Info
Warning
Danger

Study Resources (Accounting)

13.Compare and contrast the following disaster recovery options: mutual aid pact, empty shell, recovery operations center, and internally provided backup. Rank them from most risky to least risky, as well as most costly to least costly. 14.What is a disaster recovery plan? What are the key features? .
6 Views
View Answer
6.Contrast reactive and proactive management styles. 7.Explain why accountants are interested in the legal feasibility of a new systems project. 8.Explain an advantage of surveying the current system when preparing a systems analysis for a new systems project. 9.What are two purposes of the systems project proposal? 10.List two ways that a systems project.
8 Views
View Answer
MULTIPLE CHOICE 1.Which of the following is NOT an implication of section 302 of the Sarbanes-Oxley Act? a.Auditors must determine, whether changes in internal control has, or is likely to, materially affect internal control over financial reporting. b.Auditors must interview management regarding significant changes in the design or operation of internal control that.
6 Views
View Answer
11.Which statement is not correct? The structured design approach a.is a top-down approach b.is documented by data flow diagrams and structure diagrams c.assembles reusable modules rather than creating systems from scratch d.starts with an abstract description of the system and redefines it to produce a more detailed description of the system 12.The benefits of the.
4 Views
View Answer
11.List three characteristics that should be considered when designing a hardcopy input form. 12.List two techniques of forms design that encourage efficient and effective data collection. 13.What is the importance of the base case? 14.Describe a risk associated with the phased cutover procedure for data conversion. 15.List the attributes of output views. .
8 Views
View Answer
21.The degree of compatibility between the firm’s existing procedures and personnel skills and the requirements of the new system is called a.technical feasibility b.operational feasibility c.schedule feasibility d.legal feasibility 22.The ability of a system to protect individual privacy and confidentiality is an example of a.schedule feasibility b.operational feasibility c.legal feasibility d.economic feasibility 23.The systems project proposal a.provides management with a basis.
5 Views
View Answer
11.Instead of implementing an application in a single “big-bang” release, modern systems are delivered in parts continuously and quickly 12.When the nature of the project and the needs of the user permit, most organizations will seek a pre-coded commercial software package rather than develop a systems in-house. 13.All of the steps in.
7 Views
View Answer
21.Correctly designed, processing modules are tightly coupled and have strong cohesion. 22.A system walkthrough occurs after the system is implemented. 23.The detailed design report is the “blueprint” which guides programmers and database administrators in constructing the physical system. 24.When a program module is tested, both good and bad data are included with the.
8 Views
View Answer
11.A disaster recovery plan is a comprehensive statement of all actions to be taken after a disaster. 12.IT auditing is a small part of most external and internal audits. 13.Assurance services is an emerging field that goes beyond the auditor’s traditional attestation function. 14.An IT auditor expresses an opinion on the fairness of.
8 Views
View Answer
31.The accountant’s role in systems analysis includes all of the following except a.specify audit trail requirements b.prepare data gathering questionnaires c.suggest inclusion of advanced audit features d.ensure mandated procedures are part of the design 32.The role of the steering committee includes a.designing the system outputs b.resolving conflicts that arise from a new system c.selecting the programming techniques to.
6 Views
View Answer
21.The output of the detailed design phase of the Systems Development Life Cycle (SDLC) is a a.fully documented system report b.systems selection report c.detailed system design report d.systems analysis report 22.The detailed design report contains all of the following except a.input screen formats b.alternative conceptual designs c.report layouts d.process logic 23.When each element of information supports the user’s decision or.
5 Views
View Answer
SHORT ANSWER 1.Using Computer Aided Software Engineering (CASE) tools, the structure diagram can be transformed into machine code. Describe a disadvantage associated with this procedure. 2.Using Computer Aided Software Engineering (CASE) tools, the structure diagram can be transformed into machine code. Describe an advantage associated with this procedure. 3.What is prototyping? Why is.
6 Views
View Answer
6.What is meant by “object-oriented design?” What does it mean for systems design? 7.List three advantages and one disadvantage of commercial software. 8.What is the purpose of the Request for Proposal (RFP)? 9.Explain how a benchmark problem is used to measure the performance of two different commercial software packages. 10.Contrast the structured and object-oriented.
5 Views
View Answer
Chapter 16—IT Controls Part II: Security and Access TRUE/FALSE 1.In a computerized environment, the audit trail log must be printed onto paper documents. 2.Disguising message packets to look as if they came from another user and to gain access to the host’s network is called spooling. 3.Access controls take on increased importance in a.
10 Views
View Answer
11.A tangible benefit a.can be measured and expressed in financial terms b.might increase revenues c.might decrease costs d.all of the above 12.Intangible benefits a.are easily measured b.are of relatively little importance in making information system decisions c.are sometimes estimated using customer satisfaction surveys d.when measured, do not lend themselves to manipulation 13.Which technique is least likely to be used to.
