Exam 8: Consideration of Internal Control in an Information Technology Environment
Exam 1: The Role of the Public Accountant in the American Economy45 Questions
Exam 2: Professional Standards62 Questions
Exam 3: Professional Ethics62 Questions
Exam 4: Legal Liability of CPAS56 Questions
Exam 5: Audit Evidence and Documentation81 Questions
Exam 6: Audit Planning, understanding the Client, assessing Risks, and Responding78 Questions
Exam 7: Internal Control92 Questions
Exam 8: Consideration of Internal Control in an Information Technology Environment63 Questions
Exam 9: Audit Sampling83 Questions
Exam 10: Cash and Financial Investments63 Questions
Exam 11: Accounts Receivable, Notes Receivable, and Revenue65 Questions
Exam 12: Inventories and Cost of Goods Sold59 Questions
Exam 13: Property Plant and Equipment: Depreciation and Depletion39 Questions
Exam 14: Accounts Payable and Other Liabilities50 Questions
Exam 15: Debt and Equity Capital41 Questions
Exam 16: Auditing Operations and Completing the Audit69 Questions
Exam 17: Auditors Report63 Questions
Exam 18: Integrated Audits of Public Companies43 Questions
Exam 19: Additional Assurance Services: Historical Financial Information59 Questions
Exam 20: Additional Assurance Services: Other Information48 Questions
Exam 21: Internal, Operational, and Compliance Auditing46 Questions
Exam 22: Probability-Proportion-To-Size Sampling24 Questions
Select questions type
A company's labor distribution report requires extensive corrections each month because of labor hours charged to inactive jobs.Which of the following data processing input controls appears to be missing?
(Multiple Choice)
4.8/5
(42)
Internal control is ineffective when computer department personnel:
(Multiple Choice)
4.9/5
(39)
Internal file labels are designed to prevent errors by programmers.
(True/False)
4.7/5
(39)
When erroneous data are detected by computer program controls,such data may be excluded from processing and printed on an exception report.The exception report should most probably be reviewed and followed up on by the:
(Multiple Choice)
4.8/5
(38)
A control feature in a computer system requires the central processing unit (CPU)to send signals to the printer to activate the print mechanism for each character.The print mechanism,just prior to printing,sends a signal back to the CPU verifying that the proper print position has been activated.This type of data transmission is referred to as:
(Multiple Choice)
4.9/5
(41)
The capability for computers to communicate with physically remote terminals is an important feature in the design of modern business information systems.Which of the following risks associated with the use of telecommunications systems is minimized through the use of a password control system?
(Multiple Choice)
4.9/5
(41)
For auxiliary storage when the computer is operating,personal computers use hard disk drives.
(True/False)
4.8/5
(43)
Which of the following personnel is responsible for determining the computer processing needs of the various users?
(Multiple Choice)
4.8/5
(37)
Which of the following would the auditors consider to be a weakness in an IT system?
(Multiple Choice)
4.8/5
(35)
Which of the following is least likely to be a general control over computer activities?
(Multiple Choice)
4.9/5
(28)
Which of the following is most likely to include user group development and execution of certain computer applications?
(Multiple Choice)
4.7/5
(37)
Generalized audit software may be used for substantive tests or for tests of controls.
(True/False)
4.8/5
(33)
An auditor may decide not to perform tests of controls related to the control activities within the computer portion of the client's internal control.Which of the following would not be a valid reason for choosing to omit such test?
(Multiple Choice)
4.8/5
(27)
A problem for a CPA associated with advanced IT systems is that:
(Multiple Choice)
4.7/5
(33)
The best method of achieving internal control over advanced IT systems is through the use of:
(Multiple Choice)
4.9/5
(32)
Which of the following is likely to be of least importance to an auditor in considering the internal control in a company with computer processing?
(Multiple Choice)
4.8/5
(31)
Passwords for microcomputer software programs are designed to prevent:
(Multiple Choice)
4.7/5
(40)
Showing 21 - 40 of 63
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)