New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
model based testing for embedded systems
Wiley CPA Exam Review Problems And Solutions Vol 2 2011-2012 38th Edition O. Ray Whittington, Patrick R. Delaney - Solutions
Internal control is ineffective when computer department personnela. Participate in computer software acquisition decisions.b. Design documentation for computerized systems.c. Originate changes in master files.d. Provide physical security for program files.
Which of the following most likely represents a significant deficiency in internal control?a. The systems analyst reviews applications of data processing and maintains systems documentation.b. The systems programmer designs systems for computerized applications and maintains output controls.c. The
Which of the following is an example of a check digit?a. An agreement of the total number of employees to the total number of checks printed by the computer.b. An algebraically determined number produced by the other digits of the employee number.c. A logic test that ensures all employee numbers
A control feature in an electronic data processing system requires the central processing unit (CPU) to send signals to the printer to activate the print mechanism for each character. The print mechanism, just prior to printing, sends a signal back to the CPU verifying that the proper print
Which of the following is a computer test made to ascertain whether a given characteristic belongs to the group?a. Parity check.b. Validity check.c. Echo check.d. Limit check.
Which of the following is an example of a validity check?a. The computer ensures that a numerical amount in a record does not exceed some predetermined amount.b. As the computer corrects errors and data are successfully resubmitted to the system, the causes of the errors are printed out.c. The
Which of the following input controls is a numeric value computed to provide assurance that the original value has not been altered in construction or transmission?a. Hash total.b. Parity check.c. Encryption.d. Check digit.
Which of the following controls most likely would assure that an entity can reconstruct its financial records?a. Hardware controls are built into the computer by the computer manufacturer.b. Backup diskettes or tapes of files are stored away from originals.c. Personnel who are independent of data
The possibility of erasing a large amount of information stored on magnetic tape most likely would be reduced by the use ofa. File protection rings.b. Check digits.c. Completeness tests.d. Conversion verification.
When computer programs or files can be accessed from terminals, users should be required to enter a(n)a. Parity check.b. Personal identification code.c. Self-diagnosis test.d. Echo check.
For the accounting system of Acme Company, the amounts of cash disbursements entered into a terminal are transmitted to the computer that immediately transmits the amounts back to the terminal for display on the terminal screen. This display enables the operator toa. Establish the validity of the
The use of a header label in conjunction with magnetic tape is most likely to prevent errors by thea. Computer operator.b. Keypunch operator.c. Computer programmer.d. Maintenance technician.
Which of the following activities would most likely be performed in the information systems department?a. Initiation of changes to master records.b. Conversion of information to machine-readable form.c. Correction of transactional errors.d. Initiation of changes to existing applications.
Which of the following controls is a processing control designed to ensure the reliability and accuracy of data processing?Limit test Validity check testa. Yes Yesb. No Noc. No Yesd. Yes No
In entering the billing address for a new client in Emil Company’s computerized database, a clerk erroneously entered a nonexistent zip code. As a result, the first month’s bill mailed to the new client was returned to Emil Company.Which one of the following would most likely have led to
A customer intended to order 100 units of product Z96014, but incorrectly ordered nonexistent product Z96015. Which of the following controls most likely would detect this error?a. Check digit verification.b. Record count.c. Hash total.d. Redundant data check.
An entity has the following invoices in a batch:Invoice # Product Quantity Unit price 201 F10 150 $ 5.00 202 G15 200 $10.00 203 H20 250 $25.00 204 K35 300 $30.00 Which of the following most likely represents a hash total?a. FGHK80b. 4c. 204d. 810
Which of the following security controls would best prevent unauthorized access to sensitive data through an unattended data terminal directly connected to a mainframe?a. Use of a screen saver with a password.b. Use of workstation scripts.c. Encryption of data files.d. Automatic log-off of inactive
Computer program libraries can best be kept secure bya. Installing a logging system for program access.b. Monitoring physical access to program library media.c. Restricting physical and logical access.d. Denying access from remote terminals.
