All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
business
auditing assurance services
Questions and Answers of
Auditing Assurance Services
Based on a limited number of empirical studies of where problems occur in programs, which of the following statements is false?a. Requirements specification and design errors are just as prominent as
Which of the following is most likely to be the motivation for auditors to use program source-code review?a. Generalized audit software is unavailable as an evidence-collection toolb. The auditor
When using risk assessment techniques to assess the materiality of source code, a software reliability model can be used primarily to:a. Determine the hazards that are associated with each moduleb.
Which of the following is most likely to be the auditor's purpose in reviewing an organization's programming standards during the conduct of code review?a. To develop expectations about the
During the conduct of code review, which of the following strategies is most likely to identify defects in the program's specifications?a. Evaluating the code for compliance with the organization's
Which of the following is unlikely to be a reason for auditors to review the programming language used to implement the code they are reviewing?a. To determine whether they must have someone else
Which of the following COBOL computational verbs is likely to be the most error-prone?a. MULTIPLYb. SUBTRACTc. COMPUTEd. DIVIDE
For which of the following COBOL reserved words are coding errors most likely to be made?a. INSPECTb. ON SIZE ERRORc. PERFORM... UNTILd. FILE STATUS
A reliable set of test data is one that:a. Reveals an error in a program whenever the program contains an errorb. Traverses all conditional execution paths in the program that it testsc. Requires no
Which of the following statements best describes the difference between the black-box and the white-box approaches to test-data design?a. The black-box approach relies on knowledge of the functional
Which of the following statements about equivalence partitioning as a testdata design method is false?a. One test data element should be selected that falls within each equivalence class, and one
The purpose of the results stub in a decision table used for test-data design purposes is to:a. Document the conditions that lead to a particular actionb. Shows the expected and actual outcomes for
Which of the following statements about boundary value analysis is true?a. It cannot be used to design test data to test the boundaries of output valuesb. It leads to smaller amounts of test data
Achieving full statement coverage during testing of a program means that:a. Every branching statement in the program is traversed at least once during the test runb. All execution paths in the
Which of the following statements about basis path testing is false?a. The number of paths in the basis set can be calculated using McCabe's cyclomatic complexity numberb. Basis path testing is an
Which of the following statements about McCabe's cyclomatic complexity number is false?a. It is equal to the number of predicate nodes in a flowgraph plus oneb. It sets a lower limit on the
Which of the following statements about loop testing is false?a. It supplements basis path testing because loops will not be traversed with test data designed using basis path testingb. With nested
Which of the following statements about creating test data is true?a. Test data should never be created using live production datab. The approach used to create test data will affect the approach
Which of the following pairs of automated testing tools identify sections of code that cannot be reached during execution of a program?a. Test output comparators and test data generatorsb. Execution
Which of the following statements about the costs and benefits of using test data as an audit evidence-collection tool is true?a. Black-box testing tends to be a more effective test-data design
Which of the following is least likely to be a reason for audit use of code comparison software?a. To identify production object code that is ineffective or inefficientb. To identify unauthorized
Which of the following should not cause a discrepancy to be identified when object-code comparison is undertaken between an audit blueprint of a program and a production version of the program?a. The
As the auditor responsible for examining the accounts receivable system within an information systems facility, you decide to undertake code review of a COBOL program that prints out a list of
You are the auditor in charge of the audit of the payroll system for an organization. One of your staff performs a code review of the input validation program for timecard data. She brings the
Yatalee Yoghurt Ltd. is a major Brisbane-based firm that sells dairy foods throughout Australia. It is also a major exporter of dairy foods to the Southeast Asian region.Your audit firm has just
You are the auditor responsible for evaluating an organization's invoicing program. You decide to use test data to test that section of the program relating to sales discounts. During an interview
The specifications for a fixed-assets program include the following paragraph.Straight-line depreciation is to be charged on fixed assets at the following rates:If the fixed asset is located in Alice
Boon Lay Trading (Pte) Ltd. is a medium-sized import-export business based in Singapore. As the information systems auditor working on the audit team that is undertaking an audit of Boon Lay, you
You are a partner with information systems audit expertise in a firm of external auditors. Because of your scintillating personality, you win the audit of a medium-size manufacturing firm that has
You are the senior information systems auditor in a public accounting firm. At the start of this financial year, your firm took over the audit of a major bank that has a full range of wholesale and
Which of the following was not a motivation for developing generalized audit software?a. Need to develop an audit capability quickly in light of changing audit objectivesb. Provide an audit
What type of functional capabilities of generalized audit software do auditors use when they instruct the software to read a zoned field?a. Arithmetic capabilitiesb. File reorganization
The expression PRICE LE 20 OR (PRICE GT 50 AND DISCOUNT LE 5) OR PRICE EQ ZEROS would extract products from a file that have a price:a. Less than or equal to 20 , or a price greater than 50 and at
A functional capability that is likely to exist in generalized audit software but is unlikely to exist in many other generalized interrogation languages is a:a. Boolean expression capabilityb.
Parallel simulation involves the auditor:a. Writing a program to completely replicate the processing logic of an application programb. Using the random number capabilities of generalized audit
Which of the following functional capabilities in generalized audit software are auditors most likely to use to examine whether the entities that the data purports to represent do, in fact, exist?a.
Which of the following is not a functional limitation of generalized audit software?a. Permits ex post auditing only and not concurrent auditingb. Difficult to determine an application system's
Which of the following is most likely to be a reason for wanting to transfer a file from a mainframe computer to a microcomputer on which generalized audit software resides?a. Auditors can process
During the feasibility analysis and planning stage of a generalized audit software application, which of the following factors is least likely to affect the decision on whether to proceed with the
Compared with generalized audit software, which of the following is unlikely to be true of industry-specific audit software?a. It will be most useful for external auditors who perform a small number
Which of the following is least likely to be a reason why auditors use highlevel languages instead of generalized audit software to perform evidencegathering functions?a. They contain more functions
Which of the following is most likely to be a reason for using utility software rather than generalized audit software during the conduct of an audit?a. Independence will be breached if both external
Which of the following functions is performed by a dial-up access risk analyzer?a. Analyzes how well dial-up access controls have been implemented within an access control packageb. Counts the number
Which of the following tasks probably would be most difficult to perform using utility software?a. Merging data on two filesb. Dumping several records in a database to check their formatc. Selecting
A hierarchy charter primarily would be useful in helping auditors to:a. Assess data quality in an application systemb. Evaluate the efficiency of an application systemc. Understand an application
Which of the following utilities can be used to directly examine the quality of data in a database?a. Tidy facilityb. Test manager/driverc. Traced. Pointer validation utility
Which of the following utilities can be used to directly examine the authenticity, accuracy, and completeness of program logic?a. Transaction profile analyzerb. Output analyzerc. Prompterd. Text
Which of the following is least likely to be an outcome of auditors' use of expert systems?a. Increased consensus in evaluation judgmentsb. Better dissemination of expertise in relation to new
The component in an expert system that provides information to auditors about the line of reasoning used to reach a conclusion is the:a. Inference engineb. Knowledge acquirerc. Knowledge based. Tutor
Which of the following is not true about the production rules that are used in expert systems developed to assist auditors?a. They are used to represent the heuristics sometimes employed by auditors
Which of the following components of a neural network designed to assist auditors to detect fraud will be altered during its training period?a. Input componentsb. Output componentsc. Hidden
Which of the following is not a reason for having client personnel instead of auditors develop and implement specialized audit software?a. Auditors might lack the expertise to write effective and
Which of the following is least likely to be a reason for auditors wanting to exercise control over any audit software that they use?a. To ensure excessive resources are not consumed when executing
Livalife Insurance is a large insurance company with offices scattered throughout the United States and more than 1,000 independent agents. You are a member of the external audit team. During the
The following data items are maintained in a company's database for each inventory item that it holds in stock:part number part name part description bin location unit price unit cost unit measure
The following data items are maintained in a company's database for each fixed asset item that it owns:fixed asset number fixed asset description fixed asset classification location responsible
The following data items are used to submit payroll time data to a payroll system:employee number regular hours overtime hours expenses commission payments sick time vacation time leave time without
This exercise requires that you have a knowledge of the high-level language called SQL. SQL has been implemented in many database management systems as a means of defining, creating, updating, and
You are an information systems auditor in an external audit firm that undertakes a large number of audits of financial institutions, especially banks and credit unions. One day your partner requests
You are the manager of internal audit for a large bank. Over the past few years, you have become increasingly concerned about the extent of bad commercial loans that have had to be written off the
Briefly explain the nature of the code review, test data, and code comparison evidence-collection techniques. Explain how they can be used as an interrelated set of techniques to examine the quality
Briefly outline the findings of the limited empirical research that has been undertaken on where errors occur in programs. What implications do these findings have for auditors' use of various audit
Briefly explain how code review can be used to identify ineffective code and nonstandard code in a program.
