Exam 11: Auditing Computer-Based Information Systems
Exam 1: Accounting Information Systems: an Overview94 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design,implementation,and Operation92 Questions
Select questions type
Which of the following is not a control procedure for preventing inadvertent programming errors?
(Multiple Choice)
4.8/5
(27)
An audit software program that generates programs that perform certain audit functions,based on auditor specifications,is referred to as a(n)
(Multiple Choice)
4.9/5
(40)
You are the head of the IT department at Panther Designs,Inc.A systems review reveals that your firm has poor control procedures for preventing inadvertent programming errors.However,you are not concerned because you feel Panther Designs has strong compensating controls.What control likely exists to give you this confidence?
(Multiple Choice)
4.8/5
(38)
The evidence collection method that examines all supporting documents to determine the validity of a transaction is called
(Multiple Choice)
4.8/5
(44)
Organizing the audit team and the physical examination of assets are components of which two separate audit stages?
(Multiple Choice)
4.8/5
(40)
When programmers are working with program code,they often employ utilities that are also used in auditing.For example,as program code evolves,it is often the case that variables defined during the early part of development become irrelevant.The occurrences of variables that are not used by the program can be found using
(Multiple Choice)
4.8/5
(38)
The use of a secure file library and restrictions on physical access to data files are control procedures used together to prevent
(Multiple Choice)
4.8/5
(36)
The ________ audit examines the reliability and integrity of accounting records.
(Multiple Choice)
4.7/5
(39)
The auditor's objective is to seek ________ that no material error exists in the information audited.
(Multiple Choice)
4.8/5
(34)
Showing 81 - 93 of 93
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)