Preventing someone with sufficient technical skill from circumventing security procedures and making changes to production programs is best accomplished bya. Reviewing reports of jobs completed.b. Comparing production programs with independently controlled copies.c. Running test data
To avoid invalid data input, a bank added an extra number at the end of each account number and subjected the new number to an algorithm. This technique is known asa. Optical character recognition.b. A check digit.c. A dependency check.d. A format check.
Which of the following are essential elements of the audit trail in an electronic data interchange (EDI) system?a. Network and sender/recipient acknowledgments.b. Message directories and header segments.c. Contingency and disaster recovery plans.d. Trading partner security and mailbox codes.
Which of the following is an essential element of the audit trail in an electronic data interchange (EDI) system?a. Disaster recovery plans that ensure proper backup of files.b. Encrypted hash totals that authenticate messages.c. Activity logs that indicate failed transactions.data.
Which of the following statements is correct concerning the security of messages in an electronic data interchange(EDI) system?a. When the confidentiality of data is the primary risk, message authentication is the preferred control rather than encryption.b. Encryption performed by physically secure
Which of the following statements is correct concerning internal control in an electronic data interchange (EDI)system?a. Preventive controls generally are more important than detective controls in EDI systems.b. Control objectives for EDI systems generally are different from the objectives for
When evaluating internal control of an entity that processes sales transactions on the Internet, an auditor would be most concerned about thea. Lack of sales invoice documents as an audit trail.b. Potential for computer disruptions in recording sales.c. Inability to establish an integrated test
To properly control access to accounting database files, the database administrator should ensure that database system features are in place to permita. Read-only access to the database files.b. Updating from privileged utilities.c. Access only to authorized logical views.d. User updates of their
In a large organization, the biggest risk in not having an adequately staffed information center help desk isa. Increased difficulty in performing application audits.b. Inadequate documentation for application systems.c. Increased likelihood of use of unauthorized program code.d. Persistent errors
Good planning will help an organization restore computer operations after a processing outage. Good recovery planning should ensure thata. Backup/restart procedures have been built into job streams and programs.b. Change control procedures cannot be bypassed by operating personnel.c. Planned
Pirated software obtained through the Internet may lead to civil lawsuits or criminal prosecution. Of the following, which would reduce an organization’s risk in this area?I. Maintain a log of all software purchases.II. Audit individual computers to identify software on the computers.III.
A company often revises its production processes. The changes may entail revisions to processing programs. Ensuring that changes have a minimal impact on processing and result in minimal risk to the system is a function ofa. Security administration.b. Change control.c. Problem tracking.d.
A manufacturer is considering using bar-code identification for recording information on parts used by the manufacturer.A reason to use bar codes rather than other means of identification is to ensure thata. The movement of all parts is recorded.b. The movement of parts is easily and quickly
A corporation receives the majority of its revenue from top-secret military contracts with the government. Which of the following would be of greatest concern to an auditor reviewing a policy about selling the company’s used microcomputers to outside parties?a. Whether deleted files on the hard
Some companies have replaced mainframe computers with microcomputers and networks because the smaller computers could do the same work at less cost. Assuming that management of a company decided to launch a downsizing project, what should be done with respect to mainframe applications such as the
Minimizing the likelihood of unauthorized editing of production programs, job control language, and operating system software can best be accomplished bya. Database access reviews.b. Compliance reviews.c. Good change-control procedures.d. Effective network security software.
Output controls ensure that the results of computer processing are accurate, complete, and properly distributed.Which of the following is not a typical output control?a. Reviewing the computer processing logs to determine that all of the correct computer jobs executed properly.b. Matching input
A “hot site” is most frequently associated witha. Disaster recovery.b. Online relational database design.c. Source programs.d. Temperature control for computer.
A widely used disaster recovery approach includesa. Encryption.b. Firewalls.c. Regular backups.d. Surge protectors.
