Exam 20: Auditing in a Computerized Environment
Exam 1: Auditing and Assurance Services115 Questions
Exam 2: Professional Standards124 Questions
Exam 3: Engagement Planning146 Questions
Exam 4: Management Fraud and Audit Risk125 Questions
Exam 5: Risk Assessment: Internal Control Evaluation125 Questions
Exam 6: Employee Fraud and the Audit of Cash104 Questions
Exam 7: Revenue and Collection Cycle109 Questions
Exam 8: Acquisition and Expenditure Cycle129 Questions
Exam 9: Production Cycle98 Questions
Exam 10: Finance and Investment Cycle114 Questions
Exam 11: Completing the Audit132 Questions
Exam 12: Reports on Audited Financial Statements114 Questions
Exam 13: Other Public Accounting Services114 Questions
Exam 14: Professional Ethics124 Questions
Exam 15: Legal Liability137 Questions
Exam 16: Internal Governmental and Fraud Audits119 Questions
Exam 17: Overview of Sampling131 Questions
Exam 18: Attributes Sampling137 Questions
Exam 19: Variables Sampling136 Questions
Exam 20: Auditing in a Computerized Environment118 Questions
Select questions type
The basic concept of test data is that once a computer is programmed to handle transactions in a certain way,every transaction will be handled in the same way.
(True/False)
4.8/5
(30)
_____________________________ computing environments are often characterized by inadequate separation of duties and lack of physical computer security.
(Short Answer)
4.9/5
(40)
_____________________________ describes the system and its controls and is the means of communicating the essential elements of the computerized processing system to current and potential users.
(Short Answer)
4.8/5
(37)
Match each of the automated application controls with the error condition(s)they are designed to prevent or detect (each control may be designed to prevent or detect more than one error condition). 

(Essay)
4.8/5
(35)
Which of the following methods allow fictitious and actual transactions to be processed together without client operating personnel being aware of the testing process?
(Multiple Choice)
4.8/5
(37)
Which of the following is an example of a computer operations control?
(Multiple Choice)
4.8/5
(30)
When weaknesses exist that could lead to computer fraud,the best strategy is to have the client help audit teams plan and execute technical procedures to study and evaluate the system.
(True/False)
4.9/5
(48)
Which of the following is likely to be of least importance to audit teams when obtaining an understanding of the computer controls in an organization with a computerized processing system?
(Multiple Choice)
4.8/5
(43)
What is the difference between the use of test data and parallel simulation?
(Essay)
4.9/5
(37)
Which of the following would reduce the effectiveness of internal control in a computerized processing system?
(Multiple Choice)
4.9/5
(28)
Which of the following would most likely be a weakness in the internal control of a client that utilizes portable computing devices rather than a large computer system?
(Multiple Choice)
4.9/5
(36)
Computerized processing performed concurrently with a particular activity so that results are available to influence a decision being made is referred to as
(Multiple Choice)
4.8/5
(41)
Which of the following is not a control included as part of the systems development life cycle?
(Multiple Choice)
4.9/5
(36)
__________________________________ controls are "built in" to the computer equipment and provide reasonable assurance that data are not altered or modified as they are transmitted within the system.
(Short Answer)
4.7/5
(39)
______________________________ compare the client's processing of simulated transactions to the audit team's manual processing of those transactions.
(Short Answer)
4.8/5
(34)
The client's computerized exception reporting system helps audit teams conduct a more efficient audit because it
(Multiple Choice)
4.8/5
(36)
Which of the following persons is responsible for controlling access to systems documentation and access to program and data files?
(Multiple Choice)
4.9/5
(44)
Which of the following categories of general controls includes retention and recovery techniques for data and related programs?
(Multiple Choice)
4.9/5
(26)
In a computerized processing system,hardware controls are designed to
(Multiple Choice)
4.9/5
(23)
Controls that involve all applications of computerized processing (such as hardware controls)are referred to as ______________________________________.
(Short Answer)
4.9/5
(35)
Showing 21 - 40 of 118
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)