Ans : Logical connectives are the operators used to join two or more atomicpropositions (operands). The joining should be done in a way that the logic andtruth value of the obtained compound proposition is dependent on the inputatomic propositions and Read More …
Author: ignougroup
Ques : Describe Syntax of Propositional logic
Ans : The syntax of propositional logic allows two types of sentences to representknowledge. The two types are as follows: 1- Atomic Propositions These are simplest propositions containing a single proposition symbol and areeither true or false. Some of the Read More …
Ques : Principles of security management
Ans : There are six principles of security management:- Availability- The continuous accessibility of systems tends to procedures, policies and controls which are used to ensure prompt access to data for authorized customers. This purpose secures against deliberate or inadvertent Read More …
Ques : Security Measures and solutions
Ans : Access security- By restricting access of users who have been granted access to information, thereby results in monitoring who all have access to a particular data. Therefore, in cases of data theft, sifting through the timelines of Read More …
Ques : Describe security threats and attacks.
Ans : In today’s day and age there is a host of new and evolving cyber security threats that has theinformation security industry on high alert. There is an increasingly more sophisticatedcyber-attacks involving malware, phishing, cryptocurrency. Therefore, the data and Read More …
Ques : Describe Data security and Data Management
Ans : Database security is necessary in the following situations: Theft and fraud Loss of availability of data Loss of confidentiality Loss of data privacy Loss of data integrity The situations given above are the most likely to be exposed Read More …
Ques : Digital Security : PROS & CONS
Ans : Digital security is a broader term which encompasses within itself protection of onlineidentity data assets Technology with the use of various tools like software, Web Services,biometrics, firewalls, proxies, vulnerability scanner, instant message or telephone encryptiontools etc. Digital security Read More …
Ques : Describe cash collection and disbursements ?
Ans : Once the cash budget has been prepared and appropriate net cash flows established thefinance manager should ensure that there does not exist a significant deviationbetween projected and actual cash flows. The finance manager should expedite cashcollection and control Read More …
Ques : Describe Management Accounting
Ans : The advent of management accounting was the next logical step in the developmentalprocess. The practice of using accounting information as a direct aid to management isa phenomenon of the 20th century, particularly the last 30-40 years. The genesis Read More …
Ques : What is Financial Accounting ?
Ans : Financial accounting dates from the development of large-scale business and theadvent of the Joint Stock Company. This form of business which enables the public toparticipate in providing capital in return for shares in the assets and the profits Read More …