Exam 10: Computer Controls for Organizations and Accounting Information Systems
Exam 1: Accounting Information Systems and the Accountant95 Questions
Exam 2: Information Technology and Aiss111 Questions
Exam 3: Data Modeling104 Questions
Exam 4: Organizing and Manipulating the Data in Databases98 Questions
Exam 5: Database Forms and Reports62 Questions
Exam 6: Documenting Accounting Information Systems60 Questions
Exam 7: Accounting Information Systems and Business Processes: Part I51 Questions
Exam 8: Accounting Information Systems and Business Processes: Part II54 Questions
Exam 9: Introduction to Internal Control Systems69 Questions
Exam 10: Computer Controls for Organizations and Accounting Information Systems93 Questions
Exam 11: Computer Crime, Fraud, Ethics, and Privacy83 Questions
Exam 12: Information Technology Auditing64 Questions
Exam 13: Developing and Implementing Effective Accounting Information Systems107 Questions
Exam 14: Accounting on the Internet106 Questions
Exam 15: Accounting and Enterprise Software46 Questions
Select questions type
A company's computer facilities and computer room conceivably could be destroyed completely by fire.The most appropriate action a company could take in an attempt to prepare for and protect itself for such a disaster would be:
(Multiple Choice)
4.9/5
(38)
An expense report was prepared by a company's cost centre.One executive questioned one of the amounts and asked for "the source documents which support the total." Data processing was not able to routinely do so.The best control procedure would be:
(Multiple Choice)
4.9/5
(37)
Which of the following is an example of application controls in automated data processing systems?
(Multiple Choice)
4.8/5
(31)
It is more difficult to safeguard logical computer access than it is to safeguard physical computer access.
(True/False)
4.7/5
(42)
For a routine management report produced on the computer, which one of the following control duties is most likely to be the sole responsibility of the user department?
(Multiple Choice)
4.8/5
(38)
The grandfather-parent-child approach to providing protection for important computer files is a concept that is most often found in:
(Multiple Choice)
4.7/5
(32)
The least effective physical security control for a computer centre is:
(Multiple Choice)
4.8/5
(43)
Output controls for the computerized accounting information system focus primarily on the security and distribution of print media prepared by the computer centre.
(True/False)
4.9/5
(36)
No record of transactions is made in an online computerized system.
(True/False)
4.8/5
(38)
_____________ are often based on the concept of redundancy.
(Multiple Choice)
4.9/5
(32)
When a company is setting up its accounting information system, it is important for management to select:
(Multiple Choice)
4.9/5
(40)
According to the text, data transcription would only be necessary for a computerized accounting information system.
(True/False)
4.8/5
(34)
An effective control for maintaining the privacy of data stored on a large, networked server would be:
(Multiple Choice)
4.8/5
(36)
Additional input controls include all but one of the following:
(Multiple Choice)
4.8/5
(38)
Within database systems, a control that restricts user access to precisely designated data sets and files is called aan):
(Multiple Choice)
4.8/5
(30)
In order to maintain good internal control within the computer de?partment:
(Multiple Choice)
4.7/5
(36)
A CA reviews a client's payroll procedures.The CA would consider internal control to be less than effective if a payroll department supervisor was assigned the responsibility for:
(Multiple Choice)
4.7/5
(35)
Showing 41 - 60 of 93
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)