Matching
Match each of the following categories of general controls (letters A - D)to the description of a computer control (numbers 1 - 8).A category of general controls can be used more than once.
Premises:
Ensuring that emergency requests are appropriately documented and properly authorized.
Separating the duties of systems programmers,computer operators,and data librarians
Requiring the use of passwords to access computer programs and files.
Maintaining backup copies of files at safe,remote locations.
Using the Systems Development Life Cycle for testing and validation of new programs.
6___.Involving users in the design of programs and selection of prepackaged software.
Using external labels to identify files and programs.
Requiring program modifications to be tested and implemented by appropriate personnel.
Responses:
Access to programs and data controls
Program change controls
Computer operations controls
Program development controls
Correct Answer:
Premises:
Responses:
Ensuring that emergency requests are appropriately documented and properly authorized.
Separating the duties of systems programmers,computer operators,and data librarians
Requiring the use of passwords to access computer programs and files.
Maintaining backup copies of files at safe,remote locations.
Using the Systems Development Life Cycle for testing and validation of new programs.
6___.Involving users in the design of programs and selection of prepackaged software.
Using external labels to identify files and programs.
Requiring program modifications to be tested and implemented by appropriate personnel.
Premises:
Ensuring that emergency requests are appropriately documented and properly authorized.
Separating the duties of systems programmers,computer operators,and data librarians
Requiring the use of passwords to access computer programs and files.
Maintaining backup copies of files at safe,remote locations.
Using the Systems Development Life Cycle for testing and validation of new programs.
6___.Involving users in the design of programs and selection of prepackaged software.
Using external labels to identify files and programs.
Requiring program modifications to be tested and implemented by appropriate personnel.
Responses:
Related Questions
Q1: Each of the following automated application controls
Q2: Which of the following is not an
Q3: Computer operations controls are typically implemented for
Q4: Audit teams would most likely introduce test
Q6: Which of the following is an example
Q7: The purpose of test data is to
Q8: When programs or files can be accessed
Q9: Which of the following is not an
Q10: As part of assessing the risk of
Q11: Which of the following controls most likely