FINALTERM EXAMINATION
Spring 2010
CS507- Information Systems
Ref No:
Time: 90 min
Marks: 60
Student Info | ||
Student ID: | ||
Center: | ||
Exam Date: |
Question No: 1 ( Marks: 1 ) - Please choose one
Small organizations usually have complex management structure.
► True
► False
Question No: 2 ( Marks: 1 ) - Please choose one
A hierarchical organization is structured in a way such that every entity in the organization, except one, is subordinate to a single other entity.
► True
► False
Question No: 3 ( Marks: 1 ) - Please choose one
Past court decisions have stated that privacy must be balanced against the needs of http://www.allvupastpapers.blogspot.com/
society.
► True
► False
Question No: 4 ( Marks: 1 ) - Please choose one
Business is a system where management decisions are influenced by or have an influence on suppliers, customers, society as a whole.
► True
► False
Question No: 5 ( Marks: 1 ) - Please choose one
Customer touch point is a method of interaction with a customer, such as telephone, e-mail, a customer service or help desk, conventional mail, Web site and store.
► True
► False
Question No: 6 ( Marks: 1 ) - Please choose one
Which of the following functions provide such data as sales prospect and contact information, product information, product configurations and sales quotes?
► Sales force automation (SFA)
► CRM
► ERP
► MIS
Question No: 7 ( Marks: 1 ) - Please choose one
A ________ is an agreed-upon set of conventions that defines the rules of communication.
► Protocol
Protocol
► Interconnection Medium
► Data Packet
► Message
Question No: 8 ( Marks: 1 ) - Please choose one
----------is a type of computer software that facilitates group decision-making within an organization
► EMS
► DSS
► MIS
Question No: 9 ( Marks: 1 ) - Please choose one
The identification of risks should start with:
► Description of the internal and external risks
► A brainstorming session with risk management experts and a program profile
► A good understanding of the program and a brainstorming session with key stakeholders
► Definitions of likelihood and impact
Question No: 10 ( Marks: 1 ) - Please choose one
Automated data are less susceptible to destruction and misuse than paper data.
► True
► False
Question No: 11 ( Marks: 1 ) - Please choose one
Wireless computing devices are not subject to viruses.
► False
► True
Question No: 12 ( Marks: 1 ) - Please choose one
The purpose of a class is to specify a classification of objects and to specify the features that characterize the structure and behavior of those objects.
► True
► False
Question No: 13 ( Marks: 1 ) - Please choose one
Null value may or may not be called zero value.
► True
► False
Question No: 14 ( Marks: 1 ) - Please choose one
Existence of functional departments in each organization may vary with the nature of industry and the nature of products/services being offered.
► True
► False
Question No: 15 ( Marks: 1 ) - Please choose one
RAID model combines the elements of the waterfall model with the philosophy of prototyping.
► True
► False
Question No: 16 ( Marks: 1 ) - Please choose one
_________ means information hiding.
► Inheritance
► Encapsulation
► Class
Question No: 17 ( Marks: 1 ) - Please choose one
Testing is easy for the software that is developed using OOAD due to use of ___________
► Modular approach
► Real time modeling
► Usability feature
Question No: 18 ( Marks: 1 ) - Please choose one
Characteristics of object are called ________
► Methods
► Attributes
► Status
Question No: 19 ( Marks: 1 ) - Please choose one
An event-oriented log usually contain records describing system events, application
events, or user events.
► True
► False
Question No: 20 ( Marks: 1 ) - Please choose one
An information technology (IT) audit is an Examination of the controls within an entity’s Information technology infrastructure .
► True
► False
Question No: 21 ( Marks: 1 ) - Please choose one
In assessing risks for an IT system, _______________ is the first step.
► To define the scope of the effort.
► Vulnerability Assesment
► threat identification
Question No: 22 ( Marks: 1 ) - Please choose one
Risk Management includes assessment of controls already been implemented or planned, probability that they can be broken, assessment of potential loss despite such controls existing.
► True
► False
Question No: 23 ( Marks: 1 ) - Please choose one
Access Control refers to the process of identifying attempts to penetrate a system and gain unauthorized access.
► True
► False
Question No: 24 ( Marks: 1 ) - Please choose one
“M-Commerce” stands for Mobile Commerce.
► True
► False
Question No: 25 ( Marks: 1 ) - Please choose one
Past court decisions have stated that privacy must be balanced against the needs of ethics.
► True
► False
Question No: 26 ( Marks: 1 ) - Please choose one
Which of the following is the primary method for keeping a computer secure from intruders?
► Password
► Antivirus
► Scanners
► Firewall
Question No: 27 ( Marks: 1 ) - Please choose one
__________ is an association among entities. There has to be a relationship between two entities
► Value Sets
► Cardinality
► Relationships
Question No: 28 ( Marks: 1 ) - Please choose one
____________ are the symbols indicates the flow of the procedure being explained.
► Entity Relationship Diagram
► DFD
► Flowchart
Question No: 29 ( Marks: 1 ) - Please choose one
To accept the potential risk and continue operating the IT system or to implement controls to lower the risk to an acceptable level is called as ---------------.
► Risk Planning
► Risk Assumption
► Risk Limitation
► None of the above
Question No: 30 ( Marks: 1 ) - Please choose one
RAID models based on producing deliverables frequently/repetitively.
► True
► False
Question No: 31 ( Marks: 2 )
What should be the basic objective of an organization in your opinion?
The basic objective of an organization is to make a profit and get a sustainable competency.
Question No: 32 ( Marks: 2 )
Why we need to secure information systems?
Question No: 33 ( Marks: 2 )
Define intrusion detection ?
Question No: 34 ( Marks: 2 )
Identify components of Intrusion detection system?
Question No: 35 ( Marks: 3 )
How can we make our password secure?
Question No: 36 ( Marks: 3 )
What are some of the things you should keep in mind when identifying risks?
Question No: 37 (Marks: 3)
Briefly describe Incremental Model.
Question No: 38 ( Marks: 3 )
Information system security association of USA has listed many ethical challenges, identify any three of them?
Question No: 39 ( Marks: 5 )
What do you think what are the key benefits of Ecommerce to organizations?
Question No: 40 ( Marks: 5 )
What do you understand by Disaster Recovery Planning?
No comments:
Post a Comment
PLEASE COMMENT ABOUT YOUR VISIT AND MY SITE
Note: Only a member of this blog may post a comment.