Deck 10: Processing Integrity and Availability Controls

ملء الشاشة (f)
exit full mode
سؤال
If invoices are processed in groups of fifty,which fields from the document shown below would not be used to create a hash control total?
<strong>If invoices are processed in groups of fifty,which fields from the document shown below would not be used to create a hash control total?  </strong> A)Amount. B)Item Number. C)Quantity Ordered. D)Sales Order number. <div style=padding-top: 35px>

A)Amount.
B)Item Number.
C)Quantity Ordered.
D)Sales Order number.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The best example of an effective payroll transaction file record count would most likely be

A)sum of net pay.
B)total number of employees.
C)sum of FICA.
D)total of employees' social security numbers.
سؤال
 Employee  Name  Overtime  Hours  Mary Jones 10 Tom Davis 5 Amy Dunn 3 Kate Smith 2 Kevin White 4 Jill Brown 800\begin{array} { | c | c | } \hline \begin{array} { c } \text { Employee } \\\text { Name }\end{array} & \begin{array} { c } \text { Overtime } \\\text { Hours }\end{array} \\\hline \text { Mary Jones } & 10 \\\hline \text { Tom Davis } & - 5 \\\hline \text { Amy Dunn } & 3 \\\hline \text { Kate Smith } & 2 \\\hline \text { Kevin White } & - 4 \\\hline \text { Jill Brown } & 800 \\\hline\end{array}
The total overtime hours is 806.Which data entry control would best prevent similar data entry errors in the future?

A)Sequence check.
B)Validity check.
C)Check digit.
D)Reasonableness test.
سؤال
The best example of an effective payroll transaction file financial total would most likely be

A)sum of net pay.
B)total number of employees.
C)sum of hours worked.
D)total of employees' social security numbers.
سؤال
Cancellation and storage of documents is one example of a(n)

A)output control.
B)processing control.
C)input control.
D)data entry control.
سؤال
The data entry control that would best prevent entering an invoice received from a vendor who is not on an authorized supplier list is

A)a validity check.
B)an authorization check.
C)a check digit.
D)closed-loop verification.
سؤال
________ is a data entry input control that requests each input data item and waits for an acceptable response,ensures that all necessary data are entered.

A)Prompting
B)Duplicate data check
C)Closed-loop verification
D)Check digit verification
سؤال
All of the following controls for online entry of a sales order would be useful except

A)check digit verification on the dollar amount of the order.
B)validity check on the inventory item numbers.
C)field check on the customer ID and dollar amount of the order.
D)concurrent update control.
سؤال
Following is the result of batch control totals on employee Social Security numbers in a payroll processing transaction:
 Correct  Values  Entered  Values From  During  Masterfile  Processing 48735879648735879653491648753491648749837452649837452651487342051487342053419648753491648767848785367848785347123058947123058977194381583720158158\begin{array} { c c } \text { Correct } & \begin{array} { c } \text { Values } \\\text { Entered }\end{array} \\\text { Values From } & \text { During } \\\underline { \text { Masterfile } } & \underline { \text { Processing } } \\\hline 487358796 & 487358796 \\534916487 & 534916487 \\498374526 & 498374526 \\514873420 & 514873420 \\534196487 & 534916487 \\678487853 & 678487853 \\\underline { 471230589 } & \underline { 471230589 } \\\underline { \underline { 7719438158 } } & \underline { 3720158158 } \\\hline\end{array}
The difference in the control totals is 720,000.Which data entry control would best prevent similar data entry errors in the future?

A)Batch check.
B)Validity check.
C)Check digit.
D)Sequence check.
سؤال
The inventory tracking system shows that 12 laptop were on hand before a customer brings two laptops to the register for purchase.The cashier accidentally enters the quantity sold as 20 instead of 2.Which data entry control would most effectively prevent this error?

A)Limit check.
B)Sign check.
C)Field check.
D)Validity check.
سؤال
A customer forget to include her account number on her check,and the accounts receivable clerk credited her payment to a different customer with the same last name.Which control could have been used to most effectively to prevent this error?

A)Closed-loop verification.
B)Duplicate values check.
C)Reasonableness test.
D)Reconciliation of a batch control total.
سؤال
________ is a data entry input control that involves summing the first four digits of a customer number to calculate the value of the fifth digit,then comparing the calculated number to the number entered during data entry.

A)Validity check
B)Duplicate data check
C)Closed-loop verification
D)Check digit verification
سؤال
Sequentially prenumbered forms are an example of a(n)

A)data entry control.
B)data transmission control.
C)processing control.
D)input control.
سؤال
________ is a data entry input control that involves checking the accuracy of input data by using it to retrieve and display other related information.

A)Validity check
B)Duplicate data check
C)Closed-loop verification
D)Check digit verification
سؤال
A payroll clerk accidentally entered an employee's hours worked for the week as 380 instead of 38.The data entry control that would best prevent this error would be

A)a limit check.
B)a check digit.
C)batch total reconciliation.
D)a field check.
سؤال
Error logs and review are an example of

A)data entry controls.
B)data transmission controls.
C)output controls.
D)processing controls.
سؤال
Which of the following data entry controls would not be useful if you are recording the checkout of library books by members?

A)Sequence check.
B)Prompting.
C)Validity check.
D)Concurrent update control.
سؤال
Turnaround documents are an example of a(n)

A)data entry control.
B)output control.
C)processing control.
D)input control.
سؤال
Form design is one example of a(n)

A)output control.
B)processing control.
C)input control.
D)data entry control.
سؤال
The best example of an effective payroll transaction file hash total would most likely be

A)sum of net pay.
B)total number of employees.
C)sum of hours worked.
D)total of employees' social security numbers.
سؤال
Data matching is an example of a(n)

A)data entry control.
B)data transmission control.
C)processing control.
D)input control.
سؤال
________ tests a numerical amount to ensure that it does not exceed a predetermined value nor fall below another predetermined value.

A)Completeness check
B)Field check
C)Limit check
D)Range check
سؤال
A ________ ensures input data will fit into the assigned field.

A)limit check
B)size check
C)range check
D)field check
سؤال
A ________ determines the correctness of the logical relationship between two data items.

A)range check
B)reasonableness test
C)sign check
D)size check
سؤال
A ________ determines whether the input data are of the proper type.

A)limit check
B)size check
C)range check
D)field check
سؤال
A completeness check is an example of a(n)

A)data transmission control.
B)output control.
C)processing control.
D)input control.
سؤال
The batch processing data entry control that sums the number of items in a batch is called

A)financial total.
B)hash total.
C)record count.
D)sequence check.
سؤال
When the staff accountant enters a correct customer number,the data entry screen displays the customer name and address.This is an example of

A)prompting.
B)preformatting.
C)closed-loop verification.
D)error checking.
سؤال
A ________ tests a numerical amount to ensure that it does not exceed a predetermined value.

A)completeness check
B)limit check
C)range check
D)sign check
سؤال
Reconciliation procedures is an example of

A)a data entry control.
B)a data transmission control.
C)an output control.
D)a processing control.
سؤال
A ________ determines if all required data items have been entered.

A)completeness check
B)field check
C)limit check
D)range check
سؤال
A ________ is a data entry control that compares the ID number in transaction data to a master file to verify that the ID number exists.

A)reasonableness test
B)user review
C)data matching
D)validity check
سؤال
The batch processing data entry control that sums a field that contains dollar values is called

A)record count.
B)financial total.
C)hash total.
D)sequence check.
سؤال
Checksums is an example of a(n)

A)data entry control.
B)data transmission control.
C)output control.
D)processing control.
سؤال
Cancellation and storage of documents means

A)documents are defaced and stored.
B)documents are defaced before being shredded.
C)cancellation data are copied from documents before they are stored.
D)data are copied from a document and stored before it is being shredded.
سؤال
The batch processing data entry control that sums a non-financial numeric field is called

A)record count.
B)financial total.
C)hash total.
D)sequence check.
سؤال
A ________ determines the correctness of the logical relationship between two data items.

A)field check
B)alpha-numeric check
C)range check
D)reasonableness test
سؤال
A validity check is an example of

A)a data entry control.
B)an output control.
C)a data transmission control.
D)an input control.
سؤال
A ________ control ensures that the correct and most current files are being updated.

A)cross-footing balance test
B)data matching
C)file labels
D)write-protect mechanism
سؤال
A hash total is an example of which control below?

A)Data entry control.
B)Data transmission control.
C)Processing control.
D)Output control.
سؤال
A facility that is pre-wired for necessary telecommunications and computer equipment,but doesn't have equipment installed,is known as a

A)cold site.
B)hot site.
C)remote site.
D)subsidiary location.
سؤال
What is the most effective way to ensure information system availability?

A)High bandwidth.
B)Maintain a hot site.
C)Maintain a cold site.
D)Frequent backups.
سؤال
Which of the following is not a risk associated with the data input process?

A)Data is invalid.
B)Data is incomplete.
C)Data is inaccurate.
D)Data is corrupted.
سؤال
A facility that contains all the computing equipment the organization needs to perform its essential business activities is known as a

A)cold site.
B)hot site.
C)remote site.
D)subsidiary location.
سؤال
Prompting is a control that helps ensure

A)transaction data are not lost.
B)transactions data are accurate.
C)transactions data are complete.
D)transaction data are valid.
سؤال
Modest Expectations Investment Services (MEIS)allows customers to manage their investments over the Internet.If customers attempt to spend more money than they have in their account,an error message is displayed.This is an example of a

A)reasonableness test.
B)field check.
C)validity check.
D)limit check.
سؤال
The control that verifies accuracy by comparing two alternative ways of calculating the same total is called

A)concurrent update controls.
B)cross-footing balance test.
C)data conversion controls.
D)recalculation of batch totals.
سؤال
The control that protects records from errors that occur when two or more users attempt to update the same record simultaneously is called

A)concurrent update controls.
B)cross-footing balance test.
C)data conversion controls.
D)recalculation of batch totals.
سؤال
Which of the following is an example of a turnaround document?

A)A receipt a customer must use to return the goods purchased.
B)A telephone bill the customer must return with payment.
C)A paycheck stub that must be used in the employee's tax return.
D)A customer loyalty card used every time a customer purchases goods or services.
سؤال
When opening an Excel file,Sonja received a message saying that the file is locked for editing.This is happening because

A)the file is corrupted due to a computer virus.
B)Sonja opened the file as read-only.
C)concurrent update controls have locked the file.
D)there is no problem.Sonja is editing the file,so it is locked.
سؤال
Which of the following is not an objective of a disaster recovery plan?

A)Minimize the extent of the disruption,damage or loss.
B)Establish a permanent alternative means of processing information.
C)Resume normal operations as soon as possible.
D)Train employees for emergency operations.
سؤال
Modest Expectations Investment Services (MEIS)allows customers to manage their investments over the Internet.If customers attempt to sell more shares of a stock than they have in their account,an error message is displayed.This is an example of a

A)reasonableness test.
B)field check.
C)validity check.
D)limit check.
سؤال
Which of the following statements is true with regards to system availability?

A)Human error does not threaten system availability.
B)Threats to system availability can be completely eliminated.
C)Proper controls can maximize the risk of threats causing significant system downtime.
D)Threats to system availability include hardware and software failures as well as natural and man-made disasters.
سؤال
Which of the following is an important control to prevent buffet overflow vulnerabilities?

A)Limit check.
B)Size check.
C)Range check.
D)Field check.
سؤال
Discuss ways that can help ensure the processing integrity of electronic voting.
سؤال
A computer operator accidentally used the wrong master file when updating a transaction file.As a result,the master file data is now unreadable.Which control could best have prevented this from happening?

A)Header record.
B)Validity check.
C)Trailer record.
D)Parity check.
سؤال
What control are zero balance tests an example of?

A)Data entry controls.
B)Output controls.
C)Processing controls.
D)Source data controls.
سؤال
A ________ control entails verifying that the proper number of bits are set to the value 1 in each character received.

A)echo check
B)field check
C)parity check
D)trailer record
سؤال
The Spontaneous Combustion Rocket Shoppe in downtown Fargo,North Dakota,generates three quarters of its revenue from orders taken over the Internet.The revenue clearing account is debited by the total of cash and credit receipts and credited by the total of storefront and Internet sales.This is an example of a

A)data integrity test.
B)zero-balance test.
C)trial balance audit.
D)cross-footing balance test.
سؤال
A disaster recovery plan typically does not include

A)scheduled electronic vaulting of files.
B)backup computer and telecommunication facilities.
C)a system upgrade due to operating system software changes.
D)uninterruptible power systems installed for key system components.
سؤال
Discuss how cloud computing could both positively and negatively affect system availability.
سؤال
A copy of a database,master file,or software that will be retained indefinitely as a historical record is known as a(n)

A)archive.
B)cloud computing.
C)differential backup.
D)incremental backup.
سؤال
________ involves copying only the data items that have changed since the last partial backup.

A)Archive
B)Cloud computing
C)Differential backup
D)Incremental backup
سؤال
________ enables a system to continue functioning in the event that a particular component fails.

A)An incremental backup procedure
B)Fault tolerance
C)Preventive maintenance
D)A concurrent update control
سؤال
When a computer system's files are automatically duplicated on a second data storage system as they are changed,the process is referred to as

A)real-time mirroring.
B)batch updating.
C)consistency control.
D)double-secure storage.
سؤال
The maximum acceptable down time after a computer system failure is determined by a company's

A)recovery time objective.
B)recovery point objective.
C)recovery objective.
D)maximum time recovery objective.
سؤال
Define and contrast a recovery point objective and a recovery time objective.Provide a numeric example.
سؤال
The accounting department at Aglaya Telecom records an average of 8,000 transactions per hour.A cost-benefit analysis leads management to conclude that the maximum acceptable amount of data loss is 32,000 transactions.If the firm's recovery time objective is 240 minutes,then the worst case recovery time objective is

A)4 hours.
B)8 hours.
C)16 hours.
D)24 hours.
سؤال
Identify the statement below which is true.

A)Cloud computing is a control technique for system availability.
B)Cloud computing eliminates the need for backup of applications and data.
C)Cloud computing eliminates the need for companies to own their own software and servers.
D)Cloud computing refers to the practice of storing application files and backup data on satellites "in the clouds."
سؤال
The accounting department at Aglaya Telecom records an average of 5,000 transactions per hour and have a recovery time objective of 120 minutes.Aglaya recently suffered a hardware malfunction and it took the company 20 hours to recover their lost data.How many transactions did Aglaya recover?

A)20,000 transactions.
B)30,000 transactions.
C)40,000 transactions.
D)50,000 transactions.
سؤال
What is the primary objective of ensuring systems and information are available for use whenever needed?

A)To minimize system downtime.
B)To minimize system expense.
C)To maximize system processing speed.
D)To maximize sales.
سؤال
The accounting department at Aglaya Telecom records an average of 8,000 transactions per hour and have a recovery time objective of 240 minutes.Aglaya recently suffered a hardware malfunction and it took the company 16 hours to recover their lost data.How many transactions did Aglaya recover?

A)52,000 transactions.
B)5,200 transactions.
C)32,000 transactions.
D)3,200 transactions.
سؤال
The maximum amount of time between backups is determined by a company's

A)recovery time objective.
B)recovery point objective.
C)recovery objective.
D)maximum time recovery objective.
سؤال
It is impossible to eliminate the risk of downtime.
سؤال
While this type of backup process takes longer than the alternative,restoration is easier and faster.

A)archive
B)cloud computing
C)differential backup
D)incremental backup
سؤال
________ is a plan that specifies how to resume not only IT operations but all business processes in the event of a major calamity.

A)Disaster recovery plan
B)Business continuity plan
C)Real-time monitoring plan
D)Business contingency plan
سؤال
The accounting department at Synergy Hydroelectric records an average of 12,500 transactions per hour.By cost-benefit analysis,managers have concluded that the maximum acceptable loss of data in the event of a system failure is 50,000 transactions.If the firm's recovery time objective is 120 minutes,then the worst case recovery time objective is

A)2 hours.
B)4 hours.
C)6 hours.
D)8 hours.
سؤال
Probably the most important change management control is

A)monitoring user rights and privileges during the change process.
B)testing all changes thoroughly prior to implementation on a stand-alone computer.
C)updating all documentation to reflect changes made to the system.
D)management's careful monitoring and review.
سؤال
________ copies all changes made since the last full backup.

A)Archive
B)Cloud computing
C)Differential backup
D)Incremental backup
سؤال
The recovery point objective is inversely related to the frequency of backups.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/95
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Processing Integrity and Availability Controls
1
If invoices are processed in groups of fifty,which fields from the document shown below would not be used to create a hash control total?
<strong>If invoices are processed in groups of fifty,which fields from the document shown below would not be used to create a hash control total?  </strong> A)Amount. B)Item Number. C)Quantity Ordered. D)Sales Order number.

A)Amount.
B)Item Number.
C)Quantity Ordered.
D)Sales Order number.
A
2
The best example of an effective payroll transaction file record count would most likely be

A)sum of net pay.
B)total number of employees.
C)sum of FICA.
D)total of employees' social security numbers.
B
3
 Employee  Name  Overtime  Hours  Mary Jones 10 Tom Davis 5 Amy Dunn 3 Kate Smith 2 Kevin White 4 Jill Brown 800\begin{array} { | c | c | } \hline \begin{array} { c } \text { Employee } \\\text { Name }\end{array} & \begin{array} { c } \text { Overtime } \\\text { Hours }\end{array} \\\hline \text { Mary Jones } & 10 \\\hline \text { Tom Davis } & - 5 \\\hline \text { Amy Dunn } & 3 \\\hline \text { Kate Smith } & 2 \\\hline \text { Kevin White } & - 4 \\\hline \text { Jill Brown } & 800 \\\hline\end{array}
The total overtime hours is 806.Which data entry control would best prevent similar data entry errors in the future?

A)Sequence check.
B)Validity check.
C)Check digit.
D)Reasonableness test.
Reasonableness test.
4
The best example of an effective payroll transaction file financial total would most likely be

A)sum of net pay.
B)total number of employees.
C)sum of hours worked.
D)total of employees' social security numbers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
5
Cancellation and storage of documents is one example of a(n)

A)output control.
B)processing control.
C)input control.
D)data entry control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
6
The data entry control that would best prevent entering an invoice received from a vendor who is not on an authorized supplier list is

A)a validity check.
B)an authorization check.
C)a check digit.
D)closed-loop verification.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
7
________ is a data entry input control that requests each input data item and waits for an acceptable response,ensures that all necessary data are entered.

A)Prompting
B)Duplicate data check
C)Closed-loop verification
D)Check digit verification
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
8
All of the following controls for online entry of a sales order would be useful except

A)check digit verification on the dollar amount of the order.
B)validity check on the inventory item numbers.
C)field check on the customer ID and dollar amount of the order.
D)concurrent update control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
9
Following is the result of batch control totals on employee Social Security numbers in a payroll processing transaction:
 Correct  Values  Entered  Values From  During  Masterfile  Processing 48735879648735879653491648753491648749837452649837452651487342051487342053419648753491648767848785367848785347123058947123058977194381583720158158\begin{array} { c c } \text { Correct } & \begin{array} { c } \text { Values } \\\text { Entered }\end{array} \\\text { Values From } & \text { During } \\\underline { \text { Masterfile } } & \underline { \text { Processing } } \\\hline 487358796 & 487358796 \\534916487 & 534916487 \\498374526 & 498374526 \\514873420 & 514873420 \\534196487 & 534916487 \\678487853 & 678487853 \\\underline { 471230589 } & \underline { 471230589 } \\\underline { \underline { 7719438158 } } & \underline { 3720158158 } \\\hline\end{array}
The difference in the control totals is 720,000.Which data entry control would best prevent similar data entry errors in the future?

A)Batch check.
B)Validity check.
C)Check digit.
D)Sequence check.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
10
The inventory tracking system shows that 12 laptop were on hand before a customer brings two laptops to the register for purchase.The cashier accidentally enters the quantity sold as 20 instead of 2.Which data entry control would most effectively prevent this error?

A)Limit check.
B)Sign check.
C)Field check.
D)Validity check.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
11
A customer forget to include her account number on her check,and the accounts receivable clerk credited her payment to a different customer with the same last name.Which control could have been used to most effectively to prevent this error?

