Saturday, April 19, 2014

Andhra University (AU): Important Questions for first semester MCA, Information Systems Control and Audit

Looking for Andhra University old, model, previous and latest question paper. Here's an important sample question paper for the subject INFORMATION SYSTEMS CONTROL AND AUDIT. It will be useful for MCA, first (1st) semester examination of Andhra University. Have a look at below part to get such important questions.

University: Andhra University (AU), Visakhapatnam, Andhra Pradesh-2013
Subject: INFORMATION SYSTEMS CONTROL AND AUDIT
Important Questions

1. Answer the following:

a) Incorrect Data in a Computer System is likely to have more serious consequences for which System?

b) What does an efficient data processing system accomplish?

c) Why Information Systems controls are needed?

d) Which is the most likely to be a characteristic of the information systems plan prepared for a backbone organization?

e) Which is the most likely sequence of phases in the systems development process?

f) What are the keys a public-key cryptosystem uses?

g) How should a screen be organized for direct entry of input data?



h) What is a passive attack on a communication network?

i) How does Real memory errors are primarily detected?

j) What is the purpose of concurrency controls in a distributed database environment?

k) What control problem that arises with spooling software?

l) What are the functional capabilities of generalized audit software?

m) What is the global evaluation judgment on maintenance of asset safeguarding and data integrity?

n) What are the steps most likely will be undertaken first when evaluating the effectiveness of an information system?

o) What is the sequence of steps most likely will be used in an efficiency evaluation study?


2. What characteristics of computer systems often lead to high costs being incurred because of computer-system errors?


3. Briefly describe the five components of internal control that should be established in an organization.


4. Briefly explain the functions of the boundary subsystem. Give two components that perform basic activities in the boundary subsystem.


5. Briefly explain the nature of public –key cryptography.


6. Why is encryption an important means of protecting the integrity of data passing over public communication lines? Is encryption also useful as a means of protecting data passing over private communication lines?


7. Why should application programs that update monetary data items in the database maintain a suspense account?


8. What purposes might auditors seek to achieve in using generalized audit software to examine the quality of data maintained on an application system files?
Share This
Previous Post
Next Post

B.E Civil Engineer Graduated from Government College of Engineering Tirunelveli in the year 2016. She has developed this website for the welfare of students community not only for students under Anna University Chennai, but for all universities located in India. That's why her website is named as www.IndianUniversityQuestionPapers.com . If you don't find any study materials that you are looking for, you may intimate her through contact page of this website to know her so that it will be useful for providing them as early as possible. You can also share your own study materials and it can be published in this website after verification and reviewing. Thank you!

0 comments:

Pen down your valuable important comments below

Search Everything Here