FINAL TERM EXAMINATION
Spring 2010
CS507- Information Systems
Time: 90 min
Marks: 60
Question No: 1 ( Marks: 1 ) - Please choose one
Past court decisions have stated that privacy must be balanced against the needs of society.
► True
► False
Question No: 2 ( Marks: 1 ) - Please choose one
Which of the following Customer Relationship Management (CRM) is an enterprisewide effort to acquire and retain customers?
► ERP
► CRM
► MIS
► ESS
Question No: 3 ( Marks: 1 ) - Please choose one
Every system comprises of basic components which in a co-ordination formulate a system.
► True
► False
Question No: 4 ( Marks: 1 ) - Please choose one
Closed system is dependent on the internal resources and data.
► True
► False
Question No: 5 ( Marks: 1 ) - Please choose one
In which of the following there is a direct interaction facilitated by auctions, classifieds, and bartering?
► EGovernment
► MCommerce
► Consumer-to-consumer EC
► Intrabusiness EC
Question No: 6 ( Marks: 1 ) - Please choose one
The turnaround time from the input of the transaction to the production for the output must be a few --------------------
► Minutes or less
► Hours or less
► Seconds or less
Question No: 7 ( Marks: 1 ) - Please choose one
Which of the following refers to the process of identifying attempts to penetrate a system and gain unauthorized access?
► Threat Identification
► Intrusion detection
► Access Control
► All of above
Question No: 8 ( Marks: 1 ) - Please choose one
The Internet Protocol is designed solely for the addressing and routing of data packets across a network
► True
► False
Question No: 9 ( Marks: 1 ) - Please choose one
Threat capacity is an input source for Likelihood determination.
► False
► True
Question No: 10 ( Marks: 1 ) - Please choose one
Which of the following is a weakness that can be accidentally triggered or intentionally exploited?
► Audit Trial
► Likelihood Identification
► Threat Identification
► Vulnerability
Question No: 11 ( Marks: 1 ) - Please choose one
There are typically ________________ kinds of audit records
► One
► Two
► Three
► Four
Question No: 12 ( Marks: 1 ) - Please choose one
Documentation may include program code of application softwares, technical manuals, user manuals etc.
► True
► False
Question No: 13 ( Marks: 1 ) - Please choose one
Decisions in which the decision maker must provide judgment, evaluation, and insights into the problem definition would be characterized as:
► Structured
► Semi Structured
► Unstructured
Question No: 14 ( Marks: 1 ) - Please choose one
Automated data are less susceptible to destruction and misuse than paper data.
► True
► False
Question No: 15 ( Marks: 1 ) - Please choose one
According to “Booch”, object has following three components
► State, Behavior, Identity
► State, Behavior, Interface
► State, Interface, methods
► State, Variables, Methods
Question No: 16 ( Marks: 1 ) - Please choose one
Null value may or may not be called zero value.
► True
► False
Question No: 17 ( Marks: 1 ) - Please choose one
Organizations are distinguished on the basis of __________
► Attributes
► Policy
► Management
Question No: 18 ( Marks: 1 ) - Please choose one
__________ is known as father of warehouse.
► Stephen hawking
► Bill gates
► Bill Inmon
Question No: 19 ( Marks: 1 ) - Please choose one
Rounded shaped symbol in the flow chart is called ____________
► Connector
► Arrow
► Process
Question No: 20 ( Marks: 1 ) - Please choose one
Individuals using their skills to forward a political agenda, possibly breaking the law
in the process, but justifying their actions for political reasons are called ________
► Hacktivsts
► Crackers
► Hackers
Question No: 21 ( Marks: 1 ) - Please choose one
Object oriented analysis focuses on the _________
► States of objects
► Collaboration of objects
► Implementation of objects
Question No: 22 ( Marks: 1 ) - Please choose one
Which of the following carry characteristics of specialization?
► Sub classes
► Sub Interfaces
► Sub objects
Question No: 23 ( Marks: 1 ) - Please choose one
The two major criteria that are used to analyze risks are Operational Effects and Situational Impacts
► True
► False
Question No: 24 ( Marks: 1 ) - Please choose one
Which of the following is not the type of CSF?
► Industry CSFs
► Environmental CSFs
► Technical CSFs
► Temporal CSFs
Question No: 25 ( Marks: 1 ) - Please choose one
The flowchart helps in locating and correcting errors also called debugging.
► True
► False
Question No: 26 ( Marks: 1 ) - Please choose one
Which of the following is the process or art of defining the hardware and software architecture, components, modules, interfaces, and data for a computer system to satisfy specified requirements?
► Systems Design
► Systems Requirement
► Coding
► Requirement
Question No: 27 ( Marks: 1 ) - Please choose one
Which of the following focus on detecting potentially abnormal behavior in function of operating system or request made by application software?
► Active Monitors
► Scanners
► Antivirus
► Behavior blockers
Question No: 28 ( Marks: 1 ) - Please choose one
Buying and selling of products, services and information via computer networks, primarily through Internet is :
► E-Commerce
► E-Business
► Web Surfing
► BPR
Question No: 29 ( Marks: 1 ) - Please choose one
_____________ is one of the component of Intrusion Detection System (IDS).
► Log File
► Host
► Administrative Consol
► None of above
Question No: 30 ( Marks: 1 ) - Please choose one
The flow of information in organization can be _______ways.
► 1
► 2
► 3
► 4
Question No: 31 ( Marks: 2 )
What are Active monitors? Define.
Question No: 32 ( Marks: 2 )
What is information Quality Checklist?
Question No: 33 ( Marks: 2 )
List any two types of information that can be used as input for vulnerability ?
Question No: 34 ( Marks: 2 )
Define CRM ?
Question No: 35 ( Marks: 3 )
What are the information requirements for Management level in Accounting & financial Information Systems.
Question No: 36 ( Marks: 3 )
What is access control? Give example
Question No: 37 ( Marks: 3 )
Discuss Centralized and Distributed Processing in terms of their comparison ?
Question No: 38 ( Marks: 3 )
Identify draw backs of ERP systems ?
Question No: 39 ( Marks: 5 )
Differentiate the following
1. Intrusion Detection vs Variance Detection
Question No: 40 ( Marks: 5 )
Define the following:
a) EC (ECommerce)
b) EB (EBusiness)