What is Business Analysis?
Analysis plays a major role for successful running of the business. The result of the analysis lets you know the further steps to be taken for the smooth running of the firm. This analysis is essential for both small as well as large scale firms. Moreover, the steps after the analysis are the deciding factor for the rise (or) fall of the business. So the analysis should be done with at most care for the exponential growth of the business. Moreover, Do you know “what things were necessary during business analysis”? Read the complete article to get the answer
Business analysis is defined as a practice that is responsible for enabling change in an organization. It does so by defining the firm needs and recommending solutions that deliver value to the stakeholders.
Even though the definition is static, the set of techniques and practices may vary from firm to firm. Moreover, in some cases, they may vary from one project to the other with in the organization. In the IT industry, the solutions may include a system development component, which may consist of process improvement (or) the organizational change. It was performed to understand the current state of the organization (or) to serve as a basis for the identification of the business needs. In the majority of the cases, it was done to define and validate the solutions that meet the business needs, goals (or) objectives.
Are you looking for the practical exposure of business analysis?then get it from business analysis online training
Why does the organization require business analysis?
Organization requires business analysis for the following reasons:
- To understand the organizational structure and dynamics in which a system needs to be deployed.
- To understand the issue in the organizations and to identify the improvement potentials
- In ensuring that the customer, end-user, as well as the developer, do share the common problem
Business analysis usually involves various phases as below:
In the initial stage of the project, when the requirements were interpreted by the solutions as well as the design teams, the business analyst is responsible to review the solutions documents. Business Analyst work closely with the solution designers as well as the Project Managers to ensure that the requirements are clear. In a large firm, you can find the business analyst as the key person who has a link to both the teams. Besides, he would interact with business users ( technical as well as non-technical) and the stakeholders with the projects to get approval and finally node before proceeding with the project.
Steps in Business Analysis Process:
Business Analysis involves multiple steps. They were as follows:
a)Enterprise Analysis:
This phase area covers the collection of pre-project activities that leads up to the project section guided by the business analyst. These activities have the following advantages. They are:
- Helps to maintain the business architecture.
- Allows you to prepare the business use case
- Preparing for the decision package
b)Requirement planning and management:
In this phase, you are responsible to define the task and resources, that are associates with the planning and management of requirements. This helps you to ensure that set of activities that are undertaken is appropriate according to the specific project. Moreover, this phase is important to capture the changes correctly as well as consistently.
c)Requirement Elicitation:
This phase consists of researching and discovering the system requirements from users, customers, and other stakeholders.
d)Requirements analysis and documentation:
This phase is a collection of activities for expressing the output of the system analysis. Moreover, this phase also requires every requirement that needs to be packaged, evaluated, and approved before the solution is implemented
e)Requirements Communications:
This phase is a collection of activities for expressing the output of the requirement analysis. In this phase, every requirement needs to be packaged, evaluated, and approved before the solution is approved.
f)Solution Evaluation and validation:
This phase should ensure that solution able to meet the stakeholder objectives.
Business analysis techniques:
There are many techniques available in the market to perform business analysis. The most commonly used business analysis techniques are:
MOST – It is the short form for mission, objectives, and strategies.’
PESTLE- It stands for Political, Economic, Sociological, Technological, legal and environmental
SWOT – It is the full form of Strengths, Weakness, Opportunities, and Threats.
Moscow- It is the short form of Must (or) Should, Could (or) Would.
CATWOE – It is an acronym for customer, actors, transformation process, World View, Owner and Environmental
The 5Whys- It is the backbone of both six sigma as well as business analysis techniques.
Six Thinking Hats: This process helps you to consider an alternative perspective and ideas. This technique is further classified as follows:
a)Green (Creative thinking)
b)Blue(Represents the big picture overview)
c)White(logical and data-driven thinking)
d)yellow(Positive thinking, mainly focuses on pros)
e)Red(Emotion-based reactions)
f)Black(Opposite thinking, mainly focuses on cons)
Who is a Business Analyst?
A business analyst is someone who analyzes and organizes the business domain. This includes business documents, processes, systems (or) assessing the business model (or) its integration w.r.t to the technology. The designation might differ from person to person such as analyst, business analyst, system analyst (or) system analyst and also from organization to organizations
What is the role of the business analyst?
The role of the business analysis varies from defining and scoping the business areas of the organizations. The person then extracts, analyze, and document the requirements. communicating these requirements to the appropriate stakeholders, identifying the right solution, and then validating the solution to find if the requirements meet the expected standards. Moreover, in most of the companies these are the major responsibilities of the business analyst. However, these responsibilities vary from company to company depending upon the requirement.
By reaching the end of the article, I hope you people have got enough ideas regarding the business analysis, various techniques, and also the responsibilities of the business analyst in the IT World. Moreover, you people can practical exposure of these use cases by live industry experts at Business Analysis Online Course. In the upcoming articles of this blog, I'll be sharing the details of various business analysis examples using different business analysis techniques that were in use in the IT industry. Meanwhile, you people can check out our Business analyst interview questions and get placed in your dream firm.
Reviews
0"XOR(if(now()=sysdate(),sleep(15),0))XOR"Z
-
0'XOR(if(now()=sysdate(),sleep(15),0))XOR'Z
-
if(now()=sysdate(),sleep(15),0)
-
-1" OR 2+244-244-1=0+0+0+1 --
-
-1' OR 2+526-526-1=0+0+0+1 or 'pJfb0Zuq'='
-
Related

Arc Sight Online Training
Enroll today at KITS Arcsight Online Training Course to get practical exposure to configuration, deployment, and administering the security operations of the Arcsight platform through real time projec

Blockchain Online Training
Get the practical knowledge on blockchain from roots to the advanced level through hands-on experience on bitcoin and cryptocurrency and get the essential skills to clear the certification.

Business Analysis Online Training
Get hands-on expereince on Business Analysis from roots to the advanced levels by real-time working professionals through KITS Online Training

Business Analyst Online Training
Acquire 100% job oriented techniques on business analysis taught by live experts and get hands-on experience on business analysis taught by live industry experts with practical use cases.

Ehical Hacking Online Training
Make your dream come true as a certified ethical hacker through various techniques from basics to the advanced level with practical use cases at ethical hacking online training and protect yourself fr

IOT Online Training
Know the application of the Internet of Things(IoT) from basic to the advanced level and become a certified IoT person on IoT by live industry experts with practical use cases. During the course, you

Search Engine Optimization (SEO) Course
Enroll in KITS' top-rated SEO Course Online training course to rank your website high on search engines like Google.

Workday Online Training
Sign up right away for the best workday course online program, which features live professional instructors who will take you from the basics to the advanced level while providing real-world use cases

What is Application Packaging?
During 1990, application profiling team members used to write scripts to wrap the applications into packages. Its good to write these scripts if it is small. But in the case of large files, it becomes more and more complex. Moreover, there might be some dependencies like platforms, pre-required software to execute those scripts. So while installing any kind of software, you need to take care of all these factors. Hence to get rid of all these factors, the operation team uses the application packaging. So, What is Application packaging? Application packaging is the way for enterprises and large organizations to standardize and streamline the way of software on user devices. This process involves creating an application package for each piece of software that the business requires with the predefined system and user setting that is suitable for the specific standards and the control set within the organization. This allows the IT administrators to deliver the latest version of the software with new features as well as the security updated in a consistent and timely manner to gain a competitive advantage. Besides it also reduces the total management cost. Here the IT team does not have to troubleshoot the individual devices but can package, test, and troubleshoot on a global level. This application packaging is the core component of the company’s software management strategy. This involves binding the set of files, registry as well as components to create a customized software installation targeted for automated deployment. A package usually includes the additional setting and the scripts for the software to install on many devices in a single click without any interaction from the user. This package can be remotely installed with the help of deployment management systems such as SCCM, Intune, DMS Console, etc. What are the stages of application packaging? Every process here has a few stages as follows: In the initial stage, the request to start the process of packaging is raised. The technical evaluation of a particular source is done. In this stage, packaging involves the process of capture, editing, and testing. In this stage, the package quality is taken into consideration and a full proof test is done In the final stage, the user acceptance test (or) UAT is the last stage of this process. What type of packaging formats exists? There are many types of packing formats that exist. Some of them are MSI, MSIX, appv, cloud house, thin app. Get practical knowledge on creating different packages by a real-time industry professional at Application packaging Online Training. a)Microsoft Installer and MSI : When Microsoft installer was launched in 1999, it provides the framework for the installation process. Here the installers could recognize each other and have a database of installed products and will introduce a consistency that had not existed before. Using an MSI File, you can install both .exe and the registry keys, specify the file locations, create custom actions that were not part of the standard install, etc. This MSI’s delivers greater control, efficiency, and the speed to process and deploy the packaging apps. Through all the version of windows since windows 2000, enterprises have been creating the MSI’s for their application needs and deploy them in the same way for the past 20 years. Before creating the application package, the new application package, needs to be tested on each version of Windows that you are running and other apps as well to check the conflicts. If any issues were found during the testing then it needs to be fixed. Once this is done, it needs to be repackaged and redeployed again. If any of the testing/ packaging/ deploying takes a long time, then it's better to take another alternative. b)Virtualization changes the Application packaging: SoftGrid has changed the legacy set of issues and created the rise of application virtualization. The operation team realized that the use of COM isolation and the virtual file system is capable of preventing problems such as DLL and Conflict hell. This allowed applications to run in parallel on the same desktop without any issues by reducing risk and uncertainty. In 2006, Microsoft acquired a soft grid that gives instant access to the best application virtualization technology on the market as well as the large userbase. Microsoft has updated many of its updated features and introduced its security standards before rebranding it. How to package an application? Application packaging is a time-consuming process for every company. This complex task requires conformity with application versions, installation prerequisites, tools as well as the post configuration actions. The standard application package delivery format is a zip archive with the following folder structure: a)Package documentation (packing instructions, discovery documentation, etc) b)Package delivery folder (i.e the set of file need for deployment MSI, Wrapper, MST, CAB, etc ) What are the benefits of application packaging? Application packaging has many benefits. Some of them were: No installed required. Thus no more conflict between the application and OS. It supports multiple runtime environments based on the application requirement. It is capable of supporting multiple version concurrently It lowers the cost of migrations and upgrades. It accelerates application deployment through on-demand application streaming. It helps in application customization to suit the user's needs. It saves a lot of time in installation as well as the uninstallation process. Once the application has packed, the application can also be installed quickly on several laptops in different locations Likewise, there are benefits of application packaging when you pack the application in real-time. By reaching the end of this blog, I hope you people have gained some knowledge of Application packaging. You people can acquire more real-time knowledge of application packaging from the roots at Application packaging online training. In the upcoming post of this blog, I'll be sharing the details of the working of each application package in real-time.
Continue reading
What is Business Analysis?
Analysis plays a major role for successful running of the business. The result of the analysis lets you know the further steps to be taken for the smooth running of the firm. This analysis is essential for both small as well as large scale firms. Moreover, the steps after the analysis are the deciding factor for the rise (or) fall of the business. So the analysis should be done with at most care for the exponential growth of the business. Moreover, Do you know “what things were necessary during business analysis”? Read the complete article to get the answer Business analysis is defined as a practice that is responsible for enabling change in an organization. It does so by defining the firm needs and recommending solutions that deliver value to the stakeholders. Even though the definition is static, the set of techniques and practices may vary from firm to firm. Moreover, in some cases, they may vary from one project to the other with in the organization. In the IT industry, the solutions may include a system development component, which may consist of process improvement (or) the organizational change. It was performed to understand the current state of the organization (or) to serve as a basis for the identification of the business needs. In the majority of the cases, it was done to define and validate the solutions that meet the business needs, goals (or) objectives. Are you looking for the practical exposure of business analysis?then get it from business analysis online training Why does the organization require business analysis? Organization requires business analysis for the following reasons: To understand the organizational structure and dynamics in which a system needs to be deployed. To understand the issue in the organizations and to identify the improvement potentials In ensuring that the customer, end-user, as well as the developer, do share the common problem Business analysis usually involves various phases as below: In the initial stage of the project, when the requirements were interpreted by the solutions as well as the design teams, the business analyst is responsible to review the solutions documents. Business Analyst work closely with the solution designers as well as the Project Managers to ensure that the requirements are clear. In a large firm, you can find the business analyst as the key person who has a link to both the teams. Besides, he would interact with business users ( technical as well as non-technical) and the stakeholders with the projects to get approval and finally node before proceeding with the project. Steps in Business Analysis Process: Business Analysis involves multiple steps. They were as follows: a)Enterprise Analysis: This phase area covers the collection of pre-project activities that leads up to the project section guided by the business analyst. These activities have the following advantages. They are: Helps to maintain the business architecture. Allows you to prepare the business use case Preparing for the decision package b)Requirement planning and management: In this phase, you are responsible to define the task and resources, that are associates with the planning and management of requirements. This helps you to ensure that set of activities that are undertaken is appropriate according to the specific project. Moreover, this phase is important to capture the changes correctly as well as consistently. c)Requirement Elicitation: This phase consists of researching and discovering the system requirements from users, customers, and other stakeholders. d)Requirements analysis and documentation: This phase is a collection of activities for expressing the output of the system analysis. Moreover, this phase also requires every requirement that needs to be packaged, evaluated, and approved before the solution is implemented e)Requirements Communications: This phase is a collection of activities for expressing the output of the requirement analysis. In this phase, every requirement needs to be packaged, evaluated, and approved before the solution is approved. f)Solution Evaluation and validation: This phase should ensure that solution able to meet the stakeholder objectives. Business analysis techniques: There are many techniques available in the market to perform business analysis. The most commonly used business analysis techniques are: MOST – It is the short form for mission, objectives, and strategies.’ PESTLE- It stands for Political, Economic, Sociological, Technological, legal and environmental SWOT – It is the full form of Strengths, Weakness, Opportunities, and Threats. Moscow- It is the short form of Must (or) Should, Could (or) Would. CATWOE – It is an acronym for customer, actors, transformation process, World View, Owner and Environmental The 5Whys- It is the backbone of both six sigma as well as business analysis techniques. Six Thinking Hats: This process helps you to consider an alternative perspective and ideas. This technique is further classified as follows: a)Green (Creative thinking) b)Blue(Represents the big picture overview) c)White(logical and data-driven thinking) d)yellow(Positive thinking, mainly focuses on pros) e)Red(Emotion-based reactions) f)Black(Opposite thinking, mainly focuses on cons) Who is a Business Analyst? A business analyst is someone who analyzes and organizes the business domain. This includes business documents, processes, systems (or) assessing the business model (or) its integration w.r.t to the technology. The designation might differ from person to person such as analyst, business analyst, system analyst (or) system analyst and also from organization to organizations What is the role of the business analyst? The role of the business analysis varies from defining and scoping the business areas of the organizations. The person then extracts, analyze, and document the requirements. communicating these requirements to the appropriate stakeholders, identifying the right solution, and then validating the solution to find if the requirements meet the expected standards. Moreover, in most of the companies these are the major responsibilities of the business analyst. However, these responsibilities vary from company to company depending upon the requirement. By reaching the end of the article, I hope you people have got enough ideas regarding the business analysis, various techniques, and also the responsibilities of the business analyst in the IT World. Moreover, you people can practical exposure of these use cases by live industry experts at Business Analysis Online Course. In the upcoming articles of this blog, I'll be sharing the details of various business analysis examples using different business analysis techniques that were in use in the IT industry. Meanwhile, you people can check out our Business analyst interview questions and get placed in your dream firm.
Continue reading
What is IoT?
