Question Tag: Information Systems

Search 500 + past questions and counting.
  • Filter by Professional Bodies

  • Filter by Subject

  • Filter by Series

  • Filter by Topics

  • Filter by Levels

AAA – Nov 2011 – L3 – SAII – Q2 – Audit of IT Systems and Data Analytics

Definition of the system development process in information systems.

Any logical process used by a system analyst to develop an information system, including requirements, validation, training, and user-ownership, is referred to as……………………..

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "AAA – Nov 2011 – L3 – SAII – Q2 – Audit of IT Systems and Data Analytics"

AAA – Nov 2023 – L3 – SC – Q5 – Audit of IT Systems and Data Analytics

Discusses COBIT's purposes, components, and its application in business processes for IT governance and audit functions.

Hillary Professional Services is a medium-sized firm on a retreat having successfully combined business operations to take advantage of mandatory audit rotation guidelines. At the retreat, it was agreed that a robust software to reduce paperwork was inevitable. All along, one of the combined firms has an Information Technology (IT) Unit which has been strengthened with state-of-the-art equipment.

All auditors are now encouraged to show more interest in information technology, especially in areas relating to data analytics, artificial intelligence, and machine learning. Undoubtedly, understanding the business information system used by management is necessary as they affect risk assessment involved in the financial reporting process. It was also concluded that obtaining an understanding of the field of information technology is a standard audit procedure to be followed; otherwise, it will be difficult to evaluate the adequacy of the expert’s work as recommended by International Standards on Auditing. The purpose of the merger will be defeated if the firm will not be able to win jobs and perform well in a highly competitive market. The after-effect of the COVID-19 pandemic has also revealed that one could work with flexibility anywhere if there is a robust audit software in place.

The IT Audit Partner made a presentation on “COBIT (Control Objectives for Information and Related Technologies) – a globally accepted suite of tools that a client might use in order to ensure IT is working effectively.” He stated that COBIT is all about doing the right things the right way in order to deliver benefits to the client.

You are a staff of Hillary Professional Services. Based on the presentation made on COBIT at the retreat, you have been divided into groups and the groups are to debrief the main group after one hour.

Required:

a. State the purposes of COBIT (Control Objectives for Information and Related Technologies).
(3 Marks)

b. Identify and explain the specific components of COBIT.
(8 Marks)

c. Explain how COBIT will be applied in the business process.
(4 Marks)

Total: 15 Marks

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "AAA – Nov 2023 – L3 – SC – Q5 – Audit of IT Systems and Data Analytics"

AA – Nov 2020 – L2 – Q1a – Auditing in a Computerized Environment

List five general IT control areas and provide examples of controls within each area.

Aladdin Insurance Nigeria Limited is a private company that provides life and non-life insurance services. The company has annual gross premium of N15 billion.
Ordinarily, the underwriting process is manual and is initiated when a customer
walks into a branch and fills a proposal form requesting for an insurance policy (or
an agent fills in the form at the request of the customer). The proposal form
requires information relating to the subject matter of the insurance policy/cover
required by the customer as this will aid the company in assessing the risks
attached and will also help the underwriter to quote a reasonable premium
amount. The prospective insured must disclose all material and relevant
information. The policy proposal form requires important information, such as:

• The name and address of the customer;
• Occupation of the customer;
• Details of the property being proposed for insurance. This could be vehicle
details (for motor insurance) property (for burglary or fire) or other details
relating to life insurance, etc;
• Value of the property being proposed for insurance; and
• Previous insurance history of the client.

