Which of the following is not an advantage of using a generalized computer audit program? such use

Correct Answer: C) Utility programs.

Notes

(c) The requirement is to determine the type of computer programs which auditors use to assist them in functions such as sorting and merging. Answer (c) is correct because a utility program is a standard routine for performing commonly required processing such as sorting, merging, editing, and mathematical routines. Answer (a) is incorrect because compiler programs translate programming languages such as COBOL or FORTRAN to machine language. Answer (b) is incorrect because supervisory programs or "operating systems" consist of a series of programs that perform functions such as scheduling and supervising the application programs, allocating storage, controlling peripheral devices, and handling errors and restarts. Answer (d) is incorrect because user or "application programs" perform specific data processing tasks such as general ledger, accounts payable, accounts receivable, and payroll. Application programs make use of utility routines.

Home

Subjects

Solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

How do you want to study today?

  • Flashcards

    Review terms and definitions

  • Learn

    Focus your studying with a path

  • Test

    Take a practice test

  • Match

    Get faster at matching terms

Terms in this set (31)

Which of the following client computer systems generally can be audited without examining or directly testing computer programs of the system?

A) A system that performs relatively uncomplicated processes and produces detailed output.
B) A system that affects a number of essential master files and produces a limited output.
C) A system that updates a few essential master files and produces no printed output other than final balances.
D) A system that performs relatively complicated processing and produces very little detailed output.

A) A system that performs relatively uncomplicated processes and produces detailed output.

An auditor may decide not to perform tests of controls related to the computer portion of the client's controls. Which of the following would not be a valid reason for choosing to omit tests of controls?

A) The controls appear adequate.
B) The controls duplicate operative controls existing elsewhere in the system.
C) There appear to be major conditions that would preclude reliance on the stated procedure.
D) The time and dollar costs of testing exceed the time and dollar savings in substantive testing if the tests of controls show the controls to be operative.

A) The controls appear adequate.

When companies use information technology (IT) extensively, evidence may be available only in electronic form. What is an auditor's best course of action in such situations?

A) Assess the control risk as high.
B) Use audit software to perform analytical procedures.
C) Use generalized audit software to extract evidence from client databases.
D) Perform limited tests of controls over electronic data.

C) Use generalized audit software to extract evidence from client databases.

Which of the following is an advantage of using a value-added network for EDI transactions?

A) Making corroborative inquiries.
B) Observing the separation of duties of personnel.
C) Reviewing transactions submitted for processing and comparing them to related output.
D) Reviewing the run manual.

C) Reviewing transactions submitted for processing and comparing them to related output.

Auditing by testing the input and output of a computer system instead of the computer program itself will

A) Not detect program errors which do not show up in the output sampled.
B) Detect all program errors, regardless of the nature of the output.
C) Provide the auditor with the same type of evidence.
D) Not provide the auditor with confidence in the results of the auditing procedures.

A) Not detect program errors which do not show up in the output sampled.

Smith Corporation has numerous customers. A customer file is kept on disk storage. Each customer file contains name, address, credit limit, and account balance. The auditor wishes to test this file to determine whether credit limits are being exceeded. The best procedure for the auditor to follow would be to

A) Develop test data that would cause some account balances to exceed the credit limit and determine if the system properly detects such situations.
B) Develop a program to compare credit limits with account balances and print out the details of any account with a balance exceeding its credit limit.
C) Request a printout of all account balances so they can be manually checked against the credit limits.
D) Request a printout of a sample of account balances so they can be individually checked against the credit limits.

B) Develop a program to compare credit limits with account balances and print out the details of any account with a balance exceeding its credit limit.

Which of the following is an advantage of generalized computer audit packages?

A) They are all written in one identical computer language.
B) They can be used for audits for clients that use differing computer equipment and file formats.
C) They have reduced the need for the auditor to study input controls for computer-related procedures.
D) Their use can be substituted for a relatively large part of the required tests of controls.

B) They can be used for audits for clients that use differing computer equipment and file formats.

An audit technique which involves actual analysis of the logic of a computer program's processing routines is referred to as

A) Code review.
B) Comparison review.
C) Extended records.
D) Test data.

A) Code review.

In parallel simulation, actual client data are reprocessed using an auditor software program. An advantage of using parallel simulation, instead of performing tests of controls without a computer, is that

A) The test includes all types of transaction errors and exceptions that may be encountered.
B) The client's computer personnel do not know when the data are being tested.
C) There is no risk of creating potentially material errors in the client's data.
D) The size of the sample can be greatly expanded at relatively little additional cost.

D) The size of the sample can be greatly expanded at relatively little additional cost.

Which of the following is necessary to audit balances in an on-line EDP system in an environment of destructive updating?

A) Periodic dumping of transaction files.
B) Year-end utilization audit hooks.
C) An integrated test facility.
D) A well-documented audit trail.

D) A well-documented audit trail.

In auditing through a computer, the test data method is used by auditors to test the

A) Accuracy of input data.
B) Validity of the output.
C) Procedures contained within the program.
D) Normalcy of distribution of test data.

C) Procedures contained within the program.

When an auditor tests the internal controls of a computerized accounting system, which of the following is true of the test data approach?

A) Test data are coded to a dummy subsidiary so they can be extracted from the system under actual operating conditions.
B) Test data programs need not be tailor-made by the auditor for each client's computer applications.
C) Test data programs usually consist of all possible valid and invalid conditions regarding compliance with internal controls.
D) Test data are processed with the client's computer and the results are compared with the auditor's predetermined results.

D) Test data are processed with the client's computer and the results are compared with the auditor's predetermined results.

A primary advantage of using generalized audit packages in the audit of an advanced computer system is that it enables the auditor to

A) Substantiate the accuracy of data through self-checking digits and hash totals.
B) Utilize the speed and accuracy of the computer.
C) Verify the performance of machine operations which leave visible evidence of occurrence.
D) Gather and store large quantities of supportive audit evidence in machine readable form.

B) Utilize the speed and accuracy of the computer.

When an auditor tests a computerized accounting system, which of the following is true of the test data approach?

A) Test data should consist of all possible valid and invalid conditions.
B) The program tested is different from the program used throughout the year by the client.
C) Several transactions of each type should be tested.
D) Test data are processed by the client's computer programs under the auditor's control.

D) Test data are processed by the client's computer programs under the auditor's control.

The individual with whom an auditor would be most likely to discuss specific access controls within a client's relational database management system is the

A) Database administrator.
B) Controller.
C) Systems analyst.
D) Systems librarian.

A) Database administrator.

Which of the following is not a problem associated with the use of test data for computer-audit purposes?

A) Auditing through the computer is more difficult than auditing around the computer.
B) It is difficult to design test data that incorporate all potential variations in transactions.
C) Test data may be commingled with live data causing operating problems for the client.
D) The program with which the test data are processed may differ from the one used in actual operations.

A) Auditing through the computer is more difficult than auditing around the computer.

Which of the following could be difficult to determine because electronic evidence may not be retrievable after a specific period?

A) The acceptance level of detection risk.
B) The timing of control and substantive tests.
C) Whether to adopt substantive or reliance test strategies.
D) The assessed level of inherent risk.

B) The timing of control and substantive tests.

A primary advantage of using generalized audit software packages to audit the financial statements of a client that uses a computer system is that the auditor may

A) Consider increasing the use of substantive tests of transactions in place of analytical procedures.
B) Substantiate the accuracy of data through self-checking digits and hash totals.
C) Reduce the level of required tests of controls to a relatively small amount.
D) Access information stored on computer files while having a limited understanding of the client's hardware and software features.

D) Access information stored on computer files while having a limited understanding of the client's hardware and software features.

An auditor anticipates assessing control risk at a low level in a computerized environment. Under these circumstances, on which of the following controls would the auditor initially focus?

