Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Maltiple Choice (2 points each) 1. A company designs controls to ensure that its

ID: 2548314 • Letter: M

Question

Maltiple Choice (2 points each) 1. A company designs controls to ensure that its overall computer system is stable and well managed b. general c specific e. none of the above 2. A source data control that caloulates a separate digit which is added on to codes and account and verification is afn) a waste of time b. check digi c. edit check d. key verification e none of dhe ahove When risk isthen auditors must take larger samples of data daring the 1. Which of the ollowing will sot peolect your personal isformation while your system is e secure 5. A compuser operaor inadvertently has loaded the wrong CD when updating the inventory file Bhich of the following is most likely to detect such an emor? b reading internal and external labels 6. Penonscl policies such as background checks, mandatory vacations, and rotation of dusies will end to deter b. employee fraad d. payroll irregrularities 7. Which step would be inappropriate in trying to ac a. formal authorization for program changes b. programmers making bug fixes immediately achieve good control over changes? d. thorough testing of changes e. separation of programming a to the supervisor for approval of modifications before implementation and authorizing changes are noted A company that has procedures for data entry that are not followed has more control ompany with appropriate procedures that are followed rr

Explanation / Answer

1.

Answer: a

Application is suitable here. It includes programming , browsing, etc; these must be well controlled in order to get a stable computer system.

2.

Answer: d

This is the key verification, since it helps to understand the nature of input data and its sensitivity.

3.

Answer: c

If the acceptable audit risk is high, the auditor should not take any chance but take large sample for making sure.

4.

Answer: b

Encryption is appropriate here. It unfolds personal data in the computer system connected to internet.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote