Email me

Tuesday, May 20, 2014

IPCC ITSM important Qtns for May 14 Exam - By Dr.BVN.Rajeswer sir


Question NO.1
is compulsory.                                          

Answer any five questions from the rest

1.Answer all following questions in
brief:    5 x 2 = 10

 (a) What is Assembler explain the advantages /
limitations (2)

(b) what is a object code and where
is it used. (2)

(c) What do you mean by 'Replicated
database' ? (2)

(d) Describe the utility  of a Gateway. 

(e) differentiate File Volatility
and File Activity? (2)


2. (a) What are various
transmission techniques (4)

(b) Explain the architectures of
DBMS (4)


3.(a) Discuss the sequential file
organization (4)

(b) What are types of internet
servers (4)


4.a)Explain different types of
electronic Fund Transfer . (4)

b) Discuss backup and recovery
strategy  (4)

5)  The income-tax for
the employees of an organization is calculated on the basis of their  gross income and the investments made by
them, under section 80 CC. the taxable income is calculated according to the
following rules :

income =Gross Income – Investments provided investments are less than 1

Income = Gross Income – 1,00,000

rules are applied to calculate the Income-tax on the taxable income

Taxable income





10% on the excess of 1,60,000


14,000 + 20% on the excess of 3,00,000

5,00,0001 and above

54,000 + 30% on the excess of 5,00,000

Also an educational cess of 3%  of income-tax is levied on all the employees,
irrespective of the income.

Employee number, Name, Gross Income, Investment amount is
given as input . Draw a flow chart to calculate the Income-tax payable for 100


6. (a) Explain the components of
Expert system? (4)

(b) How does CRM improve customer
relationship (4)


7.Answer any four questions:  2*4=8


 (a) explain Asynchronous mode of transmission

 (b) Explain types of IDS?.

 (c) Explain web hardware and software ? .

 (d) Write a note on Encryption ?.

 (e) What is a alternate key or
Candidate key


INFOTECH  MODEL 3  for may 2014

Question NO.1 is compulsory.      
Answer any five questions
from the rest

1.Answer all following questions in
brief:    10  x 1 = 10

(a) Dataware house (b) Spooling.(c)
Ethernet (d) Set/jet e) Broker

f) Message switching g) Radio wave
h) Real time  i) Channel  j ) FTP


2. (a) Distinguish GUIDED and

(b) Explain the functions of
Operating Systems (4)


3.(a) Explain the characteristics
of Client server(4)

(b) What are the types of Disaster
recovery Plan for Eliminating down time ? (4)


4.a) Explain various type of
Network structures   (4)

b.) What are the types of database
Structures ?(4)


5.a) Draw a flowchart which reads the following Customer  name , model number, no.of days hired
calculate and print Customer name, model number , Hire charges, Discount amt ,
nett amt including the deposit of  500


Alto car









The hirer gives the discount as

  • For more than  5 days 10%

  • For more than 10 days 15%

  • For more than 20 days 25% is given


b.) What are the types of Decision
Tables  (2)

6. (a) Distinguish advantages and
concerns of datawarehouse(4)

(b)What are the constituents of
data ware house (4)


7.Answer any four questions:  2*4=8

 (a) Firewall ?.

 (b) Types of System software ?.

 (c) What is shareware and open source software.

 (d) Write about OOP / L ?.

 (e) What are the industries which are affected
by M-commerce



Get your own FREE website, FREE domain & FREE mobile app with Company email.  
Know More >

Thursday, May 8, 2014

ISCA Important Questions for MAY - 2014


ISCA Important
Questions for MAY 2014  Prepared by

Chap 1

1) a)  What
are the types of systems Explain the characteristics of subsystem?

b) What is Information and what are its
attributes? what are the components and characteristics of CBIS ?

2)a)  Discuss the Constraints and limitations MIS?

Explain the effect of applying on MIS? List down the misconceptions
or myth about   ERP and limitations of

is DSS ? What are the components of DSS?

b)what do
you understand from the term "database" how is it implemented in three
different levels ? Explain the characteristics of  EIS?

c) What
are the components of expert system ?


Chap 2

4)a) What
is SDLC ?  Explain the strength and
weakness of Traditional / incremental approach?

organizations fail to achieve system development objectives? 

c) Read
the below case  and answer the following
with proper justifications:

An organization is in
the stage of system development to implement an enterprise wide information
system, where the following conditions exist:

End users are not
aware of the information needs

The new system is
mission critical and there is a hasty need.

The business risks
associated in implementing the wrong system are high.

the type of system development approach and the steps to be followed in the
above stated conditions.

a.    Justify  the reasons for choosing the particular
approach for system development.

b.    What
are the Strength & Weakness of the approach selected

5)a) List
the sequence in system development Methdology?

b) What
is DFD ? Explain with  an example ?

c) What
are various fact finding techniques ?

Explain the sequence involved in studying about existing system ?

e) What
are the various types of test plan explain  Integrated test plain detail?


6 )a)
What are the factors  to be considered
while designing Input/output  ? 

b) What
is a logical and physical design  ?

explain the post implementation evaluation ?


7) a)list
down the various conversion strategies? What is Regression testing?

b)  What are the various type of system

Training in new system is utmost important because a success of the system
depends on the training in this regard what type of training is to be provided
for operators and users ?


Chap 3

9) a) Discuss
the impact of computers on internal audit ? What are the cost involved in implementing
and operating controls ?

b) List
out the importance of audit trial ? What is the basis of information classification
to consider the level of protection ?


c)  Explain the four categories of control (or)
Explain the categorization of controls ?

 (1.1) What control can be established for
control over data Integrity , privacy and security?

Explain Intrusion detection, virus protection and Access control mechanism ?

What are the various risk associated with Technical Exposures?

Describe the auditor role in evaluating logical access controls ?


Chap 4

10) a)
Explain the methodology adopted by the Auditor in audit testing ?

b) What
should be the contents of audit findings & reporting?

c) Explain the various concurrent audit
techniques ? What are the advantages and disadvantages  of continuous audit technique?

d) what
approach the ISA has to adopt while reviewing the operating system ? types of
Hardware testing?


Chap 5

What is i) Vulnerability & Threat ii) Risk & Exposure iii) Qualitative
techniques iv) Attack?

b) Explain
the threat due to cyber crimes ? what is risk assessment ? What are the areas
to be focused?

c) What
is Residual risk? Discuss the areas of consideration of Risk?

d) What
are various common risk management strategies ? (AMTR)

e) how is
data classification done in risk management process?

Explain Risk ? What are various threats to computerized environment ?



chap 6

12) a)
Explain the methodology of developing a BCP? Discuss  Single point of failure?

b) As a
information system auditor what control measures will you check in minimize
threat, Risks and exposure to a computerized system ?

c) Discuss
the various types of backup for the system and data together?  Write short notes on fundamental factors for
selecting the media suggest the tips on backup also?

d) List
out the Disaster recovery procedural plan document ? what are the types / kinds
of Insurance ?

Describe the audit tools and techniques available for simulation ?


Chap 7

13) a)
Define ERP?  What are the  characteristics and features of erp?

the ERP implementation methodology?

Explain the Risk and Governance issues in and ERP? ***

explain the post implementation or life after implementing ERP?

e) What
are key planning implementation decisions of ERP?(refer case study 7.40 page)


chap 8

14)a) What
are the things to verified under ISO 27001(BS7799  part ii) 

b)The Health Insurance Portability and Accountability Act (HIPPA).
There is a security rule issued under the Act which lays out three types of
security safeguards required for compliance. What are those conditions under
these safeguards for which the company should look after explain them in

c) Explain the capability
maturity module or model?  

d) SAS 70  auditor report under title I and title II?


chap 9

15? What
is security objective ? what is holistic information protection approach ?

Discuss the contents for developing a audit program document  ? Discuss Asset classification and
security  classification ?

c) What
kind of working papers and documentation you will prepare for audit working and

Explain the physical and environmental security of each site ?

explain the scope of IS audit ? what are the contents of a standard Information
system audit ?

chap 10

16) IT
act imp topics :differences between 2000 and 2008 it act

   Section 2,7,30,41,43,44,57,58,85,87,89 chap  xi,xiii 


17) Short

* System
stress/entropy/supra system / RAD model/Bench marking / Data Dictionary /Access
list/ Biometric devices /types of physical locks/Multiyear test plans/ / COBIT
5 Enablers /COSO / Electronic Signature certificate /





For case studies
asked till now refer the practice manual issued on or after jan 13, in this
question 6,8,9 has not been asked ?


In case studies the
questions may be either direct or with case type  , try to extract the concept and write down


Write it in
bulleted form , where ever required give illustrations & charts


Topics   4,5,6,7,9,10  put together  constitute  55-65


Topic  2 is reflected once again in chap 3 ,4,8
& 9












Get your own FREE website, FREE domain & FREE mobile app with Company email.  
Know More >