Exam 20: Auditing in a Computerized Environment

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A numerical field appended to an identification number that serves as an input control is a(n)

(Multiple Choice)
4.8/5
(37)

The purpose of test data is to determine whether

(Multiple Choice)
4.8/5
(39)

Computer operations controls are typically implemented for files and data used in processing.The major objectives of these controls include each of the following except

(Multiple Choice)
4.9/5
(35)

The use of the systems development life cycle is an example of an access to programs and data control.

(True/False)
5.0/5
(38)

Audit teams can use the computer to test the operating effectiveness of the client's controls in each of the following cases except to

(Multiple Choice)
4.8/5
(36)

Computer controls that are pervasive and apply to all applications of a computerized processing system are referred to as

(Multiple Choice)
4.9/5
(39)

At a meeting of the corporate audit committee attended by the general manager of the products division (A.Smith)and the internal audit manager (P.Marks),the following dialogue took place between Smith and R.Jones (chair of the corporate audit committee): Jones: Ms.Marks has suggested that the internal audit department conduct an examination of the computer activities of the products division. Smith: I don't know much about the technicalities of computers,but the division has some of the best computer people in the company. Jones: Do you know whether the internal controls we have implemented are satisfactory? Smith: I suppose they are.No one has complained.What's so important about controls anyway,as long as the system works? I don't even know what type of controls we should have for our system. Jones: Ms.Marks,can you explain the objective of computer controls and provide us some examples? Required: Address Ms.Marks' response to the following points: a.State the principal objective of achieving control over (1)input,(2)processing,and (3)output. b.Provide examples of (1)input controls,(2)processing controls,and (3)output controls.

(Essay)
4.8/5
(45)

The audit team made a copy of the client's sales and billing program early in the audit.Several times during the audit,the team used this copy of the program to process actual client data.The output of the secured program was compared to that of the client's system.This audit technique would be considered

(Multiple Choice)
4.9/5
(36)

As part of assessing the risk of material misstatement,the audit team must assess the control risk in the computerized processing system(s).Initially,the audit team must identify the overall processing scope of the system(s),which would include each of the following considerations except

(Multiple Choice)
4.9/5
(37)

Which of the following input controls would be least likely to identify the failure of an employee to input a transaction for which documentary evidence has been prepared?

(Multiple Choice)
4.9/5
(28)

An audit team's approach to evaluating computerized processing systems that compares source documents to the computer output is known as auditing

(Multiple Choice)
5.0/5
(42)

_____________________________ prepare flowcharts and code the logic of the computer programs required by the overall system designed by the systems analyst.

(Short Answer)
4.8/5
(39)

Four methods that are used by audit teams to test the operating effectiveness of controls include inquiry,observation,documentation examination,and ______________________

(Short Answer)
4.9/5
(35)

Which of the following controls most likely would ensure that an organization can reconstruct its financial records?

(Multiple Choice)
4.9/5
(37)

_____________________________ processing occurs when a group of similar transactions is accumulated and processed simultaneously.

(Short Answer)
4.8/5
(38)

Which of the following automated application controls would offer reasonable assurance that inventory data were completely and accurately entered?

(Multiple Choice)
4.9/5
(33)

An embedded audit module creates simulated data to be processed by the client's computerized processing system.

(True/False)
4.7/5
(38)

Which of the following ensures that the coding of data does not change when it is moved from one internal storage location to another?

(Multiple Choice)
4.7/5
(45)

Which of the following control procedures most likely could prevent computer personnel from modifying programs to bypass computer controls?

(Multiple Choice)
4.8/5
(35)

A(n)__________________________________________ involves testing the client's processing system and controls by creating a dummy department or branch.

(Short Answer)
4.9/5
(31)
Showing 81 - 100 of 118
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)