Deck 12: The Impact of Information Technology on the Audit Process

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is not a risk in an IT system?

A)Need for IT experienced staff
B)Separation of IT duties from accounting functions
C)Improved audit trail
D)Hardware and data vulnerability
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Discuss how the integration of IT into accounting systems enhances internal control.
سؤال
Which of the following describes the process of implementing a new system in one part of the organization, while other locations continue to use the current system?

A)Parallel testing
B)Online testing
C)Pilot testing
D)Control testing
سؤال
One of the unique risks of protecting hardware and data is:

A)lack of traditional authorization.
B)the decreased risk of loss or destruction of data files if data is stored in a centralized location.
C)the ease at which the IT system can be installed and maintained.
D)the unauthorized access to the IT system resulting in improper changes in software programs and master files.
سؤال
Since IT systems can often initiate transactions automatically, proper authorization depends on software procedures and accurate master files used to make the authorization decision.
سؤال
What are three specific risks to IT systems?
سؤال
A ________ is responsible for controlling the use of computer programs, transaction files and other computer records and documentation and releases them to the operators only when authorized.

A)software engineer
B)chief computer operator
C)librarian
D)data control operator
سؤال
________ is not a risk specific to the IT environments.

A)Reliance on the functioning capabilities of hardware and software
B)Increased human involvement
C)Loss of data due to insufficient backup
D)Unauthorized access
سؤال
Control risk may be reduced for a company with a complex IT system when compared to a company that relies primarily on manual controls.
سؤال
Which of the following statements related to application controls is correct?

A)Application controls relate to various aspects of the IT function including software acquisition and the processing of transactions.
B)Application controls relate to various aspects of the IT function including physical security and the processing of transactions in various cycles.
C)Application controls relate to all aspects of the IT function.
D)Application controls relate to the processing of individual transactions.
سؤال
Computers process information consistently for all transactions.This creates a risk that:

A)auditors will not be able to access data quickly.
B)auditors will not be able to determine if data is processed consistently.
C)erroneous processing can result in the accumulation of a great number of misstatements in a short period of time.
D)all of the above.
سؤال
One potential disadvantage of IT systems is the reduction or elimination of source documents, which reduces the visibility of the audit trail.
سؤال
Old and new systems operating simultaneously in all locations is a test approach known as:

A)pilot testing.
B)horizontal testing.
C)integrative testing.
D)parallel testing.
سؤال
Typical controls developed for manual systems which are still important in IT systems include:

A)management's authorization of transactions.
B)competent personnel.
C)adequate preparation of input source documents.
D)all of the above.
سؤال
Misstatements in the financial statement may not be detected with the increased use of IT due to: I.the loss of a visible audit trail.
II)reduced human involvement.

A)I only
B)II only
C)both I and II
D)neither I or II
سؤال
General controls include all of the following except:

A)systems development.
B)online security.
C)processing controls.
D)hardware controls.
سؤال
The continued integration of IT in accounting systems can impact a company by:

A)increasing the costs of handling a large amount of data.
B)increasing the number of manual controls needed.
C)giving management higher-quality information more quickly than a manual system, thus helping management in their decision making process.
D)decreasing the segregation of duties.
سؤال
Security controls should require that users enter a(n)________ before being allowed access to software and other related data files.

A)echo check
B)parity check
C)self-diagnosis test
D)authorized password
سؤال
Which of the following is a component of general controls?

A)Processing controls
B)Output controls
C)Back-up and contingency planning
D)Input controls
سؤال
Which of the following is not a benefit of using IT-based controls?

A)Ability to process large volumes of transactions
B)Ability to replace manual controls with computer-based controls
C)Reduction in misstatements due to consistent processing of transactions
D)Reduction in internal control evaluation in setting control risk
سؤال
A ________ total represents the summary total of codes from all records in a batch that do not represent a meaningful total.

A)record
B)hash
C)output
D)financial
سؤال
Controls which are designed to assure that the information processed by the computer is authorized, complete, and accurate are called:

A)input controls.
B)processing controls.
C)output controls.
D)general controls.
سؤال
When purchasing software or developing in-house software:

A)cost should be the only factor.
B)extensive testing of the software is generally not required.
C)a team of both IT and non-IT personnel should be involved in the decision process.
D)the librarian and the IT manager should be the only ones involved in the decision process.
سؤال
Which of the following tests determines that every field in a record has been completed?

A)Validation
B)Sequence
C)Completeness
D)Programming
سؤال
Programmers should be allowed access to:

A)user controls.
B)general controls.
C)systems controls.
D)applications controls.
سؤال
Which of the following is not a general control?

A)Separation of IT duties
B)Systems development
C)Processing controls
D)Hardware controls
سؤال
Output controls need to be designed for which of the following data integrity objectives?

A)Detecting errors after the processing is completed
B)Preventing errors before the processing is completed
C)Detecting errors in the general ledger adjustment process
D)Preventing errors in separation of duties for IT personnel
سؤال
A control that relates to all parts of the IT system is called a(n):

A)general control.
B)systems control.
C)universal control.
D)applications control.
سؤال
Which of the following is not a general control?

A)Computer performed validation tests of input accuracy.
B)Equipment failure causes error messages on monitor.
C)There is a separation of duties between programmer and operators.
D)There are adequate program run instructions for operating the computer.
سؤال
Controls which are built in by the manufacturer to detect equipment failure are called:

A)input controls.
B)data integrity controls.
C)hardware controls.
D)manufacturer's controls.
سؤال
Which of the following is not an application control?

A)Preprocessing authorization of sales transactions
B)Reasonableness test for unit selling price of sale
C)Post-processing review of sales transactions by the sales department
D)Logging in to the company's information systems via a password
سؤال
An example of a physical control is:

A)a hash total.
B)a parallel test.
C)the matching of employee fingerprints to a database before access to the system is allowed.
D)the use of backup generators to prevent data loss during power outages.
سؤال
In an IT system, automated equipment controls or hardware controls are designed to:

A)correct errors in the computer programs.
B)monitor and detect errors in source documents.
C)detect and control errors arising from the use of equipment.
D)arrange data in a logical sequential manner for processing purposes.
سؤال
An internal control deficiency occurs when computer personnel:

A)participate in computer software acquisition decisions.
B)design flowcharts and narratives for computerized systems.
C)originate changes in customer master files.
D)provide physical security over program files.
سؤال
Which of the following is not an example of an applications control?

A)Back-up of data is made to a remote site for data security.
B)There is a preprocessing authorization of the sales transactions.
C)There are reasonableness tests for the unit selling price of a sale.
D)After processing, all sales transactions are reviewed by the sales department.
سؤال
Controls that are designed for each software application and are intended to help a company satisfy the transaction-related audit objectives are:

A)user controls.
B)general controls.
C)audit controls.
D)application controls.
سؤال
Which of the following best explains the relationship between general controls and application controls?

A)Application controls are effective even if general controls are extremely weak.
B)Application controls are likely to be effective only when general controls are effective.
C)General controls have no impact on application controls.
D)None of the above.
سؤال
Which of the following controls prevent and detect errors while transaction data are processed?

A)Software
B)Application
C)Processing
D)Transaction
سؤال
If a control total were to be computed on each of the following data items, which would best be identified as a hash total for a payroll IT application?

A)Gross wages earned
B)Employee numbers
C)Total hours worked
D)Total debit amounts and total credit amounts
سؤال
Controls specific to IT include all of the following except for:

A)adequately designed input screens.
B)pull-down menu lists.
C)validation tests of input accuracy.
D)separation of duties.
سؤال
Output controls focus on preventing errors during processing.
سؤال
A large portion of errors in IT systems result from data entry errors.
سؤال
What are the two software testing strategies that companies typically use?
Which strategy is more expensive?
سؤال
Processing controls include the following tests:
Validation
Sequence
Data Reasonableness
Completeness
Describe what each control is designed to do:
سؤال
Parallel testing is used when old and new systems are operated simultaneously in all locations.
سؤال
Parallel testing is more expensive than pilot testing.
سؤال
IT controls are classified as either input controls or output controls.
سؤال
Identify the three categories of application controls, and give one example of each.
سؤال
In IT systems, if general controls are effective, it increases the auditor's ability to rely on application controls to reduce control risk.
سؤال
Define control for general controls and application controls.Also list the categories of controls included under general controls and application controls.
سؤال
In comparing (1)the adequacy of the hardware controls in the system with (2)the organization's methods of handling the errors that the computer identifies, the independent auditor is:

A)unconcerned with both (1)and (2).
B)equally concerned with (1)and (2).
C)less concerned with (1)than with (2).
D)more concerned with (1)than with (2).
سؤال
Programmers should only be allowed to work with test copies of programs and data.
سؤال
One category of general controls is physical and online access controls.Describe the control and give at two examples of implementation of the control.
سؤال
The most important output control is:

A)distribution control, which assures that only authorized personnel receive the reports generated by the system.
B)review of data for reasonableness by someone who knows what the output should look like.
C)control totals, which are used to verify that the computer's results are correct.
D)logic tests, which verify that no mistakes were made in processing.
سؤال
The effectiveness of automated controls depends solely on the competence of the personnel performing the controls.
سؤال
Knowledge of both general and application controls is crucial for auditors in understanding how accounting information is recorded and reported.
سؤال
Processing controls are a category of application controls.
سؤال
Controls that relate to a specific use of the IT system, such as the processing of sales or cash receipts, are called application controls.
سؤال
Identify the six categories of general controls and give one example of each.
سؤال
Discuss the four areas of responsibility under the IT function that should be segregated in large companies.
سؤال
Which of the following is a correct statement regarding general controls?

A)Auditors should evaluate the effectiveness of application controls before evaluating general controls.
B)General controls have a pervasive effect on the effectiveness of application controls.
C)Ineffective general controls have no impact on the potential for material misstatements across all system applications.
D)General controls have no impact on audit testing.
سؤال
Which of the following statements is correct?

A)Auditors should evaluate application controls before evaluating general controls.
B)Auditors should evaluate application controls and general controls simultaneously.
C)Auditors should evaluate general controls before evaluating application controls.
D)None of these statements is correct.
سؤال
The auditor's objective in determining whether the client's automated controls can correctly handle valid and invalid transactions as they arise is accomplished through the:

A)test data approach.
B)generalized audit software approach.
C)microcomputer-aided auditing approach.
D)generally accepted auditing standards.
سؤال
General controls in smaller companies are usually less effective than in more complex IT environments.
سؤال
Auditors:

A)link controls and deficiencies in general controls to specific transaction-related audit objectives.
B)can use a control risk matrix to help identify both manual and automated application controls and control deficiencies for each related audit objective.
C)can rely on IT-based application controls for all cycles if general controls are ineffective.
D)can use the IT staff to determine how much reliance they can place on general controls.
سؤال
"Auditing around the computer" is acceptable only if the auditor has access to the client's data in a machine-readable language.
سؤال
Auditors should evaluate which of the following before evaluating application controls because of the potential for pervasive effects?

A)Input controls
B)Control environment
C)Processing controls
D)General controls
سؤال
When a client uses desktops and networked servers for the accounting functions, there is a risk of computer viruses.
سؤال
Even in a less sophisticated IT environment, automated controls can often be relied on.
سؤال
Auditors usually obtain information about general and application controls through:

A)interviews with IT personnel.
B)examination of systems documentation.
C)reading program change requests.
D)all of the above methods.
سؤال
When the client uses a computer but the auditor chooses to use only the non-IT segment of internal control to assess control risk, it is referred to as auditing around the computer.Which one of the following conditions need not be present to audit around the computer?

