System Analysis and Design
491. Control in design of an information system is used to
- inspect the system and check that it is built as per specifications
- protect data from accidental or intentional loss
- ensure that the system processes data as it was designed to and that the results are reliable
- ensure privacy of data processed by it
Correct answer: (C)
ensure that the system processes data as it was designed to and that the results are reliable
492. A proof figure is
- a figure used to prove the correctness of data entry
- an additional data entered with each record to facilitate detection of arithmetic error
- a number used during data entry
- a modulus-11 check digit
Correct answer: (B)
an additional data entered with each record to facilitate detection of arithmetic error
493. Auditing of information systems is primarily required to ensure that
- all input records are correct and are included in processing
- the system has ample protection against frauds
- the processing performance is reliable
- the system is developed at low cost
- i and ii
- iii and iv
- ii and iii
- i, ii and iii
Correct answer: (D)
i, ii and iii
494. It is advisable for an auditor to require an operational information system to
- keep logs of all system runs and people involved
- ensure that the programs and system operation are well documented
- ensure that no changes are allowed
- ensure that the inputs and batch controls are properly designed
- i, ii, iii
- ii, iii, iv
- i, ii, iv
- i, ii
Correct answer: (C)
i, ii, iv
495. Program tests use test data to
- exercise all paths taken by a program
- test loop counters
- test with values which change state of logical variables
- comprehensively exercise program
- i, ii
- i, ii, iii
- i, ii, iii, iv
- i, ii, iv
Correct answer: (B)
i, ii, iii
496. It is necessary to protect information system from the following risks:
- natural disasters like fire, floods etc
- disgruntled employees
- poorly trained employees
- hackers
- industrial spies
- data entry operators
- ii, iii, iv, v
- i, ii, iii, iv, v
- i, iv, v
- i, ii, iii, iv, v, vi
Correct answer: (D)
i, ii, iii, iv, v, vi
497. To protect a system from viruses one should
- not allow unauthorized use of floppy disks
- scan viruses in files received via a network or floppies
- isolate a system from networks
- install a roll-back recovery program in the system
- i and iii
- i and ii
- ii and iv
- i, iii, iv
Correct answer: (B)
i and ii
498. Proof figures are used to check
- arithmetic errors in processing
- data entry errors in processing
- loop errors in program
- proof of program correctness
- i and ii
- i and iii
- ii and iv
- iii and iv
Correct answer: (A)
i and ii
499. A relationship check
- is concerned with checking a relation
- uses an entity-relationship model for checking
- finds out if a relationship is satisfied in computation
- uses the fact that a known relationship exists between two data elements and checks if it is satisfied during computation
Correct answer: (D)
uses the fact that a known relationship exists between two data elements and checks if it is satisfied during computation
500. By auditing around the computer we mean
- the inputs and the corresponding outputs are compared and checked for correctness
- the programs and procedures are checked for correctness
- special synthetic data is input and outputs checked for correctness
- programs are written to check the functioning of the computer hardware
Correct answer: (A)
the inputs and the corresponding outputs are compared and checked for correctness