We have been working very hard since 2009 to facilitate in your learning Read More. We can't keep up without your support. Donate Now.


+ Link For Assignments, GDBs & Online Quizzes Solution


+ Link For Past Papers, Solved MCQs, Short Notes & More

Assignment No. 02
Fall 2015
Information Systems CS507
Total Marks: 20
Due Date: 10-12-2015
Objective: (Understanding of Organizational information systems)
Please read the following instructions carefully before submitting assignment:
 Assignment should be submitted on VU-LMS on or before the due date.
 Assignment will not get any credit (zero marks) if it is copied (from other student or
internet) or submitted after due date.
 Assignment should be in Microsoft Word File.
 Assignment sent via Email will not be accepted.
 If the submitted assignment does not open or file is corrupt, it will not be graded.
For any query about the assignment, contact at cs507@vu.edu.pk
Components of Computer based Information System CBIS are used by many organizations for
efficiently processing their daily transactions and saving their processing time. As you are well
aware of the fact that Computer based Information System is the backbone of any organization.
You are required to visit any organization or search the internet and answer the following
1. How does the Information system authenticate its users?
2. What are the measures adopted to make their system fault tolerant?
3. Are the business operations processed through one location or more than one location?
4. Whether they are using web application or Desktop Application?
Note: Answer must be short and precise. Copied answer through any source will get zero
Marks. Moreover, a good assignment submitted by the student will be declared as excellent
And will be acknowledged.

+ http://bit.ly/vucodes (Link for Assignments, GDBs & Online Quizzes Solution)

+ http://bit.ly/papersvu (Link for Past Papers, Solved MCQs, Short Notes & More)

+ Click Here to Search (Looking For something at vustudents.ning.com?)

+ Click Here To Join (Our facebook study Group)

Views: 4781


Replies to This Discussion

Shahid M.Com please upload it in word file

Dear brother kya hall hai aap ne vustudent ko solution deny start kar dye

lecture number 8 dnt tell the real answers so plz just hint the ans of the Qs.. any jenous???


pl help any one?

idea solution

1. How does the Information system authenticate its users?


Information system is very popular because information system is very easy to authenticate to its user. User of information system having a password, pin, biometric to Information system and not used any person and data also is saved on the system. Authenticate is the method of the subject identity. When issuing identification value should non-descriptive of the users position or task. The users different task used authenticate to the system of example, biometric, passwords, cryptography cognition, passwords finger prints etc. The user log in into the IS when correct ID and passwords provides than Is Authenticates to its user.

2. What are the measures adopted to make their system fault tolerant?


Fault tolerant discuses a computer system or component design ends so that in the event that a component fails, a backup component or procedure can immediately take its place with no loss of service. Fault tolerance can be provided with software or embedded in hardware or provided by some combination.  In the software implementation, the operating system provides an interface that allows a programmer to check point critical data at pre-determined points with in a transaction. In the hardware implementation programmer does not need to be wear of the fault tolerant capabilities of the machine. At a hardware level fault tolerance is achieved by deplaning each hardware component. Disks are mirrored. Multiple processors are lock stepped together and their outputs are compared for correction.

3. Are the business operations processed through one location or more than one location?


The business operations processed one or more locations because business is very rapidly to increase in the different locations to long run of the businesses in the market as well. The business operations processed through one location or more than one because for the sake of business expend. The business operations are better performed the function in the market and good technology used in the business the operations processed. The business good information system use in the business to expand of the business and Better facility provides to the Clients in the dealing of the purchase. The business operations are very processed through one locations or more than other location because business operations is good and better performs in the markets. The business good information Used in the business operations to performed the task of the business operations.

4. Whether they are using web application or Desktop Application.


A small business might be tempted to save money by simple running a server operating system on a desk top computer but this is not a replacement for real server hardware. A desktop system typically runs a user friendly operating system and desktop application to facilitate desktop oriented tasks. Because a server is engineered to manage, store, send and process data 24 hour a day it has to be more reliable than a desktop computer and offers a variety of feachers and hardware not typically used in the average desktop computer. Web based interfaces for data bases need to be designed because of multimedia objects. Desktop application has traditionally been limited by the hardware on which they are run. They must be developed for and installed on a particular operating system, and may have strict hardware requirements that must be met to ensure that they function correctly as well.

best of luck all student 



This a wrong direction solution. 1st understand the nature of Q what teacher is demanding. Dont teach guide tell the process of thing how it work. your just elaborating the question details....

You are right. Its wrong solution. It just a informative solution.

We should choose any organization name and then answer these questions. 

bro its clearly written that visit organization or from internet.............

chilll and type the same...............its correct solution

Jamal Ahmed Khan

ap rahna dean nakki k wasa bi koi zamanna hi ni ha na do solution to sab maang raha hota guide karo to phr kahta wrong ha agar ap ko pata ha k sahi kon sa ha to phr khud kar lya kariyan disucssion main kya karna ata han ....

:O i said ap ka solution sahi hai guide line ke liyee...........kya howa....kuch ghalath kaha?

no u say right Jamal Ahmed Khan

Anaya and shoaib hussain

ap dono ko kya lagta ha main sab ko real solution provide karun gi kabi ni just hint and idea diya ha 

and ap dono k lya ha uper deakhan likha hua ha idea solution ya ni kaha k pakki pakyi kheer ha aur kha lean i hope u understand ...


© 2020   Created by +M.Tariq Malik.   Powered by

Promote Us  |  Report an Issue  |  Privacy Policy  |  Terms of Service