On what criteria should auditors select the source code to be examined during program source code review?
What are the purposes of examining an organization's programming standards in preparation for reviewing a program's source code?
What are the purposes of examining the choice of programming language used when undertaking a review of program source code?
Briefly explain the purpose of auditors first reviewing input/output instructions when undertaking code review of a program.
What concerns arise when auditors encounter a CALL statement during code review of a COBOL program?
Give three COBOL verbs that can be used to violate the privacy of data. Explain briefly how they can be used. How would auditors go about detecting the use of these verbs?
In a COBOL program, what verbs would auditors review to check any computations performed in the program? What verbs do you think would be the most error-prone?
Give one strength and one limitation of program code review as an audit evidence-collection technique.
What is meant by reliable test data? Practically, is it possible to establish whether a set of test data is reliable? Why or why not?
Briefly explain the difference between the black-box approach to test-data design and the white-box approach to test-data design.
Briefly explain the nature of equivalence partitioning as a black-box test-data design method.
How can decision tables and decision trees help auditors to undertake the equivalence-partitioning approach to test-data design?
What factors affect whether auditors use a reduced form or an unreduced form of a decision table to design test data for audit evidence-collection purposes? If auditors base their test-data design on
Briefly explain the nature of boundary value analysis as a test-data design method. Why was boundary value analysis developed?
If a white-box approach to test-data design is used, briefly explain the difference between the objectives of full statement coverage, full branch coverage, and full path coverage. In practice, which
Briefly explain the nature of basis path testing as a test-data design method. What type of program coverage does basis path testing assist auditors to achieve?
Briefly explain the nature of McCabe's cyclomatic complexity number. How is it useful to auditors in their work?
Briefly explain the nature of loop testing as a test-data design method. List the steps auditors should undertake to test whether there are errors in a simple loop.
Briefly explain how auditors can use production data to create test data. Is production data sometimes still useful even though it does not meet exactly the test-data design specifications?
How would a test driver/harness help auditors to undertake testing of a program for audit purposes?
Briefly explain the difference between an execution path monitor and a static analyzer. Which type of tool is likely to be more useful to auditors? Why?
"Auditors require limited technical knowledge to use test data effectively as an evidence-gathering tool." Discuss briefly.
Why might auditors use program code comparison when evaluating the quality of a program?
Briefly explain the difference between program source-code comparison and program object-code comparison. What are the relative advantages and disadvantages of each type of code comparison?
List two reasons why differences can arise between two object-code versions of a program.
Briefly explain one strength and one limitation of code comparison as an audit evidence-collection technique.
Briefly describe the functions of the output subsystem.
Briefly describe the nature of inference controls. What are the four types of compromises of statistical databases that inference controls seek to prevent?
What is a characteristic formula? Why are auditors often interested in the size of the query set that satisfies the characteristic formula?
Briefly describe the nature of restriction controls. Why is a restriction on the minimum size of the query set an inadequate means of preventing a compromise of privacy in the database?
Briefly describe the nature of a "tracker." What is the distinction between an individual tracker and a general tracker?
Briefly describe the nature of each of the following types of restriction controls:a. Order controlb. Relative table size controlc. Query set overlap controld. Cell suppressione. Grouping or rolling
Briefly describe the nature of perturbation controls. How do perturbation controls differ from restriction controls?
Briefly distinguish between record-based perturbation controls and resultsbased perturbation controls. What are the relative strengths and limitations of record-based perturbation controls versus
Briefly describe the nature of each of the following types of record-based perturbation controls:a. Query set samplingb. Data perturbationc. Data swapping
What are the purposes of batch output production and distribution controls? What factors affect the choice of the batch output production and distribution controls used in an application system?
Briefly describe the major elements of an inventory system for preprinted computer stationery. Give three advantages that will accrue from having the inventory system you describe.
Showing 500 - 600
of 2689
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Last