(With effect from the admitted batch of 2004-2005)
Time: Three hours Maximum:100 marks
First question is compulsory.
Answer any FOUR from the remaining.
Answer all parts of any question at one place.
1. Answer the following:
a) What is meant by crypto system?
b) What are the characteristics of good data processing system?
c) What is a passive attack on a communication network?
d) What is the boundary system for an IS?
e) Describe the different input forms used for inputting data.
f) Why information controls are used?
g) What is meant by spooling?
h) What is the global evaluation judgement on maintenance of asset safeguarding and data integrity?
i) Incorrect data in a computer system makes what problems?
j) Write about phases of system development process?
k) How to measure effectiveness of information system?
L) Define information system efficiency.
M) What are the basic activities of boundary subsystem?
N) Define computer system error.
O) Why should application programs that update monetary data items needs to maintain suspense account?
2. Describe about the components of internal control of the IS in an MNC.
3. Briefly describe the impact of globalization and technology revolution and need for information control and auditing.
4. Write about the functional capabilities of utility software.
5. What is meant by encryption and decryption? Describe the advantages and disadvantages of any two crypto systems you know?
6. Differentiate amnagement controls and application controls of IS?
7. Suggest suitable information audinging system for railway reservation system in A.P.
8. Expalain auditing procedure to audit any one expert system.
Tuesday, September 16, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment