Exam 8: Internal Controls II

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In terms of proper recording of transactions,accuracy is concerned with making sure that: (i)all data that enter the system are in the correct format (ii)all data that enter the system are of the right type (iii)all data are stored in a secured place to prevent unauthorised manipulation (iv)the data gathered accurately reflect the reality of the underlying transaction or event.

(Multiple Choice)
4.7/5
(38)

A purchase order is entered into a computer purchasing system.The purchase is for $25 000 and has been entered by the purchase clerk.Company policy dictates that purchases over $2000 must be entered by the purchasing manager.This is an example of a breach of controls relating to:

(Multiple Choice)
4.9/5
(40)

Which of the following is the strongest password?

(Multiple Choice)
4.7/5
(36)

Which of the following statements concerning passwords is true?

(Multiple Choice)
4.9/5
(32)

The pre-numbering of cheques helps to achieve completeness because it:

(Multiple Choice)
4.8/5
(36)

Briefly describe and compare input control,processing control,and output control.

(Essay)
5.0/5
(34)

Which of the follow is also considered threats to internal controls?

(Multiple Choice)
4.9/5
(38)

Control of access to the server for the company database is an example of which type of control?

(Multiple Choice)
4.8/5
(33)

Authorisation in a computerised information system can be established through: (i)user privileges (ii)user access rights (iii)restrictions on what different users are able to do within the system.

(Multiple Choice)
4.7/5
(33)

Which of the following is an example of good segregation of duties?

(Multiple Choice)
4.8/5
(31)

The first that financial giant Morgan Stanley knew about the 9/11 bombings were that their business started running from their ________________ several kilometres away from Wall St.

(Multiple Choice)
4.8/5
(47)

Information processing controls are those that are put in place within the organisation to work towards the _______ of transactions.

(Multiple Choice)
4.8/5
(31)

Internal controls are necessary in all businesses because …

(Multiple Choice)
4.8/5
(39)

Which of the following is a risk to the financial statement of a company when it places a purchase order with a supplier?

(Multiple Choice)
4.9/5
(38)

Advantages of computer-based controls include all of the following except:

(Multiple Choice)
4.9/5
(33)

A computer virus is found in a file in the computer system.Because a solution for recovering the file is not yet available,the infected file is quarantine by the antivirus software.Quarantining the infected file is an example of:

(Multiple Choice)
4.7/5
(43)

Which of the following is not a type of controls classified in the Australian Auditing Standard ASA 315?

(Multiple Choice)
4.9/5
(38)

What are the advantages and disadvantages of computer-based controls?

(Essay)
4.9/5
(23)

What should happen if a valid username is supplied but the password is incorrect?

(Multiple Choice)
4.9/5
(30)
Showing 41 - 59 of 59
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)