Almost all commercially marketed software is Copyrighted Copy protecteda. Yes Yesb. Yes Noc. No Yesd. No No
Which of the following procedures would an entity most likely include in its disaster recovery plan?a. Convert all data from EDI format to an internal company format.b. Maintain a Trojan horse program to prevent illicit activity.c. Develop an auxiliary power supply to provide uninterrupted
A company is concerned that a power outage or disaster could impair the computer hardware’s ability to function as designed. The company desires off-site backup hardware facilities that are fully configured and ready to operate within several hours. The company most likely should consider aa.
Which of the following procedures would an entity most likely include in its computer disaster recovery plan?a. Develop an auxiliary power supply to provide uninterrupted electricity.b. Store duplicate copies of critical files in a location away from the computer center.c. Maintain a listing of
Which of the following is a password security problem?a. Users are assigned passwords when accounts are created, but do not change them.b. Users have accounts on several systems with different passwords.c. Users copy their passwords on note paper, which is kept in their wallets.d. Users select
Which of the following passwords would be most difficult to crack?a. OrCa!FlSib. languagec. 12 HOUSE 24d. pass56word
In building an electronic data interchange (EDI) system, what process is used to determine which elements in the entity’s computer system correspond to the standard data elements?a. Mapping.b. Translation.c. Encryption.d. Decoding.
Which of the following is an encryption feature that can be used to authenticate the originator of a document and ensure that the message is intact and has not been tampered with?a. Heuristic terminal.b. Perimeter switch.c. Default settings.d. Digital signatures.
A retail entity uses electronic data interchange (EDI) in executing and recording most of its purchase transactions.The entity’s auditor recognized that the documentation of the transactions will be retained for only a short period of time. To compensate for this limitation, the auditor most
Which of the following is an example of how specific controls in a database environment may differ from controls in a nondatabase environment?a. Controls should exist to ensure that users have access to and can update only the data elements that they have been authorized to access.b. Controls over
Which of the following is a network node that is used to improve network traffic and to set up as a boundary that prevents traffic from one segment to cross over to another?a. Router.b. Gateway.c. Firewall.d. Heuristic.
Which of the following is usually a benefit of transmitting transactions in an electronic data interchange (EDI)environment?a. A compressed business cycle with lower year-end receivables balances.b. A reduced need to test computer controls related to sales and collections transactions.c. An
Which of the following statements most likely represents a disadvantage for an entity that keeps microcomputerprepared data files rather than manually prepared files?a. Random error associated with processing similar transactions in different ways is usually greater.b. It is usually more difficult
Which of the following statements is correct concerning internal control when a client is using an electronic data interchange system for its sales?a. Controls should be established over determining that all suppliers are included in the system.b. Encryption controls may help to assure that
Which of the following is not considered an exposure involved with electronic data interchange (EDI) systems as compared to other systems?a. Increased reliance upon computer systems.b. Delayed transaction processing time.c. Possible loss of confidentiality of information.d. Increased reliance upon
Many entities use the Internet as a network to transmit electronic data interchange (EDI) transactions. An advantage of using the Internet for electronic commerce rather than a traditional value-added network (VAN) is that the Interneta. Permits EDI transactions to be sent to trading partners as
Which of the following represents an additional cost of transmitting business transactions by means of electronic data interchange (EDI) rather than in a traditional paper environment?a. Redundant data checks are needed to verify that individual EDI transactions are not recorded twice.b. Internal
Which of the following is considered a component of a local area network?a. Program flowchart.b. Loop verification.c. Transmission media.d. Input routine.
Which of the following characteristics distinguish electronic data interchange (EDI) from other forms of electronic commerce?a. The cost of sending EDI transactions using a value-added network (VAN) is less than the cost of using the Internet.b. Software maintenance contracts are unnecessary
Which of the following would an auditor ordinarily consider the greatest risk regarding an entity’s use of electronic data interchange (EDI)?a. Authorization of EDI transactions.b. Duplication of EDI transmissions.c. Improper distribution of EDI transactions.d. Elimination of paper documents.
Securing client/server systems is a complex task because of all of the following factors except:a. The use of relational databases.b. The number of access points.c. Concurrent operation of multiple user sessions.d. Widespread data access and update capabilities.
