Chapter 9 Flashcards
What is a LAN?
Local area network that serves several users within a specified geographical area
What is a VAN?
Value added network that links different companies’ computer files together
What is a WAN?
Wide area network that connects different remote locations that vary in distance
What is an EDI and what are some considerations related to an EDI?
Electronic data interchange
- Strict standards needed for data to be understood on both sides
- Translation software is needed for data to be converted between the EDI and internal systems
- Unauthorized access is a risk, so encryption is necessary
What are the different types of general controls?
- Personnel policies
- Systems = development & maintenance
- Operations = input (data entry) & output (control clerk)
- File security (back-ups, read only, etc)
- Business continuity planning (disaster recovery)
- Computer facilities (fire/insurance)
- Access Controls
General controls related to overall computer environment
What are the different types of application controls?
- Input
- Processing
- Output
What is a field check?
Application control that checks that data is the correct length and format
What is a validity check?
Application control that compares data with a list of acceptable entries to make sure it matches
What is a limit test?
Application control that checks if data is within the acceptable range
What are check digits?
Numbers with no meaning that are determined by a formula and applied to the rest of the number
What is a hash total?
Total that verifies correct entry of the values. Cannot be meaningfully added together
What are some computer assisted auditing techniques and what do they do?
- Using programs to access program files for testing
- Source code comparison to detect unauthorized changes
- Parallel simulation where the auditor inputs client data into the auditor’s program to see if it is identical to client records
- Preparing spreadsheets
What is the test data approach?
Approach where auditor develops simulated data and enters it into the client program.
Auditor inserts valid and invalid data to see if program handles them accordingly.
What is an embedded audit module?
Programs that are implanted in the client’s processing system and can perform audit procedures on a real time basis