• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/12

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

12 Cards in this Set

  • Front
  • Back
LAN is the abreviation for:

1. Large area network
2. Local Area Network
3. Longitudinal Analogue network
4. Low analytical nets
2. Local Area Network
End uer computing is most likely to occur on which of the following types of computers?

1. Mainframe
2. Decision support systems.
3. Personal computers
4. Personal reference assistants
3. Personal computers
When erroneous date are detected by computer program controlls. data may be excluded from processing and printed on an exception report. The exception report should probably be reviewed and followed up by the:

1. Data Control Group.
2. system analyst.
3. Supervisor of IT operations
4. Computer programmer
1. Data Control Group.
AN accounts payable program posted a payable vendor not included in the online vendor master file. A control which would prevent this error is a:

1. Validity Check
2. Range Check
3. Limit Test
4. Control total.
1. Validity Check
When an online real-time (OLRT) IT processing system is in use, internal control can be strengthened by:

1. Providing for the separation of duties between data input and error handling operations.
2. Attatching plastic fild protection rings to reels of magnetic tape before new data can be entered on the file.
3. Making a validity heck of an indentification number before a user can obtain access to the computer files.
4. Preparing batch totals to provide assurance that file updates are made for the entire input.
3. Making a validity heck of an indentification number before a user can obtain access to the computer files.
The auditors would be most likely concerned with which of the following controls in a distributed data processing system?

1. Hardware controls
2. Systems documentation contorls
3. Access controls
4. Disaster recovery controls.
3. Access controls
The auditors would be least likely to use software to:

1. Access client data files
2. Prepare spreadsheets
3. Assess computer control risk
4. Contstruct parallel simulations
3. Assess computer control risk
Auditors often make use of computer programs that perform routine processing functions such as sorting and merging. These programs are made available by IT comnpanies and other are referred to as:

1. Compiler programs
2. Utility programs
3. User programs
4. Supervisory programs
2. Utility programs
Which of the following is least likely to be considered by the auditors considering engagement of an informaion technology specialist on an audit?

1. Complexity of the client's systems and IT controls.
2. Number of financial institutions at which the client has accounts
3. Client's use of emerging technologies
4. Extent of the client's participation in electronic commerce.
2. Number of financial institutions at which the client has accounts
Which of the following is an advantage of generalized auit software packages?

1. They are all written in one identical computer language.
2. They can be used for audits of clients that use differing computer equipment and file formats.
3. They have reduced the need for the auditor to study input controls for computer related procedures.
4. Their use can be substituted for a relatively large part of the rewuired test of controls.
2. They can be used for audits of clients that use differing computer equipment and file formats.
The increased presence of user operated computers in the workplace has resulted in an increasing number of persons having access to the system, A control that is often used to prevent unauthorized access to sensitive programs is:

1.Backup copies of date on disckettes.
2. User identification passwords.
3. Input validation checks.
4. Record counts of the number of input transations in a batch being processed.
2. User identification passwords.
An auditor will use the computer test date method in order to gain assurance with respect to the:

1. Security of date in a system
2. IT system capacity
3. Controls contained within a program
4. Degree of data entry accuracy for batchh input data.
3. Controls contained within a program