SlideShare a Scribd company logo
1 of 3
1) Mention what is the basic role of a computer system analyst?
• Provide assistance to users solving computer related problems
• Test, maintain and monitor systems and computer programs
• Co-ordinate and connect the computer systems within an organization to increase compatibility
• Modify system to improve work flow
• Training and assisting staff and users to work with computer systems
• Recommend new equipment or software packages
• Determine computer software or hardware required in an organization
• Good understanding of company’s database
• Publish weekly report which identify progress made towards implementing monitoring by application
and by environment
2) Mention what are the skills required to become a computer analyst?
• Good learning and listening skills
• Complex problem-solving abilities
• Time management
• Troubleshooting
• Good knowledge of software application and networking
• Quality control analysis
• Critical thinking
3) Mention what is DHCP server?
DHCP server stands for dynamic host configuration protocol; that is designed as the functional extension
of the Bootstrap network Protocol. It is a server or client protocol that automatically caters an internet
protocol (IP) host with its IP address and other configuration as the subnet mask and default gateway.
4) Mention why to use DHCP server?
DHCP server allowed entire process to be auto-mated and managed centrally. DHCP server maintains the
IP addresses in bulk and assign an address to any DHCP enabled client when he switch on to the
network. As such the addresses are dynamic rather than static, so the addresses which are no more in use
are automatically return to the bulk for re-allocation.
5) Mention what is sub-netting?
Sub-netting is the procedure of partitioning a single TCP/IP network into a number of distinct network
segments called subnets.
6) Mention what computer systemanalyst document?
Computer system analyst can document what is going in current systems, and what can be expected in
systems that have not been built yet. Documenting is often done in collaboration with technical writers,
system designers and system architects. List of thing that computer analysts document include
• User Scenarios
• Functional activities
• Data flows
• Classes
• Interfaces between Systems
7) Mention what are the types of requirements that a systemanalyst should gather and analyze?
System analyst should gather requirements like
• Technical requirements: It includes the detail about what the system is built, including which
language it will be programmed in, what standards are to maintained, etc.
• Functional requirements: It includes the detail about what needs to be delivered, which is generally
read by software engineers, project managers and business analyst
8) Explain what is spoofed packet?
Spoofed packet is an internet protocol packet that is created from a fake IP address, but behaves as a
legitimate and authenticated sender. It is usually used in denial of service attacks and are used to defeat
the security mechanism of the network and bye-pass service which are based on IP authentication.
9) Mention what are some organization software usage policies that computer analyst can
implement in an organization?
• Disallowing the use of external drives for employees to access organization’s data
• Not allowing to download pirated software and electronic files that are copyrighted or unauthenticated
• No sharing of confidential material, proprietary information or trade secrets outside the organization
• Not allowing them to hack into unauthorized websites or download contents
• Not allowing them to post or send information that is offensive to the company or organization
• Preventing downloading of any malicious software onto the company network
• Not allowing employees to pass off personal views as representing those of the organization
10) Mention what does the software audit includes?
Software audit includes
• Looking into an employee’s computer system for violation of security and company’s policy
• Regular audits of all servers and computers to check whether they are updated in streamlined with all
software licenses
• Adapting audit system that is least bothering to employee and their task
• Apart from regular audits, random audit should be done to check whether there is any deletion or
addition of software to the system
11) Mention what are the steps for record keeping for software?
A register should be maintained that includes the detail of software like
• Software’s publisher name and title
• Source and date of software acquisition
• Location of the software installation as well as the serial number of the hardware on which copy of the
software is installed
• Location and existence of back-up copies
• Serial number of software products
12) Mention how to do the registration of software?
• When an organization receives purchased software, the designated department must receive the
software first to complete registration and inventory requirement before installations
• And in the event the software is shrink-wrapped, the software receiving department must complete the
registration forms and return it to the software publisher
• Software must be registered on the name of the organization and not an individual user
13) Mention what the difference is between SSH and SSL?
SSL and SSH both are special encryption and protocol technologies used to connect two computers
• SSH: SSH stands for “Secure Shell” which commonly uses port 22 to connect your system on another
system via internet. It is often used by network administrators as a remote login or remote control to
manage their business servers.
• SSL: SSL stands for “Secure Sockets Layer” it commonly uses port 443 to connect your system to a
secure system on the Internet. It is often used for transmitting information like tax, banking, credit card,
personal information to a business server somewhere.

More Related Content

What's hot

CNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsSam Bowne
 
Monitoring active-directory
Monitoring active-directoryMonitoring active-directory
Monitoring active-directoryPrince JabaKumar
 
Leading American Entertainment Company implements OpManager
Leading American Entertainment Company implements OpManagerLeading American Entertainment Company implements OpManager
Leading American Entertainment Company implements OpManagerManageEngine, Zoho Corporation
 
New OpManager v12
New OpManager v12New OpManager v12
New OpManager v12Inuit AB
 
OpManager training - Device discovery and classification.
OpManager training - Device discovery and classification.OpManager training - Device discovery and classification.
OpManager training - Device discovery and classification.ManageEngine, Zoho Corporation
 
Introduction to Gravitational Teleport
Introduction to Gravitational TeleportIntroduction to Gravitational Teleport
Introduction to Gravitational TeleportTeleport
 
Security Framework from SANS
Security Framework from SANSSecurity Framework from SANS
Security Framework from SANSJeffrey Reed
 
Server and application monitoring webinars [Applications Manager] - Part 4
Server and application monitoring webinars [Applications Manager] - Part 4Server and application monitoring webinars [Applications Manager] - Part 4
Server and application monitoring webinars [Applications Manager] - Part 4ManageEngine, Zoho Corporation
 
First Responders Course - Session 4 - Forensic Readiness [2004]
First Responders Course - Session 4 - Forensic Readiness [2004]First Responders Course - Session 4 - Forensic Readiness [2004]
First Responders Course - Session 4 - Forensic Readiness [2004]Phil Huggins FBCS CITP
 
Honeywell Cybersecurity
Honeywell CybersecurityHoneywell Cybersecurity
Honeywell Cybersecuritykphodel
 
Configlets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration ManagerConfiglets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration ManagerManageEngine, Zoho Corporation
 

What's hot (20)

Opmanager technical overview
Opmanager technical overviewOpmanager technical overview
Opmanager technical overview
 
CNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM Operations
 
Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)
 
Monitoring active-directory
Monitoring active-directoryMonitoring active-directory
Monitoring active-directory
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 
Leading American Entertainment Company implements OpManager
Leading American Entertainment Company implements OpManagerLeading American Entertainment Company implements OpManager
Leading American Entertainment Company implements OpManager
 
Latest presentation
Latest presentationLatest presentation
Latest presentation
 
New OpManager v12
New OpManager v12New OpManager v12
New OpManager v12
 
OpManager training - Device discovery and classification.
OpManager training - Device discovery and classification.OpManager training - Device discovery and classification.
OpManager training - Device discovery and classification.
 
Hp open view
Hp open viewHp open view
Hp open view
 
Introduction to Gravitational Teleport
Introduction to Gravitational TeleportIntroduction to Gravitational Teleport
Introduction to Gravitational Teleport
 
Security Framework from SANS
Security Framework from SANSSecurity Framework from SANS
Security Framework from SANS
 
Firewall
FirewallFirewall
Firewall
 
Server and application monitoring webinars [Applications Manager] - Part 4
Server and application monitoring webinars [Applications Manager] - Part 4Server and application monitoring webinars [Applications Manager] - Part 4
Server and application monitoring webinars [Applications Manager] - Part 4
 
Hp open view(hp ov)
Hp open view(hp ov)Hp open view(hp ov)
Hp open view(hp ov)
 
First Responders Course - Session 4 - Forensic Readiness [2004]
First Responders Course - Session 4 - Forensic Readiness [2004]First Responders Course - Session 4 - Forensic Readiness [2004]
First Responders Course - Session 4 - Forensic Readiness [2004]
 
Honeywell Cybersecurity
Honeywell CybersecurityHoneywell Cybersecurity
Honeywell Cybersecurity
 
Enterprise network management
Enterprise network managementEnterprise network management
Enterprise network management
 
5 Ways NCM Can Save You From A Disaster
5 Ways NCM Can Save You From A Disaster5 Ways NCM Can Save You From A Disaster
5 Ways NCM Can Save You From A Disaster
 
Configlets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration ManagerConfiglets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration Manager
 

Viewers also liked

Front end developer (.net)
Front end developer (.net) Front end developer (.net)
Front end developer (.net) Iuliana Gultur
 
IT system analyst
IT system analystIT system analyst
IT system analystSF11
 
Role of Business Analyst in IT industry
Role of Business Analyst in IT industryRole of Business Analyst in IT industry
Role of Business Analyst in IT industrySatyaprakash Almi
 
