Nothing Special   »   [go: up one dir, main page]

Enterprise Information Systems and Strategic Management: Content

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

 Navigate Content

Enterprise Information Systems and Strategic Management
Information Systems and its Components | Mock Test Papers | November 2020

Question 1

Identify the controls that are designed to detect errors, omissions or malicious acts that occur
and report the occurrence and explain them.           (3 Marks Oct 20)

Answer 1

Detective Controls are designed to detect errors, omissions or malicious acts that occur and report
the occurrence. In other words, Detective Controls detect errors or incidents that elude preventive
controls. A detective control may identify account numbers of inactive accounts or accounts that
have been flagged for monitoring of suspicious activities. Detective controls can also include
monitoring and analysis to uncover activities or events that exceed authorized limits or violate
known patterns in data that may indicate improper manipulation. For sensitive electronic
communications, detective controls can indicate that a message has been corrupted or the sender’s
secure identification cannot be authenticated.

Some of the examples of Detective Controls include review of payroll reports; compare transactions
on reports to source documents; monitor actual expenditures against budget; use of automatic
expenditure profiling where management gets regular reports of spend to date against profiled
spend; hash totals; check points in production jobs; echo control in telecommunications; duplicate
checking of calculations; past-due accounts report; the internal audit functions; Intrusion Detection
System; Cash counts and bank reconciliation and Monitoring expenditures against budgeted amount
etc.

The main characteristics of Detective controls are given as follows:

Clear understanding of lawful activities so that anything which deviates from these is
reported as unlawful, malicious, etc.;
An established mechanism to refer the reported unlawful activities to the appropriate
person or group;
Interaction with the preventive control to prevent such acts from occurring; and
Surprise checks by supervisor.

Question 2
DEF Ltd., a wealth Management Company has its head office in Bengaluru and wants to set up
a 

newNavigate Content
office at Mumbai. For the new setup, the DEF Ltd.’s managerial controls are required to
be enforced to ensure that the development, implementation, operation and maintenance of
information systems at Mumbai office is in planned and controlled manner. Determine all the
activities that deal with the Systems Development Management Controls that are responsible
for the functions concerned with analyzing, designing, building, implementing and maintaining
information systems.            (6 Marks Oct 20)

Answer 2

The activities that deal with the System Development Management controls are as follows:

System Authorization Activities: All systems must be properly and formally authorized to
ensure their economic justification and feasibility. This requires that each new system
request be submitted in written form by users to systems professionals who have both the
expertise and authority to evaluate and approve (or reject) the request.
User Specification Activities: Users must be actively involved in the systems development
process wherein a detailed written descriptive document of the logical needs of the users is
created.
Technical Design Activities: The technical design activities translate the user specifications
into a set of detailed technical specifications of a system that meets the user’s needs.
Internal Auditor’s Participation: The internal auditor should be involved at the inception of
the system development process to make conceptual suggestions regarding system
requirements and controls and should be continued throughout all phases of the
development process and into the maintenance phase.
Program Testing: All program modules must be thoroughly tested before they are
implemented. The results of the tests are then compared against predetermined results to
identify programming and logic errors.
User Test and Acceptance Procedures: Just before implementation, the individual modules
of the system must be tested as a unified whole. A test team comprising user personnel,
systems professionals, and internal audit personnel subjects the system to rigorous testing.
Once the test team is satisfied that the system meets its stated requirements, the system is
formally accepted by the user department(s).

Question 3

1. Identify from the following controls of Information System that deals with organization’s
policies, procedure and planning.
a. Management Controls

b. Environmental Controls
c. Access Controls

 Navigate Content
 d. Physical Controls (1 Mark Oct 20)

2. Mr. Neeraj is working on a project on healthcare system where he has to perform data
mining on the database of patients of last five years in ABC Hospital. The hospital provided
him inconsistent data with lots of errors and missing values. He has to apply various
techniques to get rid of these anomalies. Identify from the following process which he can
use to get rid of these anomalies.

a. Data Cleaning

b. Data Selection

c. Data Integration

d. Data Transformation (1 Mark Oct 20)

Previous Page Next Page


You might also like