Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems
Quiz 8: Internal Controls II
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
The comparison of actual and budgeted figures and the conduct of variance analysis to determine the source of the variance is a type of:
Question 2
Multiple Choice
In terms of proper recording of transactions,accuracy is concerned with making sure that: (i) all data that enter the system are in the correct format (ii) all data that enter the system are of the right type (iii) all data are stored in a secured place to prevent unauthorised manipulation (iv) the data gathered accurately reflect the reality of the underlying transaction or event.
Question 3
Multiple Choice
Which of the following is not a type of controls classified in the Australian Auditing Standard ASA 315?
Question 4
Multiple Choice
An antivirus program scans and monitors files in a computer continuously for viruses.This is an example of:
Question 5
Multiple Choice
Which of the following is a risk to the financial statement of a company when it places a purchase order with a supplier?
Question 6
Multiple Choice
With respect to the recording of transactions,which of the following statements is true?
Question 7
Multiple Choice
Which of the following is NOT a major aim of a computerised accounting information system?
Question 8
Multiple Choice
Segregation of duties is a principle that applies to which sections of an organisation?
Question 9
Multiple Choice
Information processing controls are those that are put in place within the organisation to work towards the _______ of transactions.
Question 10
Multiple Choice
Authorisation in a computerised information system can be established through: (i) user privileges (ii) user access rights (iii) restrictions on what different users are able to do within the system.
Question 11
Multiple Choice
Which aspect of document collection are pre-numbered documents used to establish?
Question 12
Multiple Choice
Control of access to the server for the company database is an example of which type of control?
Question 13
Multiple Choice
A computer virus is found in a file in the computer system.Because a solution for recovering the file is not yet available,the infected file is quarantine by the antivirus software.Quarantining the infected file is an example of: