Exam 9: Auditing Computer-Based Informtion Systems
Exam 1: Accounting Information Systems83 Questions
Exam 2: Overview of Business Processes105 Questions
Exam 3: Systems Development and Documentation Techniques99 Questions
Exam 4: Relational Databases90 Questions
Exam 5: Computer Fraud and Security95 Questions
Exam 6: Control and Accounting Information Systems87 Questions
Exam 7: Infromation System Controls for Systems Reliability82 Questions
Exam 8: Auditing Computer-Based Information Systems77 Questions
Exam 9: Auditing Computer-Based Informtion Systems94 Questions
Exam 10: The Revenue Cycle: Sales an Cash Collections94 Questions
Exam 11: The Expenditure Cycle: Purchasing and Cash Disbursements89 Questions
Exam 12: The Production Cycle87 Questions
Exam 13: The Human Resources Managementpayroll Cycle93 Questions
Exam 14: General Ledger and Reporting System81 Questions
Exam 15: Data Modeling and Database Design80 Questions
Exam 16: Implementing an Rea Model in a Relational Database77 Questions
Exam 17: Special Topics in Rea Modeling77 Questions
Exam 18: Introduction to Systems Development and Systems Analysis94 Questions
Exam 19: Ais Development Strategies95 Questions
Exam 20: Systems Design, Implementation and Operation86 Questions
Select questions type
Using the risk-based auditing approach,when the auditor identifies a control deficiency,the auditor should inquire about
(Multiple Choice)
4.8/5
(32)
The type of audit in which the primary responsibility of the auditors is the management of the organization is
(Multiple Choice)
4.8/5
(36)
Much of the effort spent in an audit entails the collection of evidence.Verifying the accuracy of certain information,often through communication with certain third parties,is known in the language of the auditor as
(Multiple Choice)
4.7/5
(31)
The scope of a(n)__________ audit encompasses all aspects of information systems management.
(Multiple Choice)
4.9/5
(30)
The auditor seeks ____________ that no _______________ exist in the audited process.
(Multiple Choice)
4.7/5
(32)
The __________ audit is concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives.
(Multiple Choice)
4.8/5
(28)
Reference to the operational policies manual indicate that all visitors to the production facility should produce photo identification and be signed in and out with the times noted.Observation indicates that guards often wave people through if they are accompanied by a known employee.This is an application of which of the following five internal audit scope standards?
(Multiple Choice)
4.9/5
(32)
One function of CAS is to review data files to retrieve records meeting a specified criteria.What is this function called?
(Multiple Choice)
4.8/5
(40)
An auditor examining a firm's accounting information system creates a fictitious customer in the system and then creates several fictitious sales to the customer.The records are then tracked as they are processed by the system.This is an example collecting audit evidence using
(Multiple Choice)
4.8/5
(36)
An internal auditor has set the firm's information system to flag questionable online transactions,The system then displays information about the transaction on the auditor's computer system and sends a text message to the auditor's cell phone.This is an example of collecting audit evidence using
(Multiple Choice)
4.9/5
(38)
An auditor examines documents related to the acquisition and disposal of a firm's delivery van and manually calculates accumulated depreciation for comparison with accounting records.This is an example collecting audit evidence by
(Multiple Choice)
4.9/5
(34)
The auditor has various software programs available to help in the audit effort.A program that,based on auditor specifications,generates programs that perform certain audit functions is referred to a(n)
(Multiple Choice)
4.7/5
(36)
Showing 81 - 94 of 94
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)