2014 May – August KCA Past Paper

BBIT 103 BIT 1305  COMPUTER NETWORKS KCA Past Paper BBIT 103 BIT 1305 COMPUTER NETWORKS KCA Past Paper BBIT 103 COMPUTER NETWORKS AND MANAGEMENT – DISTANCE LEARNING KCA Past Paper BBIT 105 PROGRAMMING METHODOLOGY- DISTANCE LEANING KCA Past Paper BBIT Read More …

Share this:

Hazard and Operational Study (HAZOP)

A HAZOP study identifies hazards and operability problems. The concept involves investigating how the plant might deviate from the design intent. If, in the process of identifying problems during a HAZOP study, a solution becomes apparent, it is recorded as Read More …

Share this:

Risk and Vulnerability Assessment

Risk assessment is the appraisal of probability and significance of identified potential risk events. It means asking how likely is it and how bad will it be if certain risk events happen. Risk is quantified using the formulae: Risk = Read More …

Share this:

The Control file

When auditing computerized information systems, it will be found that much reliance is placed within the system upon standard forms and documentation in general, as well as upon strict adherence to procedures laid down. This is no surprise, of course, Read More …

Share this:

Uses of computer audit programs.

In the selection of representative or randomly chosen transactions or items for audit tests. The scrutiny of files and selection of exceptional items for testing. E.g. On wages payments over Shs.1000 or all stock items worth more than Shs.100,000 in Read More …

Share this: