Exam 7: Computer Controls for Organizations and Accounting Information Systems
Exam 1: Accounting Information Systems and the Accountant87 Questions
Exam 2: Accounting on the Internet124 Questions
Exam 3: Information Technology and Aiss128 Questions
Exam 4: Accounting and Data Analytics43 Questions
Exam 5: Integrated Accounting and Enterprise Software102 Questions
Exam 6: Introduction to Internal Control Systems and Risk Management73 Questions
Exam 7: Computer Controls for Organizations and Accounting Information Systems96 Questions
Exam 8: Accounting Information Systems and Business Processes: Part I51 Questions
Exam 9: Accounting Information Systems and Business Processes: Part II50 Questions
Exam 10: Cybercrime, Fraud, and Ethics75 Questions
Exam 11: Information Technology Auditing67 Questions
Exam 12: Documenting Accounting Information Systems68 Questions
Exam 13: Developing and Implementing Effective Accounting Information Systems128 Questions
Exam 14: Database Design112 Questions
Exam 15: Organizing and Manipulating the Data in Databases79 Questions
Exam 16: Database Forms and Reports61 Questions
Select questions type
When developing a Business Continuity Plan (BCP), the ___ is used to identify and inventory critical business processes and supporting systems, and to establish priorities and timelines for recovery efforts.
(Multiple Choice)
4.8/5
(42)
Which of the following is not a major reason for controls in a computerized accounting information system?
(Multiple Choice)
4.7/5
(40)
A sales transaction document was coded with an invalid customer account code (7 digits rather than 8).The error was not detected until the updating run when it was found that there was no such account to which the transaction could be posted.The best control procedure would be:
(Multiple Choice)
4.8/5
(39)
All controls available for the computerized accounting information system of a company should be implemented regardless of cost due to the high rate of computer crime.
(True/False)
4.8/5
(39)
When erroneous data are detected by computer program controls, such data may be excluded from processing and printed on an error report.The error report should most probably be reviewed and followed up by the:
(Multiple Choice)
4.7/5
(32)
Due to an unusual program error which had never happened before, the accounts receivable updating run did not process three transactions.The error was not noted by the operator because he was busy working on another project.There were control totals for the file which were printed out.An examination of the printout would have disclosed the error.The best control procedure would be:
(Multiple Choice)
4.9/5
(37)
In preparing payroll checks, the computer omitted 24 of a total of 2,408 checks which should have been processed.The error was not detected until the supervisor distributed the checks.The best control procedure would be:
(Multiple Choice)
5.0/5
(36)
Regarding Mobile Device Management (MDM)solutions, which of the following is false?
(Multiple Choice)
4.7/5
(44)
A company uses the account code 669 for maintenance expense.However, one of the company's clerks often codes maintenance expense as 996.The highest account code in the system is 750.What would be the best internal control check to build into the company's computer program to detect this error?
(Multiple Choice)
4.8/5
(31)
MDM software allows an administrator to control and protect data located on mobile devices.
(True/False)
4.8/5
(30)
Testing processing programs with test data is performed only when a system is first installed due to the high costs of such test runs.
(True/False)
4.9/5
(41)
In its automated data processing system, a company might use selfchecking numbers (check digit)to enable detection of which of the following errors?
(Multiple Choice)
4.9/5
(33)
Which of the following types of errors will check digits usually detect?
(Multiple Choice)
4.8/5
(27)
An expense report was prepared by a company's cost center.One executive questioned one of the amounts and asked for "the source documents which support the total." Data processing was not able to routinely do so.The best control procedure would be:
(Multiple Choice)
4.9/5
(29)
A "flying-start site" for disaster recovery purposes is a location that includes:
(Multiple Choice)
4.9/5
(40)
A transaction involving a charge to a non-existent customer account was entered into an accounts receivable and billing system that was batch processed.This error should be detected by the computer system and appear in:
(Multiple Choice)
4.9/5
(39)
We can classify IT controls based on implementation, function or scope.When considering IT controls based on function, this classification includes:
(Multiple Choice)
4.9/5
(37)
A very effective ID approach for safeguarding logical computer access bases user recognition on:
(Multiple Choice)
4.9/5
(38)
The grandfather-parent-child approach to providing protection for important computer files is a concept that is most often found in:
(Multiple Choice)
4.8/5
(32)
Which of the following is not a feedback mechanism for observation controls for data collection?
(Multiple Choice)
4.8/5
(36)
Showing 41 - 60 of 96
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)