Exam 8: Auditing Computer-Based Information Systems
Exam 1: Accounting Information Systems83 Questions
Exam 2: Overview of Business Processes105 Questions
Exam 3: Systems Development and Documentation Techniques99 Questions
Exam 4: Relational Databases90 Questions
Exam 5: Computer Fraud and Security95 Questions
Exam 6: Control and Accounting Information Systems87 Questions
Exam 7: Infromation System Controls for Systems Reliability82 Questions
Exam 8: Auditing Computer-Based Information Systems77 Questions
Exam 9: Auditing Computer-Based Informtion Systems94 Questions
Exam 10: The Revenue Cycle: Sales an Cash Collections94 Questions
Exam 11: The Expenditure Cycle: Purchasing and Cash Disbursements89 Questions
Exam 12: The Production Cycle87 Questions
Exam 13: The Human Resources Managementpayroll Cycle93 Questions
Exam 14: General Ledger and Reporting System81 Questions
Exam 15: Data Modeling and Database Design80 Questions
Exam 16: Implementing an Rea Model in a Relational Database77 Questions
Exam 17: Special Topics in Rea Modeling77 Questions
Exam 18: Introduction to Systems Development and Systems Analysis94 Questions
Exam 19: Ais Development Strategies95 Questions
Exam 20: Systems Design, Implementation and Operation86 Questions
Select questions type
Mike Colby took a call from a client."Listen,Mike,I need to interact online in real time with our manufacturing operation in China,and I want to make sure that no one intercepts the communications.How can I do that?" Mike thought a moment,then responded with the best solution."We'll set up a(an)________."
(Multiple Choice)
4.9/5
(31)
The accounting department at Synergy Hydroelectric records an average of 10,000 transactions per hour.By cost-benefit analysis,managers have concluded that the maximum acceptable loss of data in the event of a system failure is 20,000 transactions.If the firm's recovery time objective is 60 minutes,then the worst case recovery time objective is
(Multiple Choice)
4.9/5
(38)
Identify the 10 internationally recognized best practices for protecting the privacy of customers' personal information.
(Essay)
4.9/5
(33)
Which of the following is not the objective of a disaster recovery plan?
(Multiple Choice)
4.9/5
(29)
This compares the ID number in transaction data with similar data in the master file to verify that the account exists.
(Multiple Choice)
4.7/5
(33)
This ensures that the correct and most current files are being updated.
(Multiple Choice)
4.8/5
(31)
Devices that filter TCP/IP packets in order to protect against malicious code are called
(Multiple Choice)
4.7/5
(32)
This batch processing data entry control sums the number of items in a batch.
(Multiple Choice)
4.8/5
(30)
Concerning virtual private networks (VPN),which of the following is not true?
(Multiple Choice)
4.9/5
(33)
This ensures that the input data will fit into the assigned field.
(Multiple Choice)
4.8/5
(30)
This batch processing data entry control tests if a batch of input data is in the proper numerical or alphabetical sequence.
(Multiple Choice)
4.8/5
(40)
This batch processing data entry control sums a non-financial numeric field.
(Multiple Choice)
4.8/5
(39)
This protects records from errors that occur when two or more users attempt to update the same record simultaneously.
(Multiple Choice)
4.8/5
(31)
Identify four useful procedures for controlling access to system outputs.
(Essay)
5.0/5
(25)
The Spontaneous Combustion Rocket Shoppe in downtown Fargo,North Dakota,generates three quarters of its revenue from orders taken over the Internet.The revenue clearing account is debited by the total of cash and credit receipts and credited by the total of storefront and Internet sales.This is an example of a
(Multiple Choice)
4.9/5
(35)
Showing 21 - 40 of 77
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)