Exam 11: Auditing Computer-Based Information Systems
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
Increasing the effectiveness of internal controls would have the greatest effect on
(Multiple Choice)
4.7/5
(33)
The auditor's objective is to seek ________ that no material error exists in the information audited.
(Multiple Choice)
4.8/5
(35)
Briefly describe tests that can be used to detect unauthorized program modifications.
(Essay)
4.8/5
(38)
You are an internal auditor for Ron Burgandy Suits.The CEO has asked you to perform an audit of the program modifications process.Identify one procedure you might use to test controls surrounding the program modification process.
(Multiple Choice)
4.7/5
(37)
Identify the activity below that the external auditor should not be involved.
(Multiple Choice)
4.8/5
(36)
Which of the following is not a control procedure for preventing inadvertent programming errors?
(Multiple Choice)
4.9/5
(30)
Auditors often use reperformance to test a company's internal control.
(True/False)
4.8/5
(43)
a)What is test data processing? b)How is it done? c)What are the sources that an auditor can use to generate test data?
(Essay)
4.9/5
(38)
Which of the following is not one way CAATS could be used?
(Multiple Choice)
5.0/5
(37)
Andile Uzoma is the CEO of Chibuzo Incorporated.The board of directors has recently demanded that they receive independent assurance regarding the financial statements,which are generated using an accounting information system.Which type of audit would best suit the demands of the board of directors?
(Multiple Choice)
4.7/5
(39)
The evidence collection method that considers the relationships and trends among information to detect items that should be investigated further is called
(Multiple Choice)
4.7/5
(41)
Showing 101 - 116 of 116
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)