New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
auditing assurance services
Information Systems Control And Audit 1st Edition Ron Weber - Solutions
In a local area network, the most critical control component is likely to be the:a. Fiber-optic cablesb. File serverc. Cable scannerd. User workstations
Give a decision that operations management might make on the basis of data recorded on the maintenance \(\log\) prepared for a machine.
Which of the following guidelines applies to the design of keying tasks to increase the effectiveness and efficiency of the data preparation function?a. Keying tasks should be no longer than an hourb. To the extent possible, operators should always key the same application system's datac. Keying
Briefly describe how a maintenance engineer might violate data integrity during the maintenance of hardware. Give two controls that might be exercised over the engineer to inhibit or prevent the integrity violation you describe.
Which of the following design guidelines should be followed to reduce the likelihood of repetition strain injury?a. Ensure that the data preparation area is brightly lit so keyboard operators can read source documents easilyb. Ensure that all seats are at a uniform height so all keyboard operators
What is the overall purpose of a network control terminal in a wide area communications network? Give three specific functions that can be performed by an operator using a network control terminal.
Which of the following is not a function of the production control section?a. Dispatching input received from an outside party to the computer roomb. Scheduling of production jobsc. Follow-up on unpaid accounts if the information systems function uses a transfer-pricing schemed. Altering source
Why is a network control terminal a threat to the overall security of a communications network? What controls should be exercised to try to ensure that a network control terminal is used only for its intended purposes?
Which of the following activities should not be performed by control section personnel when they collect the output of a batch application system from the computer room?a. Checking to see the output has been produced according to the production scheduleb. One-to-one reconciliation of input with
List two aspects of the operations of a local area network that need to be monitored to ensure that data integrity within the network is maintained. Briefly explain why these two aspects need to be monitored.
Which of the following is not a function of production control personnel in terms of production scheduling?a. Assisting with the establishment of the production scheduleb. Preparing job control filesc. Establishing access controls over job control filesd. Testing job control files
Why do file servers within a local area network need to be physically secured?
Which of the following is unlikely to be a responsibility of the production control section with respect to the management of service-level agreements?a. Ensuring that documentation of service-level agreements is up-to-dateb. Monitoring user complaints relating to noncompliance with service-level
Briefly describe some guidelines that should be followed to reduce operator boredom in the design of keying tasks undertaken in the data preparation function.
Which of the following is not a responsibility of the production control section with respect to transfer pricing of information systems services?a. Determining the prices to be charged for information systems development workb. Following up with users on unpaid accountsc. Monitoring user
What responsibilities does operations management have with respect to backup and recovery in the data preparation function?
Which of the following is not a responsibility of the production control section with respect to acquisition of consumables that the information systems function uses?a. Ensuring that consumables are stored securelyb. Monitoring the price and quality of consumables usedc. Issuing consumables only
Briefly describe the production control section's responsibilities with respect to receipt of input from and dispatch of output to external users of the information systems function.
Which of the following is unlikely to be a capability of an automated library system for removable storage media?a. Preparing reports indicating times when the temperature and dust levels in the room where storage media are stored reached unacceptable levelsb. Recording the history of read/write
Briefly describe the production control section's responsibilities with respect to job scheduling.
Which of the following reflects good control over use of removable storage media?a. Only computer operators should remove storage media from the file libraryb. Sensitive files and nonsensitive files should not be stored on the same removable storage mediumc. Project managers should maintain records
From a control perspective, why is it important to have user complaints about information systems services directed to production control personnel?
Which of the following decisions most likely could not be made on the basis of file management reports prepared from the storage media maintenancea. Whether to move files from one storage medium to another to reduce read/write errorsb. Whether a storage medium should be retiredc. Whether a master
What are the production control section's responsibilities with respect to transfer-pricing charges in terms of:a. Internal users of the information systems function's services?b. The information systems function as a user of an outside service bureau's services?
Which of the following actions should be undertaken when a file retention date expires?a. The storage medium on which the file resides should be retired from useb. The file should be removed to archival storagec. The file should be purgedd. The file should be retrieved from backup storage
What are the production control section's responsibilities with respect to acquisition of consumables used by the information systems function?
Removable storage media should not remain unused for long periods of time because:a. The data they contain will become out-of-dateb. The risk of read/write errors occurring with the media increasesc. The likelihood of unauthorized access occurring to the media increasesd. It becomes more difficult
Briefly describe two controls that should exist over storage of removable storage media for:a. A mainframe computer with a large number of usersb. A microcomputer with only one user
The purpose of deleting data from magnetic tapes before the ends are clipped is to:a. Indicate which section of the tape should be clippedb. Protect the privacy of datac. Prevent damage to the data on the taped. Relieve pressure from the tape hub
Briefly describe the controls that should exist over use of removable storage media in a mainframe computer environment.
With respect to off-site storage of backup files, which of the following tasks is most likely to be undertaken by the operations manager:a. Transporting backup files to off-site storageb. Determining the frequency of backup for an application systemc. Choosing the site for off-site storage of
Why should removable storage media not remain unused for a long period of time?
