Beruflich Dokumente
Kultur Dokumente
Q2. (a) What are the various key factors to be considered. in implementing Business Process
Management (BPM) in an enterprise ? (4 marks)
(b) What are the major reasons for failure of Business Process Management System (BPMS)? (4 marks)
Q3. (a) What is cloud computing ? Describe any three types of clouds in cloud computing environment.
(4 marks)
(b) What is mobile computing ? What are the three major concerns related to mobile computing ? (4
marks)
4. (a) What is Bus Topology ? List its two advantages and two disadvantages. (3 marks)
(b) What do you mean by threat and vulnerability ? Explain any three facts responsible for occurrence of
vulnerabilities in the software. (5 marks)
Q5 (a) Briefly explain the two main approaches to establish access controls in Software Systems. (4
marks)
6. (a) List out different types of delivery channels through which information is delivered to the user. (4
marks)
(b) Briefly explain Grid Computing. What are possible reasons of using grid computing ? (4 marks)
Q4 (a) Which network topology can be used in case of Military Installations With a very small number of
nodes and why it should be used ? List advantages and disadvantages of such network topology. (4
marks)
(b) What is Accounting information System (AIS) ? Briefly describe the key components of AIS. (4 marks)
(b) Explain the pre-requisites of ACID Test for any Transaction Processing System (TPS). (4 marks)
(b) What are the major process controls, which should be enforced through front end application
system, to have consistency in the control process? (4 marks)
NOVEMBER 2015
Q1 Answer .the following questions in brief. (2 marks * 5)
(a) Mention the challenges in implementing. Business Process Automation
(b) Distinguish between Cache Memory and Virtual Memory
(e) In what way a Switch is different from a Router in the' computer networks?
(d) What are the key aspects to- be considered in implementing e-commerce ?
(e) Define `On-line processing' and 'Real-time processing'.
Q4 (a) Mention the two categories of encryption/decryption methods. What are two basic approaches
to encryption? (4 Marks)
Q5(a) What is meant by a “Decision Support System” ? Give a brief description of its component. (4
Marks)
(b) What is meant by `controls' in BPA? What are their major objectives? (4 Marks)
Q2 (a) Describe any four reasons why documentation is important to Information Systems. (4 marks)
(b) Discuss the types of Data Flow Diagrams (DFDs). Also briefly mention the major components of DFD.
(4 marks)
3. (a) Write any 8 Information Systems Control procedures covering the access safeguards over
computer programs. (4 marks)
(b) Define the term 'Cloud Computing Architecture'. Explain the two parts of Cloud Computing
Architecture. (4 marks)
Q4 (a) What are the characteristics of Star Network? Write any two advantages and two disadvantages
of Star Network. (4 marks)
(b) What is the basic objective for providing network security? Explain the major functions and services
performed by the Physical Layer (Layer 1) of OSI Model of Network Architecture. (4 marks)
5. (a) What do you mean by 'Frame Based Expert System'? Also explain the various components of
Executive Information System (EIS). (4 marks)
(b) Explain the 'Dashboards' and 'Scorecards' as tools of business Intelligence. (4 marks)
6. (a) Describe the Information Systems Management Controls usually performed by Top Management
(4 marks)
(b) Discuss the constraints that need to be taken into consideration while developing a secured Grid
Architecture. (4 marks)
Q2 (a) Describe any four output Controls that have to be enforced both in a batch-processing
environment as well as in an online environment. (4marks)
(b) State and describe any two commercial applications of Artificial Intelligence. (4marks)
Q3 (a) Describe how the Business Community is benefitted by adopting Information Technology based
CRM process. (4marks)
Q4 (a) Briefly describe the four stages of processing Credit Card transactions. (4marks)
(b) Explain the Concept of Virtualization. Enumerate any 2 major applications of visualization. (4marks)
Q6. (a) What is a Data Flow Diagram. Explain the four major components of extra Data Flow Diagram.
(4marks)
(b) Describe the Wireless technologies that have evolved and widely used in modern day computerized
environment. (4marks)
Q2 A company is selling three types of products. Namely, A. B and C to two different types of customers
viz dealers and retailers. To promote the sales the company is offering the following discounts:
(I) 10% discount is allowed on Product A, irrespective of the category of customers and the value of
order.
(ii) On product B. 8% discount is allowed to retailers and 11% discount to dealers. irrespective of the
value of order.
(iii) On product C. 15% discount is allowed to retailers irrespective of the value of order and 20%
discount to dealers if the value of order is minimum of t 10,000.
Draw a flowchart to calculate the discount for the above policy.
Q3 (a) Explain the different types of feasibility study done in the System Investigation phase of System
Development Life Cycle (SDLC).
(b) Explain any four advantages of using a Data Base Management System
(DBMS).
4. (a) What are the characteristics of Local Area Networks ?
(b) What are the facts responsible for occurrence of vulnerabilities in the software ?
NOVEMBER 2017
Q2 (a) What an enterprise has to do to manage its information in an appropriate manner? Also,
mention any four operations that can be carried out with the help of Data Base Management
System (DBMS). (4 marks)
(b) What its Android? Discuss its significance. (4 marks)
Q3 What is meant by ‘Centralized Computing’ (CC) and Decentralized Computing’ (DC) in a network
computing system? In what manner the CC is considered better than the DC? (4 marks)
(b) What is meant by an Intrusion detection system? Discuss its various types. (4 marks)
Q5 (a) What are the phases of Program development life cycle? (4 marks)
(b) List out the application areas of Grid Computing. (4 marks)
Q6 (a) Draw a flow chart to incorporate for the following steps: (4 marks)
L1 N=1
L2 PRINT N
L3 N=N*(N+1)
L4 STOP when N exceeds 100
L5 GOTO L2
Note that in step L3, ‘x’ denotes multiplication sign.
MAY 2018