0% found this document useful (0 votes)
193 views35 pages

Accounting Information System: Midterm Exam

This document appears to be a midterm exam submitted by a group of students for an Accounting Information Systems course. It contains multiple choice questions testing knowledge of topics like general controls, revenue accounting systems, disbursement accounting systems, and audit approaches like auditing around and through the computer. It also provides the students' answers and explanations for the multiple choice questions.

Uploaded by

Heidi Opada
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
193 views35 pages

Accounting Information System: Midterm Exam

This document appears to be a midterm exam submitted by a group of students for an Accounting Information Systems course. It contains multiple choice questions testing knowledge of topics like general controls, revenue accounting systems, disbursement accounting systems, and audit approaches like auditing around and through the computer. It also provides the students' answers and explanations for the multiple choice questions.

Uploaded by

Heidi Opada
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 35

ACCOUNTING INFORMATION SYSTEM

Midterm Exam
Group 3

Submitted to:
Mr. Rhamir C. Dalioan

Submitted by:
Sellon, Lea Grace A.
Soriano, Kristine Andrea M
Nucasa Ma. Isabel M.
Saragosa, Chastine
Impas, Key S.
Masire, Mofidah
TABLE OF CONTENTS

PAG
E(s)
PART I. Multiple Choice Theories
Electronic Data Processing Controls………………………………………………….4-5
By Key S. Impas

Revenue Accounting System…………………………………………………………..6-7


By Mofidah Masire

Disbursement Accounting System…………………………………………………….8-9


By Mofidah Masire

Auditing Around the Computer………………………………………………………..10-12


By Chastine Saragosa

Auditing Through the Computer………………………………………………………13-14


By Chastine Saragosa

Test Data Approach……………………………………………………………………15-16


By Kristine Andrea M. Soriano
Isabel Nucasa

Parallel Simulation……………………………………………………………………..17-18
By Kristine Andrea M. Soriano
Isabel Nucasa

Integrated Test Facility Approach…………………………………………………….19-20


By Kristine Andrea M. Soriano
Isabel Nucasa

Batch Processing Method……………………………………………………………...21-22


By Lea Grace A. Sellon

On-line Real time Processing………………………………………………………….23-25


By Lea Grace A. Sellon

2
PAG
E(s)
PART II. Suggested answers and explanation
General Controls and Aplication Controls………………………………………….. . 26
By Key S. Impas

Revenue Accounting System…………………………………………………………. 27


By Mofidah Masire

Disbursement Accounting System…………………………………………………….28


By Mofidah Masire

Auditing Around the Computer…………………………………………………………29


By Chastine Saragosa

Auditing Through the Computer………………………………………………………..30


By Chastine Saragosa

Test Data Approach……………………………………………………………………...31


By Kristine Andrea M. Soriano
Isabel Nucasa

Parallel Simulation……………………………………………………………………….32-33
By Kristine Andrea M. Soriano
Isabel Nucasa

Integrated Test Facility Approach………………………………………………………34


By Kristine Andrea M. Soriano
Isabel Nucasa

Batch Processing Method………………………………………………………………..35


By Lea Grace A. Sellon

On-line Real time Processing…………………………………………………………….36


By Lea Grace A. Sellon

3
PART I

Multiple Choice Questions

GENERAL CONTROLS

1. Which of the following terms best describes the type of control evidenced by
personal identification number or password? It must be private to restrict access.
A. System development control
B. Hardware control
C. Access control
D. Application control
2. The one who design and develop new systems by choosing and configuring
hardware and software?
A. System analyst
B. Programmer
C. Computer operator
D. Librarian
3. In an online computer-based system, which of the following may be used to ensure
that users have proper authorization to perform task?
A. Check digit
B. Passwords
C. Control totals
D. Limit test
4. General control that detect and control errors arising from the use of equipment?
A. Equipment controls
B. Hardware controls
C. System controls
D. A and B
5. _______ is to assure the continuity of the operation in the event of physical
disaster.
A. Back-up files
B. System development and Documentation
C. Data and other procedural controls
D. A and D

4
6. To avoid invalid input, a bank added extra number at the end of each account
number and subjected the new number to algorithm. This technique is known as?
A. Dual read
B. Test for reasonableness
C. Check digit
D. Occurrence correction
7. _______ designed to check that processing results is valid output and that outputs
are distributed properly to users.
A. Application control
B. Input control
C. Processing control
D. Output control
8. For control purposes, data clerks total up the employee Social Security numbers in
each batch of payroll transactions. Which of the following terms best describes the
resulting total?
A. Hash total
B. Financial total
C. Parity total
D. Record count
9. For control purposes, data clerks total up the employee gross pay amounts in each
batch of payroll transactions. Which of the following terms best describes the
resulting total?
A. Hash total
B. Financial total
C. Parity total
D. Record count
10. A customer inadvertently orders part number 1234-8 instead of 1243-8. Which of
the following controls would detect this error during processing?
A. Hash total
B. Financial total
C. Limit check
D. Check digit

5
REVENUE ACCOUNTING SYSTEM

1. The maximum allowable account balance for a given customer is called the
a. Credit checkpoint
b. Credit limit
c. Reorder point
d. Backorder point

2. What is the normal procedure for new customers or customers making a purchase
that causes their credit limit to be exceeded?
a. Routine approval is granted without authorization
b. Specific approval must be granted by the credit manager
c. Reject the sale in either case without question
d. Check the credit bureau for a credit rating on the customer

3. Which batch totals are manually calculated for each batch in a typical sales order
entry system?
a. The record count and hash total of the quantities ordered
b. The financial total of the amounts billed to the customer and hash total of the
quantities ordered
c. The line count and record count
d. The record count and hash total of the sales order numbers
4. Most companies recognize sales when
a. Customer order is received
b. The merchandise is shipped
c. The merchandise is received by the customer
d. Cash is received on account

5. Where are amounts owed by customers for credit purchases found?


a. Accounts receivable journal
b. Accounts receivable subsidiary ledger
c. Sales journal
d. General ledger

6. Which of the following transactions is not recorded in the cash receipts journal?
a. Expensing prepaid rent
b. Receipt of customer payments
c. Borrowing money from a bank

6
d. Sale of equipment for cash

7. For a retail store such as Wal-Mart, the relationship between sales and inventory
items is most likely to be represented as being which of the following
a. One-to-one
b. One-to-many
c. Many-to-one
d. Many-to-many

8. For good internal control, who should approve credit memos?


a. Credit manager
b. Sales manager
c. Billing manager
d. Controller

9. For good internal control over customer remittances, the mailroom clerk should
separate the checks from the remittance advices and send them to whom?
a. Billing
b. Accounts receivable
c. Cashier
d. Controller

10. What is the primary objective of the revenue cycle?


a. To maximize revenue and minimize expense.
b. To reduce outstanding accounts receivable balances through increased cash
sales.
c. To provide the right product in the right place at the right time at the right
price.
d. To sell as much product as possible and/or to maximize service billings.

7
DISBURSEMENT ACCOUNTING SYSTEM

1. A major cost in the purchasing function is the number of purchase orders


processed. One technique that may reduce purchasing-related expenses is to have
suppliers compete with each other to meet demand at the lowest price. The name
of this technique is?
a. An EDI auction
b. A trading exchange
c. A reverse auction
d. A supplier consortium
2. What is not an advantage to using disbursement vouchers?
a. Disbursement vouchers reduce the number of checks written.
b. Disbursement vouchers can be renumbered which simplifies the tracking of
all payables.
c. Disbursement vouchers facilitate separating the time of invoice approval from
the time of invoice payment.
d. There are no disadvantages to using disbursement vouchers.
3. What is the final activity in the expenditure cycle?
a. Ordering goods
b. Receipt and storage of goods
c. Approving vendor invoices for payment
d. The payment of approved invoices

4. When goods are being ordered from a vendor, which electronic files are either read
or updated?
a. Inventory, vendors, and accounts payable
b. Vendors and accounts payable
c. Open purchase orders and accounts payable
d. Inventory, vendors, and open purchase orders
5. What aspect below best characterizes a JIT inventory system?
a. Frequent deliveries of smaller quantities of items to the work centers.
b. Frequent deliveries of large quantities to be held at the work centers.
c. Less frequent deliveries of large quantities of goods to central receiving.
d. Infrequent bulk deliveries of items directly to work centers.

6. A key decision in ordering is selecting a suitable vendor. Which of the following


would not be a major criterion in vendor selection?
8
a. Prices of goods
b. Quality of goods
c. Credit rating of vendor
d. Ability to deliver on time.
7. A purchase order is ?
a. A document formally requesting a vendor to sell a certain product at a certain
price.
b. A request for delivery of certain items and quantities.
c. A contract between the buyer and vendor once accepted by the vendor.
d. All of the above are true.

8. In a paper-based purchasing system, copies of the purchase order are typically


sent to the vendor and the?
a. Receiving department.
b. User department.
c. Receiving and accounts payable departments.
d. User and accounts payable departments.

9. The receiving and storage of goods is the responsibility of the receiving department,
which usually reports to the ________ function in the company.
a. Inventory control
b. Stores
c. Production
d. Purchasing

10. All of the following technologies could be useful aids in the receiving process
except?
a. Bar coding
b. Radio frequency identification tags
c. EFT
d. Satellite technology

9
AUDTING AROUND COMPUTER

1. When the client uses a computer but the auditor chooses to use only the
non-IT segment of internal control to assess control risk, it is referred to
as auditing around the computer. Which one of the following conditions
need not be present to audit around the computer?
a. Computer programs must be available in English.
b. The source documents must be available in a non-machine
language.
c. The documents must be filed in a manner that makes it possible to
locate them.
d. The output must be listed in sufficient detail to enable the auditor to
trace individual transactions.

