Business Cost Business Operations Business Size: CS507-Information Systems
Business Cost Business Operations Business Size: CS507-Information Systems
Business Cost Business Operations Business Size: CS507-Information Systems
EXAMINATION
Spring 2010
Time: 90 min
Marks: 60
► Business Cost
► Business Operations
► Business Size
Ref: As the volume of business expands, the need for disciplined approach to
managing operations is required. This results in formulation of organizational
structures. The organizational structures are formulated in order to efficiently
manage the business operations.
Leading ERP software vendors include SAP (SAP R/3), Oracle and
PeopleSoft.
► True
► False
Reference: http://books.google.com.pk/books?
id=sjY3IZ9Unv0C&pg=PA87&lpg=PA87&dq=Leading+ERP+software+vend
ors+include+SAP+(SAP+R/3),
+Oracle+and+PeopleSoft&source=bl&ots=HVnWCQHWCp&sig=161Hzqiuq0
vVKxOYIHRWhBkUOc4&hl=en&ei=y-
w2TI6aN42ksQPdkPyoBQ&sa=X&oi=book_result&ct=result&resnum=6&ved
=0CCcQ6AEwBQ#v=onepage&q=Leading%20ERP%20software%20vendors
%20include%20SAP%20(SAP%20R%2F3)%2C%20Oracle%20and
%20PeopleSoft&f=false
► True
► False
► Robustness
► Heuristic
► DSS
► EIS
► Encryption
► Firewall
► All of above
Page 168
► True
► False
BCP is the process where by the institutions ensure the maintenance and
recovery of operations including services to customers when confronted with
adverse events such as natural disasters, technology failure, human error and
terrorism.”
► True
► False
application softwares, technical manuals, user manuals and any other system-
related
documentation. This would help to see that data is not modified on the
instructions of the users.
► True
► False
Ref: Access controls monitor the initial handshaking procedure of the user with
the operating system.
► True
► False
Page 148
► True
► False
Firewall
Firewall is the primary method for keeping a computer secure from intruders. A
firewall allows or blocks traffic into and out of a private network or the user's
computer.
► Algorithm
► DFD
PAGE 120
► SDLC
Ref:
Pg#68
► Organization
► System
► Firm
► First
► Second
► Third
Ref: The first increment is usually the core product which addresses the basic
requirements of the system. This maybe either be used by the client or
subjected to detailed review to develop a plan for the next increment.
► Dropper
► Overwriting Viruses
Overwriting Viruses
► Hacktivsts
► Hackers
► Crackers
A hacker is a person who attempts to invade the privacy of the system. In fact
he attempts to gain un authorized entry to a computer system by circumventing
the system’s access controls. Hackers are normally skilled programmers, and
have been known to crack system passwords, with quite an ease.
► Hacktivsts
► Crackers
► Hackers
Hacktivsts
page 144
Ref: Software objects are modeled after real-world objects in that they too have
state and behavior.
► Methods
► Attributes
► Status
► Sub classes
► Sub Interfaces
► Sub objects
► False
► True
► False
Ref: Electronic commerce has gradually shifted to a modern form in the name
of Mobile commerce. M-Commerce (mobile commerce) refers to the conduct
of e-commerce via wireless devices. These devices can be connected to the
Internet, making it possible for users to conduct transactions from anywhere.
► E-Commerce
► E-Business
► Web Surfing
► BPR
page 172
E-Commerce
is a broad definition of EC, not just buying and selling, but also servicing
customers,
Which of the following helps in getting the right material and physical
resources together at the right place and at the right time to meet the
customer’s requirements?
► BRP
► MRP
► CRP
Reference:
MRP helps in getting the right material and physical resources together at the
right place and at
► Value Sets
► Cardinality
► Relationships
Page 124
Relationships
► True
► False
► Class
► Instance
► Structure
Page 119+120
An object is an instance of some class. All objects are instances of some class.
Instance also carries
► Modular approach
► Incremental approach
► Traditional approach
► Derived approach
► TRUE
► FALSE
o Once again MIS will be used to record and report the results / effects of
the policy.
Answer:
• Mode of delivery
• Customer Satisfaction
• Time Scheduling
• Resource Management
• Sensors that are responsible for collecting data. The data can be in the form of
network packets, log files, system call traces, etc.
• Analyzers that receive input from sensors and determines intrusive activity.
• An administration
Identify any six factors that should be considered in order for change to be
successful?
Answer:
• How will success be measured and what value will success
Answer:
Privacy means the quality or condition of being secluded from the presence or
view of others, the state of being free from unsanctioned intrusion: a person's
right to privacy, the state of being concealed; secrecy. Privacy is quite a
subjective/relative concept.
Protecting Privacy
The rights of privacy must be balanced against the needs of the society. Every
society has to decide somewhere on the gray area between hiding all and
knowing all extremes. Public’s rights to know is superior to the individual’s
rights of privacy. Usually public and individual’s rights stand in conflict with
each other. Since government agencies have their concerns in priority e.g.
criminal investigation, undesirable social activities. Various aspects can be seen
as a threat to privacy.
Threats to Privacy
• Electronic surveillance
• Data Profiling
• Online Privacy
• Workplace monitoring
• Location tracking
• Background checks
• Financial privacy
• Digital right
• Taxation Issues
Give any two examples to prove that Audit trails help to provide variants from
normal behavior which may lead to unauthorized usage of resources.
Answer: Audit trails help to provide variants from normal behavior which may
lead to unauthorized usage of resources. For example
• Audit trails can be used together with access controls to identify and provide
information about users suspected of improper modification of data (e.g.,
introducing
• An audit trail may record "before" and "after" images, also called snapshots of
records.