Professional Documents
Culture Documents
Directions: Read and answer the following questions carefully. Write your answers on a yellow sheet of
paper. Use capital letters and BLACK BALLPEN only. GOOD LUCK and GOD BLESS!
1. Magnetic tape drives have the advantage of direct access to stored data.
2. The operating system is an example of system software.
3. For good internal control, programmers should not be given access to complete program documentation for
the programs they work on.
4. Data encryption is an example of data transmission control.
5. Internal file labels are designed to prevent errors by programmers.
6. For auxiliary storage when the computer is operating, personal computers use hard disk drives.
7. Distributive data processing eliminates the need for data security.
8. Most advanced computer systems do not have audit trails.
9. Auditors usually begin their consideration of IT systems with tests of application controls.
10. Generalized audit software may be used for substantive tests or for tests of controls.
MULTIPLE CHOICE QUESTIONS: Select the best answer for the following questions. Write your answers in
CAPITAL LETTERS only.
11. Which of the following procedures would an entity most likely include in its disaster recovery plan?
A. Convert all data from external formats to an internal company format.
B. Maintain a program to prevent illegal activity.
C. Develop an auxiliary power supply to provide uninterrupted electricity.
D. Store duplicate copies of files in a location away from the computer center.
Page 1 of 4
INTERNATIONAL SCHOOL OF ASIA AND THE PACIFIC
Alimannao Hills, Peñablanca, Cagayan 3502 Philippines
Telefax No: (+63) (078) 304-1010
Website: www.isap.edu.ph E-Mail Address: adminoffice@isap.edu.ph
15. Which of the following is least likely to be a general control over computer activities?
A. Procedures for developing new programs and systems.
B. Requirements for system documentation.
C. A change request log.
D. A control total.
16. Which of the following computer related employees should not be allowed access to program listings of
application programs?
A. The systems analyst.
B. The programmer.
C. The operator.
D. The librarian.
18. Which of the following is most likely to include user group development and execution of certain computer
applications?
A. Telecommunication transmission systems.
B. Database administration.
C. End user computing.
D. Electronic data interchange systems.
Page 2 of 4
INTERNATIONAL SCHOOL OF ASIA AND THE PACIFIC
Alimannao Hills, Peñablanca, Cagayan 3502 Philippines
Telefax No: (+63) (078) 304-1010
Website: www.isap.edu.ph E-Mail Address: adminoffice@isap.edu.ph
23. Which of the following would be least likely to be considered a desirable attribute of a database
management system?
A. Data redundancy.
B. Quick response to users' request for information.
C. Control of users' identification numbers and passwords.
D. Logging of terminal activity.
25. Which of the following testing techniques is more commonly used by internal auditors than by independent
auditors?
A. Integrated test facilities.
B. Test data.
C. Controlled programs.
D. Tagging and tracing transactions.
27. When conducting field work for a physical inventory, an auditor cannot perform which of the following
steps using a generalized audit software package?
A. Observing inventory.
B. Selecting sample items of inventory.
C. Analyzing data resulting from inventory.
D. Recalculating balances in inventory reports.
28. Which of the following personnel is responsible for determining the computer processing needs of the
various users?
A. The application programmer.
B. The computer operator.
C. The systems analyst.
D. The systems programmer
29. Which of the following testing techniques minimizes the possibility that the auditors will contaminate a
client's financial records?
A. Test data.
B. Integrated test facilities.
C. Controlled programs.
D. Tagging and tracing transactions
Page 3 of 4
INTERNATIONAL SCHOOL OF ASIA AND THE PACIFIC
Alimannao Hills, Peñablanca, Cagayan 3502 Philippines
Telefax No: (+63) (078) 304-1010
Website: www.isap.edu.ph E-Mail Address: adminoffice@isap.edu.ph
“Do not be anxious about anything, but in everything by prayer and supplication with thanksgiving let your
requests be made known to God. And the peace of God, which surpasses all understanding, will guard your
hearts and your minds in Christ Jesus.”
(Philippians 4:6-7)
~End of Examination~
Page 4 of 4