CS507 Subjective Questions
CS507 Subjective Questions
• DSS data base – is a collection of current and historical data from internal external sources. It can be a
massive data warehouse.
• Decision Support Software system – is the set of software tools used for data analysis.
a) Ethics Ethics are moral choice made by individual in relation to the rest of the community, rules of
governing members and standards of acceptable behaviour.
b) Code of ethics
Code of ethics is collection of rules as guide for the members of the organization.
Self contained is a micro computer that is not connected to a network. Processing on this computer is
called stand alone processing.
Intrusion Detection is a process that identifies the attempts to penetrate the system and gain
unauthorized access.
Question No: 5 ( Marks: 3 ) How can we make our password secure?
3: Always use the password with combination of letters, numbers, upper and lower cases
Question No: 6( Marks: 3 ) What are some of the things you should keep in mind when identifying
risks?
The network attackers are getting smarter every day. Organizations and people want their data to be
protected. Businesses must operate within a similar risk management culture. A comprehensive risk
based approach starting from identifying risks may be a better solution.
• Data mining
Re engineering is the fundamental rethinking and redesigning of business process to achieve dramatic
improvement in critical, contemporary measures of performance, such as cost, quality, service and
speed.
Question No: 9 ( Marks: 5 ) List any five reasons that attract organizations to ERP?
Answer:
2. Integrated customer related information – order tracking with customer database, inventory and
shipment at different locations.
3. Standardized HR information – A company with multiple business units will require a comprehensive
and all-encompassing method of locating employees and communicating with them.
Question No: 10 vuzs ( Marks: 3 ) How virus and worms can be transmitted into computers? Identify
any three sources?
Answer:
Virus or worms are transmitted easily from the internet by downloading files to computers web
browsers. Other methods of infection occur from files received though online services, computer bulletin
board systems, local area networks. Viruses can be placed in various programs, for instance
Question No: 11( Marks: 3 )How the information is kept in the purchase system?
A simple example can be given of a purchase and sales system. In a typical purchase system information
related to purchase of materials is kept, for instance,
Answer: The information can also be ranked in accordance with the qualities it has in it. The experts
have devised certain criteria to evaluate the quality of information. Those some points which are used to
evaluate the quality are known as quality checks.
Answer: This software serves the concurrent monitoring as the system is being used. They act as a guard
against viruses while the operating system is performing various functions e.g connected to internet,
transferring data, etc.
Answer: In incremental models, software is built not written. Software is constructed step by step in the
same way a building is constructed. The product is designed, implemented, integrated and tested as a
series of incremental builds, where a build consists of code pieces from various modules interacting
together to provide a specific functional capability and testable as a whole.
Question No: 15 ( Marks: 3 ) Information system security association of USA has listed many ethical
challenges, identify any three of them?
Answer:
2. Abuse of privileges
3. Inappropriate monitoring
Question No: 16 ( Marks: 5 ) What do you think what are the key benefits of Ecommerce to
organizations?
Answer: Advantages of E-Commerce to the Online Business
• Business people can spend less money and earn high profits with e-commerce
• Easily we can track the segment of customers who are happy with purchasing goods through online
• Inexpensive way to turn your Web site into a revenue center
• Reduce Customer Support costs via e-mail marketing & customary newsletters
• We can easily promote our business website by using various promotional activities such as Search
Engine Optimization, Pay Per Click Management, Email Marketing, Social Media Optimization, Online
Banner Advertisement, Online Branding and Affiliate Management.
Question No: 17 ( Marks: 5 ) What do you understand by Disaster Recovery Planning?
A disaster recovery plan is a comprehensive statement of consistent actions to be taken before, during
and after a disaster. The plan should be documented and tested to ensure the continuity of operations
and availability of critical resources in the event of a disaster.
This typically details the process IT personnel will use to restore the computer systems. Disaster recovery
plans may be included in the business continuity plan or as a separate document all together. Business
continuity plan may not be comprehensively available in a non-critical environment but Disaster
Recovery Plan should be there at least to manage and help organization to recover from disasters. A
subcomponent of business continuity plan is the IT disaster recovery plan. IS processing is one operation
of many that
keep the organization not only alive but also successful, which makes it of strategic importance.
Question No: 18 ( Marks: 2 ) List information Requirements for Medium sizes organizations.
Answer:
Sound security is fundamental to achieving this assurance. Furthermore, there is a need for organizations
to protect themselves against the risks inherent with the use of information systems while
simultaneously recognizing the benefits that can accrue from having secure information systems. Thus,
as dependence on information systems increases, security is universally recognized as a pervasive,
critically needed, quality.
These controls establish the interface between the would-be user of the computer system and the
computer itself. These controls monitor the initial handshaking procedure of the user with the operating
system. For example when a customer enter the card and the pin code in an automatic
teller machine (ATM), the access controls are exercised by the system to block unwanted or illegitimate
access.
Risk mitigation is a process that takes place after the process of risk assessment has been completed.
Discuss briefly various risk mitigation options?
Answer:
• Risk assumption: To accept the potential risk and continue operating the IT system or to implement
controls to lower the risk to an acceptable level.
• Risk Avoidance: To avoid the risk by eliminating the risk cause and e.g. forgo certain functions of the
system or shut down the system when risks are identified.
• Risk Limitation: To limit the risk by implementing controls that minimize the adverse impact of a
threat’s exercising a vulnerability e.g. use of supporting preventive and detective controls.
• Risk Planning: To manage risk by developing a risk mitigation plant that predicts implements and
maintains controls.
• Research and acknowledgement: To lower the risk of loss by acknowledging vulnerability or flaw and
researching controls to correct the vulnerability.
• Risk Transference: To transfer the risk by using other options to compensate loss such as purchasing
insurance.
Customer has become of critical importance in the modern day business. Early on, organizations used to
focus more on how much has been sold what has been produced. But now the focus is quite different.
Focus has been placed on the requirements of the customer, providing quality service and quickness of
response to customer queries. Analysis of the customer data from their personal habits to spending
one’s have become a crucial element of doing a successful business. ERP has this unique potential to
improve the quality of customer handling.
Question No: 21 ( Marks: 5 ) Differentiate Impact analysis from Risk determination?
This phase relates to analyzing how much the information assets are exposed to various threats
identified and thus quantifying the loss caused to the asset through this threat.
This phase relates to analysis of both physical and logical threats. It measures level of risk is to determine
the adverse impact resulting into a successful exercise of vulnerability. The information can be obtained
from existing organizational documentation, such as the mission impact analysis report or asset criticality
assessment report. A business impact analysis report or asset criticality assessment report. The adverse
impact of a security event can be described in terms of loss or delay of any or all of the three security
goals. Confidentiality, integrity, availability.
