We are Permanently Move to www.VUpk.net Please Join us there.

CS507 Final term Solved Paper 2010-1

Monday 3 September 2012
FINALTERM EXAMINATION
Spring 2010
CS507- Information Systems
Time: 90 min
                                                                                                                   M a r k s: 60
Question No: 1      ( M a r k s: 1 ) http://vuzs.net 
Information technology can lead to a decrease in the time for decision making. 

► True
► False 

Question No: 2      ( M a r k s: 1 ) http://vuzs.net
Customer touch point is a method of interaction with a customer, such as telephone, e-mail, a customer service or help desk, conventional mail, Web site and store.

► True
► False
A customer touch point is a method of interaction with a customer, such as telephone, e-mail, a customer service or help desk, conventional mail, Web site and store. 

Question No: 3      ( M a r k s: 1 ) http://vuzs.net
---------infrastructure consists of the physical facilities services and management that support all computing resources in an organization

► Information
► Decision
► Management
Information infrastructure consists of the physical facilities services and management that support l computing resources in an organization.

Question No: 4      ( M a r k s: 1 ) http://vuzs.net
Which of the following  refers to the process of identifying attempts to penetrate a system and gain unauthorized access?

► Intrusion detection
► Audit Trial
► Control Trial
► Documentation
Intrusion detection refers to the process of identifying attempts to penetrate a system and gain unauthorized access.

Question No: 5      ( M a r k s: 1 ) http://vuzs.net
The departmental structures are --------------- in banking and financial sector.

► Different
► Same
► Mixed
The departmental structures are different in banking and financial sector.

Question No: 6      ( M a r k s: 1 ) http://vuzs.net
Input controls monitor the initial handshaking procedure of the user with the operating system.

► True
► False
Access controls monitor the initial handshaking procedure of the user with the operating system.

Question No: 7      ( M a r k s: 1 ) http://vuzs.net
Logical intrusion skills needed to exploit logical exposures are more technical and complex as compared to physical exposures.

► True
► False
Logical intrusion: The skills needed to exploit logical exposures are more technical and complex as compared to physical exposures. Generally a similar term used in relation to logical intrusion is hacking.

Question No: 8      ( M a r k s: 1 ) http://vuzs.net
MIS and DSS can be seen as having a systematic approach towards problem solution.

► True
► False
MIS and DSS can be seen as having a systematic approach towards problem solution.

Question No: 9      ( M a r k s: 1 ) http://vuzs.net
The protection of the interests of those relying on information, and the information systems and communications that delivers the information, from harm resulting from failures of availability, confidentiality, and integrity.

► False
► True
“The protection of the interests of those relying on information, and the information systems and communications that delivers the information, from harm resulting from failures of availability, confidentiality, and integrity.”

Question No: 10      ( M a r k s: 1 ) http://vuzs.net
Which of the following are knowledge workers who facilitate the development of information systems and computer applications by bridging the communications gap that exists between non-technical system users, and System designers and developers?

► System Analysts
► Software Engineers
► System Designers
► Chief Executives
Systems Analyst: “These are knowledge workers who facilitate the development of information systems and computer applications by bridging the communications gap that exists between non-technical system users, and System designers and developers.”

Question No: 11      ( M a r k s: 1 ) http://vuzs.net
______ is defined as “all elements that exist outside the boundary of the organization.

► Size
► Business Environment
► Business Structure
Business Environment is defined as “all elements that exist outside the boundary of the business (Organization).

Question No: 12      ( M a r k s: 1 ) http://vuzs.net
______ is the set of interconnected structural elements that provide the framework.

► System
► Organization
Ref: Infrastructure, generally, is the set of interconnected structural elements that provide the framework for supporting the entire structure. It usually applies only to structures that are artificial.

Question No: 13      ( M a r k s: 1 ) http://vuzs.net
Rectangle shape in the flow charts represents___________

► Decision
► Process
► Terminator

Question No: 14      ( M a r k s: 1 ) http://vuzs.net
Rounded shaped symbol in the flow chart is called ____________

► Connector
► Arrow
► Process

Question No: 15      ( M a r k s: 1 ) http://vuzs.net
__________ overwrites every program/software/file it infects with itself. Hence the infected file no longer functions.

► Dropper
► Boot sector Virus
Overwriting Viruses: As the name implies, it overwrites every program/software/file it infects with itself. Hence the infected file no longer functions.

Question No: 16      ( M a r k s: 1 ) http://vuzs.net
Object oriented analysis focuses on the _________

►States of objects
► Collaboration of objects
► Implementation of objects

Question No: 17      ( M a r k s: 1 ) http://vuzs.net
An information technology (IT) audit  is an Examination of the controls within an entity’s Information technology infrastructure .

► True
► False
An information technology (IT) audit or information systems (IS) audit is an examination of thecontrols within an entity's Information technology infrastructure.

Question No: 18      ( M a r k s: 1 ) http://vuzs.net
Web Site monitoring is the process used to view or record both the keystrokes entered by a computer user and the computer's response during an interactive session.

► True
► False
Keystroke monitoring is the process used to view or record both the keystrokes entered by a computer user and the computer's response during an interactive session.

Question No: 19      ( M a r k s: 1 ) http://vuzs.net
A _______________ is the possibility of a problem, whereas a problem is a risk that has already occured.

► Risk
► Threat
► Intrusion
A risk is the possibility of a problem, whereas a problem is a risk that has already occurred.

Question No: 20      ( M a r k s: 1 ) http://vuzs.net
The two major criteria that are used to analyze risks are Operational Effects and Situational Impacts

 True

Question No: 21      ( M a r k s: 1 ) http://vuzs.net
Access Control refers to the process of identifying attempts to penetrate a system and gain unauthorized access

► True
► False
Intrusion detection refers to the process of identifying attempts to penetrate a system and gain unauthorized access.

Question No: 22      ( M a r k s: 1 ) http://vuzs.net
M-Commerce stands for Mobile Commerce.

► True
► False
M-Commerce (mobile commerce) refers to the conduct of e-commerce via wireless devices.

Question No: 23      ( M a r k s: 1 ) http://vuzs.net 
Organizational Development is one of the types of Change.

► True
► False
Types of Change
• Organizational Development
• Reengineering

Question No: 24      ( M a r k s: 1 ) http://vuzs.net
Preparing a situation for change by disconfirming existing attitudes and behaviors is called Unfreezing.

► True
► False
Unfreezing: Preparing a situation for change by disconfirming existing attitudes and behaviors.

Question No: 25      ( M a r k s: 1 ) http://vuzs.net
Which of the following activity consists of the discovery, modeling, specification and evaluation of requirements?

► Development
► Design
► Requirement
► Implementation
"The development activity consisting of the discovery, modeling, specification and evaluation of requirements,"

Question No: 26      ( M a r k s: 1 ) http://vuzs.net
Which of the following scans the operating system and application software for any virus based on the viruses they contain.

► Antivirus
► Scanners
► Active Monitors
► Firewall
Scanners: They scan the operating system and application soft ware for any virus based on the viruses they contain.

Question No: 27      ( M a r k s: 1 ) http://vuzs.net
__________ is an association among entities. There has to be a relationship between two entities

► Value Sets
► Cardinality
► Relationships
Relationships: A relationship is an association among entities. There has to be a relationship between two entities.

Question No: 28      ( M a r k s: 1 ) http://vuzs.net
A dropper is a program not a virus.

► True
► False
Dropper: A dropper is a program not a virus. It installs a virus on the PC while performing another function.

Question No: 29      ( M a r k s: 1 ) http://vuzs.net
Every decision we take in daily life requires some sort of data about the alternatives available.

► True
► False
Every decision we take in daily life requires some sort of information not data

Question No: 30      ( M a r k s: 1 ) http://vuzs.net
________________helps organization in gaining competitive advantage in the use of processes, effectiveness and efficiency.

► BPR
► CSF
► SPR
► MIS
Use of BPR helps an organization in gaining competitive advantage in the use of processes, effectiveness and efficiency should also be kept in mind.

Question No: 31      ( M a r k s: 2 )
What is cryptography?

Answer:

Cryptography means science of coded writing. It is a security defends to make information incomprehensible if unlawful persons cut off the transmission. When the information is to be used, it can be decoded. “The exchange of data into a secret code for the secure transmission over a public network is called cryptography.”

Question No: 32      ( M a r k s: 2 )
What do you understand by Intrusion Detection Systems?

Answer:

An ID is used in balance to firewalls. An IDS works in combination with routers and firewalls and it monitor network that how much it used and It protects a company’s information systems resources from external as well as internal mistreatment.

Question No: 33      ( M a r k s: 2 )
List information Requirements for Medium sizes organizations.

Answer:

Information Requirements of Medium Sized Organizations:
  • As size of the organization increases, the importance of planning for information also increases.
  • The planning on long-term basis also helps in monitoring of information against planning.
Question No: 34      ( M a r k s: 2 )
Define Dropper and Trojan horse ?

Answer:

Trojan horse: Trojan horse is like it executes by user the program written by the penetrate. The program undertakes illegal actions e.g. a copy of the sensitive data and files. 

Dropper: A dropper is a program not a virus. It installs a virus on the PC while performing another function.

Question No: 35      ( M a r k s: 3 )
Designing file or database is a major component of system designing. Identify its basic purposes.

Answer:
Designing file or database
This serves following purposes:
• Data accessibility is ensured to the user is ensured as and when required.
• Data consistency – data updates in master file will automatically update the data in the whole system.
• Data is efficiently processed & stored.
• Data integrity that is Correctness of data is ensured.

Question No: 36      ( M a r k s: 3 )
What is the responsibility of the management of the organization to ensure the security of information systems?

Answer:

It is the responsibility of the management of the organization to ensure the security of information system. It must be sponsored by senior management. Management has a responsibility to ensure that the organization provides all secure information systems environment for users or customers. This will make users of information systems that are they feel secure and the importance of secure information environment.

Question No: 37      ( M a r k s: 3 )
Identify the information that is required before conducting an impact analysis?

Answer:

Impact analysis:
Before beginning the impact analysis, it is necessary to obtain the following necessary information:
• System mission
• System and data criticality
• System and data sensitivity

Question No: 38      ( M a r k s: 3 )
Define Reengineering?

Answer:
Reengineering: This is known as company transformation or business transformation. It is the more essential form of change management, since it works for all the elements of Processes or structures that have evolved over time.

Question No: 39      ( M a r k s: 5 )
Briefly discuss Risk Determination ?

Answer:

Risk Determination:
Risk determination means that phase of analyzing how much the information assets are uncovered to various threats known and thus count the loss cause to the asset through this threat. This phase relates to analysis of both physical and logical threats and comprises of four steps. Four steps are usually followed while analyzing the exposure.
The main reason of this step is to assess the level of risk to the IT system. The determination of exacting threat can be spoken as a meaning of
1 The likelihood of a given threat-source’s attempting to exercise a given weakness.
2. The magnitude of the impact should a threat source successfully exercise a susceptibility
3. The competence of planned or existing security controls for reducing or minimizing risk.

Question No: 40      ( M a r k s: 5 )
Discuss Technical Limitations of Ecommerce in comparison with Non-Technical Limitations in organizations ?

Answer:
Technical Limitations of Ecommerce in comparison with Non-Technical limitation in organization are that more cost to use for software and technology, reliability for certain processes.

Insufficient communications, the reason is that people don’t know about it. Software tools are not fixed and used in regular manner.

People don’t have enough access of internet and they have difficulty to adopt e-commerce infrastructure instead of organizational systems.

0 comments:

Post a Comment

Related Posts Plugin for WordPress, Blogger...