2. General controls include all of the following except:


a. systems development.
b. online security.
c. processing controls.
d. hardware controls.

3. An auditor’s flowchart of a client’s system is a graphical representation


that depicts the auditor’s:
a. program for tests of controls.
b. understanding of the system.
c. understanding of the types of errors that are probable given the
present system.
d. documentation of the study and evaluation of the system.

4. Typical controls developed for manual systems which are still important
in IT systems include:
a. proper authorization of transactions.
b. competent and honest personnel.
c. careful and complete preparation of source documents.
d. all of the above.

5. Which of the following is not associated with converting from a manual


to an IT system?
a. It usually centralizes data.
b. It permits higher quality and more consistent controls over
operations.
c. It may eliminate the control provided by division of duties of
10
independent persons who perform related functions and compare
results.
d. It may take the recordkeeping function and the document
preparation function away from those who have custody of assets and
put those functions into the IT center.

6. Auditors should evaluate the ________ before evaluating application


controls because of the potential for pervasive effects.
a. input controls
b. control environment
c. processing controls
d. general controls

7. Which of the following is least likely to be used in obtaining an


understanding of client general controls?
a. Examination of system documentation
b. Inquiry of client personnel (e.g., key users)
c. Observation of transaction processing
d. Reviews of questionnaires completed by client IT personnel

8. When auditors consider only non-IT controls in assessing control risk, it


is known as:
a. the single-stage audit.
b. the test deck approach.
c. auditing around the computer.
d. generalized audit software (GAS).

9. Which of the following is not a general control?


a. The plan of organization and operation of IT activity.
b. Procedures for documenting, reviewing, and approving systems and
programs.
c. Processing controls.
d. Hardware controls.

10. The most important output control is:


a. distribution control, which assures that only authorized personnel
receive the reports generated by the system.
b. review of data for reasonableness by someone who knows what the
output should look like.
c. control totals, which are used to verify that the computer’s results
are correct.
d. logic tests, which verify that no mistakes were made in processing.

11
AUDITING THROUGH COMPUTER

1. Which of the following is not one of the three categories of testing


strategies when auditing through the computer?
a. Pilot simulation.
b. Test data approach.
c. Parallel simulation.
d. Embedded audit module.

2. The audit procedure which is least useful in gathering evidence on


significant computer processes is:
a. documentation.
b. observation.
c. test decks.
d. generalized audit software.

3. Which of the following is not a benefit of using IT-based controls?

12
a. Ability to process large volumes of transactions.
b. Ability to replace manual controls with computer-based controls.
c. Reduction in misstatements due to consistent processing of
transactions.
d. Over-reliance on computer-generated reports.

4. Which of the following is not a characteristic of an online processing


system?
a. Output of the data files is available on request.
b. Master files are updated at the time the entry is made.
c. Display terminals are used for both input and output purposes.
d. Programming is not allowed online and must be done separately.

5. Which of the following is not a risk specific to IT environments?


a. Reliance on the functioning capabilities of hardware and software.
b. Increased human involvement.
c. Loss of data due to insufficient backup.
d. Reduced segregation of duties.

6. Which of the following is not an enhancement to internal control that will


occur as a consequence of increased reliance on IT?
a. Computer controls replace manual controls.
b. Higher quality information is available.
c. Computer-based controls provide opportunities to enhance
separation of duties.
d. Manual controls replace automated controls.

7. Which of the following is not a risk to IT systems?


a. Need for IT experienced staff
b. Separation of IT duties from accounting functions
c. Improved audit trail
d. Hardware and data vulnerability

8. Which of the following is not a category of an application control?


a. Processing controls.
b. Output controls.
c. Hardware controls.
d. Input controls.

9. Which of the following is a category of general controls?


a. Processing controls.
b. Output controls.
c. Physical and online security.
d. Input controls.

10. Which of the following statements related to application controls is


correct?
a. Application controls relate to various aspects of the IT function
including software acquisition and the processing of transactions.
b. Application controls relate to various aspects of the IT function
including physical security and the processing of transactions in various
cycles.
c. Application controls relate to all aspects of the IT function.
13
d. Application controls relate to the processing of individual
transactions.

TEST DATA APPROACH

1. What is the first step in test data approach?


a. Transaction test data
b. Manually processed results
c. Prepare transaction and results
d. Computer application system

2. What are the types of test data approach?


a. BCSE (Base Case System Evaluation) and Tracing
b. Tracing and Processing
c. Computer and Processing
d. BCSE (Base Case System Evaluation) and Processing
A. BCSE (Base Case System Evaluation) and Tracing are types of Test Data
Approach
3. The following are disadvantages of test data except:
a. Confined to test of control only.
b. It only confirms the operation of the program at the time that it is tested.
c. No visible evidence of audit work performed: need to record in the working
paper of work done
d. Requires limited technical knowledge.
4. The following are advantages of test data except:
a. Requires limited technical knowledge.
b. Usually fairly simple to operate.
c. Helps the auditor learn how the system operates.
d. Cost for constructing test data, pre determine the result manually and
ascertaining which controls to be tested.
5. What are the four qualities of Test data that must possess?
a. Realistic, Recover, Practically Valid
b. Realistic, Practically Valid , Versatile and Cover Scenarios And Exceptional
Data
c. Versatile, Practically Valid, Realistic, Practically Valid
14
d. Practically Valid, Versatile, Recover, and Undercover.
6. What is the only ways to prepare Test data?
a. Insert New Data and Test Data
b. Insert New Data, And Choose sample subset from actual Database Data
c. Test Data and Actual Database
d. Database and New Data
7. To define test data approach has one of the _____ box techniques used by auditors
in a computer assisted auditing techniques.
a. Black
b. White
c. Gray
d. Blue
8. Which of the following best describes the test data approach?
a. Auditors process their own test data using their own computers that simulate the
client’s computer system.
b. Auditors process their own test data using the client’s computer system and
application program.
c. Auditors use client-controlled software to do the same operations that the
client’s software does, using auditor created data files.
d. Auditors use client-controlled software to do the same operations that the
client’s software does, using the same data files.
9. In auditing through a computer, the test data method is used by auditors to test
the?
a. Accuracy of input data
b. Validity of the output
c. Normalcy of distribution of test data
d. Procedures contained within the program

10. The test data method is used by auditors to test the?


e. Accuracy of input data
f. Validity of the output
g. Normalcy of distribution of test data
h. Procedures contained within the program

15
PARALLEL SIMULATION

1. Involves the auditor writing a computer program that replicates some part of a
client’s application system, processes actual client data through an auditor’s
generalized audit software program and compares the output obtained with output
obtained from the client.
a. Parallel simulation
b. Analytical audit techniques
c. Distributed simulation
d. Running massive parallel simulation

2. An off-the-shelf package that can provide a means to gain access to end


interrogate data maintained on computer storage media.
a. Generalized auditor hardware (GAH)
b. General software(GS)
c. Generalized audit software(GAS)
d. General audit hardware software(GAHS)

3. The parallel simulation procedure are the following except:


a. Auditor writes or obtains a copy of the program that simulate key features or
processes to be reviewed/tested
b. Auditor gains a thorough understanding of the application under review.
c. Auditors identifies those processes and controls critical to the application
d. Auditor loss and declined a thorough understanding of the application under
review

4. Which of the following methods of testing application controls utilizes a generalized


audit software package prepared by the auditors'?
A. Parallel simulation.
B. Integrated testing facility approach.
C. Test data approach.
D. Exception report tests.
5. Consider the following statements:
Statement A

16
Parallel simulation is the generation an independent programme to
stimulate/imitate part of an existing application programme, and is designed to
test the validity and verify the accuracy of an existing application
programme/cluster of application programmes

Statement B
Computer assisted audit techniques (CAATs) can be defined as any single, any
group and/or, any cluster of audit techniques that use information technology-
based applications as a primary investigative tool.
Which of the following combinations is correct?
A. Statement A is False, and Statement B is True
B. Statement A is False, and Statement B is False
C. Statement A is True, and Statement B is False
D. Statement A is True, and Statement B is True
6. Parallel simulation programs used by the auditors for testing programs:
A. Must simulate all functions of the production computer-application system.
B. Cannot be developed with the aid of generalized audit software.
C. Can use live data or test data.
D. Is generally restricted to data base environments.

7. Which of the following is a computer-assisted audit technique that permits an


auditor to insert the auditor’s version of client’s program to process data and
compare the output with the client’s output?
A. Test data module
B. Frame relay protocol
C. Remote node router
D. Parallel simulation
8. Old and new systems operating simultaneously in all locations is a test approach
known as:
A. Pilot testing
B. Horizontal testing
C. Integrative testing

9. The main types of audits are?


a. Financial, operational and compliance
b. Financial, operational, compliance and completeness
c. Financial and operational
d. None of the above

17
10. The Primary types of auditors include?
a. Dependent, internal and external (private)
b. Independent, internal and external (Government)
c. Internal and external only
d. Dependent and independent

INTEGRATED TEST FACILITY (ITF)

1. What is the Purpose of Integrated Test Facility (ITF)?


a. To control an AIS in an Operational Media
b. To audit an AIS in an operational setting
c. To facilitate an AIS to Operation
d. To control an Operational Setting of AIS

2. To examine results of transaction processing to find out how well the AIS does the
tasks required of it is the role of?
a. Accountant
b. Consultant
c. Controller
d. Auditor

3. What are the advantages in Integrated Test Facility (ITF)


a. Supports continuous monitoring of controls.
b. Testing can be unscheduled and unknown to other staff.
c. It provides prima facie evidence of correct program functions.
d. All of the above

4. What is the disadvantages of Integrated Test Facility (ITF)


a. The potential of corrupting data files with test data that may end up in the
Financial Reporting Process.
b. The potential of corrupting data files with test data that may end up in the
Ledger.
c. The data files with test data that may end up in the Financial Reporting Process
and Ledger.
d. The skills of corrupting data files with test data processing that may end up in
the Process.

5. An Integrated Test Facility is considered a useful audit tool because it:


a. Is approach to auditing application controls
b. Enables the financial and IS auditors to integrate their audit test
18
c. It uses the same programs to compare processing using independently
calculated data. This involves setting up dummy entities on an application
system and processing test or production data against the entity as a means of
verifying processing accuracy.
d. Provides the IS auditor with a tool analyze a large range of information.

6. An IS auditor when reviewing a network used for Internet communications will


FIRST examine the:
a. Validity of passwords change occurrences.
b. Architecture of the client-server application
c. Network architect and design
d. Firewall protection and proxy serves.

7. The PRIMARY purpose of audit trails is to:


a. Improve response time for users
b. Establish accountability and responsibility for processed transactions
c. Provide useful information to auditors who may wish to track transactions.
d. Improve the operational efficiency of the system

8. Which of the following provisions in a contract for external information systems


services would an IS auditor consider to be the LEAST significant?
a. Continued service of outsourcer in the event of a disaster
b. Statement of due care and confidentiality
c. Detailed description of computer hardware used by the vendor
d. Ownership of program and files

9. After a full operational contingency test, the IS auditor performs a review of the
recovery steps and concludes that the elapsed time until the technological
environment and systems were actually functioning exceeded the required critical
recovery time. Which of the following should be auditors recommend?
a. Broaden the processing capacity to gain recovery time.
b. Make improvements in the facility’s circulation structure.
c. Perform an Integral review of the recovery tasks.
d. Increase the amount of human resources involved in the recovery.

10. Which of the following is a benefit of an Integrated Test Facility (ITF)


a. Periodic testing does not require separate test process
b. It uses actual master files or dummies and the IS auditor does not need to
assess the source of the transaction
c. The requirement to prepare test data is eliminated.
d. It affirms application systems and test the ongoing operation of the system
19
BATCH PROCESSING

1. Which of the following is not a characteristic of a batch processing system?


a. The collection of like transactions which are sorted and processed
sequentially against a master file
b. Keypunching of transactions, followed by a machine processing
c. The production of numerous printouts
d. The posting of a transaction, as it occurs, to several files, without
intermediate printouts

2. Which of the following applies batch processing?


a. Accumulation of data by batch
b. As transaction occurs, it is subject to validation
c. Needs to be updated immediately
d. Expensive to buy

3. What method is needed when there is a large number of a transaction?


a.Direct processing
b.Transaction processing
c. Online real-time processing
d.Batch processing

4. Payroll system is best suited in:


a. Transaction processing
b. Batch processing
c. Online real-time processing
d. Direct processing

5. What method shall be used when there is a controlled resubmission of rejected


transactions or review of exception report (wages exception)?
a. Batch processing
b. Online real-time processing
c. Revenue system
d. Disbursement system

20
6. Consider the following about Batch Processing:
I. It demands fewer organizational resources
II. Masterfile are not updated immediately
III. Processing takes place when the economic event occurs.

Which of the above statements is (are) true?


a. I only
b. II only
c. I and II only
d. I, II and III only

7. Which Statement is not correct?


a. Each program in a batch system is called a run.
b. Batch processing is well suited to systems that process lower transaction
volumes and those that do not share common records
c. Batch systems assemble transactions into groups for processing
d. Payroll processing is an example of a typical batch system

8. First statement: Batch processing permits the efficient management of a large


volume of transactions.
Second statement: Under Batch System Lag exists between time when the economic
event occurs and when it is recorded.
a. First statement is true
b. Second statement is true
c. Both statements are true
d. Both statements are false

9. Which of the following is the disadvantage of Batch Processing


a. There’s a time delay in processing data
b. Masterfile are not updated immediately
c. Requires less resources
d. Very expensive to buy

10. Which of these statement is false regarding batch system


a. When a batch is small, error identification is much easier
b. Process transactions individually at the moment the event occurs.
c. Organizations improve efficiency by grouping together large numbers of
transactions into batches rather than processing each event separately.
d. Batch processing provides control over the transaction process

21
ON-LINE REAL TIME PROCESSING

1. Compared to batch processing, real-time has which of the following advantages?

a. Ease of implementation

b. Ease of auditing

c. Timelines of information

d. Efficiency of processing

2. Online real-time system typically requires three basic sub processes to be completed
before an event is converted into information that can be used by decision makers.

a. Business event occurs; record business event data

b. Update master data

c. Generate reports and support queries

d. All of the above

3. Consider the following statements:

Statement A: Real-time processing is ideal for processing large volume of data


transaction; it can be done or processed independently during less-busy time or at a
desired designated time.

Statement B: Real-time processing allows businesses or organizations to function


more effectively in terms of giving the organization the ability to take immediate action and
adjustments when responding to errors.

a. Statement A is false, Statement B is false

b. Statement A is false, Statement B is true

c. Statement A is true, Statement B is true

d. Statement A is true, Statement B is false

4. Immediate mode is?

22
a. the data processing mode in which there is a significant delay between any two
data processing steps

b. the data processing mode in which there is little or no delay between any two data
processing steps

c. Is similar to periodic mode

d. Both A and C

5. Time data processing involves:

a. Continual input,

b. Process

c. Output of data.

d. All of the above

6. On-line real time is

a. Time consuming

b. Expensive to buy

c. Both A and B

d. None of the above

7. Which of the following is NOT a step in the data processing cycle?

a. Data input

b. Data collection

c. Data processing

d. Data storage

8. What is NOT considered as a benefit of online real-time accounting?

a. Saving Time

b. Minimizing development costs

c. Provides financial reporting

d. Cash flow and other financial information will be applied in months

23
9. All statements are true about Online Real-Time processing method except:

a. Used by Point of Sale (POS) Systems to update inventory, provide inventory


history, and sales of a particular item.

b. Is an efficient way of processing high volumes of data is where a group of


transactions is collected over a period of time.

c. Systems gather business event data at the time of occurrence, update the master
data almost instantaneously, and provide the results arising from the business event within
a very short time

d. Assembly lines use real time processing to reduce time, cost and errors.

10. Airline reservations system is an example of?

a. Online real time Processing

b. Direct Processing

c. Batch Processing

d. Transaction Processing

24
PART II

Suggested Answers

GENERAL CONTROLS and APPLICATION CONTROLS – ANSWERS

1. C. Access control
Access control would only cover access approval, authentication and access control
are often combined into a single operation, authentication methods and tokens
include passwords, personal identification numbers and etc.
2. A. System analyst
System analyst set up new computer systems, both the hardware and software add
new software applications to increase computer productivity.
3. B. Password
Access controls is a way of limiting access to a system or to physical or virtual
resources to ensure that users have proper authorization to perform a task.
4. D. A and B
Hardware controls or Equipment controls are computer controls built into physical
equipment by the manufacturer to detect and control errors arising from the use of
equipment.

5. D. A and D
Data and other procedural controls also known as “back-up files” assures the continuity
of the operation in the event of any physical disaster.
6. C. Check digit
Single digit placed consistently in any position. Number added to a code to derive a
further number as a means of verifying the accuracy or validity of the code as it is
printed or transmitted.
7. D. Output control
The output controls describes the immediate results of the process. Compare output
results with expected results by checking the output against the input.
8. A. Hash total

25
The sum of unrelated numbers. The hash total does not provide useful data, but is
used as a check to ensure inputs were entered correctly.
9. B. Hardware controls
Financial total is normally used in batch processing method. Financial data consists of
pieces or sets of information related to the financial health of the business.
10. D. Check digit
Number added to a code to derive a further number as a means of verifying the
accuracy or validity of the code as it is printed or transmitted. Single digit placed
consistently in any position.

REVENUE ACCOUNTING SYSTEM

1. Answer: B
- A credit limit is refers to the maximum amount of loan that the seller accepts to
grants to its customer.
2. Answer: B
-Credit manager is the one manage and make decisions concerning credit limits.
3. Answer: A
-The record count and hash total of the quantities ordered is the manually
calculated for each batch in a typical sales order entry system.
4. Answer: B
- We consider revenue when the goods is shipped
5. Answer: B
- Amounts owed to the business by its customers for merchandise purchased on account
are accounts receivables of the business. Details of customer’s accounts receivables
are maintained in the accounts receivable subsidiary ledger.
6. Answer: A
- The cash receipts journal is used to record all cash received by the business. Of the
items listed, only “expensing of prepaid rent” does not involve the receipt of cash.
7. Answer: D
- Wal-Mart is big retail store so the relationship between the sales and inventory items
represented as "many to many".
8. Answer: A
- The credit manager’s function is to approve credit memos.
9. Answer: C
- This is the cashiers’ job. The cashier function has custody of cash accounts.
10. Answer: C
- The revenue cycles primary objective is to provide the right product in the right place at
the right time for the right place.

26
DISBURSEMENT ACCOUNTING SYSTEM
1. Answer C.
Reverse auction is a type of auction in which the roles of buyer and seller are reversed.
It is one technique that may reduce purchasing.
2. Answer D
Disbursement voucher is a form used to have a check made to pay an individual or an
organization for merchandise sold or service rendered. There are no disadvantages
to using disbursement voucher.
3. Answer D.
The final activity in the expenditure cycle is the payment of approved invoices.
4. Answer D
Inventory vendors and open purchase orders are electronic files that you can read
when goods are being ordered from a vendor.
5. Answer A.
JIT is frequent deliveries of smaller quantities of items to the work centers.
6. Answer C.
Credit rating of vendor would not be a major certain in vendor selection.
7. Answer D.
Purchase order is a document formally requesting a vendor to sell a certain product at
a certain price. A request for delivery of certain items and quantities.A contract
between the buyer and vendor once accepted by the vendor.
8. Answer C
Copies of the purchase order are typically sent to the vendor and to the receiving and
accounts payable departments.
9. Answer C.
The receiving and storage of goods is the responsibility of the receiving department,
which usually reports to the production.
10. Answer C.
EFT is a form of counseling intervention that draws on various theories of alternative
medicine
it is not useful aid in the receiving process.

27
AUDITING AROUND

1.A.
Computer programs must be available in English.
2. C
. processing controls.
3.B
. understanding of the system.
4.D
. all of the above.
5 D.
It may take the recordkeeping function and the document preparation function
away from those who have custody of assets and put those functions into the IT
center
6. D.
general controls
7. C
. Observation of transaction processing
8. C
. auditing around the computer.
9. C
. Processing controls.
10. B
. review of data for reasonableness by someone who knows what the output should
look like.

28
AUDITING THROUGH

1. A. Pilot simulation.
2. B. observation.
3. D. Over-reliance on computer-generated reports.
4. D. Programming is not allowed online and must be done separately.
5. B. Increased human involvement.
6. D. Manual controls replace automated controls.
7. C. Improved audit trail
8. C. Hardware controls.
9. C. Physical and online security.
10. D. Application controls relate to the processing of individual transactions

29
TEST DATA APPROACH- Answers

1. C- Prepare transaction and results is the first step in test data approach.
2. B-Test transaction should be Logical process
3. D- Requires limited technical knowledge is not a disadvantage of test data
approach
4. D - Cost for constructing test data, pre determine the result manually and
ascertaining which controls to be tested.
5. B – are the four qualities of test data that must possess Realistic, Practically Valid,
Versatile and Cover Scenarios’ and Exceptional Data.
6. B- is the only way to prepare Test Data
7. C - Test data involves auditor preparation of a series of Fictitious transactions
8. B- To define test data approach has one of the White box techniques used by auditors
in a computer assisted auditing techniques
9. B- Auditors process their own test data using the client’s computer system and
application program is the best describes the test data approach
10. D - In auditing through a computer, the test data method is used by auditors to test
the Procedures contained within the program

30
PARALLEL SIMULATION- Answers

1. A- Parallel simulation Involves the auditor writing a computer program that replicates
some part of a client’s application system, processes actual client data through an
auditor’s generalized audit software program and compares the output obtained with
output obtained from the client

2. C - Generalized audit software (GAS) An off-the-shelf package that can provide a


means to gain access to end interrogate data maintained on computer storage media.

3. D- Requires limited technical knowledge is not parallel simulation procedure

4. A The parallel simulation uses generalized audit programs that processes data and
generates output like the original audited program.

5. D- Involves the auditor writing a computer program that replicates some part
of a client’s application system, processes actual client data through an auditor’s
generalized audit software program and compares the output obtained with
output obtained from the client. The method verifies processing of actual
transactions and allows the auditor to verify actual client results. Parallel
simulation

6.C. Can use live data or test data


Auditor reprocesses some or all the client's live data (using software provided by
the auditor) and then compares the results with the client's files.

7.D. Parallel Simulation


Parallel simulation is the computer-assisted audit technique in which the auditor
inserts the auditor’s version of the client’s program to reprocess client data
compare the output with the client’s output.

8. D. Parallel Testing
Parallel testing means testing multiple applications or subcomponents of one
application concurrently to reduce the test time. However, distributed testing also
31
presupposes that test parts interact with each other during the test run, while the
parallel testing approach lacks interaction between test parts.

9. D - To facilitate the substantive testing of client account balances, To provide evidences


on the controls used in the client’s application programs and Parallel simulation is the best
technique for verification of calculations are the functions of parallel simulation

10. A - A financial audit examines the reliability and integrity of financial transactions,
accounting records and financial statement; an information systems audit reviews the
controls of an AIS to assess its compliance with internal control policies and procedures
and its effectiveness in safeguarding assets is a financial audit different from an
information systems audit.

32
INTEGRATED TEST FACILITY (ITF)- Answers

1. B -To audit an AIS in an operational setting is the purpose integrated test facility.
2. D- To examine results of transaction processing to find out how well the AIS does the
tasks required of it is the role of Auditor.
3. D- Supports continuous monitoring of controls, testing can be unscheduled and
unknown to other staff and It provides prima facie evidence of correct program functions
are the advantages in Integrated Test Facility (ITF).
4. A - The potential of corrupting data files with test data that may end up in the Financial
Reporting Process is the disadvantages of Integrated Test Facility (ITF).
5. C -It uses the same programs to compare processing using independently calculated
data. This involves setting up dummy entities on an application system and processing
test or production data against the entity as a means of verifying processing accuracy.
6. C- The first step in auditing a network is to understand the network architecture and
design. This would provide an overall picture of the network of the enterprises and its
connectivity. This will be starting point for identifying the various layers of information and
the access architecture across the various layers, such as proxy servers, firewalls and
client/server application. Reviewing validity of password changes would be performed as
part of substantive testing.
7. B- "Enabling audit trails helps in establishing the accountability and responsibility of
processed transactions by tracing transactions through the system. The objective enabling
software to provide audit trails is not to improve system efficiency, since it often involves
additional processing which may in fact reduce response time for users.
Enabling audit trails does involve storage and thus occupies
disk space. Choice C is also a valid reason however, it is not the primary reason"
8. C.-The least significant would be the description of computer hardware. The
organization would need to have compatible and sufficient hardware to be considered a
viable service provider before contract provisions are reviewed.
9. C.-Performing an exhaustive review of the recovery tasks would be appropriate to
identify the way these tasks were performed, the time allocated to each of the steps
required to accomplish recovery, and determine where adjustments can
be made. Choices A, B, and D could be actions after the
described review has been completed.
10. A-An ITF creates fictitious entity in the database to process test transaction
simultaneously with live input. Its advantage is that periodic testing does not require
separate test process. However, careful planning is necessary, and test data must be
isolated from production data.
33
BATCH PROCESSING METHOD

1. Answer D.
- Because simultaneous posting to several files is most frequently related to an online
real-time processing
2. Answer A.
- In batch processing, there is accumulation of data by bath (record/financial total) prior
to processing.
3. Answer D.
- Batch processing is designed and effective for large volume of similar transactions.
4. Answer B.
- One of the examples of batch processing is the Payroll system wherein there is an
accumulation of data by batch (track of hours, calculating wages, withholding taxes
and reduction).
5. Answer A.
- Batch processing matches input to output and is therefore also a control over
processing and output.
6. Answer C.
- Batch processing method demands fewer organizational resources than on-line-real-
time processing and Masterfile are not immediately updated as transaction occurs,
that is why time delay between transactions exists.
7. Answer B.
- Batch processing method can process large volume of similar transactions
8. Answer C.
- Both statements are characteristic of batch processing method.
9. Answer D.
- Batch system generally requires fewer resources.
10. Answer B.
- Process transactions individually at the moment the event occurs is a
characteristic of an On- line-real time method.

34
ONLINE REALTIME

1. Answer A.
- A turnaround document is a source document generated by the computer system as
output and then later used as input for subsequent processing. Turnaround
documents are least likely to be found in an online, real-time processing system
because it normally does not use source documents.
2. Answer D.
- Computers are designed to include hardware diagnostic routines that allow
identification of hardware problems such as parity check to determine if the integrity
of the bit structure of each character has been destroyed during the internal
transmission of data within the system.
3. Answer A.
- Real time system processes the entire transactions as it occurs with less interaction.
4. Answer C.
- One of the examples of real time processing is the ATM which is expensive to buy.
5. Answer D.
- In online real time processing, as transaction occurs, it is subject for validation with no
time delay.
6. Answer A.
- Online real time processing is expensive to buy. One of the examples is Bank ATM,
radar systems and customer services. Etc.
7. Answer B.
- Is correct because on-line real-time systems are those for which processing is
performed as data are input and the results are available immediately
8. Answer A.
- All of the statements are true with regards to Online real time processing.
9. Answer C.
- Airline reservations system is an example of Online Real time Processing, which
processes requests for services from one traveler at a time while he or she waits.
10. Answer D.
- All of the following are characteristic of Online Real time Processing.

35

You might also like