A)Application controls need to be integrated with general controls.
B)The source documents must be available in a non-machine language.
C)The documents must be filed in a manner that makes it possible to locate them.
D)The output must be listed in sufficient detail to enable the auditor to trace individual transactions.
سؤال
The approach to auditing where the auditor does not test automated controls to reduce assessed control risk is called:

A)the single-stage audit.
B)the test deck approach.
C)auditing around the computer.
D)generalized audit software (GAS).
سؤال
Auditors often use their own software to test the client's IT controls.
سؤال
Auditors normally link controls and deficiencies in general controls to specific transaction-related audit objectives.
سؤال
It is important for the auditor to understand both the general controls and the application controls a company has implemented.Which of the following statements is true about these controls?

A)Auditors do not link IT controls to audit objectives.
B)After identifying specific IT-based application controls that can be used to reduce control risk, auditors can reduce substantive testing.
C)General controls affect audit objectives in only one cycle.
D)The impact of general controls and application controls on audits does not vary depending on the level of complexity in the IT environment.
سؤال
When the client changes the computer software:

A)no additional testing is needed by the auditor.
B)and application controls are effective, the auditor can easily identify when software changes are made.
C)and general controls are effective, the auditor can easily identify when software changes are made.
D)application and general controls can no longer by relied upon by the auditor.
سؤال
Companies with non-complex IT environments often rely on desktops and networked servers to perform accounting system functions.Which of the following is not an audit consideration in such an environment?

A)Limited reliance on automated controls
B)Unauthorized access to master files
C)Vulnerability to viruses and other risks
D)Excess reliance on automated controls
سؤال
Auditors typically obtain information about general and application controls through all of the following ways except for:

A)interviews with IT personnel.
B)reviews of detailed questionnaires completed by IT staff.
C)examination of system documentation such as flowcharts.
D)filings submitted to the PCAOB or SEC.
سؤال
"Auditing around the computer" is most appropriate when the client has not maintained detailed output or source documents in a form readable by humans.
سؤال
Which of the following is least likely to be used in obtaining an understanding of client general controls?

A)Examination of system documentation
B)Inquiry of key users
C)Walk through of a sales transaction
D)Reviews of questionnaires completed by client IT personnel
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/106
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: The Impact of Information Technology on the Audit Process
1
Which of the following is not a risk in an IT system?

A)Need for IT experienced staff
B)Separation of IT duties from accounting functions
C)Improved audit trail
D)Hardware and data vulnerability
C
2
Discuss how the integration of IT into accounting systems enhances internal control.
Enhancements to internal control resulting from the integration of IT into accounting systems include:
•Computer controls replace manual controls.Replacing manual procedures with programmed controls that apply checks and balances to each processed transaction and that process information consistently can reduce human error that is likely to occur in traditional manual environments.
•Higher quality information is available.IT systems typically provide management with more and higher quality information faster than most manual systems.
3
Which of the following describes the process of implementing a new system in one part of the organization, while other locations continue to use the current system?

A)Parallel testing
B)Online testing
C)Pilot testing
D)Control testing
C
4
One of the unique risks of protecting hardware and data is:

A)lack of traditional authorization.
B)the decreased risk of loss or destruction of data files if data is stored in a centralized location.
C)the ease at which the IT system can be installed and maintained.
D)the unauthorized access to the IT system resulting in improper changes in software programs and master files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
5
Since IT systems can often initiate transactions automatically, proper authorization depends on software procedures and accurate master files used to make the authorization decision.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
6
What are three specific risks to IT systems?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
7
A ________ is responsible for controlling the use of computer programs, transaction files and other computer records and documentation and releases them to the operators only when authorized.

A)software engineer
B)chief computer operator
C)librarian
D)data control operator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
8
________ is not a risk specific to the IT environments.

A)Reliance on the functioning capabilities of hardware and software
B)Increased human involvement
C)Loss of data due to insufficient backup
D)Unauthorized access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
9
Control risk may be reduced for a company with a complex IT system when compared to a company that relies primarily on manual controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following statements related to application controls is correct?

A)Application controls relate to various aspects of the IT function including software acquisition and the processing of transactions.
B)Application controls relate to various aspects of the IT function including physical security and the processing of transactions in various cycles.
C)Application controls relate to all aspects of the IT function.
D)Application controls relate to the processing of individual transactions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
11
Computers process information consistently for all transactions.This creates a risk that:

A)auditors will not be able to access data quickly.
B)auditors will not be able to determine if data is processed consistently.
C)erroneous processing can result in the accumulation of a great number of misstatements in a short period of time.
D)all of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
12
One potential disadvantage of IT systems is the reduction or elimination of source documents, which reduces the visibility of the audit trail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
13
Old and new systems operating simultaneously in all locations is a test approach known as:

A)pilot testing.
B)horizontal testing.
C)integrative testing.
D)parallel testing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
14
Typical controls developed for manual systems which are still important in IT systems include:

A)management's authorization of transactions.
B)competent personnel.
C)adequate preparation of input source documents.
D)all of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
15
Misstatements in the financial statement may not be detected with the increased use of IT due to: I.the loss of a visible audit trail.
II)reduced human involvement.

A)I only
B)II only
C)both I and II
D)neither I or II
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
16
General controls include all of the following except:

A)systems development.
B)online security.
C)processing controls.
D)hardware controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
17
The continued integration of IT in accounting systems can impact a company by:

A)increasing the costs of handling a large amount of data.
B)increasing the number of manual controls needed.
C)giving management higher-quality information more quickly than a manual system, thus helping management in their decision making process.
D)decreasing the segregation of duties.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
18
Security controls should require that users enter a(n)________ before being allowed access to software and other related data files.

A)echo check
B)parity check
C)self-diagnosis test
D)authorized password
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is a component of general controls?

A)Processing controls
B)Output controls
C)Back-up and contingency planning
D)Input controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following is not a benefit of using IT-based controls?

A)Ability to process large volumes of transactions
B)Ability to replace manual controls with computer-based controls
C)Reduction in misstatements due to consistent processing of transactions
D)Reduction in internal control evaluation in setting control risk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
21
A ________ total represents the summary total of codes from all records in a batch that do not represent a meaningful total.

A)record
B)hash
C)output
D)financial
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
22
Controls which are designed to assure that the information processed by the computer is authorized, complete, and accurate are called:

A)input controls.
B)processing controls.
C)output controls.
D)general controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
23
When purchasing software or developing in-house software:

A)cost should be the only factor.
B)extensive testing of the software is generally not required.
C)a team of both IT and non-IT personnel should be involved in the decision process.
D)the librarian and the IT manager should be the only ones involved in the decision process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following tests determines that every field in a record has been completed?

A)Validation
B)Sequence
C)Completeness
D)Programming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
25
Programmers should be allowed access to:

A)user controls.
B)general controls.
C)systems controls.
D)applications controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following is not a general control?

A)Separation of IT duties
B)Systems development
C)Processing controls
D)Hardware controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
27
Output controls need to be designed for which of the following data integrity objectives?

A)Detecting errors after the processing is completed
B)Preventing errors before the processing is completed
C)Detecting errors in the general ledger adjustment process
D)Preventing errors in separation of duties for IT personnel
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
28
A control that relates to all parts of the IT system is called a(n):

A)general control.
B)systems control.
C)universal control.
D)applications control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which of the following is not a general control?

A)Computer performed validation tests of input accuracy.
B)Equipment failure causes error messages on monitor.
C)There is a separation of duties between programmer and operators.
D)There are adequate program run instructions for operating the computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
30
Controls which are built in by the manufacturer to detect equipment failure are called:

A)input controls.
B)data integrity controls.
C)hardware controls.
D)manufacturer's controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following is not an application control?

A)Preprocessing authorization of sales transactions
B)Reasonableness test for unit selling price of sale
C)Post-processing review of sales transactions by the sales department
D)Logging in to the company's information systems via a password
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
32
An example of a physical control is:

A)a hash total.
B)a parallel test.
C)the matching of employee fingerprints to a database before access to the system is allowed.
D)the use of backup generators to prevent data loss during power outages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
33
In an IT system, automated equipment controls or hardware controls are designed to:

A)correct errors in the computer programs.
B)monitor and detect errors in source documents.
C)detect and control errors arising from the use of equipment.
D)arrange data in a logical sequential manner for processing purposes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
34
An internal control deficiency occurs when computer personnel:

A)participate in computer software acquisition decisions.
B)design flowcharts and narratives for computerized systems.
C)originate changes in customer master files.
D)provide physical security over program files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which of the following is not an example of an applications control?

A)Back-up of data is made to a remote site for data security.
B)There is a preprocessing authorization of the sales transactions.
C)There are reasonableness tests for the unit selling price of a sale.
D)After processing, all sales transactions are reviewed by the sales department.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
36
Controls that are designed for each software application and are intended to help a company satisfy the transaction-related audit objectives are:

A)user controls.
B)general controls.
C)audit controls.
D)application controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following best explains the relationship between general controls and application controls?

A)Application controls are effective even if general controls are extremely weak.
B)Application controls are likely to be effective only when general controls are effective.
C)General controls have no impact on application controls.
D)None of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which of the following controls prevent and detect errors while transaction data are processed?

A)Software
B)Application
C)Processing
D)Transaction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
39
If a control total were to be computed on each of the following data items, which would best be identified as a hash total for a payroll IT application?

A)Gross wages earned
B)Employee numbers
C)Total hours worked
D)Total debit amounts and total credit amounts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
40
Controls specific to IT include all of the following except for:

A)adequately designed input screens.
B)pull-down menu lists.
C)validation tests of input accuracy.
D)separation of duties.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
41
Output controls focus on preventing errors during processing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
42
A large portion of errors in IT systems result from data entry errors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
43
What are the two software testing strategies that companies typically use?
Which strategy is more expensive?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
44
Processing controls include the following tests:
Validation
Sequence
Data Reasonableness
Completeness
Describe what each control is designed to do:
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
45
Parallel testing is used when old and new systems are operated simultaneously in all locations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
46
Parallel testing is more expensive than pilot testing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
47
IT controls are classified as either input controls or output controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
48
Identify the three categories of application controls, and give one example of each.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
49
In IT systems, if general controls are effective, it increases the auditor's ability to rely on application controls to reduce control risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
50
Define control for general controls and application controls.Also list the categories of controls included under general controls and application controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
51
In comparing (1)the adequacy of the hardware controls in the system with (2)the organization's methods of handling the errors that the computer identifies, the independent auditor is:

A)unconcerned with both (1)and (2).
B)equally concerned with (1)and (2).
C)less concerned with (1)than with (2).
D)more concerned with (1)than with (2).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
52
Programmers should only be allowed to work with test copies of programs and data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
53
One category of general controls is physical and online access controls.Describe the control and give at two examples of implementation of the control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
54
The most important output control is:

A)distribution control, which assures that only authorized personnel receive the reports generated by the system.
B)review of data for reasonableness by someone who knows what the output should look like.
C)control totals, which are used to verify that the computer's results are correct.
D)logic tests, which verify that no mistakes were made in processing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
55
The effectiveness of automated controls depends solely on the competence of the personnel performing the controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
56
Knowledge of both general and application controls is crucial for auditors in understanding how accounting information is recorded and reported.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
57
Processing controls are a category of application controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
58
Controls that relate to a specific use of the IT system, such as the processing of sales or cash receipts, are called application controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
59
Identify the six categories of general controls and give one example of each.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
60
Discuss the four areas of responsibility under the IT function that should be segregated in large companies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
61
Which of the following is a correct statement regarding general controls?

A)Auditors should evaluate the effectiveness of application controls before evaluating general controls.
B)General controls have a pervasive effect on the effectiveness of application controls.
C)Ineffective general controls have no impact on the potential for material misstatements across all system applications.
D)General controls have no impact on audit testing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
62
Which of the following statements is correct?

A)Auditors should evaluate application controls before evaluating general controls.
B)Auditors should evaluate application controls and general controls simultaneously.
C)Auditors should evaluate general controls before evaluating application controls.
D)None of these statements is correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
63
The auditor's objective in determining whether the client's automated controls can correctly handle valid and invalid transactions as they arise is accomplished through the:

A)test data approach.
B)generalized audit software approach.
C)microcomputer-aided auditing approach.
D)generally accepted auditing standards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
64
General controls in smaller companies are usually less effective than in more complex IT environments.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
65
Auditors:

A)link controls and deficiencies in general controls to specific transaction-related audit objectives.
B)can use a control risk matrix to help identify both manual and automated application controls and control deficiencies for each related audit objective.
C)can rely on IT-based application controls for all cycles if general controls are ineffective.
D)can use the IT staff to determine how much reliance they can place on general controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
66
"Auditing around the computer" is acceptable only if the auditor has access to the client's data in a machine-readable language.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
67
Auditors should evaluate which of the following before evaluating application controls because of the potential for pervasive effects?

A)Input controls
B)Control environment
C)Processing controls
D)General controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
68
When a client uses desktops and networked servers for the accounting functions, there is a risk of computer viruses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
69
Even in a less sophisticated IT environment, automated controls can often be relied on.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
70
Auditors usually obtain information about general and application controls through:

A)interviews with IT personnel.
B)examination of systems documentation.
C)reading program change requests.
D)all of the above methods.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
71
When the client uses a computer but the auditor chooses to use only the non-IT segment of internal control to assess control risk, it is referred to as auditing around the computer.Which one of the following conditions need not be present to audit around the computer?

A)Application controls need to be integrated with general controls.
B)The source documents must be available in a non-machine language.
C)The documents must be filed in a manner that makes it possible to locate them.
D)The output must be listed in sufficient detail to enable the auditor to trace individual transactions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
72
The approach to auditing where the auditor does not test automated controls to reduce assessed control risk is called:

A)the single-stage audit.
B)the test deck approach.
C)auditing around the computer.
D)generalized audit software (GAS).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
73
Auditors often use their own software to test the client's IT controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
74
Auditors normally link controls and deficiencies in general controls to specific transaction-related audit objectives.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
75
It is important for the auditor to understand both the general controls and the application controls a company has implemented.Which of the following statements is true about these controls?

A)Auditors do not link IT controls to audit objectives.
B)After identifying specific IT-based application controls that can be used to reduce control risk, auditors can reduce substantive testing.
C)General controls affect audit objectives in only one cycle.
D)The impact of general controls and application controls on audits does not vary depending on the level of complexity in the IT environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
76
When the client changes the computer software:

A)no additional testing is needed by the auditor.
B)and application controls are effective, the auditor can easily identify when software changes are made.
C)and general controls are effective, the auditor can easily identify when software changes are made.
D)application and general controls can no longer by relied upon by the auditor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
77
Companies with non-complex IT environments often rely on desktops and networked servers to perform accounting system functions.Which of the following is not an audit consideration in such an environment?

A)Limited reliance on automated controls
B)Unauthorized access to master files
C)Vulnerability to viruses and other risks
D)Excess reliance on automated controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
78
Auditors typically obtain information about general and application controls through all of the following ways except for:

A)interviews with IT personnel.
B)reviews of detailed questionnaires completed by IT staff.
C)examination of system documentation such as flowcharts.
D)filings submitted to the PCAOB or SEC.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
79
"Auditing around the computer" is most appropriate when the client has not maintained detailed output or source documents in a form readable by humans.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
80
Which of the following is least likely to be used in obtaining an understanding of client general controls?

A)Examination of system documentation
B)Inquiry of key users
C)Walk through of a sales transaction
D)Reviews of questionnaires completed by client IT personnel
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 106 في هذه المجموعة.