Professional Documents
Culture Documents
MULTIPLE CHOICE:
ANSWER: A
ANSWER: D
3. Unauthorized alteration of on-line records can be prevented by
employing:
ANSWER: D
ANSWER: C
ANSWER: A
ANSWER: B
b. They can be used for audits of clients that use differing CBIS
equipment and file formats. c. They have reduced the need for the
auditor to study input controls for CBIS related procedures. d. Their
use can be substituted for a relatively large part of the required
control testing.
ANSWER: B
ANSWER: D
ANSWER: C
a. Back-up files
b. Check digits
c. Completeness tests
d. Conversion verification.
ANSWER: A
ANSWER: B
ANSWER: C
13. The increased presence of the microcomputer in the workplace
has resulted in an increasing number of persons having access to
the computer. A control that is often used to prevent unauthorized
access to sensitive programs is:
ANSWER: B
ANSWER: B
ANSWER: C
ANSWER: A
ANSWER: D
19. What type of computer-based system is characterized by data
that are assembled from more than one location and records
that are updated immediately?
ANSWER: D
ANSWER: C
ANSWER: A
ANSWER: D
ANSWER: C
ANSWER: C
ANSWER: A
ANSWER: D
ANSWER: B
ANSWER: B
ANSWER: D
ANSWER: B
ANSWER: A
32. An accounts payable program posted a payable to a vendor not
included in the on-line vendor master file. A control which would
prevent this error is a
ANSWER: A
ANSWER: B