Sistem analizi-1
Sistem analizi-1Sistem analizi-1
Sistem analizi-1warlock76
 
System Design and Analysis 1
System Design and Analysis 1System Design and Analysis 1
System Design and Analysis 1Boeun Tim
 
Role of system analyst
Role of system analystRole of system analyst
Role of system analystprachi90501
 
A project report on online trading
A project report on online tradingA project report on online trading
A project report on online tradingKumar Gaurav
 
System Analysis And Design Management Information System
System Analysis And Design Management Information SystemSystem Analysis And Design Management Information System
System Analysis And Design Management Information Systemnayanav
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and DesignAamir Abbas
 

Viewers also liked (10)

Role of system analyst
Role of system analystRole of system analyst
Role of system analyst
 
Front end developer (.net)
Front end developer (.net) Front end developer (.net)
Front end developer (.net)
 
IT system analyst
IT system analystIT system analyst
IT system analyst
 
Role of Business Analyst in IT industry
Role of Business Analyst in IT industryRole of Business Analyst in IT industry
Role of Business Analyst in IT industry
 
Sistem analizi-1
Sistem analizi-1Sistem analizi-1
Sistem analizi-1
 
System Design and Analysis 1
System Design and Analysis 1System Design and Analysis 1
System Design and Analysis 1
 
Role of system analyst
Role of system analystRole of system analyst
Role of system analyst
 
A project report on online trading
A project report on online tradingA project report on online trading
A project report on online trading
 
System Analysis And Design Management Information System
System Analysis And Design Management Information SystemSystem Analysis And Design Management Information System
System Analysis And Design Management Information System
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 

Similar to System analyst

Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Deployability
DeployabilityDeployability
DeployabilityLen Bass
 
Dynamic datacenter planning and design
Dynamic datacenter   planning and designDynamic datacenter   planning and design
Dynamic datacenter planning and designYeonki Choi
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxAngel Garcia
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdfPhiliphaHaldline
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptxssuserf7cd2b
 
Railway Reservation System - Software Engineering
Railway Reservation System - Software EngineeringRailway Reservation System - Software Engineering
Railway Reservation System - Software EngineeringLalit Pal
 
Chapter 7 Development Strategies
Chapter 7 Development StrategiesChapter 7 Development Strategies
Chapter 7 Development StrategiesMeryl C
 
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxTckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxAlfredObia1
 
Introduction to dev ops
Introduction to dev opsIntroduction to dev ops
Introduction to dev opsLen Bass
 
Diksha sda presentation
Diksha sda presentationDiksha sda presentation
Diksha sda presentationdikshagupta111
 
Software engineering lecture 1
Software engineering  lecture 1Software engineering  lecture 1
Software engineering lecture 1JusperKato
 
Modern Software Licensing: New Trends and Options
Modern Software Licensing: New Trends and OptionsModern Software Licensing: New Trends and Options
Modern Software Licensing: New Trends and Optionslisaabe
 
Agile testing for embedded software development
Agile testing for embedded software developmentAgile testing for embedded software development
Agile testing for embedded software developmentTom Stiehm
 
Crime Reporting System.pptx
Crime Reporting System.pptxCrime Reporting System.pptx
Crime Reporting System.pptxPenilVora
 

Similar to System analyst (20)

Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Deployability
DeployabilityDeployability
Deployability
 
Dynamic datacenter planning and design
Dynamic datacenter   planning and designDynamic datacenter   planning and design
Dynamic datacenter planning and design
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
 
Railway Reservation System - Software Engineering
Railway Reservation System - Software EngineeringRailway Reservation System - Software Engineering
Railway Reservation System - Software Engineering
 
Chapter 7 Development Strategies
Chapter 7 Development StrategiesChapter 7 Development Strategies
Chapter 7 Development Strategies
 
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxTckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
 
1 - Introduction.ppt
1 - Introduction.ppt1 - Introduction.ppt
1 - Introduction.ppt
 
Introduction to dev ops
Introduction to dev opsIntroduction to dev ops
Introduction to dev ops
 
Diksha sda presentation
Diksha sda presentationDiksha sda presentation
Diksha sda presentation
 
Software engineering lecture 1
Software engineering  lecture 1Software engineering  lecture 1
Software engineering lecture 1
 
Modern Software Licensing: New Trends and Options
Modern Software Licensing: New Trends and OptionsModern Software Licensing: New Trends and Options
Modern Software Licensing: New Trends and Options
 
Agile testing for embedded software development
Agile testing for embedded software developmentAgile testing for embedded software development
Agile testing for embedded software development
 
