Exam 9: Auditing Computer-Based Informtion Systems
Exam 1: Accounting Information Systems83 Questions
Exam 2: Overview of Business Processes105 Questions
Exam 3: Systems Development and Documentation Techniques99 Questions
Exam 4: Relational Databases90 Questions
Exam 5: Computer Fraud and Security95 Questions
Exam 6: Control and Accounting Information Systems87 Questions
Exam 7: Infromation System Controls for Systems Reliability82 Questions
Exam 8: Auditing Computer-Based Information Systems77 Questions
Exam 9: Auditing Computer-Based Informtion Systems94 Questions
Exam 10: The Revenue Cycle: Sales an Cash Collections94 Questions
Exam 11: The Expenditure Cycle: Purchasing and Cash Disbursements89 Questions
Exam 12: The Production Cycle87 Questions
Exam 13: The Human Resources Managementpayroll Cycle93 Questions
Exam 14: General Ledger and Reporting System81 Questions
Exam 15: Data Modeling and Database Design80 Questions
Exam 16: Implementing an Rea Model in a Relational Database77 Questions
Exam 17: Special Topics in Rea Modeling77 Questions
Exam 18: Introduction to Systems Development and Systems Analysis94 Questions
Exam 19: Ais Development Strategies95 Questions
Exam 20: Systems Design, Implementation and Operation86 Questions
Select questions type
An audit should be planned so that the greatest amount of audit work focuses on the areas with the highest risk factors.Regarding risk factors,control risk is defined as
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
B
An expansion of a firm's operations to include production in Russia and China will have the effect of
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
A
When it is suspected that a particular application program contains unauthorized code or serious errors,a detailed analysis of the program logic may be necessary.The auditor has several types of software packages available to help in analyzing program logic.A program which identifies unexecuted program code is
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
A
There are six objectives of an AIS audit.The objective that pertains to source data being processed into some form of output is
(Multiple Choice)
4.7/5
(37)
An auditor examining a firm's accounting information system sets an embedded audit module to record all credit transactions in excess of $1,500 and store the data in an audit log.This is an example collecting audit evidence using
(Multiple Choice)
4.9/5
(32)
The __________ to auditing provides auditors with a clear understanding of possible errors and irregularities and the related risks and exposures.
(Multiple Choice)
4.7/5
(34)
Physical examination of inventory reveals discrepancies with accounting records.This is an application of which of the following five internal audit scope standards?
(Multiple Choice)
4.9/5
(32)
The Institute of Internal Auditors (IIA)has established five audit scope standards that outline the internal auditor's responsibilities.Which standard below deals with the principles of reliability and integrity?
(Multiple Choice)
4.8/5
(41)
One type of audit that is concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives corresponds to the fourth and fifth standards set forth by the IIA.This is known as a(n)__________ audit.
(Multiple Choice)
4.9/5
(37)
Strong __________ controls sometimes can compensate for inadequate __________ controls.
(Multiple Choice)
4.9/5
(39)
An increase in the effectiveness of internal controls will have the effect of
(Multiple Choice)
4.8/5
(38)
Auditors have several techniques available to them to test computer-processing controls.An audit routine that flags suspicious transactions is known as
(Multiple Choice)
4.9/5
(28)
When programmers are working with program code,they often employ utilities that are also used in auditing.For example,as program code evolves,it is often the case that variables defined during the early part of development become irrelevant.The occurrences of variables that are not used by the program are found using
(Multiple Choice)
4.7/5
(39)
The purpose of __________ is to determine why,how,when,and who will perform the audit.
(Multiple Choice)
4.7/5
(34)
To maintain the objectivity necessary for performing an independent evaluation function,auditors should not be involved in
(Multiple Choice)
4.8/5
(26)
When programmers are working with program code,they often employ utilities that are also used in auditing.For example,as program code evolves,it is often the case that blocks of code are superseded by other blocks of code.Blocks of code that are not executed by the program are identified by
(Multiple Choice)
4.8/5
(28)
Showing 1 - 20 of 94
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)