Information systems control and audit 2010 Question Paper

Books For Preparation MCA 3.1.1 INFORMATION SYSTEMS CONTROL AND AUDIT

First Question is Compulsory
Answer any four from the remaining
Answer all parts of any Question at one place.
Time: 3 Hrs. Max. Marks: 70


1. Answer the following:
a) Incorrect Data in a Computer System is likely to have more serious
consequences for which System?
b) What does an efficient data processing system accomplish?
c) Why Information Systems controls are needed?
d) Which is the most likely to be a characteristic of the information systems
plan prepared for a backbone organization?
e) Which is the most likely sequence of phases in the systems development
process?
f) What are the keys a public-key cryptosystem uses?
g) How should a screen be organized for direct entry of input data?
h) What is a passive attack on a communication network?
i) How does Real memory errors are primarily detected?
j) What is the purpose of concurrency controls in a distributed database
environment?
k) What control problem that arises with spooling software?
l) What are the functional capabilities of generalized audit software?
m) What is the global evaluation judgment on maintenance of asset
safeguarding and data integrity?
n) What are the steps most likely will be undertaken first when evaluating the
effectiveness of an information system?
o) What is the sequence of steps most likely will be used in an efficiency
evaluation study?


2. What characteristics of computer systems often lead to high costs being incurred
because of computer-system errors?


3. Briefly describe the five components of internal control that should be established
in an organization.


4. Briefly explain the functions of the boundary subsystem. Give two components
that perform basic activities in the boundary subsystem.


5. Briefly explain the nature of public –key cryptography.


6. Why is encryption an important means of protecting the integrity of data passing
over public communication lines? Is encryption also useful as a means of
protecting data passing over private communication lines?


7. Why should application programs that update monetary data items in the database
maintain a suspense account?


8. What purposes might auditors seek to achieve in using generalized audit software
to examine the quality of data maintained on an application system files?
 

No comments:

Post a Comment

Followers