Pages

Wednesday, August 11, 2010

HOLY RAMAZAN MUBARAK

Dear students/visitors,

HAPPY RAMAZAN TO ALL OF U and lot of BEST WISHES AND PRAYERS FOR ALL OF U.

PLEASE REMEMBER us in your PRAYERS.

Thanks

VUsolutions HelpDesk..

CS507- Information Systems

FINALTERM EXAMINATION

Spring 2010

CS507- Information Systems
Question No: 1 ( Marks: 1 ) - Please choose one
Medium Sized organizations are normally a family ownership run by
Father & Sons
Brothers

Father, Sons and Brothers

None of the given



Question No: 2 ( Marks: 1 ) - Please choose one
High level of foreign trade has resulted in imports and exports which require inter linkage for smooth coordination.

True

False


Question No: 3 ( Marks: 1 ) - Please choose one
ERP or enterprise systems control all major business processes with a single software architecture in real time.
False
► True


Question No: 4 ( Marks: 1 ) - Please choose one
The bullwhip effect refers to erratic shifts in orders up and down the supply chain because of poor demand forecasting, price fluctuation, order batching, and rationing within the chain.
► True
False


Question No: 5 ( Marks: 1 ) - Please choose one
Which of the following works in conjunction with routers and firewalls by monitoring network usage anomalies to protect a company’s information systems resources from external as well as internal misuse?
Encryption
► Intrusion Detection Systems
Firewall
All of above


Question No: 6 ( Marks: 1 ) - Please choose one
The major purpose of enhancing web security is to protect web server from attacks through the use of internet.
► True
False


Question No: 7 ( Marks: 1 ) - Please choose one
The Internet Protocol is designed solely for the addressing and routing of data packets across a network
► True
False


Question No: 8 ( Marks: 1 ) - Please choose one
Passive Attack is one of the types of Web Security Threats
► True
False


Question No: 9 ( Marks: 1 ) - Please choose one
Audit Trials can be used together with controls trials to identify and provide information about users suspected of improper modification of data.
► True
False


Question No: 10 ( Marks: 1 ) - Please choose one
MKIS helps organizations in efficient channel management
True
False


Question No: 11 ( Marks: 1 ) - Please choose one
Crypto Analysis is the science and art of transforming messages to make them secure and immune to attacks.
► True
False


Question No: 12 ( Marks: 1 ) - Please choose one
Active Monitor software serves the concurrent monitoring as the system is being used.
► True
False


Question No: 13 ( Marks: 1 ) - Please choose one
The protection of the interests of those relying on information, and the information systems and
communications that delivers the information, from harm resulting from failures of availability,
confidentiality, and integrity.
False
► True


Question No: 14 ( Marks: 1 ) - Please choose one
The purpose of a class is to specify a classification of objects and to specify the features that characterize the structure and behavior of those objects.
► True
False


Question No: 15 ( Marks: 1 ) - Please choose one
In drawing a proper flowchart, all necessary steps that are a part of process should be listed out in ---------------------- order.
► Logical
► Physical
► Random
► Top to Bottom


Question No: 16 ( Marks: 1 ) - Please choose one
The departmental structures are different in banking and financial sector
False
► True


Question No: 17 ( Marks: 1 ) - Please choose one
Production subsystem needs to be linked with the marketing system to produce right amount of product.
► True
False


Question No: 18 ( Marks: 1 ) - Please choose one
DSS can be used to simulate the consequences of each alternative generated.
► TRUE
FALSE


Question No: 19 ( Marks: 1 ) - Please choose one
Which of the following select chief executive?
Employees
Customers
► Board of Directors


Question No: 20 ( Marks: 1 ) - Please choose one
A schematic representation of a sequence of operations as in a manufacturing process or computer program is called __________
Algorithm.
Entity Relationship Diagram
► Flowchart


Question No: 21 ( Marks: 1 ) - Please choose one
Rounded shaped symbol in the flow chart is called ____________
► Connector
Arrow
Process


Question No: 22 ( Marks: 1 ) - Please choose one
________ Focus on detecting potentially abnormal behavior in function of operating system or request made by application software
► Behavior blockers
Active monitors
► Scanners


Question No: 23 ( Marks: 1 ) - Please choose one
Testing is easy for the software that is developed using OOAD due to use of ___________
Modular approach
► Real time modeling
Usability feature


Question No: 24 ( Marks: 1 ) - Please choose one
Threat source motivation is an output for Likelihood determination
► True
► False


Question No: 25 ( Marks: 1 ) - Please choose one
Administrative Consol is one of the components of Intrusion Detection System (IDS).
► True
False


Question No: 26 ( Marks: 1 ) - Please choose one
Preparing a situation for change by disconfirming existing attitudes and
behaviors is called Unfreezing.
► True
False


Question No: 27 ( Marks: 1 ) - Please choose one
The purpose of data flow diagrams is to provide a --------- between users and systems developers
► Linking bridge
► Empty space
► Data Flows
► Options a and b


Question No: 28 ( Marks: 1 ) - Please choose one
Availability of which of the following to various users also depends on how the information is processed?
► Information
► Data
► Log File
► None of the above


Question No: 29 ( Marks: 1 ) - Please choose one
Which of the following is the characteristic of being able to assign a different meaning or usage to something in different contexts - specifically?
► OOP
► Polymorphism
► Encapsulation
► Inheritance


Question No: 30 ( Marks: 1 ) - Please choose one
_______ is the science of coded writing.
Decryption
► Cryptography
Encryption


Question No: 31 ( Marks: 2 )
What is the basic purpose of setting up systems and procedures. Give your own opinion.
Question No: 32 ( Marks: 2 )
Define threat and identify its types.
Question No: 33 ( Marks: 2 )
List any two types of information that can be used as input for vulnerability ?
Question No: 34 ( Marks: 2 )
Identify leading ERP software vendors ?
Question No: 35 ( Marks: 3 )
Define Risk Determination. Identify its inputs and outputs.
Question No: 36 ( Marks: 3 )
What are the types of threats?
Question No: 37 ( Marks: 3 )
Differentiate between Incremental and iterative models with the help of one example each.
Question No: 38 ( Marks: 3 )
Identify any six factors that should be considered in order for change to be successful?
Question No: 39 ( Marks: 5 )
Define the following:
a) EC (Ecommerce)
b) EB (Ebusiness)
Question No: 40 ( Marks: 5 )
Identify and define the types of active attacks ?

Is this blog is useful for you?

Powered by Blogger.