Exam 17: IT Controls : Systems Development Program Changes and Application Controls
Exam 1: The Information System: An Accountant’s Perspective96 Questions
Exam 2: Introduction to Transaction Processing119 Questions
Exam 3: Ethics, Fraud, and Internal Control119 Questions
Exam 4: The Revenue Cycle105 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures102 Questions
Exam 6: The Expenditure Cycle Part II: Payroll Processing and Fixed Asset Procedures87 Questions
Exam 7: The Conversion Cycle102 Questions
Exam 8: General Ledger, Financial Reporting, and Management Reporting Systems94 Questions
Exam 9: Database Management Systems106 Questions
Exam 10: The REA Approach to Business Process Modeling76 Questions
Exam 11: Enterprise Resource Planning Systems97 Questions
Exam 12: Electronic Commerce Systems102 Questions
Exam 13: Managing the Systems Development Life Cycle93 Questions
Exam 14: Construct, Deliver, and Maintain Systems Projects93 Questions
Exam 15: IT Controls : Sarbanes-Oxley and IT Governance130 Questions
Exam 16: IT Controls : Security and Access96 Questions
Exam 17: IT Controls : Systems Development Program Changes and Application Controls96 Questions
Select questions type
Which input control check would detect a posting to the wrong customer account?
(Multiple Choice)
4.8/5
(45)
Which statement is not correct? The audit trail in a computerized environment
(Multiple Choice)
4.9/5
(33)
A __________________________ fraud affects a large number of victims but the harm to each appears to be very small.
(Short Answer)
4.8/5
(36)
A salami fraud affects a large number of victims,but the harm to each appears to be very small.
(True/False)
4.8/5
(38)
Generalized audit software packages are used to assist the auditor in performing substantive tests.
(True/False)
4.9/5
(44)
Methods used to maintain an audit trail in a computerized environment include all of the following except
(Multiple Choice)
4.8/5
(41)
Which control is not associated with new systems development activities?
(Multiple Choice)
4.9/5
(39)
The base case system evaluation is a variation of the test data method.
(True/False)
4.9/5
(33)
All of the following concepts are associated with the black box approach to auditing computer applications except
(Multiple Choice)
4.8/5
(34)
In a computerized environment,all input controls are implemented after data is input.
(True/False)
4.8/5
(32)
The presence of an audit trail is critical to the integrity of the accounting information system.Discuss three of the techniques used to preserve the audit trail.
(Essay)
4.9/5
(30)
Source program library controls should prevent and detect unauthorized access to application programs.
(True/False)
4.7/5
(36)
Showing 21 - 40 of 96
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)