The underwriter reviews the information in the proposal form and assesses the risks
inherent in the contract with a view to making a recommendation as to whether to
accept or reject the proposal; if the recommendation is to accept, how much
premium should be charged. For external and complex risks, external inspectors are
engaged. After inspection, the report is sent to the underwriter to review and
consider if any risk recommendations should be made to the customer (usually on
how to properly manage risks) or if an amendment to the policy wordings is
required. The proposal form and the recommendation of the underwriter is passed
on to an approving authority based on the approval limits.
On approval of the policy, the policy terms are communicated to the customer for
review and acceptance. On acceptance, the customer signs the proposal form and pays the premium. Payment method includes cash, cheques, bank transfers. The
details of the policy are recorded in the system by the underwriters who also act as
the accountants. Based on NAICOM‟s requirements, premium should be paid before
the insurance cover starts.
However, due to the COVID 19 pandemic, the Federal Government announced a
lock down of Lagos, thereby imposing a restriction on movement of goods and
persons in the state. In response to this, the company bought a new underwriting
system and automated its entire underwriting process.

Required:

a. List FIVE control areas for General Information Technology (IT) Controls and examples of controls that can be found in each area.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "AA – Nov 2020 – L2 – Q1a – Auditing in a Computerized Environment"

MI – Nov 2020 – L1 – SA – Q13 – Information System Development and Security

Identify the primary purpose of a firewall in computer systems.

Firewall in a computer system is used for:

A. Security

B. Transmission

C. Encryption

D. Fire drills

E. Reporting

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2020 – L1 – SA – Q13 – Information System Development and Security"

PM – May 2018 – L2 – Q4 – Performance Measurement Systems

Discuss the responsibilities and skills required of a Project Manager for implementing a new computer system at ABC Limited.

ABC Limited, a medium-sized family-owned company in Lagos, is considering upgrading its computer systems to better support management decision-making and meet market demands. The directors plan to appoint a temporary Project Manager to lead the systems development project.
a) Identify and describe the responsibilities of the Project Manager within ABC Limited. (10 Marks)
b) Discuss the skills that a Project Manager would require to successfully implement a major project involving the design and installation of the new computer system within ABC Limited. (10 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "PM – May 2018 – L2 – Q4 – Performance Measurement Systems"

BMIS – Nov 2019 – L1 – Q4a – Information System Types

Listing and explanation of four different types of information systems required for effective organizational function.

List and explain FOUR (4) different types of information systems an organization requires to function effectively. (10 marks)

 

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – Nov 2019 – L1 – Q4a – Information System Types"

MI – Nov 2015 – L1 – SB – Q6a – Information Systems

Identifies areas where computers serve as instruments and targets of crime.

a. In a computer environment, it is a common occurrence that data is lost, manipulated, or tampered with by unauthorized individuals for selfish reasons.

Required:
Enumerate FOUR areas where computers are used as instruments of crime and FOUR areas as targets of crime. (8 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2015 – L1 – SB – Q6a – Information Systems"

MI – Nov 2015 – L1 – SB – Q4b – Information Systems

Summary: Describes three main methods used to monitor performance in IT-based organizations.

State and describe briefly THREE main methods of monitoring performance in
an IT based organisation. (6 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2015 – L1 – SB – Q4b – Information Systems"

MI – Nov 2015 – L1 – SB – Q4a – Information Systems

Identifies values added by an Accounting Information System and its various uses.

a. “A well-designed Accounting Information System normally adds VALUES to an organization.”
Required:
i. Enumerate FOUR of these values. (4 Marks)

ii. State FIVE uses of Accounting Information System and explain each briefly. (10 Marks)

(Total 14 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2015 – L1 – SB – Q4a – Information Systems"

MI – Nov 2015 – L1 – SA – Q19 – Information Systems

Identifies a career path that is not typically suitable for a Chartered Accountant in a computer-based industry.

The possible career paths for a Chartered Accountant in a computer-based industry include the following EXCEPT:
A. System Analyst
B. Computer Manufacturer
C. Computer Programmer
D. Web Designer
E. Database Administrator

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2015 – L1 – SA – Q19 – Information Systems"

MI – Mar-Jul 2020 – L1 – SB – Q5a – Information Systems

State the factors to consider and types of application packages available when selecting a software application

Application packages are meant for specific processes, and every process that runs on the computer has at least an associated application.

i. State FIVE factors to be considered in selecting an application package. (5 Marks)

ii. State FIVE types of application packages available. (5 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Mar-Jul 2020 – L1 – SB – Q5a – Information Systems"

MI – Mar-Jul 2020 – L1 – SA – Q20 – Information Systems

Identify the feature that is not associated with a batch processing system.

Which of the following is NOT a feature of Batch Processing System?

A. It is used for data processing that needs no frequent processing
B. It uses the process of queuing method
C. It requires many users at remote locations
D. Processing time is predetermined
E. Every transaction is processed together at once

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Mar-Jul 2020 – L1 – SA – Q20 – Information Systems"

MI – Mar-Jul 2020 – L1 – SA – Q19 – Information System Development and Security

Identify the role responsible for designing logical file structures for a database.

In system development, an IT staff who designs the logical file structures for any database for a new system is called:

A. System Developer
B. System Analyst
C. Data Analyst
D. Business Analyst
E. Programmer

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Mar-Jul 2020 – L1 – SA – Q19 – Information System Development and Security"

MI – Mar-Jul 2020 – L1 – SA – Q16 – Information System Development and Security

Identify the item that is not a security threat related to computer crime or abuse.

Security threats related to computer crime or abuse include the following, EXCEPT:

A. Impersonation
B. Trojan horse method
C. Logic bomb
D. Computer viruses
E. Authentication

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Mar-Jul 2020 – L1 – SA – Q16 – Information System Development and Security"

MI – Mar-Jul 2020 – L1 – SA – Q15 – Information Systems

Identify the strategy that does not safeguard information assets.

Information assets CANNOT be safeguarded through which of the following strategies?

A. Prevention/detection of fraud
B. IT warehouse
C. Law
D. Confidentiality
E. Privacy

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Mar-Jul 2020 – L1 – SA – Q15 – Information Systems"

MI – Mar-Jul 2020 – L1 – SA – Q14 – Information System Development and Security

Identify the method that is not used in system changeover.

The following methods are normally employed during system changeover, EXCEPT:

A. Direct method
B. Parallel method
C. Combined methods
D. Phased method
E. Pilot method

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Mar-Jul 2020 – L1 – SA – Q14 – Information System Development and Security"

MI – Mar-Jul 2020 – L1 – SA – Q6 – Information Systems

Identify the attribute that is not a characteristic of a good coding system.

Which of the following is NOT an attribute of a good coding system?

A. Uniqueness
B. Brevity
C. Clear symbolisation
D. Ambiguity
E. Exhaustivity

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Mar-Jul 2020 – L1 – SA – Q6 – Information Systems"

MI – May 2016 – L1 – SB – Q6a – Information System Development and Security

Define and explain key terms related to information systems, including data transmission, data warehouse, and error detection.

Define the term:

i. “Data Transmission”. (2 Marks)

ii. “Data warehouse”. (2 Marks)

iii. Explain the term “Error Detection” in relation to data transmission and list four error detection algorithms. (6 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2016 – L1 – SB – Q6a – Information System Development and Security"

MI – May 2016 – L1 – SB – Q4d – Computer Hardware, Software, and Data Life Cycle

Define the term "Operating System" of a computer system.

Define “Operating System” of a computer system.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2016 – L1 – SB – Q4d – Computer Hardware, Software, and Data Life Cycle"

MI – May 2016 – L1 – SB – Q4a – Information Systems

Define the term "Open System."

Define the term “Open System.”

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2016 – L1 – SB – Q4a – Information Systems"

error: Content is protected !!
Oops!

This feature is only available in selected plans.

Click on the login button below to login if you’re already subscribed to a plan or click on the upgrade button below to upgrade your current plan.

If you’re not subscribed to a plan, click on the button below to choose a plan