0% found this document useful (0 votes)
17 views9 pages

CS507 Final Exam Review

final term

Uploaded by

bs160400170
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views9 pages

CS507 Final Exam Review

final term

Uploaded by

bs160400170
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

FINALTERM EXAMINATION

Fall 2008 CS507- Information Systems (Session - 1)


Question No: 1 ( Marks: 1 ) - Please choose one

Medium Sized organizations are normally a family ownership run by

.
lue
► Father & Sons

va
► Brothers

igh
► Father, Sons and Brothers PAGE 7

.H
► None of the given

e..
vic
Question No: 2 ( Marks: 1 ) - Please choose one

er
The organization refers to a organizational structure with few or no levels of

ys
intervening management between staff and managers is called
as
...E
► Hierarchical organization
ice

► Flat Organization PAGE 10


ho

► Pyramid Organization
tc
es

Question No: 3 ( Marks: 1 ) - Please choose one


.B

ERP's major objective is to tightly integrate the functional areas of the organization
....
m.

and to enable seamless information flows across the functional areas.


.co

► True
sk

► False
de
/vu

Question No: 4 ( Marks: 1 ) - Please choose one


p:/

Which of the following integrate the planning, ma of the organization?


htt

► ERP

► CRM

► ESS
► OIS

Question No: 5 ( Marks: 1 ) - Please choose one

What are the steps and their order in EC order fulfillment

► Ensuring payment, checking availability, arranging shipment, insurance,

production, purchasing & warehousing, contacts with customers and returns

.
lue
► Ensuring payment, checking availability, arranging shipment, insurance,

va
production, purchasing & warehousing, and contacts with customers

igh
► Ensuring payment, checking availability, arranging shipment, insurance,

.H
e..
production, plant services, purchasing & warehousing, and contacts with custom

vic
► Ensuring payment, checking availability, arranging shipment, insurance,

er
ys
production, plant services, purchasing & warehousing, contacts with customers

and returns
as
...E

Question No: 6 ( Marks: 1 ) - Please choose one


ice

Data warehouses are generally batch updated at the end of the day, week or some
ho
tc

period.
es

► False
.B
....

►True 36
m.

Question No: 7 ( Marks: 1 ) - Please choose one


.co
sk

The Internet Protocol is designed solely for the addressing and routing of data
de

packets across a network


/vu

► True PAGE 164


p:/
htt

► False

Question No: 8 ( Marks: 1 ) - Please choose one

Which one of the following are partially configured, usually with network

connections and selected peripheral equipment, such as disk drives, tape drives and
controllers, but without the main computer.

► Cold Site

► Warm Site PAGE 162

► Hot Site

► Third Party Arrangements

.
lue
Question No: 9 ( Marks: 1 ) - Please choose one

va
Likelihood Determination phase determines that a potent by a given threat-source.

igh
► True PAGE 156

.H
e..
► False

vic
Question No: 10 ( Marks: 1 ) - Please choose one

er
ys
Threat capacity is an input source for Likelihood determination

► False
as
...E

► True
ice

Question No: 11 ( Marks: 1 ) - Please choose one


ho
tc

Which of the following is the primary method for keeping a computer secure from
es

intruders?
.B
....

► Anti virus
m.

► Scanners
.co
sk

► Firewall 145
de

► Password
/vu

Question No: 12 ( Marks: 1 ) - Please choose one


p:/
htt

Decisions in which the decision maker must provide judgment, evaluation, and

insights into the problem definition would be characterized as:

► Structured

► Semi Structured
► Unstructured

Non-structured

Question No: 13 ( Marks: 1 ) - Please choose one

Wireless computing devices are not subject to viruses.

► False

.
lue
► True

va
Question No: 14 ( Marks: 1 ) - Please choose one

igh
Which of the following is a private enterprise owned communication network that

.H
e..
uses internet protocols, network connectivity, and public telecommunication system

vic
to share organization's information or operations with its employees, and to enable

er
ys
the employees to communicate with each other?

► Internet PAGE 128


as
...E

► Intranet
ice

► Wireless communication
ho
tc

► None of above
es

Question No: 15 ( Marks: 1 ) - Please choose one


.B
....

Availability of which of the following to various users also depends on how the
m.

information is processed?
.co
sk

► Information PAGE 125


de

► Data
/vu

► Log file
p:/
htt

► None of above

Question No: 16 ( Marks: 1 ) - Please choose one

Which of the following helps an organization in gaining competitive advantage in

the use of processes; effectiveness and efficiency should also be kept in mind?
► BPR PAGE 124

► CSF

► SPR

Question No: 17 ( Marks: 1 ) - Please choose one

CRM software requires highly integrated environment for high Productivity, which

.
lue
is rarely available.

va
► True PAGE 45

igh
► False

.H
e..
Question No: 18 ( Marks: 1 ) - Please choose one

vic
Existence of functional departments in each organization may vary with the nature

er
ys
of industry and the nature of products/services being offered.

► True PAGE 47
as
...E

► False
ice

Question No: 19 ( Marks: 1 ) - Please choose one


ho
tc

Public companies are example of


es

► Small Organization
.B
....

► Large Organization PAGE 8


m.

► Medium organization
.co
sk

Question No: 20 ( Marks: 1 ) - Please choose one


de

__________serves the concurrent monitoring as the system is being used.


/vu

► Scanners
p:/
htt

► Active monitors PAGE 143

► Behavior blockers

Question No: 21 ( Marks: 1 ) - Please choose one

While developing software object oriented analysis focuses on


► Modular approach PAGE 119

► Incremental approach

► Traditional approach

► Derived approach

Question No: 22 ( Marks: 1 ) - Please choose one

.
lue
Testing is easy for the software that is developed using OOAD due to use of

va
► Modular approach

igh
► Real time modeling

.H
e..
► Usability feature

vic
Question No: 23 ( Marks: 1 ) - Please choose one

er
ys
Providing access to the data and behavior is through an object's interface is called

► Message passing
as
...E

► Polymorphism
ice

► Encapsulation
ho
tc

Question No: 24 ( Marks: 1 ) - Please choose one


es

There are typically two kinds of audit records.


.B
....

► True PAGE 149


m.

► False
.co
sk

Question No: 25 ( Marks: 1 ) - Please choose one


de

In assessing risks for an IT system, is the first step.


/vu

► To define the scope of the effort. PAGE 153


p:/
htt

► Vulnerability Assesment

► threat identification

Question No: 27 ( Marks: 1 ) - Please choose one

The two major criteria that are used to analyze risks are Operational Effects and
Situational Impacts

► True

► False

Question No: 28 ( Marks: 1 ) - Please choose one

The Internet Protocol is designed solely for the connecting and routing of data

.
lue
packets across a internet.

va
► True

igh
► False

.H
e..
routing of data packets across a network

vic
Question No: 29 ( Marks: 1 ) - Please choose one

er
ys
An IDS with the neural network feature traffic on the network and creates a database

► True PAGE 168


as
...E

► False
ice

Question No: 30 ( Marks: 1 ) - Please choose one


ho
tc

BPR's major objective is to tightly integrate the fun and to enable seamless
es

information flows across the function


.B
....

► True DBD
m.

► False
.co
sk

Question No: 31 ( Marks: 1 )


de

What is virus?
/vu

Software based used to infect a computer.


p:/
htt

Question No: 32 ( Marks: 1 )

Define the basic objective of Risk management

Question No: 33 ( Marks: 2 )

Identify the following flow chart symbol


Question No: 34 ( Marks: 2 )

Define Firewall.

Firewall is the primary method for keeping a computer secure from intruders. A

firewall allows or blocks traffic into and out of a private network or the user's

computer.

.
lue
Question No: 35 ( Marks: 3 )

va
What do you understand by Digital Cert

igh
Question No: 36 ( Marks: 3 )

.H
e..
What are the purposes of system analyses

vic
Question No: 37 ( Marks: 3 )

er
ys
What are hackers?
as
Hackers are normally skilled programmers, and have been known to crack system
...E

passwords, with quite an ease.


ice

Question No: 38 ( Marks: 5 )


ho
tc

Discuss the types of threats in detail


es

• Physical threat – This refers to the damage caused to the physical


.B
....

infrastructure of the information


m.

systems, e.g.
.co
sk

• Fire
de

• Water
/vu

• Energy Variations
p:/
htt

• Structural damage

• Pollution

• Intrusion

Logical – This refers to damage caused to the software and data without physical
presence.

• Viruses and worms

• Logical intrusion

Question No: 39 ( Marks: 5 )

Discuss Risk Determination briefly.

.
lue
The purpose of this step is to assess the level of risk to the IT system. The

va
determination of particular threat can be expressed as a function of

igh
1. The likelihood of a given threat-source’s attempting to exercise a given

.H
e..
vulnerability (system flaw)

vic
2. The magnitude of the impact should a threat source successfully exercise a

er
ys
vulnerability
as
3. The adequacy of planned or existing security controls for reducing or
...E

eliminating risk.
ice

Question No: 40 ( Marks: 10 )


ho
tc

Discuss different ways to control the virus


es

Question No: 41 ( Marks: 10 )


.B
....

What is reusable software?


m.

The software developed using object oriented approach can be easily reused due to
.co
sk

independence/uniqueness of the objects i.e. an independent accounting module


de

built in object oriented environment can be made a part of a complete ERP solution
/vu

without developing it again from scratch for ERP.


p:/
htt

You might also like