Exam 9: Auditing Computer-Based Informtion Systems
Exam 1: Accounting Information Systems83 Questions
Exam 2: Overview of Business Processes105 Questions
Exam 3: Systems Development and Documentation Techniques99 Questions
Exam 4: Relational Databases90 Questions
Exam 5: Computer Fraud and Security95 Questions
Exam 6: Control and Accounting Information Systems87 Questions
Exam 7: Infromation System Controls for Systems Reliability82 Questions
Exam 8: Auditing Computer-Based Information Systems77 Questions
Exam 9: Auditing Computer-Based Informtion Systems94 Questions
Exam 10: The Revenue Cycle: Sales an Cash Collections94 Questions
Exam 11: The Expenditure Cycle: Purchasing and Cash Disbursements89 Questions
Exam 12: The Production Cycle87 Questions
Exam 13: The Human Resources Managementpayroll Cycle93 Questions
Exam 14: General Ledger and Reporting System81 Questions
Exam 15: Data Modeling and Database Design80 Questions
Exam 16: Implementing an Rea Model in a Relational Database77 Questions
Exam 17: Special Topics in Rea Modeling77 Questions
Exam 18: Introduction to Systems Development and Systems Analysis94 Questions
Exam 19: Ais Development Strategies95 Questions
Exam 20: Systems Design, Implementation and Operation86 Questions
Select questions type
Explain why the auditor's role in program development and acquisition should be limited.
(Essay)
4.8/5
(36)
Regarding program modifications,which statement below is incorrect?
(Multiple Choice)
4.9/5
(40)
To document the review of source data controls,an auditor may use
(Multiple Choice)
4.8/5
(38)
One way an auditor gauges how much audit work and testing needs to be performed is through evaluating materiality and seeking reasonable assurance about the nature of the information or process.What is key to determining materiality during an audit?
(Multiple Choice)
4.8/5
(36)
The possibility that a material error will occur even though auditors are following audit procedures and using good judgment is referred to as
(Multiple Choice)
4.8/5
(34)
What is not a typical responsibility of an internal auditor?
(Multiple Choice)
4.8/5
(34)
A system that employs various types of advanced technology has more __________ risk than traditional batch processing.
(Multiple Choice)
4.8/5
(27)
What are the types of evidence-gathering activities generally used in an operational audit?
(Essay)
4.7/5
(33)
Which auditing technique will not assist in determining if unauthorized programming changes have been made?
(Multiple Choice)
4.8/5
(36)
Which of the following is not one of the three types of internal audits?
(Multiple Choice)
4.9/5
(38)
The evidence collection method that examines all supporting documents to determine the validity of a transaction is called
(Multiple Choice)
4.7/5
(35)
The __________ procedure for auditing computer process controls uses a hypothetical series of valid and invalid transactions.
(Multiple Choice)
4.9/5
(31)
List and explain the types of risk possible when conducting an audit.
(Essay)
4.8/5
(36)
The evidence collection method that considers the relationship and trends among information to detect items that should be investigated further is called
(Multiple Choice)
4.9/5
(39)
Which characteristics below is not a characteristic of auditing?
(Multiple Choice)
4.8/5
(30)
Showing 21 - 40 of 94
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)