Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Read all heading carefully even alternate headings given in this list.
Don’t take tension we are best (JAAN LAGA DENA).
Try to write minimum 3 lines in points in own language.
Read text of these question minimum 3 Times.
Don’t take tension we are best and thanks for love and respect.
Jai mata di & jai hind jai bharat.
1. Explain two primary methods, which are used for the analysis of the
scope of a project in SDLC. (PM 11)
2. Bring out the reasons as to why organization fail to achieve their System
Development Objectives? Or Explain the various user related issues in
achieving the system development objectives. Or What can be the major
Developer-related issues and challenges in achieving the System
Development objectives?
3. Explain ‘Unit Testing’ and its categories that a programmer will
perform on a program unit of the proposed system. Or testing a
program unit is essential before implementing it. Name any four
categories of test; a programmer typically performs on a
programmable unit.
4. What are the major objectives of system requirements analysis phase in
the SDLC? Or List the activities to be performed during the phase of
System Requirement Analysis or List the activities to be performed
during the phase of System Requirement Analysis. (both case (objective
& activity’s) kejriwal election wala )
5. Design of database.
6. As a part of system development team, the system analyst prepare a
document called the System Requirement Specification (SRS).
Describe the contents of SRS for a typical software development. Or
Sections/content SRS
7. As a consultant, suggest the validation methods that may be adopted by
the management of ABC Mall to validate the vendor’s proposal. Or what
may be the major validation methods for validating the vendors’
proposal for developing the Portal?
8. Describe accountants’ involvement in development work in brief. Or
What are the various cost factors that are involved in software
development.
9. Regression testing & integration testing.
10.Explain different changeover strategies used for conversion from old
system to new system. (CS PILOT) or Explain the different conversion
strategies used for conversion from a manual to a computerized system.
OR Describe various strategies for change over from manual system to
computerized system. (PM 19)
11.The top management of company has decided to develop a
computer information system for its operations. Is it essential to
conduct the feasibility study of system before implementing it? If
answer is yes, state the reasons. Also discuss three different angles
through which feasibility study of the system is to be conducted.
(Write technical, economical and operational. Refer pm q.no. 7) or
difference between economical and operational study.
12.“Feasibility Study is the considered as a backbone of System
Development Life Cycle (SDLC).” Considering this statement; list out
various dimensions of Feasibility Study in SDLC. Or Dimension of
feasibility study (PM 27).
13.What issues you would like to raise during the technical feasibility of new
proposed system?
14.What do you understand by Operational Feasibility? Describe the
questions, which help in testing the operational feasibility of a project.
15.Describe briefly four categories of major tools that are used for system
development.
16.When the existing information system is to be converted into a new
system, what are the activities involved in the conversion process? Or
What activities are involved in system conversion? Explain them briefly.
Or Conversion activity (PM 20)
17.Discuss major strengths/Weakness of ANY Model. or As a person in-
charge of System Development Life Cycle, you are assigned a job of
developing a model for a new system, which combines the FEATURES of
a prototyping model and the waterfall model. Which will be the model
of your choice and what are its strengths and weaknesses? (Answer:-
SPIRAL MODEL if word features use/ incremental in word element use)
18.Discuss important factors that should be considered by the system
analyst while designing user input/output forms of a user-interface. Or
Discuss various issues that should be considered while designing
systems input.
19.Explain the following testing techniques:
a. Black Box Testing
b. White Box Testing
c. Gray Box Testing
20.State and briefly explain the stages of System Development Life Cycle
(SDLC). Or Discuss the activities involved during the System Designing
phase under SDLC (Systems Development Life Cycle).
21.Discuss in detail, how the analysis of present system is made by the
system analyst? or What areas are required to be studied in order to
know about the present system? Write the problems that the ABC Udyog
is presently facing.
22.From the perspective of IS audit, what are the advantages of System
Development Life Cycle?
23.Fact finding techniques
24.Discuss Final Acceptance Testing in brief.
25.Mention different functions of steering Committee under SDLC.
26.According to you as an IS Auditor, what are the validation methods for
approving the vendors‟ proposals?
27.What are the popular implementation strategies that may be used to
convert an old system into new system?
28.Discuss Final Acceptance Testing in brief.
29.Discuss the roles of the following with reference to SDLC: (i) Steering
Committee (ii) System Analyst (iii) Database Administrator (iv) IS
Auditor
30. “A System Development Methodology is a formalized, standardized,
well-organized and documented set of activities used to manage a
system development project.” Prepare a list of the common
characteristics that all these system methodologies will have.
31.Discuss the design principles that are applied to develop the Physical
design of Information Systems.
Auditing of Information Systems
1. PQR Ltd. is looking for a suitable IS Auditor. Please send an introductory note to
PQR Ltd. explaining your suitability by describing the skill set and the
competence you possess for the job other that your qualification. Or Explain the
set of skills that is generally expected of an IS auditor. Or The company wants to
appoint an IS auditor to conduct audit of the existing Information System. What
are the skill-set that the company generally may lookout in the candidature for
hiring an IS auditor?
2. IS auditors review risks relating to IT systems and processes. Briefly discuss these risks.
Or As an IS auditor, what are the risks reviewed by you relating to IT systems and
processes as part of your functions? Or What are the various functions performed by
an Information Systems’ Auditor?
3. Compared to traditional audit, evidence collection has become more challenging with
the use of computers to the auditors. What are the issues which affect evidence
collection and understanding the reliability of controls in financial audit? (Only
advocate wala) or Discuss the issues relating to the performance of evidence collection
and understanding the reliability of controls. Or Discuss the issues relating to the
performance of evidence collection and understanding the reliability of controls. Or
“Existence of an Audit Trail is a key financial audit requirement since without an audit
trail, the auditor may have extreme difficulty in gathering sufficient, appropriate audit
evidence to validate the figures in the client’s accounts.” Determine the issues through
which the performance of evidence collection and reliability of controls can be
understood?
