You are on page 1of 2

FALL 2013 (FEBRUARY 2014) EXAMINATIONS

ICMA.
Pakistan
Time Allowed: 02 Hours 30 Minutes

Saturday, the 22nd February 2014

INFORMATION SYSTEMS AND I.T. AUDIT (ML-303)


SEMESTER- 3
Maximum Marks: 80

Roll No.:

(i)

Attempt all questions.

(ii)

Answers must be neat, relevant and brief.

(iii)

In marking the question paper, the examiners take into account clarity of exposition, logic of arguments,
effective presentation, language and use of clear diagram/ chart, where appropriate.

(iv)

Read the instructions printed inside the top cover of answer script CAREFULLY before attempting the paper.

(v)

DO NOT write your Name, Reg. No. or Roll No., or any irrelevant information inside the answer script.

(vi)

Question Paper must be returned to invigilator before leaving the examination hall.
MARKS

Q.2 (a) Most of the business information systems are based on databases. In fact web is not a
database, however, it illustrates the capabilities of hypermedia databases. Discuss
features of hypermedia database. Also write difference between searching required
information using a traditional database and using World Wide Web metaphor.

09

(b) The expert system makes sure that important factors of event have not been ignored
and provide information that helps the person make a good decision. Differentiate with
the help of an appropriate example between forward chaining and backward chaining
logics used by expert system.

08

Q.3 (a) PeopleSoft ERP system of XYZ Courier Company has been crashed. Data backup is
key preventative measures .It ensures that the critical activities of an organization are
not interrupted in the event of disaster. Discuss different types of disk-based back up
system and criteria for choosing different types of back up devices and media for early
restoration of data.

09

(b) One of the most interesting market mechanism in e-commerce is electronic auction
which used B2C,B2B, C2B, G2B and G2C business models. Differentiate between
forward and reversed e-auction with examples. Also discuss the role of broker and
barter in e-marketplace.

08

Q.4 (a) To ensure high level of computer hardware and network availability, XYZ Company has
signed service maintenance contract including spare parts with IBM local vendor for
Information system support and maintenance work. The hardware maintenance
program is designed to document the performance of hardware maintenance. Discuss
mandatory information, which should be maintained in hardware maintenance program.
Also elaborate typical procedures and reports for monitoring the effective and efficient
use of hardware.

09

(b) A project team with participation by technical support staff and key users should be
created to write a request for proposal (RFP). Elaborate seven different areas which
should be included in this or any RFP document contents.

07

PTO

1 of 2

ISITA/Feb-2014

MARKS

Q.5 (a) An IT audit firm is planning for its critical data migration from old FOXPRO database
system to new Oracle 9i database system. This large-scale data conversion becomes a
project within a project. Discuss necessary steps for a successful data conversion
process.

10

(b) Remote access is a common technique to monitor and configure network devices using
Telnet and others utility softwares. Discuss different remote access connectivitys
methods. How can an organization implement remote access security to avoid any
chances of access to companys intranet by any intruder, cracker, or hacker?

08

Why organizations need Transaction Processing System (TPS), Management


Information System (MIS) and Executive Information System (EIS)? How management
Information system (MIS) emerged partly as a response to the shortcoming of the first
computerized transaction processing system? Similarly Executive Information system
(EIS) attempts to take over the short falls of traditional MIS approach. Elaborate this
revolution in Information system. Do MIS and EIS really solve managers problem?

12

Q.6

THE END

2 of 2

ISITA/Feb-2014

You might also like