When erroneous data are detected by computer program controls such data may be

When erroneous data are detected by computer program

This preview shows page 16 - 18 out of 19 pages.

103.When erroneous data are detected by computer program controls, such data may be excluded from processing and printed on an error report. This error report should be reviewed and followed up by the a. Computer operator. c. EDP control group. b. Systems analyst. d. Computer programmer. AICPA 11/78, 5/84 104.The computer is sometimes blamed for making errors. In reality, computers make very few mechanical errors. The most likely source of errors in a fully operational computer-based system is due to RPCPA 5/89 105.The increased use of database processing systems makes managing data and information a major information service function. Because the databases of an organization are used for many different applications, they are coordinated and controlled by a database administrator. The functions of a database administrator are CMA 1287 5-3 106.When a new application is being created for widespread use in a large organization, the principal liaison between the Information Systems (IS) department and the rest of an organization is normally a(n) 107.Which of the following procedures would enhance the control structure of a computer operations department? I. Periodic rotation of operators. II. Mandatory vacations. III. Controlled access to the facility. IV. Segregation of personnel who are responsible for controlling input and output. a. I, II. b. III, IV. c. I, II, III. d. I, II, III, IV. CIA 0594 III-12 108.Which of the following best describes the primary reason that organizations develop contingency plans for their EDP operations? 109.A critical aspect of a disaster recovery plan is to be able to regain operational capability as soon as possible. In order to accomplish this, an organization can have an arrangement with its computer hardware vendor to have a fully
Background image
Page 17 of 19 Atfq3 pffa operational facility available that is configured to the user's specific needs. This is best known as a(n) CMA 0696 4-14
Background image
Image of page 18

You've reached the end of your free preview.

Want to read all 19 pages?

  • Fall '12
  • jenne

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes