meo786
Welcome to meo786
Please Log In and Enjoy with us. I hope you will find more "Fun With Mobile, Computer & Management"

Thanks.

Muhammad Afzal Meo
+092 333 497 62 77

Join the forum, it's quick and easy

meo786
Welcome to meo786
Please Log In and Enjoy with us. I hope you will find more "Fun With Mobile, Computer & Management"

Thanks.

Muhammad Afzal Meo
+092 333 497 62 77
meo786
Would you like to react to this message? Create an account in a few clicks or log in to continue.

All Quiz CS 507

2 posters

Go down

All Quiz CS 507 Empty All Quiz CS 507

Post by Admin Tue May 18, 2010 10:08 am

________
also has the ability to explain the line of reasoning in reaching a particular
solution, which ________ does not have.
DSS, MIS
OLAP, KSS
KSS, DSS
GDSS, DSS






Cheaper
factor of production is a challenge for the survival of a company in which of
the following market?
Super market
Online Market
Competitive market
None of these options






Small
organizations usually have complex management structure
True
False






Procedures
are organized in a physical manner to form systems.
True
False





Which of the
following is software based production planning and inventory control system
for material procurement and scheduling.
CAD
PRM
MRI
MRP


Sources of
information are generally categorized in different types depending on their
originality and their proximity to the source or origin
True
False








Closed system is
dependent on the internal resources and data.


True



False







Generation
of relevant data is the objective of every information system
TrueFalse






The basic
purpose behind setting up systems and procedures is to make available
information
TrueFalse






Which of the following
have collection of predefined Procedures related to each other in a sequenced
logical manner in order to collectively achieve the desired results.



Information
System


System




Organization


None
of above options






Which of the following
ethical system differs from secular ethical systems and from the moral code
advocated by other religions



Islamic


Christian


Hindu

Social







The reports generated by
the --------are used for analytical decision making by the management.



MIS


DSS


EIS


TIP











We can get help in
non-routine decision making through _____________



KSS


TPS


MIS

DSS







Existence of
____________ departments in every organization varies with the nature of
industry and the nature of products/ services being offered.



flat


horizontal


functional
??



non-functional


_____________ models are
three dimensional representation of an entity or object.



Narrative

Physical





Mathematical


Graphical





Which of the following
subsystem needs to be linked with the marketing system so as to produce right
amount of product?


Human Resource Subsystem



Production
subsystem





Accounting & Finance subsystem


Quality Assurance subsystem





The
-------------------------is an international, multilateral organization, which
was created as a result of the Uruguay round of discussion in 1994 to harmonic
world trade.



(SAFTA)


(SAARC)


(WTO)


None of above.


Medium Sized organizations
are normally a family ownership run by



Father and Sons


Brothers

Both
option a and b





None of these option





Information should be
tailored in accordance with the organization’s culture and structure.


True p 13




False





Quality
Assurance subsystem In which of the following organizations all critical
managerial positions are usually controlled by the family members.
Medium Size LargeSize
Small
none of these options

Which
of the following is a set of management and control activities which focus on
quality assurance?




CIM



MRP



QTM



TQM








An
organization is defined by the elements that are part of it, its communication
and its rules of action compared to outside events.


True p 5




False


According
to ______________ model, decisions are taken largely on accidental basis.



Rational
Man


Garbage Can p 66




Muddling
through



Irrational
Man






Searching
for conditions in the environment that call for decisions, refers to the
______________ phase of decision making process.



design


choice


intelligence


implementation


Participative
management style approach is a combination of both authoritative and mixed
style



True

False




A
system is a group of ------------------------------that are integrated with the
common purpose of achieving an objective.



Information


Data
Sets


Elements




Data
and information






An
information system that automatically generates report on regular basis and are
not used to monitor input or activities is called


Open loop system p 20




Closed
loop system



Closed
end System



Open
system



According
to _____________ model, organizations are not rational.



Rational
Man


Garbage Can p 66




Muddling
through



Irrational
Man



Which
of the following decision making approach is followed when the situation is
complex and no standard solutions exist for resolving the situation?



Structured
decision making approach



Semi
structured decision making approach



Psychological
decision making approach


Unstructured decision making approach








__________
is known as the father of warehouse


Stephen
hawking


Bill
gates


Bill
Inmon



Edgar
Codd











Information system must
fulfill the needs of the __________:



Customers


Business


Employee


Organization


____________ information
is available in manufacturing information system.



Sales


Purchase


Stock


Product


____________ information
can be sought only from marketing information system



Sales


Purchase


Stock


Product





Which of the following
is the cognitive process of selecting a course of action from among multiple
alternatives?



Planning


Decision Making


CNC


MRP





A ______________
decision making model is the most popular type of model and is based around a
cognitive judgment of the pros and cons of various options.



Garbage Can


Irrational Man


Rational Man


Muddling through





The set of
____________being discharged set the tone and structure of that department.



Responsibilities


Rules


Laws


Processes





Which of the
following subsystem gives a snapshot of statuses of various orders placed, at
any given time?


Quality assurance
subsystem



Order processing subsystem


Controlled processing
subsystem



Concurrent processing
subsystem






_____________
system can be used to simulate the consequences of each alternative generated
DSS MIS
EIS
CNC






Organization
is a ***** of elements that are integrated with the common purpose of achieving
an object.
TrueFalse









___________ system
simulates the judgment and behavior of a human or an organization.



Proficient


Expert


Knowledgeable


Open-loop





NOTE:





Expert
system All Quiz CS 507 Clip_image002(Definition) An expert system is a computer
program that simulates the judgment and behavior of a human or an organization
that has expert knowledge and experience in a particular field. Typically, such
a system contains a knowledge base containing accumulated experience and a set
of rules for applying the knowledge base to each particular situation that is
described to the program. Sophisticated expert systems can be enhanced with
additions to the knowledge base or to the set of rules.







Factors of __________are
basic elements of reducing manufacturing cost



Production


Quality


Brand


Cost





Level of
__________refers to the perfection in solution the model will achieve



Depletion


Optimization


Compression


Attenuation





__________ models represent
its entities with an abstraction of lines, symbols or shapes.



Narrative


Physical


Mathematical


Graphical





__________ is the
optimum quality of replenishment stock to order from a supplier.



DOQ


EOQ


EEQ


COQ





NOTE: Stands for economic order quantity





__________ is any
mathematical form aula or equation.



Narrative model


Graphical model


Mathematical model


Physical model





___________ is a model
that which describe its entity with spoken or written words.



Narrative model


Graphical model


Mathematical model


Physical model





__________ is a
three-dimensional representation of its entity.



Narrative model


Graphical model


Mathematical model


Physical model





In the real world, it is
_______________ to specify all of the alternatives and its consequences.



Possible


Certain


Helpful


Impossible














The information can also
be ranked in accordance with the qualities it has.


True




False





Which of the following views organization as a
combination of process oriented groups whose information needs are related but
independent?


CBIS


MIS


DIS

OIS







Information regarding
monitoring and controlling the business is provided by _____________



DSS


TPS


MIS


KSS





An _____________
representation that illustrates the components or relationships of a phenomenon
is called a model.



Concrete


Actual

Abstract




Tangible





In
_____________ building, managers attempt to gather more administrative and
financial power.
Monarchy
Dynasty
EmpireTerritory






___________ includes data
preparation which may involve data filtering, data transformations and
selecting subsets of records.



Exploration ??


Deployment


Model building



Stationing














Individuals
_______________ to avoid new uncertain alternatives and rely on SOP’s.
preferdon’t like
deny
refuse







Which of the
following are original materials on which other research is based?
Primary SourcesSecondary sources
Teritiary Sources
option a and b both






______ is
the set of interconnected structural elements that provide the framework.
InfrastructureSystem
Organization
Internet















Continue
change in work force is harmful for an organization




True p 26

False



“Treat each
customer uniquely” is the motto of the entire_________ process.
CRM
Product
development
Marketing
Promotion



Which of the
following system is linked to all the information systems in an organization?
Marketing information system
Accounting
information system p 65
Human resource information system
Manufacturing information system



Distributing
common information to every one may result in waste of time and confusion.
True p 16
False



Instead of
Information, data is more important in day to day decision making
True
False p 11



Data
mining is also known as ___________ in databases




knowledge management
knowledge processing
knowledge
discovery
p37
knowledge transfer






The
organizational structures are formulated in order to efficiently manage the
-----
Business
Operations p 5

Business Size
Business Cost
Business Processes






A newspaper
article is a primary source if it reports events, but a secondary source if it
analyses and comments on those events.
True
False






Decision
making is the cognitive process of selecting a course of action from among
--------- alternatives.
Multiple p 59
Double
Triple
None of these options






Medium size
organizations usually have simple management structure than those of small
organizations;



True


False








The
departmental structures are _______ in banking and financial
sector.
Different
Same
Mixed
Identical






Well
structured problems are constrained problems with _________ solutions
that engage the application of a limited number of rules and principles within
well defined parameters.
divergent
convergent
p 59

different
disparate



The set of
processes developed in an organization to create, gather, store, maintain and
apply the firm’s knowledge is called ___________
Knowledge base
Development engine
Knowledge management
Inference
engine



The practice
of checking the impact of a change in the assumptions on the proposed solution
is carried out in ___________ analysis.
What-If
Goal Seek
Lexical
CBIS helps in updating every change being triggered in less time and with
more effort.
Select correct option:
True
False
(
CBIS helps in updating every change being triggered in less
time and with less effort p 36)



There is a
greater emphasis on models in case of ___________
KSS
DSS p
44

MIS
TPS



The concept
of incremental decision making is introduced by the ___________ model.
Rational Man
Garbage Can
Muddling through p 75 Irrational Man



Which
of the following is the specific collection of values and norms that are shared
by people and groups in an organization and that control the way they interact
with each other and with stakeholders outside the Organization
Organizational culture p21
Organizational Structure
Management Style
Decision Making Style






Organizations can be distinguished on the basis of
following criteria /criterias
Organizational structure
Culture of the Organizations
Management Style and DecisionMaking Style

option a , b and c


Quality
maintenance is an issue which requires structured reporting.



True


False





Closed
System depends on __________ and data.



Internal resources


External
resources



Procedures


Technical
resources


















Sources of
information are generally categorized as -------------------------
Select correct option:
Primary
Secondary
Tertiary
option a, b and c p 11









Level
of ___________ refers to the perfection in solution the model
will achieve
depletion
optimization p 49
compression
attenuation






The information from the
system not used for control purpose called--------------------


Open loop system




Closed
loop system



Open
end System



Open
and close system





















L
# 30






Audit
Control is a logical record of computer activities, usage, processing
pertaining to an operating or application system or user activities



True


False





_________ refer to the sudden decrease in
power supply.



Sags



Surges


Spikes


Black
out






Worms
can destroy data and programs as well as disrupt or even halt the operation of
computer networks.



a) True


b) False





Which
of the following scans the operating system and application soft ware for any
virus based on the viruses they contain.



Anti
Virus


Scanners




Active Monitors


None of above options





The
main source of bugs in computer programs is the complexity of decision-making
code.



True


False





Which
of the following controls have gained critical importance in the modern
computing age for two significant reasons.



Access



Communication


Data
Base



Output





Which
of the following may also detect outbound traffic to guard against spy ware,
which could be sending your surfing habits to a Web site


Personal Firewall




Password


PIN


ID


Which
of the following is the outcome of Object Oriented analysis?



System
interfaces



Integrity
constraints



Completeness
constraints



System’s conceptual model





Which
of the following refers to individuals using their skills to forward a
political agenda, possibly breaking the law in the process, but justifying
their actions for political reasons.






Hacker


Intruder

Hacktivist ??




Cracker





A
denial-of-service attack floods a Web site with so many requests for services
that it slows down or crashes



a) True


b) False ??








__________
is known as the father of warehouse



Stephen
hawking



Bill
gates


Bill Inmon ??




Edgar
Codd






Every
industry has its own ____________ which gives rise to a different set of
subsystems as part of the information system.



command
structure



departmental
structure



policies


responsibilities





Which
of the following is a system that enables drawings to be constructed on a
computer screen and subsequently stored, manipulated and updated electronically?



CDA


MRP


CAD


CNC








Which
of the following refers to the application of computer software in engineering
to analyze the robustness and performance of components, assemblies, products
and manufacturing tools?



CEE


CNC


CAE




MRP





Semi
structured is a gray area which lies ___________ the structured and
unstructured range.


Between




Within


Across


inside .





Which
of the following is a form of automation where computers communicate work
instructions directly to the manufacturing machinery?



CAM


MCA


CNC


MRP





Which
of the following is the mental process of knowing, including aspects such as
awareness, perception, reasoning and judgment?



CCN



Product
development process


Cognitive process




Planning process





CRM
software requires highly integrated environment for high ___________, which is
rarely available.



Sale


Productivity


Promotion



Customer
satisfaction






_____________
information system combines benefits administration, payroll, recruiting and
training, performance analysis and review into one package.



Manufacturing


Sales


Marketing

Human Resource







__________
communication refers to the Information flow from firm to external environment.



Horizontal


Marketing



Suppliers


Vertical

Admin
Administrator

Number of posts : 8137
Age : 50
Location : Sharqi Abadi Mustafabad Kasur
Job/hobbies : Do more for other
Mode (i.e. cool, angry etc) : Serious
Warining :
All Quiz CS 507 Left_bar_bleue0 / 1000 / 100All Quiz CS 507 Right_bar_bleue

Rate by Admin :
All Quiz CS 507 Left_bar_bleue0 / 1000 / 100All Quiz CS 507 Right_bar_bleue

Reputation : 22
Registration date : 2007-10-23

https://meo786.forumotion.com

Back to top Go down

All Quiz CS 507 Empty Re: All Quiz CS 507

Post by Admin Tue May 18, 2010 10:09 am

Automated
data are less susceptible to destruction and misuse than paper data



a) True


b) False





Documentation
may include program code of application softwares, technical manuals, user
manuals e



a) True


b) False





Which
of the following likelihood level is true for the following: "The threat
source lacks motivation or capability or controls are in place to prevent or at
least significantly impede the vulnerability from being exercised."



a) High


b) Low


c) Medium


d) None of these





Which
of the following level is formulation of new sales products, and identifying
new sales opportunities?



a) Operational


b) Managerial


c) Strategic





The
spiral model emphasizes the need to go back and reiterate earlier steps a
number of times as the project progresses.



a) True


b) False





In
assessing risks for an IT system, _______________ is the first step.



a) To define the scope of the effort.


b) Vulnerability Assesment


c) threat identification





IDS
works in conjunction with routers and firewalls by monitoring network usage
anomalies to protect a company s information systems resources from external as
well as internal misuse.



a) True


b) False





Which
of the following model combines the elements of the waterfall model with the
philosophy of prototyping?



► Prototyping


► Iterative


► Incremental


► RAID





__________ sources materials in which the
information from secondary sources has been digested.



► Primary


► Tertiary


► Secondary





Targeting
advertising to customers to -------------- the probability, that an offer is
accepted.



► Decrease


► Increase


► Stable





Information
technology has been criticized for having a negative effect on people's
individuality



► False


► True





In
which of the following there is a direct interaction facilitated by auctions,
classifieds, and bartering?



► EGovernment


► MCommerce


► Consumer-to-consumer EC


► Intrabusiness EC





Nature
of vulnerability is an input source for Likelihood determination



► True


► False


A
Trojan horse virus stays dormant until a specific time or data condition is
met.



► True


► False





Object
orientation helps in increasing abstraction level to build _________



► Testable software


► Reusable software


► Maintainable software





Encapsulation
means information



hiding.





The
use of software routines to tie up the computer hosting a Web site that denies
legitimate visitor's access is called :



denial of service ???


hacking.


Spoofing


Sniffing





Systems
have collection of predefined ----------------------related to each other in a
sequenced logical manner in order to collectively achieve the desired results. Procedures



Sequences


Policies





After
her third data processing clerk showed up at work with wrist brace, Ms. Jackson
called a specialty firm to assess the design of their work environment. This
firm ecializes in _____:



Furniture
layout



Video display


Terminals


Ergonomics


Lighting





Customer
touch point is a method of interaction with a customer, such as telephone,
e-mail, a customer service or help desk, conventional mail, Web site and store.



True


False





Buying
and selling of products, services and information via computer networks,
primarily the Internet is :



E-Commerce


E-Business


Web Surfing


BPR





Which
of the following refers to the process of identifying attempts to penetrate a
system and gain unauthorized access?



Threat Identification


Intrusion
detection



Access
Control



All of above





They
represent Equations / Formulae representing relationship between two or more
factors related to each other in a defined manner is called-----------



Graphical
Model



Mathematical Model


Algebra
Model






Which
of the following includes assessment of controls already been implemented or
planned, probability that they can be broken, assessment of potential loss
despite such? Controls existing?



Control
Analysis



Vulnerability
Assessment



Risk Management


All of above





Likelihood
Determination phase determines that a potential vulnerability could be
exercised by a given threat-source.



True


False





Which
of the following likelihood level is true for the following: "The threat
source lacks motivation or capability or controls are in place to prevent or at
least significantly impede the vulnerability from being exercised."



High


Low


Medium


None
of These






Production
subsystem needs to be linked with the marketing system to -------------right
amount of product.



Produce


Sale


Purchase





Which
of the following focus on detecting potentially abnormal behavior in function
of operating system or request made by application software?



Active
Monitors



Scanners


Anti virus


Behavior blockers p---151





The
main source of bugs in computer programs is the complexity of decision making
code.



True


False 148














Entity
represents sources of data received by the system or destinations of the data
produced by the system.



True


False p---115





The
flowchart helps in locating and correcting errors also called debugging.



True p---114


False


The purpose of data flow diagrams is to
provide a --------- between users and systems developers



Linking
bridge p---115



Empty
Space



Data
Flows



Options a and b


Which
of the following level is formulation of new sales products, and identifying
new sales opportunities?



Operational


Managerial


Strategic
p---52



Computer-aided
manufacturing (CAM), is a form of automation where computers communicate work
instructions directly to the manufacturing machinery.



True
62



False


The comparison of the actual with the
expected is done with the help of _______



Input
element



Processing


Control
mechanism p----29



The
spiral model emphasizes the need to go back and reiterate earlier steps a
number of times as the project progresses.



True
p--97



False



Providing
access to the data and behavior is through an objects interface is called
__________



Polymorphism



Encapsulation



Message
passing



Which
of the following is a logical record of computer activities, usage, processing
pertaining to an operating or application system or user activities?



Control
Log



Control
trial



Audit trail p---157


Control Trial can be used together with access
controls to identify and provide information about users suspected of improper
modification of data.



True



False
p---157



Risk
Management is the process of measuring, or assessing risk and then developing
strategies to manage the risk.



True
p----160



False


In assessing risks for an IT system,
_______________ is the first step.



To
define the scope of the effort. P---161



Vulnerability
Assesment



threat identification


Risk
Management determines that a potential vulnerability could be exercised by a
given threat-source.



True


False p---161

Admin
Administrator

Number of posts : 8137
Age : 50
Location : Sharqi Abadi Mustafabad Kasur
Job/hobbies : Do more for other
Mode (i.e. cool, angry etc) : Serious
Warining :
All Quiz CS 507 Left_bar_bleue0 / 1000 / 100All Quiz CS 507 Right_bar_bleue

Rate by Admin :
All Quiz CS 507 Left_bar_bleue0 / 1000 / 100All Quiz CS 507 Right_bar_bleue

Reputation : 22
Registration date : 2007-10-23

https://meo786.forumotion.com

Back to top Go down

All Quiz CS 507 Empty Re: All Quiz CS 507

Post by Admin Tue May 18, 2010 10:11 am

Risk
management is often based on the experience, insight and intuition of program
managers and key stakeholders in the program.



True


False





Active
Attack is one of the types of Web Security information systems.



True
p---172



False


IDS works in conjunction with routers and
firewalls by monitoring network usage anomalies to protect a company s
information systems resources from external as well as internal misuse



True
p---176



False



Business-to-business
EC (B2B) is one of the types of E-Commerce.



True



False


Temporal CSFs in an organization, results
from _________



Economic
changes



Technological changes


Internal
needs and changes p---133



Environmental
changes



Factors of which of the following are basic
elements of reducing manufacturing cost? Brand



Cost


Production


Quality


ERP
or enterprise systems control all major business processes with a single
software architecture in real time.



True



False


The bullwhip effect refers to erratic shifts
in orders up and down the supply chain because of poor demand forecasting,
price fluctuation, order batching, and rationing within the chain.



True


False


The objective of the entire risk management
process is that no one should hamper the working of the smooth working of IS.



True
p---167



False


If
an organization can tolerate some downtime, cold sites backup might be
appropriate.



True
170



False


Cryptography primarily consists of two basic
processes.



True
p---154



False


Logical intrusion skills needed to exploit
logical exposures are more technical and complex as compared to physical
exposures.



True
p---151



False


Firewall
is the primary method for keeping a computer secure from intruders.



True
p---153



False


Where problem is recurring and repetitive,
the common factors can be identified in order to identify a particular course
of action is called -------------Structured decisions Unstructured decisions



Structured decisions








Where
problem is recurring and repetitive, the ___________ factors can be identified
in order to identify a particular course of action.
different
multiple
commonvarious






The use of software routines to tie up the computer
hosting a Web site that denies legitimate visitor's access is called:


denial
of service.



hacking.


spoofing



sniffing


Wireless computing devices are not subject to
viruses.



True


False


A
security program is a series of ongoing regular periodic reviews conducted to
ensure that assets associated with the information systems function are
safeguarded adequately.



True
p—139



False


The
Internet's technological success does not depend on its principal communication
tools, the Transmission Control Protocol (TCP) and the Internet Protocol (IP).



True


False


Which
of the following helps an organization in gaining competitive advantage in the
use of processes, effectiveness and efficiency should also be kept in mind?



BPR p—129


CSF


SPR


Systems analysts work as a link between
Business people, & Computer Programmers. True 102



False


The First increment in incremental model is
usually the core product which addresses the basic requirements of the system.



True
p--94



False


Which of the following is a form of
automation where computers communicate work instructions directly to the
manufacturing machinery?



CAD


CAM


CIM p---62





Which
of the following phase of decision making process involves searching for
conditions in the environment that call for decisions?


Intelligence p----70




Design


Choice


Implementation


Computer
programmers apply information technology to build information systems which
solves these problems but need not fully understand the business usages they
are computerizing or supporting.



True
p---102



False


Rectangle
shape in the flow charts represents___________



Decision
p---106



Process



Terminator


__________
is a person who attempts to invade the privacy of the system.



Hacktivsts



Hackers
p---152



Crackers


Characteristics
of object are called ________



Methods



Attributes p--129


Status






Operations
are usually called via _______



Functions



Signatures p---131


Methods






Web
Site monitoring is the process used to view or record both the keystrokes
entered by



a
computer user and the computer's response during an interactive session.






True



False p---157





Likelihood
Determination phase sometimes determines that a potential vulnerability



could
not be exercised by a given threat-source.






True



False






Active
Attack is one of the types of Web Security information systems.



True p---172


False






Business-to-business
EC (B2B) is one of the types of E-Commerce.






True



False






Collaborative
commerce is one of the types of B2B.



True



False






ERP
Systems control all major business processes with single software architecture



in
real time.



True



False












Rectangle
shape in the flow charts represents___________












Fire
wall is the primary method for keeping a computer secure from intruders.



True


False





Why use in arrow of process in the flow chart?
(Marks 1)



What
is Object Oriented Analysis and Design (OOAD)? (Marks 1)



Critical
Success Factors differ from organization to organization. While approving any
project, the management may evaluate the project on the basis of certain
factors critical to the success or failure of the project. Five example in real
life (Marks 10)



What
do you understand by computing envroiment. Describe the • Stand Alone
Processing and Web Based Environment (Marks 5)



Roles
& Responsibility any three (Marks 3)



What is focal Point? Complete(Marks 10)


What
is Vulnerability? (Marks 1)



Two
output of Impact Analysis? (Marks 2)



What
is challenge in lunching ecommerce? (Marks 5)



What
is change management. Identify its types ? (Marks 5)



What
is difference between the Changing and Freezing? (Marks 3)

































MIDTERM
EXAMINATION Fall 2008 CS507-
Information Systems (Session - 2)






Following statement is true for which of
the following model?






Provides early indication of
insurmountable risks, without much cost




► Incremental Model




► RAID




► Spiral




► Iterative







Devaluation of currency is called
________



► Interest rate


► Inflation ??


► Markup






__________ sources materials in which the
information from secondary sources has been digested.



► Primary


► Tertiary


► Secondary






Debtor’s aging report Debtor’s aging report is an example of the
following phase?



► Choice


► Design


► Intelligence






There are TWO phases of the decision
making process



► TRUE


► FALSE






Which of the following phase of decision
making process involves searching for conditions in the environment that calls
for decisions?



► Intelligence



► Design




► Choice




► Implementation







Structured
Problems possess multiple solutions, solution paths, fewer parameters which are
less manipulate able, and contain uncertainty about which concepts, rules, and
principles
.






► True




► False







The
study of business problem domain used to recommend improvements and specify the
business

Requirements
for the solution is called:


► System Analysis



► System Design




► Risk Management




► Risk Analysis



Data
mining can allow a firm to develop:



► DSS based on the Web and Specific
marketing campaigns for different customer segments



► Specific marketing campaigns for
different customer segments




DSS based on the Web.



DSS
can stimulate innovation in decision making by helping managers to existing
decision making procedures.



True



False


The
term information architecture describes a specialized ---------------- which
relates to the management of information and employment of informational tools.



Skill Set



Data Set



Tool Set


Infrastructure,
generally, is the set of interconnected structural elements
that provide the
framwork
for supporting the entire structure



Infrastructure



Decision Support System



Management System





High
level of foreign trade has resulted in imports and exports which require inter
linkage for smooth coordination
.





True



False









Which of the following sources are original materials on which other
research is based
?


► Primary



► Secondary




► Tertiary




► None of these







On what factors need of information
depends in any organization?



Solution:-





Good
information is essential for effective operation and decision making at all
levels in businesses. Identifies and illustrates the different kinds of
information by the complex internal and external communication links of a
typical R&D department. Discusses the factors which condition managers' use
of information, namely managers' roles and tasks; decision-making processes (strategic
and operational); rational and alternative behaviour; cognitive style and
perception; and “hidden agenda” factors such as the symbolic use of information
and information as power. Supported by selected readings, and tables of
information types, processes and uses.






Define TQM?


Solution: TQM is a set of
management and control activities which focus on quality assurance.




Enlist the types of models used in DSS.



Solution:- Physical Models Narrative Models Graphic
Models Mathematical Models







What
is the need for
Accounting
information system (AIS) to be linked to all the information systems in an
organization.
?


Solution:- Accounting information system is linked to all the information systems
in an organization. This is important because the data required for proper book
keeping and generation of transactional reports is extracted from all over the
organization. For instance sales information can be sought only from marketing
information system and stock information is available in manufacturing
information system.



The purpose of AIS is to accumulate data and provide
decision makers (investors, creditors, and managers) with information to make
decision.






Discuss
the attributes on which Organizational Information Requirements depends






Solution: There are
several surveys indicate that a significant percentage of data warehouses fail
to meet business objectives or are outright failures. One of the reasons for
this is that requirement analysis is typically overlooked in real projects.
Goal-oriented approach to requirement analysis for data warehouses based on the
Tropos methodology. Two different perspectives are integrated for requirement
analysis: organizational modeling, centered on stakeholders, and decisional
modeling, focused on decision makers. Our approach can be employed within both
a demand-driven and a mixed supply/demand-driven design framework.



Also
Functional security requirements of information systems can roughly be
classified into two: computer security requirements and communications security
requirements. Challenges for developing notations for expressing these
requirements are numerous, most importantly the difficulty of dealing with
layers of abstraction, flexibility to adapt into many types of requirements,
groupings of requirements, and requirement dependencies. Many frameworks for
dealing with information security highlight the importance of a properly
defined organization of security but fail to establish models to support the
specification. This paper establishes one such model and demonstrates how the
above difficulties can be overcome through extensive application of
organizational modeling of information security.






What are the management styles? Discuss
in details.






Solution:- Various management styles can be employed dependent
on the culture of the business, the nature of the task, the nature of the
workforce and the personality and skills of the leaders..



There
are three Management Styles.
Authoritative
Participative Mixed



1)Authoritative An Autocratic or authoritarian manager makes all the decisions,
keeping the information and decision making among the senior management.
Objectives and tasks are set and the workforce is expected to do exactly as
required. The communication involved with this method is mainly downward, from
the leader to the subordinate; critics such as Elton Mayo have argued that this
method can lead to a decrease in motivation from the employee's point of view.
The main advantage of this style is that the direction of the business will
remain constant, and the decisions will all be similar, this in turn can
project an image of a confident, well managed business. On the other hand,
subordinates may become highly dependent upon the leaders and supervision may
be needed. Amanda Glass is the founder of this unique management style.



