FINALTERM EXAMINATION
Fall 2009
CS507- Information Systems
Ref No: 17
Time: 120 min
Marks: 75
Student Info | ||
Student ID: | | |
Center: | | |
Exam Date: | |
For Teacher's Use Only | |||||||||
Q No. | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | Total |
Marks | | | | | | | | | |
Q No. | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | |
Marks | | | | | | | | | |
Q No. | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | |
Marks | | | | | | | | | |
Q No. | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | |
Marks | | | | | | | | | |
Q No. | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | |
Marks | | | | | | | | | |
Q No. | 41 | | | | | | | | |
Marks | | | | | | | | | |
Question No: 1 ( Marks: 1 ) - Please choose one

ERP’s major objective is to tightly integrate the functional areas of the organization and to enable seamless information flows across the functional areas.
► True
► False
Question No: 2 ( Marks: 1 ) - Please choose one

The environment exerts influence on the system and the system also influences the environment.
► Open system
► Closed system
► Closed end System
Question No: 3 ( Marks: 1 ) - Please choose one

Customer touch point is a method of interaction with a customer, such as telephone, e-mail, a customer service or help desk, conventional mail, Web site and store.
► True
► False
Question No: 4 ( Marks: 1 ) - Please choose one

One of the methods of integrating different business information systems is :
► Supply Chain management software
► Interface reconciliation software
► Message passing
► None of the given options
Question No: 5 ( Marks: 1 ) - Please choose one

The bullwhip effect refers to erratic shifts in orders up and down the supply chain because of poor demand forecasting, price fluctuation, order batching, and rationing within the chain.
► True
► False
Question No: 6 ( Marks: 1 ) - Please choose one

“M-Commerce” stands for
► E-Commerce
► None of given options
► Mobile Commerce
Question No: 7 ( Marks: 1 ) - Please choose one

The comparison of actual system with expected system is done with the help of control mechanism.
► False
► True
Question No: 8 ( Marks: 1 ) - Please choose one

Organizations sell products to other organizations electronically is an example of:
► Ecommerce
► EBusiness
► BPR
► BPRE
Question No: 9 ( Marks: 1 ) - Please choose one

Which of the following refers to the process of identifying attempts to penetrate a system and gain unauthorized access?
► Threat Identification
► Intrusion detection
► Access Control
► All of above
Question No: 10 ( Marks: 1 ) - Please choose one

A ________ is an agreed-upon set of conventions that defines the rules of communication.
► Protocol
► Interconnection Medium
► Data Packet
► Message
Question No: 11 ( Marks: 1 ) - Please choose one

The identification of risks should start with:
► Description of the internal and external risks
► A brainstorming session with risk management experts and a program profile
► A good understanding of the program and a brainstorming session with key stakeholders
► Definitions of likelihood and impact
Question No: 12 ( Marks: 1 ) - Please choose one

The term OIS views organization as a combination of process oriented groups whose information needs are related but Independent.
► False
► True
Question No: 13 ( Marks: 1 ) - Please choose one

In case of logical intrusion, the intruder might be trying to have an unauthorized access to the system.
► True
► False
Question No: 14 ( Marks: 1 ) - Please choose one

Which one of the following computer systems uses duplication of components and data to cope with systems failures?
► Fault-tolerant systems
► Expert System
► MIS
► OIS
Question No: 15 ( Marks: 1 ) - Please choose one

Data travels across the internet through several levels of networks until it reaches its middle point.
► True
► False
Question No: 16 ( Marks: 1 ) - Please choose one

Which of the following is a data model or diagram for high-level descriptions of conceptual data model.
► ERD
► Flow Chart
► Algorithm
► DFD
Question No: 17 ( Marks: 1 ) - Please choose one

The procedures to follow when decision is needed can be specified in advance
► True
► False
Question No: 18 ( Marks: 1 ) - Please choose one

___________ have usually simple management structure.
► Small Organization
► Medium organization
► Large Organization
Question No: 19 ( Marks: 1 ) - Please choose one

__________ is an object that exists and is distinguishable from other objects.
► Value Sets
► Entity
► Relationships
Question No: 20 ( Marks: 1 ) - Please choose one

Object oriented analysis generates _________
► Implementation constraints
► System Interfaces
► Conceptual model of Information
Question No: 21 ( Marks: 1 ) - Please choose one

Inheritance can be defined in terms of _________
► Has kind of
► Is based on
► Is kind of
Question No: 22 ( Marks: 1 ) - Please choose one

An IDS with the neural network feature monitors the general patterns of activity and
traffic on the network and creates a database.
► True
► False
Question No: 23 ( Marks: 1 ) - Please choose one

M-Commerce (mobile commerce) refers to the conduct of e-commerce via wireless devices.
► True
► False
Question No: 24 ( Marks: 1 ) - Please choose one

ERP Systems control all major business processes with a single software architecture in real time.
► True
► False
Question No: 25 ( Marks: 1 ) - Please choose one

Preparing a situation for change by disconfirming existing attitudes and
behaviors is called Unfreezing.
► True
► False
Question No: 26 ( Marks: 1 ) - Please choose one

Ethics is a branch of science that deals with what is considered to be right and wrong.
► True
► False
Question No: 27 ( Marks: 1 ) - Please choose one

Which of the following is the process or art of defining the hardware and software architecture, components, modules, interfaces, and data for a computer system to satisfy specified requirements?
► Systems Design
► Systems Requirement
► Coding
► Requirement
Question No: 28 ( Marks: 1 ) - Please choose one

Buying and selling of products, services and information via computer networks, primarily through Internet is :
► E-Commerce
► E-Business
► Web Surfing
► BPR
Question No: 29 ( Marks: 1 ) - Please choose one

In which of the following decisions the problems are non routine, critical and novel in nature, require individual judgment, evaluation and insight varying on case-to-case basis.
► Semi-Structured decisions
► Unstructured decisions
► Structured decisions
Question No: 30 ( Marks: 1 ) - Please choose one

There are five phases of the decision making process, first one is intelligence.
► True
► False
Question No: 31 ( Marks: 1 )

What is an entity set?
Question No: 32 ( Marks: 1 )

Define Clear Text ?
.
Question No: 33 ( Marks: 2 )

Differentiate between Changing and Refreezing ?
Question No: 34 ( Marks: 2 )

Why we use the tools like flowcharts, DFDs etc in the System Design?
Question No: 35 ( Marks: 3 )

What is access control? Give example
Question No: 36 ( Marks: 3 )

List any three ethical challenges given by IS security association of USA ?
Question No: 37 ( Marks: 3 )

What are the objective/purposes of the DFDs?
Question No: 38 ( Marks: 5 )

Differentiate the following
1. Intrusion Detection vs Variance Detection
Question No: 39 ( Marks: 5 )

What are the sources of critical success factor?
Question No: 40 ( Marks: 10 )

What is reusable software?
Question No: 41 ( Marks: 10 )

Discuss System Characterization ? What information may help to characterize the system ?
No comments:
Post a Comment