Multiple Choice Questions:
1. CIS has several significant effects on an organization. Which of the following would not be important from an auditing perspective<
a. organizational changes c. the potential for material misstatement
b, the visibility of information d. none of the above; i.e. they are all important
2. An important characteristic of CIS is uniformity of processing. Therefore, a risk exists that:
a. Auditors will not be able to access data quickly.
b. Auditors will not be able to determine if data is processed consistently.
c. Erroneous processing can result in the accumulation of a great number of misstatements in a short period Which of time.
d. All of the above
3. Which of the following is not a risk specific to CIS environment ?
a. reliance on the functioning capabilities of hardware and software.
b. increased human involvement
c. loss of data due to insufficient backup
d. unauthorized access
4. Which of the following is not a risk specific to CIS environment?
a. reliance on the functioning capabilities of hardware and software
b. increased human involvement
c. loss of data due to insufficient backup
d. unauthorized access
5. Which of the following is not a risk in a computerized information system (CIS)
a. need for CIS experienced staff
b. separation of CIS duties from accounting functions
c. improved audit trail
d. hardware and data vulnerability
6. The use of CIS will least likely affect the
a. The procedures followed by the auditor in obtaining a sufficient understanding of the accounting and
internal
b. The auditor's specific audit objectives.
c. The consideration of inherent risk and control risk through which the auditor arrives at the risk
assessment.
d. The auditor's design and performance of tests of control and substantive procedures appropriate to
meet the audit objective.
7. Which of the following is unique to CIS?
a. error listing
b. flowchart
c, questionnaires
d. pre-numbered documents
8. Which of the following is a component of general controls?
a. processing controls
b. output controls
c. back-up and contingency planning
d. input controls
9. Which of the following is correct?
a. Auditors should evaluate application controls before evaluating general controls
b. Auditors should evaluate application controls and general controls simultaneously.
c. Auditors should evaluate general controls before evaluating application controls.
d. None of these statements is correct.
10. Which of the following is least likely to be a general control over computer activities?
a. Procedures for developing new programs and systems
b. Requirements for system documentation
c. An access control
d. A control total
Required: choose the correct answer and Justify your answers in at least 6 sentences.
Trending nowThis is a popular solution!
Step by stepSolved in 4 steps
- Afer executing our data through PostgreSQL we will get: Select one: a. Output b. Information c. Metadata d. Instructionsarrow_forwardWhy abstract is considered as an important aspect of esearch report? Elaborate the key contents of an abstract with suitable examplearrow_forwardIn most reported fraud cases, fraudsters exhibit one or more behavioral red flags. Which of the following is NOT one of these behavioral red flags? OA financial difficulties B. unusually close associations with vendors OC. living within one's means O D. unusually close associations with customersarrow_forward
- = Which of the following is a process in which analysts sift through Big Data to identify unique patterns of behavior among different customer groups? OA. Data mining OB. Web scraping OC. Channel partner modeling D. Sentiment analysis mining OE. Scanner data modelingarrow_forwardis an organized collection of data. O a. Data type Ob. Record Oc. Field Od. Databasearrow_forward_48-involves the examination of the entire population of items that is made up a class of transactions or account balances O a. Selecting specific items O b. Audit sampling method O c. Application of combination of different methods O d. 100% Examination itemsarrow_forward
- 25- ‘Currency up to date’ relates to which among the following information attributes? a. Form related attribute b. None of the options c. Time related attribute d. Content related attributearrow_forwardff2arrow_forwardThis piece will differentiate between the two types of data flow charts and explain their uses. How come MetaData is crucial for data warehousing operations if it's not really needed?arrow_forward
- 1. When a company's OM strategy is having critical issues such as product design and development, their product's life is at which stage? a. Maturity b. Introduction c. Decline d. Growth 2. Which of the following is a principle of total quality management (TQM)? a. quality problems are solved using trial and error b. quality is defined by the company c. quality is an only an operational issue requiring an operating plan d. quality is a strategic issue requiring a strategic planarrow_forwardThe Determine Budget process includes the following tools and techniques except ________ Group of answer choices Expert judgment Data analysis (reserve analysis) Data analysis (cost of quality) Financingarrow_forward3. The descriptive data are generally... data a. Spatially b. non-spatially c. spatial and non-spatialarrow_forward
- Practical Management ScienceOperations ManagementISBN:9781337406659Author:WINSTON, Wayne L.Publisher:Cengage,Operations ManagementOperations ManagementISBN:9781259667473Author:William J StevensonPublisher:McGraw-Hill EducationOperations and Supply Chain Management (Mcgraw-hi...Operations ManagementISBN:9781259666100Author:F. Robert Jacobs, Richard B ChasePublisher:McGraw-Hill Education
- Purchasing and Supply Chain ManagementOperations ManagementISBN:9781285869681Author:Robert M. Monczka, Robert B. Handfield, Larry C. Giunipero, James L. PattersonPublisher:Cengage LearningProduction and Operations Analysis, Seventh Editi...Operations ManagementISBN:9781478623069Author:Steven Nahmias, Tava Lennon OlsenPublisher:Waveland Press, Inc.