cpaexcel Flashcards

1
Q

Define “general controls.”

A

Controls over the environment as a whole. Apply to all functions, not just specific accounting applications. General controls help ensure that data integrity is maintained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define “application controls.”

A

Controls over specific data input, data processing, and data output activities. Designed to ensure the accuracy, completeness, and validity of transaction processing. As such, application controls have a relatively narrow focus on those accounting applications that are involved with data entry, update, and reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define “feed-forward controls.”

A

A process in which future results are projected based on current and past information and, if the future results are undesirable, the inputs to the system are changed to avoid the projected outcome. Many inventory ordering systems are essentially feed-forward controls: the system projects product sales over the relevant time period, identifies the current inventory level, and orders inventory sufficient to fulfill the sales demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define “preventive controls.”

A

“Before the fact” controls designed to stop an error or irregularity from occurring. Examples of preventive controls include locks on building and doors, password protected access to files, and segregation of duties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define “feedback controls.”

A

A procedure in which the results of a process are evaluated and, if the results are undesirable, the process is adjusted to correct the results; most detective controls are also feedback controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define “detective controls.”

A

“After the fact” controls designed to detect an error after it has occurred (though preferably before the erroneous information is used to update the database or appears in reports). Examples of detective controls include data entry edits (field checks, limit tests) and reconciliation of batch control totals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define “corrective controls.”

A

Paired with detective controls, they attempt to reverse the effects of the error or irregularity which has been detected. Examples of corrective controls include maintenance of backup files, disaster recovery plans, and insurance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define “internal control.

A

A process, effected by the entity’s Board of Directors, management, and other personnel, that is designed to provide reasonable assurance regarding the achievement of objectives in the following categories: effectiveness and efficiency of operations, reliability of financial reporting, and compliance with applicable laws and regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is an example of a detective control?

A

A. Use of pre-formatted screens for data entry.
B. Comparison of data entry totals to batch control totals.
C. Restricting access to the computer operations center to data-processing staff only.
D. Employing a file librarian to maintain custody of the program and data files.

ans. B Reconciliation of data entry totals with batch control totals will detect errors made by the data entry clerks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Milo Corp. maintains daily backups of its accounting system in a fireproof vault in the file library. Weekly, monthly, and annual backups are stored in a secure, fireproof vault at an off-site location.
Maintenance of the backup files is an example of

A

A. a detective control.
B. a feedback control.
C. a corrective control.
D. a preventive control.

ans. C Corrective controls allow the user to recover from a problem once it has been identified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following statements presents an example of a general control for a computerized system?

A

A. Limiting entry of sales transactions to only valid credit customers.
B. Creating hash totals from Social Security numbers for the weekly payroll.
C. Restricting entry of accounts payable transactions to only authorized users.
D. Restricting access to the computer center by use of biometric devices.

ans: D Restricting access to the computer center is an example of a general control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Review of the audit (also called transaction) log is an example of which of the following types of security control?

A

A. Governance.
B. Detective.
C. Preventive.
D. Corrective.

ans. B Reviewing an audit log is an example of a detective control since such reviews are useful in “detecting” problems in the system that have already occurred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A company’s new time clock process requires hourly employees to select an identification number and then choose the clock-in or clock-out button. A video camera captures an image of the employee using the system. Which of the following exposures can the new system be expected to change the least?

A

A. Fraudulent reporting of employees’ own hours.
B. Errors in employees’ overtime computation.
C. Inaccurate accounting of employees’ hours.
D. Recording of other employees’ hours.

ans: B This is the best answer. Computing overtime requires a calculation (total hours - normal hours = overtime hours) that is independent of the system described. That is, the addition of a time clock and video camera will not directly help in allocating hours worked between normal and overtime hours. In addition, the other answers are, bad choices. Therefore, this is the best answer of the available choices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Controls in the information technology area are classified into the categories of preventive, detective, and corrective. Which of the following is a preventive control?

A

A.
Contingency planning.

B. 	 Hash total.

C. 	 Echo check.

D. 	 Access control software.

ansL D
Access control software is a preventive control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

t/f

Creating a daily backup of a real-time transaction processing system is an example of a corrective control.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

t/f

A feedback control is a response in advance.

A

false

17
Q

t/f

Most detective controls are also feedback controls

A

true

18
Q

t/f
Providing user documentation, maintaining fire suppression equipment in the File Library, and using usernames and passwords to control access to the system are all examples of General Controls.

A

true

19
Q

t/f

Application controls are controls over the computing environment as a whole.

A

false

20
Q

t/f

Detective controls are more costly than preventive and corrective controls.

A

true

21
Q

t/f

Control objectives in a computerized environment are the same as those in a manual environment.

A

true