ISCA NOV 2010 Important Questions for November 2010 According to

advertisement
ISCA
NOV 2010
Important Questions for November 2010
According to new notification given by the institute
 There will be one compulsory question which may be from any of the questions
 Since a compulsory question so a choice will be available
 Apart from that one internal choice like Either or will also be there
1. a.What are the types of System ? Explain decomposing with example?
b. Explain the characteristics of information? Discuss Entropy
c. What are the various components of TPS? What are the features of tps?
2.a.What are the prerequisites of MIS with limitations of MIS?
b. Discuss the impact of computers on MIS?
c.What is the purpose and contents of EIS?
3. Explain the traditional models of computing architecture ?
b.What are the security and risk factors to be considered for Client-Server ?
4.a.What are the various approaches in developing SDLC ?
b. compare and contrast between prototype and Top down approach? Shortnotes on
Systemmanual ?
c. Explain the system development methodology ? Why Organizations file to achieve
system development objectives ?
5.aWhat are various factors considered while designing coding schemes ? give
examples?
b.Explain the important factors in Input / Output design ?
c. Describe briefly, various activities that should be completed for successful conversion
of an existing system to the new information system?
d. Discuss the post implementation evaluation?
6. Draw a flowchart fo Sales order processing using OLRT ? Cost estimation / WIP?
7 a) Define ERP? Explain the characteristics & Features of an effective ERP?
b) What are post implementation blues? Benefits of ERP?
c) What is BPR ? What is a Business modeling & engineering ?
d) Parle is developing several types of biscuits , having its branches all over the country .
The management wishes to consolidate the information through centralizing for the
information flowing from its branches in uniform manner across various levels of
organization. A analyst was employed to study the prevailing situation and the
management concerns. He recommended the Company to go for ERP ? What will be the
situation of ERP is implemented ?
8 a) What components need to be found in secure operating systems?
b) What are audit trial objectives? Explain in detail the organisation structure controls?
c)Explain the computer center security control?
9 a) Why do you require access & backup controls ?Explain SPLMS?
b) How to control denial of service attack?
Mail : bvnr@vsnl.net
Page 1 of 2
ISCA
NOV 2010
10) a) How should organization plan to control subversive attacks r?
b) What are the controls necessary for Personal computer controls?.
11) a) Discuss source document controls ?What are validation controls ?
b) What are the three categories of processing control? What are output controls?
12)a) What is a computer fraud?Explain the computer fraud through data processing
model?
b)Why there is arise in Internet computer frauds ? Discuss various measures that can
decrease the potential for fraud and any resultant loses?
13 . a.List down the differences between ITACT2000 and ITAACT 2008?
b. Other sections 10 / 30/ 43/ 58/ 65-80 / 87
14) a)Explain the Audit’s scope and objectives ?
b) List down the frame work for processing control /program development?
15 a) List down the frame work of overall computer security ?
b) What are concurrent audit techniques explain the types under them?
c) Explain concurrent audit techniques?
16)a) What is Information security?how to protect computer held-information?
b) What are the core principles of information security?
17) a) What are case tools? What are programming workbench?
b) Write briefly on Integrated CASE tools? Write the example of CASE tool set ?
18) Short notes
* Supra system / System Stress /Database/MRP / Fat client-server/SYSTEM TESTING/Data
Dictionary / Data storage /Firewall / Access list//GFS in Mag.tape/ Biometric devices
/Batch
control
/
Check
digit
control/System
maintenance
/
DIAT
/
incarcerate(imprisionment)/Laptop security / BS 77 -99 / Digital Signature Certificate /
Server-centric model
Mail : bvnr@vsnl.net
Page 2 of 2
Download