Thursday, November 27, 2008

INFORMATION SYSTMES CONTROL AND AUDIT

THIS QUESTIONS PAPER IS FOR 2008-2009 BATCH 5 TH SEMESTER

ANSWER ANY 5 QUESTIONS OF THE FOLLOWING FIST QUESTIONS IS COMPULSORY.

1)
A.EXPLAIN INFORMATION SYSTEM CONTROLS.
B.DESCRIBE PUBLIC-KEY CRYPTOSYSTEM.
C.DESCRIBE DATA PROCESSING SYSTEM.
D.EXPLAIN SAFEGUARDING.
E.EXPLAIN THE CHARACTERISTICS OF AUDIT SOFTWARE.

2)
GIVE AN OVERVIEW OF INFORMATION SYSTEMS AUDITING.

3)DISCUSS SYSTEM DEVELOPMENT MANAGEMENT CONTROLS.

4)DESCRIBE THE COMPONENTS OF INTERNAL CONTROL THAT SHOULD BE ESTABLISHED IN AN ORGANIZATION.

5)EXPLAIN PROCESSING CONTROLS.

6)DESCRIBE EXPERT SYSTEMS ARCHITECTURE WITH A BLOCK EVALUATION PROCESS.

7)GIVE OVERVIEW OF THE EFFECTIVENESS OF SYSTEM EVALUATION PROCESS.

8)WHAT PURPOSE MIGHT AUDITORS SEEK TO ACHIEVE IN USING GENERALIZED AUDIT SOFTWARE TO EXAMINE THE QUALITY OF DATA MAINTAINED ON AN APPLICATION SYSTEM FILES?

Thursday, November 13, 2008

Arrays

Objectives

Having read this section you should have a good understanding of the use of arrays in C.

Advanced Data Types
Programming in any language takes a quite significant leap forwards as soon as you learn about more advanced data types - arrays and strings of characters. In C there is also a third more general and even more powerful advanced data type - the pointer but more about that later. In this section we introduce the array, but the first question is, why bother?

There are times when we need to store a complete list of numbers or other data items. You could do this by creating as many individual variables as would be needed for the job, but this is a hard and tedious process. For example, suppose you want to read in five numbers and print them out in reverse order. You could do it the hard way as:

main()
{
int al,a2,a3,a4,a5;
scanf("%d %d %d %d %d",&a1,&a2,&a3,&a4,&a5);
printf("%d %d %d %d %d'',a5,a4,a3,a2,a1);
}

Doesn't look very pretty does it, and what if the problem was to read in 100 or more values and print them in reverse order? Of course the clue to the solution is the use of the regular variable names a1, a2 and so on. What we would really like to do is to use a name like a[i] where i is a variable which specifies which particular value we are working with. This is the basic idea of an array and nearly all programming languages provide this sort of facility - only the details alter.

In the case of C you have to declare an array before you use it - in the same way you have to declare any sort of variable. For example,

int a[5];

declares an array called a with five elements. Just to confuse matters a little the first element is a[0] and the last a[4]. C programmer's always start counting at zero! Languages vary according to where they start numbering arrays. Less technical, i.e. simpler, languages start counting from 1 and more technical ones usually start counting from 0. Anyway, in the case of C you have to remember that

type array[size]

declares an array of the specified type and with size elements. The first array element is array[0] and the last is array[size-1].

Using an array, the problem of reading in and printing out a set of values in reverse order becomes simple:



main()
{
int a[5];
int i;
for(i =0;i < 5; ++i) scanf("%d",&a[i]);
for(i =4;i> =0;--i) printf("%d",a[i]);
}

Data and Time Functions:

Data and Time Functions:

clock_t clock(void)
time_t time(time_t , *tp
double difftime(time_t time2 , time_t time1)
time_t mktime(struct tm *tp)
char *asctime(const time_t *tp)
char *ctime(const time_t *tp)
struct tm *gmtime(const time_t *tp)
struct tm *localtime(const time_t *tp)
size_t strftime(char *s, size_t smax, const char *fmt, const struct tm *tp)

Utility Functions:

Utility Functions:

double atof(const char *s)
int atoi(const char *s
long atol(const char *s)
double strrod(const char *s, char **endp)
long strtol(const char *s, char **endp, int base)
unsigned long strtoul(const char *s, char **endp, int base)
int rand(void)
void srand(unsigned int seed)
void *calloc(size_t nobj, size_t size)
void *malloc(size_t size)
void *realloc(void *p, size_t size)
void free(void *p)
void abort(void)
void exit(int status)
int atexit(void (*fcn)(void))
int system(const char *s)
char *getenv(const char *name)
void *bsearch(const void *key, const void *base, size_t n, size_t size, int (*cmp)(const void *keyval, const void *datum))
void qsort(void *base, size_t n, size_t size, int (*cmp)(const void *, const void *))
int abs(int n)
long labs(long n)
div_t div(int num, int denom)
ldiv_t ldiv(long num , long denom)

Mathematical Functions:

Mathematical Functions:

sin(x)
cos(x)
tan(x)
asin(x)
acos(x)
atan(x)
atan2(x)
sinh(x)
cosh(x)
tanh(x)
exp(x)
log(x)
log10(x)
pow(x,y)
sqrt(x)
ceil(x)
floor(x)
fabs(x)
ldexp(x)
frexp(x,double *ip)
modf(x,double *ip)
fmod(x,y)

String Functions:

String Functions:

char *strcpy(s , ct)
char *strncpy(s , ct , n)
char *strcat(s , ct)
char *strncat(s , ct , n)
int strcmp(cs , ct)
int strncmp(cs , ct ,n)
char *strchr(cs , c)
char *strrchr(cs , c)
size_t strspn(cs , ct)
size_t strcspn(cs , ct)
char *strstr(cs , ct)
size_t strlen(cs)
char *strerror(n)
char *strtok(s , ct)

Character Class Tests:

Character Class Tests:

isalnum(c)
isalpha(c)
iscntrl(c)
isdigit(c)
isgraph(c)
islower(c)
isprint(c)
ispunct(c)
isspace(c)
isupper(c)
isxdigit(c)

Input and Output:

Input and Output:

FILE *fopen(const char *filename, const char *mode)
FILE *freopen(const char *filename, const char *mode, FILE *stream)
int fflush(FILE *stream)
int fclose(FILE *stream)
int remove(const char *filename)
int rename(const char *oldname, const char *newname)
FILE *tmpfile(void)
char *tmpnam(char s[L_tmpnam])
int setvbuf(FILE *stream, char *buf, int mode, size_t size)
void setbuf(FILE *stream, char *buf)
int fprint(FILE *stream, const char *format, ...)
int sprintf(char *s, const char *format, ...)
vprintf(const char *format, va_list arg)
vfprintf(FILE *stream, const char *format, va_list arg)
vsprintf(char *s, const char *format, va_list arg)
int fscanf(FILE *stream, const char *format, ...)
int scanf(const char *format, ...)
int sscanf(char *s, const char *format, ...)
int fgetc(FILE *stream)
char *fgets(char *s, int n, FILE *stream)
int fputc(int c, FILE *stream)
int fputs(const char *s, FILE *stream)
int getc(FILE *stream)
int getchar(void)
char *gets(char *s)
int putc(int c, FILE *stream)
int putchar(int c)
int ungetc(int c, FILE *stream)
size_t fread(void *ptr, size_t size, size_t nobj, FILE *stream)
size_t fwrite(const void *ptr, size_t size, size_t nobj, FILE *stream)
int fseek(FILE *stream, long offset, int orogin)
long ftell(FILE *stream)
void rewind(FILE *stream)
int fgetpos(FILE *stream, fpos_t *ptr)
int fsetpos(FILE *stream, const fpos_t *ptr)
void clearerr(FILE *stream)
int feof(FILE *stream)
int ferror(FILE *stream)
void perror(const char *s)

Thursday, October 9, 2008

audit and control

1)What is the need for control and audit for computer system
2)Define information system control& Audit briefly explain its components
3)Define Nature of controls and how to deal with complexity of data?
4)What is an audit risk what are the audit procedured
5)Kistinguish between centralization and decentralization in programming
6)Briefly describe the equatity phasses in system development

Network Securiety

1)Explain public key cryptography and hash algorithm
2)What abut data encryption standard
3)Expaoin in detail about internationaldata encryption algorithem
4)disuss ticket in kdc, certification in ca, session key establishment&delegation
5)Explain security service for Electronic mail?

Software engineering

1)what is se? explain about sequence, state chart and activityu diagram of UML?
2)what is projuct communication exlain about different model of comminication?
3)What is requirement elecitation?Expalin about represent Elicitation concepts in details?
4)HOw to manage requirement elicitation?Explain briefly?
5)Explain about different communication machanisms?

Embedded Systems

1)what is an es?give an example of es?
2)Discuss briefly the momory parts tipically find in es?
3)explain DMA?
4)Disucss bref;ly proframmable aray logic?
5)Explain briefly the following
a.hold time and setup time
b.clocks
c.d flip-flops

DATA MINING

1)a.Define measures
b.Correlation analysis for Handling redundency
c.data mart
d.meta data repositery
e.indexed olap data
f.Normalization
2)describe development of data bse technology
3)a.Why to preprocess the data
b.What are the preprocess techniques
4)what are the different softoperational database and data wrehouse

Wednesday, September 24, 2008

HI IF U WANT TO KNOW PREVIOUS VTH SEM PAPERS

Yes here i put some of the previous exam papers can be placed here.
So if u want to now more about the previous semester papers once refer this complete posts.
Thank you

