Professional Documents
Culture Documents
Acise Chapters 7 12
Acise Chapters 7 12
Acise Chapters 7 12
Auto-graded
Record interrogation
Field interrogation
File interrogation
Check Interrogation
1 / 1 pt
Correct 1/1 Points
Auto-graded
Addition Errors
Truncation Errors
Correct 1/1 Points 1 / 1 pt
Auto-graded
Validity Check
Numeric–Alphabetic Check
Reasonableness Check
Truncation errors
Addition Errors
Substitution errors
Subtraction Error
Correct 1/1 Points 1 / 1 pt
Auto-graded
Processing Controls
Feedback Controls
Input Controls
Output Controls
Correct 1/1 Points 1 / 1 pt
Auto-graded
1 / 1 pt
Correct 1/1 Points
Auto-graded
Limit Check
Range Check
Check Digit
Correct 1/1 Points 1 / 1 pt
Auto-graded
10
Sign Check
Reasonableness Check
Sequence Check
11
Reasonableness Check
Version Check
Check Digit
12
Sign Check
Reasonableness Check
Sequence Check
13
1234567
124356
12345
123457
Correct 1/1 Points 1 / 1 pt
Auto-graded
14
Check Digit
Sign Check
Validity Check
Range Check
15
Sequence Check
Album Check
Correct 1/1 Points 1 / 1 pt
Auto-graded
16
Processing Control
Run-to-run Controls
Operators Intervention
17
Processing Control
Run-to-Run controls
Operators Intervention
18
Operators Intervention
Run-to-run controls
Batch Controls
1 / 1 pt
Correct 1/1 Points
Auto-graded
19
Correct immediately
20
Batch Controls
Run-to-run Controls
1 / 1 pt
Correct 1/1 Points
Auto-graded
21
Access Test
Validity Test
Accuracy Test
Completeness Test
Correct 1/1 Points 1 / 1 pt
Auto-graded
22
Access Test
Validity Test
Accuracy Test
Completeness Test
23
Access Test
Validity Test
Accuracy Test
Completeness Test
Correct 1/1 Points 1 / 1 pt
Auto-graded
24
Access Test
Validity Test
Accuracy Test
Completeness Test
25
26
27
Run-to-run Controls
Batch Controls
Whic
h of
the
follo
wing
items
are
techn
iques
used
to
prese
rve
audit
trails
in
comp
uter-
based
accou
nting
syste
ms?
1, 2, 4, and 5
1, 2, 3, and 5
1 and 2
1, 3, 4, and 5
Correct 1/1 Points 1 / 1 pt
Auto-graded
29
30
31
Real-time systems
Batch systems
32
33
34
35
Encryption techniques
Supervision
1 / 1 pt
Correct 1/1 Points
Auto-graded
36
Tracing
37
38
True
False
Correct 1/1 Points 1 / 1 pt
Auto-graded
39
True
False
1 / 1 pt
Correct 1/1 Points
Auto-graded
40
Points: 40/40
Entity
Attributes
Cardinality
Occurrence
Attributes
Data Model
Entity
Cardinality
The labelled line connecting two entities in a data model describes the
nature of the ______ between them. *
Association
Cardinality
Attributes
Line
Association
Line
Attributes
Cardinality
The set of data that a particular user sees. Examples of this are computer
screens for entering or viewing data, management reports, or source
documents such as an invoice.
*
Attributes
Line
Paper View
User View
Deletion Anomaly
Update Anomaly
Insertion Anomaly
Normalization Anomaly
The _____ anomaly involves the unintentional deletion of data from a table.
*
Insertion
Update
Normalization
Deletion
Less; Less
Less; More
More; More
More; Less
When unnormalized tables are split into multiple 3NF tables, they need to
be linked ____ via foreign keys so the data in them can be related and made
accessible to users.
