0% found this document useful (0 votes)
16 views4 pages

Aviation Information Midsystem

The document discusses several parts of an aviation information system exam. It covers legacy passenger service software systems and how they limit revenue opportunities. It also describes the core functions of central reservation systems, airline inventory systems, and departure control systems that make up passenger service systems. Various topics are discussed in parts B through E including relationships in travel distribution and sources of airline revenue leakage.

Uploaded by

Qamar Ibrahim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views4 pages

Aviation Information Midsystem

The document discusses several parts of an aviation information system exam. It covers legacy passenger service software systems and how they limit revenue opportunities. It also describes the core functions of central reservation systems, airline inventory systems, and departure control systems that make up passenger service systems. Various topics are discussed in parts B through E including relationships in travel distribution and sources of airline revenue leakage.

Uploaded by

Qamar Ibrahim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

AVIATION INFORMATION SYSTEM

SAADFAHIM62761
MID TERM EXAM

PART A Q1
legacy systematize early adopters of passenger service software still rely on TPF in
their daily IT operations. On the one hand, legacy systems continue to meet the
basic industry requirements: they process high volumes of transactions, proving to
be super-fast, reliable, and relatively secure. On the other hand, the “antiquated”
technologies are expensive to maintain, rigid, and hard to integrate with newer
applications the airline could take advantage of.
But the main issue associated with legacy systems is that they hinder airlines from
increasing profits. Modern travelers want mobile access, convenient forms of
payments, rich content, a high level of personalization, loyalty programs, and other
commodities — something that outdated systems just can’t offer. As a result, airlines
miss the opportunity to generate new revenue from providing additional services.
The second generation: patchwork of old and new technologies

Central reservation system


At its core, an airline or central reservation system serves as a database for flight schedules,
available seats, fares and rules for each booking class, and passenger profiles. Apart from
storing flight-related information, its major functions include:
managing reservation requests and cancelations;displaying flight schedules, available seats,
and prices in response to requests from passengers or intermediators (travel agents, call
centers, General Distribution Systems or GDSs, Online Travel Agencies or OTAs);
Airline inventory system
The primary goal of an airline inventory system is to control the availability of seats in
different cabins and manage fare groups or buckets. The AIS opens or closes fare buckets
according to the rules set by an airline.
It is worth noting that the AIS often (but not necessarily) comes as an integrated part of the
airline reservation system. Otherwise, the two modules constantly exchange information for
timely updating.
Departure control system
A departure control system (DCS) handles passengers at the airport, from check-in to
boarding. Namely, it streamlines the following operations:
processing passenger check-ins from all touchpoints — service counters, self-check-in kiosks,
mobile and web apps;
checking weights and controlling baggage;
generating and printing boarding passes and baggage tags;
sharing information with security services; and
generating load sheets that contain weight and balance data related to a particular flight
(including the weight of the aircraft, fuel, crew, passengers, baggage, cargo, mail, and
pantry).
The DCS interacts with the airline reservation system to confirm and update information on
passengers and bookings.
PART B
Every PSS has customer-facing solutions to communicate with users — be it a website,
mobile app, chatbot, or kiosk at the airport. However, the crucial part of operations goes
behind the scenes. Primary daily tasks of the PSS are distributed among three subsystems:
an airline or central reservation system, an airline inventory system (AIS), and a departure
control system (DCS). Each of them deserves a bit more consideration.
PART C
displaying flight schedules, available seats, and prices in response to requests from
passengers or intermediary (travel agents, call centers, General Distribution Systems or
GDSs, Online Travel Agencies or OTAs);
In the travel distribution we can find lots of many to many relationships instead of 1:1
relationships. So how do these relationships look like? Well, one supplier provides its fare to
many distributors. A traveler on the other side has the opportunity to book inventory from
multiple suppliers.
you might book your first flight directly via the website of the provider and the second flight
direct via an inventory system. That’s why an agency can use e.g. Sabre as a distribution
system for booking a Lufthansa flight, which Passenger Name Record (PNR) is then sitting in
the Amadeus reservation system (inventory system).

PART D
displaying flight schedules, available seats, and prices in response to requests from
passengers or intermediators (travel agents, call centers, General Distribution Systems or
GDSs, Online Travel Agencies or OTAs);
In the travel distribution we can find lots of many to many relationships instead of 1:1
relationships. So how do these relationships look like? Well, one supplier provides its fare to
many distributors. A traveler on the other side has the opportunity to book inventory from
multiple suppliers.
you might book your first flight directly via the website of the provider and the second flight
direct via an inventory system. That’s why an agency can use e.g. Sabre as a distribution
system for booking a Lufthansa flight, which Passenger Name Record (PNR) is then sitting in
the Amadeus reservation system (inventory system).
PART E

Airline revenue leakage


Revenue leakage is the mismatch between the expected revenue from the bookings that
were made and the amount that airlines eventually receive. Identification of the areas of
your revenue loss will enable you to minimize them. This includes discrepancies in fares sold
by sales agents, intense competition on the market, refunds and cancellations of tickets,
changes in foreign exchange rates, improper calculation of penalty charges, etc.
Leakage plugging strategy is called revenue integrity (RI). This involves making sure that the
right passengers fly on the right plane, at the right time, at the right fare. Due to numerous
problems, this is not always possible.
Sources of airline revenue leakage
Not always intentionally, travel agents as well as passengers themselves can cause a bunch
of revenue integrity problems for airlines. First, let’s see at what stages of the flight booking
process leakages appear. And in the next sections we’ll talk about solutions.
Reservation stage
Unticketed booking. It happens when the booking is completed but passenger’s ticketing
details are missing. For instance, when a travel agent wants to give a customer the exact
price of a tour, they often hold a seat to do that. But no passenger name record (PNR) has
been created. As a result, this test booking activated a hold but no one is going to travel by
that ticket. So, airlines can be left with an empty seat and no payment. Besides, Global
Distribution Systems still charge airlines for such passive bookings. And it can amount to a
sizable sum if used frequently. Some airlines forbid creating bookings for testing or training
purposes. If identified, a carrier cancels such a booking and issues a fine for the travel
agency.

ANSWER 2

Software is the set of instructions that tell the hardware what to do. Software is created
through the process of programming and without software the hardware would not be
functional.
Types of Software:
Typically there are 2 broad type of categories Of Software’s
1. Operating Systems Software.
2. Application Software.
1. Operating System Software: Manage the hardware and create the interface between
the hardware and the user. It is also called OS.
• Manages the hardware resources of the computer.
• Provides the user-interface components.
• Provides a platform for software developers to write applications.
Types Of Operating System Software’s: Such type of Operating Systems are as follows;
1) DOS-Script Base
2) Microsoft Windows
3) Apple OSX-GUI
• Multitas…

ANSWER 3

MAXIMUM VALUE IS 127 IN BYTE


Binary half word (2 bytes) 0 through 65535
9(5) through 9(9) Binary full word (4 bytes) 0 through 4,294,967,295
9(10) through 9(18) Binary double word (8 bytes) 0 through 18,446,744,073,709,551,615

ANSWER 4

Data warehousing is the electronic storage of a lot of data by a business or association. Data
warehousing is a crucial segment of business knowledge that utilizes analytical techniques
on business data.

Primary purpose
A data distribution center is intended to run question and examination on verifiable data got
from transnational sources. When the data has been joined into the warehouse, it doesn't
change and can't be modified since a data warehouse runs analytics on occasions that have
effectively happened by zeroing in on the adjustments in data over the long run.
Warehoused data should be put away in a way that is secure, solid, simple to recover and
simple to oversee.
There are sure advances that are taken to ma…
ANSWER 5

Confidentiality, integrity, availability


The following is a breakdown of the three key concepts that form the CIA triad:
Confidentiality is roughly equivalent to Confidentiality measures are designed to prevent
sensitive information from unauthorized access attempts. It is common for data to be
categorized according to the amount and type of damage that could be done if it fell into the
wrong hands. More or less stringent measures can then be implemented according to those
categories.
Integrity involves maintaining the consistency, accuracy and trustworthiness of data over its
entire life-cycle. Data must not be changed in transit, and steps must be taken to ensure
data cannot be altered by unauthorized people (for example, in a breach of confidentiality).
Availability means information should be consistently and readily accessible for authorized
parties. This involves properly maintaining hardware and technical infrastructure and
systems that hold and display the information.
tiality
Sometimes safeguarding data confidentiality involves special training for those privy to
sensitive documents. Training can help familiarize authorized people with risk factors and
how to guard against them. Further aspects of training may include strong passwords and
password-related best practices and information about social engineering methods to
prevent users from bending data-handling rules with good intentions and potentially
disastrous results.
A good example of methods used to ensure confidentiality is requiring an account number
or routing number when banking online. Data encryption is another common method of
ensuring confidentiality. User IDs and passwords constitute a standard procedure; two-
factor authentication (2FA) is becoming the norm. Other options include biometric
verification and security tokens, key fobs or soft tokens. In addition, users can take
precautions to minimize the number of places where information appears and the number
of times it is actually transmitted to complete a required transaction. Extra measures might
be taken in the case of extremely sensitive documents, such as storing only on air-
gapped computers, disconnected storage devices or, for highly sensitive information, in
hard-copy form only.
Integrity
These measures include file permissions and user access controls. Version control may be
used to prevent erroneous changes or accidental deletion by authorized users from
becoming a problem. In addition, organizations must put in some means to detect any
changes in data that might occur as a result of non-human-caused events such as an
electromagnetic pulse (EMP) or server crash.
Data might include checksums, even cryptographic checksums, for verification of
integrity. Backups or redundancies must be available to restore the affected data to its
correct state. Furthermore, digital signatures can be used to provide
effective nonrepudiation measures, meaning evidence of logins, messages sent, electronic
document viewing and sending cannot be denied.
Availability
This is best ensured by rigorously maintaining all hardware, performing hardware repairs
immediately when needed and maintaining a properly functioning operating system (OS)
environment that is free of software conflicts. It's also important to keep current with all
necessary system upgrades. Providing adequate communication bandwidth and preventing
the occurrence of bottlenecks are equally important tactics. Redundancy, failover, RAID --
even high-availability clusters -- can mitigate serious consequences when hardware issues do
occur.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy