Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

practicals of amity universiyt, Assignments of Data Structures and Algorithms

practicals of amity university

Typology: Assignments

2020/2021

Uploaded on 06/08/2021

unnn-known
unnn-known 🇮🇳

1 document

1 / 8

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Q1) Explain collaborating via social network and groupware.
Discuss in detail any two non-web conferencing tools.
A social network is a hosted site gathering communities of users who are connected by specific
types of relationship, such as friendship, kinship, common interest, financial exchange, or
relationships of beliefs, knowledge .
Common Features :
blog,
discussion forum,
chat space,
file sharing ,
video,
posting running lists of current activities and so on .
Examples of social network sites :
Facebook : www.facebook.com
MySpace : www.myspace.com
Benefits:
Share documents,files ,photos and videos
Free to use
Enough functionality
Unnecessary IT support
Ease to join and use
expand the scale of friend circle
Groupware is collaboration software for workgroups to communicate and manage their
group projects without the constraints of location
Features:
File and document uploading and sharing
Web calendar
Task/project manager
Message boards
Text-based chat rooms / instant messaging
Wiki-like collaborative pages
Blogs
social network is useful to communicate but is not enough to manage group projects
Gathering all group communications in one place , better cost control
Much easier to communicate ,reduce numbers of meetings and conferences calls ,email
traffic
Increase group’s and individual efficiency
Increased competion and complexity in products and business produres
Some popular online groupware applications
AirSet: www.airset.com
ContactOffice : www.contactoffice.com
Google Sites: sites.google.com
Huddle: www.handle.net
Nexo : www.nexo.com
OpenTeams: www.openteams.com
pf3
pf4
pf5
pf8

Partial preview of the text

Download practicals of amity universiyt and more Assignments Data Structures and Algorithms in PDF only on Docsity!

Q1) Explain collaborating via social network and groupware.

Discuss in detail any two non-web conferencing tools.

A social network is a hosted site gathering communities of users who are connected by specific types of relationship, such as friendship, kinship, common interest, financial exchange, or relationships of beliefs, knowledge. Common Features :  blog,  discussion forum,  chat space,  file sharing ,  video,  posting running lists of current activities and so on. Examples of social network sites : Facebook : www.facebook.com MySpace : www.myspace.com Benefits:  Share documents,files ,photos and videos  Free to use  Enough functionality  Unnecessary IT support  Ease to join and use  expand the scale of friend circle Groupware is collaboration software for workgroups to communicate and manage their group projects without the constraints of location Features:  File and document uploading and sharing  Web calendar  Task/project manager  Message boards  Text-based chat rooms / instant messaging  Wiki-like collaborative pages  Blogs  social network is useful to communicate but is not enough to manage group projects  Gathering all group communications in one place , better cost control  Much easier to communicate ,reduce numbers of meetings and conferences calls ,email traffic  Increase group’s and individual efficiency  Increased competion and complexity in products and business produres Some popular online groupware applications  AirSet: www.airset.com  ContactOffice : www.contactoffice.com  Google Sites: sites.google.com  Huddle: www.handle.net  Nexo : www.nexo.com  OpenTeams: www.openteams.com

 ProjectSpaces: www.projectspaces.com  Teamspace: www.teamspace.com Examples of two non-web conferencing tools are zoom and ms teams ZOOM ->Zoom proved that modern companies could communicate through video just as naturally as through audio and chat – and they could do it without the glitches of previous solutions. Zoom Meetings became the core product of the portfolio, delivering an incredible combination of HD video and audio, as well as things like transcripts of calls and intelligent features too. To make the Zoom solution even more impressive, the company even implemented it’s own free tier, so that team members can start connecting without paying anything at all. Today, we can access Zoom for everything from online webinars and training sessions, to state-of-the-art calls and even instant chat. Some of the most exciting features of Zoom Meetings include:  Easy adoption with WebRTC technology  Join from anywhere on any device  Access robust security solutions throughout  Built-in tools for screen sharing  HD video and audio calls  Support for up to 1,000 video participants and 49 videos  Meet securely with role-based user permissions  Streamlined calendaring services with Outlook and Google  Built-in recording and transcripts  Team chat both for groups and one-on-one messaging  Access to extra features like webinars, chat, and phone Ms Teams-> Microsoft’s flagship collaboration and communication hub, Microsoft Teams, is the toolset to replace Skype for Business in the office environment. Released on the 2nd^ of November 2016 during an event in New York City, Teams emerged as an exciting new chat-based workspace. According to Microsoft, the platform was built to support the emerging popularity of communication and collaboration products within a world of increasingly mobile workforces.Teams is a platform which aims to make communication more streamlined for business groups. Current features at the time of writing include:  Threaded conversations  Instant messaging/Chat  Video and voice conferencing  Team chat and private messaging  Virtual assistant bots  Customisation features for each team  Open API for integrations  Conversation search and contact search  Real-time chat history across devices  Customisable alerts  File and document sharing  Multi-factor authentication  Internal and external communication  In-Field scheduling support

