Exam 10: Information Systems Controls for Systems Reliability Part 3: Processing Integrity and Availability

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Chaz Finnerty called the IT Help Desk in a huff."I'm trying to open an Excel file and I get a message that says that the file is locked for editing.What's going on?" The answer is likely that

Free
(Multiple Choice)
4.8/5
(45)
Correct Answer:
Verified

C

File labels are an example of

Free
(Multiple Choice)
4.7/5
(30)
Correct Answer:
Verified

C

If invoices are processed in groups of fifty,which fields from the document shown below would not be used to create a hash control total? If invoices are processed in groups of fifty,which fields from the document shown below would not be used to create a hash control total?

Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
Verified

A

A specific inventory record indicates that there were 12 items on hand before a customer brings two of the items to the check stand to be purchased.The cashier accidentally entered quantity 20 instead of 2.Which data entry control would best have prevented this error?

(Multiple Choice)
4.7/5
(45)

This control entails verifying that the proper number of bits are set to the value 1 in each character received.

(Multiple Choice)
4.8/5
(45)

________ copies all changes made since the last full backup.

(Multiple Choice)
4.8/5
(44)

When I enter a correct customer number,the data entry screen displays the customer name and address.This is an example of

(Multiple Choice)
4.9/5
(36)

The accounting department at Synergy Hydroelectric records an average of 10,000 transactions per hour.By cost-benefit analysis,managers have concluded that the maximum acceptable loss of data in the event of a system failure is 40,000 transactions.The firm's recovery point objective is therefore

(Multiple Choice)
4.8/5
(41)

Error logs and review are an example of

(Multiple Choice)
4.9/5
(33)

This tests a numerical amount to ensure that it does not exceed a predetermined value.

(Multiple Choice)
4.7/5
(42)

The best example of a hash total for a payroll transaction file could be

(Multiple Choice)
4.9/5
(30)

A computer operator accidentally used the wrong master file when updating a transaction file.As a result,the master file data is now unreadable.Which control could best have prevented this from happening?

(Multiple Choice)
4.9/5
(35)

The maximum acceptable down time after a computer system failure is determined by a company's

(Multiple Choice)
4.7/5
(30)

Data matching is an example of a(n)

(Multiple Choice)
4.9/5
(32)

The accounting department at Synergy Hydroelectric records an average of 12,500 transactions per hour.By cost-benefit analysis,managers have concluded that the maximum acceptable loss of data in the event of a system failure is 25,000 transactions.The firm's recovery point objective is therefore

(Multiple Choice)
4.9/5
(29)

Modest Expectations Investment Services (MEIS)allows customers to manage their investments over the Internet.If customers attempt to sell more shares of a stock than they have in their account,an error message is displayed.This is an example of a

(Multiple Choice)
4.8/5
(41)

This tests a numerical amount to ensure that it does not exceed a predetermined value nor fall below another predetermined value.

(Multiple Choice)
4.9/5
(32)

Parity checks are an example of a(n)

(Multiple Choice)
4.7/5
(35)

Turnaround documents are an example of a(n)

(Multiple Choice)
4.8/5
(37)

A validity check is an example of a(n)

(Multiple Choice)
4.7/5
(42)
Showing 1 - 20 of 63
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)