CIS Lecture and Multiple Choice Handout
CIS Lecture and Multiple Choice Handout
LECTURE NOTES
COMPUTERIZED INFORMATION SYSTEMS (CIS) IN supercomputers and fit for high-volume transaction
MANAGEMENT ADVISORY SERVICES processing. (key: volume)
• Servers - High-powered microcomputers that
Information Technology in Business
serve applications and data to clients that are
Information Technology is application of computers to store,
study, retrieve, transmit and manipulate data and connected through a network. Servers have greater
information often in the context of a business or other capacity than their client computers and often act
enterprise. as central repository for organizational data.
• Microcomputers - Also called personal computers.
Computers have pervasive impact in today’s businesses Examples include desktop computers, laptop
because they have become the primary tool to process computers. Designed to be used by one person at a
much of the financial and accounting information of business
time.
entities.
• Information in Computers
- Digital – series of binary digits (0s and 1s). • Centralized - processing occurs at one location.
- Analog – produced by fluctuations of continuous • Decentralized - processing (and data) are stored
signal (speech, temperature, weight, speed) on computers at multiple locations.
• Distributed - Transactions for a single database
• Input Devices are processed at various sites.
- Keyboard
- Mouse, joystick, light pens 4. Data file structure
- Touch screen
- Magnetic tape reader a. Traditional file processing (legacy) systems
- Magnetic ink character reader (MICR) • Focus on data processing needs of individual
- Scanner departments.
- Automatic Teller Machine (ATM) • Each application/program is developed to meet
- Radio Frequency Identification (RFID) the needs of the requesting department or user
- Point-of-sale (POS) recorders group.
- Microphone/voice recognition • Advantage: cost effective for simple applications
• Disadvantage: Data are fragmented/redundant
• Output Devices among different departments
- Monitors
- Printers b. Database systems
- Speakers • Database system – computer hardware and
software that enables the database to be
c. Software – Programs that control hardware implemented.
• Database – a collection of interrelated files,
• Systems software ordinarily most of which are stored online.
- Operating system (OS) • Database management system – software that
- Utility programs provides a facility for communications between
- Communications software various application programs and database.
• Advantage: Data are kept up to date and
• Applications software redundancy is reduced.
- Programs designed for specific uses or applications • Disadvantage: Costly to set up and maintain.
(e.g. word processing, graphics, spreadsheets,
email, database systems, accounting) 5. Database structures
- Accounting software include low-end (all in one
package designed for small enterprises, high-end • Hierarchical - Data elements at one level own the
(usually in modules like general ledger modules) data elements at the next lower level.
and ERP (Enterprise Resource Planning), a complete • Networked - Each data element can have several
information system suite for large and medium size owners and can own several other elements
organizations. • Relational - A database with the logical structure
of a group of related spreadsheets. Each row
2. Methods of processing represents a record, which is an accumulation of all
the fields related to the same identifier or key; each
a. Batch Processing column represents a field common to all the records.
• Processing groups of like transactions (batches) • Object-oriented - Information (attributes and
• Example, all sales information during the day are methods) are included in structures called object
aggregated and updated to the system as a classes.
group/batch. • Object-relational - Includes both relational and
object-oriented features.
b. Online Real-Time • Distributed - A single database that is spread
• Transactions are processed as they occur. physically across computers in multiple locations
• Online transaction processing (OLTP) – databases that are connected by a data communications link.
supporting day-to-day operations (e.g. bank
automatic teller systems, online sales/reservation 6. Network
systems).
• Online analytical processing (OLAP) – software a. Scope
technology enabling the user to query the system • Personal Area Network (PAN) – network centered
and conduct analysis around an individual and the personal
communication devices he/she uses.
c. Online/memo update • Local Area Network (LAN) – Privately owned
• Also known as shadow update, combines on- networks within a single location.
line/real time processing and on-line/batch • Metropolitan Area Network (MAN) – larger version
processing. of LAN.
