This Paper has 23 answerable questions with 0 answered.
Roll No…………… | |
Total No. of Questions — 7] | [Total No. of Printed Pages — 2 |
Time Allowed : 3 Hours | Maximum Marks : 100 |
Answers to questions are to be given only in English except in the cases of candidates who have opted for Hindi medium. If a candidate who has not opted for Hindi medium, answers in Hindi, his answers in Hindi will not be valued. |
Question No. 1 is compulsory. |
Answer any four questions from the remaining six questions. |
Marks |
1. | (a) | Discuss various factors that render manual audit method ineffective in Information System audit. | 4x5=20 | (0) |
| (b) | Briefly explain the components of an analysis and design work bench. | | (0) |
| (c) | Briefly discuss any five database control features. | | (0) |
| (d) | Discuss briefly the powers of Central Government under Section 87 to make rules in respect of Information Technology Act, 2000. | | (0) |
2. | (a) | What is work–in–process control system? Describe briefly the system interfaces, files and inputs, and reports involved in this system. | 10 | (0) |
| (b) | Describe the main prerequisites of a MIS which makes it an effective tool. Explain the major constraints in operating it. | 10 | (0) |
3. | (a) | Discuss in detail, how the investigation of present system is conducted by the system analyst. | 10 | (0) |
| (b) | Briefly explain various kinds of controls that can be incorporated in the system to make frauds difficult to perpetrate. | 10 | (0) |
4. | (a) | Briefly explain the characteristics and features of an Enterprise Resource Planning. | 5 | (0) |
| (b) | Briefly discuss four basic components of Decision Support System. | 5 | (0) |
| (c) | Define the following computer fraud and abuse technique: (i) | War dialing | (ii) | Scavenging | (iii) | Cracking | (iv) | Internet terrorism | (v) | Masquerading. | | 10 | (0) |
|
5. | (a) | Discuss various issues that should be considered while designing system input. | 4x5=20 | (0) |
| (b) | Briefly explain the risks associated with client / server model. | | (0) |
| (c) | "Personnel information system deals with flow of information relating to people." Explain. | | (0) |
| (d) | Briefly describe various steps involved in system testing. | | (0) |
6. | (a) | Briefly explain the best approach to implement information security policy? | 4x5=20 | (0) |
| (b) | What is the purpose of the system evaluation? How is it performed? | | (0) |
| (c) | Discuss, how a controlled source program library environment can help to deter unauthorized changes to program. | | (0) |
| (d) | Briefly explain the role of Information Security Administrator. | | (0) |
7. | Write short notes on the following: | 4x5=20 | |
| (a) | Closed and open systems | | (0) |
| (b) | Programmed decisions | | (0) |
| (c) | Program documentation | | (0) |
| (d) | Firewalls. | | (0) |