Exam 10: Understanding Internal Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags
Match the primary responsibilities below with the positions within an IT department .
Flowcharts logic of computer programs, develops and documents programs, and debugs programs.
IT manager
Manages security of IT systems, including hardware, security software and monitors access to programs and data, and follows-up on security breaches.
Systems analyst
Exercises overall control, develops short and long range plans, and approves systems.
Programmer
Correct Answer:
Verified
Premises:
Responses:
Flowcharts logic of computer programs, develops and documents programs, and debugs programs.
IT manager
Manages security of IT systems, including hardware, security software and monitors access to programs and data, and follows-up on security breaches.
Systems analyst
Exercises overall control, develops short and long range plans, and approves systems.
Programmer
Designs content and organization of the database and controls access to and use of the database.
Computer operator
Evaluates existing systems, designs new systems, outlines the systems, and prepares specifications for programmers.
Security administrator
Acts as liaison with user departments and monitors input, processing, and output.
Librarian
Maintains custody of systems documentation, programs, and files.
Data control group
Operates the computer hardware and executes the program according to operating instructions.
Database administrator
(Matching)
4.8/5
(31)

In an audit of a small company, a narrative memorandum may serve as the only documentation of the auditor's understanding of internal controls.

(True/False)
4.8/5
(37)

Distinguish between systems programs and application programs, and identify four types of systems programs.

(Essay)
4.9/5
(41)

Which one of the following is a key component of a decision table?

(Multiple Choice)
4.8/5
(37)

The risk of misstatement is associated with changes in the content or form of information.

(True/False)
4.8/5
(32)

A before-and-after report shows a summary of the contents of a master file before and after each update.

(True/False)
4.8/5
(37)

Utility programs contain instructions that enable the computer to perform specific data processing tasks for the user.

(True/False)
4.8/5
(32)

An entity's internal controls consist of five interrelated components (plus an overriding concern with fraud prevention and detection):A:control environment B:risk assessment C:information and communication D:control activities E:monitoring REQUIRED: Using the appropriate letter, identify the component to which each of the following control activities or considerations pertains. 1.Performance reviews 2.Commitment to competence 3.System should provide a complete audit or transaction trail 4.Integrity and ethical values 5.Access controls 6.Changes in operating environment 7.Board of directors and audit committee 8.Segregation of duties 9.Organizational structure 10.Reporting exceptions for follow-up 11.Management's philosophy and operating style 12.Internal audit function 13.Physical controls 14.New accounting pronouncements 15.Assignment of authority and responsibility 16.Human resource policies and procedures 17.Organization and operation control 18.Input controls 19.Data and procedural controls 20.Processing controls

(Short Answer)
4.7/5
(37)

The auditor's consideration of internal controls relates primarily to nonfinancial objectives.

(True/False)
4.7/5
(41)

A company's accounting system should provide a complete "chain of evidence" for every major transaction.

(True/False)
4.9/5
(35)

The grandfather-father-son concept is an example of a(n):

(Multiple Choice)
4.7/5
(45)

Internal auditors have primary responsibility for establishing and maintaining internal controls.

(True/False)
4.8/5
(37)

The database method of data organization is the main alternative to the traditional file method.

(True/False)
4.8/5
(36)

Which of the following is not a hardware and systems software control?

(Multiple Choice)
4.7/5
(37)

To enhance controls, it is normally desirable to have a single employee handle a transaction from beginning to end.

(True/False)
4.9/5
(36)

Which of the following is a widely used data processing method?

(Multiple Choice)
4.8/5
(33)

List the fundamental concepts that are embodied in the definition of internal control as per the COSO report.

(Essay)
4.9/5
(28)

It is management's responsibility to establish and maintain effective internal controls.

(True/False)
4.9/5
(35)

Management's risk assessment for financial reporting purposes is similar to the internal auditor's concern with inherent risks.

(True/False)
4.7/5
(35)

Monitoring is a process that assesses the quality of the internal controls performance over time.

(True/False)
4.8/5
(53)
Showing 61 - 80 of 91
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)