Exam 11: Auditing Computer-Based Information Systems
Exam 1: Accounting Information Systems: an Overview79 Questions
Exam 2: Overview of Transaction Processing and Erp Systems74 Questions
Exam 3: Systems Documentation Techniques83 Questions
Exam 4: Relational Databases80 Questions
Exam 5: Computer Fraud46 Questions
Exam 6: Computer Fraud and Abuse Techniques45 Questions
Exam 7: Control and Accounting Information Systems96 Questions
Exam 8: Information Systems Controls for System Reliability Part 1: Information Security53 Questions
Exam 9: Information Systems Controls for Systems Reliability Part 2: Confidentiality and Privacy24 Questions
Exam 10: Information Systems Controls for Systems Reliability Part 3: Processing Integrity and Availability63 Questions
Exam 11: Auditing Computer-Based Information Systems72 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections81 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements83 Questions
Exam 14: The Production Cycle68 Questions
Exam 15: The Human Resources Management and Payroll Cycle58 Questions
Exam 16: General Ledger and Reporting System57 Questions
Exam 17: The Rea Data Model61 Questions
Exam 18: Implementing an Rea Model in a Relational Database68 Questions
Exam 19: Special Topics in Rea Modeling72 Questions
Exam 20: Introduction to Systems Development Systems Analysis90 Questions
Exam 21: Ais Development Strategies73 Questions
Exam 22: Systems Design, implementation, and Operation70 Questions
Select questions type
When programmers are working with program code,they often employ utilities that are also used in auditing.For example,as program code evolves,it is often the case that variables defined during the early part of development become irrelevant.The occurrences of variables that are not used by the program can be found using
(Multiple Choice)
4.7/5
(40)
Which type of work listed below is not typical of internal auditors?
(Multiple Choice)
4.9/5
(44)
One type of audit that is concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives is known as a(n)________ audit.
(Multiple Choice)
4.9/5
(45)
The ________ stage of the auditing process involves (among other things)the auditors observing the operating activities and having discussions with employees.
(Multiple Choice)
4.8/5
(31)
An auditor sets an embedded audit module to flag all credit transactions in excess of $1,500.The flag causes the system state to be recorded before and after each transaction is processed.The auditor is using
(Multiple Choice)
4.9/5
(39)
Organizing the audit team and the physical examination of assets are components of which two separate audit stages?
(Multiple Choice)
4.9/5
(37)
Regarding program modifications,which statement below is incorrect?
(Multiple Choice)
4.9/5
(37)
Audit tests and procedures traditionally have been performed on a sample basis.Do options exist for auditors to test significantly more (or all)transactions?
(Essay)
4.9/5
(40)
An auditor sets an embedded audit module to flag questionable online transactions,display information about the transaction on the auditor's computer,and send a text message to the auditor's cell phone.The auditor is using
(Multiple Choice)
4.9/5
(34)
Why do all audits follow a sequence of events that can be divided into four stages,and what are the four stages?
(Essay)
5.0/5
(40)
The use of a secure file library and restrictions on physical access to data files are control procedures used together to prevent
(Multiple Choice)
4.8/5
(31)
The ________ audit examines the reliability and integrity of accounting records.
(Multiple Choice)
4.8/5
(31)
Assessing the quality of internal controls,the reliability of information,and operating performance are all part of which stage of the auditing process?
(Multiple Choice)
4.8/5
(33)
Which auditing technique will not assist in determining if unauthorized programming changes have been made?
(Multiple Choice)
4.9/5
(40)
Explain why the auditor's role in program development and acquisition should be limited.
(Essay)
4.7/5
(33)
The evidence collection method that examines all supporting documents to determine the validity of a transaction is called
(Multiple Choice)
4.9/5
(45)
The ________ audit is concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives.
(Multiple Choice)
4.7/5
(42)
Showing 21 - 40 of 72
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)