Information Technology Flashcards

1
Q

What is an advantage of using generalized audit software packages for a client that has EDP

A

It allows an auditor to perform audit tests on clients computer files while having only a limited understanding of the client’s IT environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Hot site

A

It has a redundant hardware and software ALREADy configured and ready to go so you have continuity of your operations in the event of a disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between a limit test and a validity test

A

Limit test - also called a reasonable test - designed to assure that all inputs are in an appropriate range of data ( example - someone can’t enter a birthdate that is before 1900) or enter a date like April 31st

A validity check - this is when data that has been input is compared to a list located permanently in the company. If they do not match the input amount is rejected

Validity and limit tests are both tests that ensure the accuracy of processing - therefore they are both processing controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is private key for encryption and what are its disadvantages

A

It a tiny bit of code that is used in asymmetric encryption used to transform an encrypted message into a readable format

one disadvantage is that both a sender and a receiver must have the key for it to work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Activity logs that indicate failed transactions provide information on what

A

They provide documentation about the existence of transactions that become part of the audit trail

Its an essential element of the audit trail in an EDI system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an integrated test facility and what does it allow you to do

A

You run fictitious transactions through a client’s system along with the client’s data to make certain that it is receiving the same treatment .

You can compare the actual results to the expected results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens in a parallel simulation

A

This is when you run the client’s data through an auditor developed software packaged.

Auditor can then compare the results to see if the client’s system processed the data similarly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is current or concurrency control and an example

A

This is a control that allows users to access limited resources on a first come - first serve basis and lock out all remaining once capacity has been filled

Example - Airline reservations. Passenger 1 - hits enter 2 seconds before passenger 2 locking 2 out of the last seat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a compensating control

A

this is a tat security measure that compensates for some other security measure that is deemed too difficult or impractical to implement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a data entry control?

A

A data entry control validates data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

EDI

A
  • Transactions are all uniformly formatted - using strict standards
  • Still will use software maintenance agreement because will need to update the software periodically
  • It is regulated by contract law - like all ordinary commerce
  • If you use a VAN to do your EDI - value added network - the cost is higher than using the internet because a VAN is privately owned
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a systems analyst do

A

They are responsible for the DESIGN of the system

  • need to make sure there is adequate documentation so that if the system analyst leaves someone else can follow their work
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a definition of cloud computing

A

t is a model that allows organizations to use the internet to access and use services on remote third-party technology infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is virtualization

A

This is a model where several virtual servers run on one physical host.

It is used for rapid application deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a VPN

A

Virtual Private Network

Using a VPN you can access network resources from remote locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What techniques are used to see if all data has been processed

A

record counts and hash totals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why and how do you use redundant data checks

A

Redundant data checks compare datant from two or more files to determine if they match

This is to make sure the computer has read the data properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How do you use check digit verification

A

This is one digit in a number that is created from a mathematical formula from other number in the field

It is used to identify inappropriate information in the field - lie a invalid product number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an input control and what are examples

A

An input control are computer controls designed to provide reasonable assurance that transactions are:

  • properly authorized before being processed by the computer
  • accurately converted before being recorded on the computer
  • and that is they are inaccurate are rejected, or corrected

Example - Edit Check - this is used to test the validity of data entered into a program for processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a mirrored web server

A

This is a complete duplicate of a computer system

  • it can be put into service immediately
  • it provides the best assurance of service continuity in the event of a natural disaster
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why do you use cryptocurrency - bitcoin

A

It allows customers to pay for goods or services from a website while maintaining financial privacy

It uses an intermediary so that you do not have to expose any sensitive or private credit or bank account information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a sight draft

A

A sight draft is a type of bill or exchange - the exporter holds the title of the goods transferred until the importer receives and pays for them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are application controls

A

These are designed to ensure that an individual computer application or process performs properly

It is particular to a specific process or subsystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a VAN and what does it do

A

Value added net work - it is privately owned

  • it is a way to link different companies computer files together
  • It routes datait transactions between trading partners
  • It is more expensive that the plain internet because it is private
  • its a private data communication system between business partners - because it is private - it is more secure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the difference between a cold, hot and warm site for disaster recovery

A

Cold - space available - but no equipment so will been d computers, and data loaded before operations can begin. It is when there is space available for operations. It would be when the delivery of duplicate computer hardware is prearranged, but not installed or read to operate.

