Exam 9: Auditing Computer-Based Informtion Systems
Exam 1: Accounting Information Systems83 Questions
Exam 2: Overview of Business Processes105 Questions
Exam 3: Systems Development and Documentation Techniques99 Questions
Exam 4: Relational Databases90 Questions
Exam 5: Computer Fraud and Security95 Questions
Exam 6: Control and Accounting Information Systems87 Questions
Exam 7: Infromation System Controls for Systems Reliability82 Questions
Exam 8: Auditing Computer-Based Information Systems77 Questions
Exam 9: Auditing Computer-Based Informtion Systems94 Questions
Exam 10: The Revenue Cycle: Sales an Cash Collections94 Questions
Exam 11: The Expenditure Cycle: Purchasing and Cash Disbursements89 Questions
Exam 12: The Production Cycle87 Questions
Exam 13: The Human Resources Managementpayroll Cycle93 Questions
Exam 14: General Ledger and Reporting System81 Questions
Exam 15: Data Modeling and Database Design80 Questions
Exam 16: Implementing an Rea Model in a Relational Database77 Questions
Exam 17: Special Topics in Rea Modeling77 Questions
Exam 18: Introduction to Systems Development and Systems Analysis94 Questions
Exam 19: Ais Development Strategies95 Questions
Exam 20: Systems Design, Implementation and Operation86 Questions
Select questions type
The __________ part of the auditing process involves (among other things)the auditors observing the operating activities and having discussion with employees.
(Multiple Choice)
4.8/5
(34)
An auditor must be willing to accept some degree of risk that the audit conclusion is incorrect.Accordingly,the auditor's objective is to seek __________ that no material error exists in the information audited.
(Multiple Choice)
4.7/5
(30)
In the __________ stage of an operational audit,the auditor measures the actual system against an ideal standard.
(Multiple Choice)
4.7/5
(35)
Briefly describe tests that can be used to detect unauthorized program modifications.
(Essay)
4.9/5
(26)
The use of a secure file library and restrictions on physical access to data files is a control procedure used in conjunction with
(Multiple Choice)
4.8/5
(33)
How would auditors determine if unauthorized program changes have been made?
(Multiple Choice)
4.7/5
(35)
Practically all audits follow a similar sequence of activities that can be divided into four stages.Organizing the audit team and the physical examination of assets are components of which two separate audit stages?
(Multiple Choice)
4.9/5
(36)
The evidence collection method that is used to gather data about the system is
(Multiple Choice)
4.7/5
(34)
The three different types of internal audits commonly performed today are
(Multiple Choice)
4.8/5
(39)
Why do all audits follow a sequence of events that can be divided into four stages?
(Essay)
4.9/5
(37)
The __________ audit examines the reliability and integrity of accounting records.
(Multiple Choice)
4.8/5
(31)
One way to document the review of source data controls is to use
(Multiple Choice)
4.8/5
(37)
An auditor finds that absentee rates are significantly higher on Mondays and Fridays than on other work days.This is an example collecting audit evidence by
(Multiple Choice)
4.8/5
(41)
a)What is test data processing?
b)How is it done?
c)What are the sources that an auditor can use to generate test data?
(Essay)
4.9/5
(33)
What does an auditor examine when performing a detailed analysis of program logic?
(Essay)
4.9/5
(37)
An auditor examines all documents related to the acquisition,repair history,and disposal of a firm's delivery van.This is an example collecting audit evidence by
(Multiple Choice)
4.8/5
(42)
Showing 61 - 80 of 94
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)