This Paper has 20 answerable questions with 0 answered.
Roll No……… | |
Total No. of Questions — 5] | [Total No. of Printed Pages — 2 |
Time Allowed : 3 Hours | Maximum Marks : 100 |
Answer all the five questions. |
1. | (a) | Explain the terms "system stress" and "system change". | 5+5+7+3 | (0) |
| (b) | Briefly describe the components of transaction processing system. | | (0) |
| (c) | Explain the effect of applying Computer technology to information system. | | (0) |
| (d) | What are the objectives of the inventory control applications? | | (0) |
2. | (a) | What are the basic information requirements of production planning and control systems? | 5+5+8+2 | (0) |
| (b) | Explain the advantages and also the disadvantages of parallel conversion from manual to computerized system. | | (0) |
| (c) | Explain the characteristics of client/server technology. | | (0) |
| (d) | What is meant by Information security? | | (0) |
3. | (a) | Describe the five characteristics of the types of information used in executive decision making. | 5x4=20 | (0) |
| (b) | What are the risks involved in the end-user computing? | | (0) |
| (c) | Give an example for the source document fraud. How will you control against this type of exposure? | | (0) |
| (d) | What are the important factors which should be considered by the system analyst while designing user output? | | (0) |
4. | (a) | Briefly discuss some of the design tools that are available now–a–days. | 5x4=20 | (0) |
| (b) | What are the key characteristics of a true ERP-enterprise resource planning solution? | | (0) |
| (c) | What are the different levels of integration of ‘Case’ tools? | | (0) |
| (d) | Give some techniques used to preserve audit trails in a computer based information systems environment. | | (0) |
|
5. | (a) | What are the objectives of audit trail? | 5x4=20 | (0) |
| (b) | Explain the characteristics of the Internet which are likely to attract fraudsters. | | (0) |
| (c) | The audit methods that are effective for manual audits prove ineffective in many ‘IS’ audits. Can you explain the reasons? | | (0) |
| (d) | Define the following terms: (i) | Computer resources | (ii) | Digital Signature | (iii) | Private key | (iv) | Public key | (v) | Key pair. | | | (0) |