Fill This Form To Receive Instant Help
Homework answers / question archive / Harvard University AUDIT 111 Chapter 7-Computer-Assisted Audit Tools and Techniques TRUE/FALSE 1)The three groups of application controls are batch controls, run-to-run controls, and audit trail controls
Harvard University
AUDIT 111
Chapter 7-Computer-Assisted Audit Tools and Techniques
ANS: T
ANS: F
ANS: T
a. |
consists of records that are stored sequentially in an audit file |
b. |
traces transactions from their source to their final disposition |
c. |
is a function of the quality and integrity of the application programs |
d. |
may take the form of pointers, indexes, and embedded keys |
a. |
the application need not be removed from service and tested directly |
b. |
auditors do not rely on a detailed knowledge of the application's internal logic |
c. |
the auditor reconciles previously produced output results with production input transactions |
d. |
this approach is used for complex transactions that receive input from many sources |
a. |
determining the fair value of inventory |
b. |
ensuring that passwords are valid |
c. |
verifying that all pay rates are within a specified range |
d. |
reconciling control totals |
a. |
the test transactions |
b. |
error reports |
c. |
updated master files |
d. |
output reports |
a. |
auditors need minimal computer expertise to use this method |
b. |
this method causes minimal disruption to the firm's operations |
c. |
the test data is easily compiled |
d. |
the auditor obtains explicit evidence concerning application functions |
a. |
the test data technique requires extensive computer expertise on the part of the auditor |
b. |
the auditor cannot be sure that the application being tested is a copy of the current applica- tion used by computer services personnel |
c. |
the auditor cannot be sure that the application being tested is the same application used throughout the entire year |
d. |
preparation of the test data is time-consuming |
a. |
involves individual modules only, not the full system |
b. |
requires creation of meaningful test data |
c. |
need not be repeated once the system is implemented |
d. |
is primarily concerned with usability |
a. |
1234567 |
b. |
12345 |
c. |
124356 |
d. |
123454 |
a. |
check digits should be used for all data codes |
b. |
check digits are always placed at the end of a data code |
c. |
check digits do not affect processing efficiency |
d. |
check digits are designed to detect transcription and transposition errors |
a. |
transactions are not omitted |
b. |
transactions are not added |
c. |
transactions are free from clerical errors |
d. |
an audit trail is created |
a. |
total payroll checks–$12,315 |
b. |
total number of employees–10 |
c. |
sum of the social security numbers–12,555,437,251 |
d. |
none of the above |
a. |
contains a transaction code |
b. |
records the record count |
c. |
contains a hash total |
d. |
control figures in the record may be adjusted during processing |
e. |
All the above are true |
a. |
hash total. |
b. |
record count. |
c. |
batch total. |
d. |
check digit |
a. |
sequence check |
b. |
zero value check |
c. |
spooling check |
d. |
range check |
a. |
missing data check |
b. |
numeric/alphabetic check |
c. |
range check |
d. |
validity check |
a. |
missing data check |
b. |
check digit |
c. |
reasonableness check |
d. |
validity check |
a. |
numeric/alphabetic data check |
b. |
sign check |
c. |
limit check |
d. |
missing data check |
a. |
numeric/alphabetic data checks |
b. |
limit check |
c. |
range check |
d. |
reasonableness check |
a. |
reasonableness check |
b. |
validity check. |
c. |
spooling check |
d. |
missing data check |
a. |
header label check |
b. |
expiration date check |
c. |
version check |
d. |
validity check |
a. |
to ensure that all data input is validated |
b. |
to ensure that only transactions of a similar type are being processed |
c. |
to ensure the records are in sequence and are not missing |
d. |
to ensure that no transaction is omitted |
a. |
transaction logs |
b. |
Transaction Listings. |
c. |
data encryption |
d. |
log of automatic transactions |
a. |
gaining access to the output file and changing critical data values |
b. |
using a remote printer and incurring operating inefficiencies |
c. |
making a copy of the output file and using the copy to produce illegal output reports |
d. |
printing an extra hardcopy of the output file |
a. |
only successful transactions are recorded on a transaction log |
b. |
unsuccessful transactions are recorded in an error file |
c. |
a transaction log is a temporary file |
d. |
a hardcopy transaction listing is provided to users |
a. |
check digits |
b. |
Limit check. |
c. |
spooling check |
d. |
missing data check |
a. |
immediate correction |
b. |
rejection of batch |
c. |
creation of error file |
d. |
all are examples of input error correction techniques |
a. |
production reports are affected by ITF transactions |
b. |
ITF databases contain "dummy" records integrated with legitimate records |
c. |
ITF permits ongoing application auditing |
d. |
ITF does not disrupt operations or require the intervention of computer services personnel |
a. |
Reasonableness check |
b. |
Run-to-run check |
c. |
Spooling check |
d. |
Batch check |
e. |
None are input controls |
a. |
Range check |
b. |
Limit check |
c. |
Spooling check |
d. |
Validity check |
e. |
They are all input controls |
a. |
black box tests of program controls |
b. |
white box tests of program controls |
c. |
substantive testing |
d. |
intuitive testing |
20. Describe two types of transposition error
discussing three techniques.
Already member? Sign In