Exam 8: Controlling Information Systems: Introduction to Pervasive Controls
Exam 1: Introduction to Accounting Information Systems115 Questions
Exam 2: Enterprise Systems140 Questions
Exam 3: Electronic Business E-Business Systems113 Questions
Exam 4: Documenting Information Systems108 Questions
Exam 5: Database Management Systems180 Questions
Exam 6: Relational Databases and Sql93 Questions
Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control161 Questions
Exam 8: Controlling Information Systems: Introduction to Pervasive Controls157 Questions
Exam 9: Controlling Information Systems: Business Process and Application Controls126 Questions
Exam 10: The Order Entrysales Oes Process128 Questions
Exam 11: The Billingaccounts Receivable Cash Receipts Barcr Process134 Questions
Exam 12: The Purchasing Process131 Questions
Exam 13: Accounts Payablecash Disbursements Apcd Process104 Questions
Exam 14: The Human Resources Process HR Management and Payroll Processes118 Questions
Exam 15: Integrated Production Processes IPP106 Questions
Exam 16: General Ledger and Business Reporting Glbr Process78 Questions
Exam 17: Acquiring and Implementing Accounting Information Systems206 Questions
Select questions type
Which of the following is not a strategic planning process?
(Multiple Choice)
4.7/5
(30)
______________________________ is a process that ensures that the enterprises's IT sustains and extends the organization's strategies and objectives.
(Short Answer)
4.9/5
(34)
A method of separating systems development and operations is to prevent programmers from
(Multiple Choice)
4.8/5
(34)
The ______________________________ group is responsible for routing all work in to and out of the data center, correcting errors, and monitoring all error correction.
(Short Answer)
4.9/5
(40)
Which of the following has the responsibility of efficient and effective operation of IT?
(Multiple Choice)
4.8/5
(39)
A warehouse supervisor prepares a sales order listing items to be shipped to a customer and then signs it authorizing the removal of the items from the warehouse.The supervisor is performing which functions?
(Multiple Choice)
4.7/5
(42)
Top 10 security and privacy concerns reported by managers from 63 countries include all the following except:
(Multiple Choice)
4.8/5
(44)
Management should establish a _______________________ plan and implement related
activities, including reviews, audits, and inspections, to ensure the attainment of IT customer
requirements.
(Short Answer)
4.8/5
(48)
The policy of requiring an employee to alternate jobs periodically is known as forced vacations.
(True/False)
4.9/5
(35)
The ______________________________ covers the progression of information systems through the systems development process, from birth, through implementation, to ongoing use and modification.
(Short Answer)
4.7/5
(29)
Periodic cleaning, testing, and adjusting of computer equipment is referred to as ______________________________.
(Short Answer)
4.7/5
(27)
A small organization that does not have enough personnel to adequately segregate duties must rely on alternative controls, commonly called ___________________________________.
(Short Answer)
4.7/5
(47)
Data in all their forms that are input, processed, and output by information systems is the IT resource ____________________.
(Short Answer)
4.8/5
(33)
According to COSO, most organizations are adequately monitoring operations.
(True/False)
4.9/5
(43)
Listed below are several pervasive control plans discussed in Chapter 8.On the blank line to the left of each control plan, insert a "P" (preventive), "D" (detective), or "C" (corrective) to best classify that control.If you think that more than one code could apply to a particular plan, insert all appropriate codes


(Essay)
4.8/5
(37)
The first list below contains 10 control plans discussed in Chapter 8.The second list describes 10 system failures that have control implications.Required:
On the answer line to the left of each system failure, insert the capital letter from the first list of the best control plan to prevent the system failure from occurring.If you can't find a control that will prevent the failure, then choose a detective or a corrective plan.A letter should be used only once.Control Plans



(Essay)
4.8/5
(29)
The use of IT resources for enterprise systems and e-business
(Multiple Choice)
4.9/5
(33)
A mechanism by which a company is reimbursed for any loss that occurs when an employee commits fraud is called a:
(Multiple Choice)
4.9/5
(37)
The ______________________________ gives detailed instructions to computer operators and to data control about a particular application.
(Short Answer)
4.8/5
(38)
Which of the following IT resources includes hardware, operating systems, DBMSs, and networking?
(Multiple Choice)
4.8/5
(43)
Showing 81 - 100 of 157
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)