Question Bank
Question Bank
Question Bank
INDEX
Total 191
Start…
Automated Business Processes May 22
Coverage
1) ICAI Study Material Questions & Solutions
2) RTPs & MTPs till Dec 2021
3) Past Year Questions till Dec 2021
1. ICAI S T U D Y M A TE R IA L Q U E S TIO NS
Concept Problem 1
In an enterprise, explain various categories of business processes - Operational Processes, Supporting
Processes and Management Processes with example.
Or
Business processes can be categorized in various types depending on type of industry and nature of work.
Briefly discuss various categories of Business Processes.
Answer
Various categories of business processes are as follows:
i) Operational Processes (or Primary Processes)
It deals with the core business and value chain. These processes deliver value to the customer by helping
to produce a product or service. Operational processes represent essential business activities that
accomplish business objectives, e.g., generating revenue - Order to Cash cycle (O2C), Procurement –
Purchase to Pay (P2P) cycle.
ii) Supporting Processes (or Secondary Processes)
It backs core processes and functions within an organization. Examples of supporting or management
processes include Accounting, Human Resource (HR) Management and workplace safety. One key
differentiator between operational and support processes is that support processes do not provide value
P a g e |1
May 22 Automated Business Processes
Automated Business Processes
to customers directly.
iii) Management Processes
Management Processes measure, monitor and control activities related to business procedures and
systems. Examples of management processes include internal communications, governance, strategic
planning, budgeting, and infrastructure or capacity management. Like supporting processes,
management processes do not provide value directly to the customers. However, it has a direct impact on
the efficiency of the enterprise.
Concept Problem 2
BPA is the tactic a business uses to automate processes to operate efficiently and effectively. Explain the
parameters that should be met to conclude that success of any business process automation has been
achieved.
Or
Recognize the parameters based on which the success of Business Process Automation (BPA) can be
evaluated?
Answer
The success of any Business Process Automation shall only be achieved when BPA ensures the following:
i) Confidentiality: To ensure that data is only available to persons who have right to see the same;
ii) Integrity: To ensure that no un-authorized amendments can be made in the data;
iii) Availability: To ensure that data is available when asked for; and
iv) Timeliness: To ensure that data is made available in at the right time.
To ensure that all above parameters are met, BPA needs to have appropriate internal controls put in place.
Concept Problem 3
Through automation, a business organization intends to increase the accuracy of its information transfer and
certifies the repeatability of the value-added task performed by the automation of business. Being a
management consultant, identify major benefits that would help the organization to achieve its objectives.
Or
A business organization is planning to increase the accuracy of information transferred and certifies the
repeatability of the value-added task performed by the automation of business. Being a management
consultant, identify any four major benefits that the organization can achieve through the automation of a
business process.
Or
A travel agency ABC wishes to implement an automated Grievance Management System at its workplace to
manage and handle the problems with an aim of solving them. Determine the major benefits that will be
drawn out of automating this Grievance related business process.
Answer
Major benefits of automating Business Processes are as follows:
i) Quality and Consistency: Ensures that every action is performed identically - resulting in high quality,
reliable results and stakeholders will consistently experience the same level of service.
ii) Time Saving: Automation reduces the number of tasks employees would otherwise need to do manually.
It frees up time to work on items that add genuine value to the business, allowing innovation and
increasing employees’ levels of motivation.
2|P a ge
Automated Business Processes May 22
P a g e |3
May 22 Automated Business Processes
Automated Business Processes
significant amount of time to be allocated and spent at this stage. This requires a detailed
understanding of the underlying business processes to develop an automated process.
c) Staff Resistance: In most cases, human factor issues are the main obstacle to the acceptance of
automated processes. Staff may see process automation as a way of reducing their decision-making
power. This is due to the reason that with automated processes, the management has a greater visibility
of the process and can make decisions that used to be made by the staff earlier. Moreover, the staff
may perceive automated processes as threat to their jobs.
d) Implementation Cost: The implementation of automated processes may be an expensive proposition in
terms of acquisition/development cost of automated systems and special skills required to operate and
maintain these systems.
Concept Problem 6
The increased availability of choice to customers about products / services makes it very important for
businesses to keep themselves updated to new technology and delivery mechanisms. Being a consultant,
briefly explain the steps involved in BPA implementation.
Or
An Airline Industry wishes to automate its Grievance cell so that their clients can online register their
feedback, complaints and suggestions. The purpose of automation is to provide better service and satisfaction
to its customers. Prepare a list of various steps that are required to be taken while automating Grievance Cell.
Or
Mr. A is appointed as a manager in XYZ company which is planning to adopt the automation of its major
business processes. He has been asked to prepare a list of the sequence of steps that the company should
adhere to implement Business Process Automation. Draft Mr. A’s reply.
Or
The management of ABC company is planning to adopt the automation of its major business process. Mr. X
has been requested to brief all steps of implementing Business Process Automation to the members of
management. Enlist the sequential steps of implementing BPA that can be part of Mr. X’s presentation.
Answer
Various steps that are required while automating the Grievance Cell of the Airline Industry are as follows:
Step 1: Define why we plan to implement a Business Process Automation (BPA)?
The primary purpose for which an enterprise implements automation may vary from enterprise to enterprise.
In this case, to improve upon the Poor customer service is a major concern.
Step 2: Understand the rules / regulation under which enterprise needs to comply with?
This step emphasizes on building an understanding on the rules of engagement, which include following the
rules, adhering to regulations and following document retention requirements. This governance is established
by a combination of internal corporate policies, external industry regulations and local, state, and central
laws.
Step 3: Document the process, we wish to automate
At this step, all the documents that are currently being used need to be documented. The questions
emphasized upon are like - what documents need to be captured?; where do they come from?; what format
are they in?; who is involved in processing of the documents?; what is the impact of regulations on
processing of these documents?; can there be a better way to do the same job? and how are exceptions in
the process handled? etc.
Step 4: Define the objectives/goals to be achieved by implementing BPA
4|P a ge
Automated Business Processes May 22
P a g e |5
May 22 Automated Business Processes
Automated Business Processes
human resources, business processes, technology, business continuity, channel effectiveness, customer
satisfaction, health and safety, environment, product/service failure, efficiency, capacity, and change
integration.
v) Hazard Risk: Risks that are insurable, such as natural disasters; various insurable liabilities; impairment
of physical assets; terrorism etc.
vi) Residual Risk: Any risk remaining even after the counter measures are analysed and implemented is
called Residual Risk. An organization’s management of risk should consider these two areas:
a) Acceptance of residual risk and
b) Selection of safeguards.
Even when safeguards are applied, there is probably going to be some residual risk. The risk can be
minimized, but it can seldom be eliminated. Residual risk must be kept at a minimal, acceptable level.
Concept Problem 8
Automated processes are technology driven. The dependence on technology in BPA for most of the key
business processes has led to various challenges. Explain the technology related risks involved in BPA.
Answer
Technology related risks are as follows:
i) Downtime due to technology failure: Information system facilities may become unavailable due to
technical problems or equipment failure. A common example of this type failure is non-availability of
system due to server failure.
ii) Frequent changes or obsolescence of technology: Technology keeps on evolving and changing constantly
and becomes obsolete very quickly. Hence, there is always a challenge that the investment in technology
solutions, unless properly planned, may result in loss due to risk of obsolescence.
iii) Multiplicity and complexity of systems: The Technology architecture used for services could include
multiple digital platforms and is quite complex.
iv) Proper alignment with business objectives and legal/regulatory requirements: Organizations must ensure
that the systems implemented, cater to all the business objectives and needs, in addition to the
legal/regulatory requirements.
v) Dependence on vendors due to outsourcing of IT services: In a systems environment, the organization
requires staff with specialized skills to manage IT deployed. Hence, these services could be outsourced to
vendors and there is heavy dependency on vendors and gives rise to vendor risks.
vi) Vendor related concentration risk: There may not be one but multiple vendors providing different services.
For example, network, hardware, system software and application software services may be provided by
different vendors or these services may be provided by a single vendor. Both these situations result in
higher risks due to heavy dependence on vendors.
vii) External threats leading to cyber frauds/ crime: The system environment provides access to customers
anytime, anywhere using internet. Hence, information system which was earlier accessible only within
and to the employees is now exposed as it is open to be accessed by anyone from anywhere. Making the
information available is business imperative but this is also fraught with risks of increased threats from
hackers and others who could access the software to commit frauds/crime.
viii) Higher impact due to intentional or unintentional acts of internal employees: Employees in a technology
environment are the weakest link in an enterprise.
ix) Need for governance processes to adequately manage technology and information security:
Controls in system should be implemented from macro and business perspective and not just from
6|P a ge
Automated Business Processes May 22
P a g e |7
May 22 Automated Business Processes
Automated Business Processes
ERM framework consists of eight interrelated components that are derived from the way management runs a
business, and are integrated with the management process.
i) Internal Environment: The internal environment sets the foundation for how risk and control are viewed
and addressed by an entity’s people. They are the engine that drives the entity and the foundation on
which everything rests.
ii) Objective Setting: ERM ensures that management has a process in place to set objectives and that the
chosen objectives support and align with the entity’s mission/vision and are consistent with the entity’s
risk appetite.
iii) Event Identification: Event identification includes identifying factors – internal and external – that
influence how potential events may affect strategy implementation and achievement of objectives. It
includes distinguishing between potential events that represent risks, those representing opportunities
and those that may be both.
iv) Risk Assessment: Identified risks are analysed to form a basis for determining how they should be
managed. Risks are assessed on both an inherent and a residual basis, and the assessment considers
both risk likelihood and impact.
v) Risk Response: Management selects an approach or set of actions to align assessed risks with the
entity’s risk tolerance and risk appetite, in the context of the strategy and objectives.
vi) Control Activities: Policies and procedures are established and executed to help ensure that the risk
responses that management selected, are effectively carried out.
vii) Information & Communication: Relevant information is identified, captured and communicated in a form
and time frame that enable people to carry out their responsibilities. Information is needed at all levels
of an entity for identifying, assessing and responding to risk. Effective communication also should occur
in a broader sense, flowing down, across and up the entity. Personnel need to receive clear
communications regarding their role and responsibilities.
viii) Monitoring: The entire ERM process should be monitored, and modifications made as necessary. In this
way, the system can react dynamically, changing as conditions warrant. Monitoring is accomplished
through ongoing management activities, separate evaluations of the ERM processes or a combination of
the both.
Concept Problem 11
SA 315 provides the definition of Internal Control that are required to facilitate the effectiveness and
efficiency of business operations in an organization. Explain all components of Internal Control as per SA315.
Answer
As per SA 315, the five components of any internal control as they relate to a financial statement audit are
explained below. All these components must be present to conclude that internal control is effective.
i) Control Environment: The Control Environment is the set of standards, processes, and structures that
provide the basis for carrying out internal control across the organization. The Board of Directors and
Senior Management establish the tone at the top regarding the importance of internal control, including
expected standards of conduct.
The resulting control environment has a pervasive impact on the overall system of internal control.
ii) Risk Assessment: Risk Assessment involves a dynamic and iterative process for identifying and
assessing risks to the achievement of objectives. Risks to the achievement of these objectives from
across the entity are considered relative to established risk tolerances.
Thus, Risk Assessment forms the basis for determining how risks will be managed. A precondition to risk
assessment is the establishment of objectives, linked at different levels of the entity. Because economic,
8|P a ge
Automated Business Processes May 22
P a g e |9
May 22 Automated Business Processes
Automated Business Processes
ii) helps ensure the reliability of internal and external financial reporting.
iii) assists compliance with applicable laws and regulations.
iv) helps safeguarding the assets of the entity.
Limitations of Internal Control System are as follows:
i) The fact that most internal controls do not tend to be directed at transactions of unusual nature. The
potential for human error, such as, due to carelessness, distraction, mistakes of judgement and
misunderstanding of instructions.
ii) The possibility of circumvention of internal controls through collusion with employees or with parties
outside the entity.
iii) The possibility that a person responsible for exercising an internal control could abuse that responsibility,
for example, a member of management overriding an internal control.
iv) Manipulations by management with respect to transactions or estimates and judgements required in the
preparation of financial statements.
Concept Problem 13
As a part of his project work submission, Mr. X, a student of ABC university needs to prepare and present a
PowerPoint presentation on the topic “Advantages and limitations of Flowcharts” during his practical
examination. What shall be the relevant content?
Answer
Advantages of Flow Chart are as follows:
i) Quicker grasp of relationships: The relationship between various elements of the application
program/business process must be identified. Flowchart can help depict a lengthy procedure more easily
than by describing it by means of written notes.
ii) Effective Analysis: The flowchart becomes a blue print of a system that can be broken down into
detailed parts for study. Problems may be identified and new approaches may be suggested by
flowcharts.
iii) Communication: Flowcharts aid in communicating the facts of a business problem to those whose skills
are needed for arriving at the solution.
iv) Documentation: Flowcharts serve as a good documentation which aid greatly in future program
conversions. In the event of staff changes, they serve as training function by helping new employees in
understanding the existing programs.
v) Efficient coding: Flowcharts act as a guide during the system analysis and program preparation phase.
Instructions coded in a programming language may be checked against the flowchart to ensure that no
steps are omitted.
vi) Program Debugging: Flowcharts serve as an important tool during program debugging. They help in
detecting, locating and removing mistakes.
vii) Efficient program maintenance: The maintenance of operating programs is facilitated by flowcharts. The
charts help the programmer to concentrate attention on that part of the information flow which is to be
modified.
viii) Identifying Responsibilities: Specific business processes can be clearly identified to functional
departments thereby establishing responsibility of the process owner.
ix) Establishing Controls: Business process conflicts and risks can be easily identified for recommending
suitable controls.
10 | P a g e
Automated Business Processes May 22
Unauthorized changes to supplier master file. Only valid changes are made to supplier master file.
All valid changes to the supplier master file are All valid changes to the supplier master file are input
not input and processed. and processed.
Orders are processed exceeding customer credit Orders are processed only within approved customer
limits without approvals. credit limits.
Orders are not approved by management as to Orders are approved by management as to prices and
prices and terms of sale. terms of sale.
Invalid changes are made to the inventory Only valid changes are made to the inventory
management master file. management master file.
Invalid changes to the inventory management All valid changes to the inventory management
master file are input and processed. master file are input and processed.
Concept Problem 15
Explain the salient features of Section 134 & Section 143 of the Companies Act 2013.
Answer
The Companies Act, 2013 has two very important Sections - Section 134 and Section 143, which have a direct
impact on the audit and accounting profession.
(i) Section 134
Section 134 of the Companies Act, 2013 on “Financial statement, Board’s report, etc.” states inter alia:
The Directors’ Responsibility Statement shall state that:
a) the Directors had taken proper and sufficient care for the maintenance of adequate accounting records in
accordance with the provisions of this Act for safeguarding the assets of the company and for preventing
and detecting fraud and other irregularities;
b) the Directors, in the case of a listed company, had laid down internal financial controls to be followed by
the company and that such internal financial controls are adequate and were operating effectively.
(ii) Section 143
P a g e | 11
May 22 Automated Business Processes
Automated Business Processes
Section 143, of the Companies Act 2013, on “Powers and duties of auditors and auditing standards” states
inter alia: “whether the company has adequate internal financial controls system in place and the operating
effectiveness of such controls”;
When we talk in terms of “adequacy and effectiveness of controls”; it refers to the adequacy of the control
design and whether the control has been working effectively during the relevant financial year.
Example, A company has a sales invoicing control wherein all sales invoices raised by the salesman which is
greater than INR 50,000/- are reviewed and approved by the sales manager. In terms of the of the control
design this control may seem adequate. However, if during audit, it was found that, during the year, there were
many invoices raised by the salesman which was greater than INR 50,000/- and not reviewed and approved by
the sales manager. In such a case, although the control design was adequate, the control was not working
effectively, due to many exceptions without proper approval.
Concept Problem 16
Give five examples of computer related offences that can be prosecuted under the IT Act 2000 (amended via
2008).
Or
Mr. Amar is the chief IT manager of a company who designed a new advisory for all employee s mentioning
the various cyber-crimes which may attract prosecution as per penalties and offences prescribed in
Information Technology Act, 2000. Describe the various cybercrimes that Mr. Amar could have incorporated in
his advisory.
Answer
The various cyber-crime scenarios which can attract prosecution as per the penalties and offences prescribed
in Information Technology Act, 2000 are as follows.
i) Harassment via fake public profile on social networking site: A fake profile of a person is created on a
social networking site with the correct address, residential information or contact details but he/she is
labelled as ‘prostitute’ or a person of ‘loose character’. This leads to harassment of the victim.
ii) Email Account Hacking: If victim’s email account is hacked and obscene emails are sent to people in
victim’s address book.
iii) Web Defacement: The homepage of a website is replaced with a pornographic or defamatory page.
Government sites generally face the wrath of hackers on symbolic days.
iv) Introducing Viruses, Worms, Backdoors, Rootkits, Trojans, Bugs: All these are some sort of malicious
programs which are used to destroy or gain access to some electronic information.
v) Cyber Pornography: Among the largest businesses on Internet, pornography may not be illegal in many
countries, but child pornography is.
vi) Credit Card Fraud: Unsuspecting victims would use infected computers to make online transactions.
Sections 43, 66, 66C, 66D of IT Act, 2000 are applicable in this case.
vii) Cyber Terrorism: Cyber terrorism is the terrorism conducted in cyberspace, where the criminals attempt
to damage or disrupt computer systems or telecommunication services. Examples are hacking into
computer systems, introducing viruses to vulnerable networks, web site defacing, denial-of-service
attacks, or terroristic threats made via electronic communication. Many terrorists use virtual (Drive, FTP
sites) and physical storage media (USB’s, hard drives) for hiding information and records of their illicit
business. Sections 43, 66, 66A of IT Act, 2000 are applicable in this case.
viii) Online sale of illegal Articles: Where sale of narcotics, drugs, weapons and wildlife is facilitated by the
Internet.
ix) Cyber Pornography: Among the largest businesses on Internet, pornography may not be illegal in many
12 | P a g e
Automated Business Processes May 22
P a g e | 13
May 22 Automated Business Processes
Automated Business Processes
specifies objectives within categories of operations, reporting, and compliance with sufficient clarity to be
able to identify and assess risks to those objectives. Risk assessment also requires management to
consider the impact of possible changes in the external environment and within its own business model
that may render internal control ineffective.
Concept Problem 19
"Enterprise Risk Management (ERM) does not create a risk-free environment; rather it enables management
to operate more effectively in environment filled with risks". In view of this statement, explain the various
benefits, which Board of Directors and Management of an entity seek to achieve by implementing the ERM
process within the entity.
Answer
Following features in Enterprise Risk Management provides enhanced capabilities to enable management to
operate more effectively in environments filled with risks:
i) Align risk appetite and strategy: Risk appetite is the degree of risk, on a broad- based level that an
enterprise is willing to accept in pursuit of its goals. Management considers the entity’s risk appetite
first in evaluating strategic alternatives, then in setting objectives aligned with the selected strategy and
in developing mechanisms to manage the related risks.
ii) Link growth, risk and return: Entities accept risk as part of value creation and preservation, and they
expect return commensurate with the risk. ERM provides an enhanced ability to identify and assess
risks, and establish acceptable levels of risk relative to growth and return objectives.
iii) Enhance risk response decisions: ERM provides the rigor to identify and select among alternative risk
responses - risk avoidance, reduction, sharing and acceptance. ERM provides methodologies and
techniques for making these decisions.
iv) Minimize operational surprises and losses: Entities have enhanced capability to identify potential events,
assess risk and establish responses, thereby reducing the occurrence of surprises and related costs or
losses.
v) Identify and manage cross-enterprise risks: Every entity faces a myriad of risks affecting different
parts of the enterprise. Management needs to not only manage individual risks, but also understand
interrelated impacts.
vi) Provide integrated responses to multiple risks: Business processes carry many inherent risks and ERM
enables integrated solutions for managing the risks.
vii) Seize opportunities: Management considers potential events, rather than just risks, and by considering a
full range of events, management gains an understanding of how certain events represent opportunities.
viii) Rationalize capital: More robust information on an entity’s total risk allows management to more
effectively assess overall capital needs and improve capital allocation.
Concept Problem 20
State the required characteristics of goals to be achieved by implementing Business Process Automation.
Answer
The required characteristics of goals to be achieved by implementing Business Process Automation (BPA)
could be abbreviated as “SMART” which means:
i) S - Specific
ii) M - Measurable
iii) A - Attainable
iv) R – Relevant
14 | P a g e
Automated Business Processes May 22
Employees who have left the company continue System access to be immediately removed when
to have system access. employees leave the company.
Employees have system access in excess of their Employees should be given system access based on a
job requirements. “need to know” basis and to perform their job
function.
Concept Problem 22
As a cyber-expert, you have been invited in a seminar to share your thoughts on data protection and privacy
in today’s electronic era. In your PowerPoint presentation on the same, you wish to incorporate the main
principles on data protection and privacy enumerated under the IT Act, 2000. Identify them.
Answer
The main principles on data protection and privacy enumerated under the IT Act, 2000 are:
i) Defining ‘data’, ‘computer database’, ‘information’, ‘electronic form’, ‘originator’, ‘addressee’ etc.
ii) creating civil liability if any person accesses or secures access to computer, computer system or
computer network
iii) creating criminal liability if any person accesses or secures access to computer, computer system or
computer network
iv) declaring any computer, computer system or computer network as a protected system
v) imposing penalty for breach of confidentiality and privacy
vi) setting up of hierarchy of regulatory authorities, namely adjudicating officers, the Cyber Regulations
Appellate Tribunal etc.
Concept Problem 23
Explain the positive aspects contained in the IT Act 2000 and its provisions from the perspective of e-
commerce in India.
Answer
From the perspective of e-commerce in India, the IT Act, 2000 and its provisions contain many positive
aspects which are as follows:
i) The implication for the e-businesses is that email is now a valid and legal form of communication in
India that can be duly produced and approved in a court of law.
ii) Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by
the Act.
iii) Digital Signatures have been given legal validity and sanction in the Act.
iv) The Act throws open the doors for the entry of corporate companies in the business of being Certifying
Authorities for issuing Digital Signatures Certificates.
v) The Act allows Government to issue notification on the web thus heralding e- governance.
P a g e | 15
May 22 Automated Business Processes
Automated Business Processes
vi) The Act enables the companies to file any form, application or any other document with any office,
authority, body or agency owned or controlled by the appropriate Government in electronic form by
means of such electronic form as may be prescribed by the appropriate Government.
vii) The IT Act also addresses the important issues of security, which are so critical to the success of
electronic transactions.
viii) The Act has given a legal definition to the concept of secure digital signatures that would be required to
have been passed through a system of a security procedure, as stipulated by the Government at a later
date.
Under the IT Act, 2000, it shall now be possible for corporates to have a statutory remedy in case if anyone
breaks into their computer systems or network and causes damages or copies data. The remedy provided by
the Act is in the form of monetary damages, not exceeding INR 1 crore.
Concept Problem 24
General Controls are pervasive controls and apply to all the components of system, processes and data for a
given enterprise or systems environment. As an IT consultant, discuss some of the controls covered under
general controls which you would like to ensure for a given enterprise.
Or
Suppose you are an IT consultant of ABC enterprises. What general controls would you apply to all
components of system, processes and data for ABC enterprises to ensure the security of information system
and application program.
Or
Organizations should identify controls as per policy, procedures and its structure and configure them within IT
software as used in the organization. Discuss widely the Information Technology controls that can be
implemented as per risk management strategy. (Both ITGC & App Controls is required here)
Answer
General controls related to IT environment and Information Systems include the following:
a) Information Security Policy: The security policy is approved by the senior management and encompasses
all areas of operations of bank and drives access to information across the enterprise and other
stakeholders.
b) Administration, Access and Authentication: IT should be administered with appropriate policies and
procedures clearly defining the levels of access to information and authentication of users.
c) Separation of key IT functions: Secure deployment of IT requires the bank to have separate IT
organization structure with key demarcation of duties for different personnel within IT department and
to ensure that there are no SoD conflicts.
d) Management of Systems Acquisition and Implementation: Software solutions for Core Banking Systems
(CBS) are most developed acquired and implemented. Hence, process of acquisition and implementation
of systems should be properly controlled.
e) Change Management: IT solutions deployed and its various components must be changed in tune with
changing needs as per changes in technology environment, business processes, regulatory and
compliance requirements as these changes impact the live environment of banking services. Hence,
change management process should be implemented to ensure smooth transition to new environments
covering all key changes including hardware, software and business processes. All changes must be
properly approved by the management before implementation.
f) Backup, Recovery and Business Continuity: Heavy dependence on IT and criticality makes it imperative
that resilience of banking operations should be ensured by having appropriate business continuity
16 | P a g e
Automated Business Processes May 22
P a g e | 17
May 22 Automated Business Processes
Automated Business Processes
Risks Controls
The customer master file is not maintained properly The customer master file is maintained properly and
and the information is not accurate. the information is accurate.
Invalid changes are made to the customer master Only valid changes are made to the customer master
file. file.
All valid changes to the customer master file are not All valid changes to the customer master file are
input and processed. input and processed.
Changes to the customer master file are not Changes to the customer master file are accurate.
accurate.
Changes to the customer master file are not Changes to the customer master file are processed in
processed in a timely manner. a timely manner.
Customer master file data is not up-to- date and Customer master file data is up to date and relevant.
relevant.
System access to maintain customer masters has System access to maintain customer masters has
not been restricted to the authorized users. been restricted to the authorized users.
Concept Problem 28
Discuss all the stages of Human Resource (HR) Life Cycle.
Or
Human Resource Management (HRM) plays an important role in the effective and efficient management of
the human resource in any enterprise. As an HR manager of XYZ Ltd., which typical stages of HR life cycle
will you implement in the company?
Answer
The Human Resources (HR) Life Cycle refers to human resources management and covers all the stages of an
employee’s time within a specific enterprise and the role the human resources department plays at each
stage. Typical stage of HR cycle includes the following:
i) Recruiting and On-boarding: Recruiting is the process of hiring a new employee. The role of the human
resources department in this stage is to assist in hiring. This might include placing the job ads, selecting
candidates whose resumes look promising, conducting employment interviews and administering
assessments such as personality profiles to choose the best applicant for the position.
On boarding is the process of getting the successful applicant set up in the system as a new employee.
ii) Orientation and Career Planning: Orientation is the process by which the employee becomes a member of
the company’s work force through learning her new job duties, establishing relationships with co-workers
and supervisors and developing a niche.
Career planning is the stage at which the employee and her supervisors work out her long-term career
goals with the company. The human resources department may make additional use of personality profile
testing at this stage to help the employee determine her best career options with the company.
18 | P a g e
Automated Business Processes May 22
P a g e | 19
May 22 Automated Business Processes
Automated Business Processes
Examples of supporting or management processes include Accounting, Human Resource (HR) Management
and workplace safety. The main HR Process Areas are grouped into logical functional areas like Recruitment
and Staffing; Goal Setting; Training and Development; Compensation and Benefits; Performance
Management; Career Development and Leadership Development.
Concept Problem 31
Determine all the sub processes that are included under an Order to Cash Process.
Or
During a job interview, an interviewer panelist asked Mr. A to elaborate all the sub-processes included in an
Order-To-Cash (O2C) business process. Prepare an appropriate draft reply.
Answer
Order to Cash (O2C): OTC or O2C is a set of business processes that involve receiving and fulfilling customer
requests for goods or services. It is a set of business processes that involve receiving and fulfilling customer
requests for goods or services. An order to cash cycle consists of multiple sub-processes including:
i) Customer order is documented;
ii) Order is fulfilled or service is scheduled;
iii) Order is shipped to customer or service is performed;
iv) Invoice is created and sent to customer;
v) Customer sends payment /Collection; and
vi) Payment is recorded in general ledger.
Concept Problem 32
Discuss any two risks of Business Process Automation.
Answer
The dependence on technology in BPA for most of the key business processes has led to various challenges.
The risks of Business Process Automation (BPA) are classified below:
a) Frequent changes or obsolescence of technology: Technology keeps on evolving and changing constantly
and becomes obsolete very quickly. Hence, there is always a challenge that the investment in technology
solutions unless properly planned may result in loss to bank due to risk of obsolescence.
b) Multiplicity and complexity of systems: The Technology architecture used for services could include
multiple digital platforms and is quite complex. Hence, this requires the personnel to have knowledge
about requisite technology skills or the management of the technology could be outsourced to a company
having the relevant skill set.
c) Dependence on vendors due to outsourcing of IT services: In a systems environment, the organization
requires staff with specialized domain skills to manage IT deployed. Hence, these services could be
outsourced to vendors and there is heavy dependency on vendors and gives rise to vendor risks which
should be managed by proper contracts, controls and monitoring.
d) Vendor related concentration risk: There may not be one but multiple vendors providing different services.
For example, network, hardware, system software and application software services may be provided by
different vendors or these services may be provided by a single vendor. Both these situations result in
higher risks due to heavy dependence on vendors.
Concept Problem 33
The controls for a particular business process are implemented by breaking them down into smaller
components. Determine the main components of controls for the Purchase to Pay Cycle.
20 | P a g e
Automated Business Processes May 22
P a g e | 21
May 22 Automated Business Processes
Automated Business Processes
Subversive Attacks and Piggybacking are the types of Asynchronous Attacks. However, they differ in following
aspects:
Subversive Attacks: These can provide intruders with important information about messages being
transmitted and the intruder may attempt to violate the integrity of some components in the sub-system.
Piggybacking: This is the act of following an authorized person through a secured door or electronically
attaching to an authorized telecommunication link that intercepts and alters transmissions. This involves
intercepting communication between the operating system and the user and modifying them or substituting
new messages.
Concept Problem 36
Recognize all the technical exposures that include unauthorized implementation or modification of data and
software.
Or
ABC Ltd., a Delhi based financial consultant company has huge clientele having crucial data about its
clients. Therefore, the company has robust implementation of Logical Access Controls to ensure that access
to its systems, data and programs is restricted to authorized users to safeguard information against
unauthorized use. Describe all the technical exposures against which these Logical Access Controls provide
security to the data and software of the company.
Answer
Technical Exposures: Technical exposures include unauthorized implementation or modification of data and
software. Technical exposures include the following:
i) Data Diddling: This involves the change of data before or after they entered the system. A limited
technical knowledge is required to data diddle and the worst part with this is that it occurs before
computer security can protect the data.
ii) Bomb: Bomb is a piece of bad code deliberately planted by an insider or supplier of a program. An event,
which is logical, triggers a bomb or time based. The bombs explode when the conditions of explosion get
fulfilled causing the damage immediately. However, these programs cannot infect other programs. Since,
these programs do not circulate by infecting other programs; chances of a widespread epidemic are
relatively low.
iii) Christmas Card: It is a well-known example of Trojan and was detected on internal E-mail of IBM
system. On typing the word ‘Christmas’, it will draw the Christmas tree as expected, but in addition, it
will send copies of similar output to all other users connected to the network. Because of this message on
other terminals, other users cannot save their half -finished work.
iv) Worm: A worm does not require a host program like a Trojan to relocate itself. Thus, a Worm program
copies itself to another machine on the network. Since, worms are stand-alone programs, and they can
be detected easily in comparison to Trojans and computer viruses. Examples of worms are Existential
Worm, Alarm clock Worm etc. The Alarm Clock worm places wake-up calls on a list of users. It passes
through the network to an outgoing terminal while the sole purpose of existential worm is to remain alive.
Existential worm does not cause damage the system, but only copies itself to several places in a
computer network.
v) Rounding Down: This refers to rounding of small fractions of a denomination and transferring these small
fractions into an authorized account. As the amount is small, it gets rarely noticed.
vi) Salami Techniques: This involves slicing of small amounts of money from a computerized transaction or
account. A Salami technique is slightly different from a rounding technique in the sense a fix amount is
deducted. For example, in the rounding off technique, Rs.21,23,456.39 becomes Rs. 21,23,456.40, while in
the Salami technique the transaction amount Rs. 21,23,456.39 is truncated to either Rs. 21,23,456.30 or
22 | P a g e
Automated Business Processes May 22
P a g e | 23
May 22 Automated Business Processes
Automated Business Processes
Human Resource Management (HRM) plays an important role in the effective and efficient management of
the human resources in any enterprise. As an HR Manager of XYZ Ltd, which typical stages of HR life cycle
will you implemented in the company?
3. C A S E B A S E D MCQ S 1 – ICAI S T U D Y M A T E R I A L
ABC Ltd. is engaged in the business of producing consumer durable products. It is facing the problem of poor
customer service due to its broken, inefficient, and manual processes. The customers of the company are
becoming more demanding with respect to higher quality of products and delivery time.
To remain competitive in the market and to overcome the issues faced by its customers, the company
decided to optimize and streamline its essential business processes using the latest technology to automate
the functions involved in carrying out these essential processes. The management of the company is very
optimistic that with automation of business processes, it will be able to extract maximum benefit by using
the available resources to their best advantage. Moreover, with automation the company will be able to
integrate various processes and serve its customers better and faster. The management is aware that the
automation of business processes will lead to new types of risks in the company’s business. The failure or
malfunction of any critical business process will cause significant operational disruptions and materially
impact its ability to provide timely services to its customers. The management of ABC Ltd. adopted different
Enterprise Risk Management (ERM) strategies to operate more effectively in environment filled with risks.
To reduce the impact of these risks, the company also decided to implement necessary internal controls.
Read the above illustration carefully and answer the following questions:
1. The processes automated by ABC Ltd. are susceptible to many direct and indirect challenges. Which of the
following factor cannot be considered valid in case the company fails to achieve the desired results?
a. The business processes are not well thought or executed to align with business objectives.
b. The staff may perceive automated processes as threat to their jobs.
c. The documentation of all the automated business processes is not done properly.
d. The implementation of automated processes in the company may be an expensive proposition.
2. The processes automated by ABC Ltd. are technology driven. The dependence on technology in key
business processes exposed the company to various internal as well as external threats. According to you,
external threats leading to cyber-crime in BPA is because:
a. Organizations may have a highly-defined organization structure with clearly defined roles, authority
and responsibility.
b. There may not be one but multiple vendors providing different services.
c. The system environment provides access to customers anytime, anywhere using internet.
d. The dependence on technology is insignificant.
3. The management of ABC Ltd. adopted a holistic and comprehensive approach of Enterprise Risk
Management (ERM) framework by implementing controls across the company. Identify the false
statement w.r.t components of ERM framework.
a. As a part of event identification, potential events that might have an impact on the entity should
be identified.
b. As a part of risk assessment component, identified risks are analyzed to form a basis for
determining how they should be managed.
c. As a part of monitoring, the entire ERM process should be monitored with no further modifications in
the system.
d. As a part of control activities, policies and procedures are established and executed to help ensure
24 | P a g e
Automated Business Processes May 22
C A S E B A S E D MCQ S 2 – IC AI S T U D Y M A T
DXN Ltd. is engaged in manufacturing consumer products for women. The company released a new product
recently which met with unexpected success. The company was established as a market leader in that
product. The growing volume of sales transactions started to put a strain on company’s internal processes.
The company employed 300 more employees to ensure that the customers are served better and faster. But
with the increase in number of monthly transactions to 1.5 million, the manual processes which were being
followed by the company at present, were holding it back. The company was not able to meet consumer
demands even after employing addition 300 employees. The management consultant Mr. X of DXN Ltd.
advised to automate the key business processes of the company to handle large volume of transactions to
meet the expectations of its customers and maintain its competitive edge in the market.
Mr. X gathered extensive information about the different activities involved in the current processes followed
by DXN Ltd. like - what the processes do, the flow of various processes, the persons who are in charge of
different processes etc. The information so collected helped him in understanding the existing processes such
as flaws, bottlenecks, and other less obvious features within the existing processes. Based on the information
gathered about the current processes, Mr. X prepared various flowcharts depicting how various processes
should be performed after automation and submitted his report to the management covering the following
points:
The major benefits of Business Process Automation;
The processes that are best suited to automation;
Challenges that DXN Ltd. may face while implementing automated processes;
Risks involved in Business Process Automation and how the management should manage these risks.
Read the above illustration carefully and answer the following Questions:
1. As the DXN Ltd. was implementing the automated processes for the first time, the consultant suggested
not to automate all the processes at a time and automate only critical processes which would help the
company to handle large volume of transactions. Which of the following business processes are not best
suited to automation:
a. Processes involving repetitive tasks
b. Processes requiring employees to use personal judgment
c. Time sensitive processes
d. Processes having significant impact on other processes and systems
2. While understanding the criticality of various business processes of DXN Ltd., the consultant Mr. X
documented the current processes and identified the processes that needed automation. However,
documentation of existing processes does not help in.
a. providing clarity on the process
b. determining the sources of inefficiency, bottlenecks, and problems
P a g e | 25
May 22 Automated Business Processes
Automated Business Processes
MCQ 1 1. C 2. C 3. C 4. B
MCQ 2 1. B 2. C 3. A 4. A
26 | P a g e
Financial Accounting System May 22
Coverage
1) ICAI Study Material Questions & Solutions
2) RTPs & MTPs till Dec 2021
3) Past Year Questions till Dec 2021
1. ICAI S T U D Y M A TE R IA L Q U E S TIO NS
Concept Problem 1
As an Auditor, prepare a checklist of the questions that you would ask while performing an ERP Audit.
Or
You have been appointed as an Information Systems (IS) Auditor in a company JKL Ltd. and asked to perform
an ERP audit. Prepare a checklist of the common concerns that should be asked during development and
implementation of the system as well as ERP Audit.
Answer
Checklist to be followed by an IS Auditor for the audit of ERP Systems are as follows:
i) Does the system process according to GAAP (Generally Accepted Accounting Principles) and GAAS
(Generally Accepted Auditing Standards)?
ii) Does it meet the needs for reporting, whether regulatory or organizational?
iii) Were adequate user requirements developed through meaningful interaction?
iv) Does the system protect confidentiality and integrity of information assets?
P a g e | 27
May 22 Financial Accounting System
Financial Accounting System
Concept Problem 2
Determine the reasons for the importance of Business Reporting. Identify the global standard for exchanging
business information and discuss it in detail.
Answer
Business Reporting or Enterprise Reporting is the public reporting of operating and financial data by a
business enterprise or the regular provision of information to decision-makers within an organization to
support them in their work.
ii) High-quality business reporting is at the heart of strong and sustainable organizations, financial
markets, and economies, as this information is crucial for stakeholders to assess organizational
performance and make informed decisions with respect to an organization’s capacity to create and
preserve value.
iii) As organizations fully depend on their stakeholders for sustainable success, it is in their interest to
provide them with high-quality reports. For example, effective high- quality reporting reduces the risk
for lenders and may lower the cost of capital.
iv) Many organizations are increasingly complex, and have larger economic, environmental, and social
footprints. As a result, various stakeholder groups are demanding increased Environmental, Social and
Governance (ESG) information, as well as greater insight into how these factors affect financial
performance and valuations.
v) High-quality reports also promote better internal decision-making. High-quality information is integral
to the successful management of the business, and is one of the major drivers of sustainable
organizational success.
28 | P a g e
Financial Accounting System May 22
In a nutshell, XBRL provides a language in which reporting terms can be authoritatively defined. Those terms
can then be used to uniquely represent the contents of financial statements or other kinds of compliance,
performance and business reports.
Concept Problem 3
An enterprise ABC Ltd. intends to acquire software for Accounting as well as Tax compliance. Prepare a list of
pros and cons of having single software for Accounting and Tax compliance.
Or
A business organization is planning to switch on to an integrated software for accounting as well as tax
compliance instead of separate software for accounting and tax compliance. Being a consultant to the
management of this organization, you are required to advise them on various Pros and Cons of having
single software for both the accounting and tax compliance.
Answer
Single software for both the Accounting and Tax Compliance must be an integrated system.
Pros of having single integrated software for both the Accounting and Tax Compliance as compared to only a
Tax Compliance Software are as follows:
i) More Accurate: As single software for both Accounting and Tax Compliance is an integrated system,
hence accounting data and tax compliance data shall always be same and there is no need to transfer
data to compliance software and reconcile the data. However, in only tax compliance software,
reconciliation with accounting data is needed and possibility of mismatch of data between two
systems is always there.
ii) Lesser Time and efforts required: The time required to transfer data to compliance integrated software
is zero whereas it’s relatively more in the separate software wherein data from accounting software
need to put in for preparation of returns that may take extra time and efforts.
Cons of having such integrated software for both the Accounting and Tax Compliance as compared to only a
Tax Compliance Software are as follows:
i) Less ease of software operation: In an integrated system, everything is connected with other and
making changes at one place may affect other aspects also. However, single software is less
complicated and bound to be easy.
ii) Less features and facilities for Tax Compliance: As the integrated is system is not an exclusive system
for tax compliance, it may have limited features for tax compliance. Whereas single system is an
exclusive and specifically designed system for tax compliance, more features and facilities shall exist
in this system.
iii) More cost: If tax compliance feature is not available in accounting system, then to make the system
integrated and getting it customized may require some amount of cost which may be higher than
P a g e | 29
May 22 Financial Accounting System
Financial Accounting System
buying separate software. Whereas specific purpose software shall have less complications and the
cost also shall be less.
Concept Problem 4
An article joined an Audit firm where he was briefed upon the details of an Accounting Process Flow.
Determine the steps involved in the process.
Answer
Accounting or Book keeping cycle covers the business processes involved in recording and processing
accounting events of a company.
It begins when a transaction or financial event occurs and ends with its inclusion in the financial statements.
A typical life cycle of an accounting transaction may include the following transactions as depicted below
i) Source Document: A document that captures data from transactions and events.
ii) Journal: Transactions are recorded into journals from the source document.
iii) Ledger: Entries are posted to the ledger from the journal.
iv) Trial Balance: Unadjusted trial balance containing totals from all account heads is prepared.
v) Adjustments: Appropriate adjustment entries are passed.
vi) Adjusted Trial balance: The trial balance is finalized post adjustments.
vii) Closing Entries: Appropriate entries are passed to transfer accounts to financial statements.
viii) Financial statement: The accounts are organized into the financial statements.
Concept Problem 5
The Material Management (MM) Module in an ERP systems manages materials required, processed and
produced in enterprises. Discuss the steps involved in overall purchase process.
Or
On joining a Manufacturing company XYZ, you are briefed about the functioning of different modules like
Financial Accounting Module, Sales and Distribution Module, Human Resource Module, Material Management
Module, Production Planning Module etc. Prepare a brief description on the Material Management Module
(MM) based on your understanding.
Or
30 | P a g e
Financial Accounting System May 22
Answer
Material Management (MM) Module manages materials required, processed and produced in enterprises.
Different types of procurement processes are managed with th is system. Some of the popular sub-
components in MM module are vendor master data, consumption-based planning, purchasing, inventory
management, invoice verification and so on. Material management also deals with movement of materials
via other modules like logistics, Supply Chain Management, sales and delivery, warehouse management,
production and planning.
ii) Evaluation of Requisition: Purchase department shall evaluate the requisition with the current stock
position and purchase order pending position and shall decide about accepting or rejection the
requisition.
iii) Asking for Quotation: If requisition is accepted, quotations shall be asked to approve vendors for
purchase of material.
v) Purchase Order: This is a transaction for letting an approved vendor know what we want to purchase,
how much we want to purchase, at what rate we want to purchase, by what date we want the delivery,
where we want the delivery. Hence a typical purchase order shall have following information.
vi) Material Receipt: This is a transaction of receipt of material against purchase order. This is commonly
known as Material Receipt Note (MRN) or Goods Receipt Note (GRN). This transaction shall have a
linking with Purchase Order. Information in Purchase Order is automatically copied to Material
Receipt Voucher for saving time and efforts of user. Stock is increased after recording of this
transaction.
vii) Issue of material: Material received by stores shall be issued to production department as per
requirement.
viii) Purchase Invoice: This is a financial transaction. Trial balance is affected due this transaction.
Material Receipt transaction does not affect trial balance. This transaction shall have a linking with
Material Receipt Transaction and all the details of material received shall be copied automatically in
purchase invoice. As stock is increased in Material Receipt transaction, it will not be increased again
P a g e | 31
May 22 Financial Accounting System
Financial Accounting System
ix) Payment to Vendor: Payment shall be made to vendor based on purchase invoice recorded earlier.
Payment transaction shall have a linking with purchase invoice.
Concept Problem 6
Explain the term “Business Intelligence” with example.
Or
Analyze the statement “The potential benefits of Business Intelligence (BI) programs include accelerating
and improving decision making; optimizing internal business processes; increasing operational efficiency;
driving new revenues; and gaining competitive advantages over business rivals.” Determine its justification.
Or
Business Intelligence is a technology-driven process for analysing data and presenting actionable
information to help corporate executives, business managers and other end users make more informed
business decisions. List out the benefits of using Business Intelligence in an organization.
Answer
Business Intelligence (BI) is a technology-driven process for analysing data and presenting actionable
information to help corporate executives, business managers and other end users make more informed
business decisions.
BI data can include historical information, as well as new data gathered from source systems as it is
generated, enabling BI analysis to support both strategic and tactical decision-making processes.
ii) BI systems can also help companies identify market trends and spot business problems that need to be
addressed.
iii) BI systems help in enhancing customer experience, allowing for the timely and appropriate response to
customer problems and priorities.
Concept Problem 7
32 | P a g e
Financial Accounting System May 22
Or
Mr. Rajesh, a manager of a medium-sized company’s customer service department, uses MIS reporting
tool to obtain the reports that help him evaluating company’s businesses’ daily activities or problems
that arise, making decisions and tracking progress. Elaborate the criterions that the information
generated through MIS tool meet so that it is useful to Mr. Rajes h in discharging his role.
Answer
To make information most useful, Reports should meet the following criteria:
i) Relevant: MIS reports need to be specific to the business area they address. This is important because
a report that includes unnecessary information might be ignored.
ii) Timely: Managers need to know what’s happening now or in the recent past to make decisions about
the future. Be careful not to include information that is old. An example of timely information for your
report might be customer phone calls and emails going back 12 months from the current date.
iii) Accurate: It’s critical that numbers add up and that dates and times are correct. Managers & others who
rely on MIS reports can’t make sound decisions with information that is wrong. Financial information is
often required to be accurate to the dollar. In other cases, it may be OK to round-off numbers.
iv) Structured: Information in an MIS report can be complicated. Making that information easy to follow
helps management understand what the report is saying.
Concept Problem 8
Explain the term “Data Analytics” and recognize its application areas in today’s world.
Answer
Data Analytics: It is the process of examining data sets to draw conclusions about the information they
contain, increasingly with the aid of specialized systems and software. Data Analytics predominantly
refers to an assortment of applications, from basic Business Intelligence (BI), Reporting and Online
Analytical Processing (OLAP) to various forms of advanced analytics.
Data Analytics technologies and techniques are widely used in commercial industries to enable
organizations to make more-informed business decisions and by scientists and researchers to verify or
disprove scientific models, theories and hypotheses.
a) Banks and credit card companies analyse withdrawal and spending patterns to prevent fraud &
identity theft.
P a g e | 33
May 22 Financial Accounting System
Financial Accounting System
c) Mobile network operators examine customer data to forecast so they can take steps to prevent
defections to business rivals
d) Healthcare organizations mine patient data to evaluate effectiveness of treatments for cancer & other
diseases.
Concept Problem 9
Explain the different ways in which the Regulators can use XBRL for various purposes.
Answer
Regulators can use eXtensible Business Reporting Language for following purposes:
i) Financial regulators that need significant amounts of complex performance and risk information
about the institutions that they regulate.
ii) Securities regulators and stock exchanges that need to analyse the performance and compliance of
listed companies and securities, and need to ensure that this information is available to markets to
consume and analyse.
iii) Business registrars that need to receive and make publicly available a range of corporate data about
private and public companies, including annual financial statements.
iv) Tax authorities that need financial statements and other compliance information from companies to
process and review their corporate tax affairs.
v) Statistical and monetary policy authorities that need financial performance information from many
different organizations.
Concept Problem 10
Discuss the key features of Controlling Module in an Enterprise Resource Planning (ERP).
Or
ABC Ltd., a renowned stationary manufacturer with five production units across the country, has adopted
Enterprise Resource Planning (ERP) to integrate its business processes. Identify the ERP module that
monitors and optimizes all the business process of ABC Ltd. Also, explain various key features of this module.
Or
Controlling Module is one of the business process modules of the Enterprise Resources Planning (ERP) System.
It facilitates coordinating, monitoring and optimizing all the process in an organization. In the light of these
statements, describe any six key features of Controlling Module of ERP system.
Answer
Controlling module facilitates coordinating, monitoring, and optimizing all the processes in an
organization. It controls the business flow in an organization.
i) Cost Element Accounting: This component provides overview of the costs and revenues that occur in an
organization. The cost elements are the basis for cost accounting and enable the user the ability to
34 | P a g e
Financial Accounting System May 22
ii) Cost Centre Accounting: This provides information on the costs incurred by the business. Cost Centres
can be created for such functional areas as Marketing, Purchasing, Human Resources, Finance,
Facilities, Information Systems, Administrative Support, Legal, Shipping/Receiving, or even Quality.
Some of the benefits of Cost Centre Accounting are that the managers can set budget/cost Centre
targets; Planning; Availability of Cost allocation methods; and Assessments/Distribution of costs to
other cost objects.
iii) Activity-Based-Accounting: This analyses cross-departmental business processes and allows for a
process-oriented and cross- functional view of the cost centres.
iv) Internal Orders: Internal Orders provide a means of tracking costs of a specific job, service, or task.
These are used as a method to collect those costs and business transactions related to the task.
This level of monitoring can be very detailed but allows management the ability to review Internal
Order activity for better- decision making purposes.
v) Product Cost Controlling: This calculates the costs that occur during the manufacture of a product or
provision of a service and allows the management the ability to analyse their product costs and to
make decisions on the optimal price(s) to market their products.
vi) Profitability Analysis: This allows the management to review information with respect to the
company’s profit or contribution margin by individual market segment.
vii) Profit Centre Accounting: This evaluates the profit or loss of individual, independent areas within an
organization.
Concept Problem 11
Nowadays, many organizations are switching over to ‘Cloud Applications' as the organizations do not want to
indulge themselves in maintenance of their own IT infrastructure to run their businesses. You, being an IT
consultant, list out some of the advantages and disadvantages of using these Cloud applications.
Or
Cloud Applications are one of the two ways of using a software including financial and Accounting Software
and now-a-days, the use of cloud applications is increasing rapidly. You, being an IT consultant, have to list
out some of the advantages and disadvantages of using cloud applications.
Answer
Advantages of using Cloud applications are as follows:
i) Installation and Maintenance: As software is installed on only one computer, i.e., a web server, it need
not be installed on each computer. Hence, installation on user computer is not required and
maintenance and updating of software becomes extremely easy.
ii) Accessibility: As software is not installed on the hard disc of user’s computer and it is used through
browser and internet, it can be used from any computer in the world. Access to the software becomes
very easy.
iii) Mobile Application: Using mobile application becomes very easy as data is available 24 x 7.
P a g e | 35
May 22 Financial Accounting System
Financial Accounting System
ii) Data Security: Data security is a big challenge in case of Cloud application as the data is not in
control of the user or owner of data. It is maintained on a Cloud server.
iii) Performance: As data is picked from Cloud server using internet, speed of operation may be slower in
Cloud applications.
iv) Flexibility: Cloud applications do not even compare to the flexibility of desktop applications. If a user
wants to write a web application that basically interacts with the user’s hardware, installed/desktop
applications are preferable.
Concept Problem 12
Central database is the main feature of an Enterprise Resource Planning (ERP) System. As the complete data
is stored at one place, ensuring safety of data and minimizing risk of loss of data is a big challenge. As an IT
expert, discuss various risks involved during ERP implementation.
Or
ERP system integrates all business components and updates the data between related business functions.
However, its implementation is a huge task that may require lot of time, money and energy and its success
majorly depend upon issues related to factors like people, process, and technology. Briefly explain other
implementation risks, if any, apart from the issues related to the factors mentioned above.
Answer
Various risks involved during ERP implementation:
i) Lengthy implementation time: ERP projects are lengthy that takes anywhere between 1 to 4 years
depending upon the size of the organization. Due to technological developments happening every day,
the business and technological environment during the start and completion of the project will never
be the same. Employee turnover is another problem.
ii) Insufficient Funding: The budget for ERP implementation is generally allocated without consulting
experts and then implementation is stopped along the way, due to lack of funds.
iii) Data Safety: As there is only one set of data, if this is lost, whole business may come to stand still.
iv) Speed of Operation: As data is maintained centrally, gradually the data size becomes more and more
and it may reduce the speed of operation.
v) System Failure: As everybody is connected to a single system and central database, in case of failure
of system, the whole business may come to stand still may get affected badly.
vi) Data Access: Data is stored centrally and all the departments access the central data. This creates a
possibility of access to non-relevant data.
Concept Problem 13
36 | P a g e
Financial Accounting System May 22
Answer
i) Regulatory Compliance describes the goal that organizations aspire to achieve in their efforts to ensure
that they are aware of and take steps to comply with relevant laws, policies, and regulations. This
approach is used to ensure that all necessary governance requirements can be met without the
unnecessary duplication of effort and activity from resources.
The compliance and regulatory requirements can be classified in two types as under.
a) General – Applicable to all irrespective of anything.
ii) Application software generally comprises of three layers which together form the application namely;
an Application Layer, an Operating System Layer and a Database Layer. This is called Three Tier
architecture.
a) Application Layer receives the inputs from the users and performs certain validations like, if the
user is authorized to request the transaction.
b) Operating System Layer then carries these instructions and processes them using the data stored
in the database and returns the results to the application layer.
c) Database Layer stores the data in a certain form.
iii) Role-Based Access Control (RBAC) is an approach to restricting system access to authorized users. It
is used by most entities & can implement mandatory access control or discretionary access control.
RBAC is a policy neutral access control mechanism defined around roles and privileges that lets
employees having access rights only to the information they need to do their jobs and prevent them
from accessing information that doesn't pertain to them. RBAC can be used to facilitate
administration of security in large organizations with hundreds of users and thousands of permissions.
Roles for staff are defined in organization and permission to access a specific system or perform
certain operation is defined as per the role assigned.
Concept Problem 14
Customer Relationship Management (CRM) is a system which aims at improving relationship with customers.
Briefly explain key benefits of CRM Module of ERP.
Or
ABC Ltd., a soft drink manufacturing company was established in 2010. The company has implemented some
modules of ERP and was managing good business in initial seven years of its establishment. After that, the
customer’s feedback indicated a decline in the sale and therefore, the targets could not be achieved. On
analyzing the customers’ feedback, the management decided to incorporate CRM Module of ERP System to
P a g e | 37
May 22 Financial Accounting System
Financial Accounting System
improvise its relationship with existing customers, find new prospective customers and win back former
customers. The company implemented CRM module and found acceleration in the growth of its sale for past
four years. Discuss various key benefits of CRM module that the company may have availed after
implementing CRM?
Answer
Key benefits of a Customer Relationship Management (CRM) module of ERP are as under:
i) Improved customer relations: One of the prime benefits of using a CRM is obtaining better customer
satisfaction. By using this strategy, all dealings involving servicing, marketing, and selling out products to
the customers can be carried out in an organized and systematic way. Better services can be provided to
customers through improved understanding of their issues and this in turn helps in increasing customer
loyalty and decreasing customer agitation. In this way, continuous feedback from the customers regarding
the products and services can be received. It is also possible that the customers may recommend the product
to their acquaintances, when efficient and satisfactory services are provided.
ii) Increase customer revenues: By using a CRM strategy for any business, the revenue of the company can be
increased. Using the data collected, marketing campaigns can be popularized in a more effective way. With
the help of CRM software, it can be ensured that the product promotions reach a different and brand-new set
of customers, and not the ones who had already purchased the product, and thus effectively increase the
customer revenue.
iii) Maximize up-selling and cross-selling: A CRM system allows up-selling which is the practice of giving
customers premium products that fall in the same category of their purchase. The strategy also facilitates
cross selling which is the practice of offering complementary products to customers, based on their previous
purchases. This is done by interacting with the customers and getting an idea about their wants, needs, and
patterns of purchase. The details thus obtained will be stored in a central database, which is accessible to all
company executives. So, when an opportunity is spotted, the executives can promote their products to the
customers, thus maximizing up-selling and cross selling.
iv) Better internal communication: Following a CRM strategy helps in building up better communication within
the company. The sharing of customer data between different departments will enable them to work as a
team. This is better than functioning as an isolated entity, as it will help in increasing the company’s
profitability and enabling better service to customers.
v) Optimize marketing: CRM enables to understand the customer needs and behaviour in a better way, thereby
allowing any enterprise to identify the correct time to market its product to the customers. CRM will also
give an idea about the most profitable customer groups, and by using this information, similar
prospective groups, at the right time will be targeted. In this way, marketing resources can be optimized
efficiently and time is not wasted on less profitable customer groups.
Concept Problem 15
A business organization is shifting from traditional accounting system to computerized accounting system.
The organization needs to store the data that is relatively permanent and not expected to change frequently
in accounting system. As a financial expert, suggest the types of data used in computerized accounting
38 | P a g e
Financial Accounting System May 22
Or
Discuss the different ways in which Database Administrator (DBA) can store the data of ABC enterprise
implementing Accounting Information System (AIS).
Or
A business organization is shifting from traditional accounting system to computerized accounting system.
The organization needs to store the data that is relatively permanent and not expected to change frequently
in accounting system. As a financial expert, suggest any two types of such data in accounting system.
Or
As a Database Administrator, you are invited in a Conference to speak on Data Types in front of audience of
aspiring CA students. You decide to segment your lecture in two - Master Data & Non-Master Data and
identify different types of Master Data in Financial and Accounting systems. Determine the key points of
the content of your lecture.
Answer
1) Master data is relatively permanent data that is not expected to change again and again. It may
change, but not again and again. In accounting systems, there may be following type of master data.
i) Accounting Master Data: This includes names of ledgers, groups, cost centers, accounting voucher
types, etc. E.g. Capital Ledger is created once and not expected to change frequently. Similarly, all
other ledgers like sales, purchase, expenses and income ledgers are created once and not expected
to change again and again. Opening balance carried forward from previous year to next year is also
a part of master data and not expected to change.
ii) Inventory Master Data: This includes stock items, stock groups, godowns, inventory voucher types,
etc. Stock item is something which bought and sold for business purpose, trading goods. E.g., If a
person is into the business of dealing in white goods, stock items shall be Television, Fridge, Air
Conditioner, etc. For a person running a medicine shop, all types of medicines shall be stock items
for him/her.
iii) Payroll Master Data: Payroll is a system for calculation of salary and recoding of transactions
relating to employees. Master data in case of payroll can be names of employees, group of
employees, salary structure, pay heads, etc. These data are not expected to change frequently. E.g.,
Employee created in the system will remain as it is for a longer period of time, his/her salary
structure may change but not frequently, pay heads associated with his/ her salary structure will be
relatively permanent.
iv) Statutory Master Data: This is a master data relating to statute/law which may be different for
different type of taxes. E.g., Goods and Service Tax (GST), Nature of Payments for Tax Deducted at
Source (TDS), etc. This data also shall be relatively permanent. We don’t have any control on this
data as statutory changes are made by Government and not by us. In case of change in tax rates,
forms, categories; we need to update/change our master data.
2) Non-Master Data:
It is a data which is expected to change frequently, again and again and not a permanent data. E.g.,
Amounts recorded in each transaction shall be different every time and expected to change again and
P a g e | 39
May 22 Financial Accounting System
Financial Accounting System
again. Date recorded in each transaction is expected to change again and again and will not be constant
in all the transactions.
Concept Problem 16
ii) Inventory/Stores Management: The inventory management system is designed with a view to keeping
the track of materials in the stores. The system is used to regulate the maximum and minimum level
of stocks, raise alarm at danger level stock of any material, give timely alert for re - ordering of
materials with optimal re-order quantity and facilitate various queries about inventory like total
inventory value at any time, identification of important items in terms of stock value (ABC Analysis),
identification most frequently moving objects (XYZ Analysis) etc.
Similarly, well designed inventory management system for finished goods and semi-finished goods
provides important information for production schedule and marketing/sales strategy.
iii) Functional Audit: This includes testing of different functions / features in the system and testing of
the overall process or part of process in the system and its comparison with the actual process.
Example - Purchase Process, Sales Process, Salary Calculation Process, Recruitment Process etc. Auditor
may check this process in the system and compare it with actual process. It is quite possible that all
the aspect present in the actual process may not be integrated in the ERP system. There may be some
manual intervention.
Concept Problem 17
Answer
Front End of a Software:
It is part of the overall software which interacts with the user who is using the software. For example - If a
user wants to have some information from the Balance Sheet; user will interact with Front End part of the
software and request front end to generate the report.
40 | P a g e
Financial Accounting System May 22
Concept Problem 18
Major feature of an ERP system is central database. Which are the options possible to different users while
assigning access to it?
Answer
While assigning access to different users in an ERP System, following options are possible.
i) Create – Allows to create data.
ii) Alter – Allows to alter data.
iii) View – Allows only to view data.
iv) Print – Allows to print data.
Concept Problem 19
Being an IT consultant to a government agency PQR, identify the most common open international
standard, that should be used by the agency for their standardized digital business reporting. Support the
recommendation by preparing a list of its important features also.
Answer
eXtensible Business Reporting Language (XBRL) is an open international standard for digital business
reporting that provides a language in which reporting terms can be authoritatively defined. Those terms can
be used to uniquely represent the contents of financial statements or other kinds of compliance,
performance and business reports. XBRL lets reporting information move between organizations rapidly,
accurately and digitally.
XBRL is a standard-based way to communicate and exchange business information between business
systems. These communications are defined by metadata set out in taxonomies, which capture the
definition of individual reporting concepts as well as the relationships between concepts and other semantic
meaning. Information being communicated or exchanged is provided within an XBRL instance.
ii) Testable Business Rules: XBRL allows the creation of business rules that constrain what can be
reported. Business rules can be logical or mathematical, or both and can be used, for example, these
business rules can be used to stop poor quality information being sent to a regulator or third party, by
P a g e | 41
May 22 Financial Accounting System
Financial Accounting System
being run by the preparer while the report is in draft; stop poor quality information being accepted by
a regulator or third party, by being run at the point that the information is being received.
iii) Multi-lingual Support: XBRL allows concept definitions to be prepared in as many languages as
necessary. Translations of definitions can also be added by third parties. This means that it’s possible
to display a range of reports in a different language to the one that they were prepared in, without any
additional work. The XBRL community makes extensive use of this capability as it can automatically
open up reports to different communities.
iv) Strong Software Support: XBRL is supported by a very wide range of software from vendors large and
small, allowing a very wide range of stakeholders to work with the standard.
Concept Problem 20
Define Business Reporting. Determine the factors that makes Business Reporting significant.
Answer
Business Reporting is the public reporting of operating and financial data by a business enterprise, or the
regular provision of information to decision-makers within an organization to support them in their work.
Reporting is a fundamental part of the larger movement towards improved business intelligence and
knowledge management. Often implementation involves Extract, Transform, and Load (ETL) procedures in
coordination with a data warehouse and then using one or more reporting tools. While reports can be
distributed in print form or via email, they are typically accessed via a corporate intranet.
ii) High-quality business reporting is at the heart of strong and sustainable organizations, financial
markets, and economies, as this information is crucial for stakeholders to assess organizational
performance and make informed decisions with respect to an organization’s capacity to create and
preserve value.
iii) As organizations fully depend on their stakeholders for sustainable success, it is in their interest to
provide them with high-quality reports. For example, effective high- quality reporting reduces the risk
for lenders and may lower the cost of capital.
iv) Many organizations are increasingly complex, and have larger economic, environmental, and social
footprints. As a result, various stakeholder groups are demanding increased Environmental, Social and
Governance (ESG) information, as well as greater insight into how these factors affect financial
performance and valuations.
v) High-quality reports also promote better internal decision-making. High-quality information is integral
to the successful management of the business, and is one of the major drivers of sustainable
organizational success.
Concept Problem 21
42 | P a g e
Financial Accounting System May 22
Or
ABC Ltd. is planning to implement some modules of Enterprise Resource Planning (ERP) system to manage
different aspects related to its various business processes. Determine in specific various Sales and
Distribution activities that enterprise may get support from ERP framework.
Answer
The various activities that are involved in a Sales and Distribution Process are as follows:
i) Pre-Sales Activities: This includes prospecting of customers, identifying prospective customers, gathering
data, contacting them and fixing appointments, showing demo, submission of quotations, etc.
ii) Sales Order: Sales order is recorded in our books after getting a confirmed purchased order from our
customer. Sales order shall contain details just like purchase order. E.g., Stock Item Details, Quantity,
Rate, Due Date of Delivery, Place of Delivery, etc.
iii) Inventory Sourcing: It includes making arrangements before delivery of goods, ensuring goods are ready
and available for delivery.
iv) Material Delivery: Material is delivered to the customer as per sales order. All inventory details are
copied from Sales Order to Material Delivery for saving user’s time and efforts. This transaction shall
have a linking with Sales Order. Stock balance shall be reduced on recording of this transaction.
v) Billing: This is a transaction of raising an invoice against the delivery of material to customer. This
transaction shall have a linking with Material Delivery and all the details shall be copied from it. Stock
balance shall not affect again.
vi) Receipt from Customer: This is a transaction of receiving amount from customer against sales invoice
and shall have a linking with sales invoice.
Concept Problem 22
ERP implementation is the difficult task as the organization which is in the process of implementing ERP
should keep abreast of latest technological development. Describe the different risks associated with
technology while implementing ERP.
Or
XYZ Ltd. is the manufacturer of herbal medicines which is under the process of implementing Enterprise
Resource Planning (ERP) in its head office and various manufacturing units located across the country.
Explain the technological risks related to the implementation of ERP.
Answer
Various risks associated with technology while implementing ERP are as following:
i) Software Functionality: ERP systems offer a myriad of features and functions, however, not all
organizations require those many features. Implementing all the functionality and features just for
the sake of it can be disastrous for an organization.
ii) Technological Obsolescence: With the advent of more efficient technologies every day, the ERP system
P a g e | 43
May 22 Financial Accounting System
Financial Accounting System
iii) Enhancement and Upgrades: ERP Systems are not upgraded and kept up-to-date. Patches and
upgrades are not installed and the tools are underutilised.
iv) Application Portfolio Management: These processes focus on the selection of new business applications
and the projects required delivering them.
Concept Problem 23
In a Financial and Accounting System, there is a document that is used as documentary evidence of any
transaction. List different types of documentary evidences used in inventory module of Accounting System.
Answer
The different types of documentary evidence used in Inventory Module are as follows:
ii) Sales Order- For recording of a sales order received from a customer.
iii) Stock Journal- For recording of physical movement of stock from one location to another.
vi) Receipt Note- For recording of physical receipt of goods purchased from a vendor.
Concept Problem 24
As an IS Auditor, determine a checklist for the audit of ERP system in an organization. Also, summarize the
auditing aspects of ERP systems.
Answer
Checklist to be followed by an IS Auditor for the audit of ERP Systems are as follows:
i) Does the system process according to GAAP (Generally Accepted Accounting Principles) and GAAS
(Generally Accepted Auditing Standards)?
ii) Does it meet the needs for reporting, whether regulatory or organizational?
iii) Were adequate user requirements developed through meaningful interaction?
iv) Does the system protect confidentiality and integrity of information assets?
v) Does it have controls to process only authentic, valid, accurate transactions?
vi) Are effective system operations and support functions provided?
vii) Are all system resources protected from unauthorized access and use?
viii) Are user privileges based on what is called ‘role-based access?’
ix) Is there an ERP system administrator with clearly defined responsibilities?
x) Is the functionality acceptable? Are user requirements met? Are users happy?
xi) Have workarounds or manual steps been required to meet business needs?
xii) Are there adequate audit trails and monitoring of user activities?
44 | P a g e
Financial Accounting System May 22
b) Input Validations - This stand for checking of rules for input of data into the system. E.g., a
transaction of cash sales on sales counter must not be recorded in a date other than today (not a
future date or a back date), amount field must not be zero, stock item field shall not be empty, etc.
Input validations shall change according to each data input form.
Concept Problem 25
Discuss the peculiarities that must be considered while allotting a voucher number to a voucher.
Answer
A Voucher Number or a Document Number is a unique identity of any voucher/ document. A voucher may be
identified or searched using its unique voucher number.
The peculiarities that must be considered while allotting a voucher number to a voucher are as follows:
i) Voucher number must be unique.
ii) Every voucher type shall have a separate numbering series
iii) A voucher number may have prefix or suffix or both, e.g., ICPL/2034/17-18. In this case, “ICPL” is the
prefix, “17-18” is the suffix and “2034” is the actual number of the voucher.
iv) All vouchers must be numbered serially, i.e., 1,2,3,4,5,6 and so on.
v) All vouchers are recorded in chronological order and hence voucher recorded earlier must have an earlier
number, i.e., if voucher number for a payment voucher having date as 15th April 2017 is 112, voucher
number for all the vouchers recorded after this date shall be more than 112 only.
Concept Problem 26
Describe the concept of eXtensible Business Reporting Language (XBRL) Tagging.
Answer
P a g e | 45
May 22 Financial Accounting System
Financial Accounting System
XBRL Tagging: It is the process by which any financial data is tagged with the most appropriate element in
an accounting taxonomy (a dictionary of accounting terms) that best represents the data in addition to tags
that facilitate identification/classification (such as enterprise, reporting period, reporting currency, unit of
measurement etc.). Since all XBRL reports use the same taxonomy, numbers associated with the same
element are comparable irrespective of how they are described by those releasing the financial statements.
Comprehensive definitions and accurate data tags allow preparation, validation, publication, exchange,
consumption; and analysis of business information of all kinds. Information in reports prepared using the
XBRL standard is interchangeable between different information systems in entirely different organizations.
This allows for the exchange of business information across a reporting chain. People that want to report
information, share information, publish per romance information and allow straight through information
processing all rely on XBRL.
In addition to allowing the exchange of summary business reports, like financial statements, and risk and
performance reports, XBRL has the capability to allow the tagging of transactions that can themselves be
aggregated into XBRL reports. These transactional capabilities allow system- independent exchange and
analysis of significant quantities of supporting data and can be the key to transforming reporting supply
chains.
Concept Problem 27
Quality Management Module helps in management of quality in productions across processes in an
organization. Analyze the process of Quality Management Module.
Answer
Quality Management Module helps in management of quality in productions cross processes in an
organization. This quality management module helps an organization to accelerate their business by
adopting a structured and functional way of managing quality in different processes. Quality Management
module collaborates in procurement and sales, production, planning, inspection, notification, control, audit
management and so on.
46 | P a g e
Financial Accounting System May 22
Concept Problem 28
What is an MIS Report and who uses it?
Answer
MIS Report: Business managers at all levels of an organization, from assistant managers to executives, rely
on reports generated from these systems to help them evaluate their business’ daily activities or problems
that arise, make decisions, and track progress. MIS system reporting is used by businesses of all sizes and
in every industry.
MIS systems automatically collect data from various areas within a business. These systems can produce
daily reports that can be sent to key members throughout the organization. Most MIS systems can also
generate on-demand reports that allow managers and other users of the system to generate an MIS report
whenever they need it.
Many large businesses have specialized MIS departments, whose only job is to gather business information
and create MIS reports. Some of these businesses use sophisticated computing technology and software to
P a g e | 47
May 22 Financial Accounting System
Financial Accounting System
gather information. Smaller businesses often use simple software programs and spreadsheets for their MIS
reporting needs. There can be as many types of MIS reports as there are divisions within a business.
For example, information about sales revenue and business expenses would be useful in MIS reports for
finance and accounting managers. Warehouse managers would benefit from MIS reports about product
inventory and shipping information. Total sales from the past year could go into an MIS report for
marketing and sales managers.
Concept Problem 29
As an accountant, you are advised to address an audience of students and speak on different types of
Vouchers used in Financial and Accounting Systems. Prepare your notes.
Answer
In accounting language, a Voucher is a documentary evidence of a transaction. There may be different
documentary evidences for different types of transactions. E.g., Receipt given to a customer after making
payment by him/her is documentary evidence of amount received. A sales invoice, a purchase invoice, is
also a documentary evidence of transaction.
In computer language, the word “Voucher” is a place where transactions are recorded. It is a data input form
for inputting transaction data. In accounting, there may be different types of transactions, hence we use
different voucher types for recording of different transactions. Generally following types of vouchers are used
in accounting systems as shown in the Table below:
48 | P a g e
Financial Accounting System May 22
Concept Problem 30
Cloud based applications are now taking over Installed applications. What are the major differences between
Cloud based Applications and Installed Applications? Explain any four.
Answer
Differences between Cloud based Applications and Installed Applications are given below:
P a g e | 49
May 22 Financial Accounting System
Financial Accounting System
Concept Problem 31
Many organizations are implementing Enterprise Resource Planning (ERP) software, where it integrates all of
the processes needed to run their business with a single system. As a system analyst, briefly explain the
benefits of ERP Systems.
Answer
Benefits of an Enterprise Resource Planning (ERP) System are as follows:
i) Information integration: The reason ERP systems are called integrated is because they possess the
ability to automatically update data between related business functions and components. For example
- one needs to only update the status of an order at one place in the order-processing system; and all
the other components will automatically get updated.
ii) Reduction of lead-time: The elapsed time between placing an order and receiving it is known as the
Lead-time. The ERP Systems by virtue of their integrated nature with many modules like Finance,
50 | P a g e
Financial Accounting System May 22
iii) On-time Shipment: Since the different functions involved in the timely delivery of the finished goods
to the customers- purchasing, material management production, production planning, plant
maintenance, sales and distribution – are integrated and the procedures automated; the chances of
errors are minimal and the production efficiency is high. Thus, by integrating the various business
functions and automating the procedures and tasks the ERP system ensures on-time delivery of goods
to the customers.
iv) Reduction in Cycle Time: Cycle time is the time between placement of the order and delivery of the
product. In an ERP System; all the data, updated to the minute, is available in the centralized
database and all the procedures are automated, almost all these activities are done without human
intervention. This efficiency of the ERP systems helps in reducing the cycle time.
vi) Improved Supplier Performance: ERP systems provide vendor management and procurement support
tools designed to coordinate all aspects of the procurement process. They support the organization in
its efforts to effectively negotiate, monitor and control procurement costs and schedules while assuring
superior product quality.
vii) Increased Flexibility: ERP Systems help the companies to remain flexible by making the company
information available across the departmental barriers and automating most of the processes and
procedures, thus enabling the company to react quickly to the changing market conditions.
viii) Reduced Quality Costs: Quality is defined in many different ways- excellence, conformance to
specifications, fitness for use, value for the price and so on. The ERP System’s central database
eliminates redundant specifications and ensures that a single change to standard procedures takes
effect immediately throughout the organization. The ERP systems also provide tools for implementing
total quality management programs within an organization.
ix) Better Analysis and Planning Capabilities: Another advantage provided by ERP Systems is the boost to
the planning functions. By enabling the comprehensive and unified management of related business
functions such as production, finance, inventory management etc. and their data, it becomes possible
to utilize fully many types of Decision Support Systems (DSS) and simulation functions, what-if
analysis and so on; thus, enabling the decision-makers to make better and informed decisions.
P a g e | 51
May 22 Financial Accounting System
Financial Accounting System
xi) Use of Latest Technology: ERP packages are adapted to utilize the latest developments in Information
Technology such as open systems, client/server technology, Cloud Computing, Mobile computing etc. It
is this adaptation of ERP packages to the latest changes in IT that makes the flexible adaptation to
changes in future development environments possible.
Concept Problem 32
ERP systems are expected to produce accurate, complete, and authorized information, and therefore require
major security aspects that involve physical safety, input validations and access control mechanism. In light
of this statement, explain the importance of Role Based Access Control in an ERP system.
Answer
Role Based Access Control (RBAC) is an approach to restricting system access to authorized users. RBAC
sometimes referred to as Role-Based Security is a policy neutral access control mechanism defined around
roles and privileges that lets employees having access rights only to the information they need to do their
jobs and prevent them from accessing information that doesn't pertain to them. It is used by most
enterprises and can implement Mandatory Access Control (MAC) or Discretionary Access Control (DAC).
▪ MAC criteria are defined by the system administrator strictly enforced by the Operating System and are
unable to be altered by end users. Only users or devices with the required information security clearance
can access protected resources. Organizations with varying levels of data classification, like government
and military institutions, typically use MAC to classify all end users.
▪ DAC involves physical or digital measures and is less restrictive than other access control systems as it
offers individuals complete control over the resources they own. The owner of a protected system or
resource sets policies defining who can access it.
The components of RBAC such as role-permissions, user-role and role-role relationships make it simple to
perform user assignments. RBAC can be used to facilitate administration of security in large organizations
with hundreds of users and thousands of permissions. Roles for staff are defined in organization and
permission to access a specific system or perform certain operation is defined as per the role assigned. For
example - a junior accountant in accounting department is assigned a role of recording basic accounting
transactions, an executive in human resource department is assigned a role of gathering data for salary
calculations on monthly basis, etc.
Concept Problem 33
Data Analytics refers to assortment of applications, reporting and online analytical processing to various
forms of advance analytics. Explain different advanced data analytics techniques.
Answer
a) Data Mining involves sorting through large data sets to identify trends, patterns and relationships;
b) Predictive Analytics seeks to predict customer behaviour, equipment failures and other future events;
and
c) Machine Learning is an artificial intelligence technique that uses automated algorithms to churn through
52 | P a g e
Financial Accounting System May 22
3. C A S E S T U D Y B A S E D MCQ I – S TU D Y M A T E R IA L
XYZ a leading publication house of Delhi was facing many issues like delay in completing the order of its
customers, manual processing of data, increased lead time, inefficient business processes etc. Hence, the top
management of XYZ decided to get SAP - an ERP system implemented in the publication house.
Using the proper method of vendor selection, Digisolution Pvt. Ltd. was selected to implement SAP software in
XYZ publication house. To implement the software, the IT team of Digisolution Pvt. Ltd. visited XYZ’s office
number of times and met its various officials to gather and understand their requirements. With due
diligence, the SAP software was customized and well implemented in the publishing house.
After the SAP implementation, the overall system became integrated and well connected with other
departments. This raised a concern in the mind of few employees of XYZ worrying about their jobs’ security
leading to quitting of jobs. The top management of XYZ showed its concern on this issue and wanted to
retain few of its employees.
Answer the following questions:
1. Imagine that you are core team member of Digisolution Pvt. Ltd. While customizing the Sales and
Distribution Module of SAP software, you need to know the correct sequence of all the activities involved
in the module.
Identify the correct option that reflects the correct sequence of the activities.
(i) Material Delivery
(ii) Billing
(iii) Pre-Sales Activities
(iv) Sales Order
(v) Payments
(vi) Inventory Sourcing
Choose the correct sequence from the following
(a) (i) - (iii) – (ii) – (iv) – (v)- (vi)
(b) (ii) – (iv)- (vi) – (iii) – (i) – (v)
(c) (iii)- (iv) – (vi)- (i) –(ii) – (v)
(d) (iv)- (i) – (iii), (v), (ii), (vi)
2. In purview of above situation, which of the following control can be helpful to management of XYZ
publishing house to retain its employees and stopping them to leave the company?
(a) Training can be imparted to employees by skilled consultant.
(b) Allocation of employees to task matching their skill set, fixing of compensation package.
(c) Management should stop the implementation of ERP.
(d) Backup arrangement is required.
3. The SAP software was successfully implemented by XYZ publication house after overcoming many
challenges. The risk associated with “Patches and upgrades not installed and the tools being
underutilized” belongs to __________ risk.
(a) Technological
(b) Implementation
(c) People
P a g e | 53
May 22 Financial Accounting System
Financial Accounting System
(d) Process
C A S E B A S E D MCQ S 2 – IC AI S T U D Y M A T ER I A L
Unique Services, a well-established firm of Chartered Accountants with nine branches at different locations
in Delhi, deals in accounting, auditing and taxation assignments like – return filing, corporate taxation and
planning, company formation and registration of foreign companies etc. The firm has its own ERP software.
The firm decided to come up with Real Estate Regulatory Authority (RERA) registration which requires
upgradation in its software. Hence, the principal partner of the firm asked its associate partner to prepare a
list of various clients dealing in construction and development of flats, commercial properties etc.
The firm’s management took care to select the vendor to upgrade their ERP software which will act as an
online assistant to its clients providing them the complete details about registration and filling of various
forms and resolving their frequently asked questions. The firm also wanted a safe and secure working
environment for their employees to filing various forms under RERA Act on behalf of clients using digital
signature. The management also instructed its employees to mandatorily use Digital Signature of clients for
fair practices and any dishonesty found in this regard may lead to penal provisions under various act
including IT Act, 2000.
Answer the following questions:
1. In purview of case scenario, Unique Services requires to make changes in its software for its users for
RERA related matters. Identify the part of the overall software which actually interacts with the users
using the software?
(a) Back end
(b) Front end
(c) Middle layer
(d) Reports
2. The firm decided to have an online assistant for its clients to provide complete details regarding
taxation, registration and filling of various forms and solve their queries. This is an example of
___________ application.
(a) Installed application
(b) Web Application
(c) Cloud Based Application
(d) Direct Application
3. While filling the tax for its client ABC, the firm Unique Services enters the detail of its TDS and GST in
the requisite forms. Identify from the following which type of master data it belongs to?
(a) Accounting Master Data
(b) Inventory Master Data
(c) Statutory Master Data
(d) Payroll master Data
Answer Key
MCQ 1 1. C 2. B 3. A
MCQ 2 1. B 2. C 3. C
54 | P a g e
Information Systems and Its Components May 22
C HAPTER 3
1. ICAI S T U D Y M A TE R IA L Q U E S TIO NS
Concept Problem 1
Information System Model is responsible to convert the data into information which is useful and meaningful
to the user. Explain all steps involved in Information System Model.
Answer
An Information System model comprises of following steps:
i) Input: Data is collected from an organization or from external environments and converted into
suitable format required for processing.
ii) Process: A process is a series of steps undertaken to achieve desired outcome or goal. Information
Systems are becoming more and more integrated with organizational processes, bringing more
productivity and better control to those processes.
iii) Output: Then information is stored for future use or communicated to user after application of
respective procedure on it.
iv) Storage: Storage of data shall be done at the most detailed level possible. Regular backups should be
stored in a geographically different locations to avoid impact on both the original data and the
backup data storage due to any major disasters such as flooding or fires etc.
P a g e | 55
May 22 Information Systems and Its Components
v) Feedback: Apart from these activities, information systems also need feedback that is returned to
appropriate members of the enterprises to help them to evaluate at the input stage.
Concept Problem 2
Information Systems are interrelated components working together to collect, process, and store and
disseminate information to support decision-making, coordination, control, analysis and visualization in an
organization.
An Information System comprise of People, Hardware, Software, Data and Network for communication
support
i) People mean all those who operate, manage, maintain and use the system i.e., system administrator, IS
personnel, programmers and end users i.e., the persons, who can use hardware and software for
retrieving the desired information.
ii) Computer systems comprising of hardware and software. Hardware means the physical components of
the computers i.e., server or smart terminals with different configurations like corei3/corei5/corei7/corei9
processors etc. and software means the system software (operating systems), application software
(different type of computer programs designed to perform specific task) and utility software (e.g.,
tools).
iii) Data Resources – Data is the raw fact which is input to the system. It may be alphanumeric, text,
image, video, audio, and other forms.
iv) Network and communication system – Network means communication media (Internet, Intranet,
Extranet etc.).
Concept Problem 3
Discuss the term ’Operating System’ and various operations performed by it.
56 | P a g e
Information Systems and Its Components May 22
Answer
An Operating System (OS) is a set of computer programs that manages computer hardware resources and
acts as an interface with computer applications programs. The operating system is a vital component of
the system software in a computer system.
i) Performing hardware functions: Operating System acts as an intermediary between the application
program and the hardware by obtaining input from keyboards, retrieve data from disk and display
output on monitors
ii) User Interfaces: Nowadays, Operating Systems are Graphic User Interface (GUI) based which uses icons
and menus like in the case of Windows.
iii) Hardware Independence: Operating System provides Application Program Interfaces (API), which can be
used by application developers to create application software, thus obviating the need to understand the
inner workings of OS and hardware. Thus, OS gives us hardware independence.
iv) Memory Management: Operating System allows controlling how memory is accessed and maximize
available memory and storage.
v) Task Management: This facilitates a user to work with more than one application at a time i.e.,
multitasking and allows more than one user to use the system i.e., time sharing.
vi) Networking Capability: Operating systems can provide systems with features and capabilities to help
connect computer networks like Linux & Windows 8.
vii) Logical Access Security: Operating systems provide logical security by establishing a procedure for
identification and authentication using a User ID and Password.
viii) File management: The operating system keeps a track of where each file is stored and who can access
it, based on which it provides the file retrieval.
Concept Problem 4
Database Management Systems (DBMS) is a software that aids in organizing, controlling and using the data
needed by the application program However, there are many advantages and disadvantages associated with
it. Discuss them.
Or
ABC Pvt. Ltd. is a brand manufacturer of automobile parts with huge clientele all over the country. The
company maintains the data of its clients in Oracle-the Database management software. Explain the
advantages that the company would be benefitted with by using Database Management System (DBMS).
Answer
Major advantages of Database Management System (DBMS) are as follows:
i) Permitting Data Sharing: One of the principal advantages of a DBMS is that the same information can
be made available to different users.
ii) Minimizing Data Redundancy: In a DBMS, duplication of information or redundancy is, if not
P a g e | 57
May 22 Information Systems and Its Components
eliminated, carefully controlled or reduced i.e., there is no need to repeat the same data repeatedly.
Minimizing redundancy reduces significantly the cost of storing information on storage devices.
iii) Integrity can be maintained: Data integrity is maintained by having accurate, consistent, and up-to-
date data. Updates and changes to the data only must be made in one place in DBMS ensuring
Integrity.
iv) Program and File consistency: Using a DBMS, file formats and programs are standardized. The level of
consistency across files and programs makes it easier to manage data when multiple programmers
are involved as the same rules and guidelines apply across all types of data.
v) User-friendly: DBMS makes the data access and manipulation easier for the user. DBMS also reduces
the reliance of users on computer experts to meet their data needs.
vi) Improved security: DBMS allows multiple users to access the same data resources in a controlled
manner by defining the security constraints. Some sources of information should be protected or
secured and only viewed by select individuals. Using passwords, DBMS can be used to restrict data
access to only those who should see it.
vii) Achieving program/data independence: In a DBMS, data does not reside in applications, but data base
program & data are independent of each other.
viii) Faster Application Development: In the case of deployment of DBMS, application development
becomes fast. The data is already therein databases, application developer has to think of only the
logic required to retrieve the data in the way a user need.
Disadvantages of a DBMS
i) Cost: Implementing a DBMS system in terms of both system and user-training can be expensive and
time-consuming, especially in large enterprises. Training requirements alone can be quite costly.
ii) Security: Even with safeguards in place, it may be possible for some unauthorized users to access the
database. If one gets access to database, then it could be an all or nothing proposition.
Concept Problem 5
Discuss Boundary Controls under Application Control framework in detail.
Answer
Boundary control is one of the Application access control mechanisms that links the authentic users to the
authorized resources, they are permitted to access.
The boundary subsystem establishes the interface between the would-be user of a computer system and
the computer itself.
i) Cryptographic Controls: It deals with programs for transforming data into cipher text that are
meaningless to anyone, who does not possess the authentication to access the respective system
resource or file.
A cryptographic technique encrypts data (clear text) into cryptograms (cipher text) and its strength
58 | P a g e
Information Systems and Its Components May 22
depends on the time and cost to decipher the cipher text by a cryptanalyst.
ii) Access Controls: These controls restrict the use of computer system resources to authorized users and
limit the actions authorized users can take with these resources.
a) User Identification - done by user itself by providing his/ her unique user id allotted to him/her or
account number.
b) Authentication mechanism is used for proving the identity with the help of a password or
biometric identification including thumb impression, eye retina etc.
c) Authorization - refers to the set of actions allowed to a user once authentication is done
successfully. For example – Read, Write, Print, etc. permissions allowed to an individual user.
iii) Personal Identification Numbers (PIN): It is a form of remembered information used to authenticate
users like verification of customers in electronic fund transfer systems.
PIN is like a password assigned to a user by an institution, a random number stored in its database
independent to a user identification details.
iv) Digital Signatures: Digital Signature (a string of 0’s and 1’s) is used as an analog signature for e-
documents. Digital Signatures are not constant like analog signatures – they vary across messages
and cannot be forged.
v) Plastic Cards: While PIN and Digital Signatures are used for authentication purposes, plastic cards are
used primarily for identification purpose.
This includes the phases namely - application for a card, preparation of the card, issue of the card,
use of the card and card return or card termination.
Concept Problem 6
Discuss Corrective Controls with the help of examples. Also, discuss their broad characteristics in brief.
Or
Identify the control that is used to correct errors, omissions or incidents once they have been detected.
Enlist its major characteristics as well.
Answer
Corrective Controls are used to correct errors, omissions or incidents once they have been detected. These
corrective processes also should be subject to preventive and detective controls, because they represent
another opportunity for errors, omissions, or falsification.
Corrective controls are designed to reduce the impact or correct an error once it has been detected.
Examples of Corrective Controls vary from simple correction of data-entry errors, to identifying & removing
unauthorized users or software from systems or networks, to recovery from incidents, disruptions, or
disasters. “Complete changes to IT access lists if individual’s role changes” is also example of corrective
control.
P a g e | 59
May 22 Information Systems and Its Components
Concept Problem 7
Describe the term Preventive Controls and provide suitable examples. Also, discuss their broad characteristics.
