Filters
Question type

Study Flashcards

Which of the following persons is responsible for controlling access to systems documentation and access to program and data files?


A) Programmers.
B) Data conversion operators.
C) Librarians.
D) Computer operators.

Correct Answer

verifed

verified

Which of the following is an example of a computer operations control?


A) Control totals.
B) Balance of input to output.
C) File backup and retention.
D) Transaction logs.

Correct Answer

verifed

verified

When weaknesses exist that could lead to computer fraud,the best strategy is to have the client help audit teams plan and execute technical procedures to study and evaluate the system.

Correct Answer

verifed

verified

Which of the following is not a control included as part of the systems development life cycle?


A) Ensuring that all software acquisition and program development efforts are consistent with the organization's needs and objectives.
B) Testing and validating new programs and developing proper implementation plans.
C) Requiring that all programming efforts take place under the control of the requesting user department.
D) Ensuring that data are converted completely and accurately for use in the new systems.

Correct Answer

verifed

verified

Which of the following is likely to be of least importance to audit teams when obtaining an understanding of the computer controls in an organization with a computerized processing system?


A) Separation of duties within the computer function.
B) Controls over source documents.
C) Documentation maintained for accounting applications.
D) Relationship between costs and benefits of computer operations.

Correct Answer

verifed

verified

The client's computerized exception reporting system helps audit teams conduct a more efficient audit because it


A) Condenses data significantly.
B) Highlights abnormal conditions.
C) Decreases the necessary level of tests of computer controls.
D) Is an efficient computer input control.

Correct Answer

verifed

verified

Which of the following would reduce the effectiveness of internal control in a computerized processing system?


A) The computer librarian maintains custody of computer program instructions and detailed lists.
B) Computer operators have access to operator instructions and detailed program lists.
C) The control group is solely responsible for the distribution of all computer output.
D) Computer programmers write and debug programs that perform routines designed by the systems analyst.

Correct Answer

verifed

verified

What is the difference between the use of test data and parallel simulation?

Correct Answer

verifed

verified

The primary differences between the use ...

View Answer

Controls that involve all applications of computerized processing (such as hardware controls)are referred to as ______________________________________.

Correct Answer

verifed

verified

Which of the following methods allow fictitious and actual transactions to be processed together without client operating personnel being aware of the testing process?


A) Integrated test facility.
B) Input controls matrix.
C) Parallel simulation.
D) Data entry monitor.

Correct Answer

verifed

verified

Match each of the automated application controls with the error condition(s)they are designed to prevent or detect (each control may be designed to prevent or detect more than one error condition). Match each of the automated application controls with the error condition(s)they are designed to prevent or detect (each control may be designed to prevent or detect more than one error condition).

Correct Answer

verifed

verified

1.A; 2.B,C,D; 3.A,B,...

View Answer

_____________________________ computing environments are often characterized by inadequate separation of duties and lack of physical computer security.

Correct Answer

verifed

verified

Computerized processing performed concurrently with a particular activity so that results are available to influence a decision being made is referred to as


A) Batch processing.
B) Real-time processing.
C) Integrated data processing.
D) Random access processing.

Correct Answer

verifed

verified

Which of the following categories of general controls includes retention and recovery techniques for data and related programs?


A) Access to programs and data.
B) Computer operations.
C) Data file controls.
D) Hardware controls.

Correct Answer

verifed

verified

The basic concept of test data is that once a computer is programmed to handle transactions in a certain way,every transaction will be handled in the same way.

Correct Answer

verifed

verified

In a computerized processing system,hardware controls are designed to


A) Arrange data in a logical sequential manner for processing purposes.
B) Correct errors in the computer programs.
C) Monitor and detect errors in source documents.
D) Detect and control errors arising from use of equipment.

Correct Answer

verifed

verified

__________________________________ controls are "built in" to the computer equipment and provide reasonable assurance that data are not altered or modified as they are transmitted within the system.

Correct Answer

verifed

verified

______________________________ compare the client's processing of simulated transactions to the audit team's manual processing of those transactions.

Correct Answer

verifed

verified

Which of the following would most likely be a weakness in the internal control of a client that utilizes portable computing devices rather than a large computer system?


A) Employee collusion possibilities are increased because portable computing devices from one vendor can process the programs of a system from different vendors.
B) Computer operators may be able to remove hardware and software components and modify them at an off-site location.
C) Programming errors result in all similar transactions being processed incorrectly because those transactions are processed under the same conditions.
D) Certain transactions may be automatically initiated by the computerized processing system and management's authorization of these transactions may be implicit in its acceptance of the system design.

Correct Answer

verifed

verified

_____________________________ describes the system and its controls and is the means of communicating the essential elements of the computerized processing system to current and potential users.

Correct Answer

verifed

verified

Showing 21 - 40 of 118

Related Exams

Show Answer