Information Technology Flashcards

1
Q

A unique characteristic of EDI is?

A

A unique characteristic of EDI is that transactions are UNIFORMLY FORMATTED so that they can be transmitted among parties electronically. EDI transactions, like all transactions, are REQUIRED to be reported in accordance with GAAP. Most e-commerce, including EDI transactions, is CONDUCTED over the INTERNET. EDI transactions are formatted using standards that are uniform worldwide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

One way the auditor can determine if data is altered during processing is?

A

One way the auditor can determine if data is ALTERED during processing is to run the AUDITOR’S OWN DATA through the CLIENT’S COMPUTER SYSTEM, referred to as the TEST DATA APPROACH, to determine if the results match the auditor’s expectations. If payroll data was altered during processing, the results would not match the auditor’s expectations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An embedded audit module is?

A

An EMBEDDED AUDIT module is an AUDIT SYSTEM that is INSERTED into the CLIENT’S SYSTEM so that it can apply audit procedures to data as it is being processed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A snapshot application involves?

A

A SNAPSHOT APPLICATION involves applying procedures to a SPECIFIC SET of data or at a SPECIFIC POINT in time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An integrated data check involves?

A

An INTEGRATED DATA check involves integrating test data with the client’s data so that the auditor can see how the client’s system processes it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A test data generator is?

A

A TEST DATA generator is used to develop data to be run through the client’s system to test it. The test data approach, allows the auditor to introduce examples of VALID and INVALID transactions to determine how the client’s system will handle them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Parallel simulation involves?

A

Parallel simulation involves running client data through a program that is under the CONTROL of the AUDITOR that is presumed to be IDENTICAL to the client’s program, enabling the auditor to detect UNAUTHORIZED modifications to the program if the output differs from the client’s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A firewall is?

A

A FIREWALL is set up as an ELECTRIC BOUNDARY to prevent a user from having access to programs or data that they are not authorized to have.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Heuristic refers to?

A

Heuristic refers to a method of analysis based on RULES, rather than LOGIC and is not related to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mapping is?

A

Mapping is used to determine which elements correspond to the standards in an EDI system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Decoding, translation and encryption are?

A

Decoding, translation and encryption are all part of the process to CONVERT the data into the appropriate form to enable the transaction (decoding and translation) and to limit access to the intended party (encryption).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An embedded audit module is?

A

An embedded audit module is an audit system INSERTED into the client’s system as a monitoring device to apply audit procedures to client data throughout the period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly