Correct Answer
verified
Multiple Choice
A) allows clients to create databases that include information that can be shared across multiple applications.
B) stores data on different files for different purposes, but always knows where they are and how to retrieve them.
C) allows quick retrieval of data, but at a cost of inefficient use of file space.
D) allows quick retrieval of data, but it needs to update files continually.
Correct Answer
verified
Multiple Choice
A) multiple users can access and update data files.
B) the accounting information is only in one place.
C) the database administrator may lack appropriate accounting knowledge.
D) multiple users could all access the data simultaneously causing a system shutdown.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
Multiple Choice
A) Reliance on the functioning capabilities of hardware and software
B) Increased human involvement
C) Loss of data due to insufficient backup
D) Unauthorized access
Correct Answer
verified
Multiple Choice
A) gain the permission of the service center to review their work.
B) find compatible programs that will analyze the service center's programs.
C) determine the adequacy of the service center's internal controls.
D) try to abide by the Code of Professional Conduct to maintain the security and confidentiality of client's data.
Correct Answer
verified
Multiple Choice
A) Examination of system documentation
B) Inquiry of key users
C) Walk through of a sales transaction
D) Reviews of questionnaires completed by client IT personnel
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) no additional testing is needed by the auditor.
B) and application controls are effective, the auditor can easily identify when software changes are made.
C) and general controls are effective, the auditor can easily identify when software changes are made.
D) application and general controls can no longer by relied upon by the auditor.
Correct Answer
verified
Multiple Choice
A) link controls and deficiencies in general controls to specific transaction-related audit objectives.
B) can use a control risk matrix to help identify both manual and automated application controls and control deficiencies for each related audit objective.
C) can rely on IT-based application controls for all cycles if general controls are ineffective.
D) can use the IT staff to determine how much reliance they can place on general controls.
Correct Answer
verified
Multiple Choice
A) participate in computer software acquisition decisions.
B) design flowcharts and narratives for computerized systems.
C) originate changes in customer master files.
D) provide physical security over program files.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Application controls are effective even if general controls are extremely weak.
B) Application controls are likely to be effective only when general controls are effective.
C) General controls have no impact on application controls.
D) None of the above.
Correct Answer
verified
Multiple Choice
A) Auditors do not link IT controls to audit objectives.
B) After identifying specific IT-based application controls that can be used to reduce control risk, auditors can reduce substantive testing.
C) General controls affect audit objectives in only one cycle.
D) The impact of general controls and application controls on audits does not vary depending on the level of complexity in the IT environment.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) the test data approach.
B) called auditing around the computer.
C) the generalized audit software approach.
D) the microcomputer-aided auditing approach.
Correct Answer
verified
True/False
Correct Answer
verified
Showing 1 - 20 of 106
Related Exams