Info
Warning
Danger

Study Resources (Accounting)

31. Which auditing technique will not assist in determining if unauthorized programming changes have been made? A. Use of a source code comparison program B. Use of the reprocessing technique to compare program output C. Interviewing and making inquiries of the programming staff D. Use of parallel simulation to compare.
8 Views
View Answer
1. Auditing involves the A. collection, review, and documentation of audit evidence. B. planning and verification of economic events. C. collection of audit evidence and approval of economic events. D. testing, documentation, and certification of audit evidence. 2. What is not a typical responsibility of an internal auditor? A. helping.
18 Views
View Answer
21. Stepanek Sales and Service provides free coffee to employees. Stepanek arranged with Ingebrigtson's Joe to deliver as many coffee packages, sugar, creamer, and filters as needed each week. Ingebrigtson's sends a monthly invoice for Stepanek to pay. This arrangement is best described as a A. blanket purchase order. B. set.
9 Views
View Answer
48. Identify three ways users can be authenticated and give an example of each. 49. Describe four requirements of effective passwords . 50. Explain social engineering. 51. Explain the value of penetration testing. 52. Describe the function of a computer incident response team (CIRT. and the steps that a CIRT should perform following a.
15 Views
View Answer
1. In organizations with at least basic segregation of duties, the credit manager reports to the ________ and the treasurer reports to the ________. A. controller; vice president of finance B. treasurer; controller C. marketing manager; vice president of finance D. treasurer; vice president of finance 2. In the revenue.
19 Views
View Answer
31. This control ensures that the correct and most current files are being updated. A. Cross-footing balance test B. Data matching C. File labels D. Write-protect mechanism 32. This batch processing data entry control sums the number of items in a batch. A. Financial total B. Hash total C. Record count D. Sequence check 33. This data entry.
8 Views
View Answer
Accounting Information Systems, 12e (Romney/Steinbart. Chapter 9   Information Systems Controls for Systems Reliability?Part 2: Confidentiality and Privacy 1. Concerning virtual private networks (VPN., which of the following is not true? A. VPNs provide the functionality of a privately owned network using the Internet. B. Using VPN software to encrypt information while it is in.
18 Views
View Answer
51. What control should be put in place that assigns responsibility for EFT payments made to vendors? A. Encrypt all EFT transmissions. B. Time stamp all EFT transactions. C. Establish a control group to monitor EFT transactions for validity and accuracy. D. Number all EFT transactions. 52. Which of the following threats is not.
7 Views
View Answer
41. What is the primary purpose of computer audit software? A. eliminate auditor judgment errors B. assist the auditor in retrieving and reviewing information C. detect unauthorized modifications to system program code D. recheck all mathematical calculations, cross-foot, reprocess financial statements and compare to originals 42. The scope of a(n. ________ audit encompasses.
8 Views
View Answer
21. A company should check inventory quantities before accepting a sales order for all the following reasons except to A. verify the accuracy of the perpetual inventory records. B. inform the customer about availability and delivery times. C. know which items may need to be back ordered. D. update inventory records.
8 Views
View Answer
51. An auditor creates a fictitious customer in the system and then creates several fictitious sales to the customer. The records are then tracked as they are processed by the system. The auditor is using A. an integrated test facility. B. the snapshot technique. C. a system control audit review file. D. continuous.
9 Views
View Answer
51. ________ involves copying only the data items that have changed since the last partial backup. A. Archive B. Cloud computing C. Differential backup D. Incremental backup 52. ________ copies all changes made since the last full backup. A. Archive B. Cloud computing C. Differential backup D. Incremental backup 53. The maximum amount of time between backups is.
7 Views
View Answer
21. For replacement of inventories and assets destroyed by fire or other disasters, an organization needs A. stand-by facilities. B. adequate insurance coverage. C. source data automation. D. All of the above are correct. 22. Overproduction or underproduction can be a threat to an organization. To which process or activity.
7 Views
View Answer
31. This is an authorized attempt by an internal audit team or an external security consultant to attempt to break into the organization's information system. A. Intrusion detection system B. Log analysis C. Penetration test D. Vulnerability scan 32. A well-known hacker started his own computer security consulting business shortly after being released from prison..
10 Views
View Answer
11. The data entry control that would best prevent entering an invoice received from a vendor who is not on an authorized supplier list is A. a validity check. B. an authorization check. C. a check digit. D. closed-loop verification. 12. Forms design is an example of this type of control. A. Data entry control B. Processing.
9 Views
View Answer
68. Describe the basic revenue cycle activities. 69. Explain how validity checks, completeness tests and reasonableness tests can be implemented to ensure accuracy of customer orders. 70. Define and describe benefits of a CRM system. 71. How can Electronic Data Interchange (EDI. facilitate the billing and accounts receivable process? 72. Describe typical.
8 Views
View Answer
77. Identify possible problems associated with receiving goods and appropriate actions in response to the problems. 78. How can information technology be used to improve the vendor invoice approval process? 79. Under what conditions is MRP more suitable than JIT and vice versa? 80. In the expenditure cycle, the majority of.
7 Views
View Answer
21. Which of the following is the first step in the risk-based audit approach? A. Identify the control procedures that should be in place. B. Evaluate the control procedures. C. Determine the threats facing the AIS. D. Evaluate weaknesses to determine their effect on the audit procedures. 22. Determining whether the necessary control procedures.
8 Views
View Answer
11. The production cycle document that specifies the quantity of each product to be produced and when production should begin is the A. bill of materials. B. bill of lading. C. master production schedule. D. operations list. 12. What information is necessary to create the master production schedule? A. engineering.
11 Views
View Answer
11. A system that employs various types of advanced technology has more ________ risk than traditional batch processing. A. control B. detection C. inherent D. investing 12. Control risk is defined as the A. susceptibility to material risk in the absence of controls. B. risk that a material misstatement will get.
9 Views
View Answer
11. Which of the following is not one of the three important factors determining the strength of any encryption system? A. Key length B. Key management policies C. Encryption algorithm D. Privacy 12. A process that takes plaintext of any length and transforms it into a short code. A. Asymmetric encryption B. Encryption C. Hashing D. Symmetric encryption 13. Which.
13 Views
View Answer
1. The AIS compiles and feeds information among the business cycles. What is the relationship between the revenue and production cycles regarding the exchange of information? A. The revenue cycle provides sales forecast and customer order information to the production cycle, but the production cycle sends information back to revenue.
20 Views
View Answer
41. What is the most effective way to ensure information system availability? A. High bandwidth B. Maintain a hot site C. Maintain a cold site D. Frequent backups 42. Concerning system availability, which of the following statements is true? A. Human error does not threaten system availability. B. Proper controls can maximize the risk of threats causing.
10 Views
View Answer
21. Check digit verification is an example of a(n. A. data transmission control. B. output control. C. processing control. D. input control. 22. This ensures that the input data will fit into the assigned field. A. Limit check B. Range check C. Size check D. Validity check 23. This tests a numerical amount to ensure that it does not.
6 Views
View Answer
73. Describe the two methods to manage accounts receivable. 74. Describe cycle billing and identify how an organization might benefit by using cycle billing. 75. Failure to collect cash on credit sales is a threat in the revenue cycle. What controls can be used to help neutralize this threat? 76. Discuss.
5 Views
View Answer
21. Compatibility tests utilize a(n. ________, which is a list of authorized users, programs, and data files the users are authorized to access or manipulate. A. validity test B. biometric matrix C. logical control matrix D. access control matrix 22. The process that screens individual IP packets based solely on.
8 Views
View Answer

Welcome Back!

ScholarOn has more then 20 Million answers, flashcards & more being added everyday!

or
Forgot?
Login
Don't have an account? Signup

Join ScholarOn

ScholarOn has more then 20 Million answers, flashcards & more being added everyday!

or
Signup
By registering, I agree to the Terms and Privacy Policies
Already have an account? Log in

Verify Your Email

Check your inbox & click on the link to activate your account.

Resend Email
Verification Mail Send Successfully. Please Check Your Email.

Forgot Password

Please enter your registered email to recieve the password reset link.

Send reset link
Already have an account? Log in
Did you know?

ScholarOn has more than 2 Million+ answers, textbook solutions & flashcards. Explore Now!

d
Let us boost your grade together!

Get 24/7 homework help from Experts

Let our knowledge be your backup

1

Submit your homework question or assignment

2

Receive a quote & Make the Payment

3

Sit Back & Relax to Earn Better Grades!

Drag files here or Browse your Device

Maximum file size 10MB
17,475 Accounting Questions Answered! Get Answer

We are The Best Because

  • On Time Delivery
  • Plagiarism ReportFree
  • Unlimited RevisionsFree
  • 100% Privacy & Confidential
  • 24/7 Live Chat Support
4.9 (16682 Ratings)
You can communicate directly with your expert until the solution quality is delivered to your complete satisfaction.
Looking for writing help?
Did you know?

ScholarOn has more than 2 Million+ answers, textbook solutions & flashcards. Explore Now!