Exam 11: Auditing Computer-Based Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An auditor examines all documents related to the acquisition,repair history,and disposal of a firm's delivery van.This is an example of collecting audit evidence by

Free
(Multiple Choice)
5.0/5
(37)
Correct Answer:
Verified

C

When programmers are working with program code,they often employ utilities that are also used in auditing.For example,as program code evolves,it is often the case that variables defined during the early part of development become irrelevant.The occurrences of variables that are not used by the program can be found using

Free
(Multiple Choice)
4.7/5
(27)
Correct Answer:
Verified

B

A system that employs various types of advanced technology has more ________ risk than traditional batch processing.

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

C

Andile Uzoma is the CEO of Chibuzo Incorporated.The board of directors has recently demanded that they receive independent assurance regarding the financial statements,which are generated using an accounting information system.Which type of audit would best suit the demands of the board of directors?

(Multiple Choice)
4.8/5
(41)

Identify the activity below that the external auditor should not be involved.

(Multiple Choice)
5.0/5
(36)

During the evidence evaluation stage of an operational audit,the auditor measures the system against generally accepted accounting principles (GAAP).

(True/False)
4.8/5
(37)

Describe some of the important uses of CAATs.

(Essay)
4.8/5
(33)

Andile Uzoma is the CEO of Chibuzo Incorporated.The board of directors has recently demanded that they receive more assurance that internal controls surrounding the company's information system are effective.Which type of audit would best suit the demands of the board of directors?

(Multiple Choice)
4.9/5
(40)

How has the U.S.government deployed computer-assisted audit techniques to reduce the budget?

(Multiple Choice)
4.9/5
(42)

The evidence collection method that examines all supporting documents to determine the validity of a transaction is called

(Multiple Choice)
4.8/5
(43)

The first step in a risk-based audit approach is to

(Multiple Choice)
4.7/5
(36)

Which statement below is incorrect regarding program modifications?

(Multiple Choice)
4.9/5
(34)

An auditor might use ________ to examining large data files.

(Multiple Choice)
4.7/5
(30)

Audit routines that notify auditors of questionable transactions,often as they occur is an example of

(Multiple Choice)
5.0/5
(37)

What is not a typical responsibility of an internal auditor?

(Multiple Choice)
4.9/5
(33)

An auditor searching for a shipping document to ensure that the sales number recorded in the sales journal was properly supported.This is an example of

(Multiple Choice)
4.8/5
(33)

Auditors have several techniques available to them to test computer-processing controls.An audit technique that immediately alerts auditors of suspicious transactions is known as

(Multiple Choice)
4.9/5
(38)

What is a test data generator?

(Multiple Choice)
4.8/5
(45)

An auditor manually calculates accumulated depreciation on a delivery van and compares her calculation with the accounting records.The auditor is performing

(Multiple Choice)
4.9/5
(36)

The evidence collection method that considers the relationships and trends among information to detect items that should be investigated further is called

(Multiple Choice)
4.8/5
(48)
Showing 1 - 20 of 116
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)