Search Header Logo

Testbank1

Authored by ROMMEL DULA

Business

University

Used 2+ times

Testbank1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Processing simulated file data provides the auditor with information about the reliability of controls from evidence that exists in simulated files. One of the techniques involved in this approach makes use of

Controlled reprocessing

Program code checking

Printout reviews

Integrated test facility

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The test data method is used by auditors to test the

Accuracy of input data

Validity of the output

Procedures contained within the program

Normalcy of distribution of test data

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

From an audit viewpoint, which of the following represents a potential disadvantage associated with the widespread use of microcomputers?

Their portability

Their ease of access by novice users

Their easily developed programs using spreadsheets which do not have to be documented

All of the above.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A customer erroneously ordered Item No. 86321 rather than item No. 83621. When this order is processed, the vendor’s EDP department would identify the error with what type of control?

Key verifying

Batch total

Self-checking digit

Item inspection

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Auditors often make use of computer programs that perform routine processing functions such as sorting and merging. These programs are made available by electronic data processing companies and others and are specifically referred to as

Compiler programs

Utility programs

Supervisory programs

User programs

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Computer systems are typically supported by a variety of utility software packages that are important to an auditor because they

May enable unauthorized changes to data files if not properly controlled.

Are very versatile programs that can be used on hardware of many manufacturers.

May be significant components of a client’s application programs.

Are written specifically to enable auditors to extract and sort data.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The use of a header label in conjunction with magnetic tape is most likely to prevent errors by the

Computer operator

Computer programmer

Keypunch operator

Maintenance technician

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?