Exam 10: Processing Integrity and Availability Controls
Exam 1: Accounting Information Systems: an Overview94 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design,implementation,and Operation92 Questions
Select questions type
A copy of a database,master file,or software that will be retained indefinitely as a historical record is known as a(n)
(Multiple Choice)
4.7/5
(47)
Which of the following is not a risk associated with the data input process?
(Multiple Choice)
4.9/5
(38)
Which of the following statements is true with regards to system availability?
(Multiple Choice)
4.9/5
(39)
Define and contrast a recovery point objective and a recovery time objective.
(Essay)
4.8/5
(38)
When a computer system's files are automatically duplicated on a second data storage system as they are changed,the process is referred to as
(Multiple Choice)
4.8/5
(36)
The maximum acceptable down time after a computer system failure is determined by a company's
(Multiple Choice)
5.0/5
(39)
The best example of an effective payroll transaction file hash total would most likely be
(Multiple Choice)
4.9/5
(34)
Which of the following is not an objective of a disaster recovery plan?
(Multiple Choice)
4.8/5
(40)
This tests a numerical amount to ensure that it does not exceed a predetermined value nor fall below another predetermined value.
(Multiple Choice)
4.7/5
(38)
A facility that is pre-wired for necessary telecommunications and computer equipment,but doesn't have equipment installed,is known as a
(Multiple Choice)
4.8/5
(41)
What is the most effective way to ensure information system availability?
(Multiple Choice)
4.8/5
(35)
Modest Expectations Investment Services (MEIS)allows customers to manage their investments over the Internet.If customers attempt to sell more shares of a stock than they have in their account,an error message is displayed.This is an example of a
(Multiple Choice)
4.9/5
(45)
The maximum amount of time between backups is determined by a company's
(Multiple Choice)
4.9/5
(41)
The Spontaneous Combustion Rocket Shoppe in downtown Fargo,North Dakota,generates three quarters of its revenue from orders taken over the Internet.The revenue clearing account is debited by the total of cash and credit receipts and credited by the total of storefront and Internet sales.This is an example of a
(Multiple Choice)
4.8/5
(40)
This batch processing data entry control sums a non-financial numeric field.
(Multiple Choice)
4.8/5
(28)
Discuss how cloud computing could both positively and negatively affect system availability.
(Essay)
4.7/5
(38)
Showing 61 - 80 of 81
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)