FINALTERM EXAMINATION
Fall 2008 CS507- Information Systems (Session - 1)
Question No: 1 ( Marks: 1 ) - Please choose one
Medium Sized organizations are normally a family ownership run by
.
lue
► Father & Sons
va
► Brothers
igh
► Father, Sons and Brothers PAGE 7
.H
► None of the given
e..
vic
Question No: 2 ( Marks: 1 ) - Please choose one
er
The organization refers to a organizational structure with few or no levels of
ys
intervening management between staff and managers is called
as
...E
► Hierarchical organization
ice
► Flat Organization PAGE 10
ho
► Pyramid Organization
tc
es
Question No: 3 ( Marks: 1 ) - Please choose one
.B
ERP's major objective is to tightly integrate the functional areas of the organization
....
m.
and to enable seamless information flows across the functional areas.
.co
► True
sk
► False
de
/vu
Question No: 4 ( Marks: 1 ) - Please choose one
p:/
Which of the following integrate the planning, ma of the organization?
htt
► ERP
► CRM
► ESS
► OIS
Question No: 5 ( Marks: 1 ) - Please choose one
What are the steps and their order in EC order fulfillment
► Ensuring payment, checking availability, arranging shipment, insurance,
production, purchasing & warehousing, contacts with customers and returns
.
lue
► Ensuring payment, checking availability, arranging shipment, insurance,
va
production, purchasing & warehousing, and contacts with customers
igh
► Ensuring payment, checking availability, arranging shipment, insurance,
.H
e..
production, plant services, purchasing & warehousing, and contacts with custom
vic
► Ensuring payment, checking availability, arranging shipment, insurance,
er
ys
production, plant services, purchasing & warehousing, contacts with customers
and returns
as
...E
Question No: 6 ( Marks: 1 ) - Please choose one
ice
Data warehouses are generally batch updated at the end of the day, week or some
ho
tc
period.
es
► False
.B
....
►True 36
m.
Question No: 7 ( Marks: 1 ) - Please choose one
.co
sk
The Internet Protocol is designed solely for the addressing and routing of data
de
packets across a network
/vu
► True PAGE 164
p:/
htt
► False
Question No: 8 ( Marks: 1 ) - Please choose one
Which one of the following are partially configured, usually with network
connections and selected peripheral equipment, such as disk drives, tape drives and
controllers, but without the main computer.
► Cold Site
► Warm Site PAGE 162
► Hot Site
► Third Party Arrangements
.
lue
Question No: 9 ( Marks: 1 ) - Please choose one
va
Likelihood Determination phase determines that a potent by a given threat-source.
igh
► True PAGE 156
.H
e..
► False
vic
Question No: 10 ( Marks: 1 ) - Please choose one
er
ys
Threat capacity is an input source for Likelihood determination
► False
as
...E
► True
ice
Question No: 11 ( Marks: 1 ) - Please choose one
ho
tc
Which of the following is the primary method for keeping a computer secure from
es
intruders?
.B
....
► Anti virus
m.
► Scanners
.co
sk
► Firewall 145
de
► Password
/vu
Question No: 12 ( Marks: 1 ) - Please choose one
p:/
htt
Decisions in which the decision maker must provide judgment, evaluation, and
insights into the problem definition would be characterized as:
► Structured
► Semi Structured
► Unstructured
Non-structured
Question No: 13 ( Marks: 1 ) - Please choose one
Wireless computing devices are not subject to viruses.
► False
.
lue
► True
va
Question No: 14 ( Marks: 1 ) - Please choose one
igh
Which of the following is a private enterprise owned communication network that
.H
e..
uses internet protocols, network connectivity, and public telecommunication system
vic
to share organization's information or operations with its employees, and to enable
er
ys
the employees to communicate with each other?
► Internet PAGE 128
as
...E
► Intranet
ice
► Wireless communication
ho
tc
► None of above
es
Question No: 15 ( Marks: 1 ) - Please choose one
.B
....
Availability of which of the following to various users also depends on how the
m.
information is processed?
.co
sk
► Information PAGE 125
de
► Data
/vu
► Log file
p:/
htt
► None of above
Question No: 16 ( Marks: 1 ) - Please choose one
Which of the following helps an organization in gaining competitive advantage in
the use of processes; effectiveness and efficiency should also be kept in mind?
► BPR PAGE 124
► CSF
► SPR
Question No: 17 ( Marks: 1 ) - Please choose one
CRM software requires highly integrated environment for high Productivity, which
.
lue
is rarely available.
va
► True PAGE 45
igh
► False
.H
e..
Question No: 18 ( Marks: 1 ) - Please choose one
vic
Existence of functional departments in each organization may vary with the nature
er
ys
of industry and the nature of products/services being offered.
