Latest Activity In Study Groups

Join Your Study Groups

VU Past Papers, MCQs and More

We non-commercial site working hard since 2009 to facilitate learning Read More. We can't keep up without your support. Donate.

Overall paper was easy

Mcqs mostly from past paper

 According to ―Booch object has following three components

Both software objects and real time objects have__________

A schematic representation of a sequence of operations as in a manufacturing process or
computer program is called

components of Intrusion Detection System (IDS).

symbols of DFD and ERD , flow chart

Audit trails is used for

hackitivist

some action or event that can lead to a loss?

CSF and KPI

some thing related to privacy

masquerading, spoofing, trojan horse, virus and worm, piggybacking

subjective

Consumer-to-consumer (c2c) explain 3 mark

Logical Threat 2 mark

how IT security officer detect/monitor intrusion in the database system? 5 mark

 differentiate E commerce and E business with respect to financial transaction. 

Three symbols, connector, off page connector, predefined process

information assets 5 mark

Views: 24

Reply to This

Replies to This Discussion

Best of luck

I require MTH 302 current paper , if any body knows please share it

RSS

© 2021   Created by + M.Tariq Malik.   Powered by

Promote Us  |  Report an Issue  |  Privacy Policy  |  Terms of Service