Question
Multiple Choice 6 The __________ audit procedure is used for the audit of __________. a. examine system access logs; program development b. review programming evaluation
Multiple Choice 6 The __________ audit procedure is used for the audit of __________. a. examine system access logs; program development b. review programming evaluation standards; overall computer security c. proper use of internal and external file labels; computer processing controls d. review program documentation standards; program modification Multiple Choice 7 An integrated test facility technique a. examines the way transactions are processed b. places a small set of fictitious records in the master files c. uses embedded audit modules to continuously monitor transaction activity and collect data on transactions with special audit significance d. searches a program for occurrences of a specified variable name or other character combinations Multiple Choice 8 The audit technique used to catch the State Farm Life Insurance Company employee fraudulently taking cash was a. audit hooks b. snapshot technique c. program tracing d. internal control testing Multiple Choice 9 Two of the most popular audit software packages include: a. ITF b. ACL c. CIS d. SCARF Multiple Choice 10 The first step in an operational audit is a. evaluating evidence b. collecting evidence c. communicating the results d. none of the above
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started