Can you help me get started on this assignment?
See *ATTACHED* file for complete details!© BrainMass Inc. brainmass.com March 21, 2019, 11:21 pm ad1c9bdddf
H.22 In a computerized information system, automated equipment controls or hardware controls
are designed to
a. Arrange data in a logical sequential manner for processing purposes.
b. Correct errors in the computer programs.
c. Monitor and detect errors in source documents.
d. Detect and control errors arising from use of equipment.
H.23 A good example of application (user) computer software is
a. Payroll processing program.
b. Operating system program.
c. Data management system software.
d. Utility program.
H.24 Which of the following would lessen internal control in a computer system?
a. The computer librarian maintains custody of computer program instructions and detailed
b. Computer operators have access to operator instructions and detailed program lists.
c. The control group is solely responsible for the distribution of all computer output.
d. Computer programmers write and debug programs that perform routines designed by the
H.25 Which of the following is true with respect to fraud risk factors in an electronic environment?
a. Employees are more intelligent in an electronic environment.
b. Auditors cannot audit the information system during the year.
c. Larger dollar amounts are involved in an electronic environment.
d. Employees have greater access to information systems and computer resources in an
H.26 A procedural control used in the management of a computer center to minimize the possibility of data or program file destruction through operator error includes
a. Control figures.
b. Crossfooting tests.
c. Limit checks.
d. External labels.
H.27 An auditor would most likely use computer-assisted audit tools and techniques (CAATTs) to
a. Make copies of client data files for controlled reprocessing.
b. Construct a parallel simulation to test the client's computer controls.
c. Perform tests of a client's hardware controls.
d. Test the operating effectiveness of a client's password access control.
H.28 Which of the following client computer systems generally can be audited without examining
or directly testing the computer programs of the system?
a. A system that performs relatively uncomplicated processes and produces detailed output.
b. A system that affects a number of master files and produces a limited output.
c. A system that updates a few master files and produces no other printed output than final
d. A system that performs relatively complicated processing and produces very little detailed
H.29 The client's computerized exception reporting system helps an auditor to conduct a more efficient
audit because it
a. Condenses data significantly.
b. Highlights abnormal conditions.
c. Decreases the tests of computer control requirements.
d. Is an efficient computer input control.
H.30 An auditor will use the test data method to gain certain assurances with respect to
a. Input data.
b. Machine capacity.
c. Control procedures contained within the program.
d. General control procedures.
H.31 Assume an auditor estimates that 10,000 cash disbursement checks were issued during the accounting period. If a computer application control, which performs a limit check for each
check request, is to be subjected to the auditor's test data approach, the sample should
a. Approximately 1,000 test items.
b. A number of test items determined by the auditor to be sufficient under the circumstances.
c. All of the transactions.
d. One transaction.