VUsolutions on Facebook

This website is now MOVED to new domain, i.e. www.VUsolutions.com.


SO, now to onward, for any kind of data & help you may visit www.VUsolutions.com

NOTE: This blog having all past papers from midterm & final term exams, and uploaded on the same day when the papers was held. For SOLVED PAPERS you may visit VUsolutions GURU website. We dedicated VUsolutions GURU website just for past SOLVED papers & SOLVED online quizzes.

VU Past solved papers

Wednesday, August 11, 2010

CS507- Information Systems Spring 2010

FINALTERM EXAMINATION

Spring 2010


CS507- Information Systems
Time: 90 min
Marks: 60
Question No: 1 ( Marks: 1 ) - Please choose one
The organizational structures are formulated in order to efficiently manage which of the following:
Business Cost
Business Operations
Business Size
Question No: 2 ( Marks: 1 ) - Please choose one
Leading ERP software vendors include SAP (SAP R/3), Oracle and PeopleSoft.
► True
► False


Question No: 3 ( Marks: 1 ) - Please choose one
Business-to-business EC (B2B) is one of the types of ECommerce.
► True
► False
Question No: 4 ( Marks: 1 ) - Please choose one
---------- simply means a particular technique of directing one's attention in learning, discovery or problem solving.
Robustness
Heuristic
DSS
EIS
Question No: 5 ( Marks: 1 ) - Please choose one
Which of the following works in conjunction with routers and firewalls by monitoring network usage anomalies to protect a company’s information systems resources from external as well as internal misuse?


Encryption
Intrusion Detection Systems
Firewall
All of above
Question No: 6 ( Marks: 1 ) - Please choose one
A risk is the possibility of a problem, whereas a problem is a risk that has already occurred.
► True
► False
Question No: 7 ( Marks: 1 ) - Please choose one
Which of the following is a methodology used to create a plan for how an organization will resume partially or completely interrupted critical functions within a predetermined time after a disaster or disruption?
► Audit Logs
► Disaster Plan
► Audit Trials
► Business continuity Plan
Question No: 8 ( Marks: 1 ) - Please choose one
Documentation may include program code of application softwares, technical manuals, user manuals etc.
True
► False


Question No: 9 ( Marks: 1 ) - Please choose one
Input controls monitor the initial handshaking procedure of the user with the operating system.
True
► False
Question No: 10 ( Marks: 1 ) - Please choose one
Processing instructions carried out by the operating system and application software should be monitored by implementation of controls.
True
► False
Question No: 11 ( Marks: 1 ) - Please choose one
Firewall is the primary method for keeping a computer secure from intruders.
True
► False
Question No: 12 ( Marks: 1 ) - Please choose one
Which of the following is a data model or diagram for high-level descriptions of conceptual data model.
ERD
► Flow Chart
► Algorithm
► DFD
Question No: 13 ( Marks: 1 ) - Please choose one
Which of the following is a project management technique that divides complex projects into
smaller, more easily managed segments or phases?
SDLC
► System Design
► System Analysis
► Audit Trials


Question No: 14 ( Marks: 1 ) - Please choose one
Which of the following has collection of predefined procedures related to each other?
Organization
System
► Firm
Question No: 15 ( Marks: 1 ) - Please choose one
Which of the following increment in incremental model is usually the core product which addresses the basic requirements of the system?
► First
► Second
► Third
Question No: 16 ( Marks: 1 ) - Please choose one
__________ overwrites every program/software/file it infects with itself. Hence the infected file no longer functions.
Dropper
Overwriting Viruses
Boot sector Virus
Question No: 17 ( Marks: 1 ) - Please choose one
__________ is a person who attempts to invade the privacy of the system.
Hacktivsts
Hackers
Crackers
Question No: 18 ( Marks: 1 ) - Please choose one
Individuals using their skills to forward a political agenda, possibly breaking the law
in the process, but justifying their actions for political reasons are called ________
Hacktivsts
Crackers
Hackers


Question No: 19 ( Marks: 1 ) - Please choose one
Both software objects and real time objects have__________
Identity and behavior
Identity and state
State and behavior
Question No: 20 ( Marks: 1 ) - Please choose one
Characteristics of object are called ________
Methods
Attributes
Status
Question No: 21 ( Marks: 1 ) - Please choose one
Which of the following carry characteristics of specialization?
Sub classes
Sub Interfaces
Sub objects
Question No: 22 ( Marks: 1 ) - Please choose one
Audit Trial is a weakness that can be accidentally triggered or intentionally exploited.
True
► False
Question No: 23 ( Marks: 1 ) - Please choose one
M-Commerce (mobile commerce) refers to the conduct of e-commerce via wireless devices.
True
► False
Question No: 24 ( Marks: 1 ) - Please choose one
Buying and selling of products, services and information via computer networks, primarily through Internet is :


E-Commerce
E-Business
Web Surfing
BPR
Question No: 25 ( Marks: 1 ) - Please choose one
Which of the following helps in getting the right material and physical resources together at the right place and at the right time to meet the customer’s requirements?
► BRP
► MRP
► CRP
Question No: 26 ( Marks: 1 ) - Please choose one
__________ is an association among entities. There has to be a relationship between two entities
Value Sets
Cardinality
Relationships
Question No: 27 ( Marks: 1 ) - Please choose one
One of the methods of integrating different business information systems is Supply Chain management software.
► True
► False
Question No: 28 ( Marks: 1 ) - Please choose one
Which of the following carries connotations of the class to which the object belonged?


Class
Instance
Structure
None of the above
Question No: 29 ( Marks: 1 ) - Please choose one
Object oriented analysis focuses on _________
Modular approach
Incremental approach
Traditional approach
Derived approach
Question No: 30 ( Marks: 1 ) - Please choose one
Evaluate recovery patterns, relevant costs involved is an example of monitoring
TRUE
► FALSE
Question No: 31 ( Marks: 2 )
What are the information requirements of the service sector?
Question No: 32 ( Marks: 2 )
Define Business Continuity Planning (BCP) ?
Question No: 33 ( Marks: 2 )
Identify different types of Information assets ?
Question No: 34 ( Marks: 2 )
Identify components of Intrusion detection system ?
Question No: 35 ( Marks: 3 )
What is the necessary information needed to begin impact analysis?


Question No: 36 ( Marks: 3 )
Define Active attacks?
Question No: 37 ( Marks: 3 )
Why is it needed for Accounting information system (AIS) to be linked with all other information systems in an organization?
Question No: 38 ( Marks: 3 )
Identify any six factors that should be considered in order for change to be successful?
Question No: 39 ( Marks: 5 )
What do you understand by Privacy? How can privacy be protected? List threats to Privacy.
Question No: 40 ( Marks: 5 )
Give any two examples to prove that Audit trails help to provide variants from normal behavior which may lead to unauthorized usage of resources.
:::::::::::::::::::::::::::::::::::::::::::::For more posts, click "Older Posts"::::::::::::::::::::::::::::::::::::::::::