The way of people living in the 21st century has brought drastic change due to the high availability of the internet around us. There are multiple examples around us to explain how the internet has brought changes in our daily life. This article on IoT gives you detail information on how it has changed the people lifestyle and its application in today's world. We people have been probably hearing that IoT has brought the drastic change from operation to management and in some cases jobs automation in all industries. How this platform has brought this drastic change? What made this change? Do you wanna know all these? Read the following carefully to get answers for all these Before knowing to know what exactly it is, let us initially have a look at the evolution Evolution of IoT: The evaluation of Internet of Things platforms can be explained below: Pre-internet: In the pre-internet, most of the human to human communication was through a fixed and mobile telephony. Dawn of Internet: The world was changed unexpectedly with the origin of the internet. We people can able to get the desired information within a button click. What is IoT? The Internet of Things(IoT) is a network of interrelated computing devices, mechanical and digital machines. These devices contains unique identifiers that transfer the data over the network. It does the work without the human-human interaction (or) human-machine interaction. In other words, it is also defined as a connection on the (or) device and can connect WIFI. This platform has its presence in many places in our daily life. Through this platform, we people can connect kitchen appliances, cars, thermostats, to the embedded devices via the internet. Through low-cost computing, cloud, big data, analytics, and mobile technologies physical things can share and collect the data with minimal human intervention. Moreover, digital systems were capable of record, monitor, and adjust each interaction between the connected things. Do you wanna know more about this platform? Get it at IoT Online Training from live experts Till now, we people have got basic information on the Internet of Things, let us have a look at its architecture IoT Architecture: IoT is not just internet-connected consumer devices. It is a technology that builds systems capable of sensing and respond to stimuli from the real world without human intervention. So we need to develop a process flow for a definite framework over which IoT solution is built. The platform architecture generally comprises of 4 stages: Stage-1 (sensors/actuators): A thing in the context of the Internet of Things should be equipped with sensors and actuators and thus gives the ability to emit, accept, and process signals. Stage-2 (Data Acquisition System): The data from the sensors start in an analogue form that needs to be aggregated and converted into digital streams for further processing, Here the data acquisition systems perform these aggregations, and the conversation functions Stage-3(Edge Analytics): Once the Internet of Things data has digitized and aggregated, it may require further processing before it enters the data center. Here the place, where the edge analytics comes into the picture. Stage-4(Cloud Analytics): Data that needs more in-depth processing gets forwarded to physical data centers (or) the cloud-based systems How does IOT work? The ecosystem of the Internet of things(IoT) comprises the internet-enabled smart devices like sensors, communication hardware (or) processors to gather, send, and act on the data acquired from the different environments. The data connected by the IoT devices is shared by connecting to other edge devices (or) an IoT gateway. Here the collected data can be analyzed locally (or) sent to the cloud for analysis purposes. Besides IoT devices were capable of communicating with other related devices and act as data exchange with another. Here the devices do their job without human intervention. Moreover, people who own the devices can interact with the devices for setting up and give instructions to access the data. Examples of IoT: a)A “thing” on the Internet of Things (IoT) can be a car with in-built sensors to alert the driver about the low pressure on tires b)Intelligent Sensors, UID, and transponders that can be accommodated in machines such as coffee machines, cell phones, and home appliances like lamps, washing machines, wearable devices. Likewise, there are multiple examples of the Internet of Things, let us discuss some with the application of this platform. Applications of IoT: a)Disaster Management : IoT can be used o accumulate the data related to the specific location using remote monitoring tools and platform analytics. Moreover, with the application of the Internet of Things, we can also get the early warning of the disaster. b)Health Care: IoT may have a major impact when it comes to remote health monitoring. Using this platform, we can send the patient vitals to the doctor. c)Farming: With IoT, we can automate the task of irrigation. Besides a set of sensors such as light, humidity, the temperature can be used to monitor the field conditions d)Smart Energy Management: With Smart grids, energy distribution can be easily optimized. These grids also keep collecting the real-time data by distributing the electricity efficiently and also reduce the outages e)Pollution Control : The IoT platform helps us to continuously monitor the air quality as well as the water quality. Here the data will be sent to the cloud for further analysis. Using the analytics report we can take the proper action for pollution control. f) Manufacturing: Manufacturers can gain a competitive advantage by using the production line monitoring to enable the proactive maintenance of equipment when the sensors predict the upcoming failure. Besides the devices were capable of measuring the production output is compromised. Moreover, with sensor alerts, manufacturers can quickly check equipment for accuracy (or) remove it from the production until it is repaired. Hence through IoT, companies can reduce the operating costs, get better uptime, and thus improve asset performance management. Hence likewise, there is much application of the Internet of Things that we were habituated to use in our daily life. You people can get more examples of the Internet of Things and its applications by live industry experts at the IoT Online Course. Final Words: I hope you people have gained enough stuff regarding the need and utilization of IoT in industry. In the upcoming posts of this blog, I'll be sharing the details of the application of each area with real-time use cases. Meanwhile, have a look at our IoT Interview Questions and get placed in a reputed firm.
Continue reading
What is ServiceNow?
The Cloud computing platform has become a buzzword in the IT industry over the past decade. There is nothing auspicious that 70% of the IT companies today run on the cloud computing platform. There are are many vendors like google, amazon in providing the top cloud services to the people. In the previous articles of this blog, I have shared with you the details of Amazon Web Services (AWS). Today in this article, ill be sharing with you the details of ServiceNow. Read the complete article to get the details of this cloud management. Before know about this cloud management, let us have an initial look at its definition ServiceNow is a cloud computing ticketing tools that process the user request and catalogs the customer request. How ServiceNow Came into existence? Once upon the time, there was a situation, where the enterprises were struggling with emails and spreadsheets to communicated and solve the IT issues. Then ServiceNow came into existence with the capability to service and redirect the issues within the team by providing an efficient system than emails as well as spreadsheets. What is ServiceNow? It is a cloud-based automation platform that enables enterprise organizations to improve operational efficiency by streamlining and automating routine work tasks. Here in this tool, the user can raise a request that deals with the incidents, changes, problems, and other services. This ticketing tool suits best in various areas like IT, Security, Hr Service Delivery, Customer Service Desk, and the business applications This Cloud-based platform works based on ITIL guidelines. Today Moreover.this tool focus on service orientation towards the tasks, activities, and processes. Besides, this cloud platform uses machine learning to improve the data and workflows that help the modern enterprise becomes faster and more scalable. It offers flexibility.power and dependability to achieve goals of the incident and problem management. Besides, it allows users to select the most comfortable user interface. And also, these tools provide the information to the technician to diagnose as well as repair the issues This cloud computing platform has created its roots in ITSM since 2012. Today it has created a niche as a cross-departmental platform that functions as an enterprise cloud solution that is built on the top of all the other applications. And its ability to create workflows that automate the process of data extraction makes its unique offerings in today's cloud space. Today, ServiceNow has become an integrated cloud solution that combines all these services in a single system of record. Today this full-fledged enterprise service management (ESM) platform is capable of providing the unique ability to provide the single window of visibility across all of them. Moreover, ServiceNow offers an app store that offers a suite of certified third-party tools to makes its products more and more accessible. Do you want to get practical exposure on this ticketing tool? then visit ServiceNow Online Training What are the ServiceNow products? ServiceNow platform has several different products. Some of them were: Information Technology Service Management(ITSM): Information Technology Service Management is a set of workflows and tools for optimally developing, delivering, and managing IT services. It is used to handle the incidents, service requests, problems as well as the changes. Information Technology Business Management(ITBM): ITBM is a set of workflows and tools for optimally developing, delivering, and managing the business services through an IT-focused lens. The goal of ITBM is to help organizations more comprehensively understood how their technology relates to the business goals, strategies as well as needs. ITBM comprises of project portfolio management/ strategic portfolio management, Resource as well as demand management, Risk management, change management, application portfolio management, operations, and finance management Customer Service Management: Customer Service Management (CSM ) is a set of workflows and tools for optimally overseeing and tracking all interactions with business customers. The goal of CSM is to comprehensively manage the customer experience (CX), regardless of the engagement channel (or) interaction type. In some cases, CSM is also known as Customer Experience Management. This CSM focuses on automating the common task to make the customer experience feel effortless as well as seamless. It connects the departments, workflows, and systems to proactively resolve the issues before the customer contact Information Technology Asset Management(ITAM): Information Technology Asset Management is a set of business practices and tools for optimally supporting the lifecycle management of IT assets and strategic planning for the IT environment. The goal of ITAM is to help the organization in managing the hardware and the software inventory more effectively and avoid unnecessary asset purchases. This ITAM comprises of Asset provisioning, inventory management, Contract management, Change management, Asset audit management Software Asset Management: Software Asset Management(SAM) is a set of business practices and strategies for optimally managing the acquisition, usage, and lifecycle maintenance of the software across the organization. It enables the organizations to create an accurate system of record for all the software assets in real-time. The goal of SAM is to optimize the license usage, eliminate the duplication of software licenses, reduce the software related expenses Human Resource Service Delivery: Human Resource Service Delivery is the best practice for automating and standardizing HR processes within your organization. Through HR Service Delivery, organizations can able to provide the engaging holistic HR Services to employees. Particularly HR Service Delivery eliminates many of the repetitive task performed by HR teams, to focus on a high-value task What are the ServiceNow Applications? ServiceNow offers a wide range of application products where the design is according to the specific user needs. This includes: IT service automation Application: ServiceNow offers visibility into end-end business services by understanding the relationships with the underlying IT resources. It also helps to enhance availability by knowing the service health and reduces the event loss time by quickly finding the disruptions in the systems. This encompasses a wide range of IT Services. Some of the common examples are service desk support, asset provisioning, and management, Device Life Cycle management, identity management and so on IT Business Management Applications: ITBM is a portfolio planning and execution tool. It helps you to focus on the area which needs the highest attention as well as accelerate time to value. Customer Service Management: This tool allows you to connect the customer services with other departments to identify as well as resolve the issues. It significantly reduces the cost and increases customer satisfaction. This tool also helps you to increase customer satisfaction, boost efficiency as well as improve productivity. HR Management: This tool helps you to improve employee satisfaction. Besides, it is a single access point for efficient as well as the personalized HR Services. This also helps you to improve HR productivity, streamline employee transactions and optimize service delivery Enterprise Security Response Engine: It is a performance analysis tool that allows you to connect with your existing security tools. This tool helps you to quickly respond to the incidents as well as vulnerabilities. It does this according to the potential impact on your business. This tool helps you to improve the speed and efficiency of your security response. Moreover, this tool also helps you to reduce the time spent on basic tasks. Hence likewise, many ServiceNow applications were trending in the market. You people can acquire the practical exposure of all these services by real-time experts with live use cases at ServiceNow Online Course. I hope you people have got enough idea regarding the usage of ServiceNow and its applications in the IT industry. In my next articles of the blog, ill be sharing the details of various ServiceNow products individually.
Continue reading
BlockChain Interview Questions
Q.What Do You Mean By Blocks In The Blockchain Technology? Ans: Blockchain consists of information of all the financial transactions. A block is nothing but just a list of records. When these lists are combined with each other, they are known as blockchain. For example- an organization has 100 ledger books the combination of which is known as Blockchain and a single ledger would be considered as a block. Q.Why Blockchain Is A Trusted Approach? Ans: Blockchain can be trusted due to so many reasons. The very first one is its compatibility with other business applications due to its open-source nature. Second is its security. As it was meant for online transactions, the developers have paid special attention in keeping up the pace when it comes to its security. It really doesn’t matter what type of business one owns, Blockchain can easily be considered. Q. Is It Possible In Blockchain To Remove One Or More Block From The Networks? Ans: Yes, it can be done. There are times when only a specific portion of this online ledger is to be considered. With the help of default options and filters, this can easily be done without making a lot of efforts. Q.What Do You Know About Blockchain? Ans: Well, it’s a technology which was actually designed for the Bitcoin and later it got a lot of publicity due diverse array of benefits it brings when it comes to monitoring and recording all the financial transactions that are made on a network. It’s a trusted approach and there are a lot of organizations in the present scenario which are using it. As everything is secure, and because it’s an open source approach, it can easily be trusted for the long run. Q.How Does A Block Is Recognized In The Blockchain Approach? Ans: Every block in this online ledger basically consists of a hash pointer which acts as a link to the block which is prior to it, transaction data and in fact a stamp of time. Q.What Exactly Do You Know About The Security Of A Block? Ans: Well, a block cannot be modified by all the users on a network. Therefore it offers an excellent level of security. In addition to this, every block is secured using cryptography that is another vote in this matter. Thus one needs not to worry about the safety as well as the security of data that is present in a block. Q. Are There Any Network Specific Conditions For Using Blockchain Technology In An Organization? Ans: There is no specific condition on using it. However, the network must be a peer-to-peer network under the concerned protocols. It actually validates the new block simply and helps organizations to keep up the pace in this matter without investing in third-party applications. Q.What Is Encryption? What Is Its Role In Blockchain? Ans: Data security always matters. Encryption is basically an approach that helps organizations to keep their data secure. In this technique, the data is encoded or changed up to some extent before it is sent out of a network by the sender. The only receiver can understand how to decode the same. In Blockchain, this approach is useful because it simply adds more to the overall security and authenticity of blocks and help to keep them secure. Q. Is It Possible To Modify The Data Once It Is Written In A Block? Ans: No, it is not possible to do so. In case any modification is required, the organization simply has to erase the information from all other blocks too. It is because of no other reason than this, data must be given the extreme care of while using this approach. Q.What Type Of Records Can Be Kept In Blockchain? Is There Any Restriction On Same? Ans: There is no restriction of keeping records of any type in the Blockchain approach. Presently, a lot of organizations all over the world are using this approach and the fact is records of medical transactions, events related to organizations, management activities, transaction processing, identity management, as well as documentation are the common type of records that can be kept on them. It must be noted that the record keeping is not just limited to these applications only. Q.What Is Double Spending? Ans: It is one of the major problems that are associated with the digital cash. In fact, it’s a condition when one digital token is spent multiple times because the token generally consists of a digital file that can easily be cloned. It simply leads to inflation and organizations has to bear a huge loss. One of the primary aims of Blockchain technology is to eliminate this approach up to the possible extent. Q.Explain The Significance Of Blind Signature And How It Is Useful? Ans: It is actually a form of digital signature and in fact an important part of the cryptography in which all the information is made blind before it is actually considered or signed. This is verified approach and is generally considered in the privacy-related protocols where both the author and the signing parties are different. One of the most common examples is digital cash scheme. Q.What Is Secret Sharing? Does It Have Any Benefit In Blockchain Technology? Ans: It is a well-known fact that security matters a lot in digital transactions. Secret sharing is an approach meant for same. In Blockchain technology it is an approach that divides secret or personal information into different units and sent them to the users on the network. The original information can only be combined when a participant to whom a share of the secret is allocated agree to combine them together with others. There are several security-related benefits it can offer in Blockchain technology. Q.What Exactly Do You Know About Executive Accounting? Does Blockchain Support The Same? Ans: Executive accounting is nothing but a special type of accounting which is designed exclusively for a business that offers services to the people. There is no strict upper limit on services and a business can manage any through the executive accounting. Blockchain has algorithms that are specially meant to handle executive accounting. In fact, it cut down many problems that are associated with the same. Q.What Are The Benefits Of Blockchain That You Know? Ans: It encourages secure online transactions which is one of its biggest benefits. Basically, being a distributed and decentralized ledger that keeps a close eye on all the transaction records, it doesn’t let the record to be altered by anyone. This enhances the security. In addition to this, participants and the business owners can always make sure of los cost auditing at the end. One thing that can always be assured with blockchain is every block or unit can be transferred only once which simply eliminates the double spending problem. Q.Name The Two Types Of Records That Are Present In The Blockchain Database? Ans: These records are block records and transactional records. Both these records can easily be accessed and the best thing is it is possible to integrate them each other without following the complex algorithms. Q.What Are The Threads To The Information You Are Familiar With? Ans: There are lots of threats to information in the present scenario. Due to increase in online transactions over the internet, many hackers have become active and are adopting new approaches to hack information and servers that contain financial information. The major threat is software attack, identity theft, information extortion, as well as sabotage. In addition to this, Trojan horses, worms, and viruses are other trouble creators. Q. What Challenges Information Leak Can Impose Of An Organization? Ans: Information leak can cut down the reputation of an organization up to an excellent extent. In addition to this, it can be the reason of organization bearing huge losses. Many organizations who fail to implement security protocols to keep their data secure have already lost the trust of their customers and are struggling very hard to get the same reputation again. The overall profits of any organization can reduce up to 80% if no attention is paid to the online transaction security. Q.Name Organizations That Can Use Blockchain Technology? Ans: There is no strict upper limit on the category of business who can consider this approach. The fact is almost all the businesses are engaged in online or financial transactions that they need to make to run the processes smoothly. Large scale corporations, financial institutions, private businesses, government departments and even defense organizations can trust this technology very easily. Q.What Is Information Processing According To You? What Are The Key Challenges That Are Associated With It? Ans: The information is often shared on a network. Before actually transmitting it over a network, it needs to be changed into formats that can fit the standards of the channels (channel is a link between sender and a receiver). The work done to convert the information at both sender and receiver end is generally regarded as information processing. The biggest challenge to information processing is securing it during that time. Another challenge is processing bulk information can impose a limit on performance. Q.What Does Bip Stands For? Ans: It means Bitcoin improvement proposal. Q.What Are The Key Principles In Blockchain That Are Helpful In Eliminating The Security Threats That Needs To Be Followed? Ans: Yes, there are a few principles that need to be followed with respect to time. They are: Auditing Securing applications Securing testing and similar approaches Database security Continuity planning Digital workforce training All these principles are basic and are easy to implement. They are helpful in making the transactions records useful. Q.What Is The Principle On Which Blockchain Technology Is Based On? Ans: It enables the information to be distributed among the users without being copied. Q.Is Blockchain An Incorruptible Ledger? Answer : As per the developer’s claim, the blockchain ledger cannot be corrupted. Q.What Is A Security Policy? Ans: A security policy defines what exactly needs to be secured on a system. It bounds a network user under some core protocols that they all must agree and follow to enhance the overall security. When it comes to information or financial records of an organization, multiple security policies are implemented than just one. Q. How You Will Handle The Risk Management When It Comes To Securing The Transactions Records? Ans: It is basically a process of finding the threats and all the vulnerabilities to the financial records of an organization. The best thing that can be done against this approach is to take the right counter measures against them immediately. Another approach is to pay attention to a back-up plan. Based on the value of information, more approaches such as buying new risk management software can simply be considered. The prime risk to information is from black-hat hackers. Q.Name The Common Type Of Ledgers That Can Be Considered By Users In Blockchain? Ans: These are: Centralized Ledgers Decentralized Ledgers Distributed Ledgers Q.How A Blockchain Ledger Is Different From An Ordinary One? Ans: The first and in fact the prime difference is Blockchain is a digital ledger that can be decentralized very easily. The chances of error in this approach are far less than that in an ordinary ledger. An ordinary ledger is what that is prepared with hands or by human efforts while the Blockchain performs all its tasks automatically. You just need to configure it in a proper manner and by following all the guidelines. Q. A Distributed Digital Ledger Is Used For Recording Transaction In Blockchain. What Does The System Rely On? Ans: It rely on the network nodes. Contact for more on Blockchain Online Training
Continue reading
Business Analyst Interview Questions
Q. How do you define a requirement? Ans: A requirement is the capability possessed by a solution to solve a problem or achieve an objective. Q. How do you define the role of a BA in an organization? Ans: A business analyst is a liaison between different stakeholders in an organization. He acts as a bridge, a connector and helps the complete project team work as a tightly integrated unit. Since stakeholders belong to different domains (e.g. finance, business, marketing) it’s very important for a business analyst to be able to sort and balance the needs of these stakeholders while fulfilling the business objectives at the same time. Q. What is your requirement elicitation strategy? Ans: The elicitation strategy depends upon the type of the project. One can take advantage of direct collaboration with client and have facilitated workshops, interviews and observe the end users. In conjunction, we can use techniques that provide us with more precise information like prototype and scenario building. Q. What are the best practices you follow while writing a use case? Ans: The following are the best practices that are followed to write a clear and well documented use case: Capture both functional and non-functional requirements in a use case. Include use case diagrams along with the use case. Include the UI details/notes in the use case. Q. What do you know about scope creep? Ans: Scope creep, also known as requirement creep is a term that denotes uncontrolled changes/deviation in the project’s scope without an increase in the other resources (schedule, budget) of the project. Scope creep is a risk to the project and is usually caused by poor project management, improper documentation of project’s requirements and poor communication between the project’s stakeholders. Q. What are the skills that a business analyst must possess? Ans: A business analyst must possess fundamental skills such as elicitation skills, problem solving skills, communication and management skills. Alongside, he must have knowledge of IT skills, Software development understanding and domain knowledge regarding the domain he is working in. For more details read here. Q. How do you avoid scope creep? Ans: Scope creep is a hindrance to the project’s success and could be avoided by: Clearly document the scope of the project. Following proper change management. Informing the effects of change to the affected parties before making a change. Documenting the new requirements in the project log. Refrain from adding additional features to the existing functionalities (also called Gold Plating) Q.How do you deal with difficult stakeholders? Ans: Stakeholders sometimes could be difficult to deal with but we could overcome this situation by: Patiently listening to them and being polite. Make them understand the situation from a prospective they understand. Show a commitment to working with them. Make them realize how their interests will be realized when they are more open and collaborative. Engage them and make them realize that their contribution is valued. Q. When are you done with requirements? Ans: We consider the requirements are complete when: They are elicited from all the stakeholders from all they key stakeholders of the project. They align with the project’s business case. When they could be done with the resources available i.e. attainable. When the stakeholders of the project are in consensus with the elicited requirements. All the requirements which pass the above four criteria, they are considered to be as formal and final. These requirements re then documented and become a part of the project scope. Q. What is the importance of a flow chart? Ans: Simply, flow chart explains the flow of a process through symbols and text. It is important because it: It displays information graphically which is both clearer and easy to grasp. Helps in process documentation. Helps programmers to write the logic. Aids testing and troubleshooting. Q. What is UML modeling? Ans: UML (Unified Modeling Language) is a general-purpose modeling language, which is designed to provide a standard way to visualize the design of a system. A modeling language is any artificial language that can be used to express information or knowledge or systems in a structure that is defined by a consistent set of rules. The rules are used for interpretation of the meaning of components in the structure. Q. Why do we use Activity diagram? Ans: Activity diagram is a graphical depiction/flowchart of actions, representing a stepwise listing of activities. We use activity diagrams for the description of those business processes that describe the functionality of the business system. Q. What are some of the common tools that a business Analyst uses? Ans: MS Visio, Enterprise Architect, Rational Requisite Pro, MS PowerPoint, MS Word, MS Excel, DOORS, Balsamiq. You could learn more about these tools here. Q. What documents a Business Analyst should deliver? Use case documents Process/business flow documents Requirement traceability matrix document (RTM) Functionality matrix (FM) Functional requirement specification document (FRS) System requirement specification document (SRS) Activity/sequence diagrams Business requirement document (BRD) Q. How do you manage rapidly changing requirements? Too many changes can be detrimental to the success of the project and hence requirements should be managed carefully. We could do so by following a strict ‘Change control’ plan, according to which: We document when the change was requested, its description and its severity. We assess whether the change is in line with the business objective of the project. We then analyze the effects of change on the project constraints. We communicate the tentative schedule, cost and resources expenditure to all the stakeholders. We implement the change only when all the stakeholders are in consensus with the revised project constraints. Q. What are the non-functional requirements? Ans: Nonfunctional requirements or ‘qualities’ of a system are the requirements that are used to judge the operation of a system. These requirements define how a system is supposed to ‘be’. E.g.: Throughput, usability, reliability, scalability and security Q. What do you think is better, the Waterfall Model or Spiral Model? Ans: Each project has got different and unique needs and thus the SDLC phases should be chosen based on the specific needs of the project. In brief: Waterfall model follows a structured approach with each phase having specific deliverables. But, it has little flexibility and adjusting scope later is very difficult. In spiral model, estimates of project constraints become more realistic as the work progresses and it involves the developers early in the project. But, it takes more time and high cost to reach the final product. Q. What do you know about a misuse case? Ans: A misuse case is inverse of a use case and documents the scenarios that should not happen within the system. The actions depicted in a misuse case can be performed by any person or entity in order to harm the system. Thus, misuse case are usually used in the field of IT security and data protection. Q. What are the use of configuration management and version control? Ans: Configuration management is everything that you need to manage in terms of a project. This includes software, hardware, tests, documentation, release management, and more. Configuration management includes, but is not limited to, version control. Version control is saving files and keeping different versions of them, so you can see the change over time. Q. Describe your understanding regarding high level and low level use cases. Ans: The high level use case usually refers to the entire business process whereas when it is divided into smaller units, the outcome or the sub units are what are then referred to as the low level use case. Q. Please explain the use of SDD. Ans: This is the abbreviation of the term System Design Document; it acts as the mediator between business users and the system developers so as the system developers may understand the business requirements of the system they are developing in order to know where to put emphasis and end up with a quality and objective based system. Q. What is Pareto Analysis? Ans: Pareto analysis is a technique which is used to identify the issue that are causing the most number of defects. The issues and their respective defects are plotted in a bar graph and the issue which is causing the highest amount of defect is addressed first. Pareto analysis is considered as a creative way of looking at causes of problems as it organize data into logical segments for better analysis, comprehension and communication. Q. What can you tell us about BPMN? Ans: BPMN stands for Business Process Model and Notation. It’s a global standard for graphically representing business process in the form of a diagram. BPMN contains a set of graphic elements which are used by business users and developers to create activity flows and processes. BPMN's four basic element categories are: Flow objects: Events, activities, gateways Connecting objects: Sequence flow, message flow, association Swim lanes : Pool, lane Artifacts: Data object, group, annotation Q. Explain the difference between a task and an activity with respect to BPMN Ans: Activity is a generic term that is used to denote a process/sub process and is a collection of a task or group of tasks whereas a task is a self-contained piece of work. Q. Are you aware of JAD? Ans: Joint Application Development (JAD) consists of a structured workshops session between end user/client, project manager, business analyst, technical team and subject matter experts (SME) to facilitate the design and development of the product. Applications developed through JAD development approach has higher customer satisfaction and less number of errors as the end user is directly involved in the development process. Q. Do you know about the term ‘force-field analysis’? Ans: Force-field analysis aids in making decisions by identifying the factors for and against a proposed change to the system. The ‘for’ and ‘against’ factors are tabulated and are then analyzed, discussed and evaluated for their impact on the change. Q. What are Test cases? Ans: A test case is a document which contains listing of all the possible scenarios that could happen based on a respective use case. Thus, every test case is developed with a use case as a base. A test case contains main flow, positive scenarios, negative scenarios and scenarios covering non-functional requirements also. A single use case could contain many test cases and these cases are clubbed to make a test script. Test Cases are written in a testing tool like Test Director, but they can be also be written in MS Word. The audience for a test case are the QA testers. Q. What are the different testing techniques you use? Ans: The aim of testing is to verify and validate the quality of a developed functionality according to the project requirements. A BA does various types of testing, which are: Black box testing: This is a functional testing where a BA validates that the output generated by the system is as per the requirements/use case Unit Testing: A BA does unit testing on a developer’s machine to make sure the requested functionality is being achieved. Integration Testing: This type of testing is done when more than one piece of code are integrated to realize a functionality. A BA does integration testing to make sure than the system is performing as expected after different modules are integrated. Functional Testing: A BA is expected to conduct functional testing to validate that the system is achieving the functionality specified in the use case/functional requirement specification document (FRS). Acceptance Testing: A BA along with the client, does the acceptance testing to validate that the system is performing as per the business requirements and the product’s acceptance criteria. Regression Testing: Regression testing is done after a modification has been made to the existing system. Its aim is to make sure that all the system functionalities are working as expected. Beta Testing: A BA along with the testing team, does the beta testing and it is done on a pre-production version of the product. This testing is done to make sure that the functional and non-functional requirements of the system are met. Q. Tell me about SaaS Ans: SaaS is Short for Software as a Service and it is a software delivery model under which a software and its associated services are remotely accessed by an end user as a web based service. E.g. Facebook, which is deployed over internet and the users access its services by an internet enabled device. Q. What problems a Business Analyst could face during requirements gathering? Ans: Some of the problems faced by a BA during requirements gathering are: Lack of Clarity in the Scope of the Business requirements Misalignment of the requirements with the business case of the project Ill management of Business Requirements Constantly changing requirements Unavailability of the key stakeholders Communication gap between the stakeholders Q. Could you describe the main qualities of a good requirement? Ans: The golden rule to measure the quality of a good requirement is the ‘SMART’ rule. According to this rule a requirement should be: Specific: The requirement should be specific so that it could be properly documented Measurable: We should be able to measure the success criteria of the requirement by different parameters Attainable: The requirement should be possible to attain with the given resources Relevant: The requirement should be in line with the project’s business case Timely: The requirement should be posed in time i.e. early in the project life cycle. Q. What are different diagrams that a BA should know about? Ans: There are a couple of different diagrams about which a BA should have concrete knowledge. They are: Entity relationship diagram, data flow diagram, use case diagram, class diagram, activity diagram, sequence diagram, collaboration diagram, component diagrams and deployment diagrams. Q. What are the main responsibilities of a BA? Ans: A business analyst is expected to visualize the ‘big picture’ and his responsibilities extends towards both the business side as well as the technology side of the project. The major responsibilities that he is expected to fulfill are: Ascertain the feasibility of the solution/project/product. Analyze, organize and document requirements. Liaise and enhance communications with stakeholders. Clarify doubts, concerns regarding the solution to be developed. Conduct unit testing and verify the development is as per the requirements Gain acceptance/approval of the deliverables from the client. Document and prioritize change requests from the client. Create final product documentations, achieve records and document project lessons learned. Q. What are the different analysis techniques employed by a BA? Ans: The major business analysis techniques used by a BA are: interview, SWOT analysis, facilitated workshop, brainstorming, observation, prototyping and root cause analysis. Q. What is a 100-point method? Ans: The 100-point method is a prioritization method that can be used to prioritize items in a group environment. Each person within the group is given 100 points which they can distribute as votes across the available items. Q. What do you know about 8-omega? Ans: 8 Omega is a business change framework to improve the existing business processes. Based on its name, this framework consists of 8 lifecycle phases namely; Discover, Analyze, Design, Integrate,Implement, Manage, Control and Improve. Also, it address 4 key perspectives of business i.e. Strategy, People, Process and Technology. Q. What is FMEA and why it’s used? Ans: FMEA stands for ‘Failure Mode and Effects Analysis’ and it is used for failure analysis, risk analysis and quality engineering. It involves reviewing components, systems and subsystems on parameters like functional, design and process to identify failure models. The resulting data is then used for risk management and mitigation. Q. What is a use case ? Ans: A use case is a methodology used in requirement analysis to identify, organize and document the requirements. Following are the main characteristics of a use case: Contains both functional and non-functional requirements Describes the flow of events/scenarios Defines the actors involved in the scenarios Contains main flow, alternative flows and exceptional flows. Contains business rules and associated diagrams. Use cases can be used at various stages of a project and its audiences are both technology and business. Q. Tell us the difference between an alternate flow and an exception flow of a use case? Ans: Alternate flow are the alternative actions that can be performed apart for the basic flow and might be considered as an optional flow whereas Exception flow is the path traversed in case of the error or an exception being thrown. For e.g. on a logic page the ‘Forgot password’ is the alternate flow and system showing ‘404 error’ when correct username and password are entered is exception flow. Q. What is the user of trigger in a use case? Ans: Trigger is an action which will invoke a specific flow which would otherwise have been inactive. Q. What all diagrams are used to visualize a use case? Ans: Use Case Diagram, Activity diagram, Sequence diagram, Communication diagram and State machine diagram. Q. Please explain the term Use Case Points Ans: Use Case Points are normalized unit of measurement used to size and estimate the cost of work that is to be done on a system. Q. What is use case generalization and actor generalization? Ans: In the context of use case modelling, sometimes two or more use cases share a common structure and behaviors. When this happens, we create a new use case that describes the shared parts of its parent use cases. Similarly, actor generalization is the relationship between two actors in a use case where the child actor inherits the properties of a parent actor. Q. What are the advantages of unit testing? Ans: Unit testing is the type of testing which is done at the developer’s desk and if a BA conducts unit testing he is able to find a defect before it gets integrated with other codes. This way, a bug gets identified early and is usually fixed in less duration. Q. Elucidate the difference between assumptions and constraints Ans: Assumptions are scenarios that are considered to be as facts while a product is being designed/developed and constraints are restrictions that are imposed and have to be mandatorily followed. Q. Explain Kano analysis Ans: Kano analysis is a quality measurement process aimed at categorizing and prioritizing the customer requirements in an effort to increase the customer’s satisfaction. Q. What is a RACI matrix? Ans: RACI matrix is a type of responsibility assignment matrix used to assign roles and responsibilities within the project team. The acronyms stands for Responsible, Accountable, Consulted and Informed. Q. How can you explain the user centered design methodology? Ans: It all depends on the end users. In such scenario, we develop the system with a user’s point of view. Who are the end users, what they require etc. Personas are basically social roles, performed by any actor or character. It is derived from a Latin word meaning character. In marketing terminology, it represents group of customers/end users. Q. How do you define Personas? Ans: Personas are used instead of real users that assist developers and technical team to judge the user behavior in different scenarios, more clearly. Personas are basically social roles, performed by any actor or character. It is derived from a Latin word meaning character. In marketing terminology, it represents group of customers/end users. Q. Define Application Usability? Ans: Application usability is actually the quality of the system that makes the system useful for its end users. System’s usability is good if it is capable of achieving users’ goals. Personas are basically social roles, performed by any actor or character. It is derived from a Latin word meaning character. In marketing terminology, it represents group of customers/end users. Q. Define OLTP Systems? Ans: OLPT stands for On-Line Transaction Processing; such systems are capable to perform database transactions and are meant to provide good speed for database transactions. These systems are mainly used for data entry and retrieving data from the database. Q. Do you have any idea about Pugh Matrix? Ans: Pugh Matrix is used to decide about the most optimal and alternate solutions. This technique is now a standard part of Six Sigma technique. It is also known as problem or design matrix. Q. What BPMN stands for? Ans: It is Business Process Model and Notation. It is a graphical representation of business processes. Q. Define BPMN Gateway? Ans:BPMN Gateway is a processing modeling component that is used to control flow of interaction, sequence of processes. Q. Define BCG Matrix? Ans: The Boston Consulting Group (BCG) matrix is developed to analyze several of business processes and new product offerings from companies. It is a useful tool that can be used in portfolio analysis, strategic management, product management, and brand marketing. Q. Differentiate between Fish Model and V Model? Ans:Fish model is comparatively very costly and time consuming, while, V model requires less time and cost. Moreover, Fish model is used when there were no ambiguities in the customers’ requirements. Otherwise, other model is preferred. Agile Business Analyst Interview Question and Answers Q. Can you elucidate something about agile? Ans: Agile is a software development methodology in which the development is carried out iteratively and the requirements evolve through continuous inspection and adaptation. Some of the most commonly used agile software development methods/frameworks are: Adaptive Software Development (ASD), Extreme Programming (XP), scrum and kanban. Q. What can you tell us about Scrum? Ans: Scrum is the most widely used process framework for agile development. Concepts of scrum include: Sprint: It’s the basic unit of Scrum development and is restricted to a specific duration Product backlog: An elaborate listing of all the product’s requirements. Daily scrum meeting: Each day during the sprint, the project team assembles and discusses what was achieved yesterday, what is due today and the roadblocks faced. This meeting is strictly timed for 15 minutes. Sprint Review Meeting: a meeting that reviews what was achieved in the course of the sprint and what is left. Sprint Retrospective: team members reflect on the past sprints to learn from the previous mistakes and continuously improve. Q.What is the purpose of the sprint planning meeting? Ans: The spring planning meeting is held at the start of every sprint and comprises of the project team, product owner and the scrum master. The aim of this meeting is to: Ascertain the capacity of the team for the current sprint. Prioritize the items from the product backlog that are to be completed in the current sprint. Select the items from the product backlog to be done in the current sprint based on the capacity of the team. Plan the work and assign responsibilities for complete sprint duration. The complete duration of the spring planning meeting is eight hours. Q.What are the advantages of agile methodology over the other software development methodologies? Ans: Agile development, due to its innate nature, is both iterative and incremental. Owing to this characteristic, all the development aspects (design, quality, requirements) are constantly reviewed and improved progressively with each sprint. Thus, the product could be adapted at any time based on the client’s need and the level of customer satisfaction is very high. Whereas, in the conventional development methodologies, each project phase is only traversed once which restricts the flexibility to incorporate new requirements or modify existing requirements. Q.How do you define a sprint backlog? Ans: Sprint backlog is a collection of requirements that the development team must achieve in the next sprint. A sprint backlog is created based on the development team’s capacity and the priority of the requirements. Conversely, a product backlog is a prioritized list of high-level requirements of the product. Q. Why do we use a sprint burndown chart? Ans: A sprint burndown chart is graphic visualization of the rate of progress of the current sprint. This chart is updated daily over the course of a sprint. Q. Who all constitute a Scrum Team? Ans: Scrum Team comprises of Product Owner, Scrum Master and the Development Team Q. Tell us the responsibilities of a Product Owner and Scrum Master Ans: The responsibilities of a Product Owner: Primary stakeholder of the project/product Create, edit and prioritize user stories Add user stories to the product backlog Different from the scrum master role The responsibilities of a Scrum Master: A facilitator to the project team Makes resources available to the project team Enforces the scrum rules on the team Manage and encourage the project team Chairs and arrange stand up meetings Q. What do you know about the term ‘Spike’ in relation to scrum? Ans: A spike is a time bound activity to conduct analysis or answer question rather than producing shippable product. Spikes are usually planned to take place in between sprints. Q. What is the Velocity of a sprint? Ans: Velocity of a sprint is the total amount of work the development team is capable of doing over the duration of the sprint. Velocity for a sprint is agreed upon based on the historical data available about the previous sprint of the project. Q. What is a ‘Story Board’? Ans: The progress of an agile project is represented by a story board. To do so, a white board is divided in four columns ‘To do’, ‘In Progress’, 'Test’ and ‘Done’ and post It notes are placed in each column indicating the progress of individual development item (user story/task). This way, everybody is aware of the current status of the project and of the user stories as well. Q. Are you aware of the term ‘Tracer Bullet’? Ans: The tracer bullet is a spike with the current architecture, current technology set, and current set of best practices which results in production of quality code. Q. What do we mean by the terms ‘Impediment’ and ‘ScrumBag’? Ans: Impediment denotes the ‘cause’ that is hindering the team member to work to its fullest capability and ScrumBag refers to the person, group, or any other blockers that could be a factor for Impediment. Q. How do you define a user story with respect to Agile? Ans: A User story is document which defines the requirement of a system/project/product in the agile environment. They dictate the ‘who', 'what' and 'why' of a requirement. To explain a requirement, a number of user stories might get created with each one of them defining a specific aspect of the requirement. These user stories are the prioritized based on their importance, broken down into tasks followed by the developers estimating the duration of completion of each of these tasks. Q. Have you heard of the term INVEST in relation to scrum? Ans: INVEST is a mnemonic describing the characteristics of a good user story: Independent – The user story shouldn’t have any dependency on any other user story Negotiable – They could be changed and reframed Valuable – They are able to add value to the end product Estimable – It should be possible to estimate them for better planning Scalable – they should be small sized and manageable Testable – the tester should be able to verify the end result of the user story Q. How is an epic useful in an agile project? Ans: While managing a large project, there are a lot of requirements spread across multiple domains of the project and it becomes difficult to manage such large number of requirements. Thus, these requirements are documented in form of user stories and the user stories belonging to the same section of the project are clubbed to form an ‘Epic’. An epic is considered as complete only when all the user stories (and their respective tasks) belonging to it are complete. Q. What do you know about Planning Poker? Ans: Planning Poker is an agile planning technique aimed at gaining consensus on the estimated time to complete an activity. Team members are given Planning Poker cards with values like 1,2,3,4 and these values represent the estimation unit (hours, days) Then, a user story is discussed and the team members are called to disclose the duration that an activity is expected to take by displaying a Planning Poker card. If all estimators selected the same value, that becomes the estimate. If not, the estimators discuss their estimates and the same process is repeated until the complete team reaches a consensus. Contact for More On Business Analyst Online Training
Continue reading
CCSA Interview Questions
Q.Where You Can View The Results Of The Checkpoint? Ans: You can view the results of the checkpoints in the Test Result Window. Note: If you want to retrieve the return value of a checkpoint (a boolean value that indicates whether the checkpoint passed or failed) you must add parentheses around the checkpoint argument in the statement in the Expert View. Q.What’s The Standard Checkpoint? Ans: Standard Checkpoints checks the property value of an object in your application or web page. Q.Which Environment Are Supported By Standard Checkpoint? Ans: Standard Checkpoint are supported for all add-in environments. Q.Explain How A Biometric Device Performs In Measuring Metrics, When Attempting To Authenticate Subjects? Ans: False Rejection Rate Crossover Error Rate False Acceptance Rate Q.What’s The Image Checkpoint? Ans: Image Checkpoint check the value of an image in your application or web page. Q.Which Environments Are Supported By Image Checkpoint? Ans: Image Checkpoint are supported only Web environment. Q.What’s The Bitmap Checkpoint? Ans: Bitmap Checkpoint checks the bitmap images in your web page or application. Q.Which Environment Are Supported By Bitmap Checkpoints? Ans: Bitmap checkpoints are supported all add-in environment. Q.What’s The Table Checkpoints? Ans: Table Checkpoint checks the information with in a table. Q.Which Environments Are Supported By Table Checkpoint? Ans: Table Checkpoints are supported only ActiveX environment. Q.What’s The Text Checkpoint? Ans: Text Checkpoint checks that a test string is displayed in the appropriate place in your application or on web page. Q.Which Environment Are Supported By Test Checkpoint? Ans: Text Checkpoint are supported all add-in environments. Q.What Is Stealth Rule In Checkpoint Firewall? Ans: Stealth Rule Protect Checkpoint firewall from direct access any traffic. Its rule should be place on the top of Security rule base. In this rule administrator denied all traffic to access checkpoint firewall. Q.What Is Cleanup Rule In Checkpoint Firewall? Ans: Cleanup rule place at last of the security rule base, Its used to drop all traffic which not match with above rule and Logged. Cleanup rule mainly created for log purpose. In this rule administrator denied all the traffic and enable log. Q.What Is Explicit Rule In Checkpoint Firewall? Ans: Its a rule in ruse base which is manually created by network security administrator that called Explicit rule. Q.What Is 3 Tier Architecture Component Of Checkpoint Firewall? Ans: Smart Console. Security Management. Security Gateway. Q.What Is The Packet Flow Of Checkpoint Firewall? Ans: SAM Database. Address Spoofing. Session Lookup. Policy Lookup. Destination NAT. Route Lookup. Source NAT. Layer 7 Inspection. Q.Explain Which Type Of Business Continuity Plan (bcp) Test Involves Shutting Down A Primary Site, Bringing An Alternate Site On-line, And Moving All Operations To The Alternate Site? Ans: Full interruption. Q.Explain Which Encryption Algorithm Has The Highest Bit Strength? Ans: AES Q.Give An Example For Simple, Physical-access Control? Ans: Lock. Q.Which Of The Following Is Not An Auditing Function That Should Be Performed Regularly? Ans: Reviewing performance logs. Q.Explain How Do Virtual Corporations Maintain Confidentiality? Ans: Encryption. Q.Explain What Type Of Document Contains Information On Alternative Business Locations, It Resources, And Personnel? Ans: Business continuity plan. Q.Explain Which Of The Following Is The Best Method For Managing Users In An Enterprise? Ans: Place them in a centralized Lightweight Directory Access Protocol. Q.What Are Enterprise Business Continuity Plan (bcp)? Ans: Accidental or intentional data deletion Severe weather disasters Minor power outages Q.Explain Which Type Of Business Continuity Plan (bcp) Test Involves Practicing Aspects Of The Bcp, Without Actually Interrupting Operations Or Bringing An Alternate Site On-line? Ans: Simulation. contact for more on Checkpoint firewall online training
Continue reading
Ethical Hacking Interview Questions
Q.Explain What Is Ethical Hacking? Ans: Ethical Hacking is when a person is allowed to hacks the system with the permission of the product owner to find weakness in a system and later fix them. Q. What Is The Difference Between Ip Address And Mac Address? Ans: IP address: To every device IP address is assigned, so that device can be located on the network. In other words IP address is like your postal address, where anyone who knows your postal address can send you a letter. MAC (Machine Access Control) address: A MAC address is a unique serial number assigned to every network interface on every device. Mac address is like your physical mail box, only your postal carrier (network router) can identify it and you can change it by getting a new mailbox (network card) at any time and slapping your name (IP address) on it. Q. List Out Some Of The Common Tools Used By Ethical Hackers? Ans: Meta Sploit Wire Shark NMAP John The Ripper Maltego Q. What Are The Types Of Ethical Hackers? Ans: The types of ethical hackers are Grey Box hackers or Cyberwarrior Black Box penetration Testers White Box penetration Testers Certified Ethical hacker Q. What Is Footprinting In Ethical Hacking? What Is The Techniques Used For Footprinting? Ans: Footprinting refers accumulating and uncovering as much as information about the target network before gaining access into any network. The approach adopted by hackers before hacking Open Source Footprinting : It will look for the contact information of administrators that will be used in guessing the password in Social engineering Network Enumeration : The hacker tries to identify the domain names and the network blocks of the target network Scanning : Once the network is known, the second step is to spy the active IP addresses on the network. For identifying active IP addresses (ICMP) Internet Control Message Protocol is an active IP addresses Stack Fingerprinting : Once the hosts and port have been mapped by scanning the network, the final footprinting step can be performed. This is called Stack fingerprinting. Q. Explain What Is Brute Force Hack? Ans: Brute force hack is a technique for hacking password and get access to system and network resources, it takes much time, it needs a hacker to learn about JavaScripts. For this purpose, one can use tool name “Hydra”. Q. Explain What Is Dos (denial Of Service) Attack? What Are The Common Forms Of Dos Attack? Ans: Denial of Service, is a malicious attack on network that is done by flooding the network with useless traffic. Although, DOS does not cause any theft of information or security breach, it can cost the website owner a great deal of money and time. Buffer Overflow Attacks SYN Attack Teardrop Attack Smurf Attack Viruses Q. Explain What Is Sql Injection? Ans: SQL is one of the technique used to steal data from organizations, it is a fault created in the application code. SQL injection happens when you inject the content into a SQL query string and the result mode content into a SQL query string, and the result modifies the syntax of your query in ways you did not intend. Q. What Are The Types Of Computer Based Social Engineering Attacks? Explain What Is Phishing? Ans: Computer based social engineering attacks are Phishing Baiting On-line scams Phishing technique involves sending false e-mails, chats or website to impersonate real system with aim of stealing information from original website. Q. Explain What Is Network Sniffing? Ans: A network sniffer monitors data flowing over computer network links. By allowing you to capture and view the packet level data on your network, sniffer tool can help you to locate network problems. Sniffers can be used for both stealing information off a network and also for legitimate network management. Q. Explain What Is Arp Spoofing Or Arp Poisoning? Ans: ARP (Address Resolution Protocol) is a form of attack in which an attacker changes MAC ( Media Access Control) address and attacks an internet LAN by changing the target computer’s ARP cache with a forged ARP request and reply packets. Q. How You Can Avoid Or Prevent Arp Poisoning? Ans: ARP poisoning can be prevented by following methods Packet Filtering : Packet filters are capable for filtering out and blocking packets with conflicting source address information Avoid trust relationship : Organization should develop protocol that rely on trust relationship as little as possible Use ARP spoofing detection software : There are programs that inspects and certifies data before it is transmitted and blocks data that is spoofed Use cryptographic network protocols : By using secure communications protocols like TLS, SSH, HTTP secure prevents ARP spoofing attack by encrypting data prior to transmission and authenticating data when it is received Q. What Is Mac Flooding? Ans: Mac Flooding is a technique where the security of given network switch is compromised. In Mac flooding the hacker or attacker floods the switch with large number of frames, then what a switch can handle. This make switch behaving as a hub and transmits all packets at all the ports. Taking the advantage of this the attacker will try to send his packet inside the network to steal the sensitive information. Q. Explain What Is Dhcp Rogue Server? Ans: A Rogue DHCP server is DHCP server on a network which is not under the control of administration of network staff. Rogue DHCP Server can be a router or modem. It will offer users IP addresses , default gateway, WINS servers as soon as user’s logged in. Rogue server can sniff into all the traffic sent by client to all other networks. Q. Explain What Is Cross-site Scripting And What Are The Types Of Cross Site Scripting? Ans: Cross site scripting is done by using the known vulnerabilities like web based applications, their servers or plug-ins users rely upon. Exploiting one of these by inserting malicious coding into a link which appears to be a trustworthy source. When users click on this link the malicious code will run as a part of the client’s web request and execute on the user’s computer, allowing attacker to steal information. There are three types of Cross-site scripting Non-persistent Persistent Server side versus DOM based vulnerabilities Q. Explain What Is Burp Suite, What Are The Tools It Consist Of? Ans: Burp suite is an integrated platform used for attacking web applications. It consists of all the Burp tools required for attacking an application. Burp Suite tool has same approach for attacking web applications like framework for handling HTTP request, upstream proxies, alerting, logging and so on. The tools that Burp Suite has Proxy Spider Scanner Intruder Repeater Decoder Comparer Sequencer Q. Explain What Is Pharming And Defacement? Ans: Pharming: In this technique the attacker compromises the DNS ( Domain Name System) servers or on the user computer so that traffic is directed to a malicious site. Defacement: In this technique the attacker replaces the organization website with a different page. It contains the hackers name, images and may even include messages and background music. Q. Explain How You Can Stop Your Website Getting Hacked? Ans: By adapting following method you can stop your website from getting hacked Sanitizing and Validating users parameters: By Sanitizing and Validating user parameters before submitting them to the database can reduce the chances of being attacked by SQL injection Using Firewall: Firewall can be used to drop traffic from suspicious IP address if attack is a simple DOS Encrypting the Cookies: Cookie or Session poisoning can be prevented by encrypting the content of the cookies, associating cookies with the client IP address and timing out the cookies after some time Validating and Verifying user input : This approach is ready to prevent form tempering by verifying and validating the user input before processing it Validating and Sanitizing headers : This techniques is useful against cross site scripting or XSS, this technique includes validating and sanitizing headers, parameters passed via the URL, form parameters and hidden values to reduce XSS attacks Q. Explain What Is Key-logger Trojan? Ans: Key-logger Trojan is malicious software that can monitor your keystroke, logging them to a file and sending them off to remote attackers. When the desired behaviour is observed, it will record the keystroke and captures your login username and password. Q. Explain What Is Enumeration? Ans: The process of extracting machine name, user names, network resources, shares and services from a system. Under Intranet environment enumeration techniques are conducted. Q. Explain What Is Ntp? Ans: To synchronize clocks of networked computers, NTP (Network Time Protocol) is used. For its primary means of communication UDP port 123 is used. Over the public internet NTP can maintain time to within 10 milliseconds. Q. Explain What Is Mib? Ans: MIB ( Management Information Base ) is a virtual database. It contains all the formal description about the network objects that can be managed using SNMP. The MIB database is hierarchical and in MIB each managed objects is addressed through object identifiers (OID). Q. Mention What Are The Types Of Password Cracking Techniques? Ans: The types of password cracking technique includes AttackBrute Forcing AttacksHybrid AttackSyllable AttackRule Q. Explain What Are The Types Of Hacking Stages? Ans: The types of hacking stages are Gaining AccessEscalating PrivilegesExecuting ApplicationsHiding FilesCovering Tracks Q. Explain What Is Csrf (cross Site Request Forgery)? How You Can Prevent This? Ans: CSRF or Cross site request forgery is an attack from a malicious website that will send a request to a web application that a user is already authenticated against from a different website. To prevent CSRF you can append unpredictable challenge token to each request and associate them with user’s session. It will ensure the developer that the request received is from a valid source. Contact for more on Ethical Hacking Online Training
Continue reading
IOT Interview Questions
Q.What Is Iot? Ans: IoT stands for Internet of Things. It is basically a network using which things can communicate with each other using internet as means of communication between them. All the things should be IP protocol enabled in order to have this concept possible. Not one but multiple technologies are involved to make IoT a great success. Q. What Impacts Will The Internet Of Things (iot) Have On Infrastructure And Smart Cities Sector? Ans: The capabilities of the smart grid, smart buildings, and ITS combined with IoT components in other public utilities, such as roadways, sewage and water transport and treatment, public transportation, and waste removal, can contribute to more integrated and functional infrastructure, especially in cities. For example, traffic authorities can use cameras and embedded sensors to manage traffic flow and help reduce congestion. IoT components embedded in street lights or other infrastructure elements can provide functions such as advanced lighting control, environmental monitoring, and even assistance for drivers in finding parking spaces. Smart garbage cans can signal waste removal teams when they are full, streamlining the routes that garbage trucks take. This integration of infrastructure and service components is increasingly referred to as smart cities, or other terms such as connected, digital, or intelligent cities or communities. A number of cities in the United States and elsewhere have developed smart-city initiatives. Q. What Role Does The Network Play In The Internet Of Everything? Ans: The network plays a critical role in the Internet of Everything ? it must provide an intelligent, manageable, secure infrastructure that can scale to support billions of context-aware devices. Q. How Wireless Communications Might Affect The Development And Implementation Of The Internet Of Things (iot)? Ans: Many observers believe that issues relating to access to the electromagnetic spectrum will need to be resolved to ensure the functionality and interoperability of IoT devices. Access to spectrum, both licensed and unlicensed, is essential for devices and objects to communicate wirelessly. IoT devices are being developed and deployed for new purposes and industries, and some argue that the current framework for spectrum allocation may not serve these new industries well. Q. How Does The Internet Of Everything Relate To The Internet Of Things? Ans: The “Internet of Everything” builds on the foundation of the “Internet of Things” by adding network intelligence that allows convergence, orchestration and visibility across previously disparate systems. Q. How Is Industrial Internet Of Things (iiot) Different From The Internet Of Things (iot)? Ans: There are two perspectives on how the Industrial IoT differs from the IoT. The first perspective is that there are two distinctly separate areas of interest. The Industrial IoT connects critical machines and sensors in high-stakes industries such as aerospace and defense, healthcare and energy. These are systems in which failure often results in life-threatening or other emergency situations. On the other hand, IoT systems tend to be consumer-level devices such as wearable fitness tools, smart home thermometers and automatic pet feeders. They are important and convenient, but breakdowns do not immediately create emergency situations. The second perspective sees the Industrial IoT as the infrastructure that must be built before IoT applications can be developed. In other words, the IoT, to some extent, depends on the Industrial IoT. For example, many networked home appliances can be classified as IoT gadgets, such as a refrigerator that can monitor the expiration dates of the milk and eggs it contains, and remotely-programmable home security systems. On the Industrial Internet side, utilities are enabling better load balancing by taking power management decisions down to the neighborhood level. What if they could go all the way down to individual appliances? Suppose users could selectively block power to their devices during high-demand scenarios? Your DVR might power down if it wasn’t recording your favorite show, but your refrigerator would continue to work, resulting in less food spoilage. You could set your washer and dryer to be non-functional, and make an exception with a quick call from your smartphone. Rolling blackouts could be a thing of the past. Innovators are only beginning to imagine the possibilities that may be achieved by taking advantage of devices and systems that can communicate and act in real time, based on information they exchange amongst themselves. As the Industrial IoT becomes better defined and developed, more impactful IoT applications can and will be created. Internet of Things:- Everyday consumer-level devices connected to one another and made smarter and slightly self-aware. Examples: consumer cell phone, smart thermostat Industrial Internet of Things:- Equipment and systems in industries and businesses where failures can be disastrous. Examples: individual health monitors and alert systems in hospitals. Q. How Will Internet Of Things (iot) Impact Sustainability Of Environment Or Business? Ans: Internet of Things (IoT) can significantly reduce carbon emissions by making business and industry more efficient. “By managing street lights more efficiently you can save approximately 40% of energy used to make them run,” Will Franks says. ill Ruh, vice-president of GE Software, agrees. “We have created 40 applications,” says Ruh. “One of these, PowerUp, uses sensors to collect weather and performance data from wind turbines to enable operators to generate up to 5% more electricity without physically changing it, which generates 20% more profit for our customers.” Q. What Is The Difference Between The Internet Of Things (iot) And The Sensor Business? Ans: Sensors can be used in lots of different ways, many of which don’t need to be internet connected. IoT also includes the control side, not just the sensing side. Q. What Impacts Will The Internet Of Things (iot) Have On Economic Growth? Ans: Several economic analyses have predicted that the IoT will contribute significantly to economic growth over the next decade, but the predictions vary substantially in magnitude. The current global IoT market has been valued at about $2 trillion, with estimates of its predicted value over the next five to ten years varying from $4 trillion to $11 trillion. Such variability demonstrates the difficulty of making economic forecasts in the face of various uncertainties, including a lack of consensus among researchers about exactly what the IoT is and how it will develop. Q. Why Internet Of Things(iot) Will Be Successful In The Coming Years? Ans: As the telecommunication sector is becoming more extensive and efficient, broadband internet is widely available. With technological advancement it is now much cheaper to produce necessary sensors with built-in wifi capabilities making connecting devices less costly. Most important, the smart phone usage has surpassed all the predicted limits and telecommunication sector is already working on its toes to keep their customers satisfied by improving their infrastructure.As IoT devices need no separate communication than the existing one building IoT tech is very cheap and highly achievable. Q. How Cybersecurity Might Affect The Development And Implementation Of The Internet Of Things (iot), Especially In Usa? Ans: The security of devices and the data they acquire, process, and transmit is often cited as a top concern in cyberspace. Cyberattacks can result in theft of data and sometimes even physical destruction. Some sources estimate losses from cyberattacks in general to be very large?in the hundreds of billions or even trillions of dollars. As the number of connected objects in the IoT grows, so will the potential risk of successful intrusions and increases in costs from those incidents. Cybersecurity involves protecting information systems, their components and contents, and the networks that connect them from intrusions or attacks involving theft, disruption, damage, or other unauthorized or wrongful actions. IoT objects are potentially vulnerable targets for hackers. Economic and other factors may reduce the degree to which such objects are designed with adequate cybersecurity capabilities built in. IoT devices are small, are often built to be disposable, and may have limited capacity for software updates to address vulnerabilities that come to light after deployment. The interconnectivity of IoT devices may also provide entry points through which hackers can access other parts of a network. For example, a hacker might gain access first to a building thermostat, and subsequently to security cameras or computers connected to the same network, permitting access to and exfiltration or modification of surveillance footage or other information. Control of a set of smart objects could permit hackers to use their computing power in malicious networks called botnets to perform various kinds of cyberattacks. Access could also be used for destruction, such as by modifying the operation of industrial control systems, as with the Stuxnet malware that caused centrifuges to self-destruct at Iranian nuclear plants. Among other things, Stuxnet showed that smart objects can be hacked even if they are not connected to the Internet. The growth of smart weapons and other connected objects within DOD has led to growing concerns about their vulnerabilities to cyberattack and increasing attempts to prevent and mitigate such attacks, including improved design of IoT objects. Cybersecurity for the IoT may be complicated by factors such as the complexity of networks and the need to automate many functions that can affect security, such as authentication. Consequently, new approaches to security may be needed for the IoT. IoT cybersecurity will also likely vary among economic sectors and subsectors, given their different characteristics and requirements. Each sector will have a role in developing cybersecurity best practices, unique to its needs. The federal government has a role in securing federal information systems, as well as assisting with security of nonfederal systems, especially critical infrastructure. Cybersecurity legislation considered in the 114th Congress, while not focusing specifically on the IoT, would address several issues that are potentially relevant to IoT applications, such as information sharing and notification of data breaches. Q. What Impacts Will The Internet Of Things (iot) Have On Health Care Sector? Ans: The IoT has many applications in the health care field, in both health monitoring and treatment, including telemedicine and telehealth. Applications may involve the use of medical technology and the Internet to provide long-distance health care and education. Medical devices, which can be wearable or nonwearable, or even implantable, injectable, or ingestible, can permit remote tracking of a patient’s vital signs, chronic conditions, or other indicators of health and wellness.36 Wireless medical devices may be used not only in hospital settings but also in remote monitoring and care, freeing patients from sustained or recurring hospital visits. Some experts have stated that advances in healthcare IoT applications will be important for providing affordable, quality care to the aging U.S. population. Q. What Are The Main Social And Cultural Impacts Of Internet Of Things (iot)? Ans: The IoT may create webs of connections that will fundamentally transform the way people and things interact with each other. The emerging cyberspace platform created by the IoT and SMAC has been described as potentially making cities like “computers” in open air, where citizens engage with the city “in a real-time and ongoing loop of information.” Some observers have proposed that the growth of IoT will result in a hyperconnected world in which the seamless integration of objects and people will cause the Internet to disappear as a separate phenomenon. In such a world, cyberspace and human space would seem to effectively merge into a single environment, with