► True PAGE 47
as
...E
► False
ice
Question No: 19 ( Marks: 1 ) - Please choose one
ho
tc
Public companies are example of
es
► Small Organization
.B
....
► Large Organization PAGE 8
m.
► Medium organization
.co
sk
Question No: 20 ( Marks: 1 ) - Please choose one
de
__________serves the concurrent monitoring as the system is being used.
/vu
► Scanners
p:/
htt
► Active monitors PAGE 143
► Behavior blockers
Question No: 21 ( Marks: 1 ) - Please choose one
While developing software object oriented analysis focuses on
► Modular approach PAGE 119
► Incremental approach
► Traditional approach
► Derived approach
Question No: 22 ( Marks: 1 ) - Please choose one
.
lue
Testing is easy for the software that is developed using OOAD due to use of
va
► Modular approach
igh
► Real time modeling
.H
e..
► Usability feature
vic
Question No: 23 ( Marks: 1 ) - Please choose one
er
ys
Providing access to the data and behavior is through an object's interface is called
► Message passing
as
...E
► Polymorphism
ice
► Encapsulation
ho
tc
Question No: 24 ( Marks: 1 ) - Please choose one
es
There are typically two kinds of audit records.
.B
....
► True PAGE 149
m.
► False
.co
sk
Question No: 25 ( Marks: 1 ) - Please choose one
de
In assessing risks for an IT system, is the first step.
/vu
► To define the scope of the effort. PAGE 153
p:/
htt
► Vulnerability Assesment
► threat identification
Question No: 27 ( Marks: 1 ) - Please choose one
The two major criteria that are used to analyze risks are Operational Effects and
Situational Impacts
► True
► False
Question No: 28 ( Marks: 1 ) - Please choose one
The Internet Protocol is designed solely for the connecting and routing of data
.
lue
packets across a internet.
va
► True
igh
► False
.H
e..
routing of data packets across a network
vic
Question No: 29 ( Marks: 1 ) - Please choose one
er
ys
An IDS with the neural network feature traffic on the network and creates a database
► True PAGE 168
as
...E
► False
ice
Question No: 30 ( Marks: 1 ) - Please choose one
ho
tc
BPR's major objective is to tightly integrate the fun and to enable seamless
es
information flows across the function
.B
....
► True DBD
m.
► False
.co
sk
Question No: 31 ( Marks: 1 )
de
What is virus?
/vu
Software based used to infect a computer.
p:/
htt
Question No: 32 ( Marks: 1 )
Define the basic objective of Risk management
Question No: 33 ( Marks: 2 )
Identify the following flow chart symbol
Question No: 34 ( Marks: 2 )
Define Firewall.
Firewall is the primary method for keeping a computer secure from intruders. A
firewall allows or blocks traffic into and out of a private network or the user's
computer.
.
lue
Question No: 35 ( Marks: 3 )
va
What do you understand by Digital Cert
igh
Question No: 36 ( Marks: 3 )
.H
e..
What are the purposes of system analyses
vic
Question No: 37 ( Marks: 3 )
er
ys
What are hackers?
as
Hackers are normally skilled programmers, and have been known to crack system
...E
passwords, with quite an ease.
ice
Question No: 38 ( Marks: 5 )
ho
tc
Discuss the types of threats in detail
es
• Physical threat – This refers to the damage caused to the physical
.B
....
infrastructure of the information
m.
systems, e.g.
.co
sk
• Fire
de
• Water
/vu
• Energy Variations
p:/
htt
• Structural damage
• Pollution
• Intrusion
Logical – This refers to damage caused to the software and data without physical
presence.
• Viruses and worms
• Logical intrusion
Question No: 39 ( Marks: 5 )
Discuss Risk Determination briefly.
.
lue
The purpose of this step is to assess the level of risk to the IT system. The
va
determination of particular threat can be expressed as a function of
igh
1. The likelihood of a given threat-source’s attempting to exercise a given
.H
e..
vulnerability (system flaw)
vic
2. The magnitude of the impact should a threat source successfully exercise a
er
ys
vulnerability
as
3. The adequacy of planned or existing security controls for reducing or
...E
eliminating risk.
ice
Question No: 40 ( Marks: 10 )
ho
tc
Discuss different ways to control the virus
es
Question No: 41 ( Marks: 10 )
.B
....
What is reusable software?
m.
The software developed using object oriented approach can be easily reused due to
.co
sk
independence/uniqueness of the objects i.e. an independent accounting module
de
built in object oriented environment can be made a part of a complete ERP solution
/vu
without developing it again from scratch for ERP.
p:/
htt