Download the latest final term paper solved by vuhelp team only please download them cs507, online quiz which will help all of you. So please share your paper as well. For downloading this file you have to login or register on this website.View more random threads:
- cs601 midterm paper all mcq's in one file
- IT430 solved mcq's and paper of fall 2010 December
- CS403 Database Management Systems solved midterm paper...
- cs201 solved & unsolved mid term paper spring 2011
- Solved subjective paper of sta630 fall 2010 on 21-02-2011
- Mgt603 solved paper fall 2010 on 17-02-2011
- Solved Paper MGT101 Fall 2009 Final Term
- mgt211 solved paper 4 december fall 2010
- CS201- Introduction to Programming current papers final...
- Solved Paper MTH302 Business Mathematics & Statistics...
FINALTERM EXAMINATION
Spring 2010
CS507- Information Systems
Question No: 1 ( Marks: 1 ) - Please choose one
Small organizations usually have complex management structure.
► True
► False
Question No: 2 ( Marks: 1 ) - Please choose one
A hierarchical organization is structured in a way such that every entity in the
organization, except one, is subordinate to a single other entity.
► True
► False
Question No: 3 ( Marks: 1 ) - Please choose one
Past court decisions have stated that privacy must be balanced against the needs
of society.
► True
► False
Question No: 4 ( Marks: 1 ) - Please choose one
Business is a system where management decisions are influenced by or have
an influence on suppliers, customers, society as a whole.
► True
► False
Question No: 5 ( Marks: 1 ) - Please choose one
Customer touch point is a method of interaction with a customer, such as
telephone, e-mail, a customer service or help desk, conventional mail, Web site
and store.
► True
► False
Question No: 6 ( Marks: 1 ) - Please choose one
Which of the following functions provide such data as sales prospect and
contact information, product information, product configurations and sales
quotes?
► Sales force automation (SFA)
► CRM
► ERP
► MIS
Question No: 7 ( Marks: 1 ) - Please choose one
A ________ is an agreed-upon set of conventions that defines the rules of
communication.
► Protocol
Protocol
► Interconnection Medium
► Data Packet
► Message
Question No: 8 ( Marks: 1 ) - Please choose one
----------is a type of computer software that facilitates group decision-making
within an organization
► EMS
► DSS
► MIS
Question No: 9 ( Marks: 1 ) - Please choose one
The identification of risks should start with:
► Description of the internal and external risks
► A brainstorming session with risk management experts and a program
profile
► A good understanding of the program and a brainstorming session
with key stakeholders
► Definitions of likelihood and impact
Question No: 10 ( Marks: 1 ) - Please choose one
Automated data are less susceptible to destruction and misuse than
paper data.
► True
► False
Question No: 11 ( Marks: 1 ) - Please choose one
Wireless computing devices are not subject to viruses.
► False
► True
Question No: 12 ( Marks: 1 ) - Please choose one
The purpose of a class is to specify a classification of objects and to specify the
features that characterize the structure and behavior of those objects.
► True
► False
Question No: 13 ( Marks: 1 ) - Please choose one
Null value may or may not be called zero value.
► True
► False
Question No: 14 ( Marks: 1 ) - Please choose one
Existence of functional departments in each organization may vary with the
nature of industry and the nature of products/services being offered.
► True
► False
Question No: 15 ( Marks: 1 ) - Please choose one
RAID model combines the elements of the waterfall model with the philosophy
of prototyping.
► True
► False
Question No: 16 ( Marks: 1 ) - Please choose one
_________ means information hiding.
► Inheritance
► Encapsulation
► Class
Question No: 17 ( Marks: 1 ) - Please choose one
Testing is easy for the software that is developed using OOAD due to use of
___________
► Modular approach
► Real time modeling
► Usability feature
Question No: 18 ( Marks: 1 ) - Please choose one
Characteristics of object are called ________
► Methods
► Attributes
► Status
Question No: 19 ( Marks: 1 ) - Please choose one
An event-oriented log usually contain records describing system events,
application
events, or user events.
► True
► False
Question No: 20 ( Marks: 1 ) - Please choose one
An information technology (IT) audit is an Examination of the controls
within an entity’s Information technology infrastructure .
► True
► False
Question No: 21 ( Marks: 1 ) - Please choose one
In assessing risks for an IT system, _______________ is the first step.
► To define the scope of the effort.
► Vulnerability Assesment
► threat identification
Question No: 22 ( Marks: 1 ) - Please choose one
Risk Management includes assessment of controls already been implemented or
planned, probability that they can be broken, assessment of potential loss despite
such controls existing.
► True
► False
Question No: 23 ( Marks: 1 ) - Please choose one
Access Control refers to the process of identifying attempts to penetrate a
system and gain unauthorized access.
► True
► False
Question No: 24 ( Marks: 1 ) - Please choose one
“M-Commerce” stands for Mobile Commerce.
► True
► False
Question No: 25 ( Marks: 1 ) - Please choose one
Past court decisions have stated that privacy must be balanced against the needs
of ethics.
► True
► False
Question No: 26 ( Marks: 1 ) - Please choose one
Which of the following is the primary method for keeping a computer
secure from intruders?
► Password
► Antivirus
► Scanners
► Firewall
Question No: 27 ( Marks: 1 ) - Please choose one
__________ is an association among entities. There has to be a relationship
between two entities
► Value Sets
► Cardinality
► Relationships
Question No: 28 ( Marks: 1 ) - Please choose one
____________ are the symbols indicates the flow of the procedure being
explained.
► Entity Relationship Diagram
► DFD
► Flowchart
Question No: 29 ( Marks: 1 ) - Please choose one
To accept the potential risk and continue operating the IT system or to
implement controls to lower the risk to an acceptable level is called as ----------
-----.
► Risk Planning
► Risk Assumption
► Risk Limitation
► None of the above
Question No: 30 ( Marks: 1 ) - Please choose one
RAID models based on producing deliverables frequently/repetitively.
► True
► False
Question No: 31 ( Marks: 2 )
What should be the basic objective of an organization in your opinion?
The basic objective of an organization is to make a profit and get a sustainable
competency.
Question No: 32 ( Marks: 2 )
Why we need to secure information systems?
Question No: 33 ( Marks: 2 )
Define intrusion detection ?
Question No: 34 ( Marks: 2 )
Identify components of Intrusion detection system?
Question No: 35 ( Marks: 3 )
How can we make our password secure?
Question No: 36 ( Marks: 3 )
What are some of the things you should keep in mind when identifying risks?
Question No: 37 (Marks: 3)
Briefly describe Incremental Model.
Question No: 38 ( Marks: 3 )
Information system security association of USA has listed many ethical
challenges, identify any three of them?
Question No: 39 ( Marks: 5 )
What do you think what are the key benefits of Ecommerce to organizations?
Question No: 40 ( Marks: 5 )
What do you understand by Disaster Recovery Planning?
Sponsored Links
Urgent call: 03455242488. | Virtual University Assignments
Virtual University GDBs | Virtual University Papers | Vu Projects | Vu Handouts
About Expert
There are currently 1 users browsing this thread. (0 members and 1 guests)