System Analysis and Design

491. Control in design of an information system is used to

  1. inspect the system and check that it is built as per specifications
  2. protect data from accidental or intentional loss
  3. ensure that the system processes data as it was designed to and that the results are reliable
  4. ensure privacy of data processed by it
Correct answer: (C)
ensure that the system processes data as it was designed to and that the results are reliable

492. A proof figure is

  1. a figure used to prove the correctness of data entry
  2. an additional data entered with each record to facilitate detection of arithmetic error
  3. a number used during data entry
  4. a modulus-11 check digit
Correct answer: (B)
an additional data entered with each record to facilitate detection of arithmetic error

493. Auditing of information systems is primarily required to ensure that

  1. all input records are correct and are included in processing
  2. the system has ample protection against frauds
  3. the processing performance is reliable
  4. the system is developed at low cost
  1. i and ii
  2. iii and iv
  3. ii and iii
  4. i, ii and iii
Correct answer: (D)
i, ii and iii

494. It is advisable for an auditor to require an operational information system to

  1. keep logs of all system runs and people involved
  2. ensure that the programs and system operation are well documented
  3. ensure that no changes are allowed
  4. ensure that the inputs and batch controls are properly designed
  1. i, ii, iii
  2. ii, iii, iv
  3. i, ii, iv
  4. i, ii
Correct answer: (C)
i, ii, iv

495. Program tests use test data to

  1. exercise all paths taken by a program
  2. test loop counters
  3. test with values which change state of logical variables
  4. comprehensively exercise program
  1. i, ii
  2. i, ii, iii
  3. i, ii, iii, iv
  4. i, ii, iv
Correct answer: (B)
i, ii, iii

496. It is necessary to protect information system from the following risks:

  1. natural disasters like fire, floods etc
  2. disgruntled employees
  3. poorly trained employees
  4. hackers
  5. industrial spies
  6. data entry operators
  1. ii, iii, iv, v
  2. i, ii, iii, iv, v
  3. i, iv, v
  4. i, ii, iii, iv, v, vi
Correct answer: (D)
i, ii, iii, iv, v, vi

497. To protect a system from viruses one should

  1. not allow unauthorized use of floppy disks
  2. scan viruses in files received via a network or floppies
  3. isolate a system from networks
  4. install a roll-back recovery program in the system
  1. i and iii
  2. i and ii
  3. ii and iv
  4. i, iii, iv
Correct answer: (B)
i and ii

498. Proof figures are used to check

  1. arithmetic errors in processing
  2. data entry errors in processing
  3. loop errors in program
  4. proof of program correctness
  1. i and ii
  2. i and iii
  3. ii and iv
  4. iii and iv
Correct answer: (A)
i and ii

499. A relationship check

  1. is concerned with checking a relation
  2. uses an entity-relationship model for checking
  3. finds out if a relationship is satisfied in computation
  4. uses the fact that a known relationship exists between two data elements and checks if it is satisfied during computation
Correct answer: (D)
uses the fact that a known relationship exists between two data elements and checks if it is satisfied during computation

500. By auditing around the computer we mean

  1. the inputs and the corresponding outputs are compared and checked for correctness
  2. the programs and procedures are checked for correctness
  3. special synthetic data is input and outputs checked for correctness
  4. programs are written to check the functioning of the computer hardware
Correct answer: (A)
the inputs and the corresponding outputs are compared and checked for correctness
Page 50 of 61