This Paper has 23 answerable questions with 0 answered.
Roll No……… | |
Total No. of Questions — 7] | [Total No. of Printed Pages — 2 |
Time Allowed : 3 Hours | Maximum Marks : 100 |
Answers to questions are to be given only in English except in the cases of candidates who have opted for Hindi medium. If a candidate who has not opted for Hindi medium, answers in Hindi, his answers in Hindi will not be valued. |
Question No. 1 is compulsory. |
Answer any four questions from the remaining six questions. |
Marks |
1. | (a) | Explain the three tests that can be used to detect unauthorized or erroneous program changes. | 5x4=20 | (0) |
| (b) | State the objectives on which an Information system auditor should focus. | | (0) |
| (c) | What is a computer fraud and what types of activities does it include? | | (0) |
| (d) | Briefly explain the four common cycles of business activity along with listing some of the application systems for each cycle. | | (0) |
2. | (a) | State and briefly explain the major categories and the items included therein to estimate the information system costs. | 8+8+4 | (0) |
| (b) | Why organisations fail to achieve their system development objectives? | | (0) |
| (c) | What is an Audit risk? Distinguish between errors and irregularities. Which do you think concern auditors the most? | | (0) |
3. | (a) | List and describe the contents of a system manual | 8+8+4 | (0) |
| (b) | The Software industry continues to undergo constant changes; users need to be aware of recent trends and issues to be effective in their business and personal life. Explain. | | (0) |
| (c) | Draw schematic chart of general form of business applications. | | (0) |
4. | (a) | State the inputs, processing and the outputs of a "Share Accounting System". | 8+8+4 | (0) |
| (b) | State the steps to be taken to reduce the threat from destructive programs. | | (0) |
| (c) | List the main threats from hacking. | | (0) |
|
5. | (a) | Consider the problem of long delays between receipts of orders and delivery in a company. Give the six steps in the system approach to find the solution for the above problem. | 8+8+4 | (0) |
| (b) | Define top level management. What is the main responsibility of top management? Give the information requirement at top level for making decision. | | (0) |
| (c) | What is a programmed and a non–programmed decision? Distinguish the difference between the two through an example. | | (0) |
6. | (a) | List the items of information provided by cash management of Treasury module of SAP. | 8+8+4 | (0) |
| (b) | Discuss the factors to be considered for valuation of a vendor’s proposal. | | (0) |
| (c) | List the fears that are expected to arise among employees of an organization during implementation of ERP | | (0) |
7. | (a) | List and explain the Software packages that are helpful in analysis of program logic. | 5x4=20 | (0) |
| (b) | State the entities to which the Information Technology Act, 2000 does not apply. | | (0) |
| (c) | State the methods through which awareness of employees towards security policy can be increased. | | (0) |
| (d) | Discuss the advantages of pre–written application Software Packages. | | (0) |