Chapter 17—IT Controls Part III: Systems Development, Program Changes, and Application Controls
TRUE/FALSE
1. Programs in their compiled state are very susceptible to the threat of unauthorized modification.
ANS: F
2. Maintenance access to systems increases the risk that logic will be corrupted either by the accident or intent to defraud.
ANS: T
3. Source program library controls should prevent and detect unauthorized access to application programs.
ANS: T
4. A check digit is a method of detecting data coding errors.
ANS: T
5. Input controls are intended to detect errors in transaction data after processing.
ANS: F
6. A header label is an internal, machine-readable label.
ANS: T
7. The user
…show more content…
a.
Database Management System
b.
Recovery Operations Function
c.
Source Program Library Management System
d.
Computer Services Function
ANS: C
7. Program testing
a.
involves individual modules only, not the full system
b.
requires creation of meaningful test data
c.
need not be repeated once the system is implemented
d.
is primarily concerned with usability
ANS: B
8. The correct purchase order number, 123456, was incorrectly recorded as shown in the solutions. All of the following are transcription errors except
a.
1234567
b.
12345
c.
124356
d.
123454
ANS: C
9. Which of the following is correct?
a.
check digits should be used for all data codes
b.
check digits are always placed at the end of a data code
c.
check digits do not affect processing efficiency
d.
check digits are designed to detect transcription and transposition errors
ANS: D
10. Which statement is not correct? The goal of batch controls is to ensure that during processing
a.
transactions are not omitted
b.
transactions are not added
c.
transactions are free from clerical errors
d.
an audit trail is created
ANS: C
11. An example of a hash total is
a.
total payroll checks–$12,315
b.
total number of employees–10
c.
sum of the social security numbers–12,555,437,251
d.
none of the above
ANS: C
12. Which statement is not true? A batch control record
a.
As we all know people are where we see the biggest problems in security breaches and problems on any computer or network system. People need to understand what they are allowed and not allowed to do, this is where policies, procedures, and training come in to play.
If Bill is that are experts in these procedures, after which it it 'll be an enjoyable plan beginning research from vendors.
28. The overriding goal of a control system is to enable the __________ and __________ of the business.
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (US Patriot Act), 2001, renewed 2006
Upon researching, I was able to confirm that all the units you have sent on this shipment have been received by our fulfillment center correctly. I have checked the shipment details and I was able to confirm that you have shipped 30 units of FNSKU: X0014UG6O5 and our fulfillment center received 29 units, 1 unit has been misplaced during the shipment and this unit has been reimbursed, Reimbursement ID: 735513721. If you want to check your reimbursement
Consequently employees had to deal with high risk of failure against the complex functions and user related errors ;
This type of structure has two conditions – completely on or completely off. It is the most basic type of control strategy. It operates or switches on when the process variable (PV) drops below the desired set point and switches off when the set point is attained again. This type of control can have detrimental effects on electro-mechanical equipment such as output valves and relays as the constant switching of these will eventually wear the parts out. To prevent this constant switching, hysteresis is added to the control.
After tracking each of your orders I noticed FedEx is indicating that one of the orders has an invalid
b. The key-entry operator keyed in the purchase order number as a nine-digit number instead of an eight-digit number.
On 10/12/16, the member contacted mail order customer service to check the status of his order he placed on 9/28/16. The mail order representative advised that an order was shipped on 9/29/16 with an estimated delivery date of 10/3/16 according to tracking number 92748999936646573003374195. The mail order representative contacted UPS to inquire as to why the member has not received his package. Mail
In addition, it can corrupt some applications installed on the system that prevent users from accessing it can cause data loss.
As for Order ID 112-6937587-7287428 we are unable to issue a reimbursement for I have found that this order was not refunded.
Users: This can include social engineering threats, misconfiguration of equipment, and inside threats where employees steal or leak information intentionally.
As a ramification, it is difficult for human operators to anticipate faults within the system and prevent and manage the risks incurred by an operational accident accordingly, making them “incomprehensible”. Therefore, organisational accidents in complex systems are inevitable as despite defensive measures implemented to mitigate their risk, such as the training of operators and regular maintenance, the fragile design of the systems is the core reason why accidents occur.
The purpose of this case study is to describe and analyse the features of the management control system (MCS) of University of Southern California (USC). Before commencing the analysis a brief background of USC is provided.