Question Papers of MSc IS I Yr. II sem. |
1.Cryptography |
2.Information Systems Control And Audit |
3.DataWare Housing and Data Mining |
4.Wireless Application Protocol |
5.Software Project Management |
1. Answer all the following in brief:--
(a)Digital Signature.
(b)Firewall.
(c)Pseudo Random Numbers.
(d)Encryption Functions.
(e)Hash Function.
(f)Discrete Logarithms.
(g)Authentication.
(h)Hierarchical Key Control.
(i)Secret Keys.
(j)Key Ring.
2.
(a)Differantiate between attacks, services and mechanisms.
(b)Explain S-DES functioning.
1. Answer all the following in brief:--
(a)Computer Error Costs.
(b)Evidence collection.
(c)Privacy Control.
(d)Change Over Plan.
(e)Prototyping Approach.
(f)Cryptographic Control.
(g)Recovery Plan.
(h)Response Time.
(i)Data Input.
(j)Report Collection Controls.
2.
(a)What is "sub-system factoring" ? On what basis should an auditor do subsystem factoring?
(b)What types of security threats are involved in security of information assets?
1. Answer all the following in brief:--
(a)HOLAP.
(b)OWB.
(c)Fact tables.
(d)Metadata.
(e)Triggers.
(f)RI(Reference Integrity).
(g)Bitmap Indexes.
(h)Index-Organized Tables(IOTs).
(i)Table Spaces.
(j)MOLAP.
2.
(a)Write a note on Bill Inmon description of Data Warehouse.
(b)Discuss the process of normalization.
1. Answer all the following in brief:--
(a)WML skeleton.
(b)Binary Extensible Markup Language.
(c)Push Messaging.
(d)Mobile Internet.
(e)WTAI.
(f)Bit Error Rate.
(g)Value Chain.
(h)Content Provider.
(i)Task and Link tags.
(j)MIME.
2.
(a)Where does Mobile Internet actually fit in a daily life and how ? Explain.
(b)Explain the Mobile Internet value chain.
1. Answer all the following in brief:--
(a)Stakeholders.
(b)RAD.
(c)Parkinson's Law and Brook's Law.
(d)Activity Float.
(e)Group Desicion making.
(f)Frame work.
(g)Cost monitoring.
(h)Contractors.
(i)Leadership.
(j)Decision making.
2.
(a)Explain about stepwise overview of project planning.
(b)Discuss software projects verses other types of projects.