PROMOTE MY BLOG: JUST CLICK BELOW BUTTON

Search Any Paper On This Blog

Saturday, December 25, 2010

CS507- Information Systems Complete Solved Finalterm Paper 2010

FINALTERM  EXAMINATION
Spring 2010
CS507- Information Systems
Ref No:
Time: 90 min
Marks: 60

Student Info
Student ID:


Center:


Exam Date:



Question No: 1      ( Marks: 1 ) - Please choose one


Small organizations usually have complex management structure.


       True


       False


Question No: 2      ( Marks: 1 ) - Please choose one


A hierarchical organization is structured in a way such that every entity in the organization, except one, is subordinate to a single other entity.


       True

       False




Question No: 3      ( Marks: 1 ) - Please choose one


Past court decisions have stated that privacy must be balanced against the needs of http://www.allvupastpapers.blogspot.com/  
society.


       True

       False



Question No: 4      ( Marks: 1 ) - Please choose one


Business is a system where management decisions are influenced by or have an influence on suppliers, customers, society as a whole.


       True

       False




Question No: 5      ( Marks: 1 ) - Please choose one


Customer touch point is a method of interaction with a customer, such as telephone, e-mail, a customer service or help desk, conventional mail, Web site and store.


       True

       False



Question No: 6      ( Marks: 1 ) - Please choose one


Which of the following  functions provide such data as sales prospect and contact information, product information, product configurations and sales quotes?

       ► Sales force automation (SFA)


       ► CRM


       ► ERP


       ► MIS



Question No: 7      ( Marks: 1 ) - Please choose one


A ________ is an agreed-upon set of conventions that defines the rules of communication.


       Protocol
Protocol




       Interconnection Medium


       Data Packet


       Message           




Question No: 8      ( Marks: 1 ) - Please choose one


----------is a type of computer software that facilitates group decision-making within an organization


       EMS

       DSS


       MIS



Question No: 9      ( Marks: 1 ) - Please choose one


The identification of risks should start with:


       Description of the internal and external risks


       A brainstorming session with risk management experts and a program profile


       A good understanding of the program and a brainstorming session with key stakeholders


       Definitions of likelihood and impact




Question No: 10      ( Marks: 1 ) - Please choose one


Automated data are less susceptible to destruction and misuse than paper data.


       True

       False



Question No: 11      ( Marks: 1 ) - Please choose one


Wireless computing devices are not subject to viruses.


       False

       True



Question No: 12      ( Marks: 1 ) - Please choose one


The purpose of a class is to specify a classification of objects and to specify the features that characterize the structure and behavior of those objects.




       True

       False



Question No: 13      ( Marks: 1 ) - Please choose one


Null value may or may not be called zero value.


       True

       False


Question No: 14      ( Marks: 1 ) - Please choose one


Existence of functional departments in each organization may vary with the nature of industry and the nature of products/services being offered.


       True

       False



Question No: 15      ( Marks: 1 ) - Please choose one


RAID model combines the elements of the waterfall model with the philosophy of prototyping.



       True

       False



Question No: 16      ( Marks: 1 ) - Please choose one


_________ means information hiding.

       Inheritance

       Encapsulation

       Class


Question No: 17      ( Marks: 1 ) - Please choose one


Testing is easy for the software that is developed using OOAD due to use of ___________

       Modular approach

       Real time modeling

       Usability feature


Question No: 18      ( Marks: 1 ) - Please choose one


Characteristics of object are called ________

       Methods

       Attributes

       Status


Question No: 19      ( Marks: 1 ) - Please choose one


An event-oriented log usually contain records describing system events, application
events, or user events.


       True

       False


Question No: 20      ( Marks: 1 ) - Please choose one


An information technology (IT) audit  is an Examination of the controls within an entity’s Information technology infrastructure .


       True

       False



Question No: 21      ( Marks: 1 ) - Please choose one


In assessing risks for an IT system, _______________ is the first step.


       To define the scope of the effort.


       Vulnerability Assesment


       threat identification



Question No: 22      ( Marks: 1 ) - Please choose one


Risk Management  includes assessment of controls already been implemented or planned, probability that they can be broken, assessment of potential loss despite such controls existing.


       True

       False


Question No: 23      ( Marks: 1 ) - Please choose one


Access Control refers to the process of identifying attempts to penetrate a system and gain unauthorized access.

       True

       False



Question No: 24      ( Marks: 1 ) - Please choose one


M-Commerce stands for Mobile Commerce.



       True

       False


Question No: 25      ( Marks: 1 ) - Please choose one


Past court decisions have stated that privacy must be balanced against the needs of ethics.

       True

       False



Question No: 26      ( Marks: 1 ) - Please choose one


Which of the following is the primary method for keeping a computer secure from intruders? 


       ► Password

       ► Antivirus

       ► Scanners

       ► Firewall


Question No: 27      ( Marks: 1 ) - Please choose one


__________ is an association among entities. There has to be a relationship between two entities

       Value Sets

       Cardinality

       Relationships


Question No: 28      ( Marks: 1 ) - Please choose one


____________ are the symbols indicates the flow of the procedure being explained.

       Entity Relationship Diagram

       DFD

       Flowchart


Question No: 29      ( Marks: 1 ) - Please choose one


To accept the potential risk and continue operating the IT system or to implement controls to lower the risk to an acceptable level is called as ---------------.


       Risk Planning

       Risk Assumption

       Risk Limitation

       None of the above


Question No: 30      ( Marks: 1 ) - Please choose one


RAID models based on producing deliverables frequently/repetitively.

       True

       False



Question No: 31      ( Marks: 2 )


What should be the basic objective of an organization in your opinion?

The basic objective of an organization is to make a profit and get a sustainable competency.

Question No: 32      ( Marks: 2 )


Why we need to secure information systems?


Question No: 33      ( Marks: 2 )

Define intrusion detection ?

Question No: 34      ( Marks: 2 )

Identify components of Intrusion detection system?


Question No: 35      ( Marks: 3 )


How can we make our password secure?


Question No: 36      ( Marks: 3 )


What are some of the things you should keep in mind when identifying risks?


Question No: 37      (Marks: 3)


Briefly describe Incremental Model.



Question No: 38      ( Marks: 3 )


Information system security association of USA has listed many ethical challenges, identify any three of them?

Question No: 39      ( Marks: 5 )


What do you think what are the key benefits of Ecommerce to organizations?

Question No: 40      ( Marks: 5 )


What do you understand by Disaster Recovery Planning?



No comments:

Post a Comment

PLEASE COMMENT ABOUT YOUR VISIT AND MY SITE

Note: Only a member of this blog may post a comment.