Search Papers On This Blog. Just Write The Name Of The Course

Sunday 26 December 2010

CS – 507 (Information Systems) Complete Final term Past Paper 2009

Final term Examination
CS – 507 (Information Systems)  
2010
Automated data are less susceptible to destruction and misuse than paper data
a)         True
b)         False

Documentation may include program code of application softwares, technical manuals, user manuals e
a)         True
b)         False

Which of the following likelihood level is true for the following: "The threat source lacks motivation or capability or controls are in place to prevent or at least significantly impede the vulnerability from being exercised."
a)         High
b)         Low
c)         Medium
d)         None of these

Which of the following level is formulation of new sales products, and identifying new sales opportunities?
a)         Operational
b)         Managerial
c)         Strategic

The spiral model emphasizes the need to go back and reiterate earlier steps a number of times as the project progresses.
a)         True
b)         False

In assessing risks for an IT system, _______________ is the first step.
a)         To define the scope of the effort.
b)         Vulnerability Assesment
c)         threat identification

IDS works in conjunction with routers and firewalls by monitoring network usage anomalies to protect a company s information systems resources from external as well as internal misuse.
a)         True
b)         False

Which of the following model combines the elements of the waterfall model with the philosophy of prototyping?
       Prototyping
       Iterative
       Incremental
       RAID

__________ sources materials in which the information from secondary sources has been digested.
►Primary
►Tertiary
►Secondary
Targeting advertising to customers to -------------- the probability, that an offer is accepted.
       Decrease
       Increase
       Stable

Information technology has been criticized for having a negative effect on people's individuality
       False
       True

In which of the following there is a direct interaction facilitated by auctions, classifieds, and bartering?

       EGovernment
       MCommerce
       Consumer-to-consumer EC
       Intrabusiness EC

Nature of vulnerability is an input source for Likelihood determination

       True
       False
A Trojan horse virus stays dormant until a specific time or data condition is met.

►True
►False

Object orientation helps in increasing abstraction level to build _________
►Testable software
►Reusable software
►Maintainable software

Encapsulation means information
hiding.

The use of software routines to tie up the computer hosting a Web site that denies legitimate visitor's access is called :
 Select correct option:

denial of service
hacking.
Spoofing
Sniffing

Fire wall is the primary method for keeping a computer secure from intruders.
True
False

Why  use in arrow of process in the flow chart? (Marks 1)
What is Object Oriented Analysis and Design (OOAD)? (Marks 1)

Critical Success Factors differ from organization to organization. While approving any project, the
management may evaluate the project on the basis of certain factors critical to the success or failure of the
project. Five example in real life (Marks 10)

What do you understand by computing envroiment. Describe the • Stand Alone Processing and Web Based Environment (Marks 5)

Roles & Responsibility any three (Marks 3)

 What is focal Point? Complete(Marks 10)

What is Vulnerability? (Marks 1)

Two output of Impact Analysis? (Marks 2)

What is challenge in lunching ecommerce? (Marks 5)

What is change management. Identify its types ? (Marks 5)

What is difference between the Changing and Freezing? (Marks 3)

No comments:

Post a Comment