Exam 10: Processing Integrity and Availability Controls
Exam 1: Accounting Information Systems: an Overview94 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design,implementation,and Operation92 Questions
Select questions type
Loreen Tina is the chief lawyer for Tamara Incorporated.The CEO of Tamara Incorporated asks Loreen whether the company should periodically delete all company e-mail.If Loreen is well-versed in AIS best practices,she would mostly likely respond,
(Multiple Choice)
4.9/5
(33)
A facility that contains all the computing equipment the organization needs to perform its essential business activities is known as a
(Multiple Choice)
4.7/5
(28)
A customer failed to include her account number on her check,and the accounts receivable clerk credited her payment to a different customer with the same last name.Which control could have been used to most effectively to prevent this error?
(Multiple Choice)
4.9/5
(42)
Which of the following is a key control regarding the minimization of system downtime?
(Multiple Choice)
4.8/5
(31)
Which of the following is incorrect with regards to a data archive?
(Multiple Choice)
4.9/5
(34)
Which of the following data entry controls would not be useful if you are recording the checkout of library books by members?
(Multiple Choice)
4.8/5
(38)
The accounting department at Aglaya Telecom records an average of 5,000 transactions per hour.A cost-benefit analysis leads management to conclude that the maximum acceptable amount of data loss is 20,000 transactions.If the firm's recovery time objective is 60 minutes,then the worst case recovery time objective is
(Multiple Choice)
4.7/5
(27)
________ is a data entry input control that involves summing the first four digits of a customer number to calculate the value of the fifth digit,then comparing the calculated number to the number entered during data entry.
(Multiple Choice)
4.9/5
(36)
Sonja Greer called the IT Help Desk in a bad mood."I'm trying to open an Excel file,but I get a message that says that the file is locked for editing.Why is this happening to me?" The answer is likely that
(Multiple Choice)
4.8/5
(38)
Modest Expectations Investment Services (MEIS)allows customers to manage their investments over the Internet.If customers attempt to spend more money than they have in their account,an error message is displayed.This is an example of a
(Multiple Choice)
4.8/5
(45)
All of the following controls for online entry of a sales order would be useful except
(Multiple Choice)
4.8/5
(31)
True or False: It is impossible to eliminate the risk of downtime.
(True/False)
4.8/5
(46)
The accounting department at Synergy Hydroelectric records an average of 12,500 transactions per hour.By cost-benefit analysis,managers have concluded that the maximum acceptable loss of data in the event of a system failure is 25,000 transactions.If the firm's recovery time objective is 120 minutes,then the worst case recovery time objective is
(Multiple Choice)
4.8/5
(43)
This determines the correctness of the logical relationship between two data items.
(Multiple Choice)
5.0/5
(35)
If invoices are processed in groups of fifty,which fields from the document shown below would not be used to create a hash control total? 

(Multiple Choice)
4.7/5
(42)
Showing 41 - 60 of 81
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)