Exam 4: Transaction Processing and the Internal Control Process
Exam 1: Accounting Information Systems: An Overview163 Questions
Exam 2: Systems Techniques and Documentation136 Questions
Exam 3: Ebusiness and Ecommerce121 Questions
Exam 4: Transaction Processing and the Internal Control Process138 Questions
Exam 5: Fraud Examination and Fraud Management134 Questions
Exam 6: Information Systems Security172 Questions
Exam 7: Electronic Data Processing Systems128 Questions
Exam 8: Revenue Cycle Processes128 Questions
Exam 9: Procurement and Human Resources Business Processes121 Questions
Exam 10: The Production Business Process130 Questions
Exam 11: Systems Planning, analysis, and Design163 Questions
Exam 12: Systems Project Management, implementation, operation, control135 Questions
Exam 13: Data Management Concepts147 Questions
Exam 14: Auditing Information Technology126 Questions
Select questions type
Physical theft is only a minor threat to the solvency of most business organizations.
(True/False)
4.8/5
(30)
The immediate return of input information to the sender for comparison and approval is called feedback.
(True/False)
4.9/5
(43)
Management's philosophy and operating style are part of which component of internal control?
(Multiple Choice)
4.7/5
(33)
The audit trail concept is basic to the design and audit of an accounting information system.
(True/False)
4.9/5
(34)
Small and large companies can gain cost efficiencies in internal control by
(Multiple Choice)
4.9/5
(38)
COSO reports contain the most authoritative framework for internal control processes.
(True/False)
4.8/5
(46)
________ bonding is common for employees who are directly responsible for the custody of assets.
(Short Answer)
4.8/5
(43)
Selecting the best opportunities and managing uncertainties is part of Enterprise Risk Management (ERM).
(True/False)
5.0/5
(39)
Which of the following would impair the effectiveness of the separation of incompatible functions in an organization?
(Multiple Choice)
4.8/5
(34)
Listed below are various controls found in a system of internal control.
Label each of the following controls as:
Label each of the following controls as:
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(37)
A hash total is a meaningless number that only is important for internal control purposes.
(True/False)
4.9/5
(26)
An analytical technique commonly used to analyze and examine an internal control process is known as a(n)
(Multiple Choice)
4.8/5
(36)
Presented below are ten control features,followed by ten statements describing either the achievement of a control feature (i.e.,a system success)or a system deficiency.
Required: On the answer line to the left of each control feature,insert the capital letter from the list of the most closely related system success or deficiency.Each letter will be used only once.
________ 1.Backup and recovery
________ 2.Check digit
________ 3.Batch balancing
________ 4.Format check
________ 5.Suspense file
________ 6.Hash total
________ 7.Password
________ 8.Turnaround document
________ 9.Forms design
________ 10.Reasonableness test
A.This helps control input accuracy by ensuring that dates are properly entered using the format MM/DD/YYYY.
B.Many customer account numbers entered into the billing transaction file are invalid.
C.This could help prevent the entry of inconsistent data elements,such as entering a tax code for a customer for whom sales should be nontaxable.
D.In entering a batch of invoices into the computer,an operator made several errors in keying the invoice numbers.As a result,the computer program updated computer accounts with incorrect invoice information.
E.A new field salesperson omitted several data elements when completing the sales order forms.
F.The vendor master file was damaged in yesterday's update,and cannot be used for today's update.
G.A former employee gained access to the computer system and damaged the customer master file.
H.A computer operator discovered that he had not input all items in a batch.
I.This feature speeds up data entry because some of the input data is prerecorded on the source document and can be scanned.
J.A supervisor reviews this document frequently to dispose of partially processed transactions.
(Short Answer)
4.8/5
(40)
What is corporate culture? Why might someone argue that the corporate culture has more influence over ethical behavior in a firm than the corporate ethics code of conduct?
(Essay)
4.9/5
(35)
In cases of ________,"the procedures did not fail,the people did."
(Short Answer)
4.8/5
(38)
Identifying transaction documents to prevent their further or repeated use after they have performed their function is known as
(Multiple Choice)
5.0/5
(34)
The three types of functions that normally should be segregated to promote internal control are
(Multiple Choice)
4.8/5
(43)
Showing 21 - 40 of 138
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)