Chap008tb - Chapter 08 - Consideration of Internal Control...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 08 - Consideration of Internal Control in an Information Technology Environment Chapter 08 Consideration of Internal Control in an Information Technology Environment True / False Questions 1. Magnetic tape drives have the advantage of direct access to stored data. True False 2. The operating system is an example of system software. True False 3. For good internal control, programmers should not be given access to complete program documentation for the programs they work on. True False 4. Data encryption is an example of data transmission control. True False 5. Internal file labels are designed to prevent errors by programmers. True False 6. For auxiliary storage when the computer is operating, personal computers use hard disk drives. True False 7. Distributive data processing eliminates the need for data security. True False 8-1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Chapter 08 - Consideration of Internal Control in an Information Technology Environment 8. Most advanced computer systems do not have audit trails. True False 9. Auditors usually begin their consideration of IT systems with tests of application controls. True False 10. Generalized audit software may be used for substantive tests or for tests of controls. True False Multiple Choice Questions 11. Which of the following procedures would an entity most likely include in its disaster recovery plan? A. Convert all data from external formats to an internal company format. B. Maintain a program to prevent illegal activity. C. Develop an auxiliary power supply to provide uninterrupted electricity. D. Store duplicate copies of files in a location away from the computer center. 12. A service auditor's report on a service center should include a(n) A. Detailed description of the service center's internal control. B. Statement that the user of the report may assess control risk at the minimum level. C. Indication that no assurance is provided. D. Opinion on the operating effectiveness of the service center's internal control. 8-2
Background image of page 2
Chapter 08 - Consideration of Internal Control in an Information Technology Environment 13. The report of a service auditor may provide assurance on whether: A. Option A B. Option B C. Option C D. Option D 14. Which of the following is a password security problem? A. Users are assigned passwords when accounts are created, but do not change them. B. Users have accounts on several systems with different passwords. C. Users copy their passwords on note paper, which is kept in their wallets. D. Users select passwords that are not listed in any online dictionary. 15. Which of the following is a software component of a computer system? A. The operating system. B. The storage unit. C. The display monitor D. The optical scanner. 16. Which of the following is
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 32

Chap008tb - Chapter 08 - Consideration of Internal Control...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online