*
Separately
Together
Access
10
Data Normalization
Table Normalization
Database Normalization
Normalizing Tables
11
12
Organization
Access method
Random
Sequential
13
This structure is used for very large files that require routine batch
processing and a moderate degree of individual record processing. *
Pointer Structure
Flat-FIle Structure
Hashing Structure
VSAM Structure
15
These are dispersed throughout a disk without regard for their physical
proximity to other related records. *
Flat-FIles
Access FIles
Sequential File
16
17
18
Random Model
Flat-File Mode
Single Mode
Database Model
Correct 1/1 Points
19
It contains the actual disk storage location (cylinder, surface, and record
number) needed by the disk controller. *
20
The principal disadvantage of indexed random files is in operations involving the processing
of individual records.
When a large portion of the file (perhaps 20% or more) is to be processed in one opera‐
tion, the sequential structure is efficient for record updating.
Database Modeling
Database Runway
Database Commercial
Database Design
22
23
Statement 1: The purchasing agent records the inventory status report for
items that need to be reordered.
Statement 2: The buying agent picks a supplier and prepares a purchase
order.
*
Statement 1 is an erroneous statement.
24
Supplier
Receiving Order
Inventory Purchases
25
All of them
Both statements 1 and 3
Statement 2 only
Statement 1 only
26
Primary Keys
Secondary Keys
Foreign Keys
Domestic Keys
27
Which of the following accurately describes the content of the data model
shown below?Which of the following accurately describes the content of
the data model shown below? *
28
Supplier Address
Supplier Name
Supplier Industry
Supplier Number
29
Which of the following is not part of the six phases of the design that
involves extensive analysis of user needs? *
Identification of customers
Statements 3 and 5 contains are wholly erroneous. The rest are partly so.
Statement 2 is incorrect.
31
ACL Software
None of the above
32
Financial auditing
Management auditing
Discontinuous auditing
Continuous auditing
33
Which of the following is the most widely used CAATT for IS auditing? *
Statement 1: GAS cannot be used to audit the data stored in most file
structures and formats.
Statement 2: Auditors cannot perform their tests independent of the
client's computer service staff.
*
Statement 1
Statement 2
35
36
ABL Software
ACM Software
ABM Software
37
Statement 2
Statement 1
38
These are expressions that search for records that meet the filter criteria.
*
Filters
Emoticons
GIFs
Hashtags
39
Which of the following allows the auditor to use logical operators such as
AND, OR, NOT and others to define and test conditions of any complexity
and to process only those records that match specific conditions? *
Obsession Builder
Commission Builder
Expression Builder
Depression Builder
40
Both A and B
Record sampling
41
HERNANDEZ, SHANE
This content is created by the owner of the form. The data you submit will be sent to the form owner. Microsoft is not
responsible for the privacy or security practices of its customers, including those of this form owner. Never give out your
password.
1. A __________ is a document, a formal order, which provides the details of the items
demanded, the mode of payment, quantity requested, and its due date.
a. Customer Order
b. Sales Order
c. Order Form
d. Court Order
2. A __________, or a document generated by the seller specifying the details about the
product or services ordered by the customer, is prepared once relevant data are
transcribed into standard format.
a. Sales Order
b. Court Order
c. Customer Order
d. Purchase Order
3. The copies of sale orders which contain important information regarding the units shipped
and their carrier are called ___________.
a. Shipping Notices
b. Keypunch
c. Order Form
d. Bill of Lading
4. A remittance list and checks and remittance advice are separated by the __________.
a. Mailroom
b. Remittance Advice
c. Deposit Slip
d. Journal Voucher
5. In a _________, the electronically transmitted stock release document would be printed
out by the warehouse clerk’s terminal who will pick and send the goods to the shipping
department.
a. Warehouse procedure
b. Sales Procedures
c. Shipping and Billing
d. Cash Receipts Procedure
6. A __________ is a location where a customer completes the payment for goods or
services and may be required to pay sales taxes.
a. Point-of-Sale
b. Destination Point
c. Point-of-Time
d. Point-in-Time
7. Each individual product sold in shops and online is given a special 12-digit identifier called
the __________.
a. Universal Language of Units
b. Universal Product Weight
c. Universal Product Code
d. Universe Product Code
8. The cash receipts clerk creates a three-part deposit slip at the end of the day for the total
amount of cash received. The other two go to the bank with the money, while one copy is
filed.
a. True
b. False
9. A POS transaction may take place offline or online, and receipts may be printed
electronically or on paper.
a. True
b. False
10. The remittance advice and remittance list are delivered to and reconciled by the inventory
clerk. The clerk produces the cash receipts transaction file electronically based on each
client's remittance.
a. True
b. False
11. The last run in the batch process is to edit a program, which validates transactions by
testing for clerical or logical errors.
a. True
b. False
12. The sort run physically arranges the sales order transaction file sequentially by Account
Number, which is one of its secondary keys, because it is the first master file updated in
the systems, which is accounts receivable.
a. True
b. False
13. The office clerk makes a comparison between the items, the stock release paperwork,
and the physical packing slip created on the terminal.
a. True
b. False
14. The following are revenue cycle audit objectives, EXCEPT:
a. Verify that the AR balance represents amounts actually owed to the organization at
the balance sheet date.
b. Determine that all amounts owed to the organization at the balance sheet date are
reflected in AR.
c. Verify AR reported for the period are properly classified in the Statement of
Comprehensive Income.
d. Verify that revenue transactions are accurately computed and based on current prices
and correct quantities.
15. These are designed to ensure that transactions are valid, accurate, and complete.
a. Input Controls
b. Output Controls
c. Physical Controls
d. Access Controls
16. The purpose of the credit check is to establish the creditworthiness of the customer.
a. True
b. False
17. S1: The auditor can verify the correctness of programmed decision rules by using either
the test data or integrated test facility (ITF) approaches to directly test their functionality.
S2: Output validation controls are intended to detect transcription errors in transaction
data before they are processed.
a. Statement 1 is correct.
b. Statement 2 is correct.
c. Both statements are correct.
d. Both statements are incorrect.
18. ____________ controls use batch control data to monitor the batch as it moves from one
programmed procedure (run) to another.
a. Process Controls
b. Run-to-run Controls
c. Data Validation Controls
d. Batch Controls
19. Access controls are used to manage high volumes of transaction data through a system.
a. True
b. False
20. An important element of batch control is the batch transmittal sheet, which captures
relevant information about the batch, such as the following, EXCEPT:
a. Invoice number
b. Unique batch number
c. Batch date
d. Record count
21. These include computerized procedures for file updating and restricting access to data.
a. Input Controls
b. Output Controls
c. Process Controls
d. Batch Controls
22. In systems that use sequential master files, the order of the transaction records in the
batch is critical to correct and complete processing.
a. True
b. False
23. S1: The failure of file update controls to function properly can result in records going
unprocessed.
S2: Access control is at the heart of accounting information integrity.
a. Statement 1 is correct.
b. Statement 2 is correct.
c. Both statements are correct.
d. Both statements are incorrect.
24. These prevent and detect unauthorized and illegal access to the firm’s assets.
a. Input Controls
b. Output Controls
c. Access Controls
d. Physical Controls
25. Adequate segregation of duties and the effective supervision and independent verification
can result in fraud and material errors.
a. True
b. False
26. The following are the rules in Segregation of Duties, Except:
a. Transaction authorization should be separate from transaction processing.
b. Asset custody should be separate from the record-keeping task.
c. The organization should be so structured that the perpetration of a fraud requires
collusion between two or more individuals.
d. One individual should handle multiple tasks.
27. These are designed to ensure that information is not lost, misdirected, or corrupted and
that system processes function as intended.
a. Input Controls
b. Output Controls
c. Physical Controls
d. Access Controls
28. If the sum of the customer’s outstanding account balance and the amount of current sales
transaction exceeds the pre-established credit limit, then the transaction is rejected.
a. True
b. False
29. S1: The Sales Invoice file contains address and credit information about customers.
S2: Customer master file, along with the Line Item file, captures sales transaction data for
the period.
a. Statement 1 is correct.
b. Statement 2 is correct.
c. Both statements are correct.
d. Both statements are incorrect.
30. The __________ file contains a record of every product sold.
a. Sales Invoice
b. Customer
c. Line Item
d. Cash Receipts
31. When products are sold, the quantity-on-hand field in the associated records is reduced
by the value of the Quantity field in the Line Item record.
a. True
b. False
32. Which of the following is correct?
a. The shipping log is a record of all sales orders shipped to customers.
b. As a preliminary step in using ACL, each file needs to be defined in terms of its physical
location and its structure.
c. Whatever the cause, prior to performing any substantive tests on a new file, it is
important to validate its contents.
d. All of the above.
