You are on page 1of 7

A COMPILATION OF

EIS
IMPORTANT QUESTIONS

For May-22 Attempt

ca-inter

CA Nayan Kothari
CH-1 EIS : IMPORTANT QUESTIONS
1. Which process should be automated?

2. BPA implementation steps.

3. Technology and data related risk.

4. ERM Framework.

5. General IT controls.

RI
A
6. General ledger and Fixed Assets cycle.

7. Computer related offences. TH


O
K

8. SPDI applicability, non-applicability, Definition of SPDI, Inclusions of


personal data.
N
A
Y
A
N
CA

CA NAYAN KOTHARI
CH-2 EIS : IMPORTANT QUESTIONS
1. Define Front and back end software and why separate front end &
back end software needed.

2. Difference between installed and cloud based application.

3. Risk and controls of ERP.

RI
A
TH
O
K
N
A
Y
A
N

4. Important Modules -
➢ Customer relationship module
CA

➢ Sales and distribution module


➢ Material management module

5. Data analytics.

6. XBRL.

7. Difference between having common software for accounting &


compliance AND having only tax software.

CA NAYAN KOTHARI
CH-4 EIS [PART-1]: Important Questions
1. Business models of E-commerce.

2. Components of E-commerce.

3. Controls in E-business environment.

4. Forces behind e-commerce revolution.

RI
5. Digital payments.

A
TH
6. E-Business (Just review advantages disadvantages once).
O
K

CH-4 EIS [PART-2]: Important Questions


N
A
Y

1. Virtualisation (Application areas & Types).


A
N

2. Grid (Benefits & Grid computing security).


CA

3. Cloud computing environment (Types of cloud & Adv-Disadvantage).

4. Artificial intelligence.

5. Blockchain. (AMENDMENT)

CA NAYAN KOTHARI
CH-5 EIS : Important Questions
1. Characteristics of CBS.

2. Technology components of CBS & key aspects in-built


into the CBS.

3. Risk associated with CBS.

4. Security policy.

RI
5. Internal controls n IT controls in banks.

A
6. CASA, TREASURY PROCESS.
TH
O
7. Basel lll norms.
K

8. Prevention of money laundering.


N
A
Y
A
N
CA

CA NAYAN KOTHARI
CH-3 EIS : Important Questions
1. RAM vs ROM & Primary memory vs Secondary memory.

2. Activities executed by operating system.

3. Physical access control.

4. Logical access control.

RI
5. Top management control.

A
TH
6. Transcription error vs Transposition error.
O
7. Communication control.
K

8. Tools of IS Audit.
N
A

9. Auditing logical access control.


Y
A

10. Types of Database models.


N
CA

11. Data warehouse.

12. Steps involves in data mining.

13. Database control. (AMENDMENT)

14. Output contact. (AMENDMENT)

15. Data resource management control. (AMENDMENT)

CA NAYAN KOTHARI
YOUTUBE CHANNEL – CA nk

CA NAYAN KOTHARI

You might also like