis model in detail.

Image
E-Governance  It is a part of e-Government. E-Governance is dealing with all regulations and policies to control the services provided by the e-Government. However, the E-Government is an electronic government, which should be regulated by the E-Governance. Moreover, e-Governance refers to the utilization of information and communication technology (ICT) for providing government services, disseminating information, communication operations with the general public.   Critical Flow Model Principle • The model is based on broadcasting information of 'critical' value (which by its very nature will not be disclosed by those involved with bad governance practices) to a targeted audience using ICTs and other tools. • The targeted audience may include media, affected parties opposition parties, judicial bench, independent investigators, or the general public. • Those who would divulge such information could include upright officials and workers, whistleblowers, affected parties, and th

Discuss different types of risks which are likely to arise in software projects. Briefly explain risk analysis stage during risk management process.

There are mainly three categories of risks that are likely to arise in software projects. They are described below:-: 1) Product Risk: Product risks are the risks that influence the quality attributes as well as the performance of software being developed. Example: failure of purchase component to perform as expected 2) Project Risk: Project risks are the risks that influence the schedule of a software project and that if occur delay the development process. Example: staff turnover, hardware unavailability, etc. 3) Business Risk: Business risk is a risk that affects the organization's business that is developing or procuring the software. it could be anything that has the potential of threatening the generation of profits at the predetermined target levels. Business risks could be quite dangerous for the long-term sustainability of the business. Example: Technology change, Product completion, etc. Risk Analysis Stage - Risk Analysis in project management is a sequence of process

What is formal specification ? Discuss interface specification in detail.

Formal Specification  - Formal specification is a part of a more general collection of techniques that are known as the "formal method". Example:- COMP313"Formal methods" (These are all based on the mathematical representation and analysis of software.) - Formal methods include : Formal specification Specification analysis and proof  Transformation development Program verification Interface Specification - Large systems are decomposed into subsystems with well-defined interfaces between these subsystems. - Specification of subsystem interfaces allows independent development of the different subsystems. - Interfaces may be defined as abstract data types or object classes. - The algebraic approach to formal specification is particularly well-suited to the interface specification - Most systems must operate with existing systems and operating interfaces must be precisely specified as part of the required. Types of Interface Specification a) Procedural Interfaces - Used