Question Tag: Data Transmission

Search 500 + past questions and counting.
  • Filter by Professional Bodies

  • Filter by Subject

  • Filter by Series

  • Filter by Topics

  • Filter by Levels

AA – May 2018 – L2 – Q5 – Auditing in a Computerized Environment

Discusses controls and potential problems in Electronic Data Interchange (EDI) systems.

Electronic Data Interchange (EDI) systems allow electronic transmission of business documents, such as purchase orders, invoices, payroll information, etc.

Required: a. Explain FOUR major controls to be put in place to minimize the risks inherent in EDI systems. (8 Marks) b. Discuss THREE features of EDI Systems that may create additional problems for the auditor. (7 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "AA – May 2018 – L2 – Q5 – Auditing in a Computerized Environment"

MI – Nov 2014 – L1 – SB – Q5 – Information Systems

This question covers different modes of data transmission and security vulnerabilities in data systems.

Data is converted to binary digits and forwarded to the desired location for the purpose of communication.

a. With the aid of diagrams, explain THREE data transmission modes. In each case, give ONE relevant example. (9 Marks)

b. State ONE difference between Parallel Data Transmission and Serial Data Transmission. (2 Marks)

c. In a tabular form, state TWO differences between Asynchronous Data Transmission and Synchronous Data Transmission. (4 Marks)

d. Enumerate FIVE attacks that could take place as a result of vulnerabilities of a computer system. (5 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2014 – L1 – SB – Q5 – Information Systems"

MI – May 2022 – L1 – SA – Q20 – Information System Development and Security

Identifying a packet of information exchanged between a browser and a web server.

A packet of information that travels between browser and web server is known as:

A. Malware
B. Adware
C. Spyware
D. Cookie
E. Virus

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2022 – L1 – SA – Q20 – Information System Development and Security"

MI – May 2016 – L1 – SB – Q6a – Information System Development and Security

Define and explain key terms related to information systems, including data transmission, data warehouse, and error detection.

Define the term:

i. “Data Transmission”. (2 Marks)

ii. “Data warehouse”. (2 Marks)

iii. Explain the term “Error Detection” in relation to data transmission and list four error detection algorithms. (6 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2016 – L1 – SB – Q6a – Information System Development and Security"

MI – May 2016 – L1 – SB – Q5a – Computer Hardware, Software, and Data Life Cycle

Define computer network and protocol, and state four properties of protocols in data transmission.

Define the term:

i. “Computer Network”.
(2 Marks)

ii. “Protocol” in relation to data transmission and state FOUR of its properties.
(6 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2016 – L1 – SB – Q5a – Computer Hardware, Software, and Data Life Cycle"

MI – May 2016 – L1 – SA – Q16 – Electronic Business and E-Commerce

Identify the correct term that describes the use of computer systems to handle data.

Information Technology (IT) describes the application of computer systems and ________ to store, retrieve, transmit, and manipulate data.

A. Telecommunication Equipment
B. Telecommunication Media
C. Transmission Signets
D. Synchronous Transmission
E. Telecommunication Software

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2016 – L1 – SA – Q16 – Electronic Business and E-Commerce"

MI – May 2015 – L1 – SA – Q20 – Computer Hardware, Software, and Data Life Cycle

Identify the data transmission phenomenon with a clock signal.

Data transmission phenomenon where data is transferred regularly with clock signal is called
A. Asynchronous data transfer
B. Simplex data transfer
C. Duplex data transfer
D. Synchronous data transfer
E. Regular data transfer

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2015 – L1 – SA – Q20 – Computer Hardware, Software, and Data Life Cycle"

AA – May 2018 – L2 – Q5 – Auditing in a Computerized Environment

Discusses controls and potential problems in Electronic Data Interchange (EDI) systems.

Electronic Data Interchange (EDI) systems allow electronic transmission of business documents, such as purchase orders, invoices, payroll information, etc.

Required: a. Explain FOUR major controls to be put in place to minimize the risks inherent in EDI systems. (8 Marks) b. Discuss THREE features of EDI Systems that may create additional problems for the auditor. (7 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "AA – May 2018 – L2 – Q5 – Auditing in a Computerized Environment"

MI – Nov 2014 – L1 – SB – Q5 – Information Systems

This question covers different modes of data transmission and security vulnerabilities in data systems.

Data is converted to binary digits and forwarded to the desired location for the purpose of communication.

a. With the aid of diagrams, explain THREE data transmission modes. In each case, give ONE relevant example. (9 Marks)

b. State ONE difference between Parallel Data Transmission and Serial Data Transmission. (2 Marks)

c. In a tabular form, state TWO differences between Asynchronous Data Transmission and Synchronous Data Transmission. (4 Marks)

d. Enumerate FIVE attacks that could take place as a result of vulnerabilities of a computer system. (5 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2014 – L1 – SB – Q5 – Information Systems"

MI – May 2022 – L1 – SA – Q20 – Information System Development and Security

Identifying a packet of information exchanged between a browser and a web server.

A packet of information that travels between browser and web server is known as:

A. Malware
B. Adware
C. Spyware
D. Cookie
E. Virus

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2022 – L1 – SA – Q20 – Information System Development and Security"

MI – May 2016 – L1 – SB – Q6a – Information System Development and Security

Define and explain key terms related to information systems, including data transmission, data warehouse, and error detection.

Define the term:

i. “Data Transmission”. (2 Marks)

ii. “Data warehouse”. (2 Marks)

iii. Explain the term “Error Detection” in relation to data transmission and list four error detection algorithms. (6 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2016 – L1 – SB – Q6a – Information System Development and Security"

MI – May 2016 – L1 – SB – Q5a – Computer Hardware, Software, and Data Life Cycle

Define computer network and protocol, and state four properties of protocols in data transmission.

Define the term:

i. “Computer Network”.
(2 Marks)

ii. “Protocol” in relation to data transmission and state FOUR of its properties.
(6 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2016 – L1 – SB – Q5a – Computer Hardware, Software, and Data Life Cycle"

MI – May 2016 – L1 – SA – Q16 – Electronic Business and E-Commerce

Identify the correct term that describes the use of computer systems to handle data.

Information Technology (IT) describes the application of computer systems and ________ to store, retrieve, transmit, and manipulate data.

A. Telecommunication Equipment
B. Telecommunication Media
C. Transmission Signets
D. Synchronous Transmission
E. Telecommunication Software

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2016 – L1 – SA – Q16 – Electronic Business and E-Commerce"

MI – May 2015 – L1 – SA – Q20 – Computer Hardware, Software, and Data Life Cycle

Identify the data transmission phenomenon with a clock signal.

Data transmission phenomenon where data is transferred regularly with clock signal is called
A. Asynchronous data transfer
B. Simplex data transfer
C. Duplex data transfer
D. Synchronous data transfer
E. Regular data transfer

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2015 – L1 – SA – Q20 – Computer Hardware, Software, and Data Life Cycle"

error: Content is protected !!
Oops!

This feature is only available in selected plans.

Click on the login button below to login if you’re already subscribed to a plan or click on the upgrade button below to upgrade your current plan.

If you’re not subscribed to a plan, click on the button below to choose a plan