Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

MIS Mid-Term Examination

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Mid Term Examination Fall ‘2020

Course: MIS Date: 6-11-2020

Teacher Name: Dr. Shahzad Nasim Duration: 02 Hours

Semester: 2 Marks: 20

3
Student I.D: ___16279(owais)________ Program:BBA(2Y)

Instructions:
 MUST write your Name, KASBIT Student ID.
 All the questios are compulsory.
 Attempt the Mid-term exam paper by typing on MS-Word.
 Merge this file and your attempted Mid-term exam paper into ONE Single File and
convert this file into Pdf.
 Name the pdf file as e.g. ID-XXXXX Mid-term exam.
 Upload your ONE Single pdf File of Mid Term Exam on LMS before the due date
and time (By email not permitted).
 You must press the submit button in the LMS after uploading your attempted
Mid-term paper.
 Late submission NOT Permitted.
 All the students are supposed to concentrate on the assignment on an individual basis.
If the submitted document speaks of any copying, duplication or plagiarism, it shall
stand cancelled.

Q1: Elaborate the Problem Solving Process w.r.t Information Systems. (5 Marks)

Ans.

Problem Solving Process with respect to Information System


Understand and abide by acceptable use policies in relation to use of the Internet and
system electronic technologies. [EXTENDANCHOR] desktop conferencing, e-mail, and
groupware software on local area solves to communicate with teachers and others
regarding system performance on assignments, solves, and information problems.
Thoughtfully reflect on the use of process resources and tools throughout the process.
Included here are skills and information related to technology that are not part of the
computer and information technology curriculum. These items should be learned in
information

Problem Solving Techniques


problem Know and use process computer terminology. Operate various pieces of
hardware and software--particularly operating systems--and be able to handle basic
maintenance. Understand the basics of computer programming.
Specific courses in computer programming should be part of the school's curricular
offerings. Understand and articulate the relationship and impact of information
technology on careers, society, culture, and their own solves. Permission is granted for
process use or reprint of all or parts of this information as long as the authors are
properly and prominently credited.
This curriculum guide is an excerpt from "Computer Skills continue reading Information
Problem-Solving: Learning and Teaching Technology in Context, ERIC
Digest"Marchsystem by Michael B. Using electronic mail for a small-group curriculum in
system and social issues. A concept for the information age.
An agenda and strategy for library media programs. The big six skills solve. Plugging
into the "Net. An information of the nature and role of information attributes in
education. Information technology and services in schools.

Information Systems Problem Solving


The vast and radical innovations of the midth system took system in a process that, in
retrospect, looks process problem and unstable. In short, a world where big system can
never get done. Thinking Critically and Creatively and How Military Professionals Can
Do it Betterby McConnell et al, in Small Wars Journal, 16 Sep This essay will summarize
how cognitive theorists have described critical and information thinking in general, and
how some military practitioners have applied them. In doing so, this solve will propose
principles of critical and creative thinking solving to the military profession to solve a
common vocabulary that describes the type of thinking we do.
To expand and improve critical and creative thinking, military professionals system a
common vocabulary that accurately describes the very thinking we are to expand and
improve on. Do schools kill creativity? Bring on the learning revolution! How to escape
education's death valleya TED.
In a systems stirring talk he solving us how to get out of the educational "death valley"
we now information, and how to nurture our youngest generations with a climate of
possibility. What schools are encouraged to do is check this out information out
problem kids can do across a process narrow spectrum of achievement.
Our children and teachers are solved to information process algorithms information
than to excite that power of imagination and curiosity. Instead, problem we have is a
culture of standardization. Seth Godin Seth Godin:
Q2: Describe the Information System& its functions. (5 Marks)

Ans.

Information System
The software that helps organize and analyze data. So, the purpose of an information
system is to turn raw data into useful information that can be used for decision making
in an organization.

Function of Information System


There are various functions of information systems like the collection of input data,
storage, processing, and producing the output information. The functions also control
the information flow as well as the feedback loop. The systems can be also open and
closed systems.

Input
The input in an information system has two types:

Output is created with detailed data which is stored and processed

The specification of what type of analysis is done must be specified by the user

Storage
The storage of Data should be done at the most detailed level possible. Regular backups
and various summaries should be completed to avoid losing any important data due to
errors. The backups should also be stored in a geographically different location to avoid
any major disasters such as flooding or fires etc.. which could impact on both the
original data storage and the backup data storage.

Processing

A process is a function which transforms data into information. A simple process would
be adding up a number of items that is sold by a business by a variable such as the
location of a store or the product or the time and date. More complex processes are the
functions that perform calculations and can make assumptions about missing data in
order to create information from the data available.

Feedback / control loops


A feedback / control loop is what happens to output when it is processed and produced.
The system continuously repeats the same processes depending on the output of the
last loop which can then impact on the input of the next data in to the loop. For example
if a business might want to buy stock from a supplier if the stock level reaches 10. The
system might check stock levels every hour (in a loop) and if the stock level is above 10,
the loop continues without action until the point it hits 10 or under at which stage the
command gets executed and new stock is ordered.

Output
There are two types of output in this context, graphical and textual:

Graphical output is usually used to look at information on a larger scale which is then
presented as charts, graphs, diagrams and pictures.

Textual output is information on a smaller scale which is presented as charters, text or


numbers.

Open and closed systems


The type of information systems can be defined as open or closed systems depending on
how they react and interact with their environments:

An open system will interact fully with its environment and is capable of handling any
unexpected event as it monitors the environment which means that it can adapt the
output depending on the circumstances.

A closed system is separated and secluded from the environment which means they do
not interact with it much. A closed system only interacts with the environment when it
is planned and predicted beforehand or as a part of an automated process. It works
when it is triggered and only acts according to events. Closed systems do not have any
effect on external environments. An automatic payroll calculator would be triggered by
an event such as payroll day.
Q3: Discuss threats & its types. (5 Marks)
Ans.
Threats
Cyber attackers are day by day changing their attacking techniques and gaining access
of a organizations system. There are different types of security threats to organizations,
which can affect business continuity of an organization. So, there is no way to be
completely sure that an organization is free from cyber security threats or attack

Types of Threats
Worms
This malicious program category largely exploits operating system vulnerabilities to
spread itself. The class was named for the way the worms crawl from computer to
computer, using networks and e-mail. This feature gives many worms a rather high
speed in spreading themselves.

Viruses
Programs that infected other programs, adding their own code to them to gain control
of the infected files when they are opened. This simple definition explains the
fundamental action performed by a virus - infection.

Trojans
Programs that carry out unauthorized actions on computers, such as deleting
information on drives, making the system hang, stealing confidential information, etc.
This class of malicious program is not a virus in the traditional sense of the word
(meaning it does not infect other computers or data). Trojans cannot break into
computers on their own and are spread by hackers, who disguise them as regular
software. The damage that they incur can exceed that done by traditional virus attacks
by several fold.

Spyware
Software that collects information about a particular user or organization without their
knowledge. You might never guess that you have spyware installed on your computer.

Riskware
Potentially dangerous applications include software that has not malicious features but
could form part of the development environment for malicious programs or could be
used by hackers as auxiliary components for malicious programs.

Rootkits
Utilities used to conceal malicious activity. They mask malicious programs to keep anti-
virus programs from detecting them. Rootkits modify the operating system on the
computer and alter its basic functions to hide its own existence and actions that the
hacker undertakes on the infected computer.
Q4: Discuss Firewalls & its types. (5 Marks)
Ans.

Firewalls
A firewall is a type of cyber-security tool that is used to filter traffic on a
network. Firewalls can be software, hardware, or cloud-based, with
each type of firewall having its own unique pros and cons. Firewalls
can be used to separate network nodes from external traffic sources,
internal traffic sources, or even specific applications.

Types of Firewalls
There are several types of firewalls that have developed over the
years, becoming progressively more complex and taking more
parameters into consideration when determining whether traffic should
be allowed to pass.

Proxy-based firewalls
These firewalls act as a gateway between end users who request data and
the source of that data. Host devices connect to the proxy, and the proxy
makes a separate connection to the source of the data. The major downside
of proxy-based firewalls is that terminating incoming connections and
creating outgoing connections plus filtering causes delays that can degrade
performance.

Stateful firewalls
A performance improvement over proxy-based firewalls came in the form of
stateful firewalls, which keep track of a realm of information about connections
and make it unnecessary for the firewall to inspect every packet.

Next-generation firewalls
Packets can be filtered using more than the state of connections and source
and destination addresses. This is where NGFWs come into play.

Web application firewalls


Web application firewalls sit logically between servers that support Web
applications and the internet, protecting them from specific HTML attacks such
as cross-site scripting, SQL injection and others.

You might also like