FINALTERM EXAMINATION
Spring 2010
CS507- Information Systems
Time: 90 min
M a r k s: 60
Question No: 1 ( M a r k s: 1 ) http://vuzs.net
Information technology can lead to a decrease in the time for decision making.
► True
► False
Question No: 2 ( M a r k s: 1 ) http://vuzs.net
Customer
touch point is a method of interaction with a customer, such as
telephone, e-mail, a customer service or help desk, conventional mail,
Web site and store.
► True
► False
A customer
touch point is a method of interaction with a customer, such as
telephone, e-mail, a customer service or help desk, conventional mail,
Web site and store.
Question No: 3 ( M a r k s: 1 ) http://vuzs.net
---------infrastructure
consists of the physical facilities services and management that
support all computing resources in an organization
► Information
► Decision
► Management
Information infrastructure consists of the physical facilities services and management that support l computing resources in an organization.
Question No: 4 ( M a r k s: 1 ) http://vuzs.net
Which of the following refers to the process of identifying attempts to penetrate a system and gain unauthorized access?
► Intrusion detection
► Audit Trial
► Control Trial
► Documentation
Intrusion detection refers to the process of identifying attempts to penetrate a system and gain unauthorized access.
Question No: 5 ( M a r k s: 1 ) http://vuzs.net
The departmental structures are --------------- in banking and financial sector.
► Different
► Same
► Mixed
The departmental structures are different in banking and financial sector.
Question No: 6 ( M a r k s: 1 ) http://vuzs.net
Input controls monitor the initial handshaking procedure of the user with the operating system.
► True
► False
Access controls monitor the initial handshaking procedure of the user with the operating system.
Question No: 7 ( M a r k s: 1 ) http://vuzs.net
Logical intrusion skills needed to exploit logical exposures are more technical and complex as compared to physical exposures.
► True
► False
Logical
intrusion: The skills needed to exploit logical exposures are more
technical and complex as compared to physical exposures. Generally a
similar term used in relation to logical intrusion is hacking.
Question No: 8 ( M a r k s: 1 ) http://vuzs.net
MIS and DSS can be seen as having a systematic approach towards problem solution.
► True
► False
MIS and DSS can be seen as having a systematic approach towards problem solution.
Question No: 9 ( M a r k s: 1 ) http://vuzs.net
The
protection of the interests of those relying on information, and the
information systems and communications that delivers the information,
from harm resulting from failures of availability, confidentiality, and
integrity.
► False
► True
“The
protection of the interests of those relying on information, and the
information systems and communications that delivers the information,
from harm resulting from failures of availability, confidentiality, and integrity.”
Question No: 10 ( M a r k s: 1 ) http://vuzs.net
Which
of the following are knowledge workers who facilitate the development
of information systems and computer applications by bridging the
communications gap that exists between non-technical system users, and
System designers and developers?
► System Analysts
► Software Engineers
► System Designers
► Chief Executives
Systems
Analyst: “These are knowledge workers who facilitate the development of
information systems and computer applications by bridging the
communications gap that exists between non-technical system users, and System designers and developers.”
Question No: 11 ( M a r k s: 1 ) http://vuzs.net
______ is defined as “all elements that exist outside the boundary of the organization.
► Size
► Business Environment
► Business Structure
Business Environment is defined as “all elements that exist outside the boundary of the business (Organization).
Question No: 12 ( M a r k s: 1 ) http://vuzs.net
______ is the set of interconnected structural elements that provide the framework.
► System
► Organization
Ref: Infrastructure, generally, is the set of interconnected structural elements that provide the framework for supporting the entire structure. It usually applies only to structures that are artificial.
Question No: 13 ( M a r k s: 1 ) http://vuzs.net
Rectangle shape in the flow charts represents___________
► Decision
► Process
► Terminator
Question No: 14 ( M a r k s: 1 ) http://vuzs.net
Rounded shaped symbol in the flow chart is called ____________
► Connector
► Arrow
► Process
Question No: 15 ( M a r k s: 1 ) http://vuzs.net
__________ overwrites every program/software/file it infects with itself. Hence the infected file no longer functions.
► Dropper
► Boot sector Virus
Overwriting Viruses: As the name implies, it overwrites every program/software/file it infects with itself. Hence the infected file no longer functions.
