This Paper has 21 answerable questions with 0 answered.
Roll No……………………… | |
Total No. of Questions— 7] | [Total No. of Printed Pages—2 |
Time Allowed—3 Hours | Maximum Marks—100 |
Answers to questions are to be given only in English except in the cases of candidates who have opted for Hindi medium. If a candidate who has not opted for Hindi medium, answers in Hindi, his answers in Hindi will not be valued. |
Question No. 1 is compulsory. |
Answer any four questions from the remaining six questions. |
Marks |
1. | (a) | Briefly describe the techniques used to preserve audit trails in the Computer Based Information system. | 5 | (0) |
| (b) | Briefly outline the contents of Information Security policy. | 5 | (0) |
| (c) | What are CASE tools? Discuss briefly its three categories. | 5 | (0) |
| (d) | Various software packages serve as aids in analysis of program logic. Explain briefly. | 5 | (0) |
2. | (a) | State and briefly explain the various stages of developing an in house program. | 10 | (0) |
| (b) | How will you establish and implement Critical Success Factors (CSFs) and Key Performance Indicators (KPIs) in an organisation for achieving the benefits of implementation of ERP? | 10 | (0) |
3. | (a) | What is Share accounting system? Describe briefly the input, outputs and processing steps involved in this system. | 10 | (0) |
| (b) | "Decision support systems are widely used as part of an Organization's Accounting Information system". Give examples to support this statement. | 10 | (0) |
4. | (a) | What is system manual? What information is included in it? | 10 | (0) |
| (b) | What are five control objectives of an Operating system | 5 | (0) |
| (c) | What steps can be taken to detect computer fraud? | 5 | (0) |
|
5. | (a) | What is prototyping approaches to systems development? Describe its advantages and disadvantages also. | 10 | (0) |
| (b) | Describe some of the powers of controller under section 89 to make regulations consistent with Information Technology Act, 2000. | 5 | (0) |
| (c) | What is Transaction processing cycle? Discuss briefly four common cycles of a business activity. | 5 | (0) |
6. | (a) | Describe various steps that should be taken for successful installation of the equipment during the implementation phase. | 10 | (0) |
| (b) | What are control techniques that are essential for the security of the client/server environment? | 5 | (0) |
| (c) | Differentiate between open and closed systems. | 5 | (0) |
7. | Write short notes on the following: | 4x5=20 | |
| (a) | Data dictionary | | (0) |
| (b) | System maintenance | | (0) |
| (c) | Holistic protection | | (0) |
| (d) | Snapshot technique | | (0) |