Вы находитесь на странице: 1из 1

IT APPLICATION

Time Allowed - 2½
Total Marks – 100

[N.B - The figures in the margin indicate full marks. Questions must be answered in English. Examiner will take
account of the quality of language and of the way in which the answers are presented. Different parts, if
any, of the same question must be answered in one place in order of sequence.]

Marks
1. (a) Describe the IT strategy development process of an organization considering the overall strategy of the
organization. 6
(b) Suppose you will have to develop an IT strategy. Describe the areas of risks those you should consider for
the purpose. 5
2. (a) What is ‘Service Level Management’? What are the components of service level management? 5
(b) What should be included in a service level agreement (SLA)? 5
(c) Explain the steps that should be followed to develop a disaster recovery plan. 5
3. (a) Explain the following terms:
i) Data encryption, ii) Firewall 7
(b) Differentiate between Management Information System (MIS) and Office Automation System (OAS). 5
(c) What types of information are required at the first, middle and top level management of an organization? 5
(d) What are the tasks at the operational management level of a system? 5
4. Suppose the authority of your organization shows interest to commence a new IT enabled accounting system in
the organization. They have assigned you to prepare a feasibility report.
(a) Which components will you include in the feasibility report? 5
(b) Which parameters will you investigate to prepare the report? 5
5. (a) After observing a feasibility report, if the authority decides to develop the accounting information system
software for an organization, what will be your role as an accountant of the organization? 6
(b) In preparing the system requirement for an accounting information system, what knowledge should an
accountant have? 6
(c) What us CAAT? 4
6. (a) Explain when and in which situations an organization adopts the following remote access techniques for
remote access: 8
i) Secure Socket Layer (SSL), ii) Virtual Private Network (VPN)
(b) What is Spam? How can you protect your system from spam attack? 4
7. (a) Which costs are likely due to attack of computer viruses. How can the risks of computer viruses be
minimized? 6
(b) What are the common activities of a computer hacker? 5
(c) How can you protect your system from the computer hackers? 4

The End

Вам также может понравиться