Overwriting Viruses: As the name implies, it overwrites every program/software/file it infects with itself. Hence the infected file no longer functions.
Question No: 16 ( M a r k s: 1 ) http://vuzs.net
Object oriented analysis focuses on the _________
►States of objects
► Collaboration of objects
► Implementation of objects
Question No: 17 ( M a r k s: 1 ) http://vuzs.net
An
information technology (IT) audit is an Examination of the controls
within an entity’s Information technology infrastructure .
► True
► False
An information technology (IT) audit or information systems (IS) audit is an examination of thecontrols within an entity's Information technology infrastructure.
An information technology (IT) audit or information systems (IS) audit is an examination of thecontrols within an entity's Information technology infrastructure.
Question No: 18 ( M a r k s: 1 ) http://vuzs.net
Web
Site monitoring is the process used to view or record both the
keystrokes entered by a computer user and the computer's response during
an interactive session.
► True
► False
Keystroke monitoring is the process used to view or record both the keystrokes entered by a computer user and the computer's response during an interactive session.
Keystroke monitoring is the process used to view or record both the keystrokes entered by a computer user and the computer's response during an interactive session.
Question No: 19 ( M a r k s: 1 ) http://vuzs.net
A _______________ is the possibility of a problem, whereas a problem is a risk that has already occured.
► Risk
► Threat
► Intrusion
A risk is the possibility of a problem, whereas a problem is a risk that has already occurred.
Question No: 20 ( M a r k s: 1 ) http://vuzs.net
The two major criteria that are used to analyze risks are Operational Effects and Situational Impacts
► True
Question No: 21 ( M a r k s: 1 ) http://vuzs.net
Access Control refers to the process of identifying attempts to penetrate a system and gain unauthorized access
► True
► False
Intrusion detection refers to the process of identifying attempts to penetrate a system and gain unauthorized access.
Question No: 22 ( M a r k s: 1 ) http://vuzs.net
“M-Commerce” stands for Mobile Commerce.
► True
► False
M-Commerce (mobile commerce) refers to the conduct of e-commerce via wireless devices.
Question No: 23 ( M a r k s: 1 ) http://vuzs.net
Organizational Development is one of the types of Change.
► True
► False
Types of Change
• Organizational Development
• Reengineering
Question No: 24 ( M a r k s: 1 ) http://vuzs.net
Preparing a situation for change by disconfirming existing attitudes and behaviors is called Unfreezing.
► True
► False
Unfreezing: Preparing a situation for change by disconfirming existing attitudes and behaviors.
Question No: 25 ( M a r k s: 1 ) http://vuzs.net
Which of the following activity consists of the discovery, modeling, specification and evaluation of requirements?
► Development
► Design
► Requirement
► Implementation
"The development activity consisting of the discovery, modeling, specification and evaluation of requirements,"
Question No: 26 ( M a r k s: 1 ) http://vuzs.net
Which of the following scans the operating system and application software for any virus based on the viruses they contain.
► Antivirus
► Scanners
► Active Monitors
► Firewall
Scanners: They scan the operating system and application soft ware for any virus based on the viruses they contain.
Question No: 27 ( M a r k s: 1 ) http://vuzs.net
__________ is an association among entities. There has to be a relationship between two entities
► Value Sets
► Cardinality
► Relationships
Relationships: A relationship is an association among entities. There has to be a relationship between two entities.
Question No: 28 ( M a r k s: 1 ) http://vuzs.net
A dropper is a program not a virus.
► True
► False
Dropper: A dropper is a program not a virus. It installs a virus on the PC while performing another function.
Question No: 29 ( M a r k s: 1 ) http://vuzs.net
Every decision we take in daily life requires some sort of data about the alternatives available.