Tuesday, September 16, 2008

DATA WAREHOUSING AND DATA MINING

1.Briefly discuss.
a) Virtual datawarehouse Vs Data mart.
b)Kneapsort Neighbor classifier.
c)Multi dimensional databases.
d)Bagging.
e)Pruning.
f)Synchronous generalization.
g)Segmentation by Natural Partitioning.
h)Strategies of data reduction.
1. Discuss about the efficient computation of data cubes.
2. explain architecture for on-line analytical mining.
3. Explain the methods of decentralization and hierarch generation for categorical data.
4. a) As a marketing manager of All Elecronics, characterize the buying habits of customers who purchases items priced at no less that $100, with respect to the customer’s age and type of item purchased, and the place in which the item was made.
b) Discuss about functional components of Data mining GUI.
6. a) How to implement attribute oriented induction technique?
b) Explain the Associate rule mining using market basket analysis.
7. a) What is classification and what is prediction and how to prepare data for classification and prediction?

8. Explain how back propagation is useful for classification of data.

EMBEDDED SYSTEMS(5th Sem)

1)Write short notes on the following hardware/units used to build embedded systems.
a) Microprocessor
b) Micro controller
c) DSP processor
d) Timer
e) Emulator.
2)Write truth table for the following types of gates and give on detailed illustration for each type of gate it can be used.
a)3-input NAND gate
b) 2-Input XOR gate
c) 2-input NOR gate
d) NOT gate.
3) What is an interrupt? Why they are required in a computer? Wxplain in detail how multiple tasks are handled by the computer.

4)Discuss the relative merits and demerits of various shared-data protection mechanisms.

5) Explain the features of the following methods of inter-task communications.
a) Semaphores
b) Queues
c) Mailboxes
d) Pipes

6) Expalin hard-real time scheduling considerations.

7) Explain the following software development tools.
a) Cross- Compiler
b) Cross assembler
c) Linker
d) Loader/locator.
8) Explain the important features of the following operating systems that are relevant to embedded systems.
a) PT Linux
b) Windows XP
c) WIN CE
d) Vx Words.

OBJECT ORIENTED SOFTWARE ENGINEERING

1) a) Describe the canonical form of a complex software system.
b) Differentiate algorithmic decomposition from object-oriented decomposition.
c) Write about Mastow meaning of Software design.
d) What are the modesls of onject oriented system design?
2) What are the components of object model and write about the advantages and applications of the object model?

3) Illustrate different types of relationaships exist in objuect oriented languages.
4) Expalin domain analysis for room heating system.

5) Write about features of UML system.
6) How to manage software configuration? Illustrate.
7) What are the activities of requirements elicitation? Explain with suitable example.
8) What are system design goals? How to address them? Illustrate with example.

NETWORK SECURITY( 3rd Year)

First question is compulsary

1. a) Explanin the differences between passive attacks and active attacks.
b) Describe Worms.
c) Give the requirements of public key encryption.
d) Explain Compression funcion.
e) Expalin Delegation.

2. a) Explain various types of viruses.
b) Explain simple DES algorithm.

3. Consider a Diffie-Hellman scheme with a common prime q-11 and a primitive root alpha=2.
a) Show that 2 is a primitive root of 11.
b) If user A has public key Ya=9, what is A's priate key Xa?
c) If user B has public key Yb=3, what is the shared secret key K?

4. a) Explain SHA-1 algorithm
b) Explain MD5 algorithm

5. a) Expalin address base authentication protocols.
b) Expalin the Procedures to establish a session key.

6. Desribe Kerberos version 5 Protocol.

7. a) Describe SSL architecture.
b) Explain Athentication Header.

8. a) Explain E-mail security.
b) Explain the content types of MIME.

INFORMATION SYSTEMS CONTROL AND AUDIT( 3rd Year)

(With effect from the admitted batch of 2004-2005)

Time: Three hours Maximum:100 marks

First question is compulsory.
Answer any FOUR from the remaining.
Answer all parts of any question at one place.


1. Answer the following:

a) What is meant by crypto system?
b) What are the characteristics of good data processing system?
c) What is a passive attack on a communication network?
d) What is the boundary system for an IS?
e) Describe the different input forms used for inputting data.
f) Why information controls are used?
g) What is meant by spooling?
h) What is the global evaluation judgement on maintenance of asset safeguarding and data integrity?
i) Incorrect data in a computer system makes what problems?
j) Write about phases of system development process?
k) How to measure effectiveness of information system?
L) Define information system efficiency.
M) What are the basic activities of boundary subsystem?
N) Define computer system error.
O) Why should application programs that update monetary data items needs to maintain suspense account?

2. Describe about the components of internal control of the IS in an MNC.

3. Briefly describe the impact of globalization and technology revolution and need for information control and auditing.

4. Write about the functional capabilities of utility software.

5. What is meant by encryption and decryption? Describe the advantages and disadvantages of any two crypto systems you know?

6. Differentiate amnagement controls and application controls of IS?

7. Suggest suitable information audinging system for railway reservation system in A.P.

8. Expalain auditing procedure to audit any one expert system.