unpredictable but potentially substantial societal and cultural impacts. Q. Will Iot Actually Work Over The Internet Or Will It Have Its Own Dedicated Wide Area Network? Ans: Interoperability between various wireless and networking standards is still an issue and something that forums and standards bodies are trying to address. According to Franks, businesses have to collaborate on standards to create strong ecosystems for a range of industries, otherwise the industry will remain fragmented. “The IoT is a whole myriad of different ways of connecting things ? it could be fixed, Wi-Fi NFC, cellular, ultra-narrow band or even Zigbee. You have to mix and match what is best for each task,” he says. “Interoperability is essential, for economies of scale.” Q. What Will Happen In Terms Of Jobs Losses And Skills As Iot Makes Devices And Robots More Intelligent? Ans: A Digital Skills Select Committee report to the House of Lords in February estimated that 35% of UK jobs would be lost to automation in the next 20 years. It echoes the sort of thinking that Erik Brynjolfsson and Andrew McAfee?s The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies predicts. Their answer is that you need to switch skills but to do this you need to switch the schools too. Will Franks agrees. He saw when he launched his business in 2004 that a massive shortage in relevant skills can impede progress, so he was forced to look overseas. The same he says will happen with IoT unless we get schools and colleges to start gearing courses to meet the challenges of tomorrow?s automated economy. It is a huge challenge and one which is a top three priority for Chi Onwuruh MP and Labour’s Digital Review. Digital inclusion, a data review and a focus on digital skills are she says essential. Last July the Digital Skills Taskforce called for the Government to review skills development in schools and colleges. The Perkins Review in November last year also called for a review into developing engineering skills to boost the UK economy. What is clear is that the jobs landscape will change dramatically in the next 20 years. But it will be a slow process and whether or not we are prepared to cope with it will depend as much on education policy as digital policy. The robots are definitely coming but don?t hand your notice in just yet. Q. What Are The Elements Of The Internet Of Everything? Ans: People: People will continue to connect through devices, like smartphones, PCs and tablets, as well as through social networks, such as Facebook and LinkedIn. As the Internet of Everything emerges, the interaction of people on the Internet will evolve. For example, it may become common to wear sensors on our skin or in our clothes that collect and transmit data to healthcare providers. Some analysts even suggest that people may become individual nodes that produce a constant stream of static data. Process: This includes evolving technology, business, organizational and other processes that will be needed in order to manage and, to a large extent, automate the explosive growth in connections?and the resultant accumulation, analysis and communication of data?that will be inevitable in the Internet of Everything. Processes will also play an important role in how each of these entities?people, data, and things?interact with each other within the Internet of Everything to deliver societal benefits and economic value. Things:This element includes many physical items like sensors, meters, actuators, and other types of devices that can be attached to any object, that are or will be capable of connecting to the network and sharing information. These things will sense and deliver more data, respond to control inputs, and provide more information to help people and machines make decisions. Examples of ?things? in the Internet of Everything include smart meters that communicate energy consumption, assembly line robots that automate factory floor operations, and smart transportation systems that adapt to traffic conditions. Data: Today, devices typically gather data and stream it over the Internet to a central source, where it is analyzed and processed. Such data is expected to surpass today?s largest social media data set by another order of magnitude. Much of this data has very transient value. In fact, its value vanishes almost as quickly as it is created. As a result, not all generated data can be or should be stored. As the capabilities of things connected to the Internet continue to advance, they will become more intelligent and overcome the limits of traditional batch-oriented data analysis by combining data into more useful information. Rather than just reporting raw data, connected things will soon send higher-level information and insights back to machines, computers, and people in real time for further evaluation and decision making. The intelligent network touches everything?and is the only place where it?s possible to build the scalable intelligence required to meet and utilize this new wave of “data in motion”. This transformation made possible by the emergence of the Internet of Everything is important because it will enable faster, more intelligent decision making by both people and machines, as well as more effective control over our environment. Q. What Are The Important Components Of Internet Of Things? Ans: Many people mistakenly think of IoT as an independent technology. Interestingly, internet of things is being enabled by the presence of other independent technologies which make fundamental components of IoT. The fundamental components that make internet of things a reality are:- Hardware-Making physical objects responsive and giving them capability to retrieve data and respond to instructions Software – Enabling the data collection, storage, processing, manipulating and instructing Communication Infrastructure – Most important of all is the communication infrastructure which consists of protocols and technologies which enable two physical objects to exchange data. Q. What Are The Main Challenges Of Internet Of Things (iot)? Ans: Like any other technology there are challenges which make the viability of IoT doubtful. Security is one of the major concerns of experts who believe virtually endless connected devices and information sharing can severely compromise one?s security and well being. Unlike other hacking episodes which compromise online data and privacy with IoT devices can open gateway for an entire network to be hacked. One such flaw is well presented by Andy Greenberg on wired.com where he works with hackers to remotely kill his Jeep on the highway. Another very relevant example is provided by W. David Stephenson in his post Amazon Echo: is it the smart home Trojan Horse? You can estimate the amount of personal and private data the connected devices will be producing once they are on a network. The major challenge for IoT tech companies is to figure out how the communication in the internet of things realm can be made truly secure. Q. What Kinds Of Information Do Internet Of Things (iot) Objects Communicate? Ans: The answer depends on the nature of the object, and it can be simple or complex. For example, a smart thermometer might have only one sensor, used to communicate ambient temperature to a remote weather-monitoring center. A wireless medical device might, in contrast, use various sensors to communicate a person?s body temperature, pulse, blood pressure, and other variables to a medical service provider via a computer or mobile phone. Smart objects can also be involved in command networks. For example, industrial control systems can adjust manufacturing processes based on input from both other IoT objects and human operators. Network connectivity can permit such operations to be performed in “real time” ? that is, almost instantaneously. Smart objects can form systems that communicate information and commands among themselves, usually in concert with computers they connect to. This kind of communication enables the use of smart systems in homes, vehicles, factories, and even entire cities. Smart systems allow for automated and remote control of many processes. A smart home can permit remote control of lighting, security, HVAC (heating, ventilating, and air conditioning), and appliances. In a smart city, an intelligent transportation system (ITS) may permit vehicles to communicate with other vehicles and roadways to determine the fastest route to a destination, avoiding traffic jams, and traffic signals can be adjusted based on congestion information received from cameras and other sensors. Buildings might automatically adjust electric usage, based on information sent from remote thermometers and other sensors. An Industrial Internet application can permit companies to monitor production systems and adjust processes, remotely control and synchronize machinery operations, track inventory and supply chains, and perform other tasks. IoT connections and communications can be created across a broad range of objects and networks and can transform previously independent processes into integrated systems. These integrated systems can potentially have substantial effects on homes and communities, factories and cities, and every sector of the economy, both domestically and globally. Q. Which Companies And Organizations Support The Industrial Iot? Ans: General Electric coined the term Industrial Internet in late 2012. It is effectively synonymous with the Industrial Internet of Things, and abbreviated as Industrial IoT or IIoT. Many other companies and organizations are realizing the potential and significance of the Industrial IoT. A recent study conducted by Appinions and published in Forbes listed RTI as the #1 most influential company for the Industrial Internet of Things. Other influencers included Google, Cisco, GE, Omron, DataLogic and Emerson Electric. The Industrial Internet Consortium also advocates for the advancement of the Industrial IoT. It is a not-for-profit organization that manages and advances the growth of the Industrial IoT through the collaborative efforts of its member companies, industries, academic institutions and governments. Founding members include AT&T, Cisco Systems Inc., General Electric, IBM and Intel. Q. What Is The Internet Of Everything? Ans: The Internet of Everything is the intelligent connection of people, process, data and things. Q. What Is A “thing” In The Context Of Internet Of Things (iot)? Ans: The “Thing” commonly referred to by the concept of the Internet of Things is any item that can contain an embedded, connected computing device. A “Thing” in the IoT could be a shipping container with an RFID tag or a consumer’s watch with a WiFi chip that sends fitness data or short messages to a server somewhere on the Internet. Q. How The Internet Of Things (iot) Makes A Difference To The Businesses? Ans: Businesses focus on getting products to the marketplace faster, adapting to regulatory requirements, increasing efficiency, and most importantly, persisting to innovate. With a highly mobile workforce, evolving customer, and changing supply chain demand, the IoT can move your enterprise forward, starting today. Q. What Are The Major Previacy And Security Issues In Case Of Internet Of Things (iot)? Ans: Cyberattacks may also compromise privacy, resulting in access to and exfiltration of identifying or other sensitive information about an individual. For example, an intrusion into a wearable device might permit exfiltration of information about the location, activities, or even the health of the wearer. In addition to the question of whether security measures are adequate to prevent such intrusions, privacy concerns also include questions about the ownership, processing, and use of such data. With an increasing number of IoT objects being deployed, large amounts of information about individuals and organizations may be created and stored by both private entities and governments. With respect to government data collection, the U.S. Supreme Court has been reticent about making broad pronouncements concerning society?s expectations of privacy under the Fourth Amendment of the Constitution while new technologies are in flux, as reflected in opinions over the last five years. Congress may also update certain laws, such as the Electronic Communications Privacy Act of 1986, given the ways that privacy expectations of the public are evolving in response to IoT and other new technologies. IoT applications may also create challenges for interpretation of other laws relating to privacy, such as the Health Insurance Portability and Accountability Act and various state laws, as well as established practices such as those arising from norms such as the Fair Information Practice Principles. Q. What Is Bluetooth Low Energy (ble) Protocol For Internet Of Things (iot)? Ans: Nokia originally introduced this protocol as Wibree in 2006. Also known as Bluetooth Smart this protocol provides the same range coverage with much reduced power consumption as the original Bluetooth. It has similar bandwidth with narrow spacing as used by ZigBee. Low power latency and lower complexity makes BLE more suitable to incorporate into low cost microcontrollers. Low power latency and lower complexity makes BLE more suitable to incorporate into low cost microcontrollers. As far as application is concerned BLE is in healthcare sector. As wearable health monitors are becoming prevalent the sensors of these devices can easily communicate with a smart phone or any medical instrument regularly using BLE protocol. Q. What Impacts Will The Internet Of Things (iot) Have? Ans: Many observers predict that the growth of the IoT will bring positive benefits through enhanced integration, efficiency, and productivity across many sectors of the U.S. and global economies. Among those commonly mentioned are agriculture, energy, health care, manufacturing, and transportation. Significant impacts may also be felt more broadly on economic growth, infrastructure and cities, and individual consumers. However, both policy and technical challenges, including security and privacy issues, might inhibit the growth and impact of IoT innovations. Q. Why Is The Internet Of Everything Happening Now? Ans: The explosion of new connections joining the Internet of Everything is driven by the development of IP-enabled devices, the increase in global broadband availability and the advent of IPv6. Q. What Are The Top 5 Machine-to-machine (m2m) Applications In The World? Ans: Asset Tracking and/or Monitoring in some form or another (Stolen Vehicles, Fleet, Construction Equipment, Wood Pellets, Tank level monitoring, etc.) seems to be the biggest. Low data requirements, high volumes of devices, etc. It isn’t hot or particularly exciting, but it is changing the world in subtle ways and very quickly. New business models will spring from this. Insurance Telematics is huge as if offers Insurance companies the opportunity to cut risk and drive better/more attractive pricing. Utilities/Automated Meter Reading/Smart Grids – lots of regulation and investment into this at the moment. There a lots of national solutions as the requirements and business case are driven in very diverse ways. Security has been an early adopter here. The requirements are quite heavy on the network as many of these applications have a fixed line legacy. mHealth has been out there for a while, but hasn’t really taken off. There are some exciting early adopters. Many of the established companies (largely built through acquisition) have some challenges moving quickly in this space, but when they get up to speed and the business models are established there will be a massive uptake. Automotive is a big one – driven by consumers’ expectation of being always connected as well as regulation. Q. What Impacts Will The Internet Of Things (iot) Have On Transportation Sector? Ans: Transportation systems are becoming increasingly connected. New motor vehicles are equipped with features such as global positioning systems (GPS) and in-vehicle entertainment, as well as advanced driver assistance systems (ADAS), which utilize sensors in the vehicle to assist the driver, for example with parking and emergency braking. Further connection of vehicle systems enables fully autonomous or self-driving automobiles, which are predicted to be commercialized in the next 5-20 years. Additionally, IoT technologies can allow vehicles within and across modes?including cars, buses, trains, airplanes, and unmanned aerial vehicles (drones) to “talk” to one another and to components of the IoT infrastructure, creating intelligent transportation systems (ITS). Potential benefits of ITS may include increased safety and collision avoidance, optimized traffic flows, and energy savings, among others. Q. What Is The Current Federal Regulatory Role Of Usa Government Pertinent To Internet Of Things (iot)? Ans: There is no single federal agency that has overall responsibility for the IoT, just as there is no one agency with overall responsibility for cyberspace. Federal agencies may find the IoT useful in helping them fulfill their missions through a variety of applications such as those discussed in this report and elsewhere. Each agency is responsible under various laws and regulations for the functioning and security of its own IoT, although some technologies, such as drones, may also fall under some aspects of the jurisdiction of other agencies. Various agencies have regulatory, sector-specific, and other mission-related responsibilities that involve aspects of IoT. For example, entities that use wireless communications for their IoT devices will be subject to allocation rules for the portions of the electromagnetic spectrum that they use. The Federal Communications Commission (FCC) allocates and assigns spectrum for nonfederal entities. In the Department of Commerce, the National Telecommunications and Information Administration (NTIA) fulfills that function for federal entities, and the National Institute of Standards and Technology (NIST) creates standards, develops new technologies, and provides best practices for the Internet and Internet-enabled devices. The Federal Trade Commission (FTC) regulates and enforces consumer protection policies, including for privacy and security of consumer IoT devices. The Department of Homeland Security (DHS) is responsible for coordinating security for the 16 critical infrastructure sectors. Many of those sectors use industrial control systems (ICS), which are often connected to the Internet, and the DHS National Cybersecurity and Communications Integration Center (NCCIC) has an ICS Cyber Emergency Response Team (ICS-CERT) to help critical-infrastructure entities address ICS cybersecurity issues. The Food and Drug Administration (FDA) also has responsibilities with respect to the cybersecurity of Internet-connected medical devices. The Department of Justice (DOJ) addresses law-enforcement aspects of IoT, including cyberattacks, unlawful exfiltration of data from devices and/or networks, and investigation and prosecution of other computer and intellectual property crimes. Relevant activities at the Department of Energy (DOE) include those associated with developing high-performance and green buildings, and other energy-related programs, including those related to smart electrical grids. The Department of Transportation (DOT) has established an Intelligent Transportation Systems Joint Program Office (ITS JPO) to coordinate various programs and activities throughout DOT relating to the development and deployment of connected vehicles and systems, involving all modes of surface transportation. DOT mode-specific agencies also engage in ITS activities. The Federal Aviation Administration (FAA) is involved in regulation and other activities relating to unmanned aerial vehicles (UAVs) and commercial systems (UAS). The Department of Defense was a pioneer in the development of much of the foundational technology for the IoT. Most of its IoT deployment has related to its combat mission, both directly and for logistical and other support. In addition to the activities described above, several agencies are engaged in research and development (R&D) related to the IoT:- Like NIST, the National Science Foundation (NSF) engages in cyber-physical systems research and other activities that cut across various IoT applications. The Networking and Information Technology Research and Development Program (NITRD), under the Office