Exam 20: Auditing in a Computerized Environment
Exam 1: Auditing and Assurance Services115 Questions
Exam 2: Professional Standards124 Questions
Exam 3: Engagement Planning146 Questions
Exam 4: Management Fraud and Audit Risk125 Questions
Exam 5: Risk Assessment: Internal Control Evaluation125 Questions
Exam 6: Employee Fraud and the Audit of Cash104 Questions
Exam 7: Revenue and Collection Cycle109 Questions
Exam 8: Acquisition and Expenditure Cycle129 Questions
Exam 9: Production Cycle98 Questions
Exam 10: Finance and Investment Cycle114 Questions
Exam 11: Completing the Audit132 Questions
Exam 12: Reports on Audited Financial Statements114 Questions
Exam 13: Other Public Accounting Services114 Questions
Exam 14: Professional Ethics124 Questions
Exam 15: Legal Liability137 Questions
Exam 16: Internal Governmental and Fraud Audits119 Questions
Exam 17: Overview of Sampling131 Questions
Exam 18: Attributes Sampling137 Questions
Exam 19: Variables Sampling136 Questions
Exam 20: Auditing in a Computerized Environment118 Questions
Select questions type
Match each of the following categories of general controls (letters A-E)to the description of a computer control (numbers 1-10).A category of general controls can be used more than once.
A. Hardware controls
B. Program development controls
C. Program change controls
D. Computer operations controls
E. Access to programs and data controls
(Short Answer)
4.8/5
(34)
Audit teams can obtain evidence of the proper functioning of password access control to a computerized processing system by
(Multiple Choice)
4.7/5
(36)
Audit teams would most likely use computer-assisted audit techniques to
(Multiple Choice)
4.9/5
(31)
Computer controls that provide reasonable assurance that data are not altered or modified as they are transmitted through the system are referred to as
(Multiple Choice)
4.8/5
(41)
Auditing ________________________________________ consists of reconciling source documents with computer output.
(Short Answer)
5.0/5
(39)
A program description should contain a program flowchart,a list of the program source code,and a record of all program changes.
(True/False)
4.9/5
(37)
Audit teams cannot test the reliable operation of computer control procedures by
(Multiple Choice)
4.7/5
(36)
Identify whether each of the following statements is appropriate for auditing around the computer (A),auditing through the computer (T),or auditing both around and through the computer (B).
____ 1.It is more likely to be utilized when the client's computerized processing systems are relatively simple.
____ 2.The method is permitted under generally accepted auditing standards.
____ 3.It requires audit teams to evaluate and test the operating effectiveness of computer controls.
____ 4.It primarily concerns correspondence between input and output.
____ 5.The use of test data and parallel simulation are examples of this approach.
____ 6.It should be used with more complex computerized processing systems.
____ 7.Audit teams can design error conditions to evaluate how these conditions are processed.
____ 8.Audit teams are required to consider important computer controls that have been implemented by the client over computerized processing of transactions.
____ 9.It is more likely to be used when clients have not implemented extensive computer controls.
____ 10.It can be used to provide audit teams with a basis for assessing control risk.
(Short Answer)
4.8/5
(37)
____________________________________ represent comparisons of the number of transactions submitted for data conversion with the number of transactions actually entered for processing.
(Short Answer)
4.9/5
(43)
Retaining previous generations of files for use in reconstructing current generations of files is known as the _________________________________________ technique.
(Short Answer)
4.8/5
(34)
The technique of creating a minicompany with fictitious master file records to process simulated data simultaneously with actual client data is referred to as a(n)
(Multiple Choice)
4.8/5
(41)
Which of the following is not a major difference between a manual processing environment and a computerized processing environment?
(Multiple Choice)
4.9/5
(34)
Each of the following automated application controls is designed to ensure that the input of individual transactions and data is accurate except
(Multiple Choice)
4.8/5
(34)
Which of the following organizational positions would evaluate the existing system and design new computerized processing systems and documentation?
(Multiple Choice)
4.8/5
(41)
An important control over program development is the entity's use of the _____________________________________________ life cycle to plan,develop,and implement new computerized systems.
(Short Answer)
4.9/5
(40)
_____________________________ and _____________________________ are special internal labels on files that provide reasonable assurance that the correct files are used in processing.
(Short Answer)
4.9/5
(38)
In an integrated test facility,simulated transactions are processed through the client's computerized processing system along with the client's actual transactions.
(True/False)
4.7/5
(37)
_____________________________________ are arithmetic totals of fields that do not have a significant meaning (such as employee numbers).
(Short Answer)
4.9/5
(37)
Showing 101 - 118 of 118
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)