4. Discuss the points relating to legal considerations and audit standards to be
considered by an IS auditor as a part of his/her preliminary review. Or Let Mr. X is
appointed as an IS auditor of PQR Ltd. and is assigned a task to perform preliminary
review of audit environment. What are the legal considerations and Audit Standards
that he should consider as a part of his preliminary investigation?
5. Explain major types of is audits in brief. Or discuss different categories of information
system audit.
6. Application control & their audit trail (P.M-18)
7. Discuss the Accounting and Operations Audit Trails with respect to
Communication/Input/Processing/Output/Boundary/Database Controls. Or
Discuss the Accounting and Operations Audit Trails of Input Controls under
Application Controls. Or Discuss Boundary Controls and their Audit Trails under
Application Controls. Or Discuss the Accounting and Operations Audit Trails of
Input Controls under Application Controls. Or Discuss the Accounting and
Operations Audit Trails with respect to Communication Controls.
8. Discuss the role of auditors in evaluating the implementation of Security
Management Controls and Operations Management Controls.
9. Objectives of IS audit. or What are the main objectives that an organization can
achieve through Information Systems Auditing?
10. Basic Plan with reference to IS Audit (PM)
11. Management control & their audit trail (P.M-13)
12. Define and elaborate categories of risks that affect a system and taken into
consideration at the time of assessment or audit of information system.
13. Being an IS Auditor, what are the critical factors that you will consider as a part of your
preliminary review which are going to be critical for your effective audit review? Or
Preliminary review.
14. Discuss Audit Trail. How can it be used to support enterprises’ security objectives?
15. What are the key steps that can be followed for risk based approach to make an
audit plan? Explain in brief. Or “Risk assessment is considered as a critical and
inherent part of the IS Auditor’s planning and audit implementation”. What are
the steps that can be followed by an IS Auditor for a risk based approach while
preparing an audit plan?
16. Discuss the major concerns that an auditor should address in evaluating the
implementation of Programming Management Controls.
17. As an auditor, what do you think are the advantages of using Continuous Audit
Techniques?
18. As an auditor, what do you think are the disadvantages and limitations of using
Continuous Audit Techniques?
19. Steps of IS Audit.
Information Technology Regulatory Issues
1. Enterprise needs to take various steps to ensure that they comply with
the Cyber Laws of India. List out the steps that they must take to ensure
the compliance. (Super important)
2. What are major provisions on Retention of Electronic Records’ with
reference to Information Technology Act 2000? Explain in brief. (SEC 7) or
to retain their electronic records for specified period, what are the
conditions laid down by Section 7, Chapter III of Information Technology
Act, 2000? Or Or ABC Ltd not aware of importance of and requirement
related to Retention of Electronic Records as per IT act 2008 Please
enlighten them of this. (PM 20)
3. Explain ‘Authentication of Electronic Records’ with reference to Section
3 of Information Technology Act 2000. Or How does the Information
Technology Act 2000 enable the authentication of records using digital
signatures? (PM 3)
4. Discuss Information Technology Infrastructure Library (ITIL) Service
Lifecycle. Or ITIL ALL PARTS
5. Requirements of SEBI for System Controls & Audit (RBI, SEBI, RBI)
(Book page 240-242). (SEBI MOST IMPORTANT)
ABC Ltd. is a security market intermediary, providing depository
services. Briefly explain the relevant requirements with respect to
annual systems audit mandated by SEBI in this regard. (PM-16)
The manner of selecting auditors builds confidence among various
stakeholders. Describe SEBI norms for selecting an auditor. (PM 18)
What are the suggested system controls that should be covered under
IS audit as per the requirement of the Reserve Bank of India?
Discuss the Audit Report norms set up by SEBI for System Controls and
Audit.
What are the information that an IS auditor is expected to obtain at
the audit location before proceeding with the IS audit as per the
provision of IRDA?
6. Discuss the main provisions provided in Information Technology
Act 2000 to facilitate e- Governance. (PM 4)
7. What are the provisions given in Information Technology
(Amendment) Act, 2008 for the retention and audit of documents
etc. in electronic form?
8. Phase of ISMS or PDCA cycle or ISO 27001
9. Discuss the provision given in IT (Amendment) Act 2008 that gives
“Power to make rules by Central Government in respect of Electronic
Signature sec 10 of IT act”.
10.How does Information Technology Act, 2000 define the term
Electronic Signature? State under what conditions any electronic
Signature or Electronic Authentication technique shall be considered
reliable as per Section 3A of Information Technology Act, 2000.
11.Discuss Penalty for publishing Electronic Signature Certificate false
in certain particulars under section 73 of Information Technology
Act 2000. (SEC 73) (PM 10)
12. SA 402
13. What is the vision of National Cyber Security Policy 2013? Also explain its major objectives.
14. Describe the ‘Tampering with Computer Source Documents’ in the light of Section 65
of Information Technology Act 2000. (PM 7)
15. Discuss ‘Power of Controller to give directions’ under section 68 of Information
Technology Act 2000. (SEC 68)
16. Discuss Power to issue directions for interception or monitoring or decryption of any
information in any computer resource under Section 69 of Information Technology Act
2000.
17. Section 25 and 26 suspension of license to issue electronic signature certificate?
18. Discuss the provision given in IT (Amendment) Act 2008 that gives power to issue
directions for blocking for public access of any information through any computer
resource?
19. Discuss the provision given in IT (Amendment) Act, 2008 that gives “Penalty for breach
of confidentiality and privacy”.
Emerging Technologies