Skip to main content

::: vuaskari.com ::: CS507 Subjective Part


CS507 Final Term Subjective PArt

Kamran Shahzad (Kamra Cantt):


ü      Define Business Continuity Planning? 2

Ans:

"Business Continuity Planning (BCP) is a methodology used to create a plan for how an organization will resume partially or completely interrupted critical functions within a predetermined time after a disaster or disruption."

"BCP is the process where by the institutions ensures the maintenance and recovery of operations including services to customers when confronted with adverse events such as natural disasters, technology failure, human error and terrorism."

 

ü      Define Class? 2

Ans:

A class is defined as

"The purpose of a class is to specify a classification of objects and to specify the features that characterize the structure and behavior of those objects."

 

A class is any uniquely identified abstraction, that is, model of a set of logically related objects that share the same or similar characteristics. The purpose of a class is to specify a classification of objects and to specify the features that characterize the structure and behavior of those objects.

 

ü      Identify types of change management? 2 marks

Ans:

Change management

Change management means to plan, initiate, realize, control, and finally stabilize change processes on both, corporate and personal level. Implementation of ERP or any other integration software needs commitment and proper management. Managing change in implementation projects has become a serious concern for the management.

 

Types of Change

1. Organizational Development: This is the more gradual and evolutionary approach to change. It bases on the assumption that it is possible to align corporate objectives with the individual employees' objectives. In practice, however, this will rarely be possible.

 

2. Reengineering: This is known as corporate transformation or business transformation. It is the more radical form of change management, since it challenges all elements of processes or structures that have evolved over time.

 

ü      List down any three new dimensions of MKIS? 2

Ans:

New Dimensions in MKIS

Through extensive use of computers in marketing field, newer concepts are emerging in marketing field, which are revolutionizing the way customers were dealt with.

·        Customer Relationship management (CRM)

·        Sales Force Automation (SFA)

·        Call Centres

 

ü      What are the foundation concepts of Business Process of re-engineering? 3

Ans:

Business Process Reengineering

 "Reengineering is the fundamental rethinking and redesign of business processes to achieve dramatic improvements in critical, contemporary measures of performance, such as cost, quality, service and speed."

(Hammer & Champy, 1993)

 

The concept of business process reengineering can be understood in the following manner.

 

"The analysis and design of workflow and processes within and between organizations"

(Davenport and Short, 1990)

 

The definition adds another aspect to the definition. It extends the concept of BPR by studying the links of various procedures used by and between organizations. A number of processes undertaken within the organization may have links with external organizations either as input or output. For example, raw material purchases from suppliers are an integral part of planning, production and sales. Hence making the supplier more efficient to deliver on time becomes critical, industrial customers placing regular huge volume orders in accordance with theirs own plans. You as the supplier need this information to input into your own planning.

 

 

ü      If a company wants to update its existing information system in an economical way, what integration methods of information system will be used? 3

Ans:

Integrating systems

All systems are interfaced with one another, the input in one system automatically updating the data in the other relevant system. We thus observe simultaneous Data sharing between various systems and simultaneous execution of different business processes.

Methods of integration

Information systems can be integrated in the following ways.

• Connect Existing modules/system

• Use Supply Chain Management (SCM) Software

• Use ERP Software

 

ü      What do you understand by virus? Identify its attacking computers? 5

Ans:

Viruses

It is Software used to infect a computer. After the virus code is written, it is buried within an existing program. Once that program is executed, the virus code is activated and attaches copies of itself to other programs in the system. Infected programs copy the virus to other programs.

It may be benign (gentle) or have a negative effect, such as causing a program to operate incorrectly or corrupting a computer's memory. The term virus is a generic term applied to a variety of malicious computer programs that send out requests to the operating system of the host system under attack to append the virus to other programs.

 

Attacking Targets

Generally, viruses attack four parts of the computer.

1.      Executable program files

2.      The file-directory system, which tracks the location of all the computers files

3.      Boot and system areas, which are needed to start the computer

4.      Data files

 

ü      What do you understand by Change Management?  Discuss various types of changes? 5

Ans:

Change management

Change management means to plan, initiate, realize, control, and finally stabilize change processes on both, corporate and personal level. Implementation of ERP or any other integration software needs commitment and proper management. Managing change in implementation projects has become a serious concern for the management.

 

Types of Change

1. Organizational Development: This is the more gradual and evolutionary approach to change. It bases on the assumption that it is possible to align corporate objectives with the individual employees' objectives. In practice, however, this will rarely be possible.

 

2. Reengineering: This is known as corporate transformation or business transformation. It is the more radical form of change management, since it challenges all elements of processes or structures that have evolved over time


ü      Explain web security threats in terms of its types? 5

Ans:

There are two major classes of security threats

1. Passive Attacks

This class of network attacks involves probing for network information. These passive attacks can lead to actual active attacks or intrusions/penetrations into an organization's network. By probing for network information, the intruder obtains network information as that can be used to target a particular system or set of systems during an actual attack.

 

Types of Passive attacks

Examples of passive attacks that gather network information include the following:

• Network Analysis

• Eavesdropping

• Traffic Analysis

 

2. Active Attacks

Once enough network information has been gathered, the intruder will launch an actual attack against a targeted system to either gain complete control over that system or enough control to cause certain threats to be realized. This may include obtaining unauthorized access to modify data or programs, causing a denial of service, escalating privileges, accessing other systems. They affect the integrity, availability and authentication attributes of network security.

 

Types of Active attacks

Common form of active attacks may include the following:

Masquerading – involves carrying out unauthorized activity by impersonating a legitimate user of the system.

Piggybacking – involves intercepting communications between the operating system and the user and modifying them or substituting new messages.

Spoofing – A penetrator fools users into thinking they are interacting with the operating system. He duplicates logon procedure and captures pass word.

Backdoors/trapdoors – it allows user to employ the facilities of the operating system without being subject to the normal controls.

Trojan horse – Users execute the program written by the penetrator. The program undertakes unauthorized activities e.g. a copy of the sensitive data.

 

ü      Why distributed systems have same performance over non-distributed systems? 2

 

ü      Reasons for using distributed system?  3

 

ü      What do you think about the way Information Systems influence and organization, people and technology? 3



--
The Few, The Proud, The Askarians.



Admin Rajpoot
MBA-HR Final Semester
VU Askari





--
We say, "Be one as Pakistani Nation and grow up for Pakistan's Future". Wish you all the best. Join www.vuaskari.com,
To post to this group, send email to vuaskari_com@googlegroups.com
Visit these groups:
This (Main) Group:http://groups.google.com/group/vuaskari_com?hl=en?hl=en
MIT/MCS Group: http://groups.google.com/group/vu_askarimit?hl=en?hl=en
HRM Group: http://groups.google.com/group/askari_hrm?hl=en?hl=en
Banking Group: http://groups.google.com/group/askari_banking?hl=en?hl=en
Management: https://groups.google.com/group/vuaskari_mgt?hl=en
Marketing: https://groups.google.com/group/vuaskari_mkt?hl=en
MIS Group: http://groups.google.com/group/askari_mis?hl=en

Comments

Popular posts from this blog

Re: ::: vuaskari.com ::: CS408 - FINAL TERM SUBJECTIVE WITH REFERENCE SOLVED BY UMAIR SAULAT

GREAT WORK On Wed, Feb 20, 2013 at 11:30 PM, Umair Saulat < saulat.umair@gmail.com > wrote: CS408- Human Computer Interaction Solved Subjective Fall Semester 2012   QNo.1    it has been observed that most computer users use menu option for input instead of keyboard accelerator. What is the reason behind it? (2 Marks) Answer:- 1.        Menu options are easier to find. 2.        You don't have to memories the keys for menu option but for key board accelerators you have to memories them REF:: Handouts Page No. 127   QNo.2    Define active intervention.  (2 Marks) Answer:- Active intervention with the participant and actively probes the participant understands of whatever is being tested. REF:: Handouts Page No. 276 QNo.3    what is Ubiquitous Computing? (2 Marks) Answer:- The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indi

Updating our Google Account inactivity policy

Every day Google works hard to keep you and your private information safe and secure by preventing unauthorized access to your Google Account with our built-in security protections. And keeping you safe means having strong privacy practices across our products that minimize how long we store your personal files and any data associated with them. We want to protect your private information and prevent any unauthorized access to your account even if you're no longer using our services. Therefore, we are updating the inactivity period for a Google Account to two years across all our products and services. This change starts rolling out today and will apply to any Google Account that's been inactive, meaning it has not been signed into or used within a two-year period. An inactive account and any content in it will be eligible for deletion from December 1, 2023. What this means for you: These changes do not impact you unless you h

Learn more about our updated Terms of Service

stargthb@gmail.com On January 5, 2022, we're making some changes to our Terms of Service. These changes won't affect the way you use Google services, but they'll make it easier for you to understand what to expect from Google — and what we expect from you — as you use our services. You can review the new terms here . At a glance, here's what this update means for you: More clarity on what you can expect from Google and what we expect from you : We're providing more examples to describe the mutually respectful conduct that we expect from all our users. Improved readability : While our terms remain a legal document, we've done our best to make them easier to understand, including reorganizing some topics so that they're easier to find. If you use Family Link to manage a Google Account for someone else, please take some time to talk to them about these changes. Thank you for using Google!