PROMOTE MY BLOG: JUST CLICK BELOW BUTTON

Search Any Paper On This Blog

Friday, December 24, 2010

CS507- Information Systems Finalterm Complete Paper 2010

FINALTERM  EXAMINATION
Spring 2010
CS507- Information Systems
Question No: 1      ( Marks: 1 ) - Please choose one


Medium Sized organizations are normally a family ownership run by


       Father & Sons

       Brothers


       Father, Sons and Brothers

       None of the given


Question No: 2      ( Marks: 1 ) - Please choose one


High level of foreign trade has resulted in imports and exports which require inter linkage for smooth coordination.


       True

       False



Question No: 3      ( Marks: 1 ) - Please choose one


ERP or enterprise systems control all major business processes with a single software architecture in real time.


       False

      True



Question No: 4      ( Marks: 1 ) - Please choose one


The bullwhip effect refers to erratic shifts in orders up and down the supply chain because of poor demand forecasting,  price fluctuation, order batching, and rationing within the chain.


       True

       False


Question No: 5      ( Marks: 1 ) - Please choose one


Which of the following  works in conjunction with routers and firewalls by monitoring network usage anomalies to  protect a company’s information systems resources from external as well as internal misuse?


       Encryption


       Intrusion Detection Systems


       Firewall


       All of above




Question No: 6      ( Marks: 1 ) - Please choose one


The major purpose of enhancing web security is to protect web server from attacks through the use of internet.

       True

       False



Question No: 7      ( Marks: 1 ) - Please choose one


The Internet Protocol is designed solely for the addressing and routing of data packets across a network

       True

       False



Question No: 8      ( Marks: 1 ) - Please choose one


Passive Attack is one of the types of Web  Security Threats

       True

       False



Question No: 9      ( Marks: 1 ) - Please choose one


Audit Trials can be used together with  controls trials to identify and provide information about users suspected of improper modification of data.

       True

       False


Question No: 10      ( Marks: 1 ) - Please choose one


MKIS helps organizations in efficient channel management


       True

       False




Question No: 11      ( Marks: 1 ) - Please choose one


Crypto Analysis  is the science and art of transforming messages to make them secure and immune to attacks.


       True

       False


Question No: 12      ( Marks: 1 ) - Please choose one


Active Monitor software serves the concurrent monitoring as the system is being used.


       True

       False



Question No: 13      ( Marks: 1 ) - Please choose one


The protection of the interests of those relying on information, and the information systems and
communications that delivers the information, from harm resulting from failures of availability,
confidentiality, and integrity.


       False

       True


Question No: 14      ( Marks: 1 ) - Please choose one


The purpose of a class is to specify a classification of objects and to specify the features that characterize the structure and behavior of those objects.




       True

       False



Question No: 15      ( Marks: 1 ) - Please choose one


In drawing a proper flowchart, all necessary steps that are a part of process should be listed out in ---------------------- order.



       ► Logical

       ► Physical


       ► Random


       ► Top to Bottom


Question No: 16      ( Marks: 1 ) - Please choose one


The departmental structures are different in banking and financial sector

       False

       True



Question No: 17      ( Marks: 1 ) - Please choose one


Production subsystem needs to be linked with the marketing system to produce right amount of product.


       True

       False


Question No: 18      ( Marks: 1 ) - Please choose one


DSS  can be used to simulate the consequences of each alternative generated.


       TRUE

       FALSE



Question No: 19      ( Marks: 1 ) - Please choose one


Which of the following  select chief executive?

       Employees

       Customers

       ► Board of Directors


Question No: 20      ( Marks: 1 ) - Please choose one


A schematic representation of a sequence of operations as in a manufacturing process or computer program is called __________

       Algorithm.

       Entity Relationship Diagram

       ► Flowchart


Question No: 21      ( Marks: 1 ) - Please choose one


Rounded shaped symbol in the flow chart is called ____________

       ► Connector

       Arrow

       Process


Question No: 22      ( Marks: 1 ) - Please choose one


________ Focus on detecting potentially abnormal behavior in function of operating system or request made by application software

       ► Behavior blockers

       Active monitors

       ► Scanners


Question No: 23      ( Marks: 1 ) - Please choose one


Testing is easy for the software that is developed using OOAD due to use of ___________

       Modular approach

       ► Real time modeling

       Usability feature


Question No: 24      ( Marks: 1 ) - Please choose one


Threat source motivation is an output  for Likelihood determination

       True

       False



Question No: 25      ( Marks: 1 ) - Please choose one


Administrative Consol is one of the components of Intrusion Detection System (IDS).


       True

       False



Question No: 26      ( Marks: 1 ) - Please choose one


Preparing a situation for change by disconfirming existing attitudes and
behaviors is called Unfreezing.


       True

       False



Question No: 27      ( Marks: 1 ) - Please choose one


The purpose of data flow diagrams is to provide a --------- between users and systems developers

       ► Linking bridge

       ► Empty space

       ► Data Flows


       ► Options a and b


Question No: 28      ( Marks: 1 ) - Please choose one


Availability of which of the following  to various users also depends on how the information is processed?


       ► Information

       ► Data

       ► Log File

       ► None of the above


Question No: 29      ( Marks: 1 ) - Please choose one


Which of the following is the characteristic of being able to assign a different meaning or usage to something in different contexts - specifically?


       ► OOP

       ► Polymorphism

       ► Encapsulation

       ► Inheritance


Question No: 30      ( Marks: 1 ) - Please choose one


_______ is the science of coded writing.

       Decryption

       ► Cryptography

       Encryption


Question No: 31      ( Marks: 2 )


What is the basic purpose of setting up systems and procedures. Give your own opinion.



Question No: 32      ( Marks: 2 )


Define threat and identify its types.



Question No: 33      ( Marks: 2 )


List any two types of information that can be used as input for vulnerability ?



Question No: 34      ( Marks: 2 )


Identify leading ERP software vendors ?


Question No: 35      ( Marks: 3 )


Define Risk Determination. Identify its inputs and outputs.


Question No: 36      ( Marks: 3 )


What are the types of threats?



Question No: 37      ( Marks: 3 )


Differentiate between Incremental and iterative models with the help of one example each.



Question No: 38      ( Marks: 3 )


 Identify any six factors that should be considered in order for change to be successful?



Question No: 39      ( Marks: 5 )


Define the following:

a)      EC (Ecommerce)
b)      EB (Ebusiness)





Question No: 40      ( Marks: 5 )


Identify and define the types of active attacks ?


No comments:

Post a Comment

PLEASE COMMENT ABOUT YOUR VISIT AND MY SITE

Note: Only a member of this blog may post a comment.