Question No: 1 ( Marks: 1 ) - Please choose one ERP s major objective is to tightly integrate the functional areas of the organization and to enable seamless information flows across the functional areas. Question No: 2 ( Marks: 1 ) - Please choose one The environment exerts influence on the system and the system also influences the environment. Open system Closed system Closed end System Question No: 3 ( Marks: 1 ) - Please choose one Customer touch point is a method of interaction with a customer, such as telephone, e-mail, a customer service or help desk, conventional mail, Web site and store. Question No: 4 ( Marks: 1 ) - Please choose one One of the methods of integrating different business information systems is : Supply Chain management software Interface reconciliation software Message passing None of the given options Question No: 5 ( Marks: 1 ) - Please choose one The bullwhip effect refers to erratic shifts in orders up and down the supply chain because of poor demand forecasting, price fluctuation, order batching, and rationing within the chain. Question No: 6 ( Marks: 1 ) - Please choose one M-Commerce stands for E-Commerce None of given options Mobile Commerce
Question No: 7 ( Marks: 1 ) - Please choose one The comparison of actual system with expected system is done with the help of control mechanism. Question No: 8 ( Marks: 1 ) - Please choose one Organizations sell products to other organizations electronically is an example of: Ecommerce EBusiness BPR BPRE Question No: 9 ( Marks: 1 ) - Please choose one Which of the following refers to the process of identifying attempts to penetrate a system and gain unauthorized access? Threat Identification Intrusion detection Access Control All of above Question No: 10 ( Marks: 1 ) - Please choose one A is an agreed-upon set of conventions that defines the rules of communication. Protocol Interconnection Medium Data Packet Message Question No: 11 ( Marks: 1 ) - Please choose one The identification of risks should start with: Description of the internal and external risks A brainstorming session with risk management experts and a program profile A good understanding of the program and a brainstorming session with key stakeholders Definitions of likelihood and impact Question No: 12 ( Marks: 1 ) - Please choose one
The term OIS views organization as a combination of process oriented groups whose information needs are related but Independent Question No: 13 ( Marks: 1 ) - Please choose one In case of logical intrusion, the intruder might be trying to have an unauthorized access to the system. Question No: 14 ( Marks: 1 ) - Please choose one Which one of the following computer systems uses duplication of components and data to cope with systems failures? Fault-tolerant systems Expert System MIS OIS Question No: 15 ( Marks: 1 ) - Please choose one Data travels across the internet through several levels of networks until it reaches its middle point. Question No: 16 ( Marks: 1 ) - Please choose one Which of the following is a data model or diagram for high-level descriptions of conceptual data model. ERD Flow Chart Algorithm DFD Question No: 17 ( Marks: 1 ) - Please choose one The procedures to follow when decision is needed can be specified in advance Question No: 18 ( Marks: 1 ) - Please choose one have usually simple management structure.
Small Organization Medium organization Large Organization Question No: 19 ( Marks: 1 ) - Please choose one is an object that exists and is distinguishable from other objects. Value Sets Entity Relationships Question No: 20 ( Marks: 1 ) - Please choose one Object oriented analysis generates Implementation constraints System Interfaces Conceptual model of Information Question No: 21 ( Marks: 1 ) - Please choose one Inheritance can be defined in terms of Has kind of Is based on Is kind of Question No: 22 ( Marks: 1 ) - Please choose one An IDS with the neural network feature monitors the general patterns of activity and traffic on the network and creates a database. Question No: 23 ( Marks: 1 ) - Please choose one M-Commerce (mobile commerce) refers to the conduct of e-commerce via wireless devices. Question No: 24 ( Marks: 1 ) - Please choose one ERP Systems control all major business processes with a single software architecture in real time.
Question No: 25 ( Marks: 1 ) - Please choose one Preparing a situation for change by disconfirming existing attitudes and behaviors is called Unfreezing. Question No: 26 ( Marks: 1 ) - Please choose one Ethics is a branch of science that deals with what is considered to be right and wrong. Question No: 27 ( Marks: 1 ) - Please choose one Which of the following is the process or art of defining the hardware and software architecture, components, modules, interfaces, and data for a computer system to satisfy specified requirements? Systems Design Systems Requirement Coding Requirement Question No: 28 ( Marks: 1 ) - Please choose one Buying and selling of products, services and information via computer networks, primarily through Internet is : E-Commerce E-Business Web Surfing BPR Question No: 29 ( Marks: 1 ) - Please choose one In which of the following decisions the problems are non routine, critical and novel in nature, require individual judgment, evaluation and insight varying on case-to-case basis. Semi-Structured decisions Unstructured decisions Structured decisions Question No: 30 ( Marks: 1 ) - Please choose one There are five phases of the decision making process, first one is intelligence.
Question No: 31 ( Marks: 1 ) What is an entity set? Question No: 32 ( Marks: 1 ) Define Clear Text? Question No: 33 ( Marks: 2 ) Differentiate between Changing and Refreezing? Question No: 34 ( Marks: 2 ) Why we use the tools like flowcharts, DFDs etc in the System Design? Question No: 35 ( Marks: 3 ) What is access control? Give example Question No: 36 ( Marks: 3 ) List any three ethical challenges given by IS security association of USA? Question No: 37 ( Marks: 3 ) What are the objective/purposes of the DFDs? Question No: 38 ( Marks: 5 ) Differentiate the following 1. Intrusion Detection vs Variance Detection Question No: 39 ( Marks: 5 ) What are the sources of critical success factor? Question No: 40 ( Marks: 10 ) What is reusable software? Question No: 41 ( Marks: 10 ) Discuss System Characterization? What information may help to characterize the system?