A) Programmed controls.
B) Application controls.
C) Output controls.
D) General controls.

D) General controls.

Which of the following outcomes is a likely benefit of information technology used for internal control?

A) Processing of unusual or nonrecurring transactions.
B) Enhanced timeliness of information.
C) Potential loss of data.
D) Recording of unauthorized transactions.

B) Enhanced timeliness of information.

To obtain evidence that user identification and password controls are functioning as designed, an auditor would most likely

A) Review the online transaction log to ascertain whether employees using passwords have access to data files and computer programs.
B) Examine a sample of assigned passwords and access authority to determine whether password holders have access authority incompatible with their other responsibilities.
C) Extract a random sample of processed transactions and ensure that transactions are appropriately authorized.
D) Observe the file librarian's activities to discover whether other systems personnel are permitted to operate computer equipment without restriction.

B) Examine a sample of assigned passwords and access authority to determine whether password holders have access authority incompatible with their other responsibilities.

When conducting fieldwork for a physical inventory, an auditor cannot perform which of the following steps using a generalized audit software package?

A) Observing inventory.
B) Selecting sample items of inventory.
C) Analyzing data resulting from inventory.
D) Recalculating balances in inventory reports.

A) Observing inventory.

In auditing an entity's computerized payroll transactions, an auditor would be least likely to use test data to test controls concerning

A) Overpayment of employees for hours not worked.
B) Control and distribution of unclaimed checks.
C) Withholding of taxes and Social Security contributions.
D) Missing employee identification numbers.

B) Control and distribution of unclaimed checks.

Which of the following is not a major reason for maintaining an audit trail for a computer system?

A) Deterrent to irregularities.
B) Monitoring purposes.
C) Analytical procedures.
D) Query answering.

C) Analytical procedures.

When testing a computerized accounting system, which of the following is not true of the test data approach?

A) The test data need consist of only those valid and invalid conditions in which the auditor is interested.
B) Only one transaction of each type need be tested.
C) Test data are processed by the client's computer programs under the auditor's control.
D) The test data should consist of all possible valid and invalid conditions.

D) The test data should consist of all possible valid and invalid conditions.

Which of the following is not a technique to continuously test controls within a computer system?

A) Controlled reprocessing.
B) Extended records.
C) Systems control audit review files.
D) Transaction tagging.

A) Controlled reprocessing.

Which of the following is a computer-assisted audit technique that permits an auditor to use the auditor's version of a client's program to process data and compare the output with the client's output?

A) Test data module.
B) Frame relay protocol.
C) Remote node router.
D) Parallel simulation.

D) Parallel simulation.

Carmel Department Store has an ERP information system and is planning to issue credit cards to creditworthy customers. To strengthen internal control by making it difficult for one to create a valid customer account number, the company's independent auditor has suggested the inclusion of a check digit which should be placed

A) At the beginning of a valid account number only.
B) In the middle of a valid account number only.
C) At the end of a valid account number only.
D) Consistently in any position

D) Consistently in any position

An independent auditor studies and evaluates a client's computer system. The auditor's study includes tests of controls that might include which of the following?

A) Examination of systems flowcharts to determine whether they reflect the current status of the system.
B) Examination of the systems manuals to determine whether existing procedures are satisfactory.
C) Examination of the machine room log book to determine whether control information is properly recorded.
D) Examination of organization charts to determine whether electronic data processing department responsibilities are properly separated to afford effective control.

C) Examination of the machine room log book to determine whether control information is properly recorded.

In which of the following circumstances would an auditor expect to find that an entity implemented automated controls to reduce risks of misstatement?

A) When errors are difficult to predict.
B) When misstatements are difficult to define.
C) When large, unusual, or nonrecurring transactions require judgment.
D) When transactions are high-volume and recurring.

D) When transactions are high-volume and recurring.

A computer-assisted audit technique that is most likely to be effective in a continuous auditing environment is

A) Parallel simulation.
B) Controlled reprocessing.
C) Embedded audit modules.
D) Transaction tripping.

C) Embedded audit modules.

Sets with similar terms

Module 8 Notes

29 terms

KEK12345

Advanced Auditing Module 8

32 terms

pwclowdus

Module H Audit Quiz

34 terms

kerrialvarez

AUD Module 11-- IT (Computer) Auditing

25 terms

arossetti1095

Sets found in the same folder

CH 13 Overall Audit Strategy and Audit Program

8 terms

solosax

AUD - Materiality

12 terms

joe_choe4

A1 - REVIEW QUESTIONS

41 terms

Magster13

Audit Ch 10

32 terms

matt_rogerson7

Other sets by this creator

ECON - Exam

55 terms

vuhanguyen316

AUD - CPA Exam - Engagement Planning

105 terms

vuhanguyen316

AUD - CPA Exam - Evidence

297 terms

vuhanguyen316

AUD - CPA Exam - Professional Responsibilities

120 terms

vuhanguyen316

Verified questions

ENGINEERING

Consider the following data, taken during a car trip from Salt Lake City to Los Angeles: $$ \begin{matrix} \text{Time, hours} & \text{Distance, miles}\\ \text{0} & \text{0}\\ \text{1.0} & \text{75}\\ \text{2.2} & \text{145}\\ \text{2.9} & \text{225}\\ \text{4.0} & \text{300}\\ \text{5.2} & \text{380}\\ \text{6.0} & \text{430}\\ \text{6.9} & \text{510}\\ \text{8.0} & \text{580}\\ \text{8.7} & \text{635}\\ \text{9.7} & \text{700}\\ \text{10} & \text{720}\\ \end{matrix} $$ (a) Find the average velocity in mph during each segment of the trip. (b) Plot these velocities against the start time for each segment. (c) Use the find command to determine whether any of the average velocities exceeded the speed limit of 75 mph. (d) Is the overall average above the speed limit?

Verified answer

ENGINEERING

Is the relative humidity of saturated air necessarily 100 percent?

Verified answer

ENGINEERING

The current in a 100-mH inductor is i(t) = 2 sin 377t A. Find (a) the voltage across the inductor and (b) the expression for the energy stored in the element.

Verified answer

ENGINEERING

Consider 100 m3 of atmospheric air which is an air–water vapor mixture at 100 kPa, 15$^{\circ} \mathrm{C}$ and 40% relative humidity. Find the mass of water and the humidity ratio. What is the dew point of themixture?

Verified answer

Other Quizlet sets

ACC 340 - Exam 3 (CH 3, 12, 13, 16) Practice Quest…

119 terms

gterrell8

Accounting Test #2

43 terms

katie_strand

Effect on IT on Evidence Gathering

13 terms

tomdipaola

Related questions

QUESTION

Returned to the appliance from which it was removed or to another appliance owned by the same person without being recycled or reclaimed.

15 answers

QUESTION

What produces the heat during a shielded metal arc weld?

15 answers

QUESTION

Which password can be configured to prevent unauthorized access to the BIOS setup utility?

10 answers

QUESTION

In most aircraft hydraulic systems, two piece tube connectors consisting of a sleeve and a nut are used when tube flaring is required. The use of this type of connecter eliminates

4 answers

Which of the following is an advantage of generalized computer audit packages?

Which of the following is an advantage of generalized audit software packages? Generalized audit software allows the auditors to independently process their clients' records. The software is flexible and may be used on a variety of IT systems.

What are the advantages of generalized audit software?

Generalized Audit Software enables auditors to have direct access to computerized records and to deal effectively with large quantities of data.

Which of the following is an advantage of generalized audit software quizlet?

Which of the following is an advantage of generalized audit software packages? They are all written in one identical computer language. They can be used for audits of clients that use differing computing equipment and file formats.

Which of the following is not a function of a generalized audit software?

A generalized audit software does not have an independent log of access to the auditing software. The data can be browsed, sorted, summarized, stratified, analyzed, taken samples from, and made calculations, conversions and other operations with.