Finals Cis
Finals Cis
4. It relates to materiality of the financial statement assertions affected by a) The organizational structure of the client’s CIS activities.
the computer processing. b) Lack of transaction trails.
REVIEWER IN AUDIT IN CIS
c) The significance and complexity of computer processing in each d) Personal computers can be linked to servers and used as part of
significant accounting application. such systems, for example, as an intelligent on-line workstation or
d) The use of software packages instead of customized software. as part of a distributed accounting system.
9. Which statement is correct regarding personal computer systems? 12. Which of the following is the least likely characteristic of personal
computers?
a) Personal computers or PCs are economical yet powerful self-
contained general purpose computers consisting typically of a a) They are small enough to be transportable.
central processing unit (CPU), memory, monitor, disk drives, printer b) They are relatively expensive.
cables and modems. c) They can be placed in operation quickly.
b) Programs and data are stored only on non-removable storage d) The operating system software is less comprehensive than that
media. found in larger computer environments.
c) Personal computers cannot be used to process accounting
transactions and produce reports that are essential to the 13. Which of the following is an inherent characteristic of software
preparation of financial statements. package?
d) Generally, CIS environments in which personal computers are used a) They are typically used without modifications of the programs.
are the same with other CIS environments.
b) The programs are tailored-made according to the specific needs of
the user.
10. A personal computer can be used in various configurations, including c) They are developed by software manufacturer according to a
particular user’s specifications.
a) A stand-alone workstation operated by a single user or a number of d) It takes a longer time of implementation.
users at different times.
b) A workstation which is part of a local area network of personal 14. Which of the following is not normally a removable storage media?
computers.
a) Compact disk c)Tapes
c) A workstation connected to a server.
b) Diskettes d) Hard disk
d) All of the above.
15. It is a computer program (a block of executable code) that attaches
11. Which statement is incorrect regarding personal computer itself to a legitimate program or data file and uses its as a transport
configurations? mechanism to reproduce itself without the knowledge of the user.
a) Virus c) System management
a) The stand-alone workstation can be operated by a single user or a program
number of users at different times accessing the same or different
b) Utility program d) Encryption
programs.
16. Which statement is incorrect regarding internal control in personal
b) A stand-alone workstation may be referred to as a distributed computer environment?
system.
c) A local area network is an arrangement where two or more personal a) Generally, the CIS environment in which personal computers are
computers are linked together through the use of special software used is less structured than a centrally-controlled CIS environment.
and communication lines.
REVIEWER IN AUDIT IN CIS
b) Controls over the system development process and operations may d) Segregating data into files organized under separate file directories.
not be viewed by the developer, the user or management as being
as important or cost-effective. 20. It refers to plans made by the entity to obtain access to comparable
hardware, software and data in the event of their failure, loss or
c) In almost all commercially available operating systems, the built-in
destruction.
security provided has gradually increased over the years.
d) In a typical personal computer environment, the distinction between a) Back-up b) Encryption c) Anti-virus d) Wide Area Network
general CIS controls and CIS application controls is easily (WAN)
ascertained.
21. The effect of personal computers on the accounting system and the
17. Personal computers are susceptible to theft, physical damage, associated risks will least likely depend on
unauthorized access or misuse of equipment. Which of the following is
least likely a physical security to restrict access to personal computers a) The extent to which the personal computer is being used to process
when not in use? accounting applications.
b) The type and significance of financial transactions being processed.
a) Using door locks or other security protection during non-business
c) The nature of files and programs utilized in the applications.
hours.
d) The cost of personal computers.
b) Fastening the personal computer to a table using security cables.
c) Locking the personal computer in a protective cabinet or shell. 22. The auditor may often assume that control risk is high in personal
d) Using anti-virus software programs. computer systems since it may not be practicable or cost-effective for
management to implement sufficient controls to reduce the risks of
18. Which of the following is not likely a control over removable storage undetected errors to a minimum level. This least likely entail
media to prevent misplacement, alteration without authorization or
destruction? a) More physical examination and confirmation of assets.
b) More analytical procedures than tests of details.
a) Using cryptography, which is the process of transforming programs
c) Larger sample sizes.
and information into an unintelligible form.
d) Greater use of computer-assisted audit techniques, where
b) Placing responsibility for such media under personnel whose
appropriate.
responsibilities include duties of software custodians or librarians.
c) Using a program and data file check-in and check-out system and 23. Computer systems that enable users to access data and programs
locking the designated storage locations. directly through workstations are referred to as
d) Keeping current copies of diskettes, compact disks or back-up tapes
and hard disks in a fireproof container, either on-site, off-site or both. a) On-line computer systems c) Personal computer systems
19. Which of the following least likely protects critical and sensitive b) Database management systems (DBMS) d) Database systems
information from unauthorized access in a personal computer 24. On-line systems allow users to initiate various functions directly. Such
environment? functions include:
a) Using secret file names and hiding the files. I. Entering transactions III. Requesting reports
b) Keeping of back up copies offsite. II. Making inquiries IV. Updating master files
c) Employing passwords.
REVIEWER IN AUDIT IN CIS
a) I, II, III and IV c) I and II a) Individual transactions are entered at workstations, validated and
used to update related computer files immediately.
b) I, II and III d) I and IV
b) Individual transactions are entered at a workstation, subjected to
25. Many different types of workstations may be used in on-line computer certain validationchecks and added to a transaction file that contains
systems. The functions performed by these workstations least likely other transactions entered during the period.
depend on their c) Individual transactions immediately update a memo file containing
information which has been extracted from the most recent version
a) Logic b) Transmission c) Storage d) Cost of the master file.
26. Types of workstations include General Purpose Terminals and Special d) The master files are updated by other systems.
Purpose TEST 2: MATCHING TYPE
Terminals. Special Purpose Terminals include
Characteristics of Computer Information Systems (CIS)
a) Basic keyboard and monitor c) Point of sale devices
b) Intelligent terminal d) Personal computers Computer Information systems have essential characteristics that
distinguish them from manual processing systems
27. Special Purpose Terminal used to initiate, validate, record, transmit and
complete various banking transactions Lack of visible transaction trails
CAATs are computer programs and data which the auditor uses as part of
the audit procedures to process data of audit significance contained in
REVIEWER IN AUDIT IN CIS
Other CAATs
Snapshots
examine.
REVIEWER IN AUDIT IN CIS
TEST 3: ILLUSTRATION