3) task management Whatever tool we use to manage our tasks, whether a simple to-do list or a comprehensive task management tool, the most important aspect of task management is prioritization. Say we are running behind schedule for a construction project and one of the pending tasks is a required safety inspection. Since the outcome of inspection will directly affect our project's future, prioritizing promotional activities for our project at this point isn't a good use of time and resources. Another interesting way to manage tasks can be by categorizing them on a deadline or priority matrix with "schedule" and "priority" as the axes. With this structure, necessary work that needs to be done immediately should be placed high on both priority and schedule, while necessary work that isn't needed immediately should be placed high on priority but low on schedule. A team generally works on tasks that contribute towards its organization's goal. While working in teams usually means more work gets done, keeping team members in sync can be difficult. Task management software for teams can help us keep our team connected. FEATURES OF ACE PROJECT->Project Tracking and Task Management – Ace project has comprehensive interactive Gantt chart that is helping users visually manage tasks, and set dependencies between tasks. It has project portfolio management, allowing users to view and monitor the work progress across multiple projects using custom task reports. You can set up recurrent tasks, or start new projects using templates.  Timesheet Reporting and Expense Tracking – Ace Project has an integrated time management solution that allows users to track time of resources across all projects. It has a built-in time clock and a time approval workflow that automates the business process and ensures accurate time entries and usage across the organization. Users are also able to track expenses and use an expense approval process to help them stay in control of their project expenses. The application can then generate advanced expense reports, making use of numerous criteria and filters to provide relevant information.  Document Sharing, Mobile Access, API and more – Users can attach, view and manage all their task and project documents within the software, confident that these are secured and searchable when needed. It has versioning features to keep track of changes, as well as locking to prevent anyone from editing or deleting a file. FEATURES OF BASE CAMP CLOUD->

  1. Simple View – It is very simple to create a project. When we create a project, a page like a sheet in a notepad is created wherein we can do the following –
  2. Add Project Team Members – As a project manager, we can add team members and their details. Client team members can also be added. This will help in keeping them in loop and giving the project higher transparency.
  3. Add Admin for the project – We can give the admin role to team members so that they can manage the project on Basecamp
  4. Create To-Do Lists – Tasks can be created in the project. We can assign a due date and a person to the task. An email can be sent to the person via Basecamp informing him/her about tasks assigned.
  5. Hold Discussions – We can create discussion topics, add content including attachments and send to people in the project. They can give their views. The discussion will appear on the project home page when the user logs in.
  6. Create Documents – Documents can be created within Basecamp. These can be collaborative and other users with permission can edit it. Revision history can be seen and

earlier version can be restored too. These documents can be opened in the mobile version as well.

  1. Manage Project Calendar – The Basecamp calendar is quite comprehensive. One can see projects, events and deadlines in one view.
  2. Track Milestones – Milestones are major events of the project that the team is working on. Milestones can be related to To-dos to indicate the tasks to be completed for a milestone to be achieved.
  3. Have different project views – There are different views that give an update on the project. The calendar view allows to see tasks on a project on the basis of dates.

Q3) Illustrate various socio-economic challenges of adopting cloud

computing. Identify various security risks for an organization using

cloud services.

Various socio-economic challenges of adopting cloud computing:-> Security and Privacy -> Because cloud computing represents a new computing model, there is a great deal of uncertainty about how security at all levels (e.g., network, host, application, and data levels) can be achieved. That uncertainty has consistently led information executives to state that security is their number one concern with cloud computing. Connectivity and Open Access -> The full potential of cloud computing depends on the availability of high-speed access to all. Such connectivity, rather like electricity availability, globally opens the possibility for industry and a new range of consumer products. Reliability-> Enterprise applications are now so critical that they must be reliable and available to support 24/7 operations. In the event of failure or outages, contingency plans must take effect smoothly, and for disastrous or catastrophic failure, recovery plans must begin with minimum disruption. Interoperability ->The interoperability and portability of information between private clouds and public clouds are critical enablers for broad adoption of cloud computing by the enterprise. Many companies have made considerable progress toward standardizing their processes, data, and systems through implementation of ERPs. Economic Value-> The growth of cloud computing is predicated on the return on investment that accrues. It seems intuitive that by sharing resources to smooth out peaks, paying only for what is used, and cutting upfront capital investment in deploying IT solutions, the economic value will be there. Various security risks for an organization using cloud services->

  1. Loss or theft of intellectual property
  2. Compliance violations and regulatory actions
  3. Loss of control over end user actions
  4. Malware infections that unleash a targeted attack.
  5. Contractual breaches with customers or business partners
  6. Diminished customer trust
  7. Data breach requiring disclosure and notification to victims
  8. Increased customer churn
  9. Revenue losses

Q4) Write short notes on following :

Q5) Explain risk of storing data(policy critical data) in the cloud in

terms of reliability, security, user-error, privacy and access

problems.

Reliability Reliability is an equally important issue to consider in cloud storage. A reliable cloud storage is one that the user can be sure of its availability at all times, and one that assures users that their data will always be secure from any forms of attack or interference. Security Cloud storage can be located anywhere in the world where fast enough Internet connections are available to provide user access. In each location, physical access controls, unencrypted networking and handling of media which contains or contained the data (for example, backup media or failed disk drives) could all expose data. If the data is, for example, confidential or proprietary information, a security failure would be tantamount to placing the materials in an open dumpster. User-error This threat means mistakes made by users of the system. Infrastructure providers have designed their system to be automated and there is hardly any human intervention, however they have no control over how users from enterprise or broker may use the system. Privacy We don’t want anybody to access our data unless we allow them to. This is easy enough to maintain when we store data on-site, because our data is stored elsewhere, it might be impossible to know just how closed off it is. When we migrate sensitive data to the cloud, we should be aware that we might be losing essential privacy controls. Access problems Most of the security threats and risks to an organization are the result of inadequate and improper access control. Poor access control can expose the organization to unauthorized access of data and programs, fraud, or the shutdown of computer services.

Q6) Discuss risk with respect to privileged user access and data

location and segregation. Illustrate how we access security of a

third party cloud provider.

We already know that moving enterprise applications to the cloud can help our organization cut information technology (IT) costs and improve responsiveness. Along with the usual security concerns, however, another issue is how to secure and monitor user entitlements and access activities within the cloud environment, especially privileged accounts. Privileged identity management (PIM) is one security component we won’t want to overlook when designing and implementing your own cloud infrastructure. Cloud computing requires a delicate balance between the desire to share online resources with multiple user populations and the need to protect those resources from unauthorized access, data leakage and other exposures. When those users have the elevated access powers of the typical system administrator or other privileged account, the security risk is even higher. It just takes one malicious or careless privileged insider to take over our enterprise or steal precious data. To reduce the risk of these insider threats, we must be able to control, monitor and report on who is accessing sensitive resources within the cloud and for what purpose.

Access can be granted free (e.g., Google Docs) or via subscription models (e.g., DropBox for file synchronization or SmugMug for photo management). The cloud consumer has little control over the way the cloud software runs and the security of the data it accesses. The cloud software provider takes all the administrative burden. A software provider will either host the application and related data using its own servers, databases, networking and computing resources, or it may be an ISV that contracts a cloud provider to host the application in the provider's data center. The application will be accessible to any device with a network connection.