BBIT 102 COMPUTER ORGANIZATION ARCHITECTURE KCA Past Paper BBIT 107 DATABASE MANAGEMENT SYSTEMS KCA Past Paper BIT 1102A INTERNET TECHNOLOGY KCA Past Paper BIT 1104 BUSINESS COMMUNICATION SKILLS KCA Past Paper BIT 1106 OPERATING SYSTEM KCA Past Paper BIT 1107 Read More …
Month: March 2022
2014 May – August KCA Past Paper
BBIT 103 BIT 1305 COMPUTER NETWORKS KCA Past Paper BBIT 103 BIT 1305 COMPUTER NETWORKS KCA Past Paper BBIT 103 COMPUTER NETWORKS AND MANAGEMENT – DISTANCE LEARNING KCA Past Paper BBIT 105 PROGRAMMING METHODOLOGY- DISTANCE LEANING KCA Past Paper BBIT Read More …
Differentiating qualitative and quantitative risk assessment techniques
The main difference between qualitative and quantitative risk assessment is that the former uses a relative or descriptive scale to measure the probability of occurrence whereas quantitative analysis uses a numerical scale. For example, a qualitative analysis would use a Read More …
Hazard and Operational Study (HAZOP)
A HAZOP study identifies hazards and operability problems. The concept involves investigating how the plant might deviate from the design intent. If, in the process of identifying problems during a HAZOP study, a solution becomes apparent, it is recorded as Read More …
Risk and Vulnerability Assessment
Risk assessment is the appraisal of probability and significance of identified potential risk events. It means asking how likely is it and how bad will it be if certain risk events happen. Risk is quantified using the formulae: Risk = Read More …
The Control file
When auditing computerized information systems, it will be found that much reliance is placed within the system upon standard forms and documentation in general, as well as upon strict adherence to procedures laid down. This is no surprise, of course, Read More …
Uses of computer audit programs.
In the selection of representative or randomly chosen transactions or items for audit tests. The scrutiny of files and selection of exceptional items for testing. E.g. On wages payments over Shs.1000 or all stock items worth more than Shs.100,000 in Read More …
2014 September – December KCA Past Paper
BIT 2109 PROFESSIONAL ISSUES OF INFORMATION TECHNOLOGY – DISTANCE LEARNING KCA Past Paper BIT 2208 PRINCIPLES OF DATA COMMUNICATIONS BIT 2301 RESEARCH METHODS KCA Past Paper BIT 2308 HUMAN COMPUTER INTERACTION – (DISTANCE LEARNING) KCA Past Paper BIT 3102 INFORMATION Read More …
Testing the internal controls in a computerized environment
The auditor tests the internal controls when he wishes to place reliance on the controls to determine whether the accounting records are reliable. A computerized information system may differ from a manual system by having both manual and programmed controls. Read More …
Measures to ensure that the reasons behind rejected transactions are investigated and corrective action taken.
There may be need for manual controls to for instance, a check to reveal that all purchase orders have been appropriately authorized before a transaction is submitted for processing. Processing controls. These controls seek to ensure that transactions are processed Read More …