Exam 20: Auditing in a Computerized Environment
Exam 1: Auditing and Assurance Services115 Questions
Exam 2: Professional Standards124 Questions
Exam 3: Engagement Planning146 Questions
Exam 4: Management Fraud and Audit Risk125 Questions
Exam 5: Risk Assessment: Internal Control Evaluation125 Questions
Exam 6: Employee Fraud and the Audit of Cash104 Questions
Exam 7: Revenue and Collection Cycle109 Questions
Exam 8: Acquisition and Expenditure Cycle129 Questions
Exam 9: Production Cycle98 Questions
Exam 10: Finance and Investment Cycle114 Questions
Exam 11: Completing the Audit132 Questions
Exam 12: Reports on Audited Financial Statements114 Questions
Exam 13: Other Public Accounting Services114 Questions
Exam 14: Professional Ethics124 Questions
Exam 15: Legal Liability137 Questions
Exam 16: Internal Governmental and Fraud Audits119 Questions
Exam 17: Overview of Sampling131 Questions
Exam 18: Attributes Sampling137 Questions
Exam 19: Variables Sampling136 Questions
Exam 20: Auditing in a Computerized Environment118 Questions
Select questions type
A numerical field appended to an identification number that serves as an input control is a(n)
(Multiple Choice)
4.8/5
(37)
Computer operations controls are typically implemented for files and data used in processing.The major objectives of these controls include each of the following except
(Multiple Choice)
4.9/5
(35)
The use of the systems development life cycle is an example of an access to programs and data control.
(True/False)
5.0/5
(38)
Audit teams can use the computer to test the operating effectiveness of the client's controls in each of the following cases except to
(Multiple Choice)
4.8/5
(36)
Computer controls that are pervasive and apply to all applications of a computerized processing system are referred to as
(Multiple Choice)
4.9/5
(39)
At a meeting of the corporate audit committee attended by the general manager of the products division (A.Smith)and the internal audit manager (P.Marks),the following dialogue took place between Smith and R.Jones (chair of the corporate audit committee):
Jones: Ms.Marks has suggested that the internal audit department conduct an examination of the computer activities of the products division.
Smith: I don't know much about the technicalities of computers,but the division has some of the best computer people in the company.
Jones: Do you know whether the internal controls we have implemented are satisfactory?
Smith: I suppose they are.No one has complained.What's so important about controls anyway,as long as the system works? I don't even know what type of controls we should have for our system.
Jones: Ms.Marks,can you explain the objective of computer controls and provide us some examples?
Required:
Address Ms.Marks' response to the following points:
a.State the principal objective of achieving control over (1)input,(2)processing,and (3)output.
b.Provide examples of (1)input controls,(2)processing controls,and (3)output controls.
(Essay)
4.8/5
(45)
The audit team made a copy of the client's sales and billing program early in the audit.Several times during the audit,the team used this copy of the program to process actual client data.The output of the secured program was compared to that of the client's system.This audit technique would be considered
(Multiple Choice)
4.9/5
(36)
As part of assessing the risk of material misstatement,the audit team must assess the control risk in the computerized processing system(s).Initially,the audit team must identify the overall processing scope of the system(s),which would include each of the following considerations except
(Multiple Choice)
4.9/5
(37)
Which of the following input controls would be least likely to identify the failure of an employee to input a transaction for which documentary evidence has been prepared?
(Multiple Choice)
4.9/5
(28)
An audit team's approach to evaluating computerized processing systems that compares source documents to the computer output is known as auditing
(Multiple Choice)
5.0/5
(42)
_____________________________ prepare flowcharts and code the logic of the computer programs required by the overall system designed by the systems analyst.
(Short Answer)
4.8/5
(39)
Four methods that are used by audit teams to test the operating effectiveness of controls include inquiry,observation,documentation examination,and ______________________
(Short Answer)
4.9/5
(35)
Which of the following controls most likely would ensure that an organization can reconstruct its financial records?
(Multiple Choice)
4.9/5
(37)
_____________________________ processing occurs when a group of similar transactions is accumulated and processed simultaneously.
(Short Answer)
4.8/5
(38)
Which of the following automated application controls would offer reasonable assurance that inventory data were completely and accurately entered?
(Multiple Choice)
4.9/5
(33)
An embedded audit module creates simulated data to be processed by the client's computerized processing system.
(True/False)
4.7/5
(38)
Which of the following ensures that the coding of data does not change when it is moved from one internal storage location to another?
(Multiple Choice)
4.7/5
(45)
Which of the following control procedures most likely could prevent computer personnel from modifying programs to bypass computer controls?
(Multiple Choice)
4.8/5
(35)
A(n)__________________________________________ involves testing the client's processing system and controls by creating a dummy department or branch.
(Short Answer)
4.9/5
(31)
Showing 81 - 100 of 118
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)