DOWNLOAD LINK
INSERT YOUR E-MAIL ID ON TOP RIGHT OF THE PAGE TO GET UPDATES DIRECTLY IN YOUR MAIL BOX
INSERT YOUR E-MAIL ID ON TOP RIGHT OF THE PAGE TO GET UPDATES DIRECTLY IN YOUR MAIL BOX
CA IPCC NOTES CA FINAL NOTES CA IPCC BOTH GROUP EXAMINATION TIPS CA IPCC CLASSES CA FINAL CLASSES VIDEO LECTURES MAY NOV 2020 RTP MOCK TEST PAPERS ICAI PRAVEEN SHARMA FINANCIAL REPORTING CORPORATE LAW ACCOUNTS CA NOTES ITSM MNEMONICS EXAM PREPARATION AUDIT ALDINE ETEN VINOD GUPTA TAX LATEST RESULTS CPT GST COMPANIES ACT 2013 COSTING FM
Advanced knowledge. |
To gain application ability of necessary controls, laws and standards in computerized Information system. |
1. | Information Systems Concepts | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
General Systems Concepts – Nature and types of systems, nature and types of information, attributes of information. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Management Information System – Role of information within business | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Business information systems –various types of information systems – TPC, MIS, DSS, EIS, ES | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2. | Systems Development Life Cycle Methodology | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Introduction to SDLC/Basics of SDLC | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Requirements analysis and systems design techniques | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Strategic considerations : Acquisition decisions and approaches | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Software evaluation and selection/development | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Alternate development methodologies- RAD, Prototype etc | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Hardware evaluation and selection | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Systems operations and organization of systems resources | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Systems documentation and operation manuals | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
User procedures, training and end user computing | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
System testing, assessment, conversion and start-up | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Hardware contracts and software licenses | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
System implementation | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Post-implementation review | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
System maintenance | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
System safeguards | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Brief note on IS Organisation Structure | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3. | Control objectives | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
4. | Audit Tests of General and Automated Controls | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
5. | Risk assessment methodologies and applications: | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(a) Meaning of Vulnerabilities, Threats, Risks, Controls, (b) Fraud, error, vandalism, excessive costs, competitive disadvantage, business, interruption, social costs, statutory sanctions, etc. (c) RiskAssessment and Risk Management, (d) Preventive/detective/corrective strategies | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
6. | Transfer pricing | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(a) Fundamentals of BCP/DRP, (b) Threat and risk management, (c) Software and data backup techniques, (d) Alternative processing facility arrangements,(e) Disaster recovery procedural plan, (f) Integration with departmental plans, testing and documentation, (g) Insurance | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7. | An over view of Enterprise Resource Planning (ERP) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
8. | Information Systems Auditing Standards, guidelines, best practices (BS7799, HIPPA, CMM etc.) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9. | Drafting of IS Security Policy, Audit Policy, IS Audit Reporting – a practical perspective | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10. | Information Technology Act, 2000 |
Number
|
Letters Assigned
|
Reasons of assigning the Letter
|
1
|
S, D
|
Maximum spelling starts with S and D and maximum number
of sections will have 1 used in the section number
|
2
|
N, V
|
These letters are made of two pointers pointing down or
up
|
3
|
M, W
|
These letters are made of three pointers pointing down or up |
4
|
R
|
Spelling of 4 consist of R in it |
5
|
L
|
Roman letter for the number 50 |
6
|
C, J
|
C is somewhat similar in shape with 6, J is sort of mirror image of C |
7
|
F, T
|
Similarity of shapes |
8
|
B, G
|
Similarity of shapes . G is small letters looks like g (8) |
9
|
P, q
|
Similarity of shapes. P is mirror image of 9 and q looks like 9 |
0
|
Z, X
|
Spelling Zero and Roman ten (X) |
Ex. No. | Section Number and Matter involved | Creation of Word | Connection of Word and the Matter under consideration | How to Get what you Want in Exams. |
1.
|
Section 185 of Companies act 2013 pertains to Provisions relating to Loans to directors. |
1 = D,
S
8 = B,
G
5 = L
|
The
word double has to be connected with the matter of the section, i.e. Loans to
Directors. A simple association can be said as “When you give loan to director, it will result in DouBLe penalty” |
The moment you come across the phrase Loan to Directors under Companies Act, 2013, you will remember the word ‘Double’, the word when reconverted into digits gives you 185. You will write, as per section 185. |
2.
|
Section 73 of Companies Act, 2013 – Acceptance of Deposits |
7 = F, T
3
= M, W |
I
could think of FM. Connection – Acceptance of Deposit by company they are giving advertisement in radio mirchi (which is FM Radio) |
The
connection between deposit, radio mirchi, FM will remind you of reverse of FM
i.e. 7, 3 = 73. Section 73. |
3.
|
Annual
General Meeting Section 96 |
9
= P, Q 6 = C, J |
I could think of the word PJ, you will create a picture of annual general meeting where people are cracking PJs (PJ is popular short form of Poor Jokes). People are laughing loudly. | The connection of AGM and PJ is set. Now, when you think of AGM, you will remember the scene and you will remember PJ. You know what P and J stands for. 9 and 6. Section 96 |
4.
|
Register of Members Section 88 | 8
= B, G 88 = BB or GG or BG or GB |
What
I could think of is as follows. In register of member, company has entered names of their BBs also. (BB = Wife) |
The funny association of register of members, their names and their BB name connects u to the number 88. |
5.
|