Question No: 22 ( Marks: 2 ) What are the physical threats for Information System.
The risks of physical damage render the computer hardware becomes useless due to the damage caused
to it by natural disasters (Fire, earth quake, flood), pollution-Dust, energy Variations. Reasonable
measures should be taken to avoid undesirable consequences.
Question No: 23 ( Marks: 2 ) List any two types of information that can be used as input for
vulnerability. Following information is used as an input
3. Security requirements
Question No: 24 ( Marks: 2 ) List down different types of SUPPLY CHAIN.
Supply chain may exist in various forms depending on the need of the business:
1. Made to Store
2. Continuous Replenishment
3. Built to order
Question No: 25 ( Marks: 3) What do u know about Key stroke Monitoring? (3)
Answer : A record of every keystroke---- often called keystroke monitoring. Keystroke monitoring is the
process used to view or record both the keystrokes entered by a computer user and the computer's
response during an interactive session. Keystroke monitoring is usually considered a special case of audit
trails.
Question No: 26 ( Marks: 3 ) Identify roles and responsibilities of any three professionals in an
organization.
Answer: 1-Data Owners — responsible for determining sensitivity or classification levels of the data as
well as maintaining accuracy and integrity of the data resident on the information system;
2-Process Owners — responsible for ensuring that appropriate security, consistent with the
organization’s security policy, is embedded in their information systems;
3-Technology providers — responsible for assisting with the implementation of information security
5. E-Government
Question No: 28 ( Marks: 5 ) Incorporate Risk management SDLC? identify its phases?
For each phase of SDLC, the process of risk management is no different. Rather it is iterative process
which can be performed at each major phase. Every step of development has its own risks which need to
be handled and addressed separately. Hence managing risk in SDLC means managing risk of each phase
of life cycle.
• Implementation
• Monitoring
Online Analytical Processing Decision support software that allows the user to quickly analyze
information that has been summarized into multidimensional views and hierarchies. The term online
refers to the interactive querying facility provided to the user to minimize response time
Threats can be identified on the basis of nature of Threat which can either be accidental-natural
occurrences/force major, or deliberate-intentional act of harm or on the basis of sources of threat which
can either be internal-threat caused within the organization, or external-threat from some one outside
the organization.
Question No: 31 ( Marks: 2 ) List down the inputs to Risk Determination phase ?
Magnitude of impact
Sensors that are responsible for collecting data. The data can be in the form of network
packets, log files, system call, traces, etc. Analyzers that receive input from sensors and determine
intrusive activity An administrative console – it contains intrusion definitions applied by the analyzers.A
user interface
What are the challenges to organizations for launching Ecommerce? Identify any three.
Security is the biggest challenge to for launching Ecommerce There is a consensus that the issue of
computer and data security is the biggest hurdle in the growth of ecommerce. Web servers also face this
security threat. Some other problems with launching e-commerce business is lack of trust of customers,
culture and languages problems.
Designing file or database is a major component of system designing. Identify its basic purposes.
2. Data updates in master file will mechanically keep posted the data in the whole system.
Question No: 35 ( Marks: 3 )What is the responsibility of the management of the organization to
ensure the security of information systems?
Executive or senior management take the responsibility to provide safe and secure information system
environment to their employees and user of information system. Due to it employees will feel no harm
or fear and can easily do the work with secure information system of an organization.
Discuss various steps in threat identification ? Give any example of threat sources and threat actions .
Question No: 37 ( Marks: 5 ) Can you classify E-Commerce into different classes? Idetify any five.
E-Commerce models can be classified as
E-Government
Question No: 38 ( Marks: 5 ) How Audit trails are technical mechanism that helps managers to
maintain individual accountability?
In Audit trails are technical mechanism Users are recognized by the record being retain. Users are
informed of what the password allows them to do and why it should be kept secure and confidential.
Audit trails also help to give alternative from normal behavior which can guide to illegal usage of
resources.
Audit trails can be used together with access controls to identify and provide information about users
alleged of inappropriate modification of data.
What is the basic purpose of setting up systems and procedures. Give your own opinion.
Answer: The basic purpose of setting up system and procedures is to make available information when it
is required.
Question No: 40 ( Marks: 2 ) Define threat and identify its types.
Answer: Threat is an act or event which can cause loss. Threats are of two types logical threats and
physical threats.
List any two types of information that can be used as input for vulnerability?
Answer:
Answer:
1-SAP
2-Oracale
3-QAD
4-PeopleSoft
5-Sag
Question No: 43 ( Marks: 3 ) Define Risk Determination. Identify its inputs and outputs.
Answer: Risk determination phase assesses the risk and level of risk to IT system.
2. Magnitude of impact
1-Physical threats: It refers to damage caused to the physical infrastructure of information system. For
example:
1-Fire
2-Water
3-Intrusion
4-Energy variation
5-Pollution
6-Structural damage
2-Logical Threat: It refers to damage caused to the information system without any physical presence.
2-Logical intrusion
Question No: 45 ( Marks: 3 )
Differentiate between Incremental and iterative models with the help of one example each.
These sound similar, and sometimes are equated but there is a subtle difference:
Example:
Building a House
• Incremental: Starts with a modest house, keep adding rooms and upgrades to it.
Identify any six factors that should be considered in order for change to be successful?
Answer:
• How will success be measured and what value will success
a) EC (E commerce)
Electronic Commerce (e-commerce or EC) describes the buying, selling, and exchanging of products,
services, and information via computer network, primarily the internet. Some people view the term
commerce as describing transactions conducted between business partners.
b) EB (E business)
E-business means using the internet and online technologies to create operating efficiencies, and
therefore increase value to the customer. It is internally focused. All e-commerce is part of e-business.
Not all e-business is e-commerce.
Answer: After getting proper information about system in passive attacks intruder will obtain
unauthorized access to modify data or programs, causing a denial of service, escalating privileges,
accessing other systems. They affect the integrity, availability and authentication attributes of network
security.
• Masquerading – involves carrying out unauthorized activity by impersonating a legitimate user of the
system.
• Piggybacking – involves intercepting communications between the operating system and the user and
modifying them or substituting new messages.
• Spoofing – A penetrator fools users into thinking they are interacting with the operating system. He
duplicates logon procedure and captures pass word.
• Backdoors/trapdoors – it allows user to employ the facilities of the operating system without being
subject to the normal controls.(vuzs)
• Trojan Horse – Users execute the program written by the penetrator. The program undertakes
unauthorized activities e.g. a copy of the sensitive data
Answer:
• Customer Satisfaction
• Time Scheduling
• Resource Management
Answer: Business Continuity Planning (BCP) is a methodology used to create a plan for how an
organization will resume partially or completely interrupted critical functions within a predetermined
time after a disaster or disruption.”
• Sensors that are responsible for collecting data. The data can be in the form of network packets, log
files, system call traces, etc.
• Analyzers that receive input from sensors and determines intrusive activity.
• An administration
Answer: Before beginning the impact analysis, it is necessary to obtain the following necessary
information.
• System mission
http://vuzs.net/
Answer: Active attacks may include obtaining unauthorized access to modify data or programs, causing a
denial of service, escalating privileges, accessing other systems. They affect the integrity, availability and
authentication attributes of network security.
Why is it needed for Accounting information system (AIS) to be linked with all other information
systems in an organization?
Answer: Accounting information system (AIS) is linked to all the information systems in an organization.
This is important because the data required for proper book keeping and generation of transactional
reports is extracted from all over the organization. For instance sales information can be sought only
from marketing information system and stock information is available in manufacturing information
system.
Identify any six factors that should be considered in order for change to be successful?
Answer:
• How will success be measured and what value will success
What do you understand by Privacy? How can privacy be protected? List threats to Privacy.
Answer:
Privacy means the quality or condition of being secluded from the presence or view of others, the state
of being free from unsanctioned intrusion: a person's right to privacy, the state of being concealed;
secrecy. Privacy is quite a subjective/relative concept.
Protecting Privacy
The rights of privacy must be balanced against the needs of the society. Every society has to decide
somewhere on the gray area between hiding all and knowing all extremes. Public’s rights to know is
superior to the individual’s rights of privacy. Usually public and individual’s rights stand in conflict with
each other. Since government agencies have their concerns in priority e.g. criminal investigation,
undesirable social activities. Various aspects can be seen as a threat to privacy.
Threats to Privacy
• Electronic surveillance
• Data Profiling
• Online Privacy
• Workplace monitoring
• Location tracking
• Background checks
• Financial privacy
• Digital right
• Taxation Issues
Give any two examples to prove that Audit trails help to provide variants from normal behavior which
may lead to unauthorized usage of resources.
Answer: Audit trails help to provide variants from normal behavior which may lead to unauthorized
usage of resources. For example
• Audit trails can be used together with access controls to identify and provide information about users
suspected of improper modification of data (e.g., introducing
Answer:
A hacker is a person who attempts to invade the privacy of the system. In fact he attempts to gain
unauthorized entry to a computer system by circumventing the system’s access controls. Hackers are
normally skilled programmers, and have been known to crack system passwords, with quite an ease.
Initially hackers used to aim at simply copying the desired information from the system. But now the
trend has been to corrupt the desired information.
Answer: Risk mitigation is a process that takes place after the process of risk assessment has been
completed. Systematic reduction in the extent of exposure to a risk and/or the likelihood of its
occurrence. Also called risk reduction.
Answer: Each attribute has a Value Set (domain) i.e. defined parameters or the range in which value of
the attribute may fall.
Answer: An object can be defined as “A concept, abstraction, or thing with crisp boundaries and
meaning of the problem at hand. Objects serve two purposes, they promote understanding of the real
world and provide a practical basis for computer implementation.”
Question No: 63 ( Marks: 1 ) What is the purpose of line symbol in the Entity Relationship Diagram?
Answer: Lines link attributes to entity sets, entity sets to relationship sets (also represent roles).
Question No: 64 ( Marks: 1 ) What are the logical threats to the information systems?
Answer: This refers to damage caused to the software and data without physical presence. Examples are
viruses and worms, logical intrusion commonly referred to as hacking
Answer:
In truthful conditions, cryptography means science of coded writing. It is a security defend to make
information incomprehensible if unlawful persons cut off the transmission. When the information is to
be used, it can be decoded. “The exchange of data into a secret code for the secure transmission over a
public network is called cryptography.”
Question No: 66 ( Marks: 2 )
Answer:
Another element to securing networks is an intrusion detection system (IDS). IDS is used in balance to
firewalls. An IDS works in combination with routers and firewalls and it monitor network that how much
it used and It protects a company’s information systems resources from external as well as internal
mistreatment.
Answer:
Information
Answer:
Trojan horse is like it executes by user the program written by the penetrate. The program undertakes
illegal actions e.g. a copy of the sensitive data and files.
A dropper is a program not a virus. It installs a virus on the PC while performing another function.
Designing file or database is a major component of system designing. Identify its basic purposes.
Data bring up to date carefully as it update in master file, master file automatically update whole data
Data accessibility is ensured when a customer or user need data
What is the responsibility of the management of the organization to ensure the security of information
systems?
Answer:
The responsibility of the management of the organization to ensure the security of information system
that Security must be sponsored by senior management. Management has a responsibility to ensure
that the organization provides all secure information systems environment for users or customers. This
will make users of information systems that are they feel secure and the importance of secure
information environment.
Answer:
Information that is required before conduction an impact analysis are that Analyze the Mission of the
system analyze the System and data criticality analyze System and data sensitivity.
Answer:
is the more essential form of change management, since it works for all the elements of
Risk determination means that phase of analyzing how much the information assets are uncovered to
various threats known and thus count the loss cause to the asset through this threat. This phase relates
to analysis of both physical and logical threats and comprises of four steps. Four steps are usually
followed while analyzing the exposure.
The main reason of this step is to assess the level of risk to the IT system. The determination of exacting
threat can be spoken as a meaning of
3. The competence of planned or existing security controls for reducing or minimizing risk.
Answer:
Technical Limitations of Ecommerce in comparison with Non-Technical limitation in organization are that
more cost to use for softwares and technology,reliability for certain processes.in sufficient
communications the reason is that people don’t know about it. Software tools are not fixed and used in
regular manner.people has No enough access of internet and they have difficulty to adopt e-commerce
infrastructure instead of organizational systems
Answer: “ERP (enterprise resource planning) is an industry term for the broad set of activities
supported by multi-module application software that helps a manufacturer or other business manage
the important parts of its business, including product planning, parts purchasing,
maintaining inventories, interacting with suppliers, providing customer service, and tracking orders.”
Answer: A problem when you have a number of possible risks is to decide which ones are worthy of
further attention. The Risk Matrix is a simple tool to help prioritize risks.
