CS507 – Information Systems
In CS507 Information Systems we have you covered with Digitized Past Papers From Fall of Mid Term and Final Term.
In CS507 Information Systems we have you covered with Digitized Past Papers From Fall of Mid Term and Final Term.
Define E_Learning?
Answer :
E-Learning
E-Learning is the online delivery of information for purposes of education, training,
knowledge management, or performance management. It is a web – enabled system
that makes knowledge accessible to those who need it, when they need it – anytime,
anywhere. E-learning is useful for facilitating learning at schools
What is E-GOVERNMENT?
Answer:
41.5 E Government
E-Government / electronic government / digital government, or online government.
The terms refer to government’s use of information and communication technology
(ICT) to exchange information and services with citizens, businesses, and other arms
of government. E-Government may be applied by legislature, judiciary, or
administration, in order to improve internal efficiency, the delivery of public services,
or processes of democratic governance. The primary delivery models are
1. Government-to-Citizen or Government-to-Customer (G2C)
2. Government-to-Business (G2B) and
3. Government-to-Government (G2G)
What are types of IDS and explain each briefly?
Answer:
Types of IDS includes:
• Signature-based: These IDS systems protect against detected intrusion patterns.
The intrusive patterns they can identify are stored in the form of signatures.
• Statistical-based: These systems need a comprehensive definition of the known
and expected behaviour of systems.
• Neural networks: An IDS with this feature monitors the general patterns of activity
and traffic on the network and creates a database.
How many Components of an ID is described in your course?
Answer :
Components of an IDS
An IDS comprise of following components:
• Sensors that are responsible for collecting data. The data can be in the form of
network packets, log files, system call, traces, etc.
• Analyzers that receive input from sensors and determine intrusive activity
• An administrative console – it contains intrusion definitions applied by the
analyzers.
• A user interface
Differenciate Deny-all philosoph and Accept All Philosophy?
To be effective, firewalls should allow individual on the corporate network to access
the Internet and at the same time, stop hackers or others on the Internet from
gaining access to the corporate network to cause damage. Generally, most
organizations can follow any of the two philosophies
• Deny-all philosophy — which means that access to a given recourses will be denied
unless a user can provide a specific business reason or need for access to the
information
resource.
• Accept All Philosophy — under which everyone is allowed access unless someone
can provide a reason for denying access.
Explain following statement means ???
‘’ Better people mean more secure networks ‘’
Answer:
The shortage of trustworthy people with IT security skills is a chronic problem that is
unlikely to ever disappear. Enough engineers and computer scientists should be
trained in computer security skills getting people with the right technical background
to do the work has been the biggest need of all.
What kind of thread impact results after the threat come to happen?
Answer:
Threat Impact
It is difficult to assess the impact of the attacks described above, but in generic
terms the following types of impact could occur:
• Loss of income
• Increased cost of recovery (correcting information and re-establishing services)
• Increased cost of retrospectively securing systems
• Loss of information (critical data, proprietary information, contracts)
• Loss of trade secrets
• Damage to reputation
• Degraded performance in network systems
• Legal and regulatory non-compliance
• Failure to meet contractual commitments
GDB SOLUTION 13-02-2019
Object Oriented Design Tool is more help full and Affective. OOP is very suitable because the advantages you get is reusability, readability, modularization, separation of concern and more easier to maintain code base. You can model your problem into set of objects and functions. In procedural which are huge is size can be very hard to debug code if there are errors. If you used procedural method programming in such applications where you have to do alot of stuff which is really hard to work. In my opinion OOP is best but for beginners students structural
method is best and after that they can jump to the OOP. Because OOP technique is more reliable and modularization.