Monday, February 22, 2010

CS507 Final Paper

FINALTERM  EXAMINATION
Fall 2009
CS507- Information Systems
Ref No: 17
Time: 120 min
Marks: 75
Student Info
Student ID:


Center:


Exam Date:




For Teacher's Use Only
Q No.
1
2
3
4
5
6
7
8
Total
Marks
      
      
      
      
       
      
      
      
      
Q No.
9
10
11
12
13
14
15
16

Marks
      
      
      
      
      
      
      
      
      
Q No.
17
18
19
20
21
22
23
24

Marks
      
      
      
      
      
      
      
      
      
Q No.
25
26
27
28
29
30
31
32

Marks
      
      
      
      
      
      
      
      
      
Q No.
33
34
35
36
37
38
39
40

Marks
      
      
      
      
      
      
      
      
      
Q No.
41








Marks
      
      
      
      
      
      
      
      
      





Question No: 1      ( Marks: 1 ) - Please choose one
 

ERPs major objective is to tightly integrate the functional areas of the organization and to enable seamless information flows across the functional areas.



       True

       False



Question No: 2      ( Marks: 1 ) - Please choose one
 

The environment exerts influence on the system and the system also influences the environment.


       Open system

       Closed system


       Closed end System




Question No: 3      ( Marks: 1 ) - Please choose one
 

Customer touch point is a method of interaction with a customer, such as telephone, e-mail, a customer service or help desk, conventional mail, Web site and store.


       True

       False



Question No: 4      ( Marks: 1 ) - Please choose one
 

One of the methods of integrating different business information systems is :


       ► Supply Chain management software

       ► Interface reconciliation software


       ► Message passing


       ► None of the given options




Question No: 5      ( Marks: 1 ) - Please choose one
 

The bullwhip effect refers to erratic shifts in orders up and down the supply chain because of poor demand forecasting,  price fluctuation, order batching, and rationing within the chain.


       True

       False



Question No: 6      ( Marks: 1 ) - Please choose one
 

M-Commerce stands for


       E-Commerce

       None of given options


       Mobile Commerce




Question No: 7      ( Marks: 1 ) - Please choose one
 

The comparison of actual system with expected system is done with the help of control mechanism.


       False


       True



Question No: 8      ( Marks: 1 ) - Please choose one
 

Organizations sell products to other organizations electronically is an example of:


       Ecommerce


       EBusiness


       BPR


       BPRE




Question No: 9      ( Marks: 1 ) - Please choose one
 

Which of the following refers to the process of identifying attempts to penetrate a system and gain unauthorized access?

       Threat Identification


       Intrusion detection


       Access Control


       All of above




Question No: 10      ( Marks: 1 ) - Please choose one
 

A ________ is an agreed-upon set of conventions that defines the rules of communication.


       Protocol




       Interconnection Medium


       Data Packet


       Message           




Question No: 11      ( Marks: 1 ) - Please choose one
 

The identification of risks should start with:


       Description of the internal and external risks


       A brainstorming session with risk management experts and a program profile


       A good understanding of the program and a brainstorming session with key stakeholders


       Definitions of likelihood and impact




Question No: 12      ( Marks: 1 ) - Please choose one
 

The term OIS views organization as a combination of process oriented groups whose information needs are related but Independent.


       False


       True



Question No: 13      ( Marks: 1 ) - Please choose one
 

In case of logical intrusion, the intruder might be trying to have an unauthorized access to the system.


       True

       False



Question No: 14      ( Marks: 1 ) - Please choose one
 

Which one of the following computer systems uses duplication of components and  data to cope with systems failures?


       Fault-tolerant systems


       Expert System


       MIS


       OIS




Question No: 15      ( Marks: 1 ) - Please choose one
 

Data travels across the internet through several levels of networks until it reaches its middle point.

       True

       False



Question No: 16      ( Marks: 1 ) - Please choose one
 

Which of the following is a data model or diagram for high-level descriptions of conceptual data model.


       ERD

       Flow Chart

       Algorithm

       DFD



Question No: 17      ( Marks: 1 ) - Please choose one
 

The procedures to follow when decision is needed can be specified in advance


       True

       False



Question No: 18      ( Marks: 1 ) - Please choose one
 

___________ have usually simple management structure.

       Small Organization

       Medium organization

       Large Organization



Question No: 19      ( Marks: 1 ) - Please choose one
 

__________ is an object that exists and is distinguishable from other objects.

       Value Sets

       Entity

       Relationships



Question No: 20      ( Marks: 1 ) - Please choose one
 

Object oriented analysis generates _________

       Implementation constraints

       System Interfaces

       Conceptual model of Information



Question No: 21      ( Marks: 1 ) - Please choose one
 

Inheritance can be defined in terms of  _________

       Has kind of

       Is based on

       Is kind of



Question No: 22      ( Marks: 1 ) - Please choose one
 

An IDS with the neural network  feature monitors the general patterns of activity and
traffic on the network and creates a database.


       True

       False



Question No: 23      ( Marks: 1 ) - Please choose one
 

M-Commerce (mobile commerce) refers to the conduct of e-commerce via wireless devices.


       True

       False



Question No: 24      ( Marks: 1 ) - Please choose one
 

ERP Systems control all major business processes with a single software architecture in real time.


       True

       False



Question No: 25      ( Marks: 1 ) - Please choose one
 

Preparing a situation for change by disconfirming existing attitudes and
behaviors is called Unfreezing.


       True

       False



Question No: 26      ( Marks: 1 ) - Please choose one
 

Ethics is a branch of science that deals with what is considered to be right and wrong.

       True

       False



Question No: 27      ( Marks: 1 ) - Please choose one
 

Which of the following is the process or art of defining the hardware and software architecture, components, modules, interfaces, and data for a computer system to satisfy specified requirements?


       ► Systems Design

       ► Systems Requirement

       ► Coding

       ► Requirement




Question No: 28      ( Marks: 1 ) - Please choose one
 

Buying and selling of products, services and information via computer networks, primarily through Internet is :


       ► E-Commerce


       ► E-Business


       ► Web Surfing


       ► BPR




Question No: 29      ( Marks: 1 ) - Please choose one
 

In which of the following decisions the problems are non routine, critical and novel in nature, require individual judgment, evaluation and insight varying on case-to-case basis.

       Semi-Structured decisions


       Unstructured decisions

       Structured decisions




Question No: 30      ( Marks: 1 ) - Please choose one
 

There are five phases of the decision making process, first one is intelligence.


       True


       False



Question No: 31      ( Marks: 1 )
 

What is an entity set?

Question No: 32      ( Marks: 1 )
 

Define Clear Text ?

.

Question No: 33      ( Marks: 2 )
 

Differentiate between Changing and Refreezing ?


Question No: 34      ( Marks: 2 )
 

Why we use the tools like flowcharts, DFDs etc in the System Design?


Question No: 35      ( Marks: 3 )
 

What is access control? Give example



Question No: 36      ( Marks: 3 )
 

List any three ethical challenges given by IS security association of USA ?



Question No: 37      ( Marks: 3 )
 

What are the objective/purposes of the DFDs?



Question No: 38      ( Marks: 5 )
 

Differentiate the following

1.      Intrusion Detection vs Variance Detection


Question No: 39      ( Marks: 5 )
 

What are the sources of critical success factor?



Question No: 40      ( Marks: 10 )
 

What is reusable software?



Question No: 41      ( Marks: 10 )
 

Discuss System Characterization ? What information may help to characterize the system ?


No comments:

Post a Comment