FINALTERM EXAMINATION
Spring 2010
CS507- Information Systems
Time: 90 min
Marks: 60
Question No: 1 ( Marks: 1 ) - Please choose one
The organizational structures are formulated in order to efficiently manage which of the following:
► Business Cost
► Business Operations
► Business Size
Question No: 2 ( Marks: 1 ) - Please choose one
Leading ERP software vendors include SAP (SAP R/3), Oracle and PeopleSoft.
► True
► False
Question No: 3 ( Marks: 1 ) - Please choose one
Business-to-business EC (B2B) is one of the types of ECommerce.
► True
► False
Question No: 4 ( Marks: 1 ) - Please choose one
---------- simply means a particular technique of directing one's attention in learning, discovery or problem solving.
► Robustness
► Heuristic
► DSS
► EIS
Question No: 5 ( Marks: 1 ) - Please choose one
Which of the following works in conjunction with routers and firewalls by monitoring network usage anomalies to protect a company’s information systems resources from external as well as internal misuse?
► Encryption
► Intrusion Detection Systems
► Firewall
► All of above
Question No: 6 ( Marks: 1 ) - Please choose one
A risk is the possibility of a problem, whereas a problem is a risk that has already occurred.
► True
► False
Question No: 7 ( Marks: 1 ) - Please choose one
Which of the following is a methodology used to create a plan for how an organization will resume partially or completely interrupted critical functions within a predetermined time after a disaster or disruption?
► Audit Logs
► Disaster Plan
► Audit Trials
► Business continuity Plan
Question No: 8 ( Marks: 1 ) - Please choose one
Documentation may include program code of application softwares, technical manuals, user manuals etc.
► True
► False
Question No: 9 ( Marks: 1 ) - Please choose one
Input controls monitor the initial handshaking procedure of the user with the operating system.
► True
► False
Question No: 10 ( Marks: 1 ) - Please choose one
Processing instructions carried out by the operating system and application software should be monitored by implementation of controls.
► True
► False
Question No: 11 ( Marks: 1 ) - Please choose one
Firewall is the primary method for keeping a computer secure from intruders.
► True
► False
Question No: 12 ( Marks: 1 ) - Please choose one
Which of the following is a data model or diagram for high-level descriptions of conceptual data model.
► ERD
► Flow Chart
► Algorithm
► DFD
Question No: 13 ( Marks: 1 ) - Please choose one
Which of the following is a project management technique that divides complex projects into
smaller, more easily managed segments or phases?
► SDLC
► System Design
► System Analysis
► Audit Trials
Question No: 14 ( Marks: 1 ) - Please choose one
Which of the following has collection of predefined procedures related to each other?
► Organization
► System
► Firm
Question No: 15 ( Marks: 1 ) - Please choose one
Which of the following increment in incremental model is usually the core product which addresses the basic requirements of the system?
► First
► Second
► Third
Question No: 16 ( Marks: 1 ) - Please choose one
__________ overwrites every program/software/file it infects with itself. Hence the infected file no longer functions.
► Dropper
► Overwriting Viruses
► Boot sector Virus
Question No: 17 ( Marks: 1 ) - Please choose one
__________ is a person who attempts to invade the privacy of the system.
► Hacktivsts
► Hackers
► Crackers
Question No: 18 ( Marks: 1 ) - Please choose one
Individuals using their skills to forward a political agenda, possibly breaking the law
in the process, but justifying their actions for political reasons are called ________
► Hacktivsts
► Crackers
► Hackers
Question No: 19 ( Marks: 1 ) - Please choose one
Both software objects and real time objects have__________
► Identity and behavior
► Identity and state
► State and behavior
Question No: 20 ( Marks: 1 ) - Please choose one
Characteristics of object are called ________
► Methods
► Attributes
► Status
Question No: 21 ( Marks: 1 ) - Please choose one
Which of the following carry characteristics of specialization?
► Sub classes
► Sub Interfaces
► Sub objects
Question No: 22 ( Marks: 1 ) - Please choose one
Audit Trial is a weakness that can be accidentally triggered or intentionally exploited.
► True
► False
Question No: 23 ( Marks: 1 ) - Please choose one
M-Commerce (mobile commerce) refers to the conduct of e-commerce via wireless devices.
► True
► False
Question No: 24 ( Marks: 1 ) - Please choose one
Buying and selling of products, services and information via computer networks, primarily through Internet is :
► E-Commerce
► E-Business
► Web Surfing
► BPR
Question No: 25 ( Marks: 1 ) - Please choose one
Which of the following helps in getting the right material and physical resources together at the right place and at the right time to meet the customer’s requirements?
► BRP
► MRP
► CRP
Question No: 26 ( Marks: 1 ) - Please choose one
__________ is an association among entities. There has to be a relationship between two entities
► Value Sets
► Cardinality
► Relationships
Question No: 27 ( Marks: 1 ) - Please choose one
One of the methods of integrating different business information systems is Supply Chain management software.
► True
► False
Question No: 28 ( Marks: 1 ) - Please choose one
Which of the following carries connotations of the class to which the object belonged?
► Class
► Instance
► Structure
► None of the above
Question No: 29 ( Marks: 1 ) - Please choose one
Object oriented analysis focuses on _________
► Modular approach
► Incremental approach
► Traditional approach
► Derived approach
Question No: 30 ( Marks: 1 ) - Please choose one
Evaluate recovery patterns, relevant costs involved is an example of monitoring
► TRUE
► FALSE
Question No: 31 ( Marks: 2 )
What are the information requirements of the service sector?
Question No: 32 ( Marks: 2 )
Define Business Continuity Planning (BCP) ?
Question No: 33 ( Marks: 2 )
Identify different types of Information assets ?
Question No: 34 ( Marks: 2 )
Identify components of Intrusion detection system ?
Question No: 35 ( Marks: 3 )
What is the necessary information needed to begin impact analysis?
Question No: 36 ( Marks: 3 )
Define Active attacks?
Question No: 37 ( Marks: 3 )
Why is it needed for Accounting information system (AIS) to be linked with all other information systems in an organization?
Question No: 38 ( Marks: 3 )
Identify any six factors that should be considered in order for change to be successful?
Question No: 39 ( Marks: 5 )
What do you understand by Privacy? How can privacy be protected? List threats to Privacy.
Question No: 40 ( Marks: 5 )
Give any two examples to prove that Audit trails help to provide variants from normal behavior which may lead to unauthorized usage of resources.