Test 6

Test 6 - View Attempt...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Title: 6 Started: July 11, 2010 6:46 PM Submitted: July 11, 2010 7:41 PM Time spent: 00:55:41 Total score: 85/100 = 85% Total score adjusted by 0.0 Maximum possible score: 100 1. Answer "true" if you affirm the following: I have not and will not discuss the content of this test in any way with anyone else. If I discuss the content of this test in any way with anyone, I have cheated. Cheating is a violation of the honor code. Student Response Value Correct Answer True 100% True Score: 0/0 Comments: 2. Are you taking this test Friday at 9:30 PM or before? Is "yes", answer "true". Your five bonus points will be added manually so that the base for this test remains 100 points. Student Response Value Correct Answer False 0% True Score: 0/0 Comments: 3. What does an auditor examine when performing a detailed analysis of program logic? Student Response: Auditors refer to systems and program flowcharts, data flow diagrams, program documentation, and a listing of the program source codes. Software packages that serve as aids in this analysis are: (1) Automated flowcharting programs: interpret program source code and generate a corresponding program flowchart. (2) Automated decision table programs: generate a decision table representing the program logic. Sample Correct Answer An auditor refers to systems and program flowcharts, program documentation, and a listing or program source code. General Feedback: An auditor refers to systems and program flowcharts, program documentation, and a listing or program source code. Score: 7/7 Comments: 4. Name the different types of audits. Studen (1) Overall Security Audit (2) Program Development and Acquisition Audit (3) Program View Attempt http://webctap.gardner-webb.edu/webct/urw/lc8932375. .. 1 of 12 7/28/2010 9:51 AM
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Student Response: (1) Overall Security Audit (2) Program Development and Acquisition Audit (3) Program Modification Audit (4) Computer Processing Audit (5) Source Data Audit (6) Data Files Audit (7) Operational Audit Sample Correct Answer The financial audit. information systems audit. operational or management audit. General Feedback: The financial audit. information systems audit. operational or management audit. Score: 7/7 Comments: 5. List and explain the types of risk possible when conducting an audit. Student Response: (1) Inherent risk: the susceptibility to material risk in the absence of controls. For example, a system that employs online processing, networks, database software, telecommunications and other forms of advanced technology has more inherent risk than a batch processing system. (2) Control risk: risk that a material misstatement will get through the internal control structure and into the financial statements. A company with weak internal controls has a higher control risk than one with strong controls. Control risk can be determined by reviewing the control environment, testing internal
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 12

Test 6 - View Attempt...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online