33. Auditors often precede substantive tests of details with a/an _____________ of account
balances.
a. Analytical review
b. Reconciliation
c. Audit
d. None of the above
34. ACL provides a filter accessibility that can be used to select or ignore specific records from
an entire file.
a. True
b. False
35. If there's a duplication or missing records in the Sales Invoice file, the auditor can ask the
following types of questions to the management and employees involved in the process,
EXCEPT:
a. How are gaps in sales invoices communicated to management?
b. Did the management and the employees did their job properly?
c. What physical controls exist over access to sales invoice source documents?
d. Are batch totals used to control total transactions during data processing?
36. Evidence from testing the product prices charged to customers supports the audit
objective of _______________.
a. Existence or Occurrence
b. Accuracy
c. Valuation or Allocation
d. Completeness
37. One of the two possible causes for unmatched records is the Sales Invoice file.
a. True
b. False
38. S1: One of the most widely performed tests of existence is the confirmation of accounts
receivable.
S2: Obtaining a set of accounts for confirmation requires two steps: consolidate the
invoices by customer and select a sample of accounts from the joined file.
a. Statement 1 is correct.
b. Statement 2 is correct.
c. Both statements are correct.
d. Both statements are incorrect.
39. _____________________ request the recipients to respond only if they disagree with the
amount shown in the letter.
a. Positive Confirmation
b. Disagreement Confirmation
c. Agreement Confirmation
d. Negative Confirmation
40. As accounts age, the probability that they will ultimately be collected is increased.
a. True
b. False
AUDITING IN A CIS ENVIRONMENT
OFFICIAL QUESTIONNAIRE
Group 10
Topic: Auditing the Expenditure Cycle
Members:
Aranas, John Ralf A.
Declarado, Allen Angelo
Francia, Nila Marice G.
Gonzales, Jieselle Anne V.
—----------------------------------------------------------------------------------------------------------------------------
2. Expedites the ordering process by distributing the purchase orders directly to the vendors and
internal users, thus bypassing the purchasing department completely
a. Alternative 1
b. Alternative 2
c. Alternative 3
d. Alternative 4
3. Represents the reengineering system that uses electronic data interchange (EDI)
a. Alternative 1
b. Alternative 2
c. Alternative 3
d. Alternative 4
4. Reconciles the transaction listing with checks, signs them and mails them to the suppliers.
a. Cash receipts clerk
b. Petty cash custodian
c. Sales representative
d. Cash disbursements clerk
5. Statement I: Every other day, the DUE DATE fields of the vendor invoice records are scanned
for items due to be paid
Statement II: Payroll checks writing has unique risks and requires special controls to prevent
and detect fraud
a. Only Statement I is true
b. Only Statement II is true
c. Both statements are true
d. Both statements are false
6. Captures and process a wide range of personnel related data, including employee benefits,
labor resource planning, employee relations, employee skills, personnel actions, as well as
payroll.
a. Human Source Management System
b. Human Management System
c. Human Resource Management System
d. Human Resource
7. This department makes changes to the employee file in real time via terminals
a. Personnel
b. Cost Accounting
c. Time Keeping
d. Data Processing
8. This department enters job cost data to create labor usage file
a. Personnel
b. Cost Accounting
c. Time Keeping
d. Data Processing
10. Receives the personnel action forms and time cards, which it converts to digital files
a. Cash Disbursement Department
b. Data Processing Department
c. Human Resource Management
d. Payroll Department
11. Type of controls that are designed to ensure that transactions are valid, accurate, and
complete.
a. Output Control
b. Process Control
c. Batch Control
d. Input Control
16. Includes computerized procedures for updating files and restricting access to data.
a. Range Check
b. Data Validation Control
c. Output Control
d. Process Control
19. Are designed to ensure that information are not lost, misdirected, or corrupted and that
system processes function as intended.
a. Output Control
b. Input Control
c. Process Control
d. None of the Above
21. Taking the most narrow attest-function view, external auditors are concerned primarily with
the potential for understatement of liabilities and related expenses.
