All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
business
auditing assurance services
Questions and Answers of
Auditing Assurance Services
Give three concerns that auditors should have in relation to the execution of batch report programs.
Outline some controls that could be instituted to prevent alteration of fields on a printer file produced as a result of spooling. What controls could be used to ensure a printer file is printed only
Give three purposes to controls over printing of batch reports.
What controls can be implemented to ensure that sensitive reports are printed only on a secure printer?
Give two purposes to controls over batch report collection. Briefly describe two controls that can be established to ensure these objectives are achieved.
Briefly describe the nature and purposes of user/client services review controls in relation to batch output.
Give three controls that can be implemented to ensure batch reports are distributed securely and promptly only to authorized users.
Give two purposes of user output review controls for batch reports.
Briefly describe the nature and purposes of output storage controls in relation to batch output.
How do obsolescence concerns affect the decision on how long batch output can be retained on a storage medium?
Give two control objectives that relate to destruction of batch output.
Why should each page in a batch report have a page heading and a page number? What is the purpose of printing an end-of-job marker on the last page of a batch report?
Why are source controls needed in relation to online output? Briefly describe the nature and purposes of four source controls that might be used over output that can be obtained via a Web browser
What are the nature and purposes of netiquette? Give four rules of netiquette.
Give two controls that might be used to ensure online output is received on a timely basis.
In electronic messaging systems, why do organizations need policies to govern forwarding, "carbon" copying, and "blind" copying of messages?
If online output is obtained via the Internet, how can asymmetric cryptography be used to gain assurance about the authenticity of the source of the output?
Give two controls that might be exercised to determine whether online output should be accepted.
Why do organizations need policies to govern the disposition of electronic mail that their employees may receive?
Give two exposures that an organization faces in relation to unauthorized removal of online output.
What is the nature of the accounting audit trail in the output subsystem? Give two ways in which the accounting audit trail might be used.
Give two uses of the operations audit trail in the output subsystem.
How are spool/printer files useful for backup and recovery purposes? From a backup and recovery viewpoint, what factors determine how long a spool file should be kept?
The ease with which backup and recovery of output can be accomplished depends upon whether the output shows status information or transaction information. Briefly explain.
With respect to statistical databases, inference controls seek to prevent:a. Unauthorized addition, modification, or deletion of a data itemb. Incorrect deductions by users based on the contents of
Which of the following statements about trackers is false?a. They pad the original query so the restrictions on query set size can be circumventedb. Privacy violations obtained via trackers can be
Which of the following restriction controls merges cells that contain sensitive statistics?a. Rolling upb. Relative table size controlc. Partitioningd. Order control
Compared with restriction controls, perturbation controls:a. Allow fewer statistics to be calculated on the data contained in the databaseb. Eliminate biases or inconsistencies that arise as a result
Which of the following statements about record-based perturbation controls is false?a. They calculate a statistic on the basis of a random sample of records that satisfy the queryb. They calculate a
Preprinted stationery causes special control problems because it:a. Can be used in an unauthorized way to embarrass the organizationb. Is usually handled by only a few people so the risk of collusion
Which of the following is not an objective of batch report program execution controls?a. Only authorized persons should be able to execute batch report programsb. Batch report programs should be
A control problem that arises with spooling software is that:a. Relative to normal reporting software it is easier to carry out unauthorized modifications to spooling softwareb. It is error prone
Which of the following is unlikely to be a control objective for batch report printing controls?a. To ensure that reports are printed on the correct printerb. To ensure that printed reports are
With respect to batch report output, which of the following is not a function that should be performed by a user/client services group?a. Scanning batch reports for obvious errors or omissionsb.
Which of the following controls is likely to be most cost-effective as a means of ensuring that a mail distribution organization dispatches printed invoices on a complete and timely basis?a. Control
Which of the following statements about the user output review phase in the production and distribution of batch reports is most likely to be false?a. Users should not waste resources by performing
Which of the following statements about the storage, retention, and destruction of batch output is most likely to be false?a. Legislation could specify both a maximum period of retention and a
On a batch report, the control information that prevents undetected removal of the last page of the report is the:a. Page numberb. End-of-job markerc. Security classificationd. Page title
Which of the following exposures in relation to online output production and distribution is least likely to be covered by source controls?a. Inappropriate use of information obtained from a bulletin
Which of the following is not a rule of netiquette?a. When replying to a message, do not include the full contents of the message you have received in your reply.b. Avoid soliciting information from
One objective of distribution controls in relation to online output is to:a. Prevent online messages from being routed first through an intermediaryb. Prevent inappropriate use of blind copies of
Which of the following controls is likely to offer most protection over online output when it is transmitted through the Internet?a. Asymmetric cryptographyb. Message routing protocolsc. Symmetric
Which of the following exposures associated with online output is least likely to be covered by receipt controls?a. Acceptance of a letter bomb from an anonymous sourceb. Downloading of a program
Which of the following is least likely to be an exposure covered by disposition controls over online output?a. Forwarding of confidential e-mail to unauthorized partiesb. Unauthorized copying of
Which of the following information is least likely to be stored in the accounting audit trail in relation to online output?a. The persons who received the online outputb. The resources consumed to
Which of the following factors makes the output recovery process easier?a. Lack of use of spooling or printer filesb. Transaction data to be recovered instead of status datac. In-place update rather
You are an external auditor with the federal government audit office responsible for undertaking audits of all federal government departments. In this capacity you conduct audits not only to
Southern Cross Securities Limited (SCS) is a large Melbourne-based financial institution offering a wide ranging of financial services to investors. One of SCS's most popular services is portfolio
Farm Equipment Supplies Limited (FESL) is a major manufacturer of equipment to support primary producers based in Cleveland, Ohio. To control its overall manufacturing costs, FESL uses a just-in-time
You are the vice-president of internal audit for Kids-Want-Em Ltd. (KWEL), a large, Atlanta-based manufacturer and distributor of high-quality children's toys and games. Your company prides itself on
First South Australian State Bank recently has installed a new network for teller operations in its 500 branches throughout the state. Teller machines in each branch are connected to a branch
Briefly discuss the motivations for developing generalized software specifically for audit purposes. Even though generalized retrieval software already existed before audit software was developed,
What is a generalized audit software package?
Without using the examples provided in the chapter, give two examples of how auditors might use each of the following functional capabilities of audit software:a. File reorganizationb. Statisticalc.
Briefly explain the difference between a Boolean operator and a relational (conditional) operator used in a selection expression for generalized audit software. Be sure to explain their different
What purposes might auditors seek to achieve in using generalized audit software to examine the quality of data maintained on an application system files?
Briefly explain the parallel simulation technique. What is the purpose of using parallel simulation? Outline some of the advantages and disadvantages of using this technique for audit purposes.
How can auditors use generalized audit software to examine the existence of entities that the data purports to represent?
How can auditors use generalized audit software to assist the conduct of analytical review?
Why does generalized audit software have only limited capabilities for verifying the processing logic within an application system and the propensity of the application system for error?
Give two reasons why auditors might wish to download data from another machine onto the machine on which their generalized audit software package resides.
Give two ways in which auditors might transfer data from a mainframe computer to a microcomputer so that they can use a microcomputerbased generalized audit software package to access and manipulate
Briefly describe the major phases that must be managed during the development and implementation of a generalized audit software application.
Briefly describe the nature of industry-specific audit software. How does it differ from generalized audit software?
What are the relative advantages of industry-specific audit software versus generalized audit software?
Briefly explain the nature of a high-level programming language. How are high-level programming languages useful to auditors?
Briefly explain the nature of utility software. Give two locations where auditors might find utility software that could assist them.
Briefly describe two utilities that auditors can use to assist their evaluation of information system security and integrity.
How might auditors use the following utilities during the evidence-collection phase of an audit?a. Configuration utilityb. Pointer validation utilityc. Traced. Report generator
Give three ways in which utility software might be used to facilitate auditors' assessment of operational efficiency in an application system.
Give three major reasons why auditors might develop, maintain, and use expert systems.
How might an expert system assist auditors in the following tasks:a. Analyzing the inherent risk associated with an auditb. Evaluating the reliability of an internal control systemc. Planning an
Briefly explain the nature of a neural network. What are its major components? How can neural networks assist auditors?
Briefly explain the nature of specialized audit software. Give three reasons why auditors might develop specialized audit software.
Why is it important that auditors maintain careful control over any software they use during the conduct of an audit? If the software they use is controlled by other parties, give two ways in which
Barrel Roll Ltd. is a major Perth-based manufacturer of equipment and clothing for water sports-for example, bodyboards, surfboards, water skis, bikinis, wetsuits, and T-shirts. It sells its products
You are the manager of internal audit in a large, centralized manufacturing company that is currently using a relational database management system to support the company database. The company has
As the manager of internal audit for Streaker Products, a manufacturer of running shoes and related athletic goods, you are called one day to a meeting with the controller, the information systems
Pieces and Parts, Ltd. is a diversified manufacturing company with five large manufacturing plants located in upstate New York. To date, the company has maintained a centralized information systems
You are an internal auditor participating in the design phase of a new online accounts receivable system. Customer accounts will be updated automatically with data captured using point-of-sale
The Convict Savings Bank is a large bank based in Sydney with branches scattered throughout Australia. The bank uses an online real-time update system for its customer accounts system. The branches
Briefly describe the functions of the database subsystem.
Distinguish between the following discretionary access control policies that are exercised in the database subsystem:a. Name-dependent access controlb. Content-dependent access controlc.
How can views be used to enforce access controls in the database subsystem?
Briefly explain how mandatory access controls can be enforced in the database subsystem.
For each of the following constructs in the entity-relationship model, give one integrity constraint that might be exercised:a. Entityb. Relationshipc. Attribute
What is meant by referential integrity within (a) the relational data model, and (b) the object data model?
Why should application programs that update monetary data items in the database maintain a suspense account?
Why should application programs that use standing data print control totals to allow users to determine whether any changes have been made to standing data?
Briefly describe the data integrity problems that can be caused by concurrent update processes. Why might a read-only process want to exclude a concurrent update process?
How can lockout lead to deadlock? What problems can arise if preemption is used to break deadlock without rolling back the preempted processes?
Briefly describe the nature of two-phase locking. If two-phase locking is used to prevent a deadlock situation, what properties must the transactions have if two-phase locking is to be successful?
Briefly describe a strategy that can be used to implement concurrency controls in a distributed database subsystem when the database isa. Replicatedb. Partitioned
Why is block encryption more likely to be used than stream encryption in the database subsystem?
What problems arise when cryptography is used as a control in a shared database environment? How can these problems be overcome, at least to some extent, using a hierarchy of cryptographic keys?
Briefly describe the nature of file handling controls. What control objectives are accomplished using \(a(n)\) :a. Internal file labelb. Retention datec. File protection ringd. External file label
Distinguish between the implosion and the explosion purposes of an accounting audit trail for the database subsystem. Use an accounts payable system to illustrate your answer.
Briefly explain why a change to the database definition might present difficulties for a user who wants to access data contained in the accounting audit trail that extends over a long period of time.
How might a database administrator use the operations audit trail maintained for the database subsystem?
Distinguish between a rollforward and a rollback recovery operation. For each type of operation, give one example of a failure that would lead to the operation being undertaken.
Showing 600 - 700
of 2689
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Last