Question No: 1 ( Marks: 1 ) - Please choose one

Systems have collection of predefined ------related to each other in a sequenced logical manner in order to collectively achieve the desired results.

► Procedures

► Sequences

► Policies

Question No: 2 ( Marks: 1 ) - Please choose one

After her third data processing clerk showed up at work with wrist braces, Ms. Jackson called a specialty firm to assess the design of their work environment. This firm specializes in _____:

► furniture layout

► video display terminals

► Ergonomics

► lighting

Question No: 3 ( Marks: 1 ) - Please choose one

Customer touch point is a method of interaction with a customer, such as telephone, e-mail, a customer service or help desk, conventional mail, Web site and store.

► True

► False

Question No: 4 ( Marks: 1 ) - Please choose one

Buying and selling of products, services and information via computer networks, primarily the Internet is :

► E-Commerce

► E-Business

► Web Surfing

► BPR

Question No: 5 ( Marks: 1 ) - Please choose one

Which of the following refers to the process of identifying attempts to penetrate a system and gain unauthorized access?

► Threat Identification

► Intrusion detection

► Access Control

► All of above

Question No: 6 ( Marks: 1 ) - Please choose one

They represent Equations / Formulae representing relationship between two or more factors related to each other in a defined manner is called------

► Graphical Model

Mathematical Model

► Algebra Model

Question No: 7 ( Marks: 1 ) - Please choose one

Which of the following includes assessment of controls already been implemented or planned, probability that they can be broken, assessment of potential loss despite such controls existing?

► Control Analysis

► Vulnerability Assessment

► Risk Management

► All of above

Question No: 8 ( Marks: 1 ) - Please choose one

Likelihood Determination phase determines that a potential vulnerability could be exercised by a given threat-source.

► True

► False

Question No: 9 ( Marks: 1 ) - Please choose one

Which of the following likelihood level is true for the following:

"The threat source lacks motivation or capability or controls are in place to prevent or at least significantly impede the vulnerability from being exercised."

► High

► Low

► Medium

► None of these

Question No: 10 ( Marks: 1 ) - Please choose one

Production subsystem needs to be linked with the marketing system to ------right amount of product.

► Produce

► Sale

► Purchase

Question No: 1 ( Marks: 1 ) - Please choose one

ERP’s major objective is to tightly integrate the functional areas of the organization and to enable seamless information flows across the functional areas.

► True ► False

Question No: 2 ( Marks: 1 ) - Please choose one

The environment exerts influence on the system and the system also influences the environment.

► Open system

► Closed system

► Closed end System

Question No: 3 ( Marks: 1 ) - Please choose one

Customer touch point is a method of interaction with a customer, such as telephone, e-mail, a customer service or help desk, conventional mail, Web site and store.

► True

► False

Question No: 4 ( Marks: 1 ) - Please choose one

One of the methods of integrating different business information systems is :

► Supply Chain management software

► Interface reconciliation software

► Message passing

► None of the given options

Question No: 5 ( Marks: 1 ) - Please choose one

The bullwhip effect refers to erratic shifts in orders up and down the supply chain because of poor demand forecasting, price fluctuation, order batching, and rationing within the chain.

► True

► False

Question No: 6 ( Marks: 1 ) - Please choose one

“M-Commerce” stands for

► E-Commerce

► None of given options

► Mobile Commerce

Question No: 7 ( Marks: 1 ) - Please choose one

The comparison of actual system with expected system is done with the help of control mechanism.

► False

► True

Question No: 8 ( Marks: 1 ) - Please choose one

Organizations sell products to other organizations electronically is an example of:

► Ecommerce

► EBusiness

► BPR

► BPRE

Question No: 9 ( Marks: 1 ) - Please choose one

Which of the following refers to the process of identifying attempts to penetrate a system and gain unauthorized access?

► Threat Identification

► Intrusion detection

► Access Control

► All of above

Question No: 10 ( Marks: 1 ) - Please choose one

A ______is an agreed-upon set of conventions that defines the rules of communication.

