Professional Documents
Culture Documents
Auditing in A CIS Environment CH5
Auditing in A CIS Environment CH5
5. Which control is not a part of the source program library management system?
a. using passwords to limit access to application programs
b. assigning a test name to all programs undergoing maintenance
c. combining access to the development and maintenance test libraries
d. assigning version numbers to programs to record program modifications
6. Which control ensures that production files cannot be accessed without specific permission?
a. Database Management System
b. Recovery Operations Function
c. Source Program Library Management System
d. Computer Services Function
7. Program testing
a. involves individual modules only, not the full system
b. requires creation of meaningful test data
c. need not be repeated once the system is implemented
d. is primarily concerned with usability
8. Which statement is not true?
a. An audit objective for systems maintenance is to detect unauthorized access to application
databases.
b. An audit objective for systems maintenance is to ensure that applications are free from
errors.
c. An audit objective for systems maintenance is to verify that user requests for maintenance
reconcile to program version numbers.
d. An audit objective for systems maintenance is to ensure that the production libraries are
protected from unauthorized access.
9. When the auditor reconciles the program version numbers, which audit objective is being tested?
a. protect applications from unauthorized changes
b. ensure applications are free from error
c. protect production libraries from unauthorized access
d. ensure incompatible functions have been identified and segregated
12. The benefits of the object-oriented approach to systems design include all of the following except
a. this approach does not require input from accountants and auditors
b. development time is reduced
c. a standard module once tested does not have to be retested until changes are made
d. system maintenance activities are simplified
13. Which level of a data flow diagram is used to produce program code and database tables?
a. context level
b. elementary level
c. intermediate level
d. prototype level
18. A commercial software system that is completely finished, tested, and ready for implementation is
called a
a. backbone system
b. vendor-supported system
c. benchmark system
d. turnkey system
19. Which of the following is not an advantage of commercial software? Commercial software
a. can be installed faster than a custom system
b. can be easily modified to the user’s exact specifications
c. is significantly less expensive than a system developed in-house
d. is less likely to have errors than an equivalent system developed in-house
20. Which step is least likely to occur when choosing a commercial software package?
a. a detailed review of the source code
b. contact with user groups
c. preparation of a request for proposal
d. comparison of the results of a benchmark problem
21. The output of the detailed design phase of the Systems Development Life Cycle (SDLC) is a
a. fully documented system report
b. systems selection report
c. detailed system design report
d. systems analysis report
22. The detailed design report contains all of the following except
a. input screen formats
b. alternative conceptual designs
c. report layouts
d. process logic
23. System documentation is designed for all of the following groups except
a. systems designers and programmers
b. end users
c. accountants
d. all of the above require systems documentation
24. Which type of documentation shows the detailed relationship of input files, programs, and output files?
a. structure diagrams
b. overview diagram
c. system flowchart
d. program flowchart
25. Typical contents of a run manual include all of the following except
a. run schedule
b. logic flowchart
c. file requirements
d. explanation of error messages
26. Computer operators should have access to all of the following types of documentation except
a. a list of users who receive output
b. a program code listing
c. a list of all master files used in the system
d. a list of required hardware devices
28. When converting to a new system, which cutover method is the most conservative?
a. cold turkey cutover
b. phased cutover
c. parallel operation cutover
d. data coupling cutover
31. When implementing a new system, the costs associated with transferring data from one storage medium
to another is an example of
a. a recurring cost
b. a data conversion cost
c. a systems design cost
d. a programming cost
37. The formal product of the systems evaluation and selection phase of the Systems Development Life Cycle
is
a. the report of systems analysis
b. the systems selection report
c. the detailed system design
d. the systems plan
43. After the systems analysis phase of the System Development Life Cycle (SDLC) is complete, the
company will have a formal systems analysis report on
a. the conceptual design of the new system
b. an evaluation of the new system
c. users’ needs and requirements for the new system
d. a comparison of alternative implementation procedures for the new system
44. The accountant’s role in systems analysis includes all of the following except
a. specify audit trail requirements
b. prepare data gathering questionnaires
c. suggest inclusion of advanced audit features
d. ensure mandated procedures are part of the design
45. The role of the steering committee includes
a. designing the system outputs
b. resolving conflicts that arise from a new system
c. selecting the programming techniques to be used
d. approving the accounting procedures to be implemented
50. The role of the accountant/internal auditor in the conceptual design phase of the Systems Development
Life Cycle includes all of the following except
a. the accountant is responsible for designing the physical system
b. the accountant is responsible to ensure that audit trails are preserved
c. the internal auditor is responsible to confirm that embedded audit modules are included in
the conceptual design
d. the accountant is responsible to make sure that the accounting conventions that apply to
the module are considered by the system designers