a. True
b. False
22. Auditors seek evidence by performing a combination of tests of internal controls and
substantive tests. The internal controls include:
a. general controls
b. application controls
c. both a and b
d. none of the above
23. This file contains the quantity, price, supplier, and warehouse location data for each item of
product inventory.
a. Inventory file
b. Receiving report file
c. Check register file
d. Disbursement voucher file
24. The records under purchase order file remain open unless
a. the clerk says so
b. the goods have arrived
c. the vendor delayed the order
d. the file's storage is full
25. If the information matches between the records and invoice, a record is then added to the
_______ file where payment due is involved.
a. Receiving report
b. Purchase order
c. Disbursement voucher
d. Inventory file
26. This command analyzes data fields in data files to ensure that their contents are consistent
with the field type in the file definition.
a. ACL Definition Screen
b. ACL Verify
c. ACL Join
d. ACL Consistency is the key
28. Which of the following is irrelevant if an auditor wants to test the completeness, existence,
rights and obligations assertions of a company's expenditure process?
a. Search for unrecorded liabilities
b. Search for unauthorized disbursement vouchers
c. Review for duplicate checks to vendors
d. Review for duplicate receivables from customers
29. In order to locate unrecorded liabilities, the auditor may again utilize the ACL Join function
between two files:
a. (1) receiving report file and (2) inventory file
b. (1) inventory file and (2) purchase order file
c. (1) purchase order file and (2) disbursement voucher file
d. (1) receiving report file and (2) disbursement voucher file
30. The auditor may use ______ to detect unusual trends and abnormal balances relating to
payroll accounts.
a. ACL Stratify
b. ACL Join
c. ACL Verify
d. ACL Definition
31. They purchase raw materials for production, and their purchasing decisions are authorized
by the production planning and control function.
a. Trading firms
b. Retailing Firms
c. Manufacturing Firms
d. Merchandising Firms
32. A purchase processing procedure where it receives the purchase requisitions that are sorted
by vendor if necessary.
a. Prepare Purchase Order
b. Update Inventory Records
c. Receive Goods
d. Set up Accounts Payable
33. It processes the payment of obligations created in the purchases system.
a. Cash Disbursement System
b. Vouchers Payable System
c. Purchase System
d. Cash System
34. During the course of this transaction, the setup AP function has received and temporarily
filed copies of the PO and received a report.
a. Prepare Purchase Order
b. Update Inventory Records
c. Receive Goods
d. Set up Accounts Payable
35. __________ purchase finished goods for resale and the inventory control function provides
the purchase authorization
a. Trading firms
b. Retailing Firms
c. Manufacturing Firms
d. Merchandising Firms
36. Under this system, the AP department uses cash disbursement vouchers and maintains a
voucher register.
a. Cash Disbursement System
b. Vouchers Payable System
c. Purchase System
d. Cash System
37. A payroll activity where the preparation and submission of personnel actions forms to the
prepared payroll function takes place.
a. Production Department
b. Personnel Department
c. Prepare Cash Disbursement
d. Distribute Paycheck
38. A payroll activity where the preparation of two types of time records; job tickets and time
cards takes place.
a. Production Department
b. Personnel Department
c. Prepare Cash Disbursement
d. Distribute Paycheck
39. A payroll activity where the AP clerk reviews the payroll register for correctness and
prepares copies of a cash disbursement voucher for the amount of the payroll.
a. Prepare Cash Disbursement
b. Prepare Accounts Payable
c. Update General Ledger
d. Prepare Accounts Payable
40. Firms deplete their inventories by transferring __________ into the production process and
by selling __________to customers.
a. work-in progress: finished goods
b. raw materials; finished goods
c. finished goods; work-in progress
d. finished goods: raw materials
Prepared by Group 11:
Dantes, Ronald
Obaldo, Abraham Manuel
Vercaza, Faith Anne
3. Which of the following best describes the primary difference between the traditional
model and ERP systems?
a) The traditional model uses multiple computer systems for each department,
while ERP systems integrate all departments' computer systems into one.
b) The traditional model promotes effective communication across departments, while
ERP systems pose a challenge in making communication effective across departments.
c) The traditional model accesses a single database, while ERP systems use multiple
computer systems for each department.
d) Both the traditional model and EP systems combine all departments' computer
systems into a single, integrated system.
