ITIM by ncrlifeline

VIEWS: 39 PAGES: 3

									           IEC College of Engineering and Technology,
                          Greater Noida

ASSIGNMENT NO 1:

(a) Define the term IT. List any ten areas of applications of Information technology.
(b) Explain Hardware and Software with five examples.
(c ) Explain the following
(i) Network (ii) Internet (iii) Intranet (iv) TCP/IP (v) Router
(d) Explain any five business challenges to manage IT Infrastructure.
(e) Explain the difference between Service level Management and service support system.
(f) Define the term Information and technology. List any five characteristics of computer.
(g) Explain various types of printers in brief.
(h) Explain the following
(i) Micro Computer (ii)Server (iii)Cloud Computing (iv)Grid Computing (v) PDA
(j) Explain any five factors to consider in designing IT Infrastructure.
(k) Explain the ITIL v3 framework in brief..

ASSIGNMENT NO 2:

(i) Explain the following terms
(a) SLR (b) SQP (c) SIP (d) SSS (e) MTBF (f) MTTR
(ii) Explain the process flow of capacity management system.
(iii) Explain the term charging and various charging policy in IT infrastructure.
(iv) Explain the various activities of availability management.
(v) Explain the following terms
(a) SLA (b) OLA (c) UC
(vi) Explain any five benefits of capacity management system.
(vii) Explain any five key points of financial management systems.
(viii) Explain the five major benefits of availability management.

ASSIGNMENT NO 3:

(a) Explain the difference between incident and problem management.
(b) Explain the following terms
(i) CMDB (ii) CI (iii) CAB (iv) RFC (v) DSL
(c) Explain the benefits of release management.
(d) Explain the difference between SAN & NAS.
(e) Explain disaster recovery in brief.
(f) Explain the benefits of service desk.
(g) Explain the various types of categorization for incident management.
(h) Explain the process of change management.
(i) Explain any two methods for backup for storage management..
(j) Explain the benefits of Bare Machine Recovery.
ASSIGNMENT NO 4:

(a) Explain the single sign on process in detail.
(b) Describe various data storage methods and tools.
(c) Explain the various methods for disaster recovery management
(d) Explain the various security threats and benefits of computer security management.
(e) Describe the role of firewall in network security and also discuss the various types of firewall
in detail.
(f) Explain the difference between Identity management and Access Management.


ASSIGNMENT NO 5:

(a) Explain various cyber ethics and intellectual property in detail.
(b) Explain various types of cyber crime and the method to prevent cyber crime.
(c) Explain the following
(i) Smart Card (ii) Expert System (iii) EDI
(d) Explain intellectual property rights in detail.
(e) Explain computer forensic in detail.
(f) Explain expert system. Benefits and drawbacks of expert system in detail




.
IEC College of Engineering & Technology, Greater Noida
                      IT INFRASTRUCTURE MANAGEMENT
                                      MODEL PAPER-1
                                     By Sharad Maheshwari

Q.1 Attempt any four questions (5 X 4 = 20)
(a) Define the term IT. List any ten areas of applications of Information technology.
(b) Explain Hardware and Software with five examples.
(c ) Explain the following
(i) Network (ii) Internet (iii) Intranet (iv) TCP/IP (v) Router
(d) Explain any five business challenges to manage IT Infrastructure.
(e) Explain the difference between Service level Management and service support system.

Q.2 Attempt any four questions (5 X 4 = 20)
(i) Explain the following terms
(a) SLA (b) OLA (c) UC
(b) Explain any five benefits of capacity management system.
(b) Explain any five key points of financial management systems.
(d) Explain the five major benefits of availability management.

Q.3 Attempt any four questions (5 X 4 = 20)
(a) Explain the difference between incident and problem management.
(b) Explain the following terms
(i) CMDB (ii) CI (iii) CAB (iv) RFC (v) DSL
(c) Explain the benefits of release management.
(d) Explain the difference between SAN & NAS.
(e) Explain disaster recovery in brief.

Q.4 Attempt any two questions (10 X 2 = 20)
(a) Explain the various security threats and benefits of computer security management.
(b) Describe the role of firewall in network security and also discuss the various types of firewall
in detail.
(c) Explain the difference between Identity management and Access Management.

Q.5 Attempt any two questions (10 X 2 = 20)
(a) Explain various cyber ethics and intellectual property in detail.
(b) Explain various types of cyber crime and the method to prevent cyber crime.
(c) Explain the following
(i) Smart Card (ii) Expert System (iii) EDI

								
To top