System Analysis and Design

501. Some audit and control procedures in a system

  1. detect and correct errors in programs
  2. selectively print records in a system which meet certain criteria
  3. examine credit and debit balances in an accounting system and check if they balance
  4. provide a facility to trace a variable value through processing steps and print intermediate values when required
  1. i and ii
  2. ii and iii
  3. i, ii, iii
  4. ii, iii, iv
Correct answer: (D)
ii, iii, iv

502. By information system testing we mean

  1. testing an information system correctly
  2. determining whether a system is performing as per specifications
  3. determining whether a system is performing optimally
  4. ensuring proper function of a system
Correct answer: (B)
determining whether a system is performing as per specifications

503. Security in the design of information system is used to

  1. inspect the system and check that it is built as per the specifications
  2. protect data and programs from accidental or intentional loss
  3. ensure that the system processes data as it was designed to and that the results are reliable
  4. ensure privacy of data processed by it
Correct answer: (B)
protect data and programs from accidental or intentional loss

504. Some security measures commonly used are

  1. data encryption
  2. logging of all accesses to an information system and recording changes made (if any)
  3. data compression
  4. copying of files
  1. ii and iii
  2. i and iii
  3. i and ii
  4. ii and iv
Correct answer: (C)
i and ii

505. Controls are necessary in information systems as

  1. massive amounts of data are processed and human errors are expected in data entry
  2. accidental errors can lead to loss of money and credibility in a system
  3. to protect the system from virus attack
  4. data may be lost due to disk crashes
  1. i and ii
  2. i and iii
  3. i and iv
  4. ii and iii
Correct answer: (A)
i and ii

506. Audit in the design of information system is used to

  1. inspect the system and check that it is built as per specifications
  2. protect data from accidental or intentional loss
  3. ensure that the system processes data as it was designed to and that the results are reliable
  4. ensure privacy of data processed by it
Correct answer: (A)
inspect the system and check that it is built as per specifications

507. A two way check

  1. calculates the same quantity in two different ways and compares them for equality
  2. calculates the quantities and compares them for equality
  3. checks a data item in two different ways
  4. enters data two times and cross-checks them
Correct answer: (A)
calculates the same quantity in two different ways and compares them for equality

508. Some of the features of audit package used to check systems are:

  1. facility to total specified items based on some criteria
  2. extracting items based on some criteria for checking
  3. check-pointing and restart facility
  4. hardware faults recovery
  1. i, ii
  2. i, ii, iii
  3. i, ii, iii, iv
  4. i, ii, iv
Correct answer: (B)
i, ii, iii

509. By string test we mean

  1. a test which tests operations with strings
  2. a string of tests on programs
  3. Test on related programs
  4. The output of a program is sent as input to related program(s) to see if data is transferred correctly
Correct answer: (D)
The output of a program is sent as input to related program(s) to see if data is transferred correctly

510. The following measures are taken to ensure security of information systems:

  1. duplicate copies of data/programs are kept in a different place preferably in fire-proof vault
  2. password protection is used to prevent unauthorized access
  3. no one is allowed to alter data in the database
  4. no one is allowed alter programs
  1. i and ii
  2. i, ii, iii
  3. ii, iii, iv
  4. iii and iv
Correct answer: (A)
i and ii
Page 51 of 61