Skip to main content

CS507 Current Final Term Fall 2013 Shared by Iqra_Jahangir File 1



this is my CS507 paper

Define centralized processing 2 marks:
Answer:
Centralized Processing is performed in one computer or in a cluster of coupled computers in a single location. Centralized processing was the architecture that evolved from the very first computers; however, user access was via dumb terminals that performed noneof the primary processing. Today, centralized computers are still widely used, but the terminals are mostly full-featured desktop computers.

2.      List any two types of information that can be used as input for vulnerability.(Marks:2)
Answer:
Following information is used as an input
2. Any audit comments
3. Security requirements

3.      Identify components of Intrusion detection system ? ( M a r k s: 2 )
Answer:
: Components of IDS
An IDS comprises on the following:
• Sensors that are responsible for collecting data. The data can be in the form of network
packets, log files, system call traces, etc.
• Analyzers that receive input from sensors and determines intrusive activity.
• An administration: it contains intrusion definitions applied by the analyzers.
• A user interface

4.      Entity Relationship Diagram Double ellipses 2 marks
 represents multivalued
attributes

5.      Define E_Learning? 3 marks
E-Learning is the online delivery of information for purposes of
education, training, knowledge management, or performance
management. It is a web - enabled system that makes knowledge
accessible to those who need it, when they need it – anytime,

6.      Advantage of OOAD Reusable Software – 3 marks
The software developed using object oriented approach can be
easily reused due to independence/uniqueness of the objects i.e. an independent
accounting module built in object oriented environment can be made a part of a complete ERP solution without developing it again from scratch for ERP


7.      What is the necessary information needed to begin impact analysis? ( M a r k s: 3 )
Answer:
: Before beginning the impact analysis, it is necessary to obtain the following necessary
information.
• System mission
• System and data criticality
• System and data sensitivity

8.      How can we make our password secure( Marks: 3 )
Answer:
Best Password practices
• Keep the password secret – do not reveal it to anyone
• Do not write it down – if it is complex, people prefer to save it in their cell phone memory,
or write on a piece of paper, both of these are not preferred practices.
• Changing password regularly – Passwords should be associated with users not machines.
Password generation program can also be used for this purpose.
• Be discreet – it is easy for the onlookers to see which keys are being used, care should be
taken while entering the password.
• Do not use obvious password – best approach is to use a combination of letters, numbers,
upper case and lower case. Change passes word immediately if you suspect that anyone else knows it.

9.      how will u incorporate SDLC in risk management n write the phases of risk managment ?5
Incorporating Risk management in SDLC
For each phase of SDLC, the process of risk management is no different. Rather it is iterative process which can be performed at each major phase. Every step of development has its own risks which need to be handled and addressed separately. Hence managing risk in SDLC means managing risk of each phase of life cycle.
36.1 Phases of Risk Management
Following are various phases of SDLC
• System Characterization
• Threat Identification
• Vulnerability Identification
• Control Analysis
• Likelihood Determination
• Impact Analysis
• Risk Identification
• Control Recommendation
• Results Documentation
• Implementation
• Monitoring

10.  List any five reasons that attract organizations to ERP? ( Marks: 5 )
Answer:
1. Planning the operations
2. Integrated customer related information – order tracking with customer database, inventory
and shipment at different locations.
3. Standardized HR information – A company with multiple business units will require a
comprehensive and all-encompassing method of locating employees and communicating with
them.
4. Integrated financial information and analysis.
5. Monitoring the operations including those of sub-vendors and manufacturers

11.  conceptual Q about threat 5 marks
12.  BHOOL GAI..



Comments

Popular posts from this blog

CS614 Quiz No.4 Shared by Princess (solved), Spring 2014

  “What means What”. The phrase refers to: Select correct option:  Meta data  External data Transformed data Internal representations Question # 2 of 10 Which of the following is NOT one of the activities of “Maintenance and Growth” phase in Kimball’s DWH development approach? Select correct option: Education Technical Education Program Support  Interface Deployment                 Question # 3 of 10 Horizontally wide data means: Select correct option: Dataset has large no. of attributes Dataset has large no. of records Dataset has attribute skews Dataset has partitioning skews                 Question # 4 of 10 Which of the following is NOT one of the top-10 mistakes that should be avoided during DWH development? Select correct option: Not interacting directly with end ...

CS614 Quiz No.4 Shared by MT Khan (Solved)

Question # 1 of 10 ( Start time: 09:04:39 PM ) Total Marks: 1 A typical cycle of implementing the change in DWH comprises of the sequence: Select correct option: Production -> QA -> Development Development-> QA -> Production(CORRECT) Development -> Production -> QA Production -> Development -> QA Question # 2 of 10 ( Start time: 09:05:16 PM ) Total Marks: 1 Vertically wide data means: Select correct option: Dataset has large no. of attributes Dataset has large no. of records(CORRECT) Dataset has attribute skews Dataset has partitioning skews Question # 3 of 10 ( Start time: 09:05:43 PM ) Total Marks: 1 In ___________ phase of kimballs approach, we identify the components needed now and in future. Select correct option: Requirement definition Architectural design Product development Analytical application development Question # 4 of 10 ( Start time: 09:06:56 PM ) Total Marks: 1 Technical architecture design supports the communicat...

CS301 Current Finalterm Paper Spring 2014 Shared By M. Waleed

My Tday's Cs301 Paper: Mcq's Are From Moaz And Some Are From Handouts. Subjective Is From Moaz Majority One. 1- The Image Segmentation Define? 2- The Maximum Number Level Of Nodes In Binary Tree 3-The Iteration Array Have To Sort. 4- The Hapified Array Have To Solved 5- The Algorithm Of Binary Seaoh Tree 6-Sara Arrays Wala He Tha Ya Heap Wala. 7-....Wala Wala Wala...