All Quiz CS 507
2 posters
Page 1 of 1
All Quiz CS 507
________
also has the ability to explain the line of reasoning in reaching a particular
solution, which ________ does not have.
DSS, MIS
OLAP, KSS
KSS, DSS
GDSS, DSS
Cheaper
factor of production is a challenge for the survival of a company in which of
the following market?
Super market
Online Market
Competitive market
None of these options
Small
organizations usually have complex management structure
True
False
Procedures
are organized in a physical manner to form systems.
True
False
Which of the
following is software based production planning and inventory control system
for material procurement and scheduling.
CAD
PRM
MRI
MRP
Sources of
information are generally categorized in different types depending on their
originality and their proximity to the source or origin
True
False
Closed system is
dependent on the internal resources and data.
True
False
Generation
of relevant data is the objective of every information system
TrueFalse
The basic
purpose behind setting up systems and procedures is to make available
information
TrueFalse
Which of the following
have collection of predefined Procedures related to each other in a sequenced
logical manner in order to collectively achieve the desired results.
Information
System
System
Organization
None
of above options
Which of the following
ethical system differs from secular ethical systems and from the moral code
advocated by other religions
Islamic
Christian
Hindu
Social
The reports generated by
the --------are used for analytical decision making by the management.
MIS
DSS
EIS
TIP
We can get help in
non-routine decision making through _____________
KSS
TPS
MIS
DSS
Existence of
____________ departments in every organization varies with the nature of
industry and the nature of products/ services being offered.
flat
horizontal
functional
??
non-functional
_____________ models are
three dimensional representation of an entity or object.
Narrative
Physical
Mathematical
Graphical
Which of the following
subsystem needs to be linked with the marketing system so as to produce right
amount of product?
Human Resource Subsystem
Production
subsystem
Accounting & Finance subsystem
Quality Assurance subsystem
The
-------------------------is an international, multilateral organization, which
was created as a result of the Uruguay round of discussion in 1994 to harmonic
world trade.
(SAFTA)
(SAARC)
(WTO)
None of above.
Medium Sized organizations
are normally a family ownership run by
Father and Sons
Brothers
Both
option a and b
None of these option
Information should be
tailored in accordance with the organization’s culture and structure.
True p 13
False
Quality
Assurance subsystem In which of the following organizations all critical
managerial positions are usually controlled by the family members.
Medium Size LargeSize
Small
none of these options
Which
of the following is a set of management and control activities which focus on
quality assurance?
CIM
MRP
QTM
TQM
An
organization is defined by the elements that are part of it, its communication
and its rules of action compared to outside events.
True p 5
False
According
to ______________ model, decisions are taken largely on accidental basis.
Rational
Man
Garbage Can p 66
Muddling
through
Irrational
Man
Searching
for conditions in the environment that call for decisions, refers to the
______________ phase of decision making process.
design
choice
intelligence
implementation
Participative
management style approach is a combination of both authoritative and mixed
style
True
False
A
system is a group of ------------------------------that are integrated with the
common purpose of achieving an objective.
Information
Data
Sets
Elements
Data
and information
An
information system that automatically generates report on regular basis and are
not used to monitor input or activities is called
Open loop system p 20
Closed
loop system
Closed
end System
Open
system
According
to _____________ model, organizations are not rational.
Rational
Man
Garbage Can p 66
Muddling
through
Irrational
Man
Which
of the following decision making approach is followed when the situation is
complex and no standard solutions exist for resolving the situation?
Structured
decision making approach
Semi
structured decision making approach
Psychological
decision making approach
Unstructured decision making approach
__________
is known as the father of warehouse
Stephen
hawking
Bill
gates
Bill
Inmon
Edgar
Codd
Information system must
fulfill the needs of the __________:
Customers
Business
Employee
Organization
____________ information
is available in manufacturing information system.
Sales
Purchase
Stock
Product
____________ information
can be sought only from marketing information system
Sales
Purchase
Stock
Product
Which of the following
is the cognitive process of selecting a course of action from among multiple
alternatives?
Planning
Decision Making
CNC
MRP
A ______________
decision making model is the most popular type of model and is based around a
cognitive judgment of the pros and cons of various options.
Garbage Can
Irrational Man
Rational Man
Muddling through
The set of
____________being discharged set the tone and structure of that department.
Responsibilities
Rules
Laws
Processes
Which of the
following subsystem gives a snapshot of statuses of various orders placed, at
any given time?
Quality assurance
subsystem
Order processing subsystem
Controlled processing
subsystem
Concurrent processing
subsystem
_____________
system can be used to simulate the consequences of each alternative generated
DSS MIS
EIS
CNC
Organization
is a ***** of elements that are integrated with the common purpose of achieving
an object.
TrueFalse
___________ system
simulates the judgment and behavior of a human or an organization.
Proficient
Expert
Knowledgeable
Open-loop
NOTE:
Expert
system (Definition) An expert system is a computer
program that simulates the judgment and behavior of a human or an organization
that has expert knowledge and experience in a particular field. Typically, such
a system contains a knowledge base containing accumulated experience and a set
of rules for applying the knowledge base to each particular situation that is
described to the program. Sophisticated expert systems can be enhanced with
additions to the knowledge base or to the set of rules.
Factors of __________are
basic elements of reducing manufacturing cost
Production
Quality
Brand
Cost
Level of
__________refers to the perfection in solution the model will achieve
Depletion
Optimization
Compression
Attenuation
__________ models represent
its entities with an abstraction of lines, symbols or shapes.
Narrative
Physical
Mathematical
Graphical
__________ is the
optimum quality of replenishment stock to order from a supplier.
DOQ
EOQ
EEQ
COQ
NOTE: Stands for economic order quantity
__________ is any
mathematical form aula or equation.
Narrative model
Graphical model
Mathematical model
Physical model
___________ is a model
that which describe its entity with spoken or written words.
Narrative model
Graphical model
Mathematical model
Physical model
__________ is a
three-dimensional representation of its entity.
Narrative model
Graphical model
Mathematical model
Physical model
In the real world, it is
_______________ to specify all of the alternatives and its consequences.
Possible
Certain
Helpful
Impossible
The information can also
be ranked in accordance with the qualities it has.
True
False
Which of the following views organization as a
combination of process oriented groups whose information needs are related but
independent?
CBIS
MIS
DIS
OIS
Information regarding
monitoring and controlling the business is provided by _____________
DSS
TPS
MIS
KSS
An _____________
representation that illustrates the components or relationships of a phenomenon
is called a model.
Concrete
Actual
Abstract
Tangible
In
_____________ building, managers attempt to gather more administrative and
financial power.
Monarchy
Dynasty
EmpireTerritory
___________ includes data
preparation which may involve data filtering, data transformations and
selecting subsets of records.
Exploration ??
Deployment
Model building
Stationing
Individuals
_______________ to avoid new uncertain alternatives and rely on SOP’s.
preferdon’t like
deny
refuse
Which of the
following are original materials on which other research is based?
Primary SourcesSecondary sources
Teritiary Sources
option a and b both
______ is
the set of interconnected structural elements that provide the framework.
InfrastructureSystem
Organization
Internet
Continue
change in work force is harmful for an organization
True p 26
False
“Treat each
customer uniquely” is the motto of the entire_________ process.
CRM
Product
development
Marketing
Promotion
Which of the
following system is linked to all the information systems in an organization?
Marketing information system
Accounting
information system p 65
Human resource information system
Manufacturing information system
Distributing
common information to every one may result in waste of time and confusion.
True p 16
False
Instead of
Information, data is more important in day to day decision making
True
False p 11
Data
mining is also known as ___________ in databases
knowledge management
knowledge processing
knowledge
discovery p37
knowledge transfer
The
organizational structures are formulated in order to efficiently manage the
-----
Business
Operations p 5
Business Size
Business Cost
Business Processes
A newspaper
article is a primary source if it reports events, but a secondary source if it
analyses and comments on those events.
True
False
Decision
making is the cognitive process of selecting a course of action from among
--------- alternatives.
Multiple p 59
Double
Triple
None of these options
Medium size
organizations usually have simple management structure than those of small
organizations;
True
False
The
departmental structures are _______ in banking and financial
sector.
Different
Same
Mixed
Identical
Well
structured problems are constrained problems with _________ solutions
that engage the application of a limited number of rules and principles within
well defined parameters.
divergent
convergent
p 59
different
disparate
The set of
processes developed in an organization to create, gather, store, maintain and
apply the firm’s knowledge is called ___________
Knowledge base
Development engine
Knowledge management
Inference
engine
The practice
of checking the impact of a change in the assumptions on the proposed solution
is carried out in ___________ analysis.
What-If
Goal Seek
Lexical
CBIS helps in updating every change being triggered in less time and with
more effort.
Select correct option:
True
False
(CBIS helps in updating every change being triggered in less
time and with less effort p 36)
There is a
greater emphasis on models in case of ___________
KSS
DSS p
44
MIS
TPS
The concept
of incremental decision making is introduced by the ___________ model.
Rational Man
Garbage Can
Muddling through p 75 Irrational Man
Which
of the following is the specific collection of values and norms that are shared
by people and groups in an organization and that control the way they interact
with each other and with stakeholders outside the Organization
Organizational culture p21
Organizational Structure
Management Style
Decision Making Style
Organizations can be distinguished on the basis of
following criteria /criterias
Organizational structure
Culture of the Organizations
Management Style and DecisionMaking Style
option a , b and c
Quality
maintenance is an issue which requires structured reporting.
True
False
Closed
System depends on __________ and data.
Internal resources
External
resources
Procedures
Technical
resources
Sources of
information are generally categorized as -------------------------
Select correct option:
Primary
Secondary
Tertiary
option a, b and c p 11
Level
of ___________ refers to the perfection in solution the model
will achieve
depletion
optimization p 49
compression
attenuation
The information from the
system not used for control purpose called--------------------
Open loop system
Closed
loop system
Open
end System
Open
and close system
L
# 30
Audit
Control is a logical record of computer activities, usage, processing
pertaining to an operating or application system or user activities
True
False
_________ refer to the sudden decrease in
power supply.
Sags
Surges
Spikes
Black
out
Worms
can destroy data and programs as well as disrupt or even halt the operation of
computer networks.
a) True
b) False
Which
of the following scans the operating system and application soft ware for any
virus based on the viruses they contain.
Anti
Virus
Scanners
Active Monitors
None of above options
The
main source of bugs in computer programs is the complexity of decision-making
code.
True
False
Which
of the following controls have gained critical importance in the modern
computing age for two significant reasons.
Access
Communication
Data
Base
Output
Which
of the following may also detect outbound traffic to guard against spy ware,
which could be sending your surfing habits to a Web site
Personal Firewall
Password
PIN
ID
Which
of the following is the outcome of Object Oriented analysis?
System
interfaces
Integrity
constraints
Completeness
constraints
System’s conceptual model
Which
of the following refers to individuals using their skills to forward a
political agenda, possibly breaking the law in the process, but justifying
their actions for political reasons.
Hacker
Intruder
Hacktivist ??
Cracker
A
denial-of-service attack floods a Web site with so many requests for services
that it slows down or crashes
a) True
b) False ??
__________
is known as the father of warehouse
Stephen
hawking
Bill
gates
Bill Inmon ??
Edgar
Codd
Every
industry has its own ____________ which gives rise to a different set of
subsystems as part of the information system.
command
structure
departmental
structure
policies
responsibilities
Which
of the following is a system that enables drawings to be constructed on a
computer screen and subsequently stored, manipulated and updated electronically?
CDA
MRP
CAD
CNC
Which
of the following refers to the application of computer software in engineering
to analyze the robustness and performance of components, assemblies, products
and manufacturing tools?
CEE
CNC
CAE
MRP
Semi
structured is a gray area which lies ___________ the structured and
unstructured range.
Between
Within
Across
inside .
Which
of the following is a form of automation where computers communicate work
instructions directly to the manufacturing machinery?
CAM
MCA
CNC
MRP
Which
of the following is the mental process of knowing, including aspects such as
awareness, perception, reasoning and judgment?
CCN
Product
development process
Cognitive process
Planning process
CRM
software requires highly integrated environment for high ___________, which is
rarely available.
Sale
Productivity
Promotion
Customer
satisfaction
_____________
information system combines benefits administration, payroll, recruiting and
training, performance analysis and review into one package.
Manufacturing
Sales
Marketing
Human Resource
__________
communication refers to the Information flow from firm to external environment.
Horizontal
Marketing
Suppliers
Vertical
also has the ability to explain the line of reasoning in reaching a particular
solution, which ________ does not have.
DSS, MIS
OLAP, KSS
KSS, DSS
GDSS, DSS
Cheaper
factor of production is a challenge for the survival of a company in which of
the following market?
Super market
Online Market
Competitive market
None of these options
Small
organizations usually have complex management structure
True
False
Procedures
are organized in a physical manner to form systems.
True
False
Which of the
following is software based production planning and inventory control system
for material procurement and scheduling.
CAD
PRM
MRI
MRP
Sources of
information are generally categorized in different types depending on their
originality and their proximity to the source or origin
True
False
Closed system is
dependent on the internal resources and data.
True
False
Generation
of relevant data is the objective of every information system
TrueFalse
The basic
purpose behind setting up systems and procedures is to make available
information
TrueFalse
Which of the following
have collection of predefined Procedures related to each other in a sequenced
logical manner in order to collectively achieve the desired results.
Information
System
System
Organization
None
of above options
Which of the following
ethical system differs from secular ethical systems and from the moral code
advocated by other religions
Islamic
Christian
Hindu
Social
The reports generated by
the --------are used for analytical decision making by the management.
MIS
DSS
EIS
TIP
We can get help in
non-routine decision making through _____________
KSS
TPS
MIS
DSS
Existence of
____________ departments in every organization varies with the nature of
industry and the nature of products/ services being offered.
flat
horizontal
functional
??
non-functional
_____________ models are
three dimensional representation of an entity or object.
Narrative
Physical
Mathematical
Graphical
Which of the following
subsystem needs to be linked with the marketing system so as to produce right
amount of product?
Human Resource Subsystem
Production
subsystem
Accounting & Finance subsystem
Quality Assurance subsystem
The
-------------------------is an international, multilateral organization, which
was created as a result of the Uruguay round of discussion in 1994 to harmonic
world trade.
(SAFTA)
(SAARC)
(WTO)
None of above.
Medium Sized organizations
are normally a family ownership run by
Father and Sons
Brothers
Both
option a and b
None of these option
Information should be
tailored in accordance with the organization’s culture and structure.
True p 13
False
Quality
Assurance subsystem In which of the following organizations all critical
managerial positions are usually controlled by the family members.
Medium Size LargeSize
Small
none of these options
Which
of the following is a set of management and control activities which focus on
quality assurance?
CIM
MRP
QTM
TQM
An
organization is defined by the elements that are part of it, its communication
and its rules of action compared to outside events.
True p 5
False
According
to ______________ model, decisions are taken largely on accidental basis.
Rational
Man
Garbage Can p 66
Muddling
through
Irrational
Man
Searching
for conditions in the environment that call for decisions, refers to the
______________ phase of decision making process.
design
choice
intelligence
implementation
Participative
management style approach is a combination of both authoritative and mixed
style
True
False
A
system is a group of ------------------------------that are integrated with the
common purpose of achieving an objective.
Information
Data
Sets
Elements
Data
and information
An
information system that automatically generates report on regular basis and are
not used to monitor input or activities is called
Open loop system p 20
Closed
loop system
Closed
end System
Open
system
According
to _____________ model, organizations are not rational.
Rational
Man
Garbage Can p 66
Muddling
through
Irrational
Man
Which
of the following decision making approach is followed when the situation is
complex and no standard solutions exist for resolving the situation?
Structured
decision making approach
Semi
structured decision making approach
Psychological
decision making approach
Unstructured decision making approach
__________
is known as the father of warehouse
Stephen
hawking
Bill
gates
Bill
Inmon
Edgar
Codd
Information system must
fulfill the needs of the __________:
Customers
Business
Employee
Organization
____________ information
is available in manufacturing information system.
Sales
Purchase
Stock
Product
____________ information
can be sought only from marketing information system
Sales
Purchase
Stock
Product
Which of the following
is the cognitive process of selecting a course of action from among multiple
alternatives?
Planning
Decision Making
CNC
MRP
A ______________
decision making model is the most popular type of model and is based around a
cognitive judgment of the pros and cons of various options.
Garbage Can
Irrational Man
Rational Man
Muddling through
The set of
____________being discharged set the tone and structure of that department.
Responsibilities
Rules
Laws
Processes
Which of the
following subsystem gives a snapshot of statuses of various orders placed, at
any given time?
Quality assurance
subsystem
Order processing subsystem
Controlled processing
subsystem
Concurrent processing
subsystem
_____________
system can be used to simulate the consequences of each alternative generated
DSS MIS
EIS
CNC
Organization
is a ***** of elements that are integrated with the common purpose of achieving
an object.
TrueFalse
___________ system
simulates the judgment and behavior of a human or an organization.
Proficient
Expert
Knowledgeable
Open-loop
NOTE:
Expert
system (Definition) An expert system is a computer
program that simulates the judgment and behavior of a human or an organization
that has expert knowledge and experience in a particular field. Typically, such
a system contains a knowledge base containing accumulated experience and a set
of rules for applying the knowledge base to each particular situation that is
described to the program. Sophisticated expert systems can be enhanced with
additions to the knowledge base or to the set of rules.
Factors of __________are
basic elements of reducing manufacturing cost
Production
Quality
Brand
Cost
Level of
__________refers to the perfection in solution the model will achieve
Depletion
Optimization
Compression
Attenuation
__________ models represent
its entities with an abstraction of lines, symbols or shapes.
Narrative
Physical
Mathematical
Graphical
__________ is the
optimum quality of replenishment stock to order from a supplier.
DOQ
EOQ
EEQ
COQ
NOTE: Stands for economic order quantity
__________ is any
mathematical form aula or equation.
Narrative model
Graphical model
Mathematical model
Physical model
___________ is a model
that which describe its entity with spoken or written words.
Narrative model
Graphical model
Mathematical model
Physical model
__________ is a
three-dimensional representation of its entity.
Narrative model
Graphical model
Mathematical model
Physical model
In the real world, it is
_______________ to specify all of the alternatives and its consequences.
Possible
Certain
Helpful
Impossible
The information can also
be ranked in accordance with the qualities it has.
True
False
Which of the following views organization as a
combination of process oriented groups whose information needs are related but
independent?
CBIS
MIS
DIS
OIS
Information regarding
monitoring and controlling the business is provided by _____________
DSS
TPS
MIS
KSS
An _____________
representation that illustrates the components or relationships of a phenomenon
is called a model.
Concrete
Actual
Abstract
Tangible
In
_____________ building, managers attempt to gather more administrative and
financial power.
Monarchy
Dynasty
EmpireTerritory
___________ includes data
preparation which may involve data filtering, data transformations and
selecting subsets of records.
Exploration ??
Deployment
Model building
Stationing
Individuals
_______________ to avoid new uncertain alternatives and rely on SOP’s.
preferdon’t like
deny
refuse
Which of the
following are original materials on which other research is based?
Primary SourcesSecondary sources
Teritiary Sources
option a and b both
______ is
the set of interconnected structural elements that provide the framework.
InfrastructureSystem
Organization
Internet
Continue
change in work force is harmful for an organization
True p 26
False
“Treat each
customer uniquely” is the motto of the entire_________ process.
CRM
Product
development
Marketing
Promotion
Which of the
following system is linked to all the information systems in an organization?
Marketing information system
Accounting
information system p 65
Human resource information system
Manufacturing information system
Distributing
common information to every one may result in waste of time and confusion.
True p 16
False
Instead of
Information, data is more important in day to day decision making
True
False p 11
Data
mining is also known as ___________ in databases
knowledge management
knowledge processing
knowledge
discovery p37
knowledge transfer
The
organizational structures are formulated in order to efficiently manage the
-----
Business
Operations p 5
Business Size
Business Cost
Business Processes
A newspaper
article is a primary source if it reports events, but a secondary source if it
analyses and comments on those events.
True
False
Decision
making is the cognitive process of selecting a course of action from among
--------- alternatives.
Multiple p 59
Double
Triple
None of these options
Medium size
organizations usually have simple management structure than those of small
organizations;
True
False
The
departmental structures are _______ in banking and financial
sector.
Different
Same
Mixed
Identical
Well
structured problems are constrained problems with _________ solutions
that engage the application of a limited number of rules and principles within
well defined parameters.
divergent
convergent
p 59
different
disparate
The set of
processes developed in an organization to create, gather, store, maintain and
apply the firm’s knowledge is called ___________
Knowledge base
Development engine
Knowledge management
Inference
engine
The practice
of checking the impact of a change in the assumptions on the proposed solution
is carried out in ___________ analysis.
What-If
Goal Seek
Lexical
CBIS helps in updating every change being triggered in less time and with
more effort.
Select correct option:
True
False
(CBIS helps in updating every change being triggered in less
time and with less effort p 36)
There is a
greater emphasis on models in case of ___________
KSS
DSS p
44
MIS
TPS
The concept
of incremental decision making is introduced by the ___________ model.
Rational Man
Garbage Can
Muddling through p 75 Irrational Man
Which
of the following is the specific collection of values and norms that are shared
by people and groups in an organization and that control the way they interact
with each other and with stakeholders outside the Organization
Organizational culture p21
Organizational Structure
Management Style
Decision Making Style
Organizations can be distinguished on the basis of
following criteria /criterias
Organizational structure
Culture of the Organizations
Management Style and DecisionMaking Style
option a , b and c
Quality
maintenance is an issue which requires structured reporting.
True
False
Closed
System depends on __________ and data.
Internal resources
External
resources
Procedures
Technical
resources
Sources of
information are generally categorized as -------------------------
Select correct option:
Primary
Secondary
Tertiary
option a, b and c p 11
Level
of ___________ refers to the perfection in solution the model
will achieve
depletion
optimization p 49
compression
attenuation
The information from the
system not used for control purpose called--------------------
Open loop system
Closed
loop system
Open
end System
Open
and close system
L
# 30
Audit
Control is a logical record of computer activities, usage, processing
pertaining to an operating or application system or user activities
True
False
_________ refer to the sudden decrease in
power supply.
Sags
Surges
Spikes
Black
out
Worms
can destroy data and programs as well as disrupt or even halt the operation of
computer networks.
a) True
b) False
Which
of the following scans the operating system and application soft ware for any
virus based on the viruses they contain.
Anti
Virus
Scanners
Active Monitors
None of above options
The
main source of bugs in computer programs is the complexity of decision-making
code.
True
False
Which
of the following controls have gained critical importance in the modern
computing age for two significant reasons.
Access
Communication
Data
Base
Output
Which
of the following may also detect outbound traffic to guard against spy ware,
which could be sending your surfing habits to a Web site
Personal Firewall
Password
PIN
ID
Which
of the following is the outcome of Object Oriented analysis?
System
interfaces
Integrity
constraints
Completeness
constraints
System’s conceptual model
Which
of the following refers to individuals using their skills to forward a
political agenda, possibly breaking the law in the process, but justifying
their actions for political reasons.
Hacker
Intruder
Hacktivist ??
Cracker
A
denial-of-service attack floods a Web site with so many requests for services
that it slows down or crashes
a) True
b) False ??
__________
is known as the father of warehouse
Stephen
hawking
Bill
gates
Bill Inmon ??
Edgar
Codd
Every
industry has its own ____________ which gives rise to a different set of
subsystems as part of the information system.
command
structure
departmental
structure
policies
responsibilities
Which
of the following is a system that enables drawings to be constructed on a
computer screen and subsequently stored, manipulated and updated electronically?
CDA
MRP
CAD
CNC
Which
of the following refers to the application of computer software in engineering
to analyze the robustness and performance of components, assemblies, products
and manufacturing tools?
CEE
CNC
CAE
MRP
Semi
structured is a gray area which lies ___________ the structured and
unstructured range.
Between
Within
Across
inside .
Which
of the following is a form of automation where computers communicate work
instructions directly to the manufacturing machinery?
CAM
MCA
CNC
MRP
Which
of the following is the mental process of knowing, including aspects such as
awareness, perception, reasoning and judgment?
CCN
Product
development process
Cognitive process
Planning process
CRM
software requires highly integrated environment for high ___________, which is
rarely available.
Sale
Productivity
Promotion
Customer
satisfaction
_____________
information system combines benefits administration, payroll, recruiting and
training, performance analysis and review into one package.
Manufacturing
Sales
Marketing
Human Resource
__________
communication refers to the Information flow from firm to external environment.
Horizontal
Marketing
Suppliers
Vertical
Re: All Quiz CS 507
Automated
data are less susceptible to destruction and misuse than paper data
a) True
b) False
Documentation
may include program code of application softwares, technical manuals, user
manuals e
a) True
b) False
Which
of the following likelihood level is true for the following: "The threat
source lacks motivation or capability or controls are in place to prevent or at
least significantly impede the vulnerability from being exercised."
a) High
b) Low
c) Medium
d) None of these
Which
of the following level is formulation of new sales products, and identifying
new sales opportunities?
a) Operational
b) Managerial
c) Strategic
The
spiral model emphasizes the need to go back and reiterate earlier steps a
number of times as the project progresses.
a) True
b) False
In
assessing risks for an IT system, _______________ is the first step.
a) To define the scope of the effort.
b) Vulnerability Assesment
c) threat identification
IDS
works in conjunction with routers and firewalls by monitoring network usage
anomalies to protect a company s information systems resources from external as
well as internal misuse.
a) True
b) False
Which
of the following model combines the elements of the waterfall model with the
philosophy of prototyping?
► Prototyping
► Iterative
► Incremental
► RAID
__________ sources materials in which the
information from secondary sources has been digested.
► Primary
► Tertiary
► Secondary
Targeting
advertising to customers to -------------- the probability, that an offer is
accepted.
► Decrease
► Increase
► Stable
Information
technology has been criticized for having a negative effect on people's
individuality
► False
► True
In
which of the following there is a direct interaction facilitated by auctions,
classifieds, and bartering?
► EGovernment
► MCommerce
► Consumer-to-consumer EC
► Intrabusiness EC
Nature
of vulnerability is an input source for Likelihood determination
► True
► False
A
Trojan horse virus stays dormant until a specific time or data condition is
met.
► True
► False
Object
orientation helps in increasing abstraction level to build _________
► Testable software
► Reusable software
► Maintainable software
Encapsulation
means information
hiding.
The
use of software routines to tie up the computer hosting a Web site that denies
legitimate visitor's access is called :
denial of service ???
hacking.
Spoofing
Sniffing
Systems
have collection of predefined ----------------------related to each other in a
sequenced logical manner in order to collectively achieve the desired results. Procedures
Sequences
Policies
After
her third data processing clerk showed up at work with wrist brace, Ms. Jackson
called a specialty firm to assess the design of their work environment. This
firm ecializes in _____:
Furniture
layout
Video display
Terminals
Ergonomics
Lighting
Customer
touch point is a method of interaction with a customer, such as telephone,
e-mail, a customer service or help desk, conventional mail, Web site and store.
True
False
Buying
and selling of products, services and information via computer networks,
primarily the Internet is :
E-Commerce
E-Business
Web Surfing
BPR
Which
of the following refers to the process of identifying attempts to penetrate a
system and gain unauthorized access?
Threat Identification
Intrusion
detection
Access
Control
All of above
They
represent Equations / Formulae representing relationship between two or more
factors related to each other in a defined manner is called-----------
Graphical
Model
Mathematical Model
Algebra
Model
Which
of the following includes assessment of controls already been implemented or
planned, probability that they can be broken, assessment of potential loss
despite such? Controls existing?
Control
Analysis
Vulnerability
Assessment
Risk Management
All of above
Likelihood
Determination phase determines that a potential vulnerability could be
exercised by a given threat-source.
True
False
Which
of the following likelihood level is true for the following: "The threat
source lacks motivation or capability or controls are in place to prevent or at
least significantly impede the vulnerability from being exercised."
High
Low
Medium
None
of These
Production
subsystem needs to be linked with the marketing system to -------------right
amount of product.
Produce
Sale
Purchase
Which
of the following focus on detecting potentially abnormal behavior in function
of operating system or request made by application software?
Active
Monitors
Scanners
Anti virus
Behavior blockers p---151
The
main source of bugs in computer programs is the complexity of decision making
code.
True
False 148
Entity
represents sources of data received by the system or destinations of the data
produced by the system.
True
False p---115
The
flowchart helps in locating and correcting errors also called debugging.
True p---114
False
The purpose of data flow diagrams is to
provide a --------- between users and systems developers
Linking
bridge p---115
Empty
Space
Data
Flows
Options a and b
Which
of the following level is formulation of new sales products, and identifying
new sales opportunities?
Operational
Managerial
Strategic
p---52
Computer-aided
manufacturing (CAM), is a form of automation where computers communicate work
instructions directly to the manufacturing machinery.
True
62
False
The comparison of the actual with the
expected is done with the help of _______
Input
element
Processing
Control
mechanism p----29
The
spiral model emphasizes the need to go back and reiterate earlier steps a
number of times as the project progresses.
True
p--97
False
Providing
access to the data and behavior is through an objects interface is called
__________
Polymorphism
Encapsulation
Message
passing
Which
of the following is a logical record of computer activities, usage, processing
pertaining to an operating or application system or user activities?
Control
Log
Control
trial
Audit trail p---157
Control Trial can be used together with access
controls to identify and provide information about users suspected of improper
modification of data.
True
False
p---157
Risk
Management is the process of measuring, or assessing risk and then developing
strategies to manage the risk.
True
p----160
False
In assessing risks for an IT system,
_______________ is the first step.
To
define the scope of the effort. P---161
Vulnerability
Assesment
threat identification
Risk
Management determines that a potential vulnerability could be exercised by a
given threat-source.
True
False p---161
data are less susceptible to destruction and misuse than paper data
a) True
b) False
Documentation
may include program code of application softwares, technical manuals, user
manuals e
a) True
b) False
Which
of the following likelihood level is true for the following: "The threat
source lacks motivation or capability or controls are in place to prevent or at
least significantly impede the vulnerability from being exercised."
a) High
b) Low
c) Medium
d) None of these
Which
of the following level is formulation of new sales products, and identifying
new sales opportunities?
a) Operational
b) Managerial
c) Strategic
The
spiral model emphasizes the need to go back and reiterate earlier steps a
number of times as the project progresses.
a) True
b) False
In
assessing risks for an IT system, _______________ is the first step.
a) To define the scope of the effort.
b) Vulnerability Assesment
c) threat identification
IDS
works in conjunction with routers and firewalls by monitoring network usage
anomalies to protect a company s information systems resources from external as
well as internal misuse.
a) True
b) False
Which
of the following model combines the elements of the waterfall model with the
philosophy of prototyping?
► Prototyping
► Iterative
► Incremental
► RAID
__________ sources materials in which the
information from secondary sources has been digested.
► Primary
► Tertiary
► Secondary
Targeting
advertising to customers to -------------- the probability, that an offer is
accepted.
► Decrease
► Increase
► Stable
Information
technology has been criticized for having a negative effect on people's
individuality
► False
► True
In
which of the following there is a direct interaction facilitated by auctions,
classifieds, and bartering?
► EGovernment
► MCommerce
► Consumer-to-consumer EC
► Intrabusiness EC
Nature
of vulnerability is an input source for Likelihood determination
► True
► False
A
Trojan horse virus stays dormant until a specific time or data condition is
met.
► True
► False
Object
orientation helps in increasing abstraction level to build _________
► Testable software
► Reusable software
► Maintainable software
Encapsulation
means information
hiding.
The
use of software routines to tie up the computer hosting a Web site that denies
legitimate visitor's access is called :
denial of service ???
hacking.
Spoofing
Sniffing
Systems
have collection of predefined ----------------------related to each other in a
sequenced logical manner in order to collectively achieve the desired results. Procedures
Sequences
Policies
After
her third data processing clerk showed up at work with wrist brace, Ms. Jackson
called a specialty firm to assess the design of their work environment. This
firm ecializes in _____:
Furniture
layout
Video display
Terminals
Ergonomics
Lighting
Customer
touch point is a method of interaction with a customer, such as telephone,
e-mail, a customer service or help desk, conventional mail, Web site and store.
True
False
Buying
and selling of products, services and information via computer networks,
primarily the Internet is :
E-Commerce
E-Business
Web Surfing
BPR
Which
of the following refers to the process of identifying attempts to penetrate a
system and gain unauthorized access?
Threat Identification
Intrusion
detection
Access
Control
All of above
They
represent Equations / Formulae representing relationship between two or more
factors related to each other in a defined manner is called-----------
Graphical
Model
Mathematical Model
Algebra
Model
Which
of the following includes assessment of controls already been implemented or
planned, probability that they can be broken, assessment of potential loss
despite such? Controls existing?
Control
Analysis
Vulnerability
Assessment
Risk Management
All of above
Likelihood
Determination phase determines that a potential vulnerability could be
exercised by a given threat-source.
True
False
Which
of the following likelihood level is true for the following: "The threat
source lacks motivation or capability or controls are in place to prevent or at
least significantly impede the vulnerability from being exercised."
High
Low
Medium
None
of These
Production
subsystem needs to be linked with the marketing system to -------------right
amount of product.
Produce
Sale
Purchase
Which
of the following focus on detecting potentially abnormal behavior in function
of operating system or request made by application software?
Active
Monitors
Scanners
Anti virus
Behavior blockers p---151
The
main source of bugs in computer programs is the complexity of decision making
code.
True
False 148
Entity
represents sources of data received by the system or destinations of the data
produced by the system.
True
False p---115
The
flowchart helps in locating and correcting errors also called debugging.
True p---114
False
The purpose of data flow diagrams is to
provide a --------- between users and systems developers
Linking
bridge p---115
Empty
Space
Data
Flows
Options a and b
Which
of the following level is formulation of new sales products, and identifying
new sales opportunities?
Operational
Managerial
Strategic
p---52
Computer-aided
manufacturing (CAM), is a form of automation where computers communicate work
instructions directly to the manufacturing machinery.
True
62
False
The comparison of the actual with the
expected is done with the help of _______
Input
element
Processing
Control
mechanism p----29
The
spiral model emphasizes the need to go back and reiterate earlier steps a
number of times as the project progresses.
True
p--97
False
Providing
access to the data and behavior is through an objects interface is called
__________
Polymorphism
Encapsulation
Message
passing
Which
of the following is a logical record of computer activities, usage, processing
pertaining to an operating or application system or user activities?
Control
Log
Control
trial
Audit trail p---157
Control Trial can be used together with access
controls to identify and provide information about users suspected of improper
modification of data.
True
False
p---157
Risk
Management is the process of measuring, or assessing risk and then developing
strategies to manage the risk.
True
p----160
False
In assessing risks for an IT system,
_______________ is the first step.
To
define the scope of the effort. P---161
Vulnerability
Assesment
threat identification
Risk
Management determines that a potential vulnerability could be exercised by a
given threat-source.
True
False p---161
Re: All Quiz CS 507
Risk
management is often based on the experience, insight and intuition of program
managers and key stakeholders in the program.
True
False
Active
Attack is one of the types of Web Security information systems.
True
p---172
False
IDS works in conjunction with routers and
firewalls by monitoring network usage anomalies to protect a company s
information systems resources from external as well as internal misuse
True
p---176
False
Business-to-business
EC (B2B) is one of the types of E-Commerce.
True
False
Temporal CSFs in an organization, results
from _________
Economic
changes
Technological changes
Internal
needs and changes p---133
Environmental
changes
Factors of which of the following are basic
elements of reducing manufacturing cost? Brand
Cost
Production
Quality
ERP
or enterprise systems control all major business processes with a single
software architecture in real time.
True
False
The bullwhip effect refers to erratic shifts
in orders up and down the supply chain because of poor demand forecasting,
price fluctuation, order batching, and rationing within the chain.
True
False
The objective of the entire risk management
process is that no one should hamper the working of the smooth working of IS.
True
p---167
False
If
an organization can tolerate some downtime, cold sites backup might be
appropriate.
True
170
False
Cryptography primarily consists of two basic
processes.
True
p---154
False
Logical intrusion skills needed to exploit
logical exposures are more technical and complex as compared to physical
exposures.
True
p---151
False
Firewall
is the primary method for keeping a computer secure from intruders.
True
p---153
False
Where problem is recurring and repetitive,
the common factors can be identified in order to identify a particular course
of action is called -------------Structured decisions Unstructured decisions
Structured decisions
Where
problem is recurring and repetitive, the ___________ factors can be identified
in order to identify a particular course of action.
different
multiple
commonvarious
The use of software routines to tie up the computer
hosting a Web site that denies legitimate visitor's access is called:
denial
of service.
hacking.
spoofing
sniffing
Wireless computing devices are not subject to
viruses.
True
False
A
security program is a series of ongoing regular periodic reviews conducted to
ensure that assets associated with the information systems function are
safeguarded adequately.
True
p—139
False
The
Internet's technological success does not depend on its principal communication
tools, the Transmission Control Protocol (TCP) and the Internet Protocol (IP).
True
False
Which
of the following helps an organization in gaining competitive advantage in the
use of processes, effectiveness and efficiency should also be kept in mind?
BPR p—129
CSF
SPR
Systems analysts work as a link between
Business people, & Computer Programmers. True 102
False
The First increment in incremental model is
usually the core product which addresses the basic requirements of the system.
True
p--94
False
Which of the following is a form of
automation where computers communicate work instructions directly to the
manufacturing machinery?
CAD
CAM
CIM p---62
Which
of the following phase of decision making process involves searching for
conditions in the environment that call for decisions?
Intelligence p----70
Design
Choice
Implementation
Computer
programmers apply information technology to build information systems which
solves these problems but need not fully understand the business usages they
are computerizing or supporting.
True
p---102
False
Rectangle
shape in the flow charts represents___________
Decision
p---106
Process
Terminator
__________
is a person who attempts to invade the privacy of the system.
Hacktivsts
Hackers
p---152
Crackers
Characteristics
of object are called ________
Methods
Attributes p--129
Status
Operations
are usually called via _______
Functions
Signatures p---131
Methods
Web
Site monitoring is the process used to view or record both the keystrokes
entered by
a
computer user and the computer's response during an interactive session.
True
False p---157
Likelihood
Determination phase sometimes determines that a potential vulnerability
could
not be exercised by a given threat-source.
True
False
Active
Attack is one of the types of Web Security information systems.
True p---172
False
Business-to-business
EC (B2B) is one of the types of E-Commerce.
True
False
Collaborative
commerce is one of the types of B2B.
True
False
ERP
Systems control all major business processes with single software architecture
in
real time.
True
False
Rectangle
shape in the flow charts represents___________
Fire
wall is the primary method for keeping a computer secure from intruders.
True
False
Why use in arrow of process in the flow chart?
(Marks 1)
What
is Object Oriented Analysis and Design (OOAD)? (Marks 1)
Critical
Success Factors differ from organization to organization. While approving any
project, the management may evaluate the project on the basis of certain
factors critical to the success or failure of the project. Five example in real
life (Marks 10)
What
do you understand by computing envroiment. Describe the • Stand Alone
Processing and Web Based Environment (Marks 5)
Roles
& Responsibility any three (Marks 3)
What is focal Point? Complete(Marks 10)
What
is Vulnerability? (Marks 1)
Two
output of Impact Analysis? (Marks 2)
What
is challenge in lunching ecommerce? (Marks 5)
What
is change management. Identify its types ? (Marks 5)
What
is difference between the Changing and Freezing? (Marks 3)
MIDTERM
EXAMINATION Fall 2008 CS507-
Information Systems (Session - 2)
Following statement is true for which of
the following model?
Provides early indication of
insurmountable risks, without much cost
► Incremental Model
► RAID
► Spiral
► Iterative
Devaluation of currency is called
________
► Interest rate
► Inflation ??
► Markup
__________ sources materials in which the
information from secondary sources has been digested.
► Primary
► Tertiary
► Secondary
Debtor’s aging report Debtor’s aging report is an example of the
following phase?
► Choice
► Design
► Intelligence
There are TWO phases of the decision
making process
► TRUE
► FALSE
Which of the following phase of decision
making process involves searching for conditions in the environment that calls
for decisions?
► Intelligence
► Design
► Choice
► Implementation
Structured
Problems possess multiple solutions, solution paths, fewer parameters which are
less manipulate able, and contain uncertainty about which concepts, rules, and
principles.
► True
► False
The
study of business problem domain used to recommend improvements and specify the
business
Requirements for the solution is called:
► System Analysis
► System Design
► Risk Management
► Risk Analysis
Data
mining can allow a firm to develop:
► DSS based on the Web and Specific
marketing campaigns for different customer segments
► Specific marketing campaigns for
different customer segments
►
DSS based on the Web.
DSS
can stimulate innovation in decision making by helping managers to existing
decision making procedures.
► True
► False
The
term information architecture describes a specialized ---------------- which
relates to the management of information and employment of informational tools.
► Skill Set
► Data Set
► Tool Set
Infrastructure,
generally, is the set of interconnected structural elements
that provide the framwork
for supporting the entire structure
► Infrastructure
► Decision Support System
► Management System
High
level of foreign trade has resulted in imports and exports which require inter
linkage for smooth coordination.
► True
► False
Which of the following sources are original materials on which other
research is based?
► Primary
► Secondary
► Tertiary
► None of these
On what factors need of information
depends in any organization?
Solution:-
Good
information is essential for effective operation and decision making at all
levels in businesses. Identifies and illustrates the different kinds of
information by the complex internal and external communication links of a
typical R&D department. Discusses the factors which condition managers' use
of information, namely managers' roles and tasks; decision-making processes (strategic
and operational); rational and alternative behaviour; cognitive style and
perception; and “hidden agenda” factors such as the symbolic use of information
and information as power. Supported by selected readings, and tables of
information types, processes and uses.
Define TQM?
Solution: TQM is a set of
management and control activities which focus on quality assurance.
Enlist the types of models used in DSS.
Solution:- Physical Models Narrative Models Graphic
Models Mathematical Models
What
is the need for Accounting
information system (AIS) to be linked to all the information systems in an
organization. ?
Solution:- Accounting information system is linked to all the information systems
in an organization. This is important because the data required for proper book
keeping and generation of transactional reports is extracted from all over the
organization. For instance sales information can be sought only from marketing
information system and stock information is available in manufacturing
information system.
The purpose of AIS is to accumulate data and provide
decision makers (investors, creditors, and managers) with information to make
decision.
Discuss
the attributes on which Organizational Information Requirements depends
Solution: There are
several surveys indicate that a significant percentage of data warehouses fail
to meet business objectives or are outright failures. One of the reasons for
this is that requirement analysis is typically overlooked in real projects.
Goal-oriented approach to requirement analysis for data warehouses based on the
Tropos methodology. Two different perspectives are integrated for requirement
analysis: organizational modeling, centered on stakeholders, and decisional
modeling, focused on decision makers. Our approach can be employed within both
a demand-driven and a mixed supply/demand-driven design framework.
Also
Functional security requirements of information systems can roughly be
classified into two: computer security requirements and communications security
requirements. Challenges for developing notations for expressing these
requirements are numerous, most importantly the difficulty of dealing with
layers of abstraction, flexibility to adapt into many types of requirements,
groupings of requirements, and requirement dependencies. Many frameworks for
dealing with information security highlight the importance of a properly
defined organization of security but fail to establish models to support the
specification. This paper establishes one such model and demonstrates how the
above difficulties can be overcome through extensive application of
organizational modeling of information security.
What are the management styles? Discuss
in details.
Solution:- Various management styles can be employed dependent
on the culture of the business, the nature of the task, the nature of the
workforce and the personality and skills of the leaders..
There
are three Management Styles.
Authoritative
Participative Mixed
1)Authoritative An Autocratic or authoritarian manager makes all the decisions,
keeping the information and decision making among the senior management.
Objectives and tasks are set and the workforce is expected to do exactly as
required. The communication involved with this method is mainly downward, from
the leader to the subordinate; critics such as Elton Mayo have argued that this
method can lead to a decrease in motivation from the employee's point of view.
The main advantage of this style is that the direction of the business will
remain constant, and the decisions will all be similar, this in turn can
project an image of a confident, well managed business. On the other hand,
subordinates may become highly dependent upon the leaders and supervision may
be needed. Amanda Glass is the founder of this unique management style.
2)
Participative In a Democratic style, the manager allows the
employees to take part in decision making, therefore everything is agreed by
the majority. The communication is extensive in both directions. This style can
be particularly useful when complex decisions need to be made that require a
range of specialist skills: for example, when a new computerized system needs
to be put in place and the upper management of the business is computer
illiterate. From the overall business's point of view, job satisfaction and
quality of work will improve. However, the decision-making process is severely
slowed down, and the need of a consensus may avoid taking the best decision for
the business.
3)
Mixed This approach is a
combination of both above styles. Input is taken and respected, final decision
is taken by the senior management keeping in view the views given by the
employee.
MIDTERM EXAMINATION Spring 2009 CS507- Information Systems
Sources of information are generally categorized as
-------------------------
► Primary
► Tertiary
► All of above
► Secondary
Sources of information are generally categorized inn
different types depending on their originality and their proximity to the
source or origin.
►
True
►
False
Manufacturing process
involves more than one sub-process.
►True
► False
The organization refers to a
organizational structure with few
or no levels of intervening management between staff and managers is
called------------------------
► Hierarchical organization
► Flat Organization
► Pyramid Organization
Every system comprises of
basic components which in a co-ordination formulate a system.
► True
► False
---------- simply means a
particular technique of directing one's attention in learning, discovery or
problem solving.
► Robustness
► Heuristic
► DSS
► EIS
------- seek to put
intelligence into the hardware in the form of generalized capability to learn.
► Neural network System
► Fuzzy logic
► DSS
► ESS
Prototyping is the process of quickly putting
together a working model in order to test various aspects of the design to
gather early user feedback.
► True
► False
Accounting
information system (AIS) is that linked to all the information systems
in an organization.
► True
► False
Technical
Reports are examples of _________ resource.
► Tertiary
► Primary
► Secondary
Organizations
are distinguished on the basis of
__________
► Attributes
► Policy
► Management
________
are run under direct supervision of family members.
► Small
Organization
► Medium organization
► Large
Organization
In
_____ there are low number of subordinates per person.
► Pyramid
Structure
► Flat
Structure
► Modern
Structure
Which
of the following structure
contains less number of management
levels?
► Flat Structure
► Tall
Structure
► Classical
structure
Define TQM?
What
are the conglomerate organizations?
What
aspects should be covered by design of information flow?
How
the chief executive is elected in any organization and what are his
responsibilities?
Identify
the basic purpose of DFD and Identify the steps of Designing a DFD for any
process?
Discuss the purpose of Feasibility Study? Discuss
key areas?
FINALTERM EXAMINATION
Fall 2008
CS507- Information Systems (Session - 1)
Question No: 1 ( Marks: 1 ) - Please
choose one
Medium Sized organizations are normally
a family ownership run by
Father & Sons
Brothers
Father, Sons and Brothers
None of the given
Question No: 2 ( Marks: 1 ) - Please
choose one
The organization refers to a organizational structure with few or no levels of
intervening management between staff and managers is called------------------------
Hierarchical organization
Flat Organization
Pyramid Organization
Question No: 3 ( Marks: 1 ) - Please
choose one
ERP s major objective is to tightly
integrate the functional areas of the organization
and to enable seamless information flows
across the functional areas.
True
False
Question No: 4 ( Marks: 1 ) - Please
choose one
Which of the following integrate the
planning, management and use of all resources
of the organization?
ERP
CRM
ESS
OIS
Question No: 5 ( Marks: 1 ) - Please
choose one
What are the steps and their order in EC order fulfillment?
Ensuring payment, checking availability, arranging shipment,
insurance,
production, purchasing & warehousing, contacts with customers
and returns
Ensuring payment, checking availability, arranging shipment,
insurance,
production, purchasing & warehousing, and contacts with
customers
Ensuring payment, checking availability, arranging shipment,
insurance,
production, plant services, purchasing & warehousing, and
contacts with customers
Ensuring payment, checking availability, arranging shipment,
insurance,
production, plant services, purchasing & warehousing, contacts
with customers and
returns
Question No: 6 ( Marks: 1 ) - Please choose
one
Data warehouses are generally batch
updated at the end of the day, week or some
period.
False
True
Question No: 7 ( Marks: 1 ) - Please
choose one
The Internet Protocol is designed solely for the addressing and
routing of data packets
across a network
True
False
Question No: 8 ( Marks: 1 ) - Please
choose one
Which one of the following are partially configured, usually with
network connections
and selected peripheral equipment, such as disk drives, tape
drives and controllers, but
without the main computer.
Cold Site
Warm Site
Hot Site
Third Party Arrangements
Question No: 9 ( Marks: 1 ) - Please
choose one
Likelihood Determination phase determines that a potential
vulnerability could be exercised by a given threat-source.
True
False
Question No: 10 ( Marks: 1 ) - Please
choose one
Threat capacity is an input source for Likelihood determination.
False
True
Question No: 11 ( Marks: 1 ) - Please
choose one
Which of the following is the primary
method for keeping a computer secure from intruders?
Anti virus
Scanners
Firewall
Password
Question No: 12 ( Marks: 1 ) - Please
choose one
Decisions in which the decision maker
must provide judgment, evaluation, and
insights into the problem definition
would be characterized as:
Structured
Semi Structured
Unstructured
Question No: 13 ( Marks: 1 ) - Please
choose one
Wireless computing devices are not subject to viruses.
False
True
Question No: 14 ( Marks: 1 ) - Please
choose one
Which of the following is a private
enterprise owned communication network that uses internet protocols, network
connectivity, and public telecommunication system to share organization's
information or operations with its employees, and to enable the employees to
communicate with each other?
Internet
Intranet
Wireless communication
None of above
Question No: 15 ( Marks: 1 ) - Please
choose one
Availability of which of the following
to various users also depends on how the information is processed? (Computing environment)
Information
Data
Log file
None of above
Question No: 16 ( Marks: 1 ) - Please
choose one
Which of the following helps an
organization in gaining competitive advantage in the use of processes,
effectiveness and efficiency should also be kept in mind?
BPR
CSF
SPR
Question No: 17 ( Marks: 1 ) - Please
choose one
CRM software requires highly integrated
environment for high Productivity, which is rarely available.
True
False
Question No: 18 ( Marks: 1 ) - Please
choose one
Existence of functional departments in
each organization may vary with the nature of industry and the nature of
products/services being offered.
True
False
Question No: 19 ( Marks: 1 ) - Please
choose one
Public companies are example of ____________
Small Organization
Large Organization
Medium organization
Question No: 20 ( Marks: 1 ) - Please
choose one
_____ serves the concurrent monitoring as the system is being
used.
Scanners
Active monitors
Behavior blockers
Question No: 21 ( Marks: 1 ) - Please
choose one
While developing software object oriented analysis focuses on
_________
Modular approach
Incremental approach
Traditional approach
Derived approach
Question No: 22 ( Marks: 1 ) - Please
choose one
Testing is easy for the software that is developed using OOAD due
to use of
___________
Modular approach
Real time modeling
Usability feature
Question No: 23 ( Marks: 1 ) - Please
choose one
Providing access to the data and behavior is through an object s
interface is called
__________
Message passing
Polymorphism
Encapsulation
Question No: 24 ( Marks: 1 ) - Please
choose one
There are typically two kinds of audit
records.
True
False
Question No: 25 ( Marks: 1 ) - Please
choose one
In assessing risks for an IT system, _______________ is the first
step.
To define the scope of the effort.
Vulnerability Assesment
threat identification
Question No: 26 ( Marks: 1 ) - Please
choose one
True
False
Question No: 27 ( Marks: 1 ) - Please
choose one
The two major criteria that are used to analyze risks are
Operational Effects and Situational Impacts
True
False
Question No: 28 ( Marks: 1 ) - Please
choose one
The Internet Protocol is designed solely for the connecting and
routing of data packets
across a internet.
True
False
Question No: 29 ( Marks: 1 ) - Please
choose one
An IDS with the neural network feature monitors the general
patterns of activity and
traffic on the network and creates a database.
True
False
Question No: 30 ( Marks: 1 ) - Please
choose one
BPR s major objective is to tightly
integrate the functional areas of the organization
and to enable seamless information flows
across the functional areas.
True
False
Question No: 31 ( Marks: 1 )
What is virus?
Question No: 32 ( Marks: 1 )
Define the basic objective of Risk management process.
Question No: 33 ( Marks: 2 )
Identify the following flow chart symbols:
a)
b)
Question No: 34 ( Marks: 2 )
Define Firewall.
Question No: 35 ( Marks: 3 )
What do you understand by Digital Certificate? Precisely discuss.
Question No: 36 ( Marks: 3 )
What are the purposes of system analyses?
Question No: 37 ( Marks: 3 )
What are hackers?
Question No: 38 ( Marks: 5 )
Discuss the types of threats in detail.
Question No: 39 ( Marks: 5 )
Discuss Risk Determination briefly.
Question No: 40 ( Marks: 10 )
Discuss different ways to control the viruses and worms in detail.
Question No: 41 ( Marks: 10 )
What is reusable software?
management is often based on the experience, insight and intuition of program
managers and key stakeholders in the program.
True
False
Active
Attack is one of the types of Web Security information systems.
True
p---172
False
IDS works in conjunction with routers and
firewalls by monitoring network usage anomalies to protect a company s
information systems resources from external as well as internal misuse
True
p---176
False
Business-to-business
EC (B2B) is one of the types of E-Commerce.
True
False
Temporal CSFs in an organization, results
from _________
Economic
changes
Technological changes
Internal
needs and changes p---133
Environmental
changes
Factors of which of the following are basic
elements of reducing manufacturing cost? Brand
Cost
Production
Quality
ERP
or enterprise systems control all major business processes with a single
software architecture in real time.
True
False
The bullwhip effect refers to erratic shifts
in orders up and down the supply chain because of poor demand forecasting,
price fluctuation, order batching, and rationing within the chain.
True
False
The objective of the entire risk management
process is that no one should hamper the working of the smooth working of IS.
True
p---167
False
If
an organization can tolerate some downtime, cold sites backup might be
appropriate.
True
170
False
Cryptography primarily consists of two basic
processes.
True
p---154
False
Logical intrusion skills needed to exploit
logical exposures are more technical and complex as compared to physical
exposures.
True
p---151
False
Firewall
is the primary method for keeping a computer secure from intruders.
True
p---153
False
Where problem is recurring and repetitive,
the common factors can be identified in order to identify a particular course
of action is called -------------Structured decisions Unstructured decisions
Structured decisions
Where
problem is recurring and repetitive, the ___________ factors can be identified
in order to identify a particular course of action.
different
multiple
commonvarious
The use of software routines to tie up the computer
hosting a Web site that denies legitimate visitor's access is called:
denial
of service.
hacking.
spoofing
sniffing
Wireless computing devices are not subject to
viruses.
True
False
A
security program is a series of ongoing regular periodic reviews conducted to
ensure that assets associated with the information systems function are
safeguarded adequately.
True
p—139
False
The
Internet's technological success does not depend on its principal communication
tools, the Transmission Control Protocol (TCP) and the Internet Protocol (IP).
True
False
Which
of the following helps an organization in gaining competitive advantage in the
use of processes, effectiveness and efficiency should also be kept in mind?
BPR p—129
CSF
SPR
Systems analysts work as a link between
Business people, & Computer Programmers. True 102
False
The First increment in incremental model is
usually the core product which addresses the basic requirements of the system.
True
p--94
False
Which of the following is a form of
automation where computers communicate work instructions directly to the
manufacturing machinery?
CAD
CAM
CIM p---62
Which
of the following phase of decision making process involves searching for
conditions in the environment that call for decisions?
Intelligence p----70
Design
Choice
Implementation
Computer
programmers apply information technology to build information systems which
solves these problems but need not fully understand the business usages they
are computerizing or supporting.
True
p---102
False
Rectangle
shape in the flow charts represents___________
Decision
p---106
Process
Terminator
__________
is a person who attempts to invade the privacy of the system.
Hacktivsts
Hackers
p---152
Crackers
Characteristics
of object are called ________
Methods
Attributes p--129
Status
Operations
are usually called via _______
Functions
Signatures p---131
Methods
Web
Site monitoring is the process used to view or record both the keystrokes
entered by
a
computer user and the computer's response during an interactive session.
True
False p---157
Likelihood
Determination phase sometimes determines that a potential vulnerability
could
not be exercised by a given threat-source.
True
False
Active
Attack is one of the types of Web Security information systems.
True p---172
False
Business-to-business
EC (B2B) is one of the types of E-Commerce.
True
False
Collaborative
commerce is one of the types of B2B.
True
False
ERP
Systems control all major business processes with single software architecture
in
real time.
True
False
Rectangle
shape in the flow charts represents___________
Fire
wall is the primary method for keeping a computer secure from intruders.
True
False
Why use in arrow of process in the flow chart?
(Marks 1)
What
is Object Oriented Analysis and Design (OOAD)? (Marks 1)
Critical
Success Factors differ from organization to organization. While approving any
project, the management may evaluate the project on the basis of certain
factors critical to the success or failure of the project. Five example in real
life (Marks 10)
What
do you understand by computing envroiment. Describe the • Stand Alone
Processing and Web Based Environment (Marks 5)
Roles
& Responsibility any three (Marks 3)
What is focal Point? Complete(Marks 10)
What
is Vulnerability? (Marks 1)
Two
output of Impact Analysis? (Marks 2)
What
is challenge in lunching ecommerce? (Marks 5)
What
is change management. Identify its types ? (Marks 5)
What
is difference between the Changing and Freezing? (Marks 3)
MIDTERM
EXAMINATION Fall 2008 CS507-
Information Systems (Session - 2)
Following statement is true for which of
the following model?
Provides early indication of
insurmountable risks, without much cost
► Incremental Model
► RAID
► Spiral
► Iterative
Devaluation of currency is called
________
► Interest rate
► Inflation ??
► Markup
__________ sources materials in which the
information from secondary sources has been digested.
► Primary
► Tertiary
► Secondary
Debtor’s aging report Debtor’s aging report is an example of the
following phase?
► Choice
► Design
► Intelligence
There are TWO phases of the decision
making process
► TRUE
► FALSE
Which of the following phase of decision
making process involves searching for conditions in the environment that calls
for decisions?
► Intelligence
► Design
► Choice
► Implementation
Structured
Problems possess multiple solutions, solution paths, fewer parameters which are
less manipulate able, and contain uncertainty about which concepts, rules, and
principles.
► True
► False
The
study of business problem domain used to recommend improvements and specify the
business
Requirements for the solution is called:
► System Analysis
► System Design
► Risk Management
► Risk Analysis
Data
mining can allow a firm to develop:
► DSS based on the Web and Specific
marketing campaigns for different customer segments
► Specific marketing campaigns for
different customer segments
►
DSS based on the Web.
DSS
can stimulate innovation in decision making by helping managers to existing
decision making procedures.
► True
► False
The
term information architecture describes a specialized ---------------- which
relates to the management of information and employment of informational tools.
► Skill Set
► Data Set
► Tool Set
Infrastructure,
generally, is the set of interconnected structural elements
that provide the framwork
for supporting the entire structure
► Infrastructure
► Decision Support System
► Management System
High
level of foreign trade has resulted in imports and exports which require inter
linkage for smooth coordination.
► True
► False
Which of the following sources are original materials on which other
research is based?
► Primary
► Secondary
► Tertiary
► None of these
On what factors need of information
depends in any organization?
Solution:-
Good
information is essential for effective operation and decision making at all
levels in businesses. Identifies and illustrates the different kinds of
information by the complex internal and external communication links of a
typical R&D department. Discusses the factors which condition managers' use
of information, namely managers' roles and tasks; decision-making processes (strategic
and operational); rational and alternative behaviour; cognitive style and
perception; and “hidden agenda” factors such as the symbolic use of information
and information as power. Supported by selected readings, and tables of
information types, processes and uses.
Define TQM?
Solution: TQM is a set of
management and control activities which focus on quality assurance.
Enlist the types of models used in DSS.
Solution:- Physical Models Narrative Models Graphic
Models Mathematical Models
What
is the need for Accounting
information system (AIS) to be linked to all the information systems in an
organization. ?
Solution:- Accounting information system is linked to all the information systems
in an organization. This is important because the data required for proper book
keeping and generation of transactional reports is extracted from all over the
organization. For instance sales information can be sought only from marketing
information system and stock information is available in manufacturing
information system.
The purpose of AIS is to accumulate data and provide
decision makers (investors, creditors, and managers) with information to make
decision.
Discuss
the attributes on which Organizational Information Requirements depends
Solution: There are
several surveys indicate that a significant percentage of data warehouses fail
to meet business objectives or are outright failures. One of the reasons for
this is that requirement analysis is typically overlooked in real projects.
Goal-oriented approach to requirement analysis for data warehouses based on the
Tropos methodology. Two different perspectives are integrated for requirement
analysis: organizational modeling, centered on stakeholders, and decisional
modeling, focused on decision makers. Our approach can be employed within both
a demand-driven and a mixed supply/demand-driven design framework.
Also
Functional security requirements of information systems can roughly be
classified into two: computer security requirements and communications security
requirements. Challenges for developing notations for expressing these
requirements are numerous, most importantly the difficulty of dealing with
layers of abstraction, flexibility to adapt into many types of requirements,
groupings of requirements, and requirement dependencies. Many frameworks for
dealing with information security highlight the importance of a properly
defined organization of security but fail to establish models to support the
specification. This paper establishes one such model and demonstrates how the
above difficulties can be overcome through extensive application of
organizational modeling of information security.
What are the management styles? Discuss
in details.
Solution:- Various management styles can be employed dependent
on the culture of the business, the nature of the task, the nature of the
workforce and the personality and skills of the leaders..
There
are three Management Styles.
Authoritative
Participative Mixed
1)Authoritative An Autocratic or authoritarian manager makes all the decisions,
keeping the information and decision making among the senior management.
Objectives and tasks are set and the workforce is expected to do exactly as
required. The communication involved with this method is mainly downward, from
the leader to the subordinate; critics such as Elton Mayo have argued that this
method can lead to a decrease in motivation from the employee's point of view.
The main advantage of this style is that the direction of the business will
remain constant, and the decisions will all be similar, this in turn can
project an image of a confident, well managed business. On the other hand,
subordinates may become highly dependent upon the leaders and supervision may
be needed. Amanda Glass is the founder of this unique management style.
2)
Participative In a Democratic style, the manager allows the
employees to take part in decision making, therefore everything is agreed by
the majority. The communication is extensive in both directions. This style can
be particularly useful when complex decisions need to be made that require a
range of specialist skills: for example, when a new computerized system needs
to be put in place and the upper management of the business is computer
illiterate. From the overall business's point of view, job satisfaction and
quality of work will improve. However, the decision-making process is severely
slowed down, and the need of a consensus may avoid taking the best decision for
the business.
3)
Mixed This approach is a
combination of both above styles. Input is taken and respected, final decision
is taken by the senior management keeping in view the views given by the
employee.
MIDTERM EXAMINATION Spring 2009 CS507- Information Systems
Sources of information are generally categorized as
-------------------------
► Primary
► Tertiary
► All of above
► Secondary
Sources of information are generally categorized inn
different types depending on their originality and their proximity to the
source or origin.
►
True
►
False
Manufacturing process
involves more than one sub-process.
►True
► False
The organization refers to a
organizational structure with few
or no levels of intervening management between staff and managers is
called------------------------
► Hierarchical organization
► Flat Organization
► Pyramid Organization
Every system comprises of
basic components which in a co-ordination formulate a system.
► True
► False
---------- simply means a
particular technique of directing one's attention in learning, discovery or
problem solving.
► Robustness
► Heuristic
► DSS
► EIS
------- seek to put
intelligence into the hardware in the form of generalized capability to learn.
► Neural network System
► Fuzzy logic
► DSS
► ESS
Prototyping is the process of quickly putting
together a working model in order to test various aspects of the design to
gather early user feedback.
► True
► False
Accounting
information system (AIS) is that linked to all the information systems
in an organization.
► True
► False
Technical
Reports are examples of _________ resource.
► Tertiary
► Primary
► Secondary
Organizations
are distinguished on the basis of
__________
► Attributes
► Policy
► Management
________
are run under direct supervision of family members.
► Small
Organization
► Medium organization
► Large
Organization
In
_____ there are low number of subordinates per person.
► Pyramid
Structure
► Flat
Structure
► Modern
Structure
Which
of the following structure
contains less number of management
levels?
► Flat Structure
► Tall
Structure
► Classical
structure
Define TQM?
What
are the conglomerate organizations?
What
aspects should be covered by design of information flow?
How
the chief executive is elected in any organization and what are his
responsibilities?
Identify
the basic purpose of DFD and Identify the steps of Designing a DFD for any
process?
Discuss the purpose of Feasibility Study? Discuss
key areas?
FINALTERM EXAMINATION
Fall 2008
CS507- Information Systems (Session - 1)
Question No: 1 ( Marks: 1 ) - Please
choose one
Medium Sized organizations are normally
a family ownership run by
Father & Sons
Brothers
Father, Sons and Brothers
None of the given
Question No: 2 ( Marks: 1 ) - Please
choose one
The organization refers to a organizational structure with few or no levels of
intervening management between staff and managers is called------------------------
Hierarchical organization
Flat Organization
Pyramid Organization
Question No: 3 ( Marks: 1 ) - Please
choose one
ERP s major objective is to tightly
integrate the functional areas of the organization
and to enable seamless information flows
across the functional areas.
True
False
Question No: 4 ( Marks: 1 ) - Please
choose one
Which of the following integrate the
planning, management and use of all resources
of the organization?
ERP
CRM
ESS
OIS
Question No: 5 ( Marks: 1 ) - Please
choose one
What are the steps and their order in EC order fulfillment?
Ensuring payment, checking availability, arranging shipment,
insurance,
production, purchasing & warehousing, contacts with customers
and returns
Ensuring payment, checking availability, arranging shipment,
insurance,
production, purchasing & warehousing, and contacts with
customers
Ensuring payment, checking availability, arranging shipment,
insurance,
production, plant services, purchasing & warehousing, and
contacts with customers
Ensuring payment, checking availability, arranging shipment,
insurance,
production, plant services, purchasing & warehousing, contacts
with customers and
returns
Question No: 6 ( Marks: 1 ) - Please choose
one
Data warehouses are generally batch
updated at the end of the day, week or some
period.
False
True
Question No: 7 ( Marks: 1 ) - Please
choose one
The Internet Protocol is designed solely for the addressing and
routing of data packets
across a network
True
False
Question No: 8 ( Marks: 1 ) - Please
choose one
Which one of the following are partially configured, usually with
network connections
and selected peripheral equipment, such as disk drives, tape
drives and controllers, but
without the main computer.
Cold Site
Warm Site
Hot Site
Third Party Arrangements
Question No: 9 ( Marks: 1 ) - Please
choose one
Likelihood Determination phase determines that a potential
vulnerability could be exercised by a given threat-source.
True
False
Question No: 10 ( Marks: 1 ) - Please
choose one
Threat capacity is an input source for Likelihood determination.
False
True
Question No: 11 ( Marks: 1 ) - Please
choose one
Which of the following is the primary
method for keeping a computer secure from intruders?
Anti virus
Scanners
Firewall
Password
Question No: 12 ( Marks: 1 ) - Please
choose one
Decisions in which the decision maker
must provide judgment, evaluation, and
insights into the problem definition
would be characterized as:
Structured
Semi Structured
Unstructured
Question No: 13 ( Marks: 1 ) - Please
choose one
Wireless computing devices are not subject to viruses.
False
True
Question No: 14 ( Marks: 1 ) - Please
choose one
Which of the following is a private
enterprise owned communication network that uses internet protocols, network
connectivity, and public telecommunication system to share organization's
information or operations with its employees, and to enable the employees to
communicate with each other?
Internet
Intranet
Wireless communication
None of above
Question No: 15 ( Marks: 1 ) - Please
choose one
Availability of which of the following
to various users also depends on how the information is processed? (Computing environment)
Information
Data
Log file
None of above
Question No: 16 ( Marks: 1 ) - Please
choose one
Which of the following helps an
organization in gaining competitive advantage in the use of processes,
effectiveness and efficiency should also be kept in mind?
BPR
CSF
SPR
Question No: 17 ( Marks: 1 ) - Please
choose one
CRM software requires highly integrated
environment for high Productivity, which is rarely available.
True
False
Question No: 18 ( Marks: 1 ) - Please
choose one
Existence of functional departments in
each organization may vary with the nature of industry and the nature of
products/services being offered.
True
False
Question No: 19 ( Marks: 1 ) - Please
choose one
Public companies are example of ____________
Small Organization
Large Organization
Medium organization
Question No: 20 ( Marks: 1 ) - Please
choose one
_____ serves the concurrent monitoring as the system is being
used.
Scanners
Active monitors
Behavior blockers
Question No: 21 ( Marks: 1 ) - Please
choose one
While developing software object oriented analysis focuses on
_________
Modular approach
Incremental approach
Traditional approach
Derived approach
Question No: 22 ( Marks: 1 ) - Please
choose one
Testing is easy for the software that is developed using OOAD due
to use of
___________
Modular approach
Real time modeling
Usability feature
Question No: 23 ( Marks: 1 ) - Please
choose one
Providing access to the data and behavior is through an object s
interface is called
__________
Message passing
Polymorphism
Encapsulation
Question No: 24 ( Marks: 1 ) - Please
choose one
There are typically two kinds of audit
records.
True
False
Question No: 25 ( Marks: 1 ) - Please
choose one
In assessing risks for an IT system, _______________ is the first
step.
To define the scope of the effort.
Vulnerability Assesment
threat identification
Question No: 26 ( Marks: 1 ) - Please
choose one
True
False
Question No: 27 ( Marks: 1 ) - Please
choose one
The two major criteria that are used to analyze risks are
Operational Effects and Situational Impacts
True
False
Question No: 28 ( Marks: 1 ) - Please
choose one
The Internet Protocol is designed solely for the connecting and
routing of data packets
across a internet.
True
False
Question No: 29 ( Marks: 1 ) - Please
choose one
An IDS with the neural network feature monitors the general
patterns of activity and
traffic on the network and creates a database.
True
False
Question No: 30 ( Marks: 1 ) - Please
choose one
BPR s major objective is to tightly
integrate the functional areas of the organization
and to enable seamless information flows
across the functional areas.
True
False
Question No: 31 ( Marks: 1 )
What is virus?
Question No: 32 ( Marks: 1 )
Define the basic objective of Risk management process.
Question No: 33 ( Marks: 2 )
Identify the following flow chart symbols:
a)
b)
Question No: 34 ( Marks: 2 )
Define Firewall.
Question No: 35 ( Marks: 3 )
What do you understand by Digital Certificate? Precisely discuss.
Question No: 36 ( Marks: 3 )
What are the purposes of system analyses?
Question No: 37 ( Marks: 3 )
What are hackers?
Question No: 38 ( Marks: 5 )
Discuss the types of threats in detail.
Question No: 39 ( Marks: 5 )
Discuss Risk Determination briefly.
Question No: 40 ( Marks: 10 )
Discuss different ways to control the viruses and worms in detail.
Question No: 41 ( Marks: 10 )
What is reusable software?
Re: All Quiz CS 507
CS507 PAPER
2010 24 JUNE 2010
Which of the following may improve communication between and
among developers and customers?
First
increment
Prototype ???
By-product
Final
increment
Which of the following is used to test the function of the
new design before starting production of a product?
Trial
version
Mathematical
Model
Beta
version
Prototype ???
Which of the following problems posses multiple solutions
with fewer parameters being less manipulate able.
Unstructured ???
Partially
structured
Semi
structured
Structured
Which of the following view gives a snapshot of the entire
system?
Hierarchical ?????
Diagrammatic
Procedural
Technical
Apart from the value to cost ratio, modules are also
selected on the basis of ___________requirements and needs.
programmer
designer
Customer Page No. 95
system analyst
Which of the following is a project management technique
which divides complex projects into smaller and more easily managed segments?
SDLC Page No. 78
System programming
Software testing
Software configuration
In which of the following model, the system development is
broken into many mini development projects.
Spiral
Incremental Page No. 95
Iterative
Waterfall
In drawing a proper flowchart, all necessary steps that are
a part of process should be listed out in ________________ order.
Logical ???
Physical
Random
Top to Bottom
Which of the following is a problem solving technique that
re-assembles a system’s components back into a complete system?
Select correct
option:
System analysis
System
design ???
System check
System configuration
The study of business problem domain is used to recommend
improvements and specify the business requirements for the solution.
Select correct
option:
True ???
False
Which of the following may be of low fidelity and dismissed
as toys?
Select correct
option:
Interfaces
Inference engines
Early
prototypes ??
Development engines
Which of the following refers to the structuring of hardware
and software to achieve the effective and efficient processing of information?
Select correct
option:
SDLC
System monitoring
Operational planning
System
development ???
Which of the following allows manufacturers to rapidly and
inexpensively test the parts of the design which are most likely to have
problems?
Select correct
option:
Physical Model
Prototype ???
Trial version
Carbon copy
Which of the following are knowledge workers who facilitate
the development of information systems and computer applications by bridging
the communications gap that exists between non-technical system users, and
System designers and developers?
Select correct
option:
System
Analysts ???
Software Engineers
System Designers
Chief Executives
Which of the following provides a structured means of
addressing the impact of technologies on an organization?
Select correct
option:
Business planning
IT
planning ??
Requirements planning
Configuration planning
Employees might be unwilling to accept the high level of
responsibility if organization is dominated by _____________and the culture is
____________.
Select correct
option:
Workers, autocratic
top management, autocratic ???
top management, democratic
Middle level management,
democratic
In which of the following environments, duplication of
clerical work is generally observed.
Select correct
option:
Computerized ??
Automated
Manual
Semi-computerized
Which of the following model can lead to scope creep due to
user feedback after each phase?
Iterative ??
XP
Rapid prototyping
Waterfall
The study of business problem domain is used to recommend
improvements and specify the business requirements for the solution.
True ??
False
Which of the following are knowledge workers who facilitate
the development of information systems and computer applications by bridging
the communications gap that exists between non-technical system users, and
System designers and developers?
System
Analysts
Software Engineers
System Designers
Chief Executives
Which of the following ensures the correctness of data in
the database?
Data
integrity ???
Data accessibility
Data consistency
Data analysis
System analysis creates the understanding and lays out the
necessary relationships that will assist in defining a solution to the problem
or the design of the proposed software that will meet the user needs.
True ??
False
A problem solving technique that decomposes a system into
its component pieces for the purpose of studying, how well those component
parts work and interact to accomplish their purpose can be one of the
definitions of System development.
True
False ??
The purpose of ___________ is to obtain a commitment to
change and evaluate whether cost effective solutions are available to address
the problem that has been identified.
planning
usage scenarios
feasibility study ??
testing
Which of the following refers to the ways data is stored in
partitions and sequences?