• Wide Area Network (WAN) – networks spanning
3. Location large geographical area
After the update, the new file master file is Transmission accuracy and completeness (6) Physical
the son. The file from which the father was security over telecommunications facilities
developed with the transaction files of the
AUDITING COMPUTERIZED INFORMATION SYSTEMS
appropriate day is the grandfather. The
(CIS)
grandfather and son files are stored in An information systems (IS) audit is associated with
different locations. If the son were auditors who use technical skills and knowledge to audit
destroyed, for example, it could be through the computer system, or provide audit services
reconstructed by rerunning the father file where processes or data, or both, are embedded in
and the related transaction files. technologies. These auditors usually are Certified
Information Systems Auditor (CISA). IS auditors work in
Online Checkpoint – Similar to grandfather-father- internal audit departments, in external audit firms, and even
in fraud audits.
databases son, but at certain points, “checkpoints,” the
and system makes a copy of the database and The auditor should consider how a CIS environment affects
master this “checkpoint” file is stored on a separate the audit. The auditors must be able to use information
files disk or tape. If a problem occurs the system technology and understand current trends in information
is restarted at the last checkpoint and technology (IT) to understand the business of their clients
updated with subsequent transactions. and to conduct an effective and efficient audit.
Rollback – as part as a part of recovery, to
The overall objective and scope of an audit do not change
undo changes made to a database to a point
in a CIS environment. However, the use of a computer
at which it was functioning properly. changes the processing, storage and communication of
Backup facilities financial information and may affect the accounting and
a. Hot site—A commercial disaster internal control systems employed by the entity.
recovery service that allows a business Accordingly, a CIS environment may affect:
to continue computer operations in the
• The procedures followed by the auditor in obtaining a
event of computer disaster. For
sufficient understanding of the accounting and internal
example, if a company’s data processing
control systems.
center becomes inoperable, that
• The consideration of inherent risk and control risk
enterprise can move all processing to a
through which the auditor arrives at the risk
hot site that has all the equipment
assessment.
needed to continue operation. This is
• The auditor’s design and performance of tests of control
also referred to as a recovery operations
and substantive procedures appropriate to meet the
center (ROC) approach.
audit objective.
b. Cold site—Similar to a hot site, but the
customer provides and installs the
Audit Approach in a CIS Environment
equipment needed to continue
Black Box Approach (Auditing around the computer) - the
operations. A cold site is less expensive,
auditor develops the procedures to review input documents
but takes longer to get in full operation
and output reports only, without knowing the computer
after a disaster. This is sometimes
technology, programming and other techniques used in
referred to as an “empty shell” in that
electronic data processing previously.
the “shell” is available and ready to
receive whatever hardware the
White Box Approach (Auditing through the computer) is an
temporary user needs.
audit approach is used when auditors become more
c. Reciprocal agreement—An agreement
knowledgeable in computer operations, auditing procedures
between two or more organizations
change. Transactions are tested through the computer.
(with compatible computer facilities) to
Programming codes can also be reviewed to understand
aid each other with their data processing
better the logic in processing transactions.
needs in the event of a disaster. This is
sometimes referred to as a mutual aid
Use of Computer-Assisted Audit Tools (CAATs)
pact.
CAATs are computer programs and data the auditor uses as
part of the audit procedures to process data of audit
Telecommunications
significance contained in an entity’s information systems.
The data may be transaction data, on which the auditor
• The electronic transmission of information by radio, wire,
wishes to perform tests of controls or substantive
fiber optic, coaxial cable, microwave, laser, or other
procedures, or they may be other types of data.
electromagnetic system.
• Transmitted information – voice, data, video, fax, other
CAATs may be used in performing various auditing
• Components involved: (1) computers for communications
procedures, including the following:
control & switching, (2) transmission facilities like copper
wires, fiber optic cables, microwave stations & • tests of details of transactions and balances, for
communications satellite, (3) modems example, the use of audit software for recalculating
• Software controls and monitors the hardware, formats interest or the extraction of invoices over a certain value
information, adds appropriate control information, performs from computer records;
switching operations, provides security, and supports the • analytical procedures, for example, identifying
management of communications. inconsistencies or significant fluctuations;
• Telecommunication enables: (1) Electronic data • tests of general controls;
interchange (2) Electronic funds transfer (3) Point of sale • sampling programs to extract data for audit testing;
systems (4) Commercial databases (5) Airline reservation
• tests of application controls, for example, testing the
systems functioning of a programmed control; and
• Controls: (1) System integrity at remote sites (2) Data
entry (3) Central computer security (4) Dial-in security (5) • reperforming calculations performed by the entity’s
accounting systems.
