Quiz (October 7, 2021) Flashcards

1
Q

Check digits are designed to detect transcription errors.

T or F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Passwords for microcomputer software programs are designed to prevent unauthorized use of the software.

T or F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Auditing around the computer is also known as white box approach.

T or F?

A

FALSE

Auditing around the computer is also known as black box approach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When auditing around the computer, the independent auditor focuses solely upon the source documents and the CIS output.

T or F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The same internal control objectives apply to manual and computer-based information system.

T or F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tests of controls determine whether the database contents fairly reflect the organization’s transactions.

T or F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In auditing through a computer, the test data method is used by auditors to test the procedures contained within the program.

T or F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Output controls are designed to assure that information generated by the computer are used appropriately by management.

T or F?

A

FALSE

Output controls are not designed to assure that information generated by the computer are used appropriately by management.

Output controls are designed to detect errors after the processing is completed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pilot simulation is one of the three categories of testing strategies when auditing through the computer.

T or F?

A

FALSE

Three categories of testing strategies:
- test data approach
- parallel simulation
- embedded audit module.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A method of testing application controls that utilizes a generalized audit software package prepared by the auditors.

A

PARALLEL SIMULATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It is employed to prevent unauthorized alteration of on-line records.

A

DATABASE ACCESS CONTROLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Controls which are designed to assure that the data will be processed by the computer is authorized, complete, and accurate are called _____.

A

INPUT CONTROLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The auditor’s objective to determine whether the client’s computer programs can correctly handle valid and invalid transactions as they arise is accomplished through _________.

A

TEST DATA APPROACH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The process of assessing control risk considering only non IT
controls is known as _______.

A

AUDITING AROUND THE COMPUTER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The audit approach in which the auditor runs his/her own program on a controlled basis in order to verify the client’s data recorded in a machine language is ______.

A

GENERALIZED AUDIT SOFTWARE APPROACH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

It involves application of auditing procedures using the computer as an audit tool and it includes computer programs and data the auditor uses as part of the audit procedures to process data of audit significance contained in an entity’s information systems.

A

COMPUTER-ASSISTED AUDIT TECHNIQUE

17
Q

A computer-assisted auditing technique that allows fictitious and real transactions to be processed together without client operating personnel being aware of the testing process.

A

INTEGRATED TEST FACILITY

18
Q

A computer-assisted auditing technique that inserts an audit module in the client’s application system to identify specific types of transactions.

A

EMBEDDED AUDIT MODULE

19
Q

Totals of amounts in computer record data fields, which are not
usually added but are used only for data processing control
purposes are called ______.

A

HASH TOTALS

20
Q

Controls over output are not designed to assure that the data generated by the computer are relevant.

T or F?

A

TRUE