0% found this document useful (0 votes)
11 views

999

final term

Uploaded by

bs160400170
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

999

final term

Uploaded by

bs160400170
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

FINALTERM EXAMINATION

Fall 2008 CS507- Information Systems (Session - 2)


Question No: 1 ( Marks: 1 ) - Please choose one

In which of the following category information is presented in its original form,

.
lue
neither interpreted nor condensed nor evaluated by other writers ?

va
► Primary Information PAGE 2

igh
► Tertiary Information

...H
► Secondary Information

ice
► All of above

erv
ys
Question No: 2 ( Marks: 1 ) - Please choose one

as
Ethical issues may be categorized into which of the following types?
...E
► Privacy
ice

►Accuracy
ho
tc

►Property
es

►All of above PAGE 196


.B
....

Question No: 3 ( Marks: 1 ) - Please choose one


m.

After her third data processing clerk showed up at work with wrist braces, Ms.
.co

Jackson called a specialty firm to assess the design of their work environment.
sk
de

This firm specializes in :


/vu

► video display terminals


p:/
htt

►Ergonomics

►lighting

►furniture layout

Question No: 4 ( Marks: 1 ) - Please choose one


A person or a team who leads a change project or business-wide initiative by

defining, researching, planning, building business support and carefully

selecting volunteers to b of a change team

►True PAGE 194

►False

.
lue
Question No: 5 ( Marks: 1 ) - Please choose one

va
Leading ERP software vendors include SAP (SAP R/3), Oracle and PeopleSoft

igh
...H
►True

ice
►False

erv
ERP software systems may include application modulesfor supporting marketing,

ys
finance, accounting and human resources.
as
Question No: 6 ( Marks: 1 ) - Please choose one
...E

What are the steps and their order in EC order fulfillm


ice
ho

►Ensuring payment, checking availability, arranging shipmen production,


tc

purchasing & warehousing, contacts with customers a


es
.B

► Ensuring payment, checking availability, arranging shipment, i production,


....

purchasing & warehousing, and contacts with customers


m.
.co

►Ensuring payment, checking availability, arranging shipmen production, plant


sk

services, purchasing & warehousing, and contact


de

► Ensuring payment, checking availability, arranging shipment, insurance,


/vu
p:/

production, plant services, purchasing & warehousing, contacts with


htt

customers and returns

Question No: 7 ( Marks: 1 ) - Please choose one

With a decision environment, there is the possibility of having very quick and

very accurate feedback on the decision process.


► Closed-loop PAGE 25

► Open-loop

► Closed System

Question No: 8 ( Marks: 1 ) - Please choose one

The major purpose of enhancing web security is to protect web ser the use of

.
lue
internet.

va
► True PAGE 170

igh
...H
► False

ice
Question No: 9 ( Marks: 1 ) - Please choose one

erv
Which of the following usually contain records describing system events, or user

ys
events?

► An event-oriented log PAGE 149


as
...E

► A record of every keystroke


ice
ho

► Option a and b
tc

► None of these
es
.B

Question No: 10 ( Marks: 1 ) - Please choose one


....

Which of the following is the science and art of transforming messages to make
m.
.co

them secure and immune to attacks?


sk

► Cryptography
de

► Crypto analysis
/vu
p:/

► Decryption
htt

► All of these

In literal terms, cryptography means science of coded writing.

Question No: 11 ( Marks: 1 ) - Please choose one

Crypto Analysis is the science and art of transforming messages to make them
secure and immune to attacks.

► False

► True

Question No: 12 ( Marks: 1 ) - Please choose one

Which of the following focus on detecting potentially abnormal behavior in

.
lue
function of operating system or request made by application software?

va
► Scanners

igh
...H
► Anti virus

ice
► Behavior blockers PAGE 143

erv
► Active Monitors

ys
Question No: 13 ( Marks: 1 ) - Please choose one
as
Which of the following is the primary method for keeping a computer secure
...E

from intruders?
ice
ho

► Anti virus
tc

► Scanners
es
.B

► Firewall PAGE 145


....

► Password
m.
.co

Question No: 14 ( Marks: 1 ) - Please choose one


sk

In case of logical intrusion, the intruder might be trying to have an unauthorized


de

access to the system.


/vu
p:/

► True PAGE 139


htt

► False

Question No: 15 ( Marks: 1 ) - Please choose one

A denial-of-service attack floods a Web site with so many requests for services

that it slows down or crashes


► True

► False

Question No: 16 ( Marks: 1 ) - Please choose one

The main source of bugs in computer programs is the complexity of decisionmaking

code.