a. Inquiring of entity’s IT personnel on how data and Businesses utilizes data analytics to evaluate operational,
transaction are initiated, recorded, processed, and financial, and other data to identify any departures from
reported, and how IT controls are designed the norm (e.g., anomaly detection, potential risks) and
b. Inspecting systems documentation opportunities as well for enhancement or advancement
c. Observing operation of IT controls
d. Planning and performing of tests of IT controls It has five (5) stages:
a. Define question – involves the identification of
• Documenting the understanding of internal control goals and objectives that the business is trying to
a. For an information system with a large volume of achieve. Key Performance Indicators (KPIs) must
transactions that are electronically initiated, be identified (i.e., financial ratios, variances).
recorded, processed, or reported, may include b. Obtain relevant data (information discovery) – it
flowcharts, questionnaires, or decision tables allows valuable analysis, more precise correlations,
b. For an information system with limited or no use of and construction of meaningful analysis models
IT, or for which few transactions are processed and forecasts.
(e.g., long-term debt) a memorandum may be c. Clean or normalize data – it consists of getting rid
sufficient of useless information and identifying missing data
c. When an auditor is performing only substantive to strengthen data integrity.
tests to restrict detection risk to an acceptable d. Analyze data – this is to determine as to whether
level, the auditor should obtain evidence about the data are the exact data needed. It also
the accuracy and completeness of the information involves collecting new and different data, revising
original question and formulating new questions.
• Effects of IT on assessment of control risk
In determining whether to assess control risk at the The following are application types of different data
maximum level or at a lower level, the auditor should analytics methods:
consider (1) Nature of the assertion, (2) Volume of 1. Descriptive analysis – most basic and used
transactions, (3) Nature and complexity of systems, method, it concentrates on reporting actual
including use of IT and (4) Nature of available audit results.
evidence, including evidence in electronic form. 2. Diagnostic analysis – provides the insights into
the reason certain results occurred.
3. Predictive analysis – applying assumptions to
• In designing tests of automated controls
data and predicting future results.
a. The inherent consistency of IT processing may allow
4. Prescriptive analysis – concentrates on what
the auditor to reduce the extent of testing (e.g., use
business needs to do for the predicted futures
a smaller sample)
results to occur.
b. Computer-assisted audit techniques may be needed 5. Anomaly detection – identifies unusual patterns
for automated controls or deviations from the norm or expected
results.
6. Network analysis – analyzing network data and
statistics to find pattern.
• Effects of IT on restriction of detection risk
a. An auditor may assess control risk at the maximum 7. Text analysis – involves the utilization of text
mining and natural language algorithms to find
and perform substantive tests to restrict detection
patterns in unstructured text.
risk when he or she believes that the substantive
tests by themselves would be more efficient than
performing tests of controls; (for example client has e. Communicate results - this is to ensure the
accuracy of information used, conclusions, and
only a limited number of transactions related to
recommendations with the appropriate
fixed assets and long-term debt and the auditor can
management.
readily obtain corroborating evidence in the form of
documents and confirmations.)
Common Terms for Data Analytics:
b. When evidence is entirely or almost entirely Big Data – describes any that describes any voluminous
electronic, the auditor in some circumstances may amount of structured, semi- structured, or unstructured
need to perform tests of controls. This is because it data that has the potential to be mined for information to
may be impossible to design effective substantive reveal relationships and dependencies or to predict
tests that by themselves provide sufficient evidence outcomes and behaviors.
in circumstances such as when the client 4 Vs of Big Data – volume, variety, velocity and
veracity
- Uses IT to initiate order using predetermined Volume - describe the large amount of data captured
decisions rules and to pay related payables
over time.
based on system generating information, and
Variety - data exist in a wide variety of file types.
no other documentation is produced Velocity - data exist in a wide variety of file types.
- Provides electronic service to customers (e.g., Veracity - data exist in a wide variety of file types.
Internet service provider or telephone Value (the 5th V in Big Data) – it is only as valuable as
company) and uses IT to log service provided, the business outcomes it makes possible
initiate bills, process billing, and automatically Data mining - the search for unexpected relationships
record amounts in accounting records. among data. It combines information technology and
statistics with a goal of analyzing data from different
perspectives and summarizing it into useful information. It
Data Analytics is an iterative process by means of continuous review and
rethinking (i.e., enhancements of previous analysis) while
It encompasses the quantitative and qualitative procedures working to obtain the desired results.
and methodologies to retrieve data out of data sources and Simple regression - process of deriving a linear
then inspect the identified and required data based on data equation that describes the relationship between two
type to assist the decision-making process. variables (y = a + bx).
Multiple regression - it is used when there is more than Hadoop - is an open-source, Java-based software
one independent variable framework that stores large amounts of data and runs
Standard error - measures how well the linear equation applications on clusters of commodity hardware
represents the data In-memory analytics - analyzes data from system
Goodness-of-fit test - assists with determining whether memory instead of secondary storage. This approach
the sample is representative of the population (validates
assumptions).
Confidence level - the percentage of times that a Data Visualization
sample is expected to be representative of the population
(i.e., a confidence level of 95% should result in This refers to any effort to help readers or other users
representative samples 95% of the time). understand the significance of data by placing it in a visual
Confidence interval - for a given confidence level is the context, such as a graph or chart such as the following:
range around a sample value that is expected to contain
the true population value. a. Statistical Control Charts - graphic aids for
Sensitivity analysis - uses trial-and-error to determine monitoring the status of any process subject to
the effects of changes in variables or assumptions on acceptable or unacceptable variations during
results. It is useful in deciding whether expending repeated operations.
additional resources to obtain better forecasts is justified. b. Pareto Diagrams - a bar chart that assists
Simulation - is a sophisticated refinement of probability managers in quality control analysis.
theory and sensitivity analysis c. Histograms - similar to a Pareto diagram but the
Monte Carlo Simulation - method often is used in major distinction is that histograms display a
simulation to generate the individual values for a random continuum for the independent variable.
variable. The performance of a quantitative model under d. Fishbone Diagrams (also called Cause-and-Effect
uncertainty may be investigated by randomly selecting Diagram) - is a total quality management process
values for each of the variables in the model (based on the improvement method that is useful in studying
probability distribution of each variable) and then causation (why the actual and desired situations
calculating the value of the solution. differ).
Delphi Approach - solicits opinions from experts, e. Boxplots - provides a visual to illustrate how tight
summarizes the opinions, and feeds the summaries back or spread-out data is and whether any outliers
to the experts (without revealing participants to each exist by displaying the data distribution in quartiles
other). f. Tables - illustrates data in rows and columns.
Time Series Analysis (also called trend analysis) - the g. Dot Plots (similar to a histogram) - a graph that
process of projecting future trends based on experience. It illustrates the distribution for each factor using
is a regression model in which the independent variable is dots.
time. h. Line Charts - illustrates information as a series of
Predictive Analytics - is technology that uses data data points (commonly known as markers)
(historical, current, and predicted), statistical algorithms, connected by a straight line. It is effective for
and machine learning techniques to draw insights on such identifying patterns.
trends as consumer or industry behavior patterns. i. Scatter Plots (similar to a line chart) - utilizes the
Exploratory Data Analysis (EDA) - is an approach to horizontal (variable x) and vertical (variable y)
data analysis that differs from traditional modeling and axes to illustrate the correlation among two
analytic techniques by encouraging the data itself to reveal variables.
its underlying structure rather than prematurely applying a j. Bubble Charts – similar to a scatter plot; however,
hypothesis or statistical method. It is often used as a first a bubble chart incorporates a third variable
step or pre-step in the data analysis process. consisting of a grouping of data points represented
What-if Analysis - process of determining the effects on by the size of the bubble.
outcomes in a model through changes in scenarios. k. Pie Charts - a graph in the shape of a circle with
Goal-seeking - occurs when the decision maker has a each “pie slice” representing relative sections of a
specific outcome in mind and needs to determine how it whole population size.
can be achieved.
MULTIPLE CHOICE
1. Which statement is incorrect when auditing in a CIS a. A CIS environment exists when a computer of any
environment? type or size is involved in the processing by the
entity of financial information of significance to the
Page 8 of 15 www.prtc.com.ph CIS
EXCEL PROFESSIONAL SERVICES, INC.
audit, whether that computer is operated by the d. It takes a longer time of implementation.
entity or by a third party.
b. The auditor should consider how a CIS environment 8. It is a computer program (a block of executable code)
affects the audit. that attaches itself to a legitimate program or data file
c. The use of a computer changes the processing, and uses its as a transport mechanism to reproduce
storage and communication of financial information itself without the knowledge of the user.
and may affect the accounting and internal control a. Virus
systems employed by the entity. b. Utility program
d. A CIS environment changes the overall objective c. System management program
and scope of an audit. d. Encryption
2. Which of the following is least likely a risk characteristic 9. A warehouse employee of a retail firm concealed the
associated with CIS environment? theft of merchandise inventory items by entering
a. Errors embedded in an application’s program logic adjustments to the computer-based inventory records
maybe difficult to manually detect on a timely basis. indicating that the items had been damaged or lost.
b. Many control procedures that would ordinarily be Which control would be most suitable for preventing this
performed by separate individuals in manual system fraud?
maybe concentrated in CIS. a. Check digits in inventory item numbers
c. The potential unauthorized access to data or to alter b. Validity checks on inventory item numbers
them without visible evidence maybe greater. c. Passwords allowing changes to inventory records
d. Initiation of changes in the master file is exclusively that are assigned only to authorized employees
handled by respective users. d. Removal of computer terminals from the
warehouse
3. Corrections to transaction data in which errors have
been detected should be made by the: 10. Which of the following least likely protects critical and
a. computer operator. sensitive information from unauthorized access in a
b. data control clerk. personal computer environment?
c. user departments. a. Using secret file names and hiding the files.
d. Programmer. b. Keeping of back up copies offsite.
e. Information systems director. c. Employing passwords.
d. Segregating data into files organized under separate
4. In order to maintain good internal control: file directories.
a. computer operators need to be good programmers.
b. programmers should have control over day-to-day 11. It refers to plans made by the entity to obtain access to
production runs. comparable hardware, software and data in the event of
c. computer operators should be allowed to make their failure, loss or destruction.
changes in programs as needed in order to keep the a. Back-up c. Anti-virus
computer running. b. Encryption d. Wide Area Network (WAN)
d. programmers and computer operators should be in
separate organizational units of the information 12. Operating documentation is of primary interest to:
systems function. a. computer operators.
e. the data librarian should be able to operate the b. computer programmers.
computer. c. systems analysts.
d. users.
5. Which of the following responsibilities should not be e. operations management.
assigned to members of the information systems
function? 13. Computer systems that enable users to access data and
a. Designing new information systems programs directly through workstations are referred to
b. Preparing documentation for new information as
systems a. Online computer systems
c. Maintaining a data and program library b. Database management systems (DBMS)
d. Initiating changes to the files maintained in the c. Personal computer systems
database d. Database systems
e. Processing transaction data
14. Which of the following employees in a firm's information
6. Which is the most objectionable assignment of systems function should be responsible for designing
responsibilities within the information systems function? new or improved transaction processing procedures?
a. Programmers maintain the processing and output a. Flowchart editor d. Control-group supervisor
controls for applications. b. Programmer e. Database administrator
b. Systems analysts maintain systems documentation. c. Systems analyst
c. Data processing supervisors schedule the
processing times for applications. 15. In an online/real time processing system
d. Data control clerks establish controls over batches a. Individual transactions are entered at workstations,
of transactions received from user departments. validated and used to update related computer files
e. Data librarians maintain custody over data files. immediately.
b. Individual transactions are entered at a workstation,
7. Which of the following is an inherent characteristic of subjected to certain validation checks and added to
software package? a transaction file that contains other transactions
a. They are typically used without modifications of the entered during the period.
programs. c. Individual transactions immediately update a memo
b. The programs are tailored-made according to the file containing information which has been extracted
specific needs of the user. from the most recent version of the master file.
c. They are developed by software manufacturer d. The master files are updated by other systems.
according to a particular user’s specifications.
16. It is a communication system that enables computer b. Any and all changes in application programs have
users to share computer equipment, application the authorization and approval of management.
software, data and voice and video transmissions. c. Provisions exist to protect data files from
a. Network c. Host unauthorized access, modification, or destruction.
b. File server d. Client d. Both computer operators and programmers have
unlimited access to the programs and data files.
17. The following matters are of particular importance to the
auditor in an online computer system, except 24. The reporting of accounting information plays a central
a. Authorization, completeness and accuracy of online role in the regulation of business operations. Preventive
transactions. controls are an integral part of virtually all accounting
b. Integrity of records and processing, due to online processing systems, and much of the information
access to the system by many users and generated by the accounting system is used for
programmers. preventive control purposes. Which one of the following
c. Changes in the performance of audit procedures is not an essential element of a sound preventive control
including the use of CAAT's. system?
d. Cost-benefit ratio of installing online computer a. Separation of responsibilities for the recording,
system. custodial, and authorization functions.
b. Sound personnel policies.
18. Which of the following is least likely a characteristic of a c. Documentation of policies and procedures.
database system? d. Implementation of state-of-the-art software and
a. Individual applications share the data in the hardware.
database for different purposes.
b. Separate data files are maintained for each 25. Which of the following most likely represents a
application and similar data used by several significant deficiency in the internal control structure?
applications may be repeated on several different a. The systems analyst review applications of data
files. processing and maintains systems documentation.
c. A software facility is required to keep track of the b. The systems programmer designs systems for
location of the data in the database. computerized applications and maintains output
d. Coordination is usually performed by a group of controls.
individuals whose responsibility is typically referred c. The control clerk establishes control over data
to as "database administration." received by the EDP department and reconciles
control totals after processing
19. The applications of auditing procedures using the d. The accounts payable clerk prepares data for
computer as an audit tool refer to computer processing and enters the data into the
a. Integrated test facility computer.
b. Data-based management system
c. Auditing through the computer 26. An auditor most likely would introduce test data into a
d. Computer-assisted audit techniques computerized payroll system to test internal controls
related to the
20. Consists of generalized computer programs designed to a. Existence of unclaimed payroll checks held by
perform common audit tasks or standardized data supervisors.
processing functions. b. Early cashing of payroll checks by employees.
a. Package or generalized audit software c. Discovery of invalid employee ID numbers.
b. Customized or purpose-written programs d. Proper approval of overtime by supervisors.
c. Utility programs
d. System management programs 27. Which of the following controls most likely would assure
21. An internal auditor noted the following points when that an entity can reconstruct its financial records?
conducting a preliminary survey in connection with the a. Hardware controls are built into the computer by the
audit of an EDP department. Which of the following computer manufacturer.
would be considered a safeguard in the control system b. Backup diskettes or tapes of files are stored away
on which the auditor might rely? from originals.
a. Programmers and computer operators correct daily c. Personnel who are independent of data input
processing problems as they arise. perform parallel simulations.
b. The control group works with user organizations to d. System flowcharts provide accurate descriptions of
correct rejected input. input and output operations.
c. New systems are documented as soon as possible
after they begin processing live data. 28. When an auditor tests a computerized accounting
d. The average tenure of employees working in the system, which of the following is true of the test data
EDP department is ten months. approach?
a. Test data must consist of all possible valid and
22. Some of the more important controls that relate to invalid conditions.
automated accounting information systems are validity b. The program tested is different from the program
checks, limit checks, field checks, and sign tests. These used throughout the year by the client.
are classified as c. Several transactions of each type must be tested.
a. Control total validation routines d. Test data are processed by the client’s computer
b. Hash totaling programs under the auditor’s control.
c. Output controls
d. Input validation routines 29. Which of the following methods of testing application
controls utilizes a generalized audit software package
23. Which one of the following represents a lack of internal prepared by the auditors?
control in a computer-based information system? a. Parallel simulation
a. The design and implementation is performed in b. Integrated testing facility approach
accordance with management’s specific c. Test data approach
authorization. d. Exception report tests
31. Which of the following is an example of a check digit? 39. Which of the following represents a sound organizational
a. An agreement of the total number of employees to control with respect to information system activities?
the total number of checks printed by the computer. a. Allowing the user departments to specify data
b. An algebraically determined number produced by processing standards
the other digits of the employee number. b. Allowing requests for system changes to be initiated
c. A logic test that ensures all employee numbers are by the computer operator
nine digits. c. Allowing the user departments to submit data for
d. A limit check that an employee’s hours do not processing directly to the computer operators
exceed 50 hours per work week. d. Allowing the user departments to prepare input data
32. In a computerized system, procedure or problem- 40. Which of the following policies or practices is most likely
oriented language is converted to machine language to represent a weakness in internal control pertaining to
through a(an) a computer-based system?
a. Interpreter c. Compiler a. Employees in the data processing department are
b. Verifier d. Converter prohibited from initiating requests for changes to
master files.
33. Test data, integrated test data and parallel simulation b. Computer programmers are not permitted to
each require an auditor to prepare data and computer operate the computer for regular processing runs,
programs. CPAs who lack either the technical expertise which involve programs that they have written.
or time to prepare programs should request from the c. Computer operators who run the programs
manufacturers or EDP consultants for pertaining to inventory are prohibited from
a. The program Code reconciling batch totals after computer runs.
b. Flowchart checks d. All corrections of errors in the master file are
c. Generalized audit software reviewed and approved by a supervisory level
d. Application controls employee who is a member of the data processing
department.
34. Which of the following should be a responsibility of the
information systems function? 41. In performing a risk-based audit, which risk
a. Initiating transactions assessment is completed initially by the IS auditor?
b. Initiating changes to programs a. Detection risk assessment
c. Maintaining custody over cash assets b. Control risk assessment
d. Processing transactions c. Inherent risk assessment
e. Correcting errors in transaction data d. Fraud risk assessment
35. Which one of the following represents a weakness in 42. The FIRST step in planning an audit is to:
internal control in computer-based AIS?
a. define audit deliverables.
a. Any and all changes in application programs have
b. finalize the audit scope and audit objectives
the authorization and approval of management.
c. gain an understanding of the business’s objectives.
b. Provisions exist to ensure the accuracy and integrity
a. develop the audit approach or audit strategy.
of computer processing of all files and reports.
c. Provisions exist to protect files from unauthorized
43. A company performs a daily backup of critical data and
access, modification, or destruction.
software files and stores the backup tapes at an offsite
d. Both computer operators and programmers have
location. The backup tapes are used to restore the files
unlimited access to the programs and data files.
in case of a disruption. This is a:
a. preventive control. c. corrective control.
36. To obtain evidence that user identification and password
b. management control. d. detective control.
control procedures are functioning as designed, an
auditor would most likely
44. What is considered the MOST critical element for the
a. Attempt to sign on to the system using invalid user
successful implementation of an information security
identifications and passwords.
(IS) program?
b. Write a computer program that simulates the logic
a. An effective enterprise risk management
of the client’s access control software.
(ERM)framework
c. Extract a random sample of processed transactions
b. Senior management commitment
and ensure that the transactions were appropriately
c. An adequate budgeting process
authorized.
d. Meticulous program planning
d. Examine statements signed by employees stating
that they have not divulged their user identifications
45. Which of the following tasks may be performed by the
and passwords to any other person.
same person in a well-controlled information processing
computer center?
37. General controls include controls:
a. Security administration and change management
a. designed to ascertain that all transaction data are
b. Computer operations and system development
accurate.
63. A control procedure that could be used in an online 72. In an automated payroll system, all employees in the
system to provide an immediate check on whether an finishing department were paid the rate of P75 per hour
account number has been entered on a terminal when the authorized rate was P70 per hour. Which of
accurately is a the following controls would have been most effective in
a. Compatibility test c. Record count preventing such an error?
b. Hash total d. Self-checking digit b. Access controls which would restrict the personnel
department’s access to the payroll master file data.
64. A control designed to catch errors at the point of data c. A review of all authorized pay rate changes by the
entry is personnel department.
a. Batch total c. Self-checking digit d. The use of batch control totals by department.
b. Record count d. Checkpoints e. A limit test that compares the pay rates per
department with the maximum rate for all
65. Program documentation is a control designed primarily employees.
to ensure that
a. Programmers have access to the tape library or 73. For the accounting system of ACME Company, the
information on disk files. amounts of cash disbursements entered into an EDP
b. Programs do not make mathematical errors. terminal are transmitted to the computer that
c. Programs are kept up to date and perform as immediately transmits the amounts back to the terminal
intended. for display on the terminal screen. This display enables
d. Data have been entered and processed. the operator to
a. Establish the validity of the account number
66. In an automated payroll processing environment, a b. Verify the amount was entered accurately
department manager substituted the time card for a c. Verify the authorization of the disbursements
terminated employee with a time card for a fictitious d. Prevent the overpayment of the account
employee. The fictitious employee had the same pay
rate and hours worked as the terminated employee. 74. An auditor anticipates assessing control risk at a low
The best control technique to detect this action using level in a computerized environment. Under these
employee identification numbers would be a circumstances, on which of the following procedures
a. Batch total c. Record count would the auditor initially focus?
b. Hash total d. Subsequent check a. Programmed control procedures
b. Application control procedures
67. An employee in the receiving department keyed in a c. Output control procedures
shipment from a remote terminal and inadvertently d. General control procedures
omitted the purchase order number. The best systems
control to detect this error would be 75. To obtain evidence that online access controls are
a. Batch total c. Sequence check properly functioning, an auditor most likely would
b. Completeness test d. Reasonableness test a. Create checkpoints at periodic intervals after live
data processing to test for unauthorized use of the
68. The most critical aspect regarding separation of duties system.
within information systems is between b. Examine the transaction log to discover whether any
a. Project leaders and programmers transactions were lost or entered twice due to a
b. Programmers and computer operators system malfunction
c. Programmers and systems analysts c. Enter invalid identification numbers or passwords to
d. Data control and file librarians ascertain whether the system rejects them.
d. Vouch a random sample of processed transactions
69. Which of the following characteristics distinguishes to assure proper authorization
computer processing from manual processing?
a. Computer processing virtually eliminates the 76. An auditor would least likely use computer software to
occurrence of computational error normally a. Access client data files
associated with manual processing. b. Prepare spreadsheets
b. Errors or irregularities in computer processing will c. Assess EDP controls
be detected soon after their occurrences. d. Construct parallel simulations
c. The potential for systematic error is ordinarily
greater in manual processing than in computerized 77. A primary advantage of using generalized audit software
processing. packages to audit the financial statements of a client
d. Most computer systems are designed so that that uses an EDP system is that the auditor may
transaction trails useful for audit do not exist. a. Consider increasing the use of substantive tests of
transactions in place of analytical procedures.
70. Which of the following activities would most likely be b. Substantiate the accuracy of data through self-
performed in the EDP Department? checking digits and hash totals.
a. Initiation of changes to master records. c. Reduce the level of required tests of controls to a
b. Conversion of information to machine-readable relatively small amount.
form. d. Access information stored on computer files while
c. Correction of transactional errors. having a limited understanding of the client’s
d. Initiation of changes to existing applications. hardware and software features.
71. For control purposes, which of the following should be 78. The use of generalized audit software package
organizationally segregated from the computer a. Relieves an auditor of the typical tasks of
operations function? investigating exceptions, verifying sources of
a. Data conversion information, and evaluating reports.
b. Surveillance of CRT messages