4. Which of the following statement/s is/are correct regarding the traditional IS model?
I. It entails a high degree of data redundancy.
II. It is similar to the fundamental flat-file architecture, but with a little technological edge
over flat-file systems.
III. Its processing of order starts with a paper-based journey around the company.
a) II only.
b) I and II only.
c) II and III only.
d) All of the statements are correct.
6. These are applications that support mission-critical tasks through simple queries of
operational databases.
a) OLAP
b) OLTC
c) OLTP
d) OLEP
7. The following are the typical core applications that we encounter, except:
a) Sales and distribution
b) Shop floor control
c) Human resource management
d) Logistics
9. This is intended for quick searching, retrieval, ad hoc queries, and ease of use.
a) Date module
b) Data warehouse
c) Data processor
d) Date storage
11. This is intended for quick searching, retrieval, ad hoc queries, and ease of use.
a) Date module
b) Data warehouse
c) Data processor
d) Date storage
13. It is one of the basic architectures of ERP Systems wherein the server handles both
application and database duties.
a) Two-tier model
b) Cloud-based model
c) Three-tier model
d) Standalone model
15. The rationale behind the need for this software is that ERP software alone cannot
drive all the processes of the company.
a) Bolt-on software
b) Peripheral software
c) Assistive software
d) Analytical software
17. In what area does this High Cost and Cost Overruns problem occur?: Integration
and testing are done on a case-by-case basis; thus, the cost is extremely difficult to
estimate in advance.
a) Training
b) System Testing and Integration
c) Database Conversion
d) None of the above
18. In what area does this High Cost and Cost Overruns problem occur?: Training costs
are invariably higher than estimated because management focuses primarily on the cost
of teaching employees the new software.
a) Training
b) System Testing and Integration
c) Database Conversion
d) None of the above
19. In what area does this High Cost and Cost Overruns problem occur?: More often,
the data in the legacy system are not reliable.
a) Training
b) System Testing and Integration
c) Database Conversion
d) None of the above
20. It is the period needed for everyone to reach a comfortable point on learning ERP
systems.
a) Learning period
b) Accounting period
c) Adjustment period
d) Reconciliation period
21. The following are the two strategic errors that had been attributed to Hershey’s
problem related to system implementation:
I. Because of schedule overruns, they decided to switch to the new system during their
busy season.
II. Many experts believe that Hershey did just enough in a single implementation.
24. Identify what implication for internal control and auditing is being described:
Because of the close interfaces with customers and suppliers, some organizations run
the risk that corrupted or inaccurate data may be passed from these external sources
and corrupt the ERP accounting database.
a) Independent Verification
b) Accounting Records
c) Contingency Planning
d) Access Controls
25. Identify what implication for internal control and auditing is being described: An
important aspect of such control is the assignment of roles.
a) Transaction Authorization
b) Supervision
c) Segregation of Duties
d) Access Controls
26. Identify which key concern of Internal Control Issues Related to ERP Roles is being
described: Such access-granting authority needs to be tempered with judgment to
prevent the number of roles from multiplying to the point of becoming dysfunctional and
thus creating a control risk.
a) The Creation of Unnecessary Roles
b) The Rule of Least Access
c) Monitor Role Creation and Permission-Granting Activities
d) None of the above
27. Identify which key concern of Internal Control Issues Related to ERP Roles is being
described: Access privileges (permissions) should be granted on a need-to-know basis
only.
a) The Creation of Unnecessary Roles
b) The Rule of Least Access
c) Monitor Role Creation and Permission-Granting Activities
d) None of the above
29. Which of the following is a known problem behind the accumulation of unneeded
permissions over time:
I. Managers exercise adequate care in assigning permissions, making the process
unnecessarily longer.
II. Managers are not always experts in internal controls, so they may not recognize
when excessive permissions are awarded to an individual.
a) Only statement I is a problem.
b) Only statement II is a problem.
c) Both statements are known problems.
d) None of the statements are known problems.
30. Which of the following is a known problem behind the accumulation of unneeded
permissions over time:
I. Managers tend to be better at issuing privileges than removing them.
II. An individual may retain unneeded access privileges from a previous job assignment
that creates a segregation of duties violation when combined with a newly assigned
role.
31. Creating a role involves defining the following role attributes, except:
a) a compilation of responsibilities to be performed by other roles
b) the technical competencies needed to perform the role
c) a stated set of business responsibilities to be performed within the role
d) the specific transactions (permissions) required to carry out the stated responsibilities
35. A technique that can dramatically reduce the extraction time by capturing only newly
modified data.
a) Changed Capture Data
b) Extracting of Data into Data Warehouse
c) Cleaning Extracted Data
d) Data Gathering Instruments
1. The objective of this stage is to ensure that transaction data entering the system are
valid, complete, and free from material errors.
a. Data Collection
b. Data Processing
c. Database Management
d. Information Generation
2. A type of program fraud that involves modifying the rounding logic of the program, so
it no longer adds the one cent randomly.
a. Payroll Fraud
b. Scavenging
c. Salami Fraud
d. Eavesdropping
3. Which of the following is not the responsibility of the auditor for detecting fraud?
a. Documenting consideration of fraud
b. Assessing the identified risks
c. Engagement personnel discussion
d. Engagement staffing and extent of supervision
4. The auditor should document in the working papers the criteria used for assessing
the fraud risk factors. The documentation should include:
I. description and characteristics of fraud
II. those risk factors identified
III. the auditor’s response to them
a. I, II, III
b. I, II
c. I, III
d. II, III
9. This involves inflating the number of hours worked and/or issuing duplicate payroll
checks.
a. Overpayment of employee
b. Payments to a non-existent employee
c. Payment to fictitious vendors
d. Lapping accounts receivable
10. When the fraud has a material effect on the financial statements or the auditor is
unable to evaluate its degree of materiality, the auditor should:
a. I, II, III, IV
b. I, II, III
c. I, II, IV
d. II, III, IV
11. A Certified Public Accountant (CPA) in the controller’s office used the company’s
computer to prepare tax returns and financial statements for her private clients. This
is an example of
a. Program Fraud
b. Operations Fraud
c. Computer Fraud
d. Ghost Employee
12. The audit procedure for this is to use ACL to join the employee file and the invoice
file using the address fields as the common key for both files. Only records that
match should be passed to the resulting combined file. These records can then be
reviewed further.
a. Sequential Invoice Numbers
b. Vendors with P.O. Boxes
c. Vendors with Employee Addresses
d. Multiple Companies with the Same Address
13. The audit procedure for this is to use ACL to sort the records of the invoice file by
invoice number and vendor number. This will highlight records that possess series
characteristics, which can then be retrieved for further review.
a. Sequential Invoice Numbers
b. Vendors with P.O. Boxes
c. Vendors with Employee Addresses
d. Multiple Companies with the Same Address
14. The audit procedure for this situation is to use ACL’s expression builder to create a
value range around the control threshold. To highlight suspicious activity that
warrants further investigation, sort payment records that fall within this range by the
vendor.
a. Vendors with P.O. Boxes
b. Vendors with Employee Addresses
c. Multiple Companies with the Same Address
d. Invoices Amount is Slightly below the Review Threshold
15. Computer fraud is any kind of fraud that is committed by means of a computer
system. This includes the following except:
a. The theft, misuse, or misappropriation of assets by altering
computer-readable records and files.
b. The theft, misuse, or misappropriation of assets by altering the logic of
computer software.
c. The theft or illegal use of computer-readable information.
d. The theft, corruption, illegal copying, or intentional destruction of
computer hardware.
16. Management can expect various benefits to follow from implementing a system of
strong internal control. Which of the following benefits is least likely to occur?
a. Reduced cost of an external audit.
b. Prevents employee collusion to commit fraud.
c. Availability of reliable data for decision-making purposes.
d. Some assurance that important documents and records are protected.
17. The following are the three broad categories of fraud schemes, except?
a. Independent auditing
b. Fraudulent statements
c. Asset misappropriation
d. Corruption
18. Excessive use of short-term stock options to compensate directors and executives
may result in short-term thinking and strategies aimed at driving up stock prices at
the expense of the firm’s short-term health.
a. The statement is incorrect.
b. The statement is correct.
19. Billing schemes is also known as ______.
a. Owner fraud
b. Customer fraud
c. Employee schemes
d. Vendor fraud
23. Which of the following controls would best prevent the lapping of accounts
receivable?
a. Segregate duties so that the clerk responsible for recording in the accounts
receivable subsidiary ledger has no access to the general ledger.
b. Request that customers review their monthly statements and report any
unrecorded cash payments.
c. Require customers to send payments directly to the company’s bank.
d. None of the above.
24. There’s a difficulty in quantifying the actual cost of fraud due to following reasons,
except:
a. Not all detected fraud is reported.
b. Not all fraud is detected.
c. There’s a complete information collected.
d. Organization decided not to take civil actions against perpetrator.
25. ACFE study claims that losses from fraud by collusion was mainly caused by?
a. Male
b. Female
c. Employee
d. Below 18 years old
26. Individuals in the _______ positions within an organization are beyond the internal
control structure and have the _____ access to company’s fund and assets.
a. Highest, least
b. Highest, greatest
c. Lowest, greatest
d. Middle, least
29. This fraud scheme has been the vehicle to achieve the stock price needed to
exercise the option.
a. Corruption
b. Bribery
c. Financial statement misrepresentation
d. Collusion
30. An asset misappropriation where an employee opening mail steals customer’s check
and its remittance advice.
a. Mailroom fraud
b. Lapping
c. Billing schemes
d. check-tampering
31. ____ derived from societal mores and deep-rooted personal beliefs about issues of
right and wrong that are not universally agreed upon.
a. Ethical standards
b. Ethical issues
c. Ethics
d. Business Ethics
32. ____ pertains to the principles of conduct that individuals use in making choices and
guiding their behavior in situations that involve the concepts of right and wrong.
a. Ethical standards
b. Ethical issues
c. Ethics
d. Business Ethics
33. ____ is the analysis of the nature and social impact of computer technology and the
corresponding formulation and justification of policies for the ethical use of such
technology.
a. Ethical standards
b. Ethical issues
c. Ethics
d. Computer Ethics
34. False representation of a material fact made by one party to another party with the
intent to deceive and induce the other party to justifiably rely on the fact to his or her
detriment.
a. Fraud
b. False Representation
c. Justifiable Reliance
d. Material Fact
37. The misrepresentation must have been a substantial factor on which the injured party
relied.
a. Fraud
b. False Representation
c. Justifiable Reliance
d. Material Fact
38. _____ also limits access, for example, where documentation is prepared in only one
language or is poorly translated.
a. Economic Status
b. Safety Features
c. Environmental Issues
d. Culture
39. The exposure to stories and reports found in the popular media regarding the good or
bad ramifications of computer technology.
a. Papa Computer Ethics
b. Pop computer ethics
c. Para computer ethics
d. Theoretical computer ethics
40. Interest to multidisciplinary researchers who apply the theories of philosophy,
sociology, and psychology to computer science with the goal of bringing some new
understanding to the field.
a. Papa Computer Ethics
b. Pop computer ethics
c. Mama computer ethics
d. Theoretical computer ethics
41. Taking a real interest in computer ethics cases and acquiring some level of skill and
knowledge in the field.
a. Papa Computer Ethics
b. Pop computer ethics
c. Para computer ethics
d. Theoretical computer ethics
42. S1: Expert Systems are decision makers or replacement for experts.
S2: Domain Experts are those who write the programs
a. Only S1 is correct.
b. Only S2 is correct.
c. Both statements are true
d. Both statements are false
43. Often involves deceptive practices to inflate earnings or to forestall the recognition of
either insolvency or a decline in earnings.
a. Management Fraud
b. Performance Fraud
c. External Fraud
d. Internal Fraud
44. Is more insidious than employee fraud because it often escapes detection until the
organization has suffered irreparable damage or loss.
a. Management Fraud
b. Performance Fraud
c. External Fraud
d. Internal Fraud
45. Involves direct access to assets and/or access to information that controls assets.
a. Ethics
b. Situational Pressure
c. Opportunity
d. Integrity