CA Final :: Management Information and Control Systems : May 2007


Roll No…………………
Total No. of Questions— 7] [Total No. of Printed Pages—2

Time Allowed—3 Hours Maximum Marks—100
JP
Answers to questions are to be given only in English except in the cases of candidates who have opted for Hindi medium. If a candidate who has not opted for Hindi medium, answers in Hindi, his answers in Hindi will not be valued.

Question No. 1 is compulsory.

Answer any four questions from the remaining six questions.

Marks
1. (a) Briefly describe the techniques used to preserve audit trails in the Computer Based Information system. 4x5=20
(b) Briefly outline the contents of Information Security policy.
(c) What are CASE tools? Discuss briefly its three categories.
(d) Various software packages serve as aids in analysis of program logic. Explain briefly.
2. (a) State and briefly explain the various stages of developing an inhouse program. 10
(b) How will you establish and implement Critical Success Factors (CSFs) and Key Performance Indicators (KPIs) in an organisation for achieving the benefits of implementation of ERP? 10
3. (a) What is Share accounting system? Describe briefly the input, outputs and processing steps involved in this system. 10
(b) "Decision support systems are widely used as part of an Organization's Accounting Information system". Give examples to support this statement. 10
4. (a) What is system manual? What information is included in it? 10
(b) What are five control objectives of an Operating system 5
(c) What steps can be taken to detect computer fraud? 5
5. (a) What is prototyping approaches to systems development? Describe its advantages and disadvantages also. 10
(b) Describe some of the powers of controller under section 89 to make regulations consistent with Information Technology Act, 2000. 5
(c) What is Transaction processing cycle? Discuss briefly four common cycles of a business activity. 5
JP P.T.O.


( 2 )

JP Marks
6. (a) Describe various steps that should be taken for successful installation of the equipment during the implementation phase. 10
(b) What are control techniques that are essential for the security of the client/server environment? 5
(c) Differentiate between open and closed systems. 5
7. Write short notes on the following:
(a)Data dictionary
(b)System maintenance
(c)Holistic protection
(d)Snapshot technique
4x5=20
JP

 

© Krishbhavara ♣