All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
business
auditing assurance services
Questions and Answers of
Auditing Assurance Services
In a local area network, the most critical control component is likely to be the:a. Fiber-optic cablesb. File serverc. Cable scannerd. User workstations
Give a decision that operations management might make on the basis of data recorded on the maintenance \(\log\) prepared for a machine.
Which of the following guidelines applies to the design of keying tasks to increase the effectiveness and efficiency of the data preparation function?a. Keying tasks should be no longer than an
Briefly describe how a maintenance engineer might violate data integrity during the maintenance of hardware. Give two controls that might be exercised over the engineer to inhibit or prevent the
Which of the following design guidelines should be followed to reduce the likelihood of repetition strain injury?a. Ensure that the data preparation area is brightly lit so keyboard operators can
What is the overall purpose of a network control terminal in a wide area communications network? Give three specific functions that can be performed by an operator using a network control terminal.
Which of the following is not a function of the production control section?a. Dispatching input received from an outside party to the computer roomb. Scheduling of production jobsc. Follow-up on
Why is a network control terminal a threat to the overall security of a communications network? What controls should be exercised to try to ensure that a network control terminal is used only for its
Which of the following activities should not be performed by control section personnel when they collect the output of a batch application system from the computer room?a. Checking to see the output
List two aspects of the operations of a local area network that need to be monitored to ensure that data integrity within the network is maintained. Briefly explain why these two aspects need to be
Which of the following is not a function of production control personnel in terms of production scheduling?a. Assisting with the establishment of the production scheduleb. Preparing job control
Why do file servers within a local area network need to be physically secured?
Which of the following is unlikely to be a responsibility of the production control section with respect to the management of service-level agreements?a. Ensuring that documentation of service-level
Briefly describe some guidelines that should be followed to reduce operator boredom in the design of keying tasks undertaken in the data preparation function.
Which of the following is not a responsibility of the production control section with respect to transfer pricing of information systems services?a. Determining the prices to be charged for
What responsibilities does operations management have with respect to backup and recovery in the data preparation function?
Which of the following is not a responsibility of the production control section with respect to acquisition of consumables that the information systems function uses?a. Ensuring that consumables are
Briefly describe the production control section's responsibilities with respect to receipt of input from and dispatch of output to external users of the information systems function.
Which of the following is unlikely to be a capability of an automated library system for removable storage media?a. Preparing reports indicating times when the temperature and dust levels in the room
Briefly describe the production control section's responsibilities with respect to job scheduling.
Which of the following reflects good control over use of removable storage media?a. Only computer operators should remove storage media from the file libraryb. Sensitive files and nonsensitive files
From a control perspective, why is it important to have user complaints about information systems services directed to production control personnel?
Which of the following decisions most likely could not be made on the basis of file management reports prepared from the storage media maintenancea. Whether to move files from one storage medium to
What are the production control section's responsibilities with respect to transfer-pricing charges in terms of:a. Internal users of the information systems function's services?b. The information
Which of the following actions should be undertaken when a file retention date expires?a. The storage medium on which the file resides should be retired from useb. The file should be removed to
What are the production control section's responsibilities with respect to acquisition of consumables used by the information systems function?
Removable storage media should not remain unused for long periods of time because:a. The data they contain will become out-of-dateb. The risk of read/write errors occurring with the media increasesc.
Briefly describe two controls that should exist over storage of removable storage media for:a. A mainframe computer with a large number of usersb. A microcomputer with only one user
The purpose of deleting data from magnetic tapes before the ends are clipped is to:a. Indicate which section of the tape should be clippedb. Protect the privacy of datac. Prevent damage to the data
Briefly describe the controls that should exist over use of removable storage media in a mainframe computer environment.
With respect to off-site storage of backup files, which of the following tasks is most likely to be undertaken by the operations manager:a. Transporting backup files to off-site storageb. Determining
Why should removable storage media not remain unused for a long period of time?
Which of the following is least likely to be a function of a documentation librarian:a. Ensuring that access rights to documentation are given only to the appropriate personnelb. Ensuring that
Why must care be taken if removable storage media is sent to an outside organization for cleaning and repair?
Which of the following is least likely to be a function of a documentation librarian with respect to an organization's inventory of acquired or licensed software?a. Ensuring that the software is
Briefly explain the file librarian's responsibilities with respect to backup storage media in a mainframe computer environment. What responsibilities do microcomputer users have with respect to
Which of the following is least likely to be a function performed by the help desk/technical support area?a. Modifying end-user databases to correct errors and irregularitiesb. Acquiring hardware and
Briefly explain the documentation librarian's responsibilities with respect to documentation. Why should programmers be prevented from having unrestricted access to program documentation?
Which of the following decisions most likely could not be made on the basis of performance monitoring statistics that are calculated:a. Whether the system being monitored has provided users with a
What controls should exist over an organization's inventory of acquired and licensed programs?
Which of the following is unlikely to be a function performed by operations management with respect to the outsourcing contracts entered into by an organization:a. Ensuring compliance with the
Briefly describe two requirements that must be met if the help desk/technical support area is to function effectively and efficiently.
Briefly describe the responsibilities of operations management with respect to capacity planning and performance monitoring. What decisions does an operations manager make on the basis of the
Why does operations management need to continuously monitor the financial viability of any outsourcing vendor that their organization uses?
Identify two items that operations management most likely will monitor with respect to compliance with the terms and conditions of an outsourcing contract.
What part might a third-party auditor play in providing operations management with information on the reliability of an outsourcing vendor's controls?
What part does operations management play with respect to the disaster recovery controls associated with an outsourcing contract?
Give three attributes of a high-quality program.
What are the major phases in the program development life cycle? Which phase is a phantom phase? Briefly explain why it is a phantom phase.
What is the overall purpose of the planning phase in the program development life cycle? List four major decisions that have to be made during the planning phase.
Briefly describe how the following software cost-estimation techniques differ:a. Expert judgment versus analogyb. Top-down estimation versus bottom-up estimation
Briefly describe two concerns auditors might have when evaluating the planning phase of the program development life cycle.
Briefly describe the two major purposes of the control phase of the program development life cycle.
How do techniques like Work Breakdown Structures, Gantt charts, and PERT charts help during the control phase of the program development life cycle?
What functions might program library software perform during the control phase of the program development life cycle?
What evidence-collection techniques might auditors use to determine whether controls are operating reliably in the control phase of the program development life cycle?
What is likely to be an auditor's primary concern about the ways programmers undertake the design phase of the program development life cycle?
What concerns should auditors have about the conduct of the program development life cycle design phase in an organization where program development is primarily undertaken by end users who employ
During the coding phase of the program development life cycle, what is meant by the module implementation and integration strategy? Briefly explain the nature of a threads module implementation and
Why should auditors be concerned to see that programmers follow the precepts of structured programming when they undertake program coding? What evidence should we collect to determine whether
Briefly describe two types of automated tools that programmers might use to assist them in their coding work. Why should auditors have increased confidence in the quality of the coding process if we
List two guidelines that programmers should follow if they are concerned about improving the readability of the program code they write.
List seven major steps in the conduct of program testing.
Briefly explain the difference between unit testing, integration testing, and whole-of-program testing.
Briefly explain the difference between static analysis tests and dynamic analysis tests. For each type of test, give two types of automated tools that programmers might use to help them conduct
Briefly describe the relationship between desk checking, structured walkthroughs, and design and code inspections.
Briefly explain the difference between:a. black-box testing and white-box testingb. big-bang testing and incremental testingc. top-down testing and bottom-up testingd. acceptance testing and
In the context of the program development life cycle, what is the primary concern auditors have about the operational use of programs?
Briefly explain the difference between repair maintenance, adaptive maintenance, and perfective maintenance. Why are auditors concerned with controls over all types of program maintenance?
What two factors should have a major impact on the way programming teams are organized?
Give three advantages that a chief programmer team structure has over traditional organization structures for programming teams. Give one potential disadvantage of the chief programmer team structure.
Briefly explain the role of the librarian in a chief programmer team. What duties does the librarian have with respect to the program production library? How does the librarian role inhibit
Give two motivations for organizing programmers as an adaptive team. What are the differences between a chief programmer team and an adaptive team?
Briefly explain the nature of a controlled-decentralized programming team. Give an example of a programming project in which you think a controlleddecentralized team would be more successful than
Give two reasons why it is difficult to control the work of system programmers.
List two controls that might be used over the activities of system programmers.
Which of the following phases in the program development life cycle is most likely to be a "phantom" phase?a. Control phaseb. Design phasec. Operation and maintenance phased. Coding phase
Which of the following cost-estimation techniques depends most on the fact that a similar project has been undertaken already and resource estimates can be based on this previous project?a. Bottom-up
Which of the following factors should have least effect on the ways planning activities are undertaken?a. Whether the software is to be developed or acquiredb. The size of the software project c.The
Which of the following is least likely to be a purpose of using Work Breakdown Structures, Gantt charts, and PERT charts?a. To identify what tasks must be undertaken in a project b. To evaluate the
Which of the following is not a function of program library software?a. Controlling access to object code via passwordsb. Maintaining an audit trail of changes to source codec. Testing the accuracy
From an audit perspective, which of the following statements about the design phase of the program development life cycle is true?a. Program documentation provides little evidence about the quality
Which of the following is a disadvantage of a bottom-up module implementation and integration strategy?a. Low-level modules that perform critical input-output functions are not tested firstb. The
Which of the following is not an allowable control structure in structured programming?a. Conditional repetitionb. Unconditional branchc. Simple sequenced. Selection based on a test
Which of the following automated tools is unlikely to be used during the coding phase of the program development life cycle?a. Execution path monitorb. User-interface management systemc. Shorthand
Which of the following documentation guidelines should not be followed during program coding?a. Use mnemonic names for variables but not constantsb. Indent conditional testsc. Use program header
Which of the following statements about design and code inspections is true?a. They are performed by the programmer who coded the program to be testedb. They are less costly to undertake than desk
White-box testing is most often used as a form of:a. Top-down testingb. Big-bang testingc. Unit testingd. Acceptance testing
Adaptive maintenance must be undertaken when:a. Logic errors are discovered in a programb. The program must be tuned to decrease resource consumptionc. The program's execution time is unacceptabled.
The purpose of configuration management software is to:a. Facilitate control over the program maintenance processb. Allow programmers to be relatively unconcerned about the hardware/software platform
A chief programmer team is:a. A project-based organizational structureb. A team with decentralized controlc. A team structured to facilitate innovative problem solving d A team where each member has
In a chief programmer team, the backup programmer:a. Ensures that the resources needed for recovery of programs in the event of disaster are workingb. Must be capable of assuming the chief
In an adaptive team, the leader is:a. The chief programmerb. The programming managerc. The person having most expertise with the task at handd. No one-an adaptive team never has a team leader
Controlled-decentralized teams probably work best when:a. Information flows must occur from the inside outb. Only senior programmers participate in the teamc. The programming task is large and
Control problems arise with a system programming group because:a. It is impossible to enforce separation of duties within the groupb. The group's creativity is undermined when controls are exercised
In the long-run, which of the following control measures over system programmers is likely to be the most effective?a. Separate duties among system programmers to the extent possibleb. Have
In an ex post general review audit of the systems development process, the auditor's primary objective is to:a. Evaluate a specific system to determine whether the necessary controls have been
The auditor uses a normative model of the system development process as a basis for:a. Determining the activities that should be carried out during systems developmentb. Determining what activities
A major difference between the life-cycle approach and the sociotechnical design approach to systems development is:a. The sociotechnical design approach deemphasizes project-control techniquesb. The
Under the political approach to systems development, user participation in the design process is an important means of reducing behavioral implementation problems when:a. The system will alter the
Showing 1200 - 1300
of 2689
First
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Last