The-computer-environment.docx

  • Uploaded by: Nez Alban
  • 0
  • 0
  • April 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View The-computer-environment.docx as PDF for free.

More details

  • Words: 3,199
  • Pages: 10
THE COMPUTER ENVIRONMENT 1. In an electronic data processing system, automated equipment controls or hardware controls are designed to a. arrange data in a logical sequential manner for processing purposes. b. correct errors in the computer programs. c. monitor and detect errors in source documents. d. detect and control errors arising from use of equipment. 2. Which of the following characteristics distinguishes computer processing from manual processing? a. Computer processing virtually eliminates the occurrence of computational error normally associated with manual processing. b. Errors or fraud in computer processing will be detected soon after their occurrences. c. The potential for systematic error is ordinarily greater in manual processing than in computerized processing d. Most computer systems are designed so that transaction trails useful for audit purposes do not exist. 3. What is the computer process call when data processing is performed concurrently with a particular activity and the results are available soon enough to influence the particular course of actions being taken or the decision being made? a. Real time processing. c. Batch processing. b. Random access processing. d. Integrated data processing. 4. Which of the following statements is false? In data processing, a. Data refers to facts which have been organized in a meaningful manner. b. The sources of data are within the firm and outside the firm. c. Data processing refers to the operations needed to collect and transform data into useful information. d. Mechanical data processing is a system in which the operations are performed with the assistance of major mechanical devices. 5. The grandfather-father-son approach providing protection for important computer files is a concept that is most often found in a. on-line, real-time systems. c. magnetic tape systems. b. punched-card systems. d. magnetic drum systems. 6. Which of the following employees in a company’s electronic data processing department should be responsible for designing new or improved data processing procedures? a. Flowchart editor. b. Programmer. c. Systems analyst. d. Control-group supervisor.

7. An electronic data processing technique which collects data into groups to permit convenient and efficient processing is known as a. Document-count processing. b. Multi-programming. c. Batch processing. d. Generalized-audit processing. 8. A fundamental purpose of a data base management system is to a. store all data for an organization in multiple files. b. reduce data redundancy. c. use physical data organization concepts instead of logical data organization concepts. d. change the manner in which application programs access individual data elements. 9. A partial set of standard characteristics of a real-time system is a. batched input, on-line files, and an extensive communication network. b. reliance upon sequential files, prompt input form users, and interactive programs. c. on-line files, prompt input form users, and an extensive communication network. d. the use of high-level language and the major need being for historical reports. 10. All activity related to a particular application in a manual system is recorded in a journal. The name of the corresponding item in a computerized system is a a. master file. b. year-to-date file c. transaction file. d. current balance file. 11. Which of the following is not a major reason for maintaining an audit trail for a computer system? a. Deterrent to fraud. b. Monitoring purposes. c. Analytical procedures. d. Current balance file. 12. An auditor would most likely be concerned with which of the following controls in a distributed data processing system? a. Hardware controls. b. Systems documentation controls. c. Access controls. d. Disaster recovery controls. 13. Which one of the following is not considered a typical risk associated with outsourcing (the practice of hiring an outside company to handle all or part of the data processing): a. Inflexibility. b. Loss of control. c. Loss of confidentiality. d. Less availability of expertise.

14. The initial debugging of a computer of a computer program should normally be done by the a. Programmer b. Internal auditor. c. Machine operator. d. Control group. 15. Which of the following is not one of the main components of a computer? a. Processing unit b. Storage (memory unit ) c. Arithmetic unit d. Verifier 16. The normal sequence of documents and operations on a well-prepared systems flowchart is a. Top to bottom and left to right. b. Bottom to top and left to right. c. Top to bottom and right to left. d. Bottom to top and right to left. 17. The purpose of using generalized computer programs is to test and analyze a client’s computer a. Systems. b. Equipment c. Records. d. Processing logic. 18. The computer system most likely to be used by a large savings bank for customers’ accounts would be a. an on-line, real time system. b. a batch processing system. c. a generalized utility system. d. a direct access data base system. 19. Which of the following lists comprises of the components of the data processing cycle? a. Batching, processing, output. b. Collection, refinement, processing, maintenance, output. c. Input, classifying, batching, verification, transmission. d. Collection, refinement, storing, output. 20. Which of the following is not a characteristic of a batch processed computer system? a. The collection of like transactions, which are stored and processed sequentially against a master file. b. Keypunching of transactions, followed by machine processing. c. The production of numerous printouts. d. The posting of a transaction, as it occurs, to several files, without intermediate printouts.

21. Which of the following employees normally would be assigned the operating responsibility for designing a computerized accounting system, including documentation of application systems? a. Computer programmer. b. Data processing manager. c. Systems analyst. d. Internal auditor. 22. A procedural control used in the management of a computer center in minimizing the possibility of data or program file destruction through operator error includes. a. control figures b. crossfooting tests c. limit checks d. external labels 23. Totals of amounts in computer-record data fields which are not usually added but are used only for data processing control purposes are called a. record totals. b. hash totals. c. processing data totals. d. field totals. 24. In updating a computerized accounts receivable file, which one of the following would be used as a batch control to verify the accuracy of the posting of cash receipts remittances? a. The sum of the cash deposits plus the discounts less the sales returns. b. The sum of the cash deposits. c. The sum of the cash deposits less the discounts taken by customers. d. The sum of the cash deposits plus the discounts taken by customers. 25. The client’s computerized exception reporting system helps an auditor to conduct a more efficient audit because it a. condenses data significantly b. highlights abnormal conditions c. decreases the tests of computer controls requirements d. is efficient computer input control 26. Auditors often make use of computer programs that perform routine processing functions such as sorting and merging. These programs are made available by software companies and are specifically referred to as a. compiler programs. b. supervisory programs. c. utility programs. d. user programs. 27. In the weekly computer run to prepare payroll checks, a check was printed for an employee who had been terminated the previous week. Which of the following controls, if properly

utilized, would have been most effective in preventing the error or ensuring its prompt detection? a. A control total for hours worked, prepared from time collected by the timekeeping department. b. Requiring the treasurer’s office to account for the numbers of the prenumberd checks issued to the computer department for the processing of the payroll. c. Use of the check digit for employee numbers. d. Use of a header label for the payroll input sheet. 28. Which of the following would lessen internal control in a computer system? a. The computer librarian maintains custody of computer program instructions and detailed listings. b. Computer operators have access to operator instructions and detailed program listings. c. The control group is solely responsible for the distribution of all computer output. d. Computer programmers write and debug programs that perform routines designed by the systems analyst. 29. Which of the following computer documentation would an auditor most likely utilize in obtaining an understanding of the internal control system? a. Systems flowcharts. b. Record counts. c. Program listings. d. Record layouts. 30. To obtain evidential matter about control risk, an auditor ordinarily selects tests from a variety of techniques, including a. analysis. b. confirmations. c. reprocessing. d. comparison. 31. An EDP input control is designed to ensure that a. machine processing is accurate. b. only authorized personnel have access to the computer area. c. data received for processing are properly authorized and converted to machine-readable form. d. electronic data processing has been performed as intended for the particular application. 32. Internal control is ineffective when computer department personnel a. participate in computer software acquisition decisions. b. design documentation for computerized systems. c. originate changes in master files. d. provide physical security for program files. 33. Which of the following most likely represents a weakness in the financial controls of an EDP system?

a. The systems analyst reviews output and control the distribution of output from the EDP department. b. The accounts payable clerk prepares data for computer processing and enters the data into the computer. c. The systems programmer designs the operating and control functions of programs and participates in testing operating systems. d. The control clerk establishes control over data received by the EDP department and reconciles control totals after processing. 34. When EDP programs or files can be accessed from terminals, users should be required to enter a(n) a. Parity check. b. Personal identification code. c. Self-diagnosis test. d. Echo check. 35. The possibility of erasing a large amount of information stored on magnetic tape most likely would be reduced by the use of a. file protection rings. b. check digits. c. completeness tests. d. conversion verification. 36. When an accounting application is processed by computer, an auditor cannot verify the reliable operation of programmed control procedures by a. Manually comparing the details of transaction files used by an edit program to the program’s generated error listings in order to determine that error were properly identified by the edit program. b. Constructing a processing system for accounting applications and processing actual data throughout the period through both the client’s program and the auditor’s program. c. Manually reperforming, as at a given point in time, the processing of input data and comparing the simulated results to the actual results. d. Periodically submitting auditor-prepared test data to the same computer process and evaluating the results. 37. An auditor who is testing EDP controls in a payroll systems would most likely use test data that contained conditions such as a. deductions not authorized by employees. b. overtime not approved by supervisors. c. time tickets with invalid job numbers. d. payroll checks with unauthorized signatures. 38. To obtain evidence that user identification and password controls are functioning as designed, an auditor would most likely a. attempt to sign on to the system using invalid user identifications and passwords. b. write a computer program that simulated the logic of the client’s access control software.

c. extract a random sample of processed transactions and ensure that the transactions were appropriately authorized. d. examine statements signed by employees stating that they had not divulged their user identifications and passwords to any other person. 39. When erroneous data are detected by computer program controls, the data may be excluded from processing and printed on an error report. The error report should be reviewed and followed up by the a. Computer operator. b. Systems analyst. c. EDP control group. d. Computer programmer. 40. Errors in data processed in a batch computer system may not be detected immediately because a. transaction trails in a batch system are available only for a limited period of time. b. there are time delays in processing transactions in a batch system. c. errors in some transactions cause rejection of other transactions in the batch. d. random errors are more likely in a batch system than in an on-line system. 41. In a computerized payroll system environment, an auditor would be least likely to use test data to test controls related to a. Missing employee numbers. b. Proper approval of overtime by supervisors. c. Time tickets with invalid job numbers. d. Agreement of hours on clock cards with hours on time tickets. 42. Which of the following is not major reason for maintaining an audit trail for a computer system? a. As deterrent to irregularities. b. For monitoring purposes. c. For analytical procedures. d. For query answering. 43. Which of the following is a general control that most likely would assist an entity whose systems analyst left the entity in the middle of a major project? a. Grandfather-father-son record retention. b. Input and output validation routines. c. Systems documentation. d. Check digit verification. 44. Which of the following statements most likely represents a disadvantage for entity that keeps microcomputer-prepared data files rather than manually prepared files? a. Random error associated with processing similar transactions in different ways in usually greater.

b. It is usually more difficult to compare recorded accountability with physical count of assets. c. Attention is focused on the accuracy of the programming process rather than errors in individual transactions. d. It is usually easier for unauthorized persons to access and alter files. 45. Which of the following most likely represents a significant deficiency in the internal control system? a. The systems analyst reviews application of data processing and maintains systems documentation. b. The systems programmer designs systems for computerized applications and maintains output controls. c. The control clerk establishes control over data received by the EDP department and reconciles control totals after processing. d. The accounts payable clerk prepares data for computer processing and enters the data into the computer. 46. An auditor anticipates assessing control risk at a low level in a computerized environment. Under these circumstances, on which of the following procedures would the auditor initially focus? a. Programmed control procedures. b. Application control procedures. c. Output control procedures. d. General control procedures. 47. Which of the following client computer systems generally can be audited without examination or directly testing the computer program of the system? a. A system that performs relatively uncomplicated processes and produces detailed output. b. A system that affects a number of master files and produces a limited output. c. A system that updates a few master files and produces no printed. Output other than final balances. d. A system that performs relatively complicated processing and produces very little detailed output. 48. Control procedures within the computer system may leave no visible evidence indicating that the procedures were performed. In such instances, the auditor should test these computer controls by a. making corroborative inquires. b. observing the separation of duties of personnel. c. reviewing transactions submitted for processing and comparing them to related output. d. reviewing the run manual. 49. An auditor will use the test data method in order to gain certain assurance with respect to the computer a. input data. b. machine capacity.

c. control procedures contained within the program. d. general control procedures. 50. After obtaining a preliminary understanding of a client’s computer control structure, an auditor may decide not to perform test of controls auditing related to the control procedures within the computerized portion of the client’s control system. Which of the following would not be a valid reason for choosing to omit tests of controls auditing? a. The client’s computer control procedures duplicate manual control procedures existing elsewhere in the system. b. There appear to be major weaknesses that indicate a high control risk. c. The time and peso costs of testing exceed the time and peso savings in substantive work if the tests of computer controls show the controls to operate effectively. d. The client’s control procedures appear adequate enough to justify a low control risk assessment. 51. Which of the following is likely to be of least importance to an auditor when obtaining an understanding of the computer control procedures in a company with a computerized accounting system? a. The segregation of duties within the computer function. b. The control procedures over source documents. c. The documentation maintained for accounting applications. d. The cost/benefit ratio of computer operations. 52. When an on-line, real-time (OLRT) computer system is in use, the computer control procedures can be strengthened by a. Providing for the separation of duties between data input and error listing operations. b. Attaching plastic file protection rings to reels of magnetic tape before new data can be entered on the file. c. Preparing batch totals to provide assurance that file updates are mad for the entire output. d. Making a validity check of an identification number before a user can obtain access to the computer files. 53. When auditing a computerized accounting system, which of the following is not true of the test data approach? a. Test data are processed by the client’s computer programs under the auditor’s control. b. The test data must consist of all possible valid and invalid conditions. c. The test data need consists of only those valid and invalid conditions in which the auditor is interested. d. Only one transaction of each type need to be tested. 54. A primary advantage of using generalized audit packages in the audit of an advanced computer system is that it enables that auditor to a. Substantiate the accuracy of data through self-checking digits and hash totals. b. Utilize the speed and accuracy of the computer. c. Verify the performance of machine operations which leave visible evidence of occurrence.

d. Gather and store large quantities of supportive evidential matter in machine readable form. 55. Which of the following is an advantage of generalized computer audit packages? a. They are all written in one identical computer language. b. They can be use for audits of clients that use differing computer equipment and file formats. c. They have reduced the need for the auditor to study input controls for computer-related procedures. d. Their use can be substituted for a relatively large part of the required testing. 56. When an auditor tests a computerized accounting system, which of the following is true of the test data approach? a. Tests data must consist of all possible valid and invalid conditions. b. The program tested is different from the program used throughout the year by the client. c. Several transactions of each type must be tested. d. Test data are processed by the client’s computer programs under the auditor’s control. 57. Processing data through the use of simulated files provides an auditor with information about the operating effectiveness of control policies and procedures. One of the techniques involve in this approach makes use of a. controlled reprocessing. b. an integrated test facility. c. input validation. d. program code checking. 58. Which of the following- controls most likely would assure that an entity could reconstruct its financial records following a system bug down? a. Hardware controls are built into the computer manufacturer. b. Backup diskettes or tapes of files are store away from originals. c. Personnel who are independent of data input perform parallel simulations. d. System flowcharts provide accurate descriptions of input and output operations.

More Documents from "Nez Alban"