Exam 20: Auditing in a Computerized Environment

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The basic concept of test data is that once a computer is programmed to handle transactions in a certain way,every transaction will be handled in the same way.

(True/False)
4.8/5
(30)

_____________________________ computing environments are often characterized by inadequate separation of duties and lack of physical computer security.

(Short Answer)
4.9/5
(40)

_____________________________ describes the system and its controls and is the means of communicating the essential elements of the computerized processing system to current and potential users.

(Short Answer)
4.8/5
(37)

Match each of the automated application controls with the error condition(s)they are designed to prevent or detect (each control may be designed to prevent or detect more than one error condition). Match each of the automated application controls with the error condition(s)they are designed to prevent or detect (each control may be designed to prevent or detect more than one error condition).

(Essay)
4.8/5
(35)

Which of the following methods allow fictitious and actual transactions to be processed together without client operating personnel being aware of the testing process?

(Multiple Choice)
4.8/5
(37)

Which of the following is an example of a computer operations control?

(Multiple Choice)
4.8/5
(30)

When weaknesses exist that could lead to computer fraud,the best strategy is to have the client help audit teams plan and execute technical procedures to study and evaluate the system.

(True/False)
4.9/5
(48)

Which of the following is likely to be of least importance to audit teams when obtaining an understanding of the computer controls in an organization with a computerized processing system?

(Multiple Choice)
4.8/5
(43)

What is the difference between the use of test data and parallel simulation?

(Essay)
4.9/5
(37)

Which of the following would reduce the effectiveness of internal control in a computerized processing system?

(Multiple Choice)
4.9/5
(28)

Which of the following would most likely be a weakness in the internal control of a client that utilizes portable computing devices rather than a large computer system?

(Multiple Choice)
4.9/5
(36)

Computerized processing performed concurrently with a particular activity so that results are available to influence a decision being made is referred to as

(Multiple Choice)
4.8/5
(41)

Which of the following is not a control included as part of the systems development life cycle?

(Multiple Choice)
4.9/5
(36)

__________________________________ controls are "built in" to the computer equipment and provide reasonable assurance that data are not altered or modified as they are transmitted within the system.

(Short Answer)
4.7/5
(39)

______________________________ compare the client's processing of simulated transactions to the audit team's manual processing of those transactions.

(Short Answer)
4.8/5
(34)

The client's computerized exception reporting system helps audit teams conduct a more efficient audit because it

(Multiple Choice)
4.8/5
(36)

Which of the following persons is responsible for controlling access to systems documentation and access to program and data files?

(Multiple Choice)
4.9/5
(44)

Which of the following categories of general controls includes retention and recovery techniques for data and related programs?

(Multiple Choice)
4.9/5
(26)

In a computerized processing system,hardware controls are designed to

(Multiple Choice)
4.9/5
(23)

Controls that involve all applications of computerized processing (such as hardware controls)are referred to as ______________________________________.

(Short Answer)
4.9/5
(35)
Showing 21 - 40 of 118
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)