Correct Answer: C) Utility programs. Show
Notes (c) The requirement is to determine the type of computer programs which auditors use to assist them in functions such as sorting and merging. Answer (c) is correct because a utility program is a standard routine for performing commonly required processing such as sorting, merging, editing, and mathematical routines. Answer (a) is incorrect because compiler programs translate programming languages such as COBOL or FORTRAN to machine language. Answer (b) is incorrect because supervisory programs or "operating systems" consist of a series of programs that perform functions such as scheduling and supervising the application programs, allocating storage, controlling peripheral devices, and handling errors and restarts. Answer (d) is incorrect because user or "application programs" perform specific data processing tasks such as general ledger, accounts payable, accounts receivable, and payroll. Application programs make use of utility routines.
Home Subjects Solutions Create Log in Sign up Upgrade to remove ads Only ₩37,125/year
Review terms and definitions
Focus your studying with a path
Take a practice test
Get faster at matching terms Terms in this set (31)Which of the following client computer systems generally can be audited without examining or directly testing computer programs of the system? A) A system that performs relatively uncomplicated processes and produces detailed output. A) A system that performs relatively uncomplicated processes and produces detailed output. An auditor may decide not to perform tests of controls related to the computer portion of the client's controls. Which of the following would not be a valid reason for choosing to omit tests of controls? A) The controls appear adequate. A) The controls appear adequate. When companies use information technology (IT) extensively, evidence may be available only in electronic form. What is an auditor's best course of action in such situations? A) Assess the control risk as high. C) Use generalized audit software to extract evidence from client databases. Which of the following is an advantage of using a value-added network for EDI transactions? A) Making corroborative inquiries. C) Reviewing transactions submitted for processing and comparing them to related output. Auditing by testing the input and output of a computer system instead of the computer program itself will A) Not detect program errors which do not show up in the output sampled. A) Not detect program errors which do not show up in the output sampled. Smith Corporation has numerous customers. A customer file is kept on disk storage. Each customer file contains name, address, credit limit, and account balance. The auditor wishes to test this file to determine whether credit limits are being exceeded. The best procedure for the auditor to follow would be to A) Develop test data that would cause some account balances to exceed the credit limit and determine if the system properly detects such situations. B) Develop a program to compare credit limits with account balances and print out the details of any account with a balance exceeding its credit limit. Which of the following is an advantage of generalized computer audit packages? A) They are all written in one
identical computer language. B) They can be used for audits for clients that use differing computer equipment and file formats. An audit technique which involves actual analysis of the logic of a computer program's processing routines is referred to as A) Code review. A) Code review. In parallel simulation, actual client data are reprocessed using an auditor software program. An advantage of using parallel simulation, instead of performing tests of controls without a computer, is that A) The test includes all types of transaction errors and exceptions that may be encountered. D) The size of the sample can be greatly expanded at relatively little additional cost. Which of the following is necessary to audit balances in an on-line EDP system in an environment of destructive updating? A) Periodic dumping of transaction files. D) A well-documented audit trail. In auditing through a computer, the test data method is used by auditors to test the A) Accuracy of input data. C) Procedures contained within the program. When an auditor tests the internal controls of a computerized accounting system, which of the following is true of the test data approach? A)
Test data are coded to a dummy subsidiary so they can be extracted from the system under actual operating conditions. D) Test data are processed with the client's computer and the results are compared with the auditor's predetermined results. A primary advantage of using generalized audit packages in the audit of an advanced computer system is that it enables the auditor to A) Substantiate the accuracy of data through self-checking digits and hash totals. B) Utilize the speed and accuracy of the computer. When an auditor tests a computerized accounting system, which of the following is true of the test data approach? A) Test data should consist of all possible valid and invalid conditions. D) Test data are processed by the client's computer programs under the auditor's control. The individual with whom an auditor would be most likely to discuss specific access controls within a client's relational database management system is the A) Database administrator. A) Database administrator. Which of the following is not a problem associated with the use of test data for computer-audit purposes? A) Auditing through the computer is more difficult than auditing around the computer. A) Auditing through the computer is more difficult than auditing around the computer. Which of the following could be difficult to determine because electronic evidence may not be retrievable after a specific period? A) The acceptance level of detection risk. B) The timing of control and substantive tests. A primary advantage of using generalized audit software packages to audit the financial statements of a client that uses a computer system is that the auditor may A) Consider increasing the use of substantive tests of transactions in place of analytical procedures. D) Access information stored on computer files while having a limited understanding of the client's hardware and software features. An auditor anticipates assessing control risk at a low level in a computerized environment. Under these circumstances, on which of the following controls would the auditor initially focus? A) Programmed controls. D) General controls. Which of the following outcomes is a likely benefit of information technology used for internal control? A) Processing of unusual or nonrecurring transactions. B) Enhanced timeliness of information. To obtain evidence that user identification and password controls are functioning as designed, an auditor would most likely A) Review the online transaction log to ascertain whether employees using passwords have access to data files and computer programs. B) Examine a sample of assigned passwords and access authority to determine whether password holders have access authority incompatible with their other responsibilities. When conducting fieldwork for a physical inventory, an auditor cannot perform which of the following steps using a generalized audit software package? A) Observing inventory. A) Observing inventory. In auditing an entity's computerized payroll transactions, an auditor would be least likely to use test data to test controls concerning A) Overpayment of employees for hours not worked. B) Control and distribution of unclaimed checks. Which of the following is not a major reason for maintaining an audit trail for a computer system? A) Deterrent to irregularities. C) Analytical procedures. When testing a computerized accounting system, which of the following is not true of the test data approach? A) The test data need consist of only those valid and invalid conditions in which the auditor is interested. D) The test data should consist of all possible valid and invalid conditions. Which of the following is not a technique to continuously test controls within a computer system? A) Controlled reprocessing. A) Controlled reprocessing. Which of the following is a computer-assisted audit technique that permits an auditor to use the auditor's version of a client's program to process data and compare the output with the client's output? A) Test data module. D) Parallel simulation. Carmel Department Store has an ERP information system and is planning to issue credit cards to creditworthy customers. To strengthen internal control by making it difficult for one to create a valid customer account number, the company's independent auditor has suggested the inclusion of a check digit which should be placed A) At the beginning of a valid account number
only. D) Consistently in any position An independent auditor studies and evaluates a client's computer system. The auditor's study includes tests of controls that might include which of the following? A) Examination of systems flowcharts to determine whether they reflect
the current status of the system. C) Examination of the machine room log book to determine whether control information is properly recorded. In which of the following circumstances would an auditor expect to find that an entity implemented automated controls to reduce risks of misstatement? A) When errors are difficult to predict. D) When transactions are high-volume and recurring. A computer-assisted audit technique that is most likely to be effective in a continuous auditing environment is A) Parallel simulation. C) Embedded audit modules.
Sets with similar termsModule 8 Notes29 terms KEK12345 Advanced Auditing Module 832 terms pwclowdus Module H Audit Quiz34 terms kerrialvarez AUD Module 11-- IT (Computer) Auditing25 terms arossetti1095 Sets found in the same folderCH 13 Overall Audit Strategy and Audit Program8 terms solosax AUD - Materiality12 terms joe_choe4 A1 - REVIEW QUESTIONS41 terms Magster13 Audit Ch 1032 terms matt_rogerson7 Other sets by this creatorECON - Exam55 terms vuhanguyen316 AUD - CPA Exam - Engagement Planning105 terms vuhanguyen316 AUD - CPA Exam - Evidence297 terms vuhanguyen316 AUD - CPA Exam - Professional Responsibilities120 terms vuhanguyen316 Verified questions
ENGINEERING Consider the following data, taken during a car trip from Salt Lake City to Los Angeles: $$ \begin{matrix} \text{Time, hours} & \text{Distance, miles}\\ \text{0} & \text{0}\\ \text{1.0} & \text{75}\\ \text{2.2} & \text{145}\\ \text{2.9} & \text{225}\\ \text{4.0} & \text{300}\\ \text{5.2} & \text{380}\\ \text{6.0} & \text{430}\\ \text{6.9} & \text{510}\\ \text{8.0} & \text{580}\\ \text{8.7} & \text{635}\\ \text{9.7} & \text{700}\\ \text{10} & \text{720}\\ \end{matrix} $$ (a) Find the average velocity in mph during each segment of the trip. (b) Plot these velocities against the start time for each segment. (c) Use the find command to determine whether any of the average velocities exceeded the speed limit of 75 mph. (d) Is the overall average above the speed limit? Verified answer ENGINEERING Is the relative humidity of saturated air necessarily 100 percent? Verified answer
ENGINEERING The current in a 100-mH inductor is i(t) = 2 sin 377t A. Find (a) the voltage across the inductor and (b) the expression for the energy stored in the element. Verified answer
ENGINEERING Consider 100 m3 of atmospheric air which is an air–water vapor mixture at 100 kPa, 15$^{\circ} \mathrm{C}$ and 40% relative humidity. Find the mass of water and the humidity ratio. What is the dew point of themixture? Verified answer Other Quizlet setsACC 340 - Exam 3 (CH 3, 12, 13, 16) Practice Quest…119 terms gterrell8 Accounting Test #243 terms katie_strand Effect on IT on Evidence Gathering13 terms tomdipaola Related questionsQUESTION Returned to the appliance from which it was removed or to another appliance owned by the same person without being recycled or reclaimed. 15 answers QUESTION What produces the heat during a shielded metal arc weld? 15 answers QUESTION Which password can be configured to prevent unauthorized access to the BIOS setup utility? 10 answers QUESTION In most aircraft hydraulic systems, two piece tube connectors consisting of a sleeve and a nut are used when tube flaring is required. The use of this type of connecter eliminates 4 answers Which of the following is an advantage of generalized computer audit packages?Which of the following is an advantage of generalized audit software packages? Generalized audit software allows the auditors to independently process their clients' records. The software is flexible and may be used on a variety of IT systems.
What are the advantages of generalized audit software?Generalized Audit Software enables auditors to have direct access to computerized records and to deal effectively with large quantities of data.
Which of the following is an advantage of generalized audit software quizlet?Which of the following is an advantage of generalized audit software packages? They are all written in one identical computer language. They can be used for audits of clients that use differing computing equipment and file formats.
Which of the following is not a function of a generalized audit software?A generalized audit software does not have an independent log of access to the auditing software. The data can be browsed, sorted, summarized, stratified, analyzed, taken samples from, and made calculations, conversions and other operations with.
|