Exam 10: Computer Controls for Organizations and Accounting Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Input controls attempt to assure the validity,accuracy and completeness of the data entered into an AIS.

(True/False)
4.7/5
(36)

All controls available for the computerized accounting information system of a company should be implemented regardless of cost due to the high rate of computer crime.

(True/False)
4.8/5
(41)

Contingency planning includes the development of a formal disaster recovery plan.

(True/False)
4.8/5
(33)

Which of the following would lessen internal control in an automated data processing system?

(Multiple Choice)
4.8/5
(44)

Consensus-based protocols contain an odd number of processors.

(True/False)
5.0/5
(40)

An expense report was prepared by a company's cost center.One executive questioned one of the amounts and asked for "the source documents which support the total." Data processing was not able to routinely do so.The best control procedure would be:

(Multiple Choice)
4.9/5
(36)

If _____ controls are ineffective,this can cause ____ controls to be unreliable.

(Multiple Choice)
4.8/5
(40)

Which of the following is not a subcategory of input controls?

(Multiple Choice)
4.9/5
(39)

A very effective ID approach for safeguarding logical computer access bases user recognition on:

(Multiple Choice)
5.0/5
(38)

Which of the following types of errors will check digits usually detect?

(Multiple Choice)
4.8/5
(29)

A CPA reviews a client's payroll procedures.The CPA would consider internal control to be less than effective if a payroll department supervisor was assigned the responsibility for:

(Multiple Choice)
4.7/5
(45)

Both external and internal file labels are useful in avoiding the use of the wrong input tape.

(True/False)
4.8/5
(39)

The textbook identifies a number of issues that should be considered when developing a security policy.One of the issues is "identify threats".Which of the following is not an example of this issue?

(Multiple Choice)
4.8/5
(42)

An internal label may be used only with magnetic tape systems.

(True/False)
4.8/5
(37)

A business continuity plan (BCP)includes which of the following?

(Multiple Choice)
4.9/5
(35)

In an online,real-time system,which of the following would be most likely to be used as backup for an application's master file maintained on magnetic disk?

(Multiple Choice)
4.8/5
(38)

Testing processing programs with test data is performed only when a system is first installed due to the high costs of such test runs.

(True/False)
4.9/5
(48)

_____________ permit data to be written on a magnetic tape.

(Multiple Choice)
4.8/5
(37)

The least effective physical security control for a computer center is:

(Multiple Choice)
4.8/5
(37)

In most companies,contingency planning is unnecessary.

(True/False)
4.8/5
(29)
Showing 21 - 40 of 93
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)