Hot - off site location - completely ready to take over -

Warm site - it contains the hardware and equipment, but no copies of backed up data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is an ERP system

A

It is software that integrates all the business processes of an organization and incorporates data from all aspects of the organization’s activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are some of the benefits of a EDI system

A

This is when you electronically transfer funds from one entity to another

  • It reduces the time it takes to receive payment
  • This shortens the business cycle
  • This reduced the average and year-end receivables balances
  • must rely more on Internal controls because there is decreased documentation so an auditor will need to increase testing

It uses a an inventory program which can be used to automatically send an order to a supplier when quantities in stock drop below a certain level - so it reduces stock outs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

If you want to use the internet as a commercial network what must you do

A

As a company you need to be concerned about access to company information by unauthorized users - so you need to use firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are example of preventive, detective and corrective controls

A

Preventive - access controls to prevent unauthorized individuals from accessing the system

Detective - hash total is a detective contro. Echo check sis one as well (this is when you send the transmitted data back to the point of origin to compare it to the original data)

Corrective - contingency planning - designed to correct an error or irregularity and minimize consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is in a systems specification document

A

This details what the program will do and how it will operate. Included are the data elements needed of rte program to operate properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the control risks associated with micro computers

A
  • Data and software are generally more accessible in a microcomputer environment so unauthorized individuals can more readily access records and modify software

A micro computer is a small computer like a pc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are general controls for a computer system

A

They ensure the integrity of software and data files in the environment where computer systems are developed, maintained, and operated.

Biometric devices are an example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What do you use to detect unauthorized program changes

A

examine source code or program documentation to see if changes have been made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is translation software and when is it used

A

It is needed to convert transactions from the entity’s internal former to a standard EDI format

  • electronic data format
  • this is a computer to computer exchange of business documents using a standard electronic format between business partners
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is continuity planning

A

It focuses on how a company can most effectively restore and continue business operations following a disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is capacity planning

A

this refers to an IT function of optimizing IT infrastructure across the organization

37
Q

The design if an effective management reporting system

A
  • The types of decisions tpo be made has the biggest impact on the design of a system
  • If there is a lot of variability in decisions making the system will need to be more flexible
  • most systems are very scalable so the number of transactions, users or regulatory agencies has little impact on the system’s design
38
Q

What is a systems development life cycle

A

1 - planning

2 - analysisi

3 - design

4- development

5 - testing

6 - implementation

7 - maintenance

39
Q

What are some of the risks of ding an audit in an IT environment

A

Manual intervention - this the ability of someone to alter files by bypassing programs

Over-reliance - this is the risk that results will be accepted when it is the output of an IT system despite lack of support

Access - this is the risk that someone will get access to the system to destroy or alter data

40
Q

What is COBIT 5

A

This is the seamless integration of the system for governing IT with the system for governing the enterprise.

This is then applied to all components of the enterprise involved in the processing of information - internally or externally

41
Q

What is one of the most significant concerns for an auditor evaluating internal controls of an entity that processes sales transactions on the internet

A

The potential for computer disruptions in recording sales

This could result in unrecorded or unfulfilled sales

42
Q

What is message encryption software

A

This is software that encodes messages so that they can only be read by those who know or have a ket.

It increases security but adds costs to the system

43
Q

What is a three-tired architecture for client/server applications

A

desktop client

application

database

44
Q

What is a distributed processing environment -

A

This is when various processes are performed separately by the individuals responsible for them in their locations and are integrated into a central system

It is most beneficial with large volumes of data are generated at many locations and fast access is required

they avoid time delays associated with sending large amount of data to and from any central location

45
Q

What is a hash total

A

It is a number with no intrinsic meaning, but is used solely to determine that all transactions have been recorded

Invoice number added up

46
Q

A payroll processing system is described as

A

TPS - Transaction processing system

47
Q

What is an application firewall and why would you use them

A
  • they offer more control over application access, but are more expensive and difficult to implement
  • They allow additional user authentication features that protect programs and data
48
Q

what is a distributed or cooperative system

A

This is when there is no system programmer, data entry clerks, or tape librarians

Therefor the user management is the one responsible for making sure there are adequate backups made of software and data files

49
Q

What are AI info systems that learn from experience

A

Neural networks - like a brain

Case-based reasoning - its decision are made according to information stored in an archive of past cases - it learns from past experienced

Intelligent agents - Ai system that makes decisions based on rules, but can and will modify the rules as new information becomes available

50
Q

What are rule - based expert systems

A

these simply carry out programming commands which are pre-determined by the programmer - DOESNT learn from prior experience

51
Q

What is a digital signature used for

A

verify that the SENDER of the message and its content - not the recipient.

52
Q

What is the greatest risk with an EDI system

A

The risk that data may be inadvertently transmitted to unauthorized or improper users

53
Q

What are the responsibility of a system analyst

A

the installation and operating system upgrades

  • the development of application programs
54
Q

What are the responsibilities of a net work administrator

A

partially responsible of rte design and implementation is security policies

  • overseeing the day to day operations of the businesses networks
  • this would include eh managing of remote access in a multinational organization
55
Q

What is online processing

A

This involves processing transactions and updating files as the transactions occur and provide information on a timely basis

  • because it is entered as the transaction occurs -it will always be complete
  • this is why inline processing provides the most accurate and complete information for decision making
56
Q

What is the test data approach

A

This involves running data compiled by the auditor through the client It system , under the auditors control

The datant will have errors and be used to determine if the client’s IT system will deal with them appropriately

only those error you are interest in are included - not all conditions

57
Q

What is an executive support system

A

Executive support systems provide senior executives with access to internal and relevant external information to assist with making non-routine decisions involving competitors, acquisitions, and business cycles.

58
Q

What duties should be separated in an IT system

A

authorization (develop or authorize a program)

data entry (recording)

custody - access to outputs

59
Q

When would you use a sequence check

A

This is used to validate for a correct expected sequence of numbers in an entry. example - renumbered payroll checks

60
Q

updating and maintaining an operating system and compilers is the responsibility of who?

A

A systems programmer

61
Q

What is a compiler

A

It is a program that converts instructions into a chosen-code form so that they can be read and executed by a computer

62
Q

Why would you use bar codes to record info on parts used by the manufacturer

A

It will reduce costs and times involved in tracing and recording the use of parts in the manufacturing process

63
Q

What do you do in mapping

A

This is used to determine which elements correspond to the standards in eh EDU system

64
Q

When do you use decoding and translation

A

This is part of the process to convert the data into the appropriate form to enable the transaction

65
Q

What is job control language and how is it used

A
  • This is used in the computer’s operating system to perform scheduling, resource allocation, and data retrieval functions

Its the set of instructions for how to go about doing this

66
Q

What is a characteristic of an audit when the clients financial data is mostly electronic

A

the auditor would be concerned with the system as well as the individual transactions - therefore audit tests would be performed on a continuous basis - there would be less distinction between the phases of the audit

67
Q

What are logical views

A

This is the architectural view of the design of a system

It is a box an arrow system to see how functions within the system are connected - very high level

68
Q

What kind of segregation of duties should an applications programmer have

A

authorization -

Example: coding approved changes to a payroll system

69
Q

What does an online analytical processing system do

A

This enables users to interactively analyze data through operations such as consolidations, drill -down etc.

70
Q

What is message authentication

A

This protects the confidentiality of data by making sure that only authorized users have access and encryption

Id a system uses encryption - the system is stronger if the exception is done by physically secure hardware devices

71
Q

Why is an inventory subsidiary file likely to be a master file

A

Because it contain information that remains relatively consistent over time

72
Q

What are transactions files and examples

A

Payroll is an example of a transaction file or detail file - they contain information over a given period

Cash disbursement is another example

Cash receipts - same as well

73
Q

What is a digital certificate

A

It is an electronic document that is used to identify an individual.

It authenticate the web credentials of the sender and lets the recipient know the data is from a trusted source

74
Q

What do you do when you assess EDP control risk

A

Assessing EDP control risk is a matter that requires the application of judgement

It is not performed by software

75
Q

What is control reprocessing

A

This is when you run a client’s data through the client’s program using the auditors computer to verify that it is operating as indicated by the client

76
Q

What are example of when you would use test data ti test controls

A
  • to check for missing employee numbers
  • Agreement of hours per clock cards
  • Time tickets with invalid job numbers

You would not use test data to check for proper approval of overtime by supervisors

77
Q

What is a parity check

A

It is a hardware control that makes certain that each piece of data has the appropriate odd or even number of data components or data bits

78
Q

What is the objective of data security control

A

It is to protect the data

such as making sure the data is stored properly and is protected for unauthorized change or destruction

79
Q

What do systems analyst do

A

they examine problems and recommend an coordinate the development of solutions

80
Q

What is the primary purpose of a DBMS - stat base management system

A

The ability to access, summarize, create, and modify information contained in an electronic database

81
Q

Colter Corp. is conducting an analysis of a potential capital investment. The project is expected to increase sales by $100,000 and reduce costs by $50,000 annually. Depreciation expense is $30,000 per year. Colter’s marginal tax rate is 40%. What is the annual operating cash flow for the project?