2)
Participative In a Democratic style, the manager allows the
employees to take part in decision making, therefore everything is agreed by
the majority. The communication is extensive in both directions. This style can
be particularly useful when complex decisions need to be made that require a
range of specialist skills: for example, when a new computerized system needs
to be put in place and the upper management of the business is computer
illiterate. From the overall business's point of view, job satisfaction and
quality of work will improve. However, the decision-making process is severely
slowed down, and the need of a consensus may avoid taking the best decision for
the business.



3)
Mixed This approach is a
combination of both above styles. Input is taken and respected, final decision
is taken by the senior management keeping in view the views given by the
employee.












MIDTERM EXAMINATION Spring 2009 CS507- Information Systems


Sources of information are generally categorized as
-------------------------



Primary


Tertiary


► All of above


Secondary


Sources of information are generally categorized inn
different types depending on their originality and their proximity to the
source or origin.




True



False


Manufacturing process
involves more than one sub-process.



True


False


The organization refers to a
organizational structure with few
or no levels of intervening management between staff and managers is
called------------------------



Hierarchical organization


Flat Organization


Pyramid Organization








Every system comprises of
basic components which in a co-ordination formulate a system.



True


False


---------- simply means a
particular technique of directing one's attention in learning, discovery or
problem solving.



Robustness


Heuristic


DSS


EIS


------- seek to put
intelligence into the hardware in the form of generalized capability to learn.



Neural network System


Fuzzy logic


DSS


ESS


Prototyping is the process of quickly putting
together a working model in order to test various aspects of the design to
gather early user feedback.



True


False


Accounting
information system (AIS) is that linked to all the information systems
in an organization.



True


False


Technical
Reports are examples of _________ resource.



Tertiary



Primary


Secondary


Organizations
are distinguished on the basis of
__________



► Attributes


Policy



Management


________
are run under direct supervision of family members.



Small
Organization



Medium organization


Large
Organization



In
_____ there are low number of subordinates per person.



Pyramid
Structure



Flat
Structure



Modern
Structure



Which
of the following structure
contains less number of management
levels?



Flat Structure


Tall
Structure



Classical
structure






Define TQM?


What
are the conglomerate organizations?



What
aspects should be covered by design of information flow?



How
the chief executive is elected in any organization and what are his
responsibilities?



Identify
the basic purpose of DFD and Identify the steps of Designing a DFD for any
process?



Discuss the purpose of Feasibility Study? Discuss
key areas?
























FINALTERM EXAMINATION


Fall 2008


CS507- Information Systems (Session - 1)





Question No: 1 ( Marks: 1 ) - Please
choose one






Medium Sized organizations are normally
a family ownership run by



Father & Sons


Brothers


Father, Sons and Brothers


None of the given





Question No: 2 ( Marks: 1 ) - Please
choose one



The organization refers to a organizational structure with few or no levels of


intervening management between staff and managers is called------------------------


Hierarchical organization


Flat Organization


Pyramid Organization





Question No: 3 ( Marks: 1 ) - Please
choose one



ERP s major objective is to tightly
integrate the functional areas of the organization



and to enable seamless information flows
across the functional areas.



True


False





Question No: 4 ( Marks: 1 ) - Please
choose one



Which of the following integrate the
planning, management and use of all resources



of the organization?


ERP


CRM


ESS


OIS





Question No: 5 ( Marks: 1 ) - Please
choose one



What are the steps and their order in EC order fulfillment?





Ensuring payment, checking availability, arranging shipment,
insurance,



production, purchasing & warehousing, contacts with customers
and returns



Ensuring payment, checking availability, arranging shipment,
insurance,



production, purchasing & warehousing, and contacts with
customers



Ensuring payment, checking availability, arranging shipment,
insurance,



production, plant services, purchasing & warehousing, and
contacts with customers



Ensuring payment, checking availability, arranging shipment,
insurance,



production, plant services, purchasing & warehousing, contacts
with customers and



returns





Question No: 6 ( Marks: 1 ) - Please choose
one



Data warehouses are generally batch
updated at the end of the day, week or some



period.





False


True





Question No: 7 ( Marks: 1 ) - Please
choose one



The Internet Protocol is designed solely for the addressing and
routing of data packets



across a network


True


False





Question No: 8 ( Marks: 1 ) - Please
choose one



Which one of the following are partially configured, usually with
network connections



and selected peripheral equipment, such as disk drives, tape
drives and controllers, but



without the main computer.





Cold Site


Warm Site


Hot Site


Third Party Arrangements





Question No: 9 ( Marks: 1 ) - Please
choose one



Likelihood Determination phase determines that a potential
vulnerability could be exercised by a given threat-source.






True


False





Question No: 10 ( Marks: 1 ) - Please
choose one



Threat capacity is an input source for Likelihood determination.





False


True





Question No: 11 ( Marks: 1 ) - Please
choose one



Which of the following is the primary
method for keeping a computer secure from intruders?






Anti virus


Scanners


Firewall


Password





Question No: 12 ( Marks: 1 ) - Please
choose one



Decisions in which the decision maker
must provide judgment, evaluation, and



insights into the problem definition
would be characterized as:






Structured


Semi Structured


Unstructured





Question No: 13 ( Marks: 1 ) - Please
choose one



Wireless computing devices are not subject to viruses.


False


True





Question No: 14 ( Marks: 1 ) - Please
choose one



Which of the following is a private
enterprise owned communication network that uses internet protocols, network
connectivity, and public telecommunication system to share organization's
information or operations with its employees, and to enable the employees to
communicate with each other?






Internet


Intranet


Wireless communication


None of above





Question No: 15 ( Marks: 1 ) - Please
choose one



Availability of which of the following
to various users also depends on how the information is processed? (Computing environment)






Information


Data


Log file


None of above





Question No: 16 ( Marks: 1 ) - Please
choose one



Which of the following helps an
organization in gaining competitive advantage in the use of processes,
effectiveness and efficiency should also be kept in mind?






BPR


CSF


SPR





Question No: 17 ( Marks: 1 ) - Please
choose one



CRM software requires highly integrated
environment for high Productivity, which is rarely available.



True


False





Question No: 18 ( Marks: 1 ) - Please
choose one



Existence of functional departments in
each organization may vary with the nature of industry and the nature of
products/services being offered.



