VUsolutions on Facebook

This website is now MOVED to new domain, i.e. www.VUsolutions.com.


SO, now to onward, for any kind of data & help you may visit www.VUsolutions.com

NOTE: This blog having all past papers from midterm & final term exams, and uploaded on the same day when the papers was held. For SOLVED PAPERS you may visit VUsolutions GURU website. We dedicated VUsolutions GURU website just for past SOLVED papers & SOLVED online quizzes.

VU Past solved papers

Sunday, August 15, 2010

CS507- Information Systems

FINAL TERM EXAMINATION

Spring 2010

CS507- Information Systems
Time: 90 min
Marks: 60
Question No: 1 ( Marks: 1 ) - Please choose one
Past court decisions have stated that privacy must be balanced against the needs of society.
► True
► False
Question No: 2 ( Marks: 1 ) - Please choose one
Which of the following Customer Relationship Management (CRM) is an enterprisewide effort to acquire and retain customers?
► ERP
► CRM
► MIS
► ESS
Question No: 3 ( Marks: 1 ) - Please choose one
Every system comprises of basic components which in a co-ordination formulate a system.
► True
► False
Question No: 4 ( Marks: 1 ) - Please choose one
Closed system is dependent on the internal resources and data.
► True
► False
Question No: 5 ( Marks: 1 ) - Please choose one
In which of the following there is a direct interaction facilitated by auctions, classifieds, and bartering?
► EGovernment
► MCommerce
► Consumer-to-consumer EC
► Intrabusiness EC
Question No: 6 ( Marks: 1 ) - Please choose one
The turnaround time from the input of the transaction to the production for the output must be a few --------------------
► Minutes or less
► Hours or less
► Seconds or less
Question No: 7 ( Marks: 1 ) - Please choose one
Which of the following refers to the process of identifying attempts to penetrate a system and gain unauthorized access?
► Threat Identification
► Intrusion detection
► Access Control
► All of above
Question No: 8 ( Marks: 1 ) - Please choose one
The Internet Protocol is designed solely for the addressing and routing of data packets across a network
► True
► False
Question No: 9 ( Marks: 1 ) - Please choose one
Threat capacity is an input source for Likelihood determination.
► False
► True
Question No: 10 ( Marks: 1 ) - Please choose one
Which of the following is a weakness that can be accidentally triggered or intentionally exploited?
► Audit Trial
► Likelihood Identification
► Threat Identification
► Vulnerability
Question No: 11 ( Marks: 1 ) - Please choose one
There are typically ________________ kinds of audit records
► One
► Two
► Three
► Four
Question No: 12 ( Marks: 1 ) - Please choose one
Documentation may include program code of application softwares, technical manuals, user manuals etc.
► True
► False
Question No: 13 ( Marks: 1 ) - Please choose one
Decisions in which the decision maker must provide judgment, evaluation, and insights into the problem definition would be characterized as:
► Structured
► Semi Structured
► Unstructured
Question No: 14 ( Marks: 1 ) - Please choose one
Automated data are less susceptible to destruction and misuse than paper data.
► True
► False
Question No: 15 ( Marks: 1 ) - Please choose one
According to “Booch”, object has following three components
► State, Behavior, Identity
► State, Behavior, Interface
► State, Interface, methods
► State, Variables, Methods
Question No: 16 ( Marks: 1 ) - Please choose one
Null value may or may not be called zero value.
► True
► False
Question No: 17 ( Marks: 1 ) - Please choose one
Organizations are distinguished on the basis of __________
► Attributes
► Policy
► Management
Question No: 18 ( Marks: 1 ) - Please choose one
__________ is known as father of warehouse.
► Stephen hawking
► Bill gates
► Bill Inmon
Question No: 19 ( Marks: 1 ) - Please choose one
Rounded shaped symbol in the flow chart is called ____________
► Connector
► Arrow
► Process
Question No: 20 ( Marks: 1 ) - Please choose one
Individuals using their skills to forward a political agenda, possibly breaking the law
in the process, but justifying their actions for political reasons are called ________
► Hacktivsts
► Crackers
► Hackers
Question No: 21 ( Marks: 1 ) - Please choose one
Object oriented analysis focuses on the _________
► States of objects
► Collaboration of objects
► Implementation of objects
Question No: 22 ( Marks: 1 ) - Please choose one
Which of the following carry characteristics of specialization?
► Sub classes
► Sub Interfaces
► Sub objects
Question No: 23 ( Marks: 1 ) - Please choose one
The two major criteria that are used to analyze risks are Operational Effects and Situational Impacts
► True
► False
Question No: 24 ( Marks: 1 ) - Please choose one
Which of the following is not the type of CSF?
► Industry CSFs
► Environmental CSFs
► Technical CSFs
► Temporal CSFs
Question No: 25 ( Marks: 1 ) - Please choose one
The flowchart helps in locating and correcting errors also called debugging.
► True
► False
Question No: 26 ( Marks: 1 ) - Please choose one
Which of the following is the process or art of defining the hardware and software architecture, components, modules, interfaces, and data for a computer system to satisfy specified requirements?
► Systems Design
► Systems Requirement
► Coding
► Requirement
Question No: 27 ( Marks: 1 ) - Please choose one
Which of the following focus on detecting potentially abnormal behavior in function of operating system or request made by application software?
► Active Monitors
► Scanners
► Antivirus
► Behavior blockers
Question No: 28 ( Marks: 1 ) - Please choose one
Buying and selling of products, services and information via computer networks, primarily through Internet is :
► E-Commerce
► E-Business
► Web Surfing
► BPR
Question No: 29 ( Marks: 1 ) - Please choose one
_____________ is one of the component of Intrusion Detection System (IDS).
► Log File
► Host
► Administrative Consol
► None of above
Question No: 30 ( Marks: 1 ) - Please choose one
The flow of information in organization can be _______ways.
► 1
► 2
► 3
► 4
Question No: 31 ( Marks: 2 )
What are Active monitors? Define.
Question No: 32 ( Marks: 2 )
What is information Quality Checklist?
Question No: 33 ( Marks: 2 )
List any two types of information that can be used as input for vulnerability ?
Question No: 34 ( Marks: 2 )
Define CRM ?
Question No: 35 ( Marks: 3 )
What are the information requirements for Management level in Accounting & financial Information Systems.
Question No: 36 ( Marks: 3 )
What is access control? Give example
Question No: 37 ( Marks: 3 )
Discuss Centralized and Distributed Processing in terms of their comparison ?
Question No: 38 ( Marks: 3 )
Identify draw backs of ERP systems ?
Question No: 39 ( Marks: 5 )
Differentiate the following
1. Intrusion Detection vs Variance Detection
Question No: 40 ( Marks: 5 )
Define the following:
a) EC (ECommerce)
b) EB (EBusiness)
:::::::::::::::::::::::::::::::::::::::::::::For more posts, click "Older Posts"::::::::::::::::::::::::::::::::::::::::::