CS507 FINAL TERM PAPERS VU FALL 2011 _all Latest Quizes in One Mega File _solved by Binish Awais

Embed Size (px)

Citation preview

  • 8/3/2019 CS507 FINAL TERM PAPERS VU FALL 2011 _all Latest Quizes in One Mega File _solved by Binish Awais

    1/13

    CS507 _FALL 2011

    MEGA FILE OF QUIZES

    LATEST ALL QUIZES SOLVED BY

    BINISH AWAIS

    me: While developing software object oriented analysis focuses on__Select correct option:

    Incremental approachModular approachTraditional approachDerived approach

    Object-oriented programming provides a modular approach forsoftware design.

    Question # 2 of 10 ( Start time: 09:25:29 PM ) Total Marks: 1_____________ refers to the characteristics or properties of an object.Select correct option:

    MethodsOperationsAttributesStatusAttributes describe the properties of an object.

    The interface is implemented by______

    Select correct option:

    SignaturesClassesMethodsObjects

    The implementation's signature must match the interface member's signature.

    Question # 4 of 10 ( Start time: 09:27:37 PM ) Total Marks: 1______________are the key people who will have to ensure that security is effectiveand smoothly operatedSelect correct option:

    IS security professionalsexecutive managementtechnology providersusers

  • 8/3/2019 CS507 FINAL TERM PAPERS VU FALL 2011 _all Latest Quizes in One Mega File _solved by Binish Awais

    2/13

    Executive management has a responsibility to ensure that the organization provides allusers with a secure information systems environment. Importance for security should besponsored by the senior management. This would make employees/users of IS, feel theimportance of secure environment in which the IS worksand operates un-tampered.

    Question # 5 of 10 ( Start time: 09:28:50 PM ) Total Marks: 1Which of the following are responsible for providing independent assurance tomanagement on the appropriateness of the security objectives?Select correct option:

    Information Systems AuditorsExecutive ManagementSecurity Managers

    Data owners

    Information Systems Auditors - responsible for providing independent assuranceto management on the appropriateness of the security

    Question # 6 of 10 ( Start time: 09:29:20 PM ) Total Marks: 1It is useless to test the validity of the flowchart.

    Select correct option:

    TrueFalse

    Like every other methodology, flow charts also have a set of recommended practices forflow charts: In drawing a proper flowchart, all necessary steps that are a part of process should belisted out in logical order. The flowchart should be clear, neat and easy to follow. There should not be any roomforambiguity in understanding the flowchart.

    It is useful to test the validity of the flowchart.

    Question # 7 of 10 ( Start time: 09:30:22 PM ) Total Marks: 1____________ time is saved through an error free designed system.Select correct option:

  • 8/3/2019 CS507 FINAL TERM PAPERS VU FALL 2011 _all Latest Quizes in One Mega File _solved by Binish Awais

    3/13

    DeploymentDevelopmentConfigurationTesting Binish Awais

    Quiz Start Time: 09:24 PM Time Left 89sec(s)

    Question # 8 of 10 ( Start time: 09:30:55 PM ) Total Marks: 1Which of the following is the outcome of Object Oriented analysis?Select correct option:

    System interfacesIntegrity constraints

    Completeness constraintsSystems conceptual model

    Question # 9 of 10 ( Start time: 09:31:32 PM ) Total Marks: 1Temporal CSFs in an organization, results from_______Select correct option:

    Economic changesTechnological changesInternal needs and changes

    Environmental changesTemporal CSF's resulting from internal organizational needs and changes

    Question # 10 of 10 ( Start time: 09:32:27 PM ) Total Marks: 1The virus or bug being installed to corrupt data or software might create BAD SECTORSon the hard drive, leading to its preferable removal from the computer is an example ofthe followingSelect correct option:

    Logical ThreatPhysical Threat

    option a and bNone of above options

    Logical Threat

    This refers to damage caused to the software and data without any physical damage to the

    computers. Consequently there can be a situation where the damage of data or software may

    render the hardware itself unusable. For example the virus or bug being installed to corrupt data

  • 8/3/2019 CS507 FINAL TERM PAPERS VU FALL 2011 _all Latest Quizes in One Mega File _solved by Binish Awais

    4/13

    or software might create BAD SECTORS on the hard drive, leading to its preferable removal

    from the computer.

    Question # 1 of 10 ( Start time: 09:59:31 PM ) Total Marks: 1Operations are usually called via ______Select correct option:

    MethodsFunctionsSignaturesInterfacesThese operations are usually supported via the ioctl method,

    Question # 2 of 10 ( Start time: 10:00:28 PM ) Total Marks: 1MIS uses duplication of components and data to cope with systems failures?Select correct option:TrueFalseMC100201155 : Syed Javed Munawar

    Quiz Start Time: 09:59 PMTime Left 89sec(s)Question # 3 of 10 ( Start time: 10:01:50 PM ) Total Marks: 1Measuring technical assessment of a computing system is known as:Select correct option:security plansecurity measuressecurity auditsecurity lapseQuestion # 4 of 10 ( Start time: 10:02:54 PM ) Total Marks: 1In ERD there are five types of Attributes associated with an entitySelect correct option:TrueFalse

    Question # 5 of 10 ( Start time: 10:03:52 PM ) Total Marks: 1Bug is caused by improper application of programming logic.Select correct option:TrueFalse

    Virus vs. BugBug is an internal malfunction of the software. It is an unintentional fault ina program. It is an

  • 8/3/2019 CS507 FINAL TERM PAPERS VU FALL 2011 _all Latest Quizes in One Mega File _solved by Binish Awais

    5/13

    incorrect functioning of a particular procedure in a program. Thisis caused by improper

    application ofprogramminglogic.

    Question # 6 of 10 ( Start time: 10:05:04 PM ) Total Marks: 1Data travels across the internet through several levels of networks until it reaches itsmiddle point.Select correct option:TrueFalse

    Question # 7 of 10 ( Start time: 10:05:38 PM ) Total Marks: 1Tricking people into revealing their password by pretending to be legitimate users ormembers of a company in need of information is calledSelect correct option:Social EngineeringSnoopingSpoofingSpamming

    Question # 8 of 10 ( Start time: 10:06:40 PM ) Total Marks: 1Providing independent assurance to management regarding the appropriateness of thesecurity objectives is the responsibility of_______.Select correct option:Information systems auditorsData ownersProcess ownersEnd users

    Question # 9 of 10 ( Start time: 10:07:50 PM ) Total Marks: 1Software that is developed through OOAD is easy to test due to the use of_______.Select correct option:Real time modelingUsability featuresModular approachProcedural approach

    Question # 10 of 10 ( Start time: 10:09:14 PM ) Total Marks: 1The use of software routines to tie up the computer hosting a Web site that denieslegitimate visitor's access is called :Select correct option:denial of servicehacking.SpoofingSniffing

    Question # 1 of 10 ( Start time: 10:10:52 PM ) Total Marks: 1KPI measures the _______Select correct option:Achievements

  • 8/3/2019 CS507 FINAL TERM PAPERS VU FALL 2011 _all Latest Quizes in One Mega File _solved by Binish Awais

    6/13

    SalesRisk factorInternal changes

    Question # 2 of 10 ( Start time: 10:12:23 PM ) Total Marks: 1In structured analysis & design we made proper documentation according to the

    standardsSelect correct option:TrueFalse

    Question # 3 of 10 ( Start time: 10:13:12 PM ) Total Marks: 1MIS uses duplication of components and data to cope with systems failures?Select correct option:TrueFalse

    Question # 4 of 10 ( Start time: 10:14:34 PM ) Total Marks: 1A/an_

    ________

    is a set of entities of the same type that share the same properties.Select correct option:AttributeEntity SetRelationEntity

    Question # 5 of 10 ( Start time: 10:15:02 PM ) Total Marks: 1A well designed system also helps in early detection of problems in critical areas.Select correct option:TrueFalse

    Question # 6 of 10 ( Start time: 10:15:50 PM ) Total Marks: 1The ability for different classes of objects to respond to identical messages is ______Select correct option:InheritanceEncapsulationGeneralizationPolymorphism

    Question # 7 of 10 ( Start time: 10:17:13 PM ) Total Marks: 1The mechanism by which the more specific class in a generalization includes theattributes and operations of general class is called ___Select correct option:InheritanceEncapsulationPolymorphismGeneralization

  • 8/3/2019 CS507 FINAL TERM PAPERS VU FALL 2011 _all Latest Quizes in One Mega File _solved by Binish Awais

    7/13

    Question # 8 of 10 ( Start time: 10:18:38 PM ) Total Marks: 1_____ is usually identified by the phrase "is a kind of.Select correct option:InheritanceClassObject

    Instance

    Question # 9 of 10 ( Start time: 10:19:10 PM ) Total Marks: 1It is useless to test the validity of the flowchart.Select correct option:TrueFalse

    Question # 10 of 10 ( Start time: 10:19:44 PM ) Total Marks: 1Process indicates:Select correct option:

    ProcedureFlowActivityResult

    Question # 1 of 10 ( Start time: 10:26:04 PM ) Total Marks: 1A category of objects_____ the same attributes, operations and relationships.Select correct option:

    InheritShareCollaborateUse

    Question # 2 of 10 ( Start time: 10:27:22 PM ) Total Marks: 1Which of the following view gives a quick understanding of the business processes andflows?Select correct option:

    ProceduralAbstractInternalDiagrammatic

    Question # 3 of 10 ( Start time: 10:27:52 PM ) Total Marks: 1Testing is easy for the software that is developed using OOAD due to use of_____Select correct option:

    Real time modeling

  • 8/3/2019 CS507 FINAL TERM PAPERS VU FALL 2011 _all Latest Quizes in One Mega File _solved by Binish Awais

    8/13

    Usability featureConceptual modelingModular approach

    Question # 4 of 10 ( Start time: 10:29:14 PM ) Total Marks: 1The protection of information from unauthorized disclosure explains the concept ofsystem and data____________.Select correct option:

    CompletenessConsistencyReliabilityConfidentiality

    Question # 5 of 10 ( Start time: 10:30:15 PM ) Total Marks: 1Temporal CSFs in an organization, results from_____Select correct option:

    Economic changesInternal needs and changesTechnological changesEnvironmental changes

    Question # 6 of 10 ( Start time: 10:31:09 PM ) Total Marks: 1A well designed system also helps in early detection of problems in critical areas.Select correct option:

    TrueFalse

    Question # 7 of 10 ( Start time: 10:31:49 PM ) Total Marks: 1In flow chart terminator indicates from where the process starts & where its end.Select correct option:

    TrueFalse

    Question # 8 of 10 ( Start time: 10:33:09 PM ) Total Marks: 1Providing access to the data and behavior is through an objects interface iscalled______

  • 8/3/2019 CS507 FINAL TERM PAPERS VU FALL 2011 _all Latest Quizes in One Mega File _solved by Binish Awais

    9/13

    Select correct option:

    PolymorphismEncapsulationMessage passingInheritance

    Question # 9 of 10 ( Start time: 10:34:12 PM ) Total Marks: 1_____ is a form of communication in object oriented programmingSelect correct option:

    Inheritancedata communicationMessage passingchatting

    .

    Question # 1 of 10 ( Start time: 10:42:10 PM ) Total Marks: 1Checking of program for logical errors is called debuggingSelect correct option:

    TrueFalse

    Question # 2 of 10 ( Start time: 10:42:42 PM ) Total Marks: 1

    Which of the following refers to damage caused to the software and data without anyphysical damage to the computers?Select correct option:

    Logical ThreatPhysical ThreatOption a and bNone of above options

    Question # 3 of 10 ( Start time: 10:43:24 PM ) Total Marks: 1The study of business problem domain used to recommend improvements and specify

    the business Requirements for the solution is called:Select correct option:

    System AnalysisSystem DesignRisk ManagementRisk Analysis

  • 8/3/2019 CS507 FINAL TERM PAPERS VU FALL 2011 _all Latest Quizes in One Mega File _solved by Binish Awais

    10/13

    Question # 4 of 10 ( Start time: 10:44:45 PM ) Total Marks: 1A fixed Internet address creates a prime target for hackers

    Select correct option:

    TrueFalse

    Question # 5 of 10 ( Start time: 10:45:20 PM ) Total Marks: 1The purpose of data flow diagrams is to provide a ------- between users and systemsdevelopersSelect correct option:

    Linking bridge

    Empty spaceData FlowsConnection link

    Question # 6 of 10 ( Start time: 10:46:27 PM ) Total Marks: 1The ability for different classes of objects to respond to identical messages is ____Select correct option:

    InheritanceEncapsulation

    GeneralizationPolymorphism

    Question # 7 of 10 ( Start time: 10:47:45 PM ) Total Marks: 1After the process of risk assessment has been completed, the next process is that ofrisk____________.Select correct option:

    DetectionCriticality analysis

    ScrutinyMitigation

    Question # 8 of 10 ( Start time: 10:48:35 PM ) Total Marks: 1A threat is some action or event that cannot lead to a lossSelect correct option:

  • 8/3/2019 CS507 FINAL TERM PAPERS VU FALL 2011 _all Latest Quizes in One Mega File _solved by Binish Awais

    11/13

    FalseTrue

    Question # 9 of 10 ( Start time: 10:48:57 PM ) Total Marks: 1Internet provider is an example of technology provider.Select correct option:

    TrueFalse

    Question # 10 of 10 ( Start time: 10:49:50 PM ) Total Marks: 1In drawing a proper flowchart, all necessary steps that are a part of process should belisted out in______________ order.Select correct option:

    LogicalPhysicalRandomTop to Bottom

    Question # 1 of 10 ( Start time: 10:50:37 PM ) Total Marks: 1______________are the key people who will have to ensure that security is effectiveand smoothly operatedSelect correct option:

    IS security professionalsexecutive management

    technology providersusers

    Derived attribute is information provided on the basis of________ attribute.Select correct option:

    SameDifferentUniqueNone of the above

    refer to the sudden increase in power supply.

    Select correct option:

    SagsBrown outsSpikesBlack outDropper is an example of Trojans

    Select correct option:

  • 8/3/2019 CS507 FINAL TERM PAPERS VU FALL 2011 _all Latest Quizes in One Mega File _solved by Binish Awais

    12/13

    TrueFalse

    ___________ refers to the characteristics or properties of an object.Select correct option:

    MethodsOperationsAttributesStatus

    Question # 7 of 10 ( Start time: 10:56:44 PM ) Total Marks: 1In the context of information security, data cannot be modified without authorization isknown as_____.Select correct option:

    users rights

    privilegesintegrityprivacy

    Question # 8 of 10 ( Start time: 10:58:13 PM ) Total Marks: 1Which one of the following computer systems uses duplication of components and datato cope with systems failures?Select correct option:

    Fault-tolerant systemsEISMIS

    OIS

    Question # 9 of 10 ( Start time: 10:59:42 PM ) Total Marks: 1______________helps organization in gaining competitive advantage in the use ofprocesses, effectiveness and efficiency.Select correct option:

    BPRCSFMISSPR

    Question # 10 of 10 ( Start time: 11:00:47 PM ) Total Marks: 1Inheritance can be defined in terms of_____Select correct option:

    Has kind ofIs based onIs similar toIs kind of

  • 8/3/2019 CS507 FINAL TERM PAPERS VU FALL 2011 _all Latest Quizes in One Mega File _solved by Binish Awais

    13/13

    Question # 1 of 10 ( Start time: 11:03:04 PM ) Total Marks: 1In structured analysis & design we made proper documentation according to thestandardsSelect correct option:

    TrueFalse

    Pg#106

    Structured analysis and design follows a set of good practices and generally accepted standards.

    ProperDocumentation of the system is made by following standard rules.

    Different levels and types of ---------------------- may be required to address the risks toinformationSelect correct option:

    SecurityAuthenticityIntegrityNone of any options

    main source of bugs in computer programs is the complexity of decision-making code.

    TrueFalse

    The main source of bugs is the complexity of decision-making code._______ has no way to replicate automatically

    VirusWormBugTrojan h

    Trojan horses have no way to replicate automatically