Exam 7: Computer Controls for Organizations and Accounting Information Systems
Exam 1: Accounting Information Systems and the Accountant87 Questions
Exam 2: Accounting on the Internet124 Questions
Exam 3: Information Technology and Aiss128 Questions
Exam 4: Accounting and Data Analytics43 Questions
Exam 5: Integrated Accounting and Enterprise Software102 Questions
Exam 6: Introduction to Internal Control Systems and Risk Management73 Questions
Exam 7: Computer Controls for Organizations and Accounting Information Systems96 Questions
Exam 8: Accounting Information Systems and Business Processes: Part I51 Questions
Exam 9: Accounting Information Systems and Business Processes: Part II50 Questions
Exam 10: Cybercrime, Fraud, and Ethics75 Questions
Exam 11: Information Technology Auditing67 Questions
Exam 12: Documenting Accounting Information Systems68 Questions
Exam 13: Developing and Implementing Effective Accounting Information Systems128 Questions
Exam 14: Database Design112 Questions
Exam 15: Organizing and Manipulating the Data in Databases79 Questions
Exam 16: Database Forms and Reports61 Questions
Select questions type
Most computer vandalism is performed by "professional" computer criminals who have no personal contact with the computer centers they disrupt.
(True/False)
4.8/5
(34)
Edit checks are very rarely used because they are not cost-effective controls.
(True/False)
4.9/5
(38)
One of the techniques for controlling batch processing is the use of hash totals.
(True/False)
4.8/5
(39)
___ controls help ensure the validity, accuracy and completeness of data entered into an AIS.
(Multiple Choice)
4.9/5
(39)
A company's computer facilities and computer room conceivably could be destroyed completely by fire.The most appropriate action a company could take in an attempt to prepare for and protect itself for such a disaster would be:
(Multiple Choice)
4.8/5
(44)
The audit trail is easier to follow in an online computerized system as compared to a batch system.
(True/False)
4.8/5
(39)
Which of the following policies or practices is most likely to represent a weakness in internal controls pertaining to an automated data processing system?
(Multiple Choice)
4.9/5
(47)
Principal output controls include all but one of the following:
(Multiple Choice)
4.9/5
(38)
Biometric identifications are irrelevant to computer network systems.
(True/False)
4.8/5
(44)
It would be appropriate for the payroll accounting department to be responsible for which of the following functions?
(Multiple Choice)
4.8/5
(41)
An example of a check-digit technique that includes "ordering of digits" in the construction of check-digit values is the:
(Multiple Choice)
4.9/5
(34)
The primary function of controls for a computerized accounting information system is to detect computer fraud.
(True/False)
4.9/5
(35)
No record of transactions is made in an online computerized system.
(True/False)
4.9/5
(30)
Information processing personnel usually only use selective edit checks in data processing applications due to the cost of computer time necessary for editing.
(True/False)
4.7/5
(42)
Tape and disk output controls are primarily concerned with:
(Multiple Choice)
4.8/5
(30)
A completeness test is an internal equipment control to test whether or not all transactions have been processed.
(True/False)
4.8/5
(32)
Showing 81 - 96 of 96
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)