To reduce security exposure when transmitting proprietary data over communication lines, a company should usea. Asynchronous modems.b. Authentic techniques.c. Call-back procedures.d. Cryptographic devices.
Which of the following statements is correct regarding the Internet as a commercially viable network?a. Organizations must use firewalls if they wish to maintain security over internal data.b. Companies must apply to the Internet to gain permission to create a homepage to engage in electronic
End-user computing is most likely to occur on which of the following types of computers?a. Mainframe.b. Minicomputers.c. Personal computers.d. Personal reference assistants.
End-user computing is an example of which of the following?a. Client/server processing.b. A distributed system.c. Data mining.d. Decentralized processing.
An auditor is least likely to find that a client’s data is input througha. Magnetic tape reader.b. Dynamic linking character reader.c. Point-of-sale recorders.d. Touch sensitive screens.
In traditional information systems, computer operators are generally responsible for backing up software and data files on a regular basis. In distributed or cooperative systems, ensuring that adequate backups are taken is the responsibility ofa. User management.b. Systems programmers.c. Data entry
Methods to minimize the installation of unlicensed microcomputer software include all of the following except:a. Employee awareness programs.b. Regular audits for unlicensed software.c. Regular monitoring of network access and start-up scripts.d. An organizational policy that includes software
Which of the following risks is not greater in an electronic funds transfer (EFT) environment than in a manual system using paper transactions?a. Unauthorized access and activity.b. Duplicate transaction processing.c. Higher cost per transaction.d. Inadequate backup and recovery capabilities.
Which of the following risks is more likely to be encountered in an end-user computing (EUC) environment as compared to a mainframe computer system?a. Inability to afford adequate uninterruptible power supply systems.b. User input screens without a graphical user interface(GUI).c. Applications that
The internal auditor is reviewing a new policy on electronic mail. Appropriate elements of such a policy would include all of the following except:a. Erasing all employee’s electronic mail immediately upon employment termination.b. Encrypting electronic mail messages when transmitted over phone
Which of the following is likely to be a benefit of electronic data interchange (EDI)?a. Increased transmission speed of actual documents.b. Improved business relationships with trading partners.c. Decreased liability related to protection of proprietary business data.d. Decreased requirements for
A company’s management is concerned about computer data eavesdropping and wants to maintain the confidentiality of its information as it is transmitted. The company should utilizea. Data encryption.b. Dial-back systems.c. Message acknowledgement procedures.d. Password codes.
The use of message encryption softwarea. Guarantees the secrecy of data.b. Requires manual distribution of keys.c. Increases system overhead.d. Reduces the need for periodic password changes.
Which of the following is a risk that is higher when an electronic funds transfer (EFT) system is used?a. Improper change control procedures.b. Unauthorized access and activity.c. Insufficient online edit checks.d. Inadequate backups and disaster recovery procedures.
Which of the following operating procedures increases an organization’s exposure to computer viruses?a. Encryption of data files.b. Frequent backup of files.c. Downloading public-domain software from electronic bulletin boards.d. Installing original copies of purchased software on hard disk
Which of the following is an indication that a computer virus of this category is present?a. Frequent power surges that harm computer equipment.b. Unexplainable losses of or changes to data.c. Inadequate backup, recovery, and contingency plans.d. Numerous copyright violations due to unauthorized
Management is concerned that data uploaded from a microcomputer to the company’s mainframe system in batch processing may be erroneous. Which of the following controls would best address this issue?a. The mainframe computer should be backed up on a regular basis.b. Two persons should be present
A company using EDI made it a practice to track the functional acknowledgments from trading partners and to issue warning messages if acknowledgments did not occur within a reasonable length of time. What risk was the company attempting to address by this practice?a. Transactions that have not
When developing a new computer system that will handle customer orders and process customer payments, a highlevel systems design phase would include determination of which of the following?a. How the new system will affect current inventory and general ledger systems.b. How the file layouts will be
Laptop computers provide automation outside of the normal office location. Which of the following would provide the least security for sensitive data stored on a laptop computer?a. Encryption of data files on the laptop computer.b. Setting up a password for the screensaver program on the laptop
A Web page is most frequently created usinga. Java or C++.b. Visual Basic.c. SQL.d. HTML or XML.
