Internal Control and Computer Based Information Systems
Internal Control and Computer Based Information Systems
Internal Control and Computer Based Information Systems
a. Back-up files
b. Check digits
c. Completeness tests
d. Conversion verification.
ANSWER: A
11. An integrated test facility (ITF) would be appropriate when the auditor
needs to
a. Trace a complex logic path through an application system.
b. Verify processing accuracy concurrently with processing.
c. Monitor transactions in an application system continuously. d. Verify load
module integrity for production programs.
ANSWER: B
12. Where computer processing is used in significant accounting
applications, internal accounting control procedures may be defined by
classifying control procedures into two types: general and
a. Administrative. b. Specific. c. Application. d. Authorization.
ANSWER: C
13. The increased presence of the microcomputer in the workplace has
resulted in an increasing number of persons having access to the computer.
A control that is often used to prevent unauthorized access to sensitive
programs is:
ANSWER: D
20. Company A has recently converted its manual payroll to a computerbased system. Under the old system, employees who had resigned or
been terminated were occasionally kept on the payroll and their checks
were claimed and cashed by other employees, in collusion with shop
foremen. The controller is concerned that this practice not be allowed
to continue under the new system. The best control for preventing
this form of "payroll padding" would be to
a. Conduct exit interviews with allemployees leaving the company,
regardless of reason.
b. Require foremen to obtain a signed receipt from each employee
claiming a payroll check.
c. Require the human resources department to authorize all hires and
terminations, and to forward a current computerized list of active
employee numbers to payroll prior to processing. Program the
computer to reject inactive employee numbers.
d. Install time clocks for use by all hourly employees.
ANSWER: C
21. Compared to a manual system, a CBIS generally
1. Reduces segregation of duties. 2. Increases segregation of duties. 3.
Decreases manual inspection of processing results. 4. Increases manual
inspection of processing results.
a. 1 and 3. b. 1 and 4 c. 2 and 3 d. 2 and 4.
ANSWER: A
22. One of the major problems in a CBIS is that incompatible functions may
be performed by the same individual. One compensating control for this is
the use of
a. Echo checks. b. A self-checking digit system. c. Computer generated hash
totals. d. A computer log.
ANSWER: D
23. Which of the following processing controls would be most effective in
assisting a store manager to ascertain whether the payroll transaction data
were processed in their entirety?
a. Payroll file header record. b. Transaction identification codes. c.
Processing control totals. d. Programmed exception reporting.
ANSWER: C
24. An organizational control over CBIS operations is
a. Run-to-run balancing of control totals. b. Check digit verification of unique
identifiers. c. Separation of operating and programming functions. d.
Maintenance of output distribution logs.
ANSWER: C
25. Which of the following methods of testing application controls utilizes a
generalized audit software package prepared by the auditors?
a. Parallel simulation. b. Integrated testing facility approach. c. Test data
approach. d. Exception report tests.
ANSWER: A
26. An unauthorized employee took computer printouts from output bins
accessible to all employees. A control which would have prevented this
occurrence is
a. Verify that employee numbers are valid. b. Verify that only authorized
employees are paid. c. Detect errors in payroll calculations. d. Detect the
omission of transaction processing.
ANSWER: D
30. Matthews Corp. has changed from a system of recording time worked on
clock cards to a computerized payroll system in which employees
record time in and out with magnetic cards. The CBIS automatically
updates all payroll records. Because of this change
a. A generalized computer audit program must be used. b. Part of the audit
trail is altered. c. The potential for payroll related fraud is diminished. d.
Transactions must be processed in batches.
ANSWER: B
31. Generalized audit software is of primary interest to the auditor in terms
of its capability to
a. Access information stored on computer files. b. Select a sample of items
for testing. c. Evaluate sample test results. d. Test the accuracy of the
client's calculations.
ANSWER: A
32. An accounts payable program posted a payable to a vendor not included
in the on-line vendor master file. A control which would prevent this error is
a
a. Validity check. b. Range check. c. Reasonableness test. d. Parity check.
ANSWER: A
33. In a computerized sales processing system, which of the following
controls is most effective in preventing sales invoice pricing errors?
36. Which of the following audit techniques most likely would provide an
auditor with the most assurance about the effectiveness of the operation of
an internal control procedure?
a. Inquiry of client personnel. b. Recomputation of account balance amounts.
c. Observation of client personnel. d. Confirmation with outside parties.
ANSWER: C
37. Adequate technical training and proficiency as an auditor encompasses
an ability to understand a CBIS sufficiently to identify and evaluate
a. The processing and imparting of information. b. Essential accounting
control features. c. All accounting control features. d. The degree to which
programming conforms with application of generally accepted accounting
principles.
ANSWER: B
38. Which of the following is not a major reason why an accounting audit
trail should be maintained for a computer system?
a. Query answering. b. Deterrent to fraud.
c. Monitoring purposes. d. Analytical review.
ANSWER: D
39. Adequate control over access to data processing is required to
a. Prevent improper use or manipulation of data files and programs. b.
Ensure that only console operators have access to program documentation.
c. Minimize the need for backup data files. d. Ensure that hardware controls
are operating effectively and as designed by the computer manufacturer.
ANSWER: A
conditions, which one is not a valid reason for modifying the audit
approach?
a. More advanced computer systems produce less
documentation, thus reducing the visibility of the
audit trail.
b. In complex comuter-based systems, computer verification of data at
the point of input replaces the manual verification found in less
sophisticated data processing systems.
c. Integrated data processing has replaced the more traditional
separation of duties that existed in manual and batch processing
systems.
d. Real-time processing of transactions has enabled the auditor to
concentrate less on the completeness assertion.
ANSWER: D
46. If a control total were to be computed on each of the following data
items, which would best be identified as a hash total for a payroll CBIS
application?
a. Net pay. b. Department numbers. c. Hours worked. d. Total debits and
total credits.
ANSWER: B
47. In a distributed data base (DDB) environment, control tests for access
control administration can be designed which focus on
a. Reconciliation of batch control totals. b. Examination of logged activity. c.
Prohibition of random access. d. Analysis of system generated core dumps.
ANSWER: B
48. A control to verify that the dollar amounts for all debits and credits for
incoming transactions are posted to a receivables master file is the:
a. Generation number check. b. Master reference check. c. Hash total. d.
Control total.
ANSWER: D
49. The program flowcharting symbol representing a decision is a
a. Triangle. b. Circle. c. Rectangle. d. Diamond.
ANSWER: D
50. An update program for bank account balances calculates check digits for
account numbers. This is an example of
a. An input control. b. A file management control. c. Access control. d. An
output control.
ANSWER: A
51. CBIS controls are frequently classified as togeneral controls
and application controls. Which of the following is an example of an
application control?
a. Programmers may access the computer only for testing and
"debugging" programs.
b. All program changes must be fully documented and approved by the
information systems manager and the user department
authorizing the change.
c. A separate data control group is responsible for distributing output,
and also compares input and output on a test basis.