ANSWER: C13.The increased presence of the microcomputer in the workplace has resulted in an increasing number of persons having accessto the computer. A control that is often used to prevent unauthorized access to sensitive programs is: B121
Chapter 8 Internal Control and CBIS14.Checklists, systems development methodology, and staff hiringare examples of what type of controls? B15.When an on-line, real-time (OLRT) computer-based processing system is in use, internal control can be strengthened by a. Providing for the separation of duties between keypunching and error listing operations. b. Attaching plastic file protection rings to reels of magnetic tape before new data can be entered on the file. c. Making a validity check ofan identification number before a user can obtain access to the computer files. d. Preparing batch totals to provide assurance that file updates are made for the entire input. C16.When auditing "around" the computer, the independent auditor focuses solely upon the source documents and D17.One of the features that distinguishes computer processing from manual processing is A18.Given the increasing use of microcomputers as a means for accessing data bases, along withon-line real-time processing, companies face a serious challenge relating to data security. Which of the following is notan appropriate means for meeting this challenge?