Exam 10: Processing Integrity and Availability Controls

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

The control that verifies accuracy by comparing two alternative ways of calculating the same total is called

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

B

Following is the result of batch control totals on employee Social Security numbers in a payroll processing transaction: Correct Values Entered Values From During 487358796 487358796 534916487 534916487 498374526 498374526 514873420 514873420 534196487 534916487 678487853 678487853 The difference in the control totals is 720,000.Which data entry control would best prevent similar data entry errors in the future?

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

C

Employee Name Overtime Hours Mary Jones 10 Tom Davis -5 Amy Dunn 3 Kate Smith 2 Kevin White -4 Jill Brown 800 The total overtime hours is 806.Which data entry control would best prevent similar data entry errors in the future?

Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
Verified

D

The accounting department at Synergy Hydroelectric records an average of 12,500 transactions per hour.By cost-benefit analysis,managers have concluded that the maximum acceptable loss of data in the event of a system failure is 50,000 transactions.If the firm's recovery time objective is 120 minutes,then the worst case recovery time objective is

(Multiple Choice)
4.9/5
(35)

________ is a data entry input control that involves checking the accuracy of input data by using it to retrieve and display other related information.

(Multiple Choice)
4.7/5
(30)

Reconciliation procedures is an example of

(Multiple Choice)
4.9/5
(43)

Modest Expectations Investment Services (MEIS)allows customers to manage their investments over the Internet.If customers attempt to spend more money than they have in their account,an error message is displayed.This is an example of a

(Multiple Choice)
4.9/5
(27)

The data entry control that would best prevent entering an invoice received from a vendor who is not on an authorized supplier list is

(Multiple Choice)
4.8/5
(31)

A completeness check is an example of a(n)

(Multiple Choice)
4.8/5
(36)

To protect against malware,it is important that antivirus software automatically examine ________ introduced into a system.

(Multiple Choice)
4.9/5
(32)

Discuss ways that can help ensure the processing integrity of electronic voting.

(Essay)
4.9/5
(31)

Is it best practice for an organization to practice periodically restoring a system from its backup files?

(Multiple Choice)
4.8/5
(44)

A disaster recovery plan typically does not include

(Multiple Choice)
4.8/5
(41)

A validity check is an example of

(Multiple Choice)
4.8/5
(33)

Discuss how cloud computing could both positively and negatively affect system availability.

(Essay)
4.7/5
(30)

Whose responsibility is it to determine the amount of time an organization can afford to be without its information system?

(Multiple Choice)
4.8/5
(40)

When opening an Excel file,Sonja received a message saying that the file is locked for editing.This is happening because

(Multiple Choice)
4.7/5
(30)

The maximum amount of time between backups is determined by a company's

(Multiple Choice)
4.9/5
(37)

A ________ control entails verifying that the proper number of bits are set to the value 1 in each character received.

(Multiple Choice)
4.8/5
(37)

Cancellation and storage of documents means

(Multiple Choice)
4.9/5
(37)
Showing 1 - 20 of 95
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)