1. |
(a) |
Briefly describe the techniques used to preserve audit trails in the Computer Based Information system. |
4x5=20 |
|
(b) |
Briefly outline the contents of Information Security policy. |
|
|
(c) |
What are CASE tools? Discuss briefly its three categories. |
|
|
(d) |
Various software packages serve as aids in analysis of program logic. Explain briefly. |
|
2. |
(a) |
State and briefly explain the various stages of developing an inhouse program. |
10 |
|
(b) |
How will you establish and implement Critical Success Factors (CSFs) and Key Performance Indicators (KPIs) in an organisation for achieving the benefits of implementation of ERP? |
10 |
3. |
(a) |
What is Share accounting system? Describe briefly the input, outputs and processing steps involved in this system. |
10 |
|
(b) |
"Decision support systems are widely used as part of an Organization's Accounting Information system". Give examples to support this statement. |
10 |
4. |
(a) |
What is system manual? What information is included in it? |
10 |
|
(b) |
What are five control objectives of an Operating system |
5 |
|
(c) |
What steps can be taken to detect computer fraud? |
5 |
5. |
(a) |
What is prototyping approaches to systems development? Describe its advantages and disadvantages also. |
10 |
|
(b) |
Describe some of the powers of controller under section 89 to make regulations consistent with Information Technology Act, 2000. |
5 |
|
(c) |
What is Transaction processing cycle? Discuss briefly four common cycles of a business activity. |
5 |