A set of rules for exchanging data between two computers is aa. Communicator.b. Operating system.c. Protocol.d. Transmission speed.
The network most frequently used for private operations designed to link computers within widely separated portions of an organization is referred to as a(n)a. Bulletin board service.b. Local area network.c. Wide area network.d. Zero base network.
Which is least likely to be considered a component of a computer network?a. Applications programs.b. Computers.c. Software.d. Routers.
A computer that is designed to provide software and other applications to other computers is referred to as aa. Microcomputer.b. Network computer.c. Server.d. Supercomputer.
LAN is the abbreviation fora. Large Area Network.b. Local Area Network.c. Longitudinal Analogue Network.d. Low Analytical Nets.
Which of the following characteristics distinguishes electronic data interchange (EDI) from other forms of electronic commerce?a. EDI transactions are formatted using the standards that are uniform worldwide.b. EDI transactions need not comply with generally accepted accounting principles.c. EDI
What type of computer system is characterized by data that are assembled from more than one location and records that are updated immediately?a. Microcomputer system.b. Minicomputer system.c. Batch processing system.d. Online real-time system.
In a computerized system, procedure or problemoriented language is converted to machine language through a(n)a. Interpreter.b. Verifier.c. Compiler.d. Converter.
Where disk files are used, the grandfather-father-son updating backup concept is relatively difficult to implement because thea. Location of information points on disks is an extremely time-consuming task.b. Magnetic fields and other environmental factors cause off-site storage to be impractical.c.
Mill Co. uses a batch processing method to process its sales transactions. Data on Mill’s sales transaction tape are electronically sorted by customer number and are subjected to programmed edit checks in preparing its invoices, sales journals, and updated customer account balances. One of the
First Federal S & L has an online real-time system, with terminals installed in all of its branches. This system will not accept a customer’s cash withdrawal instructions in excess of $1,000 without the use of a “terminal audit key.”After the transaction is authorized by a supervisor, the
Able Co. uses an online sales order processing system to process its sales transactions. Able’s sales data are electronically sorted and subjected to edit checks. A direct output of the edit checks most likely would be aa. Report of all missing sales invoices.b. File of all rejected sales
Which of the following is not a characteristic of a batch processed computer system?a. The collection of like transactions which are sorted and processed sequentially against a master file.b. Keypunching of transactions, followed by machine processing.c. The production of numerous printouts.d. The
Misstatements in a batch computer system caused by incorrect programs or data may not be detected immediately becausea. Errors in some transactions may cause rejection of other transactions in the batch.b. The identification of errors in input data typically is not part of the program.c. There are
A manufacturer of complex electronic equipment such as oscilloscopes and microscopes has been shipping its products with thick paper manuals but wants to reduce the cost of producing and shipping this documentation. Of the following, the best medium for the manufacturer to use to accomplish this
Unauthorized alteration of online records can be prevented by employinga. Key verification.b. Computer sequence checks.c. Computer matching.d. Database access controls.
What technology is needed in order to convert a paper document into a computer file?a. Optical character recognition.b. Electronic data interchange.c. Bar-coding scanning.d. Joining and merging.
Client/server architecture may potentially involve a variety of hardware, systems software, and application software from many vendors. The best way to protect a client/server system from unauthorized access is througha. A combination of application and general access control techniques.b. Use of a
All of the following are methods for distributing a relational database across multiple servers except:a. Snapshot (making a copy of the database for distribution).b. Replication (creating and maintaining replica copies at multiple locations).c. Normalization (separating the database into logical
A company's management has expressed concern over the varied system architectures that the organization uses.Potential security and control concerns would include all of the following except:a. Users may have different user ID codes and passwords to remember for the several systems that they use.b.
Showing 1100 - 1200
of 4678
First
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
Last
Step by Step Answers