Question No: 1 ( Marks: 1 ) - Please choose one
Systems have collection of predefined ------related to each other in a sequenced logical manner in order to collectively achieve the desired results.
► Procedures
► Sequences
► Policies
Question No: 2 ( Marks: 1 ) - Please choose one
After her third data processing clerk showed up at work with wrist braces, Ms. Jackson called a specialty firm to assess the design of their work environment. This firm specializes in _____:
► furniture layout
► video display terminals
► Ergonomics
► lighting
Question No: 3 ( Marks: 1 ) - Please choose one
Customer touch point is a method of interaction with a customer, such as telephone, e-mail, a customer service or help desk, conventional mail, Web site and store.
► True
► False
Question No: 4 ( Marks: 1 ) - Please choose one
Buying and selling of products, services and information via computer networks, primarily the Internet is :
► E-Commerce
► E-Business
► Web Surfing
► BPR
Question No: 5 ( Marks: 1 ) - Please choose one
Which of the following refers to the process of identifying attempts to penetrate a system and gain unauthorized access?
► Threat Identification
► Intrusion detection
► Access Control
► All of above
Question No: 6 ( Marks: 1 ) - Please choose one
They represent Equations / Formulae representing relationship between two or more factors related to each other in a defined manner is called------
► Graphical Model
► Mathematical Model
► Algebra Model
Question No: 7 ( Marks: 1 ) - Please choose one
Which of the following includes assessment of controls already been implemented or planned, probability that they can be broken, assessment of potential loss despite such controls existing?
► Control Analysis
► Vulnerability Assessment
► Risk Management
► All of above
Question No: 8 ( Marks: 1 ) - Please choose one
Likelihood Determination phase determines that a potential vulnerability could be exercised by a given threat-source.
► True
► False
Question No: 9 ( Marks: 1 ) - Please choose one
Which of the following likelihood level is true for the following:
"The threat source lacks motivation or capability or controls are in place to prevent or at least significantly impede the vulnerability from being exercised."
► High
► Low
► Medium
► None of these
Question No: 10 ( Marks: 1 ) - Please choose one
Production subsystem needs to be linked with the marketing system to ------right amount of product.
► Produce
► Sale
► Purchase
Question No: 1 ( Marks: 1 ) - Please choose one
ERP’s major objective is to tightly integrate the functional areas of the organization and to enable seamless information flows across the functional areas.
► True ► False
Question No: 2 ( Marks: 1 ) - Please choose one
The environment exerts influence on the system and the system also influences the environment.
► Open system
► Closed system
► Closed end System
Question No: 3 ( Marks: 1 ) - Please choose one
Customer touch point is a method of interaction with a customer, such as telephone, e-mail, a customer service or help desk, conventional mail, Web site and store.
► True
► False
Question No: 4 ( Marks: 1 ) - Please choose one
One of the methods of integrating different business information systems is :
► Supply Chain management software
► Interface reconciliation software
► Message passing
► None of the given options
Question No: 5 ( Marks: 1 ) - Please choose one
The bullwhip effect refers to erratic shifts in orders up and down the supply chain because of poor demand forecasting, price fluctuation, order batching, and rationing within the chain.
► True
► False
Question No: 6 ( Marks: 1 ) - Please choose one
“M-Commerce” stands for
► E-Commerce
► None of given options
► Mobile Commerce
Question No: 7 ( Marks: 1 ) - Please choose one
The comparison of actual system with expected system is done with the help of control mechanism.
► False
► True
Question No: 8 ( Marks: 1 ) - Please choose one
Organizations sell products to other organizations electronically is an example of:
► Ecommerce
► EBusiness
► BPR
► BPRE
Question No: 9 ( Marks: 1 ) - Please choose one
Which of the following refers to the process of identifying attempts to penetrate a system and gain unauthorized access?
► Threat Identification
► Intrusion detection
► Access Control
► All of above
Question No: 10 ( Marks: 1 ) - Please choose one
A ______is an agreed-upon set of conventions that defines the rules of communication.
► Protocol
► Interconnection Medium
► Data Packet
► Message
Question No: 11 ( Marks: 1 ) - Please choose one
The identification of risks should start with:
► Description of the internal and external risks
► A brainstorming session with risk management experts and a program profile
► A good understanding of the program and a brainstorming session with key stakeholders
► Definitions of likelihood and impact
Question No: 12 ( Marks: 1 ) - Please choose one
The term OIS views organization as a combination of process oriented groups whose information needs are related but Independent
► False
► True
Question No: 13 ( Marks: 1 ) - Please choose one
In case of logical intrusion, the intruder might be trying to have an unauthorized access to the system.
► True
► False
Question No: 14 ( Marks: 1 ) - Please choose one
Which one of the following computer systems uses duplication of components and data to cope with systems failures?
► Fault-tolerant systems
► Expert System
► MIS
► OIS
Question No: 15 ( Marks: 1 ) - Please choose one
Data travels across the internet through several levels of networks until it reaches its middle point.
► True
► False
Question No: 16 ( Marks: 1 ) - Please choose one
Which of the following is a data model or diagram for high-level descriptions of conceptual data model.
► ERD
► Flow Chart
► Algorithm
► DFD
Question No: 17 ( Marks: 1 ) - Please choose one
The procedures to follow when decision is needed can be specified in advance
► True
► False
Question No: 18 ( Marks: 1 ) - Please choose one
______have usually simple management structure.
► Small Organization
► Medium organization
► Large Organization
Question No: 19 ( Marks: 1 ) - Please choose one
______is an object that exists and is distinguishable from other objects.
► Value Sets
► Entity
► Relationships
Question No: 20 ( Marks: 1 ) - Please choose one
Object oriented analysis generates ______
► Implementation constraints
► System Interfaces
► Conceptual model of Information
Question No: 21 ( Marks: 1 ) - Please choose one
Inheritance can be defined in terms of ______
► Has kind of
► Is based on
► Is kind of
Question No: 22 ( Marks: 1 ) - Please choose one
An IDS with the neural network feature monitors the general patterns of activity and
traffic on the network and creates a database.
► True
► False
Question No: 23 ( Marks: 1 ) - Please choose one
M-Commerce (mobile commerce) refers to the conduct of e-commerce via wireless devices.
► True
► False
Question No: 24 ( Marks: 1 ) - Please choose one
ERP Systems control all major business processes with a single software architecture in real time.
► True
► False
Question No: 25 ( Marks: 1 ) - Please choose one
Preparing a situation for change by disconfirming existing attitudes and
behaviors is called Unfreezing.
► True
► False
Question No: 26 ( Marks: 1 ) - Please choose one
Ethics is a branch of science that deals with what is considered to be right and wrong.
► True
► False
Question No: 27 ( Marks: 1 ) - Please choose one
Which of the following is the process or art of defining the hardware and software architecture, components, modules, interfaces, and data for a computer system to satisfy specified requirements?
► Systems Design
► Systems Requirement
► Coding
► Requirement
Question No: 28 ( Marks: 1 ) - Please choose one
Buying and selling of products, services and information via computer networks, primarily through Internet is :
► E-Commerce
► E-Business
► Web Surfing
► BPR
Question No: 29 ( Marks: 1 ) - Please choose one
In which of the following decisions the problems are non routine, critical and novel in nature, require individual judgment, evaluation and insight varying on case-to-case basis.
► Semi-Structured decisions
► Unstructured decisions
► Structured decisions
Question No: 30 ( Marks: 1 ) - Please choose one
There are five phases of the decision making process, first one is intelligence.
► True
► False
Question No: 31 ( Marks: 1 )
What is an entity set?
Question No: 32 ( Marks: 1 )
Define Clear Text ?
Question No: 33 ( Marks: 2 )
Differentiate between Changing and Refreezing ?
Question No: 34 ( Marks: 2 )
Why we use the tools like flowcharts, DFDs etc in the System Design?
Question No: 35 ( Marks: 3 )
What is access control? Give example
Question No: 36 ( Marks: 3 )
List any three ethical challenges given by IS security association of USA ?
Question No: 37 ( Marks: 3 )
What are the objective/purposes of the DFDs?
Question No: 38 ( Marks: 5 )
Differentiate the following
1. Intrusion Detection vs Variance Detection
Question No: 39 ( Marks: 5 )
What are the sources of critical success factor?
Question No: 40 ( Marks: 10 )
What is reusable software?
Question No: 41 ( Marks: 10 )
Discuss System Characterization ? What information may help to characterize the system ?