1. TRADITIONAL COMPUTING MODEL :- | |||
1.1 Mainframe :- 1.1.1 Definition 1.1.2 Limitations | 1.2 PC :- 1.2.1 Definition 1.2.2 Advantages | 1.3 File sharing :- 1.3.1 Definition 1.3.2 Advantages 1.3.3 Disadvantages | |
2. CLIENT-SERVER MODEL :- | |||
2.1 Definition 2.2 Client-Server vs. Traditional File Sharing Model 2.3 Components 2.4 Client-Server architecture types :- 2.4.1 Fat-Client or 2-Tier structure 2.4.2 Fat-Server or 3-Tier structure | 2.5 Characteristics :- 2.5.1 Client provides 2.5.2 Server provides 2.5.3 Both support :- A) Jointly B) Separately 2.6 Reasons of switching to Client-Server 2.7 Examples of client-server 2.8 Benefits :- 2.8.1 Cost-effectiveness in 2.8.2 Satisfied people are 2.8.3 Tech-ease in | 2.9 Control and Security :- 2.9.1 Control storage drives 2.9.2 Network control 2.9.3 Access control 2.10 Risks and issues :- 2.10.1 Operational 2.10.2 Security 2.10.3 Technological 2.10.4 Costs 2.10.5 Contentment | |
3. SERVER-CENTRIC MODEL :- 3.1 Definition 3.2 Benefits 3.3 Facilitates |
06. Enabling Technologies
Comments
Place your order..
Subscribe...
Chapters...
- 01. Basic Concepts
- 02. Transaction Processing System
- 03. Management Information System
- 04. System approach and Decision making
- 05.A. Decision Support System
- 05.B. Executive Information / Support System
- 06. Enabling Technologies
- 07.A. System Development Life Cycle
- 07.B. SDLC - Stage (I) - Preliminary Investigation
- 07.C. SDLC - Stage (II) - Analysis
- 08. SDLC - Stage (III) - System Design
- 09.A. SDLC - Stage (IV) - System Acquisition
- 09.B. SDLC - Stage (V) - Software Development of Program Development
- 09.C. SDLC - Stage (VI) - System Testing
- 10.A. SDLC - Stage (VII) - System Implementation
- 10.B. SDLC1 - Stage (VIII) - System Maintenance
- 11. Design of Computerised Commercial Applications
- 12. Enterprise Resource Planning
- 13. General Controls in EDP Setup
- 14. Application Controls in EDP Setup
- 15. Detection of Computer Frauds
- 16. Information Techonology Act 2000
- 17. Information System Audit
- 18. Information Security
- 19.A. Computer-aided Software Engineering Tools
- 19.B. Analysis of Financial Statements using Digital Technology
Quick reference ...
- Abbreviations (1)
- Categories (2)
- Chapter Map (25)
- Characteristics (1)
- Definition (7)
Post a Comment