BEC - Processing, File, and Output Controls Flashcards
A poor quality connection caused extensive line noise, resulting in faulty data transmission.
Which of the following controls is most likely to detect this condition?
A. Line check. B. Batch control total. C. Closed loop verification. D. Parity check.
D. Parity check
A parity check is designed to detect errors in data transmission.
Batch control totals
Detect errors in data entry and file update processes.
Closed loop verification
Assists in the detection of data entry errors in online real-time applications.
Parity check
Designed to detect errors in data transmission
What is the primary objective of data security controls?
A. To establish a framework for controlling the design, security, and use of computer programs throughout an organization. B. To ensure that storage media are subject to authorization prior to access, change, or destruction. C. To formalize standards, rules, and procedures to ensure that the organization's controls are properly executed. D. To monitor the use of system software to prevent unauthorized access to system software and computer programs.
B.
To ensure that storage media are subject to authorization prior to access, change, or destruction.
The distribution of reports is considered what type of control? A. Input. B. Processing. C. Output. D. Software.
C. Output
An audit trail is considered what type of control? A. Input. B. Processing. C. Output. D. Software.
B. Processing
What purpose do run-to-run controls serve?
These controls monitor the number of units in a batch as it moves from one programmed procedure (run) to another. Totals of processed transactions are reconciled to batch totals: a difference indicates an error.
What are processing controls?
Controls to ensure that master file updates are completed accurately and completely and to detect unauthorized transactions entered into the system and maintain processing integrity
Define “diagnostic routines.”
Program utilities that check the internal operations of hardware components
What is an electronic audit trail?
Transactions are written to a transaction log as they are processed. The transaction logs are an electronic audit trail.
What is boundary protection in an accounting system?
When multiple programs and/or users are running simultaneously and sharing the same resource (usually the primary memory of a CPU), boundary protection protects program instructions and data from one program from being overwritten by program instructions and/or data from another program.
What purpose do output controls serve?
These controls ensure that computer reports are accurate and distributed as authorized.
Define “parity check (parity bit).”
It is an example of a check digit. It consists of a 0 or 1 included in a byte of information that makes the sum of bits either odd or even.
Define “hardware controls.”
Controls built into the computer equipment to ensure that data are transmitted and processed accurately