Exam 8: Consideration of Internal Control in an Information Technology Environment
Exam 1: The Role of the Public Accountant in the American Economy45 Questions
Exam 2: Professional Standards62 Questions
Exam 3: Professional Ethics62 Questions
Exam 4: Legal Liability of Cpas56 Questions
Exam 5: Audit Evidence and Documentation82 Questions
Exam 6: Planning the Audit; Linking Audit Procedures to Risk78 Questions
Exam 7: Internal Control92 Questions
Exam 8: Consideration of Internal Control in an Information Technology Environment63 Questions
Exam 9: Audit Sampling83 Questions
Exam 10: Cash and Financial Investments61 Questions
Exam 11: Accounts Receivable, Notes Receivable, and Revenue64 Questions
Exam 12: Inventories and Cost of Goods Sold59 Questions
Exam 13: Property, Plant, and Equipment: Depreciation and Depletion39 Questions
Exam 14: Accounts Payable and Other Liabilities50 Questions
Exam 15: Debt and Equity Capital40 Questions
Exam 16: Auditing Operations and Completing the Audit69 Questions
Exam 17: Auditors Report62 Questions
Exam 18: Integrated Audits of Public Companies43 Questions
Exam 19: Additional Assurance Services: Historical Financial Information60 Questions
Exam 20: Additional Assurance Services: Other Information51 Questions
Exam 21: Internal, Operational, and Compliance Auditing48 Questions
Select questions type
Which of the following personnel is responsible for the proper functioning of the security features built into the operating system?
(Multiple Choice)
4.9/5
(38)
A control feature in a computer system requires the central processing unit (CPU) to send signals to the printer to activate the print mechanism for each character. The print mechanism, just prior to printing, sends a signal back to the CPU verifying that the proper print position has been activated. This type of data transmission is referred to as:
(Multiple Choice)
4.7/5
(32)
Which of the following testing techniques minimizes the possibility that the auditors will contaminate a client's financial records?
(Multiple Choice)
4.8/5
(36)
Consider the following computer applications:
(1) At a catalog sales firm, as phone orders are entered into their computer, both inventory and credit are immediately checked.
(2) A manufacturer's computer sends the coming week's production schedule and parts orders to a supplier's computer.
Which statement below is true for these applications?
(Multiple Choice)
4.9/5
(41)
Which of the following is least likely to be tested with generalized audit software?
(Multiple Choice)
4.8/5
(36)
Auditors are now faced with examining clients that have database systems.
a. Describe a database system, including its major advantage.
b. Identify policies and procedures that may be established to provide control over that aspect of a database system.
(Essay)
4.8/5
(34)
Many auditors use generalized audit software to assist them in the examination of clients' computer records.
a. Describe what is meant by generalized audit software.
b. List two advantages of the use of generalized audit software.
c. List three functions that may be performed with this type of software.
(Essay)
4.8/5
(38)
Which of the following procedures would an entity most likely include in its disaster recovery plan?
(Multiple Choice)
5.0/5
(42)
State whether each of the following statements is correct or incorrect.
A. Specialists with specialized skills in IT processing are seldom used on audits since each audit team member is expected to have the necessary skills.
B. The nature of the IT-based system may affect the specific procedures employed by the auditors in testing the controls.
C. Computer assisted audit techniques, while helpful for tests of controls, are seldom helpful for substantive procedures.
D. Parallel simulation involves the use of audit software to process functions essentially equivalent to those of the client's program and to determine whether auditor and client results are equivalent.
(Short Answer)
4.9/5
(35)
A company's labor distribution report requires extensive corrections each month because of labor hours charged to inactive jobs. Which of the following data processing input controls appears to be missing?
(Multiple Choice)
4.9/5
(42)
Which of the following is a software component of a computer system?
(Multiple Choice)
4.8/5
(42)
Which of the following computer system risks would be increased by the installation of a database system?
(Multiple Choice)
4.8/5
(32)
Which of the following is not a distinctive characteristic of advanced IT systems?
(Multiple Choice)
4.8/5
(29)
Which of the following would be least likely to be considered a desirable attribute of a database management system?
(Multiple Choice)
4.8/5
(30)
Which of the following personnel is responsible for determining the computer processing needs of the various users?
(Multiple Choice)
4.9/5
(48)
End user computing is most likely to occur on which of the following types of computers?
(Multiple Choice)
4.8/5
(39)
The best method of achieving internal control over advanced IT systems is through the use of:
(Multiple Choice)
4.9/5
(34)
Showing 41 - 60 of 63
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)