Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

True-False Questins 1. All controls available for the computerized accounting in

ID: 2385768 • Letter: T

Question

True-False Questins
1. All controls available for the computerized accounting information system of a company should be implemented regardless of cost due to the high rate of computer crime.

2. One of the "fallback" procedures of a computing center is the "grandfather parent-child" file arrangement.

3. According to the text, data transcription would only be necessary for a computerized accounting information system.

4. Edit checks are very rarely used because they are not cost-effective controls.

5. Information processing personnel usually only use selective edit checks in data processing applications due to the cost of computer time necessary for editing.

6. Testing processing programs with test data is performed only when a system is first installed due to the high costs of such test runs.

7. The audit trail is easier to follow in an online computerized system as compared to a batch system.

8. No record of transactions is made in an online computerized system.

9. Most computer vandalism is performed by "professional" computer criminals who have no personal contact with the computer centers they disrupt.

10. The primary function of controls for a computerized accounting information system is to detect computer fraud.

11. Input controls attempt to assure the accuracy and completeness of the data fed into the CPU for processing.

12. It is more difficult to safeguard logical computer access than it is to safeguard physical computer access.

13. Output controls for the computerized accounting information system focus primarily on the security and distribution of print media prepared by the computer center.

14. Biometric identifications are irrelevant to computer network systems.

15. Consensus-based protocols contain an odd number of processors.

Explanation / Answer

True-False Questins 1. All controls available for the computerized accounting information system of a company should be implemented regardless of cost due to the high rate of computer crime. - False, at times due to high costs associated with computerized accounting information system, even manual records can be considered. 2. One of the "fallback" procedures of a computing center is the "grandfather parent-child" file arrangement. - True 3. According to the text, data transcription would only be necessary for a computerized accounting information system. True 4. Edit checks are very rarely used because they are not cost-effective controls. False, edit checks are very frequently used as they acre cost effective tools 5. Information processing personnel usually only use selective edit checks in data processing applications due to the cost of computer time necessary for editing. - False, Information processing personnel usually only use selective edit checks in data processing applications due to the personnel having shortage of time and not because of the cost of computer time necessary for editing 6. Testing processing programs with test data is performed only when a system is first installed due to the high costs of such test runs. - True 7. The audit trail is easier to follow in an online computerized system as compared to a batch system. - True 8. No record of transactions is made in an online computerized system. False, records of transaction can be made in an online computerized system 9. Most computer vandalism is performed by "professional" computer criminals who have no personal contact with the computer centers they disrupt. True 10. The primary function of controls for a computerized accounting information system is to detect computer fraud. True 11. Input controls attempt to assure the accuracy and completeness of the data fed into the CPU for processing. True 12. It is more difficult to safeguard logical computer access than it is to safeguard physical computer access. True 13. Output controls for the computerized accounting information system focus primarily on the security and distribution of print media prepared by the computer center. True 14. Biometric identifications are irrelevant to computer network systems. False, there are computer who one can access only after verifying biometric credentials 15. Consensus-based protocols contain an odd number of processors. - True

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote