IS and Comm B - Systems Design and Other Elements Flashcards

1
Q

An employee mistaken enters 4/31 in the date field. The best programmed edit check to detect this error is

A

reasonableness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Expert systems have ______ that represent the facts and inferences it knows

A

knowledge bases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Features in Traditional programs that are not in an Expert system include

A
  • sequential control structures
  • distinct input/output variables
  • passive data elements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In a large database system maintained on a mainframe computer, the most common medium for data files for the database is

A

hard disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When implemented, the control ______ would best assist in meeting the control objective that a system have the capability to hold users accountable for functions performed

A

activity logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The following task would be included in a document flowchart for processing cash receipts:

A

compare control and remittance totals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Routines that utilize the computer to check the validity and accuracy of transaction data during input are called

A

edit programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Operating system is

A

a software program that controls the overall operation of a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A compiler is

A

a computer program that converts a source program into an object program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Compatibility check/test is

A

a procedure for checking a password to determine if its user is authorized to initiate the type of transaction or inquiry he or she is attempting to initiate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A checkpoint/restart procedure is primarily designed to recover from

A

hardware failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internal checks are

A
  • limit check
  • identification
  • sequence check
  • error log
  • transaction log
  • arithmetic proof
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Limit check is

A

a check to identify if data have a value higher or lower than a predetermined amount

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identification is

A

a check to determine if data is valid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sequence check is

A

a check on the sequencing of info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Error log is

A

an up-to-date log of all identified errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Transaction log is

A

a detailed record of every transaction entered in a system through data entry and provides the basic audit trail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Arithmetic proof is

A

a check to compute the calculation and validate the result

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Characteristics of computer machine language include

A
  • internal binary code
  • hexadecimal code
  • on/off electrical switches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Assembly language is

A

a programming language in which each machine language instruction is represented by mnemonic characters (symbolic language)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Many companies and government organizations would like to convert to open systems in order to

A

use less expensive computing equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In general, running open systems:

A
  • increases # of available vendors
  • decreases the average purchase from one vendor
  • decreases volume discounts
  • reduce economies of scale
  • reduce reliance on proprietary components
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The purpose of a software monitor is to

A

collect data on the use of various hardware components during a computer run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Specialized programs that are made available to users of computer system to perform routine and repetitive functions are referred to as

A

service “canned” programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Relationship between source, object, and compiler programs

A

A source program “source code” is a computer program written in a source language which is translated into the object program by using a translation program like a compiler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A decision table indicates the

A

alternative logic conditions and actions to be taken in a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Example of a decision table is

A

a chart that indicates shipping costs based on total purchase price

Purch. Ship
$ 1-$50 $4
$50-$100 $5
$101-$250 $7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

An ERP system has the following advantages over multiple independent functional systems:

A

increased responsiveness and flexibility while aiding in the decision making process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The _______ transaction processing mode provides the most accurate and complete information for decision making

A

online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An application is

A

a computer program for performing a specific function ex. payroll program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Batch processing is

A

a method where items to be processed are collected in groups to permit fast and convenient processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Distributed data processing is

A

a network or interdependent computers where certain functions are centralized, other functions are decentralized, and processing is shared among two or more computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

_______ could be used to reduce the cost of preparing and updating flowcharts

A

Flowcharting software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The batch processing of business transactions can be the appropriate mode when

A

economy of scale can be gained because of high volumes of transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A disk storage unit is preferred over a magnetic tape drive because the disk storage unit

A

offers random access to data files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Real time system is characterized by

A
  • online files
  • prompt input from users
  • an extensive communication network
  • random access
  • immediate update
  • low level language
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Decision tables differ from program flowcharts in that decision tables emphasize

A

logical relationships among conditions and actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A flowchart is

A

a graphic depiction using symbols to show the control flow, primary actions, and interrelationships of a task or a set of tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Compared to online, real-time processing, batch processing has the disadvantage of

A

stored data only being current after the update process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

The implementation phase of an accounting software application would include

A
  • obtaining and installing hardware
  • documenting user procedures
  • training users
  • entering and verifying test data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Identifying inputs and outputs would occur in the ________ phase which _______ implementation

A

systems design and development phase; precedes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The best depiction of the path of data as it moves through an IS is

A

system flowcharts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A data dictionary is

A

an organized description of the data items stored in a database and their meaning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Source code application is

A

a description of record layouts used by application programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Data control language is

A

a way to describe the privileges and security rules governing database users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Database recovery log file is

A

a record of the before and after images of updated records in a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

A characteristic common to companies that have converted to a database system is that before conversion the companies had

A

redundant data fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A tool useful in conducting a preliminary analysis of internal controls in an organization or organizational unit is

A

flowcharting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

CCI developed a mgmt reporting software package that enables members interactively to query a data warehouse and drill down into transaction and trend information via various network set-ups. This is known as

A

an online analytical processing system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A key difference in controls when changing from a manual system to a computer system is

A

the methodology for implementing controls change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A primary function of a database mgmt system (DBMS) is

A

the capability to create and modify the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A fundamental purpose of a DBMS is to

A

reduce data redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Master file is

A

where cumulative info about an organization is stored and is similar to a ledger in a manual system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Transaction file is

A

where data about transaction that occur during a specific period of time is contained and similar to a journal in a manual system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A new policy on e-mail would not include

A

erasing EE email immediately upon terminiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Prompting is

A

an online data entry control that uses the computer to control the data entry process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

An online data entry technique that can be employed when inexperienced personnel input data is the use of

A

prompting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

An advantage of a computer-based system for transaction processing over a manual system is that

A

the computer-based system will be more efficient at producing F/S

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

A type of flowchart representing areas of responsibility (such as depts.) as columns is called horizontal or _______ flowcharts

A

document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

A control designed to catch errors at the point of data entry is

A

a self-checking digit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

If a database has integrity, this means that the

A

database has only consistent data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

A modem is a device that

A

allows computer signals to be sent over a telephone line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Devices that used only to perform sequential file processing will not permit

A

data to be edited on a real-time basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Sequential file processing is

A

a system where files are arranged serially, one after another, and the program must start at the first record and read all succeeding records until the required record is found or until the end of the file reached

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

A systems program

A

manipulates application programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

An AP clerk is accused of making unauthorized changes to previous payments to a vendor. Proof could be uncovered in

A

transaction logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

ROM (read only memory) is

A

a memory component for the storage of elementary software info that cannot be modified by the user of the system or program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

RAM (random access memory) is

A

a temporary read-write memory component of a computer that can be accessed at any point in time without accessing other info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

In a microcomputer system, the place where parts of the operating system program and language translator program are permanently stored is

A

ROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

A central element of mgmt IS is

A

the processing of data items is based on decision models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Phases of System Development Life Cycle (SDLC) are

A

PAD-ID-TIM

1 system Planning
2 system Analysis
3 system Design
4 Implementation and Deployment
5 Testing and Integration
6 system Maintenance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

The type of control plan particular to a specific process or subsystem, rather than related to timing of occurrence is

A

application controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Operational Risk controls can be broken down into the 3 types:

A

preventive
detective
corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

A value added network (VAN) is a privately owned network that performs the function of

A

routing data transactions between trading partners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

An input validation routine not appropriate in a real-time operation is

A

sequence check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Input validation checks and controls that should be performed in a real-time operation include

A

field check, sign check, and redundant data check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Check digit is

A

an input control consisting of a single digit at the end of an id code that is computed from the other digits in a field. If the id code is mis-keyed, a formula will reveal that the check digit is not correct and the field will not accept the entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Field check is

A

an edit check in which the characters in a field are examined to ensure they are of the correct field type

ex. # in # field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Redundant data check is

A

an edit check that requires the inclusion of 2 identifiers in each input record and if these values do not match those on record, the record will not be updated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Sign check is

A

an edit check that verifies that the data in a field has the appropriate arithmetic sign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

During the ______ phase of the SDLC is when training would occur

A

implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

The greatest financial threat to an organization that implemented the financial accounting module of an ERP system from a major vendor exists from errors detected during

A

implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

In the systems development cycle, coding is

A

part of the detailed design phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

An integrated group of programs that supervises and supports the operations of a computer system as it executes user’s application programs is

A

an operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

The data processing cycle (DPC) includes

A

collection (input), refinement, processing, maintenance, and output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Multiprocessing is

A

the simultaneous execution of 2 or more tasks usually by using 2 or more processing units that are part of the same system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Multiprogramming is

A

the appearance of simultaneous execution of 2 programs as a single processing unit switches back and forth between the programs

*it does not allow multiple programs to be executed at exactly the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

In the business information systems, the term “stakeholder” refers to

A

anyone in the organization who has a role in creating or using the documents and data stored on the computers or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Change control is

A

the process of modifying application software, including requesting a change, reviewing the effectiveness of the change, approving the change, and implementing the change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Mgmt of company has a lack of segregation of duties within the application environment, with programmers having access to development and production. The programmers have the ability to implement application code changes into production without monitoring or a quality assurance function. This is considered a deficiency in

A

change control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

In a continuous improvement environment, automated monitoring of controls is

A

optional

*helpful but not necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Manual monitoring of controls can also help in a

A

continuous improvement environment

93
Q

The strategy a CPA would most likely consider in auditing an entity that processes most of its financial data only in electronic form is

A

continuous monitoring and analysis of transaction processing with an embedded audit module

94
Q

An advantage of having a computer maintain an automated error log in conjunction with computer edit programs is that

A

reports can be developed that summarize the errors by type, cause, and person responsible

95
Q

Change mgmt control policies

A

put into place the proper processes and approval channels to make changes to an organization’s systems

96
Q

At a minimum, change mgmt control policies should include

A
  • formal channels for requesting and approving changes
  • preventing unauthorized changes
  • ensuring that any changes made do not impair or negatively impact the other system functions
  • ensuring that viability of the whole system is not impaired
  • requiring appropriate testing of all changes before implementation to production environments occur
97
Q

Six Sigma, TQM, and other process improvement methodologies all follow the same basic steps which are:

A
  • identify what the issue is
  • understand more about the issue
  • determine what is causing the issue
  • remediate the issue
  • implement monitoring and control capabilities
98
Q

Record count is

A

a total of the # of input documents to a process or the # of records processed in a run

99
Q

The procedure managers use to identify whether the company has info that unauthorized individuals want, how they could obtain the info, the value of the info, and the probability of unauthorized access occurring is

A

Risk Assessment

100
Q

Disaster recovery plan is

A

the process, policies, and procedures of restoring operations critical to the resumption of business

101
Q

An AP clerk is accused of making unauthorized changes to previous payments to a vendor. Proof could be uncovered in

A

the transaction logs

102
Q

A risk of using test library programs in emergency situations is that

A

the programs may not be further tested before being placed in production permanently

103
Q

In a large organization, the biggest risk in not having an adequately staffed information center help desk is

A

persistent errors in user interaction with systems

104
Q

In traditional IS, computer operators are generally responsible for backing up software and data files on a regular basis. In distributed or cooperative systems, ensuring that adequate backups are taken is the responsibility of

A

user management

105
Q

Embedded audit modules enable

A

continuous monitoring of transaction processing

106
Q

An edit of individual transactions in a direct access file processing system usually

A

takes place in an online mode as transactions are entered

107
Q

General controls are

A

applied to all applications processed by the computerized system

108
Q

An example of a general control for a computerized system is

A

restricting access to the computer center by use of biometric devices

109
Q

Application controls are

A

specific to an application and ensure the completeness and accuracy of the records and the validity of the entries made

110
Q

Application controls consist of 3 types:

A
  • input controls
  • processing controls
  • output controls
111
Q

Examples of application controls are

A
  • limiting entry of sales transactions to only valid credit customers
  • creating hash totals from SSN for the weekly payroll
  • restricting entry of AP transaction to only authorized users
112
Q

A national retailer required more detailed data to help stock its stores with the right products and to increase its turnover. Such data amounted to several gigabytes per data from each store. A new high-speed company-wide network was needed to transmit and analyze the data. Management recognized the need to prepare the company for changes resulting from the enhanced network services. For this purpose, the appropriate management action would be to

A

optimize in-house networks to avoid bottlenecks that would limit the benefits offered by the telecommunications provider

113
Q

To mitigate the risk of system development personnel being tempted to make unauthorized changes to the software or system to meet user needs, mgmt should implement

A

change mgmt controls

114
Q

One purpose of an embedded audit module is

A

to enable continuous monitoring of transaction processing

115
Q

Some of the more important controls that relate to automated AIS are validity checks, limit checks, field checks, and sign tests. These are classified as

A

input validation routines

116
Q

A preventive control is one that is designed to discover and eliminate problems before they occur. Examples of preventive controls include:

A
  • access control software
  • hiring well-qualified personnel and training them well
  • segregating EE duties
  • controlling physical access to facilities and info
117
Q

Image processing system have the potential to reduce the volume of paper circulated throughout an organization. To reduce the likelihood of users relying on the wrong images, mgmt should ensure that appropriate controls exist to maintain the

A

integrity of index data

118
Q

The identification of users who have permission to access data elements in a database is found in the

A

database schema

119
Q

Schema is

A

a description of the types of data elements that are in the DB, the relationship among the data elements, and the structure or overall logical model used to organize and describe the data

120
Q

The ________ computer assisted auditing technique allows fictitious and real transactions to be processed together without client operating personnel being aware of the testing process

A

integrated test facility

121
Q

Both _____ and _____ are processing controls designed to ensure the reliability and accuracy of data processing

A

validity checks and limit tests

122
Q

______ authorize and record transaction and correct errors

A

Users

123
Q

Data control group is

A

responsible for logging data inputs, processing, and outputs and makes sure that transactions have been authorized

124
Q

Computer operator is

A

responsible for maintaining and running daily computer operations

125
Q

Security mgmt is

A

responsible for preventing unauthorized physical and logical access to the system

126
Q

The internal control procedures that would prevent an EE from being paid an inappropriate hourly wage is

A

limiting access to EE master files to authorized EEs in the personnel dept

127
Q

When a company authorizes EE access only to data required for accomplishing their jobs, the approach is known as

A

access on a need-to-know basis

128
Q

Individual accountability is

A

individuals with access to data are responsible for the use and security of data obtained via their access privileges

129
Q

Mgmt-by-exception is

A

spending mgmt time on exception conditions vs spending time of things operating as normal

130
Q

To maintain effective segregation of duties within the IT function, an application programmer should have the responsibility of

A

coding approved changes to a payroll system

131
Q

Programmers

A
  • use the design developed by the analysts to develop an IS

- write computer programs

132
Q

Users should have update access for

A

production data

133
Q

Application programmers should not have

A

update or change access for production data or production programs

134
Q

Examples of good internal control in an IT system include

A
  • design and implementation is performed in accordance with mgmt specific authorization
  • provisions exist to ensure the accuracy and integrity of computer processing of all files and reports
  • provisions exist to protect data files from unauthorized access, modification, or destruction
135
Q

In a large firm, custody of an entity’s data is most appropriately maintained by

A

data librarians

136
Q

System analysts

A

design the system

137
Q

Application programmers

A

code the specific application programs

138
Q

Computer operators

A

ensure data is entered and processed and proper output is produced

139
Q

Data librarians

A

control actual data

140
Q

The functions of a database administrator are

A

database design, database operation, and database security

141
Q

An organization’s computer help-desk function is usually a responsibility of the

A

computer operations unit

142
Q

Certain utility software may have privileged access to software and data. Tom compensate for the risk of unauthorized use of privileged software IS mgmt can

A

limit the use of privileged software

143
Q

System analysts

A

analyze info needs and design systems that meet those needs

144
Q

The role of the systems analyst in an IT environment is

A

designing systems, preparing specs for programmers, and serving as an intermediary between users and programmers

145
Q

Long range plans and the direction of app development and computer ops are performed by

A

system administrators

146
Q

The completeness, accuracy, and distribution of input and output is performed by the

A

data control group

147
Q

The selection and maintenance of system software, including operating systems, network software, and the DB mgmt system is performed by

A

database and network managers

148
Q

In the organization of the IS function, the most important segregation of duties is

A

assuring that those responsible for programming the system do not have access to data processing operations

149
Q

Your firm recently converted its purchasing cycle from a manual process to an online computer system. A probably result associated with conversion to the new automated system is

A

that traditional duties are less segregated

150
Q

Conversion to an automated data processing system usually

A
  • reduces processing errors
  • has little to no effect on risk exposure
  • reduces processing time
151
Q

Systems analysts are the personnel within an organization who are responsible for the development of the company’s IS. The least likely function they are to perform is

A

developing, coding, and testing computer programs

152
Q

Systems analysts typically perform the

A
  • design of computer applications
  • prep of specs for computer programming
  • examining user info requirements
153
Q

The system librarian maintains segregation of duties by

A

only accepting properly tested and approved programs into the production library

154
Q

For sound controls over computer program libraries

A

only the program librarian should be allowed to make changes to the production library —-this appropriately restricts access to the program modules that are running

155
Q

Programmers should be restricted from

A

accessing the production library

156
Q

Programmers should be responsible for update access for

A

making program changes

157
Q

Users should be responsible for

A

testing the changes

158
Q

If a computer operator had access to both the production library and source code library then

A

the operator would be in a position to make unauthorized and undetected changes to the computer programs

159
Q

The IT dept responsibilities of ______ and ______ should be delegated to separate individuals

A

data entry and application programming

160
Q

System programmers are normally assigned

A

operating systems and compilers

161
Q

Ryan Company has an AIS that operates in a client/server environment. The least likely situation to provide an appropriate security environment is

A

placing complete systems application controls under one individual

162
Q

In a client/server environment, useful security procedures include

A
  • use of application passwords
  • power-on passwords for personal computers
  • installation of anti-virus programs
163
Q

A systems analyst is least like to perform the function

A

develop and code computer programs

164
Q

A systems analyst would

A
  • analyze the present system
  • prepare computer program specs
  • design computer apps
165
Q

The following is an example of proper segregation of duties within the IT function:

A

a computer operator must request needed files and programs from the data librarian to process transactions

166
Q

Violation of segregation of duties? A programmer is allowed to make minor changes in the current production version of the program that updates customer accounts

A

Yes, violoation

167
Q

Violation of segregation of duties? The IS librarian also fills in as a programmer when projects must be completed quickly

A

Yes, violation

168
Q

Violation of segregation of duties? Systems analysts also work as computer operators when needed

A

Yes, violation

169
Q

A control to incorporate to prevent an EE from making an unauthorized change to computer records unrelated to that EE’s job would be to

A

apply a compatibility test to transactions or inquiries entered by the user

170
Q

At a remote computer center, mgmt installed an automated scheduling system to load data files and execute programs at specific times during the day. The best approach for verifying that the scheduling system performs as intended is to

A

audit job accounting data for file accesses and job initiation/termination messages

171
Q

A problem related to computer-based IS in organizations is that end-users require technical support and assistance in the development of their own computer apps. The best solution to this problem would be

A

information center and help desk

172
Q

The _______ is responsible for making sure that the IS operates efficiently and effectively

A

Systems administrator

173
Q

An Information Security officer should not

A

maintain and update a list of user passwords

174
Q

Appropriate duties of the Information Security Officer include

A
  • developing an info security policy
  • commenting on security controls in new apps
  • monitoring and investigating unsuccessful access attempts
175
Q

The following function should prevent a programmer from altering a program and then using that program in a production run

A

the IS librarian secures production programs and data

176
Q

When a business implements an online gift registry system for customers such as those about to be married, the system should have the following restrictions on access:

A

customers have read privileges and salespeople have update privileges

177
Q

In a large multinational organization, the network administrator should have the responsibility of

A

managing remote access

178
Q

A company planned a major change to its accounting system. The system analyst interviewed users and managers and designed the new system to meet their needs. The analyst then wrote the computer programs to implement the needed modifications. The programs were thoroughly tested by change mgmt based on the criteria of the revised system design. The action that violated segregation of duties was

A

Systems analyst acted as a programmer

179
Q

Fact or Fiction? The system librarian accepting a program into the production library after it had been tested by the programmer is a violation of segregation of duties?

