Deck 7: Computer Assisted Audit Tools and Techniques

Full screen (f)
exit full mode
Question
The black box approach to testing computer applications allows the auditor to explicitly review program logic.
Use Space or
up arrow
down arrow
to flip the card.
Question
A reasonableness check determines if a value in one field is reasonable when considered along with data in other fields of the record
Question
Achieving batch control objectives requires grouping similar types of input transactions (such as sales orders) together in batches and then controlling the batches throughout data processing.
Question
Incorrectly recording sales order number 123456 as 124356 is an example of a transcription error
Question
A run-to-run control is an example of an output control.
Question
Input controls are intended to detect errors in transaction data after processing.
Question
The results of a parallel simulation are compared to the results of a production run in order to judge the quality of the application processes and controls.
Question
The white box tests of program controls are also known as auditing through the computer.
Question
Use of the integrated test facility poses no threat to organizational data files.
Question
The black box approach to testing computer applications require a detailed knowledge of the the program logic being tested.
Question
A truncation error is a form of transcription error.
Question
Input controls are programmed procedures that perform tests on master file data to ensure they are free from errors.
Question
When using the test data method, the presence of multiple error messages indicates a flaw in the preparation of test transactions.
Question
Shredding computer printouts is an example of an output control.
Question
The integrated test facility (ITF) is an automated approach that permits auditors to test an application's logic and controls during its normal operation.
Question
Tracing is a method used to verify the logical operations executed by a computer application.
Question
The three groups of application controls are batch controls, run-to-run controls, and audit trail controls.
Question
In a computerized environment, all input controls are implemented after data is input.
Question
A check digit is a method of detecting data coding errors.
Question
The base case system evaluation is a variation of the test data method.
Question
Which input control check would detect a posting to the wrong customer account?

A) missing data check
B) check digit
C) reasonableness check
D) validity check
Question
All of the following concepts are associated with the black box approach to auditing computer applications except

A) the application need not be removed from service and tested directly
B) auditors do not rely on a detailed knowledge of the application's internal logic
C) the auditor reconciles previously produced output results with production input transactions
D) this approach is used for complex transactions that receive input from many sources
Question
Which statement is not correct? The audit trail in a computerized environment

A) consists of records that are stored sequentially in an audit file
B) traces transactions from their source to their final disposition
C) is a function of the quality and integrity of the application programs
D) may take the form of pointers, indexes, and embedded keys
Question
A salami fraud affects a large number of victims, but the harm to each appears to be very small.
Question
Which input control check would detect a payment made to a nonexistent vendor?

A) missing data check
B) numeric/alphabetic check
C) range check
D) validity check
Question
An input control that tests time card records to verify than no employee has worked more 50 hours in a pay period is an example of a range test.
Question
All of the following are advantages of the test data technique except

A) auditors need minimal computer expertise to use this method
B) this method causes minimal disruption to the firm's operations
C) the test data is easily compiled
D) the auditor obtains explicit evidence concerning application functions
Question
Which of the following is not an example of a processing control?

A) hash total.
B) record count.
C) batch total.
D) check digit
Question
An example of a hash total is

A) total payroll checks-$12,315
B) total number of employees-10
C) sum of the social security numbers-12,555,437,251
D) none of the above
Question
When analyzing the results of the test data method, the auditor would spend the least amount of time reviewing

A) the test transactions
B) error reports
C) updated master files
D) output reports
Question
Which statement is not true? A batch control record

A) contains a transaction code
B) records the record count
C) contains a hash total
D) control figures in the record may be adjusted during processing
E) All the above are true
Question
Recalculation of hash totals is an example of a

A) completeness test
B) redundancy test
C) both a. and b.
D) neither a. nor b.
Question
All of the following are disadvantages of the test data technique except

A) the test data technique requires extensive computer expertise on the part of the auditor
B) the auditor cannot be sure that the application being tested is a copy of the current application used by computer services personnel
C) the auditor cannot be sure that the application being tested is the same application used throughout the entire year
D) preparation of the test data is time-consuming
Question
Which test is not an example of a white box test?

A) determining the fair value of inventory
B) ensuring that passwords are valid
C) verifying that all pay rates are within a specified range
D) reconciling control totals
Question
Which of the following does not influence the length of time a hard copy report is retained?

A) Statutory requirements.
B) The number of copies in existence.
C) The number of pages of the report.
D) All of these factors influence the length of time a hard copy report is retained.
Question
Which of the following is correct?

A) Check digits should be used for all data codes.
B) Check digits are always placed at the end of a data code.
C) Check digits do not affect processing efficiency.
D) Check digits are designed to detect transcription and transposition errors.
Question
The correct purchase order number is123456. All of the following are transcription errors except

A) 1234567
B) 12345
C) 124356
D) 123454
Question
The black box approach to testing computer program controls is also known as auditing around the computer.
Question
Spooling is a form of processing control.
Question
Which of the following is an example of input control test?

A) sequence check
B) zero value check
C) spooling check
D) range check
Question
A computer operator was in a hurry and accidentally used the wrong master file to process a transaction file. As a result, the accounts receivable master file was erased. Which control would prevent this from happening?

A) header label check
B) expiration date check
C) version check
D) validity check
Question
An inventory record indicates that 12 items of a specific product are on hand. A customer purchased two of the items, but when recording the order, the data entry clerk mistakenly entered 20 items sold. Which check could detect this error?

A) numeric/alphabetic data checks
B) limit check
C) range check
D) reasonableness check
Question
The employee entered "40" in the "hours worked per day" field. Which check would detect this unintentional error?

A) numeric/alphabetic data check
B) sign check
C) limit check
D) missing data check
Question
Which check is not an input control?

A) reasonableness check
B) validity check.
C) spooling check
D) missing data check
Question
Run-to-run control totals can be used for all of the following except

A) to ensure that all data input is validated
B) to ensure that only transactions of a similar type are being processed
C) to ensure the records are in sequence and are not missing
D) to ensure that no transaction is omitted
Question
Methods used to maintain an audit trail in a computerized environment include all of the following except

A) transaction logs
B) transaction listings
C) data encryption
D) log of automatic transactions
Question
All of the following statements are true about the integrated test facility (ITF) except

A) production reports are affected by ITF transactions
B) ITF databases contain "dummy" records integrated with legitimate records
C) ITF permits ongoing application auditing
D) ITF does not disrupt operations or require the intervention of computer services personnel
Question
The firm allows no more than 10 hours of overtime a week. An employee entered "15" in the field. Which control will detect this error?
Question
What are the three categories of processing control?
Question
When auditors do not rely on a detailed knowledge of the application's internal logic, they are performing

A) black box tests of program controls
B) white box tests of program controls
C) substantive testing
D) intuitive testing
Question
Which of the following is an example of an input error correction technique?

A) immediate correction
B) rejection of batch
C) creation of error file
D) all are examples of input error correction techniques
Question
What are the three broad categories of application controls?
Question
Which of the following is an input control?

A) Reasonableness check
B) Run-to-run check
C) Spooling check
D) Batch check
E) None are input controls
Question
The password was "CANARY"; the employee entered "CAANARY." Which control will detect this error?
Question
The order entry system will allow a 10 percent variation in list price. For example, an item with a list price of $1 could be sold for 90 cents or $1.10 without any system interference. The cost of the item is $3, but the cashier entered $2. Which control would detect this error?
Question
Which statement is not correct?

A) Only successful transactions are recorded on a transaction log.
B) Unsuccessful transactions are recorded in an error file.
C) A transaction log is a temporary file.
D) A hardcopy transaction listing is provided to users.
Question
Risk exposures associated with creating an output file as an intermediate step in the printing process (spooling) include all of the following actions by a computer criminal except

A) gaining access to the output file and changing critical data values
B) using a remote printer and incurring operating inefficiencies
C) making a copy of the output file and using the copy to produce illegal output reports
D) printing an extra hardcopy of the output file
Question
Which of the following is not an input control?

A) Range check
B) Limit check
C) Spooling check
D) Validity check
E) They are all input controls
Question
How does privacy relate to output control?
Question
Input controls include all of the following except

A) check digits
B) limit check
C) spooling check
D) missing data check
Question
Explain input controls.
Question
Output controls ensure that output is not lost, misdirected, or corrupted and that privacy is not violated. What are some output exposures or situations where output is at risk?
Question
Give one example of an error that is detected by a check digit control.
Question
Explain the three methods used to correct errors in data entry.
Question
If input and processing controls are adequate, why are output controls needed?
Question
Describe two types of transposition errors.
Question
The presence of an audit trail is critical to the integrity of the accounting information system. Discuss three of the techniques used to preserve the audit trail.
Question
Define each of the following input controls and give an example of how they may be used:a. Missing data check
b. Numeric/alphabetic data check
c. Limit check
d. Range check
e. Reasonableness check
f. Validity check
Question
What is meant by auditing around the computer versus auditing through the computer? Why is this so important?
Question
Name four input controls and describe what they test?
Question
Classify each of the following as a field, record, or file interrogation:a. Limit check
b. Validity check
c. Version check
d. Missing data check
e. Sign checks
f. Expiration date check
g. Numeric-alphabetic data check
h. Sequence check
i. Zero-value check
j. Header label check
k. Range check
l. Reasonableness check
Question
Discuss the three categories of input of input controls.
Question
Name three types of transcription errors.
Question
What control issue is related to reentering corrected error records into a batch processing system? What are the two methods for doing this?
Question
A __________________________ fraud affects a large number of victims but the harm to each appears to be very small.
Question
After data is entered into the system, it is processed. Processing control exists to make sure that the correct things happen during processing. Discuss processing controls.
Question
If all of the inputs have been validated before processing, then what purpose do run-to-run controls serve?
Question
Auditors do not rely on detailed knowledge of the application's internal logic when they use the __________________________ approach to auditing computer applications.
Question
Describe parallel simulation.
Question
Describe and contrast the test data method with the integrated test facility.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/82
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Computer Assisted Audit Tools and Techniques
1
The black box approach to testing computer applications allows the auditor to explicitly review program logic.
False
2
A reasonableness check determines if a value in one field is reasonable when considered along with data in other fields of the record
True
3
Achieving batch control objectives requires grouping similar types of input transactions (such as sales orders) together in batches and then controlling the batches throughout data processing.
True
4
Incorrectly recording sales order number 123456 as 124356 is an example of a transcription error
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
5
A run-to-run control is an example of an output control.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
6
Input controls are intended to detect errors in transaction data after processing.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
7
The results of a parallel simulation are compared to the results of a production run in order to judge the quality of the application processes and controls.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
8
The white box tests of program controls are also known as auditing through the computer.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
9
Use of the integrated test facility poses no threat to organizational data files.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
10
The black box approach to testing computer applications require a detailed knowledge of the the program logic being tested.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
11
A truncation error is a form of transcription error.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
12
Input controls are programmed procedures that perform tests on master file data to ensure they are free from errors.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
13
When using the test data method, the presence of multiple error messages indicates a flaw in the preparation of test transactions.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
14
Shredding computer printouts is an example of an output control.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
15
The integrated test facility (ITF) is an automated approach that permits auditors to test an application's logic and controls during its normal operation.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
16
Tracing is a method used to verify the logical operations executed by a computer application.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
17
The three groups of application controls are batch controls, run-to-run controls, and audit trail controls.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
18
In a computerized environment, all input controls are implemented after data is input.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
19
A check digit is a method of detecting data coding errors.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
20
The base case system evaluation is a variation of the test data method.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
21
Which input control check would detect a posting to the wrong customer account?

A) missing data check
B) check digit
C) reasonableness check
D) validity check
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
22
All of the following concepts are associated with the black box approach to auditing computer applications except

A) the application need not be removed from service and tested directly
B) auditors do not rely on a detailed knowledge of the application's internal logic
C) the auditor reconciles previously produced output results with production input transactions
D) this approach is used for complex transactions that receive input from many sources
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
23
Which statement is not correct? The audit trail in a computerized environment

A) consists of records that are stored sequentially in an audit file
B) traces transactions from their source to their final disposition
C) is a function of the quality and integrity of the application programs
D) may take the form of pointers, indexes, and embedded keys
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
24
A salami fraud affects a large number of victims, but the harm to each appears to be very small.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
25
Which input control check would detect a payment made to a nonexistent vendor?

A) missing data check
B) numeric/alphabetic check
C) range check
D) validity check
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
26
An input control that tests time card records to verify than no employee has worked more 50 hours in a pay period is an example of a range test.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
27
All of the following are advantages of the test data technique except

A) auditors need minimal computer expertise to use this method
B) this method causes minimal disruption to the firm's operations
C) the test data is easily compiled
D) the auditor obtains explicit evidence concerning application functions
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is not an example of a processing control?

A) hash total.
B) record count.
C) batch total.
D) check digit
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
29
An example of a hash total is

A) total payroll checks-$12,315
B) total number of employees-10
C) sum of the social security numbers-12,555,437,251
D) none of the above
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
30
When analyzing the results of the test data method, the auditor would spend the least amount of time reviewing

A) the test transactions
B) error reports
C) updated master files
D) output reports
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
31
Which statement is not true? A batch control record

A) contains a transaction code
B) records the record count
C) contains a hash total
D) control figures in the record may be adjusted during processing
E) All the above are true
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
32
Recalculation of hash totals is an example of a

A) completeness test
B) redundancy test
C) both a. and b.
D) neither a. nor b.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
33
All of the following are disadvantages of the test data technique except

A) the test data technique requires extensive computer expertise on the part of the auditor
B) the auditor cannot be sure that the application being tested is a copy of the current application used by computer services personnel
C) the auditor cannot be sure that the application being tested is the same application used throughout the entire year
D) preparation of the test data is time-consuming
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
34
Which test is not an example of a white box test?

A) determining the fair value of inventory
B) ensuring that passwords are valid
C) verifying that all pay rates are within a specified range
D) reconciling control totals
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following does not influence the length of time a hard copy report is retained?

A) Statutory requirements.
B) The number of copies in existence.
C) The number of pages of the report.
D) All of these factors influence the length of time a hard copy report is retained.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is correct?

A) Check digits should be used for all data codes.
B) Check digits are always placed at the end of a data code.
C) Check digits do not affect processing efficiency.
D) Check digits are designed to detect transcription and transposition errors.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
37
The correct purchase order number is123456. All of the following are transcription errors except

A) 1234567
B) 12345
C) 124356
D) 123454
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
38
The black box approach to testing computer program controls is also known as auditing around the computer.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
39
Spooling is a form of processing control.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following is an example of input control test?

A) sequence check
B) zero value check
C) spooling check
D) range check
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
41
A computer operator was in a hurry and accidentally used the wrong master file to process a transaction file. As a result, the accounts receivable master file was erased. Which control would prevent this from happening?

A) header label check
B) expiration date check
C) version check
D) validity check
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
42
An inventory record indicates that 12 items of a specific product are on hand. A customer purchased two of the items, but when recording the order, the data entry clerk mistakenly entered 20 items sold. Which check could detect this error?

A) numeric/alphabetic data checks
B) limit check
C) range check
D) reasonableness check
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
43
The employee entered "40" in the "hours worked per day" field. Which check would detect this unintentional error?

A) numeric/alphabetic data check
B) sign check
C) limit check
D) missing data check
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
44
Which check is not an input control?

A) reasonableness check
B) validity check.
C) spooling check
D) missing data check
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
45
Run-to-run control totals can be used for all of the following except

A) to ensure that all data input is validated
B) to ensure that only transactions of a similar type are being processed
C) to ensure the records are in sequence and are not missing
D) to ensure that no transaction is omitted
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
46
Methods used to maintain an audit trail in a computerized environment include all of the following except

A) transaction logs
B) transaction listings
C) data encryption
D) log of automatic transactions
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
47
All of the following statements are true about the integrated test facility (ITF) except

A) production reports are affected by ITF transactions
B) ITF databases contain "dummy" records integrated with legitimate records
C) ITF permits ongoing application auditing
D) ITF does not disrupt operations or require the intervention of computer services personnel
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
48
The firm allows no more than 10 hours of overtime a week. An employee entered "15" in the field. Which control will detect this error?
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
49
What are the three categories of processing control?
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
50
When auditors do not rely on a detailed knowledge of the application's internal logic, they are performing

A) black box tests of program controls
B) white box tests of program controls
C) substantive testing
D) intuitive testing
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following is an example of an input error correction technique?

A) immediate correction
B) rejection of batch
C) creation of error file
D) all are examples of input error correction techniques
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
52
What are the three broad categories of application controls?
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following is an input control?

A) Reasonableness check
B) Run-to-run check
C) Spooling check
D) Batch check
E) None are input controls
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
54
The password was "CANARY"; the employee entered "CAANARY." Which control will detect this error?
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
55
The order entry system will allow a 10 percent variation in list price. For example, an item with a list price of $1 could be sold for 90 cents or $1.10 without any system interference. The cost of the item is $3, but the cashier entered $2. Which control would detect this error?
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
56
Which statement is not correct?

A) Only successful transactions are recorded on a transaction log.
B) Unsuccessful transactions are recorded in an error file.
C) A transaction log is a temporary file.
D) A hardcopy transaction listing is provided to users.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
57
Risk exposures associated with creating an output file as an intermediate step in the printing process (spooling) include all of the following actions by a computer criminal except

A) gaining access to the output file and changing critical data values
B) using a remote printer and incurring operating inefficiencies
C) making a copy of the output file and using the copy to produce illegal output reports
D) printing an extra hardcopy of the output file
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following is not an input control?

A) Range check
B) Limit check
C) Spooling check
D) Validity check
E) They are all input controls
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
59
How does privacy relate to output control?
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
60
Input controls include all of the following except

A) check digits
B) limit check
C) spooling check
D) missing data check
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
61
Explain input controls.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
62
Output controls ensure that output is not lost, misdirected, or corrupted and that privacy is not violated. What are some output exposures or situations where output is at risk?
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
63
Give one example of an error that is detected by a check digit control.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
64
Explain the three methods used to correct errors in data entry.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
65
If input and processing controls are adequate, why are output controls needed?
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
66
Describe two types of transposition errors.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
67
The presence of an audit trail is critical to the integrity of the accounting information system. Discuss three of the techniques used to preserve the audit trail.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
68
Define each of the following input controls and give an example of how they may be used:a. Missing data check
b. Numeric/alphabetic data check
c. Limit check
d. Range check
e. Reasonableness check
f. Validity check
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
69
What is meant by auditing around the computer versus auditing through the computer? Why is this so important?
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
70
Name four input controls and describe what they test?
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
71
Classify each of the following as a field, record, or file interrogation:a. Limit check
b. Validity check
c. Version check
d. Missing data check
e. Sign checks
f. Expiration date check
g. Numeric-alphabetic data check
h. Sequence check
i. Zero-value check
j. Header label check
k. Range check
l. Reasonableness check
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
72
Discuss the three categories of input of input controls.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
73
Name three types of transcription errors.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
74
What control issue is related to reentering corrected error records into a batch processing system? What are the two methods for doing this?
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
75
A __________________________ fraud affects a large number of victims but the harm to each appears to be very small.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
76
After data is entered into the system, it is processed. Processing control exists to make sure that the correct things happen during processing. Discuss processing controls.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
77
If all of the inputs have been validated before processing, then what purpose do run-to-run controls serve?
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
78
Auditors do not rely on detailed knowledge of the application's internal logic when they use the __________________________ approach to auditing computer applications.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
79
Describe parallel simulation.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
80
Describe and contrast the test data method with the integrated test facility.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 82 flashcards in this deck.