PROMOTE MY BLOG: JUST CLICK BELOW BUTTON

Search Any Paper On This Blog

Thursday, July 21, 2011

::: vuaskari.com ::: CS507 Subjective Part


CS507 Final Term Subjective PArt

Kamran Shahzad (Kamra Cantt):


ü      Define Business Continuity Planning? 2

Ans:

"Business Continuity Planning (BCP) is a methodology used to create a plan for how an organization will resume partially or completely interrupted critical functions within a predetermined time after a disaster or disruption."

"BCP is the process where by the institutions ensures the maintenance and recovery of operations including services to customers when confronted with adverse events such as natural disasters, technology failure, human error and terrorism."

 

ü      Define Class? 2

Ans:

A class is defined as

"The purpose of a class is to specify a classification of objects and to specify the features that characterize the structure and behavior of those objects."

 

A class is any uniquely identified abstraction, that is, model of a set of logically related objects that share the same or similar characteristics. The purpose of a class is to specify a classification of objects and to specify the features that characterize the structure and behavior of those objects.

 

ü      Identify types of change management? 2 marks

Ans:

Change management

Change management means to plan, initiate, realize, control, and finally stabilize change processes on both, corporate and personal level. Implementation of ERP or any other integration software needs commitment and proper management. Managing change in implementation projects has become a serious concern for the management.

 

Types of Change

1. Organizational Development: This is the more gradual and evolutionary approach to change. It bases on the assumption that it is possible to align corporate objectives with the individual employees' objectives. In practice, however, this will rarely be possible.

 

2. Reengineering: This is known as corporate transformation or business transformation. It is the more radical form of change management, since it challenges all elements of processes or structures that have evolved over time.

 

ü      List down any three new dimensions of MKIS? 2

Ans:

New Dimensions in MKIS

Through extensive use of computers in marketing field, newer concepts are emerging in marketing field, which are revolutionizing the way customers were dealt with.

·        Customer Relationship management (CRM)

·        Sales Force Automation (SFA)

·        Call Centres

 

ü      What are the foundation concepts of Business Process of re-engineering? 3

Ans:

Business Process Reengineering

 "Reengineering is the fundamental rethinking and redesign of business processes to achieve dramatic improvements in critical, contemporary measures of performance, such as cost, quality, service and speed."

(Hammer & Champy, 1993)

 

The concept of business process reengineering can be understood in the following manner.

 

"The analysis and design of workflow and processes within and between organizations"

(Davenport and Short, 1990)

 

The definition adds another aspect to the definition. It extends the concept of BPR by studying the links of various procedures used by and between organizations. A number of processes undertaken within the organization may have links with external organizations either as input or output. For example, raw material purchases from suppliers are an integral part of planning, production and sales. Hence making the supplier more efficient to deliver on time becomes critical, industrial customers placing regular huge volume orders in accordance with theirs own plans. You as the supplier need this information to input into your own planning.

 

 

ü      If a company wants to update its existing information system in an economical way, what integration methods of information system will be used? 3

Ans:

Integrating systems

All systems are interfaced with one another, the input in one system automatically updating the data in the other relevant system. We thus observe simultaneous Data sharing between various systems and simultaneous execution of different business processes.

Methods of integration

Information systems can be integrated in the following ways.

• Connect Existing modules/system

• Use Supply Chain Management (SCM) Software

• Use ERP Software

 

ü      What do you understand by virus? Identify its attacking computers? 5

Ans:

Viruses

It is Software used to infect a computer. After the virus code is written, it is buried within an existing program. Once that program is executed, the virus code is activated and attaches copies of itself to other programs in the system. Infected programs copy the virus to other programs.

It may be benign (gentle) or have a negative effect, such as causing a program to operate incorrectly or corrupting a computer's memory. The term virus is a generic term applied to a variety of malicious computer programs that send out requests to the operating system of the host system under attack to append the virus to other programs.

 

Attacking Targets

Generally, viruses attack four parts of the computer.

1.      Executable program files

2.      The file-directory system, which tracks the location of all the computers files

3.      Boot and system areas, which are needed to start the computer

4.      Data files

 

ü      What do you understand by Change Management?  Discuss various types of changes? 5

Ans:

Change management

Change management means to plan, initiate, realize, control, and finally stabilize change processes on both, corporate and personal level. Implementation of ERP or any other integration software needs commitment and proper management. Managing change in implementation projects has become a serious concern for the management.

 

Types of Change

1. Organizational Development: This is the more gradual and evolutionary approach to change. It bases on the assumption that it is possible to align corporate objectives with the individual employees' objectives. In practice, however, this will rarely be possible.

 

2. Reengineering: This is known as corporate transformation or business transformation. It is the more radical form of change management, since it challenges all elements of processes or structures that have evolved over time


ü      Explain web security threats in terms of its types? 5

Ans:

There are two major classes of security threats

1. Passive Attacks

This class of network attacks involves probing for network information. These passive attacks can lead to actual active attacks or intrusions/penetrations into an organization's network. By probing for network information, the intruder obtains network information as that can be used to target a particular system or set of systems during an actual attack.

 

Types of Passive attacks

Examples of passive attacks that gather network information include the following:

• Network Analysis

• Eavesdropping

• Traffic Analysis

 

2. Active Attacks

Once enough network information has been gathered, the intruder will launch an actual attack against a targeted system to either gain complete control over that system or enough control to cause certain threats to be realized. This may include obtaining unauthorized access to modify data or programs, causing a denial of service, escalating privileges, accessing other systems. They affect the integrity, availability and authentication attributes of network security.

 

Types of Active attacks

Common form of active attacks may include the following:

Masquerading – involves carrying out unauthorized activity by impersonating a legitimate user of the system.

Piggybacking – involves intercepting communications between the operating system and the user and modifying them or substituting new messages.

Spoofing – A penetrator fools users into thinking they are interacting with the operating system. He duplicates logon procedure and captures pass word.

Backdoors/trapdoors – it allows user to employ the facilities of the operating system without being subject to the normal controls.

Trojan horse – Users execute the program written by the penetrator. The program undertakes unauthorized activities e.g. a copy of the sensitive data.

 

ü      Why distributed systems have same performance over non-distributed systems? 2

 

ü      Reasons for using distributed system?  3

 

ü      What do you think about the way Information Systems influence and organization, people and technology? 3



--
The Few, The Proud, The Askarians.



Admin Rajpoot
MBA-HR Final Semester
VU Askari





--
We say, "Be one as Pakistani Nation and grow up for Pakistan's Future". Wish you all the best. Join www.vuaskari.com,
To post to this group, send email to vuaskari_com@googlegroups.com
Visit these groups:
This (Main) Group:http://groups.google.com/group/vuaskari_com?hl=en?hl=en
MIT/MCS Group: http://groups.google.com/group/vu_askarimit?hl=en?hl=en
HRM Group: http://groups.google.com/group/askari_hrm?hl=en?hl=en
Banking Group: http://groups.google.com/group/askari_banking?hl=en?hl=en
Management: https://groups.google.com/group/vuaskari_mgt?hl=en
Marketing: https://groups.google.com/group/vuaskari_mkt?hl=en
MIS Group: http://groups.google.com/group/askari_mis?hl=en

No comments:

Post a Comment

PLEASE COMMENT ABOUT YOUR VISIT AND MY SITE

Note: Only a member of this blog may post a comment.