This Paper has 24 answerable questions with 0 answered.
Roll No……… | |
Total No. of Questions — 7] | [Total No. of Printed Pages — 2 |
Time Allowed : 3 Hours | Maximum Marks : 100 |
Answers to questions are to be given only in English except in the cases of candidates who have opted for Hindi medium. If a candidate who has not opted for Hindi medium, his answers in Hindi will not be valued. |
Q.No. 1 is compulsory. |
Attempt any five questions from the remaining six questions. |
Marks |
1. | (a) | What are the various stages involved in the top–down approach of System Development Process? | 5 | (0) |
| (b) | What are the benefits of Material Requirement Planning? | 5 | (0) |
| (c) | State how computer fraud differs from convention fraud. | 5 | (0) |
| (d) | Give any five objectives of Information Technology Act., 2008. | 5 | (0) |
2. | (a) | Discuss important fact–finding techniques that are used by the system analysts for determining the user requirements, during the system development process. | 4 | (0) |
| (b) | As a head of an IS audit team what are the techniques you would expect your audit team to adopt in processing controls to preserve audit trails? | 6 | (0) |
| (c) | A company is using client/server technique and believes that it is 100% risk free. As an IS auditor, would you endorse the view? Give four points to justify your answer. | 6 | (0) |
3. | (a) | What is an Executive Information System? Explain its purposes. | 6 | (0) |
| (b) | Mention the components of an Accounting Information System. | 4 | (0) |
| (c) | Give some common types of field interrogation, involving programmed procedures that examine the characters of the data in the field. | 6 | (0) |
4. | (a) | Explain any six limitations of Management Information System. | 6 | (0) |
| (b) | What is the significance of system evaluation? How is it performed? | 6 | (0) |
| (c) | Briefly describe the two general types of firewalls. | 4 | (0) |
|
5. | (a) | List out the important characteristics of useful and effective information. | 6 | (0) |
| (b) | What are the four common cycles of business activity according to which transactions may be grouped? Also distinguish between a transaction file and a master file. | 5 | (0) |
| (c) | What are the five concurrent audit techniques that IS auditors commonly use? | 5 | (0) |
6. | (a) | Briefly discuss guidelines for presenting tabular and graphic information. | 6 | (0) |
| (b) | Discuss some of the destructive programs. | 5 | (0) |
| (c) | Enumerate the characteristics of Enterprise Resource Planning (ERP) Systems. | 5 | (0) |
7. | Answer any four | | |
| (a) | Discuss the various steps involved in system testing. | 4 | (0) |
| (b) | What are the basic ground rules that must be addressed sequentially while protecting computer–held information? | 4 | (0) |
| (c) | Give the four key components comprising the integrated environments formed by all dimensions of software engineering. | 4 | (0) |
| (d) | What are the different aspects to be considered in Meta–CASE workbenches? | 4 | (0) |
| (e) | Briefly describe the method of Business Engineering. | 4 | (0) |