True


False


Question No: 19 ( Marks: 1 ) - Please
choose one



Public companies are example of ____________


Small Organization


Large Organization


Medium organization





Question No: 20 ( Marks: 1 ) - Please
choose one



_____ serves the concurrent monitoring as the system is being
used.



Scanners


Active monitors


Behavior blockers





Question No: 21 ( Marks: 1 ) - Please
choose one



While developing software object oriented analysis focuses on
_________






Modular approach


Incremental approach


Traditional approach


Derived approach





Question No: 22 ( Marks: 1 ) - Please
choose one



Testing is easy for the software that is developed using OOAD due
to use of



___________


Modular approach


Real time modeling


Usability feature





Question No: 23 ( Marks: 1 ) - Please
choose one



Providing access to the data and behavior is through an object s
interface is called



__________


Message passing


Polymorphism


Encapsulation


Question No: 24 ( Marks: 1 ) - Please
choose one



There are typically two kinds of audit
records.






True


False


Question No: 25 ( Marks: 1 ) - Please
choose one



In assessing risks for an IT system, _______________ is the first
step.



To define the scope of the effort.


Vulnerability Assesment


threat identification


Question No: 26 ( Marks: 1 ) - Please
choose one



True


False





Question No: 27 ( Marks: 1 ) - Please
choose one



The two major criteria that are used to analyze risks are
Operational Effects and Situational Impacts






True


False





Question No: 28 ( Marks: 1 ) - Please
choose one



The Internet Protocol is designed solely for the connecting and
routing of data packets



across a internet.





True


False





Question No: 29 ( Marks: 1 ) - Please
choose one



An IDS with the neural network feature monitors the general
patterns of activity and



traffic on the network and creates a database.


True


False


Question No: 30 ( Marks: 1 ) - Please
choose one



BPR s major objective is to tightly
integrate the functional areas of the organization



and to enable seamless information flows
across the functional areas.



True


False


Question No: 31 ( Marks: 1 )


What is virus?


Question No: 32 ( Marks: 1 )


Define the basic objective of Risk management process.


Question No: 33 ( Marks: 2 )


Identify the following flow chart symbols:


a)


b)





Question No: 34 ( Marks: 2 )





Define Firewall.





Question No: 35 ( Marks: 3 )





What do you understand by Digital Certificate? Precisely discuss.





Question No: 36 ( Marks: 3 )





What are the purposes of system analyses?





Question No: 37 ( Marks: 3 )





What are hackers?





Question No: 38 ( Marks: 5 )





Discuss the types of threats in detail.





Question No: 39 ( Marks: 5 )





Discuss Risk Determination briefly.





Question No: 40 ( Marks: 10 )





Discuss different ways to control the viruses and worms in detail.





Question No: 41 ( Marks: 10 )





What is reusable software?

Admin
Administrator

Number of posts : 8137
Age : 50
Location : Sharqi Abadi Mustafabad Kasur
Job/hobbies : Do more for other
Mode (i.e. cool, angry etc) : Serious
Warining :
All Quiz CS 507 Left_bar_bleue0 / 1000 / 100All Quiz CS 507 Right_bar_bleue

Rate by Admin :
All Quiz CS 507 Left_bar_bleue0 / 1000 / 100All Quiz CS 507 Right_bar_bleue

Reputation : 22
Registration date : 2007-10-23

https://meo786.forumotion.com

Back to top Go down

All Quiz CS 507 Empty Re: All Quiz CS 507

Post by Admin Thu Jun 24, 2010 4:55 pm

CS507 PAPER
2010 24 JUNE 2010









Which of the following may improve communication between and
among developers and customers?



First
increment



Prototype ???


By-product


Final
increment






Which of the following is used to test the function of the
new design before starting production of a product?



Trial
version



Mathematical
Model



Beta
version



Prototype ???





Which of the following problems posses multiple solutions
with fewer parameters being less manipulate able.



Unstructured ???


Partially
structured



Semi
structured



Structured





Which of the following view gives a snapshot of the entire
system?



Hierarchical ?????


Diagrammatic


Procedural


Technical








Apart from the value to cost ratio, modules are also
selected on the basis of ___________requirements and needs.



programmer


designer

Customer Page No. 95




system analyst





Which of the following is a project management technique
which divides complex projects into smaller and more easily managed segments?


SDLC Page No. 78




System programming


Software testing


Software configuration





In which of the following model, the system development is
broken into many mini development projects.



Spiral

Incremental Page No. 95




Iterative


Waterfall





In drawing a proper flowchart, all necessary steps that are
a part of process should be listed out in ________________ order.


Logical ???




Physical


Random


Top to Bottom





Which of the following is a problem solving technique that
re-assembles a system’s components back into a complete system?



Select correct
option:






System analysis

System
design ???





System check


System configuration





The study of business problem domain is used to recommend
improvements and specify the business requirements for the solution.



Select correct
option:





True ???




False





Which of the following may be of low fidelity and dismissed
as toys?



Select correct
option:






Interfaces


Inference engines

Early
prototypes ??





Development engines





Which of the following refers to the structuring of hardware
and software to achieve the effective and efficient processing of information?



Select correct
option:






SDLC


System monitoring


Operational planning

System
development ???








Which of the following allows manufacturers to rapidly and
inexpensively test the parts of the design which are most likely to have
problems?



Select correct
option:






Physical Model

Prototype ???




Trial version


Carbon copy





Which of the following are knowledge workers who facilitate
the development of information systems and computer applications by bridging
the communications gap that exists between non-technical system users, and
System designers and developers?



Select correct
option:





System
Analysts ???





Software Engineers


System Designers


Chief Executives





Which of the following provides a structured means of
addressing the impact of technologies on an organization?



Select correct
option:






Business planning

IT
planning ??





Requirements planning


Configuration planning





Employees might be unwilling to accept the high level of
responsibility if organization is dominated by _____________and the culture is
____________.



