Friday, August 22, 2008

CA Final - MICS - NOV 2008 - Model Paper 1

Question No. 1 is Compulsory
Answer any four questions from the rest

(a) What are the objectives of information security? (2)
(b) How CASE tools evolved? (2)
(c) What do you understand by the Concurrent Audit technique? Discuss five commonly used concurrent audit techniques? (14)
(d) Define “Hash Function” as per section 3 of Information Technology Act? (2)

(a) Explain various categories of Information Systems? (8)
(b) What are the benefits of Client/ Server Computing? (6)
(c) What is data dictionary? What are its uses? (6)

(a) What is a Context Diagram? (3)
(b) What is Windowing Capability? (3)
(c) What is a System Manual? (3)
(d) What is a Check Digit? (3)
(e) What is Business Process Reengineering? (3)
(f) What is One-Time Password? (2)

(a) What are the components of a Client Server Architecture? (8)
(b) Explain briefly the various methods to control risks from subversive threats? (12)

(a) “Prevention is better than cure”. What are the various methods to prevent computer frauds? (10)
(b) Explain E-Governance with relevance to section 6 and 8 of the Information Technology Act? (8)
(c) What is BS7799? (2)

(a) What are the techniques used to preserve audit trails in processing a Computer Based Information System? (6)
(b) How to evaluate the life after implementation of ERP? (6)
(c) Distinguish Program Flowchart, System Flowchart, Data Flow Diagram, Pseudo Code & Structure Chart? (6)
(d) What is the meaning of the term “program debugging”? (2)

Write Short Notes on any four: (4 x 5 = 20 Marks)
(a) Holistic Protection
(b) File Interrogation
(c) Server-Centric Model
(d) Non-programmed Decisions
(e) Preventing Systems Entropy

No comments: