Chapter 7 Flashcards

1
Q

programmed procedures designed to deal with
potential exposures that threaten specific
applications, such as payroll, purchases, and cash disbursements systems.

A

APPLICATION CONTROLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

requires human involvement and is
prone to clerical errors.

A

Source document-triggered/ Source
document input (batch)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

employs real-time editing
techniques to identify and correct
errors immediately, thus
significantly reducing the number
of errors that enter the system.

A

Direct input (real time)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Careful control must be exercised over physical
source documents in systems that use them to
initiate transactions.

A

source document controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

One method for detecting data coding
errors.

A

Check Digits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When errors are detected in a batch, they must
be corrected and the records resubmitted for
reprocessing.

A

Input error correction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If the system is using the direct data
validation approach, error detection
and correction can also take place
during data entry

A

Correct Immediately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When delayed validation is being used,
such as in batch systems with sequential
files, individual errors should be flagged
to prevent them from being processed.

A

Create an Error File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Some forms of errors are associated
with the entire batch and are not
clearly attributable to individual
records.

A

Reject the Batch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

To achieve a high degree of control and
standardization over input validation
procedures

A

Generalized data input systems (GDIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

✓ The input data that are validated by the
GVM are stored on a validated data file.
✓ temporary holding file through which
validated transactions flow to their
respective applications.

A

Validated data file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

✓ Every transaction successfully processed by
the system should be recorded on a
transaction log, which serves as a journal.

A

Transaction Logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When the printer becomes available, the print
run program produces hard copy output from
the output file.

A

print Programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In some organizations, the data control group is responsible for verifying the accuracy of
computer output before it is distributed to the
user.

A

Data Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The primary risks associated with report
distribution include reports being lost, stolen, or misdirected in transit to the user.

A

Report Distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Once in the hands of the user, output reports
should be reexamined for any errors that may
have evaded the data control clerk’s review

A

End User Controls