Saturday, April 9, 2016

ICAB IT Knowledge Question Analysis Knowledge Level from June 2010 to Dec 2015



ICAB IT Knowledge Question Analysis Knowledge Level from June 2010 to Dec 2015








  1. Information within Organization
  1. Explain how event triggered reporting works. What do you do when an accounting software
    package does not provide this feature? Cite necessary examples for both of the afore mentioned points. Mark 10, Dec 15, P-58
  2. Explain how different information systems are used at different levels ofmanagement.
    Describe the information system used by the lowest level of management. 10 mark june 15, p-44
  3. Explain the economic impact of information system technology on organizations and
    business firms. Dec 14, mark-8 , page 25
  4. Define (i) Business owner, (ii) System owner and (iii) Technical owner. Dec 14, mark-6 , page 70
  5. Distinguish between ‘data’ and ‘information’. (Dec-10)(Marks-8)(Page-)
  6. Define passive and interactive information systems and give examples of each. (Dec-10)(Marks-8)(Page-)
  7. Why is information a key resource in an organization? List five points. (June-11)(Marks-7)(Page-)
  8. Name and explain five attributes of information. (June-11)(Marks-6)(Page-)
  9. What is DSS? Name and explain different components of DSS. (Dec-11)(Marks-9)(Page-)
  10. Name five features of accounting software for Financial Reporting. (Dec-11)(Marks-4)(Page-)
  11. What are PIVOT Tables? (Dec-11)(Marks-4)(Page-)
  12. What is the difference between data and information? (June-12)(Marks-5)(Page-)
  13. List and explain five attributes of information. (June-12)(Marks-5)(Page-)
  14. Explain the internal information and external information in the context of business organizations with examples. (Dec-12)(Marks-10)(Page-)
  15. What is an Organization? Why do organizations exist? (Dec-12)(Marks-5)(Page-)
  16. Why is information so important in an organization? (Dec-12)(Marks-5)(Page-)
  17. From the perspective of critical financial reporting system, define the following key words: (June-13)(Marks-10)(Page-70)
Business Owner, System Owner, Technical Owner, System Administrator and Application Administrator.
  1. What is DSS? Write down the names of DSS’s basic components. (June-13)(Marks-5)(Page-39, 40)
  2. What is Information? Narrate the importance of Information. (Dec-13)(Marks-4)(Page-25)
  3. Write in brief, the important attributes of information. (Dec-13)(Marks-6)(Page-29)
  4. What are the differences between data and information? (June-14)(Marks-5)(Page-23)
  5. Explain relationship between organization and information system. (June-14)(Marks-5)(Page-28)
  6. What is knowledge‐based system? (June-14)(Marks-4)(Page-52)
  7. Write short notes on different types of knowledge based system. (June-14)(Marks-6)(Page-53)

  1. Information Technology Architecture
  1. What is a sniffer? What are the uses of sniffer? Describe the technologies and tools which are used to provide security with the relevant details. Mark-10, Dec 15, page-113
  2. List the technical and non-technical limitations of e-commerce. Mark 6, Dec 15, Page 119,
  3. What is a linear array? Enumerate the properties of a linear array. How does a record differ
    from a linear array? Mark 6, Dec 15, P-95
  4. Explain clearly the differences between system software and application software. What are the major classes of each? Mark 10, Dec 15, p-85
  5. How are software classified according to working principle? Describe each class withthe
    corresponding subclasses and/or types. 10 mark, june 15, p-85
  6. Define the keyword “malicious Software”. How many categories does it have? Explain
    with example of each category. 10 mark, june 15, p-109
  7. What are the basic benefits of E-commerce? 6 mark june 15, p-118
  8. Define freeware and shareware and differentiate between the two. 4 mark june 15, p-86
  9. What is distributed processing? Write down the advantages and disadvantages of
    distributed processing. Dec 14, mark 1o, page 103
  10. What is Database Management System? Describe the features commonly offered by
    Database Management System. Dec 14, mark-9 , page 25
  11. Explain in detail how a firmware works. Dec 14, mark-7 , page 92
  12. Differentiate among the following terms: (June-10)(Marks-2)(Page-)
    1. Multitasking and
    2. Timesharing
  1. What is DBMS? What are the major components of DBMS? (June-10)(Marks-3)(Page-)
  2. What is database normalization? (June-10)(Marks-2)(Page-)
  3. What is the difference between e‐Commerce and e‐Business? (June-10)(Marks-2)(Page-)
  4. What are the major control problems of e‐Commerce? (June-10)(Marks-3)(Page-)
  5. What are the differences among computer virus, worm and Trojan horse? (June-10)(Marks-2)(Page-)
  6. What is firewall? Write down the differences between hardware and software firewalls. (June-10)(Marks-3)(Page-)
  7. What are the benefits of using Database Management Systems? (Dec-10)(Marks-8)(Page-)
  8. What are the difference between Electronic Commerce and Traditional Commerce? (Dec-10)(Marks-5)(Page-)
  9. What are malicious software. Name and briefly explain five types of malicious software. (June-11)(Marks-8)(Page-)
  10. What are the benefits and limitations of e‐Commerce? (June-11)(Marks-6)(Page-)
  11. Define and explain three categories of organizational management process. (June-11)(Marks-6)(Page-)
  12. Briefly explain Information System infrastructure and IT architecture. (June-11)(Marks-7)(Page-)
  13. What are the different types of hardware used in a desktop computer? (Dec-11)(Marks-4)(Page-)
  14. Draw the classification tree of software. (Dec-11)(Marks-4)(Page-)
  15. What do you understand by data analysis? (Dec-11)(Marks-3)(Page-)
  16. Write about the advantages and disadvantages of distributed system. (Dec-11)(Marks-5)(Page-)
  17. Write down advantages and disadvantages of Multiprogramming and Multiprocessing. (Dec-11)(Marks-8)(Page-)
  18. Write short notes on: (Dec-11)(Marks-8)(Page-)
(i) Firewall (ii) Worms and (iii) Trojan horse
  1. Write short notes on Commercial software, Freeware and Shareware. (Dec-11)(Marks-8)(Page-)
  2. Define ‘security’ and ‘Control’ in relation to computerized information system. (June-12)(Marks-5)(Page-)
  3. Write short notes on (i) Virus (a type of malicious software), (ii) Hacker, (iii) Spoofing and (iv) `Denial of service’ attack. (June-12)(Marks-5)(Page-)
  4. What are Information System Infrastructure and Information System Architecture? (June-12)(Marks-10)(Page-)
  5. What are the differences between Batch processing, Real time processing, Time sharing and Distributed processing? (Dec-12)(Marks-10)(Page-)
  6. Identify the benefits and limitations of e-commerce. (Dec-12)(Marks-8)(Page-)
  7. What is Database Management System? Describe the features commonly offered by Database Management System. (Dec-12)(Marks-10)(Page-)
  8. What are the relationships between Shareware and Freeware? (June-13)(Marks-5)(Page-91)
  9. What is data structure? Write down the names of two linear data structures and explain one. (June-13)(Marks-10)(Page-94)
  10. List different types of hardware used in a desktop computer. (June-13)(Marks-5)(Page-83)
  11. Draw the classification tree of software. (June-13)(Marks-5)(Page-86)
  12. What is data validation? Explain in brief. (Dec-13)(Marks-5)(Page-96)
  13. Explain five validation methods in brief. (Dec-13)(Marks-5)(Page-97)
  14. What is e‐commerce? Explain the characteristics of e‐commerce in brief. (Dec-13)(Marks-10)(Page-116)
  15. What are the “Technical” and “Non‐technical” limitations of e‐commerce? (June-14)(Marks-5)(Page-119)
  16. What do you know about “Hackers and Cyber‐vandalism”? (June-14)(Marks-5)(Page-113)

  1. Management of IT
  1. Define identity management and describe in detail various aspects of identity management. Mark 8, Dec 15, p-185
  2. Core Modules of accounting, 5 mark, june 15, p-187
  3. Compare and contrast between broadcast and multicast in data communication with
    necessary examples. 10 mark, June-15, p-198
  4. What are the IT assets? Describe the benefits of IT Asset Management (ITAM).Which
    considerations should be addressed to optimize an ITAM program? 10 mark. June 15, p-142
  5. Draw the IT Asset Management (ITAM) life cycle and describe the benefits of using that. (Dec-10)(Marks-4+5)(Page-)
  6. How would you evaluate an ITAM solution? (Dec-10)(Marks-6)(Page-)
  7. Prepare a checklist of ten points you consider important for selecting Accounting software for your organization. (June-11)(Marks-8)(Page-)
  8. List and explain ten different data validation methods. (June-12)(Marks-5)(Page-)
  9. Explain (a) the Historical approach, (b) Top Down approach and (c) the Bench marking approach in relation to IT Performance Management. (June-12)(Marks-10)(Page-)
  10. List and explain eight core modules that accounting software may have. (June-12)(Marks-10)(Page-)
  11. Which criteria should be followed to select Accounting Software? (Dec-12)(Marks-7)(Page-)
  12. There are three key components to management review and oversight of the problem management function. Explain those in brief. (June-13)(Marks-10)(Page-162)
  13. What is trust management considering encryption? Explain in brief. (June-13)(Marks-10)(Page-184)
  14. Why is Information System Security Important? What Information is Sensitive? (Dec-13)(Marks-8)(Page-117,179)
  15. Write down the components of information security. (Dec-13)(Marks-2)(Page-181)
  16. There are misconceptions about IT Assets Management (ITAM). Explain in brief at least three popular misconceptions. (June-14)(Marks-10)(Page-147)
  17. What is trust management considering encryption? Explain in brief. (June-14)(Marks-10)(Page-184)

  1. Communication of IT
  1. Define a LAN. Explain the mode of communication and characteristics of a LAN. What are the
    advantages and disadvantages of connecting computers in a LAN? mark 10, Dec 15, p-201
  2. Network Topology, 5 mark, June 15, p-210
  3. Define and explain the elements of communication protocol. Explain the roles or functions
    performed by the data communicationsoftware for the efficient and error free transmission
    of data. 10 mark, June-15, page-219
  4. Whyis information system security important? 6 mark, june 15, p-177
    (b) Explain “vulnerability management” and “threat management” in management of IT
    security. 4 mark, June-15, p- 183,
  5. What is Computer Network? List different types of network topology and describe any
    three of them. 10 Dec 14, mark-10 , page 210
  6. Name 7 layers of OSI models and define their functionality. (June-10)(Marks-5)(Page-)
  7. What are triggers? What are their uses? (June-10)(Marks-5)(Page-)
  8. What are the roles of communication protocols? (Dec-10)(Marks-8)(Page-)
  9. List five differences between LAN and WAN. What are the benefits of a computer network? (June-11)(Marks-5)(Page-)
  10. Briefly explain the following:‐
a) Router, b) Repeater, c) Hub, d) Network topology. (June-10)(Marks-6)(Page-)
  1. Write short notes on ring topology, mesh topology and star topology. (Dec-11)(Marks-8)(Page-)
  2. What is communication protocol? Describe three key elements of a protocol. (Dec-11)(Marks-9)(Page-)
  3. What is data Communication? What are the three basic elements of a communication system? What are the three ways of transmitting data from one point to another? (June-12)(Marks-10)(Page-)
  4. What is computer Network? Describe different types of computer Network based on geographical area. (Dec-12)(Marks-7)(Page-)
  5. What is OSI-Model? Describe the functionality of 7-layers in OSI-model of communication protocol. (Dec-12)(Marks-8)(Page-)
  6. Explain at least three advantages and disadvantages of connecting computers in a LAN. (June-13)(Marks-10)(Page-202)
  7. What factors should be considered when choosing a topology for installing a Computer Network? What is communication protocol? Write down the Key elements of protocol. (Dec-13)(Marks-10)(Page-216,219)
  8. What is ISO‐OSI model? (June-14)(Marks-3)(Page-221)
  9. Write the functionalities of the different layers of ISO‐OSI model. (June-14)(Marks-7)(Page-222)