A

102000

By increasing income by $100,000 and decreasing costs of $50,000, the project will increase annual cash inflow by $150,000.

With depreciation of $30,000 per year, the increase in taxable income will be $120,000 per year, resulting in additional income taxes of $120,000 x 40% or $48,000. The annual operating cash flow for the project is therefore $150,000 - $48,000, or $102,000.

82
Q

Tam Co. is negotiating for the purchase of equipment that would cost $100,000, with the expectation that $20,000 per year could be saved in after-tax cash costs if the equipment were acquired. The equipment’s estimated useful life is 10 years, with no residual value, and would be depreciated by the straight-line method. Tam’s predetermined minimum desired rate of return is 12%. Present value of an annuity of 1 at 12% for 10 periods is 5.65. Present value of 1 due in 10 periods at 12% is .322.

A

5.0

To calculate an internal rate of return, Tam must determine the interest rate at which the present value of the after-tax cash savings of $20,000 per year for 10 years is equal to the initial investment of $100,000. The formula for calculating the present value is:

 $20,000 x factor = $100,000 or factor = $100,000/$20,000 = 5.0

The factor on a table of present values, Tam will select the rate at which the factor, for 10 periods, is closest to 5.0.

83
Q

An entity is examining potential investments and notes that 1-year maturity yields are higher than those for 10-year maturities. Which of the following explanations for this occurrence is best?

The short-term investments have higher liquidity and therefore carry a higher rate of interest.

The short-term investments carry a more immediate default risk premium resulting in higher rates of return.

The long-term instruments provide a longer stream of investment income and therefore carry a lower rate of return.

Investors are expecting reduced inflation in the future as reflected in the lower long-term returns.

A

Typically, long-term yields are greater than short-term yields due to a maturity premium.

If investors expect low inflation in the future, the reduced or eliminated inflation premium may offset the maturity premium.

Investments with higher liquidity typically carry a lower rate of return than investments with low liquidity.

Long-term investments can have immediate default risk.

Long-term investments typically have a higher rate of return to compensate the investor for tying up the funds for longer than short-term investments.

84
Q

A company uses its fixed assets of $1,000,000 at 95% capacity to generate sales of $2,000,000. The company wishes to generate sales of $3,000,000. What amount of additional fixed assets must be acquired, assuming that all fixed assets will operate at maximum capacity?

A

425000

85
Q

The cost of debt most frequently is measured as

Actual interest rate adjusted for inflation

Actual interest rate plus a risk premium

Actual interest rate

Actual interest rate minus tax savings

A

actual interest rate minus tax savings

86
Q

Which of the following performance measures may lead a manager of an investment center to forgo investments that could benefit the company as a whole?

Residual income.

Return on investment.

Profitability index.

Economic value added.

A

ROI

A performance measure that could lead a manager to forgo a profitable investment would focus on profit percentage instead of absolute profit.

Return on investment (ROI) measures the profitability of an investment in relation to the average invested capital.

An investment may be profitable, but if the investment would decrease the company’s overall ROI it may be forgone.

87
Q

A lender and a borrower signed a contract for a $1,000 loan for one year. The lender asked the borrower to pay 3% interest. Inflation occurred and prices rose by 2% over the next year. The borrower repaid $1,030. What is the amount worth in real terms, after inflation?

A

At a rate of inflation of 2%, $102 dollars at the end of the period are equivalent to $100 at the beginning. As a result, $1,030 at the end of the year would be equivalent to $1,030 x 100/102 or $1009.89.

88
Q

Para Co. is reviewing the following data relating to an energy saving investment proposal:

Cost $50,000
Residual value at the end of 5 years $10,000
Present value of an annuity of $1 at 12% for 5 years 3.60
Present value of $1 due in 5 years at 12% 0.57

What would be the annual savings needed to make the investment realize a 12% yield?

A

In order to realize a 12% yield, the present value of the annual savings for 5 years plus the present value of the residual value at the end of 5 years, both discounted at 12%, must be equal to the $50,000 investment. The present value of the residual value at the end of 5 years is $10,000 x .57 = $5,700. As a result, the present value of the annual savings for 5 years must be equal to the difference of $50,000 - $5,700 or $44,300. Since the present value factor for an annuity for 5 years at 12% is 3.60, the annual savings would be $44,300/3.60 = $12,306 to realize a 12% yield.