System Analysis and Design
501. Some audit and control procedures in a system
- detect and correct errors in programs
- selectively print records in a system which meet certain criteria
- examine credit and debit balances in an accounting system and check if they balance
- provide a facility to trace a variable value through processing steps and print intermediate values when required
- i and ii
- ii and iii
- i, ii, iii
- ii, iii, iv
Correct answer: (D)
ii, iii, iv
502. By information system testing we mean
- testing an information system correctly
- determining whether a system is performing as per specifications
- determining whether a system is performing optimally
- ensuring proper function of a system
Correct answer: (B)
determining whether a system is performing as per specifications
503. Security in the design of information system is used to
- inspect the system and check that it is built as per the specifications
- protect data and programs from accidental or intentional loss
- ensure that the system processes data as it was designed to and that the results are reliable
- ensure privacy of data processed by it
Correct answer: (B)
protect data and programs from accidental or intentional loss
504. Some security measures commonly used are
- data encryption
- logging of all accesses to an information system and recording changes made (if any)
- data compression
- copying of files
- ii and iii
- i and iii
- i and ii
- ii and iv
Correct answer: (C)
i and ii
505. Controls are necessary in information systems as
- massive amounts of data are processed and human errors are expected in data entry
- accidental errors can lead to loss of money and credibility in a system
- to protect the system from virus attack
- data may be lost due to disk crashes
- i and ii
- i and iii
- i and iv
- ii and iii
Correct answer: (A)
i and ii
506. Audit in the design of information system is used to
- inspect the system and check that it is built as per specifications
- protect data from accidental or intentional loss
- ensure that the system processes data as it was designed to and that the results are reliable
- ensure privacy of data processed by it
Correct answer: (A)
inspect the system and check that it is built as per specifications
507. A two way check
- calculates the same quantity in two different ways and compares them for equality
- calculates the quantities and compares them for equality
- checks a data item in two different ways
- enters data two times and cross-checks them
Correct answer: (A)
calculates the same quantity in two different ways and compares them for equality
508. Some of the features of audit package used to check systems are:
- facility to total specified items based on some criteria
- extracting items based on some criteria for checking
- check-pointing and restart facility
- hardware faults recovery
- i, ii
- i, ii, iii
- i, ii, iii, iv
- i, ii, iv
Correct answer: (B)
i, ii, iii
509. By string test we mean
- a test which tests operations with strings
- a string of tests on programs
- Test on related programs
- The output of a program is sent as input to related program(s) to see if data is transferred correctly
Correct answer: (D)
The output of a program is sent as input to related program(s) to see if data is transferred correctly
510. The following measures are taken to ensure security of information systems:
- duplicate copies of data/programs are kept in a different place preferably in fire-proof vault
- password protection is used to prevent unauthorized access
- no one is allowed to alter data in the database
- no one is allowed alter programs
- i and ii
- i, ii, iii
- ii, iii, iv
- iii and iv
Correct answer: (A)
i and ii