Exam 8: Consideration of Internal Control in an Information Technology Environment
Exam 1: The Role of the Public Accountant in the American Economy56 Questions
Exam 2: Professional Standards69 Questions
Exam 3: Professional Ethics76 Questions
Exam 4: Legal Liability of Cpas61 Questions
Exam 5: Audit Evidence and Documentation92 Questions
Exam 6: Audit Planning, understanding the Client, assessing Risks, and Responding84 Questions
Exam 7: Internal Control97 Questions
Exam 8: Consideration of Internal Control in an Information Technology Environment76 Questions
Exam 9: Audit Sampling91 Questions
Exam 10: Cash and Financial Investments69 Questions
Exam 11: Accounts Receivable, notes Receivable, and Revenue73 Questions
Exam 12: Inventories and Cost of Goods Sold64 Questions
Exam 13: Property,plant,and Equipment: Depreciation and Depletion46 Questions
Exam 14: Accounts Payable and Other Liabilities57 Questions
Exam 15: Debt and Equity Capital45 Questions
Exam 16: Auditing Operations and Completing the Audit83 Questions
Exam 17: Auditors Reports73 Questions
Exam 18: Integrated Audits of Public Companies49 Questions
Exam 19: Additional Assurance Services: Historical Financial Information65 Questions
Exam 20: Additional Assurance Services: Other Information55 Questions
Exam 21: Internal, operational, and Compliance Auditing51 Questions
Select questions type
The individual with whom an auditor would be most likely to discuss specific access controls within a client's relational database management system is the
(Multiple Choice)
4.8/5
(35)
Which of the following is not a distinctive characteristic of advanced IT systems?
(Multiple Choice)
4.9/5
(41)
A problem for a CPA associated with advanced IT systems is that:
(Multiple Choice)
4.9/5
(31)
Which of the following is most likely to include user group development and execution of certain computer applications?
(Multiple Choice)
4.8/5
(37)
A network security system that monitors and controls the incoming and outgoing network access and data based on predetermined security criteria is referred to as a
(Multiple Choice)
4.9/5
(35)
Substantive procedures that cannot be performed with generalized audit software include:
(Multiple Choice)
4.9/5
(39)
Various computing devices (e.g. ,desktops,laptops,tablets,phones)have resulted in a(n):
(Multiple Choice)
4.8/5
(35)
Which of the following would be least likely to be considered a desirable attribute of a database management system?
(Multiple Choice)
4.9/5
(31)
Decentralized data processing eliminates the need for data security.
(True/False)
4.9/5
(36)
When conducting fieldwork for a physical inventory,an auditor is least likely to perform which of the following steps using a generalized audit software package?
(Multiple Choice)
4.9/5
(31)
Which of the following computer related employees should not be allowed access to program listings of application programs?
(Multiple Choice)
4.9/5
(40)
Usernames,passwords,and identity cards are examples approaches to:
(Multiple Choice)
4.8/5
(36)
Which of the following personnel is responsible for determining the computer processing needs of the various users?
(Multiple Choice)
4.9/5
(34)
End user computing is most likely to occur on which of the following types of computers?
(Multiple Choice)
4.8/5
(31)
The capability for computers to communicate with various electronic devices is an important feature in the design of modern business information systems.Which of the following risks associated with the use of telecommunications systems is minimized through the use of a password control system?
(Multiple Choice)
4.9/5
(42)
Auditors are now faced with examining clients that have database systems.
a.Describe a database system,including its major advantage.
b.Identify policies and procedures that may be established to provide control over that aspect of a database system.
(Essay)
4.8/5
(39)
Many auditors use generalized audit software to assist them in the examination of clients' computer records.
a.Describe what is meant by generalized audit software.
b.List two advantages of the use of generalized audit software.
c.List three functions that may be performed with this type of software.
(Essay)
4.8/5
(34)
The completeness of computer generated sales figures can be tested by comparing the number of items listed on the daily sales report with the number of items billed on the actual invoices.This process uses:
(Multiple Choice)
4.7/5
(42)
Showing 21 - 40 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)