Exam 10: Computer Controls for Organizations and Accounting Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

One of the techniques for controlling batch processing is the use of hash totals.

(True/False)
4.7/5
(37)

Due to an unusual program error which had never happened before, the accounts receivable updating run did not process three transactions.The error was not noted by the operator because he was busy working on another project.There were control totals for the file which were printed out.An examination of the printout would have disclosed the error.The best control procedure would be:

(Multiple Choice)
4.8/5
(46)

The magnetic tape containing accounts receivable transactions could not be located.A data processing supervisor said that it could have been put among the scratch tapes available for use in processing.The best control procedure would be aan):

(Multiple Choice)
4.7/5
(38)

If _____ controls are ineffective, this can cause ____ controls to be unreliable.

(Multiple Choice)
4.8/5
(39)

Which of the following best describes a fundamental control weakness often associated with automated data processing systems?

(Multiple Choice)
4.8/5
(36)

Which of the following is not a subcategory of input controls?

(Multiple Choice)
4.8/5
(49)

The audit trail is easier to follow in an online computerized system as compared to a batch system.

(True/False)
4.8/5
(34)

A company's disaster recovery site that includes a computer system configured similarly to the system used regularly by the company for data processing purposes is called:

(Multiple Choice)
4.8/5
(36)

A technique for controlling identification numbers part number, employee number, etc.)is:

(Multiple Choice)
4.8/5
(40)

An internal label may be used only with magnetic tape systems.

(True/False)
4.9/5
(36)

When we say that an organization has an "integrated security policy", what do we mean?

(Multiple Choice)
4.7/5
(36)

Most computer vandalism is performed by "professional" computer criminals who have no personal contact with the computer centres they disrupt.

(True/False)
4.8/5
(38)

An apparent error in input data describing an inventory item received was referred back to the originating department for correction.A week later the department complained that the inventory in question was incorrect.Data processing could not easily determine whether or not the item had been processed by the computer.The best control procedure would be:

(Multiple Choice)
4.9/5
(34)

In its automated data processing system, a company might use self-checking numbers check digit)to enable detection of which of the following errors?

(Multiple Choice)
4.9/5
(35)

In an online, real-time system, which of the following would be most likely to be used as backup for an application's master file maintained on magnetic disk?

(Multiple Choice)
4.7/5
(36)

Which of the following is not a major reason for controls in a computerized accounting information system?

(Multiple Choice)
4.8/5
(33)

The master file for inventory did not seem right.The file was printed out and many errors were found.The best control procedure would be:

(Multiple Choice)
4.9/5
(41)

Fault-tolerant systems are typically based on the concept of:

(Multiple Choice)
4.9/5
(42)

Daylight Corporation's organization chart provides for a controller and an information processing manager, both of whom report to the financial vice-president.Internal control would not be strengthened by:

(Multiple Choice)
5.0/5
(38)

Testing processing programs with test data is performed only when a system is first installed due to the high costs of such test runs.

(True/False)
4.7/5
(43)
Showing 61 - 80 of 93
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)