System Analysis and Design

521. auditing with a computer we mean

  1. the inputs and the corresponding outputs are compared and checked for correctness
  2. the programs and procedures are checked for correctness
  3. special synthetic data is input and outputs checked for correctness
  4. programs are written to check the functioning of the computer hardware
Correct answer: (C)
special synthetic data is input and outputs checked for correctness

522. The purpose of parallel run is to

  1. to see whether outputs of a newly computerized system matches those of currently running manual or legacy system
  2. have redundancy for reliability
  3. test an operational information system
  4. test a system being newly designed
Correct answer: (A)
to see whether outputs of a newly computerized system matches those of currently running manual or legacy system

523. The main objectives of testing are

  1. when correct inputs are fed to the system the outputs are correct
  2. when incorrect inputs are fed to the system they are detected and rejected
  3. the requirement specifications are correct
  4. verify that the controls incorporated in the system function correctly
  1. i, ii
  2. i, ii, iii
  3. i, ii, iii, iv
  4. i, ii, iv
Correct answer: (D)
i, ii, iv

524. By security of an information system we mean protecting

  1. data from accidental or intentional damage or loss
  2. programs from accidental or intentional corruption or loss
  3. programs and data from unauthorized disclosure or change
  4. individual private data from disclosure
  1. i and ii
  2. i and iii
  3. i, ii, iii
  4. i, ii, iii, iv
Correct answer: (C)
i, ii, iii

525. By auditing through the computer we mean

  1. the inputs and the corresponding outputs are compared and checked for correctness
  2. the programs and procedures are checked for correctness
  3. special synthetic data is input and outputs checked for correctness
  4. programs are written to check the functioning of the computer hardware
Correct answer: (B)
the programs and procedures are checked for correctness

526. By Electronic Commerce we mean:

  1. Commerce of electronic goods
  2. Commerce which depends on electronics
  3. Commerce which is based on the use of internet
  4. Commerce which is based on transactions using computers connected by telecommunication network
Correct answer: (B)
Commerce which depends on electronics

527. For carrying out C2C e-Commerce the following infrastructure is essential:

  1. World Wide Web
  2. Corporate network
  3. Electronic Data Interchange standards
  4. Secure Payment Services
  5. Secure electronic communication link connecting businesses
  1. i and ii
  2. ii and iv
  3. i
  4. i and iv
Correct answer: (C)
i

528. Disadvantages of e-Commerce in India are

  1. internet access is not universally available
  2. credit card payment security is not yet guaranteed
  3. transactions are de-personalized and human contact is missing
  4. cyberlaws are not in place
  1. i and ii
  2. ii and iii
  3. i, ii, iii
  4. i, ii, iii, iv
Correct answer: (C)
i, ii, iii

529. In B2B e-Commerce

  1. Co-operating Business should give an EDI standard to be used
  2. Programs must be developed to translate EDI forms to a form accepted by application program
  3. Method of transmitting/receiving data should be mutually agreed
  4. It is essential to use internet
  1. i, ii
  2. i, ii, iii
  3. i, ii, iii, iv
  4. ii, iii, iv
Correct answer: (B)
i, ii, iii

530. By security in e-Commerce we mean

  1. Protecting an organization's data resource from unauthorized access
  2. Preventing disasters from happening
  3. Authenticating messages received by an organization
  4. Protecting messages sent on the internet from being read and understood by unauthorized persons/organizations
  1. i, ii
  2. ii, iii
  3. iii, iv
  4. i, iii, iv
Correct answer: (D)
i, iii, iv
Page 53 of 61