VUsolutions on Facebook

This website is now MOVED to new domain, i.e. www.VUsolutions.com.


SO, now to onward, for any kind of data & help you may visit www.VUsolutions.com

NOTE: This blog having all past papers from midterm & final term exams, and uploaded on the same day when the papers was held. For SOLVED PAPERS you may visit VUsolutions GURU website. We dedicated VUsolutions GURU website just for past SOLVED papers & SOLVED online quizzes.

VU Past solved papers

Monday, August 9, 2010

CS507- Information Systems

FINALTERM EXAMINATION

Spring 2010

CS507- Information Systems

Time: 90 min

Marks: 60

Question No: 1 ( Marks: 1 ) - Please choose one

Small organizations usually have complex management structure.

True

False





Question No: 2 ( Marks: 1 ) - Please choose one

A hierarchical organization is structured in a way such that every entity in the organization, except one, is subordinate to a single other entity.

True

False





Question No: 3 ( Marks: 1 ) - Please choose one

Past court decisions have stated that privacy must be balanced against the needs of society.

True

False





Question No: 4 ( Marks: 1 ) - Please choose one

Business is a system where management decisions are influenced by or have an influence on suppliers, customers, society as a whole.

True

False





Question No: 5 ( Marks: 1 ) - Please choose one

Customer touch point is a method of interaction with a customer, such as telephone, e-mail, a customer service or help desk, conventional mail, Web site and store.

True

False





Question No: 6 ( Marks: 1 ) - Please choose one

Which of the following functions provide such data as sales prospect and contact information, product information, product configurations and sales quotes?

Sales force automation (SFA)

CRM

ERP

MIS



Question No: 7 ( Marks: 1 ) - Please choose one

A ________ is an agreed-upon set of conventions that defines the rules of communication.

Protocol

Protocol

Interconnection Medium

Data Packet

Message

Question No: 8 ( Marks: 1 ) - Please choose one

----------is a type of computer software that facilitates group decision-making within an organization

EMS

DSS

MIS



Question No: 9 ( Marks: 1 ) - Please choose one

The identification of risks should start with:

Description of the internal and external risks

A brainstorming session with risk management experts and a program profile

A good understanding of the program and a brainstorming session with key stakeholders

Definitions of likelihood and impact


Question No: 10 ( Marks: 1 ) - Please choose one

Automated data are less susceptible to destruction and misuse than paper data.

True

False


Question No: 11 ( Marks: 1 ) - Please choose one

Wireless computing devices are not subject to viruses.

False

True

Question No: 12 ( Marks: 1 ) - Please choose one

The purpose of a class is to specify a classification of objects and to specify the features that characterize the structure and behavior of those objects.

True

False

Question No: 13 ( Marks: 1 ) - Please choose one

Null value may or may not be called zero value.

True

False

Question No: 14 ( Marks: 1 ) - Please choose one

Existence of functional departments in each organization may vary with the nature of industry and the nature of products/services being offered.

True

False





Question No: 15 ( Marks: 1 ) - Please choose one

RAID model combines the elements of the waterfall model with the philosophy of prototyping.

True

False





Question No: 16 ( Marks: 1 ) - Please choose one

_________ means information hiding.

Inheritance

Encapsulation

Class





Question No: 17 ( Marks: 1 ) - Please choose one

Testing is easy for the software that is developed using OOAD due to use of ___________

Modular approach

Real time modeling

Usability feature





Question No: 18 ( Marks: 1 ) - Please choose one

Characteristics of object are called ________

Methods

Attributes

Status



Question No: 19 ( Marks: 1 ) - Please choose one

An event-oriented log usually contain records describing system events, application

events, or user events.

True

False





Question No: 20 ( Marks: 1 ) - Please choose one

An information technology (IT) audit is an Examination of the controls within an entity’s Information technology infrastructure .

True

False





Question No: 21 ( Marks: 1 ) - Please choose one

In assessing risks for an IT system, _______________ is the first step.

To define the scope of the effort.

Vulnerability Assesment

threat identification





Question No: 22 ( Marks: 1 ) - Please choose one

Risk Management includes assessment of controls already been implemented or planned, probability that they can be broken, assessment of potential loss despite such controls existing.

True

False





Question No: 23 ( Marks: 1 ) - Please choose one

Access Control refers to the process of identifying attempts to penetrate a system and gain unauthorized access.

True

False





Question No: 24 ( Marks: 1 ) - Please choose one

M-Commerce stands for Mobile Commerce.

True

False





Question No: 25 ( Marks: 1 ) - Please choose one

Past court decisions have stated that privacy must be balanced against the needs of ethics.

True

False





Question No: 26 ( Marks: 1 ) - Please choose one

Which of the following is the primary method for keeping a computer secure from intruders?

Password

Antivirus

Scanners

Firewall





Question No: 27 ( Marks: 1 ) - Please choose one

__________ is an association among entities. There has to be a relationship between two entities

Value Sets

Cardinality

Relationships





Question No: 28 ( Marks: 1 ) - Please choose one

____________ are the symbols indicates the flow of the procedure being explained.

Entity Relationship Diagram

DFD

Flowchart





Question No: 29 ( Marks: 1 ) - Please choose one

To accept the potential risk and continue operating the IT system or to implement controls to lower the risk to an acceptable level is called as ---------------.

Risk Planning

Risk Assumption

Risk Limitation

None of the above





Question No: 30 ( Marks: 1 ) - Please choose one

RAID models based on producing deliverables frequently/repetitively

True

False


Question No: 31 ( Marks: 2

What should be the basic objective of an organization in your opinion?

The basic objective of an organization is to make a profit and get a sustainable

competency


Question No: 32 ( Marks: 2

Why we need to secure information systems?


Question No: 33 ( Marks: 2

Define intrusion detection


Question No: 34 ( Marks: 2

Identify components of Intrusion detection system


Question No: 35 ( Marks: 3 )

How can we make our password secure


Question No: 36 ( Marks: 3 )

What are some of the things you should keep in mind when identifying risks?


Question No: 37 (Marks: 3

Briefly describe Incremental Model.


Question No: 38 ( Marks: 3 )

Information system security association of USA has listed many ethical challenges, identify any three of them?


Question No: 39 ( Marks: 5 )

What do you think what are the key benefits of Ecommerce to organizations?


Question No: 40 ( Marks: 5 )

What do you understand by Disaster Recovery Planning?

:::::::::::::::::::::::::::::::::::::::::::::For more posts, click "Older Posts"::::::::::::::::::::::::::::::::::::::::::