Exam 10: Computer Controls for Organizations and Accounting Information Systems
Exam 1: Accounting Information Systems and the Accountant94 Questions
Exam 2: Information Technology and Aiss111 Questions
Exam 3: Data Modeling103 Questions
Exam 4: Organizing and Manipulating the Data in Databases101 Questions
Exam 5: Database Forms and Reports62 Questions
Exam 6: Documenting Accounting Information Systems62 Questions
Exam 7: Documenting Accounting Information Systems49 Questions
Exam 8: Accounting Information Systems and Business Processes: Part II54 Questions
Exam 9: Introduction to Internal Control Systems71 Questions
Exam 10: Computer Controls for Organizations and Accounting Information Systems93 Questions
Exam 11: Computer Crime,fraud,ethics,and Privacy62 Questions
Exam 12: Information Technology Auditing65 Questions
Exam 13: Developing and Implementing Effective Accounting Information Systems110 Questions
Exam 14: Accounting on the Internet105 Questions
Exam 15: Accounting on the Internet47 Questions
Select questions type
The grandfather-parent-child approach to providing protection for important computer files is a concept that is most often found in:
(Multiple Choice)
4.8/5
(39)
The master file for inventory did not seem right.The file was printed out and many errors were found.The best control procedure would be:
(Multiple Choice)
4.8/5
(44)
The risk of unauthorized access to data through electronic eavesdropping is minimized by using:
(Multiple Choice)
4.7/5
(43)
One of the techniques for controlling batch processing is the use of hash totals.
(True/False)
5.0/5
(47)
A company's computer facilities and computer room conceivably could be destroyed completely by fire.The most appropriate action a company could take in an attempt to prepare for and protect itself for such a disaster would be:
(Multiple Choice)
4.7/5
(40)
In designing a payroll system it is known that no individual's paycheck can amount to more than $300 for a single week.As a result,the payroll program has been written to bypass writing a check and printing out an error message if any payroll calculation results in more than $300.This type of control is called:
(Multiple Choice)
4.7/5
(39)
The master inventory file,contained on a removable magnetic disk,was destroyed by a small fire next to the area where it was stored.The company had to take a special complete inventory in order to re?establish the file.The best control procedure would be:
(Multiple Choice)
4.9/5
(37)
From the standpoint of computer fraud,which type of controls would probably be of highest importance?
(Multiple Choice)
4.9/5
(36)
A data field could pass all edit tests and still be invalid.Ad?ditional controls to cope with this would include:
(Multiple Choice)
4.8/5
(47)
Which of the following is not normally used as a control total to check the validity of data processing activities?
(Multiple Choice)
4.8/5
(36)
Which of the following is an example of application controls in automated data processing systems?
(Multiple Choice)
4.8/5
(41)
An example of a check-digit technique that includes "ordering of digits" in the construction of check-digit values is the:
(Multiple Choice)
4.9/5
(30)
When we say that an organization has an "integrated security policy",what do we mean?
(Multiple Choice)
4.8/5
(30)
Daylight Corporation's organization chart provides for a controller and an information processing manager,both of whom report to the financial vice-president.Internal control would not be strengthened by:
(Multiple Choice)
4.8/5
(32)
General controls within IT environments that affect personnel include:
(Multiple Choice)
4.8/5
(38)
The control of input and output of accounting transactions to and from the information processing subsystem should be performed by an independent control group.
(True/False)
4.8/5
(38)
Within database systems,a control that restricts user access to precisely designated data sets and files is called a(an):
(Multiple Choice)
4.9/5
(33)
The audit trail is easier to follow in an online computerized system as compared to a batch system.
(True/False)
4.8/5
(30)
A company uses the account code 669 for maintenance expense.However,one of the company's clerks often codes maintenance expense as 996.The highest account code in the system is 750.What would be the best internal control check to build into the company's computer program to detect this error?
(Multiple Choice)
4.9/5
(42)
Showing 41 - 60 of 93
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)