Crime Reporting System.pptx
Crime Reporting System.pptxCrime Reporting System.pptx
Crime Reporting System.pptx
 
A075434624
A075434624A075434624
A075434624
 

Recently uploaded

Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
Data Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxData Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxFurkanTasci3
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...Suhani Kapoor
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 

Recently uploaded (20)

Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
Data Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxData Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptx
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 

System analyst

  • 1. 1) Mention what is the basic role of a computer system analyst? • Provide assistance to users solving computer related problems • Test, maintain and monitor systems and computer programs • Co-ordinate and connect the computer systems within an organization to increase compatibility • Modify system to improve work flow • Training and assisting staff and users to work with computer systems • Recommend new equipment or software packages • Determine computer software or hardware required in an organization • Good understanding of company’s database • Publish weekly report which identify progress made towards implementing monitoring by application and by environment 2) Mention what are the skills required to become a computer analyst? • Good learning and listening skills • Complex problem-solving abilities • Time management • Troubleshooting • Good knowledge of software application and networking • Quality control analysis • Critical thinking 3) Mention what is DHCP server? DHCP server stands for dynamic host configuration protocol; that is designed as the functional extension of the Bootstrap network Protocol. It is a server or client protocol that automatically caters an internet protocol (IP) host with its IP address and other configuration as the subnet mask and default gateway. 4) Mention why to use DHCP server? DHCP server allowed entire process to be auto-mated and managed centrally. DHCP server maintains the IP addresses in bulk and assign an address to any DHCP enabled client when he switch on to the network. As such the addresses are dynamic rather than static, so the addresses which are no more in use are automatically return to the bulk for re-allocation. 5) Mention what is sub-netting? Sub-netting is the procedure of partitioning a single TCP/IP network into a number of distinct network segments called subnets. 6) Mention what computer systemanalyst document? Computer system analyst can document what is going in current systems, and what can be expected in systems that have not been built yet. Documenting is often done in collaboration with technical writers, system designers and system architects. List of thing that computer analysts document include • User Scenarios • Functional activities • Data flows • Classes • Interfaces between Systems
  • 2. 7) Mention what are the types of requirements that a systemanalyst should gather and analyze? System analyst should gather requirements like • Technical requirements: It includes the detail about what the system is built, including which language it will be programmed in, what standards are to maintained, etc. • Functional requirements: It includes the detail about what needs to be delivered, which is generally read by software engineers, project managers and business analyst 8) Explain what is spoofed packet? Spoofed packet is an internet protocol packet that is created from a fake IP address, but behaves as a legitimate and authenticated sender. It is usually used in denial of service attacks and are used to defeat the security mechanism of the network and bye-pass service which are based on IP authentication. 9) Mention what are some organization software usage policies that computer analyst can implement in an organization? • Disallowing the use of external drives for employees to access organization’s data • Not allowing to download pirated software and electronic files that are copyrighted or unauthenticated • No sharing of confidential material, proprietary information or trade secrets outside the organization • Not allowing them to hack into unauthorized websites or download contents • Not allowing them to post or send information that is offensive to the company or organization • Preventing downloading of any malicious software onto the company network • Not allowing employees to pass off personal views as representing those of the organization 10) Mention what does the software audit includes? Software audit includes • Looking into an employee’s computer system for violation of security and company’s policy • Regular audits of all servers and computers to check whether they are updated in streamlined with all software licenses • Adapting audit system that is least bothering to employee and their task • Apart from regular audits, random audit should be done to check whether there is any deletion or addition of software to the system 11) Mention what are the steps for record keeping for software? A register should be maintained that includes the detail of software like • Software’s publisher name and title • Source and date of software acquisition • Location of the software installation as well as the serial number of the hardware on which copy of the software is installed • Location and existence of back-up copies • Serial number of software products 12) Mention how to do the registration of software? • When an organization receives purchased software, the designated department must receive the software first to complete registration and inventory requirement before installations
  • 3. • And in the event the software is shrink-wrapped, the software receiving department must complete the registration forms and return it to the software publisher • Software must be registered on the name of the organization and not an individual user 13) Mention what the difference is between SSH and SSL? SSL and SSH both are special encryption and protocol technologies used to connect two computers • SSH: SSH stands for “Secure Shell” which commonly uses port 22 to connect your system on another system via internet. It is often used by network administrators as a remote login or remote control to manage their business servers. • SSL: SSL stands for “Secure Sockets Layer” it commonly uses port 443 to connect your system to a secure system on the Internet. It is often used for transmitting information like tax, banking, credit card, personal information to a business server somewhere.