A)Closed-loop verification.
B)Duplicate values check.
C)Reasonableness test.
D)Reconciliation of a batch control total.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
12
________ is a data entry input control that involves summing the first four digits of a customer number to calculate the value of the fifth digit,then comparing the calculated number to the number entered during data entry.

A)Validity check
B)Duplicate data check
C)Closed-loop verification
D)Check digit verification
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
13
Sequentially prenumbered forms are an example of a(n)

A)data entry control.
B)data transmission control.
C)processing control.
D)input control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
14
________ is a data entry input control that involves checking the accuracy of input data by using it to retrieve and display other related information.

A)Validity check
B)Duplicate data check
C)Closed-loop verification
D)Check digit verification
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
15
A payroll clerk accidentally entered an employee's hours worked for the week as 380 instead of 38.The data entry control that would best prevent this error would be

A)a limit check.
B)a check digit.
C)batch total reconciliation.
D)a field check.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
16
Error logs and review are an example of

A)data entry controls.
B)data transmission controls.
C)output controls.
D)processing controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following data entry controls would not be useful if you are recording the checkout of library books by members?

A)Sequence check.
B)Prompting.
C)Validity check.
D)Concurrent update control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
18
Turnaround documents are an example of a(n)

A)data entry control.
B)output control.
C)processing control.
D)input control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
19
Form design is one example of a(n)

A)output control.
B)processing control.
C)input control.
D)data entry control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
20
The best example of an effective payroll transaction file hash total would most likely be

A)sum of net pay.
B)total number of employees.
C)sum of hours worked.
D)total of employees' social security numbers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
21
Data matching is an example of a(n)

A)data entry control.
B)data transmission control.
C)processing control.
D)input control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
22
________ tests a numerical amount to ensure that it does not exceed a predetermined value nor fall below another predetermined value.

A)Completeness check
B)Field check
C)Limit check
D)Range check
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
23
A ________ ensures input data will fit into the assigned field.

A)limit check
B)size check
C)range check
D)field check
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
24
A ________ determines the correctness of the logical relationship between two data items.

A)range check
B)reasonableness test
C)sign check
D)size check
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
25
A ________ determines whether the input data are of the proper type.

A)limit check
B)size check
C)range check
D)field check
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
26
A completeness check is an example of a(n)

A)data transmission control.
B)output control.
C)processing control.
D)input control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
27
The batch processing data entry control that sums the number of items in a batch is called

A)financial total.
B)hash total.
C)record count.
D)sequence check.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
28
When the staff accountant enters a correct customer number,the data entry screen displays the customer name and address.This is an example of

A)prompting.
B)preformatting.
C)closed-loop verification.
D)error checking.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
29
A ________ tests a numerical amount to ensure that it does not exceed a predetermined value.

A)completeness check
B)limit check
C)range check
D)sign check
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
30
Reconciliation procedures is an example of

A)a data entry control.
B)a data transmission control.
C)an output control.
D)a processing control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
31
A ________ determines if all required data items have been entered.

A)completeness check
B)field check
C)limit check
D)range check
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
32
A ________ is a data entry control that compares the ID number in transaction data to a master file to verify that the ID number exists.

A)reasonableness test
B)user review
C)data matching
D)validity check
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
33
The batch processing data entry control that sums a field that contains dollar values is called

A)record count.
B)financial total.
C)hash total.
D)sequence check.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
34
Checksums is an example of a(n)

A)data entry control.
B)data transmission control.
C)output control.
D)processing control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
35
Cancellation and storage of documents means

A)documents are defaced and stored.
B)documents are defaced before being shredded.
C)cancellation data are copied from documents before they are stored.
D)data are copied from a document and stored before it is being shredded.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
36
The batch processing data entry control that sums a non-financial numeric field is called

A)record count.
B)financial total.
C)hash total.
D)sequence check.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
37
A ________ determines the correctness of the logical relationship between two data items.

A)field check
B)alpha-numeric check
C)range check
D)reasonableness test
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
38
A validity check is an example of

A)a data entry control.
B)an output control.
C)a data transmission control.
D)an input control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
39
A ________ control ensures that the correct and most current files are being updated.

A)cross-footing balance test
B)data matching
C)file labels
D)write-protect mechanism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
40
A hash total is an example of which control below?

A)Data entry control.
B)Data transmission control.
C)Processing control.
D)Output control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
41
A facility that is pre-wired for necessary telecommunications and computer equipment,but doesn't have equipment installed,is known as a

A)cold site.
B)hot site.
C)remote site.
D)subsidiary location.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
42
What is the most effective way to ensure information system availability?

A)High bandwidth.
B)Maintain a hot site.
C)Maintain a cold site.
D)Frequent backups.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
43
Which of the following is not a risk associated with the data input process?

A)Data is invalid.
B)Data is incomplete.
C)Data is inaccurate.
D)Data is corrupted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
44
A facility that contains all the computing equipment the organization needs to perform its essential business activities is known as a

A)cold site.
B)hot site.
C)remote site.
D)subsidiary location.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
45
Prompting is a control that helps ensure

A)transaction data are not lost.
B)transactions data are accurate.
C)transactions data are complete.
D)transaction data are valid.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
46
Modest Expectations Investment Services (MEIS)allows customers to manage their investments over the Internet.If customers attempt to spend more money than they have in their account,an error message is displayed.This is an example of a

A)reasonableness test.
B)field check.
C)validity check.
D)limit check.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
47
The control that verifies accuracy by comparing two alternative ways of calculating the same total is called

A)concurrent update controls.
B)cross-footing balance test.
C)data conversion controls.
D)recalculation of batch totals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
48
The control that protects records from errors that occur when two or more users attempt to update the same record simultaneously is called

A)concurrent update controls.
B)cross-footing balance test.
C)data conversion controls.
D)recalculation of batch totals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
49
Which of the following is an example of a turnaround document?

A)A receipt a customer must use to return the goods purchased.
B)A telephone bill the customer must return with payment.
C)A paycheck stub that must be used in the employee's tax return.
D)A customer loyalty card used every time a customer purchases goods or services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
50
When opening an Excel file,Sonja received a message saying that the file is locked for editing.This is happening because

A)the file is corrupted due to a computer virus.
B)Sonja opened the file as read-only.
C)concurrent update controls have locked the file.
D)there is no problem.Sonja is editing the file,so it is locked.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
51
Which of the following is not an objective of a disaster recovery plan?

A)Minimize the extent of the disruption,damage or loss.
B)Establish a permanent alternative means of processing information.
C)Resume normal operations as soon as possible.
D)Train employees for emergency operations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
52
Modest Expectations Investment Services (MEIS)allows customers to manage their investments over the Internet.If customers attempt to sell more shares of a stock than they have in their account,an error message is displayed.This is an example of a

A)reasonableness test.
B)field check.
C)validity check.
D)limit check.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
53
Which of the following statements is true with regards to system availability?

A)Human error does not threaten system availability.
B)Threats to system availability can be completely eliminated.
C)Proper controls can maximize the risk of threats causing significant system downtime.
D)Threats to system availability include hardware and software failures as well as natural and man-made disasters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following is an important control to prevent buffet overflow vulnerabilities?

A)Limit check.
B)Size check.
C)Range check.
D)Field check.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
55
Discuss ways that can help ensure the processing integrity of electronic voting.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
56
A computer operator accidentally used the wrong master file when updating a transaction file.As a result,the master file data is now unreadable.Which control could best have prevented this from happening?

A)Header record.
B)Validity check.
C)Trailer record.
D)Parity check.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
57
What control are zero balance tests an example of?

A)Data entry controls.
B)Output controls.
C)Processing controls.
D)Source data controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
58
A ________ control entails verifying that the proper number of bits are set to the value 1 in each character received.

A)echo check
B)field check
C)parity check
D)trailer record
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
59
The Spontaneous Combustion Rocket Shoppe in downtown Fargo,North Dakota,generates three quarters of its revenue from orders taken over the Internet.The revenue clearing account is debited by the total of cash and credit receipts and credited by the total of storefront and Internet sales.This is an example of a

A)data integrity test.
B)zero-balance test.
C)trial balance audit.
D)cross-footing balance test.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
60
A disaster recovery plan typically does not include

A)scheduled electronic vaulting of files.
B)backup computer and telecommunication facilities.
C)a system upgrade due to operating system software changes.
D)uninterruptible power systems installed for key system components.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
61
Discuss how cloud computing could both positively and negatively affect system availability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
62
A copy of a database,master file,or software that will be retained indefinitely as a historical record is known as a(n)

A)archive.
B)cloud computing.
C)differential backup.
D)incremental backup.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
63
________ involves copying only the data items that have changed since the last partial backup.

A)Archive
B)Cloud computing
C)Differential backup
D)Incremental backup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
64
________ enables a system to continue functioning in the event that a particular component fails.

A)An incremental backup procedure
B)Fault tolerance
C)Preventive maintenance
D)A concurrent update control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
65
When a computer system's files are automatically duplicated on a second data storage system as they are changed,the process is referred to as

A)real-time mirroring.
B)batch updating.
C)consistency control.
D)double-secure storage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
66
The maximum acceptable down time after a computer system failure is determined by a company's

A)recovery time objective.
B)recovery point objective.
C)recovery objective.
D)maximum time recovery objective.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
67
Define and contrast a recovery point objective and a recovery time objective.Provide a numeric example.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
68
The accounting department at Aglaya Telecom records an average of 8,000 transactions per hour.A cost-benefit analysis leads management to conclude that the maximum acceptable amount of data loss is 32,000 transactions.If the firm's recovery time objective is 240 minutes,then the worst case recovery time objective is

A)4 hours.
B)8 hours.
C)16 hours.
D)24 hours.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
69
Identify the statement below which is true.

A)Cloud computing is a control technique for system availability.
B)Cloud computing eliminates the need for backup of applications and data.
C)Cloud computing eliminates the need for companies to own their own software and servers.
D)Cloud computing refers to the practice of storing application files and backup data on satellites "in the clouds."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
70
The accounting department at Aglaya Telecom records an average of 5,000 transactions per hour and have a recovery time objective of 120 minutes.Aglaya recently suffered a hardware malfunction and it took the company 20 hours to recover their lost data.How many transactions did Aglaya recover?

A)20,000 transactions.
B)30,000 transactions.
C)40,000 transactions.
D)50,000 transactions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
71
What is the primary objective of ensuring systems and information are available for use whenever needed?

A)To minimize system downtime.
B)To minimize system expense.
C)To maximize system processing speed.
D)To maximize sales.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
72
The accounting department at Aglaya Telecom records an average of 8,000 transactions per hour and have a recovery time objective of 240 minutes.Aglaya recently suffered a hardware malfunction and it took the company 16 hours to recover their lost data.How many transactions did Aglaya recover?

A)52,000 transactions.
B)5,200 transactions.
C)32,000 transactions.
D)3,200 transactions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
73
The maximum amount of time between backups is determined by a company's

A)recovery time objective.
B)recovery point objective.
C)recovery objective.
D)maximum time recovery objective.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
74
It is impossible to eliminate the risk of downtime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
75
While this type of backup process takes longer than the alternative,restoration is easier and faster.

A)archive
B)cloud computing
C)differential backup
D)incremental backup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
76
________ is a plan that specifies how to resume not only IT operations but all business processes in the event of a major calamity.

A)Disaster recovery plan
B)Business continuity plan
C)Real-time monitoring plan
D)Business contingency plan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
77
The accounting department at Synergy Hydroelectric records an average of 12,500 transactions per hour.By cost-benefit analysis,managers have concluded that the maximum acceptable loss of data in the event of a system failure is 50,000 transactions.If the firm's recovery time objective is 120 minutes,then the worst case recovery time objective is

A)2 hours.
B)4 hours.
C)6 hours.
D)8 hours.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
78
Probably the most important change management control is

A)monitoring user rights and privileges during the change process.
B)testing all changes thoroughly prior to implementation on a stand-alone computer.
C)updating all documentation to reflect changes made to the system.
D)management's careful monitoring and review.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
79
________ copies all changes made since the last full backup.

A)Archive
B)Cloud computing
C)Differential backup
D)Incremental backup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
80
The recovery point objective is inversely related to the frequency of backups.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 95 في هذه المجموعة.