You are on page 1of 2

Accounting & Information Systems

AIS – 4203
1. Discuss the role of accountants with respect of AIS.
2. Explain the role of AIS in the value chain. (Page 6)
3. How do the information needs of external users differ from the information needs
of the managers?
4. Point out and discuss information flows in electronic commerce. (Page 55)
5. Explain the factors to be considered when evaluating an Application Service
Provider. (Page 58)
6. Explain factors to be considered in judging success factors of an organization.
(Page 60)
7. Briefly explain several possible options on network configuration. (Page 67)
8. There are some threats inherently prevails in AIS. What are those? Discuss with
examples. (Page 191)
9. Briefly discuss interrelated components of COSO’s internal control model.
(Page 197)
10. Suppose you are an executive supposed to make strategic decision. Discuss how
you would approach risk assessment in designing internal controls. (Page 208)
11.Suppose you are a strategic advisor of KLC group. You are asked to maintain a
summary of key general reliability controls. How you could effectively manage
this task? (Page 227)
12.What is disaster recovery plan? Why it is necessary to maintain? (Page 231)
13.Point out Institute of Internal Auditors five audit scope standards outlining the
Internal Auditor’s Responsibilities. (Page 321)
14.“The purpose of an information systems audit is to review and evaluate the internal
controls that protect the system” Explain. (Page 325)
15.Explain general functions of computer audit software. (Page 340)
16.How revenue cycle function? Explain in details with the help of a context diagram.
(Page 359)
17.As an executive, what are the factors you should take a close eye in alleviating
threat of expenditure cycle? Is there any definite control procedures that you may
apply? (Page 435)
18.What are the basic steps to be recovered under general ledger and reporting
system? Explain the cycle with the help of a context diagram. (Page 540)
19.Contrast among approaches of system development.
20.Describe the major phases in the system development life cycle. (Page 571)
21.Discuss the matters that should be examined during a post implementation review
and evaluation of a recently implemented web – based system.
22.Compare preventive, detective and corrective control techniques with example.
(Page 195)
23.As system complexity and our dependence on them increase, companies face the
growing risk of their systems being compromised. What are the threats a company
faces? (Page 190)
24.Explain the primary objectives of AIS according to AICPA. (Page 212)
25.Explain the use of effective supervision and responsibility accounting for better
monitoring. (Page 212/213)
26. Suppose you are a strategic advisor of MLC group. You are asked to maintain a
summary of key security controls. How you could effectively manage this task?
(Page 236)
27.As executive on charge of strategic decision, how can you constitute a reliable
system? (Page 226)
28.What is risk based audit approach? Illustrate a logical framework for carrying out
an audit. (Page 324)
29.Systems follow the natural consequence of change. Do you agree? Explain possible
ways of developing an effective system analysis report with example.
30.How does a production cycle function? Explain in details with the help of a context
diagram. (Page 469)
31.As an executive, what are the factors you should take a close eye in alleviating
threat of revenue cycle? Is there any definite control procedures that you may
apply? (Page 381)
32. Several reports are prepared in the time of preparing HRM reports. Give examples
of commonly generated HRM reports with appropriate contents and purpose. (Page
514)

You might also like