Exam 10: Computer Controls for Organizations and Accounting Information Systems
Exam 1: Accounting Information Systems and the Accountant95 Questions
Exam 2: Information Technology and Aiss111 Questions
Exam 3: Data Modeling104 Questions
Exam 4: Organizing and Manipulating the Data in Databases98 Questions
Exam 5: Database Forms and Reports62 Questions
Exam 6: Documenting Accounting Information Systems60 Questions
Exam 7: Accounting Information Systems and Business Processes: Part I51 Questions
Exam 8: Accounting Information Systems and Business Processes: Part II54 Questions
Exam 9: Introduction to Internal Control Systems69 Questions
Exam 10: Computer Controls for Organizations and Accounting Information Systems93 Questions
Exam 11: Computer Crime, Fraud, Ethics, and Privacy83 Questions
Exam 12: Information Technology Auditing64 Questions
Exam 13: Developing and Implementing Effective Accounting Information Systems107 Questions
Exam 14: Accounting on the Internet106 Questions
Exam 15: Accounting and Enterprise Software46 Questions
Select questions type
Jonkers, Inc., a large retail chain, is installing a computerized accounts receivable system employing a batch mode of processing with sequential files.The program which will process receipts on account should include an input edit routine to assure:
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
A
A limit check in a computer program is comparable to a decision that an individual makes in a manual system to judge a transaction's reasonableness.
Free
(True/False)
4.8/5
(41)
Correct Answer:
True
Which of the following is not a feedback mechanism for observation controls for data collection?
Free
(Multiple Choice)
4.7/5
(44)
Correct Answer:
C
All controls available for the computerized accounting information system of a company should be implemented regardless of cost due to the high rate of computer crime.
(True/False)
4.8/5
(36)
A weekly payroll cheque was issued to an hourly employee based on 98 hours worked instead of 38 hours.The time card was slightly illegible and the number looked somewhat like 98.The best control procedure would be:
(Multiple Choice)
4.9/5
(40)
The primary function of controls for a computerized accounting information system is to detect computer fraud.
(True/False)
4.8/5
(34)
A hash total is obtained by counting all documents or records to be processed.
(True/False)
4.8/5
(35)
Control totals are used as a basic method for detecting data errors.Which of the following is not a control figure used as a control total in automated accounting systems?
(Multiple Choice)
4.8/5
(26)
Which of the following is not a control to ensure the physical safety of a company's data processing centre?
(Multiple Choice)
4.7/5
(38)
The basic form of backup used in magnetic tape operations is called:
(Multiple Choice)
4.8/5
(44)
The risk of unauthorized access to data through electronic eavesdropping is minimized by using:
(Multiple Choice)
4.9/5
(43)
A very effective ID approach for safeguarding logical computer access bases user recognition on:
(Multiple Choice)
4.9/5
(33)
General controls within IT environments that affect personnel include:
(Multiple Choice)
4.8/5
(33)
Transactions which were erroneous and had been previously rejected by the computer system apparently were not being re-entered and reprocessed once they had been corrected.This erroneous condition is best controlled by:
(Multiple Choice)
4.8/5
(41)
Check digit control procedure have which of the following attributes?
(Multiple Choice)
5.0/5
(30)
A business continuity plan BCP)includes which of the following?
(Multiple Choice)
4.9/5
(38)
A "flying-start site" for disaster recovery purposes is a location that includes:
(Multiple Choice)
4.8/5
(40)
Showing 1 - 20 of 93
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)