A

Yes, fact

*someone independent should have tested it

180
Q

Managing the IS function is likely to involve

A
  • a system for charging user dept for computer services
  • project development plans
  • responsibility accounting principles
181
Q

The ______ is responsible for ensuring that transactions are processed correctly and that input and output are reconciled

A

data control group

182
Q

The data control group makes sure that:

A
  • a log is kept of all inputs, data processing ops, stored data, and system output
  • source data have been properly approved
  • transactions are processed correctly
  • input and output are reconciled
  • records of input errors are maintained so they can be corrected and resubmitted
  • data-related errors are sent to the users who originated the transaction for correction
  • system output is distributed to the intended and proper user
  • there is adequate rotation of operator duties
183
Q

The database control that would be most effective in maintaining a segregation of duties appropriate to the users’ reporting structure within an org is

A

access security features

184
Q

An EDP control used to assure that paychecks were written for all EE for a pay period would be the use of

A

hash totals on EE SSN

185
Q

Adle Supply Company recently installed an integrated order-entry and invoicing system. The basic inputs to the system consist of one record for each line on the customers’ orders, the inventory master file, and the customer master file. Individual items ordered by the customer may be rejected at the computer entry audit or when the items are validated by comparing them with data in the inventory master file. Complete orders may be rejected when data from the orders are compared with data in the customer master file. All orders that are found to be valid are posted to the inventory and customer files. For data control personnel to account for all inventory items and customer orders processed, the system should include:

A

run-to-run control totals and error lists

186
Q

A control procedure that could be used in an online system to provide an immediate check on whether an account number has been entered on a terminal accurately is

A

self-checking digit

187
Q

When evaluating internal control of an entity that processes sales transactions on the internet, an auditor would be most concerned about the

A

potential for computer disruptions in recording sales

188
Q

Compared to batch processing, real-time processing has the advantage of

A

timeliness of info

189
Q

An input clerk enters an EE number and the computer responds with the message “EE # is not assigned to an active EE. Please reenter.” The technique being used is

A

existence check

190
Q

Range checking

A

reduces the risk of reprocessing ledger transactions of an earlier month by checking a number in a transaction (such as a date) to determine whether that number falls within a specified range

191
Q

In reviewing data in excel a brand manager suspected that several days of POS data from one grocery chain was missing. The best approach for detecting missing rows in the data would be to

A

compare product id codes by store for consecutive periods

192
Q

An update program for bank account balances calculates check digits for account numbers. This is an example of

A

an input control

193
Q

An online database mgmt system for sales and receivables was recently expanded to include credit approval transactions. An evaluation of controls was not performed prior to implementation. To prevent unauthorized access to specific data elements, the database mgmt system should contain

A

password specs for each data file or element

194
Q

Preventative controls generally are _____ important than detective controls in EDI systems

A

more

195
Q

COBIT stands for

A

Control Objs for Information and Related Technology

196
Q

COBIT applies to

A

information technology

197
Q

Edit checks in a computerized accounting system

A

should be performed on transactions prior to updating a master file

198
Q

Using standard procedures developed by information center personnel, staff members download specific subsets of financial and operating data as they need it. The staff members analyze the data on their own personal computers (PCs) and share results with each other. Over time, the staff members learn to modify the standard procedures to get subsets of financial and operating data that were not accessible through the original procedures. The greatest risk associated with this situation is that:

A

the data obtained might be incomplete or lack currency

199
Q

A customer order was never filled due to transposition error. The _______ control would most likely have detected the transposition

A

validity check

200
Q

The linked list form of file organization is characterized by

A

pointer field

201
Q

Examine ________ to determine if an IS is operating according to prescribed procedures

A

system control

202
Q

Online access controls are critical for the successful operation of today’s computer systems. To assist in maintaining control over such access, many systems use tests that are maintained through an internet access control matrix which consists of:

A

authorized user code #, passwords, lists of all files and programs, and a record of the type of access each user is entitled to have for each file and program

203
Q

The situation that would most likely provide the best way to secure data integrity for a personal computer environment is

A

all computers linked to a LAN

204
Q

An organization relied heavily on e-commerce for its transactions. Evidence of the organization’s security awareness manual would be an example of

A

preventive controls

205
Q

The input control to prevent an incorrect state abbreviation from being accepted as legitimate data is

A

validity check

206
Q

A digital signature is used primarily to determine that a message is

A

unaltered in transmission

207
Q

A validation check used to determine if a quantity ordered field contains only numbers is an example of

A

an input control

208
Q

In order to assure the accuracy of computerized output, it is necessary to have controls related to

A

input, processing/storage, and output

209
Q

EDP accounting control procedures are referred to as general controls or application controls. The primary objective of application controls in a computer environment is to

A

maintain the accuracy of the input, files, and outputs for specific applications

210
Q

A company’s labor distribution report requires extensive corrections each month because of labor hours charged to inactive jobs. The data processing input control that appears to be missing is

A

a validity test

211
Q

To ensure the completeness of update in an online system, separate totals are accumulated for all transactions processed throughout the day. The computer then agrees these totals to the total of items accepted for processing. This is an example of

A

run-to-run controls

212
Q

The most important control objective in the audit of an online order entry system that maintains information critical to mgmt decisions is

A

data integrity

213
Q

The EDP control used to assure that hours an individual worked in one week do not exceed a designated maximum is

A

a limit check

214
Q

EE numbers have all numeric characters. To prevent the input of alphabetic characters, the technique to use is

A

a field check

215
Q

Erroneous mgmt decisions might be the result of incomplete information. The best control to detect a failure to process all valid transactions is

A

user review of selected output and transactions rejected by edit checks

216
Q

To avoid invalid data input, a bank added an extra number at the end of each account number and subjected the new number to an algorithm. This techniques is known as

A

a check digit

217
Q

An example of how specific internal controls in a database environment may differ from controls in a nondatabase environment is

A

controls should exist to ensure that users have access to and can update only the data elements that they have been authorized to access

218
Q

Data input validation routines include

A

hash totals

219
Q

To ensure the completeness of a file update, the user department retains copies of all unnumbered documents submitted for processing and checks these off individually against a report of transactions processed. This is an example of the use of

A

one-for-one checking

220
Q

In an automated payroll processing environment, a department manager substituted the time card for a terminated EE with a time card for a fictitious EE. The fictitious EE had the same pay rate and hours worked as the terminated EE. The best control technique to detect this action using EE id number would be

A

hash total

221
Q

A retail entity uses EDI in executing and recording most of its purchase transactions. The entity’s auditor recognizes that the documentation of the transactions will be retained for only a short period of time. To compensate for this limitation, the auditor most likely would

A

perform tests several times during the year, rather than only at year end

222
Q

In order to prevent, detect, and correct errors and unauthorized tampering, a payroll system should have adequate controls. The best set of controls for a payroll system includes

A

batch and hash total, record counts of each run, proper separation of duties, passwords and user codes, and backup of activity and master files

223
Q

A new AR clerk, working for a wholesaler, noticed that a customer had apparently changed addresses. The clerk had accessed the customer’s computer file and revised all addresses. One week later the customer complained that goods were being sent to the wrong address. The primary control to prevent this occurrence is

A

database security

224
Q

An access control matrix consists of

A
  • a list of all authorized user code numbers and passwords
  • a list of all files and programs maintained on the system
  • a record of the type of access to which each user is entitled
225
Q

The most effective computerized control procedure to ensure data uploaded from a PC to a mainframe are complete and that no additional data are added is

A

batch control totals, including control totals and hash totals

226
Q

Program documentation is a control designed primarily to ensure that

A

programs are kept up to data and perform as intended

227
Q

A control activity to take to reduce the risk of incorrect processing in a newly installed computerized accounting system is to

A

independently verify the transactions

228
Q

A bank wants to reject erroneous checking account numbers to avoid invalid input. The auditors recommended adding another number at the end of the account numbers. The computer would subject the other numbers to an algorithm and compare it to the extra number. This technique recommended by the auditors is

A

check digit