9-ml-303-isita(1)

2
1 of 2 ISITA/Feb-2014 ICMA. Pakistan FALL 2013 (FEBRUARY 2014) EXAMINATIONS Saturday, the 22nd February 2014 INFORMATION SYSTEMS AND I.T. AUDIT (ML-303) SEMESTER- 3 Time Allowed: 02 Hours 30 Minutes Maximum Marks: 80 Roll No.: (i) Attempt all questions. (ii) Answers must be neat, relevant and brief. (iii) In marking the question paper, the examiners take into account clarity of exposition, logic of arguments, effective presentation, language and use of clear diagram/ chart, where appropriate. (iv) Read the instructions printed inside the top cover of answer script CAREFULLY before attempting the paper. (v) DO NOT write your Name, Reg. No. or Roll No., or any irrelevant information inside the answer script. (vi) Question Paper must be returned to invigilator before leaving the examination hall. MARKS Q.2 (a) Most of the business information systems are based on databases. In fact web is not a database, however, it illustrates the capabilities of hypermedia databases. Discuss features of hypermedia database. Also write difference between searching required information using a traditional database and using World Wide Web metaphor. 09 (b) The expert system makes sure that important factors of event have not been ignored and provide information that helps the person make a good decision. Differentiate with the help of an appropriate example between forward chaining and backward chaining logics used by expert system. 08 Q.3 (a) PeopleSoft ERP system of XYZ Courier Company has been crashed. Data backup is key preventative measures .It ensures that the critical activities of an organization are not interrupted in the event of disaster. Discuss different types of disk-based back up system and criteria for choosing different types of back up devices and media for early restoration of data. 09 (b) One of the most interesting market mechanism in e-commerce is electronic auction which used B2C,B2B, C2B, G2B and G2C business models. Differentiate between forward and reversed e-auction with examples. Also discuss the role of broker and barter in e-marketplace. 08 Q.4 (a) To ensure high level of computer hardware and network availability, XYZ Company has signed service maintenance contract including spare parts with IBM local vendor for Information system support and maintenance work. The hardware maintenance program is designed to document the performance of hardware maintenance. Discuss mandatory information, which should be maintained in hardware maintenance program. Also elaborate typical procedures and reports for monitoring the effective and efficient use of hardware. 09 (b) A project team with participation by technical support staff and key users should be created to write a request for proposal (RFP). Elaborate seven different areas which should be included in this or any RFP document contents. 07 PTO

Upload: chisti-brothers

Post on 19-Feb-2016

213 views

Category:

Documents


0 download

DESCRIPTION

Icmap

TRANSCRIPT

1 of 2 ISITA/Feb-2014

ICMA.

Pakistan

FALL 2013 (FEBRUARY 2014) EXAMINATIONS

Saturday, the 22nd February 2014

INFORMATION SYSTEMS AND I.T. AUDIT (ML-303) SEMESTER- 3

Time Allowed: 02 Hours 30 Minutes Maximum Marks: 80 Roll No.:

(i) Attempt all questions.

(ii) Answers must be neat, relevant and brief.

(iii) In marking the question paper, the examiners take into account clarity of exposition, logic of arguments, effective presentation, language and use of clear diagram/ chart, where appropriate.

(iv) Read the instructions printed inside the top cover of answer script CAREFULLY before attempting the paper.

(v) DO NOT write your Name, Reg. No. or Roll No., or any irrelevant information inside the answer script.

(vi) Question Paper must be returned to invigilator before leaving the examination hall.

MARKS

Q.2 (a) Most of the business information systems are based on databases. In fact web is not a database, however, it illustrates the capabilities of hypermedia databases. Discuss features of hypermedia database. Also write difference between searching required information using a traditional database and using World Wide Web metaphor.

09

(b) The expert system makes sure that important factors of event have not been ignored

and provide information that helps the person make a good decision. Differentiate with the help of an appropriate example between forward chaining and backward chaining logics used by expert system.

08

Q.3 (a) PeopleSoft ERP system of XYZ Courier Company has been crashed. Data backup is key preventative measures .It ensures that the critical activities of an organization are not interrupted in the event of disaster. Discuss different types of disk-based back up system and criteria for choosing different types of back up devices and media for early restoration of data.

09

(b) One of the most interesting market mechanism in e-commerce is electronic auction which used B2C,B2B, C2B, G2B and G2C business models. Differentiate between forward and reversed e-auction with examples. Also discuss the role of broker and barter in e-marketplace.

08

Q.4 (a) To ensure high level of computer hardware and network availability, XYZ Company has signed service maintenance contract including spare parts with IBM local vendor for Information system support and maintenance work. The hardware maintenance program is designed to document the performance of hardware maintenance. Discuss mandatory information, which should be maintained in hardware maintenance program. Also elaborate typical procedures and reports for monitoring the effective and efficient use of hardware.

09

(b) A project team with participation by technical support staff and key users should be

created to write a request for proposal (RFP). Elaborate seven different areas which should be included in this or any RFP document contents.

07

PTO

id2654953 pdfMachine by Broadgun Software - a great PDF writer! - a great PDF creator! - http://www.pdfmachine.com http://www.broadgun.com

2 of 2 ISITA/Feb-2014

MARKS

Q.5 (a) An IT audit firm is planning for its critical data migration from old FOXPRO database

system to new Oracle 9i database system. This large-scale data conversion becomes a project within a project. Discuss necessary steps for a successful data conversion process.

10

(b) Remote access is a common technique to monitor and configure network devices using

Telnet and others utility software�s. Discuss different remote access connectivity�s methods. How can an organization implement remote access security to avoid any chances of access to company�s intranet by any intruder, cracker, or hacker?

08

Q.6 Why organizations need Transaction Processing System (TPS), Management Information System (MIS) and Executive Information System (EIS)? How management Information system (MIS) emerged partly as a response to the shortcoming of the first computerized transaction processing system? Similarly Executive Information system (EIS) attempts to take over the short falls of traditional MIS approach. Elaborate this revolution in Information system. Do MIS and EIS really solve manager�s problem?

12

THE END