Exam 11: Auditing Computer-Based Information Systems
Exam 1: Accounting Information Systems: an Overview79 Questions
Exam 2: Overview of Transaction Processing and Erp Systems74 Questions
Exam 3: Systems Documentation Techniques83 Questions
Exam 4: Relational Databases80 Questions
Exam 5: Computer Fraud46 Questions
Exam 6: Computer Fraud and Abuse Techniques45 Questions
Exam 7: Control and Accounting Information Systems96 Questions
Exam 8: Information Systems Controls for System Reliability Part 1: Information Security53 Questions
Exam 9: Information Systems Controls for Systems Reliability Part 2: Confidentiality and Privacy24 Questions
Exam 10: Information Systems Controls for Systems Reliability Part 3: Processing Integrity and Availability63 Questions
Exam 11: Auditing Computer-Based Information Systems72 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections81 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements83 Questions
Exam 14: The Production Cycle68 Questions
Exam 15: The Human Resources Management and Payroll Cycle58 Questions
Exam 16: General Ledger and Reporting System57 Questions
Exam 17: The Rea Data Model61 Questions
Exam 18: Implementing an Rea Model in a Relational Database68 Questions
Exam 19: Special Topics in Rea Modeling72 Questions
Exam 20: Introduction to Systems Development Systems Analysis90 Questions
Exam 21: Ais Development Strategies73 Questions
Exam 22: Systems Design, implementation, and Operation70 Questions
Select questions type
An auditor manually calculates accumulated depreciation on a delivery van and compares her calculation with accounting records.This is an example collecting audit evidence by
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
B
One tool used to document the review of source data controls is
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
C
With which stage in the auditing process are the consideration of risk factors and materiality most associated?
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
A
An increase in the effectiveness of auditing software will have the effect of
(Multiple Choice)
4.9/5
(41)
An auditor creates a fictitious customer in the system and then creates several fictitious sales to the customer.The records are then tracked as they are processed by the system.The auditor is using
(Multiple Choice)
4.8/5
(34)
Which of the following is not one of the types of internal audits?
(Multiple Choice)
4.9/5
(36)
Auditors have several techniques available to them to test computer-processing controls.An audit technique that immediately alerts auditors of suspicious transactions is known as
(Multiple Choice)
4.8/5
(34)
Evaluating effectiveness,efficiency,and goal achievement are objectives of ________ audits.
(Multiple Choice)
4.9/5
(37)
How could auditors determine if unauthorized program changes have been made?
(Multiple Choice)
4.9/5
(35)
Determining whether the necessary control procedures are in place is accomplished by conducting
(Multiple Choice)
4.9/5
(34)
When programmers are working with program code,they often employ utilities that are also used in auditing.For example,as program code evolves,it is often the case that blocks of code are superseded by other blocks of code.Blocks of code that are not executed by the program can be identified by
(Multiple Choice)
4.8/5
(37)
An expansion of a firm's operations to include production in Russia and China will have the effect of
(Multiple Choice)
4.8/5
(31)
The evidence collection method that considers the relationships and trends among information to detect items that should be investigated further is called
(Multiple Choice)
4.8/5
(34)
Briefly describe tests that can be used to detect unauthorized program modifications.
(Essay)
4.7/5
(39)
a)What is test data processing? b)How is it done? c)What are the sources that an auditor can use to generate test data?
(Essay)
4.9/5
(30)
The auditor uses ________ to continuously monitor the system and collect audit evidence while live data are processed.
(Multiple Choice)
4.7/5
(28)
The purpose of ________ is to determine why,how,when,and who will perform the audit.
(Multiple Choice)
4.9/5
(35)
When doing an information systems audit,auditors must review and evaluate the program development process.What errors or fraud could occur during the program development process?
(Essay)
4.9/5
(28)
Showing 1 - 20 of 72
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)