Mention What Is The Basic Role Of A Computer System Analyst?
Provide assistance to users solving computer related problems
Test, maintain and monitor systems and computer programs
Co-ordinate and connect the computer systems within an organization to increase compatibility
Modify system to improve work flow
Training and assisting staff and users to work with computer systems
Recommend new equipment or software packages
Determine computer software or hardware required in an organization
Good understanding of company’s database
Publish weekly report which identify progress made towards implementing monitoring by application and by environment.
Mention What Are The Types Of Requirements That A System Analyst Should Gather And Analyze?
System analyst should gather requirements like:
Technical requirements: It includes the detail about what the system is built, including which language it will be programmed in, what standards are to maintained, etc.
Functional requirements: It includes the detail about what needs to be delivered, which is generally read by software engineers, project managers and business analyst.
Explain What Is Spoofed Packet?
Spoofed packet is an internet protocol packet that is created from a fake IP address, but behaves as a legitimate and authenticated sender. It is usually used in denial of service attacks and are used to defeat the security mechanism of the network and bye-pass service which are based on IP authentication.
Mention What Are Some Organization Software Usage Policies That Computer Analyst Can Implement In An Organization?
Disallowing the use of external drives for employees to access organization’s data
Not allowing to download pirated software and electronic files that are copyrighted or unauthenticated
No sharing of confidential material, proprietary information or trade secrets outside the organization
Not allowing them to hack into unauthorized websites or download contents
Not allowing them to post or send information that is offensive to the company or organization
Preventing downloading of any malicious software onto the company network
Not allowing employees to pass off personal views as representing those of the organization.
Mention What Does The Software Audit Includes?
Software audit includes:
Looking into an employee’s computer system for violation of security and company’s policy
Regular audits of all servers and computers to check whether they are updated in streamlined with all software licenses
Adapting audit system that is least bothering to employee and their task
Apart from regular audits, random audit should be done to check whether there is any deletion or addition of software to the system.
Mention What Are The Steps For Record Keeping For Software?
A register should be maintained that includes the detail of software like:
Software’s publisher name and title
Source and date of software acquisition
Location of the software installation as well as the serial number of the hardware on which copy of the software is installed
Location and existence of back-up copies
Serial number of software products
Mention How To Do The Registration Of Software?
When an organization receives purchased software, the designated department must receive the software first to complete registration and inventory requirement before installations
And in the event the software is shrink-wrapped, the software receiving department must complete the registration forms and return it to the software publisher
Software must be registered on the name of the organization and not an individual user.
Mention What The Difference Is Between Ssh And Ssl?
SSL and SSH both are special encryption and protocol technologies used to connect two computers:
SSH: SSH stands for “Secure Shell” which commonly uses port 22 to connect your system on another system via internet. It is often used by network administrators as a remote login or remote control to manage their business servers.
SSL: SSL stands for “Secure Sockets Layer” it commonly uses port 443 to connect your system to a secure system on the Internet. It is often used for transmitting information like tax, banking, credit card, personal information to a business server somewhere.
Mention What Are The Skills Required To Become A Computer Analyst?
Good learning and listening skills
Complex problem-solving abilities
Time management
Troubleshooting
Good knowledge of software application and networking
Quality control analysis
Critical thinking
Mention What Is Dhcp Server?
DHCP server stands for dynamic host configuration protocol; that is designed as the functional extension of the Bootstrap network Protocol. It is a server or client protocol that automatically caters an internet protocol (IP) host with its IP address and other configuration as the subnet mask and default gateway.
Mention Why To Use Dhcp Server?
DHCP server allowed entire process to be auto-mated and managed centrally. DHCP server maintains the IP addresses in bulk and assign an address to any DHCP enabled client when he switch on to the network. As such the addresses are dynamic rather than static, so the addresses which are no more in use are automatically return to the bulk for re-allocation.
Mention What Is Sub-netting?
Sub-netting is the procedure of partitioning a single TCP/IP network into a number of distinct network segments called subnets.
Mention What Computer System Analyst Document?
Computer system analyst can document what is going in current systems, and what can be expected in systems that have not been built yet. Documenting is often done in collaboration with technical writers, system designers and system architects.
List of thing that computer analysts document include:
User Scenarios
Functional activities
Data flows
Classes
Interfaces between Systems.
Provide assistance to users solving computer related problems
Test, maintain and monitor systems and computer programs
Co-ordinate and connect the computer systems within an organization to increase compatibility
Modify system to improve work flow
Training and assisting staff and users to work with computer systems
Recommend new equipment or software packages
Determine computer software or hardware required in an organization
Good understanding of company’s database
Publish weekly report which identify progress made towards implementing monitoring by application and by environment.
Computer Systems Analyst Freshers Interview Questions |
Mention What Are The Types Of Requirements That A System Analyst Should Gather And Analyze?
System analyst should gather requirements like:
Technical requirements: It includes the detail about what the system is built, including which language it will be programmed in, what standards are to maintained, etc.
Functional requirements: It includes the detail about what needs to be delivered, which is generally read by software engineers, project managers and business analyst.
Explain What Is Spoofed Packet?
Spoofed packet is an internet protocol packet that is created from a fake IP address, but behaves as a legitimate and authenticated sender. It is usually used in denial of service attacks and are used to defeat the security mechanism of the network and bye-pass service which are based on IP authentication.
Mention What Are Some Organization Software Usage Policies That Computer Analyst Can Implement In An Organization?
Disallowing the use of external drives for employees to access organization’s data
Not allowing to download pirated software and electronic files that are copyrighted or unauthenticated
No sharing of confidential material, proprietary information or trade secrets outside the organization
Not allowing them to hack into unauthorized websites or download contents
Not allowing them to post or send information that is offensive to the company or organization
Preventing downloading of any malicious software onto the company network
Not allowing employees to pass off personal views as representing those of the organization.
Mention What Does The Software Audit Includes?
Software audit includes:
Looking into an employee’s computer system for violation of security and company’s policy
Regular audits of all servers and computers to check whether they are updated in streamlined with all software licenses
Adapting audit system that is least bothering to employee and their task
Apart from regular audits, random audit should be done to check whether there is any deletion or addition of software to the system.
Mention What Are The Steps For Record Keeping For Software?
A register should be maintained that includes the detail of software like:
Software’s publisher name and title
Source and date of software acquisition
Location of the software installation as well as the serial number of the hardware on which copy of the software is installed
Location and existence of back-up copies
Serial number of software products
Mention How To Do The Registration Of Software?
When an organization receives purchased software, the designated department must receive the software first to complete registration and inventory requirement before installations
And in the event the software is shrink-wrapped, the software receiving department must complete the registration forms and return it to the software publisher
Software must be registered on the name of the organization and not an individual user.
Mention What The Difference Is Between Ssh And Ssl?
SSL and SSH both are special encryption and protocol technologies used to connect two computers:
SSH: SSH stands for “Secure Shell” which commonly uses port 22 to connect your system on another system via internet. It is often used by network administrators as a remote login or remote control to manage their business servers.
SSL: SSL stands for “Secure Sockets Layer” it commonly uses port 443 to connect your system to a secure system on the Internet. It is often used for transmitting information like tax, banking, credit card, personal information to a business server somewhere.
Mention What Are The Skills Required To Become A Computer Analyst?
Good learning and listening skills
Complex problem-solving abilities
Time management
Troubleshooting
Good knowledge of software application and networking
Quality control analysis
Critical thinking
Mention What Is Dhcp Server?
DHCP server stands for dynamic host configuration protocol; that is designed as the functional extension of the Bootstrap network Protocol. It is a server or client protocol that automatically caters an internet protocol (IP) host with its IP address and other configuration as the subnet mask and default gateway.
Mention Why To Use Dhcp Server?
DHCP server allowed entire process to be auto-mated and managed centrally. DHCP server maintains the IP addresses in bulk and assign an address to any DHCP enabled client when he switch on to the network. As such the addresses are dynamic rather than static, so the addresses which are no more in use are automatically return to the bulk for re-allocation.
Mention What Is Sub-netting?
Sub-netting is the procedure of partitioning a single TCP/IP network into a number of distinct network segments called subnets.
Mention What Computer System Analyst Document?
Computer system analyst can document what is going in current systems, and what can be expected in systems that have not been built yet. Documenting is often done in collaboration with technical writers, system designers and system architects.
List of thing that computer analysts document include:
User Scenarios
Functional activities
Data flows
Classes
Interfaces between Systems.
Post a Comment