Survey Questionnaire for IT Applications. General instructions for filling the forms of survey questionnaire:
|
|
|
- Lilian Carr
- 10 years ago
- Views:
Transcription
1 Survey Questionnaire for IT Applications General instructions for filling the forms of survey questionnaire: There are three forms in the survey questionnaire. For each IT Application all the forms of survey questionnaire as applicable should be filled. For item at Sl. No. 2, the name of IT Application (e.g. Passenger Reservation System i.e. PRS in Railways) should be filled in. For item at Sl. No. 3, the name of senior most person should figure in case aggregated data is compiled from more than one location/agency. The information may be furnished in the space available in format as far as possible. However, if the space given in format of survey questionnaire is inadequate, an additional sheet may be attached labeled as Additional Sheet # Sl No. For example, if the space for furnishing information related to item at Sl. No. 2 is inadequate, then a separate sheet may be attached labeled as Additional Sheet # 2. Form 1 1. Name of the auditee organisation: 2. Name of the IT Application and broad functional areas covered by the IT Application: Name Phone No. 3. Department Head of the auditee organisation 4. Information Systems In-charge 1 of 6
2 5. What is (are) the location(s) of the IT system installation(s)? 6. State the category of IT system architecture: A. Mainframe based Minicomputer based PC based B. File server system Client server system Distributed processing system Web based/edi 7. State the category of IT application. (Please indicate the choice(s) applicable): Accounting system Financial management system Inventory/Stock Management Decision support system/mis Manufacturing/Engineering Payroll Personnel and Administration Marketing Sales ERP R&D Others (Please specify) Whether the above IT application has got a bearing on the financial and accounting aspects of the organisation? Yes No 2 of 6
3 8. Software used (the Version may also be specified): Operating system(s) Network software Communication Software DBMS / RDBMS Front end tool Programming Language(s) Bespoke (Vendor developed) Utility Software Any other 9. Is the IT system a mission critical system or an essential system? Mission critical system β Essential system γ 10. Has the application system been/being developed in house or by outsourcing? In house Outsource In case of outsourcing, specify the name of agency and the contracted amount: (P.S. If the IT system is still under development, rest of the information in questionnaire from Sl. No. 11 to 18 may not be furnished. In that case Form 3 may be filled and if procurement of H/W for IT system under development has been done, then Form 2 may also be filled.) MM YY 11. When was the system made operational? β A mission critical system is an IT system which directly impact the primary function of the organisation e.g. Passenger Reservation System in Indian Railways. γ An essential system is an IT system the loss of which cause disruption of some service without disrupting primary services. 3 of 6
4 12. What is the total investment on the IT system project? Indicate the amount in lakhs of rupees against each item α : Rupees in lakhs Hardware items Proprietary software Application System development cost Manpower training cost Maintenance of the all components (recurring) 13. Number of persons engaged for operation of the system? > What is the average volume of transactional data generated on a monthly basis in terms of storage space? 15. Does the system documentation provide for an audit trail of all transaction processed and maintained? Yes No 16. Are the manuals as indicated available? a. Users documentation manual Yes No b. Systems and programming Yes No documentation manual 17. Is there any system in place to make modifications to the application being used on a regular basis to support the function? Yes No 18. Does the organisation transmit/receive data to/from other organisations: Receive Transmit No α If exact figures are not readily available, approximate figures may be provided. 4 of 6
5 Form Details of all Hardware items including the number of terminals etc. employed: 20. Details of networking hardware employed: 21. Are more than one IT Application(s) running on the same Hardware? If Yes, specify the name(s) of such IT Application(s) apart from the application as indicated at Sl. No of 6
6 Form What is the current status of development of IT system if it is still under development? (Tick the appropriate box indicating the current stage of development of IT Application) Feasibility study stage User requirement Specification stage Design stage Development stage Testing stage Parallel run (if any) Implementation stage 23. What is the projected cost for the IT system? Rs. lakhs 24. What is the target date for completion? (MM/YY) 6 of 6
Manual of Information Technology Audit
Manual of Information Technology Audit Volume II Checklists for field audit parties Office of the Comptroller & Auditor General of India IT Audit Manual Volume II Check lists for field audit parties Table
α α λ α = = λ λ α ψ = = α α α λ λ ψ α = + β = > θ θ β > β β θ θ θ β θ β γ θ β = γ θ > β > γ θ β γ = θ β = θ β = θ β = β θ = β β θ = = = β β θ = + α α α α α = = λ λ λ λ λ λ λ = λ λ α α α α λ ψ + α =
COMPONENTS in a database environment
COMPONENTS in a database environment DATA data is integrated and shared by many users. a database is a representation of a collection of related data. underlying principles: hierarchical, network, relational
Company Name Query Response. Systems Pvt. Ltd. the Bid in spite of neither being an ISO 9001:2008 nor a CMMI L3 certified company with a valid
Following are the queries received from different companies with regard to the RFP for School Quality Assessment and Accreditation Management Solution : Company Name Query Response Orion India 1. Can Orion
Enterprise-Wide Information Systems in the Modern Organization
Enterprise-Wide Information Systems in the Modern Organization Module SAP 1 1 ERP in Modern Business: Topics Historical Perspective of IS in Business Levels of IT in Organization Examine ERP s and SAP
MIS PROJECT COST ESTIMATES. 8.1 Costs CHAPTER 8
CHAPTER 8 MIS PROJECT COST ESTIMATES This chapter details the costs involved in implementation of the proposed IS and IT solution for UPID according to the implementation plan provided in chapter 7. These
Release: 1. ICADBS603A Determine suitability of database functionality and scalability
Release: 1 ICADBS603A Determine suitability of database functionality and scalability ICADBS603A Determine suitability of database functionality and scalability Modification History Release Release 1 Comments
United States Secret Service Enterprise Architecture Review Board (EARB) Project Briefing for NAME OF PROJECT
United States Secret Service Enterprise Architecture Review Board (EARB) Project Briefing for NAME OF PROJECT Presenter Name(s) Date 1 Introduction: An Enterprise Architecture Review Board (EARB) review
B.Com(Computers) II Year DATABASE MANAGEMENT SYSTEM UNIT- V
B.Com(Computers) II Year DATABASE MANAGEMENT SYSTEM UNIT- V 1 1) What is Distributed Database? A) A database that is distributed among a network of geographically separated locations. A distributed database
Information Systems Development Process (Software Development Life Cycle)
Information Systems Development Process (Software Development Life Cycle) Phase 1 Feasibility Study Concerned with analyzing the benefits and solutions for the identified problem area Includes development
A Case in Point A Payroll Benchmarking Study
A Case in Point A Payroll Benchmarking Study Ole Pedersen Vice President, Sales & Marketing ADP Canada Overview Payroll Benchmarking Study To outsource or not to outsource Best Practices for Payroll Management
REQUEST FOR INFORMATION
REQUEST FOR INFORMATION RFI Ref: VM2015-05-01 Refresh and Management of Data Center Facilities RFI Ref VM2015-05-01 Refresh and Management of Data Center Facilities Page 1 of 10 TABLE OF CONTENTS TABLE
ABSTRACT. would end the use of the hefty 1.5-kg ticket racks carried by KSRTC conductors. It would also end the
E-Ticketing 1 ABSTRACT Electronic Ticket Machine Kerala State Road Transport Corporation is introducing ticket machines on buses. The ticket machines would end the use of the hefty 1.5-kg ticket racks
SESSION 8 COMPUTER ASSISTED AUDIT TECHNIQUE
SESSION 8 COMPUTER ASSISTED AUDIT TECHNIQUE Learning objective: explain the use of computer assisted audit techniques in the context of an audit discuss and provide relevant examples of the use of test
allowed. Request for inclusion and consideration of ISO 2008:9001 quality certification. CMMI Level 5 : 10 Marks CMMI Level 3 : 07 marks ISO: 05
Corrigendum for the Tender for Web Based Project Monitoring Tool & MIS System Bidders Clarification Sl. Clause /Page no Tender Clause Clarification Sought Clarification No. 1 Page No:4 No consortium Consortium
Institute for Development and Research in Banking Technology
Institute for Development and Research in Banking Technology Keynote Address by Shri. R. Gandhi, In-Charge Director, IDRBT, at the Conference of IT Chiefs, IDRBT, Hyderabad on July 04, 2005 IT Infrastructure
Understanding ITIL Service Portfolio Management and the Service Catalog. An approach for implementing effective service lifecycle management
best practices WHITE PAPER Understanding ITIL Service Portfolio Management and the Service Catalog An approach for implementing effective service lifecycle management Table of Contents Executive Summary...1
Guidelines for the Procurement of Information Technology Hardware, Hardware Maintenance, Software, Software Maintenance and Support Services
Guidelines for the Procurement of Information Technology Hardware, Hardware Maintenance, Software, Software Maintenance and Support Services Rule Category Threshold Procurement Method Additional Additional
VOL. 2, NO. 3, March 2012 ISSN 2222-9833 ARPN Journal of Systems and Software 2009-2011 AJSS Journal. All rights reserved
Five Aspects of Application Integration Requirements Fazilat Hojaji MS of Information Technology Engineering, Amirkabir University of Technology Computer Engineering & IT Department Hafez ST,Tehran, Iran
SUPREME COURT OF INDIA Admn. Material (P&S) Section F.No.Circular/AM/2008 November 12, 2008 C I R C U L A R
SUPREME COURT OF INDIA Admn. Material (P&S) Section F.No.Circular/AM/2008 November 12, 2008 C I R C U L A R As approved by Hon'ble the Chief Justice of India vide Orders dated 27.1.2006 and further amended
StorPool Distributed Storage. Software-Defined. Business Overview
StorPool Distributed Storage. Software-Defined. Business Overview StorPool, 2015 Page 1 of 5 About StorPool StorPool is the leading vendor of distributed storage software. Our innovative solution eradicates
InfoWorks 11.5 RS Free Edition Release Notes
InfoWorks 11.5 RS Free Edition Release Notes Page 1 of 6 1. Introduction This document contains information on installing the InfoWorks RS Free Edition and associated software, and information relating
ANNEXURE - I MPD/EPC/TIC/201-15 NR logo web application development dated: 20.03.2014 Page 1
MPD/EPC/TIC/201-15 NR logo web application development dated: 20.03.2014 Page 1 PREFACE The Rubber Board a statutory Body under the Ministry of Commerce & Industry, Govt. of India, for the development
State Requirements for BRS Electronic Reporting. Commonwealth of Kentucky
State Requirements for BRS Electronic Reporting Commonwealth of Kentucky System Requirements for Generators Software should be a Windows based system. Windows 3.*, 95, 98, or NT or a system that does not
Service Availability Metrics
2014 Service Availability Benchmark Survey Published by Executive Summary This benchmark survey presents service availability metrics that allow IT infrastructure, business continuity, and disaster recovery
NATIONAL REMOTE SENSNG CENTRE (ISRO, Department of Space, Govt. of India) nrsc
nrsc NATIONAL REMOTE SENSNG CENTRE (ISRO, Department of Space, Govt. of India) Balanagar, Hyderabad 500 037 Expression of Interest (EOI) for Engaging reputed geospatial industry on preparation of Large
Request for Proposal Scanning of Policy and non policy documents at SBI Life HO
Request for Proposal Scanning of Policy and non policy documents at SBI Life HO SBI Life Insurance Co Ltd RFP for Centralized Scanning Services Page 1 1. INTRODUCTION AND BACKGROUND SBI Life is a joint
Services Providers. Ivan Soto
SOP s for Managing Application Services Providers Ivan Soto Learning Objectives At the end of this session we will have covered: Types of Managed Services Outsourcing process Quality expectations for Managed
Enhancing Production Planning (PP) Module for Manufacturing Finished Goods and Generating A Production Schedule Using SAP Application
Enhancing Production Planning (PP) Module for Manufacturing Finished Goods and Generating A Production Schedule Using SAP Application Shruthi M 1, Priya D 2 1 Dept of ISE, R V College of Engineering, Karnataka,
Computerisation and Performance Evaluation
Computerisation and Performance Evaluation Er. Ashis Kumar Mahapatra Suresh Chandra Sarangi Today Computer has revolutionized thoughts and actions in every sphere of life. It is used as rapid problem solving
Amendment 1 - Annexure 5 (C) Technical Criteria
1 - Annexure 5 (C) Technical Criteria S. Eligibility Criteria Documents required Complied Y/N Formatted: Heading 2, Indent: Left: 0", Hanging: 0.4" C) Technical Criteria (Experience and other Technical
Managing Change in Critical IT Infrastructure
Managing Change in Critical IT Infrastructure David Cuthbertson Managing Director Square Mile Systems Ltd [email protected] www.squaremilesystems.com Housekeeping Fire evacuation Toilets
TENDER DOCOUMENT. For
TENDER DOCOUMENT For Hosting of Live Video Streaming or Webcasting Products and applications on Keonics mainframe infrastructure under Linux platform on revenue sharing model KARNATAKA STATE ELECTRONICS
Memorandum. ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098. May 23, 2000.
U.S. Department of Transportation Office of the Secretary of Transportation Office of Inspector General Memorandum ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098
Information Systems Analysis and Design CSC340. XXIV. Other Phases
XXIV. Other Phases Implementation Phase Testing and Installation Phase Post-Installation Tasks Course Summary 2004 John Mylopoulos Other Phases -- 1 The Software Lifecycle Revisited Survey project scope
How to Survive an FDA Computer Validation Audit
How to Survive an FDA Computer Validation Audit The Myth Within the pharmaceutical, biotech, and medical device industry there is much fear and concern over approaching FDA audits. The FDA strikes fear
White Paper: AlfaPeople ITSM 2013. This whitepaper discusses how ITIL 3.0 can benefit your business.
White Paper: AlfaPeople ITSM 2013 This whitepaper discusses how ITIL 3.0 can benefit your business. Executive Summary Imagine trying to run a manufacturing business without a comprehensive and detailed
MIS Concepts & Design. Seema Sirpal Delhi University Computer Centre
MIS Concepts & Design by Seema Sirpal Delhi University Computer Centre Information is Critical The information we have is not what we want, The information we want is not the information we need, The
Square Mile Systems Ltd. [email protected] www.squaremilesystems.com
Webinar Data Center Capacity Management David Cuthbertson, Director Square Mile Systems Ltd [email protected] www.squaremilesystems.com Capacity Management - Why? 1. Standards have
र य स द र स व दन क / NATIONAL REMOTE SENSING CENTRE
भ रत सरक र / GOVERNMENT OF INDIA अ तर वभ ग / DEPARTMENT OF SPACE र य स द र स व दन क / NATIONAL REMOTE SENSING CENTRE ब ल नगर, ह दर ब द / BALANAGAR, HYDERABAD-500037 एनआरएसस /य/ईओआई/2/NRSC/PUR/EOI/2/PT-148
The Right-Time Seamless flow of well data between service companies and operating companies to speed up and enhance decision making.
The Main Objective of WITSML The Right-Time Seamless flow of well data between service companies and operating companies to speed up and enhance decision making. Energistics Membership 2006-62 members
Assistant Information Technology Specialist. X X X software related to database development and administration Computer platforms and
FUNCTIONAL AREA 5 Database Administration (DBA) Incumbents in this functional area plan, design, develop, test, implement, secure, and administer database systems. Database Administration applies to all
2.2 INFORMATION SERVICES Documentation of computer services, computer system management, and computer network management.
3 Audit Trail Files Data generated during the creation of a master file or database, used to validate a master file or database during a processing cycle. GS 14020 Retain for 3 backup cycles Computer Run
TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7
PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255
Problems and Measures Regarding Waste 1 Management and 3R Era of public health improvement Situation subsequent to the Meiji Restoration
Request for Information (RFI) for
Request for Information (RFI) for Currently Marketed Software Solutions Used To Produce The Comprehensive Annual Financial Report For Governmental Entities Released on August 1, 2013 Issued by the Metropolitan
EXAMPLE <PROJECT NAME> DATE
EXAMPLE DATE TABLE OF CONTENTS 1. EXECUTIVE SUMMARY... 2 1.1. Issue... 2 1.2. Anticipated Outcomes... 2 1.3. Recommendation... 2 1.4. Justification... 3 2. BUSINESS CASE ANALYSIS TEAM...
RFP#15-20 EXHIBIT E MERCHANT SERVICES INFORMATION SHEET
RFP#15-20 EXHIBIT E MERCHANT SERVICES INFORMATION SHEET A. Merchant Credit Card Processing 1. Describe your company s authorization method; list and describe alternative authorization methods. 2. What
A guide to CLARiSUITE TM network solutions
Technical FAQ s CLARiSUITE Code Assurance A guide to CLARiSUITE TM network solutions Overview IT infrastructure security, integrity and stability are primary concerns of Videojet and its customers. Management
SaaS Due Diligence Checklist
SaaS Due Diligence Checklist Company Overview: 1. List business name, DBA names and web addresses: 2. Headquarters address: 3. Other locations and purposes: 4. List owners with their equity %: 5. List
EXPRESSION OF INTEREST. For TELEPHONE SERVICE & LINE MAINTENANCE (TSLM) ITI LIMITED, REGIONAL OFFICE F-29, Ground Floor BANGALORE -560016
EXPRESSION OF INTEREST For TELEPHONE SERVICE & LINE MAINTENANCE (TSLM) ITI LIMITED, REGIONAL OFFICE F-29, Ground Floor BANGALORE -560016 16 th SEPTEMBER, 2015 Tender Reference No: ITI/ROBG/MP/BA/15-16/01
Report on Hong Kong SME Cloud Adoption and Security Readiness Survey
Report on Hong Kong SME Cloud Adoption and Security Readiness Survey Collaborated by Internet Society Hong Kong and Cloud Security Alliance (HK & Macau Chapter) Sponsored by Microsoft Hong Kong Jointly
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
Professions TechGuard Proposal Form
Proposer Details Name of Firm(s) Principal Address of Company line one Principal Address of Company line two City and postcode Telephone number Fax number Website Date Firm(s) was Established If less than
Change Management Control Procedure
Change Management Control Procedure Procedure Name: Procedure Number: Prepared By: Approved By: Change Management Control ESS100 Nancy Severance Director, Administrative Computing Services Paul Foley Director,
Invitation for Expression of interest : e-maintenance management system
Invitation for Expression of interest : e-maintenance management system Introduction 1. The maintenance responsibility in the IAF spans across a diverse range of aircraft, associated equipment, support
REQUEST FOR PROPOSAL (RFP)
REQUEST FOR PROPOSAL (RFP) Subject: Due Date/Time: Submit To: Financial Management & Utility Billing Software March 28, 201412:00 pm Eastern Standard Time Chris Wilson Village of Beverly Hills 18500 W
447, ROAD NO. 270, NEW MAADI, CAIRO, EGYPT TEL:
Accounting Finance Certified Public Accounting Tax Accounting Human resources Training and Development Procurement IT Hardware Set up and Maintenance Legal Aids Strategic Management 447, ROAD NO. 270,
AUDIT GUIDELINES FOR SCHOOL DISASTER RECOVERY PLANNING
AUDIT GUIDELINES FOR SCHOOL DISASTER RECOVERY PLANNING Introduction It has become increasingly common for schools to place a great deal of reliance upon PC s and computer systems to manage and operate
Simplify and Automate IT
Simplify and Automate IT Expectations have never been higher Reduce IT Costs 30% increase in staff efficiency Reduce support costs by 25% Improve Quality of Service Reduce downtime by 75% 70% faster MTTR
Mobile Device Management
Vodafone Global Enterprise Mobile Device Management Technical paper Vodafone Global Enterprise Introduction Managing for the future Secure control over your mobile data, devices and applications. The multi-national
thoughtonomy Virtual Workforce for Service Automation
thoughtonomy Virtual Workforce for Service Automation The Thoughtonomy Virtual Workforce uses software to replicate the interactions of people and technology to automate a wide range of operational and
NSD ERP - Integrated Solutions NSD ERP SYSTEM. Flow chart. Copyright 2009 NSD, All rights reserved
Integrated Applications System Flow chart is an Integrated Applications System We prepared this document, asanoverview, in order to give you a bi briefidea about the Flowchart ( integration ti ) of the
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Information Security Risk Assessment Methodology
Information Security Risk Assessment Methodology An Information security risk assessment should take into account system-level risk (inclusive of applications and systems) and process-level risk (inclusive
Information Services Strategy 2011-2013
Information Services Strategy Issue 1 1 Introduction The States of Jersey public sector is facing significant pressure for efficiencies and savings. This has created the context to take a fresh look at
IT - General Controls Questionnaire
IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow
Review relating to Statutory Corporation
Review relating to Statutory Corporation 6.2 Computerised energy billing system of Ranchi Electric Supply Circle of Jharkhand State Electricity Board Highlights Jharkhand State Electricity Board (JSEB)
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
Exam Name MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Which of the following requires a systems development method that uses a data orientation
Cloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 [email protected] www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
Request for Resume (RFR) CATS+ Master Contract All Master Contract Provisions Apply. Section 1 General Information
Section 1 General Information RFR Number: (Reference BPO Number) Functional Area (Enter One Only) R00B4400129 FUNCTIONAL AREA 7 INFORMATION SYSTEM SECURITY LABOR CATEGORY Security, Computer Systems Specialist
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
COMPUTER-ASSISTED PERSONAL INTERVIEWING
World Bank Development Research Survey Solutions COMPUTER-ASSISTED PERSONAL INTERVIEWING Michael Lokshin, DECRG DQ = αdc βdm γsm DQ DC DM SM data quality data capturing data management survey management
TECHNOLOGY ERRORS AND OMISSIONS LIABILITY PROTECTION APPLICATION. General Information
TECHNOLOGY ERRORS AND OMISSIONS LIABILITY PROTECTION APPLICATION Please attach copies of your standard contracts and agreements, most current audited or annual financial statements, loss runs for the past
ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL
7.1 ESTABLISH RESPONSIBILITY FOR ASSETS 1 GOAL Do you protect your organization s assets? 2 GOAL Do you use controls to protect your assets? 3 GOAL Do you account for your organization s assets? 4 GOAL
