Exam 8: Controlling Information Systems: Introduction to Pervasive Controls
Exam 1: Introduction to Accounting Information Systems122 Questions
Exam 2: Enterprise Systems141 Questions
Exam 3: Electronic Business E-Business Systems122 Questions
Exam 4: Documenting Information Systems129 Questions
Exam 5: Database Management Systems175 Questions
Exam 6: Relational Databases and SQL103 Questions
Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control161 Questions
Exam 8: Controlling Information Systems: Introduction to Pervasive Controls159 Questions
Exam 9: Controlling Information Systems: Business Process and Application Controls135 Questions
Exam 10: The Order Entrysales Oes Process134 Questions
Exam 11: The Billingaccounts Receivablecash Receipts Barcr Process134 Questions
Exam 12: The Purchasing Process141 Questions
Exam 13: The Accounts Payablecash Disbursements Apcd Process118 Questions
Exam 14: The Human Resources Process HR Management and Payroll Processes121 Questions
Exam 15: Integrated Production Processes IPP118 Questions
Exam 16: The General Ledger and Business Reporting GLBR Process107 Questions
Exam 17: Acquiring and Implementing Accounting Information Systems206 Questions
Select questions type
The process whereby lost data is restored and operations are continued is called ______________________________.
(Short Answer)
4.7/5
(40)
______________________________ documentation provides a description of an application computer program and usually includes the program's purpose, program flowcharts, and source code listings.
(Short Answer)
4.9/5
(38)
One method for circumventing segregation of duties is ______________________________ between one or more persons (or departments) to exploit a system and conceal an abuse such as fraud.
(Short Answer)
4.8/5
(30)
The functions of the security officer commonly include assigning passwords and working with human resources to ensure proper interview practices are conducted during the hiring process.
(True/False)
4.8/5
(40)
Watching a user type in passwords or user IDs or listening as they give account information over the phone is called ______________________________.
(Short Answer)
4.7/5
(43)
The systems development function provides efficient and effective operation of the computer equipment.
(True/False)
4.8/5
(33)
The ______________________________ group is responsible for routing all work in to and out of the data center, correcting errors, and monitoring all error correction.
(Short Answer)
4.9/5
(37)
______________________________ helps to solve the problem posed by single key cryptography by employing a pair of matched keys for each system user, one private (i.e., known only to the party who possesses it) and one public.
(Short Answer)
4.9/5
(41)
The IS function with the responsibility of guiding the IT organization in establishing and meeting user information requirements is the IT steering committee.
(True/False)
4.8/5
(48)
The ______________________________ gives detailed instructions to computer operators and to data control about a particular application.
(Short Answer)
4.8/5
(38)
The function composed of people, procedures, and equipment and is typically called the information systems department, IS department, or the IT department is the information systems organization.
(True/False)
4.9/5
(38)
In a(n) ______________________________ a Web site is overwhelmed by an intentional onslaught of thousands of simultaneous messages, making it impossible for the attacked site to engage in its normal activities.
(Short Answer)
4.8/5
(42)
Periodic cleaning, testing, and adjusting of computer equipment is referred to as ______________________________.
(Short Answer)
4.8/5
(35)
Listed below are several pervasive control plans discussed in Chapter 8. On the blank line to the left of each control plan, insert a "P" (preventive), "D" (detective), or "C" (corrective) to best classify that control. If applicable, more than one code may be inserted for each plan.


(Essay)
4.8/5
(41)
An outside auditing firm annually supervises a physical count of the items in a retail store's shelf inventory. This is an example of:
(Multiple Choice)
4.9/5
(43)
Alternative names for contingency planning include all of the following except:
(Multiple Choice)
5.0/5
(32)
The operations run manual describes user procedures for an application and assists the user in preparing inputs and using outputs.
(True/False)
4.8/5
(39)
Showing 141 - 159 of 159
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)