This Paper has 22 answerable questions with 0 answered.
|Total No. of Questions— 7]||[Total No. of Printed Pages—2|
|Time Allowed—3 Hours||Maximum Marks—100|
|Answers to questions are to be given only in English except in the cases of candidates who have opted for Hindi medium. If a candidate who has not opted for Hindi medium, answers in Hindi, his answers in Hindi will not be valued.|
|Question No. 1 is compulsory.|
|Answer any four questions from the remaining six questions.|
|All questions carry equal marks.|
|1.||(a)||Why Computerised Information systems are more vulnerable to many more kinds of threats than manual systems? Name some of the key areas where large amounts of data stored in electronic form are most vulnerable.||5||(0)|
|(b)||Discuss some common types of field interrogation as a validation control procedure in an EDP set up.||5||(0)|
|(c)||Differentiate between General and Application controls. Also mention the broad categories into which the first can be subdivided.||5||(0)|
|(d)||How does MIS auditing enhance the control process?||5||(0)|
|2.||(a)||State the factors to be considered for designing an effective Management Information System.||10||(0)|
|(b)||Enumerate various information which are required for sales support and sales analysis.||10||(0)|
|3.||(a)||What are the project management items associated with an I.T. project system failures? Give the elements to be included in the adopted framework to avoid such failures.||10||(0)|
|(b)||Discuss some of the commonly used coding schemes.||5||(0)|
|(c)||Describe Bench marking problem on vendor’s proposal.||5||(0)|
|4.||(a)||Describe the sequence of events which occur immediately for each transaction when controlled by the sales order entry computer programs in an OLRT system.||10||(0)|
|(b)||Why is personnel training important? What type of training should be imparted to users?||5||(0)|
|(c)||How can computer fraud be committed using input in four different ways?||5||(0)|
|5.||(a)||Describe some of the powers of the Cyber Appellate Tribunal.||5||(0)|
|(b)||What are the five different levels of integration of CASE tools?||5||(0)|
|(c)||What are the subversive threats? How do the intruders manipulate the messages being transmitted?||10||(0)|
|6.||Please read carefully the following three scenarios and answer the questions given below:||5+7+8|
|(a)||Scenario 1: |
Nobody told you that your Internet use in the office was being monitored. Now you have been warned you will be fired if you use the Internet for recreational surfing again. What are your rights?
|(b)||Scenario 2 : |
Your employees are abusing their Internet privileges, but you don’t have an Internet usage policy. What do you do?
|(c)||Scenario 3 : |
Employee Mr. X downloads adult material to his PC at work, and employee Miss Y sees it. Miss Y then proceeds to sue the company for sexual harassment. As the employer, are you liable?
|7.||Write short notes on the following:||4x5=20|
|(b)||Integrated Test Facility||(0)|
|(c)||Restorative Information Protection||(0)|