Total 40 Q
30 MCQ's
List any two tools used to implement TQM (2 Marks)
Identify aspects which are necessary to be covered when property issues for privacy is dealth with ? (2 Marks)
What are the physical threats to information system (2 Marks)
List any two types of information that can be used as input for vulnerability (2 MArks)
What is the difference between data and information (3 Marks)
What do you understand by an event-oriented log ? (3 MArks)
Identify roles and responsibilities of any three professionals of organization ? (3 Marks)
Identify any six factors that should be considered in order for change to be successful. (3 Marks)
What do you understand by supply chain management ? List and define the supply chain management. (5 Marks)
Identify any five phase of SDLL ? (5 Marks)
Showing posts with label CS507 Aug 2010. Show all posts
Showing posts with label CS507 Aug 2010. Show all posts
Wednesday, August 18, 2010
Tuesday, August 10, 2010
CS507 Final Paper 2010
30 MCQ’s, and subjective questions are as under.
¨ List the information required for medium size organization (2)
¨ What are the physical threats for Information System (2)
¨ List any two types of information that can be used as input for vulnerability. (2)
¨ List down different types of SUPPLY CHAIN. (2)
¨ How the information is kept in purchase department. (3)
¨ What do u know about Key stork Monitoring? (3)
¨ Identify roles and responsibilities of any three professionals in an organization. (3)
¨ Draw backs of ESP system. (3)
¨ Give two examples to prove that audit trials helps to provide variants from normal behavior which may lead to unauthorized usage of sources. (5)
¨ Classify E-Commerce into different classes. (5)
¨ List the information required for medium size organization (2)
¨ What are the physical threats for Information System (2)
¨ List any two types of information that can be used as input for vulnerability. (2)
¨ List down different types of SUPPLY CHAIN. (2)
¨ How the information is kept in purchase department. (3)
¨ What do u know about Key stork Monitoring? (3)
¨ Identify roles and responsibilities of any three professionals in an organization. (3)
¨ Draw backs of ESP system. (3)
¨ Give two examples to prove that audit trials helps to provide variants from normal behavior which may lead to unauthorized usage of sources. (5)
¨ Classify E-Commerce into different classes. (5)
Monday, August 9, 2010
CS507 Final Paper 2010










Saturday, August 7, 2010
CS507 Final Paper 2010
Today is my cs507 paper total 40 question 30 MCQS mostly truse nd false. nd 10 question.
Differentiation Encrption and decryption? 2 Marks
Identify Components of intrusion detection system? 2 Marks
What do we mean by cognitive process? 2 Marks
What is stand alone processing? 2 Marks
What do u mean by keystroke monitioring? 3 Marks
How virus and worms can be transmitted into computers? identify any three? 3 Marks
List down components of an intrusion detection system? 3 Marks
Discuss characteristics of flat organization? 3 Marks
Discuss various ERP attributes? 5 Marks
Incorporate Risk management SDLC? identify its phases? 5 Marks
Differentiation Encrption and decryption? 2 Marks
Identify Components of intrusion detection system? 2 Marks
What do we mean by cognitive process? 2 Marks
What is stand alone processing? 2 Marks
What do u mean by keystroke monitioring? 3 Marks
How virus and worms can be transmitted into computers? identify any three? 3 Marks
List down components of an intrusion detection system? 3 Marks
Discuss characteristics of flat organization? 3 Marks
Discuss various ERP attributes? 5 Marks
Incorporate Risk management SDLC? identify its phases? 5 Marks
Subscribe to:
Posts (Atom)