.
lue
► True

va
► False

igh
...H
Question No: 17 ( Marks: 1 ) - Please choose one

ice
Which of the following is some action or event that can lead to a loss?

erv
►Threat PAGE 132

ys
►Damage

► Accident
as
...E

►None of above
ice
ho

Question No: 18 ( Marks: 1 ) - Please choose one


tc

The damage caused by the intrusion is referred as the :


es
.B

►Threats
....

► Damages
m.
.co

►Physical Threats PAGE 133


sk

► Logical Threats
de

Question No: 19 ( Marks: 1 ) - Please choose one


/vu
p:/

Which of the following is an object that exists and is distinguishable from oth
htt

objects?

► Entity 113

► Attribute

► Object
► Instance

Question No: 20 ( Marks: 1 ) - Please choose one

The emerging class of applications focuses on Personalized decision support

► TRUE

► FALSE

.
lue
Question No: 21 ( Marks: 1 ) - Please choose one

va
Decision making is the cognitive process of selecting a course of action from

igh
...H
among alternatives.

ice
► Multiple59

erv
► Double

ys
► Triple
as
Question No: 22 ( Marks: 1 ) - Please choose one
...E

MIS is the primary source for the managers to be aware of red-alerts.


ice
ho

► TRUE PAGE 61
tc

► FALSE
es
.B

Question No: 23 ( Marks: 1 ) - Please choose one


....

In final product is intangible


m.
.co

► Service sector PAGE 8


sk

► Manufacturing Sector
de

► Trading sector
/vu
p:/

Question No: 24 ( Marks: 1 ) - Please choose one


htt

Which of the following model combines the elements of the waterfall model with

the philosophy of prototyping?

► Iterative

► Incremental PAGE 84
► Raid

Question No: 25 ( Marks: 1 ) - Please choose one

Operations are usually called via

► Functions

► Signatures

.
lue
► Methods

va
Question No: 26 ( Marks: 1 ) - Please choose one

igh
...H
Control Trial can be used together with access controls to identify and provide

ice
information about users suspected of improper modification of data.

erv
► True

ys
► False
as
AUDIT trails can be used together with access controls to identify and provide
...E

information
ice
ho

Question No: 27 ( Marks: 1 ) - Please choose one


tc

Risk Management includes assessment of controls already been implemented or


es
.B

planned probability that they can be broken, assessment of potential loss despite
....

such controls existing.


m.
.co

► True
sk

► False PAGE
de

CONTROL ANALYSIS includes assessment of controls already been


/vu
p:/

implemented or planned probability that they can be broken, assessment of


htt

potential loss despite such controls

Question No: 28 ( Marks: 1 ) - Please choose one

A______is the possibility of a problem, where a occurred.

► Risk
► Threat

► Intrusion

Question No: 29 ( Marks: 1 ) - Please choose one

A Protocol is an agreed-upon set of conventions that defines the rules of

communication.

.
lue
► True page 128

va
► False

igh
...H
Question No: 30 ( Marks: 1 ) - Please choose one

ice
Benefits to ERP systems are that they can be extra time-consuming to implement.

erv
► True

ys
► False

Question No: 31 ( Marks: 1 )


as
...E

Define Risk Mitigation.


ice
ho

Question No: 32 ( Marks: 1 )


tc

Identify types of change management.


es
.B

Question No: 33 ( Marks: 2 )


....

Identify what information is needed bef


m.
.co

Question No: 34 ( Marks: 2 )


sk

Why process symbol is used in the Flow


de

Question No: 35 ( Marks: 3 )


/vu
p:/

What are the objective/purposes of the D


htt

Question No: 36 ( Marks: 3 )

What are hackers?

Question No: 37 ( Marks: 3 )

Identify draw backs to ERP systems.


Question No: 38 ( Marks: 5 )

How will you differentiate CSF from K

Question No: 39 ( Marks: 5 )

Identify and define the types of active att

Question No: 40 ( Marks: 10)

.
lue
The concept of security applies to all information. Discuss what is the objective

va
and scope of Security? What may be the security issues regarding information

igh
...H
and what will be the management responsibility to resolve these issues?

ice
Question No: 41 ( Marks: 10 )

erv
What is polymorphism? Define with example.

ys
as
...E
ice
ho
tc
es
.B
....
m.
.co
sk
de
/vu
p:/
htt

You might also like