+971 55 359 3828 vuassassins@gmail.com
Spread the love

CS507 – Information Systems

In CS507 Information Systems we have you covered with Digitized Past Papers From Fall of Mid Term and Final Term.

FINAL TERM
CS507_Final_Fall2011_Papapers_ashiq                     View     Download
CS507_Final_Term_14_papers_solved                       View     Download

2 Comments

  1. AYESHA MUMTAZ

    Define E_Learning?
    Answer :
    E-Learning
    E-Learning is the online delivery of information for purposes of education, training,
    knowledge management, or performance management. It is a web – enabled system
    that makes knowledge accessible to those who need it, when they need it – anytime,
    anywhere. E-learning is useful for facilitating learning at schools
    What is E-GOVERNMENT?
    Answer:
    41.5 E Government
    E-Government / electronic government / digital government, or online government.
    The terms refer to government’s use of information and communication technology
    (ICT) to exchange information and services with citizens, businesses, and other arms
    of government. E-Government may be applied by legislature, judiciary, or
    administration, in order to improve internal efficiency, the delivery of public services,
    or processes of democratic governance. The primary delivery models are
    1. Government-to-Citizen or Government-to-Customer (G2C)
    2. Government-to-Business (G2B) and
    3. Government-to-Government (G2G)
    What are types of IDS and explain each briefly?
    Answer:
    Types of IDS includes:
    • Signature-based: These IDS systems protect against detected intrusion patterns.
    The intrusive patterns they can identify are stored in the form of signatures.
    • Statistical-based: These systems need a comprehensive definition of the known
    and expected behaviour of systems.
    • Neural networks: An IDS with this feature monitors the general patterns of activity
    and traffic on the network and creates a database.
    How many Components of an ID is described in your course?
    Answer :
    Components of an IDS
    An IDS comprise of following components:
    • Sensors that are responsible for collecting data. The data can be in the form of
    network packets, log files, system call, traces, etc.
    • Analyzers that receive input from sensors and determine intrusive activity
    • An administrative console – it contains intrusion definitions applied by the
    analyzers.
    • A user interface
    Differenciate Deny-all philosoph and Accept All Philosophy?
    To be effective, firewalls should allow individual on the corporate network to access
    the Internet and at the same time, stop hackers or others on the Internet from
    gaining access to the corporate network to cause damage. Generally, most
    organizations can follow any of the two philosophies
    • Deny-all philosophy — which means that access to a given recourses will be denied
    unless a user can provide a specific business reason or need for access to the
    information
    resource.
    • Accept All Philosophy — under which everyone is allowed access unless someone
    can provide a reason for denying access.
    Explain following statement means ???
    ‘’ Better people mean more secure networks ‘’
    Answer:
    The shortage of trustworthy people with IT security skills is a chronic problem that is
    unlikely to ever disappear. Enough engineers and computer scientists should be
    trained in computer security skills getting people with the right technical background
    to do the work has been the biggest need of all.
    What kind of thread impact results after the threat come to happen?
    Answer:
    Threat Impact
    It is difficult to assess the impact of the attacks described above, but in generic
    terms the following types of impact could occur:
    • Loss of income
    • Increased cost of recovery (correcting information and re-establishing services)
    • Increased cost of retrospectively securing systems
    • Loss of information (critical data, proprietary information, contracts)
    • Loss of trade secrets
    • Damage to reputation
    • Degraded performance in network systems
    • Legal and regulatory non-compliance
    • Failure to meet contractual commitments

  2. Shumaila Idrees

    GDB SOLUTION 13-02-2019
    Object Oriented Design Tool is more help full and Affective. OOP is very suitable because the advantages you get is reusability, readability, modularization, separation of concern and more easier to maintain code base. You can model your problem into set of objects and functions. In procedural which are huge is size can be very hard to debug code if there are errors. If you used procedural method programming in such applications where you have to do alot of stuff which is really hard to work. In my opinion OOP is best but for beginners students structural
    method is best and after that they can jump to the OOP. Because OOP technique is more reliable and modularization.

SPIN TO WIN!

  • Try your lucky to get discount coupon
  • 1 spin per email
  • No cheating
Try Your Lucky
Never
Remind later
No thanks