Structure
Design
Collaboration diagram
Sequence diagram
Which of the following is a problem solving technique that
re-assembles a system’s components back into a complete system?
System analysis
System
design
System check
System configuration
Which of the following model is preferred for its simplicity
and more disciplined approach?
Incremental
Waterfall
??
Spiral
Iterative
Which of the following model places emphasis on
documentation?
Waterfall PAGE 83
Spiral
Incremental
Rapid
prototyping
Which of the following is the process of quickly putting
together a working model in order to test various aspects of the design for
gathering early user feedback?
Interviews
Iteration
Prototyping PAGE 89
Questionnaires
Which of the following lifecycle model is very appropriate
for large and complex information systems?
Spiral PAGE 88
Prototyping
Incremental
Waterfall
Which of the following lifecycle model is a combination of classic
waterfall model and aspects of risk analysis?
Prototyping
Waterfall
Spiral PAGE 88
Incremental
Which of the following process begins with stratifying
system users and then identifying their needs?
Structuring
QA
Exploration
Design
PAGE 81
In which of the following models, the development approach
is based on producing deliverables frequently/ repetitively.
Incremental
Waterfall
Iterative
PAGE 86
XP
Trying to fit people and organizations into information
systems has been major reason for ____________.
success
efficiency
increased
productivity
failure
PAGE 76
Employees might be unwilling to accept the high level of
responsibility if organization is dominated by _____________and the culture is
____________.
Workers, autocratic
top
management, autocratic PAGE 77
top management,
democratic
Middle level
management, democratic
Which of the following view gives a quick understanding of
the business processes and flows?
Procedural
Abstract
Internal
Diagrammatic PAGE 96
Which of the following provides a structured means of
addressing the impact of technologies on an organization?
Business planning
IT
planning PAGE 67
Requirements
planning
Configuration
planning
In which of the following models the phases are in a
cascading manner linking the output of one to the input of next phase.
Rapid prototyping
Spiral
Waterfall PAGE 83
Extreme programming
If a flow chart become complex it is better to use connector
symbols to reduce to number of flow lines.
True PAGE 98
False
Which of the following addresses the availability of
sufficient technology to support the proposed project?
Select correct option:
Operational
feasibility
Economic feasibility
Tactical feasibility
Technical feasibility PAGE 73
Which of the following process is concluded by recommending
a monitoring and control mechanism?
Designing
Analyzing
Planning
PAGE 67
Implementation
Which of the following model can lead to scope creep due to
user feedback after each phase?
Iterative PAGE 71
XP
Rapid prototyping
Waterfall
In ____________ model, software is constructed step by step
in the same way a building is constructed.
Spiral
Incremental PAGE 69
Extreme programming
Waterfall
Which of the following is the core product which usually
addresses the basic requirements of the system?
First increment
PAGE 85
Second increment
Last increment
Final increment
Which of the following enunciate business goals and the
actions that need to be initiated to achieve those goals including related
benefits, resources and timeframes?
Organizing
Monitoring
Plans PAGE 67
Implementation
Which of the following defines the operations of the system
in layman’s terms?
User manual
PAGE 82
Technical manual
Procedural manual
Testing manual
Which of the following view gives a quick understanding of
the business processes and flows?
Procedural
Abstract
Internal
Diagrammatic PAGE 96
2010 24 JUNE 2010
Which of the following may improve communication between and
among developers and customers?
First
increment
Prototype ???
By-product
Final
increment
Which of the following is used to test the function of the
new design before starting production of a product?
Trial
version
Mathematical
Model
Beta
version
Prototype ???
Which of the following problems posses multiple solutions
with fewer parameters being less manipulate able.
Unstructured ???
Partially
structured
Semi
structured
Structured
Which of the following view gives a snapshot of the entire
system?
Hierarchical ?????
Diagrammatic
Procedural
Technical
Apart from the value to cost ratio, modules are also
selected on the basis of ___________requirements and needs.
programmer
designer
Customer Page No. 95
system analyst
Which of the following is a project management technique
which divides complex projects into smaller and more easily managed segments?
SDLC Page No. 78
System programming
Software testing
Software configuration
In which of the following model, the system development is
broken into many mini development projects.
Spiral
Incremental Page No. 95
Iterative
Waterfall
In drawing a proper flowchart, all necessary steps that are
a part of process should be listed out in ________________ order.
Logical ???
Physical
Random
Top to Bottom
Which of the following is a problem solving technique that
re-assembles a system’s components back into a complete system?
Select correct
option:
System analysis
System
design ???
System check
System configuration
The study of business problem domain is used to recommend
improvements and specify the business requirements for the solution.
Select correct
option:
True ???
False
Which of the following may be of low fidelity and dismissed
as toys?
Select correct
option:
Interfaces
Inference engines
Early
prototypes ??
Development engines
Which of the following refers to the structuring of hardware
and software to achieve the effective and efficient processing of information?
Select correct
option:
SDLC
System monitoring
Operational planning
System
development ???
Which of the following allows manufacturers to rapidly and
inexpensively test the parts of the design which are most likely to have
problems?
Select correct
option:
Physical Model
Prototype ???
Trial version
Carbon copy
Which of the following are knowledge workers who facilitate
the development of information systems and computer applications by bridging
the communications gap that exists between non-technical system users, and
System designers and developers?
Select correct
option:
System
Analysts ???
Software Engineers
System Designers
Chief Executives
Which of the following provides a structured means of
addressing the impact of technologies on an organization?
Select correct
option:
Business planning
IT
planning ??
Requirements planning
Configuration planning
Employees might be unwilling to accept the high level of
responsibility if organization is dominated by _____________and the culture is
____________.
Select correct
option:
Workers, autocratic
top management, autocratic ???
top management, democratic
Middle level management,
democratic
In which of the following environments, duplication of
clerical work is generally observed.
Select correct
option:
Computerized ??
Automated
Manual
Semi-computerized
Which of the following model can lead to scope creep due to
user feedback after each phase?
Iterative ??
XP
Rapid prototyping
Waterfall
The study of business problem domain is used to recommend
improvements and specify the business requirements for the solution.
True ??
False
Which of the following are knowledge workers who facilitate
the development of information systems and computer applications by bridging
the communications gap that exists between non-technical system users, and
System designers and developers?
System
Analysts
Software Engineers
System Designers
Chief Executives
Which of the following ensures the correctness of data in
the database?
Data
integrity ???
Data accessibility
Data consistency
Data analysis
System analysis creates the understanding and lays out the
necessary relationships that will assist in defining a solution to the problem
or the design of the proposed software that will meet the user needs.
True ??
False
A problem solving technique that decomposes a system into
its component pieces for the purpose of studying, how well those component
parts work and interact to accomplish their purpose can be one of the
definitions of System development.
True
False ??
The purpose of ___________ is to obtain a commitment to
change and evaluate whether cost effective solutions are available to address
the problem that has been identified.
planning
usage scenarios
feasibility study ??
testing
Which of the following refers to the ways data is stored in
partitions and sequences?
Structure
Design
Collaboration diagram
Sequence diagram
Which of the following is a problem solving technique that
re-assembles a system’s components back into a complete system?
System analysis
System
design
System check
System configuration
Which of the following model is preferred for its simplicity
and more disciplined approach?
Incremental
Waterfall
??
Spiral
Iterative
Which of the following model places emphasis on
documentation?
Waterfall PAGE 83
Spiral
Incremental
Rapid
prototyping
Which of the following is the process of quickly putting
together a working model in order to test various aspects of the design for
gathering early user feedback?
Interviews
Iteration
Prototyping PAGE 89
Questionnaires
Which of the following lifecycle model is very appropriate
for large and complex information systems?
Spiral PAGE 88
Prototyping
Incremental
Waterfall
Which of the following lifecycle model is a combination of classic
waterfall model and aspects of risk analysis?
Prototyping
Waterfall
Spiral PAGE 88
Incremental
Which of the following process begins with stratifying
system users and then identifying their needs?
Structuring
QA
Exploration
Design
PAGE 81
In which of the following models, the development approach
is based on producing deliverables frequently/ repetitively.
Incremental
Waterfall
Iterative
PAGE 86
XP
Trying to fit people and organizations into information
systems has been major reason for ____________.
success
efficiency
increased
productivity
failure
PAGE 76
Employees might be unwilling to accept the high level of
responsibility if organization is dominated by _____________and the culture is
____________.
Workers, autocratic
top
management, autocratic PAGE 77
top management,
democratic
Middle level
management, democratic
Which of the following view gives a quick understanding of
the business processes and flows?
Procedural
Abstract
Internal
Diagrammatic PAGE 96
Which of the following provides a structured means of
addressing the impact of technologies on an organization?
Business planning
IT
planning PAGE 67
Requirements
planning
Configuration
planning
In which of the following models the phases are in a
cascading manner linking the output of one to the input of next phase.
Rapid prototyping
Spiral
Waterfall PAGE 83
Extreme programming
If a flow chart become complex it is better to use connector
symbols to reduce to number of flow lines.
True PAGE 98
False
Which of the following addresses the availability of
sufficient technology to support the proposed project?
Select correct option:
Operational
feasibility
Economic feasibility
Tactical feasibility
Technical feasibility PAGE 73
Which of the following process is concluded by recommending
a monitoring and control mechanism?
Designing
Analyzing
Planning
PAGE 67
Implementation
Which of the following model can lead to scope creep due to
user feedback after each phase?
Iterative PAGE 71
XP
Rapid prototyping
Waterfall
In ____________ model, software is constructed step by step
in the same way a building is constructed.
Spiral
Incremental PAGE 69
Extreme programming
Waterfall
Which of the following is the core product which usually
addresses the basic requirements of the system?
First increment
PAGE 85
Second increment
Last increment
Final increment
Which of the following enunciate business goals and the
actions that need to be initiated to achieve those goals including related
benefits, resources and timeframes?
Organizing
Monitoring
Plans PAGE 67
Implementation
Which of the following defines the operations of the system
in layman’s terms?
User manual
PAGE 82
Technical manual
Procedural manual
Testing manual
Which of the following view gives a quick understanding of
the business processes and flows?
Procedural
Abstract
Internal
Diagrammatic PAGE 96
Re: All Quiz CS 507
v good ...nd nice sharing
neena- Welcome
- Number of posts : 1
Age : 35
Location : islambad
Job/hobbies : cooking
Mode (i.e. cool, angry etc) : cool
Warining :
Rate by Admin :
Reputation : 0
Registration date : 2010-10-20
Similar topics
» Old MKT 501 QUIZ~~~Discription of Quiz
» IT430- E-Commerce All Quiz
» MGT 602 Enterpnure All Quiz
» MGMT 510 TQM All Quiz
» All Quiz MGT613
» IT430- E-Commerce All Quiz
» MGT 602 Enterpnure All Quiz
» MGMT 510 TQM All Quiz
» All Quiz MGT613
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum
|
|