1-Physical threat
2-Logical Threat
Answer: Firewall
Firewall is the primary method for keeping a computer secure from intruders. A firewall allows or blocks
traffic into and out of a private network or the user's computer.
In accounting and finance terms, audit is a process which includes an examination of records or
financial accounts to check their accuracy, an adjustment or correction of accounts an examined and
verified account.Discuss the concept of Audit in IS?
Answer: An information technology (IT) audit or information systems (IS) audit is an examination of
the controls within an entity's Information technology infrastructure. IS audit focuses more on
examining the integrity of controls and ensuring whether they are properly working.Obtained
evidence evaluation can ensure whether the organization's information systems safeguard
assets, maintains data integrity, and is operating effectively and efficiently to achieve the
organization's goals or objectives.
• Laptop computer
• Desktop computer
• Palmtop
Answer: Risk mitigation is a process that takes place after the process of risk assessment has been
completed. Systematic reduction in the extent of exposure to a risk and/or the likelihood of its
occurrence. Also called risk reduction.
Answer: Risk mitigation is a process that takes place after the process of risk assessment has been
completed. Systematic reduction in the extent of exposure to a risk and/or the likelihood of its
occurrence. Also called risk reduction.
Answer:
Types of change management:
2- Re-engineering
Answer: Before beginning the impact analysis, it is necessary to obtain the following necessary
information.
• System mission
Answer:
Answer: The purpose of data flow diagrams is to provide a linking bridge between users and systems
developers. Data flow diagrams facilitate users to understand how the system operate. DFD’s also help
developers to
better understand the system which helps in avoiding delays in proper designing, development, etc. of
projects.
Answer:
A hacker is a person who attempts to invade the privacy of the system. In fact he attempts to gain un
authorized entry to a computer system by circumventing the system’s access controls. Hackers are
normally skilled programmers, and have been known to crack system passwords, with quite an ease.
Question No: 88( Marks: 2 ) What are the purposes of the Objects?
Answer: An object can be defined as “A concept, abstraction, or thing with crisp boundaries and
meaning of the problem at hand. Objects serve two purposes, they promote understanding of the real
world and provide a practical basis for computer implementation.”
Answer: An element to securing networks is an intrusion detection system (IDS). IDS is used in
complement to firewalls. An IDS works in conjunction with routers and firewalls by monitoring network
usage anomalies. It protects a company’s information systems resources from external as well as internal
misuse
Question No: 90 ( Marks: 3 ) What is the purpose of decision symbol in the flow chart?
Answer:
● The symbol is used when a choice can be made between the options available.
● Such options are mutually exclusive.
● Only one flow line should enter a decision symbol, but two or three flow lines, one for each
possible answer, should leave the decision symbol.
Question No: 91 ( Marks: 1 ) Define Risk Mitigation.
Answer: Risk mitigation is a process that takes place after the process of risk assessment has been
completed.
Answer:
2- Reengineering
Question No: 93 ( Marks: 2 ) Identify what information is needed before conducting an Impact
analysis?
Answer: Before beginning the impact analysis, it is necessary to obtain the following
necessary information.
• System mission
• System and data criticality
Question No: 94 ( Marks: 2 ) Why process symbol is used in the Flow charts?
Answer:
Answer: The purpose of data flow diagrams is to provide a linking bridge between users and systems
developers. Data flow diagrams facilitate users to understand how the system operate. DFD’s also help
developers to
better understand the system which helps in avoiding delays in proper designing, development, etc. of
projects.
Answer:
A hacker is a person who attempts to invade the privacy of the system. In fact he attempts to gain un
authorized entry to a computer system by circumventing the system’s access controls. Hackers are
normally skilled programmers, and have been known to crack system passwords, with quite an ease.
Answer: An entity is an object that exists and is distinguishable from other objects. An entity is described
using a set of attributes. For example specific person, company, event, plant, crop, department, section,
cost center.
Answer: CRM Uses proven methodologies and e-business technologies to help companies to identify,
select, acquire, develop, and retain profitable customers, building the lasting relationships that are key to
long-term financial success.
• Break down the CSF’s into the key or critical business processes and gain
process ownership.
• Break down the critical processes into sub-processes, activities and task and
form the teams around these.
2. Magnitude of impact
Risk Determination
The purpose of this step is to assess the level of risk to the IT system. The determination of
(system flaw)
2. The magnitude of the impact should a threat source successfully exercise a vulnerability
3. The adequacy of planned or existing security controls for reducing or eliminating risk.
This phase also presumes the definition of risk levels in order to classify the risks. The is more of a
discretionary act on part of the management. Levels can be defined as high medium low and
allocating various probability ranges. Risk levels are made to compare them with the ranges of impact.
Answer: The difference between CRM and ERP is that the former is outward-looking, while the latter is
inward-looking.
Question No: 102 ( Marks: 5 ) How the likelihood is determined? Enlist the factors.
Likelihood Determination
• This phase determines that a potential vulnerability could be exercised by a given
threat-source. Following table will help us to define and understand the likelihood
• Threat capacity
• Nature of vulnerability
• Current Controls
The output to this phase is a likelihood rating to be used further in the risk assessment process.
Impact Analysis
This phase determines the adverse impact resulting from a successful threat exercise of
2. System and data criticality e.g. the system’s value or importance to an organization
Question No:103 ( Marks: 10 ) How will you compare Integrated Systems to ERP?
Integrating systems
Let’s take a look what an integrated information system looks like. As seen in the above picture all
systems are interfaced with one another, the input in one system automatically updating the data in the
other relevant system. We thus observe simultaneous Data sharing between various systems and
simultaneous execution of different business processes. For Example, a confirmed sales order received
by the sales department from the customer will once entered into the sales system automatically
provide data input to stores/packing/ shipping and possibly the production systems. Thus ensuring that
all relevant departments are notified of ready for necessary action simultaneously.
Question No: 104 ( Marks: 1 ) What indicates the symbol Arrow in the flow charts?
Answer: Arrow in a flow chart shows the direction of flow of procedure or system.
Answer: In this phase of change management, a situation for next phase is prepared by disconfirming
existent attitudes and behaviors.
Question No:106 ( Marks: 2 ) What are the physical threats to the information systems?
Answer: This refers to the damage caused to the physical infrastructure of the information systems.
Examples are natural disasters (Fire, earth quake, flood), pollution, energy variations and physical
Intrusion.
Answer: In literal terms, cryptography means science of coded writing. It is a security safeguard to
render information unintelligible if unauthorized individuals intercept the transmission. When the
information is to be used, it can be decoded. “The conversion of data into a secret code for the secure
transmission over a public network is called cryptography.”
