Chapter 7 Flashcards

(54 cards)

1
Q

The three groups of application controls are batch controls, run-to-run controls, and audit trail controls

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A reasonableness check determines if a value in one field is reasonable when considered along with data in other fields of the record

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A trunctuation error is a form off transcription error

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A check digit is a method of detecting data coding errors

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Input controls are intended to detect errors in transactiond data after processing

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The black box approach to testing computer applications allows the auditor to explicitly review program logic.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The black box approach to testing computer applications require a detailed knowledge of the the program logic being tested.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A run-to-run control is an example of an output control

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A shredding computer printouts is an example of an output control

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In a computerized environment, all input controls are implemented after data is input

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Achieving batch control objectives requires grouping similar types of input transactions (such as sales orders) together in batches and then controlling the batches throughout data processing.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The whte box tests of program controls are also known as auditing throgh the computer

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Incorrectly recording sales order number 123456 as 124356 is an example of a transcription error

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When using the test data method, the presence of multiple error messages indicates a flaw in the preparation of test transactions.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The base case system evaluation is a variation of the test data method.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tracing is a method used to verify the logical operations executed by a computer application

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The results of a parallel simulation are compared to the results of a production run in order to judge the quality of the application processes and controls.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Input controls are programmed procedures that perform tests on master file data to ensure they are free from errors.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The integrated test facility (ITF) is an automated approach that permits auditors to test an application’s logic and controls during its normal operation.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Use of integrated test facility poses no threat to organizational data files

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Spooling is a form of processing control

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A salami fraud affects a large number of victims, but the harm to each appears to be very small

23
Q

An input control that tests time card records to verify than no employee has worked more 50 hours in a pay period is an example of a range test.

24
Q

The black box approach to testing computer program controls is also known as auditing around the computer.

25
Which statement is not correct? The audit trail in a computerized environment a. consists of records that are stored sequentially in an audit file b. traces transactions from their source to their final disposition c. is a function of the quality and integrity of the application programs d. may take the form of pointers, indexes, and embedded keys
A
26
All of the following concepts are associated with the black box approach to auditing computer applications except a. the application need not be removed from service and tested directly b. auditors do not rely on a detailed knowledge of the application's internal logic c. the auditor reconciles previously produced output results with production input transactions d. this approach is used for complex transactions that receive input from many sources
D
27
Which test is not an example of a white box test? a. determining the fair value of inventory b. ensuring that passwords are valid c. verifying that all pay rates are within a specified range d. reconciling control totals
A
28
When analyzing the results of the test data method, the auditor would spend the least amount of time reviewing a. the test transactions b. error reports c. updated master files d. output reports
A
29
All of the following are advantages of the test data technique except a. auditors need minimal computer expertise to use this method b. this method causes minimal disruption to the firm's operations c. the test data is easily compiled d. the auditor obtains explicit evidence concerning application function
C
30
All of the following are disadvantages of the test data technique except a. the test data technique requires extensive computer expertise on the part of the auditor b. the auditor cannot be sure that the application being tested is a copy of the current application used by computer services personnel c. the auditor cannot be sure that the application being tested is the same application used throughout the entire year d. preparation of the test data is time-consuming ion
A
31
Program testing a. involves individual modules only, not the full system b. requires creation of meaningful test data c. need not be repeated once the system is implemented d. is primarily concerned with usability
B
32
The correct purchase order number,is123456. All of the following are transcription errors except a. 1234567 b. 12345 c. 124356 d. 123454
C
33
Which of the following is correct? a. check digits should be used for all data codes b. check digits are always placed at the end of a data code c. check digits do not affect processing efficiency d. check digits are designed to detect transcription and transposition errors
D
34
Which statement is not correct? The goal of batch controls is to ensure that during processing a. transactions are not omitted b. transactions are not added c. transactions are free from clerical errors d. an audit trail is created
C
35
An example of a hash total is a. total payroll checks—$12,315 b. total number of employees—10 c. sum of the social security numbers—12,555,437,251 d. none of the above
D
36
Which statement is not true? A batch control record a. contains a transaction code b. records the record count c. contains a hash total d. control figures in the record may be adjusted during processing e. All the above are true
E
37
Which of the following is not an example of a processing control? a. hash total. b. record count. c. batch total. d. check digit
D
38
Which of the following is an example of input control test? a. sequence check b. zero value check c. spooling check d. range check
D
39
Which input control check would detect a payment made to a nonexistent vendor? a. missing data check b. numeric/alphabetic check c. range check d. validity check
D
40
Which input control check would detect a posting to the wrong customer account? a. missing data check b. check digit c. reasonableness check d. validity check
B
41
The employee entered "40" in the "hours worked per day" field. Which check would detect this unintentional error? a. numeric/alphabetic data check b. sign check c. limit check d. missing data check
C
42
An inventory record indicates that 12 items of a specific product are on hand. A customer purchased two of the items, but when recording the order, the data entry clerk mistakenly entered 20 items sold. Which check could detect this error? a. numeric/alphabetic data checks b. limit check c. range check d. reasonableness check
B
43
Which check is not an input control? a. reasonableness check b. validity check. c. spooling check d. missing data check
C
44
A computer operator was in a hurry and accidentally used the wrong master file to process a transaction file. As a result, the accounts receivable master file was erased. Which control would prevent this from happening? a. header label check b. expiration date check C. Version check D. Validity check
A
45
Run-to-run control totals can be used for all of the following except a. to ensure that all data input is validated b. to ensure that only transactions of a similar type are being processed c. to ensure the records are in sequence and are not missing d. to ensure that no transaction is omitted
A
46
Methods used to maintain an audit trail in a computerized environment include all of the following except a. transaction logs b. Transaction Listings. c. data encryption d. log of automatic transactions
C
47
Risk exposures associated with creating an output file as an intermediate step in the printing process (spooling) include all of the following actions by a computer criminal except a. gaining access to the output file and changing critical data values b. using a remote printer and incurring operating inefficiencies c. making a copy of the output file and using the copy to produce illegal output reports d. printing an extra hardcopy of the output file
B
48
Which statement is not correct? a. only successful transactions are recorded on a transaction log b. unsuccessful transactions are recorded in an error file c. a transaction log is a temporary file d. a hardcopy transaction listing is provided to users
C
49
Input controls include all of the following except a. check digits b. Limit check. c. spooling check d. missing data check
C
50
Which of the following is an example of an input error correction technique? a. immediate correction b. rejection of batch c. creation of error file d. all are examples of input error correction techniques
D
51
All of the following statements are true about the integrated test facility (ITF) except A. Production reports are affected by ITF transactions b. ITF databases contain "dummy" records integrated with legitimate records c. ITF permits ongoing application auditing d. ITF does not disrupt operations or require the intervention of computer services personn
C
52
Which of the following is an input control? a. Reasonableness check b. Run-to-run check c. Spooling check d. Batch check e. None are input controls
A
53
Which of the following is not an input control? a. Range check b. Limit check c. Spooling check d. Validity check e. They are all input contro
C
54
When auditors do not rely on a detailed knowledge of the application's internal logic, they are performing a. black box tests of program controls b. white box tests of program controls c. substantive testing d. intuitive testing
A