Exam 8: Internal Controls II
Exam 1: Systems Fundamentals57 Questions
Exam 2: Systems Characteristics and Considerations58 Questions
Exam 3: Database Concepts I60 Questions
Exam 4: Database Concepts II58 Questions
Exam 5: XBRL Reporting60 Questions
Exam 6: System Mapping and Documentation60 Questions
Exam 7: Internal Controls I60 Questions
Exam 8: Internal Controls II59 Questions
Exam 9: Transaction Cycle The Revenue Cycle58 Questions
Exam 10: Transaction Cycle The Expenditure Cycle59 Questions
Exam 11: Transaction Cycle The Production Cycle60 Questions
Exam 12: Transaction Cycle The HR Management and Payroll Cycle60 Questions
Exam 13: Transaction Cycle The General Ledger and Financial Reporting Cycle60 Questions
Exam 14: Systems Development60 Questions
Exam 15: Auditing of Accounting Information Systems60 Questions
Exam 16: Ethics, fraud and Computer Crime58 Questions
Select questions type
In terms of proper recording of transactions,accuracy is concerned with making sure that: (i)all data that enter the system are in the correct format (ii)all data that enter the system are of the right type (iii)all data are stored in a secured place to prevent unauthorised manipulation (iv)the data gathered accurately reflect the reality of the underlying transaction or event.
(Multiple Choice)
4.7/5
(38)
A purchase order is entered into a computer purchasing system.The purchase is for $25 000 and has been entered by the purchase clerk.Company policy dictates that purchases over $2000 must be entered by the purchasing manager.This is an example of a breach of controls relating to:
(Multiple Choice)
4.9/5
(40)
Which of the following statements concerning passwords is true?
(Multiple Choice)
4.9/5
(32)
The pre-numbering of cheques helps to achieve completeness because it:
(Multiple Choice)
4.8/5
(36)
Briefly describe and compare input control,processing control,and output control.
(Essay)
5.0/5
(34)
Which of the follow is also considered threats to internal controls?
(Multiple Choice)
4.9/5
(38)
Control of access to the server for the company database is an example of which type of control?
(Multiple Choice)
4.8/5
(33)
Authorisation in a computerised information system can be established through: (i)user privileges (ii)user access rights (iii)restrictions on what different users are able to do within the system.
(Multiple Choice)
4.7/5
(33)
Which of the following is an example of good segregation of duties?
(Multiple Choice)
4.8/5
(31)
The first that financial giant Morgan Stanley knew about the 9/11 bombings were that their business started running from their ________________ several kilometres away from Wall St.
(Multiple Choice)
4.8/5
(47)
Information processing controls are those that are put in place within the organisation to work towards the _______ of transactions.
(Multiple Choice)
4.8/5
(31)
Internal controls are necessary in all businesses because …
(Multiple Choice)
4.8/5
(39)
Which of the following is a risk to the financial statement of a company when it places a purchase order with a supplier?
(Multiple Choice)
4.9/5
(38)
Advantages of computer-based controls include all of the following except:
(Multiple Choice)
4.9/5
(33)
A computer virus is found in a file in the computer system.Because a solution for recovering the file is not yet available,the infected file is quarantine by the antivirus software.Quarantining the infected file is an example of:
(Multiple Choice)
4.7/5
(43)
Which of the following is not a type of controls classified in the Australian Auditing Standard ASA 315?
(Multiple Choice)
4.9/5
(38)
What are the advantages and disadvantages of computer-based controls?
(Essay)
4.9/5
(23)
What should happen if a valid username is supplied but the password is incorrect?
(Multiple Choice)
4.9/5
(30)
Showing 41 - 59 of 59
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)