2005 Andhra University MCA INFORMATION SYSTEMS CONTROL AND AUDIT Question paper for exam preparation. Question paper for 2005 Andhra University MCA INFORMATION SYSTEMS CONTROL AND AUDIT Question paper, 2005 Andhra University MCA INFORMATION SYSTEMS CONTROL AND AUDIT Question paper. SiteMap
K2Questions Logo


2005 Andhra University MCA INFORMATION SYSTEMS CONTROL AND AUDIT Question paper

University Question Papers
2005 Andhra University MCA INFORMATION SYSTEMS CONTROL AND AUDIT Question paper
MCA 3.1.1

INFORMATION SYSTEMS CONTROL AND AUDIT

First Question is Compulsory

Answer any four from the remaining

Answer all parts of any Question at one place.

Time: 3 Hrs.
Max. Marks: 100

1. Answer the following:

a) Incorrect Data in a Computer System is likely to have more serious consequences for which System?

b) What does an efficient data processing system accomplish?

c) Why Information Systems controls are needed?

d) Which is the most likely to be a characteristic of the information systems plan prepared for a backbone organization?

e) Which is the most likely sequence of phases in the systems development process?

f) What are the keys a public-key cryptosystem uses?

g) How should a screen be organized for direct entry of input data?

h) What is a passive attack on a communication network?

i) How does Real memory errors are primarily detected?

j) What is the purpose of concurrency controls in a distributed database environment?

k) What control problem that arises with spooling software?

l) What are the functional capabilities of generalized audit software?

m) What is the global evaluation judgment on maintenance of asset safeguarding and data integrity?

n) What are the steps most likely will be undertaken first when evaluating the effectiveness of an information system?

o) What is the sequence of steps most likely will be used in an efficiency evaluation study?

2. What characteristics of computer systems often lead to high costs being incurred because of computer-system errors?

3. Briefly describe the five components of internal control that should be established in an organization.

4. Briefly explain the functions of the boundary subsystem. Give two components that perform basic activities in the boundary subsystem.

5. Briefly explain the nature of public –key cryptography.

6. Why is encryption an important means of protecting the integrity of data passing over public communication lines? Is encryption also useful as a means of protecting data passing over private communication lines?

7. Why should application programs that update monetary data items in the database maintain a suspense account?

8. What purposes might auditors seek to achieve in using generalized audit software to examine the quality of data maintained on an application system files?



About us | SiteMap | Terms of use | Privacy Policy | Disclaimer | Contact us | ©2010 K2Questions.com