Exam 10: Computer Controls for Organizations and Accounting Information Systems
Exam 1: Accounting Information Systems and the Accountant94 Questions
Exam 2: Information Technology and Aiss111 Questions
Exam 3: Data Modeling103 Questions
Exam 4: Organizing and Manipulating the Data in Databases101 Questions
Exam 5: Database Forms and Reports62 Questions
Exam 6: Documenting Accounting Information Systems62 Questions
Exam 7: Documenting Accounting Information Systems49 Questions
Exam 8: Accounting Information Systems and Business Processes: Part II54 Questions
Exam 9: Introduction to Internal Control Systems71 Questions
Exam 10: Computer Controls for Organizations and Accounting Information Systems93 Questions
Exam 11: Computer Crime,fraud,ethics,and Privacy62 Questions
Exam 12: Information Technology Auditing65 Questions
Exam 13: Developing and Implementing Effective Accounting Information Systems110 Questions
Exam 14: Accounting on the Internet105 Questions
Exam 15: Accounting on the Internet47 Questions
Select questions type
Input controls attempt to assure the validity,accuracy and completeness of the data entered into an AIS.
(True/False)
4.7/5
(36)
All controls available for the computerized accounting information system of a company should be implemented regardless of cost due to the high rate of computer crime.
(True/False)
4.8/5
(41)
Contingency planning includes the development of a formal disaster recovery plan.
(True/False)
4.8/5
(33)
Which of the following would lessen internal control in an automated data processing system?
(Multiple Choice)
4.8/5
(44)
An expense report was prepared by a company's cost center.One executive questioned one of the amounts and asked for "the source documents which support the total." Data processing was not able to routinely do so.The best control procedure would be:
(Multiple Choice)
4.9/5
(36)
If _____ controls are ineffective,this can cause ____ controls to be unreliable.
(Multiple Choice)
4.8/5
(40)
Which of the following is not a subcategory of input controls?
(Multiple Choice)
4.9/5
(39)
A very effective ID approach for safeguarding logical computer access bases user recognition on:
(Multiple Choice)
5.0/5
(38)
Which of the following types of errors will check digits usually detect?
(Multiple Choice)
4.8/5
(29)
A CPA reviews a client's payroll procedures.The CPA would consider internal control to be less than effective if a payroll department supervisor was assigned the responsibility for:
(Multiple Choice)
4.7/5
(45)
Both external and internal file labels are useful in avoiding the use of the wrong input tape.
(True/False)
4.8/5
(39)
The textbook identifies a number of issues that should be considered when developing a security policy.One of the issues is "identify threats".Which of the following is not an example of this issue?
(Multiple Choice)
4.8/5
(42)
A business continuity plan (BCP)includes which of the following?
(Multiple Choice)
4.9/5
(35)
In an online,real-time system,which of the following would be most likely to be used as backup for an application's master file maintained on magnetic disk?
(Multiple Choice)
4.8/5
(38)
Testing processing programs with test data is performed only when a system is first installed due to the high costs of such test runs.
(True/False)
4.9/5
(48)
_____________ permit data to be written on a magnetic tape.
(Multiple Choice)
4.8/5
(37)
The least effective physical security control for a computer center is:
(Multiple Choice)
4.8/5
(37)
Showing 21 - 40 of 93
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)