You are on page 1of 13

CS507 _FALL 2011 MEGA FILE OF QUIZES LATEST ALL QUIZES SOLVED BY BINISH AWAIS

me: While developing software object oriented analysis focuses on __ Select correct option: Incremental approach Modular approach Traditional approach Derived approach Object-oriented programming provides a modular approach for software design. Question # 2 of 10 ( Start time: 09:25:29 PM ) Total Marks: 1 _____________ refers to the characteristics or properties of an object. Select correct option: Methods Operations Attributes Status Attributes describe the properties of an object. The interface is implemented by ______ Select correct option: Signatures Classes Methods Objects The implementation's signature must match the interface member's signature. Question # 4 of 10 ( Start time: 09:27:37 PM ) Total Marks: 1 ______________are the key people who will have to ensure that security is effective and smoothly operated Select correct option: IS security professionals executive management technology providers users

Executive management has a responsibility to ensure that the organization provides all users with a secure information systems environment. Importance for security should be sponsored by the senior management. This would make employees/users of IS, feel the importance of secure environment in which the IS works and operates un-tampered.

Question # 5 of 10 ( Start time: 09:28:50 PM ) Total Marks: 1 Which of the following are responsible for providing independent assurance to management on the appropriateness of the security objectives? Select correct option: Information Systems Auditors Executive Management Security Managers Data owners Information Systems Auditors - responsible for providing independent assurance to management on the appropriateness of the security

Question # 6 of 10 ( Start time: 09:29:20 PM ) Total Marks: 1 It is useless to test the validity of the flowchart. Select correct option: True False Like every other methodology, flow charts also have a set of recommended practices for flow charts: In drawing a proper flowchart, all necessary steps that are a part of process should be listed out in logical order. The flowchart should be clear, neat and easy to follow. There should not be any room for ambiguity in understanding the flowchart. It is useful to test the validity of the flowchart.

Question # 7 of 10 ( Start time: 09:30:22 PM ) Total Marks: 1 ____________ time is saved through an error free designed system. Select correct option:

Deployment Development Configuration Testing Binish Awais

Quiz Start Time: 09:24 PM Time Left 89 sec(s) Question # 8 of 10 ( Start time: 09:30:55 PM ) Total Marks: 1 Which of the following is the outcome of Object Oriented analysis? Select correct option: System interfaces Integrity constraints Completeness constraints Systems conceptual model

Question # 9 of 10 ( Start time: 09:31:32 PM ) Total Marks: 1 Temporal CSFs in an organization, results from _______ Select correct option: Economic changes Technological changes Internal needs and changes Environmental changes Temporal CSF's resulting from internal organizational needs and changes Question # 10 of 10 ( Start time: 09:32:27 PM ) Total Marks: 1 The virus or bug being installed to corrupt data or software might create BAD SECTORS on the hard drive, leading to its preferable removal from the computer is an example of the following Select correct option: Logical Threat Physical Threat option a and b None of above options Logical Threat This refers to damage caused to the software and data without any physical damage to the computers. Consequently there can be a situation where the damage of data or software may render the hardware itself unusable. For example the virus or bug being installed to corrupt data

or software might create BAD SECTORS on the hard drive, leading to its preferable removal from the computer. Question # 1 of 10 ( Start time: 09:59:31 PM ) Total Marks: 1 Operations are usually called via ______ Select correct option: Methods Functions Signatures Interfaces These operations are usually supported via the ioctl method,

Question # 2 of 10 ( Start time: 10:00:28 PM ) Total Marks: 1 MIS uses duplication of components and data to cope with systems failures? Select correct option: True False MC100201155 : Syed Javed Munawar

Quiz Start Time: 09:59 PM Time Left 89 sec(s) Question # 3 of 10 ( Start time: 10:01:50 PM ) Total Marks: 1 Measuring technical assessment of a computing system is known as: Select correct option: security plan security measures security audit security lapse Question # 4 of 10 ( Start time: 10:02:54 PM ) Total Marks: 1 In ERD there are five types of Attributes associated with an entity Select correct option: True False Question # 5 of 10 ( Start time: 10:03:52 PM ) Total Marks: 1 Bug is caused by improper application of programming logic. Select correct option: True False

Virus vs. Bug Bug is an internal malfunction of the software. It is an unintentional fault in a program. It is an

incorrect functioning of a particular procedure in a program. This is caused by improper application of programming logic. Question # 6 of 10 ( Start time: 10:05:04 PM ) Total Marks: 1 Data travels across the internet through several levels of networks until it reaches its middle point. Select correct option: True False Question # 7 of 10 ( Start time: 10:05:38 PM ) Total Marks: 1 Tricking people into revealing their password by pretending to be legitimate users or members of a company in need of information is called Select correct option: Social Engineering Snooping Spoofing Spamming Question # 8 of 10 ( Start time: 10:06:40 PM ) Total Marks: 1 Providing independent assurance to management regarding the appropriateness of the security objectives is the responsibility of _______. Select correct option: Information systems auditors Data owners Process owners End users Question # 9 of 10 ( Start time: 10:07:50 PM ) Total Marks: 1 Software that is developed through OOAD is easy to test due to the use of_______. Select correct option: Real time modeling Usability features Modular approach Procedural approach Question # 10 of 10 ( Start time: 10:09:14 PM ) Total Marks: 1 The use of software routines to tie up the computer hosting a Web site that denies legitimate visitor's access is called : Select correct option: denial of service hacking. Spoofing Sniffing Question # 1 of 10 ( Start time: 10:10:52 PM ) Total Marks: 1 KPI measures the _______ Select correct option: Achievements

Sales Risk factor Internal changes Question # 2 of 10 ( Start time: 10:12:23 PM ) Total Marks: 1 In structured analysis & design we made proper documentation according to the standards Select correct option: True False Question # 3 of 10 ( Start time: 10:13:12 PM ) Total Marks: 1 MIS uses duplication of components and data to cope with systems failures? Select correct option: True False Question # 4 of 10 ( Start time: 10:14:34 PM ) Total Marks: 1 A/an_________ is a set of entities of the same type that share the same properties. Select correct option: Attribute Entity Set Relation Entity Question # 5 of 10 ( Start time: 10:15:02 PM ) Total Marks: 1 A well designed system also helps in early detection of problems in critical areas. Select correct option: True False Question # 6 of 10 ( Start time: 10:15:50 PM ) Total Marks: 1 The ability for different classes of objects to respond to identical messages is ______ Select correct option: Inheritance Encapsulation Generalization Polymorphism Question # 7 of 10 ( Start time: 10:17:13 PM ) Total Marks: 1 The mechanism by which the more specific class in a generalization includes the attributes and operations of general class is called ___ Select correct option: Inheritance Encapsulation Polymorphism Generalization

Question # 8 of 10 ( Start time: 10:18:38 PM ) Total Marks: 1 _____ is usually identified by the phrase "is a kind of. Select correct option: Inheritance Class Object Instance Question # 9 of 10 ( Start time: 10:19:10 PM ) Total Marks: 1 It is useless to test the validity of the flowchart. Select correct option: True False Question # 10 of 10 ( Start time: 10:19:44 PM ) Total Marks: 1 Process indicates: Select correct option: Procedure Flow Activity Result

Question # 1 of 10 ( Start time: 10:26:04 PM ) Total Marks: 1 A category of objects _____ the same attributes, operations and relationships. Select correct option: Inherit Share Collaborate Use Question # 2 of 10 ( Start time: 10:27:22 PM ) Total Marks: 1 Which of the following view gives a quick understanding of the business processes and flows? Select correct option: Procedural Abstract Internal Diagrammatic Question # 3 of 10 ( Start time: 10:27:52 PM ) Total Marks: 1 Testing is easy for the software that is developed using OOAD due to use of_____ Select correct option: Real time modeling

Usability feature Conceptual modeling Modular approach

Question # 4 of 10 ( Start time: 10:29:14 PM ) Total Marks: 1 The protection of information from unauthorized disclosure explains the concept of system and data ____________. Select correct option: Completeness Consistency Reliability Confidentiality

Question # 5 of 10 ( Start time: 10:30:15 PM ) Total Marks: 1 Temporal CSFs in an organization, results from _____ Select correct option: Economic changes Internal needs and changes Technological changes Environmental changes

Question # 6 of 10 ( Start time: 10:31:09 PM ) Total Marks: 1 A well designed system also helps in early detection of problems in critical areas. Select correct option: True False Question # 7 of 10 ( Start time: 10:31:49 PM ) Total Marks: 1 In flow chart terminator indicates from where the process starts & where its end. Select correct option: True False

Question # 8 of 10 ( Start time: 10:33:09 PM ) Total Marks: 1 Providing access to the data and behavior is through an objects interface is called______

Select correct option: Polymorphism Encapsulation Message passing Inheritance

Question # 9 of 10 ( Start time: 10:34:12 PM ) Total Marks: 1 _____ is a form of communication in object oriented programming Select correct option: Inheritance data communication Message passing chatting . Question # 1 of 10 ( Start time: 10:42:10 PM ) Total Marks: 1 Checking of program for logical errors is called debugging Select correct option: True False

Question # 2 of 10 ( Start time: 10:42:42 PM ) Total Marks: 1 Which of the following refers to damage caused to the software and data without any physical damage to the computers? Select correct option: Logical Threat Physical Threat Option a and b None of above options Question # 3 of 10 ( Start time: 10:43:24 PM ) Total Marks: 1 The study of business problem domain used to recommend improvements and specify the business Requirements for the solution is called: Select correct option: System Analysis System Design Risk Management Risk Analysis

Question # 4 of 10 ( Start time: 10:44:45 PM ) Total Marks: 1 A fixed Internet address creates a prime target for hackers Select correct option: True False Question # 5 of 10 ( Start time: 10:45:20 PM ) Total Marks: 1 The purpose of data flow diagrams is to provide a ------- between users and systems developers Select correct option: Linking bridge Empty space Data Flows Connection link

Question # 6 of 10 ( Start time: 10:46:27 PM ) Total Marks: 1 The ability for different classes of objects to respond to identical messages is ____ Select correct option: Inheritance Encapsulation Generalization Polymorphism

Question # 7 of 10 ( Start time: 10:47:45 PM ) Total Marks: 1 After the process of risk assessment has been completed, the next process is that of risk ____________. Select correct option: Detection Criticality analysis Scrutiny Mitigation Question # 8 of 10 ( Start time: 10:48:35 PM ) Total Marks: 1 A threat is some action or event that cannot lead to a loss Select correct option:

False True

Question # 9 of 10 ( Start time: 10:48:57 PM ) Total Marks: 1 Internet provider is an example of technology provider. Select correct option: True False Question # 10 of 10 ( Start time: 10:49:50 PM ) Total Marks: 1 In drawing a proper flowchart, all necessary steps that are a part of process should be listed out in ______________ order. Select correct option: Logical Physical Random Top to Bottom Question # 1 of 10 ( Start time: 10:50:37 PM ) Total Marks: 1 ______________are the key people who will have to ensure that security is effective and smoothly operated Select correct option: IS security professionals executive management technology providers users Derived attribute is information provided on the basis of ________ attribute. Select correct option: Same Different Unique None of the above refer to the sudden increase in power supply. Select correct option: Sags Brown outs Spikes Black out Dropper is an example of Trojans Select correct option:

True False ___________ refers to the characteristics or properties of an object. Select correct option: Methods Operations Attributes Status Question # 7 of 10 ( Start time: 10:56:44 PM ) Total Marks: 1 In the context of information security, data cannot be modified without authorization is known as _____. Select correct option: users rights privileges integrity privacy Question # 8 of 10 ( Start time: 10:58:13 PM ) Total Marks: 1 Which one of the following computer systems uses duplication of components and data to cope with systems failures? Select correct option: Fault-tolerant systems EIS MIS OIS Question # 9 of 10 ( Start time: 10:59:42 PM ) Total Marks: 1 ______________helps organization in gaining competitive advantage in the use of processes, effectiveness and efficiency. Select correct option: BPR CSF MIS SPR Question # 10 of 10 ( Start time: 11:00:47 PM ) Total Marks: 1 Inheritance can be defined in terms of _____ Select correct option: Has kind of Is based on Is similar to Is kind of

Question # 1 of 10 ( Start time: 11:03:04 PM ) Total Marks: 1 In structured analysis & design we made proper documentation according to the standards Select correct option: True False Pg#106 Structured analysis and design follows a set of good practices and generally accepted standards. Proper Documentation of the system is made by following standard rules. Different levels and types of ---------------------- may be required to address the risks to information Select correct option: Security Authenticity Integrity None of any options main source of bugs in computer programs is the complexity of decision-making code. True False The main source of bugs is the complexity of decision-making code. _______ has no way to replicate automatically Virus Worm Bug Trojan h Trojan horses have no way to replicate automatically

You might also like