Professional Documents
Culture Documents
05 - Part 3 - Processing Integrity and Availability Control
05 - Part 3 - Processing Integrity and Availability Control
processing integrity.
1) The best example of an effective payroll transaction file hash total would most likely be
A) sum of net pay.
B) total number of employees.
C) sum of hours worked.
D) total of employees' social security numbers.
2) The best example of an effective payroll transaction file financial total would most likely
be
A) sum of net pay.
B) total number of employees.
C) sum of hours worked.
D) total of employees' social security numbers.
3) The best example of an effective payroll transaction file record count would most likely be
A) sum of net pay.
B) total number of employees.
C) sum of FICA.
D) total of employees' social security numbers.
5) Following is the result of batch control totals on employee Social Security numbers in a
payroll processing transaction:
The difference in the control totals is 720,000. Which data entry control would best prevent
similar data entry errors in the future?
A) Batch check.
B) Validity check.
C) Check digit.
D) Sequence check.
6)
Overtime
Employee Name Hours
Mary Jones 10
Tom Davis -5
Amy Dunn 3
Kate Smith 2
Kevin White -4
Jill Brown 800
The total overtime hours is 806. Which data entry control would best prevent similar data
entry errors in the future?
A) Sequence check.
B) Validity check.
C) Check digit.
D) Reasonableness test.
8) A customer forgets to include her account number on her check, and the accounts
receivable clerk credited her payment to a different customer with the same last name. Which
control could have been used to most effectively to prevent this error?
A) Closed-loop verification.
B) Duplicate values check.
C) Reasonableness test.
D) Reconciliation of a batch control total.
10) ________ is a data entry input control that involves summing the first four digits of a
customer number to calculate the value of the fifth digit, then comparing the calculated
number to the number entered during data entry.
A) Validity check
B) Duplicate data check
C) Closed-loop verification
D) Check digit verification
11) ________ is a data entry input control that involves checking the accuracy of input data
by using it to retrieve and display other related information.
A) Validity check
B) Duplicate data check
C) Closed-loop verification
D) Check digit verification
12) ________ is a data entry input control that requests each input data item and waits for an
acceptable response, ensures that all necessary data are entered.
A) Prompting
B) Duplicate data check
C) Closed-loop verification
D) Check digit verification
13) All of the following controls for online entry of a sales order would be useful except
A) check digit verification on the dollar amount of the order.
B) validity check on the inventory item numbers.
C) field check on the customer ID and dollar amount of the order.
D) concurrent update control.
14) The inventory tracking system shows that 12 laptops were on hand before a customer
brings two laptops to the register for purchase. The cashier accidentally enters the quantity
sold as 20 instead of 2. Which data entry control would most effectively prevent this error?
A) Limit check.
B) Sign check.
C) Field check.
D) Validity check.
16) The data entry control that would best prevent entering an invoice received from a vendor
who is not on an authorized supplier list is
A) a validity check.
B) an authorization check.
C) a check digit.
D) closed-loop verification.
28) A ________ ensures input data will fit into the assigned field.
A) limit check
B) size check
C) range check
D) field check
35) The batch processing data entry control that sums a field that contains dollar values is
called
A) record count.
B) financial total.
C) hash total.
D) sequence check.
37) When the staff accountant enters a correct customer number, the data entry screen
displays the customer name and address. This is an example of
A) prompting.
B) preformatting.
C) closed-loop verification.
D) error checking.
2 Identify and explain controls designed to ensure systems availability by minimizing the risk of
system downtime and enabling efficient recovery and resumption of operations.
6) A facility that is pre-wired for necessary telecommunications and computer equipment, but
doesn't have equipment installed, is known as a
A) cold site.
B) hot site.
C) remote site.
D) subsidiary location
7) When a computer system's files are automatically duplicated on a second data storage
system as they are changed, the process is referred to as
A) real-time mirroring.
B) batch updating.
C) consistency control.
D) double-secure storage
9) ________ is a plan that specifies how to resume not only IT operations but all business
processes in the event of a major calamity.
A) Disaster recovery plan
B) Business continuity plan
C) Real-time monitoring plan
D) Business contingency plan
10) A copy of a database, master file, or software that will be retained indefinitely as a
historical record is known as a(n)
A) archive.
B) cloud computing.
C) differential backup.
D) incremental backup.
11) While this type of backup process takes longer than the alternative, restoration is easier
and faster.
A) archive
B) cloud computing
C) differential backup
D) incremental backup
12) ________ involves copying only the data items that have changed since the last partial
backup.
A) Archive
B) Cloud computing
C) Differential backup
D) Incremental backup
13) ________ copies all changes made since the last full backup.
A) Archive
B) Cloud computing
C) Differential backup
D) Incremental backup
15) The maximum acceptable down time after a computer system failure is determined by a
company's
A) recovery time objective.
B) recovery point objective.
C) recovery objective.
D) maximum time recovery objective.