Exam 8: Consideration of Internal Control in an Information Technology Environment
Exam 1: The Role of the Public Accountant in the American Economy45 Questions
Exam 2: Professional Standards62 Questions
Exam 3: Professional Ethics62 Questions
Exam 4: Legal Liability of CPAS56 Questions
Exam 5: Audit Evidence and Documentation81 Questions
Exam 6: Audit Planning, understanding the Client, assessing Risks, and Responding78 Questions
Exam 7: Internal Control92 Questions
Exam 8: Consideration of Internal Control in an Information Technology Environment63 Questions
Exam 9: Audit Sampling83 Questions
Exam 10: Cash and Financial Investments63 Questions
Exam 11: Accounts Receivable, Notes Receivable, and Revenue65 Questions
Exam 12: Inventories and Cost of Goods Sold59 Questions
Exam 13: Property Plant and Equipment: Depreciation and Depletion39 Questions
Exam 14: Accounts Payable and Other Liabilities50 Questions
Exam 15: Debt and Equity Capital41 Questions
Exam 16: Auditing Operations and Completing the Audit69 Questions
Exam 17: Auditors Report63 Questions
Exam 18: Integrated Audits of Public Companies43 Questions
Exam 19: Additional Assurance Services: Historical Financial Information59 Questions
Exam 20: Additional Assurance Services: Other Information48 Questions
Exam 21: Internal, Operational, and Compliance Auditing46 Questions
Exam 22: Probability-Proportion-To-Size Sampling24 Questions
Select questions type
Which of the following computer related employees should not be allowed access to program listings of application programs?
Free
(Multiple Choice)
4.8/5
(27)
Correct Answer:
C
Auditing by testing the input and output of a computer system instead of the computer program itself will:
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
A
Which of the following personnel is responsible for the proper functioning of the security features built into the operating system?
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
A
Magnetic tape drives have the advantage of direct access to stored data.
(True/False)
4.8/5
(37)
Distributive data processing eliminates the need for data security.
(True/False)
4.9/5
(38)
Which of the following testing techniques minimizes the possibility that the auditors will contaminate a client's financial records?
(Multiple Choice)
4.8/5
(44)
For good internal control,programmers should not be given access to complete program documentation for the programs they work on.
(True/False)
4.8/5
(41)
If a control total were to be computed on each of the following data items,which would best be identified as a hash total for a payroll computer application?
(Multiple Choice)
4.9/5
(38)
Auditors usually begin their consideration of IT systems with tests of application controls.
(True/False)
4.8/5
(38)
The purpose of using generalized computer programs is to test and analyze a client's computer:
(Multiple Choice)
4.8/5
(39)
When conducting field work for a physical inventory,an auditor cannot perform which of the following steps using a generalized audit software package?
(Multiple Choice)
4.9/5
(29)
Which of the following is not a distinctive characteristic of advanced IT systems?
(Multiple Choice)
4.8/5
(42)
General controls over IT systems are typically tested using:
(Multiple Choice)
4.8/5
(39)
In the weekly computer run to prepare payroll checks,a check was printed for an employee who had been terminated the previous week.Which of the following controls,if properly utilized,would have been most effective in preventing the error or ensuing its prompt detection?
(Multiple Choice)
4.8/5
(39)
A system in which the end user is responsible for the development and execution of the computer application that he or she uses is referred to as:
(Multiple Choice)
4.8/5
(33)
Parallel simulation programs used by the auditors for testing programs:
(Multiple Choice)
4.8/5
(38)
Showing 1 - 20 of 63
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)