AUDITING+ASSURANCE 12MONTH ACCESS CARD
17th Edition
ISBN: 9780135635131
Author: ARENS
Publisher: WILEY
expand_more
expand_more
format_list_bulleted
Question
Chapter 11, Problem 21.2MCQ
To determine
Identify the control process that does not fall under the category of IT general control.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Which of the following is NOT a data communications control objective?a. maintaining the critical application listb. correcting message loss due to equipment failurec. preventing illegal accessd. rendering useless any data that a perpetrator successfully captures
Which of the following is NOT part of the systems implementation process? a. converting databases b. documentation c. systems design d. testing and correction
What types of unique control problems are created by the use of PC accounting systems?
Chapter 11 Solutions
AUDITING+ASSURANCE 12MONTH ACCESS CARD
Ch. 11 - Prob. 1RQCh. 11 - Prob. 2RQCh. 11 - Prob. 3RQCh. 11 - Prob. 4RQCh. 11 - Prob. 5RQCh. 11 - Prob. 6RQCh. 11 - Prob. 7RQCh. 11 - Prob. 8RQCh. 11 - Prob. 9RQCh. 11 - Prob. 10RQ
Ch. 11 - Prob. 11RQCh. 11 - Prob. 12RQCh. 11 - Prob. 13RQCh. 11 - Prob. 14RQCh. 11 - Prob. 15RQCh. 11 - Prob. 16RQCh. 11 - Prob. 17RQCh. 11 - Prob. 18RQCh. 11 - Prob. 19RQCh. 11 - Prob. 20.1MCQCh. 11 - Actions, policies, and procedures that reflect the...Ch. 11 - Prob. 20.3MCQCh. 11 - Prob. 21.1MCQCh. 11 - Prob. 21.2MCQCh. 11 - Prob. 21.3MCQCh. 11 - Prob. 22.1MCQCh. 11 - Prob. 22.2MCQCh. 11 - Which of the following correctly describes an...Ch. 11 - Prob. 23DQPCh. 11 - Prob. 24DQPCh. 11 - The following are misstatements that have occurred...Ch. 11 - Prob. 26DQPCh. 11 - Prob. 27DQPCh. 11 - Prob. 28DQPCh. 11 - Prob. 29DQPCh. 11 - Prob. 30DQPCh. 11 - Prob. 31DQPCh. 11 - Prob. 32C
Knowledge Booster
Similar questions
- Which of the following is NOT an SDLC controllable activity? a. External audit participation b. User specification c. Systems authorization d. User test and acceptance procedures e. All are SDLC controlsarrow_forwardWhich of the following statements is NOT correct? a. EAMs capture transactions during processing without removing the application from service. b. EAMs support continuous monitoring of controls. c. EAMs have the potential to corrupt corporate databases d. EAMs decrease operational performance. e. All of the above are correct statements.arrow_forwardManagement and auditor are concerned about segregation of duties in computer based systems? Why? How to mitigate this concern?arrow_forward
- Discuss why control procedures over access to the data resource become more crucial under the database approach than in the flat-file environment. What role does the DBMS play in helping to control the database environment?arrow_forwardWhich of the following would strengthen organizational control over a large-scale data processing center?a. Requiring the user departments to specify the general control standards necessary for processing transactions.b. Requiring that requests and instructions for data processing services be submitted directly to the computer operator in the data center.c. Having the database administrator report to the manager of computer operations.d. Assigning maintenance responsibility to the original system designer who best knows its logic.e. None of the above.arrow_forwardWhich of the following would reduce the effectiveness of internal control in an accountinginformation system?a. The computer librarian maintains custody of computer program instructions and detailed lists.b. Computer operators have access to operator instructions and detailed program lists.c. The control group is solely responsible for the distribution of all computer output.d. Computer programmers write and debug programs that perform routines designed by thesystems analyst.arrow_forward
- Which of the following statements is correct? a. TCP/IP is the basic protocol that permits communication between Internet sites. b. TCP/IP controls Web browsers that access the Web. c. TCP/IP is the document format used to produce Web pages. d. TCP/IP is used to transfer text files, programs, spreadsheets, and databases across the Internet. e. TCP/IP is a low-level encryption scheme used to secure transmissions in higher-level (HTTP) format.arrow_forwardDiscuss the importance of the role of the database administrator. In the flat-file environment, why is such a role not necessary? What tasks does the DBA perform?arrow_forwardWhat control procedures can be used to achieve control over computer operations in an end-user computing environment? What control procedures can be used to achieve control over computerized processing in an end-user computing environment?arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning