Exam 9: Controlling Information Systems: Business Process and Application Controls
Exam 1: Introduction to Accounting Information Systems115 Questions
Exam 2: Enterprise Systems140 Questions
Exam 3: Electronic Business E-Business Systems113 Questions
Exam 4: Documenting Information Systems108 Questions
Exam 5: Database Management Systems180 Questions
Exam 6: Relational Databases and Sql93 Questions
Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control161 Questions
Exam 8: Controlling Information Systems: Introduction to Pervasive Controls157 Questions
Exam 9: Controlling Information Systems: Business Process and Application Controls126 Questions
Exam 10: The Order Entrysales Oes Process128 Questions
Exam 11: The Billingaccounts Receivable Cash Receipts Barcr Process134 Questions
Exam 12: The Purchasing Process131 Questions
Exam 13: Accounts Payablecash Disbursements Apcd Process104 Questions
Exam 14: The Human Resources Process HR Management and Payroll Processes118 Questions
Exam 15: Integrated Production Processes IPP106 Questions
Exam 16: General Ledger and Business Reporting Glbr Process78 Questions
Exam 17: Acquiring and Implementing Accounting Information Systems206 Questions
Select questions type
A(n) ____________________ digit is an extra digit that is added to an identification number to help control the accuracy with which the number is entered into a computer system.
Free
(Short Answer)
4.8/5
(31)
Correct Answer:
check
Master data control plans regulate transaction processing by calculating control totals at various points in a processing run and subsequently comparing these totals.
Free
(True/False)
5.0/5
(43)
Correct Answer:
False
A summation of customer account numbers taken from a batch of sales invoices would be classified as a:
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
D
The most error-prone and inefficient steps in an operations or information process is
(Multiple Choice)
4.7/5
(34)
Immediately endorsing incoming checks satisfies the control goal of
(Multiple Choice)
4.9/5
(30)
A control whose primary purpose is to ensure greater input accuracy is:
(Multiple Choice)
4.8/5
(30)
Which batch control total generally has no other purpose than control?
(Multiple Choice)
4.8/5
(37)
Control ____________________ addresses whether the control goals are being achieved.
(Short Answer)
4.8/5
(34)
We prefer to ____________________________________________________________ to ensure that business event data is entered in a timely manner and that personnel who enter the data can confirm its legitimacy and easily correct errors.
(Short Answer)
4.9/5
(41)
A dependency check employs data encryption--specifically public-key cryptography--to authenticate a system user's identity and to verify the integrity of a message transmitted by that user.
(True/False)
4.9/5
(31)
In order to implement either a batch sequence check or cumulative sequence check, transactions must be captured on documents that are randomly numbered.
(True/False)
4.7/5
(39)
To reduce the number of keystrokes required, making data entry quicker and more efficient, we can _________________________________________________________________ in response to the entry of identification codes, such as customer numbers, and have the computer retrieve stored data corresponding to those identification codes.
(Short Answer)
4.8/5
(38)
_________________________ are simple counts of the number of documents entered.
(Short Answer)
4.9/5
(39)
Inputting a range of numbers comprising a batch and then inputting each serially numbered document is characteristic of the control plan called:
(Multiple Choice)
4.9/5
(43)
A control that can be used to ensure that all of the characters of a social security number are entered by a data entry clerk is:
(Multiple Choice)
4.8/5
(41)
Programmed edit checks are edits automatically performed by data entry programs upon entry of the input data.
(True/False)
4.9/5
(36)
A(n) ______________________________ employs data encryption--specifically public-key cryptography--to authenticate a system user's identity and to verify the integrity of a message transmitted by that user.
(Short Answer)
4.9/5
(37)
Written approval takes the form of a signature or initials on a document to indicate that the proper person has authorized the event.
(True/False)
4.8/5
(37)
The columns in a control matrix contain headings listing the business process
(Multiple Choice)
4.7/5
(38)
Not knowing whether input data has been accepted by the information system, the user enters the data again, resulting in duplicate event data.The control plan that helps to prevent this error is:
(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 126
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)