Answer: If the flowchart becomes complex, it is better to use connector symbols to reduce the number
of flow lines. Off-Page Connector is used to connect remote flowchart portion on different pages. One
flow line enters or exits.
Answer: These controls establish the interface between the would-be user of the computer system and
the computer itself. These controls monitor the initial handshaking procedure of the user with the
operating system. For example when a customer enters the card and the pin code in an automatic teller
machine (ATM), the access controls are exercised by the system to block unwanted or illegitimate access.
Question No: 110 ( Marks: 3 ) List any three ethical challenges given by IS security association of USA ?
Ethical Challenges
Information system security association of USA has listed down following ethical challenges
2. Abuse of privileges
3. Inappropriate monitoring
4. Withholding information
6. Overstating issues
7. Conflicts of interest
Intrusion detection
Intrusion detection refers to the process of identifying attempts to penetrate a system and gain
unauthorized access. If audit trails have been designed and implemented to record appropriate
information, they can assist in intrusion detection. Intrusion detection system can be made part of
the regular security system to effectively detect intrusion. Real time intrusion detection is technical and
complex to achieve but reasonable extent can be attained. Real-time intrusion detection is primarily
aimed at outsiders attempting to gain unauthorized access to the system.
monitor usage trends and detect major variations. The log can be detected and analyzed to detect
the irregularity. For example, if a user typically logs in at 9 a.m., but appears at 4:30 a.m. one
morning, this may indicate either a security problem or a malfunctioning of the system clock, that may
need to be investigated. The log can be sorted/filtered for all log ins befor 9 a.m. from that particular
terminal
Question No: 112 ( Marks: 5 ) What are the sources of critical success factor?
Critical Success Factors have to be analyzed and established. CSF’s may be developed from various
sources.
• CSF’s resulting from the chosen competitive strategy of the business e.g. quick and timely delivery
Reusable Software – The software developed using object oriented approach can be easily reused
Discuss System Characterization ? What information may help to characterize the system ?
System Characterization
In assessing risks for an IT system, the first step is to define the scope of the effort. The
resources and information that constitute the system are identified. The system related
1. Hardware
2. Software
3. System Interface
The basic objective of an organization is to make a profit and get a sustainable competency.
Intrusion detection refers to the process of identifying attempts to penetrate a system and gain
unauthorized access. If audit trails have been designed and implemented to record appropriate
information, they can assist in intrusion detection. Intrusion detection system can be made part of
the regular security system to effectively detect intrusion. Real time intrusion detection is technical and
complex to achieve but reasonable extent can be attained. Real-time intrusion detection is primarily
aimed at outsiders attempting to gain unauthorized access to the system.
Question No: 117 Where "While" loop is more preferable than "For" loop and vice versa?
The golden rule in iteration: everything done with a for loop can be done with a while loop, BUT not all
while loops can be implemented with a for loop.
for-loops are just a short-cut way for writing a while loop, while an initialization statement, control
statement (when to stop), and a iteration statement (what to do with the controlling factor after each
iteration).
Types of Viruses
Although viruses are of many types, however broad categories have been identified in accordance
with the damage they cause. Some of these categories have been stated below
• Overwriting viruses
• Dropper
• Trojans
Boot sector Virus
The boot sector is part of computer which helps it to start up. If the boot sector is infected, the
Overwriting Viruses
As the name implies, it overwrites every program/software/file it infects with itself. Hence the
Dropper
A dropper is a program not a virus. It installs a virus on the PC while performing another function.
Trojan horse
A Trojan horse is a malicious program that is disguised as or embedded within legitimate software.
They may look useful or interesting (or at the very least harmless) to an unsuspecting user, but are
• Logic bomb – Trojan horses are triggered on certain event, e.g. when disc clean up reaches a
certain level of percentage
• Hackers
• Hacktivists
• Crackers
Hackers
A hacker is a person who attempts to invade the privacy of the system. In fact he attempts to gain
un authorized entry to a computer system by circumventing the system’s access controls. Hackers
are normally skilled programmers, and have been known to crack system passwords, with quite an
ease. Initially hackers used to aim at simply copying the desired information from the system. But
Hacktivsts
This refers to individuals using their skills to forward a political agenda, possibly breaking the law
Crackers
There are hackers who are more malicious in nature whose primary purpose or intent is to commit
a crime through their actions for some level of personal gain or satisfaction. The terms hack and
Its very common for hackers to misuse passwords and Personal identification number, in order to
gain unauthorized access.
Passwords
“Password is the secret character string that is required to log onto a computer system, thus
preventing unauthorized persons from obtaining access to the computer. Computer users may
Misuse of passwords
A very simple form of hacking occurs when the password of the terminal under the use of a
particular employee is exposed or become commonly known. In such a situation access to the
entire information system can be made through that terminal by using the password. The extent of
access available to an intruder in this case depends on the privilege rights available to the user.
Question No: 118 ( Marks: 1 ) What indicates the symbol Arrow in the flow charts?
Answer: In this phase of change management, a situation for next phase is prepared by disconfirming
existent attitudes and behaviors.
Answer: This refers to the damage caused to the physical infrastructure of the information systems.
Examples are natural disasters (Fire, earth quake, flood), pollution, energy variations and physical
Intrusion.
Answer: In literal terms, cryptography means science of coded writing. It is a security safeguard to
render information unintelligible if unauthorized individuals intercept the transmission. When the
information is to be used, it can be decoded. “The conversion of data into a secret code for the secure
transmission over a public network is called cryptography.”
Answer: These controls establish the interface between the would-be user of the computer system and
the computer itself. These controls monitor the initial handshaking procedure of the user with the
operating system. For example when a customer enters the card and the pin code in an automatic teller
machine (ATM), the access controls are exercised by the system to block unwanted or illegitimate access.
How the scanners are used as the technical control against the spread of
viruses?
Scanners
They scan the operating system and application soft ware for any virus based on the viruses they contain.
Every virus has a different bit pattern. These unique bit patterns act as an identity for the virus and are
called signatures. These signatures are available in virus definitions. Every scanner contains in it certain
virus definitions which in fact are signatures (bit patterns) for various kinds of virus. The scanner checks
or scans the operating system and other application soft wares installed on the hard drives. While
scanning, it checks the bit patterns in all software against the bit patterns contained in the virus
definitions of the scanner. If they found similar, they are labeled as virus.
Can you classify E-Commerce into different classes? Identify any five.
E-Governmen
Question No: 127 ( Marks: 10 )
What do you understand by Intruder? Classify and discuss intruders according to way they operate.
In physical intrusion, the intruder physically could enter an organization to steal information system
assets or carry out sabotage. For example the Intruder might try to remove hard disks. In case of logical
intrusion, the intruder might be trying to have an unauthorized access to the system. The purpose could
be damaging or stealing data, installation of bug or wire tapping -- Spying on communication within the
organization.
A person making an intrusion is generally termed as intruder. However, he can be classified according to
the way he operates.
• Hackers
• Hacktivists
• Crackers
Hackers
A hacker is a person who attempts to invade the privacy of the system. In fact he attempts to gain un
authorized entry to a computer system by circumventing the system’s access controls. Hackers are
normally skilled programmers, and have been known to crack system passwords, with quite an ease.
Initially hackers used to aim at simply copying the desired information from the system. But now the
trend has been to corrupt the desired information.
Hacktivsts
This refers to individuals using their skills to forward a political agenda, possibly breaking the law in the
process, but justifying their actions for political reasons.
Crackers There are hackers who are more malicious in nature whose primary purpose or intent is to
commit a crime through their actions for some level of personal gain or satisfaction. The terms hack and
crack are often used interchangeably.
Question No: 128 ( Marks: 10 ) Identify and define different levels of likelihood determination.
Likelihood level
High
The threat source is highly motivated and sufficiently capable and controls to prevent the Vulnerability
from being exercised are ineffective.
Medium
The threat source is motivated and capable but controls are in place that may impede the successful
exercise of the vulnerability
Low
The threat source lacks motivation or capability or controls are in place to prevent or at least significantly
impede the vulnerability from being exercised
Question No: 129 ( Marks: 5 )Discuss Intrusion detection Systems and also explain its components ?
PAGE 168+169
Another element to securing networks is an intrusion detection system (IDS). IDS is used in
complement to firewalls. An IDS works in conjunction with routers and firewalls by monitoring network
usage anomalies. It protects a company’s information systems resources from external as well as internal
misuse.
Components of an IDS
• Sensors that are responsible for collecting data. The data can be in the form of network
• Analyzers that receive input from sensors and determine intrusive activity
Question No: 130 ( Marks: 5 ) Identify the objective and scope of security.
The concept of security applies to all information. Security relates to the protection of valuable assets
against loss, disclosure, or damage. Valuable assets are the data or information recorded, processed,
stored, shared, transmitted, or retrieved from an electronic medium. The data or information must be
protected against harm from threats that will lead to its loss, inaccessibility, alteration or wrongful
disclosure.
The concept of security applies to all information. Discuss what is the objective and scope of Security?
What may be the sceurity issues regarding information and what will be the management
responsibilty to resolve these issues?
Information Systems can be made secure from the threats discussed last slides. There is not a single
control available to cater for the risk of vulnerabilities associated with web (Internet). Some of the
solutions are:
• Encryption
Every time a corporation connects its internal computer network to the Internet if faces potential danger.
Because of the Internet’s openness, every corporate network connected to it is vulnerable to attack.
Hackers on the Internet could break into the corporate network and do harm in a number of ways: steal
or damage important data, damage individual computers or the entire network, use the corporate
computer’s resources, or use the corporate network and resources as a way of posing as a corporate
employee. Companies should build firewalls as one means of perimeter security for their networks.
Likewise, this same principle holds true for very sensitive or critical systems that need to be protected
from entrusted users inside the corporate network.
Firewalls are defined as a device installed at the point where network connections enter a site; they
apply rules to control the type of networking traffic flowing in and out. The purpose is to protect the
Web server by controlling all traffic between the Internet and the Web server. To be effective, firewalls
should allow individual on the corporate network to access the Internet and at the same time, stop
hackers or others on the Internet from gaining access to the corporate network to cause damage.
Generally, most organizations can follow any of the two philosophies
• Deny-all philosophy -- which means that access to a given recourses will be denied unless a user can
provide a specific business reason or need for access to the information resource.
• Accept All Philosophy -- under which everyone is allowed access unless someone can provide a reason
for denying access. System reports may also be generated to see who attempted to attack to system and
tried to enter the firewall from remote locations.
Firewalls are hardware and software combinations that are built using routers, servers and variety of
software. They should control the most vulnerable point between a corporate network and the Internet,
and they can be as simple or complex as the corporate security policy demands. There are many types of
firewalls, but most enable organization to:
• Monitor and record all communications between an internal and the outside world to investigate
network penetrations or detect internal subversion.
• Encrypt packets of data that are sent between different physical locations within an organization by
creating a VPN over the Internet.
Firewalls encrypt packets that are sent between different physical locations within an organization by
creating a VPN over the Internet. The capabilities of some firewalls can be extended so that they can also
provide for protection against viruses and attacks directed to exploit known operating system
vulnerabilities. Remote Location server protected by fire walls and IDS further complemented by IPS
(Intrusion Prevention system) – Defining Specific ranges of IP addresses that may access the location
with defined rights.
Polymorphism Following example will help understand the concept in a better manner.
Hence based on the example given above, the concept can be defined. Ppolymorphism is a derived from
Greek language meaning "having multiple forms"). Polymorphism is the characteristic of being able to
assign a different meaning or usage to something in different contexts - specifically, to allow an entity
such as a variable, a method, or an object to have more than one form.
Intrusion can be both either physical or logical. In physical intrusion, the intruder physically could enter
an organization to steal information system assets or carry out sabotage. For example the Intruder might
try to remove hard disks. In case of logical intrusion, the intruder might be trying to have an
unauthorized access to the system. The purpose could be damaging or stealing data, installation of bug
or wire tapping -- Spying on communication within the organization.
Question No: 135 ( Marks: 3 ) Define Active attacks?
Active Attacks: Once enough network information has been gathered, the intruder will launch an actual
attack against a targeted system to either gain complete control over that system or enough control to
cause certain threats to be realized. This may include obtaining unauthorized access to modify data or
programs, causing a denial of service, escalating privileges, accessing other systems. They affect the
integrity, availability and authentication attributes of network security.
In literal terms, cryptography means science of coded writing. It is a security safeguard to render
information unintelligible if unauthorized individuals intercept the transmission. When the information is
to be used, it can be decoded. “The conversion of data into a secret code for the secure transmission
over a public network is called cryptography.”
Cryptography primarily consists of two basic processes. These processes are explained through a
diagram.
• Decryption – the process of decoding the code arrived at data actually encrypted
Question No: 137 ( Marks: 10 ) What are the components of the object? Give example
An object is defined as
“an abstraction of something in a problem domain, reflecting the capabilities of the system to keep
information about it, interact with it, or both.” Coad and Yourdon (1990)
“A concept, abstraction, or thing with crisp boundaries and meaning of the problem at hand. Objects
serve two purposes. They promote understanding of the real world and provide a practical basis for
computer implementation.” Rumbaugh et al. (1991)
Components of object
According to Booch, there are three components of object. Objects have state, behavior and identity.
What an object can do, how it can respond to events and stimuli.
Real-world objects share two characteristics: They all have state and behavior.
For example,
• Dogs have state (name, color, breed, hungry) and behavior (barking, fetching, wagging tail).
• Bicycles have state (current gear, current pedal cadence, two wheels, number of gears) and behavior
(braking, accelerating, slowing down, changing gears)..
Question No: 138 ( Marks: 10 ) How can we compute the expected loss? Discuss the occurrence of
threats.
In fourth step of the exposure analysis, the amount of expected loss is computed through following
formula
A=BxCxD
1. A = Expected Loss
Control Adjustment
This phase involves determining whether any controls can be designed, implemented, operated. The cost
of devising controls should not exceed the expected potential benefit being en-cashed and the potential
loss being avoided. The controls that could mitigate or eliminate the identified risk appropriate to the
organization’s operations are provided. The goal of the recommended controls is to reduce the level of
risk to the IT system and its data to an acceptable level. Following factors should be considered in
recommending controls and alternative solutions to minimize or eliminate identified risks.
• Organizational policy
• Operational Impact
The control recommendations are the results of the risk assessment process and provide the risk
mitigation process during which the recommended procedural and technical security controls are
evaluated, prioritized and implemented. It should be noted that not all possible recommended controls
can be implemented to reach and to determine which ones are required and appropriate for a specific
organization, a cost analysis, should be conducted for the proposed recommendations of controls to
demonstrate that the costs of implementing the controls can be justified by the reduction in the level of
risk. In addition, the operational impact and feasibility of introducing recommended option should be
evaluated carefully during the risk mitigation process.
Existing controls should not be totally discarded while adjusting controls. They can either be terminated
totally, due to the threats not being there any more or existence of better controls or modification for
betterment, this phase should consider the security to be cost effective, and integrated.
2)- What are the conglomerate organizations?
3)- Feasibility
4)- RAID model
5)- waterfall model
6)- system analyst
7)- Computer Integrated Manufacturing
o Computer aided Engineering (CAE) -- the application of computer software in engineering to analyze
the robustness and performance of components, assemblies, products and manufacturing tools. o Just in
time (JIT) – A Japanese idea that inventory is manufactured (or acquired) only as the need for it arises or
in time to be sold (or used). A major goal is to cut down on inventory investment.
• Integration and coordination of all the manufacturing aspects through computer hardware and
software
The systems development life cycle is a project management technique that divides complex projects
into smaller, more easily managed segments or phases. Segmenting projects allows managers to verify
the successful completion of project phases before allocating resources to subsequent phases. Although
System development can be seen as a project in itself, but the attribute that makes system development
different from regular projects is that a project has a definite end and it is unlikely that ongoing
maintenance will be included in the scope of the project but this falls in the definition of SDLC.
9)- Spiral Model.
SPIRAL is an iterative approach to system development. The spiral lifecycle model is a combination of the
classic waterfall model and aspects of risk analysis. This model is very appropriate for large and complex
Information Systems. The spiral model emphasizes the need to go back and reiterate earlier steps a
number of times as the project progresses. It's actually a series of short waterfall cycles, each producing
an early prototype representing a part of the entire project. It is a circular view of the software lifecycle
as opposed to the linear view of the waterfall approach. It can incorporate other models in its various
developmental phases.
There are usually four distinct phases of the spiral model software development approach.
10) physical design
The logical design is converted to physical design in this phase. The physical design involves breaking up
the logical design into units, which in turn can be decomposed further into implementation units such as
programs and modules.
New system requires new software and hardware not currently available in the organization.
For example
Office automation system includes formal and informal electronic systems primarily concerned with the
communication of information to and from persons both inside and outside the firm. It supports data
workers in an organization.
For Instance
• Word processing
• Desktop publishing
• Audio & video conferencing – establishing communication between geographically dispersed persons.
How the scanners are used as the technical control against the spread of viruses?
Use of antivirus software is another very important technical control against the spread of virus.
33.1 Scanners
They scan the operating system and application soft ware for any virus based on the viruses they contain.
Every virus has a different bit pattern. These unique bit patterns act as an identity for the virus and are
called signatures. These signatures are available in virus definitions. Every scanner contains in it certain
virus definitions which in fact are signatures (bit patterns) for various kinds of virus. The scanner checks
or scans the operating system and other application soft wares installed on the hard drives. While
scanning, it checks the bit patterns in all software against the bit patterns contained in the virus
definitions of the scanner. If they found similar, they are labeled as virus.
Can you classify E-Commerce into different classes? Identify any five.
Electronic Commerce (e-commerce or EC) describes the buying, selling, and exchanging of products,
services, and information via computer network, primarily the internet. Some people view the term
commerce as describing transactions conducted between business partners. Ebusiness is a broad
definition of EC, not just buying and selling, but also servicing customers, collaborating with business
partners, and conducting electronic transactions within an organization. The most prevalent of
E-Commerce models can be classified as
5. E-Government
The concept of object oriented analysis and design focuses on problems in terms of classes and objects.
This concept combines aspects of both entity relationship diagram and data flow diagrams. The object
oriented analysis and design tool has been devised to support the object oriented languages, for
example C++ and Java. The roots of the concept of object orientation evolved in late 60’s with the
emergence of first language “SIMULA 67” as the first object oriented language. Object oriented
methodologies do not replace traditional approaches (such as data flow, process flow, and state
transition diagrams); they are important new additions to the toolkit.
142 What do you understand by computing envroiment. Describe the • Stand Alone Processing and
Web Based Environment (Marks 5)
The typically refers to the use of web, internet and browser based applications for transactions
execution. In Web based environment, clients connect to the application through Broad-band or base
band/dial up connection. Application is located on the enterprise server which is accessed by the client
through then internet connection. Access may be given to single application software or the entire
operating system. Web based environment can be combined with and applied to both centralized or
decentralized to optimize the performance.
Web based architecture can be used, either to give access to the company employees to the information
system e.g Virtual Private Networks (VPN) in case of banks or to give access to any body and every body
to company’s information system.
Following example can explain the concept in a better fashion. Two users A & B present at remote
locations or we can say outside the organization may want to access the server located within the
organization. They may get connected with the internet and access the server located in the
organization. The server needs to be online as well so as to be accessed by A & B through any of the
means (broad band, base band, wi-fi, or satellite). Hence data can be transmitted and retrieved using the
internet. Availability of connection of proper bandwidth allowing appropriate internet connection speed
is critical to both transmission and retrieval. Due to this reason, companies have taken dedicated lines to
enjoy uninterrupted service.
For security to be effective, it is imperative that individual roles, responsibilities are clearly
communicated
and understood by all. Organizations must assign security related functions in the appropriate manner to
nominated employees. Responsibilities to consider include:
3. Data Owners — responsible for determining sensitivity or classification levels of the data as well as
maintaining accuracy and integrity of the data resident on the information system;
4. Process Owners — responsible for ensuring that appropriate security, consistent with the
organization’s security policy, is embedded in their information systems;
5. Technology providers — responsible for assisting with the implementation of information security;
6. Users — responsible for following the procedures set out in the organization’s security policy; and
A corporate-level facilitator may serve as a focal point for assessments throughout the company,
including those pertaining to information security because of familiarity with the tools and the reporting
requirements. Each business unit in an organization may have a designated individual responsible for the
business unit's risk assessment activities. The computer hardware and software company, may also
create a team for the purpose of improving the overall risk assessment process and reviewing results of
risk assessments in the hardware and software systems from the perspective of offering a better, reliable
and risk free product.
Vulnerability is a weakness that can be accidentally triggered or intentionally exploited. This phase helps
in building up a list of weaknesses and flaws that could be exploited by the potential threat sources.
Impact Analysis
This phase determines the adverse impact resulting from a successful threat exercise of vulnerability.
Following information is required before conducting an impact analysis.
2. System and data criticality e.g. the system’s value or importance to an organization
The threat source lacks motivation or capability or controls are in place to prevent or at least significantly
impede the vulnerability from being exercised.
Low The threat source is motivated and capable but controls are in place that may impede the successful
exercise of the vulnerability.
Medium The threat source is highly motivated and sufficiently capable and controls to prevent then
vulnerability from being exercised are ineffective
Impact needs to be measured by defining certain levels. E.g. high medium low as qualitative categories
or quantifying the impact by using probability distribution.
• Data criticality
• Data sensitivity
Change management means to plan, initiate, realize, control, and finally stabilize change processes on
both, corporate and personal level. Implementation of ERP or any other integration software needs
commitment and proper management. Managing change in implementation projects has become a
serious concern for the management.
Types of Change
• Organizational Development: This is the more gradual and evolutionary approach to change. It bases
on the assumption that it is possible to align corporate objectives with the individual employees’
objectives. In practice, however, this will rarely be possible.
• Unfreezing -- Preparing a situation for change by disconfirming existing attitudes and behaviors.
149 How will you differentiate CSF from KPI? Discuss briefly.
A critical success factor is not a key performance indicator or KPI. Critical Success Factors are elements
that are vital for a strategy to be successful. A KPI measures the achievements.The following example will
clarify the difference. A CSF for improved sales may be adopting a new sales strategy through better and
regularly arranged display of products in the shop windows. However, the KPI identified would be the
increased/decreased Average Revenue Per Customer as a result of the strategy. Key Performance
Indicators directly or indirectly measure the results of implementation of Critical Success Factors. KPI’s
are measures that quantify objectives and enable the measurement of strategic performance.
An entity is an object that exists and is distinguishable from other objects. An entity is described using a
set of attributes. For example specific person, company, event, plant, crop, department, section, cost
center.
• An entity set is a set of entities of the same type that share the same properties
• All entities in an entity set have the same set of attributes, i.e. common characteristics e.g. names,
addresses, date of birth, etc.
• Each entity set has a distinct attribute by which it can be easily identified, e.g. NIC no., employee no.
Example
• Bird is an entity
Flow Chart
Question No:152( Marks: 2 ) Why we use the tools like flowcharts, DFDs etc in the System Design?
Another diagrammatical tool used in system design is ERD. ERD as shown below indicates simple
relationships. These relationships can be read as follows.
Or
• An employee may not be working on any project but a project must have at least one employee
working on it Or
• An employee may not be working on any project but a project must have at least one employee
working on it This is another form of ERD used to show the relations between various fields in files used
to record specific data.
Critical Success Factors differ from organization to organization. While approving any project, the
management may evaluate the project on the basis of certain factors critical to the success or failure
of the project. Five example in real life (Marks 10)
Critical Success Factor (CSF) is a business term for an element which is necessary for an organization or
project to achieve its mission. For example, for an international package delivery system, CSF’s can be
identified such as safe transport of customer consignments, timely delivery of consignment, online status
confirmation system to inform customers and proper packaging and handling.
Critical Success Factors differ from organization to organization. While approving any project, the
management may evaluate the project on the basis of certain factors critical to the success or failure of
the project. For instance:
• Money factors: positive cash flow, revenue growth, and profit margins.
• Product / service development -- what's new that will increase business with existing customers and
attract new ones?
• Strategic relationships -- new sources of business, products and outside revenue, sub contracting.
• Sustainability
• Corporate Governance
Critical Success Factors have to be analyzed and established. CSF’s may be developed from various
sources.
Generally four major sources of identifying CSF’s are
• CSF’s resulting from the chosen competitive strategy of the business e.g. quick and timely delivery
Question No: 154 ( Marks: 2 )What is the use of Default keyword in switch structure?
The default statement is used because, when dealing with switch, you will have many cases either
returning TRUE or FALSE.
If neither of those cases return true, then default will recognize the switch value. However, the default
line should be at the end of every caseIt's a catch-all for any case that doesn't exist. Think of it as 'else' in
a list of if-else statements, if the switch doesn't match a listed case, the default case is used (if it exists).
155 Object Oriented Design has the purpose to create flexible Object Oriented Systems.
Object-Oriented Analysis(OOA) and Object-Oriented Design(OOD)?
Flexible in terms of Object Orientation means, that it's possible to add functionality without messing the
whole thing up. Object Oriented Analysis has the purpose of finding a proper OOD for the problem, e.g.
by using Design Patterns.
Disadvantages of ERP: Many problems organizations have with ERP systems are due to inadequate
investment in ongoing training for involved personnel, including those implementing and testing
changes, as well as a lack of corporate policy protecting the integrity of the data in the ERP systems and
how it is used.