5 Views
View Answer
9.Why is the announcement of a new systems project so critical to project success? 10.Contrast the preliminary project feasibility study with the feasibility study performed in the systems evaluation and selection phase of the SDLC. 11.Part of systems planning is a project feasibility study. Several feasibility issues can be raised. What are.
3 Views
View Answer
SHORT .Why is it important that the systems professionals who design a project not perform the detailed feasibility study of the project? 2.List at least three one-time costs and three recurring costs in system development. 3.____________________ benefits can be measured and expressed in financial terms, while ____________________ benefits cannot be easily measured.
5 Views
View Answer
Chapter 14—Construct, Deliver, and Maintain Systems Projects TRUE/FALSE 1.The detailed design phase of the Systems Development Life Cycle is a linear process with each of five steps occurring once and in its proper sequence. 2.In a Computer Aided Software Engineering (CASE) environment, the most important use of a data flow diagram is to.
13 Views
View Answer
SHORT ANSWER 1.Which of the following statements is true? a.Both the SEC and the PCAOB requires the use of the COSO framework b.Both the SEC and the PCAOB requires the COBIT framework c.The SEC recommends COBIT and the PCAOB recommends COSO d.Any framework can be used that encompass all of COSO’s general themes 2.COSO identifies two.
5 Views
View Answer
Chapter 13—Managing the Systems Development Life Cycle TRUE/FALSE 1.The majority of the cost of a system is incurred in the new systems development phase of the life cycle. 2.According to the text, a stakeholder is an end user of a system. 3.The objective of systems planning is to link systems projects to the strategic.
14 Views
View Answer
3.Define the feasibility measures that should be considered during project analysis and give an example of each. 4.Explain the role of accountants in the conceptual design stage. 5.Contrast the feasibility study performed in the systems analysis phase of the Systems Development Life Cycle (SDLC) with the study performed in the systems selection.
4 Views
View Answer
6.What issues must be considered in designing hardcopy documents? 7.What is the role of test data? What is a base case? 8.Correctly designed modules possess two attributes. Name and explain each. ANS: Coupling measures the degree of interaction or exchange of data between modules. A loosely coupled module is independent of the others. Modules.
13 Views
View Answer
11.In the object-oriented approach to systems design, when an operation is performed on an object, an attribute will always be changed. 12.In the object-oriented approach to systems design, inheritance means that each object instance inherits the attributes and operations of the class to which it belongs. 13.In the object-oriented approach to systems.
8 Views
View Answer
4.Prior to SOX, external auditors were required to be familiar with the client organization’s internal controls, but not test them. Explain. 5.Does a qualified opinion on managements assessment of internal controls over the financial reporting system necessitate a qualified opinion on the financial statements? Explain. 6.The PCAOB’s standard No. 2 specifically requires.
7 Views
View Answer
MULTIPLE CHOICE 1.Which statement is not true? a.prototypes do not include internal control features b.a prototype is an inexpensive, simplified model of a system c.a throwaway prototype is discarded after the requirements are established d.systems designers always discard prototypes and do not develop them into finished systems 2.Which statement is not true? Computer Aided Software Engineering.
9 Views
View Answer
26.What is an auditor looking for when testing computer center controls? 27.Define and contrast attestation services and assurance services. 28.What is IT Governance? 29.Why should the tasks of systems development and maintenance be segregated from operations? 30.Why should new systems development activities be segregated from the program change (maintenance) function. .
4 Views
View Answer
16.What are embedded instructions? Why do they matter? 17.What are the two methods of electronic input? How do they differ? 18.Describe the Cold Turkey (or Big Bang) approach to system cutover. 19.Discuss the advantage of the parallel operation cutover approach. 20.What is the objective of a post-implementation review? .
7 Views
View Answer
12.Explain the role of accountants in the conceptual design stage. 13.Classify each of the following as either a one-time or recurring costs: training personnel initial programming and testing system design-one hardware costs software maintenance costs site preparation rent for facilities data conversion from old system to new system insurance costs installation of original equipment hardware upgrades 14.What is competency analysis and why do.
7 Views
View Answer
MULTIPLE CHOICE 1.When studying the detailed feasibility of a new project a.prototyping does not affect the schedule feasibility analysis b.the need for user training will influence the schedule feasibility analysis c.protection from fraud and errors will influence the schedule feasibility analysis d.a cost-benefit review will affect the schedule feasibility analysis 2.Protection from inadvertent disclosures of confidential.
8 Views
View Answer
10.Internal control in a computerized environment can be divided into two broad categories. What are they? Explain each. 11.Auditors examine the physical environment of the computer center as part of their audit. Many characteristics of computer centers are of interest to auditors. What are they? Discuss. 12.Explain why certain duties that are.
5 Views
View Answer
11.A second site backup agreement between two or more firms with compatible computer facilities to assist each other with data processing needs in an emergency is called a.internally provided backup b.recovery operations center c.empty shell d.mutual aid pact 12.The major disadvantage of an empty shell solution as a second site backup is a.the host site may.
5 Views
View Answer
6.Define general controls. 7.Discuss the key features of Section 302 of the Sarbanes-Oxley Act. 8.What the three primary CBIS functions that must be separated? 9.List three pairs of system functions that should be separated in the centralized computer services organization. Describe a risk exposure if the functions are not separated. Functions to SeparateRisk Exposure ____________________________________________________ ____________________________________________________ ____________________________________________________ 10.For.
5 Views
View Answer
Chapter 15—IT Controls Part I: Sarbanes-Oxley and IT Governance TRUE/FALSE 1.Corporate management (including the CEO) must certify monthly and annually their organization’s internal controls over financial reporting. 2.Both the SEC and the PCAOB requires management to use the COBIT framework for assessing internal control adequacy. 3.Both the SEC and the PCAOB requires management to.
18 Views
View Answer
16.The distributed data processing approach carries some control implications of which accountants should be aware. Discuss two. 17.__________________________ are intentional mistakes while __________________________ are unintentional mistakes. 18.Explain the relationship between internal controls and substantive testing. 19.Discuss the interrelationship of tests of controls, audit objectives, exposures, and existing controls. 20.Distinguish between errors and irregularities. Which.
6 Views
View Answer
3.Discuss the appropriate steps to take when selecting a commercial software package. 4.The Studebaker Company is evaluating two proposals for a commercial software package. Three relevant factors were identified and weighted. Then the evaluation team assigned raw scores from 1 to 5 to each factor for each vendor. Proposal One will.
7 Views
View Answer
21.Describe two tests that an auditor would perform to ensure that the disaster recovery plan is adequate. 22.Distinguish between inherent risk and control risk. How do internal controls and detection risk fit in? 23.Contrast internal and external auditing. 24.What are the components of audit risk? 25.How do the tests of controls affect substantive tests? .
4 Views
View Answer
ESSAY 1.Contrast a LAN and a WAN. Typically, who owns and maintains a WAN? 2.Describe the basic differences between the star, ring, and bus topologies. 3.What security questions must be considered with regard to Internet commerce? 4.What is the World Wide Web? 5.Discuss the three levels of Internet business models. .
6 Views
View Answer
11.Describe the components of a disaster recovery plan. 12.What is a mirrored data center? 13.Why is supervisory control more elaborate in the CBIS environment than in the manual environment? 14.What are some control implications of the distributed data processing model? 15.What is program fraud? .
8 Views
View Answer
11.List four types of facts that should be gathered during an analysis of a system. 12.What is the Internal Business Process Perspective? 13.What is the Learning and Growth Perspective? 14.When a company is doing financially well, why is the Customer Perspective measure important? 15.Distinguish between escapable and inescapable costs. Give an example. 16.Why is cost-benefit.
7 Views
View Answer
31.Which statement is not true? A systems design walkthrough a.is conducted by a quality assurance group b.occurs just after system implementation c.simulates the operation of the system in order to uncover errors and omissions d.reduces costs by reducing the amount of reprogramming 32.System documentation is designed for all of the following groups except a.systems designers and.
5 Views
View Answer
21.The fundamental difference between internal and external auditing is that a.internal auditors represent the interests of management and external auditors represent outsiders b.internal auditors perform IT audits and external auditors perform financial statement audits c.internal auditors focus on financial statement audits and external auditors focus on operational audits and financial statement audits d.external auditors.
6 Views
View Answer
ESSAY 1.Discuss the key features of Section 404 of the Sarbanes-Oxley Act 2.Section 404 requires management to make a statement identifying the control framework used to conduct their assessment of internal controls. Discuss the options in selecting a control framework. 3.Explain how general controls impact transaction integrity and the financial reporting process. .
6 Views
View Answer

Welcome Back!

ScholarOn has more then 20 Million answers, flashcards & more being added everyday!

or
Forgot?
Login
Don't have an account? Signup

Join ScholarOn

ScholarOn has more then 20 Million answers, flashcards & more being added everyday!

or
Signup
By registering, I agree to the Terms and Privacy Policies
Already have an account? Log in

Verify Your Email

Check your inbox & click on the link to activate your account.

Resend Email
Verification Mail Send Successfully. Please Check Your Email.

Forgot Password

Please enter your registered email to recieve the password reset link.

Send reset link
Already have an account? Log in
Did you know?

ScholarOn has more than 2 Million+ answers, textbook solutions & flashcards. Explore Now!

Let us boost your grade together!