Answer
Preventive controls prevent errors, omissions, or security incidents from occurring. It can be implemented in
both manual and computerized environment for the same purpose. Only, the implementation methodology
may differ from one environment to the other.
Concept Problem 8
60 | P a g e
Information Systems and Its Components May 22
Answer
(i) Snapshots:
Tracing a transaction is a computerized system can be performed with the help of snapshots or
extended records. The snapshot software is built into the system at those points where material
processing occurs which takes images of the flow of any transaction as it moves through the
application. These images can be utilized to assess the authenticity, accuracy, and completeness of
the processing carried out on the transaction. The main areas to consider involving such a system are
to locate the snapshot points based on materiality of transactions when the snapshot will be captured
and the reporting system design and implementation to present data in a meaningful way.
Concept Problem 9
Recognize various factors influencing an organization towards control and audit of computers.
Answer
Need for Audit of Information Systems
Factors influencing an organization toward controls and audit of computers and the impact of the
information systems audit function on organizations are as follows:
i) Organizational Costs of Data Loss: Data is a critical resource of an organization for its present and
future process and its ability to adapt and survive in a changing environment.
ii) Cost of Incorrect Decision Making: Management and operational controls taken by managers involve
detection, investigations and correction of the processes. These high-level decisions require accurate
data to make quality decision rules.
iii) Costs of Computer Abuse: Unauthorized access to computer systems, malwares, unauthorized physical
access to computer facilities and unauthorized copies of sensitive data can lead to destruction of
assets (hardware, software, information etc.)
iv) Value of Computer Hardware, Software and Personnel: These are critical resources of an organization,
which has a credible impact on its infrastructure and business competitiveness.
v) High Costs of Computer Error: In a computerized enterprise environment where many critical business
processes are performed, a data error during entry or process would cause great damage.
vi) Maintenance of Privacy: Today, data collected in a business process contains private information
about an individual too. These data were also collected before computers but now, there is a fear that
privacy has eroded beyond acceptable levels.
P a g e | 61
May 22 Information Systems and Its Components
vii) Controlled evolution of computer Use: Use of Technology and reliability of complex computer systems
cannot be guaranteed and the consequences of using unreliable systems can be destructive.
Concept Problem 10
Data warehouse and Data Mining are the order of the day for better management of information and quicker
and effective decision-making in organizations. Critically evaluate the statement.
Answer
This statement is correct. Data warehouse is a repository of an organization’s electronically stored data and
designed to facilitate reporting and analysis.
i) The process of developing a data warehouse forces an organization to better understand the data that it
is currently collecting and, equally important, what data is not being collected.
ii) A data warehouse provides a centralized view of all data being collected across the enterprise and
provides a means for determining data that is inconsistent.
iii) Once all data is identified as consistent, an organization can generate one version of the truth. This is
important when the company wants to report consistent statistics about itself, such as revenue or
number of employees.
iv) By having a data warehouse, snapshots of data can be taken over time. This creates a historical record
of data, which allows for an analysis of trends.
v) A data warehouse provides tools to combine data, which can provide new information and analysis.
Data Mining is the process of analysing data to find previously unknown trends, patterns, and associations to
make decisions. Data mining is accomplished through automated means against extremely large data sets,
such as a data warehouse.
Together, Data warehouse and data mining facilitates better management of information and quicker and
effective decision-making in organizations
Concept Problem 11
Explain the concept of Segregation of Duties (SOD) controls and its examples.
Or
Segregation of Duties (SoD) in an organization allows the individuals to access authorized activities
controlled through various controls. Identify few examples of the controls of Segregation of Duties (SoD).
Answer
SoD advocates that Privilege/ Access Rights should be given on “Need to Do” & “Need to know” basis.
It ensures that single individual do not passes excess privilege that could result in unauthorized activity like
fraud or manipulation of data security.
For example: the person approving the purchase orders should not be allowed to make payment and pass
entries in the books at the same time.
62 | P a g e
Information Systems and Its Components May 22
The examples of Segregation of Duties (SoD) Controls are as below:
i) Transaction Authorization: Information systems can be programmed or configured to require two (or
more) persons to approve certain transactions. This is seen in retail establishments where a manager
is required to approve a large transaction or a refund. In IT applications, transactions meeting certain
criteria may require a manager’s approval to be able to proceed.
ii) Split custody of high-value assets: Assets of high importance or value can be protected using various
means of split custody. For example, a password to an encryption key that protects a high-valued
asset can be split in two halves, one half assigned to two persons, and the other half assigned to two
persons, so that no single individual knows the entire password. Banks do this for central vaults, where
a vault combination is split into two or more pieces so that two or more are required to open it.
iii) Workflow: Applications that are workflow-enabled can use a second (or third) level of approval before
certain high-value or high-sensitivity activities can take place. For example, a workflow application
that is used to provision user accounts can include extra management approval steps in requests for
administrative privileges.
iv) Periodic reviews: IT or internal audit personnel can periodically review user access rights to identify
whether any segregation of duties issues exist. The access privileges for each worker can be compared
against a segregation of duties control matrix. When SoD issues are encountered during segregation of
duties review, management will need to decide how to mitigate the matter.
Concept Problem 12
An internet connection exposes an organization to the harmful elements of the outside world. As a network
administrator, which Network Access controls will you implement in the organization to protect from such
harmful elements?
Or
An Internet connection exposes an organization to the harmful elements of the outside world. As an EDP
(Electronic Data Processing) operator of an organization ABC, prepare a checklist for Network Access
Controls that are required to be implemented in the organization.
Answer
Network Access Control: An Internet connection exposes an organization to the harmful elements of the
outside world. The checklist for Network Access Controls that are required to be implemented in the
organization are as follows:
i) Policy on use of network services: An enterprise-wide policy applicable to internet service requirements
aligned with the business need for using the Internet services is the first step. Selection of appropriate
services and approval to access them should be part of this policy.
ii) Enforced path: Based on risk assessment, it is necessary to specify the exact path or route connecting
the networks; e.g., internet access by employees will be routed through a firewall and proxy.
iii) Segregation of networks: Based on the sensitive information handling function; say a VPN connection
between a branch office & the head-office, this network is to be isolated from the internet usage service.
iv) Network connection and routing control: The traffic between networks should be restricted, based on
identification of source and authentication access policies implemented across the enterprise network
P a g e | 63
May 22 Information Systems and Its Components
facility.
v) Security of network services: The techniques of authentication and authorization policy should be
implemented across the organization’s network.
vi) Firewall: A Firewall is a system that enforces access control between two networks. To accomplish this, all
traffic between the external network and the organization’s Intranet must pass through the firewall that
will allow only authorized traffic between the organization and the outside to pass through it. The
firewall must be immune to penetrate from both outside and inside the organization. In addition to
insulating the organization’s network from external networks, firewalls can be used to insulate portions of
the organization’s Intranet from internal access also.
vii) Encryption: Encryption is the conversion of data into a secret code for storage in databases and
transmission over networks. The sender uses an encryption algorithm with a key to convert the original
message called the Clear text into Cipher text. This is decrypted at the receiving end. Two general
approaches are used for encryption viz. private key and public key encryption.
viii) Call Back Devices: It is based on the principle that the key to network security is to keep the intruder off
the Intranet rather than imposing security measure after the criminal has connected to the intranet. The
call- back device requires the user to enter a password and then the system breaks the connection. If
the caller is authorized, the call back device dials the caller’s number to establish a new connection. This
limit access only from authorized terminals or telephone numbers and prevents an intruder masquerading
as a legitimate user. This also helps to avoid the call forwarding and man-in-the middle attack
Concept Problem 13
A company XYZ is developing a software using the program development life cycle methodology and applying
control, phases in parallel to the development phases to monitor the progress against plan. Being an IT
developer, design the various phases and their controls for program development life cycle.
Or
Mr. X is appointed as an auditor of a software development and service provider company. Explain the various
concerns that auditor should address under different activities of Programming Management Controls.
Answer
The primary objective of Program Development Life Cycle phase within the Systems Development Life Cycle is
to produce or acquire and to implement high-quality programs. This includes the following phases:
i) Planning: Techniques like Work Breakdown Structures (WBS), Gantt Charts and PERT (Program
Evaluation and Review Technique) Charts can be used to monitor progress against plan.
a) Task progress in various software life-cycle phases should be monitored against plan and corrective
action should be taken in case of any deviations.
b) Control over software development, acquisition, and implementation tasks should be exercised to
ensure that the software released for production use is authentic, accurate, and complete.
64 | P a g e
Information Systems and Its Components May 22
iii) Design: A systematic approach to program design, such as any of the structured design approaches or
object-oriented design is adopted.
iv) Coding: Programmers must choose a module implementation and integration strategy like Top-down,
Bottom-up and Thread’s approach; a coding strategy that follows the precepts of structured
programming, and a documentation strategy to ensure program code is easily readable and
understandable.
v) Testing: These tests are to ensure that a developed or acquired program achieves its specified
requirements. These are as follows:
Concept Problem 14
Discuss the key activities which require special attention for auditing the user access provisioning.
Answer
Auditing user access provisioning process requires attention to several key activities that include the following:
i) Access request processes: The IS auditor should identify all user access request processes and determine
if these processes are used consistently throughout the organization.
ii) Access approvals: The IS auditor needs to determine how requests are approved and by what authority
they are approved. The auditor should determine if system or data owners approve access requests, or if
any accesses are ever denied.
iii) New employee provisioning: The IS auditor should examine the new employee provisioning process to see
how a new employee’s user accounts are initially set up. The auditor should determine if new employees’
managers are aware of the access requests that their employees are given and if they are excessive.
iv) Segregation of Duties (SoD): The IS auditor should determine if the organization makes any effort to
identify segregation of duties. This may include whether there are any SoD matrices in existence and if
they are actively used to make user access request decisions.
v) Access reviews: The IS auditor should determine if there are any periodic access reviews and what
aspects of user accounts are reviewed; this may include termination reviews, internal transfer reviews,
SoD reviews and dormant account reviews.
P a g e | 65
May 22 Information Systems and Its Components
Concept Problem 15
Error Detection: The errors can be detected by either using a loop (echo) check or building some form of
redundancy into the message transmitted.
Error Correction: When line errors have been detected, they must then be corrected using either forward
error correcting codes or backward error correcting codes.
b) Audit trail: Audit Trail controls attempt to ensure that a chronological record of all events that have
occurred in a system is maintained. This record is needed to answer queries, fulfil statutory
requirements, detect the consequences of error and allow system monitoring and tuning.
▪ The Accounting Audit Trail shows the source & nature of data and processes that update database.
▪ The Operations Audit Trail maintains a record of attempted or actual resource consumption within
a system.
Concept Problem 16
Data Warehouse extracts data from one or more of the organization’s databases and loads it into another
database for storage and analysis purpose. As a Data Warehouse Manager, determine the design criteria,
which should be met while designing Date Warehouse.
Answer
The Data Warehouse extracts data from one or more of the organization’s databases and loads it into
another database for storage and analysis purpose. A data warehouse should be designed so that it meets
the following criteria:
i) It uses non-operational data. This means that the data warehouse is using a copy of data from the
active databases that the company uses in its day- to-day operations, so the data warehouse must
pull data from the existing databases on a regular, scheduled basis.
ii) The data is time-variant. This means that whenever data is loaded into the data warehouse, it receives
a time stamp, which allows for comparisons between different time periods.
iii) The data is standardized. Because the data in a data warehouse usually comes from several different
sources, it is possible that the data does not use the same definitions or units. For the data warehouse
to match up different formats, a standard format (for example – date) would have to be agreed upon
and all data loaded into the data warehouse would have to be converted to use this standard format.
This process is called Extraction-Transformation-Load (ETL).
66 | P a g e
Information Systems and Its Components May 22
There are two approaches to follow when designing a data warehouse:
a) The Bottom-Up Approach starts by creating small data warehouses called Data Marts to solve specific
business problems. As these data marts are created, they can be combined into a larger data
warehouse.
b) The Top-Down Approach suggests that we should start by creating an enterprise-wide data warehouse
and then, as specific business needs are identified, create smaller data marts from the data
warehouse.
Concept Problem 17
ii) Data Integrity: The importance to maintain integrity of data of an organization requires all the time
and is a fundamental attribute of IS Auditing. It is also important from the business perspective of the
decision maker, competition and the market environment.
iii) System Effectiveness: Effectiveness of a system is evaluated by auditing the characteristics and
objective of the system to meet business and user requirements.
iv) System Efficiency: To optimize the use of various information system resources such as machine time,
peripherals, system software and labour along with the impact on its computing environment.
Concept Problem 18
a) Transcription Errors: It is a special type of data entry error that is commonly made by human
operators or by Optical Character Recognition (OCR) programs. These falls into three classes: Addition
errors, Truncation errors and Substitution errors.
b) Transposition Errors: It is a simple error of data entry that occur when two digits that are either
individual or part of larger sequence of numbers are reversed (Transpose) when posting a transaction.
There are two types of transposition errors: Single transposition and Multiple transposition errors.
Concept Problem 19
Physical security mechanisms in an organization provides protection to people, data, equipment, systems,
facilities and company assets. Determine some major ways of protecting the organization’s computer
installation in the event of any explosion or fire.
Answer
P a g e | 67
May 22 Information Systems and Its Components
Fire Damage is one of the major threats to the physical security of a computer installation. Some of the
major ways of protecting the installation against fire damage are as follows:
a) Smoke Detectors: Smoke detectors should be positioned at places above and below the ceiling tiles.
Upon activation, these detectors should produce an audible alarm and must be linked to a monitored
station (for example, a fire station).
b) Norms to reduce Electric Firing: To reduce the risk of electric firing, the location of the computer room
should be strategically planned and should not be in the basement or ground floor of a multi-storey
building. Less wood and plastic material should be used in computer rooms. To reduce the risk of
electric fire occurring and spreading, wiring should be placed in the fire-resistant panels and conduit.
This conduit generally lies under the fire-resistant raised floor in the computer room. Fireproof Walls,
Floors and Ceilings surrounding the Computer Room and Fire-resistant office materials such as waste
baskets, curtains, desks, and cabinets should be used.
c) Fire Extinguishers: Manual fire extinguishers can be placed at strategic locations. Fire Alarms,
Extinguishers, Sprinklers, Instructions / Fire Brigade Nos., Smoke detectors, and Carbon-dioxide based
fire extinguishers should be well placed and maintained.
d) Fire Alarms: Both automatic and manual fire alarms may be placed at strategic locations and a control
panel may be installed to clearly indicate this. Besides the control panel, master switches may be
installed for power and automatic fire suppression system. A gas- based fire suppression system is
preferable, however, depending upon the situation, different fire suppression techniques like Dry-pipe
sprinkling systems, water-based systems, halon etc., may be used. When a fire alarm is activated, a
signal may be sent automatically to permanently manned station.
e) Regular Inspection and Raising awareness: Regular inspection by Fire Department Officials should be
conducted. The procedures to be followed during an emergency should be properly documented. Fire
Exits should be clearly marked, and all the staff members should know how to use the system in case
of emergency.
f) Documented and Tested Emergency Evacuation Plans: Relocation plans should emphasize human safety
but should not leave information processing facilities physically unsecured. Procedures should exist for a
controlled shutdown of the computer in an emergency. In all circumstances, saving human life should
be given paramount importance.
Concept Problem 20
(i) Snapshots:
Tracing a transaction is a computerized system can be performed with the help of snapshots or
extended records. The snapshot software is built into the system at those points where material
processing occurs which takes images of the flow of any transaction as it moves through the
application. These images can be utilized to assess the authenticity, accuracy, and completeness of
68 | P a g e
Information Systems and Its Components May 22
the processing carried out on the transaction. The main areas to dwell upon while involving such a
system are to locate the snapshot points based on materiality of transactions when the snapshot will
be captured and the reporting system design and implementation to present data in a meaningful way.
b) Surprise test capability: As evidences are collected from the system itself by using continuous audit
techniques, auditors can gather evidence without the systems staff and application system users
being aware that evidence is being collected at that particular moment. This brings in the surprise
test advantages.
P a g e | 69
May 22 Information Systems and Its Components
d) Training for new users: Using the Integrated Test Facilities (ITF)s, new users can submit data to the
application system, and obtain feedback on any mistakes they make via the system’s error reports.
Concept Problem 21
Recognize the activities that deal with the System Development Controls in an IT Setup.
Answer
The activities that deal with system development controls in IT setup are as follows:
i) Problem definition and Feasibility assessment: I.S. is developed to help resolve problems or to take
advantage of opportunities. All the stakeholders must agree on the problem & feasibility assessment is
done to obtain a commitment to change & to evaluate cost-effectiveness of solutions.
All solutions must be properly and formally authorized to ensure their economic justification and
feasibility.
ii) Analysis of existing system: Designers need to analyze the existing system that involves two major
tasks:
a. Studying existing organizational history, structure, and culture to gain an understanding of social
systems, & the willingness of stakeholders to change.
b. Studying the existing product and information flows as the proposed system will be based primarily
on current product and information flows.
The designers need to understand strengths & weaknesses of existing product to determine the new
system requirements and the extent of change required.
iii) Information Processing System design: This phase involves following activities:
a. Elicitation of detailed requirements: Either ask the stakeholders for their requirement if they are
aware about it or discover it through analysis and experimentation in case they are uncertain about
their need.
b. Design of data/ information flow: Designers shall determine the flow of data/information, its
frequency & timing and the extent to which data and information flows will be formalized. Tools
such as DFD can be used for this.
c. Design of Database and user interface: Involves determining its scope and structure, whereas the
design of user interface determines the ways in which users interact with a system.
d. Physical design: Involves breaking up the logical design into units which in turn can be decomposed
further into implementation units such as programs and modules.
e. Design of the hardware/software platform: In case the hardware and software platforms are not
available in the organization, the new platforms are required to be designed to support the proposed
system.
iv) Hardware/ Software acquisition & procedures development: To purchase the new application system or
hardware, a request for a proposal must be prepared, vendor proposals are sought, and final decision is
made based on evaluation.
70 | P a g e
Information Systems and Its Components May 22
v) Acceptance Testing and Conversion: Acceptance Testing is carried out to identify errors or deficiencies
in the system prior to its final release into production use. Conversion phase comprises the activities
undertaken to place the new system in operation.
vi) Operation and Maintenance: The new system is run as a production system and periodically modified to
better meet its objectives. The maintenance activities associated with these systems need to be
approved and monitored carefully.
Concept Problem 22
Determine the controls that are classified based on the time when they act, relative to a security incident.
Or
Define any two information system controls based on objectives of controls.
Answer
The controls per the time that they act, relative to a security incident can be classified as under:
i) Preventive Controls:
These controls prevent errors, omissions, or security incidents from occurring. Examples include simple
data-entry edits that block alphabetic characters from being entered in numeric fields, access controls
that protect sensitive data/ system resources from unauthorized people, and complex and dynamic
technical controls such as anti-virus software, firewalls, and intrusion prevention systems.
Some examples of preventive controls can be Employing qualified personnel; Segregation of duties;
Access control; Vaccination against diseases; Documentation; Prescribing appropriate books for a course;
Training and retraining of staff; Authorization of transaction; Validation, edit checks in the application;
Firewalls; Anti-virus software (sometimes this act like a corrective control also), etc., and Passwords.
The above list contains both of manual and computerized, preventive controls.
Some examples of Detective Controls are Cash counts; Bank reconciliation; Review of payroll reports;
Compare transactions on reports to source documents; Monitor actual expenditures against budget; Use
of automatic expenditure profiling where management gets regular reports of spend to date against
profiled spend; Hash totals; Check points in production jobs; Echo control in telecommunications;
Duplicate checking of calculations; Past-due accounts report; The internal audit functions; Intrusion
Detection System; Cash counts and bank reconciliation, and Monitoring expenditures against budgeted
amount.
P a g e | 71
May 22 Information Systems and Its Components
access rights to the general ledger and other finance functions should be removed and he/she should be
given access only to functions required to perform his sales job.
Some other examples of Corrective Controls are Submit corrective journal entries after discovering an
error; A Business Continuity Plan (BCP); Contingency planning; Backup procedure; Rerun procedures;
Change input value to an application system; and Investigate budget variance and report violations.
Concept Problem 23
In Information Systems, identify the type of Managerial controls that are responsible for the daily running of
software and hardware facilities. Prepare a detailed note on these controls.
Answer
Under the Managerial Controls, Operations Management Controls are responsible for the daily running of
hardware & software facilities. Operations management typically performs controls over functions as below:
i) Computer Operations: The controls over computer operations govern the activities that directly support
the day-to-day execution of either test or production systems on the hardware/software platform
available.
ii) Network Operations: This includes the proper functioning of network operations and monitoring the
performance of network communication channels, network devices, and network programs and files.
Data may be lost or corrupted through component failure.
iii) Data Preparation and Entry: Irrespective of whether the data is obtained indirectly from source
documents or directly; keyboard environments and facilities should be designed to promote speed and
accuracy and to maintain the wellbeing of keyboard operators.
iv) Production Control: This includes the major functions like - receipt and dispatch of input and output; job
scheduling; management of service-level agreements with users; transfer pricing/charge-out control;
and acquisition of computer consumables.
v) File Library: This includes the management of an organization’s machine-readable storage media like
magnetic tapes, cartridges, and optical disks.
vi) Documentation and Program Library: This involves that documentation librarians ensure that
documentation is stored securely; that only authorized personnel gain access to documentation; that
documentation is kept up-to-date and that adequate backup exists for documentation.
vii) Help Desk/Technical support: This assists end-user to employ end-user hardware and software such as
micro-computers, spreadsheet packages, database management packages etc. and provided the
technical support for production systems by assisting with problem resolution.
viii) Capacity Planning and Performance Monitoring: Regular performance monitoring facilitates the
capacity planning wherein the resource deficiencies must be identified well in time so that they can
be made available when they are needed.
ix) Management of Outsourced Operations: This has the responsibility for carrying out day-to-day
monitoring of the outsourcing contract.
72 | P a g e
Information Systems and Its Components May 22
Concept Problem 24
Nowadays, many industries like hospitality, healthcare and public service agencies deal with massively
large data sets that conventional database tools can’t process. Big data has significant benefits due to
which it has provided a new direction to these businesses. Elaborate these benefits.
Answer
The Benefits of Big Data Processing are as follows:
Concept Problem 25
Operating System security involves policy, procedure and controls that determine, ‘who can access the
operating system,’ ‘which resources they can access’, and ‘what action they can take’. As an Information
Systems auditor, determine the key areas which shall be put in place by any organization.
Or
An operating system allows users and their applications to share and access common computer resources
and execute a variety of activities. Hence, protecting operating system access is extremely crucial. Identify
various steps through which protection of operating system access can be achieved.
Or
Mr. A is a System Administrator of the company who must ensure the protection of Operating System used
in information system of the company. How can this purpose be achieved?
Answer
Protecting operating system access is extremely crucial and can be achieved using following steps:
i) Automated terminal identification: This will help to ensure that a specified session could only be initiated
from a certain location or computer terminal.
ii) Terminal log-in procedures: A log-in procedure is the first line of defense against unauthorized access as
it does not provide unnecessary help or information, which could be misused by an intruder. When the
user initiates the log-on process by entering user-id and password, the system compares the ID and
password to a database of valid users and accordingly authorizes the log-in.
P a g e | 73
May 22 Information Systems and Its Components
iii) Access Token: If the log on attempt is successful, the Operating System creates an access token that
contains key information about the user including user-id, password, user group and privileges granted to
the user. The information in the access token is used to approve all actions attempted by the user during
the session.
iv) Access Control List: This list contains information that defines the access privileges for all valid users of
the resource. When a user attempts to access a resource, the system compasses his or her user-id and
privileges contained in the access token with those contained in the access control list. If there is a
match, the user is granted access.
v) Discretionary Access Control: The system administrator usually determines; who is granted access to
specific resources and maintains the access control list. However, in distributed systems, resources may be
controlled by the end-user. Resource owners in this setting may be granted discretionary access control,
which allows them to grant access privileges to other users. For example, the controller who is owner of
the general ledger grants read only privilege to the budgeting department while accounts payable
manager is granted both read and write permission to the ledger.
vi) User identification and authentication: The users must be identified and authenticated in a fool proof
manner. Depending on risk assessment, more stringent methods like Biometric Authentication or
Cryptographic means like Digital Certificates should be employed.
vii) Password management system: An operating system could enforce selection of good passwords. Internal
storage of password should use one-way hashing algorithms and the password file should not be
accessible to users.
viii) Use of system utilities: System utilities are the programs that help to manage critical functions of the
operating system e.g., addition or deletion of users. Obviously, this utility should not be accessible to a
general user. Use and access to these utilities should be strictly controlled and logged.
ix) Duress alarm to safeguard users: If users are forced to execute some instruction under threat, the system
should provide a means to alert the authorities.
x) Terminal time out: Log out the user if the terminal is inactive for a defined period. This will prevent misuse
in absence of the legitimate user.
xi) Limitation of connection time: Define the available time slot. Do not allow any transaction beyond this
time. For example, no computer access after 8.00 p.m. and before 8.00 a.m. - or on a Saturday or Sunday.
Concept Problem 26
An Internet connection exposes an organization to the harmful elements of the outside world. Discuss the
various factors under User Access Management through which the protection can be achieved.
Answer
User Access Management: This is an important factor that involves the following:
i) User Registration: Information about every user is documented. Some questions like why and who is the
user granted the access; has the data owner approved the access, and has the user accepted the
responsibility? etc. are answered. The de-registration process is also equally important.
74 | P a g e
Information Systems and Its Components May 22
ii) Privilege management: Access privileges are to be aligned with job requirements and responsibilities
and are to be minimal w.r.t their job functions. For example, an operator at the order counter shall
have direct access to order processing activity of the application system.
iii) User password management: Passwords are usually the default screening point for access to systems.
Allocations, storage, revocation, and reissue of password are password management functions.
Educating users is a critical component about passwords, and making them responsible for their
password.
iv) Review of user access rights: A user’s need for accessing information changes with time and requires a
periodic review of access rights to check anomalies in the user’s current job profile and the privileges
granted earlier.
Concept Problem 27
The management of the company PQR wants to get audit of its Logical Access controls that are
implemented in the company’s infrastructure and information systems. As an IS Auditor, determine the
checklist while Auditing User Access Logs.
Or
Discuss the factors that an IS Auditor need to determine while accessing the records in an access log of an
organization.
Answer
User Access Logs: The Information Systems (IS) auditor needs to determine what events are recorded in
access logs. The IS auditor needs to understand the capabilities of the system being audited and determine
if the right events are being logged, or if logging is suppressed on events that should be logged.
i) Centralized access logs: The IS auditor should determine if the organization’s access logs are
aggregated or if they are stored on individual systems.
ii) Access log protection: The auditor needs to determine if access logs can be altered, destroyed, or
attacked to cause the system to stop logging events. For especially high- value and high-
sensitivity environments, the IS auditor needs to determine if logs should be written to digital
media that is unalterable, such as optical WORM (Write Once Read Many) media.
iii) Access log review: The IS auditor needs to determine if there are policies, processes, or procedures
regarding access log review. The auditor should determine if access log reviews take place, who
performs them, how issues requiring attention are identified, and what actions are taken when
necessary.
iv) Access log retention: The IS auditor should determine how long access logs are retained by the
organization and if they are back up.
Concept Problem 28
You are an Information Technology Consultant to a firm who is in the process of shortlisting the resources for
the controls for the environmental exposures - water damage and power spikes in that firm. Prepare a
checklist for same.
Answer
P a g e | 75
May 22 Information Systems and Its Components
Power Spikes: This is caused due to a very short pulse of energy in a power line.
Controls for Environmental Exposures: Some of the major ways of protecting the installation against power
spikes as follows:
a) Electrical Surge Protectors: The risk of damage due to power spikes can be reduced using Electrical Surge
Protectors that are typically built into the Uninterrupted Power System (UPS).
b) Un-interruptible Power System/Generator: In case of a power failure, the UPS provides the backup by
providing electrical power from the battery to the computer for a certain span of time. Depending on the
sophistication of the UPS, electrical power supply could continue to flow for days or for just a few
minutes to permit an orderly computer shutdown.
c) Voltage regulators and circuit breakers: These protect the hardware from temporary increase or decrease
of power.
d) Emergency Power-Off Switch: When the need arises for an immediate power shut down during situations
like a computer room fire or an emergency evacuation, an emergency power-off switch at the strategic
locations would serve the purpose. They should be easily accessible and yet secured from unauthorized
people.
Water Damage: Water damage to a computer installation can be the outcome of water pipes burst. Water
damage may also result from other resources such as cyclones, tornadoes, floods etc
Controls for Environmental Exposures: Some of the major ways of protecting the installation against water
damage are as follows:
a) Water Detectors: These should be placed under the raised floor, near drain holes and near any
unattended equipment storage facilities.
b) Strategically locating the computer room: To reduce the risk of flooding, the computer room should not be
located in the basement of ground floor of a multi-storey building.
c) Some of the major ways of protecting the installation against water damage are as follows:
▪ In flood-prone areas, have the installation above the upper floors but not at the top floor;
Concept Problem 29
You are an IS Auditor undertaking a job of auditing the Information Systems of an ABC Bank. While
performing Audit checks, you intend to ensure the placement of Input validation controls placed in the
76 | P a g e
Information Systems and Its Components May 22
Information System by detecting errors in the transaction data before the data is processed. Determine the
three levels of Input Validation Controls.
Answer
Validation Controls: Input validation controls are intended to detect errors in the transaction data before
the data are processed. There are three levels of input validation controls:
i) Field Check: It involves programmed procedures that examine the characters of the data in the field.
This includes the checks like Limit Check (against predefined limits), Picture Checks (against entry
into processing of incorrect/invalid characters), Valid check codes (against predetermined transactions
codes, tables) etc.
ii) Record Check: This includes the reasonableness check of whether the value specified in a field is
reasonable for that particular field; Valid sign to determine which sign is valid for a numeric field and
Sequence Check to follow a required order matching with logical records etc.
iii) Batch Check: This includes the checks like the transaction type if all input records in a batch are of
particular type; sequence check if input records are in a particular order or not etc.
iv) File Check: This includes file’s version usage; internal and external labeling; data file security; file
updating and maintenance authorization etc.
