Beruflich Dokumente
Kultur Dokumente
10
11
12
13
14
15
16
17
18
19
20
Quiz #2 - Midterms
Batch processing
A. Is not used by most businesses because it reduces the audit trail.
B. Allows users to inquire about groups of information contained in the system.
C. Accumulates transaction records into groups for processing against the master file on a delayed
D. Can only be performed on a centralized basis.
When assessing application controls, which one of the following input controls or edit
checks is most likely to be used to detect a data input error in the customer account number field?
A. Limit check.
B. Validity check.
C. Control total.
D. Hash total.
The two broad groupings of information systems control activities are general controls and
application controls. General controls include controls
A. Relating to the correction and resubmission of faulty data.
B. For developing, modifying, and maintaining computer programs.
C. Designed to ensure that only authorized users receive output from processing.
D. Designed to ensure that all data submitted for processing have been properly authorized
The purpose of input controls is to ensure the
A. Authorization of access to data files.
B. Authorization of access to program files.
C. Completeness, accuracy, and validity of updating.
D. Completeness, accuracy, and validity of input.
The two broad groupings of information systems control activities are general controls and
application controls. General controls include controls
A. Relating to the correction and resubmission of faulty data.
B. For developing, modifying, and maintaining computer programs.
C. Designed to assure that only authorized users receive output from processing.
D. Designed to ensure that all data submitted for processing have been properly authorized.
Some data processing controls relate to all computer processing activities (general
controls) and some relate to specific tasks (application controls). General controls include
A. Controls designed to ascertain that all data submitted to computer processing have been proper
B. Controls that relate to the correction and resubmission of data that were initially incorrect.
C. Controls for documenting and approving programs and changes to programs.
D. Controls designed to assure the accuracy of the processing results.
Which of the following is a true statement regarding security over an entitys IT?
A.Controls should exist to ensure that users have access to and can update only the data elements
been authorized to access.
B. Controls over data sharing by diverse users within an entity should be the same for every user.
C. The employee who manages the computer hardware should also develop and debug the compu
D. Controls can provide assurance that all processed transactions are authorized but cannot verify
transactions are processed.
Answer