► True
► False
Every decision we take in daily life requires some sort of information not data
Question No: 30 ( M a r k s: 1 ) http://vuzs.net
________________helps organization in gaining competitive advantage in the use of processes, effectiveness and efficiency.
► BPR
► CSF
► SPR
► MIS
Use of BPR helps an organization in gaining competitive advantage in the use of processes, effectiveness and efficiency should also be kept in mind.
Question No: 31 ( M a r k s: 2 )
What is cryptography?
Answer:
Cryptography
means science of coded writing. It is a security defends to make
information incomprehensible if unlawful persons cut off the
transmission. When the information is to be used, it can be decoded.
“The exchange of data into a secret code for the secure transmission
over a public network is called cryptography.”
Question No: 32 ( M a r k s: 2 )
What do you understand by Intrusion Detection Systems?
Answer:
An
ID is used in balance to firewalls. An IDS works in combination with
routers and firewalls and it monitor network that how much it used
and It protects a company’s information systems resources from external
as well as internal mistreatment.
Question No: 33 ( M a r k s: 2 )
List information Requirements for Medium sizes organizations.
Answer:
Information Requirements of Medium Sized Organizations:
- As size of the organization increases, the importance of planning for information also increases.
- The planning on long-term basis also helps in monitoring of information against planning.
Question No: 34 ( M a r k s: 2 )
Define Dropper and Trojan horse ?
Answer:
Trojan horse: Trojan horse
is like it executes by user the program written by the penetrate. The
program undertakes illegal actions e.g. a copy of the sensitive data and
files.
Dropper: A dropper is a program not a virus. It installs a virus on the PC while performing another function.
Question No: 35 ( M a r k s: 3 )
Designing file or database is a major component of system designing. Identify its basic purposes.
Answer:
Designing file or database
This serves following purposes:
• Data accessibility is ensured to the user is ensured as and when required.
• Data consistency – data updates in master file will automatically update the data in the whole system.
• Data is efficiently processed & stored.
• Data integrity that is Correctness of data is ensured.
Question No: 36 ( M a r k s: 3 )
What is the responsibility of the management of the organization to ensure the security of information systems?
Answer:
It
is the responsibility of the management of the organization to ensure
the security of information system. It must be sponsored by senior
management. Management has a responsibility to ensure that the
organization provides all secure information systems environment for
users or customers. This will make users of information systems that are
they feel secure and the importance of secure information environment.
Question No: 37 ( M a r k s: 3 )
Identify the information that is required before conducting an impact analysis?
Answer:
Impact analysis:
Before beginning the impact analysis, it is necessary to obtain the following necessary information:
• System mission
• System and data criticality
• System and data sensitivity
Question No: 38 ( M a r k s: 3 )
Define Reengineering?
Answer:
Reengineering:
This is known as company transformation or business transformation. It
is the more essential form of change management, since it works for all
the elements of Processes or structures that have evolved over time.
Question No: 39 ( M a r k s: 5 )
Briefly discuss Risk Determination ?
Answer:
Risk Determination:
Risk
determination means that phase of analyzing how much the information
assets are uncovered to various threats known and thus count the loss
cause to the asset through this threat. This phase relates to analysis
of both physical and logical threats and comprises of four steps. Four
steps are usually followed while analyzing the exposure.
The
main reason of this step is to assess the level of risk to the IT
system. The determination of exacting threat can be spoken as a meaning
of
1 The likelihood of a given threat-source’s attempting to exercise a given weakness.
2. The magnitude of the impact should a threat source successfully exercise a susceptibility
3. The competence of planned or existing security controls for reducing or minimizing risk.
Question No: 40 ( M a r k s: 5 )
Discuss Technical Limitations of Ecommerce in comparison with Non-Technical Limitations in organizations ?
Answer:
Technical
Limitations of Ecommerce in comparison with Non-Technical limitation in
organization are that more cost to use for software and technology,
reliability for certain processes.
Insufficient
communications, the reason is that people don’t know about it. Software
tools are not fixed and used in regular manner.
People
don’t have enough access of internet and they have difficulty to adopt
e-commerce infrastructure instead of organizational systems.