► Protocol

► Interconnection Medium

► Data Packet

► Message

Question No: 11 ( Marks: 1 ) - Please choose one

The identification of risks should start with:

► Description of the internal and external risks

► A brainstorming session with risk management experts and a program profile

► A good understanding of the program and a brainstorming session with key stakeholders

► Definitions of likelihood and impact

Question No: 12 ( Marks: 1 ) - Please choose one

The term OIS views organization as a combination of process oriented groups whose information needs are related but Independent

► False

► True

Question No: 13 ( Marks: 1 ) - Please choose one

In case of logical intrusion, the intruder might be trying to have an unauthorized access to the system.

► True

► False

Question No: 14 ( Marks: 1 ) - Please choose one

Which one of the following computer systems uses duplication of components and data to cope with systems failures?

► Fault-tolerant systems

► Expert System

► MIS

► OIS

Question No: 15 ( Marks: 1 ) - Please choose one

Data travels across the internet through several levels of networks until it reaches its middle point.

► True

► False

Question No: 16 ( Marks: 1 ) - Please choose one

Which of the following is a data model or diagram for high-level descriptions of conceptual data model.

► ERD

► Flow Chart

► Algorithm

► DFD

Question No: 17 ( Marks: 1 ) - Please choose one

The procedures to follow when decision is needed can be specified in advance

► True

► False

Question No: 18 ( Marks: 1 ) - Please choose one

______have usually simple management structure.

► Small Organization

► Medium organization

► Large Organization

Question No: 19 ( Marks: 1 ) - Please choose one

______is an object that exists and is distinguishable from other objects.

► Value Sets

► Entity

► Relationships

Question No: 20 ( Marks: 1 ) - Please choose one

Object oriented analysis generates ______

► Implementation constraints

► System Interfaces

► Conceptual model of Information

Question No: 21 ( Marks: 1 ) - Please choose one

Inheritance can be defined in terms of ______

► Has kind of

► Is based on

► Is kind of

Question No: 22 ( Marks: 1 ) - Please choose one

An IDS with the neural network feature monitors the general patterns of activity and

traffic on the network and creates a database.

► True

► False

Question No: 23 ( Marks: 1 ) - Please choose one

M-Commerce (mobile commerce) refers to the conduct of e-commerce via wireless devices.

► True

► False

Question No: 24 ( Marks: 1 ) - Please choose one

ERP Systems control all major business processes with a single software architecture in real time.

► True

► False

Question No: 25 ( Marks: 1 ) - Please choose one

Preparing a situation for change by disconfirming existing attitudes and

behaviors is called Unfreezing.

► True

► False

Question No: 26 ( Marks: 1 ) - Please choose one

Ethics is a branch of science that deals with what is considered to be right and wrong.

► True

► False

Question No: 27 ( Marks: 1 ) - Please choose one

Which of the following is the process or art of defining the hardware and software architecture, components, modules, interfaces, and data for a computer system to satisfy specified requirements?

► Systems Design

► Systems Requirement

► Coding

► Requirement

Question No: 28 ( Marks: 1 ) - Please choose one

Buying and selling of products, services and information via computer networks, primarily through Internet is :

► E-Commerce

► E-Business

► Web Surfing

► BPR

Question No: 29 ( Marks: 1 ) - Please choose one

In which of the following decisions the problems are non routine, critical and novel in nature, require individual judgment, evaluation and insight varying on case-to-case basis.

► Semi-Structured decisions

► Unstructured decisions

► Structured decisions

Question No: 30 ( Marks: 1 ) - Please choose one

There are five phases of the decision making process, first one is intelligence.

► True

► False

Question No: 31 ( Marks: 1 )

What is an entity set?

Question No: 32 ( Marks: 1 )

Define Clear Text ?

Question No: 33 ( Marks: 2 )

Differentiate between Changing and Refreezing ?

Question No: 34 ( Marks: 2 )

Why we use the tools like flowcharts, DFDs etc in the System Design?

Question No: 35 ( Marks: 3 )

What is access control? Give example

Question No: 36 ( Marks: 3 )

List any three ethical challenges given by IS security association of USA ?

Question No: 37 ( Marks: 3 )

What are the objective/purposes of the DFDs?

Question No: 38 ( Marks: 5 )

Differentiate the following

1. Intrusion Detection vs Variance Detection

Question No: 39 ( Marks: 5 )

What are the sources of critical success factor?

Question No: 40 ( Marks: 10 )

What is reusable software?

Question No: 41 ( Marks: 10 )

Discuss System Characterization ? What information may help to characterize the system ?