Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
26 views18 pages

Cs 507 Midterm Spring 2010

Uploaded by

omersaleem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views18 pages

Cs 507 Midterm Spring 2010

Uploaded by

omersaleem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 18

FINALTERM EXAMINATION

Spring 2010

CS507- Information Systems

Question No: 1 ( Marks: 1 ) - Please choose one

Medium Sized organizations are normally a family ownership run by

► Father & Sons

► Brothers

► Father, Sons and Brothers

► None of the given

Question No: 2 ( Marks: 1 ) - Please choose one

High level of foreign trade has resulted in imports and exports which require inter linkage for
smooth coordination.
► True

► False

Question No: 3 ( Marks: 1 ) - Please choose one

ERP or enterprise systems control all major business processes with a single software architecture
in real time.

► False

► True

Question No: 4 ( Marks: 1 ) - Please choose one

The bullwhip effect refers to erratic shifts in orders up and down the supply chain because of poor
demand forecasting, price fluctuation, order batching, and rationing within the chain.
► True

► False

Question No: 5 ( Marks: 1 ) - Please choose one

Which of the following works in conjunction with routers and firewalls by monitoring network usage
anomalies to protect a company’s information systems resources from external as well as internal
misuse?

► Encryption

► Intrusion Detection Systems

► Firewall

► All of above
Question No: 6 ( Marks: 1 ) - Please choose one

The major purpose of enhancing web security is to protect web server from attacks through the use of
internet.

► True

► False

Question No: 7 ( Marks: 1 ) - Please choose one

The Internet Protocol is designed solely for the addressing and routing of data packets across a network

► True

► False

Question No: 8 ( Marks: 1 ) - Please choose one


Passive Attack is one of the types of Web Security Threats

► True

► False

Question No: 9 ( Marks: 1 ) - Please choose one

Audit Trials can be used together with controls trials to identify and provide information about users
suspected of improper modification of data.

► True

► False

Question No: 10 ( Marks: 1 ) - Please choose one

MKIS helps organizations in efficient channel management

► True
► False

Question No: 11 ( Marks: 1 ) - Please choose one

Crypto Analysis is the science and art of transforming messages to make them secure and
immune to attacks.

► True

► False

Question No: 12 ( Marks: 1 ) - Please choose one

Active Monitor software serves the concurrent monitoring as the system is being used.

► True

► False
Question No: 13 ( Marks: 1 ) - Please choose one

The protection of the interests of those relying on information, and the information systems and

communications that delivers the information, from harm resulting from failures of availability,

confidentiality, and integrity.

► False

► True

Question No: 14 ( Marks: 1 ) - Please choose one

The purpose of a class is to specify a classification of objects and to specify the features
that characterize the structure and behavior of those objects.

► True

► False
Question No: 15 ( Marks: 1 ) - Please choose one

In drawing a proper flowchart, all necessary steps that are a part of process should be listed
out in ---------------------- order.

► Logical

► Physical

► Random

► Top to Bottom

Question No: 16 ( Marks: 1 ) - Please choose one

The departmental structures are different in banking and financial sector

► False
► True

Question No: 17 ( Marks: 1 ) - Please choose one

Production subsystem needs to be linked with the marketing system to produce right amount of
product.

► True

► False

Question No: 18 ( Marks: 1 ) - Please choose one

DSS can be used to simulate the consequences of each alternative generated.

► TRUE

► FALSE
Question No: 19 ( Marks: 1 ) - Please choose one

Which of the following select chief executive?

► Employees

► Customers

► Board of Directors

Question No: 20 ( Marks: 1 ) - Please choose one

A schematic representation of a sequence of operations as in a manufacturing process or computer


program is called __________

► Algorithm.

► Entity Relationship Diagram

► Flowchart
Question No: 21 ( Marks: 1 ) - Please choose one

Rounded shaped symbol in the flow chart is called ____________

► Connector

► Arrow

► Process

Question No: 22 ( Marks: 1 ) - Please choose one

________ Focus on detecting potentially abnormal behavior in function of operating system or request
made by application software

► Behavior blockers

► Active monitors

► Scanners
Question No: 23 ( Marks: 1 ) - Please choose one

Testing is easy for the software that is developed using OOAD due to use of ___________

► Modular approach

► Real time modeling

► Usability feature

Question No: 24 ( Marks: 1 ) - Please choose one

Threat source motivation is an output for Likelihood determination

► True

► False

Question No: 25 ( Marks: 1 ) - Please choose one


Administrative Consol is one of the components of Intrusion Detection System (IDS).

► True

► False

Question No: 26 ( Marks: 1 ) - Please choose one

Preparing a situation for change by disconfirming existing attitudes and

behaviors is called Unfreezing.

► True

► False

Question No: 27 ( Marks: 1 ) - Please choose one


The purpose of data flow diagrams is to provide a --------- between users and systems developers

► Linking bridge

► Empty space

► Data Flows

► Options a and b

Question No: 28 ( Marks: 1 ) - Please choose one

Availability of which of the following to various users also depends on how the information is
processed?

► Information

► Data

► Log File

► None of the above


Question No: 29 ( Marks: 1 ) - Please choose one

Which of the following is the characteristic of being able to assign a different meaning or
usage to something in different contexts - specifically?

► OOP

► Polymorphism

► Encapsulation

► Inheritance

Question No: 30 ( Marks: 1 ) - Please choose one

_______ is the science of coded writing.

► Decryption

► Cryptography
► Encryption

Question No: 31 ( Marks: 2 )

What is the basic purpose of setting up systems and procedures. Give your own opinion.

Question No: 32 ( Marks: 2 )

Define threat and identify its types.

Question No: 33 ( Marks: 2 )

List any two types of information that can be used as input for vulnerability ?

Question No: 34 ( Marks: 2 )


Identify leading ERP software vendors ?

Question No: 35 ( Marks: 3 )

Define Risk Determination. Identify its inputs and outputs.

Question No: 36 ( Marks: 3 )

What are the types of threats?

Question No: 37 ( Marks: 3 )

Differentiate between Incremental and iterative models with the help of one example each.
Question No: 38 ( Marks: 3 )

Identify any six factors that should be considered in order for change to be successful?

Question No: 39 ( Marks: 5 )

Define the following:

a) EC (Ecommerce)
b) EB (Ebusiness)

Question No: 40 ( Marks: 5 )

Identify and define the types of active attacks ?

You might also like