You are on page 1of 9

VALLIAMMAI ENGINEERING COLLEGE

SRM Nagar, Kattankulathur- 603 203

DEPARTMENT OF INFORMATION TECHNOLOGY

Academic Year 2016-2017

QUESTION BANK-ODD SEMESTER

NAME OF THE SUBJECT INFORMATION MANAGEMENT


SUBJECT CODE IT6701
SEMESTER VII
YEAR IV
DEPARTMENT INFORMATION TECHNOLOGY
HANDLED & PREPARED BY Mr.K.Ravindran A.P(Sr.G),Mr.T.Veeramani A.P(O.G)

UNIT I
PART A
Q.No. Question Competence Level
1 Define data modeling. Remembering BTL1
2 List the types of data models. Remembering BTL1
3 Define schemas. Remembering BTL1
4 Where physical model is used? Remembering BTL1
5 Name any two sources of Business rules. Remembering BTL1
6 Define Business Rules with an example. Remembering BTL1
7 Summarize the functionalities of JDBC. Understanding BTL2
8 Describe the connection object . Understanding BTL2
9 Contrast JDBC and ODBC. Understanding BTL2
10 Discuss OLEDB. Understanding BTL2
11 Illustrate stored procedure with an example. Applying BTL3
12 Demonstrate ACID properties. Applying BTL3
13 Discover Map parameters. Applying BTL3
14 Analyse Hadoop as a Service. Analysing BTL4
15 Point out any 2 features of Hadoop Cluster. Analysing BTL4
16 Compare Map Stage and Reduce stage. Analysing BTL4
17 Explain the features of Hive. Evaluating BTL5
18 Assess Hadoop Map Reduce. Evaluating BTL5
19 Design HDFS architecture. Creating BTL6
20 Prepare a query in HiveQL. Creating BTL6

Mr.K.Ravindran A.P (S.G), Mr.T.Veeramani A.P (O.G) IT6701-IM Page 1 of 9


PART-B

Q.No. Question Competence Level


1 Tell about the JDBC in detail. Remembering BTL1
2 Explain the following SELECT statement syntax with Remembering BTL1
examples in HiveQL.
i) Computing with Columns (4)
ii) WHERE Clauses (4)
iii) GROUP BY Clauses(4)
iv) HAVING Clauses (4)
3 List the various data models in database design(16) Remembering BTL1
4 i) Define NoSQL and is it the next big trend in Remembering BTL1
databases?(8)
ii) Tabulate SQL vs NoSQL(8)
5 i) Explain Data organization in HDFS(8) Understanding BTL2
ii) Briefly explain limitations and Restrictions in Stored
procedures(8)
6 Describe the following Understanding BTL2
i) OLE DB Source (8)
ii) OLE DB Destination (8)
7 Discuss MapR converged data platform(16) Understanding BTL2
8 Illustrate SSIS Connections(16) Applying BTL3
9 i) Demonstrate Hadoop HDFS Architecture in detail(8) Applying BTL3
ii) Explain the assumption and goals in Hadoop(8)
10 Analyse various databases used in NoSQL.(16) Analysing BTL4
11 Briefly explain the following in NoSQL Analysing BTL4
i) Multiple Queries (4)
ii) Caching (4)
iii) Nesting Data (4)
iv) ACID and JOIN Support (4)
12 Explain the following in MapReduce Analysing BTL4
i) Enterprise Storage (6)
ii) Database (6)
iii) Event streaming (4)
13 Explain Hive unit testing frameworks.(16) Evaluating BTL5
14 Develop a program to establish Java Database connectivity(16) Creating BTL6

Mr.K.Ravindran A.P (S.G), Mr.T.Veeramani A.P (O.G) IT6701-IM Page 2 of 9


UNIT II
PART A

Q.No. Question Competence Level


1 Define malicious code. Remembering BTL1
2 Tell why is it hard to write secure programs? Remembering BTL1
3 Define TOCTTOU errors. Remembering BTL1
4 Define firewall. Remembering BTL1
5 Name four causes of Trapdoors. Remembering BTL1
6 Define Salami attack. Remembering BTL1
7 Give the types of Security flaws. Understanding BTL2
8 Describe the kinds of buffer overflows. Understanding BTL2
9 Give the various forms of Malicious code. Understanding BTL2
10 Discuss how a firewall management works. Understanding BTL2
11 Illustrate Signature based detection. Applying BTL3
12 Demonstrate intrusion detection system. Applying BTL3
13 Discover what type of information is protected by the Data Applying BTL3
Protection Act.
14 Point out 3 types of filtering mechanisms in firewall. Analysing BTL4
15 Analyse the meaning of personal data. Analysing BTL4
16 Compare Supervisor mode and hypervisor mode. Analysing BTL4
17 Explain Vulnerability assessment. Evaluating BTL5
18 Assess the key definitions in the Data Protection Act. Evaluating BTL5
19 Design a modern secure system for an organization. Creating BTL6
20 Prepare a scenario to safeguard the personal data. Creating BTL6

PART-B

Q.N
Question Competence Level
o.
1 Tell in detail about Remembering BTL1
i) Incomplete Mediation (10)
ii) TOCTTOU errors (6)
2 Explain the following Remembering BTL1
i) Software firewalls (8)
ii) Hardware firewalls (8)
3 i) List the kinds of Malicious code (8) Remembering BTL1
ii) Prevention of virus infection (8)
4 Briefly describe the following in Developmental Controls Remembering BTL1
i) Peer Reviews (6)
ii) Hazard Analysis (4)
iii) Testing (6)
Mr.K.Ravindran A.P (S.G), Mr.T.Veeramani A.P (O.G) IT6701-IM Page 3 of 9


5 i) Summarize the various firewall rules (8) Understanding BTL2
ii) Explain HIDS and NIDS in detail (8)
6 Describe the following Understanding BTL2
i) Buffer overflow Flaws (8)
ii) Faults (4)
iii) Failures (4)
7 Discuss the following in controls against threats(16) Understanding BTL2
i) Modularity (6)
ii) Encapsulation (4)
iii) Information hiding (6)
8 Illustrate the data protection principles in detail(16) Applying BTL3
9 i) Demonstrate the compliance with Data Security Laws (8) Applying BTL3
ii) Demonstrate the compliance with Privacy Laws (8)
10 Analyse the following in Implementing Security Defenses Analysing BTL4
i) Intrusion Detection (8)
ii) Virus Protection (8)
11 Differentiate Asymmetric Encryption with Symmetric Analysing BTL4
Encryption(16)
12 i) Classify Auditing, accounting and logging (8) Analysing BTL4
ii) Firewall to protect Systems and networks (8)
13 Explain the following in User Authentication Evaluating BTL5
i) Passwords (4)
ii) Password Vulnerability (3)
iii) Encrypted Password (3)
iv) One Time Password (3)
v) Biometrics (3)
14 i) Formulate the ways of protecting data through online Creating BTL6
privacy (8)
ii) Explain how to plan various national data protection
authorities (8)

UNIT III
PART A

Q.No. Question Competence Level


1 Define Master Data. Remembering BTL1
2 List some of the Master Data Domains. Remembering BTL1
3 Define Collaborative Authoring. Remembering BTL1
4 Discuss various MDM implementation styles. Remembering BTL1
5 Name any two MDM Architecture patterns. Remembering BTL1
6 Define Data Governance. Remembering BTL1
7 Differentiate Absolute vs. Convergent Consistency. Understanding BTL2
8 Describe universal goals of Data Governance. Understanding BTL2
9 Contrast System of Record vs. System of Reference. Understanding BTL2
10 Discuss Data Governance focus areas. Understanding BTL2
11 Illustrate Data Governance Organization roles. Applying BTL3
12 Illustrate some common data governance processes. Applying BTL3

Mr.K.Ravindran A.P (S.G), Mr.T.Veeramani A.P (O.G) IT6701-IM Page 4 of 9


13 Examine the maturity levels for Data Risk Management Applying BTL3
Framework.
14 Analyse Governance Maturity levels. Analysing BTL4
15 Point out the need of Information Security. Analysing BTL4
16 Connect Transparency in Data privacy. Analysing BTL4
17 Explain Major Components of the Data Governance Maturity Evaluating BTL5
Model.
18 Assess the Google Privacy policy. Evaluating BTL5
19 Design the conceptions of Privacy. Creating BTL6
20 Prepare the various states of Privacy. Creating BTL6

PART-B

Q.No. Question Competence Level


1 Tell the following about Manage Data in detail Remembering BTL1
i) Process Description (8)
ii) Control Objectives (8)
2 Discuss the following in Maturity Model of Data Remembering BTL1
Governance
i) Undisciplined (8)
ii) Reactive (8)
3 Describe the following Remembering BTL1
i) Manage Data Management Guidelines (8)
ii) Manage Data Maturity Model (8)
4 Identify the need for Master Data Management and give Remembering BTL1
the solutions for it(16)
5 Summarize the following in detail Understanding BTL2
i) Data Governance Framework (8)
ii) Data Governance Lifecycle (8)
6 Describe the following MDM Implementation Styles in Understanding BTL2
detail
i) Consolidation (4)
ii) Registry (4)
iii) Coexistence (4)
iv) Transaction (4)
7 Discuss the following in detail Understanding BTL2
i) MDM Conceptual Architecture (8)
ii) MDM Logical Architecture (8)
8 Illustrate the following MDM Architecture patterns Applying BTL3
i) Registry Hub Pattern (6)
ii) Coexistence Hub Pattern (6)
iii) Transaction Hub Pattern (4)
9 Demonstrate the conceptions of privacy in detail Applying BTL3
10 Explain the following Analysing BTL4
i) Data Governance Maturity Model(DGMM) (8)
ii) Data Governance Organization Roles(8)
Mr.K.Ravindran A.P (S.G), Mr.T.Veeramani A.P (O.G) IT6701-IM Page 5 of 9


11 i) Explain Product Data Synchronization (8) Analysing BTL4
ii) Explain Oracle MDM High Level Architecture (8)
12 i) Classify the information collected based on Privacy in Analysing BTL4
Google(8)
ii) Compare Metadata Vs Master Data Vs
Transactional(8)
13 Explain the following stages in Data Governance Maturity Evaluating BTL5
Model
i) Proactive (8)
ii) Governed (8)
14 i) Design a Typical Data Governance Organization Creating BTL6
Structure (8)
ii) Design the 3 different approaches in Data Quality
Management (8)

UNIT IV
PART A

Q.No. Question Competence Level


1 Define Organization systems. Remembering BTL1
2 List Organization schemes. Remembering BTL1
3 Define Organizing Information. Remembering BTL1

4 List the exact Organization schemes. Remembering BTL1


5 Name any organizational structures. Remembering BTL1
6 Define heterogeneity. Remembering BTL1
7 Summarize types of navigation systems. Understanding BTL2
8 Describe iconic labels. Understanding BTL2
9 Give the meaning of Tuning and Tweaking. Understanding BTL2
10 Discuss Content models. Understanding BTL2
11 Illustrate Hypertext. Applying BTL3
12 Examine gray matters in navigation systems. Applying BTL3
13 Discover browser navigation features. Applying BTL3
14 Analyse the sources of labeling systems. Analysing BTL4
15 Classify types of hierarchies Analysing BTL4
16 Compare Narrow and deep with Broad and shallow structures. Analysing BTL4
17 Explain Social Navigation. Evaluating BTL5
18 Deduce the features of hypertext structure. Evaluating BTL5
19 Generalize the features of database structure. Creating BTL6
20 Invent what kind of searches do people do. Creating BTL6

Mr.K.Ravindran A.P (S.G), Mr.T.Veeramani A.P (O.G) IT6701-IM Page 6 of 9


PART-B

Q.No. Question Competence Level


1 Tell the following Principles of Information Architecture in detail Remembering BTL1
i) The principle of objects (4)
ii) The principle of choices (4)
iii) The principle of disclosure (4)
iv) The principle of exemplars (4)
2 Explain the following in detail Remembering BTL1
i) Brainstorming with White Boards and Flip charts (8)
ii) Metaphor Exploration (8)
3 Describe the granularity of content in detail.(16) Remembering BTL1
4 Describe the following in detail Remembering BTL1
i) High level architecture Blueprints (8)
ii) Web Based Prototypes (8)
5 Discuss the following in detail Understanding BTL2
i) Navigation System Choices (6)
ii) Index Terms (6)
iii) Iconic Labels (4)
6 i) Describe a Top Down approach in organization structures (8) Understanding BTL2
ii) Describe a data base model for bottom-Up Approach (8)
7 Discuss Principles of Information Architecture Understanding BTL2
i) The principle of front doors (4)
ii) The principle of multiple classification (4)
iii) The principle of focused navigation (4)
iv) The principle of growth (4)
8 Illustrate the following in detail about Embedded Navigation Systems Applying BTL3
i) Global Navigation Systems (6)
ii) Local Navigation Systems (6)
iii) Contextual Navigation Systems (4)
9 Illustrate the organizational structures in detail(16) Applying BTL3
10 Briefly explain the following in detail Analysing BTL4
i) Personalisation and Customization(8)
ii) Visualization and Social Navigation (8)
11 Explain the following in detail Analysing BTL4
i) Implementing Embedded Navigation (8)
ii) Supplemental Navigation System (8)
12 Briefly explain the following Analysing BTL4
i) Sitemaps (4)
ii) Site Indexes (4)
iii) Guides (4)
iv) Wizards and Configurators (4)
13 Explain the following in detail Evaluating BTL5
i) Contextual Links (8)
ii) Headings (8)
14 Design the following for label design Creating BTL6
i) Guidelines (8)
ii) Related issues (8)
Mr.K.Ravindran A.P (S.G), Mr.T.Veeramani A.P (O.G) IT6701-IM Page 7 of 9


UNIT V
PART A

Q.No. Question Competence Level


1 Define Data retention policy. Remembering BTL1

2 Define Sensitive Data. Remembering BTL1

3 Tell about Confidential/Regulated Data. Remembering BTL1

4 Describe the Data Retention (EC Directive) Regulations 2009. Remembering BTL1

5 Name any two exemptions for freedom of information act Remembering BTL1
2000.
6 Define ILM. Remembering BTL1
7 Discuss key benefits of PLCM. Understanding BTL2
8 Describe Cost Reduction Toolbox. Understanding BTL2
9 Give the Challenges in Big Data Testing. Understanding BTL2
10 Discuss Sensitivity Analysis. Understanding BTL2
11 Illustrate the steps you need to determine when writing a Applying BTL3
data retention policy.
12 Demonstrate Big data testing strategy. Applying BTL3

13 Illustrate Data migration testing. Applying BTL3

14 Analyse tools used in big data scenarios. Analysing BTL4


15 Classify testing of Big Data. Analysing BTL4
16 Explain parameters for performance testing Analysing BTL4

17 Explain the key capabilities of Big Data Testing Services. Evaluating BTL5
18 Assess DBAs better manage multiple database platforms within Evaluating BTL5
a single IT environment.
19 Create an archive in Hadoop. Creating BTL6
20 Prepare the steps for Big data ecosystem testing.. Creating BTL6

PART-B

Q.No. Question Competence Level


1 Describe Data retention policies in detail. Remembering BTL1
2 Tell about the following Sensitive Data Handling Procedures Remembering BTL1
i) Security Classifications (6)
ii) Use, Transmission and Disposal of Records, Computers
and Media (10)
3 i)Describe 3 tiers of data classification in detail (8) Remembering BTL1
ii)Describe the predefined types of restricted information
assets(8)
Mr.K.Ravindran A.P (S.G), Mr.T.Veeramani A.P (O.G) IT6701-IM Page 8 of 9


4 i)Briefly describe the requirement for protecting data and Remembering BTL1
data collections based on classification (12)
ii)Tell about Canadian Privacy registration (4)
5 Summarize the Information Security and the internet(16) Understanding BTL2
6 Describe the ten signs of Big Data and Analytics testing in Understanding BTL2
detail(16)
7 i) Discuss about archiving data with Hadoop(8) Understanding BTL2
ii) Discuss about Cost Reduction toolbox (8)
8 i) Illustrate about PLM cost in detail (12) Applying BTL3
ii) Briefly Illustrate the key benefits of PLCM (4)
9 Illustrate Confidential data in detail with examples(16) Applying BTL3
10 i) Analyse the functional and performance of Big Data Analysing BTL4
testing(12)
ii) Explain Sensitive data handling procedures (4)
11 i) Differentiate sensitive information and confidential Analysing BTL4
information?(8)
ii) Briefly explain Data protection and human rights Act (8)
12 i) Briefly Explain the Most Challenging Database Analysing BTL4
Management Issues Facing Organizations(8)
ii) Database Administrator Challenges in an EBS
Environment(8)
13 Explain Challenges in Big Data Testing (16) Evaluating BTL5
14 Prepare a case study for handling confidential information(16) Creating BTL6

Verified by : 1. 2.

[K.Ravindran ] [T.Veeramani ]

3. 4.

[ ] [ ]

Forwarded by Year Coordinator :

Approved by HOD :

***************

Mr.K.Ravindran A.P (S.G), Mr.T.Veeramani A.P (O.G) IT6701-IM Page 9 of 9

You might also like