Select correct
option:






Workers, autocratic


top management, autocratic ???


top management, democratic


Middle level management,
democratic






In which of the following environments, duplication of
clerical work is generally observed.



Select correct
option:





Computerized ??




Automated


Manual


Semi-computerized








Which of the following model can lead to scope creep due to
user feedback after each phase?


Iterative ??




XP


Rapid prototyping


Waterfall








The study of business problem domain is used to recommend
improvements and specify the business requirements for the solution.



True ??


False





Which of the following are knowledge workers who facilitate
the development of information systems and computer applications by bridging
the communications gap that exists between non-technical system users, and
System designers and developers?


System
Analysts





Software Engineers


System Designers


Chief Executives





Which of the following ensures the correctness of data in
the database?


Data
integrity ???





Data accessibility


Data consistency


Data analysis





System analysis creates the understanding and lays out the
necessary relationships that will assist in defining a solution to the problem
or the design of the proposed software that will meet the user needs.


True ??




False








A problem solving technique that decomposes a system into
its component pieces for the purpose of studying, how well those component
parts work and interact to accomplish their purpose can be one of the
definitions of System development.






True

False ??










The purpose of ___________ is to obtain a commitment to
change and evaluate whether cost effective solutions are available to address
the problem that has been identified.



planning


usage scenarios


feasibility study ??


testing








Which of the following refers to the ways data is stored in
partitions and sequences?


Structure




Design


Collaboration diagram


Sequence diagram





Which of the following is a problem solving technique that
re-assembles a system’s components back into a complete system?



System analysis

System
design





System check


System configuration











Which of the following model is preferred for its simplicity
and more disciplined approach?



Incremental

Waterfall
??





Spiral


Iterative








Which of the following model places emphasis on
documentation?


Waterfall PAGE 83




Spiral


Incremental


Rapid
prototyping






Which of the following is the process of quickly putting
together a working model in order to test various aspects of the design for
gathering early user feedback?



Interviews


Iteration

Prototyping PAGE 89




Questionnaires





Which of the following lifecycle model is very appropriate
for large and complex information systems?


Spiral PAGE 88




Prototyping


Incremental


Waterfall





Which of the following lifecycle model is a combination of classic
waterfall model and aspects of risk analysis?



Prototyping


Waterfall

Spiral PAGE 88




Incremental





Which of the following process begins with stratifying
system users and then identifying their needs?



Structuring


QA


Exploration

Design
PAGE 81








In which of the following models, the development approach
is based on producing deliverables frequently/ repetitively.



Incremental


Waterfall

Iterative
PAGE 86





XP





Trying to fit people and organizations into information
systems has been major reason for ____________.



success


efficiency


increased
productivity



failure
PAGE 76






Employees might be unwilling to accept the high level of
responsibility if organization is dominated by _____________and the culture is
____________.



Workers, autocratic


top
management, autocratic PAGE 77



top management,
democratic



Middle level
management, democratic






Which of the following view gives a quick understanding of
the business processes and flows?



Procedural


Abstract


Internal

Diagrammatic PAGE 96







Which of the following provides a structured means of
addressing the impact of technologies on an organization?



Business planning


IT
planning PAGE 67



Requirements
planning



Configuration
planning






In which of the following models the phases are in a
cascading manner linking the output of one to the input of next phase.



Rapid prototyping


Spiral

Waterfall PAGE 83




Extreme programming





If a flow chart become complex it is better to use connector
symbols to reduce to number of flow lines.


True PAGE 98




False





Which of the following addresses the availability of
sufficient technology to support the proposed project?



Select correct option:






Operational
feasibility



Economic feasibility



Tactical feasibility


Technical feasibility PAGE 73







Which of the following process is concluded by recommending
a monitoring and control mechanism?



Designing


Analyzing

Planning
PAGE 67





Implementation





Which of the following model can lead to scope creep due to
user feedback after each phase?


Iterative PAGE 71




XP


Rapid prototyping


Waterfall





In ____________ model, software is constructed step by step
in the same way a building is constructed.



Spiral

Incremental PAGE 69




Extreme programming


Waterfall





Which of the following is the core product which usually
addresses the basic requirements of the system?


First increment
PAGE 85





Second increment


Last increment


Final increment





Which of the following enunciate business goals and the
actions that need to be initiated to achieve those goals including related
benefits, resources and timeframes?



Organizing


Monitoring

Plans PAGE 67




Implementation





Which of the following defines the operations of the system
in layman’s terms?


User manual
PAGE 82





Technical manual


Procedural manual


Testing manual





Which of the following view gives a quick understanding of
the business processes and flows?



Procedural


Abstract


Internal

Diagrammatic PAGE 96

Admin
Administrator

Number of posts : 8137
Age : 50
Location : Sharqi Abadi Mustafabad Kasur
Job/hobbies : Do more for other
Mode (i.e. cool, angry etc) : Serious
Warining :
All Quiz CS 507 Left_bar_bleue0 / 1000 / 100All Quiz CS 507 Right_bar_bleue

Rate by Admin :
All Quiz CS 507 Left_bar_bleue0 / 1000 / 100All Quiz CS 507 Right_bar_bleue

Reputation : 22
Registration date : 2007-10-23

https://meo786.forumotion.com

Back to top Go down

All Quiz CS 507 Empty Re: All Quiz CS 507

Post by neena Sun Nov 07, 2010 8:47 pm

Very Happy v good ...nd nice sharing

neena
Welcome
Welcome

Number of posts : 1
Age : 35
Location : islambad
Job/hobbies : cooking
Mode (i.e. cool, angry etc) : cool
Warining :
All Quiz CS 507 Left_bar_bleue0 / 1000 / 100All Quiz CS 507 Right_bar_bleue

Rate by Admin :
All Quiz CS 507 Left_bar_bleue0 / 1000 / 100All Quiz CS 507 Right_bar_bleue

Reputation : 0
Registration date : 2010-10-20

Back to top Go down

All Quiz CS 507 Empty Re: All Quiz CS 507

Post by Sponsored content


Sponsored content


Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum