3. Which of the following is not a computer facility control? (a) Place the data processing center where unauthorized individuals cannot gain entry to the facility. (b) Limit access to the data processing center all employees of the company. (c) Buy insurance to protect against loss of equipment in the computer facility. (d) Use advanced technology to identify individuals who are authorized access to the data processing center. 4.For internal control over computer program changes, a policy should be established requiring that: (a) All proposed changes be approved by a responsible individual and logged. (b) The programmer designing the change should be responsible for ensuring that the revised program is adequately tested. (c) All program changes be supervised by the information system control group. (d) To facilitate operational performance, superseded portions of programs should not be deleted from the program run manual. 5. Auditing "around the computer": (a) Assumes that accurate output is sufficient evidence that processing operations are appropriate. (b) Focuses on computerized control procedures. (c) Is the approach to auditing that is recommended in most cases to reduce IT audit costs. (d) Follows the audit trail through internal computer operations. 6.Which of the following is not true with respect to generalized audit software (GAS)? (a) They require auditors to rewrite processing programs frequently while reviewing computer files. (b) They are specifically tailored to auditor tasks. (c) allow auditors to manipulate files to extract and compare data. (d) They may be used for specific application areas, such as accounts receivable and inventory. 7. In selecting a new AIS, a company's management should: (a) Always hire a consultant. (b) Never rely on your accountant for help in this decision. (c) Always consult with your accountant during the decision process. (d) Always use an Internet software service to make the decision.
3. Which of the following is not a computer facility control?
(a) Place the data processing center where unauthorized individuals cannot gain entry to the facility.
(b) Limit access to the data processing center all employees of the company.
(c) Buy insurance to protect against loss of equipment in the computer facility.
(d) Use advanced technology to identify individuals who are authorized access to the data processing center.
4.For internal control over computer program changes, a policy should be established requiring that:
(a) All proposed changes be approved by a responsible individual and logged.
(b) The programmer designing the change should be responsible for ensuring that the revised program is adequately tested.
(c) All program changes be supervised by the information system control group.
(d) To facilitate operational performance, superseded portions of programs should not be deleted from the program run manual.
5. Auditing "around the computer":
(a) Assumes that accurate output is sufficient evidence that processing operations are appropriate.
(b) Focuses on computerized control procedures.
(c) Is the approach to auditing that is recommended in most cases to reduce IT audit costs.
(d) Follows the audit trail through internal computer operations.
6.Which of the following is not true with respect to generalized audit software (GAS)?
(a) They require auditors to rewrite processing programs frequently while reviewing computer files.
(b) They are specifically tailored to auditor tasks.
(c) allow auditors to manipulate files to extract and compare data.
(d) They may be used for specific application areas, such as
7. In selecting a new AIS, a company's management should:
(a) Always hire a consultant.
(b) Never rely on your accountant for help in this decision.
(c) Always consult with your accountant during the decision process.
(d) Always use an Internet software service to make the decision.
Unlock instant AI solutions
Tap the button
to generate a solution