Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1.All the following tasks should not be done by the general ledger clerk except: Select one: a.Reconciling financial accounts b.Having record keeping responsibility for special

1.All the following tasks should not be done by the general ledger clerk except:

Select one:

a.Reconciling financial accounts

b.Having record keeping responsibility for special journals

c.Preparing journal vouchers

d.Having record keeping responsibility for subsidiary ledgers

2.Although Computer-based Information Systems (CBIS) come with many benefits, there are also some risks involved. What is the main source of exposure in CBIS?

Select one:

a.Complexity of building CBIS according to business need

b.Difficulty in obtaining and retaining expertise that is up to the level

c.Creation of single point of failure through consolidation

d.Lack of support from top management for the objectives of CBIS

3.All the following are benefits of partitioned database approach except?

Select one:

a.Increased user control

b.Enhanced sharing

c.Reduced volume of traffic

d.Improved response time

4.Which one of the following is not a criterion that is used in the selection of the data structure?

Select one:

a.Accommodation of file growth

b.Ease of recovery from failure

c.Rapid access to data

d.Integration with SDLC

5.One of the levels of computer ethics involves knowledge about the good and bad ramifications of the use of computer technology. What do we call this level?

Select one:

a.Theoretical

b.Pop

c.Practical

d.Para

6.What do we call the physical arrangement of records in a database?

Select one:

a.External view

b.Logical view

c.User view

d.Internal view

7.All the following are IT application controls that can be used in the expenditure cycle except:

Select one:

a.Parallel operations cutover

b.Automated Three-Way Match and Payment Approval

c.Multilevel Security

d.Automated purchase approval

8.To have a permanent record of the transactions that have changed account balances, we need:

Select one:

a.Log

b.ITF

c.Balance sheet

d.Spooling

9.As part of the audit process, the auditor may need to select customers randomly and contact them to determine whether the transactions recorded in the financial statements actually took place and are valid. This is called:

Select one:

a.Authorization process

b.Randomization process

c.Source check process

d.Confirmation process

10.Jason is an auditor who used to be a software developer. He wants to take advantage of a technique he used as a developer to get more insight as an auditor. The technique involves inspecting the application's internal logic to understand what instructions are executed and the order of their execution. This technique is called:

Select one:

a.Test automation

b.Tracing

c.Completeness test

d.Logging

11.What is the audit approach that is used to access and extract data from data files after processing is complete, and requires no programming?

Select one:

a.VSAM

b.ITF

c.EAM

d.GAS

12.What tool can be used to create parallel simulation?

Select one:

a.SQL

b.GAS

c.SDLC

d.ACL

13.What is the type of anomaly that is associated with storing too much data together?

Select one:

a.Deletion anomaly

b.Update anomaly

c.Normalization anomaly

d.Insertion anomaly

14.Some database controls are used to preserve the confidentiality and integrity of the database from users who try to work out specific data values by using query features. What are these controls called?

Select one:

a.Database lock controls

b.Hash value controls

c.Encryption controls

d.Inference controls

15.An auditor wants to introduce a specially designed module in the information system to capture predetermined transactions which will help in analysis. This approach is called:

Select one:

a.EDP

b.3NF

c.EAM

d.GAS

16.The system should use a hashing structure to store and access files. However, there is the concern of data collision. What should the system designer do to avoid/minimize collisions?

Select one:

a.Use RAID

b.Choose the hashing algorithm carefully

c.Use indexed hashing

d.Choose bigger storage capacity

17.What is the technique known as destructive update?

Select one:

a.Not having off-site backup procedures

b.Replacing an old data value with a new value

c.Deleting digital audit trails

d.Destructing physical database files to prevent update

18.Many-to-many relationships cannot be represented by which database model?

Select one:

a.The relational model

b.The DDP model

c.The hierarchical model

d.The network model

19.What kind of control is used when the level of precision used in a calculation is greater than that is used for reporting?

Select one:

a.Sign check

b.Range check

c.Rounding error routines

d.Validity control

20.A company has decided that paychecks are not to be distributed to employees by their direct supervisors. Instead, a paymaster should do. What kind of control is this?

Select one:

a.Supervision

b.Reconciliation

c.Authorization

d.Segregation of duties

21.What is considered a tangible benefit of real-time processing in the revenue cycle?

Select one:

a.Improving work environment

b.Introducing a competitive advantage

c.Increasing customer satisfaction

d.Reflecting a professional image

22.HTML and XML may both be used for financial reporting. What is the main difference between the two?

Select one:

a.HTML uses attributes while XML does not

b.HTML does not provide predefined meaning that describes how the attributes will be presented in a document

c.XML is more customized to the user and application needs

d.XML uses tags while HTML does not

23.Why should auditors be familiar with the concept of data normalization?

Select one:

a.Because of potential anomalies

b.Because it is their responsibility

c.Because of its impact on user views

d.Because it is related to what systems professionals do

24.Which of the following is not a control feature that contributes directly to the security of a computer center environment?

Select one:

a.Fault tolerance

b.Data encryption controls

c.Access controls

d.Construction controls

25.The materiality principle in accounting refers to:

Select one:

a.Tangibleness

b.Size

c.Impact

d. Independence

26.What is the main limitation of the hierarchical database model?

Select one:

a.Its inability to prevent redundancy

b.Its inability to represent many-to-many associations

c.Its restrictions on data organization

d.Its restriction on data access

27.What is the document that is prepared by the personnel department for the authorization of new employees and changes in job class and pay rates?

Select one:

a.Time cards

b.Job tickets

c.Check Register

d.Labor distribution summary

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

College Accounting Chapters 1-12

Authors: Douglas McQuaig

10th Edition

1439038783, 978-1439038789

More Books

Students also viewed these Accounting questions

Question

What is meant by planning or define planning?

Answered: 1 week ago

Question

Define span of management or define span of control ?

Answered: 1 week ago

Question

What is meant by formal organisation ?

Answered: 1 week ago

Question

What is meant by staff authority ?

Answered: 1 week ago