of Science and Technology Policy (OSTP) coordinates Federal agency R&D in networking and information technology. The NITRD Cyber Physical Systems Senior Steering Group “coordinates programs, budgets and policy recommendations” for IoT R&D. Other agencies involved in such R&D include the Food and Drug Administration (FDA), the National Aeronautics and Space Administration (NASA), the National Institutes of Health (NIH), the Department of Veterans Affairs (VA), and several DOD agencies. The White House has also announced a smart-cities initiative focusing on the development of a research infrastructure, demonstration projects, and other R&D activities. Q. What Companies Are Working On Internet Of Things (iot)? Ans: At this point, the easier question might be who isn?t working on an IoT product. Big names like Samsung, LG, Apple, Google, Lowe?s and Philips are all working on connected devices, as are many smaller companies and startups. Research group Gartner predicts that 4.9 billion connected devices will be in use this year, and the number will reach 25 billion by 2020. Q. How Does The Internet Of Things (iot) Work? Ans: The IoT is not separate from the Internet, but rather, a potentially huge extension and expansion of it. The ?things? that form the basis of the IoT are objects. They could be virtually anything? streetlights, thermostats, electric meters, fitness trackers, factory equipment, automobiles, unmanned aircraft systems (UASs or drones), or even cows or sheep in a field. What makes an object part of the IoT is embedded or attached computer chips or similar components that give the object both a unique identifier and Internet connectivity. Objects with such components are often called “smart”?such as smart meters and smart cars. Internet connectivity allows a smart object to communicate with computers and with other smart objects. Connections of smart objects to the Internet can be wired, such as through Ethernet cables, or wireless, such as via a Wi-Fi or cellular network. To enable precise communications, each IoT object must be uniquely identifiable. That is accomplished through an Internet Protocol (IP) address, a number assigned to each Internet-connected device, whether a desktop computer, a mobile phone, a printer, or an IoT object. Those IP addresses ensure that the device or object sending or receiving information is correctly identified. Q. What Impacts Will The Internet Of Things (iot) Have On Energy Sector? Ans: Within the energy sector, the IoT may impact both production and delivery, for example through facilitating monitoring of oil wellheads and pipelines. When IoT components are embedded into parts of the electrical grid, the resulting infrastructure is commonly referred to as the “smart grid”. This use of IoT enables greater control by utilities over the flow of electricity and can enhance the efficiency of grid operations. It can also expedite the integration of microgenerators into the grid. Smart-grid technology can also provide consumers with greater knowledge and control of their energy usage through the use of smart meters in the home or office. Connection of smart meters to a building’s HVAC, lighting, and other systems can result in “smart buildings” that integrate the operation of those systems. Smart buildings use sensors and other data to automatically adjust room temperatures, lighting, and overall energy usage, resulting in greater efficiency and lower energy cost. Information from adjacent buildings may be further integrated to provide additional efficiencies in a neighborhood or larger division in a city. Q. Why Is The Internet Of Everything Important? Ans: The Internet of Everything brings together people, process, data and things to make networked connections more relevant and valuable than ever before – turning information into actions that create new capabilities, richer experiences and unprecedented economic opportunity for businesses, individuals and countries. Q. What Impacts Will The Internet Of Things (iot) Have On Agriculture Sector? Ans: The IoT can be leveraged by the agriculture industry through precision agriculture, with the goal of optimizing production and efficiency while reducing costs and environmental impacts. For farming operations, it involves analysis of detailed, often real-time data on weather, soil and air quality, water supply, pest populations, crop maturity, and other factors such as the cost and availability of equipment and labor. Field sensors test soil moisture and chemical balance, which can be coupled with location technologies to enable precise irrigation and fertilization. Drones and satellites can be used to take detailed images of fields, giving farmers information about crop yield, nutrient deficiencies, and weed locations. For ranching and animal operations, radio frequency identification (RFID) chips and electronic identification readers (EID) help monitor animal movements, feeding patterns, and breeding capabilities, while maintaining detailed records on individual animals. Q. Can All Iot Devices Talk To Each Other? What Is The Standard For Communication Between These Devices? Ans: With so many companies working on different products, technologies and platforms, making all these devices communicate with each other is no small feat ? seamless overall compatibility likely won?t happen. Several groups are working to create an open standard that would allow interoperability among the various products. Among them are the AllSeen Alliance, whose members include Qualcomm, LG, Microsoft, Panasonic and Sony; and the Open Interconnect Consortium, which has the support of Intel, Cisco, GE, Samsung and HP. While their end goal is the same, there are some differences to overcome. For example, the OIC says the AllSeen Alliance doesn?t do enough in the areas of security and intellectual property protection. The AllSeen Alliance says that these issues have not been a problem for its more than 110 members. It?s not clear how the standards battle will play out, though many believe we?ll end up with three to four different standards rather than a single winner (think iOS and Android). In the meantime, one way consumers can get around the problem is by getting a hub that supports multiple wireless technologies, such as the one offered by SmartThings. Q. Should The Consumers Be Concerned About Security And Privacy Issues Considering The Amount Of Data Internet Of Things (iot) Collects? Ans: The various amounts of data collected by smart home devices, connected cars and wearables have many people worried about the potential risk of personal data getting into the wrong hands. The increased number of access points also poses a security risk. The Federal Trade Commission has expressed concerns, and has recommended that companies take several precautions in order to protect their customers. The FTC, however, doesn’t have the authority to enforce regulations on IoT devices, so it is unclear how many companies will heed its advice. For example, Apple requires that companies developing products for its HomeKit platform include end-to-end encryption and authentication and a privacy policy. The company also said it doesn’t collect any customer data related to HomeKit accessories. Q. What Is Meant By A Smart City, In The Context Of Internet Of Things (iot)? Ans: As with IoT and other popular technology terms, there is no established consensus definition or set of criteria for characterizing what a smart city is. Specific characterizations vary widely, but in general they involve the use of IoT and related technologies to improve energy, transportation, governance, and other municipal services for specified goals such as sustainability or improved quality of life. The related technologies include:- Social media (such as Facebook and Twitter), Mobile computing (such as smartphones and wearable devices), Data Analytics (big data ? the processing and use of very large data sets; and open data ? databases that are publicly accessible), and Cloud computing (the delivery of computing services from a remote location, analogous to the way utilities such as electricity are provided). Together, these are sometimes called SMAC. Q. What Is Gainspan Gs2000 Protocol For Internet Of Things (iot)? Ans: GainSpan GS2000 is one such tech which used both ZigBee and Wi-Fi. It makes optimum use of power by putting the device into energy-saving standby mode when no data transmission is taking place. Only when device is awaked or checked for connection failure the high power consumption connection of Wi-Fi is used. Q. What Risks And Challenges Should Be Considered In The Internet Of Everything? Ans: Some important considerations in the Internet of Everything include privacy, security, energy consumption and network congestion. Q. How Lack Of Uniform Technical Standards Might Affect The Development And Implementation Of The Internet Of Things (iot)? Ans: Currently, there is no single universally recognized set of technical standards for the IoT, especially with respect to communications, or even a commonly accepted definition among the various organizations that have produced IoT standards or related documents. Many observers agree that a common set of standards will be essential for interoperability and scalability of devices and systems. However, others have expressed pessimism that a universal standard is feasible or even desirable, given the diversity of objects that the IoT potentially encompasses. Several different sets of de facto standards have been in development, and some observers do not expect formal standards to appear before 2017. Whether conflicts between standards will affect growth of the sector as it did for some other technologies is not clear. Q. What Is The Difference Between The Internet Of Things (iot) And Machine To Machine (m2m)? Ans: Generally speaking, M2M could be considered a subset of IoT. M2M is like a line connecting 2 points, and IoT is like a network, a system composed of lots of M2M and triggering lots of interactions/activities. Giving a simple definition to M2M which is transferring data from one machine to another one. It’s been used everywhere in our daily life. For example, entrance security. Just like using your employee card to unlock a door. When the security detector receives the ID from the employee card and then unlock the door once the ID is approved. This is M2M. In this case, what IoT can offer? As mentioned, IoT is a network, is a system composed of lots of M2M and algorithms. When the system knows you are the person entering the office, it can turn on the light and the air conditioner of your partition, even it can adjust the most comfortable light level and temperature that you like the most from time to time after learning your behavior for a period of time. The system can get all the data from all the sensors and machines to know, for example, who and when enters the office, how much electricity you have consumed, what the environment makes you feel most comfortable, and other applications. IoT will make the facilities and things smarter and make people’s life more convenient. Not only machine to machine, but also human to machine, machine to human, and so on. Q. How Energy Consumption Might Affect The Development And Implementation Of The Internet Of Things (iot)? Ans: Energy consumption can also be an issue. IoT objects need energy for sensing, processing, and communicating information. If objects isolated from the electric grid must rely on batteries, replacement can be a problem, even if energy consumption is highly efficient. That is especially the case for applications using large numbers of objects or placements that are difficult to access. Therefore, alternative approaches such as energy harvesting, whether from solar or other sources, are being developed. Q. What Is Bluegiga Apx4 Protocol For Internet Of Things (iot)? Ans: BLE and Wi-Fi together can be used without interference as they are compliable to coexistence protocols. The Bluegiga APx4 is one such solution which supports both BLE and Wi-Fi and is based on 450MHz ARM9 processor. Q. Who Coined The Term Internet Of Things (iot) And When? Ans: The term Internet of Things is 16 years old. But the actual idea of connected devices had been around longer, at least since the 70s. Back then, the idea was often called “embedded internet” or “pervasive computing”. But the actual term “Internet of Things” was coined by Kevin Ashton in 1999 during his work at Procter&Gamble. Ashton who was working in supply chain optimization, wanted to attract senior management?s attention to a new exciting technology called RFID. Because the internet was the hottest new trend in 1999 and because it somehow made sense, he called his presentation “Internet of Things”. Even though Kevin grabbed the interest of some P&G executives, the term Internet of Things did not get widespread attention for the next 10 years. Q. How High-speed Internet Might Affect The Development And Implementation Of The Internet Of Things (iot)? Ans: Use and growth of the IoT can also be limited by the availability of access to high-speed Internet and advanced telecommunications services, commonly known as broadband, on which it depends. While many urban and suburban areas have access, that is not the case for many rural areas, for which private-sector providers may not find establishment of the required infrastructure profitable, and government programs may be limited. Q. How Internet Addresses (ipv6) Might Affect The Development And Implementation Of The Internet Of Things (iot)? Ans: A potential barrier to the development of IoT is the technical limitations of the version of the Internet Protocol (IP) that is used most widely. IP is the set of rules that computers use to send and receive information via the Internet, including the unique address that each connected device or object must have to communicate. Version 4 (IPv4) is currently in widest use. It can accommodate about four billion addresses, and it is close to saturation, with few new addresses available in many parts of the world. Some observers predict that Internet traffic will grow faster for IoT objects than any other kind of device over the next five years, with more than 25 billion IoT objects in use by 2020,76 and perhaps 50 billion devices altogether. IPv4 appears unlikely to meet that growing demand, even with the use of workarounds such as methods for sharing IP addresses. Version 6 (IPv6) allows for a huge increase in the number IP addresses. With IPv4, the maximum number of unique addresses, 4.2 billion, is not enough to provide even one address for each of the 7.3 billion people on Earth. IPv6, in contrast, will accommodate over 1038 addresses ? more than a trillion trillion per person. It is highly likely that to accommodate the anticipated growth in the numbers of Internet-connected objects, IPv6 will have to be implemented broadly. It has been available since 1999 but was not formally launched until 2012. In most countries, fewer than 10% of IP addresses were in IPv6 as of September 2015. Adoption is highest in some European countries and in the United States, where adoption has doubled in the past year to about 20%. Globally, adoption has doubled annually since 2011, to about 7% of addresses in mid-2015. While growth in adoption is expected to continue, it is not yet clear whether the rate of growth will be sufficient to accommodate the expected growth in the IoT. That will depend on a number of factors, including replacement of some older systems and applications that cannot handle IPv6 addresses, resolution of security issues associated with the transition, and availability of sufficient resources for deployment. Efforts to transition federal systems to IPv6 began more than a decade ago. According to estimates by NIST, adoption for public-facing services has been much greater within the federal government than within industry or academia. However, adoption varies substantially among agencies, and some data suggest that federal adoption plateaued in 2012. Data were not available for this report on domains that are not public-facing, and it is not clear whether adoption of IPv6 by federal agencies will affect their deployment of IoT applications. Q. What Is Industrial Internet Of Things (iot)? Ans: The Industrial Internet of Things (IIoT) is the use of Internet of Things (IoT) technologies in manufacturing. Also known as the Industrial Internet, IIoT incorporates machine learning and big data technology, harnessing the sensor data, machine-to-machine (M2M) communication and automation technologies that have existed in industrial settings for years. The driving philosophy behind the IIoT is that smart machines are better than humans at accurately, consistently capturing and communicating data. This data can enable companies to pick up on inefficiencies and problems sooner, saving time and money and supporting business intelligence efforts. In manufacturing specifically, IIoT holds great potential for quality control, sustainable and green practices, supply chain traceability and overall supply chain efficiency. Q. How Remote Updation Of Software Might Affect The Development And Implementation Of The Internet Of Things (iot)? Ans: Several other technical issues might impact the development and adoption of IoT. For example, if an object?s software cannot be readily updated in a secure manner, that could affect both function and security. Some observers have therefore recommended that smart objects have remote updating capabilities. However, such capabilities could have undesirable effects such as increasing power requirements of IoT objects or requiring additional security features to counter the risk of exploitation by hackers of the update features. Q. What Are The Industrial Applications For Wireless Sensor Networks Internet Of Things (iot)? Ans: You can easily and cheaply buy sensors that can measure a variety of variables that would be interesting in industrial applications, for example (and this is for sure not a complete list): light or sound intensity; voltage; current; pressure; temperature; rotational position; XYZ orientation; compass direction; acceleration; location; fluid flow rate and so on. These sensors can be interrogated by microcontroller, and data stored to memory card, or communicated in realtime to other systems via Bluetooth, Zigbee, WiFi , Ethernet, serial, USB, infared and so on. The inexpensive nature of these microcontrollers (for example Google for ESP8266 to see a WiFi-enabled microcontroller) means that you could deploy a large number of these in an industrial setting (even in hazardous environments) and gather data without a large capital investment, and without the worry of “what if it gets destroyed”. There must be so many industrial applications of this technology that it’s impossible to enumerate the possibilities. The limiting factor is really only “how can we process all of this data”. Q. Why Should We Care About The Industrial Iot? Ans: The Industrial IoT focuses strongly on intelligent cyber-physical systems. These systems comprise machines connected to computers that interpret, analyze and make decisions almost instantly, based on sensor data from many widely distributed sources. The Industrial IoT enables the smart system in your car that brakes automatically when it detects an obstacle in the road. It enables the patient monitoring system in hospitals to track everything from a patient’s heart rate to their medication intake. It enables a mining machine or space robot to safely and efficiently operate where humans can’t. The world is building more and more intelligent machines that interact with other machines, with their environments, with data centers and with humans. Q. What Is Wi-fi Protocol For Internet Of Things (iot)? Ans: Counted as the most mature wireless radio technology, Wi-Fi is predominant communication technology chosen for IoT applications. Already existing protocols like WPS make the integration of internet of things devices easier with the existing network. If we talk about transmission then Wi-Fi offers the best power-per-bit efficiency. However power consumption when devices are dormant is much higher with conventional Wi-Fi designs. The solution is provided by protocols like BLE and ZigBee that reduce power consumption by sensors when devices are dormant. Most important use of Wi-Fi is in the applications where IP stack compliance is needed and there is high data transmission. For instance in applications sharing audio, video or remote device controlling. As the prerequisites of internet of things are scaling up, companies are working on more integrated solutions. But even at present there are many solutions available for anyone who is trying to build up internet of things applications around the major three IoT components. Vendors Q. What Is Zigbee Protocol For Internet Of Things (iot)? Ans: ZigBee is a low power consuming IEEE 802.15.4(2003) standard based specification, ZigBee is a brain child of 16 automation companies. What makes it novel is the use of mesh networking which makes utilization of communication resources much more efficient. ZigBee based IoT nodes can connect to central controller making use of in-between nodes for propagating the data. It makes transmission and handling of data robust. Q. What Impacts Will The Internet Of Things (iot) Have On Manufacturing Sector? Ans: Integration of IoT technologies into manufacturing and supply chain logistics is predicted to have a transformative effect on the sector. The biggest impact may be realized in optimization of operations, making manufacturing processes more efficient. Efficiencies can be achieved by connecting components of factories to optimize production, but also by connecting components of inventory and shipping for supply chain optimization. Another application is predictive maintenance, which uses sensors to monitor machinery and factory infrastructure for damage. Resulting data can enable maintenance crews to replace parts before potentially dangerous and/or costly malfunctions occur. Q. Is The Internet Of Everything A Cisco Or Ibm Architecture Or Trademark? Ans: No. The Internet of Everything does not describe a specific architecture and is not solely owned by Cisco or IBM or any other company. Q. What Effect Will The Internet Of Things (iot) Have On Our Daily Lives? Ans: It already is having an impact. A recent report from Gartner says there will be 4.9bn connected things in 2015, rising to 25bn by 2020. What are these things, though? “Let us not focus on fridges,” says Will Franks, who sold Ubiquisys to Cisco for ?204m in 2013. Franks, who has just helped set up the Wireless IoT Forum, lists a number of consumer touch points. “Keeping track of possessions where insurance companies could reduce premiums,” he says. “Home control devices, maintenance checks for cars and white goods, healthcare and so on.” He doesn?t mention robots or Facebook. Robots will be connected too in a smart home of the future, at least according to the GSMA. And Facebook? According to The Register, it?s planning to launch software development kits (SDKs) for IoT apps and devices. Heating control through systems such as Nest and Hive are just the start, it seems. Q. What Is Difference Between Wireless Sensor Network (wsn) And Internet Of Things (iot) Network (sensor)? Ans: About WSN: Wireless sensor network is the foundation of IoT applications. WSN is the network of motes, formed to observe, to study or to monitor physical parameters of desired application. For example – Motes deployed in Agriculture land, monitor Temp-Humidity or even soil moisture, who gathers data and with perfect data analysis produce results about crop yields – quality or quantity. About IoT: IoT is the network of physical objects controlled and monitored over internet. Now just as WSN, in IoT application you will encounter the monitoring of physical parameters. But desired outcomes are little different. IoT is more about M2M, it is more about bringing smartness into daily objects. For example – Device hooked to your Thermostat monitors surrounding temperature and adjust it to most preferred setting for Q. Give Few Examples Of The Impact Of Internet Of Things (iot) On Our Lives? Ans: To put things simply any object that can be connected will be connected by the IoT. This might not make sense for you on the forefront but it is of high value. With interconnected devices you can better arrange your life and be more productive, safer, smarter and informed than ever before. For instance how easy it will be for you to start your day if your alarm clock is not only able to wake you up but also able to communicate with your brewer to inform it that you are awake at the same time notifies your geezer to start water heating. Or you wearable wrist health band keeps track of your vitals to inform you when you are most productive during the day. These are just few examples but applications of internet of things are numerous. On large scale transportation, healthcare, defense, environment monitoring, manufacturing and every other field you can imagine of can be benefited from IoT. It is very hard to conceive the whole application domain of internet of things at the moment but you can clearly understand why it is such an interesting and hot topic at the moment. Q. How Safety Issue Might Affect The Development And Implementation Of The Internet Of Things (iot), Especially In Usa? Ans: Given that smart objects can be used both to monitor conditions and to control machinery, the IoT has broad implications for safety, with respect to both improvements and risks. For example, objects embedded in pipelines can monitor both the condition of the equipment and the flow of contents. Among other benefits, that can help both to expedite shutoffs in the event of leaks and to prevent them through predictive maintenance. Connected vehicles can help reduce vehicle collisions through crash avoidance technologies and other applications.110 Wireless medical devices can improve patient safety by permitting remote monitoring and facilitating adjustments in care. However, given the complexities involved in some applications of IoT, malfunctions might in some instances result in catastrophic system failures, creating significant safety risks, such as flooding from dams or levees. In addition, hackers could potentially cause malfunctions of devices such as insulin pumps or automobiles, potentially creating significant safety risks. Contact for more on IOT Online Training
Continue reading
OpenStack Interview Questions
Q.What You Mean By Tenant And Role Regarding Openstack ? Ans: In OpenStack, the authorization level of the user is called role and the group of users is called tenant. Q. What Types Of Storage Openstack Compute Provides? Ans: OpenStack provides two classes of block storage: Volume Storage: It is persistent and not dependent on any particular instance. Volumes are created by users and within Quota Ephemeral Storage: It is associated with a single instance.They effectively disappear when a virtual machine is terminated. Q. Define Openstack? Ans: OpenStack is a set of software tools for building and managing cloud computing platforms for public and private clouds. Q. Give An Overview Of Openstack Services? Ans: OpenStack offers services like : Glance: Manages images in different formats Ceilometer: Openstack for billing Cinder: Provides persistent block storage Neutron: Enables users to create and attach interfaces to networks Nova: Provides instances on user’s demand Swift: Storage platform integrated directly into applications Heat: Allows automated infrastructure deployment Keystone: Provides authorization and authentication for users Q. What Are The Basic Functions Of Identity Service In Openstack? Ans: The basic functions of Identity Service is: Service Catalog: It provides a catalog of available services with their API endpoints User Management: It tracks the users and their permissions Q. Explain Modular Architecture Of Openstack? Ans: The three components that make modular architecture for OpenStack are: OpenStack Compute: For managing large networks of the virtual machine. Image Service: The delivery service provides discovery and registration for virtual disk images. OpenStack Object Storage: A storage system that provides support for both block storage and object storage. Q. Explain What Hypervisor Is And What Type Of Hypervisor Does Openstack Supports? Ans: In virtualization technology, hypervisor is a software program that manages multiple operating systems (or multiple instances of the same operating system) on a single computer system. The types of hypervisor that OpenStack supports are : KVM Containers Xen and HyperV VMware Q. What Is The Meaning Of Term “cinder” In Openstack Service? Ans: Cinder is used for handling persistent storage in OpenStack.The one that is utilized by default is LVM, called Cinder-Volumes. Q. What Is The Command Used For Unpause And Pause An Instance? Ans: To unpause an instance – $ nova unpause INSTANCE_NAME To pause an instance – $ nova pause INSTANCE_NAME Q. Explain How You Can Transfer Volume From One Owner To Another In Openstack? Ans: You can transfer a volume from one owner to another by using the command cinder transfer*. Q. What Are The Main Components Of Identity User Management? Ans: Users: It is a digital representation of a person, service or system who uses OpenStack cloud services Roles: A role includes a set of rights and privileges. A role determines what operations a user is permitted to perform in a given tenant Tenants: A container used to group or isolate resource or identity objects. Depending on service operator a tenant may map to a customer, account, organization or project. Q. Mention What Is The Command To Remove Network Interface From Bare-metal Node? Ans: To remove network interface from bare-metal node command used is bare-metal – interface remove. Q. Explain What Is The Function Of Cinder Scheduler? Ans: Cinder Scheduler or routing volume create requests to the appropriate volume service Q. List Out The Storage Locations For Vm Images In Openstack? Ans: OpenStack Object Storage : Filesystem S3 HTTP RBD or Rados Block Device GridFS Q. Explain About Openstack Python Sdk? Ans: For writing python scripts and managing in Openstack cloud, SDK (Software Development Kit) is used. The SDK implements Python binding to the OpenStack API, which enables you to achieve automation tasks in Python by making calls on Python objects instead of making REST calls directly. Q. Explain What Is Token In Openstack? Ans: Token is an alpha-numeric string which allows access to a certain set of services depending upon the access level of the user Q. Explain What Is Cells In Openstack? Ans: Cells functionality enables you to scale an OpenStack Compute cloud in a more simplistic way. When this functionality is enabled, the hosts in an OpenStack Compute cloud are partitioned into group called cells. Cells are configured as trees. Q. For Networking, What Hardware Is Used In Openstack? Ans: In OpenStack, networking is done in the following ways : Ports Vendor Plugins Networks Routers Subnets Q. Mention What Are The Networking Options Used In OpenStack? Ans: The networking options used in OpenStack are: VLAN Network Manager: Compute creates a VLAN and bridge; DHCP server is started for each VLAN to pass out IP addresses to VM instances. Flat DHCP Network Manager: IP addresses for VM instances are fetched from the subnet specified by the network administrator Flat Network Manager: IP addresses for VM instances are fetched from the subnet, and then injected into the image on launch Q. What Is The Command To Manage Floating Ip Addresses In OpenStack? Ans: Nova floating-ip-* Q. What Is The Meaning Of Term “flavor” In OpenStack? Ans: A flavor is an available hardware configuration for a server, which defines the size of a virtual server that can be launched. Q. What Is Bare-metal Node And What Does It Comprised Of? Ans: It gives access to control bare metal driver, through which user can control physical hardware resources on the same network. Bare metal node is comprised of two separate components Bare metal node Operating System: It is a base software, which runs on each node in the cluster. Bare metal node Orchestrator: It’s a management software, which acts as a dispatcher to all nodes in the cluster. Q. What Is The Command Used To List Ip Address Information? Ans: $ nova floating-ip-pool-list Q. What Are Functions Of “nova” ? Ans: Instance life cycle management Management of compute resources Networking and Authorization REST-based API Asynchronous eventually consistent communication Hypervisor agnostic : support for Xen, XenServer/XCP, KVM, UML, VMware vSphere and Hyper-V Q. What Are Components Of Openstack Compute ? Ans: Nova Cloud Fabric is composed of the following major components: API Server (nova-api) Message Queue (rabbit-mq server) Compute Workers (nova-compute) Network Controller (nova-network) Volume Worker (nova-volume) Scheduler (nova-scheduler) Q. What Is Job Of Api-server ? Ans: The API Server provides an interface for the outside world to interact with the cloud infrastructure. Q. What Is Rabbit Mq Server ? Ans: OpenStack communicates among themselves using the message queue via AMQP. Q. What Are Functions And Features Of Swift ? Ans: Storage of large sized objects Storage of large number of objects Data Redundancy Archival capabilities – Work with large datasets Data container for virtual machines and cloud apps Media Streaming capabilities Secure storage of objects Extreme scalability Backup and archival Q. What Do You Understand By Horizon ? Ans: Horizon the web based dashboard can be used to manage /administer OpenStack services. Q. What Are Commands To Generate Keypairs ? Ans: ssh-keygen cd .ssh nova keypair-add –pub_key id_rsa.pub mykey Q. How You Can View The Rules ? Ans: Rules can be viewed with the command: $ nova secgroup-list-rules myservers Q. Give An Example Where Logs Help In Openstack Security ? Ans: For instance, analyzing the access logs of Identity service or its replacement authentication system would alert us to failed logins, frequency, origin IP, whether the events are restricted to select accounts and other pertinent information. Log analysis supports detection. Q. Why Compliance Is Required In Openstack ? Ans: Compliance means adhering to regulations, specifications, standards and laws. An OpenStack deployment may require compliance activities for many purposes, such as regulatory and legal requirements, customer need, privacy considerations, and security best practices. The Compliance function is important for the business and its customers. Q. What Are Data Privacy Concerns In Openstack, How Those Can Be Remediated? Ans: Data residency: Concerns over who owns data in the cloud and whether the cloud operator can be ultimately trusted as a custodian of this data have been significant issues in the past. Data disposal:– Best practices suggest that the operator sanitize cloud system media (digital and non-digital) prior to disposal, release out of organization control or release for reuse. Data not securely erased:- This may be remediated with database and/or system configuration for auto vacuuming and periodic free-space wiping. Instance memory scrubbing, Cinder volume data, Image service delay delete feature. Q. What Is Sanitization Process ? Ans: The sanitization process removes information from the media such that the information cannot be retrieved or reconstructed. Sanitization techniques, including clearing, purging, cryptographic erase, and destruction, prevent the disclosure of information to unauthorized individuals when such media is reused or released for disposal. Q. How To Create A Normal User In Openstack ? Ans: sudo nova-manage user create user-name Q. How You Assign A Project To A User ? Ans: sudo nova-manage project add –project=project_name –user=user_name Q. How You Can Remove A Rule From Security Group ? Ans: nova secgroup-delete-rule webserver tcp 443 443 0.0.0.0/0 Q. How To Display Images Using Nova Client ? Answer : nova image-list Q. How To See A List Of Roles And The Associated Ids In Our Environment ? Ans: keystone role-list Q. What Is Job Of User Crud ? Ans: The user CRUD filter enables users to use a HTTP PATCH to change their own password. Q. Where Caching Configuration Is Stored ? Ans: The majority of the caching configuration options are set in the section of the keystone.conf file. Q. What Is Alarm In Openstack ? Ans: Alarms provide user-oriented Monitoring-as-a-Service for resources running on OpenStack. This type of monitoring ensures you can automatically scale in or out a group of instances through the Orchestration module, but you can also use alarms for general-purpose awareness of your cloud resources’ health. Q. How To Migrate Running Instances From One Openstack Compute Server To Another Openstack Compute Server ? Ans: Check the ID of the instance to be migrated Check the information associated with the instance Select the compute node the instance will be migrated to. Check that Host has enough resources for migration Migrate the instance using the $ nova live-migration SERVER HOST_NAME command. Q. How You Can Change Behavior Of Dhcp Server ? Ans: The behavior of dnsmasq can be customized by creating a dnsmasq configuration file Q. What Is Orchestration ? Ans: Orchestration is an orchestration engine that provides the possibility to launch multiple composite cloud applications based on templates in the form of text files that can be treated like code. Q. What Is Use Of Account Reaper ? Ans: In the background, the account reaper removes data from the deleted accounts. Q. What You Will Do In Case Of Drive Failure ? Ans: In the event that a drive has failed, the first step is to make sure the drive is unmounted. This will make it easier for Object Storage to work around the failure until it has been resolved. If the drive is going to be replaced immediately, then it is just best to replace the drive, format it, remount it, and let replication fill it up. Q. What You Will Do In Case Of Server Failure ? Ans: If a server is having hardware issues, it is a good idea to make sure the Object Storage services are not running. This will allow Object Storage to work around the failure while you troubleshoot. If the server just needs a reboot, or a small amount of work that should only last a couple of hours, then it is probably best to let Object Storage work around the failure and get the machine fixed and back online. When the machine comes back online, replication will make sure that anything that is missing during the downtime will get updated. If you cannot replace the drive immediately, then it is best to leave it unmounted, and remove the drive from the ring. This will allow all the replicas that were on that drive to be replicated elsewhere until the drive is replaced. Once the drive is replaced, it can be re-added to the ring. Q. How You Will Install Dhcp Agent ? Ans: # apt-get install neutron-dhcp-agent Q. Who Is Openstack For? Ans: OpenStack is for service providers, enterprises, government agencies and academic institutions that want to build public or private clouds. Industries range from IT & telco to SaaS and eCommerce to finance and healthcare. You can read more about how organizations are becoming agile, reducing costs and avoiding vendor lock-in with OpenStack. Q. What Does It Mean For The Cloud Ecosystem? Ans: Wide adoption of an open-source, open-standards cloud should be huge for everyone. It means customers won’t have to fear lock-in and technology companies can participate in a growing market that spans cloud providers. Companies are already using OpenStack to provide public clouds, support, training and system integration services and hardware and software products. A great analogy comes from the early days of the Internet: the transition away from fractured, proprietary flavors of UNIX toward open-source Linux. An open cloud stands to provide the same benefits for large-scale cloud computing that the Linux standard provided inside the server. Q. Mention What Are The Three Components That Make Modular Architecture Of Openstack? Ans: The three components that make modular architecture for OpenStack are: OpenStack Compute: For managing large networks of the virtual machine OpenStack Object Storage: A storage system that provides support for both block storage and object storage Image Service: The delivery service provides discovery and registration for virtual disk images Q. What Is Identity Service In Openstack? Ans: Keystone is the most important and preferred Identity Service in OpenStack and executes the complete OpenStack Identity API. Q. How Can You Create A Token? Ans: Users first need to authenticate their Keystone credentials to create a token. Contact for more on OpenStack Online Training Write A Review
Continue reading