Which of the following is least likely to be a function of a documentation librarian:a. Ensuring that access rights to documentation are given only to the appropriate personnelb. Ensuring that documentation is stored securelyc. Ensuring that adequate backup exists for documentationd. Ensuring that
Why must care be taken if removable storage media is sent to an outside organization for cleaning and repair?
Which of the following is least likely to be a function of a documentation librarian with respect to an organization's inventory of acquired or licensed software?a. Ensuring that the software is backed up properlyb. Ensuring that use of licensed software complies with the terms of the agreement in
Briefly explain the file librarian's responsibilities with respect to backup storage media in a mainframe computer environment. What responsibilities do microcomputer users have with respect to backup storage media?
Which of the following is least likely to be a function performed by the help desk/technical support area?a. Modifying end-user databases to correct errors and irregularitiesb. Acquiring hardware and software on behalf of end usersc. Determining the source of problems with production systems and
Briefly explain the documentation librarian's responsibilities with respect to documentation. Why should programmers be prevented from having unrestricted access to program documentation?
Which of the following decisions most likely could not be made on the basis of performance monitoring statistics that are calculated:a. Whether the system being monitored has provided users with a strategic advantage over their competitorsb. Whether new hardware/system software resources are
What controls should exist over an organization's inventory of acquired and licensed programs?
Which of the following is unlikely to be a function performed by operations management with respect to the outsourcing contracts entered into by an organization:a. Ensuring compliance with the outsourcing contract's terms and conditionsb. Choosing the outsourcing vendor to be used by the
Briefly describe two requirements that must be met if the help desk/technical support area is to function effectively and efficiently.
Briefly describe the responsibilities of operations management with respect to capacity planning and performance monitoring. What decisions does an operations manager make on the basis of the performance monitoring data that is collected?
Why does operations management need to continuously monitor the financial viability of any outsourcing vendor that their organization uses?
Identify two items that operations management most likely will monitor with respect to compliance with the terms and conditions of an outsourcing contract.
What part might a third-party auditor play in providing operations management with information on the reliability of an outsourcing vendor's controls?
What part does operations management play with respect to the disaster recovery controls associated with an outsourcing contract?
Give three attributes of a high-quality program.
What are the major phases in the program development life cycle? Which phase is a phantom phase? Briefly explain why it is a phantom phase.
What is the overall purpose of the planning phase in the program development life cycle? List four major decisions that have to be made during the planning phase.
Briefly describe how the following software cost-estimation techniques differ:a. Expert judgment versus analogyb. Top-down estimation versus bottom-up estimation
Briefly describe two concerns auditors might have when evaluating the planning phase of the program development life cycle.
Briefly describe the two major purposes of the control phase of the program development life cycle.
How do techniques like Work Breakdown Structures, Gantt charts, and PERT charts help during the control phase of the program development life cycle?
What functions might program library software perform during the control phase of the program development life cycle?
What evidence-collection techniques might auditors use to determine whether controls are operating reliably in the control phase of the program development life cycle?
What is likely to be an auditor's primary concern about the ways programmers undertake the design phase of the program development life cycle?
What concerns should auditors have about the conduct of the program development life cycle design phase in an organization where program development is primarily undertaken by end users who employ high-level programming languages?
During the coding phase of the program development life cycle, what is meant by the module implementation and integration strategy? Briefly explain the nature of a threads module implementation and integration strategy.
Why should auditors be concerned to see that programmers follow the precepts of structured programming when they undertake program coding? What evidence should we collect to determine whether programmers comply with structured programming precepts?
Briefly describe two types of automated tools that programmers might use to assist them in their coding work. Why should auditors have increased confidence in the quality of the coding process if we find that programmers are using these tools?
List two guidelines that programmers should follow if they are concerned about improving the readability of the program code they write.
List seven major steps in the conduct of program testing.
Briefly explain the difference between unit testing, integration testing, and whole-of-program testing.
Briefly explain the difference between static analysis tests and dynamic analysis tests. For each type of test, give two types of automated tools that programmers might use to help them conduct testing.
Briefly describe the relationship between desk checking, structured walkthroughs, and design and code inspections.
Briefly explain the difference between:a. black-box testing and white-box testingb. big-bang testing and incremental testingc. top-down testing and bottom-up testingd. acceptance testing and installation testing
In the context of the program development life cycle, what is the primary concern auditors have about the operational use of programs?
Briefly explain the difference between repair maintenance, adaptive maintenance, and perfective maintenance. Why are auditors concerned with controls over all types of program maintenance?
What two factors should have a major impact on the way programming teams are organized?
Give three advantages that a chief programmer team structure has over traditional organization structures for programming teams. Give one potential disadvantage of the chief programmer team structure.
Briefly explain the role of the librarian in a chief programmer team. What duties does the librarian have with respect to the program production library? How does the librarian role inhibit unauthorized program modifications?
Give two motivations for organizing programmers as an adaptive team. What are the differences between a chief programmer team and an adaptive team?
Briefly explain the nature of a controlled-decentralized programming team. Give an example of a programming project in which you think a controlleddecentralized team would be more successful than other types of programming team structures.
Give two reasons why it is difficult to control the work of system programmers.
List two controls that might be used over the activities of system programmers.
Which of the following phases in the program development life cycle is most likely to be a "phantom" phase?a. Control phaseb. Design phasec. Operation and maintenance phased. Coding phase
Which of the following cost-estimation techniques depends most on the fact that a similar project has been undertaken already and resource estimates can be based on this previous project?a. Bottom-up estimationb. Analogyc. Algorithmic modelsd. Top-down estimation
Which of the following factors should have least effect on the ways planning activities are undertaken?a. Whether the software is to be developed or acquiredb. The size of the software project c.The level of uncertainty surrounding the software projectd. Whether the project is to be undertaken by
Which of the following is least likely to be a purpose of using Work Breakdown Structures, Gantt charts, and PERT charts?a. To identify what tasks must be undertaken in a project b. To evaluate the consequences of late or early completion of a taskc. To ensure the activities undertaken in a task
Which of the following is not a function of program library software?a. Controlling access to object code via passwordsb. Maintaining an audit trail of changes to source codec. Testing the accuracy and completeness of acquired softwared. Preserving separation between test and production program
From an audit perspective, which of the following statements about the design phase of the program development life cycle is true?a. Program documentation provides little evidence about the quality of the design approach used during software development b. Object-oriented approaches to design are
Which of the following is a disadvantage of a bottom-up module implementation and integration strategy?a. Low-level modules that perform critical input-output functions are not tested firstb. The overall operation of the program is often difficult to observe until late in its implementationc. The
Which of the following is not an allowable control structure in structured programming?a. Conditional repetitionb. Unconditional branchc. Simple sequenced. Selection based on a test
Which of the following automated tools is unlikely to be used during the coding phase of the program development life cycle?a. Execution path monitorb. User-interface management systemc. Shorthand preprocessord. CASE tool
Which of the following documentation guidelines should not be followed during program coding?a. Use mnemonic names for variables but not constantsb. Indent conditional testsc. Use program header comments to explain the overall purpose of the programd. Group related types of code together
Which of the following statements about design and code inspections is true?a. They are performed by the programmer who coded the program to be testedb. They are less costly to undertake than desk checkingc. They are a type of dynamic analysis testing procedured. They are more formal to carry out
White-box testing is most often used as a form of:a. Top-down testingb. Big-bang testingc. Unit testingd. Acceptance testing
Adaptive maintenance must be undertaken when:a. Logic errors are discovered in a programb. The program must be tuned to decrease resource consumptionc. The program's execution time is unacceptabled. User needs change and the program must be altered
The purpose of configuration management software is to:a. Facilitate control over the program maintenance processb. Allow programmers to be relatively unconcerned about the hardware/software platform on which their programs will runc. Tune a program to minimize resource consumptiond. Monitor the
A chief programmer team is:a. A project-based organizational structureb. A team with decentralized controlc. A team structured to facilitate innovative problem solving d A team where each member has low autonomy
In a chief programmer team, the backup programmer:a. Ensures that the resources needed for recovery of programs in the event of disaster are workingb. Must be capable of assuming the chief programmer's duties at any timec. Ensures all program documentation is authentic, complete, and up to dated.
In an adaptive team, the leader is:a. The chief programmerb. The programming managerc. The person having most expertise with the task at handd. No one-an adaptive team never has a team leader
Controlled-decentralized teams probably work best when:a. Information flows must occur from the inside outb. Only senior programmers participate in the teamc. The programming task is large and difficultd. The software development project is subject to a tight deadline
Control problems arise with a system programming group because:a. It is impossible to enforce separation of duties within the groupb. The group's creativity is undermined when controls are exercised over their workc. They can only carry out their work when production systems are executingd. It is
In the long-run, which of the following control measures over system programmers is likely to be the most effective?a. Separate duties among system programmers to the extent possibleb. Have management lead by example with high ethical behavior and communicate to all employees that they must follow
In an ex post general review audit of the systems development process, the auditor's primary objective is to:a. Evaluate a specific system to determine whether the necessary controls have been included in the designb. Carry out a substantive test of the systems development process for all
The auditor uses a normative model of the system development process as a basis for:a. Determining the activities that should be carried out during systems developmentb. Determining what activities are usually undertaken during systems developmentc. Describing the activities that are, in fact,
A major difference between the life-cycle approach and the sociotechnical design approach to systems development is:a. The sociotechnical design approach deemphasizes project-control techniquesb. The sociotechnical design approach gives more emphasis to joint design of the technical and social
Under the political approach to systems development, user participation in the design process is an important means of reducing behavioral implementation problems when:a. The system will alter the existing power structure in the organizationb. Face-to-face negotiation has not been successfulc. A
Showing 1200 - 1300
of 2689
First
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Last
Step by Step Answers