CS507 Final term Solved Paper 2010-7

FINALTERM EXAMINATION
Spring 2010
CS507- Information Systems
Time: 90 min
                                                                                                                   M a r k s: 60



CS507 - Information System - Question No: 1( M a r k s: 1 )
Past court decisions have stated that privacy must be balanced against the needs of society.
 ► True
 ► False
Answer & Ref by Fuad
Privacy—
The right of privacy is not absolute. Privacy must be balanced against the needs of society
The public ’s right to know is superior to the individual’s right of privacy

CS507 - Information System - Question No: 2 vuzs     ( M a r k s: 1 )
Which of the following Customer Relationship Management (CRM) is an enterprise wide effort to acquire and retain customers?

 ► ERP
 ► CRM
 ► MIS
 ► ESS
Customer Relationship Management Systems (CRM): An enterprise wide effort to acquire and retain customers. 

CS507 - Information System - Question No: 3( M a r k s: 1 )
Every system comprises of basic components which in a co-ordination formulate a system.

 ► True
 ► False
Every system comprises of basic components which in a coordination formulate a system.

CS507 - Information System - Question No: 4( M a r k s: 1 )
Closed system is dependent on the internal resources and data.

► True
 ► False
When we refer to a closed system we talk of a system that is dependent on internal resources and data for decision making rather than external.

CS507 - Information System - Question No: 5( M a r k s: 1 )
In which of the following there is a direct interaction facilitated by auctions, classifieds, and bartering?

 ► EGovernment
 ► MCommerce
 ► Consumer-to-consumer EC
 ► Intrabusiness EC\
Auctions are so far the most popular C2C e-commerce activity.

CS507 - Information System - Question No: 6( M a r k s: 1 )
The turnaround time from the input of the transaction to the production for the output must be a few --------------------

► Minutes or less
 ► Hours or less
 ► Seconds or less
Businesses cannot afford to have customers waiting for a TPS to respond, the turnaround time from the input of the transaction to the production for the output must be a few seconds or less.

CS507 - Information System - Question No: 7( M a r k s: 1 )
Which of the following refers to the process of identifying attempts to penetrate a system and gain unauthorized access?

► Threat Identification
 ► Intrusion detection
 ► Access Control
 ► All of above
Intrusion detection refers to the process of identifying attempts to penetrate a system and gain unauthorized access.

CS507 - Information System - Question No: 8( M a r k s: 1 )
The Internet Protocol is designed solely for the addressing and routing of data packets across a network

► True
 ► False
The Internet Protocol is designed solely for the addressing and routing of data packets across a network.

CS507 - Information System - Question No: 9( M a r k s: 1 )
Threat capacity is an input source for Likelihood determination.

 ► False
 ► True
Likelihood Determination inputs are:
• Threat-source motivation
• Threat capacity
• Nature of vulnerability
• Current control


CS507 - Information System - Question No: 10    ( M a r k s: 1 )
Which of the following is a weakness that can be accidentally triggered or intentionally exploited?
 ► Audit Trial
 ► Likelihood Identification
 ► Threat Identification
 ► Vulnerability

CS507 - Information System - Question No: 11( M a r k s: 1 )
There are typically ________________ kinds of audit records

► One
 ► Two
 ► Three
 ► Four
There are typically two kinds of audit records:
(1) An event-oriented log
(2) A record of every keystroke

CS507 - Information System - Question No: 12( M a r k s: 1 )
Documentation may include program code of application soft wares, technical manuals, user manuals etc.

 ► True
 ► False
Documentation may include program code of application software’s, technical manuals, user manuals and any other system-related documentation.

CS507 - Information System - Question No: 13( M a r k s: 1 )
Decisions in which the decision maker must provide judgment, evaluation, and insights into the problem definition would be characterized as:

 ► Structured
 ► Semi Structured
 ► Unstructured
Unstructured decisions are those in which the decision maker must provide judgment, evaluation, and insights into the problem definition. 

CS507 - Information System - Question No: 14( M a r k s: 1 )
Automated data are less susceptible to destruction and misuse than paper data.

► True
 ► False
Electronic data are more susceptible to destruction fraud error and misuse because information systems concentrate data in computer files that have the potential to be accessed by large numbers of people and by groups outside of the organizations.

CS507 - Information System - Question No: 15  ( M a r k s: 1 )
According to Booch, object has following three components

► State, Behavior, Identity
 ► State, Behavior, Interface
 ► State, Interface, methods
 ► State, Variables, Methods
According to Booch, there are three components of object. Objects have state, behavior and identity.

CS507 - Information System - Question No: 16( M a r k s: 1 )
Null value may or may not be called zero value.

► True
 ► False
Answer by Fuad .
Reference ..Null : is a blank read as zero value. so it should be called Zero Value. 

CS507 - Information System - Question No: 17( M a r k s: 1 )
Organizations are distinguished on the basis of  __________

► Attributes
 ► Policy
 ► Management
Organizations can be distinguished on the basis of various criteria. These are as follows.
• Organizational structure
• Culture of the Organizations
• Management Style
• Decision Making Style

CS507 - Information System - Question No: 18( M a r k s: 1 )
 __________ is known as father of warehouse.

 ► Stephen hawking
 ► Bill gates
 ► Bill Inmon
Decision Support Systems was defined by Bill Inmon, father of data warehouse.

CS507 - Information System - Question No: 19( M a r k s: 1 )
Rounded shaped symbol in the flow chart is called ____________

► Connector
 ► Arrow
 ► Process

CS507 - Information System - Question No: 20( M a r k s: 1 )
Individuals using their skills to forward a political agenda, possibly breaking the law in the process, but justifying their actions for political reasons are called ________

 ► Hacktivsts
 ► Crackers
 ► Hackers
Hacktivsts: This refers to individuals using their skills to forward a political agenda, possibly breaking the law in the process, but justifying their actions for political reasons.

CS507 - Information System - Question No: 21( M a r k s: 1 )
Object oriented analysis focuses on the _________

 ► States of objects
 ► Collaboration of objects
 ► Implementation of objects
Object-oriented analysis focuses on the definition of classes and the manner in which they collaborate to effect the customer requirements.

CS507 - Information System - Question No: 22( M a r k s: 1 )
Which of the following carry characteristics of specialization?

 ► Sub classes
 ► Sub Interfaces
 ► Sub objects
The purpose of a class is to specify a classification of objects and to specify the features that characterize the structure and behavior of those objects. Class can be divided into sub-classes.

CS507 - Information System - Question No: 23( M a r k s: 1 )
The two major criteria that are used to analyze risks are Operational Effects and Situational Impacts

► True
 ► False  (NOT SURE)

CS507 - Information System - Question No: 24( M a r k s: 1 )
Which of the following is not the type of CSF?

 ► Industry CSFs
 ► Environmental CSFs
 ► Technical CSFs
 ► Temporal CSFs
 Industry CSFs.
 Environmental CSFs.
 Temporal CSFs.

CS507 - Information System - Question No: 25( M a r k s: 1 )
The flowchart helps in locating and correcting errors also called debugging.

► True
 ► False
Proper Debugging: The flowchart helps in locating and correcting errors (Also called debugging).

CS507 - Information System - Question No: 26( M a r k s: 1 )
Which of the following is the process or art of defining the hardware and software architecture, components, modules, interfaces, and data for a computer system to satisfy specified requirements?

 ► Systems Design
 ► Systems Requirement
 ► Coding
 ► Requirement
Systems design is the process or art of defining the hardware and software architecture, components, modules, interfaces, and data for a computer system to satisfy specified requirements.”

CS507 - Information System - Question No: 27( M a r k s: 1 )
Which of the following focus on detecting potentially abnormal behavior in function of operating system or request made by application software?

 ► Active Monitors
 ► Scanners
 ► Antivirus
 ► Behavior blockers
Behavior blockers :Focus on detecting potentially abnormal behavior in function of operating system or request made by application software.

CS507 - Information System - Question No: 28( M a r k s: 1 )
Buying and selling of products, services and information via computer networks, primarily through Internet is:

 ► E-Commerce
 ► E-Business
 ► Web Surfing
 ► BPR
Electronic Commerce (e-commerce or EC) describes the buying, selling, and exchanging of products, services, and information via computer network, primarily the internet.

CS507 - Information System - Question No: 29( M a r k s: 1 )
_____________ is one of the component of Intrusion Detection System (IDS).

 ► Log File
 ► Host
 ► Administrative Consol
 ► None of above
An administrative console – it contains intrusion definitions applied by the analyzers.

CS507 - Information System - Question No: 30( M a r k s: 1 )
The flow of information in organization can be _______ways.

 ► 1
 ► 2
 ► 3
 ► 4
Internal and external.

CS507 - Information System - Question No: 31( M a r k s: 2 )
What are Active monitors? Define.

Answer:

This software serves the concurrent monitoring as the system is being used. They act as a guard against viruses while the operating system is performing various functions e.g connected to internet, transferring data, etc. It blocks a virus to access the specific portions to which only the operating system has the authorized access. Active monitors can be problem some because they can not distinguish between a user request and a program or a virus request. As a result, users are asked to confirm actions, including formatting a disk or deleting a file or a set of files.

CS507 - Information System - Question No: 32( M a r k s: 2 )
What is information Quality Checklist?
Answer:

Information Quality Checklist
The information can also be ranked in accordance with the qualities it has in it. The experts have devised certain criteria to evaluate the quality of information. These are stated below:

1. Is it clear who has written the information?
2. Who is the author? Is it an organization or an individual person? Is there a way to contact them?
3. Are the aims of the information clear?
4. What are the aims of the information? What is it for? Who is it for?
Does the information achieve its aims?
5. Does the information do what it says it will?
Is the information relevant to me?
List five things to find out from the information.

1. Can the information be checked?
Is the author qualified to write the information? Has anyone else said the same things
anywhere else? Is there any way of checking this out? If the information is new,
is there any proof?
2. When was the information produced?
Is it up to date? Can you check to see if the information is up to date?
3. Is the information biased in any way?
Has the information got a particular reason for wanting you to think in a particular way?
Is it a balanced view or does it only give one opinion?
4. Does the information tell you about choices open to you?
Does the information give you advice? Does it

CS507 - Information System - Question No: 33  ( M a r k s: 2 )
List any two types of information that can be used as input for vulnerability ?

Answer:

Following information is used as an input
1. Reports of prior risk assessments
2. Any audit comments
3. Security requirements
4. Security test results

CS507 - Information System - Question No: 34( M a r k s: 2 )
Define CRM ?

Answer:

Customer relationship management (CRM) is a widely-implemented strategy for managing a company’s interactions with customers, clients and sales prospects. It involves using technology to organize, automate, and synchronize business processes—principally sales activities, but also those for marketing, customer service, and technical support. The overall goals are to find, attract, and win new clients, nurture and retain those the company already has, entice former clients back into the fold, and reduce the costs of marketing and client service. Customer relationship management describes a company-wide business strategy including customer-interface departments as well as other departments. Measuring and valuing customer relationships is critical to implementing this strategy.

CS507 - Information System - Question No: 35( M a r k s: 3 )
What are the information requirements for Management level in Accounting & financial Information Systems.

Answer:

Financial Information Systems like other information systems should cater for information requirements at each level, for instance.
Strategic level
1. Investment goals
2. Long range forecasts for firm’s financial performance
3. Acquisition of financial resources and goals
Knowledge Level
1. Analytical tools to design the right mix for investment
2. Portfolio updates
3. Market information analysis
Management level
1. Control over firm’s financial resources
2. Investment management
3. Budget management
4. Tax management
5. Profitability & Performance Evaluation
Operational Level
1. Cash flow statements through various transactions
2. Inventory and debtor’s management
3. Creditors Management

CS507 - Information System - Question No: 36   ( M a r k s: 3 )
What is access control? Give example

Answer:

Access control: These controls establish the interface between the would-be user of the computer system and the computer itself. These controls monitor the initial handshaking procedure of the user with the operating system. 

Example: when a customer enters the card and the pin code in an automatic teller machine (ATM), the access controls are exercised by the system to block unwanted or illegitimate access.

CS507 - Information System - Question No: 37( M a r k s: 3 )
Discuss Centralized and Distributed Processing in terms of their comparison ?
Answer:

Centralized vs. Distributed Processing

Centralized Processing is performed in one computer or in a cluster of coupled computers in a single location. Centralized processing was the architecture that evolved from the very first computers; however, user access was via dumb terminals that performed none of the primary processing. Today, centralized computers are still widely used, but the terminals are mostly full-featured desktop computers.

Distributed processing refers to any of a variety of computer systems that use more than one computer, or processor, to run an application. More often, however, distributed processing refers to local-area networks (LANs) designed so that a single program can run simultaneously at various sites. Most distributed processing systems contain sophisticated software that detects idle CPUs on the network and parcels out programs to utilize them.

Another form of distributed processing involves distributed databases, databases in which the data is stored across two or more computer systems. The database system keeps track of where the data is so that the distributed nature of the database is not apparent to users. Distributed processing is a programming paradigm focusing on designing distributed, open, scalable, transparent, fault tolerant systems. This paradigm is a natural result of the use of computers to form networks.

Distributed computing is decentralized and parallel computing, using two or more computers communicating over a network to accomplish a common objective or task. The types of hardware, programming languages, operating systems and other resources may vary drastically. It is similar to computer clustering with the main difference being a wide geographic dispersion of the resources. As the terms can explain, processing can be done at one location in case on centralized or at different locations in case of distributed processing. The CS507 - Information System - Question arises is how both types of processing are different from each other.

CS507 - Information System - Question No: 38( M a r k s: 3 )
Identify draw backs of ERP systems ?
 Answer:

CS507 - Information System - Question No: 39( M a r k s: 5 )
Differentiate the following
1.Intrusion Detection vs Variance Detection

Answer:

Intrusion detection:

Intrusion detection refers to the process of identifying attempts to penetrate a system and gain unauthorized access. If audit trails have been designed and implemented to record appropriate information, they can assist in intrusion detection. Intrusion detection system can be made part of the regular security system to effectively detect intrusion. Real time intrusion detection is technical and complex to achieve but reasonable extent can be attained. Real-time intrusion detection is primarily aimed at outsiders attempting to gain unauthorized access to the system.

Variance detection:
Trends/variance-detection tools look for anomalies in user or system behavior. It is possible to monitor usage trends and detect major variations. The log can be detected and analyzed to detect the irregularity. For example, if a user typically logs in at 9 a.m., but appears at 4:30 a.m. one morning, this may indicate either a security problem or a malfunctioning of the system clock that may need to be investigated. The log can be sorted/filtered for all log ins before 9 a.m. from that particular terminal. 

CS507 - Information System - Question No: 40 ( M a r k s: 5 )
Define the following:
a)EC (ECommerce)
b)EB (EBusiness)

Answer:

E-Commerce: Electronic commerce is an emerging concept that describes the process of buying and selling or exchanging of products, services and information via computer networks including the internet

EB (EBusiness): eBusiness (electronic business) is, in its simplest form, the conduct of business on the Internet. It is a more generic term than eCommerce because it refers to not only buying and selling but also servicing customers and collaborating with business partner.

Leave a Reply

Related Posts Plugin for WordPress, Blogger...