Академический Документы
Профессиональный Документы
Культура Документы
Option a and b
None of these
2. Which of the following is an object that exists and is distinguishable from other
objects?
Entity pg 113
Attribute
Object
Instance
True pg 128
False
4. The organization refers to a organizational structure with few or no levels of
intervening management between staff and managers is called-----------------
Hierarchical organization
Flat Organization pg 10
Pyramid Organization
True
False
False
True pg 156
7. Buying and selling of products, services and information via computer networks,
primarily the Internet is :
E-Commerce page 172
E-Business
Web Surfing
BPR
Threat Identification
Access Control
All of above
"The threat source lacks motivation or capability or controls are in place to prevent
or at Least significantly impede the vulnerability from being exercised."
High
Medium
None of these
10. The flowchart helps in locating and correcting errors also called debugging.
False
11. The purpose of data flow diagrams is to provide a --------- between users and
systems developers
Empty Space
Data Flows
Options a and b
12. Active Attack is one of the types of Web Security information systems.
True
False
13. Accounts should have a control over various recording points in the entire
process from procurement to finished good store room.
False
True page 55
Primary
Tertiary
Secondary page 3
15. One of the methods of integrating different business information systems is:
► Message passing
► States of objects
► Collaboration of objects
► Implementation of objects
18. In drawing a proper flowchart, all necessary steps that are a part of process
should be listed out in ---------------------- order.
► Logical
► Physical
► Random
► Top to Bottom
► Industry CSFs
► Environmental CSFs
► Technical CSFs
► Temporal CSFs
► Stephen hawking
► Bill gates
► Bill Inmon
22. Every decision we take in daily life requires some sort of information about the
alternatives available.
► True
► False
True
False
► True
► False
Information systems include accounting and finance function as a critical part of the
entire system.
Hence, these days audit of information systems as whole incisively focuses on finance
and accounting aspect as well. For example, all banks and financial institutions have soft
wares supporting interest computations. During the audit of IS, the integrity of the source
code/program instructions have to be checked and assurance obtained that these have not
been tampered with or altered in any manner.
Incorrect definition of a formula or linkage can give incorrect results. Virtually all
complex programs contain virus. Incorrect/ invalidated / unedited data entry is not a
programming fault or a bug. The process of removing bugs from software is termed as
debugging. Virus is the external threat which is not a malfunction of the software.
However, a bug in the software can create a virus.
Dropper
A dropper is a program not a virus. It installs a virus on the PC while performing another
function.
Trojan horse
“ERP (enterprise resource planning) is an industry term for the broad set of activities
supported by multi-module application software that helps a manufacturer or other
business manage the important parts of its business, including product planning, parts
purchasing, maintaining inventories, interacting with suppliers, providing customer
service, and tracking orders.”
Hackers
A hacker is a person who attempts to invade the privacy of the system. In fact he attempts
to gain unauthorized entry to a computer system by circumventing the system’s access
controls. Hackers are normally skilled programmers, and have been known to crack
system passwords, with quite an ease. Initially hackers used to aim at simply copying the
desired information from the system. But now the trend has been to corrupt the desired
information.
Technological Limitations
1. Lack of universal standards for quality, security, and reliability
2. The telecommunications bandwidth is insufficient, especially for m-commerce
(electronic commerce via mobile phones).
3. Difficulty in integrating e-commerce infrastructure with current organizational IT
systems - Many companies use IT systems, which are old (i.e. legacy systems).
These were developed to support different needs and different kinds of software
and applications. These systems contain valuable business information but have to
be integrated with new ones. In many occasions this is extremely difficult. When
it comes to full integration with back-office operations, for example, the cost of
integrating legacy systems with modern ones may be greater than that of actually
scrapping them completely
11. What are three challenges faced by security association of USA?(3 marks)
Information system security association of USA has listed down following ethical
challenges
2. Abuse of privileges
3. Inappropriate monitoring
The Systems Life Cycle (SLC) is a type of methodology used to describe the process for
building information systems, intended to develop information systems in a very
deliberate, structured and methodical way, reiterating each stage of the life cycle.
A Systems Development Life Cycle (SDLC) adheres to important phases that are
essential for developers, such as planning, analysis, design, and implementation.
13. What should be kept in mind while identifying the risk? (3 marks)
Read more: CS507 Final Term Paper Fall 2010 Feb 2011 - Virtual University of Pakistan
http://vustudents.ning.com/group/cs507informationsystems/forum/topics/cs507-final-
term-paper-fall#ixzz1L5fYJv00
Read more: CS507 Current Final Term Papers Fall 2010 (11~26 Feb 2011) - Virtual
University of Pakistan
http://vustudents.ning.com/group/cs507informationsystems/forum/topics/cs507-current-
final-term#ixzz1L5fyuKMf
CS507 on 12/02/2011, Final Term Paper
Time: 120 minutes
Total Questions: 45
Total Marks: 75
Distribution:
MCQs: 30
Questions having 2 marks: 06
Questions having 3 marks: 06
Questions having 5 marks: 3
•
•
•
•
•
And
Questions having 5 marks are:
• What is vulnerability Assessment? Discuss its output and inputs.
• Discuss different types of unintentional threats using any example.
• Benefits of E-Commerce to society and Customers.
Read more: CS507 Current Final Term Papers Fall 2010 (11~26 Feb 2011) - Virtual
University of Pakistan
http://vustudents.ning.com/group/cs507informationsystems/forum/topics/cs507-current-
final-term#ixzz1L5g74Ctq
Subjective question
Read more: CS507 Current Final Term Papers Fall 2010 (11~26 Feb 2011) - Virtual
University of Pakistan
http://vustudents.ning.com/group/cs507informationsystems/forum/topics/cs507-current-
final-term#ixzz1L5gDAfbD
Read more: CS507 Current Final Term Papers Fall 2010 (11~26 Feb 2011) - Virtual
University of Pakistan
http://vustudents.ning.com/group/cs507informationsystems/forum/topics/cs507-current-
final-term#ixzz1L5gIRa67
Q7:Discuss various steps in threat identification.Give any example of threat sources and
threat actions?3marks
Q8:what are the challenges to organization for launching E commerce. identify any
three?3marks
Q11:Difine e-business?2marks
Read more: CS507 Current Final Term Papers Fall 2010 (11~26 Feb 2011) - Virtual
University of Pakistan
http://vustudents.ning.com/group/cs507informationsystems/forum/topics/cs507-current-
final-term#ixzz1L5gMi6c5
Q1: Discuss why firewall is the primary method for keeping a computer secure from
intruder? 5 marks
Q2 :why access control are necessary for the system?5marks
Q3 ;discuss supply chain problems and elaborate methods
to solve these problems?5marks
Q4: what is reusable software?3marks
Q5:Give any two reason for having a system in an organization?3marks
Q6:Differentiate CRM from ERP?3marks
Read more: CS507 Current Final Term Papers Fall 2010 (11~26 Feb 2011) - Virtual
University of Pakistan
http://vustudents.ning.com/group/cs507informationsystems/forum/topics/cs507-current-
final-term#ixzz1L5gQJslL
( Marks: 2 )What is an entity?
Read more: CS507 Current Final Term Papers Fall 2010 (11~26 Feb 2011) - Virtual
University of Pakistan
http://vustudents.ning.com/group/cs507informationsystems/forum/topics/cs507-current-
final-term#ixzz1L5gXukws
1)what is monitoring?
2) what is firewall?
3)what r da challenges facing an organisation launching E-Commerce?
4)give example of entusion?
5)Difference between logical entusion & phlysical entusion?
6)Dscribe trojon and dropper
7)how firewall works? how u protect from hackers?
Read more: CS507 Current Final Term Papers Fall 2010 (11~26 Feb 2011) - Virtual
University of Pakistan
http://vustudents.ning.com/group/cs507informationsystems/forum/topics/cs507-current-
final-term#ixzz1L5gbTLgT
Question # 1 of 10 ( Start time: 07:58:13 PM ) Total Marks: 1
Management controls are also known as:
Select correct option:
Technical controls
Non-technical controls
Scientific controls
Logical controls
True
False
True
False
security plan
security measures
security audit
security lapse
True
False
True
False
True
False
True
False
My current paper is
1- Define OLAP
2- Define prototype brifly
3- Describe IT planning in your own words
4- Define Expert system brifly
▶ Reply
• Message
▶ Reply
• Message
Permalink Reply by M.Tariq Malik on December 2, 2010 at 11:38am
Total Question 26
MCQ's 20
Short Question 06
▶ Reply
• Message
give one daily life example of each: structured prob, unstructured prob and semi
structured prob. (5)
•
▶ Reply
• Message
▶ Reply
• Message
My current paper is
1- Define OLAP
2- Define prototype brifly
3- Describe IT planning in your own words
4- Define Expert system brifly
▶ Reply
• Message
▶ Reply
• Message
Permalink Reply by M.Tariq Malik on December 2, 2010 at 11:38am
Total Question 26
MCQ's 20
Short Question 06
▶ Reply
• Message
give one daily life example of each: structured prob, unstructured prob and semi
structured prob. (5)
•
▶ Reply
• Message
▶ Reply
• Message