  1. Internal Control Based Systems
  1. Discuss, with necessary example, which issues one needs to take into account to determine the cost effectiveness of internal control procedure under computer based business system. Mark 7, Dec 15, p-253 (cost effectiveness of internal control found but cost effectiveness of internal control in IT not found)
  2. Describe in brief five main types of IT Audit. mark 10, Dec 15, p-248
  3. How can you categorize the IT control activities? What are some of the IT control activities an
    employee in an organization may undertake? Mark 4, Dec 15, P-231
  4. Using the internal control pyramid, describe the five key components required for effective
    internal control. Mark 8, Dec 15, p-229
  5. What is disaster recovery plan? Describe major areas of a disaster recovery planning
    document. 10 mark, June 15, p-250
  6. What is data integrity? Explain the six categories of data integrity controls. Dec 14, mark-1o , page 278
  7. What is control? What are the purposes of internal control? Explain the five key
    components required for effective internal control. Dec 14, mark-1o , page 228
  8. Discuss on any worldwide reputed ERP system, including the background and features. Dec 14, mark-10 , page 310
  9. What is Audit Trail? Explain its objectives.
  10. Describe Post Implementation Review (PIR) Dec 14, mark-10 , page 269
  11. Define Information System and Information Technology. (June-10)(Marks-2)(Page-)
  12. What are the objectives of Information System auditing? (June-10)(Marks-3)(Page-)
  13. Define the following terms: (June-10)(Marks-3)(Page-)
(i) Throughput
(ii) Turnaround time
(iii) Response time
  1. What do you mean by Computer Assisted Audit Technique (CAAT)? (June-10)(Marks-2)(Page-)
  2. What is COBIT? What are the dimensions that COBIT covers? (June-10)(Marks-3)(Page-)
  3. Briefly describe the three fundamental types of control in IS Audit. (June-10)(Marks-3)(Page-)
  4. Define the following terms: (June-10)(Marks-2)(Page-)
(i) CISA
(ii) CISM
  1. What is ERP? (June-10)(Marks-2)(Page-)
  2. Discuss about the threats from inside and outside of the organization in case of ERP? (June-10)(Marks-3)(Page-)
  3. How Unified access can provide the solution for ERP security? (June-10)(Marks-3)(Page-)
  4. Describe the control activities for Information Technology. (Dec-10)(Marks-13)(Page-)
  5. Suppose you have to audit IT investments and activities of an organization. Name at least 8 (eight) components of your IT audit. (Dec-10)(Marks-8)(Page-)
  6. What is System and Program Change Control? How can you apply management control over system and program changes? (Dec-10)(Marks-3+5)(Page-)
  7. What do you mean by risk management process? Show the risk management cycle. (Dec-10)(Marks-4+4)(Page-)
  8. Why does information system security important? Explain it. (Dec-10)(Marks-5)(Page-)
  9. List and explain five tools for providing information security in a computer environment. (June-11)(Marks-7)(Page-)
  10. Business process standardization is an important step for ERP implementation. Name and explain another four issues that need to be addressed for ERP implementation. (June-11)(Marks-9)(Page-)
  11. What is ITGC? List and explain five types of controls included in ITGC. (June-11)(Marks-7)(Page-)
  12. List and explain five different types of IT Audit. (June-11)(Marks-8)(Page-)
  13. Briefly explain (a) risk, (b) threat, (c) exposure and (d) vulnerability. (June-11)(Marks-8)(Page-)
  14. What is COBIT? What are the domains of COBIT? Describe the components of a complete COBIT package. (Dec-11)(Marks-9)(Page-)
  15. Why is information security important? Name and explain three information areas that are sensitive(Dec-11)(Marks-9)(Page-)
  16. List and explain five key points to address the complexities arising in an organization for a global ERP implementation. (June-12)(Marks-10)(Page-)
  17. What are the Control Activities for Information Technology in relation to Internal Control in computer Based Business System? (June-12)(Marks-10)(Page-)
  18. Briefly explain ‘Testing and Quality Controls’ as applied to computerized systems to prove that they perform to the satisfaction of various interested parties. (June-12)(Marks-10)(Page-)
  19. Describe the threats within a computer Based Business System. (Dec-12)(Marks-10)(Page-)
  20. What is enterprise resource planning (ERP)? Explain the benefits of ERP solutions. (Dec-12)(Marks-10)(Page-)
  21. Write down at least ten main types of IT audit. Explain Disaster contingency, business continuity planning and IT disaster recovery audits. (Dec-12)(Marks-10)(Page-)
  22. List and explain the Controls over Program Changes. (June-13)(Marks-10)(Page-273)
  23. Identify and discuss threats to the Computerized Environment in Computer Based Business System. (June-13)(Marks-10)(Page-283)
  24. Write down at least ten main types of IT audit. Explain Disaster contingency, business continuity planning and IT disaster recovery audits. (June-14)(Marks-10)(Page-248)
  25. As regards to IT Control give the examples of (i) Preventive control, and (ii) Detective control. (June-14)(Marks-5)(Page-259,261)
  26. b) What are the phases in the methodologies of developing a business continuity plan? (June-14)(Marks-5)(Page-291)

Others
  1. Enumerate and define the threats due to cyber crimes. Mark 5, Dec 15
  2. Discuss about the IT Performance management. Mark 10, Dec 15
  3. What do you mean by network security? What are the basic network security tools? (June-10)(Marks-3)(Page-)
  4. What is IDS? How IDS can secure a network? (June-10)(Marks-2)(Page-)
  5. What do you mean by software piracy? (June-10)(Marks-2)(Page-)
  6. What are the risks associated with pirated software use in an information system? (June-10)(Marks-3)(Page-)
  7. Write down the advantages and disadvantages of IT outsourcing? (June-10)(Marks-3)(Page-)
  8. Compare briefly between Wi‐Max and Wi‐Fi technology. (June-10)(Marks-2)(Page-)
  9. Define the following terms: (June-10)(Marks-2)(Page-)
(i) Phishing
(ii) Spam
  1. Describe the process that happens when you click a link in your web browser to fetch another web page. (June-10)(Marks-5)(Page-)
  2. What is HTTP? How does it work in basic terms? (June-10)(Marks-5)(Page-)
  3. What is CGI program? How does one get invoked? (June-10)(Marks-5)(Page-)
  4. How do you do FTP? (June-10)(Marks-5)(Page-)
  5. What is a DHCP? What does it do? (June-10)(Marks-5)(Page-)
  6. What is Knowledge management? (June-10)(Marks-5)(Page-)
  7. What are knowledge based system (KBS)? Write about different types of knowledge based systems. (Dec-11)(Marks-8)(Page-)
  8. Briefly explain the role and responsibilities of Database Administrator, System Administrator, and Network Administrator. (Dec-13)(Marks-10)(Page-)
  9. What do you understand by data analysis? (Dec-13)(Marks-3)(Page-)
  10. Write about the advantages and disadvantages of distributed system. (Dec-13)(Marks-7)(Page-)
  11. Describe the categories of IT control. (Dec-13)(Marks-10)(Page-)
  12. What are the control objectives that should help meet the minimum level of security and control of a computer network, especially (i) File Server and (ii) LAN & WAN. (Dec-13)(Marks-10)(Page-)
  13. Explain IT Manager’s role. (Dec-13)(Marks-5)(Page-)
  14. What are the guiding principles of KPI? (Dec-13)(Marks-5)(Page-)
  15. Explain the internal information and external information in the context of business organizations with examples. (June-14)(Marks-10)(Page-)
  16. Describe policy monitoring & maintenance and reverse engineering used in an organization. (June-14)(Marks-10)(Page-)

Short note
  1. 10. Short Notes: (June-13)(Marks-10)(Page-205-209,115)
Router, Switch, Passive hub, Bridge and Firewall.

No comments:

Post a Comment