Exam 11: Auditing Computer-Based Information Systems
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
________ is one tool used to document source data controls.
(Multiple Choice)
4.8/5
(37)
Consideration of risk factors and materiality is most associated with which audit stage?
(Multiple Choice)
4.9/5
(39)
There is a direct relationship between inherent risk and detection risk.
(True/False)
4.9/5
(33)
When programmers are working with program code,they often employ utilities that are also used in auditing.For example,as program code evolves,it is often the case that variables defined during the early part of development become irrelevant.The occurrences of variables that are not used by the program can be found using
(Multiple Choice)
4.7/5
(36)
When programmers are working with program code,they often employ utilities that are also used in auditing.For example,as program code evolves,it is often the case that blocks of code are superseded by other blocks of code.Blocks of code that are not executed by the program can be identified by
(Multiple Choice)
4.7/5
(46)
The ________ audit is concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives.
(Multiple Choice)
5.0/5
(37)
Andile Uzoma is the CEO of Chibuzo Incorporated.The board of directors has recently demanded that they receive more assurance that internal controls surrounding the company's information system are effective.Which type of audit would best suit the demands of the board of directors?
(Multiple Choice)
4.9/5
(35)
An auditor examines all documents related to the acquisition,repair history,and disposal of a firm's delivery van.This is an example of collecting audit evidence by
(Multiple Choice)
4.9/5
(44)
Which of the following is not one of the six objectives of an information systems audit?
(Multiple Choice)
4.8/5
(26)
How could auditors determine if unauthorized program changes have been made?
(Multiple Choice)
4.7/5
(41)
In the ________ stage of an operational audit,the auditor measures the actual system against an ideal standard.
(Multiple Choice)
4.7/5
(34)
Which of the choices below best describes a risk-based audit approach?
(Multiple Choice)
4.9/5
(37)
An auditor searching for a shipping document to ensure that the sales number recorded in the sales journal was properly supported.This is an example of
(Multiple Choice)
4.9/5
(39)
An organization that has an antiquated accounting information system has more ________ risk than an organization that has a more advanced system.
(Multiple Choice)
4.8/5
(36)
The ________ procedure for auditing computer process controls uses a hypothetical series of valid and invalid transactions.
(Multiple Choice)
5.0/5
(39)
With regards to an accounting information system,a financial audit is most concerned with
(Multiple Choice)
4.9/5
(38)
The use of a secure file library and restrictions on physical access to data files are control procedures used together to prevent
(Multiple Choice)
4.8/5
(31)
Showing 81 - 100 of 116
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)