You are on page 1of 2

prepared by B.V.N.

RAJESWAR FOR MAY 2010 EXAMS


1.a) What is a system? Explain the process of decomposition with example ?
b) Explain the characteristics of Information?

2.a) What is entropy and explain how to prevent entropy?


b) What are the prerequisites of effectives of MIS?
c) Distinguish between Individual and Group decisions?

3.a) Explain the in problem solving with examples ?


b) what Information is required by Marketing system?
c) Explain the elements in personal management system?

4.a) What is DSS ? Explain the of DSS?


b) What is EIS ? how does EIS differ from Traditional information systems?

5) a. define Client-Server ? what are the characteristics of C / S ?


b)Explain the categories of risks ? What control techniques are essential to control?

6.a) What is SDLC ? Briefly explain how the investigation of present system is done?
b) What are the various methods to develop systems ? Explain Fact finding techniques?

7.a) Explain DFD with example?


b.)What are the factors to be considered while designing Input ?
c) List out the various formats of information output ?

8.a) What are the stages in In-House development?


b) explain the factors to be considered while coding give with examples ?
c) Explain program design tools with examples ?

9.a) Explain the steps involved in Equipment installation ?


b) what type of training is made for users and operators ?
c) discuss the process involved in conversion ?

10 . a) Flowcharts for Production scheduling / Wip ?

11. a) What is ERP ? What is BPR ?


b) Explain the steps in implementing ERP
c) what are the post implementation blues ?

12.a) What are the objectives of operating systems ?


b) Explain the organization controls and how it can be achieved ?

13.a) Discuss internet and Intranet controls ?


b) How do we achieve computer centre security i.e DRP?

14.a)List out various levels of field interrogation ?


b) Explain run-to run controls ? Source document controls?

Mail :bvnr@vsnl.net 1
15.a) What is a computer Fraud ?Explain various computer fraud and abuse
techniques?
b) Describe what controls can be imposed to make fraud to become
difficult to perpetrate ?
c) what are the reasons for not prosecuting fraud perpetration?

16 . Infotech imp topics : List out the differences between 2000 and 2008
act?
Chap 1 sec 2 : chap III, Vi, IX, xI, xIII?

17. List down the frame work of Audit of overall security ?


b.) Discuss the scope of ISaudit ? What are various Audit concerns?

18.a) what are various Concurrent audit Techniques explain them?


b) Explain the contents of frame work of Sys.development and Maintenance
controls?

19. What is security objective? What are the approaches to information


security?
b) explain the role of information security administrator ?

20.a) describe the various tools used in programming work bench ?


b) what are the components of case work bench

Short notes
Supra system Mrp Data Data storage System
dictionary testing
Benchmarkin Encryption Firewall Access list Bio-metric
g
DIAT chap 15 BS7799 Laptop Backup Electronic
security controls signature
certificate

From B.V.N.RAJESWAR
Note > June 09 my student got 89 .
Nov 09 all India Ist rank holder in IInd group Highest was only in MICS 80

Mail :bvnr@vsnl.net 2

You might also like