You are on page 1of 6

1 Identify and explain the input, processing, and output controls designed to ensure

processing integrity.

1) The best example of an effective payroll transaction file hash total would most likely be
A) sum of net pay.
B) total number of employees.
C) sum of hours worked.
D) total of employees' social security numbers.

2) The best example of an effective payroll transaction file financial total would most likely
be
A) sum of net pay.
B) total number of employees.
C) sum of hours worked.
D) total of employees' social security numbers.

3) The best example of an effective payroll transaction file record count would most likely be
A) sum of net pay.
B) total number of employees.
C) sum of FICA.
D) total of employees' social security numbers.

5) Following is the result of batch control totals on employee Social Security numbers in a
payroll processing transaction:

Correct Values From Values Entered During


Masterfile Processing
487358796 487358796
534916487 534916487
498374526 498374526
514873420 514873420
534196487 534916487
678487853 678487853
471230589 471230589
3719438158 3720158158

The difference in the control totals is 720,000. Which data entry control would best prevent
similar data entry errors in the future?
A) Batch check.
B) Validity check.
C) Check digit.
D) Sequence check.

6)
Overtime
Employee Name Hours
Mary Jones 10
Tom Davis -5
Amy Dunn 3
Kate Smith 2
Kevin White -4
Jill Brown 800

The total overtime hours is 806. Which data entry control would best prevent similar data
entry errors in the future?
A) Sequence check.
B) Validity check.
C) Check digit.
D) Reasonableness test.

8) A customer forgets to include her account number on her check, and the accounts
receivable clerk credited her payment to a different customer with the same last name. Which
control could have been used to most effectively to prevent this error?
A) Closed-loop verification.
B) Duplicate values check.
C) Reasonableness test.
D) Reconciliation of a batch control total.

10) ________ is a data entry input control that involves summing the first four digits of a
customer number to calculate the value of the fifth digit, then comparing the calculated
number to the number entered during data entry.
A) Validity check
B) Duplicate data check
C) Closed-loop verification
D) Check digit verification

11) ________ is a data entry input control that involves checking the accuracy of input data
by using it to retrieve and display other related information.
A) Validity check
B) Duplicate data check
C) Closed-loop verification
D) Check digit verification

12) ________ is a data entry input control that requests each input data item and waits for an
acceptable response, ensures that all necessary data are entered.
A) Prompting
B) Duplicate data check
C) Closed-loop verification
D) Check digit verification

13) All of the following controls for online entry of a sales order would be useful except
A) check digit verification on the dollar amount of the order.
B) validity check on the inventory item numbers.
C) field check on the customer ID and dollar amount of the order.
D) concurrent update control.

14) The inventory tracking system shows that 12 laptops were on hand before a customer
brings two laptops to the register for purchase. The cashier accidentally enters the quantity
sold as 20 instead of 2. Which data entry control would most effectively prevent this error?
A) Limit check.
B) Sign check.
C) Field check.
D) Validity check.

16) The data entry control that would best prevent entering an invoice received from a vendor
who is not on an authorized supplier list is
A) a validity check.
B) an authorization check.
C) a check digit.
D) closed-loop verification.

18) Cancellation and storage of documents is one example of a(n)


A) output control.
B) processing control.
C) input control.
D) data entry control.

19) Sequentially prenumbered forms are an example of a(n)


A) data entry control.
B) data transmission control.
C) processing control.
D) input control.

21) A validity check is an example of


A) a data entry control.
B) an output control.
C) a data transmission control.
D) an input control.

22) Checksums is an example of a(n)


A) data entry control.
B) data transmission control.
C) output control.
D) processing control.

23) Reconciliation procedures is an example of


A) a data entry control.
B) a data transmission control.
C) an output control.
D) a processing control.

24) Data matching is an example of a(n)


A) data entry control.
B) data transmission control.
C) processing control.
D) input control.

28) A ________ ensures input data will fit into the assigned field.
A) limit check
B) size check
C) range check
D) field check

35) The batch processing data entry control that sums a field that contains dollar values is
called
A) record count.
B) financial total.
C) hash total.
D) sequence check.

37) When the staff accountant enters a correct customer number, the data entry screen
displays the customer name and address. This is an example of
A) prompting.
B) preformatting.
C) closed-loop verification.
D) error checking.

2 Identify and explain controls designed to ensure systems availability by minimizing the risk of
system downtime and enabling efficient recovery and resumption of operations.

1) What is the most effective way to ensure information system availability?


A) High bandwidth.
B) Maintain a hot site.
C) Maintain a cold site.
D) Frequent backups.

2) Which of the following statements is true with regards to system availability?


A) Human error does not threaten system availability.
B) Threats to system availability can be completely eliminated.
C) Proper controls can maximize the risk of threats causing significant system downtime.
D) Threats to system availability include hardware and software failures as well as natural
and man-made disasters.
5) A facility that contains all the computing equipment the organization needs to perform its
essential business activities is known as a
A) cold site.
B) hot site.
C) remote site.
D) subsidiary location.

6) A facility that is pre-wired for necessary telecommunications and computer equipment, but
doesn't have equipment installed, is known as a
A) cold site.
B) hot site.
C) remote site.
D) subsidiary location

7) When a computer system's files are automatically duplicated on a second data storage
system as they are changed, the process is referred to as
A) real-time mirroring.
B) batch updating.
C) consistency control.
D) double-secure storage

8) ________ enables a system to continue functioning in the event that a particular


component fails.
A) An incremental backup procedure
B) Fault tolerance
C) Preventive maintenance
D) A deduplication backup procedure

9) ________ is a plan that specifies how to resume not only IT operations but all business
processes in the event of a major calamity.
A) Disaster recovery plan
B) Business continuity plan
C) Real-time monitoring plan
D) Business contingency plan

10) A copy of a database, master file, or software that will be retained indefinitely as a
historical record is known as a(n)
A) archive.
B) cloud computing.
C) differential backup.
D) incremental backup.

11) While this type of backup process takes longer than the alternative, restoration is easier
and faster.
A) archive
B) cloud computing
C) differential backup
D) incremental backup
12) ________ involves copying only the data items that have changed since the last partial
backup.
A) Archive
B) Cloud computing
C) Differential backup
D) Incremental backup

13) ________ copies all changes made since the last full backup.
A) Archive
B) Cloud computing
C) Differential backup
D) Incremental backup

14) The maximum amount of time between backups is determined by a company's


A) recovery time objective.
B) recovery point objective.
C) recovery objective.

15) The maximum acceptable down time after a computer system failure is determined by a
company's
A) recovery time objective.
B) recovery point objective.
C) recovery objective.
D) maximum time recovery objective.

You might also like