Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Integrity of information means the information is: Multiple Choice o Accurate. Accurate Accurate and Complete are correct. Accessible. Complete. Which of the following is an

image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribed

Integrity of information means the information is: Multiple Choice o Accurate. Accurate Accurate and Complete are correct. Accessible. Complete. Which of the following is an example of a validity check? Multiple Choice C ) After data for a transaction are entered, the computer sends certain data back to the terminal for comparison with data originally sent. As the computer corrects errors and data are successfully resubmitted to the system, the causes of the errors are printed out. oo The computer ensures that a numerical amount in a record does not exceed some predetermined amount. The computer flags any transmission for which the control field value did not match that of an existing file record. Which of the following input controls is a numeric value computed to provide assurance that the original value has not been altered in construction or transmission? Multiple Choice Encryption. Check digit. O Hash total. Hash total. Parity check. Disaster recovery planning and business continuity management are preventive controls. True or False True True False False Which of the following is not a good example of how accountants might use data analytics to help evaluate estimates used to value financial statement accounts? Multiple Choice Automate the order entry process for online customers. C) Assess property, plant & equipment values based on current comparable prices. Estimate the collectability of accounts receivable balances. o oo Assess the likelihood and level of expected warranty claims. Encryption and hashing are similar process to maintain data confidentiality. True or False True False Controls in the information technology area are classified into preventive, detective, and corrective categories. Which of the following is preventive control? Multiple Choice Hash total. Echo check Access control software. Contingency planning. An entity doing business on the internet most likely could use any of the following methods to prevent unauthorized intruders from accessing proprietary information except: Multiple Choice Digital certificates Data encryption Batch processing. Password management. A Public Key Infrastructure (PKI) provides the ability to do which of the following? Multiple Choice Read plaintext. Issue, maintain, and revoke digital certificates. o Enable debit and credit card transactions. Enable Encrypt messages using a private key. When computer programs or files can be accessed from terminals, users should be required to enter an): Multiple Choice Echo check. O Parity check Parity check Password as a personal identification code. Check digit Which of the following business rules illustrates a proper implementation of internal control? Multiple Choice C) The employee that inspects the work can't be the same employee that discards defective items. The employee that authorizes production can't be the same employee that issues raw materials. The employee that performs part of the conversion work can't also perform other work in the conversion process. The person that receives the finished items can't also place them into their assigned warehouse location. The use of data analytics will likely result in significant changes to clients' expectations of their auditors. Which of the following is most likely not one of those expected changes? Multiple Choice Deeper and broader insights. Faster and more efficient delivery of audit findings. More time spent gathering and testing data. More innovative thinking. In a large multinational organization, which of the following job responsibilities should be assigned to the network administrator? Multiple Choice Reviewing security policy. Developing application programs. Installing operating system upgrades. Managing remote access. In the conversion process, indirect labor is first recorded to which of the following accounts? Multiple Choice Finished Goods. Work-in-Process Inventory. Manufacturing Overhead. Raw Material Inventory. Internal controls guarantee the accuracy and reliability of accounting records. True or False True False

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Accounting And Finance For Lawyers In A Nutshell

Authors: Charles Meyer

7th Edition

1647083001, 9781647083007

More Books

Students also viewed these Accounting questions

Question

Discuss how S. Truett Cathys values shaped Chick-fil-As operation.

Answered: 1 week ago