Exam 10: Processing Integrity and Availability Controls
Exam 1: Accounting Information Systems: an Overview100 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design, implementation, and Operation92 Questions
Select questions type
When a computer system's files are automatically duplicated on a second data storage system as they are changed,the process is referred to as
(Multiple Choice)
4.8/5
(28)
Loreen Tina is the chief lawyer for Tamara Incorporated.The CEO of Tamara Incorporated asks Loreen whether the company should periodically delete all company e-mail.If Loreen is well-versed in AIS best practices,she would mostly likely respond,
(Multiple Choice)
4.8/5
(31)
________ enables a system to continue functioning in the event that a particular component fails.
(Multiple Choice)
4.8/5
(30)
This determines the correctness of the logical relationship between two data items.
(Multiple Choice)
4.8/5
(35)
This control protects records from errors that occur when two or more users attempt to update the same record simultaneously.
(Multiple Choice)
4.8/5
(30)
What is the most effective way to ensure information system availability?
(Multiple Choice)
4.8/5
(40)
Which of the following statements is true with regards to system availability?
(Multiple Choice)
4.9/5
(39)
What is the primary objective of ensuring systems and information are available for use whenever needed?
(Multiple Choice)
4.8/5
(41)
Identify one organization that quickly recovered from September 11th,2001 due to its disaster recovery and business continuity plan.
(Multiple Choice)
4.8/5
(35)
This control entails verifying that the proper number of bits are set to the value 1 in each character received.
(Multiple Choice)
4.9/5
(34)
This control ensures that the correct and most current files are being updated.
(Multiple Choice)
4.8/5
(34)
Sonja Greer called the IT Help Desk in a bad mood."I'm trying to open an Excel file,but I get a message that says that the file is locked for editing.Why is this happening to me?" The answer is likely that
(Multiple Choice)
4.9/5
(36)
This batch processing data entry control sums the number of items in a batch.
(Multiple Choice)
4.7/5
(36)
Identify the most important component of a disaster recovery plan below.
(Multiple Choice)
4.9/5
(34)
Which of the following is a key control regarding the minimization of system downtime?
(Multiple Choice)
4.8/5
(33)
The accounting department at Aglaya Telecom records an average of 2,500 transactions per hour.Managers state that the maximum acceptable loss of data in the event of a system failure is 2,500 transactions.The firm's recovery point objective is therefore
(Multiple Choice)
4.8/5
(32)
________ is a data entry input control that involves summing the first four digits of a customer number to calculate the value of the fifth digit,then comparing the calculated number to the number entered during data entry.
(Multiple Choice)
4.7/5
(40)
Which of the following is not a common design feature of housing mission-critical servers and databases?
(Multiple Choice)
4.7/5
(37)
Showing 41 - 60 of 81
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)