Concept Problem 30
Answer
The controls that are related to the physical security of the tangible Information Systems Resources stored
on tangible media.
b) Bolting Door Locks – A special metal key is used to gain entry when the lock is a bolting door lock.
To avoid illegal entry, the keys should not be duplicated.
c) Electronic Door Locks – A magnetic or embedded chip-based plastics card key or token may be
entered a reader to gain access in these systems.
P a g e | 77
May 22 Information Systems and Its Components
b) Plastic Cards: These cards are used for identification purposes. Customers should safeguard their
card so that it does not fall into unauthorized hands.
c) Identification Badges: Special identification badges can be issued to personnel as well as visitors.
For easy identification purposes, their colour of the badge can be changed. Sophisticated photo IDs
can also be utilized as electronic card keys.
b) Electronic Logging: This feature is a combination of electronic and biometric security systems. The
users logging can be monitored and the unsuccessful attempts being highlighted.
Concept Problem 31
Mr. X is an auditor of the company and plays a vital role in evaluating the performance of various controls
under managerial controls. The top management is the one who takes responsibility for Information Systems
function. Explain the functions that a senior manager must perform in organizing and controlling functions.
Answer
The functions performed in organizing and controlling functions are as follows:
A. Organizing – There should be a prescribed IT organizational structure with documented roles and
responsibilities and agreed job descriptions. This includes gathering, allocating, and coordinating the
resources needed to accomplish the goals that are established during Planning function.
b. Staffing the Information systems Function: Staffing the Information systems function involves
three major activities - Acquisition of information systems personnel, Development of information
systems personnel; and Termination of information systems personnel.
B. Controlling – This includes comparing actual performance with planned performance as a basis for
taking any corrective actions that are needed. This involves determining when the actual activities of the
information system’s functions deviate from the planned activities.
Concept Problem 32
There are multiple ways in which risks to a Data Centre and Network Operations can be accessed. As a
consultant, prepare a sample list of Risks and Controls w.r.t Data Centre and Network Operations.
Answer
Sample listing of Risks and Controls w.r.t Data Centre and Network Operations are as follows:
78 | P a g e
Information Systems and Its Components May 22
Concept Problem 33
Write a short note on Extraction- Transformation-Load (ETL).
Answer
Extraction-Transformation-Load (ETL)
The concept of the data warehouse includes the process of extraction of data from one or more of the
organization’s databases, its transformation into an appropriate form using different techniques like
smoothing, aggregation, normalization etc. and loading into the data warehouse which is itself another
database for storage and analysis.
For ETL to be performed on a data, a data warehouse should be designed so that it meets following criteria:
i) It uses non-operational data which means that the data warehouse is using a copy of data from the
P a g e | 79
May 22 Information Systems and Its Components
ii) The data is time-variant which means a time-stamp is received whenever data is loaded into the data
warehouse
iii) The data is to be standardized in case the data in a data warehouse comes from different sources and
does not use the same definitions or units.
For example, the Events table in Student Clubs database lists the event dates using the mm/dd/yyyy format
(e.g., 01/10/2013) whereas a table in another database might use the format yy/mm/dd (e.g.,13/01/10) for
dates. For the data warehouse to match up dates, a standard date format would have to be agreed upon and
all data loaded into the data warehouse would have to be transformed to use this standard format before its
loading into the database for storage.
Concept Problem 34
What is virtual memory? How does it differ from secondary memory?
Answer
Virtual Memory is not a separate device but an imaginary memory area supported by some operating systems
(for example, Windows) in conjunction with the hardware. If a computer lacks in required size of the
Random-Access Memory needed to run a program or operation, Windows uses virtual memory to compensate.
Virtual memory is an allocation of temporary space on hard disk space to help RAM. When RAM runs low,
virtual memory moves data from RAM to a space called a paging file. Moving data to and from the paging file
frees up RAM to complete its work.
Differences between Virtual Memory and Secondary Memory are given below:
Virtual Memory Secondary Memory
Virtual Memory is an imaginary memory area that Secondary memory is a storage device having
combines computer’s RAM with temporary space on features of non-volatility (contents are permanent in
the hard disk nature), greater capacity (they are available in large
size and greater economy
When RAM runs low, virtual memory moves data The secondary memory is available in bigger sizes;
from RAM to a space called a paging file. Moving thus, program and data can be stored permanently.
data to and from the paging file frees up RAM to
complete its work.
Concept Problem 35
Information systems have set high hopes to companies for their growth as it reduces processing speed and
helps in cutting cost. Being an auditor of ABC manufacturing company, discuss the key areas that should
pay attention to while evaluating Managerial controls by top management.
Answer
The key areas that auditors should pay attention to while evaluating Managerial controls are as follows:
i) Planning: Auditors need to evaluate whether top management has formulated a high- quality
80 | P a g e
Information Systems and Its Components May 22
information system’s plan that is appropriate to the needs of an organization or not. A poor-quality
information system is ineffective and inefficient leading to losing of its competitive position within the
marketplace.
ii) Organizing: Auditors should be concerned about how well top management acquires and manages staff
resources.
iii) Leading: Generally, the auditors examine variables that often indicate when motivation problems exist or
suggest poor leadership – for example, staff turnover statistics, frequent failure of projects to meet their
budget and absenteeism level to evaluate the leading function. Auditors may use both formal and
informal sources of evidence to evaluate how well top managers communicate with their staff.
iv) Controlling: Auditors should focus on subset of the control activities that should be performed by top
management – namely, those aimed at ensuring that the information systems function accomplishes
its objectives at a global level. Auditors must evaluate whether top management’s choice to the means of
control over the users of IS services is likely to be effective or not.
Concept Problem 36
Data Mining is commonly applied in banking industry to credit ratings and to intelligent anti-fraud systems
to analyze transactions, card transactions, purchasing patterns and customer financial data etc. The process
of Data Mining involves sequential execution of steps for its implementation. Discuss the steps involved in
this process.
Or
Data Mining is the process of analysing data to find previously unknown trends, patterns and associations to
make decisions. As an IT expert of the company, explain the steps involved in the data mining process.
Answer
The steps involved in the Data Mining process are as follows:
i) Data Integration: Firstly, the data are collected and integrated from all the different sources which could
be flat files, relational database, data warehouse or web etc.
ii) Data Selection: It may be possible that all the data collected may not be required in the first step. So, in
this step we select only those data which we think is useful for data mining.
iii) Data Cleaning: The data that is collected are not clean and may contain errors, missing values, noisy or
inconsistent data. Thus, we need to apply different techniques to get rid of such anomalies.
iv) Data Transformation: The data even after cleaning are not ready for mining as it needs to be
transformed into an appropriate form for mining using different techniques like - smoothing,
aggregation, normalization etc.
v) Data Mining: In this, various data mining techniques are applied on the data to discover the interesting
patterns. Techniques like clustering and association analysis are among the many different techniques
used for data mining.
vi) Pattern Evaluation and Knowledge Presentation: This step involves visualization, transformation,
removing redundant patterns etc. from the patterns we generated.
vii) Decisions / Use of Discovered Knowledge: This step helps user to make use of the knowledge acquired to
P a g e | 81
May 22 Information Systems and Its Components
Concept Problem 37
Due to absence of Logical Access Controls in XYZ Limited; the company’s security mechanism got attacked
by a Logical Access Violator Mr. X leading to potential loss resulting in total shutdown of the computer
functions of the company. Discuss the categories under which the Logical Access Violator Mr. X may fall into.
Or
Identify the Logical Access Violators who exploit logical exposures in an organization. Briefly explain them.
Answer
The Categories under which the logical Access Violator Mr. X may fall into are as follow:
a) Hackers: Hackers try their best to overcome restrictions to prove their ability. Ethical hackers most likely
never try to misuse the computer intentionally but assists in finding the weaknesses in the system;
c) IS Personnel: They have easiest to access to computerized information since they come across to
information during discharging their duties. Segregation of duties and supervision help to reduce the
logical access violations;
d) Former Employees: should be cautious of former employees who have left the organization on
unfavorable terms;
e) End Users; Interested or Educated Outsiders; Competitors; Foreigners; Organized Criminals; Crackers;
Part-time and Temporary Personnel; Vendors and consultants; and Accidental Ignorant – Violation done
unknowingly.
Concept Problem 38
As an internal auditor of an organization, Mr. Anil reviews various physical security controls implemented
within his organization. Discuss various activities that he would perform while doing auditing these physical
access controls?
Answer
The activities that Mr. Anil would be performing while doing auditing of physical access controls are as follows:
(i) Sitting and Marking: Auditing building sitting and marking requires attention to several key factors and
features, including:
o Proximity to hazards: The IS auditor should estimate the building’s distance to natural and
manmade hazards, such as Dams; Rivers, lakes, and canals; Natural gas and petroleum pipelines;
Water mains and pipelines; Earthquake faults; Areas prone to landslides; Volcanoes; Severe weather
such as hurricanes, cyclones, and tornadoes; Flood zones; Military bases; Airports; Railroads and
Freeways. The IS auditor should determine if any risk assessment regarding hazards has been
performed and if any compensating controls that were recommended have been carried out.
o Marking: The IS auditor should inspect the building and surrounding area to see if building(s)
containing information processing equipment identify the organization. Marking may be visible on
82 | P a g e
Information Systems and Its Components May 22
the building itself, but also on signs or parking stickers on vehicles.
(ii) Physical barriers: This includes fencing, walls, barbed/razor wire, bollards, and crash gates. The IS
auditor needs to understand how these are used to control access to the facility and determine their
effectiveness.
(iii) Surveillance: The IS auditor needs to understand how video and human surveillance are used to control
and monitor access. He or she needs to understand how (and if) video is recorded and reviewed, and if
it is effective in preventing or detecting incidents.
(iv) Guards and dogs: The IS auditor need to understand the use and effectiveness of security guards and
guard dogs. Processes, policies, procedures, and records should be examined to understand required
activities and how they are carried out.
(v) Key-Card systems: The IS auditor needs to understand how key-card systems are used to control
access to the facility. Some points to consider include: Work zones: Whether the facility is divided into
security zones and which persons are permitted to access which zones whether key-card systems
record personnel movement; What processes and procedures are used to issue keycards to employees?
etc.
Concept Problem 39
ABC Ltd., an automobile manufacturer intends to establish its new manufacturing unit plant at Bhuj, Gujarat.
Out of many controls that need to be in place, the management has little more focus on successful
implementation of Environmental controls as the Bhuj area is earthquake prone. Mr. Nanda, the auditor of
ABC Ltd. conducted various physical inspections of the building at Bhuj to determine the implementation of
environmental controls in the said manufacturing unit. Briefly explain his role and the activities he shall
conduct to audit the Environmental Controls.
Answer
Role of Auditor in Auditing Environmental Controls: Audit of environmental controls should form a critical part
of every IS audit plan. The IS auditor should satisfy not only the effectiveness of various technical controls
but also the overall controls safeguarding the business against environmental risks. Audit of environmental
controls requires the IS auditor to conduct physical inspections and observe practices. Auditing environmental
controls requires knowledge of building mechanical and electrical systems as well as fire codes. The IS auditor
needs to be able to determine if such controls are effective and if they are cost effective.
P a g e | 83
May 22 Information Systems and Its Components
d) Water detection: The IS auditor should determine if any water detectors are used in rooms where
computers are used. He or she should determine how frequently these are tested and if there are
monitored.
e) Fire detection and suppression: The IS auditor should determine if fire detection equipment is adequate,
if staff members understand their function, and i f they are tested. S/he should determine how
frequently fire suppression systems are inspected and tested, and if the organization has emergency
evacuation plans and conducts fire drills.
f) Cleanliness: The IS auditor should examine data centers to see how clean they are. IT equipment air
filters and the inside of some IT components should be examined to see if there is an accumulation of
dust and dirt.
Concept Problem 40
The processing subsystem of any application software is responsible for computing, sorting, classifying, and
summarizing the data. The processor controls of the application software are responsible to reduce the
expected losses from errors and irregularities associated with Central processors. Discus these controls.
Answer
The processor controls of any application software are as follows:
a) Error Detection and Correction: Occasionally, processors might malfunction because of design errors,
manufacturing defects, damage, fatigue, electromagnetic interference, and ionizing radiation. The failure
might be transient (that disappears after a short period), intermittent (that reoccurs periodically), or
permanent (that does not correct with time). For the transient and intermittent errors; re-tries and re-
execution might be successful, whereas for permanent errors, the processor must halt and report error.
b) Multiple Execution States: It is important to determine the number of and nature of the execution states
enforced by the processor. This helps auditors to determine which user processes will be able to carry out
unauthorized activities, such as gaining access to sensitive data maintained in memory regions assigned
to the operating system or other user processes.
c) Timing Controls: An operating system might get stuck in an infinite loop. In the absence of any control,
the program will retain use of processor and prevent other programs from undertaking their work.
d) Component Replication: In some cases, processor failure can result in significant losses. Redundant
processors allow errors to be detected and corrected. If processor failure is permanent in multicomputer or
multiprocessor architectures, the system might reconfigure itself to isolate the failed processor.
Concept Problem 41
Managerial Controls provide a stable infrastructure in which Information Systems can be built, operated, and
maintained on day-to-day basis. List down various controls that can be adapted by management for its
smooth functioning.
Answer
The controls that can be adapted by management for its smooth functioning are as follows:
84 | P a g e
Information Systems and Its Components May 22
b) System Development Management Controls
c) Programming Management Controls
d) Data Resource Management Controls
e) Quality Assurance Management Controls
f) Security Management Controls
g) Operations Management Controls
Concept Problem 42
Briefly explain any two output controls.
Answer
Various Output Controls under Application Controls are as follows:
a) Inference Controls - used to prevent compromise of statistical databases from which users can obtain
only aggregate statistics rather than the values of individual data items.
b) Batch Report Design Controls - should comply with the control procedures laid down for them during the
output process.
Concept Problem 43
Differentiate between Processor Registers and Cache Memory.
Answer
The differences between Processor Registers and Cache memory are provided in the table below:
Concept Problem 44
Distinguish between Connection Oriented and Connection less Networks.
3. C A S E S T U D Y B A S E D MCQ I – S TU D Y M A T E R IA L
In 2017, XYZ Systems had shifted to the SQL Server Relational Database Management System from the
previously used IBM Information Management System which used a hierarchical database model to create a
well-organized database to store organizational data.
On acquiring a good number of global clients and keeping in view the increased number, complexity of the
overseas transactions and the management’s need for periodic performance analysis; XYZ Systems planned
to leverage the benefit of data warehouse whereas the research team suggested the implementation of Big
data. However, XYZ Systems did not implement suitable security controls and hence recently faced data
security breach which led to the unauthorized manipulation of certain confidential data. This resulted in XYZ
P a g e | 85
May 22 Information Systems and Its Components
86 | P a g e
Information Systems and Its Components May 22
(i) Encryption
(ii) Enforced Path
(iii) Call Back Devices
(iv) None of these
4. C A S E S T U D Y B A S E D MCQ 2 – S TU D Y M A TE RIA L
Bianc Computing Ltd. has implemented a set of controls including those with respect to security, quality
assurance and boundary controls to ensure that the development, implementation, operation and
maintenance of information systems takes place in a planned and controlled manner. It has also ensured
that logs are designed to record activity at the system, application, and user level.
Along with the implementation of controls and maintenance of logs, it has approached a leading firm of IS
auditors to conduct a comprehensive audit of its controls. Within the organization also, it has opened new job
roles and has hired people with the required skill sets for the same.
Answer the following Questions:
1 The team of network engineers of Bianc Computing Ltd. recommended certain controls to be
implemented in the organization to bridge the rate of data reception and transmission between two
nodes. Which types of controls are being referred to here?
(i) Link Controls
(ii) Flow Controls
(iii) Channel Access Controls
(iv) Line Error Controls
2 Which control is used to ensure that the user can continue working, while the print operation is getting
completed? This is known as ________.
(i) Printing Controls
(ii) Spooling File Control
(iii) Spoofing File Control
(iv) Print-Run-to Run Control Totals
3 Bianc Computing Ltd. has also opened up new job roles and has hired persons with the required skill sets
for the same as given below.
4. Examining logs from firewalls, and providing security (d) Help Desk Analyst
advisories
5. Performing maintenance and configuration operations on (e) Systems Analyst
systems.
6. Build and maintain network devices such as routers, (f) System Administrator
switches etc.
7. Developing technical requirements, program design, and (g) Network Engineer
software test plans
P a g e | 87
May 22 Information Systems and Its Components
Identify the right match to the job roles assigned and the responsible persons for the job role.
i) 1(c), 2(d), 3(a), 4(b), 5(f), 6(g), 7(e)
ii) 1(d), 2(b), 3(c), 4(g), 5(f), 6(a), 7(e)
iii) 1(e), 2(b), 3(c), 4(g), 5(a), 6(f), 7(d)
iv) 1(g), 2(f), 3(e), 4(d), 5(c), 6(b), 7(a)
Answer Key
88 | P a g e
E-Commerce, M-Commerce & Emerging Technologies May 22
C HAPTER 4
Coverage
1) ICAI Study Material Questions & Solutions
2) RTPs & MTPs till Dec 2021
3) Past Year Questions till Dec 2021
1. ICAI S T U D Y M A TE R IA L Q U E S TIO NS
Concept Problem 1
P a g e | 89
May 22 E-Commerce, M-Commerce & Emerging Technologies
Computers, Desktops, Mobile Applications, etc. to enhance the processing of commercial transactions
between a company, its customers and its business partners.
The key growth in the mobile e-Commerce sector in recent years has been in through so-called Apps.
Apps, short for Mobile Applications, are small piece of software developed specifically for the operating
systems of handheld devices such as mobile phones, PDAs and Tablet computers.
For example, spam filter is a machine learning program that can learn to flag spam e-mails and
regular e-mails by automatically learning the words or phrases which are good predicators of spam by
detecting unusually frequent pattern of words in the spam.
It means employees are welcome to use personal devices (laptops, smart phones, tablets etc.) to
connect to the corporate network to access information and application.
i) Single Sign-on: A user should authenticate once and they should be able to acquire resources, use
them, and release them and to communicate internally without any further authentication.
ii) Protection of Credentials: User passwords, private keys, etc. should be protected.
iii) Interoperability with local security solutions: Access to local resources should have local security
policy at a local level. Despite of modifying every local resource there is an inter- domain security
server for providing security to local resource.
iv) Exportability: The code should be exportable i.e.; they cannot use a large amount of encryption at
90 | P a g e
E-Commerce, M-Commerce & Emerging Technologies May 22
v) Support for secure group communication: In a communication, there are number of processes which
coordinate their activities. This coordination must be secure and for this there is no security
policy.
vi) Support for multiple implementations: There should be a security policy which should provide
security to multiple sources based on public and private key cryptography.
Concept Problem 2
Explain various components that are involved in an E-Commerce.
Or
DEF is a car battery manufacturing company which intends to provide online business to its customers.
Briefly explain various components involved in any e-Commerce transaction.
Answer
Various components of e-Commerce transaction are as follows:
i) User: This may be individual / organization or anybody using the e-commerce platforms. As e-
commerce, has made procurement easy and simple, just on a click of button, e-commerce vendors
need to ensure that their products are not delivered to wrong users.
ii) E-commerce Vendors: This is the organization / entity providing the user, goods/ services asked for. E-
commerce vendors further needs to ensure Suppliers and Supply Chain Management, Warehouse
operations, Shipping and returns, e- Commerce catalogue and product display, Marketing and loyalty
programs, Showroom and offline purchase, different ordering Methods, Guarantees, Privacy Policy and
Security etc. for better, effective and efficient transaction.
iii) Technology Infrastructure: The computers, servers, database, mobile apps, digital libraries, data
interchange enabling the e-commerce transactions.
▪ Computers, Servers and Database: These are the backbone for the success of the venture. Big e-
commerce organization invest huge amount of money/time in creating these systems.
▪ Mobile Apps: A mobile app is a software application programmed to run specifically on a mobile
device. Smartphones and tablets have become a dominant form of computing, with many more
smartphones being sold than personal computers.
▪ Digital Library: A Digital Library is a special library with a focused collection of digital objects
that can include text, visual material, audio material, video material, stored as electronic media
formats, along with means for organizing, storing, and retrieving the files and media contained
in the library collection.
▪ Data Interchange: Data Interchange is an electronic communication of data. For ensuring the
correctness of data interchange between multiple players in e-commerce, business specific
protocols are being used. There are defined standards to ensure seamless / exact communication
in e-commerce.
iv) Internet/Network: This is the key to success of e-commerce transactions. Internet connectivity is
important for any e-commerce transactions to go through. The faster net connectivity leads to better
P a g e | 91
May 22 E-Commerce, M-Commerce & Emerging Technologies
e-commerce. At a global level, it is linked to the countries capability to create a high-speed network.
v) Web portal: This shall provide the interface through which an individual/ organization shall perform e-
commerce transactions. Web Portal is an application through which user interacts with the e-
commerce vendor. The front end through which user interacts for an e-commerce transaction. These
web portals can be accessed through desktops/laptops/PDA/hand-held computing devices/mobiles and
now through smart TVs also.
vi) Payment Gateway: Payment gateway represents the way e-commerce vendors collects their
payments. These assures seller of receipt of payment from buyer of goods/services from e-commerce
vendors. Presently numerous methods of payments by buyers to sellers are being used, including Credit
/ Debit Card Payments, Online bank payments, Vendors own payment wallet, Third Party Payment
wallets, Cash on Delivery (Cod) and Unified Payments Interface (UPI).
Concept Problem 3
Answer
E-commerce runs through network-connected systems. Networked systems can have two types of
architecture namely;
i) Presentation Tier (Client Application/Client Tier): This is the interface that allows user to interact with
the e-commerce / m-commerce vendor. User can login to an e-commerce vendor through this tier. This
application also connects to database tier and displays the various products / prices to customers.
ii) Database Tier (Data Tier): The product data / price data / customer data and other related data are
92 | P a g e
E-Commerce, M-Commerce & Emerging Technologies May 22
kept here. User has not access to data / information at this level but he/she can display all data /
information stored here through application tier.
Three Tier Client Server: Three-tier architecture is a software design pattern and well- established software
architecture. Its three tiers are the Presentation Tier, Application Tier and Data Tier. Three-tier architecture is
a client-server architecture in which the functional process logic, data access, computer data storage and
user interface are developed and maintained as independent modules on separate platforms. The three-tier
architecture are as follows:
ii) Application Tier: Also, called the Middle Tier, Logic Tier, Business Logic or Logic Tier; this tier is pulled
from the presentation tier. It controls application functionality by performing detailed processing. In
computer software, business logic or domain logic is the part of the program that encodes the real-
world business rules that determine how data can be created, displayed, stored, and changed.
iii) Database Tier: This tier houses the database servers where information is stored and retrieved. Data in
this tier is kept independent of application servers or business logic. The Data Tier includes the data
persistence mechanisms (database servers, file shares, etc.) and the data access layer that
encapsulates the persistence mechanisms and exposes the data. The data access layer should provide
an Application Programming Interface (API) to the application tier that exposes methods of managing
the stored data without exposing or creating dependencies on the data storage mechanisms. Avoiding
dependencies on the storage mechanisms allows for updates or changes without the application tier
clients being affected by or even aware of the change.
Concept Problem 4
Differentiate Traditional Commerce and E- Commerce.
Answer
P a g e | 93
May 22 E-Commerce, M-Commerce & Emerging Technologies
94 | P a g e
E-Commerce, M-Commerce & Emerging Technologies May 22
Concept Problem 5
A business model is the mechanism by which a business intends to generate revenue and profits. Explain the
different e-commerce business models.
Answer
Business Model can be defined as the organization of product, service and information flows, and the sources
of revenues and benefits for suppliers and customers.
An e-business model is the adaptation of an organization’s business model to the internet economy.
i) Business-to- Consumer (B2C)
B2C is typically used to refer to online retailers who sell products and services to consumers through
the Internet. Generally, this supports the activities within the consumer chain that focuses on sell-side
activities.
This may involve Direct Sellers like www.cisco.com; Online intermediaries like www.amazon.com; and
Communities built around shared interests like photography, cooking etc. www.cookingmatters.com
P a g e | 95
May 22 E-Commerce, M-Commerce & Emerging Technologies
sector. Consumers can reach higher authority without going around in cities. The aim is to reduce the
average time for fulfilling citizen’s requests for various government services.
Services including land searches, confirmation of genuine licenses and vehicle ownership searches.
Disputes such as non-payment of tax or tax refunds are resolved through online support on the
Government platforms. Example – e-Seva (Andhra Pradesh)
Concept Problem 6
Explain the different steps followed by the user in buying goods online.
Or
A customer X intends to place an order for an electric cooker on an online portal ABC.com. With the help of
the diagram, determine the general workflow of the E-Commerce transaction that will take place.
Or
Ms. Neha is the owner of a consultant company named JKL Ltd. On Diwali, she decided to offer Brass
bottle as Diwali gift to each staff member. She placed an order of 20 bottles from online portal. Explain
the different steps involved in this e-commerce transaction in buying the bottles online.
Answer
The work flow Diagram/ Different steps for any E-Commerce transaction is as follows:
Step 2 - Product / Service: Customer selects products / services from available options.
Step 3 - Customer Places: Order is placed for selected product / service by customer. This step leads to next
important activity ‘Payment Gateway’.
96 | P a g e
E-Commerce, M-Commerce & Emerging Technologies May 22
Step 4 - Payment Gateway: Customer selects the payment method. In case payment methods is other than
Cash on Delivery (COD), the merchant gets the update from payment gateway about payment realization
from customer. In case of COD, e- commerce vendor may do an additional check to validate customer.
Step 5 - Dispatch and Shipping Process: This process may be executed at two different ends. First if
product / service inventory is managed by e-commerce vendor, then dispatch shall be initiated at
merchant warehouse. Second, many e-commerce merchants allow third party vendors to sale through
merchant websites.
Step 6 - Delivery Tracking: Another key element denoting success of e-commerce business is timely
delivery. Merchants keep a track of this. All merchants have provided their delivery staff with hand held
devices, where the product / service delivery to customers are immediately updated.
Step 7 - COD Tracking: In case products are sold on COD payment mode, merchants need to have additional
check on matching delivery with payments.
Concept Problem 7
Discuss various risks associated with E-Commerce transactions that are high as compared to general Internet
activities?
Or
Mr. X is the Chief Manager of XYZ company; a well-known brand in the field of footwear. He suggested the
Board members of company to adopt the model of e- Business to meet out the demand of today’s
competitive world. The Board members asked him to present a report pertaining to pros and cons of the
same in next board meeting. Though he is well aware about the benefits of the same, help Mr. X to jot
down all the risks associated with e-Business Environment.
Or
DJY is a brand in the field of online supplier of kids’ apparels. As we know that risks associated with e-
commerce transactions are high as compared to general internet activities, what do you think are the risks
that DJY is addressing due to its online transactions?
Answer
The risks associated in E-Business Environment are as follows:
i) Privacy and Security: There are often issues of security and privacy due to lack of personalized digital
access and knowledge.
ii) Quality issues: There are quality issues raised by customers as the original product differs from the
one that was ordered.
iii) Delay in goods and Hidden Costs: When goods are ordered from another country, there are hidden costs
enforced by Companies.
iv) Needs Access to internet and lack of personal touch: The e-commerce requires an internet connection
which is extra expensive and lacks personal touch.
v) Security and credit card issues: There is cloning possible of credit cards and debit cards which pose a
security threat.
vi) Infrastructure: There is a greater need of not only digital infrastructure but also network expansion of
P a g e | 97
May 22 E-Commerce, M-Commerce & Emerging Technologies
vii) Problem of anonymity: There is need to identify and authenticate users in the virtual global market
where anyone can sell to or buy from anyone, anything from anywhere.
viii) Repudiation of contract: There is possibility that the electronic transaction in the form of contract,
sale order or purchase by the trading partner or customer maybe denied.
ix) Lack of authenticity of transactions: The electronic documents that are produced during an e-
Commerce transaction may not be authentic and reliable.
x) Data Loss or theft or duplication: The data transmitted over the Internet may be lost, duplicated,
tampered with or replayed.
xi) Attack from hackers: Web servers used for e-Commerce maybe vulnerable to hackers.
xii) Denial of Service: Service to customers may be denied due to non-availability of system as it may be
affected by viruses, e-mail bombs and floods.
xiii) Non-recognition of electronic transactions: e-Commerce transactions, as electronic records and digital
signatures may not be recognized as evidence in courts of law.
Concept Problem 8
What are the ways of protecting your e-Commerce business from intrusion?
Answer
E-Commerce business can be protected from intrusion using following methods:
i) Viruses: Check your website daily for viruses, the presence of which can result in the loss of valuable
data.
ii) Hackers: Use software packages to carry out regular assessments of how vulnerable your website is to
hackers.
iii) Passwords: Ensure employees change these regularly and that passwords set by former employees of
your organization are defunct.
iv) Regular software updates: The site should always be up to date with the newest versions of security
software. If it is not done, the website will become vulnerable to attack.
v) Sensitive data: This involves considering the encryption of financial information and other confidential
data (using encryption software). Hackers or third parties will not be able to access encrypted data
without a key. This is particularly relevant for any e-Commerce sites that use a shopping cart system.
Concept Problem 9
Explain the important provisions of IT Act 2000 related to e-commerce.
Answer
From the perspective of e-commerce in India, the Information Technology Act, 2000 contains following
98 | P a g e
E-Commerce, M-Commerce & Emerging Technologies May 22
important provisions:
i) Section 4 of the IT Act provides for “legal recognition of electronic records”. It provides that where any
law requires that any information or matter should be in writing or in the typewritten or printed form,
then such requirement shall be deemed to be satisfied if it is in an electronic form.
The implications for the e-businesses would be that email would now be a valid and legal form of
communication in India that can be duly produced and approved in a court of law.
ii) Section 3 of the IT Act contains provisions related to authentication of electronic records by affixing
digital signature. The section provides the conditions subject to which an electronic record may be
authenticated by means of affixing digital signature.
The Act has given a legal definition to the concept of secure digital signatures. Companies shall now be
able to carry out electronic commerce using the legal infrastructure provided by the Act. Digital
Signatures have been given legal validity and sanction in the IT Act, 2000.
iii) The Act throws open the doors for the entry of corporate companies in the business of being Certifying
Authorities for issuing Digital Signatures Certificates.
iv) The Act now allows Government to issue notification on the web thus heralding e-governance.
v) Section 6 of the IT Act lays down the foundation of Electronic Governance. It provides that the filing of
any form, application or other documents, creation, retention or preservation of records, issue or grant of
any license or permit or receipt or payment in Government offices and its agencies may be done
through the means of electronic form.
vi) The IT Act also addresses the important issues of security which are so critical to the success of
electronic transactions. Section 14 of the IT Act relates to secure electronic record and provides that
where any security procedure has been applied to an electronic record at a specific point of time, then
such record shall be deemed to be a secure electronic record from such point of time to the time of
verification.
vii) Section 15 provides for the security procedure to be applied to Digital Signatures for being treated as a
secure digital signature.
Concept Problem 10
Subsequent to demonetization, one of your elderly neighbour, who was using traditional digital methods of
making payments like cards, net banking etc., asked for your help to know about the various new methods of
Digital Payments. Identify and explain various new methods of Digital Payments for him.
Answer
Some of the new methods of Digital Payments are as follows:
i) Unified Payment Interface (UPI) Apps
ii) Immediate Payment Service (IMPS)
iii) BHIM (Bharat Interface for Money) - Mobile App
iv) Mobile Wallets
v) Aadhar Enabled Payment Service (AEPS)
P a g e | 99
May 22 E-Commerce, M-Commerce & Emerging Technologies
ii) Immediate Payment Service (IMPS): It is an instant interbank electronic fund transfer service through
mobile phones. It is also being extended through other channels such as ATM, Internet Banking, etc.
iii) Mobile Apps: BHIM (Bharat Interface for Money) is a Mobile App developed by National Payments
Corporation of India (NPCI) based on UPI (Unified Payment Interface). It facilitates e-payments
directly through banks and supports all Indian banks which use that platform. It is built on the
Immediate Payment Service infrastructure and allows the user to instantly transfer money between
the bank accounts of any two parties. BHIM works on all mobile devices and enables users to send or
receive money to other UPI payment addresses.
iv) Mobile Wallets: It is defined as Virtual wallets that stores payment card information on a mobile
device. Mobile Wallets provide a convenient way for a user to make in-store payments and can be used
that merchants listed with the mobile wallet service providers. There are mobile wallets like Paytm,
Freecharge, Buddy, Mobikwik etc. Some of these are owned by banks and some are owned by private
companies.
v) Aadhar Enabled Payment Service (AEPS): AEPS is an Aadhaar based digital payment mode. Customer
needs only his or her Aadhaar number to pay to any merchant. AEPS allows bank to bank transactions
which means the money that you pay will be deducted from your account and credited to the payee’s
account directly. Customers will need to link their AADHAR numbers to their bank accounts. APES once
launched can be used at POS terminals also.
vi) Unstructured Supplementary Service Data (USSD): A revolutionary idea, where to make payments
through mobiles there is neither need for internet nor any smart phone. USSD banking or *99# Banking
is a mobile banking based digital payment mode. User does not need to have a smartphone or internet
connection to use USSD banking. S/he can easily use it with any normal feature phone. USSD banking
is as easy as checking of mobile balance. S/he can use this service for many financial and non-
financial operations such as checking balance, sending money, changing Mobile Banking Personal
Identification number (MPIN) and getting Mobile Money Identifier (MMID).
vii) Cryptocurrency: Cryptocurrency is another electronic payment method that is steadily growing in
popularity. Cryptocurrency is a digital currency produced by a public network, rather than any
government, that uses cryptography to ensure that payments are sent and received safely. A
cryptocurrency is a medium of exchange wherein records of individual coin ownership are stored in a
computerized database using strong cryptography.
100 | P a g e
E-Commerce, M-Commerce & Emerging Technologies May 22
Cryptocurrency is called so because all the data is ensured with strong cryptography. The strong
cryptography makes it almost impossible to counterfeit or double spend. Cryptocurrency is completely
decentralized, which means that there are no servers involved and no central controlling authority.
Cryptocurrency is a digital money which does not involve any physical coin. Since it is all online, the
user can transfer cryptocurrency to someone online without going to the bank. It can be used for
making quick payments without any transaction fees. Cryptocurrency is stored in a digital wallet
either on the computer or on other hardware.
The first cryptocurrency was Bitcoin which was launched in 2009. The other cryptocurrencies
prevailing in the world today include Litecoin, Peercoin, Namecoin, as well as Ethereum.
Concept Problem 11
What do you mean by “Cloud Computing”? Discuss its characteristics.
Answer
“The Cloud” refers to applications, services, and data storage on the Internet. These service providers rely
on giant server farms and massive storage devices that are connected via Internet protocols. Cloud
Computing is the use of these services by individuals and organizations.
Cloud Computing is both, a combination of software and hardware-based computing resources delivered as
a networked service.
For example, if you access your e-mail via your web browser, you are using a form of cloud computing. If
you use Google Drive’s applications, you are using cloud computing.
i) Elasticity and Scalability: Cloud computing gives us the ability to expand and reduce resources
according to the specific service requirement.
For example, we may need a large number of server resources for the duration of a specific task. We
can then release these server resources after we complete our task.
ii) Pay-per-Use: We pay for cloud services only when we use them, either for the short term (for example,
for CPU time) or for a longer duration (for example, for cloud-based storage or vault services).
iii) On-demand: Because we invoke cloud services only when we need them, they are not permanent parts
of the IT infrastructure.
This is a significant advantage for cloud use as opposed to internal IT services. With cloud services,
there is no need to have dedicated resources waiting to be used, as is the case with internal services.
P a g e | 101
May 22 E-Commerce, M-Commerce & Emerging Technologies
iv) Resiliency: The resiliency of a cloud service offering can completely isolate the failure of server and
storage resources from cloud users. Work is migrated to a different physical resource in the cloud with
or without user awareness and intervention.
v) Multi Tenancy: Public cloud service providers often can host the cloud services for multiple users within
the same infrastructure. Server and storage isolation may be physical or virtual depending upon the
specific user requirements.
vi) Workload Movement: This characteristic is related to resiliency and cost considerations. Here, cloud-
computing providers can migrate workloads across servers both inside the data center and across data
centers (even in a different geographic area).
This migration might be necessitated by cost (less expensive to run a workload in a data center in
another country based on time of day or power requirements) or efficiency considerations (for
example, network bandwidth).
vii) Wide Range of Network Access Capacities: Resources are available to customers through a network and
can be accessed from different devices such as desktop computers, mobile phones, smartphones and
tablet devices.
Concept Problem 12
Explain the different types of clouds in Cloud Computing.
Answer
The Cloud Computing environment can consist of multiple types of clouds based on their deployment and
usage.
i) Private Cloud:
This cloud computing environment resides within the boundaries of an organization and is used
exclusively for the organization’s benefits. These are also called Internal Clouds or Corporate Clouds.
Private Clouds can either be private to the organization and managed by the single organization (On-
Premise Private Cloud) or can be managed by third party (Outsourced Private Cloud).
They are built primarily by IT departments within enterprises, who seek to optimize utilization of
infrastructure resources within the enterprise by provisioning the infrastructure with applications using
the concepts of grid and virtualization.
Typically, public clouds are administrated by third parties or vendors over the Internet, and the
services are offered on pay-per-use basis.
These are also called Provider Clouds. Public cloud consists of users from all over the world wherein a
102 | P a g e
E-Commerce, M-Commerce & Emerging Technologies May 22
user can simply purchase resources on an hourly basis and work with the resources which are available
in the cloud provider’s premises.
The hybrid cloud can be regarded as a private cloud extended to the public cloud and aims at utilizing the
power of the public cloud by retaining the properties of the private cloud.
In this, a private cloud is shared between several organizations. This model is suitable for organizations
that cannot afford a private cloud and cannot rely on the public cloud either.
Concept Problem 13
Discuss various components of Mobile Computing and also the benefits of Mobile Computing.
Answer
Key components of Mobile Computing are as follows:
a) Mobile Communication: This refers to the infrastructure put in place to ensure that seamless and
reliable communication goes on. This would include communication properties, protocols, data formats
and concrete technologies.
b) Mobile Hardware: Mobile Hardware includes mobile devices or device components that receive or access
the service of mobility.
They would range from Portable laptops, Smart Phones, Tablet PCs, and Personal Digital Assistants
(PDA) that use an existing and established network to operate on.
The characteristics of mobile computing hardware are defined by the size and form factor, weight,
microprocessor, primary storage, secondary storage, screen size and type, means of input, means of
output, battery life, communications capabilities, expandability and durability of the device.
c) Mobile Software: Mobile Software is the actual programme that runs on the mobile hardware and deals
with the characteristics and requirements of mobile applications. It is the operating system of that
appliance and is the essential component that makes the mobile device operates.
Mobile applications popularly called Apps are being developed by organizations for use by customers
but these apps could represent risks, in terms of flow of data as well as personal identification risks,
introduction of malware and access to personal information of mobile owner.
P a g e | 103
May 22 E-Commerce, M-Commerce & Emerging Technologies
In general, Mobile Computing is a versatile and strategic technology that increases information quality and
accessibility, enhances operational efficiency, and improves management effectiveness.
But, more specifically, it leads to a range of tangible benefits, including the following:
i) It provides mobile workforce with remote access to work order details, such as work order location,
contact information, required completion date, asset history relevant warranties/service contracts.
ii) It enables mobile sales personnel to update work order status in real- time, facilitating excellent
communication.
iii) It facilitates access to corporate services and information at any time, from anywhere.
iv) It provides remote access to the corporate Knowledge base at the job location. It enables to improve
management effectiveness by enhancing information quality, information flow, and ability to control
a mobile workforce.
Concept Problem 14
Answer
Some of best practices of Green Computing is as follows:
i) Develop a sustainable Green Computing plan
▪ Involve stakeholders to include checklists, recycling policies, recommendations for disposal of used
equipment, government guidelines and recommendations for purchasing green computer equipment in
organizational policies and plans;
▪ Encourage the IT community for using the best practices and encourage them to consider green
computing practices and guidelines.
▪ On-going communication about commitment to green IT best practices to produce notable results.
▪ Include power usage, reduction of paper consumption, as well as recommendations for new equipment
and recycling old machines in organizational policies and plans; and
▪ Use cloud computing so that multiple organizations share the same computing resources thus
increasing the utilization by making more efficient use of hardware resources.
ii) Recycle
▪ Dispose e-waste according to central, state and local regulations;
▪ Discard used or unwanted electronic equipment in a convenient and environmentally responsible
104 | P a g e
E-Commerce, M-Commerce & Emerging Technologies May 22
▪ Manufacturers must offer safe end-of-life management and recycling options when products become
unusable; and
▪ Use Server and storage virtualization that can help to improve resource utilization, reduce energy costs
and simplify maintenance.
▪ While printing documents; make sure to use both sides of the paper, recycle regularly, use smaller
fonts and margins, and selectively print required pages.
v) Conserve Energy
▪ Use Liquid Crystal Display (LCD) monitors rather than Cathode Ray Tube (CRT) monitors;
▪ Develop a thin-client strategy wherein thin clients are smaller, cheaper, simpler for manufacturers to
build than traditional PCs or notebooks and most importantly use about half the power of a traditional
desktop PC;
▪ Power-down the CPU and all peripherals during extended periods of inactivity;
▪ Try to do computer-related tasks during contiguous, intensive blocks of time, leaving hardware off at
other times;
▪ Employ alternative energy sources for computing workstations, servers, networks and data centers;
▪ Adapt more of Web conferencing instead of travelling to meetings in order to go green and save
energy.
Concept Problem 15
P a g e | 105
May 22 E-Commerce, M-Commerce & Emerging Technologies
Mobile Computing is an important and rapidly evolving technology that allows users to transmit data from
remote location to other locations in mobility condition. Being a communication expert, identify the
limitations in current scenario that impede users to use this technology frequently.
or
Though Mobile computing is a versatile and strategic technology that increases information quality and
accessibility, however, it has its own limitations. Analyse them.
Answer
Limitations of Mobile Computing are as follows:
i) Insufficient Bandwidth: Mobile Internet access is generally slower than direct cable connections using
technologies such as General Packet Radio Service (GPRS) and Enhanced Data for GSM (Global System
for Mobile Communication) Evolution (EDGE), and 3G networks. These networks are usually available
within range of commercial cell phone towers. Higher speed wireless LANs are inexpensive but have very
limited range.
ii) Security Standards: When working mobile, one is dependent on public networks, requiring careful use of
Virtual Private Network (VPN). Security is a major concern while concerning the mobile computing
standards on the fleet. One can easily attack the VPN through a huge number of networks
interconnected through the line.
iii) Power consumption: When a power outlet or portable generator is not available, mobile computers must
rely entirely on battery power. Combined with the compact size of many mobile devices, this often
means unusually expensive batteries must be used to obtain the necessary battery life.
iv) Transmission interferences: Weather, terrain, and the range from the nearest signal point can all
interfere with signal reception. Reception in tunnels, some buildings, and rural areas is often poor.
v) Potential health hazards: People who use mobile devices while driving is often distracted from driving,
and are thus assumed more likely to be involved in traffic accidents. Cell phones may interfere with
sensitive medical devices. There are allegations that cell phone signals may cause health problems.
vi) Human interface with device: Screens and keyboards tends to be small, which may make them hard to
use. Alternate input methods such as speech or handwriting recognition require training.
Concept Problem 16
106 | P a g e
E-Commerce, M-Commerce & Emerging Technologies May 22
with academic institutions. The digital content may be stored locally, or accessed remotely via
computer networks. An electronic library is a type of information retrieval system.
b) Web Portal: This shall provide the interface through which an individual / organization shall perform e-
commerce transactions. Web Portal is the application through which user interacts with the e-
commerce vendor. The front end through which user interacts for an e-commerce transaction. These
web portals can be accessed through desktops / laptops / PDA / hand- held computing devices /
mobiles and now through smart TVs also.
Concept Problem 17
Thus, the core concept of Virtualization lies in Partitioning, which divides a single physical server into
multiple logical servers. For example - Partitioning of a hard drive is considered virtualization because one
drive is partitioned in a way to create two separate hard drives. Devices, applications and human users can
interact with the virtual resource as if it were a real single logical resource.
ii) Disaster Recovery: Virtual machines can be used as “hot standby” environments for physical production
servers. This changes the classical “backup-and-restore” philosophy, by providing backup images that
can “boot” into live virtual machines, capable of taking over workload for a production server
experiencing an outage.
iii) Testing and Training: Virtualization can give root access to a virtual machine. This can be very useful
such as in kernel development and operating system courses.
iv) Portable Applications: Portable applications are needed when running an application from a removable
drive, without installing it on the system’s main disk drive. Virtualization can be used to encapsulate the
application with a redirection layer that stores temporary files, windows registry entries and other state
information in the application’s installation directory and not within the system’s permanent file
system.
v) Portable Workspaces: Recent technologies have used virtualization to create portable workspaces on
devices like iPods and USB memory sticks.
P a g e | 107
May 22 E-Commerce, M-Commerce & Emerging Technologies
Concept Problem 18
Every business decision is accompanied with a set of threats and so is BYOD program. Explain the areas in
which the risks associated with BYOD program can be classified.
Answer
The risks associated with Bring Your Own Device (BYOD) program are classified as below:
i) Network Risks: It is normally exemplified and hidden in ‘Lack of Device Visibility’. When company-
owned devices are used by all employees within an organization, the organization’s IT practice has
complete visibility of the devices connected to the network. This helps to analyze traffic and data
exchanged over the Internet. As BYOD permits employees to carry their own devices (smart phones,
laptops for business use), the IT practice team is unaware about the number of devices being
connected to the network. As network visibility is of high importance, this lack of visibility can be
hazardous.
ii) Device Risks: It is normally exemplified and hidden in ‘Loss of Devices’. A lost or stolen device can
result in an enormous financial and reputational embarrassment to an organization as the device may
hold sensitive corporate information. Data lost from stolen or lost devices ranks as the top security
threats as per the rankings released by Cloud Security Alliance. With easy access to company emails
as well as corporate intranet, company trade secrets can be easily retrieved from a misplaced device.
iii) Application Risks: It is normally exemplified and hidden in ‘Application Viruses and Malware’. A related
report revealed that most employees’ phones and smart devices that were connected to the corporate
network weren’t protected by security software. With an increase in mobile usage, mobile
vulnerabilities have increased concurrently. Organizations are not clear in deciding that ‘who is
responsible for device security – the organization or the user’.
iv) Implementation Risks: It is normally exemplified and hidden in ‘Weak BYOD Policy’. The effective
implementation of the BYOD program should not only cover the technical issues mentioned above but
also mandate the development of a robust implementation policy. Because corporate knowledge and
data are key assets of an organization, the absence of a strong BYOD policy would fail to communicate
employee expectations, thereby increasing the chances of device misuse.
Concept Problem 19
Explain the pertinent issues involved in cloud computing implementation.
Answer
As an emerging technology, cloud computing involves several issues. Some of the pertinent issues related to
cloud computing are:
i) Threshold Policy: The main objective of implementing threshold policy is to inform cloud computing
service consumers and providers what they should do. Quite often, this policy does not exist. The only
legal document between the customer and service provider is the Service Level Agreement (SLA). This
document contains all the agreements between the customer and the service provider; it contains
what the service provider is doing and is willing to do.
108 | P a g e
E-Commerce, M-Commerce & Emerging Technologies May 22
However, there is no standard format for the SLA, and as such, there may be services not documented
in the SLA that the customer may be requiring in future. A carefully drafted threshold policy outlines
what cloud computing service consumers and providers should do. It is important to consider how the
cloud service provider will handle sudden increases or decreases in demand. How will unused resources
be allocated?
ii) Interoperability: If a company enters into a contract with one cloud computing vendor, it may find it
difficult to change to another computing vendor that has proprietary APIs (application programming
interfaces) and different formats for importing and exporting data. Industry cloud computing
standards do not exist for APIs or formats for importing/exporting data.
This creates problems of achieving interoperability of applications between two cloud computing
vendors. Once a company is locked in with one cloud provider, it is not easy to move an entire
infrastructure to other clouds. Moreover, each cloud provider offers a unique set of services and tools for
operating and controlling its cloud. Learning a new cloud environment is similar to learning a new
technology.
iii) Hidden Costs: Such costs may include higher network charges for storage and database applications,
or latency issues for users who may be located far from cloud service providers.
iv) Unexpected Behaviour: An application may perform well at the company’s internal data centre. It does
not necessarily imply that the application will perform the same way in the cloud. Therefore, it is
essential to test its performance in the cloud for unexpected behaviour. Testing may include checking
how the application allocates resources on sudden increase in demand for resources and how it
allocates unused resources.
v) Security Issues: Cloud computing infrastructures use new technologies and services, most which have
not been fully evaluated with respect to security. The important security issues with cloud computing
are:
Maintaining confidentiality is one the major issues faced in cloud systems because information is
stored at a remote location which can be accessed by the service provider. Data confidentiality can be
preserved by encrypting data. Cloud systems share computational resources, storage, and services
between multiple customer applications in order to achieve efficient utilization of resources while
decreasing cost. However, this sharing of resources may violate the confidentiality users’ IT Assets.
vi) Legal Issues: Cloud systems need to adhere to several regulatory requirements, privacy laws and data
security laws. These laws vary from country to country and cloud users have no control over where
their data is physically located.
vii) Software Development in Cloud: From the perspective of the application development, developers face
the complexity of building secure applications that may be hosted in the cloud. The speed at which
applications will change in the cloud will affect both the System Development Life Cycle (SDLC) and
P a g e | 109
May 22 E-Commerce, M-Commerce & Emerging Technologies
security.
viii) Bugs in Large-Scale Distributed Systems: One of the difficult challenges in Cloud Computing is
removing errors in these very large-scale distributed systems.
Concept Problem 20
Concept Problem 21
For example: Washing machines with Wi-Fi networking capabilities can connect themselves to home
Wi-Fi. Once these machines are so connected, they can be controlled through machine manufacturer
mobile app from anywhere in the world.
b) Payment Gateway: It is the payment mode through which customers shall make payments. Payment
gateway represents the way e-commerce / m-commerce vendors collects their payments.
The payment gateway is the last and most critical part of e-commerce transactions. These assures
seller of receipt of payment from buyer of goods / services from e-commerce vendors.
Presently numerous methods of payments by buyers to sellers are being used including Credit / Debit
Card Payments, Online bank payments, Vendors own payment wallet, Third Party Payment wallets, like
SBI BUDDY or PAYTM, Cash on Delivery (COD) and Unified Payments Interface (UPI).
Concept Problem 22
110 | P a g e
E-Commerce, M-Commerce & Emerging Technologies May 22
iv) Washing machines with Wi-Fi networking capabilities can connect themselves to home Wi-Fi. Once
these machines are so connected, they can be controlled through machine manufacturer mobile APP
from anywhere in the world.
v) India’s living legend of cricket appearing in an Advertisement for water purifier informs that, the water
purifier is Wi-Fi enabled. When the purifying agents deplete in the machine, it connects to home Wi-Fi
and informs the service agents of the company.
Concept Problem 23
Describe any six commercial laws each in brief, that are applicable to any e-commerce or m-commerce
transactions.
Or
With promotion of cashless economy, most of the businesses are using e-commerce and m-commerce
transactions. Enlist the commercial laws that are applicable to these transactions.
Answer
All e-commerce transactions are commercial business transactions. All these transactions are covered
under multiple laws, including commercial laws. Following commercial laws are applicable to e-commerce
and m-commerce transactions.
i) Income Tax Act, 1961: Income Tax Act, has detailed provisions regarding taxation of income in India. In
respect of e-commerce / m-commerce transactions, the issue of deciding place of origin transaction
for tax purpose is critical.
ii) Companies Act, 2013: Companies Act, 2013, regulates the corporate sector. The law defines all
regulatory aspects for companies in India. Most of the merchants in e-commerce/m-commerce
business are companies, both private and public.
iii) Foreign Trade (Development and Regulation) Act, 1992: An Act to provide for the development and
regulation of foreign trade by facilitating imports into, augmenting exports from, India and for matters
connected therewith or incidental thereto. Amazon has recently allowed Indian citizens to purchase
from its global stores. All these shall be regulated through above law.
iv) The Factories Act, 1948: Act to regulate working conditions of workers. The act extends to place of
storage as well as transportation. Most of the merchants in e- commerce / m-commerce business
need to comply with provisions of the act.
v) The Custom Act, 1962: The act that defines import / export of goods / services from India and provides
for levy of appropriate customs duty. India being a signatory to General Agreement on Trade and Tariff
(GATT) under World Trade Organization, cannot levy any custom duty that GATT non-compliant.
vi) The Goods and Services Tax Act, 2017 (GST): This Act requires each applicable business, including e-
P a g e | 111
May 22 E-Commerce, M-Commerce & Emerging Technologies
commerce/ m-commerce, to upload each sales and purchase invoice on one central IT infrastructure,
mandating reconciliations of transactions between business, triggering of tax credits on payments of
GST, facilitating filling of e-returns, etc.
vii) Indian Contract Act,1872: The act defines constituents of a valid contract. In case of e-commerce /
m-commerce business it becomes important to define these constituents.
viii) The Competition Act, 2002: Law to regulate practices that may have adverse effect on competition in
India. Competition Commission have been vigilant to ensure that e-commerce / m-commerce
merchants do not engage in predatory practices.
ix) Foreign Exchange Management Act (FEMA 1999): The law to regulate foreign direct investments, flow
of foreign exchange in India. The law has important implications for e-commerce / m-commerce
business. Foreign investment in Business to Customer (B2C) e-commerce activities has been opened
in a calibrated manner and an entity is permitted to undertake retail trading through e-commerce
under certain circumstances.
x) Consumer Protection Act, 1986: The law to protect consumer rights has been source of most of
litigations for transaction done through e-commerce and m- commerce.
Concept Problem 24
e-business benefits individuals, businesses, government and society at large. As a business seller, analyse
the benefits that you would draw from e-business.
Answer
e-businesses benefits individuals, businesses, governments and society at large. As a seller, the benefits to
Business / Sellers are as follows:
i) Increased Customer Base: Since the number of people getting online is increasing, which are creating
not only new customers but also retaining the old ones.
ii) Recurring payments made easy: Each business has number of operations being homogeneous. Brings in
uniformity of scaled operations.
iii) Instant Transaction: The transactions of e commerce are based on real time processes. This has made
possible to crack number of deals.
iv) Provides a dynamic market: Since there are several players, providing a dynamic market which enhances
quality and business.
v) Reduction in costs:
▪ To buyers from increased competition in procurement as more suppliers are able to compete in an
electronically open marketplace.
▪ To suppliers by electronically accessing on-line databases of bid opportunities, on- line abilities to
submit bids, and on-line review of rewards.
112 | P a g e
E-Commerce, M-Commerce & Emerging Technologies May 22
▪ Advertising costs.
vi) Efficiency improvement due to:
vii) Creation of new markets: This is done through the ability to easily and cheaply reach potential
customers.
viii) Easier entry into new markets: This is especially into geographically remote markets, for enterprises
regardless of size and location.
ix) Better quality of goods: As standardized specifications and competition have increased and improved
variety of goods through expanded markets and the ability to produce customized goods.
x) Elimination of Time Delays: Faster time to market as business processes are linked, thus enabling
seamless processing and eliminating time delays.
Concept Problem 25
The Prime Minister Office of a country X plans to establish specific infrastructure setup with its access
shared amongst members of the group constituting of some selected high-profiled dignitaries and officers
from different ministries. The objective of the group is to carry out certain assignments related to nation’s
security and integrity. Which is the most suitable choice of the cloud under Cloud Computing? Discuss its
advantages and limitations as well.
Answer
The most suitable choice is Community Cloud which is the cloud infrastructure provisioned for exclusive use
by a specific community of consumers from organizations that have shared concerns (e.g., mission security
requirements, policy, and compliance considerations). It may be owned, managed, and operated by one or
more of the organizations in the community, a third party or some combination of them, and it may exist
on or off premises. In this, a private cloud is shared between several organizations. This model is suitable for
organizations that cannot afford a private cloud and cannot rely on the public cloud either.
The limitation of the Community Cloud is that the autonomy of the organization is lost and some of the
security features are not as good as the private cloud. It is not suitable in the cases where there is no
collaboration.
P a g e | 113
May 22 E-Commerce, M-Commerce & Emerging Technologies
Concept Problem 26
ABC university wants to conduct online exams for its different courses for which a contract is given to
vendor XYZ. The vendor provides computing resources such as processing power, memory, storage, and
networks to ABC university users to run their online exam application on-demand. Identify the Service
Model of Cloud Computing that vendor XYZ is providing to ABC university and also describe its
characteristics.
Or
Describe any four characteristics of Infrastructure as a Service (IaaS).
Answer
The Service Model provided by vendor XYZ to ABC university is Infrastructure as a Service (IaaS).
Characteristics of Infrastructure as a Service (IaaS) of Cloud Computing are as follows:
i) Web access to the resources: The IaaS model enables the IT users to access infrastructure resources
over the Internet. When accessing a huge computing power, the IT user need not get physical access to
the servers.
ii) Centralized Management: The resources distributed across different parts are controlled from any
management console that ensures effective resource management and effective resource utilization.
iii) Elasticity and Dynamic Scaling: Depending on the load, IaaS services can provide the resources and
elastic services where the usage of resources can be increased or decreased according to the
requirements.
iv) Shared infrastructure: IaaS follows a one-to-many delivery model and allows multiple IT users to share
the same physical infrastructure and thus ensure high resource utilization.
v) Metered Services: IaaS allows the IT users to rent the computing resources instead of buying it. The
services consumed by the IT user will be measured, and the users will be charged by the IaaS providers
based on the amount of usage.
Concept Problem 27
ABC Company is a supplier of kids’ garment successfully running its business offline as well as online. Now,
the company decides to launch its mobile app also so that its retail customers would be able to purchase or
place orders anytime and anywhere. Describe the method through which ABC Company will run its e-
Commerce architecture on Mobile app.
Answer
Mobile Applications are small piece of software developed specifically for the operating systems of
handheld devices such as mobile phones, PDAs and Tablet computers. Mobile Apps can come preloaded on
handheld devices or can be downloaded by users from the app stores over the Internet. The e-commerce
architecture that will run on mobile app is via M-Commerce (Mobile Commerce) that enables users to
access the Internet without needing to find a place to plug in. It has following three layers:
i) Client / User Interface: This layer helps the e-commerce customer connect to e-commerce merchant.
It includes Web Server, Web Browser and Internet. For example: If a user buys a mobile phone from an
114 | P a g e
E-Commerce, M-Commerce & Emerging Technologies May 22
e-commerce merchant it includes -User, Web Browser (Internet Explorer/Chrome) & Web Server.
ii) Application Layer: Through these application’s customer logs to merchant systems. This layer allows
customer to check the products available on merchant’s website. It includes Application Server and Back
End Server. For example - E-merchant, Reseller, Logistics partner.
iii) Database Layer: This layer is accessible to user through application layer. It includes the information
store house, where all data relating to products and price is kept.
Concept Problem 28
Ms. Y is using Google Apps through which she can access any application, service and data storage facilities
on the Internet and pay as-per-usage. Analyze which computing model is providing her these facilities.
Also, determine the model’s key characteristics.
Answer
Cloud computing model provides the facility to access shared resources and common infrastructure offering
services on demand over the network to perform operations that meet changing business needs. Thus, we
can say that Ms. Y is using the Cloud Computing model which allows her to use many computing resources
as a service through networks, typically the Internet.
ii) Pay-per-Use: We pay for cloud services only when we use them, either for the short term (for example,
for CPU time) or for a longer duration (for example, for cloud-based storage or vault services).
iii) On-demand: Because we invoke cloud services only when we need them, they are not permanent parts
of the IT infrastructure. This is a significant advantage for cloud use as opposed to internal IT services.
With cloud services, there is no need to have dedicated resources waiting to be used, as is the case
with internal services.
iv) Resiliency: The resiliency of a cloud service offering can completely isolate the failure of server and
storage resources from cloud users. Work is migrated to a different physical resource in the cloud with
or without user awareness and intervention.
v) Multi Tenancy: Public cloud service providers often can host the cloud services for multiple users within
the same infrastructure. Server and storage isolation may be physical or virtual depending upon the
specific user requirements.
vi) Workload Movement: This characteristic is related to resiliency and cost considerations. Here, cloud-
computing providers can migrate workloads across servers both inside the data center and across data
centers (even in a different geographic area). This migration might be necessitated by cost (less
expensive to run a workload in a data centre in another country based on time of day or power
requirements) or efficiency considerations (for example, network bandwidth). A third reason could be
regulatory considerations for certain types of workloads.
Concept Problem 29
P a g e | 115
May 22 E-Commerce, M-Commerce & Emerging Technologies
Digital Payment is a mechanism that has evolved with e-commerce transactions and are becoming
increasingly popular. Its advantageous for the banks to implement digital payments, however the same has
certain drawbacks also. Support the statement by identifying advantages as well as drawbacks of digital
payments.
Or
PQR limited is planning to receive payment from the customers through Digital Payments. Though there are
lots of benefits of digital payments but there are drawbacks as well. Briefly explain any six drawbacks of
digital payments.
Answer
Advantages of Digital Payments are as follows:
i) Easy and convenient: Digital payments are easy and convenient. Person do not need to take loads of
cash with themselves.
ii) Pay or send money from anywhere: With digital payment modes, one can pay from anywhere anytime.
iii) Discounts from taxes: Government has announced many discounts to encourage digital payments. User
get 0.75% discounts on fuels and 10% discount on insurance premiums of government insurers.
iv) Written record: User often forgets to note down his / her spending, or even if nothing is done it takes a
lot of time. These are automatically recorded in passbook or inside E-Wallet app. This helps to
maintain record, track spending and budget planning.
v) Less Risk: Digital payments have less risk if used wisely. If user losses mobile phone or debit/credit
card or Aadhar card, no need to worry a lot. No one can use anyone else’s money without MPIN, PIN or
fingerprint in the case of Aadhar. It is advised that user should get card blocked, if lost.
vi) Competitive advantage to business: Digital payment enables businesses to make sales to customers
who choose to pay electronically and gain a competitive advantage over those who accept payment
only through traditional methods.
ii) The risk of data theft: There is a big risk of data theft associated with the digital payment. Hackers
can hack the servers of the bank or the E-Wallet a customer is using and easily get his/her personal
information. They can use this information to steal money from the customer’s account.
iii) Overspending: One keeps limited cash in his/her physical wallet and hence thinks twice before
buying anything. But if digital payment modes are used, one has an access to all his/her money that
can result in overspending.
iv) Disputed transactions: In case the electronic money such as credit card is misused by someone else,
it is very difficult to receive a refund.
116 | P a g e
E-Commerce, M-Commerce & Emerging Technologies May 22
v) Increased business costs: Digital payment systems come with an increased need to protect sensitive
financial information stored in a business’s computer systems from unauthorized access. Businesses
have to incur additional costs in procuring, installing and maintaining sophisticated payment-
security technologies.
vi) The necessity of internet access: Digital payment cannot be performed if Internet connection fails.
Concept Problem 30
To an individual/user/customer, identify various benefits that he can draw from E-commerce transactions.
Answer
Various benefits of an e-commerce transaction to Customer / Individual / User are as follows:
i) Convenience: Every product at the tip of individual’s fingertips on internet.
ii) Time saving: Number of operations that can be performed both by potential buyers and sellers increase.
iii) Various Options: There are several options available for customers which are not only being easy to
compare but are provided by different players in the market.
iv) Easy to find reviews: There are often reviews about a site or product from the previous customers which
provides valuable feedback.
v) Coupon and Deals: There are discount coupons and reward points available for customers to encourage
online transaction.
vi) Anytime Access: Even midnight access to the e commerce platforms is available which brings in
customer suitability.
Concept Problem 31
Answer
The characteristics of Hybrid Cloud are as follows:
i) Scalable: The hybrid cloud has the property of public cloud with a private cloud environment and as the
public cloud is scalable; the hybrid cloud with the help of its public counterpart is also scalable.
ii) Partially Secure: The private cloud is considered as secured and public cloud has high risk of security
breach. The hybrid cloud thus cannot be fully termed as secure but as partially secure.
iii) Stringent SLAs: Overall the SLAs are more stringent than the private cloud and might be as per the
public cloud service providers.
iv) Complex Cloud Management: Cloud management is complex as it involves more than one type of
deployment models and the number of users is high.
Concept Problem 32
P a g e | 117
May 22 E-Commerce, M-Commerce & Emerging Technologies
Prepare a list of the constraints that are required to develop Grid Computing Security.
Answer
Refer answer to Concept Problem 1
Concept Problem 33
The basic idea of Hardware virtualization is to consolidate many small physical servers into one large
physical server so that the processor can be used more effectively. The software that creates a virtual
machine on the host hardware is called a hypervisor or Virtual Machine Manager. The hypervisor controls
the processor, memory and other components by allowing several different operating systems to run on the
same machine without the need for a source code. The operating system running on the machine will
appear to have its own processor, memory and other components.
Various equipment and software vendors offer network virtualization by combining any of the Network
hardware such as switches and Network Interface Cards (NICs); Network elements such as firewalls and
load balancers; Networks such as virtual LANs (VLANs); Network storage devices; Network machine-to-
machine elements such as telecommunications devices; Network mobile elements such as laptop
computers, tablet computers, smart phones and Network media such as Ethernet and Fibre Channel.
Network virtualization is intended to optimize network speed, reliability, flexibility, scalability, and
security.
Concept Problem 34
118 | P a g e
E-Commerce, M-Commerce & Emerging Technologies May 22
Answer
Traditional Methods of Digital Payment are as follows:
i) Cards: Cards are provided by banks to their account holders. These have been the most used digital
payment modes till now. Various types of cards are as follows:
a. Credit Cards: A small plastic card issued by a bank, or issuer etc., allowing the holder to purchase
goods or services on credit. In this mode of payment, the buyer’s cash flow is not immediately
impacted. User of the card makes payment to card issuer at end of billing cycle which is generally
a monthly cycle. Credit Card issuer charge customers per transactions / 5% of transaction as
transaction fees.
b. Debits Cards: A small plastic card issued by a bank. Allowing the holder to purchase goods or
services on credit. In this mode of payment, the buyer’s cash flow is immediately affected that as
soon as payment is authorized buyers account is debited.
c. Smart Card: Smart card is a prepaid card similar to credit card and debit card in appearance, but
it has a small microprocessor chip embedded in it. It has capacity to store customer’s personal
information such as financial facts, private encryption keys, credit card information, account
information, and so on.
Moreover, these are not linked to any bank account. For this reason, smart card holder is not
mandated to have a bank account. It is also used to store money which is reduced as per usage.
Mondex and Visa Cash cards are examples of smart cards. The smart card holder has to load
money onto the card by paying cash or through transfer from his/her bank account. After loading
the money onto the card, the cardholder can use the card to spend money up to the limit of
loaded amount in the same way as using a credit or debit card. Once the loaded amount is spent,
the cardholder may reload money onto the card.
ii) Net Banking: In this mode, the customers log to his / her bank account and makes payments. All public
sectors, large private sector banks allow net banking facilities to their customers.
Concept Problem 35
Explain various Control Objectives of e-commerce o r m-commerce.
Answer
Various Control Objectives of e-Commerce or m-Commerce are as follows:
i) Prevent organizational costs of data Loss: Data is a critical resource of an organization for its present
and future process and its ability to adapt and survive in a changing environment.
ii) Prevent loss from incorrect decision making: Management and operational controls taken by managers
involve detection, investigations and correction of out-of- control processes. These high-level decisions
require accurate data to make quality decision rules.
iii) Prevent loss of Computer Hardware, Software and Personnel: These are critical resources of an
organization which has a credible impact on its infrastructure and business competitiveness.
iv) Prevent from high costs of computer Error: In a computerized enterprise environment where many
critical business processes are performed, a data error during entry or process would cause great
P a g e | 119
May 22 E-Commerce, M-Commerce & Emerging Technologies
damage.
v) Safeguard assets from un-authorized access: The information system assets (hardware, software,
data files etc.) must be protected by a system of internal controls from unauthorized access.
vi) Ensure data integrity: The importance to maintain integrity of data of an organization depends on the
value of information, the extent of access to the information and the value of data to the business
from the perspective of the decision maker, competition and the market environment.
vii) System Effectiveness Objectives: Effectiveness of a system is evaluated by auditing the characteristics
and objective of the system to meet substantial user requirements.
viii) System Efficiency Objectives: To optimize the use of various information system resources (machine
time, peripherals, system software and labour) along with the impact on its computing environment.
Concept Problem 36
Public cloud is the cloud infrastructure that is provisioned for open use by the general public. Explain any four
characteristics of public cloud.
Answer
The characteristics of Public Cloud are as follows:
i) Highly Scalable: The resources in the public cloud are large in number and the service providers make
sure that all requests are granted. Hence public clouds are scalable.
ii) Affordable: The cloud is offered to the public on a pay-as-you-go basis; hence the user has to pay
only for what he or she is using on a per-hour basis. And this does not involve any cost related to the
deployment.
iii) Less Secure: Since it is offered by a third party and they have full control over the cloud, the public
cloud is less secure out of all the other deployment models.
iv) Highly Available: It is highly available because anybody from any part of the world can access the
public cloud with proper permission, and this is not possible in other models as geographical or other
access restrictions might be there.
v) Stringent Service Level Agreements: As the service provider’s business reputation and customer
strength are totally dependent on the cloud services, they follow SLAs strictly & violations are avoided.
Concept Problem 37
Explain the concept of green computing. How will you develop a sustainable green computing plan?
Answer
Green Computing or Green IT refers to the study and practice of environmentally sustainable computing or
IT. It is the study and practice of establishing/ using computers and IT resources in a more efficient and
environmentally friendly and responsible way.
The objective of Green computing is to reduce the use of hazardous materials, maximize energy efficiency
during the product’s lifetime, and promote the recyclability or biodegradability of defunct products and
120 | P a g e
E-Commerce, M-Commerce & Emerging Technologies May 22
factory waste.
Green computing’s practices include the implementation of energy-efficient Central Processing Units
(CPUs), servers and peripherals as well as reduced resource consumption and proper disposal of elec tronic
waste (e-waste).
b) Encourage the IT community for using the best practices and encourage them to consider green
computing practices and guidelines.
c) On-going communication about commitment to green IT best practices to produce notable results.
d) Include power usage, reduction of paper consumption, as well as recommendations for new equipment
and recycling old machines in organizational policies and plans; and
e) Use cloud computing so that multiple organizations share the same computing resources thus
increasing the utilization by making more efficient use of hardware resources.
Concept Problem 38
A business model is adopted by an organization as a framework to describe how it makes money on a
sustainable basis & grows whereas an e-business model utilizes the benefits of electronic communications.
Discuss various e-market models that help businesses to achieve the value adding processes.
Answer
The various e-market models that help businesses to achieve the value adding processes are as follows:
i) e-Shops (e-tailers): An e-shop is a virtual store front that sells products and services online. E-shop
is an online version of retail stores where customers can shop at any hour of the day or night without
leaving home. They are convenient way of effecting direct sales to customers; allow manufacturers to
bypass intermediate operators and thereby reduce costs and delivery times. For example:
www.sonicnet.com, www.wforwomen.com
ii) e-Malls: The e-mall is defined as the retailing model of a shopping mall, a conglomeration of
different shops situated in a convenient location in e-commerce. E-malls help the consumers from a
variety of stores. For e.g., Yahoo! Stores
iii) e-auctions: Electronic auctions provide a channel of communication through which the bidding
process for products and services can take place between competing buyers. At e-auctions, people
buy and sell through an auction website. In e- auctions, almost perfect information is available about
products, prices, current demand, and supply. E-auction has become an increasingly popular tool for
the buyer to access the lowest price the suppliers are willing to charge. Example – www.onsale.com,
www.ebay.com
iv) Portals: Portal is a website that serves as a gateway or a main entry point on the internet to a
specific field of interest or an industry. It is a website that is positioned as an entrance to other sites
on the internet. A portal consists of web pages that act as a starting point for using the web or web -
P a g e | 121
May 22 E-Commerce, M-Commerce & Emerging Technologies
based services. The control of content can be a source of revenue for firms through charging firms fo r
advertising or charging consumers a subscription for access. Some major general portals include
Yahoo, Excite, and Netscape.
v) Buyer Aggregators: The Buyer Aggregator brings together large numbers of individual buyers so that
they can gain the types of savings that are usually the privilege of large volume buyers. In this, the
firm collects the information about goods/service providers, make the providers their partners, and
sell their services under its own brand. Example - www.zomato.com
vi) Virtual Communities: Virtual Community is a community of customers who share a common interest
and use the internet to communicate with each other. Amazon.com provides websites for the
exchange of information on a wide range of subjects relating to their portfolio of products and
services. Virtual communities’ benefit from network externalities whereby the more people who jo in
and contribute to the community, the greater the benefits that accrue, but without any additional
cost to participants.
vii) e-procurement: e-procurement is the management of all procurement activities via electronic means.
Business models based on e-procurement seek efficiency in accessing information on suppliers,
availability, price, quality and delivery times as well as cost savings by collaborating with partners to
pool their buying power and secure best value deals. E-procurement infomediaries specialize in
providing up-to-date & real-time information on all aspects of the supply of materials to businesses.
viii) e-distribution: e-distributor is a company that supplies products and services directly to individual
business. The e-distribution model helps distributors to achieve efficiency savings by managing large
volumes of customers, automating orders, communicating with partners and facilitati ng value-adding
services such as order tracking through each point in the supply chain. An example of a firm
specializing in e-distribution is www.wipro.com that uses the internet to provide fully integrated e-
business-enabled solutions that help to unify the information flows across all the major distribution
processes including sales and marketing automation, customer service, warehouse logistics,
purchasing and inventory management, and finance.
Concept Problem 39
Grid computing is a distributed architecture of large numbers of computers connected to solve a complex
problem. With reference to this line, identify the application areas where this technology can be used
effectively and efficiently.
Answer
The application areas where Grid Computing can be used effectively and efficiently are as follows:
a) Civil engineers collaborate to design, execute, & analyze shake table experiments.
b) An insurance company mines data from partner hospitals for fraud detection.
e) Large-scale science and engineering are done through the interaction of people, heterogene ous
122 | P a g e
E-Commerce, M-Commerce & Emerging Technologies May 22
computing resources, information systems and instruments, all of which are geographically and
organizationally dispersed.
Concept Problem 40
Ms. Anita, a final year student of undergraduate course had to submit her project report in pdf form. She
initially prepared her report in MS Word and used online software from google to edit the photos used in
her assignment. Later, for final submission, she used online pdf converter to convert her word file into pdf.
Identify the Cloud Computing Service Model that is being used by her and further discuss the Model’s
different instances.
Answer
The Cloud Computing service model used by Ms. Anita is Software as a Service (SaaS). The different
instances of the model are as follows:
a) Testing as a Service (TaaS): This provides users with software testing capabilities such as generation
of test data, generation of test cases, execution of test cases and test result evaluation on a pay-per-
use basis.
b) API as a Service (APIaaS): This allows users to explore functionality of Web services such as Google
Maps, Payroll processing, and credit card processing services etc.
c) Email as a Service (EaaS): This provides users with an integrated system of emailing, office
automation, records management, migration, and integration services with archiving, spam blocking,
malware protection, and compliance features.
Concept Problem 41
Cloud Computing is an emerging technology that provides various service models to business organizations
for storage, networking, and other services. However, many limitations are associated with this
technology. Briefly explain the drawbacks of Cloud Computing .
Answer
The drawbacks of Cloud Computing are as follows:
a) If Internet connection is lost, the link to the cloud and thereby to the data and applications is lost.
b) Security is a major concern as entire working with data and applications depend on other cloud
vendors or providers.
c) Although Cloud computing supports scalability i.e. quickly scaling up and down computing resources
depending on the need, it does not permit the control on these resources as these are not owned by
the user or customer.
d) Depending on the cloud vendor or provide, customers may have to face restrictions on the availability
of applications, operating systems and infrastructure options.
e) Interoperability (ability of two or more applications that are required to support a business need to
work together by sharing data and other business-related resources) is an issue wherein all the
applications may not reside with a single cloud vendor and two vendors may have applications that do
not cooperate with each other.
Concept Problem 42
SCI Labs is an organization involved in research and development of new medicines and drugs. The
company has five branches in different cities across the country interconnected using Grid Computing
P a g e | 123
May 22 E-Commerce, M-Commerce & Emerging Technologies
model so as to share the resources and research that are carried out in its different branches. Explain the
benefits that SCI Labs may incur while using Grid Computing.
Answer
The benefits that SCI Labs may incur while using Grid Computing are as follows:
a) Making use of Underutilized Resources: In most organizations, there are large amounts of
underutilized computing resources including even the server machines. Grid computing provides a
framework for exploiting these underutilized resources and thus has the possibility of substantially
increasing the efficiency of resource usage. Grid computing (more specifically, a data grid) can be
used to aggregate this unused storage into a much larger virtual data store, possibly configured to
achieve improved performance and reliability over that of any single machine.
b) Resource Balancing: For applications that are grid-enabled, the grid can offer a resource balancing
effect by scheduling grid jobs on machines with low utilization. This feature of grid computing
handles occasional peak loads of activity in parts of a larger organization. An unexpected peak can
be routed to relatively idle machines in the grid; and if the grid is already fully utilized, the lowest
priority work being performed on the grid can be temporarily suspended or even cancelled and
performed again later to make room for the higher priority work.
c) Parallel CPU Capacity: The potential for usage of massive parallel CPU capacity is one of the most
common visions and attractive features of a grid. A CPU-intensive grid application can be thought of
as many smaller sub-jobs, each executing on a different machine in the grid. To the extent that
these sub-jobs do not need to communicate with each other, the more scalable the application
becomes. A perfectly scalable application will, for example, finish in one tenth of the time if it uses
ten times the number of processors.
d) Access to additional resources: In addition to CPU and storage resources, a grid can provide access to
other resources as well. For example, if a user needs to increase their total bandwidth to the Internet
to implement a data mining search engine, the work can be split among grid machines that have
independent connections to the Internet. In this way, total searching capability is multiplied, since
each machine has a separate connection to the Internet.
e) Reliability: High-end conventional computing systems use expensive hardware to increase reliability.
The machines also use duplicate processors in such a way that when they fail, one can be replaced
without turning the other off. Power supplies and cooling systems are duplicated. The systems are
operated on special power sources that can start generators if utility power is interrupted. All of this
builds a reliable system, but at a great cost, due to the duplication of expensive components.
f) Management: The goal to virtualize the resources on the grid and more uniformly handle
heterogeneous systems create new opportunities to better manage a larger, more distributed IT
infrastructure. The grid offers management of priorities among different projects. Aggregating
utilization data over a larger set of projects can enhance an organization’s ability to project future
upgrade needs. When maintenance is required, grid work can be rerouted to other machines without
crippling the projects involved.
Concept Problem 43
124 | P a g e
E-Commerce, M-Commerce & Emerging Technologies May 22
Cloud Computing service model is used to provide services in terms of hardware (IaaS), software (SaaS)
and prebuilt computing platform to deploy and develop applications (PaaS). Explain the service models of
cloud computing other than mentioned above that can be used for further services.
Answer
The other service models apart from IaaS, SaaS and PaaS of Cloud Computing are as follows:
b) Data as a Service (DaaS): It provides data on demand to a diverse set of users, systems or
application. The data may include text, images, sounds, and videos. Data encryption and operating
system authentication are commonly provided for security. DaaS users have access to high-quality
data in a centralized place and pay by volume or data type, as needed. However, as the data is owned
by the providers, users can only perform read operations on the data. DaaS is highly used in
geography data services and financial data services.
c) Security as a Service (SECaaS): It is an ability given to the end user to access the security service
provided by the service provider on a pay-per-use basis. It is a new approach to security in which
cloud security is moved into the cloud itself whereby cloud service users will be protected from within
the cloud using a unified approach to threats.
d) Identity as a Service (IDaaS): It is an ability given to the end users; typically, an organization or
enterprise; to access the authentication infrastructure that is built, hosted, managed, and provided by
the third-party service provider. Generally, IDaaS includes directory services, authentication services,
risk and event monitoring, single sign-on services, and identity and profile management.
Concept Problem 44
Mr. X used to purchase electronic gadgets such as laptops, mobile phones etc. on regular basis online from
M-Commerce vendor ABC. He then used to return the products with complaints that the said product is
defective and is not working. In fact, Mr. X used to replace the original part of the product with the duplicate
defective piece. The fraud came in notice only after 2 years. Considering the above facts, comment on the
weakness of control mechanism of ABC towards the commission of fraud by Mr. X.
Answer
Following were control lapses on the part of M-Commerce vendor ABC that led to the commission of an
offence of fraud committed by Mr. X.
a) Vendor has a poor policy documentation regarding accepting of mobile returns as objective.
b) Within organization, there must have been a person putting a red mark, when the same person was
returning mobile as defective.
c) This reflects poor audit mechanism of the vendor. These control lapses reflect higher probability of
loss.
P a g e | 125
May 22 E-Commerce, M-Commerce & Emerging Technologies
Concept Problem 45
Briefly explain the advantages of business policy “Bring in Your Own Device” (BYOD).
Answer
Following are the advantages of BYOD plicy:
a) Happy Employees: Employees love to use their own devices when at work. This also reduces the number
of devices an employee has to carry; otherwise he would be carrying his personal as well as
organization provided devices.
b) Lower IT budgets: Could involve financial savings to the organization since employees would be using
the devices, they already possess thus reducing the outlay of the organization in providing devices to
employees.
c) IT reduces support requirement: IT department does not have to provide end user support and
maintenance for all these devices resulting in cost savings.
d) Early adoption of new Technologies: Employees are generally proactive in adoption of new technologies
that result in enhanced productivity of employees leading to overall growth of business.
e) Increased employee efficiency: The efficiency of employees is more when the employee works on
his/her own device. In an organization provided devices, employees have to learn and there is a learning
curve involved in it.
126 | P a g e
Core Banking Systems May 22
Coverage
1) ICAI Study Material Questions & Solutions
2) RTPs & MTPs till Dec 2021
3) Past Year Questions till Dec 2021
1. ICAI S T U D Y M A TE R IA L Q U E S TIO NS
Concept Problem 1
The customer may do some other operation in branch “Y”. The process is validated at branch “Y” and the
data is transmitted to the application software at the data center. The results are updated in the database
server at the centralized data center.
Thus, it would be observed that whatever operations a customer may do at any of the branches of the bank
P a g e | 127
May 22 Core Banking Systems
Core Banking Systems
the accounting process being centralized at the centralized data center is updated at the centralized
database.
Database Server
The Database Server of the Bank contains the entire data of the Bank. The data would consist of various
accounts of the customers and master data (e.g., of master data are customer data, employee data, base
rates for advances, FD rates, the rate for loans, penalty to be levied under different circumstances, etc.).
Concept Problem 2
Concept Problem 3
128 | P a g e
Core Banking Systems May 22
iii) Data Centre and Disaster Recovery Centre - The core banking systems consists of a Data Centre which
includes various application servers, database servers, web servers etc. and various other technological
components. The bank should adopt full-fledged documentation and prepare necessary manuals dealing
with the disaster recovery procedures. Arrangements for alternate connectivity of the banks with the
data center should be established whenever there is a disruption in the primary connectivity. Proper
awareness should be created among the employees through periodic trainings and mock drills.
iv) Online Transaction monitoring for fraud risk management - Risk evaluations are carried out and
considering the risk profile and other regulatory requirements of the bank, effective monitoring should be
done as a part of managing fraud risk management. There are also methods that facilitate fraud
reporting in CBS environment. Proper alert system should be enabled to identify any changes in the log
settings and the audit logs pertaining to user actions are captured.
v) Cyber Security - Comprehensive Cyber Security Framework is prescribed by RBI for Banks to ensure
effective information security governance.
Some key features of Cyber Security Framework as prescribed by are RBI for banks are as under:
2) Application Security
Full-fledged Security policy to ensure CIA of data and information needs to be developed and
implemented covering following key features:
a) Implementation of bank specific email domains (example, XYZ bank with mail domain xyz.in) with
anti-phishing (security measures to prevent steal of user data) and anti-malware software
(software tool/program to identify and prevent malicious software/malware from infecting
network).
b) Two factor authentication, an extra step added to the log- in process, such as a code sent
P a g e | 129
May 22 Core Banking Systems
Core Banking Systems
to user’s phone or a fingerprint scan, that helps verify the user’s identity and prevent cybercriminals
from accessing private information.
c) Implementation of Password Management policy to provide guidance on creating and using
passwords in ways that maximize security of password and minimize misuse/theft.
d) Effective training of employees to educate them to strictly avoid clicking any links received via
email.
e) Proper reporting mechanism to save the banks from the effects of misconduct – including legal
liability, lasting reputational harm, and serious financial losses.
f) Incident response and management mechanism to take appropriate action in case of any cyber
security incident with well written incident response procedures elaborating the roles of staff
handling such incidents.
g) Capturing of audit logs pertaining to user actions & an alert mechanism to monitor any change in
the log settings.
h) Continuous surveillance to stay regularly updated on the latest nature of emerging cyber threats.
Concept Problem 4
Operational risk necessarily excludes business risk and strategic risk. The components of operational risk
include transaction processing risk, information security risk, legal risk, compliance risk and people risk.
i) Transaction Processing Risk arises because faulty reporting of important market developments to
the bank management may also occur due to errors in entry of data for subsequent bank
computations.
ii) Information Security Risk comprises the impacts to an organization and its stakeholders that could
occur due to the threats and vulnerabilities associated with the operation and use of information
systems and the environments in which those systems operate. Data breaches can cost a bank its
reputation, customers can lose time and money and above all their confidential information.
iii) Legal Risk arises because of the treatment of clients, the sale of products, or business practices of a
bank. There are countless examples of banks being taken to court by disgruntled corporate
customers, who claim they were misled by advice given to them or business products sold. Contracts
with customers may be disputed.
iv) Compliance Risk is exposure to legal penalties, financial penalty and material loss an organization
faces when it fails to act in accordance with industry laws and regulations, internal policies or
prescribed best practices.
130 | P a g e
Core Banking Systems May 22
Since bank and borrower usually sign a loan contract, credit risk can be considered a form of counter-
party risk.
To manage market risk, banks deploy several highly sophisticated mathematical and statistical
techniques.
(e) IT Risk:
Once the complete business is captured by technology and processes are automated in CBS; the Data
Centre (DC) of the bank, customers, management and staff are completely dependent on the DC.
iii) Authentication procedures: Usernames and Passwords, Personal Identification Number (PIN), One
Time Password (OTP) are some of the most commonly used authentication methods. However, these
may be inadequate and hence the user entering the transaction may not be determinable or
traceable.
Concept Problem 5
Briefly discuss key provisions of Information Technology Act regarding IT related offences impacting banks.
Answer
Some of key provisions of IT related offences as impacting the banks are given here.
i) Section 43 - Penalty and compensation for damage to computer, computer system, etc.
If any person, without permission of the owner or any other person who is in- charge of a computer,
computer system or computer network -
a) accesses or secures access to such computer, computer system or computer network [or computer
P a g e | 131
May 22 Core Banking Systems
Core Banking Systems
resource];
b) downloads, copies or extracts any data, computer database or information from such computer,
computer system or computer network including information or data held or stored in any removable
storage medium;
c) introduces or causes to be introduced any computer contaminant or computer virus into any
computer, computer system or computer network;
d) damages or causes to be damaged any computer, computer system or computer network, data,
computer database or any other programmes residing in such computer, computer system or
computer network;
f) denies or causes the denial of access to any person authorized to access any computer, computer
system or computer network by any means;
g) destroys, deletes or alters any information residing in a computer resource or diminishes its value or
utility or affects it injuriously by any means;
h) steal, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any
computer source code used for a computer resource with an intention to cause damage,
132 | P a g e
Core Banking Systems May 22
➢ imprisonment of either description for a term which may extend to three years or
➢ fine which may extend to rupees one lakh or
➢ with both.
vi) Section 66-C: Punishment for identity theft
Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique
identification feature of any other person, shall be punished with
➢ imprisonment of either description for a term which may extend to three years and
➢ fine which may extend to rupees one lakh.
vii) Section 66-D: Punishment for cheating by personation by using computer resource
Whoever, by means of any communication device or computer resource cheats by personation, is
punishable with
➢ imprisonment of either description for a term which may extend to three years and
➢ shall also be liable to fine which may extend to one lakh rupees.
viii) Section 66-E: Punishment for violation of privacy
Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any
person without his or her consent, under circumstances violating the privacy of that person, shall be
punished with
Concept Problem 6
In line with the suggestions of RBI, M/s. ABC Bank is planning to obtain ISO 27001:2013 certification for its
Information Security Management System. As an IS Auditor, you are required to prepare a sample list of Risks
w.r.t Information Security for the bank.
Answer
Sample listing of Risks w.r.t Information Security for the Bank is as follows:
i) Significant information resources may be modified inappropriately, disclosed without authorization, and/
or unavailable when needed. (e.g., they may be deleted without authorization).
P a g e | 133
May 22 Core Banking Systems
Core Banking Systems
vi) Unauthorized viewing, modification or copying of data and/ or unauthorized use, modification or denial of
service in the system.
ix) Unauthorized system or data access, loss and modification due to virus, worms and Trojans.
Concept Problem 7
Banks face the challenge of addressing the threat of money laundering on multiple fronts as banks can be
used as primary means for transfer of money across geographies. Considering the above statement, discuss
the Money Laundering process and its different stages.
Answer
Money laundering may be defined as the process by which the proceeds of the crime and the true ownership
of those proceeds are concealed or made opaque so that the proceeds appear to come from a legitimate
source. The objective in money laundering is to conceal the existence, illegal source, or illegal application of
income to make it appear legitimate. Money laundering is commonly used by criminals to make ‘dirty’
money appear ‘clean’ or the profits of criminal activities are made to appear legitimate.
ii) Layering: Layering involves the separation of proceeds from illegal source using complex transactions
designed to obscure the audit trail and hide the proceeds. Layering involves sending the money through
various financial transactions to change its form and make it difficult to follow. Layering may consist of
several banks to bank transfers or wire transfers between different accounts in different names in
different countries making deposit and withdrawals to continually vary the amount of money in the
accounts changing the money’s currency purchasing high value items (boats, houses cars, diamonds) to
change the form of money, thus making it hard to trace.
iii) Integration: Integration involves conversion of illegal proceeds into apparently legitimate business
earnings through normal financial or commercial operations. Integration creates the illusion of a
legitimate source for criminally derived funds and involves techniques as numerous and creative as those
used by legitimate businesses.
Concept Problem 8
134 | P a g e
Core Banking Systems May 22
Answer
IT risks need to be mitigated by implementing the right type and level of controls in the automated
environment. Sample list of IT related controls in Banks are as follows:
i) The system maintains a record of all log-ins and log-outs. If the transaction is sought to be posted to a
dormant or inoperative account, the processing is halted and can be proceeded with only with a
supervisory password.
ii) The system checks whether the amount to be withdrawn is within the drawing power.
iii) The system flashes a message if the balance in a lien account would fall below the lien amount after the
processing of the transaction.
iv) Access to the system is available only between stipulated hours and specified days only.
v) Individual users can access only specified directories and files. Users should be given access only on a
‘need-to-know basis’ based on their role in the bank. This is applicable for internal users of the bank
and customers.
vi) Exception situations such as limit excess, reactivating dormant accounts, etc. can be handled only with a
valid supervisory level password.
vii) A user timeout is prescribed that means that after a user logs-in and there is no activity for a pre-
determined time, the user is automatically logged out of the system.
viii) Once the end-of-the-day process is over, ledgers cannot be opened without a supervisory level password.
Concept Problem 9
ii) Regulator and supervisor of the financial system: It prescribes broad parameters of banking
operations within which the country’s banking and financial system functions with the objective of
P a g e | 135
May 22 Core Banking Systems
Core Banking Systems
maintaining public confidence in the system, protect depositors’ interest and provide cost- effective
banking services to the public.
iii) Issuer of currency: It deals with issuing and exchanging or destroying currency and coins not it for
circulation with the objective to give the public adequate quantity of supplies of currency notes and
coins and in good quality.
Concept Problem 10
Discuss various risks and controls associated with the Current and Savings Account (CASA) process.
Or
You attended an IT workshop as a CBS. You are required to provide a basic idea to the participants about
Current & Savings Accounts (CASA) and primarily discuss the risks and controls that might be relevant in
CASA process. Advise about the relevant risks and their counter controls.
Answer
Risks and Controls around the CASA Process of Current and Savings Account (CASA) Process are as follows:
Risk Key Controls
Credit Line setup is unauthorized and not in The credit committee checks that the Financial Ratios,
line with the banks policy. the Net-worth, the Risk factors and its corresponding
mitigating factors, the Credit Line offered and the
Credit amount etc. is in line with Credit Risk Policy and
that the Client can be given the Credit Line.
Credit Line setup in CBS is unauthorized Access rights to authorize the credit limit in case of
and not in line with the banks policy. account setup system should be restricted to
authorized personnel.
Customer Master defined in CBS is not in Access rights to authorize the customer master in CBS
accordance with the Pre-Disbursement should be restricted to authorized personnel.
Certificate.
Inaccurate interest / charge being calculated in Interest on fund-based facilities are automatically
CBS. calculated in the CBS as per the defined rules.
Unauthorized personnel approving the CASAS Segregation of Duties to be maintained between the
transaction in CBS. initiator and authorizer of the transaction for processing
transaction in CBS.
Inaccurate accounting entries generated in CBS. Accounting entries are generated by CBS basis the
facilities requested by the customer and basis defined
configurations for those facilities in CBS.
Concept Problem 11
Explain the following in brief:
a) Cyber Crime
136 | P a g e
Core Banking Systems May 22
b) Credit Risk is the risk that an asset or a loan becomes irrecoverable in the case of outright default, or
the risk of an unexpected delay in the servicing of a loan. Since bank and borrower usually sign a loan
contract, credit risk can be considered a form of counterparty risk.
c) Automated Teller Machines (ATM) Channel Server: This server contains the details of ATM account
holders. Soon after the facility of using the ATM is created by the Bank, the details of such customers
are loaded on to the ATM server. When the Central Database is busy with central end-of- day activities
or for any other reason, the file containing the account balance of the customer is sent to the ATM
switch. Such a file is called Positive Balance File (PBF). This ensures not only continuity of ATM
operations but also ensures that the Central database is always up-to-date.
Concept Problem 12
Automation of business processes has introduced new types of risks in banking service. You being the Branch
Manager of a CBS branch, list out some of the internal controls you think to be implemented in your branch.
Answer
Some examples of Internal Controls that can be implemented in a bank branch to avoid the risks are as
below:
i) Work of one staff member is invariably supervised/ checked by another staff member, irrespective of the
nature of work (Maker-Checker process).
iii) Financial and administrative powers of each official/ position is fixed and communicated to all persons
concerned.
iv) Branch managers must send periodic confirmation to their controlling authority on compliance of the
laid down systems and procedures.
vi) Details of lost security forms are immediately advised to controlling so that they can exercise caution.
vii) Fraud prone items like currency, valuables, draft forms, term deposit receipts, traveller’s cheques and
P a g e | 137
May 22 Core Banking Systems
Core Banking Systems
other such security forms are in the custody of at least two officials of the branch.
Concept Problem 13
Now-a-days, Credit Cards are extensively being used for payment purpose. As a consultant to credit card
section of a bank, advise the risks involved in the credit card process.
Answer
Various risks that are involved in the Credit Card process are as follows:
i) Credit Line setup is unauthorized and not in line with the banks policy.
ii) Masters defined for the customer are not in accordance with the Pre-Disbursement Certificate.
iii) Credit Line setup can be breached.
iv) Inaccurate interest/charge being calculated in the Credit Card system.
v) Inaccurate reconciliations performed.
Concept Problem 14
Explain various key aspects in-built into the architecture of a Core Banking System.
Answer
Some key aspects in-built into the architecture of a Core Banking System (CBS) are as follows:
i) Information flow: Facilitates information flow within the bank and improves the speed and accuracy of
decision-making. It deploys systems that streamline integration and unite corporate information to
create a comprehensive analytical infrastructure.
ii) Customer centric: A holistic core banking architecture enables banks to target customers with the right
offers at the right time with the right channel to increase profitability.
iii) Regulatory compliance: Compliance in case of banks is complex and expensive. CBS has built-in and
regularly updated regulatory platform which will ensure compliance.
iv) Resource optimization: Optimizes utilization of information and resources of banks and lowers costs
through improved asset reusability, faster turnaround times, faster processing and increased accuracy.
Concept Problem 15
Analyse new set of IT risks and challenges associated with the businesses and standards that the banks
should consider?
Or
Once the complete business of a bank is captured by technology and processes are automated in Core
Banking System (CBS), the data of the bank, customer, management and staff are completely dependent
on the Data center. From a risk assessment point of view, it is critical to ensure that the bank can impart
training to its staff in the core areas of technology for efficient risk management. Explain any six common
IT risks related to CBS.
Answer
Once the complete business is captured by technology and processes are automated in CBS; the Data Centre
138 | P a g e
Core Banking Systems May 22
iii) Authentication procedures: Usernames and Passwords, Personal Identification Number (PIN), One Time
Password (OTP) are some of the most commonly used authentication methods. However, these may be
inadequate and hence the user entering the transaction may not be determinable or traceable.
iv) Several software interfaces across diverse networks: A Data Centre can have as many as 75-100 different
interfaces and application software. A data center must also contain adequate infrastructure, such as
uninterruptable power supplies; backup generators and so on. Lapse in any of these may lead to real-
time data loss.
v) Maintaining response time: Maintaining the interfacing software and ensuring optimum response time
and up time can be challenging.
vi) User Identity Management: This could be a serious issue. Some Banks may have more than 5000 users
interacting with the CBS at once.
vii) Access Controls: Designing and monitoring access control is an extremely challenging task.
viii) Incident handling procedures: Incident handling procedures are used to address and manage the
aftermath of a security breach or cyberattack.
ix) Change Management: Though Change management reduces the risk that a new system or other change
will be rejected by the users; however, at the same time, it requires changes at application level and
data level of the database- Master files, transaction files and reporting software.
Concept Problem 16
Discuss the risks and their corresponding controls associated with the Treasury Process in CBS.
Answer
The Risks and their corresponding Controls associated with Treasury Process in CBS are as follows:
P a g e | 139
May 22 Core Banking Systems
Core Banking Systems
Concept Problem 17
“The deployment and implementation of Core Banking Systems (CBS) should be controlled at various stages
to ensure that the banks automation objectives are achieved”. Analyse the statement.
or
Explain the parameters through which the deployment and implementation of Core Banking Systems (CBS)
should be controlled at various stages to ensure that banks automation objectives are achieved.
or
DFK corporative bank of Uttar Pradesh decided to implement Core Banking System (CBS) to facilitate
integration of its entire business applications. Briefly explain how the deployment and implementation of
CBS can be controlled at various stages to ensure that objectives of DFK corporative bank are achieved.
or
XYZ Bank wants to deploy and implement Core Banking Systems (CBS) to all of its branches. As a
consultant, how would you suggest the deployment and implementation of CBS at various stages to ensure
that banks automation objectives are achieved?
Answer
The deployment and implementation of Core Banking Systems (CBS) should be controlled at various stages
to ensure that banks automation objectives are achieved:
i) Planning: Planning for implementing the CBS should be done as per strategic and business objectives of
bank.
ii) Approval: The decision to implement CBS requires high investment and recurring costs and will impact
how banking services are provided by the bank. Hence, the decision must be approved by the Board of
directors.
iii) Selection: Although there are multiple vendors of CBS, each solution has key differentiators. Hence, bank
should select the right solution considering various parameters as defined by the bank to meet their
specific requirements and business objectives.
iv) Design and develop or procured: CBS solutions used to be earlier developed in- house by the bank.
Currently, most of the CBS deployment are procured. There should be appropriate controls covering the
design or development or procurement of CBS for the bank.
v) Testing: Extensive testing must be done before the CBS is live. The testing is to be done at different
phases at procurement stage to test suitability to data migration to ensure all existing data is correctly
140 | P a g e
Core Banking Systems May 22
vi) Implementation: CBS must be implemented as per pre-defined and agreed plan with specific project
milestones to ensure successful implementation.
vii) Maintenance: CBS must be maintained as required. E.g. program bugs fixed, version changes
implemented, etc.
ix) Updation: CBS modules must be updated based on requirements of business processes, technology
updates and regulatory requirements.;
x) Audit: Audit of CBS must be done internally and externally as required to ensure that controls are
working as envisaged.
Fundamentally, in a CBS, all the bank’s branches access applications from centralized data-centers. All
transactions are routed through core systems, which are available 24x7 and accessible from anywhere,
anytime and through multiple devices such as desktops, laptops, ATM, Internet, mobile phone, tablets, etc.
Concept Problem 18
Differentiate between Internet Banking Channel Server (IBCS) and Internet Banking Application Server
(IBAS) used in Core Banking Systems (CBS).
Answer
Internet Banking Channel Server (IBCS): IBCS (Internet Banking Channel Server) software stores the name
and password of the entire internet banking customers. IBCS server also contains the details about the
branch to which the customer belongs. The Internet Banking customer would first have to log into the bank’s
website with the user name and password.
Internet Banking Application Server (IBAS): The Internet Banking Software which is stored in the IBAS
(Internet Banking Application Server) authenticates the customer with the login details stored in the IBCS.
Authentication process is the method by which the details provided by the customer are compared with the
data already stored in the data server to make sure that the customer is genuine and has been provided with
internet banking facilities.
Concept Problem 19
In the Core Banking Systems, the central server supports the entire banking process through front-end and
back-end applications and enables the users to access numerous online banking facilities 24x7. Explain
various Front-end applications of Core Banking Systems.
Or
Mr. X has opened a new account with CFG bank. The bank provides Internet banking, Mobile banking and
Phone banking. Mr. X could not understand usage of these banking facilities. Elaborate these banking
facilities to Mr. X.
Answer
Various Front-end applications of core banking systems are as follows:
P a g e | 141
May 22 Core Banking Systems
Core Banking Systems
i) Internet Banking also known as Online Banking, is an electronic payment system that enables customers
of a bank or other financial institution to conduct a range of financial transactions through the financial
institution's website. The online banking system offers over 250+ services and facilities that give us
real-time access to our bank account. We can make and receive payments to our bank accounts, open
Fixed and Recurring Deposits, view account details, request a cheque book and a lot more, while we are
online.
ii) Mobile Banking is a service provided by a bank or other financial that allows its customers to conduct
financial institution that allows its customers to conduct financial transactions remotely using a mobile
device such as a Smartphone or tablet. Unlike the related internet banking, it uses software, usually
called an app, provided by the financial institution for the purpose. Mobile banking is usually available on
a 24-hour basis.
iii) Phone Banking is a functionality through which customers can execute many of the banking
transactional services through Contact Centre of a bank over phone, without the need to visit a bank
branch or ATM. Registration of Mobile number in account is one of the basic pre-requisites to avail Phone
Banking. The use of telephone banking services, however, has been declining in favour of internet
banking. Account related information, Cheque Book issue request, stop payment of cheque, Opening of
Fixed deposit etc. are some of the services that can be availed under Phone Banking.
iv) Branch Banking: Core Banking Systems are the bank’s centralized systems that are responsible for
ensuring seamless workflow by automating the frontend and backend processes within a bank. CBS
enables single view of customer data across all branches in a bank and thus facilitate information
across the delivery channels. The branch confines itself to the following key functions:
• Creating manual documents capturing data required for input into software;
• Internal authorization;
When the Central Database is busy with central end - of- day activities or for any other reason, the file
containing the account balance of the customer is sent to the ATM switch. Such a file is called Positive
Balance File (PBF). Till the central database becomes accessible, the ATM transactions are passed and the
balance available in the ATM server. Once the central database server becomes accessible, all the
transactions that took place till such time as the central database became un-accessible would be updated
142 | P a g e
Core Banking Systems May 22
Concept Problem 21
A bank PQR has many branches all over India. However, the competent authority intends to bring all the
branches together under one umbrella and make it centralized. For that, identify most prominently available
Core Banking Software in the market.
Answer
Core Banking Solution (CBS) refers to a common IT solution wherein a central shared database supports the
entire banking application. Business processes in all the branches of a bank update a common database in
a central server located at a Data Center, which gives a consolidated view of the bank’s operations.
Some examples of CBS software are given below. These are only illustrative and not exhaustive.
i) Finacle: Core banking software suite developed by Infosys that provides universal banking functionality
covering all modules for banks covering all banking services.
ii) FinnOne: Web-based global banking product designed to support banks and financial solution companies
in dealing with assets, liabilities, core financial accounting and customer service.
iii) Flexcube: Comprehensive, integrated, interoperable, and modular solution that enables banks to manage
evolving customer expectations.
iv) BaNCS: A customer-centric business model which offers simplified operations comprising loans, deposits,
wealth management, digital channels and risk and compliance components.
v) bankMate: A full-scale Banking solution which is a scalable, integrated e-banking systems that meets
the deployment requirements in traditional and non-traditional banking environments. It enables
communication through any touch point to provide full access to provide complete range of banking
services with anytime, anywhere paradigm.
Further, there are many CBS software developed by vendors which are used by smaller and co- operative
banks. Some of the banks have also developed in-house CBS software. However, the trend is for using high-
end CBS developed by vendors depending on cost-benefit analysis and needs.
Concept Problem 22
Explain the term “Mortgage Plan”. Also, briefly discuss its different types.
Answer
Mortgage Loan: A Mortgage loan is a secured loan which is secured on the borrower’s property by marking a
lien on the property as collateral for the loan. If the borrower stops paying, then the lender has the first
charge on the property.
Mortgages are used by individuals and businesses to make large real estate purchases without paying the
entire value of the purchase up front. Over the period of many years, the borrowers repay the loan amount
along with interest until there is no outstanding.
P a g e | 143
May 22 Core Banking Systems
Core Banking Systems
ii) Top Up Loan: Here the customer already has an existing loan and is applying for additional amount
either for refurbishment or renovation of the house
iii) Loans for Under Construction Property: In case of under construction properties the loan is disbursed in
tranches / parts as per construction plan.
Concept Problem 23
Discuss any two risks and their corresponding controls related to the process of Mortgage involved in CBS.
Or
Mr. X mortgaged his old flat and took a loan from ABC bank to set up his new business. The said transaction
was recorded in the ABC bank software that may be prone to various risks. Discuss any two risks and their
corresponding controls related to the process of Mortgage involved in Core Banking System.
Answer
Risk and Control related to Mortgage Process are as follows:
Concept Problem 24
Information Security that refers to ensure Confidentiality, Integrity and Availability of information, is critical
in banking industry, to mitigate the risks of Information Technology. Identify and explain various sub-
processes that are involved in Information Security.
Or
Information Security is critical to mitigate the risks of information Technology and Security should ensure
Confidentiality, Integrity and Availability (CIA) of information. Determine all the sub- processes that
comprise of Information Security.
Or
ABC Bank established in 2015 is in the process to obtain ISO 27001:2013 certification to mitigate the risk of
Information Technology as per guided by RBI. Explain the various sub processes included in Information
Security.
144 | P a g e
Core Banking Systems May 22
ii) User Security Administration: This refers to security for various users of information systems. The
security administration policy documents define how users are created and granted access as per
organization structure and access matrix. It also covers the complete administration of users right from
creation to disabling of users is defined as part of security policy.
iii) Application Security: This refers to how security is implemented at various aspects of application right
from configuration, setting of parameters and security for transactions through various application
controls. For example – Event Logging.
iv) Database Security: This refers to various aspects of implementing security for the database software. For
example - Role based access privileges given to employees.
v) Operating System Security: This refers to security for operating system software which is installed in the
servers and systems which are connected to the servers.
vi) Network Security: This refers to how security is provided at various layers of network and connectivity to
the servers. For example - Use of virtual private networks for employees, implementation of firewalls etc.
vii) Physical Security: This refers to security implemented through physical access controls. For example -
Disabling the USB ports.
Concept Problem 25
Current and Savings Account (CASA) is a unique feature which banks offer to their customers to make them
keep their money in their banks. Discuss its business process flow.
Answer
The Business Process flow of Current and Saving Account (CASA) is as follows:
i) Either the customer approaches the relationship manager to apply for a CASA facility or will apply the
same through internet banking, the charges/ rates for the facility are provided by the relationship
manager on basis of the request made by the customer.
ii) Once the potential customer agrees for availing the facilities/products of the bank, the relationship
manager request for the relevant documents i.e., KYC and other relevant documents of the customer
depending upon the facility/product. KYC (Know Your Customer) is a process by which banks obtain
information about the identity and address of the customers. KYC documents can be Passport, Driving
License, etc.
iii) The documents received from the customers are handed over to the Credit team / Risk team for
sanctioning of the facilities/limits of the customers.
P a g e | 145
May 22 Core Banking Systems
Core Banking Systems
iv) Credit team verifies the document’s, assess the financial and credit worthiness of the borrowers and
updates facilities in the customer account.
v) Current Account /Saving Account along with the facilities requested are provided to the customer for
daily functioning.
vi) Customers can avail facilities such as cheque deposits/ withdrawal, Cash deposit/ withdrawal, Real Time
Gross Settlement (RTGS), National Electronics Funds Transfer System (NEFT), Electronic Clearing Service
(ECS), Overdraft Fund Transfer services provided by the bank.
Concept Problem 26
Banking has played a vital and significant role in development of economy. In the light of this statement,
explain the key features of banking business.
Answer
The key features of a banking business are as follows:
a) The custody of large volumes of monetary items, including cash and negotiable instruments, whose
physical security should be ensured.
c) Operating through a wide network of branches and departments, which are geographically dispersed.
d) Increased possibility of frauds as banks directly deal with money making it mandatory for banks to
provide multi-point authentication checks and the highest level of information security.
Concept Problem 27
Describe the Section 63 in prevention of Money Laundering that specifies the punishment for false
implementation or failure to give information, etc.
Answer
[Section 63] Punishment for false information or failure to give information, etc.
(1) Any person willfully and maliciously giving false information and so causing an arrest or a search to be
made under this Act shall on conviction be liable for imprisonment for a term which may extend to two
years or with fine which may extend to fifty thousand rupees or both.
(2) If any person -
(a) being legally bound to state the truth of any matter relating to an offence under section 3, refuses
to answer any question put to him by an authority in the exercise of its powers under this Act; or
(b) refuses to sign any statement made by him in the course of any proceedings under this Act, which
an authority may legally require to sign; or
(c) to whom a summon is issued under section 50 either to attend to give evidence or produce books of
account or other documents at a certain place and time, omits to attend or produce books of
account or documents at the place or time, he shall pay, by way of penalty, a sum which shall not
be less than five hundred rupees but which may extend to ten thousand rupees for each such
146 | P a g e
Core Banking Systems May 22
Concept Problem 28
BMN Bank limited has recently started its core banking operations. The Bank approached Mr. X for his advice
regarding the maintenance of records as a reporting entity considering the provisions of the PMLA, 2002.
What do you think shall be the probable reply of Mr. X mentioning the relevant provisions of the PMLA, 2002?
Answer
Section 12 of the Prevention of Money Laundering Act, 2002 provides for the obligation of Banking
Companies, Financial Institutions and Intermediaries i.e. the reporting entity to maintain records of
transactions. Mr. X should have advised BMN Bank Ltd. to maintain records in the compliance to said section.
a) Accordingly, every reporting entity shall –
i) maintain a record of all transactions, including information relating to transactions, in such manner
as to enable it to reconstruct individual transactions. Here records shall be maintained for a period
of five years from the date of transaction between a client and the reporting entity.
ii) furnish to the Director within such time as may be prescribed, information relating to such
transactions, whether attempted or executed, the nature and value of which may be prescribed;
iii) maintain record of documents evidencing identity of its clients and beneficial owners as well as
account files and business correspondence relating to its clients for a period of five years after the
business relationship between a client and the reporting entity has ended or the account has been
closed, whichever is later..
b) Every information maintained, furnished or verified, save as otherwise provided under any law for the
time being in force, shall be kept confidential.
c) The Central Government may, by notification, exempt any reporting entity or class of reporting entities
from any obligation under this Chapter.
Concept Problem 29
Briefly discuss the characteristics of Core Banking Systems (CBS).
Answer
The characteristics of Core Banking Systems (CBS) are as follows:
a. CBS is centralized Banking Application software that has several components which have been designed
to meet the demands of the banking industry.
b. CBS is supported by advanced technology infrastructure & has high standards of business functionality.
c. Core Banking Solution brings significant benefits such as a customer is a customer of the bank and not
only of the branch.
d. CBS is modular in structure and is capable of being implemented in stages as per requirements of bank.
e. A CBS software also enables integration of all third-party applications including in- house banking
P a g e | 147
May 22 Core Banking Systems
Core Banking Systems
Concept Problem 30
Core Banking Systems (CBS) has become a mandatory requirement in the banking system. CBS are usually
running 24 x7 to Support Internet Banking, Mobile Banking, ATM services etc. with the help of its various
modules. Most of the key modules of CBS are connected to a Central Server. As an IT expert, discuss any
three Bank End Applications/ Modules and any three Front End Applications/ Modules of CBS.
Answer
Three Bank End Applications/ Modules are as follows:
a) Back Office:
The Back Office is the portion of a company made up of administration and support personnel, who are not
client-facing. Back-office functions include settlements, clearances, record maintenance, regulatory
compliance, accounting, and IT services.
b) Credit-Card System:
Credit card system provides customer management, credit card management, account management,
customer information management and general ledger functions; Support in the payment application; and at
the same time, the system has a flexible parameter system, complex organization support mechanism and
product factory based design concept to speed up product time to market.
An Automated Teller Machine (ATM) is an electronic banking outlet that allows customers to complete basic
transactions without the aid of a branch representative or teller. Anyone with a credit card or debit card can
access most ATMs. ATMs are convenient, allowing consumers to perform quick, self-serve transactions from
everyday banking like deposits and withdrawals to more complex transactions like bill payments and
transfers.
i) Internet Banking also known as Online Banking, is an electronic payment system that enables customers
of a bank or other financial institution to conduct a range of financial transactions through the financial
institution's website. The online banking system offers over 250+ services and facilities that give us real-
time access to our bank account. We can make and receive payments to our bank accounts, open Fixed
and Recurring Deposits, view account details, request a cheque book and a lot more, while you are online.
ii) Mobile Banking is a service provided by a bank or other financial institutions that allow its customers to
conduct financial transactions remotely using a mobile device such as a Smartphone or tablet. Unlike the
related internet banking, it uses software, usually called an app, provided by the financial institution for
the purpose. Mobile banking is usually available on a 24-hour basis.
148 | P a g e
Core Banking Systems May 22
▪ Creating manual documents capturing data required for input into software;
▪ Internal authorization;
Concept Problem 31
Briefly explain the Web Server and Proxy Server.
3. C A S E S T U D Y B A S E D MCQ 1 – S TU D Y M A TE RIA L
Mr. Shoren has recently been associated with the procurement and sale of drugs and narcotic substances
without a license which is illegal as per Narcotic Drugs and Psychotropic Substances Act, 1985. A major part
of the sale proceeds amounting to INR 65 lakhs was collected and routed through various bank accounts held
in SNFC Bank which was subsequently advanced to various bogus companies and a series of transactions
were initiated to make the money appear to have been obtained from a legal legitimate source. These
activities were carried out with the assistance of one of the employee Mr. Sushil of SNFC Bank who
intentionally altered few computer sources codes so that no records for major transactions that took place
could be found in the database. A series of transactions ranging from INR 10,000 to INR 1 lakh was initiated in
a month for depositing the amount of INR 65 lakhs in SNFC Bank.
However, SNCF Bank had failed to keep proper record of information relating to few of the transactions as
they were not of substantial amount. Furthermore, it was later found that one of the staff members of SNFC
bank whose relative was an insurance agent, used to obtain medical information of the customers having
account with the bank for obtaining personal benefits.
Answer the following Questions:
1. Which amongst the following activities carried out by Mr. Shoren could be considered as an offence of
Money Laundering?
a) Expenses incurred for procurement of narcotic drugs
b) Sale of narcotic drugs without a license.
c) Routing the illegal proceeds through bank and other transactions to appear as obtained from
legitimate source.
d) Being a part of the cartel/association carrying out illegal sale of drugs.
2. An employee of SNFC Bank Mr. Sushil had assisted Mr. Shoren in routing the illegal money through bank
by altering the computer source code so that major transactions’ amounts were not traceable in the
bank’s database. Under which Section of IT Act, 2000 will this act of Mr. Sushil is punishable?
(a) Section 66E
(b) Section 66B
(c) Section 65
(d) Section 66D
P a g e | 149
May 22 Core Banking Systems
Core Banking Systems
3. Mr. Shoren was involved in the collection and sale of illegal drugs and got the routing done through
various banking transactions and advances to bogus companies. Which stages of Money Laundering
process address these aforesaid activities?
(a) Placement and Integration
(b) Layering and Integration
(c) Placement and Layering
(d) Placement, Layering and Integration
4. SNFC Bank failed to maintain records of information relating to baking transactions carried out by Mr.
Shoren as many of the transaction amounts were not substantial. Also, the privacy regarding the details
of medical history of its customers was breached. Which kind of risk would SNFC bank be exposed to if
it has to face legal penalties as it had failed to act in accordance with laws and requirements as per
Prevention of Money Laundering Act (PMLA)?
(a) Legal and Compliance Risk
(b) Compliance and Information Security Risk
(c) Information Security and People Risk
(d) Transaction processing and Legal risk
4. C A S E S T U D Y B A S E D MCQ 2 – S TU D Y M A TE RIA L
GNI Bank is one of the age-old conventional banks which offers an array of banking services like EFT’S,
Collections, clearing, Letter of credits/guarantees etc. to its customers. To provide latest functionalities and to
improve the overall efficiency with respect to banking services, it has recently implemented a core banking
solution. It has also put in place the necessary controls to safeguard its business from being exposed to
probable IT risks.
Mr. Doshi, a senior software developer having a savings bank account with GNI Bank has requested for
internet banking facilities. He has also applied and produced all the necessary documents for availing a
housing loan from the said bank. Though the procedures followed for sanctioning housing loans are quite
stringent, GNI bank offers floating interest rate on its loans and offers comparatively higher interest rates on
its fixed deposits compared to the other banks in the state also.
Answer the following Questions:
1. Given below are the features of Core Banking Solution recently implemented by GNI Bank that prove
advantageous to both the bank and its customers. Which among the following advantages would relate
the most to Mr. Doshi who has recently availed a housing loan in terms of easy and effortless Internet
banking?
(a) Reliance on transaction balancing
(b) Highly dependent system-based controls
(c) Daily, half yearly and annual closing
(d) Automatic processing of standing instructions
2. GNI Bank during this stage of the loan processing of Mr. Doshi, checks the borrower’s ability to repay
the loan based on an analysis of his credit history, and his earning capacity. This process which forms a
150 | P a g e
Core Banking Systems May 22
Answer Key
MCQ 1 1. C 2. C 3. C 4. B
MCQ 2 1. D 2. B 3. C 4. B
P a g e | 151