How To Exam?

a knowledge trading engine...


M.C.A-M.C.A 1st Sem INFORMATION SYSTEMS CONTROL AND AUDIT(Andhra University (AU), Visakhapatnam, Andhra Pradesh-2013)

Friday, 17 January 2014 12:00abdul sattar

(Andhra University MCA INFORMATION SYSTEMS CONTROL AND AUDIT )


INFORMATION SYSTEMS CONTROL AND AUDIT
IMPORTANT QUESTIONS

1. Answer the following:

a) Incorrect Data in a Computer System is likely to have more serious consequences for which System?

b) What does an efficient data processing system accomplish?

c) Why Information Systems controls are needed?

d) Which is the most likely to be a characteristic of the information systems plan prepared for a backbone organization?

e) Which is the most likely sequence of phases in the systems development process?

f) What are the keys a public-key cryptosystem uses?

g) How should a screen be organized for direct entry of input data?

h) What is a passive attack on a communication network?

i) How does Real memory errors are primarily detected?

j) What is the purpose of concurrency controls in a distributed database environment?

k) What control problem that arises with spooling software?

l) What are the functional capabilities of generalized audit software?

m) What is the global evaluation judgment on maintenance of asset safeguarding and data integrity?

n) What are the steps most likely will be undertaken first when evaluating the effectiveness of an information system?

o) What is the sequence of steps most likely will be used in an efficiency evaluation study?


2. What characteristics of computer systems often lead to high costs being incurred because of computer-system errors?


3. Briefly describe the five components of internal control that should be established in an organization.


4. Briefly explain the functions of the boundary subsystem. Give two components that perform basic activities in the boundary subsystem.


5. Briefly explain the nature of public –key cryptography.


6. Why is encryption an important means of protecting the integrity of data passing over public communication lines? Is encryption also useful as a means of protecting data passing over private communication lines?


7. Why should application programs that update monetary data items in the database maintain a suspense account?


8. What purposes might auditors seek to achieve in using generalized audit software to examine the quality of data maintained on an application system files?
( 3 Votes )

Add comment


Security code
Refresh

Earning:  ₹ 8.00/-
You are here: PAPER M.C.A-M.C.A 1st Sem INFORMATION SYSTEMS CONTROL AND AUDIT(Andhra University (AU), Visakhapatnam, Andhra Pradesh-2013)