System Analysis and Design
521. auditing with a computer we mean
- the inputs and the corresponding outputs are compared and checked for correctness
- the programs and procedures are checked for correctness
- special synthetic data is input and outputs checked for correctness
- programs are written to check the functioning of the computer hardware
Correct answer: (C)
special synthetic data is input and outputs checked for correctness
522. The purpose of parallel run is to
- to see whether outputs of a newly computerized system matches those of currently running manual or legacy system
- have redundancy for reliability
- test an operational information system
- test a system being newly designed
Correct answer: (A)
to see whether outputs of a newly computerized system matches those of currently running manual or legacy system
523. The main objectives of testing are
- when correct inputs are fed to the system the outputs are correct
- when incorrect inputs are fed to the system they are detected and rejected
- the requirement specifications are correct
- verify that the controls incorporated in the system function correctly
- i, ii
- i, ii, iii
- i, ii, iii, iv
- i, ii, iv
Correct answer: (D)
i, ii, iv
524. By security of an information system we mean protecting
- data from accidental or intentional damage or loss
- programs from accidental or intentional corruption or loss
- programs and data from unauthorized disclosure or change
- individual private data from disclosure
- i and ii
- i and iii
- i, ii, iii
- i, ii, iii, iv
Correct answer: (C)
i, ii, iii
525. By auditing through the computer we mean
- the inputs and the corresponding outputs are compared and checked for correctness
- the programs and procedures are checked for correctness
- special synthetic data is input and outputs checked for correctness
- programs are written to check the functioning of the computer hardware
Correct answer: (B)
the programs and procedures are checked for correctness
526. By Electronic Commerce we mean:
- Commerce of electronic goods
- Commerce which depends on electronics
- Commerce which is based on the use of internet
- Commerce which is based on transactions using computers connected by telecommunication network
Correct answer: (B)
Commerce which depends on electronics
527. For carrying out C2C e-Commerce the following infrastructure is essential:
- World Wide Web
- Corporate network
- Electronic Data Interchange standards
- Secure Payment Services
- Secure electronic communication link connecting businesses
- i and ii
- ii and iv
- i
- i and iv
Correct answer: (C)
i
528. Disadvantages of e-Commerce in India are
- internet access is not universally available
- credit card payment security is not yet guaranteed
- transactions are de-personalized and human contact is missing
- cyberlaws are not in place
- i and ii
- ii and iii
- i, ii, iii
- i, ii, iii, iv
Correct answer: (C)
i, ii, iii
529. In B2B e-Commerce
- Co-operating Business should give an EDI standard to be used
- Programs must be developed to translate EDI forms to a form accepted by application program
- Method of transmitting/receiving data should be mutually agreed
- It is essential to use internet
- i, ii
- i, ii, iii
- i, ii, iii, iv
- ii, iii, iv
Correct answer: (B)
i, ii, iii
530. By security in e-Commerce we mean
- Protecting an organization's data resource from unauthorized access
- Preventing disasters from happening
- Authenticating messages received by an organization
- Protecting messages sent on the internet from being read and understood by unauthorized persons/organizations
- i, ii
- ii, iii
- iii, iv
- i, iii, iv
Correct answer: (D)
i, iii, iv