Exam 11: Auditing Computer-Based Information Systems
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
How has the U.S.government deployed computer-assisted audit techniques to reduce the budget?
(Multiple Choice)
4.7/5
(39)
Software that interprets a program's source code and generates a flowchart of the program's logic is called
(Multiple Choice)
4.8/5
(31)
Verifying the accuracy of certain information,often through communication with third parties,is known as
(Multiple Choice)
4.7/5
(37)
An auditor might use ________ to examining large data files.
(Multiple Choice)
4.7/5
(38)
The ________ to auditing provides auditors with a clear understanding of possible errors and irregularities and the related risks and exposures.
(Multiple Choice)
4.9/5
(31)
The auditor uses ________ to continuously monitor the system and collect audit evidence while live data are processed.
(Multiple Choice)
4.9/5
(39)
An auditor creates a fictitious customer in the system and then creates several fictitious sales to the customer.The records are then tracked as they are processed by the system.The auditor is using
(Multiple Choice)
4.8/5
(38)
The purpose of ________ is to determine why,how,when,and who will perform the audit.
(Multiple Choice)
4.9/5
(40)
Strong ________ controls can partially compensate for inadequate ________ controls.
(Multiple Choice)
4.7/5
(48)
The information systems audit objective that pertains to having management's authorization and approval is known as
(Multiple Choice)
4.9/5
(44)
A system that employs various types of advanced technology has more ________ risk than traditional batch processing.
(Multiple Choice)
4.9/5
(32)
Evaluating effectiveness,efficiency,and goal achievement are objectives of ________ audits.
(Multiple Choice)
4.8/5
(33)
Which type of work listed below is not typical of internal auditors?
(Multiple Choice)
4.8/5
(39)
How is a financial audit different from an information systems audit?
(Essay)
4.9/5
(30)
When doing an information systems audit,auditors must review and evaluate the program development process.What errors or fraud could occur during the program development process?
(Essay)
4.8/5
(32)
An auditor sets an embedded audit module to record all credit transactions in excess of $5,000 and stores the data in an audit log.The auditor is using
(Multiple Choice)
4.8/5
(36)
Showing 21 - 40 of 116
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)